- 16 Jul, 2015 1 commit
-
-
Karthik Bala authored
License: MIT Signed-off-by: Karthik Bala <karthikbala444@gmail.com>
-
- 14 Jul, 2015 2 commits
-
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
- 10 Jul, 2015 1 commit
-
-
Juan Batiz-Benet authored
we shouldn't use internal packages. License: MIT Signed-off-by: Juan Batiz-Benet <juan@benet.ai>
-
- 05 Jul, 2015 2 commits
-
-
rht authored
License: MIT Signed-off-by: rht <rhtbot@gmail.com>
-
rht authored
License: MIT Signed-off-by: rht <rhtbot@gmail.com>
-
- 04 Jul, 2015 2 commits
-
-
rht authored
License: MIT Signed-off-by: rht <rhtbot@gmail.com>
-
rht authored
License: MIT Signed-off-by: rht <rhtbot@gmail.com>
-
- 03 Jul, 2015 1 commit
-
-
Juan Batiz-Benet authored
add filters from config to addr filter in swarm
-
- 01 Jul, 2015 2 commits
-
-
Lars Gierth authored
License: MIT Signed-off-by: Lars Gierth <larsg@systemli.org>
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
- 30 Jun, 2015 2 commits
-
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
Lars Gierth authored
License: MIT Signed-off-by: Lars Gierth <larsg@systemli.org>
-
- 27 Jun, 2015 3 commits
-
-
Juan Batiz-Benet authored
they were failing intermittently License: MIT Signed-off-by: Juan Batiz-Benet <juan@benet.ai>
-
Juan Batiz-Benet authored
License: MIT Signed-off-by: Juan Batiz-Benet <juan@benet.ai>
-
Juan Batiz-Benet authored
This commit adds an option to turn off all encryption. This is a mode used for tests, debugging, achieving protocol implementation interop, learning about how the protocol works (nc ftw), and worst case networks which _demand_ to be able to snoop on all the traffic. (sadly, there are some private intranets like this...). (We should consider at least _signing_ all this traffic.) Because of the severity of this sort of thing, this is an all-or-nothing deal. Either encryption is ON or OFF _fully_. This way, partially unencrypted nodes cannot be accidentally left running without the user's understanding. Nodes without encrypted connections will simply not be able to speak to any of the global bootstrap nodes, or anybody in the public network. License: MIT Signed-off-by: Juan Batiz-Benet <juan@benet.ai>
-
- 23 Jun, 2015 3 commits
-
-
Jeromy authored
- add extra check to dialblock test - move filter to separate package - also improved tests - sunk filters down into p2p/net/conn/listener License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com> Signed-off-by: Juan Batiz-Benet <juan@benet.ai>
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
- 18 Jun, 2015 1 commit
-
-
rht authored
Except when there is an explicit os.Exit(1) after the Critical line, then replace with Fatal{,f}. golang's log and logrus already call os.Exit(1) by default with Fatal. License: MIT Signed-off-by: rht <rhtbot@gmail.com>
-
- 08 Jun, 2015 1 commit
-
-
Juan Batiz-Benet authored
Different mutliaddrs is not enough. Nodes may share transports. NAT port mappings will likely only work on the base IP/TCP port pair. We go one step further, and require different root (IP) addrs. Just in case some NATs group by IP. In practice, this is what we want: use addresses only if hosts that are on different parts of the network have seen this address.
-
- 07 Jun, 2015 1 commit
-
-
Juan Batiz-Benet authored
If the same peer observed the same address twice, it would be double counted as different observations. This change adds a map to make sure we're counting each observer once. This is easily extended to require more than two observations, but i have not yet encountered NATs for whom this is relevant.
-
- 03 Jun, 2015 1 commit
-
-
rht authored
-
- 01 Jun, 2015 1 commit
-
-
Jeromy authored
-
- 29 May, 2015 1 commit
-
-
Juan Batiz-Benet authored
Cleanup tour
-
- 28 May, 2015 1 commit
-
-
Henry authored
upstream didn't respond to the request to update their dependencies
-
- 26 May, 2015 1 commit
-
-
rht authored
-
- 18 May, 2015 1 commit
-
-
rht authored
-
- 12 May, 2015 1 commit
-
-
Juan Batiz-Benet authored
We had a very nasty problem: handshakes were serial so incoming dials would wait for each other to finish handshaking. this was particularly problematic when handshakes hung-- nodes would not recover quickly. This led to gateways not bootstrapping peers fast enough. The approach taken here is to do what crypto/tls does: defer the handshake until Read/Write[1]. There are a number of reasons why this is _the right thing to do_: - it delays handshaking until it is known to be necessary (doing io) - it "accepts" before the handshake, getting the handshake out of the critical path entirely. - it defers to the user's parallelization of conn handling. users must implement this in some way already so use that, instead of picking constants surely to be wrong (how many handshakes to run in parallel?) [0] http://golang.org/src/crypto/tls/conn.go#L886
-
- 06 May, 2015 1 commit
-
-
Dominic Tarr authored
-
- 05 May, 2015 1 commit
-
-
Juan Batiz-Benet authored
quick fix for OOM panic that has been plaguing us
-
- 02 May, 2015 1 commit
-
-
Jeromy authored
-
- 01 May, 2015 2 commits
-
-
Juan Batiz-Benet authored
Fix/dial error hiding
-
Juan Batiz-Benet authored
advertise multiple addresses over mdns
-
- 30 Apr, 2015 1 commit
-
-
Jeromy Johnson authored
-
- 29 Apr, 2015 2 commits
- 28 Apr, 2015 3 commits