Skip to content

Latest commit

 

History

History
620 lines (406 loc) · 17.4 KB

experimental-features.md

File metadata and controls

620 lines (406 loc) · 17.4 KB

Experimental features of go-ipfs

This document contains a list of experimental features in go-ipfs. These features, commands, and APIs aren't mature, and you shouldn't rely on them. Once they reach maturity, there's going to be mention in the changelog and release posts. If they don't reach maturity, the same applies, and their code is removed.

Subscribe to ipfs#3397 to get updates.

When you add a new experimental feature to go-ipfs or change an experimental feature, you MUST please make a PR updating this document, and link the PR in the above issue.


ipfs pubsub

State

Candidate, disabled by default but will be enabled by default in 0.6.0.

In Version

0.4.5 (--enable-pubsub-experiment) 0.11.0 (Pubsub.Enabled flag in config)

How to enable

Run your daemon with the --enable-pubsub-experiment flag or modify your ipfs config and restart the daemon:

ipfs config --json Pubsub.Enabled true

Then use the ipfs pubsub commands.

NOTE: --enable-pubsub-experiment CLI flag overrides Pubsub.Enabled config.

Configuration documentation can be found in go-ipfs/docs/config.md

Road to being a real feature

Raw Leaves for unixfs files

Allows files to be added with no formatting in the leaf nodes of the graph.

State

Stable but not used by default.

In Version

0.4.5

How to enable

Use --raw-leaves flag when calling ipfs add. This will save some space when adding files.

Road to being a real feature

Enabling this feature by default will change the CIDs (hashes) of all newly imported files and will prevent newly imported files from deduplicating against previously imported files. While we do intend on enabling this by default, we plan on doing so once we have a large batch of "hash-changing" features we can enable all at once.

ipfs filestore

Allows files to be added without duplicating the space they take up on disk.

State

Experimental.

In Version

0.4.7

How to enable

Modify your ipfs config:

ipfs config --json Experimental.FilestoreEnabled true

Then restart your IPFS node to reload your config.

Finally, when adding files with ipfs add, pass the --nocopy flag to use the filestore instead of copying the files into your local IPFS repo.

Road to being a real feature

  • Needs more people to use and report on how well it works.
  • Need to address error states and failure conditions
  • Need to write docs on usage, advantages, disadvantages
  • Need to merge utility commands to aid in maintenance and repair of filestore

ipfs urlstore

Allows ipfs to retrieve blocks contents via a URL instead of storing it in the datastore

State

Experimental.

In Version

v0.4.17

How to enable

Modify your ipfs config:

ipfs config --json Experimental.UrlstoreEnabled true

And then add a file at a specific URL using ipfs urlstore add <url>

Road to being a real feature

  • Needs more people to use and report on how well it works.
  • Need to address error states and failure conditions
  • Need to write docs on usage, advantages, disadvantages
  • Need to implement caching
  • Need to add metrics to monitor performance

Private Networks

It allows ipfs to only connect to other peers who have a shared secret key.

State

Stable but not quite ready for prime-time.

In Version

0.4.7

How to enable

Generate a pre-shared-key using ipfs-swarm-key-gen):

go get github.com/Kubuxu/go-ipfs-swarm-key-gen/ipfs-swarm-key-gen
ipfs-swarm-key-gen > ~/.ipfs/swarm.key

To join a given private network, get the key file from someone in the network and save it to ~/.ipfs/swarm.key (If you are using a custom $IPFS_PATH, put it in there instead).

When using this feature, you will not be able to connect to the default bootstrap nodes (Since we aren't part of your private network) so you will need to set up your own bootstrap nodes.

First, to prevent your node from even trying to connect to the default bootstrap nodes, run:

ipfs bootstrap rm --all

Then add your own bootstrap peers with:

ipfs bootstrap add <multiaddr>

For example:

ipfs bootstrap add /ip4/104.236.76.40/tcp/4001/p2p/QmSoLV4Bbm51jM9C4gDYZQ9Cy3U6aXMJDAbzgu2fzaDs64

Bootstrap nodes are no different from all other nodes in the network apart from the function they serve.

To be extra cautious, You can also set the LIBP2P_FORCE_PNET environment variable to 1 to force the usage of private networks. If no private network is configured, the daemon will fail to start.

Road to being a real feature

  • Needs more people to use and report on how well it works
  • More documentation
  • Needs better tooling/UX.

ipfs p2p

Allows tunneling of TCP connections through Libp2p streams. If you've ever used port forwarding with SSH (the -L option in OpenSSH), this feature is quite similar.

State

Experimental, will be stabilized in 0.6.0

In Version

0.4.10

How to enable

The p2p command needs to be enabled in the config:

> ipfs config --json Experimental.Libp2pStreamMounting true

How to use

Netcat example:

First, pick a protocol name for your application. Think of the protocol name as a port number, just significantly more user-friendly. In this example, we're going to use /x/kickass/1.0.

Setup:

  1. A "server" node with peer ID $SERVER_ID
  2. A "client" node.

On the "server" node:

First, start your application and have it listen for TCP connections on port $APP_PORT.

Then, configure the p2p listener by running:

> ipfs p2p listen /x/kickass/1.0 /ip4/127.0.0.1/tcp/$APP_PORT

This will configure IPFS to forward all incoming /x/kickass/1.0 streams to 127.0.0.1:$APP_PORT (opening a new connection to 127.0.0.1:$APP_PORT per incoming stream.

On the "client" node:

First, configure the client p2p dialer, so that it forwards all inbound connections on 127.0.0.1:SOME_PORT to the server node listening on /x/kickass/1.0.

> ipfs p2p forward /x/kickass/1.0 /ip4/127.0.0.1/tcp/$SOME_PORT /p2p/$SERVER_ID

Next, have your application open a connection to 127.0.0.1:$SOME_PORT. This connection will be forwarded to the service running on 127.0.0.1:$APP_PORT on the remote machine. You can test it with netcat:

On "server" node:

> nc -v -l -p $APP_PORT

On "client" node:

> nc -v 127.0.0.1 $SOME_PORT

You should now see that a connection has been established and be able to exchange messages between netcat instances.

(note that depending on your netcat version you may need to drop the -v flag)

SSH example

Setup:

  1. A "server" node with peer ID $SERVER_ID and running ssh server on the default port.
  2. A "client" node.

you can get $SERVER_ID by running ipfs id -f "<id>\n"

First, on the "server" node:

ipfs p2p listen /x/ssh /ip4/127.0.0.1/tcp/22

Then, on "client" node:

ipfs p2p forward /x/ssh /ip4/127.0.0.1/tcp/2222 /p2p/$SERVER_ID

You should now be able to connect to your ssh server through a libp2p connection with ssh [user]@127.0.0.1 -p 2222.

Road to being a real feature

  • More documentation

p2p http proxy

Allows proxying of HTTP requests over p2p streams. This allows serving any standard HTTP app over p2p streams.

State

Experimental

In Version

0.4.19

How to enable

The p2p command needs to be enabled in the config:

> ipfs config --json Experimental.Libp2pStreamMounting true

On the client, the p2p HTTP proxy needs to be enabled in the config:

> ipfs config --json Experimental.P2pHttpProxy true

How to use

Netcat example:

First, pick a protocol name for your application. Think of the protocol name as a port number, just significantly more user-friendly. In this example, we're going to use /http.

Setup:

  1. A "server" node with peer ID $SERVER_ID
  2. A "client" node.

On the "server" node:

First, start your application and have it listen for TCP connections on port $APP_PORT.

Then, configure the p2p listener by running:

> ipfs p2p listen --allow-custom-protocol /http /ip4/127.0.0.1/tcp/$APP_PORT

This will configure IPFS to forward all incoming /http streams to 127.0.0.1:$APP_PORT (opening a new connection to 127.0.0.1:$APP_PORT per incoming stream.

On the "client" node:

Next, have your application make a http request to 127.0.0.1:8080/p2p/$SERVER_ID/http/$FORWARDED_PATH. This connection will be forwarded to the service running on 127.0.0.1:$APP_PORT on the remote machine (which needs to be a http server!) with path $FORWARDED_PATH. You can test it with netcat:

On "server" node:

> echo -e "HTTP/1.1 200\nContent-length: 11\n\nIPFS rocks!" | nc -l -p $APP_PORT

On "client" node:

> curl http://localhost:8080/p2p/$SERVER_ID/http/

You should now see the resulting HTTP response: IPFS rocks!

Custom protocol names

We also support the use of protocol names of the form /x/$NAME/http where $NAME doesn't contain any "/"'s

Road to being a real feature

  • Needs p2p streams to graduate from experiments
  • Needs more people to use and report on how well it works / fits use cases
  • More documentation
  • Need better integration with the subdomain gateway feature.

Plugins

In Version

0.4.11

State

Experimental

Plugins allow adding functionality without the need to recompile the daemon.

Basic Usage:

See Plugin docs

Road to being a real feature

  • More plugins and plugin types
  • A way to reliably build and distribute plugins.
  • Better support for platforms other than Linux & MacOS
  • Feedback on stability

Directory Sharding / HAMT

In Version

  • 0.4.8:

    • Introduced Experimental.ShardingEnabled which enabled sharding globally.
    • All-or-nothing, unnecessary sharding of small directories.
  • 0.11.0 :

    • Removed support for Experimental.ShardingEnabled
    • Replaced with automatic sharding based on the block size

State

Replaced by autosharding.

The Experimental.ShardingEnabled config field is no longer used, please remove it from your configs.

go-ipfs now automatically shards when directory block is bigger than 256KB, ensuring every block is small enough to be exchanged with other peers

IPNS pubsub

In Version

0.4.14 :

  • Introduced

0.5.0 :

  • No longer needs to use the DHT for the first resolution
  • When discovering PubSub peers via the DHT, the DHT key is different from previous versions
    • This leads to 0.5 IPNS pubsub peers and 0.4 IPNS pubsub peers not being able to find each other in the DHT
  • Robustness improvements

0.11.0 :

  • Can be enabled via Ipns.UsePubsub flag in config

State

Experimental, default-disabled.

Utilizes pubsub for publishing ipns records in real time.

When it is enabled:

  • IPNS publishers push records to a name-specific pubsub topic, in addition to publishing to the DHT.
  • IPNS resolvers subscribe to the name-specific topic on first resolution and receive subsequently published records through pubsub in real time. This makes subsequent resolutions instant, as they are resolved through the local cache.

Both the publisher and the resolver nodes need to have the feature enabled for it to work effectively.

Note: While IPNS pubsub has been available since 0.4.14, it received major changes in 0.5.0. Users interested in this feature should upgrade to at least 0.5.0

How to enable

Run your daemon with the --enable-namesys-pubsub flag or modify your ipfs config and restart the daemon:

ipfs config --json Ipns.UsePubsub true

NOTE:

  • This feature implicitly enables ipfs pubsub.
  • Passing --enable-namesys-pubsub CLI flag overrides Ipns.UsePubsub config.

Road to being a real feature

  • Needs more people to use and report on how well it works
  • Pubsub enabled as a real feature

AutoRelay

In Version

  • 0.4.19 :
    • Introduced Circuit Relay v1
  • 0.11.0 :

State

Experimental, disabled by default.

Automatically discovers relays and advertises relay addresses when the node is behind an impenetrable NAT.

How to enable

Modify your ipfs config:

ipfs config --json Swarm.RelayClient.Enabled true

Road to being a real feature

  • needs testing
  • needs to be automatically enabled when AutoNAT detects node is behind an impenetrable NAT.

Strategic Providing

State

Experimental, disabled by default.

Replaces the existing provide mechanism with a robust, strategic provider system. Currently enabling this option will provide nothing.

How to enable

Modify your ipfs config:

ipfs config --json Experimental.StrategicProviding true

Road to being a real feature

  • needs real-world testing
  • needs adoption
  • needs to support all provider subsystem features
    • provide nothing
    • provide roots
    • provide all
    • provide strategic

GraphSync

State

Experimental, disabled by default.

GraphSync is the next-gen graph exchange protocol for IPFS.

When this feature is enabled, IPFS will make files available over the graphsync protocol. However, IPFS will not currently use this protocol to fetch files.

How to enable

Modify your ipfs config:

ipfs config --json Experimental.GraphsyncEnabled true

Road to being a real feature

  • We need to confirm that it can't be used to DoS a node. The server-side logic for GraphSync is quite complex and, if we're not careful, the server might end up performing unbounded work when responding to a malicious request.

Noise

State

Stable, enabled by default

Noise libp2p transport based on the Noise Protocol Framework. While TLS remains the default transport in go-ipfs, Noise is easier to implement and is thus the "interop" transport between IPFS and libp2p implementations.

Accelerated DHT Client

In Version

0.9.0

State

Experimental, default-disabled.

Utilizes an alternative DHT client that searches for and maintains more information about the network in exchange for being more performant.

When it is enabled:

  • DHT operations should complete much faster than with it disabled
  • A batching reprovider system will be enabled which takes advantage of some properties of the experimental client to very efficiently put provider records into the network
  • The standard DHT client (and server if enabled) are run alongside the alternative client
  • The operations ipfs stats dht and ipfs stats provide will have different outputs
    • ipfs stats provide only works when the accelerated DHT client is enabled and shows various statistics regarding the provider/reprovider system
    • ipfs stats dht will default to showing information about the new client

Caveats:

  1. Running the experimental client likely will result in more resource consumption (connections, RAM, CPU, bandwidth)
    • Users that are limited in the number of parallel connections their machines/networks can perform will likely suffer
    • Currently, the resource usage is not smooth as the client crawls the network in rounds and reproviding is similarly done in rounds
    • Users who previously had a lot of content but were unable to advertise it on the network will see an increase in egress bandwidth as their nodes start to advertise all of their CIDs into the network. If you have lots of data entering your node that you don't want to advertise consider using Reprovider Strategies to reduce the number of CIDs that you are reproviding. Similarly, if you are running a node that deals mostly with short-lived temporary data (e.g. you use a separate node for ingesting data then for storing and serving it) then you may benefit from using Strategic Providing to prevent advertising of data that you ultimately will not have.
  2. Currently, the DHT is not usable for queries for the first 5-10 minutes of operation as the routing table is being prepared. This means operations like searching the DHT for particular peers or content will not work
    • You can see if the DHT has been initially populated by running ipfs stats dht
  3. Currently, the accelerated DHT client is not compatible with LAN-based DHTs and will not perform operations against them

How to enable

ipfs config --json Experimental.AcceleratedDHTClient true

Road to being a real feature

  • Needs more people to use and report on how well it works
  • Should be usable for queries (even if slower/less efficient) shortly after startup
  • Should be usable with non-WAN DHTs