Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: browser support via wasm + helia #99

Draft
wants to merge 9 commits into
base: main
Choose a base branch
from
Draft

Conversation

n0izn0iz
Copy link
Contributor

@n0izn0iz n0izn0iz commented Jun 10, 2024

Depends on berty/go-orbit-db#151

Demo

Screen.Recording.2024-06-10.at.17.16.39.mov

Usage

cd wasm && make serve the navigate to "localhost:4242" in two browsers

Caveats

  • The group invitation is printed in the console only, you can then paste it in the input next to "join" button and click it
  • You need to dial the other peer manually via helia.libp2p.dial(Libp2PPeerId.peerIdFromString("<peerId-of-other-browser>")) in the browser console
  • It only got it to work between a firefox and a chrome, not 2 chrome or 2 ff, and only once bidirectionally

Signed-off-by: Norman Meier <[email protected]>
Signed-off-by: Norman Meier <[email protected]>
Signed-off-by: Norman Meier <[email protected]>
Signed-off-by: Norman Meier <[email protected]>
Signed-off-by: Norman Meier <[email protected]>
Signed-off-by: Norman Meier <[email protected]>
Signed-off-by: Norman Meier <[email protected]>
Copy link

guardrails bot commented Jun 10, 2024

⚠️ We detected 9 security issues in this pull request:

Insecure File Management (1)
Severity Details Docs
Medium Title: Sensitve Directories Exposed vis http.Dir
http.ListenAndServe(`:4242`, http.FileServer(http.Dir(`.`)))
📚

More info on how to fix Insecure File Management in Go.


Insecure Network Communication (1)
Severity Details Docs
High Title: Plaintext HTTP Server
http.ListenAndServe(`:4242`, http.FileServer(http.Dir(`.`)))
📚

More info on how to fix Insecure Network Communication in Go.


Vulnerable Libraries (7)
Severity Details
High pkg:golang/github.com/ipfs/[email protected] upgrade to: > v0.5.0
High pkg:golang/github.com/ipld/[email protected] upgrade to: > v0.20.0
High pkg:golang/github.com/ipfs/[email protected] upgrade to: > v0.10.0
High pkg:golang/github.com/ipfs/[email protected] upgrade to: > v0.4.0
High pkg:golang/github.com/ipfs/[email protected] upgrade to: > v1.2.0
High pkg:golang/github.com/ipfs/[email protected] upgrade to: > v0.1.1
High pkg:golang/github.com/ipfs/[email protected] upgrade to: > v0.2.0

More info on how to fix Vulnerable Libraries in Go.


👉 Go to the dashboard for detailed results.

📥 Happy? Share your feedback with us.

Copy link

This PR/issue depends on:

@n0izn0iz n0izn0iz marked this pull request as draft June 10, 2024 15:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant