Product: Fedora Documentation
https://bugzilla.redhat.com/show_bug.cgi?id=959626
Bug ID: 959626
Summary: config_name mismatch in mock example
Product: Fedora Documentation
Version: devel
Component: packager-guide
Severity: low
Priority: unspecified
Assignee: pkovar(a)redhat.com
Reporter: axilleas(a)archlinux.gr
QA Contact: docs-qa(a)lists.fedoraproject.org
CC: fnadge(a)redhat.com
Category: ---
Description of problem:
In section 2.4.3. Testing a Package with Mock, the last example uses the
epel-6-x86_64 config whereas Fedora 18 is referenced above.
According to the preamble, the example should read:
mock -r fedora-18-x86_64 ~/rpmbuild/SRPMS/eject-2.1.5-0.1.fc18.src.rpm
Link:
https://docs.fedoraproject.org/en-US/Fedora_Draft_Documentation/0.1/html/Pa…
--
You are receiving this mail because:
You are the QA Contact for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1246286
Bug ID: 1246286
Summary: Outdated websites in "Further information"
Product: Fedora Documentation
Version: devel
Component: selinux-user-guide
Assignee: mprpic(a)redhat.com
Reporter: ah(a)riseup.net
QA Contact: docs-qa(a)lists.fedoraproject.org
CC: mprpic(a)redhat.com, pkennedy(a)redhat.com,
zach(a)oglesby.co
Description of problem:
http://selinuxnews.org seems hopelessly outdated. Last post is from 2012.
The documentations on the NSA page are all from 2007 or older.
Version-Release number of selected component (if applicable):
Fedora 22, Edition 1
--
You are receiving this mail because:
You are the QA Contact for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1198984
Bug ID: 1198984
Summary: firewalld: please improve documentation on using it on
a RedHat/Fedora/CentOS router
Product: Fedora Documentation
Version: devel
Component: cookbook
Assignee: docs(a)lists.fedoraproject.org
Reporter: razvan.sandu(a)mobexpert.ro
QA Contact: docs-qa(a)lists.fedoraproject.org
CC: docs(a)lists.fedoraproject.org
Hello,
Description of problem:
Even using the rich-language feature, it is still rather difficult to figure
out
how to use firewalld on a RedHat/Fedora/CentOS system that is used as a router
(a "transparent" system).
That's because:
a. administrators will need *different* sets of rules/restrictions for access
to the router itself and to the various services that run beyond the router
(using or non using NAT).
b. It is not very clear how/where the predefined firewalld zones implement
their policies (ACCEPT or DROP) and when these policies apply to traffic
bounded *to* the router system or to traffic that *traverses* the router.
For example, an administrator needs an *easy* method to restrict VNC access
*to* the router itself (INPUT), but may want free VNC access to some server
located *behind* the router (FORWARD). In the second case, forwarding may (or
may not) imply NAT, depending if he goes on the Internet via the external
interface or simply goes in another LAN segment beyond the router.
c. It is not very clear how/where the predefined firewalld zones implement
their trafic rules ( *exceptions* to ACCEPT or DROP default policies) and when
these rules apply to traffic bounded *to* the router system or to traffic that
*traverses* the router.
Additional info:
Even it is not dynamic, the Shorewall application (http://shorewall.net/) acts
as a higher-level language over iptables, offering the same concepts of "zones"
for interfaces. Much of its conceptual architecture is directly applicable
("portable") to firewalld, if accepted by developers.
Somewhat different from conceptual point of view, the "zones" are "levels of
trust surrounding the router", including thr FW zone for the router itself.
(unlike firewalld, the shorewall zones have no "sources" or "services" embedded
in them).
IPv4 and IPv6 zones are completely separated (they actually represent different
levels of trust).
Administrators may directly define policies, i.e. allow *default* actions to be
done when an packet travels from a zone to another (ACCEPT, REJECT). The most
sane policy between any two zones is REJECT (with further exceptions defined as
rules, see below).
Rules are *exceptions to policies* , explicitly defined (based on various
criteria such as source IP, destination IP, ports, etc.)
