Commit Graph

340 Commits (71a2b37faba9586f4d1abbe818d60d03dc729f3b)

Author SHA1 Message Date
_ efc90ea29a 📦 build: add a build script just so that everything is in consistent paths 2021-01-20 20:12:04 -06:00
_ 20ee11b4f8 🚧 wip: working on key signing still 2021-01-20 23:24:55 +00:00
_ ddba8953fa 🚧 wip: working on process for a human key signing other keys 2021-01-19 20:58:24 -06:00
_ 02346c3285 ♻️ refactor: switch to Bytes typedef 2021-01-19 19:31:41 -06:00
_ 199aacadd3 ♻️ refactor 2021-01-19 19:10:33 -06:00
_ cc1c7c9229 update: human and machine files working well.
It turns out the bate secret key for machine files already has the pubkey
cached in it by libsodium, so I dropped that.
I'm also going to drop it from the internals, it seems simpler
2021-01-19 19:01:27 -06:00
_ 278d591954 update: add perms warning 2021-01-19 18:22:22 -06:00
_ ce917e7348 update: add `--file` command for debugging artifacts from BMC 2021-01-19 18:16:43 -06:00
_ b0b6c5672c update: improve CA key format
- Save with 0400 perms so PTTH won't accidentally serve them
- Save D-Bus machine ID if possible to detect when keys accidentally change machines
- Add random schema version
2021-01-19 17:59:49 -06:00
_ d7ed2ed931 test: fix tests 2021-01-19 23:27:33 +00:00
_ c40abb0fe6 🚧 wip: I was working on some port-forwarding idea.
It was going to be generic over TCP and use 2 HTTP streams, one each way.
The plan's written down somewhere.
2021-01-19 23:25:24 +00:00
_ f94b40b6b8 🚧 wip: further POC 2021-01-19 23:25:24 +00:00
_ 8d62b29319 update: both the downstream POCs work, with the bogus downstream. 2021-01-19 23:25:24 +00:00
_ 0cb24695d0 🚧 wip: idea for tunneling TCP over HTTP
There's a lot of missing pieces, but the big picture is like this:

- Use 2 completely separate HTTP streams, and try to keep them alive as long
as possible, each in basically half-duplex mode
- Each stream has a long-running PUT and GET, sort of like station307
- Each end has to be terminated by a native app that either connects to a local
TCP server, or acts as a local TCP server
- No clue how it would work for multiple connections on the same port. Poorly,
I guess?
- It's probably gonna run like garbage because we're splitting TCP into
2 TCP streams, and although backpressure might work, the ACKs will be less
efficient. And the congestion control might get confused

My only goal is to tunnel Tracy over it, so that I can have that remotely.
2021-01-19 23:25:24 +00:00
_ 574f660c1a 🚧 wip: can't remember what I was working on 2021-01-19 23:25:24 +00:00
_ 29a6ad20ee 🚧 wip: adding http service to ptth_kv 2021-01-19 23:25:24 +00:00
_ eb927ef80d test: ptth_kv is slower with async, but still fast enough 2021-01-19 23:25:24 +00:00
_ 27f31d0ef4 test: measure performance for KV store idea 2021-01-19 23:25:24 +00:00
_ ce3342d961 ♻️ refactor: splitting into in-mem and on-disk formats, for 'check key' cmd 2021-01-19 23:01:17 +00:00
_ 7b11633015 update: add keygen for root keys 2021-01-19 22:52:02 +00:00
_ 49a30866df 🚧 wip: considering passphrase-protected keys 2021-01-18 20:41:05 -06:00
_ 02b7cca354 update: working on sender role 2021-01-18 22:57:33 +00:00
_ dd6ddbcd80 update: remove un-needed base64 in more places 2021-01-18 22:23:38 +00:00
_ 7ed3ab27d3 update: switch to msgpack. I didn't know nlohmann already had that, it's way better for this case 2021-01-18 22:13:48 +00:00
_ 9de30a0dca Merge remote-tracking branch 'github/main' 2021-01-17 20:52:50 -06:00
_ 9f745d6175 🚧 wip 2021-01-17 20:52:36 -06:00
_ d7e9823678 🚧 wip: working on serialization 2021-01-17 19:17:06 -06:00
_ 6b4f9e2b00 🚧 wip 2021-01-17 18:31:47 -06:00
_ bc625095c7 update: establishing the receiver role clearly 2021-01-17 18:00:45 -06:00
_ fb1e133ca1 ♻️ refactor: Extract Instant struct 2021-01-17 17:31:28 -06:00
_ 026db25ba7 ♻️ refactor: extract verify_cert_and_data 2021-01-17 17:03:32 -06:00
_ 0fa43a71d2 ♻️ refactor 2021-01-17 15:58:35 -06:00
_ 8438ec3225 ♻️ refactor 2021-01-17 15:53:04 -06:00
_ 9c4fe4a26e ♻️ refactor 2021-01-17 15:45:59 -06:00
_ 3fdfc983e2 ♻️ refactor: splitting out util functions 2021-01-17 15:36:56 -06:00
_ f387c69858 update: better base64 lib 2021-01-17 10:16:57 -06:00
_ 0f0e59029f update: so I don't like this base64 lib anymore. It has no error handling. 2021-01-17 09:52:38 -06:00
_ 1b2e5adc84 🚧 wip 2021-01-17 09:11:21 -06:00
_ 11d1f868d7 🚧 wip: making some examples / demos for easy ways to use libsodium 2021-01-16 18:44:11 -06:00
_ 9486ebf178 Merge branch 'laptop'
Doing `-s ours` to get rid of a branch that seems unused
2021-01-16 17:25:03 -06:00
_ 88e7839841 🚧 wip: outlining idea for Redis-like KV store in ptth_server 2021-01-03 18:09:00 +00:00
_ 075fd604ee 📝 docs: add idea for Redis-like volatile KV store in the server 2021-01-03 04:45:14 +00:00
_ b62c1424fa 📝 docs: document wget spidering 2020-12-21 22:16:12 -06:00
_ 7645831a09 🐳 build: fix Dockerfile by adding ptth_tail skeleton
It's a bit silly, but because of the workspace setup, we can't build
ptth_relay unless all the other projects have a skeleton.
2020-12-21 17:13:01 +00:00
_ 0a46fc05dc 🐛 bug: fix 30-day scraper keys having 7 days of validity.
This won't affect anything, because I had manually written the not_after for
the testing keys. Even the automated tests weren't using the new_30_day
function
2020-12-21 14:26:51 +00:00
_ fa070ea7d0 📝 docs: planning auth route 2020-12-21 14:19:50 +00:00
_ 0d155a5b36 📝 docs: update todos 2020-12-20 20:52:37 -06:00
_ cbf5583d06 update: tracing RSS MiB 2020-12-20 20:41:02 -06:00
_ 137e8e1bf8 update: add prototype for `tail -f` based on polling 2020-12-20 18:59:05 -06:00
_ e79925dc14 update: ptth_server metrics are at a stopping point for now 2020-12-20 18:09:24 -06:00