X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=TODO;h=c10b8ce1ef94d8ecb5a0c6a92ba6b5b8ed1847fd;hb=fd0692ba60b03da85aa02aa5eb642600013f7c7b;hp=513fd8dfd082da72cef398e7adc27bfa62f1ffc0;hpb=82e0927004c06a108ad31b72a41e674a2462fede;p=platform%2Fupstream%2Fconnman.git diff --git a/TODO b/TODO old mode 100644 new mode 100755 index 513fd8d..c10b8ce --- a/TODO +++ b/TODO @@ -8,63 +8,131 @@ Background lowest complexity. Complexity is a function of both task 'complexity' and task 'scope'. + Core ==== -- Session API implementation +- Personal firewall - Priority: High + Priority: Low + Complexity: C8 + + Discuss and implement a basic and safe firewalling strategy into + Connman. Provide a D-Bus API for personal firewalling. + + +- PACRunner extensions + + Priority: Low Complexity: C4 - Owner: Daniel Wagner - Owner: Patrik Flykt - The session API should provide a connection abstraction in order to - prioritize applications network accesses, prevent or allow network - and bearer roaming, or provide applications with a way to request - for periodic network connections. On-demand connections will be - implemented through this API as well. - See http://www.mail-archive.com/connman@connman.net/msg01653.html + Support more URI schemes, support multiple connections, tighter + security integration. -- IP ranges allocation and check +- Check logging produced by connman_info() - Priority: High - Complexity: C2 - Guillaume Zajac + Priority: Medium + Complexity: C1 - For both tethering and private networks, but also to detect invalid - static IP configurations, we need to have a core IP range layer - that manages all currently used IP blocks. + Check that logging produced by connman_info() contains meaningful messages + and get rid of the unnecessary ones. -- Personal firewall +- Remove --nobacktrace option + + Priority: Medium + Complexity: C1 + When: 2.0 + + Remove the --nobacktrace option or change it to --backtrace depending on + the level of systemd integration or other factors. + + +- Clean up data structure usage + + Priority: Medium + Complexity: C4 + + Use hash tables, queues and lists in the code. Check on the currently used + data structures and see if something can be simplified. + + +- Unit tests for DHCP, DNS and HTTP Priority: Low - Complexity: C8 - Owner: Tomasz Bursztyka + Complexity: C4 - Discuss and implement a basic and safe firewalling strategy into - Connman. Provide a D-Bus API for personal firewalling. + Create unit tests for these components starting with DHCP. Use gtest + from GLib for this task similarly to what has been done for OBEX in Bluez + and oFono in general. -- PACRunner extensions +- Support other time sources than NTP + + Priority: Low + Complexity: C2 + + Support other time sources like cellular, GPS in addition to NTP. + + +- Get interface names from src/device.c Priority: Low + Complexity: C2 + + Instead of using ioctls in connman_inet_ifindex and connman_inet_ifname, + utilize the information already provided by netlink in src/device.c. + + +- Support D-Bus ObjectManager + + Priority: Medium Complexity: C4 - Support more URI schemes, support multiple connections, tighter - security integration. + Support D-Bus ObjectManager by using functionality already present in + ./gdbus. Method calls and signals are already registered with gdbus, but + properties and replies especially in Agent are still handled with plain + dbus library function calls. + With this, Manager API is removed, and a WiFi P2P API based on + ObjectManager common to Linux desktops can be implemented. + + +Tethering +========= + +- Verify if bridge has been correctly created and configured + + Priority: Low + Complexity: C1 + + When enabling tethering check if there was any error while creating and + configuring the bridge before continue. It has been done only for WiFi + technology, for other tethering technologies it should be evaluated + and implemented in case it is advantageous. WiFi ==== +- Clean up WiFi data structure usage + + Priority: Medium + Complexity: C2 + + Struct wifi_data is passed as a pointer in some of the wifi plugin + callbacks. For example removing a WiFi USB stick causes RTNL and + wpa_supplicant to call the wifi plugin at the same time causing the + freeing of the wifi data structure. Fix up the code to have proper + reference counting or other handling in place for the shared wifi data + and the members in the data structure. + + - EAP-AKA/SIM Priority: Medium Complexity: C2 - Owner: Samuel Ortiz This EAP is needed for SIM card based network authentication. ConnMan here plays a minor role: Once wpa_supplicant is set up for @@ -78,38 +146,19 @@ WiFi Complexity: C1 -- Wireless background scan - - Priority: Medium - Complexity: C4 - Owner: Samuel Ortiz - - While connected ConnMan should offload the background scanning to - wpa_supplicant. Wpa_supplicant allows for a fancy background scan - which frequency increases after the current connection signal level - drops below a defined threshold. - We should also be able to have wpa_supplicant do the background - scanning for us when we're not connected, if we have configured our - favorite networks. - - -- WiFi p2p +- Removing wpa_supplicant 0.7.x legacy support - Priority: Medium - Complexity: C2 + Priority: Low + Complexity: C1 + Removing global country property setter in gsupplicant, and removing + wifi's technology set_regdom implementation. Removing autoscan fallback. + (Note: should be done around the end 2012) Bluetooth ========= -- DUN client - - Priority: Low - Complexity: C4 - Owner: Mario Tokarz - - Cellular ======== @@ -122,44 +171,70 @@ VPN Priority: Medium Complexity: C4 - Owner: Jukka Rissanen -- Split tunnelling +- L2TP & PPTP compatibility prefix removal - Priority: Low - Complexity: C8 - Dependencies: Core:Private networks - Owner: Jukka Rissanen + Priority: Medium + Complexity: C1 + When: connman 2.0 - The current VPN support puts the VPN interface at the top of the - service list, giving VPNs the default route. When doing split - tunneling, the system routes packet to the VPN interface for - private IPs, while going through the default interface for the rest - of the traffic. + The VPN config file provisioning patchset contains code that makes + PPP options to be marked by "PPPD." prefix. The code supports also + old "L2TP." and "PPTP." prefix for PPP options. Remove the compatibility + code and only allow "PPPD." prefix for PPP options. -Tools -===== +- Update VPNC and OpenVPN with Agent support -- Command line tool + Priority: Medium + Complexity: C2 - Priority: Low + Update VPNC and OpenVPN with VPN Agent support to request possible user + ids and passphrases. + + +- Change OpenConnect plugin to use libopenconnect + + Priority: Medium Complexity: C4 - Owner: Patrik Flykt - For platforms not running python, it could prove useful to provide them - with a native single binary command line tool. + Current implementation of OpenConnect uses screenscraping and interactive + mode for accepting self signed certificates and reacting to PKCS pass + phrase requests. This should be replaced with libopenconnect use. It may be + worthwhile to attempt to replace the whole authentication with the use of + openconnect_obtain_cookie() whatever authentication type is used. This + would lead to using only the cookie when connecting (--cookie-on-stdin) + and would cleanup the code at run_connect(). + + The usage of stdout can be removed as unnecessary. Cookie should be + retrieved with openconnect_obtain_cookie(). Remove this also from + connman_task_run(). + + Function is_valid_protocol() must use openconnect_get_supported_protocols. + Also the static const char *protocols[] would be unnecessary. + Reading the stderr with byte-by-byte approach is to be removed, as well as + are the PKCS failures and requests in stderr IO channel processing. -User Interface -============== + The use of interactive mode toggle is to be removed. Non-interactive mode + must be used, which leads to using --syslog with each authentication type + as task arg. -- GNOME3 UI + If the peer certificate cannot be verified with normal means it is because + the peer certificate is self signed and the user setting + "AllowSelfSignedCert" has to be used for the verify certificate callback + reply. The callback for certificate validation must return zero if user has + allowed self signed certificates. In such case save the SHA1 fingerprint of + server certificate as it is done now, otherwise indicate error to + libopenconnect. + +Tools +===== + +- Add Clock API support to connmanctl Priority: Low - Complexity: C4 - Owner: Alok Barsode + Complexity: C2 - A GNOME3 shell user interface would make it easier for mainstream distros - users to use ConnMan. + The connmanctl command line tool should support Clock API.