• FreeBSD Status Report - Second Quarter 2024 (2/2)

    From Lorenzo Salvadore@21:1/5 to All on Mon Aug 19 18:00:08 2024
    [continued from previous message]

    You can also follow the development process in freebsd-multimedia@, where I post regular reports.

    Sponsor: The FreeBSD Foundation

    ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

    FreeBSD GitHub Pull Request Report

    Links:
    GitHub Working Group wiki page URL: https://wiki.freebsd.org/WorkingGroup/GitHub
    FreeBSD Base System Pull Requests URL: https://github.com/freebsd/freebsd-src/pulls

    Contact: Warner Losh <imp@FreeBSD.org>

    The FreeBSD Project has been trying an experiment to accept contributions via GitHub pull requests. We have learned a lot in the last year that we’ve been doing this. We have created a number of rules relating to the pull requests. In general, pull requests should only be for things that are user-visible, add value to the project and are ready to go, modulo final review.

    Current status:

    • We are able to keep up with the pull requests doing everything by hand, but
    only if we do it at least weekly.

    • We have discovered the by-hand process is tedious and error-prone.

    • We can stage multiple pull requests in a testing branch so we can batch-up
    testing.

    • We can automatically land the result so merged pull requests show up as
    merged in GitHub infrastructure.

    We need help with automating the process:

    • Add automated testing that is context specific (for example, run igor over
    man pages).

    • Add build/install tests that test-boot the resulting image.

    • Automate common tasks, like man page corrections, into staging process.

    • Add simple smoke testing for the staging branch for tier 1 architectures.

    • Investigate optionally integrating Jenkins testing to scale up the size of
    changes we can accept.

    • Integrate with Bugzilla problem reports and Phabricator reviews.

    • Improve the submitter experience on GitHub by automating common feedback to
    mistakes in the pull requests.

    • Create checklists for submitters to reduce errors.

    • Create better reporting about pull requests, especially the frequent
    contributors of good pull requests.

    We are coordinating on FreeBSD’s Discord in the #github-hacking channel. Join us there to pitch in, or just chat about the project.

    Once things are fine-tuned, we want to publicity to steer contributors, at least the base system, to GitHub pull requests. We need more developers looking at the FreeBSD GitHub pull requests. We will also need more developers to review and land pull requests once it is automated and the automation has matured. We sincerely hope that we can improve the FreeBSD contribution experience with this, as well as gain useful fixes from the community.

    ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

    Userland

    Changes affecting the base system and programs in it.

    Capsicum-rs

    Links:
    capsicum-rs on GitHub URL: https://github.com/dlrobertson/capsicum-rs capsicum-net on GitHub URL: https://github.com/asomers/capsicum-net

    Contact: Alan Somers <asomers@FreeBSD.org>

    Capsicum is a lightweight OS capability and sandbox framework implementing a hybrid capability system model.

    I have adopted the library providing Rust bindings for Capsicum, and extended it with support for libcasper(3) and cap_net(3). It is already being used by net-mgmt/nfs-exporter and by a TLS-enabled FTP server (the FTP server is closed-source, but all of the interesting bits reside in an open source library, and an example server can be found at https://github.com/bolcom/libunftp/tree/master/crates/unftp-sbe-fs/examples).

    Sponsor: Axcient

    ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

    Service jails — Automatic jailing of rc.d services

    Links:
    rc-article part for Service Jails URL: https://docs.freebsd.org/en/articles/rc-scripting/#rcng-service-jails

    Contact: Alexander Leidinger <netchild@FreeBSD.org>

    Service jails extend the rc(8) system to allow automatic jailing of rc.d services. A service jail inherits the filesystem of the parent host or jail, but uses all other limits of the jail (process visibility, restricted network access, filesystem mounting permissions, sysvipc, …​) by default. Additional
    configuration allows inheritance of the IPs of the parent, sysvipc, memory page locking, and use of the bhyve virtual machine monitor (vmm(4)).

    The base system infrastructure and the basesystem rc.d services are committed to 15-current, and the handbook / rc article updates are committed to the documentation. Next steps are to extend services in the ports collection to be able to make use of it.

    If you want to put e.g. nginx into a service jail and allow IPv4 and IPv6 access, simply change rc.conf(5) to have:

    nginx_svcj_options=net_basic
    nginx_svcj=YES

    While this does not have the same security benefits as a manual jail setup with a separate filesystem and IP/VNET, it is much easier to set up, while providing some of the security benefits of a jail like hiding other processes of the same user.

    Any testing and feedback (even as simple as "service X works in a service jail") is welcome.

    ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

    Kernel

    Updates to kernel subsystems/features, driver support, filesystems, and more.

    Hierarchical rate limits for OpenZFS

    Links:
    Pull request URL: https://github.com/openzfs/zfs/pull/16205

    Contact: Pawel Dawidek <pawel@dawidek.net>

    Rate limits allow to limit bandwidth and number of metadata operations per dataset.

    Hierarchical rate limits allow for granular resource control especially in shared environments, eg. when a single ZFS pool serves data to multiple, independent virtual machines or jails.

    Because the limits are hierarchical, they are enforced like the quota property: the children datasets must obey the limits of the parent dataset.

    The limits can be configured using six new properties: limit_bw_read, limit_bw_write, limit_bw_total, limit_op_read, limit_op_write, limit_op_total The limit_bw_* properties limit the read, write, or combined bandwidth, respectively, that a dataset and its descendants can consume. Those limits are in bytes per second. The limit_op_* properties limit the read, write, or both metadata operations, respectively, that a dataset and its descendants can generate. Those limits are in number of operations per second.

    Limits are applied to file systems and ZFS volumes (and their snapshots).

    The initial work is done and the pull request is up for review.

    Sponsor: Klara Systems Sponsor: FreeBSD Foundation

    ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

    A low-cost conditional execution mechanism

    Links:
    FreeBSD wiki URL: https://wiki.freebsd.org/SummerOfCode2024Projects/ZeroCostConditionalExecutionMechanism

    Contact: Marko Vlaić <mvlaic@freebsd.org> Contact: Bojan Novković (mentor) < bnovkov@freebsd.org>

    This project aims to implement a low-cost conditional execution mechanism, similar to the static_key interface in Linux. The current working name is zcond, as in zero-cost conditional. The idea is to reduce the overhead of rarely used features in performance sensitive kernel code paths. Specifically, code blocks of the following, simple structure, are targeted:

    if(some_global_flag == true) {
    do_some_additional_task();
    }

    A block like this can cause performance overhead in a frequently executed piece of code.

    The motivating use case for the mechanism is tracing (as outlined here in the wiki), but the project will identify more areas where this mechanism could be applied.

    The backbone of the mechanism is runtime instruction hot patching, making it highly architecture dependent. Great care has to be given to security, because kernel instructions are overwritten at runtime. More details and some implementation ideas can be found in the project proposal on the project wiki page. More documents describing the implementation and design decisions will be produced, as the project moves along.

    The goal of the project is to produce a working implementation of the mechanism for the x86-64 architecture. It will then be applied to an existing piece of kernel code and benchmarked. If the benchmark results come out positive, it will be ported to other architectures.

    This project is a part of the Google Summer of Code 2024.. The project is still in its early stages, but any feedback would be highly appreciated.

    Help wanted

    • General feedback on the mechanism, API and implementation

    • More use cases besides tracing are welcome

    • Code review

    • Name suggestions

    Sponsor: Google LLC (GSoC 2024)

    ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

    Architectures

    Updating platform-specific features and bringing in support for new hardware platforms.

    FreeBSD/riscv64

    Links:
    Wiki Homepage URL: https://wiki.freebsd.org/riscv

    Contact: Mitchell Horne <mhorne@FreeBSD.org>
    Contact: Ruslan Bukin <br@FreeBSD.org>
    Contact: Jari Sihvola <jsihv@gmx.com>

    The FreeBSD/RISC-V project is providing support for running FreeBSD on the RISC-V Instruction Set Architecture.

    BSDCan Devsummit Updates

    Mitchell gave a presentation on the status of the FreeBSD/riscv64 platform at the June developers' summit, part of BSDCan 2024. The presentation discussed the challenges of supporting the evolving RISC-V ISA, and gave a brief overview of some available hardware targets. It is informal in nature, but available to watch on youtube.

    https://www.youtube.com/watch?v=O7zW7Z9U0ns

    StarFive JH7110 SoC / VisionFive v2

    Work has been ongoing to support the JH7110 RISC-V SoC in FreeBSD. This SoC is present in several existing RISC-V SBCs. The primary support target is the VisionFive v2, but this work is likely to benefit similar hardware such as the Pine64 Star64 and the Milk-V Mars.

    At present, the support in CURRENT is partially complete. What is working: * UART * clk/reset drivers * MMC/SD

    The next target is working ethernet, which is supported with extensions to the if_eqos driver. This code is functional, but still in review.

    Work on this has been performed by Jari, with review, testing, and integration from Mitchell.

    https://wiki.freebsd.org/riscv/StarFive

    T-HEAD/XuanTie CPU Support

    As discussed in the devsummit presentation, these CPUs present several barriers to support. The problems come primarily from custom vendor extensions: non-coherent device I/O with custom cache management instructions, and a custom (spec-violating) implementation of page-based memory types. Combined, these quirks require difficult and invasive changes to pmap, busdma, and early boot code.

    At the same time, we are seeing an increasing amount of available hardware based on this IP, and so support becomes a repeated question and incentive.

    Work on page-based memory types is underway and expected to land soon in CURRENT. This feature allows individual virtual memory pages to be assigned specific properties, e.g. cacheability requirements. The riscv64 pmap has been extended to support the official RISC-V 'Svpbmt' extension, and the T-HEAD version of PBMT. These alternative encodings are incompatible, but provide similar functionality.

    Work on the device coherence and cache management challenges will begin next quarter.

    The hope is that this foundational work will (eventually) enable board support for available RISC-V hardware such as: * Allwinner D1 (Nehza) * Sipeed Lichee Pi 4A * Beagle-V Ahead * Milk-V Pioneer

    RISC-V Hypervisor

    Experimental support for the RISC-V hypervisor in bhyve/vmm(4) is under active development. Currently, single-core VMs are possible, and the guest can boot to multi-user.

    Note: the "H" (hypervisor) extension is not implemented by any known existing or upcoming RISC-V hardware. It is fully supported by software simulators such as Spike or QEMU.

    https://wiki.freebsd.org/riscv/bhyve

    Sponsor: The FreeBSD Foundation (mhorne’s work) Sponsor: UKRI (br’s work)

    ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

    Cloud

    Updating cloud-specific features and bringing in support for new cloud platforms.

    FreeBSD on Microsoft HyperV and Azure

    Links:
    Microsoft Azure article on FreeBSD wiki URL: https://wiki.freebsd.org/MicrosoftAzure
    Microsoft HyperV article on FreeBSD wiki URL: https://wiki.freebsd.org/HyperV

    Contact: Microsoft FreeBSD Integration Services Team <bsdic@microsoft.com> Contact: freebsd-cloud Mailing List
    Contact: The FreeBSD Azure Release Engineering Team <releng-azure@FreeBSD.org> Contact: Wei Hu <whu@FreeBSD.org>
    Contact: Souradeep Chakrabarti <schakrabarti@microsoft.com>
    Contact: Li-Wen Hsu <lwhsu@FreeBSD.org>

    In this quarter, we have published the 14.1-RELEASE on Azure Marketplace. Souradeep Chakrabarti from Microsoft has improved the TLB flushing mechanism in Azure.

    Work in progress tasks:

    • Automating the image building and publishing process and merging to src/
    release/.

    • Building and publishing snapshot builds to Azure community gallery.

    • Testing adding FreeBSD support in Azure Pipelines

    https://github.com/microsoft/azure-pipelines-agent/pull/3266

    The above tasks are sponsored by The FreeBSD Foundation, with resources provided by Microsoft.

    Open tasks:

    • Update FreeBSD-related doc at Microsoft Learn

    • Update sysutils/azure-agent to the latest version

    • Upstream local modifications of Azure agent

    • Port Linux Virtual Machine Extensions for Azure

    Sponsor: Microsoft for people in Microsoft, and for resources for the rest Sponsor: The FreeBSD Foundation for everything else

    ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

    OpenStack on FreeBSD

    Links:
    OpenStack URL: https://www.openstack.org/
    OpenStack on FreeBSD URL: https://github.com/openstack-on-freebsd

    Contact: Chih-Hsin Chang <starbops@hey.com>
    Contact: Li-Wen Hsu <lwhsu@FreeBSD.org>

    The OpenStack on FreeBSD project aims to integrate OpenStack cloud infrastructure with the FreeBSD operating system, utilizing FreeBSD’s unique features while maintaining compatibility with OpenStack standards.

    In the second quarter of 2024, we continued to advance the project significantly. One of our key activities was attending BSDCan 2024, where we presented on "Towards a Robust FreeBSD-based Cloud: Porting OpenStack Components". This presentation helped increase the project’s visibility and attracted interest from potential contributors.

    We expanded the current single-node proof-of-concept (POC) site to a three-node setup. This involved detailed environment setup and network planning. Additionally, we began migrating the base to FreeBSD 15.0-CURRENT to ensure our project stays aligned with the latest advancements in FreeBSD.

    We also started working on adapting the manual installation steps and code patches into FreeBSD ports, aiming to streamline the installation process for future users. Another major milestone was initiating work on making bare-metal provisioning function on both FreeBSD instances and service hosts for OpenStack Ironic.

    Looking forward to the next quarter, our focus will be on refining these advancements and further enhancing the project’s robustness and ease of use. Specifically, we aim to upgrade our OpenStack components from the Xena version to a more recent release, as Xena has entered the "unmaintained" phase and will soon reach EOL. We welcome any suggestions and contributions from the community to help us achieve our goals.

    Sponsor: The FreeBSD Foundation

    ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

    Documentation

    Noteworthy changes in the documentation tree, manual pages, or new external books/documents.

    Documentation Engineering Team

    Link: FreeBSD Documentation Project URL: https://www.freebsd.org/docproj/url Link: FreeBSD Documentation Project Primer for New Contributors URL: https://docs.freebsd.org/en/books/fdp-primer/url
    Link: Documentation Engineering Team URL: https://www.freebsd.org/administration/#t-docengurl

    Contact: FreeBSD Doceng Team <doceng@FreeBSD.org>

    The doceng@ team is a body to handle some of the meta-project issues associated with the FreeBSD Documentation Project; for more information, see FreeBSD Doceng Team Charter.

    Document changes

    During this quarter multiple pieces of the documentation were updated including the removal of mentions to ports that were removed from the ports tree, typos, URL corrections, and asciidoc improvements.

    These are three highlighted contributions in this quarter:

    • Best practices related to vendor import were documented. URL:
    https://cgit.freebsd.org/doc/commit/?id=fe494e72df138266f6da2b9170cf0215275a6aaf

    • A section about service jails was added to the handbook. URL:
    https://cgit.freebsd.org/doc/commit/?id=8f4754a9a6ee8f2503cfb68d14afa99b17729e7f

    • bhyve documentation was improved. URL:
    https://cgit.freebsd.org/doc/commit/?id=68cbd16c4e7c199cfdfb2b54110ad1470b4d7a2e

    FreeBSD Translations on Weblate

    Link: Translate FreeBSD on Weblate URL: https://wiki.freebsd.org/Doc/Translation/Weblateurl
    Link: FreeBSD Weblate Instance URL: https://translate-dev.freebsd.org/url

    Q2 2024 Status

    • 17 team languages

    • 214 registered users

    9 new translators joined Weblate:

    • BFR (de_DE)

    • Elwood (de_DE)

    • Freebsd-Freund (de_DE)

    • MSantos (pt)

    • SINF-KEN (fr_FR, nl_NL)

    • aperechnev (ru)

    • edsonwolf

    • fdecunta (es_ES)

    • wheatfox (zh_CN, zh_HANS)

    Languages

    • Chinese (Simplified) (zh-cn) (progress: 7%)

    • Chinese (Traditional) (zh-tw) (progress: 3%)

    • Dutch (nl) (progress: 1%)

    • French (fr) (progress: 1%)

    • German (de) (progress: 1%)

    • Greek (el) (progress: 1%)

    • Indonesian (id) (progress: 1%)

    • Italian (it) (progress: 5%)

    • Korean (ko) (progress: 32%)

    • Norwegian (nb-no) (progress: 1%)

    • Persian (fa-ir) (progress: 3%)

    • Polish (progress: 2%)

    • Portuguese (progress: 0%)

    • Portuguese (pt-br) (progress: 22%)

    • Spanish (es) (progress: 36%)

    • Turkish (tr) (progress: 2%)

    We want to thank everyone that contributed, translating or reviewing documents.

    And please, help promote this effort on your local user group, we always need more volunteers.

    Packages maintained by DocEng

    During this quarter the following work was done in packages maintained by doceng@:

    • textproc/docproj-legacy: Fix build with DBLATEX

    • textproc/docproj-legacy: Fix poudriere warning

    • textproc/rubygem-asciidoctor-epub3: Add missing run dependency

    • www/gohugo: Update to 0.125.4

    Open issues

    There are 3 Open PRs in bugzilla assigned to doceng@:

    • 279815 status reports: ERR_TOO_MANY_REDIRECTS

    • 276923 www/gohugo link error under poudriere

    • 267274 Please remove the zh-CN Handbook of the current FreeBSD website

    During this quarter doceng@ closed 3 PRs:

    • 278904 misc/freebsd-doc-en: HTML should be single page

    • 278732 www/gohugo: Update to v125.5

    • 278504 textproc/rubygem-asciidoctor-epub3: A run-time dependency is missing
    for rubygem-asciidoctor-epub3 port

    ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

    Ports

    Changes affecting the Ports Collection, whether sweeping changes that touch most of the tree, or individual ports themselves.

    GCC on FreeBSD

    Links:
    GCC Project URL: https://gcc.gnu.org/
    GCC 11 release series URL: https://gcc.gnu.org/gcc-11/
    GCC 12 release series URL: https://gcc.gnu.org/gcc-12/
    GCC 13 release series URL: https://gcc.gnu.org/gcc-13/
    GCC 14 release series URL: https://gcc.gnu.org/gcc-14/

    Contact: Lorenzo Salvadore <salvadore@FreeBSD.org>

    Upstream has released GCC 14.1. Therefore port lang/gcc-14 has been created, as well as lang/gcc15-devel which tracks the new latest development GCC version. Previous major versions of GCC are being updated as well.

    Only very little work has been done on existing bugs for GCC ports this quarter, contrary to the original plan stated in the precedent report. This is due to the fact that I noticed an increasing interest in upstream to support GCC on FreeBSD, which however gets blocked by the fact that GCC sources do not build out-of-the-box on our platform, but needs instead many patches which are in our ports tree framework. It is then necessary to focus on upstreaming all of those patches, possibly at once and not one at the time as it has been done until now, and to also regularly run the tests suite, fixing all tests that fail. Then I am working on a new setup of automation that allows me to build and test all supported GCC versions as efficiently as possible, including GCC from sources but without the ports tree framework support. All of this has significantly slowed down usual GCC ports maintainership (users of the -devel ports have probably noticed that they are being updated much less frequently), but I am confident that it will eventually pay off.

    It should also be noted that Robert Clausecker has enabled lang/gcc11, lang/ gcc12, and lang/gcc13 for riscv64 architecture as the ports build fine on 15-CURRENT.

    ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

    KDE on FreeBSD

    Links:
    KDE/FreeBSD initiative URL: https://freebsd.kde.org/
    FreeBSD — KDE Community Wiki URL: https://community.kde.org/FreeBSD

    Contact: Adriaan de Groot <kde@FreeBSD.org>

    The KDE on FreeBSD project packages CMake, Qt, and software from the KDE Community, for the FreeBSD ports tree. The software includes a full desktop environment called KDE Plasma (for both X11 and Wayland) and hundreds of applications that can be used on any FreeBSD machine. The KDE team is part of desktop@, building the software stack to make FreeBSD beautiful and usable as a daily driver graphical desktop workstation.

    We missed a quarter, while the broader KDE community celebrated the KDE Megarelease of KDE Frameworks 6, KDE Plasma 6 and KDE Gear. The latest software is still not available on FreeBSD, pending more testing and some integration work.

    Infrastructure

    CMake was updated several times and is now version 3.29.6, the latest upstream release. CMake in the ports framework now supports setting parallel-build for tests.

    Qt5 is now on long-term support and updates only rarely. An update to 5.15.14 and WebEngine to 5.15.17 was landed in May.

    Qt6 and the Python bindings for Qt, Pyside, were updated to version 6.7.2.

    KDE Stack

    KDE Gear, Plasma and Frameworks release happen very regularly. These updates arrive in the FreeBSD ports tree only piecemeal, due to lagging work on compatibility and testing.

    • KDE Frameworks reached version 6.3.0

    • KDE Plasma 6 Desktop was updated to version 6.0.4

    • KDE Gear 6 has not yet arrived in the ports tree

    Related Ports

    The KDE ecosystem includes a wide range of ports — most maintained by kde@, all
    building on a shared base of Qt and KDE Frameworks. The KDE team updates them all as needed. This quarter the KDE team would like to thank Tobias C. Berner, Gleb Popov and Jason E. Hale again for keeping things up-to-date.

    ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

    FreeBSD Erlang Ecosystem Ports update

    Links:
    FreeBSD Erlang wiki URL: https://wiki.freebsd.org/Erlang
    Erlang/OTP language URL: https://erlang.org/
    Elixir language URL: https://elixir-lang.org/
    Gleam language URL: https://gleam.run/

    Contact: FreeBSD Erlang mailing list <erlang@FreeBSD.org>

    The Erlang runtime system, commonly known as the BEAM, provides a runtime that is used by a number of programming languages and applications in the FreeBSD ports collection.

    Notable changes in 2024 include:

    • adding OTP27, the latest Erlang runtime release, Elixir 1.17, and Gleam
    1.20

    • more than 57 point release updates so far in 2024

    • improved inline documentation within Erlang ports

    • moved RabbitMQ port to the generic UNIX build, decoupling this from Elixir
    as a build-time dependency. This enables moving RabbitMQ to the latest
    supported release. Users of RabbitMQ need to update each quarter to avoid
    being stuck on an unsupported release of Erlang/OTP + RabbitMQ

    Note that as the upstream Erlang OTP team only commit to supporting the two latest major releases, more and more point updates are arriving for OTP26-27, but not for the older Erlang runtime releases, which are now unlikely to get security and bug fixes.

    During 2024Q3, the Erlang team is planning to:

    • migrate the base lang/erlang port to OTP26 and update related dependencies

    Additional testing and community contributions are welcome, please reach out on the mailing list, especially if you are able to help testing of specific port updates.

    ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

    Third Party Projects

    Many projects build upon FreeBSD or incorporate components of FreeBSD into their project. As these projects may be of interest to the broader FreeBSD community, we sometimes include brief updates submitted by these projects in our quarterly report. The FreeBSD project makes no representation as to the accuracy or veracity of any claims in these submissions.

    Containers and FreeBSD: Pot, Potluck and Potman

    Links:
    Pot organization on GitHub URL: https://github.com/bsdpot

    Contact: Luca Pizzamiglio (Pot) <pizzamig@FreeBSD.org>
    Contact: Bretton Vine (Potluck) <bv@honeyguide.eu>
    Contact: Michael Gmelin (Potman) <grembo@FreeBSD.org>

    Pot is a jail management tool that also supports orchestration through Nomad. Potluck aims to be to FreeBSD and Pot what Dockerhub is to Linux and Docker: a repository of Pot flavours and complete container images for usage with Pot and in many cases Nomad.

    During this quarter, there were no new Pot releases.

    Potluck images saw some updates again though. All images have been rebuilt for the new quarterly packages, a new Opensearch container has been added. Additional features, updates and fixes have been committed to containers like PostgreSQL-Patroni or Nomad-Server-TLS.

    In total, there are 58 container images and templates available now.

    As always, feedback and patches are welcome.

    Sponsors: Nikulipe UAB, Honeyguide Group

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)