Before this change, resuming from an unencrypted dataset with send.raw=true specified wouldn't work with zrepl due to overly restrictive resume token checking. An initial PR to fix this was made in https://github.com/zrepl/zrepl/pull/503 but it didn't address the core of the problem. The core of the problem was that zrepl assumed that if a resume token contained `rawok=true, compressok=true`, the resulting send would be encrypted. But if the sender dataset was unencrypted, such a resume would actually result in an unencrypted send. Which could be totally legitimate but zrepl failed to recognize that. BACKGROUND ========== The following snippets of OpenZFS code are insightful regarding how the various ${X}ok values in the resume token are handled: -6c3c5fcfbe/module/zfs/dmu_send.c (L1947-L2012)
-6c3c5fcfbe/module/zfs/dmu_recv.c (L877-L891)
- https://github.com/openzfs/zfs/blob/6c3c5fc/lib/libzfs/libzfs_sendrecv.c#L1663-L1672 Basically, some zfs send flags make the DMU send code set some DMU send stream featureflags, although it's not a pure mapping, i.e, which DMU send stream flags are used depends somewhat on the dataset (e.g., is it encrypted or not, or, does it use zstd or not). Then, the receiver looks at some (but not all) feature flags and maps them to ${X}ok dataset zap attributes. These are funnelled back to the sender 1:1 through the resume_token. And the sender turns them into lzc flags. As an example, let's look at zfs send --raw. if the sender requests a raw send on an unencrypted dataset, the send stream (and hence the resume token) will not have the raw stream featureflag set, and hence the resume token will not have the rawok field set. Instead, it will have compressok, embedok, and depending on whether large blocks are present in the dataset, largeblockok set. WHAT'S ZREPL'S ROLE IN THIS? ============================ zrepl provides a virtual encrypted sendflag that is like `raw`, but further ensures that we only send encrypted datasets. For any other resume token stuff, it shoudn't do any checking, because it's a futile effort to keep up with ZFS send/recv features that are orthogonal to encryption. CHANGES MADE IN THIS COMMIT =========================== - Rip out a bunch of needless checking that zrepl would do during planning. These checks were there to give better error messages, but actually, the error messages created by the endpoint.Sender.Send RPC upon send args validation failure are good enough. - Add platformtests to validate all combinations of (Unencrypted/Encrypted FS) x (send.encrypted = true | false) x (send.raw = true | false) for cases both non-resuming and resuming send. Additional manual testing done: 1. With zrepl 0.5, setup with unencrypted dataset, send.raw=true specified, no send.encrypted specified. 2. Observe that regular non-resuming send works, but resuming doesn't work. 3. Upgrade zrepl to this change. 4. Observe that both regular and resuming send works. closes https://github.com/zrepl/zrepl/pull/613
zrepl
zrepl is a one-stop ZFS backup & replication solution.
User Documentation
User Documentation can be found at zrepl.github.io.
Bug Reports
- If the issue is reproducible, enable debug logging, reproduce and capture the log.
- Open an issue on GitHub, with logs pasted as GitHub gists / inline.
Feature Requests
- Does your feature request require default values / some kind of configuration? If so, think of an expressive configuration example.
- Think of at least one use case that generalizes from your concrete application.
- Open an issue on GitHub with example conf & use case attached.
- Optional: Post a bounty on the issue, or contact Christian Schwarz for contract work.
The above does not apply if you already implemented everything. Check out the Coding Workflow section below for details.
Building, Releasing, Downstream-Packaging
This section provides an overview of the zrepl build & release process.
Check out docs/installation/compile-from-source.rst
for build-from-source instructions.
Overview
zrepl is written in Go and uses Go modules to manage dependencies. The documentation is written in ReStructured Text using the Sphinx framework.
Install build dependencies using ./lazy.sh devsetup
.
lazy.sh
uses python3-pip
to fetch the build dependencies for the docs - you might want to use a venv.
If you just want to install the Go dependencies, run ./lazy.sh godep
.
The test suite is split into pure Go tests (make test-go
) and platform tests that interact with ZFS and thus generally require root privileges (sudo make test-platform
).
