Skip to content

Commit

Permalink
docs: update changelog for v0.9.1
Browse files Browse the repository at this point in the history
  • Loading branch information
aschmahmann committed Jul 20, 2021
1 parent 8684639 commit 8990332
Showing 1 changed file with 199 additions and 0 deletions.
199 changes: 199 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,204 @@
# go-ipfs changelog

## v0.9.1 2021-07-20

This is a small bug fix release resolving the following issues:
1. A regression where the empty CID bafkqaaa could not resolve on gateways [#8230](https://github.com/ipfs/go-ipfs/issues/8230)
2. A panic on OpenBSD [#8211](https://github.com/ipfs/go-ipfs/issues/8211)
3. High CPU usage with QUIC [#8256](https://github.com/ipfs/go-ipfs/issues/8256)
4. High memory usage with TCP [#8219](https://github.com/ipfs/go-ipfs/issues/8219)
5. Some pubsub issues ([libp2p/go-libp2p-pubsub#427](https://github.com/libp2p/go-libp2p-pubsub/pull/427), [libp2p/go-libp2p-pubsub#430](https://github.com/libp2p/go-libp2p-pubsub/pull/430))
6. Updated WebUI to [v2.12.4](https://github.com/ipfs/ipfs-webui/releases/tag/v2.12.4)
7. Fixed the snap deployment [#8212](https://github.com/ipfs/go-ipfs/pull/8212)

### Changelog

- github.com/ipfs/go-ipfs:
- chore: update deps
- feat: webui v2.12.4
- test: gateway response for bafkqaaa
- fix: downgrade mimetype dependency
- update go-libp2p to v0.14.3
- bump snap to build with Go 1.16
- github.com/libp2p/go-libp2p (v0.14.2 -> v0.14.3):
- update go-tcp-transport to v0.2.3 and go-multiaddr to v0.3.3 ([libp2p/go-libp2p#1121](https://github.com/libp2p/go-libp2p/pull/1121))
- github.com/libp2p/go-libp2p-pubsub (v0.4.1 -> v0.4.2):
- release priority locks early when handling batches
- don't respawn writer if we fail to open a stream; declare it a peer error
- batch process dead peer notifications
- use a priority lock instead of a semaphore
- do the notification in a goroutine
- emit new peer notification without holding the semaphore
- use a semaphore for new peer notifications so that we don't block the event loop
- don't accumulate pending goroutines from new connections
- Make close concurrent safe
- Fix close of closed channel
- github.com/libp2p/go-libp2p-quic-transport (v0.11.1 -> v0.11.2):
- update quic-go to v0.21.2
- github.com/libp2p/go-tcp-transport (v0.2.2 -> v0.2.4):
- collect metrics in a separate go routine ([libp2p/go-tcp-transport#82](https://github.com/libp2p/go-tcp-transport/pull/82))
- fix: avoid logging "invalid argument" errors when setting keepalive ([libp2p/go-tcp-transport#83](https://github.com/libp2p/go-tcp-transport/pull/83))
- Skip SetKeepAlivePeriod call on OpenBSD ([libp2p/go-tcp-transport#80](https://github.com/libp2p/go-tcp-transport/pull/80))
- sync: update CI config files (#79) ([libp2p/go-tcp-transport#79](https://github.com/libp2p/go-tcp-transport/pull/79))
- github.com/lucas-clemente/quic-go (v0.21.1 -> v0.21.2):
- update qtls to include the crypto/tls fix of Go 1.16.6 / 1.15.14
- cancel the PTO timer when all Handshake packets are acknowledged
- update to Go 1.17rc1
- update Ginkgo to v1.16.4 and Gomega to v1.13.0 ([lucas-clemente/quic-go#3139](https://github.com/lucas-clemente/quic-go/pull/3139))
- github.com/marten-seemann/qtls-go1-15 (v0.1.4 -> v0.1.5):
- use a prefix for client session cache keys
- add callbacks to store and restore app data along a session state
- don't use TLS 1.3 compatibility mode when using alternative record layer
- delete the session ticket after attempting 0-RTT
- reject 0-RTT when a different ALPN is chosen
- encode the ALPN into the session ticket
- add a field to the ConnectionState to tell if 0-RTT was used
- add a callback to tell the client about rejection of 0-RTT
- don't offer 0-RTT after a HelloRetryRequest
- add Accept0RTT to Config callback to decide if 0-RTT should be accepted
- add the option to encode application data into the session ticket
- export the 0-RTT write key
- abuse the nonce field of ClientSessionState to save max_early_data_size
- export the 0-RTT read key
- close connection if client attempts 0-RTT, but ticket didn't allow it
- encode the max early data size into the session ticket
- implement parsing of the early_data extension in the EncryptedExtensions
- add a tls.Config.MaxEarlyData option to enable 0-RTT
- accept TLS 1.3 cipher suites in Config.CipherSuites
- introduce a function on the connection to generate a session ticket
- add a config option to enforce selection of an application protocol
- export Conn.HandlePostHandshakeMessage
- export Alert
- reject Configs that set MaxVersion < 1.3 when using a record layer
- enforce TLS 1.3 when using an alternative record layer
- add alternative record layer config option, used by QUIC
- export a constructor for the TLS 1.3 AES-GCM AEAD
- implement sending and receiving extensions in the Encrypted Extensions
- implement sending and receiving extensions in the Client Hello
- add callback to get and receive extensions to the Config
- implement additional extensions for the ClientHello message
- implement additional extensions for the Encrypted Extensions message
- use a tls.Config and a tls.ClientHelloInfo
- use a tls.ClientSessionCache and tls.ClientSessionState
- use a tls.ConnectionState instead of redefining it
- use tls.CertificateRequestInfo instead of redefining it
- use tls.Certificate instead of redefining it
- use tls.RenegotiationSupport instead of redefining it
- use tls.ClientAuthType instead of redefining it
- use tls.SignatureScheme instead of redefining it
- use tls.CurveID instead of redefining it
- add a README
- add a license
- rename to qtls, don't use internal packages, add go.mod, add CircleCI config
- initial commit (based on go@go1.15.14)
- github.com/marten-seemann/qtls-go1-16 (v0.1.3 -> v0.1.4):
- use a prefix for client session cache keys
- add callbacks to store and restore app data along a session state
- don't use TLS 1.3 compatibility mode when using alternative record layer
- delete the session ticket after attempting 0-RTT
- reject 0-RTT when a different ALPN is chosen
- encode the ALPN into the session ticket
- add a field to the ConnectionState to tell if 0-RTT was used
- add a callback to tell the client about rejection of 0-RTT
- don't offer 0-RTT after a HelloRetryRequest
- add Accept0RTT to Config callback to decide if 0-RTT should be accepted
- add the option to encode application data into the session ticket
- export the 0-RTT write key
- abuse the nonce field of ClientSessionState to save max_early_data_size
- export the 0-RTT read key
- close connection if client attempts 0-RTT, but ticket didn't allow it
- encode the max early data size into the session ticket
- implement parsing of the early_data extension in the EncryptedExtensions
- add a tls.Config.MaxEarlyData option to enable 0-RTT
- accept TLS 1.3 cipher suites in Config.CipherSuites
- introduce a function on the connection to generate a session ticket
- add a config option to enforce selection of an application protocol
- export Conn.HandlePostHandshakeMessage
- reject Configs that set MaxVersion < 1.3 when using a record layer
- enforce TLS 1.3 when using an alternative record layer
- add alternative record layer config option, used by QUIC
- export a constructor for the TLS 1.3 AES-GCM AEAD
- implement sending and receiving extensions in the Encrypted Extensions
- implement sending and receiving extensions in the Client Hello
- introduce an extra config struct to get and receive extensions
- export Alert
- implement additional extensions for the ClientHello message
- implement additional extensions for the Encrypted Extensions message
- use a tls.Config and a tls.ClientHelloInfo
- use tls.CertificateRequestInfo instead of redefining it
- use a tls.ClientSessionCache and tls.ClientSessionState
- use a tls.ConnectionState instead of redefining it
- use tls.Certificate instead of redefining it
- use tls.RenegotiationSupport instead of redefining it
- use tls.ClientAuthType instead of redefining it
- use tls.SignatureScheme instead of redefining it
- use tls.CurveID instead of redefining it
- add a README
- add a license
- rename to qtls, don't use internal packages, add go.mod, add GitHub Actions config
- initial commit (based on go@go1.16.6)
- github.com/marten-seemann/qtls-go1-17 (v0.1.0-beta.1.2 -> v0.1.0-rc.1):
- use a prefix for client session cache keys
- add callbacks to store and restore app data along a session state
- don't use TLS 1.3 compatibility mode when using alternative record layer
- delete the session ticket after attempting 0-RTT
- reject 0-RTT when a different ALPN is chosen
- encode the ALPN into the session ticket
- add a field to the ConnectionState to tell if 0-RTT was used
- add a callback to tell the client about rejection of 0-RTT
- don't offer 0-RTT after a HelloRetryRequest
- add Accept0RTT to Config callback to decide if 0-RTT should be accepted
- add the option to encode application data into the session ticket
- export the 0-RTT write key
- abuse the nonce field of ClientSessionState to save max_early_data_size
- export the 0-RTT read key
- close connection if client attempts 0-RTT, but ticket didn't allow it
- encode the max early data size into the session ticket
- implement parsing of the early_data extension in the EncryptedExtensions
- add a tls.Config.MaxEarlyData option to enable 0-RTT
- accept TLS 1.3 cipher suites in Config.CipherSuites
- introduce a function on the connection to generate a session ticket
- add a config option to enforce selection of an application protocol
- export Conn.HandlePostHandshakeMessage
- reject Configs that set MaxVersion < 1.3 when using a record layer
- enforce TLS 1.3 when using an alternative record layer
- add alternative record layer config option, used by QUIC
- export a constructor for the TLS 1.3 AES-GCM AEAD
- implement sending and receiving extensions in the Encrypted Extensions
- implement sending and receiving extensions in the Client Hello
- introduce an extra config struct to get and receive extensions
- export Alert
- implement additional extensions for the ClientHello message
- implement additional extensions for the Encrypted Extensions message
- use a tls.Config and a tls.ClientHelloInfo
- use tls.CertificateRequestInfo instead of redefining it
- use a tls.ClientSessionCache and tls.ClientSessionState
- use a tls.ConnectionState instead of redefining it
- use tls.Certificate instead of redefining it
- use tls.RenegotiationSupport instead of redefining it
- use tls.ClientAuthType instead of redefining it
- use tls.SignatureScheme instead of redefining it
- use tls.CurveID instead of redefining it
- add a README
- add a license
- rename to qtls, don't use internal packages, add go.mod, add GitHub Actions config
- initial commit (based on go@go1.17rc1)
- github.com/multiformats/go-multiaddr (v0.3.2 -> v0.3.3):
- guard against nil {Local,Remote}Addr() return values ([multiformats/go-multiaddr#155](https://github.com/multiformats/go-multiaddr/pull/155))
- sync: update CI config files (#154) ([multiformats/go-multiaddr#154](https://github.com/multiformats/go-multiaddr/pull/154))

### Contributors

| Contributor | Commits | Lines ± | Files Changed |
|-------------|---------|---------|---------------|
| Marten Seemann | 143 | +118200/-19756 | 1146 |
| vyzo | 8 | +205/-141 | 12 |
| gammazero | 2 | +43/-5 | 3 |
| Steven Allen | 1 | +13/-2 | 1 |
| Adin Schmahmann | 3 | +13/-2 | 3 |
| Marcin Rataj | 2 | +9/-1 | 2 |
| Aaron Bieber | 1 | +6/-2 | 1 |

## v0.9.0 2021-06-22

We're happy to announce go-ipfs 0.9.0. This release makes go-ipfs even more configurable with some fun experiments to boot. We're also deprecating or removing some uncommonly used features to make it easier for users to discover the easy ways to use go-ipfs safely and efficiently.
Expand Down

0 comments on commit 8990332

Please sign in to comment.