DevHeads.net

Development

CentOS 7.4.1708 CR new udisks2 package conflicts with extras storaged package

Hi Folks,

There are some missing Provides in new udisks2 package, but as it comes
from uptream, it seems that cockpit extras package shall be rebuild.

Erreur : Paquet : cockpit-storaged-160-1.el7.centos.noarch (@extras)
             Requiert : storaged >= 2.1.1
             Suppression  : storaged-2.5.2-4.el7.x86_64 (@extras)
                 storaged = 2.5.2-4.el7
             Rendu obsolète par : udisks2-2.7.3-6.el7.x86_64 (cr)
                 Non trouvé
Erreur : Paquet : cockpit-storaged-160-1.el7.centos.noarch (@extras)
             Requiert : storaged-lvm2 >= 2.1.1
            

when the fix for CVE-2018-2794 & CVE-2018-2814 would be available in OpenJDK 1.7?

Hi All,

We are currently on OpenJDK 1.7.0_161 and OpenJDK 1.7.0_161 is impacted by CVE-2018-2794 & CVE-2018-2814
It seems we do NOT have an ETA for the fix.

SIG meeting times

I noticed this afternoon that the .ics file linked from
<a href="https://www.centos.org/community/calendar/" title="https://www.centos.org/community/calendar/">https://www.centos.org/community/calendar/</a> was AWOL, and I've replaced
it with one that agrees with all of the times on that page.

I suspect, however, that that page is incomplete and/or out of date.

If you are responsible for a SIG's meeting schedule, please have a look
at that page, and let me know if any updates.

Thanks.

Reboot issue with kernel 3.10.0-862.el7.x86_64

Ok, so I'm trying out CR for 7.5.1804, and I have upgrade three machines
with it.  One is my laptop, a Dell Precision M6700, which worked fine. 
Another is a Dell R715 server, and that worked fine.

CentOS 7.4.1708 CR Available in CBS

Hi Folks,

The CR (<a href="https://wiki.centos.org/AdditionalResources/Repositories/CR" title="https://wiki.centos.org/AdditionalResources/Repositories/CR">https://wiki.centos.org/AdditionalResources/Repositories/CR</a>)
repository was released earlier today. We have regenerated all the
CentOS 7 buildroots in CBS so you can build against the content that
will make it into the next point-release of CentOS Linux.

Machines in ci.centos.org are available with CR as well so you may
continue your testing.

"talking points" for an HPC event

I was hoping to get the attention of folks from the HPC SIG to help me
craft a message to take to an HPC event that I'll be attending soon -
ISC-HPC in Frankfurt. I expect that you're aware of it.

Last year, I got questions regarding what's happening in the HPC SIG in
CentOS, and I know at that time it was still fairly young.

RDO meeting - 2018-04-25

==============================
#rdo: RDO meeting - 2018-04-25
==============================

Meeting started by chandankumar at 15:04:54 UTC.

CentOS PaaS SIG meeting (2018-04-25)

Hello,
It's time for our weekly PaaS SIG sync-up meeting

Time: 1700 UTC - Wedensdays (date -d "1700 UTC")
Where: IRC- Freenode - #centos-devel

Agenda:
- OpenShift Current Status
-- rpms
-- automation
- Training for new committee members
- Open Floor

Minutes from last meeting:
<a href="https://www.centos.org/minutes/2018/April/centos-devel.2018-04-18-17.00.log.html" title="https://www.centos.org/minutes/2018/April/centos-devel.2018-04-18-17.00.log.html">https://www.centos.org/minutes/2018/April/centos-devel.2018-04-18-17.00....</a>

Status of Ansible within CentOS 7 and SIGs

Hello Folks,

Starting with CentOS 7.5, ansible package will no be available in CentOS
-extras anymore as Red Hat decided to ship Ansible on a separate channel.

Looking at ansible package in CBS [1] I see that Troy, Fabian, Sandro
and Alan are rebuilding it.
Can we get better at that task ?

My proposal would to initiate a rebuild of the new Ansible
channel[2](within the Config Management SIG) and follow a better release
cycle.

What do you think ?

CentOS PaaS SIG meeting (2018-04-18)

Hello,
It's time for our weekly PaaS SIG sync-up meeting

Time: 1700 UTC - Wedensdays (date -d "1700 UTC")
Where: IRC- Freenode - #centos-devel

Agenda:
- OpenShift Current Status
-- rpms
-- automation
- Training for new committee members
-- How to get packages into repo's
-- How to create tags, build targets, and repo's
- New time for weekly meeting
- Open Floor

Minutes from last meeting:
<a href="https://www.centos.org/minutes/2018/April/centos-devel.2018-04-04-17.00.log.html" title="https://www.centos.org/minutes/2018/April/centos-devel.2018-04-04-17.00.log.html">https://www.centos.org/minutes/2018/April/centos-devel.2018-04-04-17.00....</a>

Point-Release Freeze of SIG Content while CR is Active

Hi Folks,

At the CBS meeting yesterday we discussed a proposal to freeze the Sign
and Push-to-mirror processes during the period between when CR is active
and a point release.

<a href="https://lists.centos.org/pipermail/centos-devel/2018-April/016610.html" title="https://lists.centos.org/pipermail/centos-devel/2018-April/016610.html">https://lists.centos.org/pipermail/centos-devel/2018-April/016610.html</a>

You may recall that we did something similar for 7.1708

We need to Freeze because we make CR content available in CBS for
builds, and in CI for testing purposes. But, releasing content built
against CR to mirror.centos.org would have had some unintended
consequences (e.g.

Building Power containers for TripleO

Hello all,

I brought this up at this last month at an RDO meeting [0] and again
this week [1] where we decided this topic might be best suited for centos-devel.

The short of it is that we want to start building containers for tripleo
in the community. We discussed this at PTG and it seems feasible.
Basically the goal is to enable the tripleo job pipeline that builds the
containers and uploads them to docker hub set up for ppc64le.[2]

From the IRC chat it seems like the first step is to identify the
hardware where we could do this.

Centos 7.5 query

What is the outlook for Centos 7.5?

--Tom

registry.centos.org is down due to maintenance window from the infra side

Hi All,
There is maintenance window going on from the infra side, so
registry.centos.org is not available for some time.

Impact: users will not be able to pull images from registry.centos.org.
Resolution time: will update on resolution

We are sorry for the inconvenience caused, will keep you posted.

Regards
Bamacharan Kundu

CentOS Origin packages in testing for 3.7, 3.8 and 3.9

We have origin packages for 3.7.2, 3.8.0 and 3.9.0. We also have the
corresponding openshift-ansible packages. They have been put in our
testing repos.

DO NOT USE ORIGIN 3.8.0, IT IS FOR UPGRADE PURPOSES ONLY

These will not be released until *someone* has tested them.

To enquire about the expected arrival of ntp, ntpdate, expat&libxml2 rpms with CVE fix

Hi All,
Can you please tell me the expected release of these rpms which is having the fix for below CVE's.
1. expat rpm:
CVE-2017-9233

2.libxml2:
CVE-2015-8035

3. ntp and ntpdate RPM:
CVE-2017-6462
CVE-2018-7170
CVE-2018-7170
CVE-2016-4954
CVE-2016-4955
CVE-2016-4956

CentOS PaaS SIG meeting (2018-04-11)

Hello,
It's time for our weekly PaaS SIG sync-up meeting

Time: 1700 UTC - Wedensdays (date -d "1700 UTC")
Where: IRC- Freenode - #centos-devel

Agenda:
- OpenShift Current Status
-- rpms
-- automation
- Training for new committee members
-- How to do manual builds of origin and openshift-ansible
- New time for weekly meeting
- Open Floor

Minutes from last meeting:
<a href="https://www.centos.org/minutes/2018/April/centos-devel.2018-04-04-17.00.log.html" title="https://www.centos.org/minutes/2018/April/centos-devel.2018-04-04-17.00.log.html">https://www.centos.org/minutes/2018/April/centos-devel.2018-04-04-17.00....</a>

Proposal : potential "freeze" for SIG content to be built and/or pushed to mirrors

Hi,

As you're all aware, RHEL 7.5 was released yesterday, and at the CentOS
side, the massive rebuild started for all arches (x86_64, i386, ppc64,
ppc64le, aarch64 and armhfp).

We'd like to have your opinion about the following proposal (TBD) :
- we freeze the signing process for now, while we have focus on the
distro rebuild.
- we can also eventually freeze the CBS builders, so that all SIGs are
now waiting for 7.5.1804 content to be available in CBS/koji and so
rebuild against those pkgs

We hope (but can't have any estimate) that for this release, all arches
should be in "sync", so normal

Environment variable $USER not getting updated on using 'exec sudo command'

Hi All,
We are facing an issue with exec sudo command which is resulting in an infinite loop.
We have one script in which we are checking if $USER is not equal to root then execute the same script with exec sudo so that it will run with root.
Code snippet:
script1:

if [[ "$USER" != "root" ]]; then
exec sudo $0 $@
fi
If we run the script with some another user say root1 using below
"sudo -u root1 script1" script1 will run in infinite loop.
In CentOS 7.4 when exec sudo command runs , the value of $USER remains same i.e root1 and again it enters and if block and execute the scipt1 and so on

Proposal: Arm32v7l (armhfp) support on Koji

Hello guys, good morning,

I'm currently maintaining c ommunity-kubernetes-testing [1] for arm32v7l (armhfp) repository using the plague setup.

The packages I need, there're only very minor changes needed to be done on the SPEC files found from SRPMs found on koji. Most packages only a %{arm} is included on ExclusiveArch macro.

EVP_sha1() returning exception invalid digest in fips mode on Centos7.4

Hi,

We are facing an issue when we are trying to sign a certificate using digest value EVP_sha1(). It throws an exception error
"Error: com.adharman.datatools.DataException: java.lang.Exception: java.lang.Exception: [0x80004005] AvMiuOpenSSLCertCreate, X509_sign->0. [error:060B7098:digital envelope routines:EVP_DigestSignInit:invalid digest]"

When I tried same thing with EVP_sha256() it worked. Is there any change in Centos7.4? Any deprecation for sha1?
Please share your thoughts on the same.

LinchPin v1.5.2 (update) has been released

The subject was incorrect. It should have been v1.5.2, not v1.5.1. Sorry
for the additional noise.

Pushing sources back to Centos from RHEL

Even though I am NFV SIG chair, I am still learning.

We have a package, fd.io/vpp  that is in the NFV SIG may eventually be
part of RHEL. As part of the planning process RHEL RCM is asking for the
URL to push packages back to Centos.

What URL or mechanism does RHEL use to push sources to Centos?

Do they use cbs? Does this happen by way of the CentOS git?

Do we need a CentOS git account for NFV SIG?

How do you handle this in Cloud SIG?

--Tom

CentOS Atomic Host 7.1803 Available for Download

The CentOS Atomic SIG has released an updated version
(<a href="https://wiki.centos.org/SpecialInterestGroup/Atomic/Download" title="https://wiki.centos.org/SpecialInterestGroup/Atomic/Download">https://wiki.centos.org/SpecialInterestGroup/Atomic/Download</a>) of
CentOS Atomic Host (7.1803), a lean operating system designed to run
Linux containers, built from standard CentOS 7 RPMs, and tracking the
component versions included in Red Hat Enterprise Linux Atomic Host.

This release rolls up all package minor updates that shipped through
the month of March, including, most significantly, a move to docker
version 1.13.

CentOS Atomic Host includes these core component versions:

* atomic-1.22.1-1.gitd36c015.el7.centos.x86_64
* cloud-init

SIGs: Possibility to drop EOL content at 7.5 release time

Hi, this is not really my job, but I don't mind ruffling a few feathers
if I need to.

RHEL/CentOS 7.5 is probably around the corner. This would be an
excellent time to remove any EOL software you may have floating around
on mirror.centos.org. Unless otherwise specified, any SIG content under
7.4 will be copied over to 7,5.

I'd imagine that for example openstack-newton could be dropped because
it went EOL in 2017-10-25. Is there some other content that could be
dropped?

If SIGs want to drop something at 7.5 release time, please let hughesjr
know.

CentOS PaaS SIG meeting (2018-04-04)

Hello,
It's time for our weekly PaaS SIG sync-up meeting

Time: 1700 UTC - Wedensdays (date -d "1700 UTC")
Where: IRC- Freenode - #centos-devel

Agenda:
- OpenShift Current Status
-- rpms
-- automation
- Training for new committee members
- New time for weekly meeting
- Open Floor

Minutes from last meeting:
<a href="https://www.centos.org/minutes/2018/March/centos-devel.2018-03-28-17.00.log.html" title="https://www.centos.org/minutes/2018/March/centos-devel.2018-03-28-17.00.log.html">https://www.centos.org/minutes/2018/March/centos-devel.2018-03-28-17.00....</a>

Disabled weekly scanning in CentOS Container Pipeline for this weekend

Hi,

We've not been able to push the fixes for weekly scanning process in
CentOS Container Pipeline to prod environment. Hence, we've disabled it
for this weekend.

Apologies for the inconvenience.

Regards,
Dharmit

no mirrorlist in centos-release-scl* on el6

centos-release-scl-rh-2-3.el6.centos.noarch and
centos-release-scl-7-3.el6.centos.noarch both list only a baseurl, not
a mirrorlist even though this appears to be mirrored in several
places. Is this an oversight?

CentOS PaaS SIG meeting (2018-03-28)

Hello,
It's time for our weekly PaaS SIG sync-up meeting
This week will be a bit different because we are going to devote alot
of the time to training new committee members.

Time: 1700 UTC - Wedensdays (date -d "1700 UTC")
Where: IRC- Freenode - #centos-devel

Agenda:
- OpenShift Current Status
-- rpms
- Training for new committee members
- Open Floor

Minutes from last meeting:
<a href="https://www.centos.org/minutes/2018/March/centos-devel.2018-03-21-17.01.log.html" title="https://www.centos.org/minutes/2018/March/centos-devel.2018-03-21-17.01.log.html">https://www.centos.org/minutes/2018/March/centos-devel.2018-03-21-17.01....</a>

Can we expect the Fix for “OpenSSL error hex string is too long invalid hex key value” in next OpenSSL release.

In CentOS7.4 ,we are getting this error “OpenSSL error hex string is too long invalid hex key value” . OpenSSL version we are using is openssl-1.0.2k-8.el7. We have solved this issue by applying a patch in openssl package suggested by openssl community (<a href="https://mta.openssl.org/pipermail/openssl-dev/2016-May/007266.html" title="https://mta.openssl.org/pipermail/openssl-dev/2016-May/007266.html">https://mta.openssl.org/pipermail/openssl-dev/2016-May/007266.html</a>). Can we expect a Fix for this problem in next release of OpenSSL.

CentOS PaaS SIG meeting (2018-03-21)

Hello,
It's time for our weekly PaaS SIG sync-up meeting

Time: 1700 UTC - Wedensdays (date -d "1700 UTC")
Where: IRC- Freenode - #centos-devel

Agenda:
- OpenShift Current Status
-- rpms
-- Automated rpm building and Automated testing
-- Documentation
- Upcomming Committee Member Changes
- Open Floor

Minutes from last meeting:
<a href="https://www.centos.org/minutes/2018/March/centos-devel.2018-03-14-17.01.log.html" title="https://www.centos.org/minutes/2018/March/centos-devel.2018-03-14-17.01.log.html">https://www.centos.org/minutes/2018/March/centos-devel.2018-03-14-17.01....</a>

Updates from Cloudstack

All,

I may not be able to contribute and join weekly meetings before 12th April
due to current/upcoming holidays. I'll share updates here:

- CloudStack completed 5yrs with the ASF
- I've proposed getting CloudStack bug reporting to move to Github issues,
making it easier for developer+users communities to use a single portal.

Origin package with wrong binaries

I had an Engineer attempt to install OpenShift via Ansible playbooks.
The package that showed up as available was 3.7.1.

CentOS PaaS SIG meeting (2018-03-14) [DST Time reminder]

Hello,
It's time for our weekly PaaS SIG sync-up meeting

Time: 1700 UTC - Wedensdays (date -d "1700 UTC")
Where: IRC- Freenode - #centos-devel

For those in the United States, remember that we are using UTC time,
and so the time is an hour later than it was last week.

Agenda:
- OpenShift Current Status
-- rpms
-- Automated rpm building and Automated testing
-- Multi-arch
-- Documentation
- Upcomming Committee Member Changes
- Open Floor

Minutes from last meeting:
<a href="https://www.centos.org/minutes/2018/March/centos-devel.2018-03-07-17.02.log.html" title="https://www.centos.org/minutes/2018/March/centos-devel.2018-03-07-17.02.log.html">https://www.centos.org/minutes/2018/March/centos-devel.2018-03-07-17.02....</a>

Status update: CentOS Community Container Pipeline Service 14-Mar-2018

Hi,
Here is an update on the recent works done in Centos Community
Container Pipeline Service
* Fixing beanstalk connection initialization method
* Gates pep8 on service code before running actual tests
* Cleans the log file with redundant queue operational messages
* Prevents logging unnecessary recurring queue operational messages

Our current focus is:
* Fix docker run command for INSTALL labels of scanners
* Fix weekly scan to read through all yaml and yml container-index
entries
* Fix pre-build job entries CI to not check for target file
* Enabling automa

meeting reboot

A reminder to all, that we are trying to reboot the Cloud SIG meetings,
now that we have representatives from Cloudstack on board.

These meetings are scheduled for Thursdays at 15:00 UTC, on #centos-devel

The agenda for the meeting is here:
<a href="https://etherpad.openstack.org/p/centos-cloud-sig" title="https://etherpad.openstack.org/p/centos-cloud-sig">https://etherpad.openstack.org/p/centos-cloud-sig</a> - although there's
nothing on it for this week, as we've been out of practice for a long time.

--Rich

Is the Artwork SIG alive?

I've been working through the various SIGs, trying to determine which
ones are active. I'm curious about the state of the Artwork SIG.

<a href="https://wiki.centos.org/SpecialInterestGroup/Artwork" title="https://wiki.centos.org/SpecialInterestGroup/Artwork">https://wiki.centos.org/SpecialInterestGroup/Artwork</a>

Is this still an ongoing effort, or is it "done"?

debuginfo.centos.org status

Hello folks,

I have few remarks about <a href="http://debuginfo.centos.org" title="http://debuginfo.centos.org">http://debuginfo.centos.org</a> as an user.

Lately our debug tools are depending on few debuginfo packages so we
depend on them in our production environment.

The debuginfo server is structured as following :
.
├── 7
│ ├── i386
│ │ └── repodata
│ └── x86_64
│ └── repodata
└── centos
├── 6
│ └── sclo
└── 7
├── cloud
├── sclo
├── storage
└── virt

1/ It seems that the experimental kernel debuginfo are copied in the
same directory as the os/updates/extras which confuse a bit users
(/7/x86_64

ETA when PaaS SIG 3.9 will fix the "SerialFileGenerator starts at 2" issue?

The current 3.9 centos paas repos are at v3.9.0-alpha.4.  However, I
cannot deploy origin 3.9.0-alpha.4 using ansible (openshift-ansible
latest release-3.9 branch) because I run into this issue:

TASK [openshift_master : Wait for API to become available]
*********************
        "* NSS error -8054 (SEC_ERROR_REUSED_ISSUER_AND_SERIAL)",
        "* You are attempting to import a cert with the same
issuer/serial as an existing cert, but that is not the same cert.",

This was fixed by 95e262011438642410959914c3db9868c57739ff

But that's at commit v3.9.0-alpha.4-426-g95e2620114

I realiz

CentOS PaaS SIG meeting (2018-03-07)

Hello,
It's time for our weekly PaaS SIG sync-up meeting

Time: 1700 UTC - Wedensdays (date -d "1700 UTC")
Where: IRC- Freenode - #centos-devel

Agenda:
- OpenShift Current Status
-- rpms
-- Automated rpm building and Automated testing
-- Multi-arch
-- Documentation
-- Images and Image building
- Upcoming Committee Member Changes
- Open Floor

Minutes from last meeting:
<a href="https://www.centos.org/minutes/2018/February/centos-devel.2018-02-28-17.01.log.html" title="https://www.centos.org/minutes/2018/February/centos-devel.2018-02-28-17.01.log.html">https://www.centos.org/minutes/2018/February/centos-devel.2018-02-28-17....</a>

Status Update: CentOS Community Container Pipeline Service 07-Mar-2018

Hi,
Here is an update on the recent works done in Centos Community
Container Pipeline Service
* Fixed bugs in dangling volume cleanup post scan
* Update ansible script to install latest docker on all the nodes.
* Enable support for yaml in container-index
* Make sure jenkins jobs are stopped properly before starting deployment

Our current focus is:
* Update API with filtering with primary key and names
* Fixing container pipeline service API’s for displaying more details
on UI.
* Fixing beanstalk connection initialization method
* Fix pipeline scanner image rootfs unmounting
*

Origin 3.7.1 in testing, please test.

origin 3.7.1, and openshift ansible 3.7.35 are both available in the
testing repository at
<a href="https://buildlogs.centos.org/centos/7/paas/x86_64/openshift-origin37/" title="https://buildlogs.centos.org/centos/7/paas/x86_64/openshift-origin37/">https://buildlogs.centos.org/centos/7/paas/x86_64/openshift-origin37/</a>

We need some people to test these and make sure everything is ok.
Once they have been tested, we will get them signed and in the
released repositories.

If you test them, please get back to us so we can release them.

Thanks
The CentOS Paas SIG

CentOS Atomic Host 7.1802 Available for Download

The CentOS Atomic SIG has released an updated version
(<a href="https://wiki.centos.org/SpecialInterestGroup/Atomic/Download" title="https://wiki.centos.org/SpecialInterestGroup/Atomic/Download">https://wiki.centos.org/SpecialInterestGroup/Atomic/Download</a>) of
CentOS Atomic Host (7.1802), a lean operating system designed to run
Linux containers, built from standard CentOS 7 RPMs, and tracking the
component versions included in Red Hat Enterprise Linux Atomic Host.

This release rolls up all package minor updates that shipped through
the month of February, including, most significantly, a newer version
of rpm-ostree with support for overriding base packages during package
layering operations.

SIG Chairs: Please file requests for syncing altarch content to mirror.c.o

Hi Folks,

Now that we're syncing content to mirror.centos.org/altarch (thanks KB!)
we need to be sure we have all the content you expect there.

If you have altarch-enabled koji tags and would like your content signed
and pushed to the /altarch location, please file a bug in the normal
fashion[0].

URLs in centos-release-<sig> packages: /altarch vs. /centos/

Hi Folks,

Now that we have SIG Content in the /altarch directories for CentOS 7 on the
mirrors, we need to come with some requirements and recommendations for dealing
with the different locations.

tl;dr The current thinking is to add the following snippet in the %post of
centos-release and release to all of the arches.

A tips page for capturing kernel messages.

Hello.

Since I have been encountering kernel problem reports (oops/hangup/slowdown)
with incomplete kernel messages, I wrote a page which explains hints for
capturing kernel messages for troubleshooting (mainly hangup/slowdown problem)

<a href="http://akari.osdn.jp/capturing-kernel-messages.html" title="http://akari.osdn.jp/capturing-kernel-messages.html">http://akari.osdn.jp/capturing-kernel-messages.html</a>

with a utility program named "udplogger". I appreciate if someone can
become a maintainer of RPM package for "udplogger". Feedbacks are welcome.

Thanks.

Building a package for RedHat

Hello Centos developers,

My company would like to use Red-Hat/Centos as a target system for releasing
(proprietary) software.

In order to do this properly, I've constructed an infrastructure which
allows to build those packages, wrapping mock and other tools.

RDO OpenStack Queens packages available

The RDO community is pleased to announce the general availability of the
RDO build for OpenStack Queens for RPM-based distributions, CentOS Linux
7 and Red Hat Enterprise Linux. RDO is suitable for building private,
public, and hybrid clouds.

CentOS PaaS SIG meeting (2018-02-28)

Hello,
It's time for our weekly PaaS SIG sync-up meeting

Time: 1700 UTC - Wedensdays (date -d "1700 UTC")
Where: IRC- Freenode - #centos-devel

Agenda:
- OpenShift Current Status
-- rpms
-- Automated rpm building and Automated testing
-- Multi-arch
-- Documentation
-- Images and Image building
- Upcomming Committee Member Changes
- Open Floor

Minutes from last meeting:
<a href="https://www.centos.org/minutes/2018/February/centos-devel.2018-02-21-17.01.html" title="https://www.centos.org/minutes/2018/February/centos-devel.2018-02-21-17.01.html">https://www.centos.org/minutes/2018/February/centos-devel.2018-02-21-17....</a>

Status Update: CentOS Community Container Pipeline Service 28-Feb-2018

Hi All,
Here is an update on the recent works done in Centos Community
Container Pipeline
* <a href="https://registry.centos.org" title="https://registry.centos.org">https://registry.centos.org</a> is updated with new UI allowing users
* search through the content
* shows the dockerfile from which the image is built
* Shows the Readme from the repo which mostly talks about the
usage of the image
* We have refactored garbage collector to get proper diff in
container-index and registry.centos.org for removing extra images pushed
to registry in build time.
* We have disable the centos/centos:* base images to be excluded in
RPM repo tracking.

Email alias for SIG members?

Hello,

I recently thought about the possibility of getting an email alias for
SIG members. That should not be forwarded to a mailing list.
Would something like that be possible? Idea is to spam people in charge
directly. It can contain sensitive data, or data not belonging to
mailing lists, like certificates, build failures, that kind of thing.

Other than that, all communication should be kept public, IMHO.

So: would it be possible to get an email alias like
<sig-name>@centos.org to forward emails? If yes, what would be the
process?

Matthias

Two New Committee Members Needed for CentOS PAAS SIG

Hello,
Due to "Real Life" the following CentOS PAAS Sig committee members
will be leaving the committee, on the following dates. We will need
to get replacements for them by those dates.

Ari LiVigni - March 14th
Troy Dawson - May 15th

Ari is in charge of Automation.
Troy is the committee chairman.

The CentOS PAAS Sig has been very successful in bringing a free
version of OpenShift to everyone. These two people have been a very
large part of that. They will be missed.

But it's time to look to the future.

New sclo-php##-phpiredis 1.0.0 packages available for testing

New packages available in centos-sclo-sclo-testing

Phpiredis is an extension for PHP 5.x and 7.x based on hiredis
that provides a simple and efficient client for Redis and a fast
incremental parser / serializer for the RESP protocol.

For rh-php56

* sclo-php56-php-phpiredis-1.0.0-1

For rh-php70

* sclo-php70-php-phpiredis-1.0.0-1

For rh-php71

* sclo-php71-php-phpiredis-1.0.0-1

This extension is also an accelerator used by the Predis pure-PHP
library (<a href="https://packagist.org/packages/predis/predis" title="https://packagist.org/packages/predis/predis">https://packagist.org/packages/predis/predis</a>)

Sometime ago I wrote a blog entry about Redis access from PHP:
<a href="https://blog.remirepo.ne" title="https://blog.remirepo.ne">https://blog.remirepo.ne</a>

Kubernetes support on ARM32

Hey, what's up!

I finished building all needed packages to bring kubernetes to ARM. All of them were brought by simply copying src packages from CBS and doing minor or no changes at all.

To my surprise, kubeadm ran perfectly fine, it got the correspondent arm image for each component. I went with weave for pod network layer, as it have network policy and ARM support.

Manual changes, was to symlink all files under /opt/cni/bin into /usr/libexec/cni, otherwise the pods will not find the cni plugins and doesn't start (like kube-dns stuck at containercreating).

meeting minutes, Feb 22, 2018

Thanks to those that attended today's Cloud SIG meeting.

Building opstools7-fluentd-012-release for ppc64le

Hey y'all,

So what scripts/process builds the group of rpms for the tag
opstools7-fluentd-012-release? I would like to build them for ppc64le.

So the packages in
<a href="http://mirror.centos.org/centos/7/opstools/x86_64/" title="http://mirror.centos.org/centos/7/opstools/x86_64/">http://mirror.centos.org/centos/7/opstools/x86_64/</a>

Would end up
mirror.centos.org/altarch/7/opstools/ppc64le/

Is this something I could help with?

CentOS PaaS SIG meeting (2018-02-21)

Hello,
It's time for our weekly PaaS SIG sync-up meeting

Time: 1700 UTC - Wedensdays (date -d "1700 UTC")
Where: IRC- Freenode - #centos-devel

Agenda:
- OpenShift Current Status
-- rpms
-- Automated rpm building and Automated testing
-- Multi-arch
-- Documentation
-- Images and Image building
- Open Floor

Minutes from last meeting:
<a href="https://www.centos.org/minutes/2018/February/centos-devel.2018-02-14-17.02.html" title="https://www.centos.org/minutes/2018/February/centos-devel.2018-02-14-17.02.html">https://www.centos.org/minutes/2018/February/centos-devel.2018-02-14-17....</a>

php71 build targets

I’m trying to figure out how build targets are requested / added to the Software Collections, specifically php71 and php71-fpm.

Currently, the php71 RPMs are available for RHEL7 and CentOS7. What is the process to request these RPMs to be added to the CentOS6 (and potentially RHEL6) Software Collection?

Many thanks in advance.

Re: [CentOS-devel] Vagrant / Centos 7 Install Error: Cannot find a valid baseurl for repo: base/7/x86_64

Hi Laurentiu,

Thank you very much for trying it out and giving your feedback.

Re: [CentOS-devel] CentOS for IBM Mainframes.

IBM can and does provide raw z/VM VMs at Marist or Syracuse for other
Linux distros, such as Debian. That is what you really need, not
"hardware". The discussion about donating hardware is off track.

The Debian support is completely community driven and maintained.

Syndicate content