19:04:11 #startmeeting FESCO (2022-01-10) 19:04:11 Meeting started Mon Jan 10 19:04:11 2022 UTC. 19:04:11 This meeting is logged and archived in a public location. 19:04:11 The chair is zbyszek. Information about MeetBot at https://fedoraproject.org/wiki/Zodbot#Meeting_Functions. 19:04:11 Useful Commands: #action #agreed #halp #info #idea #link #topic. 19:04:11 The meeting name has been set to 'fesco_(2022-01-10)' 19:04:11 #meetingname fesco 19:04:11 #chair nirik, decathorpe, zbyszek, sgallagh, mhroncok, dcantrell, mboddu, tstellar, Conan_Kudo, Pharaoh_Atem, Son_Goku, King_InuYasha, Sir_Gallantmon, Eighth_Doctor 19:04:11 #topic init process 19:04:11 The meeting name has been set to 'fesco' 19:04:11 Current chairs: Conan_Kudo Eighth_Doctor King_InuYasha Pharaoh_Atem Sir_Gallantmon Son_Goku dcantrell decathorpe mboddu mhroncok nirik sgallagh tstellar zbyszek 19:04:20 .hello mohanboddu 19:04:22 .hello sgallagh 19:04:23 mboddu: mohanboddu 'Mohan Boddu' 19:04:25 .hello2 19:04:26 StephenGallagher: sgallagh 'Stephen Gallagher' 19:04:29 .hello ngompa 19:04:31 zbyszek: zbyszek 'Zbigniew Jędrzejewski-Szmek' 19:04:34 Eighth_Doctor: ngompa 'Neal Gompa' 19:04:35 .hello2 19:04:37 dcantrell: dcantrell 'David Cantrell' 19:04:38 .hello tstellar 19:04:40 tstellar: tstellar 'Tom Stellard' 19:04:41 .hello2 19:04:42 decathorpe: decathorpe 'Fabio Valentini' 19:04:46 morning 19:05:10 .hello churchyard 19:05:11 mhroncok: churchyard 'Miro Hrončok' 19:05:38 * zbyszek counts 19:06:04 .hello kevin 19:06:05 nirik: kevin 'Kevin Fenzi' 19:06:14 We're missing ... no we're all here. 19:06:16 full house? 19:06:27 So let's jump to everyone's favourite topic! 19:06:28 Too soon 19:06:33 #topic meeting time 19:06:56 * nirik guesses we have 0 overlapping times, since that always seems to happen 19:07:20 #info https://whenisgood.net/fesco-2021-december/results/h2xch99 19:08:14 Eighth_Doctor: any chance you could reconsider Monday or Tuesday 18:00 UTC? 19:08:17 There you go again, Conan Kudo , always causing trouble ;-) 19:08:24 Haha :) 19:08:43 18:00 UTC is when the KDE SIG meeting happens (1pm US/ET) 19:09:09 we are all here now 19:09:17 can they perhaps move it ? 19:09:20 since I chair that meeting, it would be a problem for me to not be there 19:09:20 Which day? 19:09:27 Mondays 19:09:30 it happens right before this one :) 19:09:39 What about Tuesday? 19:10:01 that slot just opened up this week going forward 19:10:02 so I guess we can do that 19:10:08 \o/ 19:10:19 It's a New Year's miracle! 19:10:23 at least until OKD WG shifts again :) 19:10:25 wow 19:10:35 impressive. 19:10:43 🎆 19:10:48 18:00 UTC Tuesdays it is! 19:10:52 being in as many SIGs/WGs as I'm in, it's very hard to do scheduling 19:11:08 Have you ever considered not burning yourself out? 19:11:17 #agree FESCO meetings will take place on Tuesday 18:00 19:11:51 * StephenGallagher says without a trace of irony 19:11:51 #topic #2711 F36 Change: Enable fs-verity in RPM 19:11:51 .fesco 2711 19:11:52 zbyszek: Issue #2711: F36 Change: Enable fs-verity in RPM - fesco - Pagure.io - https://pagure.io/fesco/issue/2711 19:12:35 FWIW, I haven't had any time to spend on this… I'm in the same spot at a week ago. 19:13:05 I feel like these things need some kind of goal/use cases they would be actually on/used for... 19:13:28 Stephen Gallagher: yes, trying to reduce really hard 19:13:29 providing the tools is nice, but without using them, it's work we don't know does any good... 19:13:45 > Are there some test runs with numbers to show before/after data for both the RPM size and installed FS usage? -- The Change owners are currently collecting this data and will be releasing it in the coming weeks. 19:13:53 was this posted somewhere, or is it still TBD? 19:14:01 I don't recall seeing it. 19:14:18 nirik: I agree with that. 19:14:58 proposal: punt until next week? 19:15:17 +1 19:15:18 I poked the change proposers 19:15:59 OK, we'll keep revisiting this. 19:16:06 #topic #2713 F36 Change: Make Rescue Mode Work With Locked Root 19:16:06 .fesco 2713 19:16:07 zbyszek: Issue #2713: F36 Change: Make Rescue Mode Work With Locked Root - fesco - Pagure.io - https://pagure.io/fesco/issue/2713 19:17:17 I do not like this proposal. It feels like a classic fix the symptom and not the problem type thing 19:17:28 "I'm leaning towards not rushing this and delaying to F37" 19:17:31 Michel Alexandre Salim, michel-slm: pretty ping 19:17:36 (one of the chnage owners) 19:17:52 Eighth_Doctor: salimma maybe? 19:18:08 https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/LOISWGKNQZXN33WPDQX3QJYC7ZC77T4N/ 19:18:12 as one of the change owners, my feeling on it is that if we don't like it, we should remove it from everywhere it's already implemented 19:18:49 zbyszek: do you have a short version of what would be required to solve this in a better way? 19:18:57 the solution came from FCOS 19:19:29 ngompa: I agree, if this is something we don't want, then it shouldn't be used anywhere ... but does FESCo even have "jurisdiction" over FCOS? 19:19:36 yes 19:19:41 decathorpe: depends on how comprehensively we want to solve it 19:19:48 SIGs and WGs are underneath FESCo 19:19:51 (they use so many special processes that I'm not even sure) 19:19:58 yeah :/ 19:20:11 from a governance perspective, they answer to us 19:20:19 but in practice...? 🤷‍♂️ 19:20:36 decathorpe: the simplest case is when the machine is booting but get stuck somewhere in early boot. We would need to adjust the pam stack and/or login binary to support logging in as other users. 19:20:57 I think we should allow a configurable user group to allow, and then make wheel allowed. 19:21:07 that makes sense to me 19:21:16 (Or we could create a new separate group, but I don't think it's worth the trouble.) 19:21:17 I mean, that should probably already solve a large part of the problem 19:21:17 well, we give spins/labs/editions pretty wide lattitude in deciding what is right for their use case... I'm not sure this is something worth fighting over with FCOS if they feel it's in their users best interests. 19:21:48 yeah, that approach seems much better than just allowing * 19:21:51 nirik: so then by that logic we could ship the RPM, then every spin could ship it anyway, effectively bypassing us 19:22:05 I'd rather not establish that as a model 19:22:06 But to solve this comprehensively, we'd need to provide login also in the initramfs. This is more complicated, because we want to make sure that the password cannot be attacked offline too easily. 19:22:21 the rpm? 19:22:24 I vaguely recall seeing that implemented somewhere else before, but I don't remember where 19:22:46 by pulling in /etc/passwd and /etc/shadow into the initramfs and setting up initramfs pam login 19:23:31 nirik: the Change adds an rpm to systemd that gets pulled in with the dracut rescue config package 19:25:04 There are at least two issues with the initrd: the initrd might "leak" and then an offline attack on the password might be possible. With argon and the other new hashing methods this is less of a problem. 19:25:41 But if possible, it'd be nice to slap TPM2 encryption on top, to close this attack avenue more completely. 19:25:49 Sorry, I have to drop off now. 19:26:07 Then there's a practical problem of how to update password in the initrd when users change their passwords. 19:26:59 In the current model with dracut, we can't really regenerate initrds on demand, so we'd be stuck with the old passwords until the initrd is regenerated. 19:27:21 that's not very nice 19:27:50 With the new approach that we're developing with sysexts, it might be possible to store the passwords as one sysext that is shared between initrds, and then *that* could be updated fairly easily. 19:27:57 bah... internet outage here. ;( 19:28:51 But some plumbing would be necessary… I think we'd be able to say something more concrete in a few months. 19:29:42 What about systems with purely-enterprise accounts? 19:29:46 let's reject the proposal as is and wait for zbyszek and co. brings in a few months? 19:30:15 I wouldn't want to block other people from working on proposals. 19:30:37 well, that's based on what salimma has said on devel 19:30:46 StephenGallagher: I don't understand. What are "purely-enterprise accounts" ? 19:31:17 zbyszek: Consider a system installed with no root user and user accounts provided by a FreeIPA/Active Directory domain 19:31:26 There are no active users in /etc/passwd in that case 19:32:12 StephenGallagher: ah, ok. I guess that that case falls into the first category I described above: if it boots up enough to join the domain, some group of users can be allowed to log in. 19:32:27 (The answer "disallow disabled root in this case" is valid, but it needs to be considered) 19:32:34 But if it breaks before that, only the root account can be used. 19:33:34 Well, in that example it would need to boot enough for SSSD to start. 19:33:43 Which is definitely post-initrd 19:33:46 StephenGallagher: not having *any* local user account sounds like a problem even now, what if network needs to be configured etc.? 19:33:56 can sssd even be used in initramfs? 19:34:16 Eighth_Doctor: there is no difference between the initramfs and "normal" systems. 19:34:16 it can, but you have to call it initramfsss 19:34:26 dcantrell: +1 19:34:27 dcantrell: nice! 19:34:37 lol 19:34:48 zbyszek: well, there kinda is: can we even get services to start that early? 19:34:52 It can, but it's needlessly complex 19:35:06 :D 19:35:33 People have this notion that it's different, but that hasn't been true for the last few years. 19:35:34 As I said, the answer "don't allow root to be disabled when enterprise login is enabled" is a perfectly valid one. 19:35:40 I just want it on the record. 19:36:02 then we need to force a valid root credential, right? 19:36:12 Dracut initrds install systemd, and use it to start various services, and apart from the fact that the root filesystem is tmpfs not e.g. ext4, for services there really isn't any difference. 19:36:51 Conan Kudo: What do you mean? Please define "valid" and "credential" in that sentence :) 19:36:58 and "force"! 19:37:08 lol 19:37:16 meaning anaconda can't let people install without setting a root password 19:37:34 Right 19:37:49 that would have repercussions for Workstation too, because we don't configure enterprise login until we reboot into the installed environment 19:37:58 we'd have to assume enterprise login 19:38:04 Well, maybe. I'd prefer if it just recommended setting a password. 19:38:18 Like it does with weak passwords: "press DONE twice". 19:38:36 we could also pull a YaST and have Anaconda default to copying the user password to root 19:38:43 NO 19:38:54 lol 19:38:57 so for the record, all those kinds of customizations are handled by install classes in anaconda 19:39:18 yast does other hilarious and fun things the last time I looked at it, like letting you pick what representation format you wanted in /etc/fstab. sure, why not 19:39:25 Maybe I should rephrase my suggestion. 19:39:53 Anaconda must require either a root user or a non-root administrator account if Enterprise Login is enabled. 19:39:55 dcantrell: I'm all for equal representation and diversity in the fstab 19:40:28 Not me, I'm a curmudgeon when it comes to my filesystems 19:40:44 StephenGallagher: but why would we want to force this? So far this hasn't really been a problem, afaik. 19:41:19 exactly 19:41:25 it's not a new problem 19:41:26 If it turns out that people install systems with Enterprise Login and never successfully manage to join the domain, then we want to force that. 19:41:39 *we would want 19:43:01 I imagine that there are for example kickstarted enterprise setups that "just work", and they might be fine without the root password. And if something goes wrong, just reimagine the machine from scratch. 19:43:12 True enough 19:43:19 I may be overthinking the problem 19:43:31 In any case, I made sure it's on the table. Let's move on :) 19:44:06 yes please :) 19:44:36 So... to make this more constructive: maybe Neal and the other change owners and I and some other people from systemd side could have a meeting and discuss what options we have. 19:44:47 I don't think we can solve this here. 19:45:30 +100 19:45:34 * nirik nods 19:45:54 agreed 19:46:17 #action zbyszek to set up a meeting with Change owners to discuss alternative approaches 19:46:25 #topic #2717 Blender 3.0.0 on Fedora 35 19:46:25 .fesco 2717 19:46:26 zbyszek: Issue #2717: Blender 3.0.0 on Fedora 35 - fesco - Pagure.io - https://pagure.io/fesco/issue/2717 19:46:55 not much to do here 19:47:01 Agreed. 19:47:03 I don'T undesrtand why this happened :( 19:47:13 I'm rather annoyed by this, personally 19:47:23 ugh, this one ... I wonder why bother with opening a Fesco ticket but then push the "push the stable" button anyway? 19:47:37 This is literally the exact scenario for which Modularity was invented. 19:48:09 StephenGallagher: heh 19:48:33 That wasn't a joke 19:48:39 :( yeah, asking and then just pushing it stable isnt nice. 19:48:57 If that had been done in F36 only and then made into a module for F34/F35, everyone would have been happy. 19:49:09 Or if Blender was distributed as a Flatpak... 19:49:25 Or in a COPR 19:49:35 Pretty much any of the tools we have except the one this packager used :-/ 19:49:39 Or as a compat package: blender-next :) 19:49:51 so many choices. 19:50:12 I'm not sure I'm annoyed enough to require an epoch-bump downgrade, but I'm close 19:50:23 ugh 19:50:25 Have there been complaints from users? 19:50:49 on this or just in general? :) 19:51:04 (I have not specifically seen any complaints about this issue) 19:51:23 I'd say we should admonish the maintainer to not do that kind of thing again and leave it... but I am not sure how much breakage is happening or unhappy users... 19:52:16 why is this actually needed in F35? 19:52:20 so far nobody screamed 19:52:22 is it just to be current? 19:52:31 dcantrell: Exactly the reasoning given 19:52:48 "as the benefit will be to keep up to date with upstream." 19:52:50 then I say we strike this and tell the maintainer to keep it in rawhide for now 19:53:10 strike as in revert and bump epoch? 19:53:11 dcantrell: what do you mean by 'strike this' there? 19:53:17 it involved multiple soname bumps and that should be red flags for stable branches already ... 19:53:22 that's breaking it twice 19:53:28 this was all done in a side tag, right? 19:53:35 yes 19:53:39 but it is in stable 19:53:47 the side tag was merged 19:53:48 so can't all that just be dropped before being pushed to users? 19:53:51 -1, I don't think we should force a revert unless there's ongoing breakage for users. 19:53:52 oh, that part I missed 19:53:52 Right, they merged it in without waiting for our reply 19:53:59 dcantrell: it already has been pushed t users 19:54:09 oh, well this is a stupid conversation then 19:54:21 +1 to giving the maintainer a "stern talkin' to" to not do this again 19:54:23 things liek this happen all the time,e xcept for asking fesco 19:54:26 *like 19:54:29 Like I said, I'm not quite at the point of demanding a reversion, but I'm very unhappy with this. 19:54:42 stable shouldn't be for chasing upstream for the sake of chasing upstream, especially with ABI breaks 19:54:44 my impression is that the maintainer read music's comment, approached fesco and assumed that's all that was needed 19:55:26 if they would have not asked us, we would not even know 19:55:41 though forcing a revert and epoch bump does leave a permanent mark and reminder as to what not to do (see bind and dhcp) 19:55:51 StephenGallagher or nirik: could one of you maybe write a mail to luya? 19:56:13 it makes me sad, especially the fact that they went ahead and *manually* pushed the update after receiving negative feedback and before waiting for our reply 19:56:21 I'm pretty sure bind's epoch number is a mistake 19:56:27 since that number is ridiculously high 19:56:31 but I've seen provenpackagers done worse for packages they don't even maintain 19:56:33 Eighth_Doctor: it has a very hilarious history 19:56:47 I'm happy to share the story with you the next time we meet in person or whatever 19:56:56 for sure 19:57:00 zbyszek: sure. 19:57:05 I'm curious 19:57:15 or just update the ticket with it? 19:57:22 mhronhok: a lot more should be proven before provenpackagers become provenpackagers 19:57:36 I thought it'd be better to do this offline, and not in the public ticket. 19:57:41 nirik: Thanks. I'm pretty sure I couldn't maintain a civil tone writing that. 19:57:48 zbyszek: +1 19:57:54 ok 19:57:57 #action nirik to write a mail to the maintainer 19:58:00 * nirik adds to the todo 19:58:16 OK, and now, the *second* favourite topic of everyone here! 19:58:22 #topic Next week's chair 19:58:26 do the packaging guidelines explain what stable updates are for? need clarification? 19:58:35 dcantrell, yeah they do quite well 19:58:48 zbyszek: ahh, ok, so they are just "README encoded" then 19:58:55 that's tuesday 18 UTC 19:59:20 Are any of the US members going to be absent for the Day of Service? 19:59:21 I can chair the next meeting 19:59:31 StephenGallagher: that's next meeting? 19:59:38 Oh wait. 19:59:41 dcantrell: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/ 19:59:46 No, because now we are meeting on Tuesdays :) 19:59:51 That's next Monday. 19:59:58 :) 20:00:11 We put a lot of polish into those docs. 20:00:17 zbyszek: yep, definitely looks like README encoding 20:00:49 #action mhroncok will chair the next meeting (Tuesday!) 20:00:59 #topic Open Floor 20:01:00 tomorrow? or next ween? 20:01:02 *week? 20:01:05 next week 20:01:15 oh good. just wanted to be sure 20:01:15 :D 20:01:19 who updates the calendar? 20:01:23 I can update the wiki 20:01:34 I think I can update the calendar. 20:01:36 * StephenGallagher checks 20:02:52 Yes, I can do it 20:03:03 Anything for open floor? 20:03:31 If not, I'll close in a minute 20:03:53 I have nothing, I am an emtpy shell 20:03:56 zbyszek++ 20:04:24 I'm an empty shell too. It's late. 20:04:32 #endmeeting