[EPEL-devel] Fedora EPEL 8 updates-testing report

2021-06-20 Thread updates
The following Fedora EPEL 8 Security updates need testing:
 Age  URL
   8  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-a6e2c9bc8c   
radare2-5.3.1-1.el8
   6  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-0209079fce   
aom-3.1.1-1.el8


The following builds have been pushed to Fedora EPEL 8 updates-testing

dmlite-1.15.0-4.el8

Details about builds:



 dmlite-1.15.0-4.el8 (FEDORA-EPEL-2021-351c441d6a)
 Lcgdm grid data management and storage framework

Update Information:

Synchonize version for all supported os versions    Update DOME API
documentation    Add fix for puppet TokenId configuration    * bugfixes:
LCGDM-2965, LCGDM-2967, LCGDM-2971, LCGDM-2972, LCGDM-2973, LCGDM-2974,
LCGDM-2975  ---  * compatibility: dpm-tester.py LCGDM-2958 and reverted head to
disknode token configuration LCGDM-2961    * bufix LCGDM-2967 * improvements
in build dependencies    * bugfixes LCGDM-2958, LCGDM-2961, LCGDM-2963,
LCGDM-2964, OOB reads * improvements LCGDM-2943, LCGDM-2959, LCGDM-2962, davs
speed    * bugfix update for LCGDM-2953 * dropped update for IAM group
normalization LCGDM-2950    * bugfixes LCGDM-2948, LCGDM-2949, LCGDM-2950,
LCGDM-2954, LCGDM-2955, LCGDM-2957    * bugfixes LCGDM-2940, LCGDM-2941,
LCGDM-2945, LCGDM-2946, LCGDM-2951 * xrootd plugin library versions
configuration cleanup (requires xrootd config file update / puppet run)   
* compatibility: dpm-tester.py LCGDM-2958 and reverted head to disknode token
configuration LCGDM-2961    * bufix LCGDM-2967 * improvements in build
dependencies    * bugfixes LCGDM-2958, LCGDM-2961, LCGDM-2963, LCGDM-2964,
OOB reads * improvements LCGDM-2943, LCGDM-2959, LCGDM-2962, davs speed    *
bugfix update for LCGDM-2953 * dropped update for IAM group normalization
LCGDM-2950    * bugfixes LCGDM-2948, LCGDM-2949, LCGDM-2950, LCGDM-2954,
LCGDM-2955, LCGDM-2957    * bugfixes LCGDM-2940, LCGDM-2941, LCGDM-2945,
LCGDM-2946, LCGDM-2951 * xrootd plugin library versions configuration cleanup
(requires xrootd config file update / puppet run)     Initial packages for
CentOS8 (testing CentOS8/EPEL8 dependencies)

ChangeLog:



___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Neal Gompa
On Sun, Jun 20, 2021 at 7:19 PM Zbigniew Jędrzejewski-Szmek
 wrote:
>
> On Sun, Jun 20, 2021 at 08:37:03AM -0500, Michael Catanzaro wrote:
> > On Sun, Jun 20 2021 at 07:29:16 AM -0400, Neal Gompa
> >  wrote:
> > >Most of our rules are designed to make sure there's someone ultimately
> > >responsible for everything going into Fedora. Unfortunately, bots are
> > >the opposite of that, because there's no one to reach to stop bad
> > >behavior when it happens.
>
> > Hm, this seems pretty simple to solve though, right? Allow bots to
> > submit updates on behalf of packagers, but not with their own bot
> > FAS accounts.
>
> Let's not throw out the baby with the bath water.
>
> A human *is* responsible and known. When a bot account is given
> permission, we make sure that there's a known human behind the account.
> Things are no other in this particular case, see the original ticket [1].
>
> Actually, if the bot were using their human's account, things would be *less*
> transparent. By using a separate account, we are making it clear that
> this update stream is made by this particular bot (as opposed to e.g.
> some human occasionally using a script to release some updates).
>
> [1] https://pagure.io/fesco/issue/2228
>

I wish our new FAS implementation gave us the ability to generate
delegate/service accounts associated with a primary account. That way,
we have a clear record of a human owning it, and when that human's
account is known to no longer be active, the bot breaks with it.

> > This would be like how GNOME package updates currently
> > work, where a bot does the hard work but a human is ultimately
> > responsible (and subscribed to each bodhi update, so feedback will
> > at least not be completely missed).
>
> The line can be a big hazy, but I'd say that if:
> - a human is just using a script or even a some program to fire off
>   the update — this particular person's account must be used.
> - some bot prepares the update, but a human still need to make the final
>   step and may or may not publish the update: probably better to do it
>   using this person's account.
> - the bot is set up once and then keeps releasing updating until stopped,
>   and may be managed by multiple people — a separate bot account is 
> preferable.
>

The problem is that this whole thing works off the premise that
Rawhide is a dumping ground. It is not. It also works off the premise
that nobody cares about the stuff being pushed into Dist-Git, Koji,
and to users. And frankly, that has not been true for a *very* long
time, if it ever was.




--
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Unretiring coffee-script

2021-06-20 Thread Sérgio Basto
On Fri, 2021-06-18 at 16:37 +0100, Sérgio Basto wrote:
> On Fri, 2021-06-18 at 17:05 +0200, Vít Ondruch wrote:
> > Hi,
> > 
> > coffee-script package was recently retired due to being orphaned and 
> > FTBFS for some while. Since there are some other packages depending
> > on 
> > it, I have decided to unretire it [1]. I have working package ready
> > (at
> > since F29):
> > 
> > https://koji.fedoraproject.org/koji/taskinfo?taskID=70366160
> > 
> > Is here anybody, who would will to help with maintenance of this
> > package?
> 
> 
> In the last few days I tried to keep the package. 
> Updating from 1.10.0 to 2.5.1 build fails with "Error: Cannot find
> module 'jison'" but jison is retired since 2019-05 (1) so I guest it
> will be hard .  
> 
> 
> (1)
> https://src.fedoraproject.org/rpms/nodejs-jison
> > 

this weekend I played with nodejs-packaging-bundler and I could build
nodejs-jison and coffeescript 2.5.1 on copr (2) , the specs are here
(3) and (4) 

Best regards, 

(2)
https://copr.fedorainfracloud.org/coprs/sergiomb/nodejs/builds/

(3)
https://src.fedoraproject.org/fork/sergiomb/rpms/nodejs-jison/commits/f30
https://src.fedoraproject.org/fork/sergiomb/rpms/nodejs-jison/tree/f30


(4)
https://src.fedoraproject.org/fork/sergiomb/rpms/coffee-script/commits/rawhide

> > Thx
> > 
> > 
> > Vít
> > 
> > 
> > 
> > [1] https://pagure.io/releng/issue/10172
> > ___
> > devel mailing list -- devel@lists.fedoraproject.org
> > To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> > Fedora Code of Conduct: 
> > https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > List Guidelines: 
> > https://fedoraproject.org/wiki/Mailing_list_guidelines
> > List Archives: 
> > https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> > Do not reply to spam on the list, report it: 
> > https://pagure.io/fedora-infrastructure
> 

-- 
Sérgio M. B.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Forbidden to download EPEL packages?

2021-06-20 Thread Sérgio Basto

On Sun, 2021-06-20 at 17:24 -0500, Ron Olson wrote:
> Hey all-
> 
> I’m trying to run a mock build with EPEL-8 (epel-8-x86_64) and it fails
> with:
> 

https://mirrors.fedoraproject.org/mirrorlist?repo=epel-8=x86_64
is working for me 

mock -r epel-8-x86_64  --install kernel-headers also works for me 

mock -r epel-8-x86_64 --debug-config 

config_opts['dnf.conf'] = ('\n'
'[main]\n'
'keepcache=1\n'
'debuglevel=2\n'
'reposdir=/dev/null\n'
'logfile=/var/log/yum.log\n'
'retries=20\n'
'obsoletes=1\n'
'gpgcheck=0\n'
'assumeyes=1\n'
'syslog_ident=mock\n'
'syslog_device=\n'
'metadata_expire=0\n'
'mdpolicy=group:primary\n'
'best=1\n'
'protected_packages=\n'
'module_platform_id=platform:el8\n'
'user_agent={{ user_agent }}\n'
'\n'
'[baseos]\n'
'name=CentOS-$releasever - Base\n'
'mirrorlist=http://mirrorlist.centos.org/?release=8=$basearch=BaseOS=$infra\n'
'failovermethod=priority\n'
'gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-
CentOS-Official\n'
'gpgcheck=1\n'
'skip_if_unavailable=False\n'
'\n'
'[appstream]\n'
'name=CentOS-$releasever - AppStream\n'
'mirrorlist=http://mirrorlist.centos.org/?release=8=$basearch=AppStream=$infra\n'
'#baseurl=http://mirror.centos.org/centos/$releasever/AppStream/$basearch/os/\n'
'gpgcheck=1\n'
'gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-
CentOS-Official\n'
'\n'
'[powertools]\n'
'name=CentOS-$releasever - PowerTools\n'
'mirrorlist=http://mirrorlist.centos.org/?release=8=$basearch=PowerTools=$infra\n'
'#baseurl=http://mirror.centos.org/centos/$releasever/PowerTools/$basearch/os/\n'
'gpgcheck=1\n'
'gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-
CentOS-Official\n'
'\n'
'[devel]\n'
'name=CentOS-$releasever - Devel WARNING! FOR BUILDROOT USE ONLY!\n'
'mirrorlist=http://mirrorlist.centos.org/?release=$releasever=$basearch=Devel=$infra\n'
'#baseurl=http://mirror.centos.org/$contentdir/$releasever/Devel/$basearch/os/\n'
'gpgcheck=1\n'
'enabled=0\n'
'gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-
CentOS-Official\n'
'\n'
'[plus]\n'
'name=CentOS-$releasever - Plus\n'
'mirrorlist=http://mirrorlist.centos.org/?release=8=$basearch=centosplus=$infra\n'
'#baseurl=http://mirror.centos.org/centos/$releasever/centosplus/$basearch/os/\n'
'gpgcheck=1\n'
'enabled=0\n'
'gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-
CentOS-Official\n'
'\n'
'[cr]\n'
'name=CentOS-$releasever - cr\n'
'baseurl=http://mirror.centos.org/centos/8/cr/$basearch/os/\n'
'gpgcheck=1\n'
'enabled=0\n'
'gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-
CentOS-Official\n'
'\n'
'[debuginfo]\n'
'name=CentOS-$releasever - Debuginfo\n'
'baseurl=http://debuginfo.centos.org/8/$basearch/\n'
'gpgcheck=1\n'
'enabled=0\n'
'gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-
CentOS-Official\n'
'\n'
'[extras]\n'
'name=CentOS-$releasever - Extras\n'
'mirrorlist=http://mirrorlist.centos.org/?release=8=$basearch=extras=$infra\n'
'#baseurl=http://mirror.centos.org/centos/$releasever/extras/$basearch/os/\n'
'gpgcheck=1\n'
'enabled=1\n'
'gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-
CentOS-Official\n'
'\n'
'[fasttrack]\n'
'name=CentOS-$releasever - fasttrack\n'
'mirrorlist=http://mirrorlist.centos.org/?release=8=$basearch=fasttrack=$infra\n'
'#baseurl=http://mirror.centos.org/centos/$releasever/fasttrack/$basearch/os/\n'
'gpgcheck=1\n'
'enabled=0\n'
'gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-
CentOS-Official\n'
'\n'
'[baseos-source]\n'
'name=CentOS-$releasever - BaseOS Sources\n'
'baseurl=http://vault.centos.org/centos/8/BaseOS/Source/\n'
'gpgcheck=1\n'
'enabled=0\n'
'gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-
CentOS-Official\n'
'\n'
'[appstream-source]\n'
'name=CentOS-$releasever - AppStream Sources\n'
'baseurl=http://vault.centos.org/centos/8/AppStream/Source/\n'
'gpgcheck=1\n'
'enabled=0\n'
'gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-
CentOS-Official\n'
'\n'
'[powertools-source]\n'
'name=CentOS-$releasever - PowerTools Sources\n'
'baseurl=http://vault.centos.org/centos/8/PowerTools/Source/\n'
'gpgcheck=1\n'
'enabled=0\n'
'gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-
CentOS-Official\n'
'\n'
'[extras-source]\n'
'name=CentOS-$releasever - Extras Sources\n'
'baseurl=http://vault.centos.org/centos/8/extras/Source/\n'
'gpgcheck=1\n'
'enabled=0\n'
'gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-
CentOS-Official\n'
'\n'
'[splus-source]\n'
'name=CentOS-$releasever - Plus Sources\n'
'baseurl=http://vault.centos.org/centos/8/centosplus/Source/\n'
'gpgcheck=1\n'
'enabled=0\n'
'gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-
CentOS-Official\n'
'\n'
'\n'
'[epel]\n'
'name=Extra Packages for Enterprise Linux $releasever - $basearch\n'
'mirrorlist=http://mirrors.fedoraproject.org/mirrorlist?repo=epel-8=$basearch\n'
'failovermethod=priority\n'

Forbidden to download EPEL packages?

2021-06-20 Thread Ron Olson
Hey all-

I’m trying to run a mock build with EPEL-8 (epel-8-x86_64) and it fails with:


[MIRROR] kernel-headers-4.18.0-305.3.1.el8_4.x86_64.rpm: Status code: 403 for 
https://infrastructure.fedoraproject.org/repo/rhel/rhel8/koji/latest/x86_64/RHEL-8-001/non_modular/kernel-headers-4.18.0-305.3.1.el8_4.x86_64.rpm
 (IP: 38.145.60.16)
[MIRROR] kernel-headers-4.18.0-305.3.1.el8_4.x86_64.rpm: Status code: 403 for 
https://infrastructure.fedoraproject.org/repo/rhel/rhel8/koji/latest/x86_64/RHEL-8-001/non_modular/kernel-headers-4.18.0-305.3.1.el8_4.x86_64.rpm
 (IP: 38.145.60.16)
(230/232): gcc-c++-8.4.1-1.el8.x86_64.rpm   5.9 MB/s |  12 MB 00:02
[MIRROR] kernel-headers-4.18.0-305.3.1.el8_4.x86_64.rpm: Status code: 403 for 
https://infrastructure.fedoraproject.org/repo/rhel/rhel8/koji/latest/x86_64/RHEL-8-001/non_modular/kernel-headers-4.18.0-305.3.1.el8_4.x86_64.rpm
 (IP: 38.145.60.16)
[MIRROR] kernel-headers-4.18.0-305.3.1.el8_4.x86_64.rpm: Status code: 403 for 
https://infrastructure.fedoraproject.org/repo/rhel/rhel8/koji/latest/x86_64/RHEL-8-001/non_modular/kernel-headers-4.18.0-305.3.1.el8_4.x86_64.rpm
 (IP: 38.145.60.16)
[FAILED] kernel-headers-4.18.0-305.3.1.el8_4.x86_64.rpm: Status code: 403 for 
https://infrastructure.fedoraproject.org/repo/rhel/rhel8/koji/latest/x86_64/RHEL-8-001/non_modular/kernel-headers-4.18.0-305.3.1.el8_4.x86_64.rpm
 (IP: 38.145.60.16)
Error: Error downloading packages:
  Status code: 403 for 
https://infrastructure.fedoraproject.org/repo/rhel/rhel8/koji/latest/x86_64/RHEL-8-001/non_modular/kernel-headers-4.18.0-305.3.1.el8_4.x86_64.rpm
 (IP: 38.145.60.16)


I’ve given it a couple of days but this is still the case; any idea what’s 
going on or what I’m doing wrong? I tried epelplayground-8-x86_64 as well with 
the same result.

Thanks,

Ron
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1974141] New: perl-Config-INI-0.026 is available

2021-06-20 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1974141

Bug ID: 1974141
   Summary: perl-Config-INI-0.026 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Config-INI
  Keywords: FutureFeature, Triaged
  Assignee: emman...@seyman.fr
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: emman...@seyman.fr, iarn...@gmail.com,
perl-devel@lists.fedoraproject.org
  Target Milestone: ---
Classification: Fedora



Latest upstream release: 0.026
Current version/release in rawhide: 0.025-19.fc35
URL: http://search.cpan.org/dist/Config-INI/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/12545/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1974142] New: perl-Config-INI-Reader-Ordered-0.021 is available

2021-06-20 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1974142

Bug ID: 1974142
   Summary: perl-Config-INI-Reader-Ordered-0.021 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Config-INI-Reader-Ordered
  Keywords: FutureFeature, Triaged
  Assignee: ppi...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: perl-devel@lists.fedoraproject.org, ppi...@redhat.com
  Target Milestone: ---
Classification: Fedora



Latest upstream release: 0.021
Current version/release in rawhide: 0.020-14.fc35
URL: http://search.cpan.org/dist/Config-INI-Reader-Ordered/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/13760/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: systemd unit auto-enabling question

2021-06-20 Thread Peter Hutterer
On Fri, Jun 18, 2021 at 09:02:08AM -0500, Michael Catanzaro wrote:
> On Fri, Jun 18 2021 at 08:02:05 AM +1000, Peter Hutterer
>  wrote:
> > Right now pipewire gets around this by hardcoding pipewire-media-session
> > and
> > starting it directly (instead of the systemd service) but that makes it
> > hard
> > to replace.
> > 
> > Anyway, sounds like I'd need to get the FESCo approval for both packages
> > then?
> 
> Yes, you need FESCo approval to modify 90-default-user.preset. But also, I
> see I don't have pipewire-media-session installed at all on F34, so you'll
> also need Workstation WG approval to add a new package if you want one of
> these to be installed by default. (I don't know what they do, or why they
> were not included in the F34 change.)

Right now, pipewire-media-session is part of the pipewire package itself and
started by the pipewire daemon. So you do have it, just not as individual
package :) Check your ps output, it's running.

The goal is to make it replaceable which would require a separate package,
but yes, that will also require some other hoops to jump through, the
systemd part is merely the first one of those.

Cheers,
   Peter
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1974137] New: F35FailsToInstall: perl-Pinto

2021-06-20 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1974137

Bug ID: 1974137
   Summary: F35FailsToInstall: perl-Pinto
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Pinto
  Assignee: jples...@redhat.com
  Reporter: mhron...@redhat.com
QA Contact: extras...@fedoraproject.org
CC: jples...@redhat.com,
perl-devel@lists.fedoraproject.org, ppi...@redhat.com
Blocks: 1927313 (F35FailsToInstall,RAWHIDEFailsToInstall)
  Target Milestone: ---
Classification: Fedora



Hello,

Please note that this comment was generated automatically. If you feel that
this output has mistakes, please contact me via email (mhron...@redhat.com).

Your package (perl-Pinto) Fails To Install in Fedora 35:

can't install perl-Pinto:
  - nothing provides perl(Throwable::Error) >= 0.25 needed by
perl-Pinto-1:0.14-13.fc35.noarch

If you know about this problem and are planning on fixing it, please
acknowledge so by setting the bug status to ASSIGNED. If you don't have time to
maintain this package, consider orphaning it, so maintainers of dependent
packages realize the problem.


If you don't react accordingly to the policy for FTBFS/FTI bugs
(https://docs.fedoraproject.org/en-US/fesco/Fails_to_build_from_source_Fails_to_install/),
your package may be orphaned in 8+ weeks.

P.S. The data was generated solely from koji buildroot, so it might be newer
than the latest compose or the content on mirrors.

P.P.S. If this bug has been reported in the middle of upgrading multiple
dependent packages, please consider using side tags:
https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/#updating-inter-dependent-packages

Thanks!



Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=1927313
[Bug 1927313] Fedora 35 Fails To install Tracker
-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1974136] New: F35FailsToInstall: perl-Email-Sender

2021-06-20 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1974136

Bug ID: 1974136
   Summary: F35FailsToInstall: perl-Email-Sender
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Email-Sender
  Assignee: emman...@seyman.fr
  Reporter: mhron...@redhat.com
QA Contact: extras...@fedoraproject.org
CC: emman...@seyman.fr, iarn...@gmail.com,
perl-devel@lists.fedoraproject.org
Blocks: 1927313 (F35FailsToInstall,RAWHIDEFailsToInstall)
  Target Milestone: ---
Classification: Fedora



Hello,

Please note that this comment was generated automatically. If you feel that
this output has mistakes, please contact me via email (mhron...@redhat.com).

Your package (perl-Email-Sender) Fails To Install in Fedora 35:

can't install perl-Email-Sender:
  - nothing provides perl(Throwable::Error) >= 0.23 needed by
perl-Email-Sender-1.300036-1.fc35.noarch

If you know about this problem and are planning on fixing it, please
acknowledge so by setting the bug status to ASSIGNED. If you don't have time to
maintain this package, consider orphaning it, so maintainers of dependent
packages realize the problem.


If you don't react accordingly to the policy for FTBFS/FTI bugs
(https://docs.fedoraproject.org/en-US/fesco/Fails_to_build_from_source_Fails_to_install/),
your package may be orphaned in 8+ weeks.

P.S. The data was generated solely from koji buildroot, so it might be newer
than the latest compose or the content on mirrors.

P.P.S. If this bug has been reported in the middle of upgrading multiple
dependent packages, please consider using side tags:
https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/#updating-inter-dependent-packages

Thanks!



Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=1927313
[Bug 1927313] Fedora 35 Fails To install Tracker
-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Fabio Valentini
On Sun, Jun 20, 2021 at 8:45 PM Kevin Fenzi  wrote:
>
> My question would be: Are these automated builds otherwise known working
> and ready for integration testing with the rest of the distribution in
> rawhide?
>
> If they are, we (just) need to fix the bot to not do the wrong thing.
>
> If they are not, then indeed, only those that meet that critera should
> be pushed into rawhide.
>
> ie, it doesn't matter to me if the package version is
> 0.0alpha-do-not-use if the maintainer(s) say it works and is
> ready to integrate with the rest of the distribution. One projects
> "0.001-danger" is another projects "10.1" stable. We should trust
> maintainer(s) to know this...

I wouldn't have a problem with this, but looking at those builds apparently
- nobody monitors bodhi updates created for those builds, and
- nobody reads emails for the rhcontainerbot account.

The bodhi updates look very much like "throw this over the wall and
forget it". They are never interacted with.
If gating fails (which happens regularly), they're just stuck in
rawhide's weird "testing" state, until the next update for that
package obsoletes them.
In combination with the bot pushing weird / wrong versions, this
doesn't look too trustworthy to me.

Who is even responsible for the rhcontainerbot account? I looked at
the linked FESCo ticket (this was approved before my time), but I
couldn't figure out who's actually using this bot now, or who is
responsible for monitoring its actions. Because it sure seems like
nobody is looking.

Fabio
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Kevin Fenzi
On Sun, Jun 20, 2021 at 02:36:57PM +0200, Aleksandra Fedorova wrote:
> Hi,
> 
> On Sun, Jun 20, 2021 at 1:30 PM Neal Gompa  wrote:
...snip...
> >
> > Rawhide is still not your CI environment.
> 
> By the way I think we need to reconsider this statement.

I think we should turn it around and say: 

Rawhide is your first stop to integrate your otherwise ready
package(s) with the rest of the distribution.

Meh, thats not great either... perhaps a slogan is bad. ;) 

kevin


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Test-Announce] Proposal to CANCEL: 2021-06-21 Fedora QA Meeting

2021-06-20 Thread Adam Williamson
Hi folks! I'm proposing we cancel the QA meeting on Monday. I don't
have anything urgent on the agenda again, so let's take a break.

If you're aware of anything important we have to discuss this week,
please do reply to this mail and we can go ahead and run the meeting.

Thanks!
-- 
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net


___
test-announce mailing list -- test-annou...@lists.fedoraproject.org
To unsubscribe send an email to test-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test-annou...@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Kevin Fenzi
On Sun, Jun 20, 2021 at 03:26:52PM +, Zbigniew Jędrzejewski-Szmek wrote:
> 
> Yeah. I'm looking a the original ticket in
> https://pagure.io/fesco/issue/2228, and I think this was a mistake.
> We shouldn't have approved a bot that packages snapshot commits for
> rawhide. In the discussion, we talked about load on the infra, and ability
> to contact the maintainers, and even cooperation withb packit, but somehow
> the question whether we want this at all didn't come up.
> 
> I guess the effort to make rawhide palatable hadn't really sunk in
> deep enough back then ;)

Well, it's still not clear to me if these builds are not suitable for
rawhide, or if the bot that is pushing them just has bugs. 

In the case that caused this thread, the bot pushed older pacakges? 
So, it wasn't that they were completely broken, it's that they were just
_wrong_.

> @lsm5, would you be willing to adjust the bot to only package actual
> releases? Also, what is going on with the version jumps?

My question would be: Are these automated builds otherwise known working
and ready for integration testing with the rest of the distribution in
rawhide?

If they are, we (just) need to fix the bot to not do the wrong thing. 

If they are not, then indeed, only those that meet that critera should
be pushed into rawhide. 

ie, it doesn't matter to me if the package version is
0.0alpha-do-not-use if the maintainer(s) say it works and is
ready to integrate with the rest of the distribution. One projects
"0.001-danger" is another projects "10.1" stable. We should trust
maintainer(s) to know this... 

kevin


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Sérgio Basto
On Sun, 2021-06-20 at 10:42 +0200, Miro Hrončok wrote:
> On 20. 06. 21 9:39, Zbigniew Jędrzejewski-Szmek wrote:
> > I think we should just disable this particular bot until it fixed.
> > We should also clarify/update the Update Guidelines so that
> > undesirable
> > updates are disallowed, no matter if submitted by a bot or a human.
> 
> I think this is a good idea. This particular bot has a history of
> misbehavior 
> and rather than banning all the well behaving bots (that be
> definition we don't 
> even know about, because they behave good), we should disable this
> particular one.
> 
> Rather than "no bots allowed" policy, we might need a "bots that
> violate our 
> policies and guidelines or have a tendency to break things will be
> disabled 
> until fixed" policy.

100% agree, the problem is the bot that is, how to say without being
offensive, not very smart. 


> -- 
> Miro Hrončok
> -- 
> Phone: +420777974800
> IRC: mhroncok
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:  
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines:  
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:  
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it:  
> https://pagure.io/fedora-infrastructure

-- 
Sérgio M. B.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Frank Ch. Eigler
Miro Hrončok  writes:

>> - releng and SIGs submitting scripted mass rebuilds (no actual package
>> changes, triggered by a person)
>> - bots submitting rawhide builds for ELN (no package change, just
>> built for different buildroot)
> Other random ideas of what should be allowed:
>  - a human approves a pull request, bot merges it and builds
>  - a bot rebuilds packages automatically (bump-only or no changes),
> when dependencies change

A simpler way to phrase that would be:

"No autonomous bots are to push builds into rawhide or release branches."

- FChE
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Adam Williamson
On Sun, 2021-06-20 at 12:52 +0100, Peter Robinson wrote:
> > Rawhide is still not your CI environment. Years ago, we got rid of
> > alphas for the express purpose to stabilize Rawhide into alpha
> > quality. Stuff like this degrades the quality of Rawhide because they
> > make the assumption that nobody cares about the quality of Rawhide.
> 
> Being one of the people driving that in rel-eng at the time, the other
> was dgilmore, that statement is incorrect. The dropping of Alphas was
> because we improved the compose to produce all release artifacts on
> the nightly composes, both rawhide and branched, instead of just the
> network installer and live images. Previously to that we only produced
> all artifacts with the TC/RC composes, we also got rid of the TCs as
> part of that process.

My recollection is that both of these things are correct. Having full
nightly composes was one part of dropping Alphas, but so was the idea
that Rawhide would continually maintain Alpha quality. This is why the
Basic release criteria exist - they are the requirements that Rawhide
is supposed to meet *all the time*. They say this right at the top:

"The objectives for all Branched and Rawhide nightly composes, as well
as Beta and Final releases, are to..."

The whole "Rawhide gating" idea was part of this: the idea was/is that
Rawhide composes should not be synced unless they meet the Basic
criteria. The rawhide_compose_sync_to_mirrors greenwave policy exists
to check this, but for whatever reason, the work of actually completing
this effort so compose sync doesn't happen unless that policy passes
was never done.

We've talked about various concerns around this in the past (the
technicalities of exactly how to implement it, and the concern that not
enough composes actually meet the requirements so we'd wind up with few
composes synced and a big disconnect between what's in the repos and
what's in Koji), but the *idea* has been there all along and I agree
with Neal that it was tied up with 'no more Alphas'.
-- 
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Tomasz Torcz
Dnia Sun, Jun 20, 2021 at 10:39:34AM +0200, Miro Hrončok napisał(a):
> On 19. 06. 21 22:18, Fabio Valentini wrote:
> > The following things should still be allowed:
> > - releng and SIGs submitting scripted mass rebuilds (no actual package
> > changes, triggered by a person)
> > - bots submitting rawhide builds for ELN (no package change, just
> > built for different buildroot)
> 
> Other random ideas of what should be allowed:
> 
>  - a bot rebuilds packages automatically (bump-only or no changes), when
> dependencies change

  We supposedly have it in Fedora already:
https://fedoraproject.org/wiki/Koschei
but it never worked for me.

-- 
Tomasz Torcz  “If you try to upissue this patchset I shall be 
seeking
to...@pipebreaker.pl   an IP-routable hand grenade.”  — Andrew Morton (LKML)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Adam Williamson
On Sun, 2021-06-20 at 07:29 -0400, Neal Gompa wrote:
> 
> If you want the features of Rawhide for CI, then we should talk about
> enabling this in more places. For example, there's no technical reason
> we couldn't do OpenQA runs for packages in COPR. There are serious
> consequences to shipping packages into Rawhide, not the least of which
> is that it locks an NVR forever into Koji and ships it to people using
> Rawhide as a daily driver. Also having the ability to have COPR
> auto-rebuild as stuff changes in the build root makes the CI case work
> better, and that's something we literally can't do in Koji (by policy
> and by design).

I mean, there's no need for COPR to be involved. Rawhide runs through
Bodhi these days. We could configure the package(s) concerned to gate
the updates on testing.

One major stumbling block there is that the openQA tests Peter values
only run on nightly composes, and those only pull in stable packages.
But it's not like we couldn't engineer our way around that if we wanted
to.
-- 
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Rawhide-20210620.n.0 compose check report

2021-06-20 Thread Fedora compose checker
No missing expected images.

Compose FAILS proposed Rawhide gating check!
3 of 43 required tests failed
openQA tests matching unsatisfied gating requirements shown with **GATING** 
below

Failed openQA tests: 17/134 (aarch64), 15/199 (x86_64)

New failures (same test not failed in Fedora-Rawhide-20210619.n.0):

ID: 912851  Test: aarch64 Workstation-raw_xz-raw.xz desktop_printing@uefi
URL: https://openqa.fedoraproject.org/tests/912851
ID: 912863  Test: aarch64 Workstation-raw_xz-raw.xz desktop_terminal@uefi
URL: https://openqa.fedoraproject.org/tests/912863
ID: 912875  Test: x86_64 universal install_sata@uefi **GATING**
URL: https://openqa.fedoraproject.org/tests/912875
ID: 912894  Test: x86_64 universal install_xfs@uefi
URL: https://openqa.fedoraproject.org/tests/912894
ID: 912962  Test: aarch64 universal install_arabic_language@uefi
URL: https://openqa.fedoraproject.org/tests/912962
ID: 913043  Test: aarch64 Server-dvd-iso install_vncconnect_client@uefi
URL: https://openqa.fedoraproject.org/tests/913043
ID: 913044  Test: aarch64 Server-dvd-iso install_vncconnect_server@uefi
URL: https://openqa.fedoraproject.org/tests/913044

Old failures (same test failed in Fedora-Rawhide-20210619.n.0):

ID: 912668  Test: x86_64 Server-dvd-iso anaconda_help
URL: https://openqa.fedoraproject.org/tests/912668
ID: 912691  Test: x86_64 Server-dvd-iso 
server_role_deploy_domain_controller **GATING**
URL: https://openqa.fedoraproject.org/tests/912691
ID: 912694  Test: x86_64 Server-dvd-iso server_remote_logging_server
URL: https://openqa.fedoraproject.org/tests/912694
ID: 912708  Test: x86_64 Server-dvd-iso server_freeipa_replication_master
URL: https://openqa.fedoraproject.org/tests/912708
ID: 912709  Test: x86_64 Server-dvd-iso server_freeipa_replication_replica
URL: https://openqa.fedoraproject.org/tests/912709
ID: 912710  Test: x86_64 Server-dvd-iso server_realmd_join_kickstart 
**GATING**
URL: https://openqa.fedoraproject.org/tests/912710
ID: 912713  Test: x86_64 Server-dvd-iso server_remote_logging_client
URL: https://openqa.fedoraproject.org/tests/912713
ID: 912716  Test: x86_64 Server-dvd-iso server_freeipa_replication_client
URL: https://openqa.fedoraproject.org/tests/912716
ID: 912721  Test: x86_64 Workstation-live-iso anaconda_help
URL: https://openqa.fedoraproject.org/tests/912721
ID: 912742  Test: x86_64 KDE-live-iso anaconda_help
URL: https://openqa.fedoraproject.org/tests/912742
ID: 912763  Test: x86_64 Silverblue-dvd_ostree-iso anaconda_help
URL: https://openqa.fedoraproject.org/tests/912763
ID: 912796  Test: aarch64 Server-dvd-iso 
server_role_deploy_domain_controller@uefi
URL: https://openqa.fedoraproject.org/tests/912796
ID: 912799  Test: aarch64 Server-dvd-iso anaconda_help@uefi
URL: https://openqa.fedoraproject.org/tests/912799
ID: 912824  Test: aarch64 Server-dvd-iso 
server_freeipa_replication_master@uefi
URL: https://openqa.fedoraproject.org/tests/912824
ID: 912825  Test: aarch64 Server-dvd-iso 
server_freeipa_replication_replica@uefi
URL: https://openqa.fedoraproject.org/tests/912825
ID: 912826  Test: aarch64 Server-dvd-iso server_realmd_join_kickstart@uefi
URL: https://openqa.fedoraproject.org/tests/912826
ID: 912837  Test: aarch64 Server-dvd-iso server_cockpit_basic@uefi
URL: https://openqa.fedoraproject.org/tests/912837
ID: 912839  Test: aarch64 Server-dvd-iso 
server_freeipa_replication_client@uefi
URL: https://openqa.fedoraproject.org/tests/912839
ID: 912850  Test: aarch64 Workstation-raw_xz-raw.xz desktop_background@uefi
URL: https://openqa.fedoraproject.org/tests/912850
ID: 912854  Test: aarch64 Workstation-raw_xz-raw.xz 
desktop_update_graphical@uefi
URL: https://openqa.fedoraproject.org/tests/912854
ID: 912862  Test: aarch64 Workstation-raw_xz-raw.xz desktop_browser@uefi
URL: https://openqa.fedoraproject.org/tests/912862
ID: 912956  Test: aarch64 universal install_asian_language@uefi
URL: https://openqa.fedoraproject.org/tests/912956
ID: 912984  Test: aarch64 universal install_european_language@uefi
URL: https://openqa.fedoraproject.org/tests/912984
ID: 913001  Test: x86_64 KDE-live-iso apps_startstop
URL: https://openqa.fedoraproject.org/tests/913001
ID: 913005  Test: x86_64 KDE-live-iso desktop_login
URL: https://openqa.fedoraproject.org/tests/913005

Soft failed openQA tests: 7/199 (x86_64), 5/134 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Rawhide-20210619.n.0):

ID: 912781  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/912781
ID: 912783  Test: aarch64 Minimal-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/912783
ID: 912840  Test: aarch64 Server-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/912840
ID: 912868  Test: 

Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Zbigniew Jędrzejewski-Szmek
On Sun, Jun 20, 2021 at 10:55:00AM +0200, Fabio Valentini wrote:
> On Sun, Jun 20, 2021 at 10:45 AM Miro Hrončok  wrote:
> >
> > I think this is a good idea. This particular bot has a history of 
> > misbehavior
> > and rather than banning all the well behaving bots (that be definition we 
> > don't
> > even know about, because they behave good), we should disable this 
> > particular one.
> >
> > Rather than "no bots allowed" policy, we might need a "bots that violate our
> > policies and guidelines or have a tendency to break things will be disabled
> > until fixed" policy.
> 
> Yeah, that works for me too. Though I wouldn't want to make this a
> special case and create an actual policy for this instead, that we
> could point to when something like this happens.
> 
> I also think that I probably was not clear in my original message.
> 
> Any builds that are triggered by an actual human action, like
> - scripted (mass) rebuilds with no *Version* changes,
> - automatic builds after human-approved PRs,
> - etc.
> are of course exempt, because the action of an actual human being
> triggered them.
> 
> The only thing I *don't* want is: Bots submitting builds for new
> *Versions*, without human interaction.

So... what about new versions of clamav-data?
I'm pretty sure that's OK to bot-ize.

Then what about new minor version of thousands of rust packages? If we
have %check sections and CI and gating, the act of releasing the
update as a packager is not much different than a what a bot would do.
Right now we mostly don't automatize this, but I think we could in the
future.

> Regarding Zbyszek's point:
> 
> > Second, I think the guideline is simply wrong. As counterexamples, we
> > currently have python3.10beta2 in rawhide, systemd-249-rc1, and
> > kernel-5.13.0-0.rc6. Pushing pre-release vesions of low-level packages
> > is a crucial part of development of the distro and collaboration with
> > upstream projects and language ecosystems.
> 
> There's actually already an exemption in the Updates Policy for those cases.
> And I don't have any problem with those, because those builds are
> prepared, built, tested, and shepherded by actual humans, instead of
> created by a bot that just throws them at the wall to see what sticks
> and what doesn't.

Oh, OK. I didn't look at the policy page, just went by the quote provided.

> If you look at bodhi updates for rhcontainerbot it's pretty obvious
> that nobody even looks at the updates that are created for those
> builds:
> https://bodhi.fedoraproject.org/updates/?search==testing=rhcontainerbot
> It looks like any build that receives -1 karma or fails gating tests
> will just be stuck in "testing" until obsoleted by the next automated
> build for that package.

Yeah. I'm looking a the original ticket in
https://pagure.io/fesco/issue/2228, and I think this was a mistake.
We shouldn't have approved a bot that packages snapshot commits for
rawhide. In the discussion, we talked about load on the infra, and ability
to contact the maintainers, and even cooperation withb packit, but somehow
the question whether we want this at all didn't come up.

I guess the effort to make rawhide palatable hadn't really sunk in
deep enough back then ;)

@lsm5, would you be willing to adjust the bot to only package actual
releases? Also, what is going on with the version jumps?

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Zbigniew Jędrzejewski-Szmek
On Sun, Jun 20, 2021 at 08:37:03AM -0500, Michael Catanzaro wrote:
> On Sun, Jun 20 2021 at 07:29:16 AM -0400, Neal Gompa
>  wrote:
> >Most of our rules are designed to make sure there's someone ultimately
> >responsible for everything going into Fedora. Unfortunately, bots are
> >the opposite of that, because there's no one to reach to stop bad
> >behavior when it happens.

> Hm, this seems pretty simple to solve though, right? Allow bots to
> submit updates on behalf of packagers, but not with their own bot
> FAS accounts.

Let's not throw out the baby with the bath water.

A human *is* responsible and known. When a bot account is given
permission, we make sure that there's a known human behind the account.
Things are no other in this particular case, see the original ticket [1].

Actually, if the bot were using their human's account, things would be *less*
transparent. By using a separate account, we are making it clear that
this update stream is made by this particular bot (as opposed to e.g.
some human occasionally using a script to release some updates).

[1] https://pagure.io/fesco/issue/2228

> This would be like how GNOME package updates currently
> work, where a bot does the hard work but a human is ultimately
> responsible (and subscribed to each bodhi update, so feedback will
> at least not be completely missed).

The line can be a big hazy, but I'd say that if:
- a human is just using a script or even a some program to fire off
  the update — this particular person's account must be used.
- some bot prepares the update, but a human still need to make the final
  step and may or may not publish the update: probably better to do it
  using this person's account.
- the bot is set up once and then keeps releasing updating until stopped,
  and may be managed by multiple people — a separate bot account is preferable.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-IoT-35-20210620.0 compose check report

2021-06-20 Thread Fedora compose checker
No missing expected images.

Failed openQA tests: 2/16 (x86_64), 6/15 (aarch64)

Old failures (same test failed in Fedora-IoT-35-20210619.0):

ID: 913018  Test: x86_64 IoT-dvd_ostree-iso iot_zezere_server
URL: https://openqa.fedoraproject.org/tests/913018
ID: 913027  Test: x86_64 IoT-dvd_ostree-iso iot_zezere_ignition
URL: https://openqa.fedoraproject.org/tests/913027
ID: 913028  Test: aarch64 IoT-dvd_ostree-iso iot_clevis@uefi
URL: https://openqa.fedoraproject.org/tests/913028
ID: 913030  Test: aarch64 IoT-dvd_ostree-iso iot_zezere_server@uefi
URL: https://openqa.fedoraproject.org/tests/913030
ID: 913034  Test: aarch64 IoT-dvd_ostree-iso iot_rpmostree_overlay@uefi
URL: https://openqa.fedoraproject.org/tests/913034
ID: 913036  Test: aarch64 IoT-dvd_ostree-iso podman@uefi
URL: https://openqa.fedoraproject.org/tests/913036
ID: 913041  Test: aarch64 IoT-dvd_ostree-iso iot_zezere_ignition@uefi
URL: https://openqa.fedoraproject.org/tests/913041
ID: 913042  Test: aarch64 IoT-dvd_ostree-iso podman_client@uefi
URL: https://openqa.fedoraproject.org/tests/913042

Soft failed openQA tests: 3/16 (x86_64), 1/15 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-IoT-35-20210619.0):

ID: 913012  Test: x86_64 IoT-dvd_ostree-iso iot_clevis
URL: https://openqa.fedoraproject.org/tests/913012
ID: 913013  Test: x86_64 IoT-dvd_ostree-iso install_default_upload
URL: https://openqa.fedoraproject.org/tests/913013
ID: 913014  Test: x86_64 IoT-dvd_ostree-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/913014
ID: 913029  Test: aarch64 IoT-dvd_ostree-iso install_default_upload@uefi
URL: https://openqa.fedoraproject.org/tests/913029

Passed openQA tests: 8/15 (aarch64), 11/16 (x86_64)

New passes (same test not passed in Fedora-IoT-35-20210619.0):

ID: 913035  Test: aarch64 IoT-dvd_ostree-iso iot_rpmostree_rebase@uefi
URL: https://openqa.fedoraproject.org/tests/913035

Installed system changes in test x86_64 IoT-dvd_ostree-iso 
install_default_upload: 
System load changed from 0.40 to 0.23
Previous test data: https://openqa.fedoraproject.org/tests/912598#downloads
Current test data: https://openqa.fedoraproject.org/tests/913013#downloads

Installed system changes in test aarch64 IoT-dvd_ostree-iso 
install_default_upload@uefi: 
System load changed from 3.98 to 0.56
Average CPU usage changed from 95.23809524 to 8.27142857
Previous test data: https://openqa.fedoraproject.org/tests/912614#downloads
Current test data: https://openqa.fedoraproject.org/tests/913029#downloads
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1974101] New: perl-CPAN-Perl-Releases-5.20210620 is available

2021-06-20 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1974101

Bug ID: 1974101
   Summary: perl-CPAN-Perl-Releases-5.20210620 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-CPAN-Perl-Releases
  Keywords: FutureFeature, Triaged
  Assignee: jples...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: iarn...@gmail.com, jples...@redhat.com,
perl-devel@lists.fedoraproject.org
  Target Milestone: ---
Classification: Fedora



Latest upstream release: 5.20210620
Current version/release in rawhide: 5.20210521-1.fc35
URL: http://search.cpan.org/dist/CPAN-Perl-Releases/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/5881/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: debugging pipewire & root access to systemd userspace

2021-06-20 Thread Zbigniew Jędrzejewski-Szmek
On Sun, Jun 20, 2021 at 03:19:27PM +0200, Alexander Ploumistos wrote:
> Hello Zbigniew,
> 
> Thank you very much for your answers and sorry for the late reply, IRL
> things have been hectic. I've had the problem with pipewire once since
> I last wrote, but I can't figure out how to trigger it at will.
> 
> 
> On Fri, Jun 18, 2021 at 8:36 AM Zbigniew Jędrzejewski-Szmek
>  wrote:
> >
> > On Fri, Jun 18, 2021 at 01:38:08AM +0200, Alexander Ploumistos wrote:
> > > Should gdb be able to read from a sound device?
> >
> > It shouldn't attempt to.
> 
> Should I file a bug against gdb or abrt?

You *may*, but I think it's one of those cases where you'll need to figure
it our on your own anyway. Until you have narrowed down what is going wrong,
filing a bug is likely to only cause the maintainers to ask you for 
(a lot of) info.

> > > Having root logged in a terminal, I tried to check the state of
> > > pipewire.service:
> > > systemctl --machine=myuser@.host --user status pipewire.service
> > >
> > > to which I got the reply:
> > > Failed to get properties: Transport endpoint is not connected
> >
> > The way that myuser@.host is implemented is surprisingly complex. See
> > the original commit https://github.com/systemd/systemd/commit/1b630835df
> > for a description.
> >
> > Does it work for other users? If yes, then it looks like something
> > is borked for that particular user.
> 
> Forgot to check, I will try to do it later today.
> 
> 
> > systemctl -M myuser@.host executes
> > systemd-run -p User=myuser systemd-stdio-bridge 
> > -punix:path=${XDG_RUNTIME_DIR}/bus
> > The error message is most likely from systemd-stdio-bridge,
> > or from systemctl failing to connect to the bridge. Since the
> > invocation of systemd-stdio-bridge goes through the system manager,
> > you can look at the logs for that unit ('journalctl -b -u 
> > run-u.service').
> > It should show some error.
> 
> There is no such service. Assuming  is the uid,

No,  is a (pseudorandom) number assigned to the service. Every time
you execute 'systemctl -M myuser@.host', this invokes 'systemd-run', which
in turns causes 'systemd' to start a new 'run-u.service' unit.

> Looking at the logs for user@1000.service, there's nothing pertinent.

This is not part of user@1000.service.

> Actually there's nothing even in the unfiltered log when I issue the
> command and it fails.

That seems wrong. Maybe you're not seeing all logs because you don't have
enough privileges?

> > > I haven't had to bother with a userspace systemd service before, so
> > > going down that rabbit hole, at some point I started messing with
> > > machinectl, and apparently, running something seemingly innocuous such
> > > as "machinectl list-images --all" triggers a SELinux denial. But not
> > > always…
> > > The message I'm seeing is this:
> > > audit[1079]: AVC avc:  denied  { write } for  pid=1079
> > > comm="systemd-machine" name="/" dev="dm-1" ino=2
> > > scontext=system_u:system_r:systemd_machined_t:s0
> > > tcontext=system_u:object_r:root_t:s0 tclass=dir permissive=0
> > >
> > > setroubleshoot tells me that if I want to allow daemons to dump core,
> > > then I should enable the 'daemons_dump_core' boolean. I don't know if
> > > I want to, do I need to do that in order to dive deeper into my
> > > pipewire issue? How is listing the images on a system related to
> > > allowing demons to dump core though?
> >
> > If machined crashes, there should be logs about this. Did you
> > look at the journal?
> 
> Nothing in the journal about machined crashing or doing anything else
> other than getting the SELinux denial.

The usual method to debugging those is to set permissive mode and then
check if the issue still reproduces.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: systemd unit auto-enabling question

2021-06-20 Thread Neal Gompa
On Sun, Jun 20, 2021 at 10:17 AM Michael Catanzaro  wrote:
>
> On Fri, Jun 18 2021 at 08:02:05 AM +1000, Peter Hutterer
>  wrote:
> > Right now pipewire gets around this by hardcoding
> > pipewire-media-session and
> > starting it directly (instead of the systemd service) but that makes
> > it hard
> > to replace.
> >
> > Anyway, sounds like I'd need to get the FESCo approval for both
> > packages
> > then?
>
> Yes, you need FESCo approval to modify 90-default-user.preset. But
> also, I see I don't have pipewire-media-session installed at all on
> F34, so you'll also need Workstation WG approval to add a new package
> if you want one of these to be installed by default. (I don't know what
> they do, or why they were not included in the F34 change.)

Nobody said anything about it, which is why it didn't get enabled.

And no, WG approval is not required if it's already a dependency of
pipewire (which is used by all Fedora variants). That policy only
applies to new extra things or GNOME things (as Workstation WG is
effectively the GNOME SIG).




--
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1974093] New: perl-Module-CoreList-5.20210620 is available

2021-06-20 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1974093

Bug ID: 1974093
   Summary: perl-Module-CoreList-5.20210620 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Module-CoreList
  Keywords: FutureFeature, Triaged
  Assignee: jples...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: jose.p.oliveira@gmail.com, jples...@redhat.com,
mspa...@redhat.com,
perl-devel@lists.fedoraproject.org, spo...@gmail.com,
st...@silug.org
  Target Milestone: ---
Classification: Fedora



Latest upstream release: 5.20210620
Current version/release in rawhide: 5.20210521-1.fc35
URL: http://search.cpan.org/dist/Module-CoreList/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/3080/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Michael Catanzaro
On Sun, Jun 20 2021 at 07:29:16 AM -0400, Neal Gompa 
 wrote:

Most of our rules are designed to make sure there's someone ultimately
responsible for everything going into Fedora. Unfortunately, bots are
the opposite of that, because there's no one to reach to stop bad
behavior when it happens.


Hm, this seems pretty simple to solve though, right? Allow bots to 
submit updates on behalf of packagers, but not with their own bot FAS 
accounts. This would be like how GNOME package updates currently work, 
where a bot does the hard work but a human is ultimately responsible 
(and subscribed to each bodhi update, so feedback will at least not be 
completely missed).


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFP: Just

2021-06-20 Thread Olivier Lemasle
Hi,

I'll take care of packaging rust-target and just.

Best regards,

--
Olivier
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora rawhide compose report: 20210620.n.0 changes

2021-06-20 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20210619.n.0
NEW: Fedora-Rawhide-20210620.n.0

= SUMMARY =
Added images:0
Dropped images:  0
Added packages:  0
Dropped packages:0
Upgraded packages:   61
Downgraded packages: 0

Size of added packages:  0 B
Size of dropped packages:0 B
Size of upgraded packages:   4.60 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   -46.46 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =

= DROPPED IMAGES =

= ADDED PACKAGES =

= DROPPED PACKAGES =

= UPGRADED PACKAGES =
Package:  R-bslib-0.2.4-3.fc35
Old package:  R-bslib-0.2.4-2.fc35
Summary:  Custom Bootstrap Sass Themes for shiny and rmarkdown
RPMs: R-bslib
Size: 2.96 MiB
Size change:  1.79 KiB
Changelog:
  * Sat Jun 19 2021 Elliott Sales de Andrade  - 
0.2.4-3
  - Rebuild for R 4.1


Package:  R-jquerylib-0.1.4-2.fc35
Old package:  R-jquerylib-0.1.4-1.fc35
Summary:  Obtain jQuery as an HTML Dependency Object
RPMs: R-jquerylib
Size: 300.11 KiB
Size change:  -1.86 KiB
Changelog:
  * Sat Jun 19 2021 Elliott Sales de Andrade  - 
0.1.4-2
  - Rebuild for R 4.1


Package:  R-sass-0.3.1-2.fc35
Old package:  R-sass-0.3.1-1.fc35
Summary:  Syntactically Awesome Style Sheets (Sass)
RPMs: R-sass
Size: 1.54 MiB
Size change:  -242 B
Changelog:
  * Sat Jun 19 2021 Elliott Sales de Andrade  - 
0.3.1-2
  - Rebuild for R 4.1


Package:  R-shiny-1.5.0-5.fc35~bootstrap
Old package:  R-shiny-1.5.0-4.fc35~bootstrap
Summary:  Web Application Framework for R
RPMs: R-shiny
Size: 4.22 MiB
Size change:  18 B
Changelog:
  * Sat Jun 19 2021 Elliott Sales de Andrade  - 
1.5.0-5
  - Fix upgrade problem due to symlink->directory change (#1936222)


Package:  acme-tiny-4.1.0-7.fc35
Old package:  acme-tiny-4.1.0-6.fc35
Summary:  Tiny auditable script to issue, renew Let's Encrypt certificates
RPMs: acme-tiny acme-tiny-core
Size: 34.77 KiB
Size change:  1.43 KiB
Changelog:
  * Thu May 27 2021 Stuart D. Gathman  4.1.0-7
  - Fix BZ#1839904
  - enhance notify after cert update, incrond no longer needed


Package:  bind-32:9.16.18-1.fc35
Old package:  bind-32:9.16.17-2.fc35
Summary:  The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) 
server
RPMs: bind bind-chroot bind-devel bind-dlz-filesystem bind-dlz-ldap 
bind-dlz-mysql bind-dlz-sqlite3 bind-dnssec-doc bind-dnssec-utils bind-doc 
bind-libs bind-license bind-pkcs11 bind-pkcs11-devel bind-pkcs11-libs 
bind-pkcs11-utils bind-utils python3-bind
Size: 23.36 MiB
Size change:  -391 B
Changelog:
  * Fri Jun 18 2021 Petr Menk  - 32:9.16.18-1
  - Update to 9.16.18


Package:  bind-dyndb-ldap-11.9-3.fc35
Old package:  bind-dyndb-ldap-11.9-2.fc35
Summary:  LDAP back-end plug-in for BIND
RPMs: bind-dyndb-ldap
Size: 529.16 KiB
Size change:  753 B
Changelog:
  * Sat Jun 19 2021 Petr Menk  - 11.9-3
  - Rebuilt for BIND 9.16.18


Package:  bottles-3.1.15-1.fc35
Old package:  bottles-3.1.14-1.fc35
Summary:  Easily manage Wine prefix in a new way
RPMs: bottles
Size: 177.72 KiB
Size change:  5.91 KiB
Changelog:
  * Sat Jun 19 2021 Artem Polishchuk  - 3.1.15-1
  - build(update): 3.1.15


Package:  clipman-1.6.0-1.fc35
Old package:  clipman-1.5.2-1.fc35
Summary:  A simple clipboard manager for Wayland
RPMs: clipman golang-github-yory8-clipman-devel
Size: 6.41 MiB
Size change:  -52.41 KiB
Changelog:
  * Sat Jun 19 2021 Bob Hepple  - 1.6.0-1
  - new version


Package:  corsix-th-0.65-2.fc35
Old package:  corsix-th-0.65-1.fc35
Summary:  Open source clone of Theme Hospital
RPMs: corsix-th corsix-th-data
Size: 2.80 MiB
Size change:  3.47 KiB
Changelog:
  * Sat Jun 19 2021 Artem Polishchuk  - 0.65-2
  - build(update): 0.65 (new, re-tagged upstream version)


Package:  culmus-fonts-0.133-1.fc35
Old package:  culmus-fonts-0.130-18.fc34
Summary:  Fonts for Hebrew from Culmus project
RPMs: clm-aharoni-fonts clm-caladings-fonts clm-david-fonts 
clm-drugulin-fonts clm-ellinia-fonts clm-frank-ruehl-fonts clm-hadasim-fonts 
clm-keter-yg-fonts clm-miriam-fonts clm-miriam-mono-fonts clm-nachlieli-fonts 
clm-shofar-fonts clm-simple-fonts clm-stam-ashkenaz-fonts 
clm-stam-sefarad-fonts clm-yehuda-fonts culmus-fonts-all
Added RPMs:   clm-aharoni-fonts clm-caladings-fonts clm-david-fonts 
clm-drugulin-fonts clm-ellinia-fonts clm-frank-ruehl-fonts clm-hadasim-fonts 
clm-keter-yg-fonts clm-miriam-fonts clm-miriam-mono-fonts clm-nachlieli-fonts 
clm-shofar-fonts clm-simple-fonts clm-stam-ashkenaz-fonts 
clm-stam-sefarad-fonts clm-yehuda-fonts culmus-fonts-all
Dropped RPMs: culmus-aharoni-clm-fonts culmus-caladings-clm-fonts 
culmus-david-clm-fonts culmus-drugulin-clm-fonts culmus-ellinia-clm-fonts 
culmus-fonts-common culmus-frank-ruehl-clm-fonts culmus-hadasim-clm-fonts 
culmus-kete

Re: debugging pipewire & root access to systemd userspace

2021-06-20 Thread Alexander Ploumistos
Hello Zbigniew,

Thank you very much for your answers and sorry for the late reply, IRL
things have been hectic. I've had the problem with pipewire once since
I last wrote, but I can't figure out how to trigger it at will.


On Fri, Jun 18, 2021 at 8:36 AM Zbigniew Jędrzejewski-Szmek
 wrote:
>
> On Fri, Jun 18, 2021 at 01:38:08AM +0200, Alexander Ploumistos wrote:
> > Should gdb be able to read from a sound device?
>
> It shouldn't attempt to.

Should I file a bug against gdb or abrt?


> > Having root logged in a terminal, I tried to check the state of
> > pipewire.service:
> > systemctl --machine=myuser@.host --user status pipewire.service
> >
> > to which I got the reply:
> > Failed to get properties: Transport endpoint is not connected
>
> The way that myuser@.host is implemented is surprisingly complex. See
> the original commit https://github.com/systemd/systemd/commit/1b630835df
> for a description.
>
> Does it work for other users? If yes, then it looks like something
> is borked for that particular user.

Forgot to check, I will try to do it later today.


> systemctl -M myuser@.host executes
> systemd-run -p User=myuser systemd-stdio-bridge 
> -punix:path=${XDG_RUNTIME_DIR}/bus
> The error message is most likely from systemd-stdio-bridge,
> or from systemctl failing to connect to the bridge. Since the
> invocation of systemd-stdio-bridge goes through the system manager,
> you can look at the logs for that unit ('journalctl -b -u run-u.service').
> It should show some error.

There is no such service. Assuming  is the uid, I have these units listed:
  user-runtime-dir@1000.service
  user@1000.service
  user-1000.slice

Looking at the logs for user@1000.service, there's nothing pertinent.
Actually there's nothing even in the unfiltered log when I issue the
command and it fails.


> > I haven't had to bother with a userspace systemd service before, so
> > going down that rabbit hole, at some point I started messing with
> > machinectl, and apparently, running something seemingly innocuous such
> > as "machinectl list-images --all" triggers a SELinux denial. But not
> > always…
> > The message I'm seeing is this:
> > audit[1079]: AVC avc:  denied  { write } for  pid=1079
> > comm="systemd-machine" name="/" dev="dm-1" ino=2
> > scontext=system_u:system_r:systemd_machined_t:s0
> > tcontext=system_u:object_r:root_t:s0 tclass=dir permissive=0
> >
> > setroubleshoot tells me that if I want to allow daemons to dump core,
> > then I should enable the 'daemons_dump_core' boolean. I don't know if
> > I want to, do I need to do that in order to dive deeper into my
> > pipewire issue? How is listing the images on a system related to
> > allowing demons to dump core though?
>
> If machined crashes, there should be logs about this. Did you
> look at the journal?

Nothing in the journal about machined crashing or doing anything else
other than getting the SELinux denial.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1967544] perl-SDL-2.548-11.fc35 skips all video tests with sdl12-compat-devel-0.0.1~git.20210602.cc5826a-1.fc35: Failed to init video

2021-06-20 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1967544

Neal Gompa  changed:

   What|Removed |Added

 Status|NEW |CLOSED
 CC||igor.ra...@gmail.com
  Component|perl-SDL|sdl12-compat
   Fixed In Version||sdl12-compat-0.0.1~git.2021
   ||0618.f44f295-1.fc35
 Resolution|--- |RAWHIDE
   Assignee|hdego...@redhat.com |ngomp...@gmail.com
 QA Contact|extras...@fedoraproject.org |
Last Closed||2021-06-20 12:56:27



--- Comment #9 from Neal Gompa  ---
Koschei reports that this is no longer a problem:
https://koschei.fedoraproject.org/build/10490013


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


License field change: dippi

2021-06-20 Thread Benjamin Beasley
The dippi package has been updated to 3.1.0 for ElementaryOS 6 in Rawhide. 
Upstream clarified the licensing, and the entire program is now GPLv3+ with CC0 
AppStream metadata. Based on this, and on recent discussion suggesting a 
community preference for using effective licenses where feasible, the License 
field has been updated from “GPLv3+ and GPLv2+ and CC0” to "GPLv3+".
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Aleksandra Fedorova
Hi,

On Sun, Jun 20, 2021 at 1:30 PM Neal Gompa  wrote:
>
> On Sun, Jun 20, 2021 at 7:10 AM Peter Robinson  wrote:
> >
> > > With things like [0] (TL;DR: bots submitting broken builds to rawhide)
> > > becoming a more regular occurrence, I propose that we extend the
> > > existing Updates Policy [1] to make it explicit that bots are not
> > > allowed to submit builds / updates - even to rawhide - unattended:
> > > "Rawhide is not your CI environment."
> >
> > I don't think that's good for either the packages that are using bots
> > or for Fedora as a whole.
> >
> > While the bots certainly don't always get it right nor do the humans
> > and I would garner that there's a lot more problems introduced in this
> > way by humans, over the years I've spent considerable time fixing
> > issues like this introduced by humans. Do we ban humans too? Do we ban
> > RHBZ bots as well because they don't always get it right either?
> > Ultimately automation is hard, but ultimately I feel it generally gets
> > it wrong no less than humans do, and generally in a consistent way at
> > least.
> >
> > > Currently, the Updates Policy states:
> > >
> > > - packagers must verify that no known broken builds are pushed,
> > > - packagers must announce ABI and API changes once week in advance,
> > > - packagers must not push pre-release versions of low-level packages.
> > >
> > > While it is debatable whether podman + friends +
> > > container-stuff-dependencies count as "low-level" packages, they *are*
> > > installed by default in Workstation. I think it is clear that by using
> > > a bot to automatically push pre-release snapshots as rawhide updates,
> > > the first two requirements CANNOT be met.
> > >
> > > I would like to make this conflict explicit and add a statement like
> > > this to the Updates Policy: "Automated systems / bots are not allowed
> > > to submit new builds for inclusion into Fedora without the involvement
> > > of a packager."
> >
> > Please no.
> >
> > > The following things should still be allowed:
> > > - releng and SIGs submitting scripted mass rebuilds (no actual package
> > > changes, triggered by a person)
> > > - bots submitting rawhide builds for ELN (no package change, just
> > > built for different buildroot)
> > >
> > > The following should be explicitly banned:
> > > - bots submitting new, non-scratch snapshot builds of software to
> > > rawhide unattended (often leading to broken versions, versioning
> > > snafus, or blatant errors leading to package downgrades, as it
> > > happened today [0])
> >
> > The problem with this is we will likely drive away contributors,
> > packaging takes a lot of time, especially if you've got a stack of
> > packages that are part of a group.
> >
> > Over the years there's been a bunch of effort all over the place to
> > automate some of this, from tito, the upstream monitoring project
> > thing (the new hottness or what ever it's called), packit and the rh
> > container bot. None of them are perfect and all have their quirks.
> >
> > I would much sooner an officially support/ed/sanctioned auto packaging
> > bot that upstreams can integrate into their projects to do automated
> > packaging so they can get on and do more useful work either upstream
> > or within the project. With something that is a "one true automated
> > way" it would at least be consistent in the results.
> >
> > > There is already a requirement that no packager should submit builds
> > > that are never intended to go "stable", and I see this as a similar
> > > requirement - since those snapshot builds are presumably only done for
> > > automated CI purposes without the intention of them ever reaching
> > > stable Fedora releases, where they are superseded by packager-created
> > > manual builds of those packages - but leaving Rawhide with unstable,
> > > bot-created snapshot builds.
> >
> > I find the automated builds, in conjunction with OpenQA testing, very
> > useful for IoT as they've caught a number of issues with upstream
> > which likely wouldn't have been caught before the release goes stable
> > and hence gets into stable IoT releases, it doesn't catch everything
> > but the more it catches the better off the project is as a whole.
> >
> > I would much sooner the effort here goes into a sanctioned package
> > build bot than trying to ban things TBH.
> >
>
> Most of our rules are designed to make sure there's someone ultimately
> responsible for everything going into Fedora. Unfortunately, bots are
> the opposite of that, because there's no one to reach to stop bad
> behavior when it happens.
>
> Rawhide is still not your CI environment.

By the way I think we need to reconsider this statement.

I think I understand the intent, but the statement itself is
misleading, if not wrong, when taken out of context. For a person
outside of the bubble it is hard to understand and it seems to be
contradicting with the idea of Rawhide being the integrated
development branch of the Fedora Linux 

Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Peter Robinson
On Sun, Jun 20, 2021 at 12:31 PM Neal Gompa  wrote:
>
> On Sun, Jun 20, 2021 at 7:10 AM Peter Robinson  wrote:
> >
> > > With things like [0] (TL;DR: bots submitting broken builds to rawhide)
> > > becoming a more regular occurrence, I propose that we extend the
> > > existing Updates Policy [1] to make it explicit that bots are not
> > > allowed to submit builds / updates - even to rawhide - unattended:
> > > "Rawhide is not your CI environment."
> >
> > I don't think that's good for either the packages that are using bots
> > or for Fedora as a whole.
> >
> > While the bots certainly don't always get it right nor do the humans
> > and I would garner that there's a lot more problems introduced in this
> > way by humans, over the years I've spent considerable time fixing
> > issues like this introduced by humans. Do we ban humans too? Do we ban
> > RHBZ bots as well because they don't always get it right either?
> > Ultimately automation is hard, but ultimately I feel it generally gets
> > it wrong no less than humans do, and generally in a consistent way at
> > least.
> >
> > > Currently, the Updates Policy states:
> > >
> > > - packagers must verify that no known broken builds are pushed,
> > > - packagers must announce ABI and API changes once week in advance,
> > > - packagers must not push pre-release versions of low-level packages.
> > >
> > > While it is debatable whether podman + friends +
> > > container-stuff-dependencies count as "low-level" packages, they *are*
> > > installed by default in Workstation. I think it is clear that by using
> > > a bot to automatically push pre-release snapshots as rawhide updates,
> > > the first two requirements CANNOT be met.
> > >
> > > I would like to make this conflict explicit and add a statement like
> > > this to the Updates Policy: "Automated systems / bots are not allowed
> > > to submit new builds for inclusion into Fedora without the involvement
> > > of a packager."
> >
> > Please no.
> >
> > > The following things should still be allowed:
> > > - releng and SIGs submitting scripted mass rebuilds (no actual package
> > > changes, triggered by a person)
> > > - bots submitting rawhide builds for ELN (no package change, just
> > > built for different buildroot)
> > >
> > > The following should be explicitly banned:
> > > - bots submitting new, non-scratch snapshot builds of software to
> > > rawhide unattended (often leading to broken versions, versioning
> > > snafus, or blatant errors leading to package downgrades, as it
> > > happened today [0])
> >
> > The problem with this is we will likely drive away contributors,
> > packaging takes a lot of time, especially if you've got a stack of
> > packages that are part of a group.
> >
> > Over the years there's been a bunch of effort all over the place to
> > automate some of this, from tito, the upstream monitoring project
> > thing (the new hottness or what ever it's called), packit and the rh
> > container bot. None of them are perfect and all have their quirks.
> >
> > I would much sooner an officially support/ed/sanctioned auto packaging
> > bot that upstreams can integrate into their projects to do automated
> > packaging so they can get on and do more useful work either upstream
> > or within the project. With something that is a "one true automated
> > way" it would at least be consistent in the results.
> >
> > > There is already a requirement that no packager should submit builds
> > > that are never intended to go "stable", and I see this as a similar
> > > requirement - since those snapshot builds are presumably only done for
> > > automated CI purposes without the intention of them ever reaching
> > > stable Fedora releases, where they are superseded by packager-created
> > > manual builds of those packages - but leaving Rawhide with unstable,
> > > bot-created snapshot builds.
> >
> > I find the automated builds, in conjunction with OpenQA testing, very
> > useful for IoT as they've caught a number of issues with upstream
> > which likely wouldn't have been caught before the release goes stable
> > and hence gets into stable IoT releases, it doesn't catch everything
> > but the more it catches the better off the project is as a whole.
> >
> > I would much sooner the effort here goes into a sanctioned package
> > build bot than trying to ban things TBH.
> >
>
> Most of our rules are designed to make sure there's someone ultimately
> responsible for everything going into Fedora. Unfortunately, bots are
> the opposite of that, because there's no one to reach to stop bad
> behavior when it happens.

So that should be fixed so that each bot has a contact so that
problems have means of escalation.

> Rawhide is still not your CI environment. Years ago, we got rid of
> alphas for the express purpose to stabilize Rawhide into alpha
> quality. Stuff like this degrades the quality of Rawhide because they
> make the assumption that nobody cares about the quality of Rawhide.

Being one of the people 

Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Neal Gompa
On Sun, Jun 20, 2021 at 7:10 AM Peter Robinson  wrote:
>
> > With things like [0] (TL;DR: bots submitting broken builds to rawhide)
> > becoming a more regular occurrence, I propose that we extend the
> > existing Updates Policy [1] to make it explicit that bots are not
> > allowed to submit builds / updates - even to rawhide - unattended:
> > "Rawhide is not your CI environment."
>
> I don't think that's good for either the packages that are using bots
> or for Fedora as a whole.
>
> While the bots certainly don't always get it right nor do the humans
> and I would garner that there's a lot more problems introduced in this
> way by humans, over the years I've spent considerable time fixing
> issues like this introduced by humans. Do we ban humans too? Do we ban
> RHBZ bots as well because they don't always get it right either?
> Ultimately automation is hard, but ultimately I feel it generally gets
> it wrong no less than humans do, and generally in a consistent way at
> least.
>
> > Currently, the Updates Policy states:
> >
> > - packagers must verify that no known broken builds are pushed,
> > - packagers must announce ABI and API changes once week in advance,
> > - packagers must not push pre-release versions of low-level packages.
> >
> > While it is debatable whether podman + friends +
> > container-stuff-dependencies count as "low-level" packages, they *are*
> > installed by default in Workstation. I think it is clear that by using
> > a bot to automatically push pre-release snapshots as rawhide updates,
> > the first two requirements CANNOT be met.
> >
> > I would like to make this conflict explicit and add a statement like
> > this to the Updates Policy: "Automated systems / bots are not allowed
> > to submit new builds for inclusion into Fedora without the involvement
> > of a packager."
>
> Please no.
>
> > The following things should still be allowed:
> > - releng and SIGs submitting scripted mass rebuilds (no actual package
> > changes, triggered by a person)
> > - bots submitting rawhide builds for ELN (no package change, just
> > built for different buildroot)
> >
> > The following should be explicitly banned:
> > - bots submitting new, non-scratch snapshot builds of software to
> > rawhide unattended (often leading to broken versions, versioning
> > snafus, or blatant errors leading to package downgrades, as it
> > happened today [0])
>
> The problem with this is we will likely drive away contributors,
> packaging takes a lot of time, especially if you've got a stack of
> packages that are part of a group.
>
> Over the years there's been a bunch of effort all over the place to
> automate some of this, from tito, the upstream monitoring project
> thing (the new hottness or what ever it's called), packit and the rh
> container bot. None of them are perfect and all have their quirks.
>
> I would much sooner an officially support/ed/sanctioned auto packaging
> bot that upstreams can integrate into their projects to do automated
> packaging so they can get on and do more useful work either upstream
> or within the project. With something that is a "one true automated
> way" it would at least be consistent in the results.
>
> > There is already a requirement that no packager should submit builds
> > that are never intended to go "stable", and I see this as a similar
> > requirement - since those snapshot builds are presumably only done for
> > automated CI purposes without the intention of them ever reaching
> > stable Fedora releases, where they are superseded by packager-created
> > manual builds of those packages - but leaving Rawhide with unstable,
> > bot-created snapshot builds.
>
> I find the automated builds, in conjunction with OpenQA testing, very
> useful for IoT as they've caught a number of issues with upstream
> which likely wouldn't have been caught before the release goes stable
> and hence gets into stable IoT releases, it doesn't catch everything
> but the more it catches the better off the project is as a whole.
>
> I would much sooner the effort here goes into a sanctioned package
> build bot than trying to ban things TBH.
>

Most of our rules are designed to make sure there's someone ultimately
responsible for everything going into Fedora. Unfortunately, bots are
the opposite of that, because there's no one to reach to stop bad
behavior when it happens.

Rawhide is still not your CI environment. Years ago, we got rid of
alphas for the express purpose to stabilize Rawhide into alpha
quality. Stuff like this degrades the quality of Rawhide because they
make the assumption that nobody cares about the quality of Rawhide.

If you want the features of Rawhide for CI, then we should talk about
enabling this in more places. For example, there's no technical reason
we couldn't do OpenQA runs for packages in COPR. There are serious
consequences to shipping packages into Rawhide, not the least of which
is that it locks an NVR forever into Koji and ships it to people using
Rawhide as a 

Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Peter Robinson
> With things like [0] (TL;DR: bots submitting broken builds to rawhide)
> becoming a more regular occurrence, I propose that we extend the
> existing Updates Policy [1] to make it explicit that bots are not
> allowed to submit builds / updates - even to rawhide - unattended:
> "Rawhide is not your CI environment."

I don't think that's good for either the packages that are using bots
or for Fedora as a whole.

While the bots certainly don't always get it right nor do the humans
and I would garner that there's a lot more problems introduced in this
way by humans, over the years I've spent considerable time fixing
issues like this introduced by humans. Do we ban humans too? Do we ban
RHBZ bots as well because they don't always get it right either?
Ultimately automation is hard, but ultimately I feel it generally gets
it wrong no less than humans do, and generally in a consistent way at
least.

> Currently, the Updates Policy states:
>
> - packagers must verify that no known broken builds are pushed,
> - packagers must announce ABI and API changes once week in advance,
> - packagers must not push pre-release versions of low-level packages.
>
> While it is debatable whether podman + friends +
> container-stuff-dependencies count as "low-level" packages, they *are*
> installed by default in Workstation. I think it is clear that by using
> a bot to automatically push pre-release snapshots as rawhide updates,
> the first two requirements CANNOT be met.
>
> I would like to make this conflict explicit and add a statement like
> this to the Updates Policy: "Automated systems / bots are not allowed
> to submit new builds for inclusion into Fedora without the involvement
> of a packager."

Please no.

> The following things should still be allowed:
> - releng and SIGs submitting scripted mass rebuilds (no actual package
> changes, triggered by a person)
> - bots submitting rawhide builds for ELN (no package change, just
> built for different buildroot)
>
> The following should be explicitly banned:
> - bots submitting new, non-scratch snapshot builds of software to
> rawhide unattended (often leading to broken versions, versioning
> snafus, or blatant errors leading to package downgrades, as it
> happened today [0])

The problem with this is we will likely drive away contributors,
packaging takes a lot of time, especially if you've got a stack of
packages that are part of a group.

Over the years there's been a bunch of effort all over the place to
automate some of this, from tito, the upstream monitoring project
thing (the new hottness or what ever it's called), packit and the rh
container bot. None of them are perfect and all have their quirks.

I would much sooner an officially support/ed/sanctioned auto packaging
bot that upstreams can integrate into their projects to do automated
packaging so they can get on and do more useful work either upstream
or within the project. With something that is a "one true automated
way" it would at least be consistent in the results.

> There is already a requirement that no packager should submit builds
> that are never intended to go "stable", and I see this as a similar
> requirement - since those snapshot builds are presumably only done for
> automated CI purposes without the intention of them ever reaching
> stable Fedora releases, where they are superseded by packager-created
> manual builds of those packages - but leaving Rawhide with unstable,
> bot-created snapshot builds.

I find the automated builds, in conjunction with OpenQA testing, very
useful for IoT as they've caught a number of issues with upstream
which likely wouldn't have been caught before the release goes stable
and hence gets into stable IoT releases, it doesn't catch everything
but the more it catches the better off the project is as a whole.

I would much sooner the effort here goes into a sanctioned package
build bot than trying to ban things TBH.

Peter
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Cloud-34-20210620.0 compose check report

2021-06-20 Thread Fedora compose checker
No missing expected images.

Failed openQA tests: 8/8 (x86_64)

Old failures (same test failed in Fedora-Cloud-34-20210619.0):

ID: 912645  Test: x86_64 Cloud_Base-qcow2-qcow2 base_reboot_unmount
URL: https://openqa.fedoraproject.org/tests/912645
ID: 912646  Test: x86_64 Cloud_Base-qcow2-qcow2 base_services_start
URL: https://openqa.fedoraproject.org/tests/912646
ID: 912647  Test: x86_64 Cloud_Base-qcow2-qcow2 base_update_cli
URL: https://openqa.fedoraproject.org/tests/912647
ID: 912648  Test: x86_64 Cloud_Base-qcow2-qcow2 base_package_install_remove
URL: https://openqa.fedoraproject.org/tests/912648
ID: 912649  Test: x86_64 Cloud_Base-qcow2-qcow2 base_system_logging
URL: https://openqa.fedoraproject.org/tests/912649
ID: 912650  Test: x86_64 Cloud_Base-qcow2-qcow2 base_service_manipulation
URL: https://openqa.fedoraproject.org/tests/912650
ID: 912651  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/912651
ID: 912652  Test: x86_64 Cloud_Base-qcow2-qcow2 base_selinux
URL: https://openqa.fedoraproject.org/tests/912652

Soft failed openQA tests: 1/8 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Cloud-34-20210619.0):

ID: 912657  Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/912657

Passed openQA tests: 7/8 (aarch64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Fabio Valentini
On Sun, Jun 20, 2021 at 10:45 AM Miro Hrončok  wrote:
>
> I think this is a good idea. This particular bot has a history of misbehavior
> and rather than banning all the well behaving bots (that be definition we 
> don't
> even know about, because they behave good), we should disable this particular 
> one.
>
> Rather than "no bots allowed" policy, we might need a "bots that violate our
> policies and guidelines or have a tendency to break things will be disabled
> until fixed" policy.

Yeah, that works for me too. Though I wouldn't want to make this a
special case and create an actual policy for this instead, that we
could point to when something like this happens.

I also think that I probably was not clear in my original message.

Any builds that are triggered by an actual human action, like
- scripted (mass) rebuilds with no *Version* changes,
- automatic builds after human-approved PRs,
- etc.
are of course exempt, because the action of an actual human being
triggered them.

The only thing I *don't* want is: Bots submitting builds for new
*Versions*, without human interaction.

Regarding Zbyszek's point:

> Second, I think the guideline is simply wrong. As counterexamples, we
> currently have python3.10beta2 in rawhide, systemd-249-rc1, and
> kernel-5.13.0-0.rc6. Pushing pre-release vesions of low-level packages
> is a crucial part of development of the distro and collaboration with
> upstream projects and language ecosystems.

There's actually already an exemption in the Updates Policy for those cases.
And I don't have any problem with those, because those builds are
prepared, built, tested, and shepherded by actual humans, instead of
created by a bot that just throws them at the wall to see what sticks
and what doesn't.

If you look at bodhi updates for rhcontainerbot it's pretty obvious
that nobody even looks at the updates that are created for those
builds:
https://bodhi.fedoraproject.org/updates/?search==testing=rhcontainerbot
It looks like any build that receives -1 karma or fails gating tests
will just be stuck in "testing" until obsoleted by the next automated
build for that package.

Fabio
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Miro Hrončok

On 20. 06. 21 9:39, Zbigniew Jędrzejewski-Szmek wrote:

I think we should just disable this particular bot until it fixed.
We should also clarify/update the Update Guidelines so that undesirable
updates are disallowed, no matter if submitted by a bot or a human.


I think this is a good idea. This particular bot has a history of misbehavior 
and rather than banning all the well behaving bots (that be definition we don't 
even know about, because they behave good), we should disable this particular one.


Rather than "no bots allowed" policy, we might need a "bots that violate our 
policies and guidelines or have a tendency to break things will be disabled 
until fixed" policy.


--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Miro Hrončok

On 19. 06. 21 22:18, Fabio Valentini wrote:

The following things should still be allowed:
- releng and SIGs submitting scripted mass rebuilds (no actual package
changes, triggered by a person)
- bots submitting rawhide builds for ELN (no package change, just
built for different buildroot)


Other random ideas of what should be allowed:

 - a human approves a pull request, bot merges it and builds

 - a bot rebuilds packages automatically (bump-only or no changes), when 
dependencies change


--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1973908] perl-App-Cmd-0.334 is available

2021-06-20 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1973908

Emmanuel Seyman  changed:

   What|Removed |Added

 Status|NEW |CLOSED
   Fixed In Version||perl-App-Cmd-0.334-1.fc35
 Resolution|--- |RAWHIDE
   Doc Type|--- |If docs needed, set a value
Last Closed||2021-06-20 08:20:00



--- Comment #1 from Emmanuel Seyman  ---
Built for rawhide:
https://koji.fedoraproject.org/koji/buildinfo?buildID=1773975


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1973898] perl-Test-Routine-0.028 is available

2021-06-20 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1973898

Emmanuel Seyman  changed:

   What|Removed |Added

 Status|NEW |CLOSED
   Fixed In Version||perl-Test-Routine-0.028-1.f
   ||c35
 Resolution|--- |RAWHIDE
   Doc Type|--- |If docs needed, set a value
Last Closed||2021-06-20 08:18:24



--- Comment #1 from Emmanuel Seyman  ---
Built for rawhide:
https://koji.fedoraproject.org/koji/buildinfo?buildID=1773998


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1973648] perl-Crypt-RandPasswd-0.07 is available

2021-06-20 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1973648

Emmanuel Seyman  changed:

   What|Removed |Added

 Status|NEW |CLOSED
   Fixed In Version||perl-Crypt-RandPasswd-0.07-
   ||1.fc35
 Resolution|--- |RAWHIDE
   Doc Type|--- |If docs needed, set a value
Last Closed||2021-06-20 08:17:34



--- Comment #1 from Emmanuel Seyman  ---
Built for rawhide:
https://koji.fedoraproject.org/koji/buildinfo?buildID=1773977


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1973290] perl-Email-Sender-1.300036 is available

2021-06-20 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1973290

Emmanuel Seyman  changed:

   What|Removed |Added

 Status|NEW |CLOSED
   Fixed In Version||perl-Email-Sender-1.300036-
   ||1.fc35
 Resolution|--- |RAWHIDE
   Doc Type|--- |If docs needed, set a value
Last Closed||2021-06-20 08:15:44



--- Comment #1 from Emmanuel Seyman  ---
Built for rawhide:
https://koji.fedoraproject.org/koji/buildinfo?buildID=1773979


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-20 Thread Zbigniew Jędrzejewski-Szmek
On Sat, Jun 19, 2021 at 10:18:45PM +0200, Fabio Valentini wrote:
> Hi everybody,
> 
> With things like [0] (TL;DR: bots submitting broken builds to rawhide)
> becoming a more regular occurrence, I propose that we extend the
> existing Updates Policy [1] to make it explicit that bots are not
> allowed to submit builds / updates - even to rawhide - unattended:
> "Rawhide is not your CI environment."

I agree with the goal of avoiding random snapshot packages in rawhide,
but I disagree that banning bots is the way to achieve that. In this
particular case, the problem is that the bot is either buggy or
misconfigured or both. (I hope that the discussion in the other thread
can clarify what went wrong.)

A blanket ban for automated updates doesn't directly address the problem
(because even a human could push the same broken snapshots to rawhide),
and will constrain future development.

[For example, let's say we make a bot that looks at the huge Python3.10
FTBFS/FTI dependency tree, watches bugzilla events, and automatically
fires off a no-change rebuild of packages for which all depended-on
have been closed. It would be forbidden by this policy, even though
it wouldn't cause those kinds of problems we have now.]

I think we should just disable this particular bot until it fixed.
We should also clarify/update the Update Guidelines so that undesirable
updates are disallowed, no matter if submitted by a bot or a human.

> Currently, the Updates Policy states:
> 
> - packagers must verify that no known broken builds are pushed,
> - packagers must announce ABI and API changes once week in advance,
> - packagers must not push pre-release versions of low-level packages.
> 
> While it is debatable whether podman + friends +
> container-stuff-dependencies count as "low-level" packages, they *are*
> installed by default in Workstation. I think it is clear that by using
> a bot to automatically push pre-release snapshots as rawhide updates,
> the first two requirements CANNOT be met.

First, I think podman fits the intent of this guideline, even if not
the letter.

Second, I think the guideline is simply wrong. As counterexamples, we
currently have python3.10beta2 in rawhide, systemd-249-rc1, and
kernel-5.13.0-0.rc6. Pushing pre-release vesions of low-level packages
is a crucial part of development of the distro and collaboration with
upstream projects and language ecosystems.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Cloud-33-20210620.0 compose check report

2021-06-20 Thread Fedora compose checker
No missing expected images.

Soft failed openQA tests: 1/8 (x86_64), 1/8 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Cloud-33-20210619.0):

ID: 912635  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/912635
ID: 912641  Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/912641

Passed openQA tests: 7/8 (x86_64), 7/8 (aarch64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora rawhide compose report: 20210619.n.0 changes

2021-06-20 Thread Zbigniew Jędrzejewski-Szmek
On Sat, Jun 19, 2021 at 03:44:11PM +0200, Fabio Valentini wrote:
> On Sat, Jun 19, 2021 at 2:52 PM Fedora Rawhide Report
>  wrote:
> >
> > = DOWNGRADED PACKAGES =
> > Package:  crun-0.19.1.13-0.15.git63400f2.fc35
> > Old package:  crun-0.20.1.3-0.14.git9dec366.fc35
> > Summary:  OCI runtime written in C
> > RPMs: crun
> > Size: 846.40 KiB
> > Size change:  -6.22 KiB
> > Changelog:
> >   * Sat Jun 19 2021 RH Container Bot  - 
> > 0.19.1.13-0.15.git63400f2
> >   - bump to 0.19.1.13
> >   - autobuilt 63400f2
> >
> >
> > Package:  fuse-overlayfs-0.7.8-2.dev.git5f666c1.fc35
> > Old package:  fuse-overlayfs-1.6-3.dev.git91a020f.fc35
> > Summary:  FUSE overlay+shiftfs implementation for rootless containers
> > RPMs: fuse-overlayfs
> > Size: 348.69 KiB
> > Size change:  -18.67 KiB
> > Changelog:
> >   * Sat Jun 19 2021 RH Container Bot  - 
> > 0.7.8-2.dev.git5f666c1
> >   - bump to 0.7.8
> >   - autobuilt 5f666c1
> 
> I swear ... is rhcontainerbot at it again?
> https://pagure.io/fesco/issue/2624
> 
> Both of those look like obvious mistakes, since they're not just
> "versioning snafu"s but real version downgrades.

What *is* the purpose of RH Container Bot? A google search shows various
repos seemingly used by it, but why and how?

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure