File: control

package info (click to toggle)
golang-github-arceliar-ironwood 0.0~git20221115.ec61cea-1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 308 kB
  • sloc: makefile: 2
file content (38 lines) | stat: -rw-r--r-- 1,838 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
Source: golang-github-arceliar-ironwood
Maintainer: Debian Go Packaging Team <team+pkg-go@tracker.debian.org>
Uploaders: John Goerzen <jgoerzen@complete.org>
Section: golang
Testsuite: autopkgtest-pkg-go
Priority: optional
Build-Depends: debhelper-compat (= 13),
               dh-golang,
               golang-go (>= 2:1.17~0),
               golang-github-arceliar-phony-dev,
               golang-golang-x-crypto-dev
Standards-Version: 4.6.0
Vcs-Browser: https://salsa.debian.org/go-team/packages/golang-github-arceliar-ironwood
Vcs-Git: https://salsa.debian.org/go-team/packages/golang-github-arceliar-ironwood.git
Homepage: https://github.com/Arceliar/ironwood
Rules-Requires-Root: no
XS-Go-Import-Path: github.com/Arceliar/ironwood

Package: golang-github-arceliar-ironwood-dev
Architecture: all
Multi-Arch: foreign
Depends: golang-github-arceliar-phony-dev,
         golang-golang-x-crypto-dev,
         ${misc:Depends}
Description: Routing library with public keys as addresses (library)
 Ironwood is a routing library with a net.PacketConn-compatible interface
 using ed25519.PublicKeys as addresses. Basically, you use it when you
 want to communicate with some other nodes in a network, but you can't
 guarantee that you can directly connect to every node in that network.
 It was written to test improvements to / replace the routing logic in
 Yggdrasil (https://github.com/yggdrasil-network/yggdrasil-go), but it may
 be useful for other network applications.
 .
 Note: Ironwood is pre-alpha work-in-progress. There's no stable API,
 versioning, or expectation that any two commits will be compatible with
 each other. Also, it hasn't been audited by a security expert. While the
 author is unaware of any security vulnerabilities, it would be wise to
 think of this as an insecure proof-of-concept. Use it at your own risk.