-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Hi,
>
> On Tue, Oct 07, 2014 at 12:56:55PM -0500, Jon Ciesla wrote:
>> On Tue, Oct 7, 2014 at 8:23 AM, David Sommerseth <
>> openvpn.l...@topphemmelig.net> wrote:
>>
>>> From: David Sommerseth <dav...@redhat.com>
>>>
>>> In systemd after version 216, systemd-ask-password will support --echo
>>> which will avoid masking the user input.  As OpenVPN uses this mechanism
>>> collecting usernames when systemd is available, this will avoid the
> [..]
>>
>> ACK.  Enables systemd features on systemd systems, and looks like a no-op
>> on non-systemd systems.
>
> Now this is getting interesting.  I had a LONG discussion with David on
> IRC today, as I do not like where this is going - it's very very specific
> code (not only "linux specific" but "linux with systemd"), and the more I
> think about the less I'm convinced that we really want to have this inside
> OpenVPN, depend on particular versions of systemd in our source (yet
> another #ifdef that will turn into dead code in a few years), or link
> against a systemd library.
>
> OTOH, having a *generic* mechanism to run an external "askpass" mechanism
> - which could then be something x11-ssh-askpass, for example, on systems
> that are not Linux or have no systemd, is something I'd find generically
> useful.  On systemd systems, this would then point to systemd, of course.
>
> So this might be "./configure --enable-ask-pass=$my_program", which
> could then be /usr/sbin/systemd-askpass, or something private to OpenVPN
> which would check if systemd is running, and if yes, call systemd-askpass
> and if not, call "whatever makes sense on that particular environment"
> (if $DISPLAY, call ssh-askpass, otherwise, not).
It seems the systemd controversy has now reached OpenVPN :). I also
would prefer a generic mechanism which could then utilize systemd or
whatever. Any ideas how much (more) work would that require?
>
>
> Now, the really interesting thing about this is that we have an ACK for
> a patch which is not without religion around it - from someone who has
> never sent an ACK or a patch before.  So, do I take any ACK, no matter
> who sent it?  Do we require ACKs to come from people that have actual
> experience with the code, and are willing to work on the code when these
> bits need maintenance in the future?  "This is the material where project
> forks are made from"...
Very good questions. Perhaps the simplest solution is to give a NACK to
the patch to negate the ACK. I don't think an ACK should mean the code
_must_ go to the repository _if_ somebody objects it.
>
> So fully independent from the patch at hand we have some discussion to
> do - and we might want to postpone this particular topic and patchset
> to the face to face meeting, as things tend to get out of hand when
> discussed purely by mail / IRC.
That makes sense given that the Munich hackthon is only about one month
away.

- -- 
Samuli Seppänen
Community Manager
OpenVPN Technologies, Inc

irc freenode net: mattock
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlQ031UACgkQwp2X7RmNIqNWvwCg3+ZCc0Y9vWGXEbP6x1iN32fD
b1QAoJLhluPl033np8OTQHXpKjcO/YO0
=IS4U
-----END PGP SIGNATURE-----



Reply via email to