-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathTODO_historical
128 lines (116 loc) · 6.74 KB
/
TODO_historical
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
0. Done
get this checked into git
1.
get zookeeper server starting at all
a. done
set the necessary properties for the zookeeper server
i. done
figure out what the necessary properties are and list them here:
dataDir (string path to dataDir, myid file should be dataDir/myid)
(I think in the distant future the dataDir and dataLogDir could and
should be completely in memory)
clientPort
server.something property required for every server (there must be more than 1)
ii. done (may need to revisit)
set them
b.
get a test set up that sets up another node/zookeeper server then runs a
another node/zookeeper dealio set up to connect to the first (possibly
mocked) node
Make a generic message diff system that returns the messages a given
node does not possess given two nodes, someday it will be backed by a fancy
signed merkle tree system, but for now we'll just do a stupid hashset
set operations thing with raw text and uuids, but the idea is that when
resuming a node should query the network for all the transactions that it
missed (which in the future may include transactions concerning things
it used to track) Eventually I would like tro store things in signed merkle
trees such that every entry in the receiptChain includes a hash and a
cryptographic signature, but until then we'll make this generic and make
a stupid simple implementation based on set operations keyed off UUIDs
2.
Choose an odd zookeeper server port between (101,200]
such that both that port and the port 1 greater than it
are available
3.
Get that local server into the current list of zookeeper servers
the client can connect to
4.
Get the node server working at all
5.
get the node server to start on the port one greater than the
zookeeper service (this may require shutting down the zookeeper
service and repeating the step in which it selects an available
port such that the one above it is also available)
6.
get the async store succeeded callback to trigger only once the
message has actually been stored to nonvolatile memory. SQLite
has laid some excellent groundwork for this, following their example
does not seem like a crazy idea.
7.
39. 40,43s/merkle tree/concurrent patricia trie
40. I think it would be good to have a signed merkle tree as a means
of transmitting transactions to one another. Shepherding data from one
host to another involves more concerns than how the pseudotransactions
are processed. It is in the interest of bandwidth, storage space (ephemeral
and otherwise), and security that we should use a signed merkle trees.
Yes we will allow for and expect large merkle tree diffs. The signing
takes away the reason blockchain people sometimes use a hash, as a
"proof of work". The idea is to let this database run on the open internet,
with CRLs deciding if we live or die(or hopefully attest-chain).
41. The idea is then that you have a relationship with each cert that
allows you to measure the cost of each method you call on a particular
cert's behalf and charge them for it, that way you can allow people to
use their own certs to store stuff on other peoples servers. I guess this
would be a mapping to a bitcoin/ethereum wallet. Anyways, this would allow
me to open up the MessageAndCode bundle so that other people can use it.
The code part however is going to need to be subclassed and heavily
scrutinized, I'm talking abut bytecode level analysis of complexity and
resource usage(disk, cpu, memory, etc). This is going to require limiting
the set of possible inputs, but we can still do cool stuff.
42. this means that you can auction off physical resources by advertising
the price and performance of your resources, then letting people compare
them to your competitors and then bid on an open market or list their computer
as available for hire.
43. 41,42 might be a bit premature, I think a more immediately impactful idea
might be to write some libraries that connect JoshDB with ecommerce software,
this would be a wordpress killer for sure, more secure, lower price, more flexibility,
and if they give us a private cert they can give us a mapping between datasets
and inputs for a jinja template and we can serve most any ecommerce website
90.
implement a port knocking scheme whereby a node can pass another node
its identifying information along with the date and time, encrypt it,
and sign it based on the certificate hierarchy structure enforced
by the authentication scheme. This would allow secure discovery of
ports given the hostname as well as secure local management of port blocks
this would allow each instance of a node run as its own process and
each certificate authority to get its own block of 128 ports on which
processes can run as well as a dedicated zookeeper server. This seems
superior to a design in which each node process has its own zookeeper server.
100.
In addition to making each machine a node is running on a zookeeper
server/observer make every node a TURN server for its fellows
120.
implement a timed message subtype that records how long each step of execution takes,
then-- provided each message between db servers and within a db server can be traced
back to the client message that sent it and will become timed themselves when spawned
by a timed client message (this demands that we spend some time considering how to deal
with timing attacks in a database [another stupid thing people shouldn't have to worry
about in the application layer], my initial thought is that the way a query[or access
or whatever] is processed is directly related to part of a data structure which we will
be allowing users to describe using instance methods ie toString(), comparison(), etc. They
should also be able to describe who should be able to access certain data structures and
elements of data structures as part of the declaration, something like the scala
private[moduleName] but instead private[AD domain|cert authority|kerberos whatever]),
a user could do some quick and dirty profiling of
their db usage, allowing them to selectively deploy 121
121.
implement a profiled message type that does full tracing of db message passing, tracing
through the literal code of the database as it was executed in the course of processing
the specific message with stack traces, memory usage, cpu time, clock time, etc.
This would be for in depth debugging and performance analysis of a
database workload/query/whatever especially if we make it integrate nice with yourkit
and jprofiler and datadog and stuff (does jprofiler do dbs? I know yourkit does)
122.
This profiled type seems like a pretty great example of a "premium" side of a freemium
divide since it is absolutely something people will eventually need, but it is unnecessary
while the user is first getting a feel for the database and deciding if they like it