Drasyl

Latest version: v0.10.0

Safety actively analyzes 688486 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 3

1.2

docker push drasyl/drasyl:1
docker push drasyl/drasyl:latest

1.2.0

0.10.0

Added

-
-
-

Changed

-
-
-

Fixed

-
-
-

0.9.0

Added

- It is now easier to create drasyl node through the bootstrap interface.
Refer [our documentation](https://docs.drasyl.org/advanced-usage/bootstrapping/) for more
information.
- Added support for remote message invocations over drasyl.
Refer [our documentation](https://docs.drasyl.org/advanced-usage/remote-message-invocation/)
for more information.
- Added support for decentralized membership managed using the CYCLON protocol.
Refer [our documentation](https://docs.drasyl.org/advanced-usage/membership-management/) for
more information.
- Added support for the publish/subscribe messaging pattern.
Refer [our documentation](https://docs.drasyl.org/advanced-usage/publish-subscribe/) for
more information.
- Added support for distributed lookup service using the Chord protocol.
Refer [our documentation](https://docs.drasyl.org/advanced-usage/distributed-lookup/) for
more information.
- Created shared C library `libdrasyl` for the `DrasylNode` interface.
- Created Python binding `drasyl` for the shared C library. Can be installed through [PyPI](https://pypi.org/project/drasyl/).

Changed

- Dependencies have been updated.
- `DrasylNode` now provides guareented and in-order message delivery by default. Can be disabled
through configuration parameter `drasyl.remote.message.arq.enabled`.
- Moved optional classes from Maven module `org.drasyl:drasyl-core` to `org.drasyl:drasyl-extras`.
- `DrasylChannel` and `DrasylServerChannel` are now running on `DefaultEventLoopGroup` that provide
a better performance compared to `NioEventLoopGroup`.

Fixed

- CLI sub-command `tun`: Ensure that a route is fully removed upon request.
- Fixed problem with UDP multicast server unable to join multicast group on dual stack systems (215).
- Future returned by `DrasylNodeshutdown` is no longer completed too early (202).

0.8.0

Added

- NAT Traversal is now also able to establish a P2P connection if both devices are behind a shared
NAT device that does not support [hairpinning](https://datatracker.ietf.org/doc/html/rfc4787#section-6).
- Node: Added `UnconfirmedAddressResolveHandler` that does send messages to unconfirmed (sender)
addresses as last-resort (before the messages were simply dropped).
- CLI: Option `--mtu` to sub-command `tun` added.
- CLI: Option `--rc-jsonrpc-tcp` and `--rc-jsonrpc-http` to sub-command `node` added.
- CLI: `node-rc` sub-command added.
- CLI: Option `--rc-jsonrpc-tcp` and `--rc-jsonrpc-http` to sub-command `tun` added.
- CLI: `tun-rc` sub-command added.
- CLI: `tun` command will not work within docker.

Changed

- CLI: Improve `tun` sub-command performance by tweaking default MTU size.
- CLI: Instead of a random port, drasyl now listens on a port that is derived from the identity.
- Dependencies have been updated.

Fixed

- Internet discovery now regularly checks if the super peer DNS records have changed.
- DrasylNode: Groups plugin is working again.
- [guava](https://github.com/google/guava) dependency removed.

0.7.0

Upgrade Notes

1. We did it again: The overlay protocol has been changed with breaking changes making it impossible
to communicate with peers running older drasyl versions.
1. This version is introduces a new identity file format, every node will recreate a new identity on
first start. If you would like to reuse your pre-existing identity, you have to migrate the file
format by yourself. Asume you have the current file `drasyl.identity.json`:
json
{
"proofOfWork" : -2144920491,
"identityKeyPair" : {
"publicKey" : "feb2fa8a69e2a59ce7586349b8e8a44610d902ef2a30b1a46ebc5ff989813033",
"secretKey" : "d716fdc9a164bea60a179eacf868416695ad8757035d0d83abd5a2b362bfa221feb2fa8a69e2a59ce7586349b8e8a44610d902ef2a30b1a46ebc5ff989813033"
},
"keyAgreementKeyPair" : {
"publicKey" : "62c201382e37a50c3ed20f15ccb5ba970a264a2765f8f8c6f8e1c27b2454ca34",
"secretKey" : "105672a9d44c3be1ba4b777f0c7d6cf711fb73defd404db7644f546ea71f0f5d"
}
}

Then you need to create a **new** file `drasyl.identity` with the following format:
ini
[Identity]
SecretKey = d716fdc9a164bea60a179eacf868416695ad8757035d0d83abd5a2b362bfa221feb2fa8a69e2a59ce7586349b8e8a44610d902ef2a30b1a46ebc5ff989813033
ProofOfWork = -2144920491


Added

- CLI: `generate-identity` sub-command added.
- CLI: `generate-pow` sub-command added.
- CLI: `tun` sub-command added.
- CLI: `generate-completion` sub-command added.
- CLI: `--no-protocol-arming` option added.
- Broadcast-based LAN Discovery added. Can be used programatically. More
information: https://git.informatik.uni-hamburg.de/sane-public/drasyl/-/merge_requests/680

Changed

- Dependencies have been updated.
- Speed up direct connection establishment when traversing symmetrics NATs.
- Switch to more compact (INI-formatted) identity file format.
- CLI: `perf client`'s `--mps` option default value has changed to `0`. This causes the client to
send messages as quickly as possible. to send messages as fast as possible.

Fixed

- Fix endless identity creation, when none of the available nonces result in a valid identity.
- Fix IP multicast discovery for IPv6-only environments.
- Fix SSDP discovery for IPv6-only environments.
- Stop sending IP multicast messages to super peers when node is running in TCP-fallback mode.
- Fix problem with `null` message when using `BehavioralDrasylNode`.

Page 1 of 3

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.