aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorgrothoff <grothoff@140774ce-b5e7-0310-ab8b-a85725594a96>2009-07-26 22:13:01 +0000
committergrothoff <grothoff@140774ce-b5e7-0310-ab8b-a85725594a96>2009-07-26 22:13:01 +0000
commitb132b596993bc181c0178ed1d67211f9ea26ec41 (patch)
treec9c71c2fc931a0e1bb642f75108c7414ad707505
parentcc2e282290211df4f3f0793503b75de317ab4e35 (diff)
revising TODO structure
git-svn-id: https://gnunet.org/svn/gnunet@8796 140774ce-b5e7-0310-ab8b-a85725594a96
-rw-r--r--BUGS119
-rw-r--r--RATIONALE23
-rw-r--r--TODO242
-rw-r--r--doc/coverage.txt66
4 files changed, 230 insertions, 220 deletions
diff --git a/BUGS b/BUGS
new file mode 100644
index 0000000000..d3790ac2ef
--- /dev/null
+++ b/BUGS
@@ -0,0 +1,119 @@
+This file lists minor work items (also possibly called "known bugs").
+We are not tracking them in Mantis yet since there are too many and no
+sane end-user should care about this codebase yet anyway.
+
+
+* UTIL:
+ - crypto_hash: use libgcrypt (supports SHA-512 since 2003)
+ - container_bloomfilter: improve efficiency (see FIXME)
+ - Windows: use events instead of pipes to signal select()s [Nils]
+ - only connect() sockets that are ready (select()) [Nils]
+ [On W32, we need to select after calling socket before
+ doing connect etc.]
+ - Add "DISK" API for creating of temporary files
+ (as used in datacache/ module) [Nils?]
+* SERVER:
+ - inefficient memmove
+* TRANSPORT:
+ - transport_api: support forcing disconnects through low quotas!
+ (required for working F2F support!)
+ - API: consider having core provide deadline information for each message
+ (likely important for DV plugin which wants to loop back!)
+ - implement transport API to pretty-print transport address
+ + transport_api extension (API extension!)
+ + service-transport extension (protocol extension)
+ - add calls to statistics in various places
+ - implement gnunet-transport (transport configurator / tester)
+ - UPnP-based IP detection
+ (Note: build library always, build service when libxml2/etc. are available)
+ - instantly filter addresses from *other* peers that
+ are *equal* to our own address + port (i.e., localhost:2086). We
+ no longer filter those for outgoing (helps with loopback testing
+ and keeps the code clean), but we should filter strictly *impossible*
+ incoming addresses! This is for efficiency, not correctness.
+ - We currently are happy to take any address told to us in a WELCOME
+ to our set of addresses; we should have some minimal threshold-based
+ scheme, limiting both the total number of addresses that we accept
+ this way as well as requiring multiple confirmations; also, we
+ should possibly try to confirm that the given address works for
+ us ourselves (loopback-style) before adding it to the list
+ [SECURITY issue]
+ + we may be able to simplify WELCOME messages (no need to add
+ addresses there anymore, but may help to learn them there anyway...).
+ + we probably want some kind of voting/counting for learning IP addresses
+ (maybe including IP addresses in ads proportional to how often others
+ report them? we at least need some protection against >64k HELLOs!),
+ + provide a way to give the user a list of "learned" IP addresses and
+ a way to easily "veto" addresses off the list!
+ => If MiM attacker uses vetoed address, blacklist the specific IP for
+ the presumed neighbour!
+ - not sure current way of doing ACKs works well-enough
+ with unreliable transports where the ACK maybe lost;
+ the "is_new" check would then possibly prevent future
+ ACKs to be delivered, all while we're happily
+ receiving messages from that peer! Worse, the other
+ peer won't generate another ACK since it thinks we're
+ connected just fine...
+ Key questions:
+ + How necessary is ACKing in the first place? (alternatives?)
+ + Should we transmit ACKs in response to every HELLO? (would that
+ fully address the problem?)
+ - latency measurements implemented in the transport
+ plugins makes it only work for bi-di transports
+ and results in code replication
+ - should latency be included in the ReceiveCallback and
+ NotifyConnect or passed on request?
+ - FIXME's with latency being simply set to 0 in a few places
+ - Memory leak (running valgrind --trace-children=yes on test_transport_api:
+ ==28393== 16 bytes in 1 blocks are indirectly lost in loss record 1 of 5
+ ==28393== at 0x4C2260E: malloc (vg_replace_malloc.c:207)
+ ==28393== by 0x52343E3: GNUNET_xmalloc_unchecked_ (common_allocation.c:62)
+ ==28393== by 0x5234389: GNUNET_xmalloc_ (common_allocation.c:53)
+ ==28393== by 0x524458A: GNUNET_NETWORK_socket_create_from_accept (network.c:289)
+ ==28393== by 0x524B2DA: ??? (server.c:332)
+ ==28393== by 0x524A4C7: ??? (scheduler.c:425)
+ ==28393== by 0x524A73D: GNUNET_SCHEDULER_run (scheduler.c:510)
+ ==28393== by 0x524FF8C: GNUNET_SERVICE_run (service.c:1326)
+ ==28393== by 0x405500: main (gnunet-service-transport.c:2645)
+ And also:
+ ==28393== 65,744 (65,728 direct, 16 indirect) bytes in 1 blocks are definitely lost in loss record 5 of 5
+ ==28393== at 0x4C2260E: malloc (vg_replace_malloc.c:207)
+ ==28393== by 0x52343E3: GNUNET_xmalloc_unchecked_ (common_allocation.c:62)
+ ==28393== by 0x5234389: GNUNET_xmalloc_ (common_allocation.c:53)
+ ==28393== by 0x524473E: GNUNET_NETWORK_socket_create_from_accept (network.c:323)
+ (rest of trace identical)
+
+* DATASTORE:
+ - mysql backend
+ - postgres backend
+* SETUP:
+ - auto-generate "defaults.conf" using gnunet-setup from "config.scm"
+ - integrate all options into "config.scm"
+ - change config-file writing to exclude options set to default values
+* ARM:
+ - implement exponential back-off for service restarts
+ - better tracking of which config changes actually need to cause process restarts by ARM.
+ - have way to specify dependencies between services (to manage ARM restarts better)
+ - client-API is inefficient since it opens a TCP connection per service that is started
+ (instead of re-using connections).
+* CORE:
+ - code currently notifies clients about "encrypted" connections being up well before
+ we get the encrypted PONG; sometimes this may be OK (for topology killing
+ unwanted connnections), but of course not in general. I suspect we want
+ to signal on PONG and have topology hook directly into transport to
+ kill plaintext connections before they have a chance to become encrypted
+ (may require minor hack in transport API)
+* PEERINFO:
+ - have gnunet-peerinfo print actual host addresses again
+ - add option to gnunet-peerinfo to modify trust value
+* POSTGRES-DB:
+ - finish postgres implementation; simplify other SQLs using new stats
+* HTTPS transport
+ - PolariSSL for MHD?
+ - https integration
+* GAP improvements:
+ - active reply route caching design & implementation of service,
+ gap extension!
+* HOSTLIST:
+ - implement advertising of hostlist URL
+ - implement learning of hostlist URLs
diff --git a/RATIONALE b/RATIONALE
index dba31fb65f..b37e1a2fe8 100644
--- a/RATIONALE
+++ b/RATIONALE
@@ -234,6 +234,8 @@ PROBLEM GROUP 6 (FS-APIs):
* If GUIs die (or are not properly shutdown), state
of current transactions is lost (FSUI only
saves to disk on shutdown)
+* FILENAME metadata is killed by ECRS/FSUI to avoid
+ exposing HOME, but what if the user set it manually?
SOLUTION (draft, not done yet, details missing...):
* Eliminate threads from FS-APIs
@@ -243,6 +245,9 @@ SOLUTION (draft, not done yet, details missing...):
* Store FS-state always also on disk
=> Open question: how to do this without
compromising state/scalability?
+* Have API to manipulate sharing tree before
+ upload; have auto-construction modify FILENAME
+ but allow user-modifications afterwards
PROBLEM GROUP 7 (User experience):
* Searches often do not return a sufficient / significant number of
@@ -266,3 +271,21 @@ SOLUTION (draft, not done yet, details missing...):
(requires downloading of the directory in the background)
+
+
+SUMMARY:
+* Features eliminated from util:
+ - threading (goal: good riddance!)
+ - complex logging features [ectx-passing, target-kinds] (goal: good riddance!)
+ - complex configuration features [defaults, notifications] (goal: good riddance!)
+ - network traffic monitors (goal: eliminate)
+ - IPC semaphores (goal: d-bus? / eliminate?)
+ - second timers
+ - DNS lookup (goal: have async service; issue: still need synchronous
+ resolution in places, current code may not be portable)
+ => code shrunk from 61 files to 34, 22k LOC to 15k LOC, 470k to 330k (with symbols)
+* New features in util:
+ - scheduler
+ - service and program boot-strap code
+* Major changes in util:
+ - more expressive server (replaces selector)
diff --git a/TODO b/TODO
index 2e851807d4..f1310e1304 100644
--- a/TODO
+++ b/TODO
@@ -1,89 +1,27 @@
-PHASE #1: (Goal: settle key design questions)
-
-Util:
-* Windows: use events instead of pipes to signal select()s [Nils]
-* only connect() sockets that are ready (select()) [Nils]
- [On W32, we need to select after calling socket before
- doing connect etc.]
-* Add "DISK" API for creating of temporary files
- (as used in datacache/ module)
-
PHASE #2: (Goal: recover basic file-sharing functionality)
-
-
-TESTCASES WANTED:
-
-For these functions, it would be nice if we had testcases ("make check")
-that would cause them to be executed and check that they are working:
-* gnunet-service-peerinfo:
- - change_host_trust / flush_trust
- - remove_garbage
- - discard_hosts_helper / cron_clean_data_hosts
-* gnunet-service-transport:
- - try_unvalidated_addresses
- - lookup_address_callback
- - lookup_hello_callback
- - plugin_env_lookup_address
- - notify_clients_disconnect
- - list_validated_addresses
- - cleanup_validation
- - disconnect_neighbour
- - handle_set_quota
-* plugin_transport_tcp.c:
- - tcp_plugin_cancel
- - tcp_plugin_address_pretty_printer / append_port
- - tcp_plugin_set_receive_quota
- - delayed_done
-* transport_api:
- - GNUNET_TRANSPORT_set_qutoa / send_set_quota
- - hello_wait_timeout
- - transmit_ready
- - transmit_timeout
- - remove_from_any_list / remove_neighbour
- - GNUNET_TRANSPORT_notify_transmit_ready_cancel
- - Testcases for set_quota, timeouts, disconnects, transmit_ready_cancel
- - gnunet-service-transport HELLO validation (how good is our coverage?)
- - direct test of plugins compliance to plugin API
-* core_api:
- - timeout_request
- - solicit_traffic / copy_and_free
- - GNUNET_CORE_peer_configure / produce_configure_message
-* gnunet-service-core:
- - update_window
- - find_client
- - handle_client_request_configure
- - set_key_retry_task
- - align_and_deliver
- - handle_transport_notify_disconnect
-* hostlist (everything)
-* topology (everything)
-
-
-Module features to implement:
* TESTING (needed for DV, DHT, Topology)
- implement library for local testing
- implement testcases for library
- - implement library for distributed testing
- - implement testcases for distributed testing
+ - implement library for distributed testing [Nate]
+ - implement testcases for distributed testing [Nate]
* TOPOLOGY:
- implement testcases (needs TESTING)
* HOSTLIST:
- implement testcases
* DV (needed for DHT)
- - write DV API
- - implement DV service
- - implement DV library
- - implement DV transport plugin
- - implement testcases
- - implement performance tests
+ - write DV API
+ - implement DV service [Nate & CG]
+ - implement DV library [Nate]
+ - implement DV transport plugin [Nate & CG]
+ - implement testcases [Nate]
+ - implement performance tests [Nate]
* DHT (needed for FS)
- - review DHT API
- implement DHT service (needs DV, DATACACHE)
- implement DHT library
- implement testcases
- implement performance tests
* FS
- - review FS API
+ - review FS API [Nils, Amatus, CG]
- design network structs (CS)
- implement FS library
+ URI API
@@ -124,6 +62,8 @@ Module features to implement:
+ unindex
+=> Deploy development network
+
PHASE #3: (Goal: ready for pre-release) [completion-goal: end of 2009]
@@ -139,133 +79,27 @@ Module features to implement:
GUIs to implement:
-* gtk
+* gtk
+ - how to integrate scheduler with GTK event loop!
* qt
+ - see discussions @ FISL about integration with event loop!
* fuse
Plugins to implement:
-* UDP backend (need LIBRARY to support (de)fragmentation!)
+* UDP backend
+ - Fragmentation library
+ - actual plugin
* HTTP backend
-
-
-
-
-
-Minor TODO items / known bugs:
-* UTIL:
- - crypto_hash: use libgcrypt (supports SHA-512 since 2003)
- - container_bloomfilter: improve efficiency (see FIXME)
-* SERVER:
- - inefficient memmove
-* TRANSPORT:
- - transport_api: support forcing disconnects through low quotas!
- (required for working F2F support!)
- - API: consider having core provide deadline information for each message
- (likely important for DV plugin which wants to loop back!)
- - implement transport API to pretty-print transport address
- + transport_api extension (API extension!)
- + service-transport extension (protocol extension)
- - add calls to statistics in various places
- - implement gnunet-transport (transport configurator / tester)
- - UPnP-based IP detection
- (Note: build library always, build service when libxml2/etc. are available)
- - instantly filter addresses from *other* peers that
- are *equal* to our own address + port (i.e., localhost:2086). We
- no longer filter those for outgoing (helps with loopback testing
- and keeps the code clean), but we should filter strictly *impossible*
- incoming addresses! This is for efficiency, not correctness.
- - We currently are happy to take any address told to us in a WELCOME
- to our set of addresses; we should have some minimal threshold-based
- scheme, limiting both the total number of addresses that we accept
- this way as well as requiring multiple confirmations; also, we
- should possibly try to confirm that the given address works for
- us ourselves (loopback-style) before adding it to the list
- [SECURITY issue]
- + we may be able to simplify WELCOME messages (no need to add
- addresses there anymore, but may help to learn them there anyway...).
- + we probably want some kind of voting/counting for learning IP addresses
- (maybe including IP addresses in ads proportional to how often others
- report them? we at least need some protection against >64k HELLOs!),
- + provide a way to give the user a list of "learned" IP addresses and
- a way to easily "veto" addresses off the list!
- => If MiM attacker uses vetoed address, blacklist the specific IP for
- the presumed neighbour!
- - not sure current way of doing ACKs works well-enough
- with unreliable transports where the ACK maybe lost;
- the "is_new" check would then possibly prevent future
- ACKs to be delivered, all while we're happily
- receiving messages from that peer! Worse, the other
- peer won't generate another ACK since it thinks we're
- connected just fine...
- Key questions:
- + How necessary is ACKing in the first place? (alternatives?)
- + Should we transmit ACKs in response to every HELLO? (would that
- fully address the problem?)
- - latency measurements implemented in the transport
- plugins makes it only work for bi-di transports
- and results in code replication
- - should latency be included in the ReceiveCallback and
- NotifyConnect or passed on request?
- - FIXME's with latency being simply set to 0 in a few places
- - Memory leak (running valgrind --trace-children=yes on test_transport_api:
- ==28393== 16 bytes in 1 blocks are indirectly lost in loss record 1 of 5
- ==28393== at 0x4C2260E: malloc (vg_replace_malloc.c:207)
- ==28393== by 0x52343E3: GNUNET_xmalloc_unchecked_ (common_allocation.c:62)
- ==28393== by 0x5234389: GNUNET_xmalloc_ (common_allocation.c:53)
- ==28393== by 0x524458A: GNUNET_NETWORK_socket_create_from_accept (network.c:289)
- ==28393== by 0x524B2DA: ??? (server.c:332)
- ==28393== by 0x524A4C7: ??? (scheduler.c:425)
- ==28393== by 0x524A73D: GNUNET_SCHEDULER_run (scheduler.c:510)
- ==28393== by 0x524FF8C: GNUNET_SERVICE_run (service.c:1326)
- ==28393== by 0x405500: main (gnunet-service-transport.c:2645)
- And also:
- ==28393== 65,744 (65,728 direct, 16 indirect) bytes in 1 blocks are definitely lost in loss record 5 of 5
- ==28393== at 0x4C2260E: malloc (vg_replace_malloc.c:207)
- ==28393== by 0x52343E3: GNUNET_xmalloc_unchecked_ (common_allocation.c:62)
- ==28393== by 0x5234389: GNUNET_xmalloc_ (common_allocation.c:53)
- ==28393== by 0x524473E: GNUNET_NETWORK_socket_create_from_accept (network.c:323)
- (rest of trace identical)
-
-* DATASTORE:
- - mysql backend
- - postgres backend
-* SETUP:
- - auto-generate "defaults.conf" using gnunet-setup from "config.scm"
- - integrate all options into "config.scm"
- - change config-file writing to exclude options set to default values
-* ARM:
- - implement exponential back-off for service restarts
- - better tracking of which config changes actually need to cause process restarts by ARM.
- - have way to specify dependencies between services (to manage ARM restarts better)
- - client-API is inefficient since it opens a TCP connection per service that is started
- (instead of re-using connections).
-* CORE:
- - code currently notifies clients about "encrypted" connections being up well before
- we get the encrypted PONG; sometimes this may be OK (for topology killing
- unwanted connnections), but of course not in general. I suspect we want
- to signal on PONG and have topology hook directly into transport to
- kill plaintext connections before they have a chance to become encrypted
- (may require minor hack in transport API)
-* PEERINFO:
- - have gnunet-peerinfo print actual host addresses again
- - add option to gnunet-peerinfo to modify trust value
-* POSTGRES-DB:
- - finish postgres implementation; simplify other SQLs using new stats
-* HTTPS transport
- - PolariSSL for MHD?
- - https integration
-* GAP improvements:
- - active reply route caching design & implementation of service,
- gap extension!
-* HOSTLIST:
- - implement advertising of hostlist URL
- - implement learning of hostlist URLs
+* HTTPS backend
+ - improved HTTPS support in MHD
+ - actual plugin
=> PRE-RELEASE
+
PHASE #4: [completion-goal: mid 2010]
* Documentation
- Doxygen generation
@@ -276,7 +110,6 @@ PHASE #4: [completion-goal: mid 2010]
- expand bibliography
- convert documentation pages to books
- update books (especially for developers)
- - add content type for links and view
- create good Drupal theme for GNUnet
- make a NICE download page and figure out how to
enable developers to publish TGZs nicely
@@ -285,38 +118,7 @@ PHASE #4: [completion-goal: mid 2010]
- DNS activation
-Stuff to remember:
-* Features eliminated from util:
- - threading (goal: good riddance!)
- - complex logging features [ectx-passing, target-kinds] (goal: good riddance!)
- - complex configuration features [defaults, notifications] (goal: good riddance!)
- - network traffic monitors (goal: eliminate)
- - IPC semaphores (goal: d-bus? / eliminate?)
- - second timers
- - DNS lookup (goal: have async service; issue: still need synchronous resolution in places, current code may not be portable)
- => code shrunk from 61 files to 34, 22k LOC to 15k LOC, 470k to 330k (with symbols)
-* New features in util:
- - scheduler
- - service and program boot-strap code
-* Major changes in util:
- - more expressive server (replaces selector)
-* Open questions:
- - how to integrate scheduler with GTK event loop!
-
+=> 0.9.x RELEASE
-Test coverage:
-* UTIL : 78.7%
-* HELLO : 93.7%
-* ARM : 69.9%
-* RESOLVER : 60.4%
-* STATISTICS: 82.8%
-* PEERINFO : 71.5%
-* TRANSPORT : 70.9%
-* CORE : 65.8%
-===================
-* TOTAL : 74.9%
-Not yet tested:
-* HOSTLIST : 0.0%
-* TOPOLOGY : 0.0%
diff --git a/doc/coverage.txt b/doc/coverage.txt
new file mode 100644
index 0000000000..6b08c1e3f9
--- /dev/null
+++ b/doc/coverage.txt
@@ -0,0 +1,66 @@
+Summary of test coverage (configure with --enable-coverage
+and run contrib/coverage.sh to generate a detailed report):
+* UTIL : 78.7%
+* HELLO : 93.7%
+* ARM : 69.9%
+* RESOLVER : 60.4%
+* STATISTICS: 82.8%
+* PEERINFO : 71.5%
+* TRANSPORT : 70.9%
+* CORE : 65.8%
+===================
+* TOTAL : 74.9%
+
+Not yet tested:
+* HOSTLIST : 0.0%
+* TOPOLOGY : 0.0%
+
+
+
+TESTCASES WANTED:
+=================
+
+For these functions, it would be nice if we had testcases ("make check")
+that would cause them to be executed and check that they are working:
+* gnunet-service-peerinfo:
+ - change_host_trust / flush_trust
+ - remove_garbage
+ - discard_hosts_helper / cron_clean_data_hosts
+* gnunet-service-transport:
+ - try_unvalidated_addresses
+ - lookup_address_callback
+ - lookup_hello_callback
+ - plugin_env_lookup_address
+ - notify_clients_disconnect
+ - list_validated_addresses
+ - cleanup_validation
+ - disconnect_neighbour
+ - handle_set_quota
+* plugin_transport_tcp.c:
+ - tcp_plugin_cancel
+ - tcp_plugin_address_pretty_printer / append_port
+ - tcp_plugin_set_receive_quota
+ - delayed_done
+* transport_api:
+ - GNUNET_TRANSPORT_set_qutoa / send_set_quota
+ - hello_wait_timeout
+ - transmit_ready
+ - transmit_timeout
+ - remove_from_any_list / remove_neighbour
+ - GNUNET_TRANSPORT_notify_transmit_ready_cancel
+ - Testcases for set_quota, timeouts, disconnects, transmit_ready_cancel
+ - gnunet-service-transport HELLO validation (how good is our coverage?)
+ - direct test of plugins compliance to plugin API
+* core_api:
+ - timeout_request
+ - solicit_traffic / copy_and_free
+ - GNUNET_CORE_peer_configure / produce_configure_message
+* gnunet-service-core:
+ - update_window
+ - find_client
+ - handle_client_request_configure
+ - set_key_retry_task
+ - align_and_deliver
+ - handle_transport_notify_disconnect
+* hostlist (everything)
+* topology (everything)