Re: F33 WS ISO checksum

2020-10-28 Thread Samuel Sieb

On 10/28/20 11:21 AM, pmkel...@frontier.com wrote:
I'm guessing that those extra lines are data needed by a process that 
sha256sum calls (perhaps gpg), but sha256sum doesn't use them directly. 
Otherwise I have no idea what their purpose is.


Those lines have nothing to do with sha256sum.  They are for *you* to 
verify that the checksums were provided by Fedora and haven't been modified.

___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Re: [PROPOSAL] No FEs X hours before Go/No Meeting

2020-10-28 Thread Adam Williamson
On Wed, 2020-10-28 at 17:21 -0400, Ben Cotton wrote:


> I don't blame you one bit here. Part of the issue with this policy is
> enforcement. We have to trust maintainers to submit updates that will
> meet it (and we should trust our maintainers!), but it can be hard to
> tell until it's already in the compose. (In some cases, it's obvious,
> but not all). The policy is good guidance, but I don't think it can
> reasonably be an enforcement mechanism. The policy I proposed (as an
> idea, mind you, not an endorsement) would provide a very heavy-handed
> enforcement.
> 
> It also takes the undue burden off of Adam to audit every FE.  Many
> times, the FE is approved before the fix is available, so it's hard
> for voters to weigh in on whether or not the fix is reasonably-sized.

One of my trademark nitpick-y process things here: technically
speaking, FE status attaches to the *bug*, not the *fix*. A bug having
FE status *allows* us to pull a fix for it through the freeze. It does
not *require* us to do so. There is a kind of best-judgment filter
applied at the push request stage: whoever's doing the push request
(so, usually me again :>) can just choose to leave an update out.
Whoever's *doing* the push (so, usually mboddu) can also question any
item in it, and sometimes we talk them over before I send the request.
This bit of the process is a bit 'hidden' because it really only
involves two people, but it is pretty much there by design.

There are other ways an update that is marked as fixing an FE can get
left out, of course. It needs to be submitted for stable to be eligible
for the stable push (though not for a candidate compose); negative
karma can prevent that.

There is a bit of fuzz here in that when the proposed fix for an FE is
*already available* or at least roughly envisaged, that can feed into
the process of reviewing it. This is, viewed very technically, a
process violation, but humans being humans, we do it.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Re: [PROPOSAL] No FEs X hours before Go/No Meeting

2020-10-28 Thread Ben Cotton
On Wed, Oct 28, 2020 at 3:48 PM Adam Williamson
 wrote:
>
> On Wed, 2020-10-28 at 12:29 -0400, Ben Cotton wrote:
> > In yesterday's F33 emergency brake meeting[1], one of the issues that
> > came up is the short window for testing all of the different IoT
> > hardware. One way to reduce that effort (by extending the window) is
> > reducing the change set in the days before an RC. I don't know if it
> > would have helped in this particular case, as the kernel update that
> > caused some of the problems had security fixes, so we may have left it
> > in anyway. But the general idea is if we don't allow FEs all the way
> > up to the RC compose, we reduce the number of things that could break.
> >
> > I don't know if I personally endorse this proposal or not, but in the
> > interests of open discussion, I am proposing a change to the freeze
> > exception process:
> >
> > > Updates with an accepted Freeze Exceptions will not be included less than 
> > > X hours before the scheduled start of the Go/No-Go Meeting.
> >
> > I left the time unspecified for now, because we should figure out if
> > we like the general concept before we decide on the specific deadline.
> > I was thinking something like 72 hours (3 days), which would put the
> > deadline at 1700 UTC Monday.
> >
> > For simplicity's sake, I'm only sending this to the QA list now. If we
> > have a general consensus on it being a good thing, we should
> > distribute it more broadly before we adopt it.
>
> I don't think I agree with this

Big o'l same.

> There is actually a policy that updates to fix blocker and FE issues
> should include the minimal change necessary to fix the bug. We (mainly
> I) have gotten progressively laxer about enforcing that in the last few
> years, to the point where I rarely actually bother with it at all
> except in super egregious cases. This is because we've kinda got a
> better track record of updates not breaking stuff, and we have much
> better test coverage than we used to.
>
I don't blame you one bit here. Part of the issue with this policy is
enforcement. We have to trust maintainers to submit updates that will
meet it (and we should trust our maintainers!), but it can be hard to
tell until it's already in the compose. (In some cases, it's obvious,
but not all). The policy is good guidance, but I don't think it can
reasonably be an enforcement mechanism. The policy I proposed (as an
idea, mind you, not an endorsement) would provide a very heavy-handed
enforcement.

It also takes the undue burden off of Adam to audit every FE.  Many
times, the FE is approved before the fix is available, so it's hard
for voters to weigh in on whether or not the fix is reasonably-sized.

-- 
Ben Cotton
He / Him / His
Senior Program Manager, Fedora & CentOS Stream
Red Hat
TZ=America/Indiana/Indianapolis
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Re: F33 WS ISO checksum

2020-10-28 Thread Chris Murphy
On Wed, Oct 28, 2020 at 12:22 PM pmkel...@frontier.com
 wrote:
>
>
>
> On 10/28/20 11:44, Ankur Sinha wrote:
> > On Wed, Oct 28, 2020 11:21:07 -0400, pmkel...@frontier.com wrote:
> >> Are you saying that the warning message about the 19 lines is a don't care
> >> or is their a problem with the way the checksum file is made? Does this 
> >> mean
> >> that the OK message that comes first is in error?
> >
> > I guess you could call it a "don't care". That isn't completely accurate
> > though---sha256sum cares about all lines in the file, but if it they
> > don't fit the format it can understand it skips them and tells the
> > user. The format is explained in the man page: `man sha256sum`. It finds
> > the one line it does understand, uses it to verify the ISO and prints
> > "OK".
> >
> > This is all expected. So, there is nothing wrong with the CHECKSUM file,
> > and there's nothing wrong with the output.
> >
> > Try the GPG related steps listed here. Those are what the PGP signature
> > in the CHECKSUM file is for.
> > https://getfedora.org/en/security/
> >
>
> I'm guessing that those extra lines are data needed by a process that
> sha256sum calls (perhaps gpg), but sha256sum doesn't use them directly.
> Otherwise I have no idea what their purpose is.

Step 2 at the above URL: Now, verify that the CHECKSUM file is valid:



-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Re: [PROPOSAL] No FEs X hours before Go/No Meeting

2020-10-28 Thread Matthew Miller
On Wed, Oct 28, 2020 at 12:46:55PM -0700, Adam Williamson wrote:
> (mainly I)

While I appreciate all of this taking-of-responsiblity and stuff, let's
focus on the process. There are plenty of places where anyone can make
decisions (or fail to consider something) and then in retrospect it was
obviously the problem. Better to improve the process for the next time
than to worry exactly who gets to have their name on whatever went
wrong. Even if that improvement is "make sure to follow this existing
rule" rather than the new one proposed.


-- 
Matthew Miller

Fedora Project Leader
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Re: [PROPOSAL] No FEs X hours before Go/No Meeting

2020-10-28 Thread Adam Williamson
On Wed, 2020-10-28 at 12:29 -0400, Ben Cotton wrote:
> In yesterday's F33 emergency brake meeting[1], one of the issues that
> came up is the short window for testing all of the different IoT
> hardware. One way to reduce that effort (by extending the window) is
> reducing the change set in the days before an RC. I don't know if it
> would have helped in this particular case, as the kernel update that
> caused some of the problems had security fixes, so we may have left it
> in anyway. But the general idea is if we don't allow FEs all the way
> up to the RC compose, we reduce the number of things that could break.
> 
> I don't know if I personally endorse this proposal or not, but in the
> interests of open discussion, I am proposing a change to the freeze
> exception process:
> 
> > Updates with an accepted Freeze Exceptions will not be included less than X 
> > hours before the scheduled start of the Go/No-Go Meeting.
> 
> I left the time unspecified for now, because we should figure out if
> we like the general concept before we decide on the specific deadline.
> I was thinking something like 72 hours (3 days), which would put the
> deadline at 1700 UTC Monday.
> 
> For simplicity's sake, I'm only sending this to the QA list now. If we
> have a general consensus on it being a good thing, we should
> distribute it more broadly before we adopt it.

I don't think I agree with this, but I *do* think I handled this badly
in the specific case we're referring to.

So, what happened here is:

* We had an accepted FE bug for a Bluetooth CVE (security) issue:
  https://bugzilla.redhat.com/show_bug.cgi?id=1888439

* A kernel update marked as fixing that bug was submitted on 2020-10-15
and submitted for stable later the same day. I submitted a stable push
request including that update the next day, and it was pushed. 2020-10-
16 was exactly a week before the Final Go/No-Go meeting, so this update
was in stable for a week before Go/No-Go:
  https://bodhi.fedoraproject.org/updates/FEDORA-2020-ce117eff51
  https://pagure.io/releng/issue/9725#comment-696530

* The kernel update first appeared in a compose validation event on
2020-10-19, only four days before Go/No-Go, because there was no
nightly validation event between 2020-10-16 and RC 1.2, which was built
on 2020-10-19.

* The update did not just fix the Bluetooth CVE: it was actually an
*entire kernel patch version update*, from 5.8.14 to 5.8.15.

There is actually a policy that updates to fix blocker and FE issues
should include the minimal change necessary to fix the bug. We (mainly
I) have gotten progressively laxer about enforcing that in the last few
years, to the point where I rarely actually bother with it at all
except in super egregious cases. This is because we've kinda got a
better track record of updates not breaking stuff, and we have much
better test coverage than we used to.

However, that was obviously the problem in this case. We (mainly I)
pulled in what was actually a fairly big change (new kernel release)
quite late in the process when we could have insisted on a smaller
change (just the CVE fix patch on top of 5.8.14), didn't include it in
a candidate compose until even later in the process, and didn't flag it
up as a significant change that needed testing. That's on me and I
apologize for it. (For the record, I didn't consciously consider this
and decide it wasn't a big deal; I actually just kinda blew through the
stable push request quickly, I don't recall why, and didn't *notice* we
were pulling in an entire kernel release bump. Obviously, part of that
is the above note that I've been getting generally laxer about checking
this; a few years back I used to rigorously check how much change was
in every single proposed blocker/FE update, nowadays I kinda...don't.)

So I don't think we really need a new rule here, we (mainly I) just
need to go back to being more careful about the policy we already have.
What should have happened here is I should have noticed we had an
entire kernel version update proposed as the fix for an FE and talked
to the kernel team about it. We could then either have decided to pull
in the update, but make sure it was properly tested, including flagging
it up to the ARM folks and making sure we had time to test it across
the important ARM platforms; or we could have decided to not pull in
5.8.15 and instead do 5.8.14 with a patch for the CVE. All of that is
what *should have happened under the current rules*, and I just whiffed
it. Again I'm sorry for that.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

Re: F33 WS ISO checksum

2020-10-28 Thread pmkel...@frontier.com



On 10/28/20 11:44, Ankur Sinha wrote:

On Wed, Oct 28, 2020 11:21:07 -0400, pmkel...@frontier.com wrote:

Are you saying that the warning message about the 19 lines is a don't care
or is their a problem with the way the checksum file is made? Does this mean
that the OK message that comes first is in error?


I guess you could call it a "don't care". That isn't completely accurate
though---sha256sum cares about all lines in the file, but if it they
don't fit the format it can understand it skips them and tells the
user. The format is explained in the man page: `man sha256sum`. It finds
the one line it does understand, uses it to verify the ISO and prints
"OK".

This is all expected. So, there is nothing wrong with the CHECKSUM file,
and there's nothing wrong with the output.

Try the GPG related steps listed here. Those are what the PGP signature
in the CHECKSUM file is for.
https://getfedora.org/en/security/



I'm guessing that those extra lines are data needed by a process that 
sha256sum calls (perhaps gpg), but sha256sum doesn't use them directly. 
Otherwise I have no idea what their purpose is.


Have a Great Day!

Pat (tablepc)
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Re: [PROPOSAL] No FEs X hours before Go/No Meeting

2020-10-28 Thread Chris Murphy
On Wed, Oct 28, 2020 at 10:31 AM Ben Cotton  wrote:
>
> In yesterday's F33 emergency brake meeting[1], one of the issues that
> came up is the short window for testing all of the different IoT
> hardware. One way to reduce that effort (by extending the window) is
> reducing the change set in the days before an RC. I don't know if it
> would have helped in this particular case, as the kernel update that
> caused some of the problems had security fixes, so we may have left it
> in anyway. But the general idea is if we don't allow FEs all the way
> up to the RC compose, we reduce the number of things that could break.
>
> I don't know if I personally endorse this proposal or not, but in the
> interests of open discussion, I am proposing a change to the freeze
> exception process:
>
> > Updates with an accepted Freeze Exceptions will not be included less than X 
> > hours before the scheduled start of the Go/No-Go Meeting.

I pretty much already take this position the week before the go/no-go,
and then turn into pretty much a hard ass once we slip. There has to
be a very compelling reason to grant a freeze exception.

The  kernel is difficult because stable updates can bring important
fixes as well as regressions, and that's just the way it is. The only
way around it is for Fedora's kernel to take an older stable kernel
and cherry pick some fixes, which will work for some things and not
others.

Are we able to allow different kernel versions for different archs?
What about different media? Or do they all get the same kernel
version? Pretty sure it's the latter which makes this harder.


-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Re: F33 WS ISO checksum

2020-10-28 Thread Michael Schwendt
On Wed, 28 Oct 2020 11:21:07 -0400, pmkel...@frontier.com wrote:

> Are you saying that the warning message about the 19 lines is a don't 
> care or is their a problem with the way the checksum file is made? Does 
> this mean that the OK message that comes first is in error?

Just display the checksum file and see. It's a text file, which only
contains a single line recognized by the checksum tool, and it is that
line that matters. You may also run "sha256sum -w -c ..." on that file to
enable more verbose warnings about the lines the tools doesn't recognize.
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Fedora-IoT-33-20201028.0 compose check report

2020-10-28 Thread Fedora compose checker
No missing expected images.

Failed openQA tests: 1/16 (x86_64)

New failures (same test not failed in Fedora-IoT-33-20201020.0):

ID: 708917  Test: x86_64 IoT-dvd_ostree-iso release_identification
URL: https://openqa.fedoraproject.org/tests/708917

Soft failed openQA tests: 1/16 (x86_64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-IoT-33-20201020.0):

ID: 708905  Test: x86_64 IoT-dvd_ostree-iso iot_clevis
URL: https://openqa.fedoraproject.org/tests/708905

Passed openQA tests: 14/16 (x86_64)

Installed system changes in test x86_64 IoT-dvd_ostree-iso 
install_default_upload: 
Mount /run contents changed to 156.3760807% of previous size
2 services(s) added since previous compose: systemd-repart.service, 
zram-swap.service
2 services(s) removed since previous compose: parsec.service, 
systemd-resolved.service
System load changed from 0.21 to 0.08
Previous test data: https://openqa.fedoraproject.org/tests/702689#downloads
Current test data: https://openqa.fedoraproject.org/tests/708906#downloads

Installed system changes in test x86_64 IoT-dvd_ostree-iso 
install_default@uefi: 
Mount /run contents changed to 156.5201729% of previous size
3 services(s) added since previous compose: dbxtool.service, 
systemd-repart.service, zram-swap.service
2 services(s) removed since previous compose: parsec.service, 
systemd-resolved.service
Previous test data: https://openqa.fedoraproject.org/tests/702691#downloads
Current test data: https://openqa.fedoraproject.org/tests/708908#downloads
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


[PROPOSAL] No FEs X hours before Go/No Meeting

2020-10-28 Thread Ben Cotton
In yesterday's F33 emergency brake meeting[1], one of the issues that
came up is the short window for testing all of the different IoT
hardware. One way to reduce that effort (by extending the window) is
reducing the change set in the days before an RC. I don't know if it
would have helped in this particular case, as the kernel update that
caused some of the problems had security fixes, so we may have left it
in anyway. But the general idea is if we don't allow FEs all the way
up to the RC compose, we reduce the number of things that could break.

I don't know if I personally endorse this proposal or not, but in the
interests of open discussion, I am proposing a change to the freeze
exception process:

> Updates with an accepted Freeze Exceptions will not be included less than X 
> hours before the scheduled start of the Go/No-Go Meeting.

I left the time unspecified for now, because we should figure out if
we like the general concept before we decide on the specific deadline.
I was thinking something like 72 hours (3 days), which would put the
deadline at 1700 UTC Monday.

For simplicity's sake, I'm only sending this to the QA list now. If we
have a general consensus on it being a good thing, we should
distribute it more broadly before we adopt it.

[1] 
https://meetbot.fedoraproject.org/fedora-meeting-2/2020-10-27/emergency-brakes-on-f33-release.2020-10-27-13.41.html

-- 
Ben Cotton
He / Him / His
Senior Program Manager, Fedora & CentOS Stream
Red Hat
TZ=America/Indiana/Indianapolis
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Re: F33 keyboard problems

2020-10-28 Thread sixpack13
no idea regarding CINNAMON.

under Genome: 
- Settings => "Region & Languages" => "Input Source" => "+"
- delete the US keyboard
- logoff/-on ?

?
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Re: F33 WS ISO checksum

2020-10-28 Thread Ankur Sinha
On Wed, Oct 28, 2020 11:21:07 -0400, pmkel...@frontier.com wrote:
> Are you saying that the warning message about the 19 lines is a don't care
> or is their a problem with the way the checksum file is made? Does this mean
> that the OK message that comes first is in error?

I guess you could call it a "don't care". That isn't completely accurate
though---sha256sum cares about all lines in the file, but if it they
don't fit the format it can understand it skips them and tells the
user. The format is explained in the man page: `man sha256sum`. It finds
the one line it does understand, uses it to verify the ISO and prints
"OK".

This is all expected. So, there is nothing wrong with the CHECKSUM file,
and there's nothing wrong with the output.

Try the GPG related steps listed here. Those are what the PGP signature
in the CHECKSUM file is for.
https://getfedora.org/en/security/

-- 
Thanks,
Regards,
Ankur Sinha "FranciscoD" (He / Him / His) | 
https://fedoraproject.org/wiki/User:Ankursinha
Time zone: Europe/London


signature.asc
Description: PGP signature
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Re: F33 WS ISO checksum

2020-10-28 Thread pmkel...@frontier.com



On 10/28/20 11:07, Ankur Sinha wrote:

On Wed, Oct 28, 2020 10:55:28 -0400, pmkel...@frontier.com wrote:

On 10/28/20 10:16, Ankur Sinha wrote:



I think sha256sum is pointing out the 19 lines related to the PGP
Signature in the CHECKSUM file, which it can't understand.

https://getfedora.org/static/checksums/Fedora-Workstation-33-1.2-x86_64-CHECKSUM

Perhaps the CHECKSUM files were not previously signed.




Thanks for your reply. The checksum file you sent gives the same OK and
Warning results as above;


Yes, it also includes the 19 lines for the PGP signature, which
sha256sum doesn't understand. So, this is expected.




Are you saying that the warning message about the 19 lines is a don't 
care or is their a problem with the way the checksum file is made? Does 
this mean that the OK message that comes first is in error?



Have a Great Day!

Pat (tablepc)
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Re: F33 WS ISO checksum

2020-10-28 Thread Ankur Sinha
On Wed, Oct 28, 2020 10:55:28 -0400, pmkel...@frontier.com wrote:
> On 10/28/20 10:16, Ankur Sinha wrote:
> 
> > 
> > I think sha256sum is pointing out the 19 lines related to the PGP
> > Signature in the CHECKSUM file, which it can't understand.
> > 
> > https://getfedora.org/static/checksums/Fedora-Workstation-33-1.2-x86_64-CHECKSUM
> > 
> > Perhaps the CHECKSUM files were not previously signed.
> > 
> > 
> 
> Thanks for your reply. The checksum file you sent gives the same OK and
> Warning results as above;

Yes, it also includes the 19 lines for the PGP signature, which
sha256sum doesn't understand. So, this is expected.


-- 
Thanks,
Regards,
Ankur Sinha "FranciscoD" (He / Him / His) | 
https://fedoraproject.org/wiki/User:Ankursinha
Time zone: Europe/London


signature.asc
Description: PGP signature
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Re: F33 WS ISO checksum

2020-10-28 Thread pmkel...@frontier.com



On 10/28/20 10:16, Ankur Sinha wrote:

On Wed, Oct 28, 2020 09:32:51 -0400, pmkel...@frontier.com wrote:

I wanted a fresh copy of the F33 ISO to use for the PCs I maintain. I went
to the getfedora.org site. and downloaded the ISO and CHECKSUM files for F33
Workstation.

When I run:

sha256sum -c Fedora-Workstation-live-33-1;2-x86_64-CHECKSUM

I get:

Fedora-Workstation-live-x86_64-33-1.2.iso: OK

But right under that I get:
she256sum: WARNING: 19 lines are improperly formatted

I went back to koji and downloaded the files for 1.2 that I originally got
for testing 1.2. When I ran the check sum I got the same warning, but I did
not get the worning when I originally downloaded 1.2 for testing.

What's up? Is their a new bug in sha256sum -c?


I think sha256sum is pointing out the 19 lines related to the PGP
Signature in the CHECKSUM file, which it can't understand.

https://getfedora.org/static/checksums/Fedora-Workstation-33-1.2-x86_64-CHECKSUM

Perhaps the CHECKSUM files were not previously signed.




Thanks for your reply. The checksum file you sent gives the same OK and 
Warning results as above;


Have a Great Day!

Pat (tablepc)
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Re: F33 WS ISO checksum

2020-10-28 Thread Ankur Sinha
On Wed, Oct 28, 2020 09:32:51 -0400, pmkel...@frontier.com wrote:
> I wanted a fresh copy of the F33 ISO to use for the PCs I maintain. I went
> to the getfedora.org site. and downloaded the ISO and CHECKSUM files for F33
> Workstation.
> 
> When I run:
> 
> sha256sum -c Fedora-Workstation-live-33-1;2-x86_64-CHECKSUM
> 
> I get:
> 
> Fedora-Workstation-live-x86_64-33-1.2.iso: OK
> 
> But right under that I get:
> she256sum: WARNING: 19 lines are improperly formatted
> 
> I went back to koji and downloaded the files for 1.2 that I originally got
> for testing 1.2. When I ran the check sum I got the same warning, but I did
> not get the worning when I originally downloaded 1.2 for testing.
> 
> What's up? Is their a new bug in sha256sum -c?

I think sha256sum is pointing out the 19 lines related to the PGP
Signature in the CHECKSUM file, which it can't understand.

https://getfedora.org/static/checksums/Fedora-Workstation-33-1.2-x86_64-CHECKSUM

Perhaps the CHECKSUM files were not previously signed.

-- 
Thanks,
Regards,
Ankur Sinha "FranciscoD" (He / Him / His) | 
https://fedoraproject.org/wiki/User:Ankursinha
Time zone: Europe/London


signature.asc
Description: PGP signature
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


F33 WS ISO checksum

2020-10-28 Thread pmkel...@frontier.com
I wanted a fresh copy of the F33 ISO to use for the PCs I maintain. I 
went to the getfedora.org site. and downloaded the ISO and CHECKSUM 
files for F33 Workstation.


When I run:

sha256sum -c Fedora-Workstation-live-33-1;2-x86_64-CHECKSUM

I get:

Fedora-Workstation-live-x86_64-33-1.2.iso: OK

But right under that I get:
she256sum: WARNING: 19 lines are improperly formatted

I went back to koji and downloaded the files for 1.2 that I originally 
got for testing 1.2. When I ran the check sum I got the same warning, 
but I did not get the worning when I originally downloaded 1.2 for testing.


What's up? Is their a new bug in sha256sum -c?


Have a Great Day!

Pat
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Fedora-Rawhide-20201028.n.0 compose check report

2020-10-28 Thread Fedora compose checker
Missing expected images:

Xfce raw-xz armhfp

Compose FAILS proposed Rawhide gating check!
7 of 43 required tests failed, 1 result missing
openQA tests matching unsatisfied gating requirements shown with **GATING** 
below

Failed openQA tests: 35/181 (x86_64)

New failures (same test not failed in Fedora-Rawhide-20201027.n.0):

ID: 708557  Test: x86_64 Server-dvd-iso install_vncconnect_client
URL: https://openqa.fedoraproject.org/tests/708557
ID: 708558  Test: x86_64 Server-dvd-iso install_vncconnect_server
URL: https://openqa.fedoraproject.org/tests/708558
ID: 708559  Test: x86_64 Server-dvd-iso support_server
URL: https://openqa.fedoraproject.org/tests/708559
ID: 708560  Test: x86_64 Server-dvd-iso install_repository_nfs_graphical
URL: https://openqa.fedoraproject.org/tests/708560
ID: 708561  Test: x86_64 Server-dvd-iso install_repository_nfs_variation
URL: https://openqa.fedoraproject.org/tests/708561
ID: 708568  Test: x86_64 Server-dvd-iso install_repository_nfsiso_variation
URL: https://openqa.fedoraproject.org/tests/708568
ID: 708575  Test: x86_64 Server-dvd-iso install_updates_nfs
URL: https://openqa.fedoraproject.org/tests/708575
ID: 708578  Test: x86_64 Server-dvd-iso server_role_deploy_database_server 
**GATING**
URL: https://openqa.fedoraproject.org/tests/708578
ID: 708584  Test: x86_64 Server-dvd-iso server_database_client **GATING**
URL: https://openqa.fedoraproject.org/tests/708584
ID: 708601  Test: x86_64 Workstation-live-iso 
desktop_notifications_postinstall
URL: https://openqa.fedoraproject.org/tests/708601
ID: 708603  Test: x86_64 Workstation-live-iso desktop_update_graphical
URL: https://openqa.fedoraproject.org/tests/708603
ID: 708673  Test: x86_64 universal support_server
URL: https://openqa.fedoraproject.org/tests/708673
ID: 708676  Test: x86_64 universal install_blivet_resize_lvm
URL: https://openqa.fedoraproject.org/tests/708676
ID: 708684  Test: x86_64 universal install_resize_lvm
URL: https://openqa.fedoraproject.org/tests/708684
ID: 708697  Test: x86_64 universal install_kickstart_nfs
URL: https://openqa.fedoraproject.org/tests/708697
ID: 708716  Test: x86_64 universal install_pxeboot
URL: https://openqa.fedoraproject.org/tests/708716
ID: 708717  Test: x86_64 universal install_pxeboot@uefi
URL: https://openqa.fedoraproject.org/tests/708717
ID: 708735  Test: x86_64 universal install_iscsi
URL: https://openqa.fedoraproject.org/tests/708735

Old failures (same test failed in Fedora-Rawhide-20201027.n.0):

ID: 708582  Test: x86_64 Server-dvd-iso server_cockpit_default **GATING**
URL: https://openqa.fedoraproject.org/tests/708582
ID: 708586  Test: x86_64 Server-dvd-iso server_freeipa_replication_master
URL: https://openqa.fedoraproject.org/tests/708586
ID: 708590  Test: x86_64 Server-dvd-iso realmd_join_sssd **GATING**
URL: https://openqa.fedoraproject.org/tests/708590
ID: 708591  Test: x86_64 Server-dvd-iso server_freeipa_replication_replica
URL: https://openqa.fedoraproject.org/tests/708591
ID: 708592  Test: x86_64 Server-dvd-iso server_realmd_join_kickstart 
**GATING**
URL: https://openqa.fedoraproject.org/tests/708592
ID: 708594  Test: x86_64 Server-dvd-iso server_freeipa_replication_client
URL: https://openqa.fedoraproject.org/tests/708594
ID: 708615  Test: x86_64 Workstation-live-iso desktop_browser **GATING**
URL: https://openqa.fedoraproject.org/tests/708615
ID: 708621  Test: x86_64 KDE-live-iso apps_startstop
URL: https://openqa.fedoraproject.org/tests/708621
ID: 708632  Test: x86_64 KDE-live-iso desktop_notifications_postinstall
URL: https://openqa.fedoraproject.org/tests/708632
ID: 708633  Test: x86_64 KDE-live-iso desktop_browser **GATING**
URL: https://openqa.fedoraproject.org/tests/708633
ID: 708634  Test: x86_64 KDE-live-iso desktop_printing
URL: https://openqa.fedoraproject.org/tests/708634
ID: 708638  Test: x86_64 Silverblue-dvd_ostree-iso desktop_browser
URL: https://openqa.fedoraproject.org/tests/708638
ID: 708666  Test: x86_64 universal upgrade_2_server_domain_controller
URL: https://openqa.fedoraproject.org/tests/708666
ID: 708687  Test: x86_64 universal upgrade_server_domain_controller
URL: https://openqa.fedoraproject.org/tests/708687
ID: 708701  Test: x86_64 universal install_cyrillic_language
URL: https://openqa.fedoraproject.org/tests/708701
ID: 708709  Test: x86_64 universal upgrade_realmd_client
URL: https://openqa.fedoraproject.org/tests/708709
ID: 708728  Test: x86_64 universal upgrade_2_realmd_client
URL: https://openqa.fedoraproject.org/tests/708728

Soft failed openQA tests: 3/181 (x86_64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Rawhide-20201027.n.0):

ID: 708576  Test: x86_64 Server-dvd-iso install_vnc_client
URL: https://openqa.fedoraproject.org/tests/708576
ID: 708616  Test: x86_64 Workstation-live-iso desktop_printing
URL: https://op

Fedora rawhide compose report: 20201028.n.0 changes

2020-10-28 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20201027.n.0
NEW: Fedora-Rawhide-20201028.n.0

= SUMMARY =
Added images:67
Dropped images:  0
Added packages:  6
Dropped packages:0
Upgraded packages:   150
Downgraded packages: 0

Size of added packages:  3.92 MiB
Size of dropped packages:0 B
Size of upgraded packages:   4.62 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   51.62 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =
Image: Python_Classroom live x86_64
Path: 
Labs/x86_64/iso/Fedora-Python-Classroom-Live-x86_64-Rawhide-20201028.n.0.iso
Image: Everything boot x86_64
Path: 
Everything/x86_64/iso/Fedora-Everything-netinst-x86_64-Rawhide-20201028.n.0.iso
Image: Server raw-xz armhfp
Path: Server/armhfp/images/Fedora-Server-Rawhide-20201028.n.0.armhfp.raw.xz
Image: Server_Appliance raw-xz armhfp
Path: Server/armhfp/images/Fedora-Server-armhfp-Rawhide-20201028.n.0-sda.raw.xz
Image: Server dvd aarch64
Path: Server/aarch64/iso/Fedora-Server-dvd-aarch64-Rawhide-20201028.n.0.iso
Image: Container_Minimal_Base docker ppc64le
Path: 
Container/ppc64le/images/Fedora-Container-Minimal-Base-Rawhide-20201028.n.0.ppc64le.tar.xz
Image: Mate raw-xz armhfp
Path: Spins/armhfp/images/Fedora-Mate-armhfp-Rawhide-20201028.n.0-sda.raw.xz
Image: Everything boot armhfp
Path: 
Everything/armhfp/iso/Fedora-Everything-netinst-armhfp-Rawhide-20201028.n.0.iso
Image: Silverblue dvd-ostree aarch64
Path: 
Silverblue/aarch64/iso/Fedora-Silverblue-ostree-aarch64-Rawhide-20201028.n.0.iso
Image: Python_Classroom vagrant-libvirt x86_64
Path: 
Labs/x86_64/images/Fedora-Python-Classroom-Vagrant-Rawhide-20201028.n.0.x86_64.vagrant-libvirt.box
Image: KDE live x86_64
Path: Spins/x86_64/iso/Fedora-KDE-Live-x86_64-Rawhide-20201028.n.0.iso
Image: Server boot aarch64
Path: Server/aarch64/iso/Fedora-Server-netinst-aarch64-Rawhide-20201028.n.0.iso
Image: Astronomy_KDE live x86_64
Path: Labs/x86_64/iso/Fedora-Astronomy_KDE-Live-x86_64-Rawhide-20201028.n.0.iso
Image: LXDE live x86_64
Path: Spins/x86_64/iso/Fedora-LXDE-Live-x86_64-Rawhide-20201028.n.0.iso
Image: Python_Classroom raw-xz armhfp
Path: 
Labs/armhfp/images/Fedora-Python-Classroom-armhfp-Rawhide-20201028.n.0-sda.raw.xz
Image: Cloud_Base qcow2 s390x
Path: Cloud/s390x/images/Fedora-Cloud-Base-Rawhide-20201028.n.0.s390x.qcow2
Image: Workstation live x86_64
Path: 
Workstation/x86_64/iso/Fedora-Workstation-Live-x86_64-Rawhide-20201028.n.0.iso
Image: Games live x86_64
Path: Labs/x86_64/iso/Fedora-Games-Live-x86_64-Rawhide-20201028.n.0.iso
Image: Workstation_Appliance raw-xz armhfp
Path: 
Workstation/armhfp/images/Fedora-Workstation-armhfp-Rawhide-20201028.n.0-sda.raw.xz
Image: Cloud_Base tar-gz x86_64
Path: 
Cloud/x86_64/images/Fedora-Cloud-Base-GCP-Rawhide-20201028.n.0.x86_64.tar.gz
Image: Server dvd x86_64
Path: Server/x86_64/iso/Fedora-Server-dvd-x86_64-Rawhide-20201028.n.0.iso
Image: Container_Minimal_Base docker s390x
Path: 
Container/s390x/images/Fedora-Container-Minimal-Base-Rawhide-20201028.n.0.s390x.tar.xz
Image: Jam_KDE live x86_64
Path: Labs/x86_64/iso/Fedora-Jam_KDE-Live-x86_64-Rawhide-20201028.n.0.iso
Image: Silverblue dvd-ostree x86_64
Path: 
Silverblue/x86_64/iso/Fedora-Silverblue-ostree-x86_64-Rawhide-20201028.n.0.iso
Image: Server dvd s390x
Path: Server/s390x/iso/Fedora-Server-dvd-s390x-Rawhide-20201028.n.0.iso
Image: Container_Base docker aarch64
Path: 
Container/aarch64/images/Fedora-Container-Base-Rawhide-20201028.n.0.aarch64.tar.xz
Image: Server dvd armhfp
Path: Server/armhfp/iso/Fedora-Server-dvd-armhfp-Rawhide-20201028.n.0.iso
Image: Minimal raw-xz aarch64
Path: Spins/aarch64/images/Fedora-Minimal-Rawhide-20201028.n.0.aarch64.raw.xz
Image: Xfce live x86_64
Path: Spins/x86_64/iso/Fedora-Xfce-Live-x86_64-Rawhide-20201028.n.0.iso
Image: Server boot s390x
Path: Server/s390x/iso/Fedora-Server-netinst-s390x-Rawhide-20201028.n.0.iso
Image: Everything boot ppc64le
Path: 
Everything/ppc64le/iso/Fedora-Everything-netinst-ppc64le-Rawhide-20201028.n.0.iso
Image: Server boot armhfp
Path: Server/armhfp/iso/Fedora-Server-netinst-armhfp-Rawhide-20201028.n.0.iso
Image: Mate live x86_64
Path: Spins/x86_64/iso/Fedora-MATE_Compiz-Live-x86_64-Rawhide-20201028.n.0.iso
Image: LXQt raw-xz armhfp
Path: Spins/armhfp/images/Fedora-LXQt-armhfp-Rawhide-20201028.n.0-sda.raw.xz
Image: Cloud_Base qcow2 aarch64
Path: Cloud/aarch64/images/Fedora-Cloud-Base-Rawhide-20201028.n.0.aarch64.qcow2
Image: Container_Minimal_Base docker aarch64
Path: 
Container/aarch64/images/Fedora-Container-Minimal-Base-Rawhide-20201028.n.0.aarch64.tar.xz
Image: Container_Base docker x86_64
Path: 
Container/x86_64/images/Fedora-Container-Base-Rawhide-20201028.n.0.x86_64.tar.xz
Image: Workstation live aarch64
Path: 
Workstation/aarch64/iso/Fedora-Workstation-Live-aarch64-Rawhide-20201028.n.0.iso
Image: Container_Base docker s390x
Path: 
Container/s390x/images/Fedora-Container-Base-Rawhide-20201028.n.0.s390x.tar.xz
Image: Container_Base docker armhfp
Path: 
Container/armhfp/images

Fedora-Cloud-31-20201028.0 compose check report

2020-10-28 Thread Fedora compose checker
No missing expected images.

Passed openQA tests: 7/7 (x86_64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


F33 keyboard problems

2020-10-28 Thread Joachim Backes

Hi guys,

I upgraded almost successfully from F32 to F33, using dnf.

Before the upgrade action, my Keyboard was German, with no deadkeys as 
option, in all Fedora versions.
But now, each time I logout and relogin, my keyboard is reset to an STD 
US keyboard.


Is this a known issue?

I am running as desktop a CINNAMON desktop.

How can I get rid from this problem?

KInd regards

Joachim Backes

--

Fedora release 33 (Thirty Three)
Kernel-5.9.1-300.fc33.x86_64


Joachim Backes 
https://www-user.rhrk.uni-kl.de/~backes/
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org


Fedora-Cloud-33-20201028.0 compose check report

2020-10-28 Thread Fedora compose checker
No missing expected images.

Soft failed openQA tests: 1/7 (x86_64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Cloud-33-20201027.0):

ID: 708386  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/708386

Passed openQA tests: 6/7 (x86_64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org