Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release v0.13.0 #9023

Merged
merged 501 commits into from Jun 9, 2022
Merged

Release v0.13.0 #9023

merged 501 commits into from Jun 9, 2022

Conversation

guseggert
Copy link
Contributor

No description provided.

Stebalien and others added 30 commits May 19, 2020 19:05
It's still possible to disable signing. However, it's no longer possible to
enable signing _and_ disable strict signature verification.
…igning-option

feat: remove strict signing pubsub option.
…_quic_listening

default config: add QUIC listening ports + quic to mars.i.ipfs.io
…move_config_option

QUIC: remove experimental config option
Co-authored-by: Will <will.scott@protocol.ai>
We should have a more permanent way to configure security transports, but
experimental flags are a quick and unstable way to do this without making any
promises.
…xperiments

feat: add an option for security transport experiments
There's no reason to give the group access to these files by default.
These let us zero-encode "default" to "null" (and omit it with "omitempty") so
we don't have to hard code the default in the config.
This was never included in a release, and has been replaced by a flexible
transport prioritization system.
This makes it easier to resolve these fields.
Co-authored-by: Adin Schmahmann <adin.schmahmann@gmail.com>
Co-authored-by: Adin Schmahmann <adin.schmahmann@gmail.com>
feat: add a transports section for enabling/disabling transports
galargh and others added 18 commits June 8, 2022 14:24
(cherry picked from commit 4798777)
fix(node/libp2p): disable rcmgr checkImplicitDefaults

(cherry picked from commit e23a461)
It works only on some platforms, and does not work reliably.
This corrects our error of not setting expectations right.

(cherry picked from commit 53299e8)
Fixes #8957

The context was only checked while reading data.
Not while writing data to the http connection.
So since the data flow through an io.Pipe the closing didn't flowed through and left the writer open hanging.

Co-authored-by: Antonio Navarro Perez <antnavper@gmail.com>
(cherry picked from commit 7892cc9)
(cherry picked from commit a72753b)
This fix safelists additional headers allowing JS running on websites to
read them when IPFS resource is downloaded via Fetch API.

These headers provide metadata necessary for making smart caching
decisions when IPFS resources are downloaded via Service Worker or a
similar middleware on the edge.

(cherry picked from commit 650bc24)
This periodically logs how many times Resource Manager limits were
exceeded. If they aren't exceeded, then nothing is logged. The log
levels are at ERROR log level so that they are shown by default.

The motivation is so that users know when they have exceeded resource
manager limits. To find what is exceeding the limits, they'll need to
turn on debug logging and inspect the errors being logged. This could
collect the specific limits being reached, but that's more complicated
to implement and could result in much longer log messages.

(cherry picked from commit 5615715)
* Do not connect to external nodes on ipfs as a lib example.

It was causing some build timeouts error because CircleCI
was throttling WAN connections.

It closes #8956

* style: rename node vars

since this is example, this should make things easier to follow

Co-authored-by: Marcin Rataj <lidel@lidel.org>
(cherry picked from commit e8f1ce0)
* fix: adjust rcmgr limits for accelerated DHT client rt refresh

The Accelerated DHT client periodically refreshes its routing table,
including at startup, and if Resource Manager throttling causes the
client's routing table to be incomplete, then content routing may be
degraded or broken for users.

This adjusts the default limits to a level that empirically doesn't
cause Resource Manager throttling during initial DHT client
bootstrapping. Ideally the Accelerated DHT client would handle this
scenario more gracefully, but this works for now to unblock the 0.13
release.

* Set default outbound conns unconditionally

This also sets the default overall conns as a function of the outbound
and inbound conns, since they are adjusted dynamically, and it makes
the intention of the value clear.

* increase min FD limit

(cherry picked from commit b8617b9)
* feat: disable resource manager by default

We are disabling this by default for v0.13 as we work to improve the
UX around Resource Manager. It is still usable and can be enabled in
the IPFS config with "ipfs config --bool Swarm.ResourceMgr.Enabled true".

We intend to enable Resource Manager by default in a subsequent
release.

* docs(config): Swarm.ResourceMgr disabled by default

Co-authored-by: Marcin Rataj <lidel@lidel.org>
(cherry picked from commit b1c051d)
* feat: upgrade to go-libp2p-kad-dht@v0.16.0

* rename "cid format --codec" to "cid format --mc"

* refactor(test): from --codec to --mc

Co-authored-by: Marcin Rataj <lidel@lidel.org>
(cherry picked from commit 8d7ed00)
(cherry picked from commit 2e170a4)
(cherry picked from commit 9db6641)
@guseggert guseggert mentioned this pull request Jun 8, 2022
@aschmahmann
Copy link
Contributor

aschmahmann commented Jun 8, 2022

@guseggert this looks right, but why can't this branch be rebased? We should be merging here anyway, but this seems a bit off. Is it a version.go thing or something else?

@guseggert
Copy link
Contributor Author

guseggert commented Jun 8, 2022

@aschmahmann IIUC, it can't be rebased because the commits can't be applied individually without a conflict, probably due to all those old commits from go-ipfs-config

@guseggert
Copy link
Contributor Author

Could also be from the sheer size of this, e.g. https://github.community/t/weird-problem-with-cannot-be-rebased-due-to-conflicts/178433/4

@aschmahmann
Copy link
Contributor

aschmahmann commented Jun 8, 2022

This is just a Git defaults (or GitHub depending on how you look at it) thing. Basically git rebase drops all merge commits even if there is stuff in the merge commit (which happens for version.go when we merge release back into master). If you locally try rebasing with --rebase-merges it'll work though. So nothing to see here.

In any event using merge commits into release is the right thing to do. It means every commit back in the release branch is another release which seems exactly as it should be (e.g. try git log HEAD~X -n 1 for various X and you get our release history).

@guseggert merge and continue the release dance (signing the tag in release, merging back into master, etc.) tomorrow 🙏.

@gus
Copy link

gus commented Jun 9, 2022 via email

@guseggert guseggert merged commit c9d51bb into release Jun 9, 2022
hacdias pushed a commit to ipfs/boxo that referenced this pull request Jan 27, 2023
gammazero pushed a commit to ipfs/boxo that referenced this pull request Sep 28, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet