Commit Graph

1176 Commits

Author SHA1 Message Date
TC Johnson
783b7cc59c
Fix packaging version parsing
Comments added to Cargo.toml caused faulty parsing of the version
number by package/cargo_version.sh. Adding the -w switch to grep
fixes this by matching on the whole word 'version' and not matching
on words such as 'Bumpversion'.
2023-09-02 10:50:58 -05:00
TC Johnson
2c46a159a3
Version update: v0.1.10 → v0.2.0 2023-09-02 09:45:56 -05:00
TC Johnson
8b2c573298
Add Windows note to CHANGELOG 2023-09-02 09:43:49 -05:00
Christien Rioux
90772728c2 bumpversion fixes 2023-09-02 10:41:59 -04:00
Christien Rioux
a78b57c144 changelog and cargo lock update 2023-09-02 09:51:22 -04:00
Christien Rioux
1d604477a8
Merge branch 'doc-work' into 'main'
Rustdoc And Android Work

See merge request veilid/veilid!165
2023-09-02 02:19:35 +00:00
Christien Rioux
709ec4543b change visibility of dhcache 2023-09-01 21:18:45 -04:00
Christien Rioux
246056913e doc work 2023-09-01 21:13:05 -04:00
Christien Rioux
c377a59278 fix tests 2023-09-01 18:59:43 -04:00
Christien Rioux
d0e240b545 tests 2023-09-01 17:56:43 -04:00
Christien Rioux
ffcf16711b android fixes 2023-09-01 17:44:42 -04:00
Christien Rioux
f79b13a6d1 android fixes 2023-09-01 15:36:43 -04:00
John Smith
2200825e82 dependency updates 2023-09-01 14:48:27 -04:00
Christien Rioux
d68a543800 fix ios 2023-08-29 17:50:25 -05:00
Christien Rioux
c8fd523a91 fix wasm 2023-08-29 15:52:47 -05:00
Christien Rioux
e302b764d0 docs and tests work 2023-08-29 15:15:47 -05:00
Christien Rioux
d3407998f5 doc structure 2023-08-28 10:32:55 -05:00
Christien Rioux
3125c19f02 doc work 2023-08-27 16:39:50 -05:00
TC
2ab51ae3e9 Merge branch 'earthly-caching' into 'main'
Earthly Build Caching in GitLab Container Registry

See merge request veilid/veilid!153
2023-08-27 17:17:29 +00:00
Δ ǀ Ξ ȼ
ab51f68c4d Earthly Build Caching in GitLab Container Registry 2023-08-27 17:17:29 +00:00
Christien Rioux
8c366387eb Merge branch 'fix-set-record-data-size-call' into 'main'
call set_record_data_size with accumulated size

See merge request veilid/veilid!155
2023-08-27 16:07:38 +00:00
Christien Rioux
59dda0febe Merge branch 'api_startup_json_skip_all' into 'main'
api_startup_json: use 'skip_all'

See merge request veilid/veilid!154
2023-08-27 15:58:00 +00:00
Christien Rioux
7985ec6b07 Merge branch 'main' into 'main'
Initial German translation of the guide document and the project readme

See merge request veilid/veilid!156
2023-08-27 15:56:55 +00:00
Moritz Christian Weber
d0910537a0 Delete code_of_conduct-DE.md as there is a better translating reference in the original code of conduct 2023-08-27 06:04:10 +00:00
Moritz Christian Weber
f4b6948548 Fixing broken links 2023-08-26 22:51:32 +00:00
Moritz Christian Weber
df70bad081 Minor adjustment 2023-08-26 22:44:08 +00:00
Moritz Christian Weber
d5be520451 Initial Translation of Code of Conduct 2023-08-26 22:43:00 +00:00
Moritz Christian Weber
31e7952a70 Initial German translation of the project readme file 2023-08-26 21:41:04 +00:00
Moritz Christian Weber
187c86d9f7 Merge branch veilid:main into main 2023-08-26 21:17:41 +00:00
Moritz Christian Weber
d6be7bfda7 Initial German translation of the guide document 2023-08-26 21:17:29 +00:00
Rivka Segan
5dd0a3793b call set_record_data_size with accumulated size
set_subkey corrupts record_data_size in a Record struct by calling
set_record_data_size with a value that depends only on the length of
the new subkey value. This leads to various undesirable outcomes, such
as: applications can write more than MAX_RECORD_DATA_SIZE without
encountering the intended "veilid.error.VeilidAPIErrorGeneric:
label='Generic' message='dht record too large'" error message, and
"panicked at 'attempt to subtract with overflow'" (i.e., an attempt to
set a negative value of a size) if a subkey's new length is less than
a subkey's old length. Typically, record_data_size in a Record struct
will be incorrect if a value was set for more than one subkey. Some
users might want to start over with a table_store that doesn't have
any incorrect record_data_size values.

The issue begins here:
6f71c6a00a/veilid-core/src/storage_manager/record_store.rs (L583-L586)

and is triggered here:
6f71c6a00a/veilid-core/src/storage_manager/record_store.rs (L613-L615)

It should be clear that new_record_data_size is only related to the
subkey that is currently being set. The amount of data in the record,
before set_subkey is called, is ignored. It appears that
new_total_size, not new_record_data_size, was intended to be used for
set_record_data_size, and this change succeeds for me in limited
testing but I don't have a comprehensive test suite.

One way to reproduce is by running the code from
https://gitlab.com/vatueil/veilid-file on a greater than 1 MB file
while watching variable values within
veilid-core/src/storage_manager/record_store.rs. For example: "poetry
run file put /usr/bin/tcpdump" (1.3 MB on Ubuntu 23.04). With the
original Veilid code, each of the dozens of subkey writes is checking
whether a roughly 32K value is greater than 1048576, it never is, and
thus there is never a "dht record too large" error. With the patch in
this MR, each of the dozens of subkey writes is checking whether an
ever-increasing value is greater than 1048576, it eventually is, and
the "dht record too large" error is printed. With the patch, one can
work with smaller files, e.g., do "poetry run file put /usr/bin/ssh"
(0.8 MB) followed by "poetry run file get VLD0:<_insert_key_here_>
ssh-copy" and the retrieved file ssh-copy is identical to
/usr/bin/ssh.

The more detailed behavior is that the modified code has
record.total_size of 350 on the first iteration, then 33596, 66842,
100088, etc. The original code also has record.total_size of 350 on
the first iteration, but then stays at 33246 forever (33246 is the
user-supplied subkey size of 32768, plus 128, plus the minimum record
size of 350),
2023-08-26 07:08:47 +00:00
Bruno Bigras
ff6f04be8c api_startup_json: use 'skip_all' 2023-08-26 02:01:57 +00:00
Christien Rioux
6f71c6a00a Merge branch 'python-schema-update-script' into 'main'
veilid-python: update_schema.sh now checks in a few places for veilid-server

See merge request veilid/veilid!151
2023-08-24 23:30:44 +00:00
Mike Phipps
9a46a28a3d veilid-python: update_schema.sh now checks in a few places for veilid-server 2023-08-24 23:30:44 +00:00
Christien Rioux
05ac462401 Merge branch 'public-address-check' into 'main'
Public Address Check Updates

Closes #234, #270, #268, and #275

See merge request veilid/veilid!148
2023-08-24 23:29:06 +00:00
Christien Rioux
248b21a951 proper relay switch, fix wasm 2023-08-24 18:59:33 -04:00
Christien Rioux
a9c173e52f flutter fix 2023-08-24 18:35:37 -04:00
John Smith
6bb35dd6a6 skip publishing relay for fullconenat 2023-08-24 18:35:37 -04:00
John Smith
945215aba1 speed up public address detection 2023-08-24 18:35:37 -04:00
John Smith
4eca53fd9b direct port forward detection 2023-08-24 18:35:37 -04:00
Christien Rioux
654b5dfebc simplify code 2023-08-24 18:35:37 -04:00
Christien Rioux
34c686c227 xfer 2023-08-24 18:35:37 -04:00
Christien Rioux
030a0073da fix public address check 2023-08-24 18:35:37 -04:00
Christien Rioux
07646679d0 Merge branch 'debian-sudo' into 'main'
Update file INSTALL.md

See merge request veilid/veilid!149
2023-08-24 21:18:43 +00:00
Chris Wall
a49c33827b Update file INSTALL.md 2023-08-24 17:41:35 +00:00
Christien Rioux
2716ea8402 Merge branch 'fix-lockapi-dependency' into 'main'
Fix lock_api dependency.

See merge request veilid/veilid!146
2023-08-24 01:41:17 +00:00
Pedro Nunes
aa824c176f Merge branch veilid:main into fix-lockapi-dependency 2023-08-23 15:52:56 +00:00
solace-10
59f4899bca Added exact lock_api dependency. 2023-08-23 16:46:14 +01:00
TC
1fff6cfdcd Merge branch 'move-tests-off-do' into 'main'
Move tests off of Digital Ocean

See merge request veilid/veilid!144
2023-08-22 22:41:04 +00:00
TC
b77beeb3be Tests passed. This commit is a clean up of .gitlab-ci.yml 2023-08-22 21:49:55 +00:00