- 22 Jul, 2015 1 commit
-
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
- 19 Jul, 2015 1 commit
-
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
- 16 Jul, 2015 1 commit
-
-
Karthik Bala authored
License: MIT Signed-off-by: Karthik Bala <karthikbala444@gmail.com>
-
- 14 Jul, 2015 2 commits
-
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
- 05 Jul, 2015 2 commits
-
-
rht authored
License: MIT Signed-off-by: rht <rhtbot@gmail.com>
-
rht authored
License: MIT Signed-off-by: rht <rhtbot@gmail.com>
-
- 04 Jul, 2015 2 commits
-
-
rht authored
License: MIT Signed-off-by: rht <rhtbot@gmail.com>
-
rht authored
License: MIT Signed-off-by: rht <rhtbot@gmail.com>
-
- 01 Jul, 2015 2 commits
-
-
Lars Gierth authored
License: MIT Signed-off-by: Lars Gierth <larsg@systemli.org>
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
- 30 Jun, 2015 2 commits
-
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
Lars Gierth authored
License: MIT Signed-off-by: Lars Gierth <larsg@systemli.org>
-
- 27 Jun, 2015 3 commits
-
-
Juan Batiz-Benet authored
they were failing intermittently License: MIT Signed-off-by: Juan Batiz-Benet <juan@benet.ai>
-
Juan Batiz-Benet authored
License: MIT Signed-off-by: Juan Batiz-Benet <juan@benet.ai>
-
Juan Batiz-Benet authored
This commit adds an option to turn off all encryption. This is a mode used for tests, debugging, achieving protocol implementation interop, learning about how the protocol works (nc ftw), and worst case networks which _demand_ to be able to snoop on all the traffic. (sadly, there are some private intranets like this...). (We should consider at least _signing_ all this traffic.) Because of the severity of this sort of thing, this is an all-or-nothing deal. Either encryption is ON or OFF _fully_. This way, partially unencrypted nodes cannot be accidentally left running without the user's understanding. Nodes without encrypted connections will simply not be able to speak to any of the global bootstrap nodes, or anybody in the public network. License: MIT Signed-off-by: Juan Batiz-Benet <juan@benet.ai>
-
- 23 Jun, 2015 3 commits
-
-
Jeromy authored
- add extra check to dialblock test - move filter to separate package - also improved tests - sunk filters down into p2p/net/conn/listener License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com> Signed-off-by: Juan Batiz-Benet <juan@benet.ai>
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
- 01 Jun, 2015 1 commit
-
-
Jeromy authored
-
- 18 May, 2015 1 commit
-
-
rht authored
-
- 12 May, 2015 1 commit
-
-
Juan Batiz-Benet authored
We had a very nasty problem: handshakes were serial so incoming dials would wait for each other to finish handshaking. this was particularly problematic when handshakes hung-- nodes would not recover quickly. This led to gateways not bootstrapping peers fast enough. The approach taken here is to do what crypto/tls does: defer the handshake until Read/Write[1]. There are a number of reasons why this is _the right thing to do_: - it delays handshaking until it is known to be necessary (doing io) - it "accepts" before the handshake, getting the handshake out of the critical path entirely. - it defers to the user's parallelization of conn handling. users must implement this in some way already so use that, instead of picking constants surely to be wrong (how many handshakes to run in parallel?) [0] http://golang.org/src/crypto/tls/conn.go#L886
-
- 30 Apr, 2015 1 commit
-
-
Jeromy Johnson authored
-
- 28 Apr, 2015 1 commit
-
-
Jeromy authored
-
- 20 Apr, 2015 1 commit
-
-
Juan Batiz-Benet authored
We now consider debugerrors harmful: we've run into cases where debugerror.Wrap() hid valuable error information (err == io.EOF?). I've removed them from the main code, but left them in some tests. Go errors are lacking, but unfortunately, this isn't the solution. It is possible that debugerros.New or debugerrors.Errorf should remain still (i.e. only remove debugerrors.Wrap) but we don't use these errors often enough to keep.
