Re: Half-OT: Secure boot and thirdy party kernel modules

2014-07-06 Thread Florian Weimer

On 07/06/2014 07:10 PM, Sergio Belkin wrote:

So, the question is: Is it worth signing "my own" kernel?


Only if you keep your own key on a sufficiently separated machine, 
otherwise it's equivalent to disabling Secure Boot anyway.


It's also not clear if the Virtualbox kernel modules themselves are 
capable of bypassing Secure Boot, so the entire effort might be futile 
for this reason as well.


Note that Microsoft's current policy may not allow unrestricted 
virtualization (KVM or Virtualbox—does not matter) because that "permits 
launch of another operating system instance after execution of 
unauthenticated code"—the wording is rather unclear.  If Microsoft 
clarifies that this is forbidden, a future Fedora update will remove 
this functionality, so you will be forced to disable Secure Boot at this 
point anyway if you want to continue to use virtualization.


--
Florian Weimer / Red Hat Product Security
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

easy review: abduco

2014-07-06 Thread Igor Gnatenko
Hi,

I've just submitted[0] abduco package for review. Because program is small
I think review should take minimal time. Please review it.


[0]https://bugzilla.redhat.com/show_bug.cgi?id=1116653
-- 
-Igor Gnatenko



signature.asc
Description: This is a digitally signed message part
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Half-OT: Secure boot and thirdy party kernel modules

2014-07-06 Thread Matthew Garrett
On Sun, Jul 06, 2014 at 02:10:45PM -0300, Sergio Belkin wrote:

> I've found that Oracle VirtualBox kernel module are not signed so I have to
> disable secure boot. Oracle says that is not a VirtualBox bug. And Fedora
> cannot sign it because of license, can it?

Correct. You can generate your own key, enroll it with mokutil and 
then sign the modules with that key.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Half-OT: Secure boot and thirdy party kernel modules

2014-07-06 Thread Sergio Belkin
Hi Fedora folks,

I've found that Oracle VirtualBox kernel module are not signed so I have to
disable secure boot. Oracle says that is not a VirtualBox bug. And Fedora
cannot sign it because of license, can it?

So, the question is: Is it worth signing "my own" kernel? Of course I can
circunvent this problem simply by disabling secureboot... what do you
think, is there a simple way of doing that, or should I spend a weekend
doing all of it?

I've found this:
http://www.linuxfoundation.org/news-media/blogs/browse/2013/09/booting-self-signed-linux-kernel

Can I sign only the virtualbox kernel module, or should I recompile the
entire kernel and sign it?

Thanks in advance!

-- 
--
Sergio Belkin  http://www.sergiobelkin.com
LPIC-2 Certified - http://www.lpi.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Till Maas
On Sun, Jul 06, 2014 at 01:41:08PM +0200, Sandro Mani wrote:
> 
> On 06.07.2014 13:38, drago01 wrote:
> >On Sun, Jul 6, 2014 at 1:04 PM, Till Maas  wrote:

> >>| 301   os.chdir("/")
> >>| 302   shutil.rmtree(os.getcwd())
> >Ouch ... can we ban this guy from Fedora?
> This is a bit dramatic. I really sincerely apologize for this and please
> realize that I wrote this with the best intentions. I've fixed the issue...

Thank you for taking care of it so fast.

Kind regards
Till
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Sandro Mani


On 06.07.2014 13:59, Reindl Harald wrote:

Am 06.07.2014 13:51, schrieb Sandro Mani:

On 06.07.2014 13:48, Reindl Harald wrote:

Am 06.07.2014 13:41, schrieb Sandro Mani:

On 06.07.2014 13:38, drago01 wrote:

On Sun, Jul 6, 2014 at 1:04 PM, Till Maas  wrote:

On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:


* A script automating most of the process of validating and processing the
request can be found at

https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py

Do not run this script, because it contains malicious code that
might remove all files from your system! The code can be found in lines
301-302:

| 301   os.chdir("/")
| 302   shutil.rmtree(os.getcwd())

Ouch ... can we ban this guy from Fedora?

This is a bit dramatic. I really sincerely apologize for this and please
realize that I wrote this with the best
intentions. I've fixed the issue...

how can a "rm -rf currentdir" happen by accident?
and that combined with make / to the current dir?

line 302 is a no-go in general
line 301 before that smells like intention

i can't imagine that two lines together happen by mistake


It was a line ordering issue.
The cwd before that call was the temporary directory.
Please trust me, I really feel bad about this, and will never again push code
which  was written late at night.
Again, I really apologize

accepted - but "shutil.rmtree(os.getcwd())" is in general not a line ordering 
issue
it's  from a developers perspective because it leads *always* to 
unpredictable
behavior if the "chdir" fails for whatever reason, be it a typo, wrong 
permissions
somewhere or SELinux comes in place

that's horrible dangerous in any context

Fully accepted, and trust me, I fully realize how utterly stupid the 
code was. I probably was just over-eager to get the script done and go 
to bed. I just really hope that I did not cause any loss of data to anyone.


--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread drago01
On Sun, Jul 6, 2014 at 1:41 PM, Sandro Mani  wrote:
>
> On 06.07.2014 13:38, drago01 wrote:
>>
>> On Sun, Jul 6, 2014 at 1:04 PM, Till Maas  wrote:
>>>
>>> On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:
>>>
   * A script automating most of the process of validating and processing
 the
 request can be found at


 https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py
>>>
>>> Do not run this script, because it contains malicious code that
>>> might remove all files from your system! The code can be found in lines
>>> 301-302:
>>>
>>> | 301   os.chdir("/")
>>> | 302   shutil.rmtree(os.getcwd())
>>
>> Ouch ... can we ban this guy from Fedora?
>
> This is a bit dramatic. I really sincerely apologize for this and please
> realize that I wrote this with the best intentions. I've fixed the issue...

OK that was indeed a bit premature I should have waited for you to
respond before drawing any conclusions.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: FEVer or?

2014-07-06 Thread Haïkel
2014-07-06 13:59 GMT+02:00 Conrad Meyer :
> Hi lazy-list,
>
> Back in the day, there was FEver for monitoring new upstream
> releases. Is that still what we use, or is there a new thing
> now? And where does it live? Cursory googling failed to
> locate it.
>

It's called cnucnu
All details here: http://fedoraproject.org/wiki/Upstream_release_monitoring

Regards,
H.

> Thanks,
> Conrad
> --
> devel mailing list
> devel@lists.fedoraproject.org
> https://admin.fedoraproject.org/mailman/listinfo/devel
> Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: FEVer or?

2014-07-06 Thread Christopher Meng
Put this in the bookmarks:

https://fedoraproject.org/wiki/Upstream_release_monitoring
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Haïkel
2014-07-06 13:51 GMT+02:00 Sandro Mani :
>
> It was a line ordering issue.
> The cwd before that call was the temporary directory.
> Please trust me, I really feel bad about this, and will never again push
> code which was written late at night. Again, I really apologize.
>

Sounds likely, I was more worried that your credentials were stolen.

@everyone mistakes *happen*, don't be hasty
http://fedoraproject.org/en/code-of-conduct

This stresses the importance of code review, and not running code that
has been reviewed once.

best regards,
H.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Reindl Harald

Am 06.07.2014 13:51, schrieb Sandro Mani:
> On 06.07.2014 13:48, Reindl Harald wrote:
>>
>> Am 06.07.2014 13:41, schrieb Sandro Mani:
>>> On 06.07.2014 13:38, drago01 wrote:
 On Sun, Jul 6, 2014 at 1:04 PM, Till Maas  wrote:
> On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:
>
>>* A script automating most of the process of validating and 
>> processing the
>> request can be found at
>>
>> https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py
> Do not run this script, because it contains malicious code that
> might remove all files from your system! The code can be found in lines
> 301-302:
>
> | 301   os.chdir("/")
> | 302   shutil.rmtree(os.getcwd())
 Ouch ... can we ban this guy from Fedora?
>>> This is a bit dramatic. I really sincerely apologize for this and please
>>> realize that I wrote this with the best
>>> intentions. I've fixed the issue...
>> how can a "rm -rf currentdir" happen by accident?
>> and that combined with make / to the current dir?
>>
>> line 302 is a no-go in general
>> line 301 before that smells like intention
>>
>> i can't imagine that two lines together happen by mistake
>>
> It was a line ordering issue.
> The cwd before that call was the temporary directory.
> Please trust me, I really feel bad about this, and will never again push code 
> which  was written late at night.
> Again, I really apologize

accepted - but "shutil.rmtree(os.getcwd())" is in general not a line ordering 
issue
it's  from a developers perspective because it leads *always* to 
unpredictable
behavior if the "chdir" fails for whatever reason, be it a typo, wrong 
permissions
somewhere or SELinux comes in place

that's horrible dangerous in any context




signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

FEVer or?

2014-07-06 Thread Conrad Meyer
Hi lazy-list,

Back in the day, there was FEver for monitoring new upstream
releases. Is that still what we use, or is there a new thing
now? And where does it live? Cursory googling failed to
locate it.

Thanks,
Conrad
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code (was: Re: [Announce] Simple Patch Policy)

2014-07-06 Thread drago01
On Sun, Jul 6, 2014 at 1:54 PM, Christopher Meng  wrote:
> On Sun, Jul 6, 2014 at 7:38 PM, drago01  wrote:
>> On Sun, Jul 6, 2014 at 1:04 PM, Till Maas  wrote:
>>> On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:
>>>
  * A script automating most of the process of validating and processing the
 request can be found at

 https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py
>>>
>>> Do not run this script, because it contains malicious code that
>>> might remove all files from your system! The code can be found in lines
>>> 301-302:
>>>
>>> | 301   os.chdir("/")
>>> | 302   shutil.rmtree(os.getcwd())
>>
>> Ouch ... can we ban this guy from Fedora?
>
> Why it's considered as "simple"? I couldn't find it behind.

I can't parse that.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code (was: Re: [Announce] Simple Patch Policy)

2014-07-06 Thread Christopher Meng
On Sun, Jul 6, 2014 at 7:38 PM, drago01  wrote:
> On Sun, Jul 6, 2014 at 1:04 PM, Till Maas  wrote:
>> On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:
>>
>>>  * A script automating most of the process of validating and processing the
>>> request can be found at
>>>
>>> https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py
>>
>> Do not run this script, because it contains malicious code that
>> might remove all files from your system! The code can be found in lines
>> 301-302:
>>
>> | 301   os.chdir("/")
>> | 302   shutil.rmtree(os.getcwd())
>
> Ouch ... can we ban this guy from Fedora?

Why it's considered as "simple"? I couldn't find it behind.

Yours sincerely,
Christopher Meng

Noob here.

http://cicku.me
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Sandro Mani


On 06.07.2014 13:48, Reindl Harald wrote:


Am 06.07.2014 13:41, schrieb Sandro Mani:

On 06.07.2014 13:38, drago01 wrote:

On Sun, Jul 6, 2014 at 1:04 PM, Till Maas  wrote:

On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:


   * A script automating most of the process of validating and processing the
request can be found at

https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py

Do not run this script, because it contains malicious code that
might remove all files from your system! The code can be found in lines
301-302:

| 301   os.chdir("/")
| 302   shutil.rmtree(os.getcwd())

Ouch ... can we ban this guy from Fedora?

This is a bit dramatic. I really sincerely apologize for this and please
realize that I wrote this with the best
intentions. I've fixed the issue...

how can a "rm -rf currentdir" happen by accident?
and that combined with make / to the current dir?

line 302 is a no-go in general
line 301 before that smells like intention

i can't imagine that two lines together happen by mistake


It was a line ordering issue.
The cwd before that call was the temporary directory.
Please trust me, I really feel bad about this, and will never again push 
code which was written late at night. Again, I really apologize.



--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Sandro Mani


On 06.07.2014 13:46, Igor Gnatenko wrote:

Hi,
On Sun, Jul 6, 2014 at 3:41 PM, Sandro Mani  wrote:

On 06.07.2014 13:38, drago01 wrote:

On Sun, Jul 6, 2014 at 1:04 PM, Till Maas  wrote:

On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:


   * A script automating most of the process of validating and processing
the
request can be found at


https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py

Do not run this script, because it contains malicious code that
might remove all files from your system! The code can be found in lines
301-302:

| 301   os.chdir("/")
| 302   shutil.rmtree(os.getcwd())

Ouch ... can we ban this guy from Fedora?

This is a bit dramatic. I really sincerely apologize for this and please
realize that I wrote this with the best intentions. I've fixed the issue...

Seems that you have NOT fixed issue.
--
-Igor Gnatenko

I pushed one second ago...

--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Reindl Harald


Am 06.07.2014 13:41, schrieb Sandro Mani:
> On 06.07.2014 13:38, drago01 wrote:
>> On Sun, Jul 6, 2014 at 1:04 PM, Till Maas  wrote:
>>> On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:
>>>
   * A script automating most of the process of validating and processing 
 the
 request can be found at

 https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py
>>> Do not run this script, because it contains malicious code that
>>> might remove all files from your system! The code can be found in lines
>>> 301-302:
>>>
>>> | 301   os.chdir("/")
>>> | 302   shutil.rmtree(os.getcwd())
>> Ouch ... can we ban this guy from Fedora?
>
> This is a bit dramatic. I really sincerely apologize for this and please 
> realize that I wrote this with the best
> intentions. I've fixed the issue...

how can a "rm -rf currentdir" happen by accident?
and that combined with make / to the current dir?

line 302 is a no-go in general
line 301 before that smells like intention

i can't imagine that two lines together happen by mistake



signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Igor Gnatenko
Hi,
On Sun, Jul 6, 2014 at 3:41 PM, Sandro Mani  wrote:
>
> On 06.07.2014 13:38, drago01 wrote:
>>
>> On Sun, Jul 6, 2014 at 1:04 PM, Till Maas  wrote:
>>>
>>> On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:
>>>
   * A script automating most of the process of validating and processing
 the
 request can be found at


 https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py
>>>
>>> Do not run this script, because it contains malicious code that
>>> might remove all files from your system! The code can be found in lines
>>> 301-302:
>>>
>>> | 301   os.chdir("/")
>>> | 302   shutil.rmtree(os.getcwd())
>>
>> Ouch ... can we ban this guy from Fedora?
>
> This is a bit dramatic. I really sincerely apologize for this and please
> realize that I wrote this with the best intentions. I've fixed the issue...
Seems that you have NOT fixed issue.
--
-Igor Gnatenko
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Sandro Mani


On 06.07.2014 13:38, drago01 wrote:

On Sun, Jul 6, 2014 at 1:04 PM, Till Maas  wrote:

On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:


  * A script automating most of the process of validating and processing the
request can be found at

https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py

Do not run this script, because it contains malicious code that
might remove all files from your system! The code can be found in lines
301-302:

| 301   os.chdir("/")
| 302   shutil.rmtree(os.getcwd())

Ouch ... can we ban this guy from Fedora?
This is a bit dramatic. I really sincerely apologize for this and please 
realize that I wrote this with the best intentions. I've fixed the issue...


--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code (was: Re: [Announce] Simple Patch Policy)

2014-07-06 Thread drago01
On Sun, Jul 6, 2014 at 1:04 PM, Till Maas  wrote:
> On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:
>
>>  * A script automating most of the process of validating and processing the
>> request can be found at
>>
>> https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py
>
> Do not run this script, because it contains malicious code that
> might remove all files from your system! The code can be found in lines
> 301-302:
>
> | 301   os.chdir("/")
> | 302   shutil.rmtree(os.getcwd())

Ouch ... can we ban this guy from Fedora?
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

WARNING: malicious code (was: Re: [Announce] Simple Patch Policy)

2014-07-06 Thread Till Maas
On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:

>  * A script automating most of the process of validating and processing the
> request can be found at
> 
> https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py

Do not run this script, because it contains malicious code that
might remove all files from your system! The code can be found in lines
301-302:

| 301   os.chdir("/")
| 302   shutil.rmtree(os.getcwd())

Kind regards
Till
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Package reviev : tayga

2014-07-06 Thread William

After some review in bugzilla, some progress from me, some time to
collect dust I have once again turned to look at getting tayga into
fedora.

https://bugzilla.redhat.com/show_bug.cgi?id=1028206

https://copr.fedoraproject.org/coprs/firstyear/tayga/

Any help and advice is appreciated!

-- 
William 


signature.asc
Description: This is a digitally signed message part
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: fedora-release-$PRODUCT, /etc/issue, /etc/os-release, Per-Product Configs and more!

2014-07-06 Thread William
On Thu, 2014-07-03 at 10:05 -0400, Josh Boyer wrote:
> On Thu, Jul 3, 2014 at 9:57 AM, Stephen Gallagher  wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA1
> >
> > On 07/03/2014 01:42 AM, William wrote:
> >> On Wed, 2014-07-02 at 20:40 -0700, Samuel Sieb wrote:
> >>> On 07/02/2014 06:55 PM, William wrote:
> 
> > First of all, I'd like to formally propose that each of the
> > products will have a fedora-release-$PRODUCT (and
> > corresponding generic-release-$PRODUCT) package. This package
> > will meet several needs (with magical hand-waving in this
> > initial email).
> 
>  How will this work with fedup from 20 to 21? Will there be
>  multiple upgrade targets?
> 
> >>> Why would that be necessary?  All packages are in one repository,
> >>> so fedora-release-$PRODUCT will be upgraded to the next version
> >>> and everything will be fine.
> >>
> >> My machine doesn't currently have a fedora-release-$PRODUCT
> >> package installed. So how will fedup work out what one to put on my
> >> system? Will these packages be added to 20, and the user need to
> >> preinstall before fedup?
> >>
> >
> > It won't put one on your system. Upgrades from a non-Productized
> > Fedora will remain non-Productized. It's not *less* Fedora than before.
> >
> > The Products are basically a statement that "this minimal set of
> > packages and services are available on the system". A non-productized
> > Fedora install is essentially just a continuation of the classic
> > do-it-yourself approach that Fedora has been up to this point.
> 
> That's misleading.  Fedora hasn't been releasing "do-it-yourself"
> releases.  Our previous install images were composed and tested by QA,
> including testing fedup upgrades from the previous release.  With
> Fedora.next, we don't have an install image that is an equivalent of
> <= F20.
> 
> Perhaps I have missed them, but I've seen no discussion or plans
> around testing upgrades to F21 from F20.  Unless the Products intend
> to test upgrading from F20, and/or QA intends to somehow test fedup
> from F20 to F21 in a non-product manner, we're essentially changing
> the semantics of upgrades.  I agree it should still work, but saying
> it's a continuation of existing practice when it isn't is wrong.
> 
> josh


It's also misleading given how much focus has been given to the three
new products that will be released: So why now is there a
"non-productised" version? That's not been advertised much.

I think that some attention needs to be paid to the F20 -> F21 upgrade
path, and it shouldn't be left to the last minute. Do you need to choose
a product via fedup at upgrade time? Do you support a non-productised
version? 
-- 
William 

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct