[Bug 1956364] perl-DBIx-RunSQL-0.22 is available

2021-06-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1956364

Fedora Update System  changed:

   What|Removed |Added

 Status|ON_QA   |CLOSED
   Fixed In Version||perl-DBIx-RunSQL-0.22-1.fc3
   ||4
 Resolution|--- |ERRATA
Last Closed||2021-07-01 01:14:09



--- Comment #5 from Fedora Update System  ---
FEDORA-2021-6b628d737e has been pushed to the Fedora 34 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1974093] perl-Module-CoreList-5.20210620 is available

2021-06-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1974093

Fedora Update System  changed:

   What|Removed |Added

 Status|ON_QA   |CLOSED
   Fixed In Version|perl-Module-CoreList-5.2021 |perl-Module-CoreList-5.2021
   |0620-1.fc35 |0620-1.fc35
   ||perl-Module-CoreList-5.2021
   ||0620-1.fc34
 Resolution|--- |ERRATA
Last Closed||2021-07-01 01:13:52



--- Comment #4 from Fedora Update System  ---
FEDORA-2021-5419793232 has been pushed to the Fedora 34 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1974101] perl-CPAN-Perl-Releases-5.20210620 is available

2021-06-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1974101

Fedora Update System  changed:

   What|Removed |Added

 Status|ON_QA   |CLOSED
   Fixed In Version|perl-CPAN-Perl-Releases-5.2 |perl-CPAN-Perl-Releases-5.2
   |0210620-1.fc35  |0210620-1.fc35
   ||perl-CPAN-Perl-Releases-5.2
   ||0210620-1.fc34
 Resolution|--- |ERRATA
Last Closed||2021-07-01 01:13:54



--- Comment #4 from Fedora Update System  ---
FEDORA-2021-0b372c6a1a has been pushed to the Fedora 34 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1973900] perl-Log-Dispatchouli-2.023 is available

2021-06-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1973900

Fedora Update System  changed:

   What|Removed |Added

 Status|ON_QA   |CLOSED
   Fixed In Version|perl-Log-Dispatchouli-2.023 |perl-Log-Dispatchouli-2.023
   |-1.fc35 |-1.fc35
   ||perl-Log-Dispatchouli-2.023
   ||-1.fc34
 Resolution|--- |ERRATA
Last Closed||2021-07-01 01:13:25



--- Comment #3 from Fedora Update System  ---
FEDORA-2021-f5135e5a2b has been pushed to the Fedora 34 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Schedule for Thursday's FPC Meeting (2021-07-01 16:00 UTC)

2021-06-30 Thread James Antill
NOTE: This is the third meeting we'll have on IRC.LIBERA.CHAT
NOTE2: The version draft is back on the agenda.

 Following is the list of topics that will be discussed in the FPC
meeting Thursday at 2021-07-01 16:00 UTC in #fedora-meeting-1 on
irc.libera.chat.

 Local time information (via. uitime):

= Day: Thursday ==
2021-07-01 09:00 PDT  US/Pacific
2021-07-01 12:00 EDT  --> US/Eastern <--
2021-07-01 16:00 UTC  UTC   
2021-07-01 17:00 BST  Europe/London 
2021-07-01 18:00 CEST Europe/Berlin 
2021-07-01 18:00 CEST Europe/Paris  
2021-07-01 21:30 IST  Asia/Calcutta 
 New Day: Friday -
2021-07-02 00:00 HKT  Asia/Hong_Kong
2021-07-02 00:00 +08  Asia/Singapore
2021-07-02 01:00 JST  Asia/Tokyo
2021-07-02 02:00 AEST Australia/Brisbane


 Links to all tickets below can be found at: 

https://pagure.io/packaging-committee/issues?status=Open=meeting

= Followup Actions =

#topic #pr-814
 * mhroncok
   talk to authors again, having a working example might help a lot

= Followup Issues =

#topic #886 Enable BRP for detecting RPATH 
.fpc 886
https://pagure.io/packaging-committee/issue/886

#topic #907 Which %__foo macros for executables are acceptable? 
.fpc 907
https://pagure.io/packaging-committee/issue/907

#topic #1058 How to handle %lang files in package owned directories? .fpc 1058
https://pagure.io/packaging-committee/issue/1058

= Followup Pull Requests =

#topic #pr-814 Add SELinux Independent Policy Guidelines.
https://pagure.io/packaging-committee/pull-request/814

#topic #pr-1045 WIP: Add discussion of macro names beginning with underscores.
https://pagure.io/packaging-committee/pull-request/1045

#topic #pr-1073 Use tilde and caret in version field 
https://pagure.io/packaging-committee/pull-request/1073

= Open Floor = 

 For more complete details, please visit each individual ticket.  The
report of the agenda items can be found at:

https://pagure.io/packaging-committee/issues?status=Open=meeting

 If you would like to add something to this agenda, you can:
  * Reply to this e-mail
  * File a new ticket at: https://pagure.io/packaging-committee
  * E-mail me directly
  * Bring it up at the end of the meeting, during the open floor topic. Note
    that added topics may be deferred until the following meeting.



___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Memory Constraints macros for RPM (System-Wide Change proposal)

2021-06-30 Thread Michel Alexandre Salim via devel
On Tue, Jun 29, 2021 at 04:21:03PM -0500, Michael Catanzaro wrote:
> On Tue, Jun 29 2021 at 11:05:26 PM +0200, Dan Čermák
>  wrote:
> > Thanks a lot for this Michel!
> 
> Yes, this will reduce packager pain and suffering. Nice!
>
You're welcome :) If affected package owners want to help, I'm happy
to add them as Change owners too.

Best regards, 

-- 
Michel Alexandre Salim
profile: https://keyoxide.org/mic...@michel-slm.name


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Filtered Flathub Applications (System-Wide Change proposal)

2021-06-30 Thread Owen Taylor
On Wed, Jun 30, 2021 at 9:26 AM Vitaly Zaitsev via devel
 wrote:
>
> On 30/06/2021 14:44, Owen Taylor wrote:
> > Setting up an independent non-profit, and maintaining it's non-profit
> > status is a quite involved activity. (details depend on the country,
> > of course!)
>
> If Flathub want to be a trustworthy repository, it should be done.
>
> > Hopefully this
> > provides some assurance that Flathub won't suddenly start doing
> > something entirely different.
>
> No, it doesn't. FreeNode situation is an example.

While the GNOME Foundation could license or transfer the Flathub name
to a commercial entity if it determined it was in the public's best
interest, so could a hypothetical Flathub Foundation. In the end,
Fedora doesn't have a lot of leverage to demand that the Flathub
community organize itself as an independent non-profit! That being
said, if we get some Flathub maintainers to come to the FESCO meeting,
I'm sure they would be happy to answer questions about how Flathub is
run and decisions are made.

> > If we lost trust in Flathub, Fedora would also have the ability to
> > update the filter to have *no* applications in it.
>
> Every application with --filesystem=host or --filesystem=home can drop
> all filters, enable new repositories, etc.

There's a distinction to be made between dubious behavior (inserting
ads in applications, say) and out-and-out malware. My comment was
aimed at the former - different things would need to be done in the
latter case. I don't see any reason to expect Flathub to be knowingly
engaging in either. We currently offer various third-party RPM
repositories where the packages run without any sandboxing at all.

> > Flathub is a packaging community, like Fedora. Being a professional is
> > definitely not a criteria for contributing to Fedora.
>
> All Fedora packagers must be sponsored first and they know at least
> Fedora packaging guidelines. On Flathub anyone can add anything.
>
> > This is something that definitely can be and will be examined when
> > reviewing applications for inclusion in the Fedora filter.
>
> This is not a panacea. Some Flathub maintainers added --filesystem=host
> or --filesystem=home after the initial review.

I would imagine that when it happens, it's typically not because the
maintainer is trying to sneak something over on their users (and users
will get prompted on upgrade), but because it turned out there were
issues with the more restrictive permissions.

The main point of sandboxing is not to protect the users against the
Flathub maintainers, or the app authors. It's to protect the users
from malicious actors exploiting vulnerabilities in the application.
By checking that the application has reasonable permissions at review
time, we can get some idea of whether the Flathub maintainer knows how
to use permissions, but yes, we are delegating some trust to Flathub
here in the case where this changes.

The Flatpak and Flathub communities would definitely appreciate help
in figuring out how to nudge Flatpak packagers and application authors
towards more restrictive permissions.

- Owen
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: List of long term FTBFS packages to be retired in August

2021-06-30 Thread Zbigniew Jędrzejewski-Szmek
On Wed, Jun 30, 2021 at 12:57:18PM -0400, Steve Grubb wrote:
> On Wednesday, June 30, 2021 5:43:10 AM EDT Zbigniew Jędrzejewski-Szmek wrote:
> > > >radamsa   huzaifas, mrniranjan
> > > >Fedora 32> 
> > > Has no bugzillas, the mass rebuilds builds never finished (they hang for
> > > days)
> >
> > It'd be sad to lose radamsa from the distro. I pushed a snapshot build.
> 
> Agreed and thanks. It has found many bugs in Fedora packages. However, I see 
> that the package's version has a '^' in it. I wonder if that is a typo?

That's just me hoping that 
https://pagure.io/packaging-committee/pull-request/1073
gets approved ;-]

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Third-party Software Mechanism (System-Wide Change proposal)

2021-06-30 Thread Owen Taylor
On Wed, Jun 30, 2021 at 7:53 AM Zbigniew Jędrzejewski-Szmek
 wrote:

> > * There is a fedora-third-party package with a
> > fedora-third-party script with
> > enable/disable/refresh/query subcommands. The status is
> > stored in /etc/fedora-third-party.conf
> > * Packages like fedora-workstation-repositories that
> > include third-party repositories will drop config files into
> > /etc/fedora-third-party.d/*.conf. There will be a
> > post-transaction file trigger to run fedora-third-party
> > refresh, which applies the users opt-in status to newly
> > installed repository files.
>
> For packaged stuff, please do:
>
>   s|/etc/fedora-third-party.conf|/usr/lib/fedora-third-party.conf|
>
> We shouldn't add yet more stuff in /etc/.

Yes, agreed. Thanks for the suggestion!

Owen
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Bumping lapack to 3.10.0 in rawhide

2021-06-30 Thread Tom Callaway
LAPACK & BLAS are going to 3.10.0 in rawhide. The sover on the shared libs
is still at .3, so it _should_ not break anything, but there is a history
of this not always being true.

Please file bugs if things stop building against LAPACK/BLAS.

Thanks,
~spot
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Memory Constraints macros for RPM (System-Wide Change proposal)

2021-06-30 Thread Kevin Fenzi
On Tue, Jun 29, 2021 at 04:25:13PM -0400, Ben Cotton wrote:
> https://fedoraproject.org/wiki/Changes/MemoryConstraintsMacros
> 
> == Summary ==
> Introduce macros, similar to openSUSE's
> [https://build.opensuse.org/package/show/openSUSE:Factory/memory-constraints
> memory-constraints]), for optionally limiting build parallelism for
> build-time memory-bound packages

Seems fine to me. Note that of course packages like ceph also have disk
space constraints. ;( But at least unifying this would be good... 

kevin


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: List of long term FTBFS packages to be retired in August

2021-06-30 Thread Steve Grubb
On Wednesday, June 30, 2021 5:43:10 AM EDT Zbigniew Jędrzejewski-Szmek wrote:
> > >radamsa   huzaifas, mrniranjan
> > >Fedora 32> 
> > Has no bugzillas, the mass rebuilds builds never finished (they hang for
> > days)
>
> It'd be sad to lose radamsa from the distro. I pushed a snapshot build.

Agreed and thanks. It has found many bugs in Fedora packages. However, I see 
that the package's version has a '^' in it. I wonder if that is a typo?

-Steve

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Bringing glibc 2.34 snapshots to Fedora 35 and CentOS Stream 9

2021-06-30 Thread Vitaly Zaitsev via devel

On 16/06/2021 11:17, Florian Weimer wrote:

glibc-2.33.9000-18.fc35 with the first set of changes has been tagged
into Fedora rawhide.


Please take a look at this:
https://bugzilla.redhat.com/show_bug.cgi?id=1977878

--
Sincerely,
  Vitaly Zaitsev (vit...@easycoding.org)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Packager for hire - Was: Re: Additon to the repos - Kubectx + Kubens

2021-06-30 Thread Vitaly Zaitsev via devel

On 30/06/2021 16:25, Miroslav Suchý wrote:
But ... do we have here someone willing to do packaging and maintenance 
of package in Fedora/EPEL for money? Will anyone be interested in such 
list of people available for hire?


Looks interesting. But who will pay for this job?

--
Sincerely,
  Vitaly Zaitsev (vit...@easycoding.org)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: [ELN] Rebuild ordering and side-tag support

2021-06-30 Thread Robert-André Mauchin

On 6/30/21 2:38 PM, Stephen Gallagher wrote:


In the scenario I'm discussing, we would take those final PackageA and
PackageB from Fedora and have them in the buildroot for the ELN
builds. That would mean that the bootstrap step wouldn't be needed. If
there's a case you know of that this won't work for, I'd really like
to hear it (preferably with real package names).



Ah ok, I didn't know that ELN had already the Fedora packages as a base. 
I thought everything was rebuilt from scratch.


Best regards,

Robert-André
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


F35 Change: Gconv package split in glibc (System-Wide Change proposal)

2021-06-30 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/Gconv_package_split_in_glibc


== Summary ==
Most Gconv modules with the exception of unicode and similar essential
ones have been split into a separate package called glibc-gconv-extra.
Currently, the core package glibc has a strong (Requires) dependency
on glibc-gconv-extra making this change transparent to users. This
proposal is to weaken this dependency to Recommends so that it is
possible to remove glibc-gconv-extra from installations that do not
need it.

== Owner ==
* Name: [[User:siddhesh| Siddhesh Poyarekar]]
* Email: sipoy...@redhat.com


== Detailed Description ==
The glibc-gconv-extra package contains all iconv converter plugins
except UTF-*, unicode, ISO-8859-1, ISO8859-15, CP1252 and ANSI_X3.110.
A number of minimal installations would typically not need all those
plugins and they can be removed without any ill effects to those
environments.  To achieve this, the glibc dependency on
glibc-gconv-extra needs to be weakened from Requires to Recommends.

Weakening the dependency of glibc on glibc-gconv-extra implies that
glibc-gconv-extra may not be pulled into certain installations by
default, e.g. in buildroots for package builds.  glibc-gconv-extra is
however necessary because a number of packages either run tests that
verify conversions between arbitrary character sets or need similar
functionality to convert character sets of files in the upstream
sources.  A method would have to be devised to ensure that
glibc-gconv-extra is available in buildroots. One option is to have
redhat-rpm-config Require glibc-gconv-extra as a way to ensure that
glibc-gconv-extra is in every buildroot, but better ideas are
desirable.

== Feedback ==
The change was made assuming that the weak dependency would be
sufficient to address compatibility but it was subsequently rolled
back when it was discovered that buildroots do not pull in weak
dependencies. Since the
[https://lists.fedoraproject.org/archives/list/de...@lists.fedoraproject.org/thread/JQTTSNHMSFV63KIDDPW4M7WV7CI6KZYW/
announcement on fedora-devel] the reception to the change idea itself
has been positive. There are compatibility concerns with respect to
buildroots and backward compatibility, which will be addressed.

== Benefit to Fedora ==
The ability to remove glibc-gconv-extra brings in two main benefits:

* Removal can save about 8MB in the installed size, which is an
advantage for minimal container images
* A number of the infrequently used modules have historically had bugs
that have been considered security issues.  Removing the
glibc-gconv-extra package is thus a hardening opportunity for UTF-8
clean environments.

== Scope ==
* Proposal owners:
The change required in glibc is minimal, requiring only spec file
changes to change dependencies.

* Other developers:
To allow glibc-gconv-extra to be installed in minimal koji buildroots,
redhat-rpm-config needs to be modified to depend on glibc-gconv-extra.
Alternatively, the buildroot definition needs to be altered somehow to
include glibc-gconv-extra.

If none of the above are feasible, package owners will need to add a
BuildRequires on glibc-gconv-extra if they need the extra converter
modules.  However this is the last option and should ideally be
avoided.

* Release engineering: [https://pagure.io/releng/issue/10176]
* Policies and guidelines: N/A (not needed for this Change)
* Trademark approval: N/A (not needed for this Change)
* Alignment with Objectives:

== Upgrade/compatibility impact ==
1. Update glibc on an older system and verify that glibc-gconv-extra
gets updated by default
2. Update glibc on a system that has glibc-gconv-extra removed and
verify that glibc-gconv-extra is not pulled in
3. glibc downgrades should also have analogous behaviour
4. Build any package in mock or koji and verify that glibc-gconv-extra
is present in the buildroot

== User Experience ==
Minimal, UTF-8-only containers can be reduced by 8MB.

== Dependencies ==
If buildroot issues cannot be resolved through releng or a dependency
on redhat-rpm-config, a number of packages will need to be updated to
ensure that they build.  At this moment that list is unknown.

== Contingency Plan ==
* Contingency mechanism: glibc dependency on glibc-gconv-extra is
reverted to Requires
* Contingency deadline: 2021/08/24 (Beta freeze)
* Blocks release? No

== Documentation ==

Package split and its potential announced and discussed here:
https://lists.fedoraproject.org/archives/list/de...@lists.fedoraproject.org/thread/JQTTSNHMSFV63KIDDPW4M7WV7CI6KZYW/


-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

F35 Change: Gconv package split in glibc (System-Wide Change proposal)

2021-06-30 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/Gconv_package_split_in_glibc


== Summary ==
Most Gconv modules with the exception of unicode and similar essential
ones have been split into a separate package called glibc-gconv-extra.
Currently, the core package glibc has a strong (Requires) dependency
on glibc-gconv-extra making this change transparent to users. This
proposal is to weaken this dependency to Recommends so that it is
possible to remove glibc-gconv-extra from installations that do not
need it.

== Owner ==
* Name: [[User:siddhesh| Siddhesh Poyarekar]]
* Email: sipoy...@redhat.com


== Detailed Description ==
The glibc-gconv-extra package contains all iconv converter plugins
except UTF-*, unicode, ISO-8859-1, ISO8859-15, CP1252 and ANSI_X3.110.
A number of minimal installations would typically not need all those
plugins and they can be removed without any ill effects to those
environments.  To achieve this, the glibc dependency on
glibc-gconv-extra needs to be weakened from Requires to Recommends.

Weakening the dependency of glibc on glibc-gconv-extra implies that
glibc-gconv-extra may not be pulled into certain installations by
default, e.g. in buildroots for package builds.  glibc-gconv-extra is
however necessary because a number of packages either run tests that
verify conversions between arbitrary character sets or need similar
functionality to convert character sets of files in the upstream
sources.  A method would have to be devised to ensure that
glibc-gconv-extra is available in buildroots. One option is to have
redhat-rpm-config Require glibc-gconv-extra as a way to ensure that
glibc-gconv-extra is in every buildroot, but better ideas are
desirable.

== Feedback ==
The change was made assuming that the weak dependency would be
sufficient to address compatibility but it was subsequently rolled
back when it was discovered that buildroots do not pull in weak
dependencies. Since the
[https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/JQTTSNHMSFV63KIDDPW4M7WV7CI6KZYW/
announcement on fedora-devel] the reception to the change idea itself
has been positive. There are compatibility concerns with respect to
buildroots and backward compatibility, which will be addressed.

== Benefit to Fedora ==
The ability to remove glibc-gconv-extra brings in two main benefits:

* Removal can save about 8MB in the installed size, which is an
advantage for minimal container images
* A number of the infrequently used modules have historically had bugs
that have been considered security issues.  Removing the
glibc-gconv-extra package is thus a hardening opportunity for UTF-8
clean environments.

== Scope ==
* Proposal owners:
The change required in glibc is minimal, requiring only spec file
changes to change dependencies.

* Other developers:
To allow glibc-gconv-extra to be installed in minimal koji buildroots,
redhat-rpm-config needs to be modified to depend on glibc-gconv-extra.
Alternatively, the buildroot definition needs to be altered somehow to
include glibc-gconv-extra.

If none of the above are feasible, package owners will need to add a
BuildRequires on glibc-gconv-extra if they need the extra converter
modules.  However this is the last option and should ideally be
avoided.

* Release engineering: [https://pagure.io/releng/issue/10176]
* Policies and guidelines: N/A (not needed for this Change)
* Trademark approval: N/A (not needed for this Change)
* Alignment with Objectives:

== Upgrade/compatibility impact ==
1. Update glibc on an older system and verify that glibc-gconv-extra
gets updated by default
2. Update glibc on a system that has glibc-gconv-extra removed and
verify that glibc-gconv-extra is not pulled in
3. glibc downgrades should also have analogous behaviour
4. Build any package in mock or koji and verify that glibc-gconv-extra
is present in the buildroot

== User Experience ==
Minimal, UTF-8-only containers can be reduced by 8MB.

== Dependencies ==
If buildroot issues cannot be resolved through releng or a dependency
on redhat-rpm-config, a number of packages will need to be updated to
ensure that they build.  At this moment that list is unknown.

== Contingency Plan ==
* Contingency mechanism: glibc dependency on glibc-gconv-extra is
reverted to Requires
* Contingency deadline: 2021/08/24 (Beta freeze)
* Blocks release? No

== Documentation ==

Package split and its potential announced and discussed here:
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/JQTTSNHMSFV63KIDDPW4M7WV7CI6KZYW/


-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 

Packager for hire - Was: Re: Additon to the repos - Kubectx + Kubens

2021-06-30 Thread Miroslav Suchý

Dne 30. 06. 21 v 15:54 Justin Lamp napsal(a):

  want to request a new package to be added to the fedora repos.


Actually... I wonder... Do we have packager(s) available for hire here? I know 
that we have Package maintainers wishlist:

  https://fedoraproject.org/wiki/Package_maintainers_wishlist

But what about reverse list? People available for hire?

Most of us do the package maintenance because it is our hobby or because our employer pays for that (and we are limited 
to the packagers of our employer choice). But ... do we have here someone willing to do packaging and maintenance of 
package in Fedora/EPEL for money? Will anyone be interested in such list of people available for hire?


Miroslav
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1853802] font selection is broken on perl-Tk-804.035-1.fc32.x86_64

2021-06-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1853802



--- Comment #7 from Fedora Update System  ---
FEDORA-2021-639b8bfb6e has been pushed to the Fedora 34 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing
--advisory=FEDORA-2021-639b8bfb6e`
You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-2021-639b8bfb6e

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information
on how to test updates.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1803711] perl-Tk-804.034-9.fc33 FTBFS: t/entry.t test fails

2021-06-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1803711



--- Comment #19 from Fedora Update System  ---
FEDORA-2021-639b8bfb6e has been pushed to the Fedora 34 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing
--advisory=FEDORA-2021-639b8bfb6e`
You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-2021-639b8bfb6e

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information
on how to test updates.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1853802] font selection is broken on perl-Tk-804.035-1.fc32.x86_64

2021-06-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1853802

Fedora Update System  changed:

   What|Removed |Added

 Status|MODIFIED|ON_QA



--- Comment #6 from Fedora Update System  ---
FEDORA-2021-49127bd223 has been pushed to the Fedora 33 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing
--advisory=FEDORA-2021-49127bd223`
You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-2021-49127bd223

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information
on how to test updates.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1803711] perl-Tk-804.034-9.fc33 FTBFS: t/entry.t test fails

2021-06-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1803711

Fedora Update System  changed:

   What|Removed |Added

 Status|MODIFIED|ON_QA



--- Comment #18 from Fedora Update System  ---
FEDORA-2021-49127bd223 has been pushed to the Fedora 33 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing
--advisory=FEDORA-2021-49127bd223`
You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-2021-49127bd223

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information
on how to test updates.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Additon to the repos - Kubectx + Kubens

2021-06-30 Thread Miroslav Suchý

Dne 30. 06. 21 v 15:54 Justin Lamp napsal(a):

Hey there,

I hope I am at the right place: I want to request a new package to be added to 
the fedora repos.

I'd like kubectx kubens to be added. They are really nice Kubernetes tools to 
change the cluster or the namespace respectively.
The source can be found under kubectx.dev.


It is waiting for you :)

https://fedoraproject.org/wiki/Join_the_package_collection_maintainers

Miroslav
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-30 Thread Zbigniew Jędrzejewski-Szmek
On Wed, Jun 30, 2021 at 08:11:38AM -0500, Justin Forbes wrote:
> On Wed, Jun 30, 2021 at 3:40 AM Zbigniew Jędrzejewski-Szmek
>  wrote:
> >
> > On Tue, Jun 29, 2021 at 03:13:10PM +0200, Tomas Tomecek wrote:
> > > On Thu, Jun 24, 2021 at 8:09 PM Zbigniew Jędrzejewski-Szmek
> > >  wrote:
> > > >
> > > > On Thu, Jun 24, 2021 at 03:48:54PM +0200, Tomas Tomecek wrote:
> > > > > On Thu, Jun 24, 2021 at 12:41 PM Miro Hrončok  
> > > > > wrote:
> > > > > >
> > > > > > On 24. 06. 21 11:16, Tomas Tomecek wrote:
> > > > > > > ## Choosing git forge to host source-git repositories
> > > > > > > We need to find a home for all the source-git repositories. This 
> > > > > > > is
> > > > > > > actually a really hard task because we have many options 
> > > > > > > (github.com,
> > > > > > > gitlab.com, pagure.io, src.fedoraproject.org, something custom or
> > > > > > > on-premise) and different expectations: some projects already have
> > > > > > > repos set up on different platforms while Pagure is the primary 
> > > > > > > forge
> > > > > > > now. Since the CPE team is investigating GitLab as a forge, it's 
> > > > > > > even
> > > > > > > harder for us to figure out the primary forge. We may end up
> > > > > > > supporting both actually: pagure.io and gitlab.com. What are your
> > > > > > > thoughts on this topic? Would you prefer pagure.io or gitlab.com
> > > > > > > More info:
> > > > > > > * https://pagure.io/fedora-source-git/sig/issue/1
> > > > > > > * https://pagure.io/fedora-source-git/sig/issue/7
> > > > > >
> > > > > > I would expect that since the soruce git is just an intermediate 
> > > > > > thing,
> > > > > > supporting "any forge" is nice to have, but hard. I'd start with 
> > > > > > some common
> > > > > > options (Pagure + 1 other) and see where you'll get.
> > > > >
> > > > > Yep, that's exactly what I'd like us to do. As soon as we have the
> > > > > service which accepts processes events up and running, it shouldn't be
> > > > > that hard to teach it new fedora-messaging messages or webhook
> > > > > payloads.
> > > > >
> > > > > > > ## High-level workflow proposal up for review
> > > > > > > Hunor proposed a high-level workflow linked below and I strongly
> > > > > > > recommend reading it. We have also started discussing many 
> > > > > > > details in
> > > > > > > the process, such as getting archives: should we generate one 
> > > > > > > from the
> > > > > > > source-git repo or use the official release archive from upstream?
> > > > > >
> > > > > > One thing to consider is that the upstream tarballs might be 
> > > > > > cryptographically
> > > > > > signed and packages should verify the signature in %prep.
> > > > >
> > > > > This is a very good point - in such a case, we should always pull the
> > > > > official upstream tarball instead of generating a new one downstream.
> > > >
> > > > Hmm, but how would that work? I thought that the whole point of
> > > > source-git is to build from a commit that contains some upstream
> > > > version + downstream patches + downstream distro config like the spec 
> > > > file,
> > > > and that the build step of applying downstream patches just doesn't 
> > > > exist.
> > > > If you reuse the upstream tarball, then by necessity those downstream
> > > > patches need to be serialized and applied on top like in dist-git. So
> > > > you lose the property that the checkout from version control is *the*
> > > > source you build, but you also lose the property that the source you
> > > > build is what was signed (since patches are applied).
> > >
> > > What you just described I understand as an (upstream) maintenance
> > > branch and is not what we call source-git.
> >
> > It's an "upstream maintenance branch" PLUS the .spec bits that specify
> > how to build a package.
> >
> > > Our definition of source-git is:
> > > * upstream release tarball
> > > * downstream code changes applied as patches during %prep
> > > * additional configs for sake of building and testing
> >
> > But that describes dist-git *exactly*. Where is the difference?
> >
> 
> In the spirit of openness that Fedora is based upon, it must be very
> easy to determine what patches we carry as opposed to upstream, and
> exactly how we build things.

I very much agree with this.

> This does not go away even if we get to
> the point where dist-git no longer exists, and we can build directly
> from source-git.  In the meantime, dist-git is the "canonical source
> of truth" for fedora packages, so there is a middle step to convert
> from source-git to dist-git. With both, the difference in using
> source-git means there is an exploded tree there, with patches
> applied. This makes debug and development much easier. There is also
> git history, which hopefully contains a lot more background than
> currently exists in dist-git.  Finally, it makes bisecting a much more
> simple process, whether the offending patch is in upstream or
> downstream changes.

[See my long reply to the parent message...]
The 

Re: Weird glibc recursive stack crash in Rawhide

2021-06-30 Thread Vít Ondruch


Dne 30. 06. 21 v 15:04 Richard W.M. Jones napsal(a):

In unrelated news, what happened to the -ow...@fedoraproject.org
email addresses?  They seem to be bouncing for me.



Please see the "package maintainer email aliases, now with more epel" 
email from Kevin. The -owner alias was deprecated already for quite some 
time AFAIK, probably since we moved away from pkdgb to Pagure.


BTW there is some documentation at:

https://fedoraproject.org/wiki/EmailAliases#Package_maintainers_email_aliases

but it would deserve small refresh.


Vít




Rich.


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Additon to the repos - Kubectx + Kubens

2021-06-30 Thread Justin Lamp
Hey there,

I hope I am at the right place: I want to request a new package to be added to 
the fedora repos.

I'd like kubectx kubens to be added. They are really nice Kubernetes tools to 
change the cluster or the namespace respectively.
The source can be found under kubectx.dev.

Thank you! 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-30 Thread Zbigniew Jędrzejewski-Szmek
On Wed, Jun 30, 2021 at 02:03:22PM +0200, Tomas Tomecek wrote:
> On Wed, Jun 30, 2021 at 10:40 AM Zbigniew Jędrzejewski-Szmek
>  wrote:
> >
> > > Our definition of source-git is:
> > > * upstream release tarball
> > > * downstream code changes applied as patches during %prep
> > > * additional configs for sake of building and testing
> >
> > But that describes dist-git *exactly*. Where is the difference?
> 
> Upstream git history and downstream patches tracked as git commits
> instead of files.

Hmm, so debian does something like this, with quilt for patches…
Debian-style packaging needs to do this, because they still need to
support non-git upstreams, even upstreams without version control, and
generally cater to the lowest possible denominator.

Since source-git would be the the biggest change in Fedora packaging
in a decade, I hope we could do something better. The "source-git"
proposal as is right now tracks the patches as git commits, but
serialized. This means that the patches must be a serial sequence of
commits, so any history with merges needs to be turned into a fake
linear history.

The current proposal also keeps the "upstream tarball" as the central
object. In the past a tarball could be a custom-crafted thing with
some pre-generated or pre-compiled stuff and files added and removed,
and the pristine checkout of a repo wouldn't build. Those times are
thankfully behind us. Tarballs are fine, but nowadays pretty much
everything is just a snapshot generated from a git repo. So we
shouldn't treat this one blob as special. A tarball generated from a
release commit is just like a tarball generated from non-tagged
commit, except that upstream designated it as special. But if the
maintainer wants/needs to build from a non-release commit, then we
should just do it.

If we are using git, we shouldn't need to deal with applying and
removing textified patches.

In particular, requiring a linear history quickly breaks down for
real-life repos. For example, let's say that upstream has released
version 248, does a few immediate bugfix commits, and then applies a
few spelling patches on top, and another CVE bugfix _merged_ as commit
248+15. We want to build this as quickly as possible.

We have two choices now: use upstream tarball and pick patches by hand
and create a linearized history. This is complex work, fraught with
potential breakage. If the merge commit had some conflicts, the
original patch from the bugfix branch will not apply. Even if there is
_no confict_, the maintainer might have applied some fixes in the
merge. So the packager needs to do a rebase of the patch and possibly
find subsequent tweaks that are not part of the patch.

I maintain the stable branches from systemd [1], and I know firsthand
that trying to rebase non-trivial patches is complex and you just
screw it up every once in a while. And this is for a project which I
know extremely well. For a project where I'm just a packager,
non-trivial rebases become guesswork.

The other choice is to take the appropriate upstream commit and just
build the tarball from that. Just do it, without guesswork or manual
steps.

It feels very much like the current "source-git" proposal is trying
to recreate the existing workflows with some minimal changes. Those
existing workflows evolved to handle idiosyncrasies which are not
needed anymore. Those old projects will not switch to source-git anyway.
I think it's much better to handle those modern git upstreams
idiomatically.

In the proposed workflow [2], 'git reset --hard' is an integral part
of the maintainer steps. I proposed how not to do that in a comment
there [3]. The important part is that how we reach the commit from
which we will build, i.e. the details of history, should be an
implementation detail. (Similarly to how normal git repos work: some
upstreams use github's "squash", others use "merge" always, and
so on. We only care about the end result, i.e. the tree content of
the commit, not its parents.)

In very short detail, the workflow IMO should be:
- take an upstream repo

- create a branch that contains selected upstream commit + possibly
  some patches + downstream packaging stuff (.spec, etc). The
  tree object attached to that commit is what will be built.

  (In the common case, this branch will be a child of the upstream
  release and the previous packaging branch. After all, most of the
  time packaging changes when updating to a new release are very
  small. This is important to be able to see (using appropriate
  'git diff' and 'git log' invocations), what changed wrt. to
  the upstream, previous packaging build, latest upstream release,
  etc.)

- to build: 'git archive', unpack in the build system, go to %build.

[1] https://github.com/systemd/systemd-stable
[2] https://pagure.io/fedora-source-git/docs/pull-request/2#request_diff
[3] https://pagure.io/fedora-source-git/docs/pull-request/2#comment-152304

Zbyszek
___
devel mailing 

Re: F35 Change: Filtered Flathub Applications (System-Wide Change proposal)

2021-06-30 Thread Vitaly Zaitsev via devel

On 30/06/2021 14:44, Owen Taylor wrote:

Setting up an independent non-profit, and maintaining it's non-profit
status is a quite involved activity. (details depend on the country,
of course!)


If Flathub want to be a trustworthy repository, it should be done.


Hopefully this
provides some assurance that Flathub won't suddenly start doing
something entirely different.


No, it doesn't. FreeNode situation is an example.


If we lost trust in Flathub, Fedora would also have the ability to
update the filter to have *no* applications in it.


Every application with --filesystem=host or --filesystem=home can drop 
all filters, enable new repositories, etc.



Flathub is a packaging community, like Fedora. Being a professional is
definitely not a criteria for contributing to Fedora.


All Fedora packagers must be sponsored first and they know at least 
Fedora packaging guidelines. On Flathub anyone can add anything.



This is something that definitely can be and will be examined when
reviewing applications for inclusion in the Fedora filter.


This is not a panacea. Some Flathub maintainers added --filesystem=host 
or --filesystem=home after the initial review.



Unfortunately, a lot of interesting software can't be completely
sandboxed - because it, say, uses X11 rather than Wayland.


X11 is not a problem. Btw, a lot of Qt applications from Flathub 
explicitly uses X11 over Wayland due to buggy downstream patch:


https://github.com/flathub/com.kristianduske.TrenchBroom/blob/98a3b8a6e55ccbf1a44771d8a099d30622c07d3e/com.kristianduske.TrenchBroom.json#L12
https://github.com/flathub/org.kde.kolourpaint/blob/0527e34fabb41cba37c6707ee107e97556ee762a/org.kde.kolourpaint.json#L14
https://github.com/flathub/com.chatterino.chatterino/blob/18e03ca830f28ea876dae6507c26e5f1cbfb9cec/com.chatterino.chatterino.yml#L14
https://github.com/flathub/org.openhantek.OpenHantek6022/blob/6fa7f8c357fc0573f64aed6e6e5de5e28d04427b/org.openhantek.OpenHantek6022.yml#L15
https://github.com/flathub/com.rosegardenmusic.rosegarden/blob/8ac254753f6e7b29413ae30f03a6ef621461c289/com.rosegardenmusic.rosegarden.json#L13
https://github.com/flathub/org.electrum.electrum/blob/7a3867719cb20ee22e7c3ef8847dc57b2360f7ff/org.electrum.electrum.json#L10
https://github.com/flathub/com.github.fontmatrix.Fontmatrix/blob/49fdebbf009bc336f5c19417b818783ed5a53421/com.github.fontmatrix.Fontmatrix.json#L16
https://github.com/flathub/uk.org.zint.zint-qt/blob/f6c30cfe2858bada7785ae73284644858a583cf0/uk.org.zint.zint-qt.yaml#L15
https://github.com/flathub/org.avidemux.Avidemux/blob/75ffac52c85cc1ceb105992f4581fe0469194139/org.avidemux.Avidemux.yaml#L11
https://github.com/flathub/org.dash.electrum.electrum_dash/blob/fdad9ec436cf6ed92a2cd13b331566c1131d0a78/org.dash.electrum.electrum_dash.json#L10
https://github.com/flathub/org.hydrogenmusic.Hydrogen/blob/425efc134dfa9f3fae189792e21e5ae060815e74/org.hydrogenmusic.Hydrogen.json#L14
https://github.com/flathub/org.musescore.MuseScore/blob/c2a2f112f34538c2e59b20cba74a53a0c329bd16/org.musescore.MuseScore.yaml#L21
https://github.com/flathub/io.lmms.LMMS/blob/1a7c3f8780794c2fd3d088a24ac12f9398d08b7c/io.lmms.LMMS.json#L19
https://github.com/flathub/org.kde.okular/blob/7e4f34ccf6e86eaf3f4ad57ec3747aa9e1f9/org.kde.okular.json#L15
https://github.com/flathub/net.scribus.Scribus/blob/9f6bebb19e525242437583d376f436aa0ba253ce/net.scribus.Scribus.yaml#L23
https://github.com/flathub/org.mixxx.Mixxx/blob/da784e9b76cb1c304401164899d8fe6ad350d8d3/org.mixxx.Mixxx.yaml#L16
https://github.com/flathub/org.freecadweb.FreeCAD/blob/abbc05c0ff45d3e59f7581edf03339a767444a0f/org.freecadweb.FreeCAD.yaml#L10
https://github.com/flathub/org.kde.kontact/blob/2d277bd9054141b831e02ebe72ffc1c601d65cc7/org.kde.kontact.json#L49


The text you qouoted said "or software in Fedora that could easily be
made into a Flatpak" - I left some wiggle room there, but certainly if
we were including anything that overlapped Fedora RPMs, one of two
things would need to be true:


Fixed version:

d) doesn't exists in Fedora RPM repositories (except ostree-based Fedora 
editions).



Installation from Flathub would need to be prioritized after
installation from Fedora RPMs


Gnome Sofware already prioritizes Flatpaks over RPM packages even on 
Workstation Edition. I don't like that.


Flatpaks prioritization should only be done on ostree versions.

--
Sincerely,
  Vitaly Zaitsev (vit...@easycoding.org)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-30 Thread Justin Forbes
On Wed, Jun 30, 2021 at 3:40 AM Zbigniew Jędrzejewski-Szmek
 wrote:
>
> On Tue, Jun 29, 2021 at 03:13:10PM +0200, Tomas Tomecek wrote:
> > On Thu, Jun 24, 2021 at 8:09 PM Zbigniew Jędrzejewski-Szmek
> >  wrote:
> > >
> > > On Thu, Jun 24, 2021 at 03:48:54PM +0200, Tomas Tomecek wrote:
> > > > On Thu, Jun 24, 2021 at 12:41 PM Miro Hrončok  
> > > > wrote:
> > > > >
> > > > > On 24. 06. 21 11:16, Tomas Tomecek wrote:
> > > > > > ## Choosing git forge to host source-git repositories
> > > > > > We need to find a home for all the source-git repositories. This is
> > > > > > actually a really hard task because we have many options 
> > > > > > (github.com,
> > > > > > gitlab.com, pagure.io, src.fedoraproject.org, something custom or
> > > > > > on-premise) and different expectations: some projects already have
> > > > > > repos set up on different platforms while Pagure is the primary 
> > > > > > forge
> > > > > > now. Since the CPE team is investigating GitLab as a forge, it's 
> > > > > > even
> > > > > > harder for us to figure out the primary forge. We may end up
> > > > > > supporting both actually: pagure.io and gitlab.com. What are your
> > > > > > thoughts on this topic? Would you prefer pagure.io or gitlab.com
> > > > > > More info:
> > > > > > * https://pagure.io/fedora-source-git/sig/issue/1
> > > > > > * https://pagure.io/fedora-source-git/sig/issue/7
> > > > >
> > > > > I would expect that since the soruce git is just an intermediate 
> > > > > thing,
> > > > > supporting "any forge" is nice to have, but hard. I'd start with some 
> > > > > common
> > > > > options (Pagure + 1 other) and see where you'll get.
> > > >
> > > > Yep, that's exactly what I'd like us to do. As soon as we have the
> > > > service which accepts processes events up and running, it shouldn't be
> > > > that hard to teach it new fedora-messaging messages or webhook
> > > > payloads.
> > > >
> > > > > > ## High-level workflow proposal up for review
> > > > > > Hunor proposed a high-level workflow linked below and I strongly
> > > > > > recommend reading it. We have also started discussing many details 
> > > > > > in
> > > > > > the process, such as getting archives: should we generate one from 
> > > > > > the
> > > > > > source-git repo or use the official release archive from upstream?
> > > > >
> > > > > One thing to consider is that the upstream tarballs might be 
> > > > > cryptographically
> > > > > signed and packages should verify the signature in %prep.
> > > >
> > > > This is a very good point - in such a case, we should always pull the
> > > > official upstream tarball instead of generating a new one downstream.
> > >
> > > Hmm, but how would that work? I thought that the whole point of
> > > source-git is to build from a commit that contains some upstream
> > > version + downstream patches + downstream distro config like the spec 
> > > file,
> > > and that the build step of applying downstream patches just doesn't exist.
> > > If you reuse the upstream tarball, then by necessity those downstream
> > > patches need to be serialized and applied on top like in dist-git. So
> > > you lose the property that the checkout from version control is *the*
> > > source you build, but you also lose the property that the source you
> > > build is what was signed (since patches are applied).
> >
> > What you just described I understand as an (upstream) maintenance
> > branch and is not what we call source-git.
>
> It's an "upstream maintenance branch" PLUS the .spec bits that specify
> how to build a package.
>
> > Our definition of source-git is:
> > * upstream release tarball
> > * downstream code changes applied as patches during %prep
> > * additional configs for sake of building and testing
>
> But that describes dist-git *exactly*. Where is the difference?
>

In the spirit of openness that Fedora is based upon, it must be very
easy to determine what patches we carry as opposed to upstream, and
exactly how we build things.  This does not go away even if we get to
the point where dist-git no longer exists, and we can build directly
from source-git.  In the meantime, dist-git is the "canonical source
of truth" for fedora packages, so there is a middle step to convert
from source-git to dist-git. With both, the difference in using
source-git means there is an exploded tree there, with patches
applied. This makes debug and development much easier. There is also
git history, which hopefully contains a lot more background than
currently exists in dist-git.  Finally, it makes bisecting a much more
simple process, whether the offending patch is in upstream or
downstream changes.

Justin
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 

List of long term FTBFS packages to be retired in August

2021-06-30 Thread Miro Hrončok

Dear maintainers.

Based on the current fail to build from source policy, the following packages
will be retired from Fedora 35 approximately one week before branching (August 
2021).


Policy: 
https://docs.fedoraproject.org/en-US/fesco/Fails_to_build_from_source_Fails_to_install/


The packages in rawhide were not successfully built at least since Fedora 32.

This report is based on dist tags.

Packages collected via:
https://github.com/hroncok/fedora-report-ftbfs-retirements/blob/master/ftbfs-retirements.ipynb

If you see a package that was built, please let me know.
If you see a package that should be exempted from the process, please let me 
know and we can work together to get a FESCo approval for that.


If you see a package that can be rebuilt, please do so.

Package  (co)maintainers   Latest build

cardpeek  kalevFedora 32
percona-xtrabackupslaanesh, slankesFedora 32
php-opencloud-openstack   lcts Fedora 32
proxyfuzz psklenar Fedora 32
radamsa   huzaifas, mrniranjan Fedora 32
sugar-view-slides callkalpa, chimosky, pbrobinson, Fedora 31
  tuxbrewr
zram  pbrobinson   Fedora 32


The following packages require above mentioned packages:
Depending on: percona-xtrabackup (1), status change: 2020-11-22 (31 weeks ago)
holland (maintained by: immanetize, jeffreyness, survient)
holland-xtrabackup-1.2.4-2.fc35.noarch requires 
/usr/bin/xtrabackup

Affected (co)maintainers
callkalpa: sugar-view-slides
chimosky: sugar-view-slides
huzaifas: radamsa
immanetize: percona-xtrabackup
jeffreyness: percona-xtrabackup
kalev: cardpeek
lcts: php-opencloud-openstack
mrniranjan: radamsa
pbrobinson: zram, sugar-view-slides
psklenar: proxyfuzz
slaanesh: percona-xtrabackup
slankes: percona-xtrabackup
survient: percona-xtrabackup
tuxbrewr: sugar-view-slides
___
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Filtered Flathub Applications (System-Wide Change proposal)

2021-06-30 Thread Vitaly Zaitsev via devel

On 30/06/2021 14:30, Michael Catanzaro wrote:

Well that's required for anything not present in the runtime.


That's why I prefer classic RPM packages over Flatpaks.

I use Flatpaks only for proprietary software like Steam (with a lot of 
permission hardening overrides).


I believe hardening flags are added in by flatpak-builder. I think they somehow come from the runtime, though I'm not sure exactly how. (Anybody know?) 


Yes, but some developers think they are smarter than runtime maintainers 
and explicitly explicitly ignore them. I've previously reported such 
incidents.



However, for most Fedora editions, it's also irrelevant, because RPMs are 
entirely unsandboxed and banning poorly-sandboxed flatpak applications doesn't 
make sense when you can just install completely unsandboxed RPM applications.


Flatpak is being advertised as a safe and secure environment for running 
desktop applications.


Flatpak with access to user's home directory can do everything: change 
Flatpak policies, add/remove Flatpak repositories, override security 
permissions, etc.


I think Flatpaks with --filesystem=host or --filesystem=home should be 
banned too. Flathub admins don't consider this a security breach.


--
Sincerely,
  Vitaly Zaitsev (vit...@easycoding.org)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Weird glibc recursive stack crash in Rawhide

2021-06-30 Thread Richard W.M. Jones
On Wed, Jun 30, 2021 at 01:30:52PM +0100, Richard W.M. Jones wrote:
> It seems to affect only qemu for some reason.
> 
>   https://bugzilla.redhat.com/show_bug.cgi?id=1975693#c13

So it's a genuine bug: if you are using glibc from Rawhide and
seccomp, and your seccomp rules are blocking the sched_getaffinity
syscall, then glibc will go into an infinite loop and crash :-(

In unrelated news, what happened to the -ow...@fedoraproject.org
email addresses?  They seem to be bouncing for me.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-p2v converts physical machines to virtual machines.  Boot with a
live CD or over the network (PXE) and turn machines into KVM guests.
http://libguestfs.org/virt-v2v
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Filtered Flathub Applications (System-Wide Change proposal)

2021-06-30 Thread Owen Taylor
On Wed, Jun 30, 2021 at 7:44 AM Ian McInerney  wrote:

>> Roughly speaking, the criteria for including software is a) will not
>> cause legal or other problems for Fedora to point to b) does not
>> overlap Fedora Flatpaks or software in Fedora that could easily be
>> made into a Flatpak c) works reasonably well. For Fedora 35, We expect
>> to include all software from the top 50 most popular applications on
>> Flathub that meet these criteria plus selected other software of
>> interest to the Fedora target audience - Fedora community members are
>> welcome to propose additions.
>
> Does this mean that FESCO is now forcing Fedora packagers to maintain Fedora 
> Flatpaks and respond to their related issues when many of them seem to be 
> created without the packagers' knowledge/consent, and there is no 
> documentation in the packaging guidelines/wiki about how to actually do 
> anything for them, or information about where the manifests for them actually 
> live?

This proposal doesn't really change anything with respect to Fedora
Flatpaks. (Docs for Fedora Flatpaks:
https://docs.fedoraproject.org/en-US/flatpak/)

Are you concerned that there's some implicit threat that if you don't
create a Fedora Flatpak for your Fedora RPM, users will be directed to
the Flathub version? We're really not anticipating overlap between the
set of applications packaged in Fedora and the set included in the
filtered-view of Flathub. Any exceptions to that would definitely have
to be coordinated closely with the relevant package maintainer.

Owen
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Filtered Flathub Applications (System-Wide Change proposal)

2021-06-30 Thread Owen Taylor
On Wed, Jun 30, 2021 at 6:42 AM Vitaly Zaitsev via devel
 wrote:
>
> On 29/06/2021 22:25, Ben Cotton wrote:
> > Enabling third-party repositories will now create a Flathub remote
> > that is a filtered view of Flathub.
>
> I don't trust Flathub at all, because they don't want to register a
> non-profit organization. They can easily sell their business like
> FreeNode did recently.

Setting up an independent non-profit, and maintaining it's non-profit
status is a quite involved activity. (details depend on the country,
of course!)

Flathub's non-donated hardware resources are owned by the GNOME
Foundation (a registered non-profit) and the GNOME Foundation also
owns the Flathub trademark (See:
https://foundation.gnome.org/logo-and-trademarks/). Hopefully this
provides some assurance that Flathub won't suddenly start doing
something entirely different.

If we lost trust in Flathub, Fedora would also have the ability to
update the filter to have *no* applications in it.

> Flathub relies on upstreams, not professional maintainers. Most of
> upstream developers don't know how to package software properly. They
> bundle lots of libraries, don't use C/C++ build hardening flags, etc.

Flathub is a packaging community, like Fedora. Being a professional is
definitely not a criteria for contributing to Fedora. :-)

> A lot of applications from Flathub uses --filesystem=host or
> --filesystem=home, which means they don't use Flatpak isolation at all.

This is something that definitely can be and will be examined when
reviewing applications for inclusion in the Fedora filter.
Unfortunately, a lot of interesting software can't be completely
sandboxed - because it, say, uses X11 rather than Wayland. But where
thing *can* be sandboxed they should be sandboxed.

> Due to the bundling of a large number of libraries, some applications
> have critical vulnerabilities with assigned CVE numbers: CVE-2020-12284,
> CVE-2019-17498, CVE-2018-11235, CVE-2018-17456, CVE-2017-9780.

There are definitely improvements that could be made to CVE response
policies in Flathub, and I know automated scanning was being worked
on. If we were activitely looking to delegate software that is
packaged in Fedora to Flathub, I think we'd need to have a very high
bar here. But as a source of *additional* software, I think the
standard should be comparison to wherever the Fedora user would get
the software from otherwise. When this is scheduled for FESCO
discussion, I'll try to see if we can get some Flathub maintainers to
attend in case people have questions in this area (or other areas).

> > Roughly speaking, the criteria for including software is a) will not
> > cause legal or other problems for Fedora to point to b) does not
> > overlap Fedora Flatpaks or software in Fedora that could easily be
> > made into a Flatpak c) works reasonably well.
>
> Should be added also:
>
> d) doesn't exists in Fedora RPM repositories.

The text you qouoted said "or software in Fedora that could easily be
made into a Flatpak" - I left some wiggle room there, but certainly if
we were including anything that overlapped Fedora RPMs, one of two
things would need to be true:

 * Installation from Flathub would need to be prioritized after
installation from Fedora RPMs
 * Fedora Silverblue would need it's own filter list with additional
applications

In the immediate future, our plan is to avoid any such overlap.

> > Fedora users who opt-in to third-party software repositories will have
> > immediate access to more software out-of-the-box.
>
> Fedora Silverblue must have its own Flatpaks and do not rely on third-party 
> repositories.

This is not about replacing software that is included in Fedora. It's
about providing access to software *not* included in Fedora.

Thanks for the feedback!
Owen


- Owen
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Filtered Flathub Applications (System-Wide Change proposal)

2021-06-30 Thread Kalev Lember
On Wed, Jun 30, 2021 at 2:31 PM Michael Catanzaro 
wrote:

> I believe hardening flags are added in by flatpak-builder. I think they
> somehow come from the runtime, though I'm not sure exactly how.
> (Anybody know?)
>

Yes: there's a flatpak-builder config file in
/etc/flatpak-builder/defaults.json that's part of the runtime that adds the
hardening flags.

-- 
Kalev
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Third-party Software Mechanism (System-Wide Change proposal)

2021-06-30 Thread Zbigniew Jędrzejewski-Szmek
On Wed, Jun 30, 2021 at 02:09:19PM +0200, Miroslav Suchý wrote:
> Dne 30. 06. 21 v 13:52 Zbigniew Jędrzejewski-Szmek napsal(a):
> >For packaged stuff, please do:
> >
> >   s|/etc/fedora-third-party.conf|/usr/lib/fedora-third-party.conf|
> >
> >We shouldn't add yet more stuff in/etc/.
> 
> I guess that /usr/lib is typo and you meant /var/lib/

No, /usr/lib.

This was in response to:
> Packages like fedora-workstation-repositories that include
> third-party repositories will drop config files into
> /etc/fedora-third-party.d/*.conf

Those config files should be in /usr/lib/fedora-third-party.d/.

> There is a fedora-third-party package with a fedora-third-party
> script with enable/disable/refresh/query subcommands. The status is
> stored in /etc/fedora-third-party.conf

That part is fine. When the user does a manual configuration step,
this should be stored in /etc/.

(Essentially, the usual systemd-style config file split.)

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: [ELN] Rebuild ordering and side-tag support

2021-06-30 Thread Stephen Gallagher
On Tue, Jun 29, 2021 at 2:34 PM Robert-André Mauchin  wrote:
>
> On 6/28/21 5:55 PM, Stephen Gallagher wrote:
> > Summary: I think we can fix the ELN side-tag rebuild problems and make
> > the composes more reliable if we change the mechanism for kicking off
> > rebuilds. I'm soliciting feedback to help identify potential issues
> > with this proposed approach.
> >
>
> How do you handle packages that need bootstrapping? Several Go packages
> must be built in a certain order with bootstrapping on, on a virgin
> branch. It takes auite a lot of time.
>

Would they not be able to build atop the Fedora versions that have
already been bootstrapped? I'm not sure I understand the situation.

Most bootstrapping scenarios that I'm aware of are essentially:

PackageB needs an updated PackageA to build, but PackageA also needs
an updated PackageB to build. PackageA can be bootstrapped (by
building it in some special manner, such as from a prebuilt upstream
binary), allowing PackageB to be built and then rebuilding PackageA
with the updated PackageB.

In the scenario I'm discussing, we would take those final PackageA and
PackageB from Fedora and have them in the buildroot for the ELN
builds. That would mean that the bootstrap step wouldn't be needed. If
there's a case you know of that this won't work for, I'd really like
to hear it (preferably with real package names).
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: PSA: /usr/lib/rpm/redhat/brp-python-hardlink: No such file or directory [and how to solve it]

2021-06-30 Thread Miro Hrončok

On 30. 06. 21 14:21, Miro Hrončok wrote:

If you see the following error in a Rawhide mock build:

...
+ /usr/lib/rpm/redhat/brp-python-hardlink
/var/tmp/rpm-tmp.WFxggi: line 65: /usr/lib/rpm/redhat/brp-python-hardlink: No 
such file or directory

error: Bad exit status from /var/tmp/rpm-tmp.WFxggi (%install)


Update your mock chroot from the "local" repository:

     $ mock -r fedora-rawhide-x86_64 --enablerepo=local --update

And don't clean it before running the build.

If you see the error in Koji, please let me know ASAP.


I've mixed my WIP fix with the roginal error. The error you are likely to see 
is actually:


  /usr/lib/rpm/brp-python-hardlink: No such file or directory

--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
python-devel mailing list -- python-devel@lists.fedoraproject.org
To unsubscribe send an email to python-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/python-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: PSA: /usr/lib/rpm/redhat/brp-python-hardlink: No such file or directory [and how to solve it]

2021-06-30 Thread Miro Hrončok

On 30. 06. 21 14:21, Miro Hrončok wrote:

If you see the following error in a Rawhide mock build:

...
+ /usr/lib/rpm/redhat/brp-python-hardlink
/var/tmp/rpm-tmp.WFxggi: line 65: /usr/lib/rpm/redhat/brp-python-hardlink: No 
such file or directory

error: Bad exit status from /var/tmp/rpm-tmp.WFxggi (%install)


Update your mock chroot from the "local" repository:

     $ mock -r fedora-rawhide-x86_64 --enablerepo=local --update

And don't clean it before running the build.

If you see the error in Koji, please let me know ASAP.


I've mixed my WIP fix with the roginal error. The error you are likely to see 
is actually:


  /usr/lib/rpm/brp-python-hardlink: No such file or directory

--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: [ELN] Rebuild ordering and side-tag support

2021-06-30 Thread Stephen Gallagher
On Tue, Jun 29, 2021 at 12:59 PM Kevin Fenzi  wrote:

> Would these rawhide builds go out in ELN composes?
> Or would you block composes until you had only eln rpms in it?

They would go out in the composes until they are successfully rebuilt.
This is to ensure that Content Resolver continues to have a fresh
compose to check dependencies.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-30 Thread Tomas Tomecek
Randy, thank you for providing such detailed information! A few comments
inline.

On Wed, Jun 30, 2021 at 3:01 AM Randy Barlow via devel <
devel@lists.fedoraproject.org> wrote:

> On Tue, 2021-06-29 at 15:36 +0200, Tomas Tomecek wrote:
> > > On the "uni-repo" counter proposal: there's a bunch of real-world
> > > examples here of distributions using this successfully:
> > >
>
> https://github.com/projectatomic/rpmdistro-gitoverlay/blob/master/doc/reworking-fedora-releng.md#unified-source-and-pr-driven-workflow
>
> Hey Tomas!
>
> As Colin noted above, Gentoo uses a single repo (well, technically,
> they also have overlays, but the main distro is just one git repo is
> what I mean…) I'll add some comments to your thoughts below:
>

After reading your explanation of how gentoo does packaging, it indeed
makes a lot of sense and feels like that most of the concerns I pointed out
have solutions or could be mitigated.

The biggest problem I personally see is the effort which would be needed to
pull this off: it would take years to accomplish, a ton of teams would be
involved and all the maintainers would need to cooperate - and then we'd
need to do the same thing for CentOS Stream and RHEL.

Such a change to the development workflow would be massive and the level of
coordination would be immense. That's all I can say.

  *  On a system with an ssd I hadn't pulled for two days, and a git
>  pull took 0m3.357s.
>   *  On a system with a spinny disk I hadn't pulled since January 17,
>  and a git pull took 1m27.878s. I'd say that this is probably close
>  to a "worst case" scenario, except that I do have a 200 Mbps
>  internet connection. Most of the time was spent doing stuff with
>  the disk and not on network. I could imagine a slow network making
>  this even longer.
>

Since we all would work in a single git repo, I'm assuming the pulls would
be cheap most of the time.

CI and builders would probably need a caching mechanism so the repo
wouldn't need to be fetched from scratch all the time.

> * How would CI function?
>
> Due to the atomic commit, I'd say CI could function better because you
> know what changes need to be tested together.
>
> Gentoo doesn't have per-package CI that I'm aware of, but they do have
> general checks that they do on all packages. They've got a QA bot that
> check PRs on GitHub and marks them as pass/fail.
>
> > * Where and how would tests be stored?
>
> As said, I don't think Gentoo does this, but I could imagine having a
> tests/ subfolder in the package's folder, not too different from what
> we do now.
>

Well, tests could be stored alongside packaging files as they are right now.

> * How would contributions be handled? It would be hard to detect
> > stalled PRs, maintainers would be swarmed with changes not related to
> > their packages.
>
> Here's an example of a Gentoo PR I worked on recently:
>
> https://github.com/gentoo/gentoo/pull/20975
>
> Note that there are two bots that have commented on it. The interesting
> one for this question is gentoo-bot - it came and marked the PR with
> some metadata, helpful links into the bug tracker, CoC, and other
> stuff, and most usefully, labeled the PR with some special labels.
>
> If Fedora had such a bot you could imagine it doing things like
> assigning it to the right person (or otherwise notifying them), pinging
> long-open PRs, or other things like that.
>
> The other bot on that PR is the Gentoo QA bot, and it does some basic
> checks on your commit to make sure you followed some basic
> rules/guidelines. It's not the same thing as what we have in Fedora.
>
> We do have PRs in Fedora that stay open for a long time too, so I don't
> think that's a monorepo vs. lots-of-repos problem ☺
>

Looks like the gentoo-bot is a critical piece of the development process so
that people are able to progress with their contributions efficiently.

Oh, and one other thought, Gentoo is not doing what we call source-git
> either. Like us, the packages operate on a tarball, typically from
> upstream, and then they apply patches to them as needed. I think it
> would be probably too extreme to do a source-git thing with a monorepo
> (like, if the kernel source code and the Firefox source code and the
> GNOME source code were all in the same repo, that would probably be a
> bit much ☺)
>

Monorepo source-git wouldn't work, our SSDs are not that big, yet :D

Thanks Randy for such a great write-up. Now that I think about it,
the monorepo proposal is orthogonal to the source-git proposal as the two
workflows serve different purposes: one is meant for development
(source-git: write a patch), the other one for integration into the
operating system (tinker with a spec file or the build system).


Tomas
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 

Weird glibc recursive stack crash in Rawhide

2021-06-30 Thread Richard W.M. Jones
It seems to affect only qemu for some reason.

  https://bugzilla.redhat.com/show_bug.cgi?id=1975693#c13

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-top is 'top' for virtual machines.  Tiny program with many
powerful monitoring features, net stats, disk stats, logging, etc.
http://people.redhat.com/~rjones/virt-top
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Filtered Flathub Applications (System-Wide Change proposal)

2021-06-30 Thread Michael Catanzaro
On Wed, Jun 30 2021 at 12:41:17 PM +0200, Vitaly Zaitsev via devel 
 wrote:

 They
bundle lots of libraries,


Well that's required for anything not present in the runtime.


don't use C/C++ build hardening flags, etc.


I believe hardening flags are added in by flatpak-builder. I think they 
somehow come from the runtime, though I'm not sure exactly how. 
(Anybody know?)


For freedesktop-sdk and the GNOME SDK, the hardening flags are actually 
copied straight from Fedora with only minor adjustments. E.g. GCC is 
built with --enable-default-pie --enable-default-ssp so the runtime 
doesn't need to use GCC specs in the default flags like Fedora does. 
Again, since applications do get these flags (somehow), they have to go 
out of their way to screw this up.


(Seriously, how do the applications inherit the hardening flags? It 
can't be via magic. We should confirm that this actually works.)



A lot of applications from Flathub uses --filesystem=host or

--filesystem=home, which means they don't use Flatpak isolation at all.

This is true. However, for most Fedora editions, it's also irrelevant, 
because RPMs are entirely unsandboxed and banning poorly-sandboxed 
flatpak applications doesn't make sense when you can just install 
completely unsandboxed RPM applications.


For Silverblue, it would make sense IMO to be stricter and filter 
poorly-sandboxed applications out of GNOME Software.


Michael

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Memory Constraints macros for RPM (System-Wide Change proposal)

2021-06-30 Thread Neal Gompa
On Wed, Jun 30, 2021 at 7:59 AM Colin Walters  wrote:
>
>
>
> On Tue, Jun 29, 2021, at 4:25 PM, Ben Cotton wrote:
> > https://fedoraproject.org/wiki/Changes/MemoryConstraintsMacros
> >
> > == Summary ==
> > Introduce macros, similar to openSUSE's
> > [https://build.opensuse.org/package/show/openSUSE:Factory/memory-constraints
> > memory-constraints]), for optionally limiting build parallelism for
> > build-time memory-bound packages
>
> If our RPM builds were Kubernetes pods (or executed via podman, which 
> understands the same things), it'd make sense to use
> https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
>
> Plus there's a whole ecosystem around that, like the vertical pod autoscaler:
> https://docs.openshift.com/container-platform/4.7/nodes/pods/nodes-pods-vertical-autoscaler.html

Even in that world, packagers would have no access to Kubernetes
configuration. Fortunately, we don't use Kubernetes for our package
build infrastructure. That's a complication that I'm grateful to not
have to deal with.


-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


PSA: /usr/lib/rpm/redhat/brp-python-hardlink: No such file or directory [and how to solve it]

2021-06-30 Thread Miro Hrončok

If you see the following error in a Rawhide mock build:

...
+ /usr/lib/rpm/redhat/brp-python-hardlink
/var/tmp/rpm-tmp.WFxggi: line 65: /usr/lib/rpm/redhat/brp-python-hardlink: No 
such file or directory

error: Bad exit status from /var/tmp/rpm-tmp.WFxggi (%install)


Update your mock chroot from the "local" repository:

$ mock -r fedora-rawhide-x86_64 --enablerepo=local --update

And don't clean it before running the build.

If you see the error in Koji, please let me know ASAP.

--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
python-devel mailing list -- python-devel@lists.fedoraproject.org
To unsubscribe send an email to python-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/python-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


PSA: /usr/lib/rpm/redhat/brp-python-hardlink: No such file or directory [and how to solve it]

2021-06-30 Thread Miro Hrončok

If you see the following error in a Rawhide mock build:

...
+ /usr/lib/rpm/redhat/brp-python-hardlink
/var/tmp/rpm-tmp.WFxggi: line 65: /usr/lib/rpm/redhat/brp-python-hardlink: No 
such file or directory

error: Bad exit status from /var/tmp/rpm-tmp.WFxggi (%install)


Update your mock chroot from the "local" repository:

$ mock -r fedora-rawhide-x86_64 --enablerepo=local --update

And don't clean it before running the build.

If you see the error in Koji, please let me know ASAP.

--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Filtered Flathub Applications (System-Wide Change proposal)

2021-06-30 Thread Neal Gompa
On Wed, Jun 30, 2021 at 8:09 AM Ian McInerney  wrote:
>
> On Wed, Jun 30, 2021 at 12:47 PM Neal Gompa  wrote:
>>
>> On Wed, Jun 30, 2021 at 7:43 AM Ian McInerney  
>> wrote:
>> >
>> > On Tue, Jun 29, 2021 at 9:26 PM Ben Cotton  wrote:
>> >>
>> >> https://fedoraproject.org/wiki/Changes/Filtered_Flathub_Applications
>> >>
>> >> == Summary ==
>> >> Enabling third-party repositories will now create a Flathub remote
>> >> that is a filtered view of Flathub.
>> >>
>> >>
>> >> == Detailed Description ==
>> >> 'Note that this proposal is about user experience, procedures, and
>> >> technology - the high-level concept has already been discussed and
>> >> approved by the Fedora Council and FESCO.'
>> >>
>> >> Enabling third-party repositories will now create a Flathub remote
>> >> that is a filtered view of Flathub. This means that applications on
>> >> Flathub that have been explicitly approved (by a new process proposed
>> >> here) will be available in GNOME Software and on the
>> >> flatpak command line. If the user follows following the
>> >> instructions on https://flatpak.org/setup/Fedora/, then the filter is
>> >> removed, and the user gets a full view of Flathub.
>> >>
>> >> Roughly speaking, the criteria for including software is a) will not
>> >> cause legal or other problems for Fedora to point to b) does not
>> >> overlap Fedora Flatpaks or software in Fedora that could easily be
>> >> made into a Flatpak c) works reasonably well. For Fedora 35, We expect
>> >> to include all software from the top 50 most popular applications on
>> >> Flathub that meet these criteria plus selected other software of
>> >> interest to the Fedora target audience - Fedora community members are
>> >> welcome to propose additions.
>> >
>> >
>> > Does this mean that FESCO is now forcing Fedora packagers to maintain 
>> > Fedora Flatpaks and respond to their related issues when many of them seem 
>> > to be created without the packagers' knowledge/consent, and there is no 
>> > documentation in the packaging guidelines/wiki about how to actually do 
>> > anything for them, or information about where the manifests for them 
>> > actually live?
>> >
>>
>> Of course not. This is a criteria for what we permit through the
>> filter from Flathub. The idea is that nothing we offer from Flathub
>> should be possible to ship in Fedora itself. That is, it's truly only
>> possible to be available as a third-party app.
>>
>> Basically, if something is available in Fedora, it *cannot* be
>> available through Flathub by default.
>
>
> But that is exactly why it seems to me packagers are being forced to care 
> about the Fedora Flatpaks. Take the Audacity package as an example (since I 
> am one of the people maintaining it). There is a usable Flatpak for it on 
> Flathub, and I as a packager don't want to need to learn the Fedora systems 
> to build and maintain a Fedora Flatpak for it (since there seems to be little 
> to no documentation on how to do it). According to this policy - since there 
> is an Audacity package in Fedora, the Flathub version couldn't be included. 
> If we don't have a maintained version of the Flatpak in Fedora, then why are 
> we blocking it from Flathub?
>

Because most people are able to install RPMs *and* Flatpaks. And
there's a process for auto-building Flatpaks from our RPM spec
definitions that can use for apps packaged in Fedora.

But most importantly, a large chunk of the applications on Flathub
include stuff we can't directly recommend for various reasons
(patent-encumbered stuff, etc.).



-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Third-party Software Mechanism (System-Wide Change proposal)

2021-06-30 Thread Miroslav Suchý

Dne 30. 06. 21 v 13:52 Zbigniew Jędrzejewski-Szmek napsal(a):

For packaged stuff, please do:

   s|/etc/fedora-third-party.conf|/usr/lib/fedora-third-party.conf|

We shouldn't add yet more stuff in/etc/.


I guess that /usr/lib is typo and you meant /var/lib/

Miroslav
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Filtered Flathub Applications (System-Wide Change proposal)

2021-06-30 Thread Ian McInerney
On Wed, Jun 30, 2021 at 12:47 PM Neal Gompa  wrote:

> On Wed, Jun 30, 2021 at 7:43 AM Ian McInerney 
> wrote:
> >
> > On Tue, Jun 29, 2021 at 9:26 PM Ben Cotton  wrote:
> >>
> >> https://fedoraproject.org/wiki/Changes/Filtered_Flathub_Applications
> >>
> >> == Summary ==
> >> Enabling third-party repositories will now create a Flathub remote
> >> that is a filtered view of Flathub.
> >>
> >>
> >> == Detailed Description ==
> >> 'Note that this proposal is about user experience, procedures, and
> >> technology - the high-level concept has already been discussed and
> >> approved by the Fedora Council and FESCO.'
> >>
> >> Enabling third-party repositories will now create a Flathub remote
> >> that is a filtered view of Flathub. This means that applications on
> >> Flathub that have been explicitly approved (by a new process proposed
> >> here) will be available in GNOME Software and on the
> >> flatpak command line. If the user follows following the
> >> instructions on https://flatpak.org/setup/Fedora/, then the filter is
> >> removed, and the user gets a full view of Flathub.
> >>
> >> Roughly speaking, the criteria for including software is a) will not
> >> cause legal or other problems for Fedora to point to b) does not
> >> overlap Fedora Flatpaks or software in Fedora that could easily be
> >> made into a Flatpak c) works reasonably well. For Fedora 35, We expect
> >> to include all software from the top 50 most popular applications on
> >> Flathub that meet these criteria plus selected other software of
> >> interest to the Fedora target audience - Fedora community members are
> >> welcome to propose additions.
> >
> >
> > Does this mean that FESCO is now forcing Fedora packagers to maintain
> Fedora Flatpaks and respond to their related issues when many of them seem
> to be created without the packagers' knowledge/consent, and there is no
> documentation in the packaging guidelines/wiki about how to actually do
> anything for them, or information about where the manifests for them
> actually live?
> >
>
> Of course not. This is a criteria for what we permit through the
> filter from Flathub. The idea is that nothing we offer from Flathub
> should be possible to ship in Fedora itself. That is, it's truly only
> possible to be available as a third-party app.
>
> Basically, if something is available in Fedora, it *cannot* be
> available through Flathub by default.
>

But that is exactly why it seems to me packagers are being forced to care
about the Fedora Flatpaks. Take the Audacity package as an example (since I
am one of the people maintaining it). There is a usable Flatpak for it on
Flathub, and I as a packager don't want to need to learn the Fedora systems
to build and maintain a Fedora Flatpak for it (since there seems to be
little to no documentation on how to do it). According to this policy -
since there is an Audacity package in Fedora, the Flathub version couldn't
be included. If we don't have a maintained version of the Flatpak in
Fedora, then why are we blocking it from Flathub?

-Ian
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-30 Thread Tomas Tomecek
On Wed, Jun 30, 2021 at 10:40 AM Zbigniew Jędrzejewski-Szmek
 wrote:
>
> > Our definition of source-git is:
> > * upstream release tarball
> > * downstream code changes applied as patches during %prep
> > * additional configs for sake of building and testing
>
> But that describes dist-git *exactly*. Where is the difference?

Upstream git history and downstream patches tracked as git commits
instead of files.

> Zbyszek
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it: 
> https://pagure.io/fedora-infrastructure
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Memory Constraints macros for RPM (System-Wide Change proposal)

2021-06-30 Thread Colin Walters


On Tue, Jun 29, 2021, at 4:25 PM, Ben Cotton wrote:
> https://fedoraproject.org/wiki/Changes/MemoryConstraintsMacros
> 
> == Summary ==
> Introduce macros, similar to openSUSE's
> [https://build.opensuse.org/package/show/openSUSE:Factory/memory-constraints
> memory-constraints]), for optionally limiting build parallelism for
> build-time memory-bound packages

If our RPM builds were Kubernetes pods (or executed via podman, which 
understands the same things), it'd make sense to use
https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/

Plus there's a whole ecosystem around that, like the vertical pod autoscaler:
https://docs.openshift.com/container-platform/4.7/nodes/pods/nodes-pods-vertical-autoscaler.html
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Third-party Software Mechanism (System-Wide Change proposal)

2021-06-30 Thread Zbigniew Jędrzejewski-Szmek
> == Technical implementation ==
> 
> * There is a fedora-third-party package with a
> fedora-third-party script with
> enable/disable/refresh/query subcommands. The status is
> stored in /etc/fedora-third-party.conf
> * Packages like fedora-workstation-repositories that
> include third-party repositories will drop config files into
> /etc/fedora-third-party.d/*.conf. There will be a
> post-transaction file trigger to run fedora-third-party
> refresh, which applies the users opt-in status to newly
> installed repository files.

For packaged stuff, please do:

  s|/etc/fedora-third-party.conf|/usr/lib/fedora-third-party.conf|

We shouldn't add yet more stuff in /etc/.

Zbyszek



> * We add a new page to GNOME Initial Setup that asks a single
> question, *along the lines of*:
> '''Enable Third Party Software repositories?''' 
> ☑ Access additional software from selected third party sources. Some
> of this software is proprietary and therefore has restrictions on use,
> sharing, and access to source code. 
> [Find out 
> more...](https://fedoraproject.org/wiki/Workstation/Third_Party_Software_Repositories)
> * If the user leaves the box checked, GNOME Initial setup runs
> `fedora-third-party enable`.
> * For upgrades, GNOME Software shows an info-bar with the same
> question if no status is stored in `/etc/fedora-thirdparty.conf`
> 
> == Feedback ==
> 
> 
> == Benefit to Fedora ==
> 
> The main benefit of this proposal is the removal of the state where
> the user has opted in to third party repositories but they are not
> actually enabled. PackageKit supports the
> enabled_metadata=1 key in a repository file, which allows
> applications to be searched in this state, but this is not supported
> by DNF.
> 
> The new method is also easily extensible to Flatpaks, where there also
> no equivalent to enabled_metadata=1, even in GNOME
> Software.
> 
> == Scope ==
> * Proposal owners: Create and test proposed
> fedora-third-party package. Implement the graphical
> controls for this in GNOME Software and gnome-initial-setup.
> * Release engineering: [https://pagure.io/releng/issue/10186 #10186]
> No changes are required.
> * Policies and guidelines: Third-party Software guidelines will need
> minor changes to remove references to `enabled_metadata=1`. Pending
> finalization of technical implementation.
> * Trademark approval: N/A (not needed for this Change)
> * Alignment with Objectives: No real alignment
> 
> == Upgrade/compatibility impact ==
> Because the "opt-in" status to 3rd party software is currently
> represented by whether fedora-workstation-repositories is installed,
> and because fedora-workstation-repositories will become an
> installed-by-default package, users will need to opt-in again.
> 
> They can do this either by responding in the infobar that will be
> displayed in GNOME Software, or by running fedora-third-party
> enable on the command line.
> 
> == How To Test ==
> * A fresh install of Fedora Workstation where the user ''does not''
> opt-in should have all repositories disabled.
> * A fresh install of Fedora Workstation where the user ''does'' opt-in
> should have all 3rd-party repositories enabled.
> * On an upgrade from F34, if the user opts-out, the enablement status
> of third-party repositories should be ''unchanged'' (try enabling one
> before the upgrade)
> * On an upgrade from F35, if the user opts-in, all 3rd party
> repositories should be enabled.
> 
> == User Experience ==
> The user will get less confusing behavior around third-party
> repositories - enabled will mean enabled and will take affect no
> matter how they are installing packages.
> 
> See https://hackmd.io/@owtaylor/fedora-third-party-repos for a
> detailed description of the *current* experience along with some notes
> about the desired behavior.
> 
> == Dependencies ==
> The changes are limited to the following packages:
> 
> * The new `fedora-third-party` package
> * `fedora-workstation-repositories`
> * `gnome-software`
> * `gnome-initial-setup`
> * `fedora-release-workstation` and other release packages that will
> now require fedora-workstation-repositories.
> 
> This change proposal is a prerequisite for a separate change proposal
> to add a filtered view of Flathub to the set of third-party
> repositories.
> 
> == Contingency Plan ==
> * Contingency mechanism: revert all changes back to the F34 state.
> (This will also require reverting the filtered-view-of-Flathub
> change.)
> * Contingency deadline: beta freeze
> * Blocks release? Yes - this needs to be finished or reverted
> 
> == Documentation ==
> '''This should be a link to a man page for the `fedora-third-party` tool'''
> 
> == Release Notes ==
> Fedora optionally provides repository definitions allowing users to
> install certain third-party software. This used to be done as a
> two-step process where when the user asked to enable third-party
> repositories, the repository definitions were installed but not
> actually enabled, and they had to be 

Re: F35 Change: Third-party Software Mechanism (System-Wide Change proposal)

2021-06-30 Thread Owen Taylor
On Wed, Jun 30, 2021 at 6:50 AM Lars Seipel  wrote:
> >[Find out 
> >more...](https://fedoraproject.org/wiki/Workstation/Third_Party_Software_Repositories)
> >* If the user leaves the box checked, GNOME Initial setup runs
> >`fedora-third-party enable`.
>
> Leaves the box checked? Either I'm misunderstanding or this contradicts
> the remaining text which talks about "opt-in".

Thanks for noticing the discrepancy!

The current mockup for how the page in GNOME Initial Setup should look
is at the top of:

 https://hackmd.io/@owtaylor/fedora-third-party-repos

and is in-fact a classic opt-in. (*)

The mockup tries to reduce the risk of an inexperienced user being
confused by terms like "third party" and "repository" by mentioning
specific software.I'll look at embedding that in the change proposal
and will make sure that the text is consistent.

- Owen

(*) The text of the Third-Party Repository policy is "the user must
explicitly enable third-party repositories to install from them" - I
don't think a checked-by-default box would be in agreement with that.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Filtered Flathub Applications (System-Wide Change proposal)

2021-06-30 Thread Neal Gompa
On Wed, Jun 30, 2021 at 7:43 AM Ian McInerney  wrote:
>
> On Tue, Jun 29, 2021 at 9:26 PM Ben Cotton  wrote:
>>
>> https://fedoraproject.org/wiki/Changes/Filtered_Flathub_Applications
>>
>> == Summary ==
>> Enabling third-party repositories will now create a Flathub remote
>> that is a filtered view of Flathub.
>>
>>
>> == Detailed Description ==
>> 'Note that this proposal is about user experience, procedures, and
>> technology - the high-level concept has already been discussed and
>> approved by the Fedora Council and FESCO.'
>>
>> Enabling third-party repositories will now create a Flathub remote
>> that is a filtered view of Flathub. This means that applications on
>> Flathub that have been explicitly approved (by a new process proposed
>> here) will be available in GNOME Software and on the
>> flatpak command line. If the user follows following the
>> instructions on https://flatpak.org/setup/Fedora/, then the filter is
>> removed, and the user gets a full view of Flathub.
>>
>> Roughly speaking, the criteria for including software is a) will not
>> cause legal or other problems for Fedora to point to b) does not
>> overlap Fedora Flatpaks or software in Fedora that could easily be
>> made into a Flatpak c) works reasonably well. For Fedora 35, We expect
>> to include all software from the top 50 most popular applications on
>> Flathub that meet these criteria plus selected other software of
>> interest to the Fedora target audience - Fedora community members are
>> welcome to propose additions.
>
>
> Does this mean that FESCO is now forcing Fedora packagers to maintain Fedora 
> Flatpaks and respond to their related issues when many of them seem to be 
> created without the packagers' knowledge/consent, and there is no 
> documentation in the packaging guidelines/wiki about how to actually do 
> anything for them, or information about where the manifests for them actually 
> live?
>

Of course not. This is a criteria for what we permit through the
filter from Flathub. The idea is that nothing we offer from Flathub
should be possible to ship in Fedora itself. That is, it's truly only
possible to be available as a third-party app.

Basically, if something is available in Fedora, it *cannot* be
available through Flathub by default.




--
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Filtered Flathub Applications (System-Wide Change proposal)

2021-06-30 Thread Ian McInerney
On Tue, Jun 29, 2021 at 9:26 PM Ben Cotton  wrote:

> https://fedoraproject.org/wiki/Changes/Filtered_Flathub_Applications
>
> == Summary ==
> Enabling third-party repositories will now create a Flathub remote
> that is a filtered view of Flathub.
>
>
> == Detailed Description ==
> 'Note that this proposal is about user experience, procedures, and
> technology - the high-level concept has already been discussed and
> approved by the Fedora Council and FESCO.'
>
> Enabling third-party repositories will now create a Flathub remote
> that is a filtered view of Flathub. This means that applications on
> Flathub that have been explicitly approved (by a new process proposed
> here) will be available in GNOME Software and on the
> flatpak command line. If the user follows following the
> instructions on https://flatpak.org/setup/Fedora/, then the filter is
> removed, and the user gets a full view of Flathub.
>
> Roughly speaking, the criteria for including software is a) will not
> cause legal or other problems for Fedora to point to b) does not
> overlap Fedora Flatpaks or software in Fedora that could easily be
> made into a Flatpak c) works reasonably well. For Fedora 35, We expect
> to include all software from the top 50 most popular applications on
> Flathub that meet these criteria plus selected other software of
> interest to the Fedora target audience - Fedora community members are
> welcome to propose additions.
>

Does this mean that FESCO is now forcing Fedora packagers to maintain
Fedora Flatpaks and respond to their related issues when many of them seem
to be created without the packagers' knowledge/consent, and there is no
documentation in the packaging guidelines/wiki about how to actually do
anything for them, or information about where the manifests for them
actually live?

-Ian
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Memory Constraints macros for RPM (System-Wide Change proposal)

2021-06-30 Thread Zbigniew Jędrzejewski-Szmek
On Wed, Jun 30, 2021 at 12:46:59PM +0200, Miroslav Suchý wrote:
> Dne 30. 06. 21 v 12:29 Zbigniew Jędrzejewski-Szmek napsal(a):
> >The OP talks exclusively about "RAM". And I think RAM is what we need
> 
> From:
> 
> https://build.opensuse.org/package/view_file/openSUSE:Factory/memory-constraints/memory-constraints.macros?expand=1
> 
> max_swapmem=$(awk '/SwapTotal/ { print $2 }' /proc/meminfo) \
> max_jobs="$((($max_physmem + $max_swapmem) / ($mem_per_process * 1000)))" \

Oops. Yeah, I don't think this implementation much sense ;(

> >to look at: even if there is bountiful swap, the build would be quite
> >slow if it was used to any significant degree. So we're probably
> >better of limiting parallelism rather than using all that swap.
> 
> I agree.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


NeuroFedora package review swap: python-lfpykit

2021-06-30 Thread Ankur Sinha

Hi folks,

One of our NeuroFedora packages has added a new dep in its new version,
which FTBFS as a result. Would someone like to swap reviews please?


1976640 – Review Request: python-lfpykit - Electrostatic models for
multicompartment neuron models

https://bugzilla.redhat.com/show_bug.cgi?id=1976640

Unofficial reviews from folks looking to practice their reviewing skills
(to get sponsored to the package maintainer group perhaps) are most
welcome.

-- 
Thanks,
Regards,
Ankur Sinha "FranciscoD" (He / Him / His) | 
https://fedoraproject.org/wiki/User:Ankursinha
Time zone: Europe/London


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Filtered Flathub Applications (System-Wide Change proposal)

2021-06-30 Thread Vitaly Zaitsev via devel

On 30/06/2021 12:57, Miro Hrončok wrote:

Similar situation as with the Fedora Project, I must say.


Yes. Fedora's infra belongs to Red Hat, Inc.

--
Sincerely,
  Vitaly Zaitsev (vit...@easycoding.org)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Filtered Flathub Applications (System-Wide Change proposal)

2021-06-30 Thread Miro Hrončok

On 30. 06. 21 12:41, Vitaly Zaitsev via devel wrote:
I don't trust Flathub at all, because they don't want to register a non-profit 
organization. They can easily sell their business like FreeNode did recently.


Similar situation as with the Fedora Project, I must say.

--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Third-party Software Mechanism (System-Wide Change proposal)

2021-06-30 Thread Miroslav Suchý

Dne 29. 06. 21 v 22:24 Ben Cotton napsal(a):

''Note that this proposal is about a change to how third-party
repositories are enabled, not about including anything new in
Fedora.'


I completely missed the "Third party repos" thing. I had to google it. To save 
you some time:

  https://fedoramagazine.org/third-party-repositories-fedora/

Miroslav
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Third-party Software Mechanism (System-Wide Change proposal)

2021-06-30 Thread Lars Seipel

On Tue, Jun 29, 2021 at 04:24:58PM -0400, Ben Cotton wrote:

* We add a new page to GNOME Initial Setup that asks a single
question, *along the lines of*:
'''Enable Third Party Software repositories?''' 
☑ Access additional software from selected third party sources. Some
of this software is proprietary and therefore has restrictions on use,
sharing, and access to source code. 
[Find out 
more...](https://fedoraproject.org/wiki/Workstation/Third_Party_Software_Repositories)
* If the user leaves the box checked, GNOME Initial setup runs
`fedora-third-party enable`.


Leaves the box checked? Either I'm misunderstanding or this contradicts
the remaining text which talks about "opt-in".
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Memory Constraints macros for RPM (System-Wide Change proposal)

2021-06-30 Thread Miroslav Suchý

Dne 30. 06. 21 v 12:29 Zbigniew Jędrzejewski-Szmek napsal(a):

The OP talks exclusively about "RAM". And I think RAM is what we need


From:

https://build.opensuse.org/package/view_file/openSUSE:Factory/memory-constraints/memory-constraints.macros?expand=1

max_swapmem=$(awk '/SwapTotal/ { print $2 }' /proc/meminfo) \
max_jobs="$((($max_physmem + $max_swapmem) / ($mem_per_process * 1000)))" \


to look at: even if there is bountiful swap, the build would be quite
slow if it was used to any significant degree. So we're probably
better of limiting parallelism rather than using all that swap.


I agree.

Miroslav
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


rubygem-websocket-driver package license change

2021-06-30 Thread Pavel Valena
Hello,

License changed from "MIT" to "ASL 2.0" for rubygem-websocket-driver package.

Pavel
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Filtered Flathub Applications (System-Wide Change proposal)

2021-06-30 Thread Vitaly Zaitsev via devel

On 29/06/2021 22:25, Ben Cotton wrote:

Enabling third-party repositories will now create a Flathub remote
that is a filtered view of Flathub.


I don't trust Flathub at all, because they don't want to register a 
non-profit organization. They can easily sell their business like 
FreeNode did recently.


Flathub relies on upstreams, not professional maintainers. Most of 
upstream developers don't know how to package software properly. They 
bundle lots of libraries, don't use C/C++ build hardening flags, etc.


A lot of applications from Flathub uses --filesystem=host or 
--filesystem=home, which means they don't use Flatpak isolation at all.


Due to the bundling of a large number of libraries, some applications 
have critical vulnerabilities with assigned CVE numbers: CVE-2020-12284, 
CVE-2019-17498, CVE-2018-11235, CVE-2018-17456, CVE-2017-9780.



Roughly speaking, the criteria for including software is a) will not
cause legal or other problems for Fedora to point to b) does not
overlap Fedora Flatpaks or software in Fedora that could easily be
made into a Flatpak c) works reasonably well.


Should be added also:

d) doesn't exists in Fedora RPM repositories.


Fedora users who opt-in to third-party software repositories will have
immediate access to more software out-of-the-box.



Fedora Silverblue must have its own Flatpaks and do not rely on 
third-party repositories.


--
Sincerely,
  Vitaly Zaitsev (vit...@easycoding.org)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1977713] New: perl-Data-Dumper-2.182 is available

2021-06-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1977713

Bug ID: 1977713
   Summary: perl-Data-Dumper-2.182 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Data-Dumper
  Keywords: FutureFeature, Triaged
  Assignee: jples...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: jples...@redhat.com, mspa...@redhat.com,
perl-devel@lists.fedoraproject.org, ppi...@redhat.com
  Target Milestone: ---
Classification: Fedora



Latest upstream release: 2.182
Current version/release in rawhide: 2.181-1.fc35
URL: http://search.cpan.org/dist/Data-Dumper/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/2760/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Memory Constraints macros for RPM (System-Wide Change proposal)

2021-06-30 Thread Zbigniew Jędrzejewski-Szmek
On Wed, Jun 30, 2021 at 12:08:44PM +0200, Miroslav Suchý wrote:
> Dne 29. 06. 21 v 22:25 Ben Cotton napsal(a):
> >When this proposal is implemented, they can instead declaratively
> >specify the amount of RAM needed per build thread, e.g.
> >
> >   %limit_build -m 8192
> >
> >for declaring a build thread should be allocated 8GB of RAM.
> 
> Do I understand it correctly that semantics will be: One process
> will consume 8GB ram. And because we have only 16 GB RAM on this
> host we will limit smp flag to 2 despite having 4 cores. Right?
> 
> FYI Copr utilize heavily tmpfs plugin
> 
> http://miroslav.suchy.cz/blog/archives/2015/05/28/increase_mock_performance_-_build_packages_in_memory/index.html
> 
> we have ~100 GB swap which we use for tmpfs.
> 
> This can provide misleading numbers for SwapTotal.

The OP talks exclusively about "RAM". And I think RAM is what we need
to look at: even if there is bountiful swap, the build would be quite
slow if it was used to any significant degree. So we're probably
better of limiting parallelism rather than using all that swap.

(Note that this proposal is about limiting parallelism, i.e. tweaking
an optimization. If instead the macro was about "what are the minimum
memory reqs below which we will reject a build", the rules would be
completely different and we should include swap in the calculation,
because it's better to build slowly than not at all.)

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Memory Constraints macros for RPM (System-Wide Change proposal)

2021-06-30 Thread Miroslav Suchý

Dne 29. 06. 21 v 22:25 Ben Cotton napsal(a):

When this proposal is implemented, they can instead declaratively
specify the amount of RAM needed per build thread, e.g.

   %limit_build -m 8192

for declaring a build thread should be allocated 8GB of RAM.


Do I understand it correctly that semantics will be: One process will consume 8GB ram. And because we have only 16 GB 
RAM on this host we will limit smp flag to 2 despite having 4 cores. Right?


FYI Copr utilize heavily tmpfs plugin

http://miroslav.suchy.cz/blog/archives/2015/05/28/increase_mock_performance_-_build_packages_in_memory/index.html

we have ~100 GB swap which we use for tmpfs.

This can provide misleading numbers for SwapTotal.

Miroslav
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-30 Thread Alexander Sosedkin
On Tue, Jun 29, 2021 at 3:38 PM Tomas Tomecek  wrote:
> * Can you imagine maintaining Fedora's 30k+ packages in a single repo?
> Without some git-fetch magic it would be unbearable to perform a
> git-pull.

I cannot imagine *not* doing this, maintaining a distro
and preserving any sanity in the process.
I cannot imagine having all your updates based on a moving target.
I cannot imagine why have side-tags,
why decouple building from committing,
why make mass-rebuilds a big thing instead of a topical branch they are and
why make composes a big thing
and not just a commit in a repo of 'the state of Fedora'.

Composing this email takes about the same time (3m)
as cloning [1], the second largest package collection on repology, at
full depth.
The tip of it, which the users actually need to download when they update,
weights <25M. --depth=1 clone takes 10 seconds.

[1] time git clone g...@github.com:NixOS/nixpkgs
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: List of long term FTBFS packages to be retired in August

2021-06-30 Thread Zbigniew Jędrzejewski-Szmek
On Wed, Jun 30, 2021 at 01:36:40AM +0200, Miro Hrončok wrote:
> On 30. 06. 21 1:32, Miro Hrončok wrote:
> >Dear maintainers.
> >
> >Based on the current fail to build from source policy, the following packages
> >will be retired from Fedora 35 approximately one week before
> >branching (August 2021).
> >
> >Policy: 
> >https://docs.fedoraproject.org/en-US/fesco/Fails_to_build_from_source_Fails_to_install/
> >
> >
> >The packages in rawhide were not successfully built at least since Fedora 32.
> >
> >This report is based on dist tags.
> >
> >Packages collected via:
> >https://github.com/hroncok/fedora-report-ftbfs-retirements/blob/master/ftbfs-retirements.ipynb
> >
> >
> >If you see a package that was built, please let me know.
> >If you see a package that should be exempted from the process,
> >please let me know and we can work together to get a FESCo
> >approval for that.
> >
> >If you see a package that can be rebuilt, please do so.
> >
> >     Package  (co)maintainers   Latest 
> > build
> >
> >cardpeek  kalev    Fedora 32
> 
> Has ASSIGNED bugzillas since Fedora 33:
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=1863309
> https://bugzilla.redhat.com/show_bug.cgi?id=1923409
> 
> >percona-xtrabackup    slaanesh, slankes    Fedora 32
> 
> Has a MODIFIED bugzilla since Fedora 33:
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=1865206
> 
> >php-opencloud-openstack   lcts Fedora 32
> 
> Has CLOSED (but not fixed) and NEW bugzillas since Fedora 33:
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=1865221
> https://bugzilla.redhat.com/show_bug.cgi?id=1923428
> https://bugzilla.redhat.com/show_bug.cgi?id=1977297
> 
> >proxyfuzz psklenar Fedora 32
> 
> Had no bugzillas because it failed to build even the SRPM.
> I've opened one quite recently:
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=1974327
> 
> >radamsa   huzaifas, mrniranjan Fedora 32
>
> Has no bugzillas, the mass rebuilds builds never finished (they hang for days)

It'd be sad to lose radamsa from the distro. I pushed a snapshot build.

> >sugar-view-slides callkalpa, chimosky, pbrobinson, Fedora 31
> >   tuxbrewr
> 
> Fails to install, fails to build since Fedora 32, was exempted from
> this policy last time with a promise of a fix.
> 
> Has many bugzillas 
> https://bugzilla.redhat.com/buglist.cgi?component=sugar-view-slides=Fedora
> 
> >zram  pbrobinson   Fedora 32
> 
> This might not actually be a FTBFS, but simply a package that has
> not been built in 1.5 years.
> It has a noautobuild file with:
> 
> > it's a couple of bash scripts, no need for rebuilds
> 
> I tend to disagree with that statement. The rebuilds are useful for:
> 
>  - new possible dependency generators
>  - new possible buildroot policy scripts
>  - new RPM/buildsystem features (compression, content signatures, etc.)
> 
> I think it's worth rebuilding it at least once in a year.

It's a case of "save a little bit of work for the machine by
generating more work for the humans" ;)
Yeah, a bad trade-off.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Cloud-34-20210630.0 compose check report

2021-06-30 Thread Fedora compose checker
No missing expected images.

Soft failed openQA tests: 1/8 (x86_64), 1/8 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Cloud-34-20210629.0):

ID: 919343  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/919343
ID: 919351  Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/919351

Passed openQA tests: 7/8 (x86_64), 7/8 (aarch64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Memory Constraints macros for RPM (System-Wide Change proposal)

2021-06-30 Thread Zbigniew Jędrzejewski-Szmek
On Tue, Jun 29, 2021 at 04:25:13PM -0400, Ben Cotton wrote:
> https://fedoraproject.org/wiki/Changes/MemoryConstraintsMacros
> 
> == Summary ==
> Introduce macros, similar to openSUSE's
> [https://build.opensuse.org/package/show/openSUSE:Factory/memory-constraints
> memory-constraints]), for optionally limiting build parallelism for
> build-time memory-bound packages
> 
> == Owner ==
> * Name: [[User:salimma|Michel Alexandre Salim]]
> * Email: michel AT michel-slm DOT name
> 
> 
> == Detailed Description ==
> Some source packages have a memory usage per build thread higher than
> the RAM:CPU ratio available in some of our builders. Further, this
> ratio can be different for different build server on different
> architectures.
> 
> At the moment, such packages
> ([https://src.fedoraproject.org/rpms/ceph/blob/d7454e4e0a98208dc569553b901a49733beff6b3/f/ceph.spec#_1269-1390
> ceph], 
> [https://src.fedoraproject.org/rpms/chromium/blob/baaf27b384295d6288ef367dd108ce9874543f2d/f/chromium.spec#_3-14
> chromium], 
> [https://src.fedoraproject.org/rpms/mcrouter/blob/a0f7ecad2ccc51c4214646b082358745c7882c86/f/mcrouter.spec#_68-82
> mcrouter]) have to implement their own logic for determining the safe
> amount of parallelism, and redefine `_smp_build_ncpus`.
> 
> When this proposal is implemented, they can instead declaratively
> specify the amount of RAM needed per build thread, e.g.
> 
>   %limit_build -m 8192
> 
> for declaring a build thread should be allocated 8GB of RAM.
> 
> Since Koji supports
> [https://docs.pagure.org/koji/release_notes/release_notes_1.18/#system-changes
> setting default values for macros], there will be a macro for the
> default memory limit (name TBD) that, if set, will be used to cap
> `_smp_build_ncpus` unless overridden by `%limit_build -m`.

Is the default required? Wouldn't it be enough to make '%limit_build -m 8192'
*lower* _smp_build_ncpus if it detects that not enough memory is present?
I.e. keep status quo by default, optionally lower (and only lower) 
_smp_build_ncpus
when '%limit_build -m …' is used?

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-30 Thread Zbigniew Jędrzejewski-Szmek
On Tue, Jun 29, 2021 at 03:13:10PM +0200, Tomas Tomecek wrote:
> On Thu, Jun 24, 2021 at 8:09 PM Zbigniew Jędrzejewski-Szmek
>  wrote:
> >
> > On Thu, Jun 24, 2021 at 03:48:54PM +0200, Tomas Tomecek wrote:
> > > On Thu, Jun 24, 2021 at 12:41 PM Miro Hrončok  wrote:
> > > >
> > > > On 24. 06. 21 11:16, Tomas Tomecek wrote:
> > > > > ## Choosing git forge to host source-git repositories
> > > > > We need to find a home for all the source-git repositories. This is
> > > > > actually a really hard task because we have many options (github.com,
> > > > > gitlab.com, pagure.io, src.fedoraproject.org, something custom or
> > > > > on-premise) and different expectations: some projects already have
> > > > > repos set up on different platforms while Pagure is the primary forge
> > > > > now. Since the CPE team is investigating GitLab as a forge, it's even
> > > > > harder for us to figure out the primary forge. We may end up
> > > > > supporting both actually: pagure.io and gitlab.com. What are your
> > > > > thoughts on this topic? Would you prefer pagure.io or gitlab.com
> > > > > More info:
> > > > > * https://pagure.io/fedora-source-git/sig/issue/1
> > > > > * https://pagure.io/fedora-source-git/sig/issue/7
> > > >
> > > > I would expect that since the soruce git is just an intermediate thing,
> > > > supporting "any forge" is nice to have, but hard. I'd start with some 
> > > > common
> > > > options (Pagure + 1 other) and see where you'll get.
> > >
> > > Yep, that's exactly what I'd like us to do. As soon as we have the
> > > service which accepts processes events up and running, it shouldn't be
> > > that hard to teach it new fedora-messaging messages or webhook
> > > payloads.
> > >
> > > > > ## High-level workflow proposal up for review
> > > > > Hunor proposed a high-level workflow linked below and I strongly
> > > > > recommend reading it. We have also started discussing many details in
> > > > > the process, such as getting archives: should we generate one from the
> > > > > source-git repo or use the official release archive from upstream?
> > > >
> > > > One thing to consider is that the upstream tarballs might be 
> > > > cryptographically
> > > > signed and packages should verify the signature in %prep.
> > >
> > > This is a very good point - in such a case, we should always pull the
> > > official upstream tarball instead of generating a new one downstream.
> >
> > Hmm, but how would that work? I thought that the whole point of
> > source-git is to build from a commit that contains some upstream
> > version + downstream patches + downstream distro config like the spec file,
> > and that the build step of applying downstream patches just doesn't exist.
> > If you reuse the upstream tarball, then by necessity those downstream
> > patches need to be serialized and applied on top like in dist-git. So
> > you lose the property that the checkout from version control is *the*
> > source you build, but you also lose the property that the source you
> > build is what was signed (since patches are applied).
> 
> What you just described I understand as an (upstream) maintenance
> branch and is not what we call source-git.

It's an "upstream maintenance branch" PLUS the .spec bits that specify
how to build a package.

> Our definition of source-git is:
> * upstream release tarball
> * downstream code changes applied as patches during %prep
> * additional configs for sake of building and testing

But that describes dist-git *exactly*. Where is the difference?

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Rebase firewalld to upstream v1.0.0 (System-Wide Change proposal)

2021-06-30 Thread Zbigniew Jędrzejewski-Szmek
On Mon, Jun 28, 2021 at 12:57:46PM -0400, Ben Cotton wrote:
> https://fedoraproject.org/wiki/Changes/firewalld-1.0.0
> 
> == Summary ==
> Firewalld upstream is about to release v1.0.0. As indicated by the
> major version bump this includes behavioral changes.

A major new version sounds good… New features look nice…

but can can we please stop using the term "rebase"?
The Change page is directed at the wider community, and
"package rebase" is an obscure packaging term that is likely just
confusing to users. Also, it doesn't really make sense anymore, for
a great majority of packages, because we don't have dozens of patches
and non-upstreamable tweaks in most packages. So there is no "rebase"
in the update. And we have an "upstream first" policy too, so there
is no need to underline the fact that it's an "upstream version".
There is and should not be any other version. Just say:

   Update firewalld to version 1.0.0



Zbyszek




> 
> == Owner ==
> * Name: [[User:erig0| Eric Garver]]
> * Email: egar...@redhat.com
> 
> 
> == Detailed Description ==
> Firewalld v1.0.0 includes breaking changes meant to improve the
> overall health of the project. The majority of the changes are
> centered around improving and strengthening the zone concept. All
> breaking changes are detailed in depth in the
> [https://firewalld.org/2021/06/the-upcoming-1-0-0 upstream blog].
> 
> Major changes:
> 
> * Reduced dependencies
> * Intra-zone forwarding by default
> * NAT rules moved to inet family (reduced rule set)
> * Default target is now similar to reject
> * ICMP blocks and block inversion only apply to input, not forward
> * tftp-client service has been removed
> * iptables backend is deprecated
> * Direct interface is deprecated
> * CleanupModulesOnExit defaults to no (kernel modules not unloaded)
> 
> 
> == Benefit to Fedora ==
> The major benefit to Fedora is more predictability in the stock
> firewall. In particular, "Default target is now similar to reject"
> addresses many subtle issues encountered by users. "NAT rules moved to
> inet family" also significantly reduces the rule set size for users of
> `ipset`s.
> 
> == Scope ==
> * Proposal owners: Changes are isolated to firewalld, but given
> firewalld is core a System Wide Change is being filed.
> * Other developers: None. Isolated change.
> 
> * Release engineering:
> * Policies and guidelines: N/A (not needed for this Change)
> * Trademark approval: N/A (not needed for this Change)
> * Alignment with Objectives:
> 
> 
> == Upgrade/compatibility impact ==
> * Most configurations will migrate. No intervention required.
> ** Exceptions
> *** configurations that utilize `tftp-client` service will have
> firewalld start in `failed` state because the service has been
> removed. As noted in the upstream blog this service has ''never''
> worked properly.
> * Zones that users have not modified will now have intra-zone
> forwarding enabled.
> ** for this to occur the user must ''not'' have added an interface,
> service, port, etc. to the zone
> ** minimal concern because this also means the zone was not in use,
> the exception being an unmodified default zone, e.g.
> `FedoraWorkstation`
> 
> == How To Test ==
> Testing for this rebase should revolve around integrations.
> 
> * libvirt
> ** verify VMs still have network access
> * podman
> ** verify containers still have network access
> ** verify forwarding ports via podman still works
> * NetworkManager
> ** verify connection sharing still works
> 
> == User Experience ==
> N/A
> 
> == Dependencies ==
> firewalld has yet to release v1.0.0. It is expected in early July.
> 
> == Contingency Plan ==
> * Contingency mechanism: revert package to v0.9.z (what f34 uses)
> * Contingency deadline: July 27, 2021
> * Blocks release? No
> 
> == Documentation ==
> https://firewalld.org/2021/06/the-upcoming-1-0-0
> 
> == Release Notes ==
> firewalld has been rebased to v1.0.0. This includes some breaking
> changes that may affect users.
> 
> Major changes:
> 
> * Reduced dependencies
> * Intra-zone forwarding by default
> * NAT rules moved to inet family (reduced rule set)
> * Default target is now similar to reject
> * ICMP blocks and block inversion only apply to input, not forward
> * tftp-client service has been removed
> * iptables backend is deprecated
> * Direct interface is deprecated
> * CleanupModulesOnExit defaults to no (kernel modules not unloaded)
> 
> Full details on the upstream blog:
> https://firewalld.org/2021/06/the-upcoming-1-0-0
> 
> 
> -- 
> Ben Cotton
> He / Him / His
> Fedora Program Manager
> Red Hat
> TZ=America/Indiana/Indianapolis
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> 

Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-30 Thread Leigh Griffin
This is a super update report, thanks for sharing

CPE have activated an open source license for Gitlab to trial out some of
the workflows and features. This is their top level SaaS offering which
they grant to all open source projects so it has all the features we would
need for testing.

Stephen (on CC) and I have admin access. I'd love to grant folks in the SIG
access, if someone can ping me a list of emails that are associated with a
gitlab.com account (you need to register!) I can make that happen.

Leigh

On Thu 24 Jun 2021, 10:17 Tomas Tomecek,  wrote:

> Greetings from the Fedora source-git SIG! We are planning to start
> publishing reports of what we are working on so everyone can easily
> pay attention and get involved if interested. If you have any ideas,
> comments or requests, don’t be shy and let us know :)
>
> Here’s a short list of things which we are working on.
>
> ## Choosing git forge to host source-git repositories
> We need to find a home for all the source-git repositories. This is
> actually a really hard task because we have many options (github.com,
> gitlab.com, pagure.io, src.fedoraproject.org, something custom or
> on-premise) and different expectations: some projects already have
> repos set up on different platforms while Pagure is the primary forge
> now. Since the CPE team is investigating GitLab as a forge, it's even
> harder for us to figure out the primary forge. We may end up
> supporting both actually: pagure.io and gitlab.com. What are your
> thoughts on this topic? Would you prefer pagure.io or gitlab.com
> More info:
> * https://pagure.io/fedora-source-git/sig/issue/1
> * https://pagure.io/fedora-source-git/sig/issue/7
>
> ## High-level workflow proposal up for review
> Hunor proposed a high-level workflow linked below and I strongly
> recommend reading it. We have also started discussing many details in
> the process, such as getting archives: should we generate one from the
> source-git repo or use the official release archive from upstream?
>
> Another big topic in terms of workflows are rebases (= updates to the
> latest upstream release, which are very common in Rawhide). Rebases
> are straightforward in dist-git, but when your source-git repo has
> complete upstream git history, they are no longer trivial, especially
> if one wants to get a review of a rebase.
>
> More info:
> * https://pagure.io/fedora-source-git/sig/issue/2
> * Workflow proposal:
> https://pagure.io/fedora-source-git/docs/pull-request/2
> *
> https://pagure.io/fedora-source-git/docs/blob/main/f/resources/CommitRules.pdf
> * https://pagure.io/fedora-source-git/sig/issue/8
>
> ## Tooling
> Packit is the tooling which will be used to work with source-git
> repos. No surprise there I assume :D
> * https://packit.dev/
>
> We've done a lot of work here lately, mainly to polish the process of
> creating source-git repos and doing updates of dist-git repositories
> based on the source-git content.
> * https://packit.dev/docs/source-git/work-with-source-git/
> * https://github.com/packit/packit/releases
>
> ## Interested?
> We meet biweekly on Wednesdays via gmeet, 2:30 - 3:30 UTC, next one is
> scheduled for July 7th.
> * https://calendar.fedoraproject.org/SIGs/2021/7/5/#m9982
>
> Everyone is welcome to join the SIG or provide any feedback on the
> issues and PRs above.
>
> You can always find the latest information over here:
> * https://fedoraproject.org/wiki/SIGs/Source-git
> * https://pagure.io/fedora-source-git/sig/issues
>
> I'd like to thank all the SIG members for being so active, so happy to
> work with all of you!
>
> Cheers,
> Tomas
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it:
> https://pagure.io/fedora-infrastructure
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[389-devel] Please Review: 4817 crypt pw bypass

2021-06-30 Thread William Brown
https://github.com/389ds/389-ds-base/pull/4819


--
Sincerely,

William Brown

Senior Software Engineer, Identity and Access Management
SUSE Labs, Australia
___
389-devel mailing list -- 389-devel@lists.fedoraproject.org
To unsubscribe send an email to 389-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/389-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Need assistance to build Blender

2021-06-30 Thread Luya Tshimbalanga
It seems working on aarch64 version of Fedora 32 and 33 which lacks usd 
dependency.


https://copr.fedorainfracloud.org/coprs/luya/blender-egl/build/2305553/

Maybe usd needs some trimming.

On 2021-06-24 10:04 a.m., Benjamin Beasley wrote:

The “pyconfig.h” header lives in a python-version-specific subdirectory. Some 
of the compiler invocations earlier in the build log contain 
“-I/usr/include/python3.10”, but the one that is failing does not.

I haven’t tried it, but I would guess that something like the following would 
resolve the problem. The libraries may or may not be necessary—I didn’t take 
time to investigate.

--- blender-2.93.0-original/source/blender/io/usd/CMakeLists.txt
2021-04-21 10:23:41.0 -0400
+++ blender-2.93.0/source/blender/io/usd/CMakeLists.txt 2021-06-24 
13:02:05.568490263 -0400
@@ -53,6 +53,7 @@
${USD_INCLUDE_DIRS}
${BOOST_INCLUDE_DIR}
${TBB_INCLUDE_DIR}
+  ${PYTHON_INCLUDE_DIRS}
  )
  
  set(SRC

@@ -86,6 +87,8 @@
  
  list(APPEND LIB

${BOOST_LIBRARIES}
+  ${PYTHON_LINKFLAGS}
+  ${PYTHON_LIBRARIES}
  )
  
  list(APPEND LIB

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


--
Luya Tshimbalanga
Fedora Design Team
Fedora Design Suite maintainer
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Cloud-33-20210630.0 compose check report

2021-06-30 Thread Fedora compose checker
No missing expected images.

Soft failed openQA tests: 1/8 (x86_64), 1/8 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Cloud-33-20210629.0):

ID: 919327  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/919327
ID: 919335  Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/919335

Passed openQA tests: 7/8 (x86_64), 7/8 (aarch64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1977590] New: perl-Inline-Python-0.56-16.fc35 FTBFS: all tests fail: Parse errors: Bad plan

2021-06-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1977590

Bug ID: 1977590
   Summary: perl-Inline-Python-0.56-16.fc35 FTBFS: all tests fail:
Parse errors: Bad plan
   Product: Fedora
   Version: rawhide
   URL: https://koschei.fedoraproject.org/package/perl-Inline-
Python?collection=f35
Status: NEW
 Component: perl-Inline-Python
  Assignee: j.k.nil...@usit.uio.no
  Reporter: ppi...@redhat.com
QA Contact: extras...@fedoraproject.org
CC: j.k.nil...@usit.uio.no,
perl-devel@lists.fedoraproject.org
Blocks: 1927309 (F35FTBFS,RAWHIDEFTBFS)
  Target Milestone: ---
Classification: Fedora



perl-Inline-Python-0.56-16.fc35 fails to build in Fedora 35 bacause all tests
file like this:

+ /usr/bin/perl Makefile.PL INSTALLDIRS=vendor 'OPTIMIZE=-O2 -flto=auto
-ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall
-Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS
-specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong
-specs=/usr/lib/rpm/redhat/redhat-annobin-cc1  -mbranch-protection=standard
-fasynchronous-unwind-tables -fstack-clash-protection' NO_PACKLIST=1
Found these python executables on your PATH:
1. /usr/bin/python3
Using the only python executable I could find
Set the INLINE_PYTHON_EXECUTABLE environment variable to the full path to your
python executable to override this selection.
Using /usr/bin/python3
:1: DeprecationWarning: The distutils package is deprecated and slated
for removal in Python 3.12. Use setuptools or check PEP 632 for potential
alternatives
:1: DeprecationWarning: The distutils.sysconfig module is deprecated,
use sysconfig instead
:1: DeprecationWarning: The distutils package is deprecated and slated
for removal in Python 3.12. Use setuptools or check PEP 632 for potential
alternatives
:1: DeprecationWarning: The distutils.sysconfig module is deprecated,
use sysconfig instead
:1: DeprecationWarning: The distutils package is deprecated and slated
for removal in Python 3.12. Use setuptools or check PEP 632 for potential
alternatives
:1: DeprecationWarning: The distutils.sysconfig module is deprecated,
use sysconfig instead
:1: DeprecationWarning: The distutils package is deprecated and slated
for removal in Python 3.12. Use setuptools or check PEP 632 for potential
alternatives
:1: DeprecationWarning: The distutils.sysconfig module is deprecated,
use sysconfig instead
:1: DeprecationWarning: The distutils package is deprecated and slated
for removal in Python 3.12. Use setuptools or check PEP 632 for potential
alternatives
:1: DeprecationWarning: The distutils.sysconfig module is deprecated,
use sysconfig instead
This python's configuration files are messed up. You'll have have to
answer the questions yourself. Here is what Python said:
   Extra Libs:  -lcrypt -ldl  -lutil -lm
   Python Library: 
/usr/lib64/python3.10/config-3.10-aarch64-linux-gnu/libpython3.10.a
   Include Path:/usr/include/python3.10
1. LIBS option. I need to know what extra libraries, if any,  
   are required by this build of python. I recommend this:
   -lcrypt -ldl  -lutil -lm
Enter extra libraries (e.g. -lfoo -lbar) [-lcrypt -ldl  -lutil -lm] -lcrypt
-ldl  -lutil -lm
2. LIBRARY option. The location of the python library. 
   Inline::Python needs to link against it to use Python.
Here are the libraries I know about:
   1) /usr/lib64/libpython3.10.so
   2) /usr/lib64/libpython3.so
Which? Or enter another. [1] 1
3. INCLUDE option. The location of the python include files.
   Inline::Python needs these to compile.
Here are the locations I know about:
   1) /usr/include/python3.10
Which? Or enter another. [1] 1
Using These Settings:
   Extra Libs:  -lcrypt -ldl  -lutil -lm
   Python Lib:  -L/usr/lib64 -lpython3.10
   Includes:-I/usr/include/python3.10
   Extra Flags: none (perl Makefile.PL --help for details)
[...]
+ make test
"/usr/bin/perl" -MExtUtils::Command::MM -e 'cp_nonempty' -- Python.bs
blib/arch/auto/Inline/Python/Python.bs 644
PERL_DL_NONLAZY=1 "/usr/bin/perl" "-MExtUtils::Command::MM" "-MTest::Harness"
"-e" "undef *Test::Harness::Switches; test_harness(0, 'blib/lib', 'blib/arch')"
t/*.t
t/00init.t  ok
Failed to autogenerate
/builddir/build/BUILD/Inline-Python-0.56/blib_test/config-aarch64-linux-thread-multi-5.034000.
 at t/01testpl.t line 6.
BEGIN failed--compilation aborted at t/01testpl.t line 6.
t/01testpl.t .. 
Dubious, test returned 255 (wstat 65280, 0xff00)
[...]
Test Summary Report
---
t/01testpl.t(Wstat: 65280 Tests: 0 Failed: 0)
  Non-zero exit status: 255
  Parse errors: Bad plan.  You planned 8 tests but ran 0.
[...]

A difference between passing and failing build root is at

Re: F35 Change: Golang 1.17 (System-Wide Change proposal)

2021-06-30 Thread Alejandro Saez Morollon
For context:
https://groups.google.com/g/golang-dev/c/hGwvCceDr14/m/wbyNWwgNBgAJ


On Tue, Jun 29, 2021 at 9:02 PM Alejandro Sáez Morollón  wrote:
>
> According to upstream, they are not going to deprecate GOPATH yet in this 
> version.
>
> I built etcd with 1.17beta1 and everything went fine.
>
> > On 29 Jun 2021, at 20:42, Robert-André Mauchin  wrote:
> >
> > On 6/28/21 6:57 PM, Ben Cotton wrote:
> >> https://fedoraproject.org/wiki/Changes/golang1.17
> >> == Summary ==
> >> Rebase of Golang package to upcoming version 1.17 in Fedora 35,
> >> including the rebuild of all dependent packages(the pre-release
> >> version of Go will be used for the rebuild if released version will
> >> not be available at the time of the mass rebuild).
> >> == Owner ==
> >> * Name: [[User:alexsaezm| Alejandro Sáez Morollón]], [[User:Jcajka|
> >> Jakub Čajka]]
> >> * Email: a...@redhat.com, jca...@redhat.com
> >
> > Won't we have a problem since 1.17 is deprecating the gopath way to use Go 
> > modules instead. We didn't manage to port our macros to Go modules due to 
> > Nicolas Mailhot being MIA since last year, and even if we manage that, I 
> > personally won't have the time to rebuild the entire ecosystem. I'm already 
> > have problems dealing with all the updates, while taking care of the 
> > Package Reviews too.
> > Won't this break our entire Go ecosystem?
> >
> > Best regards,
> >
> > Robert-André
> > ___
> > devel mailing list -- devel@lists.fedoraproject.org
> > To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> > Fedora Code of Conduct: 
> > https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> > List Archives: 
> > https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> > Do not reply to spam on the list, report it: 
> > https://pagure.io/fedora-infrastructure
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[389-devel] 389 DS nightly 2021-06-30 - 95% PASS

2021-06-30 Thread vashirov
https://fedorapeople.org/groups/389ds/ci/nightly/2021/06/30/report-389-ds-base-2.0.6-20210630git6b10f1795.fc34.x86_64.html
___
389-devel mailing list -- 389-devel@lists.fedoraproject.org
To unsubscribe send an email to 389-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/389-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure