s390x chroots added to Copr

2020-07-28 Thread R P Herrold
On Tue, 28 Jul 2020, Silvie Chlupova wrote:

> Epel 7 isn't built for s390x architecture at all, so we don't have the
> needed mirrors to build against.  It will not be enabled.

The ClefOS 7 binaries include all of EPEL 7 and more

http://download.sinenomine.net/clefos/epel7/

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: CPE Weekly: 2020-04-04

2020-04-06 Thread R P Herrold
On Mon, 6 Apr 2020, Leigh Griffin wrote:

> We cannot take the view of a singular person and make changes based on
> that, we defer to them for prioritisation and their input. That's how the

But, having reviewed the 'wishlist' of criteria quoted last 
week, [in the thread with Ben Cotton's message last Friday -- 
I believe the URL to the list directly was posted in the 
thread: CPE Git Forge Decision, but cannot lay my hands on it 
presently], it very obviously had not been winnowed down or 
curated down into any sort of rank order priority, or even 
something as simple as an Agile set of cards, sorted into 
stacks:

- Must be present, showstopper if absent
- Expected, but not critical if absent
- Nice to have, but 'neh'

... so that task decomposition could proceed.  If it had been 
openly done, with actual stakeholders at the table, the 'Must 
be free sources' criteria would have been in that top pile, 
and remained there.  Without that 'polestar', other criteria 
were treated as critical

As an outsider (from CentOS 1 era), who votes in each Fedora 
election, it looks as a non-transparent result is being 
'justified' ex post

If there are unacceptible non-Free parts at Gitlab to the 
Fedora vision of attainable via no non-freely licensed 
package, I'd be studying how to relieve the non-free 
constraints in Gitlab, rather than 'fighting City Hall'

Just my thoughts,

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Embedded font support for PDFs is lacking; response to: Fonts packaging guidelines change status

2020-03-16 Thread R P Herrold

Subject: Fonts packaging guidelines change status

On Sat, 7 Mar 2020, Nicolas Mailhot wrote:

> WHAT IS IT ALL ABOUT
> 
> On 2020-02-13, FPC approved a rewrite of our fonts packaging
> guidelines.

and again that was published on the 14th removing some top 
matter through the Section mark: NEW PACKAGES STILL PENDING 
REVIEW, and advancing PR status on a couple of fonts

But this question in the fonts-list was not addressed (see 
the bottom of this resend to include the devel list):

Is a formal 'bug' needed to track this ?


Background:

That re-write draft as included does not address PDF 
portability

The Fedora most recent prior approach on fonts neglected 
explicitly supporting the need of Latex chain created 
documents for type 1 fonts to be embedded in PDFs.  

From raising this issue previously, it is my understanding 
that Type 1 fonts are felt to not screen render as well as 
some later alternatives, but when it comes to generating a 
Portable Document to reliably render 'the same', one HAS to 
carry and prefer embedded fonts when present


Detection of the issue, and Problem summarized:

When one is missing fonts, and runs something like:

dvips -t letter -Ppdf -G0 -j0 mypaper.dvi \
-o mypaper.ps

one will get a 'missfont.log' as to an inability to embed a 
required font, 'required' for completeness for portability 
purposes 


See the discussion at:
https://helpx.adobe.com/acrobat/using/pdf-fonts.html

and its practical implication is discussed at:
https://blogs.adobe.com/acrolaw/2007/11/pdf_creation_and_font_embedding/


The TL;DR takeaway is:

The USPTO requires that PDF must be:

Acrobat 4 (PDF 1.3) or higher
(See note at end of article)
No larger than 8.5? by 11? or A4 page size
Have all fonts embedded and subset


It is not JUST preparation of documents for filing there, but 
also for submitting 'camera ready PDF copy' to Lulu print on 
demand.  Lulu is a child of Robert Young [a serial 
entrepreneur who is best known for founding Red Hat Inc]

https://connect.lulu.com/en/discussion/33148


https://connect.lulu.com/en/discussion/33681/pdf-creation-settings-how-can-i-be-sure-my-pdf-will-print-correctly

pull requirement: All fonts should be converted 
to outlines and embedded 


Way forward:

There is a collection of 13 fonts provided under a freely 
reproducible license from Adobe, known as the Base 13 fonts

- Courier, Courier-Bold, Courier-Oblique & Courier-BoldOblique
- Times-Roman , Times-Bold , Times-Italic & Times-BoldItalic
- Helvetica, Helvetica-Bold, Helvetica-Oblique & 
Helvetica-BoldOblique
- Symbol

[ but not: - ZapfDingbats ]


I understand that they were removed from Fedora, as the Base 
13 are Type 1 fonts  but dang it, at least for purposes of 
completeness to be able to generate legal documents, and to 
permit me to continue to use FOSS tools to publish for 
fulfillment at Lulu, can we get these Type 1 fonts back, 
regardless of slight risk of aesthetic discontent ?


Is a formal 'bug' needed to track this ?

Thank you

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: s390x builder problem? disk full, or ?

2020-02-19 Thread R P Herrold
On Wed, 19 Feb 2020, Kaleb Keithley wrote:

long ago
diskcheck
was in Centos 2, and early Fedora
/var/ftp/pub/nfs/mirror/redhat/fedora/1/SRPMS/diskcheck-1.4-5.src.rpm

Why not build and install it so the admins would get warnings 
?

Also, when a build fails for:
error: create archive failed on file  
cpio: write failed - No space left on device

why not also emit a fedbus, or related message ?

-- Russ herrold



___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: More than 10% of all Fedora spec files are not POSIX sh compliant

2019-03-25 Thread R P Herrold
On Mon, 25 Mar 2019, Kevin Fenzi wrote:

> > explicit in this way instead of having the default be sh, but then tell
> > people sh must be bash?
> 
> Doesn't bash behave slightly differently when invoked as 'sh' ?

bash behaviour has changed [1] over time --- /bin/sh is fixed 
in behaviour

It is pretty clear that feaping creaturitis is in play with 
the bash developer -- an addition (recently) of an inbuilt 
'seq' primitive was a surprise to me; lots of 'undocumented' 
behaviours discussed, and some 'promoted' to being documented.  
May one rely on undocumented behaviours?

-- Russ herrold

1. https://tiswww.case.edu/php/chet/bash/CHANGES

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[EPEL-devel] Re: missing -devel packages in 8 beta

2018-12-12 Thread R P Herrold
On Tue, 11 Dec 2018, Dave Love wrote:

> Obviously I can do that and set up a repo for use with mock, but you
> surely don't expect all package maintainers to do that.

when it is testing a Beta in a new Major, I do not feel that 
is an unreasonable expectation

There is also a .repo file which you may find useful at the 
URL mentioned in a moment
 
> > I see later in the thread the suggestion to file a boog
> >
> > done:
> > https://bugzilla.redhat.com/show_bug.cgi?id=1657930
 
> What's that reporting, as it's not visible?

That is an unexpected behaviour, new since the Bugzilla reqork 
in the last few days, and with no obvious way to 'unlock' it 
on my part as Reporter ;(

Anyone wanting to view it send me, off list, their RH 
bugzilla account email address, and mention of this bug nuber, 
and I will add as a 'cc' --- there is nothing 'secret' there 
;)

I requested access to sources , and bug assignee Josh was kind 
enough to point to:
ftp://ftp.redhat.com/redhat/rhel/rhel-8-beta/

which are populated down sub links:

49M add-ons/ha/source/Packages/
49M add-ons/rs/source/Packages/
192Madd-ons/rt/source/Packages/
8.9Gappstream/source/Packages/
1.4Gbaseos/source/Packages/

-- Russ herrold
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org


[EPEL-devel] missing -devel packages in 8 beta

2018-12-10 Thread R P Herrold
On Mon, 10 Dec 2018, Dave Love wrote:

> Does anyone know what the situation is with -devel packages in RHEL8
> beta?  Many seem to be missing, so it's difficult to test EPEL builds
> for 8, and you can't necessarily rebuild ones that are shipped in the
> distribution; an example is openmpi, with most of the BRs missing.  (I
> can't even do useful chain builds because that's failing for chains of
> three, which I should try to debug.)

There are yum archves to enable per the release notice;  also, 
DVD ISOs are available to retrieve and loop mount

What particular -devel are you seeking?  Is it 
non-versioned, such that you can work-around 
with an earlier one?

Customarily I would just bootstrap forward to a needed leaf 
node package from the sources ... That said, I don't find a 
SRPMs' DVD.  Sort of a strange omission in light of the making 
available of binary RPMs

I see later in the thread the suggestion to file a boog

done:
https://bugzilla.redhat.com/show_bug.cgi?id=1657930

-- Russ herrold
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org


Re: Fedora should replace mailing lists with Discourse

2018-10-19 Thread R P Herrold
On Fri, 19 Oct 2018, Chris Adams wrote:

> Once upon a time, R P Herrold  said:
> > This seems very tone deaf and lacking in introspection, Matt
> > 
> > perhaps by reading the subject line you chose to start this 
> > thread with
> 
> Matt didn't choose that - that subject was set by Gerald B. Cox.

If you say so (and I have no reason to doubt, but cannot 
confirm, so: sorry for the mis-attribution, Matt) ... at the 
URL in your email message headers is a link to:


https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/KXPPKQNLJ6SZBUHKBMLB4OZY7WA77FGP/

Perma-link:

https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/3MZCLLM47LIO6LFJC33RIFJHTIKQPFWP/#KXPPKQNLJ6SZBUHKBMLB4OZY7WA77FGP

and at that page, the link titled ' Back to the thread ' 
points into a wholly different discussion


https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/3MZCLLM47LIO6LFJC33RIFJHTIKQPFWP/#KXPPKQNLJ6SZBUHKBMLB4OZY7WA77FGP

One more reason to dislike KyperKitty hashes over pipermail 

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora should replace mailing lists with Discourse

2018-10-19 Thread R P Herrold
On Fri, 19 Oct 2018, Matthew Miller wrote:

>> Neal Gompa: 
>> because you're dead set on this anyway.

> Matt Miller:
> I ... don't know how to engage constructively with this accusation, because
> it it seems to come from absolutely nowhere. Yes, we're *definitely* trying

This seems very tone deaf and lacking in introspection, Matt

perhaps by reading the subject line you chose to start this 
thread with

No mention of trying out, no mention of a trial.  Just the 
usual 'this is a done deal' announcement on an extremely high 
volume mailing list

I had trialled Discourse six months ago, leaving it on for 
days at a time.  The web client had a leak down in it 
somewhere, My baseline load average went up and I ended up 
with a frozen web browser once all free ram and swap was 
exhausted.  Migrate or not as you wish, it will simply be 
another place where Fedoraproject went off the tracks, chasing 
a mythical low involvement 'tire kicker' instead of supporting 
developers using mature tools and technologies (mailing lists, 
bugzilla, procmail sorting, mutt or alpine)


The non-migratation capabilities of early MM3 efforts have 
been detailed earlier in this thread.  Hyperkitty pretends a 
33 character hash conveys more information than the MM2 model 
for pipermail, or say: MMDD-, but no-one was willing 
to critique a bad choice

Pagure is great and all, but I recall filing a bug ... 
somewhere ... pagure, git, how knows ... about a cross-site 
inter-panel info leak, but there is no SPOT -- single point of 
truth -- in Fedora's hall of mirrors to find it later ad hoc.  
That does not happen with Bugzilla as I have a portfolio of 
several dozen custom searches that would reveal it to me with 
a couple clicks

But charging off to a new shiny hill seems more important to 
Fedoraproject

** shrug **

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Guideline change: glibc malloc as the C/C++/Rust allocator

2018-07-30 Thread R P Herrold
On Mon, 30 Jul 2018, Jonathan Wakely wrote:

> On 26/07/18 12:45 -0400, R P Herrold wrote:

> > The use here of 'interpose' is unclear to me -- are you saying
> > 'substitute a different' ?
> 
> The usual way to replace 'malloc' is via ELF symbol interposition:
> https://www.airs.com/blog/archives/307

noted -- thank you

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/GIOFBZ6H233YYWKPK6HRBDB6EFYT3NSM/


Re: Guideline change: glibc malloc as the C/C++/Rust allocator

2018-07-26 Thread R P Herrold
On Thu, 26 Jul 2018, Florian Weimer wrote:

> > Could you please mention a couple of bugs where this is shown?
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=1237260
> https://bugzilla.redhat.com/show_bug.cgi?id=1303323
> http://www.erahm.org/2016/03/24/minimum-alignment-of-allocation-across-platforms/

thank you !!

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/E55QFSM7IMU2SJF2NRXXH4XUF2DY2PEO/


Guideline change: glibc malloc as the C/C++/Rust allocator

2018-07-26 Thread R P Herrold
On Thu, 26 Jul 2018, Florian Weimer wrote:

> I would like to request a change of the Packaging Guidelines, advising
> packagers not to interpose malloc.

The use here of 'interpose' is unclear to me -- are you saying 
'substitute a different' ?

> The reasons are:
> 
> * We have resources to support glibc malloc, but not for other mallocs.
> * Other mallocs  do not follow ABI and provide insufficient alignment.
> * Choosing a malloc is workload-dependent and forcing a non-default
>   malloc takes options away from system administrators.

Could you please mention a couple of bugs where this is shown?

Thank you

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/LGKMQWIVDFF3BP6PIITZZWLZG2BN4FSO/


Orphan packages will be retired if they remain orphaned for six weeks"

2018-07-26 Thread R P Herrold
On Thu, 26 Jul 2018, Miro Hrončok wrote:

> Is $subj [1] an automated or manual process? Shall I retire packages I've
> orphaned before more weeks or just wait?
> 
> [1] https://fedoraproject.org/wiki/Orphaned_package_that_need_new_maintainers

NONE of the outlinks to the actual packages at: 

Lists of Orphan and Retired Packages
[ RH, EPEL 5, EPEL 6, or EPEL 7 ]

actually work, of course  (links as on that page, below)

I think proceeding is premature, when a person cannot in good 
faith, review what is to be dropped

-- Russ herrold


https://admin.fedoraproject.org/pkgdb/orphaned/?status=Orphaned=master

https://admin.fedoraproject.org/pkgdb/orphaned/?status=Orphaned=el5

https://admin.fedoraproject.org/pkgdb/orphaned/?status=Orphaned=el6

https://admin.fedoraproject.org/pkgdb/orphaned/?status=Orphaned=epel7
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/PKSL2OQOXDDMEQ6OHLCOTNP3EKTNFJJE/


Re: [EPEL-devel] Re: python 2 retirement commo efforts

2018-07-19 Thread R P Herrold
On Thu, 19 Jul 2018, Miro Hrončok wrote:

> > The ** POINT ** of producing such a report is to  'put
> > numbers' on the scope of the work rather than loose armwaving
> > assertions such as:
> > 
> > > Fedora still has more than 3000 packages depending on
> > > python2 – many more than we can support without upstream
> > > help.
> 
> Those are real Fedora numbers [0]. No armwaving involved.
> 
> 1311 python2 only packages
> 1734 python2+python3 packages
> + 88 with packaging problem where I'm not sure
> 
> That is something between 3045 and 3133. That can be rounded to 3k.
> 
> No idea why we moved the discussion to another list as well, but stop accusing
> us from armwaving. We have data (for Fedora, because that where we started the
> discussion). As for RHEL/EPEL: current ones can remain as they are. Future
> ones see [1].

"accusing" ?  I think it is pretty clear that more than a 
little projection is going on here.  I offered a description 
of methodology, hard numbers on six archives, and the 
generation script to nail down numbers.  Before your most 
recent email,  nope

The _reason_ that it was off an EPEL thread (EPEL of course 
being PART OF FEDORAPROJECT, last time I looked) is that is 
the harder one to solve, and also there was a thread going as 
to planning a meeting, of which that hard data was a part


If I go to a car dealer and seek to buy a car and ask a price, 
and am told by the salesperson:

"more than 3000" dollars

they have not yet not told me a price they will sell the car 
at

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/E4FYVZMRWLMIQ6L7PIJMBV6R2K4GMD7C/


Re: python 2 retirement commo efforts

2018-07-18 Thread R P Herrold
On Tue, 17 Jul 2018, R P Herrold wrote:

> I've poked at getting accurate counts and manifests of unique 
> python(2) package SRPMs off my mirror today -- I'll supplement 
> this email with the script and links to the mainfests 
> tomorrow.  A 'sort | uniq' let me down as to getting an 
> accurate count released today

tomorrow arrived on me,  but here are the promised report and 
links to the results and the generator script

[/share/MD0_DATA/Mirror/lftp] # time ./stats.sh
# packages starting with target: python 
#   but NOT python3 
#   collated from a mirror: 20180718 

264 /tmp/redhat_rhel_SRPMSonly_6Server.txt
475 /tmp/redhat_rhel_SRPMSonly_7Server.txt
644 /tmp/redhat_epel_6.txt
825 /tmp/redhat_epel_7.txt
   2776 /tmp/redhat_fedora_fedora-28.txt
   2132 /tmp/redhat_rawhide2017.txt

real64m28.714s
user1m11.330s
sys 3m6.450s


The first column is the number of unique SRPMs for a given 
archive, seen.  Inside the files (the link of which is my 
second column and the basename of which is accessible per the 
links below) are detail counts of the number for each distinct 
SRPMs within a given package name, as seen on a local private 
mirror I use and maintain


Copies of the detail, and of the script producing the 
reports are at:

http://gallery.herrold.com/stuff/redhat_rhel_SRPMSonly_6Server.txt
http://gallery.herrold.com/stuff/redhat_rhel_SRPMSonly_7Server.txt
http://gallery.herrold.com/stuff/redhat_epel_6.txt
http://gallery.herrold.com/stuff/redhat_epel_7.txt
http://gallery.herrold.com/stuff/redhat_fedora_fedora-28.txt
http://gallery.herrold.com/stuff/redhat_rawhide2017.txt

http://gallery.herrold.com/stuff/stats.sh


The _purpose_ of getting the count of 'number of updated 
packages' for each given package is to permit seeing 'hot 
spots', and the 'no issues' 'build once and forget' packages 
particularly in RHEL and EPEL.  Because of the way that 
current Fedora and RawHide are built, there is churn on 
rebuilds, even with non-material internal changes.  THe 


The ** POINT ** of producing such a report is to  'put 
numbers' on the scope of the work rather than loose armwaving 
assertions such as:

> Fedora still has more than 3000 packages depending on 
> python2 – many more than we can support without upstream 
> help.

I did not try to structure and run a report to try to 
enumerate and count by dependencies.  Looking at the 
problem with such a statistic, as to 'upstream' 'keystone' 
packages will, I suspect, show that many of the dependencies 
almost certainly 'cluster around a few 'branch' packages

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/W6XBLTIY5QLTSU4FBRDXHA3UCEH4PL43/


[EPEL-devel] Re: python 2 retirement commo efforts

2018-07-18 Thread R P Herrold
On Tue, 17 Jul 2018, R P Herrold wrote:

> I've poked at getting accurate counts and manifests of unique 
> python(2) package SRPMs off my mirror today -- I'll supplement 
> this email with the script and links to the mainfests 
> tomorrow.  A 'sort | uniq' let me down as to getting an 
> accurate count released today

tomorrow arrived on me,  but here are the promised report and 
links to the results and the generator script

[/share/MD0_DATA/Mirror/lftp] # time ./stats.sh
# packages starting with target: python 
#   but NOT python3 
#   collated from a mirror: 20180718 

264 /tmp/redhat_rhel_SRPMSonly_6Server.txt
475 /tmp/redhat_rhel_SRPMSonly_7Server.txt
644 /tmp/redhat_epel_6.txt
825 /tmp/redhat_epel_7.txt
   2776 /tmp/redhat_fedora_fedora-28.txt
   2132 /tmp/redhat_rawhide2017.txt

real64m28.714s
user1m11.330s
sys 3m6.450s


The first column is the number of unique SRPMs for a given 
archive, seen.  Inside the files (the link of which is my 
second column and the basename of which is accessible per the 
links below) are detail counts of the number for each distinct 
SRPMs within a given package name, as seen on a local private 
mirror I use and maintain


Copies of the detail, and of the script producing the 
reports are at:

http://gallery.herrold.com/stuff/redhat_rhel_SRPMSonly_6Server.txt
http://gallery.herrold.com/stuff/redhat_rhel_SRPMSonly_7Server.txt
http://gallery.herrold.com/stuff/redhat_epel_6.txt
http://gallery.herrold.com/stuff/redhat_epel_7.txt
http://gallery.herrold.com/stuff/redhat_fedora_fedora-28.txt
http://gallery.herrold.com/stuff/redhat_rawhide2017.txt

http://gallery.herrold.com/stuff/stats.sh


The _purpose_ of getting the count of 'number of updated 
packages' for each given package is to permit seeing 'hot 
spots', and the 'no issues' 'build once and forget' packages 
particularly in RHEL and EPEL.  Because of the way that 
current Fedora and RawHide are built, there is churn on 
rebuilds, even with non-material internal changes.  THe 


The ** POINT ** of producing such a report is to  'put 
numbers' on the scope of the work rather than loose armwaving 
assertions such as:

> Fedora still has more than 3000 packages depending on 
> python2 – many more than we can support without upstream 
> help.

I did not try to structure and run a report to try to 
enumerate and count by dependencies.  Looking at the 
problem with such a statistic, as to 'upstream' 'keystone' 
packages will, I suspect, show that many of the dependencies 
almost certainly 'cluster around a few 'branch' packages

-- Russ herrold
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org/message/W6XBLTIY5QLTSU4FBRDXHA3UCEH4PL43/


[EPEL-devel] Re: python 2 retirement commo efforts

2018-07-17 Thread R P Herrold
On Tue, 17 Jul 2018, Kevin Fenzi wrote:

> I'm confused here. I doubt very much RHEL is going to drop 
> python2 from rhel7. Thus epel7 packages should be able to go 
> on as they have...

I've poked at getting accurate counts and manifests of unique 
python(2) package SRPMs off my mirror today -- I'll supplement 
this email with the script and lings to the mainfests 
tomorrow.  A 'sort | uniq' let me down as to getting an 
accurate count released today


Yes, for now there is not an issue, but I was just looking 
ahead to 2024 06 30 (the current published RHEL 7 initial EOL, 
pre Extended), and figuring out the enterprise user conversion 
loads, assuming RHEL 8 (tm) drops with a simple python(3), and 
no backward support python(2)

-- Russ herrold
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org/message/3PZMLIEJNDCNBB7H3HT3EUWTMWPOAEOJ/


[EPEL-devel] python 2 retirement commo efforts

2018-07-16 Thread R P Herrold

notwithstanding my post on the f-devel ML, ... 

Probaby there should some work on communicating the need to 
turn down EPEL 6 at 2020 11 30, and with it those python 
2 modules by that time

Smooge, if from the logs you can comb mirroring apart from 
installlation pulls, having a ranked list of python(2) 
candidates, to point


The python 2 in EPEL 7 (I see a mess of them), despite under 
40 or so python 2's in base / update RHEL, it may make sense 
to see of one of the automated conversion rubric will work on 
say 80 pct of the packages there.  Perhaps simply filing bugs 
asking the question for each, so we can garner some stats

-- Russ herrold
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org/message/FXUP362ZU4WCCWOXTJFS7C2Y7ZINGPA2/


Re: Intent to orphan Python 2

2018-07-16 Thread R P Herrold
On Mon, 16 Jul 2018, Miro Hrončok wrote:

> On 23.3.2018 12:23, Petr Viktorin wrote:
> > tl;dr: Unless someone steps up to maintain Python 2 after 2020, we need
> > to start dropping python2 packages now.
 
tl;dr: --- that statement by itself overlooks the obvious.  
Not ALL packages become unsupported that first day of that 
year

> > Python 2.7 will reach end of upstream support on 1st of January, 2020,
> > after almost 10 years (!) of volunteer maintenance.

Not to be too direct about this, but isn't the RHEL 6 primary 
maintenance date (through 2020 11 30) a closer maintenance 
depot to look at and to compare against ?  

Packages NOT in RHEL have a closer date, perhaps, but RHEL 
(next, assumedly 8, but ...) has not dropped yet.  A 
subscription customer _should_ be migrating toward 7 at this 
point, but as this is not a costless thing, such migrations 
tend to be ... with a deliberate pace

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/V6TXSNJ7ER4SBK2D6L4BWU7YLLARJE7T/


Removal of GCC from the buildroot

2018-07-13 Thread R P Herrold
On Fri, 13 Jul 2018, Miro Hrončok wrote:

> I've clicked randomly trough failures during the mass rebuild at [1].
> 
> I see quite a lot of commands not founds for gcc, cc, c++...
> 
> I think the maintainers should add them and that's fine, but it seemed that
> during this change you said you will add those. Did it happen?
> 
> [1] https://kojipkgs.fedoraproject.org/mass-rebuild/f29-failures.html

This list seems to only cover packages starting with an 
uppercase letter, or a letter before lowercase 'i' 

also, it only lists one maintainer, and omits co-maintainers

Would it be possible for a full list to be produced, and once 
done, mentioned here?

thank you

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/OOTIINKWTKOHFCPSEA67FC4BKD62EGSU/


Re: Packages which use the BuildRoot: directive

2018-07-12 Thread R P Herrold
On Thu, 12 Jul 2018, Miro Hrončok wrote:

> > > The guidelines currently say:

Are these Holy Writ, or just process, subject to amendment?

> > > I think this guideline is bad and counterproductive, since many
> > > packages clearly ignore it.

There is a principle:

Seek first to understand

before ** suggesting ** what one feels are helpful suggestions

It applies here

> > > So what do we do? Take the package away from
> > > (most likely) upstream developers? 

oh -- So forking, or adding (probably) unwanted 
co-maintainers, or continuing to fight that entropy with 
what are functionally an unknown number of 'provenpackagers' 
co-maintainers, pushing unwanted 'fixes' in, is proposed?


and a peeve:  NOT updating the changelog when literally 
thousands of packages are re-factored?  I know I always love 
getting to play detective, when an encountered version does not 
match a prior SRPM of the same NEVR

> > > Tell them no no no very sternly so
> > > they can ignore us?

If being ignored bothers you, perhaps the problem is not them, 
but your reaction at being ignored

Perhaps offer of the carrot rather than use of the stick is in 
order.  Maybe, just asking questions, and coming up with a 
rubric to annotate within a non-parsed field in a .spec file 
where 'upstream' is (as was suggested -- as was done with the 
various side adjunct repos -- dag, RF, more, to accommodate 
their tooling)

> > projects. So we do have leverage.

great -- using force always makes new friends ... NOT

What happened to the Four Fedora F's ?

> always a Red Hat maintained software, where people were 
> basically telling us: "no, we won't accept your PR here, we 
> maintain the specfile somewhere else".

'Always'? A fork of 'Spacewalk' just left because of the 
non-public approach to road-map by Red Hat insiders, and simply 
ignoring or not taking non @redhat commits.  I spoke with Don 
Vosburg of SUSE at a conference about his frustration with 
having to do so just a week or two ago.  He _wished_ the fork 
was not required, but to maintain the their implementation, 
which is productized as 'SUSE Manager', he had to get that 
fixes in

See again, seeking to understand first before suggesting 
prescriptions to the person ** volunteering ** to do work 
which happens also to benefit the Fedoraproject

The project is a social voluntary organization -- driving 
volunteers AWAY is trivially easy.  I took heat in the CentOS 
project for working to keep the Signal to Noise ratio high, at 
the expense of intentionally (and by a rubric documented in 
the CentOS wiki) removing people unwilling to play by that set 
of rules.  I'd do it the same way again tomorrow.  But I knew 
I was not being welcoming to all, as not all were welcome, 
frankly.  Immediate kick-bans of people using profanity, 
racist content, etc, seem to be a win to me

> It was very unpleasant experience and usually such maintainers expects us to:

Again, the location of the hurt feelings is not with the 
remote maintainer.  Examining ** why ** you feel that way is 
in order.  Perhaps an out of band discussion with the 
recalcitrant offender is in order ;)  Looking at my sent 
folder, I see that I send 20 to 30 'off list' emails a month, 
to get at the reasoning of another behind things I do not 
understand


I find that it is very unpleasant to encounter a auto-closed 
bug, doing research as to an error, and knowing full well that 
this close is saying:

This bug (and the current item I am researching) is 
known, but we did not fix it, so we swept it under the rug.  
Perhaps it will fix itself

At that point, I can solve my unhappiness by:

committing a local fix, and NOT upstreaming it
- or -
committing a local fix, and upstreaming it

Obviously one path is better than the other for 'improving the 
breed' -- but if I have been filing ignored bugs, which 
simply get auto-closed, it is easier to do less work

> Some maintainers were kinder than others, taking the changes and applying them
> in their god-knows-where maintained spec files. Some where not.

And, frankly, that is their choice to make, rather than yours, 
unless you are proposing to excommunicate people from 
Fedoraproject

> We don't need to make the rule less strict, we need to find a way to enforce
> it. The current state (people ignoring this rule) makes contributing to Fedora
> even harder than it already is.

"The beatings will continue until morale improves"  

kindly, 

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/QMHUKQNSCP65XNYWJOJREXQDDAQIKSEM/


Re: Removal of GCC from the buildroot

2018-07-09 Thread R P Herrold
On Mon, 9 Jul 2018, Matt Milosevic wrote:

> I tend to agree with Chris on this. Whether we like it or not, GCC is an
> integral part of the Unix environment and most things we care about utilize
> it in some aspect, even when it's not immediately obvious. Attempting to
> forcefully bring in an alternate compiler would undoubtedly break a great
> deal of things.

Who said ** anything ** about more than a virtual provide, 
which will do ... nothing more than put in place a portable 
way to test for breakage ???

To the contrary, widely hard-coding 
BR: gcc

locks OUT such efforts to track down 'gcc-isms'

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/DVDAYZIM2L5MXEBVL7LLPCZPB3OYBQEN/


Re: Annobin: "causes a section type conflict with..."

2018-07-09 Thread R P Herrold
On Mon, 9 Jul 2018, Florian Weimer wrote:

> > Can the compiler team just merge the bloody plugin sources into the
> > gcc source package so that it doesn't randomly break anymore?
> 
> This change would add roughly 18 hours to the delivery of every annobin change
> because that's the time required for building gcc.

surely this can be conditionalized in the ./configure, and 
simply fire off a single local checking build instance daily 
on non-production builder, or if one ** 'needs' ** it every 
build [I sort of doubt it with the GCC build constellation], 
'mock out' and only test the known pain points

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/MQ6VPNXR5DQXLUAHJPBCPFFZKDWDKOXZ/


Removal of GCC from the buildroot

2018-07-09 Thread R P Herrold

Removal GCC and friends from the buildroot 
is different than 

adding new conflicting BRs which impair Clang usability

On Mon, 9 Jul 2018,

Igor Gnatenko started:
> > > I'm going to do this tomorrow.
> > > 
> > > After which, I'm going to ask rel-eng to finally remove it from buildroot.
> > >
> > > This will happen before mass rebuild. Stay tuned.


Tomasz Kłoczko wrote:
 
> > After adding explicite gcc/g++ in BuildRequires it will be extreamly
> > hard to switch use for example to use clang.
> >
> > Congratulation.


and this snipeing came in from: Przemek Klosowski:

> Come on now...


You 'tutt tutt' this objection, but it seems that the 
secondary effects of the change are not well thought through.  
As an alternative, adding a 'virtual build requirement' such 
as for:
BR: CCP-compiler

and adding a manual:
Provides: CCP-compiler

to: gcc-c++

and so forth, would make this a non-invasive change.  Why ** 
not ** choose such a route?

Obviously, clang would also need a manual:
Provides: CCP-compiler

--

What is the need to force breakage, rather than doing it in 
'friendly' way?

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/2KHMIXPDF4YSKJ6CU3XBMFVPQRZMVA3M/


Re: F29 System Wide Change: Make BootLoaderSpec the default

2018-06-18 Thread R P Herrold
On Mon, 18 Jun 2018, Lennart Poettering wrote:

> On Do, 14.06.18 14:20, Chris Murphy (li...@colorremedies.com) wrote:
> 
> > The cited BLS spec is the original one, [1]

... later: L.P.:
> [reduce] the size of the spec if possible, and drop as many 
> bits of it as we can, i.e. the stuff noone implements 
> anyway.
> 
> > The cited BLS spec requires $BOOT be VFAT, are we doing that?

Will cgroup and SElinux protections work in VFAT ?

 
> Why would we? I mean the idea is that $BOOT can be shared among
> multiple OSes installed. Which means one really should settle on a

I see a lot of need in [1] for re-partitioning and optionally 
adding a /boot partition where none was specified, to make 
this work

The move toward containers includes getting away from more 
than a single partition (and so, a separate /boot partition, 
as mostly irrelavant).  Getting rid of a separate /boot 
partition is a win, as it  removes the need for a separate 
mountpoint in /etc/fstab for a '/boot/'. partition, and all 
the gyrations as to partitioning in [1]

N.B.: This is a 'Good Thing' as one does not get 'out of sync 
with each other between 'root of filesystem', and /boot/ when 
they are all in a single filesystem


> So, in systemd we ship a generator that automatically establishes
> automount points for the ESP. It will preferably use /efi as mount
> point if it exists and is empty. If it doesn't exist or isn't
> empty it will use /boot — if that exists or is empty. If neither exist
> or are empty it won't do anything

I think this last is a negative: 
>  ... it won't do anything

and I submit that the proper course, when no /boot partition 
is seen, is to properly mount the root of filesystem, and do 
a:
 mkdir /boot
and then continue on


To wrestle with all the failure modes, I see a lot of 
fall-through logic, and a lot more complexity, including 
re-partitioning by the boot loader on a device it may not have 
RW rights at the partition table level -- yikes, as to an 
added point of faiure -- outlined in the initial proposa [1]l, 
but not implied in Matthew Garrett's [2]

But for the fact that that kernel updates do not 'just apply' 
with the current grubby / dracut regime, the approach of a 
/boot/ directory (but not separate partition) works in 
production just fine and has for over a decade [3] 

I suspect that moving to such as an option, and adding a 
systemd umount RW / remount RO of 'root of filesystem' on the 
way to a shutdown, would ameriorate if not totally remedy [4] 
and [5] as well.  Just the remount RO by systemd will cause 
the needed 'sync' actions on the way down would solve: [6] and 
its Fedora twin: [7]

If a '/boot/' partition is absent, simply creating a /boot/ 
directory at the root of the file system does away with the 
need for many of the gyrations of [1].

-- Russ herrold

[1] https://www.freedesktop.org/wiki/Specifications/BootLoaderSpec/

[2] https://www.freedesktop.org/wiki/MatthewGarrett/BootLoaderSpec/

[3] https://bugzilla.redhat.com/show_bug.cgi?id=1498169

[4] https://bugzilla.redhat.com/show_bug.cgi?id=1533620

[5] https://bugzilla.redhat.com/show_bug.cgi?id=1569970

[6] https://bugzilla.redhat.com/show_bug.cgi?id=1464611

[7] https://bugzilla.redhat.com/show_bug.cgi?id=1466036
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/QGECPUQBDZFIWDTYZRBJGIBHOVAIHALZ/


Re: F29 System Wide Change: Hide the grub menu

2018-05-31 Thread R P Herrold

I think it was a fair question which was raised about the size 
of the audience being sought to be catered to, vs the mass of 
users of Fedoraproject code, and their 'least astonishment' 
and loss of acquired knowledge as to use

If there are, oh, say, twelve people in the world that 
actually care about instantaneous GUI boots in Fedora, it is a 
waste of time to mess with this thread


but to the most recent point raised about 'modifier keys'.  I 
recall doing this back in DOS days with a third-party tool 
that permitted 'BAT files' to query for Shift, Alt, and Ctrl 
key states, and to build boolean decision trees:

On Thu, 31 May 2018, Andrew Lutomirski wrote:

> If the protocol were that the boot menu would be shown if 
> any key at all were held down, then we wouldn't need a 1 
> second delay.

or, perhaps, better still and less complex as in needing to 
suppress a boot menu, a message at the bottom of the GUI 
screen from its first appearance and for ten seconds or so:
Hold either Shift key for more boot options

so that a person could be habituated to holding a 'harmless' 
key. Harmless, in the sense that it does not fill and over-run 
a key-press buffer and start beeping at the holder

I speak having personal setup options of:

15 sec timeout at the grub options menu 

with plymouth graphical stuff, rhgb, and quiet 
disabled

always booting to a non-GUI console
why: multi-user.target for something formerly
though of as 'single user', although with 
multiple PTYs ?? 

with a 640x480 console

which is NOT cleared away

to support the fact that I am almost always remote and on KVM 
devices of varying resolutions, and so favoring a 'least 
common denominator' as to capabilities

That last (preserving the TUI boot screen was tricky to find 
docoed

Use:
 # systemctl edit getty@tty1

and add:

#
[Service]
TTYVTDisallocate=no
#

as the description for the service

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/BNQURFE2BWBLLII47V7DN7JTUNSTVCX3/


Re: /etc/profile.d/lang.sh -- still needed?

2018-05-15 Thread R P Herrold
On Tue, 15 May 2018, David Kaspar [Dee'Kej] wrote:

> It could at least tell us the current state of things, and maybe create a
> plan on how to fix things, so they could be eventually removed at some
> point.
> 
> In any case I would like to find a new home for these scripts, so they
> don't "block" other work on initscripts package. And if it would turned out
> we can't remove those scripts yet, at least to do some cleanup in those
> scripts if possible.

Why take the pain? What is to 'fix'? =-=- This approach is an: 
'let's break stuff, and then fix some of it, 
eventually, maybe, to the extent we identify it'

IF there were TDD ASSERT testing in place, it might be 
possible to locate some of the frammage -- but this is not 
anything like where the Fedorproject is

If you wish to 'clean out' initscripts, migrate the content 
into the relevant bash, and tcsh packages, and be done with it

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


/etc/profile.d/lang.sh -- still needed?

2018-05-14 Thread R P Herrold
On Mon, 14 May 2018, David Kaspar [Dee'Kej] wrote:

> does anybody know if the files /etc/profile.d/lang.{csh,sh} are still used
> these days, and what for?

by their terms, they are a collection of I18N and environment 
settings.  

> Do we still need them in Fedora?

Are you asking if /bin/sh, and /bin/tcsh are still installed 
or used?  I certainly install ande use each

> Should they be installed by default these days?

One assumes the files could be moved out to 'bash' and 'tcsh' 
packagings, if the (unstated) goal is to eliminate 
'initscripts' as a standalone package

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Prioritizing ~/.local/bin over /usr/bin on the PATH

2018-05-03 Thread R P Herrold
On Thu, 3 May 2018, Tomas Orsava wrote:

> pip actually checks if ~/.local/bin is on the PATH and prints a warning if it
> isn't. But nobody predicted that ~/.local/bin might be on the PATH but only
> behind /usr/bin. That breaks the intuitive expectation that things installed
> closer to the user should take priority. Python works like that.

It is easy to get into a bike-shed painting contest about what 
is and is not 'intuitive'

But there is also the expectation of 'least surprise' in a 
Unix (tm) culture, and I think it is rather without question 
that:
PATH is initially set by conscious design at 
deployment, and have NOT included per user 
variations as a default as a matter of 'how we got here'


By convention additions to the path come LAST in priority, 
because of well known privilege escalation attack approaches 
(the incautious admin sits down at a 'trapped' nominally sick 
workstation, and fails to use a fully qualified path to 'su' 
or 'sudo' , or omits to add the '-' to cause PATH cleansing).  
Incautious admins do this do this once, git bitten, and learn 
their lesson to use fully qualified paths on workstations, on 
in accounts, they do not control.  I _understand_ that there 
are lots of ways to seek escalated privileges in *nix ... 

But do we really need to be adding MORE, and hidden ones with:

a. 'breaks expectation' early in the PATH precedence?

b. 'invisible' directories in the PATH

Local convention here is a ~/bin/ directory, and I think this 
is a widely observed one


I understand the assertion that 'the next new thing' may well 
have lurked unread and unimplemented, and not been widely 
implemented until recently, adding:
~/.local/
- or -
~/local/


But defaulting to this needs to be generally accepted, 
detailed in Release Notes, well communicated, and easy to 
revert out.  It is NOT something that one user asking for it, 
and an XKCD cartoon should drive

I would suggest this is a major change, and needs 
Fedoraproject Council 'buy in' as to a plan for change, rather 
than simply being imposed by fiat

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


[EPEL-devel] Re: Nagios "disabled" at startup, after recent update

2018-04-18 Thread R P Herrold
On Wed, 18 Apr 2018, Stephen John Smoogen wrote:

> >
> > bug numbers?
> 
> Variants on a theme:
> https://bugzilla.redhat.com/show_bug.cgi?id=1426816
> https://bugzilla.redhat.com/show_bug.cgi?id=1517925

thank you

-- Russ
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org


Re: starting services in fedora

2018-04-17 Thread R P Herrold
On Tue, 17 Apr 2018, Zbigniew Jędrzejewski-Szmek wrote:

> The use case is that for simple packages, it's simpler for the user
> if the service is available immediately. My initial example with gpm
> is actually good here: do "sudo dnf install -y gpm", move mouse, voilà.

> Also the case from https://bugzilla.redhat.com/show_bug.cgi?id=1545027:
> a user installs some daemon for smartcards, and expects it to be
> functional without rebooting.

pcsc-lite is an example with a poor history set of interaction 
with the systemd and itself in a 'no card present' state

I've been bitten by that Heisenbug before [1], and was 
basically told to put black tape over the warning light on the 
dashboard

-- Russ herrold

1. https://bugzilla.redhat.com/show_bug.cgi?id=1046685
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: starting services in fedora

2018-04-17 Thread R P Herrold
On Tue, 17 Apr 2018, Zbigniew Jędrzejewski-Szmek wrote:

> > i could puke everytime something is pulled as dependency and started
> > without any use
> 
> Can you give an example of such services?

The first is a list of 'sbin' processes running from that 
machine being probed

The second are those not sought to be installed by our design, 
nor to be enabled.  remote iscsi support is not anywhere close 
to the use case for this class of machine, but was included

-- Russ herrold

[root@pl085086017 ~]# ps afx | grep sbin
  257 ?S

starting services in fedora

2018-04-17 Thread R P Herrold
On Tue, 17 Apr 2018, Zbigniew Jędrzejewski-Szmek wrote:

> Services which are subject the guidelines allow to be enabled by
> default should be such that starting them briefly should not cause
> any permanent effects.

Some 'real world' data, from a unit that was deployed this 
morning at 

2018-04-17 10:30:17  
VM Created  herr...@owlriver.com
New VM ordered

This email sent at 1623

Last failed login: Tue Apr 17 16:22:11 EDT 2018 from 
61.177.172.63 on ssh:notty
There were 1354 failed login attempts since the last successful login.
[root@pl085086017 ~]# 

so about 6 hours and 1354 probes -- 200 an hour on average

That 'window' of open-ness to probers, except for the fact 
that we blow in 'keyed access only' late in the install 
process by automation, would not constitute: 
starting them briefly should not cause any permanent effects

I think it proposes to needlessly exposes a unit in an 
un-patched state, to being taken over

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: starting services in fedora

2018-04-17 Thread R P Herrold
On Tue, 17 Apr 2018, Zbigniew Jędrzejewski-Szmek wrote:

> Services which are subject the guidelines allow to be 
> enabled by default should be such that starting them briefly 
> should not cause any permanent effects.


'should not' is not true to fact in the real world

I mentioned we inject a SSH root key for management purposes.  
This is a sample of the 'back-splatter' I get all the time

Starting the ssh service generates several keys, which then 
get 'picked up' off host by our control units.  I have to have 
specil code to address the need to go in and eradicate such 
all the time.  Sample below


Apr 16 19:22:19 secure PMMan[2423]: PMMan (VM Management) 
[system@localhost:vm_34458] -- VM setup sees a listener on port 22/tcp 

Apr 16 19:22:19 secure vm_setup[1331]: ssh: connect to host 
10.85.86.17 port 22: Connection refused

Apr 16 19:22:19 secure last message repeated 3 times

Apr 16 19:22:19 secure vm_setup[1368]: 
@@@

Apr 16 19:22:19 secure vm_setup[1368]: @WARNING: REMOTE 
HOST IDENTIFICATION HAS CHANGED! @

Apr 16 19:22:19 secure vm_setup[1368]: 
@@@

Apr 16 19:22:19 secure vm_setup[1368]: IT IS POSSIBLE THAT 
SOMEONE IS DOING SOMETHING NASTY!

Apr 16 19:22:19 secure vm_setup[1368]: Someone could be 
eavesdropping on you right now (man-in-the-middle attack)!

Apr 16 19:22:19 secure vm_setup[1368]: It is also possible 
that the RSA host key has just been changed.

Apr 16 19:22:19 secure vm_setup[1368]: The fingerprint for the 
RSA key sent by the remote host is

Apr 16 19:22:19 secure vm_setup[1368]: 
28:1c:dc:5e:26:9d:4b:1f:2c:a8:aa:8d:42:4f:5f:ea.

Apr 16 19:22:19 secure vm_setup[1368]: Please contact your 
system administrator.

Apr 16 19:22:19 secure vm_setup[1368]: Add correct host key in 
/root/.ssh/known_hosts to get rid of this message.

Apr 16 19:22:19 secure vm_setup[1368]: Offending key in 
/root/.ssh/known_hosts:325

Apr 16 19:22:19 secure vm_setup[1368]: Password authentication 
is disabled to avoid man-in-the-middle attacks.

Apr 16 19:22:19 secure vm_setup[1368]: Keyboard-interactive 
authentication is disabled to avoid man-in-the-middle attacks.

Apr 16 19:22:19 secure vm_setup[1368]: reverse mapping 
checking getaddrinfo for pl085086228.domain.lan failed - 
POSSIBLE BREAK-IN ATTEMPT!

Apr 16 19:22:20 secure pmmanLog[2432]: pmmanLog ( | _event_id: 
5 | _owner_id: 0 | _vm_id: 846 | _message: VM setup is 
shutting down for initial clean backup | _admin: NULL | 
_thread_id: NULL | _level: I | _viewable: 0 

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: starting services in fedora

2018-04-17 Thread R P Herrold
On Tue, 17 Apr 2018, Samuel Sieb wrote:

> I would assume that services that require configuration 
> before being useful would not be enabled by default.

I thing this is a mistaken assumption, and that we are moving 
into matters of sysadmin taste

The SSHD is enabled by default, and likely to remain so

We pre-inject a management key for root in a %post stanza of 
an install, but we still need to go in and add restrictions to 
keyed access only, down in
/etc/sshd/ 
and IP range lockdowns

The Rsyslogd is enabled by default, but has essentally useless 
default settings -- no Mark service, no UDP listener, local 
host loggin only

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


[EPEL-devel] Re: Nagios "disabled" at startup, after recent update

2018-04-17 Thread R P Herrold
On Tue, 17 Apr 2018, Stephen John Smoogen wrote:

> We have been getting a couple of reports of this, but I have not been
> able to duplicate it on my test systems. 

bug numbers?

As I said in my earlier post, there was a new strictness in 
the nagios parser, and I needed to tighten things up in my 
config files, before it worked again.  I made _no_ 'enable' 
re-enablement, however

-- Russ herrold
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org


Re: starting services in fedora

2018-04-17 Thread R P Herrold
On Tue, 17 Apr 2018, Zbigniew Jędrzejewski-Szmek wrote:

> On Tue, Apr 17, 2018 at 12:41:15PM -0400, R P Herrold wrote:
 
> To make this work, we could either require that maintainers of A add
> Requires(post): B, or delay the starting of services until the end
> of the transaction, using a transfiletrigger. This second approach
> is much more attractive. Actually we already od a delayed 
> 'systemctl daemon-reload' after the transaction, and we could start
> the services after that.

Thank you ... but:

you trimmed off and did not respond to the harder part of my 
real-world example

herrold earlier:

> I know I need to go in and manually create and add files 
> like:
>/etc/systemd/system/var-ftp-pub-nfs-mirror2.mount
>
> and then link in that file in:
> /etc/systemd/system/machines.target.wants/
> 
> to get NFS working as I want -- I cannot imagine that** any 
> ** install tool knows how to read my desires as a deploying 
> owner

which in this case is a RO NFS mount of a third party SAN 
device, and which contains site specific matter needed for an 
install needs to access to be useful


There are companion files, such as one with a RW:
/etc/systemd/system/home-nfs.mount
and more, and the RW case is much 'harder' to solve 
(rootsquash, NFSv4, restricted IP ranges, more).  This is for 
a workstation class unit


How is chasing down a rabbit hole of unknowable configuration 
possibilities, to start things during deployment, and before 
hardening even vaguely 'solveable' even with unlimited ** 
packager ** effort?  Augeas sort of tried to do this, and got 
mired in complexity quicksand.  Trying to enable install time 
startups is in no way a 'costless' decision and adding new and 
ill-defined 'requirements' for unclear reasons will tend to 
reduce packager willingness to participate


As I pointed out, install order matters, and in testing alone, 
the big O() complexity testing matrix explodes at a O(N^M) 
rate.  That is, it is simply untestable in very short order

And just WHY do we want to start services during deployment, 
and before hardening?  Why would we WANT to enable services 
_before_ application of potential security updates recognized 
and released after a media freeze?  Setting up the firewalld, 
particularly with the demise and eradication of host name 
based resolution wrappers, is not an install time task at all, 
other than
'deny all but ssh'

I do not understand the use case at all

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: starting services in fedora

2018-04-17 Thread R P Herrold
On Tue, 17 Apr 2018, Zbigniew Jędrzejewski-Szmek wrote:

> > That said, maybe Fedora's service preset files these days are
> > carefully enough written and already formalize such deliberation?
> 
> Pfff. Yes they are. See 
> https://fedoraproject.org/wiki/Packaging:DefaultServices.

Is packager install sequencing aware of all of the 
various systemd dependency resolution qualifications?  
Wants
After
Conflicts
WantedBy
(there are a passel more)

I know I need to go in and manually create and add files like:
/etc/systemd/system/var-ftp-pub-nfs-mirror2.mount

and then link in that file in:
/etc/systemd/system/machines.target.wants/

to get NFS working as I want -- I cannot imagine that** any ** 
install tool knows how to read my desires as a deploying owner

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


batched periodic updates with security 'fast-tracked', vs incumbent continous updates firehose

2018-03-16 Thread R P Herrold

I see the ongoing disagreement as to approaches in the Fedora 
FESCO bug, Adjust/Drop/Document batched updates policy [A], 
and here.  I think there is some ** common ground **, fairly 
easy to implement, to satisfy both the: 'we need testing at 
once' cohort, and the: 'we are bandwidth constrained, or 
_churn_-adverse' group

I chipped in briefly in today's FESCO meeting, but wanted to 
state a clean possible away forward


Background:

For updates, repodata is made by recursing a binary RPM tree

That binary RPM tree may contain matter which has been 
indicated as security sensitive, and the rest not so 
designated


Why not:

1. Continuously add to the binary RPM corpus (the present 
practice)


2. THEN run a new post process, where a new directory (call it 
'security' for the moment) is created via 'hardlinks' (so no 
additional space requirements) (new)


3. If a given package is 'tagged' as security sensitive (put 
to one side for a moment HOW to know), add a hardlink to that 
new directory (new)

3a. Once the process is complete, run a 'repoclosure' test on 
the 'security' directory, and additional hardlinks to satisfy 
needed dependencies for those files, pulling from 'base' and 
'updates' (similar to present practice)


4. Run a 'createrepo' on the 'security' directory, and name 
the output something distinctive:
security-YMD

comes to mind (new)


5. Once a week for say, Tuesday, run a 'repoclosure' test on 
the FULL directory (the present practice, but with a new 
output name in a moment)

5a. Raise an exception if it fails such, and bail and carp 
(the present practice)


6. If it passes, then run a 'createrepo' on the 'security' 
directory, and name the output something distinctive:
patchTuesday-YMD

(new)


7. Push those two sets of repodata out async, or daily, under 
the names (symlinks work here):
security

(new, so 'security' is always as fresh as possible with 
repoclosure)


8. - and - ONLY weekly, update the link an updated last 
successfully generated:
patchTuesday

(new)

[This has the effect of fast-tracking security matter, and 
yet still having a pointer to the last known good complete 
transaction set of general updates]

===

9. Continue to run 'normal' repoclosure,  and 'createrepodata' 
processes.  This is the full and continuous async 'updates' 
archive (the present practice)


===

10. Amend the yum.conf offerings to have reference, in 
addition to 'updates', enabled and pointing to two new 
stanza's in 'updates' called:
security
-and-
patchTuesday

(new but fully backward compatible)

===


Use case narrative:

If one enables both regular 'updates' and the 'security' / 
'patchTuesday' config file, one gets continuous updates.  If 
one disables regular 'updates' , one still gets updates, but 
only security updates get fast-tracked.  If one disables the 
new stanza, one assumedly does not mess with 'updates' if one 
cares about updates (so: new, but fully backward compatible)

--

Sidenote:

Above, I put to one side how to ascertain that something is:
'tagged' as security sensitive

I would suggest that if an update is asserted to be security 
sensitive, just add to the top Changelog entry: a tag with a 
"[CVE -]" reference, or once any embargo has passed, a 
tag with a "[Security]" reference and a pointer to the long 
form description of the issue in play

It is trivial to extract the --changelog first stanza from a 
package, and so scan it and branch accordingly, if such are 
found, in building the 'security' hardlinked working copy

-- Russ herrold

A. https://pagure.io/fesco/issue/1820
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


unproductive finger pointing; was: Re: Broken system upgrade due to rich dependencies

2018-03-08 Thread R P Herrold
On Thu, 8 Mar 2018, Nicolas Mailhot wrote:

> That tells a lot more about USA operators being not willing to work with
> non USA operators than anything else.

ehh?

from the headers in that post, as received by me:

X-Authentication-Results: bastion01.phx2.fedoraproject.org;
dkim=fail reason="signature verification failed" (2048-bit key)
header.d=laposte.net header.i=@laposte.net header.b="EPfsBz5c"

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Re: Broken system upgrade due to rich dependencies

2018-03-07 Thread R P Herrold
On Wed, 7 Mar 2018, Nicolas Mailhot wrote:

> It is quite insane, that, to this day, users are expected to know the
> rpm stack better than dnf, and tell it to update it first.
> 
> KNOWING THE PACKAGE INFRA STACK STACK IS THE INSTALLER JOB
> 
> whenever dnf hits a repo with an updated rpm stack, it should update the
> system rpm stack to this updated stack by default in a separate
> transaction, before installing anything from this repo.

As I recall from RHL days, and trying to do 'hot upgrades' 
across Major releases [it _could_ be done, but was not time 
effective], this also pulled in glibc (and kernel pairs in 
support of that glibc).  When such failed, it was time to go 
to the L0 backup ... and in Fedora and with new deployment 
automation and configuration orchestration, I suspect few 
people actually do a reboot, and a L0 backup, before every 
upgrade.

I would expect it to be useful to do the 'subset' upgrade
mentioned by Smooge for rpm and friends, _most_ of the time,
but occasionally (thinking here of an underlying DB version
bump and rebuild by RPM) not always

Perhaps scanning the transactionset, add a check and consult 
an optional:
- enable doing updates piecemail

flag.  If adding such a flag, I'd also add flags for 
potentially 'dangerous' transactions:
- warn me to take a L0,
- reboot first, and 
- reboot after a new kernel, glibc, or rpm

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Test gate failures

2018-03-05 Thread R P Herrold
On Mon, 5 Mar 2018, Randy Barlow wrote:

> On 03/03/2018 11:15 AM, Michael Cronenworth wrote:
> > * F27 Wine 3.3
> >    - "The update can not be pushed: no test results found"
> >    - https://bodhi.fedoraproject.org/updates/FEDORA-2018-fa6f017315
> > * F26 Wine 3.3
> >    - "The update can not be pushed: 1 of 2 required tests not found"
> >    - https://bodhi.fedoraproject.org/updates/FEDORA-2018-c5a0e704d6
> 
> Both of these seem to have failed rpmdeplint, which I believe indicates
> that they are missing dependencies.

Coes not this rather imply that the ** test environment ** 
needs to be well enough stocked to perform tests?  It MIGHT be 
all right to add a BR for each package, but fixing ONCE by 
stocking the test environment with a test time tool 
(/usr/bin/rpmdeplint), only, and socumenting what one may 
count on being present, seems much more straightforward

I must confess also that I don't see that a BR actually would 
persist over into the test harness environment

-- russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


python2 dummy packages for EPEL

2018-01-26 Thread R P Herrold
On Thu, 25 Jan 2018, Jason L Tibbitts III wrote:

> Following my proposal in
> https://fedoraproject.org/wiki/User:Tibbs/EPELPythonStubPackages which
> met with favor from a number of folks, I went ahead and set up four
> dummy packages:
> 
> python2-setuptools (in EPEL6)
> python2-sphinx (EPEL7)
> python2-pytest (EPEL7)
> python2-six (EPEL7)

As a local convention, I customarily _name_ packages which 
exist ONLY to satisfy a 'provide' :
dummy-packagename

and add a provide inside.  So named, of course, so that they 
'jump out' as dummy placeholders

See, eg:
ftp://ftp.owlriver.com/pub/mirror/ORC/dummy-xscreensaver/

where I needed to satisfy 'xscreensaver' for an in satll of 
several hundred diskless LTSP units, which were were burning 
up network needlessly



-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


koschei interpertation; was: Re: -z defs linker flag activated in Fedora rawhide

2018-01-23 Thread R P Herrold
On Tue, 23 Jan 2018, Daniel P. Berrange wrote:

> What needs to be done for this ?  I see my package "libvirt" present
> in its UI
> 
>   https://apps.fedoraproject.org/koschei/package/libvirt
> 
> but it says
> 
>   "Package is currently ineligible for scheduling due to following reasons:

looking at the 'EPEL 7' tab, I see:

Base buildroot for EPEL 7 is not installable. 

Dependency problems:
nothing provides requested redhat-release-everything

Hunh?  

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: EPEL support in "master" branch (aka speeding up Fedora development)

2018-01-22 Thread R P Herrold
On Mon, 22 Jan 2018, Tomasz K?oczko wrote:

> [tkloczko@domek SPECS.fedora]$ (for i in centos ; do echo -n "$i "; \
grep '%{?'$i * ; done) | grep -v "rhel specific macros"
> ceph.spec:%if ( ( 0%{?rhel} && 0%{?rhel} <= 7) && ! 0%{?centos} )

> ceph.spec:%if ( ( 0%{?rhel} && 0%{?rhel} <= 7) && ! 0%{?centos} )
> cockpit.spec:%if 0%{?centos}

> container-selinux.spec:%if 0%{?fedora} || 0%{?centos} || 0%{?rhel} > 7
> cri-o.spec:%if 0%{?centos}
> docker-latest.spec:%if 0%{?fedora} || 0%{?centos}

> docker.spec:%if 0%{?centos}

> godep.spec:%if 0%{?centos}
> pdc-client.spec:%if (0%{?rhel} && 0%{?rhel} <= 6) || (0%{?centos} &&
> 0%{?centos} <= 6)
> php-libvirt.spec:%if 0%{?rhel} == 7 && 0%{?centos} == 0
> rear.spec:%if %{?centos_version:1}%{?fedora:1}%{?rhel_version:1}0
> resource-agents.spec:%if 0%{?fedora} || 0%{?centos_version} || 0%{?rhel}

> runc.spec:%if ! 0%{?centos}
> skopeo.spec:%if 0%{?centos}
> strace.spec:%if 0%{?fedora} >= 20 || 0%{?centos} >= 8 || 0%{?rhel} >= 8 ||
> 0%{?suse_version} >= 1300
> vdsm.spec:%if ! 0%{?centos}

you may wish to add a:
| awk -F: {'print $1'} | uniq


I am not quite sure what point you are trying to make -- in an 
'ad hoc' local collection of a bit under 2000 .specs, I turn 
up an additional match:

[herrold@centos-7 SPECS]$ (for i in centos ; do echo -n "$i "; \
grep '%{?'$i * ; done) | grep -v "rhel specific macros"
qpdfview.spec:%if 0%{?centos_version}
qpdfview.spec:%if 0%{?centos_version}
rear.spec:%if 
%{?centos_version:1}%{?fedora_version:1}%{?rhel_version:1}0
[herrold@centos-7 SPECS]$ 


and very curiously as to 'strace' in your list, of course 
there ** is no **
'0%{?centos} >= 8

nor a released rhel at that number either ;)

We might speculate, given the component ('cockpit' and 
'strace') it relates to that internal candidates inside RHEL 
engineering that find using that number '8' useful, however, 
for doing development


I am presently standing for the elected office on 'council', 
and really part of my 'platform' locked in last November of 
December was working at 'healing' the fissures between Fedora 
and EPEL

I do not see that the rapid fire posts in which you have 
engaged in the last few days really _help_ that goal, but 
rather they seem strident and divisive, and seem to make 
harder such 'healing'

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: EPEL support in "master" branch (aka speeding up Fedora development)

2018-01-21 Thread R P Herrold
On Sun, 21 Jan 2018, Tomasz K?oczko wrote:

> If it is common in case of EL7/EL6 EPEL packages consumers it is perfect
> reason to not bother EPEL on master branch because Fedora has noting out
> from such end users and keeping all EL6/EL7 adjustments are only slowing
> down Fedora development by making specs less readable.

Tomasz

Do you have statistics about the number of packages 
'migrating' from Fedoraproject to RHEL, vs the number of EPEL 
packages doing the same

It is all well and good to have a fast moving playground 
environment, but some (and particularly, I) actually use both 
as sources for solving needs of paying customers

and EPEL, for me, is the more fruitful one from which to build 
solutions on top of CentOS (and not Fedora's more short lived, 
properly 'not concerned' about long term supportability 
offerings)

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F28 System Wide Change: Rename "nobody" user

2018-01-11 Thread R P Herrold
On Thu, 11 Jan 2018, Lennart Poettering wrote:

> We are not taking the concept of this user/group away. We are also not
> taking the UID/GID assignment 65534 away, either. All we are doing is
> assigning it a better name and do so unconditionally, independently of
> whether nfsutils is installed or not, as the UID/GID 65534 has plenty
> uses outside of NFS.

fixing something well and extensively documented, to something 
'new and improved' in the face of a huge and unchangeable set 
of implementations (and third-party webbish documentation) 
that cannot be changed:

RO media 

off-line images
 
backups
 
iscsi targets
 
NFS exports from third-party appliances
 
interop in hetergoneous environments
 
SMB

... is this really worth the effort?  All it does, like the 
XKCD 'N+1 standards' cartoon, is add one more 'standard' that 
cannot displace the incumbents and diverges from 'Unix' for 
an, at best, cosmetic reason, as you state:

All we are doing is assigning it a better name ...

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F28 Self Contained Change: Glibc collation update and sync with cldr

2018-01-04 Thread R P Herrold
On Fri, 5 Jan 2018, Rafal Luzynski wrote:

> be the same as the default "C" locale or slightly different. I'm not
> aware of any Fedora package where the order of the config files does
> matter

apache cares in /etc/httpd/conf.d/ with virtual host 
enablement on ports along with multiple vhosts

udev does in /etc/udev/rules.d/ notwithstanding a convention 
of doing manual application order with leading digits

Indeed an undocumented switch mid release in RHEL 7 from a 
'ls' type enumeration of a single directory, to a 'find' one 
not constrained by '-maxdepth' causes us some heartburn, as we 
previously had 'stashed' un-used initscripts ?? I fergit ?? 
down in
/etc/sysconfig/network-scripts/attic/ 

that were mysteriously being applied.  Not sort order related 
on the last, but still, I would tread lightly here

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Firefox "Looking Glass" fiasco

2017-12-18 Thread R P Herrold
On Mon, 18 Dec 2017, Chris Adams wrote:

> the requires downloads to be useful.  I think simply requiring Mozilla
> to change their policies is unacceptable, as this still depends on a
> third party to properly enforce such policies (and not have any security
> issue that could result in untrusted addons being installed).
> 
> IMHO such behavior needs to be disabled by default in any packages
> shipped by Fedora for Fedora to remain a trustworthy distribution.

'Electrolysis' was a Mozilla.org codeword for a sub-project 
enabling in an A:B sample, 'telemetry' -- that is keystroke 
logging, click monitoring, timing, and more, largely without 
prominent external notice.

I had a performance issue related to inter-tab communication 
in a restrictive environment I run Firefox in, along with 
SElinux denials, and spent some time 'running down' several 
problems, in the early summer

see:

https://support.ant.com/hc/en-us/articles/115000513446-Firefox-51-Multi-Process

see my bug: 
https://bugzilla.redhat.com/show_bug.cgi?id=1473754
upstream as well

https://bugzilla.mozilla.org/show_bug.cgi?id=1383141
closed into:

https://bugzilla.mozilla.org/show_bug.cgi?id=1376559



https://bugzilla.mozilla.org/show_bug.cgi?id=1129492

because SysV shared memory follows Unix's “same uid policy” 
and can't be restricted/brokered like file access.  (It was 
observed when the initial attempt at a desktop content system 
call whitelist was made, but that was long enough ago that 
there could have been significant changes to how graphics work 
that might make this not a problem, so this should be 
double-checked.)  There's a not-well-specified revision to use 
memory-mapped files 
(http://patchwork.freedesktop.org/patch/15082/) but I don't 
know what would need to happen to make it work — Ubuntu 14.04 
has a new enough X server and should (I think?) have new 
enough libraries, but X clients still empirically use SysV 
(including the Firefox parent process).


see also this:

https://mjg59.dreamwidth.org/42320.html

which implies a shm IPC privacy approach exists, but is not 
implemented.  It ignores adding SELinux constexts, and so the 
unhopeful conculsion he draws may have been overtaken by 
events


https://bugzilla.redhat.com/show_bug.cgi?id=1188290#c1

There was a related SELinux / no '--no-xshm IPC' filing 
upstream as well, which I cannot lay hands upon atm.  It looks 
like others have noticed the 100 pct usage, and IPC problems 
as well

https://bugzilla.redhat.com/show_bug.cgi?id=1471149


One had to notice such exfiltration of data, and go looking 
for how to turn it off.  I did by watching squid logs of 
queries, seeing expected domains, and then going looking.  

Adding a
prefs.js

with

//
browser.tabs.remote.autostart = false  
browser.tabs.remote.autostart.2 = false
//
// ... above silently set itself true again  2017 08 29
//  52.2.0 (64-bit) ESR
//  Centos 7, 2017 09 update is: 52.3.0 (64-bit)

was supposed to work, but it turned out that some process 
inside FF was able to over-ride and un-restrict such even when 
explicitly turned on.  I had to change ownershop of the 
configuration file to root.root from userid.blah to stop that 
nonesense


I start ff inside a 'ssh to a unpriv'd uid' localhost X  
forwarding tunnel -- it breaks sound and video, but ... *
shrug *   I'd rather not have data I care about being
exfiltrated


I believe Jan Horak inside RH does something similar

https://bugzilla.mozilla.org/show_bug.cgi?id=1129492

'it looks like the Firefox over ssh is not used by masses'


-- Russ herrold

===

PEFF -- Privacy Enhanced Firefox invocation 
 ... privacy enhanced, isolated userid firefox invocation 
 
startup PATH: 
PATH=/sbin:/bin:/usr/sbin:/usr/bin:/home/herrold/bin
reduced path PATH: 
PATH=/sbin:/bin:/usr/sbin:/usr/bin:/home/herrold/bin
current id: uid=500(herrold) gid=500(herrold) 
groups=500(herrold),10(wheel),135(mock),498(pulse-access) 
context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
PEFF: ghola
note: ghola is a non-priv'd user on localhost, [H/T: Frank 
Herbert] 
  which we access via a keyed SSH connection 
  to try to avoid some content exfiltration by 
  hostile web browser applications: Firefox, Flash, etc 
THISHOST: centos-7.first.owlriver.net
start: Mon Dec 18 09:45:31 EST 2017
Command: ssh -X  -4   -l ghola centos-7.first.owlriver.net  
export ` dbus-launch ` ;   firefox  --no-remote   --  
 
now down in the limited, privacy enhanced firefox userid 
reduced path PATH: 
PATH=/sbin:/bin:/usr/sbin:/usr/bin:/home/ghola/bin
current id: uid=606(ghola) gid=606(ghola) 
groups=606(ghola),498(pulse-access) 
context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
Command: umask 022 ; /usr/bin/firefox  --no-remote   --  
___
devel mailing list -- 

Re: Trying to contact developer Axel Thimm

2017-12-13 Thread R P Herrold
On Wed, 13 Dec 2017, Stephen John Smoogen wrote:

> On 26 October 2017 at 19:13, R P Herrold <herr...@owlriver.com> wrote:
> > On Fri, 27 Oct 2017, Michael Schwendt wrote:
> >
> >> twitter users could try @athimm
> >
> > I already sent a .@ message to that account

no twitter reply seen here

> Did anyone receive a reply back from Axel on this?

as the mail-load issue presents itself and is detected, it 
seems fair to add a process to devnull when email rejects go 
over 5 days lag, and drop a note on the FAS for that account

Possibly also flag for a 'no longer active' maintainer' review

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: What to I have to do....

2017-12-11 Thread R P Herrold
On Sun, 10 Dec 2017, Graham Leggett wrote:

> In this case, we have the needs of the Fedora project (this 
> change) stacked up against your needs (your reluctance to 
> perform a task).

This line of argument is a 'straw man' as are several other 
rationalizations advanced for NOT giving effective notice.  
As I read the thread, Steve has never said he was 'reluctant' 
nor that he was unwilling to make changes, but rather he said 
that he was troubled when PP changes 'get dropped on him' as 
maintainer without effective prior indication that there is an 
issue

The bugzilla, and tracking bugs, and Blockers and Depends are 
just not that hard to use.  Much automation in this regard 
exists -- FTBFS, etc -- bugzilla had an API for just such a 
purpose

The proponents of simply making a change and letting the 
maintainer take his luck, seem to think that using the tracker 
and the overhead of opening bugs would cause load would go 
up

I doubt it would turn out that way; This is almost certainly 
not the case.  If a maintainer gets a notification via a bug 
filing that some 'Future Feature' change is needed, and there 
is a pointer in the parent bug as to the 'why' and the 
approach to modify matters, I have to think that the proposed 
will get applied next update round, and BY THE MAINTAINER, and 
the dependent bug closed through the release automation

And where there is an impediment -- there was one on the font 
removal matter 'blasted through' by a PP, and if asked, as in 
a bug, the maintainer would so indicate, in such a case, 
probably in the dependent bug.  He promptly did so for me, 
when I asked directly


If filing bugs, and mostly having maintainers respond and make 
changes does not work, why then the Fedoraproject model of 
self-selecting volunteers maintaining packages is broken, and 
Red Hat employees (which, if one examines the poster's 
employer, is who want to 'parachute in' and use PP rights, in 
the first five cases I checked) should simply do all the 
commits

> The needs of Fedora must win in this case.

The predicate was a straw man based on facts not present in 
this thread --- 'must win' seems to overstate the case.  Why 
then even bother to have process?  Let it all hang out and 
anyone commit as one will.  Well, this turns out not to work, 
as we tried this with release three of the post RHL cAos 
project, long ago, and got a royal mess with such a lack of 
process

...
 
> Given your email address, I am going to assume you’re paid 
> by you’re employer to work on Fedora, and are not working on 
> Fedora by your own volition. This is the time when your 
> mentor should step in set some of the ground rules for how 
> you interact with a community.

so, now, an 'ad hominem' attack in rhetoric as well?  So much 
for 'being excellent' to one another

-- Russ herrold
 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: What to I have to do....

2017-12-07 Thread R P Herrold
On Thu, 7 Dec 2017, Yaakov Selkowitz wrote:

> https://fedoraproject.org/wiki/Provenpackager_policy

> These were properly announced:
> 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/RJYQNLIWBAVQPGLIGUT77WGY5D4TK334/
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/YKPCYY2JJOAQG67X4I6ZNYRHNYDCNQFL/

That section provides in relevant part:

> Provenpackagers should try to communicate with owners of a 
package in bugzilla, irc or email prior to making changes

IMHO, A general email to a high traffic mailing list is 
insufficient

IRC is even worse for notification

Absent some pressing need (which was NOT present here -- this 
was just 'distribution housecleaning'), this was insufficient 
notice on a non-urgent matter, to my thinking

I have filed a FESCO bug on the topic, with proposed revised 
language:

https://pagure.io/fesco/issue/1799

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F28 System Wide Change: Reduce Initial Setup Redundancy

2017-12-04 Thread R P Herrold
On Mon, 4 Dec 2017, Chris Murphy wrote:

> >> === Root Account ===

>>> group. We will remove the root password creation spoke. 
>>> All Workstation installs will have no root password set by 
>>> default, as in Ubuntu. Having a root password is not 
>>> useful for nontechnical users, and it is confusing to ask 
>>> users to create multiple passwords

If this is a communication problem, why remove a password, 
just remove the spoke? 

Set _some_ DRP password, deterministically to an unguessible 
value, and save that value in a well-named file on the root 
volume

# umask 077
# date +%s > /root-passwd.txt ; ( head -n 1 /root-passwd.txt ; \
lvdisplay | grep -i UUID | rev | awk {'print $1'} | rev | \
sort | head -n 1 ) | md5sum  >> /root-passwd.txt

... and set the root password to the value of the last line of 
/root-passwd.txt


An interested user may:
1. note it for a rainy day

2. change it to taste and rm the file

A disinterested user may ignore it

A person to whom the user takes a 'sick box' can use recovery 
media tool, loop moount a balky drive, and read the file to 
note the credential, and then boot down into a recovery mode 
with the needed credential

> Also, for any kind of early boot troubleshooting even once a user is
> created, systemd emergency and rescue targets only accept root user
> login. If root user is disabled, it's impossible to do such early boot
> troubleshooting. So I think systemd needs a way to accept an admin
> user (wheel group) as an alternative login rather than only root.

I really dislike adding a new 'secret way to crack into a box' 
and the complexity it would add to systemd, and auditting the 
same, a lot more than I dislike leaving a cleartext file with 
a complex password.

And of course this does not come anywhere a secured grub 
bootloader discussion, nor LUKS, and clevis and tang ;)

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: request admin access for gnumeric

2017-11-21 Thread R P Herrold
On Mon, 20 Nov 2017, Jason L Tibbitts III wrote:

> But we don't do per-branch privileges.  So either you have commit
> privileges on all branches, or you don't.
> 
> Perhaps you could include some details about what leads you to believe
> that you have privileges on one branch but not the others.

I have formerly looked at:
https://admin.fedoraproject.org/pkgdb/package/nagios/

which (seemingly) had per F and EPEL release specific 
differing commit permissions

and also which does not shows rights that I know Smooge added 
last week.  The bug red notice does not indicate this 
information is stale, but only that a packagedb was stale ... 
One now assumes tht more detail is needed to ovver a 
(optionally per package) redirection

Taking your URL as a 'crib', and looking at
https://src.fedoraproject.org/rpms/nagios

I see the expected data

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Deprecating old networking protocols

2017-11-15 Thread R P Herrold
On Tue, 14 Nov 2017, Steven Whitehouse wrote:

> I think it is probably overdue in the DECnet case, however I 
> did get a very happy with it for the most part. Anyway it is 
> clear that nobody is maintaining it and it seems sensible 
> that it should get removed unless someone with sufficient 
> time wants to step forward. That has not happened so far,

I still have customers with Decnet in production (certain 
medical lab equipment 'just works' and uses the transport); 
until those units die, there will not be sufficient motivation 
on the customers' parts to spend the money to replace it (and 
at that time, a technology refresh will happen as well

eyeglass labs, and colonoscopy testing, primarily

The 'network' for units are physically isolated, and indeed, 
occasionally accessed only via a graphical terminal emulator 
such as VNC, facing into a TCP/IP network on a second 
interface.  No need for updates here

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


[EPEL-devel] Re: ansible1.9 package

2017-11-07 Thread R P Herrold
On Tue, 7 Nov 2017, Mátyás Selmeci wrote:

> This highlights a problem I've occasionally had with EPEL, namely that
> packages I depend on occasionally get removed. This especially causes trouble
> when a package gets removed because it's now in RHEL, because it takes a few
> months for CentOS and Scientific Linux to update. Perhaps you could create an
> 'epel-unsupported' repo and move packages there instead of removing them?

As others have suggested, running a private mirror of (at 
least) the SRPMs and learning how to build them, or a larger 
mirror including binaries, and optionally locally 
'[re-]signing' them as Smooge mentioned {nice trick, btw, 
smooge} comes to mind.  I don't have to fiddle with the 
underlying scripts except to add new point releases (of 
CentOS), and less frequently, of EPEL

People have tried over the years to put together busineses 
(Progeny, me) or community projects (Fedora Legacy), but 
economically finding the paying customer mass (and it may well 
not exist) is not there to justify doing that as a 'full time' 
occupation, so it rather becomes an adjunct to consulting when 
custom building, ports, and back-ports


for i in  lftp-epel-6.conf lftp-epel-7.conf  
lftp-epel-testing-6.conf lftp-epel-testing-7.conf  ; do 
NONCE=` grep -v ^# $i | tail -n 1 ` ;
du -sh ${NONCE} ; find ${NONCE} -type f | wc -l  ; echo "" ; done

11G /share/MD0_DATA/Mirror/redhat/epel/6
   5966

17G /share/MD0_DATA/Mirror/redhat/epel/7
   6534

709M/share/MD0_DATA/Mirror/redhat/epel/testing/6
391

2.3G/share/MD0_DATA/Mirror/redhat/epel/testing/7
953

... I have a bit north of 750k SRPMS in my local archive and a 
suite of tools to handle that porting and back-porting 
developed over ... almost 20 years ... goodness

-- Russ herrold
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org


Re: Remove old GPG keys?

2017-10-31 Thread R P Herrold
On Tue, 31 Oct 2017, David Cantrell wrote:

> I don't really consider this a thing about saving space or making the
> output of 'rpm -qa' look nicer or something, but rather being good users
> of GPG.  

As noted but not addressed, which keys actually have been 
signed at GnuPG key-signing WoT 'parties?  Which are presently 
on the public key-server constellation?

The answer:

Of the  38 keys on:
https://getfedora.org/keys/ and
https://getfedora.org/keys/obsolete.html
ZERO are -- one (0xF5282EE4) seems to be a collision artifact 
[1]

> If we create and then phase out signing keys, then part of 
> our process should also involve sending revocations for the 
> old keys.

but the ** private keys ** were never released or public 
anyway ... Revoking a ** public key ** (which is the keys in 
the RPM db in discussion) is useless as all it permitted doing 
was (and is) verifying that a proper private key existed at a 
place and point in time to sign that package. It is EPEL (thus 
at least one part of fedora) practice to do so already

> And that process could be automated by a dnf plugin too.  
> Leaving old keys around on the system for verification 
> purposes presents a risk should the old key become 
> compromised.

so shred the HSM holding the private key ... 

This thread is time wasting and posturing

-- Russ herrold

1. the audit script is at:
http://gallery.herrold.com/stuff/harvest-keys.sh
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Remove old GPG keys?

2017-10-31 Thread R P Herrold
On Tue, 31 Oct 2017, David Cantrell wrote:

> > # rpm -qa gpg-pubkey --qf "%{version}-%{release} %{summary}\n"|wc -l
> > 64
> 
> Do we issue revocations for old keys?  If not, let's do that and extend
> dnf to honor those and clean up?

What is the 'use case' for potentially preventing installation 
against a already know key of a existing, but older 'noarch' 
package; or one unpacking an older SRPM and NOT getting the 
scary NOKEY warning?  The size of the keys is trivial, even 
though they do tend to accrete in a 'long running' instance

heck, I'll wager mostly those keys are never countersigned 
into a web of trust, and sent to the constellation of GnuPG 
key-servers in the first place

Going even further, and revoking the keys is 'fly-specking' 
overkill

I have no problem with removing keys not _used_ on a given 
host (such information being able to be compiled out of the 
RPM database)

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: /bin/sh and lua; was: Re: common location of spec files in upstream sources

2017-10-30 Thread R P Herrold
On Fri, 27 Oct 2017, Jason L Tibbitts III wrote:

> >>>>> "RPH" == R P Herrold <herr...@owlriver.com> writes:
> 
> RPH> I noticed in the Scripts languages section the ** absence ** of
> RPH> /bin/sh (and not 'bash' with its 'bashisms'), and lua

I was referring to: section 37 ("Scripting inside of spec 
files ")

https://fedoraproject.org/wiki/Packaging:Guidelines#Scripting_inside_of_spec_files

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


/bin/sh and lua; was: Re: common location of spec files in upstream sources

2017-10-27 Thread R P Herrold
On Fri, 27 Oct 2017, Vít Ondruch wrote:

> https://fedoraproject.org/wiki/Packaging:Guidelines

interesting to re-read

I noticed in the Scripts languages section the ** absence ** 
of /bin/sh (and not 'bash' with its 'bashisms'), and lua

Each should probably be present for completeness ... it may 
finally provoke the lua hooks in rpm to become used, and os 
useful

This may merit some discussion here before I edit the wiki

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Trying to contact developer Axel Thimm

2017-10-26 Thread R P Herrold
On Fri, 27 Oct 2017, Michael Schwendt wrote:

> twitter users could try @athimm

I already sent a .@ message to that account

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


common location of spec files in upstream sources

2017-10-26 Thread R P Herrold

From a survey of about 1700 .spec files in my current working 
collection, the overwhelmingly common place to ** install ** 
such is in a:
%doc
directory

Most simply place them in the top directory, at a depth even 
with where a V[ersioned] tarball is unpacked by the %setup 
stanza.  Then
rpmbuild -ta (package-V).tgz

can un-gzip and find it there and will build to order in 
chained automation.  I see in my local archive:
bzr/kicad/RCS/README,v:rpmbuild -ta ${PROJECT}-${YMD}.tar.gz && {

which does this.  The R[elease] value gets tacked on during 
the build process


This is most sensible (I have much automation for 
automatic VCS CO, .spec file, and then tarballgenerators, 
which substitute in various variable substitutions).  See, 
eg., 
ftp://ftp.owlriver.com/pub/mirror/ORC/dl/README

of which I was tracking VCS dalies and testing, before it 
moved into Fedora


Others use this approaches similar to this as well -- I see 
several
'%{_package}.spec.in'
files by others to that effect as well.  See, eg., 
krb5-auth-dialog and GeoIP

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


hp-plugin doesn't work in hplip-3.17.9 - move to 3.17.10 if you need

2017-10-26 Thread R P Herrold

On Thu, 26 Oct 2017, Zdenek Dohnal wrote:

> HP changed website this week, which has consequences for getting hp
> proprietary plugin - it cannot be downloaded anymore for hplip-3.17.9,
> which is in stable Fedoras (f25 and f26) and Fedora 27. ...

> upstream several times about uploading plugin into openprinting.org
> website, but without answer (probably because it was available on
> hplipopensource.com). That's the situation for hplip-3.17.9.
 
> Luckily, there is hplip-3.17.10 in updates-testing repository, which has
> plugin on openprinting.org. So if someone now needs to install printer,
> which needs proprietary plugin, please update hplip to 3.17.10 from

Not so much luck, as a sufficiently good process mostly being 
followed ['The more a well designed process is followed and 
tweaked with improvements, the more lucky one becomes' ;) ]

The post partially quoted above points up another benefit from 
the virtue of 'packaging everything' as discussed in the 
recent 'packaging ruby dependencies' thread.  When an upstream 
'goes wonky' for whatever reason (there was a similar example 
in the Node.js ecosystem where a maintainer took down a minor 
but critical dependency, and 'broke world'), one can 'fall 
back' to the last SRPMS (and other VCS backups as well), and 
recover

Without packaged sources, and the discipline of sub-dependency 
determination and solution, and the 'four freedoms' checking 
goodness of a formal 'licenses review', and the additional set 
of eyes cross-checking work, one loses so much

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Removing ghostscript-fonts package

2017-10-06 Thread R P Herrold
On Fri, 6 Oct 2017, Xose Vazquez Perez wrote:

> Zdenek Dohnal wrote:
> 
> > I am going to retire ghostscript-fonts package in F27 because its fonts
> > are deprecated and replaced by urw-base35-fonts package.


I don't see a urw-base35-fonts SRPM in my RawHide ... has it 
been packaged?  

My mirror only fires weekly, but it seens ... hasty to retire 
a package before its successor has 'aged' a bit to let 
possible bugs appear.  In checking the CTAN site, it seems 
pretty likely that font metrics will have changed and so the 
appearance of documents will be affected

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: tcp_wrappers deprecation

2017-08-18 Thread R P Herrold
On Fri, 18 Aug 2017, Jason L Tibbitts III wrote:

> Sadly I know how terrible tcp_wrappers is and so I know it needs to go
> away.  

just because crows trying to protect their young will 'mob' a 
hawk hunting to feed her young does not make the hawk 
terrible; latest is not always greatest

I found the ranting toward wrappers unconvincing years ago - 
- I remain unconvinced that it is terrible code

> It's just unfortunate that there's no replacement for it besides
> firewalling, and dealing with the firewall is unfortunately so
> complicated.

wrappers will invoke the resolver, and do PTR lookups, and so 
can do:
- hostname based, 
- domain related, and 
- absent DNS information based blocking

I know of no way to do these tasks with the 'firewalld' code

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Mass package change (python2- binary package renaming)

2017-08-09 Thread R P Herrold
On Tue, 8 Aug 2017, Zbigniew Jędrzejewski-Szmek wrote:

> Hello Fedora Python package maintainers!
> 
> This is an announcement of a mass package renaming:
> Python 2 binary packages will be renamed to python2-*.

> List 1. for those packages which will be taken care of by the mass remaining
>Patches: https://in.waw.pl/~zbyszek/fedora/pyrename/

Looking at a sample patch file, it apperas that more than a 
simple 
s/python-/python2-/g 
replacement is being done [1]

The patch in question also contains 'tampering' with the 
%description stanza:

-%description
-ATpy is a high-level Python package providing a way to manipulate tables of 
-astronomical data in a uniform way. It provides built-in support for NumPy
-recarrays and common astronomical file/database formats (FITS, VO, HDF5, 
+%global _description\
+ATpy is a high-level Python package providing a way to manipulate tables of\
+astronomical data in a uniform way. It provides built-in support for NumPy\
+recarrays and common astronomical file/database formats (FITS, VO, HDF5,\
 and ASCII tables) with a very simple API.
 
+%description %_description
+

... this does not seem 'low risk', as substitutions happen 
form many fields.  It is also not mentioned in your post

Who shall be expected to repair FTB's after the patch?

-- Russ herrold

1. https://in.waw.pl/~zbyszek/fedora/pyrename/ATpy.spec.patch
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


[EPEL-devel] Re: Pull request/Changes to CentOS Extras repo??

2017-05-11 Thread R P Herrold
On Wed, 3 May 2017, Orion Poplawski wrote:

> > python3-flask:
> >python3-itsdangerous
> >python3-sqlalchemy
> 
> again, already in EPEL7

ehh? -- I see no python3-sqlalchemy in EPEL-7

[herrold@centos-7 ~]$ date ; sudo yum -q clean all
Thu May 11 12:19:59 EDT 2017
[herrold@centos-7 ~]$ date ; sudo yum -q install python3-sqlalchemy
Thu May 11 12:20:04 EDT 2017
Error: Nothing to do
[herrold@centos-7 ~]$ sudo rpm -V epel-release
[herrold@centos-7 ~]$ 

-- Russ herrold
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org


FESCo, Council, FAmSCo elections - Voting period is now open

2015-12-08 Thread R P Herrold
On Tue, 8 Dec 2015, Jan Kurik wrote:

> The voting machine: https://admin.fedoraproject.org/voting/open

There is an obvious 'typo' on that page -- 
s/Lost/Last/

-- Russ herrold
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


[EPEL-devel]Re: TexLive

2015-11-23 Thread R P Herrold
On Sat, 21 Nov 2015, Germano Massullo wrote:

> Did you try to ask them to include all TeXLive packages that are
> available from upstream? If not, I can try

there are lots of licenses to audit, per sub-package, and 
dependency trees of matter limited to non-commercial and so 
forth

-- Russ herrold
___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/epel-devel@lists.fedoraproject.org


[EPEL-devel]Re: TexLive

2015-11-23 Thread R P Herrold
On Mon, 23 Nov 2015, Germano Massullo wrote:

> You can simply re use the collection of texlive-scheme-full for Fedora
> (non EPEL)

One would assume so, but I found dependencies on non-free bits 
in there

-- Russ herrold
___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/epel-devel@lists.fedoraproject.org


Re: Trusted Boot in Fedora

2011-06-28 Thread R P Herrold
On Tue, 28 Jun 2011, Przemek Klosowski wrote:

 the processor serial number (PSN) wasn't shut down---every post-PIII CPU
 has it. The access is often disabled by the BIOS, but it's there:

 http://pcworld.about.net/magazine/1903p198id38601.htm

 I think that TPC requires that PSN are enabled, but I can't think of why.

probably to provide a unique serial number to use as part of 
the TPM attestation private key generation, to ensure 
uniqueness and to prevent a replay type attack

-- Russ herrold
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: What's this /run directory doing on my system and where does it come from?

2011-03-30 Thread R P Herrold
On Wed, 30 Mar 2011, Rahul Sundaram wrote:

 There are many directories already in Fedora that are not 
 defined by FHS and even though we have asked them to update 
 it (libexec, /selinux /sys etc), there is noone maintaining 
 it.

This is stunningly untrue.  I've worked for years in the 
fields of LSB, FHS and LANANA to make sure there are traceable 
paths for such requests.  Post the URLs to your bugs in the 
LSB / LF tracker if you assert you have done such

-- Russ herrold
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


ABRT opt-out? (Re: bugzilla bugzappers?)

2010-11-04 Thread R P Herrold
On Thu, 4 Nov 2010, Christoph Wickert wrote:

 How would you do that? A popup in ABRT that reads

  Sorry, but the maintainer of this package
  has decided to not accept any bug reports.

 I think this would be a *really* bad user experience.

If telling the truth about Open Source development decisions 
provide a '*really* bad user experience', the packager and the 
hosting project has to decide

if a fork is in order, and if they can credibly do it; or

to remove the package and explain why; or

if it is such an immensely popular package that one 'CANNOT' 
omit it [firefox and the Mozilla Foundation's approach on 
trademarks comes to mind], still document a URL to the problem 
in the popup on a pre package basis

Concealing and hiding from the truth (lying to one-self and 
others about reality) can scarcely be called 'being excellent 
to one another' or to the community toard which advocacy and 
service are being targetted, no?

-- Russ herrold
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Fast Light Tool Kit

2010-10-30 Thread R P Herrold
On Sat, 30 Oct 2010, Eric Sparks Christensen wrote:

 I found a program that I want to package but it requires Fast Light
 Tool Kit (FLTK).  The source is a single file with no readme and I'm
 not exactly sure how to package the software.  Has anyone worked with
 FLTK that might be able to help me with this?

it is packaged abundantly.  What is the question?

fltk 
/mnt/nfs/var/ftp/pub/mirror/redhat/rawhide/SRPMS/fltk-1.1.10-4.fc15.src.rpm

also in epel and fedora for since forever

-- Russ herrold
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: JBoss stalled (was Re: status of some packages ??)

2010-06-04 Thread R P Herrold
On Fri, 4 Jun 2010, Tom spot Callaway wrote:

Matěj Cepl asked for
  I would really like to see some opinion of the real 
 European IP law on the matter. Does anybody have URL?

and received a slam at lawyers in the open to the reply.

 Matěj, as I'm sure you know, we could find a lawyer who 
 would tell us just about anything we wanted to hear.

sad, sad

-- Russ herrold
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Worthless updates

2010-03-02 Thread R P Herrold
On Wed, 3 Mar 2010, Ralf Corsepius wrote:

 Wait until you will want to address a serious/critical bugfix to a
 perl-module which carries a dependency on a perl-module you haven't kept
 in sync with CPAN = You'd have to resort to either fastestly upgrade
 a series of perl-modules or resort to other solutions (E.g. to
 deliberately remove versioned dependencies from rpm and try to get away
 without them.)

oh, please -- simply this is simply FUD there;  perl module 
packaging against CPAN is not black art, but merely tiresome 
in running down sub-dependencies, and reading all the ways the 
perl folks emit missing dependency and 'optional' ['suggests', 
'enhances'] determinations and forks through the lens of the 
RPMBUILD.

ftp://ftp.owlriver.com/pub/mirror/ORC/bugzilla/perl-rpmbuild

A trained eye and a minimal bit of work can yield a set of 
grep based filters to 'see' such trivially; I run rpmbuild, 
then a local helper wrapper: perl-rmbuild, and can knock out a 
module in less than 5 minutes to current.  I think the deepest
chain I have is perhaps 30 modules -- a tossup between an old 
bugzilla, spamassassin, and zoneminder, and a surprisingly 
deep leaf target: perl-Net-DNS-SEC

-- Russ herrold
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel