Skip to content

Latest commit

 

History

History
540 lines (513 loc) · 46.3 KB

v0.7.md

File metadata and controls

540 lines (513 loc) · 46.3 KB

go-ipfs changelog v0.7

v0.7.0 2020-09-22

Highlights

Secio is now disabled by default

As part of deprecating and removing support for the Secio security transport, we have disabled it by default. TLS1.3 will remain the default security transport with fallback to Noise. You can read more about the deprecation in the blog post, https://blog.ipfs.io/2020-08-07-deprecating-secio/. If you're running IPFS older than 0.5, this may start to impact your performance on the public network.

Ed25519 keys are now used by default

Previously go-ipfs generated 2048 bit RSA keys for new nodes, but it will now use ed25519 keys by default. This will not affect any existing keys, but newly created keys will be ed25519 by default. The main benefit of using ed25519 keys over RSA is that ed25519 keys have an inline public key. This means that someone only needs your PeerId to verify things you've signed, which means we don't have to worry about storing those bulky RSA public keys.

Rotating keys

Along with switching the default, we've added support for rotating keys. If you would like to change the key type of your IPFS node, you can now do so with the rotate command. NOTE: This will affect your Peer Id, so be sure you want to do this! Your existing identity key will be backed up in the Keystore.

ipfs key rotate -o my-old-key -t ed25519

Key export/import

We've added commands to allow you to export and import keys from the IPFS Keystore to a local .key file. This does not apply to the IPFS identity key, self.

ipfs key gen mykey
ipfs key export -o mykey.key mykey # ./<name>.key is the default path
ipfs key import mykey mykey.key # on another node

IPNS paths now encode the key name as a base36 CIDv1 by default

Previously go-ipfs encoded the key names for IPNS paths as base58btc multihashes (e.g. Qmabc...). We now encode them as base36 encoded CIDv1s as defined in the peerID spec (e.g. k51xyz...) which also deals with encoding of public keys. This is nice because it means that IPNS keys will by default be case-insensitive and that they will fit into DNS labels (e.g. k51xyz...ipns.localhost) and therefore that subdomain gateway redirections (e.g. from localhost:8080/ipns/{key} to {key}.ipns.localhost) will look better to users in the default case.

Many commands will accept a --ipns-base option that allows changing command outputs to use a particular encoding (i.e. base58btc multihash, or CIDv1 encoded in any supported base)

Multiaddresses now accept PeerIDs encoded as CIDv1

In preparation for eventually changing the default PeerID representation multiaddresses can now contain strings like /p2p/k51xyz... in addition to the default /p2p/Qmabc.... There is a corresponding --peerid-base option to many functions that output peerIDs.

dag stat

Initial support has been added for the ipfs dag stat command. Running this command will traverse the DAG for the given root CID and report statistics. By default, progress will be shown as the DAG is traversed. Supported statistics currently include DAG size and number of blocks.

ipfs dag stat bafybeihpetclqvwb4qnmumvcn7nh4pxrtugrlpw4jgjpqicdxsv7opdm6e # the IPFS webui
Size: 30362191, NumBlocks: 346

Plugin build changes

We have changed the build flags used by the official binary distributions on dist.ipfs.tech (or /ipns/dist.ipfs.tech) to use the simpler and more reliable -trimpath flag instead of the more complicated and brittle -asmflags=all=-trimpath="$(GOPATH)" -gcflags=all=-trimpath="$(GOPATH)" flags, however the build flags used by default in go-ipfs remain the same.

The scripts in https://github.com/ipfs/go-ipfs-example-plugin have been updated to reflect this change. This is a breaking change to how people have been building plugins against the dist.ipfs.tech binary of go-ipfs and plugins should update their build processes accordingly see ipfs/go-ipfs-example-plugin#9 for details.

Changelog

Contributors

Contributor Commits Lines ± Files Changed
Marten Seemann 156 +16428/-42621 979
hannahhoward 42 +15132/-9819 467
Eric Myhre 114 +13709/-6898 586
Steven Allen 55 +1211/-2714 95
Adin Schmahmann 54 +1660/-783 117
Petar Maymounkov 23 +1677/-671 75
Aarsh Shah 10 +1926/-341 39
Raúl Kripalani 17 +1134/-537 53
Will 1 +841/-0 9
rendaw 3 +425/-195 12
Will Scott 8 +302/-229 15
vyzo 22 +345/-166 23
Fazlul Shahriar 7 +452/-44 19
Peter Rabbitson 1 +353/-118 5
Hector Sanjuan 10 +451/-3 14
Marcin Rataj 9 +298/-106 16
Łukasz Magiera 4 +329/-51 12
RubenKelevra 9 +331/-7 12
Michael Muré 2 +259/-69 6
jstordeur 1 +252/-2 5
Diederik Loerakker 1 +168/-35 7
Tiger 3 +138/-52 8
Kevin Neaton 3 +103/-21 9
Rod Vagg 1 +50/-40 4
Oli Evans 4 +60/-9 6
achingbrain 4 +30/-30 5
Cyril Fougeray 2 +34/-24 2
Luke Tucker 1 +31/-1 2
sandman 2 +23/-7 3
Alan Shaw 1 +18/-9 2
Jacob Heun 4 +13/-3 4
Jessica Schilling 3 +7/-7 3
Rafael Ramalho 4 +9/-4 4
Jeromy Johnson 2 +6/-6 4
Nick Cabatoff 1 +7/-2 1
Stephen Solka 1 +1/-7 1
Preston Van Loon 2 +6/-2 2
Jakub Sztandera 2 +5/-2 2
llx 1 +3/-3 1
Adrian Lanzafame 1 +3/-3 1
Yusef Napora 1 +3/-2 1
Louis Thibault 1 +5/-0 1
Martín Triay 1 +4/-0 1
Hlib 1 +2/-2 1
Shotaro Yamada 1 +2/-1 1
phuslu 1 +1/-1 1
Zero King 1 +1/-1 1
Rüdiger Klaehn 1 +2/-0 1
Nex 1 +1/-1 1
Mark Gaiser 1 +1/-1 1
Luflosi 1 +1/-1 1
David Florness 1 +1/-1 1
Dean Eigenmann 1 +0/-1 1