https://bugzilla.redhat.com/show_bug.cgi?id=2126978
Bug ID: 2126978
Summary: perl-Regexp-Grammars-1.058 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-Regexp-Grammars
Keywords: FutureFeature,
On 2022-09-14 07:01, Miro Hrončok wrote:
Hello folks!
luya dlib
dlib
@bizdelnick @luya
ASSIGNED https://bugzilla.redhat.com/2098694
Bundles old pybind11 which is not Python 3.11 compatible,
needs to be unbundled or at least updated.
Upstream is waiting for the stable release of Python
The following builds have been pushed to Fedora EPEL 7 updates-testing
coturn-4.6.0-1.el7
libmd-1.0.4-2.el7
Details about builds:
coturn-4.6.0-1.el7 (FEDORA-EPEL-2022-cb40cdd267)
TURN/STUN & ICE Server
The following Fedora EPEL 8 Security updates need testing:
Age URL
57 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-89ad385971
chromium-103.0.5060.114-1.el8
2 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-cd091ab1b1
libconfuse-3.3-7.el8
1
https://bugzilla.redhat.com/show_bug.cgi?id=2126661
--- Comment #4 from Fedora Update System ---
FEDORA-2022-95366a795e has been pushed to the Fedora 36 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing
https://bugzilla.redhat.com/show_bug.cgi?id=2124507
Fedora Update System changed:
What|Removed |Added
Status|ON_QA |CLOSED
Fixed In Version|
https://bugzilla.redhat.com/show_bug.cgi?id=2124508
Bug 2124508 depends on bug 2124507, which changed state.
Bug 2124507 Summary: Please branch and build perl-X11-Protocol in epel9.
https://bugzilla.redhat.com/show_bug.cgi?id=2124507
What|Removed |Added
https://bugzilla.redhat.com/show_bug.cgi?id=2126677
--- Comment #2 from Fedora Update System ---
FEDORA-2022-7f390fcbe8 has been pushed to the Fedora 37 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing
https://bugzilla.redhat.com/show_bug.cgi?id=2124508
Fedora Update System changed:
What|Removed |Added
Fixed In Version||perl-X11-Protocol-Other-31-
https://bugzilla.redhat.com/show_bug.cgi?id=2126661
--- Comment #3 from Fedora Update System ---
FEDORA-2022-7f390fcbe8 has been pushed to the Fedora 37 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing
https://bugzilla.redhat.com/show_bug.cgi?id=2126679
--- Comment #2 from Fedora Update System ---
FEDORA-2022-7f390fcbe8 has been pushed to the Fedora 37 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing
https://bugzilla.redhat.com/show_bug.cgi?id=2126682
--- Comment #2 from Fedora Update System ---
FEDORA-2022-7f390fcbe8 has been pushed to the Fedora 37 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing
https://bugzilla.redhat.com/show_bug.cgi?id=2124460
Fedora Update System changed:
What|Removed |Added
Fixed In Version||perl-Crypt-SSLeay-0.72-37.e
On 14. 09. 22 16:01, Miro Hrončok wrote:
Hello folks!
...
Will be retired one week before the freeze anyway barbecue it's an old NEW.
I don't always spell "because" as "barbecue". But when I do I copy-paste it to
the email 8 times 臘
--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
On 14. 09. 22 16:01, Miro Hrončok wrote:
Hello folks!
...
Will be retired one week before the freeze anyway barbecue it's an old NEW.
I don't always spell "because" as "barbecue". But when I do I copy-paste it to
the email 8 times 臘
--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
Hi Miroslav,
On Mon, Sep 12, 2022 at 04:36:47PM +0200, Miroslav Lichvar wrote:
> flac-1.4.0 changes the libFLAC and libFLAC++ sonames. There are also
> some incompatible changes in the API, but I didn't see any packages
> failing to built due to these changes.
>
> The following packages need to
On Wed, 2022-09-14 at 15:49 -0700, Adam Williamson wrote:
> The hardcore way is to say "welp, too bad, your account's gone,
> create
> a new one and start over, including going through the maintainer
> process again", but that might be a bit *too* hardcore.
>
> This is a perennial issue, though,
On Wed, 2022-09-14 at 18:35 -0400, Simo Sorce wrote:
> On Wed, 2022-09-14 at 15:11 -0700, Adam Williamson wrote:
> > On Wed, 2022-09-14 at 10:25 -0500, Michael Catanzaro wrote:
> > >
> > > On Wed, Sep 14 2022 at 06:58:12 AM +, Tommy Nguyen
> > > wrote:
> > > > I'm not entirely convinced.
On Wed, 2022-09-14 at 15:11 -0700, Adam Williamson wrote:
> On Wed, 2022-09-14 at 10:25 -0500, Michael Catanzaro wrote:
> >
> > On Wed, Sep 14 2022 at 06:58:12 AM +, Tommy Nguyen
> > wrote:
> > > I'm not entirely convinced. See this paper:
> > > https://eprint.iacr.org/2020/1298.pdf
> >
>
On Wed, 2022-09-14 at 10:25 -0500, Michael Catanzaro wrote:
>
> On Wed, Sep 14 2022 at 06:58:12 AM +, Tommy Nguyen
> wrote:
> > I'm not entirely convinced. See this paper:
> > https://eprint.iacr.org/2020/1298.pdf
>
> I only read the abstract of this paper, but looks like the researchers
On Tue, 2022-09-13 at 16:46 +, Timo S via devel wrote:
> $ sudo dnf --releasever=37 --setopt=module_platform_id=platform:f37 -
> -enablerepo=updates-testing $(rpm -q fedora-repos-modular >/dev/null
> && echo --enablerepo=updates-testing-modular) --assumeno distro-sync
> Last metadata
Alexander Sosedkin wrote:
> That's a reason why my initial thread [1] has been named
> "Landing a larger-than-release change (distrusting SHA-1 signatures)":
> flipping the switch is the easy part, unfortunately.
IMHO, a change that breaks so many things that you expect it to take more
than 6
On Wed, Sep 14, 2022 at 05:47:46PM +0300, Alexander Bokovoy wrote:
> On ke, 14 syys 2022, Stephen Smoogen wrote:
> > On Wed, 14 Sept 2022 at 05:28, Alexander Bokovoy
> > wrote:
> >
> > >
> > > Sadly, it cannot be just 'any' certificate, it has to be issued by a
> > > certificate authority that
https://bugzilla.redhat.com/show_bug.cgi?id=2124543
--- Comment #4 from Damian Wrobel ---
I prepared a request review for 'per(Template::Plugin::CGI)' [1] as well as the
BR for it in [2].
[1] https://bugzilla.redhat.com/show_bug.cgi?id=2126943
[2]
Minutes:
https://meetbot.fedoraproject.org/fedora-meeting-1/2022-09-14/fedora_coreos_meeting.2022-09-14-16.30.html
Minutes (text):
https://meetbot.fedoraproject.org/fedora-meeting-1/2022-09-14/fedora_coreos_meeting.2022-09-14-16.30.txt
Log:
https://bugzilla.redhat.com/show_bug.cgi?id=2124543
Damian Wrobel changed:
What|Removed |Added
Depends On||2126943
Referenced Bugs:
Notification time stamped 2022-09-14 20:49:30 UTC
From 13fd2ffada8eeeda83f81cdfdf110b89728f68cd Mon Sep 17 00:00:00 2001
From: Damian Wrobel
Date: Sep 14 2022 17:25:25 +
Subject: Fix FTBFS (rhbz#2124543).
Signed-off-by: Damian Wrobel
---
diff --git a/perl-SOAP-WSDL.spec
Hello,
I am planning to update gpgme to 1.18.0 in rawhide and since there is
SONAME bump in libqgpgme, I am asking to be a co-maintainer of these
dependant packages:
- https://src.fedoraproject.org/rpms/isoimagewriter (main admin: lupinix)
- https://src.fedoraproject.org/rpms/kdepim-addons (main
The gap package has a new version available (4.12), which comes with
significant improvements over 4.11. I've been working on updating the
entire gap stack [1] for the new version. The spec files have been
simplified and made more uniform, which should aid future maintenance.
I need one new
I've updated https://fedoraproject.org/wiki/Changes/NodejsRepackaging
with the results of this discussion. I'll go the
`nodejs-$MAJOR-unversioned-command` route.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to
Am 24.05.22 um 19:53 schrieb Maxwell G via epel-devel:
On Monday, May 23, 2022 11:18:38 PM CDT Orion Poplawski wrote:
I've been coming to the thinking that naming the SRPMS
python3X-%{srcname}-epel is a better choice. This makes modifying
original Fedora specs simpler.
I think that makes
On Wed, 2022-09-07 at 17:47 +, Maxwell G via devel wrote:
> I think this is a bad idea. It's quite hostile to packagers. It will
> break rawhide for months and make it very difficult to stabilize the
> distro before the beta freeze or do any type of rebuild. It very well
> may
> affect
On Wed, Sep 14, 2022 at 6:40 PM Kevin Fenzi wrote:
>
> On Wed, Sep 14, 2022 at 11:45:16AM +0200, Alexander Sosedkin wrote:
> > On Tue, Sep 13, 2022 at 7:35 PM Kevin Fenzi wrote:
> > >
> > > How about this:
> > >
> > > Drop the term 'jump scare' entirely. IMHO it just sounds bad.
> >
> > I'm open
# dnf --releasever=37 --setopt=module_platform_id=platform:f37
--enablerepo=updates-testing $(rpm -q fedora-repos-modular >/dev/null
&& echo --enablerepo=updates-testing-modular) --assumeno distro-sync
Fedora 37 - x86_64
22 MB/s |
81 MB
OK, third time is the charm. I finally got the command right.
Everything went just fine.:
sudo dnf --releasever=37 --setopt=module_platform_id=platform:f37
--enablerepo=updates-testing $(rpm -q fedora-repos-modular >/dev/null && echo
--enablerepo=updates-testing-modular) --assumeno
On 14/09/2022 17:26, Michael Catanzaro wrote:
If you want to protect against *both* threats, use a security key, but
you've already pushed back against requiring a hardware purchase.
I never click on links from emails, instant messengers, etc.
I'm using fkinit and my simple custom systemd
On 9/14/22 09:40, Scott Beamer wrote:
I just copied and pasted from the OP...
Ok, but you have to be aware that your email client might reformat the
text and mess up the lines.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe
On Wed, Sep 14, 2022 at 11:45:16AM +0200, Alexander Sosedkin wrote:
> On Tue, Sep 13, 2022 at 7:35 PM Kevin Fenzi wrote:
> >
> > How about this:
> >
> > Drop the term 'jump scare' entirely. IMHO it just sounds bad.
>
> I'm open for proposals on the wording. =)
Well, I guess it depends on if you
I just copied and pasted from the OP...
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
On Wed, 14 Sep 2022 05:06:29 -
"Richard Myers" wrote:
> This is for F35 -> F37 ...
>
> I sure
> would love it if anybody knows how to fix the below warning(?), which
> shows up every time I run DNF (it has persisted through at least 3 or
> 4 Fedora revisions, maybe more):
>
> Traceback
TLS client certificates is actually not a terrible idea. They're not
very popular anymore, but they're supported by all major browsers (I
think?) and they work.
On Wed, Sep 14 2022 at 02:08:32 PM +0200, Vitaly Zaitsev via devel
wrote:
On 14/09/2022 10:01, Demi Marie Obenour wrote:
Still,
On Wed, Sep 14 2022 at 06:58:12 AM +, Tommy Nguyen
wrote:
I'm not entirely convinced. See this paper:
https://eprint.iacr.org/2020/1298.pdf
I only read the abstract of this paper, but looks like the researchers
have found that FIDO is indeed unphishable. Seems their attack relies
on
On Wed, Sep 14, 2022 at 10:53 AM Smith, Stewart via devel
wrote:
>
>
> > On Sep 14, 2022, at 4:17 AM, Tom Hughes via devel
> > wrote:
> >
> >> On 14/09/2022 12:11, Florian Weimer wrote:
> >> I see some new build failures in rawhide related to systemd RPM macros:
> >>
> >> Processing files:
On 14. 09. 22 16:36, Casper wrote:
Miro Hrončok a écrit :
profanity
@fantom
ASSIGNED https://bugzilla.redhat.com/2049682
Bug status changed ~3 weeks ago without comment,
not updated since.
Fixed in rawhide recently, f37-candidate build exists.
I just made package update 1 hour ago. Cross-fire
On 14. 09. 22 16:36, Casper wrote:
Miro Hrončok a écrit :
profanity
@fantom
ASSIGNED https://bugzilla.redhat.com/2049682
Bug status changed ~3 weeks ago without comment,
not updated since.
Fixed in rawhide recently, f37-candidate build exists.
I just made package update 1 hour ago. Cross-fire
> On Sep 14, 2022, at 4:17 AM, Tom Hughes via devel
> wrote:
>
>> On 14/09/2022 12:11, Florian Weimer wrote:
>> I see some new build failures in rawhide related to systemd RPM macros:
>>
>> Processing files: opencryptoki-3.18.0-4.fc38.s390x
>> error: File must begin with "/":
On ke, 14 syys 2022, Stephen Smoogen wrote:
On Wed, 14 Sept 2022 at 05:28, Alexander Bokovoy
wrote:
Sadly, it cannot be just 'any' certificate, it has to be issued by a
certificate authority that is trusted by the KDC as well. For example,
by FreeIPA CA which is already ran by the Fedora
Miro Hrončok a écrit :
> profanity
> @fantom
> ASSIGNED https://bugzilla.redhat.com/2049682
> Bug status changed ~3 weeks ago without comment,
> not updated since.
> Fixed in rawhide recently, f37-candidate build exists.
>
I just made package update 1 hour ago. Cross-fire :)
Hello folks!
We are approaching Fedora 37 Final Freeze, which will start on 2022-10-04.
There are still 33 packages in Fedora 37 that will need to be rebuilt with
Python 3.11 in order to be installable (most of them). I propose to retire the
non-installable packages if they are not rebuilt by
Hello folks!
We are approaching Fedora 37 Final Freeze, which will start on 2022-10-04.
There are still 33 packages in Fedora 37 that will need to be rebuilt with
Python 3.11 in order to be installable (most of them). I propose to retire the
non-installable packages if they are not rebuilt by
# dnf --releasever=37 --setopt=module_platform_id=platform:f37
--enablerepo=updates-testing $(rpm -q fedora-repos-modular >/dev/null && echo
--enablerepo=updates-testing-modular) --assumeno distro-sync
Last metadata expiration check: 0:06:44 ago on Wed 14 Sep 2022 02:12:53 PM CEST.
Error:
On Wed, 14 Sept 2022 at 05:28, Alexander Bokovoy
wrote:
>
> Sadly, it cannot be just 'any' certificate, it has to be issued by a
> certificate authority that is trusted by the KDC as well. For example,
> by FreeIPA CA which is already ran by the Fedora project infrastructure
> team. An
On 14/09/2022 10:01, Demi Marie Obenour wrote:
Still, even a pure software FIDO2 implementation is much better than
TOTP etc.
I don't think so. Malware can easily steal the private key. Simple TOTP
on a separate device is much better.
--
Sincerely,
Vitaly Zaitsev (vit...@easycoding.org)
* Tom Hughes via devel:
> On 14/09/2022 12:11, Florian Weimer wrote:
>> I see some new build failures in rawhide related to systemd RPM macros:
>> Processing files: opencryptoki-3.18.0-4.fc38.s390x
>> error: File must begin with "/": %{_tmpfilesdir}/opencryptoki.conf
>> error: File must begin
On 14/09/2022 12:11, Florian Weimer wrote:
I see some new build failures in rawhide related to systemd RPM macros:
Processing files: opencryptoki-3.18.0-4.fc38.s390x
error: File must begin with "/": %{_tmpfilesdir}/opencryptoki.conf
error: File must begin with "/": %{_unitdir}/pkcsslotd.service
I see some new build failures in rawhide related to systemd RPM macros:
Processing files: opencryptoki-3.18.0-4.fc38.s390x
error: File must begin with "/": %{_tmpfilesdir}/opencryptoki.conf
error: File must begin with "/": %{_unitdir}/pkcsslotd.service
[…]
RPM build errors:
File must begin
OLD: Fedora-Rawhide-20220913.n.0
NEW: Fedora-Rawhide-20220914.n.0
= SUMMARY =
Added images:0
Dropped images: 0
Added packages: 2
Dropped packages:2
Upgraded packages: 174
Downgraded packages: 0
Size of added packages: 323.29 KiB
Size of dropped packages
https://bugzilla.redhat.com/show_bug.cgi?id=2126661
--- Comment #2 from Fedora Update System ---
FEDORA-2022-95366a795e has been submitted as an update to Fedora 36.
https://bodhi.fedoraproject.org/updates/FEDORA-2022-95366a795e
--
You are receiving this mail because:
You are on the CC list
https://bugzilla.redhat.com/show_bug.cgi?id=2126677
--- Comment #1 from Fedora Update System ---
FEDORA-2022-7f390fcbe8 has been submitted as an update to Fedora 37.
https://bodhi.fedoraproject.org/updates/FEDORA-2022-7f390fcbe8
--
You are receiving this mail because:
You are on the CC list
https://bugzilla.redhat.com/show_bug.cgi?id=2126682
--- Comment #1 from Fedora Update System ---
FEDORA-2022-7f390fcbe8 has been submitted as an update to Fedora 37.
https://bodhi.fedoraproject.org/updates/FEDORA-2022-7f390fcbe8
--
You are receiving this mail because:
You are on the CC list
https://bugzilla.redhat.com/show_bug.cgi?id=2126679
--- Comment #1 from Fedora Update System ---
FEDORA-2022-7f390fcbe8 has been submitted as an update to Fedora 37.
https://bodhi.fedoraproject.org/updates/FEDORA-2022-7f390fcbe8
--
You are receiving this mail because:
You are on the CC list
https://bugzilla.redhat.com/show_bug.cgi?id=2126661
--- Comment #1 from Fedora Update System ---
FEDORA-2022-7f390fcbe8 has been submitted as an update to Fedora 37.
https://bodhi.fedoraproject.org/updates/FEDORA-2022-7f390fcbe8
--
You are receiving this mail because:
You are on the CC list
On Tue, Sep 13, 2022 at 7:35 PM Kevin Fenzi wrote:
>
> How about this:
>
> Drop the term 'jump scare' entirely. IMHO it just sounds bad.
I'm open for proposals on the wording. =)
> Rework the change so it's basically planning on making this change in
> f38.
That makes it closer than currently,
On ke, 14 syys 2022, Demi Marie Obenour wrote:
On 9/14/22 03:55, Vitaly Zaitsev via devel wrote:
On 14/09/2022 08:46, Demi Marie Obenour wrote:
The only other
non-phishable authentication method is TLS client certificates and
I would be fine with those.
Fedora used to have TLS client
On Tue, Sep 13, 2022 at 7:51 PM Chris Adams wrote:
>
> I'd like to piggy-back - is there a Fedora well-supported board that can
> use the Pi-targeted hats? I stayed away from the Pi for a long while,
> because of the support problems, but it just seems like there's so much
> that's just made for
* Vitaly Zaitsev via devel:
> On 14/09/2022 05:27, Neal Gompa wrote:
>> Well, we just released the Beta and people have noticed that this is
>> still broken. Do we have an ETA on a fix? Because this is going to be
>> a major black eye for*us* if it stays broken through to GA.
>
> Epic Games had
https://bugzilla.redhat.com/show_bug.cgi?id=2126682
Petr Pisar changed:
What|Removed |Added
Status|NEW |CLOSED
Resolution|---
https://bugzilla.redhat.com/show_bug.cgi?id=2126682
Bug ID: 2126682
Summary: Remove from a distribution
Product: Fedora
Version: 37
Status: NEW
Component: perl-Lingua-EN-Syllable
Assignee: mhron...@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2126679
Petr Pisar changed:
What|Removed |Added
Resolution|--- |RAWHIDE
Status|NEW
https://bugzilla.redhat.com/show_bug.cgi?id=2126679
Bug ID: 2126679
Summary: Remove from a distribution
Product: Fedora
Version: 37
Status: NEW
Component: perl-Lingua-EN-Fathom
Assignee: mhron...@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2126677
Bug ID: 2126677
Summary: Remove from a distribution
Product: Fedora
Version: 37
Status: NEW
Component: perl-File-Inplace
Assignee: mhron...@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2126677
Petr Pisar changed:
What|Removed |Added
Resolution|--- |RAWHIDE
Status|NEW
https://bugzilla.redhat.com/show_bug.cgi?id=2126661
Petr Pisar changed:
What|Removed |Added
Status|NEW |CLOSED
Resolution|---
https://bugzilla.redhat.com/show_bug.cgi?id=2126661
Bug ID: 2126661
Summary: Remove from a distribution
Product: Fedora
Version: 36
Status: NEW
Component: perl-Verilog-CodeGen
Assignee: jples...@redhat.com
On 9/13/22 21:37, Tommy Nguyen wrote:
> On Tue, 2022-09-06 at 16:14 -0500, Jonathan Wright via devel wrote:
>> On Tue, Sep 6, 2022 at 3:52 PM Vitaly Zaitsev via devel <
>> devel@lists.fedoraproject.org> wrote:
>>
>>> On 06/09/2022 19:49, Michael Catanzaro wrote:
Of course, hardware
On 9/14/22 03:55, Vitaly Zaitsev via devel wrote:
> On 14/09/2022 08:46, Demi Marie Obenour wrote:
>> The only other
>> non-phishable authentication method is TLS client certificates and
>> I would be fine with those.
>
> Fedora used to have TLS client certificate authorization (in Koji), but
>
On 14/09/2022 08:46, Demi Marie Obenour wrote:
The only other
non-phishable authentication method is TLS client certificates and
I would be fine with those.
Fedora used to have TLS client certificate authorization (in Koji), but
this has been replaced by Kerberos.
since almost every laptop
On 13/09/2022 23:50, Demi Marie Obenour wrote:
Another option is a TPM-based authenticator. Would this be acceptable?
No. TPM 2.0 chip is a *proprietary* black box. Some of them have known
critical security vulnerabilities[1].
[1]:
On 14/09/2022 05:27, Neal Gompa wrote:
Well, we just released the Beta and people have noticed that this is
still broken. Do we have an ETA on a fix? Because this is going to be
a major black eye for*us* if it stays broken through to GA.
Epic Games had more than a month to fix the problem but
On Wed, 2022-09-14 at 02:46 -0400, Demi Marie Obenour wrote:
> Because FIDO2 is not phishable. TOTP and HOTP are. The only other
> non-phishable authentication method is TLS client certificates and
> I would be fine with those.
I'm not entirely convinced. See this paper:
Copr repo for Signal-Desktop owned by luminoso
561 B/s | 341 B 00:00
Errors during downloading metadata for repository
On 9/13/22 21:37, Tommy Nguyen wrote:
> On Tue, 2022-09-06 at 16:14 -0500, Jonathan Wright via devel wrote:
>> On Tue, Sep 6, 2022 at 3:52 PM Vitaly Zaitsev via devel <
>> devel@lists.fedoraproject.org> wrote:
>>
>>> On 06/09/2022 19:49, Michael Catanzaro wrote:
Of course, hardware
82 matches
Mail list logo