Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Signal IPFS hashes in HTTP headers #44

Closed
flyingzumwalt opened this issue Feb 18, 2017 · 6 comments
Closed

Signal IPFS hashes in HTTP headers #44

flyingzumwalt opened this issue Feb 18, 2017 · 6 comments

Comments

@flyingzumwalt
Copy link
Contributor

This is described in an issue @nicola wrote in IPFS/notes

More info to come.

@ghost
Copy link

ghost commented Feb 19, 2017

I'm not sure which notes issue you are referring to. Is this about having the websockets transport listener on the gateway? We've got it covered in #34 and in fact already have a hacky gateway-listener on https://strawberry.i.ipfs.io/ and https://blueberry.i.ipfs.io/ -- this is through nginx hackery at the moment, ideally the websockets listener will work out of the box with the go-ipfs gateway, e.g. also on localhost:8080.

@nicola
Copy link
Member

nicola commented Feb 19, 2017

This is a follow up from this: ipfs/notes#184

The idea is that one could use HTTP requests to gateway.ipfs.io (or any other gateway) that mount /ipfs or /ipfs/hash and announce it in the HTTP Headers, so that we could intercept that, add the gateway as a peer and serve that request via IPFS. In this way you can have a somewhat web-compatible IPFS.

How does that sound?

@ghost
Copy link

ghost commented Feb 20, 2017

I have no idea what you're talking about :)

@ghost
Copy link

ghost commented Feb 20, 2017

Okay I think I understand. This boils down to sending a header which signals the respective hash of the response entity, and somehow signaling that there's websockets transport mounted on the same gateway.

@nicola
Copy link
Member

nicola commented Feb 20, 2017

@lgierth I am sorry, when I wrote that, I felt it was really condensed and rushed. It is about what you are saying, but let me write it here for the reader:

  1. Web browser does an HTTP GET on a web address
  2. HTTP Response announces:
    • the IPFS path that is mounted behind that URL, for example:
      • http://gateway.ipfs.io/ mounts /
      • http://nicola.io/blog mounts /ipfs/nicolahash/blog
    • (optional) the multiaddress of the website serving this data on IPFS
  3. Web browser intercepts the hash and the multiaddress and proxy that request via IPFS

@ghost ghost changed the title Use a transport upgrade header to intercept gateway urls Signal IPFS hashes in HTTP headers Apr 18, 2017
@ghost ghost added topic/dependencies Topic dependencies specs developers labels Apr 18, 2017
@ghost
Copy link

ghost commented Apr 18, 2017

Closing in favor of #50

@ghost ghost closed this as completed Apr 18, 2017
This issue was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants