15 releases

new 0.2.10 Nov 20, 2024
0.2.9 Jun 12, 2024
0.2.8 Nov 13, 2023
0.2.2 Jul 26, 2023
0.1.1 Mar 20, 2023

#283 in Cryptography

Download history 65171/week @ 2024-07-31 77890/week @ 2024-08-07 75849/week @ 2024-08-14 71950/week @ 2024-08-21 82763/week @ 2024-08-28 83837/week @ 2024-09-04 75138/week @ 2024-09-11 81399/week @ 2024-09-18 78178/week @ 2024-09-25 86413/week @ 2024-10-02 87905/week @ 2024-10-09 89956/week @ 2024-10-16 86336/week @ 2024-10-23 85710/week @ 2024-10-30 88499/week @ 2024-11-06 81263/week @ 2024-11-13

359,514 downloads per month
Used in 368 crates (64 directly)

MIT license

105KB
2K SLoC

Central repository for work on libp2p

dependency status Crates.io docs.rs docs.rs master

This repository is the central place for Rust development of the libp2p spec.

Getting started

Repository Structure

The main components of this repository are structured as follows:

  • core/: The implementation of libp2p-core with its Transport and StreamMuxer API on which almost all other crates depend.

  • transports/: Implementations of transport protocols (e.g. TCP) and protocol upgrades (e.g. for authenticated encryption, compression, ...) based on the libp2p-core Transport API.

  • muxers/: Implementations of the StreamMuxer interface of libp2p-core, e.g. (sub)stream multiplexing protocols on top of (typically TCP) connections. Multiplexing protocols are (mandatory) Transport upgrades.

  • swarm/: The implementation of libp2p-swarm building on libp2p-core with the central interfaces NetworkBehaviour and ConnectionHandler used to implement application protocols (see protocols/).

  • protocols/: Implementations of application protocols based on the libp2p-swarm APIs.

  • misc/: Utility libraries.

  • libp2p/examples/: Worked examples of built-in application protocols (see protocols/) with common Transport configurations.

Community Guidelines

The libp2p project operates under the IPFS Code of Conduct.

tl;dr

  • Be respectful.
  • We're here to help: abuse@ipfs.io
  • Abusive behavior is never tolerated.
  • Violations of this code may result in swift and permanent expulsion from the IPFS [and libp2p] community.
  • "Too long, didn't read" is not a valid excuse for not knowing what is in this document.

Maintainers

(In alphabetical order.)

Notable users

(open a pull request if you want your project to be added here)

  • COMIT - Bitcoin–Monero Cross-chain Atomic Swap.
  • Forest - An implementation of Filecoin written in Rust.
  • fuel-core - A Rust implementation of the Fuel protocol.
  • HotShot - Decentralized sequencer in Rust developed by Espresso Systems.
  • ipfs-embed - A small embeddable ipfs implementation used and maintained by Actyx.
  • Homestar - An InterPlanetary Virtual Machine (IPVM) implementation used and maintained by Fission.
  • beetle - Next-generation implementation of IPFS for Cloud & Mobile platforms.
  • Lighthouse - Ethereum consensus client in Rust.
  • Locutus - Global, observable, decentralized key-value store.
  • OpenMina - In-browser Mina Rust implementation.
  • rust-ipfs - IPFS implementation in Rust.
  • Safe Network - Safe Network implementation in Rust.
  • Starcoin - A smart contract blockchain network that scales by layering.
  • Subspace - Subspace Network reference implementation
  • Substrate - Framework for blockchain innovation, used by Polkadot.
  • Taple - Sustainable DLT for asset and process traceability by OpenCanarias.
  • Ceylon - A Multi-Agent System (MAS) Development Framework.

lib.rs:

A node's network identity keys.

Such identity keys can be randomly generated on every startup, but using already existing, fixed keys is usually required. Though libp2p uses other crates (e.g. ed25519_dalek) internally, such details are not exposed as part of libp2p's public interface to keep them easily upgradable or replaceable (e.g. to ed25519_zebra). Consequently, keys of external ed25519 or secp256k1 crates cannot be directly converted into libp2p network identities. Instead, loading fixed keys must use the standard, thus more portable binary representation of the specific key type (e.g. ed25519 binary format). All key types have functions to enable conversion to/from their binary representations.

Dependencies

~0.5–10MB
~126K SLoC