- 1 Fedora Weekly News Issue 143
- 1.1 Announcements
- 1.2 Developments
- 1.3 Infrastructure
- 1.4 Artwork
- 1.5 Security Advisories
- 1.6 Virtualization
- 1.6.1 Enterprise Management Tools List
- 1.6.2 Fedora Xen List
- 1.6.3 Libvirt List
- 1.6.4 oVirt Devel List
- 1.6.5 Other Virtualization News
Fedora Weekly News Issue 143
Welcome to Fedora Weekly News Issue 143 for the week ending September 7, 2008.
This week Announcements trumpets the arrival of a new version of Bodhi, the freeze of Rawhide and some essential reading on the new package keys. In Developments we shock you with "Non-X System Consoles to be Removed". Virtualization alerts you to "Virt-manager 0.6.0 Released" and dives into how developers are "Laying the Groundwork for Xen Domain 0 Support". The ever entertaining Artwork beat examines "How to Select a Winning Theme" and SecurityAdvisories provides a handy list for your perusal.
If you are interested in contributing to Fedora Weekly News, please see our 'join' page.
In this section, we cover announcements from the Fedora Project.
Contributing Writer: Max Spevack
Fedora 8 and 9 Updates
Jesse Keating wrote more about the status of updates on Fedora 8 and Fedora 9. "We're in the final stages of testing a few corner cases, and preparing the official builds of fedora-release, PackageKit, gnome-packagekit, and unique (needed as a new dep for gnome-packagekit). All existing updates in the old update locations will be purged, and just these updates will be put in their place, signed with our old key. Once you've updated to these packages, the next update attempt will point you to our new locations with our new keys and you should be able to process any further pending updates. You'll be prompted to import the new key along the way."
Additionally, "these updates are designed to transition users from our old repo locations to new locations that have all our updates re-signed with a new set of keys."
I encourage everyone to read both announcements, and also to visit the information page on the Fedora wiki.
Luke Macken has been very active in Bodhi development lately.
"One of the most noticable changes is that bodhi is much more responsive. Previously, bodhi was a single python process, running on a single server. This single server was also responsible for composing the updates repositories, and rawhide, among lots of other bodhi-related churn. This lead to much pain and suffering for all.
The bodhi deployment has since changed. All bodhi requests are now load balanced to a bunch of app servers, each running mod_wsgi with multiple bodhi processes, each with multiple threads. All of the hard work is now done on an isolated releng server. This separate bodhi "masher" is now responsible for composing repositories, updating bugs, generating update notices, sending emails, extended metadata generation, and calculating metrics. I also added support for inter-bodhi communication, which allows our bodhi web frontends to kick off push requests to our bodhi-masher instance."
Plenty more new-feature discussion in the full email.
Frozen for Fedora 10 Beta
Jesse Keating announced that Rawhide is now frozen for Fedora 10 Beta. "Rawhide will compose from the frozen content so that we all are aware of what Beta is going to be comprised of. Extra scruitiny and testing of rawhide over the next week is greatly appreciated."
In this section the people, personalities and debates on the @fedora-devel mailing list are summarized.
Contributing Writer: Oisin Feeley
External Repositories and the New Keys
As a result of the re-signing all the packages with a new key as a security precaution some problems with packages from third-party repositories were reported by Callum Lerwick. The specific example was an update of the non-Free "xine-lib-extras-nonfree". Seth Vidal suggested a simple fix of
yum --skip-broken update.
Jef Spaleta experienced no such error and speculated that it was due to some mirrors being temporarily out of sync, which Matthew Woehlke agreed was likely. Kevin Kofler disagreed and diagnosed the problem as a "chicken and egg" one in which it was impossible to get the new repository key which in turn would enable the new, matching xine-lib to be obtained. He suggested that while it was possible to use
yum --skip-broken or
yum --exclude for a selective update it would be better for new users to "[...] use the PackageKit GUI, click on "Review updates" and uncheck the xine-lib-extras-nonfree update, then apply."
Thorsten Leemhuis thought that this was a general problem for the livna repository in which they can only "push [too] early or [too] late". He had outlined the problem previously (see FWN#138 "Solving the Unsynchronized Release of Package Dependencies") but his suggested solution of adding a brief time period during which yum keeps checking for missing dependencies had not obtained traction. Thorsten explained again: "[...] the problem happens each time when Livna/RPM Fusion packages with deps on a specific Fedora packages get pushed in sync; that creates a lot of trouble * I'd say once for 24 hours each two weeks." He conceded that
yum --skip-broken was "[...] best answer, but that's not enabled by default in Fedora. Livna/RPM Fusion could fix that via its releasepackages, but that's not nice and I want to avoid going that route."
On the foot of a suggestion made by Harald Hoyer to add "More Information button in PackageKit dialogs, which explains the situation and that this might only just take some days to resolve[.]" Richard Hughes asked for specific suggestions to improve the current dialogs. He added that "[m]y personal view is that by showing an error dialog, we've lost, and should avoid doing it at all costs." Thorsten responded to Harald that he believed that it was best to "[...] enable skip-broken by default, but show the error to the user if security updates are involved *or* if the problem doesn't vanish within 72 hours after it had been hit on the client for the first time" and that for the latter cases PackageKit could show some more information.
Non-X System Consoles to be Removed
ArthurPemberton was concerned about the best way to help debug the many PulseAudio issues which he was experiencing on Fedora 9. He asked "[w]hat information should I gather, how, and where should I present it?" This innocent enquiry spawned several sub-threads which avoided answering his question.
In the first Bill Crawford recommended disabling PulseAudio and although Ignacio Vazquez-Abrams listed features unique to it Karel Zak was skeptical that "ordinary" users would need them. Toshio Kuratomi responded that the network transport features were very useful for thinclients.
Janina Sajka chimed in to agree with Arthur that while the idea of PulseAudio was appealing and "[...] holds great promise for accessibility [...]" there appeared to be practical problems to sort out. Janina referenced SpeakupModified.org, which provides repositories for a Fedora-derived distribution tailored towards users that rely on audio cues instead of visual ones, and noted that it was currently necessary to disable PulseAudio because "[...] one gets no audio until after a user logs in on the GUI. So, how are those who need screen reader support supposed to use the a11y features of GDM? As it stands, there seems no way to get console audio without that GUI login. Also a nonstarter in the screen reader user community." She asked if anyone had a "working init script for pulseaudio as a system daemon?" None of the many message that followed appeared to have an answer to this question. In part this appeared to be because Orca can handle the audio rendering of the GDM login screen. Colin provided references that should make it possible to configure GDM to work this way out of the box using GConf settings. It seemed that this was a possible solution.
At this point Colin Walters set off a firestorm of complaints and queries when he announced, as an aside, that "[w]e're going to be removing the legacy non-X system consoles by default in the long run."
Jerry james listed three scenarios in which he felt it would be very useful to have text consoles. The advantages included faster startup than with Xorg and independence from a damaged X session. Colin rebutted most of these with the argument that "login is slow" was a bug which should be fixed and that the other scenarios also were constructed on the basis of bugs which should be fixed (in the applications themselves and in Xorg's ability to handle crashes.)
Matthew Woehlke also wondered what would happen if Xorg itself was broken and Colin asked rhetorically "What happens when the linux kernel is broken? What happens when /bin/sh is broken? What happens when NetworkManager is broken?" He added that a compressed recovery image should be included by default in a Fedora install. Matthew's response suggested that although it would be possible to recover it would mean having to find a rescue disk and to reboot. He expressed a preference for "[having] X fail to start and dump me at a normal console from which I can fix the problem *without rebooting*, much less needing to dig up a rescue disk :P" and compared the alternative to the fragility of Windows. The issue then became a little clouded when Colin stated "I believe we already do that today, and am not advocating removing that functionality if possible. Anyways, I've said what I need to, so hopefully people won't be surprised later." Further requests for clarification on the previous statement produced no simple response, although later Colin did appear to confirm the impression that he saw this as an essential change for the evolution of Fedora as a Desktop.
make force-tag Gone
The removal of
make force-tag was objected to by BastienNocera as it forced bumping the Release of packages even for trivial changes. A massive thread resulted with a good deal of agreement expressed with Bastien.
Mike McGrath made the case that if maintainers tested packages before committing them there would be no problem and adduced the necessity of the producing an audit trail for licensing as a concrete reason for maintaining the current workflow. Jon Ciesla had earlier mentioned using
TAG_OPTS=-F make tag as a work around and now asked if "the Makefile can be modified to prevent it, so that others who didn't know [that this invalidates the audit trail] stop doing it?" Doug Ledford responded that this would be unenforceable as it would still allow the CVS command to be run by hand and "[i]f our recent 'incident' showed us anything, it's that things like this need to be enforced on the CVS server if they are going to be enforced at all."
Jesse Keating argued that the issue was more GPL compliance than an audit trail and outlined why he would personally prefer to move away from building from CVS tags. Jef Spaleta suggested that Mike McGrath had misspoken: "You are of course free to make 300 small separate specfile changes between each build attempt. There is a desire to move to a point where we can be reasonably sure that a cvs tag corresponds to a specific build. Since we have no way of making only tags corresponding to successfully built packages immutable, all tags must be immutable" and like Mike asked for a way to mark as immutable a subset of CVS tags corresponding to a successful Koji build.
The thread is recommended reading for package maintainers and the brief summary above misses many important points.
Graphics Modesetting Changes
A post by Dave Airlie reminded the list that [KernelModesetting] was going to be one of the notable features of Fedora 10 for recent Radeon "r300 to r500 (and possibly r600/r700)" and Intel "from i830 to GM45 (though it may end up i915 and up only)" GPUs . Adam Jackson responded to Bill Crawford that r200 class hardware would probably not get modesetting in Fedora 10. Among other things this will have cosmetic advantages such as removing flickers from the startup sequence, reducing Xorg startup times and practical advantages such as oops/panic messages while Xorg is running and improved suspend/resume support. Dave cautioned that only a subset of the GPUs were working for the beta release "[...] r300 to r500 class of hardware, while we await upstream changes to the Intel driver" and noted that to disable modesetting one should append
nomodeset to the kernel command line via
In response to Hans de Goede Dave welcomed bug reports of the "output doesn't light up" type and suggested using an
ssh session to reboot to runlevel 3 with nomodeset and then
rmmod radeon drm; modprobe drm debug=1; modprobe radeon modeset=1 and attach
dmesg and an Xorg log to the bugzilla entry. Following this recipe produced no luck for "Joshua C." as everything froze once he followed the last step.
Skepticism about inserting the Intel driver code after the beta testing period was expressed by Jeremy Katz on the foot of such late changes lacking both the visibility necessary for testing and the time to fix any bugs revealed. Jeremy was mildly scathing: "Yeah, I've seen intel's 'mature' code before. Excuse me if this is anything but reassuring." Jesse Keating and Christopher Snook seemed to accept Jeremy's point and leaned towards the idea of implementing the KernelModesetting contingency plan of including the modesetting code disabled by default, but allowing users to enable it on the kernel command line.
Adam Jackson wondered whether Jeremy was advocating removing all the new code or testing it all and Jeremy suggested the third option of only enabling the radeon code for now and waiting for Fedora 11 to enable the Intel code.
When "Joshua C." asked for a list of working radeon cards and suggested applying the contingency plan because "f10 is just a month away" he was corrected  by Paul Frields that it was approximately two months away with a development freeze in six weeks. Dave asked Joshua to "[...] stop scare mongering[,] it's a beta release, if it still doesn't work at devel freeze I'll blacklist all the broken machines" which reaction surprised Joshua a little.
Root Login Disallowed on GDM
Surprise was expressed by "Dr. Diesel" when he attempted to log in as root via GDM to a rawhide install. "Dr. Diesel" reported that it was possible to log in via the console in runlevel 3. He asked if he should file a bugzilla entry.
Darrell Pfeifer quoted the changelog as evidence that this restriction was intentional to which "Dr. Diesel" responded that it would be a good idea to change the prompt to "[...] something like 'Root login disabled'[.]". Matthew Woehlke was disturbed and wondered "[...] what exactly are we supposed to do when the user login gets hosed? Reach for a rescue disk? (Seriously, what's with the sudden trend to make fixing problems harder by making recovery modes inaccessible in an apparent bid to hide the "confusing/potentially dangerous" bits of the system from the user?)" The latter part of this apparently being a reference to another recent thread (see this FWN#143 "Non-X System Consoles to be Removed".)
Benjamin Lewis presented a straightforward, obvious way of fixing such problems: "CTRL+ALT+F1, login as root, fix it, CTRL+ALT+F7 to get back to GDM" and Martin Sourada added "[or] boot to runlevel 3, login as root there and startx..."
The discussion was moved on by Nigel Jones with a suggestion that the default setup should configure sudo to allow the first user configured during firstboot to have "full access w/ password." Steven Moix disagreed as this all seemed like the "Ubuntu 'protect us from ourselves' way" which removed the conscious choice to log in as root. Martin Sourada was also filled with dismay at the idea, but his objection was that PolicyKit was a superior solution to sudo. This preference was confronted by Thorsten Leemhuis with a request to "[...] please tell me how for example read /var/log/messages or other log files from /var/log/ using PolicyKit from a -gnome,kde-terminal with an easy to remember and fast to type command (like 'sudo') [.]" Thorsten also suggested that firstboot could present a checkbox labeled "User is the sysadmin for this system" that when checked would configure sudo and/or PolicyKit or any other desiderata for allowing root privileges for the user. Matthew Miller largely agreed with this and suggested that "uncommenting the wheel group in /etc/sudoers, and having said checkbox add the user to the wheel group" would be the way to do it, but Seth Vidal raised the problem of "[...] the wheel group, on systems which are using some other form of nss than local files, can be mucked with too easily."
All this was strangely reminiscent of previous discussions, e.g. FWN#103 "Root Login And Display Managers In Rawhide" except that PolicyKit now offers some possible new directions as Martin Sourada outlined[11:] "What I am mostly against is having full access to sudo without password by default by any user. I believe PolicyKit is designed to solve this issue by granting rights (by admin) to user to do this and that and not do other admin tasks [...] the implementation should IMHO be like cat/nano/vi/whatever detects that you are trying to access some file you don't have enough rights to access, then it asks PolicyKit whether to allow it or not and PolicyKit handles the rest (i.e. checks whether your admin already allowed that access for you, if not asks for root password for allowing the access and if succeeded sends back that its OK for you to access the file). Ideally it wouldn't require any additional command (like sudo) [...] When I want to view logs (though I don't very much understand why I cannot read them as normal user) I just log in as root (in console/gnome-terminal only!). Yeah it's not pleasant to write root password every time I want to do some admin task - and that's probably one of the reasons why PolicyKit has been developed - but I think allowing full access to sudo without password for normal user account is a big security hole."
Missing Screen Locking Spurs Inquiry Into User-state Maintenance
When John Ellson enquired why "[...] my userid, and only my userid, has no Lock Screen menu item or applet?" a brief thread revealed the many places in which user state is kept. The answer, for the impatient, turned out to be that John had experimented with Pessulus, which allows administrators to enforce mandatory GConf settings on users.
John's first pass at the problem was to wipe out some dot files
rm -rf .gnome .gnome2 .gconf .gconfd .metacity and this failed to restore the default. Chris Snook suggested that he consider
/tmp as another location where "per-user state is kept" but John had investigated both
Jesse Keating wondered if "[...] it's not a ConsoleKit interaction making the session think your user isn't at the console?" John replied that he had gone to the extraordinary lengths of "moving aside my home directory, deleting my userid, removing everything in /tmp and /var/tmp, rebooting creating a new userid with the same name (but different user and group numbers), and it still has no Lock Screen!!!" Jef Spaleta made the disclaimer that he did not "[...] understand PolicyKit/ConsoleKit well enough to help you track it down in the filesystem with 100% confidence[...]" but suggested searching in /var/lib/PolicyKit and /var/lib/PolicyKit-public for per-user authorization rules. This was reported as fruitless by John, as was running
polkit-auth. John wondered where the output of
polkit-auth came from as "Removing /var/lib/PolicyKit/user-ellson.auths doesn't change the output."
MatthiasClasen cut straight to the chase and suggested a good, old-fashioned backtrace "Why don't we stop all this blind guessing, and attach a debugger to the panel instead ? It would be so much easier..." Although John wondered why
gnome-panel sprang to Matthias' mind as a culprit a later suggestion to "[...] break in panel_lock_screen_action_available [...]" gave him a clue as to the problem.
Pessulus has been around since Fedora 7 at least and the process above was a bit of a wild goose chase, but what is interesting is how difficult it is to solve such a problem due to the many places in which such information is stored.
This section contains the discussion happening on the fedora-infrastructure-list
Contributing Writer: HuzaifaSidhpurwala
More puppet training!
Mike McGrath writes for fedora-infrastructure-list 
Mike proposed that he is going to hold a couple of trainings for Puppet on fedora-infrastructure. And asked if any one had questions etc to be included in the training.
Removal of old projects from fedorahosted.
susmit shannigrahi writes for fedora-infrastructure-list 
Susmit reminded the list that, Fedora has a policy to remove _any_ hosted projects that are not altered or updated for last six months. And provided a list of projects, which falls into this category and they will soon be removed.
Mike McGrath writes for fedora-infrastructure-list 
Mike reminded everyone that the beta freeze is going to live and it will end on 2008-09-24. This is the first pre-release freeze type the infrastructure team has had 
In this section, we cover the Fedora Artwork Project.
Contributing Writer: Nicu Buculei
How to Select a "Winning" Theme
MairinDuffy opened a debate on @fedora-art about the best way to select the final theme in a release: "We have not yet had a case where more than one theme met this basic requirement. In case we do have multiple themes that meet this requirement, we need a fair method to choose which theme is selected as the default" and going further, she proposed a solution and asked for opinions: "My suggestion is that we have a vote within the set of active Fedora art team contributors. The problem is how do we determine who is allowed in this vote - who is active? "
SamueleStorari opted for a wide vote in the community "I think the vote will be totally open to the whole community." arguing that "the graphic it's made for all, think about art, think about expression, it comes from the inside need of someone to express to other, to comunicate.", an opinion endorsed by MariaLeandro and IanWeller who proposed an alternate and complex system "Or, perhaps even better, take a two-part voting approach; 50% of the vote allocated to current Art Team members (recent contributions, 6 months, yada yada) and 50% for the community."
On the other hand, NicuBuculei opposed the community vote invoking the notion of competence "the trouble is that the large community knows little about usability and good design", an opinion similar to that expressed by MatthiasClasen "Taste is not something that can be decided with simple majority. Voting for the default theme would pretty much devolve into 'which is the coolest looking background when glancing at a bunch of screenshots', which is not at all what a good default theme is about. This forum is the place for qualified and interested people to work on the art that makes up the default theme. It should also be the place where the default theme gets put together."
Another argument against a community-wide vote was raised by MairinDuffy "we don't really have time to plan for a Fedora-wide vote, and since there's not much time to wait on people to vote and to get the word out, we won't have a good representation of our base in the vote results."
From his position as a Fedora Board member, JeffSpaleta came to the conclusion "I consider the multiple rounds of discussion over the themes as a prolonged 'community' decision. The final artwork decision is a culminating event in a process. Are people encouraged to participate in the earlier stages of that process as part of the art team? if they choose not to participate in the previous rounds do they have the context to make informed decisions at the final stage? Have they earned the right to be a part of the final decision? I'm not sure they do."
As a solution to get the themes as soon as possible into the hands of the users and receive early feedback MairinDuffy issued a last-minute call for packaging the current proposals into Fedora 10 Beta "if we could get a package put together with the wallpapers that are in the running so far it could make the Beta." The call answered quickly by MartinSourada , who created the packages.The packages were reviewed and are already available in Rawhide.
In this section, we cover Security Advisories from fedora-package-announce.
Contributing Writer: David Nalley
Fedora 9 Security Advisories
- amarok-1.4.10-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00057.html
- libtiff-3.8.2-11.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00102.html
- awstats-6.8-2.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00107.html
- openoffice.org-2.4.1-17.6.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00120.html
- Django-0.96.3-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00131.html
- gnome-packagekit-0.2.5-2.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00136.html
- fedora-release-9-5.transition - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00137.html
- PackageKit-0.2.5-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00138.html
- bitlbee-1.2.2-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00160.html
- bluez-libs-3.35-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00233.html
- bluez-utils-3.35-3.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00234.html
- rpy-1.0.3-3.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00253.html
- R-2.7.2-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00254.html
- samba-3.2.3-0.20.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00271.html
- wordpress-2.6.1-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00278.html
- xastir-1.9.2-9.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00307.html
- libxml2-2.6.32-3.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00347.html
- xine-lib-1.1.15-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html
- adminutil-1.1.7-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html
- drupal-6.4-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00508.html
- fedora-ds-base-1.1.2-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00521.html
- wordpress-2.6.2-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00629.html
- bitlbee-1.2.3-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00692.html
- poppler-0.8.1-2.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00697.html
- httrack-3.42.93-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html
- fedora-release-9-5.transition - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00709.html
- tomcat6-6.0.18-1.1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html
- wireshark-1.0.3-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00713.html
- libHX-1.23-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00723.html
- gnome-packagekit-0.2.5-2.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00728.html
- pam_mount-0.47-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00729.html
- PackageKit-0.2.5-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00731.html
- ipa-1.1.0-7.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00743.html
Fedora 8 Security Advisories
- fedora-release-8-6.transition - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00073.html
- Django-0.96.3-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00091.html
- amarok-1.4.10-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00097.html
- libtiff-3.8.2-11.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00121.html
- libxml2-2.6.32-2.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00162.html
- xine-lib-1.1.15-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html
- xastir-1.9.2-8.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00199.html
- adminutil-1.1.7-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html
- rpy-1.0.3-3.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00219.html
- R-2.7.2-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00220.html
- yelp-2.20.0-12.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00222.html
- drupal-5.10-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00259.html
- bitlbee-1.2.2-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00335.html
- awstats-6.8-2.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00355.html
- openoffice.org-2.3.0-6.16.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00494.html
- wordpress-2.6.1-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00502.html
- bitlbee-1.2.3-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00587.html
- wordpress-2.6.2-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00607.html
- fedora-ds-base-1.1.2-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00708.html
- httrack-3.42.93-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html
- wireshark-1.0.3-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00715.html
- libHX-1.23-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00721.html
- pam_mount-0.47-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00730.html
- ipa-1.1.0-4.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00733.html
In this section, we cover discussion on the @et-mgmnt-tools-list, @fedora-xen-list, @libvirt-list and @ovirt-devel-list of Fedora virtualization technologies.
Contributing Writer: Dale Bewley
Enterprise Management Tools List
This section contains the discussion happening on the et-mgmt-tools list
Virt-manager 0.6.0 Released
Cole Robinson announced the release of virt-manager 0.6.0. Features include:
- Remote storage management and provisioning
- Remote VM installation
- Use Avahi to list libvirtd instances
- Virtio and USB options when adding a disk device
and many more.
Virtinst 0.400.0 Released
Cole Robinson announced the release of virtinst 0.400.0. Features include:
- New tool 'virt-convert'
- New tool 'virt-pack'
- Support for remote VM installation
- Use virtio disk/net drivers if chosen os entry supports it
and many more.
Fedora Xen List
This section contains the discussion happening on the fedora-xen list.
Laying the Groundwork for Xen Domain 0 Support
There are further developments in the state of Xen in upstream Linux (see FWN#137). Pasi Kärkkäinen forwarded a patch announcement from xen-devel list. This set of seven patches begin to lay the groundwork for Xen domain 0 support.
This section contains the discussion happening on the libvir-list.
Libvirt 0.4.5 Released
Daniel Veillard announced the release of libvirt 0.4.5. In addition to a long changelog, the "main features are the improvement of OpenVZ and LXC, the uniform XML handling (and hence format) th[r]ough all drivers, improvements in devices handling for QEmu/KVM and storage pool source discovery."
Segfault if no Qemu Emulator Passed
Cole Robinson patched a bug that resulted in a segfault if a Qemu domain is defined without an emulator value. Daniel Berrange expressed displeasure at letting this bug slip through and proposed a "brown paper bag" release. Daniel Veillard advised against rushing the fix, and offered to push the patch to Fedora's build while other distributions could pick up the fix in a week or two when libvirt 0.4.6 would presumably be released.
Daniel Berrange pointed out code test coverage reports on the build server, and highlighted the need to create a functional test rig for the mass of code that is simply not possible to unit test due to interactions with host OS state / functionality.
Ability to Nice KVM Processes
Henri Cook expressed a desire to nice KVM processes, and proposed a means to pass arbitrary command string parameters to the process startup.
As mentioned in FWN #141, Daniel Berrange pointed out the goal of libvirt is consistent API representation across hypervisors. Fortunately there is a 'schedular parameters' API in libvirt. All that's needed is for someone to implement the schedular parameters driver API for KVM.
RFC Thoughts on Open Source Hypervisor Management
Nathan Charles described his ideal clustered VM provisioning system. Features would include
- cluster administration is done from the command line
- cluster administration can be performed from any node
- a new node can join a cluster on a local subnet with one command
- local storage resources are presented to the cluster so there is no need to have predefined NAS/SAN/iSCSI
- cluster will load balance vm instances from node to node
- a node shouldn't need more than one nic but adding additional nic's provides failover and load balancing
Nathan acknowledged oVirt's virtues, but stated it requires a lot of substantial changes and significant modification to work with an existing provisioning infrastructure. Nathan requested comments on his thoughts.
The only reply so far came from Stefan de Konink, who pointed to some code which seems to be a "handler for libvirt using avahiclient".
oVirt Devel List
This section contains the discussion happening on the ovirt-devel list.
oVirt Source Repository Refactored
Perry N. Myers announced the completion of the restructuring of the oVirt source mentioned in FWN #142. This reorganization resulted in commits of numerous spec files and other changes making an RPM-based install more feasible.
oVirt Migration Status
Atsushi SAKAI asked if the following assumptions were true. KVM supports migration, while Qemu does not. Ovirt release supports migration, developer version does not. Chris Lalancette clarified "there is live migration code in upstream kvm userspace, but not in upstream qemu" and fully emulated guests can be live migrated as long as the KVM binary is used to do it (which ovirt does).
Atsushi inquired of the fake managed nodes, and Chris Lalancette explained the fake managed nodes are abstractions to allow experimenting oVirt with limited hardware. Perry N. Myers added there is work underway to remove the 'fake node' concept.
Network Interface Bonding and Failover Work Continues
Darryl L. Pierce continued work on NIC bonding and failover (see FWN #142) laying out the process a node will use to configure interfaces on bootup and the selection of bonding type which must be selected on the server. Types include
- Load Balancing
- Link Aggregation
Daniel P. Berrange inquired if those four options was a limit of the bonding driver or a design choice, since more complex bonding configurations are plausible. Darryl L. Pierce affirmed it is a design choice to keep things simple initially. Chris Lalancette pointed out there are many combinations of bridges, bonds, and VLANs, and "we have to figure out which combinations are completely insane, which are valid and make sense, and then make sure we can handle those."
Related discussion occurred in another thread on how to configure multiple bondings for a host in the UI.
Other Virtualization News
This section contains virtualization news which may not have been directly discussed on the above mailing lists.
Red Hat Acquires Makers of KVM, Qumranet Inc.
On September 4, 2008 Red Hat acquired Qumranet, Inc., the inventor and key maintainer of KVM. Qumranet also develops Solid ICE which runs a user's desktop in a KVM virtual machine in the data center with users connecting via thin client or other options.