[Bug 1976426] perl-Data-Dump-1.25 is available

2021-06-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1976426

Upstream Release Monitoring  
changed:

   What|Removed |Added

Summary|perl-Data-Dump-1.24 is  |perl-Data-Dump-1.25 is
   |available   |available



--- Comment #1 from Upstream Release Monitoring 
 ---
Latest upstream release: 1.25
Current version/release in rawhide: 1.23-17.fc35
URL: http://search.cpan.org/dist/Data-Dump/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/6648/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1976426] New: perl-Data-Dump-1.24 is available

2021-06-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1976426

Bug ID: 1976426
   Summary: perl-Data-Dump-1.24 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Data-Dump
  Keywords: FutureFeature, Triaged
  Assignee: p...@city-fan.org
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: iarn...@gmail.com, mspa...@redhat.com,
p...@city-fan.org, perl-devel@lists.fedoraproject.org
  Target Milestone: ---
Classification: Fedora



Latest upstream release: 1.24
Current version/release in rawhide: 1.23-17.fc35
URL: http://search.cpan.org/dist/Data-Dump/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/6648/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[EPEL-devel] Fedora EPEL 8 updates-testing report

2021-06-25 Thread updates
The following Fedora EPEL 8 Security updates need testing:
 Age  URL
  13  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-a6e2c9bc8c   
radare2-5.3.1-1.el8
  12  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-0209079fce   
aom-3.1.1-1.el8
   4  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-698907eb45   
quassel-0.13.1-8.el8


The following builds have been pushed to Fedora EPEL 8 updates-testing

openbgpd-7.1-1.el8

Details about builds:



 openbgpd-7.1-1.el8 (FEDORA-EPEL-2021-d70d94d1f8)
 OpenBGPD Routing Daemon

Update Information:

OpenBGPD 7.1   This release includes the following changes to the
previous release:* OpenBSD 6.9 errata 009  During `bgpd(8)` config
reloads prefixes of the wrong address family could leak to peers resulting in
session resets.* Support for RFC 7313 - Enhanced Route Refresh  Disabled
by default, to enable use `announce enhanced refresh yes`.* Improve output
of Adj-RIB-Out by updating nexthop and `ASPATH` before adding the prefix to the
RIB. This improves `bgpctl show rib out` output.* Add command line option to
show the version

ChangeLog:

* Fri Jun 25 2021 Robert Scheck  7.1-1
- Upgrade to 7.1 (#1976160)

References:

  [ 1 ] Bug #1976160 - openbgpd-7.1 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1976160


___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[EPEL-devel] Fedora EPEL 7 updates-testing report

2021-06-25 Thread updates
The following Fedora EPEL 7 Security updates need testing:
 Age  URL
  29  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-1f259a45ef   
openjpeg2-2.3.1-11.el7
  29  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-9eaea6f65c   
audacious-plugins-4.0.5-4.el7 fluidsynth-2.1.8-4.el7
  13  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-c4678a5e4b   
radare2-5.3.1-1.el7
  12  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-49226a1ff0   
aom-3.1.1-1.el7
   8  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-92a8baa028   
tor-0.3.5.15-1.el7
   3  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-d4d814b358   
quassel-0.12.5-2.el7
   1  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-1ad14f84b0   
ansible-2.9.23-1.el7


The following builds have been pushed to Fedora EPEL 7 updates-testing

openbgpd-7.1-1.el7

Details about builds:



 openbgpd-7.1-1.el7 (FEDORA-EPEL-2021-f2f7cc64c9)
 OpenBGPD Routing Daemon

Update Information:

OpenBGPD 7.1   This release includes the following changes to the
previous release:* OpenBSD 6.9 errata 009  During `bgpd(8)` config
reloads prefixes of the wrong address family could leak to peers resulting in
session resets.* Support for RFC 7313 - Enhanced Route Refresh  Disabled
by default, to enable use `announce enhanced refresh yes`.* Improve output
of Adj-RIB-Out by updating nexthop and `ASPATH` before adding the prefix to the
RIB. This improves `bgpctl show rib out` output.* Add command line option to
show the version

ChangeLog:

* Fri Jun 25 2021 Robert Scheck  7.1-1
- Upgrade to 7.1 (#1976160)

References:

  [ 1 ] Bug #1976160 - openbgpd-7.1 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1976160


___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1972385] perl-POE-Component-IRC-6.93 is available

2021-06-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1972385

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version|perl-POE-Component-IRC-6.93 |perl-POE-Component-IRC-6.93
   |-1.fc35 |-1.fc35
   |perl-POE-Component-IRC-6.93 |perl-POE-Component-IRC-6.93
   |-1.fc34 |-1.fc34
   ||perl-POE-Component-IRC-6.93
   ||-1.fc33



--- Comment #7 from Fedora Update System  ---
FEDORA-2021-e69f1c2e75 has been pushed to the Fedora 33 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1972385] perl-POE-Component-IRC-6.93 is available

2021-06-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1972385

Fedora Update System  changed:

   What|Removed |Added

 Status|ON_QA   |CLOSED
   Fixed In Version|perl-POE-Component-IRC-6.93 |perl-POE-Component-IRC-6.93
   |-1.fc35 |-1.fc35
   ||perl-POE-Component-IRC-6.93
   ||-1.fc34
 Resolution|--- |ERRATA
Last Closed||2021-06-26 01:00:59



--- Comment #6 from Fedora Update System  ---
FEDORA-2021-777c04ebc1 has been pushed to the Fedora 34 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-25 Thread Adam Williamson
On Fri, 2021-06-25 at 15:42 -0400, Daniel Walsh wrote:
> 
> And sometimes this breakage is caused by other parts of the system. For 
> example a kernel update caused breakage in Podman when it suddenly 
> enabled overlay mounts, which no one had tried.  We quickly fixed the 
> container-selinux package to handle it, and got the fixes in F33 and F34 
> before the kernel showed up.
> 
> If we remove Podman updates from Rawhide other then when we prepare for 
> release. Their will be errors that do not get caught early.
> 
> Forcing us to treat Rawhide like we do F34 makes Rawhide less 
> interesting to the container effort.

I don't believe anyone suggested anything of the sort, though. The
initial post in this thread proposed banning automated builds. The
discussion has touched on the problems of automated dumps of random git
snapshots with no manual involvement and the lack of any kind of
attention to Bodhi comments. The actual issues raised in the thread can
all be addressed without "treat[ing] Rawhide like we do F34".
-- 
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[EPEL-devel] Re: Requesting missing devel packages: How to request one be put in RHEL 8 CRB

2021-06-25 Thread Troy Dawson
On Fri, Jun 25, 2021 at 2:02 PM Josh Boyer  wrote:

> On Thu, Jun 24, 2021 at 4:32 PM Troy Dawson  wrote:
> >
> > During our last round of proposals for solutions to missing devel
> packages, it was noted that EPEL and CentOS has very different
> documentation for requesting a package be put into RHEL 8.[1][2]
> >
> > I am betting that CentOS's documentation is correct.  It was written
> after ours.
> >
> > When I was talking to the Red Hat people who know, it was noted that Red
> Hat has much better communication with the Fedora and CentOS communities
> than the EPEL community.[3]  They wanted to start fixing that communication
> gap, and figured this would be a good way to start.  So I'm asking Josh
> Boyer to answer this question on behalf of Red Hat.
>
> Thanks, Troy!
>
> > How would Red Hat like us, EPEL maintainers and developers, to request
> missing devel packages?  (devel packages that are built at the same time as
> a released library in RHEL8, but not released in RHEL8.  Such as lmdb-devel)
>
> The process as documented on the CentOS wiki page is the best route.
> Filing a bug against the package in the Red Hat Enterprise Linux
> product family with the CentOS Stream version set will ensure that
> both the team maintaining the package in RHEL and some from the CentOS
> Stream team are looped in.  Getting the request in front of the owning
> RHEL team is key, as they will need to evaluate the request and
> consider the implications of providing the devel package.
>
> I would like to make sure and clarify that this is the best approach
> for devel packages from SRPMs that are already part of RHEL.
> Completely new package requests for things that are not in RHEL at all
> are RFEs that should likely come through a case filed in the Customer
> Portal for those that have a valid subscription.
>
> > If we follow Red Hat's procedure, what are the odds that the package
> will make it into RHEL 8 CRB?
>
> This one is harder to answer in a general sense.  I don't want to be
> misleading, so I won't give odds because it will vary depending on the
> package.  I'll certainly say the odds are better if the requests are
> made than if they aren't :)  We have grown the CRB content set by over
> 100 packages since the initial RHEL 8.0 release, and continue to add
> packages even today.  I'd like to also describe some of the
> considerations at play as we work on this.
>
> Essentially, the team that owns the package will evaluate the request
> to ensure it's consistent with the manner in which the package is
> intended to be used as part of RHEL.  Often enabling other software to
> build against a RHEL package, particularly for things like EPEL
> enablement, is a perfectly valid use case.  Once a valid use case has
> been established the team will ensure they can meet any obligations
> required by adding it as part of the RHEL product and sign off.  After
> the team has agreed, the package will first appear in CentOS Stream
> PowerTools (or occasionally AppStream), and then in a future RHEL
> minor release.
>
> At times, we have included a library or package as an internal
> implementation detail and do not encourage wider use of that package
> for other software.  This is a relatively rare case.  I can only think
> of one stand-out package that comes to mind thus far.  If it does
> happen the team may decide not to provide the devel package.  Filing
> the request is often the best way to begin that dialog.  This helps us
> understand how a package is being used and take that into
> consideration for future RHEL releases, and also allows discussion and
> suggestions for alternative packages that may be more suitable in the
> long term.
>
> I'm sure there are many that would simply like all subpackages of all
> SRPMs to be shipped, however that is not the approach RHEL is taking
> from a product perspective.  Blanket requests for everything are not
> likely to go far.  It's simply not actionable at the same level as
> targeted requests.
>
> As an aside, I am particularly encouraged to see EPEL-Next come to
> fruition and combined with CentOS Stream and the broader set of
> packages available in that project buildroot I think there is a lot of
> potential to grow the overall ecosystem.  I believe EPEL has discussed
> this recently with some hesitation, but I would encourage you to
> consider if and how EPEL-Next and CentOS Stream might be leveraged to
> help EPEL proper as well.  From what I've seen, this community is
> amazing and I think there are opportunities there.
>
> Thanks again Troy, for giving me the opportunity to interact with the
> EPEL community.  This is quite overdue.
>
> josh
>
>
Thank you Josh for your reply.  This will help us as we move forward.
We have updated out EPEL FAQ concerning this.

Troy

[1] -

[EPEL-devel] Re: Requesting missing devel packages: How to request one be put in RHEL 8 CRB

2021-06-25 Thread Josh Boyer
On Thu, Jun 24, 2021 at 4:32 PM Troy Dawson  wrote:
>
> During our last round of proposals for solutions to missing devel packages, 
> it was noted that EPEL and CentOS has very different documentation for 
> requesting a package be put into RHEL 8.[1][2]
>
> I am betting that CentOS's documentation is correct.  It was written after 
> ours.
>
> When I was talking to the Red Hat people who know, it was noted that Red Hat 
> has much better communication with the Fedora and CentOS communities than the 
> EPEL community.[3]  They wanted to start fixing that communication gap, and 
> figured this would be a good way to start.  So I'm asking Josh Boyer to 
> answer this question on behalf of Red Hat.

Thanks, Troy!

>
> How would Red Hat like us, EPEL maintainers and developers, to request 
> missing devel packages?  (devel packages that are built at the same time as a 
> released library in RHEL8, but not released in RHEL8.  Such as lmdb-devel)

The process as documented on the CentOS wiki page is the best route.
Filing a bug against the package in the Red Hat Enterprise Linux
product family with the CentOS Stream version set will ensure that
both the team maintaining the package in RHEL and some from the CentOS
Stream team are looped in.  Getting the request in front of the owning
RHEL team is key, as they will need to evaluate the request and
consider the implications of providing the devel package.

I would like to make sure and clarify that this is the best approach
for devel packages from SRPMs that are already part of RHEL.
Completely new package requests for things that are not in RHEL at all
are RFEs that should likely come through a case filed in the Customer
Portal for those that have a valid subscription.

> If we follow Red Hat's procedure, what are the odds that the package will 
> make it into RHEL 8 CRB?

This one is harder to answer in a general sense.  I don't want to be
misleading, so I won't give odds because it will vary depending on the
package.  I'll certainly say the odds are better if the requests are
made than if they aren't :)  We have grown the CRB content set by over
100 packages since the initial RHEL 8.0 release, and continue to add
packages even today.  I'd like to also describe some of the
considerations at play as we work on this.

Essentially, the team that owns the package will evaluate the request
to ensure it's consistent with the manner in which the package is
intended to be used as part of RHEL.  Often enabling other software to
build against a RHEL package, particularly for things like EPEL
enablement, is a perfectly valid use case.  Once a valid use case has
been established the team will ensure they can meet any obligations
required by adding it as part of the RHEL product and sign off.  After
the team has agreed, the package will first appear in CentOS Stream
PowerTools (or occasionally AppStream), and then in a future RHEL
minor release.

At times, we have included a library or package as an internal
implementation detail and do not encourage wider use of that package
for other software.  This is a relatively rare case.  I can only think
of one stand-out package that comes to mind thus far.  If it does
happen the team may decide not to provide the devel package.  Filing
the request is often the best way to begin that dialog.  This helps us
understand how a package is being used and take that into
consideration for future RHEL releases, and also allows discussion and
suggestions for alternative packages that may be more suitable in the
long term.

I'm sure there are many that would simply like all subpackages of all
SRPMs to be shipped, however that is not the approach RHEL is taking
from a product perspective.  Blanket requests for everything are not
likely to go far.  It's simply not actionable at the same level as
targeted requests.

As an aside, I am particularly encouraged to see EPEL-Next come to
fruition and combined with CentOS Stream and the broader set of
packages available in that project buildroot I think there is a lot of
potential to grow the overall ecosystem.  I believe EPEL has discussed
this recently with some hesitation, but I would encourage you to
consider if and how EPEL-Next and CentOS Stream might be leveraged to
help EPEL proper as well.  From what I've seen, this community is
amazing and I think there are opportunities there.

Thanks again Troy, for giving me the opportunity to interact with the
EPEL community.  This is quite overdue.

josh

>
> Thanks
> Troy Dawson
>
> [1] - 
> https://fedoraproject.org/wiki/EPEL/FAQ#RHEL_8.2B_has_binaries_in_the_release.2C_but_is_missing_some_corresponding_-devel_package._How_do_I_build_a_package_that_needs_that_missing_-devel_package.3F
> [2] - https://wiki.centos.org/FAQ/CentOS8/UnshippedPackages
> [3] - Yes, I write my emails here from my redhat email address, but I do not 
> represent Red Hat in my EPEL capacities.
___
epel-devel mailing list -- 

Re: RFC: Banning bots from submitting automated koji builds

2021-06-25 Thread Fabio Valentini
On Fri, Jun 25, 2021 at 9:43 PM Daniel Walsh  wrote:
>

(snip)

>
> And sometimes this breakage is caused by other parts of the system. For
> example a kernel update caused breakage in Podman when it suddenly
> enabled overlay mounts, which no one had tried.  We quickly fixed the
> container-selinux package to handle it, and got the fixes in F33 and F34
> before the kernel showed up.
>
> If we remove Podman updates from Rawhide other then when we prepare for
> release. Their will be errors that do not get caught early.
>
> Forcing us to treat Rawhide like we do F34 makes Rawhide less
> interesting to the container effort.

That's not what we're asking for. Pushing Betas or RCs into Rawhide makes sense.
But *only if* anybody is actually noticing that, for example, the last
few dozen podman builds didn't even get pushed into rawhide repos
because they failed gating tests.

Fabio
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: use unit names in systemd output by default?

2021-06-25 Thread Florian Weimer
* Colin Walters:

> On Fri, Jun 25, 2021, at 6:21 AM, Zbigniew Jędrzejewski-Szmek wrote:
>> Hi,
>> 
>> systemd has systemd.status_unit_format= / [Manager].StatusUnitFormat=
>> / -Dstatus-unit-format-default= option to use unit names instead of the
>> Description in messages on the kernel console and in logs:
>
> I meant to get back to https://github.com/systemd/systemd/pull/15957
> which I still think is the best.

Is the unit ID already logged as LOG_UNIT_ID?  Maybe users can be
offered a choice when they invoke journalctl?

Thanks,
Florian
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-25 Thread Daniel Walsh

On 6/25/21 16:13, Neal Gompa wrote:

On Fri, Jun 25, 2021 at 3:43 PM Daniel Walsh  wrote:

On 6/25/21 10:25, Neal Gompa wrote:

On Fri, Jun 25, 2021 at 10:15 AM Lokesh Mandvekar
 wrote:

Hi list,


I own the rhcontainerbot account. Apologies it took so long to respond to this 
thread. A number of legitimate concerns have been raised about the bot, so let 
me address those below on behalf of the Containers team.


We have disabled all autobuilds for now.

The podman RC build landing in updates a month ago was a one-off and it has 
been discussed at: 
https://lists.podman.io/archives/list/pod...@lists.podman.io/thread/WYNTH224D5MVBC2RFOG6RPIC52JZFKAB/

The fuse-overlayfs downgrade occurred unintendedly during the upstream branch 
rename from master to main. That has been fixed at: 
https://koji.fedoraproject.org/koji/buildinfo?buildID=1775442
Disabling autobuilds during the branch rename phase would’ve evidently avoided 
this issue.


Going forward:

We will only manually build upstream release tags for Fedora releases. We  
would prefer to send RC tags to Fedora rawhide as that will trigger gating 
tests and allow us to test podman with FCOS and toolbox CIs, so please let us 
know if that would be a deal-breaker.


RCs and final releases are generally okay IMO even for stable
releases, as long as you're prepared to address feedback brought up in
bodhi updates. The problem here is nobody is paying attention to Bodhi
at all.


We may look at re-enabling the bot only for koji builds of upstream releases, 
while bodhi updates will still be manual. We’ll make sure to check for 
breakages / version downgrades before re-enablement. The bot has so far 
compared upstream tags, rpm installability, version number sanity, but 
evidently it has missed a lot of cases including git branch changes.

If we re-enable the bot, we will mention the human’s name and email for every 
changelog entry in every relevant package as well as regularly monitor the 
bot’s email. Please let us know if there are any concerns with this approach.

We will use openSUSE’s OBS for builds of the latest upstream commits for our 
users who need the latest packages. We would need this to check if the latest 
commits in podman work well with new kernel features and selinux.


Team members  will not add karma to containers’ packages, with the exception of 
our QE Engineer who owns our gating tests and is in charge of final testing of 
our builds.  Currently Ed Santiago (FAS: @santiago) owns that responsibility.


The important aspect isn't who is doing it, but that it's actually
*tested* to work. Very serious breakages have happened in the past,
and that's we want to avoid going forward.

And sometimes this breakage is caused by other parts of the system. For
example a kernel update caused breakage in Podman when it suddenly
enabled overlay mounts, which no one had tried.  We quickly fixed the
container-selinux package to handle it, and got the fixes in F33 and F34
before the kernel showed up.

If we remove Podman updates from Rawhide other then when we prepare for
release. Their will be errors that do not get caught early.

Forcing us to treat Rawhide like we do F34 makes Rawhide less
interesting to the container effort.


But none of you are paying attention to Rawhide anyway. As far as I
know, none of you actively run Rawhide, none of you test it, and
nobody is paying attention to when stuff is pushed into Rawhide. This
is the difference between what your team is doing and what I do when I
push snapshots into Rawhide.

If you're going to push stuff into Rawhide, *care* about it.



I ran rawhide for > 10 years so I know the joy and sometimes pain, but I 
will have the team focus more on it going forward.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-25 Thread Neal Gompa
On Fri, Jun 25, 2021 at 3:43 PM Daniel Walsh  wrote:
>
> On 6/25/21 10:25, Neal Gompa wrote:
> > On Fri, Jun 25, 2021 at 10:15 AM Lokesh Mandvekar
> >  wrote:
> >> Hi list,
> >>
> >>
> >> I own the rhcontainerbot account. Apologies it took so long to respond to 
> >> this thread. A number of legitimate concerns have been raised about the 
> >> bot, so let me address those below on behalf of the Containers team.
> >>
> >>
> >> We have disabled all autobuilds for now.
> >>
> >> The podman RC build landing in updates a month ago was a one-off and it 
> >> has been discussed at: 
> >> https://lists.podman.io/archives/list/pod...@lists.podman.io/thread/WYNTH224D5MVBC2RFOG6RPIC52JZFKAB/
> >>
> >> The fuse-overlayfs downgrade occurred unintendedly during the upstream 
> >> branch rename from master to main. That has been fixed at: 
> >> https://koji.fedoraproject.org/koji/buildinfo?buildID=1775442
> >> Disabling autobuilds during the branch rename phase would’ve evidently 
> >> avoided this issue.
> >>
> >>
> >> Going forward:
> >>
> >> We will only manually build upstream release tags for Fedora releases. We  
> >> would prefer to send RC tags to Fedora rawhide as that will trigger gating 
> >> tests and allow us to test podman with FCOS and toolbox CIs, so please let 
> >> us know if that would be a deal-breaker.
> >>
> > RCs and final releases are generally okay IMO even for stable
> > releases, as long as you're prepared to address feedback brought up in
> > bodhi updates. The problem here is nobody is paying attention to Bodhi
> > at all.
> >
> >> We may look at re-enabling the bot only for koji builds of upstream 
> >> releases, while bodhi updates will still be manual. We’ll make sure to 
> >> check for breakages / version downgrades before re-enablement. The bot has 
> >> so far compared upstream tags, rpm installability, version number sanity, 
> >> but evidently it has missed a lot of cases including git branch changes.
> >>
> >> If we re-enable the bot, we will mention the human’s name and email for 
> >> every changelog entry in every relevant package as well as regularly 
> >> monitor the bot’s email. Please let us know if there are any concerns with 
> >> this approach.
> >>
> >> We will use openSUSE’s OBS for builds of the latest upstream commits for 
> >> our users who need the latest packages. We would need this to check if the 
> >> latest commits in podman work well with new kernel features and selinux.
> >>
> >>
> >> Team members  will not add karma to containers’ packages, with the 
> >> exception of our QE Engineer who owns our gating tests and is in charge of 
> >> final testing of our builds.  Currently Ed Santiago (FAS: @santiago) owns 
> >> that responsibility.
> >>
> > The important aspect isn't who is doing it, but that it's actually
> > *tested* to work. Very serious breakages have happened in the past,
> > and that's we want to avoid going forward.
>
> And sometimes this breakage is caused by other parts of the system. For
> example a kernel update caused breakage in Podman when it suddenly
> enabled overlay mounts, which no one had tried.  We quickly fixed the
> container-selinux package to handle it, and got the fixes in F33 and F34
> before the kernel showed up.
>
> If we remove Podman updates from Rawhide other then when we prepare for
> release. Their will be errors that do not get caught early.
>
> Forcing us to treat Rawhide like we do F34 makes Rawhide less
> interesting to the container effort.
>

But none of you are paying attention to Rawhide anyway. As far as I
know, none of you actively run Rawhide, none of you test it, and
nobody is paying attention to when stuff is pushed into Rawhide. This
is the difference between what your team is doing and what I do when I
push snapshots into Rawhide.

If you're going to push stuff into Rawhide, *care* about it.



-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Orphaned packages looking for new maintainers

2021-06-25 Thread Andrew Bauer
Thanks Mikolaj - Just saw your reply and have added you as an admin. 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-25 Thread Daniel Walsh

On 6/25/21 10:25, Neal Gompa wrote:

On Fri, Jun 25, 2021 at 10:15 AM Lokesh Mandvekar
 wrote:

Hi list,


I own the rhcontainerbot account. Apologies it took so long to respond to this 
thread. A number of legitimate concerns have been raised about the bot, so let 
me address those below on behalf of the Containers team.


We have disabled all autobuilds for now.

The podman RC build landing in updates a month ago was a one-off and it has 
been discussed at: 
https://lists.podman.io/archives/list/pod...@lists.podman.io/thread/WYNTH224D5MVBC2RFOG6RPIC52JZFKAB/

The fuse-overlayfs downgrade occurred unintendedly during the upstream branch 
rename from master to main. That has been fixed at: 
https://koji.fedoraproject.org/koji/buildinfo?buildID=1775442
Disabling autobuilds during the branch rename phase would’ve evidently avoided 
this issue.


Going forward:

We will only manually build upstream release tags for Fedora releases. We  
would prefer to send RC tags to Fedora rawhide as that will trigger gating 
tests and allow us to test podman with FCOS and toolbox CIs, so please let us 
know if that would be a deal-breaker.


RCs and final releases are generally okay IMO even for stable
releases, as long as you're prepared to address feedback brought up in
bodhi updates. The problem here is nobody is paying attention to Bodhi
at all.


We may look at re-enabling the bot only for koji builds of upstream releases, 
while bodhi updates will still be manual. We’ll make sure to check for 
breakages / version downgrades before re-enablement. The bot has so far 
compared upstream tags, rpm installability, version number sanity, but 
evidently it has missed a lot of cases including git branch changes.

If we re-enable the bot, we will mention the human’s name and email for every 
changelog entry in every relevant package as well as regularly monitor the 
bot’s email. Please let us know if there are any concerns with this approach.

We will use openSUSE’s OBS for builds of the latest upstream commits for our 
users who need the latest packages. We would need this to check if the latest 
commits in podman work well with new kernel features and selinux.


Team members  will not add karma to containers’ packages, with the exception of 
our QE Engineer who owns our gating tests and is in charge of final testing of 
our builds.  Currently Ed Santiago (FAS: @santiago) owns that responsibility.


The important aspect isn't who is doing it, but that it's actually
*tested* to work. Very serious breakages have happened in the past,
and that's we want to avoid going forward.


And sometimes this breakage is caused by other parts of the system. For 
example a kernel update caused breakage in Podman when it suddenly 
enabled overlay mounts, which no one had tried.  We quickly fixed the 
container-selinux package to handle it, and got the fixes in F33 and F34 
before the kernel showed up.


If we remove Podman updates from Rawhide other then when we prepare for 
release. Their will be errors that do not get caught early.


Forcing us to treat Rawhide like we do F34 makes Rawhide less 
interesting to the container effort.



We will also notify the containers’ communities that rawhide will no longer 
contain the latest builds as some of them are accustomed to using.


Having a COPR would be nice for this. With tools like Packit and such
able to continuously build in COPR for every PR and every commit, you
can provide a fairly nice experience here. I do this with rpmlint, for
example.




___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-IoT-35-20210625.0 compose check report

2021-06-25 Thread Fedora compose checker
No missing expected images.

Failed openQA tests: 6/15 (aarch64), 2/16 (x86_64)

New failures (same test not failed in Fedora-IoT-35-20210623.0):

ID: 916461  Test: aarch64 IoT-dvd_ostree-iso podman@uefi
URL: https://openqa.fedoraproject.org/tests/916461
ID: 916462  Test: aarch64 IoT-dvd_ostree-iso podman_client@uefi
URL: https://openqa.fedoraproject.org/tests/916462
ID: 916469  Test: aarch64 IoT-dvd_ostree-iso iot_rpmostree_overlay@uefi
URL: https://openqa.fedoraproject.org/tests/916469

Old failures (same test failed in Fedora-IoT-35-20210623.0):

ID: 916454  Test: x86_64 IoT-dvd_ostree-iso iot_zezere_server
URL: https://openqa.fedoraproject.org/tests/916454
ID: 916458  Test: x86_64 IoT-dvd_ostree-iso iot_zezere_ignition
URL: https://openqa.fedoraproject.org/tests/916458
ID: 916460  Test: aarch64 IoT-dvd_ostree-iso iot_clevis@uefi
URL: https://openqa.fedoraproject.org/tests/916460
ID: 916467  Test: aarch64 IoT-dvd_ostree-iso iot_zezere_server@uefi
URL: https://openqa.fedoraproject.org/tests/916467
ID: 916471  Test: aarch64 IoT-dvd_ostree-iso iot_zezere_ignition@uefi
URL: https://openqa.fedoraproject.org/tests/916471

Soft failed openQA tests: 3/16 (x86_64), 1/15 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-IoT-35-20210623.0):

ID: 916443  Test: x86_64 IoT-dvd_ostree-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/916443
ID: 916444  Test: x86_64 IoT-dvd_ostree-iso install_default_upload
URL: https://openqa.fedoraproject.org/tests/916444
ID: 916449  Test: x86_64 IoT-dvd_ostree-iso iot_clevis
URL: https://openqa.fedoraproject.org/tests/916449
ID: 916459  Test: aarch64 IoT-dvd_ostree-iso install_default_upload@uefi
URL: https://openqa.fedoraproject.org/tests/916459

Passed openQA tests: 11/16 (x86_64), 8/15 (aarch64)

Installed system changes in test x86_64 IoT-dvd_ostree-iso 
install_default@uefi: 
Used mem changed from 170 MiB to 188 MiB
Previous test data: https://openqa.fedoraproject.org/tests/914894#downloads
Current test data: https://openqa.fedoraproject.org/tests/916443#downloads

Installed system changes in test x86_64 IoT-dvd_ostree-iso 
install_default_upload: 
Used mem changed from 168 MiB to 188 MiB
Previous test data: https://openqa.fedoraproject.org/tests/914895#downloads
Current test data: https://openqa.fedoraproject.org/tests/916444#downloads

Installed system changes in test aarch64 IoT-dvd_ostree-iso 
install_default_upload@uefi: 
Used mem changed from 182 MiB to 204 MiB
System load changed from 0.68 to 3.84
Average CPU usage changed from 3.55238095 to 95.23809524
Previous test data: https://openqa.fedoraproject.org/tests/914910#downloads
Current test data: https://openqa.fedoraproject.org/tests/916459#downloads
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1976330] New: ctstream-30 is available

2021-06-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1976330

Bug ID: 1976330
   Summary: ctstream-30 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: ctstream
  Keywords: FutureFeature, Triaged
  Assignee: ppi...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: perl-devel@lists.fedoraproject.org, ppi...@redhat.com
  Target Milestone: ---
Classification: Fedora



Latest upstream release: 30
Current version/release in rawhide: 29-6.fc34
URL: http://xpisar.wz.cz/ctstream/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/377/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: use unit names in systemd output by default?

2021-06-25 Thread Zbigniew Jędrzejewski-Szmek
On Fri, Jun 25, 2021 at 12:52:48PM -0400, Colin Walters wrote:
>
>
> On Fri, Jun 25, 2021, at 6:21 AM, Zbigniew Jędrzejewski-Szmek wrote:
> > Hi,
> >
> > systemd has systemd.status_unit_format= / [Manager].StatusUnitFormat=
> > / -Dstatus-unit-format-default= option to use unit names instead of the
> > Description in messages on the kernel console and in logs:
>
> I meant to get back to https://github.com/systemd/systemd/pull/15957
> which I still think is the best.

I forgot about that pull request. So yeah, maybe that'd be an option.
Then you'd get the Description at once, and the short identifier afterwards.

On Fri, Jun 25, 2021 at 06:49:32PM +0200, Aleksandra Fedorova wrote:
> I would vote for unit-names over description, as I can use them to
> search information in the logs or in docs.
>
> But I wonder why don't we consider having both unit name and description
>
> Could something like
>
>Jun 20 22:04:48 krowka systemd[1]: Starting systemd-udevd.service -
> Rule-based Manager for Device Events...
>Jun 20 22:04:48 krowka systemd[1]: Started systemd-udevd.service.
>
> be an option?
>
> You mention brevity, but do we really need to save space here?

For log messages, the longer form is fine. But on the console, it's likely
not fit in 80 characters.

And there's more to this, which I didn't mention so far: I want to
propagate the starting/stopping information from the user managers to
the system manager. So the system manager can show on the console:
"Stopping user@1000.service (stopping gvfs-daemon.service)"
[formatting details to be figured out…].
This should work with unit names, but with unit descriptions there
is no way to meaningfully fit this on one line.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: use unit names in systemd output by default?

2021-06-25 Thread Zbigniew Jędrzejewski-Szmek
On Fri, Jun 25, 2021 at 05:23:08PM +0100, Daniel P. Berrangé wrote:
> On Fri, Jun 25, 2021 at 10:21:05AM +, Zbigniew Jędrzejewski-Szmek wrote:
> > Hi,
> > 
> > systemd has systemd.status_unit_format= / [Manager].StatusUnitFormat=
> > / -Dstatus-unit-format-default= option to use unit names instead of the
> > Description in messages on the kernel console and in logs:
> > 
> > - Jun 20 22:04:48 krowka systemd[1]: Started Rule-based Manager for Device 
> > Events and Files.
> > + Jun 20 22:04:48 krowka systemd[1]: Started systemd-udevd.service.
> > 
> > I find this more convenient because it's briefer, so it fits better on
> > a terminal, but primarily because I can select the unit name for
> > further lookup. When Description is used, and I'm not familiar with
> > the unit, I'll often use grep first to figure out what the unit name
> > actually is. Finally, unit Descriptions are often not very good, and
> > the name is at least as informative…
> 
> IIUC, the descriptions are not translated / localized. So perhaps
> the unit file names are more meaningful for non-english speakers
> too ?

Logs are not localized in general, because they are "global", shared
between all users. This is a valid point: I'm pretty sure that 99% of 
people will immediately have a rough idea what lighttppd.service is.
But "Lightning Fast Webserver With Light System Requirements"? This
baroque description will be even more confusing to non-native speakers.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Test-Announce] Fedora-IoT 35 RC 20210625.0 nightly compose nominated for testing

2021-06-25 Thread rawhide
Announcing the creation of a new nightly release validation test event
for Fedora-IoT 35 RC 20210625.0. Please help run some tests for this
nightly compose if you have time. For more information on nightly
release validation testing, see:
https://fedoraproject.org/wiki/QA:Release_validation_test_plan

Test coverage information for the current release can be seen at:
https://openqa.fedoraproject.org/testcase_stats/35iot

You can see all results, find testing instructions and image download
locations, and enter results on the Summary page:

https://fedoraproject.org/wiki/Test_Results:Fedora-IoT_35_RC_20210625.0_Summary

The individual test result pages are:

https://fedoraproject.org/wiki/Test_Results:Fedora-IoT_35_RC_20210625.0_General

Thank you for testing!
-- 
Mail generated by relvalconsumer: https://pagure.io/fedora-qa/relvalconsumer
___
test-announce mailing list -- test-annou...@lists.fedoraproject.org
To unsubscribe send an email to test-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test-annou...@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: "The fedora 34 iso/installer still hasn't been updated/is broken since November 2020 to install to MD raid arrays"

2021-06-25 Thread Adam Williamson
On Fri, 2021-06-25 at 19:00 +0200, Robert-André Mauchin wrote:
> Hello,
> 
> Some popular tech youtuber is encountering problems to install Fedora on 
> MD raid arrays:
> 
> https://twitter.com/tekwendell/status/1408255117506326529

1 Retweet
1 Quote Tweet
50 Likes

You've got a generous definition of popular. :P

> The related bug is https://bugzilla.redhat.com/show_bug.cgi?id=1897350

Is it, though? That bug still doesn't actually have any logs attached
to it that demonstrate any clear issue besides the naming one. It's not
clear if that's the bug this person is hitting or not.
> 
> Is there any thing that can be done to alleviate this issue faster?

Someone could provide the logs the devs keep asking for?
-- 
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora-Rawhide-20210625.n.0 compose check report

2021-06-25 Thread Adam Williamson
On Fri, 2021-06-25 at 16:56 +, Fedora compose checker wrote:
> No missing expected images.
> 
> Compose FAILS proposed Rawhide gating check!
> 2 of 43 required tests failed
> openQA tests matching unsatisfied gating requirements shown with **GATING** 
> below
> 
> Failed openQA tests: 16/134 (aarch64), 6/199 (x86_64)

So I didn't post analysis of these for a while, sorry about that...to
give a quick snapshot of current state: most of the x86_64 failures are
a result of an anaconda bug with timezone math that means it winds up
setting the clock an hour fast if the selected timezone is in daylight
savings:
https://bugzilla.redhat.com/show_bug.cgi?id=1965718
This causes FreeIPA client enrolment via kickstart during install and
remote system logging to fail.

The other failure is a longstanding bug with krfb in the KDE 'start and
stop all installed apps' test:
https://bugzilla.redhat.com/show_bug.cgi?id=1899803

The aarch64 failures seem to be mostly timing issues - the tests run
slower on aarch64 and this seems to be tripping various things up. I'll
try and look into improving some of those next week.
-- 
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


"The fedora 34 iso/installer still hasn't been updated/is broken since November 2020 to install to MD raid arrays"

2021-06-25 Thread Robert-André Mauchin

Hello,

Some popular tech youtuber is encountering problems to install Fedora on 
MD raid arrays:


https://twitter.com/tekwendell/status/1408255117506326529

The related bug is https://bugzilla.redhat.com/show_bug.cgi?id=1897350

Is there any thing that can be done to alleviate this issue faster?

Best regards,

Robert-André
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Rawhide-20210625.n.0 compose check report

2021-06-25 Thread Fedora compose checker
No missing expected images.

Compose FAILS proposed Rawhide gating check!
2 of 43 required tests failed
openQA tests matching unsatisfied gating requirements shown with **GATING** 
below

Failed openQA tests: 16/134 (aarch64), 6/199 (x86_64)

New failures (same test not failed in Fedora-Rawhide-20210624.n.0):

ID: 916183  Test: aarch64 Server-dvd-iso realmd_join_cockpit@uefi
URL: https://openqa.fedoraproject.org/tests/916183
ID: 916202  Test: aarch64 Workstation-raw_xz-raw.xz desktop_background@uefi
URL: https://openqa.fedoraproject.org/tests/916202
ID: 916206  Test: aarch64 Workstation-raw_xz-raw.xz desktop_browser@uefi
URL: https://openqa.fedoraproject.org/tests/916206
ID: 916207  Test: aarch64 Workstation-raw_xz-raw.xz desktop_printing@uefi
URL: https://openqa.fedoraproject.org/tests/916207
ID: 916208  Test: aarch64 Workstation-raw_xz-raw.xz unwanted_packages@uefi
URL: https://openqa.fedoraproject.org/tests/916208
ID: 916210  Test: aarch64 Workstation-raw_xz-raw.xz 
desktop_update_graphical@uefi
URL: https://openqa.fedoraproject.org/tests/916210
ID: 916211  Test: aarch64 Workstation-raw_xz-raw.xz desktop_terminal@uefi
URL: https://openqa.fedoraproject.org/tests/916211
ID: 916300  Test: aarch64 universal install_european_language@uefi
URL: https://openqa.fedoraproject.org/tests/916300
ID: 916420  Test: aarch64 universal support_server@uefi
URL: https://openqa.fedoraproject.org/tests/916420
ID: 916423  Test: aarch64 universal install_kickstart_nfs@uefi
URL: https://openqa.fedoraproject.org/tests/916423

Old failures (same test failed in Fedora-Rawhide-20210624.n.0):

ID: 916054  Test: x86_64 Server-dvd-iso server_remote_logging_server
URL: https://openqa.fedoraproject.org/tests/916054
ID: 916056  Test: x86_64 Server-dvd-iso 
server_role_deploy_domain_controller **GATING**
URL: https://openqa.fedoraproject.org/tests/916056
ID: 916062  Test: x86_64 Server-dvd-iso server_realmd_join_kickstart 
**GATING**
URL: https://openqa.fedoraproject.org/tests/916062
ID: 916065  Test: x86_64 Server-dvd-iso server_remote_logging_client
URL: https://openqa.fedoraproject.org/tests/916065
ID: 916098  Test: x86_64 KDE-live-iso desktop_login
URL: https://openqa.fedoraproject.org/tests/916098
ID: 916107  Test: x86_64 KDE-live-iso apps_startstop
URL: https://openqa.fedoraproject.org/tests/916107
ID: 916145  Test: aarch64 Server-dvd-iso anaconda_help@uefi
URL: https://openqa.fedoraproject.org/tests/916145
ID: 916181  Test: aarch64 Server-dvd-iso 
server_role_deploy_domain_controller@uefi
URL: https://openqa.fedoraproject.org/tests/916181
ID: 916185  Test: aarch64 Server-dvd-iso server_realmd_join_kickstart@uefi
URL: https://openqa.fedoraproject.org/tests/916185
ID: 916186  Test: aarch64 Server-dvd-iso server_cockpit_basic@uefi
URL: https://openqa.fedoraproject.org/tests/916186
ID: 916311  Test: aarch64 universal install_arabic_language@uefi
URL: https://openqa.fedoraproject.org/tests/916311
ID: 916312  Test: aarch64 universal install_asian_language@uefi
URL: https://openqa.fedoraproject.org/tests/916312

Soft failed openQA tests: 3/199 (x86_64), 3/134 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Rawhide-20210624.n.0):

ID: 916125  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/916125
ID: 916132  Test: aarch64 Minimal-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/916132
ID: 916189  Test: aarch64 Server-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/916189
ID: 916215  Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/916215
ID: 916224  Test: x86_64 universal upgrade_server_domain_controller
URL: https://openqa.fedoraproject.org/tests/916224
ID: 916254  Test: x86_64 universal upgrade_realmd_client
URL: https://openqa.fedoraproject.org/tests/916254

Passed openQA tests: 115/134 (aarch64), 190/199 (x86_64)

New passes (same test not passed in Fedora-Rawhide-20210624.n.0):

ID: 916170  Test: aarch64 Server-dvd-iso install_resize_lvm@uefi
URL: https://openqa.fedoraproject.org/tests/916170
ID: 916179  Test: aarch64 Server-dvd-iso server_remote_logging_server@uefi
URL: https://openqa.fedoraproject.org/tests/916179
ID: 916187  Test: aarch64 Server-dvd-iso server_remote_logging_client@uefi
URL: https://openqa.fedoraproject.org/tests/916187
ID: 916198  Test: aarch64 Workstation-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/916198
ID: 916199  Test: aarch64 Workstation-raw_xz-raw.xz base_system_logging@uefi
URL: https://openqa.fedoraproject.org/tests/916199
ID: 916200  Test: aarch64 Workstation-raw_xz-raw.xz 
release_identification@uefi
URL: 

[Bug 1976029] perl-IPC-Shareable-1.03 is available

2021-06-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1976029



--- Comment #3 from Upstream Release Monitoring 
 ---
An HTTP error occurred downloading the package's new Source URLs: Getting
https://cpan.metacpan.org/authors/id/M/MS/MSOUTH/IPC-Shareable-1.03.tar.gz to
./IPC-Shareable-1.03.tar.gz


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1976029] perl-IPC-Shareable-1.01 is available

2021-06-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1976029

Upstream Release Monitoring  
changed:

   What|Removed |Added

Summary|perl-IPC-Shareable-1.01 is  |perl-IPC-Shareable-1.03 is
   |available   |available



--- Comment #2 from Upstream Release Monitoring 
 ---
Latest upstream release: 1.03
Current version/release in rawhide: 1.00-1.fc35
URL: http://search.cpan.org/dist/IPC-Shareable

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/7130/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: use unit names in systemd output by default?

2021-06-25 Thread Colin Walters


On Fri, Jun 25, 2021, at 6:21 AM, Zbigniew Jędrzejewski-Szmek wrote:
> Hi,
> 
> systemd has systemd.status_unit_format= / [Manager].StatusUnitFormat=
> / -Dstatus-unit-format-default= option to use unit names instead of the
> Description in messages on the kernel console and in logs:

I meant to get back to https://github.com/systemd/systemd/pull/15957
which I still think is the best.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: use unit names in systemd output by default?

2021-06-25 Thread Aleksandra Fedorova
Hi,

On Fri, Jun 25, 2021 at 12:21 PM Zbigniew Jędrzejewski-Szmek
 wrote:
>
> Hi,
>
> systemd has systemd.status_unit_format= / [Manager].StatusUnitFormat=
> / -Dstatus-unit-format-default= option to use unit names instead of the
> Description in messages on the kernel console and in logs:
>
> - Jun 20 22:04:48 krowka systemd[1]: Started Rule-based Manager for Device 
> Events and Files.
> + Jun 20 22:04:48 krowka systemd[1]: Started systemd-udevd.service.
>
> I find this more convenient because it's briefer, so it fits better on
> a terminal, but primarily because I can select the unit name for
> further lookup. When Description is used, and I'm not familiar with
> the unit, I'll often use grep first to figure out what the unit name
> actually is. Finally, unit Descriptions are often not very good, and
> the name is at least as informative…

I would vote for unit-names over description, as I can use them to
search information in the logs or in docs.

But I wonder why don't we consider having both unit name and description

Could something like

   Jun 20 22:04:48 krowka systemd[1]: Starting systemd-udevd.service -
Rule-based Manager for Device Events...
   Jun 20 22:04:48 krowka systemd[1]: Started systemd-udevd.service.

be an option?

You mention brevity, but do we really need to save space here?

> Would people be opposed to making this the default (setting
> -Dstatus-unit-format-default=name in build options)? People who like
> the old default could set StatusUnitFormat=description in systemd.conf
>
> Zbyszek
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it: 
> https://pagure.io/fedora-infrastructure


-- 
Aleksandra Fedorova
bookwar on Libera Chat
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


F35 Change: Optimal LUKS Encryption Sector Size (Self-Contained Change proposal)

2021-06-25 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/LUKSEncryptionSectorSize

== Summary ==

Autodetect optimal encryption sector size during Fedora installation
with LUKS/dm-crypt encryption. On devices with 4k (physical) sector
size, this will make sure we use 4096 sector size which is optimal for
these devices.

== Owner ==
* Name: [[User:okozina|Ondrej Kozina]], [[User:vtrefny|Vojtech Trefny]]
* Email: okozina AT redhat.com, vtrefny AT redhat.com

== Detailed Description ==

Anaconda installer (or to be more precise, the libraries Anaconda uses
for storage configuration) currently sets sector size for LUKS devices
to 512 regardless the of actual physical sector size of the underlying
disk device. The latest cryptsetup release added an option to let
cryptsetup automatically detect the optimal sector size based on the
(physical) sector size of the backing device. By using this new option
we can make sure that Anaconda uses the optimal sector size for newly
created LUKS devices during installation. This means we will use
sector size of 4096 for devices with 4k physical sector size
increasing IO performance with these devices.


== Scope ==
* Proposal owners: Changes for both cryptsetup and libblockdev
(low-level storage library used by Anaconda) are already merged
([https://gitlab.com/cryptsetup/cryptsetup/-/merge_requests/135
cryptsetup]) or submitted
([https://github.com/storaged-project/libblockdev/pull/638
libblockdev]) upstream. We only need to package new versions of these
two projects for Fedora 35. No changes will be needed in Anaconda.

* Other developers: No work from other developers is needed.
* Release engineering:
* Policies and guidelines: N/A (not needed for this Change)
* Trademark approval: N/A (not needed for this Change)
* Alignment with Objectives:


== Upgrade/compatibility impact ==
Upgraded systems will not be affected by this change, this affects
only new LUKS containers created during Fedora installation.

Support for specifying custom sector size is one of the features
available in LUKS2 ([[Changes/SwitchCryptsetupDefaultToLUKS2|default
since Fedora 30]]), no additional changes or special support is needed
when working with LUKS2 devices with sector sizes different than 512.

== How To Test ==
Disk with 4k physical sectors is required for testing this change. You
can check block size of your drive using `blockdev` from `util-linux`
package:

   # blockdev --getpbsz /dev/nvme0n1
   4096

This can be also tested in a virtual machine. You can configure any
disk to appear as 4k block size disk in libvirt by adding the
following option to the disk XML specification:

   

Install Fedora with disk encryption enabled. Using automatic partition
with '''Encrypt my data''' enabled is enough for testing.

In the installed system use `cryptsetup luksDump /dev/` to
check that correct sector size was selected for your device (4096 for
disks with 4096 physical sector size):

   # cryptsetup luksDump /dev/nvme0n1p1
   LUKS header information
   Version:2
   ...
   Data segments:
 0: crypt
   offset: 16777216 [bytes]
   length: (whole device)
   cipher: aes-xts-plain64
   '''sector: 4096 [bytes]'''

== User Experience ==
Fedora users shouldn't notice the change, other than a small IO
performance boost (IO testing on a 4k sectors NVMe shows around 2-3 %
gain when using 4k sectors instead of 512 sectors).

== Dependencies ==
None.

== Contingency Plan ==
* Contingency mechanism: Keep existing behaviour (512 sector size for
all devices)
* Contingency deadline: Beta Freeze
* Blocks release? No
-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


F35 Change: Optimal LUKS Encryption Sector Size (Self-Contained Change proposal)

2021-06-25 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/LUKSEncryptionSectorSize

== Summary ==

Autodetect optimal encryption sector size during Fedora installation
with LUKS/dm-crypt encryption. On devices with 4k (physical) sector
size, this will make sure we use 4096 sector size which is optimal for
these devices.

== Owner ==
* Name: [[User:okozina|Ondrej Kozina]], [[User:vtrefny|Vojtech Trefny]]
* Email: okozina AT redhat.com, vtrefny AT redhat.com

== Detailed Description ==

Anaconda installer (or to be more precise, the libraries Anaconda uses
for storage configuration) currently sets sector size for LUKS devices
to 512 regardless the of actual physical sector size of the underlying
disk device. The latest cryptsetup release added an option to let
cryptsetup automatically detect the optimal sector size based on the
(physical) sector size of the backing device. By using this new option
we can make sure that Anaconda uses the optimal sector size for newly
created LUKS devices during installation. This means we will use
sector size of 4096 for devices with 4k physical sector size
increasing IO performance with these devices.


== Scope ==
* Proposal owners: Changes for both cryptsetup and libblockdev
(low-level storage library used by Anaconda) are already merged
([https://gitlab.com/cryptsetup/cryptsetup/-/merge_requests/135
cryptsetup]) or submitted
([https://github.com/storaged-project/libblockdev/pull/638
libblockdev]) upstream. We only need to package new versions of these
two projects for Fedora 35. No changes will be needed in Anaconda.

* Other developers: No work from other developers is needed.
* Release engineering:
* Policies and guidelines: N/A (not needed for this Change)
* Trademark approval: N/A (not needed for this Change)
* Alignment with Objectives:


== Upgrade/compatibility impact ==
Upgraded systems will not be affected by this change, this affects
only new LUKS containers created during Fedora installation.

Support for specifying custom sector size is one of the features
available in LUKS2 ([[Changes/SwitchCryptsetupDefaultToLUKS2|default
since Fedora 30]]), no additional changes or special support is needed
when working with LUKS2 devices with sector sizes different than 512.

== How To Test ==
Disk with 4k physical sectors is required for testing this change. You
can check block size of your drive using `blockdev` from `util-linux`
package:

   # blockdev --getpbsz /dev/nvme0n1
   4096

This can be also tested in a virtual machine. You can configure any
disk to appear as 4k block size disk in libvirt by adding the
following option to the disk XML specification:

   

Install Fedora with disk encryption enabled. Using automatic partition
with '''Encrypt my data''' enabled is enough for testing.

In the installed system use `cryptsetup luksDump /dev/` to
check that correct sector size was selected for your device (4096 for
disks with 4096 physical sector size):

   # cryptsetup luksDump /dev/nvme0n1p1
   LUKS header information
   Version:2
   ...
   Data segments:
 0: crypt
   offset: 16777216 [bytes]
   length: (whole device)
   cipher: aes-xts-plain64
   '''sector: 4096 [bytes]'''

== User Experience ==
Fedora users shouldn't notice the change, other than a small IO
performance boost (IO testing on a 4k sectors NVMe shows around 2-3 %
gain when using 4k sectors instead of 512 sectors).

== Dependencies ==
None.

== Contingency Plan ==
* Contingency mechanism: Keep existing behaviour (512 sector size for
all devices)
* Contingency deadline: Beta Freeze
* Blocks release? No
-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: use unit names in systemd output by default?

2021-06-25 Thread Daniel P . Berrangé
On Fri, Jun 25, 2021 at 10:21:05AM +, Zbigniew Jędrzejewski-Szmek wrote:
> Hi,
> 
> systemd has systemd.status_unit_format= / [Manager].StatusUnitFormat=
> / -Dstatus-unit-format-default= option to use unit names instead of the
> Description in messages on the kernel console and in logs:
> 
> - Jun 20 22:04:48 krowka systemd[1]: Started Rule-based Manager for Device 
> Events and Files.
> + Jun 20 22:04:48 krowka systemd[1]: Started systemd-udevd.service.
> 
> I find this more convenient because it's briefer, so it fits better on
> a terminal, but primarily because I can select the unit name for
> further lookup. When Description is used, and I'm not familiar with
> the unit, I'll often use grep first to figure out what the unit name
> actually is. Finally, unit Descriptions are often not very good, and
> the name is at least as informative…

IIUC, the descriptions are not translated / localized. So perhaps
the unit file names are more meaningful for non-english speakers
too ?

Regards,
Daniel
-- 
|: https://berrange.com  -o-https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o-https://fstop138.berrange.com :|
|: https://entangle-photo.org-o-https://www.instagram.com/dberrange :|
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora Prioritized Bugs status

2021-06-25 Thread Ben Cotton
Hi everyone,

We have two open prioritized bugs that could use some extra help:

* Akonadi does not start due to DB failure —
https://bugzilla.redhat.com/show_bug.cgi?id=1953675
* A glibc test hangs upon pthread cancellation when glibc is compiled
with annobin turned on —
https://bugzilla.redhat.com/show_bug.cgi?id=1951492

If you can help with diagnosing or fixing these issues, please jump in
and help. As a reminder, you can read more about the Prioritized Bugs
process at 
https://docs.fedoraproject.org/en-US/program_management/prioritized_bugs/

-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: use unit names in systemd output by default?

2021-06-25 Thread Ian Pilcher

On 6/25/21 7:19 AM, Neal Gompa wrote:

I personally prefer the description myself, actually. Many unit names
are more meaningless than the descriptions.


One point ... It's far easier to get the description from the unit name
than vice versa.

--

 In Soviet Russia, Google searches you!

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-25 Thread Miroslav Suchý

Dne 25. 06. 21 v 16:25 Neal Gompa napsal(a):

We will use openSUSE’s OBS for builds of the latest upstream commits for our 
users who need the latest packages. We would need this to check if the latest 
commits in podman work well with new kernel features and selinux.

We will also notify the containers’ communities that rawhide will no longer 
contain the latest builds as some of them are accustomed to using.


Having a COPR would be nice for this. With tools like Packit and such
able to continuously build in COPR for every PR and every commit, you
can provide a fairly nice experience here. I do this with rpmlint, for


+1

If you hesitate to use Copr for some reason or you want to help with initial setup then you can contact me privately and 
I will do my best to help you.


Miroslav

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-25 Thread Zbigniew Jędrzejewski-Szmek
On Fri, Jun 25, 2021 at 10:43:17AM -0400, Neal Gompa wrote:
> On Fri, Jun 25, 2021 at 9:04 AM Frédéric Pierret
>  wrote:
> >
> >
> >
> > Le 6/25/21 à 2:51 PM, Neal Gompa a écrit :
> > > On Fri, Jun 25, 2021 at 3:43 AM Zbigniew Jędrzejewski-Szmek
> > >  wrote:
> > >>
> > >> On Fri, Jun 25, 2021 at 03:49:23AM +, Dan Čermák wrote:
> > >>>
> > >>>
> > >>> On June 24, 2021 9:22:51 PM UTC, "Miro Hrončok"  
> > >>> wrote:
> >  On 24. 06. 21 23:07, Miroslav Suchý wrote:
> > > Dne 24. 06. 21 v 15:48 Tomas Tomecek napsal(a):
> > >>> One thing to consider is that the upstream tarballs might be
> >  cryptographically
> > >>> signed and packages should verify the signature in %prep.
> > >> This is a very good point - in such a case, we should always pull
> >  the
> > >> official upstream tarball instead of generating a new one downstream
> > >
> > > Does it matter? If you are able to generate byte2byte identical
> >  tarball then
> > > you can choose any of them.
> > 
> >  AFAIK git does not grantee to produce byte2byte identical archives
> >  across
> >  different versions of git, zlib, gzip etc. So even if upstream signs
> >  the git
> >  generated archive, generating a byte2byte identical one might be
> >  tricky.
> > >>>
> > >>> Especially with xz, which iirc has reproducibility issues in parallel 
> > >>> mode.
> > >>
> > >> I think we should try to push upstream to sign git tags, instead or in
> > >> addition to tarballs. For upstreams, this is actually much easier
> > >> (just 'git tag' → 'git tag -s' and you're done) compared to e.g. signing
> > >> a tarball on github which requires some interaction with the web service.
> > >>
> > >
> > > As an upstream, I would literally *never* GPG sign git tags. If you
> > > ask me to do that, I won't. It's far too annoying to deal with for me
> > > to be willing to suffer through that.
> > >
> > > I'm not going to ask people to do something I would be unwilling to do 
> > > myself.
> >
> > What about only version tags? You could do some git/bash alias to create 
> > commit version + signed tag at once. For example, we do that on Qubes OS 
> > and that's not more work that just committing the version.
> >
> 
> The problem is that the workflow for tag signatures sucks for Git. And
> I'd need to get it registered in the forges or whatever systems are
> used to consume and verify signatures. That's Herculean in a way that
> I'm unwilling to deal with.

I guess I'm missing something. What is hard about doing signed tags?

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-25 Thread Neal Gompa
On Fri, Jun 25, 2021 at 9:04 AM Frédéric Pierret
 wrote:
>
>
>
> Le 6/25/21 à 2:51 PM, Neal Gompa a écrit :
> > On Fri, Jun 25, 2021 at 3:43 AM Zbigniew Jędrzejewski-Szmek
> >  wrote:
> >>
> >> On Fri, Jun 25, 2021 at 03:49:23AM +, Dan Čermák wrote:
> >>>
> >>>
> >>> On June 24, 2021 9:22:51 PM UTC, "Miro Hrončok"  
> >>> wrote:
>  On 24. 06. 21 23:07, Miroslav Suchý wrote:
> > Dne 24. 06. 21 v 15:48 Tomas Tomecek napsal(a):
> >>> One thing to consider is that the upstream tarballs might be
>  cryptographically
> >>> signed and packages should verify the signature in %prep.
> >> This is a very good point - in such a case, we should always pull
>  the
> >> official upstream tarball instead of generating a new one downstream
> >
> > Does it matter? If you are able to generate byte2byte identical
>  tarball then
> > you can choose any of them.
> 
>  AFAIK git does not grantee to produce byte2byte identical archives
>  across
>  different versions of git, zlib, gzip etc. So even if upstream signs
>  the git
>  generated archive, generating a byte2byte identical one might be
>  tricky.
> >>>
> >>> Especially with xz, which iirc has reproducibility issues in parallel 
> >>> mode.
> >>
> >> I think we should try to push upstream to sign git tags, instead or in
> >> addition to tarballs. For upstreams, this is actually much easier
> >> (just 'git tag' → 'git tag -s' and you're done) compared to e.g. signing
> >> a tarball on github which requires some interaction with the web service.
> >>
> >
> > As an upstream, I would literally *never* GPG sign git tags. If you
> > ask me to do that, I won't. It's far too annoying to deal with for me
> > to be willing to suffer through that.
> >
> > I'm not going to ask people to do something I would be unwilling to do 
> > myself.
>
> What about only version tags? You could do some git/bash alias to create 
> commit version + signed tag at once. For example, we do that on Qubes OS and 
> that's not more work that just committing the version.
>

The problem is that the workflow for tag signatures sucks for Git. And
I'd need to get it registered in the forges or whatever systems are
used to consume and verify signatures. That's Herculean in a way that
I'm unwilling to deal with.




--
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-25 Thread Neal Gompa
On Fri, Jun 25, 2021 at 10:15 AM Lokesh Mandvekar
 wrote:
>
> Hi list,
>
>
> I own the rhcontainerbot account. Apologies it took so long to respond to 
> this thread. A number of legitimate concerns have been raised about the bot, 
> so let me address those below on behalf of the Containers team.
>
>
> We have disabled all autobuilds for now.
>
> The podman RC build landing in updates a month ago was a one-off and it has 
> been discussed at: 
> https://lists.podman.io/archives/list/pod...@lists.podman.io/thread/WYNTH224D5MVBC2RFOG6RPIC52JZFKAB/
>
> The fuse-overlayfs downgrade occurred unintendedly during the upstream branch 
> rename from master to main. That has been fixed at: 
> https://koji.fedoraproject.org/koji/buildinfo?buildID=1775442
> Disabling autobuilds during the branch rename phase would’ve evidently 
> avoided this issue.
>
>
> Going forward:
>
> We will only manually build upstream release tags for Fedora releases. We  
> would prefer to send RC tags to Fedora rawhide as that will trigger gating 
> tests and allow us to test podman with FCOS and toolbox CIs, so please let us 
> know if that would be a deal-breaker.
>

RCs and final releases are generally okay IMO even for stable
releases, as long as you're prepared to address feedback brought up in
bodhi updates. The problem here is nobody is paying attention to Bodhi
at all.

> We may look at re-enabling the bot only for koji builds of upstream releases, 
> while bodhi updates will still be manual. We’ll make sure to check for 
> breakages / version downgrades before re-enablement. The bot has so far 
> compared upstream tags, rpm installability, version number sanity, but 
> evidently it has missed a lot of cases including git branch changes.
>
> If we re-enable the bot, we will mention the human’s name and email for every 
> changelog entry in every relevant package as well as regularly monitor the 
> bot’s email. Please let us know if there are any concerns with this approach.
>
> We will use openSUSE’s OBS for builds of the latest upstream commits for our 
> users who need the latest packages. We would need this to check if the latest 
> commits in podman work well with new kernel features and selinux.
>
>
> Team members  will not add karma to containers’ packages, with the exception 
> of our QE Engineer who owns our gating tests and is in charge of final 
> testing of our builds.  Currently Ed Santiago (FAS: @santiago) owns that 
> responsibility.
>

The important aspect isn't who is doing it, but that it's actually
*tested* to work. Very serious breakages have happened in the past,
and that's we want to avoid going forward.

>
> We will also notify the containers’ communities that rawhide will no longer 
> contain the latest builds as some of them are accustomed to using.
>

Having a COPR would be nice for this. With tools like Packit and such
able to continuously build in COPR for every PR and every commit, you
can provide a fairly nice experience here. I do this with rpmlint, for
example.



-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-25 Thread Peter Pentchev
On Fri, Jun 25, 2021 at 02:40:22PM +0200, Miroslav Suchý wrote:
> Dne 24. 06. 21 v 23:22 Miro Hrončok napsal(a):
> > AFAIK git does not grantee to produce byte2byte identical archives
> > across different versions of git, zlib, gzip etc. So even if upstream
> > signs the git generated archive, generating a byte2byte identical one
> > might be tricky.
> 
> Neither git nor tar can do that. But it is not impossible. E.g. Tito [1] has
> some hacks on top of git-archive which produces identical tar-balls.
> 
> [1] https://github.com/rpm-software-management/tito/

FWIW, pristine-tar (http://joeyh.name/code/pristine-tar/) can handle
almost all upstream tarballs, and it also has support for storing
detached signatures alongside its metadata. I keep hearing people say
that there are cases when it fails, but it has worked for me for dozens
of packages. Of course, it does have its own expectations about
the structure of the Git repository, but those are mostly limited to
"give me a branch to play in, I'll take care of the rest".

G'luck,
Peter

-- 
Peter Pentchev  r...@ringlet.net r...@debian.org p...@storpool.com
PGP key:http://people.FreeBSD.org/~roam/roam.key.asc
Key fingerprint 2EE7 A7A5 17FC 124C F115  C354 651E EFB0 2527 DF13


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: RFC: Banning bots from submitting automated koji builds

2021-06-25 Thread Lokesh Mandvekar
Hi list,

I own the rhcontainerbot account. Apologies it took so long to respond to
this thread. A number of legitimate concerns have been raised about the
bot, so let me address those below on behalf of the Containers team.


   1.

   We have disabled all autobuilds for now.

   2.

   The podman RC build landing in updates a month ago was a one-off and it
   has been discussed at:
   
https://lists.podman.io/archives/list/pod...@lists.podman.io/thread/WYNTH224D5MVBC2RFOG6RPIC52JZFKAB/

   3.

   The fuse-overlayfs downgrade occurred unintendedly during the upstream
   branch rename from master to main. That has been fixed at:
   https://koji.fedoraproject.org/koji/buildinfo?buildID=1775442
   Disabling autobuilds during the branch rename phase would’ve evidently
   avoided this issue.



   1.

   Going forward:
   1.

  We will only manually build upstream release tags for Fedora
  releases. We  would prefer to send RC tags to Fedora rawhide as that will
  trigger gating tests and allow us to test podman with FCOS and
toolbox CIs,
  so please let us know if that would be a deal-breaker.

  2.

  We may look at re-enabling the bot only for koji builds of upstream
  releases, while bodhi updates will still be manual. We’ll make sure to
  check for breakages / version downgrades before re-enablement.
The bot has
  so far compared upstream tags, rpm installability, version number sanity,
  but evidently it has missed a lot of cases including git branch changes.

  3.

  If we re-enable the bot, we will mention the human’s name and email
  for every changelog entry in every relevant package as well as regularly
  monitor the bot’s email. Please let us know if there are any
concerns with
  this approach.

  4.

  We will use openSUSE’s OBS for builds of the latest upstream commits
  for our users who need the latest packages. We would need this
to check if
  the latest commits in podman work well with new kernel features
and selinux.



   1.

   Team members  will not add karma to containers’ packages, with the
   exception of our QE Engineer who owns our gating tests and is in charge of
   final testing of our builds.  Currently Ed Santiago (FAS: @santiago) owns
   that responsibility.



   1.

   We will also notify the containers’ communities that rawhide will no
   longer contain the latest builds as some of them are accustomed to using.



Please let us know if there are any concerns that were left unaddressed or
if you have any further recommendations or feedback.


-- 

Lokesh


On Fri, Jun 25, 2021 at 12:13 AM Dan Čermák 
wrote:

>
>
> On June 22, 2021 1:26:30 PM UTC, "Miroslav Suchý" 
> wrote:
> >Dne 20. 06. 21 v 10:42 Miro Hrončok napsal(a):
> >> Rather than "no bots allowed" policy, we might need a "bots that
> >violate our policies and guidelines or have a
> >> tendency to break things will be disabled until fixed" policy.
> >
> >Every bot has been written by somebody. 1) it should be always clear
> >who is responsible for the bot 2) The owner should
> >take conseq^H^H^H responsibility for it.
>
> I'd prefer this policy over an outright ban.
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it:
> https://pagure.io/fedora-infrastructure
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora rawhide compose report: 20210625.n.0 changes

2021-06-25 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20210624.n.0
NEW: Fedora-Rawhide-20210625.n.0

= SUMMARY =
Added images:0
Dropped images:  0
Added packages:  3
Dropped packages:0
Upgraded packages:   69
Downgraded packages: 0

Size of added packages:  3.74 MiB
Size of dropped packages:0 B
Size of upgraded packages:   3.20 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   3.79 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =

= DROPPED IMAGES =

= ADDED PACKAGES =
Package: jsonnet-0.17.0-1.fc35
Summary: Diff JSON and JSON-like structures
RPMs:jsonnet jsonnet-devel jsonnet-doc jsonnet-libs python3-jsonnet
Size:2.44 MiB

Package: python-cocotb-1.5.2-1.fc35
Summary: Coroutine Co-simulation Test Bench
RPMs:python3-cocotb
Size:1.25 MiB

Package: python-environs-9.3.2-3.fc35
Summary: Python library for parsing environment variables
RPMs:python3-environs python3-environs+django python3-environs-examples
Size:55.57 KiB


= DROPPED PACKAGES =

= UPGRADED PACKAGES =
Package:  389-ds-base-2.0.6-1.fc35
Old package:  389-ds-base-2.0.5-1.fc35.1
Summary:  389 Directory Server (base)
RPMs: 389-ds-base 389-ds-base-devel 389-ds-base-libs 389-ds-base-snmp 
cockpit-389-ds python3-lib389
Size: 24.85 MiB
Size change:  -139.78 KiB
Changelog:
  * Thu Jun 24 2021 Thierry Bordaz  - 2.0.6-1
  - Bump version to 2.0.6
  - Issue 4803 - Improve DB Locks Monitoring Feature Descriptions
  - Issue 4803 - Improve DB Locks Monitoring Feature Descriptions (#4810)
  - Issue 4169 - UI - Migrate Typeaheads to PF4 (#4808)
  - Issue 4414 - disk monitoring - prevent division by zero crash
  - Issue 4788 - CLI should support Temporary Password Rules attributes (#4793)
  - Issue 4656 - Fix replication plugin rename dependency issues
  - Issue 4656 - replication name change upgrade code causes crash with dynamic 
plugins
  - Issue 4506 - Improve SASL logging
  - Issue 4709 - Fix double free in dbscan
  - Issue 4093 - Fix MEP test case
  - Issue 4747 - Remove unstable/unstatus tests (followup) (#4809)
  - Issue 4791 - Missing dependency for RetroCL RFE (#4792)
  - Issue 4794 - BUG - don't capture container output (#4798)
  - Issue 4593 - Log an additional message if the server certificate nickname 
doesn't match nsSSLPersonalitySSL value
  - Issue 4797 - ACL IP ADDRESS evaluation may corrupt c_isreplication_session 
connection flags (#4799)
  - Issue 4169 - UI Migrate checkbox to PF4 (#4769)
  - Issue 4447 - Crash when the Referential Integrity log is manually edited
  - Issue 4773 - Add CI test for DNA interval assignment
  - Issue 4789 - Temporary password rules are not enforce with local password 
policy (#4790)
  - Issue 4379 - fixing regression in test_info_disclosure
  - Issue 4379 - Allow more than 1 empty AttributeDescription for ldapsearch, 
without the risk of denial of service
  - Issue 4379 - Allow more than 1 empty AttributeDescription for ldapsearch, 
without the risk of denial of service
  - Issue 4575 Update test docstrings metadata
  - Issue 4753 - Adjust our tests to 389-ds-base-snmp missing in RHEL 9 
Appstream
  - removed the snmp_present() from utils.py as we have get_rpm_version() in 
conftest.py
  - Issue 4753 - Adjust our tests to 389-ds-base-snmp missing in RHEL 9 
Appstream


Package:  NFStest-2.1.5-11.fc35
Old package:  NFStest-2.1.5-10.fc34
Summary:  NFS Testing Tool
RPMs: NFStest
Size: 505.86 KiB
Size change:  4.13 KiB
Changelog:
  * Fri Jun 11 2021 Miro Hron??ok  - 2.1.5-11
  - Remove unused BuildRequires on python2-setuptools


Package:  alt-ergo-2.2.0-11.fc35
Old package:  alt-ergo-2.2.0-10.fc35
Summary:  Automated theorem prover including linear arithmetic
RPMs: alt-ergo alt-ergo-gui ocaml-alt-ergo ocaml-alt-ergo-devel
Size: 74.81 MiB
Size change:  -758.33 KiB
Changelog:
  * Tue Jun 22 2021 Jerry James  - 2.2.0-11
  - Rebuild for ocaml-lablgtk without gnomeui


Package:  awscli-1.19.100-1.fc35
Old package:  awscli-1.19.99-1.fc35
Summary:  Universal Command Line Environment for AWS
RPMs: awscli
Size: 2.06 MiB
Size change:  136 B
Changelog:
  * Thu Jun 24 2021 Gwyn Ciesla  - 1.19.100-1
  - 1.19.100


Package:  chromium-91.0.4472.114-1.fc35
Old package:  chromium-91.0.4472.77-1.fc35
Summary:  A WebKit (Blink) powered web browser that Google doesn't want you 
to use
RPMs: chrome-remote-desktop chromedriver chromium chromium-common 
chromium-headless
Size: 446.05 MiB
Size change:  75.93 KiB
Changelog:
  * Wed Jun 23 2021 Tom Callaway  - 91.0.4472.114-1
  - update to 91.0.4472.114


Package:  cryptlib-3.4.5-18.fc35
Old package:  cryptlib-3.4.5-17.fc35
Summary:  Security library and toolkit for encryption and authentication 
services
RPMs: cryptlib cryptlib-devel cryptlib-java cryptlib-javadoc 
cryptlib-perl cryptlib-python3 cryptlib-test
Size: 5.37 MiB
Size change:  1.78 KiB

[EPEL-devel] Re: help request: libksysguard build failure on Stream 8

2021-06-25 Thread Troy Dawson
On Thu, Jun 24, 2021 at 8:31 PM Yaakov Selkowitz 
wrote:

> On Thu, 2021-06-24 at 15:40 -0700, Troy Dawson wrote:
> > On Wed, Jun 23, 2021 at 9:25 AM Yaakov Selkowitz 
> > wrote:
> >
> > > On Wed, 2021-06-23 at 08:56 -0700, Troy Dawson wrote:
> > > > I'm updating/ rebuilding KDE Plasma Desktop on CentOS Stream 8, for
> the
> > > > updated qt5 that is there.  I am using what is in F34 for the update.
> > > > I've got all the qt5 5.15.2 and kf5 5.83.0 packages built and in the
> > > > buildroot.
> > > > For libksysguard I believe I have all other dependencies built and
> in the
> > > > buildroot.
> > > > But it just keeps failing, despite everything I've tried.[1][2]
> > > > I get the same error on all arches.  The same error on version
> 5.22.1,
> > > > 5.22.2 and even 5.21.4.
> > > > I've tried passing build parameters that I thought went along with
> the
> > > > error, but nothing changed.
> > > >
> > > > I think this is the critical error, but it's possible I'm wrong
> > > >
> > > > CMakeFiles/processcore.dir/cgroup_data_model.cpp.o: In function
> > > > `KSysGuard::CGroupDataModel::update(KSysGuard::CGroup*) [clone
> > > > .localalias.209]':
> > > > /usr/include/c++/8/bits/fs_path.h:185: undefined reference to
> > > > `std::filesystem::__cxx11::path::_M_split_cmpts()'
> > > > CMakeFiles/processcore.dir/cgroup_data_model.cpp.o: In function
> > > > `KSysGuard::CGroupDataModel::update(KSysGuard::CGroup*) [clone
> > > > .localalias.209]':
> > > > /usr/include/c++/8/bits/fs_dir.h:371: undefined reference to
> > > >
> > >
> `std::filesystem::__cxx11::directory_iterator::directory_iterator(std::files
> > > ys
> > > > tem::__cxx11::path
> > > > const&, std::filesystem::directory_options, std::error_code*)'
> > > > CMakeFiles/processcore.dir/cgroup_data_model.cpp.o: In function
> > > > `KSysGuard::CGroupDataModel::update(KSysGuard::CGroup*)':
> > > > /builddir/build/BUILD/libksysguard-
> > > > 5.22.2.1/processcore/cgroup_data_model.cpp:447:
> > > > undefined reference to
> > > > `std::filesystem::__cxx11::directory_iterator::operator*() const'
> > > > /builddir/build/BUILD/libksysguard-
> > > > 5.22.2.1/processcore/cgroup_data_model.cpp:447:
> > > > undefined reference to
> > > > `std::filesystem::__cxx11::directory_iterator::operator++()'
> > > > CMakeFiles/processcore.dir/cgroup_data_model.cpp.o: In function
> > > > `KSysGuard::CGroupDataModel::update(KSysGuard::CGroup*) [clone
> > > > .localalias.209]':
> > > > /usr/include/c++/8/bits/fs_dir.h:260: undefined reference to
> > > > `std::filesystem::status(std::filesystem::__cxx11::path const&)'
> > > > collect2: error: ld returned 1 exit status
> > >
> > > std::filesystem was originally added as an experimental extension to
> C++,
> > > and
> > > at first required explicitly linking with -lstdc++fs.  GCC 9 removed
> the
> > > requirement for the additional link library [1], but RHEL 8's default
> > > compiler
> > > is GCC 8.  Therefore, for EPEL 8, you would have to create a patch
> which
> > > adds
> > > stdc++fs to the target_link_libraries of the processcore target.
> > >
> > > [1] https://gcc.gnu.org/gcc-9/changes.html
> > >
> > > HTH,
> > >
> >
> > My cmake skills are not up to snuff.  A little more help is needed.
> > I seems -lstdc++fs needs to be added at the end of the compile command
> >   /usr/bin/c++  -lstdc++fs
> > instead of at the beginning or middle of the options
> >   /usr/bin/c++ -lstdc++fs 
> >
> > I can do that manually, and it compiles correctly.
> >
> > But getting cmake to do it, I'm clearly missing something.
> > Is there a cmake command line option to put -lstdc++fs at the end?
> > There are several cmake and cmake.in files.  Would I put it in one, and
> if
> > so, what is the syntax?
>
> Add stdc++fs to the end of this list:
>
>
> https://github.com/KDE/libksysguard/blob/master/processcore/CMakeLists.txt#L29-L39
>

That did it.  Thank you very much.
Not only am I unblocked, but my cmake skills are a little bit better.

Troy
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-25 Thread Frédéric Pierret



Le 6/25/21 à 2:51 PM, Neal Gompa a écrit :

On Fri, Jun 25, 2021 at 3:43 AM Zbigniew Jędrzejewski-Szmek
 wrote:


On Fri, Jun 25, 2021 at 03:49:23AM +, Dan Čermák wrote:



On June 24, 2021 9:22:51 PM UTC, "Miro Hrončok"  wrote:

On 24. 06. 21 23:07, Miroslav Suchý wrote:

Dne 24. 06. 21 v 15:48 Tomas Tomecek napsal(a):

One thing to consider is that the upstream tarballs might be

cryptographically

signed and packages should verify the signature in %prep.

This is a very good point - in such a case, we should always pull

the

official upstream tarball instead of generating a new one downstream


Does it matter? If you are able to generate byte2byte identical

tarball then

you can choose any of them.


AFAIK git does not grantee to produce byte2byte identical archives
across
different versions of git, zlib, gzip etc. So even if upstream signs
the git
generated archive, generating a byte2byte identical one might be
tricky.


Especially with xz, which iirc has reproducibility issues in parallel mode.


I think we should try to push upstream to sign git tags, instead or in
addition to tarballs. For upstreams, this is actually much easier
(just 'git tag' → 'git tag -s' and you're done) compared to e.g. signing
a tarball on github which requires some interaction with the web service.



As an upstream, I would literally *never* GPG sign git tags. If you
ask me to do that, I won't. It's far too annoying to deal with for me
to be willing to suffer through that.

I'm not going to ask people to do something I would be unwilling to do myself.


What about only version tags? You could do some git/bash alias to create commit 
version + signed tag at once. For example, we do that on Qubes OS and that's 
not more work that just committing the version.

Best,
Frédéric



OpenPGP_signature
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-25 Thread Miro Hrončok

On 25. 06. 21 14:54, Miroslav Suchý wrote:

Dne 25. 06. 21 v 14:50 Miro Hrončok napsal(a):
AFAIK git does not grantee to produce byte2byte identical archives across 
different versions of git, zlib, gzip etc. So even if upstream signs the 
git generated archive, generating a byte2byte identical one might be tricky. 


Neither git nor tar can do that. But it is not impossible. E.g. Tito [1] has 
some hacks on top of git-archive which produces identical tar-balls.


That would require our upstreams to use tito (or similar), which we are in 
many case unlikely to affect. 


I do not expect that. I rather meant that it is technically possible and Packit 
can "steal" that code from Tito.


What I meant is that even if Packit has an ability to create reproducible git 
tarballs, upstream would need to sign Packit-generated tarballs, which would 
require much higher level of Fedora's involvement to the upstream release 
process than is usual for independent upstreams.


--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-25 Thread Miroslav Suchý

Dne 25. 06. 21 v 14:50 Miro Hrončok napsal(a):
AFAIK git does not grantee to produce byte2byte identical archives across different versions of git, zlib, gzip etc. 
So even if upstream signs the git generated archive, generating a byte2byte identical one might be tricky. 


Neither git nor tar can do that. But it is not impossible. E.g. Tito [1] has some hacks on top of git-archive which 
produces identical tar-balls.


That would require our upstreams to use tito (or similar), which we are in many case unlikely to affect. 


I do not expect that. I rather meant that it is technically possible and Packit can 
"steal" that code from Tito.

Miroslav

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-25 Thread Neal Gompa
On Fri, Jun 25, 2021 at 3:43 AM Zbigniew Jędrzejewski-Szmek
 wrote:
>
> On Fri, Jun 25, 2021 at 03:49:23AM +, Dan Čermák wrote:
> >
> >
> > On June 24, 2021 9:22:51 PM UTC, "Miro Hrončok"  wrote:
> > >On 24. 06. 21 23:07, Miroslav Suchý wrote:
> > >> Dne 24. 06. 21 v 15:48 Tomas Tomecek napsal(a):
> >  One thing to consider is that the upstream tarballs might be
> > >cryptographically
> >  signed and packages should verify the signature in %prep.
> > >>> This is a very good point - in such a case, we should always pull
> > >the
> > >>> official upstream tarball instead of generating a new one downstream
> > >>
> > >> Does it matter? If you are able to generate byte2byte identical
> > >tarball then
> > >> you can choose any of them.
> > >
> > >AFAIK git does not grantee to produce byte2byte identical archives
> > >across
> > >different versions of git, zlib, gzip etc. So even if upstream signs
> > >the git
> > >generated archive, generating a byte2byte identical one might be
> > >tricky.
> >
> > Especially with xz, which iirc has reproducibility issues in parallel mode.
>
> I think we should try to push upstream to sign git tags, instead or in
> addition to tarballs. For upstreams, this is actually much easier
> (just 'git tag' → 'git tag -s' and you're done) compared to e.g. signing
> a tarball on github which requires some interaction with the web service.
>

As an upstream, I would literally *never* GPG sign git tags. If you
ask me to do that, I won't. It's far too annoying to deal with for me
to be willing to suffer through that.

I'm not going to ask people to do something I would be unwilling to do myself.



-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-25 Thread Miro Hrončok

On 25. 06. 21 14:40, Miroslav Suchý wrote:

Dne 24. 06. 21 v 23:22 Miro Hrončok napsal(a):
AFAIK git does not grantee to produce byte2byte identical archives across 
different versions of git, zlib, gzip etc. So even if upstream signs the git 
generated archive, generating a byte2byte identical one might be tricky. 


Neither git nor tar can do that. But it is not impossible. E.g. Tito [1] has 
some hacks on top of git-archive which produces identical tar-balls.


That would require our upstreams to use tito (or similar), which we are in many 
case unlikely to affect.


--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-25 Thread Miroslav Suchý

Dne 24. 06. 21 v 23:22 Miro Hrončok napsal(a):
AFAIK git does not grantee to produce byte2byte identical archives across different versions of git, zlib, gzip etc. 
So even if upstream signs the git generated archive, generating a byte2byte identical one might be tricky. 


Neither git nor tar can do that. But it is not impossible. E.g. Tito [1] has some hacks on top of git-archive which 
produces identical tar-balls.


[1] https://github.com/rpm-software-management/tito/

Miroslav
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: use unit names in systemd output by default?

2021-06-25 Thread Neal Gompa
On Fri, Jun 25, 2021 at 6:21 AM Zbigniew Jędrzejewski-Szmek
 wrote:
>
> Hi,
>
> systemd has systemd.status_unit_format= / [Manager].StatusUnitFormat=
> / -Dstatus-unit-format-default= option to use unit names instead of the
> Description in messages on the kernel console and in logs:
>
> - Jun 20 22:04:48 krowka systemd[1]: Started Rule-based Manager for Device 
> Events and Files.
> + Jun 20 22:04:48 krowka systemd[1]: Started systemd-udevd.service.
>
> I find this more convenient because it's briefer, so it fits better on
> a terminal, but primarily because I can select the unit name for
> further lookup. When Description is used, and I'm not familiar with
> the unit, I'll often use grep first to figure out what the unit name
> actually is. Finally, unit Descriptions are often not very good, and
> the name is at least as informative…
>
> Would people be opposed to making this the default (setting
> -Dstatus-unit-format-default=name in build options)? People who like
> the old default could set StatusUnitFormat=description in systemd.conf
>

I personally prefer the description myself, actually. Many unit names
are more meaningless than the descriptions.

It is nice that it is configurable though. Now we just need a verbose
mode for systemctl to print that output when you call it to
start/stop/restart services. :)


-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Orphaning rubygem-expression_parser

2021-06-25 Thread Vít Ondruch

Hi,

I am orphaning rubygem-expression_parser. This used to be dependency of 
rubygem-wikicloth, which was retired some while ago already. This 
package is mostly dead upstream and I don't have any other use.



Vít
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: use unit names in systemd output by default?

2021-06-25 Thread Ewoud Kohl van Wijngaarden

On Fri, Jun 25, 2021 at 10:21:05AM +, Zbigniew Jędrzejewski-Szmek wrote:

systemd has systemd.status_unit_format= / [Manager].StatusUnitFormat=
/ -Dstatus-unit-format-default= option to use unit names instead of the
Description in messages on the kernel console and in logs:

- Jun 20 22:04:48 krowka systemd[1]: Started Rule-based Manager for Device 
Events and Files.
+ Jun 20 22:04:48 krowka systemd[1]: Started systemd-udevd.service.

I find this more convenient because it's briefer, so it fits better on
a terminal, but primarily because I can select the unit name for
further lookup. When Description is used, and I'm not familiar with
the unit, I'll often use grep first to figure out what the unit name
actually is. Finally, unit Descriptions are often not very good, and
the name is at least as informative…


I agree with this preference. You could consider both.


Would people be opposed to making this the default (setting
-Dstatus-unit-format-default=name in build options)? People who like
the old default could set StatusUnitFormat=description in systemd.conf


I think Fedora should stick to upstream defaults in most places. 
Especially with systemd it's nice if all distros align (which is one of 
the big benefits of systemd over sysvinit IMHO).


What does upstream think about this change? What do other distros think 
about this change?

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: use unit names in systemd output by default?

2021-06-25 Thread Benjamin Berg
Hi,

On Fri, 2021-06-25 at 10:21 +, Zbigniew Jędrzejewski-Szmek wrote:
> - Jun 20 22:04:48 krowka systemd[1]: Started Rule-based Manager for Device 
> Events and Files.
> + Jun 20 22:04:48 krowka systemd[1]: Started systemd-udevd.service.
> 
> [SNIP]
> 
> Would people be opposed to making this the default (setting
> -Dstatus-unit-format-default=name in build options)? People who like
> the old default could set StatusUnitFormat=description in
> systemd.conf

I am in favour of that change.

In my view it is also improves consistency, as other log messages such
as the ones emitted using LOG_UNIT_MESSAGE will use the unit name
rather than the description.

Benjamin


signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


use unit names in systemd output by default?

2021-06-25 Thread Zbigniew Jędrzejewski-Szmek
Hi,

systemd has systemd.status_unit_format= / [Manager].StatusUnitFormat=
/ -Dstatus-unit-format-default= option to use unit names instead of the
Description in messages on the kernel console and in logs:

- Jun 20 22:04:48 krowka systemd[1]: Started Rule-based Manager for Device 
Events and Files.
+ Jun 20 22:04:48 krowka systemd[1]: Started systemd-udevd.service.

I find this more convenient because it's briefer, so it fits better on
a terminal, but primarily because I can select the unit name for
further lookup. When Description is used, and I'm not familiar with
the unit, I'll often use grep first to figure out what the unit name
actually is. Finally, unit Descriptions are often not very good, and
the name is at least as informative…

Would people be opposed to making this the default (setting
-Dstatus-unit-format-default=name in build options)? People who like
the old default could set StatusUnitFormat=description in systemd.conf

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-25 Thread Zbigniew Jędrzejewski-Szmek
On Fri, Jun 25, 2021 at 10:51:11AM +0200, Florian Weimer wrote:
> * Zbigniew Jędrzejewski-Szmek:
> 
> > I think we should try to push upstream to sign git tags, instead or in
> > addition to tarballs. For upstreams, this is actually much easier
> > (just 'git tag' → 'git tag -s' and you're done) compared to e.g. signing
> > a tarball on github which requires some interaction with the web service.
> 
> Would anyone recognize these signatures today, given that they are
> essentially SHA-1 based?

git has a reasonably recent sha1 implementation… It's time to move on,
but afaik it isn't currently compromised. The switch to sha256 is ongoing.
It seems … stalled (?), but it'll happen sooner or later. So I think
we can tell people to sign commits, and then at some point in the
future this will magically work with sha256.
 
> Fedora has already disabled SHA-1 signatures by default elsewhere, so
> such an encouragement would just result in wasted work.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1976133] New: perl-Config-AutoConf-0.320 is available

2021-06-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1976133

Bug ID: 1976133
   Summary: perl-Config-AutoConf-0.320 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Config-AutoConf
  Keywords: FutureFeature, Triaged
  Assignee: emman...@seyman.fr
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: emman...@seyman.fr, mspa...@redhat.com,
perl-devel@lists.fedoraproject.org
  Target Milestone: ---
Classification: Fedora



Latest upstream release: 0.320
Current version/release in rawhide: 0.319-4.fc35
URL: http://search.cpan.org/dist/Config-AutoConf/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/5876/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Cloud-34-20210625.0 compose check report

2021-06-25 Thread Fedora compose checker
No missing expected images.

Soft failed openQA tests: 1/8 (x86_64), 1/8 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Cloud-34-20210624.0):

ID: 915995  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/915995
ID: 916004  Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/916004

Passed openQA tests: 7/8 (x86_64), 7/8 (aarch64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 1974288] perl-5.34.0-479.fc35 FTBFS with gdbm-devel-1.20-1.fc35: ext/GDBM_File/t/gdbm.t: gdbm_firstkey: Item not found at ../../t/lib/dbmt_common.pl line 52.

2021-06-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1974288

Jitka Plesnikova  changed:

   What|Removed |Added

 Status|ASSIGNED|CLOSED
   Fixed In Version||perl-5.34.0-480.fc35
 Resolution|--- |RAWHIDE
Last Closed||2021-06-25 09:04:14




-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-25 Thread Florian Weimer
* Zbigniew Jędrzejewski-Szmek:

> I think we should try to push upstream to sign git tags, instead or in
> addition to tarballs. For upstreams, this is actually much easier
> (just 'git tag' → 'git tag -s' and you're done) compared to e.g. signing
> a tarball on github which requires some interaction with the web service.

Would anyone recognize these signatures today, given that they are
essentially SHA-1 based?

Fedora has already disabled SHA-1 signatures by default elsewhere, so
such an encouragement would just result in wasted work.

Thanks,
Florian
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-25 Thread Daniel P . Berrangé
On Thu, Jun 24, 2021 at 11:07:45PM +0200, Miroslav Suchý wrote:
> Dne 24. 06. 21 v 15:48 Tomas Tomecek napsal(a):
> > > One thing to consider is that the upstream tarballs might be 
> > > cryptographically
> > > signed and packages should verify the signature in %prep.
> > This is a very good point - in such a case, we should always pull the
> > official upstream tarball instead of generating a new one downstream
> 
> Does it matter? If you are able to generate byte2byte identical
> tarball then you can choose any of them.

If the upstream tarball contains generated files, chances of re-creating
bytewise identical tarball is low, and for autotools based projects it
is essentially zero.

Regards,
Daniel
-- 
|: https://berrange.com  -o-https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o-https://fstop138.berrange.com :|
|: https://entangle-photo.org-o-https://www.instagram.com/dberrange :|
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Fedora Source-git SIG report #1 (June 2021)

2021-06-25 Thread Zbigniew Jędrzejewski-Szmek
On Fri, Jun 25, 2021 at 03:49:23AM +, Dan Čermák wrote:
> 
> 
> On June 24, 2021 9:22:51 PM UTC, "Miro Hrončok"  wrote:
> >On 24. 06. 21 23:07, Miroslav Suchý wrote:
> >> Dne 24. 06. 21 v 15:48 Tomas Tomecek napsal(a):
>  One thing to consider is that the upstream tarballs might be
> >cryptographically
>  signed and packages should verify the signature in %prep.
> >>> This is a very good point - in such a case, we should always pull
> >the
> >>> official upstream tarball instead of generating a new one downstream
> >> 
> >> Does it matter? If you are able to generate byte2byte identical
> >tarball then 
> >> you can choose any of them.
> >
> >AFAIK git does not grantee to produce byte2byte identical archives
> >across 
> >different versions of git, zlib, gzip etc. So even if upstream signs
> >the git 
> >generated archive, generating a byte2byte identical one might be
> >tricky.
> 
> Especially with xz, which iirc has reproducibility issues in parallel mode.

I think we should try to push upstream to sign git tags, instead or in
addition to tarballs. For upstreams, this is actually much easier
(just 'git tag' → 'git tag -s' and you're done) compared to e.g. signing
a tarball on github which requires some interaction with the web service.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Cloud-33-20210625.0 compose check report

2021-06-25 Thread Fedora compose checker
No missing expected images.

Soft failed openQA tests: 1/8 (x86_64), 1/8 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Cloud-33-20210624.0):

ID: 915751  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/915751
ID: 915760  Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/915760

Passed openQA tests: 7/8 (x86_64), 7/8 (aarch64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Why doesn't iconv know ISO-8859-2 in rawhide?

2021-06-25 Thread Siddhesh Poyarekar
On Fri, Jun 25, 2021 at 10:47 AM Zdenek Dohnal  wrote:
> Aha, it seems the rawhide buildroot from 6/23 still contained glibc with
> recommends on new package and not hard requires.

Sorry yes, we haven't done a build yet.  I expect one to come out next
week with this fix and the fix for some other breakages.

> I've explicitly added glibc-gconv-extra as a buildrequires for vim now -
> although as you told it is unnecessary right now, I guess it is a good
> thing to track what the package actually needs (dependencies can change
> with time, as I found out painfully over the years :D ).

I've got a releng ticket[1] out to pull glibc-gconv-extra into the
minimal buildroot so that we can weaken the dependency again.  That
way every package won't have to explicitly mention this dependency.

Thanks,
Siddhesh

[1] https://pagure.io/releng/issue/10176
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure