-
-
Notifications
You must be signed in to change notification settings - Fork 3.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bump Repo Version and Provide Migration before strict Cid code lands #4766
Comments
This is a good idea, a migration is likely the best way forward. |
@whyrusleeping I would like to go ahead and write this. I am thinking if the migration tool finds invalid Cid's and stores them in a file in the repo (and possible list then to stdout if there are not too many). (I want to store the list somewhere because it is very easy to lose the output of the migration command.) |
If we go ahead with this repo migration I would like to combine this migration with one that will remove all id-hashes from the datastore to make #4910 easier. |
@Stebalien @whyrusleeping told me you are also working on a DHT datastore migration, what the status of that? I would like to go ahead and write the code that checks for invalid hashes and also removed identity hashes but don't want to clash with what you are doing. |
This is blocked on #5007. That should be done and ready to merge (once I get a final sign off). That should finally unblock literally everything. |
If you do that, we should probably land #4910 at the same time. I'd rather not temporarily break ID hashed content (although..., in practice we'll break absolutely nothing because nobody's using them..., maybe not an issue). |
That is my hope. Except for the addition of thirdparty (which I intent to fix) I am hoping there is nothing controversial about it which should allow it to go in fairly quickly. |
See ipfs/fs-repo-migrations#77 for an initial implementation of the migration. |
Right now #4751 is providing a stop-gap measure to avoid allowing insecure hashes. Things won't break, but the insecure hashes will become useless. Once the strict Cid code (ipfs/go-cid#40) lands things will likely break badly if there are any insecure hashes. I recommend we bump the repo version and provide a migration tool that just checks and aborts in there are any CID's with insecure hashes.
I also suggest, though not require, we provide a tool to automatically convert the insure hashes to a secure hash so that data is not lost. The same tool can just offer to delete them instead.
The text was updated successfully, but these errors were encountered: