Commit Graph

103 Commits

Author SHA1 Message Date
Steven Allen
6258374211 doc(config): address nits 2021-05-17 08:25:47 -07:00
@RubenKelevra
253f99f061 config.md: fix typos/improve wording 2021-05-17 08:25:46 -07:00
Andrew Gillis
c54cdaa1f8
Feat/migration ipfs download (#8064)
* Enable downloading migrations over IPFS

There are now options in the config file that control how migrations are downloaded. This includes enabling downloading migrations using IPFS by (when migrations are required) spinning up a temporary node for fetching the migrations before running them. There is also a config option to decide what to do with the migrations binaries once they are downloaded (e.g. cache or pin them in your node, or just throw out the data).

Co-authored-by: Steven Allen <steven@stebalien.com>
2021-05-12 09:33:14 -07:00
Marcin Rataj
35fe392491 docs: clarify DNS.Resolvers
- document implicit defaults for eth and crypto TLDs
- be very honest and link to ToS of cloudflare-eth.com
- provide suggestion that one should run own resolver if they really care about decentralization
2021-05-10 21:04:57 -07:00
vyzo
9866c13bda use {} as default for DNS.Resolvers in config 2021-05-10 21:04:57 -07:00
Marcin Rataj
0a4defe87b docs: fix formatting and add links to DNS section 2021-05-10 21:04:57 -07:00
vyzo
5a1593e87c update config documentation 2021-05-10 21:04:57 -07:00
David Pflug
d6322f485a
Fix transposed words in docs/config.md 2021-04-05 18:01:15 -04:00
Steven Allen
4cdb67f37d
Merge pull request #7890 from ipfs/fix/remove-clear-site-data
fix(gw): remove use of Clear-Site-Data in subdomain router
2021-03-31 16:24:24 -07:00
Marcin Rataj
2f105f79b9
chore: deprecate Gateway.PathPrefixes
Context:
https://github.com/ipfs/go-ipfs/issues/7702#issuecomment-803136077
2021-03-30 21:17:41 +02:00
Steven Allen
ccc2d23730 feat: remove secio support
We've had a reliable and enabled by default TLS implementation since
0.4.23 (over a year ago) and turned off SECIO in September of last year.
We might as well remove support entirely in the next release and
encourage users to upgrade their networks.

Noise is faster, anyways.
2021-02-25 13:36:40 -08:00
Marcin Rataj
cb7b147e5a
docs: tips on debugging Policies.MFS (#7929)
* docs: tips on debugging Policies.MFS

Co-authored-by: Adin Schmahmann <adin.schmahmann@gmail.com>
2021-02-23 11:08:49 -05:00
Marcin Rataj
ced3580581
docs: fix DNSLink gw recipe
Unfortunate typo due to additional negation.
2021-02-20 11:46:08 +01:00
Marcin Rataj
04838257f8 docs: RepinInterval 2021-02-18 16:01:25 -05:00
Marcin Rataj
aaa64baaed style: docs/config.md
Co-authored-by: Jessica Schilling <jessica@protocol.ai>
2021-02-18 16:01:25 -05:00
Marcin Rataj
af96ded973 style: improved MFS PinName example
Co-authored-by: Adin Schmahmann <adin.schmahmann@gmail.com>
2021-02-18 16:01:25 -05:00
Marcin Rataj
c338ed83c7 docs: Pinning.RemoteServices.Policies 2021-02-18 16:01:25 -05:00
Marcin Rataj
d61ae2bcb4
fix: remove use of Clear-Site-Data
We used Clear-Site-Data to cushion transition period for local gateway
exposed at http://localhost while we were still figuring out
security-related details.

In the final implementation subdomain gateways are not tied to a
hostname explicitly, which removes the risk of cookies leaking,
removing the need for the header.

Turns out it causes issues for Firefox users, so let's just remove it.

Closes https://github.com/ipfs-shipyard/ipfs-companion/issues/977
2021-01-29 22:08:16 +01:00
Marcin Rataj
09178aa717
feat(gw): support inlined DNSLink names with TLS
Problem statement and rationale for doing this can be found under
"Option C" at: https://github.com/ipfs/in-web-browsers/issues/169

TLDR is:

`https://dweb.link/ipns/my.v-long.example.com` can be loaded from a
subdomain gateway with a wildcard TLS cert if represented as a single
DNS label: `https://my-v--long-example-com.ipns.dweb.link`
2021-01-01 21:39:42 +01:00
Petar Maymounkov
a8c7980721
add remote pinning to ipfs command (#7661)
Added support for remote pinning services

A pinning service is a service that accepts CIDs from a user in order to host the data associated with them.
The spec for these services is defined at https://github.com/ipfs/pinning-services-api-spec

Support is available via the `ipfs pin remote` CLI and the corresponding HTTP API

Co-authored-by: Petar Maymounkov <petarm@gmail.com>
Co-authored-by: Marcin Rataj <lidel@lidel.org>
Co-authored-by: Adin Schmahmann <adin.schmahmann@gmail.com>
2020-12-08 20:32:33 -05:00
Jorropo
c2b4a83731
docs: Add a link in config.md 2020-11-19 01:30:51 +01:00
Marcin Rataj
76892f5c2f
docs(config): X-Forwarded-Host
This fixes a bug and documents X-Forwarded-Host

License: MIT
Signed-off-by: Marcin Rataj <lidel@lidel.org>
2020-09-11 20:00:25 +02:00
Adin Schmahmann
0ad6a92716 docs: update config to indicate SECIO deprecation 2020-08-26 20:51:53 -04:00
Marcin Rataj
135b90e087 docs(config): fix Peering header
Peering is top level namespace
2020-08-25 10:39:32 -04:00
Adin Schmahmann
0c57e9dcf8
Merge pull request #7319 from MichaelMure/wildcard-gateways
feat: wildcard support for public gateways
2020-08-19 11:02:28 -04:00
Luflosi
0155a88e5f
docs: fix typo 2020-08-08 23:12:49 +02:00
Michael Muré
13e6bcfb4f
feat: wildcard support for public gateways
Add support for one or more wildcards in the hostname definition
of a public gateway. This is useful for example to support easily
multiples environment.

Wildcarded hostname are set in the config as for example "*.domain.tld".
2020-07-24 20:51:22 +02:00
Marcin Rataj
0acfb38763 chore: fix a typo 2020-07-10 14:13:11 -04:00
Marcin Rataj
580d68685c docs: document X-Forwarded-Host 2020-07-10 14:13:11 -04:00
Adin Schmahmann
19d6230cde Merge branch 'release' into master 2020-06-19 20:04:30 -04:00
Steven Allen
0cef475b2d docs(config): update toc 2020-06-16 22:04:24 -07:00
Steven Allen
c0951e73d7 doc(config): expand on config value limits 2020-06-16 15:15:51 -07:00
Steven Allen
e164af1f2a feat: add a transport config section
This way, users can disable transports (especially QUIC), and set muxer/security
transport priorities.
2020-06-16 15:15:47 -07:00
Steven Allen
ea55e747f2 doc(config): expand peering docs 2020-06-11 17:58:51 -07:00
Jessica Schilling
c86244ecf5
Update docs/config.md 2020-05-28 11:15:09 -06:00
Jessica Schilling
766023311a
Update docs-beta links to final URLs 2020-05-28 11:14:00 -06:00
Steven Allen
7990d2ccb5 doc: expand on peering service documentation
* Explain _why_ it exists.
* Explain how it can be used.
2020-05-25 20:24:43 -07:00
Steven Allen
978091a626 feat: implement peering service
MVP for #6097

This feature will repeatedly reconnect (with a randomized exponential backoff)
to peers in a set of "peered" peers.

In the future, this should be extended to:

1. Include a CLI for modifying this list at runtime.
2. Include additional options for peers we want to _protect_ but not connect to.
3. Allow configuring timeouts, backoff, etc.
4. Allow groups? Possibly through textile threads.
5. Allow for runtime-only peering rules.
6. Different reconnect policies.

But this MVP should be a significant step forward.
2020-05-25 20:24:41 -07:00
@RubenKelevra
2dc1f691f1 quic: remove experimental status and add it to the default config 2020-05-22 04:54:19 +02:00
Adin Schmahmann
a0e01501e7 docs: cleanup config formatting 2020-05-20 13:48:26 -04:00
Steven Allen
b29f9e9959 doc(config): document pubsub 2020-05-19 19:24:27 -07:00
Steven Allen
6719e124bb doc(config): sort sections 2020-05-19 19:13:50 -07:00
Marcin Rataj
10aaf24304
chore: update X-Forwarded-Proto copy text
Co-authored-by: Steven Allen <steven@stebalien.com>
2020-05-13 15:07:59 +02:00
Marcin Rataj
c5b30545bf
docs: X-Forwarded-Proto: https
Additional documentation for running subdomain gateway behind reverse proxy with TLS.
2020-05-12 13:00:25 +02:00
Corbin Page
19426b9ca2
Update config.md 2020-05-02 17:23:56 -04:00
Steven Allen
6d7d3ef30e doc: expand on relay documentation 2020-04-27 16:00:48 -07:00
Steven Allen
4ebe7e633d doc: fixup config docs
1. Update go-ipfs-config to fix default datastore.
2. Update TOC.
3. Update profiles list and indicate that badger isn't experimental.
2020-04-27 15:12:04 -07:00
Dimitris Apostolou
1e437c7e97
Fix typos and cleanup 2020-04-20 22:00:01 +03:00
Steven Allen
1f23fc000c feat: add autonat config options
1. Enable AutoNATService on _all_ nodes by default. If it's an issue, we can
disable it in RC3 but this will give us the best testing results.
2. Expose options to configure AutoNAT rate limiting.
2020-04-14 20:54:58 -07:00
Steven Allen
3e6f0a7942 doc: cleanup experimental features a bit 2020-04-06 18:53:16 -07:00