1 | User visible changes in Tahoe-LAFS. -*- outline; coding: utf-8 -*- |
---|
2 | |
---|
3 | * Release 1.7.1 (2010-07-18) |
---|
4 | |
---|
5 | ** Bugfixes and Improvements |
---|
6 | |
---|
7 | - Fix bug in which uploader could fail with AssertionFailure or |
---|
8 | report that it had achieved servers-of-happiness when it |
---|
9 | hadn't. (#1118) |
---|
10 | - Fix bug in which servers could get into a state where they would |
---|
11 | refuse to accept shares of a certain file (#1117) |
---|
12 | - Add init scripts for managing the gateway server on Debian/Ubuntu |
---|
13 | (#961) |
---|
14 | - Fix bug where server version number was always 0 on the welcome |
---|
15 | page (#1067) |
---|
16 | - Add new command-line command "tahoe unlink" as a synonym for "tahoe |
---|
17 | rm" (#776) |
---|
18 | - The FTP frontend now encrypts its temporary files, protecting their |
---|
19 | contents from an attacker who is able to read the disk. (#1083) |
---|
20 | - Fix IP address detection on FreeBSD 7, 8, and 9 (#1098) |
---|
21 | - Fix minor layout issue in the Web User Interface with Internet |
---|
22 | Explorer (#1097) |
---|
23 | - Fix rarely-encountered incompatibility between Twisted logging |
---|
24 | utility and the new unicode support added in v1.7.0 (#1099) |
---|
25 | - Forward-compatibility improvements for non-ASCII caps (#1051) |
---|
26 | |
---|
27 | ** Code improvements |
---|
28 | |
---|
29 | - Simplify and tidy-up directories, unicode support, test code (#923, #967, |
---|
30 | #1072) |
---|
31 | |
---|
32 | * Release 1.7.0 (2010-06-18) |
---|
33 | |
---|
34 | ** New Features |
---|
35 | |
---|
36 | *** SFTP support |
---|
37 | |
---|
38 | Your Tahoe-LAFS gateway now acts like a full-fledged SFTP server. It has been |
---|
39 | tested with sshfs to provide a virtual filesystem in Linux. Many users have |
---|
40 | asked for this feature. We hope that it serves them well! See the |
---|
41 | docs/frontends/FTP-and-SFTP.txt document to get started. |
---|
42 | |
---|
43 | *** support for non-ASCII character encodings |
---|
44 | |
---|
45 | Tahoe-LAFS now correctly handles filenames containing non-ASCII characters on |
---|
46 | all supported platforms: |
---|
47 | |
---|
48 | - when reading files in from the local filesystem (such as when you run "tahoe |
---|
49 | backup" to back up your local files to a Tahoe-LAFS grid); |
---|
50 | |
---|
51 | - when writing files out to the local filesystem (such as when you run "tahoe |
---|
52 | cp -r" to recursively copy files out of a Tahoe-LAFS grid); |
---|
53 | |
---|
54 | - when displaying filenames to the terminal (such as when you run "tahoe ls"), |
---|
55 | subject to limitations of the terminal and locale; |
---|
56 | |
---|
57 | - when parsing command-line arguments, except on Windows. |
---|
58 | |
---|
59 | *** Servers of Happiness |
---|
60 | |
---|
61 | Tahoe-LAFS now measures during immutable file upload to see how well |
---|
62 | distributed it is across multiple servers. It aborts the upload if the pieces |
---|
63 | of the file are not sufficiently well-distributed. |
---|
64 | |
---|
65 | This behavior is controlled by a configuration parameter called "servers of |
---|
66 | happiness". With the default settings for its erasure coding, Tahoe-LAFS |
---|
67 | generates 10 shares for each file, such that any 3 of those shares are |
---|
68 | sufficient to recover the file. The default value of "servers of happiness" is |
---|
69 | 7, which means that Tahoe-LAFS will guarantee that there are at least 7 servers |
---|
70 | holding some of the shares, such that any 3 of those servers can completely |
---|
71 | recover your file. |
---|
72 | |
---|
73 | The new upload code also distributes the shares better than the previous |
---|
74 | version in some cases and takes better advantage of pre-existing shares (when a |
---|
75 | file has already been previously uploaded). See the architecture.txt document |
---|
76 | [3] for details. |
---|
77 | |
---|
78 | ** Bugfixes and Improvements |
---|
79 | |
---|
80 | - Premature abort of upload if some shares were already present and some |
---|
81 | servers fail. (#608) |
---|
82 | - python ./setup.py install -- can't create or remove files in install |
---|
83 | directory. (#803) |
---|
84 | - Network failure => internal TypeError. (#902) |
---|
85 | - Install of Tahoe on CentOS 5.4. (#933) |
---|
86 | - CLI option --node-url now supports https url. (#1028) |
---|
87 | - HTML/CSS template files were not correctly installed under Windows. (#1033) |
---|
88 | - MetadataSetter does not enforce restriction on setting "tahoe" subkeys. |
---|
89 | (#1034) |
---|
90 | - ImportError: No module named setuptools_darcs.setuptools_darcs. (#1054) |
---|
91 | - Renamed Title in xhtml files. (#1062) |
---|
92 | - Increase Python version dependency to 2.4.4, to avoid a critical CPython |
---|
93 | security bug. (#1066) |
---|
94 | - Typo correction for the munin plugin tahoe_storagespace. (#968) |
---|
95 | - Fix warnings found by pylint. (#973) |
---|
96 | - Changing format of some documentation files. (#1027) |
---|
97 | - the misc/ directory was tied up. (#1068) |
---|
98 | - The 'ctime' and 'mtime' metadata fields are no longer written except by |
---|
99 | "tahoe backup". (#924) |
---|
100 | - Unicode filenames in Tahoe-LAFS directories are normalized so that names |
---|
101 | that differ only in how accents are encoded are treated as the same. (#1076) |
---|
102 | - Various small improvements to documentation. (#937, #911, #1024, #1082) |
---|
103 | |
---|
104 | ** Removals |
---|
105 | |
---|
106 | The 'tahoe debug consolidate' subcommand (for converting old allmydata Windows |
---|
107 | client backups to a newer format) has been removed. |
---|
108 | |
---|
109 | ** Dependency Updates |
---|
110 | |
---|
111 | the Python version dependency is raised to 2.4.4 in some cases (2.4.3 for |
---|
112 | Redhat-based Linux distributions, 2.4.2 for UCS-2 builds) (#1066) |
---|
113 | pycrypto >= 2.0.1 |
---|
114 | pyasn1 >= 0.0.8a |
---|
115 | mock (only required by unit tests) |
---|
116 | |
---|
117 | * Release 1.6.1 (2010-02-27) |
---|
118 | |
---|
119 | ** Bugfixes |
---|
120 | |
---|
121 | *** Correct handling of Small Immutable Directories |
---|
122 | |
---|
123 | Immutable directories can now be deep-checked and listed in the web UI in |
---|
124 | all cases. (In v1.6.0, some operations, such as deep-check, on a directory |
---|
125 | graph that included very small immutable directories, would result in an |
---|
126 | exception causing the whole operation to abort.) (#948) |
---|
127 | |
---|
128 | ** Usability Improvements |
---|
129 | |
---|
130 | Improved user interface messages and error reporting. (#681, #837, #939) |
---|
131 | |
---|
132 | The timeouts for operation handles have been greatly increased, so that |
---|
133 | you can view the results of an operation up to 4 days after it has |
---|
134 | completed. After viewing them for the first time, the results are |
---|
135 | retained for a further day. (#577) |
---|
136 | |
---|
137 | * Release 1.6.0 (2010-02-01) |
---|
138 | |
---|
139 | ** New Features |
---|
140 | |
---|
141 | *** Immutable Directories |
---|
142 | |
---|
143 | Tahoe-LAFS can now create and handle immutable directories. (#607, #833, #931) |
---|
144 | These are read just like normal directories, but are "deep-immutable", meaning |
---|
145 | that all their children (and everything reachable from those children) must be |
---|
146 | immutable objects (i.e. immutable or literal files, and other immutable |
---|
147 | directories). |
---|
148 | |
---|
149 | These directories must be created in a single webapi call that provides all |
---|
150 | of the children at once. (Since they cannot be changed after creation, the |
---|
151 | usual create/add/add sequence cannot be used.) They have URIs that start with |
---|
152 | "URI:DIR2-CHK:" or "URI:DIR2-LIT:", and are described on the human-facing web |
---|
153 | interface (aka the "WUI") with a "DIR-IMM" abbreviation (as opposed to "DIR" |
---|
154 | for the usual read-write directories and "DIR-RO" for read-only directories). |
---|
155 | |
---|
156 | Tahoe-LAFS releases before 1.6.0 cannot read the contents of an immutable |
---|
157 | directory. 1.5.0 will tolerate their presence in a directory listing (and |
---|
158 | display it as "unknown"). 1.4.1 and earlier cannot tolerate them: a DIR-IMM |
---|
159 | child in any directory will prevent the listing of that directory. |
---|
160 | |
---|
161 | Immutable directories are repairable, just like normal immutable files. |
---|
162 | |
---|
163 | The webapi "POST t=mkdir-immutable" call is used to create immutable |
---|
164 | directories. See docs/frontends/webapi.txt for details. |
---|
165 | |
---|
166 | *** "tahoe backup" now creates immutable directories, backupdb has dircache |
---|
167 | |
---|
168 | The "tahoe backup" command has been enhanced to create immutable directories |
---|
169 | (in previous releases, it created read-only mutable directories) (#828). This |
---|
170 | is significantly faster, since it does not need to create an RSA keypair for |
---|
171 | each new directory. Also "DIR-IMM" immutable directories are repairable, unlike |
---|
172 | "DIR-RO" read-only mutable directories at present. (A future Tahoe-LAFS release |
---|
173 | should also be able to repair DIR-RO.) |
---|
174 | |
---|
175 | In addition, the backupdb (used by "tahoe backup" to remember what it has |
---|
176 | already copied) has been enhanced to store information about existing immutable |
---|
177 | directories. This allows it to re-use directories that have moved but still |
---|
178 | contain identical contents, or that have been deleted and later replaced. (The |
---|
179 | 1.5.0 "tahoe backup" command could only re-use directories that were in the |
---|
180 | same place as they were in the immediately previous backup.) With this change, |
---|
181 | the backup process no longer needs to read the previous snapshot out of the |
---|
182 | Tahoe-LAFS grid, reducing the network load considerably. (#606) |
---|
183 | |
---|
184 | A "null backup" (in which nothing has changed since the previous backup) will |
---|
185 | require only two Tahoe-side operations: one to add an Archives/$TIMESTAMP |
---|
186 | entry, and a second to update the Latest/ link. On the local disk side, it |
---|
187 | will readdir() all your local directories and stat() all your local files. |
---|
188 | |
---|
189 | If you've been using "tahoe backup" for a while, you will notice that your |
---|
190 | first use of it after upgrading to 1.6.0 may take a long time: it must create |
---|
191 | proper immutable versions of all the old read-only mutable directories. This |
---|
192 | process won't take as long as the initial backup (where all the file contents |
---|
193 | had to be uploaded too): it will require time proportional to the number and |
---|
194 | size of your directories. After this initial pass, all subsequent passes |
---|
195 | should take a tiny fraction of the time. |
---|
196 | |
---|
197 | As noted above, Tahoe-LAFS versions earlier than 1.5.0 cannot list a directory |
---|
198 | containing an immutable subdirectory. Tahoe-LAFS versions earlier than 1.6.0 |
---|
199 | cannot read the contents of an immutable directory. |
---|
200 | |
---|
201 | The "tahoe backup" command has been improved to skip over unreadable objects |
---|
202 | (like device files, named pipes, and files with permissions that prevent the |
---|
203 | command from reading their contents), instead of throwing an exception and |
---|
204 | terminating the backup process. It also skips over symlinks, because these |
---|
205 | cannot be represented faithfully in the Tahoe-side filesystem. A warning |
---|
206 | message will be emitted each time something is skipped. (#729, #850, #641) |
---|
207 | |
---|
208 | *** "create-node" command added, "create-client" now implies --no-storage |
---|
209 | |
---|
210 | The basic idea behind Tahoe-LAFS's client+server and client-only processes is |
---|
211 | that you are creating a general-purpose Tahoe-LAFS "node" process, which has |
---|
212 | several components that can be activated. Storage service is one of these |
---|
213 | optional components, as is the Helper, FTP server, and SFTP server. Web gateway |
---|
214 | functionality is nominally on this list, but it is always active; a future |
---|
215 | release will make it optional. There are three special purpose servers that |
---|
216 | can't currently be run as a component in a node: introducer, key-generator, |
---|
217 | and stats-gatherer. |
---|
218 | |
---|
219 | So now "tahoe create-node" will create a Tahoe-LAFS node process, and after |
---|
220 | creation you can edit its tahoe.cfg to enable or disable the desired |
---|
221 | services. It is a more general-purpose replacement for "tahoe create-client". |
---|
222 | The default configuration has storage service enabled. For convenience, the |
---|
223 | "--no-storage" argument makes a tahoe.cfg file that disables storage |
---|
224 | service. (#760) |
---|
225 | |
---|
226 | "tahoe create-client" has been changed to create a Tahoe-LAFS node without a |
---|
227 | storage service. It is equivalent to "tahoe create-node --no-storage". This |
---|
228 | helps to reduce the confusion surrounding the use of a command with "client" in |
---|
229 | its name to create a storage *server*. Use "tahoe create-client" to create a |
---|
230 | purely client-side node. If you want to offer storage to the grid, use |
---|
231 | "tahoe create-node" instead. |
---|
232 | |
---|
233 | In the future, other services will be added to the node, and they will be |
---|
234 | controlled through options in tahoe.cfg . The most important of these |
---|
235 | services may get additional --enable-XYZ or --disable-XYZ arguments to |
---|
236 | "tahoe create-node". |
---|
237 | |
---|
238 | ** Performance Improvements |
---|
239 | |
---|
240 | Download of immutable files begins as soon as the downloader has located the K |
---|
241 | necessary shares (#928, #287). In both the previous and current releases, a |
---|
242 | downloader will first issue queries to all storage servers on the grid to |
---|
243 | locate shares before it begins downloading the shares. In previous releases of |
---|
244 | Tahoe-LAFS, download would not begin until all storage servers on the grid had |
---|
245 | replied to the query, at which point K shares would be chosen for download from |
---|
246 | among the shares that were located. In this release, download begins as soon as |
---|
247 | any K shares are located. This means that downloads start sooner, which is |
---|
248 | particularly important if there is a server on the grid that is extremely slow |
---|
249 | or even hung in such a way that it will never respond. In previous releases |
---|
250 | such a server would have a negative impact on all downloads from that grid. In |
---|
251 | this release, such a server will have no impact on downloads, as long as K |
---|
252 | shares can be found on other, quicker, servers. This also means that |
---|
253 | downloads now use the "best-alacrity" servers that they talk to, as measured by |
---|
254 | how quickly the servers reply to the initial query. This might cause downloads |
---|
255 | to go faster, especially on grids with heterogeneous servers or geographical |
---|
256 | dispersion. |
---|
257 | |
---|
258 | ** Minor Changes |
---|
259 | |
---|
260 | The webapi acquired a new "t=mkdir-with-children" command, to create and |
---|
261 | populate a directory in a single call. This is significantly faster than |
---|
262 | using separate "t=mkdir" and "t=set-children" operations (it uses one |
---|
263 | gateway-to-grid roundtrip, instead of three or four). (#533) |
---|
264 | |
---|
265 | The t=set-children (note the hyphen) operation is now documented in |
---|
266 | docs/frontends/webapi.txt, and is the new preferred spelling of the old |
---|
267 | t=set_children (with an underscore). The underscore version remains for |
---|
268 | backwards compatibility. (#381, #927) |
---|
269 | |
---|
270 | The tracebacks produced by errors in CLI tools should now be in plain text, |
---|
271 | instead of HTML (which is unreadable outside of a browser). (#646) |
---|
272 | |
---|
273 | The [storage]reserved_space configuration knob (which causes the storage |
---|
274 | server to refuse shares when available disk space drops below a threshold) |
---|
275 | should work on Windows now, not just UNIX. (#637) |
---|
276 | |
---|
277 | "tahoe cp" should now exit with status "1" if it cannot figure out a suitable |
---|
278 | target filename, such as when you copy from a bare filecap. (#761) |
---|
279 | |
---|
280 | "tahoe get" no longer creates a zero-length file upon error. (#121) |
---|
281 | |
---|
282 | "tahoe ls" can now list single files. (#457) |
---|
283 | |
---|
284 | "tahoe deep-check --repair" should tolerate repair failures now, instead of |
---|
285 | halting traversal. (#874, #786) |
---|
286 | |
---|
287 | "tahoe create-alias" no longer corrupts the aliases file if it had |
---|
288 | previously been edited to have no trailing newline. (#741) |
---|
289 | |
---|
290 | Many small packaging improvements were made to facilitate the "tahoe-lafs" |
---|
291 | package being included in Ubuntu. Several mac/win32 binary libraries were |
---|
292 | removed, some figleaf code-coverage files were removed, a bundled copy of |
---|
293 | darcsver-1.2.1 was removed, and additional licensing text was added. |
---|
294 | |
---|
295 | Several DeprecationWarnings for python2.6 were silenced. (#859) |
---|
296 | |
---|
297 | The checker --add-lease option would sometimes fail for shares stored |
---|
298 | on old (Tahoe v1.2.0) servers. (#875) |
---|
299 | |
---|
300 | The documentation for installing on Windows (docs/install.html) has been |
---|
301 | improved. (#773) |
---|
302 | |
---|
303 | For other changes not mentioned here, see |
---|
304 | <http://allmydata.org/trac/tahoe/query?milestone=1.6.0&keywords=!~news-done>. |
---|
305 | To include the tickets mentioned above, go to |
---|
306 | <http://allmydata.org/trac/tahoe/query?milestone=1.6.0>. |
---|
307 | |
---|
308 | |
---|
309 | * Release 1.5.0 (2009-08-01) |
---|
310 | |
---|
311 | ** Improvements |
---|
312 | |
---|
313 | Uploads of immutable files now use pipelined writes, improving upload speed |
---|
314 | slightly (10%) over high-latency connections. (#392) |
---|
315 | |
---|
316 | Processing large directories has been sped up, by removing a O(N^2) algorithm |
---|
317 | from the dirnode decoding path and retaining unmodified encrypted entries. |
---|
318 | (#750, #752) |
---|
319 | |
---|
320 | The human-facing web interface (aka the "WUI") received a significant CSS |
---|
321 | makeover by Kevin Reid, making it much prettier and easier to read. The WUI |
---|
322 | "check" and "deep-check" forms now include a "Renew Lease" checkbox, |
---|
323 | mirroring the CLI --add-lease option, so leases can be added or renewed from |
---|
324 | the web interface. |
---|
325 | |
---|
326 | The CLI "tahoe mv" command now refuses to overwrite directories. (#705) |
---|
327 | |
---|
328 | The CLI "tahoe webopen" command, when run without arguments, will now bring |
---|
329 | up the "Welcome Page" (node status and mkdir/upload forms). |
---|
330 | |
---|
331 | The 3.5MB limit on mutable files was removed, so it should be possible to |
---|
332 | upload arbitrarily-sized mutable files. Note, however, that the data format |
---|
333 | and algorithm remains the same, so using mutable files still requires |
---|
334 | bandwidth, computation, and RAM in proportion to the size of the mutable file. |
---|
335 | (#694) |
---|
336 | |
---|
337 | This version of Tahoe-LAFS will tolerate directory entries that contain filecap |
---|
338 | formats which it does not recognize: files and directories from the future. |
---|
339 | This should improve the user experience (for 1.5.0 users) when we add new cap |
---|
340 | formats in the future. Previous versions would fail badly, preventing the user |
---|
341 | from seeing or editing anything else in those directories. These unrecognized |
---|
342 | objects can be renamed and deleted, but obviously not read or written. Also |
---|
343 | they cannot generally be copied. (#683) |
---|
344 | |
---|
345 | ** Bugfixes |
---|
346 | |
---|
347 | deep-check-and-repair now tolerates read-only directories, such as the ones |
---|
348 | produced by the "tahoe backup" CLI command. Read-only directories and mutable |
---|
349 | files are checked, but not repaired. Previous versions threw an exception |
---|
350 | when attempting the repair and failed to process the remaining contents. We |
---|
351 | cannot yet repair these read-only objects, but at least this version allows |
---|
352 | the rest of the check+repair to proceed. (#625) |
---|
353 | |
---|
354 | A bug in 1.4.1 which caused a server to be listed multiple times (and |
---|
355 | frequently broke all connections to that server) was fixed. (#653) |
---|
356 | |
---|
357 | The plaintext-hashing code was removed from the Helper interface, removing |
---|
358 | the Helper's ability to mount a partial-information-guessing attack. (#722) |
---|
359 | |
---|
360 | ** Platform/packaging changes |
---|
361 | |
---|
362 | Tahoe-LAFS now runs on NetBSD, OpenBSD, ArchLinux, and NixOS, and on an |
---|
363 | embedded system based on an ARM CPU running at 266 MHz. |
---|
364 | |
---|
365 | Unit test timeouts have been raised to allow the tests to complete on |
---|
366 | extremely slow platforms like embedded ARM-based NAS boxes, which may take |
---|
367 | several hours to run the test suite. An ARM-specific data-corrupting bug in |
---|
368 | an older version of Crypto++ (5.5.2) was identified: ARM-users are encouraged |
---|
369 | to use recent Crypto++/pycryptopp which avoids this problem. |
---|
370 | |
---|
371 | Tahoe-LAFS now requires a SQLite library, either the sqlite3 that comes |
---|
372 | built-in with python2.5/2.6, or the add-on pysqlite2 if you're using |
---|
373 | python2.4. In the previous release, this was only needed for the "tahoe backup" |
---|
374 | command: now it is mandatory. |
---|
375 | |
---|
376 | Several minor documentation updates were made. |
---|
377 | |
---|
378 | To help get Tahoe-LAFS into Linux distributions like Fedora and Debian, |
---|
379 | packaging improvements are being made in both Tahoe-LAFS and related libraries |
---|
380 | like pycryptopp and zfec. |
---|
381 | |
---|
382 | The Crypto++ library included in the pycryptopp package has been upgraded to |
---|
383 | version 5.6.0 of Crypto++, which includes a more efficient implementation of |
---|
384 | SHA-256 in assembly for x86 or amd64 architectures. |
---|
385 | |
---|
386 | ** dependency updates |
---|
387 | |
---|
388 | foolscap-0.4.1 |
---|
389 | no python-2.4.0 or 2.4.1 (2.4.2 is good) |
---|
390 | (they contained a bug in base64.b32decode) |
---|
391 | avoid python-2.6 on windows with mingw: compiler issues |
---|
392 | python2.4 requires pysqlite2 (2.5,2.6 does not) |
---|
393 | no python-3.x |
---|
394 | pycryptopp-0.5.15 |
---|
395 | |
---|
396 | |
---|
397 | * Release 1.4.1 (2009-04-13) |
---|
398 | |
---|
399 | ** Garbage Collection |
---|
400 | |
---|
401 | The big feature for this release is the implementation of garbage collection, |
---|
402 | allowing Tahoe storage servers to delete shares for old deleted files. When |
---|
403 | enabled, this uses a "mark and sweep" process: clients are responsible for |
---|
404 | updating the leases on their shares (generally by running "tahoe deep-check |
---|
405 | --add-lease"), and servers are allowed to delete any share which does not |
---|
406 | have an up-to-date lease. The process is described in detail in |
---|
407 | docs/garbage-collection.txt . |
---|
408 | |
---|
409 | The server must be configured to enable garbage-collection, by adding |
---|
410 | directives to the [storage] section that define an age limit for shares. The |
---|
411 | default configuration will not delete any shares. |
---|
412 | |
---|
413 | Both servers and clients should be upgraded to this release to make the |
---|
414 | garbage-collection as pleasant as possible. 1.2.0 servers have code to |
---|
415 | perform the update-lease operation but it suffers from a fatal bug, while |
---|
416 | 1.3.0 servers have update-lease but will return an exception for unknown |
---|
417 | storage indices, causing clients to emit an Incident for each exception, |
---|
418 | slowing the add-lease process down to a crawl. 1.1.0 servers did not have the |
---|
419 | add-lease operation at all. |
---|
420 | |
---|
421 | ** Security/Usability Problems Fixed |
---|
422 | |
---|
423 | A super-linear algorithm in the Merkle Tree code was fixed, which previously |
---|
424 | caused e.g. download of a 10GB file to take several hours before the first |
---|
425 | byte of plaintext could be produced. The new "alacrity" is about 2 minutes. A |
---|
426 | future release should reduce this to a few seconds by fixing ticket #442. |
---|
427 | |
---|
428 | The previous version permitted a small timing attack (due to our use of |
---|
429 | strcmp) against the write-enabler and lease-renewal/cancel secrets. An |
---|
430 | attacker who could measure response-time variations of approximatly 3ns |
---|
431 | against a very noisy background time of about 15ms might be able to guess |
---|
432 | these secrets. We do not believe this attack was actually feasible. This |
---|
433 | release closes the attack by first hashing the two strings to be compared |
---|
434 | with a random secret. |
---|
435 | |
---|
436 | ** webapi changes |
---|
437 | |
---|
438 | In most cases, HTML tracebacks will only be sent if an "Accept: text/html" |
---|
439 | header was provided with the HTTP request. This will generally cause browsers |
---|
440 | to get an HTMLized traceback but send regular text/plain tracebacks to |
---|
441 | non-browsers (like the CLI clients). More errors have been mapped to useful |
---|
442 | HTTP error codes. |
---|
443 | |
---|
444 | The streaming webapi operations (deep-check and manifest) now have a way to |
---|
445 | indicate errors (an output line that starts with "ERROR" instead of being |
---|
446 | legal JSON). See docs/frontends/webapi.txt for details. |
---|
447 | |
---|
448 | The storage server now has its own status page (at /storage), linked from the |
---|
449 | Welcome page. This page shows progress and results of the two new |
---|
450 | share-crawlers: one which merely counts shares (to give an estimate of how |
---|
451 | many files/directories are being stored in the grid), the other examines |
---|
452 | leases and reports how much space would be freed if GC were enabled. The page |
---|
453 | also shows how much disk space is present, used, reserved, and available for |
---|
454 | the Tahoe server, and whether the server is currently running in "read-write" |
---|
455 | mode or "read-only" mode. |
---|
456 | |
---|
457 | When a directory node cannot be read (perhaps because of insufficent shares), |
---|
458 | a minimal webapi page is created so that the "more-info" links (including a |
---|
459 | Check/Repair operation) will still be accessible. |
---|
460 | |
---|
461 | A new "reliability" page was added, with the beginnings of work on a |
---|
462 | statistical loss model. You can tell this page how many servers you are using |
---|
463 | and their independent failure probabilities, and it will tell you the |
---|
464 | likelihood that an arbitrary file will survive each repair period. The |
---|
465 | "numpy" package must be installed to access this page. A partial paper, |
---|
466 | written by Shawn Willden, has been added to docs/proposed/lossmodel.lyx . |
---|
467 | |
---|
468 | ** CLI changes |
---|
469 | |
---|
470 | "tahoe check" and "tahoe deep-check" now accept an "--add-lease" argument, to |
---|
471 | update a lease on all shares. This is the "mark" side of garbage collection. |
---|
472 | |
---|
473 | In many cases, CLI error messages have been improved: the ugly HTMLized |
---|
474 | traceback has been replaced by a normal python traceback. |
---|
475 | |
---|
476 | "tahoe deep-check" and "tahoe manifest" now have better error reporting. |
---|
477 | "tahoe cp" is now non-verbose by default. |
---|
478 | |
---|
479 | "tahoe backup" now accepts several "--exclude" arguments, to ignore certain |
---|
480 | files (like editor temporary files and version-control metadata) during |
---|
481 | backup. |
---|
482 | |
---|
483 | On windows, the CLI now accepts local paths like "c:\dir\file.txt", which |
---|
484 | previously was interpreted as a Tahoe path using a "c:" alias. |
---|
485 | |
---|
486 | The "tahoe restart" command now uses "--force" by default (meaning it will |
---|
487 | start a node even if it didn't look like there was one already running). |
---|
488 | |
---|
489 | The "tahoe debug consolidate" command was added. This takes a series of |
---|
490 | independent timestamped snapshot directories (such as those created by the |
---|
491 | allmydata.com windows backup program, or a series of "tahoe cp -r" commands) |
---|
492 | and creates new snapshots that used shared read-only directories whenever |
---|
493 | possible (like the output of "tahoe backup"). In the most common case (when |
---|
494 | the snapshots are fairly similar), the result will use significantly fewer |
---|
495 | directories than the original, allowing "deep-check" and similar tools to run |
---|
496 | much faster. In some cases, the speedup can be an order of magnitude or more. |
---|
497 | This tool is still somewhat experimental, and only needs to be run on large |
---|
498 | backups produced by something other than "tahoe backup", so it was placed |
---|
499 | under the "debug" category. |
---|
500 | |
---|
501 | "tahoe cp -r --caps-only tahoe:dir localdir" is a diagnostic tool which, |
---|
502 | instead of copying the full contents of files into the local directory, |
---|
503 | merely copies their filecaps. This can be used to verify the results of a |
---|
504 | "consolidation" operation. |
---|
505 | |
---|
506 | ** other fixes |
---|
507 | |
---|
508 | The codebase no longer rauses RuntimeError as a kind of assert(). Specific |
---|
509 | exception classes were created for each previous instance of RuntimeError. |
---|
510 | |
---|
511 | Many unit tests were changed to use a non-network test harness, speeding them |
---|
512 | up considerably. |
---|
513 | |
---|
514 | Deep-traversal operations (manifest and deep-check) now walk individual |
---|
515 | directories in alphabetical order. Occasional turn breaks are inserted to |
---|
516 | prevent a stack overflow when traversing directories with hundreds of |
---|
517 | entries. |
---|
518 | |
---|
519 | The experimental SFTP server had its path-handling logic changed slightly, to |
---|
520 | accomodate more SFTP clients, although there are still issues (#645). |
---|
521 | |
---|
522 | |
---|
523 | * Release 1.3.0 (2009-02-13) |
---|
524 | |
---|
525 | ** Checker/Verifier/Repairer |
---|
526 | |
---|
527 | The primary focus of this release has been writing a checker / verifier / |
---|
528 | repairer for files and directories. "Checking" is the act of asking storage |
---|
529 | servers whether they have a share for the given file or directory: if there |
---|
530 | are not enough shares available, the file or directory will be |
---|
531 | unrecoverable. "Verifying" is the act of downloading and cryptographically |
---|
532 | asserting that the server's share is undamaged: it requires more work |
---|
533 | (bandwidth and CPU) than checking, but can catch problems that simple |
---|
534 | checking cannot. "Repair" is the act of replacing missing or damaged shares |
---|
535 | with new ones. |
---|
536 | |
---|
537 | This release includes a full checker, a partial verifier, and a partial |
---|
538 | repairer. The repairer is able to handle missing shares: new shares are |
---|
539 | generated and uploaded to make up for the missing ones. This is currently the |
---|
540 | best application of the repairer: to replace shares that were lost because of |
---|
541 | server departure or permanent drive failure. |
---|
542 | |
---|
543 | The repairer in this release is somewhat able to handle corrupted shares. The |
---|
544 | limitations are: |
---|
545 | |
---|
546 | * Immutable verifier is incomplete: not all shares are used, and not all |
---|
547 | fields of those shares are verified. Therefore the immutable verifier has |
---|
548 | only a moderate chance of detecting corrupted shares. |
---|
549 | * The mutable verifier is mostly complete: all shares are examined, and most |
---|
550 | fields of the shares are validated. |
---|
551 | * The storage server protocol offers no way for the repairer to replace or |
---|
552 | delete immutable shares. If corruption is detected, the repairer will |
---|
553 | upload replacement shares to other servers, but the corrupted shares will |
---|
554 | be left in place. |
---|
555 | * read-only directories and read-only mutable files must be repaired by |
---|
556 | someone who holds the write-cap: the read-cap is insufficient. Moreover, |
---|
557 | the deep-check-and-repair operation will halt with an error if it attempts |
---|
558 | to repair one of these read-only objects. |
---|
559 | * Some forms of corruption can cause both download and repair operations to |
---|
560 | fail. A future release will fix this, since download should be tolerant of |
---|
561 | any corruption as long as there are at least 'k' valid shares, and repair |
---|
562 | should be able to fix any file that is downloadable. |
---|
563 | |
---|
564 | If the downloader, verifier, or repairer detects share corruption, the |
---|
565 | servers which provided the bad shares will be notified (via a file placed in |
---|
566 | the BASEDIR/storage/corruption-advisories directory) so their operators can |
---|
567 | manually delete the corrupted shares and investigate the problem. In |
---|
568 | addition, the "incident gatherer" mechanism will automatically report share |
---|
569 | corruption to an incident gatherer service, if one is configured. Note that |
---|
570 | corrupted shares indicate hardware failures, serious software bugs, or malice |
---|
571 | on the part of the storage server operator, so a corrupted share should be |
---|
572 | considered highly unusual. |
---|
573 | |
---|
574 | By periodically checking/repairing all files and directories, objects in the |
---|
575 | Tahoe filesystem remain resistant to recoverability failures due to missing |
---|
576 | and/or broken servers. |
---|
577 | |
---|
578 | This release includes a wapi mechanism to initiate checks on individual |
---|
579 | files and directories (with or without verification, and with or without |
---|
580 | automatic repair). A related mechanism is used to initiate a "deep-check" on |
---|
581 | a directory: recursively traversing the directory and its children, checking |
---|
582 | (and/or verifying/repairing) everything underneath. Both mechanisms can be |
---|
583 | run with an "output=JSON" argument, to obtain machine-readable check/repair |
---|
584 | status results. These results include a copy of the filesystem statistics |
---|
585 | from the "deep-stats" operation (including total number of files, size |
---|
586 | histogram, etc). If repair is possible, a "Repair" button will appear on the |
---|
587 | results page. |
---|
588 | |
---|
589 | The client web interface now features some extra buttons to initiate check |
---|
590 | and deep-check operations. When these operations finish, they display a |
---|
591 | results page that summarizes any problems that were encountered. All |
---|
592 | long-running deep-traversal operations, including deep-check, use a |
---|
593 | start-and-poll mechanism, to avoid depending upon a single long-lived HTTP |
---|
594 | connection. docs/frontends/webapi.txt has details. |
---|
595 | |
---|
596 | ** Efficient Backup |
---|
597 | |
---|
598 | The "tahoe backup" command is new in this release, which creates efficient |
---|
599 | versioned backups of a local directory. Given a local pathname and a target |
---|
600 | Tahoe directory, this will create a read-only snapshot of the local directory |
---|
601 | in $target/Archives/$timestamp. It will also create $target/Latest, which is |
---|
602 | a reference to the latest such snapshot. Each time you run "tahoe backup" |
---|
603 | with the same source and target, a new $timestamp snapshot will be added. |
---|
604 | These snapshots will share directories that have not changed since the last |
---|
605 | backup, to speed up the process and minimize storage requirements. In |
---|
606 | addition, a small database is used to keep track of which local files have |
---|
607 | been uploaded already, to avoid uploading them a second time. This |
---|
608 | drastically reduces the work needed to do a "null backup" (when nothing has |
---|
609 | changed locally), making "tahoe backup' suitable to run from a daily cronjob. |
---|
610 | |
---|
611 | Note that the "tahoe backup" CLI command must be used in conjunction with a |
---|
612 | 1.3.0-or-newer Tahoe client node; there was a bug in the 1.2.0 webapi |
---|
613 | implementation that would prevent the last step (create $target/Latest) from |
---|
614 | working. |
---|
615 | |
---|
616 | ** Large Files |
---|
617 | |
---|
618 | The 12GiB (approximate) immutable-file-size limitation is lifted. This |
---|
619 | release knows how to handle so-called "v2 immutable shares", which permit |
---|
620 | immutable files of up to about 18 EiB (about 3*10^14). These v2 shares are |
---|
621 | created if the file to be uploaded is too large to fit into v1 shares. v1 |
---|
622 | shares are created if the file is small enough to fit into them, so that |
---|
623 | files created with tahoe-1.3.0 can still be read by earlier versions if they |
---|
624 | are not too large. Note that storage servers also had to be changed to |
---|
625 | support larger files, and this release is the first release in which they are |
---|
626 | able to do that. Clients will detect which servers are capable of supporting |
---|
627 | large files on upload and will not attempt to upload shares of a large file |
---|
628 | to a server which doesn't support it. |
---|
629 | |
---|
630 | ** FTP/SFTP Server |
---|
631 | |
---|
632 | Tahoe now includes experimental FTP and SFTP servers. When configured with a |
---|
633 | suitable method to translate username+password into a root directory cap, it |
---|
634 | provides simple access to the virtual filesystem. Remember that FTP is |
---|
635 | completely unencrypted: passwords, filenames, and file contents are all sent |
---|
636 | over the wire in cleartext, so FTP should only be used on a local (127.0.0.1) |
---|
637 | connection. This feature is still in development: there are no unit tests |
---|
638 | yet, and behavior with respect to Unicode filenames is uncertain. Please see |
---|
639 | docs/frontends/FTP-and-SFTP.txt for configuration details. (#512, #531) |
---|
640 | |
---|
641 | ** CLI Changes |
---|
642 | |
---|
643 | This release adds the 'tahoe create-alias' command, which is a combination of |
---|
644 | 'tahoe mkdir' and 'tahoe add-alias'. This also allows you to start using a |
---|
645 | new tahoe directory without exposing its URI in the argv list, which is |
---|
646 | publicly visible (through the process table) on most unix systems. Thanks to |
---|
647 | Kevin Reid for bringing this issue to our attention. |
---|
648 | |
---|
649 | The single-argument form of "tahoe put" was changed to create an unlinked |
---|
650 | file. I.e. "tahoe put bar.txt" will take the contents of a local "bar.txt" |
---|
651 | file, upload them to the grid, and print the resulting read-cap; the file |
---|
652 | will not be attached to any directories. This seemed a bit more useful than |
---|
653 | the previous behavior (copy stdin, upload to the grid, attach the resulting |
---|
654 | file into your default tahoe: alias in a child named 'bar.txt'). |
---|
655 | |
---|
656 | "tahoe put" was also fixed to handle mutable files correctly: "tahoe put |
---|
657 | bar.txt URI:SSK:..." will read the contents of the local bar.txt and use them |
---|
658 | to replace the contents of the given mutable file. |
---|
659 | |
---|
660 | The "tahoe webopen" command was modified to accept aliases. This means "tahoe |
---|
661 | webopen tahoe:" will cause your web browser to open to a "wui" page that |
---|
662 | gives access to the directory associated with the default "tahoe:" alias. It |
---|
663 | should also accept leading slashes, like "tahoe webopen tahoe:/stuff". |
---|
664 | |
---|
665 | Many esoteric debugging commands were moved down into a "debug" subcommand: |
---|
666 | |
---|
667 | tahoe debug dump-cap |
---|
668 | tahoe debug dump-share |
---|
669 | tahoe debug find-shares |
---|
670 | tahoe debug catalog-shares |
---|
671 | tahoe debug corrupt-share |
---|
672 | |
---|
673 | The last command ("tahoe debug corrupt-share") flips a random bit of the |
---|
674 | given local sharefile. This is used to test the file verifying/repairing |
---|
675 | code, and obviously should not be used on user data. |
---|
676 | |
---|
677 | The cli might not correctly handle arguments which contain non-ascii |
---|
678 | characters in Tahoe v1.3 (although depending on your platform it |
---|
679 | might, especially if your platform can be configured to pass such |
---|
680 | characters on the command-line in utf-8 encoding). See |
---|
681 | http://allmydata.org/trac/tahoe/ticket/565 for details. |
---|
682 | |
---|
683 | ** Web changes |
---|
684 | |
---|
685 | The "default webapi port", used when creating a new client node (and in the |
---|
686 | getting-started documentation), was changed from 8123 to 3456, to reduce |
---|
687 | confusion when Tahoe accessed through a Firefox browser on which the |
---|
688 | "Torbutton" extension has been installed. Port 8123 is occasionally used as a |
---|
689 | Tor control port, so Torbutton adds 8123 to Firefox's list of "banned ports" |
---|
690 | to avoid CSRF attacks against Tor. Once 8123 is banned, it is difficult to |
---|
691 | diagnose why you can no longer reach a Tahoe node, so the Tahoe default was |
---|
692 | changed. Note that 3456 is reserved by IANA for the "vat" protocol, but there |
---|
693 | are argueably more Torbutton+Tahoe users than vat users these days. Note that |
---|
694 | this will only affect newly-created client nodes. Pre-existing client nodes, |
---|
695 | created by earlier versions of tahoe, may still be listening on 8123. |
---|
696 | |
---|
697 | All deep-traversal operations (start-manifest, start-deep-size, |
---|
698 | start-deep-stats, start-deep-check) now use a start-and-poll approach, |
---|
699 | instead of using a single (fragile) long-running synchronous HTTP connection. |
---|
700 | All these "start-" operations use POST instead of GET. The old "GET |
---|
701 | manifest", "GET deep-size", and "POST deep-check" operations have been |
---|
702 | removed. |
---|
703 | |
---|
704 | The new "POST start-manifest" operation, when it finally completes, results |
---|
705 | in a table of (path,cap), instead of the list of verifycaps produced by the |
---|
706 | old "GET manifest". The table is available in several formats: use |
---|
707 | output=html, output=text, or output=json to choose one. The JSON output also |
---|
708 | includes stats, and a list of verifycaps and storage-index strings. |
---|
709 | |
---|
710 | The "return_to=" and "when_done=" arguments have been removed from the |
---|
711 | t=check and deep-check operations. |
---|
712 | |
---|
713 | The top-level status page (/status) now has a machine-readable form, via |
---|
714 | "/status/?t=json". This includes information about the currently-active |
---|
715 | uploads and downloads, which may be useful for frontends that wish to display |
---|
716 | progress information. There is no easy way to correlate the activities |
---|
717 | displayed here with recent wapi requests, however. |
---|
718 | |
---|
719 | Any files in BASEDIR/public_html/ (configurable) will be served in response |
---|
720 | to requests in the /static/ portion of the URL space. This will simplify the |
---|
721 | deployment of javascript-based frontends that can still access wapi calls |
---|
722 | by conforming to the (regrettable) "same-origin policy". |
---|
723 | |
---|
724 | The welcome page now has a "Report Incident" button, which is tied into the |
---|
725 | "Incident Gatherer" machinery. If the node is attached to an incident |
---|
726 | gatherer (via log_gatherer.furl), then pushing this button will cause an |
---|
727 | Incident to be signalled: this means recent log events are aggregated and |
---|
728 | sent in a bundle to the gatherer. The user can push this button after |
---|
729 | something strange takes place (and they can provide a short message to go |
---|
730 | along with it), and the relevant data will be delivered to a centralized |
---|
731 | incident-gatherer for later processing by operations staff. |
---|
732 | |
---|
733 | The "HEAD" method should now work correctly, in addition to the usual "GET", |
---|
734 | "PUT", and "POST" methods. "HEAD" is supposed to return exactly the same |
---|
735 | headers as "GET" would, but without any of the actual response body data. For |
---|
736 | mutable files, this now does a brief mapupdate (to figure out the size of the |
---|
737 | file that would be returned), without actually retrieving the file's |
---|
738 | contents. |
---|
739 | |
---|
740 | The "GET" operation on files can now support the HTTP "Range:" header, |
---|
741 | allowing requests for partial content. This allows certain media players to |
---|
742 | correctly stream audio and movies out of a Tahoe grid. The current |
---|
743 | implementation uses a disk-based cache in BASEDIR/private/cache/download , |
---|
744 | which holds the plaintext of the files being downloaded. Future |
---|
745 | implementations might not use this cache. GET for immutable files now returns |
---|
746 | an ETag header. |
---|
747 | |
---|
748 | Each file and directory now has a "Show More Info" web page, which contains |
---|
749 | much of the information that was crammed into the directory page before. This |
---|
750 | includes readonly URIs, storage index strings, object type, buttons to |
---|
751 | control checking/verifying/repairing, and deep-check/deep-stats buttons (for |
---|
752 | directories). For mutable files, the "replace contents" upload form has been |
---|
753 | moved here too. As a result, the directory page is now much simpler and |
---|
754 | cleaner, and several potentially-misleading links (like t=uri) are now gone. |
---|
755 | |
---|
756 | Slashes are discouraged in Tahoe file/directory names, since they cause |
---|
757 | problems when accessing the filesystem through the wapi. However, there are |
---|
758 | a couple of accidental ways to generate such names. This release tries to |
---|
759 | make it easier to correct such mistakes by escaping slashes in several |
---|
760 | places, allowing slashes in the t=info and t=delete commands, and in the |
---|
761 | source (but not the target) of a t=rename command. |
---|
762 | |
---|
763 | ** Packaging |
---|
764 | |
---|
765 | Tahoe's dependencies have been extended to require the "[secure_connections]" |
---|
766 | feature from Foolscap, which will cause pyOpenSSL to be required and/or |
---|
767 | installed. If OpenSSL and its development headers are already installed on |
---|
768 | your system, this can occur automatically. Tahoe now uses pollreactor |
---|
769 | (instead of the default selectreactor) to work around a bug between pyOpenSSL |
---|
770 | and the most recent release of Twisted (8.1.0). This bug only affects unit |
---|
771 | tests (hang during shutdown), and should not impact regular use. |
---|
772 | |
---|
773 | The Tahoe source code tarballs now come in two different forms: regular and |
---|
774 | "sumo". The regular tarball contains just Tahoe, nothing else. When building |
---|
775 | from the regular tarball, the build process will download any unmet |
---|
776 | dependencies from the internet (starting with the index at PyPI) so it can |
---|
777 | build and install them. The "sumo" tarball contains copies of all the |
---|
778 | libraries that Tahoe requires (foolscap, twisted, zfec, etc), so using the |
---|
779 | "sumo" tarball should not require any internet access during the build |
---|
780 | process. This can be useful if you want to build Tahoe while on an airplane, |
---|
781 | a desert island, or other bandwidth-limited environments. |
---|
782 | |
---|
783 | Similarly, allmydata.org now hosts a "tahoe-deps" tarball which contains the |
---|
784 | latest versions of all these dependencies. This tarball, located at |
---|
785 | http://allmydata.org/source/tahoe/deps/tahoe-deps.tar.gz, can be unpacked in |
---|
786 | the tahoe source tree (or in its parent directory), and the build process |
---|
787 | should satisfy its downloading needs from it instead of reaching out to PyPI. |
---|
788 | This can be useful if you want to build Tahoe from a darcs checkout while on |
---|
789 | that airplane or desert island. |
---|
790 | |
---|
791 | Because of the previous two changes ("sumo" tarballs and the "tahoe-deps" |
---|
792 | bundle), most of the files have been removed from misc/dependencies/ . This |
---|
793 | brings the regular Tahoe tarball down to 2MB (compressed), and the darcs |
---|
794 | checkout (without history) to about 7.6MB. A full darcs checkout will still |
---|
795 | be fairly large (because of the historical patches which included the |
---|
796 | dependent libraries), but a 'lazy' one should now be small. |
---|
797 | |
---|
798 | The default "make" target is now an alias for "setup.py build", which itself |
---|
799 | is an alias for "setup.py develop --prefix support", with some extra work |
---|
800 | before and after (see setup.cfg). Most of the complicated platform-dependent |
---|
801 | code in the Makefile was rewritten in Python and moved into setup.py, |
---|
802 | simplifying things considerably. |
---|
803 | |
---|
804 | Likewise, the "make test" target now delegates most of its work to "setup.py |
---|
805 | test", which takes care of getting PYTHONPATH configured to access the tahoe |
---|
806 | code (and dependencies) that gets put in support/lib/ by the build_tahoe |
---|
807 | step. This should allow unit tests to be run even when trial (which is part |
---|
808 | of Twisted) wasn't already installed (in this case, trial gets installed to |
---|
809 | support/bin because Twisted is a dependency of Tahoe). |
---|
810 | |
---|
811 | Tahoe is now compatible with the recently-released Python 2.6 , although it |
---|
812 | is recommended to use Tahoe on Python 2.5, on which it has received more |
---|
813 | thorough testing and deployment. |
---|
814 | |
---|
815 | Tahoe is now compatible with simplejson-2.0.x . The previous release assumed |
---|
816 | that simplejson.loads always returned unicode strings, which is no longer the |
---|
817 | case in 2.0.x . |
---|
818 | |
---|
819 | ** Grid Management Tools |
---|
820 | |
---|
821 | Several tools have been added or updated in the misc/ directory, mostly munin |
---|
822 | plugins that can be used to monitor a storage grid. |
---|
823 | |
---|
824 | The misc/spacetime/ directory contains a "disk watcher" daemon (startable |
---|
825 | with 'tahoe start'), which can be configured with a set of HTTP URLs |
---|
826 | (pointing at the wapi '/statistics' page of a bunch of storage servers), |
---|
827 | and will periodically fetch disk-used/disk-available information from all the |
---|
828 | servers. It keeps this information in an Axiom database (a sqlite-based |
---|
829 | library available from divmod.org). The daemon computes time-averaged rates |
---|
830 | of disk usage, as well as a prediction of how much time is left before the |
---|
831 | grid is completely full. |
---|
832 | |
---|
833 | The misc/munin/ directory contains a new set of munin plugins |
---|
834 | (tahoe_diskleft, tahoe_diskusage, tahoe_doomsday) which talk to the |
---|
835 | disk-watcher and provide graphs of its calculations. |
---|
836 | |
---|
837 | To support the disk-watcher, the Tahoe statistics component (visible through |
---|
838 | the wapi at the /statistics/ URL) now includes disk-used and disk-available |
---|
839 | information. Both are derived through an equivalent of the unix 'df' command |
---|
840 | (i.e. they ask the kernel for the number of free blocks on the partition that |
---|
841 | encloses the BASEDIR/storage directory). In the future, the disk-available |
---|
842 | number will be further influenced by the local storage policy: if that policy |
---|
843 | says that the server should refuse new shares when less than 5GB is left on |
---|
844 | the partition, then "disk-available" will report zero even though the kernel |
---|
845 | sees 5GB remaining. |
---|
846 | |
---|
847 | The 'tahoe_overhead' munin plugin interacts with an allmydata.com-specific |
---|
848 | server which reports the total of the 'deep-size' reports for all active user |
---|
849 | accounts, compares this with the disk-watcher data, to report on overhead |
---|
850 | percentages. This provides information on how much space could be recovered |
---|
851 | once Tahoe implements some form of garbage collection. |
---|
852 | |
---|
853 | ** Configuration Changes: single INI-format tahoe.cfg file |
---|
854 | |
---|
855 | The Tahoe node is now configured with a single INI-format file, named |
---|
856 | "tahoe.cfg", in the node's base directory. Most of the previous |
---|
857 | multiple-separate-files are still read for backwards compatibility (the |
---|
858 | embedded SSH debug server and the advertised_ip_addresses files are the |
---|
859 | exceptions), but new directives will only be added to tahoe.cfg . The "tahoe |
---|
860 | create-client" command will create a tahoe.cfg for you, with sample values |
---|
861 | commented out. (ticket #518) |
---|
862 | |
---|
863 | tahoe.cfg now has controls for the foolscap "keepalive" and "disconnect" |
---|
864 | timeouts (#521). |
---|
865 | |
---|
866 | tahoe.cfg now has controls for the encoding parameters: "shares.needed" and |
---|
867 | "shares.total" in the "[client]" section. The default parameters are still |
---|
868 | 3-of-10. |
---|
869 | |
---|
870 | The inefficient storage 'sizelimit' control (which established an upper bound |
---|
871 | on the amount of space that a storage server is allowed to consume) has been |
---|
872 | replaced by a lightweight 'reserved_space' control (which establishes a lower |
---|
873 | bound on the amount of remaining space). The storage server will reject all |
---|
874 | writes that would cause the remaining disk space (as measured by a '/bin/df' |
---|
875 | equivalent) to drop below this value. The "[storage]reserved_space=" |
---|
876 | tahoe.cfg parameter controls this setting. (note that this only affects |
---|
877 | immutable shares: it is an outstanding bug that reserved_space does not |
---|
878 | prevent the allocation of new mutable shares, nor does it prevent the growth |
---|
879 | of existing mutable shares). |
---|
880 | |
---|
881 | ** Other Changes |
---|
882 | |
---|
883 | Clients now declare which versions of the protocols they support. This is |
---|
884 | part of a new backwards-compatibility system: |
---|
885 | http://allmydata.org/trac/tahoe/wiki/Versioning . |
---|
886 | |
---|
887 | The version strings for human inspection (as displayed on the Welcome web |
---|
888 | page, and included in logs) now includes a platform identifer (frequently |
---|
889 | including a linux distribution name, processor architecture, etc). |
---|
890 | |
---|
891 | Several bugs have been fixed, including one that would cause an exception (in |
---|
892 | the logs) if a wapi download operation was cancelled (by closing the TCP |
---|
893 | connection, or pushing the "stop" button in a web browser). |
---|
894 | |
---|
895 | Tahoe now uses Foolscap "Incidents", writing an "incident report" file to |
---|
896 | logs/incidents/ each time something weird occurs. These reports are available |
---|
897 | to an "incident gatherer" through the flogtool command. For more details, |
---|
898 | please see the Foolscap logging documentation. An incident-classifying plugin |
---|
899 | function is provided in misc/incident-gatherer/classify_tahoe.py . |
---|
900 | |
---|
901 | If clients detect corruption in shares, they now automatically report it to |
---|
902 | the server holding that share, if it is new enough to accept the report. |
---|
903 | These reports are written to files in BASEDIR/storage/corruption-advisories . |
---|
904 | |
---|
905 | The 'nickname' setting is now defined to be a UTF-8 -encoded string, allowing |
---|
906 | non-ascii nicknames. |
---|
907 | |
---|
908 | The 'tahoe start' command will now accept a --syslog argument and pass it |
---|
909 | through to twistd, making it easier to launch non-Tahoe nodes (like the |
---|
910 | cpu-watcher) and have them log to syslogd instead of a local file. This is |
---|
911 | useful when running a Tahoe node out of a USB flash drive. |
---|
912 | |
---|
913 | The Mac GUI in src/allmydata/gui/ has been improved. |
---|
914 | |
---|
915 | |
---|
916 | * Release 1.2.0 (2008-07-21) |
---|
917 | |
---|
918 | ** Security |
---|
919 | |
---|
920 | This release makes the immutable-file "ciphertext hash tree" mandatory. |
---|
921 | Previous releases allowed the uploader to decide whether their file would |
---|
922 | have an integrity check on the ciphertext or not. A malicious uploader could |
---|
923 | use this to create a readcap that would download as one file or a different |
---|
924 | one, depending upon which shares the client fetched first, with no errors |
---|
925 | raised. There are other integrity checks on the shares themselves, preventing |
---|
926 | a storage server or other party from violating the integrity properties of |
---|
927 | the read-cap: this failure was only exploitable by the uploader who gives you |
---|
928 | a carefully constructed read-cap. If you download the file with Tahoe 1.2.0 |
---|
929 | or later, you will not be vulnerable to this problem. #491 |
---|
930 | |
---|
931 | This change does not introduce a compatibility issue, because all existing |
---|
932 | versions of Tahoe will emit the ciphertext hash tree in their shares. |
---|
933 | |
---|
934 | ** Dependencies |
---|
935 | |
---|
936 | Tahoe now requires Foolscap-0.2.9 . It also requires pycryptopp 0.5 or newer, |
---|
937 | since earlier versions had a bug that interacted with specific compiler |
---|
938 | versions that could sometimes result in incorrect encryption behavior. Both |
---|
939 | packages are included in the Tahoe source tarball in misc/dependencies/ , and |
---|
940 | should be built automatically when necessary. |
---|
941 | |
---|
942 | ** Web API |
---|
943 | |
---|
944 | Web API directory pages should now contain properly-slash-terminated links to |
---|
945 | other directories. They have also stopped using absolute links in forms and |
---|
946 | pages (which interfered with the use of a front-end load-balancing proxy). |
---|
947 | |
---|
948 | The behavior of the "Check This File" button changed, in conjunction with |
---|
949 | larger internal changes to file checking/verification. The button triggers an |
---|
950 | immediate check as before, but the outcome is shown on its own page, and does |
---|
951 | not get stored anywhere. As a result, the web directory page no longer shows |
---|
952 | historical checker results. |
---|
953 | |
---|
954 | A new "Deep-Check" button has been added, which allows a user to initiate a |
---|
955 | recursive check of the given directory and all files and directories |
---|
956 | reachable from it. This can cause quite a bit of work, and has no |
---|
957 | intermediate progress information or feedback about the process. In addition, |
---|
958 | the results of the deep-check are extremely limited. A later release will |
---|
959 | improve this behavior. |
---|
960 | |
---|
961 | The web server's behavior with respect to non-ASCII (unicode) filenames in |
---|
962 | the "GET save=true" operation has been improved. To achieve maximum |
---|
963 | compatibility with variously buggy web browsers, the server does not try to |
---|
964 | figure out the character set of the inbound filename. It just echoes the same |
---|
965 | bytes back to the browser in the Content-Disposition header. This seems to |
---|
966 | make both IE7 and Firefox work correctly. |
---|
967 | |
---|
968 | ** Checker/Verifier/Repairer |
---|
969 | |
---|
970 | Tahoe is slowly acquiring convenient tools to check up on file health, |
---|
971 | examine existing shares for errors, and repair files that are not fully |
---|
972 | healthy. This release adds a mutable checker/verifier/repairer, although |
---|
973 | testing is very limited, and there are no web interfaces to trigger repair |
---|
974 | yet. The "Check" button next to each file or directory on the wapi page |
---|
975 | will perform a file check, and the "deep check" button on each directory will |
---|
976 | recursively check all files and directories reachable from there (which may |
---|
977 | take a very long time). |
---|
978 | |
---|
979 | Future releases will improve access to this functionality. |
---|
980 | |
---|
981 | ** Operations/Packaging |
---|
982 | |
---|
983 | A "check-grid" script has been added, along with a Makefile target. This is |
---|
984 | intended (with the help of a pre-configured node directory) to check upon the |
---|
985 | health of a Tahoe grid, uploading and downloading a few files. This can be |
---|
986 | used as a monitoring tool for a deployed grid, to be run periodically and to |
---|
987 | signal an error if it ever fails. It also helps with compatibility testing, |
---|
988 | to verify that the latest Tahoe code is still able to handle files created by |
---|
989 | an older version. |
---|
990 | |
---|
991 | The munin plugins from misc/munin/ are now copied into any generated debian |
---|
992 | packages, and are made executable (and uncompressed) so they can be symlinked |
---|
993 | directly from /etc/munin/plugins/ . |
---|
994 | |
---|
995 | Ubuntu "Hardy" was added as a supported debian platform, with a Makefile |
---|
996 | target to produce hardy .deb packages. Some notes have been added to |
---|
997 | docs/debian.txt about building Tahoe on a debian/ubuntu system. |
---|
998 | |
---|
999 | Storage servers now measure operation rates and latency-per-operation, and |
---|
1000 | provides results through the /statistics web page as well as the stats |
---|
1001 | gatherer. Munin plugins have been added to match. |
---|
1002 | |
---|
1003 | ** Other |
---|
1004 | |
---|
1005 | Tahoe nodes now use Foolscap "incident logging" to record unusual events to |
---|
1006 | their NODEDIR/logs/incidents/ directory. These incident files can be examined |
---|
1007 | by Foolscap logging tools, or delivered to an external log-gatherer for |
---|
1008 | further analysis. Note that Tahoe now requires Foolscap-0.2.9, since 0.2.8 |
---|
1009 | had a bug that complained about "OSError: File exists" when trying to create |
---|
1010 | the incidents/ directory for a second time. |
---|
1011 | |
---|
1012 | If no servers are available when retrieving a mutable file (like a |
---|
1013 | directory), the node now reports an error instead of hanging forever. Earlier |
---|
1014 | releases would not only hang (causing the wapi directory listing to get |
---|
1015 | stuck half-way through), but the internal dirnode serialization would cause |
---|
1016 | all subsequent attempts to retrieve or modify the same directory to hang as |
---|
1017 | well. #463 |
---|
1018 | |
---|
1019 | A minor internal exception (reported in logs/twistd.log, in the |
---|
1020 | "stopProducing" method) was fixed, which complained about "self._paused_at |
---|
1021 | not defined" whenever a file download was stopped from the web browser end. |
---|
1022 | |
---|
1023 | |
---|
1024 | * Release 1.1.0 (2008-06-11) |
---|
1025 | |
---|
1026 | ** CLI: new "alias" model |
---|
1027 | |
---|
1028 | The new CLI code uses an scp/rsync -like interface, in which directories in |
---|
1029 | the Tahoe storage grid are referenced by a colon-suffixed alias. The new |
---|
1030 | commands look like: |
---|
1031 | tahoe cp local.txt tahoe:virtual.txt |
---|
1032 | tahoe ls work:subdir |
---|
1033 | |
---|
1034 | More functionality is available through the CLI: creating unlinked files and |
---|
1035 | directories, recursive copy in or out of the storage grid, hardlinks, and |
---|
1036 | retrieving the raw read- or write- caps through the 'ls' command. Please read |
---|
1037 | docs/CLI.txt for complete details. |
---|
1038 | |
---|
1039 | ** wapi: new pages, new commands |
---|
1040 | |
---|
1041 | Several new pages were added to the web API: |
---|
1042 | |
---|
1043 | /helper_status : to describe what a Helper is doing |
---|
1044 | /statistics : reports node uptime, CPU usage, other stats |
---|
1045 | /file : for easy file-download URLs, see #221 |
---|
1046 | /cap == /uri : future compatibility |
---|
1047 | |
---|
1048 | The localdir=/localfile= and t=download operations were removed. These |
---|
1049 | required special configuration to enable anyways, but this feature was a |
---|
1050 | security problem, and was mostly obviated by the new "cp -r" command. |
---|
1051 | |
---|
1052 | Several new options to the GET command were added: |
---|
1053 | |
---|
1054 | t=deep-size : add up the size of all immutable files reachable from the directory |
---|
1055 | t=deep-stats : return a JSON-encoded description of number of files, size |
---|
1056 | distribution, total size, etc |
---|
1057 | |
---|
1058 | POST is now preferred over PUT for most operations which cause side-effects. |
---|
1059 | |
---|
1060 | Most wapi calls now accept overwrite=, and default to overwrite=true . |
---|
1061 | |
---|
1062 | "POST /uri/DIRCAP/parent/child?t=mkdir" is now the preferred API to create |
---|
1063 | multiple directories at once, rather than ...?t=mkdir-p . |
---|
1064 | |
---|
1065 | PUT to a mutable file ("PUT /uri/MUTABLEFILECAP", "PUT /uri/DIRCAP/child") |
---|
1066 | will modify the file in-place. |
---|
1067 | |
---|
1068 | ** more munin graphs in misc/munin/ |
---|
1069 | |
---|
1070 | tahoe-introstats |
---|
1071 | tahoe-rootdir-space |
---|
1072 | tahoe_estimate_files |
---|
1073 | mutable files published/retrieved |
---|
1074 | tahoe_cpu_watcher |
---|
1075 | tahoe_spacetime |
---|
1076 | |
---|
1077 | ** New Dependencies |
---|
1078 | |
---|
1079 | zfec 1.1.0 |
---|
1080 | foolscap 0.2.8 |
---|
1081 | pycryptopp 0.5 |
---|
1082 | setuptools (now required at runtime) |
---|
1083 | |
---|
1084 | ** New Mutable-File Code |
---|
1085 | |
---|
1086 | The mutable-file handling code (mostly used for directories) has been |
---|
1087 | completely rewritten. The new scheme has a better API (with a modify() |
---|
1088 | method) and is less likely to lose data when several uncoordinated writers |
---|
1089 | change a file at the same time. |
---|
1090 | |
---|
1091 | In addition, a single Tahoe process will coordinate its own writes. If you |
---|
1092 | make two concurrent directory-modifying wapi calls to a single tahoe node, |
---|
1093 | it will internally make one of them wait for the other to complete. This |
---|
1094 | prevents auto-collision (#391). |
---|
1095 | |
---|
1096 | The new mutable-file code also detects errors during publish better. Earlier |
---|
1097 | releases might believe that a mutable file was published when in fact it |
---|
1098 | failed. |
---|
1099 | |
---|
1100 | ** other features |
---|
1101 | |
---|
1102 | The node now monitors its own CPU usage, as a percentage, measured every 60 |
---|
1103 | seconds. 1/5/15 minute moving averages are available on the /statistics web |
---|
1104 | page and via the stats-gathering interface. |
---|
1105 | |
---|
1106 | Clients now accelerate reconnection to all servers after being offline |
---|
1107 | (#374). When a client is offline for a long time, it scales back reconnection |
---|
1108 | attempts to approximately once per hour, so it may take a while to make the |
---|
1109 | first attempt, but once any attempt succeeds, the other server connections |
---|
1110 | will be retried immediately. |
---|
1111 | |
---|
1112 | A new "offloaded KeyGenerator" facility can be configured, to move RSA key |
---|
1113 | generation out from, say, a wapi node, into a separate process. RSA keys |
---|
1114 | can take several seconds to create, and so a wapi node which is being used |
---|
1115 | for directory creation will be unavailable for anything else during this |
---|
1116 | time. The Key Generator process will pre-compute a small pool of keys, to |
---|
1117 | speed things up further. This also takes better advantage of multi-core CPUs, |
---|
1118 | or SMP hosts. |
---|
1119 | |
---|
1120 | The node will only use a potentially-slow "du -s" command at startup (to |
---|
1121 | measure how much space has been used) if the "sizelimit" parameter has been |
---|
1122 | configured (to limit how much space is used). Large storage servers should |
---|
1123 | turn off sizelimit until a later release improves the space-management code, |
---|
1124 | since "du -s" on a terabyte filesystem can take hours. |
---|
1125 | |
---|
1126 | The Introducer now allows new announcements to replace old ones, to avoid |
---|
1127 | buildups of obsolete announcements. |
---|
1128 | |
---|
1129 | Immutable files are limited to about 12GiB (when using the default 3-of-10 |
---|
1130 | encoding), because larger files would be corrupted by the four-byte |
---|
1131 | share-size field on the storage servers (#439). A later release will remove |
---|
1132 | this limit. Earlier releases would allow >12GiB uploads, but the resulting |
---|
1133 | file would be unretrievable. |
---|
1134 | |
---|
1135 | The docs/ directory has been rearranged, with old docs put in |
---|
1136 | docs/historical/ and not-yet-implemented ones in docs/proposed/ . |
---|
1137 | |
---|
1138 | The Mac OS-X FUSE plugin has a significant bug fix: earlier versions would |
---|
1139 | corrupt writes that used seek() instead of writing the file in linear order. |
---|
1140 | The rsync tool is known to perform writes in this order. This has been fixed. |
---|