15:57:54 #startmeeting Fedora Packaging Meeting 15:57:54 Meeting started Wed May 16 15:57:54 2012 UTC. The chair is spot. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:57:54 Useful Commands: #action #agreed #halp #info #idea #link #topic. 15:57:57 #meetingname fpc 15:57:57 The meeting name has been set to 'fpc' 15:58:03 #topic Roll Call 15:58:31 * geppetto is here 15:58:37 * limburgher w00t 15:59:46 Howdy. 15:59:49 * racor is here 16:01:24 * abadger1999 here 16:02:19 okay 16:03:10 rdieter_work, SmootherFrOgZ, if you see this, just let us know that you're here. 16:03:36 #topic Bundled b64_ntop.c in nc - https://fedorahosted.org/fpc/ticket/172 16:03:54 Doesn't look like it's worth talking about this until I hear back from the nc maintainer. 16:03:56 spot: here 16:04:09 * abadger1999 is initially leaning towards using hte glibc version instead of the file that we're adding as a downstream 16:04:16 Basically I was just wondering if FPC thought this would require a bundling exception. 16:04:28 I'm with abadger1999. 16:04:36 yeah - it would probably require a copylib exception. 16:04:39 I lean towards yes since we have equivalent-sized md5 implementations. 16:04:53 If it was embedded from upstream, I think I'd be more relaxed about it. 16:05:02 * rdieter_work is with tibbs 16:05:06 we add this as a downstream? 16:05:10 But if it's in glibc already then I don't see the point. 16:05:18 Yes, there's just a C source file checked into git. 16:05:19 tibbs: It's not officially in glibc. 16:05:33 but since we're bundling it downstream, I definitely think it would need an exception. 16:05:34 geppetto: ? 16:05:49 It's in the exposed API. I don't know what makes things official if that's not. 16:06:29 /usr/include/resolv.h defines it. It's undocumented beyond that. Don't know what status that gives it. 16:06:35 tibbs: It's "exposed" … but it's not public, or documented. 16:06:45 If abadger1999's test program, and nc, work with what's in glibc on installed systems, that seems good enough. 16:06:59 geppetto: Any particular reason for that? 16:07:19 I'd just leave this up to the nc maintainer. 16:07:23 limburgher: My guess is that they didn't want to make it public, but had to due to libresolve being a separate library. 16:07:33 Either he can use what's in glibc, or he can get a bundling exception. 16:07:46 I'd just give an exception for base64. 16:08:01 well. i think base64 is probably as common as md5 16:08:02 It's even easier to reimplement than md5 … and has been done many times. 16:08:02 geppetto: if it's in public header then it's public 16:08:19 Rathann: No. 16:08:34 why not? 16:09:12 Am I sensing a "not public"=="we might change it without warning" issue? 16:09:16 I still cannot fathom where there is no system library containing things like this. 16:09:28 Rathann: Because if some newer version of glibc needs change … there is nothing stopping them from moving it, marking it private or just removing it … and I'm pretty sure they'll tell you to take a long walk off a short pier. 16:09:58 i think we're seeing glibc "bundling" a base64 impl, not really meaning to "provide" one 16:10:06 yeh 16:10:07 16:10:25 which lends more weight to the prevalence of b64 in existing packages 16:10:29 tibbs: Someone should cobble one together. 16:10:42 so i propose we just go ahead and grant base64 implementations an exception 16:10:53 Yeah. Ugh. +1 16:11:15 +1 16:11:19 +1 16:11:29 -0.5 16:11:41 abadger1999: come on now, use ints, please. ;) 16:11:44 limburgher: 2 Options … 1) link against openssl and provide a nicer API(s) … then noone will use it due to deps. … or 2) write your own, and then nobody will use it because they don't trust it :) 16:11:47 - pi/4 16:11:48 it's the bundling by us (vs upstream) that makes me slightly negative i nthis case. 16:11:56 +1 16:12:14 To be fair, upstream is one of the BSDs. 16:12:17 abadger1999: so try to talk the nc maintainer into not doing that. ;) 16:12:21 geppetto: Damned if we do, damned if we do. 16:12:23 And we all know how terrible they are about this sort of thing. 16:12:27 limburgher: yeh 16:12:49 tibbs: Speaking of. . .:) 16:12:50 abadger1999 has a point, but meh. however nc maintainer wants to handle it, more power to 'em. 16:12:56 limburgher: Yeah. 16:13:00 we're at +4 on the bundling exception. 16:13:11 I don't think we need to worry much about updates to base64 anyway … much like md5. 16:13:27 +1 for temporary exception, provided a bug report is filed against glibc to either make its implementation public and documented or hide it 16:14:13 Rathann: I have no objects to creating a BZ … but I bet the response you get back is "it's not public, but we can't hide it anymore than we do currently, due to technical limitations." 16:14:17 I just don't know. Pragmatism should probably win here, but the situation is just so dumb. 16:14:34 Yup. 16:14:46 tibbs: I don't see how this is significantly different than all the md5 situations. 16:15:02 Well, there's not an md5 implementation exposed by glibc, for one. 16:15:08 Although I also agree with everything you said. 16:15:11 But yes, the md5 situation is dumb. 16:15:35 At least with md5, all of the implementations don't have the same API. 16:15:38 +1 for exception 16:15:45 All of these are the same damn source file. 16:15:45 geppetto: by the way, the functions have been there since at least glibc 2.3 (I suspect much earlier) 16:15:57 okay. i see +5 for the general exception. 16:16:14 Rathann: feel free to file a bug with glibc. i'm not volunteering to get kicked in the face. ;) 16:16:22 heh 16:16:43 glibc maintenance is supposed to be getting better. 16:16:44 g++ -o foo -lchunk_norris 16:16:46 Rathann: *nods*, probably inherited from where libresolv came form originally. 16:16:59 #action General exception for base64 implementations approved (+1:5, 0:1, -1:0) 16:17:17 spot: abadger1999 did a -0.5 16:17:31 Maybe spot's rounding-to-even. 16:17:32 geppetto: yes, but i chose to round it up. :P 16:17:32 rdieter_works 16:17:41 's first vote was irrational. 16:17:42 Fair enough :) 16:17:43 heh :-) works for me 16:17:48 spot: I'd also be OK with nc using the glibc implementation - The function is there for ages and people are free to use whatever it provides - Be it hidden/documented or not ;) 16:17:59 * spot also has no issue with nc using the glibc impl 16:18:13 What bundled(foo) should they use? 16:18:15 limburgher: nice 16:18:26 rdieter_work: :) 16:18:44 tibbs: bundled(base64-att) 16:19:11 Any "att"? 16:19:32 The source file is copyright ISC and IBM. 16:19:38 oh. sorry., 16:19:47 then pick one. i don't care what color the shed is. 16:19:47 base64-isc makes sense, I guess. 16:20:06 Let's just use that. 16:20:10 yeh, I'm sure IBM own about 666 implementations of base64 :) 16:20:21 base64-ICBM? 16:21:00 #topic New Policy on GCC and alternative compilers - https://fedorahosted.org/fpc/ticket/173 16:21:16 there is no real need to vote here, FESCo wrote a policy, we're just going to codify it verbatim. 16:21:29 if anyone disagrees, feel free to talk to FESCo. 16:21:57 #topic Please make the no-bundled-libraries exception requirements more clear - https://fedorahosted.org/fpc/ticket/174 16:22:26 abadger1999: is there anything we need to do on this ticket? 16:22:47 It looks like it's still cooking, I don't see new text agreed on. 16:23:12 I'm not sure why tmraz is objecting... 16:23:31 Seems like we should reconfirm the wildcard exceptions that were granted by fesco. 16:23:47 We could change the text to say we don't care about the ticket# for wildcard exceptions. 16:23:49 abadger1999: i'd rather just grandfather them and move on, to be honest. 16:23:54 then add the links for those to the wiki table so that people know what to list in the spec file comment 16:23:55 But, meh. 16:24:10 spot: sure. Just vote on that? and all of them can share that ticket? 16:24:20 Works for me. 16:24:29 Proposal: All old FESCo wildcard exceptions are grandfathered in. 16:24:34 +1 16:24:37 +1 16:24:37 +1 16:24:43 +1 16:24:44 +1 16:24:48 +1 16:25:01 +1 16:25:48 racor: would you like to vote for the record? 16:26:14 +1 ... sorry, I was reading the ticket ... 16:26:22 #action All old FESCo wildcard exceptions are grandfathered in. (+1:8, 0:0, -1:0) 16:26:48 #topic Permission to build mod_auth_xradius with bundled libraries - https://fedorahosted.org/fpc/ticket/175 16:27:20 spot: This is the one I asked you about yesterday WRT the new md5 implementation. 16:27:28 libradius is the other problem. 16:27:34 so, i'm not sure why http://portal-to-web.de/tacacs/libradius.php isn't just packaged up as a BR 16:27:52 spot: Yeh, that was roughly my feeling. 16:28:08 yeah, its crufty and old (2004) but so is radius. :P 16:28:17 yeh 16:28:37 I didn't know about it. I can package it up and have Simone test it with mod_auth_xradius. 16:28:59 limburgher: okay, lets do that. close it out if that works, or put some more details in the ticket if it doesn't 16:29:13 Will do. 16:29:29 #topic Updated tmpfiles.d guidelines - https://fedorahosted.org/fpc/ticket/176 16:29:53 I didn't even see this one yet. 16:29:55 Diff: https://fedoraproject.org/w/index.php?title=User%3AMichich%2Fdraft-tmpfiles.d&action=historysubmit&diff=288074&oldid=288058 16:30:08 tibbs: i didn't see it email out, but it came up when i ran the report 16:30:35 are the 2004 sources bundled as-is, with no modifications? 16:30:56 surely there must have been some vulnerabilities found in there over the years 16:30:56 I don't disagree with the list of changes in the ticket. 16:31:40 A lot of minor changes … although I think it still needs an example for the permissions. 16:31:50 yeah, i'm fine with it. the %{_prefix}/lib nonsense continues to annoy me, but i'm not going to fight that battle today 16:31:54 Esp. if it really needs to be 0710 and not just 710 16:32:48 i don't think it matters 16:32:49 Rathann: I'll check it out. 16:32:52 all the ones i have are 0644 16:33:10 upstart should stay for now -- it's still a maintained package in F16 16:33:34 We don't need to mention an init system at all. 16:33:51 /run isn't in the FHS 16:33:51 Just another thing we have to update when something unrelated gets changed. 16:33:52 i agree with tibbs, there is no need to mention it, which is what this change does 16:34:23 eh. But something has to provide the tmpfiles.d feature otherwise you have to create a different method of managing the files. 16:34:58 What provides it is not really necessary to the guidelines. 16:35:16 As long as something processes the tmpfiles.d settings, the guidelines shouldn't care. 16:35:31 i don't think either 0710 or 0755 is correct here 16:35:43 there is no reason for these files to be +x 16:36:24 0644 should be fine. 16:36:27 aren't these directories, however? 16:36:42 Should the hardcoded config file go into %{_datadir}/tmpfiles.d ? 16:36:58 abadger1999: thats the battle i'm not going to fight. 16:37:09 and... I don't know calling htese types of files data seems more and more inappropriate as time goes on. 16:38:18 is the intention of FHS really that ideally, vendors ship with an empty /etc/ that sysadmins copy files into from /usr/share /usr/lib or /usr/lib64 depending on the upstream software? 16:38:53 abadger1999: can't speak for the ghosttown that is FHS upstream, but that is certainly systemd's mechanism 16:39:55 Rathann: you're right. those dirs _do_ need +x 16:40:00 I'm beginning to think conf should be shipped in /etc/ and then a software provider can establish best practices like "You have /etc/tmpfiles.d/vendor for packaged config and /etc/tmpfiles.d/local for local modifications" 16:40:05 so 0755 makes sense 16:40:12 but sysadmins are free to shoot themselves in the foot. 16:40:32 abadger1999: i think that sort of decision is going to have to come out of FESCo 16:40:49 * rdieter_work doesn't care where default configurations come from really 16:40:54 It's interpretation of FHS... it can come from us. 16:41:06 I think we can agree customized ones probably do belong in /etc 16:41:15 Of course -- it might then be escalated to fesco :-) 16:41:21 rdieter_work: 16:41:23 abadger1999: if we tell systemd that they can't put their configs in /usr/lib/whatever, they're just going to go to FESCo 16:41:41 so just take it to FESCo and save me the migraine. ;) 16:43:18 So, i'm +1 here, as it matches reality on the ground and is an improvement over what we have now 16:44:16 Yeah. 16:44:17 +1 16:44:21 -1 16:44:27 +1 16:44:40 +1 16:44:49 +1 16:44:54 The original is messy, this only cleans it up a bit. 16:45:19 +1 to the "D/d" and perms cleanup -- -1 to everything else. 16:45:21 racor: did I miss something … why? 16:45:49 I am not willing to nod off bad designs ;) 16:46:03 #action Draft changes approved (+1:5, 0:0, -1:2) 16:46:12 ... just because it's reality .... 16:46:22 i encourage those who feel the FHS issues are noteworthy to address them with FESCo. 16:46:34 #topic Open Floor 16:46:49 ... it's only reality, because similar previous proposals where nodded off by FESCO and by us. 16:47:26 spot: Did you see someone submitted an exfat implementation? 16:47:35 no... 16:48:11 Oops -- I forgot that we passed a FHS exception for /run -- I'm okay with those changes as well. 16:48:37 tibbs: yes. I was inclined to block exFAT FE_LEGAL ;) 16:48:53 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=822046 16:48:56 racor: please do, i dont think it can go in 16:49:06 So I'm just -1 on the conf file stuff. 16:50:02 nm, i just did it 16:50:28 well, if there is nothing else, it looks like i need to make an appt with the lawyers 16:50:33 thanks everyone 16:50:36 #endmeeting