Skip to content

Releases: libp2p/go-libp2p

v0.27.1

13 Apr 08:40
c309692
Compare
Choose a tag to compare

This patch release fixes a couple of bugs. Most importantly, go-libp2p now infers WebTransport listen addresses from the observation (via Identify) of QUIC addresses, if QUIC and WebTransport are run on the same IP and port.

What's Changed

Full Changelog: v0.27.0...v0.27.1

v0.27.0

06 Apr 08:16
0699592
Compare
Choose a tag to compare

Breaking Changes

  • The LocalPrivateKey method was removed from the network.Conn interface. #2144

🔦 Highlights

Additional metrics

Since the last release, we've added metrics for:

  • Relay Service: RequestStatus, RequestCounts, RejectionReasons for Reservation and Connection Requests,
    ConnectionDuration, BytesTransferred, Relay Service Status.
  • Autorelay: relay finder status, reservation request outcomes, current reservations, candidate circuit v2 support, current candidates, relay addresses updated, num relay address, and scheduled work times

🐞 Bugfixes

  • autonat: don't change status on dial request refused 2225
  • relaysvc: fix flaky TestReachabilityChangeEvent 2215
  • basichost: prevent duplicate dials 2196
  • websocket: don't set a WSS multiaddr for accepted unencrypted conns 2199
  • identify: Fix IdentifyWait when Connected events happen out of order 2173
  • circuitv2: cleanup relay service properly 2164

Changelog

Contributors

Contributor Commits Lines ± Files Changed
Sukun 11 +3526/-262 33
Marten Seemann 15 +615/-1396 75
galargh 2 +876/-804 6
Marco Munizaga 14 +1173/-134 44
Henrique Dias 2 +185/-40 3
Prithvi Shahi 2 +55/-14 2
gammazero 2 +31/-0 4
libp2p-mgmt-read-write[bot] 1 +26/-0 1
Piotr Galar 1 +25/-0 1
dependabot[bot] 3 +12/-9 6
Rod Vagg 5 +6/-6 5
Laurent Senta 1 +2/-2 1
Hlib Kanunnikov 1 +2/-1 1
Andrew Gillis 1 +2/-1 1
RichΛrd 1 +1/-1 1
Nikhilesh Susarla 1 +1/-1 1
Masih H. Derkani 1 +1/-1 1
Bryan White 1 +1/-1 1

Full Changelog: v0.26.4...v0.27.0

v0.26.4

24 Mar 00:03
Compare
Choose a tag to compare

This patch release fixes a busy-looping happening inside AutoRelay on private nodes, see #2208.

v0.26.3

17 Mar 01:02
a1e6aa4
Compare
Choose a tag to compare

What's Changed

Full Changelog: v0.26.0...v0.26.3

v0.26.2

01 Mar 22:52
59a14cf
Compare
Choose a tag to compare

What's Changed

Full Changelog: v0.26.0...v0.26.2

v0.26.1

01 Mar 21:09
c738a48
Compare
Choose a tag to compare

Retracted

This release included some changes not intended for a patch release. The issue came from a bug in our release automation tooling. More details here: #2153.

New release coming soon.

What's Changed

Full Changelog: v0.26.0...v0.26.1

v0.26.0

23 Feb 08:21
a415d56
Compare
Choose a tag to compare

🔦 Highlights

Circuit Relay Changes

Removed Circuit Relay v1

We've decided to remove support for Circuit Relay v1 in this release. v1 Relays have been retired a few months ago. Notably, running the Relay v1 protocol was expensive and resulted in only a small number of nodes in the network. Users had to either manually configure these nodes as static relays, or discover them from the DHT.
Furthermore, rust-libp2p has dropped support and js-libp2p is dropping support for Relay v1.

Support for Relay v2 was first added in late 2021 in v0.16.0. With Circuit Relay v2 it became cheap to run (limited) relays. Public nodes also started the relay service by default. There's now a massive number of Relay v2 nodes on the IPFS network, and they don't advertise their service to the DHT any more. Because there's now so many of these nodes, connecting to just a small number of nodes (e.g. by joining the DHT), a node is statistically guaranteed to connect to some relays.

Unlimited Relay v2

In conjunction with removing relay v1, we also added an option to Circuit Relay v2 to disable limits.
This done by enabling WithInfiniteLimits. When enabled this allows for users to have a drop in replacement for Relay v1 with Relay v2.

Additional metrics

Since the last release, we've added additional metrics to different components.
Metrics were added to:

  • AutoNat: Current Reachability Status and Confidence, Client and Server DialResponses, Server DialRejections. The dashboard is available here.
  • Swarm:
    • Early Muxer Selection: Added early_muxer label indicating whether a connection was established using early muxer selection.
    • IP Version: Added ip_version label to connection metrics
  • Identify:
    • Metrics for Identify, IdentifyPush, PushesTriggered (#2069)
    • Address Count, Protocol Count, Connection IDPush Support (#2126)

We also migrated the metric dashboards to a top-level dashboards directory.

Changelog

Contributors

Contributor Commits Lines ± Files Changed
Sukun 11 +2979/-696 76
Marten Seemann 5 +52/-3619 33
Marco Munizaga 11 +865/-520 35
Prithvi Shahi 5 +66/-21 10

Full Changelog: v0.25.1...v0.26.0

v0.25.1

10 Feb 03:08
5741b6c
Compare
Choose a tag to compare

What's Changed

Patch update to fix some test-utils used by https://github.com/libp2p/go-libp2p-kad-dht

See the release notes for v0.25.0 for more details on this release.

Full Changelog: v0.25.0...v0.25.1

v0.25.0

09 Feb 16:39
f0af39e
Compare
Choose a tag to compare

🔦 Highlights

Metrics

We've started instrumenting the entire stack. In this release, we're adding metrics for:

Our metrics effort is still ongoing, see #1356 for progress. We'll add metrics and dashboards for more libp2p components in a future release.

Switching to Google's official Protobuf compiler

So far, we were using GoGo Protobuf to compile our Protobuf definitions to Go code. However, this library was deprecated in October last year: https://twitter.com/awalterschulze/status/1584553056100057088. We benchmarked serialization and deserialization, and found that it's (only) 20% slower than GoGo. Since the vast majority of go-libp2p's CPU time is spent in code paths other than Protobuf handling, switching to the official compiler seemed like a worthwhile tradeoff.

Removal of OpenSSL

Before this release, go-libp2p had an option to use OpenSSL bindings for certain cryptographic primitives, mostly to speed up the generation of signatures and their verification. When building go-libp2p using go build, we'd use the standard library crypto packages. OpenSSL was only used when passing in a build tag: go build -tags openssl.
Maintaining our own fork of the long unmaintained go-openssl package has proven to place a larger than expected maintenance burden on the libp2p stewards, and when we recently discovered a range of new bugs (this and this and this), we decided to re-evaluate if this code path is really worth it. The results surprised us, it turns out that:

  • The Go standard library is faster than OpenSSL for all key types that are not RSA.
  • Verifying RSA signatures is as fast as Ed25519 signatures using the Go standard library, and even faster in OpenSSL.
  • Generating RSA signatures is painfully slow, both using Go standard library crypto and using OpenSSL (but even slower using Go standard library).

Now the good news is, that if your node is not using an RSA key, it will never create any RSA signatures (it might need to verify them though, when it connects to a node that uses RSA keys). If you're concerned about CPU performance, it's a good idea to avoid RSA keys (the same applies to bandwidth, RSA keys are huge!). Even for nodes using RSA keys, it turns out that generating the signatures is not a significant part of their CPU load, as verified by profiling one of Kubo's bootstrap nodes.

We therefore concluded that it's safe to drop this code path altogether, and thereby reduce our maintenance burden.

New Resource Manager types

  • Introduces a new type LimitVal which can explicitly specify "use default", "unlimited", "block all", as well as any positive number. The zero value of LimitVal (the value when you create the object in Go) is "Use default".
    • The JSON marshalling of this is straightforward.
  • Introduces a new ResourceLimits type which uses LimitVal instead of ints so it can encode the above for the resources.
  • Changes LimitConfig to PartialLimitConfig and uses ResourceLimits. This along with the marshalling changes means you can now marshal the fact that some resource limit is set to block all.
    • Because the default is to use the defaults, this avoids the footgun of initializing the resource manager with 0 limits (that would block everything).

In general, you can go from a resource config with defaults to a concrete one with .Build(). e.g. ResourceLimits.Build() => BaseLimit, PartialLimitConfig.Build() => ConcreteLimitConfig, LimitVal.Build() => int. See PR #2000 for more details.

If you're using the defaults for the resource manager, there should be no changes needed.

Resource Manager optimized metrics

We moved away from OpenCensus to the prometheus SDK. Metrics hot path now has no allocations and a test to ensure this behavior in the future. See #1955 for more details.

Websockets: change underlying library

From the unmantained https://github.com/gorilla/websocket to https://github.com/nhooyr/websocket. More details here: #1982.

Other Breaking Changes

We've cleaned up our API to consistently use protocol.ID for libp2p and application protocols. Specifically, this means that the peer store now uses protocol.IDs, and the host's SetStreamHandler as well.

What's Changed

Read more

v0.24.2

31 Dec 04:40
8231591
Compare
Choose a tag to compare

This patch release fixes two panics that could occur in the WebTransport code path.

What's Changed

Full Changelog: v0.24.1...v0.24.2