[EPEL-devel] Fedora EPEL 9 updates-testing report

2023-12-30 Thread updates
The following builds have been pushed to Fedora EPEL 9 updates-testing

xarchiver-0.5.4.22-1.el9

Details about builds:



 xarchiver-0.5.4.22-1.el9 (FEDORA-EPEL-2023-95e2cf3973)
 Archive manager for Xfce

Update Information:

- update fixing some bugs including a security relevant bug

ChangeLog:

* Sat Dec 30 2023 Fedora Release Monitoring 
 - 0.5.4.22-1
- Update to 0.5.4.22 (rhbz#2256261)
* Sat Jul 22 2023 Fedora Release Engineering  - 
0.5.4.21-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild

References:

  [ 1 ] Bug #2256261 - xarchiver-0.5.4.22 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2256261


--
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2255873] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [fedora-all]

2023-12-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255873



--- Comment #5 from Fedora Update System  ---
FEDORA-2023-84d3cc47b1 has been pushed to the Fedora 38 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh
--advisory=FEDORA-2023-84d3cc47b1`
You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-2023-84d3cc47b1

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information
on how to test updates.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2255873

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255873%23c5
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2255873] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [fedora-all]

2023-12-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255873

Fedora Update System  changed:

   What|Removed |Added

 Status|MODIFIED|ON_QA



--- Comment #4 from Fedora Update System  ---
FEDORA-2023-921f6975c2 has been pushed to the Fedora 39 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh
--advisory=FEDORA-2023-921f6975c2`
You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-2023-921f6975c2

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information
on how to test updates.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2255873

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255873%23c4
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2256302] New: perl-Dist-Zilla-Plugin-Git-2.049 is available

2023-12-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2256302

Bug ID: 2256302
   Summary: perl-Dist-Zilla-Plugin-Git-2.049 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Dist-Zilla-Plugin-Git
  Keywords: FutureFeature, Triaged
  Assignee: ppi...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: perl-devel@lists.fedoraproject.org, ppi...@redhat.com
  Target Milestone: ---
Classification: Fedora



Releases retrieved: 2.049
Upstream release that is considered latest: 2.049
Current version/release in rawhide: 2.048-7.fc39
URL: http://search.cpan.org/dist/Dist-Zilla-Plugin-Git/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from Anitya:
https://release-monitoring.org/project/13957/


To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/perl-Dist-Zilla-Plugin-Git


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2256302

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256302%23c0
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2256301] perl-Digest-MD5-2.59 is available

2023-12-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2256301



--- Comment #1 from Upstream Release Monitoring 
 ---
Scratch build failed. Details below:

BuilderException: Build failed:
Couldn't upload source
/var/tmp/thn-i8_ai_a6/./SRPMS/perl-Digest-MD5-2.59-1.fc38.src.rpm to koji.

Traceback:
  File
"/usr/local/lib/python3.11/site-packages/hotness/use_cases/package_scratch_build_use_case.py",
line 56, in build
result = self.builder.build(request.package, request.opts)
 ^
  File "/usr/local/lib/python3.11/site-packages/hotness/builders/koji.py", line
252, in build
output["build_id"] = self._scratch_build(session, package.name, srpm)
 
  File "/usr/local/lib/python3.11/site-packages/hotness/builders/koji.py", line
477, in _scratch_build
raise BuilderException("Couldn't upload source {} to koji.".format(source))

If you think this issue is caused by some bug in the-new-hotness, please report
it on the-new-hotness issue tracker:
https://github.com/fedora-infra/the-new-hotness/issues


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2256301

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256301%23c1
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2256301] New: perl-Digest-MD5-2.59 is available

2023-12-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2256301

Bug ID: 2256301
   Summary: perl-Digest-MD5-2.59 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Digest-MD5
  Keywords: FutureFeature, Triaged
  Assignee: jples...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: jples...@redhat.com, mspa...@redhat.com,
perl-devel@lists.fedoraproject.org, ppi...@redhat.com
  Target Milestone: ---
Classification: Fedora



Releases retrieved: 2.59
Upstream release that is considered latest: 2.59
Current version/release in rawhide: 2.58-501.fc40
URL: http://search.cpan.org/dist/Digest-MD5/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from Anitya:
https://release-monitoring.org/project/2841/


To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/perl-Digest-MD5


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2256301

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256301%23c0
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2256294] perl-Exporter-5.78 is available

2023-12-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2256294



--- Comment #2 from Upstream Release Monitoring 
 ---
the-new-hotness/release-monitoring.org's scratch build of
perl-Exporter-5.78-1.fc38.src.rpm for rawhide completed
http://koji.fedoraproject.org/koji/taskinfo?taskID=111077164


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2256294

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256294%23c2
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2256294] perl-Exporter-5.78 is available

2023-12-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2256294



--- Comment #1 from Upstream Release Monitoring 
 ---
Created attachment 2006664
  --> https://bugzilla.redhat.com/attachment.cgi?id=2006664=edit
Update to 5.78 (#2256294)


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2256294

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256294%23c1
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2256294] New: perl-Exporter-5.78 is available

2023-12-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2256294

Bug ID: 2256294
   Summary: perl-Exporter-5.78 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Exporter
  Keywords: FutureFeature, Triaged
  Assignee: jples...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: jples...@redhat.com, mspa...@redhat.com,
perl-devel@lists.fedoraproject.org, ppi...@redhat.com
  Target Milestone: ---
Classification: Fedora



Releases retrieved: 5.78
Upstream release that is considered latest: 5.78
Current version/release in rawhide: 5.77-500.fc39
URL: http://search.cpan.org/dist/Exporter/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from Anitya:
https://release-monitoring.org/project/2861/


To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/perl-Exporter


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2256294

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256294%23c0
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Brasero can't create CD images in F39

2023-12-30 Thread Christopher Klooz

On 29/12/2023 17.31, Sergio Pascual wrote:

Hello, I would like to bring attention to this bug
https://bugzilla.redhat.com/show_bug.cgi?id=2250192

This problem prevents Brasero from creating CD images in F39.
Brasero complains about  "old version of cdrdao", but the version in F39 is
the latest (1.2.5).
It actually works if you force install  an older (1.2.4) cdrdao from F37.
There is also an open ticket about k3b, which likewise is caused by an 
error that relates to `cdrdao`: 
https://bugzilla.redhat.com/show_bug.cgi?id=2212471


Regards, Sergio

--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2256272] New: perl-DateTime-TimeZone-2.61 is available

2023-12-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2256272

Bug ID: 2256272
   Summary: perl-DateTime-TimeZone-2.61 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-DateTime-TimeZone
  Keywords: FutureFeature, Triaged
  Assignee: jples...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: iarn...@gmail.com, jples...@redhat.com,
perl-devel@lists.fedoraproject.org
  Target Milestone: ---
Classification: Fedora



Releases retrieved: 2.61
Upstream release that is considered latest: 2.61
Current version/release in rawhide: 2.60-4.fc39
URL: http://metacpan.org/dist/DateTime-TimeZone/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from Anitya:
https://release-monitoring.org/project/2801/


To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/perl-DateTime-TimeZone


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2256272

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256272%23c0
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2256265] New: perl-bignum-0.67 is available

2023-12-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2256265

Bug ID: 2256265
   Summary: perl-bignum-0.67 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-bignum
  Keywords: FutureFeature, Triaged
  Assignee: jples...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: jples...@redhat.com, mspa...@redhat.com,
perl-devel@lists.fedoraproject.org, ppi...@redhat.com
  Target Milestone: ---
Classification: Fedora



Releases retrieved: 0.67
Upstream release that is considered latest: 0.67
Current version/release in rawhide: 0.66-501.fc39
URL: http://search.cpan.org/dist/bignum/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from Anitya:
https://release-monitoring.org/project/12784/


To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/perl-bignum


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2256265

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256265%23c0
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2255873] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [fedora-all]

2023-12-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255873

Fedora Update System  changed:

   What|Removed |Added

 Status|NEW |MODIFIED



--- Comment #2 from Fedora Update System  ---
FEDORA-2023-84d3cc47b1 has been submitted as an update to Fedora 38.
https://bodhi.fedoraproject.org/updates/FEDORA-2023-84d3cc47b1


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2255873

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255873%23c2
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2255873] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [fedora-all]

2023-12-30 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255873



--- Comment #3 from Fedora Update System  ---
FEDORA-2023-921f6975c2 has been submitted as an update to Fedora 39.
https://bodhi.fedoraproject.org/updates/FEDORA-2023-921f6975c2


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2255873

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255873%23c3
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Fedora rawhide compose report: 20231230.n.0 changes

2023-12-30 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20231229.n.0
NEW: Fedora-Rawhide-20231230.n.0

= SUMMARY =
Added images:4
Dropped images:  2
Added packages:  12
Dropped packages:0
Upgraded packages:   74
Downgraded packages: 0

Size of added packages:  4.57 MiB
Size of dropped packages:0 B
Size of upgraded packages:   1.23 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   2.56 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =
Image: Sericea dvd-ostree x86_64
Path: Sericea/x86_64/iso/Fedora-Sericea-ostree-x86_64-Rawhide-20231230.n.0.iso
Image: Silverblue dvd-ostree ppc64le
Path: 
Silverblue/ppc64le/iso/Fedora-Silverblue-ostree-ppc64le-Rawhide-20231230.n.0.iso
Image: Silverblue dvd-ostree x86_64
Path: 
Silverblue/x86_64/iso/Fedora-Silverblue-ostree-x86_64-Rawhide-20231230.n.0.iso
Image: Kinoite dvd-ostree aarch64
Path: Kinoite/aarch64/iso/Fedora-Kinoite-ostree-aarch64-Rawhide-20231230.n.0.iso

= DROPPED IMAGES =
Image: i3 live aarch64
Path: Spins/aarch64/iso/Fedora-i3-Live-aarch64-Rawhide-20231229.n.0.iso
Image: Kinoite dvd-ostree ppc64le
Path: Kinoite/ppc64le/iso/Fedora-Kinoite-ostree-ppc64le-Rawhide-20231229.n.0.iso

= ADDED PACKAGES =
Package: ocaml-unionfind-20220122-2.fc40
Summary: OCaml implementations of the union-find data structure
RPMs:ocaml-unionfind ocaml-unionfind-devel
Size:1004.20 KiB

Package: python-gbulb-0.6.4-1.fc40
Summary: GLib event loop for tulip (PEP 3156)
RPMs:python3-gbulb
Size:54.89 KiB

Package: python-lsprotocol-2023.0.0-1.fc40
Summary: Python implementation of the Language Server Protocol
RPMs:python3-lsprotocol
Size:144.63 KiB

Package: rust-calloop-wayland-source-0.2.0-1.fc40
Summary: Wayland-rs client event source for callloop
RPMs:rust-calloop-wayland-source+default-devel 
rust-calloop-wayland-source+log-devel rust-calloop-wayland-source-devel
Size:30.40 KiB

Package: rust-cursor-icon-1.1.0-1.fc40
Summary: Cross platform cursor icon type
RPMs:rust-cursor-icon+alloc-devel rust-cursor-icon+default-devel 
rust-cursor-icon+serde-devel rust-cursor-icon+std-devel rust-cursor-icon-devel
Size:47.78 KiB

Package: rust-libbpf-cargo0.21-0.21.2-2.fc40
Summary: Cargo plugin to build bpf programs
RPMs:rust-libbpf-cargo0.21+default-devel 
rust-libbpf-cargo0.21+novendor-devel rust-libbpf-cargo0.21-devel
Size:534.98 KiB

Package: rust-raw-window-handle0.5-0.5.2-1.fc40
Summary: Interoperability library for Rust Windowing applications
RPMs:rust-raw-window-handle0.5+alloc-devel 
rust-raw-window-handle0.5+default-devel rust-raw-window-handle0.5+std-devel 
rust-raw-window-handle0.5-devel
Size:46.88 KiB

Package: rust-wayland-backend-0.3.2-1.fc40
Summary: Low-level bindings to the Wayland protocol
RPMs:rust-wayland-backend+client_system-devel 
rust-wayland-backend+default-devel rust-wayland-backend+dlopen-devel 
rust-wayland-backend+log-devel rust-wayland-backend+raw-window-handle-devel 
rust-wayland-backend+server_system-devel rust-wayland-backend-devel
Size:118.22 KiB

Package: rust-wayland-csd-frame-0.3.0-1.fc40
Summary: Common trait and types for wayland CSD interop
RPMs:rust-wayland-csd-frame+default-devel rust-wayland-csd-frame-devel
Size:20.66 KiB

Package: rust-wayland-protocols-plasma-0.2.0-1.fc40
Summary: Generated API for the Plasma wayland protocol extensions
RPMs:rust-wayland-protocols-plasma+client-devel 
rust-wayland-protocols-plasma+default-devel 
rust-wayland-protocols-plasma+server-devel 
rust-wayland-protocols-plasma+wayland-client-devel 
rust-wayland-protocols-plasma+wayland-server-devel 
rust-wayland-protocols-plasma-devel
Size:107.17 KiB

Package: rust-wayland-protocols-wlr-0.2.0-1.fc40
Summary: Generated API for the WLR wayland protocol extensions
RPMs:rust-wayland-protocols-wlr+client-devel 
rust-wayland-protocols-wlr+default-devel 
rust-wayland-protocols-wlr+server-devel 
rust-wayland-protocols-wlr+wayland-client-devel 
rust-wayland-protocols-wlr+wayland-server-devel rust-wayland-protocols-wlr-devel
Size:69.38 KiB

Package: wildcard-0.3.3-1.fc40
Summary: Test your regular expressions
RPMs:wildcard
Size:2.44 MiB


= DROPPED PACKAGES =

= UPGRADED PACKAGES =
Package:  Thunar-4.18.9-1.fc40
Old package:  Thunar-4.18.8-1.fc40
Summary:  Thunar File Manager
RPMs: Thunar Thunar-devel Thunar-docs
Size: 10.27 MiB
Size change:  -11.29 KiB
Changelog:
  * Fri Dec 29 2023 Mukundan Ragavan  - 4.18.9-1
  - Update to v4.18.9


Package:  bluez-5.71-2.fc40
Old package:  bluez-5.71-1.fc40
Summary:  Bluetooth utilities
RPMs: bluez bluez-cups bluez-deprecated bluez-hid2hci bluez-libs 
bluez-libs-devel bluez-mesh bluez-obexd
Size: 9.93 MiB
Size change:  3.91 KiB
Changelog:
  * Fri Dec 29 2023 Peter Robinson  - 5.71-2
  - Fix link key address type for old kernels


Package:  bodr-10-21.fc40
Old package:  bodr-10-20.fc39
Summary:  Blue Obelisk Data Repository
RPMs

Re: F40 Change Proposal: Optimized Binaries for the AMD64 Architecture (System-Wide)

2023-12-30 Thread Mattia Verga via devel
Il 28/12/23 18:25, Robert Marcano via devel ha scritto:
> On 12/28/23 12:58 PM, Chris Adams wrote:
>> Once upon a time, Aoife Moloney  said:
>>> Systemd will be modified to insert the additional directories into the
>>> `$PATH` environment variable (affecting all programs on the system)
>> Anything that depends on PATH entries is IMHO doomed to failure.  There
>> are way too many things that explicitly set PATH to "known" values (for
>> good and bad reasons) to be able to depend on extending it.  Heck, it
>> took a long time to get sudo just to include /usr/local/{bin,sbin}.
>>
> Maybe replacing the /usr/bin related entries with a generic wrapper that
> launch the best binary from the per architecture directories.
>
> Note: This may affect a few programs that use argv[0] for something
> meaningful.
> --

I've got not much knowledge on this matter, anyway here's my 2c:

Since we're talking about a few packages that will gain from this change 
and that they're must be manually "enabled" to build with this feature, 
I'd prefer this kind of wrapper approach instead of changing the PATH 
globally.

Maybe a RPM macro could be provided for using in specfile where we want 
optimized binaries. Those binaries will be created like 'xz-x86-64-v2', 
'xz-x86-64-v3' and so on and all installed in /usr/bin. Then a 'xz' 
wrapper will call the appropriate executable based on what supported 
instruction set is detected available. And maybe in future we could have 
dnf to install the appropriate optimized subpackage binaries.

It may be much more complex than just injecting new PATHs, but I think 
it's more elegant and could be a shared mechanism with other linux 
distributions.

Mattia

--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue