Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat!: namesys refactor, ipns TTL bubbled up to gateway #459

Merged
merged 9 commits into from Oct 18, 2023

Conversation

hacdias
Copy link
Member

@hacdias hacdias commented Sep 4, 2023

Turns out, we already had the TTL for IPNS Records inside this package. We were just not bubbling it up. This, for IPNS Records. We can manage this without doing it for domains, but I think it would be great if we did. Closes #329.

@codecov
Copy link

codecov bot commented Sep 4, 2023

Codecov Report

Merging #459 (d4411ba) into main (0a566c9) will increase coverage by 0.09%.
The diff coverage is 62.02%.

Impacted file tree graph

@@            Coverage Diff             @@
##             main     #459      +/-   ##
==========================================
+ Coverage   65.78%   65.87%   +0.09%     
==========================================
  Files         207      205       -2     
  Lines       25156    25134      -22     
==========================================
+ Hits        16549    16558       +9     
+ Misses       7147     7112      -35     
- Partials     1460     1464       +4     
Files Coverage Δ
gateway/gateway.go 85.60% <ø> (ø)
gateway/handler_block.go 69.76% <100.00%> (ø)
gateway/handler_car.go 75.42% <100.00%> (ø)
gateway/handler_codec.go 62.08% <100.00%> (+1.42%) ⬆️
gateway/handler_tar.go 79.36% <100.00%> (ø)
gateway/handler_unixfs_file.go 85.71% <100.00%> (+12.69%) ⬆️
gateway/metrics.go 79.23% <100.00%> (ø)
ipns/name.go 79.68% <100.00%> (ø)
namesys/republisher/repub.go 58.65% <100.00%> (+0.81%) ⬆️
gateway/handler_unixfs__redirects.go 48.54% <0.00%> (ø)
... and 11 more

... and 13 files with indirect coverage changes

@hacdias
Copy link
Member Author

hacdias commented Sep 4, 2023

@lidel IPNS TTL is easy. We already have it inside namesys, it's just a matter of returning it. DNS not so much. Our DNS resolution is 100% tied to go-multiaddr-dns, where it was explicitly decided not to return the TTL. My suggestion is to set ETag and Max-Age for IPNS requests where we can return the TTL. If we can't, we just set the Last-Modified as we do now. What do you think?

Copy link
Member

@lidel lidel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@hacdias sounds like a sensible compromise. quick thoughts:

namesys/dns_resolver.go Outdated Show resolved Hide resolved
namesys/ipns_publisher.go Outdated Show resolved Hide resolved
namesys/mpns.go Outdated Show resolved Hide resolved
namesys/namesys.go Outdated Show resolved Hide resolved
namesys/mpns.go Outdated Show resolved Hide resolved
namesys/interface.go Show resolved Hide resolved
namesys/ipns_publisher.go Outdated Show resolved Hide resolved
namesys/ipns_publisher.go Outdated Show resolved Hide resolved
@hacdias
Copy link
Member Author

hacdias commented Sep 5, 2023

@lidel thanks for the preliminary review. Here's some notes and further questions:

  1. Specification update is in: gateway: clean Cache-Control and Last-Modified specs#436
  2. Kubo update is in: refactor: namesys cleanup, gateway /ipns/ ttl kubo#10115, failing at the moment because gateway conformance expects no Cache-Control in IPNS land.
  3. Do you think we should pass this TTL the way we did before for IPNS Records? That is, either the TTL from the record, the time to EOL, or the default. Or do you think it's best to pass strictly the given TTL? So far this was only being used for caching purposes, so I may need to update this if we really only want to return the TTL defined in the record.

ttl := DefaultResolverCacheTTL
if recordTTL, err := rec.TTL(); err == nil {
ttl = recordTTL
}
switch eol, err := rec.Validity(); err {
case ipns.ErrUnrecognizedValidity:
// No EOL.
case nil:
ttEol := time.Until(eol)
if ttEol < 0 {
// It *was* valid when we first resolved it.
ttl = 0
} else if ttEol < ttl {
ttl = ttEol
}

  1. Regarding testing, I think it would be useful to have AnyOf, but I can probably get around without it for now.
  2. Should we add Cache-Control in the following situations (important before tackling conformance):
    a. Generated directory listings under /ipns?
    b. Directory listings that serve index.html?
  3. Other comments inline.

@hacdias hacdias requested a review from lidel September 5, 2023 11:32
namesys/interface.go Outdated Show resolved Hide resolved
namesys/interface.go Outdated Show resolved Hide resolved
@hacdias hacdias changed the base branch from main to issue/198 September 5, 2023 13:15
@hacdias hacdias force-pushed the ns-cleanup-fix-329 branch 2 times, most recently from c5a7219 to 17cd5dd Compare September 6, 2023 10:21
@lidel
Copy link
Member

lidel commented Sep 7, 2023

re:

  • (3) Hm.. the TTL is still used for caching purposes, we reuse it for HTTP caching. I think the logic we had was sensible: it was respecting TTL, but if EOL of IPNS Record happened to hit before TTL expires, we picked the lower value (EOL). Does not matter much today (when we have low ttl), but might be safer to keep this in case people set short expiration and high TTL (being stuck with old value against their will).
  • (4) mark these places with // TODO: switch to AnyOf from https://github.com/ipfs/gateway-conformance/issues/153, so we dont forget 🙏
  • (5) Yes to both?
    • (5.a) Should be ok to do so: TTL will usually expire before there is a new release of Kubo
    • (5.b) This is the most important change we make, as it will allow IPNS publisher to use TTL value from the record to control how long websites are cached on gateways and on user's browsers. Currently its Last-Modified-based heuristic which is a blunt instrument. Returning Cache-Control when we have TTL will be value added.

ps. We probably want to KEEP Last-Modified for /ipns and base it on how long namesys resolution entry has been on the cache, and add Cache-Control based on TTL in addition to it (when we know TTL). See ipfs/specs#436 (comment)

@hacdias
Copy link
Member Author

hacdias commented Sep 7, 2023

ps. We probably want to KEEP Last-Modified for /ipns and base it on how long namesys resolution entry has been on the cache, and add Cache-Control based on TTL in addition to it (when we know TTL).

Not sure how we're supposed to achieve that. Somehow we'd have to tap into the resolver cache to get that information out of it. Besides, the time it is in cache is, at most TTL or "time until EOL" if TTL is smaller.

@hacdias hacdias force-pushed the ns-cleanup-fix-329 branch 2 times, most recently from e29ffd2 to 4e023b4 Compare September 7, 2023 13:15
@lidel
Copy link
Member

lidel commented Sep 8, 2023

Namesys has own cache. The idea here is to leverage that cache and store (value, lastmodified, ttl) instead of (value, ttl).

When ttl expires namesys knows it should check if there is a new updated version of the record.
Once a record with higher sequence number appears, and the value in the new record is the same, namesys keeps the same value in the cache, lastmodified timestamp also remains the same (indicating the first time the value was resolved), and only bumps TTL. IF the value changed, we bump lastmodified to the current timestamp (in the future, we could use value from signed IPNS record)

This way, we could have a more meaningful Last-Modified than time.now().
I think the main ask here is to future-proof the interface and return lastModified timestamp in addition to the ttl that is already added by this PR (this way we break API only once).

@hacdias
Copy link
Member Author

hacdias commented Sep 8, 2023

When ttl expires namesys knows it should check if there is a new updated version of the record.

Btw, I want to note that that is not the case at the time. Namesys cache keeps the record value until EOL:

boxo/namesys/cache.go

Lines 33 to 35 in 574df96

if time.Now().Before(entry.eol) {
return entry.val, true
}

I can definitely change it, because it would make more sense, but just a note.

Base automatically changed from issue/198 to main October 6, 2023 14:04
@hacdias hacdias changed the title refactor!: clean namesys and return TTL feat!: namesys refactor, ipns TTL bubbled up to gateway Oct 9, 2023
@hacdias
Copy link
Member Author

hacdias commented Oct 9, 2023

This PR is ready for review:

namesys/ipns_publisher.go Outdated Show resolved Hide resolved
@hacdias hacdias requested a review from lidel October 10, 2023 12:10
@hacdias hacdias force-pushed the ns-cleanup-fix-329 branch 3 times, most recently from 3d4e275 to 18aab37 Compare October 16, 2023 08:56
Copy link
Member

@lidel lidel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@hacdias thank you for cleaning the coreifrace and path leftovers and being patient with reviews on this.

I blocked some time today for review and pushed cosmetic refactors that unify implicit behaviors and docs for changes we should make to the IPNS publishing defaults.

Please check my changes and CHANGELOG I've added, namely the changes to defaults:
We had to increase TTL, now that it impacts caching in multiple places (namesys, gateway responses) 1 minute was too low. While at it, I also increased Lifetime and used it for publishing and reproviding to benefit from longer persistence window in Amino DHT.

Only remaining questions:

  • why CI did not run? (it is in pendign for me)
  • inline if we need separate ResolveResult and ResolveAsyncResult or can have one, but not a blocker.

If you are ok with my changes, and CI runs and is green, feel free to merge and bubble up – we want to include this in Kubo 0.24.

namesys/interface.go Outdated Show resolved Hide resolved
namesys/interface.go Outdated Show resolved Hide resolved
namesys/republisher/repub.go Outdated Show resolved Hide resolved
namesys/interface.go Outdated Show resolved Hide resolved
Comment on lines 61 to 74
// ResolveResult is the return type for [Resolver.Resolve].
type ResolveResult struct {
Path path.Path
TTL time.Duration
LastMod time.Time
}

// ResolveAsyncResult is the return type for [Resolver.ResolveAsync].
type ResolveAsyncResult struct {
Path path.Path
TTL time.Duration
LastMod time.Time
Err error
}
Copy link
Member

@lidel lidel Oct 17, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💭 ⚠️

@hacdias this feels like overkill, do we need both? can we have only one ResolveResult (or even shorter Result) with Err, like we did before?

Copy link
Member Author

@hacdias hacdias Oct 18, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@lidel the issue is that I don't think it makes sense for Resolve (non-async) to return a struct that contains an Err field. We can always add a comment saying that Err is always nil for .Resolve, but that's a bit beating around the bush. I would however suggest:

// Result is the return type for [Resolver.Resolve].
type Result struct {
	Path    path.Path
	TTL     time.Duration
	LastMod time.Time
}

// AsyncResult is the return type for [Resolver.ResolveAsync].
type AsyncResult struct {
	Result Result
	Err       error
}

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@lidel I have simplified the names, but I did not incorporate Result inside AsyncResult. I am going to merge the PR as-is. We can change this in a separate PR if we find a better of doing it. As long as it's before final release, it should be fine.

namesys/interface.go Outdated Show resolved Hide resolved
ipns/name.go Show resolved Hide resolved
@hacdias
Copy link
Member Author

hacdias commented Oct 18, 2023

@lidel I think CI did not run because it has conflicts with the main branch. I will take care of the feedback in Kubo, and bubble this up.

hacdias and others added 8 commits October 18, 2023 09:19
I made ipns.Name.src a string in order to make the struct comparable. It can now be used as a map key, but it's still protected
from being converted around.
Since we've started using TTLs, we should adjust default to make them
more useful by default.

1h comes from https://specs.ipfs.tech/ipns/ipns-record/#ipns-record
and is a safer default than 1m.
Moving defaults that are not specific to (re)publisher
This defines the implicit defaults used for every 'ipns name resolve'
DefaultResolverDhtTimeout
DefaultResolverDhtRecordCount
@hacdias hacdias merged commit a50f784 into main Oct 18, 2023
13 of 14 checks passed
@hacdias hacdias deleted the ns-cleanup-fix-329 branch October 18, 2023 08:12
lidel added a commit to ipfs-shipyard/nopfs that referenced this pull request Oct 19, 2023
This applies changes necessary after ipfs/boxo#459
we need this to unblock ipfs/kubo#10161
@BigLep BigLep mentioned this pull request Nov 9, 2023
11 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
No open projects
Archived in project
Development

Successfully merging this pull request may close these issues.

Gateway: Cache-Control, max-age=ttl, ETag for /ipns requests
2 participants