-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Integrate into upstream dracut #8
Comments
FWIW, OpenSSH sshd doesn't add much to the initramfs. For example, on Fedora, the impact of adding the |
@cryptomilk dracut has its own test suite, the travis ci-based test would need adoption. The module can just be added to the modules.d directory. Also, run "make syncheck" in the root. Once that's all done, submit a PR to dracutdevs/dracut. |
I think @gsauthof would be the right person to submit it. I'm sorry but I don't have the time to find my way through github CI. |
It makes sense that this is a standard feature of dracut. Especially the rescue shell for remote systems. Also it would be maintained there if there are changes to dracut which would need to adopt the configs/setup ... |
Well, the TODO lists it as a 'future enhancement request'. Which basically documents that there are people who requested this enhancement. You can also read the support note as something like: 'this request is supported by Debian'. That this TODO item is 9 years old speaks for itself. I've even commented in 2018 on the bugzilla issue that is linked from that TODO: https://bugzilla.redhat.com/show_bug.cgi?id=524727#c28 Also in 2018, I posted to the dracut mailinglist to get an idea what additional requirements upstream might have for getting dracut-sshd merged. On both my bugzilla comment and the mailing posting I got zero response from upstream developers. Thus, at that point it was pretty uncertain what amount of extra work would be required to get it upstream - and how good would be the chances getting it accepted. As a consequence I didn't pursue that idea further, at that time. Last year a dracut contributor commented on this issue - from that I read that a pull request would need to include some tests that fit into the existing dracut testsuite. Which is fair enough. So if you want to submit upstream this is the main work package that needs to be done. It's still uncertain how interested upstream would be to deal with a dracut-sshd pull-request. I mean in the worst-case you would invest a significant amount of time creating new tests for the dracut test suite and then the pull-request would be ignored for years. |
I see, thank you for the insight. I'll do some research and see how big of an effort that would be. Supposing I do manage to make an acceptable PR for dracut devs, I take it you do not mind if I submit it myself? |
Of course, I don't mind. This is part of the freedom open-source software provides. |
The license would need to be changed to GPLv2+ to conform with the rest of dracut, so either a rewrite or contacting all the contributors to relicense it would be the first step. |
@Conan-Kudo are you speaking for the dracut development team when you are saying that dracut contributions are required to be GPLv2+ licensed? I'm asking because dracut already mixes several licenses - including GPLv3+. For example, in dracut 050 I can find code licensed under:
Also, in general, I don't see any harm in mixing GPLv2+ sources with GPLv3+ sources. |
@gsauthof Hmm, for some reason I thought the project maintained GPLv2+... I knew of some of the code being LGPLv2+, but I didn't realize some GPLv3+ code existed already. Nevermind then. |
@danimo what would be needed to get this upstream?
Currently OpenSSH is the only ssh server with FIPS support. For a smaller solution we would need to build something using libssh.
The text was updated successfully, but these errors were encountered: