Commit Graph

1458 Commits

Author SHA1 Message Date
Hector Sanjuan
b1996970c5 ipfscluster.go: Add stops at the end of sentences 2019-05-13 23:22:08 +02:00
Hector Sanjuan
21032f2101 Raft: remove TODO. Trust all peers. 2019-05-13 23:22:08 +02:00
Hector Sanjuan
d468ea5d31 crdt: add test for DistrustPeer 2019-05-13 23:22:08 +02:00
Hector Sanjuan
816449d9a5 policygen: fix typo 2019-05-13 23:22:08 +02:00
Hector Sanjuan
de2e64e1e0 RPC Auth: make policygen.go generate a full rpc_policy.go
So that the file can be replaced. Helpers: "make" and "make install"
2019-05-13 23:22:08 +02:00
Hector Sanjuan
a2d8ce2ab6
Avoid using Sprintf("%s.%s")
Co-Authored-By: Adrian Lanzafame <adrianlanzafame92@gmail.com>
2019-05-10 11:52:37 +01:00
Hector Sanjuan
fba230fff9
Fix policygen.go path in comment
Co-Authored-By: Adrian Lanzafame <adrianlanzafame92@gmail.com>
2019-05-10 11:50:42 +01:00
Hector Sanjuan
a0eeddfae7 Test: remove removed endpoints from mock RPC 2019-05-09 22:52:02 +02:00
Hector Sanjuan
dbc52ae981 rpc auth: golint 2019-05-09 22:36:03 +02:00
Hector Sanjuan
6530808298 rpc auth: adjust tests to work with trusted-peer-enabled crdts component 2019-05-09 21:24:56 +02:00
Hector Sanjuan
a86c7cae2b rpc auth: handle some auth errors gracefully
particuarly we will ignore authorization errors for some broadcasts and somply
not include those responses in the assembled one.
2019-05-09 21:23:49 +02:00
Hector Sanjuan
949e6f2364 RPC auth: Support Trusted Peers in CRDT consensus component.
TrustedPeers are specified in the configuration. Additional peers
can be added at runtime with Trust/Distrust functions.

Unfortunately we cannot use consensus.PeerAdd as a way to trust a peer as
cluster.PeerAdd+Join can be called by any peer and this calls
consensus.PeerAdd.

The result is consensus.PeerAdd doing a lot in Raft while consensus.Trust does
nothing, while in CRDTs consensus.Trust does something but consensus.PeerAdd
does nothing. But this is more or less consistent.
2019-05-09 19:48:40 +02:00
Hector Sanjuan
c5a2e7fdc5 RPC auth: Fix tests
I cannot have RPCAPIs expose a SvcID() method as gorpc will warn about it not
having the right signature. So I have created an RPCServiceID() method instead.
2019-05-09 16:33:59 +02:00
Hector Sanjuan
70f4cad613 RPC Auth: start using the RPC policy in the RPC server. 2019-05-09 15:14:26 +02:00
Hector Sanjuan
1a4ff6a500 RPC auth: Define Default RPC policy and carry it in the cluster config
While right now it is not allowed for the user to overwrite any entries
in the default policy from the JSON, this should be possible (and easy)
in the future.
2019-05-09 14:48:23 +02:00
Hector Sanjuan
2ed48b6ac4 RPC auth: Rework PeerAdd and Join
PeerAdd called RPC endpoints for `LogMetric` and `ConnectSwarms`
remotely. However, I think similar effect can be achieved by calling
these from the Join() function locally.

In particular, ConnectSwarms was called when maybe the joining peer did not
even know about the other peers in the Cluster. Now this is delayed until some
ping metrics have come through.
2019-05-09 14:19:07 +02:00
Hector Sanjuan
40fb0761da RPC Auth: Add policygen.go: a tool to list all RPC endpoints. 2019-05-09 14:18:12 +02:00
Hector Sanjuan
26b0949b5e
Merge pull request #769 from ipfs/deps/update
Update deps
2019-05-08 13:24:21 +01:00
Hector Sanjuan
5fc5c6d38c Re-update 2019-05-08 13:33:22 +02:00
Hector Sanjuan
8b19f812c6
Merge pull request #773 from ipfs/feat/component-rpc-apis
RPC: Give each component a different RPC Service
2019-05-07 10:57:43 +01:00
Hector Sanjuan
3d49ac26a5 Feat: Split components into RPC Services
I had thought of this for a very long time but there were no compelling
reasons to do it. Specifying RPC endpoint permissions becomes however
significantly nicer if each Component is a different RPC Service. This also
fixes some naming issues like having to prefix methods with the component name
to separate them from methods named in the same way in some other component
(Pin and IPFSPin).
2019-05-04 21:36:10 +01:00
Hector Sanjuan
7e700e2338
Merge pull request #767 from ipfs/feat/user-allocs-type
Types: make UserAllocations []peer.ID instead of string
2019-05-02 14:08:59 +01:00
Hector Sanjuan
f140bdbdbc
Merge pull request #768 from ipfs/fix/732-pin-update
Proxy: hijack pin/update
2019-05-02 14:07:59 +01:00
Hector Sanjuan
036e3da7f1 Proxy pin/update: Respond with BadRequest when arguments missing 2019-05-02 10:32:13 +01:00
Hector Sanjuan
539dfcd6ec Update exporter import paths 2019-04-29 18:57:13 +02:00
Hector Sanjuan
dfaa141bc0 fix label in bug report 2019-04-29 18:01:12 +02:00
Hector Sanjuan
93d464c6d5 Small fixes to issue template for bugs 2019-04-29 18:00:20 +02:00
Hector Sanjuan
552c59f008 Delete old issue template 2019-04-29 17:58:40 +02:00
Hector Sanjuan
5325f5a31a Update issue templates 2019-04-29 17:57:24 +02:00
Hector Sanjuan
0fd70e45f3 Update deps 2019-04-29 17:26:22 +02:00
Hector Sanjuan
da24114ae0 Proxy: hijack pin/update
The IPFS pin/update endpoint takes two arguments and usually
unpins the first and pins the second. It is a bit more efficient
to do it in a single operation than two separate ones.

This will make the proxy endpoint hijack pin/update requests.

First, the FROM pin is fetched from the state. If present, we
set the options (replication factors, actual allocations) from
that pin to the new one. Then we pin the TO item and proceed
to unpin the FROM item when `unpin` is not false.

We need to support path resolving, just like IPFS, therefore
it was necessary to expose IPFSResolve() via RPC.
2019-04-29 16:36:40 +02:00
Hector Sanjuan
2144f4bd42 Types: make UserAllocations []peer.ID instead of string
It seems we forgot to convert this after peer.IDs became serializable. This
fixes it.
2019-04-29 16:24:38 +02:00
Hector Sanjuan
543656aa83
Merge pull request #762 from ipfs/allocations_filter
Default allocations filter should be all
2019-04-24 20:51:16 +01:00
Kishan Mohanbhai Sagathiya
fa8d5c973c Invalid filter should throw BadRequest
- for GET `/allocations` and GET `/pins` an invalid filter now result
in BadRequest
- Added tests for the same
2019-04-24 21:54:12 +05:30
Kishan Mohanbhai Sagathiya
b2796b951a Default allocations filter should be all
Currently `curl -X GET http://localhost:9094/allocations` results in an
empty array, because no filter is provided. Solution to this would be
either 1) to consider filter as all if no filter is provided by the user
or 2) to make the `filter` parameter mandatory and reply with BadRequest
if no filter is provided

This commit makes the default filter as all
2019-04-24 20:24:08 +05:30
Hector Sanjuan
5a1dfc2a61
Merge pull request #685 from ipfs/feat/crdts
Consensus: add new "crdt" consensus component
2019-04-17 19:44:44 +02:00
Hector Sanjuan
acbd7fda60 Consensus: add new "crdt" consensus component
This adds a new "crdt" consensus component using go-ds-crdt.

This implies several refactors to fully make cluster consensus-component
independent:

* Delete mapstate and fully adopt dsstate (after people have migrated).
* Return errors from state methods rather than ignoring them.
* Add a new "datastore" modules so that we can configure datastores in the
   main configuration like other components.
* Let the consensus components fully define the "state.State". Thus, they do
not receive the state, they receive the storage where we put the state (a
go-datastore).
* Allow to customize how the monitor component obtains Peers() (the current
  peerset), including avoiding using the current peerset. At the moment the
  crdt consensus uses the monitoring component to define the current peerset.
  Therefore the monitor component cannot rely on the consensus component to
  produce a peerset.
* Re-factor/re-implementation of "ipfs-cluster-service state"
  operations. Includes the dissapearance of the "migrate" one.

The CRDT consensus component defines creates a crdt-datastore (with ipfs-lite)
and uses it to intitialize a dssate. Thus the crdt-store is elegantly
wrapped. Any modifications to the state get automatically replicated to other
peers. We store all the CRDT DAG blocks in the local datastore.

The consensus components only expose a ReadOnly state, as any modifications to
the shared state should happen through them.

DHT and PubSub facilities must now be created outside of Cluster and passed in
so they can be re-used by different components.
2019-04-17 19:14:26 +02:00
Hector Sanjuan
a79662912b
Merge pull request #754 from ipfs/0.10.1/release
0.10.1/release
2019-04-10 15:56:09 +02:00
Hector Sanjuan
0f9ce4807c
Release 0.10.1 2019-04-10 12:04:43 +02:00
Hector Sanjuan
c36de4aa21 Do not do gx releases 2019-04-10 12:04:39 +02:00
Hector Sanjuan
45647345ff
Merge pull request #753 from ipfs/0.10.1/changelog
Changelog for 0.10.1
2019-04-10 11:55:15 +02:00
Hector Sanjuan
77260b8fbe
Merge pull request #752 from ipfs/fix/743-version-json
Fix #743: Use lowercase "version" in json version object
2019-04-10 11:54:26 +02:00
Hector Sanjuan
518d5bde87 Changelog for 0.10.1
License: MIT
Signed-off-by: Hector Sanjuan <code@hector.link>
2019-04-10 11:44:52 +02:00
Hector Sanjuan
a25f4ecb10 Fix #743: Use lowercase "version" in json version object
License: MIT
Signed-off-by: Hector Sanjuan <code@hector.link>
2019-04-10 11:15:56 +02:00
Hector Sanjuan
94a781ef21
Merge pull request #735 from jmank88/url-nocopy
support --nocopy when adding URLs
2019-03-27 15:18:08 +01:00
Hector Sanjuan
c863fc5ceb
Merge pull request #734 from chenminjian/refact/utils
refact: remove duplicative package
2019-03-27 13:41:33 +01:00
jmank88
76c798e313 support --nocopy when adding URLs 2019-03-26 10:22:37 -05:00
chenminjian
36d78e55c6 refact: remove duplicative package
License: MIT
Signed-off-by: chenminjian <727180553@qq.com>
2019-03-26 20:17:03 +08:00
Hector Sanjuan
1889ea06f1
Merge pull request #729 from ipfs/fix/add-enc-json
Fix: ctl: --enc=json shows empty output on "add"
2019-03-25 03:24:09 +01:00
Hector Sanjuan
2db0ca3125
Merge pull request #731 from jmank88/docker-cert
add certs to Dockerfile
2019-03-24 03:40:21 +01:00