-
- 17 Apr, 2015 1 commit
-
-
Jeromy authored
-
- 12 Apr, 2015 1 commit
-
-
Jeromy authored
-
- 08 Apr, 2015 1 commit
-
-
Juan Batiz-Benet authored
reuseport is a hack. It is necessary for us to do certain kinds of tcp nat traversal. Ideally, reuseport would be available in go: https://github.com/golang/go/issues/9661 But until that issue is fixed, we're stuck with this. In some cases, reuseport is strictly a detriment: nodes are not NATed. This commit introduces an ENV var IPFS_REUSEPORT that can be set to false to avoid using reuseport entirely: IPFS_REUSEPORT=false ipfs daemon This approach addresses our current need. It could become a config var if necessary. If reuseport continues to give problems, we should look into improving it.
-
- 01 Apr, 2015 1 commit
-
-
Jeromy authored
humanize bandwidth output instrument conn.Conn for bandwidth metrics add poll command for continuous bandwidth reporting move bandwidth tracking onto multiaddr net connections another mild refactor of recording locations address concerns from PR lower mock nodes in race test due to increased goroutines per connection
-
- 31 Mar, 2015 1 commit
-
-
Ho-Sheng Hsiao authored
- Modified Godeps/Godeps.json by hand - [TEST] Updated welcome docs hash to sharness - [TEST] Updated contact doc - [TEST] disabled breaking test (t0080-repo refs local)
-
- 07 Mar, 2015 1 commit
-
-
Juan Batiz-Benet authored
-
- 25 Feb, 2015 1 commit
-
-
Henry authored
- updated go-ctxgroup and goprocess ctxgroup: AddChildGroup was changed to AddChild. Used in two files: - p2p/net/mock/mock_net.go - routing/dht/dht.go - updated context from hg repo to git prev. commit in hg was ad01a6fcc8a19d3a4478c836895ffe883bd2ceab. (context: make parentCancelCtx iterative) represents commit 84f8955a887232b6308d79c68b8db44f64df455c in git repo - updated context to master (b6fdb7d8a4ccefede406f8fe0f017fb58265054c) Aaron Jacobs (2): net/context: Don't accept a context in the DoSomethingSlow example. context: Be clear that users must cancel the result of WithCancel. Andrew Gerrand (1): go.net: use golang.org/x/... import paths Bryan C. Mills (1): net/context: Don't leak goroutines in Done example. Damien Neil (1): context: fix removal of cancelled timer contexts from parent David Symonds (2): context: Fix WithValue example code. net: add import comments. Sameer Ajmani (1): context: fix TestAllocs to account for ints in interfaces
-
- 20 Feb, 2015 1 commit
-
-
Jeromy authored
-
- 11 Feb, 2015 1 commit
-
-
Juan Batiz-Benet authored
We were half-way with this. there's no way for net.Dialers to respect contexts, so we have to let the dial finish in the background.
-
- 10 Feb, 2015 1 commit
-
-
Juan Batiz-Benet authored
thanks @whyrusleeping for finding these.
-
- 06 Feb, 2015 1 commit
-
-
Juan Batiz-Benet authored
Use of the ratelimiter should be conscious of the ratelimiter's potential closing. any loops that add work to ratelimiter should (a) only do so if the rate limiter is not closed, or (b) prevent limiter while work is added (i.e. use limiter.Go(addWorkHere))
-
- 03 Feb, 2015 4 commits
-
-
Juan Batiz-Benet authored
-
Juan Batiz-Benet authored
-
Juan Batiz-Benet authored
Let's save log.Error for things the user can take action on. Moved all our diagnostics to log.Debug. We can ideally reduce them even further.
-
Juan Batiz-Benet authored
so that we dont get stuck dialing bad addrs first always.
-