[EPEL-devel] Fedora EPEL 9 updates-testing report
The following builds have been pushed to Fedora EPEL 9 updates-testing xarchiver-0.5.4.22-1.el9 Details about builds: xarchiver-0.5.4.22-1.el9 (FEDORA-EPEL-2023-95e2cf3973) Archive manager for Xfce Update Information: - update fixing some bugs including a security relevant bug ChangeLog: * Sat Dec 30 2023 Fedora Release Monitoring - 0.5.4.22-1 - Update to 0.5.4.22 (rhbz#2256261) * Sat Jul 22 2023 Fedora Release Engineering - 0.5.4.21-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild References: [ 1 ] Bug #2256261 - xarchiver-0.5.4.22 is available https://bugzilla.redhat.com/show_bug.cgi?id=2256261 -- ___ epel-devel mailing list -- epel-devel@lists.fedoraproject.org To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2255873] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2255873 --- Comment #5 from Fedora Update System --- FEDORA-2023-84d3cc47b1 has been pushed to the Fedora 38 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2023-84d3cc47b1` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2023-84d3cc47b1 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2255873 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255873%23c5 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2255873] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2255873 Fedora Update System changed: What|Removed |Added Status|MODIFIED|ON_QA --- Comment #4 from Fedora Update System --- FEDORA-2023-921f6975c2 has been pushed to the Fedora 39 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2023-921f6975c2` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2023-921f6975c2 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2255873 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255873%23c4 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2256302] New: perl-Dist-Zilla-Plugin-Git-2.049 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2256302 Bug ID: 2256302 Summary: perl-Dist-Zilla-Plugin-Git-2.049 is available Product: Fedora Version: rawhide Status: NEW Component: perl-Dist-Zilla-Plugin-Git Keywords: FutureFeature, Triaged Assignee: ppi...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: perl-devel@lists.fedoraproject.org, ppi...@redhat.com Target Milestone: --- Classification: Fedora Releases retrieved: 2.049 Upstream release that is considered latest: 2.049 Current version/release in rawhide: 2.048-7.fc39 URL: http://search.cpan.org/dist/Dist-Zilla-Plugin-Git/ Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/ More information about the service that created this bug can be found at: https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from Anitya: https://release-monitoring.org/project/13957/ To change the monitoring settings for the project, please visit: https://src.fedoraproject.org/rpms/perl-Dist-Zilla-Plugin-Git -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2256302 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256302%23c0 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2256301] perl-Digest-MD5-2.59 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2256301 --- Comment #1 from Upstream Release Monitoring --- Scratch build failed. Details below: BuilderException: Build failed: Couldn't upload source /var/tmp/thn-i8_ai_a6/./SRPMS/perl-Digest-MD5-2.59-1.fc38.src.rpm to koji. Traceback: File "/usr/local/lib/python3.11/site-packages/hotness/use_cases/package_scratch_build_use_case.py", line 56, in build result = self.builder.build(request.package, request.opts) ^ File "/usr/local/lib/python3.11/site-packages/hotness/builders/koji.py", line 252, in build output["build_id"] = self._scratch_build(session, package.name, srpm) File "/usr/local/lib/python3.11/site-packages/hotness/builders/koji.py", line 477, in _scratch_build raise BuilderException("Couldn't upload source {} to koji.".format(source)) If you think this issue is caused by some bug in the-new-hotness, please report it on the-new-hotness issue tracker: https://github.com/fedora-infra/the-new-hotness/issues -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2256301 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256301%23c1 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2256301] New: perl-Digest-MD5-2.59 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2256301 Bug ID: 2256301 Summary: perl-Digest-MD5-2.59 is available Product: Fedora Version: rawhide Status: NEW Component: perl-Digest-MD5 Keywords: FutureFeature, Triaged Assignee: jples...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: jples...@redhat.com, mspa...@redhat.com, perl-devel@lists.fedoraproject.org, ppi...@redhat.com Target Milestone: --- Classification: Fedora Releases retrieved: 2.59 Upstream release that is considered latest: 2.59 Current version/release in rawhide: 2.58-501.fc40 URL: http://search.cpan.org/dist/Digest-MD5/ Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/ More information about the service that created this bug can be found at: https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from Anitya: https://release-monitoring.org/project/2841/ To change the monitoring settings for the project, please visit: https://src.fedoraproject.org/rpms/perl-Digest-MD5 -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2256301 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256301%23c0 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2256294] perl-Exporter-5.78 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2256294 --- Comment #2 from Upstream Release Monitoring --- the-new-hotness/release-monitoring.org's scratch build of perl-Exporter-5.78-1.fc38.src.rpm for rawhide completed http://koji.fedoraproject.org/koji/taskinfo?taskID=111077164 -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2256294 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256294%23c2 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2256294] perl-Exporter-5.78 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2256294 --- Comment #1 from Upstream Release Monitoring --- Created attachment 2006664 --> https://bugzilla.redhat.com/attachment.cgi?id=2006664=edit Update to 5.78 (#2256294) -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2256294 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256294%23c1 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2256294] New: perl-Exporter-5.78 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2256294 Bug ID: 2256294 Summary: perl-Exporter-5.78 is available Product: Fedora Version: rawhide Status: NEW Component: perl-Exporter Keywords: FutureFeature, Triaged Assignee: jples...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: jples...@redhat.com, mspa...@redhat.com, perl-devel@lists.fedoraproject.org, ppi...@redhat.com Target Milestone: --- Classification: Fedora Releases retrieved: 5.78 Upstream release that is considered latest: 5.78 Current version/release in rawhide: 5.77-500.fc39 URL: http://search.cpan.org/dist/Exporter/ Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/ More information about the service that created this bug can be found at: https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from Anitya: https://release-monitoring.org/project/2861/ To change the monitoring settings for the project, please visit: https://src.fedoraproject.org/rpms/perl-Exporter -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2256294 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256294%23c0 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
Re: Brasero can't create CD images in F39
On 29/12/2023 17.31, Sergio Pascual wrote: Hello, I would like to bring attention to this bug https://bugzilla.redhat.com/show_bug.cgi?id=2250192 This problem prevents Brasero from creating CD images in F39. Brasero complains about "old version of cdrdao", but the version in F39 is the latest (1.2.5). It actually works if you force install an older (1.2.4) cdrdao from F37. There is also an open ticket about k3b, which likewise is caused by an error that relates to `cdrdao`: https://bugzilla.redhat.com/show_bug.cgi?id=2212471 Regards, Sergio -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2256272] New: perl-DateTime-TimeZone-2.61 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2256272 Bug ID: 2256272 Summary: perl-DateTime-TimeZone-2.61 is available Product: Fedora Version: rawhide Status: NEW Component: perl-DateTime-TimeZone Keywords: FutureFeature, Triaged Assignee: jples...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: iarn...@gmail.com, jples...@redhat.com, perl-devel@lists.fedoraproject.org Target Milestone: --- Classification: Fedora Releases retrieved: 2.61 Upstream release that is considered latest: 2.61 Current version/release in rawhide: 2.60-4.fc39 URL: http://metacpan.org/dist/DateTime-TimeZone/ Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/ More information about the service that created this bug can be found at: https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from Anitya: https://release-monitoring.org/project/2801/ To change the monitoring settings for the project, please visit: https://src.fedoraproject.org/rpms/perl-DateTime-TimeZone -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2256272 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256272%23c0 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2256265] New: perl-bignum-0.67 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2256265 Bug ID: 2256265 Summary: perl-bignum-0.67 is available Product: Fedora Version: rawhide Status: NEW Component: perl-bignum Keywords: FutureFeature, Triaged Assignee: jples...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: jples...@redhat.com, mspa...@redhat.com, perl-devel@lists.fedoraproject.org, ppi...@redhat.com Target Milestone: --- Classification: Fedora Releases retrieved: 0.67 Upstream release that is considered latest: 0.67 Current version/release in rawhide: 0.66-501.fc39 URL: http://search.cpan.org/dist/bignum/ Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/ More information about the service that created this bug can be found at: https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from Anitya: https://release-monitoring.org/project/12784/ To change the monitoring settings for the project, please visit: https://src.fedoraproject.org/rpms/perl-bignum -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2256265 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202256265%23c0 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2255873] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2255873 Fedora Update System changed: What|Removed |Added Status|NEW |MODIFIED --- Comment #2 from Fedora Update System --- FEDORA-2023-84d3cc47b1 has been submitted as an update to Fedora 38. https://bodhi.fedoraproject.org/updates/FEDORA-2023-84d3cc47b1 -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2255873 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255873%23c2 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2255873] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2255873 --- Comment #3 from Fedora Update System --- FEDORA-2023-921f6975c2 has been submitted as an update to Fedora 39. https://bodhi.fedoraproject.org/updates/FEDORA-2023-921f6975c2 -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2255873 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255873%23c3 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
Fedora rawhide compose report: 20231230.n.0 changes
OLD: Fedora-Rawhide-20231229.n.0 NEW: Fedora-Rawhide-20231230.n.0 = SUMMARY = Added images:4 Dropped images: 2 Added packages: 12 Dropped packages:0 Upgraded packages: 74 Downgraded packages: 0 Size of added packages: 4.57 MiB Size of dropped packages:0 B Size of upgraded packages: 1.23 GiB Size of downgraded packages: 0 B Size change of upgraded packages: 2.56 MiB Size change of downgraded packages: 0 B = ADDED IMAGES = Image: Sericea dvd-ostree x86_64 Path: Sericea/x86_64/iso/Fedora-Sericea-ostree-x86_64-Rawhide-20231230.n.0.iso Image: Silverblue dvd-ostree ppc64le Path: Silverblue/ppc64le/iso/Fedora-Silverblue-ostree-ppc64le-Rawhide-20231230.n.0.iso Image: Silverblue dvd-ostree x86_64 Path: Silverblue/x86_64/iso/Fedora-Silverblue-ostree-x86_64-Rawhide-20231230.n.0.iso Image: Kinoite dvd-ostree aarch64 Path: Kinoite/aarch64/iso/Fedora-Kinoite-ostree-aarch64-Rawhide-20231230.n.0.iso = DROPPED IMAGES = Image: i3 live aarch64 Path: Spins/aarch64/iso/Fedora-i3-Live-aarch64-Rawhide-20231229.n.0.iso Image: Kinoite dvd-ostree ppc64le Path: Kinoite/ppc64le/iso/Fedora-Kinoite-ostree-ppc64le-Rawhide-20231229.n.0.iso = ADDED PACKAGES = Package: ocaml-unionfind-20220122-2.fc40 Summary: OCaml implementations of the union-find data structure RPMs:ocaml-unionfind ocaml-unionfind-devel Size:1004.20 KiB Package: python-gbulb-0.6.4-1.fc40 Summary: GLib event loop for tulip (PEP 3156) RPMs:python3-gbulb Size:54.89 KiB Package: python-lsprotocol-2023.0.0-1.fc40 Summary: Python implementation of the Language Server Protocol RPMs:python3-lsprotocol Size:144.63 KiB Package: rust-calloop-wayland-source-0.2.0-1.fc40 Summary: Wayland-rs client event source for callloop RPMs:rust-calloop-wayland-source+default-devel rust-calloop-wayland-source+log-devel rust-calloop-wayland-source-devel Size:30.40 KiB Package: rust-cursor-icon-1.1.0-1.fc40 Summary: Cross platform cursor icon type RPMs:rust-cursor-icon+alloc-devel rust-cursor-icon+default-devel rust-cursor-icon+serde-devel rust-cursor-icon+std-devel rust-cursor-icon-devel Size:47.78 KiB Package: rust-libbpf-cargo0.21-0.21.2-2.fc40 Summary: Cargo plugin to build bpf programs RPMs:rust-libbpf-cargo0.21+default-devel rust-libbpf-cargo0.21+novendor-devel rust-libbpf-cargo0.21-devel Size:534.98 KiB Package: rust-raw-window-handle0.5-0.5.2-1.fc40 Summary: Interoperability library for Rust Windowing applications RPMs:rust-raw-window-handle0.5+alloc-devel rust-raw-window-handle0.5+default-devel rust-raw-window-handle0.5+std-devel rust-raw-window-handle0.5-devel Size:46.88 KiB Package: rust-wayland-backend-0.3.2-1.fc40 Summary: Low-level bindings to the Wayland protocol RPMs:rust-wayland-backend+client_system-devel rust-wayland-backend+default-devel rust-wayland-backend+dlopen-devel rust-wayland-backend+log-devel rust-wayland-backend+raw-window-handle-devel rust-wayland-backend+server_system-devel rust-wayland-backend-devel Size:118.22 KiB Package: rust-wayland-csd-frame-0.3.0-1.fc40 Summary: Common trait and types for wayland CSD interop RPMs:rust-wayland-csd-frame+default-devel rust-wayland-csd-frame-devel Size:20.66 KiB Package: rust-wayland-protocols-plasma-0.2.0-1.fc40 Summary: Generated API for the Plasma wayland protocol extensions RPMs:rust-wayland-protocols-plasma+client-devel rust-wayland-protocols-plasma+default-devel rust-wayland-protocols-plasma+server-devel rust-wayland-protocols-plasma+wayland-client-devel rust-wayland-protocols-plasma+wayland-server-devel rust-wayland-protocols-plasma-devel Size:107.17 KiB Package: rust-wayland-protocols-wlr-0.2.0-1.fc40 Summary: Generated API for the WLR wayland protocol extensions RPMs:rust-wayland-protocols-wlr+client-devel rust-wayland-protocols-wlr+default-devel rust-wayland-protocols-wlr+server-devel rust-wayland-protocols-wlr+wayland-client-devel rust-wayland-protocols-wlr+wayland-server-devel rust-wayland-protocols-wlr-devel Size:69.38 KiB Package: wildcard-0.3.3-1.fc40 Summary: Test your regular expressions RPMs:wildcard Size:2.44 MiB = DROPPED PACKAGES = = UPGRADED PACKAGES = Package: Thunar-4.18.9-1.fc40 Old package: Thunar-4.18.8-1.fc40 Summary: Thunar File Manager RPMs: Thunar Thunar-devel Thunar-docs Size: 10.27 MiB Size change: -11.29 KiB Changelog: * Fri Dec 29 2023 Mukundan Ragavan - 4.18.9-1 - Update to v4.18.9 Package: bluez-5.71-2.fc40 Old package: bluez-5.71-1.fc40 Summary: Bluetooth utilities RPMs: bluez bluez-cups bluez-deprecated bluez-hid2hci bluez-libs bluez-libs-devel bluez-mesh bluez-obexd Size: 9.93 MiB Size change: 3.91 KiB Changelog: * Fri Dec 29 2023 Peter Robinson - 5.71-2 - Fix link key address type for old kernels Package: bodr-10-21.fc40 Old package: bodr-10-20.fc39 Summary: Blue Obelisk Data Repository RPMs
Re: F40 Change Proposal: Optimized Binaries for the AMD64 Architecture (System-Wide)
Il 28/12/23 18:25, Robert Marcano via devel ha scritto: > On 12/28/23 12:58 PM, Chris Adams wrote: >> Once upon a time, Aoife Moloney said: >>> Systemd will be modified to insert the additional directories into the >>> `$PATH` environment variable (affecting all programs on the system) >> Anything that depends on PATH entries is IMHO doomed to failure. There >> are way too many things that explicitly set PATH to "known" values (for >> good and bad reasons) to be able to depend on extending it. Heck, it >> took a long time to get sudo just to include /usr/local/{bin,sbin}. >> > Maybe replacing the /usr/bin related entries with a generic wrapper that > launch the best binary from the per architecture directories. > > Note: This may affect a few programs that use argv[0] for something > meaningful. > -- I've got not much knowledge on this matter, anyway here's my 2c: Since we're talking about a few packages that will gain from this change and that they're must be manually "enabled" to build with this feature, I'd prefer this kind of wrapper approach instead of changing the PATH globally. Maybe a RPM macro could be provided for using in specfile where we want optimized binaries. Those binaries will be created like 'xz-x86-64-v2', 'xz-x86-64-v3' and so on and all installed in /usr/bin. Then a 'xz' wrapper will call the appropriate executable based on what supported instruction set is detected available. And maybe in future we could have dnf to install the appropriate optimized subpackage binaries. It may be much more complex than just injecting new PATHs, but I think it's more elegant and could be a shared mechanism with other linux distributions. Mattia -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue