Fedora-Rawhide-20210526.n.0 compose check report

2021-05-26 Thread Fedora compose checker
No missing expected images.

Compose FAILS proposed Rawhide gating check!
7 of 43 required tests failed, 8 results missing
openQA tests matching unsatisfied gating requirements shown with **GATING** 
below

Failed openQA tests: 13/194 (x86_64), 12/133 (aarch64)

New failures (same test not failed in Fedora-Rawhide-20210525.n.0):

ID: 896080  Test: x86_64 Workstation-live-iso desktop_notifications_live
URL: https://openqa.fedoraproject.org/tests/896080
ID: 896092  Test: x86_64 KDE-live-iso desktop_notifications_live
URL: https://openqa.fedoraproject.org/tests/896092
ID: 896194  Test: aarch64 Workstation-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/896194
ID: 896216  Test: aarch64 Cloud_Base-qcow2-qcow2 base_services_start@uefi
URL: https://openqa.fedoraproject.org/tests/896216
ID: 896301  Test: aarch64 universal install_cyrillic_language@uefi
URL: https://openqa.fedoraproject.org/tests/896301
ID: 896302  Test: aarch64 universal install_arabic_language@uefi
URL: https://openqa.fedoraproject.org/tests/896302
ID: 896306  Test: aarch64 universal install_anaconda_text@uefi
URL: https://openqa.fedoraproject.org/tests/896306
ID: 896308  Test: aarch64 universal install_repository_http_graphical@uefi
URL: https://openqa.fedoraproject.org/tests/896308
ID: 896333  Test: aarch64 universal install_european_language@uefi
URL: https://openqa.fedoraproject.org/tests/896333
ID: 896338  Test: x86_64 Workstation-live-iso install_default_upload 
**GATING**
URL: https://openqa.fedoraproject.org/tests/896338
ID: 896356  Test: x86_64 Workstation-live-iso install_default@uefi 
**GATING**
URL: https://openqa.fedoraproject.org/tests/896356
ID: 896357  Test: x86_64 KDE-live-iso install_no_user **GATING**
URL: https://openqa.fedoraproject.org/tests/896357
ID: 896358  Test: x86_64 KDE-live-iso install_default_upload **GATING**
URL: https://openqa.fedoraproject.org/tests/896358
ID: 896375  Test: x86_64 KDE-live-iso install_default@uefi **GATING**
URL: https://openqa.fedoraproject.org/tests/896375

Old failures (same test failed in Fedora-Rawhide-20210525.n.0):

ID: 896028  Test: x86_64 Server-dvd-iso server_remote_logging_server
URL: https://openqa.fedoraproject.org/tests/896028
ID: 896031  Test: x86_64 Server-dvd-iso 
server_role_deploy_domain_controller **GATING**
URL: https://openqa.fedoraproject.org/tests/896031
ID: 896037  Test: x86_64 Server-dvd-iso server_realmd_join_kickstart 
**GATING**
URL: https://openqa.fedoraproject.org/tests/896037
ID: 896062  Test: x86_64 Server-dvd-iso server_remote_logging_client
URL: https://openqa.fedoraproject.org/tests/896062
ID: 896170  Test: aarch64 Server-dvd-iso 
server_role_deploy_domain_controller@uefi
URL: https://openqa.fedoraproject.org/tests/896170
ID: 896172  Test: aarch64 Server-dvd-iso server_remote_logging_server@uefi
URL: https://openqa.fedoraproject.org/tests/896172
ID: 896178  Test: aarch64 Server-dvd-iso server_realmd_join_kickstart@uefi
URL: https://openqa.fedoraproject.org/tests/896178
ID: 896183  Test: aarch64 Server-dvd-iso server_remote_logging_client@uefi
URL: https://openqa.fedoraproject.org/tests/896183
ID: 896244  Test: x86_64 universal upgrade_kde_64bit
URL: https://openqa.fedoraproject.org/tests/896244
ID: 896263  Test: x86_64 universal install_asian_language
URL: https://openqa.fedoraproject.org/tests/896263
ID: 896317  Test: aarch64 universal install_asian_language@uefi
URL: https://openqa.fedoraproject.org/tests/896317

Soft failed openQA tests: 4/194 (x86_64), 5/133 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Rawhide-20210525.n.0):

ID: 896127  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/896127
ID: 896129  Test: aarch64 Minimal-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/896129
ID: 896185  Test: aarch64 Server-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/896185
ID: 896214  Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/896214
ID: 896230  Test: x86_64 universal upgrade_2_kde_64bit
URL: https://openqa.fedoraproject.org/tests/896230
ID: 896260  Test: x86_64 universal upgrade_server_domain_controller
URL: https://openqa.fedoraproject.org/tests/896260
ID: 896291  Test: x86_64 universal upgrade_realmd_client
URL: https://openqa.fedoraproject.org/tests/896291
ID: 896326  Test: aarch64 universal upgrade_server_domain_controller@uefi
URL: https://openqa.fedoraproject.org/tests/896326
ID: 896336  Test: aarch64 universal upgrade_realmd_client@uefi
URL: https://openqa.fedoraproject.org/tests/896336

Passed openQA tests: 144/194 (x86_64), 102/133 (aarch64)

New passes (same test not passed in Fedora-Rawh

Re: [Test-Announce] Fedora 35 Rawhide 20210526.n.0 nightly compose nominated for testing

2021-05-26 Thread Adam Williamson
On Thu, 2021-05-27 at 01:07 +, rawh...@fedoraproject.org wrote:
> Announcing the creation of a new nightly release validation test event
> for Fedora 35 Rawhide 20210526.n.0. Please help run some tests for this
> nightly compose if you have time. For more information on nightly
> release validation testing, see:
> https://fedoraproject.org/wiki/QA:Release_validation_test_plan
> 
> Notable package version changes:
> anaconda - 20210520.n.1: anaconda-35.15-1.fc35.src, 20210526.n.0: 
> anaconda-35.16-1.fc35.src
> lorax - 20210520.n.1: lorax-35.2-1.fc35.src, 20210526.n.0: 
> lorax-35.3-1.fc35.src

Note - there seems to be a bug between libxcrypt and pam which prevents
live images booting to a desktop. It's affecting this Rawhide compose
and also libxcrypt updates for F33 and F34. I'm investigating
currently. Other media seem OK, so it's likely only affecting the
liveuser account that's created on boot of live images for some reason.
-- 
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Test-Announce] Fedora 35 Rawhide 20210526.n.0 nightly compose nominated for testing

2021-05-26 Thread rawhide
Announcing the creation of a new nightly release validation test event
for Fedora 35 Rawhide 20210526.n.0. Please help run some tests for this
nightly compose if you have time. For more information on nightly
release validation testing, see:
https://fedoraproject.org/wiki/QA:Release_validation_test_plan

Notable package version changes:
anaconda - 20210520.n.1: anaconda-35.15-1.fc35.src, 20210526.n.0: 
anaconda-35.16-1.fc35.src
lorax - 20210520.n.1: lorax-35.2-1.fc35.src, 20210526.n.0: lorax-35.3-1.fc35.src

Test coverage information for the current release can be seen at:
https://openqa.fedoraproject.org/testcase_stats/35

You can see all results, find testing instructions and image download
locations, and enter results on the Summary page:

https://fedoraproject.org/wiki/Test_Results:Fedora_35_Rawhide_20210526.n.0_Summary

The individual test result pages are:

https://fedoraproject.org/wiki/Test_Results:Fedora_35_Rawhide_20210526.n.0_Installation
https://fedoraproject.org/wiki/Test_Results:Fedora_35_Rawhide_20210526.n.0_Base
https://fedoraproject.org/wiki/Test_Results:Fedora_35_Rawhide_20210526.n.0_Server
https://fedoraproject.org/wiki/Test_Results:Fedora_35_Rawhide_20210526.n.0_Cloud
https://fedoraproject.org/wiki/Test_Results:Fedora_35_Rawhide_20210526.n.0_Desktop
https://fedoraproject.org/wiki/Test_Results:Fedora_35_Rawhide_20210526.n.0_Security_Lab

Thank you for testing!
-- 
Mail generated by relvalconsumer: https://pagure.io/fedora-qa/relvalconsumer
___
test-announce mailing list -- test-annou...@lists.fedoraproject.org
To unsubscribe send an email to test-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test-annou...@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Make btrfs the default file system for Fedora Cloud (System-Wide Change proposal)

2021-05-26 Thread Michel Alexandre Salim
On Wed, 2021-05-26 at 16:59 -0600, Chris Murphy wrote:
> On Wed, May 26, 2021 at 5:30 AM Peter Boy  wrote:
> > > Am 26.05.2021 um 08:51 schrieb Chris Murphy <
> > > li...@colorremedies.com>:
> > > What controversial discussion is being referenced? Currently before
> > > us
> > > is a proposal to switch to Btrfs for Cloud edition.
> > 
> > I’m quite sure you know that discussion. Part to it was Red Hat’s
> > decision to drop BTRFS in RHEL 8 (to my dismay, by the way, because I
> > used it for some file systems on our servers). And because there is
> > that decision and that discussion, I expect it will take a longer
> > time to switch e.g. server to BTRFS as system wide default. So my
> > casual 10-year forecast is not an overreaction as Neal put it (at
> > most some pessimism).
> 
> I understand you think it will take longer. What I don't understand is
> why you think this, but I guess we can just skip over that.
> 
> But let's keep the Red Hat aspect of the storyline in context though.
> And not extrapolate beyond the available facts.
> https://news.ycombinator.com/item?id=14907771
> 
> Whereupon Server SIG/WG perform an evaluation of Btrfs for their use
> cases, and decide Btrfs should be the default in a compelling manner,
> FESCo will approve it. And this plausibly could still happen for
> Fedora 35, if folks really want it to happen. But I think it's neither
> urgent nor requires a long delay. Server SIG can do anything they
> want. Red Hat is doing the same.
> 
> 
> > I think we have a misunderstanding here. My argument refers to
> > expected hurdles of a possible changeover process, not to technical
> > features.
> 
> My opinion is to not worry about the process in advance of arriving at
> the hurdle. You jump over the hurdle at the proper time. The vast
> majority of the process is about technical features liabilities.
> 
> For example, I expect Server folks probably prefer LVM LV's for
> backing virtual machines, rather than raw or qcow2 no matter the file
> system. Even if this can be approximated by fallocate (raw and qcow2
> support it, as as well as ext4, xfs, btrfs) to preallocate the backing
> file, it's likely a lot of Server folks will just prefer using LVM for
> this case. That's fine.
> 
> A good question is to what degree can Server edition, via Anaconda
> kickstart, divvy up a drive in boolean fashion? I know there's some
> thresholds like, if the drive is below a certain size, don't create
> /home, and so on. Could Server default installations default to a ~20G
> Btrfs system volume; and either leave the rest unallocated (not
> partitioned)? Or make all remaining space an LVM PV, added to a single
> VG? And then just not create any LVs? I think I'd like to see each:
> unallocated, PV only, PV + VG, in Cockpit's UI and get some feedback
> from those folks because it'd be ideal if the overview of the
> initially installed system can clearly show the layout, whatever it
> is.
> 
> Not often but sometimes folks ask "where has all the space gone?"
> following a Server installation. They're not expecting or maybe not
> discovering, that quite a lot is held in reserve in the VG.
> 
> 
> > Again, it’s not about technical properties. We have (or probably
> > had?) an agreement to align (or try to align) Server Edition and
> > Cloud. That was 2 or 3 months ago. Regarding to that agreement, it is
> > a step into the wrong direction.
> 
> Is there a Server or Cloud meeting with minutes that this discussion
> happened in? Or email thread you can point to?
> 
As I recall it was very preliminary, and the suggestion is that the
working groups can be merged at some point in the future.

- mattdm brought it up back in December
 
https://meetbot.fedoraproject.org/teams/serversig/serversig.2020-12-16-18.00.log.html
  (timestamp: 18:52:23)

- there's discussion about talking to Cloud WG on April 7
 
https://meetbot.fedoraproject.org/teams/fedora-server/fedora-server.2021-04-07-17.01.log.html
  (timestamp: 17:44:55)

I don't think there was ever a discussion of making the two products
technically aligned (nor do I really see a need, even if the working
groups end up being merged).

There has not been an official proposal; to my recollection it has not
been brought up at a Cloud WG meeting.

Best regards,

-- 
Michel Alexandre Salim
profile: https://keyoxide.org/mic...@michel-slm.name


signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: When is pappl going to be good enough to replace cups?

2021-05-26 Thread PGNet Dev
the assumption that all of those several million 


people will want to print from anything with a CPU ("whatever computing 



devices one uses") or that that is even the common case.



There's been no assumption that "all" want any-one-thing.

As for common, print-from-any-device-you-use is common here, with ~ 1K 
'in-house' users, and easily-dozens-per-day of 'guests'.

That's FAR more common than your 'objection' to it.

As has been said repeatedly here -- paraphrasing, "different strokes for different 
folks".

If the developers think its important to support their user-base, what are you 
objecting to?
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: When is pappl going to be good enough to replace cups?

2021-05-26 Thread Kevin Kofler via devel
Stephen John Smoogen wrote:

> On Mon, 24 May 2021 at 22:30, Kevin Kofler via devel <
> devel@lists.fedoraproject.org> wrote:
> 
>> Solomon Peachy wrote:
>>
>> > On Tue, May 25, 2021 at 01:27:03AM +0200, Kevin Kofler via devel wrote:
>> >> I do not see how that is the common use case. Why would I want to
>> >> print from my telephone? I do not even normally print from my
>> >> notebook!
>> >
>> > I don't think it's controversial to say that one needs to print from
>> > whatever computing devices one uses.
>>
>> If I am sitting next to my printer, I have a desktop computer in front of
>> me
>> from which I can issue the print job, so why would I want to do it from a
>> notebook or smartphone?
>>
> Kevin.  No one is saying YOU want to print from your phone. However this
> software is not written just for you. Solomon and others do not write the
> software just for you but for the several million people who have to use
> printers in all different kinds of environments.

What I am objecting to is the assumption that all of those several million 
people will want to print from anything with a CPU ("whatever computing 
devices one uses") or that that is even the common case.

Of course, if all you have is a smartphone, then you will want to print from 
it. But that is not going to be the central use case for Fedora (even though 
it may be a niche use case for those running Fedora on the PinePhone ;-) ).

> For a good proportion of those people out there.. printing from the phone
> is an expected feature be it instagram memes or that pdf your department
> head sent out which is too small to read on the phone.

Sent out per e-mail? Then you fire up your desktop e-mail client (on your 
desktop or notebook) and print from there.

> So it is going to be something Solomon and others will focus on or they
> might as well scrap printing.

That is quite a strong wording.

Kevin Kofler
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Make btrfs the default file system for Fedora Cloud (System-Wide Change proposal)

2021-05-26 Thread Justin Forbes
On Tue, May 25, 2021 at 12:04 PM Ben Cotton  wrote:
>
> https://fedoraproject.org/wiki/Changes/FedoraCloudBtrfsByDefault
>
> == Summary ==
>
> For cloud installs of Fedora, we want to provide advanced file system
> features to users in a transparent fashion. Thus, we are changing the
> file system for the Cloud Edition to Btrfs so we can leverage its
> features and capabilities to improve the quality of experience for
> Cloud users.
>
> == Owners ==
>
> * Name: [[User:Davdunc|David Duncan]], [[User:Chrismurphy|Chris
> Murphy]], [[User:Josef|Josef Bacik]], [[User:Salimma|Michel Alexandre
> Salim]], [[User:Dcavalca|Davide Cavalca]], [[User:Ngompa|Neal Gompa]],
> [[User:Dustymabe|Dusty Mabe]], [[User:Malmond|Matthew Almond]]
> * Email: davd...@amazon.com, chrismur...@fedoraproject.org,
> jo...@toxicpanda.com, mic...@michel-slm.name, dcava...@fb.com,
> ngomp...@gmail.com, du...@dustymabe.com, malm...@fb.com
> * Products: Fedora Cloud Edition
> * Responsible WGs: Fedora Cloud WG
>
>
> == Detailed Description ==
>
> Fedora Cloud Edition will switch to using Btrfs for its images. The
> configuration for the Cloud Edition will match the setup used on the
> desktop variants, as this has been very well-tested with production
> deployments across multiple Fedora Linux releases now.
>
> This includes the same subvolume layout that is used on the desktop
> variants [[Changes/BtrfsByDefault|as introduced in Fedora Linux 33]],
> as well as transparent Zstd compression
> [[Changes/BtrfsTransparentCompression|as introduced in Fedora Linux
> 34]].
>
> == Feedback ==
>
> == Benefit to Fedora ==
>
> The benefits are similar to
> [[Changes/BtrfsByDefault#Benefit_to_Fedora|the ones for Fedora desktop
> variants]]; however, there are specific benefits for Fedora Cloud:
>
> * Adds support to Fedora Cloud for [[Changes/RPMCoW|the Change to
> introduce support for Copy-on-Write enhancements to improve
> performance to package management]]
> * Adds the ability to logically separate contents of the volume
> without dividing up the available space
> ** Transparent compression: significantly reduces write amplification
> and improves effective I/O throughput
> ** Reflinks and snapshots improve efficiency for use cases like
> containers (CRI-O, containerd, and Podman support both)
> * Storage devices can be flaky, resulting in data corruption; Btrfs
> can help mitigate this
> ** Everything is checksummed and verified on every read
> ** Corrupt data results in EIO (input/output error), instead of
> resulting in application confusion, and isn’t replicated into backups
> and archives
> * Improves system responsiveness under pressure
> ** Btrfs has been tested in production to have proper IO isolation
> capability via cgroups2
> ** Completes the resource control picture: memory, cpu, IO isolation
> * File system resize
> ** Online shrink and grow are cornerstones of the Btrfs design
> * Complex storage setups are… complicated
> ** Simple and comprehensive command interface. One master command
> ** Simpler to boot, all code is in the kernel, no initramfs complexities
> ** Simple and efficient file system replication, including incremental
> backups, with btrfs send and btrfs receive
>
> == Scope ==
>
> * Proposal owners:
> ** Submit PRs for Cloud Edition kickstarts to produce disk images using Btrfs.
> * Release engineering: [https://pagure.io/releng/issue/10129 #10129]
> * Policies and guidelines: N/A
> * Trademark approval: N/A
>
> == Upgrade/compatibility impact ==
>
> Change will not affect upgrades.
>
> == How To Test ==
>
> Once the change lands in Rawhide, spin up the images in AWS, GCP, and
> KVM/OpenStack to test to see systems boot and run.
>
> == User Experience ==
>
> * Mostly transparent.
> * Space savings and extend hardware life, via compression.
> * Utilities for used and free space are expected to behave the same.
> No special commands are required.
> * More detailed information can be revealed by btrfs
> specific commands.
> * cp command will create reflink copies
> [https://src.fedoraproject.org/rpms/coreutils/c/5d08d14b/ by default.]
>
> == Dependencies ==
>
> None.
>
> == Contingency Plan ==
>
> * Contingency mechanism: Owner will revert changes back to the
> previous ext4 configuration
> * Contingency deadline: Beta freeze
> * Blocks release? Yes
> * Blocks product? Cloud
>
> == Documentation ==
>
> Strictly speaking, no extra documentation is required reading for users.
>
> == Release Notes ==
>
> The default file system on the cloud is now Btrfs, following the
> desktop change in Fedora Linux 33. Fedora Server, IoT, and CoreOS are
> still specifically excluded.
>
>

Just for the formality, from a kernel standpoint, btrfs is treated
like it always has been.  The decision as to which default filesystem
any edition or spin chooses is entirely up to the SIG or spin
maintainer of that edition/spin.

Justin
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe sen

Re: f34 - llvm12 update

2021-05-26 Thread Tom Stellard

On 5/26/21 3:47 PM, Tom Stellard wrote:

On 5/14/21 5:20 AM, Serge Guelton wrote:

Hi folks,

we're preparing an update of the LLVM package from 12.0.0rc1 to 12.0.0.

In addition the package the llvm team maintain, the following packages needs a 
rebuild:

 annobin-0:9.65
 bindgen-0:0.57.0
 clazy-0:1.9
 doxygen-1:1.9.1
 gnome-builder-0:3.40.0
 mesa-dri-drivers-0:21.0.2
 mesa-libOSMesa-0:21.0.2
 mesa-vulkan-drivers-0:21.0.2
 postgresql-llvmjit-0:13.2
 qt-creator-0:4.14.1
 qt6-doctools-0:6.0.3
 qt6-linguist-0:6.0.3



There have been some more packages that rebuilt against 12.0.0rc1 since
this email, so the full list of packages that will be rebuilt against
llvm 12.0.0 is now:

annobin
bcc
bpftrace
castxml
clazy
cvise
doxygen
ghdl
gnome-builder
mesa
openshadinglanguage
postgresql
qt-creator
qt6-qttools
rust
rust-bindgen
scorep
spirv-llvm-translator



My mistake, I ran the query on rawhide instead of f34.  Here is
the real list:

annobin
clazy
doxygen
gnome-builder
mesa
pocl
postgresql
qt-creator
qt6-qttools
rust-bindgen
spirv-llvm-translator



-Tom



Once the llvm packaes are all rebuit, we will push these rebuilds in the 
side-tag f34-build-side-41029.

Feel free to contact sguel...@redhat.com and tstel...@redhat.com if you have any
question/remark.




___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Make btrfs the default file system for Fedora Cloud (System-Wide Change proposal)

2021-05-26 Thread Chris Murphy
On Wed, May 26, 2021 at 5:30 AM Peter Boy  wrote:
> > Am 26.05.2021 um 08:51 schrieb Chris Murphy :
> > What controversial discussion is being referenced? Currently before us
> > is a proposal to switch to Btrfs for Cloud edition.
>
> I’m quite sure you know that discussion. Part to it was Red Hat’s decision to 
> drop BTRFS in RHEL 8 (to my dismay, by the way, because I used it for some 
> file systems on our servers). And because there is that decision and that 
> discussion, I expect it will take a longer time to switch e.g. server to 
> BTRFS as system wide default. So my casual 10-year forecast is not an 
> overreaction as Neal put it (at most some pessimism).

I understand you think it will take longer. What I don't understand is
why you think this, but I guess we can just skip over that.

But let's keep the Red Hat aspect of the storyline in context though.
And not extrapolate beyond the available facts.
https://news.ycombinator.com/item?id=14907771

Whereupon Server SIG/WG perform an evaluation of Btrfs for their use
cases, and decide Btrfs should be the default in a compelling manner,
FESCo will approve it. And this plausibly could still happen for
Fedora 35, if folks really want it to happen. But I think it's neither
urgent nor requires a long delay. Server SIG can do anything they
want. Red Hat is doing the same.


> I think we have a misunderstanding here. My argument refers to expected 
> hurdles of a possible changeover process, not to technical features.

My opinion is to not worry about the process in advance of arriving at
the hurdle. You jump over the hurdle at the proper time. The vast
majority of the process is about technical features liabilities.

For example, I expect Server folks probably prefer LVM LV's for
backing virtual machines, rather than raw or qcow2 no matter the file
system. Even if this can be approximated by fallocate (raw and qcow2
support it, as as well as ext4, xfs, btrfs) to preallocate the backing
file, it's likely a lot of Server folks will just prefer using LVM for
this case. That's fine.

A good question is to what degree can Server edition, via Anaconda
kickstart, divvy up a drive in boolean fashion? I know there's some
thresholds like, if the drive is below a certain size, don't create
/home, and so on. Could Server default installations default to a ~20G
Btrfs system volume; and either leave the rest unallocated (not
partitioned)? Or make all remaining space an LVM PV, added to a single
VG? And then just not create any LVs? I think I'd like to see each:
unallocated, PV only, PV + VG, in Cockpit's UI and get some feedback
from those folks because it'd be ideal if the overview of the
initially installed system can clearly show the layout, whatever it
is.

Not often but sometimes folks ask "where has all the space gone?"
following a Server installation. They're not expecting or maybe not
discovering, that quite a lot is held in reserve in the VG.


> Again, it’s not about technical properties. We have (or probably had?) an 
> agreement to align (or try to align) Server Edition and Cloud. That was 2 or 
> 3 months ago. Regarding to that agreement, it is a step into the wrong 
> direction.

Is there a Server or Cloud meeting with minutes that this discussion
happened in? Or email thread you can point to?


--
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: f34 - llvm12 update

2021-05-26 Thread Tom Stellard

On 5/14/21 5:20 AM, Serge Guelton wrote:

Hi folks,

we're preparing an update of the LLVM package from 12.0.0rc1 to 12.0.0.

In addition the package the llvm team maintain, the following packages needs a 
rebuild:

 annobin-0:9.65
 bindgen-0:0.57.0
 clazy-0:1.9
 doxygen-1:1.9.1
 gnome-builder-0:3.40.0
 mesa-dri-drivers-0:21.0.2
 mesa-libOSMesa-0:21.0.2
 mesa-vulkan-drivers-0:21.0.2
 postgresql-llvmjit-0:13.2
 qt-creator-0:4.14.1
 qt6-doctools-0:6.0.3
 qt6-linguist-0:6.0.3



There have been some more packages that rebuilt against 12.0.0rc1 since
this email, so the full list of packages that will be rebuilt against
llvm 12.0.0 is now:

annobin
bcc
bpftrace
castxml
clazy
cvise
doxygen
ghdl
gnome-builder
mesa
openshadinglanguage
postgresql
qt-creator
qt6-qttools
rust
rust-bindgen
scorep
spirv-llvm-translator

-Tom



Once the llvm packaes are all rebuit, we will push these rebuilds in the 
side-tag f34-build-side-41029.

Feel free to contact sguel...@redhat.com and tstel...@redhat.com if you have any
question/remark.


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: [LEGAL] License field not match the content of eigen3-devel?

2021-05-26 Thread Richard Fontana
On Wed, May 26, 2021 at 3:23 PM Jiri Kucera  wrote:
>
> CC'ing Richard Fontana
>
> - Original Message -
> > From: "Jiri Kucera" 
> > To: "Development discussions related to Fedora" 
> > 
> > Sent: Wednesday, May 26, 2021 4:15:21 PM
> > Subject: [LEGAL] License field not match the content of eigen3-devel?
> >
> > Hello,
> >
> > I do some investigation of eigen3-devel package and found out that there are
> > some files distributed under the Minpack license:
> > - /usr/include/eigen3/unsupported/Eigen/src/LevenbergMarquardt/LMcovar.h
> > - /usr/include/eigen3/unsupported/Eigen/src/LevenbergMarquardt/LMonestep.h
> > - /usr/include/eigen3/unsupported/Eigen/src/LevenbergMarquardt/LMpar.h
> > - /usr/include/eigen3/unsupported/Eigen/src/LevenbergMarquardt/LMqrsolv.h
> > -
> > /usr/include/eigen3/unsupported/Eigen/src/LevenbergMarquardt/LevenbergMarquardt.h
> >
> > There is no "minpack" identifier in the License field inside the 
> > eigen3.spec.
> > However, Minpack license claims itself to be BSD-like.
> >
> > 1. Should minpack be added to the License field or it is covered by the BSD
> > license identifier?

First, I think Minpack is an acceptable license for Fedora (it's
similar to the old Apache Software License 1.1 but is somewhat more
permissive). As far as I can tell it is not on the current list of
Fedora "good" licenses
(https://fedoraproject.org/wiki/Licensing:Main#Good_Licenses). So I
believe the process is to post something to
le...@lists.fedoraproject.org.

Since these files are in the binary RPM I believe the spec file should
reflect that by adding "Minpack" and the file "COPYING.MINPACK" should
get installed as well.

Also cc'ing Jilayne Lovejoy who may be interested in this more from an
SPDX perspective - as far as I can tell Minpack is not represented in
the current SPDX list (as currently formulated Apache-1.1 would not be
a match). The perennial topic of whether SPDX-style license
identifiers should be used in Fedora RPM spec files has recently
resurfaced :-)

> > 2. Are we really need to ship files in the eigen3-devel packages that are
> > marked as unsupported?

If the answer to that is "no", then I don't think my answers to the
first question would be applicable.

Richard
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: When is pappl going to be good enough to replace cups?

2021-05-26 Thread PGNet Dev

On 5/26/21 4:47 PM, Solomon Peachy wrote:

But disabling mDNS altogether might cause undesired regerssions elsewhere.


Sure. Particularly if you don't set up your /etc/nsswitch.conf correctly.  
Hence the 'YMMV'.

In general, we assume zero-trust and avoid enabling auto-anything.  We add 
trust and loosen constraints, cautiously, when said 'regressions elsewhere' 
absolutely demand it.

Avoids the 'fun' of accidentally exposing a printer queue in the CEOs office ;-)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: When is pappl going to be good enough to replace cups?

2021-05-26 Thread Solomon Peachy
On Wed, May 26, 2021 at 04:41:27PM -0400, PGNet Dev wrote:
> On 5/26/21 4:28 PM, Björn Persson wrote:
> > > You have always had (and always will) have that choice; the ability to
> > > disable automatic printer discovery has been present since discovery was
> > > added with CUPS 1.2 (released back in 2006!)
> > 
> > I'll have to see if I can find that option. Thanks for the hint.
> 
> fyi, also useful,
> 
>   man cups-browsed
> 
> here, I
> 
>   systemctl disable cups-browsed
>   systemctl disable avahi-daemon
> 
> setup printers @ dhcp/dns explicitly, and avoid autodiscovery 'surprises' 
> altogether.

cups-browsed isn't enabled by default, FWIW.

But disabling mDNS altogether might cause undesired regerssions 
elsewhere.  If all you want to do is prevent CUPS from auto-discovering 
remote printers, edit /etc/cups/cupsd.conf and set 'Browsing Off'

 - Solomon
-- 
Solomon Peachypizza at shaftnet dot org (email&xmpp)
  @pizza:shaftnet dot org   (matrix)
High Springs, FL  speachy (freenode)


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: When is pappl going to be good enough to replace cups?

2021-05-26 Thread PGNet Dev

On 5/26/21 4:28 PM, Björn Persson wrote:

You have always had (and always will) have that choice; the ability to
disable automatic printer discovery has been present since discovery was
added with CUPS 1.2 (released back in 2006!)


I'll have to see if I can find that option. Thanks for the hint.


fyi, also useful,

  man cups-browsed

here, I

  systemctl disable cups-browsed
  systemctl disable avahi-daemon

setup printers @ dhcp/dns explicitly, and avoid autodiscovery 'surprises' 
altogether.

ymmv.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: When is pappl going to be good enough to replace cups?

2021-05-26 Thread Björn Persson
Solomon Peachy wrote:
> On Wed, May 26, 2021 at 08:15:46PM +0200, Björn Persson wrote:
> > And I always try to avoid using protocols that assume that the local
> > link is secure. That's one of the reasons why my printer is connected by
> > USB, and I would like to continue to have that choice.  
> 
> You have always had (and always will) have that choice; the ability to 
> disable automatic printer discovery has been present since discovery was 
> added with CUPS 1.2 (released back in 2006!)

I'll have to see if I can find that option. Thanks for the hint.

Björn Persson


pgpLUW8ag8A8D.pgp
Description: OpenPGP digital signatur
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: [LEGAL] License field not match the content of eigen3-devel?

2021-05-26 Thread Jiri Kucera
CC'ing Richard Fontana

- Original Message -
> From: "Jiri Kucera" 
> To: "Development discussions related to Fedora" 
> 
> Sent: Wednesday, May 26, 2021 4:15:21 PM
> Subject: [LEGAL] License field not match the content of eigen3-devel?
> 
> Hello,
> 
> I do some investigation of eigen3-devel package and found out that there are
> some files distributed under the Minpack license:
> - /usr/include/eigen3/unsupported/Eigen/src/LevenbergMarquardt/LMcovar.h
> - /usr/include/eigen3/unsupported/Eigen/src/LevenbergMarquardt/LMonestep.h
> - /usr/include/eigen3/unsupported/Eigen/src/LevenbergMarquardt/LMpar.h
> - /usr/include/eigen3/unsupported/Eigen/src/LevenbergMarquardt/LMqrsolv.h
> -
> /usr/include/eigen3/unsupported/Eigen/src/LevenbergMarquardt/LevenbergMarquardt.h
> 
> There is no "minpack" identifier in the License field inside the eigen3.spec.
> However, Minpack license claims itself to be BSD-like.
> 
> 1. Should minpack be added to the License field or it is covered by the BSD
> license identifier?
> 2. Are we really need to ship files in the eigen3-devel packages that are
> marked as unsupported?
> 
> Regards,
> Jiri
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it:
> https://pagure.io/fedora-infrastructure
> 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: When is pappl going to be good enough to replace cups?

2021-05-26 Thread Solomon Peachy
On Wed, May 26, 2021 at 08:15:46PM +0200, Björn Persson wrote:
> And I always try to avoid using protocols that assume that the local
> link is secure. That's one of the reasons why my printer is connected by
> USB, and I would like to continue to have that choice.

You have always had (and always will) have that choice; the ability to 
disable automatic printer discovery has been present since discovery was 
added with CUPS 1.2 (released back in 2006!)

But there is no way to tell from a stock OS print dialog if a given 
printer identifier is local, remote, "secure", "hostile" or whatever.  
There never has been, and I don't think there ever can be.

You want secure printing?  Put the document you want to print onto a USB 
stick, and plug it into an airgapped printer that is in a 
controlled-access room.  Even that's not necessarily sufficient, but 
anything _less_ than that is clearly insecure and inherently untrustable.

 - Solomon
-- 
Solomon Peachypizza at shaftnet dot org (email&xmpp)
  @pizza:shaftnet dot org   (matrix)
High Springs, FL  speachy (freenode)


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: When is pappl going to be good enough to replace cups?

2021-05-26 Thread Björn Persson
Stephen John Smoogen wrote:
> The truth is that most people know about it, and have decided that they can
> go 'meh' and keep living.

I am well aware that most people don't think for a second about computer
security. I see examples every day. They tend to begin caring after they
find out that they personally have been owned.

So your argument is that programs should be written insecurely to make
the few who care as insecure as the majority? I shouldn't even have the
option to care about security? Otherwise I don't see how what you wrote
is an argument in this debate.

> Instead IPP, LPD and other
> print protocols have always been written with the assumption that the local
> network is some level of secure.

And I always try to avoid using protocols that assume that the local
link is secure. That's one of the reasons why my printer is connected by
USB, and I would like to continue to have that choice.

Björn Persson


pgp2GJIq_HFQB.pgp
Description: OpenPGP digital signatur
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: When is pappl going to be good enough to replace cups?

2021-05-26 Thread Björn Persson
Solomon Peachy wrote:
> Those that do appear show up as "queuename at host" or 
> "mfg_model_hostname"

I can trust that they always contain either the string " at " or two
underscores? Or is that just what well-behaved printers do, while an
attacker can name their fake printer however they want?

> (for native IPP printers, there's usually a partial 
> MAC address in there by default too)

Security has no use for "usually".

> Queues you create 
> manually/permanently can be called whatever you want and point wherever 
> you want.

So if I see a print queue whose name contains neither the word "at" nor
any underscores, is that a guarantee that it's a manually configured
queue? In that case I may be able to keep my configured queue and know
that I'm sending to my USB printer (or, I guess, redo the configuration
when I'm forced to wrap a web server around the USB printer). But the
existence of two different naming schemes makes me suspect that there
is no such guarantee.

I thought for a while that I could configure an unguessable queue name
to let me distinguish between my own print queue and the attacker's, but
that won't work. A DNS rebinding attack would let the attacker read the
queue name from CUPS' web interface, so I can't rely on the queue name
being secret.

> CUPS's auto-discovery mechanisms have _always_ assumed the 
> local network can be trusted.

You mean CUPS _already_ allows an attacker on the local link to
impersonate my USB printer, even before it starts wrapping web servers
around USB printers? That's disappointing, but at this point I'm quite
ready to believe it.

> Sure, someone could be spoofing a specific printer name/identifier just 
> so they can capture a document *you* want to print, but if there's that 
> level of persistant hostile presence on your local network, you're 
> already completly screwed.

I would be if I would use insecure protocols on that network – but I
stopped using Telnet, SMB and FTP at home decades ago.

Björn Persson


pgpeiVdE4m7Yl.pgp
Description: OpenPGP digital signatur
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: fail2ban: need selinux help!

2021-05-26 Thread Zdenek Pytela
On Tue, May 25, 2021 at 2:01 PM Richard Shaw  wrote:

> Due to a change in SELinux for Fedora 34 (I can't find the link right
> now), the policy for fail2ban needs to be updated[1] but the changes are a
> little bit beyond my understanding of SELinux.
>
> Any help or pointers from an expert?
>
Hi Robert,

There were a set of changes [1] adding new SELinux permissions in F34.
Fail2ban uses its own selinux policy which overrides the one distributed in
the selinux-policy package, so it needs to be addressed in the component. I
am helping with that [2]. I will take a look at those new bzs and suggest
additional changes, probably close some of them as dups.

[1]
https://fedoraproject.org/wiki/SELinux/Changes/Make_selinux_policy_uptodate_with_current_kernel
[2] https://bugzilla.redhat.com/show_bug.cgi?id=1943696


> Thanks,
> Richard
>
> [1] https://bugzilla.redhat.com/show_bug.cgi?id=1953321
> https://bugzilla.redhat.com/show_bug.cgi?id=1953322
> https://bugzilla.redhat.com/show_bug.cgi?id=1953323
> https://bugzilla.redhat.com/show_bug.cgi?id=1953324
> https://bugzilla.redhat.com/show_bug.cgi?id=1953325
> https://bugzilla.redhat.com/show_bug.cgi?id=1943696
>
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it:
> https://pagure.io/fedora-infrastructure
>


-- 

Zdenek Pytela
Security SELinux team
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[LEGAL] License field not match the content of eigen3-devel?

2021-05-26 Thread Jiri Kucera
Hello,

I do some investigation of eigen3-devel package and found out that there are 
some files distributed under the Minpack license:
- /usr/include/eigen3/unsupported/Eigen/src/LevenbergMarquardt/LMcovar.h
- /usr/include/eigen3/unsupported/Eigen/src/LevenbergMarquardt/LMonestep.h
- /usr/include/eigen3/unsupported/Eigen/src/LevenbergMarquardt/LMpar.h
- /usr/include/eigen3/unsupported/Eigen/src/LevenbergMarquardt/LMqrsolv.h
- 
/usr/include/eigen3/unsupported/Eigen/src/LevenbergMarquardt/LevenbergMarquardt.h

There is no "minpack" identifier in the License field inside the eigen3.spec. 
However, Minpack license claims itself to be BSD-like.

1. Should minpack be added to the License field or it is covered by the BSD 
license identifier?
2. Are we really need to ship files in the eigen3-devel packages that are 
marked as unsupported?

Regards,
Jiri
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Automation/gating for handling soname bumps? (was Re: Unannounced soname bump: libgta)

2021-05-26 Thread Zbigniew Jędrzejewski-Szmek
On Wed, May 26, 2021 at 05:44:28AM -0400, Jiri Kucera wrote:
> - Original Message -
> > From: "Richard Shaw" 
> > To: "Development discussions related to Fedora" 
> > 
> > Sent: Thursday, May 20, 2021 2:06:34 PM
> > Subject: Unannounced soname bump: libgta
> > 
> > Looks like a long standing FTBFS was finally fixed, after previous version
> > update attempts failed and the soname bump (0->1) went unnoticed.
> 
> My apologies for breaking the rawhide. Do we have some gating/automation that 
> keeps new builds gated and additionally rebuilds dependent packages whenever 
> the soname change is detected?

Yes, we do: OpenQA gating for critpath packages. For other packages,
we have advisory tests (iiuc current state correctly).

We also have guidelines to detect so bumps at build time:
https://docs.fedoraproject.org/en-US/packaging-guidelines/#_listing_shared_library_files

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: When is pappl going to be good enough to replace cups?

2021-05-26 Thread Robert Marcano via devel

On 5/26/21 7:05 AM, Zdenek Dohnal wrote:

Hi Robert,

On 5/24/21 2:39 PM, Robert Marcano via devel wrote:

On 5/24/21 3:29 AM, Zdenek Dohnal wrote:


Devices which currently depend on a deprecated functionality -
printer drivers and raw queues - will need a printer application once
the deprecated functionality is removed from CUPS. This application
will advertise the device on localhost via MDNS protocol and will
communicate with CUPS via IPP, both public well-known protocols. The
only place where the data can turn into proprietary is filtering, but
it's the same with printer drivers.

--


Greetings, Is there any plan to support these IPP printer applications
over Unix domain sockets?


pappl supports listening on domain sockets (IIUC the docs
https://www.msweet.org/pappl/pappl.html), so if a printer application
decides on it will use domain sockets, it is possible.


Thanks for the information. Last time I saw some reluctance from CUPS 
maintainers (before the fork) to add domain sockets support for IPP, 
that was the reason I asked. If pappl can do it now I presume CUPS will 
be able to use these printers.






I manage a virtual printer that uses CUPS filters and backends to
capture documents to an application database. We have been using CUPS
authentication features to control who can use the printer, and not to
have to reimplement authentication on the filter and backends. With
network bound IPP applications, anyone on the same multiuser machine
would be able to bypass CUPS and send documents directly unless I
duplicate CUPS authentication functionality. Unix sockets would help
with that,
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it:
https://pagure.io/fedora-infrastructure



___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


PyPy license correction (wrt bundled libraries)

2021-05-26 Thread Miro Hrončok

pypy and pypy3 license metadata have been corrected from:

  MIT and Python and UCD

to:

  MIT and Python and UCD and BSD and (ASL 2.0 or BSD)

# PyPy is MIT
# Python standard library is Python
# pypy/module/unicodedata is UCD
# Bundled pycparser is is BSD
# Bundled pycparser.ply is BSD
# Bundled bits from cryptography are ASL 2.0 or BSD

The mising bundled() provides have been added.

--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Make btrfs the default file system for Fedora Cloud (System-Wide Change proposal)

2021-05-26 Thread Peter Boy


> Am 26.05.2021 um 08:51 schrieb Chris Murphy :
> 
> On Tue, May 25, 2021 at 5:52 PM Peter Boy  wrote:
>> 
>> 
>>> Am 25.05.2021 um 23:20 schrieb Neal Gompa :
>>> Cloud images never had such separation. It was always one big ext4
>>> partition. With Btrfs, we can introduce subvolumes so user data can be
>>> trivially managed separately without losing the benefits of a single
>>> pool of storage.
>> 
>> That’s the difference: As a server sysadmin I would rather consider 
>> potential risks of a single pool of storage.   :-)
> 
> OK, let's consider 2-3 potential risks.
> 
> Hard drive mechanical failure (spindle, motor, actuator, rw head), no
> matter what file system and partitioning you use, you are out of luck.
> ...
> 
> What are the potential risks you are concerned about in the cloud and
> server use cases? Please be specific.

That sounds very promising. 

But I wanted to emphasize something else: The criteria and the point of view 
are different. For logical reasons, an argument from one context has no 
assertiveness in the other context.
The same detail is evaluated differently in a different context. 


>> What I get from the controversial discussion about BTRFS is that there is 
>> doubt about how really clean that "cleanly isolate" is, at least compared to 
>> LVM. But if important data is (supposed to be) on additional external 
>> storage, that's perfect.
> 
> What controversial discussion is being referenced? Currently before us
> is a proposal to switch to Btrfs for Cloud edition.

I’m quite sure you know that discussion. Part to it was Red Hat’s decision to 
drop BTRFS in RHEL 8 (to my dismay, by the way, because I used it for some file 
systems on our servers). And because there is that decision and that 
discussion, I expect it will take a longer time to switch e.g. server to BTRFS 
as system wide default. So my casual 10-year forecast is not an overreaction as 
Neal put it (at most some pessimism).  

I think we have a misunderstanding here. My argument refers to expected hurdles 
of a possible changeover process, not to technical features.


>> Regarding that idea, the switch to BTRFS tends to be a step in the wrong 
>> direction.
> 
> Cloud and Server editions have had different file system and
> partitioning strategies since day 1. Today is the first I've heard
> that there should be, could be, would be, some kind of realignment
> where Cloud uses LVM or Server uses ext4, or some other combination.
> But you are now asserting that this alignment should happen? And are
> you asserting that this is a central question needing an answer as a
> prerequisite for evaluating this Fedora 35 change proposal?


Again, it’s not about technical properties. We have (or probably had?) an 
agreement to align (or try to align) Server Edition and Cloud. That was 2 or 3 
months ago. Regarding to that agreement, it is a step into the wrong direction.

But maybe in the meantime we had another trend coming up. Neal came up with 
some arguments about a general difference between both so an alignment is seen 
as not possible or not useful.

I’m not a stakeholder for any decision about that. And I have no intention of 
missionizing for any of the options. I’m just the bookkeeper and try to ensure 
that nothing is forgotten and everything follows a solid and consistent logic. 
And because I am not a native English speaker, some wording may be misleading, 
much to my chagrin.

So we may drop it from the table. I’ve put it on the agenda of todays Server 
IRC meeting.


Best
Peter
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: When is pappl going to be good enough to replace cups?

2021-05-26 Thread Zdenek Dohnal
Hi Robert,

On 5/24/21 2:39 PM, Robert Marcano via devel wrote:
> On 5/24/21 3:29 AM, Zdenek Dohnal wrote:
>>
>> Devices which currently depend on a deprecated functionality -
>> printer drivers and raw queues - will need a printer application once
>> the deprecated functionality is removed from CUPS. This application
>> will advertise the device on localhost via MDNS protocol and will
>> communicate with CUPS via IPP, both public well-known protocols. The
>> only place where the data can turn into proprietary is filtering, but
>> it's the same with printer drivers.
>>
>> -- 
>
> Greetings, Is there any plan to support these IPP printer applications
> over Unix domain sockets?

pappl supports listening on domain sockets (IIUC the docs
https://www.msweet.org/pappl/pappl.html), so if a printer application
decides on it will use domain sockets, it is possible.

>
> I manage a virtual printer that uses CUPS filters and backends to
> capture documents to an application database. We have been using CUPS
> authentication features to control who can use the printer, and not to
> have to reimplement authentication on the filter and backends. With
> network bound IPP applications, anyone on the same multiuser machine
> would be able to bypass CUPS and send documents directly unless I
> duplicate CUPS authentication functionality. Unix sockets would help
> with that,
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it:
> https://pagure.io/fedora-infrastructure

-- 
Zdenek Dohnal
Software Engineer
Red Hat Czech - Brno TPB-C




OpenPGP_signature
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: When is pappl going to be good enough to replace cups?

2021-05-26 Thread Zdenek Dohnal
Hi Przemek,

thank you for trying the driverless and the investigation!

Would you mind checking if the similar bug isn't already reported on
Avahi in Fedora and reporting it if not? Maybe Avahi maintainers can
point out what is the best for debugging Avahi.

I recommend setting debug logging on avahi-daemon service file, maybe
its logs will show something more.

On 5/25/21 8:20 PM, przemek klosowski via devel wrote:
>
> There are so many moving pieces here that it's hard to get a handle on
> this. I had trouble seeing local network printers so I tried following
> the advice Zdenek published [1], but I ran into a nest of issues:
> printing depending on avahi, which fails quietly and is hard to debug.
>
> Specifically, I did  *avahi-browse -avrt*  which just returns with
> avahi_service_browser_new() failed: Invalid service type
>
> This seems to be related to a bug where some devices are sending
> non-compliant data to avahi: 
> https://github.com/lathiat/avahi/issues/212 but we're already far away
> from the print subsystem.. I tried running avahi-browser under gdb but
> between the missing and not-autoloading debuginfo packages, and the
> callback-style structure, I wasn't able to catch it receiving the data
> that causes the problem.
>
> I guess my point here is that we have a complex, interdependent
> system, and when it fails, it is fairly opaque. At this point I am not
> sure what to do: is the root cause here the avahi bug? I am willing to
> spend the effort getting to the bottom of it but I can't figure out
> where to start.
>
IIUC the upstream issue, the core of the problem is that something in
your local network sends a broken PTR record which avahi cannot cope
with and it breaks avahi-browse in whole LAN...
>
>
>
>> On 5/24/21 1:42 PM, Stephen John Smoogen wrote:
>>> I have had very bad luck in setting up new network printers over the
>>> last 4 years. I can get all of them to print from Windows and Mac,
>>> but every one of them from HP, Brother, and some other brands could
>>> not print anything from Linux. They were all 'Linux ready' but were
>>> doing it via either Google Print or a set of proprietary software
>>> blobs to be put on the computer. [They even came with ipp filters
>>> but they called the blobs]. I have a Brother MFC-27100W in my office
>>> which I print to via my wife's Mac because of this.
>>>  
>>
>> I have written some basic info about how to find out whether your
>> printer supports driverless [1] and how to setup it [2]. If you have
>> at least F33 and have the device in your LAN, you can use temp queues
>> for sure, otherwise you need to create a permanent queue via lpadmin:
>>
>> $ lpadmin -p  -v  -m
>> everywhere -E
>>
>>
>> If you still experience the issue, do feel free to file a bug for
>> cups in bugzilla and I can look into it further.
>>
>>
>> [1]
>> https://fedoraproject.org/wiki/How_to_debug_printing_problems#How_to_find_out_whether_my_printer_is_capable_of_driverless_printing.3F
>>
>> [2]
>> https://fedoraproject.org/wiki/How_to_debug_printing_problems#How_to_setup_CUPS_temporary_queues_with_network_printer
>>
>>
>
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it: 
> https://pagure.io/fedora-infrastructure

-- 
Zdenek Dohnal
Software Engineer
Red Hat Czech - Brno TPB-C



OpenPGP_signature
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Automation/gating for handling soname bumps? (was Re: Unannounced soname bump: libgta)

2021-05-26 Thread Jiri Kucera
- Original Message -
> From: "Richard Shaw" 
> To: "Development discussions related to Fedora" 
> 
> Sent: Thursday, May 20, 2021 2:06:34 PM
> Subject: Unannounced soname bump: libgta
> 
> Looks like a long standing FTBFS was finally fixed, after previous version
> update attempts failed and the soname bump (0->1) went unnoticed.

My apologies for breaking the rawhide. Do we have some gating/automation that 
keeps new builds gated and additionally rebuilds dependent packages whenever 
the soname change is detected?

Regards and have a nice day,
Jiri

 
> https://src.fedoraproject.org/rpms/libgta/commits/rawhide
> 
> Looks like only two packages need rebuilding:
> gdal
> OpenSceneGraph
> 
> I'll go ahead and kick off builds.
> 
> Thanks,
> Richard
> 
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it:
> https://pagure.io/fedora-infrastructure
> 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Let's retire original glib and gtk+

2021-05-26 Thread Peter Robinson
On Tue, May 25, 2021 at 11:01 PM Michael Catanzaro  wrote:
>
> On Sat, May 22 2021 at 09:23:23 AM +1000, Bob Hepple
>  wrote:
> > I have no idea how significant this might be, but perhaps this should
> > be discussed more publicly.
>
> Use containers? Ship your own glib as a static lib? I'm impressed you
> have software that still needs it tbh.

I think copr is the perfect place for these sort of things for those
that care enough.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: The future of legacy BIOS support in Fedora.

2021-05-26 Thread L Five
> On Saturday, July 4, 2020 6:44:55 AM MST Solomon Peachy wrote:
> 
> There are still new systems built today that only support BIOS, and vendors 
> providing systems factory-configured for BIOS boot on hardware that does 
> support UEFI. There is no 2TB upper limit on drive sizes as a result of 
> booting from BIOS.
> 
> 
> 
> I don't know where you got this, but that's completely false. You can use GPT 
> partition tables on systems with BIOS boot. Whoever told you otherwise is 
> misinformed at best.
> 
> 
> Why do you "despise" BIOS boot?
> 
> 
> I highly doubt that, but time will tell.
> 
> 
> That's absolutely false, as demonstrated elsewhere in this thread. Pretending 
> otherwise is delusional, and delusions are no basis for technical decisions.
As Mr Poettering noted earlier and quite correctly, JMH junior ought to grow up.

Harris junior is not to be taken seriously.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Let's retire original glib and gtk+

2021-05-26 Thread Paul Howarth
On Tue, 25 May 2021 17:00:31 -0500
Michael Catanzaro  wrote:

> On Sat, May 22 2021 at 09:23:23 AM +1000, Bob Hepple 
>  wrote:
> > I have no idea how significant this might be, but perhaps this
> > should be discussed more publicly.  
> 
> Use containers? Ship your own glib as a static lib? I'm impressed you 
> have software that still needs it tbh.
> 
> Anyway, there have been no other objections, and there's been no 
> comment from the package owner, so I wonder if any provenpackagers 
> would be willing to do the glib package retirement?

I'm the package owner and I'm prepared to retire glib/gtk+ once there
are no further dependencies on them in Fedora.

Paul,
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Cloud-33-20210526.0 compose check report

2021-05-26 Thread Fedora compose checker
No missing expected images.

Soft failed openQA tests: 1/8 (x86_64), 1/8 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Cloud-33-20210525.0):

ID: 894666  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/894666
ID: 894673  Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/894673

Passed openQA tests: 7/8 (x86_64), 7/8 (aarch64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Linux 32 End Of Life

2021-05-26 Thread Dominik 'Rathann' Mierzejewski
On Wednesday, 26 May 2021 at 00:23, Mohan Boddu wrote:
> On Tue, May 25, 2021 at 5:12 PM Dominik 'Rathann' Mierzejewski
>  wrote:
> >
> > On Tuesday, 25 May 2021 at 23:06, Mohan Boddu wrote:
> > > Hello all,
> > >
> > > As of the 25th of May 2021, Fedora Linux 32 has reached its end of
> > > life for updates and support. No further updates, including security
> > > updates, will be available for Fedora 32. All the updates that are
> > > currently in testing won't get pushed to stable.
> >
> > What about updates that were in "submitted to stable" state? Don't they
> > deserve the final push? I'm talking about this one in particular:
> > https://bodhi.fedoraproject.org/updates/FEDORA-2021-5f3479aaf3
> > It waited to be pushed to stable for 17 hours only to be made obsolete
> > at the last step. It doesn't seem fair to me.
> 
> I understand the problem here, but we push updates once a day and
> today's push is already finished. The problem with running another
> push just before starting the EOL process is that update pushes take
> some time and we cannot start the EOL process until they are finished
> and the push might fail which delays the EOL process even further. EOL
> process takes some time and we cannot delay it to the next day and
> also even when going through the EOL process, updates can go to stable
> and we cannot simply keep pushing them.
> 
> Sorry for the trouble this has caused, but I am not sure if there is
> an easy way to fix this issue.

Announcing that "updates must be submitted to stable before May 24th
12:00 UTC[1] to be included in the last stable push" would suffice for me.
Sending such a reminder a week before the deadline and a second one 24h
before the deadline would be really great.

[1] I haven't checked what the actual cut-off time is.

Regards,
Dominik
-- 
Fedora   https://getfedora.org  |  RPM Fusion  http://rpmfusion.org
There should be a science of discontent. People need hard times and
oppression to develop psychic muscles.
-- from "Collected Sayings of Muad'Dib" by the Princess Irulan
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure