Thank you, Galen!

On Thu, Jul 10, 2025 at 12:06 PM Galen Charlton via Evergreen-dev <
evergreen-dev@list.evergreen-ils.org> wrote:

> Hi,
>
> Series 3.16 and milestone 3.16-beta are now set up in Launchpad via
> renaming 4.0/4.0-beta.
>
> Regards,
>
> Galen
>
> On Thu, Jul 10, 2025 at 11:13 AM Rogan Hamby <rogan.ha...@equinoxoli.org>
> wrote:
>
>> I concur that something labeled 4.0 should be very end user visible. Part
>> of the value of a major version release is that it can be promoted as a
>> project milestone in its maturity and it takes a lot of wind out of the
>> sails to say "you can't see any of it but trust us, it's cool."
>>
>>
>>
>> On Thu, Jul 10, 2025 at 11:00 AM Galen Charlton via Evergreen-dev <
>> evergreen-dev@list.evergreen-ils.org> wrote:
>>
>>> Hi,
>>>
>>> Unless somebody really wants to advocate for calling the next release
>>> 4.0 - and there's been no sign thus far - let's consider the matter
>>> decided: we'll call the next release 3.16.
>>>
>>> I note that Launchpad will allow simply renaming the 4.0 series to 3.16
>>> and the 4.0-beta milestone to 3.16-beta, so I suspect that little, if no
>>> actual retargeting of bugs will be necessary
>>>
>>> I will make those changes around 12 p.m. ET today.
>>>
>>> As a final comment, I suggest that since we are leaning towards treating
>>> 4.0 as a big-splash release, that the splash be something that is directly
>>> visible to end users. (In other words, I don't think that OpenSRF-related
>>> changes alone would count, though that is only a weakly-held opinion).
>>>
>>> Regards,
>>>
>>> Galen
>>>
>>> On Thu, Jul 10, 2025 at 10:24 AM Jason Stephenson via Evergreen-dev <
>>> evergreen-dev@list.evergreen-ils.org> wrote:
>>>
>>>> Hi, all.
>>>>
>>>> I agree with Mike, but with fewer reasons and less explanation. :)
>>>>
>>>> I think we ought to call the next release 3.16, and retartget any 4.0
>>>> bug that have code committed. I am willing to do the latter job.
>>>>
>>>> Jason
>>>>
>>>>
>>>> On Wed, Jul 9, 2025 at 12:45 PM Mike Rylander via Evergreen-dev <
>>>> evergreen-dev@list.evergreen-ils.org> wrote:
>>>>
>>>>> FWIW, I'm -1 on calling the next release 4.0 as of today, because the
>>>>> biggest planned change is probably the breaking-est -- the merge of
>>>>> OpenSRF and the xmpp-to-redis change -- and it's just not ready yet.
>>>>>
>>>>> I'll say up front that if we /don't/ merge OpenSRF into EG before the
>>>>> next release (and IMO we should not, based on the state of things
>>>>> today), and therefore force Redis, but we still want to call it 4.0
>>>>> for other big reasons, I would definitely soften my -1 to -0.5 or
>>>>> less.
>>>>>
>>>>> If you don't care much about the details of the Redis stuff, that -^
>>>>> is my top line thought on the  "should we call it 4.0" question, and
>>>>> you can ignore the rest of my rant! ;)
>>>>>
>>>>> -------
>>>>>
>>>>> I've been working on the opensrf-on-redis infrastructure for the last
>>>>> month or so with the goal of bringing back the HA and LB functionality
>>>>> that we got for free with XMPP.
>>>>>
>>>>> TL;DR: I'm close, but because of inherent foundational differences in
>>>>> the design and purpose of XMPP vs Redis, our code will simply have to
>>>>> be more complicated going forward.
>>>>>
>>>>> IMO, the major issues in (and the state of my changes compared to)
>>>>> origin/main of the opensrf repo, re redis are:
>>>>>
>>>>> * It's extremely complicated and labor intensive (and maybe
>>>>> impossible, but I only tried to make it work for a couple days) to
>>>>> configure multiple, separate but interacting OpenSRF domains across
>>>>> different Redis servers.  At the other end of the spectrum, it's also
>>>>> impossible to configure multi-tenant redis servers.
>>>>>     -- This is mainly a /configuration capabilities/ issue, not
>>>>> primarily a code issue, because Bill did add OpenSRF usernames and
>>>>> domains (xmpp domains, before; hosts that run redis, now) to the redis
>>>>> keys used by EG.  The structure of the keys is not future-proof and
>>>>> doesn't follow redis key space pattern recommendations (at least WRT
>>>>> planning for Redis-level clustering, HA, and LB), but since it exists
>>>>> today we should be able to change the key structure later at a
>>>>> breaking upgrade event (or, whenever we want, if OpenSRF is merged
>>>>> into EG).  However, having the "bus" account configuration duplicated
>>>>> externally, and configured using a single static file, is not tenable.
>>>>>     ++ I've addressed this by adjusting the redis config requirements
>>>>> a little, and providing three new configuration modes, targeting use
>>>>> cases of different complexity/need:
>>>>>       1) Instead of leaving the redis server open and unprotected by
>>>>> default and trying to find the password in the "bus accounts" file,
>>>>> the Redis "requirepass" setting is used to supply the password for the
>>>>> "default" (admin/root/whatever) user.
>>>>>       2) osrf_control can receive that password from
>>>>>         a) the REDISCLI_AUTH env variable -- generally securable from
>>>>> outside.
>>>>>         b) a dedicated file's content -- at least the file can be
>>>>> locked down to a specific unix user.
>>>>>         c) a command line option -- meh, handy for manual use, but
>>>>> shows up in `ps`.
>>>>>         d) extracted from the "bus accounts file" from before, for
>>>>> back-compat.
>>>>>       3) Made configuring Redis users/ACLs more flexible:
>>>>>         a) the existing "bus accounts file" mechanism continues to
>>>>> exist, but because the same file is applied to each domain it's not
>>>>> safe for an HA/LB env because it it's not domain- or user-aware.
>>>>>         b) a TT2 template can be supplied; it is processed for each
>>>>> domain separately, so complicated setups can be encoded in the
>>>>> template -- this is intended to provide an HA/LB-safe version of (a).
>>>>>         c) osrf_control can dynamically create the necessary ACLs for
>>>>> the router, service, client, and gateway users and keys specific to
>>>>> each domain -- this is the mechanism that has the broadest set of use
>>>>> cases, I think.
>>>>>         d) OpenSRF can be told that Redis' built in ACL infrastructure
>>>>> (the "aclfile" Redis config file setting, and friends) will just
>>>>> handle it, and a bus reset request just issues an "ACL LOAD" command
>>>>> to tell redis to refresh ACLs in its native way -- this mechanism
>>>>> provides the most logical separation, and I think will be useful in
>>>>> highly controlled/automated environments that want to make use of the
>>>>> Redis-developer-intended tools for ACL config.
>>>>>
>>>>>  * LB (cross-registration of OpenSRF domains) does not work
>>>>>     -- The register and unregister commands add additional instances
>>>>> to an internal list of endpoints for each service, but the router
>>>>> always uses the first entry in the list.  The effect is that all
>>>>> traffic gets shoveled to the first-registered instance (not
>>>>> necessarily the local one, mind) until that instance actively
>>>>> deregisters, then it moves to the next one that registered.
>>>>>     ++ I've added list rotation. That works and is an obvious fix, of
>>>>> course, but it points out that the code is definitely not fully baked
>>>>> or feature-tested, and it's lacking existing fault tolerance at an
>>>>> infrastructure level.
>>>>>
>>>>>  * HA does not work, and LB (when fixed as above) is not safe
>>>>>     -- Even after addressing the LB part of the cross-registration
>>>>> functionality, there is no way to detect that a service instance
>>>>> previously registered is no longer available and should be removed
>>>>> from the delivery list.  Because we're using redis LISTs to stand in
>>>>> for (effectively) stateful TCP sockets and receive buffers, we end up
>>>>> just tossing requests into the void and hoping that someone comes
>>>>> along to service them.  Put another way, if a listener dies, we have
>>>>> no way of detecting that at the OpenSRF level and accounting for the
>>>>> failure.  This makes LB /more/ dangerous: think something akin to
>>>>> split-brain DNS problems.  Because we can't trust either our internal
>>>>> state or the message delivery information from redis.  This is also
>>>>> something that we got 100% for free in XMPP, because message delivery
>>>>> to an actual endpoint was verified and we got an error when that
>>>>> failed, so we could resend to another service instance.  Now the
>>>>> message just falls into the void on a LIST key that nobody is looking
>>>>> at.
>>>>>     ++ I'm working on moving from LISTs to STREAMs for router and
>>>>> service keys. Other than the slight difference in surface-level
>>>>> commands, it's no harder to use streams than lists.  What this will
>>>>> allow us to do is recheck the state of previously sent messages, and
>>>>> if 1) they're "stale" and 2) no service instance has claimed them for
>>>>> processing, we can retract the message from the stream, deregister the
>>>>> service instance behind the redis key on which the message went stale,
>>>>> and send it to another service instance.  I have the baseline change
>>>>> from LISTs to STREAMs working now, modulo some debug-logging cleanup
>>>>> and chasing down a couple possible leaks and corner cases, but the
>>>>> redis docs are fighting me at every step. (Just ask separately if you
>>>>> want to hear more about that.)  I also have a proof of concept version
>>>>> of the message retraction and resend code, but I really want to
>>>>> rewrite that using what I've learned (*sad face*) in the last few
>>>>> weeks about redis.
>>>>>
>>>>>  * Infrastructure-level clustering isn't possible
>>>>>   -- Whether ejabberd or Redis, infrastructure clustering (transparent
>>>>> HA at the infrastructure level) isn't "easy", and the hard parts have
>>>>> to live somewhere... In the XMPP world, that was mostly ejabberd's
>>>>> problem and it handled it well.  Redis has the concept of clustering,
>>>>> but (so far) we've chosen to not only ignore that, but to construct
>>>>> things in such a way that the redis cluster stuff /cannot be used
>>>>> effectively/.  I have no proof-of-concept code to address this, yet.
>>>>> We may never have the option to configure things to be as
>>>>> transparently robust in the redis world as we do today with ejabberd.
>>>>> That may not matter to most people most of the time, but it's a point
>>>>> I feel compelled to raise because it's definitely a loss to admins of
>>>>> large, complex, heavily automated installations (even if they're not
>>>>> aware of that loss).
>>>>>
>>>>> I'll be pushing up a branch covering the first two points this week or
>>>>> next, and hopefully be able to follow up with the HA fixes ASAP.
>>>>>
>>>>> Thanks for following my rant this far... :)
>>>>>
>>>>> --
>>>>> Mike Rylander
>>>>> Research and Development Manager
>>>>> Equinox Open Library Initiative
>>>>> 1-877-OPEN-ILS (673-6457)
>>>>> work: mi...@equinoxoli.org
>>>>> personal: mrylan...@gmail.com
>>>>> https://equinoxOLI.org
>>>>>
>>>>> On Tue, Jul 8, 2025 at 7:22 PM Jeff Davis via Evergreen-dev
>>>>> <evergreen-dev@list.evergreen-ils.org> wrote:
>>>>> >
>>>>> > We've been talking about calling our next major release Evergreen
>>>>> 4.0, rather than 3.16.
>>>>> >
>>>>> > Is there a list of features that we want to include in a 4.0
>>>>> release? Should we hold off on bumping the version number to 4.0 until
>>>>> those features are ready?
>>>>> >
>>>>> > Some candidates for "features that warrant going to 4.0":
>>>>> > - Making Angular circ the standard circ UI, rather than
>>>>> experimental. My understanding is that we don't expect that to happen in
>>>>> the next release.
>>>>> > - Merging OpenSRF into Evergreen (LP#2032835). We were waiting to
>>>>> replace ejabberd with Redis before doing that; Redis is now supported in
>>>>> Evergreen, but I don't know if anyone has revisited merging OpenSRF into 
>>>>> EG
>>>>> since then.
>>>>> > - There are a number of bugs targeted to "4.0-beta" in Launchpad,
>>>>> but AFAIK they are just targeting the next major release, whether it's
>>>>> called 4.0 or not.
>>>>> >
>>>>> > Any opinions? I would prefer to reserve "4.0" for a release that is
>>>>> somehow "more" than just the next major release, but I recognize that
>>>>> version numbering is basically arbitrary.
>>>>> > --
>>>>> > Jeff Davis
>>>>> > BC Libraries Cooperative
>>>>> > _______________________________________________
>>>>> > Evergreen-dev mailing list -- evergreen-dev@list.evergreen-ils.org
>>>>> > To unsubscribe send an email to
>>>>> evergreen-dev-le...@list.evergreen-ils.org
>>>>> _______________________________________________
>>>>> Evergreen-dev mailing list -- evergreen-dev@list.evergreen-ils.org
>>>>> To unsubscribe send an email to
>>>>> evergreen-dev-le...@list.evergreen-ils.org
>>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> Jason Stephenson (he/him)
>>>> ILS Manager, C/W MARS, Inc.
>>>>
>>>> ------------------------------
>>>>
>>>> [image: icon] jstephen...@cwmars.org | [image: icon]www.cwmars.org
>>>>
>>>> [image: icon] 508-755-3323 x 418
>>>> _______________________________________________
>>>> Evergreen-dev mailing list -- evergreen-dev@list.evergreen-ils.org
>>>> To unsubscribe send an email to
>>>> evergreen-dev-le...@list.evergreen-ils.org
>>>>
>>>
>>>
>>> --
>>> Galen Charlton
>>> Implementation and IT Manager
>>> Equinox Open Library Initiative
>>> g...@equinoxoli.org
>>> https://www.equinoxOLI.org
>>> phone: 877-OPEN-ILS (673-6457)
>>> direct: 770-709-5581
>>> <http://evergreen-ils.org>
>>> _______________________________________________
>>> Evergreen-dev mailing list -- evergreen-dev@list.evergreen-ils.org
>>> To unsubscribe send an email to
>>> evergreen-dev-le...@list.evergreen-ils.org
>>>
>>
>
> --
> Galen Charlton
> Implementation and IT Manager
> Equinox Open Library Initiative
> g...@equinoxoli.org
> https://www.equinoxOLI.org
> phone: 877-OPEN-ILS (673-6457)
> direct: 770-709-5581
> <http://evergreen-ils.org>
> _______________________________________________
> Evergreen-dev mailing list -- evergreen-dev@list.evergreen-ils.org
> To unsubscribe send an email to evergreen-dev-le...@list.evergreen-ils.org
>
_______________________________________________
Evergreen-dev mailing list -- evergreen-dev@list.evergreen-ils.org
To unsubscribe send an email to evergreen-dev-le...@list.evergreen-ils.org

Reply via email to