-
Notifications
You must be signed in to change notification settings - Fork 290
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Add option to disable DNS lookups in toxcore. #2694
Conversation
deae4d9
to
f1045da
Compare
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## master #2694 +/- ##
==========================================
+ Coverage 73.03% 73.10% +0.07%
==========================================
Files 149 149
Lines 30531 30537 +6
==========================================
+ Hits 22298 22325 +27
+ Misses 8233 8212 -21 ☔ View full report in Codecov by Sentry. |
This should be labeled with api-break as changes it the fields in toxOptions. |
maybe, direct usage of the options struct is deprecated. |
https://github.com/TokTok/c-toxcore/blob/master/toxcore/tox.h#L526-L527
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviewed 11 of 13 files at r1, 1 of 1 files at r2, 1 of 1 files at r3, all commit messages.
Reviewable status: complete! 1 of 1 approvals obtained
Adding getters and setters is a part of the ABI in semantic versionsing: #2702 |
Can you quote and link to a spec of semantic versioning that confirms this? |
I've QAed Python for 2 of the biggest companies in the world, and they have coding standards that specify this sort of thing (in one of them I wrote the first draft for Python), but I can't cite their internal documents. In brief:
Adding getters and setters is adding new funtionality, so must be in a new minor. I also know this is the case for the Python project from having submitted a module into the Python standard library: their developers all know the rules and follow them strictly. You're "releasing" big aglomerations rarely (years) and features go in without notice or planning or discussion. I assume that this may be the reason the project has lost so many developers and GUIs. |
I understand now where the confusion is. Let me clarify: in toxcore, we've decided to use semver without patch, and shifted the version right by 1 position: That is, until we release 1.0.0, at which point it'll be semver with patch. |
You're right - I missed that comment. |
f4cbc97
to
df6d87e
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I approve the code changes, but why is the behavoir explained inverted. Why is dns_enabled
explained by the not
state?
Because it's enabled by default, and has been true forever, so I figured it would be clearer to existing client devs if we explain what happens if you disable it explicitly. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviewed 3 of 3 files at r4, all commit messages.
Reviewable status: complete! 1 change requests, 1 of 1 approvals obtained (waiting on @iphydf)
toxcore/tox.h
line 685 at r4 (raw file):
* * Default: true. May become false in the future (0.3.0). */
This comment block is exceeding the 80-column width.
When this will be merged? I'm waiting for a long time |
8063f4d
to
9922a0d
Compare
b78ea61
to
fea022b
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviewable status: complete! 1 change requests, 1 of 1 approvals obtained (waiting on @nurupo)
toxcore/tox.h
line 685 at r4 (raw file):
Previously, nurupo wrote…
This comment block is exceeding the 80-column width.
Done.
Allows clients to prevent leaking IP addresses through DNS lookups. This option, together with disabling Tox UDP, entirely prevents any UDP packets being sent by toxcore.
Allows clients to prevent leaking IP addresses through DNS lookups. This option, together with disabling Tox UDP, entirely prevents any UDP packets being sent by toxcore.
This change is