1. 02 Oct, 2015 1 commit
  2. 01 Oct, 2015 1 commit
  3. 30 Sep, 2015 4 commits
  4. 15 Sep, 2015 1 commit
  5. 10 Sep, 2015 2 commits
  6. 03 Sep, 2015 1 commit
  7. 28 Aug, 2015 1 commit
  8. 27 Aug, 2015 1 commit
  9. 23 Aug, 2015 1 commit
  10. 03 Aug, 2015 1 commit
  11. 22 Jul, 2015 2 commits
  12. 20 Jul, 2015 1 commit
  13. 19 Jul, 2015 1 commit
  14. 16 Jul, 2015 1 commit
  15. 15 Jul, 2015 1 commit
  16. 14 Jul, 2015 3 commits
  17. 10 Jul, 2015 1 commit
  18. 05 Jul, 2015 2 commits
  19. 04 Jul, 2015 2 commits
  20. 03 Jul, 2015 1 commit
  21. 01 Jul, 2015 2 commits
  22. 30 Jun, 2015 2 commits
  23. 27 Jun, 2015 3 commits
    • Juan Batiz-Benet's avatar
      fix swarm notif tests · dae8ff49
      Juan Batiz-Benet authored
      
      
      they were failing intermittently
      
      License: MIT
      Signed-off-by: default avatarJuan Batiz-Benet <juan@benet.ai>
      dae8ff49
    • Juan Batiz-Benet's avatar
      mock: fix notif test · 1cef084e
      Juan Batiz-Benet authored
      
      
      License: MIT
      Signed-off-by: default avatarJuan Batiz-Benet <juan@benet.ai>
      1cef084e
    • Juan Batiz-Benet's avatar
      daemon option to optionally disable secio · 19f33952
      Juan Batiz-Benet authored
      
      
      This commit adds an option to turn off all encryption. This is a mode
      used for tests, debugging, achieving protocol implementation interop,
      learning about how the protocol works (nc ftw), and worst case
      networks which _demand_ to be able to snoop on all the traffic.
      (sadly, there are some private intranets like this...). (We should
      consider at least _signing_ all this traffic.)
      
      Because of the severity of this sort of thing, this is an
      all-or-nothing deal. Either encryption is ON or OFF _fully_.
      This way, partially unencrypted nodes cannot be accidentally left
      running without the user's understanding. Nodes without encrypted
      connections will simply not be able to speak to any of the global
      bootstrap nodes, or anybody in the public network.
      
      License: MIT
      Signed-off-by: default avatarJuan Batiz-Benet <juan@benet.ai>
      19f33952
  24. 23 Jun, 2015 3 commits
  25. 18 Jun, 2015 1 commit
    • rht's avatar
      Replace Critical{,f} with Error{,f} · b1702b08
      rht authored
      
      
      Except when there is an explicit os.Exit(1) after the Critical line,
      then replace with Fatal{,f}.
      golang's log and logrus already call os.Exit(1) by default with Fatal.
      
      License: MIT
      Signed-off-by: default avatarrht <rhtbot@gmail.com>
      b1702b08