create internal VerifierNode/RepairerNode classes #847
Labels
No Label
0.2.0
0.3.0
0.4.0
0.5.0
0.5.1
0.6.0
0.6.1
0.7.0
0.8.0
0.9.0
1.0.0
1.1.0
1.10.0
1.10.1
1.10.2
1.10a2
1.11.0
1.12.0
1.12.1
1.13.0
1.14.0
1.15.0
1.15.1
1.2.0
1.3.0
1.4.1
1.5.0
1.6.0
1.6.1
1.7.0
1.7.1
1.7β
1.8.0
1.8.1
1.8.2
1.8.3
1.8β
1.9.0
1.9.0-s3branch
1.9.0a1
1.9.0a2
1.9.0b1
1.9.1
1.9.2
1.9.2a1
LeastAuthority.com automation
blocker
cannot reproduce
cloud-branch
code
code-dirnodes
code-encoding
code-frontend
code-frontend-cli
code-frontend-ftp-sftp
code-frontend-magic-folder
code-frontend-web
code-mutable
code-network
code-nodeadmin
code-peerselection
code-storage
contrib
critical
defect
dev-infrastructure
documentation
duplicate
enhancement
fixed
invalid
major
minor
n/a
normal
operational
packaging
somebody else's problem
supercritical
task
trivial
unknown
was already fixed
website
wontfix
worksforme
No Milestone
No Assignees
2 Participants
Notifications
Due Date
No due date set.
Reference: tahoe-lafs/trac-2024-07-25#847
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
I'd like to have a set of
VerifierNode
and/orRepairerNode
classes, created by the nodemaker, which implementIVerifiable
andIRepairable
(but notIFilesystemNode
). This would be the first step towards fixing #482, by giving us an object that represents what we can do with a given verifycap/repaircap.I'm thinking that these objects might be created with or without the integrity information. If without, it would just wrap a storage-index. It'd be nice to be able to find out what the SI represents, determine its UEB value (by consensus, not by cryptographically-ensured integrity values), and then verify/repair the file on the assumption that those shares were correct.
Replying to warner:
When would you have a storage index but not a verify cap? If we had traversal/deep-verify caps, would that obviate the need for this feature? It seems risky to be encouraging attempts to repair a file without having sufficient information to be sure that the repair is correct.
I think this is more useful to fix #568 (make immutable check/verify/repair and mutable check/verify work given only a verify cap) rather than #482.
See https://github.com/tahoe-lafs/tahoe-lafs/pull/408 , which adds
IVerifyNode
.