1. 20 May, 2015 7 commits
    • W. Trevor King's avatar
      core/commands/resolve: Add a -r / --recursive option · c2ff0285
      W. Trevor King authored
      For explicitly enabling recursive behaviour (it was previously always
      enabled).  That allows folks who are interested in understanding
      layered indirection to step through the chain one link at a time.
      c2ff0285
    • W. Trevor King's avatar
      namesys: Add recursive resolution · 3ead2443
      W. Trevor King authored
      This allows direct access to the earlier protocol-specific Resolve
      implementations.  The guts of each protocol-specific resolver are in
      the internal resolveOnce method, and we've added a new:
      
        ResolveN(ctx, name, depth)
      
      method to the public interface.  There's also:
      
        Resolve(ctx, name)
      
      which wraps ResolveN using DefaultDepthLimit.  The extra API endpoint
      is intended to reduce the likelyhood of clients accidentally calling
      the more dangerous ResolveN with a nonsensically high or infinite
      depth.  On IRC on 2015-05-17, Juan said:
      
      15:34 <jbenet> If 90% of uses is the reduced API with no chance to
        screw it up, that's a huge win.
      15:34 <wking> Why would those 90% not just set depth=0 or depth=1,
        depending on which they need?
      15:34 <jbenet> Because people will start writing `r.Resolve(ctx, name,
        d)` where d is a variable.
      15:35 <wking> And then accidentally set that variable to some huge
        number?
      15:35 <jbenet> Grom experience, i've seen this happen _dozens_ of
        times. people screw trivial things up.
      15:35 <wking> Why won't those same people be using ResolveN?
      15:36 <jbenet> Because almost every example they see will tell them to
        use Resolve(), and they will mostly stay away from ResolveN.
      
      The per-prodocol versions also resolve recursively within their
      protocol.  For example:
      
        DNSResolver.Resolve(ctx, "ipfs.io", 0)
      
      will recursively resolve DNS links until the referenced value is no
      longer a DNS link.
      
      I also renamed the multi-protocol ipfs NameSystem (defined in
      namesys/namesys.go) to 'mpns' (for Multi-Protocol Name System),
      because I wasn't clear on whether IPNS applied to the whole system or
      just to to the DHT-based system.  The new name is unambiguously
      multi-protocol, which is good.  It would be nice to have a distinct
      name for the DHT-based link system.
      
      Now that resolver output is always prefixed with a namespace and
      unprefixed mpns resolver input is interpreted as /ipfs/,
      core/corehttp/ipns_hostname.go can dispense with it's old manual
      /ipfs/ injection.
      
      Now that the Resolver interface handles recursion, we don't need the
      resolveRecurse helper in core/pathresolver.go.  The pathresolver
      cleanup also called for an adjustment to FromSegments to more easily
      get slash-prefixed paths.
      
      Now that recursive resolution with the namesys/namesys.go composite
      resolver always gets you to an /ipfs/... path, there's no need for the
      /ipns/ special case in fuse/ipns/ipns_unix.go.
      
      Now that DNS links can be things other than /ipfs/ or DHT-link
      references (e.g. they could be /ipns/<domain-name> references) I've
      also loosened the ParsePath logic to only attempt multihash validation
      on IPFS paths.  It checks to ensure that other paths have a
      known-protocol prefix, but otherwise leaves them alone.
      
      I also changed some key-stringification from .Pretty() to .String()
      following the potential deprecation mentioned in util/key.go.
      3ead2443
    • W. Trevor King's avatar
      namesys/dns: Use SplitN to find dnslink references · 04a96983
      W. Trevor King authored
      RFC 6763 requires printable ASCII except '=' for the key [1], but
      allows any character including '=' in the value [2].  This patch
      adjusts our parsing to avoid splitting on '=' in the value, and then
      ignoring anything after that split.
      
      [1]: https://tools.ietf.org/html/rfc6763#section-6.4
      [2]: https://tools.ietf.org/html/rfc6763#section-6.5
      04a96983
    • W. Trevor King's avatar
      namesys/interface: Expand package docs to discuss mutable names · 03260a92
      W. Trevor King authored
      What they are, why you'd use them, and which command-line tools you
      can use to access this functionality.
      03260a92
    • W. Trevor King's avatar
      namesys/publisher: Drop the 'namesys: ' prefix for the Publish log · 02cb5f3b
      W. Trevor King authored
      This is already handled by setup in namesys/routing.go:
      
        var log = u.Logger("namesys")
      02cb5f3b
    • Juan Batiz-Benet's avatar
      Merge pull request #1250 from ipfs/test-cat-with-stdin · 71575746
      Juan Batiz-Benet authored
      t0040: add tests for ipfs cat with stdin
      71575746
    • Juan Batiz-Benet's avatar
      Merge pull request #1251 from ipfs/travis-split-go-sharness · dcd34c6b
      Juan Batiz-Benet authored
      .travis: split go and sharness tests
      dcd34c6b
  2. 19 May, 2015 6 commits
  3. 18 May, 2015 7 commits
  4. 17 May, 2015 7 commits
  5. 15 May, 2015 1 commit
  6. 14 May, 2015 1 commit
  7. 13 May, 2015 2 commits
  8. 12 May, 2015 6 commits
    • Tim Groeneveld's avatar
    • Juan Batiz-Benet's avatar
      Merge pull request #1215 from eris-ltd/cors · ad9d84d5
      Juan Batiz-Benet authored
      Add CORS middleware handler to the API.
      ad9d84d5
    • Juan Batiz-Benet's avatar
      Merge pull request #1227 from ipfs/parallelize-handshake · 414ab636
      Juan Batiz-Benet authored
      net/p2p + secio: parallelize crypto handshake
      414ab636
    • Juan Batiz-Benet's avatar
      travis-ci: make test_all_commits · 482a492a
      Juan Batiz-Benet authored
      After losing jenkins, it's been difficult to test all commits
      manually. This commit adds a Makefile target that makes travis do it.
      Unfortunately, this is way too slow. It takes longer than the
      allotted 10min.
      
      After asking the travis people what to do, someone suggested making
      sure that each commit is pushed to github independently. This makes
      travis run CI on every single commit in the PR, and gives us nice
      status indicators on each one (so we know which ones did not pass).
      
      This approach means that we need to push a branch to the repo for
      each commit in the PR-- otherwise travis may cancel its run if it
      detects that the branch is no longer there. We could automate this
      with a bot that essentially does:
      
        for each PR:
          git fetch the PR branch
          push a branch per commit: <branch>-<commit>
      
        for each closed PR:
          delete all branches with pattern <branch>-<commit>
      482a492a
    • Juan Batiz-Benet's avatar
      Merge pull request #1221 from ipfs/unrestricted-api-access · 0c8a0975
      Juan Batiz-Benet authored
      Add option to allow unrestricted API access
      0c8a0975
    • Juan Batiz-Benet's avatar
      net/p2p + secio: parallelize crypto handshake · b84fa2b4
      Juan Batiz-Benet authored
      We had a very nasty problem: handshakes were serial so incoming
      dials would wait for each other to finish handshaking. this was
      particularly problematic when handshakes hung-- nodes would not
      recover quickly. This led to gateways not bootstrapping peers
      fast enough.
      
      The approach taken here is to do what crypto/tls does:
      defer the handshake until Read/Write[1]. There are a number of
      reasons why this is _the right thing to do_:
      - it delays handshaking until it is known to be necessary (doing io)
      - it "accepts" before the handshake, getting the handshake out of the
        critical path entirely.
      - it defers to the user's parallelization of conn handling. users
        must implement this in some way already so use that, instead of
        picking constants surely to be wrong (how many handshakes to run
        in parallel?)
      
      [0] http://golang.org/src/crypto/tls/conn.go#L886
      b84fa2b4
  9. 11 May, 2015 1 commit
  10. 10 May, 2015 2 commits