Re: [ovirt-devel] qemu packaging - add the "qemu" user to a "gluster" group?

----_com.ninefolders.hd3.email_963684395295557_alt Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: base64 CitDb2xlIGZvciBGZWRvcmEvdmlydAorSmVmZiBmb3IgZm9yIHFlbXUgdXBzdHJlYW0KCgpfX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fXwpGcm9tOiBTYW5kcm8gQm9uYXp6b2xhClNlbnQ6 IEFwciAyOCwgMjAxNyA1OjA4IEFNClRvOiBOaWVscyBkZSBWb3M7IE1pcm9zbGF2IFJlemFuaW5h OyBLYXJlbiBOb2VsOyBEb3JvbiBGZWRpdWNrCkNjOiBkZXZlbApTdWJqZWN0OiBSZTogcWVtdSBw YWNrYWdpbmcgLSBhZGQgdGhlICJxZW11IiB1c2VyIHRvIGEgImdsdXN0ZXIiIGdyb3VwPwoKPgo+ Cj4gT24gV2VkLCBBcHIgMjYsIDIwMTcgYXQgMzozNiBQTSwgTmllbHMgZGUgVm9zIDxuZGV2b3NA cmVkaGF0LmNvbT4gd3JvdGU6Cj4+Cj4+IEhpLAo+Pgo+PiBXZSdyZSB0cnlpbmcgdG8gaW1wcm92 ZSB0aGUgZGVidWdhYmlsaXR5IG9mIEdsdXN0ZXIgYmFja2VkIFZNcyBhbmQgb25lCj4+IG9mIHRo ZSBmZWF0dXJlcyBmb3IgdGhpcyBpcyB0byBiZSBhYmxlIHRvIGdhdGhlciAic3RhdGVkdW1wcyIu IFRoZXNlCj4+IHN0YXRlZHVtcHMgaW5jbHVkZSBtZW1vcnkgYWxsb2NhdGlvbiBkZXRhaWxzIGFu ZCBvdGhlciBpbmZvcm1hdGlvbiBhYm91dAo+PiB0aGUgR2x1c3RlciBjbGllbnQuIFFFTVUgaXMg b25lIG9mIHRoZSBhcHBsaWNhdGlvbnMgdGhhdCBjYW4gYmUKPj4gY29uZmlndXJlZCB0byB1c2Ug bGliZ2ZhcGkuc28gR2x1c3RlciBjbGllbnQuCj4+Cj4+IEdsdXN0ZXIgcHJvdmlkZXMgdGhlIC92 YXIvcnVuL2dsdXN0ZXIvIGRpcmVjdG9yeSBhbmQgdGhlIGxpYmdmYXBpLnNvCj4+IGxpYnJhcnkg dGhhdCBxZW11IChpbiBibG9jay9nbHVzdGVyLmMpIHVzZXMgdGhhdC4gV291bGQgdGhlcmUgYmUg YQo+PiBwcm9ibGVtIGZvciB0aGUgInFlbXUiIHBhY2thZ2VzIHRvIHVzZSBhZGQgdGhlICJxZW11 IiB1c2VyIHRvIGEKPj4gImdsdXN0ZXIiIGdyb3VwPyBJJ20gbm90IHN1cmUgeWV0IGhvdyB0aGlz IGlzIGRvbmUgZm9yIG90aGVyIHBhY2thZ2VzCj4+IHdpdGggdGhlaXIgb3duIHVzZXJzLCBidXQg dGhlcmUgd291bGQgYmUgYSBkZXBlbmRlbnQgaW5zdGFsbGF0aW9uIG9yZGVyCj4+IG9mIHNvbWUg a2luZCAobmVlZHMgcnBtIHRyaWdnZXJzPykuCj4+Cj4+IFdoYXQgaXMgeW91ciBvcGluaW9uIG9u IHRoaXMgaXNzdWUsIG9yIHdvdWxkIHlvdSByZWNvbW1lbmQgYW4gb3RoZXIKPj4gYXBwcm9hY2g/ Cj4KPgo+IEFkZGluZyBNaXJvc2xhdiwgS2FyZW4gYW5kIERvcm9uLgo+IEknbSBub3Qgc3VyZSBh Ym91dCBob3cgbGliZ2ZhcGkgaXMgY29uc3VtZWQgYnkgcWVtdS1rdm0oLWV2Ly1yaGV2KSBidXQg aWYgaXRzIHN1cHBvcnQgaXMgZW5hYmxlIGJ5IGRlZmF1bHQgYW5kIGRvZXNuJ3QgcmVxdWlyZSBh ZGRpdGlvbmFsIHFlbXUta3ZtIHN1YiBwYWNrYWdlcyB0byBiZSBlbmFibGVkLCBJIHdvdWxkIHN1 Z2dlc3QgdG8ganVzdCBmb2xsb3fCoGh0dHBzOi8vZmVkb3JhcHJvamVjdC5vcmcvd2lraS9QYWNr YWdpbmc6VXNlcnNBbmRHcm91cHMKPiBhbmQgYWRkIHRoZSBxZW11IHVzZXIgdG8gdGhlIGdsdXN0 ZXIgZ3JvdXAgaW4gJXByZS4KPgo+IEZyb20gb1ZpcnQgcG9pbnQgb2YgdmlldywgSSB0aGluayBp dCBzaG91bGRuJ3QgYWZmZWN0IHVzIHZlcnkgbXVjaC4gT24gQ2VudE9TIFZpcnQgU0lHIHdlJ2xs IGNvbnN1bWUgd2hhdGV2ZXIgd2lsbCBjb21lIGZyb20gcWVtdS1rdm0tcmhldi4KPgo+IMKgCj4+ Cj4+Cj4+IFRoYW5rcywKPj4gTmllbHMKPj4KPj4gUFM6IGh0dHBzOi8vYnVnemlsbGEucmVkaGF0 LmNvbS8xNDQ1NTY5IGNhbiBiZSB1c2VkIHRvIHJlcGx5IGFzIHdlbGwKPj4KPj4KPj4gRnJvbSBo