-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vaults should have default nodes acting as remotes #208
Comments
Note that use Our vault have only 1 branch, that being of They should then be able to pull from a default NodeId to reduce friction. This default remote can be updated to point to another NodeId. |
This may need a reworking of the current
Here we run into a problems in that names can be changed. Ids though remain the same which means you could store the remote as a vaultId, meaning you would also need to store the nodeId. However If you wanted to change the default nodeId you would have to know the vaultId of the vault linked to the original vault of the original node., This becomes too complicated. Here is the proposal:
|
Although should you even be able to pull changes from a vault that is not the original vault? Does iso-git even allow this? I will test now. |
Yes from the point of view of git. We change git remotes all the time.
However from the POV of Polykey this should only be allowed for vaults
with the same vault id. Which should be preserved when shared between
Keynodes.
…On 7/13/21 3:56 PM, scottmmorris wrote:
Although should you even be able to pull changes from a vault that is
not the original vault? Does iso-git even allow this? I will test now.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#208 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAE4OHJ2ZM2JDVAHL4RXHGTTXPISHANCNFSM5ACHGBNQ>.
|
The vault id of a cloned vault is currently not preserved between nodes, if it was then this might cause conflicts. For example if a node clones the same vault twice, they would end up with an error as they own two vaults with the same vault id. As in my comment above wouldn't it be better to maintain a copy of the original vault id in the vault map which can be referred to when cloning? |
I thought the vault IDs were made unique so that they can be maintained across keynodes. This ensures that knows that it's the same vault even if the vault names can be different.
Ensuring that all vault IDs are different across keynodes means you have to do bookkeeping on which vault id you are tracking. But is this necessary?
We can make vaultids never conflict by making use of the NodeId. That is the essence of flakeids.
…On 14 July 2021 12:20:17 pm AEST, scottmmorris ***@***.***> wrote:
The vault id of a cloned vault is currently not preserved between
nodes, if it was then this might cause conflicts. For example if a node
clones the same vault twice, they would end up with an error as they
own two vaults with the same vault id.
As in my comment above wouldn't it be better to maintain a copy of the
original vault id in the vault map which can be referred to when
cloning?
--
You are receiving this because you authored the thread.
Reply to this email directly or view it on GitHub:
#208 (comment)
--
Sent from my Android device with K-9 Mail. Please excuse my brevity.
|
It's necessary in the case above? If a keynode wants to have two separate vaults that are cloned from the same source. I can imagine this might be useful in some cases as we don't provide the option of creating new branches from a single vault yet. What do you mean by that last part? I'm talking about the case where a keynode has the same vault id stored locally so they would both come under the same node id right? |
I would keep it simple for now. The vault ids should stay the same, and
that should make it easier to pull and get the right remotes too.
When pulling from a different remote, we would look for a vault with the
same vault id. That would allow us to look up remotes that have the same
vault history (or at least expect it to have).
…On 7/14/21 1:14 PM, scottmmorris wrote:
Ensuring that all vault IDs are different across keynodes means
you have to do bookkeeping on which vault id you are tracking. But
is this necessary?
We can make vaultids never conflict by making use of the NodeId.
That is the essence of flakeids.
It's necessary in the case above? If a keynode wants to have two
separate vaults that are cloned from the same source. I can imagine
this might be useful in some cases as we don't provide the option of
creating new branches from a single vault yet.
What do you mean by that last part? I'm talking about the case where a
keynode has the same vault id stored locally so they would both come
under the same node id right?
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#208 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAE4OHOM6KDK7QRYLZQ5323TXT6JTANCNFSM5ACHGBNQ>.
|
While we are refactoring the vaults domain and encryptedfs domain:
This problem can still be specced out from the UI/UX point of view of the CLI and GUI. But earnest effort on all of these vault issues will probably be dealt with in a bulk refactoring and layering on new features. |
|
Done by the merging of |
Reference docs to be updated here: https://github.com/MatrixAI/js-polykey/issues/258 |
Specification
pk vault pull some-vault
should default to a particular node idAdditional context
See the developer environment usecase
Tasks
Resolved in https://gitlab.com/MatrixAI/Engineering/Polykey/js-polykey/-/merge_requests/205
The text was updated successfully, but these errors were encountered: