[EPEL-devel] Fedora EPEL 8 updates-testing report

2024-02-18 Thread updates
The following Fedora EPEL 8 Security updates need testing:
 Age  URL
   6  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-10430622fd   
syncthing-1.27.3-1.el8
   4  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-0b7ba715af   
pdns-recursor-4.8.6-1.el8
   2  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-aa663fed4a   
python-treq-20.4.1-1.el8
   1  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-19fff4a604   
dhcpcd-10.0.6-2.el8


The following builds have been pushed to Fedora EPEL 8 updates-testing

c-icap-0.6.2-1.el8
c-icap-modules-0.5.7-1.20240112git56d0179.el8
chromium-121.0.6167.184-1.el8
objfw-1.0.9-1.el8
plantuml-1.2024.3-1.el8

Details about builds:



 c-icap-0.6.2-1.el8 (FEDORA-EPEL-2024-6acfc9af51)
 An implementation of an ICAP server

Update Information:

Update to 0.6.2 release.

ChangeLog:

* Mon Jan 29 2024 Frank Crawford  - 0.6.2-1
- Update to 0.6.2 release.
- Drop perl RPM as removed upstream.
* Tue Jan 23 2024 Fedora Release Engineering  - 
0.6.0-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Fri Jan 19 2024 Fedora Release Engineering  - 
0.6.0-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Wed Nov 29 2023 Florian Weimer  - 0.6.0-3
- Fix C compatibility issue in the configure script




 c-icap-modules-0.5.7-1.20240112git56d0179.el8 (FEDORA-EPEL-2024-e1202b532b)
 Services for the c-icap server

Update Information:

Updated to equivalent to 0.5.7 release.

ChangeLog:

* Sat Feb 17 2024 Frank Crawford  - 
0.5.7-1.20240112gite50f3c2
- Updated to equivalent to 0.5.7 release.
* Tue Jan 23 2024 Fedora Release Engineering  - 
0.5.6-6.20230212gitfd1a1b7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Fri Jan 19 2024 Fedora Release Engineering  - 
0.5.6-5.20230212gitfd1a1b7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild




 chromium-121.0.6167.184-1.el8 (FEDORA-EPEL-2024-7c698ee786)
 A WebKit (Blink) powered web browser that Google doesn't want you to use

Update Information:

update to 121.0.6167.184

ChangeLog:

* Wed Feb 14 2024 Than Ngo  - 121.0.6167.184-1
- update to 121.0.6167.184




 objfw-1.0.9-1.el8 (FEDORA-EPEL-2024-6a16a4e3cd)
 Portable, lightweight framework for the Objective-C language

Update Information:

Update to 1.0.9

ChangeLog:

* Sun Feb 18 2024 Jonathan Schleifer  - 1.0.9-1
- Update to 1.0.9
* Thu Jan 25 2024 Fedora Release Engineering  - 
1.0.8-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild




 plantuml-1.2024.3-1.el8 (FEDORA-EPEL-2024-c64bc97cb9)
 Program to generate UML diagram from a text description

Update Information:

Update to version 1.2024.3

ChangeLog:

* Sun Feb 18 2024 blinxen  - 1:1.2024.3-1
- Update to version 1.2024.0 (rhbz#2263433)


--
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Fedora EPEL 7 updates-testing report

2024-02-18 Thread updates
The following builds have been pushed to Fedora EPEL 7 updates-testing

c-icap-0.6.2-1.el7
c-icap-modules-0.5.7-1.20240112git56d0179.el7
chromium-121.0.6167.184-1.el7

Details about builds:



 c-icap-0.6.2-1.el7 (FEDORA-EPEL-2024-7e27d96cc8)
 An implementation of an ICAP server

Update Information:

Update to 0.6.2 release.

ChangeLog:

* Mon Jan 29 2024 Frank Crawford  - 0.6.2-1
- Update to 0.6.2 release.
- Drop perl RPM as removed upstream.
* Tue Jan 23 2024 Fedora Release Engineering  - 
0.6.0-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Fri Jan 19 2024 Fedora Release Engineering  - 
0.6.0-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Wed Nov 29 2023 Florian Weimer  - 0.6.0-3
- Fix C compatibility issue in the configure script




 c-icap-modules-0.5.7-1.20240112git56d0179.el7 (FEDORA-EPEL-2024-f6b3b254dd)
 Services for the c-icap server

Update Information:

Updated to equivalent to 0.5.7 release.

ChangeLog:

* Sat Feb 17 2024 Frank Crawford  - 
0.5.7-1.20240112gite50f3c2
- Updated to equivalent to 0.5.7 release.
* Tue Jan 23 2024 Fedora Release Engineering  - 
0.5.6-6.20230212gitfd1a1b7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Fri Jan 19 2024 Fedora Release Engineering  - 
0.5.6-5.20230212gitfd1a1b7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild




 chromium-121.0.6167.184-1.el7 (FEDORA-EPEL-2024-9b2201a9e7)
 A WebKit (Blink) powered web browser that Google doesn't want you to use

Update Information:

update to 121.0.6167.184

ChangeLog:

* Wed Feb 14 2024 Than Ngo  - 121.0.6167.184-1
- update to 121.0.6167.184


--
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Fedora EPEL 7 updates-testing report

2024-02-18 Thread updates
The following Fedora EPEL 7 Security updates need testing:
 Age  URL
   6  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-4a6bba707d   
libmodsecurity-3.0.12-1.el7


The following builds have been pushed to Fedora EPEL 7 updates-testing

anope-2.1.2-1.el7
bgpq4-1.12-1.el7

Details about builds:



 anope-2.1.2-1.el7 (FEDORA-EPEL-2024-897b264829)
 IRC services designed for flexibility and ease of use

Update Information:

Anope 2.1.2
Added module:tlsv10 to m_ssl_openssl for configuring whether TLSv1.0 is usable
(defaults to no).
Added module:tlsv11 to m_ssl_openssl for configuring whether TLSv1.1 is usable
(defaults to yes).
Added module:tlsv12 to m_ssl_openssl for configuring whether TLSv1.2 is usable
(defaults to yes)
Bumped the minimum OpenSSL version to 1.1.0.
Bumped the minimum GnuTLS version to 3.0.0.
Modernized mutex and thread code to use Modern C++.
Normalised the program exit codes.
Removed module:sslv3 from m_ssl_openssl.
Removed the m_ prefix from the names of the chanstats, dns, dnsbl, helpchan,
httpd, ldap, ldap_oper, mysql, proxyscan, redis, regex_pcre2, regex_posix,
regex_stdlib, regex_tre, rewrite, sasl, sql_log, sql_oper, sqlite, ssl_gnutls,
ssl_openssl, xmlrpc, and xmlrpc_main modules.
Updated the Dutch translation.
Updated the French translation.

ChangeLog:

* Sat Feb 17 2024 Robert Scheck  2.1.2-1
- Upgrade to 2.1.2 (#2264678)
* Mon Jan 22 2024 Fedora Release Engineering  - 
2.1.1-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Fri Jan 19 2024 Fedora Release Engineering  - 
2.1.1-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild

References:

  [ 1 ] Bug #2264678 - anope-2.1.2 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2264678




 bgpq4-1.12-1.el7 (FEDORA-EPEL-2024-de802bd6d9)
 Automate BGP filter generation based on routing database information

Update Information:

bgpq4 1.12
Fix a bug in the MikroTik printer

ChangeLog:

* Sat Feb 17 2024 Robert Scheck  1.12-1
- Upgrade to 1.12 (#2263974)
* Tue Jan 23 2024 Fedora Release Engineering  - 1.11-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Fri Jan 19 2024 Fedora Release Engineering  - 1.11-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Wed Jul 19 2023 Fedora Release Engineering  - 1.11-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild

References:

  [ 1 ] Bug #2263974 - bgpq4-1.12 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2263974


--
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Feedback wanted - pruning old rawhide chroots in Copr

2024-02-18 Thread Sérgio Basto
On Sun, 2024-02-18 at 23:45 +0100, Fabio Valentini wrote:
> On Sun, Feb 18, 2024 at 4:25 PM Michael J Gruber
>  wrote:
> > 
> 
> (snip)
> 
> > 
> > I see this somehow connected to the discussion about signing keys
> > that
> > we had recently. A radical solution would be: branch rawhide, not
> > from
> > rawhide. So, at the "F40 branch point we had last week", we would:
> > - switch the "alias" rawhide from "meaning f40" to "meaning f41"
> > - rename rawhide chroots to f40 in copr
> > - set up new rawhide chroots ("follow [up] fedora branching")
> > 
> > In most cases, "forked" packages in copr are misleading - they are
> > in
> > a chroot without having been built against any version of it.
> > 
> > copr users would have to hit "rebuild", which should be OK.
> 
> I like this idea. Move things that were built for "rawhide" into the
> "fedora-40" chroot, and start Rawhide empty, requiring fresh builds
> of
> things.
> Since there is no equivalent to the mass rebuild in COPR, that would
> also solve the problem of "stale" packages in Rawhide chroots.


I like the idea , instead Fedora 40 have the fork of rawhide build, it
became rawhide that have the fork of Fedora 40 build ... 


I realize if build have {?dist} macro is easy if it is 3 or 4 release
old can be deleted . 
And if not have {?dist} macro  , they have the build date ... 

for example
https://download.copr.fedorainfracloud.org/results/sergiomb/SambaAD/fedora-rawhide-x86_64/01177931-samba/

> Fabio
> --
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines:
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue

-- 
Sérgio M. B.
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Feedback wanted - pruning old rawhide chroots in Copr

2024-02-18 Thread Fabio Valentini
On Sun, Feb 18, 2024 at 4:25 PM Michael J Gruber  wrote:
>

(snip)

>
> I see this somehow connected to the discussion about signing keys that
> we had recently. A radical solution would be: branch rawhide, not from
> rawhide. So, at the "F40 branch point we had last week", we would:
> - switch the "alias" rawhide from "meaning f40" to "meaning f41"
> - rename rawhide chroots to f40 in copr
> - set up new rawhide chroots ("follow [up] fedora branching")
>
> In most cases, "forked" packages in copr are misleading - they are in
> a chroot without having been built against any version of it.
>
> copr users would have to hit "rebuild", which should be OK.

I like this idea. Move things that were built for "rawhide" into the
"fedora-40" chroot, and start Rawhide empty, requiring fresh builds of
things.
Since there is no equivalent to the mass rebuild in COPR, that would
also solve the problem of "stale" packages in Rawhide chroots.

Fabio
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Upgrade to Sundials-6.7.0

2024-02-18 Thread Antonio T. sagitter

Hi all.

Next release of Sundials is coming in Rawhide in some days.
Related dependent packages are:

cantera
octave
bout++

Probably, the following one will be a major release (the 7.0)

Best regards.
--
---
Antonio Trande
Fedora Project
https://fedoraproject.org/wiki/User:Sagitter
mailto: sagit...@fedoraproject.org
GPG key: 0x40FDA7B70789A9CD
GPG keys server: https://keys.openpgp.org/


OpenPGP_signature.asc
Description: OpenPGP digital signature
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Feedback wanted - pruning old rawhide chroots in Copr

2024-02-18 Thread Miro Hrončok

On 18. 02. 24 13:54, Miroslav Suchý wrote:
In Copr build system, we noticed that Fedora rawhide chroots can became large 
and they stay forever as rawhide is never EOLed.
We plan to work on this soon, but we are not sure what is best approach. I want 
to ask you - the users of Copr - what will be convenient for you?


The problem is described here https://github.com/fedora-copr/copr/issues/2933

tl;dr version is:

  * when you build into fedora-39 chroot then the chroot is one day declared as 
EOLed and if you did not act, then the chroot from the project is deleted and 
we reclaim the storage space.


  * when you build into rawhide chroot, then we keep last builds. Even if you 
do not submit to this project anything for years, we still keep this chroot. 
And such chroots can occupy gigabytes of storage.



The problem is that builds in the rawhide can be packaged configs, and they can 
be still usable despite the fact that no one rebuilds the RPM for years. Or it 
can be forgotten build that is not even installable in current chroot. We do 
not know. And testing installability of package regularly will be expensive task.


What **you** would find as acceptable policy for pruning rawhide chroots?



If a build wasn't done in the copr chroot for long time, I would consider it 
acceptable to get a notification that my chroot will be purged unless I take an 
action. I think the EOLed chroots behave similarly, correct?


A long time could be defined as a fixed period (e.g. 1 year, 2 years), or by 
the meaning of rawhide (e.g. when the last build was done when rawhide was the 
Fedora that goes EOL now, consider this rawhide chroot for purging).



Are there other chroots with the same problems? opensuse-tumbleweed, 
openmandriva-cooker, openmandriva-rolling, mageia-cauldron...


--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Feedback wanted - pruning old rawhide chroots in Copr

2024-02-18 Thread Michael J Gruber
Am So., 18. Feb. 2024 um 13:54 Uhr schrieb Miroslav Suchý :
>
> In Copr build system, we noticed that Fedora rawhide chroots can became large 
> and they stay forever as rawhide is never
> EOLed.
> We plan to work on this soon, but we are not sure what is best approach. I 
> want to ask you - the users of Copr - what
> will be convenient for you?
>
> The problem is described here https://github.com/fedora-copr/copr/issues/2933
>
> tl;dr version is:
>
>   * when you build into fedora-39 chroot then the chroot is one day declared 
> as EOLed and if you did not act, then the
> chroot from the project is deleted and we reclaim the storage space.
>
>   * when you build into rawhide chroot, then we keep last builds. Even if you 
> do not submit to this project anything for
> years, we still keep this chroot. And such chroots can occupy gigabytes of 
> storage.
>
>
> The problem is that builds in the rawhide can be packaged configs, and they 
> can be still usable despite the fact that no
> one rebuilds the RPM for years. Or it can be forgotten build that is not even 
> installable in current chroot. We do not
> know. And testing installability of package regularly will be expensive task.
>
> What **you** would find as acceptable policy for pruning rawhide chroots?

I see this somehow connected to the discussion about signing keys that
we had recently. A radical solution would be: branch rawhide, not from
rawhide. So, at the "F40 branch point we had last week", we would:
- switch the "alias" rawhide from "meaning f40" to "meaning f41"
- rename rawhide chroots to f40 in copr
- set up new rawhide chroots ("follow [up] fedora branching")

In most cases, "forked" packages in copr are misleading - they are in
a chroot without having been built against any version of it.

copr users would have to hit "rebuild", which should be OK.

Michael
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Feedback wanted - pruning old rawhide chroots in Copr

2024-02-18 Thread Miroslav Suchý
In Copr build system, we noticed that Fedora rawhide chroots can became large and they stay forever as rawhide is never 
EOLed.
We plan to work on this soon, but we are not sure what is best approach. I want to ask you - the users of Copr - what 
will be convenient for you?


The problem is described here https://github.com/fedora-copr/copr/issues/2933

tl;dr version is:

 * when you build into fedora-39 chroot then the chroot is one day declared as EOLed and if you did not act, then the 
chroot from the project is deleted and we reclaim the storage space.


 * when you build into rawhide chroot, then we keep last builds. Even if you do not submit to this project anything for 
years, we still keep this chroot. And such chroots can occupy gigabytes of storage.



The problem is that builds in the rawhide can be packaged configs, and they can be still usable despite the fact that no 
one rebuilds the RPM for years. Or it can be forgotten build that is not even installable in current chroot. We do not 
know. And testing installability of package regularly will be expensive task.


What **you** would find as acceptable policy for pruning rawhide chroots?

--
Miroslav Suchy, RHCA
Red Hat, Manager, Packit and CPT, #brno, #fedora-buildsys
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: The semiannual "Transaction failed: Signature verification failed." exercise

2024-02-18 Thread Zbigniew Jędrzejewski-Szmek
On Fri, Feb 16, 2024 at 09:37:25AM -0800, Kevin Fenzi wrote:
> On Fri, Feb 16, 2024 at 11:12:07AM +, Zbigniew Jędrzejewski-Szmek wrote:
> > In my earlier message I quoted this case:
> > 
> > > [1] From 
> > > https://github.com/systemd/systemd/actions/runs/7919159325/job/21619276641?pr=31338:
> > >
> > > Running transaction
> > > Importing PGP key 0xA15B79CC:
> > >  Userid : "Fedora (40) "
> > >  Fingerprint: 115DF9AEF857853EE8445D0A0727707EA15B79CC
> > >  From   : 
> > > file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-rawhide-primary
> > > The key was successfully imported.
> > >
> > > Transaction failed: Signature verification failed.
> > > PGP check for package "filesystem-3.18-8.fc40.x86_64"
> > > (/var/cache/libdnf5/fedora-306b6523e9c8dc02/packages/filesystem-3.18-8.fc40.x86_64.rpm)
> > >  from
> > > repo "fedora" has failed: Import of the key didn't help, wrong key?
> > 
> > /usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-rawhide-primary
> > points to RPM-GPG-KEY-fedora-40-primary.
> > So everythould be fine, no? filesystem-3.18-8.fc40.x86_64 is clearly an F40
> > package, so it should be signed with the RPM-GPG-KEY-fedora-40-primary key.
> 
> Not really no. 
> 
> When we branch, the branched release gets all the already signed by
> fedora-40 key packages. Rawhide is completely re-signed with the new
> fedora-41 key. The dist tag of packages has nothing to do with it. 
> 
> So, day X, rawhide is all signed by fedora-40 key. 
> Day X+1 we branch and get a new rawhide compose and all rawhide is
> signed by the fedora-41 key.

Oh, OK. So it was a misunderstanding on my side. I thought that since e.g. F41
has a bunch of packages taken from F40 and F39 and earlier, they will be signed
by those respective keys. But we resign them, so they are not. (To make this
more confusing, on upgraded systems if the package version didn't change,
and it doesn't if the package isn't rebuilt, we have the old package signed
by the old key, while an "identical" package on a newer install will be signed
by a newer key. But that's all OK, once you know about the resigning.)

> > 2. How does this even work later on? Wouldn't F40 installations refuse
> >packages signed with the F41 key?
> 
> refuse where? dnf/dnf5 use the line in fedora-rawhide.repo that lists
> Both keys.

I meant that F_40_ installations don't allow the F41 key. (F41/rawhide 
installations
allow both, that is fine.)  But now I understand that F40 will get packages
signed by the F40 key, and F41/rawhide will get resigned packages. So all is OK.

> > 3. If F42 key has already been generated, why isn't it distributed in
> >distribution-gpg-keys already, to make it well known and make the
> >transition easier in the future?
> 
> It should have been. I am not sure where the process failed. 
> 
> I did generate the fedora-42 key.

Right. The key is there, and even distribution-gpg-keys package has in on F39.

So I think the whole issue can be solved by letting tools use
two keys for rawhide. The patch for mkosi was merged [1].
Should we do something similar for mock?

[1] 
https://github.com/systemd/mkosi/commit/f221562c945a48db9384f8521f67b9b02cd71ac1
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Fedora 40 compose report: 20240218.n.0 changes

2024-02-18 Thread Fedora Branched Report
OLD: Fedora-40-20240217.n.0
NEW: Fedora-40-20240218.n.0

= SUMMARY =
Added images:3
Dropped images:  2
Added packages:  6
Dropped packages:2
Upgraded packages:   54
Downgraded packages: 0

Size of added packages:  3.97 MiB
Size of dropped packages:54.00 KiB
Size of upgraded packages:   10.41 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   -426.30 KiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =
Image: Kinoite dvd-ostree x86_64
Path: Kinoite/x86_64/iso/Fedora-Kinoite-ostree-x86_64-40-20240218.n.0.iso
Image: Silverblue dvd-ostree x86_64
Path: Silverblue/x86_64/iso/Fedora-Silverblue-ostree-x86_64-40-20240218.n.0.iso
Image: Silverblue dvd-ostree ppc64le
Path: 
Silverblue/ppc64le/iso/Fedora-Silverblue-ostree-ppc64le-40-20240218.n.0.iso

= DROPPED IMAGES =
Image: Sericea dvd-ostree x86_64
Path: Sericea/x86_64/iso/Fedora-Sericea-ostree-x86_64-40-20240217.n.0.iso
Image: Silverblue dvd-ostree aarch64
Path: 
Silverblue/aarch64/iso/Fedora-Silverblue-ostree-aarch64-40-20240217.n.0.iso

= ADDED PACKAGES =
Package: config-kernel-0.3-1.fc40
Summary: An easy way to edit kernel configuration files and templates
RPMs:config-kernel
Size:275.81 KiB

Package: pkcs11test-0~20230418git2cbe462-1.fc40
Summary: PKCS#11 Test Suite
RPMs:pkcs11test
Size:1.05 MiB

Package: rust-app_dirs2-2.5.5-1.fc40
Summary: Put your app's data in the right place on every platform
RPMs:rust-app_dirs2+default-devel rust-app_dirs2-devel
Size:26.58 KiB

Package: rust-num-conv-0.1.0-1.fc40
Summary: Num_conv is a crate to convert between integer types without using as 
casts
RPMs:rust-num-conv+default-devel rust-num-conv-devel
Size:22.30 KiB

Package: rust-oxipng-9.0.0-1.fc40
Summary: Lossless PNG compression optimizer
RPMs:oxipng rust-oxipng+binary-devel rust-oxipng+clap-devel 
rust-oxipng+crossbeam-channel-devel rust-oxipng+default-devel 
rust-oxipng+env_logger-devel rust-oxipng+filetime-devel 
rust-oxipng+freestanding-devel rust-oxipng+image-devel 
rust-oxipng+parallel-devel rust-oxipng+rayon-devel 
rust-oxipng+sanity-checks-devel rust-oxipng+zopfli-devel rust-oxipng-devel
Size:2.58 MiB

Package: rust-sequoia-keystore-backend-0.1.0-1.fc40
Summary: Private key store for Sequoia
RPMs:rust-sequoia-keystore-backend+default-devel 
rust-sequoia-keystore-backend-devel
Size:29.29 KiB


= DROPPED PACKAGES =
Package: perl-Test-Vars-0.015-9.fc39
Summary: Detects unused variables
RPMs:perl-Test-Vars
Size:26.17 KiB

Package: rust-libssh2-sys0.2-0.2.23-3.fc40
Summary: Native bindings to the libssh2 library
RPMs:rust-libssh2-sys0.2+default-devel rust-libssh2-sys0.2-devel
Size:27.83 KiB


= UPGRADED PACKAGES =
Package:  adwaita-icon-theme-46~beta-1.fc40
Old package:  adwaita-icon-theme-46~alpha-2.fc40
Summary:  Adwaita icon theme
RPMs: adwaita-cursor-theme adwaita-icon-theme adwaita-icon-theme-devel
Size: 932.61 KiB
Size change:  8.73 KiB
Changelog:
  * Wed Feb 14 2024 David King  - 46~beta-1
  - Update to 46.beta


Package:  anope-2.1.2-1.fc40
Old package:  anope-2.1.1-3.fc40
Summary:  IRC services designed for flexibility and ease of use
RPMs: anope anope-gnutls anope-ldap anope-mysql anope-openssl 
anope-pcre2 anope-sqlite anope-tre
Size: 15.47 MiB
Size change:  194.62 KiB
Changelog:
  * Sat Feb 17 2024 Robert Scheck  2.1.2-1
  - Upgrade to 2.1.2 (#2264678)


Package:  apvlv-0.5.0-4.fc40
Old package:  apvlv-0.5.0-2.fc40
Summary:  PDF viewer which behaves like Vim
RPMs: apvlv
Size: 623.84 KiB
Size change:  826 B
Changelog:
  * Fri Jan 19 2024 Fedora Release Engineering  - 
0.5.0-3
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild

  * Mon Jan 22 2024 Fedora Release Engineering  - 
0.5.0-4
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild


Package:  ark-24.01.95-2.fc40
Old package:  ark-24.01.95-1.fc40
Summary:  Archive manager
RPMs: ark ark-libs
Size: 6.90 MiB
Size change:  -5.42 KiB
Changelog:
  * Sat Feb 17 2024 Jan Grulich  - 24.01.95-2
  - Rebuild (qt6)


Package:  at-spi2-core-2.51.90-1.fc40
Old package:  at-spi2-core-2.51.0-2.fc40
Summary:  Protocol definitions and daemon for D-Bus at-spi
RPMs: at-spi2-atk at-spi2-atk-devel at-spi2-core at-spi2-core-devel atk 
atk-devel
Size: 7.61 MiB
Size change:  1.19 MiB
Changelog:
  * Wed Feb 14 2024 David King  - 2.51.90-1
  - Update to 2.51.90


Package:  bgpq4-1.12-1.fc40
Old package:  bgpq4-1.11-4.fc40
Summary:  Automate BGP filter generation based on routing database 
information
RPMs: bgpq4
Size: 245.25 KiB
Size change:  719 B
Changelog:
  * Sat Feb 17 2024 Robert Scheck  1.12-1
  - Upgrade to 1.12 (#2263974)


Package:  boxes-2.3.0-1.fc40
Old package:  boxes-2.2.1-5.fc40
Summary:  Command line ASCII boxes unlimited!
RPMs: boxes boxes-vim
Size

Fedora rawhide compose report: 20240218.n.0 changes

2024-02-18 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20240217.n.2
NEW: Fedora-Rawhide-20240218.n.0

= SUMMARY =
Added images:4
Dropped images:  2
Added packages:  0
Dropped packages:1
Upgraded packages:   12
Downgraded packages: 0

Size of added packages:  0 B
Size of dropped packages:27.83 KiB
Size of upgraded packages:   9.54 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   -2.75 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =
Image: Kinoite dvd-ostree x86_64
Path: Kinoite/x86_64/iso/Fedora-Kinoite-ostree-x86_64-Rawhide-20240218.n.0.iso
Image: Silverblue dvd-ostree aarch64
Path: 
Silverblue/aarch64/iso/Fedora-Silverblue-ostree-aarch64-Rawhide-20240218.n.0.iso
Image: Budgie live x86_64
Path: Spins/x86_64/iso/Fedora-Budgie-Live-x86_64-Rawhide-20240218.n.0.iso
Image: Silverblue dvd-ostree x86_64
Path: 
Silverblue/x86_64/iso/Fedora-Silverblue-ostree-x86_64-Rawhide-20240218.n.0.iso

= DROPPED IMAGES =
Image: Silverblue dvd-ostree ppc64le
Path: 
Silverblue/ppc64le/iso/Fedora-Silverblue-ostree-ppc64le-Rawhide-20240217.n.2.iso
Image: Kinoite dvd-ostree ppc64le
Path: Kinoite/ppc64le/iso/Fedora-Kinoite-ostree-ppc64le-Rawhide-20240217.n.2.iso

= ADDED PACKAGES =

= DROPPED PACKAGES =
Package: rust-libssh2-sys0.2-0.2.23-3.fc40
Summary: Native bindings to the libssh2 library
RPMs:rust-libssh2-sys0.2+default-devel rust-libssh2-sys0.2-devel
Size:27.83 KiB


= UPGRADED PACKAGES =
Package:  anope-2.1.2-1.fc41
Old package:  anope-2.1.1-3.fc40
Summary:  IRC services designed for flexibility and ease of use
RPMs: anope anope-gnutls anope-ldap anope-mysql anope-openssl 
anope-pcre2 anope-sqlite anope-tre
Size: 15.47 MiB
Size change:  192.88 KiB
Changelog:
  * Sat Feb 17 2024 Robert Scheck  2.1.2-1
  - Upgrade to 2.1.2 (#2264678)


Package:  apvlv-0.5.0-4.fc41
Old package:  apvlv-0.5.0-2.fc40
Summary:  PDF viewer which behaves like Vim
RPMs: apvlv
Size: 623.86 KiB
Size change:  842 B
Changelog:
  * Fri Jan 19 2024 Fedora Release Engineering  - 
0.5.0-3
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild

  * Mon Jan 22 2024 Fedora Release Engineering  - 
0.5.0-4
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild


Package:  boxes-2.3.0-1.fc41
Old package:  boxes-2.2.1-5.fc40
Summary:  Command line ASCII boxes unlimited!
RPMs: boxes boxes-vim
Size: 394.33 KiB
Size change:  46.15 KiB
Changelog:
  * Sat Feb 17 2024 Artem Polishchuk  - 2.2.1-6
  - packit: Update config

  * Sat Feb 17 2024 Artem Polishchuk  - 2.3.0-1
  - [packit] 2.3.0 upstream release


Package:  byobu-6.12-1.fc41
Old package:  byobu-5.133-11.fc40
Summary:  Light-weight, configurable window manager built upon GNU screen
RPMs: byobu
Size: 173.88 KiB
Size change:  1.53 KiB
Changelog:
  * Sun Feb 18 2024 Filipe Rosset  - 6.12-1
  - Update byobu to 6.12


Package:  cpeditor-7.0.1-2.fc41
Old package:  cpeditor-6.10.3-4.fc40
Summary:  The Missing Editor for Competitive Programmers
RPMs: cpeditor
Size: 3.86 MiB
Size change:  317.15 KiB
Changelog:
  * Sun Feb 18 2024 Felix Wang  - 7.0.1-1
  - update to 7.0.1

  * Sun Feb 18 2024 Felix Wang  - 7.0.1-2
  - license correction; remove unneeded source code


Package:  dgit-11.6-1.fc41
Old package:  dgit-11.3-3.fc40
Summary:  Integration between git and Debian-style archives
RPMs: dgit
Size: 199.23 KiB
Size change:  954 B
Changelog:
  * Sun Feb 18 2024 Filipe Rosset  - 11.6-1
  - update dgit to 11.6 fixes rbhz#2246899


Package:  golang-bug-serial-1-1.6.2-1.fc41
Old package:  golang-bug-serial-1-1.6.1-3.fc40
Summary:  Cross-platform serial library for Golang
RPMs: golang-bug-serial-1 golang-bug-serial-devel
Size: 2.71 MiB
Size change:  94.32 KiB
Changelog:
  * Sun Feb 11 2024 Maxwell G  - 1.6.1-4
  - Rebuild for golang 1.22.0

  * Sun Feb 18 2024 Elliott Sales de Andrade  - 
1.6.2-1
  - Update to latest version (#2264655)


Package:  java-latest-openjdk-portable-1:22.0.0.0.36-0.2.ea.rolling.fc41
Old package:  java-latest-openjdk-portable-1:22.0.0.0.32-0.2.ea.rolling.fc40
Summary:  OpenJDK 22 Runtime Environment portable edition
RPMs: java-latest-openjdk-portable java-latest-openjdk-portable-devel 
java-latest-openjdk-portable-devel-fastdebug 
java-latest-openjdk-portable-devel-slowdebug java-latest-openjdk-portable-docs 
java-latest-openjdk-portable-fastdebug java-latest-openjdk-portable-misc 
java-latest-openjdk-portable-slowdebug java-latest-openjdk-portable-sources 
java-latest-openjdk-portable-static-libs 
java-latest-openjdk-portable-static-libs-fastdebug 
java-latest-openjdk-portable-static-libs-slowdebug 
java-latest-openjdk-portable-unstripped
Size: 9.51 GiB
Size change:  -3.37 MiB
Changelog:
  * Fri Feb 16 2024 Jiri Vanek  - 1:22.0.0.0.36-1.rolling
  - updated to 22+36
  - tmp comment out of ea exit 17

Re: Help with creating first PR for a package

2024-02-18 Thread Priscila Gutierres
I created this post based on my own experience:
https://dev.to/prinewgirl/a-recipe-made-to-create-your-first-pr-for-the-fedora-project-21be
Hope it helps.

Em dom., 18 de fev. de 2024 às 05:32, Ondrej Mosnáček 
escreveu:

> On Sun, 18 Feb 2024 at 09:23, Kan-Ru Chen  wrote:
> >
> > Hi,
> >
> > On Sun, Feb 18, 2024, at 10:52 AM, Loren M. Lang wrote:
> > > I've cloned it down and worked on bringing it more up-to-date. Now that
> > > I have something passing the test suite, I thought I'd file a PR and
> > > start a discussion. I forked the project on Pagure.io, but found that
> > > even with my own personal fork, I don't seem to have commit access to
> it
> > > without being in the Packagers group. Is that standard? I thought the
> > > point of the fork was to allow non-packagers to use the PR mechanism as
> > > an easy mechanism for sponsors to view proposals.
> > >
> > > In any case, I decided to through it up on GitHub temporarily so I
> could
> > > at least create a Remote PR.
> > >
> > > https://src.fedoraproject.org/rpms/python-cachelib/pull-request/6
> >
> > I have recently done this. You need to use fedpkg to clone the
> repository then
> > it will setup the hook for authentication with FAS.
> >
> > For example if you have fork at `fork/penguin359/rpms/python-cachelib`
> then use
> > this command to clone
> >
> > fedpkg clone -a forks/penguin359/rpms/python-cachelib
> >
> > then in the cloned repo you can push normally.
>
> FWIW. it is documented here:
>
> https://docs.fedoraproject.org/en-US/ci/pull-requests/#_you_are_not_a_packager
> --
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Help with creating first PR for a package

2024-02-18 Thread Ondrej Mosnáček
On Sun, 18 Feb 2024 at 09:23, Kan-Ru Chen  wrote:
>
> Hi,
>
> On Sun, Feb 18, 2024, at 10:52 AM, Loren M. Lang wrote:
> > I've cloned it down and worked on bringing it more up-to-date. Now that
> > I have something passing the test suite, I thought I'd file a PR and
> > start a discussion. I forked the project on Pagure.io, but found that
> > even with my own personal fork, I don't seem to have commit access to it
> > without being in the Packagers group. Is that standard? I thought the
> > point of the fork was to allow non-packagers to use the PR mechanism as
> > an easy mechanism for sponsors to view proposals.
> >
> > In any case, I decided to through it up on GitHub temporarily so I could
> > at least create a Remote PR.
> >
> > https://src.fedoraproject.org/rpms/python-cachelib/pull-request/6
>
> I have recently done this. You need to use fedpkg to clone the repository then
> it will setup the hook for authentication with FAS.
>
> For example if you have fork at `fork/penguin359/rpms/python-cachelib` then 
> use
> this command to clone
>
> fedpkg clone -a forks/penguin359/rpms/python-cachelib
>
> then in the cloned repo you can push normally.

FWIW. it is documented here:
https://docs.fedoraproject.org/en-US/ci/pull-requests/#_you_are_not_a_packager
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Help with creating first PR for a package

2024-02-18 Thread Kan-Ru Chen
Hi,

On Sun, Feb 18, 2024, at 10:52 AM, Loren M. Lang wrote:
> I've cloned it down and worked on bringing it more up-to-date. Now that
> I have something passing the test suite, I thought I'd file a PR and
> start a discussion. I forked the project on Pagure.io, but found that
> even with my own personal fork, I don't seem to have commit access to it
> without being in the Packagers group. Is that standard? I thought the
> point of the fork was to allow non-packagers to use the PR mechanism as
> an easy mechanism for sponsors to view proposals.
>
> In any case, I decided to through it up on GitHub temporarily so I could
> at least create a Remote PR.
>
> https://src.fedoraproject.org/rpms/python-cachelib/pull-request/6

I have recently done this. You need to use fedpkg to clone the repository then
it will setup the hook for authentication with FAS.

For example if you have fork at `fork/penguin359/rpms/python-cachelib` then use
this command to clone

fedpkg clone -a forks/penguin359/rpms/python-cachelib

then in the cloned repo you can push normally.

Cheers,
Kan-Ru
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue