EPEL epel beta report: 20140110 changes
Compose started at Fri Jan 10 19:00:03 UTC 2014 Broken deps for x86_64 -- fedora-packager-0.5.10.1-3.el7.noarch requires ykpers fedora-packager-0.5.10.1-3.el7.noarch requires packagedb-cli fedora-packager-0.5.10.1-3.el7.noarch requires fedpkg = 0:1.0 fedora-packager-0.5.10.1-3.el7.noarch requires bodhi-client koji-builder-1.8.0-2.el7.noarch requires pycdio koji-vm-1.8.0-2.el7.noarch requires python-virtinst mock-1.1.35-1.el7.noarch requires pigz python-fedora-flask-0.3.32.3-3.el7.noarch requires python-flask-wtf python-fedora-flask-0.3.32.3-3.el7.noarch requires python-flask python-fedora-turbogears-0.3.32.3-3.el7.noarch requires python-feedparser python-fedora-turbogears-0.3.32.3-3.el7.noarch requires python-bugzilla python-fedora-turbogears2-0.3.32.3-3.el7.noarch requires python-mako0.4 = 0:0.3.6 Broken deps for ppc64 -- TurboGears-1.1.3-8.el7.noarch requires python-simplejson = 0:1.9.1 fedora-packager-0.5.10.1-3.el7.noarch requires ykpers fedora-packager-0.5.10.1-3.el7.noarch requires packagedb-cli fedora-packager-0.5.10.1-3.el7.noarch requires fedpkg = 0:1.0 fedora-packager-0.5.10.1-3.el7.noarch requires bodhi-client koji-builder-1.8.0-2.el7.noarch requires pycdio koji-vm-1.8.0-2.el7.noarch requires python-virtinst mock-1.1.35-1.el7.noarch requires pigz python-django-1.5.4-2.el7.noarch requires python-simplejson python-fedora-0.3.32.3-3.el7.noarch requires python-simplejson python-fedora-0.3.32.3-3.el7.noarch requires python-requests python-fedora-flask-0.3.32.3-3.el7.noarch requires python-flask-wtf python-fedora-flask-0.3.32.3-3.el7.noarch requires python-flask python-fedora-turbogears-0.3.32.3-3.el7.noarch requires python-feedparser python-fedora-turbogears-0.3.32.3-3.el7.noarch requires python-bugzilla python-fedora-turbogears2-0.3.32.3-3.el7.noarch requires python-mako0.4 = 0:0.3.6 python-toscawidgets-0.9.12-4.el7.noarch requires python-simplejson python-turbojson-1.3.2-5.el7.noarch requires python-simplejson = 0:1.9.1 python-tw2-core-2.1.5-4.el7.noarch requires python-simplejson = 0:2.0 python-webflash-0.1-0.8.a9.el7.noarch requires python-simplejson New package: TurboGears-1.1.3-8.el7 Back-to-front web development in Python New package: TurboGears2-2.3.0-0.2.git6da6959.el7 Next generation front-to-back web development megaframework New package: mock-1.1.35-1.el7 Builds packages inside chroots New package: python-cheetah-2.4.4-4.el7 Template engine and code generator New package: python-fedora-0.3.32.3-3.el7 Python modules for talking to Fedora Infrastructure Services New package: python-markdown-2.2.1-3.el7 Markdown implementation in Python New package: python-ordereddict-1.1-6.el7 Implementation of Python 2.7's OrderedDict New package: python-paver-1.2.1-1.el7 Python-based build/distribution/deployment scripting tool New package: python-repoze-tm2-1.0-0.12.b1.el7 Zope-like transaction manager via WSGI middleware New package: python-routes-1.13-2.el7 Rails-like routes for Python New package: python-speaklater-1.3-1.el7 Implements a lazy string for python useful for use with get-text New package: python-transaction-1.4.1-1.el7 Transaction management for Python New package: python-tw2-core-2.1.5-4.el7 Web widget creation toolkit based on TurboGears widgets New package: python-tw2-forms-2.1.4.1-4.el7 Forms for ToscaWidgets2 New package: python-unittest2-0.5.1-6.el7 Backport of new unittest features for Python 2.7 to Python 2.4+ New package: python-webob-1.2.3-8.el7 WSGI request and response object New package: python-zope-exceptions-4.0.5-2.el7 Zope Exceptions New package: python-zope-sqlalchemy-0.7.2-1.el7 Minimal Zope/SQLAlchemy transaction integration New package: python-zope-testing-4.1.2-1.el7 Zope Testing Framework Summary: Added Packages: 19 Removed Packages: 0 Modified Packages: 0 ___ epel-devel mailing list epel-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/epel-devel
EPEL epel beta report: 20140110 changes
Compose started at Fri Jan 10 22:50:47 UTC 2014 Broken deps for x86_64 -- fedora-packager-0.5.10.1-3.el7.noarch requires packagedb-cli fedora-packager-0.5.10.1-3.el7.noarch requires bodhi-client fedpkg-1.15-1.el7.noarch requires bodhi-client koji-vm-1.8.0-2.el7.noarch requires python-virtinst python-fedora-flask-0.3.32.3-3.el7.noarch requires python-flask python-fedora-turbogears2-0.3.32.3-3.el7.noarch requires python-mako0.4 = 0:0.3.6 python-tgcaptcha2-0.2.0-5.el7.noarch requires tulrich-tuffy-fonts Broken deps for ppc64 -- TurboGears-1.1.3-8.el7.noarch requires python-simplejson = 0:1.9.1 fedora-packager-0.5.10.1-3.el7.noarch requires packagedb-cli fedora-packager-0.5.10.1-3.el7.noarch requires bodhi-client fedpkg-1.15-1.el7.noarch requires bodhi-client koji-vm-1.8.0-2.el7.noarch requires python-virtinst python-django-1.5.4-2.el7.noarch requires python-simplejson python-fedora-0.3.32.3-3.el7.noarch requires python-simplejson python-fedora-0.3.32.3-3.el7.noarch requires python-requests python-fedora-flask-0.3.32.3-3.el7.noarch requires python-flask python-fedora-turbogears2-0.3.32.3-3.el7.noarch requires python-mako0.4 = 0:0.3.6 python-tgcaptcha2-0.2.0-5.el7.noarch requires tulrich-tuffy-fonts python-toscawidgets-0.9.12-4.el7.noarch requires python-simplejson python-turboflot-0.7.0-4.el7.noarch requires python-simplejson python-turbojson-1.3.2-5.el7.noarch requires python-simplejson = 0:1.9.1 python-tw2-core-2.1.5-4.el7.noarch requires python-simplejson = 0:2.0 python-webflash-0.1-0.8.a9.el7.noarch requires python-simplejson New package: fedpkg-1.15-1.el7 Fedora utility for working with dist-git New package: libyubikey-1.11-1.el7 C library for decrypting and parsing Yubikey One-time passwords New package: pigz-2.2.5-2.el7 Parallel implementation of gzip New package: pycdio-0.19-1.el7 A Python interface to the CD Input and Control library New package: python-TurboMail-3.0.3-4.el7 Multi-threaded mail queue manager for TurboGears applications New package: python-bugzilla-0.9.0-1.el7 A python library for interacting with Bugzilla New package: python-feedparser-5.1.3-3.el7 Parse RSS and Atom feeds in Python New package: python-flask-wtf-0.8-2.el7 Simple integration of Flask and WTForms New package: python-mako-0.7.3-1.el7 Mako template library for Python New package: python-tgcaptcha2-0.2.0-5.el7 TurboGears captcha plugin New package: python-turboflot-0.7.0-4.el7 A TurboGears widget for Flot, a jQuery plotting library New package: python-werkzeug-0.9.1-1.el7 The Swiss Army knife of Python web development New package: python-wtforms-1.0.2-2.el7 Forms validation and rendering library for python New package: ykpers-1.14.1-1.el7 Yubikey personalization program Summary: Added Packages: 14 Removed Packages: 0 Modified Packages: 0 ___ epel-devel mailing list epel-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/epel-devel
EPEL Fedora 6 updates-testing report
The following Fedora EPEL 6 Security updates need testing: Age URL 629 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-5620/bugzilla-3.4.14-2.el6 143 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2013-11274/ssmtp-2.61-21.el6 85 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2013-11865/quassel-0.9.1-1.el6 58 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2013-12079/bip-0.8.9-1.el6 22 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2013-12427/seamonkey-2.21-3.esr2.el6 7 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-0026/x2goserver-4.0.1.10-1.el6 0 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-0110/drupal7-entity-1.3-1.el6 0 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-0105/strongswan-5.1.1-4.el6 The following builds have been pushed to Fedora EPEL 6 updates-testing chrony-1.25-4.el6 cmake-fedora-1.2.3-1.el6 datagrepper-0.3.0-1.el6 docker-io-0.7.5-1.el6 drupal7-cck-3.0-0.1.alpha3.el6 drupal7-crumbs-2.0-0.6.beta13.el6 drupal7-date-2.7-1.el6 gfal2-2.4.8-1.el6 opendnssec-1.4.3-1.el6 php-horde-Horde-SessionHandler-2.2.3-1.el6 php-horde-Horde-Text-Filter-Csstidy-2.0.1-1.el6 python-fedmsg-meta-fedora-infrastructure-0.2.5-1.el6 python-libturpial-1.1.16-2.el6 python-rsa-3.1.1-5.el6 ruby-libvirt-0.5.2-2.el6 Details about builds: chrony-1.25-4.el6 (FEDORA-EPEL-2014-0119) An NTP client/server Update Information: This update adds support for Linux kernel 3.0 and newer, and fixes chronyd service status when NTP servers from DHCP are added. ChangeLog: * Fri Jan 10 2014 Miroslav Lichvar mlich...@redhat.com 1.25-4 - support recent kernels (#982803) - return chronyc exit code in init script (#827466) References: [ 1 ] Bug #827466 - chronyd service shows wrong startup status https://bugzilla.redhat.com/show_bug.cgi?id=827466 [ 2 ] Bug #982803 - Chrony 1.25 does not support kernels 3.0+ and will not start. https://bugzilla.redhat.com/show_bug.cgi?id=982803 cmake-fedora-1.2.3-1.el6 (FEDORA-EPEL-2014-0134) CMake helper modules for fedora developers Update Information: - Resolves Bug 1040333 - RFE: Suiport .gitignore file as source of CPACK_SOURCE_IGNORE_FILES - Resolves Bug 1046213 - RFE: RPM ChangeLog should be generated by newest build from koji - Enhancement: + ChangeLog.prev is no longer required. + RPM-ChangeLog.prev is provide by koji now. + cmake-fedora-koji: - new subcommand: newest-build and newest-changelog. + cmake-fedora-changelog: new script. + New targets: - tag_push: Push to git. + ManageFile: - Add absolute file support - MANAGE_FILE_INSTALL: Add TARGETS support. - MANAGE_FILE_INSTALL: Add RENAME support. - GIT_GLOB_TO_CMAKE_REGEX: Convert git glob to cmake regex + ManageArchive: - PACK_SOURCE_CPACK: Pack with CPack - PACK_SOURCE_ARCHIVE: Now can specify OUTPUT_FILE. - SOURCE_ARCHIVE_CONTENTS_ADD: Add file to source archive. - SOURCE_ARCHIVE_CONTENTS_ADD_NO_CHECK: Add file to source archive without checking. + ManageDependency: Manage dependencies. + ManageRPM: - PACK_RPM: New options: SPEC_IN and SPEC. - RPM_SPEC_STRING_ADD: Add a string to SPEC string. - RPM_SPEC_STRING_ADD_DIRECTIVE: Add a directive to SPEC string. - RPM_SPEC_STRING_ADD_TAG: Add a string to SPEC string. + ManageString: - STRING_APPEND: Append a string to a variable. - STRING_PADDING: Padding the string to specified length - STRING_PREPEND: Prepend a string to a variable. + ManageTranslation: - MANAGE_GETTEXT: + Can specify MSGFMT_OPTIONS and MSGMERGE_OPTIONS + Add gettext-devel to BUILD_REQUIRES. + ManageVariable: - VARIABLE_TO_ARGN: Merge the variable and options to the form of ARGN. + Cached variables: - RPM_SPEC_CMAKE_FLAG: cmake flags in rpm build. - RPM_SPEC_MAKE_FLAG: make flags in rpm build. - Changed Modules: + ManageArchive: - PACK_SOURCE_ARCHIVE: Can now pass either empty, outputDir, or source File. + ManageGConf2: Fixed. + ManageString: STRING_SPLIT: New Option: ALLOW_EMPTY + ManageRPM - Add support of pre, post, and preun + ManageVariable: - VARIABLE_PARSE_ARGN can now handle multiple-appeared options. - Changed: + CMake policy no longer enforced by default. + ManageString: STRING_SPLIT is changed
Orphaning few java packages
I'm just about to orphan few packages due to not using them and not having time to properly maintain them: * eclipse-subclipse - pretty active upstream but as I don't use it updates are delayed and I haven't tried it in months * sqljet - dependency of svnkit which was dependency(disabled now due to build problems with svnkit) of eclipse-subclipse * umlgraph - it was only a BR for something which I don't even remember what If someone wants to pick some of the packages you're more than welcome. I'm going to orphan only rawhide but if you would like to maintain the released versions too let me know. Alexander Kurtakov Red Hat Eclipse team -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Orphaning few java packages
And I forgot one: * eclipse-cmakeed - haven't seen upstream release in quite sometime, seems the project is not really active anymore Alexander Kurtakov Red Hat Eclipse team - Original Message - From: Aleksandar Kurtakov akurt...@redhat.com To: Development discussions related to Fedora devel@lists.fedoraproject.org Sent: Friday, January 10, 2014 10:29:09 AM Subject: Orphaning few java packages I'm just about to orphan few packages due to not using them and not having time to properly maintain them: * eclipse-subclipse - pretty active upstream but as I don't use it updates are delayed and I haven't tried it in months * sqljet - dependency of svnkit which was dependency(disabled now due to build problems with svnkit) of eclipse-subclipse * umlgraph - it was only a BR for something which I don't even remember what If someone wants to pick some of the packages you're more than welcome. I'm going to orphan only rawhide but if you would like to maintain the released versions too let me know. Alexander Kurtakov Red Hat Eclipse team -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Orphaning few java packages
On Fri, Jan 10, 2014 at 9:29 AM, Aleksandar Kurtakov akurt...@redhat.comwrote: * sqljet - dependency of svnkit which was dependency(disabled now due to build problems with svnkit) of eclipse-subclipse I've just taken sqljet (as a dependency of OmegaT) before reading this. Which build problem svnkit has? It's another BR for OmegaT. -- Ismael Olea http://olea.org/diario/ -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Orphaning few java packages
- Original Message - From: Ismael Olea ism...@olea.org To: Development discussions related to Fedora devel@lists.fedoraproject.org Sent: Friday, January 10, 2014 11:17:17 AM Subject: Re: Orphaning few java packages On Fri, Jan 10, 2014 at 9:29 AM, Aleksandar Kurtakov akurt...@redhat.com wrote: * sqljet - dependency of svnkit which was dependency(disabled now due to build problems with svnkit) of eclipse-subclipse I've just taken sqljet (as a dependency of OmegaT) before reading this. Which build problem svnkit has? It's another BR for OmegaT. The svnkit was 2 parts the pure java lib and the eclipse plugin/feature last I checked the problem was with building the later but I don't have the time to dig deeper into this. So svnkit was fine for java usage but not for being used in eclipse-subclipse. Alexander Kurtakov Red Hat Eclipse team -- Ismael Olea http://olea.org/diario/ -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Unannounced soname bump: satyr (libsatyr.so.2 - libsatyr.so.3) - affects libreport and abrt
On Wed, Jan 08, 2014 at 18:22:18 -0800, Adam Williamson wrote: The 'satyr' package in Rawhide was bumped from 0.12 to 0.13 yesterday. This bumps the library's soname from libsatyr.so.2 to libsatyr.so.3 . This was not announced on devel@, as it is supposed to be (or the person doing the bump must immediately handle rebuilds of all dependent packages). abrt and libreport both depend on libsatyr.so.2. libreport has been rebuilt, but abrt has not. I have tried rebuilding abrt (bumping to 2.1.11 - another packaging mistake here is that 2.1.11 has been built for Fedora 20 before Rawhide, breaking the upgrade path), and it compiles fine, but the test suite fails: http://koji.fedoraproject.org/koji/getfile?taskID=6377189name=build.logoffset=-4000 ## --- ## ## abrt 2.1.11 test suite. ## ## --- ## kernel oops parser 1: koops_extract_version FAILED (koops-parser.at:5) 2: koops_tainted_short FAILED (koops-parser.at:51) 3: koops_hash_improve FAILED (koops-parser.at:121) 4: koops_parser_sanity FAILED (koops-parser.at:167) python hook 5: pyhook_zerodiv ok 6: pyhook_indent ok ignored problems 7: ignored_problems_allFAILED (ignored_problems.at:5) Until someone who can fix abrt does so, Rawhide users will not be able to update satyr (and hence libreport) and nightly live composes will all fail, as they all include abrt. Once again, folks, please co-ordinate your soname bumps. I apologize. While I notified the abrt/libreport maintainer about the bump, I should have made sure that the abrt/libreport build was ready to be done immediately after satyr build. Martin -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
[Base] Base Design WG agenda meeting 10. Jan 2014 15:00 UTC on #fedora-meeting
Apologies for the late announcement for the meeting today, i've been away the past 2 weeks and work has accumulated quite a bit and i just didn't get to send it out before. Not much of an agenda for today anyway. Agenda: - Buildreq cleanup updates and further discussion/actions - Inter WG topic: Stable application runtimes - Open floor See you later! Thanks regards, Phil -- Philipp Knirsch | Tel.: +49-711-96437-470 Manager Core Services| Fax.: +49-711-96437-111 Red Hat GmbH | Email: Phil Knirsch pknir...@redhat.com Wankelstrasse 5 | Web: http://www.redhat.com/ D-70563 Stuttgart, Germany -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: dnf versus yum
On Fri, Jan 10, 2014 at 1:04 AM, Kevin Kofler kevin.kof...@chello.at wrote: Bill Nottingham wrote: Matthew Miller (mat...@fedoraproject.org) said: I'm a little lost in the thread, but do you mean that yum's protected packages functionality is undocumented? If that is what you mean, check the man page. It says: protected_packages This is a list of packages that yum should never completely remove. They are protected via Obsoletes as well as user/plugin removals. The default is: yum glob:/etc/yum/protected.d/*.conf So any packages which should be protected can do so by including a file in /etc/yum/protected.d with their package name in it. Also if this configuration is set to anything, then yum will protect the package corresponding to the running version of the kernel. While documented, I do find this last bit of behavior extremely odd and non-intuitive. (And hardcoded, no less.) There should just be a separate protect_running_kernel boolean option, which would default to the above odd behavior for compatibility if not set (but explicitly setting it to either 1 or 0 would override that either way). Can't the kernel package itself do that ? I'm thinking about the %preun section (maybe %pretrans ?) where the package would know it's being removed, and could find out whether it's the running kernel. One might also want to build a distribution on top of yum/rpm but choose a different name for the kernel package like linux or linux-kernel. Dridi Kevin Kofler -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Move of freetype's header files
As of freetype 2.5.1, freetype's upstream has moved all header files from /usr/include/freetype/freetype2/ and /usr/include/ft2build.h to /usr/include/freetype2/. I plane to push freetype 2.5.2 to master at the end of the next week (#1034065). If your packages use freetype as documented then you are ok but in opposite case you'll need to change the path (see http://lists.nongnu.org/archive/html/freetype-devel/2013-11/msg00074.html). I've created a scratch build of the new freetype, you can get it here: http://koji.fedoraproject.org/koji/taskinfo?taskID=6384445 or here: http://mkasik.fedorapeople.org/freetype-2.5.2/ Regards Marek ___ devel-announce mailing list devel-annou...@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel-announce -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Inter-WG coordination: Stable application runtimes
I'm sorry, but you're forgetting one major thing. Sure there are lots of developers that ignore best practices. There is nothing new. But there is also a lot of users that do understand best practices and do want the apps packaged in a clean way. The apps are not packaged because the developers wanted them packaged they are packaged because users wanted them. The opinion of developers on deployment issues is, frankly, 100% irrelevant. The vast mass of developers that don't want to think about deployment issues are not the people you should base your decisions about deployment on. The developers that did think about the problem, do not react as the people you take as example. They have the option to ignore distro packaging, and they are execising it, and they complain that users are not happy about it, but repainting deployment in developer colors when that is not what the users ask for is not going to make anyone happy. The user will complain about a result that does not match his expectations and think the distro sucks. The developer will complain users still complains and consider the distro still suck. End result: a lot of work for no one happy. All the energy expended on scl and making developer-friendly deployments is like asking designers to correct application code, coders to make design decisions, marketing people to make engineering decisions or engineers to behave as salespeople. All those are different jobs. All those require prioritising different elements. -- Nicolas Mailhot -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
acceptability of updates-testing breakage vs. rawhide breakage
On Thu, Jan 09, 2014 at 10:42:33AM -0800, Adam Williamson wrote: On Thu, 2014-01-09 at 10:13 -0500, Chuck Anderson wrote: This appears to have also broken Fedora 19 updates-testing, which is even less acceptable than breaking rawhide. Eh, I'd suggest not. updates-testing is actually explicitly meant as a place to catch this kind of problem, whereas we're trying to keep Rawhide rolling and especially try not to break nightly image generation. At least we can vote broken things in updates-testing down. Wow, really? updates-testing is allowed to be more broken than rawhide? So why don't we just do all development in updates-testing, and don't push these changes to rawhide until they pass the updates-testing karma? This is not how I understand these things should work. I think this attitude will push even fewer people to run with updates-testing enabled. -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: acceptability of updates-testing breakage vs. rawhide breakage
Am 10.01.2014 15:56, schrieb Chuck Anderson: On Thu, Jan 09, 2014 at 10:42:33AM -0800, Adam Williamson wrote: On Thu, 2014-01-09 at 10:13 -0500, Chuck Anderson wrote: This appears to have also broken Fedora 19 updates-testing, which is even less acceptable than breaking rawhide. Eh, I'd suggest not. updates-testing is actually explicitly meant as a place to catch this kind of problem, whereas we're trying to keep Rawhide rolling and especially try not to break nightly image generation. At least we can vote broken things in updates-testing down. Wow, really? updates-testing is allowed to be more broken than rawhide? So why don't we just do all development in updates-testing, and don't push these changes to rawhide until they pass the updates-testing karma? This is not how I understand these things should work. I think this attitude will push even fewer people to run with updates-testing enabled normally nothing should be broken and if it has to be fixed i run updates-testing daily on all of my non-production machines for years and in case of for me really interesting packages i take them straight from koji signature.asc Description: OpenPGP digital signature -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: dnf versus yum
On 01/09/2014 07:23 PM, Reindl Harald wrote: Am 09.01.2014 22:16, schrieb Przemek Klosowski: By the way, currently the protected list seems to be 'yum, systemd and running kernel'. I don't have a system to try it on what about the machine you sitting in front of? without -y flag yum asks if you mean your input serious OK, I just wasn't not man enough to try it :). I was planning to set up a test machine to check it but didn't have time yet. so I just hope that one can't delete their dependencies either (glibc? what else?) if you think one second about dependencies are solved you know what happens Obviously, glibc is a dependence of pretty much everything---my point was that there are many other implicit and explicit dependencies. For instance, the entire /boot/grub2/i386-pc directory, which is not owned by any package but originates from grub. I think you can still brick the system with careless yum erases: for instance, deleting grub how would this delete the bootloader in the MBR? you do not need the grub-package installed to have a bootloader MBR is just first stage loader---not enough to bring up the system, necessarily. This is tricky: the second stage is owned by grub2 in /usr/lib/grub, and somehow transferred to /boot/grub2 but I am not sure how---the files in /boot/grub2/i386-pc are not owned by any package, so I think you're right that removing grub would not disable the system. Again, I am not man enough to try it on my work desktop. -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Inter-WG coordination: Stable application runtimes
tor 2014-01-09 klockan 20:30 -0800 skrev Andrew Lutomirski: It would be nice, at least, if there was a clean way for these stacks to be tracked and, if needed, uninstalled. Some of these things install into /usr, which is a giant mess. (Pip, the one I use the most, doesn't do that IIRC, but it's still annoying that, if I install a package with pip, that package *automatically*, *without prompting*, and (I think) without verifying signatures or any sort, will pull in dependencies from pypi that could be satisfied by yum. If I then install the yum version, I end up in a weird state. There are systems like virtualenv (python) and local::env (perl) that mirror the base distro in a separate directory and then let the user install modules and apps on top, without touching the distro-controlled directories. This is in my opinion the only sane way to use pip and CPAN, but in can be improved: What happens if you add/remove/update a distro package after creating a virtualenv? Add and update might be ok, but remove will quite likely break the app. What about apps that use more than one stack? Can a unified tool that mirror the whole distro be created? It might be as simple as combining the existing tools for each stack. Sane defaults for directories: I've found that when using virtualenv to install a web app, SELinux will complain less if you put the base directory somewhere in /var/www. What is the right place to put these stacks? Codify this in the packaging and in SELinux so that it just works. I'd like some way (maybe using something like mock) to manage these things in a somewhat sandboxed way. Docker is trying to do this, but I think it's the wrong approach for a lot of use cases, and its nowhere near ready for prime time. But once you've considered every aspect (for example my points above), you've basically reinvented Docker anyway. /Alexander -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: dnf versus yum
On Fri, Jan 10, 2014 at 2:50 PM, Dridi Boukelmoune dridi.boukelmo...@gmail.com wrote: On Fri, Jan 10, 2014 at 1:04 AM, Kevin Kofler kevin.kof...@chello.at wrote: Bill Nottingham wrote: Matthew Miller (mat...@fedoraproject.org) said: I'm a little lost in the thread, but do you mean that yum's protected packages functionality is undocumented? If that is what you mean, check the man page. It says: protected_packages This is a list of packages that yum should never completely remove. They are protected via Obsoletes as well as user/plugin removals. The default is: yum glob:/etc/yum/protected.d/*.conf So any packages which should be protected can do so by including a file in /etc/yum/protected.d with their package name in it. Also if this configuration is set to anything, then yum will protect the package corresponding to the running version of the kernel. While documented, I do find this last bit of behavior extremely odd and non-intuitive. (And hardcoded, no less.) There should just be a separate protect_running_kernel boolean option, which would default to the above odd behavior for compatibility if not set (but explicitly setting it to either 1 or 0 would override that either way). Can't the kernel package itself do that ? I'm thinking about the %preun section (maybe %pretrans ?) where the package would know it's being removed, and could find out whether it's the running kernel. One might also want to build a distribution on top of yum/rpm but choose a different name for the kernel package like linux or linux-kernel. This reminds me that yum is built on top of rpm, and rpm doesn't mean linux. I remember my first time on AIX, and the surprising (yet unpleasant) fact that I had to use (a very old version of) rpm. From rpm.org: RPM is a core component of many Linux distributions, such as Red Hat Enterprise Linux, the Fedora Project, SUSE Linux Enterprise, openSUSE, CentOS, Meego, Mageia and many others. It is also used on many other operating systems as well From rpm5.org: But RPM is also used for software packaging on many other Unix operating systems like FreeBSD, Sun OpenSolaris, IBM AIX and Apple Mac OS X through the cross-platform Unix software distribution OpenPKG. I actually remember a comparison matrix of OpenSolaris forks, some of them chose /rpm5?/ for package management, but I can't find a link. I do understand why people would want such features built-in, but it seems a bit short-sighted. And by short-sighted I don't mean a bad idea, I mean restricted to Fedora/RHEL and very close distributions. I don't know yum's goals, but the man page yum(8) and the faq don''t seem to mention any tight coupling to rhel-like linux distribution. Again, I'm not saying this would be a bad thing. AFAICT yum is tied *by essence* to rhel, but I'm also wondering what upstream thinks about portability, because the whole kernel issue is a portability no-no. Dridi Kevin Kofler -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: acceptability of updates-testing breakage vs. rawhide breakage
Chuck Anderson wrote, at 01/10/2014 11:56 PM +9:00: On Thu, Jan 09, 2014 at 10:42:33AM -0800, Adam Williamson wrote: On Thu, 2014-01-09 at 10:13 -0500, Chuck Anderson wrote: This appears to have also broken Fedora 19 updates-testing, which is even less acceptable than breaking rawhide. Eh, I'd suggest not. updates-testing is actually explicitly meant as a place to catch this kind of problem, whereas we're trying to keep Rawhide rolling and especially try not to break nightly image generation. At least we can vote broken things in updates-testing down. Wow, really? updates-testing is allowed to be more broken than rawhide? So why don't we just do all development in updates-testing, and don't push these changes to rawhide until they pass the updates-testing karma? This is not how I understand these things should work. I think this attitude will push even fewer people to run with updates-testing enabled. Exactly. Such possibly-breaking tests must be done on rawhide first, not after on testing on stable branch, and at least the package maintainer must get confident that enough tests are done on rawhide before pushing such packages into testing on stable branch. That testing on stable branch is more broken than rawhide is not Fedora users or developers expect. Regards, Mamoru -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: dnf versus yum
Am 10.01.2014 16:49, schrieb Dridi Boukelmoune: I actually remember a comparison matrix of OpenSolaris forks, some of them chose /rpm5?/ for package management, but I can't find a link. I do understand why people would want such features built-in, but it seems a bit short-sighted. And by short-sighted I don't mean a bad idea, I mean restricted to Fedora/RHEL and very close distributions. I don't know yum's goals, but the man page yum(8) and the faq don''t seem to mention any tight coupling to rhel-like linux distribution. Again, I'm not saying this would be a bad thing. AFAICT yum is tied *by essence* to rhel, but I'm also wondering what upstream thinks about portability, because the whole kernel issue is a portability no-no in that case the approach to have it as plugin is absolutely fine * but this plugin should be available at the same time YUM is replaced by DNF * it should be in the default install I only have a problem with *could* be implemented while try to replace something which *has* it implemented, this would be a step backwards from the users point of view insteda a improvement not more, not less signature.asc Description: OpenPGP digital signature -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
[Base] Fedora Base Design Working Group (2014-01-10) meeting minutes and logs
Mainly focused on next steps for the BR cleanup followed by a discussion about containers and moving over towards definition of Base again. Meeting ended Fri Jan 10 16:53:34 2014 UTC. Information about MeetBot at http://wiki.debian.org/MeetBot . Minutes: http://meetbot.fedoraproject.org/fedora-meeting/2014-01-10/fedora_base_design_working_group.2014-01-10-15.01.html Minutes (text): http://meetbot.fedoraproject.org/fedora-meeting/2014-01-10/fedora_base_design_working_group.2014-01-10-15.01.txt Log: http://meetbot.fedoraproject.org/fedora-meeting/2014-01-10/fedora_base_design_working_group.2014-01-10-15.01.log.html Thanks regards, Phil -- Philipp Knirsch | Tel.: +49-711-96437-470 Manager Core Services| Fax.: +49-711-96437-111 Red Hat GmbH | Email: Phil Knirsch pknir...@redhat.com Wankelstrasse 5 | Web: http://www.redhat.com/ D-70563 Stuttgart, Germany -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Review swap: python-patsy
Hi, I have this review https://bugzilla.redhat.com/show_bug.cgi?id=1051254 Its python-patsy, to use R like formula language in Python I will review other package in return. Thanks, Sergio -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Inter-WG coordination: Stable application runtimes
On Thu, Jan 09, 2014 at 07:58:44PM -0800, Adam Williamson wrote: So the question becomes, what is it appropriate for a distribution to do in this situation? My personal opinion is that what's appropriate for a distribution to do is also, happily, what's easiest for a distribution to do: punt on it. Entirely punt on the whole thing. I agree with everything you write, except for your conclusion. Or, maybe it's a matter of semantics. Either way, I think the *Fedora Project* can't afford to punt. Here's my reasoning... First, here's our mission: The Fedora Project's mission is to lead the advancement of free and open source software and content as a collaborative community. That might be a bit lofty -- not to mention ultimately vague and unmeasurable -- but it clearly sets our objective as beyond just the lower levels of a base distribution. Clearly, producing a distribution is our primary output, but we shouldn't lose sight and start thinking that what we do is the goal in and of itself. So much of the interest and enthusiasm and shear time spent in the free / open source software world is in these software stack layers and applications built on them that in order approach the mission at all we need to at least have something meant to address them. Second, if we did decide to constrict the mission to something more pragmatic and distribution-focused (like the original Fedora Project mission, inherited directly from the short-lived Red Hat Linux Project), we'd be writing ourselves into obscurity. The base Linux distribution is becoming a commodity. When I was at the Amazon web services conference last year, I asked dozens of people why they were using the Linux distribution they were, and the overwhelming answer was Oh, I actually don't care. Now, we can certainly do things to improve our production of the commodity... but, really, where's the fun in limiting ourselves to that? The interesting problems are higher up. (Not to say that everything is solved at the base layer, of course. There's still a lot going on -- this year and last, for example, it's all about containers... which of course very quickly ties back into needing something to go in those containers, and this whole higher-level question.) I said I agree with you, and one particular place I agree is that we can't come up with and dictate a Single Bundled Stack Deployment Mechanism To Rule Them All (SBSDMTRTA?). That *is* something that's part of the higher-up ecosystems. However, we need to find better ways to support and interface with those ecosystems -- that's where we can make Fedora (both the distro and the project) really compelling in the future. And, this ultimately makes a better experience for users, because if Fedora's included tools are aware of the native packaging system, we can do things like system auditing, security alerts (if not updates), maybe even integration with selinux policy. Basically, we don't hammer all of the possible universe into the distribution model, and we don't include all of the packages of everything in the base Fedora distribution as RPMs, but we do include those ecosystems in the Fedora _Project_, including the tools and documentation to make them feel natural. And, if people in the project do want to keep hammering things into RPMs -- fine, no reason to stop what some people clearly believe is still useful. Likewise, if people want to come up with other novel ways of approaching the problem, like SCLs or whatever else, I think we should find a space for it. Again, it doesn't need to be in the Fedora Distribution Per Se, but there should be room in *Fedora*. -- Matthew Miller-- Fedora Project--mat...@fedoraproject.org -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: acceptability of updates-testing breakage vs. rawhide breakage
On Sat, 2014-01-11 at 00:49 +0900, Mamoru TASAKA wrote: Chuck Anderson wrote, at 01/10/2014 11:56 PM +9:00: On Thu, Jan 09, 2014 at 10:42:33AM -0800, Adam Williamson wrote: On Thu, 2014-01-09 at 10:13 -0500, Chuck Anderson wrote: This appears to have also broken Fedora 19 updates-testing, which is even less acceptable than breaking rawhide. Eh, I'd suggest not. updates-testing is actually explicitly meant as a place to catch this kind of problem, whereas we're trying to keep Rawhide rolling and especially try not to break nightly image generation. At least we can vote broken things in updates-testing down. Wow, really? updates-testing is allowed to be more broken than rawhide? So why don't we just do all development in updates-testing, and don't push these changes to rawhide until they pass the updates-testing karma? This is not how I understand these things should work. I think this attitude will push even fewer people to run with updates-testing enabled. Exactly. Such possibly-breaking tests must be done on rawhide first, not after on testing on stable branch, and at least the package maintainer must get confident that enough tests are done on rawhide before pushing such packages into testing on stable branch. That testing on stable branch is more broken than rawhide is not Fedora users or developers expect. Things don't really work out this neatly in practice. Most packages diverge between rawhide and stable at some point. Especially a change like the one under discussion doesn't necessarily work fine in one branch just because it did in another. I was just disagreeing with Chuck's belief that it's massively worse to cause a relatively minor problem - it's not like this broke anyone's system - in updates-testing than in Rawhide. I don't see a major difference, really. -- Adam Williamson Fedora QA Community Monkey IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net http://www.happyassassin.net -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: dnf versus yum
On Thu, 2014-01-09 at 16:16 -0500, Przemek Klosowski wrote: On 01/09/2014 01:58 PM, Ian Malone wrote: Latest installed is almost exactly not what you want, I've had plenty (where plenty in this case is probably 5) of cases where a kernel update broke something, in quite a few of those cases to a state where the system wouldn't boot. If the most recent one is retained then you've still got a kernel, but not one that will actually run. With current behaviour I can still let my system update until a fix appears because I know it won't remove the good kernel. If updates can remove the running kernel then you have to watch each one carefully. Right, so if you run into a situation where you need to run an old kernel-0.99, you'd protect it with /etc/yum/protected.d/kernel-0.99.conf , assuming that yum allows specifying package version as well as the name. By the way, currently the protected list seems to be 'yum, systemd and running kernel'. I don't have a system to try it on, so I just hope that one can't delete their dependencies either (glibc? what else?). No, you can't. Any operation that results in the removal of a protected package is rejected. I think you can still brick the system with careless yum erases: for instance, deleting grub. Ooh, fun experiment. Let's see. yum happily lets me remove grub2, but I don't think it breaks boot: /boot/grub2/grub.cfg still exists after the removal, and it won't have deleted the copy in the MBR. I'll see what happens when I reboot. -- Adam Williamson Fedora QA Community Monkey IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net http://www.happyassassin.net -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Should /usr/bin/Xorg (still) be setuid-root?
Hi, On 01/09/2014 09:52 PM, Andrew Lutomirski wrote: On Thu, Jan 9, 2014 at 11:43 AM, Hans de Goede hdego...@redhat.com wrote: Hi, On 01/09/2014 12:09 AM, Andrew Lutomirski wrote: On Wed, Jan 8, 2014 at 2:58 PM, Peter Hutterer peter.hutte...@who-t.net wrote: On Wed, Jan 08, 2014 at 01:14:08PM -0800, Andrew Lutomirski wrote: /usr/bin/Xorg is, and has been, setuid-root just about forever. I'm wondering whether there's any good reason for it to remain setuid-root. http://fedoraproject.org/wiki/Changes/XorgWithoutRootRights This isn't actually the same thing. That proposal suggests running Xorg as a non-root user. I'm proposing dropping the setuid bit on the binary, which will have no effect on the uid of the running server. (Of course, my suggestion will interact w/ that change, since the process that starts Xorg will no longer be root.) I don't think that that will be very useful, it will likely cause more breakage then you think, as various display-managers may already start Xorg inside the user session, at which point the suid bit is needed, and as you already said it will break xinit and friends. This is an empirical question :) gdm on F20, at least, can still switch users with the setuid bit cleared. I'll try to test some more display managers. Well starting X inside the user session is necessary for the systemd-logind integration I'm working on, which in turn is necessary to be able to completely run X without any root rights at all. So this quite likely is going to be how X will be started in F-21. I hope it clears the bit -- I really don't like the fact that 'X :1' screws with the display. I'm not sure yet if it will clear the bit, I'm pretty sure I can get things to work without any root rights for kms drivers (not 100% sure yet), but ums drivers will fail hard without the suid bit, the ums part of this needs some thinking (and needs me to dig up a card actually using it). I might end up deciding to just kill ums support and then see what happens, but I would rather not, and if I get enough pushback I might revert on such a decision :) Regards, Hans -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Schedule for Wednesday's FESCo Meeting (2013-12-18)
On Fri, 2013-12-20 at 10:49 +0100, Michael Scherer wrote: Le mercredi 18 décembre 2013 à 21:40 +, Jóhann B. Guðmundsson a écrit : On mið 18.des 2013 21:20, Reindl Harald wrote: who do you think you are to claim whatever people are outside the community? Individual that tells that truth and shed's light how RH operates. Shed light on RH decide on its own how to spend their money without asking to others ? Or the truth of having job title not decided by the community ? Since you are not aware of it Red Hat invented the position of Fedora QA Community Manager ( I dont know who but I would very much like to meet that person ) and placed Adam in that position. Community manager != manager. Yes, the title doesn't express it quite well, create some confusions and I would suggest to people in similar position to use community gardener as Dave Neary told me once to emphasise the difference. *looks meaningfully at sig, which definitely does not contain the word manager* -- Adam Williamson Fedora QA Community Monkey IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net http://www.happyassassin.net -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Schedule for Wednesday's FESCo Meeting (2013-12-18)
On Fri, 2013-12-20 at 07:12 -0700, Kevin Fenzi wrote: This thread is no longer productive and is closed. I urge everyone to re-read our code of conduct: http://fedoraproject.org/code-of-conduct Sorry, missed that. If I can address the topic a bit, since someone seemed interested in my opinion: I see it much the way Kevin does - the process was documented in the Bugzappers space on the wiki, but even when Bugzappers was active it was usually actually performed by the Program Manager, and when Bugzappers went dormant, no-one in QA made any effort to look after the EOL process. I don't see it as something that's 'intrinsically' in QA's domain - in fact it makes more sense to me that it's something the program manager takes care of in a practical sense, and in a policy sense, it would seem to be split across multiple groups, as Kevin notes. It's certainly not just of interest to QA. -- Adam Williamson Fedora QA Community Monkey IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net http://www.happyassassin.net -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: dnf versus yum
On Fri, Jan 10, 2014 at 11:41:03AM -0800, Adam Williamson wrote: By the way, currently the protected list seems to be 'yum, systemd and running kernel'. I don't have a system to try it on, so I just hope that one can't delete their dependencies either (glibc? what else?). No, you can't. Any operation that results in the removal of a protected package is rejected. And, for whatever it may be worth, that was very much part of the original design intention -- to protect against carelessly removing things which are part of the dep chain for something critical, even though they look like they might be harmless to get rid of. -- Matthew Miller-- Fedora Project--mat...@fedoraproject.org -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: dnf versus yum
Am 10.01.2014 20:55, schrieb Matthew Miller: On Fri, Jan 10, 2014 at 11:41:03AM -0800, Adam Williamson wrote: By the way, currently the protected list seems to be 'yum, systemd and running kernel'. I don't have a system to try it on, so I just hope that one can't delete their dependencies either (glibc? what else?). No, you can't. Any operation that results in the removal of a protected package is rejected. And, for whatever it may be worth, that was very much part of the original design intention -- to protect against carelessly removing things which are part of the dep chain for something critical, even though they look like they might be harmless to get rid of anybody who managed to forcibly remove nss-softokn wile try to solve dependency problems with a hammer and after that find out that nearly *anything* on the system needs this package knows why * rpm is dead * yum is dead * sshd is dead in my case i managed it on that time by samba having a hidden root account* and restore each file manually because boot from live media and chroot did also no longer work (after chroot the same problems) after that you understand why things are protected and that you should hardly avoid try to bypass them until you are 1000% sure what you are doing and there is no other way * yes this is many years ago and these days i would setup a smb-root acccount only over my dead body signature.asc Description: OpenPGP digital signature -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Should /usr/bin/Xorg (still) be setuid-root?
On Fri, Jan 10, 2014 at 11:44 AM, Hans de Goede hdego...@redhat.com wrote: Hi, On 01/09/2014 09:52 PM, Andrew Lutomirski wrote: On Thu, Jan 9, 2014 at 11:43 AM, Hans de Goede hdego...@redhat.com wrote: Hi, On 01/09/2014 12:09 AM, Andrew Lutomirski wrote: On Wed, Jan 8, 2014 at 2:58 PM, Peter Hutterer peter.hutte...@who-t.net wrote: On Wed, Jan 08, 2014 at 01:14:08PM -0800, Andrew Lutomirski wrote: /usr/bin/Xorg is, and has been, setuid-root just about forever. I'm wondering whether there's any good reason for it to remain setuid-root. http://fedoraproject.org/wiki/Changes/XorgWithoutRootRights This isn't actually the same thing. That proposal suggests running Xorg as a non-root user. I'm proposing dropping the setuid bit on the binary, which will have no effect on the uid of the running server. (Of course, my suggestion will interact w/ that change, since the process that starts Xorg will no longer be root.) I don't think that that will be very useful, it will likely cause more breakage then you think, as various display-managers may already start Xorg inside the user session, at which point the suid bit is needed, and as you already said it will break xinit and friends. This is an empirical question :) gdm on F20, at least, can still switch users with the setuid bit cleared. I'll try to test some more display managers. Well starting X inside the user session is necessary for the systemd-logind integration I'm working on, which in turn is necessary to be able to completely run X without any root rights at all. So this quite likely is going to be how X will be started in F-21. I hope it clears the bit -- I really don't like the fact that 'X :1' screws with the display. I'm not sure yet if it will clear the bit, I'm pretty sure I can get things to work without any root rights for kms drivers (not 100% sure yet), but ums drivers will fail hard without the suid bit, the ums part of this needs some thinking (and needs me to dig up a card actually using it). I might end up deciding to just kill ums support and then see what happens, but I would rather not, and if I get enough pushback I might revert on such a decision :) Once you add logind integration, there's another way -- write a tiny setuid wrapper (or use some existing polkit mechanism) to allow users in a console session to start Xorg as euid==0. That wrapper could even be called /usr/bin/Xorg :). Presumably something like this (or just real nonroot X support) will be needed for sane multi-seat support anyway. IOW, I don't think that Xorg needs to be any more special than, say, udisks. --Andy -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Fedora Server PRD Draft and call for participation
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The first deliverable that the Fedora Server Working Group was tasked with was the production of a Product Requirements Document. This document is intended to provide a high-level view of the goals and primary deliverables of the Fedora Server distribution. A great deal of discussion has gone on during the weekly Working Group meetings as well as on the mailing list. At this time, the deadline for the delivery of the PRD is rapidly approaching. Originally it was due to be delivered for ratification on Monday, January 13th, but at the FESCo meeting on Wednesday, it was agreed to delay this deadline by a single week. The primary reason for this delay was so that the Fedora Cloud and Fedora Server groups could have some last discussions about overlap and respective areas of responsibility. This past Tuesday, we had an all-day PRD hackfest in IRC and have come up with a fairly strong draft[1]. It is not yet complete (notably, there remains a FIXME under Misc. Concerns and some ambiguity around the Use Cases), but I believe that it is close enough to its final form (as envisioned by those people that have contributed to it), that we should expose this document to the wider world and ask for input before submitting it to the Fedora Engineering Steering Committee and Fedora Advisory Board a week from Monday. Please read through the PRD draft and provide feedback of any sort. If you see that we have missed or misrepresented any of our statements, we would very much like to hear this soon. [1] https://fedoraproject.org/w/index.php?title=Server/Product_Requirements_Document_Draft -BEGIN PGP SIGNATURE- Version: GnuPG v1 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iEYEARECAAYFAlLQUp4ACgkQeiVVYja6o6O8IwCcCIaNJEr919QgyB3XJC+2Ynqf 6PcAoJ2BpgMwi1NzdG2XBZ0nyEzlh9XZ =DINq -END PGP SIGNATURE- -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: dnf versus yum
On Jan 10, 2014, at 8:04 AM, Przemek Klosowski przemek.klosow...@nist.gov wrote: On 01/09/2014 07:23 PM, Reindl Harald wrote: Am 09.01.2014 22:16, schrieb Przemek Klosowski: I think you can still brick the system with careless yum erases: for instance, deleting grub how would this delete the bootloader in the MBR? you do not need the grub-package installed to have a bootloader MBR is just first stage loader---not enough to bring up the system, necessarily. This is tricky: the second stage is owned by grub2 in /usr/lib/grub, and somehow transferred to /boot/grub2 but I am not sure how The necessary modules to support display, drawing menus, reading the file system in question, is all baked into core.img. The core.img is essentially custom, created by anaconda at install time by calling grub2-install. That is found in /boot/grub2/i386-pc along with other grub modules, not all of which are put into core.img. The core.img is then embedded in the MBR gap. And a small bit of jump code, called boot.img, is placed in the MBR boot strap region (first 440 bytes of LBA 0) to jump to core.img. However, on UEFI this isn't necessarily the case, where the package contains a prebaked core.img that has a pile of modules already in it, because it's intended to be a one size fits all. This core.img takes the form of /boot/efi/EFI/fedora/grubx64.efi. It's prebaked this way because it's a signed binary, necessary for Secure Boot. If the grub package is yum erased, I'm virtually certain grubx64.efi is also removed, and the system would not be bootable. You'd get some message from shim.efi, and possibly fallback.efi, both of which would still be installed. Chris Murphy -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Unresponsive maintainer: Mark Chappell
On Dec. 5, 2013, I sent private email to Mark Chappell (tremble) about a change I need to the normaliz package in order to update to a more recent version of polymake. On Dec. 11, 2013, I opened https://bugzilla.redhat.com/show_bug.cgi?id=1040627 to ask for the same change. On Dec. 19, 2013, I applied for comaintainer privileges in pkgdb. I waited through the holiday season, in case Mark is on vacation, then asked for a response on Jan. 3, 2014 (comment 3 on that bug). It has now been 1 week since the request for a response, with no reply to the original email, the pkgdb request, or to the bug. Mark is not listed on the vacation page; fedora-active-user says: email trem...@tremble.org.uk FAS password for jjames: Last login in FAS: tremble 2013-08-19 Last action on koji: Mon, 30 Dec 2013 package list entry created: perl-Class-Trigger in dist-6E-epel-build by ausil [still active] Last package update on bodhi: 2013-01-14 14:38:59 on package nrpe-2.13-2.fc18 Last actions performed according to fedmsg: ERROR:active-user:'raw_messages' Well, there's a comprehensible error message! Anyway, does anybody have an alternate means of contacting Mark? -- Jerry James http://www.jamezone.org/ -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Unresponsive maintainer: Mark Chappell
Le vendredi 10 janvier 2014 à 13:54 -0700, Jerry James a écrit : On Dec. 5, 2013, I sent private email to Mark Chappell (tremble) about a change I need to the normaliz package in order to update to a more recent version of polymake. On Dec. 11, 2013, I opened https://bugzilla.redhat.com/show_bug.cgi?id=1040627 to ask for the same change. On Dec. 19, 2013, I applied for comaintainer privileges in pkgdb. I waited through the holiday season, in case Mark is on vacation, then asked for a response on Jan. 3, 2014 (comment 3 on that bug). It has now been 1 week since the request for a response, with no reply to the original email, the pkgdb request, or to the bug. Mark is not listed on the vacation page; fedora-active-user says: email trem...@tremble.org.uk FAS password for jjames: Last login in FAS: tremble 2013-08-19 Last action on koji: Mon, 30 Dec 2013 package list entry created: perl-Class-Trigger in dist-6E-epel-build by ausil [still active] Last package update on bodhi: 2013-01-14 14:38:59 on package nrpe-2.13-2.fc18 Last actions performed according to fedmsg: ERROR:active-user:'raw_messages' Well, there's a comprehensible error message! Anyway, does anybody have an alternate means of contacting Mark? Yep, I forward him the email -- Michael Scherer -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Self Introduction
Hi, I've been going through the process of becoming a package maintainer, and thought it would be a good time to introduce myself. My name is Matt Robinson and I'm currently working at Rutgers University. I build a lot of RPMs there (and use mock and koji as well), and with a recent switch to Fedora on our personal workstations, I thought it would be good to contribute. I've only got one RPM built right now, but I'll no doubt be doing more in the future once I get a hang of the whole process. -- -Matt -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Grub installation. First potential Fedora killer
On Thu, 2014-01-09 at 14:30 +0100, Harald Hoyer wrote: On 01/02/2014 11:32 PM, Jean François Martinez wrote: I have a nice booter setup and a nice _main_ Linux installation. Last thing I would want is a distribution I am _testing_, that is Fedora 20 forces on me it will be my main installation and forces me to choose between installing Grub on the MBR or not at all. In addition it didn't detect my other Linux installation so at first boot I was only able to choose between Fedora 20 and Fedora 20. Fortunately running grub-install fixed it (ie this time my other installations were detected). Sort of. First of all because Fedora 20, ie a ditribution I was _testing_ was now the default and second of all because every time I upgrade the kernel of my _main_ distribution I am supposed to reboot on F20 and run grub-install. Great. Nothing I can't fix but your average Ubuntu or Suse user will just cancel installation as soon he notices F20 is going to force itself on his MBR. And if the road is a one way one between Fedora and Ubintu then it is doomed. That's the reason we came up with http://www.freedesktop.org/wiki/Specifications/BootLoaderSpec/ and even have a patch for grub2 http://pkgs.fedoraproject.org/cgit/grub2.git/tree/0460-blscfg-add-blscfg-module-to-parse-Boot-Loader-Specif.patch If all bootloaders would follow the spec, nothing has to be configured manually and would just use the dropin directories. So what's the hold-up? -- Adam Williamson Fedora QA Community Monkey IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net http://www.happyassassin.net -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Livecd-creator is disabling selinux
On Thu, 2014-01-09 at 11:32 +0100, Maros Zatko wrote: Dear guys and ladies, So it seems like livecd-creator is silently disabling selinux. Proof: vim $(which livecd-creator) ; line 150 Fact, that it's re-enabled afterwards doesn't ease silent disablement of security feature. I'd love to know the reason and if it's possible to do something about it. Because live images don't work properly if it's either disabled or enforcing while the image is being generated. Why *that* is I don't know, but before bcl made the livecd-creator script do this, we just had a bit in the livecd-creator instructions which said you have to run setenforce Permissive before starting to build a live image. If you try building a live image with SELinux either disabled or enforcing on the build host, you wind up either with a compose that fails, or an image that can't be booted in enforcing mode. livecd-creator is a string-and-duct-tape hack, it does quite a lot of ugly things. bcl's been trying to replace it with livemedia-creator for a while, but that effort seems to keep running into roadblocks. -- Adam Williamson Fedora QA Community Monkey IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net http://www.happyassassin.net -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Livecd-creator is disabling selinux
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 El Fri, 10 Jan 2014 15:26:38 -0800 Adam Williamson awill...@redhat.com escribió: On Thu, 2014-01-09 at 11:32 +0100, Maros Zatko wrote: Dear guys and ladies, So it seems like livecd-creator is silently disabling selinux. Proof: vim $(which livecd-creator) ; line 150 Fact, that it's re-enabled afterwards doesn't ease silent disablement of security feature. I'd love to know the reason and if it's possible to do something about it. Because live images don't work properly if it's either disabled or enforcing while the image is being generated. Why *that* is I don't know, but before bcl made the livecd-creator script do this, we just had a bit in the livecd-creator instructions which said you have to run setenforce Permissive before starting to build a live image. If you try building a live image with SELinux either disabled or enforcing on the build host, you wind up either with a compose that fails, or an image that can't be booted in enforcing mode. Adam this is not true, All Offical Fedora images for years were built on hosts with selinux disabled. F20 was the first time images were built with the host in permissive mode, but then they are built in a mock chroot which has selinux disabled in the chroot Dennis -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJS0IM5AAoJEH7ltONmPFDR0g4QAI6klWhJfx3rNdtYX5k+5CZy jYGsPMyv7SE2N20p0WNj7v0SNA1jo3wcqsugHTsyGME1G72n15zL3PIqaYUuq4rJ RmHQDxfUugq66n5iNnfw7lsJ/N2sqCd86wR1TTnWHKYypqf5XmKx6tBOY6A+uEEF MmOTaoDHVbtFM9bKZGKkfqorhFJH16mNleS1mC/sC/+a5xuGKbVBDYM2Pt+7/H1T YNPTZQhyEUR6k40vTV642yFxkSE/chltBswE9ZXTErey2JUuPLOdrRbppd9tj7vu Lcbxm7NPpXTJA9fKeBlNwIlXq25wVHu98NlyCfawNE6fNZzqWm03tP7If0PHy7x7 KG3M6EUQy+aLm+vRRa/H7iEH/USGe8wgTDY1IizDShuJQeKfAmVtUyXijvGNcGer K3z3BURivWvvXjuZ8sIfZTCq6IDkWC7MQh4X6gPj58t4ZVj3/p5nnxBhVwh1Nksn pumS3/mtUz/c+Rw5JtwWKS2QuUTG4U9ywspjkz7oGqEWDm/Th67t/1zmhof/LT0T lVmJWM6gyz9lhWBGNZhkGfNqcTvNdTo9TJ8nu4eCTKIGQRS7ODk6u/m1sBFxg8/i 0IrxHfW6Od0wrglxwh695G9liRVctLfmrwzTcnmiee/KQRVNa0TTDq7RdvU6Nsp+ zzNex8J/09Vj73TLmg9B =JLdx -END PGP SIGNATURE- -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Livecd-creator is disabling selinux
On Fri, 2014-01-10 at 17:33 -0600, Dennis Gilmore wrote: El Fri, 10 Jan 2014 15:26:38 -0800 Adam Williamson awill...@redhat.com escribió: On Thu, 2014-01-09 at 11:32 +0100, Maros Zatko wrote: Dear guys and ladies, So it seems like livecd-creator is silently disabling selinux. Proof: vim $(which livecd-creator) ; line 150 Fact, that it's re-enabled afterwards doesn't ease silent disablement of security feature. I'd love to know the reason and if it's possible to do something about it. Because live images don't work properly if it's either disabled or enforcing while the image is being generated. Why *that* is I don't know, but before bcl made the livecd-creator script do this, we just had a bit in the livecd-creator instructions which said you have to run setenforce Permissive before starting to build a live image. If you try building a live image with SELinux either disabled or enforcing on the build host, you wind up either with a compose that fails, or an image that can't be booted in enforcing mode. Adam this is not true, All Offical Fedora images for years were built on hosts with selinux disabled. F20 was the first time images were built with the host in permissive mode, but then they are built in a mock chroot which has selinux disabled in the chroot Hum, I'm sure back before the script tried to take care of it for you, I'd had multiple failures with both 'enforcing' and 'disabled'. But if you say so... -- Adam Williamson Fedora QA Community Monkey IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net http://www.happyassassin.net -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Orphaning few java packages
On Fri, Jan 10, 2014 at 10:22 AM, Aleksandar Kurtakov akurt...@redhat.comwrote: I've just taken sqljet (as a dependency of OmegaT) before reading this. Which build problem svnkit has? It's another BR for OmegaT. So svnkit was fine for java usage but not for being used in eclipse-subclipse. thaks for the info :) -- Ismael Olea http://olea.org/diario/ -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
F20 bug fixes: thanks!
I just did an update run on the F20 Common Bugs page, and I was pleased to note the number of prominent issues that has been resolved with updates since F20 shipped. There are now 13 issues under 'resolved issues' on Common Bugs, which is pretty good compared historically. Just wanted to pass along thanks to all the devs who've spent time on fixing up these bugs. We've fixed crashes in several apps, a hang-on-shutdown bug in CUPS, several issues in 389 directory server, and several more. -- Adam Williamson Fedora QA Community Monkey IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net http://www.happyassassin.net -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
[Test-Announce] 2014-01-13 @ 16:00 UTC - Fedora QA Meeting
# Fedora Quality Assurance Meeting # Date: 2014-01-13 # Time: 16:00 UTC (https://fedoraproject.org/wiki/Infrastructure/UTCHowto) # Location: #fedora-meeting on irc.freenode.net Greetings testers! It's meeting time again on Monday! There are a couple of topics that have come up in the past week, although FESCo gave the WGs another week to report in, so we still don't have any movement on the F21 schedule / planning front. This is a reminder of the upcoming QA meeting. Please reply to this mail with any suggestions for additions to the agenda. The current proposed agenda is included below. If no topics beyond the standard Previous meeting follow-up and Open floor topics are present or proposed, the meeting will be cancelled. == Proposed Agenda Topics == 1. Previous meeting follow-up * adamw to send a mail to test@ about the ten year t-shirt thing 2. EOL process handling * Do we want to stake a clear claim on this process? 3. 10 year anniversary t-shirt * Work on the list of people who should get one 4. Open floor Note that there will be a follow-up to Wednesday's qa-devel meeting immediately after the QA meeting, I imagine Tim will send out an announcement for that shortly. -- Adam Williamson Fedora QA Community Monkey IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net http://www.happyassassin.net ___ test-announce mailing list test-annou...@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/test-announce -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Livecd-creator is disabling selinux
On Fri, 10 Jan 2014 15:35:59 -0800 Adam Williamson awill...@redhat.com wrote: On Fri, 2014-01-10 at 17:33 -0600, Dennis Gilmore wrote: El Fri, 10 Jan 2014 15:26:38 -0800 Adam Williamson awill...@redhat.com escribió: On Thu, 2014-01-09 at 11:32 +0100, Maros Zatko wrote: Dear guys and ladies, So it seems like livecd-creator is silently disabling selinux. Proof: vim $(which livecd-creator) ; line 150 Fact, that it's re-enabled afterwards doesn't ease silent disablement of security feature. I'd love to know the reason and if it's possible to do something about it. Because live images don't work properly if it's either disabled or enforcing while the image is being generated. Why *that* is I don't know, but before bcl made the livecd-creator script do this, we just had a bit in the livecd-creator instructions which said you have to run setenforce Permissive before starting to build a live image. If you try building a live image with SELinux either disabled or enforcing on the build host, you wind up either with a compose that fails, or an image that can't be booted in enforcing mode. Adam this is not true, All Offical Fedora images for years were built on hosts with selinux disabled. F20 was the first time images were built with the host in permissive mode, but then they are built in a mock chroot which has selinux disabled in the chroot Hum, I'm sure back before the script tried to take care of it for you, I'd had multiple failures with both 'enforcing' and 'disabled'. But if you say so... I've also run into problems with livecd-creator and was told the same thing: for best results, run with SELinux in permissive mode - not disabled and not enforcing. It was a while ago but I don't think that it was something I hit for every build. This leads me to suspect that whatever the issue is, it doesn't happen every time and the releng setup must be able to avoid whatever it is that people can (and do) hit with SELinux disabled or enforcing. Also, I think that until F20 releng was building livecds in mock chroots on el boxes (dennis, please correct me if I'm wrong) where both you and I were building livecds on fedora installs. Tim signature.asc Description: PGP signature -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Livecd-creator is disabling selinux
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 El Fri, 10 Jan 2014 18:31:13 -0700 Tim Flink tfl...@redhat.com escribió: On Fri, 10 Jan 2014 15:35:59 -0800 Adam Williamson awill...@redhat.com wrote: On Fri, 2014-01-10 at 17:33 -0600, Dennis Gilmore wrote: El Fri, 10 Jan 2014 15:26:38 -0800 Adam Williamson awill...@redhat.com escribió: On Thu, 2014-01-09 at 11:32 +0100, Maros Zatko wrote: Dear guys and ladies, So it seems like livecd-creator is silently disabling selinux. Proof: vim $(which livecd-creator) ; line 150 Fact, that it's re-enabled afterwards doesn't ease silent disablement of security feature. I'd love to know the reason and if it's possible to do something about it. Because live images don't work properly if it's either disabled or enforcing while the image is being generated. Why *that* is I don't know, but before bcl made the livecd-creator script do this, we just had a bit in the livecd-creator instructions which said you have to run setenforce Permissive before starting to build a live image. If you try building a live image with SELinux either disabled or enforcing on the build host, you wind up either with a compose that fails, or an image that can't be booted in enforcing mode. Adam this is not true, All Offical Fedora images for years were built on hosts with selinux disabled. F20 was the first time images were built with the host in permissive mode, but then they are built in a mock chroot which has selinux disabled in the chroot Hum, I'm sure back before the script tried to take care of it for you, I'd had multiple failures with both 'enforcing' and 'disabled'. But if you say so... I've also run into problems with livecd-creator and was told the same thing: for best results, run with SELinux in permissive mode - not disabled and not enforcing. It was a while ago but I don't think that it was something I hit for every build. This leads me to suspect that whatever the issue is, it doesn't happen every time and the releng setup must be able to avoid whatever it is that people can (and do) hit with SELinux disabled or enforcing. Also, I think that until F20 releng was building livecds in mock chroots on el boxes (dennis, please correct me if I'm wrong) where both you and I were building livecds on fedora installs. Tim, F20 images were built in f20 chroots on f19 boxes. but selinux on the host was permissive. prior to f20 it was the target os chroot on el Dennis -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJS0L7UAAoJEH7ltONmPFDRcRkQAMmepLraNTt5/r8IPRU8tos5 pRs1c7a0h+IR0Dn1zZigVmgJzr42ST38X2eKqOJGHZj1Fh48TaJ8wjjTbsI8jhYz iEa8mjbGpJz0qoUw2C6Ah8vjO/isetM2qAniFBX58mG1V3fPrMe51M9KWtzI7pSt 304yO7Eqzf7Wb00MGzD+EWXDLRjlZXW6ekSUXOz1cfxzExDaVmMcIGE59hoh1HNa rPEPmSrU87i1EEcHyT1NHdaQ17KoM2yuqbchjtw4vcHFkdAXcSqeLyvOr8JkE39s CeNH+11wcPKfK7YxcNyBOX679jk9us2kov7t+fnNCglrh1qiAcSUgy3QT+p/qmVP /xYOjm6gy1a3FkWbQAvQ723RBDKJJ8GQ19LSUcByOc9rRrkKKnQQfYNK7as/J2b7 vVBlLIJMPpjMl081JQYI8sxEDvDFrQ8MVniHJFsDomvZjtBXNdxu7nofhiIUNx0A VwfJ1GvReNnIgRLcN1X2i/cDOn736tvilhLFQFdZMcB9bNF7C6xYSeEbERqA8QCI c1JlTtrSnHzpx8XN6yLxl5nM9e/XMBdcpxh5zxihNPQKngCDZ5KtspdTWo/NbpSk g27HBgiKm1Oo/zSFmFHQ+sG2eKqnGDT6EzqsT1IZUdrSfQkzR7q5ad/FWtN2CbKf Lpnl7HtI3f4zIWT+yA81 =mJNO -END PGP SIGNATURE- -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
[Bug 1049139] Please apply upstream case sensitivity patch
https://bugzilla.redhat.com/show_bug.cgi?id=1049139 Fedora Update System upda...@fedoraproject.org changed: What|Removed |Added Fixed In Version|perl-Syntax-Highlight-Engin |perl-Syntax-Highlight-Engin |e-Kate-0.08-2.fc19 |e-Kate-0.08-4.fc20 --- Comment #7 from Fedora Update System upda...@fedoraproject.org --- perl-Syntax-Highlight-Engine-Kate-0.08-4.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=KNUbYOePKGa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1051106] perl-PlRPC: weak crypto
https://bugzilla.redhat.com/show_bug.cgi?id=1051106 --- Comment #3 from Petr Pisar ppi...@redhat.com --- (In reply to Vincent Danen from comment #2) The actual proposed patch to upstream is here: * https://rt.cpan.org/Public/Ticket/Attachment/1289399/683202/0001-Security- notice-for-Proxy.patch No. This is wrong patch which should belong to different perl package. Current latter one is the https://rt.cpan.org/Public/Bug/Display.html?id=90474 is correct one and it'd already applied in perl-PlRPC-0.2020-16.fc21. I guess applying the patch from Fedora 21 to all Fedoras is sufficient. -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=S1ey43HGhMa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1051108] CVE-2013-7284 perl-PlRPC: pre-auth remote code execution
https://bugzilla.redhat.com/show_bug.cgi?id=1051108 Petr Pisar ppi...@redhat.com changed: What|Removed |Added CC||rat...@redhat.com Flags||needinfo?(rat...@redhat.com ||) --- Comment #3 from Petr Pisar ppi...@redhat.com --- (In reply to Vincent Danen from comment #2) The actual proposed patch to upstream is here: * https://rt.cpan.org/Public/Ticket/Attachment/1293961/685696/0001-Security- notice-on-Storable-and-reply-attack.patch Based on the discussion in bug #1030572, there is no real fix for this as it seems that Storable deserialization is exposed prior to password-based authentication (see how AcceptUser is called in the server code). MITRE assigned CVE-2013-7284 to this issue. Is amending the PlRPC documentation with this patch sufficient to close this bug, or should we keep this open until a real fix in the code (extension of Storable module and utilizing it in PlRPC) will be available? -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=0Io151sBRMa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
Broken dependencies: perl-Catalyst-Controller-HTML-FormFu
perl-Catalyst-Controller-HTML-FormFu has broken dependencies in the rawhide tree: On x86_64: perl-Catalyst-Controller-HTML-FormFu-0.09004-4.fc20.noarch requires perl(HTML::FormFu::MultiForm) On i386: perl-Catalyst-Controller-HTML-FormFu-0.09004-4.fc20.noarch requires perl(HTML::FormFu::MultiForm) On armhfp: perl-Catalyst-Controller-HTML-FormFu-0.09004-4.fc20.noarch requires perl(HTML::FormFu::MultiForm) Please resolve this as soon as possible. -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
Broken dependencies: perl-Language-Expr
perl-Language-Expr has broken dependencies in the rawhide tree: On x86_64: perl-Language-Expr-0.19-4.fc19.noarch requires perl(:MODULE_COMPAT_5.16.2) On i386: perl-Language-Expr-0.19-4.fc19.noarch requires perl(:MODULE_COMPAT_5.16.2) On armhfp: perl-Language-Expr-0.19-4.fc19.noarch requires perl(:MODULE_COMPAT_5.16.2) Please resolve this as soon as possible. -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
Broken dependencies: mojomojo
mojomojo has broken dependencies in the rawhide tree: On x86_64: mojomojo-1.10-1.fc20.noarch requires perl(HTML::FormFu::Element::reCAPTCHA) On i386: mojomojo-1.10-1.fc20.noarch requires perl(HTML::FormFu::Element::reCAPTCHA) On armhfp: mojomojo-1.10-1.fc20.noarch requires perl(HTML::FormFu::Element::reCAPTCHA) Please resolve this as soon as possible. -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1051542] New: Please create EL6 branch for this package
https://bugzilla.redhat.com/show_bug.cgi?id=1051542 Bug ID: 1051542 Summary: Please create EL6 branch for this package Product: Fedora Version: rawhide Component: perl-Capture-Tiny Assignee: psab...@redhat.com Reporter: jan.pra...@gmail.com QA Contact: extras...@fedoraproject.org CC: perl-devel@lists.fedoraproject.org, psab...@redhat.com Please request EL6 branch for perl-Capture-Tiny. If you are not willing to do it I am volunteer to maintain the branch myself. Thanks Jan Pradac -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=PN06tQgvHNa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[perl-Net-Amazon-EC2/el6: 15/15] Merge branch 'master' into el6
commit 5bb972ed993a7cf945ca7b6b2df4c21496c88bf5 Merge: 4b0d214 6799e49 Author: Lubomir Rintel lkund...@v3.sk Date: Fri Jan 10 15:52:49 2014 +0100 Merge branch 'master' into el6 .gitignore |2 + perl-Net-Amazon-EC2.spec | 87 +- sources |2 +- 3 files changed, 73 insertions(+), 18 deletions(-) --- -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
File Net-Amazon-EC2-0.24.tar.gz uploaded to lookaside cache by lkundrak
A file has been added to the lookaside cache for perl-Net-Amazon-EC2: 558c1ae48e2c82dd49a8607cbc811a7e Net-Amazon-EC2-0.24.tar.gz -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[perl-Net-Amazon-EC2/el6] (15 commits) ...Merge branch 'master' into el6
Summary of changes: eb8f1f3... - 661697 rebuild for fixing problems with vendorach/lib (*) 6791333... - Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass (*) d4f9cc1... Perl mass rebuild (*) 2ebd09c... Perl mass rebuild (*) faae6ff... - Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass (*) 29d708f... Perl 5.16 rebuild (*) 6ceb0e0... - Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass (*) 1caf57d... - Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass (*) 24ca145... Perl 5.18 rebuild (*) ed875e1... Specify all dependencies (*) 22dc39a... Attempt at saner SPEC file formatting (*) fb2b8a0... Bump version (*) 0fd0958... Add missing BRs (*) 6799e49... Update to a new version (*) 5bb972e... Merge branch 'master' into el6 (*) This commit already existed in another branch; no separate mail sent -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[perl-Net-Amazon-EC2] Update to a new version
commit 6799e49a9db240d2820b1e403cc68de5527d4a49 Author: Lubomir Rintel lkund...@v3.sk Date: Fri Jan 10 15:51:58 2014 +0100 Update to a new version .gitignore |1 + perl-Net-Amazon-EC2.spec |7 +-- sources |2 +- 3 files changed, 7 insertions(+), 3 deletions(-) --- diff --git a/.gitignore b/.gitignore index c43b789..6ba0610 100644 --- a/.gitignore +++ b/.gitignore @@ -1,2 +1,3 @@ Net-Amazon-EC2-0.14.tar.gz /Net-Amazon-EC2-0.23.tar.gz +/Net-Amazon-EC2-0.24.tar.gz diff --git a/perl-Net-Amazon-EC2.spec b/perl-Net-Amazon-EC2.spec index 0068ed2..b838518 100644 --- a/perl-Net-Amazon-EC2.spec +++ b/perl-Net-Amazon-EC2.spec @@ -1,11 +1,11 @@ Summary: Perl interface to the Amazon Elastic Compute Cloud (EC2) Name: perl-Net-Amazon-EC2 -Version: 0.23 +Version: 0.24 Release: 1%{?dist} License: GPL+ or Artistic Group: Development/Libraries URL: http://search.cpan.org/dist/Net-Amazon-EC2/ -Source0: http://search.cpan.org/CPAN/authors/id/M/MA/MALLEN/Net-Amazon-EC2-0.23.tar.gz +Source0: http://search.cpan.org/CPAN/authors/id/M/MA/MALLEN/Net-Amazon-EC2-%{version}.tar.gz BuildArch: noarch @@ -171,6 +171,9 @@ make test %changelog +* Fri Jan 10 2014 Lubomir Rintel lkund...@v3.sk - 0.24-1 +- Update to a later upstream release + * Mon Oct 28 2013 Lubomir Rintel lkund...@v3.sk - 0.23-1 - Update to a later upstream release diff --git a/sources b/sources index 374fbe8..3e71674 100644 --- a/sources +++ b/sources @@ -1 +1 @@ -678cf13562b3364b7fbb06bd120f5dc9 Net-Amazon-EC2-0.23.tar.gz +558c1ae48e2c82dd49a8607cbc811a7e Net-Amazon-EC2-0.24.tar.gz -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1051542] Please create EL6 branch for this package
https://bugzilla.redhat.com/show_bug.cgi?id=1051542 Petr Šabata psab...@redhat.com changed: What|Removed |Added Status|NEW |ASSIGNED --- Comment #1 from Petr Šabata psab...@redhat.com --- Sure, no problem. What's your FAS username, please? -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=zmqgKWUWRAa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[389-devel] Please review lib389 ticket 47600 (follow up) :Replica/Agreement/Changelog not conform to the design
Hi, Rich already reviewed the Replica/RA/Changelog code for lib389. This follow up review is to: * add unit tests for Replica/RA * Fix some bugs found while running the unit tests https://fedorahosted.org/389/attachment/ticket/47600/0001-Ticket-47600-follow-up-Replica-Agreement-Changelog-n.patch -- 389-devel mailing list 389-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/389-devel
[389-devel] Please review (one line fix): [389 Project] #47660: config_set_allowed_to_delete_attrs: Valgrind reports Invalid read
https://fedorahosted.org/389/ticket/47660 https://fedorahosted.org/389/attachment/ticket/47660/0001-Ticket-47660-config_set_allowed_to_delete_attrs-Valg.patch -- 389-devel mailing list 389-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/389-devel
Re: 2013-01-09 @ 16:00 UTC - Fedora QA Devel Meeting Minutes
On Thu, 2014-01-09 at 12:19 -0700, Tim Flink wrote: = #fedora-meeting-2: fedoraqa-devel = We didn't quite get through everything today, so we'll continue after the QA meeting on Monday. Sorry I missed this :( Totally forgot. -- Adam Williamson Fedora QA Community Monkey IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net http://www.happyassassin.net ___ qa-devel mailing list qa-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/qa-devel
Move of freetype's header files
As of freetype 2.5.1, freetype's upstream has moved all header files from /usr/include/freetype/freetype2/ and /usr/include/ft2build.h to /usr/include/freetype2/. I plane to push freetype 2.5.2 to master at the end of the next week (#1034065). If your packages use freetype as documented then you are ok but in opposite case you'll need to change the path (see http://lists.nongnu.org/archive/html/freetype-devel/2013-11/msg00074.html). I've created a scratch build of the new freetype, you can get it here: http://koji.fedoraproject.org/koji/taskinfo?taskID=6384445 or here: http://mkasik.fedorapeople.org/freetype-2.5.2/ Regards Marek ___ devel-announce mailing list devel-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel-announce
Fedora Server PRD Draft and call for participation
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The first deliverable that the Fedora Server Working Group was tasked with was the production of a Product Requirements Document. This document is intended to provide a high-level view of the goals and primary deliverables of the Fedora Server distribution. A great deal of discussion has gone on during the weekly Working Group meetings as well as on the mailing list. At this time, the deadline for the delivery of the PRD is rapidly approaching. Originally it was due to be delivered for ratification on Monday, January 13th, but at the FESCo meeting on Wednesday, it was agreed to delay this deadline by a single week. The primary reason for this delay was so that the Fedora Cloud and Fedora Server groups could have some last discussions about overlap and respective areas of responsibility. This past Tuesday, we had an all-day PRD hackfest in IRC and have come up with a fairly strong draft[1]. It is not yet complete (notably, there remains a FIXME under Misc. Concerns and some ambiguity around the Use Cases), but I believe that it is close enough to its final form (as envisioned by those people that have contributed to it), that we should expose this document to the wider world and ask for input before submitting it to the Fedora Engineering Steering Committee and Fedora Advisory Board a week from Monday. Please read through the PRD draft and provide feedback of any sort. If you see that we have missed or misrepresented any of our statements, we would very much like to hear this soon. [1] https://fedoraproject.org/w/index.php?title=Server/Product_Requirements_Document_Draft -BEGIN PGP SIGNATURE- Version: GnuPG v1 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iEYEARECAAYFAlLQUp4ACgkQeiVVYja6o6O8IwCcCIaNJEr919QgyB3XJC+2Ynqf 6PcAoJ2BpgMwi1NzdG2XBZ0nyEzlh9XZ =DINq -END PGP SIGNATURE- ___ devel-announce mailing list devel-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel-announce