Go IPFS v0.7.0 Release Notes

Release Date: 2020-09-22 // over 3 years ago
  • Highlights

    0️⃣ Secio is now disabled by default

    🐎 As part of deprecating and removing support for the Secio security transport, we have disabled it by default. TLS1.3 will remain the default security transport with fallback to Noise. You can read more about the deprecation in the blog post, https://blog.ipfs.io/2020-08-07-deprecating-secio/. If you're running IPFS older than 0.5, this may start to impact your performance on the public network.

    0️⃣ Ed25519 keys are now used by default

    0️⃣ Previously go-ipfs generated 2048 bit RSA keys for new nodes, but it will now use ed25519 keys by default. This will not affect any existing keys, but newly created keys will be ed25519 by default. The main benefit of using ed25519 keys over RSA is that ed25519 keys have an inline public key. This means that someone only needs your PeerId to verify things you've signed, which means we don't have to worry about storing those bulky RSA public keys.

    Rotating keys

    Along with switching the default, we've added support for rotating keys. If you would like to change the key type of your IPFS node, you can now do so with the rotate command. NOTE: This will affect your Peer Id, so be sure you want to do this! Your existing identity key will be backed up in the Keystore.

    ipfs key rotate -o my-old-key -t ed25519
    

    Key export/import

    We've added commands to allow you to export and import keys from the IPFS Keystore to a local .key file. This does not apply to the IPFS identity key, self.

    ipfs key gen mykey
    ipfs key export -o mykey.key mykey # ./<name>.key is the default path
    ipfs key import mykey mykey.key # on another node
    

    0️⃣ IPNS paths now encode the key name as a base36 CIDv1 by default

    0️⃣ Previously go-ipfs encoded the key names for IPNS paths as base58btc multihashes (e.g. Qmabc...). We now encode them as base36 encoded CIDv1s as defined in the peerID spec (e.g. k51xyz...) which also deals with encoding of public keys. This is nice because it means that IPNS keys will by default be case-insensitive and that they will fit into DNS labels (e.g. k51xyz...ipns.localhost) and therefore that subdomain gateway redirections (e.g. from localhost:8080/ipns/{key} to {key}.ipns.localhost) will look better to users in the default case.

    👍 Many commands will accept a --ipns-base option that allows changing command outputs to use a particular encoding (i.e. base58btc multihash, or CIDv1 encoded in any supported base)

    Multiaddresses now accept PeerIDs encoded as CIDv1

    0️⃣ In preparation for eventually changing the default PeerID representation multiaddresses can now contain strings like /p2p/k51xyz... in addition to the default /p2p/Qmabc.... There is a corresponding --peerid-base option to many functions that output peerIDs.

    dag stat

    🎉 Initial support has been added for the ipfs dag stat command. Running this command will traverse the DAG for the given root CID and report statistics. By default, progress will be shown as the DAG is traversed. Supported statistics currently include DAG size and number of blocks.

    ipfs dag stat bafybeihpetclqvwb4qnmumvcn7nh4pxrtugrlpw4jgjpqicdxsv7opdm6e # the IPFS webui
    Size: 30362191, NumBlocks: 346
    

    🔌 Plugin build changes

    🏗 We have changed the build flags used by the official binary distributions on dist.ipfs.io (or /ipns/dist.ipfs.io) to use the simpler and more reliable -trimpath flag instead of the more complicated and brittle -asmflags=all=-trimpath="$(GOPATH)" -gcflags=all=-trimpath="$(GOPATH)" flags, however the build flags used by default in go-ipfs remain the same.

    ⚡️ The scripts in https://github.com/ipfs/go-ipfs-example-plugin have been updated to reflect this change. This is a breaking change to how people have been building plugins against the dist.ipfs.io binary of go-ipfs and plugins should update their build processes accordingly see https://github.com/ipfs/go-ipfs-example-plugin/pull/9 for details.

    🔄 Changelog

    Contributors

    Contributor Commits Lines ± Files Changed
    👀 Marten Seemann 156 +16428/-42621
    hannahhoward 42 +15132/-9819 467
    Eric Myhre 114 +13709/-6898 586
    Steven Allen 55 +1211/-2714 95
    Adin Schmahmann 54 +1660/-783 117
    Petar Maymounkov 23 +1677/-671 75
    Aarsh Shah 10 +1926/-341 39
    Raúl Kripalani 17 +1134/-537 53
    Will 1 +841/-0 9
    rendaw 3 +425/-195 12
    Will Scott 8 +302/-229 15
    vyzo 22 +345/-166 23
    Fazlul Shahriar 7 +452/-44 19
    Peter Rabbitson 1 +353/-118 5
    Hector Sanjuan 10 +451/-3 14
    Marcin Rataj 9 +298/-106 16
    Łukasz Magiera 4 +329/-51 12
    RubenKelevra 9 +331/-7 12
    Michael Muré 2 +259/-69 6
    jstordeur 1 +252/-2 5
    Diederik Loerakker 1 +168/-35 7
    Tiger 3 +138/-52 8
    Kevin Neaton 3 +103/-21 9
    Rod Vagg 1 +50/-40 4
    Oli Evans 4 +60/-9 6
    achingbrain 4 +30/-30 5
    Cyril Fougeray 2 +34/-24 2
    Luke Tucker 1 +31/-1 2
    sandman 2 +23/-7 3
    Alan Shaw 1 +18/-9 2
    Jacob Heun 4 +13/-3 4
    Jessica Schilling 3 +7/-7 3
    Rafael Ramalho 4 +9/-4 4
    Jeromy Johnson 2 +6/-6 4
    Nick Cabatoff 1 +7/-2 1
    Stephen Solka 1 +1/-7 1
    Preston Van Loon 2 +6/-2 2
    Jakub Sztandera 2 +5/-2 2
    llx 1 +3/-3 1
    Adrian Lanzafame 1 +3/-3 1
    Yusef Napora 1 +3/-2 1
    Louis Thibault 1 +5/-0 1
    Martín Triay 1 +4/-0 1
    Hlib 1 +2/-2 1
    Shotaro Yamada 1 +2/-1 1
    phuslu 1 +1/-1 1
    Zero King 1 +1/-1 1
    Rüdiger Klaehn 1 +2/-0 1
    Nex 1 +1/-1 1
    Mark Gaiser 1 +1/-1 1
    Luflosi 1 +1/-1 1
    David Florness 1 +1/-1 1
    Dean Eigenmann 1 +0/-1 1