Re: [Rpm-maint] [rpm-software-management/rpm] Return to Tralla La or: RPM in C++ (Discussion #2983)

2024-03-28 Thread Colin Walters
> As such, moving to C++ now will probably make it harder to move to Rust later. Well, maybe. My original comment here remember was about how we very intentionally moved rpm-ostree to "C compiling as C++" explicitly to bridge with cxx.rs. This...kind of worked in some ways, and definitely

Re: [Rpm-maint] [rpm-software-management/rpm] Return to Tralla La or: RPM in C++ (Discussion #2983)

2024-03-22 Thread Colin Walters
> For starters, it's a show-stopper as a bootstrapping dependency for something > as early in that chain as rpm. (Threading this) do you have a link to these discussions? There's a *ton* of work on bootstrapping Rust (and systems in general) on self-hosting OSes/distributions. The [GUIX

Re: [Rpm-maint] [rpm-software-management/rpm] Return to Tralla La or: RPM in C++ (Discussion #2983)

2024-03-21 Thread Colin Walters
I have some experience with this; we did a similar thing in rpm-ostree starting around https://github.com/coreos/rpm-ostree/pull/2336#issuecomment-739556744 The rationale there was actually to aid porting to Rust, because we could use https://cxx.rs/ There were a lot of things there, see

Re: [OS-BUILD PATCH 0/3] configs: netfilter: update settings

2024-01-23 Thread Colin Walters (Red Hat) (via Email Bridge)
From: Colin Walters (Red Hat) on gitlab.com https://gitlab.com/cki-project/kernel-ark/-/merge_requests/2823#note_1739124559 Today, podman (really https://github.com/containers/netavark/ ) still uses these compat interfaces...I'm a little surprised that there's no "can run a container" g

Re: EncourageI686LeafRemoval Change: Please make sure it's actually a leaf package

2024-01-15 Thread Colin Walters
On Mon, Jan 15, 2024, at 8:57 AM, Fabio Valentini wrote: > Hi all, > > I've been made aware that there has been a cascade of packages that > dropped i686 support in Rawhide, most of them referencing my > EncourageI686LeafRemoval Change Proposal, but none of which *actually > are* leaf packages:

Re: EncourageI686LeafRemoval Change: Please make sure it's actually a leaf package

2024-01-15 Thread Colin Walters
On Mon, Jan 15, 2024, at 8:57 AM, Fabio Valentini wrote: > Hi all, > > I've been made aware that there has been a cascade of packages that > dropped i686 support in Rawhide, most of them referencing my > EncourageI686LeafRemoval Change Proposal, but none of which *actually > are* leaf packages:

Re: goal: booting with an empty /etc

2023-12-11 Thread Colin Walters
On Mon, Dec 11, 2023, at 12:31 PM, Neal Gompa wrote: > > We're currently not allowed to use /usr/etc (not that I like that path > anyway) because it breaks RPM-OSTree. My understanding is that this > directory is reserved by RPM-OSTree for storing pristine copies of > /etc content for each

Re: [Rpm-maint] [rpm-software-management/rpm] SOURCE_DATE_EPOCH=0 not clamping file mtime (Issue #2679)

2023-09-28 Thread Colin Walters
ostree always uses zero for mtime of files it writes because there are no timestamps in the file format at all. And in order to have sharing via hardlinks, there's then the question of what time to apply to that inode. If there was a way in a Unix filesystem to have no timestamp at all, we'd

Re: An update on RHEL moving to issues.redhat.com

2023-09-18 Thread Colin Walters
On Mon, Sep 18, 2023, at 3:57 AM, Petr Pisar wrote: > V Fri, Sep 15, 2023 at 01:27:23PM -0400, Colin Walters napsal(a): >> To state the blindingly obvious thing, RHEL made a decision to centralize on >> Gitlab. Having Fedora be on pagure creates IMO unnecessary friction for

Re: An update on RHEL moving to issues.redhat.com

2023-09-15 Thread Colin Walters
On Fri, Sep 15, 2023, at 4:12 PM, Neal Gompa wrote: > On Fri, Sep 15, 2023 at 1:28 PM Colin Walters wrote: >> >> >> My point is only partly about the HTML, but about the ecosystem surrounding >> it (CI is a really big one) but really the total user experience

Re: An update on RHEL moving to issues.redhat.com

2023-09-15 Thread Colin Walters
One thing I find amusing about this list (which like some others is kind of a long-running soap opera that happens to sometimes produce software as a side effect) is that many times, I can see just two bits of information: - The subject of the email - The name of the person responding And I

Re: An update on RHEL moving to issues.redhat.com

2023-09-14 Thread Colin Walters
On Wed, Sep 13, 2023, at 1:44 PM, Matthew Miller wrote: > On Mon, Sep 11, 2023 at 09:20:09AM -0700, Adam Williamson wrote: >> IIRC it was a condition of that proposal that we wind up on a hosted >> version of the *open source* release of gitlab, which is something we >> managed to talk gitlab

Re: [Rpm-maint] [rpm-software-management/rpm] RFE: allow overriding buildtime and hostname via environment variable (Issue #2603)

2023-09-11 Thread Colin Walters
> But people consider both BUILDTIME and BUILDHOST very useful for figuring out > where/when/who exactly build a package. For Fedora using Koji, there is always exactly one Koji build for a given NEVRA, and the server side metadata contains the build host. -- Reply to this email directly or

Re: [Rpm-maint] [rpm-software-management/rpm] RFE: detect filesystem capabilities before starting a transaction (Issue #2637)

2023-08-30 Thread Colin Walters
xref https://github.com/containers/storage/pull/1608 -- Reply to this email directly or view it on GitHub: https://github.com/rpm-software-management/rpm/issues/2637#issuecomment-1699140774 You are receiving this because you are subscribed to this thread. Message ID:

Re: Adding Passim as a Fedora 40 feature?

2023-08-25 Thread Colin Walters
On Fri, Aug 25, 2023, at 7:42 AM, Richard Hughes wrote: > Hi all, > > I was thinking of adding Passim as a default-installed and > default-enabled dep of fwupd in the Fedora 40 release. Before I create > lots of unnecessary drama, is there any early feedback on what's > described in

Re: [Rpm-maint] [rpm-software-management/rpm] Replace fakechroot with proper container technology (PR #2559)

2023-07-05 Thread Colin Walters
It's worth noting that rpm-ostree has been isolating individual scripts (e.g. `%post`) with bwrap for a long time now. That's distinct from the test suite only usage here, but just FYI. -- Reply to this email directly or view it on GitHub:

Re: [Rpm-maint] [rpm-software-management/rpm] docs/users_and_groups: Mention DynamicUser (PR #2558)

2023-06-30 Thread Colin Walters
Well, the doc is talking all about sysusers.d, which is (today) only implemented by systemd... I coincidentally recently did https://github.com/ostreedev/ostree/pull/2914 which updates the ostree equivalent of this section, and intentionally talked about `DynamicUser=yes` there because it

[Rpm-maint] [rpm-software-management/rpm] docs/users_and_groups: Mention DynamicUser (PR #2558)

2023-06-30 Thread Colin Walters
Because it really is just better (where its possible to use). You can view, comment on, or merge this pull request online at: https://github.com/rpm-software-management/rpm/pull/2558 -- Commit Summary -- * docs/users_and_groups: Mention DynamicUser -- File Changes -- M

Re: Towards enabling rpm sysusers integration

2023-06-30 Thread Colin Walters
On Thu, Jun 29, 2023, at 3:55 AM, Panu Matilainen wrote: >> last time I looked auditd is started later than >> systemd-sysusers. Hence not sure if sysusers would actually generate >> audit messages that auditd could pick them up. > > For the rpm integration, "started later" is irrelevant as the

Re: [HEADS UP] util-linux based on new mount API coming to rawhide/f39

2023-04-11 Thread Colin Walters
On Tue, Mar 21, 2023, at 8:16 AM, Karel Zak wrote: > Hey all, > > > util-linux v2.39-rc1 coming to rawhide, Release Notes: > https://kernel.org/pub/linux/utils/util-linux/v2.39/v2.39-ReleaseNotes > > I usually don't report util-linux Fedora updates, but this one is > special. This new

Re: DNF Sytem Upgrade requirements for an F37 → F38 upgrade

2023-03-30 Thread Colin Walters
On Wed, Mar 29, 2023, at 6:08 PM, Fabio Valentini wrote: > > I don't really want to throw money out the window just because DNF > eats up all the memory it can :( Everyone needs to internalize: This has nothing to do with DNF, really. It's about the *size of the repository metadata*. Every

Re: [Rpm-maint] [rpm-software-management/rpm] RPM with Copy on Write (PR #2378)

2023-03-07 Thread Colin Walters
I referenced this effort in https://marc.info/?l=linux-fsdevel=167794198604510=2 - my PoV is that the rpm-cow effort makes some sense. I thought a lot though about hard requiring reflinks for ostree though and determined it was not viable. There are too many people that use e.g. ext4. And

Re: OpenSSH: hardening hostkeys permissions

2023-03-02 Thread Colin Walters
On Thu, Dec 8, 2022, at 9:51 AM, Daniel P. Berrangé wrote: > I think the "Upgrade/compatibility impact" section ought to call out the > possible risk with config mgmt tools like puppet/ansible, that might be > managing SSH host keys and their permissions/ownership So that was done with: >

Re: An application to help find cloud images (in multiple clouds)

2023-02-09 Thread Colin Walters
On Tue, Jan 31, 2023, at 9:10 PM, Major Hayden wrote: > My team at Red Hat came up with the idea of a locator service that > would gather data from upstream locations (AWS, Azure, GCP, and > others), compile the image data into a common schema, and make it > available for API calls and a web

Re: Improving Fedora boot time when libvirt is installed

2023-01-20 Thread Colin Walters
b would be to scan if iscsi volumes are configured. If it >> finds configured ones, it would then issue "systemctl start --no-block >> iscsi.service" to enqueue a start job for the real thing. > > > Something like that was suggested last year, and Colin Walters objected,

Re: F38 proposal: Shorter Shutdown Timer (System-Wide Change proposal)

2023-01-12 Thread Colin Walters
On Thu, Dec 22, 2022, at 12:35 PM, Ben Cotton wrote: > https://fedoraproject.org/wiki/Changes/Shorter_Shutdown_Timer > > This document represents a proposed Change. As part of the Changes > process, proposals are publicly announced in order to receive > community feedback. This proposal will

Re: F38 proposal: Add Fedora Auto Firstboot Services to desktop variants (System-Wide Change proposal)

2022-12-09 Thread Colin Walters
On Fri, Dec 9, 2022, at 10:59 AM, Timothée Ravier wrote: > Using layering will also conflict / not interact well with the move to > container based ostree image in F38: > https://fedoraproject.org/wiki/Changes/OstreeNativeContainerStable (I'm only kind of following this thread and I agree we

Re: F38 proposal: Ostree Native Container (Phase 2, stable) (System-Wide Change proposal)

2022-12-01 Thread Colin Walters
On Wed, Nov 30, 2022, at 8:11 PM, Colin Walters wrote: > > BTW I wanted to give an update here specifically regarding the "dnf > image" bit - as of late, I've been working on a fresh new "bootc" CLI, > see https://github.com/ostreedev/ostree-rs-ext/pull/412 and

Re: F38 proposal: Ostree Native Container (Phase 2, stable) (System-Wide Change proposal)

2022-11-30 Thread Colin Walters
On Mon, Nov 21, 2022, at 10:20 AM, Jonathan Lebon wrote: > On Tue, Oct 25, 2022 at 12:43 PM Colin Walters wrote: >> - This proposal is explicitly trying to tie everything together. I think >> without the "bigger picture", it's actually *more* confusing. For

Re: Question about git signed tags

2022-11-29 Thread Colin Walters
On Tue, Nov 29, 2022, at 3:24 AM, Bob Hepple wrote: > Here's a question from one of my upstream devels. Not sure I understand > exactly what he's asking but I thought I'd post here in the hope that > someone can enlighten him (and me!). > > "... Arch supports signed git tags. I'm hoping Fedora

Re: F38 prospoal: Enable bootupd for Fedora Silverblue & Kinoite (Self-Contained Change proposal)

2022-11-21 Thread Colin Walters
On Mon, Nov 21, 2022, at 3:52 PM, Zbigniew Jędrzejewski-Szmek wrote: > In particular, two reasons why an upgrade might be interrupted were raised: > power being cut and the system crashing. Bootupd (or any other daemon) cannot > do much about crashes so this isn't a good motivation. For power,

Re: F38 prospoal: Enable bootupd for Fedora Silverblue & Kinoite (Self-Contained Change proposal)

2022-11-18 Thread Colin Walters
On Fri, Nov 18, 2022, at 12:35 PM, Timothée Ravier wrote: >> No, the install script install script in an RPM trigger, so the write is >> still carried out by RPM. >> >> I don't agree. Just because a user can mess with files on the system >> doesn't mean the rpmdb is a lie, nor is it reasonable

Re: F38 prospoal: Enable bootupd for Fedora Silverblue & Kinoite (Self-Contained Change proposal)

2022-11-15 Thread Colin Walters
On Tue, Nov 15, 2022, at 12:00 PM, Robbie Harwood wrote: > If your model doesn't permit the system to cease execution during > bootloader updates, then I'm not sure why you need bootupd at all - > traditional RPM updating will work just fine (assuming the A/B change > we've been talking about).

Re: F38 prospoal: Enable bootupd for Fedora Silverblue & Kinoite (Self-Contained Change proposal)

2022-11-15 Thread Colin Walters
On Fri, Nov 11, 2022, at 11:41 PM, Chris Murphy wrote: > On Thu, Nov 10, 2022, at 6:08 PM, Robbie Harwood wrote: >> Ben Cotton writes: >> >>> By design, ostree does not manage bootloader updates as they can not >>> (yet) happen in a transactional, atomic and safe fashion. >> >> As we've talked

Re: F38 proposal: Reproducible builds: Clamp build mtimes to $SOURCE_DATE_EPOCH (System-Wide Change proposal)

2022-11-11 Thread Colin Walters
On Fri, Nov 11, 2022, at 5:53 AM, Petr Pisar wrote: > > Wouldn't be easier to admit that timesamps are nonsense and simply eradicate > all of them stamps from various data formats rather than trying to fake them? > Simply changing rpmbuild to set timestamp to 0 for all contained files, or >

Re: F38 proposal: Ostree Native Container (Phase 2, stable) (System-Wide Change proposal)

2022-11-01 Thread Colin Walters
On Mon, Oct 31, 2022, at 5:14 PM, Matthew Miller wrote: > On Tue, Oct 25, 2022 at 09:00:40AM -0400, Colin Walters wrote: >> Two things: >> >> - This proposal is explicitly trying to tie everything together. I think >> without the "bigger picture", it's ac

Re: [Rpm-maint] [rpm-software-management/rpm] unreproducible `rpmdb.sqlite-shm` (Issue #2219)

2022-10-26 Thread Colin Walters
> The existence of .sqlite-shm is required for read-only WAL mode to work at > all (a very important use-case being queries by regular users), see > https://www.sqlite.org/wal.html#read_only_database I find this weird - because unprivileged code can't write directly to the database, what

Re: F38 proposal: Ostree Native Container (Phase 2, stable) (System-Wide Change proposal)

2022-10-25 Thread Colin Walters
On Mon, Oct 24, 2022, at 11:45 PM, Dusty Mabe wrote: > There are a lot of things going on in this proposal: > > - shipping editions as container images in quay https://pagure.io/releng/issue/11047 > - migrating existing users to the new container image based updates (No tracker yet) > -

Re: F38 proposal: Modernize Live Media (System-Wide Change proposal)

2022-10-19 Thread Colin Walters
On Tue, Oct 18, 2022, at 4:35 PM, Ben Cotton wrote: > https://fedoraproject.org/wiki/Changes/ModernizeLiveMedia Just for reference, today Fedora CoreOS uses a different implementation of this:

Re: F38 proposal: Ostree Native Container (Phase 2, stable) (System-Wide Change proposal)

2022-10-14 Thread Colin Walters
On Thu, Oct 13, 2022, at 3:08 PM, Ben Cotton wrote: > https://fedoraproject.org/wiki/Changes/OstreeNativeContainerStable I know there's a lot going on here, so I put together https://github.com/cgwalters/dnfimage-config as a demonstration system to show this all works today. (Though there's a

Re: status update on "ostree native containers"

2022-10-11 Thread Colin Walters
On Tue, Oct 11, 2022, at 4:22 PM, Micah Abbott wrote: > So I took a few hours here and there over the last few days to build a > small project using the ostree native container functionality. I wanted > to create a variant of Fedora CoreOS (FCOS) that has the Image Builder >

Re: Handle sysroot.readyonly=true migration in other rpm-ostree Fedora(s)

2022-10-11 Thread Colin Walters
On Mon, Oct 10, 2022, at 7:41 AM, Antonio Murdaca wrote: > Hi folks, in rpm-ostree based systems like fedora iot I would love to > handle the migration process similar to what happens today in > silverblue et all wrt sysroot.readonly >

[Rpm-maint] [rpm-software-management/rpm] unreproducible `rpmdb.sqlite-shm` (Issue #2219)

2022-10-04 Thread Colin Walters
This is a followup to https://github.com/rpm-software-management/rpm/commit/71456f2fc09900a027a33dc3d6d75c69a9b39488 which is about generating bit-for-bit reproducible images (container/disk) that include an RPM database. At the time, the person working on that PR was looking at RHEL8 (BDB

Re: [Virtio-fs] virtiofsd: Any reason why there's not an "openat2" sandbox mode?

2022-10-03 Thread Colin Walters
On Thu, Sep 29, 2022, at 1:03 PM, Vivek Goyal wrote: > > So rust version of virtiofsd, already supports running unprivileged > (inside a user namespace). I know, but as I already said, the use case here is running inside an OpenShift unprivileged pod where *we are already in a container*. >

Re: [Virtio-fs] virtiofsd: Any reason why there's not an "openat2" sandbox mode?

2022-10-03 Thread Colin Walters
On Thu, Sep 29, 2022, at 1:03 PM, Vivek Goyal wrote: > > So rust version of virtiofsd, already supports running unprivileged > (inside a user namespace). I know, but as I already said, the use case here is running inside an OpenShift unprivileged pod where *we are already in a container*. >

Re: [Virtio-fs] virtiofsd: Any reason why there's not an "openat2" sandbox mode?

2022-09-29 Thread Colin Walters
On Thu, Sep 29, 2022, at 10:10 AM, Vivek Goyal wrote: > What's your use case. How do you plan to use virtiofs. At the current time, the Kubernetes that we run does not support user namespaces. We want to do the production builds of our operating system (Fedora CoreOS and RHEL CoreOS) today

Re: [Virtio-fs] virtiofsd: Any reason why there's not an "openat2" sandbox mode?

2022-09-29 Thread Colin Walters
On Thu, Sep 29, 2022, at 10:10 AM, Vivek Goyal wrote: > What's your use case. How do you plan to use virtiofs. At the current time, the Kubernetes that we run does not support user namespaces. We want to do the production builds of our operating system (Fedora CoreOS and RHEL CoreOS) today

Re: [Virtio-fs] virtiofsd: Any reason why there's not an "openat2" sandbox mode?

2022-09-29 Thread Colin Walters
On Wed, Sep 28, 2022, at 3:28 PM, Vivek Goyal wrote: > Sounds reasonable. In fact, we could probably do someting similar > for "landlock" as well. Thanks for the discussion all! Can someone (vaguely) commit to look into this in say the next few months? It's not *urgent*, we can live with the

Re: [Virtio-fs] virtiofsd: Any reason why there's not an "openat2" sandbox mode?

2022-09-29 Thread Colin Walters
On Wed, Sep 28, 2022, at 3:28 PM, Vivek Goyal wrote: > Sounds reasonable. In fact, we could probably do someting similar > for "landlock" as well. Thanks for the discussion all! Can someone (vaguely) commit to look into this in say the next few months? It's not *urgent*, we can live with the

Re: status update on "ostree native containers"

2022-09-28 Thread Colin Walters
On Tue, Sep 27, 2022, at 6:08 PM, Colin Walters wrote: > We shipped https://fedoraproject.org/wiki/Changes/OstreeNativeContainer > in Fedora 36 and a lot has happened since then. Also, I should mention that we're planning to use this in OpenShift, see https://github.com/openshift/enhanc

Re: status update on "ostree native containers"

2022-09-28 Thread Colin Walters
On Wed, Sep 28, 2022, at 9:47 AM, Rahul Sundaram wrote: > FYI, the command in that page doesn't appear to be working because > "latest" is the default tag if you don't specify one for docker and it > doesn't exist, so you have to append ":stable" or something like that.

status update on "ostree native containers"

2022-09-27 Thread Colin Walters
We shipped https://fedoraproject.org/wiki/Changes/OstreeNativeContainer in Fedora 36 and a lot has happened since then. One of the biggest things is that rpm-ostree now knows how to intelligently generate reproducible "chunked" container images. I'll describe this by also highlighting

Re: [Virtio-fs] virtiofsd: Any reason why there's not an "openat2" sandbox mode?

2022-09-27 Thread Colin Walters
On Tue, Sep 27, 2022, at 1:27 PM, German Maglione wrote: > >> > Now all the development has moved to rust virtiofsd. Oh, awesome!! The code there looks great. > I could work on this for the next major version and see if anything breaks. > But I prefer to add this as a compilation feature,

Re: virtiofsd: Any reason why there's not an "openat2" sandbox mode?

2022-09-27 Thread Colin Walters
On Tue, Sep 27, 2022, at 1:27 PM, German Maglione wrote: > >> > Now all the development has moved to rust virtiofsd. Oh, awesome!! The code there looks great. > I could work on this for the next major version and see if anything breaks. > But I prefer to add this as a compilation feature,

virtiofsd: Any reason why there's not an "openat2" sandbox mode?

2022-09-09 Thread Colin Walters
We previously had a chat here https://lore.kernel.org/all/348d4774-bd5f-4832-bd7e-a21491fda...@www.fastmail.com/T/ around virtiofsd and privileges and the case of trying to run virtiofsd inside an unprivileged (Kubernetes) container. Right now we're still using 9p, and it has bugs (basically it

Re: Help packaging a "C" library written in Rust

2022-09-07 Thread Colin Walters
On Wed, Sep 7, 2022, at 5:35 AM, Richard W.M. Jones wrote: > It was pointed out on the bug that librsvg2 is in a similar situation. > The answer there was to bundle ("vendor") all the Rust dependencies > into the tarball. The command "cargo vendor" does this. > > For librsvg2 that's 278MB of

Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Colin Walters
On Mon, Aug 29, 2022, at 3:52 AM, Brian (bex) Exelbierd wrote: > I use Fedora IoT on GCPs free tier offering and it is fine. I a, > assuming `rpm-ostree install` doesn’t have this issue. It does have the issue. rpm-ostree links to libdnf which is doing all the same things. As I commented

Re: Fedora Sway OSTree Spin name

2022-08-13 Thread Colin Walters
On Fri, Aug 12, 2022, at 1:04 PM, Fabio Alessandro Locati wrote: > Hi, > > The Sway SIG is looking for ideas and opinions on the name for the Sway > OSTree spin. > You can read more at > https://fale.io/blog/2022/08/12/fedora-sway-ostree-spin-name Just my 2 cents: I still don't think the

Re: pre-change: lower printk setting after switching to real root

2022-07-21 Thread Colin Walters
On Tue, Jul 19, 2022, at 12:24 PM, Lennart Poettering wrote: > On Fr, 15.07.22 10:03, Colin Walters (walt...@verbum.org) wrote: > >> We recently did >> https://github.com/coreos/fedora-coreos-config/pull/1840 for Fedora >> CoreOS (more background: >> https://g

Re: Suggestion: Use a unified kernel image by default in the future.

2022-07-20 Thread Colin Walters
On Wed, Jul 20, 2022, at 4:44 AM, Gerd Hoffmann wrote: > Where does that build happen? Must be outside the kernel > rpm build process, so probably when generating the ostree? Exactly. We also run all %post scripts server side too for example. You can see the logs for this at e.g.

Re: pre-change: lower printk setting after switching to real root

2022-07-19 Thread Colin Walters
On Tue, Jul 19, 2022, at 12:24 PM, Lennart Poettering wrote: > > by something like this: > > > ExecStart=/usr/bin/systemd-tmpfiles --create - > StandardInputText=f /run/sysctl.d/01-coreos-printk.conf - - - - kernel.printk > 4 > > > Benefits: no shell, single process forked, no explicit

Re: Suggestion: Use a unified kernel image by default in the future.

2022-07-19 Thread Colin Walters
On Tue, Jul 19, 2022, at 10:15 AM, Gerd Hoffmann wrote: > > That is the big if. If you have the initrds. > > I've hacked up the kernel rpm to also build a initrd (targeting virtual > machines for starters) and shipping that as (optional) sub-rpm ... FWIW, every rpm-ostree based system defaults

pre-change: lower printk setting after switching to real root

2022-07-15 Thread Colin Walters
We recently did https://github.com/coreos/fedora-coreos-config/pull/1840 for Fedora CoreOS (more background: https://github.com/coreos/fedora-coreos-tracker/issues/1244 ) and I'd like to consider applying this to all Fedora editions. There'd be no impact on desktop systems (commonly installed

Re: F37 Change Proposal: Unfiltered Flathub (System-Wide Change)

