mirror of
https://github.com/ipfs/kubo.git
synced 2026-02-22 10:57:42 +08:00
Some checks are pending
CodeQL / codeql (push) Waiting to run
Docker Build / docker-build (push) Waiting to run
Gateway Conformance / gateway-conformance (push) Waiting to run
Gateway Conformance / gateway-conformance-libp2p-experiment (push) Waiting to run
Go Build / go-build (push) Waiting to run
Go Check / go-check (push) Waiting to run
Go Lint / go-lint (push) Waiting to run
Go Test / go-test (push) Waiting to run
Interop / interop-prep (push) Waiting to run
Interop / helia-interop (push) Blocked by required conditions
Interop / ipfs-webui (push) Blocked by required conditions
Sharness / sharness-test (push) Waiting to run
* feat(libp2p): enable shared TCP listeners * docs: switch mentions of /ws to /tcp/4001 * feat: AutoTLS.AutoWSS This adds AutoTLS.AutoWSS flag that is set to true by default. It will check if Addresses.Swarm contain explicit /ws listener, and if not found, it will append one per every /tcp listener This way existing TCP ports are reused without any extra configuration, but we don't break user's who have custom / explicit /ws listener already. I also moved logger around, to include Addresses.Swarm inspection results in `autotls` logger. * chore: go-libp2p v0.38.1 https://github.com/libp2p/go-libp2p/releases/tag/v0.38.0 https://github.com/libp2p/go-libp2p/releases/tag/v0.38.1 * docs: AutoTLS.AutoWSS and go-libp2p v0.38.x * chore: p2p-forge/client v0.2.0 https://github.com/ipshipyard/p2p-forge/releases/tag/v0.2.0 * fix: disable libp2p.ShareTCPListener() in PNET * chore(ci): timeout sharness after 15m average successful run is <9 minutes, no need to wait for 20 https://github.com/ipfs/kubo/actions/workflows/sharness.yml?query=is%3Asuccess --------- Co-authored-by: Andrew Gillis <11790789+gammazero@users.noreply.github.com> Co-authored-by: Marcin Rataj <lidel@lidel.org>
88 lines
2.9 KiB
Go
88 lines
2.9 KiB
Go
package libp2p
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
|
|
"github.com/ipfs/kubo/config"
|
|
"github.com/ipshipyard/p2p-forge/client"
|
|
"github.com/libp2p/go-libp2p"
|
|
"github.com/libp2p/go-libp2p/core/metrics"
|
|
quic "github.com/libp2p/go-libp2p/p2p/transport/quic"
|
|
"github.com/libp2p/go-libp2p/p2p/transport/tcp"
|
|
webrtc "github.com/libp2p/go-libp2p/p2p/transport/webrtc"
|
|
"github.com/libp2p/go-libp2p/p2p/transport/websocket"
|
|
webtransport "github.com/libp2p/go-libp2p/p2p/transport/webtransport"
|
|
|
|
"go.uber.org/fx"
|
|
)
|
|
|
|
func Transports(tptConfig config.Transports) interface{} {
|
|
return func(params struct {
|
|
fx.In
|
|
Fprint PNetFingerprint `optional:"true"`
|
|
ForgeMgr *client.P2PForgeCertMgr `optional:"true"`
|
|
},
|
|
) (opts Libp2pOpts, err error) {
|
|
privateNetworkEnabled := params.Fprint != nil
|
|
|
|
tcpEnabled := tptConfig.Network.TCP.WithDefault(true)
|
|
wsEnabled := tptConfig.Network.Websocket.WithDefault(true)
|
|
if tcpEnabled {
|
|
// TODO(9290): Make WithMetrics configurable
|
|
opts.Opts = append(opts.Opts, libp2p.Transport(tcp.NewTCPTransport, tcp.WithMetrics()))
|
|
}
|
|
|
|
if wsEnabled {
|
|
if params.ForgeMgr == nil {
|
|
opts.Opts = append(opts.Opts, libp2p.Transport(websocket.New))
|
|
} else {
|
|
opts.Opts = append(opts.Opts, libp2p.Transport(websocket.New, websocket.WithTLSConfig(params.ForgeMgr.TLSConfig())))
|
|
}
|
|
}
|
|
|
|
if tcpEnabled && wsEnabled && os.Getenv("LIBP2P_TCP_MUX") != "false" {
|
|
if privateNetworkEnabled {
|
|
log.Error("libp2p.ShareTCPListener() is not supported in private networks, please disable Swarm.Transports.Network.Websocket or run with LIBP2P_TCP_MUX=false to make this message go away")
|
|
} else {
|
|
opts.Opts = append(opts.Opts, libp2p.ShareTCPListener())
|
|
}
|
|
}
|
|
|
|
if tptConfig.Network.QUIC.WithDefault(!privateNetworkEnabled) {
|
|
if privateNetworkEnabled {
|
|
return opts, fmt.Errorf(
|
|
"QUIC transport does not support private networks, please disable Swarm.Transports.Network.QUIC",
|
|
)
|
|
}
|
|
opts.Opts = append(opts.Opts, libp2p.Transport(quic.NewTransport))
|
|
}
|
|
|
|
if tptConfig.Network.WebTransport.WithDefault(!privateNetworkEnabled) {
|
|
if privateNetworkEnabled {
|
|
return opts, fmt.Errorf(
|
|
"WebTransport transport does not support private networks, please disable Swarm.Transports.Network.WebTransport",
|
|
)
|
|
}
|
|
opts.Opts = append(opts.Opts, libp2p.Transport(webtransport.New))
|
|
}
|
|
|
|
if tptConfig.Network.WebRTCDirect.WithDefault(!privateNetworkEnabled) {
|
|
if privateNetworkEnabled {
|
|
return opts, fmt.Errorf(
|
|
"WebRTC Direct transport does not support private networks, please disable Swarm.Transports.Network.WebRTCDirect",
|
|
)
|
|
}
|
|
opts.Opts = append(opts.Opts, libp2p.Transport(webrtc.New))
|
|
}
|
|
|
|
return opts, nil
|
|
}
|
|
}
|
|
|
|
func BandwidthCounter() (opts Libp2pOpts, reporter *metrics.BandwidthCounter) {
|
|
reporter = metrics.NewBandwidthCounter()
|
|
opts.Opts = append(opts.Opts, libp2p.BandwidthReporter(reporter))
|
|
return opts, reporter
|
|
}
|