HTTP proxy support for node to node communication #1007
Labels
No Label
0.2.0
0.3.0
0.4.0
0.5.0
0.5.1
0.6.0
0.6.1
0.7.0
0.8.0
0.9.0
1.0.0
1.1.0
1.10.0
1.10.1
1.10.2
1.10a2
1.11.0
1.12.0
1.12.1
1.13.0
1.14.0
1.15.0
1.15.1
1.2.0
1.3.0
1.4.1
1.5.0
1.6.0
1.6.1
1.7.0
1.7.1
1.7β
1.8.0
1.8.1
1.8.2
1.8.3
1.8β
1.9.0
1.9.0-s3branch
1.9.0a1
1.9.0a2
1.9.0b1
1.9.1
1.9.2
1.9.2a1
LeastAuthority.com automation
blocker
cannot reproduce
cloud-branch
code
code-dirnodes
code-encoding
code-frontend
code-frontend-cli
code-frontend-ftp-sftp
code-frontend-magic-folder
code-frontend-web
code-mutable
code-network
code-nodeadmin
code-peerselection
code-storage
contrib
critical
defect
dev-infrastructure
documentation
duplicate
enhancement
fixed
invalid
major
minor
n/a
normal
operational
packaging
somebody else's problem
supercritical
task
trivial
unknown
was already fixed
website
wontfix
worksforme
No Milestone
No Assignees
5 Participants
Notifications
Due Date
No due date set.
Reference: tahoe-lafs/trac-2024-07-25#1007
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
To use Tahoe-LAFS over the I2P anonymous network I have added HTTP proxy support to the Foolscap library. Most of the work is in Foolscap, but within Tahoe it must also be possible to enable this functionality and specify which HTTP proxy to use. All I2P nodes have this HTTP proxy enabled by default on
127.0.0.1:4444
.For the anonymous network use case, every connection to storage nodes and introducers will have to be through the anonymous network; it is not acceptable to mix anonymous and non-anonymous connections. The intention is to provide anonymity to both clients and node operators.
A reference implementation is available on http://duck.i2p.to/tahoe-lafs/ , as of today (2010-03-27) a test grid is operating inside I2P with 21 nodes, of which 6 storage nodes and 1 introducer.
Example of configuration in
tahoe.cfg
:Snippit showing how this is used in
node.py
:Attachment trac_tahoe_http_proxy.txt (1218 bytes) added
HTTP Proxy support to Foolscap
Connected Foolscap tickets:
Requires a test that we enable the foolscap option when the
http_proxy
line is present.(The foolscap changes will also need additions to the foolscap test suite.)
Replying to davidsarah:
This should probably go in source:src/allmydata/test/test_client.py , I think.
So the status of this ticket is that it is waiting for someone (ideally duck) to write tests, right? I guess that's what the "test" keyword means? Hey, let's make a new keyword: "test-needed". :-)
See also #510 (use plain HTTP for storage server protocol).
So back in comment:76655 two months ago I set this ticket to "test-needed", and I haven't intended to do more on this ticket until duck (or someone) writes a test. But today I noticed that over on foolscap #150 and foolscap #151 duck has asked for the foolscap maintainer (Brian) to say whether he approves of the patches in principle and if so how to write a unit test for them. So the ball is back in our court. Brian: do you approve of these patches in principle?
Brian: please tell duck whether he has a chance of getting his patches accepted into foolscap trunk (assuming of course that the patches pass quality requirements -- unit tests, code review, docs, etc.). I think duck has been blocked by not wanting to invest effort into his patches when he hasn't received any indication from the foolscap maintainer on whether those patches could ever have a chance of inclusion.
Oh look! Brian updated foolscap #150 and foolscap #151!
Attachment 1007-http-proxy-support.patch (2052 bytes) added
HTTP Proxy support to Foolscap v2
The suggestion of Brian to name the foolscap property
http-proxy
instead ofhttpProxy
has been taken.In addition to this an unit test has been implemented as suggested by davidsarah in comment:76653.
test_node.py
seemed to be a better place thantest_client.py
(comment:5) as this option applies to thenode
section and changes are made tonode.py
.Please review version 2 of the patch.
Given Brian's [comment:-1 on foolscap#150](@@http://foolscap.lothar.com/trac/ticket/150#comment:-1@@) that the proxy is actually relaying foolscap (which only initially looks a little like HTTP), I think the option name should not have "http" in it. Technically it is a "storage connection proxy", although that is a little long.
Another reason not to use "http" is that that could be confused with an HTTP proxy for the web-API (which we intentionally do not support).
Which name would you approve of for the "introducer and storage connection proxy that speaks a little HTTP proxy and is used by foolscap to make any outbound connections" configuration option?
Assigning to davidsarah to answer duck's question from comment:76664. (Brian may also have an opinion.)
outbound-proxy
for the config option. It's not specific to i2p, so that rules outi2p-proxy
. The existingtub.
options control the tub for this storage server. Andoutbound-proxy
is more specific thanfoolscap-proxy
.Replying to davidsarah:
Make that
outbound_proxy
. Other config options use_
instead of-
.Removing the
review-needed
tag until someone (perhaps duck) updates the name of the config option.Attachment 0001-outbound-proxy-support.patch (2753 bytes) added
outbound-proxy
Attached is an updated patch (0001-outbound-proxy-support.patch ) that changes the config option to outbound-proxy. The patch applies cleanly to current trunk.
(I'm still trying to learn Python so please forgive any n00b errors. I also need to learn how to write unit tests).
BTW, the Version field is intended to reflect the version in which an issue was first reported, so it's not necessary to update it unless it was originally set incorrectly.
Jeff "psi" "ampernand" and I have been looking at this, and we don't think HTTP-proxying is the best way to do accomplish this. Because HTTP-proxying is meant to provide a request-response style, but Foolscap needs more of a "bidirectional byte-stream" style.
A potentially better way to accomplish it, which we are now poking at, is Twisted Endpoints -- see http://foolscap.lothar.com/trac/ticket/203 . One potential advantage of that — if it can be made to work — is that it might make it easier to support Tor, cjdns, SSL/TLS, IPv6, and maybe other cool networking protocols.
We agreed in today's Nuts & Bolts meeting to bump better Tor/I2P support out to 1.11.0.
Milestone renamed
moving most tickets from 1.12 to 1.13 so we can release 1.12 with magic-folders
Moving open issues out of closed milestones.
Ticket retargeted after milestone closed