Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Jon Masters
On Fri, 2008-08-29 at 02:25 -0400, Jon Masters wrote:

> Now I'm no Fedora sysadmin (and the infrastructure doesn't appear to be
> publicly documented anywhere - beyond the basics) so it's likely that
> the mounts in question simply don't do ACLs right or you'd have already
> discussed it...but for the sake of mentioning it, you could just add an
> additional ACL onto the /pub/fedora directory writeable by master.

s/master/masher/

(too used to typing "Masters" when I start typing those letters)

Jon.


___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Jon Masters
On Wed, 2008-08-27 at 21:44 -0700, Jesse Keating wrote:

> We have another user, 'ftpsync' that has write access
> to /pub/fedora/.  Previously the rawhide script was ran as root, and
> thus it was no problem to su ftpsync for the rsync calls.  The masher
> user does not possess the capability of doing this.

Now I'm no Fedora sysadmin (and the infrastructure doesn't appear to be
publicly documented anywhere - beyond the basics) so it's likely that
the mounts in question simply don't do ACLs right or you'd have already
discussed it...but for the sake of mentioning it, you could just add an
additional ACL onto the /pub/fedora directory writeable by master.

Jon.


___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: New Key Repo Locations

2008-08-28 Thread Warren Togami

Jeroen van Meeuwen wrote:
Will the ISOs be respun to reflect the changes as well so that what is 
in os/ or in os.newkey/ meets what each of the ISO expects? I guess this 
is primarily relevant to respins, netinstalls and so forth, as the old 
RPM-GPG-KEYs will be in the root of those ISOs and I can only presume 
they are used, and people will want to use os.newkey/ as the tree to 
install from.

At this time, the isos will not be respun.  We will however re-sign the
SHA1SUM file with the new gpg key.  We are certain that the content on
the ISOs (and the numerous hard copies floating about) are safe.  The
only content to be left in the repos these isos will be able to access
out of the box will be the transition fedora-update release, and the
fixed packagekit for gpg importing.  We'll also have mirrormanager
direct all requests for the old dir directly to mirrors which we have
ultimate control over.



I'm not sure how that solves the net install use case, especially if 
mirrormanager is going to redirect to os.newkey/, as signatures used on 
os.newkey/ packages will not meet what the installer expects the 
signature to be on these files.




You misunderstand the New Key plan.  Mirrormanager for the existing 
repos fedora, updates and updates-testing will not redirect to the new 
location.  Please read the plan again carefully.


Warren Togami
[EMAIL PROTECTED]

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: New Key Repo Locations

2008-08-28 Thread Jesse Keating
On Fri, 2008-08-29 at 02:32 +0200, Jeroen van Meeuwen wrote:
> I'm not sure how that solves the net install use case, especially if 
> mirrormanager is going to redirect to os.newkey/, as signatures used on 
> os.newkey/ packages will not meet what the installer expects the 
> signature to be on these files.

See bug 998.  Installer doesn't expect keys.

> For the other part, where mirrormanager directs requests to mirrors we 
> have ultimate control over... is this going to interfere with the local 
> mirrors someone like myself may have set up at home and at multiple 
> customer sites? E.g., will clients in these netblocks be redirected to 
> mirrors the Fedora Project has ultimate control over, or am I 
> misunderstanding what you are saying?

It's only for the queries for the old location.  This drives all queries
for the old locations to our server so that we can get them the
transition fedora-release, pk and nothing else.  Once they get the new
fedora-release, they'll be hitting the new url, which mirror manager
will do the normal thing, drive them to site local, or drive them to geo
locations.  As to what to do about site local mirrors for the old
location, I don't think that has been fully discussed, that's probably a
good item for nit-picking.

> 
> >> Has creating/composing an entirely new 9.1/ release tree been 
> >> considered? I guess recreating the entire release tree is a PITA (jigdo, 
> >> iso, torrent, foo) even though updates would not be included other then 
> >> maybe the updated fedora-release package (with the new rpm-gpg-keys and 
> >> new repo configuration files)?
> > 
> > It was considered briefly, but not very much.  Calling something 9.1
> > would also have a bit of an assumption that we've fixed some bugs or
> > otherwise made it a better release, which we aren't doing.  We're merely
> > re-signing content and placing it in a slightly different directory, but
> > it's still 9, not 9+something.  (ditto 8)
> > 
> 
> This sounds to me like a not-really-technical argument. You're right in 
> that the naming in releases/X.Y does imply a new and improved install 
> tree. I think there's some other serious consequences to choosing to do 
> it in the original X/ release tree though. I'm thinking, who gives a c* 
> that there's not actually 'new and improved' content in the trees even 
> though the naming suggests that there is, while it does carry an 
> entirely new tree with ISOs and jigdo's and stuff that have the new 
> signed content and make a full match between what you download and what 
> you start using, like with a normal release.

It's a lot of work for little gain.  What you're downloading, the isos,
and what you start using, the content from the isos, will be matching,
the same.  It's the updates or extra packages you install after that
which will have a new key on them.  Rpm doesn't currently possess a way
to verify the GPG keys on installed packages, so I'm told, so those
installed from isos having the old key doesn't much matter.  It's the
new packages one would fetch over the internet that matter.

-- 
Jesse Keating
Fedora -- Freedom² is a feature!
identi.ca: http://identi.ca/jkeating


signature.asc
Description: This is a digitally signed message part
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: New Key Repo Locations

2008-08-28 Thread Jeroen van Meeuwen

Jesse Keating wrote:

On Fri, 2008-08-29 at 01:51 +0200, Jeroen van Meeuwen wrote:
If 9/ is excluded, wouldn't that mean 9/$releasever/*/os.newkey is also 
excluded? If it's not, then I guess there's no point in the new 
directory being created either.


Yes, if 9 is excluded (or included) that means the admin either doesn't
care about 9 and doesn't want to mirror it, or explicitly cares about it
and only wants to mirror it.  Either way I wish to honor those choices
by not changing the top level directory where "9" or "8" will be.  This
also means we won't have to re-file our export approval.



So, if 9/ is excluded from, say, the hourly sync a mirror does (since it 
only needs to be mirrored once), the os.newkey/ won't end up on the 
mirror, which is my primary concern. (I guess this has been answered, 
partly, in another reply in this thread already).


Will the ISOs be respun to reflect the changes as well so that what is 
in os/ or in os.newkey/ meets what each of the ISO expects? I guess this 
is primarily relevant to respins, netinstalls and so forth, as the old 
RPM-GPG-KEYs will be in the root of those ISOs and I can only presume 
they are used, and people will want to use os.newkey/ as the tree to 
install from.


At this time, the isos will not be respun.  We will however re-sign the
SHA1SUM file with the new gpg key.  We are certain that the content on
the ISOs (and the numerous hard copies floating about) are safe.  The
only content to be left in the repos these isos will be able to access
out of the box will be the transition fedora-update release, and the
fixed packagekit for gpg importing.  We'll also have mirrormanager
direct all requests for the old dir directly to mirrors which we have
ultimate control over.



I'm not sure how that solves the net install use case, especially if 
mirrormanager is going to redirect to os.newkey/, as signatures used on 
os.newkey/ packages will not meet what the installer expects the 
signature to be on these files.


For the other part, where mirrormanager directs requests to mirrors we 
have ultimate control over... is this going to interfere with the local 
mirrors someone like myself may have set up at home and at multiple 
customer sites? E.g., will clients in these netblocks be redirected to 
mirrors the Fedora Project has ultimate control over, or am I 
misunderstanding what you are saying?


Has creating/composing an entirely new 9.1/ release tree been 
considered? I guess recreating the entire release tree is a PITA (jigdo, 
iso, torrent, foo) even though updates would not be included other then 
maybe the updated fedora-release package (with the new rpm-gpg-keys and 
new repo configuration files)?


It was considered briefly, but not very much.  Calling something 9.1
would also have a bit of an assumption that we've fixed some bugs or
otherwise made it a better release, which we aren't doing.  We're merely
re-signing content and placing it in a slightly different directory, but
it's still 9, not 9+something.  (ditto 8)



This sounds to me like a not-really-technical argument. You're right in 
that the naming in releases/X.Y does imply a new and improved install 
tree. I think there's some other serious consequences to choosing to do 
it in the original X/ release tree though. I'm thinking, who gives a c* 
that there's not actually 'new and improved' content in the trees even 
though the naming suggests that there is, while it does carry an 
entirely new tree with ISOs and jigdo's and stuff that have the new 
signed content and make a full match between what you download and what 
you start using, like with a normal release.


Kind regards,

Jeroen van Meeuwen
-kanarip

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: New Key Repo Locations

2008-08-28 Thread Jesse Keating
On Thu, 2008-08-28 at 20:12 -0400, Jon Stanley wrote:
> Sorry for the top post, I'm on my crackberry. We need to male sure to
> CLEARLY communicate this to mirror admins. I'm sure that more than 1
> excludes releases/9/ since it is considered to be static content after
> release in order to reduce the number of files for rsync to consider.

Yes, of course, this wouldn't be a silent change.

-- 
Jesse Keating
Fedora -- Freedom² is a feature!
identi.ca: http://identi.ca/jkeating


signature.asc
Description: This is a digitally signed message part
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: New Key Repo Locations

2008-08-28 Thread Jon Stanley
Sorry for the top post, I'm on my crackberry. We need to male sure to
CLEARLY communicate this to mirror admins. I'm sure that more than 1
excludes releases/9/ since it is considered to be static content after
release in order to reduce the number of files for rsync to consider.



On 8/28/08, Jesse Keating <[EMAIL PROTECTED]> wrote:
> On Fri, 2008-08-29 at 01:51 +0200, Jeroen van Meeuwen wrote:
>> If 9/ is excluded, wouldn't that mean 9/$releasever/*/os.newkey is also
>> excluded? If it's not, then I guess there's no point in the new
>> directory being created either.
>
> Yes, if 9 is excluded (or included) that means the admin either doesn't
> care about 9 and doesn't want to mirror it, or explicitly cares about it
> and only wants to mirror it.  Either way I wish to honor those choices
> by not changing the top level directory where "9" or "8" will be.  This
> also means we won't have to re-file our export approval.
>
>>
>> Will the ISOs be respun to reflect the changes as well so that what is
>> in os/ or in os.newkey/ meets what each of the ISO expects? I guess this
>> is primarily relevant to respins, netinstalls and so forth, as the old
>> RPM-GPG-KEYs will be in the root of those ISOs and I can only presume
>> they are used, and people will want to use os.newkey/ as the tree to
>> install from.
>
> At this time, the isos will not be respun.  We will however re-sign the
> SHA1SUM file with the new gpg key.  We are certain that the content on
> the ISOs (and the numerous hard copies floating about) are safe.  The
> only content to be left in the repos these isos will be able to access
> out of the box will be the transition fedora-update release, and the
> fixed packagekit for gpg importing.  We'll also have mirrormanager
> direct all requests for the old dir directly to mirrors which we have
> ultimate control over.
>
>>
>> Has creating/composing an entirely new 9.1/ release tree been
>> considered? I guess recreating the entire release tree is a PITA (jigdo,
>> iso, torrent, foo) even though updates would not be included other then
>> maybe the updated fedora-release package (with the new rpm-gpg-keys and
>> new repo configuration files)?
>
> It was considered briefly, but not very much.  Calling something 9.1
> would also have a bit of an assumption that we've fixed some bugs or
> otherwise made it a better release, which we aren't doing.  We're merely
> re-signing content and placing it in a slightly different directory, but
> it's still 9, not 9+something.  (ditto 8)
>
> --
> Jesse Keating
> Fedora -- Freedom² is a feature!
> identi.ca: http://identi.ca/jkeating
>

-- 
Sent from Gmail for mobile | mobile.google.com

Jon Stanley
Fedora Bug Wrangler
[EMAIL PROTECTED]

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: New Key Repo Locations

2008-08-28 Thread Jesse Keating
On Fri, 2008-08-29 at 01:51 +0200, Jeroen van Meeuwen wrote:
> If 9/ is excluded, wouldn't that mean 9/$releasever/*/os.newkey is also 
> excluded? If it's not, then I guess there's no point in the new 
> directory being created either.

Yes, if 9 is excluded (or included) that means the admin either doesn't
care about 9 and doesn't want to mirror it, or explicitly cares about it
and only wants to mirror it.  Either way I wish to honor those choices
by not changing the top level directory where "9" or "8" will be.  This
also means we won't have to re-file our export approval.

> 
> Will the ISOs be respun to reflect the changes as well so that what is 
> in os/ or in os.newkey/ meets what each of the ISO expects? I guess this 
> is primarily relevant to respins, netinstalls and so forth, as the old 
> RPM-GPG-KEYs will be in the root of those ISOs and I can only presume 
> they are used, and people will want to use os.newkey/ as the tree to 
> install from.

At this time, the isos will not be respun.  We will however re-sign the
SHA1SUM file with the new gpg key.  We are certain that the content on
the ISOs (and the numerous hard copies floating about) are safe.  The
only content to be left in the repos these isos will be able to access
out of the box will be the transition fedora-update release, and the
fixed packagekit for gpg importing.  We'll also have mirrormanager
direct all requests for the old dir directly to mirrors which we have
ultimate control over.

> 
> Has creating/composing an entirely new 9.1/ release tree been 
> considered? I guess recreating the entire release tree is a PITA (jigdo, 
> iso, torrent, foo) even though updates would not be included other then 
> maybe the updated fedora-release package (with the new rpm-gpg-keys and 
> new repo configuration files)?

It was considered briefly, but not very much.  Calling something 9.1
would also have a bit of an assumption that we've fixed some bugs or
otherwise made it a better release, which we aren't doing.  We're merely
re-signing content and placing it in a slightly different directory, but
it's still 9, not 9+something.  (ditto 8)

-- 
Jesse Keating
Fedora -- Freedom² is a feature!
identi.ca: http://identi.ca/jkeating


signature.asc
Description: This is a digitally signed message part
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: New Key Repo Locations

2008-08-28 Thread Jeroen van Meeuwen

Warren Togami wrote:
This is the latest draft of New Key repo locations.  Jesse Keating 
points out that the deep levels are necessary because mirrors exclude 
releases by directory name like "9/".  Please let me know if you see any 
errors in the below.




If 9/ is excluded, wouldn't that mean 9/$releasever/*/os.newkey is also 
excluded? If it's not, then I guess there's no point in the new 
directory being created either.


Will the ISOs be respun to reflect the changes as well so that what is 
in os/ or in os.newkey/ meets what each of the ISO expects? I guess this 
is primarily relevant to respins, netinstalls and so forth, as the old 
RPM-GPG-KEYs will be in the root of those ISOs and I can only presume 
they are used, and people will want to use os.newkey/ as the tree to 
install from.


Has creating/composing an entirely new 9.1/ release tree been 
considered? I guess recreating the entire release tree is a PITA (jigdo, 
iso, torrent, foo) even though updates would not be included other then 
maybe the updated fedora-release package (with the new rpm-gpg-keys and 
new repo configuration files)?


Kind regards,

Jeroen van Meeuwen
-kanarip

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Jesse Keating
On Thu, 2008-08-28 at 18:38 +0200, Till Maas wrote:
> /bin/mail -s SUBJECT [EMAIL PROTECTED] -- -f [EMAIL PROTECTED] -F
> "freeform from 
> part"


Ah, that was the missing part.  Thanks.  I've tossed in git, will tag it
once the current run is done.

-- 
Jesse Keating
Fedora -- Freedom² is a feature!
identi.ca: http://identi.ca/jkeating


signature.asc
Description: This is a digitally signed message part
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


publictest15

2008-08-28 Thread Mike McGrath
Publictest15 is up and ready. If you were using publictest10, start
getting your stuff set back up on publictest15.  If you need things
restored create a ticket and let us know what and why.  Remember, the pt
servers don't get backed up, you should never be storing info there where
it is the only place that info exists.

-Mike

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: New Key Repo Locations

2008-08-28 Thread Jesse Keating
> On Thu, 2008-08-28 at 16:31 -0400, Warren Togami wrote:
> This is the latest draft of New Key repo locations.  Jesse Keating 
> points out that the deep levels are necessary because mirrors exclude 
> releases by directory name like "9/".  Please let me know if you see any 
> errors in the below.

Also, "newkey" is literal.

-- 
Jesse Keating
Fedora -- Freedom² is a feature!
identi.ca: http://identi.ca/jkeating


signature.asc
Description: This is a digitally signed message part
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


New Key Repo Locations

2008-08-28 Thread Warren Togami
This is the latest draft of New Key repo locations.  Jesse Keating 
points out that the deep levels are necessary because mirrors exclude 
releases by directory name like "9/".  Please let me know if you see any 
errors in the below.


Release Before (no yum repo file)
http://download.fedora.redhat.com/pub/fedora/linux/releases/$releasever/Fedora/$basearch/os/
Release After (no yum repo file)
http://download.fedora.redhat.com/pub/fedora/linux/releases/$releasever/Fedora/$basearch/os.newkey/

fedora
http://download.fedora.redhat.com/pub/fedora/linux/releases/$releasever/Everything/$basearch/os/
fedora-newkey
http://download.fedora.redhat.com/pub/fedora/linux/releases/$releasever/Everything/$basearch/os.newkey/

fedora-debuginfo
http://download.fedora.redhat.com/pub/fedora/linux/releases/$releasever/Everything/$basearch/debug/
fedora-debuginfo-newkey
http://download.fedora.redhat.com/pub/fedora/linux/releases/$releasever/Everything/$basearch/debug.newkey/

fedora-source
http://download.fedora.redhat.com/pub/fedora/linux/releases/$releasever/Everything/source/SRPMS/
fedora-source-newkey
http://download.fedora.redhat.com/pub/fedora/linux/releases/$releasever/Everything/source/SRPMS.newkey/

updates
http://download.fedora.redhat.com/pub/fedora/linux/updates/$releasever/$basearch/
updates-newkey
http://download.fedora.redhat.com/pub/fedora/linux/updates/$releasever/$basearch.newkey/

updates-debuginfo
http://download.fedora.redhat.com/pub/fedora/linux/updates/$releasever/$basearch/debug/
updates-debuginfo-newkey
http://download.fedora.redhat.com/pub/fedora/linux/updates/$releasever/$basearch.newkey/debug/

updates-source
http://download.fedora.redhat.com/pub/fedora/linux/updates/$releasever/SRPMS/
updates-source-newkey
http://download.fedora.redhat.com/pub/fedora/linux/updates/$releasever/SRPMS.newkey/

updates-testing
http://download.fedora.redhat.com/pub/fedora/linux/updates/testing/$releasever/$basearch/
updates-testing-newkey
http://download.fedora.redhat.com/pub/fedora/linux/updates/testing/$releasever/$basearch.newkey/

updates-testing-debuginfo
http://download.fedora.redhat.com/pub/fedora/linux/updates/testing/$releasever/$basearch/debug/
updates-testing-debuginfo-newkey
http://download.fedora.redhat.com/pub/fedora/linux/updates/testing/$releasever/$basearch.newkey/debug/

updates-testing-source
http://download.fedora.redhat.com/pub/fedora/linux/updates/testing/$releasever/SRPMS/
updates-testing-source-newkey
http://download.fedora.redhat.com/pub/fedora/linux/updates/testing/$releasever/SRPMS.newkey/

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Jesse Keating
On Thu, 2008-08-28 at 14:58 -0500, Mike McGrath wrote:
> > Is changing the user that owns the files going to cause unnecessary rsync
> > churn for mirrors?
> >
> 
> Only if we change the uid of ftpsync.  If we change the uid of masher
> we're good on the mirrors.

I went the sudo route.  I was able to narrow the command down
considerably for safety.

-- 
Jesse Keating
Fedora -- Freedom² is a feature!
identi.ca: http://identi.ca/jkeating


signature.asc
Description: This is a digitally signed message part
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Introductions

2008-08-28 Thread Frank Chiulli
2008/8/28 Mike <[EMAIL PROTECTED]>:
> Toshio,
>
> I am most definitely interested, I will jump on IRC as soon as I can find a
> hole in the firewall at work,  Otherwise I will be on when I get back home.
> I am in US Central Time.  if I can find a hole before the meeting I will
> attend.
>
> if possible can you shoot me an email with a cli project so I can get a jump
> on it.
>
>

Mike,
You might take a look at http://www.mibbit.com.  It's a web interface to IRC.

Frank

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Mike McGrath
On Thu, 28 Aug 2008, Bill Nottingham wrote:

> Jesse Keating ([EMAIL PROTECTED]) said:
> > So I realized something last night.  We created a user "masher" to have
> > the ability to write to /mnt/koji/mash/ but not any of the other koji
> > space.  This is useful to prevent too much damage from a horribly wrong
> > rawhide compose.  To make things easier in the rawhide compose configs,
> > we decided to run the cron/scripts as the masher user.  This is also
> > good because it means things run unprivileged.  However I ran into a
> > snag.  We have another user, 'ftpsync' that has write access
> > to /pub/fedora/.  Previously the rawhide script was ran as root, and
> > thus it was no problem to su ftpsync for the rsync calls.  The masher
> > user does not possess the capability of doing this.
> >
> > Since the ftpsync user is only really used to sync data onto the Fedora
> > netapp, I propose that we collapse ftpsync and masher into one user
> > (masher).  It'll require minimal puppet changes, mostly just moving some
> > cron jobs from ftpsync over to masher.  It will require UID changes,
> > either changing masher to the ftpsync UID (which breaks our new range we
> > just setup), or chmodding some stuff on the Fedora netapp and changing
> > what UID has write access there.
> >
> > For now, I'm syncing rawhide by hand.
> >
> > Comments?
>
> Is changing the user that owns the files going to cause unnecessary rsync
> churn for mirrors?
>

Only if we change the uid of ftpsync.  If we change the uid of masher
we're good on the mirrors.

-Mike

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Bill Nottingham
Jesse Keating ([EMAIL PROTECTED]) said: 
> So I realized something last night.  We created a user "masher" to have
> the ability to write to /mnt/koji/mash/ but not any of the other koji
> space.  This is useful to prevent too much damage from a horribly wrong
> rawhide compose.  To make things easier in the rawhide compose configs,
> we decided to run the cron/scripts as the masher user.  This is also
> good because it means things run unprivileged.  However I ran into a
> snag.  We have another user, 'ftpsync' that has write access
> to /pub/fedora/.  Previously the rawhide script was ran as root, and
> thus it was no problem to su ftpsync for the rsync calls.  The masher
> user does not possess the capability of doing this.
> 
> Since the ftpsync user is only really used to sync data onto the Fedora
> netapp, I propose that we collapse ftpsync and masher into one user
> (masher).  It'll require minimal puppet changes, mostly just moving some
> cron jobs from ftpsync over to masher.  It will require UID changes,
> either changing masher to the ftpsync UID (which breaks our new range we
> just setup), or chmodding some stuff on the Fedora netapp and changing
> what UID has write access there.
> 
> For now, I'm syncing rawhide by hand.
> 
> Comments?

Is changing the user that owns the files going to cause unnecessary rsync
churn for mirrors?

Bill

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Introductions

2008-08-28 Thread Mike
Toshio,

I am most definitely interested, I will jump on IRC as soon as I can find a
hole in the firewall at work,  Otherwise I will be on when I get back home.
I am in US Central Time.  if I can find a hole before the meeting I will
attend.

if possible can you shoot me an email with a cli project so I can get a jump
on it.


2008/8/28 Toshio Kuratomi <[EMAIL PROTECTED]>

> Mike Watters wrote:
>
>> Hello,
>> I have applied to the sysadmin group and would like to give you an
>> overview my experience.
>>
>> I have been a systems admin or security analyst for 12 years at 3 major
>> worldwide (US based) companies.  the majority of the time I was a systems
>> admin for Solaris, AIX
>> I did about 2years of admin work for SGI and HPUX boxes.  I did 2 years of
>> security analyst for Solaris, AIX and RHEL. I have been using Fedora from
>>  Fedora 7 release.  I am proficient in Perl, bash, ksh scripting.  I am
>> competent with C, C++ and Java ( I prefer C )  I am looking to learn Python.
>>
>> My programming/scripting is almost all CLI apps.  I did some TCL/TK stuff
>> long ago.
>> I am learning GTK and Glade in my free time. using libglade and C.
>>
>> I am looking for a sponsor for the Sysadmin group
>>
>> Please let me know if you would like any further info.
>>
>> personal info.  I have been married for 9 years and have 3 children, 2
>> boys 7 and 5 and 1 girl 18mo.  I shoot pool on an APA league one night a
>> week,  I took the summer off to get some projects done around the house.  I
>> look to start again in a couple of weeks for the Fall session. I am a SL 5
>> in the APA.  the ratings are from 2 ( extreme  novice )  to 7 ( break and
>> run 3 or more of 10 racks )
>>
>>
> Hi Mike,  are you interested in continuing to learn python?  If so, I have
> a bunch of projects that you can help out with from command line apps to
> TurboGears web applications.
>
> If you're on IRC, you can ping me on irc.freenode.net #fedora-admin
> abadger1999 and let me know what you might be interested in.
>
> -Toshio
>
>
> ___
> Fedora-infrastructure-list mailing list
> Fedora-infrastructure-list@redhat.com
> https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list
>
>
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Strange popen behavior on xen builders?

2008-08-28 Thread Orion Poplawski

Orion Poplawski wrote:

Orion Poplawski wrote:
Filed bug #459442 as I have a simple test case.  Once everything is 
back up we can test again.




It appears that the pipe2 syscall on the x86_64 xen kernels is broken 
and that rawhide glibc has moved to using pipe2 from pipe in rawhide.


This seems like a blocker to me.



Okay, looks like a known issue with the xen kernels.  New test kernels 
are available, see the bug for more info.  We should get a fixed version 
onto the Fedora xen builders very soon, and maybe disable them until 
they can be fixed?


--
Orion Poplawski
Technical Manager 303-415-9701 x222
NWRA/CoRA DivisionFAX: 303-415-9702
3380 Mitchell Lane  [EMAIL PROTECTED]
Boulder, CO 80301  http://www.cora.nwra.com

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Introductions

2008-08-28 Thread Toshio Kuratomi

Mike Watters wrote:

Hello,
I have applied to the sysadmin group and would like to give you an 
overview my experience.


I have been a systems admin or security analyst for 12 years at 3 major 
worldwide (US based) companies.  the majority of the time I was a 
systems admin for Solaris, AIX
I did about 2years of admin work for SGI and HPUX boxes.  I did 2 years 
of security analyst for Solaris, AIX and RHEL. I have been using Fedora 
from  Fedora 7 release.  I am proficient in Perl, bash, ksh scripting.  
I am competent with C, C++ and Java ( I prefer C )  I am looking to 
learn Python.


My programming/scripting is almost all CLI apps.  I did some TCL/TK 
stuff long ago.

I am learning GTK and Glade in my free time. using libglade and C.

I am looking for a sponsor for the Sysadmin group

Please let me know if you would like any further info.

personal info.  I have been married for 9 years and have 3 children, 2 
boys 7 and 5 and 1 girl 18mo.  I shoot pool on an APA league one night a 
week,  I took the summer off to get some projects done around the 
house.  I look to start again in a couple of weeks for the Fall session. 
I am a SL 5 in the APA.  the ratings are from 2 ( extreme  novice )  to 
7 ( break and run 3 or more of 10 racks )




Hi Mike,  are you interested in continuing to learn python?  If so, I 
have a bunch of projects that you can help out with from command line 
apps to TurboGears web applications.


If you're on IRC, you can ping me on irc.freenode.net #fedora-admin 
abadger1999 and let me know what you might be interested in.


-Toshio



signature.asc
Description: OpenPGP digital signature
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Xavier Lamien
2008/8/28 Jesse Keating <[EMAIL PROTECTED]>

> On Thu, 2008-08-28 at 08:52 +0200, Xavier Lamien wrote:
> > yeah, you can easily do that by invoking : /bin/mail -r From_adress
> > hope that mailx is up to date ;)
>
> Looks like that's not working in EL5.  Pitty.
>

hm... is installed rhel-5.2 working with mailx-8.1.1 on the box ?

if so, that will imply to update it.
This feature has been integrated from release 9.25

another way could be to add ~r From-adress in the header of the file content
(should work for version =< 10.2 ).

-- 
Xavier.t Lamien
--
http://fedoraproject.org/wiki/XavierLamien
GPG-Key ID: F3903DEB
Fingerprint: 0F2A 7A17 0F1B 82EE FCBF 1F51 76B7 A28D F390 3DEB
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Till Maas
On Thu August 28 2008, Jesse Keating wrote:
> On Thu, 2008-08-28 at 08:52 +0200, Xavier Lamien wrote:
> > yeah, you can easily do that by invoking : /bin/mail -r From_adress
> > hope that mailx is up to date ;)
>
> Looks like that's not working in EL5.  Pitty.

This works for me on CentOS 5, after the "--" sendmail options can be used:

/bin/mail -s SUBJECT [EMAIL PROTECTED] -- -f [EMAIL PROTECTED] -F "freeform 
from 
part"

Regards,
Till


signature.asc
Description: This is a digitally signed message part.
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Jeffrey Ollie
On Thu, Aug 28, 2008 at 11:27 AM, Seth Vidal <[EMAIL PROTECTED]> wrote:
> On Thu, 2008-08-28 at 09:22 -0700, Jesse Keating wrote:
>> On Thu, 2008-08-28 at 08:52 +0200, Xavier Lamien wrote:
>> > yeah, you can easily do that by invoking : /bin/mail -r From_adress
>> > hope that mailx is up to date ;)
>>
>> Looks like that's not working in EL5.  Pitty.
>
> a simple python script to do that is easy enough.

Looks like configs/system/sendmail-unicode.py is already out there...

-- 
Jeff Ollie

"You know, I used to think it was awful that life was so unfair. Then
I thought, wouldn't it be much worse if life were fair, and all the
terrible things that happen to us come because we actually deserve
them? So, now I take great comfort in the general hostility and
unfairness of the universe."

-- Marcus to Franklin in Babylon 5: "A Late Delivery from Avalon"

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Seth Vidal
On Thu, 2008-08-28 at 09:22 -0700, Jesse Keating wrote:
> On Thu, 2008-08-28 at 08:52 +0200, Xavier Lamien wrote:
> > yeah, you can easily do that by invoking : /bin/mail -r From_adress
> > hope that mailx is up to date ;)
> 
> Looks like that's not working in EL5.  Pitty.
> 

a simple python script to do that is easy enough.

-sv


___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Jesse Keating
On Thu, 2008-08-28 at 08:52 +0200, Xavier Lamien wrote:
> yeah, you can easily do that by invoking : /bin/mail -r From_adress
> hope that mailx is up to date ;)

Looks like that's not working in EL5.  Pitty.

-- 
Jesse Keating
Fedora -- Freedom² is a feature!
identi.ca: http://identi.ca/jkeating


signature.asc
Description: This is a digitally signed message part
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Jesse Keating
On Thu, 2008-08-28 at 11:57 +0200, Jeroen van Meeuwen wrote:
> 
> You could configure sudoers to allow the masher user to only be able to 
> execute whatever it sudo's as the ftpsync user:
> 
> masher hostname.domain.tld=(ftpsync) NOPASSWD: rsync $rsync_opts 
> foo. bar
> 
> Does that narrow it down sufficiently?

I think so.  I'll play with this some today.

-- 
Jesse Keating RHCE  (http://jkeating.livejournal.com)
Fedora Project  (http://fedoraproject.org/wiki/JesseKeating)
GPG Public Key  (geek.j2solutions.net/jkeating.j2solutions.pub)
identi.ca   (http://identi.ca/jkeating)


signature.asc
Description: This is a digitally signed message part
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Mike McGrath
On Thu, 28 Aug 2008, Seth Vidal wrote:

> On Thu, 2008-08-28 at 08:42 -0500, Mike McGrath wrote:
> > On Wed, 27 Aug 2008, Jesse Keating wrote:
> >
> > > So I realized something last night.  We created a user "masher" to have
> > > the ability to write to /mnt/koji/mash/ but not any of the other koji
> > > space.  This is useful to prevent too much damage from a horribly wrong
> > > rawhide compose.  To make things easier in the rawhide compose configs,
> > > we decided to run the cron/scripts as the masher user.  This is also
> > > good because it means things run unprivileged.  However I ran into a
> > > snag.  We have another user, 'ftpsync' that has write access
> > > to /pub/fedora/.  Previously the rawhide script was ran as root, and
> > > thus it was no problem to su ftpsync for the rsync calls.  The masher
> > > user does not possess the capability of doing this.
> > >
> > > Since the ftpsync user is only really used to sync data onto the Fedora
> > > netapp, I propose that we collapse ftpsync and masher into one user
> > > (masher).  It'll require minimal puppet changes, mostly just moving some
> > > cron jobs from ftpsync over to masher.  It will require UID changes,
> > > either changing masher to the ftpsync UID (which breaks our new range we
> > > just setup), or chmodding some stuff on the Fedora netapp and changing
> > > what UID has write access there.
> > >
> > > For now, I'm syncing rawhide by hand.
> > >
> > > Comments?
> >
> > Fine by me.  ftpsync isn't really one of ours anyway :)
> >
>
> it and masher are, however, names that need to get added to the banlist
> in fas, I think.
>

Anyone care to think of a less manual way of doing this?

-Mike

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Seth Vidal
On Thu, 2008-08-28 at 08:42 -0500, Mike McGrath wrote:
> On Wed, 27 Aug 2008, Jesse Keating wrote:
> 
> > So I realized something last night.  We created a user "masher" to have
> > the ability to write to /mnt/koji/mash/ but not any of the other koji
> > space.  This is useful to prevent too much damage from a horribly wrong
> > rawhide compose.  To make things easier in the rawhide compose configs,
> > we decided to run the cron/scripts as the masher user.  This is also
> > good because it means things run unprivileged.  However I ran into a
> > snag.  We have another user, 'ftpsync' that has write access
> > to /pub/fedora/.  Previously the rawhide script was ran as root, and
> > thus it was no problem to su ftpsync for the rsync calls.  The masher
> > user does not possess the capability of doing this.
> >
> > Since the ftpsync user is only really used to sync data onto the Fedora
> > netapp, I propose that we collapse ftpsync and masher into one user
> > (masher).  It'll require minimal puppet changes, mostly just moving some
> > cron jobs from ftpsync over to masher.  It will require UID changes,
> > either changing masher to the ftpsync UID (which breaks our new range we
> > just setup), or chmodding some stuff on the Fedora netapp and changing
> > what UID has write access there.
> >
> > For now, I'm syncing rawhide by hand.
> >
> > Comments?
> 
> Fine by me.  ftpsync isn't really one of ours anyway :)
> 

it and masher are, however, names that need to get added to the banlist
in fas, I think.

-sv


___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Mike McGrath
On Wed, 27 Aug 2008, Jesse Keating wrote:

> So I realized something last night.  We created a user "masher" to have
> the ability to write to /mnt/koji/mash/ but not any of the other koji
> space.  This is useful to prevent too much damage from a horribly wrong
> rawhide compose.  To make things easier in the rawhide compose configs,
> we decided to run the cron/scripts as the masher user.  This is also
> good because it means things run unprivileged.  However I ran into a
> snag.  We have another user, 'ftpsync' that has write access
> to /pub/fedora/.  Previously the rawhide script was ran as root, and
> thus it was no problem to su ftpsync for the rsync calls.  The masher
> user does not possess the capability of doing this.
>
> Since the ftpsync user is only really used to sync data onto the Fedora
> netapp, I propose that we collapse ftpsync and masher into one user
> (masher).  It'll require minimal puppet changes, mostly just moving some
> cron jobs from ftpsync over to masher.  It will require UID changes,
> either changing masher to the ftpsync UID (which breaks our new range we
> just setup), or chmodding some stuff on the Fedora netapp and changing
> what UID has write access there.
>
> For now, I'm syncing rawhide by hand.
>
> Comments?

Fine by me.  ftpsync isn't really one of ours anyway :)

-Mike

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Introductions

2008-08-28 Thread Mike McGrath
On Wed, 27 Aug 2008, Mike Watters wrote:

> Hello,
> I have applied to the sysadmin group and would like to give you an overview my
> experience.
>
> I have been a systems admin or security analyst for 12 years at 3 major
> worldwide (US based) companies.  the majority of the time I was a systems
> admin for Solaris, AIX
> I did about 2years of admin work for SGI and HPUX boxes.  I did 2 years of
> security analyst for Solaris, AIX and RHEL. I have been using Fedora from
> Fedora 7 release.  I am proficient in Perl, bash, ksh scripting.  I am
> competent with C, C++ and Java ( I prefer C )  I am looking to learn Python.
>
> My programming/scripting is almost all CLI apps.  I did some TCL/TK stuff long
> ago.
> I am learning GTK and Glade in my free time. using libglade and C.
>
> I am looking for a sponsor for the Sysadmin group
>
> Please let me know if you would like any further info.
>
> personal info.  I have been married for 9 years and have 3 children, 2 boys 7
> and 5 and 1 girl 18mo.  I shoot pool on an APA league one night a week,  I
> took the summer off to get some projects done around the house.  I look to
> start again in a couple of weeks for the Fall session. I am a SL 5 in the APA.
> the ratings are from 2 ( extreme  novice )  to 7 ( break and run 3 or more of
> 10 racks )
>

Welcome Mike!  Keep on people until you find a sponsor.  Make sure to come
to our meetings if you can make them:

http://fedoraproject.org/wiki/Infrastructure/Meetings

-Mike

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: hello

2008-08-28 Thread Amitakhya Phukan
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Amitakhya Phukan wrote:
> Mike McGrath wrote:
>> On Wed, 2 Jul 2008, Amitakhya Phukan wrote:
>>
>>
>>> hi people!
>>>
>>> i was away for a long time and now i am back. i am looking
>>> forward to contributing to fedora infrastructure now and am
>>> looking for some work :)
>>>
>>> can anyone please help me out here ?
>>>
>>>
>> Sounds like you need a sponsor!  Which FIG are you interested in?
>>
>>
>> -Mike
> hi,
>
> sysadmin-test and sysadmin-hosted interest me as of now.
>
> regards, amit.
hi,

anyone out there to sponsor me ? :)

regards,
amit.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iEYEARECAAYFAki2nQ0ACgkQisV6fTFpwA05NwCeNDi4M+DhhKCydwEs8X3G08W5
hDAAn1KvNl1o658WB92fnMDZSpvhIN/s
=AzUe
-END PGP SIGNATURE-

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: rawhide, /mnt/koji and /pub/fedora

2008-08-28 Thread Jeroen van Meeuwen

Nigel Jones wrote:

On Wed, 2008-08-27 at 21:52 -0700, Jesse Keating wrote:

On Wed, 2008-08-27 at 21:44 -0700, Jesse Keating wrote:

Comments?

One comment just made on IRC by G:

 f13: can't be allow masher to sudo to ftpsync and run a sync
command?


G = $me :)

We would have to allow masher to sudo with no password in order to run
the rsync command.  I'm not sure how far we can narrow it down since the
rsync source changes each day, only the dest (and other options) remain
the same.

Why not something like:

sudo /usr/local/bin/rawhideftpsync.sh 
that runs: rsync  ...

Just a thought.


You could configure sudoers to allow the masher user to only be able to 
execute whatever it sudo's as the ftpsync user:


masher hostname.domain.tld=(ftpsync) NOPASSWD: rsync $rsync_opts 
foo. bar


Does that narrow it down sufficiently?

Kind regards,

Jeroen van Meeuwen
-kanarip

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list