Re: F27 System Wide Change: Kerberos KCM credential cache by default

2017-06-20 Thread Jakub Hrozek
On Wed, Jun 21, 2017 at 08:23:10AM +0200, Jakub Hrozek wrote:
> On Tue, Jun 20, 2017 at 04:23:30PM -0400, Daniel Walsh wrote:
> > On 06/20/2017 02:45 PM, Jakub Hrozek wrote:
> > > On Tue, Jun 20, 2017 at 08:55:49AM -0400, Daniel Walsh wrote:
> > > > On 06/20/2017 04:21 AM, Jakub Hrozek wrote:
> > > > > On Tue, Jun 20, 2017 at 09:25:49AM +0200, Pavel Cahyna wrote:
> > > > > > Hi,
> > > > > > 
> > > > > > On Tue, Jun 20, 2017 at 07:42:27AM +0200, Jan Kurik wrote:
> > > > > > > = System Wide Change: Kerberos KCM credential cache by default =
> > > > > > > https://fedoraproject.org/wiki/Changes/KerberosKCMCache
> > > > > > "The design is described in more detail on the SSSD wiki."
> > > > > > 
> > > > > > It is not, the link redirects to a page about fedorahosted.org
> > > > > > retirement.
> > > > > Sorry, your are right, I fixed the link (this feature was submitted
> > > > > during f-26 timeframe when fh.o was still up and I forgot to change 
> > > > > the
> > > > > links when I re-submitted the feature..)
> > > > > 
> > > > > The correct link is:
> > > > >   https://docs.pagure.org/SSSD.sssd/design_pages/kcm.html
> > > > > 
> > > > > > > Change owner(s):
> > > > > > > * Jakub Hrozek 
> > > > > > > 
> > > > > > > Default to a new Kerberos credential cache type called KCM which 
> > > > > > > is
> > > > > > > better suited for containerized environments and provides a better
> > > > > > > user experience in the general case as well.
> > > > > > I wonder what is the relation to the daemon of the same name ansd
> > > > > > similar purpose distributed with Heimdal
> > > > > > http://h5l.org/manual/HEAD/info/heimdal/Credential-cache-server-_002d-KCM.html.
> > > > > > Will they be compatible?
> > > > > Yes, more or less. The wire protocol is the same and I used MIT client
> > > > > libraries with Heimdal server bit during development. Not all server
> > > > > commands are implemented, only the subset that MIT client implements.
> > > > > 
> > > > > There are some features supported by Heimdal but not supported yet by 
> > > > > SSSD's
> > > > > KCM, like renewals, but those will be added. There are some features 
> > > > > we
> > > > > chose to explicitly not add (or not enable by default), like listing 
> > > > > all
> > > > > ccaches known to KCM server by root.
> > > > > 
> > > > > Hopefully the sssd upstream design page would help..
> > > > > 
> > > > > > Will code be shared?
> > > > > No, the Heimdal deamon relies on internal Heimdal API quite a bit. We
> > > > > also want to support multiple 'storage back ends' for the ccaches, 
> > > > > while
> > > > > Heimdal only stores the ccaches in memory.
> > > > > ___
> > > > > devel mailing list -- devel@lists.fedoraproject.org
> > > > > To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> > > > How will I access this feature inside of a container?
> > > Bind-mount the KCM server socket into the container.
> > > 
> > > > If there is a leaked
> > > > socket into the container, what kind of access control is built into 
> > > > your
> > > > server to prevent root inside of one container effecting/accessing the
> > > > credentials of different containers?
> > > Well, UID of the peer accessing the socket is the access control key right
> > > now. Unlike Heimdal's KCM, root doesn't have any special powers (with
> > > Heimdal's KCM, root can list any ccache, with our implementation, only
> > > that of UID 0).
> > > 
> > > Do you have a different suggestion?
> > > ___
> > > devel mailing list -- devel@lists.fedoraproject.org
> > > To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> > 
> > I would want an SELinux check added to it, to allow us to keep the caches
> > separate, based on SELinux.  This would mean you would need to have an
> > SELinux label associated with each cache.

btw I filed https://pagure.io/SSSD/sssd/issue/3434 to track this

> > 
> > I would also be careful about capabilities.
> > 
> > The bottom line with this is if I have two different containers creating
> > keyrings, how does you cache differentiate the the keyrings from each other.
> > If I am in container1 and I do a kinit, and it container2, I can use the
> > keyring, that is a HUGE security violation.
> 
> Well, isn't the kernel KEYRING: cache (which we default to..) working
> exactly this way at the moment?
> 
> With the KCM deamon, you at least selectively mount the KCM socket into
> the containers where you /want/ to share the ccache based on the peer
> UID.
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F27 System Wide Change: Kerberos KCM credential cache by default

2017-06-20 Thread Jakub Hrozek
On Tue, Jun 20, 2017 at 04:23:30PM -0400, Daniel Walsh wrote:
> On 06/20/2017 02:45 PM, Jakub Hrozek wrote:
> > On Tue, Jun 20, 2017 at 08:55:49AM -0400, Daniel Walsh wrote:
> > > On 06/20/2017 04:21 AM, Jakub Hrozek wrote:
> > > > On Tue, Jun 20, 2017 at 09:25:49AM +0200, Pavel Cahyna wrote:
> > > > > Hi,
> > > > > 
> > > > > On Tue, Jun 20, 2017 at 07:42:27AM +0200, Jan Kurik wrote:
> > > > > > = System Wide Change: Kerberos KCM credential cache by default =
> > > > > > https://fedoraproject.org/wiki/Changes/KerberosKCMCache
> > > > > "The design is described in more detail on the SSSD wiki."
> > > > > 
> > > > > It is not, the link redirects to a page about fedorahosted.org
> > > > > retirement.
> > > > Sorry, your are right, I fixed the link (this feature was submitted
> > > > during f-26 timeframe when fh.o was still up and I forgot to change the
> > > > links when I re-submitted the feature..)
> > > > 
> > > > The correct link is:
> > > >   https://docs.pagure.org/SSSD.sssd/design_pages/kcm.html
> > > > 
> > > > > > Change owner(s):
> > > > > > * Jakub Hrozek 
> > > > > > 
> > > > > > Default to a new Kerberos credential cache type called KCM which is
> > > > > > better suited for containerized environments and provides a better
> > > > > > user experience in the general case as well.
> > > > > I wonder what is the relation to the daemon of the same name ansd
> > > > > similar purpose distributed with Heimdal
> > > > > http://h5l.org/manual/HEAD/info/heimdal/Credential-cache-server-_002d-KCM.html.
> > > > > Will they be compatible?
> > > > Yes, more or less. The wire protocol is the same and I used MIT client
> > > > libraries with Heimdal server bit during development. Not all server
> > > > commands are implemented, only the subset that MIT client implements.
> > > > 
> > > > There are some features supported by Heimdal but not supported yet by 
> > > > SSSD's
> > > > KCM, like renewals, but those will be added. There are some features we
> > > > chose to explicitly not add (or not enable by default), like listing all
> > > > ccaches known to KCM server by root.
> > > > 
> > > > Hopefully the sssd upstream design page would help..
> > > > 
> > > > > Will code be shared?
> > > > No, the Heimdal deamon relies on internal Heimdal API quite a bit. We
> > > > also want to support multiple 'storage back ends' for the ccaches, while
> > > > Heimdal only stores the ccaches in memory.
> > > > ___
> > > > devel mailing list -- devel@lists.fedoraproject.org
> > > > To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> > > How will I access this feature inside of a container?
> > Bind-mount the KCM server socket into the container.
> > 
> > > If there is a leaked
> > > socket into the container, what kind of access control is built into your
> > > server to prevent root inside of one container effecting/accessing the
> > > credentials of different containers?
> > Well, UID of the peer accessing the socket is the access control key right
> > now. Unlike Heimdal's KCM, root doesn't have any special powers (with
> > Heimdal's KCM, root can list any ccache, with our implementation, only
> > that of UID 0).
> > 
> > Do you have a different suggestion?
> > ___
> > devel mailing list -- devel@lists.fedoraproject.org
> > To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> 
> I would want an SELinux check added to it, to allow us to keep the caches
> separate, based on SELinux.  This would mean you would need to have an
> SELinux label associated with each cache.
> 
> I would also be careful about capabilities.
> 
> The bottom line with this is if I have two different containers creating
> keyrings, how does you cache differentiate the the keyrings from each other.
> If I am in container1 and I do a kinit, and it container2, I can use the
> keyring, that is a HUGE security violation.

Well, isn't the kernel KEYRING: cache (which we default to..) working
exactly this way at the moment?

With the KCM deamon, you at least selectively mount the KCM socket into
the containers where you /want/ to share the ccache based on the peer
UID.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Proposed Mass Bug Filing: Renaming "python-" binary packages to "python2-"

2017-06-20 Thread Neal Gompa
On Tue, Jun 20, 2017 at 10:27 PM, Nick Coghlan  wrote:
> On 20 June 2017 at 12:44, Nick Coghlan  wrote:
>> On 20 June 2017 at 02:49, Przemek Klosowski  
>> wrote:
>>> It seems to me that there are two kinds of Python packages affected  by this
>>> issue: some track the evolution of the ecosystem and make sure they work
>>> with both Python 2 and 3, while the others assume a specific environment,
>>> and expect the user to conform to that. What I dislike about this proposal
>>> is that it imposes on the first kind: their package name needs to change,
>>> presumably to 'pyton3-xxx' even though the package might work with python2
>>> as well. This sounds like penalizing the good behavior.
>>
>> It's also an annoyingly difficult policy to comply with for anyone
>> attempting to maintain RHEL/CentOS/EPEL compatible packages that will
>> use Py2 in those contexts and Py3 in Fedora.
>
> It was pointed out to me that my description of this problem wasn't
> entirely clear, so here's a more concrete example that hopefully
> clarifies the problem I see with the current policy wording.
>
> Specifically, the issue I see is that given the current policy
> wording, dependency declarations like the following would *not* be
> policy compliant for Python packages in Fedora 27+, even though
> they're entirely unambiguous about the Python version they expect to
> get:
>
> ```
> %if 0%{?el7} || 0%{?fedora} < 27
> BuildRequires: python2-devel
> %else
> BuildRequires: python3-devel
> %endif
> BuildRequires: python-builddep1
> BuildRequires: python-builddep2
> Requires: python-runtimedep1
> Requires: python-runtimedep2
> ```
>
> Such specifications would instead need to be written as:
>
> ```
> %if 0%{?el7} || 0%{?fedora} < 27
> BuildRequires: python2-devel
> BuildRequires: python2-builddep1
> BuildRequires: python2-builddep2
> Requires: python2-runtimedep1
> Requires: python2-runtimedep2
> %else
> BuildRequires: python3-devel
> BuildRequires: python3-builddep1
> BuildRequires: python3-builddep2
> Requires: python3-runtimedep1
> Requires: python3-runtimedep2
> %endif
> ```
>
> Requiring such as an approach has the unfortunate effect of making the
> spec file both harder to read (since it's less obvious that the
> packager's intent is to just use whichever Python version handles the
> default package provides on the target OS), and harder to maintain
> (since every dependency has to be listed twice).
>
> By contrast, if an explicit "BuildRequires: python3-devel" on F27+ is
> taken as an affirmative statement that the package is ready for the
> switch of the unqualifed dependencies to Python 3, then the only
> packages that would have to change anything are those that currently
> have an unqualified dependency on "BuildRequires: python-devel".
>
> Packagers in the latter situation would then have to do one of two things:
>
> 1. If their package actually works on Python 3, change their
> pythonX-devel dependency to be Fedora version dependent (while leaving
> other dependency declarations unchanged):
>
> ```
> %if 0%{?fedora} < 27
> BuildRequires: python2-devel
> %else
> BuildRequires: python3-devel
> %endif
> ```
>
> 2. If their package still genuinely requires Python 2, update all of
> their dependency declarations accordingly:
>
> ```
> BuildRequires: python2-devel
> BuildRequires: python2-builddep1
> BuildRequires: python2-builddep2
> Requires: python2-runtimedep1
> Requires: python2-runtimedep2
> ```

If we constrain ourselves to RHEL, then we're screwed until at least
2024. I personally do not see this as a strong enough reason to not
fix our Python packaging globally. If anything, this should be an
incentive for Red Hat engineers to actually fix their Python packages
to match Fedora or at least have the necessary provides the shim both
ways.

One thing I've observed as our biggest failing is that we do a very
bad job of actually rationalizing our own packages to match our
guidelines, for spurious reasons like this, where mistakes that make
it to RHEL dog us in Fedora forever. That's not only dumb, it's
dangerous, as it makes it very hard for us to make our distribution
better and more consistent.



-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Proposed Mass Bug Filing: Renaming "python-" binary packages to "python2-"

2017-06-20 Thread Nick Coghlan
On 20 June 2017 at 12:44, Nick Coghlan  wrote:
> On 20 June 2017 at 02:49, Przemek Klosowski  
> wrote:
>> It seems to me that there are two kinds of Python packages affected  by this
>> issue: some track the evolution of the ecosystem and make sure they work
>> with both Python 2 and 3, while the others assume a specific environment,
>> and expect the user to conform to that. What I dislike about this proposal
>> is that it imposes on the first kind: their package name needs to change,
>> presumably to 'pyton3-xxx' even though the package might work with python2
>> as well. This sounds like penalizing the good behavior.
>
> It's also an annoyingly difficult policy to comply with for anyone
> attempting to maintain RHEL/CentOS/EPEL compatible packages that will
> use Py2 in those contexts and Py3 in Fedora.

It was pointed out to me that my description of this problem wasn't
entirely clear, so here's a more concrete example that hopefully
clarifies the problem I see with the current policy wording.

Specifically, the issue I see is that given the current policy
wording, dependency declarations like the following would *not* be
policy compliant for Python packages in Fedora 27+, even though
they're entirely unambiguous about the Python version they expect to
get:

```
%if 0%{?el7} || 0%{?fedora} < 27
BuildRequires: python2-devel
%else
BuildRequires: python3-devel
%endif
BuildRequires: python-builddep1
BuildRequires: python-builddep2
Requires: python-runtimedep1
Requires: python-runtimedep2
```

Such specifications would instead need to be written as:

```
%if 0%{?el7} || 0%{?fedora} < 27
BuildRequires: python2-devel
BuildRequires: python2-builddep1
BuildRequires: python2-builddep2
Requires: python2-runtimedep1
Requires: python2-runtimedep2
%else
BuildRequires: python3-devel
BuildRequires: python3-builddep1
BuildRequires: python3-builddep2
Requires: python3-runtimedep1
Requires: python3-runtimedep2
%endif
```

Requiring such as an approach has the unfortunate effect of making the
spec file both harder to read (since it's less obvious that the
packager's intent is to just use whichever Python version handles the
default package provides on the target OS), and harder to maintain
(since every dependency has to be listed twice).

By contrast, if an explicit "BuildRequires: python3-devel" on F27+ is
taken as an affirmative statement that the package is ready for the
switch of the unqualifed dependencies to Python 3, then the only
packages that would have to change anything are those that currently
have an unqualified dependency on "BuildRequires: python-devel".

Packagers in the latter situation would then have to do one of two things:

1. If their package actually works on Python 3, change their
pythonX-devel dependency to be Fedora version dependent (while leaving
other dependency declarations unchanged):

```
%if 0%{?fedora} < 27
BuildRequires: python2-devel
%else
BuildRequires: python3-devel
%endif
```

2. If their package still genuinely requires Python 2, update all of
their dependency declarations accordingly:

```
BuildRequires: python2-devel
BuildRequires: python2-builddep1
BuildRequires: python2-builddep2
Requires: python2-runtimedep1
Requires: python2-runtimedep2
```

Cheers,
Nick.

-- 
Nick Coghlan   |   ncogh...@gmail.com   |   Brisbane, Australia
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Tool for generating a rootfs for foreign arch (aarch64 on x86_64, for example)?

2017-06-20 Thread Neal Gompa
Hey all,

I'm trying to find a way to bootstrap a Fedora rootfs from x86_64 for
aarch64 (similar to debootstrap with "debootstrap --arch arm64 
"), but I can't seem to find any.

I recall that we added qemu-user-static back in Fedora 24 for the
purpose of being able to support this kind of thing, but do we have
anything that leverages it to be able to enable this?

Thanks in advance,

-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Fedora 26-20170620.n.0 compose check report

2017-06-20 Thread Fedora compose checker
No missing expected images.

Failed openQA tests: 8/128 (x86_64), 4/24 (i386), 1/2 (arm)

New failures (same test did not fail in 26-20170618.n.0):

ID: 110629  Test: x86_64 Workstation-boot-iso memory_check
URL: https://openqa.fedoraproject.org/tests/110629
ID: 110632  Test: i386 Workstation-live-iso install_default
URL: https://openqa.fedoraproject.org/tests/110632
ID: 110633  Test: i386 Workstation-boot-iso memory_check
URL: https://openqa.fedoraproject.org/tests/110633
ID: 110637  Test: x86_64 KDE-live-iso install_no_user
URL: https://openqa.fedoraproject.org/tests/110637
ID: 110646  Test: x86_64 KDE-live-iso desktop_notifications_live
URL: https://openqa.fedoraproject.org/tests/110646
ID: 110647  Test: x86_64 KDE-live-iso desktop_notifications_postinstall
URL: https://openqa.fedoraproject.org/tests/110647
ID: 110648  Test: i386 KDE-live-iso install_default
URL: https://openqa.fedoraproject.org/tests/110648
ID: 110650  Test: arm Minimal-raw_xz-raw.xz base_services_start_arm
URL: https://openqa.fedoraproject.org/tests/110650
ID: 110685  Test: x86_64 universal install_kickstart_firewall_disabled
URL: https://openqa.fedoraproject.org/tests/110685
ID: 110701  Test: x86_64 universal install_multi@uefi
URL: https://openqa.fedoraproject.org/tests/110701
ID: 110737  Test: i386 universal install_blivet_software_raid
URL: https://openqa.fedoraproject.org/tests/110737

Old failures (same test failed in 26-20170618.n.0):

ID: 110683  Test: x86_64 universal install_cyrillic_language
URL: https://openqa.fedoraproject.org/tests/110683
ID: 110719  Test: x86_64 universal upgrade_server_domain_controller
URL: https://openqa.fedoraproject.org/tests/110719

Soft failed openQA tests: 3/128 (x86_64), 2/24 (i386)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in 26-20170618.n.0):

ID: 110610  Test: i386 Server-boot-iso install_default
URL: https://openqa.fedoraproject.org/tests/110610
ID: 110611  Test: i386 Server-dvd-iso install_default
URL: https://openqa.fedoraproject.org/tests/110611
ID: 110651  Test: x86_64 Atomic-dvd_ostree-iso install_default
URL: https://openqa.fedoraproject.org/tests/110651
ID: 110652  Test: x86_64 Atomic-dvd_ostree-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/110652
ID: 110684  Test: x86_64 universal install_asian_language
URL: https://openqa.fedoraproject.org/tests/110684

Passed openQA tests: 117/128 (x86_64), 18/24 (i386), 1/2 (arm)

New passes (same test did not pass in 26-20170618.n.0):

ID: 110615  Test: x86_64 Workstation-live-iso install_default_upload
URL: https://openqa.fedoraproject.org/tests/110615
ID: 110616  Test: x86_64 Workstation-live-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/110616
ID: 110617  Test: x86_64 Workstation-live-iso install_no_user
URL: https://openqa.fedoraproject.org/tests/110617
ID: 110618  Test: x86_64 Workstation-live-iso base_selinux
URL: https://openqa.fedoraproject.org/tests/110618
ID: 110619  Test: x86_64 Workstation-live-iso base_services_start
URL: https://openqa.fedoraproject.org/tests/110619
ID: 110620  Test: x86_64 Workstation-live-iso base_service_manipulation
URL: https://openqa.fedoraproject.org/tests/110620
ID: 110621  Test: x86_64 Workstation-live-iso base_update_cli
URL: https://openqa.fedoraproject.org/tests/110621
ID: 110622  Test: x86_64 Workstation-live-iso base_system_logging
URL: https://openqa.fedoraproject.org/tests/110622
ID: 110623  Test: x86_64 Workstation-live-iso desktop_update_graphical
URL: https://openqa.fedoraproject.org/tests/110623
ID: 110624  Test: x86_64 Workstation-live-iso desktop_terminal
URL: https://openqa.fedoraproject.org/tests/110624
ID: 110625  Test: x86_64 Workstation-live-iso desktop_browser
URL: https://openqa.fedoraproject.org/tests/110625
ID: 110626  Test: x86_64 Workstation-live-iso desktop_notifications_live
URL: https://openqa.fedoraproject.org/tests/110626
ID: 110627  Test: x86_64 Workstation-live-iso 
desktop_notifications_postinstall
URL: https://openqa.fedoraproject.org/tests/110627
ID: 110630  Test: x86_64 Workstation-boot-iso memory_check@uefi
URL: https://openqa.fedoraproject.org/tests/110630
ID: 110635  Test: x86_64 KDE-live-iso install_default_upload
URL: https://openqa.fedoraproject.org/tests/110635
ID: 110636  Test: x86_64 KDE-live-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/110636
ID: 110638  Test: x86_64 KDE-live-iso base_selinux
URL: https://openqa.fedoraproject.org/tests/110638
ID: 110639  Test: x86_64 KDE-live-iso base_services_start
URL: https://openqa.fedoraproject.org/tests/110639
ID: 110640  Test: x86_64 KDE-live-iso base_service_manipulation
URL: https://openqa.fedoraproject.org/tests/110640
ID: 110641  Test: x86_64 KDE-live-iso base_update_cli
URL: https://openqa.fedoraproject.org/tests/110641
ID: 110642  Test: 

Re: F27 System Wide Change: Parallel Installable Debuginfo

2017-06-20 Thread Jason L Tibbitts III
> "MW" == Mark Wielaard  writes:

MW> I believe this has always been a hidden directory name that is
MW> expected to be called that way by various tools.

I don't recall having seen it before, and I've been doing packaging work
for a very long time.  The confusion about rpmlint complaints started
when this change hit rawhide.

If it really is historical, we're through such a sea change with the way
debuginfo is being done now that we should fix things to not require a
hidden directory.  It's simply a bad idea.

"Fixing" rpmlint to complain about such things isn't really the right
answer, since the complaints are valid.

 _ J<
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F27 System Wide Change: Kerberos KCM credential cache by default

2017-06-20 Thread Daniel Walsh

On 06/20/2017 02:45 PM, Jakub Hrozek wrote:

On Tue, Jun 20, 2017 at 08:55:49AM -0400, Daniel Walsh wrote:

On 06/20/2017 04:21 AM, Jakub Hrozek wrote:

On Tue, Jun 20, 2017 at 09:25:49AM +0200, Pavel Cahyna wrote:

Hi,

On Tue, Jun 20, 2017 at 07:42:27AM +0200, Jan Kurik wrote:

= System Wide Change: Kerberos KCM credential cache by default =
https://fedoraproject.org/wiki/Changes/KerberosKCMCache

"The design is described in more detail on the SSSD wiki."

It is not, the link redirects to a page about fedorahosted.org
retirement.

Sorry, your are right, I fixed the link (this feature was submitted
during f-26 timeframe when fh.o was still up and I forgot to change the
links when I re-submitted the feature..)

The correct link is:
  https://docs.pagure.org/SSSD.sssd/design_pages/kcm.html


Change owner(s):
* Jakub Hrozek 

Default to a new Kerberos credential cache type called KCM which is
better suited for containerized environments and provides a better
user experience in the general case as well.

I wonder what is the relation to the daemon of the same name ansd
similar purpose distributed with Heimdal
http://h5l.org/manual/HEAD/info/heimdal/Credential-cache-server-_002d-KCM.html.
Will they be compatible?

Yes, more or less. The wire protocol is the same and I used MIT client
libraries with Heimdal server bit during development. Not all server
commands are implemented, only the subset that MIT client implements.

There are some features supported by Heimdal but not supported yet by SSSD's
KCM, like renewals, but those will be added. There are some features we
chose to explicitly not add (or not enable by default), like listing all
ccaches known to KCM server by root.

Hopefully the sssd upstream design page would help..


Will code be shared?

No, the Heimdal deamon relies on internal Heimdal API quite a bit. We
also want to support multiple 'storage back ends' for the ccaches, while
Heimdal only stores the ccaches in memory.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org

How will I access this feature inside of a container?

Bind-mount the KCM server socket into the container.


If there is a leaked
socket into the container, what kind of access control is built into your
server to prevent root inside of one container effecting/accessing the
credentials of different containers?

Well, UID of the peer accessing the socket is the access control key right
now. Unlike Heimdal's KCM, root doesn't have any special powers (with
Heimdal's KCM, root can list any ccache, with our implementation, only
that of UID 0).

Do you have a different suggestion?
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


I would want an SELinux check added to it, to allow us to keep the 
caches separate, based on SELinux.  This would mean you would need to 
have an SELinux label associated with each cache.


I would also be careful about capabilities.

The bottom line with this is if I have two different containers creating 
keyrings, how does you cache differentiate the the keyrings from each 
other.  If I am in container1 and I do a kinit, and it container2, I can 
use the keyring, that is a HUGE security violation.


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F27 System Wide Change: Parallel Installable Debuginfo

2017-06-20 Thread Mark Wielaard
On Tue, 2017-06-20 at 14:12 -0400, Matthew Miller wrote:
> On Tue, Jun 20, 2017 at 01:08:17PM -0500, Jason L Tibbitts III wrote:
> > JK> * build-id file /usr/lib/debug/.build-id/xx/...yyy which is a
> > JK> symlink to the main ELF file.
> > JK> * build-id.debug file /usr/lib/debug/.build-id/xx/...yyy.debug
> > JK> which is a symlink to the .debug ELF file.
> > JK> * The .debug files under /usr/lib/debug/ with file path names
> > JK> mirroring the main ELF file paths under / with .debug added.
> 
> > Please do not use a hidden directory for this.  There is no reason for
> > it, and it only adds confusion and rpmlint complaints that packagers
> > can't control at all.
> 
> I don't know if there are any advantages to a hidden directory here,
> but... at the very least we should fix rpmlint to not give errors, as
> part of this change.

I believe this has always been a hidden directory name that is expected
to be called that way by various tools. The origin of the name probably
hidden somewhere in history. BTW there is a bug and a patch for rpmlint
to not complain about it already:
https://bugzilla.redhat.com/show_bug.cgi?id=1431408

Cheers,

Mark
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Fedora 26 compose report: 20170620.n.0 changes

2017-06-20 Thread Fedora Branched Report
OLD: Fedora-26-20170619.n.0
NEW: Fedora-26-20170620.n.0

= SUMMARY =
Added images:28
Dropped images:  0
Added packages:  1
Dropped packages:0
Upgraded packages:   30
Downgraded packages: 0

Size of added packages:  38.48 KiB
Size of dropped packages:0.00 B
Size of upgraded packages:   640.23 MiB
Size of downgraded packages: 0.00 B

Size change of upgraded packages:   24.30 MiB
Size change of downgraded packages: 0.00 B

= ADDED IMAGES =
Image: Security live x86_64
Path: Labs/x86_64/iso/Fedora-Security-Live-x86_64-26-20170620.n.0.iso
Image: SoaS live x86_64
Path: Spins/x86_64/iso/Fedora-SoaS-Live-x86_64-26-20170620.n.0.iso
Image: Games live x86_64
Path: Labs/x86_64/iso/Fedora-Games-Live-x86_64-26-20170620.n.0.iso
Image: LXDE live i386
Path: Spins/i386/iso/Fedora-LXDE-Live-i386-26-20170620.n.0.iso
Image: Astronomy_KDE live x86_64
Path: Labs/x86_64/iso/Fedora-Astronomy_KDE-Live-x86_64-26-20170620.n.0.iso
Image: SoaS live i386
Path: Spins/i386/iso/Fedora-SoaS-Live-i386-26-20170620.n.0.iso
Image: KDE live i386
Path: Spins/i386/iso/Fedora-KDE-Live-i386-26-20170620.n.0.iso
Image: LXDE live x86_64
Path: Spins/x86_64/iso/Fedora-LXDE-Live-x86_64-26-20170620.n.0.iso
Image: Design_suite live i386
Path: Labs/i386/iso/Fedora-Design_suite-Live-i386-26-20170620.n.0.iso
Image: Design_suite live x86_64
Path: Labs/x86_64/iso/Fedora-Design_suite-Live-x86_64-26-20170620.n.0.iso
Image: KDE live x86_64
Path: Spins/x86_64/iso/Fedora-KDE-Live-x86_64-26-20170620.n.0.iso
Image: LXQt live i386
Path: Spins/i386/iso/Fedora-LXQt-Live-i386-26-20170620.n.0.iso
Image: Security live i386
Path: Labs/i386/iso/Fedora-Security-Live-i386-26-20170620.n.0.iso
Image: Workstation live x86_64
Path: Workstation/x86_64/iso/Fedora-Workstation-Live-x86_64-26-20170620.n.0.iso
Image: Python_Classroom live x86_64
Path: Labs/x86_64/iso/Fedora-Python-Classroom-Live-x86_64-26-20170620.n.0.iso
Image: Workstation live i386
Path: Workstation/i386/iso/Fedora-Workstation-Live-i386-26-20170620.n.0.iso
Image: Mate live i386
Path: Spins/i386/iso/Fedora-MATE_Compiz-Live-i386-26-20170620.n.0.iso
Image: Mate live x86_64
Path: Spins/x86_64/iso/Fedora-MATE_Compiz-Live-x86_64-26-20170620.n.0.iso
Image: Python_Classroom live i386
Path: Labs/i386/iso/Fedora-Python-Classroom-Live-i386-26-20170620.n.0.iso
Image: Robotics live i386
Path: Labs/i386/iso/Fedora-Robotics-Live-i386-26-20170620.n.0.iso
Image: Astronomy_KDE live i386
Path: Labs/i386/iso/Fedora-Astronomy_KDE-Live-i386-26-20170620.n.0.iso
Image: Xfce live x86_64
Path: Spins/x86_64/iso/Fedora-Xfce-Live-x86_64-26-20170620.n.0.iso
Image: Cinnamon live x86_64
Path: Spins/x86_64/iso/Fedora-Cinnamon-Live-x86_64-26-20170620.n.0.iso
Image: Xfce live i386
Path: Spins/i386/iso/Fedora-Xfce-Live-i386-26-20170620.n.0.iso
Image: Cinnamon live i386
Path: Spins/i386/iso/Fedora-Cinnamon-Live-i386-26-20170620.n.0.iso
Image: Robotics live x86_64
Path: Labs/x86_64/iso/Fedora-Robotics-Live-x86_64-26-20170620.n.0.iso
Image: LXQt live x86_64
Path: Spins/x86_64/iso/Fedora-LXQt-Live-x86_64-26-20170620.n.0.iso
Image: Games live i386
Path: Labs/i386/iso/Fedora-Games-Live-i386-26-20170620.n.0.iso

= DROPPED IMAGES =

= ADDED PACKAGES =
Package: waiverdb-0.1.1-2.fc26
Summary: Service for waiving results in ResultsDB
RPMs:waiverdb
Size:39402 bytes


= DROPPED PACKAGES =

= UPGRADED PACKAGES =
Package:  Zim-0.67-0.rc2.1.fc26
Old package:  Zim-0.65-4.fc26
Summary:  Desktop wiki & notekeeper
RPMs: Zim
Size: 1901642 bytes
Size change:  91728 bytes
Changelog:
  * Tue Jun 06 2017 Oliver Haessler  - 0.66-1
  - Update to 0.66

  * Wed Jun 07 2017 Oliver Haessler  - 0.66-2
  - added patch for "Fix for logger missing in newfs" to allow build of 0.66 on
  Fedora/RHEL (will be fixed in 0.67)

  * Wed Jun 14 2017 Robin Lee  - 0.67-0.rc2.1
  - Update to 0.67-rc2


Package:  audit-2.7.7-1.fc26
Old package:  audit-2.7.6-1.fc26
Summary:  User space tools for 2.6 kernel auditing
RPMs: audispd-plugins audispd-plugins-zos audit audit-libs 
audit-libs-devel audit-libs-python audit-libs-python3 audit-libs-static
Size: 4773812 bytes
Size change:  14928 bytes
Changelog:
  * Fri Jun 16 2017 Steve Grubb  2.7.7-1
  - New upstream bugfix release


Package:  datovka-4.8.3-1.fc26
Old package:  datovka-4.8.2-1.fc26
Summary:  A free graphical interface for Czech Databox (Datov?? schr??nky)
RPMs: datovka
Size: 7169600 bytes
Size change:  32332 bytes
Changelog:
  * Wed Jun 14 2017 Jaroslav ??karvada  - 4.8.3-1
  - New version
Resolves: rhbz#1461411


Package:  electrum-2.8.3-1.fc26
Old package:  electrum-2.8.2-1.fc26
Summary:  A lightweight Bitcoin Client
RPMs: electrum
Size: 1271998 bytes
Size change:  32100 bytes
Changelog:
  * Tue Jun 13 2017 Jonny Heggheim  - 2.8.3-1
  - new version


Package:  erlang-19.3.6-1.fc26
Old package:  erlang-19.3.4-1.fc26
Summary:  General-purpo

Re: F27 System Wide Change: Kerberos KCM credential cache by default

2017-06-20 Thread Jakub Hrozek
On Tue, Jun 20, 2017 at 08:55:49AM -0400, Daniel Walsh wrote:
> On 06/20/2017 04:21 AM, Jakub Hrozek wrote:
> > On Tue, Jun 20, 2017 at 09:25:49AM +0200, Pavel Cahyna wrote:
> > > Hi,
> > > 
> > > On Tue, Jun 20, 2017 at 07:42:27AM +0200, Jan Kurik wrote:
> > > > = System Wide Change: Kerberos KCM credential cache by default =
> > > > https://fedoraproject.org/wiki/Changes/KerberosKCMCache
> > > "The design is described in more detail on the SSSD wiki."
> > > 
> > > It is not, the link redirects to a page about fedorahosted.org
> > > retirement.
> > Sorry, your are right, I fixed the link (this feature was submitted
> > during f-26 timeframe when fh.o was still up and I forgot to change the
> > links when I re-submitted the feature..)
> > 
> > The correct link is:
> >  https://docs.pagure.org/SSSD.sssd/design_pages/kcm.html
> > 
> > > > Change owner(s):
> > > > * Jakub Hrozek 
> > > > 
> > > > Default to a new Kerberos credential cache type called KCM which is
> > > > better suited for containerized environments and provides a better
> > > > user experience in the general case as well.
> > > I wonder what is the relation to the daemon of the same name ansd
> > > similar purpose distributed with Heimdal
> > > http://h5l.org/manual/HEAD/info/heimdal/Credential-cache-server-_002d-KCM.html.
> > > Will they be compatible?
> > Yes, more or less. The wire protocol is the same and I used MIT client
> > libraries with Heimdal server bit during development. Not all server
> > commands are implemented, only the subset that MIT client implements.
> > 
> > There are some features supported by Heimdal but not supported yet by SSSD's
> > KCM, like renewals, but those will be added. There are some features we
> > chose to explicitly not add (or not enable by default), like listing all
> > ccaches known to KCM server by root.
> > 
> > Hopefully the sssd upstream design page would help..
> > 
> > > Will code be shared?
> > No, the Heimdal deamon relies on internal Heimdal API quite a bit. We
> > also want to support multiple 'storage back ends' for the ccaches, while
> > Heimdal only stores the ccaches in memory.
> > ___
> > devel mailing list -- devel@lists.fedoraproject.org
> > To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> 
> How will I access this feature inside of a container? 

Bind-mount the KCM server socket into the container.

> If there is a leaked
> socket into the container, what kind of access control is built into your
> server to prevent root inside of one container effecting/accessing the
> credentials of different containers?

Well, UID of the peer accessing the socket is the access control key right
now. Unlike Heimdal's KCM, root doesn't have any special powers (with
Heimdal's KCM, root can list any ccache, with our implementation, only
that of UID 0).

Do you have a different suggestion?
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Intent to orphan krb5-appl*

2017-06-20 Thread Stephen Gallagher
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Jun 20, 2017 at 2:10 PM Robbie Harwood  wrote:
Hi,

I am orphaning krb5-appl in Fedora in the hopes that it will be retired.

These packages will likely be officially deprecated upstream soon, and
probably should not be used in most cases anyway.  It contains legacy
kerberized utilities, like rsh.  There are no packages which depend
them.  There have been no changes to this package in Fedora since 2013,
and no new capabilities upstream since 2010 when it branched from the
mainline krb5 distribution.

I would strongly prefer that these be allowed to fade away in order to
further discourage their use in keeping with what other distributions
have done.

Thanks,
- --Robbie (krb5 maintainer)


Sounds to me like rather than orphaning and waiting for retirement,
this would be a candidate for an F27 Change Proposal where we kill it
off explicitly. (This has the added bonus of providing precedent for
saying "no" if someone decided to try to resurrect this package.)
-BEGIN PGP SIGNATURE-
Version: Mailvelope v1.7.2
Comment: https://www.mailvelope.com

wkYEAREIABAFAllJZm0JEHolVWI2uqOjAACU7QCgl1EDScxCk7W3o7elYeJ0
mm0He1MAnRJQaRNu1wGNJsXC8l+bh/QiC47I
=YWDG
-END PGP SIGNATURE-
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F27 System Wide Change: Parallel Installable Debuginfo

2017-06-20 Thread Matthew Miller
On Tue, Jun 20, 2017 at 01:08:17PM -0500, Jason L Tibbitts III wrote:
> JK> * build-id file /usr/lib/debug/.build-id/xx/...yyy which is a
> JK> symlink to the main ELF file.
> JK> * build-id.debug file /usr/lib/debug/.build-id/xx/...yyy.debug
> JK> which is a symlink to the .debug ELF file.
> JK> * The .debug files under /usr/lib/debug/ with file path names
> JK> mirroring the main ELF file paths under / with .debug added.
> Please do not use a hidden directory for this.  There is no reason for
> it, and it only adds confusion and rpmlint complaints that packagers
> can't control at all.

I don't know if there are any advantages to a hidden directory here,
but... at the very least we should fix rpmlint to not give errors, as
part of this change.

-- 
Matthew Miller

Fedora Project Leader
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Intent to orphan krb5-appl*

2017-06-20 Thread Robbie Harwood
Hi, 
 

 
I am orphaning krb5-appl in Fedora in the hopes that it will be retired.
 

 
These packages will likely be officially deprecated upstream soon, and  
 
probably should not be used in most cases anyway.  It contains legacy   
 
kerberized utilities, like rsh.  There are no packages which depend 
 
them.  There have been no changes to this package in Fedora since 2013, 
 
and no new capabilities upstream since 2010 when it branched from the   
 
mainline krb5 distribution. 
 

 
I would strongly prefer that these be allowed to fade away in order to  
 
further discourage their use in keeping with what other distributions   
 
have done.  
 

 
Thanks, 
 
--Robbie (krb5 maintainer)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F27 System Wide Change: Parallel Installable Debuginfo

2017-06-20 Thread Jason L Tibbitts III
I know the boat has sailed on this and no amount of complaining will
help at this point, but I want to make sure this gets on the record
wherever this feature is proposed.

> "JK" == Jan Kurik  writes:

JK> * build-id file /usr/lib/debug/.build-id/xx/...yyy which is a
JK> symlink to the main ELF file.
JK> * build-id.debug file /usr/lib/debug/.build-id/xx/...yyy.debug
JK> which is a symlink to the .debug ELF file.
JK> * The .debug files under /usr/lib/debug/ with file path names
JK> mirroring the main ELF file paths under / with .debug added.

Please do not use a hidden directory for this.  There is no reason for
it, and it only adds confusion and rpmlint complaints that packagers
can't control at all.

 - J<
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F27 Self Contained Change: Decouple system java setting from java command setting

2017-06-20 Thread nicolas . mailhot
Hi,

Frankly, the proposed change seems a great way to accumulate technical debt at 
a rapid pace, by helping apps to specify various legacy or proprietary Java 
variants, and postponing taking into account openjdk changes indefinitely.

That's more or less what the proprietary unixes did till the whole house of 
cards collapsed under the weight of long overdue migration needs.

IIRC the whole alternative system already lets an app specify a specific java 
version and producer (at least it did in JPackage time). What it does not let 
people do is to pretend an app is java-version and java-producer agnostic when 
it isn't. 

Regards,

-- 
Nicolas Mailhot
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: /usr/bin/qemu-kvm symlink

2017-06-20 Thread Richard W.M. Jones
On Sat, Jun 17, 2017 at 05:25:18PM +, Zbigniew Jędrzejewski-Szmek wrote:
> Hi,
> 
> I was told [1] that /usr/bin/qemu-kvm is obsolete, and that the right
> thing is to use 'qemu-system-x86_64 -enable-kvm', [...]

As Dan says, use libvirt.

However I want to point out that the advice above is also wrong: The
‘-enable-kvm’ option is obsolete, and that command would only work if
you were emulating x86_64, which is by no means the only architecture
which supports KVM.  Really you should use libvirt rather than trying
to formulate qemu command lines.

> 2. wouldn't it make sense to convince upstream to provide /usr/bin/qemu-kvm
>which would mean "provide accelerated emulation of current architecture"?

Possibly, but what many people want is "be as fast as you can but
don't break if KVM isn't available", which is provided by the
‘-machine accel=kvm:tcg’ option, or by using libvirt capabilities to
discover what acceleration and emulation options are available on the
current host.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-top is 'top' for virtual machines.  Tiny program with many
powerful monitoring features, net stats, disk stats, logging, etc.
http://people.redhat.com/~rjones/virt-top
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Re: Liberation fonts plan

2017-06-20 Thread nicolas . mailhot



De: "pravin d s" 

>On 20 June 2017 at 18:42, Matthew Miller  wrote:

>> On Tue, Jun 20, 2017 at 06:35:24PM +0530, pravin@gmail.com wrote:
>> >- In Fedora we will have both packages liberation2-fonts and
>> >liberation-fonts
>>


De: "pravin d s" 

>On 20 June 2017 at 18:42, Matthew Miller  wrote:

>> On Tue, Jun 20, 2017 at 06:35:24PM +0530, pravin@gmail.com wrote:
>> >- In Fedora we will have both packages liberation2-fonts and
>> >liberation-fonts
>>
>> Will the actual fonts have different names?
>>

>I am planning to have same fonts name, so one can simply install other
>packages and replace the existing one.

Frankly, if the rift is deep enough there's no hope of producing a Liberation 
version that satisfies everyone, it would be better to have to different family 
names, with fontconfig substitution rules that make each one a valid 
replacement for the other if it's not installed on the system.

The fontconfig rules will keep software happy and the different names will 
force humans to take a choice instead of talking past one another like is the 
case right now.

Regards,

-- 
Nicolas Mailhot
>> Will the actual fonts have different names?
>>

>I am planning to have same fonts name, so one can simply install other
>packages and replace the existing one.

Frankly, if the rift is deep enough there's no hope of producing a Liberation 
version that satisfyes everyone, it would be better to have to different family 
names, with fontconfig substitution rules that make each one a valid 
replacement for the other if it's not installed on the system.

The fontconfig rules will keep software happy and the different names will 
force humans to take a choice instead of talking past one another like is the 
case right now.

Regards,

-- 
Nicolas Mailhot
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Liberation fonts plan

2017-06-20 Thread Matthew Miller
On Tue, Jun 20, 2017 at 10:55:04PM +0530, pravin@gmail.com wrote:
> > This seems likely to lead to user confusion. Any chance of making the
> > old one "Liberation Classic" or something like that?
> I liked the idea. With this case we can have both fonts installed same time
> on the system.

As long as it's not a huge amount of extra work for you!

-- 
Matthew Miller

Fedora Project Leader
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Liberation fonts plan

2017-06-20 Thread pravin....@gmail.com
On 20 June 2017 at 22:37, Matthew Miller  wrote:

> On Tue, Jun 20, 2017 at 06:46:31PM +0530, pravin@gmail.com wrote:
> > > On Tue, Jun 20, 2017 at 06:35:24PM +0530, pravin@gmail.com wrote:
> > > >- In Fedora we will have both packages liberation2-fonts and
> > > >liberation-fonts
> > > Will the actual fonts have different names?
> > I am planning to have same fonts name, so one can simply install other
> > packages and replace the existing one.
>
> This seems likely to lead to user confusion. Any chance of making the
> old one "Liberation Classic" or something like that?
>

I liked the idea. With this case we can have both fonts installed same time
on the system.

Regards,
Pravin
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Liberation fonts plan

2017-06-20 Thread Matthew Miller
On Tue, Jun 20, 2017 at 06:46:31PM +0530, pravin@gmail.com wrote:
> > On Tue, Jun 20, 2017 at 06:35:24PM +0530, pravin@gmail.com wrote:
> > >- In Fedora we will have both packages liberation2-fonts and
> > >liberation-fonts
> > Will the actual fonts have different names?
> I am planning to have same fonts name, so one can simply install other
> packages and replace the existing one.

This seems likely to lead to user confusion. Any chance of making the
old one "Liberation Classic" or something like that?


-- 
Matthew Miller

Fedora Project Leader
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Proposed Mass Bug Filing: Renaming "python-" binary packages to "python2-"

2017-06-20 Thread Jason L Tibbitts III
> "IS" == Iryna Shcherbina  writes:

IS> The packages that violate the above-mentioned policies are being
IS> tracked in portingdb [3] and we plan to start filling bugs soon.

Before doing that, please post a list of packages and their maintainers
to the devel list.  Preferably you would post two lists: one in the
form:

packageowner1 owner2 owner2

And another in the form

owner  package1 package2 package3

This makes it easy for packagers to trivially see if they have any work
to do without having to wrestle with what could potentially be a large
number of bugzilla tickets which are more annoying than useful.

The message with these lists should also include reasonably complete
information about what they need to do.  Not just a pile of links,
though you should of course include links in case someone wants to read
further.

IS> Since that's a lot of bugs to file (more than 1000) , we
IS> encourage all maintainers to fix the packages they maintain.

That will go faster if you don't waste people's time filing a load bugs
and instead give people at least a couple of weeks to see their name on
a list and get things fixed up.

A few extra minutes spent generating a useful and complete report can
save a lot of time for busy packagers and potentially save some ill will
as well.

 - J<
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Self Introduction: Augusto Caringi

2017-06-20 Thread Augusto Caringi
Hi everyone,

My name is Augusto Caringi and I'd like to introduce myself. I'm a Brazilian 
Software Engineer currently living in Brno, Czech Republic, working at Red Hat 
in the Core Services/Databases team.

My first Linux installation was a Red Hat 4.2 in 1997, since then I have been 
using/working with Linux and Open Source Software one way or another in the 
last 20 years.

Before joining Red Hat I worked writing network daemons and embedded software 
(closed source) mainly programming in C/C++ and Python. I also have experience 
as a Computer Science lecturer.

My first Fedora package is ProxySQL:

https://bugzilla.redhat.com/show_bug.cgi?id=1457929

I'm looking forward to contribute more to the Fedora Project.

Thank you!

-- 
Augusto Caringi
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Upgrade of Ardour to latest version

2017-06-20 Thread Guido Aulisi
I'm going to upgrade ardour5 to the latest upstream version 5.10,
starting with rawhide, f26, f25 and f24.

Guido Aulisi

signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Liberation fonts plan

2017-06-20 Thread pravin....@gmail.com
On 20 June 2017 at 18:42, Matthew Miller  wrote:

> On Tue, Jun 20, 2017 at 06:35:24PM +0530, pravin@gmail.com wrote:
> >- In Fedora we will have both packages liberation2-fonts and
> >liberation-fonts
>
> Will the actual fonts have different names?
>

I am planning to have same fonts name, so one can simply install other
packages and replace the existing one.

-
Pravin


>
>
> --
> Matthew Miller
> 
> Fedora Project Leader
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Liberation fonts plan

2017-06-20 Thread Matthew Miller
On Tue, Jun 20, 2017 at 06:35:24PM +0530, pravin@gmail.com wrote:
>- In Fedora we will have both packages liberation2-fonts and
>liberation-fonts

Will the actual fonts have different names?


-- 
Matthew Miller

Fedora Project Leader
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Liberation fonts plan

2017-06-20 Thread Neal Gompa
On Tue, Jun 20, 2017 at 9:05 AM, pravin@gmail.com
 wrote:
> Hi All,
>
>Presently as you know, we have liberation-2 and liberation 1.07.4. i am
> maintaining both in single git repo. [1]
>
> I am thinking to create different project for liberation2, reasons as
> follows
>
> liberation 2 - It initially forked from google-croscore-fonts and now
> independent development is happening.
> liberation 1 - Though shapes are same, liberation 1 has bytecode hinting
> instruction, many users like it.
> Problem: Few users want to use liberation 1 and few users want to use
> liberation 2.
> Having different project for both will help for independant development and
> also users can switch as per interest.
> One can obsolete to other.
> In Fedora we will have both packages liberation2-fonts and liberation-fonts
>
>  Let me know - feedback and suggestions.   Copr for liberation2 [2]
>
>   Background information on Wiki. [3]
>
> Thanks,
> Pravin
>

I'm okay with anything that leads to us having all the fonts! And
there have been people asking why Fedora (the originator of the fonts
in question) doesn't have the latest version of the fonts. If this
fixes that, I'll be pleased.


-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Liberation fonts plan

2017-06-20 Thread pravin....@gmail.com
Hi All,

   Presently as you know, we have liberation-2 and liberation 1.07.4. i am
maintaining both in single git repo. [1]

I am thinking to create different project for liberation2, reasons as
follows

   - liberation 2 - It initially forked from google-croscore-fonts and now
   independent development is happening.
   - liberation 1 - Though shapes are same, liberation 1 has bytecode
   hinting instruction, many users like it.
   - Problem: Few users want to use liberation 1 and few users want to use
   liberation 2.
   - Having different project for both will help for independant
   development and also users can switch as per interest.
   - One can obsolete to other.
   - In Fedora we will have both packages liberation2-fonts and
   liberation-fonts

 Let me know - feedback and suggestions.   Copr for liberation2 [2]

  Background information on Wiki. [3]

Thanks,
Pravin

1. https://pagure.io/liberation-fonts
2. https://copr.fedorainfracloud.org/coprs/pravins/liberation2
3. https://en.wikipedia.org/wiki/Liberation_fonts
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F27 System Wide Change: Kerberos KCM credential cache by default

2017-06-20 Thread Daniel Walsh

On 06/20/2017 04:21 AM, Jakub Hrozek wrote:

On Tue, Jun 20, 2017 at 09:25:49AM +0200, Pavel Cahyna wrote:

Hi,

On Tue, Jun 20, 2017 at 07:42:27AM +0200, Jan Kurik wrote:

= System Wide Change: Kerberos KCM credential cache by default =
https://fedoraproject.org/wiki/Changes/KerberosKCMCache

"The design is described in more detail on the SSSD wiki."

It is not, the link redirects to a page about fedorahosted.org
retirement.

Sorry, your are right, I fixed the link (this feature was submitted
during f-26 timeframe when fh.o was still up and I forgot to change the
links when I re-submitted the feature..)

The correct link is:
 https://docs.pagure.org/SSSD.sssd/design_pages/kcm.html


Change owner(s):
* Jakub Hrozek 

Default to a new Kerberos credential cache type called KCM which is
better suited for containerized environments and provides a better
user experience in the general case as well.

I wonder what is the relation to the daemon of the same name ansd
similar purpose distributed with Heimdal
http://h5l.org/manual/HEAD/info/heimdal/Credential-cache-server-_002d-KCM.html.
Will they be compatible?

Yes, more or less. The wire protocol is the same and I used MIT client
libraries with Heimdal server bit during development. Not all server
commands are implemented, only the subset that MIT client implements.

There are some features supported by Heimdal but not supported yet by SSSD's
KCM, like renewals, but those will be added. There are some features we
chose to explicitly not add (or not enable by default), like listing all
ccaches known to KCM server by root.

Hopefully the sssd upstream design page would help..


Will code be shared?

No, the Heimdal deamon relies on internal Heimdal API quite a bit. We
also want to support multiple 'storage back ends' for the ccaches, while
Heimdal only stores the ccaches in memory.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


How will I access this feature inside of a container?  If there is a 
leaked socket into the container, what kind of access control is built 
into your server to prevent root inside of one container 
effecting/accessing the credentials of different containers?

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


F27 System Wide Change: Enable TRIM pass down to encrypted disks

2017-06-20 Thread Jan Kurik
= System Wide Change: Enable TRIM pass down to encrypted disks =
https://fedoraproject.org/wiki/Changes/EnableTrimOnDmCrypt

Change owner(s):
* Vratislav Podzimek 
* Ondrej Kozina 


Override kernel default for dm-crypt mappings of LUKS1 encrypted
volumes via flag put in /etc/crypttab file. This change should affect
only newly created encrypted storage based on LUKS1 format during
installation.


== Detailed Description ==
User base of Fedora distribution with SSDs grows steadily and while
the argument for kernel default setting not to enable the discard is
still strong one it doesn't change the fact that vast majority of
users (with SSDs) doesn't want to sacrifice better performance of
drive with discard/trim enabled for the sake of secrecy.

We're not speaking encrypted data security here and double emphasize
on it! Only the fact that blank filesystem on top of dm-crypt device
with discard enabled may create well visible patterns in ciphertext
device below on SSDs.

For LUKS1 metadata format we don't have a space to store the new
default in metadata and therefore we can't flip the default for new
LUKS1 devices being formated via libcryptsetup or cryptsetup utility.

Changing the kernel default is of the table due to risk of data
corruption with some TrueCrypt configurations involving hidden
volumes.

For rotational devices the cost of enabled discard is negligible


== Scope ==
* Proposal owners:
This change despite being system wide change due to overriding legacy
default is quite small and easy to manage.

* Other developers:
Very minor change in python-blivet. Basically we just need to store
discard keyword in /etc/crypttab lines related to new partitions
created during installation process.


* Release engineering:
N/A

* List of deliverables:
N/A

* Policies and guidelines:
Add short information in documentation we're changing long term
default and copy the reasoning there.

* Trademark approval:
N/A

-- 
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Fwd: Node.js v8.x in Fedora

2017-06-20 Thread Zuzana Svetlikova
-- Forwarded message --
From: Zuzana Svetlikova 
Date: Mon, Jun 19, 2017 at 5:48 PM
Subject: Node.js v8.x in Fedora
To: devel@lists.fedoraproject.org
Cc: nod...@lists.fedoraproject.org


Hi everyone,

as there is nothing stopping us now, the nodejs package in Rawhide will
soon be
updated to Node.js v8.x. It also comes with npm@5 and new V8.

Note that upstream has made a lot of changes and your projects/packages
might have
some issues.

I'll update nodejs in rawhide next week, if you wish to try it out sooner,
it's already built here:
https://copr.fedorainfracloud.org/coprs/g/nodejs-sig/nodejs-lts/

Zuzka
___
devel-announce mailing list -- devel-annou...@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


F27 System Wide Change: Separate Subpackage and Source Debuginfo

2017-06-20 Thread Jan Kurik
= System Wide Change: Separate Subpackage and Source Debuginfo =
https://fedoraproject.org/wiki/Changes/SubpackageAndSourceDebuginfo

Change owner(s):
* Mark Wielaard 
* Neal Gompa 


Allow to install just the debuginfo for a subpackage and/or without
the source files. The debuginfo packages are huge because they contain
debuginfo and all sources for all subpackages. Being able to install
only the debuginfo for the subpackage that is installed reduces the
size that needs to be downloaded to analyze, trace, profile or debug a
program or core file. Some tracing and profiling tools don't need the
actual source files to provide stack traces or insert probes. So
installing the debugsources should be optional.


== Detailed Description ==
Currently both the .debug files and the source files of all
subpackages are included in a debuginfo package. This creates huge
debuginfo packages with a lot of data that might not be relevant to
the user/developer. By splitting out the sources (found under
/usr/src/debug) and the .debug file for the separate binaries of the
subpackages (under /usr/lib/debug) the amount of data a developer/user
needs to install to trace, profile or debug will be greatly reduced.

Other distributions (notably Suse) already split their debuginfo
packages this way. We will take those patches
(https://build.opensuse.org/package/view_file/openSUSE:Factory/rpm/debugsubpkg.diff)
and integrate them into rpm upstream. This will involve two steps: -
https://taiga.fedorainfracloud.org/project/mjw-better-rpm-debuginfo-package-creation/us/8
- 
https://taiga.fedorainfracloud.org/project/mjw-better-rpm-debuginfo-package-creation/us/10

This depends on some of the cleanups introduced by the
ParallelInstallableDebuginfo change.

We can either make this work with the current dnf debuginfo-install
plugin by providing a meta package that matches the main-debuginfo
package which depends on all sub- and source-debuginfo packages. Or we
work with the dnf hackers to make dnf debuginfo-install work with
sub-debuginfo packages.

A couple of packages already have hand-written sub-debuginfo packages
(notably the kernel, glibc and gcc). We will work with those packages
to adopt the new standard approach.

Release engineering needs to be involved to see if any changes are
necessary for adding the sub-debuginfo/debugsources packages to the
repodata.


== Scope ==
* Proposal owners:
Patches against rpm upstream need to be integrated as outlined in the
Detailed Description.

* Other developers:
Upstream rpm and dnf maintainers have to review the proposed patches.
If accepted the package maintainers will have to decide whether those
patches can be backported for the next fedora release. Packages that
now split their debuginfo packages by hand might want to change their
package to adopt the new (standard) approach. Once all changes are in
a package debuginfo needs to be regenerated before it becomes
sub-package/source split.

* Release engineering:
Needs to be discussed. In theory no changes apart from those listed
above are needed. But release engineering might know whether any
changes are necessary for adding the sub-debuginfo/debugsources
packages to the repodata.

* List of deliverables:
N/A (Still Unknown)

* Policies and guidelines:
No changes, the debuginfo related rpm macros won't change. They will
just start producing sub-package debuginfo and debugsources packages
once all changes are in place.

* Trademark approval:
N/A (not needed for this Change)

-- 
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


F27 System Wide Change: Parallel Installable Debuginfo

2017-06-20 Thread Jan Kurik
= System Wide Change: Parallel Installable Debuginfo =
https://fedoraproject.org/wiki/Changes/ParallelInstallableDebuginfo

Change owner(s):
* Mark Wielaard 

debuginfo packages can be installed in parallel to make it easier to
trace, profile and observe what programs are doing or to debug when
they have crashed. That way debugging, tracing or profiling programs
can be done independent of whether they are 32bit, 64bit, a slightly
newer or older version than currently installed or even from a
different architecture.


== Detailed Description ==
Currently only one version of a debuginfo package can be installed for
a given package. Even on a multi-lib system you cannot install the
64-bit and 32-bit versions of a debuginfo package in parallel
(technically you sometimes can, because of RPM file coloring, the
64bit version of the .debug files win over the 32bit version - causing
lots of confusion). But there are various situation where having
multiple versions of the debuginfo package installed help with
tracing, profiling, debugging and/or crash analysis (see the Benefit
to Fedora section below). There are various things provided by a
debuginfo file that might conflict preventing parallel installation of
different versions:

* build-id file /usr/lib/debug/.build-id/xx/...yyy which is a
symlink to the main ELF file.
* build-id.debug file /usr/lib/debug/.build-id/xx/...yyy.debug
which is a symlink to the .debug ELF file.
* The .debug files under /usr/lib/debug/ with file path names
mirroring the main ELF file paths under / with .debug added.
* The source files under /usr/src/debug/-/

They can be made non-conflicting in the following ways:

* The main build-id file should not be in the debuginfo file, but in
the main package (this was always a problem since the package and
debuginfo package installed might not match). If we want to make
usr/lib/debug/ a network resource then we will need to move the
symlink to another location (maybe /usr/lib/.build-id). Unfortunately
this means a change will be necessary for debuginfo consumers to that
depend on the old location. We could keep the old symlink and point it
to the new location to work around it. But I will audit the consumers
to see which depend on it and discuss if we can have a new standard
location.
* build-ids are globally unique identifiers. They will be different
across arches. But might match between minor releases if the exact
same ELF image is produced. The linker will get an option to hash in
the full nvr to make sure all build-ids are always fully unique.
* The .debug file names will be changed to main ELF file
name-vr.debug. This name will also be set in the .gnu_debuglink
section of the main file by changing the options given to eu-strip in
the rpm find-debuginfo.sh script.
* The source files will be moved under
/usr/src/debug/--./. This needs changes
to the rpm debugedit program which rewrites the DWARF source file
information.

These changes will make all files in any debuginfo file unique so they
don't conflict when installed in parallel. There should be no changes
necessary to programs (gdb, perf, valgrind, systemtap,
systemd-coredump, eu-stack, abrt-hook-ccpp, etc.) that use build-ids
or .gnu_debuglink to lookup DWARF debug information and source
references for tracing, profiling and debugging.

It would be good to tweak dnf debuginfo-install to know about parallel
installable debuginfo packages and maybe have an easy option to
install the debuginfo for a core file or for the packages running in a
container.

Alternative solutions currently rejected:

* Move main ELF image build-id file under
/usr/lib/.build-id/xx/...yyy when moving into main pages. Because
existing programs probably depend on the link being under
/usr/lib/debug/.
* Since when the build-id is identifical also the ELF file is
identical we could mark all build-id.debug files as replacable in the
rpm. It isn't clear that works for symlinks though (but we could
reverse the symlink direction from debug file to build-id file). And
currently you can identify the exact package nvr installed given just
one build-id. That would be impossible if multiple packages could
contain the same build-id/ELF image file.
* Do away with the old .gnu_debuglink way of accessing files under
/usr/lib/debug and just not install .debug files and only support
build-id based debug lookups. Because it isn't clear build-ids are
100% available and all programs work with build-id lookups instead
through .gnu_debuglink names.
* Move the .debug files under a subdir like the sources.
/usr/lib/debug/--./. This cannot easily
be expressed in .gnu_debuglink, which officially only allows a
basename.


== Scope ==
* Proposal owners: Patches have been developed against rpm debugedit
to accept a hash value to seed the build-id calculation, rewrite
source paths (currently source paths can only be smaller, this change
might create larger paths) and the rpm find-debuginfo.sh script to
change the paths, symlinks and

Re: F27 Self Contained Change: Decouple system java setting from java command setting

2017-06-20 Thread Mikolaj Izdebski
On 06/20/2017 10:48 AM, Jiri Vanek wrote:
> There are may reasons to not to do this change. At least not to do this
> as it is specified.

I would like to hear your reasons.

> Where is best place to discus? Discussion already started at
> java-proj...@redhat.com.[1]

Fedora devel list is the right place for that.

-- 
Mikolaj Izdebski
Software Engineer, Red Hat
IRC: mizdebsk
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F27 Self Contained Change: Decouple system java setting from java command setting

2017-06-20 Thread Mikolaj Izdebski
On 06/16/2017 06:44 PM, Dennis Gilmore wrote:
> I would like to see some details on how this is going to be
> implemented.

It is going to be implemented by updating javapackages-tools package in
Fedora 27 to new upstream release, which includes this change:
https://github.com/fedora-java/javapackages/pull/44/commits/a05123ba74a0693ef116f718eb7326213bb94b75

-- 
Mikolaj Izdebski
Software Engineer, Red Hat
IRC: mizdebsk
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F27 Self Contained Change: Decouple system java setting from java command setting

2017-06-20 Thread Jiri Vanek

There are may reasons to not to do this change. At least not to do this as it 
is specified.

Where is best place to discus? Discussion already started at 
java-proj...@redhat.com.[1]

Please advice,

  J.

[1] http://post-office.corp.redhat.com/archives/java-project/2017-June/date.html

On 06/08/2017 03:55 PM, Jan Kurik wrote:

= Proposed Self Contained Change: Decouple system java setting from
java command setting =
https://fedoraproject.org/wiki/Changes/Decouple_system_java_setting_from_java_command_setting

Change owner(s):
* Michael Simacek 
* Mikolaj Izdebski 

Alternatives can be used to specify which Java installation should be
the default for the system. Currently, changing the default java
command causes not only a change to the /usr/bin/java symlink, but
also affects the which runtime is used for system installed Java
applications. We propose introduction of separate setting for
system-wide java applications.


== Detailed Description ==
Fedora allows parallel installation of multiple Java runtime
environments and it uses alternatives mechanism to allow the user to
switch between them. JDK packages provide a set of alternatives
symlinks for it's executables. The java symlink is used to determine
the java command (/usr/bin/java), but also determines which runtime
environment is used to run system-wide Java applications installed
from RPMs, such as maven or eclipse. While in theory different Java
runtime environments are drop-in replacements for each other, in
practice some of the applications may stop working properly. Users
usually install alternative JDKs in order to run their own
applications and don't expect that changing the java command will have
effect on the system applications. By introducing a separate setting
for system-wide java, we would avoid this problem. We propose
specifying default Java runtime for RPM-managed applications in
/etc/java/java.conf (this is already possible, but not currently
used). Administrators would still be able to override the system
default if they need to.


== Scope ==
* Proposal owners:
Adjust javapackages-tools to provide default Java setting in /etc/java/java.conf

* Other developers:
N/A (not a System Wide Change)

* Release engineering:
https://pagure.io/releng/issue/6831

* List of deliverables:
N/A (not a System Wide Change)

* Policies and guidelines:
N/A (not a System Wide Change)

* Trademark approval:
N/A (not needed for this Change)




--
Jiri Vanek
Senior QE engineer, OpenJDK QE lead, Mgr.
Red Hat Czech
jva...@redhat.comM: +420775390109
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F27 System Wide Change: Kerberos KCM credential cache by default

2017-06-20 Thread Jakub Hrozek
On Tue, Jun 20, 2017 at 09:25:49AM +0200, Pavel Cahyna wrote:
> Hi,
> 
> On Tue, Jun 20, 2017 at 07:42:27AM +0200, Jan Kurik wrote:
> > = System Wide Change: Kerberos KCM credential cache by default =
> > https://fedoraproject.org/wiki/Changes/KerberosKCMCache
> 
> "The design is described in more detail on the SSSD wiki."
> 
> It is not, the link redirects to a page about fedorahosted.org
> retirement.

Sorry, your are right, I fixed the link (this feature was submitted
during f-26 timeframe when fh.o was still up and I forgot to change the
links when I re-submitted the feature..)

The correct link is:
https://docs.pagure.org/SSSD.sssd/design_pages/kcm.html

> 
> > Change owner(s):
> > * Jakub Hrozek 
> > 
> > Default to a new Kerberos credential cache type called KCM which is
> > better suited for containerized environments and provides a better
> > user experience in the general case as well.
> 
> I wonder what is the relation to the daemon of the same name ansd
> similar purpose distributed with Heimdal
> http://h5l.org/manual/HEAD/info/heimdal/Credential-cache-server-_002d-KCM.html.
> Will they be compatible? 

Yes, more or less. The wire protocol is the same and I used MIT client
libraries with Heimdal server bit during development. Not all server
commands are implemented, only the subset that MIT client implements.

There are some features supported by Heimdal but not supported yet by SSSD's
KCM, like renewals, but those will be added. There are some features we
chose to explicitly not add (or not enable by default), like listing all
ccaches known to KCM server by root.

Hopefully the sssd upstream design page would help..

> Will code be shared?

No, the Heimdal deamon relies on internal Heimdal API quite a bit. We
also want to support multiple 'storage back ends' for the ccaches, while
Heimdal only stores the ccaches in memory.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F27 System Wide Change: Kerberos KCM credential cache by default

2017-06-20 Thread Pavel Cahyna
Hi,

On Tue, Jun 20, 2017 at 07:42:27AM +0200, Jan Kurik wrote:
> = System Wide Change: Kerberos KCM credential cache by default =
> https://fedoraproject.org/wiki/Changes/KerberosKCMCache

"The design is described in more detail on the SSSD wiki."

It is not, the link redirects to a page about fedorahosted.org
retirement.

> Change owner(s):
> * Jakub Hrozek 
> 
> Default to a new Kerberos credential cache type called KCM which is
> better suited for containerized environments and provides a better
> user experience in the general case as well.

I wonder what is the relation to the daemon of the same name ansd
similar purpose distributed with Heimdal
http://h5l.org/manual/HEAD/info/heimdal/Credential-cache-server-_002d-KCM.html.
Will they be compatible? Will code be shared?

P.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org