[EPEL-devel] Fedora EPEL 6 updates-testing report

2019-06-19 Thread updates
The following Fedora EPEL 6 Security updates need testing:
 Age  URL
   2  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2019-de51ed6706   
drupal7-uuid-1.3-1.el6
   2  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2019-d5dca753d6   
GraphicsMagick-1.3.32-1.el6
   0  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2019-12f1eb1b1f   
tomcat-7.0.94-1.el6


The following builds have been pushed to Fedora EPEL 6 updates-testing

entr-4.2-2.el6
geolite2-20190618-1.el6
php-paragonie-random-compat-2.0.18-1.el6
php-symfony-2.3.42-2.el6
python-f5-icontrol-rest-1.3.13-1.el6

Details about builds:



 entr-4.2-2.el6 (FEDORA-EPEL-2019-79499ecd10)
 Run arbitrary commands when files change

Update Information:

New package.




 geolite2-20190618-1.el6 (FEDORA-EPEL-2019-ce9d0f9665)
 Free IP geolocation databases

Update Information:

- Latest upstream

ChangeLog:

* Wed Jun 19 2019 Carl George  - 20190618-1
- Latest upstream




 php-paragonie-random-compat-2.0.18-1.el6 (FEDORA-EPEL-2019-79c1c4190d)
 PHP 5.x polyfill for random_bytes() and random_int() from PHP 7

Update Information:

## php-paragonie-random-compat  ### Version 2.0.18 - 2019-01-03  * If
`/dev/urandom` cannot be read on Unix-based operating systems,   a Exception
with a specific error message will be thrown. * Fixed Psalm nits. * Updated the
README to include a reference to the support contract   offering by Paragon
Initiative Enterprises.  ### Version 2.0.17 - 2018-07-04  * Version 2.0.16
failed Psalm checks on PHP v5.6 with Psalm v1.   We could not reproduce this
failure locally, so we've suppressed the   `MissingReturnType` check (that is to
say, demoted it to "info").  ### Version 2.0.16 - 2018-07-04  * Fixed type-
checking consistencies that forced us to use Psalm in   non-strict mode (i.e.
`totallyTyped="false"`). * README cleanup, added a header to the Version 9.99.99
section.   * If you're confused by `v9.99.99` and it's causing stuff to break,
see [this section of the
README](https://github.com/paragonie/random_compat#version-9) for the
solution to your problem. * Trimmed down and annotated our `psalm.xml` file with
explanations   for why each assertion is suppressed.  ### Version 2.0.15 -
2018-06-08  * A reported, but difficult to reproduce, problem with file
inclusion on   [some Windows
machines](https://github.com/paragonie/random_compat/issues/136)   was fixed by
[replacing `/` with
`DIRECTORY_SEPARATOR`](https://github.com/paragonie/random_compat/pull/141).
For most users (i.e. not running Windows) this change should be of zero
consequence. For everyone else, it should mean random_compat magically   works
when it didn't before.  ### Version 2.0.14 - 2018-06-06  * Update version
information. * Updated README with better instructions, including new
information   about the `v9.99.99` tag.  ### Version 2.0.13 - 2018-06-06 * \#139
- Add `polyfill` keyword to composer.json * Ensure the docblocks are consistent
to aid static analysis efforts in   other libraries; see https://github.com/para
gonie/random_compat/commit/cbe0b11b78140bc62a921fec33a730fdaa6540d6  ### Version
2.0.12 - 2018-04-04  * Minor docblock issue that's breaking Psalm downstream.
### Version 2.0.11 - 2017-09-27  * Minor docblock corrections. * Re-issuing a
PHP Archive to attempt to address an issue with the Phar provided.   See
[#134](https://github.com/paragonie/random_compat/issues/134).  ### Version
2.0.10 - 2017-03-13  * Mcrypt can now be used on PHP < 5.3.7 if you're not on
Windows. * Minor boyscouting changes.  ### Version 2.0.9 - 2017-03-03  * More
Psalm integration fixes.  ### Version 2.0.8 - 2017-03-03  * Prevent function
already declared error for `random_int()` caused by misusing   the library
(really you should only ever include `lib/random.php` and never anyof the
other files). See [#125](https://github.com/paragonie/random_compat/issues/125).
### Version 2.0.6, 2.0.7 - 2017-02-27  * Just updates to psalm.xml to silence
false positives.  ### Version 2.0.5 - 2017-02-27  * Run random_compat through
the static analysis tool, [psalm](https://github.com/vimeo/psalm),   as part of
our continuous integration process. * Minor readability enhancements
([#122](https://github.com/paragonie/random_compat/issues/122)   and 

[389-devel] 389 DS nightly 2019-06-20 - 94% PASS

2019-06-19 Thread vashirov
https://fedorapeople.org/groups/389ds/ci/nightly/2019/06/20/report-389-ds-base-1.4.1.4-20190619git5c0198d.fc30.x86_64.html
___
389-devel mailing list -- 389-devel@lists.fedoraproject.org
To unsubscribe send an email to 389-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/389-devel@lists.fedoraproject.org


Schedule for Thursday's FPC Meeting (2019-06-20 16:00 UTC)

2019-06-19 Thread James Antill
Following is the list of topics that will be discussed in the FPC
meeting Thursday at 2019-06-20 16:00 UTC in #fedora-meeting-1 on 
irc.freenode.net.

 Local time information (via. uitime):

= Day: Thursday ==
2019-06-20 09:00 PDT  US/Pacific
2019-06-20 12:00 EDT  --> US/Eastern <--
2019-06-20 16:00 UTC  UTC   
2019-06-20 17:00 BST  Europe/London 
2019-06-20 18:00 CEST Europe/Berlin 
2019-06-20 18:00 CEST Europe/Paris  
2019-06-20 21:30 IST  Asia/Calcutta 
 New Day: Friday -
2019-06-21 00:00 HKT  Asia/Hong_Kong
2019-06-21 00:00 +08  Asia/Singapore
2019-06-21 01:00 JST  Asia/Tokyo
2019-06-21 02:00 AEST Australia/Brisbane


 Links to all tickets below can be found at: 

https://pagure.io/packaging-committee/issues?status=Open=meeting

= New business =

#topic #899 Need to define ticket policy 
.fpc 899
https://pagure.io/packaging-committee/issue/899

#topic #901 Golang pkg. review exception for Adopt new Guidelines change
.fpc 901
https://pagure.io/packaging-committee/issue/901

#topic #905 Question regarding build flags
.fpc 905
https://pagure.io/packaging-committee/issue/905

= Open Floor = 

 For more complete details, please visit each individual ticket.  The
report of the agenda items can be found at:

https://pagure.io/packaging-committee/issues?status=Open=meeting

 If you would like to add something to this agenda, you can:
  * Reply to this e-mail
  * File a new ticket at: https://pagure.io/packaging-committee
  * E-mail me directly
  * Bring it up at the end of the meeting, during the open floor topic. Note
that added topics may be deferred until the following meeting.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: HEADS UP: DynamicBuildRequires are available

2019-06-19 Thread Kevin Fenzi
On 6/19/19 1:14 PM, Pavel Raiskup wrote:

> Ok, f30 infra is still brokne -- but Mirek submitted regular update for

Fixed.

kevin



signature.asc
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[EPEL-devel] Re: RHEL 7.7 Beta

2019-06-19 Thread Miro Hrončok

On 19. 06. 19 19:22, Kevin Fenzi wrote:

On 6/12/19 1:48 AM, Miro Hrončok wrote:

On 12. 06. 19 8:14, Thomas Stephen Lee wrote:

Hi,

Just for your information.

https://www.redhat.com/en/blog/red-hat-enterprise-linux-77-beta-now-available


Python 3.6 is there in 7.7

https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7-beta/html/7.7_release_notes/overview


thanks


In that case, let's proceed with:

https://src.fedoraproject.org/rpms/python-rpm-macros/pull-request/19
https://src.fedoraproject.org/rpms/python-rpm-macros/pull-request/20
https://src.fedoraproject.org/rpms/python34/pull-request/35

Starting here: https://bugzilla.redhat.com/show_bug.cgi?id=1719633


But we don't want to actually land that until 7.7 is out right?


We do. It is designed to work, after 7.7 GA python-rpm-macros package gets 
retired on EPEL.


--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org


Re: Fedora 30 voting is now open

2019-06-19 Thread Ben Cotton
On Wed, Jun 5, 2019 at 8:03 PM Ben Cotton  wrote:
>
> Voting is now open for the Fedora 30 election cycle. You can vote in
> the Elections app[1]. Interviews with candidates are available on the
> Fedora Community Blog[2], with links available in the Elections app.
> Voting ends at 23:59 UTC on 20 June.
>
> [1] https://elections.fedoraproject.org
> [2] https://communityblog.fedoraproject.org/?p=7774
>

This is your final reminder that elections voting is open for about 27
more hours. I checked my calendar this time. As a reminder,  if you
cannot
vote because you only have the "CLA done" group in FAS, please file an
issue at https://pagure.io/fedora-project-schedule/new_issue ASAP and
I will take care of that for you.

-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org


Re: Fedora 30 voting is now open

2019-06-19 Thread Ben Cotton
On Wed, Jun 5, 2019 at 8:03 PM Ben Cotton  wrote:
>
> Voting is now open for the Fedora 30 election cycle. You can vote in
> the Elections app[1]. Interviews with candidates are available on the
> Fedora Community Blog[2], with links available in the Elections app.
> Voting ends at 23:59 UTC on 20 June.
>
> [1] https://elections.fedoraproject.org
> [2] https://communityblog.fedoraproject.org/?p=7774
>

This is your final reminder that elections voting is open for about 27
more hours. I checked my calendar this time. As a reminder,  if you
cannot
vote because you only have the "CLA done" group in FAS, please file an
issue at https://pagure.io/fedora-project-schedule/new_issue ASAP and
I will take care of that for you.

-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel-announce mailing list -- devel-annou...@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel-annou...@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: HEADS UP: DynamicBuildRequires are available

2019-06-19 Thread Michael Cronenworth

On 6/17/19 8:27 PM, Igor Gnatenko wrote:

as of today, builders have been updated (thanks to Kevin) and
DynamicBuildRequires finally work in Rawhide.

Change Page:https://fedoraproject.org/wiki/Changes/DynamicBuildRequires
Example of real build:
https://koji.fedoraproject.org/koji/buildinfo?buildID=1286391


Cool!

Any long term plans to support C/C++ apps?

I know those are all over the map with regards to build tools, but maybe cmake/meson 
could be supported?

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: HEADS UP: DynamicBuildRequires are available

2019-06-19 Thread Pavel Raiskup
On Wednesday, June 19, 2019 9:38:40 PM CEST Pavel Raiskup wrote:
> On Tuesday, June 18, 2019 3:54:41 PM CEST Miroslav Suchý wrote:
> > Dne 18. 06. 19 v 11:42 Igor Gnatenko napsal(a):
> > > * COPR -- no idea
> > 
> > Not yet. Koji use patched version of Mock (Igor discovered one issue after
> > release). In Copr we will wait for Mock
> > 1.4.17 and once it will hit Fedora stable, it will automagically start 
> > working
> > in Copr.
> 
> I think Koji has mock 1.4.16-2 installed from infra tags repo [1].  The only
> problem is that Copr uses F30 (koji is F29).  Why not to build the same mock 
> to
> the f30 infra tags too, so Copr doesn't have to stay behind...?
> 
> [1] 
> https://kojipkgs.fedoraproject.org/repos-dist/f29-infra/latest/x86_64/pkglist

Ok, f30 infra is still brokne -- but Mirek submitted regular update for
F30 [1] so even better (users will have *that* mock as well).  Once it
reaches stable, it will be propagated to Copr builders automatically.

[1] https://bodhi.fedoraproject.org/updates/FEDORA-2019-efe97323a7 

Pavel


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: HEADS UP: DynamicBuildRequires are available

2019-06-19 Thread Pavel Raiskup
On Tuesday, June 18, 2019 3:54:41 PM CEST Miroslav Suchý wrote:
> Dne 18. 06. 19 v 11:42 Igor Gnatenko napsal(a):
> > * COPR -- no idea
> 
> Not yet. Koji use patched version of Mock (Igor discovered one issue after
> release). In Copr we will wait for Mock
> 1.4.17 and once it will hit Fedora stable, it will automagically start working
> in Copr.

I think Koji has mock 1.4.16-2 installed from infra tags repo [1].  The only
problem is that Copr uses F30 (koji is F29).  Why not to build the same mock to
the f30 infra tags too, so Copr doesn't have to stay behind...?

[1] 
https://kojipkgs.fedoraproject.org/repos-dist/f29-infra/latest/x86_64/pkglist

Pavel


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: rawhide status - 2019-06-19

2019-06-19 Thread Adam Williamson
On Wed, 2019-06-19 at 13:35 -0500, Bruno Wolff III wrote:
> On Wed, Jun 19, 2019 at 10:44:41 -0700,
>   Kevin Fenzi  wrote:
> > The last rawhide compose that completed was 2019-06-09 (10 days ago now).
> 
> A lot of the incomplete composes are actually usable for updates and I have 
> been getting systems updated and things have worked reasonably for the most 
> part.
> 
> If we had enough resources, it would be nice if the part of the compose 
> needed 
> for installs was treated differently from the part that people could use 
> to get updates.

The general idea is that if it's broken enough that the images don't
compose, we're not confident it's working enough to send out as updates
to existing systems either.

This would of course work better if we could get a tighter and faster
loop from 'change that breaks things' to 'realizing that things are
broken' to 'fixing the change', though.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: rawhide status - 2019-06-19

2019-06-19 Thread Bruno Wolff III

On Wed, Jun 19, 2019 at 10:44:41 -0700,
 Kevin Fenzi  wrote:


The last rawhide compose that completed was 2019-06-09 (10 days ago now).


A lot of the incomplete composes are actually usable for updates and I have 
been getting systems updated and things have worked reasonably for the most 
part.


If we had enough resources, it would be nice if the part of the compose needed 
for installs was treated differently from the part that people could use 
to get updates. (For example kernel-5.2.0-0.rc5.git1.1.fc31 fixes a remote 
DOS bug and people won't get it by default until there is a successful 
compose. Though it also seems to have problems on some hardware.) The naive 
way to do this is to have two seperate repos with hard linked rpms. 


Hopefully as time goes on, there will be fewer multi-day compose failures.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: rawhide no longer recognizing autotool macros

2019-06-19 Thread Pavel Raiskup
On Wednesday, June 19, 2019 6:27:31 PM CEST Philip Kovacs via devel wrote:
>  I use those macros wherever possible, but sometimes I need a raw `make`in
>  order to specify uncommon targets.  I'll just replace `__make` with `make`
>  for now.   No harm there. 

$ rpm --eval %make_build
/usr/bin/make -O -j8

So you can simply do `%make_build uncommon-target`.

Pavel


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[EPEL-devel] Fedora EPEL 6 updates-testing report

2019-06-19 Thread updates
The following Fedora EPEL 6 Security updates need testing:
 Age  URL
   1  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2019-de51ed6706   
drupal7-uuid-1.3-1.el6
   1  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2019-d5dca753d6   
GraphicsMagick-1.3.32-1.el6


The following builds have been pushed to Fedora EPEL 6 updates-testing

gfal2-2.16.3-1.el6
python-elasticsearch6-6.4.2-1.el6
tio-1.32-1.el6
tomcat-7.0.94-1.el6

Details about builds:



 gfal2-2.16.3-1.el6 (FEDORA-EPEL-2019-f395fc23f4)
 Grid file access library 2.0

Update Information:

* new upstream release

ChangeLog:

* Tue Jun 18 2019 Andrea Manzi  - 2.16.3-1
- Upgraded to upstream release 2.16.3
* Thu Jan 31 2019 Fedora Release Engineering  - 
2.16.1-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild




 python-elasticsearch6-6.4.2-1.el6 (FEDORA-EPEL-2019-cfbe0bca6d)
 Client for Elasticsearch

Update Information:

First release of elasticsearch6 to EPEL 6 and 7




 tio-1.32-1.el6 (FEDORA-EPEL-2019-cbe27e7d8d)
 Simple TTY terminal I/O application

Update Information:

tio v1.32 =* Update AUTHORS* Minor code style cleanups*
Cleanup print macros* Flush output  Make sure output is transmitted
immediately by flushing the output.* add optional timestamps  with `-t`
or "C-t T", toggle a timestamp prefix to each line.* Fix typos* Added
macOS compatibility* Made `O_NONBLOCK` flag to `open()` call specific to
macOS only.* Added macOS-related details.* Added `O_NONBLOCK` flag to
`open()` call for macOS (10.13.6) compatibility.   tio v1.31 =*
Update date* Update AUTHORS* Clarify the input/output variable names
(No-op change)* Organize options the same sequence they are mentioned in
cmdline help.* Update README.* Map CR->NL locally on output instead of
using `tio.c_oflag |= OCRNL`.  This mostly is intended to have local echo
output exactly what is sent to the remote endpoint.  A nice side-effect is,
that it also fixes tty-implementations, that can't deal with the `OCRNL` flag on
`tio.c_oflag`.* Provide local-echo option.  Can be switched on with `-e`
on the command line.  Can be toggled with Ctrl t e while program is running.
* Write to logfile as soon as we have the data, don't buffer.  Logfiles are
important to see what happened, in particular if something unexpected happened;
so we want to make sure that the logfile is flushed to disk.  Before this
change, the logfile was typically written at the end in a large chunk as the
default (large) buffering applied. Now, characters are written out ASAP, so it
is possible to get a live-view with a `tail -f `   tio v1.30 =
* Update README* Update man page and bash completion* Update AUTHORS
* `ONLCRNL`: change the method to map NL to CR-NL   tio v1.29 =* Add
mapping flags `INLCRNL` and `ODELBS`  The following new mapping flags are
added:  `INLCRNL`: Map NL to CR-NL on input.  `ODELBS`: Map DEL to BS on
output.   tio v1.28 =* Update README* Update AUTHORS* Add
snap status to `README.md`* Add `README.md` to prettify GitHub page* Add
missing header* Add missing header file under musl-libc  Musl's
inclusion tree slightly differs from glibc, therefore `TCGETS2` is not reachable
through `sys/ioctl.h`, so `asm/ioctls.h` needs to be included too.* Fix
grammar and typos

ChangeLog:

* Tue Jun 18 2019 Robert Scheck  1.32-1
- Upgrade to 1.32 (#1720889)
* Sun Feb  3 2019 Fedora Release Engineering  - 1.27-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
* Sat Jul 14 2018 Fedora Release Engineering  - 1.27-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
* Fri Feb  9 2018 Fedora Release Engineering  - 1.27-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild

References:

  [ 1 ] Bug #1720889 - tio-1.32 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1720889




[389-devel] please review: PR 50456 - Fix Cockpit UI branding

2019-06-19 Thread Mark Reynolds

https://pagure.io/389-ds-base/pull-request/50456
___
389-devel mailing list -- 389-devel@lists.fedoraproject.org
To unsubscribe send an email to 389-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/389-devel@lists.fedoraproject.org


rawhide status - 2019-06-19

2019-06-19 Thread Kevin Fenzi
Greetings everyone.

I thought I would send out a rawhide status email to catch everyone up
to whats going on there. I should have sent it sooner, but I was on
vacation, then in a set of meetings, etc.

The last rawhide compose that completed was 2019-06-09 (10 days ago now).

There's been a number of reasons for this. In order to accommodate some
fedora 31 changes ( dynamic build requires ) and epel8 work we needed a
koji with some backported patches as well as newer mock and createrepo_c.

So, first step was to get armv7 builders off Fedora 27 where they have
been stuck due to a kernel bug. Luckily Peter Robinson and Paul Whalen
have been working on isolating that bug and found a kernel/userspace
combo that we can use until we fix it. So, all the armv7 builders are up
on fedora 29 with a older kernel now.

Next I found that python2 koji-builder was no longer installable due to
python2 deps going away. I could have just tried to fix that, but I
figured it would be a good time to just move everything to python3 and
get it oever with. This turned out to be more involved than I had hoped:

* koji itself still shipped a python2 script (which we don't use and I
ended up just dropping in the fedora builds).
* Moving koji-builder over to python3 meant we had to also move over oz
and imagefactory (happily something which happened in rawhide) and all
the stack of things they use.
* I rebuilt (with patches) all the following for our f29 builders:
oz
imagefactory
koji
koji-containerbuild (which cverna ported to python3 nice and quickly)
python-urlgrabber
pycdio (is python2 only in fedora, but we needed python3, need to file a
bug on this one)
imagefactory-plugins
mock

After a number of update and find breakage and fix, I got things back
working monday all on python3.

Then of course since it's been so long since a compose, we are now
hitting those things that broke in the mean time. First some kde deps,
and now a ppc64le/aarch64 cloud image issue (
https://bugzilla.redhat.com/show_bug.cgi?id=1722181 )

Hopefully that one can be solved soon and we can get back on the
composes bandwagon.

Gating wouldn't have helped the python3 issues as that was builder side.
It would likely have helped with the kde deps and cloud issues however.

kevin



signature.asc
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[EPEL-devel] Re: RHEL 7.7 Beta

2019-06-19 Thread Kevin Fenzi
On 6/12/19 1:48 AM, Miro Hrončok wrote:
> On 12. 06. 19 8:14, Thomas Stephen Lee wrote:
>> Hi,
>>
>> Just for your information.
>>
>> https://www.redhat.com/en/blog/red-hat-enterprise-linux-77-beta-now-available
>>
>>
>> Python 3.6 is there in 7.7
>>
>> https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7-beta/html/7.7_release_notes/overview
>>
>>
>> thanks
> 
> In that case, let's proceed with:
> 
> https://src.fedoraproject.org/rpms/python-rpm-macros/pull-request/19
> https://src.fedoraproject.org/rpms/python-rpm-macros/pull-request/20
> https://src.fedoraproject.org/rpms/python34/pull-request/35
> 
> Starting here: https://bugzilla.redhat.com/show_bug.cgi?id=1719633

But we don't want to actually land that until 7.7 is out right?

kevin





signature.asc
Description: OpenPGP digital signature
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org


Re: rawhide no longer recognizing autotool macros

2019-06-19 Thread Philip Kovacs via devel
 I use those macros wherever possible, but sometimes I need a raw `make`in 
order to specify uncommon targets.
I'll just replace `__make` with `make` for now.   No harm there.On 
Wednesday, June 19, 2019, 12:06:44 PM EDT, Vitaly Zaitsev via devel 
 wrote:  
 
 Hello, Philip Kovacs via devel.

Wed, 19 Jun 2019 15:28:10 + (UTC) you wrote:

> I notice I am still using the `__make` macro in my specs.  While they
> still work, should we proactively replace them with `make` ?

You can use %make_build and %make_install instead.

--
Sincerely,
 Vitaly Zaitsev (vit...@easycoding.org)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
  ___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: rawhide no longer recognizing autotool macros

2019-06-19 Thread Vitaly Zaitsev via devel
Hello, Philip Kovacs via devel.

Wed, 19 Jun 2019 15:28:10 + (UTC) you wrote:

> I notice I am still using the `__make` macro in my specs.  While they
> still work, should we proactively replace them with `make` ?

You can use %make_build and %make_install instead.

--
Sincerely,
 Vitaly Zaitsev (vit...@easycoding.org)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: rawhide no longer recognizing autotool macros

2019-06-19 Thread Philip Kovacs via devel
 
None that I can tell.  Years ago when I was writing my specs to add the 
packages I now maintain, I recallsomeone recommended to me the use of these 
macros as Fedora "tribal knowledge."  
I am happy to remove mine if their use is unnecessary and could lead to 
breakage. On Wednesday, June 19, 2019, 11:31:24 AM EDT, Christophe de 
Dinechin  wrote:  
 
 

> On 19 Jun 2019, at 17:28, Philip Kovacs via devel 
>  wrote:
> 
> I notice I am still using the `__make` macro in my specs.  While they still 
> work, should we proactively replace them with `make` ?

What’s the downside of removing it?

> 
> The additional message I am getting here is that the under-under macros might 
> be subject to removal.
> 
> Thanks
> Phil
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
  ___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: rawhide no longer recognizing autotool macros

2019-06-19 Thread Christophe de Dinechin


> On 19 Jun 2019, at 17:28, Philip Kovacs via devel 
>  wrote:
> 
> I notice I am still using the `__make` macro in my specs.  While they still 
> work, should we proactively replace them with `make` ?

Is there any downside in replacing it?

> 
> The additional message I am getting here is that the under-under macros might 
> be subject to removal.
> 
> Thanks
> Phil
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: rawhide no longer recognizing autotool macros

2019-06-19 Thread Philip Kovacs via devel
I notice I am still using the `__make` macro in my specs.  While they still 
work, should we proactively replace them with `make` ?
The additional message I am getting here is that the under-under macros might 
be subject to removal.
ThanksPhil___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[Bug 1722166] New: perl-Dancer2-0.208000 is available

2019-06-19 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1722166

Bug ID: 1722166
   Summary: perl-Dancer2-0.208000 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Dancer2
  Keywords: FutureFeature, Triaged
  Assignee: dd...@cpan.org
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: dd...@cpan.org, emman...@seyman.fr,
perl-devel@lists.fedoraproject.org
  Target Milestone: ---
Classification: Fedora



Latest upstream release: 0.208000
Current version/release in rawhide: 0.207000-3.fc31
URL: http://search.cpan.org/dist/Dancer2

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/5847/

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org


[Bug 1722166] perl-Dancer2-0.208000 is available

2019-06-19 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1722166



--- Comment #1 from Upstream Release Monitoring 
 ---
An unexpected error occurred while creating the scratch build and has been
automatically reported. Sorry!

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org


Orphaned python2-django1.11

2019-06-19 Thread Petr Viktorin

Hello,
Back when [Django 2.0] was released in Fedora 28, I took over Django 
1.11 LTS as some important (to me) packages depended on it. I'm no 
longer interested in maintaining it, so I've orphaned it.
Let me know if you want to take it. If no one does, it may be removed 
from Rawhide in 6 weeks.


Depending packages and their maintainers are:
- fts-monitoring (andreamanzi, simonm)
- python-oauth2client (mbaldessari, ralph)
- cobbler-web (jimi, kwizart, orion, shenson)

Let me know if you need help with these packages.


[Django 2.0]: https://fedoraproject.org/wiki/Changes/Django20
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Should python3-rpm-macros depend on python3?

2019-06-19 Thread Miro Hrončok

On 19. 06. 19 14:36, Neal Gompa wrote:

On Wed, Jun 19, 2019 at 8:09 AM Miro Hrončok  wrote:


On 19. 06. 19 12:24, Neal Gompa wrote:

On Wed, Jun 19, 2019 at 6:05 AM Miro Hrončok  wrote:


We have an interesting request for python3-rpm-macros to depend on python3.

See https://bugzilla.redhat.com/show_bug.cgi?id=1563789

Highlights:

- users who build for Python 3 are told (in the guidelines) to BR 
python3-devel
  (that brings in both python3 and python3-rpm-macros)
- the existence of python3-rpm-macros is left as an implementation detail 
for ^
- in theory, those macros can be used with other Pythons
  (such as pypy3 or python36, that is most likely not done in practice)

Arguments:

- to require: the macros are broken without a python3 interpreter
- to not: the macros should work with any python3 interpreter

Solutions?

- declare direct BR of macros without a python3 interpreter unsupported
- add dependency on python3. unused if used with another interpreter
- add a common virtual provide for all python3 interpreters
  or require (python3 or pypy3 or python36...) - very tedious



Have we ever tried using it with pypy3? Does it even work with that
(that is, pypy3-foo packages can be made)? If it does, we should just
add a common virtual provide to supported interpreters and require
that. Else, just require python3.


In practice, I have not. However in theory:

$ rpm --define '__python3 /usr/bin/pypy3' --eval '%python3_sitearch'
/usr/lib64/pypy3-7.1/site-packages

$ rpm --define '__python3 /usr/bin/python3.5' --eval '%python3_sitearch'
/usr/lib64/python3.5/site-packages

$ rpm --define '__python3 /usr/bin/python3.4' --eval '%python3_sitearch'
/usr/lib64/python3.4/site-packages

$ rpm --define '__python3 /usr/bin/python3.8' --eval '%python3_sitearch'
/usr/lib64/python3.8/site-packages



I took a look at pypy3, and I see we already define pypy3 variants of
the python3 macros... Do we want to deduplicate them and maybe have a
macro switch for flipping the interpreter? In that case, then
pypy3-devel should BR python3-rpm-macros...


No idea. I don't think that it is needed, I'm just saying it is possible.

--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
python-devel mailing list -- python-devel@lists.fedoraproject.org
To unsubscribe send an email to python-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/python-devel@lists.fedoraproject.org


Re: Fedora 31 System-Wide Change proposal: Switch RPMs to zstd compression

2019-06-19 Thread Panu Matilainen

On 6/19/19 1:51 PM, Aleš Matěj wrote:



At this point, the drpm library is the only blocker for zstd payloads,
since createrepo_c needs to be able to handle zstd drpms.


I looked into the drpm library and I should be able to add the zstd support
(and make sure it works with createrepo_c)

Working on it now.


FWIW, as drpm links to librpm anyway, it should be possible for drpm to 
just use the file API from rpm to gain support for everything that rpm 
does instead of duplicating the effort for all the compression types.


If there's something broken or missing that prevents this from working, 
we could always address that...


- Panu -
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Langpacks and the packages needed to display/input a language

2019-06-19 Thread Nicolas Mailhot via devel

Le 2019-06-19 14:32, Nicolas Mailhot a écrit :

Le 2019-06-19 12:48, Jens-Ulrik Petersen a écrit :
Hi


And yes as Nicolas also said maybe we need: langpacks-ko-fonts and
langpacks-ko-input-methods, etc.


I's much more than input methods, it's anything you need to read/write
a language (input, spell/grammar, fonts, etc)

Though the whole concept is difficult to convey in metapackage naming
to non-technical users. After thinking about it some more, what would
be understandable for everyone involved is

langpack-ui-foo Recommends langpack-foo

and

app-langpack-ui-foo  Recommends  app-langpack-foo
app-langpack-ui-foo  Supplements (langpack-ui-foo if app)
app-langpack-foo Supplements (langpack-foo if app)

since UI is better known than obscure acronyms like i18n or l10n


with also
app-langpack-ui-foo Requires langpack-ui-foo
app-langpack-fooRequires langpack-foo

if they can't function without the generic (not app specific) support 
installed


--
Nicolas Mailhot
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Langpacks and the packages needed to display/input a language

2019-06-19 Thread Nicolas Mailhot via devel

Le 2019-06-19 12:48, Jens-Ulrik Petersen a écrit :
Hi


And yes as Nicolas also said maybe we need: langpacks-ko-fonts and
langpacks-ko-input-methods, etc.


I's much more than input methods, it's anything you need to read/write a 
language (input, spell/grammar, fonts, etc)


Though the whole concept is difficult to convey in metapackage naming to 
non-technical users. After thinking about it some more, what would be 
understandable for everyone involved is


langpack-ui-foo Recommends langpack-foo

and

app-langpack-ui-foo  Recommends  app-langpack-foo
app-langpack-ui-foo  Supplements (langpack-ui-foo if app)
app-langpack-foo Supplements (langpack-foo if app)

since UI is better known than obscure acronyms like i18n or l10n



Now UNIX UIs have historically been horrible about all this, with *nix 
devs deriving UI language from input layout and completely massing up 
things. Microsoft is much better at it because Office is a major earner 
for them, and it is used to create documents in many human languages, so 
they had to learn how to do it properly a long time ago (last 
millennium, circa ’95)


The DEs and Wayland really need to break the UI language/input tie-up 
once and for all.



A user can consider that the localization of its favorite apps sucks 
loads, and configure his system UI to use another language. That does 
not mean he can switch the language processing capabilities of his 
system to this other language, unless he can convince all the people he 
interacts with in his country to switch too. So that's one major case 
where UI settings differ from language processing settings.


Conversely, a developer will produce material using computer languages, 
which are English-oriented, so he will often keep the UI in his native 
human language, but switch the language processing to English. So, the 
reverse difference exists.


Furthermore, anyone who speaks more than a single human language, will 
want the language processing parts for all those languages. But the UI 
can be all languages at once, so he'll only need a single UI langpack.


Lastly, DE settings (not necessarily the metapackages themselves) need 
to separate cleanly input method from language processing. No one who 
writes several languages that share the same script (for example 
English/French/Italian…) will accept to switch from AZERTY to QWERTY to 
QWERTZ whenever he switches languages. He will need to switch 
spellchecking though.



So all the language UI = input method = language processing does not 
exist in the real world and building technical solutions around this 
false equivalence does not work


Regards,

--
Nicolas Mailhot
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: F31 Self-Contained Change proposal: Custom Crypto Policies

2019-06-19 Thread Tomas Mraz
On Wed, 2019-06-19 at 12:38 +0200, Vít Ondruch wrote:
> Dne 18. 06. 19 v 21:50 Ben Cotton napsal(a):
> > == How To Test ==
> > 
> > This will be tested as part of the upstream crypto-policies
> > testsuite.
> 
> I think this section should describe, how I, as a Fedora user, am
> supposed to test this. E.g.
> 
> 1) Get this test package
> 
> 2) Modify this file
> 
> 3) Run this command
> 
> 4) And as a result, you can now verify by this command that this new
> crypto-policy is applied.

As this is self-contained change I am not sure this is necessary.
However I might provide test instructions or rather some kind of how-to 
as part of the crypto-policies documentation.

-- 
Tomáš Mráz
No matter how far down the wrong road you've gone, turn back.
  Turkish proverb
[You'll know whether the road is wrong if you carefully listen to your
conscience.]

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: F31 Self-Contained Change proposal: Custom Crypto Policies

2019-06-19 Thread Tomas Mraz
On Wed, 2019-06-19 at 12:49 +0200, Vít Ondruch wrote:
> Dne 19. 06. 19 v 12:00 Tomas Mraz napsal(a):
> > On Wed, 2019-06-19 at 10:19 +0200, Vít Ondruch wrote:
> > > Dne 18. 06. 19 v 21:50 Ben Cotton napsal(a):
> > > > https://fedoraproject.org/wiki/Changes/CustomCryptoPolicies
> > > > 
> > > > == Summary ==
> > > > This new feature of crypto-policies allows system
> > > > administrators
> > > > and
> > > > third party providers to modify and adjust the existing system-
> > > > wide
> > > > crypto policies to enable or disable algorithms and protocols.
> > > > 
> > > > == Owner ==
> > > > * Name: [[User:Tmraz | Tomáš Mráz]]
> > > > * Email: tm...@redhat.com
> > > > 
> > > > == Detailed Description ==
> > > > 
> > > > The crypto-policies package will be enhanced to allow system
> > > > administrators to modify the existing system-wide crypto policy
> > > > levels
> > > > by removing or adding enabled algorithms and protocols. For
> > > > example
> > > > it
> > > > will be possible to easily modify the existing DEFAULT
> > > I just wonder what is the strategy here? Does it means that the
> > > "DEFAULT" definition will be store permanently somewhere in /usr/
> > > and
> > > I'll be able to copy the DEFAULT into /etc and modify it
> > > according to
> > > my
> > > needs?
> > > 
> > > I am just asking, because AFAIK, currently the crypto policies
> > > configuration is stored just in /etc and modifying the "DEFAULT"
> > > profile
> > > would make the updates problematic, requiring someone to file
> > > with
> > > .rpmnew files etc. That would be unfortunate.
> > The configuration files will be created by a simple python
> > application
> > (which the update-crypto-policies will transform into). You will
> > specify just the modifications that should be done to the base
> > policy.
> > 
> > Please see 
> > https://gitlab.com/redhat-crypto/fedora-crypto-policies/tree/custom-policies
> >  
> > to get the idea.
> > 
> > We might continue shipping the "unmodified" configurations in
> > /usr/share but I do not see much benefit in that except for being
> > able
> > for the sysadmin to look at how the unmodified individual
> > configurations look like without applying the policy to the system.
> > 
> 
> Looking at "unmodified" configuration is great benefit on itself.

Unmodified from what? What I meant above were the unmodified pristine
DEFAULT, LEGACY, FUTURE or FIPS configurations, not something like 
library default configuration without crypto policies.

> Being able to `rm -rf /etc/cryptopolicies` (or whatever is the right
> folder) to restore the original configuration would be even better.
> But
> maybe the "update-crypto-policies" creates configuration files for
> several cryptolibraries, so this might not be possible without
> modification of those libraries, dunno.

But no such thing was ever possible since crypto policies were
introduced and there is currently no plan to do that.

This is certainly out of scope for the Custom Crypto Policies change.

I am also not sure what do you mean exactly by "original configuration"
- do you mean the configuration if there was no crypto-policies on the
system? Then that would require more configuration handling changes on
the individual crypto backend libraries/applications.

-- 
Tomáš Mráz
No matter how far down the wrong road you've gone, turn back.
  Turkish proverb
[You'll know whether the road is wrong if you carefully listen to your
conscience.]

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: rawhide no longer recognizing autotool macros

2019-06-19 Thread Panu Matilainen

On 6/19/19 11:40 AM, Zbigniew Jędrzejewski-Szmek wrote:

On Wed, Jun 19, 2019 at 01:21:38AM -0400, Elliott Sales de Andrade wrote:

On Wed, 19 Jun 2019 at 01:18, Philip Kovacs via devel
 wrote:


OK, my builds are back in order having removed those macros and replaced them 
with commands.

I expect that many package maintainers will be hit with this.


Yes. Let's change the expectation here: 


I don't see there's any change in expectation involved...


if you are a maintainer
introducing a change in your package that will impact many other
packages, please either
a) (preferably) just fix the dependent packages if easy
or
b) communicate widely at fedora-devel *in advance*.

We don't want to have confused packagers on fedora-devel, and we certainly
don't want packages failing in the mass rebuilds because of things that
are easily avoided.


Of course. But "many" is such a relative term. The __auto* macro (ab)use 
is such a tiny minority that I frankly didn't even remember removing 
them, much less think of "announcing" that we removed some internal 
cruft (which it is from rpm POV). The perl and python changes were
an entirely different matter, and were communicated and coordinated 
although clearly mistakes were made there too and it could've gone 
smoother. Too long since the last major update, routines get rusty.



In this case option a) is trivial, so I went ahead an run 'sed -r -i' over the
specs Elliot listed, removing __aclocal, __autoconf, __automake, __autoheader, 
__libtoolize.
I pushed the changes directly to git. 8 packages build OK with rpm-4.14.90, 
OpenIMPI fails for
unrelated reasons. slurm was already fixed.


Yes, a) is trivial ... if you're a provenpackager. I'm not ;)

Anyway, thanks.

- Panu -


Zbyszek


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: RFC: Multiple parallel side tags

2019-06-19 Thread Pierre-Yves Chibon
On Wed, Jun 19, 2019 at 12:48:49AM +0200, Kevin Kofler wrote:
> Kevin Fenzi wrote:
> > I again completely disagree. There is no reason for weeks of breakage.
> > Most of the issues that break composes are unannounced abi bumps where
> > just rebuilding dependent packages fixes it. Or broken deps (likewise).
> > Or mistakes made in kickstarts/comps. Or something that doesn't even
> > run. What good does having everyone broken for weeks do?
> 
> There are several reasons why weeks of breakage are entirely reasonable for 
> a distribution under development:
> 
> 1. A bump of a library to a new major version. It can take a few weeks for 
> dependent packages to be ported to the new version. But it is often worth 
> waiting rather than introducing a compatibility library with all the mess 
> that comes with it. (Of course, that does not hold for a library like Qt 
> where getting everything ported to the new version is not realistic even in 
> a couple weeks. Those are the cases where a compatibility library is needed 
> basically forever. But there are libraries where it makes sense to just port 
> everything.) The workflow would be to just bump the library to the new 
> version in Rawhide immediately and then let dependent packages get fixed 
> over time as their upstreams, Fedora packagers, or other distros' packagers 
> port them.
> 
> 2. Vacation. The maintainer of the dependent package may be on vacation (or 
> even just busy with paid work, in case of volunteers) and therefore unable 
> to fix their package immediately. So you may have to wait a few weeks for 
> the broken dependency to get fixed if a simple rebuild is not enough.

I think both are valid reasons but I disagree that they should impact the entire
Fedora. So rather than breaking rawhide, use a side-tag, take all the time you
need and don't affect other people until everything is ready.
Whether you are the one doing all the rebuilds or working with other people,
the side tag model allows you to go at your own speed without affecting anyone
else.

> This has all worked just fine in the past, before it was decided to make
> basically every single broken dependency fail the entire Rawhide compose.
> Soname bumps did not even have to be announced, they would get announced by
> the broken dependency report within less than 24 hours anyway, and then
> eventually fixed (without somebody unrealistically expecting maintainers to
> fix the broken dependency in less than 24 hours to make the next compose
> succeed, which is just plain impossible for the average volunteer packager,
> especially if source code changes are needed).

This is both true and false. Yes this is how it used to be, no it did not work
"just fine". It relied on other people doing heroic work to clean up someone's
mess. We've had volunteers that were spending hours just rebuilding broken
dependencies due to an unannounced soname bumps. I'm sure these people would
have preferred to spend this time with their family, playing video games or just
contributing to other parts of Fedora.

With the new model, you do not impose work on someone else (which may also be in
vacation as you point out here, and thus keeping things unfixable for a
potentially long period of time), you either fix everything yourself or work
with other to fix them and then you can affect the entire distribution.
And if you want to bypass the gating mechanism, it is possible, but then it's a
concious decision that you are making to make other people's life miserable and
you may be asked the reasons for which you made this decision.


Pierre
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Should python3-rpm-macros depend on python3?

2019-06-19 Thread Miro Hrončok

On 19. 06. 19 12:24, Neal Gompa wrote:

On Wed, Jun 19, 2019 at 6:05 AM Miro Hrončok  wrote:


We have an interesting request for python3-rpm-macros to depend on python3.

See https://bugzilla.redhat.com/show_bug.cgi?id=1563789

Highlights:

   - users who build for Python 3 are told (in the guidelines) to BR 
python3-devel
 (that brings in both python3 and python3-rpm-macros)
   - the existence of python3-rpm-macros is left as an implementation detail 
for ^
   - in theory, those macros can be used with other Pythons
 (such as pypy3 or python36, that is most likely not done in practice)

Arguments:

   - to require: the macros are broken without a python3 interpreter
   - to not: the macros should work with any python3 interpreter

Solutions?

   - declare direct BR of macros without a python3 interpreter unsupported
   - add dependency on python3. unused if used with another interpreter
   - add a common virtual provide for all python3 interpreters
 or require (python3 or pypy3 or python36...) - very tedious



Have we ever tried using it with pypy3? Does it even work with that
(that is, pypy3-foo packages can be made)? If it does, we should just
add a common virtual provide to supported interpreters and require
that. Else, just require python3.


In practice, I have not. However in theory:

$ rpm --define '__python3 /usr/bin/pypy3' --eval '%python3_sitearch'
/usr/lib64/pypy3-7.1/site-packages

$ rpm --define '__python3 /usr/bin/python3.5' --eval '%python3_sitearch'
/usr/lib64/python3.5/site-packages

$ rpm --define '__python3 /usr/bin/python3.4' --eval '%python3_sitearch'
/usr/lib64/python3.4/site-packages

$ rpm --define '__python3 /usr/bin/python3.8' --eval '%python3_sitearch'
/usr/lib64/python3.8/site-packages


--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
python-devel mailing list -- python-devel@lists.fedoraproject.org
To unsubscribe send an email to python-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/python-devel@lists.fedoraproject.org


Re: what to do when original upstream recover from death?

2019-06-19 Thread Petr Stodulka
Thanks Miro. That's basically what I had in mind. I am waiting now to see how it
will be but the most probably we switch to the original upstream. It seems that
they will continue with versioning of the currently used upstream, so epocha 
will
not be needed. Currently there is some syncing of repositories so I am waiting
for the new release (I guess it is question of several weeks).

(Currently, the package is broken now because of changes in the latest version
of mercurial, so maybe I will do some fixes before that.)

On 06. 06. 19 13:04, Miro Hrončok wrote:
> On 06. 06. 19 12:55, Petr Stodulka wrote:
>> Hi guys,
>> I have one curious question about the current situation around git-remote-hg.
>> To put you into the context, the solution was originally part of the git
>> upstream itself and several years ago has been split into the own upstream 
>> [0].
>>
>> After a time, the upstream[0] did last commit in Sep27 2016 and since the 
>> date
>> Jan 24 2018 the account has been no active till this april. After a long time
>> has been started discussion about change to new upstream [1] which was active
>> and responding. Nowadays, this "new upstream" provides the git-remote-hg in 
>> pypi
>> and it is marked by Github as "source-repo" - the original one [0] is marked 
>> as
>> clone nowadays by Github.
>>
>> I decided to switched into the upstream [1] on Aug 20 2018 from that point as
>> did several other projects. But several days ago the original upstream has
>> started to be active again. I guess that guys will make an agreement to setup
>> the original upstream back to [0], but currently it looks that original
>> upstream[0] do not care about the releases of new upstream that has been done
>> meanwhile and probably will continue with own versioning. I am trying
>> to discuss that to not have mix of same versions for different code. Not sure
>> whether I will be successful from that point.
>>
>> I expect that we will have to move back to the original upstream[0] anyway in
>> Fedora, and in such case probably I will have to raise epoch in case of
>> discontinuation in current versioning.
>>
>> My question is, do you have any related experience to the topic? I already
>> had some exprience with death upstreams, but this is really new to me.
>> As well, I am curious whether I did mistake when I switched to the
>> upstream[1] regarding the situation there was about the project.
> 
> It's always a tough decision to make. It was not a mistake, you could not 
> have known.
> 
> I recommend the following:
> 
>  1. make the upstreams talk to each other
>  2. make the upstreams talk to each other
>  3. make the upstreams talk to each other
>  4. if the above fails, pick the once that would benefit the most users
>  5. but keep an eye on the other one in case it changes
>     (but don't switch there and back every month)
>  6. make the upstreams talk to each other
> 
> Hope that helps.
> 

-- 
Petr Stodulka
OS & Application Modernization
IRC nicks: pstodulk, skytak
Software Engineer
Red Hat Czech s.r.o.



signature.asc
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 31 System-Wide Change proposal: Switch RPMs to zstd compression

2019-06-19 Thread Martin Kolman
On Wed, 2019-06-19 at 10:51 +, Aleš Matěj wrote:
> > At this point, the drpm library is the only blocker for zstd payloads,
> > since createrepo_c needs to be able to handle zstd drpms.
> 
> I looked into the drpm library and I should be able to add the zstd support 
> (and make sure it works with createrepo_c) 
> 
> Working on it now.
Nice & thanks in advance! :)
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[389-devel] Re: Issue with building RPMs with ASAN_ON

2019-06-19 Thread Simon Pichugin
On Wed, Jun 19, 2019 at 09:20:26AM +0200, William Brown wrote:
> 
> 
> > On 18 Jun 2019, at 17:45, Viktor Ashirov  wrote:
> > 
> > 
> > 
> > On Tue, Jun 18, 2019 at 7:54 AM Viktor Ashirov  wrote:
> > On Tue, Jun 18, 2019 at 1:30 AM Simon Pichugin  wrote:
> > >
> > > Hi team,
> > > I'm in the process of creating a Vagrant file which is close to the 
> > > customer's ENV.
> > > It is heavilly based on Viktor's beaker task.
> > > I use it for building and testing my code. And it is pretty important to 
> > > build with ASAN.
> > >
> > > Currently, what I do is:
> > > 1. Set 'ASAN_ON = 1' in rpm.mk
> > > 2. Run `make -f rpm.mk srpms` target
> > > 3. Build the RPM using `mock -q my_generated.srpm`
> > > 4. Install it
> > >
> > > Then I've tried running `dscreate` manually or running tests with py.test.
> > > Every time I have the same error here: 
> > > /run/dirsrv/ns-slapd-standalone1.asan.X
> > >
> > > ==22487==LeakSanitizer has encountered a fatal error.
> > > ==22487==HINT: For debugging, try setting environment variable 
> > > LSAN_OPTIONS=verbosity=1:log_threads=1
> > > ==22487==HINT: LeakSanitizer does not work under ptrace (strace, gdb, 
> > > etc)
> > Ludwig also recently had this issue. Looks like you're hitting this
> > bug: https://github.com/google/sanitizers/issues/723
> > We're using posix_memalign() in a few places and LeakSanitizier can't 
> > handle it.
> > So, the issue Simon was seeing is not related to the issue above. 
> > Turns out, it's just SELinux :)
Thanks, Viktor, once again!

> > 
> > 
> > 
> >  
> > time->Tue Jun 18 11:27:24 2019  
> > 
> >  
> > type=AVC msg=audit(1560871644.883:596): avc:  denied  { ptrace } for  
> > pid=3632 comm="ns-slapd" scontext=system_u:system_r:dirsrv_t:s0 
> > tcontext=system_u:system_r:dirsrv_t:s0 
> > tclass=process permissive=0 
> >   
> > [root@server ds]# ausearch -m AVC  | audit2allow
> > 
> >  
> > 
> > 
> >  
> > 
> > 
> >  
> > #= dirsrv_t ==  
> > 
> >  
> > allow dirsrv_t self:process ptrace;
> 
> Heh, selinux strikes again!
> 
> Were you running as a user, not as root? 
> 
Nope. I was running as root.

Regards,
Simon


signature.asc
Description: PGP signature
___
389-devel mailing list -- 389-devel@lists.fedoraproject.org
To unsubscribe send an email to 389-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/389-devel@lists.fedoraproject.org


Re: Fedora 31 System-Wide Change proposal: Switch RPMs to zstd compression

2019-06-19 Thread Aleš Matěj

> At this point, the drpm library is the only blocker for zstd payloads,
> since createrepo_c needs to be able to handle zstd drpms.

I looked into the drpm library and I should be able to add the zstd support 
(and make sure it works with createrepo_c) 

Working on it now.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: F31 Self-Contained Change proposal: Custom Crypto Policies

2019-06-19 Thread Vít Ondruch

Dne 19. 06. 19 v 12:00 Tomas Mraz napsal(a):
> On Wed, 2019-06-19 at 10:19 +0200, Vít Ondruch wrote:
>> Dne 18. 06. 19 v 21:50 Ben Cotton napsal(a):
>>> https://fedoraproject.org/wiki/Changes/CustomCryptoPolicies
>>>
>>> == Summary ==
>>> This new feature of crypto-policies allows system administrators
>>> and
>>> third party providers to modify and adjust the existing system-wide
>>> crypto policies to enable or disable algorithms and protocols.
>>>
>>> == Owner ==
>>> * Name: [[User:Tmraz | Tomáš Mráz]]
>>> * Email: tm...@redhat.com
>>>
>>> == Detailed Description ==
>>>
>>> The crypto-policies package will be enhanced to allow system
>>> administrators to modify the existing system-wide crypto policy
>>> levels
>>> by removing or adding enabled algorithms and protocols. For example
>>> it
>>> will be possible to easily modify the existing DEFAULT
>> I just wonder what is the strategy here? Does it means that the
>> "DEFAULT" definition will be store permanently somewhere in /usr/ and
>> I'll be able to copy the DEFAULT into /etc and modify it according to
>> my
>> needs?
>>
>> I am just asking, because AFAIK, currently the crypto policies
>> configuration is stored just in /etc and modifying the "DEFAULT"
>> profile
>> would make the updates problematic, requiring someone to file with
>> .rpmnew files etc. That would be unfortunate.
> The configuration files will be created by a simple python application
> (which the update-crypto-policies will transform into). You will
> specify just the modifications that should be done to the base policy.
>
> Please see 
> https://gitlab.com/redhat-crypto/fedora-crypto-policies/tree/custom-policies 
> to get the idea.
>
> We might continue shipping the "unmodified" configurations in
> /usr/share but I do not see much benefit in that except for being able
> for the sysadmin to look at how the unmodified individual
> configurations look like without applying the policy to the system.
>

Looking at "unmodified" configuration is great benefit on itself.

Being able to `rm -rf /etc/cryptopolicies` (or whatever is the right
folder) to restore the original configuration would be even better. But
maybe the "update-crypto-policies" creates configuration files for
several cryptolibraries, so this might not be possible without
modification of those libraries, dunno.


Vít

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: RFC: Multiple parallel side tags

2019-06-19 Thread Stephen John Smoogen
On Tue, 18 Jun 2019 at 19:42, Kevin Kofler  wrote:

> Kevin Fenzi wrote:
>
> This has all worked just fine in the past, before it was decided to make
> basically every single broken dependency fail the entire Rawhide compose.
> Soname bumps did not even have to be announced, they would get announced
> by
> the broken dependency report within less than 24 hours anyway, and then
> eventually fixed (without somebody unrealistically expecting maintainers
> to
> fix the broken dependency in less than 24 hours to make the next compose
> succeed, which is just plain impossible for the average volunteer
> packager,
> especially if source code changes are needed).
>
>
I am having a hard time reconciling the above with all the times you have
angrily called out anyone who landed something broken in rawhide which
affected what you wanted to do.




> Kevin Kofler
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
>


-- 
Stephen J Smoogen.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Langpacks and the packages needed to display/input a language

2019-06-19 Thread Jens-Ulrik Petersen
On Tue, Jun 18, 2019 at 3:07 AM Jason L Tibbitts III 
wrote:

> > "JP" == Jens-Ulrik Petersen  writes:
> I install a generic minimal system via kickstart (booted using the
> Server PXE images and using the Everything repositories) and then after
> the reboot, ansible runs (via ansible-pull) and installs whatever is
> needed for the type of system it's configured to be.
>

Okay I see, thanks: so presumably previously you were installing language
support groups.

Some time back lang supports groups also pulled in langpacks of
translations though.


> JP> One can also just try `dnf -n install langpacks-ko` to check what
> JP> fonts (and input method) would be pulled in, and you are free to
> JP> remove langpacks-ko anyway.
>
> Yes, though it's simpler to me to just pull the dependencies out of the
> langpacks specfile as I'm doing now.  Unfortunately that means I have to
> periodically recheck if, for example, the recommended font set for
> Gujarati happens to change in the future.  It's not an undue burden but
> it was nice to be able to rely on installing @gujarati-support as was
> the case pre-F30.
>

It sounds like what you probably really want is:

`dnf install @fonts @input-methods`

That will get you the default-installed system fonts and input methods (as
you would get in a standard Workstation install).

This kind of problem also becomes more relevant for Toolbox containers,
etc, which are also typically minimal installs.

JP> I am wondering how you reached 3GB - the Noto CJK fonts we now ship
> JP> are not small on disk - that might be a part of the problem perhaps.
>
> Well, as I wrote previously, it's things like the Libreoffice help files
> and the Tesseract recognition data which get pulled in via Supplements:.
> These can be quite large.  And some of the size difference is certainly
> unrelated to this issue.  (I was installing a total of twelve
> langpacks but I should probably be installing even more.)
>

Currently it is only really intended for a few (one or two) langpacks-*
packages to be installed.
Normally just for one's native language say. This may change as the
experience evolves.
I agree that installing all langpacks-* does not make sense - it will also
pull in many locales packages,
possibly duplicating locales in the glibc-all-langpacks archive.

And yes as Nicolas also said maybe we need: langpacks-ko-fonts and
langpacks-ko-input-methods, etc.
This needs a little more thought and discussion I feel, but we could
consider it for F31 or F32 surely.

Jens
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: F31 Self-Contained Change proposal: Custom Crypto Policies

2019-06-19 Thread Vít Ondruch

Dne 18. 06. 19 v 21:50 Ben Cotton napsal(a):
> == How To Test ==
>
> This will be tested as part of the upstream crypto-policies testsuite.


I think this section should describe, how I, as a Fedora user, am
supposed to test this. E.g.

1) Get this test package

2) Modify this file

3) Run this command

4) And as a result, you can now verify by this command that this new
crypto-policy is applied.


Vít
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Should python3-rpm-macros depend on python3?

2019-06-19 Thread Neal Gompa
On Wed, Jun 19, 2019 at 6:05 AM Miro Hrončok  wrote:
>
> We have an interesting request for python3-rpm-macros to depend on python3.
>
> See https://bugzilla.redhat.com/show_bug.cgi?id=1563789
>
> Highlights:
>
>   - users who build for Python 3 are told (in the guidelines) to BR 
> python3-devel
> (that brings in both python3 and python3-rpm-macros)
>   - the existence of python3-rpm-macros is left as an implementation detail 
> for ^
>   - in theory, those macros can be used with other Pythons
> (such as pypy3 or python36, that is most likely not done in practice)
>
> Arguments:
>
>   - to require: the macros are broken without a python3 interpreter
>   - to not: the macros should work with any python3 interpreter
>
> Solutions?
>
>   - declare direct BR of macros without a python3 interpreter unsupported
>   - add dependency on python3. unused if used with another interpreter
>   - add a common virtual provide for all python3 interpreters
> or require (python3 or pypy3 or python36...) - very tedious
>

Have we ever tried using it with pypy3? Does it even work with that
(that is, pypy3-foo packages can be made)? If it does, we should just
add a common virtual provide to supported interpreters and require
that. Else, just require python3.


-- 
真実はいつも一つ!/ Always, there's only one truth!
___
python-devel mailing list -- python-devel@lists.fedoraproject.org
To unsubscribe send an email to python-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/python-devel@lists.fedoraproject.org


Re: F31 Self-Contained Change proposal: Custom Crypto Policies

2019-06-19 Thread Tomas Mraz
On Wed, 2019-06-19 at 10:19 +0200, Vít Ondruch wrote:
> Dne 18. 06. 19 v 21:50 Ben Cotton napsal(a):
> > https://fedoraproject.org/wiki/Changes/CustomCryptoPolicies
> > 
> > == Summary ==
> > This new feature of crypto-policies allows system administrators
> > and
> > third party providers to modify and adjust the existing system-wide
> > crypto policies to enable or disable algorithms and protocols.
> > 
> > == Owner ==
> > * Name: [[User:Tmraz | Tomáš Mráz]]
> > * Email: tm...@redhat.com
> > 
> > == Detailed Description ==
> > 
> > The crypto-policies package will be enhanced to allow system
> > administrators to modify the existing system-wide crypto policy
> > levels
> > by removing or adding enabled algorithms and protocols. For example
> > it
> > will be possible to easily modify the existing DEFAULT
> 
> I just wonder what is the strategy here? Does it means that the
> "DEFAULT" definition will be store permanently somewhere in /usr/ and
> I'll be able to copy the DEFAULT into /etc and modify it according to
> my
> needs?
> 
> I am just asking, because AFAIK, currently the crypto policies
> configuration is stored just in /etc and modifying the "DEFAULT"
> profile
> would make the updates problematic, requiring someone to file with
> .rpmnew files etc. That would be unfortunate.

The configuration files will be created by a simple python application
(which the update-crypto-policies will transform into). You will
specify just the modifications that should be done to the base policy.

Please see 
https://gitlab.com/redhat-crypto/fedora-crypto-policies/tree/custom-policies 
to get the idea.

We might continue shipping the "unmodified" configurations in
/usr/share but I do not see much benefit in that except for being able
for the sysadmin to look at how the unmodified individual
configurations look like without applying the policy to the system.

-- 
Tomáš Mráz
No matter how far down the wrong road you've gone, turn back.
  Turkish proverb
[You'll know whether the road is wrong if you carefully listen to your
conscience.]

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Should python3-rpm-macros depend on python3?

2019-06-19 Thread Miro Hrončok

We have an interesting request for python3-rpm-macros to depend on python3.

See https://bugzilla.redhat.com/show_bug.cgi?id=1563789

Highlights:

 - users who build for Python 3 are told (in the guidelines) to BR python3-devel
   (that brings in both python3 and python3-rpm-macros)
 - the existence of python3-rpm-macros is left as an implementation detail for ^
 - in theory, those macros can be used with other Pythons
   (such as pypy3 or python36, that is most likely not done in practice)

Arguments:

 - to require: the macros are broken without a python3 interpreter
 - to not: the macros should work with any python3 interpreter

Solutions?

 - declare direct BR of macros without a python3 interpreter unsupported
 - add dependency on python3. unused if used with another interpreter
 - add a common virtual provide for all python3 interpreters
   or require (python3 or pypy3 or python36...) - very tedious


--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
python-devel mailing list -- python-devel@lists.fedoraproject.org
To unsubscribe send an email to python-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/python-devel@lists.fedoraproject.org


Re: octave 5.1 coming to rawhide

2019-06-19 Thread José Abílio Matos
On Tuesday, 18 June 2019 04.31.35 WEST Orion Poplawski wrote:
> Built in rawhide.  Modular updates submitted for F30 and F29.
> 
> https://bodhi.fedoraproject.org/updates/FEDORA-MODULAR-2019-917b958a40
> https://bodhi.fedoraproject.org/updates/FEDORA-MODULAR-2019-fe2f378273

In order to update in Fedora 30 I had to:

(the first one was necessary on one machine)
# dnf module reset octave

(these steps are required)
# dnf module enable octave:5.1
# dnf upgrade

In the last command I had to use --best --allowerasing to update all octave 
packages, that lead to the removal of octave-communications and octave-
parallel, due to the issues that you described in this thread.

Best regards,
-- 
José Abílio

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: rawhide no longer recognizing autotool macros

2019-06-19 Thread Zbigniew Jędrzejewski-Szmek
On Wed, Jun 19, 2019 at 01:21:38AM -0400, Elliott Sales de Andrade wrote:
> On Wed, 19 Jun 2019 at 01:18, Philip Kovacs via devel
>  wrote:
> >
> > OK, my builds are back in order having removed those macros and replaced 
> > them with commands.
> >
> > I expect that many package maintainers will be hit with this.

Yes. Let's change the expectation here: if you are a maintainer
introducing a change in your package that will impact many other
packages, please either
a) (preferably) just fix the dependent packages if easy
or
b) communicate widely at fedora-devel *in advance*.

We don't want to have confused packagers on fedora-devel, and we certainly
don't want packages failing in the mass rebuilds because of things that
are easily avoided.

In this case option a) is trivial, so I went ahead an run 'sed -r -i' over the
specs Elliot listed, removing __aclocal, __autoconf, __automake, __autoheader, 
__libtoolize.
I pushed the changes directly to git. 8 packages build OK with rpm-4.14.90, 
OpenIMPI fails for
unrelated reasons. slurm was already fixed.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: RFC: Multiple parallel side tags

2019-06-19 Thread Aleksandra Fedorova
On Wed, Jun 19, 2019 at 10:29 AM Vít Ondruch  wrote:
>
>
> Dne 18. 06. 19 v 16:54 Aleksandra Fedorova napsal(a):
> > On Tue, Jun 18, 2019 at 1:31 PM Neal Gompa  wrote:
> >> On Tue, Jun 18, 2019 at 5:21 AM Aleksandra Fedorova  
> >> wrote:
> >>> Hi,
> >>> On Tue, Jun 18, 2019 at 3:05 AM Neal Gompa  wrote:
>  On Mon, Jun 17, 2019 at 8:53 PM Kevin Fenzi  wrote:
> > On 6/17/19 4:47 PM, Kevin Kofler wrote:
> >> Kevin Fenzi wrote:
> >>> I disagree. I think we need gating to block as much stuff that breaks
> >>> things from landing as we can and then we should find that keeping
> >>> composes going is much easier on all of us. Then things can be fixed
> >>> when gating catches them and it's on the person who broke things.
> >> And that is going to make development completely cringe to a halt. It 
> >> is the
> >> nature of a distribution branch under development that things will 
> >> sometimes
> >> be completely broken for a couple weeks. There needs to be a place to 
> >> do
> >> development that can cause such temporary breakage.
> > I again completely disagree. There is no reason for weeks of breakage.
> > Most of the issues that break composes are unannounced abi bumps where
> > just rebuilding dependent packages fixes it. Or broken deps (likewise).
> > Or mistakes made in kickstarts/comps. Or something that doesn't even
> > run. What good does having everyone broken for weeks do?
> >
>  And that comes down to people shouldn't need to have to think about
>  these things when working in Rawhide. While I don't disagree that
>  Rawhide should be usable, I fundamentally disagree with making it
>  harder for people to put things in Rawhide. We should be developing
>  our tooling to make it _easier_ for stuff to go into Rawhide, and have
>  Rawhide fix itself when the issues are relatively trivial to fix (such
>  as reverse dependency rebuilding).
> >>> I think this is exactly what gating is supposed to do.
> >>>
> >>> Let's compare it in this way:
> >>>
> >>> currently to add a feature which may break Rawhide and some unknown
> >>> dependencies of the component you need to write a HEADS-UP e-mail, or,
> >>> better, submit a Change request with the analysis of the change.
> >>> People who read this e-mail would need to make a guess on whether or
> >>> not his change affects them, then they have to fetch it and test it
> >>> somehow, then they have to provide the feedback back to you. You need
> >>> to wait for feedback, then you get the reports, in best cases - bugs,
> >>> which you need to debug, requesting more info. Then you implement the
> >>> change, hit the unexpected bug, which was unnoticed, and block others
> >>> from building their packages and implementing their changes for
> >>> unknown amount of time.
> >>>
> >>> With gating you can submit a code change, the tooling will take care
> >>> of building it, building its dependencies, informing you of possible
> >>> breakages, giving you the list of actual issues with all the debug
> >>> logs. And then based on this data you can proceed or stop and rework
> >>> the change a bit more in collaboration with exactly those people
> >>> affected.
> >>>
> >>> I also think that we need a second point of view here: you were
> >>> talking about not driving away the developer, who makes the change.
> >>> But there are also other people who we shouldn't drive away. For
> >>> example developers who depend on the change. Or QA who need to react
> >>> on such changes. These people are have their part in the process.
> >>>
> >>>
> >>> But, to be honest, I think there is a bit of overreacting on the
> >>> entire Gating topic.
> >>>
> >>> It doesn't do a hard block. It is included in the design that gating
> >>> can be bypassed. But it supposed to provide better analysis of the
> >>> change. Bypassing of the gate can happen, The key here is that it
> >>> won't be a surprise, rather informed decision.
> >>>
> >> I think this is the first time I've heard a coherent description of
> >> the intent of this stuff. If it really is intended to work this way,
> >> it'd be very helpful.
> >>
> >> The side tag approach already does not scale, as evidenced by this 
> >> thread.
> > It does. You just need to communicate with others working in the same
> > area, IMHO. I don't think we need some technical thing for something
> > that happens rarely and can be solved by more communication.
> >
>  Side tags will happen a lot more often because the tooling is pushing
>  us to do it that way. Don't discount the potential for future
>  insanity. I'm still not sure side-tags are enough. Could we have a
>  concept of a "scratch side tag"? Something like a scratch build, but
>  contains a collection of builds and creates an overlay repo that can
>  be used to run checks on for auto-merging? If they're good, then it
>  would get auto-built 

Re: RFC: Multiple parallel side tags

2019-06-19 Thread Vít Ondruch

Dne 18. 06. 19 v 16:54 Aleksandra Fedorova napsal(a):
> On Tue, Jun 18, 2019 at 1:31 PM Neal Gompa  wrote:
>> On Tue, Jun 18, 2019 at 5:21 AM Aleksandra Fedorova  
>> wrote:
>>> Hi,
>>> On Tue, Jun 18, 2019 at 3:05 AM Neal Gompa  wrote:
 On Mon, Jun 17, 2019 at 8:53 PM Kevin Fenzi  wrote:
> On 6/17/19 4:47 PM, Kevin Kofler wrote:
>> Kevin Fenzi wrote:
>>> I disagree. I think we need gating to block as much stuff that breaks
>>> things from landing as we can and then we should find that keeping
>>> composes going is much easier on all of us. Then things can be fixed
>>> when gating catches them and it's on the person who broke things.
>> And that is going to make development completely cringe to a halt. It is 
>> the
>> nature of a distribution branch under development that things will 
>> sometimes
>> be completely broken for a couple weeks. There needs to be a place to do
>> development that can cause such temporary breakage.
> I again completely disagree. There is no reason for weeks of breakage.
> Most of the issues that break composes are unannounced abi bumps where
> just rebuilding dependent packages fixes it. Or broken deps (likewise).
> Or mistakes made in kickstarts/comps. Or something that doesn't even
> run. What good does having everyone broken for weeks do?
>
 And that comes down to people shouldn't need to have to think about
 these things when working in Rawhide. While I don't disagree that
 Rawhide should be usable, I fundamentally disagree with making it
 harder for people to put things in Rawhide. We should be developing
 our tooling to make it _easier_ for stuff to go into Rawhide, and have
 Rawhide fix itself when the issues are relatively trivial to fix (such
 as reverse dependency rebuilding).
>>> I think this is exactly what gating is supposed to do.
>>>
>>> Let's compare it in this way:
>>>
>>> currently to add a feature which may break Rawhide and some unknown
>>> dependencies of the component you need to write a HEADS-UP e-mail, or,
>>> better, submit a Change request with the analysis of the change.
>>> People who read this e-mail would need to make a guess on whether or
>>> not his change affects them, then they have to fetch it and test it
>>> somehow, then they have to provide the feedback back to you. You need
>>> to wait for feedback, then you get the reports, in best cases - bugs,
>>> which you need to debug, requesting more info. Then you implement the
>>> change, hit the unexpected bug, which was unnoticed, and block others
>>> from building their packages and implementing their changes for
>>> unknown amount of time.
>>>
>>> With gating you can submit a code change, the tooling will take care
>>> of building it, building its dependencies, informing you of possible
>>> breakages, giving you the list of actual issues with all the debug
>>> logs. And then based on this data you can proceed or stop and rework
>>> the change a bit more in collaboration with exactly those people
>>> affected.
>>>
>>> I also think that we need a second point of view here: you were
>>> talking about not driving away the developer, who makes the change.
>>> But there are also other people who we shouldn't drive away. For
>>> example developers who depend on the change. Or QA who need to react
>>> on such changes. These people are have their part in the process.
>>>
>>>
>>> But, to be honest, I think there is a bit of overreacting on the
>>> entire Gating topic.
>>>
>>> It doesn't do a hard block. It is included in the design that gating
>>> can be bypassed. But it supposed to provide better analysis of the
>>> change. Bypassing of the gate can happen, The key here is that it
>>> won't be a surprise, rather informed decision.
>>>
>> I think this is the first time I've heard a coherent description of
>> the intent of this stuff. If it really is intended to work this way,
>> it'd be very helpful.
>>
>> The side tag approach already does not scale, as evidenced by this 
>> thread.
> It does. You just need to communicate with others working in the same
> area, IMHO. I don't think we need some technical thing for something
> that happens rarely and can be solved by more communication.
>
 Side tags will happen a lot more often because the tooling is pushing
 us to do it that way. Don't discount the potential for future
 insanity. I'm still not sure side-tags are enough. Could we have a
 concept of a "scratch side tag"? Something like a scratch build, but
 contains a collection of builds and creates an overlay repo that can
 be used to run checks on for auto-merging? If they're good, then it
 would get auto-built properly into the main rawhide tag (or even
 stable tag!).
>>> Afaik, this is exactly the concept of a dynamic sidetag as Fedora
>>> Infra is currently implementing. Sidetag in koji as a sort of
>>> pull-request: you create sidetag, get 

Re: F31 Self-Contained Change proposal: Custom Crypto Policies

2019-06-19 Thread Vít Ondruch

Dne 18. 06. 19 v 21:50 Ben Cotton napsal(a):
> https://fedoraproject.org/wiki/Changes/CustomCryptoPolicies
>
> == Summary ==
> This new feature of crypto-policies allows system administrators and
> third party providers to modify and adjust the existing system-wide
> crypto policies to enable or disable algorithms and protocols.
>
> == Owner ==
> * Name: [[User:Tmraz | Tomáš Mráz]]
> * Email: tm...@redhat.com
>
> == Detailed Description ==
>
> The crypto-policies package will be enhanced to allow system
> administrators to modify the existing system-wide crypto policy levels
> by removing or adding enabled algorithms and protocols. For example it
> will be possible to easily modify the existing DEFAULT


I just wonder what is the strategy here? Does it means that the
"DEFAULT" definition will be store permanently somewhere in /usr/ and
I'll be able to copy the DEFAULT into /etc and modify it according to my
needs?

I am just asking, because AFAIK, currently the crypto policies
configuration is stored just in /etc and modifying the "DEFAULT" profile
would make the updates problematic, requiring someone to file with
.rpmnew files etc. That would be unfortunate.


Vít



>  policy to
> disable the SHA1 support or enable support for a national crypto
> algorithm that is supported by the crypto libraries but is disabled in
> the policies. System administrator will be able to add a simple
> configuration file that will achieve this after calling the
> update-crypto-policies command.
>
> == Benefit to Fedora ==
>
> This will enable advanced users of Fedora to adjust the
> crypto-policies of the system to their particular needs and
> requirements.
>
> It will also enable using Fedora where the national crypto algorithms
> are required without need to manually tinker with configurations of
> various software components to enable the national crypto algorithms.
>
> == Scope ==
> * Proposal owners:
> The design of the feature and prototype is already finished upstream.
> We still need to convert the existing back-end policy generators to
> the new framework and convert the existing policy definitions to the
> new format. Then the crypto-policies package will be rebased to the
> version with the custom crypto policies support included.
>
> * Other developers: N/A (not a System Wide Change)
> * Release engineering: N/A (not a System Wide Change)
> * Policies and guidelines: N/A (not a System Wide Change)
> * Trademark approval: N/A (not needed for this Change)
>
> == Upgrade/compatibility impact ==
>
> No impact. The crypto policies will continue to work as expected and
> worked before if a custom policy is not set.
>
> == How To Test ==
>
> This will be tested as part of the upstream crypto-policies testsuite.
>
> == User Experience ==
>
> Unless the user will choose to create and/or apply a custom crypto
> policy on the system, there will be no noticeable user experience
> change.
>
> == Dependencies ==
>
> N/A (not a System Wide Change)
>
> == Contingency Plan ==
>
> * Contingency mechanism: (What to do?  Who will do it?) N/A (not a
> System Wide Change)
>
> == Documentation ==
>
> N/A (not a System Wide Change)
>
> == Release Notes ==
>
> The crypto-policies package was enhanced to allow system
> administrators to modify the existing system-wide crypto policy levels
> by removing or adding enabled algorithms and protocols. For example it
> is now possible to easily modify the existing DEFAULT policy to
> disable the SHA1 support or enable support for a national crypto
> algorithm that is supported by the crypto libraries but is disabled in
> the policies. This can be achieved by adding a simple configuration
> file and calling the update-crypto-policies command.
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[389-devel] Re: Issue with building RPMs with ASAN_ON

2019-06-19 Thread William Brown


> On 18 Jun 2019, at 17:45, Viktor Ashirov  wrote:
> 
> 
> 
> On Tue, Jun 18, 2019 at 7:54 AM Viktor Ashirov  wrote:
> On Tue, Jun 18, 2019 at 1:30 AM Simon Pichugin  wrote:
> >
> > Hi team,
> > I'm in the process of creating a Vagrant file which is close to the 
> > customer's ENV.
> > It is heavilly based on Viktor's beaker task.
> > I use it for building and testing my code. And it is pretty important to 
> > build with ASAN.
> >
> > Currently, what I do is:
> > 1. Set 'ASAN_ON = 1' in rpm.mk
> > 2. Run `make -f rpm.mk srpms` target
> > 3. Build the RPM using `mock -q my_generated.srpm`
> > 4. Install it
> >
> > Then I've tried running `dscreate` manually or running tests with py.test.
> > Every time I have the same error here: 
> > /run/dirsrv/ns-slapd-standalone1.asan.X
> >
> > ==22487==LeakSanitizer has encountered a fatal error.
> > ==22487==HINT: For debugging, try setting environment variable 
> > LSAN_OPTIONS=verbosity=1:log_threads=1
> > ==22487==HINT: LeakSanitizer does not work under ptrace (strace, gdb, 
> > etc)
> Ludwig also recently had this issue. Looks like you're hitting this
> bug: https://github.com/google/sanitizers/issues/723
> We're using posix_memalign() in a few places and LeakSanitizier can't handle 
> it.
> So, the issue Simon was seeing is not related to the issue above. 
> Turns out, it's just SELinux :)
> 
>   
>   
>  
> time->Tue Jun 18 11:27:24 2019
>   
>  
> type=AVC msg=audit(1560871644.883:596): avc:  denied  { ptrace } for  
> pid=3632 comm="ns-slapd" scontext=system_u:system_r:dirsrv_t:s0 
> tcontext=system_u:system_r:dirsrv_t:s0 
> tclass=process permissive=0   
> 
> [root@server ds]# ausearch -m AVC  | audit2allow  
>   
>  
>   
>   
>  
>   
>   
>  
> #= dirsrv_t ==
>   
>  
> allow dirsrv_t self:process ptrace;

Heh, selinux strikes again!

Were you running as a user, not as root? 


> 
>  
> There is a workaround in the last comment. I did the builds for gcc8
> and gcc9 in copr, both internal and fedora one, but they failed (not
> related to the patch).
> So I did a local build with the patch and it worked like a charm. I
> will share the links to the rpms for you to try.
> 
> Perhaps we should review our usage of posix_memalign() or convince the
> upstream to implement a proper fix for this.
> >
> > I've tried setting `export LSAN_OPTIONS=verbosity=1:log_threads=1` and run 
> > once again.
> > Same issue.
> >
> > Did anybody encountered the issue? Maybe, Viktor or William, could you 
> > please check?
> > I'm putting the Vagrantfile to the attachments so you can reproduce.
> > Just run: `ASAN=on vagrant up` from the directory with Vagrantfile.
> >
> > William, I think, libvirt is present on SUSE so you should have no issues 
> > with this too...
> >
> > Thanks,
> > Simon
> > ___
> > 389-devel mailing list -- 389-devel@lists.fedoraproject.org
> > To unsubscribe send an email to 389-devel-le...@lists.fedoraproject.org
> > Fedora Code of Conduct: 
> > https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> > List Archives: 
> > https://lists.fedoraproject.org/archives/list/389-devel@lists.fedoraproject.org
> 
> 
> 
> -- 
> Viktor
> 
> 
> -- 
> Viktor
> ___
> 389-devel mailing list -- 389-devel@lists.fedoraproject.org
> To unsubscribe send an email to 389-devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/389-devel@lists.fedoraproject.org

—
Sincerely,

William Brown

Senior Software Engineer, 389 Directory Server
SUSE Labs
___
389-devel mailing list -- 389-devel@lists.fedoraproject.org
To unsubscribe send an email to 389-devel-le...@lists.fedoraproject.org

Re: libfabric-1.8.0rc1 for fedora rawhide

2019-06-19 Thread Igor Gnatenko
Have you read the packaging guidelines how to properly set version for
pre-release?

https://docs.fedoraproject.org/en-US/packaging-guidelines/Versioning/#_versioning_prereleases_with_tilde

On Wed, Jun 19, 2019 at 9:08 AM Honggang LI  wrote:
>
> I updated libfabric-1.8.0rc1 for fedora rawhide. please rebuild
> packages depends on libfabric, as library version bump.
>
> thanks
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Any new restriction in Koji added recently in Rawhide?

2019-06-19 Thread Dridi Boukelmoune
> Could this ugly hack work?
>
> %{endif __with_rebar3}
>
> Assuming the %endif macro would ignore any parameters.

This won't work... But RPM could "learn" this syntax and let spec
writers add that kind of comment inside the macro.

A bit far-fetched, I won t disagree :)

Dridi
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: rawhide no longer recognizing autotool macros

2019-06-19 Thread Panu Matilainen

On 6/19/19 6:59 AM, Neal Gompa wrote:

On Tue, Jun 18, 2019 at 10:48 PM Philip Kovacs via devel
 wrote:


I'm getting new build failures on the autotools macros that had been working 
for years.  rpmbuild doesn't like
them anymore in rawhide.  The macros are (or were) in the file 
`/usr/lib/rpm/macros`.   The relevant portion
of my spec is here:

-- spec --
%build
%{__aclocal} -I auxdir
%{__autoconf}
%{__automake} --no-force

Is there a new dependency I need to add or is something just broken?



Panu ripped them out for rpm 4.15:
https://github.com/rpm-software-management/rpm/pull/691

You can trivially switch to just calling the commands...



...which is what those packages should've been using in the first place.

This goes to ALL those %__foo macros on random utilities: their raison 
d'être is to allow users to change rpm behavior without recompiling.


They're not really intended to be directly used, never were. The two 
leading underscores are a hint of that, although one leading underscore 
is so widely used for non-internal purposes too that the meaning has 
become obscured. Unfortunately.


- Panu -
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


libfabric-1.8.0rc1 for fedora rawhide

2019-06-19 Thread Honggang LI
I updated libfabric-1.8.0rc1 for fedora rawhide. please rebuild 
packages depends on libfabric, as library version bump.

thanks
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org