[EPEL-devel] Re: Should we retire weechat from EPEL 7?

2022-10-06 Thread Michel Alexandre Salim
On Thu, Oct 06, 2022 at 07:11:19PM +0200, Neal Gompa wrote:
> On Thu, Oct 6, 2022 at 7:03 PM Michel Alexandre Salim
>  wrote:
> >
> > Hi all,
> >
> > We should probably retire weechat from EPEL 7 - it has multiple CVEs
> > that can only be fixed by updating to versions >= 3.5, but the spec no
> > longer works on EPEL 7 thanks to macros like `%cmake_build` not being
> > available.
> >
> > https://bugz.fedoraproject.org/weechat
> >
> > I'm not sure either Paul or myself really care enough about EL7 to
> > maintain a divergent spec. If someone does still care, PR appreciated to
> > fix this, otherwise consider this the first notice that I'll retire this
> > branch in a few days.
> >
> 
> The cmake3 package has all the macros from the mainline cmake package in 
> Fedora.
> 
> It should be fully compatible, just swap %cmake_* for %cmake3_*.
> 
>
Oh thanks, that works. We can keep this going for now then:

https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-e8cd6275b1

-- 
Michel Alexandre Salim
identities: https://keyoxide.org/5dce2e7e9c3b1cffd335c1d78b229d2f7ccc04f2


signature.asc
Description: PGP signature
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads up! OpenImageIO 2.4 series coming to rawhide

2022-10-06 Thread Richard Shaw
On Thu, Oct 6, 2022 at 8:26 PM Luya Tshimbalanga 
wrote:

> Send us the sidetag as Blender and openshadinglanguage need update.
>

You can use f38-build-side-59007 I've already built OIIO and wait-repo is
done. I'll probably finish the builds tomorrow since it's getting late here.

Thanks,
Richard
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads up! OpenImageIO 2.4 series coming to rawhide

2022-10-06 Thread Luya Tshimbalanga

Send us the sidetag as Blender and openshadinglanguage need update.

Thanks.

On 2022-10-06 18:14, Richard Shaw wrote:

All builds will be done in a side tag. I don't expect any issues.

I'd like to update f37 as well unless there are any objections.

Thanks,
Richard

___
devel mailing list --devel@lists.fedoraproject.org
To unsubscribe send an email todevel-le...@lists.fedoraproject.org
Fedora Code of 
Conduct:https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines:https://fedoraproject.org/wiki/Mailing_list_guidelines
List 
Archives:https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report 
it:https://pagure.io/fedora-infrastructure/new_issue


--
Luya Tshimbalanga
Fedora Design Team
Fedora Design Suite maintainer
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


fedpkg new-sources errors

2022-10-06 Thread Richard Shaw
I'm still getting this on occasion and have no idea what the issue is:

$ fedpkg new-sources OpenImageIO-2.4.4.2.tar.gz
Uploading: OpenImageIO-2.4.4.2.tar.gz
#
 52.0%Could not execute new_sources: (56, 'OpenSSL SSL_read:
error:0A0003FC:SSL routines::sslv3 alert bad record mac, errno 0')

Thanks,
Richard
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Heads up! OpenImageIO 2.4 series coming to rawhide

2022-10-06 Thread Richard Shaw
All builds will be done in a side tag. I don't expect any issues.

I'd like to update f37 as well unless there are any objections.

Thanks,
Richard
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F37 Final blocker status update

2022-10-06 Thread Ben Cotton
The Go/No-Go for the early target date is Thursday. In order to be
ready, we need blockers to be resolved by Tuesday at the latest.

Action summary


Accepted blockers
-

1. abrt — Abrt does not report a segfault which is reported in
journalctl. — ASSIGNED
ACTION: QA to come up with a reproducer

2. anaconda — Installer Crashes When Attempting to Reclaim Space — ON_QA
ACTION: QA to verify FEDORA-2022-2c9c1ebab5

3. glibc — glibc 2.36+ breaks EAC with removal of DT_HASH (and other
game libraries), making games fail to load — POST
ACTION: Maintainers to merge PR and build update

4. gnome-calendar — Month names are not in sync — VERIFIED
ACTION: (none)

5. gnome-calendar — Editing recurring events is broken, changes a
single instance instead of all instances — VERIFIED
ACTION: (none)

6. gnome-calendar — Calendar does not delete events properly — VERIFIED
ACTION: (none)

7. gnome-contacts — Editing an existing contact's email address causes
Contacts to display an empty "Unnamed Person" card, other edits made
at the same time are lost — ASSIGNED
ACTION: upstream to diagnose and fix issue

8. gnome-contacts — Link Contacts feature completely broken — NEW
ACTION: upstream to diagnose and fix issue

9. gnome-shell — On Screen Keyboard cannot type a space anywhere — NEW
ACTION: upstream to diagnose and fix issue

Proposed blockers
-

1. gnome-calendar — Changes to recurring events don't redraw correctly — NEW
ACTION: upstream to diagnose and fix issue

2. gnome-calendar — Editing a recurring event moves it forward in time — NEW
ACTION: upstream to diagnose and fix issue

3. gnome-photos — Memory exhaustion when editing a cropped photo — NEW
ACTION: upstream to diagnose and fix issue

4. gnome-software — rpm-ostree plugin refuses to update — ON_QA
ACTION: QA to verify FEDORA-2022-b53191498a

5. imsettings — Default GTK_IM_MODULE should be ibus in GNOME Xorg — ON_QA
ACTION: QA to verify FEDORA-2022-d5a9bcdac5

6. mesa — Mesa 22.2.0~rc3 is built without support for common video
codecs, missing mesa-va-drivers might cause issues — ASSIGNED
ACTION: Maintainers to diagnose and fix issue

7. poppler — CVE-2022-38784: integer overflow in JBIG2 decoder using
malformed files — ON_QA
ACTION: QA to verify FEDORA-2022-fcb3b063a6

Bug-by-bug detail
=

Accepted blockers
-

1.  abrt — https://bugzilla.redhat.com/show_bug.cgi?id=2128662 — ASSIGNED
Abrt does not report a segfault which is reported in journalctl.

A possible race condition caused abrt to fail to report segfaults.
Restarting the service caused abrt to work as expected. Recent
attempts to reproduce the behavior have failed.

2. anaconda — https://bugzilla.redhat.com/show_bug.cgi?id=2131183 — ON_QA
Installer Crashes When Attempting to Reclaim Space

When using custom storage configuration, deleting existing mount
points and devices on the Manual Partitioning Screen causes Anaconda
to crash. FEDORA-2022-2c9c1ebab5 contains a candidate fix.

3. glibc — https://bugzilla.redhat.com/show_bug.cgi?id=2129358 — POST
glibc 2.36+ breaks EAC with removal of DT_HASH (and other game
libraries), making games fail to load

Not including DT_HASH data in glibc's ELF binaries causes Steam games
using Epic Games Easy Anti-Cheat software to fail to load the EAC
module. This was made a blocker by FESCo due to the reptuational
impact it would have in the gaming community. A PR exists to restore
this data, but the maintainers have concerns about testing.

4. gnome-calendar —
https://bugzilla.redhat.com/show_bug.cgi?id=2130964 — VERIFIED
Month names are not in sync

Under a variety of conditions, the month names do in the two panels do
not adjust in sync. In fact, it's possible to create an event in one
month while the main view and left pane each say different months.
FEDORA-2022-89b6622d53 contains a verified fix.

5. gnome-calendar —
https://bugzilla.redhat.com/show_bug.cgi?id=2130977 — VERIFIED
Editing recurring events is broken, changes a single instance instead
of all instances

When editing a recurring event, only one isntance moves. That instance
is duplicated, while previous instances are deleted and subsequent
instances are unchanged. FEDORA-2022-89b6622d53 contains a verified
fix (although the UI does not correctly redraw events, which is RHBZ
2132769).

6. gnome-calendar —
https://bugzilla.redhat.com/show_bug.cgi?id=2130981 — VERIFIED
Calendar does not delete events properly

Deleting a calendar event before the confirmation appears results in
events listed in certain views. After an application restart, the
events are back but cannot be deleted or edited.
FEDORA-2022-89b6622d53 contains a verified fix.

7. gnome-contacts —
https://bugzilla.redhat.com/show_bug.cgi?id=2130657 — ASSIGNED
Editing an existing contact's email address causes Contacts to display
an empty "Unnamed Person" card, other edits made at the same time are
lost

Clicking back on an edited contact shows the card correctly if only
one 

[Bug 2132841] New: perl-HTTP-Message-6.38 is available

2022-10-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2132841

Bug ID: 2132841
   Summary: perl-HTTP-Message-6.38 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-HTTP-Message
  Keywords: FutureFeature, Triaged
  Assignee: mspa...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: mspa...@redhat.com,
perl-devel@lists.fedoraproject.org, ppi...@redhat.com
  Target Milestone: ---
Classification: Fedora



Releases retrieved: 6.38
Upstream release that is considered latest: 6.38
Current version/release in rawhide: 6.37-1.fc38
URL: http://search.cpan.org/dist/HTTP-Message/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from Anitya:
https://release-monitoring.org/project/2977/


To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/perl-HTTP-Message


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2132841
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Fedora Linux 37 Final Go/No-Go meeting next week

2022-10-06 Thread Ben Cotton
The Fedora Linux 37 Final Go/No-Go[1] meeting is scheduled for
Thursday 13 October at 1700 UTC in #fedora-meeting. At this time, we
will determine the status of the F37 Final for the 18 October early
target date[2]. For more information about the Go/No-Go meeting, see
the wiki[3].

Currently, we have 9 accepted and 7 proposed release blocker bugs[4].

[1] https://calendar.fedoraproject.org/meeting/10352/
[2] https://fedorapeople.org/groups/schedule/f-37/f-37-key-tasks.html
[3] https://fedoraproject.org/wiki/Go_No_Go_Meeting
[4] https://qa.fedoraproject.org/blockerbugs/milestone/37/final/buglist

-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Test-Announce] Fedora Linux 37 Final Go/No-Go meeting next week

2022-10-06 Thread Ben Cotton
The Fedora Linux 37 Final Go/No-Go[1] meeting is scheduled for
Thursday 13 October at 1700 UTC in #fedora-meeting. At this time, we
will determine the status of the F37 Final for the 18 October early
target date[2]. For more information about the Go/No-Go meeting, see
the wiki[3].

Currently, we have 9 accepted and 7 proposed release blocker bugs[4].

[1] https://calendar.fedoraproject.org/meeting/10352/
[2] https://fedorapeople.org/groups/schedule/f-37/f-37-key-tasks.html
[3] https://fedoraproject.org/wiki/Go_No_Go_Meeting
[4] https://qa.fedoraproject.org/blockerbugs/milestone/37/final/buglist

-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
test-announce mailing list -- test-annou...@lists.fedoraproject.org
To unsubscribe send an email to test-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test-annou...@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


F38 proposal: Deprecate python-toml (Self-Contained Change proposal)

2022-10-06 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/DeprecatePythonToml

This document represents a proposed Change. As part of the Changes
process, proposals are publicly announced in order to receive
community feedback. This proposal will only be implemented if approved
by the Fedora Engineering Steering Committee.


== Summary ==
The {{package|python-toml}} (`python3-toml`) package will be
[https://docs.fedoraproject.org/en-US/packaging-guidelines/deprecating-packages/
deprecated] in [[Releases/38|Fedora 38]]. The
[https://pypi.org/project/toml/ upstream toml package] is considered
unmaintained (see [[#Detailed_Description|description]]) and Python
3.11 contains [https://peps.python.org/pep-0680/ a TOML-reading
library in the standard library]. Existing Fedora packages depend on
{{package|python-toml}}, so we cannot remove it yet. Packagers are
encouraged to work with upstreams to switch to
[https://peps.python.org/pep-0680/
tomllib]/[https://pypi.org/project/tomli/ tomli] for reading toml or
[https://pypi.org/project/tomli/ tomli-w] for writing it. But
{{package|python-toml}} remains available until it is a leaf package,
it will be removed then (possibly not yet in Fedora 38).

== Owner ==
* Name: [[User:Churchyard|Miro Hrončok]]
* Email: mhron...@redhat.com


== Detailed Description ==
The {{package|python-toml}} package is [https://pypi.org/project/toml/
unmaintained upstream]. It does not support the latest TOML standard
and no longer releases newer versions.

We'd like to drop it from Fedora, but several packages still require
it. Before we attempt to remove the package, we need to stop new
packages to (Build)Require `python3-toml`, hence we want to have it
[https://docs.fedoraproject.org/en-US/packaging-guidelines/deprecating-packages/
deprecated]. No new packages that require it may be added to Fedora
and existing packages may not gain new dependencies on it. Requiring
it only `if python3 < 3.11` or similar is allowed because python3 on
Fedora 38 is 3.11.

Packagers are encouraged to switch to an alternative TOML library with
upstream involvement. Downstream-only patches to switch are not
encouraged. Change owners recommend the following alternatives:

* Use the [https://docs.python.org/3.11/library/tomllib.html tomllib]
module from the standard library to read TOML with Python 3.11+.
* Use the {{package|python-tomli}} package to read TOML with an older
version of Python. The `tomllib` module has started as `tomli` and
they share the same API except for the module name.
* Use the {{package|python-tomli-w}} package to write TOML.

Note that repoquery gives many packages depending on
`python3-toml`:

 $ repoquery --repo=rawhide{,-source} --whatrequires python3-toml | wc -l
 443

This is because many packages BuildRequire `(python3dist(toml) if
python3-devel < 3.11)` due to {{package|pyproject-rpm-macros}}.

 $ repoquery --repo=rawhide{,-source} --whatrequires
'(python3dist(toml) if python3-devel < 3.11)' | wc -l
 413

The change owners don't know how to
[https://lists.fedoraproject.org/archives/list/de...@lists.fedoraproject.org/thread/3YA5AVHIM65FRSTLLISY5Y7KNGOS4KYA/
easily filter them out], but when filtered the hard way, this remains:

(Results from 2022-10-05, may contain false positives.)

 $ for pkg in $(repoquery --repo=rawhide{,-source} --whatrequires
python3-toml); do repoquery -q --repo=rawhide{,-source} --requires
$pkg | grep -Fv '(python3dist(toml) if python3-devel < 3.11)' | grep
-Eq '(\(|-)toml\b' && echo $pkg; done
 academic-admin-0:0.5.1-10.fc37.noarch
 academic-admin-0:0.5.1-10.fc37.src
 bandit-0:1.7.4-3.fc37.src
 bst-external-0:0.29.0-1.fc38.src
 cvc4-0:1.8-12.fc37.src
 fedora-license-data-0:1.5-1.fc38.src
 fedora-messaging-0:3.1.0-5.fc38.src
 gi-docgen-0:2022.1-7.fc38.noarch
 gi-docgen-0:2022.1-7.fc38.src
 jrnl-0:3.0-3.fc37.src
 micropipenv-0:1.4.2-1.fc37.noarch
 pre-commit-0:2.20.0-2.fc37.noarch
 pre-commit-0:2.20.0-2.fc37.src
 pylint-0:2.14.4-3.fc37.src
 python-anyconfig-0:0.13.0-3.fc37.src
 python-anymarkup-0:0.8.1-10.fc37.src
 python-anymarkup-core-0:0.8.1-9.fc37.src
 python-ast-monitor-0:0.2.1-1.fc38.src
 python-asttokens-0:2.0.8-1.fc38.src
 python-autopep8-0:1.6.0-5.fc37.src
 python-botocore-0:1.27.86-1.fc38.src
 python-box-0:6.0.2-1.fc38.src
 python-build-0:0.8.0-4.fc37.src
 python-check-manifest-0:0.48-3.fc37.src
 python-deepdiff-0:5.8.2-2.fc37.src
 python-devicely-0:1.1.1-3.fc37.src
 python-elpy-0:1.34.0-8.fc37.src
 python-exoscale-0:0.7.1-4.fc37.src
 python-fasjson-client-0:1.0.7-5.fc38.src
 python-fireflyalgorithm-0:0.3.2-2.fc37.src
 python-interrogate-0:1.5.0-4.fc37.src
 python-jsonpickle-0:2.2.0-4.fc37.src
 python-lsp-black-0:1.2.0-3.fc37.src
 python-matrix-nio-0:0.19.0-6.fc38.src
 python-molecule-podman-0:1.0.1-4.fc37.src
 python-neurom-0:3.1.0-5.fc37.src
 python-niaaml-0:1.1.11-1.fc38.src
 python-niaarm-0:0.2.1-2.fc38.src
 python-niaclass-0:0.1.2-8.fc37.src
 python-nikola-0:8.2.2-4.fc37.src
 python-pendulum-0:2.1.2-8.fc37.src
 python-podman-3:4.2.0-7.fc38.src
 

F38 proposal: Deprecate python-toml (Self-Contained Change proposal)

2022-10-06 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/DeprecatePythonToml

This document represents a proposed Change. As part of the Changes
process, proposals are publicly announced in order to receive
community feedback. This proposal will only be implemented if approved
by the Fedora Engineering Steering Committee.


== Summary ==
The {{package|python-toml}} (`python3-toml`) package will be
[https://docs.fedoraproject.org/en-US/packaging-guidelines/deprecating-packages/
deprecated] in [[Releases/38|Fedora 38]]. The
[https://pypi.org/project/toml/ upstream toml package] is considered
unmaintained (see [[#Detailed_Description|description]]) and Python
3.11 contains [https://peps.python.org/pep-0680/ a TOML-reading
library in the standard library]. Existing Fedora packages depend on
{{package|python-toml}}, so we cannot remove it yet. Packagers are
encouraged to work with upstreams to switch to
[https://peps.python.org/pep-0680/
tomllib]/[https://pypi.org/project/tomli/ tomli] for reading toml or
[https://pypi.org/project/tomli/ tomli-w] for writing it. But
{{package|python-toml}} remains available until it is a leaf package,
it will be removed then (possibly not yet in Fedora 38).

== Owner ==
* Name: [[User:Churchyard|Miro Hrončok]]
* Email: mhron...@redhat.com


== Detailed Description ==
The {{package|python-toml}} package is [https://pypi.org/project/toml/
unmaintained upstream]. It does not support the latest TOML standard
and no longer releases newer versions.

We'd like to drop it from Fedora, but several packages still require
it. Before we attempt to remove the package, we need to stop new
packages to (Build)Require `python3-toml`, hence we want to have it
[https://docs.fedoraproject.org/en-US/packaging-guidelines/deprecating-packages/
deprecated]. No new packages that require it may be added to Fedora
and existing packages may not gain new dependencies on it. Requiring
it only `if python3 < 3.11` or similar is allowed because python3 on
Fedora 38 is 3.11.

Packagers are encouraged to switch to an alternative TOML library with
upstream involvement. Downstream-only patches to switch are not
encouraged. Change owners recommend the following alternatives:

* Use the [https://docs.python.org/3.11/library/tomllib.html tomllib]
module from the standard library to read TOML with Python 3.11+.
* Use the {{package|python-tomli}} package to read TOML with an older
version of Python. The `tomllib` module has started as `tomli` and
they share the same API except for the module name.
* Use the {{package|python-tomli-w}} package to write TOML.

Note that repoquery gives many packages depending on
`python3-toml`:

 $ repoquery --repo=rawhide{,-source} --whatrequires python3-toml | wc -l
 443

This is because many packages BuildRequire `(python3dist(toml) if
python3-devel < 3.11)` due to {{package|pyproject-rpm-macros}}.

 $ repoquery --repo=rawhide{,-source} --whatrequires
'(python3dist(toml) if python3-devel < 3.11)' | wc -l
 413

The change owners don't know how to
[https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/3YA5AVHIM65FRSTLLISY5Y7KNGOS4KYA/
easily filter them out], but when filtered the hard way, this remains:

(Results from 2022-10-05, may contain false positives.)

 $ for pkg in $(repoquery --repo=rawhide{,-source} --whatrequires
python3-toml); do repoquery -q --repo=rawhide{,-source} --requires
$pkg | grep -Fv '(python3dist(toml) if python3-devel < 3.11)' | grep
-Eq '(\(|-)toml\b' && echo $pkg; done
 academic-admin-0:0.5.1-10.fc37.noarch
 academic-admin-0:0.5.1-10.fc37.src
 bandit-0:1.7.4-3.fc37.src
 bst-external-0:0.29.0-1.fc38.src
 cvc4-0:1.8-12.fc37.src
 fedora-license-data-0:1.5-1.fc38.src
 fedora-messaging-0:3.1.0-5.fc38.src
 gi-docgen-0:2022.1-7.fc38.noarch
 gi-docgen-0:2022.1-7.fc38.src
 jrnl-0:3.0-3.fc37.src
 micropipenv-0:1.4.2-1.fc37.noarch
 pre-commit-0:2.20.0-2.fc37.noarch
 pre-commit-0:2.20.0-2.fc37.src
 pylint-0:2.14.4-3.fc37.src
 python-anyconfig-0:0.13.0-3.fc37.src
 python-anymarkup-0:0.8.1-10.fc37.src
 python-anymarkup-core-0:0.8.1-9.fc37.src
 python-ast-monitor-0:0.2.1-1.fc38.src
 python-asttokens-0:2.0.8-1.fc38.src
 python-autopep8-0:1.6.0-5.fc37.src
 python-botocore-0:1.27.86-1.fc38.src
 python-box-0:6.0.2-1.fc38.src
 python-build-0:0.8.0-4.fc37.src
 python-check-manifest-0:0.48-3.fc37.src
 python-deepdiff-0:5.8.2-2.fc37.src
 python-devicely-0:1.1.1-3.fc37.src
 python-elpy-0:1.34.0-8.fc37.src
 python-exoscale-0:0.7.1-4.fc37.src
 python-fasjson-client-0:1.0.7-5.fc38.src
 python-fireflyalgorithm-0:0.3.2-2.fc37.src
 python-interrogate-0:1.5.0-4.fc37.src
 python-jsonpickle-0:2.2.0-4.fc37.src
 python-lsp-black-0:1.2.0-3.fc37.src
 python-matrix-nio-0:0.19.0-6.fc38.src
 python-molecule-podman-0:1.0.1-4.fc37.src
 python-neurom-0:3.1.0-5.fc37.src
 python-niaaml-0:1.1.11-1.fc38.src
 python-niaarm-0:0.2.1-2.fc38.src
 python-niaclass-0:0.1.2-8.fc37.src
 python-nikola-0:8.2.2-4.fc37.src
 python-pendulum-0:2.1.2-8.fc37.src
 python-podman-3:4.2.0-7.fc38.src
 

[Bug 2132803] New: perl-URI-5.13 is available

2022-10-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2132803

Bug ID: 2132803
   Summary: perl-URI-5.13 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-URI
  Keywords: FutureFeature, Triaged
  Assignee: jples...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: caillon+fedoraproj...@gmail.com, jples...@redhat.com,
ka...@ucw.cz, mspa...@redhat.com, p...@city-fan.org,
perl-devel@lists.fedoraproject.org,
rhug...@redhat.com, rstr...@redhat.com,
sandm...@redhat.com
  Target Milestone: ---
Classification: Fedora



Releases retrieved: 5.13
Upstream release that is considered latest: 5.13
Current version/release in rawhide: 5.12-2.fc37
URL: http://search.cpan.org/dist/URI/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from Anitya:
https://release-monitoring.org/project/3485/


To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/perl-URI


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2132803
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: When is a file dependency appropriate?

2022-10-06 Thread Miro Hrončok

On 06. 10. 22 15:04, Kalev Lember wrote:
I guess a transition plan (if we make up our minds that it makes sense to do 
it) could be to first make sure the provides are autogenerated, then do a mass 
rebuild, let people try it out in their packages for 6 months, and then 
provenpackager-edit all of Requires/BuildRequires: /usr/bin/foo in the distro 
to the new format as at that point all of supported Fedora releases are going 
to have the provides.


Unfortunately, I am afraid the my-EPEL-package-must-use-the-same-spec people 
will not like this.


We can mass update everything in 15 years maybe.

--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Grub menu with 3 kernels by default

2022-10-06 Thread Robbie Harwood
Daniel P. Berrangé  writes:

> We need PCRs to cover at minimum
>
>   1. Machine firmware
>   2. Bootloader(s)
>   3. Bootloader configuration
>   4. Booted kernel
>   5. Booted initrd
>   6. Booted cmdline

> Item 5 and 6 are a problem, because as mentioned thse are not signed
> by the OS vendor with their secureboot key. The PCRs reflect their
> contents, but the expected PCR digests will change any time the
> initrd/cmdline are updated, meaning the LUKS keys needs to be
> re-sealed. One practical approach to this problem is to use 
> prebuilt unified kernel images, such that the OS vendor's secureboot
> signature covers the kernel,initrd and cmdline. Verification now
> merely involves checking the PCR for SecureBOot state. The flipside
> is that we loose flexibility that exists today with per-host
> generated initrd/cmdline. This may matter for some scenarios (bare
> metal) but not for others (most VMs).

This isn't a grub2 specific problem, but yes - we've discussed how to
accomplih signing initrd/cmdline on calls with you before.

> Item 3 is a problem. Grub is highly configurable, via grub.conf, and
> its contents are tuned for each install.
>
> This is a really challenging eventlog when trying to validate the PCR
> state is matching some expected "known good" state. Given a single
> grub.conf, you get both a huge number of entries for every boot, plus
> a combinatorial expansion of possible entries that would be considered
> valid for a given install over time as kernels and/or grub itself are
> updated. A tiny change to the way grub2-mkconfig could result in a
> very different PCR eventlog, but which is semantically identical to
> what came before.
>
> Thus any attempt to validate the the grub.conf PCR eventlog, as it
> exists in typical distro deployments today, is going to be both
> complex and fragile, which is a bad combination.

But this is only a problem if you're assuming grub2-mkconfig is
nondeterministic, which just isn't the case.  I'll grant that the event
log isn't terse, but what's valid isn't be hard to precompute.  On
generally identical systems, what will differ is uuids and partition
numbers... which is important information to have logged for booting
because it's part of recording *what* was booted.

Glibly, if you don't want a config change, don't run grub2-mkconfig :)
We don't run mkconfig on the system after install because it doesn't
change - it only get run to change something.  And if you update
configuration, you'd want to know that things changed - that's the whole
point of logging it.

Be well,
--Robbie


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Re: Should we retire weechat from EPEL 7?

2022-10-06 Thread Maxwell G via epel-devel
On Thu Oct 6, 2022 at 19:11 +0200, Neal Gompa wrote:
> The cmake3 package has all the macros from the mainline cmake package in 
> Fedora.
>
> It should be fully compatible, just swap %cmake_* for %cmake3_*.

Oops, I responded before I saw this.

--
Maxwell G (@gotmax23)
Pronouns: He/Him/His


signature.asc
Description: PGP signature
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Re: Should we retire weechat from EPEL 7?

2022-10-06 Thread Maxwell G via epel-devel
On Thu Oct 6, 2022 at 12:02 CDT, Michel Alexandre Salim wrote:
> I'm not sure either Paul or myself really care enough about EL7 to
> maintain a divergent spec.

The %cmake3* macros work everywhere.

--
Maxwell G (@gotmax23)
Pronouns: He/Him/His


signature.asc
Description: PGP signature
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Re: Should we retire weechat from EPEL 7?

2022-10-06 Thread Neal Gompa
On Thu, Oct 6, 2022 at 7:03 PM Michel Alexandre Salim
 wrote:
>
> Hi all,
>
> We should probably retire weechat from EPEL 7 - it has multiple CVEs
> that can only be fixed by updating to versions >= 3.5, but the spec no
> longer works on EPEL 7 thanks to macros like `%cmake_build` not being
> available.
>
> https://bugz.fedoraproject.org/weechat
>
> I'm not sure either Paul or myself really care enough about EL7 to
> maintain a divergent spec. If someone does still care, PR appreciated to
> fix this, otherwise consider this the first notice that I'll retire this
> branch in a few days.
>

The cmake3 package has all the macros from the mainline cmake package in Fedora.

It should be fully compatible, just swap %cmake_* for %cmake3_*.



-- 
真実はいつも一つ!/ Always, there's only one truth!
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Should we retire weechat from EPEL 7?

2022-10-06 Thread Michel Alexandre Salim
Hi all,

We should probably retire weechat from EPEL 7 - it has multiple CVEs
that can only be fixed by updating to versions >= 3.5, but the spec no
longer works on EPEL 7 thanks to macros like `%cmake_build` not being
available.

https://bugz.fedoraproject.org/weechat

I'm not sure either Paul or myself really care enough about EL7 to
maintain a divergent spec. If someone does still care, PR appreciated to
fix this, otherwise consider this the first notice that I'll retire this
branch in a few days.

Best regards,

-- 
Michel Alexandre Salim
identities: https://keyoxide.org/5dce2e7e9c3b1cffd335c1d78b229d2f7ccc04f2


signature.asc
Description: PGP signature
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Grub menu with 3 kernels by default

2022-10-06 Thread Daniel P . Berrangé
On Thu, Oct 06, 2022 at 10:45:40AM -0400, Robbie Harwood wrote:
> Daniel P. Berrangé  writes:
> 
> > The way grub has to write its entire grub.conf into the TPM PCRs is
> > totally impractical for anyone wishing to maintain attestation
> > policies to verify the OS boot state from the TPM eventlog.
> 
> So this has been mentioned in several places, but no one in grub
> development has actually seen this problem articulated out, which makes
> me worry that it's spreading FUD.  Could you write up a bug report or
> something concrete?

I've not filed a bug report, as to I tended to view it as an inherant
result of the goals of grub to be a flexible  boot
environment. Let me try to explain in more detail here though...


Right now the default way more or less any Linux distro does SecureBoot
is not too useful, since only the kernel is signed by the vendor. The
content of both the initrd and cmdline is local to the installation.
Mostly I'd say it solves the problem of enabling a Linux distro to boot
in an environment where SecureBoot is active.  It doesn't solve the
problem of enabling the booted OS to be verified, or at least not in a
manner that is practical to use for unknowledable users.

Despite this we still have functionality that can tie LUKS volume key
unlock to the state of a specific set of TPM PCRs, such disks are
unlocked if-and-only-if the OS is launched in the expected configuration.
This is only secure, if everything that can influence the configuration
is covered by the PCRs we're using for unlock policy. 

We need PCRs to cover at minimum

  1. Machine firmware
  2. Bootloader(s)
  3. Bootloader configuration
  4. Booted kernel
  5. Booted initrd
  6. Booted cmdline

Item 1 is OK-ish. It won't change unless you upgrade your firmware,
so is relatively stable, though fwupd has made this more dynamic
than in the past.

Items 2 & 4 are OK because Microsoft signs shim, and the OS vendor
signs grub and their kernels. So we can rely on the fact that if
SecureBoot is signalled enabled by the relevant PCR, the bootloaders(s)
& kernel are trusted (within scope of the SecureBoot keys that are
enrolled).

Item 5 and 6 are a problem, because as mentioned thse are not signed
by the OS vendor with their secureboot key. The PCRs reflect their
contents, but the expected PCR digests will change any time the
initrd/cmdline are updated, meaning the LUKS keys needs to be
re-sealed. One practical approach to this problem is to use 
prebuilt unified kernel images, such that the OS vendor's secureboot
signature covers the kernel,initrd and cmdline. Verification now
merely involves checking the PCR for SecureBOot state. The flipside
is that we loose flexibility that exists today with per-host
generated initrd/cmdline. This may matter for some scenarios (bare
metal) but not for others (most VMs).



Item 3 is a problem. Grub is highly configurable, via grub.conf, and
its contents are tuned for each install. We need to validate any
parts of grub.conf that applied to the current boot state. On a fairly
typical VM the PCR eventlog recording the bootloader configuration
contains something that looks similarish to:

  (hd0,gpt15)/EFI/ubuntu/grub.cfg
  grub_cmd: search.fs_uuid c73d8355-1ac9-41b4-8edf-c1c1a9d5bd6a root
  grub_cmd: set prefix=(hd0,gpt1)/boot/grub
  (hd0,gpt1)/boot/grub/x86_64-efi/command.lst
  (hd0,gpt1)/boot/grub/x86_64-efi/fs.lst
  (hd0,gpt1)/boot/grub/x86_64-efi/crypto.lst
  (hd0,gpt1)/boot/grub/x86_64-efi/terminal.lst
  grub_cmd: configfile (hd0,gpt1)/boot/grub/grub.cfg
  (hd0,gpt1)/boot/grub/grub.cfg
  grub_cmd: [ -s (hd0,gpt1)/boot/grub/grubenv ]
  (hd0,gpt1)/boot/grub/grubenv
  grub_cmd: set have_grubenv=true
  grub_cmd: load_env
  (hd0,gpt1)/boot/grub/grubenv
  grub_cmd: [  = 2 ]
  grub_cmd: [  = 1 ]
  grub_cmd: [  ]
  grub_cmd: set default=0
  grub_cmd: [ xy = xy ]
  grub_cmd: menuentry_id_option=--id
  grub_cmd: export menuentry_id_option
  grub_cmd: [  ]
  grub_cmd: terminal_input console
  grub_cmd: terminal_output console
  grub_cmd: [  = 1 ]
  grub_cmd: [ xy = xy ]
  grub_cmd: set timeout_style=hidden
  grub_cmd: set timeout=0.1
  grub_cmd: [ -n true ]
  grub_cmd: [ -n  ]
  grub_cmd: set initrdless_boot_fallback_triggered=0
  grub_cmd: save_env initrdless_boot_fallback_triggered
  grub_cmd: set menu_color_normal=white/black
  grub_cmd: set menu_color_highlight=black/light-gray
  grub_cmd: set partuuid=bf817bdf-6a3a-4221-8edb-2c1ca7c5537f
  grub_cmd: [  != 1 ]
  grub_cmd: [ -e (hd0,gpt1)/boot/grub/gfxblacklist.txt ]
  grub_cmd: hwmatch (hd0,gpt1)/boot/grub/gfxblacklist.txt 3
  grub_cmd: [ = 0 ]
  grub_cmd: set linux_gfx_mode=keep
  grub_cmd: export linux_gfx_mode
  grub_cmd: menuentry Ubuntu --class ubuntu --class gnu-linux --class gnu 
--class os --id gnulinux-simple-c73d8355-1ac9-41b4-8edf-c1c1a9d5bd6a {
if [ 

[EPEL-devel] Re: Proposal: Dropping modules from EPEL-8. Not adding modules to EPEL-9

2022-10-06 Thread Stephen Smoogen
On Wed, 31 Aug 2022 at 17:08, Stephen Smoogen  wrote:

>
> When EPEL-8 was launched, it came with some support for modules with the
> hope that a module ecosystem could be built from Fedora packages using RHEL
> modules as an underlying tool. This has never happened and we have ended up
> with a muddle of modular packages which will 'build' but may not install or
> even run on an EL-8 system. Attempts to fix this and work within how EPEL
> is normally built have been tried for several years by different people but
> have not worked.
>
> At this point it is time to say this experiment with modules in EPEL has
> not worked and focus resources on what does work. I would like to propose
> that modular support is removed from EPEL by January 2023.
>
> Steps:
> 1. Approval of this proposal by the EPEL Steering committee and any other
> ones required.
> 2. Announcement of end of life to various lists.
> 3. Archiving of the modules on XYZ date to
> /pub/archive/epel/8.-MM/Modular and pointing mirrormanager to that for
> that
> 4. Make changes in bodhi to turn off reporting about modules for EL8.
> 5. Make changes in MBS configs to turn off building modules for EL8.
> 6. Make changes in PDC for EL8 modules
> 7. Make changes in compose scripts and tools to no longer cover EPEL-8
> modules
> 8. Remove epel-8 modules from /pub/epel/8
> 9. Announce closure of this proposal and any lessons learned.
>
>
Due to the year end freezes that many Enterprise consumers are starting, I
would like to propose the change to the timeline

2b. Make changes to epel-release so that EPEL modular is no longer turned
on by default with README.
2c. Document configuration changes that would be needed for sites mirroring
using Enterprise patch management systems.
3a. Start regular Archiving of the modules on XYZ date to
/pub/archive/epel/8
3b. and pointing mirrormanager to that for that

We can do steps up to 3a. and then start on 3b and other items after
February 1st 2023.

-- 
Stephen Smoogen, Red Hat Automotive
Let us be kind to one another, for most of us are fighting a hard battle.
-- Ian MacClaren
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Fedora EPEL 9 updates-testing report

2022-10-06 Thread updates
The following Fedora EPEL 9 Security updates need testing:
 Age  URL
   4  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-1ee1fe2c17   
libopenmpt-0.6.6-1.el9


The following builds have been pushed to Fedora EPEL 9 updates-testing

gnome-shell-extension-appindicator-46-1.el9
ioping-1.3-1.el9
weechat-3.6-1.el9

Details about builds:



 gnome-shell-extension-appindicator-46-1.el9 (FEDORA-EPEL-2022-2531c94250)
 AppIndicator/KStatusNotifierItem support for GNOME Shell

Update Information:

Update to latest version

ChangeLog:

* Fri Sep 30 2022 Artem Polishchuk  46-1
- chore(update): 46
* Thu Sep 29 2022 Artem Polishchuk  45-1
- chore(update): 45




 ioping-1.3-1.el9 (FEDORA-EPEL-2022-43ac9fb3fb)
 Simple disk I/O latency monitoring tool

Update Information:

ioping lets you monitor I/O latency in real time. It shows disk latency in  the
same way as ping shows network latency

ChangeLog:

* Thu Oct  6 2022 Robin Lee  1.3-1
- Update to 1.3
* Thu Jul 21 2022 Fedora Release Engineering  - 1.1-9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
* Thu Jan 20 2022 Fedora Release Engineering  - 1.1-8
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
* Thu Jul 22 2021 Fedora Release Engineering  - 1.1-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
* Tue Jan 26 2021 Fedora Release Engineering  - 1.1-6
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild

References:

  [ 1 ] Bug #2132428 - Please branch and build ioping in epel9
https://bugzilla.redhat.com/show_bug.cgi?id=2132428




 weechat-3.6-1.el9 (FEDORA-EPEL-2022-1c6c522b07)
 Portable, fast, light and extensible IRC client

Update Information:

- add command "/item" to create custom bar items - add bar item "spacer" - add
case conversion in evaluation of expressions with "lower:string" and
"upper:string" - move detailed list of hooks from command "/plugin listfull" to
"/debug hooks " - allow to remove multiple filters at once with command "/filter
del" - allow to catch multiple signals in functions hook_signal and hook_hsignal
- rename option "save" to "apply" in IRC command "/autojoin" - add support of
RPL_HELPSTART, RPL_HELPTXT and RPL_ENDOFHELP (IRC messages 524, 704, 705, 706) -
add support of PHP 8.2 - many bugs fixed.

ChangeLog:

* Wed Oct  5 2022 Michel Alexandre Salim  3.6-1
- Update to 3.6

References:

  [ 1 ] Bug #2063856 - weechat: SSL verification vulnerability [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2063856
  [ 2 ] Bug #2128160 - New version of weechat available 3.6
https://bugzilla.redhat.com/show_bug.cgi?id=2128160


___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Re: EPEL 8 Modules get the axe on Halloween 2022

2022-10-06 Thread Troy Dawson
On Wed, Sep 28, 2022 at 3:09 PM Troy Dawson  wrote:

> When EPEL-8 was launched, it came with some support for modules with the
> hope that a module ecosystem could be built from Fedora packages using RHEL
> modules as an underlying tool. This has never happened and we have ended up
> with a muddle of modular packages which will 'build' but may not install or
> even run on an EL-8 system. Attempts to fix this and work within how EPEL
> is normally built have been tried for several years by different people but
> have not worked.
>
> At this point we are saying that this experiment with modules in EPEL has
> not worked and we will focus our resources on what does work.
>
> Schedule of EPEL 8 Module Retirement:
> Next Week:
> - epel-release will be updated.
> -- epel-modular will set enabled = 0
> -- epel-modular full name will have "Deprecated" in it
>
> October 31 2022:
> - The EPEL 8 modules will be archived and removed.
> -- The mirror manager will be pointed to the archive.
> - Packagers will no longer be able to build EPEL 8 modules.
>
> After October 31st (Actual date to be determined):
> - epel-release will be updated again.
> -- epel-modular repo configs will be removed.
>
> Questions and Answers:
>
> Question: Will I still be able to access the modules after October 31st?
> Answer: It is not recommended, because the modules will not get any
> security or bug fixes, but yes.  They will be in the Fedora archives,
> and the mirror managers will point at them.
>
> Question: What will you be dressed as on Halloween?
> Answer (Troy): A Penguin
>
> EPEL Steering Committee
>
> [1] - https://pagure.io/epel/issue/198
>

Question: Many Enterprise customers need time for a transition like this.
Can the transition date be pushed back?
Answer:  This will have to be voted on by the EPEL Steering Committee.  The
answer is likely yes, but I won't give a firm answer until it's been
discussed and voted on.
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Fedora EPEL 7 updates-testing report

2022-10-06 Thread updates
The following Fedora EPEL 7 Security updates need testing:
 Age  URL
   4  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-de23d337b0   
libopenmpt-0.6.6-1.el7
   2  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-66467c33ea   
seamonkey-2.53.14-3.el7
   1  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-d8f75949c3   
git-lfs-2.10.0-2.el7


The following builds have been pushed to Fedora EPEL 7 updates-testing

luajit-2.0.5-1.20220913.46e62cd.el7
python3-mod_wsgi-4.7.1-3.el7

Details about builds:



 luajit-2.0.5-1.20220913.46e62cd.el7 (FEDORA-EPEL-2022-f174e47230)
 Just-In-Time Compiler for Lua

Update Information:

- Update to latest snapshot of 2.0 branch - Fixes CVE-2020-15890, resolves
rhbz#1860331 - Fixes CVE-2020-24372, resolves rhbz#1870308

ChangeLog:

* Mon Oct  3 2022 Carl George  - 2.0.5-1.20220914.46e62cd
- Update to latest snapshot of 2.0 branch
- Fixes CVE-2020-15890, resolves rhbz#1860331
- Fixes CVE-2020-24372, resolves rhbz#1870308

References:

  [ 1 ] Bug #1860331 - CVE-2020-15890 luajit: out-of-bounds read because __gc 
handler frame traversal is mishandled [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1860331
  [ 2 ] Bug #1870308 - CVE-2020-24372 luajit: out-of-bounds read in lj_err_run 
function in lj_err.c [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1870308




 python3-mod_wsgi-4.7.1-3.el7 (FEDORA-EPEL-2022-3f600666f9)
 A WSGI interface for Python web applications in Apache

Update Information:

- Backported fix for CVE-2022-2255

ChangeLog:

* Wed Oct  5 2022 Diego Herrera  - 4.7.1-3
- Backported fix for CVE-2022-2255

References:

  [ 1 ] Bug #2108272 - CVE-2022-2255 python3-mod_wsgi: mod_wsgi: Trusted Proxy 
Headers Removing Bypass [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=2108272


___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Grub menu with 3 kernels by default

2022-10-06 Thread Robbie Harwood
Daniel P. Berrangé  writes:

> The way grub has to write its entire grub.conf into the TPM PCRs is
> totally impractical for anyone wishing to maintain attestation
> policies to verify the OS boot state from the TPM eventlog.

So this has been mentioned in several places, but no one in grub
development has actually seen this problem articulated out, which makes
me worry that it's spreading FUD.  Could you write up a bug report or
something concrete?

Be well,
--Robbie


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2132720] Upgrade perl-Test-Unit-Lite to 0.1202

2022-10-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2132720

Paul Howarth  changed:

   What|Removed |Added

 Status|NEW |ASSIGNED



--- Comment #1 from Paul Howarth  ---
The version in Fedora has been 0.1202 since December 2012. However, this is not
reflected in the package version number since at that time I'd expected a
version 0.13 to appear in the future, which wouldn't play well with RPM version
numbering. I think the best thing to do would be to rebuild the package using a
version number of 0.12.02.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2132720
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Has the final freeze for f37 started?

2022-10-06 Thread Tomas Hrcka
Hi, yes the freeze started on the scheduled date and time.
Please create releng ticket with packages that require blocking in koji.

On Thu, Oct 6, 2022 at 3:25 PM Fabio Valentini  wrote:

> Hi all,
>
> I retired some packages from f37 and rawhide on Tuesday and Wednesday,
> but their retirements were no longer processed correctly. After
> looking at the F37 schedule, the Final Freeze for Fedora 37 should
> have started two days ago (14:00 UTC on 2022-10-04), which might
> explain this (at least in part, some packages were retired before
> 14:00 UTC), but right now I can't find an announcement that the freeze
> has actually started.
>
> Should I open a releng ticket to get the affected packages correctly
> retired? Right now they're "retired" in dist-git but not blocked in
> koji etc., and since they're unused and / or broken packages, I'd like
> F37 not to ship with them.
>
> Fabio
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>


-- 
Tomas Hrcka
role: CPE Team - Senior Software Engineer
fas: humaton
freenode: jednorozec
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: DNF5 Blockers

2022-10-06 Thread Fabio Valentini
On Thu, Oct 6, 2022 at 5:11 AM Maxwell G via devel
 wrote:
>
> Some of mine:
>
> - `dnf repoquery` -- Currently, `dnf5 repoquery` nowhere near meets the
>   capabilities of the old version. This is the most important to me.

I agree, repoquery is an absolutely essential tool for me.
Without it, it would be impossible to maintain the number of packages
I do without breaking things left and right twice a week.

At the very least, dnf5-repoquery will need to support the most common
things from "dnf repoquery", otherwise things will be very broken in
many people's packaging automation, release engineering scripts, etc.

> - `dnf system-upgrade`

That also seems to be important ...
Isn't "dnf system-upgrade" the "officially blessed" way of upgrading
from one Fedora release to another on the command line?

I also need "dnf repoclosure" ... without it, I'd need to either
completely reimplement or shut down the service that provides "broken
dependencies" / fails-to-install data for the Fedora Packager
Dashboard.

Fabio
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: DNF5 Blockers

2022-10-06 Thread Tommy Nguyen


On Thu, 2022-10-06 at 13:53 +0100, Richard W.M. Jones wrote:
> On Wed, Oct 05, 2022 at 09:20:47PM -0500, Maxwell G via devel wrote:
> > Hi Fedorians,
> > 
> > I think we should define a more through list of blockers/criteria
> > that
> > dnf5 needs to meet before it can replace the current dnf.
> > 
> > The DNF maintainers have their list of requirements, but it would
> > be
> > helpful for the wider community to test dnf5 and report which
> > currently
> > unimplemented features/usecases would block them from adopting it.
> > Hopefully, the more popular, for lack of a better word, blockers
> > can be
> > incorporated into the Change Proposal or otherwise required by
> > FESCo as
> > a prerequisite for this change. This should help the DNF
> > maintainers
> > prioritize, keep everyone on the same page, and ensure that dnf5
> > doesn't
> > prematurely become the default.
> 
> Is there a way to test it?  This didn't work:
> 
> # dnf install dnf5
> Last metadata expiration check: 0:52:30 ago on Thu 06 Oct 2022
> 13:00:16 BST.
> No match for argument: dnf5
> Error: Unable to find a match: dnf5
> 
> 
> Anyway, as previously mentioned "dnf5 download" should work as for
> dnf, and especially must not require root privileges.
> 
> Rich.
> 
> -- 
> Richard Jones, Virtualization Group, Red Hat
> http://people.redhat.com/~rjones
> Read my programming and virtualization blog:
> http://rwmj.wordpress.com
> virt-top is 'top' for virtual machines.  Tiny program with many
> powerful monitoring features, net stats, disk stats, logging, etc.
> http://people.redhat.com/~rjones/virt-top
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines:
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue

It's in a COPR.

sudo dnf copr enable rpmsoftwaremanagement/dnf5-unstable


signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Has the final freeze for f37 started?

2022-10-06 Thread Fabio Valentini
Hi all,

I retired some packages from f37 and rawhide on Tuesday and Wednesday,
but their retirements were no longer processed correctly. After
looking at the F37 schedule, the Final Freeze for Fedora 37 should
have started two days ago (14:00 UTC on 2022-10-04), which might
explain this (at least in part, some packages were retired before
14:00 UTC), but right now I can't find an announcement that the freeze
has actually started.

Should I open a releng ticket to get the affected packages correctly
retired? Right now they're "retired" in dist-git but not blocked in
koji etc., and since they're unused and / or broken packages, I'd like
F37 not to ship with them.

Fabio
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2132720] New: Upgrade perl-Test-Unit-Lite to 0.1202

2022-10-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2132720

Bug ID: 2132720
   Summary: Upgrade perl-Test-Unit-Lite to 0.1202
   Product: Fedora
   Version: rawhide
   URL: https://metacpan.org/release/Test-Unit-Lite
Status: NEW
 Component: perl-Test-Unit-Lite
  Assignee: p...@city-fan.org
  Reporter: jples...@redhat.com
QA Contact: extras...@fedoraproject.org
CC: p...@city-fan.org, perl-devel@lists.fedoraproject.org
  Target Milestone: ---
Classification: Fedora



Latest Fedora delivers 0.12 version. Upstream released 0.1202. When you have
free time, please upgrade it.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2132720
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: When is a file dependency appropriate?

2022-10-06 Thread Kalev Lember
On Thu, Oct 6, 2022 at 2:51 PM Vít Ondruch  wrote:

>
> Dne 06. 10. 22 v 14:38 Kalev Lember napsal(a):
>
> On Thu, Oct 6, 2022 at 11:05 AM Vít Ondruch  wrote:
>
>> BTW re-reading the ticket and since there are talks about DNF5, maybe it
>> would be worth of reopening the discussion. I think we could generally
>> do better and I see two options:
>>
>> 1) There seems to be a way to download additional data if needed
>>
>> 2) The metadata we provide in reposotories could be better. I.e. instead
>> of providing full file list, it could be actually enough to collect just
>> the files of the interest. E.g. if there is somewhere `BR:
>> /usr/bin/foo`, then during preparation of repo data, there could be file
>> list with record for bar package, providing entry such as "/usr/bin/foo:
>> bar". This would probably not require any big changes in DNF IMHO.
>>
>
> One problem I have with `BuildRequires: /usr/bin/foo` is that it hardcodes
> the /usr/bin directory, which is the right thing to do when the program
> that uses foo invokes it with full /usr/bin/foo path, but not at all when
> foo is searched from PATH.
>
>
> * I don't think that PATH plays a role here, because otherwise we will be
> back to discussion if and when we should use `env` in shebangs or not.
>
> * We had this issue for SCLs before and I think there are some proposals
> such as:
>
> https://github.com/rpm-software-management/rpm/issues/721
>
> https://github.com/rpm-software-management/rpm/issues/1850
>

Thanks!

This has been a bit of a pain point for flatpak builds in Fedora where the
> rpms are rebuilt for /app prefix. If a package that has `BuildRequires:
> /usr/bin/foo` but the package that provides foo is rebuilt for /app prefix,
> then we no longer have /usr/bin/foo but instead /app/bin/foo and the BR no
> longer finds the package providing foo. Using %{_bindir} doesn't help
> either because not all packages that are used for flatpaks are rebuilt for
> /app (some are part of the flatpak runtime and stay in /usr).
>
> Maybe it would instead make sense to have an abstraction where instead of
> listing /usr/bin/foo in the repo data, we'd have 'Provides:
> executable(foo)' and then other packages could do 'BuildRequires:
> executable(foo)' instead? That would nicely solve the hardcoded path issue.
>
>
> Not sure I like it or not (I would need to give it more thought), but if
> it was autogenerated 
>

Yes, of course autogenerated, anything else would be crazy :) I'll need to
give this some more thought myself, it was just a quick idea I got when
reading this.

I guess a transition plan (if we make up our minds that it makes sense to
do it) could be to first make sure the provides are autogenerated, then do
a mass rebuild, let people try it out in their packages for 6 months, and
then provenpackager-edit all of Requires/BuildRequires: /usr/bin/foo in the
distro to the new format as at that point all of supported Fedora releases
are going to have the provides.

After that, all of /usr/bin provides can be removed from the primary repo
metadata (maybe after 6 more months to give time for 3rd party repos to
catch up) and kept only in the extra filelists metadata.

-- 
Kalev
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2132717] New: Upgrade perl-Net-DNS-SEC to 1.20

2022-10-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2132717

Bug ID: 2132717
   Summary: Upgrade perl-Net-DNS-SEC to 1.20
   Product: Fedora
   Version: rawhide
   URL: https://metacpan.org/release/Net-DNS-SEC
Status: NEW
 Component: perl-Net-DNS-SEC
  Assignee: wjhns...@hardakers.net
  Reporter: jples...@redhat.com
QA Contact: extras...@fedoraproject.org
CC: paul.wout...@aiven.io,
perl-devel@lists.fedoraproject.org,
wjhns...@hardakers.net
  Target Milestone: ---
Classification: Fedora



Latest Fedora delivers 1.19 version. Upstream released 1.20. When you have free
time, please upgrade it.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2132717
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2132704] New: Upgrade perl-Image-Info to 1.43

2022-10-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2132704

Bug ID: 2132704
   Summary: Upgrade perl-Image-Info to 1.43
   Product: Fedora
   Version: rawhide
   URL: https://metacpan.org/release/Image-Info
Status: NEW
 Component: perl-Image-Info
  Assignee: spo...@gmail.com
  Reporter: jples...@redhat.com
QA Contact: extras...@fedoraproject.org
CC: jose.p.oliveira@gmail.com,
perl-devel@lists.fedoraproject.org,
rob.my...@gtri.gatech.edu, spo...@gmail.com,
xav...@bachelot.org
  Target Milestone: ---
Classification: Fedora



Latest Fedora delivers 1.42 version. Upstream released 1.43. When you have free
time, please upgrade it.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2132704
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 1937653] Upgrade perl-HTTP-OAI to 4.12

2022-10-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1937653

Jitka Plesnikova  changed:

   What|Removed |Added

Summary|Upgrade perl-HTTP-OAI to|Upgrade perl-HTTP-OAI to
   |4.2 |4.12




-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1937653
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: DNF5 Blockers

2022-10-06 Thread Richard W.M. Jones
On Wed, Oct 05, 2022 at 09:20:47PM -0500, Maxwell G via devel wrote:
> Hi Fedorians,
> 
> I think we should define a more through list of blockers/criteria that
> dnf5 needs to meet before it can replace the current dnf.
> 
> The DNF maintainers have their list of requirements, but it would be
> helpful for the wider community to test dnf5 and report which currently
> unimplemented features/usecases would block them from adopting it.
> Hopefully, the more popular, for lack of a better word, blockers can be
> incorporated into the Change Proposal or otherwise required by FESCo as
> a prerequisite for this change. This should help the DNF maintainers
> prioritize, keep everyone on the same page, and ensure that dnf5 doesn't
> prematurely become the default.

Is there a way to test it?  This didn't work:

# dnf install dnf5
Last metadata expiration check: 0:52:30 ago on Thu 06 Oct 2022 13:00:16 BST.
No match for argument: dnf5
Error: Unable to find a match: dnf5


Anyway, as previously mentioned "dnf5 download" should work as for
dnf, and especially must not require root privileges.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-top is 'top' for virtual machines.  Tiny program with many
powerful monitoring features, net stats, disk stats, logging, etc.
http://people.redhat.com/~rjones/virt-top
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: When is a file dependency appropriate?

2022-10-06 Thread Vít Ondruch


Dne 06. 10. 22 v 14:38 Kalev Lember napsal(a):

On Thu, Oct 6, 2022 at 11:05 AM Vít Ondruch  wrote:

BTW re-reading the ticket and since there are talks about DNF5,
maybe it
would be worth of reopening the discussion. I think we could
generally
do better and I see two options:

1) There seems to be a way to download additional data if needed

2) The metadata we provide in reposotories could be better. I.e.
instead
of providing full file list, it could be actually enough to
collect just
the files of the interest. E.g. if there is somewhere `BR:
/usr/bin/foo`, then during preparation of repo data, there could
be file
list with record for bar package, providing entry such as
"/usr/bin/foo:
bar". This would probably not require any big changes in DNF IMHO.


One problem I have with `BuildRequires: /usr/bin/foo` is that it 
hardcodes the /usr/bin directory, which is the right thing to do when 
the program that uses foo invokes it with full /usr/bin/foo path, but 
not at all when foo is searched from PATH.



* I don't think that PATH plays a role here, because otherwise we will 
be back to discussion if and when we should use `env` in shebangs or not.


* We had this issue for SCLs before and I think there are some proposals 
such as:


https://github.com/rpm-software-management/rpm/issues/721

https://github.com/rpm-software-management/rpm/issues/1850




This has been a bit of a pain point for flatpak builds in Fedora where 
the rpms are rebuilt for /app prefix. If a package that has 
`BuildRequires: /usr/bin/foo` but the package that provides foo is 
rebuilt for /app prefix, then we no longer have /usr/bin/foo but 
instead /app/bin/foo and the BR no longer finds the package providing 
foo. Using %{_bindir} doesn't help either because not all packages 
that are used for flatpaks are rebuilt for /app (some are part of the 
flatpak runtime and stay in /usr).


Maybe it would instead make sense to have an abstraction where instead 
of listing /usr/bin/foo in the repo data, we'd have 'Provides: 
executable(foo)' and then other packages could do 'BuildRequires: 
executable(foo)' instead? That would nicely solve the hardcoded path 
issue.



Not sure I like it or not (I would need to give it more thought), but if 
it was autogenerated 



Vít




--
Kalev

___
devel mailing list --devel@lists.fedoraproject.org
To unsubscribe send an email todevel-le...@lists.fedoraproject.org
Fedora Code of 
Conduct:https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines:https://fedoraproject.org/wiki/Mailing_list_guidelines
List 
Archives:https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report 
it:https://pagure.io/fedora-infrastructure/new_issue


OpenPGP_signature
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: When is a file dependency appropriate?

2022-10-06 Thread Kalev Lember
On Thu, Oct 6, 2022 at 11:05 AM Vít Ondruch  wrote:

> BTW re-reading the ticket and since there are talks about DNF5, maybe it
> would be worth of reopening the discussion. I think we could generally
> do better and I see two options:
>
> 1) There seems to be a way to download additional data if needed
>
> 2) The metadata we provide in reposotories could be better. I.e. instead
> of providing full file list, it could be actually enough to collect just
> the files of the interest. E.g. if there is somewhere `BR:
> /usr/bin/foo`, then during preparation of repo data, there could be file
> list with record for bar package, providing entry such as "/usr/bin/foo:
> bar". This would probably not require any big changes in DNF IMHO.
>

One problem I have with `BuildRequires: /usr/bin/foo` is that it hardcodes
the /usr/bin directory, which is the right thing to do when the program
that uses foo invokes it with full /usr/bin/foo path, but not at all when
foo is searched from PATH.

This has been a bit of a pain point for flatpak builds in Fedora where the
rpms are rebuilt for /app prefix. If a package that has `BuildRequires:
/usr/bin/foo` but the package that provides foo is rebuilt for /app prefix,
then we no longer have /usr/bin/foo but instead /app/bin/foo and the BR no
longer finds the package providing foo. Using %{_bindir} doesn't help
either because not all packages that are used for flatpaks are rebuilt for
/app (some are part of the flatpak runtime and stay in /usr).

Maybe it would instead make sense to have an abstraction where instead of
listing /usr/bin/foo in the repo data, we'd have 'Provides:
executable(foo)' and then other packages could do 'BuildRequires:
executable(foo)' instead? That would nicely solve the hardcoded path issue.

-- 
Kalev
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: When is a file dependency appropriate?

2022-10-06 Thread Vít Ondruch


Dne 06. 10. 22 v 14:18 Panu Matilainen napsal(a):

On 10/6/22 11:55, Vít Ondruch wrote:


Dne 06. 10. 22 v 9:18 Otto Liljalaakso napsal(a):

Miro Hrončok kirjoitti 6.10.2022 klo 2.33:

On 06. 10. 22 1:21, Otto Liljalaakso wrote:
Recently, I have run into some cases where file dependencies like 
Requires: /usr/bin/foo are used.


In a recent thread on this mailing list [1],
it is mentioned that such Requires should be avoided,
because resolving file dependencies requires a large amount of 
memory.


I don't believe that resolving file-Requires from directories 
listed at [2] from your email is more memory hungry. Where exactly 
was that said?
[1]: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/CRREDQUPPJYWVRMA4DOKYU2KZZLKC4D5/
[2]: 
https://docs.fedoraproject.org/en-US/packaging-guidelines/#_file_and_directory_dependencies 





Maybe I should have re-read the thread closely before posting,
because the most relevant message is this [3]:

"
The discussion in the bug indicates that this memory growth is 
related to

loading of the full filepath dataset. We have been discussing splitting
out the non-primary-filepath-data (i.e. paths that are not /etc, 
/usr/bin,

/usr/sbin), out into a separate lazilly-loaded file. If we manage to do
that, we'll kill two birds with one stone:

- initial download of repo metadata on every freakin' dnf operation can
  go down from 80 to 20 MB
- the peak memory use will go down
"

Which exactly confirms what you say.

I am still wondering a bit if there is something else bad about file 
dependencies?



If I am not mistaken, in the YUM days, the file list was split into 
two parts. One list contained several high profile directories such 
as /usr/bin [1] while the other contained everything. By default YUM 
have not loaded the full file list by default, just the short one. 
The data were not loaded by default. But AFAIK, DNF always loads 
everything and it does not look that this would change. This is one 
BZ which comes to my mind for a reference: 
https://bugzilla.redhat.com/show_bug.cgi?id=968006


IOW for your example, the file dependency was always supported (and 
IMO preferable). It probably does not matter these days, unless you 
really consider memory consumption (and I don't think we should 
generally avoid the file dependencies just on the base of memory 
consumption).


In the yum days, certain locations of the file list, such as /usr/bin 
were embedded in the main data. They're still there, look for  
entries in primary.xml.



This is good point. I have already forget the details. So if there was 
embedded just the right amount of information in the main data, we would 
not need the full list (and lazy loading). Currently, the data contains 
e.g. /usr/bin/*, which is useful for installing `/usr/bin/foo`. But we 
know that in the repository, there is RPM with `Requires: 
/some/strange/path`. Therefore during creating the repository metadata, 
we could look for RPM providing this path and include it into the main 
metadata. This would blow the metadata a bit, but it would allow to not 
care about the full file list at all. Of course that would mean `dnf 
install /some/random/path` won't work universally, but 1) I don't think 
this is widely used for random stuff 2) it is easy to detect and 
download the full file list instead if needed.


Should I open request against createrepo_c?


Vít




I don't know if libsolv/dnf look at that data at all, the architecture 
is so drastically different compared to yum that the seemingly obvious 
lazy loading may well be very very difficult to achieve. I remember 
that being the case with apt-rpm (if anybody remembers *that* old 
beast) whose operational model was closer to libsolv than yum.


- Panu -

- Panu -


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


OpenPGP_signature
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Fedora 37 compose report: 20221006.n.0 changes

2022-10-06 Thread Fedora Rawhide Report
OLD: Fedora-37-20221005.n.0
NEW: Fedora-37-20221006.n.0

= SUMMARY =
Added images:1
Dropped images:  0
Added packages:  0
Dropped packages:0
Upgraded packages:   0
Downgraded packages: 0

Size of added packages:  0 B
Size of dropped packages:0 B
Size of upgraded packages:   0 B
Size of downgraded packages: 0 B

Size change of upgraded packages:   0 B
Size change of downgraded packages: 0 B

= ADDED IMAGES =
Image: Container_Base docker aarch64
Path: 
Container/aarch64/images/Fedora-Container-Base-37-20221006.n.0.aarch64.tar.xz

= DROPPED IMAGES =

= ADDED PACKAGES =

= DROPPED PACKAGES =

= UPGRADED PACKAGES =

= DOWNGRADED PACKAGES =
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: When is a file dependency appropriate?

2022-10-06 Thread Panu Matilainen

On 10/6/22 11:55, Vít Ondruch wrote:


Dne 06. 10. 22 v 9:18 Otto Liljalaakso napsal(a):

Miro Hrončok kirjoitti 6.10.2022 klo 2.33:

On 06. 10. 22 1:21, Otto Liljalaakso wrote:
Recently, I have run into some cases where file dependencies like 
Requires: /usr/bin/foo are used.


In a recent thread on this mailing list [1],
it is mentioned that such Requires should be avoided,
because resolving file dependencies requires a large amount of memory.


I don't believe that resolving file-Requires from directories listed 
at [2] from your email is more memory hungry. Where exactly was that 
said?
[1]: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/CRREDQUPPJYWVRMA4DOKYU2KZZLKC4D5/
[2]: 
https://docs.fedoraproject.org/en-US/packaging-guidelines/#_file_and_directory_dependencies 




Maybe I should have re-read the thread closely before posting,
because the most relevant message is this [3]:

"
The discussion in the bug indicates that this memory growth is related to
loading of the full filepath dataset. We have been discussing splitting
out the non-primary-filepath-data (i.e. paths that are not /etc, 
/usr/bin,

/usr/sbin), out into a separate lazilly-loaded file. If we manage to do
that, we'll kill two birds with one stone:

- initial download of repo metadata on every freakin' dnf operation can
  go down from 80 to 20 MB
- the peak memory use will go down
"

Which exactly confirms what you say.

I am still wondering a bit if there is something else bad about file 
dependencies?



If I am not mistaken, in the YUM days, the file list was split into two 
parts. One list contained several high profile directories such as 
/usr/bin [1] while the other contained everything. By default YUM have 
not loaded the full file list by default, just the short one. The data 
were not loaded by default. But AFAIK, DNF always loads everything and 
it does not look that this would change. This is one BZ which comes to 
my mind for a reference: https://bugzilla.redhat.com/show_bug.cgi?id=968006


IOW for your example, the file dependency was always supported (and IMO 
preferable). It probably does not matter these days, unless you really 
consider memory consumption (and I don't think we should generally avoid 
the file dependencies just on the base of memory consumption).


In the yum days, certain locations of the file list, such as /usr/bin 
were embedded in the main data. They're still there, look for  
entries in primary.xml.


I don't know if libsolv/dnf look at that data at all, the architecture 
is so drastically different compared to yum that the seemingly obvious 
lazy loading may well be very very difficult to achieve. I remember that 
being the case with apt-rpm (if anybody remembers *that* old beast) 
whose operational model was closer to libsolv than yum.


- Panu -

- Panu -


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Fedocal] Reminder meeting : ELN SIG

2022-10-06 Thread sgallagh
Dear all,

You are kindly invited to the meeting:
   ELN SIG on 2022-10-07 from 12:00:00 to 13:00:00 US/Eastern
   At fedora-meet...@irc.libera.chat

The meeting will be about:



Source: https://calendar.fedoraproject.org//meeting/10133/

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Fedora rawhide compose report: 20221006.n.0 changes

2022-10-06 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20221005.n.0
NEW: Fedora-Rawhide-20221006.n.0

= SUMMARY =
Added images:1
Dropped images:  0
Added packages:  4
Dropped packages:6
Upgraded packages:   194
Downgraded packages: 0

Size of added packages:  4.11 MiB
Size of dropped packages:1.06 MiB
Size of upgraded packages:   2.29 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   10.73 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =
Image: Server_KVM qcow2 s390x
Path: Server/s390x/images/Fedora-Server-KVM-Rawhide-20221006.n.0.s390x.qcow2

= DROPPED IMAGES =

= ADDED PACKAGES =
Package: QXlsx-1.4.4-2.fc38
Summary: Excel/XLSX file reader/writer library for Qt
RPMs:QXlsx QXlsx-devel
Size:1.42 MiB

Package: iir1-1.9.3-1.fc38
Summary: DSP IIR Realtime C++ filter library
RPMs:iir1 iir1-devel iir1-devel-doc
Size:1.25 MiB

Package: pageedit-1.9.20-1.fc38
Summary: ePub visual XHTML editor
RPMs:pageedit
Size:1.24 MiB

Package: pstreams-devel-1.0.3-6.fc38
Summary: POSIX Process Control in C++
RPMs:pstreams-devel pstreams-doc
Size:209.43 KiB


= DROPPED PACKAGES =
Package: libcxxabi-15.0.0-2.fc38
Summary: Low level support for a standard C++ library
RPMs:libcxxabi libcxxabi-devel libcxxabi-static
Size:898.61 KiB

Package: perl-Type-Tie-0.015-9.fc37
Summary: Tie a variable to a type constraint
RPMs:perl-Type-Tie
Size:28.68 KiB

Package: php-firephp-firephp-core-0.5.3-1.fc36
Summary: Minimal library for sending PHP variables to browsers
RPMs:php-firephp-firephp-core
Size:27.42 KiB

Package: rust-enum-as-inner0.3-0.3.4-2.fc37
Summary: Proc-macro for deriving inner field accessor functions on enums
RPMs:rust-enum-as-inner0.3+default-devel rust-enum-as-inner0.3-devel
Size:27.10 KiB

Package: rust-phf_shared0.7-0.7.24-6.fc37
Summary: Support code shared by PHF libraries
RPMs:rust-phf_shared0.7+core-devel rust-phf_shared0.7+default-devel 
rust-phf_shared0.7+unicase-devel rust-phf_shared0.7-devel
Size:33.62 KiB

Package: rust-socket2_0.3-0.3.19-4.fc37
Summary: Utilities for handling networking sockets
RPMs:rust-socket2_0.3+default-devel rust-socket2_0.3+pair-devel 
rust-socket2_0.3+reuseport-devel rust-socket2_0.3+unix-devel 
rust-socket2_0.3-devel
Size:71.97 KiB


= UPGRADED PACKAGES =
Package:  ClanLib-2.3.7-27.fc38
Old package:  ClanLib-2.3.7-26.fc37
Summary:  Cross platform C++ game library
RPMs: ClanLib ClanLib-devel
Size: 462.84 MiB
Size change:  -46.97 KiB
Changelog:
  * Wed Oct 05 2022 Hans de Goede  - 2.3.7-27
  - Stop building clanRegExp lib, pcre1 is no longer maintained (rhbz#2128277)


Package:  avocado-vt-82.0-3.module_f38+15479+30bb558c
Old package:  avocado-vt-82.0-3.module_f38+15459+2a10b5c5
Summary:  Avocado Virt Test Plugin
RPMs: python3-avocado-vt
Size: 8.70 MiB
Size change:  4 B

Package:  azure-cli-2.40.0-2.fc38
Old package:  azure-cli-2.40.0-1.fc38
Summary:  Microsoft Azure Command-Line Tools
RPMs: azure-cli python3-azure-cli-core python3-azure-cli-telemetry 
python3-azure-cli-testsdk
Size: 6.44 MiB
Size change:  426 B
Changelog:
  * Wed Oct 05 2022 Major Hayden  2.40.0-2
  - Add subparser patch


Package:  bash-5.2.0-2.fc38
Old package:  bash-5.1.16-4.fc38
Summary:  The GNU Bourne Again shell
RPMs: bash bash-devel bash-doc
Size: 13.43 MiB
Size change:  903.22 KiB
Changelog:
  * Tue Oct 04 2022 Siteshwar Vashisht  - 5.2.0-1
  - Update to bash-5.2
Resolves: #2129927

  * Wed Oct 05 2022 Siteshwar Vashisht  - 5.2.0-2
  - Bump version number
Related: #2129927


Package:  catatonit-0.1.7-10.fc38
Old package:  catatonit-0.1.7-7.fc37
Summary:  A signal-forwarding process manager for containers
RPMs: catatonit
Size: 1.43 MiB
Size change:  -962 B
Changelog:
  * Tue Aug 16 2022 Lokesh Mandvekar  0.1.7-8
  - Fix debbuild maintainer issue

  * Wed Aug 17 2022 Lokesh Mandvekar  0.1.7-9
  - use easier tag macros to make both fedora and debbuild happy

  * Wed Oct 05 2022 Lokesh Mandvekar  0.1.7-10
  - remove debbuild macros to comply with Fedora guidelines


Package:  cfn-lint-0.66.1-1.fc38
Old package:  cfn-lint-0.65.1-1.fc38
Summary:  CloudFormation Linter
RPMs: cfn-lint
Size: 2.53 MiB
Size change:  41.89 KiB
Changelog:
  * Wed Oct 05 2022 Benjamin A. Beasley  0.66.1-1
  - Update to 0.66.1 (close RHBZ#2131077)


Package:  chkconfig-1.21-1.fc38
Old package:  chkconfig-1.19-3.fc37
Summary:  A system tool for maintaining the /etc/rc*.d hierarchy
RPMs: alternatives chkconfig ntsysv
Size: 961.31 KiB
Size change:  22.68 KiB
Changelog:
  * Wed Oct 05 2022 Jan Macku  - 1.21-1
  - ci: Add CodeQL to replace LGTM
  - alternatives: replace master/slave with leader/follower
  - chkconfig: use correct cmp function
  - Bump redhat-plumbers-in-action/differential-shellcheck from 2 to 3
  - ci

Re: Grub menu with 3 kernels by default

2022-10-06 Thread Daniel P . Berrangé
On Thu, Oct 06, 2022 at 10:13:58AM +0200, Hans de Goede wrote:
> Hi,
> 
> On 10/5/22 23:07, Chris Murphy wrote:
> > 
> > 
> > On Wed, Oct 5, 2022, at 3:01 PM, Vít Ondruch wrote:
> >>
> >> 3. "Boot menu" in GUI? Given that one can reach the GUI, why it should 
> >> not be possible to choose the boot entry for next boot? Or even choose 
> >> to open FW setup.
> > 
> > This could solve this other problem too.
> > 
> > https://bugzilla.redhat.com/show_bug.cgi?id=2049849
> > 
> > The GUI tool can use efibootmgr to set bootnext or even bootorder.
> 
> Right, this is definitely interesting.
> 
> sdboot already offers some nice features for this.
> 
> bootctl --list: shows available boot menu entries
> systemctl reboot --boot-loader-entry=ID: select which entry to boot
> 
> And I believe that there are also dbus equivalents of this.
> 
> If we want this we should consider either switching
> to sdboot or make grub support:
> https://systemd.io/BOOT_LOADER_INTERFACE/
> 
> And then this is something which could be an upstream GNOME feature
> using the systemd DBUS APIs for this.
> 
> The only problem is that this requires someone to make time to
> work on this...
> 
> I personally believe that for the Fedora workstation case
> it makes sense to just switch to sdboot for EFI installs
> giving us nice features like this; while at the same time
> offering a much simpler code-base then grub, which is
> good from a secureboot POV.

Providing an alternative to the use of grub is inevitable IMHO from a
SecureBoot and/or Confidential virtualization POV. The way grub has
to write its entire grub.conf into the TPM PCRs is totally impractical
for anyone wishing to maintain attestation policies to verify the OS
boot state from the TPM eventlog. sd-boot's usage of TPM PCRs when
combined with unified kernel images is massively simpler & saner to
handle. So at very least I'd see sd-boot being an option alongside
grub, and there's a decent case to be made for it to even be the
default in at least some scenarios.

With regards,
Daniel
-- 
|: https://berrange.com  -o-https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o-https://fstop138.berrange.com :|
|: https://entangle-photo.org-o-https://www.instagram.com/dberrange :|
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Grub menu with 3 kernels by default

2022-10-06 Thread Sandro

On 06-10-2022 10:13, Hans de Goede wrote:

Hi,

On 10/5/22 23:07, Chris Murphy wrote:



On Wed, Oct 5, 2022, at 3:01 PM, Vít Ondruch wrote:


3. "Boot menu" in GUI? Given that one can reach the GUI, why it should
not be possible to choose the boot entry for next boot? Or even choose
to open FW setup.


This could solve this other problem too.

https://bugzilla.redhat.com/show_bug.cgi?id=2049849

The GUI tool can use efibootmgr to set bootnext or even bootorder.


Right, this is definitely interesting.

sdboot already offers some nice features for this.

bootctl --list: shows available boot menu entries
systemctl reboot --boot-loader-entry=ID: select which entry to boot

And I believe that there are also dbus equivalents of this.

If we want this we should consider either switching
to sdboot or make grub support:
https://systemd.io/BOOT_LOADER_INTERFACE/


+1 for making sd-boot the default bootloader on EFI.

I would prefer that to making grub wrap around sd-boot, so to speak. But 
I'm sure there's more to it than simply switching.


-- Sandro
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: When is a file dependency appropriate?

2022-10-06 Thread Vít Ondruch


Dne 06. 10. 22 v 10:55 Vít Ondruch napsal(a):


Dne 06. 10. 22 v 9:18 Otto Liljalaakso napsal(a):

Miro Hrončok kirjoitti 6.10.2022 klo 2.33:

On 06. 10. 22 1:21, Otto Liljalaakso wrote:
Recently, I have run into some cases where file dependencies like 
Requires: /usr/bin/foo are used.


In a recent thread on this mailing list [1],
it is mentioned that such Requires should be avoided,
because resolving file dependencies requires a large amount of memory.


I don't believe that resolving file-Requires from directories listed 
at [2] from your email is more memory hungry. Where exactly was that 
said?
[1]: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/CRREDQUPPJYWVRMA4DOKYU2KZZLKC4D5/
[2]: 
https://docs.fedoraproject.org/en-US/packaging-guidelines/#_file_and_directory_dependencies 





Maybe I should have re-read the thread closely before posting,
because the most relevant message is this [3]:

"
The discussion in the bug indicates that this memory growth is 
related to

loading of the full filepath dataset. We have been discussing splitting
out the non-primary-filepath-data (i.e. paths that are not /etc, 
/usr/bin,

/usr/sbin), out into a separate lazilly-loaded file. If we manage to do
that, we'll kill two birds with one stone:

- initial download of repo metadata on every freakin' dnf operation can
  go down from 80 to 20 MB
- the peak memory use will go down
"

Which exactly confirms what you say.

I am still wondering a bit if there is something else bad about file 
dependencies?



If I am not mistaken, in the YUM days, the file list was split into 
two parts. One list contained several high profile directories such as 
/usr/bin [1] while the other contained everything. By default YUM have 
not loaded the full file list by default, just the short one. The data 
were not loaded by default. But AFAIK, DNF always loads everything and 
it does not look that this would change. This is one BZ which comes to 
my mind for a reference: 
https://bugzilla.redhat.com/show_bug.cgi?id=968006



BTW re-reading the ticket and since there are talks about DNF5, maybe it 
would be worth of reopening the discussion. I think we could generally 
do better and I see two options:


1) There seems to be a way to download additional data if needed

2) The metadata we provide in reposotories could be better. I.e. instead 
of providing full file list, it could be actually enough to collect just 
the files of the interest. E.g. if there is somewhere `BR: 
/usr/bin/foo`, then during preparation of repo data, there could be file 
list with record for bar package, providing entry such as "/usr/bin/foo: 
bar". This would probably not require any big changes in DNF IMHO.



Vít





IOW for your example, the file dependency was always supported (and 
IMO preferable). It probably does not matter these days, unless you 
really consider memory consumption (and I don't think we should 
generally avoid the file dependencies just on the base of memory 
consumption).



Vít


[1] 
https://docs.fedoraproject.org/en-US/packaging-guidelines/#_file_and_directory_dependencies




I was asked not to use those in a recent package review [4].
Maybe that was just a reviewer preference then,
and not based on any benefit for the distribution?

[3]: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/QOQQNVN4JPJOAVUBJJM4XLSINPTOG3VE/

[4]: https://bugzilla.redhat.com/show_bug.cgi?id=2115066
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


OpenPGP_signature
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: When is a file dependency appropriate?

2022-10-06 Thread Vít Ondruch


Dne 06. 10. 22 v 9:18 Otto Liljalaakso napsal(a):

Miro Hrončok kirjoitti 6.10.2022 klo 2.33:

On 06. 10. 22 1:21, Otto Liljalaakso wrote:
Recently, I have run into some cases where file dependencies like 
Requires: /usr/bin/foo are used.


In a recent thread on this mailing list [1],
it is mentioned that such Requires should be avoided,
because resolving file dependencies requires a large amount of memory.


I don't believe that resolving file-Requires from directories listed 
at [2] from your email is more memory hungry. Where exactly was that 
said?
[1]: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/CRREDQUPPJYWVRMA4DOKYU2KZZLKC4D5/
[2]: 
https://docs.fedoraproject.org/en-US/packaging-guidelines/#_file_and_directory_dependencies 




Maybe I should have re-read the thread closely before posting,
because the most relevant message is this [3]:

"
The discussion in the bug indicates that this memory growth is related to
loading of the full filepath dataset. We have been discussing splitting
out the non-primary-filepath-data (i.e. paths that are not /etc, 
/usr/bin,

/usr/sbin), out into a separate lazilly-loaded file. If we manage to do
that, we'll kill two birds with one stone:

- initial download of repo metadata on every freakin' dnf operation can
  go down from 80 to 20 MB
- the peak memory use will go down
"

Which exactly confirms what you say.

I am still wondering a bit if there is something else bad about file 
dependencies?



If I am not mistaken, in the YUM days, the file list was split into two 
parts. One list contained several high profile directories such as 
/usr/bin [1] while the other contained everything. By default YUM have 
not loaded the full file list by default, just the short one. The data 
were not loaded by default. But AFAIK, DNF always loads everything and 
it does not look that this would change. This is one BZ which comes to 
my mind for a reference: https://bugzilla.redhat.com/show_bug.cgi?id=968006


IOW for your example, the file dependency was always supported (and IMO 
preferable). It probably does not matter these days, unless you really 
consider memory consumption (and I don't think we should generally avoid 
the file dependencies just on the base of memory consumption).



Vít


[1] 
https://docs.fedoraproject.org/en-US/packaging-guidelines/#_file_and_directory_dependencies




I was asked not to use those in a recent package review [4].
Maybe that was just a reviewer preference then,
and not based on any benefit for the distribution?

[3]: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/QOQQNVN4JPJOAVUBJJM4XLSINPTOG3VE/

[4]: https://bugzilla.redhat.com/show_bug.cgi?id=2115066
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


OpenPGP_signature
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Grub menu with 3 kernels by default

2022-10-06 Thread Hans de Goede
Hi,

On 10/5/22 23:07, Chris Murphy wrote:
> 
> 
> On Wed, Oct 5, 2022, at 3:01 PM, Vít Ondruch wrote:
>>
>> 3. "Boot menu" in GUI? Given that one can reach the GUI, why it should 
>> not be possible to choose the boot entry for next boot? Or even choose 
>> to open FW setup.
> 
> This could solve this other problem too.
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=2049849
> 
> The GUI tool can use efibootmgr to set bootnext or even bootorder.

Right, this is definitely interesting.

sdboot already offers some nice features for this.

bootctl --list: shows available boot menu entries
systemctl reboot --boot-loader-entry=ID: select which entry to boot

And I believe that there are also dbus equivalents of this.

If we want this we should consider either switching
to sdboot or make grub support:
https://systemd.io/BOOT_LOADER_INTERFACE/

And then this is something which could be an upstream GNOME feature
using the systemd DBUS APIs for this.

The only problem is that this requires someone to make time to
work on this...

I personally believe that for the Fedora workstation case
it makes sense to just switch to sdboot for EFI installs
giving us nice features like this; while at the same time
offering a much simpler code-base then grub, which is
good from a secureboot POV.

Regards,

Hans


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Grub menu with 3 kernels by default

2022-10-06 Thread Hans de Goede
Hi,

On 10/5/22 20:56, Christopher Klooz wrote:
> 
> On 05/10/2022 20:28, Hans de Goede wrote:
>> Hi,
>>
>> On 10/5/22 19:59, Christopher Klooz wrote:
>>> On 05/10/2022 18:39, Christopher Klooz wrote:
 On 05/10/2022 17:33, Chris Murphy wrote:
> On Wed, Oct 5, 2022, at 11:16 AM, Christopher Klooz wrote:
>
>> However, on ask.fp, a user mentioned that the grub menu is no longer
>> enabled by default on single boot systems so that changing the kernel is
>> no longer easily possible, and put forward
>> https://fedoraproject.org/wiki/Changes/HiddenGrubMenu as evidence for
>> this argument. Yet, the article indicates that the argument is not fully
>> correct and even with single boot installations, SHIFT can be used to
>> get into the grub menu.
> I think it's F8 or SHIFT. F8 doesn't work on many laptops I've found, 
> because it's reserved by UEFI firmware for one of its menus. And SHIFT 
> has never worked. Maybe Esc or TAB?
>> Holding left shift is the easiest method, but with firmware being
>> firmware does not work on all systems.
>>
>> What does always work is ESC or F8, Fedora's grub supports both to
>> show the menu. On some systems one of those key get intercepted by
>> the firmware which is why there are 2 choices.
>>
> Given this inconsistency, I have a mixed opinion of the hidden GRUB menu.
>
>
 Me, too. Especially as it makes support more problematic for unexperiened 
 users. It is easy to say that people should push another kernel when they 
 see the grub menu. They see text, and I can tell them which text to 
 choose. But with unexperiened users, telling when to push tab/esc/shift/F8 
 can already need to start an elaboration of what "boot" means and when 
 this happens and so on. Such elaborations are already annoying for them 
 (and for the supporters).
>> The menu automatically unhides after a failed boot. Just blindly
>> doing ctrl + alt + f4 followed by ctrl + alt + delete; or just
>> power-cycling the machine counts as a failed boot.
> Many problems that can occur do not cause a failed boot. This starts with the 
> current issue in 5.19.12.

Assuming the current issue causes users to not be able to login, it does count 
as a failed boot.

On Fedora workstation a successful boot is the user loging in in gdm and the 
user session
then lasting at least 2 minutes. Or the user shuttingdown/rebooting the machine 
from
the GNOME system menu. Anything else counts as a failure.

> Another widespread issue is that users have problems with a piece of hardware 
> (e.g., bluetooth controller), or with modules causing unintended behavior 
> with one kernel (freeze, slow, something like wifi or bluetooth does not 
> work, other acpi issues, and so on). All that does not necessarily cause 
> failed boots, but is widespread among our "user base" at ask.fp especially 
> because Fedora is used on much different hardware, and some needs 
> additionally external modules.

If a user can interact with gdm / GNOME then they can keep left-alt pressed 
while
on the confirm you want to reboot screen, this will visible change "Restart"
into "Boot Options" and clicking "Boot Options" (while keeping left-lat pressed)
will then cause the grub menu to show for 60 seconds the next boot.

Also power-cycling / ctrl+alt+del rebooting from a text virtual console without
logging in will show the menu on the next boot. I have put a lot of effort
in making it easy for users to still get the menu if necessary.

To me it seems the biggest problem is users not being aware of the various
options to get the menu when they need it.

Also I want to point out that the reason which started this thread,
the phoronix post about LCD panels possibly getting damages is mostly
scare-mongering. Yes theoretically LCD panels might get damaged but
there have been 0 reports about this and this is already fixed now.

In my experience making policy changes as a sort of shooting from
the hip reaction to a specific incident is usually a bad idea.
For an extreme example of this see how 9-11 has got us all sort of
draconian surveillance laws all over the world.

Regards,

Hans
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: When is a file dependency appropriate?

2022-10-06 Thread Otto Liljalaakso

Miro Hrončok kirjoitti 6.10.2022 klo 2.33:

On 06. 10. 22 1:21, Otto Liljalaakso wrote:
Recently, I have run into some cases where file dependencies like 
Requires: /usr/bin/foo are used.


In a recent thread on this mailing list [1],
it is mentioned that such Requires should be avoided,
because resolving file dependencies requires a large amount of memory.


I don't believe that resolving file-Requires from directories listed at 
[2] from your email is more memory hungry. Where exactly was that said?
[1]: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/CRREDQUPPJYWVRMA4DOKYU2KZZLKC4D5/
[2]: 
https://docs.fedoraproject.org/en-US/packaging-guidelines/#_file_and_directory_dependencies 


Maybe I should have re-read the thread closely before posting,
because the most relevant message is this [3]:

"
The discussion in the bug indicates that this memory growth is related to
loading of the full filepath dataset. We have been discussing splitting
out the non-primary-filepath-data (i.e. paths that are not /etc, /usr/bin,
/usr/sbin), out into a separate lazilly-loaded file. If we manage to do
that, we'll kill two birds with one stone:

- initial download of repo metadata on every freakin' dnf operation can
  go down from 80 to 20 MB
- the peak memory use will go down
"

Which exactly confirms what you say.

I am still wondering a bit if there is something else bad about file 
dependencies?

I was asked not to use those in a recent package review [4].
Maybe that was just a reviewer preference then,
and not based on any benefit for the distribution?

[3]: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/QOQQNVN4JPJOAVUBJJM4XLSINPTOG3VE/

[4]: https://bugzilla.redhat.com/show_bug.cgi?id=2115066
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue