1. 04 Jul, 2015 4 commits
  2. 03 Jul, 2015 15 commits
  3. 02 Jul, 2015 3 commits
  4. 01 Jul, 2015 5 commits
  5. 30 Jun, 2015 4 commits
  6. 29 Jun, 2015 1 commit
  7. 27 Jun, 2015 8 commits
    • Juan Batiz-Benet's avatar
      Merge pull request #1399 from ipfs/disable-secio-option · 2d6b787c
      Juan Batiz-Benet authored
      Swarm Addrs, Disable secio opt, + tests
      2d6b787c
    • Juan Batiz-Benet's avatar
      fix swarm notif tests · 59d6a9a1
      Juan Batiz-Benet authored
      they were failing intermittently
      
      License: MIT
      Signed-off-by: default avatarJuan Batiz-Benet <juan@benet.ai>
      59d6a9a1
    • Juan Batiz-Benet's avatar
      mock: fix notif test · f796615e
      Juan Batiz-Benet authored
      License: MIT
      Signed-off-by: default avatarJuan Batiz-Benet <juan@benet.ai>
      f796615e
    • Juan Batiz-Benet's avatar
      fix t0061-daemon-opts.sh nc wait · 6b8e9f51
      Juan Batiz-Benet authored
      fix the nc wait. the issue was that stdin needs to remain _open_
      but not receive any input for some time. If stdin receives (invalid)
      input or closes, the other side terminates the connection before
      writing out the muxer frames + identify handshake.
      
      This commit also changes the use of `!` for `test_must_fail`
      
      License: MIT
      Signed-off-by: default avatarJuan Batiz-Benet <juan@benet.ai>
      6b8e9f51
    • Juan Batiz-Benet's avatar
      added sharness/t0061-daemon-opts · f300e97c
      Juan Batiz-Benet authored
      Test odd daemon options, like:
      - unrestricted-api
      - disable-transport-encryption (known breakage atm)
      
      License: MIT
      Signed-off-by: default avatarJuan Batiz-Benet <juan@benet.ai>
      f300e97c
    • Juan Batiz-Benet's avatar
      daemon option to optionally disable secio · e37fefdf
      Juan Batiz-Benet authored
      This commit adds an option to turn off all encryption. This is a mode
      used for tests, debugging, achieving protocol implementation interop,
      learning about how the protocol works (nc ftw), and worst case
      networks which _demand_ to be able to snoop on all the traffic.
      (sadly, there are some private intranets like this...). (We should
      consider at least _signing_ all this traffic.)
      
      Because of the severity of this sort of thing, this is an
      all-or-nothing deal. Either encryption is ON or OFF _fully_.
      This way, partially unencrypted nodes cannot be accidentally left
      running without the user's understanding. Nodes without encrypted
      connections will simply not be able to speak to any of the global
      bootstrap nodes, or anybody in the public network.
      
      License: MIT
      Signed-off-by: default avatarJuan Batiz-Benet <juan@benet.ai>
      e37fefdf
    • Juan Batiz-Benet's avatar
      daemon output includes swarm addresses · 9716018c
      Juan Batiz-Benet authored
      daemon output now includes initial swarm addresses. this is not a
      full solution, as a change in network will not trigger re-printing.
      We need a good way to do that.
      
      This made me re-think how we're outputting these messages, perhaps
      we should be throwing them as log.Events, and capturing some with
      a special keyword to output to the user on stdout. Things like
      network addresses being rebound, NATs being holepunched, external
      network addresses being figured out, connections established, etc
      may be valuable events to show the user. Of course, these should be
      very few, as a noisy daemon is an annoying daemon.
      
      License: MIT
      Signed-off-by: default avatarJuan Batiz-Benet <juan@benet.ai>
      9716018c
    • Juan Batiz-Benet's avatar
      ipfs swarm addrs local - show local addrs · 500f5130
      Juan Batiz-Benet authored
      Add a command to return local addresses.
      
      License: MIT
      Signed-off-by: default avatarJuan Batiz-Benet <juan@benet.ai>
      500f5130