Tag Archives: Fedora

Is the Fedora community forgetting its primary goal?

To sum up Betteridge’s law of headlines in a single word: no.

Fedora is a community which produces a set of products. One of the things that makes our products distinct is the methodology (FOSS) we use to create them. We believe this methodology provides compelling advantages across our product portfolio.

But it is a mistake to think that Fedora is merely a tool to spread more FOSS. Fedora is not political think tank. FOSS methodology is a means, not an end. The end is a better product.

This is precisely what makes Fedora.next so appealing: it focuses on products. We actually need to produce something of value that people want to use. The best way to spread more FOSS is to make really good FOSS products.

Side Tabs for Empathy in Fedora 20

Andres Gomez recently made a patch for Empathy to put the tabs on the side. This patch is fantastic for any of us who idle in a large number of IRC channels. Since that includes me, I have created a COPR repo with a build of Empathy that includes this patch. So if you’re running F20 and using rhughes’ build of GNOME 3.12 and would like to use side tabs in Empathy, feel free to use it.

Announcing FreeOTP

I’d like to announce the general availability of FreeOTP for Android. It is available for install now in the Google Play store.

FreeOTP is a multi-factor authentication client based on the HOTP and TOTP standards. FreeOTP features:

  • A FLOSS code base
  • Support for HOTP or TOTP
  • Native QR code scanning
  • Adherence to the Android UI design principles
  • Tablet support

We anticipate that FreeOTP should work with any server providing HOTP or TOTP support, including the upcoming OTP support in FreeIPA.

So, if you fancy a bit of adventure, please try FreeOTP! We welcome your feedback. Please also don’t forget to leave your positive reviews on Google Play so that it will be easier for other Android users to find out about FreeOTP.

We have also developed FreeOTP for iOS and are currently working to bring it to the Apple App Store. Please stay tuned for future news!

The FreeOTP project is hosted on Fedora Hosted. We welcome your feedback and contributions.

Seth Vidal in Memoriam

I was extremely saddened today to hear of the loss of Seth Vidal. Although I can’t claim to have known him well, we had met on several occasions and was able to work on a side project with him. Seth will always be special to me because my first foray into Python was reading and attempting to understand some code he had written. Seth also had a great sense of humor. He could turn almost anything into a joke. Seth’s impact on Fedora was in many ways immeasurable. Judging by his code and infrastructure alone couldn’t do him justice. His wit and enthusiasm were contagious.

My sincerest condolences go out to his family and friends. Our thoughts and prayers are with you.

FreeIPA Two Factor Authentication Test Day

Welcome testdayers! Today’s test day will feature FreeIPA’s new Kerberos OTP support.

FreeIPA’s OTP support is a new feature and we are not yet providing a comprehensive management UI. But with a little tweaking of LDAP via some provided helper scripts, we should be able to test upstream plumbing work that makes OTP possible on MIT krb5.

Please check out the test day page where you will find live CDs and instructions on how to test. In particular, we are actively looking for people to test OTP against your own third party 2FA services. This will help us establish a list of known good solutions and give us targets for improving our compatibility.

Wether you join us on IRC or via email, we look forward to hearing from you!


QEMU with PowerPC64 Guests


For a fully functioning Debian Sid PPC64 guest image, follow the README.txt here: http://npmccallum.fedorapeople.org/qemu/ppc64/debian/

QEMU 1.4.0

With QEMU 1.4.0, PPC64 guests are close to working out of the box. It took some exploration to figure out exactly how to make this work, but it is mostly simple once you figure it out. In short, PPC64 emulation has a flakey IDE controller. This causes random lockups. You can work around this on Debian Sid.

Things that Don’t Work

  • virtio disks: This appears to be a QEMU problem as I can’t get it to work without random lockups on numerous distros, most notably Fedora 18.
  • graphical console: The only way to get the system to boot is with -nographic.
  • boot-loader after install: I’m not sure why, but this crashes QEMU. The workaround is to load the kernel/initrd directly and bypass the boot-loader.
  • power management: There are no fancy features like rebooting or powering off. You’ll have to do it manually.
  • Fedora 18: The PPC64 ISO appears not to have drivers for either the ATA or SCSI controllers that QEMU supports. Since virtio support doesn’t appear to work (see above), that means Fedora 18 has no disk driver support.

Installing Debian Sid

  1. Create a temporary directory:

    mkdir ppc64; cd ppc64

  2. Download the Debian Sid kernel image:

    wget http://ftp.us.debian.org/debian/dists/sid/main/installer-powerpc/current/images/powerpc64/netboot/vmlinux

  3. Download the Debian Sid initrd image:

    wget http://ftp.us.debian.org/debian/dists/sid/main/installer-powerpc/current/images/powerpc64/netboot/initrd.gz

  4. Create a disk image:

    qemu-img create -f qcow2 debian-sid-ppc64.qcow2 10G

  5. Start QEMU:

    qemu-system-ppc64 -nographic -hda debian-sid-ppc64.qcow2 -kernel vmlinux -initrd initrd.gz -append “console=ttyPZ0 libata.dma=0 debian-installer/allow_unauthenticated=true”

    1. console=ttyPZ0 – This is needed to make the console work when using -nographic.
    2. libata.dma=0 – This disables DMA on the ATA controller. It makes the controller more stable (NOTE: I didn’t say perfectly stable…).
    3. debian-installer/allow_unauthenticated=true – When I tried to install the first time through, I got to the end and got complaints about unsigned packages. This is likely a simple error in the repo. NOTE WELL: this option disables security.
  6. Follow install instructions.
  7. When the OS tries to reboot, it won’t work. Just shut down the VM.
  8. Start QEMU again:

    qemu-system-ppc64 -nographic -hda debian-sid-ppc64.qcow2

  9. Notice that QEMU crashes: Uh oh!
  10. Use qemu-nbd to mount your boot/root partition and extract the kernel and initrd images. Alternatively, just download them from here.
  11. Start QEMU again:

    qemu-system-ppc64 -nographic -hda debian-sid-ppc64.qcow2 -kernel vmlinux-3.2.0-4-powerpc64 -initrd initrd.img-3.2.0-4-powerpc64 -append “console=ttyPZ0 libata.dma=0 root=/dev/sda3”

  12. Bask in all the PPC64 guest glory!




Dear 10gen,

Please merge my patches. I want to give MongoDB the best possible “out of the box” experience on Fedora and RHEL EPEL. I’ve taken my time to make sure that these patches were written in a way that preserves upstream behavior and compatibility, because I think upstream should have a great experience too. Since we support releases from RHEL5 to Fedora Rawhide, our packaging provides you with valuable testing and help to ensure that MongoDB will work with RHEL N+1 before it is even released. However, every release you make without our patches makes my life harder and all but ensures that Fedora won’t be able to run the latest version until well after it is released. In short: help us help you.


Nathaniel McCallum
MongoDB Maintainer – Fedora

Arrived at FUDCon Blacksburg

I arrived at FUDCon this evening at about 5pm after picking up tdfischer and codeblocker from the airport. We went out to dinner with Colin Walters and John Palmieri and a bunch of others. It was a lot of fun. It was also great to meet up with Dan Walsh again and to meet Dave Jones and Josh Boyer.

I’m looking forward to the workshop tomorrow on Fedora multi-factor authentication and I’ll be proposing BarCamp-style talks on my Kerberos OTP work and libql. If you’re on your way to Blacksburg, see you there!

MongoDB 1.8 in Fedora

As MongoDB’s 1.8 release cycle is drawing to a close, I decided to update the Fedora 15 packages of MongoDB to the 1.7.x branch. The upgrade process from 1.6 to the 1.7.x/1.8.x series should be fairly straightforward. On non-replication/non-sharded setups it should be completely transparent: just upgrade the RPMs and restart; everything should work. For replication/sharded setups, just follow the official documentation.

Once the official 1.8.0 is released I will be pushing updates into all existing Fedora and EPEL repos. As always, please test and let me know if you have any questions. Thanks!