Re: FC5 and Yum Plugins

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 12/31/05, Naheem Zaffar <naheemzaffar@xxxxxxxxx> wrote:
> Will this plugin allow packages to move from a protected core to a protected
> extras, and vice versa?
>
> After all That is a perfectly reasonable event.

That's one of the problems with the concept of protectbase... for
consistent operation across upgrades it would have to protect both
Core and Extras if it were turned on by default.. preventing 3rd party
repos from overriding even Extras. That's a very tight constraint on
3rd parties.

This is an absolutely pointless default plugin.  All it does is
encourage people to selectively use 3rd party repositories in a way
they were not designed or intended to be used. You either trust a repo
or you don't. Repos that want to be strictly compatible with
Core+Extras will choose to structure their offerings in a way that
makes protectbase moot. Users who want atrpms to be strictly
compatible with Core+Extras should go convince Axel to restructure. 
For 3rd parties who desire to offer replacement packages, atrpms,
newrpms and livna ( in at least the case of audacity ) this plugin
KILLS the intended purpose of the 3rd party repo and it WILL lead to
untested and undiagnosable problems related to delibrately holding
back replacement packages.  3rd parties have reasons for offering
replacements. You either trust the reasoning of the 3rd party repo or
you don't.  If you do not want to trust the 3rd party repo.. do not
use it for anything.

I do not believe users who delibrately go out of their way to
selectively pull crap from 3rd parties are worth "protecting". These
users are delibrately doing things that the repository maintainers do
not encourage nor recommend.  This project should not make default
settings that encourages users to abuse the intended purpose of 3rd
party repos.  The argument that this is a security measure.. is nuts.
Once you choose to pull any packages from a 3rd party you sure as hell
better trust the security practises of that 3rd party... scriplets can
do amazingly wonderful things..even with selinux enabled.  If you are
concerned about the security implications from nrpms or atrpms or
whatever.. you don't configure those repos for ANYTHING. The problem
is NOT overlap.. the problem is users are googling for crackrock quick
install instructions and finding "popular" instructions that
shortcircuit repository usage patterns recommended by the repo
maintainer.  Do not doubt for a second that in the future "popular"
recipe instructions will be created that tell users to turn this
feature off so as to make something like nrpms work. I find it
absolutely paradoxical that we are debating "protecting" users by
default from 3rd party vendors they have to go out of their way to
configure and enable to see on their system at all.

Is there any usage other than mythtv right now, that invovles
widespread selective use of a 3rd party repo?  Widespread as in you
can find a highly ranked google recipe that tells users to enable a
repo selectively?  All the mythtv users out there who want to
selectively pull mythtv from atrpms., should convince Axel to jettison
those packages off as a subrepo.. or stop using atrpms. Forcing a
default configuration option that breaks how 3rd party repos are
intended to work is the wrong solution.  For users who want to use a
repo selectively... yum already provides configuration directives to
handle updating sanely. They are called exclude and includepkgs. Sadly
the frelling recipe writers who are telling people how to add and use
3rd parties selectively are not telling people how to use the
configuration directives to narrow the scope of the repo. man
yum.conf. The original poster to this thread should take the time to
learn how to configure his atrpm's definition to encode the mythtv
packages selectively using "includepkgs" instead of looking to this
project to create a hack default policy which supports his
unrecommended package usage pattern.

-jef

-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux