►
From YouTube: Swarm APIs
Description
In this presentation from Day 2 of the #SwarmOrangeSummit, Swarm’s developer @acud gives a talk on Swarm APIs. Since last year Swarm has received an upgrade in the form of three new supported Bzz API schemes: list, hash and resource. In the presenation he walks the audience through the steps of how to run a Swarm node and how to use the new Bzz schemes.
A
So
morning
my
name
is
al
adhim.
The
latest
addition
to
the
swarm
team
started
them
a
couple
of
months
ago
and
I'm
gonna
talk
about
swarm
api's
today,
so
yeah,
a
little
bit
about
myself,
is
come
from
in
the
last
couple
of
years
from
more
corporate
web
development
background
before
that,
I
was
doing
all
sorts
of
weird
stuff
like
homeland
security
and
embedded
development
and
yeah.
So
let's
talk
about
swarm
API.
A
A
No
so
yeah
we
introduced
the
encryption
lately.
So
in
the
last
few
weeks
this
is
counter
mode
encryption
and
it
has.
You
could
distinguish
the
results
of
encrypted
content
by
double
length,
references
which
are
different
from
our
current
double
lengths
in
comparison
to
the
existing
references
that
you
would
get
normally
from
Swan
from
unencrypted
uploads,
so
yeah
it
has
its
own.
The
CLI
on
HTTP
implementations
so
and
thing
you
should
know
at
the
at
the
moment
about
our
encryption
is
that
it
is
non-deterministic
non-id
important
as
of
such,
because
we
generate
random
encryption
keys.
A
Well,
so
if
you
upload
the
same
content,
basically
it
would
get
different
hashes
and
the
different
references
yeah.
So
is
it
supported
through
using
busy,
zero
and
or
normal
bzz
slash
encrypt
when
you're,
when
you
upload
or
using
the
encrypts
for
like
when
you're
uploading
from
a
CLI
yeah,
so
we
have
a
year
ago,
so
we
had
just
busy
busy
zero,
and
this
is
immutable.
A
But
these
days
we
have
three
more
basically
schemes
that
are
supported
through
the
BTC
suit,
so
we
have
list
hash
and
resource,
so
I
would
yeah
walk
through
the
existing
schemes
and
a
bit
about
the
new
ones,
so
the
BCC
suit,
basically,
you
can
walk
through,
manifests
and
retrieve
metadata
about
files
and
yeah.
So
this
is
the
most
basic
scheme
and
you
can
also
transparently
get
content
which
is
behind
manifests
because
manifests
have
a
sort
of
like
a
default
path
behind
them.
A
B
A
A
A
A
A
A
For
example,
also,
this
would
actually
point
to
the
manifest,
so
you
get
the
manifest
directly
so
yeah.
There
are
different
use
cases
for
each
one
of
these
schemes
and
I
hope
that
we
could
in
the
afternoon.
Maybe
if
you
would
like
to
try
it
out
and
to
give
feedback
also
and
ask
questions
about
how
how
to
use
each
one
of
the
schemes
and
I
would
be
happy
to
assist.
If
somebody
wants
to
do
some
hacking
and
to
try
out
some
examples,
yeah
so.
A
A
And
you
could
expect
in
the
upcoming
period
to
have
fuse
integration
directly
with
the
CLI,
so
you
don't
have
to
go
through
actually
working
with
it
through
the
JSON
RPC,
which
would
make
things
a
bit
easier
and
we're
still
ironing
out
some
description.
Cysts.
We
have
an
HTTP
API,
but
it
will
be
more
coherent,
I
guess
in
the
upcoming
weeks,
yeah.
So
integrating
you
should.
A
A
Swaps,
we're
in
swindle
will
be
available
also
through
RPC,
so
yeah,
and
so
to
touch
a
few
points
about
how
you
could
actually
run
a
swarm.
Node
so
have
a
few
few
possibilities.
One
of
them
is
to
run
a
participating
node
on
the
main
network
chestnut
that
might
require
bootstrapping
it
with
known
addresses,
which
is
all
in
the
documentation.
A
Which
was
actually
revamped
and
I
will
show
you
in
a
bit.
You
have
also
signal
turn
mode
if
you
want
just
your
local
development
just
to
test
out
stuff.
So
it's
also
fully
documented
on
how
to
actually
do
all
of
this
and
the
docker
container.
You
can
run
a
single
container.
Naturally,
you
can
just
build
build
the
container
and
run
it
or
you
can
run
a
fully
fledged
swarm
with
the
Amish
is
repository
which
is
on
this
address.
A
A
So
this
is
very
important
and
we're
really
working
on
this
there's
more
things
to
come,
like
access,
control
and
erasure
coding,
which
will
be
as
part
of
the
POC
for
and
yeah
I,
also
as
part
of
POC
4.
So
we
aim
to
really
standardize
and
make
our
suit
of
protocols
much
more
solid
and
robust,
so
that
people
can
really
build
and
rely
on
these
protocols
and
integrate
them.
They
will
be
integrated
also
into
mist
and
into
ENS
as
part
of
the
infrastructure.
A
A
A
Regardless
we
are
very
much
open
to
whatever
you
have
to
if
you
have
any
feedback
about
our
APRs
and
how
you
would
actually
like
to
see
them.
If
you
find
any
discrepancies
or
points
where
you
think
we
you
could
do
better
so
yeah
we're
actually
really
open
to
hear
that,
so
you
can
get
in
touch
yeah
and
regardless
we're
working
on
a
lot
of
things
to
actually
make
the
experience
much
better
in
regard
in
any
sense
of
usage.