Skip to content

Releases: paritytech/litep2p

v0.8.4

13 Dec 10:07
v0.8.4
ed801e4
Compare
Choose a tag to compare

[0.8.4] - 2024-12-12

This release aims to make the MDNS component more robust by fixing a bug that caused the MDNS service to fail to register opened substreams. Additionally, the release includes several improvements to the identify protocol, replacing FuturesUnordered with FuturesStream for better performance.

Fixed

  • mdns/fix: Failed to register opened substream (#301)

Changed

  • identify: Replace FuturesUnordered with FuturesStream (#302)
  • chore: Update hickory-resolver to version 0.24.2 (#304)
  • ci: Ensure cargo-machete is working with rust version from CI (#303)

v0.8.3

11 Dec 17:20
v0.8.3
ff24721
Compare
Choose a tag to compare

[0.8.3] - 2024-12-03

This release includes two fixes for small memory leaks on edge-cases in the notification and request-response protocols.

Fixed

  • req-resp: Fix memory leak of pending substreams (#297)
  • notification: Fix memory leak of pending substreams (#296)

v0.8.2

27 Nov 13:59
v0.8.2
28d42c6
Compare
Choose a tag to compare

[0.8.2] - 2024-11-27

This release ensures that the provided peer identity is verified at the crypto/noise protocol level, enhancing security and preventing potential misuses.
The release also includes a fix that caused TransportService component to panic on debug builds.

Fixed

  • req-resp: Fix panic on connection closed for substream open failure (#291)
  • crypto/noise: Verify crypto/noise signature payload (#278)

Changed

  • transport_service/logs: Provide less details for trace logs (#292)

v0.8.1

27 Nov 13:59
v0.8.1
07240f2
Compare
Choose a tag to compare

[0.8.1] - 2024-11-14

This release includes key fixes that enhance the stability and performance of the litep2p library, focusing on long-running stability and improvements to polling mechanisms.

Long Running Stability Improvements

This issue caused long-running nodes to reject all incoming connections, impacting overall stability.

Addressed a bug in the connection limits functionality that incorrectly tracked connections due for rejection.
This issue caused an artificial increase in inbound peers, which were not being properly removed from the connection limit count.
This fix ensures more accurate tracking and management of peer connections #286.

Polling implementation fixes

This release provides multiple fixes to the polling mechanism, improving how connections and events are processed:

  • Resolved an overflow issue in TransportContext's polling index for streams, preventing potential crashes.
  • Fixed a delay in the manager's poll_next function that prevented immediate polling of newly added futures.
  • Corrected an issue where the listener did not return Poll::Ready(None) when it was closed, ensuring proper signal handling.

Fixed

  • manager: Fix connection limits tracking of rejected connections (#286)
  • transport: Fix waking up on filtered events from poll_next (#287)
  • transports: Fix missing Poll::Ready(None) event from listener (#285)
  • manager: Avoid overflow on stream implementation for TransportContext (#283)
  • manager: Log when polling returns Ready(None) (#284)

v0.8.0

04 Nov 16:57
v0.8.0
af0535c
Compare
Choose a tag to compare

[0.8.0] - 2024-11-04

This release adds support for content provider advertisement and discovery to Kademlia protocol implementation (see libp2p spec).
Additionally, the release includes several improvements and memory leak fixes to enhance the stability and performance of the litep2p library.

Content Provider Advertisement and Discovery

Litep2p now supports content provider advertisement and discovery through the Kademlia protocol.
Content providers can publish their records to the network, and other nodes can discover and retrieve these records using the GET_PROVIDERS query.

    // Start providing a record to the network.
    // This stores the record in the local provider store and starts advertising it to the network.
    kad_handle.start_providing(key.clone());

    // Wait for some condition to stop providing...

    // Stop providing a record to the network.
    // The record is removed from the local provider store and stops advertising it to the network.
    // Please note that the record will be removed from the network after the TTL expires.
    kad_provider.stop_providing(key.clone());

    // Retrieve providers for a record from the network.
    // This returns a query ID that is later producing the result when polling the `Kademlia` instance.
    let query_id = kad_provider.get_providers(key.clone());

Added

  • kad: Providers part 8: unit, e2e, and libp2p conformance tests (#258)
  • kad: Providers part 7: better types and public API, public addresses & known providers (#246)
  • kad: Providers part 6: stop providing (#245)
  • kad: Providers part 5: GET_PROVIDERS query (#236)
  • kad: Providers part 4: refresh local providers (#235)
  • kad: Providers part 3: publish provider records (start providing) (#234)

Changed

  • transport_service: Improve connection stability by downgrading connections on substream inactivity (#260)
  • transport: Abort canceled dial attempts for TCP, WebSocket and Quic (#255)
  • kad/executor: Add timeout for writting frames (#277)
  • kad: Avoid cloning the KademliaMessage and use reference for RoutingTable::closest (#233)
  • peer_state: Robust state machine transitions (#251)
  • address_store: Improve address tracking and add eviction algorithm (#250)
  • kad: Remove unused serde cfg (#262)
  • req-resp: Refactor to move functionality to dedicated methods (#244)
  • transport_service: Improve logs and move code from tokio::select macro (#254)

Fixed

  • tcp/websocket/quic: Fix cancel memory leak (#272)
  • transport: Fix pending dials memory leak (#271)
  • ping: Fix memory leak of unremoved pending_opens (#274)
  • identify: Fix memory leak of unused pending_opens (#273)
  • kad: Fix not retrieving local records (#221)

v0.7.0

05 Sep 15:46
v0.7.0
a68b713
Compare
Choose a tag to compare

[0.7.0] - 2024-09-05

This release introduces several new features, improvements, and fixes to the litep2p library. Key updates include enhanced error handling, configurable connection limits, and a new API for managing public addresses.

Exposing Public Addresses API

A new PublicAddresses API has been added, enabling users to manage the node's public addresses. This API allows developers to add, remove, and retrieve public addresses, which are shared with peers through the Identify protocol.

    // Public addresses are accessible from the main litep2p instance.
    let public_addresses = litep2p.public_addresses();

    // Add a new public address to the node.
    if let Err(err) = public_addresses.add_address(multiaddr) {
        eprintln!("Failed to add public address: {:?}", err);
    }

    // Remove a public address from the node.
    public_addresses.remove_address(&multiaddr);

    // Retrieve all public addresses of the node.
    for address in public_addresses.get_addresses() {
        println!("Public address: {}", address);
    }

Breaking Change: The Identify protocol no longer includes public addresses in its configuration. Instead, use the new PublicAddresses API.

Migration Guide:

    // Before:
    let (identify_config, identify_event_stream) = IdentifyConfig::new(
        "/substrate/1.0".to_string(),
        Some(user_agent),
        config.public_addresses,
    );

    // After:
    let (identify_config, identify_event_stream) =
        IdentifyConfig::new("/substrate/1.0".to_string(), Some(user_agent));
    // Public addresses must now be added using the `PublicAddresses` API:
    for address in config.public_addresses {
        if let Err(err) = public_addresses.add_address(address) {
            eprintln!("Failed to add public address: {:?}", err);
        }
    }

Dial Error and List Dial Failures Event

The DialFailure event has been enhanced with a new DialError enum for more precise error reporting when a dial attempt fails. Additionally, a ListDialFailures event has been introduced, listing all dialed addresses and their corresponding errors when multiple addresses are involved.

Other litep2p errors, such as ParseError, AddressError, and NegotiationError, have been refactored for improved error propagation.

Immediate Dial Error and Request-Response Rejection Reasons

This new feature paves the way for better error handling in the litep2p library and moves away from the overarching litep2p::error::Error enum.

The newly added ImmediateDialError enum captures errors occurring before a dial request is sent (e.g., missing peer IDs). It also enhances the RejectReason enum for request-response protocols, offering more detailed rejection reasons.

match error {
    RequestResponseError::Rejected(reason) => {
        match reason {
            RejectReason::ConnectionClosed => "connection-closed",
            RejectReason::DialFailed(Some(ImmediateDialError::AlreadyConnected)) => "already-connected",
            _ => "other",
        }
    }
    _ => "other",
}

Connection Limits

Developers can now set limits on the number of inbound and outbound connections to manage resources and optimize performance.

    // Configure connection limits for inbound and outbound established connections.
    let litep2p_config = Config::default()
        .with_connection_limits(ConnectionLimitsConfig::default()
            .max_incoming_connections(Some(3))
            .max_outgoing_connections(Some(2))
        );

Feature Flags for Optional Transports

The library now supports feature flags to selectively enable or disable transport protocols. By default, only the TCP transport is enabled. Optional transports include:

  • quic - Enables QUIC transport.
  • websocket - Enables WebSocket transport.
  • webrtc - Enables WebRTC transport.

Configurable Keep-Alive Timeout

The keep-alive timeout for connections is now configurable, providing more control over connection lifecycles.

    // Set keep alive timeout for connections.
    let litep2p_config = Config::default()
        .with_keep_alive_timeout(Duration::from_secs(30));

Thanks for contributing to this @Ma233!

Added

  • errors: Introduce immediate dial error and request-response rejection reasons (#227)
  • Expose API for PublicAddresses (#212)
  • transport: Implement TransportService::local_peer_id() (#224)
  • find_node: Optimize parallelism factor for slow to respond peers (#220)
  • kad: Handle ADD_PROVIDER & GET_PROVIDERS network requests (#213)
  • errors: Add DialError error and ListDialFailures event for better error reporting (#206)
  • kad: Add support for provider records to MemoryStore (#200)
  • transport: Add accept_pending/reject_pending for inbound connections and introduce inbound limits (#194)
  • transport/manager: Add connection limits for inbound and outbound established connections (#185)
  • kad: Add query id to log messages (#174)

Changed

  • transport: Replace trust_dns_resolver with hickory_resolver (#223)
  • crypto/noise: Generate keypair only for Curve25519 (#214)
  • transport: Allow manual setting of keep-alive timeout (#155)
  • kad: Update connection status of an existing bucket entry (#181)
  • Make transports optional (#192)

Fixed

  • kad: Fix substream opening and dialing race (#222)
  • query-executor: Save the task waker on empty futures (#219)
  • substream: Use write_all instead of manually writing bytes (#217)
  • minor: fix tests without websocket feature (#215)
  • Fix TCP, WebSocket, QUIC leaking connection IDs in reject() (#198)
  • transport: Fix double lock and state overwrite on disconnected peers (#179)
  • kad: Do not update memory store on incoming GetRecordSuccess (#190)
  • transport: Reject secondary connections with different connection IDs (#176)

v0.6.2

05 Sep 09:17
v0.6.2
a27d007
Compare
Choose a tag to compare

[0.6.2] - 2024-06-26

This is a bug fixing release. Kademlia now correctly sets and forwards publisher & ttl in the DHT records.

Fixed

  • kademlia: Preserve publisher & expiration time in DHT records (#162)

v0.6.1

20 Jun 12:42
v0.6.1
3a6da23
Compare
Choose a tag to compare

[0.6.1] - 2024-06-20

This is a bug fixing and security release. curve255190-dalek has been upgraded to v4.1.3, see dalek-cryptography/curve25519-dalek#659 for details.

Fixed

  • kad: Set default ttl 36h for kad records (#154)
  • chore: update ed25519-dalek to v2.1.1 (#122)
  • Bump curve255190-dalek 4.1.2 -> 4.1.3 (#159)

v0.6.0

14 Jun 07:45
v0.6.0
ebb5f2d
Compare
Choose a tag to compare

[0.6.0] - 2024-06-14

This release introduces breaking changes into kad module. The API has been extended as following:

  • An event KademliaEvent::IncomingRecord has been added.
  • New methods KademliaHandle::store_record() / KademliaHandle::try_store_record() have been introduced.

This allows implementing manual incoming DHT record validation by configuring Kademlia with IncomingRecordValidationMode::Manual.

Also, it is now possible to enable TCP_NODELAY on sockets.

Multiple refactorings to remove the code duplications and improve the implementation robustness have been done.

Added

  • Support manual DHT record insertion (#135)
  • transport: Make TCP_NODELAY configurable (#146)

Changed

  • transport: Introduce common listener for tcp and websocket (#147)
  • transport/common: Share DNS lookups between TCP and WebSocket (#151)

Fixed

  • ping: Make ping fault tolerant wrt outbound substreams races (#133)
  • crypto/noise: Make noise fault tolerant (#142)
  • protocol/notif: Fix panic on missing peer state (#143)
  • transport: Fix erroneous handling of secondary connections (#149)

v0.5.0

24 May 14:01
0364bf5
Compare
Choose a tag to compare

[0.5.0] - 2023-05-24

This is a small patch release that makes the FindNode command a bit more robst:

  • The FindNode command now retains the K (replication factor) best results.
  • The FindNode command has been updated to handle errors and unexpected states without panicking.

Changed

  • kad: Refactor FindNode query, keep K best results and add tests (#114)