Re: Default partitioning

2010-10-25 Thread Stephen Gallagher
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/23/2010 06:39 PM, Javier Prats wrote:
 Hello all,
 
 I was wondering if this is the correct place to discuss the default
 partitioning scheme after installation.  If not, could someone please
 direct me to the correct place?
 

It's as good a place as any. What is your concern?

- -- 
Stephen Gallagher
RHCE 804006346421761

Delivering value year after year.
Red Hat ranks #1 in value among software vendors.
http://www.redhat.com/promo/vendor/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkzFY8AACgkQeiVVYja6o6McJwCgkw9uJFtBJN0nDkNH41l+DPVu
3SwAoIpJopi6oV6omFRUu50ObdFPO6Gb
=IaGL
-END PGP SIGNATURE-
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Yubikeys are now supported

2010-10-25 Thread Simon Josefsson
Paul Wouters p...@xelerance.com writes:

 On Fri, 8 Oct 2010, Nathanael D. Noblet wrote:

 On 10/07/2010 10:58 PM, Paul Wouters wrote:
 One usage of yubikey I would like very much is as storage for the AES
 encryption key for disk encryption. I'd prefer the disk crypto key to
 not be on the disk at all, protected by just a passphrase. It would be
 nice to have it on a yubikey instead.

 I just ordered a yubikey for this express purpose, we have a product
 under development that has an encrypted partition that gets decrypted by
 a key on a USB thumbdrive - not the best... When I saw these I
 immediately thought I should see about getting them used to unlock
 encrypted partitions!... I'll keep you informed.

 Note that yubikeys are not (yet) usable for this. You cannot request the
 AES key from it (AFAIK), only an OTP. And the OTP can also not be used to 
 unlock
 an AES key on the harddisk because it is different for each activation.

The YubiKey with firmware 2.2 (latest) supports an challenge-response
HMAC-SHA1 mode that probably can be used for this.  You feed a pass
phrase to the YubiKey, and it responds with a static string generated
from the pass phrase using HMAC-SHA1.  It will be the same output every
time if the input is the same.  The output would then be used as the
encryption key.  Of course, you still need to trust the software on your
machine to not leak the HMAC-SHA1 output..

If anyone is trying something like this, I'm interested to hear about
progress.  Encrypting disks assisted with an external device is
something I'd like to see.

/Simon

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Yubikeys are now supported

2010-10-25 Thread Simon Josefsson
Maxim Burgerhout ma...@wzzrd.com writes:

 Hi,

 I am the maintainer for ykpers and libyubikey for Fedora. It's great
 to see Fedora starting to use these nifty devices!

 If there is anything I can do to help out and make the use of
 Yubikey's in the Fedora project into a success, just holler.

Hi -- I likewise want to congratulate you on adding support for this to
the Fedora infrastructure (and thanks Maxim for packaging work).

I work for Yubico and if there are any questions or issues with the
YubiKey that you can encounter, please let me know and can accelerate an
answer.  I have re-read this thread, and from what I can tell, you got
all current questions resolved, but if I missed something, please let me
know.

/Simon


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


rawhide report: 20101025 changes

2010-10-25 Thread Rawhide Report
Compose started at Mon Oct 25 08:15:05 UTC 2010

Broken deps for x86_64
--
PyKDE4-4.5.2-5.fc15.x86_64 requires PyQt4 = 0:4.8n
ScientificPython-2.8-11.fc14.x86_64 requires libmpi.so.0()(64bit)
ScientificPython-2.8-11.fc14.x86_64 requires libopen-rte.so.0()(64bit)
ScientificPython-2.8-11.fc14.x86_64 requires libopen-pal.so.0()(64bit)
1:anjuta-2.31.90.0-3.fc15.i686 requires libvala-0.10.so.0
1:anjuta-2.31.90.0-3.fc15.x86_64 requires libvala-0.10.so.0()(64bit)
avahi-sharp-0.6.28-1.fc15.x86_64 requires mono(Mono.Posix) = 
0:1.0.5000.0
avahi-sharp-0.6.28-1.fc15.x86_64 requires mono(System) = 0:1.0.5000.0
avahi-sharp-0.6.28-1.fc15.x86_64 requires mono(mscorlib) = 0:1.0.5000.0
avahi-ui-sharp-0.6.28-1.fc15.x86_64 requires mono(Mono.Posix) = 
0:1.0.5000.0
avahi-ui-sharp-0.6.28-1.fc15.x86_64 requires mono(System) = 0:1.0.5000.0
avahi-ui-sharp-0.6.28-1.fc15.x86_64 requires mono(gtk-sharp) = 
0:2.12.0.0
avahi-ui-sharp-0.6.28-1.fc15.x86_64 requires mono(mscorlib) = 
0:1.0.5000.0
banshee-1.8.0-8.fc15.i686 requires mono(atk-sharp) = 0:2.12.0.0
banshee-1.8.0-8.fc15.i686 requires mono(gconf-sharp) = 0:2.24.0.0
banshee-1.8.0-8.fc15.i686 requires mono(gtk-sharp) = 0:2.12.0.0
banshee-1.8.0-8.fc15.i686 requires mono(Mono.Addins) = 0:0.5.0.0
banshee-1.8.0-8.fc15.i686 requires mono(Mono.Addins.Gui) = 0:0.5.0.0
banshee-1.8.0-8.fc15.i686 requires mono(pango-sharp) = 0:2.12.0.0
banshee-1.8.0-8.fc15.i686 requires mono(gdk-sharp) = 0:2.12.0.0
banshee-1.8.0-8.fc15.x86_64 requires mono(gtk-sharp) = 0:2.12.0.0
banshee-1.8.0-8.fc15.x86_64 requires mono(atk-sharp) = 0:2.12.0.0
banshee-1.8.0-8.fc15.x86_64 requires mono(gconf-sharp) = 0:2.24.0.0
banshee-1.8.0-8.fc15.x86_64 requires mono(Mono.Addins) = 0:0.5.0.0
banshee-1.8.0-8.fc15.x86_64 requires mono(Mono.Addins.Gui) = 0:0.5.0.0
banshee-1.8.0-8.fc15.x86_64 requires mono(pango-sharp) = 0:2.12.0.0
banshee-1.8.0-8.fc15.x86_64 requires mono(gdk-sharp) = 0:2.12.0.0
banshee-community-extensions-1.8.0-2.fc15.x86_64 requires 
mono(pango-sharp) = 0:2.12.0.0
banshee-community-extensions-1.8.0-2.fc15.x86_64 requires 
mono(gconf-sharp) = 0:2.24.0.0
banshee-community-extensions-1.8.0-2.fc15.x86_64 requires mono(System) 
= 0:1.0.5000.0
banshee-community-extensions-1.8.0-2.fc15.x86_64 requires 
mono(gtk-sharp) = 0:2.12.0.0
banshee-community-extensions-1.8.0-2.fc15.x86_64 requires 
mono(Mono.Addins) = 0:0.5.0.0
banshee-community-extensions-1.8.0-2.fc15.x86_64 requires 
mono(gdk-sharp) = 0:2.12.0.0
banshee-community-extensions-1.8.0-2.fc15.x86_64 requires 
mono(mscorlib) = 0:1.0.5000.0
bareftp-0.3.2-1.fc14.x86_64 requires mono(gconf-sharp) = 0:2.24.0.0
bareftp-0.3.2-1.fc14.x86_64 requires mono(gdk-sharp) = 0:2.12.0.0
bareftp-0.3.2-1.fc14.x86_64 requires mono(gtk-sharp) = 0:2.12.0.0
bareftp-0.3.2-1.fc14.x86_64 requires mono(gnome-vfs-sharp) = 0:2.24.0.0
bareftp-0.3.2-1.fc14.x86_64 requires mono(gnome-sharp) = 0:2.24.0.0
beagle-0.3.9-19.fc14.x86_64 requires libmono.so.0()(64bit)
beagle-0.3.9-19.fc14.x86_64 requires libmono.so.0(VER_1)(64bit)
beagle-evolution-0.3.9-19.fc14.x86_64 requires mono(gconf-sharp) = 
0:2.24.0.0
beagle-gnome-0.3.9-19.fc14.x86_64 requires mono(gconf-sharp) = 
0:2.24.0.0
beagle-gnome-0.3.9-19.fc14.x86_64 requires mono(gtk-sharp) = 0:2.12.0.0
beagle-gnome-0.3.9-19.fc14.x86_64 requires mono(glade-sharp) = 
0:2.12.0.0
beagle-gnome-0.3.9-19.fc14.x86_64 requires mono(gdk-sharp) = 0:2.12.0.0
beagle-gnome-0.3.9-19.fc14.x86_64 requires mono(gnome-vfs-sharp) = 
0:2.24.0.0
beagle-gnome-0.3.9-19.fc14.x86_64 requires mono(pango-sharp) = 
0:2.12.0.0
beagle-gnome-0.3.9-19.fc14.x86_64 requires mono(gnome-sharp) = 
0:2.24.0.0
chronojump-0.8.14-1.fc12.x86_64 requires mono(glade-sharp) = 0:2.12.0.0
chronojump-0.8.14-1.fc12.x86_64 requires mono(gdk-sharp) = 0:2.12.0.0
chronojump-0.8.14-1.fc12.x86_64 requires mono(gtk-sharp) = 0:2.12.0.0
chronojump-0.8.14-1.fc12.x86_64 requires mono(pango-sharp) = 0:2.12.0.0
clutter-gst-devel-1.2.0-1.fc15.i686 requires pkgconfig(clutter-1.0)  
0:1.3.0
clutter-gst-devel-1.2.0-1.fc15.x86_64 requires pkgconfig(clutter-1.0)  
0:1.3.0
db4o-7.4-2.fc13.x86_64 requires mono(Mono.GetOptions) = 0:2.0.0.0
dbus-sharp-0.63-14.fc13.x86_64 requires mono(mscorlib) = 0:1.0.5000.0
dh-make-0.55-2.fc15.noarch requires debhelper
eclipse-checkstyle-5.1.0-1.fc14.noarch requires checkstyle = 0:5.1
empathy-2.91.0-2.fc15.x86_64 requires libfolks-telepathy.so.0()(64bit)
empathy-2.91.0-2.fc15.x86_64 requires libfolks.so.0()(64bit)

Re: F-14 Branched report: 20101024 changes

2010-10-25 Thread Tom spot Callaway
On 10/24/2010 01:25 PM, Garrett Holmstrom wrote:
  qtgpsc-0.2.3-6.fc12.x86_64 requires libgps.so.18()(64bit)
 rakudo-0.0.2010.08_2.7.0-1.fc14.x86_64 requires 
  libparrot.so.2.7.0()(64bit)
 Any chance these are going to be fixed before release?

I looked at qtgpsc, but that's unlikely to be fixed sanely unless:

A) gpsd is regressed to an older version and all other dependencies are
hacked up to use it.
B) qtgpsc is updated to the current branch, which requires gpsd to be
updated to SVN and all other dependencies are hacked up to use it.

I actually got pretty far down B (on my local system) before realizing
it was too intrusive and too late in the cycle to make those changes.

~spot
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


F15 Feature - online Ex4 defragmentatnion (Re: e4defrag support?)

2010-10-25 Thread Michał Piotrowski
Hi,

2010/10/6 Eric Sandeen sand...@redhat.com:
 OK gang, it's in e2fsprogs-1.41.12-6.fc15

 you have to invoke it with -test options to make it go ;)

 Word of warning, it's not had a lot of attention, and the whole
 design could change in the future, but it's something to play with :)

 -Eric

Would it make sense to propose online ext4 defragmentation as a
Fedora 15 feature?

Rationale - more people would point their attention to this feature -
more people would test it.

Contingency Plan:
None. Just delete feature from features page :)

I'm not sure how it is in other distros, but it's probably not very
popular feature.

Any suggestions?

Kind regards,
Michal
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


libpoppler soname bump in rawhide

2010-10-25 Thread Marek Kasik
Hi,

I plan to rebase poppler in rawhide to poppler-0.15.1. There are some
API changes and 1 soname bump of libpoppler.so.8 to libpoppler.so.9.
API changes mostly involve addition of new functions (see below).
You can test it against your package with this scratch-build:
http://koji.fedoraproject.org/koji/taskinfo?taskID=2552287
I'll ask release engineers for chain-build at the beginning of the next
week.

Regards

Marek



Changes:

cpp/poppler-document.h:
- new public functions in class document:
  get_pdf_id(), load_from_raw_data()

Dict.h:
- new public function in class Dict:
  getXRef()

- new private member in class Dict:
  GBool sorted


Form.h:
- new public functions in class FormWidget:
  getPartialName(), getMappingName(), getFullyQualifiedName()

- new protected members in class FormWidget:
  GooString *partialName, GooString *mappingName, GooString
*fullyQualifiedName


Gfx.h:
- API change of private functions in class Gfx:
  gouraudFillTriangle() and fillPatch()

- new private function in class Gfx:
  gouraudFillTriangle()


GfxState.h:
- new public functions in class GfxGouraudTriangleShading:
   isParameterized(), getParameterDomainMin(), getParameterDomainMax(),
getTriangle(), getParameterizedColor()

- new struct in struct GfxPatch
  struct ColorValue

- type change change in struct GfxPatch:
  GfxColor color[2][2] - ColorValue color[2][2]

- new public functions in class GfxPatchMeshShading:
  isParameterized(), getParameterDomainMin(), getParameterDomainMax(),
getParameterizedColor()

- new public functions in class GfxSubpath:
  setX(), setY()

- new sub class ReusablePathIterator in class GfxState
  class ReusablePathIterator

- new public function in class GfxState:
  getReusablePath()


glib/poppler-document.h:
- new public functions in glib/poppler-document.h:
  poppler_document_get_id(), poppler_document_get_pdf_version_string(),
poppler_document_get_pdf_version(), poppler_document_get_title(),
poppler_document_get_author(), poppler_document_get_subject(),
poppler_document_get_keywords(), poppler_document_get_creator(),
poppler_document_get_producer(), poppler_document_get_creation_date(),
poppler_document_get_modification_date(),
poppler_document_is_linearized(), poppler_document_get_page_layout(),
poppler_document_get_page_mode(), poppler_document_get_permissions(),
poppler_document_get_metadata()


glib/poppler-enums.h:
- new public function in glib/poppler-enums.h:
  poppler_print_flags_get_type ()

- new macro in glib/poppler-enums.h:
  POPPLER_TYPE_PRINT_FLAGS ()


glib/poppler-form-field.h:
- new public functions in glib/poppler-form-field.h:
  poppler_form_field_get_partial_name(),
poppler_form_field_get_mapping_name(), poppler_form_field_get_name


glib/poppler.h:
- new enum in glib/poppler.h:
  PopplerPrintFlags


glib/poppler-page.h:
- new public functions in glib/poppler-page.h:
  poppler_page_render_for_printing_with_options (),
poppler_page_get_selected_region  ()


PDFDoc.h:
- new public function in class PDFDoc:
  getID()


PSOutputDev.h:
- private member removed from class PSOutputDev:
  int savedRender


qt4/poppler-qt4.h:
- new public function in class Document:
  getPdfId()

- new public function in class PSConverter:
 void setPageConvertedCallback(void (* callback)(int page, void
*payload), void *payload);


SplashOutputDev.h:
- new public function in class SplashOutputDev:
  updateRender()

- private member removed from class SplashOutputDev:
  int savedRender
___
devel-announce mailing list
devel-annou...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Package rebuilds for gcc bug https://bugzilla.redhat.com/show_bug.cgi?id=634757

2010-10-25 Thread Mamoru Tasaka
Hello:

Jesse Keating wrote, at 10/06/2010 07:27 AM +9:00:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 As you might be aware, there was a period of roughly two weeks where a
 gcc build (gcc-4.5.1-3.fc14) in the buildroots for both Fedora 14 and
 Fedora 15.  Items built with this could have undefined behavior, which
 could lead to data corruption.

 Unfortunately I'm told that it is impossible to look at a generated
 binary and detect whether or not the binary would be effected by this
 bug.  The only reliable way to tell would be to re-create the build
 environment exactly, except replace GCC with one that will detect the
 error scenario and print something.  As this is a significant amount of
 work, I decided instead to just rebuild the potential problem builds.


Would you update the current status of this issue?

For example I checked the current status of ruby-gnome2 (because
I was going to upgrade ruby-gnome2 on F-14) and
- still the latest ruby-gnome2 on F-14 is ruby-gnome2-0.90.2-1.fc14
- this one uses the problematic gcc
- while it seemed that ruby-gnome2 was rebuilt against newer gcc
   (with EVR: ruby-gnome2-0.90.2-1.fc14.1), this new ruby-gnome2 was
   never pushed into dist-f14 or submitted on bodhi.

So are there any list file which suggests what packages still need
repush (after rebuild or update) for this gcc issue?

Regards,
Mamoru
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: F15 Feature - online Ex4 defragmentatnion (Re: e4defrag support?)

2010-10-25 Thread Eric Sandeen
Michał Piotrowski wrote:
 Hi,
 
 2010/10/6 Eric Sandeen sand...@redhat.com:
 OK gang, it's in e2fsprogs-1.41.12-6.fc15

 you have to invoke it with -test options to make it go ;)

 Word of warning, it's not had a lot of attention, and the whole
 design could change in the future, but it's something to play with :)

 -Eric
 
 Would it make sense to propose online ext4 defragmentation as a
 Fedora 15 feature?

At this time, I don't think I'll be able to commit to that work.

I'd usually sign up a feature for Fedora when it is reaching completion
upstream, rather than using Fedora as a driver for upstream priorities...

This might change but I'm not going to commit to it today, sorry.

-Eric

 Rationale - more people would point their attention to this feature -
 more people would test it.
 
 Contingency Plan:
 None. Just delete feature from features page :)
 
 I'm not sure how it is in other distros, but it's probably not very
 popular feature.
 
 Any suggestions?
 
 Kind regards,
 Michal

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

F-14 Branched report: 20101025 changes

2010-10-25 Thread Branched Report
Compose started at Mon Oct 25 13:15:08 UTC 2010

Broken deps for x86_64
--
qtgpsc-0.2.3-6.fc12.x86_64 requires libgps.so.18()(64bit)
rakudo-0.0.2010.08_2.7.0-1.fc14.x86_64 requires 
libparrot.so.2.7.0()(64bit)



Broken deps for i386
--
qtgpsc-0.2.3-6.fc12.i686 requires libgps.so.18
rakudo-0.0.2010.08_2.7.0-1.fc14.i686 requires libparrot.so.2.7.0




Summary:
Added Packages: 0
Removed Packages: 0
Modified Packages: 0
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: F15 Feature - online Ex4 defragmentatnion (Re: e4defrag support?)

2010-10-25 Thread Michał Piotrowski
W dniu 25 października 2010 17:19 użytkownik Eric Sandeen
sand...@redhat.com napisał:
 Michał Piotrowski wrote:
 Hi,

 2010/10/6 Eric Sandeen sand...@redhat.com:
 OK gang, it's in e2fsprogs-1.41.12-6.fc15

 you have to invoke it with -test options to make it go ;)

 Word of warning, it's not had a lot of attention, and the whole
 design could change in the future, but it's something to play with :)

 -Eric

 Would it make sense to propose online ext4 defragmentation as a
 Fedora 15 feature?

 At this time, I don't think I'll be able to commit to that work.

 I'd usually sign up a feature for Fedora when it is reaching completion
 upstream, rather than using Fedora as a driver for upstream priorities...

 This might change but I'm not going to commit to it today, sorry.

I did not mean burdening your in bug reports with the annotation
please fix this bug before F15 :)

All bug reports should be sent to NEC's e4defrag developers. It seems
to me that they are the most appropriate people to fix e4defrag bugs
(of course if they still want to maintain this project - it is hard to
deduce anything from git log - only five commits after merge - one
from author).


 -Eric


Regards,
Michal
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


xz-5.0.0 in rawhide + soname bump

2010-10-25 Thread Jindrich Novy
Hi!

xz-5.0.0 is now released and soname is now bumped to 5.0.0 in rawhide.
The most important changes are:

* The compression settings associated with the preset levels
  -0 ... -9 have been changed. --extreme was changed a little too.
  It is now less likely to make compression worse, but with some
  files the new --extreme may compress slightly worse than the old
  --extreme.

* The major soname has been bumped to 5.0.0. liblzma API and ABI
  are now stable, so the need to recompile programs linking against
  liblzma shouldn't arise soon.

For more news and differences between xz-4.999.9beta and 5.0.0 please
read the NEWS file in the main package documentation.

The change of compression level presets may cause deltarpm to print
md5 mismatch of result when rebuilding drpms and downloading full
rpms. This message will stop occuring as soon as the original package
will be built with the new xz-5.0.0.

Cheers,
Jindrich

-- 
Jindrich Novy jn...@redhat.com   http://people.redhat.com/jnovy/
Kdo víno má a nepije, kdo hrozny má a nejí je, kdo ženu má a nelíbá,
kdo zábavě se vyhýbá, na toho vemte bič a hůl, to není člověk, to je vůl.
--- Jan Werich
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

[Bug 557485] Extra provides need trimming

2010-10-25 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=557485

Fedora Update System upda...@fedoraproject.org changed:

   What|Removed |Added

 Status|ON_QA   |CLOSED
   Fixed In Version||perl-SOAP-Lite-0.710.07-3.e
   ||l5
 Resolution||ERRATA
Last Closed||2010-10-25 12:38:29

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 557485] Extra provides need trimming

2010-10-25 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=557485

--- Comment #5 from Fedora Update System upda...@fedoraproject.org 2010-10-25 
12:38:23 EDT ---
perl-SOAP-Lite-0.710.07-3.el5 has been pushed to the Fedora EPEL 5 stable
repository.  If problems still persist, please make note of it in this bug
report.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


Fedora 14 FINAL Go/No-Go Meeting Tuesday, October 26, 2010 @ 21:00 UTC

2010-10-25 Thread John Poelstra
Join us on irc.freenode.net #fedora-meeting for this important meeting.

Tuesday October 26, 2010 @ 21:00 UTC (17:00 EDT/14:00 PDT)

Before each public release Development, QA, and Release Engineering 
meet to determine if the release criteria are met for a particular 
release. This meeting is called the: Go/No-Go Meeting.

Verifying that the Release criteria are met is the responsibility of 
the QA Team.

For more details about this meeting see:
https://fedoraproject.org/wiki/Go_No_Go_Meeting

In the meantime keep an eye on the Fedora 14 Final Blocker list and help 
us finish filling out the test result matrices.

https://bugzilla.redhat.com/showdependencytree.cgi?id=F14Blockerhide_resolved=1
http://fedoraproject.org/wiki/Category:Fedora_14_Final_RC_Test_Results

John
___
devel-announce mailing list
devel-annou...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: i686/x86_64 dual install media

2010-10-25 Thread Adam Williamson
On Sun, 2010-10-24 at 10:45 -0400, Mark Bidewell wrote:
 Sorry if this has been discussed, but has there every been discussion
 of a dual 32/64-bit install media?  I realize that the default package
 selection would be reduced but with a high speed connection it
 shouldn't be too big of an issue.  Having a single ISO for both my
 64-bit desktop and 32-bit laptop would be quite nice.

It wouldn't make sense to make everyone download the default package set
twice, when only a relatively small amount of people actually need to,
and the extra work involved in downloading and burning two separate ISOs
is so tiny.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Fedora Talk: adamwill AT fedoraproject DOT org
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: F-14 Branched report: 20101024 changes

2010-10-25 Thread Adam Williamson
On Sun, 2010-10-24 at 12:25 -0500, Garrett Holmstrom wrote:
 On 10/24/2010 10:17, Branched Report wrote:
  Broken deps for x86_64
  --
  qtgpsc-0.2.3-6.fc12.x86_64 requires libgps.so.18()(64bit)
  rakudo-0.0.2010.08_2.7.0-1.fc14.x86_64 requires 
  libparrot.so.2.7.0()(64bit)
 
 Any chance these are going to be fixed before release?

It's very unlikely. Any change now requires us to slip the release; RC1
is looking good in validation testing and may well wind up being shipped
as the final release (have we *ever* shipped RC1 before? Is this some
sort of record? :)

Two dependency issues in the entire package set is way, way fewer than
we've shipped with before, IIRC. We made much more of an effort to clear
them up for this release than we did previously.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Fedora Talk: adamwill AT fedoraproject DOT org
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Auto Mounting in Fedora F14 TC6

2010-10-25 Thread Adam Williamson
On Sun, 2010-10-24 at 19:31 -0700, Kevin Higgins wrote:
 I can not tell you exactly which day but approximately Oct 18th auto
 mount for data DVD's worked and now it does not . Did a clean install
 to test again. with same result. Blank DVD's auto mount Movies and
 data DVD's do not auto mount. nor can I manually mount. the drive
 shows up in nautilus but when ever movie or data dvd is placed in
 drive it disappears. Checked all settings in File Management
 Preferences / Media and all is correct, even installed gconf and
 checked all settings again; and all is correct as far as I can see;
  just will not auto mount any more. I am not sure if this would be
 considered a blocker or not, but shall see what everybody else thinks.

https://fedoraproject.org/wiki/Test_Results:Fedora_14_Final_RC1_Desktop

has 'pass' results on the auto-mount test on three different desktops
from three different testers, so apparently not everyone is seeing this.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Fedora Talk: adamwill AT fedoraproject DOT org
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: xz-5.0.0 in rawhide + soname bump

2010-10-25 Thread Paul Howarth
On Mon, 25 Oct 2010 18:35:54 +0200
Jindrich Novy jn...@redhat.com wrote:

 Hi!
 
 xz-5.0.0 is now released and soname is now bumped to 5.0.0 in rawhide.
 The most important changes are:
 
 * The compression settings associated with the preset levels
   -0 ... -9 have been changed. --extreme was changed a little too.
   It is now less likely to make compression worse, but with some
   files the new --extreme may compress slightly worse than the old
   --extreme.
 
 * The major soname has been bumped to 5.0.0. liblzma API and ABI
   are now stable, so the need to recompile programs linking against
   liblzma shouldn't arise soon.

This has broken the Rawhide buildroot:

DEBUG backend.py:656:  /usr/bin/yum --installroot 
/var/lib/mock/dist-f15-build-911517-134161/root/  groupinstall build
DEBUG util.py:294:  Executing command: /usr/bin/yum --installroot 
/var/lib/mock/dist-f15-build-911517-134161/root/  groupinstall build
DEBUG util.py:260:  Error: Package: rpm-libs-4.8.1-5.fc15.x86_64 (build)
DEBUG util.py:260: Requires: liblzma.so.0()(64bit)
DEBUG util.py:260:  Error: Package: elfutils-libs-0.149-2.fc15.x86_64 (build)
DEBUG util.py:260: Requires: liblzma.so.0()(64bit)
DEBUG util.py:260:  Error: Package: rpm-4.8.1-5.fc15.x86_64 (build)
DEBUG util.py:260: Requires: liblzma.so.0()(64bit)
DEBUG util.py:260:  Error: Package: rpm-build-4.8.1-5.fc15.x86_64 (build)
DEBUG util.py:260: Requires: liblzma.so.0()(64bit)

Given that the ABI hasn't actually changed since the previous build, a
short term fix could be to build a mini liblzma.so.0 that just links to
liblzma.so.5, along the same lines as the mini libcurl built for the
last soname bump of that library (Mon Aug 11 2008, curl 7.18.2-4).

The current build needs untagging anyway.

Paul.


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: xz-5.0.0 in rawhide + soname bump

2010-10-25 Thread Kevin Fenzi
On Mon, 25 Oct 2010 19:56:27 +0100
Paul Howarth p...@city-fan.org wrote:

 On Mon, 25 Oct 2010 18:35:54 +0200
 Jindrich Novy jn...@redhat.com wrote:
 
  Hi!
  
  xz-5.0.0 is now released and soname is now bumped to 5.0.0 in
  rawhide. The most important changes are:
  
  * The compression settings associated with the preset levels
-0 ... -9 have been changed. --extreme was changed a little too.
It is now less likely to make compression worse, but with some
files the new --extreme may compress slightly worse than the old
--extreme.
  
  * The major soname has been bumped to 5.0.0. liblzma API and ABI
are now stable, so the need to recompile programs linking against
liblzma shouldn't arise soon.
 
 This has broken the Rawhide buildroot:
 
 DEBUG backend.py:656:  /usr/bin/yum
 --installroot /var/lib/mock/dist-f15-build-911517-134161/root/
 groupinstall build DEBUG util.py:294:  Executing
 command: /usr/bin/yum
 --installroot /var/lib/mock/dist-f15-build-911517-134161/root/
 groupinstall build DEBUG util.py:260:  Error: Package:
 rpm-libs-4.8.1-5.fc15.x86_64 (build) DEBUG util.py:260:
 Requires: liblzma.so.0()(64bit) DEBUG util.py:260:  Error: Package:
 elfutils-libs-0.149-2.fc15.x86_64 (build) DEBUG
 util.py:260: Requires: liblzma.so.0()(64bit) DEBUG
 util.py:260:  Error: Package: rpm-4.8.1-5.fc15.x86_64 (build) DEBUG
 util.py:260: Requires: liblzma.so.0()(64bit) DEBUG
 util.py:260:  Error: Package: rpm-build-4.8.1-5.fc15.x86_64 (build)
 DEBUG util.py:260: Requires: liblzma.so.0()(64bit)
 
 Given that the ABI hasn't actually changed since the previous build, a
 short term fix could be to build a mini liblzma.so.0 that just links
 to liblzma.so.5, along the same lines as the mini libcurl built for
 the last soname bump of that library (Mon Aug 11 2008, curl 7.18.2-4).
 
 The current build needs untagging anyway.

I've untagged it and mailed Jindrich.

Updating a rpm dep is not easy. You will need to rebuild rpm static, or
make a compat package, or some other trick. ;) 

kevin


signature.asc
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

policycoreutils needs cairo.

2010-10-25 Thread Dave Jones
I did a minimal install yesterday, and was surprised to find that
cairo, and a bunch of X libs were still installed.

The dependancy chain that pulled them in looks like this..

policycoreutils - dbus-glib - gobject-introspection - fontconfig - cairo

Could any part of that chain have its dependancies relaxed ?

Dave

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: i686/x86_64 dual install media

2010-10-25 Thread Thorsten Leemhuis
On 25.10.2010 20:49, Adam Williamson wrote:
 On Sun, 2010-10-24 at 10:45 -0400, Mark Bidewell wrote:
 Sorry if this has been discussed, but has there every been discussion
 of a dual 32/64-bit install media?  I realize that the default package
 selection would be reduced but with a high speed connection it
 shouldn't be too big of an issue.  Having a single ISO for both my
 64-bit desktop and 32-bit laptop would be quite nice.
 
 It wouldn't make sense to make everyone download the default package set
 twice, when only a relatively small amount of people actually need to,
 and the extra work involved in downloading and burning two separate ISOs
 is so tiny.

But a combo x86-32/x86-64 install media OTOH would be very interesting
for magazines that want to ship Fedora on a enclosed DVD, as that's
cheaper than two and makes way more readers happy than a x86-32 only
DVD. Ohh, and a combo install media might be interesting as hand out for
fairs and conferences, too.

Just my 2¢.

CU
knurd
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: i686/x86_64 dual install media

2010-10-25 Thread Garrett Holmstrom
Thorsten Leemhuis wrote:
 But a combo x86-32/x86-64 install media OTOH would be very interesting
 for magazines that want to ship Fedora on a enclosed DVD, as that's
 cheaper than two and makes way more readers happy than a x86-32 only
 DVD. Ohh, and a combo install media might be interesting as hand out for
 fairs and conferences, too.

What I would like to see is a regular net install CD (not b.f.o) that is 
capable of installing either x86_64 or i686.  I'm not sure if it's worth 
the work, though...
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: xz-5.0.0 in rawhide + soname bump

2010-10-25 Thread Paul Howarth
On Mon, 25 Oct 2010 12:59:22 -0600
Kevin Fenzi ke...@scrye.com wrote:

 On Mon, 25 Oct 2010 19:56:27 +0100
 Paul Howarth p...@city-fan.org wrote:
 
  On Mon, 25 Oct 2010 18:35:54 +0200
  Jindrich Novy jn...@redhat.com wrote:
  
   Hi!
   
   xz-5.0.0 is now released and soname is now bumped to 5.0.0 in
   rawhide. The most important changes are:
   
   * The compression settings associated with the preset levels
 -0 ... -9 have been changed. --extreme was changed a little too.
 It is now less likely to make compression worse, but with some
 files the new --extreme may compress slightly worse than the old
 --extreme.
   
   * The major soname has been bumped to 5.0.0. liblzma API and ABI
 are now stable, so the need to recompile programs linking
   against liblzma shouldn't arise soon.
  
  This has broken the Rawhide buildroot:
  
  DEBUG backend.py:656:  /usr/bin/yum
  --installroot /var/lib/mock/dist-f15-build-911517-134161/root/
  groupinstall build DEBUG util.py:294:  Executing
  command: /usr/bin/yum
  --installroot /var/lib/mock/dist-f15-build-911517-134161/root/
  groupinstall build DEBUG util.py:260:  Error: Package:
  rpm-libs-4.8.1-5.fc15.x86_64 (build) DEBUG util.py:260:
  Requires: liblzma.so.0()(64bit) DEBUG util.py:260:  Error: Package:
  elfutils-libs-0.149-2.fc15.x86_64 (build) DEBUG
  util.py:260: Requires: liblzma.so.0()(64bit) DEBUG
  util.py:260:  Error: Package: rpm-4.8.1-5.fc15.x86_64 (build) DEBUG
  util.py:260: Requires: liblzma.so.0()(64bit) DEBUG
  util.py:260:  Error: Package: rpm-build-4.8.1-5.fc15.x86_64 (build)
  DEBUG util.py:260: Requires: liblzma.so.0()(64bit)
  
  Given that the ABI hasn't actually changed since the previous
  build, a short term fix could be to build a mini liblzma.so.0 that
  just links to liblzma.so.5, along the same lines as the mini
  libcurl built for the last soname bump of that library (Mon Aug 11
  2008, curl 7.18.2-4).
  
  The current build needs untagging anyway.
 
 I've untagged it and mailed Jindrich.
 
 Updating a rpm dep is not easy. You will need to rebuild rpm static,
 or make a compat package, or some other trick. ;)

The mini-library hack does the trick by proving both sonames
(effectively the new one and the compat one) in the same package.

Paul.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: policycoreutils needs cairo.

2010-10-25 Thread Colin Walters
On Mon, Oct 25, 2010 at 3:33 PM, Dave Jones da...@redhat.com wrote:
 I did a minimal install yesterday, and was surprised to find that
 cairo, and a bunch of X libs were still installed.

 The dependancy chain that pulled them in looks like this..

 policycoreutils - dbus-glib - gobject-introspection - fontconfig - cairo

This is fixed in F15 in multiple ways (restorecond is split out of
policycoreutils, and dbus-glib no longer deps on
gobject-introspection, and g-i no longer depends on cairo)

 Could any part of that chain have its dependancies relaxed ?

Unfortunately we didn't notice this dependency until pretty late in
F14...I'm not sure what can be done reasonably at this point, since
all of these packages are critical path.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: policycoreutils needs cairo.

2010-10-25 Thread Colin Walters
On Mon, Oct 25, 2010 at 5:21 PM, Colin Walters walt...@verbum.org wrote:

 Unfortunately we didn't notice this dependency until pretty late in
 F14...I'm not sure what can be done reasonably at this point, since
 all of these packages are critical path.

Though I will say that if this was determined to be a blocker, here's
a really safe minimal fix:
From ebec17c813c860964af9e1d313c3ec97171aeacb Mon Sep 17 00:00:00 2001
From: Colin Walters walt...@verbum.org
Date: Mon, 25 Oct 2010 17:45:05 -0400
Subject: [PATCH] - Move test libraries into -devel; they pull in a cairo dependency,
   which is unnecessary.

---
 gobject-introspection.spec |   10 --
 1 files changed, 8 insertions(+), 2 deletions(-)

diff --git a/gobject-introspection.spec b/gobject-introspection.spec
index 2ec89d5..8e59067 100644
--- a/gobject-introspection.spec
+++ b/gobject-introspection.spec
@@ -3,7 +3,7 @@
 
 Name:   gobject-introspection
 Version:0.9.3
-Release:	1%{?dist}
+Release:	2%{?dist}
 Summary:Introspection system for GObject-based libraries
 
 Group:  Development/Libraries
@@ -73,13 +73,15 @@ find $RPM_BUILD_ROOT -type f -name *.a -exec rm -f {} ';'
 %defattr(-,root,root,-)
 %doc COPYING
 
-%{_libdir}/lib*.so.*
+%{_libdir}/libgirepository-1.0.so.*
 %dir %{_libdir}/girepository-1.0
 %{_libdir}/girepository-1.0/*.typelib
 
 %files devel
 %defattr(-,root,root)
 %{_libdir}/lib*.so
+%{_libdir}/libgirepository-everything-1.0.so.*
+%{_libdir}/libgirepository-gimarshallingtests-1.0.so.*
 %dir %{_libdir}/gobject-introspection
 %{_libdir}/gobject-introspection/*
 %{_libdir}/pkgconfig/*
@@ -94,6 +96,10 @@ find $RPM_BUILD_ROOT -type f -name *.a -exec rm -f {} ';'
 #%{_datadir}/gtk-doc/html/gi/*
 
 %changelog
+* Mon Oct 25 2010 Colin Walters walt...@verbum.org - 0.9.3-2
+- Move test libraries into -devel; they pull in a cairo dependency,
+  which is unnecessary.
+
 * Tue Aug  3 2010 Matthias Clasen mcla...@redhat.com - 0.9.3-1
 - Update to 0.9.3
 
-- 
1.7.3.1

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: policycoreutils needs cairo.

2010-10-25 Thread Bill Nottingham
Colin Walters (walt...@verbum.org) said: 
 On Mon, Oct 25, 2010 at 5:21 PM, Colin Walters walt...@verbum.org wrote:
 
  Unfortunately we didn't notice this dependency until pretty late in
  F14...I'm not sure what can be done reasonably at this point, since
  all of these packages are critical path.
 
 Though I will say that if this was determined to be a blocker, here's
 a really safe minimal fix:

AFAIK, there's nothing on the release criteria which make this a blocker.
You can submit an update whenever for it, of course.

Bill
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Mounting an encrypted volume presents the volume to all users on a machine

2010-10-25 Thread nodata
Hi,

I'm concerned about the default behaviour of mounting encrypted volumes.

The default behaviour is that a user must know and supply a passphrase 
in order to mount an encrypted volume. This is good: know the 
passphrase, you get to mount the volume.

What I am concerned about is that the volume is mounted for _every_ user 
on the system to see.

I've filed a bug about this, and it got closed:
  https://bugzilla.redhat.com/show_bug.cgi?id=646085

I'm quite in favour of secure by default. In the worst case, the 
mountpoint would have permissions set to read access to all if you tick 
a box.

Thoughts?

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Mounting an encrypted volume presents the volume to all users on a machine

2010-10-25 Thread Nathanael D. Noblet
On 10/25/2010 04:28 PM, nodata wrote:
 Hi,

 I'm concerned about the default behaviour of mounting encrypted volumes.

 The default behaviour is that a user must know and supply a passphrase
 in order to mount an encrypted volume. This is good: know the
 passphrase, you get to mount the volume.

 What I am concerned about is that the volume is mounted for _every_ user
 on the system to see.

 I've filed a bug about this, and it got closed:
https://bugzilla.redhat.com/show_bug.cgi?id=646085

 I'm quite in favour of secure by default. In the worst case, the
 mountpoint would have permissions set to read access to all if you tick
 a box.

Wouldn't they be restricted based on the contents of the encrypted volume?
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Mounting an encrypted volume presents the volume to all users on a machine

2010-10-25 Thread nodata
On 26/10/10 00:31, Nathanael D. Noblet wrote:
 On 10/25/2010 04:28 PM, nodata wrote:
 Hi,

 I'm concerned about the default behaviour of mounting encrypted volumes.

 The default behaviour is that a user must know and supply a passphrase
 in order to mount an encrypted volume. This is good: know the
 passphrase, you get to mount the volume.

 What I am concerned about is that the volume is mounted for _every_ user
 on the system to see.

 I've filed a bug about this, and it got closed:
 https://bugzilla.redhat.com/show_bug.cgi?id=646085

 I'm quite in favour of secure by default. In the worst case, the
 mountpoint would have permissions set to read access to all if you tick
 a box.

 Wouldn't they be restricted based on the contents of the encrypted volume?

What do you mean?
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Mounting an encrypted volume presents the volume to all users on a machine

2010-10-25 Thread nodata
On 26/10/10 00:31, Nathanael D. Noblet wrote:
 On 10/25/2010 04:28 PM, nodata wrote:
 Hi,

 I'm concerned about the default behaviour of mounting encrypted volumes.

 The default behaviour is that a user must know and supply a passphrase
 in order to mount an encrypted volume. This is good: know the
 passphrase, you get to mount the volume.

 What I am concerned about is that the volume is mounted for _every_ user
 on the system to see.

 I've filed a bug about this, and it got closed:
 https://bugzilla.redhat.com/show_bug.cgi?id=646085

 I'm quite in favour of secure by default. In the worst case, the
 mountpoint would have permissions set to read access to all if you tick
 a box.

 Wouldn't they be restricted based on the contents of the encrypted volume?

Yes. Once the volume is mounted it will be treated with normal UNIX 
permissions. So you would have to create a sub-directory on the volume 
where the permissions were strict and create files under that.

My point is that if the disk is encrypted, and the user knows the 
passphrase to access files on the device, then it doesn't make sense to 
let everyone else see what's on the device as well: it only make sense 
to decrypt the device to the user who knows the passphrase.

There's an argument that other people will want to see what's on the 
device too. That's fine: the user can opt-in to that. But secure by 
default should be what we're aiming at.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Package rebuilds for gcc bug https://bugzilla.redhat.com/show_bug.cgi?id=634757

2010-10-25 Thread Jesse Keating
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/25/10 8:09 AM, Mamoru Tasaka wrote:
 Hello:
 
 Jesse Keating wrote, at 10/06/2010 07:27 AM +9:00:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 As you might be aware, there was a period of roughly two weeks where a
 gcc build (gcc-4.5.1-3.fc14) in the buildroots for both Fedora 14 and
 Fedora 15.  Items built with this could have undefined behavior, which
 could lead to data corruption.

 Unfortunately I'm told that it is impossible to look at a generated
 binary and detect whether or not the binary would be effected by this
 bug.  The only reliable way to tell would be to re-create the build
 environment exactly, except replace GCC with one that will detect the
 error scenario and print something.  As this is a significant amount of
 work, I decided instead to just rebuild the potential problem builds.

 
 Would you update the current status of this issue?
 
 For example I checked the current status of ruby-gnome2 (because
 I was going to upgrade ruby-gnome2 on F-14) and
 - still the latest ruby-gnome2 on F-14 is ruby-gnome2-0.90.2-1.fc14
 - this one uses the problematic gcc
 - while it seemed that ruby-gnome2 was rebuilt against newer gcc
(with EVR: ruby-gnome2-0.90.2-1.fc14.1), this new ruby-gnome2 was
never pushed into dist-f14 or submitted on bodhi.
 
 So are there any list file which suggests what packages still need
 repush (after rebuild or update) for this gcc issue?
 
 Regards,
 Mamoru


Current status is that almost all the builds are done and in the proper
location.  There are a few stragglers, and you may have identified one.
 The effort was put on hold as we get Fedora 14 ready for release.
Anything in F14 GA that could be effected will see a post-release update.

As for ruby-gnome2, the build you have in updates-testing, if it goes
stable, will suffice.

- -- 
Jesse Keating
Fedora -- Freedom² is a feature!
identi.ca: http://identi.ca/jkeating


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkzGB7kACgkQ4v2HLvE71NXX/gCfasPcIg7JV9OchitCGWVMpRl7
dnwAoKZ1oUR/GUDotEgdo87EA7uwRHKU
=V1qH
-END PGP SIGNATURE-
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Mounting an encrypted volume presents the volume to all users on a machine

2010-10-25 Thread Nathanael D. Noblet
On 10/25/2010 04:40 PM, nodata wrote:

 Wouldn't they be restricted based on the contents of the encrypted volume?

 Yes. Once the volume is mounted it will be treated with normal UNIX
 permissions. So you would have to create a sub-directory on the volume
 where the permissions were strict and create files under that.

 My point is that if the disk is encrypted, and the user knows the
 passphrase to access files on the device, then it doesn't make sense to
 let everyone else see what's on the device as well: it only make sense
 to decrypt the device to the user who knows the passphrase.

 There's an argument that other people will want to see what's on the
 device too. That's fine: the user can opt-in to that. But secure by
 default should be what we're aiming at.

I encrypt /home... So for my use case it doesn't make much sense. I 
guess I can see the case where you have some random storage that is 
encrypted, however I'm not sure how common this is, and file permissions 
keeps them at bay once mounted anyway. I guess if they could get root, 
once you decrypt they have access, but if they have root... you've got 
other problems.

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: policycoreutils needs cairo.

2010-10-25 Thread Adam Williamson
On Mon, 2010-10-25 at 17:55 -0400, Bill Nottingham wrote:
 Colin Walters (walt...@verbum.org) said: 
  On Mon, Oct 25, 2010 at 5:21 PM, Colin Walters walt...@verbum.org wrote:
  
   Unfortunately we didn't notice this dependency until pretty late in
   F14...I'm not sure what can be done reasonably at this point, since
   all of these packages are critical path.
  
  Though I will say that if this was determined to be a blocker, here's
  a really safe minimal fix:
 
 AFAIK, there's nothing on the release criteria which make this a blocker.
 You can submit an update whenever for it, of course.

It's worth pointing out that we're not religious about the criteria: we
want to have criteria to cover each blocker issue, but that doesn't mean
that no issue can ever be a blocker unless it meets the existing
criteria. When we come across an issue that is widely agreed ought to be
a blocker, but doesn't meet the existing criteria, we write a new
criterion. :)

Having said that, I don't think this seems serious enough to be a
blocker, though obviously we'd like the minimal install to be as minimal
as possible. Does it cause major problems for any spins? I doubt it, I
expect most of them will have cairo for one reason or another anyway.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Fedora Talk: adamwill AT fedoraproject DOT org
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: policycoreutils needs cairo.

2010-10-25 Thread Peter Robinson
On Mon, Oct 25, 2010 at 11:52 PM, Adam Williamson awill...@redhat.com wrote:
 On Mon, 2010-10-25 at 17:55 -0400, Bill Nottingham wrote:
 Colin Walters (walt...@verbum.org) said:
  On Mon, Oct 25, 2010 at 5:21 PM, Colin Walters walt...@verbum.org wrote:
  
   Unfortunately we didn't notice this dependency until pretty late in
   F14...I'm not sure what can be done reasonably at this point, since
   all of these packages are critical path.
 
  Though I will say that if this was determined to be a blocker, here's
  a really safe minimal fix:

 AFAIK, there's nothing on the release criteria which make this a blocker.
 You can submit an update whenever for it, of course.

 It's worth pointing out that we're not religious about the criteria: we
 want to have criteria to cover each blocker issue, but that doesn't mean
 that no issue can ever be a blocker unless it meets the existing
 criteria. When we come across an issue that is widely agreed ought to be
 a blocker, but doesn't meet the existing criteria, we write a new
 criterion. :)

 Having said that, I don't think this seems serious enough to be a
 blocker, though obviously we'd like the minimal install to be as minimal
 as possible. Does it cause major problems for any spins? I doubt it, I
 expect most of them will have cairo for one reason or another anyway.

I wouldn't expect it to affect the usual spins on s.fp.o, but the
image for EC2 might be as I would expect that to be aimed at Just
Enough OS but then I'm not sure how stripped down they've tried to
make it.

Peter
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: policycoreutils needs cairo.

2010-10-25 Thread Garrett Holmstrom
Peter Robinson wrote:
 On Mon, Oct 25, 2010 at 11:52 PM, Adam Williamson awill...@redhat.com wrote:
 On Mon, 2010-10-25 at 17:55 -0400, Bill Nottingham wrote:
 Colin Walters (walt...@verbum.org) said:
 On Mon, Oct 25, 2010 at 5:21 PM, Colin Walters walt...@verbum.org wrote:
 Unfortunately we didn't notice this dependency until pretty late in
 F14...I'm not sure what can be done reasonably at this point, since
 all of these packages are critical path.
 Though I will say that if this was determined to be a blocker, here's
 a really safe minimal fix:
 AFAIK, there's nothing on the release criteria which make this a blocker.
 You can submit an update whenever for it, of course.
 It's worth pointing out that we're not religious about the criteria: we
 want to have criteria to cover each blocker issue, but that doesn't mean
 that no issue can ever be a blocker unless it meets the existing
 criteria. When we come across an issue that is widely agreed ought to be
 a blocker, but doesn't meet the existing criteria, we write a new
 criterion. :)

 Having said that, I don't think this seems serious enough to be a
 blocker, though obviously we'd like the minimal install to be as minimal
 as possible. Does it cause major problems for any spins? I doubt it, I
 expect most of them will have cairo for one reason or another anyway.
 
 I wouldn't expect it to affect the usual spins on s.fp.o, but the
 image for EC2 might be as I would expect that to be aimed at Just
 Enough OS but then I'm not sure how stripped down they've tried to
 make it.

While we (the Cloud SIG) are shooting for a very minimal EC2 image, last 
I heard we still planned to ship it with SELinux.  But if that isn't the 
case then I'm pretty sure this will impact the size of the images we 
need to upload.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: policycoreutils needs cairo.

2010-10-25 Thread Bruno Wolff III
On Mon, Oct 25, 2010 at 15:52:38 -0700,
  Adam Williamson awill...@redhat.com wrote:
 
 Having said that, I don't think this seems serious enough to be a
 blocker, though obviously we'd like the minimal install to be as minimal
 as possible. Does it cause major problems for any spins? I doubt it, I
 expect most of them will have cairo for one reason or another anyway.

At this point the spins ar all smaller than their target size. I expect
that Desktop would have pulled this stuff in, in any case. So it wouldn't
have saved us from the scramble to get it under size.

For custom spins built from the release, an update should be sufficient.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Mounting an encrypted volume presents the volume to all users on a machine

2010-10-25 Thread Bruno Wolff III
On Tue, Oct 26, 2010 at 00:40:41 +0200,
  nodata l...@nodata.co.uk wrote:
 
 My point is that if the disk is encrypted, and the user knows the 
 passphrase to access files on the device, then it doesn't make sense to 
 let everyone else see what's on the device as well: it only make sense 
 to decrypt the device to the user who knows the passphrase.

The files aren't decrypted to people (at least not yet, but expect a law
requiring people to replace their eyes with ones that respect DRM sometime
in the future). Once the OS can access the files, you are relying on the OS'
security.

 There's an argument that other people will want to see what's on the 
 device too. That's fine: the user can opt-in to that. But secure by 
 default should be what we're aiming at.

When you mount the file you can attach selinux context to all of the files
or set the uid and group ownership to allow the OS to restrict access to
the files excepting a compromised system or the use doing something boenheaded.
(selinux can make the latter hard to do).
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Mounting an encrypted volume presents the volume to all users on a machine

2010-10-25 Thread Eric Sandeen
nodata wrote:
 Hi,
 
 I'm concerned about the default behaviour of mounting encrypted volumes.
 
 The default behaviour is that a user must know and supply a passphrase 
 in order to mount an encrypted volume. This is good: know the 
 passphrase, you get to mount the volume.
 
 What I am concerned about is that the volume is mounted for _every_ user 
 on the system to see.
 
 I've filed a bug about this, and it got closed:
   https://bugzilla.redhat.com/show_bug.cgi?id=646085
 
 I'm quite in favour of secure by default. In the worst case, the 
 mountpoint would have permissions set to read access to all if you tick 
 a box.
 
 Thoughts?
 

If you want something closer to per-file encryption, try out ecryptfs.

http://ecryptfs.sourceforge.net/ecryptfs-faq.html#compare

-Eric
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: HEADS UP: KDE/Qt update intentions in Fedora 13 (RFC)

2010-10-25 Thread Kevin Fenzi
On Sun, 24 Oct 2010 21:24:30 +0300
Kalev Lember ka...@smartlink.ee wrote:

 On 10/20/2010 03:02 PM, Jaroslav Reznik wrote:
  The question is (we agreed on KDE SIG meeting yesterday) - should we
  update Qt to 4.7 too or build KDE stack with current 4.6 series? As
  there are a few Qt packages outside of KDE SIG/Qt maintainers scope,
  we'd like to hear any objections against update - bugs we can fix
  etc. Qt 4.7 is quite well tested, thanks to work on Fedora 14 (Qt
  4.7 is already included) and a lot of users are actually using this
  combination in Fedora 13.
 
 KDE is pretty much self contained, whereas a Qt upgrade affects a much
 larger number of packages. I don't think updating Qt to a new major
 version in a stable Fedora release is a good idea; it just causes too
 much churn.

...snip... 

I agree with Kalev here. Qt upgrade in a stable release is to be
avoided unless there's some severe bug or security issue that can't be
backported. 

kevin


signature.asc
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: HEADS UP: KDE/Qt update intentions in Fedora 13 (RFC)

2010-10-25 Thread Manuel Escudero
2010/10/25 Kevin Fenzi ke...@scrye.com

 On Sun, 24 Oct 2010 21:24:30 +0300
 Kalev Lember ka...@smartlink.ee wrote:

  On 10/20/2010 03:02 PM, Jaroslav Reznik wrote:
   The question is (we agreed on KDE SIG meeting yesterday) - should we
   update Qt to 4.7 too or build KDE stack with current 4.6 series? As
   there are a few Qt packages outside of KDE SIG/Qt maintainers scope,
   we'd like to hear any objections against update - bugs we can fix
   etc. Qt 4.7 is quite well tested, thanks to work on Fedora 14 (Qt
   4.7 is already included) and a lot of users are actually using this
   combination in Fedora 13.
 
  KDE is pretty much self contained, whereas a Qt upgrade affects a much
  larger number of packages. I don't think updating Qt to a new major
  version in a stable Fedora release is a good idea; it just causes too
  much churn.

 ...snip...

 I agree with Kalev here. Qt upgrade in a stable release is to be
 avoided unless there's some severe bug or security issue that can't be
 backported.

 kevin

 --
 devel mailing list
 devel@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel


I have KDE 4.5.2 in my Fedora 13 wich as far as I understand uses the last
version of Qt, the computer is working Flawlessly :D

-- 
-Manuel Escudero-
Linux User #509052
@GWave: jmlev...@googlewave.com
@Blogger: http://www.blogxenode.tk/ (Xenode Systems Blog)
PGP/GnuPG: DAE3 82E9 D68E 7AE4 ED31  1F8F 4AF4 D00C 50E7 ABC6
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Mounting an encrypted volume presents the volume to all users on a machine

2010-10-25 Thread Qiang Li
On Tue, 2010-10-26 at 00:28 +0200, nodata wrote:
 Hi,
 
 I'm concerned about the default behaviour of mounting encrypted volumes.
 
 The default behaviour is that a user must know and supply a passphrase 
 in order to mount an encrypted volume. This is good: know the 
 passphrase, you get to mount the volume.
 
 What I am concerned about is that the volume is mounted for _every_ user 
 on the system to see.
 
 I've filed a bug about this, and it got closed:
   https://bugzilla.redhat.com/show_bug.cgi?id=646085
 
 I'm quite in favour of secure by default. In the worst case, the 
 mountpoint would have permissions set to read access to all if you tick 
 a box.
 
 Thoughts?
 

I'd think you mixed the concept of volume encryption and permission.
Once you supply the pass for the encrypted volume, it means that you
grant the right to OS to mount this volume. Then the OS is in charge of
permission settings. OS doesn't care about if it is encrypted or not, it
only knows some volume wants to be mounted and it sets permission as the
default schema.

Qiang
 
-- 
Qiang Li
HuBei Polytechnic Institute
No. 17 YuQuan Road
XiaoGan HuBei 432100
China
E-mail:  liqi...@hbvtc.edu.cn

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Fedora 14 FINAL Go/No-Go Meeting Tuesday, October 26, 2010 @ 21:00 UTC

2010-10-25 Thread John Poelstra
Join us on irc.freenode.net #fedora-meeting for this important meeting.

Tuesday October 26, 2010 @ 21:00 UTC (17:00 EDT/14:00 PDT)

Before each public release Development, QA, and Release Engineering 
meet to determine if the release criteria are met for a particular 
release. This meeting is called the: Go/No-Go Meeting.

Verifying that the Release criteria are met is the responsibility of 
the QA Team.

For more details about this meeting see:
https://fedoraproject.org/wiki/Go_No_Go_Meeting

In the meantime keep an eye on the Fedora 14 Final Blocker list and help 
us finish filling out the test result matrices.

https://bugzilla.redhat.com/showdependencytree.cgi?id=F14Blockerhide_resolved=1
http://fedoraproject.org/wiki/Category:Fedora_14_Final_RC_Test_Results

John
___
devel-announce mailing list
devel-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce