summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
* releasing package git-annex version 6.201612106.20161210Gravatar Joey Hess2016-12-10
|
* better fixGravatar Joey Hess2016-12-10
|
* improve hask to work with TH for Free monadsGravatar Joey Hess2016-12-10
|
* warning about old kernelsGravatar Joey Hess2016-12-10
|
* fix build warningGravatar Joey Hess2016-12-10
|
* fix build with old stmGravatar Joey Hess2016-12-10
| | | | | | | Old stm lacks isFullTMQueue. To avoid needing to update stm on the Android autobuilder, I switched to a TBMQueue. It never needs to be closed, but the overhead is minimal.
* followupGravatar Joey Hess2016-12-10
|
* fix build with old ghcGravatar Joey Hess2016-12-10
|
* fix typoGravatar Joey Hess2016-12-10
|
* fixedGravatar Joey Hess2016-12-10
|
* Remove http-conduit (<2.2.0) constraintGravatar Alper Nebi Yasak2016-12-10
| | | | | | | | | | Since https://github.com/aristidb/aws/issues/206 is resolved, this constraint is no longer necessary. However, http-conduit (>=2.2.0) requires http-client (>=0.5.0) which introduces some breaking changes. This commit also implements those changes depending on the version. Fixes: https://git-annex.branchable.com/bugs/Build_with_aws_head_fails/ Signed-off-by: Alper Nebi Yasak <alpernebiyasak@gmail.com>
* Added a comment: Patch to fix aws head build issueGravatar alpernebbi2016-12-10
|
* Added a comment: Corrupt Links Produced, Significant Data LossGravatar 0xloem@0bd8a79a57e4f0dcade8fc81d162c37eae4d67302016-12-10
|
* Added a commentGravatar alpernebbi2016-12-10
|
* hang up connection after relayingGravatar Joey Hess2016-12-09
| | | | | | | Seems that git upload-pack outputs a "ONCDN " that is not read by the remote git receive-pack. This fixes: [2016-12-09 17:08:32.77159731] P2P > ERROR protocol parse error: "ONCDN "
* updateGravatar Joey Hess2016-12-09
|
* fix uuid comparisonGravatar Joey Hess2016-12-09
|
* avoid exposing auth tokens in debugGravatar Joey Hess2016-12-09
|
* devblogGravatar Joey Hess2016-12-09
|
* debug dump P2P messagesGravatar Joey Hess2016-12-09
|
* make tor hidden service work when directory watching is not availableGravatar Joey Hess2016-12-09
| | | | Avoid crashing when built w/o inotify..
* cleanupGravatar Joey Hess2016-12-09
|
* bump maxConnections to 100Gravatar Joey Hess2016-12-09
| | | | | | | | | | | 10 seemed too low because more than 10 friends could be linked to a repo over tor, and if all were running the remotedaemon, which makes a persistent connection for change notification, then the 11th friend would not be able to access that repo. 100 might be too low, but it's a much larger group of people. And at that size group, it probably makes sense to structure the network so that 100 peers are not all trying to access one central node.
* remotedaemon: git change detection over tor hidden serviceGravatar Joey Hess2016-12-09
|
* only start ref change watcher thread once per P2P connectionGravatar Joey Hess2016-12-09
| | | | | | This is more efficient. Note that the peer will get CHANGED messages for all refs changed since the connection opened, even if those changes happened before it sent NOTIFYCHANGE.
* refactor ref change watchingGravatar Joey Hess2016-12-09
| | | | | | | | | | | | | | | | | | Added to change notification to P2P protocol. Switched to a TBChan so that a single long-running thread can be started, and serve perhaps intermittent requests for change notifications, without buffering all changes in memory. The P2P runner currently starts up a new thread each times it waits for a change, but that should allow later reusing a thread. Although each connection from a peer will still need a new watcher thread to run. The dependency on stm-chans is more or less free; some stuff in yesod uses it, so it was already indirectly pulled in when building with the webapp. This commit was sponsored by Francois Marier on Patreon.
* updateGravatar Joey Hess2016-12-09
|
* git-annex-shell, remotedaemon, git remote: Fix some memory DOS attacks.Gravatar Joey Hess2016-12-09
| | | | | | | | | | | | | | | | | | | | | The attacker could just send a very lot of data, with no \n and it would all be buffered in memory until the kernel killed git-annex or perhaps OOM killed some other more valuable process. This is a low impact security hole, only affecting communication between local git-annex and git-annex-shell on the remote system. (With either able to be the attacker). Only those with the right ssh key can do it. And, there are probably lots of ways to construct git repositories that make git use a lot of memory in various ways, which would have similar impact as this attack. The fix in P2P/IO.hs would have been higher impact, if it had made it to a released version, since it would have allowed DOSing the tor hidden service without needing to authenticate. (The LockContent and NotifyChanges instances may not be really exploitable; since the line is read and ignored, it probably gets read lazily and does not end up staying buffered in memory.)
* debug on error serving peerGravatar Joey Hess2016-12-09
|
* fixGravatar Joey Hess2016-12-09
|
* make clear that log is only updated after successful removalGravatar Joey Hess2016-12-09
| | | | | This does not change behavior, because an exception is thrown on unsuccessful removal. But is clearer.
* typoGravatar Joey Hess2016-12-09
|
* content removal is supposed to succed if the content was already not presentGravatar Joey Hess2016-12-09
|
* improve warning on connection lossGravatar Joey Hess2016-12-09
|
* todoGravatar Joey Hess2016-12-08
|
* more todoGravatar Joey Hess2016-12-08
|
* update progress logs in remotedaemon send/receiveGravatar Joey Hess2016-12-08
|
* avoid remotedaemon outputting misc Messages when runningGravatar Joey Hess2016-12-08
| | | | | | It's a daemon or is communictaing with the assistant over stdio, so should not display checksum messages etc while serving the P2P protocol etc.
* fix memory leakGravatar Joey Hess2016-12-08
| | | | | | | I'm unsure why this fixed it, but it did. Seems to suggest that the memory leak is not due to a bug in my code, but that ghc didn't manage to take full advantage of laziness, or was failing to gc something it could have.
* correctionGravatar Joey Hess2016-12-08
|
* analysisGravatar Joey Hess2016-12-08
|
* profilingGravatar Joey Hess2016-12-08
|
* consistent capsGravatar Joey Hess2016-12-08
|
* commentGravatar Joey Hess2016-12-08
|
* didn't mean to commit this change yetGravatar Joey Hess2016-12-08
|
* commentGravatar Joey Hess2016-12-08
|
* update instructions to work betterGravatar Joey Hess2016-12-08
|
* we have a memory leakGravatar Joey Hess2016-12-08
|
* move byteable to main dep listGravatar Joey Hess2016-12-08
| | | | Only the webapp had pulled it in, but the authtoken code uses it now.
* force sofar calculationGravatar Joey Hess2016-12-08
| | | | | This could avoid a memory leak. It would only happen when the meter didn't look at sofar.