/rss20.xml">

Fedora People

Arguing with an AI or how Evgeni tried to use CodeRabbit

Posted by Evgeni Golov on 2025-06-17 15:19:57 UTC

Everybody is trying out AI assistants these days, so I figured I'd jump on that train and see how fast it derails.

I went with CodeRabbit because I've seen it on YouTube — ads work, I guess.

I am trying to answer the following questions:

  • Did the AI find things that humans did not find (or didn't bother to mention)
  • Did the AI output help the humans with the review (useful summary etc)
  • Did the AI output help the humans with the code (useful suggestions etc)
  • Was the AI output misleading?
  • Was the AI output distracting?

To reduce the amount of output and not to confuse contributors, CodeRabbit was configured to only do reviews on demand.

What follows is a rather unscientific evaluation of CodeRabbit based on PRs in two Foreman-related repositories, looking at the summaries CodeRabbit posted as well as the comments/suggestions it had about the code.

Ansible 2.19 support

PR: theforeman/foreman-ansible-modules#1848

summary posted

The summary CodeRabbit posted is technically correct.

This update introduces several changes across CI configuration, Ansible roles, plugins, and test playbooks. It expands CI test coverage to a new Ansible version, adjusts YAML key types in test variables, refines conditional logic in Ansible tasks, adds new default variables, and improves clarity and consistency in playbook task definitions and debug output.

Yeah, it does all of that, all right. But it kinda misses the point that the addition here is "Ansible 2.19 support", which starts with adding it to the CI matrix and then adjusting the code to actually work with that version. Also, the changes are not for "clarity" or "consistency", they are fixing bugs in the code that the older Ansible versions accepted, but the new one is more strict about.

Then it adds a table with the changed files and what changed in there. To me, as the author, it felt redundant, and IMHO doesn't add any clarity to understand the changes. (And yes, same "clarity" vs bugfix mistake here, but that makes sense as it apparently miss-identified the change reason)

And then the sequence diagrams… They probably help if you have a dedicated change to a library or a library consumer, but for this PR it's just noise, especially as it only covers two of the changes (addition of 2.19 to the test matrix and a change to the inventory plugin), completely ignoring other important parts.

Overall verdict: noise, don't need this.

comments posted

CodeRabbit also posted 4 comments/suggestions to the changes.

Guard against undefined result.task

IMHO a valid suggestion, even if on the picky side as I am not sure how to make it undefined here. I ended up implementing it, even if with slightly different (and IMHO better readable) syntax.

  • Valid complaint? Probably.
  • Useful suggestion? So-So.
  • Wasted time? No.

Inconsistent pipeline in when for composite CV versions

That one was funny! The original complaint was that the when condition used slightly different data manipulation than the data that was passed when the condition was true. The code was supposed to do "clean up the data, but only if there are any items left after removing the first 5, as we always want to keep 5 items".

And I do agree with the analysis that it's badly maintainable code. But the suggested fix was to re-use the data in the variable we later use for performing the cleanup. While this is (to my surprise!) valid Ansible syntax, it didn't make the code much more readable as you need to go and look at the variable definition.

The better suggestion then came from Ewoud: to compare the length of the data with the number we want to keep. Humans, so smart!

But Ansible is not Ewoud's native turf, so he asked whether there is a more elegant way to count how much data we have than to use | list | count in Jinja (the data comes from a Python generator, so needs to be converted to a list first).

And the AI helpfully suggested to use | count instead!

However, count is just an alias for length in Jinja, so it behaves identically and needs a list.

Luckily the AI quickly apologized for being wrong after being pointed at the Jinja source and didn't try to waste my time any further. Wouldn't I have known about the count alias, we'd have committed that suggestion and let CI fail before reverting again.

  • Valid complaint? Yes.
  • Useful suggestion? Nope.
  • Wasted time? Yes.

Apply the same fix for non-composite CV versions

The very same complaint was posted a few lines later, as the logic there is very similar — just slightly different data to be filtered and cleaned up.

Interestingly, here the suggestion also was to use the variable. But there is no variable with the data!

The text actually says one need to "define" it, yet the "committable suggestion" doesn't contain that part.

Interestingly, when asked where it sees the "inconsistency" in that hunk, it said the inconsistency is with the composite case above. That however is nonsense, as while we want to keep the same number of composite and non-composite CV versions, the data used in the task is different — it even gets consumed by a totally different playbook — so there can't be any real consistency between the branches.

  • Valid complaint? Yes (the expression really could use some cleanup).
  • Useful suggestion? Nope.
  • Wasted time? Yes.

I ended up applying the same logic as suggested by Ewoud above. As that refactoring was possible in a consistent way.

Ensure consistent naming for Oracle Linux subscription defaults

One of the changes in Ansible 2.19 is that Ansible fails when there are undefined variables, even if they are only undefined for cases where they are unused.

CodeRabbit complains that the names of the defaults I added are inconsistent. And that is technically correct. But those names are already used in other places in the code, so I'd have to refactor more to make it work properly.

Once being pointed at the fact that the variables already exist, the AI is as usual quick to apologize, yay.

  • Valid complaint? Technically, yes.
  • Useful suggestion? Nope.
  • Wasted time? Yes.

add new parameters to the repository module

PR: theforeman/foreman-ansible-modules#1860

summary posted

Again, the summary is technically correct

The repository module was updated to support additional parameters for repository synchronization and authentication. New options were added for ansible collections, ostree, Python packages, and yum repositories, including authentication tokens, filtering controls, and version retention settings. All changes were limited to module documentation and argument specification.

But it doesn't add anything you'd not get from looking at the diff, especially as it contains a large documentation chunk explaining those parameters.

No sequence diagram this time. That's a good thing!

Overall verdict: noise (even if the amount is small), don't need this.

comments posted

CodeRabbit generated two comments for this PR.

Interestingly, none of them overlapped with the issues ansible-lint and friends found.

get rid of the FIXMEs

Yepp, that's fair

  • Valid complaint? Yes.
  • Useful suggestion? Nope. (But it's not possible in this case!)
  • Wasted time? No.

add validation for the new parameters

Yepp, I forgot these (not intentionally!).

The diff it suggests is nonsense, as it doesn't take into account the existing Ansible and Yum validations, but it clearly has read them as the style etc of the new ones matches. It also managed to group the parameters correctly by repository type, so it's something.

 if module.foreman_params['content_type'] != 'ansible_collection':
     invalid_list = [key for key in ['ansible_collection_requirements'] if key in module.foreman_params]
     if invalid_list:
         module.fail_json(msg="({0}) can only be used with content_type 'ansible_collection'".format(",".join(invalid_list)))
+
+# Validate ansible_collection specific parameters
+if module.foreman_params['content_type'] != 'ansible_collection':
+    invalid_list = [key for key in ['ansible_collection_auth_token', 'ansible_collection_auth_url'] if key in module.foreman_params]
+    if invalid_list:
+        module.fail_json(msg="({0}) can only be used with content_type 'ansible_collection'".format(",".join(invalid_list)))
+
+# Validate ostree specific parameters
+if module.foreman_params['content_type'] != 'ostree':
+    invalid_list = [key for key in ['depth', 'exclude_refs', 'include_refs'] if key in module.foreman_params]
+    if invalid_list:
+        module.fail_json(msg="({0}) can only be used with content_type 'ostree'".format(",".join(invalid_list)))
+
+# Validate python package specific parameters
+if module.foreman_params['content_type'] != 'python':
+    invalid_list = [key for key in ['excludes', 'includes', 'package_types', 'keep_latest_packages'] if key in module.foreman_params]
+    if invalid_list:
+        module.fail_json(msg="({0}) can only be used with content_type 'python'".format(",".join(invalid_list)))
+
+# Validate yum specific parameter
+if module.foreman_params['content_type'] != 'yum' and 'upstream_authentication_token' in module.foreman_params:
+    module.fail_json(msg="upstream_authentication_token can only be used with content_type 'yum'")

Interestingly, it also said "Note: If 'python' is not a valid content_type, please adjust the validation accordingly." which is quite a hint at a bug in itself. The module currently does not even allow to create content_type=python repositories. That should have been more prominent, as it's a BUG!

  • Valid complaint? Yes.
  • Useful suggestion? Mostly (I only had to merge the Yum and Ansible branches with the existing code).
  • Wasted time? Nope.

parameter persistence in obsah

PR: theforeman/obsah#72

summary posted

Mostly correct.

It did miss-interpret the change to a test playbook as an actual "behavior" change: "Introduced new playbook variables for database configuration" — there is no database configuration in this repository, just the test playbook using the same metadata as a consumer of the library. Later on it does say "Playbook metadata and test fixtures", so… unclear whether this is a miss-interpretation or just badly summarized. As long as you also look at the diff, it won't confuse you, but if you're using the summary as the sole source of information (bad!) it would.

This time the sequence diagram is actually useful, yay. Again, not 100% accurate: it's missing the fact that saving the parameters is hidden behind an "if enabled" flag — something it did represent correctly for loading them.

Overall verdict: not really useful, don't need this.

comments posted

Here I was a bit surprised, especially as the nitpicks were useful!

Persist-path should respect per-user state locations (nitpick)

My original code used os.environ.get('OBSAH_PERSIST_PATH', '/var/lib/obsah/parameters.yaml') for the location of the persistence file. CodeRabbit correctly pointed out that this won't work for non-root users and one should respect XDG_STATE_HOME.

Ewoud did point that out in his own review, so I am not sure whether CodeRabbit came up with this on its own, or also took the human comments into account.

The suggested code seems fine too — just doesn't use /var/lib/obsah at all anymore. This might be a good idea for the generic library we're working on here, and then be overridden to a static /var/lib path in a consumer (which always runs as root).

In the end I did not implement it, but mostly because I was lazy and was sure we'd override it anyway.

  • Valid complaint? Yes.
  • Useful suggestion? Yes.
  • Wasted time? Nope.

Positional parameters are silently excluded from persistence (nitpick)

The library allows you to generate both positional (foo without --) and non-positional (--foo) parameters, but the code I wrote would only ever persist non-positional parameters. This was intentional, but there is no documentation of the intent in a comment — which the rabbit thought would be worth pointing out.

It's a fair nitpick and I ended up adding a comment.

  • Valid complaint? Yes.
  • Useful suggestion? Yes.
  • Wasted time? Nope.

Enforce FQDN validation for database_host

The library has a way to perform type checking on passed parameters, and one of the supported types is "FQDN" — so a fully qualified domain name, with dots and stuff. The test playbook I added has a database_host variable, but I didn't bother adding a type to it, as I don't really need any type checking here.

While using "FQDN" might be a bit too strict here — technically a working database connection can also use a non-qualified name or an IP address, I was positively surprised by this suggestion. It shows that the rest of the repository was taken into context when preparing the suggestion.

  • Valid complaint? In the context of a test, no. Would that be a real command definition, yes.
  • Useful suggestion? Yes.
  • Wasted time? Nope.

reset_args() can raise AttributeError when a key is absent

This is a correct finding, the code is not written in a way that would survive if it tries to reset things that are not set. However, that's only true for the case where users pass in --reset-<parameter> without ever having set parameter before. The complaint about the part where the parameter is part of the persisted set but not in the parsed args is wrong — as parsed args inherit from the persisted set.

The suggested code is not well readable, so I ended up fixing it slightly differently.

  • Valid complaint? Mostly.
  • Useful suggestion? Meh.
  • Wasted time? A bit.

Persisted values bypass argparse type validation

When persisting, I just yaml.safe_dump the parsed parameters, which means the YAML will contain native types like integers.

The argparse documentation warns that the type checking argparse does only applies to strings and is skipped if you pass anything else (via default values).

While correct, it doesn't really hurt here as the persisting only happens after the values were type-checked. So there is not really a reason to type-check them again. Well, unless the type changes, anyway.

Not sure what I'll do with this comment.

  • Valid complaint? Nah.
  • Useful suggestion? Nope.
  • Wasted time? Not much.

consider using contextlib.suppress

This was added when I asked CodeRabbit for a re-review after pushing some changes. Interestingly, the PR already contained try: … except: pass code before, and it did not flag that.

Also, the code suggestion contained import contextlib in the middle of the code, instead in the head of the file. Who would do that?!

But the comment as such was valid, so I fixed it in all places it is applicable, not only the one the rabbit found.

  • Valid complaint? Yes.
  • Useful suggestion? Nope.
  • Wasted time? Nope.

workaround to ensure LCE and CV are always sent together

PR: theforeman/foreman-ansible-modules#1867

summary posted

A workaround was added to the _update_entity method in the ForemanAnsibleModule class to ensure that when updating a host, both content_view_id and lifecycle_environment_id are always included together in the update payload. This prevents partial updates that could cause inconsistencies.

Partial updates are not a thing.

The workaround is purely for the fact that Katello expects both parameters to be sent, even if only one of them needs an actual update.

No diagram, good.

Overall verdict: misleading summaries are bad!

comments posted

Given a small patch, there was only one comment.

Implementation looks correct, but consider adding error handling for robustness.

This reads correct on the first glance. More error handling is always better, right?

But if you dig into the argumentation, you see it's wrong. Either:

  • we're working with a Katello setup and the host we're updating has content, so CV and LCE will be present
  • we're working with a Katello setup and the host has no content (yet), so CV and LCE will be "updated" and we're not running into the workaround
  • we're working with a plain Foreman, then both parameters are not even accepted by Ansible

The AI accepted defeat once I asked it to analyze things in more detail, but why did I have to ask in the first place?!

  • Valid complaint? Nope.
  • Useful suggestion? Nope.
  • Wasted time? Yes, as I've actually tried to come up with a case where it can happen.

Summary

Well, idk, really.

Did the AI find things that humans did not find (or didn't bother to mention)?

Yes. It's debatable whether these were useful (see e.g. the database_host example), but I tend to be in the "better to nitpick/suggest more and dismiss than oversee" team, so IMHO a positive win.

Did the AI output help the humans with the review (useful summary etc)?

In my opinion it did not. The summaries were either "lots of words, no real value" or plain wrong. The sequence diagrams were not useful either.

Luckily all of that can be turned off in the settings, which is what I'd do if I'd continue using it.

Did the AI output help the humans with the code (useful suggestions etc)?

While the actual patches it posted were "meh" at best, there were useful findings that resulted in improvements to the code.

Was the AI output misleading?

Absolutely! The whole Jinja discussion would have been easier without the AI "help". Same applies for the "error handling" in the workaround PR.

Was the AI output distracting?

The output is certainly a lot, so yes I think it can be distracting. As mentioned, I think dropping the summaries can make the experience less distracting.

What does all that mean?

I will disable the summaries for the repositories, but will leave the @coderabbitai review trigger active if someone wants an AI-assisted review. This won't be something that I'll force on our contributors and maintainers, but they surely can use it if they want.

But I don't think I'll be using this myself on a regular basis.

Yes, it can be made "usable". But so can be vim ;-)

Also, I'd prefer to have a junior human asking all the questions and making bad suggestions, so they can learn from it, and not some planet burning machine.

Less than 2 weeks until the Datacenter move

Posted by Fedora Community Blog on 2025-06-17 10:32:09 UTC

It’s less than 2 weeks until the switch of fedoraproject to our new datacenter, so I thought I would provide a reminder and status update.

Currently we are still on track to switch to the new datacenter the week of June 30th. As mentioned in previous posts:

  • End users hopefully will not be affected (mirrorlists, docs, etc should all be up and working all the time)
  • Contributors should expect for applications and services to be down or not fully working on Monday the 30th and Tuesday the 1st. Contributors are advised to hold their work until later in the week and not report problems for those days as we work to migrate things.
  • Starting Wednesday the 2nd things should be up in the new datacenter and we will start fixing issues that are reported as we can do so.

We ask for your patience in the next few weeks as we setup to do a smooth transfer of resources.

The post Less than 2 weeks until the Datacenter move appeared first on Fedora Community Blog.

Copr builders powered by bootc

Posted by Jakub Kadlčík on 2025-06-17 00:00:00 UTC

As of today, all Copr builder virtual machines are now being spawned from bootc images, which is no small feat because the builder infrastructure involves multiple architectures (x86_64, aarch64, ppc64le, s390x), multiple clouds (Amazon AWS, IBM Cloud), and on-premise hypervisors. It scales up to 400 builders running simultaneously and peaking at 30k builds a day.

Before bootc

You can find some interesting history and previous numbers in Pavel’s article - Fedora Copr farm of builders - status of July 2021. The part it leaves out is how we used to generate the Copr builder images.

The process is documented in the official Copr documentation. In a nutshell, it involved manually spawning a VM from a fresh Fedora Cloud image, running Ansible playbooks to provision it, and then using custom scripts to upload the image to the right place. Because we need to build the images natively, we had to follow this process for every architecture.

The easiest workflow was for x86_64 builders running on our own hypervisors. It meant connecting to the hypervisor using SSH and running a custom copr-image script from the praiskup/helpers repository. While its usage looks innocent, internally it had to execute many virt-sysprep commands. It also required some guestfish hacks to modify cloud-init configuration inside of the image so that it works outside of an actual cloud. Then, finally, using the upload-qcow2-images script to upload the image into libvirt.

The same exact workflow for ppc64le builders. However, internally it had a special case uploading the image also to OSU OSL OpenStack.

For s390x builders, we don’t have a hypervisor where we could natively build the image. Thus we needed to spawn a new VM in IBM Cloud and run the previously mentioned copr-image script inside of it. Once finished, we needed to upload the image to IBM Cloud. This is supposed to be done using the ibmcloud tool, but the problem is that it is not FOSS, and as such, it cannot be packaged for Fedora. We don’t want to run random binaries from the internet, so we containerized it.

At this point, only x86_64 and aarch64 images for Amazon AWS remain.

While not straightforward to create a new AMI from a local qcow2 image, it’s quite easy to create an AMI from a running EC2 instance. That was our strategy. Spawn a new instance from a fresh Fedora Cloud image, provision it, and then create an AMI from it.

Current situation

I disliked exactly three aspects concerning the previous solution. It required a lot of manual work, the process was different for every cloud and architecture, and the bus factor was less than one.

Even though at this moment generating a fresh set of builder images still requires about the same amount of manual work as before, there is a potential for future automation. By switching to bootc and Image Builder, we were able to offload some dirty work to them while also unifying the process to follow the same steps for all architectures and clouds (with minor caveats).

The current process is temporarily documented here. We spawn a VM for every architecture and use it to build the system image from our Containerfile via the quay.io/centos-bootc/bootc-image-builder. Then we fetch the results and upload them where needed.

For Amazon AWS, we can utilize the image-builder upload feature which is amazing. But for other clouds and hypervisors, we still need our custom upload-qcow2-images and quay.io/praiskup/ibmcloud-cli. If image-builder could implement the missing support and enable uploading to all of them, that would be a major win for us.

Future plans

My goal is simple, I want one-button deployment. Well, almost.

When a change is made to our Containerfile, or when triggered manually, or periodically after a period of inactivity, I want the images to be automatically built for all architectures and uploaded to all the necessary places. Then seeing a list of image names and AMIs that I can either choose to use or ignore.

The bootc-image-builder-action seems like the perfect candidate, but the problem is that it cannot natively build images for ppc64le and s390x.

SNThrailkill recommended GitLab Runners but that would require us to maintain the runner VMs, which is annoying. Moreover, there is a potential chicken-and-egg problem, meaning that if we break our image, we might not be able to spawn a VM to build a new working image. We also wouldn’t be able to use the existing GitHub action and would have to port it for GitLab.

At this moment, our team is leaning towards Konflux and a tekton pipeline for building images. Fedora Konflux instance is limited to x86_64 and aarch64, so we would temporarily have to use an internal Red Hat instance which provides all the architectures needed by us.

Many questions are yet to be answered. Is Konflux ready? Does the pipeline for building images already exist? Does it support everything we need? Is it built on top of image-builder so that we can use its upload feature?

Pitfalls along the way

Hopefully, this can help Image Builder and bootc developers better understand their blind spots in the onboarding process, and also prevent new users from repeating the same mistakes.

Before discovering that bootc exists, our original approach was to use just Image Builder and its blueprints, and automatize the process using Packit. There were several problems. It was easy to build the image locally from our blueprint, but it wasn’t possible to upload the same blueprint to be built in a hosted Image Builder service. Additionally, I had several issues with the Blueprint TOML format. The order of operations is pre-defined (e.g. all users are always created before any packages are installed). There is no escape hatch to run a custom command. And finally, it’s yet another specification to learn. My recommendation? Just go with bootc.

Our main problem with bootc is the immutability of the filesystem. Can somebody please help me understand whether the immutable filesystem is a fundamental building block, a key piece of technology that enables bootable containers, or whether it is an unrelated feature? If it is technologically possible, our team would love to see officially supported mutable bootc base images. Currently, we are going forward with a hack to make the root filesystem transient.

One of the issues that probably stems out of the immutable filesystem is the necessity to change the default location of the RPM database. This hack is baked into the bootc base images and we needed to revert it because it causes Mock to fail under some specific circumstances. This unfortunately cost us many many hours of debugging.

The process of building system images is quite storage intensive in /var/lib/containers and /run. To avoid running out of disk space on our virtual machines, we had to turn our swap partition into a data volume and mount the problematic directories there. Not sure if there is something that image-builder can do to make this a less of problem.

We build the system images natively on VMs of the same architecture that they are targeted for, but then we fetch all of them to an x86_64 machine and upload the images to the respective clouds from there. We discovered a bug in cross-arch upload to AWS, which was promptly confirmed and fixed by the image-builder team. Big customer satisfaction right here.

We also struggled with setting up AWS permissions for the image-builder upload command to work correctly. We tried running it, fixing the insufficient permissions it complained about, running it again, and again, and so on. I don’t recommend this approach. It turns out there is a documentation page with instructions.

I hope this chapter doesn’t come across as too discouraging. In fact, we found workarounds for all of our problems, and we are now happily using this in production. So you can probably too.

Infra and RelEng Update – Week 24

Posted by Fedora Community Blog on 2025-06-13 10:00:00 UTC

This is a weekly report from the I&R (Infrastructure & Release Engineering) Team. We provide you both infographic and text version of the weekly report. If you just want to quickly look at what we did, just look at the infographic. If you are interested in more in depth details look below the infographic.

Week: 9 June – 13 June

Infrastructure & Release Engineering

The purpose of this team is to take care of day to day business regarding CentOS and Fedora Infrastructure and Fedora release engineering work.
It’s responsible for services running in Fedora and CentOS infrastructure and preparing things for the new Fedora release (mirrors, mass branching, new namespaces etc.).
List of planned/in-progress issues

Fedora Infra

CentOS Infra including CentOS CI

Release Engineering

List of new releases of apps maintained by I&R Team

Patch update of Datanommer models from 1.4.2 to 1.4.3 on 2025-06-10
Patch update of Datanommer consumer from 1.4.2 to 1.4.3 on 2025-06-10
Patch update of Datanommer commands from 1.4.2 to 1.4.3 on 2025-06-10
Patch update of Datanommer models from 1.4.1 to 1.4.2 on 2025-06-07
Patch update of Datanommer commands from 1.4.1 to 1.4.2 on 2025-06-07
Patch update of Datanommer consumer from 1.4.1 to 1.4.2 on 2025-06-07

If you have any questions or feedback, please respond to this report or contact us on #redhat-cpe channel on matrix.

The post Infra and RelEng Update – Week 24 appeared first on Fedora Community Blog.

Trip Report: Flock to Fedora 2025

Posted by Stephen Gallagher on 2025-06-12 15:23:34 UTC

Another year, another Fedora contributor conference! This year, Flock to Fedora returned to Prague, Czechia. It’s a beautiful city and always worth taking a long walk around, which is what many of the conference attendees did the day before the conference started officially. Unfortunately, my flight didn’t get in until far too late to attend, but I’m told it was a good time.

Day One: The Dawn of a New Era

After going through the usual conference details, including reminders of the Code of Conduct and the ritual Sharing of the WiFI Password, Flock got into full swing. To start things off, we had the FPL Exchange. Once a frequent occurence, sometimes only a few short years apart, this year saw the passing of the torch from Matthew Miller who has held the position for over eleven years (also known as “roughly as long as all of his predecessors, combined”) to his successor Jef Spaleta.

In a deeply solemn ceremony… okay, I can’t say that with a straight face. Our new Fedora Project Leader made his entrance wearing a large hotdog costume, eliciting laughter and applause. Matthew then proceeded to anoint the new FPL by dubbing him with a large, Fedora Logo-shaped scepter. Our new JefPL gave a brief overview of his career and credentials and we got to know him a bit.

After that, the other members of FESCo and myself (except Michel Lind, who was unable to make it this year) settled in for a Q&A panel with the Fedora community as we do every year. Some years in the past, we’ve had difficulty filling an hour with questions, but this time was an exception. There were quite a few important topics on peoples’ minds this time around and so it was a lively discussion. In particular, the attendees wanted to know our stances on the use of generative AI in Fedora. I’ll briefly reiterate what I said in person and during my FESCo election interview this year: My stance is that AI should be used to help create choices. It should never be used to make decisions. I’ll go into that in greater detail in a future blog post.

After a brief refreshment break, the conference launched into a presentation on Forgejo (pronounced For-jay-oh, I discovered). The talk was given by a combination of Fedora and upstream developers, which was fantastic to see. That alone tells me that the right choice was made in selecting Forgejo for out Pagure replacement in Fedora. We got a bit of history around the early development and the fork from Gitea.

Next up was a talk I had been very excited for. The developers of Bazzite, a downstream Fedora Remix focused on video gaming, gave an excellent talk about the Bootc tools underpinning it and how Fedora provided them with a great platform to work with. Bazzite takes a lot of design cues from Valve Software’s SteamOS and is an excellent replacement OS for the sub-par Windows experience on some of the SteamDeck’s competitors, like the Asus Rog Ally series. It also works great on a desktop for gamers and I’ve recommended it to several friends and colleagues.

After lunch, I attended the Log Detective presentation, given by Tomas Tomecek and Jiri Podivin. (Full disclosure: this is the project I’m currently working on.) They talked about how we are developing a tool to help package maintainers quickly process the logs of build failures to save time and get fixes implemented rapidly. They made sure to note that Log Detective is available as part of the contribution pipeline for CentOS Stream now and support for Fedora is coming in the near future.

After that, I spent most of the remainder of the day involved in the “Hallway Track”. I sat down with quite a few Fedora Friends and colleagues to discuss Log Detective, AI in general and various other FESCo topics. I’ll freely admit that, after a long journey from the US that had only gotten in at 1am that day, I was quite jet-lagged and have only my notes to remember this part of the day. I went back to my room to grab a quick nap before heading out to dinner at a nearby Ukrainian restaurant with a few old friends.

That evening, Flock held a small social event at an unusual nearby pub. GEEKÁRNA was quite entertaining, with some impressive murals of science fiction, fantasy and videogame characters around the walls. Flock had its annual International Candy Swap event there, and I engaged in my annual tradition of exchanging book recommendations with Kevin Fenzi.

Day Two: To Serve Man

Despite my increasing exhaustion from jet lag, I found the second day of the conference to be exceedingly useful, though I again did not attend a high number of talks. One talk that I made a particular effort to attend was the Fedora Server Edition talk. I was quite interested to hear from Peter Boy and Emmanuel Seyman about the results of the Fedora Server user survey that they conducted over the past year. The big takeaway there was that a large percentage of Fedorans use Fedora Server as a “home lab server” and that this is a constituency that we are under-serving today.

After the session, I sat down with Peter, Emmanuel and Aleksandra Fedorova and we spent a long while discussing some things that we would like to see in this space. In particular, we suggested that we want to see more Cockpit extensions for installing and managing common services. In particular, what I pitched would be something like an “App Store” for server applications running in containers/quadlets, with Cockpit providing a simple configuration interface for it. In some ways, this was a resurrection of an old idea. Simplifying the install experience for popular home lab applications could be a good way to differentiate Fedora Server from the other Editions and bring some fresh interest to the project.

After lunch, I spent most of the early afternoon drafting a speech that I would be giving at the evening event, with some help from Aoife Moloney and a few others. As a result, I didn’t see many of the talks, though I did make sure to attend the Fedora Council AMA (Ask Me Anything) session.

The social event that evening was a boat cruise along the Vltava River, which offered some stunning views of the architecture of Prague. As part of this cruise, I also gave a speech to honor Matthew Miller’s time as Fedora Project Leader and wish him well on his next endeavors at Red Hat. Unfortunately, due to technical issues with the A/V system, the audio did not broadcast throughout the ship. We provided Matthew with a graduation cap and gown and Aoife bestowed upon him a rubber duck in lieu of a diploma.

Day Three: Work It!

The final day of the conference was filled with workshops and hacking sessions. I participated in three of these, all of which were extremely valuable.

The first workshop of the day was for Log Detective. Several of the attendees were interested in working with the project and we spent most of the session discussing the API, as well as collecting some feedback around recommendations to improve and secure it.

After lunch, I attended the Forgejo workshop. We had a lengthy (and at times, heated) discussion on how to replace our current Pagure implementation of dist-git with a Forgejo implementation. I spent a fair bit of the workshop advocating for using the migration to Forgejo as an opportunity to modernize our build pipeline, with a process built around merge requests, draft builds and CI pipelines. Not everyone was convinced, with a fair number of people arguing that we should just reimplement what we have today with Forgejo. We’ll see how things go a little further down the line, I suppose.

The last workshop of the day was a session that Zbigniew Jędrzejewski-Szmek and I ran on eliminating RPM scriptlets from packages. In an effort to simplify life for Image Mode and virtualization (as well as keep updates more deterministic), Zbigniew and I have been on a multi-year campaign to remove all scriptlets from Fedora’s shipped RPMs. Our efforts have borne fruit and we are now finally nearing the end of our journey. Zbigniew presented on how systemd and RPM now has native support for creating users and groups, which was one of the last big usages of scriptlets. In this workshop, we solicited help and suggestions on how to clean up the remaining ones, such as the use of the alternatives system and updates for SELinux policies. Hopefully by next Flock, we’ll be able to announce that we’re finished!

With the end of that session came the end of Flock. We packed up our things and I headed off to dinner with several of the Fedora QA folks, then headed back to my room to sleep and depart for the US in the morning. I’d call it time well spent, though in the future I think I’ll plan to arrive a day earlier so I’m not so tired on the first day of sessions.

GSOC Summer 2025 – ExplainMyLogs

Posted by Fedora Community Blog on 2025-06-10 12:25:09 UTC

AI-Powered Natural Language Log Analyzer

This blog post is a brief documentation of my journey for Google Summer Of Code – 2025 with the Fedora Community.

About Me:

Name: Tanvi Ruhika

e-Mail: tanviruhika1217@gmail.com

A 1st year Computer Science (Core) student at GITAM University, India. I’ve always loved building things that feel futuristic yet genuinely useful ,whether it’s a gesture-controlled robot, a voice-activated smart house, or an AI tool that speaks human. My core interests lie in artificial intelligence, automation, and developing tools that make technology more intuitive and accessible for developers.

I’m also drawn to creativity and design, and I’m always excited by projects that blend technology with a touch of personality. I’ve always looked for ways to expose myself to new opportunities and technologies, and Google Summer of Code felt like the perfect chance to do just that. When I got selected, I knew I wanted to give it my all ,not just to build something meaningful, but to truly dive deeper into the world of open source.

Project Abstract
ExplainMyLogs is an innovative tool designed to transform complex system and application logs
into clear, concise natural language explanations. This project aims to leverage large language
models and machine learning techniques to help developers and DevOps engineers quickly
identify, understand, and resolve issues within their infrastructure. By translating cryptic log
entries into human-readable explanations and actionable insights, ExplainMyLogs will
significantly reduce debugging time and lower the barrier to entry for infrastructure
troubleshooting.

Project Goals

Enable progressive learning from user feedback to improve analysis accuracy.

Develop a log parser capable of handling various log formats from common services.

Create an AI-powered analysis engine that identifies patterns, anomalies, and potential
issues in log data.

Build a natural language generator that produces clear explanations of detected issues.

Implement a command-line interface for easy integration into existing workflows.

Design a simple web interface for interactive log analysis and visualization.

Provide actionable recommendations for resolving identified issues.

Timeline

The timeline of the project goes like this:

WEEK-1

Hugging face -LLM Course

Fedora Linux Terminal Commands

The post GSOC Summer 2025 – ExplainMyLogs appeared first on Fedora Community Blog.

Flock to fedora 2025

Posted by Kevin Fenzi on 2025-06-09 17:47:17 UTC
Scrye into the crystal ball

Just got home yesterday from Flock to Fedora 2025 edition and I'm going to try and write up my thoughts before I get busy and forget everything. Do note that this is likely to be a long post.

Flock is always a great conference and this year was no exception. This time I was very busy and distracted by the upcoming Datacenter move, so I didn't anticipate it as much as I usually do, but it sure was great once I got there. I'm an introvert by nature, and the prospect of being "on" and engaging with the world and all the people at the conference should drain me, but flock somehow manages to leave me energized (in mind / feelings at least) if exhausted in body.

Day -2 (monday 2025-06-02)

My travels started on Monday the 2nd. I got up early, grabbed a cup of coffee and checked in on things before heading for the airport. It's a great thing I did as I managed to block some scrapers that were causing the python mass rebuild to go very very slowly. Pesky scrapers. Then 2 hour drive to the airport in Portland. Some traffic, but no real delays. Then a quick bite to eat and my first flight: PDX to AMS. It's about a 9 hour flight, which is pretty crazy, but I definitely like it better than more smaller hops. There's less to go wrong.

As a side note, I cannot stress to others enough how much noise canceling headphones really make plane flights more bearable. They cut off the nasty drone of the engines/wind and make it vastly less painfull. I wore my headphones with noise canceling on all the time, even when I wasn't listening to anything.

On these long flights I can't really sleep, so I like to read ebooks and catch up on podcasts. This flight I listened to some great song exploder episodes ( "our house" and "everybody wants to rule the world") and some radiolab and others.

Then arrival in AMS. I only had a 1.5 hour layover, which it turned out was just perfectly timed. I managed to get through the customs line and to the new gate just before they started boarding for Pague. They did make me check my bag here because the flight was so full, but that was fine.

Day -1 (tuesday 2025-06-03)

Got into Prague, got my bag and got a uber to the hotel. The hotel checkin was not until 3pm according to their website but they managed to already have my room ready, so I was able to check in and decompress.

I then met Carl and Noel at a resturant nearby for a nice lunch. We chatted on all kinds of topics.

Back to the hotel to relax a bit. I was determined to try and stay up and go to sleep later so my schedule would shift, but then I decided to just lay down for a few minutes and bam! I did wake up around 8pm local time and went back to bed, and I did wake up early, but that was after getting a lot of sleep.

Day 0 (wed 2025-06-04)

I met up with tons of folks at breakfast at the hotel and we went over to the venue. The hotel I was staying at was about 1.5 blocks from the venue hotel, it worked out just fine.

Some of us went to a outside air food court place for lunch. It was nice. I had some tacos and we had some more conversations at the lunch table.

The afternoon I went to a meetup between fesco and council members that were present. I think there was some productive discussion there. There were a lot of suggestions on how fesco and the council could communicate more and how the council could communicate better with the communty and what sort of workflows might make sense. I think it mostly resulted in some council action items, but also on the fesco side more communication to the council on difficult topics.

After that I was off to the sponsor dinner. This is a dinner with folks from the groups/companies that sponsored flock along with fesco and council members. This time it was at a lovely resturant that was a 600+ year old underground wine cellar! https://www.napekle.cz/en/ The food was great and the conversations were also... great!

Back to the hotel and in bed around midnight.

Day 1 (thursday 2025-06-05)

Flock begins!

We had opening remarks and handoff of the Fedora Project Leader baton (wand? septere? curling boom?). I was hit by how long I have been around this community. I met Jef back in the fedora.us/fedora-extras days, almost 20 years ago now, and Matthew showing a picture of his kids when he first became FPL and now and how much they had grown. We are all getting older and we really need to bring in new folks to carry the fedora foundations forward.

Then, right after that was the 'meet your FESCo' panel. We didn't have all FESCo members present, but a good many of them. We did a quick introduction and then took questions from the audience. I'm glad Peter was there and asked about the provenpackager stuff from eariler this year. I hope answers were helpfull. There were questions all over the place, new arches, ai, workflows, provenpackagers, etc. Do view the video if you are interested.

Next I had planned to go to the forgejo talk, but then... as with so many times in this flock, I got in discussions in the 'hallway track' with people and wasn't able to make it there in time. :( I hope to catch the recording (along with many other talks).

Then lunch at the venue, but this time I signed up for the mentor/metee lunch matching. There was only 3 of us at the Infra/Releng table, but we had a great time I thought. I was happy to share what I could, and Justin and Hristo had a lot of good perspectives. I hope I helped them out, and I know they gave me things to think about. Overall it was very nice. It might have been better with more people, but I'd definitely sign up for this again at another flock.

After lunch I spent a lot of time in the hallway track talking to folks. One super great surprise was that Toshio was there! I got to chat with him a bunch over flock and it was so nice to see him again. Later the next day another person I hadn't seen in a while appeared too: Vipul! I hadn't been too much in touch with him since he moved to a new job at the UN, but it was super great to see him as well (even though I did not recognize him at first with his new glasses!).

It would likely be too hard to list all the people I talked to about all the things I talked to them about but some themes became clear:

  • There was a lot of talk about AI. Yes, the usual funny stores about how AI got it wrong or was used in a stupid way, but also a lot of 'how can we leverage this stuff in a resonable way and how can we make AI more in fitting with our foundations'.

  • A lot of discussion about community building, communication and bringing in new contributors.

I did mange to get to Greg's talk on "Build it and they will come" and other myths. Some great stuff there around community building. I particularly liked some of the examples, which showed things we do wrong all the time. Things to think about and leverage.

Then, thursday night we had a CLE dinner for all the members of my team in Red Hat. It turned out to be at the same place we went for lunch on tuesday, but thats fine. It was good. Some good converations there where I got to chat with Julia and Patrik (although it was kind of loud there, so it was hard hearing anything).

After that some of us rushed off to the Candy Swap. Always a fun event. This time it wasn't at the venue, but instead at a 'games cafe'. They had a full bar there and a bunch of games. It was kind of small, but it worked out ok for our crowd. After the candy swap I got to chat with Stephen about books and movies. We always catch up this way and share nice books we have read. We were joined by Peter and Troy too, so I have a list of books to look up now.

Day 2 (Friday 2025-06-06)

Friday came too early after too little sleep.

I went to the 'what about a better dist-git' talk. Some nice information there, but I think I knew much of it before. There were some good questions starting, but I got pulled out to the hallway track, so I will need to look back at those.

Some more hallway discussions and then off to the "One year in: Microsoft as a Fedora Contributor" talk by Bex. It was great to see the parts of the project that microsoft folks are contributing to, I don't think many people realize it, so it was great to get some visibility to their efforts. I'm personally very happy that Jeremy has been helping out with our signing infra and cloud uploads. Thats really important stuff that we didn't have anyone to drive forward until he was able to do so.

I really planned to go to the Fedora Server talk next, but then again I got into discussions in the hallway until I had missed it. :(

After lunch I went to some lightning talks. This was a last minute thing as the speaker in that slot was not able to be there, but wow... fedora contributors are always ready with talks a the drop of a fedora. I really liked Emma's presentation about design. It's not something developers think about or realize, but we should! Lots of other great ones too!

I went to Greg's discourse tips and tricks. Learned a few things, but I would definitely recommend people who aren't up on discourse to watch the recording. It will help you out getting started!

Then more hallway and the Fedora Council AMA. There were some good questions here and some good discussions about various council related topics. I probibly need to watch the recording even thought I was there because I was tired after a long day.

There was there some short closing remarks (even though there would be workshops the following day) from Justin. he thanked all the folks who helped make flock happen and gave info on the evening event and workshops the next day. There was one thing missing however: We should have all thanked Justin! I know flock is a massive undertaking, and I am sure there were issues I have no idea about, but from my side flock was a great success! Thank you Justin!

The evening event was a boat ride with dinner. We did this same event last time flock was in pague. It was fun then and again now. I had Troy and Evan and Jens at my dinner table and we had a bunch of great discussion about shirts, travel, home assistant, people we all knew and more. Then after dinner everyone mingled on the top deck until they kicked us off the boat around 10pm.

A group of us then went to a beer place near the hotel for a few more beers. Some more talk there about... lots of things. I managed to get back and in bed around midnight (thats the theme).

Day 3 (Saturday 2025-06-07)

The last day was workshops and breakouts. I went to the start of the initial setup hackfest, but I knew much of the information that they were going over, so I allowed myself to be pulled into the hallway again.

After lunch, I went to the distgit implementation in forgejo talk. There was some good discussion about workflows and how things could work. We did get a bit off topic I think with talking about provenpackagers, but I guess it's all related. I'm really looking forward to us using forgejo here.

I did go to Aurélien's improve fedora infra applications, but again I kind of knew the background here, so I got pulled off into some other things:

  • I had a (I hope) nice talk with Peter about server setup and deliverables. I do owe him some more docs/info on one part of it I could not happen to recall, but hopefully this gives him info he needs to work on the server deliverables some more.

  • A talk with a few folks about plans for handling the matrix spam issues. We came up with some proposed short term and longer term plans. Look for plans asking for feedback in the coming weeks. We really need to get things workable there.

  • A nice talk with the person who actually started the opensuse foundation. He was there looking to see if it would be useful to start a fedora one. I don't know the answer, but It sounded very interesting.

  • Got to catch up on ARM stuff with Peter (another one). Always great to talk to him and hopefully we can find some ways forward for the x1e / snapdragon laptops sooner rather than later.

  • The new FPL, Jef. I was in several conversations with him. He seemed to be keeping afloat with all the stuff going on, which I thought was amazing. I'm sure he will be a great FPL.

  • Some good discussions with Greg. He's on my team at Red Hat and working with myself and Fabian on infra, so we were able to have a few higher bandwith discussions that should help us in the coming weeks.

  • Got to catch up a bit with Fabian on a bunch of topics.

  • Had a few nice discussions with Brendan (my grand boss).

After things closed out a bunch of us went to a Dim Sum place nearby for dinner. More books discussion, along with travels and interesting places.

I went back to the hotel and crashed before 9am, which was good, because my flight to AMS was at 6am the next day.

Day 4 (Sunday 2025-06-08)

Travel back home. Got a cab with Brendan at 4am, got to the airport, through security and onto my first flight in time at 6am. Then, in AMS, walking accross the airport, grabbed a quick breakfast and got to the terminal in time to get on my AMS to PDX flight. On the way back my usual podcast and books didn't work because I was so sleepy. It was hard to pay attention. So, instead I watched a few movies: the new marvel captain america one and the second dune movie. Both were ok, but nothing super amazing. My flight from AMS left at 10am, and arrived in PDX at 11am the same day, but it was definitely not a 1 hour flight.

I was worried about customs coming back to the US, but it turned out that they just asked me if I had any food, I said nope, they said ok.

Then the 2 hour drive home. I was pretty sleepy at this point, but I got some cafene and was able to make it home fine finally. There was a lot of stop and go traffic this time, which was anoying, so the drive took an extra hour or so.

Health and diet

I'm going to digress here about heath, diet and conferences, so if that doesn't interest you, feel free to skip it.

I gained weight on this trip, and thats unfortunately pretty usual. I think there's several reasons for this. If you are traveling you may not have much choice of food, or might not know when next you will get food. Breakfast is often included in hotels, and it's almost always a 'all you can eat' buffet type thing. I can eat a lot.

But also, conferences always seem to put food in front of you, and I am pretty bad about just eating food if it's there. I don't want it to go to waste, and it's something I do as a background.

Of course the simple answer is to just have more willpower and eat smaller amounts, but it's not simple to do that sometimes. I don't know if there's much that could be done from a conference point of view. I guess less food with coffee/tea/water breaks? Or moving away from buffets?

Anyhow, something to think about.

Matrix spam

The horrific matrix spam ramped up before flock and measures were put into place that blocked it. Some of those measures are pretty heavy handed, but we really did not want to have to handle this junk at flock. As I mentioned above we did some up with some plans, and I hope we can make things still safe but more open soon.

comments? additions? reactions?

As always, comment on mastodon: https://fosstodon.org/@nirik/114655707058309116

Flock to Fedora report 2025

Posted by Jakub Kadlčík on 2025-06-09 00:00:00 UTC

Flock to Fedora is my favorite conference and this year was no exception.

Too many good presentations and workshops to name them all. But I want to mention at least the most surprising (in a good way) ones. It takes some courage to be the first person to go for a lightning talk, especially when lightning talks aren’t even scheduled and organizers open the floor at the very moment. Smera, I tip my hat to you. Also, I was meaning to ask, how do graphic designers choose the FOSS project they want to work on? As an engineer, I typically get involved in sofware that I use but is broken somehow, or is missing some features. I am curious what is it like for you. Another pleasant surprise was Marta and her efforts to replace grub with nmbl. I will definitely try having no more boot loader. In a VM though, I’d still like to boot my workstation :D.

Random thoughts

We bunked with Pavel, which made me think of this office scene.

Something happened to me repeatedly during this conference and amused me every time. I introduced myself to a person, we talked for five minutes, and then the person asked “so what do you do in Fedora?”. I introduced myself once more, by my nickname. To which the immediate reaction was “Ahaaa, now I know exactly what you do!”. I am still laughing about this. Organizers, please bring back FAS usernames on badges.

It was nice to hear Copr casually mentioned in every other presentation. It makes the work that much more rewarding.

My favorite presentation was Bootable Containers: Moving From Concept to Implementation. I’ve spent all my free time over the last couple of months trying to create a bootc image for Copr builders, and seeing Sean falling into and crawling out of all the same traps as myself was just cathartic. We later talked in the hallway and I appreciated how quickly he matched my enthusiasm about the project. He gave me some valuable advice regarding CI/CD for the system images. Man, now I am even more hyped.

I learned about Fedora Ready, an amazing initiative to partner with laptop vendors and provide a list of devices that officially support Fedora. Slimbook loves Fedora so much that they even offer a laptop with Fedora engravings. How amazing would it be if my employer provided this option for a company laptop? What surprised me, was not seeing System76 on the list. I am a fan of theirs, so I am considering reaching out.

Feeling a tap on your shoulder 30 seconds after you push a commit is never a good sign. When you turn around, Karolina is looking into your eyes and saying that f’d up, you immediately know that push was a bad idea. For a petite lady, she can be quite terrifying :D. I am exaggerating for effect. We had a nice chat afterward and I pitched an idea for an RPM macro that would remove capped versions from Poetry dependencies. That should make our lives easier, no?

One of my favorite moments this year was chilling out with Zbigniew on a boat deck, cruising the Vltava River, and watching the sunset over the beautiful city of Prague. Kinda romatic if you ask me. Just joking, but indeed, it was my pleasure to get to know you Zbigniew.

The JefFPL exchange

The conference began with a bittersweet moment - the passing of the Fedora Project Leadership mantle from Matthew Miller to Jeff Spaleta.

I didn’t know Jeff before, probably because he was busy doing really effin cool stuff in Alaska, but we had an opportunity to chat in the hallway after the session. He is friendly, well-spoken, and not being afraid to state his opinions. Good qualities for a leader. That being said, Matthew left giant shoes to fill, so I think it is reasonable not to be overly enthusiastic about the change just yet.

Matthew, best wishes in your next position, but at the same time, we are sad to see you go.

FESCo and Fedora Council

The FESCo Q&A and the Fedora Council AMA were two different sessions on two different days, but I am lumping them together here. Both of them dealt with an unspecified Proven Packager incident, the lack of communication surrounding it, and the inevitable loss of trust as a consequence.

I respectfully disagree with this sentiment.

Let’s assume FESCo actions were wrong. So what? I mean, really. Everybody makes mistakes. I wrote bugfixes that introduced twice as many new bugs, I accidentally removed data in production, and I am regularly wrong in my PR comments. Yet I wasn’t fired, demoted, or lost any trust from the community. Everybody makes mistakes, it’s par for the course. Even if FESCo made a mistake (I am not in the position to judge whether they did or not), it would not overshadow the majority of decisions they made right. They didn’t lose any of my trust.

As for the policies governing Proven Packagers, one incident in a decade does not necessarily imply that new rules are needed. It’s possible to just make a gentlemen’s agreement, shake hands, and move on.

That being said, I wanted to propose the same thing as Alexandra Fedorova. Proven Packagers are valuable in emergencies, and I think, it is a bad idea to disband them. But requiring +1 from at least one other person before pushing changes, makes sense to me. Alexandra proposed +1 from at least one other Proven Packager, but I would broaden the eligible reviewers to also include Packager Sponsors and FESCo members. I would also suggest requiring the name of the reviewer to be clearly mentioned in the commit description.


Don’t be sad if you missed the conference. There are recordings.

DevOps Newsletters

Posted by Chris Short on 2025-06-08 04:00:00 UTC
Continuous learning is a critical part of DevOps. Staying current is imperative. These are DevOps newsletters of note from several well regarded DevOps leaders.

DevOps README

Posted by Chris Short on 2025-06-08 04:00:00 UTC
What books 📚 to read to learn more about DevOps

Kubernetes News

Posted by Chris Short on 2025-06-08 04:00:00 UTC
Newsletters and resources to keep up with Kubernetes and Cloud Native news

Kubernetes README

Posted by Chris Short on 2025-06-08 04:00:00 UTC
What books 📚 to read to learn more about Kubernetes

show your desk - 2025 edition

Posted by Evgeni Golov on 2025-06-07 15:17:47 UTC

Back in 2020 I posted about my desk setup at home.

Recently someone in our #remotees channel at work asked about WFH setups and given quite a few things changed in mine, I thought it's time to post an update.

But first, a picture! standing desk with a monitor, laptop etc (Yes, it's cleaner than usual, how could you tell?!)

desk

It's still the same Flexispot E5B, no change here. After 7 years (I bought mine in 2018) it still works fine. If I'd have to buy a new one, I'd probably get a four-legged one for more stability (they got quite affordable now), but there is no immediate need for that.

chair

It's still the IKEA Volmar. Again, no complaints here.

hardware

Now here we finally have some updates!

laptop

A Lenovo ThinkPad X1 Carbon Gen 12, Intel Core Ultra 7 165U, 32GB RAM, running Fedora (42 at the moment).

It's connected to a Lenovo ThinkPad Thunderbolt 4 Dock. It just works™.

workstation

It's still the P410, but mostly unused these days.

monitor

An AOC U2790PQU 27" 4K. I'm running it at 150% scaling, which works quite decently these days (no comparison to when I got it).

speakers

As the new monitor didn't want to take the old Dell soundbar, I have upgraded to a pair of Alesis M1Active 330 USB.

They sound good and were not too expensive.

I had to fix the volume control after some time though.

webcam

It's still the Logitech C920 Pro.

microphone

The built in mic of the C920 is really fine, but to do conference-grade talks (and some podcasts 😅), I decided to get something better.

I got a FIFINE K669B, with a nice arm.

It's not a Shure, for sure, but does the job well and Christian was quite satisfied with the results when we recorded the Debian and Foreman specials of Focus on Linux.

keyboard

It's still the ThinkPad Compact USB Keyboard with TrackPoint.

I had to print a few fixes and replacement parts for it, but otherwise it's doing great.

Seems Lenovo stopped making those, so I really shouldn't break it any further.

mouse

Logitech MX Master 3S. The surface of the old MX Master 2 got very sticky at some point and it had to be replaced.

other

notepad

I'm still terrible at remembering things, so I still write them down in an A5 notepad.

whiteboard

I've also added a (small) whiteboard on the wall right of the desk, mostly used for long term todo lists.

coaster

Turns out Xeon-based coasters are super stable, so it lives on!

yubikey

Yepp, still a thing. Still USB-A because... reasons.

headphones

Still the Bose QC25, by now on the third set of ear cushions, but otherwise working great and the odd 15€ cushion replacement does not justify buying anything newer (which would have the same problem after some time, I guess).

I did add a cheap (~10€) Bluetooth-to-Headphonejack dongle, so I can use them with my phone too (shakes fist at modern phones).

And I do use the headphones more in meetings, as the Alesis speakers fill the room more with sound and thus sometimes produce a bit of an echo.

charger

The Bose need AAA batteries, and so do some other gadgets in the house, so there is a technoline BC 700 charger for AA and AAA on my desk these days.

light

Yepp, I've added an IKEA Tertial and an ALDI "face" light. No, I don't use them much.

KVM switch

I've "built" a KVM switch out of an USB switch, but given I don't use the workstation that often these days, the switch is also mostly unused.

⚙️ PHP version 8.3.21 and 8.4.7

Posted by Remi Collet on 2025-05-09 05:24:00 UTC

RPMs of PHP version 8.4.7 are available in the remi-modular repository for Fedora ≥ 40 and Enterprise Linux ≥ 8 (RHEL, Alma, CentOS, Rocky...).

RPMs of PHP version 8.3.21 are available in the remi-modular repository for Fedora ≥ 40 and Enterprise Linux ≥ 8 (RHEL, Alma, CentOS, Rocky...).

ℹ️ The packages are available for x86_64 and aarch64.

ℹ️ There is no security fix this month, so no update for version 8.1.32 and 8.2.28.

⚠️ PHP version 8.0 has reached its end of life and is no longer maintained by the PHP project.

These versions are also available as Software Collections in the remi-safe repository.

Version announcements:

ℹ️ Installation: use the Configuration Wizard and choose your version and installation mode.

Replacement of default PHP by version 8.4 installation (simplest):

dnf module switch-to php:remi-8.4/common

Parallel installation of version 8.4 as Software Collection

yum install php84

Replacement of default PHP by version 8.3 installation (simplest):

dnf module switch-to php:remi-8.3/common

Parallel installation of version 8.3 as Software Collection

yum install php83

And soon in the official updates:

⚠️ To be noticed :

  • EL-10 RPMs are built using RHEL-10.0-beta
  • EL-9 RPMs are built using RHEL-9.5
  • EL-8 RPMs are built using RHEL-8.10
  • intl extension now uses libicu74 (version 74.2)
  • mbstring extension (EL builds) now uses oniguruma5php (version 6.9.10, instead of the outdated system library)
  • oci8 extension now uses the RPM of Oracle Instant Client version 23.7 on x86_64 and aarch64
  • a lot of extensions are also available; see the PHP extensions RPM status (from PECL and other sources) page

ℹ️ Information:

Base packages (php)

Software Collections (php83 / php84)

⚙️ PHP version 8.3.22 and 8.4.8

Posted by Remi Collet on 2025-06-06 05:14:00 UTC

RPMs of PHP version 8.4.8 are available in the remi-modular repository for Fedora ≥ 40 and Enterprise Linux ≥ 8 (RHEL, Alma, CentOS, Rocky...).

RPMs of PHP version 8.3.22 are available in the remi-modular repository for Fedora ≥ 40 and Enterprise Linux ≥ 8 (RHEL, Alma, CentOS, Rocky...).

ℹ️ The packages are available for x86_64 and aarch64.

ℹ️ There is no security fix this month, so no update for version 8.1.32 and 8.2.28.

⚠️ PHP version 8.0 has reached its end of life and is no longer maintained by the PHP project.

These versions are also available as Software Collections in the remi-safe repository.

Version announcements:

ℹ️ Installation: use the Configuration Wizard and choose your version and installation mode.

Replacement of default PHP by version 8.4 installation (simplest):

dnf module switch-to php:remi-8.4/common

Parallel installation of version 8.4 as Software Collection

yum install php84

Replacement of default PHP by version 8.3 installation (simplest):

dnf module switch-to php:remi-8.3/common

Parallel installation of version 8.3 as Software Collection

yum install php83

And soon in the official updates:

⚠️ To be noticed :

  • EL-10 RPMs are built using RHEL-10.0
  • EL-9 RPMs are built using RHEL-9.5 (next builds will use 9.6)
  • EL-8 RPMs are built using RHEL-8.10
  • intl extension now uses libicu74 (version 74.2)
  • mbstring extension (EL builds) now uses oniguruma5php (version 6.9.10, instead of the outdated system library)
  • oci8 extension now uses the RPM of Oracle Instant Client version 23.7 on x86_64 and aarch64
  • a lot of extensions are also available; see the PHP extensions RPM status (from PECL and other sources) page

ℹ️ Information:

Base packages (php)

Software Collections (php83 / php84)

SeedboxSync: Synchronise automatiquement ta seedbox avec ton NAS

Posted by Guillaume Kulakowski on 2025-06-05 11:26:07 UTC

Si tu utilises une seedbox pour tes téléchargements torrents, tu sais à quel point ça peut être pénible de devoir transférer les fichiers manuellement vers ton NAS. C’est exactement pour ça que j’ai créé SeedboxSync : un outil simple et léger qui automatise cette étape. SeedboxSync se connecte à ta seedbox via SFTP, et copie […]

Cet article SeedboxSync: Synchronise automatiquement ta seedbox avec ton NAS est apparu en premier sur Guillaume Kulakowski's blog.

Contribute at the Fedora Linux Test Week for Kernel 6.15

Posted by Fedora Magazine on 2025-06-05 08:00:00 UTC

The kernel team is working on final integration for Linux kernel 6.15. This version was just recently released, and will arrive soon in Fedora Linux. As a result, the Fedora Linux kernel and QA teams have organized a test week from Sunday, June 08, 2025 to Sunday, June 15, 2025. The wiki page in this article contains links to the test images you’ll need to participate. Please continue reading for details.

How does a test week work?

A test week is an event where anyone can help ensure changes in Fedora Linux work well in an upcoming release. Fedora community members often participate, and the public is welcome at these events. If you’ve never contributed before, this is a perfect way to get started.

To contribute, you only need to be able to do the following things:

  • Download test materials, which include some large files
  • Read and follow directions step by step

The wiki page for the kernel test week has a lot of good information on what and how to test. After you’ve done some testing, you can log your results in the test week web application. If you’re available on or around the days of the event, please do some testing and report your results. We have a document which provides all the necessary steps.

Happy testing, and we hope to see you on one of the test days.

OpenSSL legacy and JDK 21

Posted by Kushal Das on 2025-06-04 14:06:07 UTC

openssl logo

While updating the Edusign validator to a newer version, I had to build the image with JDK 21 (which is there in Debian Sid). And while the application starts, it fails to read the TLS keystore file with a specific error:

... 13 common frames omitted
Caused by: java.lang.IllegalStateException: Could not load store from '/tmp/demo.edusign.sunet.se.p12'
at org.springframework.boot.ssl.jks.JksSslStoreBundle.loadKeyStore(JksSslStoreBundle.java:140) ~[spring-boot-3.4.4.jar!/:3.4.4]
at org.springframework.boot.ssl.jks.JksSslStoreBundle.createKeyStore(JksSslStoreBundle.java:107) ~[spring-boot-3.4.4.jar!/:3.4.4]
... 25 common frames omitted
Caused by: java.io.IOException: keystore password was incorrect
at java.base/sun.security.pkcs12.PKCS12KeyStore.engineLoad(PKCS12KeyStore.java:2097) ~[na:na]
at java.base/sun.security.util.KeyStoreDelegator.engineLoad(KeyStoreDelegator.java:228) ~[na:na]
at java.base/java.security.KeyStore.load(KeyStore.java:1500) ~[na:na]
at org.springframework.boot.ssl.jks.JksSslStoreBundle.loadKeyStore(JksSslStoreBundle.java:136) ~[spring-boot-3.4.4.jar!/:3.4.4]
... 26 common frames omitted
Caused by: java.security.UnrecoverableKeyException: failed to decrypt safe contents entry: javax.crypto.BadPaddingException: Given final block not properly padded. Such issues can arise if a bad key is used during decryption.
... 30 common frames omitted

I understood that somehow it is not being able to read file due to bad passphrase. But, the same file with same passphrase can be opened by the older version of the application (in the older containers).

After spending too many hours reading, I finally found the trouble. The openssl was using too new algorithm. By default it will use AES_256_CBC for encryption and PBKDF2 for key derivation. But, if we pass -legacy to the openssl pkcs12 -export command, then it using RC2_CBC or 3DES_CBC for certificate encryption depening if RC2 cipher is enabled.

This finally solved the issue and the container started cleanly.

Strategy 2028 Update

Posted by Fedora Community Blog on 2025-06-04 12:07:01 UTC

As we head into Flock, It’s time again to talk about #strategy2028 — our high-level plan for the next few years.

Since it’s been a while since I’ve given an update, I’m going to start at the top. That way, If this is new to you, or if you’ve forgotten all about it, you don’t need to go sifting through history for a refresher. If you’ve been following along for a while, you may want to skip down to the “Process section”, or if you just want to get to the practical stuff, all the way down to “Right Now”.

The Strategic Framework and High Level Stuff

Fedora’s Goals

Vision

The ultimate goal of the Fedora Project is expressed in our Vision Statement:

The Fedora Project envisions a world where everyone benefits from free and open source software built by inclusive, welcoming, and open-minded communities.

Mission

Our Mission Statement describes how we do that — we make a software platform that people can use to build tailored solutions. That includes offerings from our own community (like the Fedora Editions or Atomic Desktops) and those from our “downstreams” (like RHEL, Amazon Linux, Bazzite, and many more).

Strategy 2028

We also have a medium-term goal — the target of Strategy 2028. We have a “guiding star” metric for this:

Guiding Star

By the end of 2028, double the number of contributors1 active every week.

But this isn’t really the goal. It’s a “proximate measure” — something simple we can count and look at to tell if we’re on track.2

The Goal of Strategy 2028

The goal itself this:

The Fedora Project is healthy, growing, relevant, and ready to take on the next quarter-century.

But, goals aren’t strategy — they describe the world we want, and Fedora’s overall work, but not the path we’ll take to get there.

The Actual Strategy

During our Council Hackfest session, I realized that we haven’t really put this into writing — instead, we’ve jumped straight to other levels of the process. So, here it is:

1. Identify areas of community interest and effort which we believe will advance Fedora towards our goal.

The computing world changes quickly, and Fedora is a community-driven project. We can’t pick things out of thin air or wishful thinking. We also need to pick things that really, actually, practically will make a difference, and that’s a hard call. Making these calls is the fundamental job of the Fedora Council.3

2. Invest in those areas.

A strategy needs to have focus to be meaningful. The Council will devote time, energy, publicity, and community funding towards the selected areas. This necessarily means that other things won’t get the same investment. At least, not right now.

3. Check if the things we picked are working.

The “guiding star” metric is one way, of course, but we’ll need specific metrics, too. At the meeting, we agreed that we have been lazy on this in the past. It’s hard work, and when something isn’t working, can lead to hard conversations. We need to do better — keep reading for how we plan to do that.

4. When things are working, double down. When things aren’t, stop, change, or switch direction.

If we’re on the right track in one area, we should consider what we can do next to build on that. When something isn’t working, we need to take decisive action. That might be re-scoping an initiative, relaunching in the same area but with a different approach, or simply wrapping up. What we won’t do is let things linger on uncertainly.

5. Rinse, repeat!

Some of what we choose will be smaller bites, and some will be more ambitious. That means we expect to be choosing new initiatives several times a year.

The Process

Practically speaking, for each area we choose, we’ll launch a new Community Initiative. We know these haven’t always been a smashing success in Fedora, but the general concept is sound. We’re going to do a few things differently, driven by our Fedora Operations Architect. (Thanks, @amoloney.)

Better Community Initiatives

First, we will require better initial proposals. We need to see concrete milestones with dates and deliverables. There needs to be a specific plan of action — for example, if the Initiative intends to progress its technical work through a series of Changes, the plan should include a list of expected proposals with a brief description for each.4

Second, we will hold initiatives accountable. Each Initiative Lead should produce a monthly or weekly status report, and we will actively review each initiative every quarter.

Third, we will create “playbooks” for the roles of Initiative Lead and Executive Sponsor.
The Lead is responsible for the work, and the Sponsor is accountable for its success. We’re working on written guidance and onboarding material so that when we start an Initiative, the people involved at the Council level know what they actually need to do.

Finally, we will provide better support. We’ll help develop the Initiative’s Logic Model rather than requiring it as part of the submission. We will be better at broadcasting the leadership of each Initiative, so community members (and the leaders themselves!) know that they’re empowered to do the work. We’ll make sure Initiatives are promoted at Fedora events, and in other ways throughout the year. We will prioritize Initiatives for in-person Hackfests and other funding. And, we will will provide some program management support.5

Previously on Strategy 2028…

Our Themes

We started all of this a few years ago by asking for community input. Then, we grouped ideas we heard into Themes. These will be stable until the end of 2028 (when it’ll be time to do this whole thing over again). Under each theme, we have several Focus Areas. In bold, areas where we have a recently completed project, or something big in progress already. (See the footnotes.)

Accessibility

  • Make our docs more accessible (“Learn”)
  • Make our software more accessible (“Use”)
  • Make project tooling more accessible (“Build!”)

Community Sustainability

  • Mentorship6
  • Tools for Communication & Collaboration7

Edition, Spins, Interests, and Outputs

  • Release Stories for Marketing
  • Easier Remixes8
  • Refactor SIGs

Reaching the World

  • Preinstalled Systems9
  • Cloud & CI Providers
  • Local Communities

Technical Innovation

  • Containers and Flatpaks
  • Atomic Desktops and Image Mode10
  • Programming Language Ecosystems
  • AI

Ecosystem Connections

  • RHEL & CentOS11
  • Other Downstreams
  • Peer Distros and Upstreams

What’s Next? (Time to get tactical!)

Right now

We spent the bulk of our time getting more specific about our immediate future. Under each theme, Council members identified potential Initiatives that we believe are important to work on next. We came up with a list of thirteen — which is way more than we can handle at once. We previously set a limit of four Initiatives at a time. We decided to keep to that rule, and are planning to launch four initiatives in the next months:

1. Editions block on a11y

Accessibility

This one is simple. We have release criteria for accessibility issues in Fedora Editions… but we don’t block on them. Sumantro will lead an effort to get all of our Editions in shape so that we can make these tests “must-past” for release.

2. GitOps Experiment

Communications/Collaboration Tools

This is Aleksandra’s project to demostrate how we could use a “GitOps” workflow to improve the packager experience from beginning to end. Matthew is the Executive Sponsor (for now!) Read more about this here: [RFC] New Community Initiative – GitOps for Fedora Packaging.

3. Gitforge Migration

Communications/Collaboration Tools

We’re moving to Forgejo. That’s going to be a long project with a lot to keep track of. Aoife is sponsoring the effort overall and will work with others on specific initiatives.

4. AI Devtools Out-of-Box

Tech Innovation

This is about making sure Fedora Linux is ready for people who want to work on machine learning and AI development. It isn’t about adding any specific AI or LLM technology. David is taking the lead here, with details in the works.

Next up

We can only focus on so much at once, but as current and near-future initiatives wrap up, these are the things we expect to tackle next, and an associated Council member. (That person may be either an Initiative Lead or an Executive Sponsor when the time comes.)

  • Bugzilla Archive (David)
    Red Hat is winding down bugzilla.redhat.com. There’s no planned shutoff date, but we should be ready. We are likely to move most issue tracking to Forgejo — it’d be nice to have packaging issues right next to pull requests. But, the current bugzilla database is a treasure-trove of Fedora history which we don’t want to lose
  • Discussions to Discourse (Matthew, for now)
    This is part of our overall effort to reduce Fedora’s collaboration sprawl — and to set us up for the future. It’s time to move our primary discussion centers from the devel and test mailing lists.
  • Get our containers story straight (Jason)
    The previous system we used to build containers was called “OSBS”, and was a hot mess of a hacked-up OpenShift, and not even the current kind of OpenShift. I know people are pretty skeptical about Konflux as a Koji replacement … but it can build containers in a better way.
  • Formal, repeatable plan for release marketing (Justin)
    We have a great Marketing team, but don’t do a great job of getting feature and focus information from Edition working groups to that team. We should build a better process.
  • More Fedora Ready (Matthew/Jef)
    Fedora Ready is a branding initiative for hardware vendors who want to signal that their product works well with our OS. Let’s expand this — and bring on more vendors with preinstalled Fedora Linux.
  • Mindshare funding for regional Ambassador planning events (Jona)
    This is the first step towards rebuilding our worldwide local community Ambassadors.
  • Silverblue & Kinoite are ready to be our desktop Editions, with bootc (Jason)
    We think image-based operating systems are the future — let’s commit.
  • CoreOS, IoT, and Atomic Desktops share one base image (Jason)
    Right now, we’ve got too many base images — can we get it down to one?
  • Fedora, CentOS, RHEL conversation (Matthew/Jef)
    See What everyone wants for more on this one.

See you all at Flock!

So, that’s where we are now, and our near-future plans. After Flock, look forward to more updates from Jef!

  1. For this purpose, we are using a broad definition of contributor. That is: A Fedora Project contributor is anyone who: 1) Undertakes activities 2) which sustain or advance the project towards our mission and vision 3) intentionally as part of the Project, (4) and as part of our community in line with our shared values. A contribution is any product of such activities. So, active contributors for a week is the count of people who have made at least one contribution during that time. ↩
  2. Um, yeah, I know that we don’t have a public dashboard with our estimate of this number yet. That’s because when we started, we quickly realized we need data scientist help — we need to make sure we’re measuring meaningfully. ↩
  3. The Fedora Council has two elected positions, representatives from Mindshare and FESCo, and Leads for each Community Initiative. If you care about where we are going as a project, you could be the person in one of those seats! ↩
  4. Of course, this plan can evolve, but any major changes should be brought back to the Council. ↩
  5. “Nagging”, says Aoife. ↩
  6. Mentored Projects 2024 ↩
  7. Forgejo migration, and my continuing Quixotic-yet-serious drive to move away from mailing lists ↩
  8. Fedora bootc ↩
  9. Fedora Ready. Special thanks to @joseph and @roseline-bassey ↩
  10. Fedora bootc, again ↩
  11. this ↩

The post Strategy 2028 Update appeared first on Fedora Community Blog.

The right tool is the one people can use

Posted by Ben Cotton on 2025-06-04 08:00:00 UTC

There’s a tendency in open source projects — and the tech sector more broadly — to focus on using (or building) the exactly-right tool for the job. Sometimes that’s truly important. Many times, though, the wrong tool can do an okay-enough job. If a tool is a means to an end (and it is!), then the right tool is the one that gets the job done. Even if it wasn’t intended for that purpose.

When I was early in my career, I spent a lot of time helping graduate students print posters for conferences that they had designed in PowerPoint. This often went poorly. Layouts that looked fine on screen would have subtle errors when printed. This waste of time and supplies was annoying, but how much time would have been spent teaching all of them to use another tool (that the department would likely have had to pay for) so they could print one or two posters a year?

As I’ve matured, I’ve come to appreciate the fact that people use the “wrong” tool not out of malice — or even ignorance — but because it’s good enough to do the job at hand. The difference between a tool that’s “good enough” and a tool that’s “perfect” often requires far more effort than can be justified.

In general, if existing software does a “good enough” job, you shouldn’t write or procure more. You add complexity and/or maintenance burden for little return. I wrote this in 2021 and my opinion hasn’t changed. Wait until you know that the existing tool is unworkable (not just imperfect) before trying to “solve” it. And this means, to the greatest extent you can, you should let your contributors and users work with whatever tool makes most sense to them.

This post’s featured photo by Ben Cotton.

The post The right tool is the one people can use appeared first on Duck Alignment Academy.

🎲 PHP version 8.3.22RC1 and 8.4.8RC1

Posted by Remi Collet on 2025-05-23 04:26:00 UTC

Release Candidate versions are available in the testing repository for Fedora and Enterprise Linux (RHEL / CentOS / Alma / Rocky and other clones) to allow more people to test them. They are available as Software Collections, for parallel installation, the perfect solution for such tests, and as base packages.

RPMs of PHP version 8.4.8RC1 are available

  • as base packages in the remi-modular-test for Fedora 40-42 and Enterprise Linux ≥ 8
  • as SCL in remi-test repository

RPMs of PHP version 8.3.22RC1 are available

  • as base packages in the remi-modular-test for Fedora 40-42 and Enterprise Linux ≥ 8
  • as SCL in remi-test repository

ℹ️ The packages are available for x86_64 and aarch64.

ℹ️ PHP version 8.2 is now in security mode only, so no more RC will be released.

ℹ️ Installation: follow the wizard instructions.

ℹ️ Announcements:

Parallel installation of version 8.4 as Software Collection:

yum --enablerepo=remi-test install php84

Parallel installation of version 8.3 as Software Collection:

yum --enablerepo=remi-test install php83

Update of system version 8.4:

dnf module switch-to php:remi-8.4
dnf --enablerepo=remi-modular-test update php\*

Update of system version 8.3:

dnf module switch-to php:remi-8.3
dnf --enablerepo=remi-modular-test update php\*

ℹ️ Notice:

  • version 8.4.8RC1 is in Fedora rawhide for QA
  • EL-10 packages are built using RHEL-10.0 and EPEL-10.0
  • EL-9 packages are built using RHEL-9.5
  • EL-8 packages are built using RHEL-8.10
  • oci8 extension uses the RPM of the Oracle Instant Client version 23.7 on x86_64 and aarch64
  • intl extension uses libicu 74.2
  • RC version is usually the same as the final version (no change accepted after RC, exception for security fix).
  • versions 8.3.22 and 8.4.8 are planed for June 6th, in 2 weeks.

Software Collections (php83, php84)

Base packages (php)

F42 Elections Results

Posted by Fedora Community Blog on 2025-06-03 20:17:54 UTC

The Fedora Linux 42 election results are in! After one of our most hotly contested elections recently, we can now share the results. Thank you to all of our candidates, and congratulations to our newly elected members of Fedora Council, Fedora Mindshare, FESCo and EPEL Steering Committee.

Results

Council

Two Council seats were open this election. More detailed information on voting breakdown available from the Elections app in the ‘results’ tab.

# votesCandidate
1089Miro Hrončok
906Aleksandra Fedorova
593Akashdeep Dhar
586Jared Smith
554Shaun McCance
490Fernando F. Mancera
447Eduard Lucena

FESCo

Four FESCo seats were open this election. More detailed information on voting breakdown available from the Elections app in the ‘results’ tab.

# votesCandidate
1036Neal Gompa
995Stephen Gallagher
868Fabio Valentini
835Michel Lind
625Debarshi Ray
607Jeremy Cline
559Tim Flink

Mindshare Committee

Four Mindshare Committee seats were open this election. More detailed information on voting breakdown available from the Elections app in the ‘results’ tab.

# votesCandidate
774Emma Kidney
750Sumantro Mukherjee
702Akashdeep Dhar
670Luis Bazan
623Samyak Jain
587Shaun McCance
529Greg Sutcliffe
500Eduard Lucena

EPEL Steering Committee

As we had the same number of open seats as we had candidates, the following candidates are elected to the EPEL Steering Committee by default:

  • Davide Cavalca
  • Robbie Callicotte
  • Neal Gompa

Once again thank you to all of our candidates this election. The caliber was truly amazing! Also thank you to all of our voters, and finally – congratulations to our newly elected representatives!

The post F42 Elections Results appeared first on Fedora Community Blog.

Deprecating Java-based drivers from syslog-ng: Is HDFS next?

Posted by Peter Czanik on 2025-06-03 10:43:02 UTC

While most Java-based drivers have been deprecated in syslog-ng years ago, we have recently removed all of them in preparation to syslog-ng 4.9.0. Right now, the only Java-based driver remaining is HDFS, so we want to ask the syslog-ng community if the HDFS destination is still needed for them.

Read more at https://www.syslog-ng.com/community/b/blog/posts/deprecating-java-based-drivers-from-syslog-ng-is-hdfs-next

syslog-ng logo

Fedora 43 Wallpaper Under Way

Posted by Fedora Community Blog on 2025-06-03 10:00:00 UTC

We are currently working on the Fedora 43 Wallpaper and wanted to update the community while also looking for contributors!

Each wallpaper is inspired by someone in STEM in history with the letter in the alphabet we’re on. We are currently on the letter R, and voted here with the winner resulting in Sally Ride.

Who is Sally Ride?

Sally Ride (May 26, 1951 – July 23, 2012) was a physicist and astronaut, who became the first American woman in space on June 18, 1983. The third woman ever!

Once her training at Nasa was finished, she served as the ground-based CapCom for the second and third Space Shuttle flights. She helped develop the Space Shuttle’s robotic arm which helped her get a spot on the STS-7 mission in June 1983. Two communication satellites were deployed, including the first Shuttle pallet satellite (SPAS-1). Ride operated the robotic arm to deploy and retrieve SPAS-1, which carried ten experiments to study the formation of metal alloys in microgravity. 

Ride then became the president and CEO of ‘Sally Ride Science’. Sally Ride Science created entertaining science programs and publications for upper elementary and middle school students, focusing largely on female students.

Ride and her life long partner O’Shaughnessy co-wrote six books on space aimed at children, to encourage children to study science. Ride remarked, “Everywhere I go I meet girls and boys who want to be astronauts and explore space, or they love the ocean and want to be oceanographers, or they love animals and want to be zoologists, or they love designing things and want to be engineers. I want to see those same stars in their eyes in 10 years and know they are on their way.” It was after her death it was revealed she was the first LGBT astronaut in space.

Brainstorming

The design team held a separate meeting from our usual time to dedicate an hour of time to gathering visuals that were related somehow to Ride’s work. From visuals of space that were used in the books she created,

Possible Themes to Develop:

  1. Space Mid Century Modern Graphics
    • This is probably my personal preference! Mid century modern is categorized with clean lines, bold saturated colors, and organic forms in nature. It was most popular from the late 1940s-1960s, extending to when the space race first started to lay its roots.
    • Going down this route would result in a colorful wallpaper, although not overwhelming since it would be limited to a small color palette. The idea was sparked by Ride’s dedication to education and teaching- as these types of graphics would often pop up in schools as informative posters.
  2. Blueprint of Space
    • A dark background with planets and white details to show information just like a blueprint would. Also sparked by the type of graphics you would find in a school. The only problem that might arise is too much detail. Wallpapers on the whole are supposed to be quite simple so the user can have a calm experience. Too many details that might make it look like a blueprint, might make it too busy. However I’m sure there could be a balance of both.
  3. Colorful Space
    • We have several space themed wallpapers that show the stars or planets, so this would be a nod to them (see F33,F24, F10, F9) as well as a nod to the most well known part of Ride’s career. Including some of the colors from Fedora’s color palette, like Freedom Purple, Friends Magenta, Features Orange, and First Green, into the galaxy or planetary visuals would be a great option. But not too bright and electric that it irritates the viewer when they look at it.

The link to the ticket is here. If you want to help develop the wallpaper or any other design tickets, join us at 14:30 UTC Monday in #fedora-design on Matrix or at the meeting room on jitsi.

The post Fedora 43 Wallpaper Under Way appeared first on Fedora Community Blog.