John Smith
6bb35dd6a6
skip publishing relay for fullconenat
2023-08-24 18:35:37 -04:00
John Smith
945215aba1
speed up public address detection
2023-08-24 18:35:37 -04:00
John Smith
4eca53fd9b
direct port forward detection
2023-08-24 18:35:37 -04:00
Christien Rioux
654b5dfebc
simplify code
2023-08-24 18:35:37 -04:00
Christien Rioux
34c686c227
xfer
2023-08-24 18:35:37 -04:00
Christien Rioux
030a0073da
fix public address check
2023-08-24 18:35:37 -04:00
Pedro Nunes
aa824c176f
Merge branch veilid:main into fix-lockapi-dependency
2023-08-23 15:52:56 +00:00
solace-10
59f4899bca
Added exact lock_api dependency.
2023-08-23 16:46:14 +01:00
Christien Rioux
1315766fa9
eliminate network keying from bootstrap name
2023-08-22 15:11:45 -04:00
Christien Rioux
e504da2564
xfer
2023-08-22 15:11:45 -04:00
Christien Rioux
0249b7c7ae
dial info failure reprioritization
2023-08-22 15:11:45 -04:00
Christien Rioux
10ec693fb4
Merge branch 'fix/value-data-api-crash' into 'main'
...
fix: large value_data length in api crashes server
See merge request veilid/veilid!139
2023-08-22 19:00:50 +00:00
Cheradenine Zakalwe
0ce19d85fa
fix: large value_data length in api crashes server
2023-08-22 19:00:49 +00:00
Christien Rioux
eb4f29900d
Merge branch 'mr-test' into 'main'
...
Fix a couple of minor speedup issues
See merge request veilid/veilid!142
2023-08-22 18:58:30 +00:00
a1ecbr0wn
3f9f31a0a2
Fix a couple of minor speedup issues
2023-08-22 13:00:53 +01:00
pbarry25
0b018edfe5
Fix minor typos
2023-08-21 20:12:20 -05:00
TC Johnson
513116e672
Version update: v0.1.9 → v0.1.10
2023-08-20 11:37:18 -05:00
John Smith
f43462da8c
add more changelog and clean up test output
2023-08-20 12:10:54 -04:00
John Smith
2d454c2654
fix comment
2023-08-20 11:52:54 -04:00
John Smith
c1cbcbe7c1
switch back to Sha512 for ed25519 compliance. add domain separation for signing and crypt
2023-08-20 11:47:29 -04:00
John Smith
d0fabbe3d9
Merge branch 'main' of gitlab.com:veilid/veilid into windows-fix
2023-08-20 11:25:39 -04:00
John Smith
1a3c87f9f1
fix nul termination
2023-08-20 11:23:17 -04:00
John Smith
964741463e
vld0 work
2023-08-20 10:54:26 -04:00
John Smith
a7860d829e
dh fix
2023-08-20 01:37:49 -04:00
John Smith
909a2f5362
windows fixess
2023-08-19 21:21:58 -04:00
Imuli
8f18569e30
use strict verification for ed25519
...
This enables all the signature malleability checks (including one that
is not RFC8032 compliant but are still likely important for Veilid.)
For details on the additional check, see
https://docs.rs/ed25519-dalek/2.0.0/ed25519_dalek/struct.VerifyingKey.html#method.verify_strict
2023-08-19 23:35:34 +00:00
TC Johnson
dfeecdde0d
Version update: v0.1.8 → v0.1.9
2023-08-19 17:35:52 -05:00
John Smith
a9c13d45fd
add changelog and missing file
2023-08-19 18:24:25 -04:00
John Smith
eae839e484
decompression fix for OOM
2023-08-19 18:13:30 -04:00
John Smith
89b357350d
upgrade dependencies and fix cargo locks
2023-08-19 15:16:51 -04:00
TC Johnson
04c26e48f0
'Version update: 0.1.7 → 0.1.8'
2023-08-18 20:27:01 -05:00
Christien Rioux
2c779b2257
fanout debugging
2023-08-18 00:06:21 -04:00
Christien Rioux
b2503ae789
offline work
2023-08-18 00:06:21 -04:00
Christien Rioux
435469ce94
offline subkey writes
2023-08-18 00:06:21 -04:00
Christien Rioux
8e1ed1e3f1
fix crash
2023-08-18 00:06:21 -04:00
Christien Rioux
ef327fb963
crash fix
2023-08-18 00:06:21 -04:00
Christien Rioux
559ac5f162
fix server port allocation
2023-08-18 00:06:21 -04:00
Christien Rioux
79bf6fca69
fix bug
2023-08-18 00:06:21 -04:00
Christien Rioux
01aa411498
punishments
2023-08-18 00:06:21 -04:00
John Smith
8a287d13ef
0.1.7
2023-07-30 19:33:58 -04:00
Christien Rioux
ffdd885aa4
test
2023-07-30 17:20:36 -04:00
John Smith
422a645708
python and api fixes
2023-07-30 16:45:20 -04:00
John Smith
9551ecd9a3
fix compilation error
2023-07-30 16:25:17 -04:00
John Smith
079211890b
fix lru bug in connection table
2023-07-30 16:15:57 -04:00
Christien Rioux
91fab6ce5a
Merge branch 'veilidchat-work' into 'main'
2023-07-25 17:22:44 +00:00
Teknique
7fa1df0474
Check b.len() < Self::FIXED_SIZE, not b.len() < 4
...
The original thinking was that if len(b) < FIXED_SIZE, then that would
be picked up later by the "invalid member length" check. In that case,
this only really *needs* to make sure that the check after this for
"wrong fourcc" wouldn't fail. But if len(b) < FIXED_SIZE, it really is
an invalid size, and should get that error message before even starting
to validate its other qualities.
2023-07-25 08:39:15 -07:00
Christien Rioux
00aad2c728
bugfixes
2023-07-25 01:04:22 -04:00
Teknique
f8bb97b39c
Fix(?) size check in try_from for DHTSchemaSMPL
2023-07-24 21:43:14 -07:00
Christien Rioux
a6666d3a6c
addresses
2023-07-23 23:13:42 -04:00
Christien Rioux
b993063aba
network and ios fixes
2023-07-23 21:49:10 -04:00