Fedora Rawhide-20180430.n.0 compose check report

2018-04-30 Thread Fedora compose checker
No missing expected images.

Failed openQA tests: 38/137 (x86_64), 14/24 (i386), 1/2 (arm)

ID: 231470  Test: x86_64 Server-dvd-iso base_services_start
URL: https://openqa.fedoraproject.org/tests/231470
ID: 231483  Test: x86_64 Workstation-live-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/231483
ID: 231484  Test: x86_64 Workstation-live-iso desktop_notifications_live
URL: https://openqa.fedoraproject.org/tests/231484
ID: 231485  Test: x86_64 Workstation-live-iso install_default_upload
URL: https://openqa.fedoraproject.org/tests/231485
ID: 231495  Test: x86_64 Workstation-boot-iso install_default
URL: https://openqa.fedoraproject.org/tests/231495
ID: 231497  Test: x86_64 Workstation-boot-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/231497
ID: 231499  Test: i386 Workstation-live-iso install_default
URL: https://openqa.fedoraproject.org/tests/231499
ID: 231500  Test: i386 Workstation-boot-iso memory_check
URL: https://openqa.fedoraproject.org/tests/231500
ID: 231501  Test: i386 Workstation-boot-iso install_default
URL: https://openqa.fedoraproject.org/tests/231501
ID: 231502  Test: x86_64 KDE-live-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/231502
ID: 231504  Test: x86_64 KDE-live-iso install_no_user
URL: https://openqa.fedoraproject.org/tests/231504
ID: 231506  Test: x86_64 KDE-live-iso base_services_start
URL: https://openqa.fedoraproject.org/tests/231506
ID: 231516  Test: arm Minimal-raw_xz-raw.xz 
install_arm_image_deployment_upload
URL: https://openqa.fedoraproject.org/tests/231516
ID: 231520  Test: x86_64 AtomicWorkstation-dvd_ostree-iso 
install_default_upload
URL: https://openqa.fedoraproject.org/tests/231520
ID: 231521  Test: x86_64 AtomicWorkstation-dvd_ostree-iso 
install_default@uefi
URL: https://openqa.fedoraproject.org/tests/231521
ID: 231523  Test: x86_64 AtomicWorkstation-dvd_ostree-iso install_no_user
URL: https://openqa.fedoraproject.org/tests/231523
ID: 231533  Test: x86_64 universal install_blivet_no_swap@uefi
URL: https://openqa.fedoraproject.org/tests/231533
ID: 231534  Test: x86_64 universal install_repository_http_graphical
URL: https://openqa.fedoraproject.org/tests/231534
ID: 231535  Test: x86_64 universal install_mirrorlist_graphical
URL: https://openqa.fedoraproject.org/tests/231535
ID: 231540  Test: x86_64 universal install_asian_language
URL: https://openqa.fedoraproject.org/tests/231540
ID: 231542  Test: x86_64 universal install_blivet_no_swap
URL: https://openqa.fedoraproject.org/tests/231542
ID: 231543  Test: x86_64 universal install_blivet_xfs
URL: https://openqa.fedoraproject.org/tests/231543
ID: 231544  Test: x86_64 universal install_blivet_software_raid
URL: https://openqa.fedoraproject.org/tests/231544
ID: 231545  Test: x86_64 universal install_blivet_lvmthin
URL: https://openqa.fedoraproject.org/tests/231545
ID: 231547  Test: x86_64 universal upgrade_desktop_encrypted_64bit
URL: https://openqa.fedoraproject.org/tests/231547
ID: 231549  Test: x86_64 universal upgrade_2_desktop_64bit
URL: https://openqa.fedoraproject.org/tests/231549
ID: 231552  Test: x86_64 universal upgrade_2_desktop_encrypted_64bit
URL: https://openqa.fedoraproject.org/tests/231552
ID: 231556  Test: x86_64 universal install_european_language
URL: https://openqa.fedoraproject.org/tests/231556
ID: 231557  Test: x86_64 universal install_cyrillic_language
URL: https://openqa.fedoraproject.org/tests/231557
ID: 231558  Test: x86_64 universal install_repository_http_variation
URL: https://openqa.fedoraproject.org/tests/231558
ID: 231569  Test: x86_64 universal install_iscsi
URL: https://openqa.fedoraproject.org/tests/231569
ID: 231570  Test: x86_64 universal install_blivet_ext3
URL: https://openqa.fedoraproject.org/tests/231570
ID: 231571  Test: x86_64 universal install_blivet_btrfs
URL: https://openqa.fedoraproject.org/tests/231571
ID: 231574  Test: x86_64 universal install_blivet_xfs@uefi
URL: https://openqa.fedoraproject.org/tests/231574
ID: 231575  Test: x86_64 universal install_blivet_lvmthin@uefi
URL: https://openqa.fedoraproject.org/tests/231575
ID: 231576  Test: x86_64 universal install_package_set_kde
URL: https://openqa.fedoraproject.org/tests/231576
ID: 231581  Test: x86_64 universal install_blivet_ext3@uefi
URL: https://openqa.fedoraproject.org/tests/231581
ID: 231582  Test: x86_64 universal install_blivet_btrfs@uefi
URL: https://openqa.fedoraproject.org/tests/231582
ID: 231585  Test: x86_64 universal upgrade_desktop_64bit
URL: https://openqa.fedoraproject.org/tests/231585
ID: 231587  Test: x86_64 universal upgrade_server_domain_controller
URL: https://openqa.fedoraproject.org/tests/231587
ID: 231590  Test: x86_64 universal install_blivet_software_raid@uefi
URL: https://openqa.fedoraproject.org/tests/231590
ID: 231593  Test: x86_64 universal install_lvmthin@uefi

[Fedocal] Reminder meeting : Modularity WG (once every two weeks)

2018-04-30 Thread jkurik
Dear all,

You are kindly invited to the meeting:
   Modularity WG (once every two weeks) on 2018-05-01 from 10:00:00 to 11:00:00 
US/Eastern
   At fedora-meetin...@irc.freenode.net

The meeting will be about:
Meeting of the Modularity Working Group.

More information available at: [Modularity Working Group wiki 
page](https://fedoraproject.org/wiki/Modularity_Working_Group)

The agenda for the meeting is available at [modularity-wg-agendas 
pad](https://board.net/p/modularity-wg-agendas).



Source: https://apps.fedoraproject.org/calendar/meeting/5249/

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: I would like to propose that we turn on XFS Reflink in Fedora 29 by default

2018-04-30 Thread Dusty Mabe


On 04/30/2018 02:16 PM, Neal Gompa wrote:

> 
> And there's still the fun restriction of XFS not being able to shrink. It's
> not particularly important in the server case, but in the desktop/laptop
> case, it happens enough in my experience that I'm not sure I'd want a
> default filesystem that can't shrink.

Yes! I've been wanting that for a long long time!

Dusty 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: I would like to propose that we turn on XFS Reflink in Fedora 29 by default

2018-04-30 Thread Neal Gompa
On Mon, Apr 30, 2018 at 2:14 PM Jason L Tibbitts III 
wrote:

> > "CW" == Colin Walters  writes:

> CW> I'd say it makes sense to revisit the default here globally in
> CW> Anaconda.

> Maybe.  Have the issues which made XFS less suitable for use on laptops
> been resolved?  The primary one I recall was that each mounted
> filesystem would have a corresponding kernel thread doing about 20
> wakeups per second.  This was not really good for battery life and power
> consumption in general.

> Last I checked (which was 2016 or so) those wakeups were slated to be
> around for a while longer.
> https://www.spinics.net/lists/xfs/msg40210.html


And there's still the fun restriction of XFS not being able to shrink. It's
not particularly important in the server case, but in the desktop/laptop
case, it happens enough in my experience that I'm not sure I'd want a
default filesystem that can't shrink.



-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: I would like to propose that we turn on XFS Reflink in Fedora 29 by default

2018-04-30 Thread Jason L Tibbitts III
> "CW" == Colin Walters  writes:

CW> I'd say it makes sense to revisit the default here globally in
CW> Anaconda.

Maybe.  Have the issues which made XFS less suitable for use on laptops
been resolved?  The primary one I recall was that each mounted
filesystem would have a corresponding kernel thread doing about 20
wakeups per second.  This was not really good for battery life and power
consumption in general.

Last I checked (which was 2016 or so) those wakeups were slated to be
around for a while longer.
https://www.spinics.net/lists/xfs/msg40210.html

 - J<
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Orphaning schroot package

2018-04-30 Thread Zach Carter

I'm orphaning the schroot package, since I no longer use it or work with it:

    https://src.fedoraproject.org/rpms/schroot

There is currently a serious (crash) bug affecting the package in F28:

    https://bugzilla.redhat.com/show_bug.cgi?id=1573253

Upstream:

    https://packages.debian.org/search?keywords=schroot

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F28 Self Contained Change: Stop building 389-ds-base on i686

2018-04-30 Thread Florian Weimer

On 04/05/2018 03:29 PM, Mark Reynolds wrote:



On 04/05/2018 07:02 AM, Florian Weimer wrote:

On 03/29/2018 10:59 PM, Mark Reynolds wrote:

I believe it's our cmocka tests that occur at rpm package time that
brought this to our attention.  So it is easy to reproduce.


Well, I tried, but the package no longer builds on rawhide, even on
x86_64:

libtool:   error: cannot find the library 'libldaputil.la' or
unhandled argument 'libldaputil.la'

We randomly see this build failure, sometimes the build completes, and
sometimes it fails with the the above error, and we are playing
wack-a-mole trying to fix it.  At first I thought it was a bug in gcc
(rawhide), but it still randomly fails.  I do have a patch I plan to
push upstream, but I don't know if it will fix it 100% of the time.


Okay, I assume this has been fixed now.

I removed ExcludeArch, enabled the %check section, and got this on i686:

https://koji.fedoraproject.org/koji/taskinfo?taskID=26683192

I don't see any test suite failures.

I'm afraid, unless you have concrete reproduction steps, I cannot really 
help you to fix this.


Thanks,
Florian
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Recommended way to pass CFLAGS/LDFLAGS through libtool

2018-04-30 Thread mcatanzaro
On Mon, Apr 30, 2018 at 10:25 AM, Yaakov Selkowitz 
 wrote:

gedit, like most GNOME components, uses gnome-autogen.sh; in this
particular case, iirc ACLOCAL_PATH="libgd" also needs to be set.


There's also AUTOPOINT='intltoolize --automake --copy' which gedit 
needs for autoreconf to not break things.


Of course, it'd be better to improve gedit's build system, but my point 
is that there are going to be problems building many modules if we try 
running autoreconf automatically. And trying to detect and run 
autogen.sh instead won't work, because it rightly often isn't 
distributed.


On Mon, Apr 30, 2018 at 10:25 AM, Yaakov Selkowitz 
 wrote:

like most GNOME components


BTW gnome-autogen.sh has been deprecated for a long time, so not much 
should be using it nowadays. gedit is kinda stuck in the past.


Michael
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: systemd in non-privileged container

2018-04-30 Thread Jan Pazdziora
On Mon, Apr 30, 2018 at 10:56:10AM -0400, Daniel Walsh wrote:
> 
> Perhaps it is time to update my blog on running systemd in a unprivileged
> container.

Let's get the base images fixed so that at least that

ENV container ...

is there by default, to minimize the number of steps that are needed.

-- 
Jan Pazdziora | adelton at #aos*, #brno
Sr. Principal Software Engineer, OpenShift Security Team, Red Hat
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: systemd in non-privileged container

2018-04-30 Thread Jan Pazdziora
On Fri, Apr 27, 2018 at 05:27:19PM +0200, Pavel Raiskup wrote:
> Hi all,
> 
> just wanted to let you know about trivial experiment [1] with systemd in
> container.  Non-privileged systemd can now pretty fine run in docker
> container (tested on Fedora 27 box).
> 
> Could we support this under fedora-kickstarts, or as a layered image?
> 
> [1] https://github.com/praiskup/systemd-container

The pull request

https://github.com/fedora-cloud/docker-brew-fedora/pull/45

to add the container environment variable to Fedora based images was
merged many month ago but it does not seem to have affected the images
that get built.

Does anyone have any idea what is the based container image build
process these days and in which repository we need to do the same
change to have the environment variable set by default?

-- 
Jan Pazdziora
Senior Principal Software Engineer, OpenShift Security Team, Red Hat
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Recommended way to pass CFLAGS/LDFLAGS through libtool

2018-04-30 Thread Yaakov Selkowitz
On 2018-04-30 09:01, mcatanz...@gnome.org wrote:
> On Mon, Apr 30, 2018 at 7:52 AM, Florian Weimer  wrote:
>> Such we change the guidelines to always run autoreconf?  This would
>> also help with new architecture bringup because those often need
>> autotools fixes, but it will choke on really old or manually patched
>> upstream configure scripts.
> 
> Some packages will not build when autoreconf is called outside
> autogen.sh, and these packages typically do not distribute autogen.sh.
> E.g. gedit.

gedit, like most GNOME components, uses gnome-autogen.sh; in this
particular case, iirc ACLOCAL_PATH="libgd" also needs to be set.

> Packagers would need to work around such issues.

FWIW, running autoreconf in one form or another (either directly, or
e.g. gnome-autogen.sh or mate-autogen) is standard procedure on Cygwin.
While this doesn't work on certain packages, the vast majority can be
autoreconf'd.

-- 
Yaakov Selkowitz
Software Engineer - Platform Enablement Group
Red Hat, Inc.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: systemd in non-privileged container

2018-04-30 Thread James Hogarth
On 30 April 2018 at 15:56, Daniel Walsh  wrote:
> On 04/30/2018 10:42 AM, James Hogarth wrote:
>>
>> On 27 April 2018 at 17:47, Pavel Raiskup  wrote:
>>>
>>> On Friday, April 27, 2018 5:41:19 PM CEST Lennart Poettering wrote:

 On Fr, 27.04.18 17:27, Pavel Raiskup (prais...@redhat.com) wrote:

> Hi all,
>
> just wanted to let you know about trivial experiment [1] with systemd
> in
> container.  Non-privileged systemd can now pretty fine run in docker
> container (tested on Fedora 27 box).

 Hmm, IIRC there were at least two isues still, did they get resolved?
 Specifically:

 1. docker fakes a /dev/console that doesn't behave like a console
 usually works, i.e. if a hangup is seen on it then it will destroy
 the pty behind it, instead of keeping it around...
>>>
>>> There't toy work-around to have at least something:
>>>
>>> https://github.com/praiskup/systemd-container/blob/master/fedora-rawhide-x86_64/systemd
>>>
>>> Pavel
>>>
 2. docker sends SIGTERM to the container's PID 1 when it wants it to
 go down even though SIGTERM to PID 1 on SysV systems generally
 means "please reexecute", and not "please shut down".

 What's the current state on that?

>> Did a bunch of related activities at my work recently ...
>>
>> If you are using Red Hat docker (eg from the RHEL/CentOS extras repo)
>> then this will get a systemd container running for you:
>>
>> Dockerfile:
>> FROM centos:7
>> ENV container docker
>> STOPSIGNAL SIGRTMIN+3
>> ENTRYPOINT ["/sbin/init"]
>> RUN yum -y update && yum clean all
>>
>> Run statement:
>> docker run -dt --name mycontainer mysystemdimage
>>
>> If you are using upstream docker then you need to do the following:
>> mkdir /etc/docker
>> echo '{"seccomp-profile": "/etc/docker/seccomp.json"}' >
>> /etc/docker/daemon.json
>> wget -O /etc/docker/seccomp.json
>> https://src.fedoraproject.org/rpms/docker/raw/master/f/seccomp.json
>>
>> Same dockerfile
>>
>> Run statement:
>> docker run -dt --tmpfs /tmp:exec --tmpfs /run -v
>> /sys/fs/cgroup:/sys/fs/cgroup:ro --name mycontainer mysystemdimage
>>
>> ___
>>
>> The real problem here is docker engines you don't control as the
>> seccomp filter is a potential blocker and potentially the run mount
>> options
>> ___
>> devel mailing list -- devel@lists.fedoraproject.org
>> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
>
>
> Perhaps it is time to update my blog on running systemd in a unprivileged
> container.
>

Not a bad idea ...

Oh and for reference the above blurb was mostly based on work we did
in the atomic/cloud/something working group around a year ago

https://pagure.io/atomic-wg/issue/233

https://fedoraproject.org/wiki/Container:Guidelines#systemd_Containers

The exec was added to /tmp since (at least upstream) docker mounts
--tmpfs as noexec and that upsets some applications (especially some
java bits) and if it wasn't clear by "Red Hat docker" that includes
the docker engine shipped in Fedora, not just in EL7.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Serious problem with SATA LPM in F28 on Lenovo 50 series laptops

2018-04-30 Thread Hans de Goede

Hi,

On 29-04-18 21:03, Alexander Ploumistos wrote:

Hello Hans,

I've just upgraded a G50-30 and like Christian, I can not reproduce the
issue. I logged into MATE and GNOME, played with the brightness settings
while plugged in and on battery, it did not hang.

# cat /sys/class/scsi_host/host*/link_power_management_policy
med_power_with_dipm
med_power_with_dipm


SMART data:

Model Family: Seagate FireCuda 2.5
Device Model: ST1000LX015-1U7172
Serial Number:
LU WWN Device Id: 5 000c50 0acde0e96
Firmware Version: SDM1
User Capacity:1,000,204,886,016 bytes [1.00 TB]
Sector Sizes: 512 bytes logical, 4096 bytes physical
Rotation Rate:5400 rpm
Form Factor:  2.5 inches
Device is:In smartctl database [for details use: -P show]
ATA Version is:   ACS-3 T13/2161-D revision 3b
SATA Version is:  SATA 3.1, 6.0 Gb/s (current: 3.0 Gb/s)
Local Time is:Sun Apr 29 20:48:35 2018 CEST
SMART support is: Available - device has SMART capability.
SMART support is: Enabled

I hope that helps,


It is good to hear that not everyone with a 50 series seems
affected, note though that of the 3 reporters so far only
one can reproduce with the brightness keys and the other
2 see a hard-freeze about once every 24 hours, so you might
be affected but not know it yet.

If you do experience unexplained freezes try disabling the
LPM, see:
https://fedoraproject.org/wiki/Common_F28_bugs#lpm-hang

And then wait for a few days to confirm the freeze is
really gone.

Regards,

Hans
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Serious problem with SATA LPM in F28 on Lenovo 50 series laptops

2018-04-30 Thread Hans de Goede

Hi,

On 30-04-18 12:59, Kamil Paral wrote:

On Sun, Apr 29, 2018 at 9:26 AM, Hans de Goede mailto:hdego...@redhat.com>> wrote:

Hi All,

I'm sending this to the fedora-kernel and -devel lists
both to get the kernel team aware of this and because it
is not entirely clear to me how to best deal with this.

I guess we should get this added to the release-notes /
common-bugs page for F28, but I'm not sure what the
procedure is for that ?


Hi Hans,
I added it to the common bugs page:
https://fedoraproject.org/wiki/Common_F28_bugs#lpm-hang


Thank you.


Feel free to edit it in any way. If you want to add a new entry in the future, 
just read the guidelines linked on that page, it's very simple. Thanks :)


It looks good, currently we really need to understand the
problem better so the generic wording you've chosen works well.

Regards,

Hans






I've just become aware that at least for some users
the use of SATA LPM in F28 causes the Lenovo 50
series laptops (confirmed X250, T450s G50-80) freeze/
hang hard under certain conditions when using SATA
LPM, independent of the disk used (*).


I have T450s and haven't seen any hang yet, but I've been using F28 on it just 
for 2 days now. I'll let you know if it happens.



___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: systemd in non-privileged container

2018-04-30 Thread Daniel Walsh

On 04/30/2018 10:42 AM, James Hogarth wrote:

On 27 April 2018 at 17:47, Pavel Raiskup  wrote:

On Friday, April 27, 2018 5:41:19 PM CEST Lennart Poettering wrote:

On Fr, 27.04.18 17:27, Pavel Raiskup (prais...@redhat.com) wrote:


Hi all,

just wanted to let you know about trivial experiment [1] with systemd in
container.  Non-privileged systemd can now pretty fine run in docker
container (tested on Fedora 27 box).

Hmm, IIRC there were at least two isues still, did they get resolved?
Specifically:

1. docker fakes a /dev/console that doesn't behave like a console
usually works, i.e. if a hangup is seen on it then it will destroy
the pty behind it, instead of keeping it around...

There't toy work-around to have at least something:
https://github.com/praiskup/systemd-container/blob/master/fedora-rawhide-x86_64/systemd

Pavel


2. docker sends SIGTERM to the container's PID 1 when it wants it to
go down even though SIGTERM to PID 1 on SysV systems generally
means "please reexecute", and not "please shut down".

What's the current state on that?


Did a bunch of related activities at my work recently ...

If you are using Red Hat docker (eg from the RHEL/CentOS extras repo)
then this will get a systemd container running for you:

Dockerfile:
FROM centos:7
ENV container docker
STOPSIGNAL SIGRTMIN+3
ENTRYPOINT ["/sbin/init"]
RUN yum -y update && yum clean all

Run statement:
docker run -dt --name mycontainer mysystemdimage

If you are using upstream docker then you need to do the following:
mkdir /etc/docker
echo '{"seccomp-profile": "/etc/docker/seccomp.json"}' > /etc/docker/daemon.json
wget -O /etc/docker/seccomp.json
https://src.fedoraproject.org/rpms/docker/raw/master/f/seccomp.json

Same dockerfile

Run statement:
docker run -dt --tmpfs /tmp:exec --tmpfs /run -v
/sys/fs/cgroup:/sys/fs/cgroup:ro --name mycontainer mysystemdimage

___

The real problem here is docker engines you don't control as the
seccomp filter is a potential blocker and potentially the run mount
options
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Perhaps it is time to update my blog on running systemd in a 
unprivileged container.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Non-responsive maintainer - Ivan Romanov

2018-04-30 Thread Vitaly Zaitsev
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hello!

According Non-responsive Maintainer Policy I'm asking the maintainer
to respond 3rd time and resolve issues with packages.

RHBZ ticket: https://bugzilla.redhat.com/show_bug.cgi?id=1564875

- --
Sincerely,
 Vitaly Zaitsev (vit...@easycoding.org)
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEGFSlHDlYR1Xq8pxov5n8bdRauQoFAlrnLLIACgkQv5n8bdRa
uQrH4A//ScT3Se/KyERafZsMw18KuEJ4EgBrnAkAWItOWNo9VppH12Zq+ZWwcUgo
iadXBbj0vV7f+oerFsQIU6U/TdBSqBb74/QAPwB41kftwzke1PX7oMehOJ5xKx4i
abbe715QTz+s8RZd2fWs6RoYiRehkA32Rj40N+r6ehAs5IgGGzRmpaz1BaninR2C
AkPWqUW9KaN+Uz+6pROJZk1EpKN9uzZsj6iM4N1zRYtP7vvszg3QUtWVUTYdU1XC
e0Q8yDPbw/wrwO356wgF77Zzviluj8QKacYwL6OVUeVClvWmbxqFvO0gcD9RL6+R
Et5xo4ZGLEX4saQpsmdtwYZkl7sLcc+C2NI6fnL8W2awykZgxKirkuafcqcJn+Mz
3b/nVzEvogUB6mObhVWo/eAlFhpb8Y1Sht09mrnowLBbPpSy1L9bLAZrApZNypis
4VptOTP5rpHJrj/QPzWm218QuNO/ZMjcdJYKEQs1QJExdbQUP1erBZOjSdceymA4
b1mDqxC6EAzqtup0zy4zfdX9OEmVrHPDrNZHKV94VSQD+xVQTU/LOVKE3c/Xt3GG
NRzpBA3CmqIdj+dyfR7RPjgzjVcNMkCb3HFPaDwWGvU2qGkLxtRFvGlUcHlGuILx
CE01hTMWFhg1C1BVAIUsR8w6SDy0Y7Snv+IczVF0BwsekTjyOig=
=fl7I
-END PGP SIGNATURE-
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: systemd in non-privileged container

2018-04-30 Thread James Hogarth
On 27 April 2018 at 17:47, Pavel Raiskup  wrote:
> On Friday, April 27, 2018 5:41:19 PM CEST Lennart Poettering wrote:
>> On Fr, 27.04.18 17:27, Pavel Raiskup (prais...@redhat.com) wrote:
>>
>> > Hi all,
>> >
>> > just wanted to let you know about trivial experiment [1] with systemd in
>> > container.  Non-privileged systemd can now pretty fine run in docker
>> > container (tested on Fedora 27 box).
>>
>> Hmm, IIRC there were at least two isues still, did they get resolved?
>> Specifically:
>>
>> 1. docker fakes a /dev/console that doesn't behave like a console
>>usually works, i.e. if a hangup is seen on it then it will destroy
>>the pty behind it, instead of keeping it around...
>
> There't toy work-around to have at least something:
> https://github.com/praiskup/systemd-container/blob/master/fedora-rawhide-x86_64/systemd
>
> Pavel
>
>> 2. docker sends SIGTERM to the container's PID 1 when it wants it to
>>go down even though SIGTERM to PID 1 on SysV systems generally
>>means "please reexecute", and not "please shut down".
>>
>> What's the current state on that?
>>

Did a bunch of related activities at my work recently ...

If you are using Red Hat docker (eg from the RHEL/CentOS extras repo)
then this will get a systemd container running for you:

Dockerfile:
FROM centos:7
ENV container docker
STOPSIGNAL SIGRTMIN+3
ENTRYPOINT ["/sbin/init"]
RUN yum -y update && yum clean all

Run statement:
docker run -dt --name mycontainer mysystemdimage

If you are using upstream docker then you need to do the following:
mkdir /etc/docker
echo '{"seccomp-profile": "/etc/docker/seccomp.json"}' > /etc/docker/daemon.json
wget -O /etc/docker/seccomp.json
https://src.fedoraproject.org/rpms/docker/raw/master/f/seccomp.json

Same dockerfile

Run statement:
docker run -dt --tmpfs /tmp:exec --tmpfs /run -v
/sys/fs/cgroup:/sys/fs/cgroup:ro --name mycontainer mysystemdimage

___

The real problem here is docker engines you don't control as the
seccomp filter is a potential blocker and potentially the run mount
options
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Recommended way to pass CFLAGS/LDFLAGS through libtool

2018-04-30 Thread Sérgio Basto
On Mon, 2018-04-30 at 09:01 -0500, mcatanz...@gnome.org wrote:
> On Mon, Apr 30, 2018 at 7:52 AM, Florian Weimer  
> wrote:
> > Such we change the guidelines to always run autoreconf?  This
> > would 
> > also help with new architecture bringup because those often need 
> > autotools fixes, but it will choke on really old or manually
> > patched 
> > upstream configure scripts.
> 
> Some packages will not build when autoreconf is called outside 
> autogen.sh, and these packages typically do not distribute
> autogen.sh. 
> E.g. gedit. Packagers would need to work around such issues.

Since this bug report [1] , It was recommended use autoreconf 
I try use autoreconf when it is possible . 

[1]
https://bugzilla.redhat.com/show_bug.cgi?id=922257#c0


> Michael
-- 
Sérgio M. B.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Recommended way to pass CFLAGS/LDFLAGS through libtool

2018-04-30 Thread Florian Weimer

On 04/30/2018 04:01 PM, mcatanz...@gnome.org wrote:
Some packages will not build when autoreconf is called outside 
autogen.sh, and these packages typically do not distribute autogen.sh. 
E.g. gedit. Packagers would need to work around such issues.


Isn't that against the spirit of the GPLv2 and against the GPLv3 proper? 
 Not distributing build scripts?


Thanks,
Florian
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Recommended way to pass CFLAGS/LDFLAGS through libtool

2018-04-30 Thread Pavel Raiskup
On Monday, April 30, 2018 2:52:54 PM CEST Florian Weimer wrote:
> On 04/09/2018 06:07 PM, Yaakov Selkowitz wrote:
> > On 2018-04-09 04:40, Florian Weimer wrote:
> >> On 04/09/2018 11:21 AM, Yaakov Selkowitz wrote:
> >>> On 2018-04-09 03:59, Florian Weimer wrote:
>  Is there a recommend way to get libtool to pass through all flags
>  specified in CFLAGS and LDFLAGS unchanged, and have the GCC compiler
>  driver sort out which flags to pass to the compiler/assembler/linker?
> >>>
> >>> $ libtool --mode=compile --help
> >>> [snip]
> >>> This mode accepts the following additional options:
> >>> [snip]
> >>> -Wc,FLAG  pass FLAG directly to the compiler
> >>>
> >>> $ libtool --mode=link --help
> >>> [snip]
> >>> The following components of LINK-COMMAND are treated specially:
> >>> [snip]
> >>> -Wc,FLAG
> >>> -Xcompiler FLAG   pass linker-specific FLAG directly to the compiler
> >>> -Wl,FLAG
> >>> -Xlinker FLAG pass linker-specific FLAG directly to the linker
> >>
> >> That doesn't solve the problem because there is a difference between
> >> passing a flag to the *linker* and passing it to the *compiler driver*
> >> while linking.
> >>
> >>> But, often when this happens, it is the fault of a poorly written
> >>> configure.ac or Makefile.am.  Where exactly are you seeing an issue?
> >>
> >> Everywhere?  libtool does not pass -specs= arguments in LDFLAGS to the
> >> linker invocation.
> > 
> > Then patch libtool.  I have in the past for similar issues, e.g.:
> > 
> > https://github.com/cygwinports/libtool/blob/master/2.4.5-pass-ldflags.patch
> > 
> > You will then have to assure that autoreconf is run within packages to
> > pick up the change.
> 
> We also have this in the %configure macro:
> 
>[ "%_configure_libtool_hardening_hack" = 1 ] && [ x != 
> "x%{_hardened_ldflags}" ] && \
>for i in $(find . -name ltmain.sh) ; do \
>  %{__sed} -i.backup -e 
> 's~compiler_flags=$~compiler_flags="%{_hardened_ldflags}"~' $i \
>done ; \
> 
> So we rewrite ltmain.sh in the source tree, which is extremely hackish 
> and contributes to the difficult-to-explain variance in build behavior.

Hack as hell, yes :-(.  Do you have concrete issues with the
difficult-to-explain behavior?  I could help maybe.

That hack is opt-in by %_hardened_build (defined by default though) and
opt-out by '%define _configure_libtool_hardening_hack 0' if that matters.
Same as %_configure_gnuconfig_hack (more than hardening that one is
related to new arches).

> Should we factor this out from %configure, so that it can be used for 
> packages which do not use autoconf with libtool, only the latter?

Dunno, it depends how much troubles that hack brings probably.

My feeling is that this discussion is driven by the hardening initiative,
which is a very good reason on one hand, no doubts;  but on the other hand
we can have very trivial post-build 'brp-*' whatever-script that will
protect us against accidental hardening mistakes.

> Such we change the guidelines to always run autoreconf?  This would also
> help with new architecture bringup because those often need autotools
> fixes, but it will choke on really old or manually patched upstream
> configure scripts.

I'd vote against guidelines _forcing_ us to do autoreconf; that would
bring all sort of other issues:

 - additional non-determinism
 - additional BuildRequires, that means larger buildroots (and the set
   of build-requires is sometimes unknown;  there might be some 'make
   dist' dependency which is hard to obtain, there's also gnulib, etc.)
 - harder rebuildability; packages designed for fedora rawhide would be
   harder to rebuild against epel-6 (because there are older autotools),
   and vice versa -- tarballs released when RHEL5 was a thing would be
   harder to rebuild on Rawhide
 - upgrading of autotools themselves would be a bit harder because there
   would be much larger amount of re-autotooled packages; so more FTBFS
   bugs;  this might sound lame but btw., even though maintainers wanted
   it and IMO it would be probably very good thing -- we've never got acks
   for rebasing autotools in RHEL, except for gettext AFAIR

I know Debian guys live somehow with that rule.  Still I don't like it.

> In any case, I think we need to document the available options and
> upsides and downsides.

Alright, some guidelines saying why/when yes/no re-autotoolize would be
handy.

Pavel

> 
> Thanks,
> Florian
> 



___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Recommended way to pass CFLAGS/LDFLAGS through libtool

2018-04-30 Thread mcatanzaro
On Mon, Apr 30, 2018 at 7:52 AM, Florian Weimer  
wrote:
Such we change the guidelines to always run autoreconf?  This would 
also help with new architecture bringup because those often need 
autotools fixes, but it will choke on really old or manually patched 
upstream configure scripts.


Some packages will not build when autoreconf is called outside 
autogen.sh, and these packages typically do not distribute autogen.sh. 
E.g. gedit. Packagers would need to work around such issues.


Michael
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Recommended way to pass CFLAGS/LDFLAGS through libtool

2018-04-30 Thread Florian Weimer

On 04/09/2018 06:07 PM, Yaakov Selkowitz wrote:

On 2018-04-09 04:40, Florian Weimer wrote:

On 04/09/2018 11:21 AM, Yaakov Selkowitz wrote:

On 2018-04-09 03:59, Florian Weimer wrote:

Is there a recommend way to get libtool to pass through all flags
specified in CFLAGS and LDFLAGS unchanged, and have the GCC compiler
driver sort out which flags to pass to the compiler/assembler/linker?


$ libtool --mode=compile --help
[snip]
This mode accepts the following additional options:
[snip]
    -Wc,FLAG  pass FLAG directly to the compiler

$ libtool --mode=link --help
[snip]
The following components of LINK-COMMAND are treated specially:
[snip]
    -Wc,FLAG
    -Xcompiler FLAG   pass linker-specific FLAG directly to the compiler
    -Wl,FLAG
    -Xlinker FLAG pass linker-specific FLAG directly to the linker


That doesn't solve the problem because there is a difference between
passing a flag to the *linker* and passing it to the *compiler driver*
while linking.


But, often when this happens, it is the fault of a poorly written
configure.ac or Makefile.am.  Where exactly are you seeing an issue?


Everywhere?  libtool does not pass -specs= arguments in LDFLAGS to the
linker invocation.


Then patch libtool.  I have in the past for similar issues, e.g.:

https://github.com/cygwinports/libtool/blob/master/2.4.5-pass-ldflags.patch

You will then have to assure that autoreconf is run within packages to
pick up the change.


We also have this in the %configure macro:

  [ "%_configure_libtool_hardening_hack" = 1 ] && [ x != 
"x%{_hardened_ldflags}" ] && \

  for i in $(find . -name ltmain.sh) ; do \
%{__sed} -i.backup -e 
's~compiler_flags=$~compiler_flags="%{_hardened_ldflags}"~' $i \

  done ; \

So we rewrite ltmain.sh in the source tree, which is extremely hackish 
and contributes to the difficult-to-explain variance in build behavior.


Should we factor this out from %configure, so that it can be used for 
packages which do not use autoconf with libtool, only the latter?


Such we change the guidelines to always run autoreconf?  This would also 
help with new architecture bringup because those often need autotools 
fixes, but it will choke on really old or manually patched upstream 
configure scripts.


In any case, I think we need to document the available options and 
upsides and downsides.


Thanks,
Florian
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Serious problem with SATA LPM in F28 on Lenovo 50 series laptops

2018-04-30 Thread Kamil Paral
On Sun, Apr 29, 2018 at 9:26 AM, Hans de Goede  wrote:

> Hi All,
>
> I'm sending this to the fedora-kernel and -devel lists
> both to get the kernel team aware of this and because it
> is not entirely clear to me how to best deal with this.
>
> I guess we should get this added to the release-notes /
> common-bugs page for F28, but I'm not sure what the
> procedure is for that ?
>

Hi Hans,
I added it to the common bugs page:
https://fedoraproject.org/wiki/Common_F28_bugs#lpm-hang

Feel free to edit it in any way. If you want to add a new entry in the
future, just read the guidelines linked on that page, it's very simple.
Thanks :)


>
> I've just become aware that at least for some users
> the use of SATA LPM in F28 causes the Lenovo 50
> series laptops (confirmed X250, T450s G50-80) freeze/
> hang hard under certain conditions when using SATA
> LPM, independent of the disk used (*).
>

I have T450s and haven't seen any hang yet, but I've been using F28 on it
just for 2 days now. I'll let you know if it happens.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Intent to orphan: rubygem-ronn, trac-code-comments-plugin

2018-04-30 Thread Vít Ondruch


Dne 28.4.2018 v 05:34 Ricky Elrod napsal(a):
> I am orphaning the packages:
> - rubygem-ronn

I'd like to take it ^^ over:

https://pagure.io/releng/issue/7471


Vít
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org