dHRwOi8vbGlzdHMuZ2x1c3Rlci5vcmcvcGlwZXJtYWlsL2dsdXN0ZXItZGV2ZWwvMjAxNy1BcHJp bC8wNTI2MjkuaHRtbDoKPj4gT24gVHVlLCBBcHIgMjUsIDIwMTcgYXQgMDc6NTM6MDZQTSArMDIw MCwgTmllbHMgZGUgVm9zIHdyb3RlOgo+PiA+IEhpLAo+PiA+Cj4+ID4gUmVjZW50bHkgYSBuZXcg YWJpbGl0eSB0byB0cmlnZ2VyIHN0YXRlZHVtcHMgdGhyb3VnaCB0aGUgR2x1c3Rlci1DTEkgWzBd Cj4+ID4gaGFzIGJlZW4gYWRkZWQuIFRoaXMgbWFrZXMgaXQgcG9zc2libGUgdG8gZ2V0IHN0YXRl ZHVtcCBmcm9tCj4+ID4gYXBwbGljYXRpb25zIHRoYXQgdXNlIGdmYXBpLiBCeSBkZWZhdWx0LCBz dGF0ZWR1bXBzIGFyZSBzYXZlZCB1bmRlcgo+PiA+IC92YXIvcnVuL2dsdXN0ZXIvLi4uIGFuZCB0 aGlzIGRpcmVjdG9yeSBpcyBvbmx5IHdyaXRhYmxlIGJ5IHJvb3QuCj4+ID4gQXBwbGljYXRpb25z IHRoYXQgdXNlIGdmYXBpIGRvIG5vdCByZXF1aXJlIHJvb3QgcGVybWlzc2lvbnMgKGxpa2UgUUVN VSksCj4+ID4gYW5kIHRoZXJlZm9yZSBmYWlsIHRvIHdyaXRlIHRoZSBzdGF0ZWR1bXAgOi0vCj4+ ID4KPj4gPiBPbmUgYXBwcm9hY2ggd291bGQgYmUgdG8gY3JlYXRlIGEgImdsdXN0ZXIiIGdyb3Vw IGFuZCBnaXZlIHRoZSBncm91cAo+PiA+IHBlcm1pc3Npb25zIHRvIHdyaXRlIHRvIC92YXIvcnVu L2dsdXN0ZXIvLi4uIE90aGVyICdmaXhlcycgaW5jbHVkZQo+PiA+IHNldHRpbmcgQUNMcyBvbiB0 aGUgZGlyZWN0b3J5IHNvIHRoYXQgc3BlY2lmaWVkIHVzZXJzIGNhbiB3cml0ZSB0aGVyZS4KPj4g PiBiZWNhdXNlIG1hbnkgZGFlbW9ucyBoYXZlIGEgImhvbWUgZGlyZWN0b3J5IiB0aGF0IGRvZXMg bm90IGV4aXN0LCBpdAo+PiA+IHByb2JhYmx5IGlzIG5vdCBhIGdvb2QgaWRlYSB0byB1c2UgJEhP TUUgdG8gc3RvcmUgc3RhdGVkdW1wcy4KPj4gPgo+PiA+IFdoYXQgc3VnZ2VzdGlvbnMgZG8gb3Ro ZXJzIGhhdmU/Cj4+ID4KPj4gPiBUaGFua3MsCj4+ID4gTmllbHMKPj4gPgo+PiA+Cj4+ID4gMC4g aHR0cHM6Ly9naXRodWIuY29tL2dsdXN0ZXIvZ2x1c3RlcmZzL2Jsb2IvbWFzdGVyL2RvYy9kZWJ1 Z2dpbmcvc3RhdGVkdW1wLm1kCj4+Cj4+Cj4KPgo+Cj4gLS0gCj4KPiBTQU5EUk/CoEJPTkFaWk9M QQo+Cj4gQVNTT0NJQVRFIE1BTkFHRVIsIFNPRlRXQVJFIEVOR0lORUVSSU5HLCBFTUVBIEVORyBW SVJUVUFMSVpBVElPTiBSJkQKPgo+IFJlZCBIYXTCoEVNRUEKPgo+IFRSSUVELiBURVNURUQuIFRS VVNURUQu ----_com.ninefolders.hd3.email_963684395295557_alt Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: base64 PHN0eWxlIHR5cGU9InRleHQvY3NzIj4KPCEtLQpkaXYjZF8xNDkzMzc2NDc2MjU2IHAge2ZvbnQt ZmFtaWx5OkNhbGlicmksIEFyaWFsLCBIZWx2ZXRpY2EsIHNhbnMtc2VyaWY7IGZvbnQtc2l6ZTox Mi4wcHQ7IGNvbG9yOiMxRjQ5N0R9Ci0tPgo8L3N0eWxlPjxkaXYgaWQ9J2RfMTQ5MzM3NjQ3NjI1 Nicgc3R5bGU9ImZvbnQtZmFtaWx5OkNhbGlicmksIEFyaWFsLCBIZWx2ZXRpY2EsIHNhbnMtc2Vy aWY7IGZvbnQtc2l6ZToxMi4wcHQ7IGNvbG9yOiMxRjQ5N0QiPjxwIGRpcj0ibHRyIj48YnI+CitD b2xlIGZvciBGZWRvcmEvdmlydDxicj4KK0plZmYgZm9yIGZvciBxZW11IHVwc3RyZWFtPC9wPgo8 ZGl2IGlkPSJzaWduYXR1cmUteCIgc3R5bGU9Ii13ZWJraXQtdXNlci1zZWxlY3Q6bm9uZTsgZm9u dC1mYW1pbHk6Q2FsaWJyaSwgQXJpYWwsIEhlbHZldGljYSwgc2Fucy1zZXJpZjsgZm9udC1zaXpl OjEyLjBwdDsgY29sb3I6IzFGNDk3RCI+PGRpdj48YSBocmVmPSJodHRwOi8vd3d3Ljlmb2xkZXJz LmNvbS8iIHN0eWxlPSJ0ZXh0LWRlY29yYXRpb246bm9uZTtjb2xvcjojMDA5QkRGIj48YnI+PC9h PjwvZGl2PjwvZGl2PjwvZGl2PjxkaXYgY2xhc3M9InF1b3RlZF9zZXBhcmF0ZV9ib2R5Ii8+PGRp diBpZD0icXVvdGVkX2hlYWRlciIgc3R5bGU9ImNsZWFyOmJvdGg7Ij48aHIgc3R5bGU9ImhlaWdo dDoycHg7Ym9yZGVyLXdpZHRoOjA7Y29sb3I6I0UxRTFFMTtiYWNrZ3JvdW5kLWNvbG9yOiNFMUUx RTE7Ii8+PGRpdiBzdHlsZT0iYm9yZGVyOm5vbmU7IHBhZGRpbmc6My4wcHQgMGNtIDBjbSAwY20i PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OkNhbGlicmksIEFyaWFs LCBIZWx2ZXRpY2EsIHNhbnMtc2VyaWYiPjxiPkZyb206PC9iPiBTYW5kcm8gQm9uYXp6b2xhPGJy PjxiPlNlbnQ6PC9iPiBBcHIgMjgsIDIwMTcgNTowOCBBTTxicj48Yj5Ubzo8L2I+IE5pZWxzIGRl IFZvczsgTWlyb3NsYXYgUmV6YW5pbmE7IEthcmVuIE5vZWw7IERvcm9uIEZlZGl1Y2s8YnI+PGI+ Q2M6PC9iPiBkZXZlbDxicj48Yj5TdWJqZWN0OjwvYj4gUmU6IHFlbXUgcGFja2FnaW5nIC0gYWRk IHRoZSAmcXVvdDtxZW11JnF1b3Q7IHVzZXIgdG8gYSAmcXVvdDtnbHVzdGVyJnF1b3Q7IGdyb3Vw Pzxicj48L3NwYW4+PC9kaXY+PC9kaXY+PGJyIHR5cGU9J2F0dHJpYnV0aW9uJz48ZGl2IGlkPSJx dW90ZWRfYm9keSI+PGJsb2NrcXVvdGUgY2xhc3M9InF1b3RlIiBzdHlsZT0ibWFyZ2luOjAgMCAw IC44ZXg7Ym9yZGVyLWxlZnQ6MXB4ICNjY2Mgc29saWQ7cGFkZGluZy1sZWZ0OjFleCI+PGRpdiBk aXI9Imx0ciI+PGJyPjxkaXYgY2xhc3M9ImdtYWlsX2V4dHJhIj48YnI+PGRpdiBjbGFzcz0iZ21h aWxfcXVvdGUiPk9uIFdlZCwgQXByIDI2LCAyMDE3IGF0IDM6MzYgUE0sIE5pZWxzIGRlIFZvcyA8 c3BhbiBkaXI9Imx0ciI+Jmx0OzxhIGhyZWY9Im1haWx0bzpuZGV2b3NAcmVkaGF0LmNvbSIgdGFy Z2V0PSJfYmxhbmsiPm5kZXZvc0ByZWRoYXQuY29tPC9hPiZndDs8L3NwYW4+IHdyb3RlOjxicj48 YmxvY2txdW90ZSBjbGFzcz0iZ21haWxfcXVvdGUiIHN0eWxlPSJtYXJnaW46MHB4IDBweCAwcHgg MC44ZXg7Ym9yZGVyLWxlZnQ6MXB4IHNvbGlkIHJnYigyMDQsMjA0LDIwNCk7cGFkZGluZy1sZWZ0 OjFleCI+SGksPGJyPgo8YnI+CldlJ3JlIHRyeWluZyB0byBpbXByb3ZlIHRoZSBkZWJ1Z2FiaWxp dHkgb2YgR2x1c3RlciBiYWNrZWQgVk1zIGFuZCBvbmU8YnI+Cm9mIHRoZSBmZWF0dXJlcyBmb3Ig dGhpcyBpcyB0byBiZSBhYmxlIHRvIGdhdGhlciAic3RhdGVkdW1wcyIuIFRoZXNlPGJyPgpzdGF0 ZWR1bXBzIGluY2x1ZGUgbWVtb3J5IGFsbG9jYXRpb24gZGV0YWlscyBhbmQgb3RoZXIgaW5mb3Jt YXRpb24gYWJvdXQ8YnI+CnRoZSBHbHVzdGVyIGNsaWVudC4gUUVNVSBpcyBvbmUgb2YgdGhlIGFw cGxpY2F0aW9ucyB0aGF0IGNhbiBiZTxicj4KY29uZmlndXJlZCB0byB1c2UgbGliZ2ZhcGkuc28g R2x1c3RlciBjbGllbnQuPGJyPgo8YnI+CkdsdXN0ZXIgcHJvdmlkZXMgdGhlIC92YXIvcnVuL2ds dXN0ZXIvIGRpcmVjdG9yeSBhbmQgdGhlIGxpYmdmYXBpLnNvPGJyPgpsaWJyYXJ5IHRoYXQgcWVt dSAoaW4gYmxvY2svZ2x1c3Rlci5jKSB1c2VzIHRoYXQuIFdvdWxkIHRoZXJlIGJlIGE8YnI+CnBy b2JsZW0gZm9yIHRoZSAicWVtdSIgcGFja2FnZXMgdG8gdXNlIGFkZCB0aGUgInFlbXUiIHVzZXIg dG8gYTxicj4KImdsdXN0ZXIiIGdyb3VwPyBJJ20gbm90IHN1cmUgeWV0IGhvdyB0aGlzIGlzIGRv bmUgZm9yIG90aGVyIHBhY2thZ2VzPGJyPgp3aXRoIHRoZWlyIG93biB1c2VycywgYnV0IHRoZXJl IHdvdWxkIGJlIGEgZGVwZW5kZW50IGluc3RhbGxhdGlvbiBvcmRlcjxicj4Kb2Ygc29tZSBraW5k IChuZWVkcyBycG0gdHJpZ2dlcnM/KS48YnI+Cjxicj4KV2hhdCBpcyB5b3VyIG9waW5pb24gb24g dGhpcyBpc3N1ZSwgb3Igd291bGQgeW91IHJlY29tbWVuZCBhbiBvdGhlcjxicj4KYXBwcm9hY2g/ PGJyPjwvYmxvY2txdW90ZT48ZGl2Pjxicj48L2Rpdj48ZGl2PkFkZGluZyBNaXJvc2xhdiwgS2Fy ZW4gYW5kIERvcm9uLjwvZGl2PjxkaXY+SSdtIG5vdCBzdXJlIGFib3V0IGhvdyBsaWJnZmFwaSBp cyBjb25zdW1lZCBieSBxZW11LWt2bSgtZXYvLXJoZXYpIGJ1dCBpZiBpdHMgc3VwcG9ydCBpcyBl bmFibGUgYnkgZGVmYXVsdCBhbmQgZG9lc24ndCByZXF1aXJlIGFkZGl0aW9uYWwgcWVtdS1rdm0g c3ViIHBhY2thZ2VzIHRvIGJlIGVuYWJsZWQsIEkgd291bGQgc3VnZ2VzdCB0byBqdXN0IGZvbGxv dyZuYnNwOzxhIGhyZWY9Imh0dHBzOi8vZmVkb3JhcHJvamVjdC5vcmcvd2lraS9QYWNrYWdpbmc6 VXNlcnNBbmRHcm91cHMiPmh0dHBzOi8vZmVkb3JhcHJvamVjdC5vcmcvd2lraS9QYWNrYWdpbmc6 VXNlcnNBbmRHcm91cHM8L2E+PC9kaXY+PGRpdj5hbmQgYWRkIHRoZSBxZW11IHVzZXIgdG8gdGhl IGdsdXN0ZXIgZ3JvdXAgaW4gJXByZS48L2Rpdj48ZGl2Pjxicj48L2Rpdj48ZGl2PkZyb20gb1Zp cnQgcG9pbnQgb2YgdmlldywgSSB0aGluayBpdCBzaG91bGRuJ3QgYWZmZWN0IHVzIHZlcnkgbXVj aC4gT24gQ2VudE9TIFZpcnQgU0lHIHdlJ2xsIGNvbnN1bWUgd2hhdGV2ZXIgd2lsbCBjb21lIGZy b20gcWVtdS1rdm0tcmhldi48L2Rpdj48ZGl2Pjxicj48L2Rpdj48ZGl2PiZuYnNwOzwvZGl2Pjxi bG9ja3F1b3RlIGNsYXNzPSJnbWFpbF9xdW90ZSIgc3R5bGU9Im1hcmdpbjowcHggMHB4IDBweCAw LjhleDtib3JkZXItbGVmdDoxcHggc29saWQgcmdiKDIwNCwyMDQsMjA0KTtwYWRkaW5nLWxlZnQ6 MWV4Ij4KPGJyPgpUaGFua3MsPGJyPgpOaWVsczxicj4KPGJyPgpQUzogPGEgaHJlZj0iaHR0cHM6 Ly9idWd6aWxsYS5yZWRoYXQuY29tLzE0NDU1NjkiIHJlbD0ibm9yZWZlcnJlciIgdGFyZ2V0PSJf YmxhbmsiPmh0dHBzOi8vYnVnemlsbGEucmVkaGF0LmNvbS88d2JyPjE0NDU1Njk8L2E+IGNhbiBi ZSB1c2VkIHRvIHJlcGx5IGFzIHdlbGw8YnI+Cjxicj4KPGJyPgpGcm9tIDxhIGhyZWY9Imh0dHA6 Ly9saXN0cy5nbHVzdGVyLm9yZy9waXBlcm1haWwvZ2x1c3Rlci1kZXZlbC8yMDE3LUFwcmlsLzA1 MjYyOS5odG1sIiByZWw9Im5vcmVmZXJyZXIiIHRhcmdldD0iX2JsYW5rIj5odHRwOi8vbGlzdHMu Z2x1c3Rlci5vcmcvPHdicj5waXBlcm1haWwvZ2x1c3Rlci1kZXZlbC8yMDE3LTx3YnI+QXByaWwv MDUyNjI5Lmh0bWw8L2E+Ojxicj4KT24gVHVlLCBBcHIgMjUsIDIwMTcgYXQgMDc6NTM6MDZQTSAr MDIwMCwgTmllbHMgZGUgVm9zIHdyb3RlOjxicj4KJmd0OyBIaSw8YnI+CiZndDs8YnI+CiZndDsg UmVjZW50bHkgYSBuZXcgYWJpbGl0eSB0byB0cmlnZ2VyIHN0YXRlZHVtcHMgdGhyb3VnaCB0aGUg R2x1c3Rlci1DTEkgWzBdPGJyPgomZ3Q7IGhhcyBiZWVuIGFkZGVkLiBUaGlzIG1ha2VzIGl0IHBv c3NpYmxlIHRvIGdldCBzdGF0ZWR1bXAgZnJvbTxicj4KJmd0OyBhcHBsaWNhdGlvbnMgdGhhdCB1 c2UgZ2ZhcGkuIEJ5IGRlZmF1bHQsIHN0YXRlZHVtcHMgYXJlIHNhdmVkIHVuZGVyPGJyPgomZ3Q7 IC92YXIvcnVuL2dsdXN0ZXIvLi4uIGFuZCB0aGlzIGRpcmVjdG9yeSBpcyBvbmx5IHdyaXRhYmxl IGJ5IHJvb3QuPGJyPgomZ3Q7IEFwcGxpY2F0aW9ucyB0aGF0IHVzZSBnZmFwaSBkbyBub3QgcmVx dWlyZSByb290IHBlcm1pc3Npb25zIChsaWtlIFFFTVUpLDxicj4KJmd0OyBhbmQgdGhlcmVmb3Jl IGZhaWwgdG8gd3JpdGUgdGhlIHN0YXRlZHVtcCA6LS88YnI+CiZndDs8YnI+CiZndDsgT25lIGFw cHJvYWNoIHdvdWxkIGJlIHRvIGNyZWF0ZSBhICJnbHVzdGVyIiBncm91cCBhbmQgZ2l2ZSB0aGUg Z3JvdXA8YnI+CiZndDsgcGVybWlzc2lvbnMgdG8gd3JpdGUgdG8gL3Zhci9ydW4vZ2x1c3Rlci8u Li4gT3RoZXIgJ2ZpeGVzJyBpbmNsdWRlPGJyPgomZ3Q7IHNldHRpbmcgQUNMcyBvbiB0aGUgZGly ZWN0b3J5IHNvIHRoYXQgc3BlY2lmaWVkIHVzZXJzIGNhbiB3cml0ZSB0aGVyZS48YnI+CiZndDsg YmVjYXVzZSBtYW55IGRhZW1vbnMgaGF2ZSBhICJob21lIGRpcmVjdG9yeSIgdGhhdCBkb2VzIG5v dCBleGlzdCwgaXQ8YnI+CiZndDsgcHJvYmFibHkgaXMgbm90IGEgZ29vZCBpZGVhIHRvIHVzZSAk SE9NRSB0byBzdG9yZSBzdGF0ZWR1bXBzLjxicj4KJmd0Ozxicj4KJmd0OyBXaGF0IHN1Z2dlc3Rp b25zIGRvIG90aGVycyBoYXZlPzxicj4KJmd0Ozxicj4KJmd0OyBUaGFua3MsPGJyPgomZ3Q7IE5p ZWxzPGJyPgomZ3Q7PGJyPgomZ3Q7PGJyPgomZ3Q7IDAuIDxhIGhyZWY9Imh0dHBzOi8vZ2l0aHVi LmNvbS9nbHVzdGVyL2dsdXN0ZXJmcy9ibG9iL21hc3Rlci9kb2MvZGVidWdnaW5nL3N0YXRlZHVt cC5tZCIgcmVsPSJub3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFuayI+aHR0cHM6Ly9naXRodWIuY29t L2dsdXN0ZXIvPHdicj5nbHVzdGVyZnMvYmxvYi9tYXN0ZXIvZG9jLzx3YnI+ZGVidWdnaW5nL3N0 YXRlZHVtcC5tZDwvYT48YnI+Cjxicj4KPGJyPgo8L2Jsb2NrcXVvdGU+PC9kaXY+PGJyPjxiciBj bGVhcj0iYWxsIj48ZGl2Pjxicj48L2Rpdj4tLSA8YnI+PGRpdiBjbGFzcz0iZ21haWxfc2lnbmF0 dXJlIj48ZGl2IGRpcj0ibHRyIj48ZGl2PjxkaXYgZGlyPSJsdHIiPjxkaXYgZGlyPSJsdHIiPjxk aXYgZGlyPSJsdHIiPjxkaXYgZGlyPSJsdHIiPjxwIHN0eWxlPSJjb2xvcjpyZ2IoMCwwLDApO2Zv bnQtZmFtaWx5Om92ZXJwYXNzLHNhbnMtc2VyaWY7Zm9udC13ZWlnaHQ6Ym9sZDttYXJnaW46MHB4 O3BhZGRpbmc6MHB4O2ZvbnQtc2l6ZToxNHB4O3RleHQtdHJhbnNmb3JtOnVwcGVyY2FzZSI+PHNw YW4+U0FORFJPPC9zcGFuPiZuYnNwOzxzcGFuPkJPTkFaWk9MQTwvc3Bhbj48L3A+PHAgc3R5bGU9 ImNvbG9yOnJnYigwLDAsMCk7Zm9udC1mYW1pbHk6b3ZlcnBhc3Msc2Fucy1zZXJpZjtmb250LXNp emU6MTBweDttYXJnaW46MHB4IDBweCA0cHg7dGV4dC10cmFuc2Zvcm06dXBwZXJjYXNlIj48c3Bh bj5BU1NPQ0lBVEUgTUFOQUdFUiwgU09GVFdBUkUgRU5HSU5FRVJJTkcsIEVNRUEgRU5HIFZJUlRV QUxJWkFUSU9OIFImYW1wO0Q8L3NwYW4+PC9wPjxwIHN0eWxlPSJmb250LWZhbWlseTpvdmVycGFz cyxzYW5zLXNlcmlmO21hcmdpbjowcHg7Zm9udC1zaXplOjEwcHg7Y29sb3I6cmdiKDE1MywxNTMs MTUzKSI+PGEgaHJlZj0iaHR0cHM6Ly93d3cucmVkaGF0LmNvbS8iIHN0eWxlPSJjb2xvcjpyZ2Io MCwxMzYsMjA2KTttYXJnaW46MHB4IiB0YXJnZXQ9Il9ibGFuayI+UmVkIEhhdCZuYnNwOzxzcGFu PkVNRUE8L3NwYW4+PC9hPjwvcD48dGFibGUgYm9yZGVyPSIwIiBzdHlsZT0iY29sb3I6cmdiKDAs MCwwKTtmb250LWZhbWlseTpvdmVycGFzcyxzYW5zLXNlcmlmO2ZvbnQtc2l6ZTptZWRpdW0iPjx0 Ym9keT48dHI+PHRkIHdpZHRoPSIxMDBweCI+PGEgaHJlZj0iaHR0cHM6Ly9yZWQuaHQvc2lnIiB0 YXJnZXQ9Il9ibGFuayI+PGltZyBzcmM9Imh0dHBzOi8vd3d3LnJlZGhhdC5jb20vcHJvZmlsZXMv cmgvdGhlbWVzL3JlZGhhdGRvdGNvbS9pbWcvbG9nby1yZWQtaGF0LWJsYWNrLnBuZyIgd2lkdGg9 IjkwIiBoZWlnaHQ9ImF1dG8iPjwvYT48L3RkPjx0ZCBzdHlsZT0iZm9udC1zaXplOjEwcHgiPjxk aXY+PGEgaHJlZj0iaHR0cHM6Ly9yZWRoYXQuY29tL3RydXN0ZWQiIHN0eWxlPSJjb2xvcjpyZ2Io MjA0LDAsMCk7Zm9udC13ZWlnaHQ6Ym9sZCIgdGFyZ2V0PSJfYmxhbmsiPlRSSUVELiBURVNURUQu IFRSVVNURUQuPC9hPjwvZGl2PjwvdGQ+PC90cj48L3Rib2R5PjwvdGFibGU+PC9kaXY+PC9kaXY+ PC9kaXY+PC9kaXY+PC9kaXY+PC9kaXY+PC9kaXY+CjwvZGl2PjwvZGl2Pgo8L2Jsb2NrcXVvdGU+ PC9kaXY+ ----_com.ninefolders.hd3.email_963684395295557_alt--

On Fri, Apr 28, 2017 at 06:48:00AM -0400, Karen Noel wrote:
+Cole for Fedora/virt +Jeff for for qemu upstream
________________________________ From: Sandro Bonazzola Sent: Apr 28, 2017 5:08 AM To: Niels de Vos; Miroslav Rezanina; Karen Noel; Doron Fediuck Cc: devel Subject: Re: qemu packaging - add the "qemu" user to a "gluster" group?
On Wed, Apr 26, 2017 at 3:36 PM, Niels de Vos <ndevos@redhat.com> wrote:
Hi,
We're trying to improve the debugability of Gluster backed VMs and one of the features for this is to be able to gather "statedumps". These statedumps include memory allocation details and other information about the Gluster client. QEMU is one of the applications that can be configured to use libgfapi.so Gluster client.
Gluster provides the /var/run/gluster/ directory and the libgfapi.so library that qemu (in block/gluster.c) uses that. Would there be a problem for the "qemu" packages to use add the "qemu" user to a "gluster" group? I'm not sure yet how this is done for other packages with their own users, but there would be a dependent installation order of some kind (needs rpm triggers?).
What is your opinion on this issue, or would you recommend an other approach?
Adding Miroslav, Karen and Doron. I'm not sure about how libgfapi is consumed by qemu-kvm(-ev/-rhev) but if its support is enable by default and doesn't require additional qemu-kvm sub packages to be enabled, I would suggest to just follow https://fedoraproject.org/wiki/Packaging:UsersAndGroups and add the qemu user to the gluster group in %pre.
From oVirt point of view, I think it shouldn't affect us very much. On CentOS Virt SIG we'll consume whatever will come from qemu-kvm-rhev.
Please keep in mind that in a not so distant future, gluster support in QEMU will be handled by a sub-package (something like qemu-kvm-gluster). See https://bugzilla.redhat.com/show_bug.cgi?id=1425820 (right now gluster support is enabled by default and included in the main qemu package, on all installations). Thanks. - Ademar
Thanks, Niels
PS: https://bugzilla.redhat.com/1445569 can be used to reply as well
From http://lists.gluster.org/pipermail/gluster-devel/2017-April/052629.html: On Tue, Apr 25, 2017 at 07:53:06PM +0200, Niels de Vos wrote:
Hi,
Recently a new ability to trigger statedumps through the Gluster-CLI [0] has been added. This makes it possible to get statedump from applications that use gfapi. By default, statedumps are saved under /var/run/gluster/... and this directory is only writable by root. Applications that use gfapi do not require root permissions (like QEMU), and therefore fail to write the statedump :-/
One approach would be to create a "gluster" group and give the group permissions to write to /var/run/gluster/... Other 'fixes' include setting ACLs on the directory so that specified users can write there. because many daemons have a "home directory" that does not exist, it probably is not a good idea to use $HOME to store statedumps.
