You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

305 lines
14 KiB

7 years ago
# go-libp2p release notes
## 6.0.0
We're pleased to announce go-libp2p 6.0.0. This release includes a massive
refactor of go-libp2p that paves the way for new transports such as QUIC.
Unfortunately, as it is broad sweeping, there are some breaking changes,
*especially* for maintainers of custom transports.
Below, we cover the changes you'll likely care about. For convenience, we've
broken this into a section for users and transport authors/maintainers. However,
transport maintainers should really read both sections.
### For Users
Libp2p users should be aware of a few major changes.
* Guarantees and performance concerning connect/disconnect notification
processing have improved.
* Handling of half-closed streams has changed (READ THIS SECTION).
* Some constructors and method signatures have changed slightly.
#### Dialing And Source Addresses
We've improved the logic that selects the source address when dialing. In the
past, you may have run into an issue where you couldn't dial non-local nodes
when listening on 127.0.0.1 as opposed to 0.0.0.0. This happened because
go-libp2p would randomly pick the source address from the set of addresses on
which the node was listening. We did this to ensure that the other end could
dial us back at the same address. Unfortunately, one can't use 127.0.0.1 as a
source address when dialing any non-local address so outbound dials failed.
go-libp2p now tries to be smarter about this and avoids picking source addresses
that have no route to the destination address.
#### Bandwidth Metrics
To start out on an unhappy note, bandwidth metrics are now less accurate. In the
past, transports returned "minimal" connections (e.g., a TCP connection) so we
could wrap these transport connections in "metrics" connections that counted
every byte sent and received.
Unfortunately, now that we've moved encryption and multiplexing down into the
transport layer, the connection we're wrapping has significantly more
under-the-covers overhead.
However, we do hope to improve this and get even *better* bandwidth metrics than
we did before. See [libp2p/go-libp2p-transport#31][] for details.
[libp2p/go-libp2p-transport#31]: https://github.com/libp2p/go-libp2p-transport/issues/31
#### Notifications
This release brings performance improvements and easy to reason about ordering
guarantees libp2p connect/disconnect events:
1. For any given connection/stream, libp2p will wait for all connect/open event
handlers to finish exit before triggering a disconnect/close event for the
connection/stream.
2. When a user calls the Close (or `Reset`) method on a connection or stream,
go-libp2p will process the close event asynchronously (i.e., not block the
call to `Close`). Otherwise, a call to `Close` from within a connect event
handler would deadlock.
3. Unless otherwise noted, events will be handled in parallel.
What does this mean for end users? Well:
1. Reference counting connections to a peer using connect/disconnect events
should "just work" and should never go negative.
2. Under heavy connect/disconnect loads, connecting to new peers should be
faster (usually).
For those interested in the history of this issue, ...
In the past, (dis)connect and stream open/close notifications have been a bit of
a pain point. For a long time, they were fired off in parallel and one could, for
example, process a disconnect notification before a connect notification (we had
to support *negative* ref-counts in several places to account for this).
After no end of trouble, we finally "fixed" this by synchronizing notification
delivery. We still delivered notifications to all notifiees in parallel, we just
processed the events in series.
Unfortunately, under heavy connect/disconnect load, new connections could easily
get stuck on open behind a queue of connect events all being handled in series.
In theory, these events should have been handled quickly but in practice, it's
very hard to avoid locks *entirely* (bitswap's event handlers were especially
problematic).
Worse, this serial delivery guarantee didn't actually provide us with an
*in-order* delivery guarantee as it was still possible for a disconnect to
happen before we even *started* to fire the connect event. The situation was
slightly better than before because the events couldn't overlap but still far
from optimal.
However, this has all been resolved now. From now on, you'll never receive a
disconnect event before a connect event.
#### Conn.GetStreams Signature Change
The signature of the `GetStreams` method on `go-libp2p-net.Conn` has changed from:
```go
GetStreams() ([]Stream, error)
```
To:
```go
GetStreams() []Stream
```
Listing the streams on an open connection should never involve IO or do anything
that can fail so we removed this error to improve usability.
#### Libp2p Constructor
If you're not already doing so, you should be using the `libp2p.New` constructor
to make your libp2p nodes. This release brings quite a few new options to the
libp2p constructor so if it hasn't been flexible enough for you in the past, I
recommend that you try again. A simple example can be found in the
[echo][example:echo] example.
Given this work and in an attempt to consolidate all of our configuration logic
in one place, we've removed all default transports from go-libp2p-swarm.
TL;DR: Please use the libp2p constructor.
#### Zombie Streams
From this release on, when you're done with a stream, you must either call
`Reset` on it (in case of an error) or close it and read an EOF (or some other
error). Otherwise, libp2p can't determine if the stream is *actually* closed and
will hang onto it indefinitely.
To make properly closing streams a bit easier, we've added two methods to
[go-libp2p-net][]: `AwaitEOF` and `FullClose`.
* `AwaitEOF(stream)` tries to read a single byte from the stream. If `Read`
returns an EOF, `AwaitEOF` returns success. Otherwise, if `Read` either reads
some data or returns some other error, `AwaitEOF` resets the stream and returns
an error. To avoid waiting indefinitely, `AwaitEOF` resets the stream
unconditionally after 1 minute.
* `FullClose(stream)` is a convenience function that closes the stream and then
calls `AwaitEOF` on it.
Like with libp2p notifications, this issue has a bit of history...
In the beginning, libp2p assumed that calling `Close` on a stream would close
the stream for both reading and writing. Unfortunately, *none* of our stream
multiplexers actually behaved this way. In practice, `Close` always closed the
stream for writing.
After realizing this, we made two changes:
1. We accepted the fact that `Close` only closed the stream for writing.
2. We added a `Reset` method for killing the stream (closing it in both
directions, throwing away any buffered data).
However, we ran into a bit of a snag because we try to track open streams and
need some way to tell when a stream has been closed. In the past this was easy:
when the user calls `Close` on the stream, stop tracking it. However, now that
`Close` only closes the stream for writing, we still *technically* needed to
track it until the *other* end closed the stream as well. Unfortunately, without
actually reading from the stream, we have no way of knowing about this.
Therefore, if the user calls `Close` on a stream and then walks away, we'd have
to hang onto the stream indefinitely.
Our solution was to simply stop tracking streams once they were closed for
writing. This wasn't the *correct* behavior but it avoided leaking memory in the
common case:
1. The user calls `Close` and drops all references to the stream.
2. The other end calls `Close` without writing any additional data.
3. The stream multiplexer observes both closes and drops *its* reference to the stream.
4. The garbage collector garbage collects the stream.
However, this meant that:
1. The list of "open" streams was technically incomplete.
2. If the other side either failed to call `Close` or tried to send data before
closing, the stream would remain "open" (until the connection was closed).
In this release, we've changed this behavior. Now, when you `Close` a stream for
writing, libp2p *continues* to track it. We only stop tracking it when either:
1. You call `Reset` (throwing away the stream).
2. You finish reading any data off of it and observe either an EOF or an error.
This way, we never "forget" about open streams or leave them in a half-forgotten
state.
In the future, I'd like to add a `CloseAndForget` method to streams that:
1. Closes the stream (sends an EOF).
2. Tells the swarm to stop tracking the stream.
3. Tells the stream muxer to stop tracking the stream and throw away any data
the other side may send (possibly resetting the stream on unexpected data).
However:
1. This would likely require modifying our stream muxers which may not be
feasible.
2. Explicitly waiting for an EOF is still the correct thing to do unless you
really don't care if the operation succeeded.
### For Transport Maintainers
For transport maintainers, quite a bit has changed. Before this change,
transports created simple, unencrypted, stream connections and it was the job of
the libp2p Network (go-libp2p-swarm) to negotiate security, multiplexing, etc.
However, when attempting to add support for the QUIC protocol, we realized that
this was going to be a problem: QUIC already handles authentication and
encryption (using TLS1.3) and multiplexing. After much debate, we inverted our
current architecture and made transports responsible for encrypting/multiplexing
their connections (before returning them).
To make this palatable, we've also introduced a new ["upgrader"
library][go-libp2p-transport-upgrader] for upgrading go-multiaddr-net
connections/listeners to full libp2p transport connections/listeners. Transports
that don't support encryption/multiplexing out of the box can expect to have an
upgrader passed into the constructor.
To get a feel for how this new transport system works, take a look at the TCP
and WebSocket transports and the transport interface documentation:
* [TCP Transport][go-tcp-transport]
* [WebSocket Transport][go-ws-transport]
* [Transport Interface][doc:go-libp2p-transport]
#### Deprecated Packages
This release sees the deprecation of a few packages:
* [go-peerstream][] has been deprecated and all functionality has been merged
into [go-libp2p-swarm][]. [go-peerstream][] was written as a general-purpose
(not libp2p specific) listener, connection, and stream manager. However, this
package caused more problems than it solved and was incompatible with the new
transport interface.
* [go-libp2p-interface-conn][] has been deprecated. These interfaces to bridge
the gap between transport-level connections and [go-libp2p-net][] connections
however, now that transport connections are fully multiplexed/encrypted, this
is no longer needed.
* [go-libp2p-conn][] has also been deprecated and most of the functionality has
been moved to [go-libp2p-transport-upgrader][]. This package used to provide
connection "upgrade" logic for upgrading transport-level connections to
[go-libp2p-interface-conn][] connections however, transport-level connections
now provide the required functionality out of the box.
#### Testing
We've moved `GenSwarmNetwork` in [go-libp2p-netutil][] to `GenSwarm` in
[go-libp2p-swarm/testing][] because:
1. The swarm duplicated this exact function for its own tests.
2. The swarm couldn't depend on [go-libp2p-netutil][] because
[go-libp2p-netutil][] depends on [go-libp2p-swarm][].
We've also added a new transport test suit
[go-libp2p-transport/test][]. If you implement a new transport, please consider
testing against these suite. If you find a bug in an existing transport, please
consider adding a test to this suite.
#### go-addr-util
In go-addr-util, we've removed the `SupportedTransportStrings` and
`SupportedTransportProtocols` transport registries and the associated
`AddTransport` function. These registries were updated by `init` functions in
packages providing transports and were used to keep track of known transports.
However, *importing* a transport doesn't mean any libp2p nodes have been
configured to actually *use* that transport. Therefore, in the new go-libp2p,
it's go-libp2p-swarm's job to keep track of which transports are supported
(i.e., which transports have been registered with the swarm).
We've also removed the associated `AddrUsable`, `FilterUsableAddrs`, and
`AddrUsableFunc` functions.
#### Pluggable Security Transports
This release brings a new pluggable security transport framework. Implementing a
new security framework is now as simple as:
1. Implement the interfaces defined in [go-conn-security][].
2. Pass it into the libp2p constructor using the `Security` option.
[go-conn-security]: https://github.com/libp2p/go-conn-security
[go-libp2p-conn]: https://github.com/libp2p/go-libp2p-conn
[go-libp2p-interface-conn]: https://github.com/libp2p/go-libp2p-interface-conn
[go-libp2p-net]: https://github.com/libp2p/go-libp2p-net
[go-libp2p-netutil]: https://github.com/libp2p/go-libp2p-netutil
[go-libp2p-swarm]: https://github.com/libp2p/go-libp2p-swarm
[go-libp2p-swarm/testing]: https://github.com/libp2p/go-libp2p-swarm/tree/master/testing
7 years ago
[go-libp2p-transport]: https://github.com/libp2p/go-libp2p-transport
[go-libp2p-transport/test]: https://github.com/libp2p/go-libp2p-transport/tree/master/test
7 years ago
[go-libp2p-transport-upgrader]: https://github.com/libp2p/go-libp2p-transport-upgrader
[go-peerstream]: https://github.com/libp2p/go-peerstream
[go-tcp-transport]: https://github.com/libp2p/go-tcp-transport
[go-ws-transport]: https://github.com/libp2p/go-ws-transport
[example:echo]: https://github.com/libp2p/go-libp2p-examples/tree/master/echo
7 years ago
[doc:go-libp2p-transport]: https://godoc.org/github.com/libp2p/go-libp2p-transport