duniter issueshttps://git.duniter.org/nodes/typescript/duniter/-/issues2017-11-28T16:49:16+01:00https://git.duniter.org/nodes/typescript/duniter/-/issues/1183Champs inutilisés en base de données2017-11-28T16:49:16+01:00Cédric MoreauChamps inutilisés en base de donnéesÀ la lecture du [Chapitre 7 - Base de données](https://duniter.org/fr/wiki/duniter/tutoriel-dev/chapitre-7-bdd/) du tuto de dev, on s'aperçoit qu'il y a plusieurs champs des tables de piscine qui ne sont plus exploitées.
Ces champs ne...À la lecture du [Chapitre 7 - Base de données](https://duniter.org/fr/wiki/duniter/tutoriel-dev/chapitre-7-bdd/) du tuto de dev, on s'aperçoit qu'il y a plusieurs champs des tables de piscine qui ne sont plus exploitées.
Ces champs ne servent plus, ils peuvent être supprimés.
Il faut tout de même vérifier avec les tests que cela est bien vrai (j'ai moi-même fait des recherches avant de noter l'inutilité de ces champs), mais ensuite il faut les retirer et mettre à jour le Chapitre 7 en conséquence.Horizonhttps://git.duniter.org/nodes/typescript/duniter/-/issues/1032Multiple protocol documentation issues2017-11-28T16:49:16+01:00Cédric MoreauMultiple protocol documentation issues*Created by: ThibG*
The protocol documentation (https://github.com/duniter/duniter/blob/master/doc/Protocol.md) has some outdated information, errors and misleading examples:
- General: character encoding is not defined
- BLOCK_UID
...*Created by: ThibG*
The protocol documentation (https://github.com/duniter/duniter/blob/master/doc/Protocol.md) has some outdated information, errors and misleading examples:
- General: character encoding is not defined
- BLOCK_UID
- Hash function not specified
- Examples hint at SHA1 instead of SHA256
- Identity:
- Examples hint at Base58-encoded signatures
- Inline format not defined
- Revocation:
- Inline format not defined
- Certification:
- “Self-certification” should be called “Identity” for consistancy
- Examples hint at Base58-encoded signatures
- It is unclear how to retrieve identity information from the inline format:
In fact, it seems to me that a key owner may publish multiple identities,
so PUBKEY_TO doesnt seem sufficient to recover the identity.
Alternatively, maybe iterating over known identities for that pubkey and
taking the first matching certificate signature could work…Horizonhttps://git.duniter.org/nodes/typescript/duniter/-/issues/944Move wiki documentation on git repository2017-11-28T16:49:16+01:00Cédric MoreauMove wiki documentation on git repository*Created by: M5oul*
…on `doc` folder.
Then close `Wiki` on the settings.
This could avoid loss of documentation.*Created by: M5oul*
…on `doc` folder.
Then close `Wiki` on the settings.
This could avoid loss of documentation.Horizonhttps://git.duniter.org/nodes/typescript/duniter/-/issues/673Document BMA API with swagger2018-03-07T21:33:15+01:00Cédric MoreauDocument BMA API with swagger*Created by: M5oul*
- [Website](http://swagger.io)
- [Example](http://petstore.swagger.io/#/pet)
*Created by: M5oul*
- [Website](http://swagger.io)
- [Example](http://petstore.swagger.io/#/pet)
Horizonhttps://git.duniter.org/nodes/typescript/duniter/-/issues/630contribute doc : mocha-DefinitelyTyped2020-05-01T12:30:28+02:00Benoit Laveniercontribute doc : mocha-DefinitelyTypedDans le [tuto contribute](https://github.com/duniter/duniter/blob/dev/doc/contribute-french.md#ouvrir-le-projet-duniter) :
```
Rendez-vous dans File > Settings.., puis dans la zone de recherche du coin supérieur gauche tapez "Lib" :
Ic...Dans le [tuto contribute](https://github.com/duniter/duniter/blob/dev/doc/contribute-french.md#ouvrir-le-projet-duniter) :
```
Rendez-vous dans File > Settings.., puis dans la zone de recherche du coin supérieur gauche tapez "Lib" :
Ici, cochez "mocha-DefinitelyTyped" :
```
=> plus necessaire (je n'ai pas eu besoin sous WebStorm 2016.2.2 + duniter 0.31.1)
Horizonhttps://git.duniter.org/nodes/typescript/duniter/-/issues/614Add a Dekstop User Guide2017-11-28T16:49:17+01:00Cédric MoreauAdd a Dekstop User GuideA guide for the UI users.
https://forum.duniter.org/t/duniter-desktop-guide/902
A guide for the UI users.
https://forum.duniter.org/t/duniter-desktop-guide/902
Horizonhttps://git.duniter.org/nodes/typescript/duniter/-/issues/605Add a developer guide2017-11-28T16:49:17+01:00Cédric MoreauAdd a developer guideToday we have a [French developer guide](https://github.com/duniter/duniter/blob/master/doc/contribute-french.md) for both Linux and Windows. It would be great to have a similar tutorial in English, but also including MacOS (see [this is...Today we have a [French developer guide](https://github.com/duniter/duniter/blob/master/doc/contribute-french.md) for both Linux and Windows. It would be great to have a similar tutorial in English, but also including MacOS (see [this issue encountered by a MacOS user](https://github.com/duniter/duniter/issues/602#issuecomment-248347978)).
Also, this tutorial too much focuses on WebStorm, which is not mandatory to use. We better write a purely editor agnostic tutorial.
Horizonhttps://git.duniter.org/nodes/typescript/duniter/-/issues/452Missing ARM install documentation2017-02-07T11:44:02+01:00Cédric MoreauMissing ARM install documentationIt can notably use 2 methods:
- specific debian package
- or curl
It can notably use 2 methods:
- specific debian package
- or curl
Horizonhttps://git.duniter.org/nodes/typescript/duniter/-/issues/354Have an automatically generated doc2017-11-28T16:49:19+01:00Cédric MoreauHave an automatically generated docWe could use http://apidocjs.com as a documentation generator.
Also, examples could be generated by Unit Tests.
We could use http://apidocjs.com as a documentation generator.
Also, examples could be generated by Unit Tests.
Horizonhttps://git.duniter.org/nodes/typescript/duniter/-/issues/284describe memory usage2016-01-06T16:16:41+01:00Cédric Moreaudescribe memory usage*Created by: Sylvain303*
following #206
Make a documentation about how ucoin is using memory RAM and disk at different stage.
- sync
- reset
- normal running ucoin's node
*Created by: Sylvain303*
following #206
Make a documentation about how ucoin is using memory RAM and disk at different stage.
- sync
- reset
- normal running ucoin's node
Horizonhttps://git.duniter.org/nodes/typescript/duniter/-/issues/130Describe multibranch mechanism2016-09-28T21:25:35+02:00Cédric MoreauDescribe multibranch mechanismWith PlantUML diagrams.
With PlantUML diagrams.
Horizonhttps://git.duniter.org/nodes/typescript/duniter/-/issues/118Two launching guides2017-02-07T07:16:40+01:00Cédric MoreauTwo launching guides*Created by: M5oul*
It would be great to have two differents guides:
- one to join an existing monetary system;
- and the other one to create a monetary system.
*Created by: M5oul*
It would be great to have two differents guides:
- one to join an existing monetary system;
- and the other one to create a monetary system.
Horizonhttps://git.duniter.org/nodes/typescript/duniter/-/issues/65Document how Web-of-Trust heuristics defend against Sybil attacker.2016-07-10T20:27:37+02:00Cédric MoreauDocument how Web-of-Trust heuristics defend against Sybil attacker.*Created by: nathan-at-least*
From [the FAQ](http://ucoin.io/faq/):
```
Which are rules of Web of Trust?
Joining the Web of Trust requires to fit 3 conditions:
an identity must gathers a minimum number of links
an identity ca...*Created by: nathan-at-least*
From [the FAQ](http://ucoin.io/faq/):
```
Which are rules of Web of Trust?
Joining the Web of Trust requires to fit 3 conditions:
an identity must gathers a minimum number of links
an identity cannot have twice a same link for a given period
an identity must be between [0, maxStep] distance from any other identity
Where:
step 0 is the identity itself
step n is an identity directly known by step n-1
```
This answer should link to a document which argues why these heuristics protect against Sybil attackers.
**Proposed Sybil Attack:**
Imagine an identity requires `K` links and an attacker controls `K` identities all of which are `maxStep - 1` distance from all other identities. Let's call these `K` identities _bridge identities_. Now, the attacker can begin generating new identities rapidly. Call these _Sybil identities_. For each Sybil identity, the attacker signs a link from each of the `K` bridge identities pointing to the new Sybil identity.
Each Sybil identity has `K` links from the bridge identities (criterion 1). This signing happens during each period (criterion 2), and the distance from any Sybil identity to any other is `maxStep` because of the location of the bridge identities (criterion 3).
Is this attack feasible? If not, why not?
Whether or not this attack is feasible, a useful security model would provide a rationale for the three criteria above (or any other local heuristics or protocol security features).
Horizon