What suggestions do others have?
Thanks, Niels
0. https://github.com/gluster/glusterfs/blob/master/doc/debugging/statedump.md
--
SANDRO BONAZZOLA
ASSOCIATE MANAGER, SOFTWARE ENGINEERING, EMEA ENG VIRTUALIZATION R&D
Red Hat EMEA
TRIED. TESTED. TRUSTED.
-- Ademar Reis Red Hat ^[:wq!

On Fri, Apr 28, 2017 at 11:55:20AM -0300, Ademar Reis wrote:
On Fri, Apr 28, 2017 at 06:48:00AM -0400, Karen Noel wrote:
+Cole for Fedora/virt +Jeff for for qemu upstream
________________________________ From: Sandro Bonazzola Sent: Apr 28, 2017 5:08 AM To: Niels de Vos; Miroslav Rezanina; Karen Noel; Doron Fediuck Cc: devel Subject: Re: qemu packaging - add the "qemu" user to a "gluster" group?
On Wed, Apr 26, 2017 at 3:36 PM, Niels de Vos <ndevos@redhat.com> wrote:
Hi,
We're trying to improve the debugability of Gluster backed VMs and one of the features for this is to be able to gather "statedumps". These statedumps include memory allocation details and other information about the Gluster client. QEMU is one of the applications that can be configured to use libgfapi.so Gluster client.
Gluster provides the /var/run/gluster/ directory and the libgfapi.so library that qemu (in block/gluster.c) uses that. Would there be a problem for the "qemu" packages to use add the "qemu" user to a "gluster" group? I'm not sure yet how this is done for other packages with their own users, but there would be a dependent installation order of some kind (needs rpm triggers?).
What is your opinion on this issue, or would you recommend an other approach?
Adding Miroslav, Karen and Doron. I'm not sure about how libgfapi is consumed by qemu-kvm(-ev/-rhev) but if its support is enable by default and doesn't require additional qemu-kvm sub packages to be enabled, I would suggest to just follow https://fedoraproject.org/wiki/Packaging:UsersAndGroups and add the qemu user to the gluster group in %pre.
From oVirt point of view, I think it shouldn't affect us very much. On CentOS Virt SIG we'll consume whatever will come from qemu-kvm-rhev.
Please keep in mind that in a not so distant future, gluster support in QEMU will be handled by a sub-package (something like qemu-kvm-gluster). See https://bugzilla.redhat.com/show_bug.cgi?id=1425820
(right now gluster support is enabled by default and included in the main qemu package, on all installations).
Thanks. - Ademar
Hi, upcomming modularization is one of reason I support adding qemu user to gluster group - we will be able to update solution to work properly after modularization. Mirek
Thanks, Niels
PS: https://bugzilla.redhat.com/1445569 can be used to reply as well
From http://lists.gluster.org/pipermail/gluster-devel/2017-April/052629.html: On Tue, Apr 25, 2017 at 07:53:06PM +0200, Niels de Vos wrote:
Hi,
Recently a new ability to trigger statedumps through the Gluster-CLI [0] has been added. This makes it possible to get statedump from applications that use gfapi. By default, statedumps are saved under /var/run/gluster/... and this directory is only writable by root. Applications that use gfapi do not require root permissions (like QEMU), and therefore fail to write the statedump :-/
One approach would be to create a "gluster" group and give the group permissions to write to /var/run/gluster/... Other 'fixes' include setting ACLs on the directory so that specified users can write there. because many daemons have a "home directory" that does not exist, it probably is not a good idea to use $HOME to store statedumps.
What suggestions do others have?
Thanks, Niels
0. https://github.com/gluster/glusterfs/blob/master/doc/debugging/statedump.md
--
SANDRO BONAZZOLA
ASSOCIATE MANAGER, SOFTWARE ENGINEERING, EMEA ENG VIRTUALIZATION R&D
Red Hat EMEA
TRIED. TESTED. TRUSTED.
-- Ademar Reis Red Hat
^[:wq!

On 04/28/2017 10:55 AM, Ademar Reis wrote:
On Fri, Apr 28, 2017 at 06:48:00AM -0400, Karen Noel wrote:
+Cole for Fedora/virt +Jeff for for qemu upstream
________________________________ From: Sandro Bonazzola Sent: Apr 28, 2017 5:08 AM To: Niels de Vos; Miroslav Rezanina; Karen Noel; Doron Fediuck Cc: devel Subject: Re: qemu packaging - add the "qemu" user to a "gluster" group?
On Wed, Apr 26, 2017 at 3:36 PM, Niels de Vos <ndevos@redhat.com> wrote:
Hi,
We're trying to improve the debugability of Gluster backed VMs and one of the features for this is to be able to gather "statedumps". These statedumps include memory allocation details and other information about the Gluster client. QEMU is one of the applications that can be configured to use libgfapi.so Gluster client.
Gluster provides the /var/run/gluster/ directory and the libgfapi.so library that qemu (in block/gluster.c) uses that. Would there be a problem for the "qemu" packages to use add the "qemu" user to a "gluster" group? I'm not sure yet how this is done for other packages with their own users, but there would be a dependent installation order of some kind (needs rpm triggers?).
What is your opinion on this issue, or would you recommend an other approach?
Adding Miroslav, Karen and Doron. I'm not sure about how libgfapi is consumed by qemu-kvm(-ev/-rhev) but if its support is enable by default and doesn't require additional qemu-kvm sub packages to be enabled, I would suggest to just follow https://fedoraproject.org/wiki/Packaging:UsersAndGroups and add the qemu user to the gluster group in %pre.
From oVirt point of view, I think it shouldn't affect us very much. On CentOS Virt SIG we'll consume whatever will come from qemu-kvm-rhev.
Please keep in mind that in a not so distant future, gluster support in QEMU will be handled by a sub-package (something like qemu-kvm-gluster). See https://bugzilla.redhat.com/show_bug.cgi?id=1425820
(right now gluster support is enabled by default and included in the main qemu package, on all installations).
Since that work is already in fedora, it actually makes things easier there for us, we can add the 'usermod -a -G gluster qemu' in the qemu-block-gluster subpackage %pre, which will guarantee that qemu-common (which creates the qemu user) and gluster packages (which create the gluster group) are already on disk. OP please file a fedora qemu bug about this and we can go from there Thanks, Cole

--ChQOR20MqfxkMJg9 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, May 03, 2017 at 02:01:00PM -0400, Cole Robinson wrote:
On 04/28/2017 10:55 AM, Ademar Reis wrote:
On Fri, Apr 28, 2017 at 06:48:00AM -0400, Karen Noel wrote:
+Cole for Fedora/virt +Jeff for for qemu upstream
________________________________ From: Sandro Bonazzola Sent: Apr 28, 2017 5:08 AM To: Niels de Vos; Miroslav Rezanina; Karen Noel; Doron Fediuck Cc: devel Subject: Re: qemu packaging - add the "qemu" user to a "gluster" group?
On Wed, Apr 26, 2017 at 3:36 PM, Niels de Vos <ndevos@redhat.com> wro=
Hi,
We're trying to improve the debugability of Gluster backed VMs and o=
ne
of the features for this is to be able to gather "statedumps". These statedumps include memory allocation details and other information a= bout the Gluster client. QEMU is one of the applications that can be configured to use libgfapi.so Gluster client.
Gluster provides the /var/run/gluster/ directory and the libgfapi.so library that qemu (in block/gluster.c) uses that. Would there be a problem for the "qemu" packages to use add the "qemu" user to a "gluster" group? I'm not sure yet how this is done for other packages with their own users, but there would be a dependent installation or= der of some kind (needs rpm triggers?).
What is your opinion on this issue, or would you recommend an other approach?
Adding Miroslav, Karen and Doron. I'm not sure about how libgfapi is consumed by qemu-kvm(-ev/-rhev) but if its support is enable by default and doesn't require additional qemu-kvm sub packages to be enabled, I would suggest to just follow https://fedoraproject.org/wiki/Packaging:UsersAndGroups and add the qemu user to the gluster group in %pre.
From oVirt point of view, I think it shouldn't affect us very much. On CentOS Virt SIG we'll consume whatever will come from qemu-kvm-rhev. =20 Please keep in mind that in a not so distant future, gluster support in QEMU will be handled by a sub-package (something like qemu-kvm-gluster). See https://bugzilla.redhat.com/show_bug.cgi?id=3D14= 25820 =20 (right now gluster support is enabled by default and included in
te: the main qemu package, on all installations). =20 =20 Since that work is already in fedora, it actually makes things easier the= re for us, we can add the 'usermod -a -G gluster qemu' in the qemu-block-glu= ster subpackage %pre, which will guarantee that qemu-common (which creates the= qemu user) and gluster packages (which create the gluster group) are already o= n disk. =20 OP please file a fedora qemu bug about this and we can go from there
Thanks, here you go: https://bugzilla.redhat.com/show_bug.cgi?id=3D1447799 When you run 'usermod' in %pre of qemu-block-gluster, make sure to check that the 'gluster' group exists. This has only recently been added to the glusterfs packages, and may not be available on all systems yet. Niels --ChQOR20MqfxkMJg9 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIcBAEBAgAGBQJZCkdKAAoJECXo5AApwsWzDB8QAJ1/puANyrSt6KzapccUdNR1 V3X0nDbZUah0TSX6+YYp7cBLMebfTwE6oWY9kSHVkReRFoMIu1/fJKON12ZBCiOM GGubTkcnG8vv77IM0/dgKCNNnYkhMIv71Umen9GoPDhxOHVlUXbHVBXrftjeamCP tR+s4poOJ58kjP/un4Ufxg0Fn+JV8UqRsgevdzrT6Hgidv6hgVxRAssyDbYDwtI2 jwialiQbTwiwBXfaQKTqjeONygQxHnvZZY54oD9HjQPPRdcdQxWgsSmAWq23NxkQ X60qaYd3pxwH5pK75JYU3m8K/MN7eco/bfER7xvyZxGJu+cZu7I4dlimEhMSR+3O ZaH4e9NHa5jEukDvVDFSN+dzWBEaqOGRqYPBAbhcRGDNAv6gAwRbFtyahtgAeykW dJYa9tR+vbDI9IIFQFileH405MKTkCOo8vzJtr8nbE6hkI2i0nzp8F210KDSso4y lAmzgoFrXd5e6MbzpNtRl+x9pC0h8uCtbJ76/rOlAI0NivCfSzBNaMpJMczCWuzk 9Byr08yRatysEqTJdr7+2J8HaPFI81n5zXKgzZUga7iZs9BSO+B7YuKTxs8b0Mst mDCvON15/peSvC8x73fwjcI6waxoXYdvLW5WAIOlvJVmfnuAy7OF3xv68bbq+q04 QoaYpetKqyW2ScQrjB57 =+GOs -----END PGP SIGNATURE----- --ChQOR20MqfxkMJg9--
participants (5)
-
Ademar Reis
-
Cole Robinson
-
Karen Noel
-
Miroslav Rezanina
-
Niels de Vos