-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Import paths in burmilla/trash
is not updated, still pointing to rancher/trash
#58
Comments
We want to be able to BurmillaOS without unexpected changes even if Rancher removes/changes their repos so any references to "rancher" to repos should be considered as bug which should be fixed. I did notice that hardest part on forking RancherOS was actually name change because I wanted to keep backward compatibility (which why user name is still "rancher" and cloud init configs uses configuration items under "rancher" name) but still fork all needed code under burmilla repositories. Also it is worth to mention that because of timing I did use some shortcuts like just copying os-base and os-system-docker release binaries from rancher repos to our repos.
Dapper is one of those areas where I used shortcut and leaved references to rancher repos as Rancher Labs uses it on all their repos and I expected that they will maintain it nice way (but did fork it repo under burmilla still just in case) but I see it now that doing that without version locking was at least bad idea which I was forced to fix last time to be able to create v1.9.1 release.
I don't think that it is dying but after SUSE acquired Rancher Labs they are most probably just forced to focus other things than feedback which comes from community.
IMO, goal should be that anyone who download all burmilla repositories should be able to build BurmillaOS without internet access. What comes to official releases my goal have actually totally opposite where all those build are using GitHub actions and running their servers on way that all the build logs are public so anyone is able to see that how example our v1.9.1 release is really built. |
Btw. I just noticed that this one is in conflict with my proposals to use signed kernel binaries from Ubuntu releases #5 (comment) #8 (comment) so we most probably need to decide that: |
UEFI does not have to enable secure boot. At least for us, support booting (and updating) on UEFI boards is first priority. Supporting secure boot is kind of optional, and many systems support swapping the signing key. I am not super familiar with GitHub actions. Do they support building without Internet access? My opinions: |
No. Whole idea with those is automate build process and outsource build servers maintenance process for GitHub. However build process contains just need to run couple of commands https://github.com/burmilla/os/blob/master/.github/workflows/create-release.yml so it is quite simple to run those also manually.
Yes. Most of the external code is already vendored to burmilla repos with commit hashes so it shouldn't big task. Anyway, closing this as trash references was fixed on burmilla/trash@6b5123d |
In the main
Dockerfile.dapper
(the ubuntu one), it builds and installsburmilla/trash
usinggo get github.com/burmilla/trash
. However, import paths in theburmilla/trash
repository still points torancher/trash
. As a result, thetrash
binary will be compiled from both code fromburmilla/trash
andrancher/trash
. If coderancher/trash
changes, the build process might break.This is at least an inconsistency. Do we treat
rancher/trash
as our official upstream? Or we want to go full branch off and use everything fromgh.neting.cc/burmilla
(we can still optionally keep tracking updates onrancher
, but we need to update all import path).Other go-gettable build tools (such as the
dapper
forked repo) have similar issues.Another higher level thing is that the build process currently fetches a lot of stuff from the Internet, mostly without checking against any hashes. IMHO, this is a huge reliability -- and even security -- issue. Although most channels and fetching-sources can be considered trustworthy, many of them are quite mutable (and it is not unheard of that attackers might be able to poison trusted software distribution channels).
Failure example: burmilla/os-kernel@6a6748a
(and rancher is still ignoring my pr: rancher/dapper#93 ; I suspect the project is dying..)
So folks, a high level question: is it a desirable goal to build as much as possible from source (with a fixed set of toolchain docker images) without Internet access?
The text was updated successfully, but these errors were encountered: