Add todos/targets list
This commit is contained in:
parent
3e657a56ac
commit
7d11a3664f
|
@ -104,6 +104,11 @@ repository.
|
|||
./scripts/debugging.sh
|
||||
#+end_src
|
||||
|
||||
*** ToDos
|
||||
|
||||
To have a look at all the planned tasks you can have a look at the planned
|
||||
features here: [[file:docs/todos.org][todos.org]]
|
||||
|
||||
** Used packages
|
||||
|
||||
- [[https://pyqt.readthedocs.io/en/latest/][PyQt5]] - the GUI framework
|
||||
|
|
|
@ -0,0 +1,70 @@
|
|||
* TODOs/Targets
|
||||
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| *Target-Nr.* | *Target* | *Priority* |
|
||||
| <5> | <30> | <10> |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 1. | The application uses cross-plattform compatible technology. | must |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 2. | The application is licensed under the GPVv3. | must |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 3. | The user can create an archive with less then three clicks. | must |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 4. | The user can delete an archive with three clicks. | must |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 5. | Under Linux a user can mount an archive with two clicks. | must |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 6. | The user can restore an archive. | must |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 7. | The user can define the source path in the application. | must |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 8. | The configuration is stored in a plain-text file. | must |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 9. | The user can put his repository on a harddisk. | must |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 10. | The application comes with sane defaults for Linux computers. | must |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 11. | The archive list automatically gets updated after a change. | must |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 12. | The user can put his repository on a server reachable through SSH. | 5 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 13. | The user can define the name of the archives. | 5 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 14. | The application tells the user when the repository isn't reachable. | 5 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 15. | The application warns the user when a hypervizor is running. | 5 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 16. | The application shows error of BorgBackups transparently to the user. | 5 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 17. | The application tells the user when BorgBackup is already running in the background. | 5 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 18. | The repository gets pruned after each backup. | 4 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 19. | The user can setup automatic backups running in the background. | 4 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 20. | The application prompts the user to create a repository when a config is present but the repository is missing. | 4 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 21. | The application uses when ever possible general environment variables "HOME", etc.. | 4 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 22. | The application stores/caches additional information in a database. | 3 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 23. | The application shows a setup wizard on the first run. | 3 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 24. | The user can read the full log of an archive with less than three clicks. Most likely only possible with a database. | 3 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 25. | The application can create system notifications. | 3 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 26. | The user can change the settings in the graphical interface. | 3 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 27. | The application can decide on closing the application if the mounted archive should still be available afterwards. | 2 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 28. | The user can change the repository. | 2 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 29. | The user can search in an archive for a file or a folder. | 2 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 30. | The user can change the retention policy. | 2 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 31. | The application covers all the features of BorgBackup. | 2 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
||||
| 32. | The application checks if the computer is in the correct network before it connects to the server. | 2 |
|
||||
|--------------+----------------------------------------------------------------------------------------------------------------------+------------|
|
Loading…
Reference in New Issue