Re: Missing LLVM stack bugfix updates in stable Fedora branches

2022-08-19 Thread Tom Stellard

On 8/18/22 15:32, Fabio Valentini wrote:

On Thu, Aug 18, 2022 at 5:23 PM Tom Stellard  wrote:


I'm working on the 14.0.5 update for F36 right now.  The 14.0.6 release
is going to have to wait until after 15.0.0 lands in F37 and rawhide,
because I don't think it's worth doing the 14.0.6 update there, since
15.0.0 is so close.


Awesome, thanks for the update!



Here is the Bodhi update:
https://bodhi.fedoraproject.org/updates/FEDORA-2022-eecc713e20



14.0.6 only has a small fix that probably won't affect most Fedora users,
so I think 14.0.5 should be fine for now.


Sounds good to me :)

Thanks again,
Fabio
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2119903] New: Please branch and build perl-Net-Patricia for EPEL 9

2022-08-19 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2119903

Bug ID: 2119903
   Summary: Please branch and build perl-Net-Patricia for EPEL 9
   Product: Fedora EPEL
   Version: epel9
Status: NEW
 Component: perl-Net-Patricia
  Assignee: or...@nwra.com
  Reporter: fedoraproj...@virtual.drop.net
QA Contact: extras...@fedoraproject.org
CC: or...@nwra.com, perl-devel@lists.fedoraproject.org,
phil...@redfish-solutions.com
  Target Milestone: ---
Classification: Fedora



Please branch and build perl-Net-Patricia for EPEL 9


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2119903
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2119901] New: perl-Business-CreditCard-0.39 is available

2022-08-19 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2119901

Bug ID: 2119901
   Summary: perl-Business-CreditCard-0.39 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Business-CreditCard
  Keywords: FutureFeature, Triaged
  Assignee: ppi...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: jpazdzi...@redhat.com, mastah...@gmail.com,
perl-devel@lists.fedoraproject.org, ppi...@redhat.com
  Target Milestone: ---
Classification: Fedora



Releases retrieved: 0.39
Upstream release that is considered latest: 0.39
Current version/release in rawhide: 0.36-19.fc37
URL: http://search.cpan.org/dist/Business-CreditCard/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from Anitya:
https://release-monitoring.org/project/2672/


To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/perl-Business-CreditCard


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2119901
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


python-ntlm-auth License Correction

2022-08-19 Thread Maxwell G via devel
I've corrected the license of python-ntlm-auth from LGPLv3+ to MIT. It
was relicensed upstream 5 years ago, but the previous maintainer never
updated the License field.
-- 
Thanks,

Maxwell G (@gotmax23)
Pronouns: He/Him/His


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F37 Beta blocker status email

2022-08-19 Thread Ben Cotton
Action summary


Accepted blockers
-

1. kde-settings — KDE needs to pick up F37 backgrounds — ON_QA
ACTION: None

2. sddm — Logout from KDE session on Rawhide goes to console, not SDDM — POST
ACTION: Maintainers to build package with X11 by default

Proposed blockers
-

1. anaconda — Anaconda will not start F37 Raw — NEW
ACTION: Reporter to provide requested log files
NEEDINFO: aalmeleh.whatever.0101

2. dnf — "dnf update" runs out of memory on swapless 0.5 GiB RAM machine — NEW
ACTION: Maintainers to investigate short-term dnf improvements
NEEDINFO: jmracek

3. openssl-pkcs11 — FreeIPA client enrollment fails due to DNS issues
with openssl-pkcs11-0.4.12-2.fc37 — NEW
ACTION: Maintainers to diagnose issue

4. osinfo-db — failed to install server iso with virt-install due to
the missing of isolinux in the media — NEW
ACTION: Maintainers to diagnose issue

Bug-by-bug detail
=

Accepted blockers
-

1. kde-settings — https://bugzilla.redhat.com/show_bug.cgi?id=2117706 — ON_QA
KDE needs to pick up F37 backgrounds

New desktop backgrounds require a new KDE settings update. Fixed in
FEDORA-2022-fe8729bced.

2. sddm — https://bugzilla.redhat.com/show_bug.cgi?id=2110801 — NEW
Logout from KDE session on Rawhide goes to console, not SDDM

After logging out of KDE Plasma, you end up at a console on tty2. SDDM
had been running on tty1 but just shows a flashing cursor. This
appears to be specific to Wayland, so a PR is pending to revert to and
X11 default.

Proposed blockers
-

1. anaconda — https://bugzilla.redhat.com/show_bug.cgi?id=2101229 — NEW
Anaconda will not start F37 Raw

Neither clicking the desktop icon nor the taskbar icon will launch
anaconda. openQA is not experiencing this. Using basic graphics mode
results in the expected behavior.

2. dnf — https://bugzilla.redhat.com/show_bug.cgi?id=1907030 — NEW
"dnf update" runs out of memory on swapless 0.5 GiB RAM machine

dnf is killed by oom-kill on machines with 512 MB of RAM. Adding a
swap disk or disabling the updates repo works around this issue.
Recently, FCOS has seen this behavior with 1 GB VMs. The issue appears
to be the size of the metadata for the repository. The short term
fixes look like they may need to be made on the repo side, not in dnf.

3. openssl-pkcs11 — https://bugzilla.redhat.com/show_bug.cgi?id=2117859 — NEW
FreeIPA client enrollment fails due to DNS issues with
openssl-pkcs11-0.4.12-2.fc37

Tests in openQA cannot resolve kojipkgs.fedoraproject.org. Previous
F37 build (openssl-okcs11-0.4.12-1.fc37) behaves as expected. The
corresponding versions both work on F36. Disabling dnssec on the
server is a workaround.

4. osinfo-db — https://bugzilla.redhat.com/show_bug.cgi?id=2103835 — NEW
failed to install server iso with virt-install due to the missing of
isolinux in the media

virt-install fails because there's no isolinux path, where it looks
for vmlinuz and initrd.img . An upstream fix has been released in F35,
F36, and F37 updates, but it does not appear to fully solve the
problem on F37 and Rawhide. See also RHBZ 2119633.

--
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2119882] New: perl-Socket-2.036 is available

2022-08-19 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2119882

Bug ID: 2119882
   Summary: perl-Socket-2.036 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Socket
  Keywords: FutureFeature, Triaged
  Assignee: jples...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: jples...@redhat.com, mspa...@redhat.com,
perl-devel@lists.fedoraproject.org, ppi...@redhat.com
  Target Milestone: ---
Classification: Fedora



Releases retrieved: 2.036
Upstream release that is considered latest: 2.036
Current version/release in rawhide: 2.035-2.fc37
URL: http://search.cpan.org/dist/Socket/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from Anitya:
https://release-monitoring.org/project/3321/


To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/perl-Socket


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2119882
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Inactive packagers to be removed after the F37 release

2022-08-19 Thread Gary Buhrmaster
On Fri, Aug 19, 2022 at 10:47 AM P J P  wrote:

> * Interesting numbers there.

(see below on another number)

> * While I get that such pruning from time to time is generally good.
>   What happens to the packages orphaned by removing inactive packagers?
>
> * Removing orphaned packages may not be easy, as other packages may depend on 
> them.

Obviously, if the packages are still desired or needed, an
active packager will need to pick them up.  For a number of
those packages I suspect that they have been running more
or less on successful auto-pilot (mass rebuild) for some
time, so picking them up should not result in substantially
increased workload going forward after the initial take, but
I admit I, myself, do not look forward to having to add to
the list of packages I might need to feel (at least notionally)
responsible for if I end up having to take some of them on
due to dependencies in things I do care about.

I would also say, that while it is probably not entirely easy
to do so, a *very* interesting additional number would
have been how many packages would be orphaned if
all of the identified packagers are removed, just so we
have an order of magnitude of what we are looking at
moving forward.  But that list is probably best produced
at a later time, as, for all we know, many of the people
may indeed still be active (and because their packagers
do run on auto-pilot, do not regularly engage).

These are, of course, probably mostly first run issues.
Once the process is in place and ongoing, the order of
magnitude of the people and packages is likely to be
the usual background noise levels.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: nspawn for rawhide?

