Re: rpm bug for multiple README.md or LICENSE.md in EPEL 8 and Fedora

2021-12-04 Thread Nico Kadel-Garcia
On Sun, Dec 5, 2021 at 1:49 AM Otto Urpelainen  wrote:
>
> Nico Kadel-Garcia kirjoitti 5.12.2021 klo 5.07:
> > I've been trying to bundle the current ansible-5.0.1 release as an RPM
> > for Fedora and EPEL use. Leaving aside the peculiar decisions to
> > replace the pypi.org "ansible" tarball with a tarball of roughly 150
> > modules from the "ansiblee-collections" repos, and moving the actual
> > ansible software to a distinct python tarball called "ansible-core"
> > without changing the source repo or the actual critical installed
> > python modules, the new "ansible" has more than 300 files called
> > "README.md" and more than 100 files called "LICENSE.md".
> >
> > This breaks building RPMs for EPEL 8 or Fedora, because the '%doc' and
> > '%license' macros strip off the subdirectories of the files and
> > install them directly at the top of the docdir.
> >
> > Basicely these only generate one file:
> >
> > %doc README.md
> > %doc dir1/README.md
> > %doc dir2/README.md
> >
> > %license LICENSE.md
> >  %license dir1/LICENSE
> >  %license dir2/LICENSE.md
> >
> > When compiled, these would only produce:
> >
> >/usr/share/doc/package-%{fersion}/README.md
> >/usr/share/doc/package-%{fersion}/LICENSE.md
>
> Path stripping only happens if you list relative paths with %doc or
> %license, which which case rpm looks for them from the build directory.
> If you specify absolute paths, rpm looks for them in the buildroot like
> it does for any other files. See section %doc and %license at rpm spec
> file format reference [1].
>
> So something like this should work:
>
>  %install
>  cp README.md
> %{buildroot}/%{_datadir}/doc/%{package}-%{version}/README.md
>  cp dir1/README.md
> %{buildroot}/%{_datadir}/doc/%{package}-%{version}/dir1/README.md
>  # ...
>
>  %files
>  %doc %{_datadir}/doc/%{package}-%{version}/README.md
>  %doc %{_datadir}/doc/%{package}-%{version}/dir1/README.md
>  # ...
>
> [1]: https://rpm-software-management.github.io/rpm/manual/spec.html
>
> Otto

I'm reading that documentation. It says *nothing* about path
stripping, a behavior which has apparently changed sometime since RHEL
7 or its ancestorFedora 12. So if this is expected behavior, I'd like
to see it documented.

Does anyone know how to turn it off for '%doc' and ''%license'? It
doesn't seem to be in the macros, and diving into the C code to get
this change reverted for a future release of rpm seems like a very
long term goal. It seems to me to be unwelcome and undesirable
behavior for precisely the kind of situation of 'ansible tarball has
more than 300 README.md files'. And given my previous concerns about
that very large bundle, I suspect I'll not have good success getting
the authors to discard it and use a more typical factored python
submodule distribution.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: rust: Request for packaging rust-html-escape and rust-smallbitvec

2021-12-04 Thread Andreas Schneider
On Friday, 3 December 2021 18:40:12 CET Aleksei Bavshin wrote:
> On 12/3/21 03:15, Andreas Schneider wrote:
> 
> > On Thursday, December 2, 2021 9:07:06 PM CET Aleksei Bavshin wrote:
> > 
> >> `smallbitvec` deps are only needed for benchmark, so the test suite is
> >> actually passing without these. Should be safe to drop with metadata
> >> patch.
>>
> >>
> >>
> >> rust-tiny_http 0.8.2 also has a benchmark-only dependency `fdlimit`
> >> which we can drop.
> >>
> >>
> >>
> >> The situation with tree-sitter-cli testsuite is complicated: it requires
> >> a few other github repos with a grammar definitions and who knows what
> >> else. I haven't succeeded in running it so far, so we can keep it turned
> >> off. And that would make `rust-spin` update unnecessary.
> >>
> >>
> >>
> >> The draft packages are available from
> >> https://copr.fedorainfracloud.org/coprs/alebastr/rust-tree-sitter-cli/;
> >> seems working with available grammar files (with exception of
> >> `build-wasm` and `playground` subcommands which require emscripten).
> > 
> > 
> > This is great work, thank you very much. I didn't know that the
> > tree-sitter-
 cli needs it own package and can't be built in the current
> > tree-sitter package. So I will just continue to take care of tree-sitter
> > and just build the lib.
> > 
> > So having tree-sitter-cli in the next fedora version would be awesome.
> 
> 
> Reviews (and PR for rust-tiny_http update) are sent.
> 
> Upstream issue for missing license file: 
> https://github.com/tree-sitter/tree-sitter/issues/1520
> 
> Andreas, do you want to have comaintainer access to the tree-sitter-cli 
> packages?

I can do the co-maintainer if you're interested :-)


Andreas

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: rpm bug for multiple README.md or LICENSE.md in EPEL 8 and Fedora

2021-12-04 Thread Otto Urpelainen

Nico Kadel-Garcia kirjoitti 5.12.2021 klo 5.07:

I've been trying to bundle the current ansible-5.0.1 release as an RPM
for Fedora and EPEL use. Leaving aside the peculiar decisions to
replace the pypi.org "ansible" tarball with a tarball of roughly 150
modules from the "ansiblee-collections" repos, and moving the actual
ansible software to a distinct python tarball called "ansible-core"
without changing the source repo or the actual critical installed
python modules, the new "ansible" has more than 300 files called
"README.md" and more than 100 files called "LICENSE.md".

This breaks building RPMs for EPEL 8 or Fedora, because the '%doc' and
'%license' macros strip off the subdirectories of the files and
install them directly at the top of the docdir.

Basicely these only generate one file:

%doc README.md
%doc dir1/README.md
%doc dir2/README.md

%license LICENSE.md
 %license dir1/LICENSE
 %license dir2/LICENSE.md

When compiled, these would only produce:

   /usr/share/doc/package-%{fersion}/README.md
   /usr/share/doc/package-%{fersion}/LICENSE.md


Path stripping only happens if you list relative paths with %doc or 
%license, which which case rpm looks for them from the build directory. 
If you specify absolute paths, rpm looks for them in the buildroot like 
it does for any other files. See section %doc and %license at rpm spec 
file format reference [1].


So something like this should work:

%install
cp README.md 
%{buildroot}/%{_datadir}/doc/%{package}-%{version}/README.md
cp dir1/README.md 
%{buildroot}/%{_datadir}/doc/%{package}-%{version}/dir1/README.md

# ...

%files
%doc %{_datadir}/doc/%{package}-%{version}/README.md
%doc %{_datadir}/doc/%{package}-%{version}/dir1/README.md
# ...

[1]: https://rpm-software-management.github.io/rpm/manual/spec.html

Otto
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: EPEL 9 branch?

2021-12-04 Thread Kevin Fenzi
On Sun, Dec 05, 2021 at 03:27:49AM +, Gary Buhrmaster wrote:
> Now that CentOS Stream 9 is announced as
> available, is there a schedule for when EPEL-9
> branches can be made, and when one can
> (start to) ask others to build for EPEL-9

yes, yesterday. 

See the announcement: 
https://lists.fedoraproject.org/archives/list/epel-annou...@lists.fedoraproject.org/thread/5UJSW3FBGQMLXWWV7BGHWZTOFLH4NH3G/

> (it would be nice if a number of the EPEL-9
> packages were preliminarily ready at the time
> of the EL-9 formal release (just, perhaps,
> needing a (mass) rebuild to be sure)).

There's no longer any plans to mass rebuild, those packages that need a
rebuild for some reason can be rebuilt by their maintainer(s). 

kevin


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: rpm bug for multiple README.md or LICENSE.md in EPEL 8 and Fedora

2021-12-04 Thread Nico Kadel-Garcia
Aarggh, I had a cat attacking my hands at one moment. I meant:

  /usr/share/doc/%}package}-%{version}/README.md
  /usr/share/doc/%{package}-%{version}/LICENSE.md

On Sat, Dec 4, 2021 at 10:07 PM Nico Kadel-Garcia  wrote:
>
> I've been trying to bundle the current ansible-5.0.1 release as an RPM
> for Fedora and EPEL use. Leaving aside the peculiar decisions to
> replace the pypi.org "ansible" tarball with a tarball of roughly 150
> modules from the "ansiblee-collections" repos, and moving the actual
> ansible software to a distinct python tarball called "ansible-core"
> without changing the source repo or the actual critical installed
> python modules, the new "ansible" has more than 300 files called
> "README.md" and more than 100 files called "LICENSE.md".
>
> This breaks building RPMs for EPEL 8 or Fedora, because the '%doc' and
> '%license' macros strip off the subdirectories of the files and
> install them directly at the top of the docdir.
>
> Basicely these only generate one file:
>
>%doc README.md
>%doc dir1/README.md
>%doc dir2/README.md
>
>%license LICENSE.md
> %license dir1/LICENSE
> %license dir2/LICENSE.md
>
> When compiled, these would only produce:
>
>   /usr/share/doc/package-%{fersion}/README.md
>   /usr/share/doc/package-%{fersion}/LICENSE.md
>
> RHEL 7 didn't have this problem. I'm not sure if other folks have
> noticed this for tools that are built with multiple internal tarballs.
> The new "ansible" tarball is fairly unique ints authors insistance on
> putting more than one hundred distinct third party packages in the
> same master tarball. But for now, this is going to cause a license and
> documentation problem in packaging it due to an "optimization" of
> stripping out the directory names of document files and licenses.
>
> Does anyone know a decent workaround, or a specfile setting to disable
> this filename stripping and restore the RHEL 7 behavior?
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Rawhide-20211204.n.1 compose check report

2021-12-04 Thread Fedora compose checker
No missing expected images.

Compose PASSES proposed Rawhide gating check!
All required tests passed

Failed openQA tests: 6/208 (x86_64), 14/142 (aarch64)

New failures (same test not failed in Fedora-Rawhide-20211203.n.0):

ID: 1077002 Test: x86_64 Server-dvd-iso anaconda_help
URL: https://openqa.fedoraproject.org/tests/1077002
ID: 1077007 Test: x86_64 Server-dvd-iso support_server
URL: https://openqa.fedoraproject.org/tests/1077007
ID: 1077018 Test: x86_64 Server-dvd-iso install_updates_nfs
URL: https://openqa.fedoraproject.org/tests/1077018
ID: 1077141 Test: aarch64 Server-dvd-iso anaconda_help@uefi
URL: https://openqa.fedoraproject.org/tests/1077141
ID: 1077152 Test: aarch64 Server-dvd-iso install_vncconnect_client@uefi
URL: https://openqa.fedoraproject.org/tests/1077152
ID: 1077153 Test: aarch64 Server-dvd-iso install_vncconnect_server@uefi
URL: https://openqa.fedoraproject.org/tests/1077153
ID: 1077174 Test: aarch64 Server-dvd-iso base_selinux@uefi
URL: https://openqa.fedoraproject.org/tests/1077174
ID: 1077180 Test: aarch64 Server-dvd-iso realmd_join_cockpit@uefi
URL: https://openqa.fedoraproject.org/tests/1077180
ID: 1077184 Test: aarch64 Server-dvd-iso realmd_join_sssd@uefi
URL: https://openqa.fedoraproject.org/tests/1077184
ID: 1077221 Test: aarch64 Cloud_Base-qcow2-qcow2 
base_service_manipulation@uefi
URL: https://openqa.fedoraproject.org/tests/1077221
ID: 1077237 Test: x86_64 universal install_blivet_software_raid@uefi
URL: https://openqa.fedoraproject.org/tests/1077237
ID: 1077313 Test: aarch64 universal install_cyrillic_language@uefi
URL: https://openqa.fedoraproject.org/tests/1077313
ID: 1077321 Test: aarch64 universal support_server@uefi
URL: https://openqa.fedoraproject.org/tests/1077321
ID: 1077325 Test: aarch64 universal install_iscsi@uefi
URL: https://openqa.fedoraproject.org/tests/1077325

Old failures (same test failed in Fedora-Rawhide-20211203.n.0):

ID: 1077095 Test: x86_64 KDE-live-iso apps_startstop
URL: https://openqa.fedoraproject.org/tests/1077095
ID: 1077115 Test: x86_64 Silverblue-dvd_ostree-iso release_identification
URL: https://openqa.fedoraproject.org/tests/1077115
ID: 1077179 Test: aarch64 Server-dvd-iso server_cockpit_basic@uefi
URL: https://openqa.fedoraproject.org/tests/1077179
ID: 1077208 Test: aarch64 Workstation-raw_xz-raw.xz gedit@uefi
URL: https://openqa.fedoraproject.org/tests/1077208
ID: 1077213 Test: aarch64 Workstation-raw_xz-raw.xz eog@uefi
URL: https://openqa.fedoraproject.org/tests/1077213
ID: 1077303 Test: aarch64 universal install_asian_language@uefi
URL: https://openqa.fedoraproject.org/tests/1077303

Soft failed openQA tests: 3/142 (aarch64), 7/208 (x86_64)
(Tests completed, but using a workaround for a known bug)

New soft failures (same test not soft failed in Fedora-Rawhide-20211203.n.0):

ID: 1077197 Test: aarch64 Workstation-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/1077197

Old soft failures (same test soft failed in Fedora-Rawhide-20211203.n.0):

ID: 1077069 Test: x86_64 Workstation-live-iso eog
URL: https://openqa.fedoraproject.org/tests/1077069
ID: 1077084 Test: x86_64 Workstation-live-iso gedit
URL: https://openqa.fedoraproject.org/tests/1077084
ID: 1077118 Test: x86_64 Silverblue-dvd_ostree-iso evince
URL: https://openqa.fedoraproject.org/tests/1077118
ID: 1077119 Test: x86_64 Silverblue-dvd_ostree-iso gedit
URL: https://openqa.fedoraproject.org/tests/1077119
ID: 1077120 Test: x86_64 Silverblue-dvd_ostree-iso eog
URL: https://openqa.fedoraproject.org/tests/1077120
ID: 1077130 Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/1077130
ID: 1077222 Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/1077222
ID: 1077269 Test: x86_64 universal upgrade_server_domain_controller
URL: https://openqa.fedoraproject.org/tests/1077269
ID: 1077318 Test: aarch64 universal upgrade_server_domain_controller@uefi
URL: https://openqa.fedoraproject.org/tests/1077318

Passed openQA tests: 195/208 (x86_64), 125/142 (aarch64)

New passes (same test not passed in Fedora-Rawhide-20211203.n.0):

ID: 1077079 Test: x86_64 Workstation-live-iso desktop_login
URL: https://openqa.fedoraproject.org/tests/1077079
ID: 1077199 Test: aarch64 Workstation-raw_xz-raw.xz desktop_printing@uefi
URL: https://openqa.fedoraproject.org/tests/1077199
ID: 1077207 Test: aarch64 Workstation-raw_xz-raw.xz evince@uefi
URL: https://openqa.fedoraproject.org/tests/1077207
ID: 1077214 Test: aarch64 Workstation-raw_xz-raw.xz 
desktop_update_graphical@uefi
URL: https://openqa.fedoraproject.org/tests/1077214
ID: 1077331 Test: aarch64 universal install_european_language@uefi
URL: https://openqa.fedoraproject.org/tests/1077331
ID: 1077332 Test: aarch64 universal install_blivet_lvmthin@uefi
URL: https://o

EPEL 9 branch?

2021-12-04 Thread Gary Buhrmaster
Now that CentOS Stream 9 is announced as
available, is there a schedule for when EPEL-9
branches can be made, and when one can
(start to) ask others to build for EPEL-9
(it would be nice if a number of the EPEL-9
packages were preliminarily ready at the time
of the EL-9 formal release (just, perhaps,
needing a (mass) rebuild to be sure)).

Thanks.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


rpm bug for multiple README.md or LICENSE.md in EPEL 8 and Fedora

2021-12-04 Thread Nico Kadel-Garcia
I've been trying to bundle the current ansible-5.0.1 release as an RPM
for Fedora and EPEL use. Leaving aside the peculiar decisions to
replace the pypi.org "ansible" tarball with a tarball of roughly 150
modules from the "ansiblee-collections" repos, and moving the actual
ansible software to a distinct python tarball called "ansible-core"
without changing the source repo or the actual critical installed
python modules, the new "ansible" has more than 300 files called
"README.md" and more than 100 files called "LICENSE.md".

This breaks building RPMs for EPEL 8 or Fedora, because the '%doc' and
'%license' macros strip off the subdirectories of the files and
install them directly at the top of the docdir.

Basicely these only generate one file:

   %doc README.md
   %doc dir1/README.md
   %doc dir2/README.md

   %license LICENSE.md
%license dir1/LICENSE
%license dir2/LICENSE.md

When compiled, these would only produce:

  /usr/share/doc/package-%{fersion}/README.md
  /usr/share/doc/package-%{fersion}/LICENSE.md

RHEL 7 didn't have this problem. I'm not sure if other folks have
noticed this for tools that are built with multiple internal tarballs.
The new "ansible" tarball is fairly unique ints authors insistance on
putting more than one hundred distinct third party packages in the
same master tarball. But for now, this is going to cause a license and
documentation problem in packaging it due to an "optimization" of
stripping out the directory names of document files and licenses.

Does anyone know a decent workaround, or a specfile setting to disable
this filename stripping and restore the RHEL 7 behavior?
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: I'm assuming this is a temporary build failure?

2021-12-04 Thread Kevin Fenzi
On Sat, Dec 04, 2021 at 04:53:09PM -0500, Neal Becker wrote:
> https://koji.fedoraproject.org/koji/taskinfo?taskID=79571245

Yes. I am not sure whats causing it. I updated and rebooted the
kojipkgs01/02 vm's (to pick up new kernel and also new host qemu). 

if you see it again or more often, feel free to file a infrastructure
ticket. 

kevin


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora rawhide compose report: 20211204.n.1 changes

2021-12-04 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20211203.n.0
NEW: Fedora-Rawhide-20211204.n.1

= SUMMARY =
Added images:0
Dropped images:  0
Added packages:  6
Dropped packages:0
Upgraded packages:   96
Downgraded packages: 0

Size of added packages:  282.40 MiB
Size of dropped packages:0 B
Size of upgraded packages:   6.48 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   -78.71 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =

= DROPPED IMAGES =

= ADDED PACKAGES =
Package: galera-26.4.9-3.module_f36+13475+c5e36fc8
Summary: Synchronous multi-master wsrep provider (replication engine)
RPMs:galera
Size:5.32 MiB

Package: mariadb-3:10.6.5-1.module_f36+13475+c5e36fc8
Summary: A very fast and robust SQL database server
RPMs:mariadb mariadb-backup mariadb-common mariadb-connect-engine 
mariadb-cracklib-password-check mariadb-devel mariadb-embedded 
mariadb-embedded-devel mariadb-errmsg mariadb-gssapi-server 
mariadb-oqgraph-engine mariadb-pam mariadb-rocksdb-engine mariadb-s3-engine 
mariadb-server mariadb-server-galera mariadb-server-utils mariadb-sphinx-engine 
mariadb-test
Size:275.83 MiB

Package: public-inbox-1.7.0-1.fc36
Summary: An archives-first approach to mailing lists
RPMs:lei perl-PublicInbox public-inbox public-inbox-server
Size:667.41 KiB

Package: rust-io-extras-0.12.2-2.fc36
Summary: File/socket handle/descriptor utilities
RPMs:rust-io-extras+async-std-devel rust-io-extras+default-devel 
rust-io-extras+mio-devel rust-io-extras+os_pipe-devel 
rust-io-extras+socket2-devel rust-io-extras+tokio-devel 
rust-io-extras+use_async_std-devel rust-io-extras+use_mio_net-devel 
rust-io-extras+use_mio_os_ext-devel rust-io-extras+use_os_pipe-devel 
rust-io-extras+use_socket2-devel rust-io-extras+use_tokio-devel 
rust-io-extras-devel
Size:124.54 KiB

Package: rust-linux-raw-sys-0.0.36-1.fc36
Summary: Generated bindings for Linux's userspace API
RPMs:rust-linux-raw-sys+default-devel rust-linux-raw-sys+errno-devel 
rust-linux-raw-sys+general-devel rust-linux-raw-sys+netlink-devel 
rust-linux-raw-sys+no_std-devel rust-linux-raw-sys+std-devel 
rust-linux-raw-sys+v2_6_32-devel rust-linux-raw-sys+v3_10-devel 
rust-linux-raw-sys+v3_2-devel rust-linux-raw-sys+v4_2-devel 
rust-linux-raw-sys+v4_20-devel rust-linux-raw-sys+v4_4-devel 
rust-linux-raw-sys+v5_11-devel rust-linux-raw-sys+v5_4-devel 
rust-linux-raw-sys-devel
Size:220.29 KiB

Package: rust-rustix-0.29.1-1.fc36
Summary: Safe Rust bindings to POSIX/Unix/Linux syscalls
RPMs:rust-rustix+async-std-devel rust-rustix+default-devel 
rust-rustix+io-lifetimes-devel rust-rustix+itoa-devel rust-rustix+mio-devel 
rust-rustix+once_cell-devel rust-rustix+os_pipe-devel rust-rustix+procfs-devel 
rust-rustix+socket2-devel rust-rustix+std-devel rust-rustix+tokio-devel 
rust-rustix-devel
Size:272.17 KiB


= DROPPED PACKAGES =

= UPGRADED PACKAGES =
Package:  NetworkManager-openvpn-1:1.8.16-1.fc36
Old package:  NetworkManager-openvpn-1:1.8.14-1.fc35.1
Summary:  NetworkManager VPN plugin for OpenVPN
RPMs: NetworkManager-openvpn NetworkManager-openvpn-gnome
Size: 1.57 MiB
Size change:  9.80 KiB
Changelog:
  * Tue Sep 28 2021 Beniamino Galvani  - 1:1.8.16-1
  - Update to 1.8.16 release
  - Fix detection of OpenVPN 2.5.0
  - Allow the connection to persist across network failures when the VPN
profile has 'vpn.persistent=yes'.
  - Fix parsing of incomplete IPv6 configurations pushed by server


Package:  R-littler-0.3.15-1.fc36
Old package:  R-littler-0.3.14-1.fc36
Summary:  littler: R at the Command-Line via 'r'
RPMs: R-littler R-littler-examples
Size: 479.29 KiB
Size change:  -17.77 KiB
Changelog:
  * Sat Dec 04 2021 Mattias Ellert  - 0.3.15-1
  - New upstream release 0.3.15


Package:  ansible-collection-community-kubernetes-2.0.1-1.fc36
Old package:  ansible-collection-community-kubernetes-1.1.1-5.fc35
Summary:  Kubernetes Collection for Ansible
RPMs: ansible-collection-community-kubernetes
Size: 34.80 KiB
Size change:  -60.12 KiB
Changelog:
  * Fri Dec 03 2021 Kevin Fenzi  - 2.0.1-1
  - Update to 2.0.1. Fixes rhbz#2028314


Package:  ansible-collection-google-cloud-1.0.2-1.fc36
Old package:  ansible-collection-google-cloud-1.0.1-5.fc35
Summary:  Google Cloud Platform collection
RPMs: ansible-collection-google-cloud
Size: 281.62 KiB
Size change:  4.99 KiB
Changelog:
  * Fri Dec 03 2021 Kevin Fenzi  - 1.0.2-1
  - Update to 1.0.2. Fixes rhbz#2028315


Package:  ansible-collection-netbox-netbox-3.4.0-1.fc36
Old package:  ansible-collection-netbox-netbox-2.0.0-2.fc35
Summary:  Netbox modules for Ansible
RPMs: ansible-collection-netbox-netbox
Size: 604.42 KiB
Size change:  23.09 KiB
Changelog:
  * Fri Dec 03 2021 Kevin Fenzi  - 3.4.0-1
  - Update to 3.4.0. Fixes rhbz#2028317


Package:  awscli-1.22.20-1.

Re: F36 Change: Enable fs-verity in RPM (System-Wide Change proposal)

2021-12-04 Thread Kevin Kofler via devel
Davide Cavalca via devel wrote:
> To clarify: RPM does support files validation, but fs-verity is more
> than just that. With RPM, the validation only happens on install time,
> and when one runs rpm -V manually. With fs-verity, the validation
> happens on-demand whenever a block of a file that originated from an
> RPM is accessed. This means, for example, that if an attacker replaces
> /bin/ls on disk with a compromised one, the next time it's read from
> disk (e.g. because you ran it) you will see a validation failure and
> the syscall will be blocked, preventing the compromised code from being
> executed.

This means that there is a performance cost in addition to the disk space 
cost (because something has to compute those checksums each time the file is 
acessed). It also means that it is harder for users to exercise their right 
to modify the Free Software (because replacing or patching RPM-installed 
binaries will lead to them failing to execute).

> About filesystem usage: unless you install rpm-plugin-fsverity (which
> is not and will not be installed by default), there is no disk space
> increase for verity-signed RPM packages. If you do install rpm-plugin-
> fsverity, some disk space will be used for the Merkle tree as described
> in the Change.

Since the change also adds to the metadata in the RPM, that means that it 
also increases the size of the RPMs. With keepcache=1, this also translates 
to increased disk space use. But even if the user does not keep cached RPMs, 
the download sizes will increase, which can cost time and for some users 
even money.

Kevin Kofler
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F36 Change: Enable fs-verity in RPM (System-Wide Change proposal)

2021-12-04 Thread Kevin Kofler via devel
Vitaly Zaitsev via devel wrote:
> -1. RPM already supports files validation and this feature will waste
> file system space.

I agree with you.

This is yet another "feature" that increases both the size of RPMs and, if 
enabled by default, the size of default installations. We need to stop 
tolerating creeping bloat!

So -1 to the Change proposal.

Kevin Kofler
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


I'm assuming this is a temporary build failure?

2021-12-04 Thread Neal Becker
https://koji.fedoraproject.org/koji/taskinfo?taskID=79571245

Thanks,
Neal
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


License change in rust-tiny_http: from ASL 2.0 to (MIT or ASL 2.0)

2021-12-04 Thread Fabio Valentini
Hi all,

The rust-tiny_http package will have a different license after the
update from version 0.6.2 (ASL 2.0 only) to version 0.8.2 (MIT or ASL
2.0). Since the old License remains as an option, I do not expect this
to cause any effects in Fedora.

Fabio
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F36 Change: Enable fs-verity in RPM (System-Wide Change proposal)

2021-12-04 Thread Stephen John Smoogen
On Fri, 3 Dec 2021 at 17:09, Richard W.M. Jones  wrote:
>
> On Fri, Dec 03, 2021 at 06:08:49PM +, Davide Cavalca via devel wrote:
> > Broadly speaking, fs-verity makes it possible to ensure that files that
> > were installed via an RPM have not been modified. It is useful in
> > environments where an attacker might be able to modify system files
> > (say, replace /bin/ls with a compromised version) and you want to
> > protect against that. For example, consider an appliance-like system
> > placed in an untrusted location where you may not be able to control
> > who has physical access (this could be a server, but it could also be a
> > kiosk in an internet point or a school). In this scenario, fs-verity
> > can be one of the building blocks to ensure and maintain system trust.
>
> I'm unclear about the threat model - this is an attacker who is
> someone able to overwrite single files (eg. /bin/ls) but cannot turn
> off the fs-verity system as a whole?
>
> Also if RPM can update /bin/ls then surely an attacker who can widely
> compromise system files must also be able to update /bin/ls in the
> same way?
>

Or just pad /usr/bin/rpm with some null characters at the end to break
its signature and also stop updates from happening. [Or the fs-verity
daemon which will report that these problems are occuring. ]





-- 
Stephen J Smoogen.
Let us be kind to one another, for most of us are fighting a hard
battle. -- Ian MacClaren
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F36 Change: Enable fs-verity in RPM (System-Wide Change proposal)

2021-12-04 Thread Dominik 'Rathann' Mierzejewski
On Friday, 03 December 2021 at 18:49, Davide Cavalca via devel wrote:
[...]
> About filesystem usage: unless you install rpm-plugin-fsverity (which
> is not and will not be installed by default), there is no disk space
> increase for verity-signed RPM packages. If you do install rpm-plugin-
> fsverity, some disk space will be used for the Merkle tree as described
> in the Change.

How do I reclaim that space after removing rpm-plugin-fsverity?

Regards,
Dominik
-- 
Fedora   https://getfedora.org  |  RPM Fusion  http://rpmfusion.org
There should be a science of discontent. People need hard times and
oppression to develop psychic muscles.
-- from "Collected Sayings of Muad'Dib" by the Princess Irulan
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F36 Change: Enable fs-verity in RPM (System-Wide Change proposal)

2021-12-04 Thread Björn Persson
> * at build time, we compute the Merkle tree for the files within a
> package, then sign it and ship it as part of the rpm metadata;

[...]

> Note that the Merkle tree
> is ''not'' shipped with the RPM itself (only its signature is)

In that case, "ship it" above should be changed to "ship the signature",
unless this is some distinction between "the RPM metadata" and "the RPM
itself".

If I enable FS-verity and later find that I need to patch a file to fix
some problem, how do I as the sysadmin tell Linux that this change is
authorized? Do I disable FS-verity for that specific file? Disable
FS-verity globally? Add my own key to the kernel's keyring? Build and
sign my own RPM package?

What prevents an attacker from doing the same?

Will files under /etc be covered, or will local configuration still be
possible?

Björn Persson


pgpbMIhTbl4rJ.pgp
Description: OpenPGP digital signatur
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F36 Change: Switch GnuTLS to allowlisting (System-Wide Change proposal)

2021-12-04 Thread Zbigniew Jędrzejewski-Szmek
On Thu, Dec 02, 2021 at 02:36:52PM -0500, Ben Cotton wrote:
> An alternative allowlisting-based configuration method and a matching
> GnuTLS API extension to control it currently under development:
> https://gitlab.com/gnutls/gnutls/-/merge_requests/1427. The change
> will turn the interface upside-down, explicitly allowlisting trusted
> algorithms:

Thanks for working on this. It solves a real problem in an elegant way.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure