- stop putting inbound addresses in the address book
- drop address book entries that can't be used for outbound connections
- distinguish between temporary inbound and permanent outbound peer
addresses
- also create variants to handle proxy connections
(but don't use them yet)
- avoid tracking connection state for isolated connections
- document security constraints for the address book and peer set
|
||
|---|---|---|
| .. | ||
| candidate_set.rs | ||
| initialize.rs | ||
| inventory_registry.rs | ||
| set.rs | ||
| unready_service.rs | ||