Platform tests run on their own pool with the name zreplplatformtest
, which is created using the file vdev in /tmp
.
For a full code coverage profile, run make test-go COVER=1 && sudo make test-platform && make cover-merge
.
An HTML report can be generated using make cover-html
.
Code generation is triggered by make generate
. Generated code is committed to the source tree.
Build & Release Process
The Makefile
is catering to the needs of developers & CI, not distro packagers.
It provides phony targets for
- local development (building, running tests, etc)
- building a release in Docker (used by the CI & release management)
- building .deb and .rpm packages out of the release artifacts.
Build tooling & dependencies are documented as code in lazy.sh
.
Go dependencies are then fetched by the go command and pip dependencies are pinned through a requirements.txt
.
We use CircleCI for continuous integration. There are two workflows:
-
ci
runs for every commit / branch / tag pushed to GitHub. It is supposed to run very fast (<5min and provides quick feedback to developers). It runs formatting checks, lints and tests on the most important OSes / architectures. Artifacts are published to minio.cschwarz.com (see GitHub Commit Status). -
release
runs- on manual triggers through the CircleCI API (in order to produce a release)
- periodically on
master
Artifacts are published to minio.cschwarz.com (see GitHub Commit Status).
Releases are issued via Git tags + GitHub Releases feature. The procedure to issue a release is as follows:
- Issue the source release:
- Git tag the release on the
master
branch. - Push the tag.
- Run
./docs/publish.sh
to re-build & push zrepl.github.io.
- Git tag the release on the
- Issue the official binary release:
- Run the
release
pipeline (triggered via CircleCI API) - Download the artifacts to the release manager's machine.
- Create a GitHub release, edit the changelog, upload all the release artifacts, including .rpm and .deb files.
- Issue the GitHub release.
- Add the .rpm and .deb files to the official zrepl repos, publish those.
- Run the
Official binary releases are not re-built when Go receives an update. If the Go update is critical to zrepl (e.g. a Go security update that affects zrepl), we'd issue a new source release.
The rationale for this is that whereas distros provide a mechanism for this ($zrepl_source_release-$distro_package_revision
), GitHub Releases doesn't which means we'd need to update the existing GitHub release's assets, which nobody would notice (no RSS feed updates, etc.).
Downstream packagers can read the changelog to determine whether they want to push that minor release into their distro or simply skip it.
Additional Notes to Distro Package Maintainers
- Run the platform tests (Docs -> Usage -> Platform Tests) on a test system to validate that zrepl's abstractions on top of ZFS work with the system ZFS.
- Ship a default config that adheres to your distro's
hier
and logging system. - Ship a service manager file and please try to upstream it to this repository.
dist/systemd
contains a Systemd unit template.
- Ship other material provided in
./dist
, e.g. in/usr/share/zrepl/
. - Have a look at the
Makefile
'sZREPL_VERSION
variable and how it passed to Go'sldFlags
. This is howzrepl version
knows what version number to show. Your build system should set theldFlags
flags appropriately and add a prefix or suffix that indicates that the given zrepl binary is a distro build, not an official one. - Make sure you are informed about new zrepl versions, e.g. by subscribing to GitHub's release RSS feed.
Contributing Code
- Open an issue when starting to hack on a new feature
- Commits should reference the issue they are related to
- Docs improvements not documenting new features do not require an issue.
Breaking Changes
Backward-incompatible changes must be documented in the git commit message and are listed in docs/changelog.rst
.
Glossary & Naming Inconsistencies
In ZFS, dataset refers to the objects filesystem, ZVOL and snapshot.
However, we need a word for filesystem & ZVOL but not a snapshot, bookmark, etc.
Toward the user, the following terminology is used:
- filesystem: a ZFS filesystem or a ZVOL
- filesystem version: a ZFS snapshot or a bookmark
Sadly, the zrepl implementation is inconsistent in its use of these words: variables and types are often named dataset when they in fact refer to a filesystem.
There will not be a big refactoring (an attempt was made, but it's destroying too much history without much gain).
However, new contributions & patches should fix naming without further notice in the commit message.