Commit Graph

671 Commits

Author SHA1 Message Date
Christien Rioux
3fdf12e536
Merge branch 'target_env_musl' into 'main'
Adding musl target env

See merge request veilid/veilid!177
2023-09-10 21:04:00 +00:00
Christien Rioux
607b595807 fixes 2023-09-10 11:24:52 -04:00
Christien Rioux
2ff2ab7aa8 debugging for public address 2023-09-09 22:34:42 -04:00
Christien Rioux
60a7e90712 dht fixes 2023-09-09 21:44:16 -04:00
Christien Rioux
07f92b6e3f more setvalue fixes and concurrency cleanup 2023-09-09 18:35:25 -04:00
Christien Rioux
853976789f fix crash and clean up record data size housekeeping 2023-09-09 13:30:48 -04:00
Christien Rioux
36957d84f1 fix bug 2023-09-08 20:50:05 -04:00
Christien Rioux
0aa7cf5ef2 fanout work 2023-09-08 20:38:31 -04:00
Linus Gasser
0ac6fc7dc7 Adding musl target env 2023-09-08 19:23:46 +02:00
Christien Rioux
dc17e25bac Fixes #297
WASM build for new public address detection code
2023-09-06 17:06:33 -04:00
Christien Rioux
bfc42cdd8e clean up ui
pause routing table tasks when making routing domain changes
2023-09-06 13:20:36 -04:00
Christien Rioux
b325c82b9a more parallel 2023-09-06 10:02:55 -04:00
Christien Rioux
dfcdcf2364 xfer 2023-09-06 10:02:55 -04:00
Christien Rioux
d5a4be8a36 missing file 2023-09-06 10:02:55 -04:00
Christien Rioux
dac8e75229 xfer 2023-09-06 10:02:55 -04:00
Christien Rioux
3dfb612e6f fix ws 2023-09-06 10:02:55 -04:00
Christien Rioux
80b2e7b9da pad work 2023-09-06 10:02:55 -04:00
Christien Rioux
1b5934dad4 public address detection refactoring 2023-09-06 10:02:55 -04:00
John Smith
8d694f20cd fix async std test and make windows test script work 2023-09-06 09:53:28 -04:00
Christien Rioux
4b298f43d4
Merge branch 'settingTypo2023-09-05' into 'main'
setting not settings: struct.RoutingContext.html

See merge request veilid/veilid!173
2023-09-06 12:59:45 +00:00
Haley Weslin
58524657fe setting not settings: struct.RoutingContext.html
"by settings ‘force_refresh’" needs to use the "setting" word.

After changing it, build_docs.sh fixes rustdoc for
veilid_core/struct.RoutingContext.html
2023-09-05 16:05:18 +00:00
Brandon Vandegrift
93963e9d08 (wasm) Cleanup and refactoring, add TableDB transactions, copy over docs for JSDoc. 2023-09-04 14:04:57 -04:00
Brandon Vandegrift
ca11f6075d (wasm) Add VeilidCrypto class, refine interfaces for VeilidRoutingContext 2023-09-03 23:27:20 -04:00
Brandon Vandegrift
c5d7922fc5 Add VeilidRoutingContext class for WASM 2023-09-03 23:27:20 -04:00
Christien Rioux
9aeec3cfa8 build fixes and cleanup 2023-09-03 23:27:20 -04:00
Brandon Vandegrift
779532b624 Add new VeilidTable and VeilidClient to WASM API
These new interfaces have been reworked (compared to the original API) to emit (mostly) proper TypeScript types.
2023-09-03 23:27:08 -04:00
Brandon Vandegrift
1b20037053 Setup for TypeScript type gen for WASM using Tsify
- Includes breaking changes to the WASM API surface, since it now accepts objects instead of stringified JSON.
2023-09-03 23:27:08 -04:00
TC Johnson
65826b219b
Version update: v0.2.0 → v0.2.1 2023-09-03 19:45:12 -05:00
John Smith
71f91998b2 more fork 2023-09-03 10:23:41 -04:00
John Smith
896df0bb97 more forking 2023-09-03 10:08:04 -04:00
John Smith
fd6e9e22c2 crate fixes 2023-09-03 09:53:00 -04:00
Christien Rioux
7d71b50170
Merge branch 'rustdocTypo2023-09-02' into 'main'
Remove stray by: veilid_core/struct.VeilidAPI.html

See merge request veilid/veilid!166
2023-09-03 00:18:16 +00:00
Christien Rioux
b3354194e0 repo fix 2023-09-02 18:50:12 -04:00
Christien Rioux
a77f80a8a9 repo fixes 2023-09-02 15:47:19 -04:00
Christien Rioux
20f55745b0 add descriptions 2023-09-02 12:28:31 -04:00
TC Johnson
2c46a159a3
Version update: v0.1.10 → v0.2.0 2023-09-02 09:45:56 -05:00
Christien Rioux
90772728c2 bumpversion fixes 2023-09-02 10:41:59 -04:00
Haley Weslin
3cfaff9cbb Remove stray by: veilid_core/struct.VeilidAPI.html
"specified by at startup time" has an extra "by" (wrong grammar)

After changing it, build_docs.sh fixes rustdoc here:
target/doc/veilid_core/struct.VeilidAPI.html
2023-09-02 05:22:51 +00:00
Christien Rioux
709ec4543b change visibility of dhcache 2023-09-01 21:18:45 -04:00
Christien Rioux
246056913e doc work 2023-09-01 21:13:05 -04:00
Christien Rioux
c377a59278 fix tests 2023-09-01 18:59:43 -04:00
Christien Rioux
ffcf16711b android fixes 2023-09-01 17:44:42 -04:00
Christien Rioux
d68a543800 fix ios 2023-08-29 17:50:25 -05:00
Christien Rioux
e302b764d0 docs and tests work 2023-08-29 15:15:47 -05:00
Christien Rioux
3125c19f02 doc work 2023-08-27 16:39:50 -05:00
Christien Rioux
8c366387eb Merge branch 'fix-set-record-data-size-call' into 'main'
call set_record_data_size with accumulated size

See merge request veilid/veilid!155
2023-08-27 16:07:38 +00:00
Christien Rioux
59dda0febe Merge branch 'api_startup_json_skip_all' into 'main'
api_startup_json: use 'skip_all'

See merge request veilid/veilid!154
2023-08-27 15:58:00 +00:00
Rivka Segan
5dd0a3793b call set_record_data_size with accumulated size
set_subkey corrupts record_data_size in a Record struct by calling
set_record_data_size with a value that depends only on the length of
the new subkey value. This leads to various undesirable outcomes, such
as: applications can write more than MAX_RECORD_DATA_SIZE without
encountering the intended "veilid.error.VeilidAPIErrorGeneric:
label='Generic' message='dht record too large'" error message, and
"panicked at 'attempt to subtract with overflow'" (i.e., an attempt to
set a negative value of a size) if a subkey's new length is less than
a subkey's old length. Typically, record_data_size in a Record struct
will be incorrect if a value was set for more than one subkey. Some
users might want to start over with a table_store that doesn't have
any incorrect record_data_size values.

The issue begins here:
6f71c6a00a/veilid-core/src/storage_manager/record_store.rs (L583-L586)

and is triggered here:
6f71c6a00a/veilid-core/src/storage_manager/record_store.rs (L613-L615)

It should be clear that new_record_data_size is only related to the
subkey that is currently being set. The amount of data in the record,
before set_subkey is called, is ignored. It appears that
new_total_size, not new_record_data_size, was intended to be used for
set_record_data_size, and this change succeeds for me in limited
testing but I don't have a comprehensive test suite.

One way to reproduce is by running the code from
https://gitlab.com/vatueil/veilid-file on a greater than 1 MB file
while watching variable values within
veilid-core/src/storage_manager/record_store.rs. For example: "poetry
run file put /usr/bin/tcpdump" (1.3 MB on Ubuntu 23.04). With the
original Veilid code, each of the dozens of subkey writes is checking
whether a roughly 32K value is greater than 1048576, it never is, and
thus there is never a "dht record too large" error. With the patch in
this MR, each of the dozens of subkey writes is checking whether an
ever-increasing value is greater than 1048576, it eventually is, and
the "dht record too large" error is printed. With the patch, one can
work with smaller files, e.g., do "poetry run file put /usr/bin/ssh"
(0.8 MB) followed by "poetry run file get VLD0:<_insert_key_here_>
ssh-copy" and the retrieved file ssh-copy is identical to
/usr/bin/ssh.

The more detailed behavior is that the modified code has
record.total_size of 350 on the first iteration, then 33596, 66842,
100088, etc. The original code also has record.total_size of 350 on
the first iteration, but then stays at 33246 forever (33246 is the
user-supplied subkey size of 32768, plus 128, plus the minimum record
size of 350),
2023-08-26 07:08:47 +00:00
Bruno Bigras
ff6f04be8c api_startup_json: use 'skip_all' 2023-08-26 02:01:57 +00:00
Christien Rioux
248b21a951 proper relay switch, fix wasm 2023-08-24 18:59:33 -04:00