[EPEL-devel] Re: Default for 'dnf copr enable'

2022-06-27 Thread Neal Gompa
On Tue, Jun 28, 2022 at 12:09 AM Carl George wrote: > > On Mon, Apr 11, 2022 at 8:38 AM Miroslav Suchý wrote: > > > > Hi. > > I want to get your feedback: > > > > When you enable Copr repository you can run: > >dnf copr enable myname/project epel-9-x86_64 > > The last parameter is optional

[EPEL-devel] Re: Default for 'dnf copr enable'

2022-06-27 Thread Carl George
On Mon, Apr 11, 2022 at 8:38 AM Miroslav Suchý wrote: > > Hi. > I want to get your feedback: > > When you enable Copr repository you can run: >dnf copr enable myname/project epel-9-x86_64 > The last parameter is optional and most people usually runs: >dnf copr enable myname/project > >

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Chris Adams
Once upon a time, Neal Gompa said: > I'd be interested in seeing the justification for the revert in RHEL > 9. From my perspective, it doesn't make sense to disable this because > it makes bonds/teams/etc. device dependent. This can be particularly > bad if you've got a bond and then you swap out

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Neal Gompa
On Sat, Jun 25, 2022 at 3:06 PM Vipul Siddharth wrote: > > This document represents a proposed Change. As part of the Changes > process, proposals are publicly announced in order to receive > community feedback. This proposal will only be implemented if approved > by the Fedora Engineering

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Kevin Kofler via devel
> The `systemd-udev` package installs > `"/usr/lib/systemd/network/99-default.link"`, > which sets `Link.MACAddressPolicy=persistent`. This proposal is to > change it to set `Link.MACAddressPolicy=none` to stop changing the MAC > address. This is particularly important for bridge and bond devices.

[EPEL-devel] Fedora EPEL 7 updates-testing report

2022-06-27 Thread updates
The following Fedora EPEL 7 Security updates need testing: Age URL 5 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-0dde709329 chromium-102.0.5005.115-1.el7 The following builds have been pushed to Fedora EPEL 7 updates-testing bird2-2.0.10-1.el7 rpminspect-1.10-1.el7

[Bug 2101223] Please branch and build perl-Term-ReadLine-Gnu for EPEL 9

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2101223 Fedora Update System changed: What|Removed |Added Status|MODIFIED|ON_QA --- Comment #3 from

[Bug 2100791] Add perl-Perl4-CoreLibs to EPEL9

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2100791 Fedora Update System changed: What|Removed |Added Status|MODIFIED|ON_QA --- Comment #3 from

[Bug 2101223] Please branch and build perl-Term-ReadLine-Gnu for EPEL 9

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2101223 Fedora Update System changed: What|Removed |Added Status|ASSIGNED|MODIFIED --- Comment #2 from

RFC: squashfuse multi-threaded rewrite

2022-06-27 Thread Michel Alexandre Salim
Hi all, Kevin has a PR that rewrites squashfuse to be multi-threaded: https://github.com/vasi/squashfuse/pull/70 I've put up a PR backporting this on top of the recently released 0.1.105 which is now built for Rawhide: https://src.fedoraproject.org/rpms/squashfuse/pull-request/3 Does anyone

[Bug 2101568] New: perl-Math-BigRat-0.2624 is available

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2101568 Bug ID: 2101568 Summary: perl-Math-BigRat-0.2624 is available Product: Fedora Version: rawhide Status: NEW Component: perl-Math-BigRat Keywords: FutureFeature, Triaged

Re: Permission errors with fedora-review and mock

2022-06-27 Thread fuller
Thank you very much - that fixed it On 27/06/2022 22:50, Jerry James wrote: On Sat, Jun 25, 2022 at 12:33 PM Mark E. Fuller wrote: > Up to a couple days ago, mock and fedora-review were working fine for > me, but just recently I have started getting permission errors: > > ``` > ... > Building

Re: Permission errors with fedora-review and mock

2022-06-27 Thread Jerry James
On Sat, Jun 25, 2022 at 12:33 PM Mark E. Fuller wrote: > Up to a couple days ago, mock and fedora-review were working fine for > me, but just recently I have started getting permission errors: > > ``` > ... > Building target platforms: x86_64 > Building for target x86_64 > setting

Re: Suggestion: Use a unified kernel image by default in the future.

2022-06-27 Thread Demi Marie Obenour
On 6/27/22 13:34, Chris Murphy wrote: > On Mon, Jun 27, 2022 at 1:56 AM Florian Weimer wrote: >> >> * Neal Gompa: >> >>> I treat Secure Boot purely as a compatibility interface. We need to do >>> just enough to get through the secure boot environment. >> >> Right. It's not even clear to me why

Re: All maven RPM builds no longer possible

2022-06-27 Thread Jerry James
On Mon, Jun 27, 2022 at 3:04 AM Graham Leggett via devel wrote: > I just tried to start from "probably simplest spec file possible” as > described below in order to package a maven artefact properly as an RPM: > > https://docs.fedoraproject.org/en-US/java-packaging-howto/packaging_maven_project/

Re: Suggestion: Use a unified kernel image by default in the future.

2022-06-27 Thread Sharpened Blade via devel
If the system owner wanted to, they could use their own firmware/ comprimise firmware, then fake the firmware version to something new, the vm could not even be interacting with the cpu at all. Also, if the keys are in the cpu, then the keys can be extracted.

Re: Suggestion: Use a unified kernel image by default in the future.

2022-06-27 Thread Sharpened Blade via devel
> How big is the demand for this kind of lockdown? It can help users security, but most users have no idea what this is. Software should be secure by itself, without users needing extra effort. > As a since-last-century Linux user, I'm choosing Fedora > exactly to NOT have all this

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Demi Marie Obenour
On 6/27/22 13:03, Thomas Haller wrote: > On Mon, 2022-06-27 at 10:10 +0200, Zbigniew Jędrzejewski-Szmek wrote: >> On Sun, Jun 26, 2022 at 12:36:14AM +0530, Vipul Siddharth wrote: >>> This document represents a proposed Change. As part of the Changes >>> process, proposals are publicly announced in

Re: Suggestion: Use a unified kernel image by default in the future.

2022-06-27 Thread Sharpened Blade via devel
Akmods can automatically sign kernel modules, its just a few commands and then every version will be signed. ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of

Re: Suggestion: Use a unified kernel image by default in the future.

2022-06-27 Thread Sharpened Blade via devel
Secure boot itself, when used right, actually helps your privacy. Microsoft doesn't require oems to allow the keys to be changed, so it sometimes prevents your freedom, but when implemented right, it can stop evil maid attacks. Also, even when you cant remove Microsoft keys, you can still use

Re: Suggestion: Use a unified kernel image by default in the future.

2022-06-27 Thread Sharpened Blade via devel
The latest akmods version can automatically sign kernel modules, it could even be enabled by default. ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct:

Re: Suggestion: Use a unified kernel image by default in the future.

2022-06-27 Thread Sharpened Blade via devel
This is a good idea, but some users might want to modify or need to modify the command line to boot, if it was signed using fedoras key, then you cant do that. Also some users dont like keeping their trust in fedora and would like to modify their kernel freely. Also, though the private key is

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Dusty Mabe
On 6/27/22 13:03, Thomas Haller wrote: > On Mon, 2022-06-27 at 10:10 +0200, Zbigniew Jędrzejewski-Szmek wrote: > >> - For "big" users (the datacenter case), changing the policy make >> sense, >>   but at the same time, those folks can just insert a policy >> override, >>   they're most likely

Re: F37 change proposal: Make Fedora CoreOS a Fedora Edition (System-Wide change)

2022-06-27 Thread Dusty Mabe
On 6/27/22 13:36, Chris Murphy wrote: > On Sat, Jun 25, 2022 at 12:17 PM Vipul Siddharth > wrote: >> >> This document represents a proposed Change. As part of the Changes >> process, proposals are publicly announced in order to receive >> community feedback. This proposal will only be

[Bug 2100791] Add perl-Perl4-CoreLibs to EPEL9

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2100791 Fedora Update System changed: What|Removed |Added Status|ASSIGNED|MODIFIED --- Comment #2 from

Re: F37 change proposal: Make Fedora CoreOS a Fedora Edition (System-Wide change)

2022-06-27 Thread Chris Murphy
On Sat, Jun 25, 2022 at 12:17 PM Vipul Siddharth wrote: > > This document represents a proposed Change. As part of the Changes > process, proposals are publicly announced in order to receive > community feedback. This proposal will only be implemented if approved > by the Fedora Engineering

Re: Suggestion: Use a unified kernel image by default in the future.

2022-06-27 Thread Chris Murphy
On Mon, Jun 27, 2022 at 1:56 AM Florian Weimer wrote: > > * Neal Gompa: > > > I treat Secure Boot purely as a compatibility interface. We need to do > > just enough to get through the secure boot environment. > > Right. It's not even clear to me why we enforce kernel module > signatures in

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Thomas Haller
On Mon, 2022-06-27 at 17:26 +0100, Tom Hughes wrote: > On 27/06/2022 17:09, Tom Hughes via devel wrote: > > On 27/06/2022 17:05, Thomas Haller wrote: > > > > > On Mon, 2022-06-27 at 13:09 +0100, Tom Hughes via devel wrote: > > > > > > > > Twice now I have had to go and reconfigure my networks

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Thomas Haller
On Mon, 2022-06-27 at 13:34 +0200, Zbigniew Jędrzejewski-Szmek wrote: > > I'm not "blaming" the tools, I completely understand that they were > written a long time ago. But in fact the issue is fairly generic: any > software which interacts with devices that udev also touches MUST > wait > for

Re: Meld directory compare still broken in f36

2022-06-27 Thread Robert-André Mauchin
On 6/24/22 10:49, Andrea Musuruane wrote: Hi,     meld directory compare in f36 is broken. I opened a bug report last month: https://bugzilla.redhat.com/show_bug.cgi?id=2091377 Some days later, kiilerix provided a PR to fix this issue:

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Thomas Haller
On Mon, 2022-06-27 at 10:10 +0200, Zbigniew Jędrzejewski-Szmek wrote: > On Sun, Jun 26, 2022 at 12:36:14AM +0530, Vipul Siddharth wrote: > > This document represents a proposed Change. As part of the Changes > > process, proposals are publicly announced in order to receive > > community feedback.

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Zbigniew Jędrzejewski-Szmek
On Mon, Jun 27, 2022 at 06:08:13PM +0200, Thomas Haller wrote: > On Mon, 2022-06-27 at 10:10 +0200, Zbigniew Jędrzejewski-Szmek wrote: > > > > > > - Deviate from upstream systemd. > > > > It is also important to mention that Fedora will "deviate" from > > itself > > (it's former self). We would

[rpms/perl-Perl4-CoreLibs] PR #1: Add package to EPEL9

2022-06-27 Thread Michal Josef Špaček
mspacek merged a pull-request against the project: `perl-Perl4-CoreLibs` that you are following. Merged pull-request: `` Add package to EPEL9 `` https://src.fedoraproject.org/rpms/perl-Perl4-CoreLibs/pull-request/1 ___ perl-devel mailing list --

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Tom Hughes via devel
On 27/06/2022 17:09, Tom Hughes via devel wrote: On 27/06/2022 17:05, Thomas Haller wrote: On Mon, 2022-06-27 at 13:09 +0100, Tom Hughes via devel wrote: Twice now I have had to go and reconfigure my networks after a Fedora upgrade has changed the MAC assignment policy. Interesting. Are

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Tom Hughes via devel
On 27/06/2022 17:05, Thomas Haller wrote: On Mon, 2022-06-27 at 13:09 +0100, Tom Hughes via devel wrote: Twice now I have had to go and reconfigure my networks after a Fedora upgrade has changed the MAC assignment policy. Interesting. Are you sure it was twice? I thought it changed "only"

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Thomas Haller
On Mon, 2022-06-27 at 10:10 +0200, Zbigniew Jędrzejewski-Szmek wrote: > > > > - Deviate from upstream systemd. > > It is also important to mention that Fedora will "deviate" from > itself > (it's former self). We would be changing a default in place since > ~2013 [1]. > > [1]

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Thomas Haller
Hi, On Mon, 2022-06-27 at 13:09 +0100, Tom Hughes via devel wrote: > > Twice now I have had to go and reconfigure my networks after a Fedora > upgrade has changed the MAC assignment policy. Interesting. Are you sure it was twice? I thought it changed "only" once in F31 (2019). Thomas

[rpms/perl-Perl4-CoreLibs] PR #1: Add package to EPEL9

2022-06-27 Thread Michal Josef Špaček
mspacek opened a new pull-request against the project: `perl-Perl4-CoreLibs` that you are following: `` Add package to EPEL9 `` To reply, visit the link below https://src.fedoraproject.org/rpms/perl-Perl4-CoreLibs/pull-request/1 ___ perl-devel mailing

Fedora-Rawhide-20220627.n.0 compose check report

2022-06-27 Thread Fedora compose checker
Missing expected images: Minimal raw-xz armhfp Compose PASSES proposed Rawhide gating check! All required tests passed Failed openQA tests: 13/163 (aarch64), 12/233 (x86_64) New failures (same test not failed in Fedora-Rawhide-20220626.n.0): ID: 1307774 Test: aarch64

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Dusty Mabe
On 6/27/22 07:34, Zbigniew Jędrzejewski-Szmek wrote: > On Mon, Jun 27, 2022 at 09:40:53AM +0100, Daniel P. Berrangé wrote: >> On Mon, Jun 27, 2022 at 10:10:31AM +0200, Zbigniew Jędrzejewski-Szmek wrote: >>> On Sun, Jun 26, 2022 at 12:36:14AM +0530, Vipul Siddharth wrote: This document

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Dusty Mabe
On 6/27/22 04:10, Zbigniew Jędrzejewski-Szmek wrote: > > > Re variant 2: the proposal limited to brige/bond devices seems much more > reasonable. In particular, the case described below of a server (virtualized > or not) in a big datacenter is the one case where the benefits of >

Re: Suggestion: Use a unified kernel image by default in the future.

2022-06-27 Thread Daniel P . Berrangé
On Mon, Jun 27, 2022 at 08:12:08AM -0400, Neal Gompa wrote: > On Mon, Jun 27, 2022 at 7:59 AM Daniel P. Berrangé > wrote: > > > > On Mon, Jun 27, 2022 at 07:46:29AM -0400, Neal Gompa wrote: > > > On Mon, Jun 27, 2022 at 4:49 AM Daniel P. Berrangé > > > wrote: > > > > > > > > On Sat, Jun 25,

Re: F37 proposal: Deprecate openssl1.1 package (System-Wide Change)

2022-06-27 Thread Clemens Lang
Richard W.M. Jones wrote: I somehow thought that loading the legacy provider would be the same as the LEGACY crypto policy, except just for Python 2.7 rather than for the entire system. It’s a common misconception. So common that I recently wrote a blog post to explain the difference:

Re: Suggestion: Use a unified kernel image by default in the future.

2022-06-27 Thread Neal Gompa
On Mon, Jun 27, 2022 at 7:59 AM Daniel P. Berrangé wrote: > > On Mon, Jun 27, 2022 at 07:46:29AM -0400, Neal Gompa wrote: > > On Mon, Jun 27, 2022 at 4:49 AM Daniel P. Berrangé > > wrote: > > > > > > On Sat, Jun 25, 2022 at 08:43:18PM -0400, Neal Gompa wrote: > > > > On Sat, Jun 25, 2022 at

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Tom Hughes via devel
As I said before I don't care that much what the policy is but I do care very much that Fedora keeps changing it. Twice now I have had to go and reconfigure my networks after a Fedora upgrade has changed the MAC assignment policy. My vote is therefore to leave it as it is so that I don't have

Re: F37 Change Proposal: MAC Address Policy none (System-Wide

2022-06-27 Thread Gabriel L. Somlo
On Sat, Jun 25, 2022 at 08:39:22PM +, devel-requ...@lists.fedoraproject.org wrote: > This document represents a proposed Change. As part of the Changes > process, proposals are publicly announced in order to receive > community feedback. This proposal will only be implemented if approved > by

Re: Suggestion: Use a unified kernel image by default in the future.

2022-06-27 Thread Daniel P . Berrangé
On Mon, Jun 27, 2022 at 07:46:29AM -0400, Neal Gompa wrote: > On Mon, Jun 27, 2022 at 4:49 AM Daniel P. Berrangé > wrote: > > > > On Sat, Jun 25, 2022 at 08:43:18PM -0400, Neal Gompa wrote: > > > On Sat, Jun 25, 2022 at 4:14 PM Demi Marie Obenour > > > wrote: > > > > > > > > On 6/25/22 07:56,

Re: Suggestion: Use a unified kernel image by default in the future.

2022-06-27 Thread Neal Gompa
On Mon, Jun 27, 2022 at 4:49 AM Daniel P. Berrangé wrote: > > On Sat, Jun 25, 2022 at 08:43:18PM -0400, Neal Gompa wrote: > > On Sat, Jun 25, 2022 at 4:14 PM Demi Marie Obenour > > wrote: > > > > > > On 6/25/22 07:56, Roberto Ragusa wrote: > > > > On 6/19/22 22:54, Sharpened Blade via devel

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Zbigniew Jędrzejewski-Szmek
On Mon, Jun 27, 2022 at 09:40:53AM +0100, Daniel P. Berrangé wrote: > On Mon, Jun 27, 2022 at 10:10:31AM +0200, Zbigniew Jędrzejewski-Szmek wrote: > > On Sun, Jun 26, 2022 at 12:36:14AM +0530, Vipul Siddharth wrote: > > > This document represents a proposed Change. As part of the Changes > > >

Re: F37 proposal: Deprecate openssl1.1 package (System-Wide Change)

2022-06-27 Thread Richard W.M. Jones
On Mon, Jun 27, 2022 at 11:15:01AM +0200, Clemens Lang wrote: > Hi, > > Richard W.M. Jones wrote: > > >On Mon, Jun 27, 2022 at 09:11:29AM +0100, Tom Hughes wrote: > >>On 27/06/2022 08:53, Richard W.M. Jones wrote: > >>>On Fri, Jun 24, 2022 at 01:20:27PM +0200, Dmitry Belyavskiy wrote: >

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Zbigniew Jędrzejewski-Szmek
On Mon, Jun 27, 2022 at 11:20:13AM +0200, Hans de Goede wrote: > Hi, > > On 6/27/22 10:10, Zbigniew Jędrzejewski-Szmek wrote: > > On Sun, Jun 26, 2022 at 12:36:14AM +0530, Vipul Siddharth wrote: > >> This document represents a proposed Change. As part of the Changes > >> process, proposals are

[Bug 2101385] New: perl-Socket-2.034 is available

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2101385 Bug ID: 2101385 Summary: perl-Socket-2.034 is available Product: Fedora Version: rawhide Status: NEW Component: perl-Socket Keywords: FutureFeature, Triaged

Fedora rawhide compose report: 20220627.n.0 changes

2022-06-27 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20220626.n.0 NEW: Fedora-Rawhide-20220627.n.0 = SUMMARY = Added images:0 Dropped images: 0 Added packages: 0 Dropped packages:0 Upgraded packages: 33 Downgraded packages: 0 Size of added packages: 0 B Size of dropped packages:0 B Size

[Bug 2101348] perl-Compress-Raw-Zlib-2.202 is available

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2101348 Jitka Plesnikova changed: What|Removed |Added Status|ASSIGNED|CLOSED

[Bug 2101349] Upgrade perl-Validation-Class to 7.900058

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2101349 Jitka Plesnikova changed: What|Removed |Added Fixed In Version||perl-Validation-Class-7.900

[Bug 2101348] perl-Compress-Raw-Zlib-2.202 is available

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2101348 Jitka Plesnikova changed: What|Removed |Added Doc Type|--- |If docs needed, set a value

corsepiu pushed to perl-Validation-Class (rawhide). "Upstream update to 7.900058. (..more)"

2022-06-27 Thread notifications
Notification time stamped 2022-06-27 09:41:19 UTC From c1c723ef596a1fcc55296069a7d6e71e809bf9b0 Mon Sep 17 00:00:00 2001 From: Ralf Corsépius Date: Jun 27 2022 09:41:02 + Subject: Upstream update to 7.900058. Modernize spec file. --- diff --git a/.gitignore b/.gitignore index

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Hans de Goede
Hi, On 6/27/22 10:10, Zbigniew Jędrzejewski-Szmek wrote: > On Sun, Jun 26, 2022 at 12:36:14AM +0530, Vipul Siddharth wrote: >> This document represents a proposed Change. As part of the Changes >> process, proposals are publicly announced in order to receive >> community feedback. This proposal

Re: F37 proposal: Deprecate openssl1.1 package (System-Wide Change)

2022-06-27 Thread Clemens Lang
Hi, Richard W.M. Jones wrote: On Mon, Jun 27, 2022 at 09:11:29AM +0100, Tom Hughes wrote: On 27/06/2022 08:53, Richard W.M. Jones wrote: On Fri, Jun 24, 2022 at 01:20:27PM +0200, Dmitry Belyavskiy wrote: Dear Richard, If the only problem is legacy (and unsafe) ciphersuites, loading the

Re: F37 proposal: Deprecate openssl1.1 package (System-Wide Change)

2022-06-27 Thread Tom Hughes via devel
On 27/06/2022 10:02, Richard W.M. Jones wrote: On Mon, Jun 27, 2022 at 09:11:29AM +0100, Tom Hughes wrote: On 27/06/2022 08:53, Richard W.M. Jones wrote: On Fri, Jun 24, 2022 at 01:20:27PM +0200, Dmitry Belyavskiy wrote: Dear Richard, If the only problem is legacy (and unsafe) ciphersuites,

Re: All maven RPM builds no longer possible

2022-06-27 Thread Marián Konček
Hi, thanks for pointing this out, we have already been planning to update the howto guide soon™. On 27. 6. 2022 11:02, Graham Leggett via devel wrote: Hi all, I just tried to start from "probably simplest spec file possible” as described below in order to package a maven artefact properly as

[Bug 2101349] New: Upgrade perl-Validation-Class to 7.900058

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2101349 Bug ID: 2101349 Summary: Upgrade perl-Validation-Class to 7.900058 Product: Fedora Version: rawhide Status: NEW Component: perl-Validation-Class Assignee:

[Bug 2101348] New: perl-Compress-Raw-Zlib-2.202 is available

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2101348 Bug ID: 2101348 Summary: perl-Compress-Raw-Zlib-2.202 is available Product: Fedora Version: rawhide Status: NEW Component: perl-Compress-Raw-Zlib Keywords:

[Bug 2101347] New: Upgrade perl-Net-DHCP to 0.7

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2101347 Bug ID: 2101347 Summary: Upgrade perl-Net-DHCP to 0.7 Product: Fedora Version: rawhide Status: NEW Component: perl-Net-DHCP Assignee: emman...@seyman.fr

All maven RPM builds no longer possible

2022-06-27 Thread Graham Leggett via devel
Hi all, I just tried to start from "probably simplest spec file possible” as described below in order to package a maven artefact properly as an RPM: https://docs.fedoraproject.org/en-US/java-packaging-howto/packaging_maven_project/ The build failed because the maven-javadoc-plugin package no

Re: F37 proposal: Deprecate openssl1.1 package (System-Wide Change)

2022-06-27 Thread Richard W.M. Jones
On Mon, Jun 27, 2022 at 09:11:29AM +0100, Tom Hughes wrote: > On 27/06/2022 08:53, Richard W.M. Jones wrote: > >On Fri, Jun 24, 2022 at 01:20:27PM +0200, Dmitry Belyavskiy wrote: > >>Dear Richard, > >> > >>If the only problem is legacy (and unsafe) ciphersuites, loading the legacy > >>provider

Fedora-Cloud-35-20220627.0 compose check report

2022-06-27 Thread Fedora compose checker
No missing expected images. Soft failed openQA tests: 1/8 (x86_64), 1/8 (aarch64) (Tests completed, but using a workaround for a known bug) Old soft failures (same test soft failed in Fedora-Cloud-35-20220626.0): ID: 1307561 Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud URL:

[Bug 2101060] perl-Encode-3.18 is available

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2101060 Jitka Plesnikova changed: What|Removed |Added Fixed In Version||perl-Encode-3.18-489.fc37

Re: Suggestion: Use a unified kernel image by default in the future.

2022-06-27 Thread Daniel P . Berrangé
On Sat, Jun 25, 2022 at 08:43:18PM -0400, Neal Gompa wrote: > On Sat, Jun 25, 2022 at 4:14 PM Demi Marie Obenour > wrote: > > > > On 6/25/22 07:56, Roberto Ragusa wrote: > > > On 6/19/22 22:54, Sharpened Blade via devel wrote: > > > > > >> Use unified kernel images by default for new releases.

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Daniel P . Berrangé
On Mon, Jun 27, 2022 at 10:10:31AM +0200, Zbigniew Jędrzejewski-Szmek wrote: > On Sun, Jun 26, 2022 at 12:36:14AM +0530, Vipul Siddharth wrote: > > This document represents a proposed Change. As part of the Changes > > process, proposals are publicly announced in order to receive > > community

[Bug 2101060] perl-Encode-3.18 is available

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2101060 Jitka Plesnikova changed: What|Removed |Added CC|jples...@redhat.com,|

[Bug 2100969] perl-Math-BigInt-1.999836 is available

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2100969 Jitka Plesnikova changed: What|Removed |Added Resolution|--- |RAWHIDE Fixed In Version|

Re: Suggestion: Use a unified kernel image by default in the future.

2022-06-27 Thread Gerd Hoffmann
On Sun, Jun 19, 2022 at 08:54:51PM -, Sharpened Blade via devel wrote: > Use unified kernel images by default for new releases. This can allow > for the local installation to sign the kernel and the initrd, so the > boot chain can be verified until after the uefi. Currently, the initrd > can

Re: F37 proposal: Deprecate openssl1.1 package (System-Wide Change)

2022-06-27 Thread Tom Hughes via devel
On 27/06/2022 08:53, Richard W.M. Jones wrote: On Fri, Jun 24, 2022 at 01:20:27PM +0200, Dmitry Belyavskiy wrote: Dear Richard, If the only problem is legacy (and unsafe) ciphersuites, loading the legacy provider will solve this problem. Any clues on how to do that?

Re: F37 Change Proposal: MAC Address Policy none (System-Wide Change)

2022-06-27 Thread Zbigniew Jędrzejewski-Szmek
On Sun, Jun 26, 2022 at 12:36:14AM +0530, Vipul Siddharth wrote: > This document represents a proposed Change. As part of the Changes > process, proposals are publicly announced in order to receive > community feedback. This proposal will only be implemented if approved > by the Fedora Engineering

Re: Suggestion: Use a unified kernel image by default in the future.

2022-06-27 Thread Florian Weimer
* Neal Gompa: > I treat Secure Boot purely as a compatibility interface. We need to do > just enough to get through the secure boot environment. Right. It's not even clear to me why we enforce kernel module signatures in Secure Boot mode, and disable a few other kernel features. Thanks,

Re: F37 proposal: Deprecate openssl1.1 package (System-Wide Change)

2022-06-27 Thread Richard W.M. Jones
On Fri, Jun 24, 2022 at 01:20:27PM +0200, Dmitry Belyavskiy wrote: > Dear Richard, > > If the only problem is legacy (and unsafe) ciphersuites, loading the legacy > provider will solve this problem. Any clues on how to do that? Rich. > On Fri, Jun 24, 2022 at 1:11 PM Richard W.M. Jones wrote:

Review Request: Wult + Pepc

2022-06-27 Thread Koroglu, Ali Erdinc
Hi all, https://bugzilla.redhat.com/show_bug.cgi?id=2099771 https://bugzilla.redhat.com/show_bug.cgi?id=2099789 Wult: Tool for measuring Intel CPU C-state wake latency Pepc: Power, Energy, and Performance configuration tool (wult dep) Happy to review in exchange. Cheers Ali

Re: F37 proposal: Golang 1.19 (System-Wide Change proposal)

2022-06-27 Thread Bob Mauchin
On Sat, 25 Jun 2022, 16:46 Benjamin Beasley, wrote: > I imagine I could answer this myself by looking carefully at the history > of the golang package, but what happens if you end up doing the mass > rebuild with a pre-release version? Would you need to do a second mass > rebuild with the final

[Bug 2100969] perl-Math-BigInt-1.999836 is available

2022-06-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2100969 Jitka Plesnikova changed: What|Removed |Added Doc Type|--- |If docs needed, set a value