1. 27 Jun, 2015 2 commits
    • Juan Batiz-Benet's avatar
      daemon option to optionally disable secio · e37fefdf
      Juan Batiz-Benet authored
      This commit adds an option to turn off all encryption. This is a mode
      used for tests, debugging, achieving protocol implementation interop,
      learning about how the protocol works (nc ftw), and worst case
      networks which _demand_ to be able to snoop on all the traffic.
      (sadly, there are some private intranets like this...). (We should
      consider at least _signing_ all this traffic.)
      
      Because of the severity of this sort of thing, this is an
      all-or-nothing deal. Either encryption is ON or OFF _fully_.
      This way, partially unencrypted nodes cannot be accidentally left
      running without the user's understanding. Nodes without encrypted
      connections will simply not be able to speak to any of the global
      bootstrap nodes, or anybody in the public network.
      
      License: MIT
      Signed-off-by: default avatarJuan Batiz-Benet <juan@benet.ai>
      e37fefdf
    • Juan Batiz-Benet's avatar
      daemon output includes swarm addresses · 9716018c
      Juan Batiz-Benet authored
      daemon output now includes initial swarm addresses. this is not a
      full solution, as a change in network will not trigger re-printing.
      We need a good way to do that.
      
      This made me re-think how we're outputting these messages, perhaps
      we should be throwing them as log.Events, and capturing some with
      a special keyword to output to the user on stdout. Things like
      network addresses being rebound, NATs being holepunched, external
      network addresses being figured out, connections established, etc
      may be valuable events to show the user. Of course, these should be
      very few, as a noisy daemon is an annoying daemon.
      
      License: MIT
      Signed-off-by: default avatarJuan Batiz-Benet <juan@benet.ai>
      9716018c
  2. 20 Jun, 2015 1 commit
  3. 18 Jun, 2015 1 commit
  4. 08 Jun, 2015 2 commits
  5. 06 Jun, 2015 1 commit
  6. 10 May, 2015 1 commit
  7. 01 May, 2015 2 commits
  8. 27 Apr, 2015 1 commit
  9. 20 Apr, 2015 5 commits
    • Tor Arne Vestbø's avatar
      Remove daemon InitDone guard in interrupt handler · bfd12114
      Tor Arne Vestbø authored
      Instead of just terminating right there and then, we cancel the
      context, and let the daemon exit cleanly. This make take a few
      seconds, as the node builder and its child processes do not
      care too much about the context state while building nodes,
      but this can be improved by injecting checks for ctx.Done()
      before time-consuming steps.
      bfd12114
    • Tor Arne Vestbø's avatar
      Handle ipfs command interruption by cancelling the command context · cf6a268c
      Tor Arne Vestbø authored
      Instead of assuming the command is the daemon command and closing
      the node, which resulted in bugs like #1053, we cancel the context
      and let the context children detect the cancellation and gracefully
      clean up after themselves.
      
      The shutdown logging has been moved into the daemon command, where
      it makes more sense, so that commands like ping will not print out
      the same output on cancellation.
      cf6a268c
    • Jeromy's avatar
      make ipfs understand the new migration · c419a489
      Jeromy authored
      c419a489
    • Jeromy's avatar
      f3fbedf3
    • Juan Batiz-Benet's avatar
      remove debugerrors · 140cd1fd
      Juan Batiz-Benet authored
      We now consider debugerrors harmful: we've run into cases where
      debugerror.Wrap() hid valuable error information (err == io.EOF?).
      I've removed them from the main code, but left them in some tests.
      Go errors are lacking, but unfortunately, this isn't the solution.
      
      It is possible that debugerros.New or debugerrors.Errorf should
      remain still (i.e. only remove debugerrors.Wrap) but we don't use
      these errors often enough to keep.
      140cd1fd
  10. 31 Mar, 2015 1 commit
  11. 14 Mar, 2015 1 commit
  12. 12 Mar, 2015 1 commit
  13. 09 Mar, 2015 1 commit
  14. 07 Mar, 2015 2 commits
    • anarcat's avatar
      expand the ports documentation · 5cdd8b5d
      anarcat authored
      i took @jbenet's suggestion, but reorganised it a bit to *not* suggest what is actually warned against later. :)
      5cdd8b5d
    • anarcat's avatar
      document how to change daemon ports · fb8a1ab1
      anarcat authored
      this more clearly explains that the daemon is listening on the network. it also hints as to how to change the listening ports. this is also related to #874
      fb8a1ab1
  15. 04 Mar, 2015 2 commits
  16. 20 Feb, 2015 1 commit
  17. 15 Feb, 2015 3 commits
  18. 11 Feb, 2015 1 commit
  19. 08 Feb, 2015 1 commit
    • Kevin Wallace's avatar
      gateway: attempt to resolve hostname to ipfs path · 084cdc3e
      Kevin Wallace authored
      This allows someone to host a static site by pointing a TXT record at their
      content in IPFS, and a CNAME record at an IPFS gateway.
      
      Note that such a setup technically violates RFC1912 (section 2.4; "A CNAME
      record is not allowed to coexist with any other data."), but tends to work in
      practice.
      
      We may want to consider changing the DNS->IPFS resolution scheme to allow this
      scenario to be RFC-compliant (e.g. store the mapping on a well-known subdomain
      to allow CNAME records on the domain itself).
      
      License: MIT
      Signed-off-by: default avatarKevin Wallace <kevin@pentabarf.net>
      084cdc3e
  20. 06 Feb, 2015 3 commits
  21. 05 Feb, 2015 1 commit
  22. 02 Feb, 2015 2 commits
  23. 01 Feb, 2015 2 commits
    • Juan Batiz-Benet's avatar
      daemon: fix output + time waiting · c3722558
      Juan Batiz-Benet authored
      c3722558
    • Juan Batiz-Benet's avatar
      test/sharness: fix errors · f1d34a2a
      Juan Batiz-Benet authored
      - core: daemon stdout print to cmd + daemon init checks
      - core: fixed bug where the gateway was printed as "API"
      - sharness/test-lib: daemon init checks
      - sharness/test-lib: portable TCP port check
      - sharness/init: fix test bits output
      - sharness: use common hashes in one place.
      - move t0100-http-gateway -> t0111-gateway-writable
      - sharness: test-lib funcs for gateway config
      - sharness/t0111-gateway-writable: use sh funcs
      - sharness/t0111-gateway-writable: fixes
        - escape all vars (always `cmd "$VAR"` never `cmd $VAR`)
        - use $FILEPATH, not $path
        - last test seems to fail
      f1d34a2a
  24. 31 Jan, 2015 2 commits