Re: F43 Change Proposal RPM 6.0 (system-wide)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Mar 10, 2025 at 12:44:44PM +0000, Aoife Moloney via devel-announce wrote:
> Wiki - https://fedoraproject.org/wiki/Changes/RPM-6.0
> Discussion thread -
> https://discussion.fedoraproject.org/t/f43-change-proposal-rpm-6-0-system-wide/146855
> 
> This is a proposed Change for Fedora Linux.
> This document represents a proposed Change. As part of the Changes
> process, proposals are publicly announced in order to receive
> community feedback. This proposal will only be implemented if approved
> by the Fedora Engineering Steering Committee.
> 
> 
> 
> == Summary ==
> Update RPM to the upcoming 6.0 major release.
> 
> == Owner ==
> * Name: [[User:Pmatilai| Panu Matilainen]]
> * Email: pmatilai@xxxxxxxxxx


> == Benefit to Fedora ==
> 
> The major theme in 6.0 is increased security and related improvements:
> * enforcing signature checking on by default

snip

> * support for automatic signing on package build (mainly for local use)

Can someone elaborate on how this will work in practice ?

Will RPM be autogenerate a local key per machine for the purpose
of automatic signatures, that is already in the trusted keyring ?

ie, so that 'rpmbuild ...spec && sudo rpm -ivh ...' will "just work" ?

If so, how will this work if you add mock into the mix? Will the
mock env use the local signing key from the "host" install, as
opposed to a different local signing key in the mock chroot ?
Or will we need to get the key used by mock and register it on
the "host", in order to then install the just built package ?

Also same question, but building in mock and then transferring
the package over to a different machine for installation ? Can
the local signing key from mock be easily transferred too ?


> == Upgrade/compatibility impact ==
> 
> * Existing package build+install workflows may need to be adjusted due
> to enforced signature checking being the default.
> * 3rd party scripts and tools may need adjusting to the new key
> addressing format and other signature related output changes.

I presume the intent is that the (probably many) regressions that these
changes will trigger, will *not* be considered justification to trigger
the contingency plan, unless the impact unexpectedly severe ?

IOW, we're fully expecting stuff to break and users are expected to
do the work to fix compatibility asap.

> == Contingency Plan ==
> 
> * Contingency mechanism: Revert back to RPM 4.20
> * Contingency deadline: Beta freeze
> * Blocks release? No

With regards,
Daniel
-- 
|: https://berrange.com      -o-    https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org         -o-            https://fstop138.berrange.com :|
|: https://entangle-photo.org    -o-    https://www.instagram.com/dberrange :|

-- 
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Users]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]

  Powered by Linux