2022-07-01 Thread Colin Walters
On Thu, Jun 30, 2022, at 10:23 AM, Michael Catanzaro wrote: > > Regardless, Fedora will still be RPM-based no matter what. ;) Even if > our future is OS images composed of RPMs plus Flatpaks composed by > RPMs, it's still based on RPMs. I don't think so. I think RPM is a tool, a technique

Re: F37 proposal: Install Using GPT on x86_64 BIOS by Default (System-Wide Change proposal)

2022-05-30 Thread Colin Walters
On Sun, May 29, 2022, at 6:55 AM, Peter Boy wrote: > > Fedora Server WG discussed the proposal and insists that the proposal > be deferred until Anaconda can install software raid on biosboot > systems with GPT (see > https://bugzilla.redhat.com/show_bug.cgi?id=2088113 and >

Re: F38 Change: Major upgrade of Microdnf (Self-Contained Change proposal)

2022-04-21 Thread Colin Walters
On Thu, Apr 21, 2022, at 7:19 AM, Zbigniew Jędrzejewski-Szmek wrote: > > - dnf-daemon would be dbus-activated and exit-on-idle after a suitable > timeout This is how rpm-ostree has worked for about 5 years now: https://github.com/coreos/rpm-ostree/pull/606 (Lots of useful references in that

Re: filesystems and year 2038

2022-04-05 Thread Colin Walters
On Tue, Apr 5, 2022, at 10:11 AM, Justin Forbes wrote: > > That list hasn't been edited in 5 years, but 256 bit inodes have been > the ext default for a very long time unless you specifically request > small. In current Fedora CoreOS we have 128 bit inodes for /boot, and this appears to be

Re: filesystems and year 2038

2022-04-05 Thread Colin Walters
On Mon, Apr 4, 2022, at 3:51 PM, Justin Forbes wrote: > On Mon, Apr 4, 2022 at 11:47 AM Colin Walters wrote: >> >> Hi, creating a thread on this from: >> https://github.com/coreos/fedora-coreos-config/pull/1650 >> >> Basically I'd propose that not just our def

filesystems and year 2038

2022-04-04 Thread Colin Walters
Hi, creating a thread on this from: https://github.com/coreos/fedora-coreos-config/pull/1650 Basically I'd propose that not just our default images have y2038-compatible filesystem setups, we ensure that if e.g. XFS is explicitly chosen for a Workstation installation then it is set up with

Re: RHEL moving to issues.redhat.com only long term

2022-03-10 Thread Colin Walters
On Mon, Mar 7, 2022, at 12:44 PM, Josh Boyer wrote: > Hi Fedora, CentOS, and EPEL Communities! > > As part of our continued 3 year major Red Hat Enterprise Linux release > cadence, RHEL 9 development is starting to wrap up with the spring > 2022 release coming soon. That means planning for the

Re: Landing a larger-than-release change (distrusting SHA-1 signatures)

2022-03-08 Thread Colin Walters
On Tue, Mar 8, 2022, at 1:40 PM, Alexander Sosedkin wrote: > > But these are all rather... crude? > Sure there should be better ways, > preferably something explored before. One general technique I like is the "warn and sleep" approach; example: https://github.com/coreos/rpm-ostree/pull/2098

Re: s390x KOJI builders issue

2022-03-04 Thread Colin Walters
On Thu, Mar 3, 2022, at 4:25 PM, Colin Walters wrote: > On Wed, Mar 2, 2022, at 7:04 PM, Kevin Fenzi wrote: > >> * OOm killer looks and says... oh hey, I need to kill something. This >> kojid process/slice is taking up all the memory. >> * kojid is killed. > >

Re: s390x KOJI builders issue

2022-03-03 Thread Colin Walters
On Wed, Mar 2, 2022, at 7:04 PM, Kevin Fenzi wrote: > * OOm killer looks and says... oh hey, I need to kill something. This > kojid process/slice is taking up all the memory. > * kojid is killed. If we replaced Koji's backend with Kubernetes (at least my employer's production way to run Linux

Re: Is NetworkManager-wait-online.service necessary by default?

2022-02-24 Thread Colin Walters
On Thu, Feb 24, 2022, at 6:17 AM, Benjamin Berg wrote: > network-online-waitonly.target with > After=network-online.target > StopWhenUnneeded=yes > > which is then used inside iscsi.service > ExecStartPre=/usr/bin/systemctl start network-online-waitonly.target No, avoid such things

Re: F37 Change: Enable read only /sysroot for Fedora Silverblue & Kinoite (Self-Contained Change proposal)

2022-02-16 Thread Colin Walters
On Wed, Feb 16, 2022, at 12:48 PM, Stephen Snow wrote: > On Wed, 2022-02-16 at 12:12 -0500, Ben Cotton wrote: >> https://fedoraproject.org/wiki/Changes/Silverblue_Kinoite_readonly_sysroot >> >> == Summary == >> >> This change is about enabling an opt-in ostree feature that re-mounts >>

Re: F36 Change: Authselect: Move State Files to /etc (Self-Contained Change proposal)

2022-01-19 Thread Colin Walters
On Wed, Jan 19, 2022, at 10:25 AM, Neal Gompa wrote: > > I agree, I think it should move to /usr/lib/sysimage/authselect instead. That would break the use case of running it on an image based (i.e. readonly /usr) system *client side*. We settled on having it in /etc in

Re: F36 Change: Silverblue and Kinoite will have /var on its own Btrfs subvolume (Self-Contained Change proposal)

2022-01-19 Thread Colin Walters
On Wed, Jan 19, 2022, at 6:38 AM, Neal Gompa wrote: > On Wed, Jan 19, 2022 at 6:05 AM Casey Jao via devel > wrote: >> >> Doesn't rpm-ostree already provide transactional, image-based updates >> without the use of filesystem snapshots? In addition, roofs snapshots are >> only really useful if

Re: Workflow and other problems with the Fedora container infrastructure

2022-01-16 Thread Colin Walters
On Thu, Jan 13, 2022, at 1:48 PM, Kevin Fenzi wrote: > > > Perhaps the Fedora CoreOS folks would have some thoughts? I can't speak for the whole team, but a few points. First, the FCOS build tooling in https://github.com/coreos/coreos-assembler is designed to run as a standard container. In

Re: New top-level dir: /state [WAS: Re: F36 Change: Relocate RPM database to /usr (System-Wide Change] proposal)

2022-01-14 Thread Colin Walters
On Thu, Jan 13, 2022, at 6:05 PM, Fabio Valentini wrote: > The path "/usr/lib/sysimage/rpm" does look very out-of-place in > non-image-based systems, so *if* we want to move the rpmdb to a place > that's consistent across all our Editions, it should also be a > location name that makes sense

Re: New top-level dir: /state [WAS: Re: F36 Change: Relocate RPM database to /usr (System-Wide Change] proposal)

2022-01-14 Thread Colin Walters
On Fri, Jan 14, 2022, at 2:46 AM, Chris Murphy wrote: > > What about /var/lib/selinux? It's owned by the selinux-policy-targeted > package. Even though the files may not change often, it probably needs > to be snapshot and rolled back with revision matching for /usr and > rpmdb. Yep, welcome

Re: New top-level dir: /state [WAS: Re: F36 Change: Relocate RPM database to /usr (System-Wide Change] proposal)

2022-01-13 Thread Colin Walters
On Thu, Jan 13, 2022, at 7:52 AM, Vít Ondruch wrote: > Actually, shouldn't rpm-ostree carry around some copy of the RPM > database, which would describe the state of /usr and once the update is > successful (or snapshot active?), merge it into the main system RPM > database? Apparently,

Re: New top-level dir: /state [WAS: Re: F36 Change: Relocate RPM database to /usr (System-Wide Change] proposal)

2022-01-12 Thread Colin Walters
On Wed, Jan 12, 2022, at 4:04 AM, Panu Matilainen wrote: > > Here seems to be another SMALL undocumented dependency of this change: > completing the /usrmove thing to cover the whole world including /opt, > /etc, /var, and presumably /boot as well because packages put stuff in it. There are

Re: /opt [WAS: Re: New top-level dir]

2022-01-12 Thread Colin Walters
On Wed, Jan 12, 2022, at 4:05 AM, Zbigniew Jędrzejewski-Szmek wrote: > On Mon, Jan 10, 2022 at 02:53:52PM -0700, Chris Murphy wrote: >> Should /usr be independently portable? And is that with a version >> matched /opt, or can there be mix and match revisions of /usr and >> /opt? > > We have

Re: /opt [WAS: Re: New top-level dir]

2022-01-12 Thread Colin Walters
On Wed, Jan 12, 2022, at 4:24 AM, Panu Matilainen wrote: > > Oh, right. More hidden agenda behind this thing. When looking at it with > these glasses on, it explains quite a few things about the change > proposal, such as completely ignoring the fact that nearly all packages > put something

Re: New top-level dir: /state [WAS: Re: F36 Change: Relocate RPM database to /usr (System-Wide Change] proposal)

2022-01-11 Thread Colin Walters
On Tue, Jan 11, 2022, at 4:00 AM, Panu Matilainen wrote: > The point was though, that the rpmdb is not at all the only data of this > kind and so having a dedicated home makes sense. You mentioned dnf/yum/PackageKit data; there's two kinds of that. One is e.g. /var/cache/dnf which does

Re: New top-level dir: /state [WAS: Re: F36 Change: Relocate RPM database to /usr (System-Wide Change] proposal)

2022-01-10 Thread Colin Walters
On Mon, Jan 10, 2022, at 11:19 AM, David Cantrell wrote: > On Wed, Dec 29, 2021 at 10:01:57AM -0500, Ben Cotton wrote: >>https://fedoraproject.org/wiki/Changes/RelocateRPMToUsr >> >>== Summary == >>Currently, the RPM databases is located in `/var`. Let's move it to >>`/usr`. The move is already

Re: F36 Change: DIGLIM (System-Wide Change proposal)

2022-01-07 Thread Colin Walters
Hi Kevin, On Mon, Dec 27, 2021, at 11:50 AM, Kevin Kofler via devel wrote: > > But being allowed to run custom or self-developed software is a core feature > of Free Software. If that stops working in the name of "security", Fedora is > no better than iOS (where Apple also claims the

Re: F36 Change proposal: No ifcfg by default (Self-Contained Change)

2022-01-05 Thread Colin Walters
I don't think we need to go too deep on this cloud-init vs Ignition thread; but you have a great message here and I just want to clarify some points, everything else you said here is fair/accurate/relevant from my PoV. On Wed, Jan 5, 2022, at 10:41 AM, David Duncan wrote: > In most of those >

Re: F36 Change proposal: No ifcfg by default (Self-Contained Change)

2022-01-05 Thread Colin Walters
On Wed, Jan 5, 2022, at 9:05 AM, Ben Cotton wrote: > https://fedoraproject.org/wiki/Changes/NoIfcfgFiles > > == Summary == > Do not not include NetworkManager support for legacy network > configuration files by in new installations. It'd be nice to note this Change is actually just doing for

Re: F36 Change proposal: No ifcfg by default (Self-Contained Change)

2022-01-05 Thread Colin Walters
On Wed, Jan 5, 2022, at 9:22 AM, Neal Gompa wrote: > > There are none. Ignition deliberately cannot configure the network, This is not true. https://docs.fedoraproject.org/en-US/fedora-coreos/sysconfig-network-configuration/#_via_ignition > and as a CoreOS tool, it is incapable of

Re: [Rpm-maint] RFC: Relocate RPM and DNF databases to /usr

2022-01-03 Thread Colin Walters
On Mon, Jan 3, 2022, at 2:44 AM, Panu Matilainen wrote: > On 12/16/21 16:41, Colin Walters wrote: > >> I didn't wake up one day and say "hey you know what, today I'm going to move >> the rpm database just for fun". Neither, for that matter did the OpenSUS

Re: F36 Change: Relocate RPM database to /usr (System-Wide Change proposal)

2022-01-03 Thread Colin Walters
For the record, I obviously support this change. Responding to a few threads: On Wed, Dec 29, 2021, at 10:16 AM, Peter Robinson wrote: > How does this work on RO /usr files systems? I thought data in /usr > was supposed to be static/ It works for rpm-ostree because it's > updated at tree

Re: F36 Change: Make Authselect Mandatory (System-Wide Change proposal)

2021-12-20 Thread Colin Walters
On Tue, Oct 12, 2021, at 11:32 AM, Ben Cotton wrote: > https://fedoraproject.org/wiki/Changes/Make_Authselect_Mandatory Just to raise the visibility here, this currently breaks all ostree-based systems (*again*): https://bugzilla.redhat.com/show_bug.cgi?id=2019052#c1

Re: About how Go is updated in Fedora

2021-12-20 Thread Colin Walters
On Sat, Dec 18, 2021, at 5:06 PM, Fabio Valentini wrote: > > Sure, I saw that ticket. But I fail to see how this is this a "new problem". > If you use, for example, some shiny, new features that are only going > to be in GCC 12 or LLVM 14, There's a *big* difference between Go and C/C++/Rust

Re: [Rpm-maint] RFC: Relocate RPM and DNF databases to /usr

2021-12-16 Thread Colin Walters
On Wed, Dec 15, 2021, at 5:34 PM, Florian Weimer wrote: > * Chris Murphy: > >> Fedora 36 seems like a good time to do this. What do you think? > > It's a bit odd to locate a database under /usr that isn't pre-built and > installed. Why is that odd? > I guess in theory there could be

Re: [Rpm-ecosystem] [Rpm-maint] RFC: Relocate RPM and DNF databases to /usr

2021-12-16 Thread Colin Walters
On Wed, Dec 15, 2021, at 5:34 PM, Florian Weimer wrote: > * Chris Murphy: > >> Fedora 36 seems like a good time to do this. What do you think? > > It's a bit odd to locate a database under /usr that isn't pre-built and > installed. Why is that odd? > I guess in theory there could be

Re: F36 Change: Enable fs-verity in RPM (System-Wide Change proposal)

2021-12-15 Thread Colin Walters
On Mon, Dec 13, 2021, at 5:21 PM, Tom Stellard wrote: > > Did you test the impact this has on package build times? Particularly > packages like llvm, clang, webkit2gtk3, etc. that have very large > debuginfo files? I think far too often the culture here is "make $change for all RPMs". But

Re: F36 Change: Enable fs-verity in RPM (System-Wide Change proposal)

2021-12-15 Thread Colin Walters
On Wed, Dec 15, 2021, at 1:45 PM, Luca Boccassi wrote: >> On Fri, Dec 10, 2021 at 10:47:52AM +0100, Vít Ondruch wrote: >> >> Any file covered by fs-verity is immutable after installation. So you >> cannot modify the contents, the kernel refuses. But you can just >> replace the file (like during

Re: [Rpm-maint] RFC: Relocate RPM and DNF databases to /usr

2021-12-14 Thread Colin Walters
On Thu, Dec 9, 2021, at 10:11 AM, Chris Murphy wrote: >> The change is not so simple. It is not only the movement of files from one >> location to another one. We store more types of data in that location - >> history database (sqlite), module failsafe data (yamls). In future we will >>

Re: [Rpm-ecosystem] RFC: Relocate RPM and DNF databases to /usr

2021-12-14 Thread Colin Walters
On Thu, Dec 9, 2021, at 10:11 AM, Chris Murphy wrote: >> The change is not so simple. It is not only the movement of files from one >> location to another one. We store more types of data in that location - >> history database (sqlite), module failsafe data (yamls). In future we will >>

  1   2   3   4   5   6   7   8   9   10   >