Rules may be expressed via predefined (or customised) "macros" (which are the
direct equivalent of firewalld's "services").
IPv4 and IPv6 policy and rules are completely separated (IMHO that's good,
since the use of global IPv6 addresses pose completely different security
problems than NATted & externally firewalled IPv4).
Best regards,
Răzvan
--
You are receiving this mail because:
You are the QA Contact for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1008227
Bug ID: 1008227
Summary: SSD cache
Product: Fedora Documentation
Version: devel
Component: docs-requests
Keywords: Tracking
Assignee: nobody(a)fedoraproject.org
Reporter: me(a)petetravis.com
QA Contact: docs-qa(a)lists.fedoraproject.org
CC: agk(a)redhat.com, i.gnatenko.brain(a)gmail.com,
jeremy(a)goop.org, jreznik(a)redhat.com, kzak(a)redhat.com,
nobody(a)fedoraproject.org, rdieter(a)math.unl.edu,
rolf(a)rolffokkens.nl, sparks(a)redhat.com,
stickster(a)gmail.com, zach(a)oglesby.co
Depends On: 998543, 999690, 1000817, 1001120, 1003208, 1000078,
1003207
+++ This bug was initially created as a clone of Bug #998543 +++
This is a tracking bug for Change: SSD cache
For more details, see: http://fedoraproject.org//wiki/Changes/SSD_cache
Using recent kernel (3.9 and later) features for (fast) SSD caching of (slow)
ordinary hard disks.
--- Additional comment from Rolf Fokkens on 2013-08-21 13:35:33 EDT ---
I'll build a bcache-tools RPM and a dm-cache-utils rpm (actually bcache-tools
is already available here: bcache-tools-20130820-0.1.fc19.src.rpm).
I'll follow the procedure as described here:
https://fedoraproject.org/wiki/Join_the_package_collection_maintainers
--- Additional comment from Rolf Fokkens on 2013-08-24 11:51:34 EDT ---
Tried to create a dmcache-utils package as well (Bug 1000078) but it doesn't
look really useful. So I'll focus on bcache-tools first. For that I still need
a sponsor.
--- Additional comment from Rolf Fokkens on 2013-08-27 06:52:40 EDT ---
I closed Bug 1000078 since good userland support requires LVM2 to support
dm-cache. Which will happen 'in the future', but F20 doesn't look feasible to
me.
--- Additional comment from Rolf Fokkens on 2013-08-31 16:21:30 EDT ---
Create Bug 1003207 (bcache support for dracut) which is not blocking for F20,
but probably will be blocking for F21.
--- Additional comment from Rolf Fokkens on 2013-08-31 16:25:06 EDT ---
Create Bug 1003208 (bcache support for anaconda) which is not blocking for F20,
but probably will be blocking for F21.
--- Additional comment from Rolf Fokkens on 2013-09-09 04:18:18 EDT ---
Test day planned: https://fedorahosted.org/fedora-qa/ticket/415
--------------------------------------------------------------
Discussion at
https://lists.fedoraproject.org/pipermail/devel/2013-July/185336.html
Please assess existing documentation for the impact of this Change.
--
You are receiving this mail because:
You are the QA Contact for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1058066
Bug ID: 1058066
Summary: new virt-xml functionality coming from upstream
libvirt should be documented
Product: Fedora Documentation
Version: devel
Component: virtualization-deployment-and-administrative-guide
Assignee: lnovich(a)redhat.com
Reporter: me(a)petetravis.com
QA Contact: docs-qa(a)lists.fedoraproject.org
CC: lnovich(a)redhat.com
There is a new tool called `virt-xml` that will end up in Fedora soon[1]. It
looks very useful, and should be documented.
[1] https://www.redhat.com/archives/libvir-list/2014-January/msg01226.html
--
You are receiving this mail because:
You are the QA Contact for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=980931
Bug ID: 980931
Summary: The Virtualization Administration Guide Still Uses
UNIX System V Commands
Product: Fedora Documentation
Version: devel
Component: virtualization-administration-guide
Keywords: Documentation
Severity: medium
Priority: unspecified
Assignee: lnovich(a)redhat.com
Reporter: jhradile(a)redhat.com
QA Contact: docs-qa(a)lists.fedoraproject.org
CC: lnovich(a)redhat.com, me(a)petetravis.com
Description of problem:
The Virtualization Administration Guide for Fedora 18 [1] still uses UNIX
System V commands “service” and “chkconfig”. Although these commands still work
and will continue to work in the foreseeable future, users are strongly advised
to learn and use the new command that is shipped with systemd and is part of
the Fedora distribution since version 15.
Version-Release number of selected component (if applicable):
Fedora-Virtualization_Administration_Guide-18-en-US-1.0-1
How reproducible:
Always.
Steps to Reproduce:
Read section 14.3, “Starting and stopping the daemon” [2], to learn how to
configure the vhostmd service to start automatically at boot time.
Actual results:
/sbin/chkconfig vhostmd on
Expected results:
systemctl enable vhostmd.service
Additional info:
http://fedoraproject.org/wiki/SysVinit_to_Systemd_Cheatsheet
-----
[1]
http://docs.fedoraproject.org/en-US/Fedora/18/html-single/Virtualization_Ad…
[2]
http://docs.fedoraproject.org/en-US/Fedora/18/html-single/Virtualization_Ad…
--
You are receiving this mail because:
You are the QA Contact for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1095977
Bug ID: 1095977
Summary: RFE: static IP assignment
Product: Fedora Documentation
Version: devel
Component: cookbook
Assignee: docs(a)lists.fedoraproject.org
Reporter: me(a)petetravis.com
QA Contact: docs-qa(a)lists.fedoraproject.org
CC: docs(a)lists.fedoraproject.org
Static IP addresses are crucial for applications like DHCP servers or other
infrastructure that can't rely on external assignment. They're also helpful for
home users that want to predictably locate their Fedora installation.
Explain the use case for this and some alternative methods, then the procedure
for setting a setting a static IP using both ifcfg files and graphical methods.
Each method could be explained in a separate article; ie "... on the command
line" and "... with GNOME" and "... with KDE" and so on.
--
You are receiving this mail because:
You are the QA Contact for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1101798
Bug ID: 1101798
Summary: RFE: Captive portal
Product: Fedora Documentation
Version: devel
Component: cookbook
Assignee: docs(a)lists.fedoraproject.org
Reporter: me(a)petetravis.com
QA Contact: docs-qa(a)lists.fedoraproject.org
CC: docs(a)lists.fedoraproject.org
Create a recipe for configuring a simple captive portal with Fedora that will
require users to acknowledge a terms of use message before allowing connections
to pass.
--
You are receiving this mail because:
You are the QA Contact for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1101796
Bug ID: 1101796
Summary: RFE: NAT router
Product: Fedora Documentation
Version: devel
Component: cookbook
Assignee: docs(a)lists.fedoraproject.org
Reporter: me(a)petetravis.com
QA Contact: docs-qa(a)lists.fedoraproject.org
CC: docs(a)lists.fedoraproject.org
Create a recipe for using Fedora as a NAT router using Firewalld and
NetworkManager.
--
You are receiving this mail because:
You are the QA Contact for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1096394
Bug ID: 1096394
Summary: RFE: Thin Client (Tracking Bug)
Product: Fedora Documentation
Version: devel
Component: cookbook
Assignee: docs(a)lists.fedoraproject.org
Reporter: me(a)petetravis.com
QA Contact: docs-qa(a)lists.fedoraproject.org
CC: docs(a)lists.fedoraproject.org
Fedora can be used as a server and client environment for a thin client
deployment. Document the required procedures to do this.
Because of the broad scope and number of procedures involved, this should be
split up into recipes addressing component tasks. This bug will be used to
track the overall progress; please block this bug with any new bugs created for
the purpose.
--
You are receiving this mail because:
You are the QA Contact for the bug.