Re: Release criteria proposal: networking requirements

2022-03-01 Thread Ben Cotton
On Mon, Feb 28, 2022 at 12:37 PM Adam Williamson
 wrote:
>
> So, uh, we sorta forgot about this. Kamil approved this draft, but
> nobody else gave any feedback on it. This topic is still relevant and
> we have a proposed VPN blocker today, so...any more feedback on this
> draft?

I think it's sound enough to start using. I'm sure we'll find all
sorts of edge cases to argue over and eventually fix. That's the
Fedora Way™.


-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Release criteria proposal: networking requirements

2022-02-28 Thread Adam Williamson
On Fri, 2020-08-28 at 16:59 -0700, Adam Williamson wrote:
> On Fri, 2020-08-21 at 17:11 -0700, Adam Williamson wrote:
> > Hi folks!
> > 
> > So at this week's blocker review meeting, the fact that we don't have
> > explicit networking requirements in the release criteria really started
> > to bite us. In the past we have squeezed networking-related issues in
> > under other criteria, but for some issues that's really difficult,
> > notably VPN issues. So, we agreed we should draft some explicit
> > networking criteria.
> 
> Update: here's a second draft with feedback so far incorporated, thanks
> to everyone. Still mulling over whether/how to split it more across
> milestones.
> 
> === Network requirements ===
> 
> Each of these requirements apply to both installer and installed system
> environments. For any given installer environment, the 'default network
> configuration tools' are considered to be those the installer documents
> as supported ways to configure networking (e.g. for anaconda-based
> environments, configuration via kernel command line options, a
> kickstart, or interactively in anaconda itself are included).
> 
>  Basic networking 
> 
> It must be possible to establish both IPv4 and IPv6 network connections
> using both typical router-provided addressing systems (e.g. DHCP on
> IPv4 or SLAAC or IPv6) and static addressing. The default network
> configuration tools for the console, for release-blocking desktops and
> for installer environments must work well enough to allow typical
> network connection configuration operations without major workarounds.
> Standard network functions such as address resolution and connections
> with common protocols such as ping, HTTP and ssh must work as expected.
> 
> Footnote titled "Supported hardware": Supported network hardware is
> hardware for which the Fedora kernel includes drivers and, where
> necessary, for which a firmware package is available. If support for a
> commonly-used piece or type of network hardware that would usually be
> present is omitted, that may constitute a violation of this criterion,
> after consideration of the [[Blocker_Bug_FAQ|hardware-dependent-
> issues|normal factors for hardware-dependent issues]]. Similarly,
> violations of this criteria that are hardware or configuration
> dependent are, as usual, subject to consideration of those factors when
> determining whether they are release-blocking
> 
>  VPN connections 
> 
> Using the default network configuration tools for the console and for
> release-blocking desktops, it must be possible to establish a working
> connection to common OpenVPN, openconnect-supported and vpnc-supported
> VPN servers with typical configurations.
> 
> Footnote titled "Supported servers and configurations": As there are
> many different VPN server applications and configurations, blocker
> reviewers must use their best judgment in determining whether
> violations of this criterion are likely to be encountered commonly
> enough to block a release, and if so, at which milestone. As a general
> principle, the more people are likely to use affected servers and the
> less complicated the configuration required to hit the bug, the more
> likely it is to be a blocker.

So, uh, we sorta forgot about this. Kamil approved this draft, but
nobody else gave any feedback on it. This topic is still relevant and
we have a proposed VPN blocker today, so...any more feedback on this
draft?
-- 
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Release criteria proposal: networking requirements

2020-08-31 Thread Kamil Paral
On Sat, Aug 29, 2020 at 1:59 AM Adam Williamson 
wrote:

> On Fri, 2020-08-21 at 17:11 -0700, Adam Williamson wrote:
> > Hi folks!
> >
> > So at this week's blocker review meeting, the fact that we don't have
> > explicit networking requirements in the release criteria really started
> > to bite us. In the past we have squeezed networking-related issues in
> > under other criteria, but for some issues that's really difficult,
> > notably VPN issues. So, we agreed we should draft some explicit
> > networking criteria.
>
> Update: here's a second draft with feedback so far incorporated, thanks
> to everyone. Still mulling over whether/how to split it more across
> milestones.
>
> === Network requirements ===
>
> Each of these requirements apply to both installer and installed system
> environments. For any given installer environment, the 'default network
> configuration tools' are considered to be those the installer documents
> as supported ways to configure networking (e.g. for anaconda-based
> environments, configuration via kernel command line options, a
> kickstart, or interactively in anaconda itself are included).
>
>  Basic networking 
>
> It must be possible to establish both IPv4 and IPv6 network connections
> using both typical router-provided addressing systems (e.g. DHCP on
> IPv4 or SLAAC or IPv6) and static addressing. The default network
> configuration tools for the console, for release-blocking desktops and
> for installer environments must work well enough to allow typical
> network connection configuration operations without major workarounds.
> Standard network functions such as address resolution and connections
> with common protocols such as ping, HTTP and ssh must work as expected.
>
> Footnote titled "Supported hardware": Supported network hardware is
> hardware for which the Fedora kernel includes drivers and, where
> necessary, for which a firmware package is available. If support for a
> commonly-used piece or type of network hardware that would usually be
> present is omitted, that may constitute a violation of this criterion,
> after consideration of the [[Blocker_Bug_FAQ|hardware-dependent-
> issues|normal factors for hardware-dependent issues]]. Similarly,
> violations of this criteria that are hardware or configuration
> dependent are, as usual, subject to consideration of those factors when
> determining whether they are release-blocking
>
>  VPN connections 
>
> Using the default network configuration tools for the console and for
> release-blocking desktops, it must be possible to establish a working
> connection to common OpenVPN, openconnect-supported and vpnc-supported
> VPN servers with typical configurations.
>
> Footnote titled "Supported servers and configurations": As there are
> many different VPN server applications and configurations, blocker
> reviewers must use their best judgment in determining whether
> violations of this criterion are likely to be encountered commonly
> enough to block a release, and if so, at which milestone. As a general
> principle, the more people are likely to use affected servers and the
> less complicated the configuration required to hit the bug, the more
> likely it is to be a blocker.
>

Sounds good to me.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-31 Thread Steven Bonneville
Pardon me for thread-breaking, I read in digest mode :)

On Fri, Aug 28, 2020 at 16:56:26 -0700  wrote:

> > What about mDNS?
>
> ehhh
>
> I am probably a bit biased on this front because I always found mDNS to
> be a pile of garbage and gave up trying to use it a while back. :P But
> if a significant amount of people are actually using it and relying on
> it, adding it might make sense. Anyone else have input on this? Who out
> there does use mDNS?
>

IPP Everywhere for printer discovery and driverless printer configuration
uses mDNS. Pretty much every modern network printer supports it (because of
Apple AirPrint and so on) and if it's working properly in the distribution
it can make printer discovery and printer configuration simpler for CUPS.

  -- Steve

-- 
Steven Bonneville 
Principal Technical Curriculum Architect
Red Hat | Red Hat Training
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-31 Thread Kamil Paral
On Sat, Aug 29, 2020 at 1:57 AM Adam Williamson 
wrote:

> On Thu, 2020-08-27 at 10:06 -0600, Chris Murphy wrote:
> > On Fri, Aug 21, 2020 at 6:11 PM Adam Williamson
> >  wrote:
> > >
> > >  Basic networking 
> > >
> > > It must be possible to establish both IPv4 and IPv6 network connections
> > > using DHCP and static addressing. The default network configuration
> > > tools for the console and for release-blocking desktops must work well
> > > enough to allow typical network connection configuration operations
> > > without major workarounds. Standard network functions such as address
> > > resolution and connections with common protocols such as ping, HTTP and
> > > ssh must work as expected.
> >
> > What about mDNS?
>
> ehhh
>
> I am probably a bit biased on this front because I always found mDNS to
> be a pile of garbage and gave up trying to use it a while back. :P But
> if a significant amount of people are actually using it and relying on
> it, adding it might make sense. Anyone else have input on this? Who out
> there does use mDNS?
>

I contact my machines (even VMs) through .local every day, I'd be
very angry if it didn't work, and I consider myself a significant amount of
people ;o)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-30 Thread Tomáš Popela
On Sat, Aug 29, 2020 at 4:34 AM Chris Murphy 
wrote:

> On Fri, Aug 28, 2020 at 7:52 PM Chris Murphy 
> wrote:
>
> > The IPP Everywhere specification requires clients to support DNS-SD
> > (mDNS is part of that) or WS-Discovery. Printers are required to
> > support both DNS-SD and WS-Discovery. Avahi and systemd-resolved
> > support DNS-SD, functionally equating DNS-SD and mDNS.
>
> From the spec:
>
> "Printers MUST publish a text (TXT) record that provides service
> information over mDNS.
> Printers that support dynamic DNS updates MUST publish separate TXT
> records for each
> domain that is updated."
>
> I'm not completely certain, but I'm wondering whether it's possible to
> print IPP Everywhere at all, if DNS-SD or WS-Discovery aren't working
> on the client. Even having the IP address might not be enough.
>
> I guess one way to test it would be to run the printing test case with
> an IPP Everywhere printer, and try to print with avahi stopped.
>

Adding +Marek Kasik  and +Zdenek Dohnal
 who might know the answer.

Tom
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-29 Thread Michael Catanzaro
On Fri, Aug 28, 2020 at 7:52 pm, Chris Murphy  
wrote:

Between avahi and systemd-resolved, I'm not sure which one is more
dependable for blocking on. Or whether their maintainers would be on
board with such a criterion. At least for F33, Avahi is what we're
using on desktops for this. Both resolve and respond are disabled in
systemd-resolved so if it's better to do this with systemd-resolved,
then it probably needs a Fedora 34 feature proposal.


I don't know how to test mDNS, but it has been reported that it's 
broken in F33:


https://bugzilla.redhat.com/show_bug.cgi?id=1867830

That and the openconnect bug currently threaten the systemd-resolved 
change proposal.


Michael

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-28 Thread Chris Murphy
On Fri, Aug 28, 2020 at 7:52 PM Chris Murphy  wrote:

> The IPP Everywhere specification requires clients to support DNS-SD
> (mDNS is part of that) or WS-Discovery. Printers are required to
> support both DNS-SD and WS-Discovery. Avahi and systemd-resolved
> support DNS-SD, functionally equating DNS-SD and mDNS.

From the spec:

"Printers MUST publish a text (TXT) record that provides service
information over mDNS.
Printers that support dynamic DNS updates MUST publish separate TXT
records for each
domain that is updated."

I'm not completely certain, but I'm wondering whether it's possible to
print IPP Everywhere at all, if DNS-SD or WS-Discovery aren't working
on the client. Even having the IP address might not be enough.

I guess one way to test it would be to run the printing test case with
an IPP Everywhere printer, and try to print with avahi stopped.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-28 Thread Chris Murphy
[Sorry for the double post, somewhere along the way desktop@ and kde@
were dropped, so I'm re-adding them and that means double post for
test@ and devel@.]

Re: add working mDNS to the criterion


The IPP Everywhere specification requires clients to support DNS-SD
(mDNS is part of that) or WS-Discovery. Printers are required to
support both DNS-SD and WS-Discovery. Avahi and systemd-resolved
support DNS-SD, functionally equating DNS-SD and mDNS.

Final release criterion says printing via the generic IPP driver must
work. This implies discovery or you can't print. Or accept a
craptastic user experience by fudging the requirement to say, well as
long as an IP address works, the criterion is met.

It's even less of a leap if folks can't discover other services like
SMB shares. That's more common than printing.

Between avahi and systemd-resolved, I'm not sure which one is more
dependable for blocking on. Or whether their maintainers would be on
board with such a criterion. At least for F33, Avahi is what we're
using on desktops for this. Both resolve and respond are disabled in
systemd-resolved so if it's better to do this with systemd-resolved,
then it probably needs a Fedora 34 feature proposal.

--
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-28 Thread Chris Murphy
On Fri, Aug 28, 2020 at 5:56 PM Adam Williamson
 wrote:
>
> On Thu, 2020-08-27 at 10:06 -0600, Chris Murphy wrote:
> > On Fri, Aug 21, 2020 at 6:11 PM Adam Williamson
> >  wrote:
> > >
> > >  Basic networking 
> > >
> > > It must be possible to establish both IPv4 and IPv6 network connections
> > > using DHCP and static addressing. The default network configuration
> > > tools for the console and for release-blocking desktops must work well
> > > enough to allow typical network connection configuration operations
> > > without major workarounds. Standard network functions such as address
> > > resolution and connections with common protocols such as ping, HTTP and
> > > ssh must work as expected.
> >
> > What about mDNS?
>
> ehhh
>
> I am probably a bit biased on this front because I always found mDNS to
> be a pile of garbage and gave up trying to use it a while back. :P But
> if a significant amount of people are actually using it and relying on
> it, adding it might make sense. Anyone else have input on this? Who out
> there does use mDNS?

The IPP Everywhere specification requires clients to support DNS-SD
(mDNS is part of that) or WS-Discovery. Printers are required to
support both DNS-SD and WS-Discovery. Avahi and systemd-resolved
support DNS-SD, functionally equating DNS-SD and mDNS.

Final release criterion says printing via the generic IPP driver must
work. This implies discovery or you can't print. Or accept a
craptastic user experience by fudging the requirement to say, well as
long as an IP address works, the criterion is met.

It's even less of a leap if folks can't discover other services like
SMB shares. That's more common than printing.

Between avahi and systemd-resolved, I'm not sure which one is more
dependable for blocking on. Or whether their maintainers would be on
board with such a criterion. At least for F33, Avahi is what we're
using on desktops for this. Both resolve and respond are disabled in
systemd-resolved so if it's better to do this with systemd-resolved,
then it probably needs a Fedora 34 feature proposal.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-28 Thread Adam Williamson
On Fri, 2020-08-21 at 17:11 -0700, Adam Williamson wrote:
> Hi folks!
> 
> So at this week's blocker review meeting, the fact that we don't have
> explicit networking requirements in the release criteria really started
> to bite us. In the past we have squeezed networking-related issues in
> under other criteria, but for some issues that's really difficult,
> notably VPN issues. So, we agreed we should draft some explicit
> networking criteria.

Update: here's a second draft with feedback so far incorporated, thanks
to everyone. Still mulling over whether/how to split it more across
milestones.

=== Network requirements ===

Each of these requirements apply to both installer and installed system
environments. For any given installer environment, the 'default network
configuration tools' are considered to be those the installer documents
as supported ways to configure networking (e.g. for anaconda-based
environments, configuration via kernel command line options, a
kickstart, or interactively in anaconda itself are included).

 Basic networking 

It must be possible to establish both IPv4 and IPv6 network connections
using both typical router-provided addressing systems (e.g. DHCP on
IPv4 or SLAAC or IPv6) and static addressing. The default network
configuration tools for the console, for release-blocking desktops and
for installer environments must work well enough to allow typical
network connection configuration operations without major workarounds.
Standard network functions such as address resolution and connections
with common protocols such as ping, HTTP and ssh must work as expected.

Footnote titled "Supported hardware": Supported network hardware is
hardware for which the Fedora kernel includes drivers and, where
necessary, for which a firmware package is available. If support for a
commonly-used piece or type of network hardware that would usually be
present is omitted, that may constitute a violation of this criterion,
after consideration of the [[Blocker_Bug_FAQ|hardware-dependent-
issues|normal factors for hardware-dependent issues]]. Similarly,
violations of this criteria that are hardware or configuration
dependent are, as usual, subject to consideration of those factors when
determining whether they are release-blocking

 VPN connections 

Using the default network configuration tools for the console and for
release-blocking desktops, it must be possible to establish a working
connection to common OpenVPN, openconnect-supported and vpnc-supported
VPN servers with typical configurations.

Footnote titled "Supported servers and configurations": As there are
many different VPN server applications and configurations, blocker
reviewers must use their best judgment in determining whether
violations of this criterion are likely to be encountered commonly
enough to block a release, and if so, at which milestone. As a general
principle, the more people are likely to use affected servers and the
less complicated the configuration required to hit the bug, the more
likely it is to be a blocker.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-28 Thread Adam Williamson
On Thu, 2020-08-27 at 10:06 -0600, Chris Murphy wrote:
> On Fri, Aug 21, 2020 at 6:11 PM Adam Williamson
>  wrote:
> > 
> >  Basic networking 
> > 
> > It must be possible to establish both IPv4 and IPv6 network connections
> > using DHCP and static addressing. The default network configuration
> > tools for the console and for release-blocking desktops must work well
> > enough to allow typical network connection configuration operations
> > without major workarounds. Standard network functions such as address
> > resolution and connections with common protocols such as ping, HTTP and
> > ssh must work as expected.
> 
> What about mDNS?

ehhh

I am probably a bit biased on this front because I always found mDNS to
be a pile of garbage and gave up trying to use it a while back. :P But
if a significant amount of people are actually using it and relying on
it, adding it might make sense. Anyone else have input on this? Who out
there does use mDNS?
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-28 Thread Adam Williamson
On Wed, 2020-08-26 at 01:14 +, Gary Buhrmaster wrote:
> On Tue, Aug 25, 2020 at 10:51 PM Michel Alexandre Salim
>  wrote:
> 
> > Also, should we add WireGuard to this list for future-proofing?
> 
> I had thought about explicitly suggesting
> wireguard, but then thought that we should
> focus on what is currently being used, and
> while *I* use wireguard, it is still not really
> a common use case.
> 
> We do, of course, need to remember to
> regularly review all the criteria to make
> sure that they still make sense in the current
> environment and be willing to delete some
> things from the list when only a few still
> have such equipment or use the functionality.
> 
> I would almost suggest any addition
> should come with a criteria deletion,
> to bound the work for the QA team,
> who are, after all, a limited resource.

I **AM** THE QA TEAM

well, okay, not all of it. :P But yeah, I get the intention of that
idea, but it wouldn't really work out. We do just need to add things
sometimes. This is really about covering stuff that we would have
wanted to block on anyway (and sometimes have, by stretching other
criteria) but just hadn't ever written into the criteria.

We do drop things sometimes and make other adjustments like how we
stopped requiring such extensive testing of physical media and
restricted the desktop criteria a bit, a couple of releases back. But
making it a strict one in/one out probably wouldn't be practical.

Also note that ensuring the products meets these criteria is meant to
be a collaborative effort; the teams who build the products are
supposed to share that responsibility with the QA team, including doing
some of the actual testing.

I agree on the WireGuard front - that's what I meant by saying "It
doesn't really make sense to add things to the release criteria for
future proofing." The criteria should reflect *current* importance.
Unless use of WireGuard is in the same ballpark as OpenVPN or Cisco
etc. we probably wouldn't want to include it right now.

I *do* wonder if any of the other VPN plugins I see listed at
https://wiki.gnome.org/Projects/NetworkManager/VPN but didn't include
in the criterion are candidates. Does anyone have stats / practical
knowledge of the relative popularity of all those?
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-27 Thread Chris Murphy
On Fri, Aug 21, 2020 at 6:11 PM Adam Williamson
 wrote:
>
>  Basic networking 
>
> It must be possible to establish both IPv4 and IPv6 network connections
> using DHCP and static addressing. The default network configuration
> tools for the console and for release-blocking desktops must work well
> enough to allow typical network connection configuration operations
> without major workarounds. Standard network functions such as address
> resolution and connections with common protocols such as ping, HTTP and
> ssh must work as expected.

What about mDNS?

Something to the effect that if it's installed and enabled by a
default package set for an edition, it should work (resolve and
respond). That means it would apply to Workstation and KDE. It
wouldn't apply to Cloud, or Server. I'm not sure if IoT enables it.


--
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-25 Thread Michel Alexandre Salim
On Tue, 2020-08-25 at 21:20 -0400, Neal Gompa wrote:
> On Tue, Aug 25, 2020 at 8:33 PM Michael Catanzaro <
> mcatanz...@gnome.org> wrote:
> > On Tue, Aug 25, 2020 at 4:11 pm, Adam Williamson
> >  wrote:
> > > Do NetworkManager and its current KDE and GNOME front ends
> > > support it
> > > currently?
> > 
> > Rumor has it that KDE has this working!
> 
> The rumor is true! WireGuard has been supported in plasma-nm since
> Plasma 5.14.
> 
> It'd be nice to add validation for WireGuard to the criteria, but do
> we have a WireGuard VPN to test with?
> 
Mullvad (they've added WireGuard support since before it was merged in
kernel 5.6). For validation, do you mean as part of an automated test
or as something individual contributors can test on their own? If the
latter, I can sign up.

-- 
Michel Alexandre Salim
profile: https://keybase.io/michel_slm
chat via email: https://delta.chat/
GPG key: 5DCE 2E7E 9C3B 1CFF D335 C1D7 8B22 9D2F 7CCC 04F2


signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-25 Thread Neal Gompa
On Tue, Aug 25, 2020 at 8:33 PM Michael Catanzaro  wrote:
>
> On Tue, Aug 25, 2020 at 4:11 pm, Adam Williamson
>  wrote:
> > Do NetworkManager and its current KDE and GNOME front ends support it
> > currently?
>
> Rumor has it that KDE has this working!

The rumor is true! WireGuard has been supported in plasma-nm since Plasma 5.14.

It'd be nice to add validation for WireGuard to the criteria, but do
we have a WireGuard VPN to test with?

> But GNOME doesn't support it yet. Help welcome in these bugs:
>
> https://gitlab.gnome.org/GNOME/gnome-control-center/-/issues/982
> https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/2989
>
> Now, does wireguard work with systemd-resolved? *shrug* dunno!

It *should* work, since that part is managed by NetworkManager...


-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-25 Thread Gary Buhrmaster
On Tue, Aug 25, 2020 at 10:51 PM Michel Alexandre Salim
 wrote:

> Also, should we add WireGuard to this list for future-proofing?

I had thought about explicitly suggesting
wireguard, but then thought that we should
focus on what is currently being used, and
while *I* use wireguard, it is still not really
a common use case.

We do, of course, need to remember to
regularly review all the criteria to make
sure that they still make sense in the current
environment and be willing to delete some
things from the list when only a few still
have such equipment or use the functionality.

I would almost suggest any addition
should come with a criteria deletion,
to bound the work for the QA team,
who are, after all, a limited resource.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-25 Thread Michael Catanzaro
On Tue, Aug 25, 2020 at 4:11 pm, Adam Williamson 
 wrote:

Do NetworkManager and its current KDE and GNOME front ends support it
currently?


Rumor has it that KDE has this working! But GNOME doesn't support it 
yet. Help welcome in these bugs:


https://gitlab.gnome.org/GNOME/gnome-control-center/-/issues/982
https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/2989

Now, does wireguard work with systemd-resolved? *shrug* dunno!

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-25 Thread Michel Alexandre Salim
On Tue, 2020-08-25 at 16:11 -0700, Adam Williamson wrote:
> On Tue, 2020-08-25 at 15:50 -0700, Michel Alexandre Salim wrote:
> > On Fri, 2020-08-21 at 17:11 -0700, Adam Williamson wrote:
> > >  VPN connections 
> > > 
> > > 
> > > 
> > > Using the default network configuration tools for the console and
> > > for
> > > 
> > > release-blocking desktops, it must be possible to establish a
> > > working
> > > 
> > > connection to common OpenVPN, openconnect-supported and vpnc-
> > > supported
> > > 
> > > VNC servers with typical configurations.
> > 
> > VNC == VPN?
> 
> Oh, yes. Thanks.
> 
> > Also, should we add WireGuard to this list for future-proofing?
> 
> It doesn't really make sense to add things to the release criteria
> for
> future proofing. If it's important *now* we should add it. Otherwise,
> no.
> 
> Do NetworkManager and its current KDE and GNOME front ends support it
> currently?

IIRC not - wireguard-tools is available, but setting up a connection is
manual or needs to use the GUI/CLI from a VPN provider such as Mullvad

https://www.wireguard.com/quickstart/
https://mullvad.net/nl/help/install-mullvad-app-linux/
https://mullvad.net/en/help/how-use-mullvad-cli/

-- 
Michel Alexandre Salim
profile: https://keybase.io/michel_slm
chat via email: https://delta.chat/
GPG key: 5DCE 2E7E 9C3B 1CFF D335 C1D7 8B22 9D2F 7CCC 04F2


signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-25 Thread Adam Williamson
On Tue, 2020-08-25 at 15:50 -0700, Michel Alexandre Salim wrote:
> On Fri, 2020-08-21 at 17:11 -0700, Adam Williamson wrote:
> >  VPN connections 
> > 
> > 
> > 
> > Using the default network configuration tools for the console and for
> > 
> > release-blocking desktops, it must be possible to establish a working
> > 
> > connection to common OpenVPN, openconnect-supported and vpnc-
> > supported
> > 
> > VNC servers with typical configurations.
> 
> VNC == VPN?

Oh, yes. Thanks.

> Also, should we add WireGuard to this list for future-proofing?

It doesn't really make sense to add things to the release criteria for
future proofing. If it's important *now* we should add it. Otherwise,
no.

Do NetworkManager and its current KDE and GNOME front ends support it
currently?
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-25 Thread Michel Alexandre Salim
On Fri, 2020-08-21 at 17:11 -0700, Adam Williamson wrote:
>  VPN connections 
> 
> 
> 
> Using the default network configuration tools for the console and for
> 
> release-blocking desktops, it must be possible to establish a working
> 
> connection to common OpenVPN, openconnect-supported and vpnc-
> supported
> 
> VNC servers with typical configurations.

VNC == VPN?

Also, should we add WireGuard to this list for future-proofing?

Thanks,

-- 
Michel Alexandre Salim
profile: https://keybase.io/michel_slm
chat via email: https://delta.chat/
GPG key: 5DCE 2E7E 9C3B 1CFF D335 C1D7 8B22 9D2F 7CCC 04F2


signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-21 Thread Adam Williamson
On Sat, 2020-08-22 at 00:23 +, Gary Buhrmaster wrote:
> On Sat, Aug 22, 2020 at 12:12 AM Adam Williamson
>  wrote:
> 
> > It must be possible to establish both IPv4 and IPv6 network connections
> > using DHCP and static addressing.
> 
> For IPV6, SLAAC is more common than DHCP(v6)
> (especially) in the consumer space.  I would like
> to see a SLAAC requirement be added (for IPv6).

Oh, yeah, of course, that was silly of me. Thanks for pointing it out.
Will amend in the next version.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Release criteria proposal: networking requirements

2020-08-21 Thread Gary Buhrmaster
On Sat, Aug 22, 2020 at 12:12 AM Adam Williamson
 wrote:

> It must be possible to establish both IPv4 and IPv6 network connections
> using DHCP and static addressing.

For IPV6, SLAAC is more common than DHCP(v6)
(especially) in the consumer space.  I would like
to see a SLAAC requirement be added (for IPv6).
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Release criteria proposal: networking requirements

2020-08-21 Thread Adam Williamson
Hi folks!

So at this week's blocker review meeting, the fact that we don't have
explicit networking requirements in the release criteria really started
to bite us. In the past we have squeezed networking-related issues in
under other criteria, but for some issues that's really difficult,
notably VPN issues. So, we agreed we should draft some explicit
networking criteria.

This turns out to be a big area and quite hard to cover (who'd've
thought!), but here is at least a first draft for us to start from. My
proposal would be to add this to the Basic criteria. I have left out
some wikitext stuff from the proposal for clarity; I'd add it back in
on actually applying the proposed changes. It's just formatting stuff,
nothing that'd change the meaning. Anyone have thoughts, complaints,
alternative approaches, supplements? Thanks!

=== Network requirements ===

Each of these requirements apply to both installer and installed system
environments. For any given installer environment, the 'default network
configuration tools' are considered to be those the installer documents
as supported ways to configure networking (e.g. for anaconda-based
environments, configuration via kernel command line options, a
kickstart, or interactively in anaconda itself are included).

 Basic networking 

It must be possible to establish both IPv4 and IPv6 network connections
using DHCP and static addressing. The default network configuration
tools for the console and for release-blocking desktops must work well
enough to allow typical network connection configuration operations
without major workarounds. Standard network functions such as address
resolution and connections with common protocols such as ping, HTTP and
ssh must work as expected.

Footnote titled "Supported hardware": Supported network hardware is
hardware for which the Fedora kernel includes drivers and, where
necessary, for which a firmware package is available. If support for a
commonly-used piece or type of network hardware that would usually be
present is omitted, that may constitute a violation of this criterion,
after consideration of the [[Blocker_Bug_FAQ|hardware-dependent-
issues|normal factors for hardware-dependent issues]]. Similarly,
violations of this criteria that are hardware or configuration
dependent are, as usual, subject to consideration of those factors when
determining whether they are release-blocking

 VPN connections 

Using the default network configuration tools for the console and for
release-blocking desktops, it must be possible to establish a working
connection to common OpenVPN, openconnect-supported and vpnc-supported
VNC servers with typical configurations.

Footnote title "Supported servers and configurations": As there are
many different VPN server applications and configurations, blocker
reviewers must use their best judgment in determining whether
violations of this criterion are likely to be encountered commonly
enough to block a release, and if so, at which milestone. As a general
principle, the more people are likely to use affected servers and the
less complicated the configuration required to hit the bug, the more
likely it is to be a blocker.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org