[Bug 2064808] Update perl to 5.34.1

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2064808



--- Comment #13 from Paul Howarth  ---
polymake is now done:

$ koji list-tagged f35-build-side-52326
Build Tag   Built by
   

perl-5.34.1-486.fc35  f35-build-side-52326  mspacek
perl-PAR-Packer-1.052-5.fc35  f35-build-side-52326  pghmcfc
polymake-4.5-2.fc35   f35-build-side-52326  pghmcfc


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2064808
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[EPEL-devel] slowing down the stalled request process

2022-03-29 Thread Carl George
EPEL has a stalled request policy [0] that allows packagers to get
themselves added as collaborators on epel* branches.  Prior to this
policy being implemented, requests to add Fedora packages to EPEL
would often go unanswered for long periods of time.  Packagers wanting
to help had only one option to force action: Fedora's non-responsive
maintainer policy [1].  This was view by many as overkill, as it
results in all of the non-responsive maintainer's packages being
orphaned or transferred to the requester.  The stalled request policy
is much friendlier and enables greater collaboration.

However, despite the good intentions, I've observed some frustrations
among Fedora packagers when collaborators are added via this process.
We do not want maintainers to feel rushed or circumvented.  That said,
I am firmly of the opinion that nobody "owns" Fedora packages, we
maintain them.  Packagers wanting to take action on EPEL requests
should have a way to do that if the existing maintainers have not
taken action within a reasonable amount of time.  What I would like to
discuss is what amount of time is reasonable.

The current process allows a collaborator to be added after a two week
period.  When the stalled policy was implemented I was a fan of this
duration, but now I think it is too short.  Extending it slightly
would be a good compromise to give maintainers a bit more time to
respond while still allowing the request to eventually be completed.
I have two suggestions for alternative steps for the process.

Current process (two bugzilla pings, two weeks total time):
- 1st request
- one week goes by
- 2nd request
- one week goes by
- releng ticket to be added as a collaborator

Proposal A (three bugzilla pings, three weeks total time):
- 1st request
- one week goes by
- 2nd request
- one week goes by
- 3rd request
- one week goes by
- releng ticket to be added as a collaborator

Proposal B (two bugzilla pings, four weeks total time):
- 1st request
- two weeks go by
- 2nd request
- two weeks go by
- releng ticket to be added as a collaborator

I also think we can improve the process by having the last bugzilla
comment include setting the needsinfo flag.  Please share your
thoughts on these alternative process steps.

[0] https://docs.fedoraproject.org/en-US/epel/epel-policy/#stalled_epel_requests
[1] 
https://docs.fedoraproject.org/en-US/fesco/Policy_for_nonresponsive_package_maintainers/

-- 
Carl George
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2069471] perl-Crypt-OpenSSL-PKCS10-0.19 is available

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2069471

Fedora Update System  changed:

   What|Removed |Added

 Status|MODIFIED|ON_QA



--- Comment #4 from Fedora Update System  ---
FEDORA-2022-703ae91b32 has been pushed to the Fedora 36 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing
--advisory=FEDORA-2022-703ae91b32`
You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-2022-703ae91b32

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information
on how to test updates.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2069471
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2065327] perl-Scalar-List-Utils-1.62 is available

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2065327

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version|perl-Scalar-List-Utils-1.62 |perl-Scalar-List-Utils-1.62
   |-463.fc35   |-463.fc35
   ||perl-Scalar-List-Utils-1.62
   ||-464.fc36



--- Comment #10 from Fedora Update System  ---
FEDORA-2022-cea638ebd4 has been pushed to the Fedora 36 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2065327
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2064808] Update perl to 5.34.1

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2064808

Fedora Update System  changed:

   What|Removed |Added

 Resolution|--- |ERRATA
 Status|ASSIGNED|CLOSED
   Fixed In Version||perl-5.34.1-486.fc36
Last Closed||2022-03-30 01:33:42



--- Comment #12 from Fedora Update System  ---
FEDORA-2022-cea638ebd4 has been pushed to the Fedora 36 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2064808
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2064642] F37FailsToInstall: perl-PAR-Packer

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2064642

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version|perl-PAR-Packer-1.054-2.fc3 |perl-PAR-Packer-1.054-2.fc3
   |7   |7
   ||perl-PAR-Packer-1.054-3.fc3
   ||6
 Status|ON_QA   |CLOSED
 Resolution|--- |ERRATA
Last Closed|2022-03-18 11:42:55 |2022-03-30 01:33:39



--- Comment #20 from Fedora Update System  ---
FEDORA-2022-cea638ebd4 has been pushed to the Fedora 36 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2064642
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2066103] perl-CPAN-Perl-Releases-5.20220320 is available

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2066103

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version|perl-CPAN-Perl-Releases-5.2 |perl-CPAN-Perl-Releases-5.2
   |0220320-2.fc36  |0220320-2.fc36
   |perl-CPAN-Perl-Releases-5.2 |perl-CPAN-Perl-Releases-5.2
   |0220320-1.fc34  |0220320-1.fc34
   ||perl-CPAN-Perl-Releases-5.2
   ||0220320-1.fc35



--- Comment #11 from Fedora Update System  ---
FEDORA-2022-b53acf99d2 has been pushed to the Fedora 35 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2066103
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2064353] perl-Module-CoreList-5.20220313 is available

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2064353

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version|perl-Module-CoreList-5.2022 |perl-Module-CoreList-5.2022
   |0313-1.fc36 |0313-1.fc36
   |perl-Module-CoreList-5.2022 |perl-Module-CoreList-5.2022
   |0320-1.fc34 |0320-1.fc34
   ||perl-Module-CoreList-5.2022
   ||0320-1.fc35



--- Comment #12 from Fedora Update System  ---
FEDORA-2022-ecae81d9c8 has been pushed to the Fedora 35 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2064353
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2066104] perl-Module-CoreList-5.20220320 is available

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2066104

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version|perl-Module-CoreList-5.2022 |perl-Module-CoreList-5.2022
   |0320-2.fc36 |0320-2.fc36
   |perl-Module-CoreList-5.2022 |perl-Module-CoreList-5.2022
   |0320-1.fc34 |0320-1.fc34
   ||perl-Module-CoreList-5.2022
   ||0320-1.fc35



--- Comment #11 from Fedora Update System  ---
FEDORA-2022-ecae81d9c8 has been pushed to the Fedora 35 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2066104
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2061310] perl-CPAN-Perl-Releases-5.20220313 is available

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2061310

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version|perl-CPAN-Perl-Releases-5.2 |perl-CPAN-Perl-Releases-5.2
   |0220313-1.fc36  |0220313-1.fc36
   |perl-CPAN-Perl-Releases-5.2 |perl-CPAN-Perl-Releases-5.2
   |0220320-1.fc34  |0220320-1.fc34
   ||perl-CPAN-Perl-Releases-5.2
   ||0220320-1.fc35



--- Comment #13 from Fedora Update System  ---
FEDORA-2022-b53acf99d2 has been pushed to the Fedora 35 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2061310
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: [IPP-over-USB printers/scanners] Expected breakage when ipp-usb+a driver are installed

2022-03-29 Thread Michael Catanzaro

(removing us...@lists.fedoraproject.org)...

On Wed, Mar 23 2022 at 01:58:33 PM +0100, Zdenek Dohnal 
 wrote:
Unfortunately there is no clean upgrade path to solve the migration 
automatically because of unrealistic requirements such as:


 - the USB device would have needed to be plugged in and turned on 
during the update
 - %post scriptlets don't work the same way on immutable Fedoras as 
on Fedora Linux, and other upgrade possibilities such as Leapp don't 
support Fedora upgrades AFAIK,

the fix has to be done manually.


Hi Zdenek,

First, thanks for your work on preparing Fedora for CUPS 3.0 and 
driverless printing, and for helping me with the printer and scanner 
bug reports I reported after I discovered this broke my printer after 
upgrading to F36:


https://bugzilla.redhat.com/show_bug.cgi?id=2066528
https://bugzilla.redhat.com/show_bug.cgi?id=2069277

Hopefully my experience after removing my old print queue and switching 
to the CUPS temporary queue is an anomaly. I know we don't *expect* 
users to have this much trouble. That said, even if everything goes as 
expected, requiring users to remove the original broken print queue is 
unfortunate. Leaving a broken scanner device around is too.


I understand it is difficult to seamlessly upgrade users from F35 -> 
F36 due to the intrusive nature of these changes. That said, I think 
it's worth discussing whether a smoother upgrade is possible, because 
otherwise I expect a large number of complaints from users. An 
installed one-shot systemd service would avoid the need for any %post 
scriplets, for example. Alternatively, could we find a way to disable 
the classic drivers if the printer supports ipp-usb?


> - the USB device would have needed to be plugged in and turned on 
during the update


I understand the problem is you don't know whether the printer supports 
ipp-usb unless it's on, right? Therefore, a one-time upgrade script has 
no way to know whether the print queue should be deleted or not?


Perhaps it would be possible to delete the print queue that uses the 
traditional driver whenever support for ipp-usb is detected? I don't 
know enough about printing to say whether that is a reasonable 
suggestion or a ridiculous one. Just brainstorming.


Michael

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2064353] perl-Module-CoreList-5.20220313 is available

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2064353

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version|perl-Module-CoreList-5.2022 |perl-Module-CoreList-5.2022
   |0313-1.fc36 |0313-1.fc36
   ||perl-Module-CoreList-5.2022
   ||0320-1.fc34



--- Comment #11 from Fedora Update System  ---
FEDORA-2022-47dc52c0c4 has been pushed to the Fedora 34 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2064353
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2061310] perl-CPAN-Perl-Releases-5.20220313 is available

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2061310

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version|perl-CPAN-Perl-Releases-5.2 |perl-CPAN-Perl-Releases-5.2
   |0220313-1.fc36  |0220313-1.fc36
   ||perl-CPAN-Perl-Releases-5.2
   ||0220320-1.fc34



--- Comment #12 from Fedora Update System  ---
FEDORA-2022-fb075cc995 has been pushed to the Fedora 34 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2061310
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2066104] perl-Module-CoreList-5.20220320 is available

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2066104

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version|perl-Module-CoreList-5.2022 |perl-Module-CoreList-5.2022
   |0320-2.fc36 |0320-2.fc36
   ||perl-Module-CoreList-5.2022
   ||0320-1.fc34



--- Comment #10 from Fedora Update System  ---
FEDORA-2022-47dc52c0c4 has been pushed to the Fedora 34 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2066104
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2066103] perl-CPAN-Perl-Releases-5.20220320 is available

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2066103

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version|perl-CPAN-Perl-Releases-5.2 |perl-CPAN-Perl-Releases-5.2
   |0220320-2.fc36  |0220320-2.fc36
   ||perl-CPAN-Perl-Releases-5.2
   ||0220320-1.fc34



--- Comment #10 from Fedora Update System  ---
FEDORA-2022-fb075cc995 has been pushed to the Fedora 34 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2066103
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Landing a larger-than-release change (distrusting SHA-1 signatures)

2022-03-29 Thread Michael Catanzaro

FWIW Alexander's plan sounds reasonable to me.

On Tue, Mar 29 2022 at 03:34:49 PM -0700, Kevin Fenzi  
wrote:

Well, we just shipped beta today, so I think it's too late to land any
f36 changes at this point.


This is a non-default configuration that I strongly suspect nobody or 
almost nobody uses, except for testing. Changing this prior to F36 
stable release seems like no big deal.


Michael

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-36-20220329.n.1 compose check report

2022-03-29 Thread Fedora compose checker
No missing expected images.

Failed openQA tests: 6/229 (x86_64), 6/161 (aarch64)

New failures (same test not failed in Fedora-36-20220328.n.0):

ID: 1202569 Test: x86_64 Server-dvd-iso anaconda_help
URL: https://openqa.fedoraproject.org/tests/1202569
ID: 1202672 Test: x86_64 Silverblue-dvd_ostree-iso install_default_upload
URL: https://openqa.fedoraproject.org/tests/1202672
ID: 1202680 Test: x86_64 Silverblue-dvd_ostree-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/1202680
ID: 1202698 Test: aarch64 Minimal-raw_xz-raw.xz base_reboot_unmount@uefi
URL: https://openqa.fedoraproject.org/tests/1202698
ID: 1202739 Test: aarch64 Server-dvd-iso server_cockpit_basic@uefi
URL: https://openqa.fedoraproject.org/tests/1202739
ID: 1202763 Test: aarch64 Workstation-raw_xz-raw.xz gnome_text_editor@uefi
URL: https://openqa.fedoraproject.org/tests/1202763
ID: 1202905 Test: aarch64 universal install_blivet_software_raid@uefi
URL: https://openqa.fedoraproject.org/tests/1202905
ID: 1202950 Test: aarch64 universal install_shrink_ntfs@uefi
URL: https://openqa.fedoraproject.org/tests/1202950

Old failures (same test failed in Fedora-36-20220328.n.0):

ID: 1202664 Test: x86_64 KDE-live-iso apps_startstop
URL: https://openqa.fedoraproject.org/tests/1202664
ID: 1202796 Test: x86_64 Workstation-upgrade apps_startstop
URL: https://openqa.fedoraproject.org/tests/1202796
ID: 1202884 Test: x86_64 universal install_asian_language
URL: https://openqa.fedoraproject.org/tests/1202884
ID: 1202943 Test: aarch64 universal install_asian_language@uefi
URL: https://openqa.fedoraproject.org/tests/1202943

Soft failed openQA tests: 5/161 (aarch64), 6/229 (x86_64)
(Tests completed, but using a workaround for a known bug)

New soft failures (same test not soft failed in Fedora-36-20220328.n.0):

ID: 1202777 Test: aarch64 Workstation-raw_xz-raw.xz desktop_browser@uefi
URL: https://openqa.fedoraproject.org/tests/1202777
ID: 1202778 Test: aarch64 Workstation-raw_xz-raw.xz eog@uefi
URL: https://openqa.fedoraproject.org/tests/1202778

Old soft failures (same test soft failed in Fedora-36-20220328.n.0):

ID: 1202632 Test: x86_64 Workstation-live-iso apps_startstop
URL: https://openqa.fedoraproject.org/tests/1202632
ID: 1202636 Test: x86_64 Workstation-live-iso desktop_browser
URL: https://openqa.fedoraproject.org/tests/1202636
ID: 1202647 Test: x86_64 Workstation-live-iso eog
URL: https://openqa.fedoraproject.org/tests/1202647
ID: 1202657 Test: x86_64 KDE-live-iso desktop_browser
URL: https://openqa.fedoraproject.org/tests/1202657
ID: 1202688 Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/1202688
ID: 1202782 Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/1202782
ID: 1202790 Test: x86_64 Workstation-upgrade desktop_browser
URL: https://openqa.fedoraproject.org/tests/1202790
ID: 1202812 Test: aarch64 Workstation-upgrade desktop_browser@uefi
URL: https://openqa.fedoraproject.org/tests/1202812
ID: 1202825 Test: aarch64 Workstation-upgrade eog@uefi
URL: https://openqa.fedoraproject.org/tests/1202825

Passed openQA tests: 150/161 (aarch64), 205/229 (x86_64)

New passes (same test not passed in Fedora-36-20220328.n.0):

ID: 1202732 Test: aarch64 Server-dvd-iso install_vncconnect_client@uefi
URL: https://openqa.fedoraproject.org/tests/1202732
ID: 1202737 Test: aarch64 Server-dvd-iso 
server_role_deploy_database_server@uefi
URL: https://openqa.fedoraproject.org/tests/1202737
ID: 1202743 Test: aarch64 Server-dvd-iso install_vncconnect_server@uefi
URL: https://openqa.fedoraproject.org/tests/1202743
ID: 1202748 Test: aarch64 Server-dvd-iso server_database_client@uefi
URL: https://openqa.fedoraproject.org/tests/1202748
ID: 1202760 Test: aarch64 Workstation-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/1202760
ID: 1202761 Test: aarch64 Workstation-raw_xz-raw.xz 
base_service_manipulation@uefi
URL: https://openqa.fedoraproject.org/tests/1202761
ID: 1202762 Test: aarch64 Workstation-raw_xz-raw.xz desktop_printing@uefi
URL: https://openqa.fedoraproject.org/tests/1202762
ID: 1202764 Test: aarch64 Workstation-raw_xz-raw.xz 
base_package_install_remove@uefi
URL: https://openqa.fedoraproject.org/tests/1202764
ID: 1202765 Test: aarch64 Workstation-raw_xz-raw.xz 
desktop_printing_builtin@uefi
URL: https://openqa.fedoraproject.org/tests/1202765
ID: 1202766 Test: aarch64 Workstation-raw_xz-raw.xz 
desktop_update_graphical@uefi
URL: https://openqa.fedoraproject.org/tests/1202766
ID: 1202767 Test: aarch64 Workstation-raw_xz-raw.xz base_selinux@uefi
URL: https://openqa.fedoraproject.org/tests/1202767
ID: 1202768 Test: aarch64 Workstation-raw_xz-raw.xz unwanted_packages@uefi
URL: https://openqa.fedoraproject.org/tests/1202768
ID: 1202769 Test: aarch64 

[EPEL-devel] [HEADS UP] ImageMagick side-tag for epel8

2022-03-29 Thread Sérgio Basto
Hi, 

ImageMagick 6.9.12.x have a bunch security fixes since 6.9.10.x .
I'd like update ImageMagick (IM) on epel8 with soname bump .
ImageMagick-6.9.10 last version, have almost 2 years and keep it and
just pull security patches, it would have a lot more work in my
opinion.

so in  epel8-build-side-52356 repo (sidetag) we got now 
ImageMagick-6.9.12.44-1.el8 

I will rebuild these 24 packages [1] calculated
with find_unblocked_orphans.py from
https://pagure.io/releng/blob/main/f/scripts [2] 


Best regards, 


[1] 
Depending packages (epel8) (24): conky-manager converseen darktable
digikam dvdauthor ettercap gnokii keepass latex2rtf lyx mediainfo
openbabel perl-GD-SecurityImage perl-PAR-Packer playonlinux
purple-discord putty stb stellarium tango-icon-theme w3m
xemacs-packages-extra xfig xforms 

[2]
./find_unblocked_orphans.py --release epel8 --skip-orphans --max_deps 0
ImageMagick

conky-manager (maintained by: orphan)
conky-manager-2.3.4-11.el8.x86_64 requires ImageMagick = 6.9.10.86-
1.el8

converseen (maintained by: marionline)
converseen-0.9.8.1-1.el8.src requires ImageMagick-c++-devel =
6.9.10.86-1.el8, ImageMagick-devel = 6.9.10.86-1.el8
converseen-0.9.8.1-1.el8.x86_64 requires libMagick++-
6.Q16.so.8()(64bit), libMagickCore-6.Q16.so.6()(64bit)

darktable (maintained by: asn, germano, kalev, madko)
darktable-tools-noise-3.8.0-5.el8.x86_64 requires ImageMagick =
6.9.10.86-1.el8

digikam (maintained by: dvratil, kde-sig, kwizart, nucleo, rdieter,
than, tuxbrewr, vjancik)
digikam-6.4.0-4.el8.src requires ImageMagick-c++-devel = 6.9.10.86-
1.el8, ImageMagick-devel = 6.9.10.86-1.el8
digikam-6.4.0-4.el8.x86_64 requires libMagick++-6.Q16.so.8()(64bit),
libMagickCore-6.Q16.so.6()(64bit)
digikam-libs-6.4.0-4.el8.x86_64 requires libMagick++-
6.Q16.so.8()(64bit), libMagickCore-6.Q16.so.6()(64bit)

dvdauthor (maintained by: hobbes1069, sergiomb)
dvdauthor-0.7.2-14.el8.src requires ImageMagick-devel = 6.9.10.86-1.el8
dvdauthor-0.7.2-14.el8.x86_64 requires libMagickCore-
6.Q16.so.6()(64bit)

ettercap (maintained by: limb)
ettercap-0.8.3.1-4.el8.src requires ImageMagick = 6.9.10.86-1.el8

gnokii (maintained by: limb, robert, snirkel)
gnokii-0.6.31-29.el8.src requires ImageMagick = 6.9.10.86-1.el8

keepass (maintained by: mavit, tpokorra)
keepass-2.45-1.el8.src requires ImageMagick = 6.9.10.86-1.el8

latex2rtf (maintained by: cicku, yselkowitz)
latex2rtf-2.3.18-4.el8.src requires ImageMagick = 6.9.10.86-1.el8
latex2rtf-2.3.18-4.el8.x86_64 requires ImageMagick = 6.9.10.86-1.el8

lyx (maintained by: jamatos, rdieter)
lyx-2.3.6-2.el8.x86_64 requires ImageMagick = 6.9.10.86-1.el8

mediainfo (maintained by: ivanromanov, vascom)
mediainfo-21.09-1.el8.src requires ImageMagick = 6.9.10.86-1.el8

openbabel (maintained by: alexpl, jussilehtola, rathann, sagitter,
scitech_sig)
openbabel-3.1.1-4.el8.src requires ImageMagick = 6.9.10.86-1.el8

perl-GD-SecurityImage (maintained by: eseyman)
perl-GD-SecurityImage-1.75-4.el8.noarch requires perl(Image::Magick)
perl-GD-SecurityImage-1.75-4.el8.src requires perl(Image::Magick)

perl-PAR-Packer (maintained by: jplesnik, ppisar)
perl-PAR-Packer-1.052-2.el8.src requires ImageMagick = 6.9.10.86-1.el8

playonlinux (maintained by: robert)
playonlinux-4.4-2.el8.x86_64 requires ImageMagick = 6.9.10.86-1.el8

purple-discord (maintained by: xvitaly)
purple-discord-0-33.20210928gitb7ac723.el8.src requires ImageMagick =
6.9.10.86-1.el8

putty (maintained by: jskarvad, olysonek, zaniyah)
putty-0.76-1.el8.src requires ImageMagick = 6.9.10.86-1.el8

stb (maintained by: churchyard, music)
stb-0-0.7.20211022gitaf1a5bc.el8.src requires /usr/bin/convert

stellarium (maintained by: limb, s4504kr)
stellarium-0.20.1-1.el8.src requires ImageMagick = 6.9.10.86-1.el8

tango-icon-theme (maintained by: cottsay, mavit)
tango-icon-theme-0.8.90-24.el8.src requires ImageMagick-devel =
6.9.10.86-1.el8

w3m (maintained by: pnemade, robert)
w3m-img-0.5.3-50.git20210102.el8.x86_64 requires ImageMagick =
6.9.10.86-1.el8

xemacs-packages-extra (maintained by: jjames, stevetraylen)
xemacs-packages-extra-20191207-1.el8.src requires ImageMagick =
6.9.10.86-1.el8

xfig (maintained by: jwrdegoede, stevetraylen)
xfig-3.2.7b-3.el8.src requires ImageMagick = 6.9.10.86-1.el8

xforms (maintained by: rdieter, robert)
xforms-1.2.4-14.el8.src requires ImageMagick = 6.9.10.86-1.el8

-- 
Sérgio M. B.
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[HEADS UP] ImageMagick side-tag for epel8

2022-03-29 Thread Sérgio Basto
Hi, 

ImageMagick 6.9.12.x have a bunch security fixes since 6.9.10.x .
I'd like update ImageMagick (IM) on epel8 with soname bump .
ImageMagick-6.9.10 last version, have almost 2 years and keep it and
just pull security patches, it would have a lot more work in my
opinion.

so in  epel8-build-side-52356 repo (sidetag) we got now 
ImageMagick-6.9.12.44-1.el8 

I will rebuild these 24 packages [1] calculated
with find_unblocked_orphans.py from
https://pagure.io/releng/blob/main/f/scripts [2] 


Best regards, 


[1] 
Depending packages (epel8) (24): conky-manager converseen darktable
digikam dvdauthor ettercap gnokii keepass latex2rtf lyx mediainfo
openbabel perl-GD-SecurityImage perl-PAR-Packer playonlinux
purple-discord putty stb stellarium tango-icon-theme w3m
xemacs-packages-extra xfig xforms 

[2]
./find_unblocked_orphans.py --release epel8 --skip-orphans --max_deps 0
ImageMagick

conky-manager (maintained by: orphan)
conky-manager-2.3.4-11.el8.x86_64 requires ImageMagick = 6.9.10.86-
1.el8

converseen (maintained by: marionline)
converseen-0.9.8.1-1.el8.src requires ImageMagick-c++-devel =
6.9.10.86-1.el8, ImageMagick-devel = 6.9.10.86-1.el8
converseen-0.9.8.1-1.el8.x86_64 requires libMagick++-
6.Q16.so.8()(64bit), libMagickCore-6.Q16.so.6()(64bit)

darktable (maintained by: asn, germano, kalev, madko)
darktable-tools-noise-3.8.0-5.el8.x86_64 requires ImageMagick =
6.9.10.86-1.el8

digikam (maintained by: dvratil, kde-sig, kwizart, nucleo, rdieter,
than, tuxbrewr, vjancik)
digikam-6.4.0-4.el8.src requires ImageMagick-c++-devel = 6.9.10.86-
1.el8, ImageMagick-devel = 6.9.10.86-1.el8
digikam-6.4.0-4.el8.x86_64 requires libMagick++-6.Q16.so.8()(64bit),
libMagickCore-6.Q16.so.6()(64bit)
digikam-libs-6.4.0-4.el8.x86_64 requires libMagick++-
6.Q16.so.8()(64bit), libMagickCore-6.Q16.so.6()(64bit)

dvdauthor (maintained by: hobbes1069, sergiomb)
dvdauthor-0.7.2-14.el8.src requires ImageMagick-devel = 6.9.10.86-1.el8
dvdauthor-0.7.2-14.el8.x86_64 requires libMagickCore-
6.Q16.so.6()(64bit)

ettercap (maintained by: limb)
ettercap-0.8.3.1-4.el8.src requires ImageMagick = 6.9.10.86-1.el8

gnokii (maintained by: limb, robert, snirkel)
gnokii-0.6.31-29.el8.src requires ImageMagick = 6.9.10.86-1.el8

keepass (maintained by: mavit, tpokorra)
keepass-2.45-1.el8.src requires ImageMagick = 6.9.10.86-1.el8

latex2rtf (maintained by: cicku, yselkowitz)
latex2rtf-2.3.18-4.el8.src requires ImageMagick = 6.9.10.86-1.el8
latex2rtf-2.3.18-4.el8.x86_64 requires ImageMagick = 6.9.10.86-1.el8

lyx (maintained by: jamatos, rdieter)
lyx-2.3.6-2.el8.x86_64 requires ImageMagick = 6.9.10.86-1.el8

mediainfo (maintained by: ivanromanov, vascom)
mediainfo-21.09-1.el8.src requires ImageMagick = 6.9.10.86-1.el8

openbabel (maintained by: alexpl, jussilehtola, rathann, sagitter,
scitech_sig)
openbabel-3.1.1-4.el8.src requires ImageMagick = 6.9.10.86-1.el8

perl-GD-SecurityImage (maintained by: eseyman)
perl-GD-SecurityImage-1.75-4.el8.noarch requires perl(Image::Magick)
perl-GD-SecurityImage-1.75-4.el8.src requires perl(Image::Magick)

perl-PAR-Packer (maintained by: jplesnik, ppisar)
perl-PAR-Packer-1.052-2.el8.src requires ImageMagick = 6.9.10.86-1.el8

playonlinux (maintained by: robert)
playonlinux-4.4-2.el8.x86_64 requires ImageMagick = 6.9.10.86-1.el8

purple-discord (maintained by: xvitaly)
purple-discord-0-33.20210928gitb7ac723.el8.src requires ImageMagick =
6.9.10.86-1.el8

putty (maintained by: jskarvad, olysonek, zaniyah)
putty-0.76-1.el8.src requires ImageMagick = 6.9.10.86-1.el8

stb (maintained by: churchyard, music)
stb-0-0.7.20211022gitaf1a5bc.el8.src requires /usr/bin/convert

stellarium (maintained by: limb, s4504kr)
stellarium-0.20.1-1.el8.src requires ImageMagick = 6.9.10.86-1.el8

tango-icon-theme (maintained by: cottsay, mavit)
tango-icon-theme-0.8.90-24.el8.src requires ImageMagick-devel =
6.9.10.86-1.el8

w3m (maintained by: pnemade, robert)
w3m-img-0.5.3-50.git20210102.el8.x86_64 requires ImageMagick =
6.9.10.86-1.el8

xemacs-packages-extra (maintained by: jjames, stevetraylen)
xemacs-packages-extra-20191207-1.el8.src requires ImageMagick =
6.9.10.86-1.el8

xfig (maintained by: jwrdegoede, stevetraylen)
xfig-3.2.7b-3.el8.src requires ImageMagick = 6.9.10.86-1.el8

xforms (maintained by: rdieter, robert)
xforms-1.2.4-14.el8.src requires ImageMagick = 6.9.10.86-1.el8

-- 
Sérgio M. B.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora 36 compose report: 20220329.n.1 changes

2022-03-29 Thread Fedora Rawhide Report
OLD: Fedora-36-20220328.n.0
NEW: Fedora-36-20220329.n.1

= SUMMARY =
Added images:0
Dropped images:  0
Added packages:  4
Dropped packages:0
Upgraded packages:   161
Downgraded packages: 1

Size of added packages:  814.09 KiB
Size of dropped packages:0 B
Size of upgraded packages:   6.81 GiB
Size of downgraded packages: 3.96 MiB

Size change of upgraded packages:   19.12 MiB
Size change of downgraded packages: -895 B

= ADDED IMAGES =

= DROPPED IMAGES =

= ADDED PACKAGES =
Package: asahi-scripts-20220318.1-1.fc36
Summary: Miscellaneous admin scripts for Asahi Linux
RPMs:update-vendor-firmware
Size:9.67 KiB

Package: gnome-console-42~beta-1.fc36
Summary: Simple user-friendly terminal emulator for the GNOME desktop
RPMs:gnome-console gnome-console-nautilus
Size:707.86 KiB

Package: rust-fontconfig-parser-0.5.0-1.fc36
Summary: Fontconfig file parser in pure Rust
RPMs:rust-fontconfig-parser+default-devel 
rust-fontconfig-parser+serde-devel rust-fontconfig-parser+serialize-devel 
rust-fontconfig-parser-devel
Size:66.43 KiB

Package: rust-rustls-pemfile-0.3.0-1.fc36
Summary: Basic .pem file parser for keys and certificates
RPMs:rust-rustls-pemfile+default-devel rust-rustls-pemfile-devel
Size:30.14 KiB


= DROPPED PACKAGES =

= UPGRADED PACKAGES =
Package:  adwaita-icon-theme-42.0-1.fc36
Old package:  adwaita-icon-theme-42~beta-1.fc36
Summary:  Adwaita icon theme
RPMs: adwaita-cursor-theme adwaita-icon-theme adwaita-icon-theme-devel
Size: 4.80 MiB
Size change:  193.76 KiB
Changelog:
  * Mon Mar 21 2022 David King  - 42.0-1
  - Update to 42.0


Package:  apostrophe-2.6.1-1.fc36
Old package:  apostrophe-2.6-1.fc36
Summary:  Distraction free Markdown editor for GNU/Linux made with GTK+
RPMs: apostrophe
Size: 2.54 MiB
Size change:  2.83 KiB
Changelog:
  * Sun Mar 27 2022 Artem Polishchuk  - 2.6.1-1
  - chore(update): 2.6.1


Package:  arpwatch-14:3.2-6.fc36
Old package:  arpwatch-14:3.2-4.fc36
Summary:  Network monitoring tools for tracking IP addresses on a network
RPMs: arpwatch
Size: 1.60 MiB
Size change:  8.58 KiB
Changelog:
  * Thu Mar 24 2022 Benjamin A. Beasley  14:3.2-5
  - Switch OUI URL from HTTP to HTTPS

  * Thu Mar 24 2022 Benjamin A. Beasley  14:3.2-6
  - Generate ethercodes.dat from latest oui.csv


Package:  at-spi2-core-2.44.0-1.fc36
Old package:  at-spi2-core-2.42.0-2.fc36
Summary:  Protocol definitions and daemon for D-Bus at-spi
RPMs: at-spi2-core at-spi2-core-devel
Size: 1.84 MiB
Size change:  5.01 KiB
Changelog:
  * Fri Mar 18 2022 David King  - 2.44.0-1
  - Update to 2.44.0


Package:  baobab-42.0-1.fc36
Old package:  baobab-42~rc-1.fc36
Summary:  A graphical directory tree analyzer
RPMs: baobab
Size: 1.90 MiB
Size change:  1.26 KiB
Changelog:
  * Mon Mar 21 2022 David King  - 42.0-1
  - Update to 42.0


Package:  bluez-5.64-1.fc36
Old package:  bluez-5.63-3.fc36
Summary:  Bluetooth utilities
RPMs: bluez bluez-cups bluez-deprecated bluez-hid2hci bluez-libs 
bluez-libs-devel bluez-mesh bluez-obexd
Size: 10.90 MiB
Size change:  62.35 KiB
Changelog:
  * Mon Mar 21 2022 Peter Robinson  - 5.64-1
  - Update to 5.64


Package:  bout++-4.4.1-1.fc36
Old package:  bout++-4.4.0-6.fc36
Summary:  Library for the BOUndary Turbulence simulation framework
RPMs: bout++-common bout++-doc bout++-mpich bout++-mpich-devel 
bout++-openmpi bout++-openmpi-devel python3-bout++ python3-bout++-mpich 
python3-bout++-openmpi
Size: 18.29 MiB
Size change:  99.17 KiB
Changelog:
  * Tue Jan 25 2022 David Bold  - 4.4.1-1
  - Update to 4.4.1


Package:  cairo-1.17.6-1.fc36
Old package:  cairo-1.17.4-7.fc36
Summary:  A 2D graphics library
RPMs: cairo cairo-devel cairo-gobject cairo-gobject-devel cairo-tools
Size: 5.99 MiB
Size change:  387.95 KiB
Changelog:
  * Fri Mar 18 2022 David King  - 1.17.6-1
  - Update to 1.17.6


Package:  camorama-0.21.2-2.fc36
Old package:  camorama-0.21-1.fc36
Summary:  Gnome webcam viewer
RPMs: camorama
Size: 1.69 MiB
Size change:  27.21 KiB
Changelog:
  * Sat Mar 19 2022 Mauro Carvalho Chehab  - 0.21.1
  - Bump to Version 0.21.1: fix image capture regression

  * Thu Mar 24 2022 Mauro Carvalho Chehab  - 0.21.2
  - Bump to Version 0.21.2: better handle controls and sliders

  * Thu Mar 24 2022 Mauro Carvalho Chehab  - 0.21.2-1
  - Fix a crash when device is changed while control window is open


Package:  cfn-lint-0.58.4-1.fc36
Old package:  cfn-lint-0.58.2-1.fc36
Summary:  CloudFormation Linter
RPMs: cfn-lint
Size: 2.04 MiB
Size change:  20.79 KiB
Changelog:
  * Tue Mar 08 2022 Benjamin A. Beasley  0.58.3-1
  - Update to 0.58.3 (close RHBZ#2061852)

  * Tue Mar 22 2022 Benjamin A. Beasley  0.58.4-1
  - Update to 0.58.4 (close RHBZ#2066498)


Package

Re: Landing a larger-than-release change (distrusting SHA-1 signatures)

2022-03-29 Thread Kevin Fenzi
On Tue, Mar 29, 2022 at 08:12:47PM +0200, Alexander Sosedkin wrote:
> 
> "You know these lights in the theaters that go out gradually?
>  When the guy ve-ery slo-o-owly pulls the plug out?"
>  - a joke from my childhood.
> 
> 
> Hello, it's been quiet for a while, and I've been busy
> but kept thinking about all the useful feedback you folks gave me.
> Not that it made me flesh out a perfect plan,
> but hopefully at least a less terrible one.
> 
> Regarding smudging the change in time,
> how does the following three-phaser sound?

Might work. :) A few comments inline...

> Phase 1 ("Wake-up Call"):
>   In Fedora 37, disable SHA-1 signatures verification/creation
>   in FUTURE policy, i.e. opt-in only.
>   Come up with some logging solution;
>   I'd prefer something non-invasive like eBPF USDT probes [2],
>   but maybe even stderr could work, you've been moderately convincing.
>   (FUTURE change is *maybe* doable in F36, but not logging.)

Well, we just shipped beta today, so I think it's too late to land any
f36 changes at this point. 

>   Announce it as a system-wide change anyway for visibility,
>   call for Test Days to report which apps/workflows rely on SHA-1 signatures
>   either from the logs
>   or from opting into blocking operations and seeing what starts failing hard.
>   That'd have to be very actively called for to make an impact,
>   impact that'd mostly be just maintainers thinking what will they do in

Just a related note here, FUTURE also breaks installing anything via dnf
with the default metalink setup. This is because digicert (where we get
our *.fedoraproject.org wildcard cert) seems to always issue certs from
it's 2048bit CA. :( (If anyone knows how to get them to issue from a
newer CA that works please let me know)

> Phase 2 ("Jump Scare"):
>   As soon as f37 branch-off happens,
>   disable signature verification in DEFAULT in *38 rawhide*.
>   Cue an influx of bugreports because things get broken for all testers
>   and not just the ones who opt in.
>   I anticipate this to be the most eye-opening step
>   even if we test a lot in the previous phase, so to smooth it out more
>   we then *revert* the change in 38 before the release,
>   so the released Fedora behaves just like in 37
>   and whatever wasn't sorted out in time gets an extra cycle.

Right before the release? 
Or right before Beta? 
or ?

People kind of expect the beta will be something they can test and will
behave as the final, so changing things after beta seems like a bad idea
in general. That said, shipping beta with it would get a lot more
exposure.

>   A second Fedora change should be filed for visibility,
>   but clearly stating this will not affect f38 released.
> 
> Phase 3 ("Return of the Panik"):
>   And then Fedora 39 comes, where the revert hasn't happened,
>   goes through the whole release cycle,
>   but this time the change goes through and reaches stable.
>   Again, a system-wide change, a third one for the same thing.
> 
> With the 37-38-39 numbers, that'd mean the change
> reaching the users in autumn 2023, with lead times of:
>   ~ 3.5 cycles for the most proactive developers to see this thread and panic
>   ~ 3 cycles for the testers to proactively report bugs (logging/opting in)
>   ~ 2 cycles to address everything else coming from rawhide testing
> before it reaches stable by either
> switching to some other algorithm,
> making the users explicitly opt into trusting SHA-1 signatures somehow,
> or, in the most high-profile cases,
> having a widely publicised exception (and some plan for the future).
> 
> Questions:
>   * Do you find this smudging reasonable?

I think it's probibly the best we can do. 

>   * The usual tightening of the other less controversial algorithms,
> should it follow the same smudging/reverting plan
> since we're going through all that hassle anyway?

I don't think they would need to have this long a runway.

>   * Does the 37-38-39 timeframe feel right?
>   * Do I need to first run this contraption of a plan
> by FESCo or some other smart folks?

Well, I think run it by everyone on this list. 
I don't think people will hold back. ;) 

>   * Is there a better signalling mechanism than filing 3 system-wide changes?
>   * What'd be the right mechanism for others to take the wheel if everything
> goes sideways and the need arises to revise the plan mid-execution?

I wonder if it would make sense to have a checkpoint before the revert
in f38, and if things look substantually less broken than we fear, we
just don't revert it and let it go out in f38. But that might muddy up
the communications.

> Other kinds of input are, of course, also appreciated.
> Even the calls to magically attain the mutually exclusive goals
> of offering secure defaults while not breaking insecure workflows
> that don't offer actual solutions might serve as a useful mood check.
> I know it ain't the best plan. Let's figure out the right thing to do.

Thanks for 

Re: Looking for provenpackager to update rapid-photo-downloader package

2022-03-29 Thread Michel Alexandre Salim
On Tue, Mar 29, 2022 at 05:57:52PM -, Damon Lynch wrote:
> Greetings Fedora community, I am the developer of Rapid Photo Downloader. The 
> package for it in Fedora is about two years old, and crashes during start-up 
> under Python 3.10. 
> 
> As the subject says, I'm looking for a provenpackager to update the package. 
> I'm posting this message here at the suggestion of a fellow PyQt developer 
> who unlike myself is a Fedora expert.
> 
> I filed a bug report last year but the maintainer has been unable to work on 
> it: https://bugzilla.redhat.com/show_bug.cgi?id=2031866
> Meanwhile, two months ago Neal Gompa made this pull request to update it: 
> https://src.fedoraproject.org/rpms/rapid-photo-downloader/pull-request/3
> 
I'm a provenpackager, but so is Neal, so I just pinged him to see if he
wants to merge and push an update.

> Unfortunately I'm unable to volunteer my time because I managed to injure my 
> hands while working on the code earlier this year. Serious typing injuries 
> are not fun. :-(  
> (I'm dictating this using a voice recognition program under Windows.)
> 
Ouch, hope you recover soon! Also, I'm hugely impressed by how well the
email is formatted, I hope you didn't have to do that much correction by
hand.

Best regards,

-- 
Michel Alexandre Salim
identities: https://keyoxide.org/5dce2e7e9c3b1cffd335c1d78b229d2f7ccc04f2


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Looking for provenpackager to update rapid-photo-downloader package

2022-03-29 Thread Onuralp SEZER
I submitted "showinflemanager" as a package to fedora any review are welcomed.

URL: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2069851

Regards,
Onuralp Sezer (he/him/his)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: [rawhide][approaching SONAME bump][gpgme] libqgpgme.so.7 -> libqgpgme.so.15

2022-03-29 Thread Dominik 'Rathann' Mierzejewski
On Tuesday, 29 March 2022 at 21:29, Jiri Kucera wrote:
> Hello,
> 
> I am working on a gpgme update from 1.17.0 to 1.17.1 (bz#2061192). Since
> the update changes libqgpgme SONAME from libqgpgme.so.7 to libqgpgme.so.15,
> I requested the side tag f37-build-side-52334 and do a build in it:
[...]
> Eventually the list of libqgpgme.so.7 consumers (have no idea why there are
> only *.i686 on the list):
> $ dnf --repofrompath=frawhide,
> http://ftp.fi.muni.cz/pub/linux/fedora/linux/development/rawhide/Everything/x86_64/os/
> --disablerepo='*' --enablerepo='frawhide' --refresh repoquery --whatdepends
> libqgpgme.so.7

libqgpgme.so.7 is a 32-bit dependency. The 64-bit one is:
libqgpgme.so.7()(64bit). You'll get 64-bit consumers if you query for
that one.

Regards,
Dominik
-- 
Fedora   https://getfedora.org  |  RPM Fusion  http://rpmfusion.org
There should be a science of discontent. People need hard times and
oppression to develop psychic muscles.
-- from "Collected Sayings of Muad'Dib" by the Princess Irulan
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Looking for provenpackager to update rapid-photo-downloader package

2022-03-29 Thread Demi Marie Obenour
On 3/29/22 13:57, Damon Lynch wrote:
> Greetings Fedora community, I am the developer of Rapid Photo Downloader. The 
> package for it in Fedora is about two years old, and crashes during start-up 
> under Python 3.10. 
> 
> As the subject says, I'm looking for a provenpackager to update the package. 
> I'm posting this message here at the suggestion of a fellow PyQt developer 
> who unlike myself is a Fedora expert.
> 
> I filed a bug report last year but the maintainer has been unable to work on 
> it: https://bugzilla.redhat.com/show_bug.cgi?id=2031866
> Meanwhile, two months ago Neal Gompa made this pull request to update it: 
> https://src.fedoraproject.org/rpms/rapid-photo-downloader/pull-request/3
> 
> The current release is 0.9.33. Compared to the Fedora version, it requires a 
> new package in Fedora: https://github.com/damonlynch/showinfilemanager
> 
> Unfortunately I'm unable to volunteer my time because I managed to injure my 
> hands while working on the code earlier this year. Serious typing injuries 
> are not fun. :-(  
> (I'm dictating this using a voice recognition program under Windows.)

I hope you get better soon!  Also I really wish there were better Linux speech 
recognition options.

-- 
Sincerely,
Demi Marie Obenour (she/her/hers)

OpenPGP_0xB288B55FFF9C22C1.asc
Description: OpenPGP public key


OpenPGP_signature
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[rawhide][approaching SONAME bump][gpgme] libqgpgme.so.7 -> libqgpgme.so.15

2022-03-29 Thread Jiri Kucera
Hello,

I am working on a gpgme update from 1.17.0 to 1.17.1 (bz#2061192). Since
the update changes libqgpgme SONAME from libqgpgme.so.7 to libqgpgme.so.15,
I requested the side tag f37-build-side-52334 and do a build in it:

- commit:
https://src.fedoraproject.org/rpms/gpgme/c/b46b5db21813b39584eb1046239dfba7bb40571e?branch=rawhide
- build:
https://koji.fedoraproject.org/koji/taskinfo?taskID=84893999

The list of dependent packages that possibly need to be rebuild in
f37-build-side-52334 side tag is:
$ dnf --repofrompath=frawhide,
http://ftp.fi.muni.cz/pub/linux/fedora/linux/development/rawhide/Everything/x86_64/os/
--disablerepo='*' --enablerepo='frawhide' --refresh repoquery --whatdepends
qgpgme
Added frawhide repo from
http://ftp.fi.muni.cz/pub/linux/fedora/linux/development/rawhide/Everything/x86_64/os/
frawhide

   187 kB/s | 6.1 kB
  00:00
isoimagewriter-0:0.8-8.fc36.x86_64
kdepim-addons-0:21.12.3-1.fc37.i686
kdepim-addons-0:21.12.3-1.fc37.x86_64
kf5-libkleo-0:21.12.3-1.fc37.i686
kf5-libkleo-0:21.12.3-1.fc37.x86_64
kf5-mailcommon-0:21.12.3-1.fc37.i686
kf5-mailcommon-0:21.12.3-1.fc37.x86_64
kf5-messagelib-0:21.12.3-1.fc37.i686
kf5-messagelib-0:21.12.3-1.fc37.x86_64
kget-libs-0:21.12.3-1.fc37.i686
kget-libs-0:21.12.3-1.fc37.x86_64
kleopatra-0:21.12.3-1.fc37.x86_64
kleopatra-libs-0:21.12.3-1.fc37.i686
kleopatra-libs-0:21.12.3-1.fc37.x86_64
kmail-account-wizard-0:21.12.3-1.fc37.x86_64
kmail-libs-0:21.12.3-1.fc37.i686
kmail-libs-0:21.12.3-1.fc37.x86_64
qgpgme-devel-0:1.17.0-2.fc37.i686
qgpgme-devel-0:1.17.0-2.fc37.x86_64
trojita-0:0.7.0.1-0.13.20220117git266c757.fc36.x86_64

Eventually the list of libqgpgme.so.7 consumers (have no idea why there are
only *.i686 on the list):
$ dnf --repofrompath=frawhide,
http://ftp.fi.muni.cz/pub/linux/fedora/linux/development/rawhide/Everything/x86_64/os/
--disablerepo='*' --enablerepo='frawhide' --refresh repoquery --whatdepends
libqgpgme.so.7
Added frawhide repo from
http://ftp.fi.muni.cz/pub/linux/fedora/linux/development/rawhide/Everything/x86_64/os/
frawhide

   5.1 kB/s | 6.1 kB
  00:01
kdepim-addons-0:21.12.3-1.fc37.i686
kf5-libkleo-0:21.12.3-1.fc37.i686
kf5-mailcommon-0:21.12.3-1.fc37.i686
kf5-messagelib-0:21.12.3-1.fc37.i686
kget-libs-0:21.12.3-1.fc37.i686
kleopatra-libs-0:21.12.3-1.fc37.i686
kmail-libs-0:21.12.3-1.fc37.i686
qgpgme-devel-0:1.17.0-2.fc37.i686

The major difference between 1.17.0 and 1.17.1 is this commit:
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=ad3aabdd8a64156c7e3a75d695ae1ab2c4bec841
fixing the virtual table layout.

I have a plea to maintainers of these packages (or proven packagers) to
build their dependent packages against the f37-build-side-52334 side tag
and then let me know when the build is ready.

Thanks in advance
Jiri
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Landing a larger-than-release change (distrusting SHA-1 signatures)

2022-03-29 Thread Alexander Sosedkin
On Tue, Mar 8, 2022 at 7:40 PM Alexander Sosedkin  wrote:
>
> Hello, community, I need your wisdom for planning a disruptive change.
>
> Fedora 28 had https://fedoraproject.org/wiki/Changes/StrongCryptoSettings
> Fedora 33 had https://fedoraproject.org/wiki/Changes/StrongCryptoSettings2
> I believe we should start planning
> for the next cryptographic defaults tightening.
> And next time it's gonna be even more disruptive because of SHA-1 (again).
>
> SHA-1 is a hash function from 1995,
> which collision resistance is no longer to be relied upon for security [1].
> At the same time, it's not like software has successfully migrated off it,
> not even close.
> It's not a question of "if" the world should migrate from it,
> sooner or later we must part ways with it.
> (Technically, some acute energy crisis or a collapse of civilization
>  forever raising the costs of computations thousandfold would also do,
>  but let's agree that migrating to a more modern hash is the way =)
>
> We've been disabling it in TLS, but its usage is much wider than TLS.
> The next agonizing step is to restrict its usage for signatures
> on the cryptographic libraries level, with openssl being the scariest one.
>
> Good news is, RHEL-9 is gonna lead the way
> and thus will take a lot of the hits first.
> Fedora doesn't have to pioneer it.
> Bad news is, Fedora has to follow suit someday anyway,
> and this brings me to how does one land such a change.
>
> ---
>
> Fedora is a large distribution with short release cycles, and
> the only realistic way to weed out its reliance on SHA-1 signatures
> from all of its numerous dark corners is to break them.
> Make creation and verification fail in default configuration.
> But it's unreasonable to just wait for, say, Fedora 37 branch-off
> and break it in Rawhide for Fedora 38.
> The fallout will just be too big.
>
> Maintainers need time to get bugs, look into them, think,
> analyze, react and test --- and that's just if it fails correctly!
> Unfortunately, it's not just that the error paths are as dusty as they get
> because the program counter has never set foot on them before.
> Some maintainers might even find that
> picking a different hash function renders their code non-interoperable,
> or even that protocols they implement have SHA-1 hardcoded in the spec.
> Or that everything is ready, but real world deployments need another decade.
> Or that on-disk formats are just hard to change and migrate.
> Took git years to migrate from SHA-1, and some others haven't even started.
> There are gonna be investigations, planning, exceptions, upstream changes,
> opt-out mechanisms, arguing, compromises, waiting out, all kinds of things.
> It's gonna be big. Too big for a single release cycle.
>
> ---
>
> But how does one land something and give the distribution
> the extra cycles needed to react? That's not really clear to me.
>
> An obvious thing is to announce it in one cycle and land in another one.
> The downsides are well-documented
> in "The Hitchhiker's Guide to the Galaxy":
> announcements are one weak measure, and then it's too late.
>
> A second scheme I can come up with is a "jump scare".
> Break the functionality in Fedora 37 Rawhide,
> make most of the affected people realize the depth of the problem,
> then unbreak it. Break again for Fedora 38 and never fix.
>
> This could also be extended into "let one stable release slide'.
> Break in 37 Rawhide, unbreak on branched off 37,
> but never in Rawhide.
>
> But these are all rather... crude?
> Sure there should be better ways,
> preferably something explored before.
> I'm all for pulling this tooth out smoothly,
> but I need hints on how to do it.
> I hope that together we can devise a better plan than these.
>
> So, how does one land a change that's bigger than a release cycle?
>
> [1] https://eprint.iacr.org/2020/014


"You know these lights in the theaters that go out gradually?
 When the guy ve-ery slo-o-owly pulls the plug out?"
 - a joke from my childhood.


Hello, it's been quiet for a while, and I've been busy
but kept thinking about all the useful feedback you folks gave me.
Not that it made me flesh out a perfect plan,
but hopefully at least a less terrible one.

Regarding smudging the change in time,
how does the following three-phaser sound?

Phase 1 ("Wake-up Call"):
  In Fedora 37, disable SHA-1 signatures verification/creation
  in FUTURE policy, i.e. opt-in only.
  Come up with some logging solution;
  I'd prefer something non-invasive like eBPF USDT probes [2],
  but maybe even stderr could work, you've been moderately convincing.
  (FUTURE change is *maybe* doable in F36, but not logging.)
  Announce it as a system-wide change anyway for visibility,
  call for Test Days to report which apps/workflows rely on SHA-1 signatures
  either from the logs
  or from opting into blocking operations and seeing what starts failing hard.
  That'd have to be very actively called for to make an impact,
  impact that'd mostly be 

Summary/Minutes from today's FESCo Meeting (2022-03-29)

2022-03-29 Thread Zbigniew Jędrzejewski-Szmek
Meeting started at the wrong time and was cancelled because of lack of quorum.
See you next week, one hour earlier.

Minutes: 
https://meetbot.fedoraproject.org/fedora-meeting/2022-03-29/fesco.2022-03-29-18.00.html
Minutes (text): 
https://meetbot.fedoraproject.org/fedora-meeting/2022-03-29/fesco.2022-03-29-18.00.txt
Log: 
https://meetbot.fedoraproject.org/fedora-meeting/2022-03-29/fesco.2022-03-29-18.00.log.html

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Looking for provenpackager to update rapid-photo-downloader package

2022-03-29 Thread Damon Lynch
Greetings Fedora community, I am the developer of Rapid Photo Downloader. The 
package for it in Fedora is about two years old, and crashes during start-up 
under Python 3.10. 

As the subject says, I'm looking for a provenpackager to update the package. 
I'm posting this message here at the suggestion of a fellow PyQt developer who 
unlike myself is a Fedora expert.

I filed a bug report last year but the maintainer has been unable to work on 
it: https://bugzilla.redhat.com/show_bug.cgi?id=2031866
Meanwhile, two months ago Neal Gompa made this pull request to update it: 
https://src.fedoraproject.org/rpms/rapid-photo-downloader/pull-request/3

The current release is 0.9.33. Compared to the Fedora version, it requires a 
new package in Fedora: https://github.com/damonlynch/showinfilemanager

Unfortunately I'm unable to volunteer my time because I managed to injure my 
hands while working on the code earlier this year. Serious typing injuries are 
not fun. :-(  
(I'm dictating this using a voice recognition program under Windows.)

Fun fact: Fedora was the first distro to package Rapid Photo Downloader.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Please use side tags for backwards-incompatible bumps of major packages, not buildroot overrides

2022-03-29 Thread Mattia Verga via devel
Il 24/03/22 09:12, Petr Pisar ha scritto:
> V Wed, Mar 23, 2022 at 05:40:28PM +, Mattia Verga via devel napsal(a):
>> So, now that we have side-tags to perform this kind of builds, does the
>> buildroot override existence still make sense? Is there any use case
>> that still requires BR overrides and cannot be done with side-tags?
>>
> I use overrides pretty extensively when populating new EPEL. If you have
> a deep dependency tree and the packages are scattered among many maintainers,
> it's much faster to use an override than to block depending packages for
> a week. Side tags also do not work there because every new package would reset
> the testing period. And if I'm not mistaken non-proven packagers cannot edit
> other's updates. And I don't count communication overhead. People would end up
> mixing various side tags and crosstagging builds.
>
Maybe BR overrides usage should be restricted only to users with special
needs (users in provenpackager or releng groups), while "normal" users
should be forced to take the side-tag way?

Mattia

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[rpms/perl-Crypt-OpenSSL-PKCS10] PR #5: Fix detection of openssl library (bug #2069748)

2022-03-29 Thread Michal Josef Špaček

mspacek opened a new pull-request against the project: 
`perl-Crypt-OpenSSL-PKCS10` that you are following:
``
Fix detection of openssl library (bug #2069748)
``

To reply, visit the link below
https://src.fedoraproject.org/rpms/perl-Crypt-OpenSSL-PKCS10/pull-request/5
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2069748] Fix functionality of Crypt::OpenSSL::Guess in Makefile.PL

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2069748

Michal Josef Spacek  changed:

   What|Removed |Added

 Status|NEW |ASSIGNED
   Assignee|wjhns...@hardakers.net  |mspa...@redhat.com




-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2069748
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[rpms/perl-Crypt-OpenSSL-PKCS10] PR #4: Fix detection of openssl library (bug #2069748)

2022-03-29 Thread Michal Josef Špaček

mspacek opened a new pull-request against the project: 
`perl-Crypt-OpenSSL-PKCS10` that you are following:
``
Fix detection of openssl library (bug #2069748)
``

To reply, visit the link below
https://src.fedoraproject.org/rpms/perl-Crypt-OpenSSL-PKCS10/pull-request/4
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2069748] New: Fix functionality of Crypt::OpenSSL::Guess in Makefile.PL

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2069748

Bug ID: 2069748
   Summary: Fix functionality of Crypt::OpenSSL::Guess in
Makefile.PL
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Crypt-OpenSSL-PKCS10
  Assignee: wjhns...@hardakers.net
  Reporter: mspa...@redhat.com
QA Contact: extras...@fedoraproject.org
CC: perl-devel@lists.fedoraproject.org,
wjhns...@hardakers.net
  Target Milestone: ---
Classification: Fedora



Description of problem:
Bad OpenSSL library detection via Crypt::OpenSSL::Guess in Makefile.PL
Main issue is missing openssl tool which is required for guess

Version-Release number of selected component (if applicable):
perl-Crypt-OpenSSL-PKCS10-0.19-1.fc37
perl-Crypt-OpenSSL-PKCS10-0.19-1.fc36

How reproducible:
Build package and look to build.log

Actual results:
+ perl Makefile.PL INSTALLDIRS=vendor
Checking if your kit is complete...
Looks good
Warning: NAME must be a package name
Warning: Guessing NAME [Crypt-OpenSSL-PKCS10] from current directory name.
Use of uninitialized value in subroutine entry at
/usr/share/perl5/vendor_perl/Crypt/OpenSSL/Guess.pm line 167.
Use of uninitialized value in subroutine entry at
/usr/share/perl5/vendor_perl/Crypt/OpenSSL/Guess.pm line 167.
Use of uninitialized value in subroutine entry at
/usr/share/perl5/vendor_perl/Crypt/OpenSSL/Guess.pm line 167.
Use of uninitialized value in subroutine entry at
/usr/share/perl5/vendor_perl/Crypt/OpenSSL/Guess.pm line 167.
Use of uninitialized value in subroutine entry at
/usr/share/perl5/vendor_perl/Crypt/OpenSSL/Guess.pm line 167.
Use of uninitialized value $exec in -x at
/usr/share/perl5/vendor_perl/Crypt/OpenSSL/Guess.pm line 47.
Use of uninitialized value in subroutine entry at
/usr/share/perl5/vendor_perl/Crypt/OpenSSL/Guess.pm line 167.
Use of uninitialized value in subroutine entry at
/usr/share/perl5/vendor_perl/Crypt/OpenSSL/Guess.pm line 167.
Use of uninitialized value in subroutine entry at
/usr/share/perl5/vendor_perl/Crypt/OpenSSL/Guess.pm line 167.
Use of uninitialized value in subroutine entry at
/usr/share/perl5/vendor_perl/Crypt/OpenSSL/Guess.pm line 167.
Use of uninitialized value in subroutine entry at
/usr/share/perl5/vendor_perl/Crypt/OpenSSL/Guess.pm line 167.
Use of uninitialized value $exec in -x at
/usr/share/perl5/vendor_perl/Crypt/OpenSSL/Guess.pm line 21.
Checking if your kit is complete...

Expected results:
Without warnings and with right detection of openssl library.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2069748
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Support FIDO Device Onboarding (Self-Contained Change proposal)

2022-03-29 Thread Peter Robinson
> On Tue, 2022-03-29 at 14:38 +, Peter Robinson wrote:
> > > > > > Can we get a link to the actual software stack being
> > > > > > proposed?
> > > > > > The link in this proposal is a marketing post ...
> > > > >
> > > > > Yes, that was an oversight, for reference:
> > > > > https://github.com/fedora-iot/fido-device-onboard-rs
> > > >
> > > > For reference it's under scope where I mentioned the
> > > > implementation
> > > > and clearly forgot to add the link.
> > > >
> > >
> > > This is pretty neat! What kind of stuff can be done with this
> > > onboarding system?
> >
> > It's designed to be small and straight forward, do one job securely
>
> Where is the security part coming from ?
> Does this require devices to be pre-registred/pre-seeded with some root
> of trust?
> Or is it TOFU ?
>
> Or something else?

It uses a RoT/chain of trust, details are in the spec:
https://fidoalliance.org/specs/FDO/FIDO-Device-Onboard-RD-v1.1-20211214/FIDO-device-onboard-spec-v1.1-rd-20211214.html
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Support FIDO Device Onboarding (Self-Contained Change proposal)

2022-03-29 Thread Simo Sorce
On Tue, 2022-03-29 at 14:38 +, Peter Robinson wrote:
> > > > > Can we get a link to the actual software stack being
> > > > > proposed?
> > > > > The link in this proposal is a marketing post ...
> > > > 
> > > > Yes, that was an oversight, for reference:
> > > > https://github.com/fedora-iot/fido-device-onboard-rs
> > > 
> > > For reference it's under scope where I mentioned the
> > > implementation
> > > and clearly forgot to add the link.
> > > 
> > 
> > This is pretty neat! What kind of stuff can be done with this
> > onboarding system?
> 
> It's designed to be small and straight forward, do one job securely

Where is the security part coming from ?
Does this require devices to be pre-registred/pre-seeded with some root
of trust?
Or is it TOFU ?

Or something else?

> and succinctly. It's extendable by SIMs (Service Information Modules)
> and ATM we have a small set of SIMs to do things like add a
> user/ssh-key, add a file and run a command. We'll be adding
> functionality like the ability to specify OTA update URLs.
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines:
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it:
> https://pagure.io/fedora-infrastructure

-- 
Simo Sorce
RHEL Crypto Team
Red Hat, Inc



___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Support FIDO Device Onboarding (Self-Contained Change proposal)

2022-03-29 Thread Peter Robinson
On Tue, Mar 29, 2022 at 3:45 PM Neal Gompa  wrote:
>
> On Tue, Mar 29, 2022 at 10:38 AM Peter Robinson  wrote:
> >
> > > > > > Can we get a link to the actual software stack being proposed?
> > > > > > The link in this proposal is a marketing post ...
> > > > >
> > > > > Yes, that was an oversight, for reference:
> > > > > https://github.com/fedora-iot/fido-device-onboard-rs
> > > >
> > > > For reference it's under scope where I mentioned the implementation
> > > > and clearly forgot to add the link.
> > > >
> > >
> > > This is pretty neat! What kind of stuff can be done with this onboarding 
> > > system?
> >
> > It's designed to be small and straight forward, do one job securely
> > and succinctly. It's extendable by SIMs (Service Information Modules)
> > and ATM we have a small set of SIMs to do things like add a
> > user/ssh-key, add a file and run a command. We'll be adding
> > functionality like the ability to specify OTA update URLs.
>
> Just to check my understanding here, we can basically bootstrap users,
> download a script, and run it? And in the future we can configure
> RPM-OSTree update remotes?

Basically yes, the OTA is intended to be generic as part of the
standard so we're still working out how exactly to make that generic,
hence why it's not there yet, but the other three are essentially
correct.

This is the first phase of getting it into Fedora IoT so interested
parties can start to play. It's evolving and under active development
and there will be new features coming that will likely be part of
different Change proposals but are not part of this one. This is about
the core functionality.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Schedule for Tuesday's FESCo Meeting (2022-03-29)

2022-03-29 Thread Miro Hrončok

Following is the list of topics that will be discussed in the
FESCo meeting Tuesday at 17:00UTC in #fedora-meeting on
irc.libera.chat.

To convert UTC to your local time, take a look at
  http://fedoraproject.org/wiki/UTCHowto

or run:
  date -d '2022-03-29 17:00 UTC'


Links to all issues to be discussed can be found at:
https://pagure.io/fesco/report/meeting_agenda

= Discussed and Voted in the Ticket =

Nonresponsive maintainer: Samuel Rakitničan srakitnican
https://pagure.io/fesco/issue/2771
APPROVED (self-approved)

Change proposal: Encourage Dropping Unused / Leaf Packages on i686
https://pagure.io/fesco/issue/2773
APPROVED (+4,0,-0)

provenpackager for frantisekz
https://pagure.io/fesco/issue/2775
APPROVED (+8, 0, -0)

provenpackager for tpopela
https://pagure.io/fesco/issue/2776
APPROVED (+12, 0, -0)

= Followups =

#2766 Change proposal: Make pkexec and pkla-compat optional
https://pagure.io/fesco/issue/2766

= New business =

 #2774 provenpackager for trodgers
https://pagure.io/fesco/issue/2774

= Open Floor =

For more complete details, please visit each individual
issue.  The report of the agenda items can be found at
https://pagure.io/fesco/report/meeting_agenda

If you would like to add something to this agenda, you can
reply to this e-mail, file a new issue at
https://pagure.io/fesco, or bring it
up at the end of the meeting, during the open floor topic. Note
that added topics may be deferred until the following meeting.

--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Support FIDO Device Onboarding (Self-Contained Change proposal)

2022-03-29 Thread Neal Gompa
On Tue, Mar 29, 2022 at 10:38 AM Peter Robinson  wrote:
>
> > > > > Can we get a link to the actual software stack being proposed?
> > > > > The link in this proposal is a marketing post ...
> > > >
> > > > Yes, that was an oversight, for reference:
> > > > https://github.com/fedora-iot/fido-device-onboard-rs
> > >
> > > For reference it's under scope where I mentioned the implementation
> > > and clearly forgot to add the link.
> > >
> >
> > This is pretty neat! What kind of stuff can be done with this onboarding 
> > system?
>
> It's designed to be small and straight forward, do one job securely
> and succinctly. It's extendable by SIMs (Service Information Modules)
> and ATM we have a small set of SIMs to do things like add a
> user/ssh-key, add a file and run a command. We'll be adding
> functionality like the ability to specify OTA update URLs.

Just to check my understanding here, we can basically bootstrap users,
download a script, and run it? And in the future we can configure
RPM-OSTree update remotes?



-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Support FIDO Device Onboarding (Self-Contained Change proposal)

2022-03-29 Thread Peter Robinson
> > > > Can we get a link to the actual software stack being proposed?
> > > > The link in this proposal is a marketing post ...
> > >
> > > Yes, that was an oversight, for reference:
> > > https://github.com/fedora-iot/fido-device-onboard-rs
> >
> > For reference it's under scope where I mentioned the implementation
> > and clearly forgot to add the link.
> >
>
> This is pretty neat! What kind of stuff can be done with this onboarding 
> system?

It's designed to be small and straight forward, do one job securely
and succinctly. It's extendable by SIMs (Service Information Modules)
and ATM we have a small set of SIMs to do things like add a
user/ssh-key, add a file and run a command. We'll be adding
functionality like the ability to specify OTA update URLs.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Support FIDO Device Onboarding (Self-Contained Change proposal)

2022-03-29 Thread Neal Gompa
On Tue, Mar 29, 2022 at 10:29 AM Peter Robinson  wrote:
>
> On Tue, Mar 29, 2022 at 3:26 PM Peter Robinson  wrote:
> >
> > On Tue, Mar 29, 2022 at 3:25 PM Simo Sorce  wrote:
> > >
> > > Can we get a link to the actual software stack being proposed?
> > > The link in this proposal is a marketing post ...
> >
> > Yes, that was an oversight, for reference:
> > https://github.com/fedora-iot/fido-device-onboard-rs
>
> For reference it's under scope where I mentioned the implementation
> and clearly forgot to add the link.
>

This is pretty neat! What kind of stuff can be done with this onboarding system?




--
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Fedocal] Reminder meeting : Fedora Source-git SIG

2022-03-29 Thread csomh
Dear all,

You are kindly invited to the meeting:
   Fedora Source-git SIG on 2022-03-30 from 14:30:00 to 15:30:00 GMT
   At meet.google.com/mic-otnv-kse

The meeting will be about:
Meeting of the Fedora source-git SIG

Agenda:
https://pagure.io/fedora-source-git/sig/issues?tags=meeting=Open

SIG Info:
https://fedoraproject.org/wiki/SIGs/Source-git


Source: https://calendar.fedoraproject.org//meeting/10164/

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Support FIDO Device Onboarding (Self-Contained Change proposal)

2022-03-29 Thread Peter Robinson
On Tue, Mar 29, 2022 at 3:26 PM Peter Robinson  wrote:
>
> On Tue, Mar 29, 2022 at 3:25 PM Simo Sorce  wrote:
> >
> > Can we get a link to the actual software stack being proposed?
> > The link in this proposal is a marketing post ...
>
> Yes, that was an oversight, for reference:
> https://github.com/fedora-iot/fido-device-onboard-rs

For reference it's under scope where I mentioned the implementation
and clearly forgot to add the link.

> > On Tue, 2022-03-29 at 09:50 -0400, Ben Cotton wrote:
> > > https://fedoraproject.org/wiki/Changes/FIDODeviceOnboarding
> > >
> > > == Summary ==
> > > Package and enable the
> > > [https://fidoalliance.org/fido-alliance-creates-new-onboarding-standard-to-secure-internet-of-things-iot/
> > > FIDO Device Onboarding] software stack for Zero Touch Onboarding on
> > > Fedora IoT.
> > >
> > > == Owner ==
> > > * Name: [[User:pbrobinson| Peter Robinson]]
> > > * Email: [mailto:pbrobin...@fedoraproject.org| 
> > > pbrobin...@fedoraproject.org]
> > > * Name: [[User:runcom| Antonio Murdaca]]
> > > * Email: [mailto:amurd...@redhat.com| amurd...@redhat.com]
> > >
> > >
> > > == Detailed Description ==
> > >
> > > The ability for an IoT or Edge device to be plugged in and
> > > automatically onboard itself with zero user interaction is critical to
> > > be able to scale IoT/Edge to millions of devices. To do this in a
> > > secure way with open standards across the industry is even more
> > > critical. The FIDO IoT working group has worked with leaders in the
> > > silicon industry such as Intel and Arm to produce the FIDO Device
> > > onboarding spec which allows a device credential, a root and chain of
> > > trust to ensure the secure onboarding of a device without the need of
> > > stored credentials.
> > >
> > > == Benefit to Fedora ==
> > >
> > > The benefit to Fedora is to allow the IoT Edition to demonstrate the
> > > use of leading edge open industry protocols for onboarding IoT and
> > > Edge devices.
> > >
> > > == Scope ==
> > > * Proposal owners:
> > > ** Package the rust implementation of the FIDO device onboarding stack
> > > including client, rendezvous service, owner onboarding service and
> > > prototype manufacturing service.
> > > ** Enable the client service by default for IoT Edition
> > > ** Add the client service to the IoT Edition deliverables
> > >
> > > * Other developers:
> > > ** No impact
> > >
> > > * Release engineering: [https://pagure.io/releng/issue/10720 #10720]
> > > * Policies and guidelines: N/A (not a System Wide Change)
> > > * Trademark approval: N/A (not needed for this Change)
> > >
> > > == Upgrade/compatibility impact ==
> > > There is no upgrade impact. FIDO FDO is a single use onboarding
> > > protocol and will not impact existing IoT user systems.
> > >
> > > == How To Test ==
> > >
> > > * Test with FDO all-in-one services. Documentation will be available
> > > for testing.
> > >
> > > == User Experience ==
> > >
> > > No impact to non IoT Edition users.
> > >
> > > The user experience for the IoT Edition is still evolving and this
> > > will be updated as things fall into place later in Spring and early
> > > Summer 2022.
> > >
> > > == Dependencies ==
> > > N/A (not a System Wide Change)
> > >
> > > == Contingency Plan ==
> > >
> > > * Contingency mechanism: Not shipping FDO as a package in Fedora or
> > > including it in the IoT Edition
> > > * Contingency deadline: GA
> > > * Blocks release? No.
> > > * Blocks product? No.
> > >
> > > == Documentation ==
> > > N/A (not a System Wide Change)
> > >
> > > == Release Notes ==
> > > Fedora IoT Edition supports the FIDO Device Onboarding 1.1
> > > specification for zero touch onboarding of IoT and Edge devices.
> > >
> > >
> > > --
> > > Ben Cotton
> > > He / Him / His
> > > Fedora Program Manager
> > > Red Hat
> > > TZ=America/Indiana/Indianapolis
> > > ___
> > > devel mailing list -- devel@lists.fedoraproject.org
> > > To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> > > Fedora Code of Conduct: 
> > > https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> > > List Archives: 
> > > https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> > > Do not reply to spam on the list, report it: 
> > > https://pagure.io/fedora-infrastructure
> >
> > --
> > Simo Sorce
> > RHEL Crypto Team
> > Red Hat, Inc
> >
> >
> >
> > ___
> > devel mailing list -- devel@lists.fedoraproject.org
> > To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> > Fedora Code of Conduct: 
> > https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> > List Archives: 
> > https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> > Do not reply to spam on the list, report it: 
> > 

Re: F37 Change: Support FIDO Device Onboarding (Self-Contained Change proposal)

2022-03-29 Thread Peter Robinson
On Tue, Mar 29, 2022 at 3:25 PM Simo Sorce  wrote:
>
> Can we get a link to the actual software stack being proposed?
> The link in this proposal is a marketing post ...

Yes, that was an oversight, for reference:
https://github.com/fedora-iot/fido-device-onboard-rs

> On Tue, 2022-03-29 at 09:50 -0400, Ben Cotton wrote:
> > https://fedoraproject.org/wiki/Changes/FIDODeviceOnboarding
> >
> > == Summary ==
> > Package and enable the
> > [https://fidoalliance.org/fido-alliance-creates-new-onboarding-standard-to-secure-internet-of-things-iot/
> > FIDO Device Onboarding] software stack for Zero Touch Onboarding on
> > Fedora IoT.
> >
> > == Owner ==
> > * Name: [[User:pbrobinson| Peter Robinson]]
> > * Email: [mailto:pbrobin...@fedoraproject.org| pbrobin...@fedoraproject.org]
> > * Name: [[User:runcom| Antonio Murdaca]]
> > * Email: [mailto:amurd...@redhat.com| amurd...@redhat.com]
> >
> >
> > == Detailed Description ==
> >
> > The ability for an IoT or Edge device to be plugged in and
> > automatically onboard itself with zero user interaction is critical to
> > be able to scale IoT/Edge to millions of devices. To do this in a
> > secure way with open standards across the industry is even more
> > critical. The FIDO IoT working group has worked with leaders in the
> > silicon industry such as Intel and Arm to produce the FIDO Device
> > onboarding spec which allows a device credential, a root and chain of
> > trust to ensure the secure onboarding of a device without the need of
> > stored credentials.
> >
> > == Benefit to Fedora ==
> >
> > The benefit to Fedora is to allow the IoT Edition to demonstrate the
> > use of leading edge open industry protocols for onboarding IoT and
> > Edge devices.
> >
> > == Scope ==
> > * Proposal owners:
> > ** Package the rust implementation of the FIDO device onboarding stack
> > including client, rendezvous service, owner onboarding service and
> > prototype manufacturing service.
> > ** Enable the client service by default for IoT Edition
> > ** Add the client service to the IoT Edition deliverables
> >
> > * Other developers:
> > ** No impact
> >
> > * Release engineering: [https://pagure.io/releng/issue/10720 #10720]
> > * Policies and guidelines: N/A (not a System Wide Change)
> > * Trademark approval: N/A (not needed for this Change)
> >
> > == Upgrade/compatibility impact ==
> > There is no upgrade impact. FIDO FDO is a single use onboarding
> > protocol and will not impact existing IoT user systems.
> >
> > == How To Test ==
> >
> > * Test with FDO all-in-one services. Documentation will be available
> > for testing.
> >
> > == User Experience ==
> >
> > No impact to non IoT Edition users.
> >
> > The user experience for the IoT Edition is still evolving and this
> > will be updated as things fall into place later in Spring and early
> > Summer 2022.
> >
> > == Dependencies ==
> > N/A (not a System Wide Change)
> >
> > == Contingency Plan ==
> >
> > * Contingency mechanism: Not shipping FDO as a package in Fedora or
> > including it in the IoT Edition
> > * Contingency deadline: GA
> > * Blocks release? No.
> > * Blocks product? No.
> >
> > == Documentation ==
> > N/A (not a System Wide Change)
> >
> > == Release Notes ==
> > Fedora IoT Edition supports the FIDO Device Onboarding 1.1
> > specification for zero touch onboarding of IoT and Edge devices.
> >
> >
> > --
> > Ben Cotton
> > He / Him / His
> > Fedora Program Manager
> > Red Hat
> > TZ=America/Indiana/Indianapolis
> > ___
> > devel mailing list -- devel@lists.fedoraproject.org
> > To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> > Fedora Code of Conduct: 
> > https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> > List Archives: 
> > https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> > Do not reply to spam on the list, report it: 
> > https://pagure.io/fedora-infrastructure
>
> --
> Simo Sorce
> RHEL Crypto Team
> Red Hat, Inc
>
>
>
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it: 
> https://pagure.io/fedora-infrastructure
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 

F37 Change: Build Fedora IoT Artifacts with osbuild (Self-Contained Change)

2022-03-29 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/IoTArtifactsWithOSBuild


== Summary ==
Build the key Fedora IoT artifacts such as the raw images and the
traditional anaconda installer with osbuild.

== Owner ==
* Name: [[User:pwhalen| Paul Whalen]]
* Email: [mailto:pwha...@redhat.com| pwha...@redhat.com]
* Name: [[User:obudai| Ondřej Budai]]
* Email: [mailto:obu...@redhat.com| ond...@budai.cz]
* Name: [[User:pbrobinson| Peter Robinson]]
* Email: [mailto:pbrobin...@fedoraproject.org| pbrobin...@fedoraproject.org]


== Detailed Description ==

The intention for Fedora IoT was to always use osbuild for building
release artifacts but it wasn't initially ready to do that. With the
work being done as part of "RHEL for Edge" the Fedora IoT deliverables
now sadly trail behind the features and functionality of the
downstream. This will move all existing deliverable artifacts over to
being created with osbuild which will allow us to bring Fedora IoT
back to being the true upstream for RHEL for Edge and allow us to use
the leading edge that is Fedora to continue to innovate in the Edge
and IoT space.

== Benefit to Fedora ==

The benefit to Fedora is to allow the IoT Edition to go back to being
the true upstream for RHEL for Edge and for Fedora to be where all the
cool new innovation on the edge is being done.

== Scope ==
* Proposal owners:
** Test building IoT artifacts with osbuild to ensure they're
consistent with the existing ones
** Update to Fedora IoT profiles in osbuild
** Update to pungi configs to move over the artefact creation

* Other developers:
** No impact

* Release engineering: [https://pagure.io/releng/issue/10722 #10722]
* Policies and guidelines: N/A (not a System Wide Change)
* Trademark approval: N/A (not needed for this Change)

== Upgrade/compatibility impact ==
There is no upgrade impact. Existing IoT users will upgrade as before
as only new release artifacts will use the new mechanism. The
deployment of the artifacts should not initially change with them
being created with osbuild. There may well be new enhancements in the
future but those are out of scope of this change.

== How To Test ==

* All Fedora IoT artifacts should be consumable and testable as  before.

== User Experience ==

There should be no IoT users, there is no impact to non IoT Edition users.

== Dependencies ==
N/A (not a System Wide Change)

== Contingency Plan ==

* Contingency mechanism: Roll back to the current means of generating images.
* Contingency deadline: Beta
* Blocks release? No.
* Blocks product? No.

== Documentation ==
N/A (not a System Wide Change)

== Release Notes ==
N/A


-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora CoreOS next stream rebased to Fedora Linux 36

2022-03-29 Thread Dusty Mabe
Fedora Linux 36 Beta was released today [1]. Our Fedora CoreOS `next` stream
has been migrated to Fedora Linux 36 content. Existing nodes on the `next`
stream will update as normal over the following days.

In addition to the Fedora Project accepted changes for Fedora 36 [2], there
are a few Fedora CoreOS recent announcements to consider with this update:

- Fedora CoreOS moving to podman v4 [3]
- Fedora CoreOS moving to iptables-nft [4]

Please test out the `next` stream over the coming month and report any issues
in our issue tracker [5].

Thank you to everyone helping find issues by running the `next` stream!

The Fedora CoreOS Team

[1] https://fedoramagazine.org/announcing-fedora-36-beta/
[2] https://fedoraproject.org/wiki/Releases/36/ChangeSet
[3] 
https://discussion.fedoraproject.org/t/fedora-coreos-moving-to-podman-v4/37303/2
[4] 
https://discussion.fedoraproject.org/t/fedora-coreos-moving-to-iptables-nft/37302/2
[5] https://github.com/coreos/fedora-coreos-tracker/issues
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Support FIDO Device Onboarding (Self-Contained Change proposal)

2022-03-29 Thread Simo Sorce
Can we get a link to the actual software stack being proposed?
The link in this proposal is a marketing post ...

On Tue, 2022-03-29 at 09:50 -0400, Ben Cotton wrote:
> https://fedoraproject.org/wiki/Changes/FIDODeviceOnboarding
> 
> == Summary ==
> Package and enable the
> [https://fidoalliance.org/fido-alliance-creates-new-onboarding-standard-to-secure-internet-of-things-iot/
> FIDO Device Onboarding] software stack for Zero Touch Onboarding on
> Fedora IoT.
> 
> == Owner ==
> * Name: [[User:pbrobinson| Peter Robinson]]
> * Email: [mailto:pbrobin...@fedoraproject.org| pbrobin...@fedoraproject.org]
> * Name: [[User:runcom| Antonio Murdaca]]
> * Email: [mailto:amurd...@redhat.com| amurd...@redhat.com]
> 
> 
> == Detailed Description ==
> 
> The ability for an IoT or Edge device to be plugged in and
> automatically onboard itself with zero user interaction is critical to
> be able to scale IoT/Edge to millions of devices. To do this in a
> secure way with open standards across the industry is even more
> critical. The FIDO IoT working group has worked with leaders in the
> silicon industry such as Intel and Arm to produce the FIDO Device
> onboarding spec which allows a device credential, a root and chain of
> trust to ensure the secure onboarding of a device without the need of
> stored credentials.
> 
> == Benefit to Fedora ==
> 
> The benefit to Fedora is to allow the IoT Edition to demonstrate the
> use of leading edge open industry protocols for onboarding IoT and
> Edge devices.
> 
> == Scope ==
> * Proposal owners:
> ** Package the rust implementation of the FIDO device onboarding stack
> including client, rendezvous service, owner onboarding service and
> prototype manufacturing service.
> ** Enable the client service by default for IoT Edition
> ** Add the client service to the IoT Edition deliverables
> 
> * Other developers:
> ** No impact
> 
> * Release engineering: [https://pagure.io/releng/issue/10720 #10720]
> * Policies and guidelines: N/A (not a System Wide Change)
> * Trademark approval: N/A (not needed for this Change)
> 
> == Upgrade/compatibility impact ==
> There is no upgrade impact. FIDO FDO is a single use onboarding
> protocol and will not impact existing IoT user systems.
> 
> == How To Test ==
> 
> * Test with FDO all-in-one services. Documentation will be available
> for testing.
> 
> == User Experience ==
> 
> No impact to non IoT Edition users.
> 
> The user experience for the IoT Edition is still evolving and this
> will be updated as things fall into place later in Spring and early
> Summer 2022.
> 
> == Dependencies ==
> N/A (not a System Wide Change)
> 
> == Contingency Plan ==
> 
> * Contingency mechanism: Not shipping FDO as a package in Fedora or
> including it in the IoT Edition
> * Contingency deadline: GA
> * Blocks release? No.
> * Blocks product? No.
> 
> == Documentation ==
> N/A (not a System Wide Change)
> 
> == Release Notes ==
> Fedora IoT Edition supports the FIDO Device Onboarding 1.1
> specification for zero touch onboarding of IoT and Edge devices.
> 
> 
> -- 
> Ben Cotton
> He / Him / His
> Fedora Program Manager
> Red Hat
> TZ=America/Indiana/Indianapolis
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it: 
> https://pagure.io/fedora-infrastructure

-- 
Simo Sorce
RHEL Crypto Team
Red Hat, Inc



___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


F37 Change: Build Fedora IoT Artifacts with osbuild (Self-Contained Change)

2022-03-29 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/IoTArtifactsWithOSBuild


== Summary ==
Build the key Fedora IoT artifacts such as the raw images and the
traditional anaconda installer with osbuild.

== Owner ==
* Name: [[User:pwhalen| Paul Whalen]]
* Email: [mailto:pwha...@redhat.com| pwha...@redhat.com]
* Name: [[User:obudai| Ondřej Budai]]
* Email: [mailto:obu...@redhat.com| ond...@budai.cz]
* Name: [[User:pbrobinson| Peter Robinson]]
* Email: [mailto:pbrobin...@fedoraproject.org| pbrobin...@fedoraproject.org]


== Detailed Description ==

The intention for Fedora IoT was to always use osbuild for building
release artifacts but it wasn't initially ready to do that. With the
work being done as part of "RHEL for Edge" the Fedora IoT deliverables
now sadly trail behind the features and functionality of the
downstream. This will move all existing deliverable artifacts over to
being created with osbuild which will allow us to bring Fedora IoT
back to being the true upstream for RHEL for Edge and allow us to use
the leading edge that is Fedora to continue to innovate in the Edge
and IoT space.

== Benefit to Fedora ==

The benefit to Fedora is to allow the IoT Edition to go back to being
the true upstream for RHEL for Edge and for Fedora to be where all the
cool new innovation on the edge is being done.

== Scope ==
* Proposal owners:
** Test building IoT artifacts with osbuild to ensure they're
consistent with the existing ones
** Update to Fedora IoT profiles in osbuild
** Update to pungi configs to move over the artefact creation

* Other developers:
** No impact

* Release engineering: [https://pagure.io/releng/issue/10722 #10722]
* Policies and guidelines: N/A (not a System Wide Change)
* Trademark approval: N/A (not needed for this Change)

== Upgrade/compatibility impact ==
There is no upgrade impact. Existing IoT users will upgrade as before
as only new release artifacts will use the new mechanism. The
deployment of the artifacts should not initially change with them
being created with osbuild. There may well be new enhancements in the
future but those are out of scope of this change.

== How To Test ==

* All Fedora IoT artifacts should be consumable and testable as  before.

== User Experience ==

There should be no IoT users, there is no impact to non IoT Edition users.

== Dependencies ==
N/A (not a System Wide Change)

== Contingency Plan ==

* Contingency mechanism: Roll back to the current means of generating images.
* Contingency deadline: Beta
* Blocks release? No.
* Blocks product? No.

== Documentation ==
N/A (not a System Wide Change)

== Release Notes ==
N/A


-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora 36 Beta Release Announcement

2022-03-29 Thread Tomas Hrcka
Fedora Linux 36 Beta Released
--

The Fedora Project is pleased to announce the immediate availability
of Fedora 36 Beta, the next step towards our planned Fedora 36 release
at the end of April.

Download the prerelease from our Get Fedora site:
* Get Fedora 36 Beta Workstation:
https://getfedora.org/workstation/download/
* Get Fedora 36 Beta Server: https://getfedora.org/server/download/
* Get Fedora 36 IoT: https://getfedora.org/iot/download/

Or, check out one of our popular variants, including KDE Plasma, Xfce,
and other desktop environments, as well as images for ARM devices:

* Get Fedora 36 Beta Spins: https://spins.fedoraproject.org/prerelease
* Get Fedora 36 Beta Labs: https://labs.fedoraproject.org/prerelease
* Get Fedora 36 Beta ARM: https://arm.fedoraproject.org/prerelease

## Beta Release Highlights

* Fedora 36 Workstation Beta includes GNOME 42
* Update of programming languages and libraries: LXQt 1.0, Golang 1.18,
Ruby 3.1

For more details about the release, read the full announcement at

* https://fedoramagazine.org/announcing-fedora-36-beta/

or look for the prerelease pages in the download sections at

* https://getfedora.org/

Since this is a Beta release, we expect that you may encounter bugs or
missing features. To report issues encountered during testing, contact
the Fedora QA team via the t...@lists.fedoraproject.org mailing list or
in #fedora-qa on Libera Chat or the #qa:fedoraproject.org Matrix room.

Regards,
Tomas Hrcka
Fedora Release Engineering.
___
devel-announce mailing list -- devel-annou...@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel-annou...@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora 36 Beta Release Announcement

2022-03-29 Thread Tomas Hrcka
Fedora Linux 36 Beta Released
--

The Fedora Project is pleased to announce the immediate availability
of Fedora 36 Beta, the next step towards our planned Fedora 36 release
at the end of April.

Download the prerelease from our Get Fedora site:
* Get Fedora 36 Beta Workstation:
https://getfedora.org/workstation/download/
* Get Fedora 36 Beta Server: https://getfedora.org/server/download/
* Get Fedora 36 IoT: https://getfedora.org/iot/download/

Or, check out one of our popular variants, including KDE Plasma, Xfce,
and other desktop environments, as well as images for ARM devices:

* Get Fedora 36 Beta Spins: https://spins.fedoraproject.org/prerelease
* Get Fedora 36 Beta Labs: https://labs.fedoraproject.org/prerelease
* Get Fedora 36 Beta ARM: https://arm.fedoraproject.org/prerelease

## Beta Release Highlights

* Fedora 36 Workstation Beta includes GNOME 42
* Update of programming languages and libraries: LXQt 1.0, Golang 1.18,
Ruby 3.1

For more details about the release, read the full announcement at

* https://fedoramagazine.org/announcing-fedora-36-beta/

or look for the prerelease pages in the download sections at

* https://getfedora.org/

Since this is a Beta release, we expect that you may encounter bugs or
missing features. To report issues encountered during testing, contact
the Fedora QA team via the t...@lists.fedoraproject.org mailing list or
in #fedora-qa on Libera Chat or the #qa:fedoraproject.org Matrix room.

Regards,
Tomas Hrcka
Fedora Release Engineering.
___
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


F37 Change: Support FIDO Device Onboarding (Self-Contained Change proposal)

2022-03-29 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/FIDODeviceOnboarding

== Summary ==
Package and enable the
[https://fidoalliance.org/fido-alliance-creates-new-onboarding-standard-to-secure-internet-of-things-iot/
FIDO Device Onboarding] software stack for Zero Touch Onboarding on
Fedora IoT.

== Owner ==
* Name: [[User:pbrobinson| Peter Robinson]]
* Email: [mailto:pbrobin...@fedoraproject.org| pbrobin...@fedoraproject.org]
* Name: [[User:runcom| Antonio Murdaca]]
* Email: [mailto:amurd...@redhat.com| amurd...@redhat.com]


== Detailed Description ==

The ability for an IoT or Edge device to be plugged in and
automatically onboard itself with zero user interaction is critical to
be able to scale IoT/Edge to millions of devices. To do this in a
secure way with open standards across the industry is even more
critical. The FIDO IoT working group has worked with leaders in the
silicon industry such as Intel and Arm to produce the FIDO Device
onboarding spec which allows a device credential, a root and chain of
trust to ensure the secure onboarding of a device without the need of
stored credentials.

== Benefit to Fedora ==

The benefit to Fedora is to allow the IoT Edition to demonstrate the
use of leading edge open industry protocols for onboarding IoT and
Edge devices.

== Scope ==
* Proposal owners:
** Package the rust implementation of the FIDO device onboarding stack
including client, rendezvous service, owner onboarding service and
prototype manufacturing service.
** Enable the client service by default for IoT Edition
** Add the client service to the IoT Edition deliverables

* Other developers:
** No impact

* Release engineering: [https://pagure.io/releng/issue/10720 #10720]
* Policies and guidelines: N/A (not a System Wide Change)
* Trademark approval: N/A (not needed for this Change)

== Upgrade/compatibility impact ==
There is no upgrade impact. FIDO FDO is a single use onboarding
protocol and will not impact existing IoT user systems.

== How To Test ==

* Test with FDO all-in-one services. Documentation will be available
for testing.

== User Experience ==

No impact to non IoT Edition users.

The user experience for the IoT Edition is still evolving and this
will be updated as things fall into place later in Spring and early
Summer 2022.

== Dependencies ==
N/A (not a System Wide Change)

== Contingency Plan ==

* Contingency mechanism: Not shipping FDO as a package in Fedora or
including it in the IoT Edition
* Contingency deadline: GA
* Blocks release? No.
* Blocks product? No.

== Documentation ==
N/A (not a System Wide Change)

== Release Notes ==
Fedora IoT Edition supports the FIDO Device Onboarding 1.1
specification for zero touch onboarding of IoT and Edge devices.


-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


F37 Change: Support FIDO Device Onboarding (Self-Contained Change proposal)

2022-03-29 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/FIDODeviceOnboarding

== Summary ==
Package and enable the
[https://fidoalliance.org/fido-alliance-creates-new-onboarding-standard-to-secure-internet-of-things-iot/
FIDO Device Onboarding] software stack for Zero Touch Onboarding on
Fedora IoT.

== Owner ==
* Name: [[User:pbrobinson| Peter Robinson]]
* Email: [mailto:pbrobin...@fedoraproject.org| pbrobin...@fedoraproject.org]
* Name: [[User:runcom| Antonio Murdaca]]
* Email: [mailto:amurd...@redhat.com| amurd...@redhat.com]


== Detailed Description ==

The ability for an IoT or Edge device to be plugged in and
automatically onboard itself with zero user interaction is critical to
be able to scale IoT/Edge to millions of devices. To do this in a
secure way with open standards across the industry is even more
critical. The FIDO IoT working group has worked with leaders in the
silicon industry such as Intel and Arm to produce the FIDO Device
onboarding spec which allows a device credential, a root and chain of
trust to ensure the secure onboarding of a device without the need of
stored credentials.

== Benefit to Fedora ==

The benefit to Fedora is to allow the IoT Edition to demonstrate the
use of leading edge open industry protocols for onboarding IoT and
Edge devices.

== Scope ==
* Proposal owners:
** Package the rust implementation of the FIDO device onboarding stack
including client, rendezvous service, owner onboarding service and
prototype manufacturing service.
** Enable the client service by default for IoT Edition
** Add the client service to the IoT Edition deliverables

* Other developers:
** No impact

* Release engineering: [https://pagure.io/releng/issue/10720 #10720]
* Policies and guidelines: N/A (not a System Wide Change)
* Trademark approval: N/A (not needed for this Change)

== Upgrade/compatibility impact ==
There is no upgrade impact. FIDO FDO is a single use onboarding
protocol and will not impact existing IoT user systems.

== How To Test ==

* Test with FDO all-in-one services. Documentation will be available
for testing.

== User Experience ==

No impact to non IoT Edition users.

The user experience for the IoT Edition is still evolving and this
will be updated as things fall into place later in Spring and early
Summer 2022.

== Dependencies ==
N/A (not a System Wide Change)

== Contingency Plan ==

* Contingency mechanism: Not shipping FDO as a package in Fedora or
including it in the IoT Edition
* Contingency deadline: GA
* Blocks release? No.
* Blocks product? No.

== Documentation ==
N/A (not a System Wide Change)

== Release Notes ==
Fedora IoT Edition supports the FIDO Device Onboarding 1.1
specification for zero touch onboarding of IoT and Edge devices.


-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2064808] Update perl to 5.34.1

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2064808

Paul Howarth  changed:

   What|Removed |Added

  Flags|needinfo?(p...@city-fan.org |
   |)   |



--- Comment #11 from Paul Howarth  ---
@mspa...@redhat.com perl-PAR-Packer is done, I have kicked off polymake build:
https://koji.fedoraproject.org/koji/taskinfo?taskID=84887018

$ koji list-tagged f35-build-side-52326
Build Tag   Built by
   

perl-5.34.1-486.fc35  f35-build-side-52326  mspacek
perl-PAR-Packer-1.052-5.fc35  f35-build-side-52326  pghmcfc


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2064808
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2064808] Update perl to 5.34.1

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2064808



--- Comment #10 from Michal Josef Spacek  ---
Perl build: https://koji.fedoraproject.org/koji/taskinfo?taskID=84883465


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2064808
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2064808] Update perl to 5.34.1

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2064808

Michal Josef Spacek  changed:

   What|Removed |Added

  Flags||needinfo?(p...@city-fan.org
   ||)



--- Comment #9 from Michal Josef Spacek  ---
@p...@city-fan.org There is side tag 'f35-build-side-52326' for f35 Perl 5.34.1


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2064808
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2069471] perl-Crypt-OpenSSL-PKCS10-0.19 is available

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2069471

Fedora Update System  changed:

   What|Removed |Added

 Status|ASSIGNED|MODIFIED



--- Comment #3 from Fedora Update System  ---
FEDORA-2022-703ae91b32 has been submitted as an update to Fedora 36.
https://bodhi.fedoraproject.org/updates/FEDORA-2022-703ae91b32


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2069471
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2069430] F36FailsToInstall: perl-PPIx-Regexp

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2069430

Michal Josef Spacek  changed:

   What|Removed |Added

 Status|NEW |ASSIGNED



--- Comment #1 from Michal Josef Spacek  ---
I think that best way is wait to 5.34.1 in f36. There were my mistake with
build (without side-tag).


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2069430
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[rpms/perl] PR #5: 5.34.1 bump

2022-03-29 Thread Michal Josef Špaček

mspacek merged a pull-request against the project: `perl` that you are 
following.

Merged pull-request:

``
5.34.1 bump
``

https://src.fedoraproject.org/rpms/perl/pull-request/5
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[rpms/perl-Crypt-OpenSSL-PKCS10] PR #3: 0.19 bump

2022-03-29 Thread Jitka Plesnikova

jplesnik merged a pull-request against the project: `perl-Crypt-OpenSSL-PKCS10` 
that you are following.

Merged pull-request:

``
0.19 bump
``

https://src.fedoraproject.org/rpms/perl-Crypt-OpenSSL-PKCS10/pull-request/3
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[rpms/perl-Crypt-OpenSSL-PKCS10] PR #2: 0.19 bump

2022-03-29 Thread Jitka Plesnikova

jplesnik merged a pull-request against the project: `perl-Crypt-OpenSSL-PKCS10` 
that you are following.

Merged pull-request:

``
0.19 bump
``

https://src.fedoraproject.org/rpms/perl-Crypt-OpenSSL-PKCS10/pull-request/2
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[rpms/perl-Crypt-OpenSSL-PKCS10] PR #3: 0.19 bump

2022-03-29 Thread Michal Josef Špaček

mspacek opened a new pull-request against the project: 
`perl-Crypt-OpenSSL-PKCS10` that you are following:
``
0.19 bump
``

To reply, visit the link below
https://src.fedoraproject.org/rpms/perl-Crypt-OpenSSL-PKCS10/pull-request/3
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[rpms/perl-Crypt-OpenSSL-PKCS10] PR #2: 0.19 bump

2022-03-29 Thread Michal Josef Špaček

mspacek opened a new pull-request against the project: 
`perl-Crypt-OpenSSL-PKCS10` that you are following:
``
0.19 bump
``

To reply, visit the link below
https://src.fedoraproject.org/rpms/perl-Crypt-OpenSSL-PKCS10/pull-request/2
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2069471] perl-Crypt-OpenSSL-PKCS10-0.19 is available

2022-03-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2069471

Michal Josef Spacek  changed:

   What|Removed |Added

 Status|NEW |ASSIGNED
 CC||mspa...@redhat.com
   Doc Type|--- |If docs needed, set a value
   Assignee|wjhns...@hardakers.net  |mspa...@redhat.com



--- Comment #2 from Michal Josef Spacek  ---
Changes:
0.19  Mon Mar 28 16:37:16 PDT 2022
- Fix #120728 (thanks Michal Josef Špaček)


Fixed two segfaults, error messages, diacritics in Changes file
For f36, rawhide


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2069471
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Troubleshooting building Swift on Fedora, take 2; assembly language is not my friend

2022-03-29 Thread Sérgio Basto
On Mon, 2022-03-28 at 16:43 -0500, Ron Olson wrote:
> Hey all-
> I’m unable to build Swift on Fedora 36 and Rawhide while it does
> build on F35. I’ve been able to condense the entire issue down to the
> following sample code that demonstrates the problem:
> nothing.S:
> #define ASM_TYPE_FUNCTION(symbol) .type symbol, %function
> #define ASM_SIZE(symbol) .size symbol, .-symbol
> #define ASM_SYMBOL(symbol) symbol
> #define ASM_WRAPPER_NAME(symbol) _interceptor##symbol
> .comm _ZN14__interception10real_vforkE,8,8
> .globl ASM_WRAPPER_NAME(vfork)
> ASM_TYPE_FUNCTION(ASM_WRAPPER_NAME(vfork))
> ASM_WRAPPER_NAME(vfork):
> // Commenting out the line below makes it work
> call *_ZN14__interception10real_vforkE(%rip)
> ASM_SIZE(vfork)
> And compiling this code with:
> clang++ -fPIC -shared ./nothing.S
> Results in the error:
> /usr/bin/ld: /tmp/fun-1b3a0d.o: warning: relocation against
> _ZN14__interception10real_vforkE' in read-only section .text'
> /usr/bin/ld: /tmp/fun-1b3a0d.o: relocation R_X86_64_PC32 against
> symbol `_ZN14__interception10real_vforkE' can not be used when making
> a shared object; recompile with -fPIC
> /usr/bin/ld: final link failed: bad value


https://bugzilla.redhat.com/show_bug.cgi?id=1304277#c3

"relocation R_X86_64_PC32 against undefined symbol" happens when
LDFLAGS are set with hardening and CFLAGS not .

maybe is an effect
of https://fedoraproject.org/wiki/Changes/SetBuildFlagsBuildCheck have
you tried %undefine _auto_set_build_flags ?
 

> The issue is that I’m explicitly passing -fPIC but it seems to either
> be ignored or overridden somehow. I’m not well versed on assembly to
> make any kind of educated guess about what might be the
> problem/solution so I’m hoping someone more familiar might be able to
> shed some light on the issue.
> Thanks!
> Ron
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines:
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it:
> https://pagure.io/fedora-infrastructure

-- 
Sérgio M. B.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Non-responsive maintainer check for szeth

2022-03-29 Thread Fabio Alessandro Locati
Hi Ivan,

Thanks for replying and starting to work on the issue.
I see that you built for F36 but still no build for rawhide. Please remember to 
build it for rawhide as well!

Best,
Fale

On Mon, Mar 28, 2022, at 15:50, Ivan Savciuc wrote:
> Hi Fabio,
> 
> Thanks for reaching out, by some reason all the bugzile emails were filtered 
> out and I completely missed it (will do something about it now).
> 
> I just pushed the update to Bodhi, but have no clues how to give permissions 
> to the golang-sig.
> 
> Have a great day,
> Ivan
> 
> 
> On Sat, Mar 26, 2022 at 10:55 AM Fabio Alessandro Locati  wrote:
>> __
>> Sorry, adding in CC the maintainer.
>> 
>> On Sat, Mar 26, 2022, at 09:49, Fabio Alessandro Locati wrote:
>>> Hi all,
>>> 
>>> As per: 
>>> https://docs.fedoraproject.org/en-US/fesco/Policy_for_nonresponsive_package_maintainers/
>>> Bug link: https://bugzilla.redhat.com/show_bug.cgi?id=2068720
>>> 
>>> Does anyone know how to reach Ivan Savciuc (szeth)? 
>>> I've opened a bug with NEEDINFO more than a week ago 
>>> (https://bugzilla.redhat.com/show_bug.cgi?id=2065054) but there is no 
>>> reply, and it seems like szeth have no activity for more than a month.
>>> 
>>> Thanks,
>>> Fale
>>> -- 
>>> Fabio Alessandro Locati
>>> fale.io
>>> 
>>> ___
>>> devel mailing list -- devel@lists.fedoraproject.org
>>> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
>>> Fedora Code of Conduct: 
>>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>>> List Archives: 
>>> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
>>> Do not reply to spam on the list, report it: 
>>> https://pagure.io/fedora-infrastructure
>>> 
>> 
>> -- 
>> Fabio Alessandro Locati
>> fale.io

-- 
Fabio Alessandro Locati
fale.io
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[rpms/perl] PR #5: 5.34.1 bump

2022-03-29 Thread Michal Josef Špaček

mspacek opened a new pull-request against the project: `perl` that you are 
following:
``
5.34.1 bump
``

To reply, visit the link below
https://src.fedoraproject.org/rpms/perl/pull-request/5
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Cloud-35-20220329.0 compose check report

2022-03-29 Thread Fedora compose checker
No missing expected images.

Soft failed openQA tests: 1/8 (x86_64), 1/8 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Cloud-35-20220327.0):

ID: 1202012 Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/1202012
ID: 1202021 Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/1202021

Passed openQA tests: 7/8 (x86_64), 7/8 (aarch64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Orphaned packages (incl. go-rpm-macros) looking for new maintainers

2022-03-29 Thread Alejandro Saez Morollon
I already claimed go-rpm-macros.

On Mon, Mar 28, 2022 at 10:53 AM Miro Hrončok  wrote:
>
> The following packages are orphaned and will be retired when they
> are orphaned for six weeks, unless someone adopts them. If you know for sure
> that the package should be retired, please do so now with a proper reason:
> https://fedoraproject.org/wiki/How_to_remove_a_package_at_end_of_life
>
> Note: If you received this mail directly you (co)maintain one of the affected
> packages or a package that depends on one. Please adopt the affected package 
> or
> retire your depending package to avoid broken dependencies, otherwise your
> package will fail to install and/or build when the affected package gets 
> retired.
>
> Request package ownership via the *Take* button in he left column on
> https://src.fedoraproject.org/rpms/
>
> Full report available at:
> https://churchyard.fedorapeople.org/orphans-2022-03-28.txt
> grep it for your FAS username and follow the dependency chain.
>
> For human readable dependency chains,
> see https://packager-dashboard.fedoraproject.org/
> For all orphaned packages,
> see https://packager-dashboard.fedoraproject.org/orphan
>
>  Package  (co)maintainers   Status 
> Change
> 
> augeas-vala   orphan   4 weeks ago
> beanstalk-client  orphan   3 weeks ago
> gela-asis orphan, reznik   1 weeks ago
> go-rpm-macros eclipseo, go-sig, jcajka,0 weeks ago
>orphan, qulogic
> gocl  orphan   4 weeks ago
> golang-github-influxdata- go-sig, orphan   0 weeks ago
> influxdb
> golang-github-mdlayher-wifi   go-sig, orphan   2 weeks ago
> lua-ldap  orphan   3 weeks ago
> mcrouter  dcavalca, filbranden, orphan 0 weeks ago
> python-aiohttp-cors   orphan, python-sig   3 weeks ago
> python-aiohttp-negotiate  orphan   3 weeks ago
> python-fastimport orphan   3 weeks ago
> python-hkdf   orphan   4 weeks ago
> python-lrparsing  orphan   3 weeks ago
> python-magic-wormhole orphan   4 weeks ago
> python-magic-wormhole-mailbox-orphan   4 weeks ago
> server
> python-magic-wormhole-transit-orphan   4 weeks ago
> relay
> python-ofxparse   orphan   3 weeks ago
> python-plyvel orphan   3 weeks ago
> python-pystalkorphan   3 weeks ago
> python-spake2 orphan   4 weeks ago
> python-txtorcon   orphan   4 weeks ago
> qcommandline  orphan   3 weeks ago
> qt5-qtcanvas3dkde-sig, orphan  1 weeks ago
> qt5-qtenginio kde-sig, lupinix, orphan 1 weeks ago
> rubygem-database_cleaner  orphan   5 weeks ago
> rust-diffus   orphan, rust-sig 1 weeks ago
> rust-diffus-deriveorphan, rust-sig 1 weeks ago
> rust-newsblur_api orphan, rust-sig 1 weeks ago
> rust-opml orphan, rust-sig 1 weeks ago
> rust-xmltree  orphan, rust-sig 1 weeks ago
> sems  orphan   1 weeks ago
> yecht orphan   2 weeks ago
>
> The following packages require above mentioned packages:
> Depending on: go-rpm-macros (1957), status change: 2022-03-22 (0 weeks ago)
> Too many dependencies for go-rpm-macros, not all listed here
> See https://churchyard.fedorapeople.org/orphans-2022-03-28.txt
>
> Depending on: golang-github-mdlayher-wifi (1), status change: 2022-03-11 (2
> weeks ago)
> golang-github-prometheus-node-exporter (maintained by: eclipseo, 
> go-sig)
> golang-github-prometheus-node-exporter-1.3.1-6.fc36.src 
> requires
> golang(github.com/mdlayher/wifi) = 0-0.12.20200729git84f0b94.fc36
> 
> golang-github-prometheus-node-exporter-devel-1.3.1-6.fc36.noarch requires
> golang(github.com/mdlayher/wifi) = 0-0.12.20200729git84f0b94.fc36
>
> Depending on: python-aiohttp-cors (1), status change: 2022-03-02 (3 weeks ago)
> gns3-server (maintained by: