public inbox for gentoo-soc@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-soc] Weekly Report: Fusebox - FUSE Porwered sandbox project
@ 2020-08-09 23:00 Kaoru Esashika
  0 siblings, 0 replies; 17+ messages in thread
From: Kaoru Esashika @ 2020-08-09 23:00 UTC (permalink / raw
  To: gentoo-soc

Hi,
This week, I implement the interface to control ACL.
This interface is file-oriented.
I thought it would be better to be able to open the file in an editor
and edit the list directly, so I implemented it.
Changes are passed directly to Fusebox and take effect immediately.

Next week, I will integrate with the portage.
Integrating may require patching to emerge program, so I might
encounter some problems.
I'm going to work on this as soon as possible for the final evaluation.

Project Repository: https://github.com/pluser/fusebox

Regards,
Kaoru Esashika


^ permalink raw reply	[flat|nested] 17+ messages in thread
* [gentoo-soc] Weekly Report: Fusebox - FUSE Porwered sandbox project
@ 2020-08-24  9:55 Kaoru Esashika
  0 siblings, 0 replies; 17+ messages in thread
From: Kaoru Esashika @ 2020-08-24  9:55 UTC (permalink / raw
  To: gentoo-soc

Hi,
This week, I'm fixing many bugs to integrate with emerge.
I realized bugs by integrating with emerge.
I've done a lot of research on pipes and standard inputs and outputs.
Making multiple processes work together is harder than I thought it
would be, but I'm going to do my best.

Project Repository: https://github.com/pluser/fusebox

Regards,
Kaoru Esashika


^ permalink raw reply	[flat|nested] 17+ messages in thread
* [gentoo-soc] Weekly Report: Fusebox - FUSE Porwered sandbox project
@ 2020-08-17  8:27 Kaoru Esashika
  0 siblings, 0 replies; 17+ messages in thread
From: Kaoru Esashika @ 2020-08-17  8:27 UTC (permalink / raw
  To: gentoo-soc

Hi,
This week, I'm writing glue code to integrate with emerge.
Now I can call the Fusebox from emerge process and working with ebuild.sh.
However, there is a problem that emerge process access a file that is
unlinked already.
I have to investigate this phenomenon and it may spend a lot of time...

Anyway, next week, I will investigate and debug Fusebox.

Project Repository: https://github.com/pluser/fusebox

Regards,
Kaoru Esashika


^ permalink raw reply	[flat|nested] 17+ messages in thread
* [gentoo-soc] Weekly Report: Fusebox - FUSE Porwered sandbox project
@ 2020-08-02 23:00 Kaoru Esashika
  0 siblings, 0 replies; 17+ messages in thread
From: Kaoru Esashika @ 2020-08-02 23:00 UTC (permalink / raw
  To: gentoo-soc

Hi,
This week, I brushed up ACL (Access Control List) feature.
I implement a compatibility interface to keep the consistency of the
current portage's sandbox.
Also, I wrote many tests and stabilized the feature.
The unit tests make me to easier modifying code. Because this is to
reduce the need to check regressions as the code changes.

Next week, I will write some code to integrate with portage.
It's going to be a different kind of challenge, but I'm going to do my best.
And I have some ideas about ACL interface. I'd like to implement it if
I had the time.

Project Repository: https://github.com/pluser/fusebox

Regards,
Kaoru Esashika


^ permalink raw reply	[flat|nested] 17+ messages in thread
* [gentoo-soc] Weekly Report: Fusebox - FUSE Porwered sandbox project
@ 2020-07-26 23:00 Kaoru Esashika
  2020-07-27  4:48 ` EBo
  0 siblings, 1 reply; 17+ messages in thread
From: Kaoru Esashika @ 2020-07-26 23:00 UTC (permalink / raw
  To: gentoo-soc

Hi,
This week, I wrote the code about ACL (Access Control List).
The ACL allows you to actually control whether or not the application
can access your files.
This implementation also includes an interface that allows you to
control access to the files dynamically.
Specifically, you can control access to specific files by writing a
list of files to be controlled in a special virtual file called a
control file.

Next week, I will integrate the Fusebox with emerge/portage. And also,
I need prepare to evaluation...

Project Repository: https://github.com/pluser/fusebox

Regards,
Kaoru Esashika


^ permalink raw reply	[flat|nested] 17+ messages in thread
* [gentoo-soc] Weekly Report: Fusebox - FUSE Porwered sandbox project
@ 2020-07-19 23:00 Kaoru Esashika
  0 siblings, 0 replies; 17+ messages in thread
From: Kaoru Esashika @ 2020-07-19 23:00 UTC (permalink / raw
  To: gentoo-soc

Hi,
This week, I was writing unit test code.
The test code was harder to write than I expected.
In particular, the code that was associated with the filesystem had to
be patched with system calls to the OS and replaced with mock objects.
Python has a built-in mock object, and all calls to this object can be
made in You can record it. This feature is very useful and we use it a
lot in our test code.

I'd like to have even higher test coverage, but I can't just write
test code, so next week I'm going to implement the ACL (Access Control
List) feature.

Project Repository: https://github.com/pluser/fusebox

Regards,
Kaoru Esashika


^ permalink raw reply	[flat|nested] 17+ messages in thread
* [gentoo-soc] Weekly Report: Fusebox - FUSE Porwered sandbox project
@ 2020-07-12 23:00 Kaoru Esashika
  0 siblings, 0 replies; 17+ messages in thread
From: Kaoru Esashika @ 2020-07-12 23:00 UTC (permalink / raw
  To: gentoo-soc

Hi,
This week, I'm coding about vnode related code. 'vnode' is virtual inode.
Passing through the base file system inodes as is may cause inode conflicts.
So I have to 'convert' inode to vnode. And I was writing that code.
I also refactored the code because I feel code quality is not good.

Next week, I will write the code about unit test and ACL (Access
Control List) feature.

Project Repository: https://github.com/pluser/fusebox

Regards,
Kaoru Esashika


^ permalink raw reply	[flat|nested] 17+ messages in thread
* [gentoo-soc] Weekly Report: Fusebox - FUSE Porwered sandbox project
@ 2020-07-06  2:10 Kaoru Esashika
  0 siblings, 0 replies; 17+ messages in thread
From: Kaoru Esashika @ 2020-07-06  2:10 UTC (permalink / raw
  To: gentoo-soc

Hi,
This week, I'm trying to fix some issue which is pointed out by my
mentor (thanks!)
Some of the issues are caused by deadlock. Since Fusebox is a single
thread program,
It cannot process a request from VFS (kernel) while processing another request.
So I choose a solution that hides the directory which causes deadlock.
Because Fusebox has been developed for sandbox, basically it doesn't
need recursive access.
So I think this not bad.

In the next week, I will write unit test because debugging and testing
burden me.
And also I will implement virtual inode mechanism (which will kick out
a compromise in the code)

Project Repository: https://github.com/pluser/fusebox

Regards,
Kaoru Esashika


^ permalink raw reply	[flat|nested] 17+ messages in thread
* [gentoo-soc] Weekly Report: Fusebox - FUSE Porwered sandbox project
@ 2020-06-28 18:47 Kaoru Esashika
  0 siblings, 0 replies; 17+ messages in thread
From: Kaoru Esashika @ 2020-06-28 18:47 UTC (permalink / raw
  To: gentoo-soc

Hi,
This week, I'm struggling with bugs.
For example, Internal inode-path mapping is incorrect when link()
function is called after forget() was called.
Because such a phenomenon is very rare, difficult to reproduce.
Anyway, I fixed some bugs and I have successfully built GNU Hello[1]
on the Fusebox.
GNU Hello is a minimum, simple 'hello world' project which is
maintained for practice.
Because it is minimum and contains standard build process
("/.configure; make; make install"), I choose to initial target.
In the next week, I will write unit tests to keep working the code.
and write code to verbose output for evaluation.
Thank you.

[1]: https://en.wikipedia.org/wiki/GNU_Hello
Fusebox Repository: https://github.com/pluser/fusebox

Regards,
Kaoru Esashika


^ permalink raw reply	[flat|nested] 17+ messages in thread
* [gentoo-soc] Weekly Report: Fusebox - FUSE Porwered sandbox project
@ 2020-06-21 11:17 Kaoru Esashika
  2020-06-21 18:21 ` Michał Górny
  0 siblings, 1 reply; 17+ messages in thread
From: Kaoru Esashika @ 2020-06-21 11:17 UTC (permalink / raw
  To: gentoo-soc

Hi,
This week, I implemented some FUSE interface.
Therefore, the emerge program can work well on my Fusebox filesystem.
However, I ran into a few problems when we tried to implement it.
I've written about the problem and explanation about FUSE on my blog.
If you interested, please check
https://blog.pluser.net/en/posts/2020/gsoc-milestone-1/
Now I need to integrate Fusebox to the emerge program. But I don't
familiar with the emerge program well, I need to read the code...

Project Repository: https://github.com/pluser/fusebox

Regords,
Kaoru Esashika


^ permalink raw reply	[flat|nested] 17+ messages in thread
* [gentoo-soc] Weekly Report: Fusebox - FUSE Porwered sandbox project
@ 2020-06-14 11:41 Kaoru Esashika
  0 siblings, 0 replies; 17+ messages in thread
From: Kaoru Esashika @ 2020-06-14 11:41 UTC (permalink / raw
  To: gentoo-soc

Hi,
This week, I'm trying to implement a virtual filesystem with FUSE.
This filesystem consists of many APIs and I have to implement it.
Fortunately, there is sample code at the repository of the library.
So I reference it and write a simple readonly filesystem.
In the second half of the week, I expand it and try to make it writable.
However, I found strange behavior in my program. I have to debug and
write test code.
So that is my objective for next week.

Regards,
Kaoru Esashika

Project Repository: https://github.com/pluser/fusebox


^ permalink raw reply	[flat|nested] 17+ messages in thread

end of thread, other threads:[~2020-08-24  9:55 UTC | newest]

Thread overview: 17+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2020-08-09 23:00 [gentoo-soc] Weekly Report: Fusebox - FUSE Porwered sandbox project Kaoru Esashika
  -- strict thread matches above, loose matches on Subject: below --
2020-08-24  9:55 Kaoru Esashika
2020-08-17  8:27 Kaoru Esashika
2020-08-02 23:00 Kaoru Esashika
2020-07-26 23:00 Kaoru Esashika
2020-07-27  4:48 ` EBo
2020-07-28 20:08   ` Kaoru Esashika
2020-07-28 20:24     ` EBo
2020-07-19 23:00 Kaoru Esashika
2020-07-12 23:00 Kaoru Esashika
2020-07-06  2:10 Kaoru Esashika
2020-06-28 18:47 Kaoru Esashika
2020-06-21 11:17 Kaoru Esashika
2020-06-21 18:21 ` Michał Górny
2020-06-22 16:17   ` Kaoru Esashika
2020-06-22 18:02     ` Michał Górny
2020-06-14 11:41 Kaoru Esashika

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox