On 6/19/21 1:20 PM, Rusty Bird wrote:
> Hi David,
>
>> How do you distribute modifications specific to certain template operating systems?
>
>> I considered sending the seemingly trivial 2-line PR for [5988], but then noticed that
>> modifying upstream systemd configuration can be done in many ways with each having Pros and Cons and none seeming straightforward:
>
>> 1. Maintain an own systemd package for 2+ distributions:
>> Oh no, I'm a simple man... This doesn't scale well.
>> 2. Add it to the builder process as 40_*post script or so:
>> The next time an upstream maintainer changes the modified lines, we're back to the maintainer state.
>> 3. Use dom0 salt:
>> Similar to 2. unless one does it after every update. This would however force users to update their OS via salt for the optimal experience? Not great - I like my "apt-get dist-upgrade".
>> It might be Okayish for this particular change as the configuration is almost never touched by upstream.
>> 4. Maintain some distro-specific code that is called after every update:
>> Quite a project by itself & another maintenance burden, but probably scales better than 1. A quick look however led me to the conclusion that e.g. for apt the callbacks are all quite shaky and pass little information to the called script (nothing about the executed action for example).
>> 5. Some hopefully obvious solution that I missed?
>
>> [5988]
https://github.com/QubesOS/qubes-issues/issues/5988
>
> This is about the watchdog thing? You could add another[1] systemd
> "drop-in"[2] file - systemd-logind.service.d/30_qubes.conf - to the
> qubes-core-agent-systemd package, containing
>
> [Service]
> WatchdogSec=0
>
> 1.
https://github.com/QubesOS/qubes-core-agent-linux/tree/master/vm-systemd
> 2.
https://www.freedesktop.org/software/systemd/man/systemd.unit.html