Project

General

Profile

Actions

Bug #5724

closed

[API] Advertise BlobSignatureTTL in discovery doc. Fix name/comments on default_trash_lifetime.

Added by Tom Clegg about 9 years ago. Updated almost 9 years ago.

Status:
Resolved
Priority:
Normal
Assigned To:
Category:
API
Target version:
Story points:
0.5

Description

The default_trash_lifetime config setting (and the defaultTrashLifetime discovery doc key) are currently unused and were intended to control the default interval after pushing the "trash" button on an object in Workbench (or doing a similar action) during which the object could be rescued/undeleted. This is achieved by setting expires_at=now()+defaultTrashLifetime on an object. Note:
  • This is not the same kind of "trash" as unreferenced data blocks in Keep.
  • This is only a default: a client can also choose to set expires_at to now()+1h or now()+8y.
  • A larger value makes it more likely a user can recover accidentally deleted data.
  • A smaller value conserves disk space.
  • This is not a security feature.
Meanwhile, the API server's blob_signing_ttl config setting refers to the permission signature hints on Keep locators. When the API server sends manifest_text to a client, it includes signature hints that claim to expire (and do in fact expire) at now()+blob_signing_ttl. Clients expect to be able to read the blocks until that time, without any further contact with the API server. Note:
  • Whether the collection's expires_at is now+1h, now+8y, or null, the signature TTL is the same (default is 2 weeks).
  • This is a security feature. It prevents a client from stockpiling signatures over time and reading data which it had permission to read 8 years ago (but doesn't now).
Closely related is keepstore's -blob-signing-ttl command line flag. This is expected to be equal to the API server's blob_signing_ttl config setting, but currently no mechanism is in place to guarantee this.
  • This limits the time a client can take to build a collection.
  • Like the API server's ttl, this TTL is visible to clients (the expiry time part is easy to parse out of the blob signature) so clients can be expected to make decisions on this basis ("the block signature will expire soon, so I'd better create a collection to get a fresh one"). Therefore, a keepstore that has provided a signature expiring on January 15 must not delete the corresponding data before January 15 merely because that block hasn't appeared in any collections yet.
  • keepstore should (but currently doesn't) advertise its blob_signing_ttl to clients explicitly. Currently, clients can figure it out by writing a block and subtracting now() from the resulting signature expiry time.

Subtasks 3 (0 open3 closed)

Task #5880: Review 5724-blob-signature-ttlResolvedTom Clegg04/30/2015Actions
Task #5879: Review 5724-blob-signature-ttl at 6fc44a6ResolvedTom Clegg04/30/2015Actions
Task #5859: Update default config, add to discovery docResolvedTom Clegg04/30/2015Actions
Actions #1

Updated by Tom Clegg about 9 years ago

  • Description updated (diff)
  • Category set to API
Actions #2

Updated by Ward Vandewege almost 9 years ago

  • Target version changed from 2015-04-29 sprint to 2015-05-20 sprint
Actions #3

Updated by Tom Clegg almost 9 years ago

  • Assigned To set to Tom Clegg
Actions #4

Updated by Tom Clegg almost 9 years ago

  • Status changed from New to In Progress
Actions #5

Updated by Radhika Chippada almost 9 years ago

Comments for branch 5724-blob-signature-ttl at 6fc44a6:

Should the comment at line 234 in application.default.yml be using "blob_signature_ttl" instead of "blob-signing-ttl"? (It appears that you did not update it in newer version also; so please update it in the newer code if you want to do this with other keepstore related updates.)

Everything else lgtm.

Actions #6

Updated by Radhika Chippada almost 9 years ago

Comments with the latest in branch (da57a997):

  • Since you are renaming variables, I was wondering if we want to call “*signing-key*” as “*signature-key*”?
  • One test is failing for me in keepstore. Could be my environment; if it is passing for you please ignore and I will try to resolve my env isssues.
2015/05/04 12:18:33 [b1f792e1] Upload failed http://localhost:40948/5d41402abc4b2a76b9719d911017c592 error: Put http://localhost:40948/5d41402abc4b2a76b9719d911017c592: dial tcp 127.0.0.1:40948: connection refused
2015/05/04 12:18:33 DEBUG: GET 5d41402abc4b2a76b9719d911017c592 failed: [http://localhost:59768/5d41402abc4b2a76b9719d911017c592: Get http://localhost:59768/5d41402abc4b2a76b9719d911017c592: dial tcp 127.0.0.1:59768: connection refused http://localhost:40948/5d41402abc4b2a76b9719d911017c592: Get http://localhost:40948/5d41402abc4b2a76b9719d911017c592: dial tcp 127.0.0.1:40948: connection refused]
--- FAIL: TestPullWorkerIntegration_GetExistingLocator (7.72 seconds)
    pull_worker_integration_test.go:56: Error putting test data in setup for hello  Could not write sufficient replicas
    pull_worker_integration_test.go:59: No locator found after putting test data
    pull_worker_integration_test.go:123: Got error Block not found
2015/05/04 12:18:33 Pull {locator3 [server_1 server_2]} error: Error getting data
  • If the tests are passing for you, lgtm.
Actions #7

Updated by Tom Clegg almost 9 years ago

Radhika Chippada wrote:

Comments with the latest in branch (da57a997):

  • Since you are renaming variables, I was wondering if we want to call “*signing-key*” as “*signature-key*”?

I thought about that too, but "signature key" sounds a bit odd to me where "signing key" and "signature ttl" sound natural. I think the difference is that the TTL is an attribute of each signature -- you could say the key is an input to the signature, mathematically, but it's not an observable attribute in the way the TTL is. I do like the consistency of naming all of the related bits "blob_signature_something", though.

  • One test is failing for me in keepstore. Could be my environment; if it is passing for you please ignore and I will try to resolve my env isssues.

[...]

  • If the tests are passing for you, lgtm.

Haven't seen that one. I'm guessing this is a race condition similar to #5898, where the server child is running but hasn't listened on the port yet. We should probably have a wait loop in run_test_servers.py→_start_keep() so it waits up to X milliseconds for the port to listen (by reading /proc/net/tcp?) and returns or raises depending on the outcome.

Actions #8

Updated by Tom Clegg almost 9 years ago

  • Status changed from In Progress to Resolved
  • % Done changed from 47 to 100

Applied in changeset arvados|commit:9d4bc458b767e4c05024dfe02207283745e1ba06.

Actions

Also available in: Atom PDF