2022-08-19 Thread Kevin Fenzi
On Fri, Aug 19, 2022 at 04:50:07PM +0200, Florian Weimer wrote:
> * Stephen Smoogen:
> 
> > On Fri, 19 Aug 2022 at 05:44, Florian Weimer  wrote:
> >
> >  * Kevin Fenzi:
> >
> >  > Greetings everyone. 
> >  >
> >  > Many years ago mock introduced and then made default it's isolation to
> >  > use systemd-nspawn instead of chroot. Shortly after the nspawn isolation
> >  > was added, it was used in fedoraproject koji builds, but there were
> >  > issues and since then the fedoraproject koji has defaulted to using
> >  > chroot isolation. 
> >  >
> >  > Releng has had a ticket open for a long time to switch
> >  > ( https://pagure.io/releng/issue/6967 )
> >  >
> >  > I think the two items listed there (kernel bind mounts and loop devices)
> >  > have long since been fixed, so I would like to propose we switch rawhide
> >  > to using nspawn and see if any other issues show up. 
> >
> >  What's the version of nspawn that will be used here?  Presumably it's
> >  not the rawhide version, but the host version?
> >
> > Currently I think all builders are Fedora 36. 
> 
> Okay, I tried to reproduce this environment with the mock in Fedora 36
> and the fedora-rawhide-x86_64 configuration.  This tester:
snip...
> 
> This looks very good, no problematic EPERM errors.  So I don't expect
> this type of system call compatibility issues from the switch.

Great! thanks for testing. I seem to dimly recall that glibc was
something that nspawn broke before, but like I said, it was only right
after it landed that it was even attempted. 

Since everyone seems postivie on this, I'll look at switching it on
monday and see what breaks. 

kevin


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: nspawn for rawhide?

2022-08-19 Thread Miro Hrončok

On 18. 08. 22 23:01, Kevin Fenzi wrote:

Greetings everyone.

Many years ago mock introduced and then made default it's isolation to
use systemd-nspawn instead of chroot. Shortly after the nspawn isolation
was added, it was used in fedoraproject koji builds, but there were
issues and since then the fedoraproject koji has defaulted to using
chroot isolation.

Releng has had a ticket open for a long time to switch
( https://pagure.io/releng/issue/6967 )

I think the two items listed there (kernel bind mounts and loop devices)
have long since been fixed, so I would like to propose we switch rawhide
to using nspawn and see if any other issues show up.

If everyone is ok with it, I can enable it (just for rawhide) and we can
look for issues with composes or any other items. At least then we would
have a good list of things we would like to fix. If it turns out things
just work ok we can leave it enabled.

I think moving to this will:
* More closely match developers local test mock builds.
* Provide better isolation for builds
* Help with resources as systemd-nspawn is a lot more cgroup aware than
chroot
* Allow us to close a 5 year old ticket. ;)

Thoughts?


Let's do it :)

--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: ca-certificates latest updates and Mozilla NSS certdata.txt modifications

2022-08-19 Thread Robert Relyea

On 8/19/22 6:08 AM, Alexander Sosedkin wrote:

On Thu, Aug 18, 2022 at 1:45 PM Yann Droneaud  wrote:

I've noticed ca-certificates package was updated recently, and went looking
at the changes, and I have some questions.

Not Bob Relyea, but I'll try to answer to the best of my knowledge:


Alexander is correct. Most of the information you are looking for is in :

https://bugzilla.redhat.com/show_bug.cgi?id=2117793

The certdata.txt is created by using scripts in 
https://github.com/rjrelyea/ca-certificate-scripts, namely 
fetch_objsign.sh and mergepem2certdata.py. The former fetches the 
appropriate object signing list of certs and mergepem2certdata.py merges 
it with the mozilla certdata.txt.


Certs that are only in the object signing list are marked in comments 
("microsoft object signing only") and should only have the object 
signing bit on. They won't show up in any extracted lists except 
/etc/pki/ca-trust/extracted/pem/objsign-ca-bundle.pem.


Certs that are in both lists keep the mozilla entry and have the object 
signing trust attribute turned on.


Once there are versioned object signing releases from microsoft I'll 
update the fetch scripts in the ca-certificate package on rawhide so 
others can optionally pick up these changes as well (as well as adding 
time-stamping support).


bob





The first issue is what certdata.txt was used ? It's supposed to be
downloaded from Mozilla NSS sources, but doesn't match any released
versions.

3.79, as suggested by both the changelog entries and
https://src.fedoraproject.org/rpms/ca-certificates/blob/rawhide/f/nssckbi.h
matching
https://hg.mozilla.org/projects/nss/raw-file/NSS_3_79_RTM/lib/ckfw/builtins/nssckbi.h


The second issue is what are the changes that were made to certdata.txt ?
The commit messages and RPM changelogs say the root CA certificate database
was updated thrice to the same version.

Below the 3 latest updates to certdata.txt used to build the root CA
certificates database in ca-certificates RPM package for Fedora Rawhide
from ca-certificates git repository
...
As you can find, the last 3 ca-certificate's certdata.txt version match
*no* NSS's certdata.txt which is suspicious.

In https://fedoraproject.org/wiki/CA-Certificates it is said, that since
Fedora 25, there's no modification on the upstream root certificates
database. So what happened here ?

Unfortunately, the ca-certificates' commit messages nor the RPM's changelog
provide any reason for the differences.

This raise the question of the trust we can have in the update, if the
certdata.txt supposedly imported from Mozilla NSS, doesn't match any file
released by Mozilla.

Indeed it doesn't.

If you diff it against Mozilla's
https://hg.mozilla.org/projects/nss/log/NSS_3_79_RTM/lib/ckfw/builtins/certdata.txt
you should observe significant differences of two varieties:
1. -CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NSS_MUST_VERIFY_TRUST
+CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NSS_TRUSTED_DELEGATOR
on some of the Mozilla-originating certificates
2. half of the file consisting of newly added certificates with a comment
# Microsoft Code Signing Only Certificate
trusted for code signing alone.

diff -U0 upstream-3.79.txt certdata-fedora.txt | grep CKA_TRUST | sort -u
+CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NSS_TRUSTED_DELEGATOR
+CKA_TRUST_EMAIL_PROTECTION CK_TRUST CKT_NSS_MUST_VERIFY_TRUST
+CKA_TRUST_SERVER_AUTH CK_TRUST CKT_NSS_MUST_VERIFY_TRUST
+CKA_TRUST_STEP_UP_APPROVED CK_BBOOL CK_FALSE
-CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NSS_MUST_VERIFY_TRUST

Thus, for purposes other than code signing we have effectively
Mozilla's 3.79 version.
For code signing, we additionally trust an extra set of certificates,
including ones not coming from Mozilla.

The rather detailed description in
https://bugzilla.redhat.com/show_bug.cgi?id=2117793
suggests that this is an unfortunately non-transparent stop-gap
solution of sorts
to satisfy .NET code signing needs while a better approach is in the works.


Commit messages (and RPM changelog) should details the changes made to the
NSS's certdata.txt during the update. And, for the sake of traceability, the
repository, branch, tag, hg commit, from which certdata.txt was pulled
should
also be part of the commit message (and RPM changelog). (and an empty line
between commit title and the rest of the commit message would be
appreciated,
for git log --oneline usage).

That'd be great.
The RPM change log and git log come from the release tools. When I 
release a new version of ca-certificates, I release them on a number of 
platforms (and have to deal with some rhel process). Unfortunately it 
means that it wasn't easy to add this kind of change to the actual 
checking on all these platforms (since it was mostly automated.



It should also be noted the fetch.sh script (most notably check_certs.sh) is
doing a terrible job at reporting the changes, most notably saying already
present certificates are added.

I'd also like to suggest separating Mozilla and 

Re: Inactive packagers to be removed after the F37 release

2022-08-19 Thread Mattia Verga via devel
Il 19/08/22 14:07, Ben Cotton ha scritto:
> On Fri, Aug 19, 2022 at 2:46 AM Merlin Cooper
>  wrote:
>> I like this policy, but it strikes me as odd that the packagers' email
>> addresses are posted publicly on the Pagure tickets... Wouldn't that
>> make it easier for spammers to get more email addresses?
> The script has a flag I can use in the future which (I believe) will
> mask the addresses in the tickets. I didn't use it this time because
> email addresses are already displayed all over the place. If a spammer
> gets an email address from these tickets that they didn't have before,
> then I'll be very surprised.
>
The '--privacy' flag I've put in the code only masks email addresses in
the logs. At the time I've added the flag, the purpose was to be able to
share the logs into the policy proposal. I think it should be fairly
simple to use the same flag to also mask the email in the tickets text.

Mattia


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: nspawn for rawhide?

2022-08-19 Thread Florian Weimer
* Stephen Smoogen:

> On Fri, 19 Aug 2022 at 05:44, Florian Weimer  wrote:
>
>  * Kevin Fenzi:
>
>  > Greetings everyone. 
>  >
>  > Many years ago mock introduced and then made default it's isolation to
>  > use systemd-nspawn instead of chroot. Shortly after the nspawn isolation
>  > was added, it was used in fedoraproject koji builds, but there were
>  > issues and since then the fedoraproject koji has defaulted to using
>  > chroot isolation. 
>  >
>  > Releng has had a ticket open for a long time to switch
>  > ( https://pagure.io/releng/issue/6967 )
>  >
>  > I think the two items listed there (kernel bind mounts and loop devices)
>  > have long since been fixed, so I would like to propose we switch rawhide
>  > to using nspawn and see if any other issues show up. 
>
>  What's the version of nspawn that will be used here?  Presumably it's
>  not the rawhide version, but the host version?
>
> Currently I think all builders are Fedora 36. 

Okay, I tried to reproduce this environment with the mock in Fedora 36
and the fedora-rawhide-x86_64 configuration.  This tester:

#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 

static void
noop_handler (int signo)
{
}

int
main (int argc, char **argv)
{
  if (argc != 3)
{
  fprintf (stderr, "usage: %s FIRST-SYSCALL LAST-SYSCALL\n", argv[0]);
  return 1;
}
  int first_syscall = atoi (argv[1]);
  if (first_syscall <= 0)
errx (1, "invalid system call number: %s", argv[1]);
  int last_syscall = atoi (argv[2]);
  if (last_syscall <= 0)
errx (1, "invalid system call number: %s", argv[2]);

  if (signal (SIGALRM, noop_handler) == SIG_ERR)
err (1, "signal (SIGALRM)");

  volatile long int *results = mmap (NULL, 2 * sizeof (*results),
 PROT_READ | PROT_WRITE,
 MAP_ANONYMOUS | MAP_SHARED, -1, 0);
  if (results == MAP_FAILED)
err (1, "mmap");

  for (int nr = first_syscall; nr <= last_syscall; ++nr)
{
  results[0] = -1;
  results[1] = 0;
  pid_t pid = fork ();
  if (pid < 0)
err (1, "fork");
  if (pid == 0)
{
  errno = 0;
  results[0] = syscall (nr, 0, 0, 0, 0, 0, 0, 0);
  results[1] = errno;
  _exit (0);
}

  alarm (1);
  int status;
  int waitpid_ret = waitpid (pid, , 0);
  int waitpid_error = errno;
  alarm (0);

  if (waitpid_ret < 0)
{
  if (errno != EINTR)
{
  errno = waitpid_error;
  err (1, "waitpid");
}
  else
printf ("%d: timeout\n", nr);
}
  else if (results[1] != ENOSYS)
{
  errno = results[1];
  printf("%d: %ld (errno %ld [%#m])\n", nr, results[0], results[1]);
}
}
}

Produces this output when run with arguments 330 800:

330: 1 (errno 0 [Success])
331: 0 (errno 0 [Success])
332: -1 (errno 14 [Bad address])
333: -1 (errno 22 [Invalid argument])
334: -1 (errno 22 [Invalid argument])
424: -1 (errno 9 [Bad file descriptor])
425: -1 (errno 14 [Bad address])
426: -1 (errno 95 [Operation not supported])
427: -1 (errno 95 [Operation not supported])
428: -1 (errno 14 [Bad address])
429: -1 (errno 14 [Bad address])
430: -1 (errno 14 [Bad address])
431: -1 (errno 22 [Invalid argument])
432: -1 (errno 22 [Invalid argument])
433: -1 (errno 14 [Bad address])
434: -1 (errno 22 [Invalid argument])
435: -1 (errno 22 [Invalid argument])
436: 0 (errno 0 [Success])
437: -1 (errno 22 [Invalid argument])
438: -1 (errno 9 [Bad file descriptor])
439: -1 (errno 14 [Bad address])
440: -1 (errno 9 [Bad file descriptor])
441: -1 (errno 22 [Invalid argument])
442: -1 (errno 22 [Invalid argument])
444: -1 (errno 14 [Bad address])
445: -1 (errno 77 [File descriptor in bad state])
446: -1 (errno 77 [File descriptor in bad state])
448: -1 (errno 9 [Bad file descriptor])
449: -1 (errno 22 [Invalid argument])
450: 0 (errno 0 [Success])

This looks very good, no problematic EPERM errors.  So I don't expect
this type of system call compatibility issues from the switch.

Thanks,
Florian
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Packaging a cross-compilation environment (wasi-libc)

2022-08-19 Thread Jan Staněk
Hi again,
thanks for all the suggestions! I'm taking the AVR approach so far;
if you want to play with my drafts, I have a experimental COPR:

https://copr.fedorainfracloud.org/coprs/jstanek/wasi-libc/

I plan to open a proper Fedora Review request on Monday;
right now, I'm a bit too tired to go through the bureaucracy 

Have a nice weekend!
--
Jan Staněk
Software Engineer, Red Hat
jsta...@redhat.com   irc: jstanek


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Inactive packagers to be removed after the F37 release

2022-08-19 Thread Stephen Smoogen
On Fri, 19 Aug 2022 at 08:42, Ian McInerney via devel <
devel@lists.fedoraproject.org> wrote:

> On Fri, Aug 19, 2022 at 1:08 PM Ben Cotton  wrote:
>
>> On Fri, Aug 19, 2022 at 2:46 AM Merlin Cooper
>>  wrote:
>> >
>> > I like this policy, but it strikes me as odd that the packagers' email
>> > addresses are posted publicly on the Pagure tickets... Wouldn't that
>> > make it easier for spammers to get more email addresses?
>>
>> The script has a flag I can use in the future which (I believe) will
>> mask the addresses in the tickets. I didn't use it this time because
>> email addresses are already displayed all over the place. If a spammer
>> gets an email address from these tickets that they didn't have before,
>> then I'll be very surprised.
>>
>
> I really wish people would stop making the argument that just because
> other places/systems have terrible data hygiene, we can have terrible data
> hygiene too. Fedora should be trying to set the example of how to interact
> and behave, and the "follow the herd" mentality here is not acceptable in
> my opinion.
>
> Email address could be considered PII, and so there is a debate about when
> the GDPR-type regulations would apply to them (from what I read, it would
> apply for work email addresses giving full names or personal email
> addresses). While there is a legal basis for keeping the email address in
> the system and using it, I fail to see a legal basis that would allow
> publicly displaying an email address in this way.
>
> Many systems are also trying to reduce the exposure of personal email
> addresses, with major git hosting providers even creating anonymous commit
> emails that can be associated with user accounts on those systems and then
> used for your commits should you choose.
>
> So in short, I strongly argue for masking/removing the email address from
> all tickets like this, and the fact that they are displayed there was is so
> concerning to me that I opened a ticket about it last night:
> https://pagure.io/find-inactive-packagers/issue/619.
>
>
I am going to argue that this isn't bad data hygiene because this data
being public serves an important purpose for the ongoing working of this
project.

When you become a Fedora maintainer, you are not just helping your fellow
maintainers, you are also helping the general public who may be upstream
developers, users, and packagers in different projects. When a person makes
a change or has had their 'hands' on a package, that is made public in many
many places to make sure that any and all interested people can contact
them for questions. Upstream may have suggestions to make that change
better or worse. Other packagers may need to understand why that package
affects them. Packagers in different projects need to contact to see if
this will solve their problem with said package or not. This has been and
is mostly still done via email first and bugzilla and other methods last.

When that information is not easily available, trust in the change,
package, maintainer drops. That lack of trust tends to boil through many
areas and lowers trust in the overall operations of the distribution.
Because of this, email addresses for packagers have never been very secret.
They are in spec files, they are in email posts about changes to packages,
they are in various message buses which anyone can subscribe to on the idea
that the information being free improves trust.

Then there comes the removal of privileges. This is a big concern and needs
to be done in an open and clear fashion. Other developers and packagers
need to understand WHO was attempted to be contacted and why that contact
may have failed. When other projects have not done this in an open arena,
it has caused unrelated packagers to quit because they are not sure they
can trust the project to not do the same with them. There is also the fact
that email addresses change a lot and sometimes the person who has been
listed as `foo...@uforgot.me` may have gone to `notme@notmy.email` and need
to update their info. It might be even clear that notme@notmy.email has
been active in bugzilla or some other area but hasn't done a build because
a different maintainer has done so.

We may need to come up with different methods of 'trust'. That is a larger
conversation because it would require a complete rethink of what we are as
a project and how we 'trust' each other, and allow others to 'trust' us.


-- 
Stephen Smoogen, Red Hat Automotive
Let us be kind to one another, for most of us are fighting a hard battle.
-- Ian MacClaren
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, 

Re: Retiring the pcre package from Fedora

2022-08-19 Thread Ben Cotton
On Thu, Aug 18, 2022 at 5:30 AM Zbigniew Jędrzejewski-Szmek
 wrote:
>
> Why F39? Shouldn't the deprecation (and the work on porting) be already 
> happening for F38?

I'm going to wait to process the proposal until we have an answer to
this question. (I believe Lukas is out of the office, so it may be a
few days)


-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: nspawn for rawhide?

2022-08-19 Thread Stephen Smoogen
On Fri, 19 Aug 2022 at 05:44, Florian Weimer  wrote:

> * Kevin Fenzi:
>
> > Greetings everyone.
> >
> > Many years ago mock introduced and then made default it's isolation to
> > use systemd-nspawn instead of chroot. Shortly after the nspawn isolation
> > was added, it was used in fedoraproject koji builds, but there were
> > issues and since then the fedoraproject koji has defaulted to using
> > chroot isolation.
> >
> > Releng has had a ticket open for a long time to switch
> > ( https://pagure.io/releng/issue/6967 )
> >
> > I think the two items listed there (kernel bind mounts and loop devices)
> > have long since been fixed, so I would like to propose we switch rawhide
> > to using nspawn and see if any other issues show up.
>
> What's the version of nspawn that will be used here?  Presumably it's
> not the rawhide version, but the host version?
>

Currently I think all builders are Fedora 36.

-- 
Stephen Smoogen, Red Hat Automotive
Let us be kind to one another, for most of us are fighting a hard battle.
-- Ian MacClaren
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Is system upgrade automatic or not?

2022-08-19 Thread Stephen Smoogen
On Thu, 18 Aug 2022 at 21:52, Kevin Kofler via devel <
devel@lists.fedoraproject.org> wrote:

> Stephen Smoogen wrote:
> > I should have been clearer. I was talking about the changes between
> > XP->7->8->8.1->10->11 versus 10. -> 10.. I was thinking
> of
> > it more since for the most part they used pretty much the same compiler
> > for all of 10 versus new compiler and major library changes every six
> > months
>
> That is a very developer-centric view though. End users will usually not


This is a developer centric mailing list and you have in the past been
quite likely to point out in very clear terms when I am not being developer
centric here :).


>
> care about what compiler the operating system was compiled with, all the
> more on Windows, which does not even ship with a compiler (so those who do
> actually need to compile code can select their compiler version more or
> less
> independently of the operating system version).
>
> What they will notice though is when the Windows desktop shell (the
> Windows
> equivalent of KDE Plasma or GNOME Shell) gets a major update which makes
> it
> look different, and I know from Windows users' complaints that that
> has
> happened repeatedly in Windows 10 point releases. Start Menu, Control
> Panel,
> etc. have all had significant look changes at least once.
>
> And as you point out yourself, those updates are also not always without
> issues. E.g., another frequent complaint is that device configuration is
> reset during upgrades, e.g., that it simply forgets printers that are not
> plugged in while upgrading (and always plugging in all hardware is not
> possible on a notebook that travels between different locations).
>
> So I would really compare those Windows point releases with Fedora
> releases.
> The schedule is basically the same and the risk is also about the same.
> (Though one difference is that Windows ships a lot less software, so you
> can


Yes they have a very much 'core'/'extras' viewpoint on their software. The
'core' parts are compiled with their same inhouse compilers for about '2
year' runs and then moved to the next level. [This is why there are 6 month
updates and about an 18->24 month mega update in the 10 cycle.] They are
now moving away from that and will just move to 11 and then 18 months to 2
years later to 12, etc according to their announced schedule.

The extras are becoming more like 'flatpaks/scls' in that they are a
bundled universe with their own path settings, libraries etc to make things
work.

Because it is a 'core'/'extras' strategy, I didn't see it as something we
would emulate.



>
> have fewer issues with software getting upgraded as part of the operating
> system upgrade there. Though that can also result in the application
> stopping to work after the operating system upgrade, at least until you
> manually upgrade the application as well.)
>
> I wonder whether we should simply switch Fedora releases to a different
> numbering scheme more like RHEL or Windows. (Keep in mind that my
> suggestion
> would be only a pure renumbering, there would be no changes whatsoever to
> the schedule (including EOL dates) or the nature of the releases.) So we
> would by default just release the next Fedora as 37.1, then 37.2, etc.
> Only
> if some comittee (probably FESCo) decides that a release has enough major
> changes to warrant a new major version (e.g., Fedora 9 with KDE/Plasma 4,
> GCC 4, etc., or Fedora 15 with GNOME 3), then it moves to 38.0. This can
> be
> decided shortly before the release, after having the final list of
> accepted
> and not reverted changes. After all, Linus also decided on a fairly short
> notice to renumber the kernel from Linux 5.20 to Linux 6.0, without even
> any
> reason for the bump other than "the second number is getting too large",
> so
> my proposal would work similarly, but less arbitrarily and more in the
> spirit of semantic versioning.
>
> Kevin Kofler
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>


-- 
Stephen Smoogen, Red Hat Automotive
Let us be kind to one another, for most of us are fighting a hard battle.
-- Ian MacClaren
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 

Re: ca-certificates latest updates and Mozilla NSS certdata.txt modifications

2022-08-19 Thread Alexander Sosedkin
On Thu, Aug 18, 2022 at 1:45 PM Yann Droneaud  wrote:
> I've noticed ca-certificates package was updated recently, and went looking
> at the changes, and I have some questions.

Not Bob Relyea, but I'll try to answer to the best of my knowledge:

> The first issue is what certdata.txt was used ? It's supposed to be
> downloaded from Mozilla NSS sources, but doesn't match any released
> versions.

3.79, as suggested by both the changelog entries and
https://src.fedoraproject.org/rpms/ca-certificates/blob/rawhide/f/nssckbi.h
matching
https://hg.mozilla.org/projects/nss/raw-file/NSS_3_79_RTM/lib/ckfw/builtins/nssckbi.h

> The second issue is what are the changes that were made to certdata.txt ?
> The commit messages and RPM changelogs say the root CA certificate database
> was updated thrice to the same version.
>
> Below the 3 latest updates to certdata.txt used to build the root CA
> certificates database in ca-certificates RPM package for Fedora Rawhide
> from ca-certificates git repository
> ...
> As you can find, the last 3 ca-certificate's certdata.txt version match
> *no* NSS's certdata.txt which is suspicious.
>
> In https://fedoraproject.org/wiki/CA-Certificates it is said, that since
> Fedora 25, there's no modification on the upstream root certificates
> database. So what happened here ?
>
> Unfortunately, the ca-certificates' commit messages nor the RPM's changelog
> provide any reason for the differences.
>
> This raise the question of the trust we can have in the update, if the
> certdata.txt supposedly imported from Mozilla NSS, doesn't match any file
> released by Mozilla.

Indeed it doesn't.

If you diff it against Mozilla's
https://hg.mozilla.org/projects/nss/log/NSS_3_79_RTM/lib/ckfw/builtins/certdata.txt
you should observe significant differences of two varieties:
1. -CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NSS_MUST_VERIFY_TRUST
   +CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NSS_TRUSTED_DELEGATOR
   on some of the Mozilla-originating certificates
2. half of the file consisting of newly added certificates with a comment
   # Microsoft Code Signing Only Certificate
   trusted for code signing alone.

diff -U0 upstream-3.79.txt certdata-fedora.txt | grep CKA_TRUST | sort -u
+CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NSS_TRUSTED_DELEGATOR
+CKA_TRUST_EMAIL_PROTECTION CK_TRUST CKT_NSS_MUST_VERIFY_TRUST
+CKA_TRUST_SERVER_AUTH CK_TRUST CKT_NSS_MUST_VERIFY_TRUST
+CKA_TRUST_STEP_UP_APPROVED CK_BBOOL CK_FALSE
-CKA_TRUST_CODE_SIGNING CK_TRUST CKT_NSS_MUST_VERIFY_TRUST

Thus, for purposes other than code signing we have effectively
Mozilla's 3.79 version.
For code signing, we additionally trust an extra set of certificates,
including ones not coming from Mozilla.

The rather detailed description in
https://bugzilla.redhat.com/show_bug.cgi?id=2117793
suggests that this is an unfortunately non-transparent stop-gap
solution of sorts
to satisfy .NET code signing needs while a better approach is in the works.

> Commit messages (and RPM changelog) should details the changes made to the
> NSS's certdata.txt during the update. And, for the sake of traceability, the
> repository, branch, tag, hg commit, from which certdata.txt was pulled
> should
> also be part of the commit message (and RPM changelog). (and an empty line
> between commit title and the rest of the commit message would be
> appreciated,
> for git log --oneline usage).

That'd be great.

> It should also be noted the fetch.sh script (most notably check_certs.sh) is
> doing a terrible job at reporting the changes, most notably saying already
> present certificates are added.

I'd also like to suggest separating Mozilla and Microsoft-originating certdata
in the repository and only mixing them together as part of the build process,
if need be.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Fedora rawhide compose report: 20220819.n.0 changes

2022-08-19 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20220817.n.1
NEW: Fedora-Rawhide-20220819.n.0

= SUMMARY =
Added images:0
Dropped images:  0
Added packages:  2
Dropped packages:2
Upgraded packages:   145
Downgraded packages: 0

Size of added packages:  105.22 MiB
Size of dropped packages:1.55 MiB
Size of upgraded packages:   7.17 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   41.27 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =

= DROPPED IMAGES =

= ADDED PACKAGES =
Package: nextcloud-24.0.3-1.module_f38+15035+8d60dfda
Summary: Private file sync and share server
RPMs:nextcloud nextcloud-httpd nextcloud-mysql nextcloud-nginx 
nextcloud-postgresql nextcloud-sqlite
Size:105.18 MiB

Package: rust-inflate-0.4.5-13.fc38
Summary: DEFLATE decoding
RPMs:rust-inflate+default-devel rust-inflate+unstable-devel 
rust-inflate-devel
Size:40.21 KiB


= DROPPED PACKAGES =
Package: evolution-rss-1:0.3.96-9.fc36
Summary: Evolution RSS Reader
RPMs:evolution-rss
Size:1.39 MiB

Package: libnss-pgsql-1.5.0-0.29.beta.fc37
Summary: Name Service Switch library that interface with PostgreSQL
RPMs:libnss-pgsql
Size:170.22 KiB


= UPGRADED PACKAGES =
Package:  Mars-4.5-20.fc38
Old package:  Mars-4.5-19.fc37
Summary:  An interactive development environment for programming in MIPS 
assembly language
RPMs: Mars
Size: 3.11 MiB
Size change:  -42 B
Changelog:
  * Thu Aug 18 2022 W. Michael PEtullo  - 4.5-20
  - Build using Java 17


Package:  ansible-collection-community-rabbitmq-1.2.2-1.fc38
Old package:  ansible-collection-community-rabbitmq-1.2.1-2.fc37
Summary:  RabbitMQ collection for Ansible
RPMs: ansible-collection-community-rabbitmq
Size: 61.93 KiB
Size change:  -4.31 KiB
Changelog:
  * Thu Aug 18 2022 Maxwell G  - 1.2.2-1
  - Update to 1.2.2. Fixes rhbz#2106951.
  - Adopt new Fedora licensing guidelines
  - Run unit tests


Package:  bindfs-1.17.0-1.fc38
Old package:  bindfs-1.15.1-4.fc37
Summary:  Fuse filesystem to mirror a directory
RPMs: bindfs
Size: 204.26 KiB
Size change:  2.16 KiB
Changelog:
  * Fri Aug 19 2022 Filipe Rosset  - 1.17.0-1
  - Update to 1.17.0 fixes rhbz#2098359


Package:  clisp-2.49.93-27.20210628gitde01f0f.fc38
Old package:  clisp-2.49.93-26.20210628gitde01f0f.fc38
Summary:  ANSI Common Lisp implementation
RPMs: clisp clisp-devel
Size: 44.29 MiB
Size change:  -20.71 KiB
Changelog:
  * Mon Aug 15 2022 Jerry James  - 2.49.93-26
  - Convert License tag to SPDX

  * Thu Aug 18 2022 Jerry James  - 2.49.93-27
  - Rebuild for libsvm 3.3


Package:  cmake-3.24.1-1.fc38
Old package:  cmake-3.24.0-1.fc38
Summary:  Cross-platform make system
RPMs: cmake cmake-data cmake-doc cmake-filesystem cmake-gui 
cmake-rpm-macros
Size: 47.01 MiB
Size change:  35.12 KiB
Changelog:
  * Thu Aug 18 2022 Bj??rn Esser  - 3.24.1-1
  - cmake-3.24.1


Package:  codespell-2.2.1-1.fc38
Old package:  codespell-2.2.0-1.fc38
Summary:  Fix common misspellings in text files
RPMs: codespell
Size: 200.34 KiB
Size change:  71 B
Changelog:
  * Thu Aug 18 2022 Bastien Nocera  - 2.2.1-1
  + codespell-2.2.1-1
  - Update to 2.2.1


Package:  converseen-0.9.9.6-1.fc38
Old package:  converseen-0.9.9.5-2.fc37
Summary:  A batch image conversion tool written in C++ with Qt5 and Magick++
RPMs: converseen
Size: 1.23 MiB
Size change:  5.79 KiB
Changelog:
  * Fri Aug 19 2022 Filipe Rosset  - 0.9.9.6-1
  - Update to 0.9.9.6 fixes rhbz#2103519


Package:  copr-backend-1.159-1.fc38
Old package:  copr-backend-1.157-1.fc37
Summary:  Backend for Copr
RPMs: copr-backend copr-backend-doc
Size: 420.43 KiB
Size change:  693 B
Changelog:
  * Tue Aug 16 2022 Jiri Kyjovsky  1.158-1
  - log every request that is sent to frontend

  * Tue Aug 16 2022 Pavel Raiskup  1.159-1
  - count only hits from an appropriate CDN hostname
  - add option for infinite number of attempts to the hitcounter script
  - print more reasonable output from AWS hitcounter script


Package:  copr-cli-1.103-1.fc38
Old package:  copr-cli-1.102-1.fc37
Summary:  Command line interface for COPR
RPMs: copr-cli
Size: 93.61 KiB
Size change:  -207 B
Changelog:
  * Tue Aug 16 2022 Jiri Kyjovsky  1.103-1
  - add packit_forge_projects_allowed for Copr projects


Package:  copr-dist-git-0.57-1.fc38
Old package:  copr-dist-git-0.56-1.fc37
Summary:  Copr services for Dist Git server
RPMs: copr-dist-git
Size: 57.71 KiB
Size change:  77 B
Changelog:
  * Tue Aug 16 2022 Jiri Kyjovsky  0.57-1
  - log the URL that got us new tasks


Package:  cyrus-sasl-2.1.28-8.fc38
Old package:  cyrus-sasl-2.1.28-7.fc37
Summary:  The Cyrus SASL library
RPMs: cyrus-sasl cyrus-sasl-devel cyrus-sasl-gs2 cyrus-sasl-gssapi 
cyrus-sasl-ldap cyrus-sasl-lib cyrus-sasl-md5

Re: Inactive packagers to be removed after the F37 release

2022-08-19 Thread Ian McInerney via devel
On Fri, Aug 19, 2022 at 1:08 PM Ben Cotton  wrote:

> On Fri, Aug 19, 2022 at 2:46 AM Merlin Cooper
>  wrote:
> >
> > I like this policy, but it strikes me as odd that the packagers' email
> > addresses are posted publicly on the Pagure tickets... Wouldn't that
> > make it easier for spammers to get more email addresses?
>
> The script has a flag I can use in the future which (I believe) will
> mask the addresses in the tickets. I didn't use it this time because
> email addresses are already displayed all over the place. If a spammer
> gets an email address from these tickets that they didn't have before,
> then I'll be very surprised.
>

I really wish people would stop making the argument that just because other
places/systems have terrible data hygiene, we can have terrible data
hygiene too. Fedora should be trying to set the example of how to interact
and behave, and the "follow the herd" mentality here is not acceptable in
my opinion.

Email address could be considered PII, and so there is a debate about when
the GDPR-type regulations would apply to them (from what I read, it would
apply for work email addresses giving full names or personal email
addresses). While there is a legal basis for keeping the email address in
the system and using it, I fail to see a legal basis that would allow
publicly displaying an email address in this way.

Many systems are also trying to reduce the exposure of personal email
addresses, with major git hosting providers even creating anonymous commit
emails that can be associated with user accounts on those systems and then
used for your commits should you choose.

So in short, I strongly argue for masking/removing the email address from
all tickets like this, and the fact that they are displayed there was is so
concerning to me that I opened a ticket about it last night:
https://pagure.io/find-inactive-packagers/issue/619.

-Ian


>
> That said, if there's a general consensus that addresses should be
> masked in the ticket, then we can do that in the future. I considered
> whether the tickets should default to private, but the downside is
> that people wouldn't be able to log in and comment on the ticket via
> the Pagure web interface, only by email.
>
> --
> Ben Cotton
> He / Him / His
> Fedora Program Manager
> Red Hat
> TZ=America/Indiana/Indianapolis
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


CPE Weekly Update – Week 33 2022

2022-08-19 Thread Michal Konecny

Hi everyone,

This is a weekly report from the CPE (Community Platform Engineering) 
Team. If you have any questions or feedback, please respond to this 
report or contact us on #redhat-cpe channel on libera.chat 
(https://libera.chat/).


Week: 15th August - 19th August 2022

If you wish to read this in form of a blog post, check the post on 
Fedora community blog:

https://communityblog.fedoraproject.org/cpe-weekly-update---week-33-2022/

# Highlights of the week

## Infrastructure & Release Engineering
Goal of this Initiative
---
Purpose of this team is to take care of day to day business regarding 
CentOS and Fedora Infrastructure and Fedora release engineering work.
It’s responsible for services running in Fedora and CentOS 
infrastructure and preparing things for the new Fedora release (mirrors, 
mass branching, new namespaces etc.).
The ARC (which is a subset of the team) investigates possible 
initiatives that CPE might take on.

Link to planning board: https://zlopez.fedorapeople.org/I
Link to docs: https://docs.fedoraproject.org/en-US/infra/

Update
--

### Fedora Infra
* Mass update/reboot cycle this week (stg/nonoutage done, outage later 
today)

* Freeze for f37 beta starts next week


### CentOS Infra including CentOS CI
* Discussion around the CentOS Stream infra hand over
* New tasks for the CI infra migration
* S3 bucket for the Stream CoreOS effort
* Some infra projects moved from gitea to gitlab

### Release Engineering
* Openh264 composes fo f36,37,38 send to cisco
* Package retirement issues after the branching, thanks to human error


## CentOS Stream
Goal of this Initiative
---
This initiative is working on CentOS Stream/Emerging RHEL to make this 
new distribution a reality. The goal of this initiative is to prepare 
the ecosystem for the new CentOS Stream.


Updates
---
* Face to face meeting in Boston.
* Penultimate parts of Module process sync. Between el8 and el9.


## EPEL
Goal of this initiative
---
Extra Packages for Enterprise Linux (or EPEL) is a Fedora Special 
Interest Group that creates, maintains, and manages a high quality set 
of additional packages for Enterprise Linux, including, but not limited 
to, Red Hat Enterprise Linux (RHEL), CentOS and Scientific Linux (SL), 
Oracle Linux (OL).


EPEL packages are usually based on their Fedora counterparts and will 
never conflict with or replace packages in the base Enterprise Linux 
distributions. EPEL uses much of the same infrastructure as Fedora, 
including buildsystem, bugzilla instance, updates manager, mirror 
manager and more.


Updates
---
* EPEL9 is up to 7339 (+106) packages from 3278 (+71) source packages
* Found the bloaty package was uninstallable because of a libre2 soname 
fix, rebuilding it fixed the issue.



## FMN replacement
Goal of this initiative
---
FMN (Fedora-Messaging-Notification) is a web application allowing users 
to create filters on messages sent to (currently) fedmsg and forward 
these as notifications on to email or IRC.
The goal of the initiative is mainly to add fedora-messaging schemas, 
create a new UI for a better user experience and create a new service to 
triage incoming messages to reduce the current message delivery lag 
problem. Community will profit from speedier notifications based on own 
preferences (IRC, Matrix, Email), unified fedora project to one message 
service and human-readable results in Datagrepper.
Also, CPE tech debt will be significantly reduced by dropping the 
maintenance of fedmsg altogether.


Updates
---
* Frontend
    * Use CoreUI components
    * Set up i18n
    * Initial version of a “New Rule” page
* Authentication integration FE/BE (ongoing)
* Backend: SQLAlchemy integration (ongoing))


Kindest regards,
CPE Team

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Fedora 37 compose report: 20220819.n.0 changes

2022-08-19 Thread Fedora Rawhide Report
OLD: Fedora-37-20220818.n.0
NEW: Fedora-37-20220819.n.0

= SUMMARY =
Added images:1
Dropped images:  0
Added packages:  0
Dropped packages:9
Upgraded packages:   113
Downgraded packages: 0

Size of added packages:  0 B
Size of dropped packages:97.02 MiB
Size of upgraded packages:   5.01 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   40.22 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =
Image: Silverblue dvd-ostree x86_64
Path: Silverblue/x86_64/iso/Fedora-Silverblue-ostree-x86_64-37-20220819.n.0.iso

= DROPPED IMAGES =

= ADDED PACKAGES =

= DROPPED PACKAGES =
Package: flatpak-rpm-macros-37-1.module_f37+15012+d91ecd81
Summary: Macros for building RPMS for flatpaks
RPMs:flatpak-rpm-macros
Size:43.55 KiB

Package: flatpak-runtime-config-37-1.module_f37+15012+d91ecd81
Summary: Configuration files that live inside the flatpak runtime
RPMs:flatpak-runtime-config
Size:46.51 KiB

Package: libnss-pgsql-1.5.0-0.29.beta.fc37
Summary: Name Service Switch library that interface with PostgreSQL
RPMs:libnss-pgsql
Size:170.22 KiB

Package: postgresql-10.20-1.module_f37+14079+af0f42b7
Summary: PostgreSQL client programs
RPMs:postgresql postgresql-contrib postgresql-docs postgresql-plperl 
postgresql-plpython postgresql-plpython3 postgresql-pltcl postgresql-server 
postgresql-server-devel postgresql-static postgresql-test 
postgresql-test-rpm-macros postgresql-upgrade postgresql-upgrade-devel
Size:96.38 MiB

Package: rust-cap-async-std-0.24.2-2.fc37
Summary: Capability-based version of async-std
RPMs:rust-cap-async-std+arf-strings-devel 
rust-cap-async-std+arf_strings-devel rust-cap-async-std+camino-devel 
rust-cap-async-std+default-devel rust-cap-async-std+fs_utf8-devel 
rust-cap-async-std-devel
Size:78.46 KiB

Package: rust-cap-fs-ext-0.24.2-2.fc37
Summary: Extension traits for Dir, File, etc
RPMs:rust-cap-fs-ext+arf-strings-devel rust-cap-fs-ext+arf_strings-devel 
rust-cap-fs-ext+async-std-devel rust-cap-fs-ext+async-trait-devel 
rust-cap-fs-ext+async_std-devel rust-cap-fs-ext+async_std_arf_strings-devel 
rust-cap-fs-ext+async_std_fs_utf8-devel rust-cap-fs-ext+camino-devel 
rust-cap-fs-ext+cap-async-std-devel rust-cap-fs-ext+cap-std-devel 
rust-cap-fs-ext+default-devel rust-cap-fs-ext+fs_utf8-devel 
rust-cap-fs-ext+std-devel rust-cap-fs-ext-devel
Size:120.82 KiB

Package: rust-cap-rand-0.24.2-2.fc37
Summary: Capability-based random number generators
RPMs:rust-cap-rand+default-devel rust-cap-rand+small_rng-devel 
rust-cap-rand-devel
Size:32.59 KiB

Package: rust-cap-time-ext-0.24.2-2.fc37
Summary: Extension traits for SystemClock and MonotonicClock
RPMs:rust-cap-time-ext+cap-std-devel rust-cap-time-ext+default-devel 
rust-cap-time-ext-devel
Size:31.48 KiB

Package: rust-system-interface-0.20.0-2.fc37
Summary: Extensions to the Rust standard library
RPMs:rust-system-interface+async-std-devel 
rust-system-interface+cap-async-std-devel rust-system-interface+cap-std-devel 
rust-system-interface+cap_async_std_impls-devel 
rust-system-interface+cap_async_std_impls_fs_utf8-devel 
rust-system-interface+cap_std_impls-devel 
rust-system-interface+cap_std_impls_fs_utf8-devel 
rust-system-interface+default-devel rust-system-interface+os_pipe-devel 
rust-system-interface+socket2-devel rust-system-interface+use_os_pipe-devel 
rust-system-interface+use_socket2-devel rust-system-interface-devel
Size:133.69 KiB


= UPGRADED PACKAGES =
Package:  ansible-collection-community-rabbitmq-1.2.2-1.fc37
Old package:  ansible-collection-community-rabbitmq-1.2.1-2.fc37
Summary:  RabbitMQ collection for Ansible
RPMs: ansible-collection-community-rabbitmq
Size: 61.84 KiB
Size change:  -4.39 KiB
Changelog:
  * Thu Aug 18 2022 Maxwell G  - 1.2.2-1
  - Update to 1.2.2. Fixes rhbz#2106951.
  - Adopt new Fedora licensing guidelines
  - Run unit tests


Package:  ansible-packaging-1-7.fc37
Old package:  ansible-packaging-1-6.fc37
Summary:  RPM packaging macros and generators for Ansible collections
RPMs: ansible-packaging ansible-packaging-tests ansible-srpm-macros
Added RPMs:   ansible-packaging-tests
Size: 35.88 KiB
Size change:  7.60 KiB
Changelog:
  * Mon Aug 01 2022 Maxwell G  - 1-7
  - Implement %ansible_test_unit and add ansible-packaging-tests metapackage.
  - Require ansible-core at buildtime


Package:  bindfs-1.17.0-1.fc37
Old package:  bindfs-1.15.1-4.fc37
Summary:  Fuse filesystem to mirror a directory
RPMs: bindfs
Size: 204.28 KiB
Size change:  2.18 KiB
Changelog:
  * Fri Aug 19 2022 Filipe Rosset  - 1.17.0-1
  - Update to 1.17.0 fixes rhbz#2098359


Package:  cmake-3.24.1-1.fc37
Old package:  cmake-3.24.0-1.fc37
Summary:  Cross-platform make system
RPMs: cmake cmake-data cmake-doc cmake-filesystem cmake-gui 
cmake-rpm-macros
Size: 46.98 MiB
Size change:  4.53

Re: Inactive packagers to be removed after the F37 release

2022-08-19 Thread Ben Cotton
On Fri, Aug 19, 2022 at 2:46 AM Merlin Cooper
 wrote:
>
> I like this policy, but it strikes me as odd that the packagers' email
> addresses are posted publicly on the Pagure tickets... Wouldn't that
> make it easier for spammers to get more email addresses?

The script has a flag I can use in the future which (I believe) will
mask the addresses in the tickets. I didn't use it this time because
email addresses are already displayed all over the place. If a spammer
gets an email address from these tickets that they didn't have before,
then I'll be very surprised.

That said, if there's a general consensus that addresses should be
masked in the ticket, then we can do that in the future. I considered
whether the tickets should default to private, but the downside is
that people wouldn't be able to log in and comment on the ticket via
the Pagure web interface, only by email.

-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Inactive packagers to be removed after the F37 release

2022-08-19 Thread Ben Cotton
On Fri, Aug 19, 2022 at 1:18 AM Adam Williamson
 wrote:
>
> Can we handle that? Can you manually flag those cases to continue
> through the process, or something?

It's like 10,000 spoons, when all you need is removal from the
packager group. But yes, I'm manually handling those cases. Right now,
it's by putting them on a list of "people who will show up as active
but have acked removal". I have plans for how that can be handled in
the future without me keeping a separate list on my Todoist task. But
for now I am (slowly) going through every comment on tickets to make
sure that everything gets handled correctly.

-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2119302] Upgrade perl-Type-Tiny to 1.016008

2022-08-19 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2119302

Jitka Plesnikova  changed:

   What|Removed |Added

 Status|NEW |CLOSED
 Resolution|--- |RAWHIDE
   Fixed In Version||perl-Type-Tiny-1.016008-1.f
   ||c38
   ||perl-Type-Tiny-1.016008-1.f
   ||c37
Last Closed||2022-08-19 11:16:35



--- Comment #1 from Jitka Plesnikova  ---
Built by corsepiu


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2119302
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2105085] CVE-2022-31081 perl-HTTP-Daemon: HTTP::Daemon allows request smuggling

2022-08-19 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2105085



--- Comment #11 from Michal Josef Spacek  ---
Upstream has not released a new version of distribution with fixes, because
there are some failing tests related to the issue.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2105085
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Inactive packagers to be removed after the F37 release

2022-08-19 Thread P J P
Hi,

On Friday, 19 August, 2022, 03:05:03 am IST, Ben Cotton  
wrote:
>I just completed the first run of FESCo's newly approved Inactive
>Packager Policy[1]. Packagers that have been identified as inactive
>have a ticket in the find-inactive-packagers repo[2]. One week after
>the F37 final release, packagers who remain inactive will be removed
>from the packager group.
>
>For the curious, here are the stats from today's run:
>
>2550 users checked
>913 of those had no activity on src.fedoraproject.org or pagure.io
>835 of those had no activity in Bodhi
>812 of those had no activity on the mailing lists
>606 of those (~24% of packagers) had no activity in Bugzilla.
>

* Interesting numbers there.

* While I get that such pruning from time to time is generally good.
  What happens to the packages orphaned by removing inactive packagers?

* Removing orphaned packages may not be easy, as other packages may depend on 
them.

Thank you.
---
  -P J P
http://feedmug.com
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: nspawn for rawhide?

2022-08-19 Thread Florian Weimer
* Kevin Fenzi:

> Greetings everyone. 
>
> Many years ago mock introduced and then made default it's isolation to
> use systemd-nspawn instead of chroot. Shortly after the nspawn isolation
> was added, it was used in fedoraproject koji builds, but there were
> issues and since then the fedoraproject koji has defaulted to using
> chroot isolation. 
>
> Releng has had a ticket open for a long time to switch
> ( https://pagure.io/releng/issue/6967 )
>
> I think the two items listed there (kernel bind mounts and loop devices)
> have long since been fixed, so I would like to propose we switch rawhide
> to using nspawn and see if any other issues show up. 

What's the version of nspawn that will be used here?  Presumably it's
not the rawhide version, but the host version?

Thanks,
Florian
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2096953] perl-HTTP-Message-6.37 is available

2022-08-19 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2096953

Michal Josef Spacek  changed:

   What|Removed |Added

   Fixed In Version||perl-HTTP-Message-6.37-1.fc
   ||38
 Status|ASSIGNED|CLOSED
 Resolution|--- |RAWHIDE
Last Closed||2022-08-19 09:37:36



--- Comment #2 from Michal Josef Spacek  ---
After creating of f37 branch were build f37 and rawhide builds:
perl-HTTP-Message-6.37-1.fc37
perl-HTTP-Message-6.37-1.fc38


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2096953
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: qarte: missing python dependencies ?

2022-08-19 Thread Martin Gansser
Thanks for your hint.
The developer of the program released a patch for this a few minutes ago.
https://bazaar.launchpad.net/~vincent-vandevyvre/qarte/qarte-5/diff/82?context=3
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: qarte: missing python dependencies ?

2022-08-19 Thread Michael J Gruber
> Hi,
> 
> I want to start qarte-5.1 on Fedora 37, but the startup aborts
> with the following error message:
> 
> $ qarte -d
> 16:06:00: INFO - qarte Qarte-5.1.0
> 16:06:00: INFO - qarte Python 3.11.0rc1 on
> Linux-5.19.1-300.fc37.x86_64-x86_64-with-glibc2.36
> 16:06:00: INFO - qarte File system encoding: utf-8
> 16:06:00: INFO - qarte System encoding: utf-8
> /usr/bin/qarte:71: DeprecationWarning: Use setlocale(), getencoding() and 
> getlocale()
> instead
>   logger.info("Locale encoding: {0}".format(locale.getdefaultlocale()))
> 16:06:00: INFO - qarte Locale encoding: ('de_DE', 'UTF-8')
> QSocketNotifier: Can only be used with threads started with QThread
> Traceback (most recent call last):
>   File "/usr/bin/qarte", line 118, in 
> from core import Core
>   File "/usr/share/qarte/core.py", line 23, in 
> gettext.install('qarte', LOC_PATH, True)
> TypeError: install() takes from 1 to 2 positional arguments but 3 were given

This tells you that the quarte code calls gettext's install function with too 
many (non-kw) arguments. Indeed:

"Changed in version 3.11: names is now a keyword-only parameter."

(https://docs.python.org/3.11/library/gettext.html#gettext.install)

> how can i solve this ?
> 
> [1] https://martinkg.fedorapeople.org/Packages/test/qarte-5.1.0-1.fc37.src.rpm
> [2] 
> https://martinkg.fedorapeople.org/Packages/test/python-m3u8-3.1.0-2.fc37

I found no upstream repo or such (and did not go through unpacking the srpm). 
Maybe they are aware of this.

In the line above, `names=True` may solve the problem, but from the doc I don't 
even think that True is a valid choice here. They may have missed the removal 
of the `codeset` parameter which used to be in slot 3 before 3.10.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


qarte: missing python dependencies ?

2022-08-19 Thread Martin Gansser
Hi,

I want to start qarte-5.1 on Fedora 37, but the startup aborts
with the following error message:

$ qarte -d
16:06:00: INFO - qarte Qarte-5.1.0
16:06:00: INFO - qarte Python 3.11.0rc1 on 
Linux-5.19.1-300.fc37.x86_64-x86_64-with-glibc2.36
16:06:00: INFO - qarte File system encoding: utf-8
16:06:00: INFO - qarte System encoding: utf-8
/usr/bin/qarte:71: DeprecationWarning: Use setlocale(), getencoding() and 
getlocale() instead
  logger.info("Locale encoding: {0}".format(locale.getdefaultlocale()))
16:06:00: INFO - qarte Locale encoding: ('de_DE', 'UTF-8')
QSocketNotifier: Can only be used with threads started with QThread
Traceback (most recent call last):
  File "/usr/bin/qarte", line 118, in 
from core import Core
  File "/usr/share/qarte/core.py", line 23, in 
gettext.install('qarte', LOC_PATH, True)
TypeError: install() takes from 1 to 2 positional arguments but 3 were given

how can i solve this ?

[1] https://martinkg.fedorapeople.org/Packages/test/qarte-5.1.0-1.fc37.src.rpm
[2] 
https://martinkg.fedorapeople.org/Packages/test/python-m3u8-3.1.0-2.fc37.src.rpm


Regards
Martin
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Inactive packagers to be removed after the F37 release

2022-08-19 Thread Vitaly Zaitsev via devel

On 19/08/2022 08:45, Merlin Cooper wrote:

I like this policy, but it strikes me as odd that the packagers' email
addresses are posted publicly on the Pagure tickets... Wouldn't that
make it easier for spammers to get more email addresses?


Spammers can easily get email addresses from all Git commits.

--
Sincerely,
  Vitaly Zaitsev (vit...@easycoding.org)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Inactive packagers to be removed after the F37 release

2022-08-19 Thread Merlin Cooper
I like this policy, but it strikes me as odd that the packagers' email
addresses are posted publicly on the Pagure tickets... Wouldn't that
make it easier for spammers to get more email addresses? 

On Thu, 2022-08-18 at 17:28 -0400, Ben Cotton wrote:
> Hello everyone!
> 
> I just completed the first run of FESCo's newly approved Inactive
> Packager Policy[1]. Packagers that have been identified as inactive
> have a ticket in the find-inactive-packagers repo[2]. One week after
> the F37 final release, packagers who remain inactive will be removed
> from the packager group. (Note that pagure.io is one of the systems
> checked for activity, so commenting on your ticket that you're still
> around will prevent you from showing up in the second round.)
> 
> Since this is the first time we've done something like this, it could
> be a little rough. I appreciate your patience and understanding. If
> you have suggestions for improvement, look for the open feature
> issues[3] and file an issue in the find-inactive-packagers repo[4] if
> it's not there already.
> 
> For the curious, here are the stats from today's run:
> 
> 2550 users checked
> 913 of those had no activity on src.fedoraproject.org or pagure.io
> 835 of those had no activity in Bodhi
> 812 of those had no activity on the mailing lists
> 606 of those (~24% of packagers) had no activity in Bugzilla.
> 
> The script took a little under three hours to run.
> 
> [1]
> https://docs.fedoraproject.org/en-US/fesco/Policy_for_inactive_packagers/
> [2]
> https://pagure.io/find-inactive-packagers/issues?tags=inactive_packager=Open
> [3] https://pagure.io/find-inactive-packagers/issues?tags=feature
> [4] https://pagure.io/find-inactive-packagers/new_issue
> 
> -- 
> Ben Cotton
> He / Him / His
> Fedora Program Manager
> Red Hat
> TZ=America/Indiana/Indianapolis
> ___
> devel-announce mailing list -- devel-annou...@lists.fedoraproject.org
> To unsubscribe send an email to
> devel-announce-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines:
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel-annou...@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines:
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2116641] perl-MIME-Charset-1.013.1 is available

2022-08-19 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2116641

Petr Pisar  changed:

   What|Removed |Added

   Doc Type|--- |If docs needed, set a value
Version|rawhide |37
 CC||ppi...@redhat.com



--- Comment #6 from Petr Pisar  ---
This fixes a test failure in perl-MIME-Charset-1.012.2-18.fc38:

t/03ooinfo.t  ok
#   Failed test 'ISO-8859-8-I'
#   at t/04alias.t line 31.
#  got: 'ISO-8859-8'
# expected: 'ISO-8859-8-I'
# UTF-16 is decoded by 'x-utf16auto' encoding
# UTF-32 is decoded by 'x-utf32auto' encoding
# HZ-GB-2312 is decoded by 'hz' encoding
# TIS-620 is decoded by 'cp874' encoding
# Looks like you failed 1 test of 33.
t/04alias.t . 
Dubious, test returned 1 (wstat 256, 0x100)
Failed 1/33 subtests 

triggered by a change in Encode-3.19:

1.013_01  2022-08-08  Hatuka*nezumi - IKEDA Soji  

* Imp: Added support for DIN 66003.
* Chg: Workaround: "ISO-8859-8-I" is treated as an alias of "ISO-8859-8"
  by Encode (3.18): See the note in
  https://encoding.spec.whatwg.org/#legacy-single-byte-encodings
  However we'll treat these as separate names for compatibility.

Please upgrade this package in Fedora ≥ 37.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2116641
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Inactive packagers to be removed after the F37 release

2022-08-19 Thread Mattia Verga via devel
Il 19/08/22 07:17, Adam Williamson ha scritto:
> On Thu, 2022-08-18 at 17:28 -0400, Ben Cotton wrote:
>> Hello everyone!
>>
>> I just completed the first run of FESCo's newly approved Inactive
>> Packager Policy[1]. Packagers that have been identified as inactive
>> have a ticket in the find-inactive-packagers repo[2]. One week after
>> the F37 final release, packagers who remain inactive will be removed
>> from the packager group. (Note that pagure.io is one of the systems
>> checked for activity, so commenting on your ticket that you're still
>> around will prevent you from showing up in the second round.)
> So on this point specifically - I had a look through the tickets for
> interest, and saw two cases where people replied to the ticket to say
> essentially "yes, it's fine to take away my packager rights". Which,
> ironically, would prevent it from happening, it seems.
>
> Can we handle that? Can you manually flag those cases to continue
> through the process, or something?

Unfortunately, with the script in the current status **ALL** tickets
need to be handled manually. This kind of reply from a user is what it
made me choose to not handle opened tickets automatically when I
initially wrote the script. I know this will going to be painful in this
first run, but in following runs I'd expect only a bunch of tickets to
be created.

It can however be enhanced, maybe we can add a specific tag
"requested_removal" so that the script knows how to handle them (in a
future version). But it will always need a manual intervention to add
the tag to the ticket.

Mattia

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue