-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Leverage /https peers #66
Milestone
Comments
lidel
added this to the 3 - Enhancing User Experience and Exploration of Alternate Channels milestone
Sep 14, 2023
John-LittleBearLabs
added a commit
that referenced
this issue
Jan 11, 2024
John-LittleBearLabs
added a commit
that referenced
this issue
Jan 12, 2024
John-LittleBearLabs
added a commit
that referenced
this issue
Jan 15, 2024
John-LittleBearLabs
added a commit
that referenced
this issue
Jan 17, 2024
John-LittleBearLabs
added a commit
that referenced
this issue
Jan 25, 2024
John-LittleBearLabs
added a commit
that referenced
this issue
Jan 29, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
This is a subset of #42 limited to leveraging content providers that announce
/https
and/http/tls
multiaddrs.How would this work?
Content providers with
/https
and/http/tls
could work today. These are plain HTTP Gateways compatible with https://specs.ipfs.tech/http-gateways/trustless-gateway/ specification, require no libp2p, we could start prototyping with them for nowFor example all CIDs hosted by https://nft.storage/ are provided at
/dns4/dag.w3s.link/tcp/443/https
. This provider multiaddress is returned for /routing/v1 query: https://cid.contact/routing/v1/providers/bafybeigdyrzt5sfp7udm7hu76uh7y26nf3efuylqabf3oclgtqy55fbzdiI think MVP here is that if ipfs-chromium is not able to fetch CID from the gateway pool it has, it fallbacks to finding providers via
/routing/v1
endpoint(s).How to test this?
For now, use local endpoint. After Kubo 0.23 ships it will be possible to prototype against local instance by setting
Gateway.ExposeRoutingAPI
totrue
(release notes)Soon after, we want to expose it on
https://ipfs.io/routing/v1
and we expect that over time, some other gateways will expose it as well, allowing for redundancy/fallback. This will removeipfs.io
as a single point of failure, and increase utility of gateways beyond content retrieval.The text was updated successfully, but these errors were encountered: