1. 16 Nov, 2015 1 commit
  2. 15 Nov, 2015 1 commit
  3. 12 Nov, 2015 1 commit
  4. 30 Sep, 2015 2 commits
  5. 27 Jun, 2015 1 commit
    • Juan Batiz-Benet's avatar
      daemon option to optionally disable secio · 19f33952
      Juan Batiz-Benet authored
      
      
      This commit adds an option to turn off all encryption. This is a mode
      used for tests, debugging, achieving protocol implementation interop,
      learning about how the protocol works (nc ftw), and worst case
      networks which _demand_ to be able to snoop on all the traffic.
      (sadly, there are some private intranets like this...). (We should
      consider at least _signing_ all this traffic.)
      
      Because of the severity of this sort of thing, this is an
      all-or-nothing deal. Either encryption is ON or OFF _fully_.
      This way, partially unencrypted nodes cannot be accidentally left
      running without the user's understanding. Nodes without encrypted
      connections will simply not be able to speak to any of the global
      bootstrap nodes, or anybody in the public network.
      
      License: MIT
      Signed-off-by: default avatarJuan Batiz-Benet <juan@benet.ai>
      19f33952
  6. 20 Apr, 2015 1 commit
    • Juan Batiz-Benet's avatar
      remove debugerrors · b5957350
      Juan Batiz-Benet authored
      We now consider debugerrors harmful: we've run into cases where
      debugerror.Wrap() hid valuable error information (err == io.EOF?).
      I've removed them from the main code, but left them in some tests.
      Go errors are lacking, but unfortunately, this isn't the solution.
      
      It is possible that debugerros.New or debugerrors.Errorf should
      remain still (i.e. only remove debugerrors.Wrap) but we don't use
      these errors often enough to keep.
      b5957350
  7. 08 Apr, 2015 1 commit
    • Juan Batiz-Benet's avatar
      reuseport: env var to turn it off · 9dbbe6db
      Juan Batiz-Benet authored
      reuseport is a hack. It is necessary for us to do certain kinds of
      tcp nat traversal. Ideally, reuseport would be available in go:
      
        https://github.com/golang/go/issues/9661
      
      But until that issue is fixed, we're stuck with this. In some cases,
      reuseport is strictly a detriment: nodes are not NATed. This commit
      introduces an ENV var IPFS_REUSEPORT that can be set to false to
      avoid using reuseport entirely:
      
        IPFS_REUSEPORT=false ipfs daemon
      
      This approach addresses our current need. It could become a config
      var if necessary. If reuseport continues to give problems, we should
      look into improving it.
      9dbbe6db
  8. 01 Apr, 2015 1 commit
    • Jeromy's avatar
      bandwidth metering on streams · 44309cd5
      Jeromy authored
      humanize bandwidth output
      
      instrument conn.Conn for bandwidth metrics
      
      add poll command for continuous bandwidth reporting
      
      move bandwidth tracking onto multiaddr net connections
      
      another mild refactor of recording locations
      
      address concerns from PR
      
      lower mock nodes in race test due to increased goroutines per connection
      44309cd5
  9. 31 Mar, 2015 1 commit
  10. 25 Feb, 2015 1 commit
    • Henry's avatar
      rewrote import paths of go.net/context to use golang.org/x/context · e73da92c
      Henry authored
      - updated go-ctxgroup and goprocess
      ctxgroup: AddChildGroup was changed to AddChild. Used in two files:
      - p2p/net/mock/mock_net.go
      - routing/dht/dht.go
      
      - updated context from hg repo to git
      prev. commit in hg was ad01a6fcc8a19d3a4478c836895ffe883bd2ceab. (context: make parentCancelCtx iterative)
      represents commit 84f8955a887232b6308d79c68b8db44f64df455c in git repo
      
      - updated context to master (b6fdb7d8a4ccefede406f8fe0f017fb58265054c)
      
      Aaron Jacobs (2):
      net/context: Don't accept a context in the DoSomethingSlow example.
      context: Be clear that users must cancel the result of WithCancel.
      
      Andrew Gerrand (1):
      go.net: use golang.org/x/... import paths
      
      Bryan C. Mills (1):
      net/context: Don't leak goroutines in Done example.
      
      Damien Neil (1):
      context: fix removal of cancelled timer contexts from parent
      
      David Symonds (2):
      context: Fix WithValue example code.
      net: add import comments.
      
      Sameer Ajmani (1):
      context: fix TestAllocs to account for ints in interfaces
      e73da92c
  11. 11 Feb, 2015 1 commit
  12. 10 Feb, 2015 1 commit
  13. 28 Jan, 2015 2 commits
  14. 27 Jan, 2015 1 commit
    • Juan Batiz-Benet's avatar
      p2p/net: dial log -> events · d53edf17
      Juan Batiz-Benet authored
      This commit turns all dial logs into log.Events.
      
      Everything's great except for one problem:
      The LoggableMap I'm using does not print out things
      correctly. I gave it peer.IDs, and Multiaddrs
      and both got logged as nothing `{}` (didn't even call
      their String() methods!) So, for now, this function
      encodes it when called... This is wrong and should be
      fixed before being merged in. Otherwise we  will be
      constantly encoding peer.IDs and Multiaddrs without
      needing to.
      
      @briantigerchow how do you suggest doing this?
      I don't know my way around your Loggable.
      d53edf17
  15. 26 Jan, 2015 1 commit
  16. 24 Jan, 2015 1 commit
  17. 23 Jan, 2015 2 commits
  18. 21 Jan, 2015 1 commit
  19. 20 Jan, 2015 3 commits
  20. 13 Jan, 2015 1 commit
  21. 11 Jan, 2015 1 commit
  22. 09 Jan, 2015 1 commit
  23. 02 Jan, 2015 1 commit
    • Juan Batiz-Benet's avatar
      net -> p2p/net · 72df463f
      Juan Batiz-Benet authored
      The net package is the next to move. It will be massaged
      a bit still to fix the Network / "NetworkBackend" conflict.
      72df463f