1. 10 Jul, 2015 1 commit
  2. 01 Jun, 2015 1 commit
  3. 20 May, 2015 7 commits
    • W. Trevor King's avatar
      namesys/namesys_test: Excercise mpns.ResolveN · ce015d24
      W. Trevor King authored
      Shifting the generic testResolution helper from the protocol-specific
      dns_test.go to the generic namesys_test.go.
      ce015d24
    • W. Trevor King's avatar
    • W. Trevor King's avatar
      namesys/dns: Pluggable lookupTXT field · 1e6594d0
      W. Trevor King authored
      So we can attach a mock lookup function for testing.
      1e6594d0
    • W. Trevor King's avatar
      namesys: Add recursive resolution · 3ead2443
      W. Trevor King authored
      This allows direct access to the earlier protocol-specific Resolve
      implementations.  The guts of each protocol-specific resolver are in
      the internal resolveOnce method, and we've added a new:
      
        ResolveN(ctx, name, depth)
      
      method to the public interface.  There's also:
      
        Resolve(ctx, name)
      
      which wraps ResolveN using DefaultDepthLimit.  The extra API endpoint
      is intended to reduce the likelyhood of clients accidentally calling
      the more dangerous ResolveN with a nonsensically high or infinite
      depth.  On IRC on 2015-05-17, Juan said:
      
      15:34 <jbenet> If 90% of uses is the reduced API with no chance to
        screw it up, that's a huge win.
      15:34 <wking> Why would those 90% not just set depth=0 or depth=1,
        depending on which they need?
      15:34 <jbenet> Because people will start writing `r.Resolve(ctx, name,
        d)` where d is a variable.
      15:35 <wking> And then accidentally set that variable to some huge
        number?
      15:35 <jbenet> Grom experience, i've seen this happen _dozens_ of
        times. people screw trivial things up.
      15:35 <wking> Why won't those same people be using ResolveN?
      15:36 <jbenet> Because almost every example they see will tell them to
        use Resolve(), and they will mostly stay away from ResolveN.
      
      The per-prodocol versions also resolve recursively within their
      protocol.  For example:
      
        DNSResolver.Resolve(ctx, "ipfs.io", 0)
      
      will recursively resolve DNS links until the referenced value is no
      longer a DNS link.
      
      I also renamed the multi-protocol ipfs NameSystem (defined in
      namesys/namesys.go) to 'mpns' (for Multi-Protocol Name System),
      because I wasn't clear on whether IPNS applied to the whole system or
      just to to the DHT-based system.  The new name is unambiguously
      multi-protocol, which is good.  It would be nice to have a distinct
      name for the DHT-based link system.
      
      Now that resolver output is always prefixed with a namespace and
      unprefixed mpns resolver input is interpreted as /ipfs/,
      core/corehttp/ipns_hostname.go can dispense with it's old manual
      /ipfs/ injection.
      
      Now that the Resolver interface handles recursion, we don't need the
      resolveRecurse helper in core/pathresolver.go.  The pathresolver
      cleanup also called for an adjustment to FromSegments to more easily
      get slash-prefixed paths.
      
      Now that recursive resolution with the namesys/namesys.go composite
      resolver always gets you to an /ipfs/... path, there's no need for the
      /ipns/ special case in fuse/ipns/ipns_unix.go.
      
      Now that DNS links can be things other than /ipfs/ or DHT-link
      references (e.g. they could be /ipns/<domain-name> references) I've
      also loosened the ParsePath logic to only attempt multihash validation
      on IPFS paths.  It checks to ensure that other paths have a
      known-protocol prefix, but otherwise leaves them alone.
      
      I also changed some key-stringification from .Pretty() to .String()
      following the potential deprecation mentioned in util/key.go.
      3ead2443
    • W. Trevor King's avatar
      namesys/dns: Use SplitN to find dnslink references · 04a96983
      W. Trevor King authored
      RFC 6763 requires printable ASCII except '=' for the key [1], but
      allows any character including '=' in the value [2].  This patch
      adjusts our parsing to avoid splitting on '=' in the value, and then
      ignoring anything after that split.
      
      [1]: https://tools.ietf.org/html/rfc6763#section-6.4
      [2]: https://tools.ietf.org/html/rfc6763#section-6.5
      04a96983
    • W. Trevor King's avatar
      namesys/interface: Expand package docs to discuss mutable names · 03260a92
      W. Trevor King authored
      What they are, why you'd use them, and which command-line tools you
      can use to access this functionality.
      03260a92
    • W. Trevor King's avatar
      namesys/publisher: Drop the 'namesys: ' prefix for the Publish log · 02cb5f3b
      W. Trevor King authored
      This is already handled by setup in namesys/routing.go:
      
        var log = u.Logger("namesys")
      02cb5f3b
  4. 28 Apr, 2015 1 commit
  5. 27 Apr, 2015 1 commit
  6. 20 Apr, 2015 1 commit
    • Jeromy's avatar
      fix for #1008 and other pinning fixes · 0a6b880b
      Jeromy authored
      This commit adds a new set of sharness tests for pinning, and addresses
      bugs that were pointed out by said tests.
      
      test/sharness: added more pinning tests
      
      Pinning is currently broken. See issue #1051. This commit introduces
      a few more pinning tests. These are by no means exhaustive, but
      definitely surface the present problems going on. I believe these
      tests are correct, but not sure. Pushing them as failing so that
      pinning is fixed in this PR.
      
      make pinning and merkledag.Get take contexts
      
      improve 'add' commands usage of pinning
      
      FIXUP: fix 'pin lists look good'
      
      ipfs-pin-stat simple script to help check pinning
      
      This is a simple shell script to help check pinning.
      
      We ought to strive towards making adding commands this easy.
      The http api is great and powerful, but our setup right now
      gets in the way. Perhaps we can clean up that area.
      
      updated t0081-repo-pinning
      
      - fixed a couple bugs with the tests
      - made it a bit clearer (still a lot going on)
      - the remaining tests are correct and highlight a problem with
        pinning. Namely, that recursive pinning is buggy. At least:
        towards the end of the test, $HASH_DIR4 and $HASH_FILE4 should
        be pinned indirectly, but they're not. And thus get gc-ed out.
        There may be other problems too.
      
      cc @whyrusleeping
      
      fix grep params for context deadline check
      
      fix bugs in pin and pin tests
      
      check for block local before checking recursive pin
      0a6b880b
  7. 01 Apr, 2015 2 commits
  8. 31 Mar, 2015 1 commit
  9. 18 Mar, 2015 1 commit
  10. 17 Mar, 2015 1 commit
  11. 07 Mar, 2015 1 commit
  12. 27 Feb, 2015 2 commits
  13. 25 Feb, 2015 1 commit
    • Henry's avatar
      rewrote import paths of go.net/context to use golang.org/x/context · 92d08db7
      Henry authored
      - updated go-ctxgroup and goprocess
      ctxgroup: AddChildGroup was changed to AddChild. Used in two files:
      - p2p/net/mock/mock_net.go
      - routing/dht/dht.go
      
      - updated context from hg repo to git
      prev. commit in hg was ad01a6fcc8a19d3a4478c836895ffe883bd2ceab. (context: make parentCancelCtx iterative)
      represents commit 84f8955a887232b6308d79c68b8db44f64df455c in git repo
      
      - updated context to master (b6fdb7d8a4ccefede406f8fe0f017fb58265054c)
      
      Aaron Jacobs (2):
      net/context: Don't accept a context in the DoSomethingSlow example.
      context: Be clear that users must cancel the result of WithCancel.
      
      Andrew Gerrand (1):
      go.net: use golang.org/x/... import paths
      
      Bryan C. Mills (1):
      net/context: Don't leak goroutines in Done example.
      
      Damien Neil (1):
      context: fix removal of cancelled timer contexts from parent
      
      David Symonds (2):
      context: Fix WithValue example code.
      net: add import comments.
      
      Sameer Ajmani (1):
      context: fix TestAllocs to account for ints in interfaces
      92d08db7
  14. 10 Feb, 2015 1 commit
  15. 03 Feb, 2015 1 commit
  16. 28 Jan, 2015 1 commit
  17. 05 Jan, 2015 1 commit
  18. 04 Jan, 2015 1 commit
  19. 02 Jan, 2015 3 commits
  20. 24 Dec, 2014 2 commits
  21. 23 Dec, 2014 1 commit
    • Juan Batiz-Benet's avatar
      peer change: peer.Peer -> peer.ID · c84a714b
      Juan Batiz-Benet authored
      this is a major refactor of the entire codebase
      it changes the monolithic peer.Peer into using
      a peer.ID and a peer.Peerstore.
      
      Other changes:
      - removed handshake3.
      -	testutil vastly simplified peer
      -	secio bugfix + debugging logs
      -	testutil: RandKeyPair
      -	backpressure bugfix: w.o.w.
      -	peer: added hex enc/dec
      -	peer: added a PeerInfo struct
        PeerInfo is a small struct used to pass around a peer with
       	a set of addresses and keys. This is not meant to be a
       	complete view of the system, but rather to model updates to
       	the peerstore. It is used by things like the routing system.
      -	updated peer/queue + peerset
      -	latency metrics
      -	testutil: use crand for PeerID gen
       	RandPeerID generates random "valid" peer IDs. it does not
       	NEED to generate keys because it is as if we lost the key
       	right away. fine to read some randomness and hash it. to
       	generate proper keys and an ID, use:
       	  sk, pk, _ := testutil.RandKeyPair()
       	  id, _ := peer.IDFromPublicKey(pk)
       	Also added RandPeerIDFatal helper
      - removed old spipe
      - updated seccat
      - core: cleanup initIdentity
      - removed old getFromPeerList
      c84a714b
  22. 13 Dec, 2014 1 commit
  23. 08 Dec, 2014 2 commits
  24. 04 Dec, 2014 1 commit
  25. 16 Nov, 2014 4 commits