2017
DOI: 10.1007/978-3-319-57735-7_11
|View full text |Cite
|
Sign up to set email alerts
|

Challenges in Validating FLOSS Configuration

Abstract: Abstract. Developers invest much effort into validating configuration during startup of free/libre and open source software (FLOSS) applications. Nevertheless, hardly any tools exist to validate configuration files to detect misconfigurations earlier. This paper aims at understanding the challenges to provide better tools for configuration validation. We use mixed methodology: (1) We analyzed 2,683 run-time configuration accesses in the source-code of 16 applications comprising 50 million lines of code. (2) We… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 27 publications
(25 reference statements)
1
4
0
Order By: Relevance
“…Recently, a few studies investigated automated techniques or engineering practices to enhance configuration checking code [16], diagnosability [104], interface [45], security [14], [105], [106], configuration data analysis [107], configuration libraries [108], [109], and correlations or coupling in configuration and code [110]- [112]. Our work corroborates and complements the aforementioned work from the perspective of software evolution.…”
Section: Related Worksupporting
confidence: 78%
“…Recently, a few studies investigated automated techniques or engineering practices to enhance configuration checking code [16], diagnosability [104], interface [45], security [14], [105], [106], configuration data analysis [107], configuration libraries [108], [109], and correlations or coupling in configuration and code [110]- [112]. Our work corroborates and complements the aforementioned work from the perspective of software evolution.…”
Section: Related Worksupporting
confidence: 78%
“…Few studies cover field configurations of software systems (e.g., for deployment and orchestration). In fact, information of field configurations is highly desired, not only by operators and sysadmins to learn best practices, but also by developers and DevOps engineers to measure software usability and manageability [13,17,18,25,27,29].…”
Section: Introductionmentioning
confidence: 99%
“…Raab et al [17][18][19] created the Elektra framework to validate the access to configuration values to detect misconfigurations as soon as possible. We tried to achieve the same with our a-priori verification process.…”
Section: Related Workmentioning
confidence: 99%
“…We tried to achieve the same with our a-priori verification process. In their study [19], they investigated how free/libre and open-source software (FLOSS) can be configured and the problem of validating configurations for it. One finding is that presently, P r e p r i n t configuration validation is encoded in a way unusable for external validation or introspection tools.…”
Section: Related Workmentioning
confidence: 99%