-
-
Notifications
You must be signed in to change notification settings - Fork 501
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DietPi-Software | IPFS Node #4236
Conversation
Well, I tried updating VirtualBox and now the kernel module is not loading. Time to start using QEMU. |
I like the idea to merge nodes for distributed projects. Probably the decentralised search engines YaCy and SearX (not added yet) could be added there as well, as the local node as well contributes to the global network. |
Coincidentally, I was planning to do SearX sometime soon. |
Related to IPFS? You mean updating the desktop application or the DietPi guest system? |
It was the desktop application, and I hadn't even switched to the IPFS branch yet, so almost certainly not related. |
Fixed now (broken permissions on the kext directory). |
Online docs required: MichaIng/DietPi-Docs#425 |
One error during startup:
https://github.com/lucas-clemente/quic-go/wiki/UDP-Receive-Buffer-Size
Shall we implement an Another question: I don't see a reason to have the |
Let's add the file, at least for the sake of mitigating the error. It seems that the |
What has the |
Ah. In that case, yes, let's remove it from the |
Okay, I'm adding the change, including the CLI alias and the receive buffer raise. |
+ DietPi-Software | IPFS: Do not add service user to "dietpi" group. Instead, to assure all login users call the correct instance via correct service user, create a CLI alias to invoke the CLI via "sudo -u ipfs". + DietPi-Software | IPFS: Raise receive buffer by default to meet the recommendation from the IPFS wiki and mitigate the related error on service start + DietPi-Software | IPFS: Add an IPFS node API docs link to the systemd unit
The web interface is unprotected by default. Is there a way at application level to enable login authentication, limit access to local network or such? |
I'll merge it, we can further test and think about web UI protection in the issue. |
Status: Ready
Reference: #4232
Commit list/description: