[Bug 2058507] New: perl-PDL-2.076 is available

2022-02-24 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2058507

Bug ID: 2058507
   Summary: perl-PDL-2.076 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-PDL
  Keywords: FutureFeature, Triaged
  Assignee: jples...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: caillon+fedoraproj...@gmail.com,
jakub.jedel...@gmail.com, jples...@redhat.com,
ka...@ucw.cz, lkund...@v3.sk,
perl-devel@lists.fedoraproject.org,
rhug...@redhat.com, rstr...@redhat.com,
sandm...@redhat.com, tjczep...@gmail.com
  Target Milestone: ---
Classification: Fedora



Latest upstream release: 2.076
Current version/release in rawhide: 2.75.0-1.fc37
URL: http://search.cpan.org/dist/PDL/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from Anitya:
https://release-monitoring.org/project/3205/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2058507
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: How long to update and reflash in rpms web

2022-02-24 Thread Adam Williamson
On Fri, 2022-02-25 at 07:15 +, Miao, Jun wrote:
> Hi developers,
> 
> I just update the tboot from 1.10.3-> 1.10.4 and "fedpkg build" successfully.
> Got the email inform "[Fedora Update] [comment] tboot-1.10.4-2.fc37"  and a 
> link https://bodhi.fedoraproject.org/updates/FEDORA-2022-df432d9356
> But from the web the Fedora37 is still xx.fc.36 like this:
> [cid:image001.png@01D82A5A.87C07570]
> 
> When the Fedora 37 -> xxx.fc37 

After the next Rawhide compose completes, plus time for mirrors to
sync. There is usually one compose per day, completing around 9-10am
UTC.
-- 
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


How long to update and reflash in rpms web

2022-02-24 Thread Miao, Jun
Hi developers,

I just update the tboot from 1.10.3-> 1.10.4 and "fedpkg build" successfully.
Got the email inform "[Fedora Update] [comment] tboot-1.10.4-2.fc37"  and a 
link https://bodhi.fedoraproject.org/updates/FEDORA-2022-df432d9356
But from the web the Fedora37 is still xx.fc.36 like this:
[cid:image001.png@01D82A5A.87C07570]

When the Fedora 37 -> xxx.fc37 

Thanks
Jun
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Possibly unexpcted soname change: liblept.so.5 -> libleptonica.so.5.4.0

2022-02-24 Thread Mamoru TASAKA

Hello, all:

On f37 / f36 leptonica made some packaging change:
https://src.fedoraproject.org/rpms/leptonica/c/e2486ca5bc2578ee629457b854c5e13bb94c1dde?branch=rawhide

This caused soname change: liblept.so.5 -> libleptonica.so.5.4.0 , which I 
guess is unexpected.

$ dnf repoquery --quiet --repo=koji-36 --qf '%{sourcerpm}' --whatrequires 
"liblept.so.5()(64bit)" | cat -n
 1  leptonica-1.82.0-2.fc36.src.rpm
 2  mupdf-1.19.0-5.fc36.src.rpm
 3  python-PyMuPDF-1.19.4-2.fc36.src.rpm
 4  tesseract-5.0.1-2.fc36.src.rpm
 5  zathura-pdf-mupdf-0.3.7-5.fc36.src.rpm

$ dnf repoquery --quiet --repo=koji-37 --qf '%{sourcerpm}' --whatrequires 
"liblept.so.5()(64bit)" | cat -n
 1  mupdf-1.19.0-5.fc36.src.rpm
 2  python-PyMuPDF-1.19.5-1.fc37.src.rpm
 3  zathura-pdf-mupdf-0.3.7-5.fc36.src.rpm

(Some of the package were rebuilt on f37 due to another reason, so depending 
packages' number
 differs here)

Currently I am not sure if we can just revert the above change.

Regards,
Mamoru
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Rawhide-20220224.n.1 compose check report

2022-02-24 Thread Fedora compose checker
Missing expected images:

Minimal raw-xz armhfp

Compose FAILS proposed Rawhide gating check!
1 of 43 required tests failed
openQA tests matching unsatisfied gating requirements shown with **GATING** 
below

Failed openQA tests: 23/231 (x86_64), 21/161 (aarch64)

New failures (same test not failed in Fedora-Rawhide-20220222.n.1):

ID: 1146875 Test: x86_64 Workstation-live-iso desktop_notifications_live
URL: https://openqa.fedoraproject.org/tests/1146875
ID: 1146906 Test: x86_64 KDE-live-iso desktop_login
URL: https://openqa.fedoraproject.org/tests/1146906
ID: 1146910 Test: x86_64 KDE-live-iso apps_startstop
URL: https://openqa.fedoraproject.org/tests/1146910
ID: 1146913 Test: x86_64 KDE-live-iso desktop_notifications_postinstall
URL: https://openqa.fedoraproject.org/tests/1146913
ID: 1146916 Test: x86_64 KDE-live-iso desktop_printing_builtin
URL: https://openqa.fedoraproject.org/tests/1146916
ID: 1146924 Test: x86_64 Silverblue-dvd_ostree-iso evince
URL: https://openqa.fedoraproject.org/tests/1146924
ID: 1146933 Test: x86_64 Silverblue-dvd_ostree-iso gnome_text_editor
URL: https://openqa.fedoraproject.org/tests/1146933
ID: 1146980 Test: aarch64 Server-dvd-iso base_reboot_unmount@uefi
URL: https://openqa.fedoraproject.org/tests/1146980
ID: 1146999 Test: aarch64 Server-dvd-iso server_cockpit_basic@uefi
URL: https://openqa.fedoraproject.org/tests/1146999
ID: 1147063 Test: aarch64 Workstation-upgrade base_service_manipulation@uefi
URL: https://openqa.fedoraproject.org/tests/1147063
ID: 1147064 Test: aarch64 Workstation-upgrade desktop_terminal@uefi
URL: https://openqa.fedoraproject.org/tests/1147064
ID: 1147068 Test: aarch64 Workstation-upgrade desktop_browser@uefi
URL: https://openqa.fedoraproject.org/tests/1147068
ID: 1147080 Test: aarch64 Workstation-upgrade evince@uefi
URL: https://openqa.fedoraproject.org/tests/1147080

Old failures (same test failed in Fedora-Rawhide-20220222.n.1):

ID: 1146859 Test: x86_64 Server-dvd-iso modularity_tests
URL: https://openqa.fedoraproject.org/tests/1146859
ID: 1146881 Test: x86_64 Workstation-live-iso gnome_text_editor
URL: https://openqa.fedoraproject.org/tests/1146881
ID: 1146887 Test: x86_64 Workstation-live-iso 
desktop_notifications_postinstall
URL: https://openqa.fedoraproject.org/tests/1146887
ID: 1146894 Test: x86_64 Workstation-live-iso eog
URL: https://openqa.fedoraproject.org/tests/1146894
ID: 1146897 Test: x86_64 Workstation-live-iso apps_startstop
URL: https://openqa.fedoraproject.org/tests/1146897
ID: 1146900 Test: x86_64 KDE-live-iso anaconda_help
URL: https://openqa.fedoraproject.org/tests/1146900
ID: 1146901 Test: x86_64 KDE-live-iso desktop_notifications_live
URL: https://openqa.fedoraproject.org/tests/1146901
ID: 1146902 Test: x86_64 KDE-live-iso install_default@uefi **GATING**
URL: https://openqa.fedoraproject.org/tests/1146902
ID: 1146965 Test: aarch64 Server-dvd-iso support_server@uefi
URL: https://openqa.fedoraproject.org/tests/1146965
ID: 1146976 Test: aarch64 Server-dvd-iso 
install_repository_nfsiso_variation@uefi
URL: https://openqa.fedoraproject.org/tests/1146976
ID: 1146979 Test: aarch64 Server-dvd-iso modularity_tests@uefi
URL: https://openqa.fedoraproject.org/tests/1146979
ID: 1147000 Test: aarch64 Server-dvd-iso realmd_join_cockpit@uefi
URL: https://openqa.fedoraproject.org/tests/1147000
ID: 1147019 Test: aarch64 Workstation-raw_xz-raw.xz 
desktop_update_graphical@uefi
URL: https://openqa.fedoraproject.org/tests/1147019
ID: 1147026 Test: aarch64 Workstation-raw_xz-raw.xz gnome_text_editor@uefi
URL: https://openqa.fedoraproject.org/tests/1147026
ID: 1147028 Test: aarch64 Workstation-raw_xz-raw.xz eog@uefi
URL: https://openqa.fedoraproject.org/tests/1147028
ID: 1147045 Test: x86_64 Workstation-upgrade gnome_text_editor
URL: https://openqa.fedoraproject.org/tests/1147045
ID: 1147047 Test: x86_64 Workstation-upgrade 
desktop_notifications_postinstall
URL: https://openqa.fedoraproject.org/tests/1147047
ID: 1147054 Test: x86_64 Workstation-upgrade desktop_fprint
URL: https://openqa.fedoraproject.org/tests/1147054
ID: 1147057 Test: x86_64 Workstation-upgrade apps_startstop
URL: https://openqa.fedoraproject.org/tests/1147057
ID: 1147065 Test: aarch64 Workstation-upgrade eog@uefi
URL: https://openqa.fedoraproject.org/tests/1147065
ID: 1147077 Test: aarch64 Workstation-upgrade gnome_text_editor@uefi
URL: https://openqa.fedoraproject.org/tests/1147077
ID: 1147081 Test: x86_64 universal install_european_language
URL: https://openqa.fedoraproject.org/tests/1147081
ID: 1147091 Test: x86_64 universal install_arabic_language
URL: https://openqa.fedoraproject.org/tests/1147091
ID: 1147110 Test: x86_64 universal install_asian_language
URL: https://openqa.fedoraproject.org/tests/1147110
ID: 1147140 Test: x86_64 universal install_cyrillic_language
URL: https://openqa.fedoraproject.org/tests/1147140
ID: 

[Bug 2032430] perl-Type-Tiny for EPEL 9

2022-02-24 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2032430

Fedora Update System  changed:

   What|Removed |Added

 Status|MODIFIED|ON_QA



--- Comment #20 from Fedora Update System  ---
FEDORA-EPEL-2022-844601896b has been pushed to the Fedora EPEL 9 testing
repository.

You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-844601896b

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information
on how to test updates.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032430
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-IoT-36-20220224.0 compose check report

2022-02-24 Thread Fedora compose checker
No missing expected images.

Failed openQA tests: 5/15 (aarch64)

New failures (same test not failed in Fedora-IoT-36-20220223.0):

ID: 1147239 Test: aarch64 IoT-dvd_ostree-iso iot_zezere_server@uefi
URL: https://openqa.fedoraproject.org/tests/1147239
ID: 1147241 Test: aarch64 IoT-dvd_ostree-iso iot_zezere_ignition@uefi
URL: https://openqa.fedoraproject.org/tests/1147241
ID: 1147246 Test: aarch64 IoT-dvd_ostree-iso release_identification@uefi
URL: https://openqa.fedoraproject.org/tests/1147246
ID: 1147250 Test: aarch64 IoT-dvd_ostree-iso podman@uefi
URL: https://openqa.fedoraproject.org/tests/1147250

Old failures (same test failed in Fedora-IoT-36-20220223.0):

ID: 1147237 Test: aarch64 IoT-dvd_ostree-iso iot_clevis@uefi
URL: https://openqa.fedoraproject.org/tests/1147237

Soft failed openQA tests: 1/16 (x86_64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-IoT-36-20220223.0):

ID: 1147221 Test: x86_64 IoT-dvd_ostree-iso iot_clevis
URL: https://openqa.fedoraproject.org/tests/1147221

Passed openQA tests: 15/16 (x86_64), 10/15 (aarch64)

New passes (same test not passed in Fedora-IoT-36-20220223.0):

ID: 1147234 Test: x86_64 IoT-dvd_ostree-iso iot_zezere_server
URL: https://openqa.fedoraproject.org/tests/1147234
ID: 1147236 Test: x86_64 IoT-dvd_ostree-iso iot_zezere_ignition
URL: https://openqa.fedoraproject.org/tests/1147236

Installed system changes in test x86_64 IoT-dvd_ostree-iso 
install_default_upload: 
System load changed from 0.01 to 0.40
Previous test data: https://openqa.fedoraproject.org/tests/1143976#downloads
Current test data: https://openqa.fedoraproject.org/tests/1147222#downloads

Installed system changes in test x86_64 IoT-dvd_ostree-iso 
install_default@uefi: 
System load changed from 0.01 to 0.15
Previous test data: https://openqa.fedoraproject.org/tests/1143977#downloads
Current test data: https://openqa.fedoraproject.org/tests/1147223#downloads
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Devtoolset for epel7 for build in Copr

2022-02-24 Thread Sérgio Basto
On Fri, 2022-02-25 at 02:43 +0300, Dmitry Butskoy wrote:
> Sérgio Basto wrote:
> > On Thu, 2022-02-24 at 21:20 +0300, Dmitry Butskoy wrote:
> > > Miroslav Suchý wrote:
> > > > > Second, the alternate Springdale Linux repo
> > > > > http://springdale.princeton.edu/data/springdale/SCL/7/x86_64/
> > > > >  see
> > > > > ms
> > > > > to have all the ones (which are provided in sources by
> > > > > RedHat),
> > > > > but
> > > > > cannot be used in Copr. Springdale provides devtoolset-3-
> > > > > elfutils
> > > > > there, and it in some strange way  badly correlates with the
> > > > > initial
> > > > > Copr build environment (even before the rpmbuild process
> > > > > starts).
> > > > > Some python2 module cannot find libelf.so.1 ...
> > > > 
> > > > That is because it is SCL package. It installs the library to
> > > > 
> > > > /opt/rh/devtoolset-3/root/usr/lib64/libelf.so.1
> > > > 
> > > > You have to run
> > > > 
> > > >    scl enable devtools-3 $COMMAND
> > > > 
> > > But where to run it exactly?
> > > 
> > yes is not easy find an example unfortunately , first line of
> > %build
> 
> %build is in the .spec file. It is readed after the start of the
> build. 
> The start of the build is performed after the "bootstrap" stage. At
> this 
> stage "yum install" creates an initial environment. Probably I'm
> wrong 

. /opt/rh/devtoolset-9/enable

before cd mozilla 

instead `source scl_source enable devtoolset-9`

> -- could you pls look at:
> > Start: yum install
> > There was a problem importing one of the Python modules
> > required to run yum. The error leading to this problem was:
> > 
> >     libelf.so.1: cannot open shared object file: No such file or
> > directory
> fragment in the correspond log: 
> https://download.copr.fedorainfracloud.org/results/buc/seamonkey-generic/epel-7-x86_64/03543870-seamonkey/builder-live.log.gz
>  
> ?
> 
> IOW: there is no "yum install" in the .spec file. So where to run 
> "scl-enable ..." to take it effect before that "yum install" ?
> 
> 
> ~buc
> 
> 
> 
> 
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines:
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it:
> https://pagure.io/fedora-infrastructure

-- 
Sérgio M. B.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[EPEL-devel] Fedora EPEL 7 updates-testing report

2022-02-24 Thread updates
The following Fedora EPEL 7 Security updates need testing:
 Age  URL
   5  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-dc3bd1f656   
llvm13-13.0.1-1.el7 rust-1.58.1-1.el7
   1  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-18ac3af1c8   
varnish-4.0.5-3.el7


The following builds have been pushed to Fedora EPEL 7 updates-testing

seamonkey-2.53.11-1.el7

Details about builds:



 seamonkey-2.53.11-1.el7 (FEDORA-EPEL-2022-af77a11507)
 Web browser, e-mail, news, IRC client, HTML editor

Update Information:

Update to 2.53.11  Default version of Firefox for the User-Agent string has now
been changed to 68.0 . This should provide better compatibility with modern
sites. The value can be changed in Preferences-->Advanced-->HTTP Networking .
Besides that, an alternate site-specific override machanism is now activated.
(The idea comes from Waterfox-Classic project). The file ua-update.json in the
application dir is now additionally used for a list of overrides. You can copy
it into your profile and edit if needed (be careful with format.)  The
"general.useragent.override.*" way continues to work and takes precedence. The
new  mechanism can be toggled by "general.useragent.updates.enabled" prefs (in
about:config).

ChangeLog:

* Wed Feb 23 2022 Dmitry Butskoy  2.53.11-1
- update to 2.53.11
- use ua-update.json mechanism for site-specific user-agent overrides
- fix some minor issues


___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2051422] Please branch and build perl-Data-Serializer for EPEL 9

2022-02-24 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2051422

Fedora Update System  changed:

   What|Removed |Added

 Resolution|--- |ERRATA
   Fixed In Version||perl-Data-Serializer-0.65-7
   ||.el9
 Status|ON_QA   |CLOSED
Last Closed||2022-02-25 00:06:54



--- Comment #4 from Fedora Update System  ---
FEDORA-EPEL-2022-ca22384d83 has been pushed to the Fedora EPEL 9 stable
repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2051422
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2051424] Please branch and build perl-Log-Trace for EPEL 9

2022-02-24 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2051424
Bug 2051424 depends on bug 2051422, which changed state.

Bug 2051422 Summary: Please branch and build perl-Data-Serializer for EPEL 9
https://bugzilla.redhat.com/show_bug.cgi?id=2051422

   What|Removed |Added

 Status|ON_QA   |CLOSED
 Resolution|--- |ERRATA




-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2051424
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2039718] Please branch and build perl-Mojolicious for EPEL 9

2022-02-24 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2039718

Fedora Update System  changed:

   What|Removed |Added

   Fixed In Version||perl-Mojolicious-9.22-2.el9
 Resolution|--- |ERRATA
 Status|ON_QA   |CLOSED
Last Closed||2022-02-25 00:06:51



--- Comment #4 from Fedora Update System  ---
FEDORA-EPEL-2022-ca22384d83 has been pushed to the Fedora EPEL 9 stable
repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2039718
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-36-20220224.n.0 compose check report

2022-02-24 Thread Fedora compose checker
No missing expected images.

Failed openQA tests: 10/229 (x86_64), 12/161 (aarch64)

New failures (same test not failed in Fedora-36-20220223.n.0):

ID: 1146404 Test: x86_64 Server-dvd-iso install_lvm_ext4@uefi
URL: https://openqa.fedoraproject.org/tests/1146404
ID: 1146501 Test: x86_64 Silverblue-dvd_ostree-iso evince
URL: https://openqa.fedoraproject.org/tests/1146501
ID: 1146560 Test: aarch64 Server-dvd-iso 
server_role_deploy_domain_controller@uefi
URL: https://openqa.fedoraproject.org/tests/1146560
ID: 1146562 Test: aarch64 Server-dvd-iso server_realmd_join_kickstart@uefi
URL: https://openqa.fedoraproject.org/tests/1146562
ID: 1146572 Test: aarch64 Server-dvd-iso realmd_join_sssd@uefi
URL: https://openqa.fedoraproject.org/tests/1146572
ID: 1146575 Test: aarch64 Server-dvd-iso realmd_join_cockpit@uefi
URL: https://openqa.fedoraproject.org/tests/1146575
ID: 1146641 Test: aarch64 Workstation-upgrade desktop_background@uefi
URL: https://openqa.fedoraproject.org/tests/1146641

Old failures (same test failed in Fedora-36-20220223.n.0):

ID: 1146477 Test: x86_64 KDE-live-iso anaconda_help
URL: https://openqa.fedoraproject.org/tests/1146477
ID: 1146478 Test: x86_64 KDE-live-iso desktop_notifications_live
URL: https://openqa.fedoraproject.org/tests/1146478
ID: 1146510 Test: x86_64 Silverblue-dvd_ostree-iso gnome_text_editor
URL: https://openqa.fedoraproject.org/tests/1146510
ID: 1146594 Test: aarch64 Workstation-raw_xz-raw.xz 
desktop_update_graphical@uefi
URL: https://openqa.fedoraproject.org/tests/1146594
ID: 1146601 Test: aarch64 Workstation-raw_xz-raw.xz gnome_text_editor@uefi
URL: https://openqa.fedoraproject.org/tests/1146601
ID: 1146652 Test: aarch64 Workstation-upgrade gnome_text_editor@uefi
URL: https://openqa.fedoraproject.org/tests/1146652
ID: 1146653 Test: aarch64 Workstation-upgrade desktop_update_graphical@uefi
URL: https://openqa.fedoraproject.org/tests/1146653
ID: 1146685 Test: x86_64 universal install_asian_language
URL: https://openqa.fedoraproject.org/tests/1146685
ID: 1146753 Test: aarch64 universal install_asian_language@uefi
URL: https://openqa.fedoraproject.org/tests/1146753
ID: 1146782 Test: x86_64 universal install_arabic_language
URL: https://openqa.fedoraproject.org/tests/1146782
ID: 1146783 Test: aarch64 Minimal-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/1146783
ID: 1146792 Test: x86_64 KDE-live-iso install_no_user
URL: https://openqa.fedoraproject.org/tests/1146792
ID: 1146793 Test: x86_64 KDE-live-iso install_default_upload
URL: https://openqa.fedoraproject.org/tests/1146793
ID: 1146811 Test: x86_64 KDE-live-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/1146811
ID: 1146813 Test: aarch64 universal install_arabic_language@uefi
URL: https://openqa.fedoraproject.org/tests/1146813

Soft failed openQA tests: 13/161 (aarch64), 15/229 (x86_64)
(Tests completed, but using a workaround for a known bug)

New soft failures (same test not soft failed in Fedora-36-20220223.n.0):

ID: 1146762 Test: aarch64 universal upgrade_2_server_domain_controller@uefi
URL: https://openqa.fedoraproject.org/tests/1146762
ID: 1146780 Test: aarch64 universal upgrade_2_realmd_client@uefi
URL: https://openqa.fedoraproject.org/tests/1146780

Old soft failures (same test soft failed in Fedora-36-20220223.n.0):

ID: 1146471 Test: x86_64 Workstation-live-iso eog
URL: https://openqa.fedoraproject.org/tests/1146471
ID: 1146508 Test: x86_64 Silverblue-dvd_ostree-iso eog
URL: https://openqa.fedoraproject.org/tests/1146508
ID: 1146516 Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/1146516
ID: 1146603 Test: aarch64 Workstation-raw_xz-raw.xz eog@uefi
URL: https://openqa.fedoraproject.org/tests/1146603
ID: 1146614 Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/1146614
ID: 1146615 Test: x86_64 Workstation-upgrade upgrade_desktop_64bit
URL: https://openqa.fedoraproject.org/tests/1146615
ID: 1146637 Test: aarch64 Workstation-upgrade upgrade_desktop_64bit@uefi
URL: https://openqa.fedoraproject.org/tests/1146637
ID: 1146640 Test: aarch64 Workstation-upgrade eog@uefi
URL: https://openqa.fedoraproject.org/tests/1146640
ID: 1146660 Test: x86_64 universal upgrade_2_desktop_64bit
URL: https://openqa.fedoraproject.org/tests/1146660
ID: 1146661 Test: x86_64 universal upgrade_2_desktop_encrypted_64bit
URL: https://openqa.fedoraproject.org/tests/1146661
ID: 1146662 Test: x86_64 universal upgrade_2_kde_64bit
URL: https://openqa.fedoraproject.org/tests/1146662
ID: 1146670 Test: x86_64 universal upgrade_desktop_encrypted_64bit
URL: https://openqa.fedoraproject.org/tests/1146670
ID: 1146680 Test: x86_64 universal upgrade_server_64bit
URL: https://openqa.fedoraproject.org/tests/1146680
ID: 1146690 Test: x86_64 

Re: future of dual-boot on the desktop

2022-02-24 Thread Brian C. Lane
On Wed, Feb 23, 2022 at 05:56:14PM -0700, Chris Murphy wrote:
> Hi,
> 
> Dual boot has been a pretty important use case for Fedora Workstation
> edition and the desktop spins.

It sounds to me like it is time to punt the problem to the firmware on
UEFI systems. Make sure we don't clobber existing Windows boot entries
or partitions and let the firmware sort it out. Most of my UEFI systems
have a boot menu that will list the entries and let you easily select
them. I'd rather do that than depend on some kind of half-boot linux
reboot into windows thing.

Yeah, I know the firmware experience is inconsistent and terrible. But
given the combination of TPM and bitlocker I don't see any other
solution.

Brian

-- 
Brian C. Lane (PST8PDT) - weldr.io - lorax - parted - pykickstart
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Devtoolset for epel7 for build in Copr

2022-02-24 Thread Dmitry Butskoy

Sérgio Basto wrote:

On Thu, 2022-02-24 at 21:20 +0300, Dmitry Butskoy wrote:

Miroslav Suchý wrote:

Second, the alternate Springdale Linux repo
http://springdale.princeton.edu/data/springdale/SCL/7/x86_64/ see
ms
to have all the ones (which are provided in sources by RedHat),
but
cannot be used in Copr. Springdale provides devtoolset-3-elfutils
there, and it in some strange way  badly correlates with the
initial
Copr build environment (even before the rpmbuild process starts).
Some python2 module cannot find libelf.so.1 ...


That is because it is SCL package. It installs the library to

/opt/rh/devtoolset-3/root/usr/lib64/libelf.so.1

You have to run

   scl enable devtools-3 $COMMAND


But where to run it exactly?


yes is not easy find an example unfortunately , first line of %build


%build is in the .spec file. It is readed after the start of the build. 
The start of the build is performed after the "bootstrap" stage. At this 
stage "yum install" creates an initial environment. Probably I'm wrong 
-- could you pls look at:

Start: yum install
There was a problem importing one of the Python modules
required to run yum. The error leading to this problem was:

libelf.so.1: cannot open shared object file: No such file or directory
fragment in the correspond log: 
https://download.copr.fedorainfracloud.org/results/buc/seamonkey-generic/epel-7-x86_64/03543870-seamonkey/builder-live.log.gz 
?


IOW: there is no "yum install" in the .spec file. So where to run 
"scl-enable ..." to take it effect before that "yum install" ?



~buc




___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Devtoolset for epel7 for build in Copr

2022-02-24 Thread Sérgio Basto
On Thu, 2022-02-24 at 21:20 +0300, Dmitry Butskoy wrote:
> Miroslav Suchý wrote:
> > 
> > > 
> > > Second, the alternate Springdale Linux repo 
> > > http://springdale.princeton.edu/data/springdale/SCL/7/x86_64/ see
> > > ms
> > > to have all the ones (which are provided in sources by RedHat),
> > > but 
> > > cannot be used in Copr. Springdale provides devtoolset-3-elfutils
> > > there, and it in some strange way  badly correlates with the
> > > initial 
> > > Copr build environment (even before the rpmbuild process starts).
> > > Some python2 module cannot find libelf.so.1 ...
> > 
> > 
> > That is because it is SCL package. It installs the library to
> > 
> > /opt/rh/devtoolset-3/root/usr/lib64/libelf.so.1
> > 
> > You have to run
> > 
> >   scl enable devtools-3 $COMMAND
> > 
> 
> But where to run it exactly?
> 

yes is not easy find an example unfortunately , first line of %build 

see this example : 
https://src.fedoraproject.org/rpms/mkvtoolnix/blob/4400f88779be30d35d909545b76346dc218c24d4/f/mkvtoolnix.spec#_76


> It seems it happens on some early stage (so I cannot alter anything in 
> the .spec file).
> 
> Could anybody look into the prolem log: 
> https://download.copr.fedorainfracloud.org/results/buc/seamonkey-generic/epel-7-x86_64/03543870-seamonkey/builder-live.log.gz
>  
> ?
> 
> 
> ~buc
> 
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it:
> https://pagure.io/fedora-infrastructure

-- 
Sérgio M. B.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: future of dual-boot on the desktop

2022-02-24 Thread Chris Murphy
On Wed, Feb 23, 2022 at 6:35 PM Kevin Kofler via devel
 wrote:
>
> Chris Murphy wrote:
> > A work around is having GRUB set an NVRAM variable indicating the next
> > boot should be Windows. That's an instruction to the firmware, so
> > there's no intermediary, thus measured boot works. The next boot (from
> > Windows) would boot Fedora again. GRUB can't get or set EFI variables
> > yet. systemd-boot, meanwhile, will be supporting BootNext in their
> > next release.
>
> So, can we not, in GRUB, instead of chainloading the Windows bootloader,
> chainload a systemd-boot copy preconfigured to BootNext to Windows?

No because systemd-boot isn't signed with a Fedora Secure  Boot
signing key, so on systems with UEFI Secure Boot enabled, they'd fail
to load systemd-boot.

But also, this isn't an upstreamable solution, so the Fedora and Red
Hat bootloader teams are unlikely to support it either.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora 36 compose report: 20220224.n.0 changes

2022-02-24 Thread Fedora Rawhide Report
OLD: Fedora-36-20220223.n.0
NEW: Fedora-36-20220224.n.0

= SUMMARY =
Added images:0
Dropped images:  0
Added packages:  0
Dropped packages:0
Upgraded packages:   0
Downgraded packages: 0

Size of added packages:  0 B
Size of dropped packages:0 B
Size of upgraded packages:   0 B
Size of downgraded packages: 0 B

Size change of upgraded packages:   0 B
Size change of downgraded packages: 0 B

= ADDED IMAGES =

= DROPPED IMAGES =

= ADDED PACKAGES =

= DROPPED PACKAGES =

= UPGRADED PACKAGES =

= DOWNGRADED PACKAGES =
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Looking for %{forgemeta} GitHub example

2022-02-24 Thread Brandon Nielsen

On 2/22/22 1:56 PM, Jason L Tibbitts III wrote:

Brandon Nielsen  writes:



I would like to see the forge macros removed from the guidelines if
development truly has ceased.


I would like to get into them and at least see what needs to change
but... the internal implementation is somewhat baroque and my time is
severely limited.  I think there is good stuff there but I don't know
how much work would be required to salvage it.

One problem is that at least I thought that significant portions of the
Go tooling relied on it, and there's no alternative that has any kind of
automation.

  - J<


Looking at this a little more, I'm not really sure we need to be 
discouraging their use. The code[0] doesn't look that bad to me, and 
there are only 2 issues open against it.


The fact nobody is stepping up to at least comment on the two issues is 
a bit of a concern. The first one[1] looks really problematic, and I 
don't see how you can fix it without coordinating with any package using 
the broken behavior. Hopefully it isn't as bad as it looks?


The second one[2] is an RFE, and looks like one I may try to address if 
nobody gets to it before I have some free time.


I do agree with the sentiment elsewhere in this thread that for the 
majority of cases, it's easy enough to just work with the URLs directly. 
Maybe the git forge macro documentation moves somewhere else instead?


[0] - 
https://src.fedoraproject.org/rpms/redhat-rpm-config/blob/rawhide/f/forge.lua

[1] - https://bugzilla.redhat.com/show_bug.cgi?id=2048362
[2] - https://bugzilla.redhat.com/show_bug.cgi?id=2035935
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: unsafe systemd setup in Fedora

2022-02-24 Thread Rahul Sundaram
Hi

On Thu, Feb 24, 2022 at 2:14 PM Zbigniew Jędrzejewski-Szmek

>
> Systemd 250 (coming in F36), has --security-policy switch which can be
> used to enable/disable some of the checks. There is no way to tell
> systemd-analyze that things about a specific unit though.
>

Ability to modify these policies via configuration (the above one looks
like a build config) and ability to do global overrides and set the
hardening features across all services so distributions or sysadmins can
configure those would be helpful

Rahul
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: unsafe systemd setup in Fedora

2022-02-24 Thread Zbigniew Jędrzejewski-Szmek
On Thu, Feb 24, 2022 at 04:29:27PM +0100, Marius Schwarz wrote:
> Hi Guys,
> 
> running a hardening tool I stumpled about systemd own security analysis,

systemd-analyze security shows whether units use systemd hardening
features. Those units may well use other features, and may well be
very secure. In general it is a good idea to use at least some of the
systemd features, but not always. Sometimes the unit may need to implement
its own harderning in a very special way, or it may legitimately need
almost full privileges. (For example sshd is like this: it implements
privilege separation and does other things for security, but it needs
full privileges to be able to run things as arbitrary users.)

High exposure scores mean only so much.

It would probably be good to use more of those features, but you need
to understand the service very well to know what systemd security
features can be enabled for it.

> Do those "insecure" units come from upstream projects, or is Fedora lagging
> behind some patches?

Fedora usually uses service files straight from upstream, if upstream
provides them.

> Is there a way to find out, if missing restrictions options are a problem
> for the service and if not, any way to tell that analyse tool about it?

Systemd 250 (coming in F36), has --security-policy switch which can be
used to enable/disable some of the checks. There is no way to tell
systemd-analyze that things about a specific unit though.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Curl-minimal as default (System-Wide Change proposal)

2022-02-24 Thread Chris Adams
Once upon a time, Vitaly Zaitsev via devel  said:
> Now we can drop FTP support from libcurl safely.

I still disagree, since dnf is not the sole user of curl/libcurl.
Making libcurl tiny for containers is one thing, but replacing a
commonly-used command with an intentionally-limited version is bad.
IMHO that doesn't just go for curl/libcurl, or just the libcurl FTP
support (I definitely think IDN support should be everywhere practical).

I think curl is the only FTP client installed in a minimal config, so
dropping that support shouldn't be taking lightly.

At a minimum, I think there'd need to be buy-in from other distributions
to have a common set of functionality in the base.  Otherwise, this is
just going to result in "curl in Fedora is broken, use Ubuntu" type
psts.
-- 
Chris Adams 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Curl-minimal as default (System-Wide Change proposal)

2022-02-24 Thread Vitaly Zaitsev via devel

On 24/02/2022 19:05, Kevin Fenzi wrote:

Odd. There shouldn't be any. Can you paste/post what you are seeing?


Sorry, my bad. I've seen errors like "Timeout was reached for 
ftp.example.org".


There are a lot of mirrors with ftp subdomain:
- ftp.lysator.liu.se
- ftp.nluug.nl
- ftp.fau.de
- ftp.lip6.fr
- ftp.halifax.rwth-aachen.de
- ftp.acc.umu.se
- ftp.byfly.by
- ftp.fi.muni.cz
- ftp.plusline.net
- ftp.upjs.sk

I checked metalink and all of these servers use only http and rsync 
protocols.


Now we can drop FTP support from libcurl safely.

--
Sincerely,
  Vitaly Zaitsev (vit...@easycoding.org)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Curl-minimal as default (System-Wide Change proposal)

2022-02-24 Thread Daniel P . Berrangé
On Thu, Feb 24, 2022 at 07:16:26PM +0100, Ralf Corsépius wrote:
> 
> 
> Am 24.02.22 um 19:05 schrieb Kevin Fenzi:
> > On Wed, Feb 23, 2022 at 10:19:33AM +0100, Vitaly Zaitsev via devel wrote:
> > > On 22/02/2022 21:45, Peter Robinson wrote:
> > > > Does it make sense to keep FTP with most browsers obsoleting the
> > > > protocol due to lack of security?
> > > 
> > > Many Fedora mirrors still use FTP. You can check metalink file.
> > 
> > Odd. There shouldn't be any. Can you paste/post what you are seeing?
> > 
> > We disabled and removed all ftp:// urls in mirrormanager in 2016:
> > https://github.com/fedora-infra/mirrormanager2/issues/99#issuecomment-222630215
> 
> dnf isn't restricted to using "official" mirrors, but is also used for 3rd
> party add-on-repos and for private repos.
> 
> For them, disabling ftp is pretty much a massive regression.

This feels like it is overstating the severity to a large degree.

Removing FTP from official Fedora mirror manager was not a massive
regression because so few of our mirrors were FTP-only in 2016.
Another 6 years later, the number of sites with FTP-only  can only
have decreased. So while there certainly could be 3rd party repos
which have one or more mirrors which are FTP only, if they exist
they will surely be a tiny minority in the big picture. Their loss
would simply mean it picked a different mirror.

If someone is setting up a personal private mirror, I struggle
to understand a reason why they would pick FTP over HTTP(S)
today. Perhaps someone will have a FTP only mirror that's
existed for years and simply haven't got around to enabling
HTTP, but addressing that is not an unreasonable expectation.

IMHO explicitly disabling FTP in dnf would be fine, as any fallout
could be easily dealt with by enabling HTTP. Just ensure we announce
such intent ahead of time via a Fedora feature proposal.

Regards,
Daniel
-- 
|: https://berrange.com  -o-https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o-https://fstop138.berrange.com :|
|: https://entangle-photo.org-o-https://www.instagram.com/dberrange :|
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Devtoolset for epel7 for build in Copr

2022-02-24 Thread Dmitry Butskoy

Miroslav Suchý wrote:




Second, the alternate Springdale Linux repo 
http://springdale.princeton.edu/data/springdale/SCL/7/x86_64/ seems 
to have all the ones (which are provided in sources by RedHat), but 
cannot be used in Copr. Springdale provides devtoolset-3-elfutils 
there, and it in some strange way  badly correlates with the initial 
Copr build environment (even before the rpmbuild process starts). 
Some python2 module cannot find libelf.so.1 ...



That is because it is SCL package. It installs the library to

/opt/rh/devtoolset-3/root/usr/lib64/libelf.so.1

You have to run

  scl enable devtools-3 $COMMAND



But where to run it exactly?

It seems it happens on some early stage (so I cannot alter anything in 
the .spec file).


Could anybody look into the prolem log: 
https://download.copr.fedorainfracloud.org/results/buc/seamonkey-generic/epel-7-x86_64/03543870-seamonkey/builder-live.log.gz 
?



~buc

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Curl-minimal as default (System-Wide Change proposal)

2022-02-24 Thread Ralf Corsépius



Am 24.02.22 um 19:05 schrieb Kevin Fenzi:

On Wed, Feb 23, 2022 at 10:19:33AM +0100, Vitaly Zaitsev via devel wrote:

On 22/02/2022 21:45, Peter Robinson wrote:

Does it make sense to keep FTP with most browsers obsoleting the
protocol due to lack of security?


Many Fedora mirrors still use FTP. You can check metalink file.


Odd. There shouldn't be any. Can you paste/post what you are seeing?

We disabled and removed all ftp:// urls in mirrormanager in 2016:
https://github.com/fedora-infra/mirrormanager2/issues/99#issuecomment-222630215


dnf isn't restricted to using "official" mirrors, but is also used for 
3rd party add-on-repos and for private repos.


For them, disabling ftp is pretty much a massive regression.

Ralf
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Curl-minimal as default (System-Wide Change proposal)

2022-02-24 Thread Kevin Fenzi
On Wed, Feb 23, 2022 at 10:19:33AM +0100, Vitaly Zaitsev via devel wrote:
> On 22/02/2022 21:45, Peter Robinson wrote:
> > Does it make sense to keep FTP with most browsers obsoleting the
> > protocol due to lack of security?
> 
> Many Fedora mirrors still use FTP. You can check metalink file.

Odd. There shouldn't be any. Can you paste/post what you are seeing?

We disabled and removed all ftp:// urls in mirrormanager in 2016:
https://github.com/fedora-infra/mirrormanager2/issues/99#issuecomment-222630215

kevin


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Devtoolset for epel7 for build in Copr

2022-02-24 Thread Dave Love
Miroslav Suchý  writes:

> You have to run
>
>   scl enable devtools-3 $COMMAND
>
> to make this library available.

I used to do that, but it's rather easier to source the enable script
(conditionally) in %build and perhaps %check or %install.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Devtoolset for epel7 for build in Copr

2022-02-24 Thread Dave Love
[epel-devel seems a better place for this.]

Dmitry Butskoy  writes:

> Ben Beasley wrote:
>> Yes, the devtoolsets work nicely if you supply the appropriate
>> incantations. I haven’t tried in COPR specifically
> I've just tried and it seems that devtoolset are not available for
> epel7 builds in Copr. (For epel7, I successfully build seamonkey with 
> devtoolset already for years :) )
>
> There is a possibility to use an additional external repo for
> Copr. But there are issues with this.

I'm unclear what's actually required, but CentOS 7 has up to
devtoolset-11, and some version worked for me whenever I last did a
build in copr which needed it.

> First, the appropriate CentOS repo
> http://mirror.centos.org/centos/7/sclo/x86_64/rh/ does not have the 
> latest llvm packages (for clang) -- say, llvm-toolset-11-* . (BTW, why??)

There's no RHEL7 llvm-toolset as far as I know, so if you want exactly
that you'll have to build it, which is probably non-trivial.  EPEL 7 has
llvm11, but I don't know where to find a recent clang, if that's what
you actually want.

EL7 development is a losing battle at this stage, though.  We're even
forced off it by IBM saying RHEL 7.9 for POWER doesn't exist.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Is NetworkManager-wait-online.service necessary by default?

2022-02-24 Thread Daniel P . Berrangé
On Thu, Feb 24, 2022 at 04:30:53PM +, Tom Hughes via devel wrote:
> On 24/02/2022 16:28, Tom Hughes wrote:
> > On 24/02/2022 16:25, Cole Robinson wrote:
> > > On 2/23/22 5:22 PM, Tom Hughes via devel wrote:
> > > > On 23/02/2022 21:23, Zbigniew Jędrzejewski-Szmek wrote:
> > > > 
> > > > > a) change libvirt-daemon-driver-storage
> > > > > Requires:libvirt-daemon-driver-storage-iscsi
> > > > >  to Suggests:libvirt-daemon-driver-storage-iscsi,
> > > > 
> > > > More generally why does installing libvirt neeed to force
> > > > installation of about ten storage drivers and all their
> > > > dependencies - why can't the user choose to remove some of
> > > > the more obscure ones?
> > > > 
> > > 
> > > libvirt has a modularized packaging split. libvirt-daemon-driver-storage
> > > pulls in every possible storage driver + lib that libvirt can use. Or
> > > you can install libvirt-daemon-driver-storage-XXX individual sub
> > > packages to get only the bits your app will use.
> > 
> > I was basing what I said on the fact that trying to remove
> > libvirt-daemon-driver-storage-iscsi wanted to remove the whole
> > of libvirt on my machine:
> 
> Ah but that is mostly auto clean.

Yes, that is dnf being too aggressive in removing stuff.

> Though libvirt-daemon-kvm is a dependency as you say and
> don't I need that to run any kvm based vm?

Correct, it is merely a metapackage that is intended to pull in all
libvirt sub-RPMs that are compatible with KVM usage.  If you remove
that package, you can choose exactly which individual sub-RPM features
you desire.

The same applies for QEMU, libvirt-daemon-kvm depends on qemu-kvm
which pulls in all the QEMU sub-RPMs that are compatible with KVM.
If you remove libvirt-daemon-kvm you can also choose a qemu-kvm-core
and whateever other features are desired.

We could none the less still consider use of Suggests in
libvirt-dameon-kvm. Will have a think if that could have a negative
impact on any apps currently depending on libvirt. 

With regards,
Daniel
-- 
|: https://berrange.com  -o-https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o-https://fstop138.berrange.com :|
|: https://entangle-photo.org-o-https://www.instagram.com/dberrange :|
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Is NetworkManager-wait-online.service necessary by default?

2022-02-24 Thread Tom Hughes via devel

On 24/02/2022 16:28, Tom Hughes wrote:

On 24/02/2022 16:25, Cole Robinson wrote:

On 2/23/22 5:22 PM, Tom Hughes via devel wrote:

On 23/02/2022 21:23, Zbigniew Jędrzejewski-Szmek wrote:


a) change libvirt-daemon-driver-storage
Requires:libvirt-daemon-driver-storage-iscsi
 to Suggests:libvirt-daemon-driver-storage-iscsi,


More generally why does installing libvirt neeed to force
installation of about ten storage drivers and all their
dependencies - why can't the user choose to remove some of
the more obscure ones?



libvirt has a modularized packaging split. libvirt-daemon-driver-storage
pulls in every possible storage driver + lib that libvirt can use. Or
you can install libvirt-daemon-driver-storage-XXX individual sub
packages to get only the bits your app will use.


I was basing what I said on the fact that trying to remove
libvirt-daemon-driver-storage-iscsi wanted to remove the whole
of libvirt on my machine:


Ah but that is mostly auto clean.

Though libvirt-daemon-kvm is a dependency as you say and
don't I need that to run any kvm based vm?

Tom

--
Tom Hughes (t...@compton.nu)
http://compton.nu/
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Is NetworkManager-wait-online.service necessary by default?

2022-02-24 Thread Tom Hughes via devel

On 24/02/2022 16:25, Cole Robinson wrote:

On 2/23/22 5:22 PM, Tom Hughes via devel wrote:

On 23/02/2022 21:23, Zbigniew Jędrzejewski-Szmek wrote:


a) change libvirt-daemon-driver-storage
Requires:libvirt-daemon-driver-storage-iscsi
     to Suggests:libvirt-daemon-driver-storage-iscsi,


More generally why does installing libvirt neeed to force
installation of about ten storage drivers and all their
dependencies - why can't the user choose to remove some of
the more obscure ones?



libvirt has a modularized packaging split. libvirt-daemon-driver-storage
pulls in every possible storage driver + lib that libvirt can use. Or
you can install libvirt-daemon-driver-storage-XXX individual sub
packages to get only the bits your app will use.


I was basing what I said on the fact that trying to remove
libvirt-daemon-driver-storage-iscsi wanted to remove the whole
of libvirt on my machine:

% sudo dnf erase libvirt-daemon-driver-storage-iscsi*

Dependencies resolved.



 Package Arch   Version  Repo 
Size




Removing:

 libvirt-daemon-driver-storage-iscsi x86_64 7.6.0-5.fc35 
@updates  24 k


 libvirt-daemon-driver-storage-iscsi-direct

 x86_64 7.6.0-5.fc35 
@updates  32 k


Removing dependent packages:

 libvirt-daemon-kvm  x86_64 7.6.0-5.fc35 
@updates   0


 vagrant-libvirt noarch 0.4.1-3.fc35 
@fedora  229 k


Removing unused dependencies:

 glusterfs-cli   x86_64 9.5-1.fc35 
@updates 493 k


 guestfs-tools   x86_64 1.47.3-1.fc35 
@updates  25 M


 hexedit x86_64 1.5-2.fc35 
@fedora   77 k


 libacl  i686   2.3.1-2.fc35 
@fedora   35 k


 libglusterd0x86_64 9.5-1.fc35 
@updates  15 k


 libguestfs  x86_64 1:1.46.2-1.fc35 
@updates 3.8 M


 libguestfs-appliancex86_64 1:1.46.2-1.fc35 
@updates 2.3 M


 libguestfs-xfs  x86_64 1:1.46.2-1.fc35 
@updates   9


 libtpms x86_64 
0.9.2-0.20220106gite81d634c27.fc35.0



@updates 986 k

 libvirt-daemon-driver-interface x86_64 7.6.0-5.fc35 
@updates 593 k


 libvirt-daemon-driver-nodedev   x86_64 7.6.0-5.fc35 
@updates 650 k


 libvirt-daemon-driver-nwfilter  x86_64 7.6.0-5.fc35 
@updates 683 k


 libvirt-daemon-driver-qemu  x86_64 7.6.0-5.fc35 
@updates 2.5 M


 libvirt-daemon-driver-secretx86_64 7.6.0-5.fc35 
@updates 585 k


 libvirt-daemon-driver-storage   x86_64 7.6.0-5.fc35 
@updates   0


 libvirt-daemon-driver-storage-core  x86_64 7.6.0-5.fc35 
@updates 767 k


 libvirt-daemon-driver-storage-disk  x86_64 7.6.0-5.fc35 
@updates  32 k


 libvirt-daemon-driver-storage-gluster   x86_64 7.6.0-5.fc35 
@updates  40 k


 libvirt-daemon-driver-storage-logical   x86_64 7.6.0-5.fc35 
@updates  32 k


 libvirt-daemon-driver-storage-mpath x86_64 7.6.0-5.fc35 
@updates  16 k


 libvirt-daemon-driver-storage-rbd   x86_64 7.6.0-5.fc35 
@updates  44 k


 libvirt-daemon-driver-storage-scsi  x86_64 7.6.0-5.fc35 
@updates  24 k


 libvirt-daemon-driver-storage-sheepdog  x86_64 7.6.0-5.fc35 
@updates  20 k


 libvirt-daemon-driver-storage-zfs   x86_64 7.6.0-5.fc35 
@updates  24 k


 qemu-kvm-core   x86_64 2:6.1.0-14.fc35 
@updates   0


 rubygem-excon   noarch 0.79.0-1.fc35 
@fedora   98 k


 rubygem-fog-corenoarch 2.2.4-2.fc35 
@fedora  118 k


 rubygem-fog-jsonnoarch 1.2.0-7.fc35 
@fedora  3.9 k


 rubygem-fog-libvirt noarch 0.8.0-2.fc35 
@fedora   73 k


 rubygem-fog-xml noarch 0.1.3-7.fc35 
@fedora  8.3 k


 rubygem-formatador  noarch 0.2.5-12.fc35 
@fedora  9.9 k


 rubygem-multi_json  noarch 1.15.0-3.fc35 
@fedora   33 k


 rubygem-rexml   noarch 3.2.5-151.fc35 
@fedora  399 k


 rubygem-ruby-libvirtx86_64 0.7.1-13.fc35 
@fedora  288 k


 superminx86_64 5.3.1-1.fc35 
@fedora  1.5 M


 swtpm   x86_64 
0.7.0-2.20211109gitb79fd91.fc35



@updates 218 k

 swtpm-libs  x86_64 
0.7.0-2.20211109gitb79fd91.fc35



@updates  99 k

 swtpm-tools x86_64 
0.7.0-2.20211109gitb79fd91.fc35



@updates 272 k

 zerofreex86_64 1.1.1-8.fc35 
@fedora   54 k


 zfs-fusex86_64 0.7.2.2-20.fc35 
@fedora  6.0 M




Transaction Summary


Re: Is NetworkManager-wait-online.service necessary by default?

2022-02-24 Thread Cole Robinson
On 2/23/22 5:22 PM, Tom Hughes via devel wrote:
> On 23/02/2022 21:23, Zbigniew Jędrzejewski-Szmek wrote:
> 
>> a) change libvirt-daemon-driver-storage
>> Requires:libvirt-daemon-driver-storage-iscsi
>>     to Suggests:libvirt-daemon-driver-storage-iscsi,
> 
> More generally why does installing libvirt neeed to force
> installation of about ten storage drivers and all their
> dependencies - why can't the user choose to remove some of
> the more obscure ones?
> 

libvirt has a modularized packaging split. libvirt-daemon-driver-storage
pulls in every possible storage driver + lib that libvirt can use. Or
you can install libvirt-daemon-driver-storage-XXX individual sub
packages to get only the bits your app will use.

gnome-boxes which is in the default workstation package set has a dep on
libvirt-daemon-kvm which is itself a metapackage which pulls in
libvirt-daemon-driver-storage. gnome-boxes dep could be made more
granular, it uses libvirt storage APIs but I think only
libvirt-daemon-driver-storage-file

- Cole
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Looking for %{forgemeta} GitHub example

2022-02-24 Thread PGNet Dev

On 2/24/22 10:12 AM, Fabio Valentini wrote:

On Thu, Feb 24, 2022 at 4:00 PM PGNet Dev  wrote:



especially since they don't really provide value for
standard GitHub tarball downloads etc. compared to the "old" SourceURL


some of us strongly disagree.  admittedly, with no weight ...


Admittedly, packages like the .spec for nginx you linked are very far
outliers regarding package complexity.


Perhaps very far outliers for _your_ use cases.  Quite common, here.  
Especially for numbers of enterprise packages that, for better or worse, lag 
upstream in either versions, or capabilities.

And the flexibility to address that level of 'complexity' is exactly what we 
look to a major-distro's build systems for.
My wholesale move(s) to Fedora from Opensuse were well-considered -- and long 
overdue. For a large number of reasons.
The biggest risk was the drop in functionality/flexibility of the build system 
-- for end-user use cases, NOT necessarily (just) for official packaging.
COPR + the forgemeta stuff gets a heck of a lot closer to par, than not.


I doubt there's many packages that need to reference *that* many
different source repos and tarballs ...

For these really complex cases, the forge macros are ~fine~, I guess.





But you really don't - and shouldn't - need to rely on hundreds of
lines of complex lua macros to be able to specify one or two GitHub
tarballs.


With that I don't disagree in the slightest.
I've repeatedly advocated for a different approach, similar to OBS' 
capabilities.
It got zero traction/interest.
So forgemeta seems to be "functionally best available" option, currently.

It would be far less of a concern if ANY of those discussions had gotten any 
traction, and there was a good/flexible ALTERNATIVE to forgemeta, rather than 
simply talk of deprecating current capabilities, without a good option.

There _are_ options, of course.  And I have two in place -- our own, LFS distro 
with rpm build system, and building Fedora+pkgs on OBS.
Neither are optimal, both are costly, and in both cases I'd prefer something 
@Fedora buildsys.

But again, i ACK that 'my' needs have little weight.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


unsafe systemd setup in Fedora

2022-02-24 Thread Marius Schwarz

Hi Guys,

running a hardening tool I stumpled about systemd own security analysis,
which doesn't look good:


$ systemd-analyze security
UNIT EXPOSURE PREDICATE HAPPY
NetworkManager.service    7.8 EXPOSED   
abrt-journal-core.service 9.6 UNSAFE    
abrt-oops.service 9.6 UNSAFE    
abrt-xorg.service 9.6 UNSAFE    
abrtd.service 9.6 UNSAFE    
accounts-daemon.service   9.6 UNSAFE    
alsa-state.service    9.6 UNSAFE    
atd.service   9.6 UNSAFE    
auditd.service    8.7 EXPOSED   
avahi-daemon.service  9.6 UNSAFE    
chronyd.service   8.9 EXPOSED   
colord.service    8.8 EXPOSED   
crond.service 9.6 UNSAFE    
cups.service  9.6 UNSAFE    
dbus-:1.8-org.freedesktop.problems@0.service  9.6 UNSAFE    
dbus-broker.service   8.7 EXPOSED   
dm-event.service  9.5 UNSAFE    
emergency.service 9.5 UNSAFE    
fail2ban.service  9.6 UNSAFE    
fcoe.service  9.6 UNSAFE    
flatpak-system-helper.service 9.6 UNSAFE    
gdm.service   9.8 UNSAFE    
getty@tty1.service    9.6 UNSAFE    
irqbalance.service    6.2 MEDIUM    
iscsid.service    9.5 UNSAFE    
iscsiuio.service  9.5 UNSAFE    
libvirtd.service  9.6 UNSAFE    
lvm2-lvmpolld.service 9.5 UNSAFE    
mdmonitor.service 9.6 UNSAFE    
multipathd.service    9.5 UNSAFE    
network.service   9.6 UNSAFE    
nmb.service   9.6 UNSAFE    
nscd.service  9.6 UNSAFE    
ntpd.service  9.2 UNSAFE    
lines 1-35...skipping...
UNIT EXPOSURE PREDICATE HAPPY
NetworkManager.service    7.8 EXPOSED   
abrt-journal-core.service 9.6 UNSAFE    
abrt-oops.service 9.6 UNSAFE    
abrt-xorg.service 9.6 UNSAFE    
abrtd.service 9.6 UNSAFE    
accounts-daemon.service   9.6 UNSAFE    
alsa-state.service    9.6 UNSAFE    
atd.service   9.6 UNSAFE    
auditd.service    8.7 EXPOSED   
avahi-daemon.service  9.6 UNSAFE    
chronyd.service   8.9 EXPOSED   
colord.service    8.8 EXPOSED   
crond.service 9.6 UNSAFE    
cups.service  9.6 UNSAFE    
dbus-:1.8-org.freedesktop.problems@0.service  9.6 UNSAFE    
dbus-broker.service   8.7 EXPOSED   
dm-event.service  9.5 UNSAFE    
emergency.service 9.5 UNSAFE    
fail2ban.service  9.6 UNSAFE    
fcoe.service  9.6 UNSAFE    
flatpak-system-helper.service 9.6 UNSAFE    
gdm.service   9.8 UNSAFE    
getty@tty1.service    9.6 UNSAFE    
irqbalance.service    6.2 MEDIUM    
iscsid.service    9.5 UNSAFE    
iscsiuio.service  9.5 UNSAFE    
libvirtd.service  9.6 UNSAFE    
lvm2-lvmpolld.service 9.5 UNSAFE    
mdmonitor.service 9.6 UNSAFE    
multipathd.service    9.5 UNSAFE    
network.service   9.6 UNSAFE    
nmb.service   9.6 UNSAFE    
nscd.service  9.6 UNSAFE    
ntpd.service  9.2 UNSAFE    
nvidia-powerd.service 9.6 UNSAFE    
plymouth-start.service    9.5 UNSAFE    
polkit.service $ systemd-analyze security
UNIT  

Re: Unannounced soname bump: libwebsockets.so.18 -> libwebsockets.so.19

2022-02-24 Thread Fabio Valentini
On Tue, Feb 22, 2022 at 3:22 PM Mamoru TASAKA  wrote:
>
> Hello, all:
>
> On f37 / f36 two days ago libwebsockets was updated from 4.2.2 to 4.3.1
> which causes unannounced soname bump from libwebsockets.so.18 to 
> libwebsockets.so.19
>
> What is strange here is that the committer seems aware of this change:
> https://src.fedoraproject.org/rpms/libwebsockets/c/ad122ba347b290d1221fe6fee1c4194ac74c2719?branch=rawhide

Yeah, this is really strange. *Techically*, the soname bump was
announced, 6 months ago:
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/6M5NRYF7EGU62KKG56L72K6WGHWH5V2L/
But then the announced update to 4.3.0 was never pushed.
And now 4.3.1 was pushed to F36+ without further warnings, and not by
the package maintainer, but by pbrobinson, apparently using his
provenpackager privileges ...

Fabio
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Looking for %{forgemeta} GitHub example

2022-02-24 Thread Ben Beasley
I have stopped using the “forge” macros in most cases where I am packaging a 
release/tag, since the URLs are simple enough without them, usually something 
like

URL: https://github.com/foo/bar
Source0: %{url}/archive/v%{version}/bar-%{version}.tar.gz

However, when I need to package an untagged commit, the ability of the “forge” 
macros to automatically construct and apply the snapshot information field, 
including picking up the date from the primary source’s mtime, is *awesome*, 
even if it’s not that much harder to do it by hand. It’s also nice to write 
“%forgeautosetup” instead of “%autosetup -n bar-%{commit}”.

I guess I’m saying that I could easily live without these macros, but I do find 
them occasionally useful in several small ways.

– Ben

On Thu, Feb 24, 2022, at 10:00 AM, PGNet Dev wrote:
>> especially since they don't really provide value for
>> standard GitHub tarball downloads etc. compared to the "old" SourceURL
>
> some of us strongly disagree.  admittedly, with no weight ...
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it: 
> https://pagure.io/fedora-infrastructure
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Is NetworkManager-wait-online.service necessary by default?

2022-02-24 Thread Colin Walters


On Thu, Feb 24, 2022, at 6:17 AM, Benjamin Berg wrote:

> network-online-waitonly.target with
>   After=network-online.target
>   StopWhenUnneeded=yes
>
> which is then used inside iscsi.service
>   ExecStartPre=/usr/bin/systemctl start network-online-waitonly.target

No, avoid such things unless absolutely necessary - it makes the dependency 
graph dynamic, which systemd does support but doing so brings a vast amount of 
complexity.

I think instead you can use e.g. a systemd generator:
https://www.freedesktop.org/software/systemd/man/systemd.generator.html
The generator (which can be the same binary) can then enable iscsi.service only 
if the directory is non-empty.

(Which is making things dynamic, but all dynamic computation happens at a 
well-defined eraly fixed point and is acted on together thereafter)

Now I'd agree this behavior is not obvious, and perhaps systemd should gain 
something like
EnableConditionDirectoryNotEmpty= that is defined to be evaluated at the same 
time as generators or so, and if the conditions evaluate to false then none of 
the unit dependencies will be pulled in either.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Looking for %{forgemeta} GitHub example

2022-02-24 Thread Fabio Valentini
On Thu, Feb 24, 2022 at 4:00 PM PGNet Dev  wrote:
>
> > especially since they don't really provide value for
> > standard GitHub tarball downloads etc. compared to the "old" SourceURL
>
> some of us strongly disagree.  admittedly, with no weight ...

Admittedly, packages like the .spec for nginx you linked are very far
outliers regarding package complexity.
I doubt there's many packages that need to reference *that* many
different source repos and tarballs ...

For these really complex cases, the forge macros are ~fine~, I guess.
But you really don't - and shouldn't - need to rely on hundreds of
lines of complex lua macros to be able to specify one or two GitHub
tarballs.

Fabio
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Looking for %{forgemeta} GitHub example

2022-02-24 Thread PGNet Dev

especially since they don't really provide value for
standard GitHub tarball downloads etc. compared to the "old" SourceURL


some of us strongly disagree.  admittedly, with no weight ...
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Looking for %{forgemeta} GitHub example

2022-02-24 Thread Fabio Valentini
On Tue, Feb 22, 2022 at 8:57 PM Jason L Tibbitts III  wrote:
>
> > Brandon Nielsen  writes:
>
> > I would like to see the forge macros removed from the guidelines if
> > development truly has ceased.
>
> I would like to get into them and at least see what needs to change
> but... the internal implementation is somewhat baroque and my time is
> severely limited.  I think there is good stuff there but I don't know
> how much work would be required to salvage it.
>
> One problem is that at least I thought that significant portions of the
> Go tooling relied on it, and there's no alternative that has any kind of
> automation.

I don't think removing the forge macros would be possible at this
point, exactly for this reason.

However, Go and Font packaging macros are the only things where using
those macros is not optional, and in both cases, you're supposed to
use wrapper macros so you're not even using the %forgefoo macros
directly.

So I don't think they need to be documented as a standalone feature
any longer, especially since they don't really provide value for
standard GitHub tarball downloads etc. compared to the "old" SourceURL
guidelines we've had for years, and are no longer maintained.

Should we remove documentation for them from the SourceURL guidelines
page? It seems to cause more confusion than it solves problems.

Fabio
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora CoreOS Meeting Minutes 2022-02-23

2022-02-24 Thread Dusty Mabe
Minutes: 
https://meetbot.fedoraproject.org/fedora-meeting-1/2022-02-23/fedora_coreos_meeting.2022-02-23-16.29.html
Minutes (text): 
https://meetbot.fedoraproject.org/fedora-meeting-1/2022-02-23/fedora_coreos_meeting.2022-02-23-16.29.txt
Log: 
https://meetbot.fedoraproject.org/fedora-meeting-1/2022-02-23/fedora_coreos_meeting.2022-02-23-16.29.log.html


#fedora-meeting-1: fedora_coreos_meeting



Meeting started by dustymabe at 16:29:31 UTC. The full logs are
available at
https://meetbot.fedoraproject.org/fedora-meeting-1/2022-02-23/fedora_coreos_meeting.2022-02-23-16.29.log.html
.



Meeting summary
---
* roll call  (dustymabe, 16:29:37)

* Action items from last meeting  (dustymabe, 16:33:40)
  * jlebon opened https://github.com/coreos/rpm-ostree/issues/3465
(jlebon, 16:34:06)
  * jlebon started email draft in

https://github.com/coreos/fedora-coreos-tracker/issues/1106#issuecomment-1048901881
(jlebon, 16:34:33)
  * dustymabe opened a ticket to discuss podmanv4 coming to FCOS in F36
https://github.com/coreos/fedora-coreos-tracker/issues/1106
(dustymabe, 16:34:59)
  * ACTION: ravanelli to look into the F36 changes 127 to see if this
change affects us on ppc64le  (dustymabe, 16:37:41)

* RFC: A new continuous mechanical FCOS stream  (dustymabe, 16:38:13)
  * LINK: https://github.com/coreos/fedora-coreos-tracker/issues/910
(dustymabe, 16:38:18)
  * AGREED: While we see value in a continuous stream we aren't wholly
convinced the benefits qualify adding another stream at this point.
We'd like to continue discussion in the ticket and collect examples
of issues we think would have been caught by a continuous stream
before landing in testing-devel.  (dustymabe, 17:05:35)

* tracker: Fedora 36 changes considerations  (dustymabe, 17:06:00)
  * LINK: https://github.com/coreos/fedora-coreos-tracker/issues/918
(dustymabe, 17:06:05)

* tracker: This Month in Fedora CoreOS February 2022  (dustymabe,
  17:08:10)
  * LINK: https://github.com/coreos/fedora-coreos-tracker/issues/1107
(dustymabe, 17:08:16)

* open floor   (dustymabe, 17:11:44)
  * LINK: https://github.com/coreos/zincati/issues/539   (dustymabe,
17:14:23)
  * LINK: https://github.com/coreos/coreos-installer/issues/792
(bgilbert, 17:17:41)

Meeting ended at 17:30:02 UTC.




Action Items

* ravanelli to look into the F36 changes 127 to see if this change
  affects us on ppc64le




Action Items, by person
---
* ravanelli
  * ravanelli to look into the F36 changes 127 to see if this change
affects us on ppc64le
* **UNASSIGNED**
  * (none)




People Present (lines said)
---
* dustymabe (90)
* jlebon (41)
* zodbot (31)
* bgilbert (24)
* travier (11)
* miabbott (10)
* fifofonix_ (8)
* lucab (5)
* jaimelm (4)
* saqali (2)
* jmarrero (2)
* ravanelli (1)
* jbrooks (1)
* gursewak (0)




Generated by `MeetBot`_ 0.4

.. _`MeetBot`: https://fedoraproject.org/wiki/Zodbot#Meeting_Functions
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Curl-minimal as default (System-Wide Change proposal)

2022-02-24 Thread Neal Gompa
On Thu, Feb 24, 2022 at 8:58 AM Richard W.M. Jones  wrote:
>
> On Thu, Feb 24, 2022 at 02:28:08PM +0100, Kamil Dudka wrote:
> > On Thursday, February 24, 2022 1:35:38 PM CET Richard W.M. Jones wrote:
> > > Did you discuss modularising curl itself upstream?
> >
> > It was added to their wish list but I do not remember anybody working on it:
> >
> > https://github.com/curl/curl/commit/8204844f
> >
> > > That would be a better idea.
> >
> > Not necessarily.  Each approach has its pros and cons.
>
> I'm intrigued by what you think the cons would be.  AFAICT if curl was
> modular in this way already we wouldn't be discussing this proposal at all,
> but a different and better one around packaging splits.
>

It would also avoid the usability nightmare that comes with trying to
trigger switching implementations. This is a very big hammer that
basically tells people that we're crippling curl by default for users
and it has very large network effects across the entire distribution.
It's quite one thing to use curl-minimal for containers where people
expect tools to be broken in the endless pursuit of smaller base
images, but when real people need to use real systems in complex
configurations, having a reduced functionality curl by default is just
going to lead to support nightmares and complaints about random
breakages in applications on Fedora.



-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Is NetworkManager-wait-online.service necessary by default?

2022-02-24 Thread Chris Adams
Once upon a time, Zbigniew Jędrzejewski-Szmek  said:
> Conditions are evaluated when the service would be exectued, so a unit
> which is (eventually) skipped because of Conditions still has effect on
> the boot ordering and may add additional jobs to the transaction.

Okay, that's a nuance I didn't realize.  My guess would be that the
iscsi maintainer(s) didn't realize it either, and thought it would be
okay to have the service always enabled, so it would "just work" when
needed and also stay out of the way when not.

-- 
Chris Adams 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Curl-minimal as default (System-Wide Change proposal)

2022-02-24 Thread Richard W.M. Jones
On Thu, Feb 24, 2022 at 02:28:08PM +0100, Kamil Dudka wrote:
> On Thursday, February 24, 2022 1:35:38 PM CET Richard W.M. Jones wrote:
> > Did you discuss modularising curl itself upstream?
> 
> It was added to their wish list but I do not remember anybody working on it:
> 
> https://github.com/curl/curl/commit/8204844f
> 
> > That would be a better idea.
> 
> Not necessarily.  Each approach has its pros and cons.

I'm intrigued by what you think the cons would be.  AFAICT if curl was
modular in this way already we wouldn't be discussing this proposal at all,
but a different and better one around packaging splits.

Rich.

> Kamil
> 
> > Then we could package up the various *.so drivers into separate packages.
> > 
> > Also I think this whole business of minimizing Fedora is getting way
> > out of hand.
> > 
> > Rich.
> 

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
Fedora Windows cross-compiler. Compile Windows programs, test, and
build Windows installers. Over 100 libraries supported.
http://fedoraproject.org/wiki/MinGW
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Curl-minimal as default (System-Wide Change proposal)

2022-02-24 Thread Kamil Dudka
On Thursday, February 24, 2022 1:35:38 PM CET Richard W.M. Jones wrote:
> Did you discuss modularising curl itself upstream?

It was added to their wish list but I do not remember anybody working on it:

https://github.com/curl/curl/commit/8204844f

> That would be a better idea.

Not necessarily.  Each approach has its pros and cons.

Kamil

> Then we could package up the various *.so drivers into separate packages.
> 
> Also I think this whole business of minimizing Fedora is getting way
> out of hand.
> 
> Rich.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: [Fedocal] Reminder meeting : ELN SIG

2022-02-24 Thread Stephen Gallagher
I will not be able to attend this week. If someone else is willing to act
as chair, please feel free to hold it without me.

On Thu, Feb 24, 2022 at 7:00 AM  wrote:

> Dear all,
>
> You are kindly invited to the meeting:
>ELN SIG on 2022-02-25 from 12:00:00 to 13:00:00 US/Eastern
>At fedora-meet...@irc.libera.chat
>
> The meeting will be about:
>
>
>
> Source: https://calendar.fedoraproject.org//meeting/10133/
>
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it:
> https://pagure.io/fedora-infrastructure
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Curl-minimal as default (System-Wide Change proposal)

2022-02-24 Thread Björn Persson
Kamil Dudka wrote:
> There seems to be demand for libcurl with IDN support on minimal Fedora 
> installations, so I created a pull request to enable it in libcurl-minimal:
> 
> https://src.fedoraproject.org/rpms/curl/pull-request/13

Thank you.

Björn Persson


pgp2ZEu96gtIM.pgp
Description: OpenPGP digital signatur
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Devtoolset for epel7 for build in Copr

2022-02-24 Thread Miroslav Suchý

Dne 23. 02. 22 v 19:22 Dmitry Butskoy napsal(a):

Ben Beasley wrote:

Yes, the devtoolsets work nicely if you supply the appropriate incantations. I 
haven’t tried in COPR specifically
I've just tried and it seems that devtoolset are not available for epel7 builds in Copr. (For epel7, I successfully 
build seamonkey with devtoolset already for years :) )


There is a possibility to use an additional external repo for Copr. But there 
are issues with this.

First, the appropriate CentOS repo http://mirror.centos.org/centos/7/sclo/x86_64/rh/ does not have the latest llvm 
packages (for clang) -- say, llvm-toolset-11-* . (BTW, why??)


Second, the alternate Springdale Linux repo http://springdale.princeton.edu/data/springdale/SCL/7/x86_64/ seems to 
have all the ones (which are provided in sources by RedHat), but cannot be used in Copr. Springdale provides 
devtoolset-3-elfutils there, and it in some strange way  badly correlates with the initial Copr build environment 
(even before the rpmbuild process starts). Some python2 module cannot find libelf.so.1 ...



That is because it is SCL package. It installs the library to

/opt/rh/devtoolset-3/root/usr/lib64/libelf.so.1

You have to run

  scl enable devtools-3 $COMMAND

to make this library available.

More about SCL here:

https://www.softwarecollections.org/en/

including Packaging guide.



So the general questions are:
- Whether it is possible to enable "rhel7-server-rhscl-7" and friends for epel7 builds in Copr? (See 
https://koji.fedoraproject.org/koji/taginfo?tagID=259 for more info);


Copr tries to use as much as possible upstream Mock's config. AFAIK it is 
enabled there:

https://github.com/rpm-software-management/mock/blob/main/mock-core-configs/etc/mock/templates/centos-7.tpl#L81

Miroslav___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Curl-minimal as default (System-Wide Change proposal)

2022-02-24 Thread Richard W.M. Jones
On Tue, Feb 22, 2022 at 12:00:06PM -0500, Ben Cotton wrote:
> https://fedoraproject.org/wiki/Changes/CurlMinimal_as_Default
> 
> == Summary ==
> `libcurl-minimal` and `curl-minimal` will be installed by default
> instead of `libcurl` and `curl`.
> The "minimal" variants provide only a subset of protocols (HTTP, HTTPS, FTP).
> The full versions can be explicitly requested as `libcurl-full` and 
> `curl-full`.
> 
> == Owner ==
> * Name: [[User:Zbyszek| Zbigniew Jędrzejewski-Szmek]]
> * Email: zbyszek at in.waw.pl
> * Name: [[User:Kdudka| Kamil Dudka]]
> * Email: kdudka at redhat.com
> 
> 
> == Detailed Description ==
> 
> The `curl` package provides two sets of subpackages: `curl`+`libcurl`
> and `curl-minimal`+`libcurl+minimal`.
> `curl-minimal`+`libcurl-minimal` are compiled with various
> semi-obsolete protocols and infrequently-used features disabled:
> DICT, GOPHER, IMAP, LDAP, LDAPS, MQTT, NTLM, POP3, RTSP, SMB, SMTP,
> SFTP, SCP, TELNET, TFTP, brotli compression, IDN2 names.

Did you discuss modularising curl itself upstream?  That would be a
better idea.  Then we could package up the various *.so drivers into
separate packages.

Also I think this whole business of minimizing Fedora is getting way
out of hand.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-p2v converts physical machines to virtual machines.  Boot with a
live CD or over the network (PXE) and turn machines into KVM guests.
http://libguestfs.org/virt-v2v
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Fedocal] Reminder meeting : ELN SIG

2022-02-24 Thread sgallagh
Dear all,

You are kindly invited to the meeting:
   ELN SIG on 2022-02-25 from 12:00:00 to 13:00:00 US/Eastern
   At fedora-meet...@irc.libera.chat

The meeting will be about:



Source: https://calendar.fedoraproject.org//meeting/10133/

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Is NetworkManager-wait-online.service necessary by default?

2022-02-24 Thread Benjamin Berg
Hi,

On Thu, 2022-02-24 at 07:47 +0100, Zbigniew Jędrzejewski-Szmek wrote:
> On Thu, Feb 24, 2022 at 12:17:27AM +, Gary Buhrmaster wrote:
> > On Wed, Feb 23, 2022 at 11:55 PM Chris Adams  wrote:
> > > 
> > > Once upon a time, Zbigniew Jędrzejewski-Szmek  said:
> > > > So this is the culprit. iscsi.service has Before=remote-fs-pre.target,
> > > > After=network-online.target, which means that it'll delay the boot.
> > > 
> > > If that's the problem, there's some other issue.  On my up-to-date F35
> > > system, iscsi.service also has:
> > > 
> > > ConditionDirectoryNotEmpty=/var/lib/iscsi/nodes
> > > 
> > > And on my systems, that directory is empty, so iscsi.service shouldn't
> > > be holding up anything.
> 
> Conditions are evaluated when the service would be exectued, so a unit
> which is (eventually) skipped because of Conditions still has effect on
> the boot ordering and may add additional jobs to the transaction.

We want to wait for network-online.target only if the service is
actually started. One way to achieve this might be to move waiting into
ExecStartPre=. I imagine this could work by creating a new unit

network-online-waitonly.target with
  After=network-online.target
  StopWhenUnneeded=yes

which is then used inside iscsi.service
  ExecStartPre=/usr/bin/systemctl start network-online-waitonly.target

Not great, but should work. I suppose the ideal solution would be that
the iscsi service handles waiting internally and only becomes ready
when the configured nodes are available or a timeout happens.

Benjamin

> systemd.unit(5) says:
> 
>   The conditions and asserts are checked at the time the queued
>   start job is to be executed. The ordering dependencies are
>   still respected, so other units are still pulled in and ordered
>   as if this unit was successfully activated, and the conditions
>   and asserts are executed the precise moment the unit would
>   normally start and thus can validate system state after the
>   units ordered before completed initialization.
> 
> > How can one be sure that (in the general case) that one of the units
> > that you are running After will not create the files/directories
> > that will impact the test Condition(s)?
> 
> We aren't. In fact the conditions are checked later as described above.
> 
> > Those tests occur before the unit is actually started, but not
> > before the ordering is performed.
> 
> Yes.
> 
> Zbyszek
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam on the list, report it: 
> https://pagure.io/fedora-infrastructure



signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Curl-minimal as default (System-Wide Change proposal)

2022-02-24 Thread Vitaly Zaitsev via devel

On 22/02/2022 18:00, Ben Cotton wrote:

The "minimal" variants provide only a subset of protocols (HTTP, HTTPS, FTP).
The full versions can be explicitly requested as `libcurl-full` and `curl-full`.


Let's also drop FTP support both from libcurl and dnf (including all 
ftp:// mirrors from metalink).


--
Sincerely,
  Vitaly Zaitsev (vit...@easycoding.org)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Cloud-34-20220224.0 compose check report

2022-02-24 Thread Fedora compose checker
No missing expected images.

Soft failed openQA tests: 1/8 (x86_64), 1/8 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Cloud-34-20220223.0):

ID: 1145601 Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/1145601
ID: 1145614 Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/1145614

Passed openQA tests: 7/8 (x86_64), 7/8 (aarch64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Cloud-35-20220224.0 compose check report

2022-02-24 Thread Fedora compose checker
No missing expected images.

Soft failed openQA tests: 1/8 (x86_64), 1/8 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Cloud-35-20220223.0):

ID: 1145352 Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/1145352
ID: 1145365 Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/1145365

Passed openQA tests: 7/8 (x86_64), 7/8 (aarch64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


[Bug 2031800] perl-GD-SecurityImage for EPEL 9

2022-02-24 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2031800

Emmanuel Seyman  changed:

   What|Removed |Added

 Status|NEW |ASSIGNED



--- Comment #1 from Emmanuel Seyman  ---
https://pagure.io/releng/fedora-scm-requests/issue/42553


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2031800
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F37 Change: Curl-minimal as default (System-Wide Change proposal)

2022-02-24 Thread Kamil Dudka
On Wednesday, February 23, 2022 7:01:26 PM CET Björn Persson wrote:
> Zbigniew Jędrzejewski-Szmek wrote:
> > According to ICANN [1], there were 8.3 mln IDN domains worldwide.
> 
> And that's presumably only second-level domains. Nobody knows how many
> non-ASCII subdomains exist under ASCII second-level domains, since
> domain holders define subdomains at will without telling anybody.
> 
> There are currently 153 non-ASCII top-level domains out of 1486 total,
> which is 10.3%:
> https://data.iana.org/TLD/tlds-alpha-by-domain.txt
> 
> > Apparently .рф is fairly popular, with 1/5th of .ru registrations [3].
> 
> And that was eight years ago, only four years after рф was opened for
> registrations.
> 
> > But from what I have seen, all those internationalized domains serve
> > as a redirect or backup to sites also available as ascii.
> 
> In 2013 11% of рф domains redirected to ASCII domains, 50% were in use
> and not redirecting, and 39% were only registered but unused. Already
> in 2011, the year after the floodgates were opened, 34% were in use and
> not redirecting. This is according to page 116 of this report:
> https://web.archive.org/web/20141210151244/http://www.eurid.eu/files/publ/ID
> NWorldReport2014_Interactive.pdf
> 
> But yes, it's still often necessary to resort to ASCII, either the ACE
> form (xn--gobbledygook) or a separate ASCII-only fallback domain. Email
> in particular remains a major drag. Only in 2012 was there enough
> consensus to publish a proposed standard for SMTPUTF8. Extensions to
> IMAP and POP followed in 2013. Support in various email-handling
> programs is still lacking. As long as people feel that they must have
> an ASCII domain for email, some will naturally choose to use that same
> domain for their website rather than using two separate domains.
> 
> > And for command-line
> > tools or scripting, using those ascii versions seems quite likely…
> 
> That's another area where support for IDNA is spotty, yes. OpenSSH
> still lacks support for example. So does Nmap. The Bind utils have
> incomplete and inconsistent support. "dig", "host" and "nslookup" can
> look up non-ASCII domain names, but if a server to query is specified,
> then they expect the server to have an ASCII-only name. "delv" lacks
> support entirely.
> 
> This is the problem that you're about to make worse. People will find
> that support for IDNA is unreliable in various programs that use Curl
> under the hood. To work around the problem they'll resort to the ACE
> form, or to an ASCII-only domain they have for precisely that purpose.
> Thus you end up hampering the adoption of international domains even
> more.
> 
> > So I'd definitely vote to enable libidn2 in curl-minimal,
> > _if_ there are people who'd actually use this for real.
> 
> People can't use it until it's consistently supported, and you won't
> support it until people use it. Do you mean to wait for all the other
> command line programs to support IDNA first, and then, when the whole
> world is waiting for you, then you'll turn it on in Curl and people
> will start using it? Guess what – everybody else is also waiting for
> everybody else.
> 
> This is the same deadlock that hampers IPv6, encrypted email and many
> other things. Everybody's waiting for everybody else to move first.
> 
> Björn Persson

There seems to be demand for libcurl with IDN support on minimal Fedora 
installations, so I created a pull request to enable it in libcurl-minimal:

https://src.fedoraproject.org/rpms/curl/pull-request/13

Kamil

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure