-
Notifications
You must be signed in to change notification settings - Fork 158
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
manifest: Enable cliwrap #830
Conversation
This probably deserves higher visibility. Let's discuss it in Wednesday's community meeting. |
Filed meeting ticket at coreos/fedora-coreos-tracker#730. |
This was discussed in the community meeting:
|
9ee3bc5
to
1404c88
Compare
This functionality has been around for quite a while in rpm-ostree but I'm not aware of anyone using it. I'd like to turn it on here so we can gain the benefits, which right now are better protection against non-ostree-aware commands run as root (`rpm` and `dracut` namely). A bit more in coreos/rpm-ostree#1789
1404c88
to
46151a3
Compare
OK rebased 🏄 on next-devel per discussion. |
So because of how the branches are setup, to only turn this on for
|
Ahh right OK. And we should e.g. |
Yeah, exactly (maybe just |
OK I thought about this more, and I think a better way to go about getting small-scale real world testing for cliwrap is to make it easier to enable client side. We can circle back to enabling it by default later. |
This is a better alternative to coreos/fedora-coreos-config#830 Basically rather than trying to send this out to all FCOS users, it's much saner to allow people to opt-in to it locally. If we'd finished coreos#2326 then this would be something as trivial as: ``` $ echo 'cliwrap: true' > /etc/rpm-ostree.d/cliwrap.yaml $ rpm-ostree rebuild ``` Unfortunately that's not the world we live in, so a whole lot of layers here need crossing to just propagate a boolean. And it interacts in a tricky way with our change detection code. But, it works and will allow people to try this out. Other fixed problems: - Our `rpm --verify` wrapping was broken - Dropping privileges clashed with the default directory being `/root`, so `chdir(/)` too
This is a better alternative to coreos/fedora-coreos-config#830 Basically rather than trying to send this out to all FCOS users, it's much saner to allow people to opt-in to it locally. If we'd finished coreos#2326 then this would be something as trivial as: ``` $ echo 'cliwrap: true' > /etc/rpm-ostree.d/cliwrap.yaml $ rpm-ostree rebuild ``` Unfortunately that's not the world we live in, so a whole lot of layers here need crossing to just propagate a boolean. And it interacts in a tricky way with our change detection code. But, it works and will allow people to try this out. Other fixed problems: - Our `rpm --verify` wrapping was broken - Dropping privileges clashed with the default directory being `/root`, so `chdir(/)` too
This is a better alternative to coreos/fedora-coreos-config#830 Basically rather than trying to send this out to all FCOS users, it's much saner to allow people to opt-in to it locally. If we'd finished coreos#2326 then this would be something as trivial as: ``` $ echo 'cliwrap: true' > /etc/rpm-ostree.d/cliwrap.yaml $ rpm-ostree rebuild ``` Unfortunately that's not the world we live in, so a whole lot of layers here need crossing to just propagate a boolean. And it interacts in a tricky way with our change detection code. But, it works and will allow people to try this out. Other fixed problems: - Our `rpm --verify` wrapping was broken - Dropping privileges clashed with the default directory being `/root`, so `chdir(/)` too
This is a better alternative to coreos/fedora-coreos-config#830 Basically rather than trying to send this out to all FCOS users, it's much saner to allow people to opt-in to it locally. If we'd finished coreos#2326 then this would be something as trivial as: ``` $ echo 'cliwrap: true' > /etc/rpm-ostree.d/cliwrap.yaml $ rpm-ostree rebuild ``` Unfortunately that's not the world we live in, so a whole lot of layers here need crossing to just propagate a boolean. And it interacts in a tricky way with our change detection code. But, it works and will allow people to try this out. Other fixed problems: - Our `rpm --verify` wrapping was broken - Dropping privileges clashed with the default directory being `/root`, so `chdir(/)` too
This is a better alternative to coreos/fedora-coreos-config#830 Basically rather than trying to send this out to all FCOS users, it's much saner to allow people to opt-in to it locally. If we'd finished coreos#2326 then this would be something as trivial as: ``` $ echo 'cliwrap: true' > /etc/rpm-ostree.d/cliwrap.yaml $ rpm-ostree rebuild ``` Unfortunately that's not the world we live in, so a whole lot of layers here need crossing to just propagate a boolean. And it interacts in a tricky way with our change detection code. But, it works and will allow people to try this out. Other fixed problems: - Our `rpm --verify` wrapping was broken - Dropping privileges clashed with the default directory being `/root`, so `chdir(/)` too
This is a better alternative to coreos/fedora-coreos-config#830 Basically rather than trying to send this out to all FCOS users, it's much saner to allow people to opt-in to it locally. If we'd finished coreos#2326 then this would be something as trivial as: ``` $ echo 'cliwrap: true' > /etc/rpm-ostree.d/cliwrap.yaml $ rpm-ostree rebuild ``` Unfortunately that's not the world we live in, so a whole lot of layers here need crossing to just propagate a boolean. And it interacts in a tricky way with our change detection code. But, it works and will allow people to try this out. Other fixed problems: - Our `rpm --verify` wrapping was broken - Dropping privileges clashed with the default directory being `/root`, so `chdir(/)` too
This is a better alternative to coreos/fedora-coreos-config#830 Basically rather than trying to send this out to all FCOS users, it's much saner to allow people to opt-in to it locally. If we'd finished coreos#2326 then this would be something as trivial as: ``` $ echo 'cliwrap: true' > /etc/rpm-ostree.d/cliwrap.yaml $ rpm-ostree rebuild ``` Unfortunately that's not the world we live in, so a whole lot of layers here need crossing to just propagate a boolean. And it interacts in a tricky way with our change detection code. But, it works and will allow people to try this out. Other fixed problems: - Our `rpm --verify` wrapping was broken - Dropping privileges clashed with the default directory being `/root`, so `chdir(/)` too
As part of the bootable containers effort, we want to put emphasis on a consistent experience when deriving images. A big part of that is being able to type `dnf install -y ...` in one's `Containerfile`. Let's turn on cliwrap for this. This was previously agreed[[1]], but we ended never shipping it since there was a less invasive way to test it.[[2]] Eventually, once dnf5 is ready, it could take on this role (including package layering on the client-side), at which point we will no longer need to wrap it. [1]: coreos#830 (comment) [2]: coreos#830 (comment)
As part of the bootable containers effort, we want to put emphasis on a consistent experience when deriving images. A big part of that is being able to type `dnf install -y ...` in one's `Containerfile`. Let's turn on cliwrap for this. This was previously agreed[[1]], but we ended never shipping it since there was a less invasive way to test it.[[2]] Here, we bundle it as part of the Fedora 40 change. This will naturally allow it to bake in `branched` and `next` for a while before making it to `stable`. Eventually, once dnf5 is ready, it could take on this role (including package layering on the client-side), at which point we will no longer need to wrap it. [1]: coreos#830 (comment) [2]: coreos#830 (comment)
As part of the bootable containers effort, we want to put emphasis on a consistent experience when deriving images. A big part of that is being able to type `dnf install -y ...` in one's `Containerfile`. Let's turn on cliwrap for this. This was previously agreed[[1]], but we ended never shipping it since there was a less invasive way to test it.[[2]] Here, we bundle it as part of the Fedora 40 rebase. This will naturally allow it to bake in `branched` and `next` for a while before making it to `stable`. Eventually, once dnf5 is ready, it could take on this role (including package layering on the client-side), at which point we will no longer need to wrap it. [1]: coreos#830 (comment) [2]: coreos#830 (comment)
As part of the bootable containers effort, we want to put emphasis on a consistent experience when deriving images. A big part of that is being able to type `dnf install -y ...` in one's `Containerfile`. Let's turn on cliwrap for this. This was previously agreed[[1]], but we ended never shipping it since there was a less invasive way to test it.[[2]] Here, we bundle it as part of the Fedora 40 rebase. This will naturally allow it to bake in `branched` and `next` for a while before making it to `stable`. Eventually, once dnf5 is ready, it could take on this role (including package layering on the client-side), at which point we will no longer need to wrap it. [1]: coreos#830 (comment) [2]: coreos#830 (comment)
As part of the bootable containers effort, we want to put emphasis on a consistent experience when deriving images. A big part of that is being able to type `dnf install -y ...` in one's `Containerfile`. Let's turn on cliwrap for this. This was previously agreed[[1]], but we ended never shipping it since there was a less invasive way to test it.[[2]] Here, we bundle it as part of the Fedora 40 rebase. This will naturally allow it to bake in `branched` and `next` for a while before making it to `stable`. Eventually, once dnf5 is ready, it could take on this role (including package layering on the client-side), at which point we will no longer need to wrap it. [1]: coreos#830 (comment) [2]: coreos#830 (comment)
As part of the bootable containers effort, we want to put emphasis on a consistent experience when deriving images. A big part of that is being able to type `dnf install -y ...` in one's `Containerfile`. Let's turn on cliwrap for this. This was previously agreed[[1]], but we ended never shipping it since there was a less invasive way to test it.[[2]] Here, we bundle it as part of the Fedora 40 rebase. This will naturally allow it to bake in `branched` and `next` for a while before making it to `stable`. Eventually, once dnf5 is ready, it could take on this role (including package layering on the client-side), at which point we will no longer need to wrap it. [1]: coreos#830 (comment) [2]: coreos#830 (comment)
As part of the bootable containers effort, we want to put emphasis on a consistent experience when deriving images. A big part of that is being able to type `dnf install -y ...` in one's `Containerfile`. Let's turn on cliwrap for this. This was previously agreed[[1]], but we ended never shipping it since there was a less invasive way to test it.[[2]] Here, we bundle it as part of the Fedora 40 rebase. This will naturally allow it to bake in `branched` and `next` for a while before making it to `stable`. Eventually, once dnf5 is ready, it could take on this role (including package layering on the client-side), at which point we will no longer need to wrap it. [1]: #830 (comment) [2]: #830 (comment)
As part of the bootable containers effort, we want to put emphasis on a consistent experience when deriving images. A big part of that is being able to type `dnf install -y ...` in one's `Containerfile`. Let's turn on cliwrap for this. This was previously agreed[[1]], but we ended never shipping it since there was a less invasive way to test it.[[2]] Here, we bundle it as part of the Fedora 40 rebase. This will naturally allow it to bake in `branched` and `next` for a while before making it to `stable`. Eventually, once dnf5 is ready, it could take on this role (including package layering on the client-side), at which point we will no longer need to wrap it. [1]: coreos#830 (comment) [2]: coreos#830 (comment)
This functionality has been around for quite a while in rpm-ostree
but I'm not aware of anyone using it. I'd like to turn it
on here so we can gain the benefits, which right now are
better protection against non-ostree-aware commands run as
root (
rpm
anddracut
namely).A bit more in coreos/rpm-ostree#1789
Closes coreos/fedora-coreos-tracker#730.