<feed xmlns='http://www.w3.org/2005/Atom'>
<title>mock.git/py, branch master</title>
<subtitle>Dennis's mock patches, likely mostly config files for secondary arches</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ausil/public_git/mock.git/'/>
<entry>
<title>fix up sparc arch handling</title>
<updated>2010-09-10T14:12:57+00:00</updated>
<author>
<name>Dennis Gilmore</name>
<email>dennis@ausil.us</email>
</author>
<published>2010-09-10T14:12:57+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ausil/public_git/mock.git/commit/?id=7bec7c17039c443cc7ca323cdb3b51785a470746'/>
<id>7bec7c17039c443cc7ca323cdb3b51785a470746</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>pass selinux status to mock.util.rmtree() function (BZ# 614440)</title>
<updated>2010-08-12T20:06:13+00:00</updated>
<author>
<name>Clark Williams</name>
<email>williams@redhat.com</email>
</author>
<published>2010-08-09T22:23:13+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ausil/public_git/mock.git/commit/?id=6da80b5d6b467489492673001005321f5b506cb1'/>
<id>6da80b5d6b467489492673001005321f5b506cb1</id>
<content type='text'>
Pass in boolean 'selinux' via keyword arguments that tells
rmtree whether to do retry logic with selinux attributes

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Pass in boolean 'selinux' via keyword arguments that tells
rmtree whether to do retry logic with selinux attributes

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Update packages after unpacking root cache</title>
<updated>2010-08-12T15:58:21+00:00</updated>
<author>
<name>Paul Howarth</name>
<email>paul@city-fan.org</email>
</author>
<published>2010-08-11T10:54:01+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ausil/public_git/mock.git/commit/?id=59020475e4b76f324298a6c719b55f7435d33ac9'/>
<id>59020475e4b76f324298a6c719b55f7435d33ac9</id>
<content type='text'>
Fix problem introduced in commit 3bc5fb958deb809fc04d6a74ce6688e093f5831a
where the buildroot is no longer updated after unpacking the root cache.

http://bugzilla.redhat.com/557526

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fix problem introduced in commit 3bc5fb958deb809fc04d6a74ce6688e093f5831a
where the buildroot is no longer updated after unpacking the root cache.

http://bugzilla.redhat.com/557526

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>noarch is always a legal arch</title>
<updated>2010-08-12T15:57:42+00:00</updated>
<author>
<name>Paul Howarth</name>
<email>paul@city-fan.org</email>
</author>
<published>2010-08-11T10:54:00+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ausil/public_git/mock.git/commit/?id=bf71ffd587ff230ba58b700f465bba41458a4270'/>
<id>bf71ffd587ff230ba58b700f465bba41458a4270</id>
<content type='text'>
Allow "--target noarch" to be specified.

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Allow "--target noarch" to be specified.

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Exclude bind-mounted cache dirs from root cache</title>
<updated>2010-08-12T15:57:35+00:00</updated>
<author>
<name>Paul Howarth</name>
<email>paul@city-fan.org</email>
</author>
<published>2010-08-11T10:53:59+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ausil/public_git/mock.git/commit/?id=942b94cd6b1345ce7c2373a6c0cd5e689fd22dcf'/>
<id>942b94cd6b1345ce7c2373a6c0cd5e689fd22dcf</id>
<content type='text'>
Including the ccache directory /tmp/ccache and the yum cache directory
/var/cache/yum in the root cache is unnecessary and can lead to the
root cache tarball being an order of magnitude larger and taking 10
minutes or more to tar and compress even on a fast PC.

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Including the ccache directory /tmp/ccache and the yum cache directory
/var/cache/yum in the root cache is unnecessary and can lead to the
root cache tarball being an order of magnitude larger and taking 10
minutes or more to tar and compress even on a fast PC.

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Retain order of umountCmds</title>
<updated>2010-08-12T15:56:28+00:00</updated>
<author>
<name>Paul Howarth</name>
<email>paul@city-fan.org</email>
</author>
<published>2010-08-11T10:53:58+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ausil/public_git/mock.git/commit/?id=03cb001e8d3b2d629c879ba723afcd2b187675b2'/>
<id>03cb001e8d3b2d629c879ba723afcd2b187675b2</id>
<content type='text'>
The order of execution of umounts is the reverse of the order of
the mounts, so as to deal with a hierarchy of mounts correctly.
The ordering is reversed by _umountall but was being left in the
reversed state so that the next time _umountall was called, it
attempted to unmount filesystems in the wrong order, leading to
build failures due to being unable to unmount for example /proc
whilst /proc/filesystems was still mounted. This change reverses
the order of umount commands back again before _umountall exits
so as to maintain the ordering.

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The order of execution of umounts is the reverse of the order of
the mounts, so as to deal with a hierarchy of mounts correctly.
The ordering is reversed by _umountall but was being left in the
reversed state so that the next time _umountall was called, it
attempted to unmount filesystems in the wrong order, leading to
build failures due to being unable to unmount for example /proc
whilst /proc/filesystems was still mounted. This change reverses
the order of umount commands back again before _umountall exits
so as to maintain the ordering.

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add i586 as a legal target arch</title>
<updated>2010-08-12T15:56:21+00:00</updated>
<author>
<name>Paul Howarth</name>
<email>paul@city-fan.org</email>
</author>
<published>2010-08-11T10:53:57+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ausil/public_git/mock.git/commit/?id=7f9f684f63dc05c7d44547879fcf6e49831bc5c6'/>
<id>7f9f684f63dc05c7d44547879fcf6e49831bc5c6</id>
<content type='text'>
This is needed not only to target the legacy Fedora 11 32-bit release
but also the still-current SLES-11 32-bit and possibly others too.

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This is needed not only to target the legacy Fedora 11 32-bit release
but also the still-current SLES-11 32-bit and possibly others too.

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>set state correctly for SELinux (BZ# 620143)</title>
<updated>2010-08-03T17:57:24+00:00</updated>
<author>
<name>Clark Williams</name>
<email>williams@redhat.com</email>
</author>
<published>2010-08-03T17:57:24+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ausil/public_git/mock.git/commit/?id=12f0cd8da491039ed13c7fffaafd6ae96e267410'/>
<id>12f0cd8da491039ed13c7fffaafd6ae96e267410</id>
<content type='text'>
The new selinux plugin fakes SELinux being turned *off* in the chroot
by bind-mounting a fake /proc/filesystems in the chroot. If this
plugin is enabled, we should *not* do any SELinux attribute operations
in the chroot. Setup this state correctly at init time.

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The new selinux plugin fakes SELinux being turned *off* in the chroot
by bind-mounting a fake /proc/filesystems in the chroot. If this
plugin is enabled, we should *not* do any SELinux attribute operations
in the chroot. Setup this state correctly at init time.

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>append rather than insert umount of /proc/filesystems (BZ# 620825)</title>
<updated>2010-08-03T17:43:47+00:00</updated>
<author>
<name>Clark Williams</name>
<email>williams@redhat.com</email>
</author>
<published>2010-08-03T17:36:21+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ausil/public_git/mock.git/commit/?id=967fdcadf16782edea28f4e6a8a735cd3acb7348'/>
<id>967fdcadf16782edea28f4e6a8a735cd3acb7348</id>
<content type='text'>
since the umount commands are reversed before being executed, just
append the umount of /proc/filesystems in the selinux plugin so
that it will happen in the correct order.

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
since the umount commands are reversed before being executed, just
append the umount of /proc/filesystems in the selinux plugin so
that it will happen in the correct order.

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>add selinux plugin</title>
<updated>2010-07-30T21:14:55+00:00</updated>
<author>
<name>Jan Vcelak</name>
<email>jvcelak@redhat.com</email>
</author>
<published>2010-07-30T21:14:55+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ausil/public_git/mock.git/commit/?id=0aac2d3d8804271eaca33f93650b04f1bd8b249c'/>
<id>0aac2d3d8804271eaca33f93650b04f1bd8b249c</id>
<content type='text'>
This patch adds an selinux plugin that sets up an environment with
selinux turned *off* in the build chroot. How does this work? From the
author's description:

It is done the same as the patch sent by Thomas Liu in bz 614440 does.
Actually, this proceeding was suggested by Dan Walsh in bz 573111.

1.) Fake /proc/filesystems is created in conf["cachedir"]. It includes the
same content as the same file in host environment, except line with selinuxfs.
This file is bind mounted into build environment.

2.) Option '--setopt=tsflags=nocontext' is added to yum commands. This is done
by wrapping mock.util.do with _selinuxDoYum in "preyum" hook. This function
just adds the option and passes the command to original mock.util.do function.
The wrapping is removed in "postyum" hook.
I didn't find cleaner method, without modifying main code.

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This patch adds an selinux plugin that sets up an environment with
selinux turned *off* in the build chroot. How does this work? From the
author's description:

It is done the same as the patch sent by Thomas Liu in bz 614440 does.
Actually, this proceeding was suggested by Dan Walsh in bz 573111.

1.) Fake /proc/filesystems is created in conf["cachedir"]. It includes the
same content as the same file in host environment, except line with selinuxfs.
This file is bind mounted into build environment.

2.) Option '--setopt=tsflags=nocontext' is added to yum commands. This is done
by wrapping mock.util.do with _selinuxDoYum in "preyum" hook. This function
just adds the option and passes the command to original mock.util.do function.
The wrapping is removed in "postyum" hook.
I didn't find cleaner method, without modifying main code.

Signed-off-by: Clark Williams &lt;williams@redhat.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
