rawhide report: 20110518 changes

2011-05-18 Thread Rawhide Report
Compose started at Wed May 18 08:15:03 UTC 2011

Broken deps for x86_64
--
R-Rsolid-0.9.31-2.fc15.x86_64 requires libhdf5.so.6()(64bit)
acheck-0.5.1-4.fc15.noarch requires perl(Text::Aspell)
almanah-0.7.3-10.fc15.x86_64 requires libcamel-1.2.so.23()(64bit)
1:anerley-0.2.14-5.fc15.i686 requires libcamel-1.2.so.23
1:anerley-0.2.14-5.fc15.x86_64 requires libcamel-1.2.so.23()(64bit)
beldi-0.9.25-3.fc15.x86_64 requires libhal-storage.so.1()(64bit)
beldi-0.9.25-3.fc15.x86_64 requires libhal.so.1()(64bit)
beldi-0.9.25-3.fc15.x86_64 requires hal
callweaver-javascript-1.2.1-8.fc16.x86_64 requires libjs.so.1()(64bit)
camcardsync-0.1.1-4.fc15.x86_64 requires libhal.so.1()(64bit)
cyphesis-0.5.24-3.fc15.x86_64 requires libwfmath-0.3.so.4()(64bit)
cyphesis-0.5.24-3.fc15.x86_64 requires libskstream-0.3.so.4()(64bit)
cyphesis-0.5.24-3.fc15.x86_64 requires libmercator-0.2.so.6()(64bit)
db4o-7.4-2.fc13.x86_64 requires mono(Mono.GetOptions) = 0:2.0.0.0
deskbar-applet-2.32.0-4.fc15.x86_64 requires libcamel-1.2.so.23()(64bit)
dh-make-0.55-3.fc15.noarch requires debhelper
ekiga-3.3.0-8.fc16.x86_64 requires libcamel-1.2.so.23()(64bit)
evolution-couchdb-0.5.3-1.fc16.x86_64 requires 
libcamel-provider-1.2.so.23()(64bit)
evolution-couchdb-0.5.3-1.fc16.x86_64 requires 
libcamel-1.2.so.23()(64bit)
evolution-rss-0.2.90-19.20110307git.fc16.x86_64 requires 
libcamel-provider-1.2.so.23()(64bit)
evolution-rss-0.2.90-19.20110307git.fc16.x86_64 requires 
libcamel-1.2.so.23()(64bit)
evolution-sharp-0.21.1-12.fc15.x86_64 requires 
libcamel-1.2.so.23()(64bit)
exaile-0.3.2.1-1.fc16.noarch requires hal
fawkes-guis-0.4.2-4.fc16.i686 requires libgraph.so.4
fawkes-guis-0.4.2-4.fc16.i686 requires libcdt.so.4
fawkes-guis-0.4.2-4.fc16.i686 requires libgvc.so.5
fawkes-guis-0.4.2-4.fc16.x86_64 requires libgraph.so.4()(64bit)
fawkes-guis-0.4.2-4.fc16.x86_64 requires libcdt.so.4()(64bit)
fawkes-guis-0.4.2-4.fc16.x86_64 requires libgvc.so.5()(64bit)
file-browser-applet-0.6.6-1.fc15.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gdl-0.9.1-2.fc16.x86_64 requires libhdf5.so.6()(64bit)
gdl-python-0.9.1-2.fc16.x86_64 requires libhdf5.so.6()(64bit)
gedit-valencia-0.3.0-4.fc14.x86_64 requires libvala-0.10.so.0()(64bit)
giggle-0.5-4.fc15.i686 requires libcamel-1.2.so.23
giggle-0.5-4.fc15.x86_64 requires libcamel-1.2.so.23()(64bit)
glunarclock-0.34.1-1.fc14.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-applet-bubblemon-2.0.15-1.fc13.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-applet-cpufire-1.6-3.fc14.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-applet-globalmenu-0.7.9-1.fc15.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-applet-grandr-0.4.1-2.fc12.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-applet-music-2.5.1-5.fc15.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-applet-sensors-2.2.7-4.fc15.i686 requires libpanel-applet-2.so.0
gnome-applet-sensors-2.2.7-4.fc15.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-applet-sshmenu-3.18-3.fc15.noarch requires ruby(panelapplet2)
gnome-applet-window-picker-0.5.8-2.fc14.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-device-manager-0.2-6.fc15.x86_64 requires libhal.so.1()(64bit)
gnome-device-manager-devel-0.2-6.fc15.i686 requires hal-devel = 
0:0.5.10
gnome-device-manager-devel-0.2-6.fc15.i686 requires pkgconfig(hal)
gnome-device-manager-devel-0.2-6.fc15.x86_64 requires hal-devel = 
0:0.5.10
gnome-device-manager-devel-0.2-6.fc15.x86_64 requires pkgconfig(hal)
gnome-device-manager-libs-0.2-6.fc15.i686 requires libhal.so.1
gnome-device-manager-libs-0.2-6.fc15.i686 requires hal = 0:0.5.10
gnome-device-manager-libs-0.2-6.fc15.x86_64 requires 
libhal.so.1()(64bit)
gnome-device-manager-libs-0.2-6.fc15.x86_64 requires hal = 0:0.5.10
gnome-launch-box-0.4-20.fc15.x86_64 requires libcamel-1.2.so.23()(64bit)
gnome-netstatus-2.28.2-1.fc15.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-phone-manager-0.66-1.fc16.x86_64 requires 
libcamel-1.2.so.23()(64bit)
gnome-phone-manager-telepathy-0.66-1.fc16.x86_64 requires 
libcamel-1.2.so.23()(64bit)
gnome-pilot-conduits-2.32.1-2.fc15.x86_64 requires 
libgpilotdconduit.so.3()(64bit)
gnome-pilot-conduits-2.32.1-2.fc15.x86_64 requires 
libgpilotd.so.5()(64bit)
gnome-pilot-conduits-2.32.1-2.fc15.x86_64 requires 
libgpilotdcm.so.4()(64bit)
gnome-pilot-eds-2.91.92-1.fc16.x86_64 requires 
libcamel-1.2.so.23()(64bit)
gnome-python2-applet-2.32.0-1.fc14.x86_64 requires 

Re: glibc-2.13.90-12 needs testing - re-adds RPC API

2011-05-18 Thread Jiri Skala
On Mon, 2011-05-16 at 14:26 -0400, Bill Nottingham wrote:
 Notably, this re-adds the RPC API to glibc's exported interface, so 
 please test that rebuilding your applications still works, or works
 again.
 
 https://admin.fedoraproject.org/updates/glibc-2.13.90-12
 
there is number of headers that are no longer in glibc-headers (see
comments in the link above). This is not surprise some builds fail.

Is it somewhere documented? What about replacement? Is someone preparing
-devel package containing missing headers?

Thanks,

Jiri

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: How to build noarch package on only certain architectures?

2011-05-18 Thread Dennis Gilmore
On Tuesday, May 17, 2011 10:43:47 AM Richard W.M. Jones wrote:
 On Tue, May 17, 2011 at 09:33:51AM -0400, Josh Boyer wrote:
  On Tue, May 17, 2011 at 9:28 AM, Kevin Fenzi ke...@scrye.com wrote:
   Is there some other way to add a noarch package that doesn't build on
   some architectures?
   
   Sadly this is a nasty situation. (I'm in the same boat with munin).
   
   There are 2 answers, neither ideal (I'd love to hear better):
   
   1. Make your package archfull. Add ExcludeArch/ExclusiveArch.
   
   2. Leave it noarch and ExcludeArch: ppc64, then try and keep rebuilding
   it until you hit a non ppc builder.
  
  3. See if you can modify the package to do runtime determinism of
  whether the dependency is there, and only use that functionality if
  it's present.  Personally I think that if that can't be done, then
  option 1 is the right way to go.
 
 4. Post a patch to fix RPM.
 
 This is a bug or shortcoming in RPM.  It affected some mingw32
 packages as well IIRC -- they are noarch and can be built anywhere,
 but we wanted to %check them using wine which only runs on i386.
 
 Rich.
make it archeful with a noarch subpackage that has the noarch bits. if you do 
it ExclusiveArch  for the base arch you want it built on  it would work as you 
want

Dennis


signature.asc
Description: This is a digitally signed message part.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: F-15 Branched report: 20110517 changes

2011-05-18 Thread Dennis Gilmore
On Tuesday, May 17, 2011 08:46:15 PM Kevin Kofler wrote:
 Branched Report wrote:
  Broken deps for x86_64
 
 Are we going to get these uninstallable packages cleared up from the
 Everything tree before sending the release to the mirrors? Otherwise,
 they're going to come haunt us at each and every depcheck for F15+updates.
 (AFAIK, at least repoclosure still complains even when the dependency is
 fixed in updates.)
 
  Updated Packages:
 Uhm, what's up with these? Were they already used in the RC3 compose? Are
 we getting an RC4 after all? It's quite surprising to see 4 updates pushed
 to Branched after the mail declaring the release gold.
 
 Kevin Kofler
They were in RC3 but did not have the karma to get pushed to stable when i 
pushed the builds we included for blockers.

Dennis


signature.asc
Description: This is a digitally signed message part.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

[Bug 704221] missing the Joystick.pm module

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=704221

Hans de Goede hdego...@redhat.com changed:

   What|Removed |Added

 Status|NEW |CLOSED
 Resolution||NOTABUG
Last Closed||2011-05-18 10:19:47

--- Comment #1 from Hans de Goede hdego...@redhat.com 2011-05-18 10:19:47 EDT 
---
The upstream 2.1.3 SDL_Perl tarbal does not contain a Joystick.pm file, neither
does the 2.2.6 version. We cannot include that which is not there in the
package.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 704221] missing the Joystick.pm module

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=704221

Iain Arnell iarn...@gmail.com changed:

   What|Removed |Added

 CC||iarn...@gmail.com

--- Comment #2 from Iain Arnell iarn...@gmail.com 2011-05-18 10:39:55 EDT ---
Upstream seems to have renamed the distribution to SDL rather than SDL_Perl.
http://search.cpan.org/~kthakore/SDL-2.532/ does contain SDL::Joystick.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


Re: F-15 Branched report: 20110515 changes

2011-05-18 Thread Bruno Wolff III
On Tue, May 17, 2011 at 11:33:35 -0400,
  Tom Callaway tcall...@redhat.com wrote:
 Lately, I've been trying to resolve as many of these as reasonably
 possible. Here's what I know:
 
  sear-0.6.3-14.fc12.x86_64 requires liberis-1.3.so.15()(64bit)
 
 https://admin.fedoraproject.org/updates/sear-0.6.3-18.fc15

Going forward sear will get more attention from me. I have most of the
worldforge stack updated in rawhide. I still need to do cyphesis and sear,
but the rest are current upstream releases.

 
  sunbird-1.0-0.33.b2pre.fc15.x86_64 requires libnotify.so.1()(64bit)
 
 Probably should be removed/obsoleted by lightning/thunderbird.

I think the probably can be dropped. See:
https://bugzilla.redhat.com/show_bug.cgi?id=684377
Upstream support for the standalone client has been dropped.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Build failing - ld aborting

2011-05-18 Thread Orion Poplawski
2 for 2 now:

libtool: link: g++  -fPIC -DPIC -shared -nostdlib 
/usr/lib/gcc/i686-redhat-linux/4.6.0/../../../crti.o 
/usr/lib/gcc/i686-redhat-linux/4.6.0/crtbeginS.o  .libs/assocdata.o 
.libs/basic_fun_cl.o .libs/basic_fun.o .libs/basic_fun_jmg.o .libs/basic_op.o 
.libs/basic_pro.o .libs/basic_pro_jmg.o .libs/CFMTLexer.o .libs/color.o 
.libs/convert2.o .libs/datatypes.o .libs/dcommon.o .libs/dcompiler.o 
.libs/default_io.o .libs/dinterpreter.o .libs/dnode.o .libs/dpro.o 
.libs/dstructdesc.o .libs/dstructgdl.o .libs/dvar.o .libs/envt.o 
.libs/extrat.o .libs/FMTIn.o .libs/FMTLexer.o .libs/fmtnode.o .libs/FMTOut.o 
.libs/FMTParser.o .libs/gdleventhandler.o .libs/gdlexception.o 
.libs/gdlgstream.o .libs/GDLInterpreter.o .libs/GDLLexer.o .libs/GDLParser.o 
.libs/gdlpsstream.o .libs/gdlsvgstream.o .libs/gdlpython.o 
.libs/GDLTreeParser.o .libs/gdlwinstream.o .libs/gdlxstream.o 
.libs/getfmtast.o .libs/graphics.o .libs/gsl_fun.o .libs/ifmt.o .libs/initct.o 
.libs/initsysvar.o .libs/io.o .libs/libinit_cl.o .libs/libinit.o 
.libs/libinit_jmg.o .libs/math_fun.o .libs/math_fun_jmg.o .libs/math_utl.o 
.libs/ncdf_att_cl.o .libs/ncdf_cl.o .libs/ncdf_dim_cl.o .libs/ncdf_var_cl.o 
.libs/new.o .libs/objects.o .libs/ofmt.o .libs/math_fun_ac.o 
.libs/libinit_ac.o .libs/math_fun_gm.o .libs/libinit_gm.o .libs/math_fun_ng.o 
.libs/libinit_ng.o .libs/plotting.o .libs/print.o .libs/print_tree.o 
.libs/read.o .libs/str.o .libs/terminfo.o .libs/topython.o .libs/typetraits.o 
.libs/hdf_fun.o .libs/hdf_pro.o .libs/magick_cl.o .libs/gdlwidget.o 
.libs/widget.o .libs/basegdl.o .libs/hdf5_fun.o .libs/libinit_mes.o 
.libs/file.o .libs/image.o .libs/gdljournal.o .libs/convol.o 
.libs/convol_inc0.o .libs/convol_inc1.o .libs/convol_inc2.o 
.libs/sigfpehandler.o .libs/gdlzstream.o .libs/arrayindex.o .libs/fftw.o 
.libs/mpi.o .libs/plot3d_nr.o .libs/grib.o .libs/prognode.o 
.libs/prognodeexpr.o .libs/datatypesref.o .libs/lapack.o .libs/gshhs.o 
.libs/newprognode.o .libs/pythongdl.o   -lantlr -L/usr/X11R6/lib64 
-L/usr/X11R6/lib -lX11 -lncurses -L/usr/lib/hdf -ldl -lreadline -lgsl 
-lgslcblas -lplplotd -lplplotcxxd -lwx_gtk2u_richtext-2.8 -lwx_gtk2u_aui-2.8 
-lwx_gtk2u_xrc-2.8 -lwx_gtk2u_qa-2.8 -lwx_gtk2u_html-2.8 -lwx_gtk2u_adv-2.8 
-lwx_gtk2u_core-2.8 -lwx_baseu_xml-2.8 -lwx_baseu_net-2.8 -lwx_baseu-2.8 
-lMagick++ -lMagickCore -lnetcdf /usr/lib/hdf/libmfhdf.a /usr/lib/hdf/libdf.a 
-ljpeg -lz -L/usr/lib/hdf5 -lhdf5 -lfftw3 -lfftw3f -lpython2.7 -ludunits2 
-lgrib_api -ljasper -L/usr/lib/gcc/i686-redhat-linux/4.6.0 
-L/usr/lib/gcc/i686-redhat-linux/4.6.0/../../.. -lstdc++ -lm -lc -lgcc_s 
/usr/lib/gcc/i686-redhat-linux/4.6.0/crtendS.o 
/usr/lib/gcc/i686-redhat-linux/4.6.0/../../../crtn.o  -O2 -m32 -march=i686 
-mtune=atom -Wl,-z -Wl,muldefs -pthread   -pthread -Wl,-soname -Wl,libgdl.so.0 
-o .libs/libgdl.so.0.0.0
collect2: ld terminated with signal 6 [Aborted]

Any ideas what might cause this?

-- 
Orion Poplawski
Technical Manager 303-415-9701 x222
NWRA/CoRA DivisionFAX: 303-415-9702
3380 Mitchell Lane  or...@cora.nwra.com
Boulder, CO 80301  http://www.cora.nwra.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Build failing - ld aborting

2011-05-18 Thread Andrew Haley
On 05/18/2011 03:47 PM, Orion Poplawski wrote:
 2 for 2 now:
 
 libtool: link: g++  -fPIC -DPIC -shared -nostdlib 
 /usr/lib/gcc/i686-redhat-linux/4.6.0/../../../crti.o 
 /usr/lib/gcc/i686-redhat-linux/4.6.0/crtbeginS.o  .libs/assocdata.o 
 .libs/basic_fun_cl.o .libs/basic_fun.o .libs/basic_fun_jmg.o .libs/basic_op.o 
 .libs/basic_pro.o .libs/basic_pro_jmg.o .libs/CFMTLexer.o .libs/color.o 
 .libs/convert2.o .libs/datatypes.o .libs/dcommon.o .libs/dcompiler.o 
 .libs/default_io.o .libs/dinterpreter.o .libs/dnode.o .libs/dpro.o 
 .libs/dstructdesc.o .libs/dstructgdl.o .libs/dvar.o .libs/envt.o 
 .libs/extrat.o .libs/FMTIn.o .libs/FMTLexer.o .libs/fmtnode.o .libs/FMTOut.o 
 .libs/FMTParser.o .libs/gdleventhandler.o .libs/gdlexception.o 
 .libs/gdlgstream.o .libs/GDLInterpreter.o .libs/GDLLexer.o .libs/GDLParser.o 
 .libs/gdlpsstream.o .libs/gdlsvgstream.o .libs/gdlpython.o 
 .libs/GDLTreeParser.o .libs/gdlwinstream.o .libs/gdlxstream.o 
 .libs/getfmtast.o .libs/graphics.o .libs/gsl_fun.o .libs/ifmt.o 
 .libs/initct.o 
 .libs/initsysvar.o .libs/io.o .libs/libinit_cl.o .libs/libinit.o 
 .libs/libinit_jmg.o .libs/math_fun.o .libs/math_fun_jmg.o .libs/math_utl.o 
 .libs/ncdf_att_cl.o .libs/ncdf_cl.o .libs/ncdf_dim_cl.o .libs/ncdf_var_cl.o 
 .libs/new.o .libs/objects.o .libs/ofmt.o .libs/math_fun_ac.o 
 .libs/libinit_ac.o .libs/math_fun_gm.o .libs/libinit_gm.o .libs/math_fun_ng.o 
 .libs/libinit_ng.o .libs/plotting.o .libs/print.o .libs/print_tree.o 
 .libs/read.o .libs/str.o .libs/terminfo.o .libs/topython.o .libs/typetraits.o 
 .libs/hdf_fun.o .libs/hdf_pro.o .libs/magick_cl.o .libs/gdlwidget.o 
 .libs/widget.o .libs/basegdl.o .libs/hdf5_fun.o .libs/libinit_mes.o 
 .libs/file.o .libs/image.o .libs/gdljournal.o .libs/convol.o 
 .libs/convol_inc0.o .libs/convol_inc1.o .libs/convol_inc2.o 
 .libs/sigfpehandler.o .libs/gdlzstream.o .libs/arrayindex.o .libs/fftw.o 
 .libs/mpi.o .libs/plot3d_nr.o .libs/grib.o .libs/prognode.o 
 .libs/prognodeexpr.o .libs/datatypesref.o .libs/lapack.o .libs/gshhs.o 
 .libs/newprognode.o .libs/pythongdl.o   -lantlr -L/usr/X11R6/lib64 
 -L/usr/X11R6/lib -lX11 -lncurses -L/usr/lib/hdf -ldl -lreadline -lgsl 
 -lgslcblas -lplplotd -lplplotcxxd -lwx_gtk2u_richtext-2.8 -lwx_gtk2u_aui-2.8 
 -lwx_gtk2u_xrc-2.8 -lwx_gtk2u_qa-2.8 -lwx_gtk2u_html-2.8 -lwx_gtk2u_adv-2.8 
 -lwx_gtk2u_core-2.8 -lwx_baseu_xml-2.8 -lwx_baseu_net-2.8 -lwx_baseu-2.8 
 -lMagick++ -lMagickCore -lnetcdf /usr/lib/hdf/libmfhdf.a /usr/lib/hdf/libdf.a 
 -ljpeg -lz -L/usr/lib/hdf5 -lhdf5 -lfftw3 -lfftw3f -lpython2.7 -ludunits2 
 -lgrib_api -ljasper -L/usr/lib/gcc/i686-redhat-linux/4.6.0 
 -L/usr/lib/gcc/i686-redhat-linux/4.6.0/../../.. -lstdc++ -lm -lc -lgcc_s 
 /usr/lib/gcc/i686-redhat-linux/4.6.0/crtendS.o 
 /usr/lib/gcc/i686-redhat-linux/4.6.0/../../../crtn.o  -O2 -m32 -march=i686 
 -mtune=atom -Wl,-z -Wl,muldefs -pthread   -pthread -Wl,-soname 
 -Wl,libgdl.so.0 
 -o .libs/libgdl.so.0.0.0
 collect2: ld terminated with signal 6 [Aborted]
 
 Any ideas what might cause this?

A bug in collect2 or the OOM killer.

Have a look at the output of dmesg.

Andrew.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


[Bug 704221] missing the Joystick.pm module

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=704221

--- Comment #3 from Hans de Goede hdego...@redhat.com 2011-05-18 10:52:32 EDT 
---
(In reply to comment #2)
 Upstream seems to have renamed the distribution to SDL rather than SDL_Perl.
 http://search.cpan.org/~kthakore/SDL-2.532/ does contain SDL::Joystick.

The problem with releases  2.2.x is that the API has changed and none of the
programs in Fedora actually using perl-SDL have been adopted to the new API,
which given that the new API is not stable yet (3.0 will be the first release
with the new API being stable) is not surprising, see:
http://sdl.perl.org/

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


Re: Special thanks to gnome3 and systemd developers

2011-05-18 Thread Clyde E. Kunkel
On 05/18/2011 10:20 AM, Bruno Wolff III wrote:
 While everyone that worked on the F15 release deserves thanks and congrats,
 I'd like to give a special thanks to the systemd and gnome3 developers because
 of the large amount of work needed to implement those features. By working
 hard to get these into F15, they helped meet Fedora's goal of being First.

+100

-- 
Regards,
OldFart

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Build failing - ld aborting

2011-05-18 Thread Orion Poplawski
On 05/18/2011 08:48 AM, Andrew Haley wrote:
 On 05/18/2011 03:47 PM, Orion Poplawski wrote:
 collect2: ld terminated with signal 6 [Aborted]

 Any ideas what might cause this?

 A bug in collect2 or the OOM killer.

 Have a look at the output of dmesg.

 Andrew.

That was my thought too I guess.  On 32-bit only.

On my local mock builder I get more information:

collect2: ld terminated with signal 6 [Aborted], core dumped
*** glibc detected *** /usr/bin/ld: free(): invalid size: 0x0ea8ac18 ***
=== Backtrace: =
/lib/libc.so.6(+0x73055)[0x556f9055]
/usr/lib/libbfd-2.21.51.0.9-1.fc16.so(objalloc_free+0x2c)[0x55636ecc]
/usr/lib/libbfd-2.21.51.0.9-1.fc16.so(_bfd_delete_bfd+0x3e)[0x555a89de]
/usr/lib/libbfd-2.21.51.0.9-1.fc16.so(bfd_close+0x98)[0x555a8e18]
/usr/bin/ld[0x804be8c]
/lib/libc.so.6(__libc_start_main+0xf3)[0x5569f513]
/usr/bin/ld[0x804c2dd]

http://sourceware.org/bugzilla/show_bug.cgi?id=12779
https://bugzilla.redhat.com/show_bug.cgi?id=705826

-- 
Orion Poplawski
Technical Manager 303-415-9701 x222
NWRA/CoRA DivisionFAX: 303-415-9702
3380 Mitchell Lane  or...@cora.nwra.com
Boulder, CO 80301  http://www.cora.nwra.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: glibc-2.13.90-12 needs testing - re-adds RPC API

2011-05-18 Thread Bill Nottingham
Jiri Skala (jsk...@redhat.com) said: 
 On Mon, 2011-05-16 at 14:26 -0400, Bill Nottingham wrote:
  Notably, this re-adds the RPC API to glibc's exported interface, so 
  please test that rebuilding your applications still works, or works
  again.
  
  https://admin.fedoraproject.org/updates/glibc-2.13.90-12
  
 there is number of headers that are no longer in glibc-headers (see
 comments in the link above). This is not surprise some builds fail.
 
 Is it somewhere documented? What about replacement? Is someone preparing
 -devel package containing missing headers?

If there are problems with it, please comment in the update  file
new bugs... I was just passing the info on.

Bill
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Security release criterion proposal

2011-05-18 Thread Adam Williamson
Hey, all. The topic of whether and which security issues should block
releases has come up several times before. While we haven't actually had
many really serious security issues to worry about since the
introduction of the current release criteria system, I think it's
certainly something we should take into account. At the same time, it's
fairly established in practice that we don't just consider anything
worth issuing a CVE for as a release-blocking bug. So, to capture what I
believe would be the intent of the project, I propose this as an Alpha
release criterion for F16 onwards. (For those on devel and security
lists who may not be completely familiar with the release criteria /
blocker system, this would mean that any bug for an issue which breached
the criterion should be considered a release blocker for any Alpha, Beta
or Final release).

# There must be no known remote code execution vulnerability which could
be exploited during installation or during use of a live image shipped
with the release

Points to consider:

* Possible variants to the type of vulnerability covered...do we also
want to make local privesc vulns blocking? Conversely, do we want to
make only remote *root* execution vulns blocking? I don't know if anyone
would want to go as far as making DoS vulns release blocking, but speak
up if you would! (Of course there is again the local/remote distinction
to consider there: 'all DoS vulns' would be a much tighter standard than
'remote DoS vulns').

* The caveat about where the issue is exploitable is important because
if you can't exploit it from the installer or a live image, it becomes
less relevant whether we ship with it or not, because you would be safe
with the first post-install update assuming we submitted an update for
the issue promptly. But it may be the case that we want to broaden it
out to also cover issues that can be exploited from a default DVD
install, if we consider the window between install and first update (if
updates repos aren't used during installation) to be unacceptable.

* We have a system whereby the criteria get more onerous from Alpha to
Beta to Final, so it could be the case that we accept worse security
issues in Alpha than in Beta and so on; we could have a loose criterion
for Alpha and a tighter one for Beta. In this case it felt sensible to
me to just go with one criterion, but please say if you disagree.

* The aim of the release criteria is more to codify existing practice
than to extend it; we have taken security issues as release blockers
before and considered but rejected less serious ones, but we have done
so on an ad hoc basis. I tried to write the criterion to reflect our
past practice on this. So precedents are important here; if you have any
that contradict the proposed criterion, please do cite them.

Feedback please! Thanks :)
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Fedora Talk: adamwill AT fedoraproject DOT org
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 08:57 -0700, Adam Williamson wrote:

 # There must be no known remote code execution vulnerability which could
 be exploited during installation or during use of a live image shipped
 with the release
 
 Points to consider:

One more 'point to consider' that I forgot: for most things we only
consider the 'desktop' and KDE live images as capable of blocking the
release, but I thought for security issues it makes sense to broaden
this out to all the images we actually ship as part of the release. This
is definitely up for debate, though; it would be possible to tighten it
down to only desktop and KDE, or to only the most commonly-used spins,
or something.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Fedora Talk: adamwill AT fedoraproject DOT org
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Jóhann B. Guðmundsson
On 05/18/2011 03:57 PM, Adam Williamson wrote:
 Feedback please! Thanks:)

Given that we ship selinux on by default should this proposal only be 
applicable to exploits/vulnerability that selinux cant catch and prevent 
which leaves us with insert type of exploits here )?

Don't we need individual(s) from the security team that will be doing 
actively security audit during the development cycle and reporting back 
to QA?

Would not applying this security release proposal to final only suffice?

JBG
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Bruno Wolff III
On Wed, May 18, 2011 at 08:57:17 -0700,
  Adam Williamson awill...@redhat.com wrote:
 
 # There must be no known remote code execution vulnerability which could
 be exploited during installation or during use of a live image shipped
 with the release
 
 Points to consider:

I think there may be some remote exploits that we wouldn't want to block
for. For example if wesnoth turns out to be vulnerable to the game server
or one of the other clients, I don't thank is something we'd want to block for.
If firefox was vulnerable to web pages you visit being able to execute
unsandboxed code, then I feel it's a close call.

I'd prefer not to limit remote code execution to just root. User data
and network bandwidth are valuable. Then we also need to worry about local
root exploits being used in combination with non-root remote code exploits.

I think it is also worth considering whether the exploits are really
exploitable with our default configuration (selinux in enforcing mode).
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Rahul Sundaram
On 05/18/2011 09:58 PM, Jóhann B. Guðmundsson wrote:
 On 05/18/2011 03:57 PM, Adam Williamson wrote:
 Feedback please! Thanks:)
 Given that we ship selinux on by default should this proposal only be 
 applicable to exploits/vulnerability that selinux cant catch and prevent 
 which leaves us with insert type of exploits here )?

No.  SELInux (or firewall) is not a first line of defense.  These get
turned off by some users and we need to be sure we aren't relying on
them solely.  If there are important security issues, they should be
fixed before release regardless of whether SELinux would mitigate them
or not

Rahul
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 16:28 +, Jóhann B. Guðmundsson wrote:
 On 05/18/2011 03:57 PM, Adam Williamson wrote:
  Feedback please! Thanks:)
 
 Given that we ship selinux on by default should this proposal only be 
 applicable to exploits/vulnerability that selinux cant catch and prevent 
 which leaves us with insert type of exploits here )?

I kinda considered that to be implicit in the criterion as written, but
as two people have asked about it, obviously we should clarify that :)

 Don't we need individual(s) from the security team that will be doing 
 actively security audit during the development cycle and reporting back 
 to QA?

Well, 'enforcing' the criteria is a separate issue from determining
them, and we don't really need to discuss it here. Having an explicit
criterion adds value even if we don't set up a formal validation system,
because it gives us solid ground to review any security issues which get
proposed as release blockers on an ad hoc basis.

 Would not applying this security release proposal to final only suffice?

Well, I mean, it depends what you mean by 'suffice' :). I worked on the
basis that we probably don't want to ship any widely-distributed
'release' with a major security issue, but as I wrote, it's certainly up
for debate.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Fedora Talk: adamwill AT fedoraproject DOT org
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Security release criterion proposal

2011-05-18 Thread Adam Jackson
On 5/18/11 11:57 AM, Adam Williamson wrote:

 # There must be no known remote code execution vulnerability which could
 be exploited during installation or during use of a live image shipped
 with the release

Seems reasonable at first glance.

One anecdotal experience: FC5 (wow) shipped with an X server that was 
vulnerable to a local root exploit: due to a bug, normal users could set 
the X server's module path, and the server would always load a certain 
module first, so you could just set an ELF constructor that called 
exec(/bin/sh) and win.  The public commit to fix the issue was 20 
March 2006, the exact day of the FC5 release, so I suspect we chose the 
embargo date on that basis.

Which, I think, was the right move.

The concern I would have with an explicit policy like this is the 
schedule effects.  We would not be able to commit or build a package 
with the embargoed fix until after the embargo date.  _Then_ we compose. 
  Then we test (unless we think existing testing is sufficient).  Then 
we push to mirrors.  Then we make the release links public.  That whole 
process is still on the order of a week I think, which is slightly 
longer than one would desire.

- ajax
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Adam Miller
On Wed, May 18, 2011 at 10:27:07PM +0530, Rahul Sundaram wrote:
 On 05/18/2011 09:58 PM, Jóhann B. Guðmundsson wrote:
  On 05/18/2011 03:57 PM, Adam Williamson wrote:
  Feedback please! Thanks:)
  Given that we ship selinux on by default should this proposal only be 
  applicable to exploits/vulnerability that selinux cant catch and prevent 
  which leaves us with insert type of exploits here )?
 
 No.  SELInux (or firewall) is not a first line of defense.  These get
 turned off by some users and we need to be sure we aren't relying on
 them solely.  If there are important security issues, they should be
 fixed before release regardless of whether SELinux would mitigate them
 or not

I have to disagree on this point, I think SELinux and the firewall are
in fact valid vulnerability mitigation paths and since they are in fact
enabled by default with the release then they should be able to satisfy
the requirements for release criteria. I don't think we as a project can
handle the long list of what users can and can't do once their system is
installed, I personally think that in these release criteria we should focus on
what is and isn't vulnerable from a default installation. If a user
decides to turn of PackageKit, turn off the firewall, disable SELinux,
and not manually pull package updates  there's not much we can do
for them. (And yes, I am aware this isn't the case you brought up but
I'm simply trying to point out the slippery slope of what if the user
does X? that we could get ourselves into that would make it difficult
for us as a community to QA.

Just my opinion ... questions, comments, and snide remarks welcome as
always :)

-AdamM
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Kevin Kofler
Adam Williamson wrote:
 Hey, all. The topic of whether and which security issues should block
 releases has come up several times before.

Indeed it has. The decision was always that it's not a good idea. I don't 
see how the situation has changed to warrant beating that dead horse again.

 # There must be no known remote code execution vulnerability which could
 be exploited during installation or during use of a live image shipped
 with the release

This is just completely and utterly moot considering that there are going to 
be many more unknown vulnerabilities than known ones, and that several of 
those are inevitably going to come up during the 6-month lifetime of a 
release.

It's impossible to ship an exploit-free release just like it's impossible to 
ship a bug-free release.

We have a process for security fixes, it's called updates. I don't see how 
a 0-day update wouldn't be an appropriate resolution for a security issue.


Now if you are talking about NTH, then yes, security fixes should be NTH. 
Maybe even all of them. But I don't think we should be blocking or delaying 
any release for them. We can't fix them all anyway.

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Jóhann B. Guðmundsson
On 05/18/2011 05:18 PM, Adam Miller wrote:
 On Wed, May 18, 2011 at 10:27:07PM +0530, Rahul Sundaram wrote:
 On 05/18/2011 09:58 PM, Jóhann B. Guðmundsson wrote:
 On 05/18/2011 03:57 PM, Adam Williamson wrote:
 Feedback please! Thanks:)
 Given that we ship selinux on by default should this proposal only be
 applicable to exploits/vulnerability that selinux cant catch and prevent
 which leaves us withinsert type of exploits here )?
 No.  SELInux (or firewall) is not a first line of defense.  These get
 turned off by some users and we need to be sure we aren't relying on
 them solely.  If there are important security issues, they should be
 fixed before release regardless of whether SELinux would mitigate them
 or not
 I have to disagree on this point, I think SELinux and the firewall are
 in fact valid vulnerability mitigation paths and since they are in fact
 enabled by default with the release then they should be able to satisfy
 the requirements for release criteria. I don't think we as a project can
 handle the long list of what users can and can't do once their system is
 installed, I personally think that in these release criteria we should focus 
 on
 what is and isn't vulnerable from a default installation. If a user
 decides to turn of PackageKit, turn off the firewall, disable SELinux,
 and not manually pull package updates  there's not much we can do
 for them. (And yes, I am aware this isn't the case you brought up but
 I'm simply trying to point out the slippery slope of what if the user
 does X? that we could get ourselves into that would make it difficult
 for us as a community to QA.

That is my take on the scenario along with do we actually need any 
security release criteria surrounding the rest ( the issue that selinux 
does not catch ) as opposed to just ping the security team on case by 
case bases should the need arise and get them to assess the situation 
and then either flag the bug a blocker nth or a non blocker..

JBG

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Adam Jackson
On 5/18/11 1:22 PM, Kevin Kofler wrote:
 Adam Williamson wrote:
 # There must be no known remote code execution vulnerability which could
 be exploited during installation or during use of a live image shipped
 with the release

 This is just completely and utterly moot considering that there are going to
 be many more unknown vulnerabilities than known ones, and that several of
 those are inevitably going to come up during the 6-month lifetime of a
 release.

The difference between a known and an unknown security bug is that, if 
_you_ know about it, it's virtually certain that someone malicious 
already does too.

We can't avoid unknown risk exposure.  You're arguing for ignoring known 
risk exposure entirely.  Seems a touch irresponsible.

Also: twelve month.

- ajax

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 13:37 -0400, Adam Jackson wrote:
 On 5/18/11 1:22 PM, Kevin Kofler wrote:
  Adam Williamson wrote:
  # There must be no known remote code execution vulnerability which could
  be exploited during installation or during use of a live image shipped
  with the release
 
  This is just completely and utterly moot considering that there are going to
  be many more unknown vulnerabilities than known ones, and that several of
  those are inevitably going to come up during the 6-month lifetime of a
  release.
 
 The difference between a known and an unknown security bug is that, if 
 _you_ know about it, it's virtually certain that someone malicious 
 already does too.
 
 We can't avoid unknown risk exposure.  You're arguing for ignoring known 
 risk exposure entirely.  Seems a touch irresponsible.
 
 Also: twelve month.

Well, I think his point is that it's almost certain that some 'unknown'
exposures will become 'known' during the life cycle of a release, at
which point the live images we release three months previously are
vulnerable to a known security exploit and there's exactly nothing we
can do about it - so worrying about the ones we _can_ fix at release
time becomes less important, when viewed from that perspective. It's a
good point.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Fedora Talk: adamwill AT fedoraproject DOT org
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


[Guidelines Change] Changes to the Packaging Guidelines

2011-05-18 Thread Tom Callaway
Here are the latest changes to the Fedora Packaging Guidelines:

---

A section has been added to the SysVInitScript guidelines covering the
optional situation where a package that uses systemd unit files as the
default also includes sysv initscripts in a subpackage:

https://fedoraproject.org/wiki/Packaging:SysVInitScript#Initscripts_in_addition_to_systemd_unit_files

---

The GIO scriptlets have been changed to not conditionalize the %post
invocation. This works around a multilib issue.

https://fedoraproject.org/wiki/Packaging:ScriptletSnippets#GIO_modules

---

The guideline that prohibits Fedora packages from using /srv has been
updated to better represent what the FHS has to say about /srv and to
clarify the expectations for Fedora packages which may be configured to
use /srv.

https://fedoraproject.org/wiki/Packaging:Guidelines#No_Files_or_Directories_under_.2Fsrv

---

It was brought to the FPC's attention that while the new Guidelines
covering MinGW packaging were technically correct, Fedora 16 did not yet
contain the necessary toolchain to support the new Guidelines, nor was
it clear that it would arrive in rawhide anytime soon.

Accordingly, the old MinGW guidelines were put back in place at:
https://fedoraproject.org/wiki/Packaging:MinGW

The new MinGW guidelines remain approved, but are not active and
packagers should not use them at this time. If/when the necessary
toolchain components are packaged in Fedora, these guidelines will be
re-enabled.

In addition, the current MinGW guidelines were improved slightly to
support the new SRPM naming standard. This is intended to prevent new
MinGW packages from having to be re-reviewed when the new MinGW
guidelines take effect.

---

These guidelines (and changes) were approved by the Fedora Packaging
Committee (FPC).

Many thanks to Kalev Lember, Matthew Miller, Michael Schwendt, and all
of the members of the FPC, for assisting in drafting, refining, and
passing these guidelines.

As a reminder: The Fedora Packaging Guidelines are living documents! If
you find something missing, incorrect, or in need of revision, you can
suggest a draft change. The procedure for this is documented here:
https://fedoraproject.org/wiki/Packaging/Committee#GuidelineChangeProcedure

Thanks,

~spot
___
devel-announce mailing list
devel-annou...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: systemd questions

2011-05-18 Thread Simo Sorce
On Mon, 2011-05-16 at 18:59 +0200, Lennart Poettering wrote:
 On Mon, 16.05.11 14:32, Michal Hlavinka (mhlav...@redhat.com) wrote:

  when ups recieves command for shutdown, it does not shutdown power 
  immediately, but after 30 seconds. Given that this command should be 
  executed 
  after umount, synced disks,... when everything is ready for power off...
  30 seconds proved to be enough time for this.
 
 This is not the case and never has been the case. The root disks
 traditionally could not be unmounted and hence MD/DM/MP and so on could
 not be disassembled before going down.
 
 Delaying shutdown by 30s is hack, not a fix for a race.

What race are we talking about exactly ?

You do realize that the *UPS* itself is programmed to shut down after 30
seconds ? there is no sleep(30) here ...

   UPS code like that needs to sit in the kernel itself to properly
   work. Adding userspace kludges which invokes this from userspace is a
   recipe for desaster. 
  
  If *you* wan't to write kernel drivers for tons of UPS models using 
  serial/usb/network/... connections with tons of protocols (with incomplete 
  documentation)... it's your freedom to do so ;)
 
 Well, what can I say. I don't maintain UPS stuff, I don't use UPS
 stuff.

Oh this was *very* clear, no doubt you have never seen one. And given
you haven't can you stop prescribing how things should work and instead
discuss how we can make things work as things stand now ?
You are the one pushing systemd, it is your duty to address the cases
when it has to step out of the perfect world and actually meet the
reality of how things actually work out there.

  I am just pointing you to the fact that the current approach here
 is racy, but sorry, I won't fix this for you.

Given a lot of UPSes have drivers written in proprietary Java programs
and communicate to the device via serial/usbserial, there isn't much you
can do on the kernel driver front.

You just need to provide for the right hooks so that the thing can be
called as close as possible from the actual halt, when the root
filesystem has been remounted r/o. And of course w/o killing the driver
before that happens.

Simo.

-- 
Simo Sorce * Red Hat, Inc * New York


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread cdahlin
On Wed, May 18, 2011 at 10:44:16AM -0700, Adam Williamson wrote:
 Well, I think his point is that it's almost certain that some 'unknown'
 exposures will become 'known' during the life cycle of a release, at
 which point the live images we release three months previously are
 vulnerable to a known security exploit and there's exactly nothing we
 can do about it

Yes.

 so worrying about the ones we _can_ fix at release
 time becomes less important, when viewed from that perspective.

No.

Shipping a  safe product is a goal that ethically demands our best
effort, even if we'll never be totally successful. Not being able to get
them all makes the ones we can get more important, not less.

--CJD
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Adam Jackson
On 5/18/11 1:44 PM, Adam Williamson wrote:
 On Wed, 2011-05-18 at 13:37 -0400, Adam Jackson wrote:
 On 5/18/11 1:22 PM, Kevin Kofler wrote:
 Adam Williamson wrote:
 # There must be no known remote code execution vulnerability which could
 be exploited during installation or during use of a live image shipped
 with the release

 This is just completely and utterly moot considering that there are going to
 be many more unknown vulnerabilities than known ones, and that several of
 those are inevitably going to come up during the 6-month lifetime of a
 release.

 The difference between a known and an unknown security bug is that, if
 _you_ know about it, it's virtually certain that someone malicious
 already does too.

 We can't avoid unknown risk exposure.  You're arguing for ignoring known
 risk exposure entirely.  Seems a touch irresponsible.

 Also: twelve month.

 Well, I think his point is that it's almost certain that some 'unknown'
 exposures will become 'known' during the life cycle of a release, at
 which point the live images we release three months previously are
 vulnerable to a known security exploit and there's exactly nothing we
 can do about it - so worrying about the ones we _can_ fix at release
 time becomes less important, when viewed from that perspective. It's a
 good point.

It's a rationally argued position, but argued from an initial state that 
does not reflect reality.

I mean, the conclusion from that line of reasoning is that all releases 
are futile: any sufficiently severe bug unknown at release time could be 
discovered later, and could be so crippling as to make the release useless.

I don't necessarily disagree with that logic either.  However, we've 
decided to do releases.  Therefore we ought to have some standard of 
quality for release content definition.  After that it's all a matter of 
drawing the line.  I'd argue that knowingly exposing the user to a 
remote root exploit is actively negligent behaviour; remote user code 
execution, less so but still very bad; local privilege escalation, less 
so still.

I'd rather not ship something that I _know_ will result in the user 
getting rooted.  This is so fundamental a tenet of quality that I have 
difficulty even believing someone could disagree.  I guess Kevin's brain 
is simply something I should stop being surprised by.

- ajax
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Special thanks to gnome3 and systemd developers

2011-05-18 Thread Ankur Sinha
On Wed, 2011-05-18 at 09:20 -0500, Bruno Wolff III wrote:
 While everyone that worked on the F15 release deserves thanks and
 congrats,
 I'd like to give a special thanks to the systemd and gnome3 developers
 because
 of the large amount of work needed to implement those features. By
 working
 hard to get these into F15, they helped meet Fedora's goal of being
 First. 

+1K



-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Summary/Minutes from today's FESCo meeting (2011-05-18)

2011-05-18 Thread Kevin Fenzi
===
#fedora-meeting: FESCO (2011-05-18)
===

Meeting started by nirik at 17:30:01 UTC. The full logs are available at
http://meetbot.fedoraproject.org/fedora-meeting/2011-05-18/fesco.2011-05-18-17.30.log.html

Meeting summary
---
* init process  (nirik, 17:30:01)

* #515 Investigate a features repo for stable releases  (nirik,
  17:32:32)
  * will remove from meeting agenda for now, will bring back up when
there is progress to report.  (nirik, 17:33:32)

* #563 suggested policy: all daemons must set RELRO and PIE flags
  (nirik, 17:33:41)
  * issue with pie, being followed up with binutils folks before we
enable globally.  (nirik, 17:35:35)

* #588 promote praveenp to sponsor  (nirik, 17:35:43)
  * AGREED: praveenp is approved for sponsor.  (nirik, 17:40:44)

* #589 Porting from sysVinit init scripts to systemd unit files  (nirik,
  17:41:06)
  * AGREED: Ask for a feature page to track and coordinate, will file a
FES ticket for any interested fes folks to work on them, try and get
done in f16, cleanups welcome while converting.  (nirik, 17:49:50)

* F15 and Elections  (nirik, 17:50:05)

* Open Floor  (nirik, 17:51:55)
  * kudos to everyone on f15.  (nirik, 17:55:27)

* #589 Porting from sysVinit init scripts to systemd unit files (redux)
  (nirik, 17:59:42)

* Open Floor again  (nirik, 18:21:52)

Meeting ended at 18:23:43 UTC.




Action Items






Action Items, by person
---
* **UNASSIGNED**
  * (none)




People Present (lines said)
---
* nirik (87)
* Viking-Ice (37)
* notting (12)
* cwickert (12)
* mjg59 (11)
* mmaslano (9)
* zodbot (8)
* ajax (7)
* mdomsch (4)
* kylem (3)
* SMParrish (0)
* mclasen (0)
--
17:30:01 nirik #startmeeting FESCO (2011-05-18)
17:30:01 zodbot Meeting started Wed May 18 17:30:01 2011 UTC.  The chair is 
nirik. Information about MeetBot at http://wiki.debian.org/MeetBot.
17:30:01 zodbot Useful Commands: #action #agreed #halp #info #idea #link 
#topic.
17:30:01 nirik #meetingname fesco
17:30:01 zodbot The meeting name has been set to 'fesco'
17:30:01 nirik #chair mclasen notting nirik SMParrish kylem ajax cwickert 
mjg59 mmaslano
17:30:01 zodbot Current chairs: SMParrish ajax cwickert kylem mclasen mjg59 
mmaslano nirik notting
17:30:01 nirik #topic init process
17:30:09 * notting is here
17:30:19 mjg59 Here
17:30:57 ajax also here
17:31:00 kylem yo
17:31:19 * nirik waves and waits another minute for more folks to wander in
17:31:42 * cwickert is here
17:31:56 * mmaslano here
17:32:22 nirik ok, lets go ahead and dive in.
17:32:32 nirik #topic #515 Investigate a features repo for stable releases
17:32:33 nirik .fesco 515
17:32:34 zodbot nirik: #515 (Investigate a features repo for stable 
releases) - FESCo - Trac - https://fedorahosted.org/fesco/ticket/515
17:32:37 nirik any news on this one?
17:32:44 cwickert nope, sorry
17:32:51 cwickert this is becoming a running gar
17:32:52 cwickert gag
17:33:00 cwickert I suggest we take it off the agenda for now
17:33:03 nirik no problem... lots of busyness with release coming up.
17:33:08 nirik ok, can do that...
17:33:13 cwickert I will set the meeting keyword once I have something to show
17:33:19 nirik sounds good.
17:33:32 nirik #info will remove from meeting agenda for now, will bring back 
up when there is progress to report.
17:33:41 nirik #topic #563 suggested policy: all daemons must set RELRO and 
PIE flags
17:33:41 nirik .fesco 563
17:33:42 zodbot nirik: #563 (suggested policy: all daemons must set RELRO and 
PIE flags) - FESCo - Trac - https://fedorahosted.org/fesco/ticket/563
17:33:54 nirik ajax: I think someone ran into an issue with this? so we are 
holding off on it for now?
17:34:24 ajax yeah, -pie implies a semantic change to apps that we think is 
unintentional
17:34:51 ajax it's being followed up with the binutils people though
17:34:57 nirik cool.
17:35:25 ajax hopefully i'll have an update (or better, a fix) next week
17:35:30 ajax defer in the meantime though
17:35:35 nirik #info issue with pie, being followed up with binutils folks 
before we enable globally.
17:35:37 nirik sounds good.
17:35:43 nirik #topic #588 promote praveenp to sponsor
17:35:43 nirik .fesco 588
17:35:44 zodbot nirik: #588 (promote praveenp to sponsor) - FESCo - Trac - 
https://fedorahosted.org/fesco/ticket/588
17:35:56 nirik This was a sponsor request that didn't get much feedback.
17:36:12 nirik mdomsch submitted them, as they are a active dell 
contributor...
17:36:20 nirik and they want someone to help dell folks get more involved.
17:36:23 notting much or any?
17:36:29 * nirik looks
17:36:50 nirik none.
17:36:58 nirik no negative, no positive.
17:37:39 mmaslano If mdomsh prepared him, I don't see any problem to give 
sponsorship to praveenp
17:38:01 * cwickert hasn't seen much of Praveen, but trusts Matt
17:38:36 nirik I assume there's an implicit +1 from mdomsch here. ;)
17:39:02 mmaslano yes

Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 19:22 +0200, Kevin Kofler wrote:
 Adam Williamson wrote:
  Hey, all. The topic of whether and which security issues should block
  releases has come up several times before.
 
 Indeed it has. The decision was always that it's not a good idea. I don't 
 see how the situation has changed to warrant beating that dead horse again.
 
  # There must be no known remote code execution vulnerability which could
  be exploited during installation or during use of a live image shipped
  with the release
 
 This is just completely and utterly moot considering that there are going to 
 be many more unknown vulnerabilities than known ones, and that several of 
 those are inevitably going to come up during the 6-month lifetime of a 
 release.

That's certainly a valid concern; does anyone have hard data on this?
Either way, it's certainly worth considering that we can do nothing
about issues that come to light after release, in relation to the
installer and live image.

 We have a process for security fixes, it's called updates. I don't see how 
 a 0-day update wouldn't be an appropriate resolution for a security issue.

 Now if you are talking about NTH, then yes, security fixes should be NTH. 
 Maybe even all of them. But I don't think we should be blocking or delaying 
 any release for them. We can't fix them all anyway.

No, this would be release blocker stuff, not NTH. But I'm floating a
balloon here; if most agree with you, we could consider adding security
issues to the NTH principles instead.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Fedora Talk: adamwill AT fedoraproject DOT org
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Tomas Mraz
On Wed, 2011-05-18 at 08:57 -0700, Adam Williamson wrote: 
 Hey, all. The topic of whether and which security issues should block
 releases has come up several times before. While we haven't actually had
 many really serious security issues to worry about since the
 introduction of the current release criteria system, I think it's
 certainly something we should take into account. At the same time, it's
 fairly established in practice that we don't just consider anything
 worth issuing a CVE for as a release-blocking bug. So, to capture what I
 believe would be the intent of the project, I propose this as an Alpha
 release criterion for F16 onwards. (For those on devel and security
 lists who may not be completely familiar with the release criteria /
 blocker system, this would mean that any bug for an issue which breached
 the criterion should be considered a release blocker for any Alpha, Beta
 or Final release).
 
 # There must be no known remote code execution vulnerability which could
 be exploited during installation or during use of a live image shipped
 with the release

I mostly agree with this criterion with one exception below.

 Points to consider:
 
 * Possible variants to the type of vulnerability covered...do we also
 want to make local privesc vulns blocking? Conversely, do we want to
 make only remote *root* execution vulns blocking? I don't know if anyone
 would want to go as far as making DoS vulns release blocking, but speak
 up if you would! (Of course there is again the local/remote distinction
 to consider there: 'all DoS vulns' would be a much tighter standard than
 'remote DoS vulns').
 
 * The caveat about where the issue is exploitable is important because
 if you can't exploit it from the installer or a live image, it becomes
 less relevant whether we ship with it or not, because you would be safe
 with the first post-install update assuming we submitted an update for
 the issue promptly. But it may be the case that we want to broaden it
 out to also cover issues that can be exploited from a default DVD
 install, if we consider the window between install and first update (if
 updates repos aren't used during installation) to be unacceptable.

I would vote for this slight broadening - that is to make also remotely
exploitable issue in the default DVD install a release blocker.

-- 
Tomas Mraz
No matter how far down the wrong road you've gone, turn back.
  Turkish proverb

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Simo Sorce
On Wed, 2011-05-18 at 10:44 -0700, Adam Williamson wrote:
 On Wed, 2011-05-18 at 13:37 -0400, Adam Jackson wrote:
  On 5/18/11 1:22 PM, Kevin Kofler wrote:
   Adam Williamson wrote:
   # There must be no known remote code execution vulnerability which could
   be exploited during installation or during use of a live image shipped
   with the release
  
   This is just completely and utterly moot considering that there are going 
   to
   be many more unknown vulnerabilities than known ones, and that several of
   those are inevitably going to come up during the 6-month lifetime of a
   release.
  
  The difference between a known and an unknown security bug is that, if 
  _you_ know about it, it's virtually certain that someone malicious 
  already does too.
  
  We can't avoid unknown risk exposure.  You're arguing for ignoring known 
  risk exposure entirely.  Seems a touch irresponsible.
  
  Also: twelve month.
 
 Well, I think his point is that it's almost certain that some 'unknown'
 exposures will become 'known' during the life cycle of a release, at
 which point the live images we release three months previously are
 vulnerable to a known security exploit and there's exactly nothing we
 can do about it - so worrying about the ones we _can_ fix at release
 time becomes less important, when viewed from that perspective. It's a
 good point.

Is it unthinkable to respin the images with those fixes ?
Usually the patches are quite simple to backport, and we are talking
about a limited set of bugs (remote root exploit on install) after all.

Simo.


-- 
Simo Sorce * Red Hat, Inc * New York


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 14:40 -0400, Simo Sorce wrote:

 Is it unthinkable to respin the images with those fixes ?
 Usually the patches are quite simple to backport, and we are talking
 about a limited set of bugs (remote root exploit on install) after all.

Unthinkable, no, but there are various practical issues with doing
official re-spins which have meant it's never actually happened, and the
project for doing it semi-externally - Unity - is often way behind. One
that I wasn't previously aware of, which Spot explained to me recently,
is U.S. export regulations; we have to go through a long and tedious
regulatory process for official builds, and no-one's particularly keen
to start doing that multiple times per cycle for respins.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Fedora Talk: adamwill AT fedoraproject DOT org
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Tomas Mraz
On Wed, 2011-05-18 at 14:02 -0400, Adam Jackson wrote: 
 On 5/18/11 1:44 PM, Adam Williamson wrote:
  On Wed, 2011-05-18 at 13:37 -0400, Adam Jackson wrote:
  On 5/18/11 1:22 PM, Kevin Kofler wrote:
  Adam Williamson wrote:
  # There must be no known remote code execution vulnerability which could
  be exploited during installation or during use of a live image shipped
  with the release
 
  This is just completely and utterly moot considering that there are going 
  to
  be many more unknown vulnerabilities than known ones, and that several of
  those are inevitably going to come up during the 6-month lifetime of a
  release.
 
  The difference between a known and an unknown security bug is that, if
  _you_ know about it, it's virtually certain that someone malicious
  already does too.
 
  We can't avoid unknown risk exposure.  You're arguing for ignoring known
  risk exposure entirely.  Seems a touch irresponsible.
 
  Also: twelve month.
 
  Well, I think his point is that it's almost certain that some 'unknown'
  exposures will become 'known' during the life cycle of a release, at
  which point the live images we release three months previously are
  vulnerable to a known security exploit and there's exactly nothing we
  can do about it - so worrying about the ones we _can_ fix at release
  time becomes less important, when viewed from that perspective. It's a
  good point.
 
 It's a rationally argued position, but argued from an initial state that 
 does not reflect reality.
 
 I mean, the conclusion from that line of reasoning is that all releases 
 are futile: any sufficiently severe bug unknown at release time could be 
 discovered later, and could be so crippling as to make the release useless.
 
 I don't necessarily disagree with that logic either.  However, we've 
 decided to do releases.  Therefore we ought to have some standard of 
 quality for release content definition.  After that it's all a matter of 
 drawing the line.  I'd argue that knowingly exposing the user to a 
 remote root exploit is actively negligent behaviour; remote user code 
 execution, less so but still very bad; local privilege escalation, less 
 so still.
 
 I'd rather not ship something that I _know_ will result in the user 
 getting rooted.  This is so fundamental a tenet of quality that I have 
 difficulty even believing someone could disagree.  I guess Kevin's brain 
 is simply something I should stop being surprised by.

Also note that targeting the heaps of poor users that are eager to try
the newly shipped Fedora release would be probably much more easy and
efficient than targeting one user installing the Fedora here or there a
few months later. So yes, definitely remote root and user exploits in
the installer, Live CDs, and in my opinion also the default install
should be release blockers.

By the way do we have statistics about when this kind of blockers
happened during our previous releases?
-- 
Tomas Mraz
No matter how far down the wrong road you've gone, turn back.
  Turkish proverb

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


[Bug 701252] Upgrade to new upstream version

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=701252

--- Comment #10 from Fedora Update System upda...@fedoraproject.org 
2011-05-18 15:58:36 EDT ---
perl-Directory-Queue-1.1-1.el5 has been pushed to the Fedora EPEL 5 stable
repository.  If problems still persist, please make note of it in this bug
report.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 701252] Upgrade to new upstream version

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=701252

Fedora Update System upda...@fedoraproject.org changed:

   What|Removed |Added

   Fixed In Version|perl-Directory-Queue-1.1-1. |perl-Directory-Queue-1.1-1.
   |fc14|el6

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 701252] Upgrade to new upstream version

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=701252

--- Comment #11 from Fedora Update System upda...@fedoraproject.org 
2011-05-18 15:59:04 EDT ---
perl-Directory-Queue-1.1-1.el4 has been pushed to the Fedora EPEL 4 stable
repository.  If problems still persist, please make note of it in this bug
report.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 701252] Upgrade to new upstream version

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=701252

--- Comment #9 from Fedora Update System upda...@fedoraproject.org 2011-05-18 
15:57:32 EDT ---
perl-Directory-Queue-1.1-1.el6 has been pushed to the Fedora EPEL 6 stable
repository.  If problems still persist, please make note of it in this bug
report.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 701252] Upgrade to new upstream version

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=701252

Fedora Update System upda...@fedoraproject.org changed:

   What|Removed |Added

   Fixed In Version|perl-Directory-Queue-1.1-1. |perl-Directory-Queue-1.1-1.
   |el5 |el4

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 701252] Upgrade to new upstream version

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=701252

Fedora Update System upda...@fedoraproject.org changed:

   What|Removed |Added

   Fixed In Version|perl-Directory-Queue-1.1-1. |perl-Directory-Queue-1.1-1.
   |el6 |el5

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


Re: Security release criterion proposal

2011-05-18 Thread Kevin Kofler
Adam Jackson wrote:
 The difference between a known and an unknown security bug is that, if
 _you_ know about it, it's virtually certain that someone malicious
 already does too.
 
 We can't avoid unknown risk exposure.  You're arguing for ignoring known
 risk exposure entirely.  Seems a touch irresponsible.

Unknown risk exposure can become known after the release and we'd have to 
respin all our images for every single security fix to address that. This is 
just not practical.

 Also: twelve month.

13 months if you go by that metric, but the 6 months I mentioned are the 
time between 2 releases, i.e. the time that can pass in the worst case until 
we release fixed images.

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread dr johnson
Few questions here:

What does this scope include?  Is it merely the LiveCD for GNOME and KDE?
Does it also include the DVD install selections for both of these packages?
(They are different)

What about clearly vulnerable areas, like Web Sever that is push-button
selectable on install?

Do we make a list of what is installed in these situations and create a
watch-list like “crit-path”?

IMHO, Local and remote privilege escalation issues with the default
configurations should block the release if they are known prior to making
the release.  My only questions are scope definitions that would clarify
exactly what packages we are talking about here.

Earlier, someone kindly wrote a STIG script to analyze an installed system.
Fixing these permission defaults would go a ways to mitigating issues.

Poly-instantiated-tmpdirs would also be NTH by default.  Confined users by
default would also be an awesome plan.  (I can go on, but the big plan is to
have a secure by default install, and let the users define where they want
to open access up.  Anything the user does after firstboot should really not
be covered here.)

We have to define a clear scope before a decent decision.


 -dj




On Wed, May 18, 2011 at 1:51 PM, Adam Williamson awill...@redhat.comwrote:

 On Wed, 2011-05-18 at 14:40 -0400, Simo Sorce wrote:

  Is it unthinkable to respin the images with those fixes ?
  Usually the patches are quite simple to backport, and we are talking
  about a limited set of bugs (remote root exploit on install) after all.

 Unthinkable, no, but there are various practical issues with doing
 official re-spins which have meant it's never actually happened, and the
 project for doing it semi-externally - Unity - is often way behind. One
 that I wasn't previously aware of, which Spot explained to me recently,
 is U.S. export regulations; we have to go through a long and tedious
 regulatory process for official builds, and no-one's particularly keen
 to start doing that multiple times per cycle for respins.
 --
 Adam Williamson
 Fedora QA Community Monkey
 IRC: adamw | Fedora Talk: adamwill AT fedoraproject DOT org
 http://www.happyassassin.net

 --
 devel mailing list
 devel@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Security release criterion proposal

2011-05-18 Thread Kevin Kofler
Adam Jackson wrote:
 It's a rationally argued position, but argued from an initial state that
 does not reflect reality.
 
 I mean, the conclusion from that line of reasoning is that all releases
 are futile: any sufficiently severe bug unknown at release time could be
 discovered later, and could be so crippling as to make the release
 useless.
 
 I don't necessarily disagree with that logic either.  However, we've
 decided to do releases.  Therefore we ought to have some standard of
 quality for release content definition.  After that it's all a matter of
 drawing the line.  I'd argue that knowingly exposing the user to a
 remote root exploit is actively negligent behaviour; remote user code
 execution, less so but still very bad; local privilege escalation, less
 so still.

The thing is, if we block the release for each and every known security 
issue, considering the time passing between notification and public 
availability of a fix, we will never be able to release anything. We have to 
draw the line somewhere, and the best way to do it is to use our time-based 
schedule.

We have done 15 releases successfully that way, what's the reason for 
changing this approach now? And how can this not lead to a chain of slippage 
where each slippage for a security fix causes several new security fixes to 
pop up, for which we slip again, ad infinitum?

We cannot fix all security issues any more that we can fix all bugs. We have 
to get SOMETHING out at some point.

 I'd rather not ship something that I _know_ will result in the user
 getting rooted.  This is so fundamental a tenet of quality that I have
 difficulty even believing someone could disagree.  I guess Kevin's brain
 is simply something I should stop being surprised by.

You don't KNOW that it will get the user rooted. Now if the hole is in a 
service listening to the Internet by default and is getting exploited by an 
automated worm, you can reasonably say that it WILL get the user rooted, but 
if it's e.g. a browser vulnerability, it will only hit the users if and when 
they access an infected or malicious site. Hopefully they'll have installed 
our 0-day security fix by then! (I'd hope sites like start.fedoraproject.org 
will not carry some trojan horse!)

And your logic is flawed in that you assume that every user installs Fedora 
the day of the release. That's actually very far from the truth. All your 
efforts to release without known security vulnerabilities are for naught 
when the next one inevitably comes up soon after the release and there won't 
be a fixed set of live images for 6 months.

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 15:43 -0500, dr johnson wrote:
 
 Few questions here:
 
 What does this scope include?  Is it merely the LiveCD for GNOME and
 KDE?  Does it also include the DVD install selections for both of
 these packages?  (They are different)

Well, that's part of the discussion I wanted to start. As written it
covers anything that actually runs as part of the installation sequence
on the DVD and anything you can run directly from within one of the
published live images, it's less concerned with post-install scenarios.

 Do we make a list of what is installed in these situations and create
 a watch-list like “crit-path”?

As I wrote in a previous reply, implementation of planned testing and
validation for criteria is a rather different topic from definition of
the criteria, and it's probably best to discuss them separately.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Fedora Talk: adamwill AT fedoraproject DOT org
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Security release criterion proposal

2011-05-18 Thread Adam Jackson
On 5/18/11 4:49 PM, Kevin Kofler wrote:
 The thing is, if we block the release for each and every known security
 issue, considering the time passing between notification and public
 availability of a fix, we will never be able to release anything. We have to
 draw the line somewhere, and the best way to do it is to use our time-based
 schedule.

False induction.

 I'd rather not ship something that I _know_ will result in the user
 getting rooted.  This is so fundamental a tenet of quality that I have
 difficulty even believing someone could disagree.  I guess Kevin's brain
 is simply something I should stop being surprised by.

 You don't KNOW that it will get the user rooted. Now if the hole is in a
 service listening to the Internet by default and is getting exploited by an
 automated worm, you can reasonably say that it WILL get the user rooted, but
 if it's e.g. a browser vulnerability, it will only hit the users if and when
 they access an infected or malicious site. Hopefully they'll have installed
 our 0-day security fix by then! (I'd hope sites like start.fedoraproject.org
 will not carry some trojan horse!)

Now you're drawing lines.  Before you were saying this is impossible, 
we shouldn't try.  Moving the goalposts.

I'm done arguing with you on this, it's clear you don't know how.

- ajax
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Kevin Kofler
Tomas Mraz wrote:
 Also note that targeting the heaps of poor users that are eager to try
 the newly shipped Fedora release would be probably much more easy and
 efficient than targeting one user installing the Fedora here or there a
 few months later.

Huh? The heaps of users do not install Fedora the day of the release. Only 
very few very enthousiastic and very impatient early adopters do that (and I 
blame them for needlessly swamping our mirrors). Actual users, especially 
those most likely to try out and install from live images (as opposed to 
e.g. upgrading an existing release using preupgrade, which pulls in updates 
automatically), install Fedora whenever they discover it, which can be at 
any time of our release cycle.

For example, we gave out a few dozen Fedora 14 live media less than 2 weeks 
ago at Linuxwochen Wien!

And for several practical reasons I don't want to go into here, the media we 
handed out at the event were all GA images, not respins. Users downloading 
the images themselves will probably also opt for the GA ISOs we officially 
distribute, not unofficial respins we do not officially endorse.

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: systemd questions

2011-05-18 Thread Lennart Poettering
On Mon, 16.05.11 14:30, Simo Sorce (sso...@redhat.com) wrote:

 
 On Mon, 2011-05-16 at 18:59 +0200, Lennart Poettering wrote:
  On Mon, 16.05.11 14:32, Michal Hlavinka (mhlav...@redhat.com) wrote:
 
   when ups recieves command for shutdown, it does not shutdown power 
   immediately, but after 30 seconds. Given that this command should be 
   executed 
   after umount, synced disks,... when everything is ready for power off...
   30 seconds proved to be enough time for this.
  
  This is not the case and never has been the case. The root disks
  traditionally could not be unmounted and hence MD/DM/MP and so on could
  not be disassembled before going down.
  
  Delaying shutdown by 30s is hack, not a fix for a race.
 
 What race are we talking about exactly ?

Host requests power down from UPS in 30s. Host then continues shut
down. If the host now ends up taking more time then expected for
shutting down it might still be busy at the time of the power going
away. It's a race between UPS powering off and system finishing
shutdown. It's a bet that your system is faster than 30s when
unmounting the remaining file systems, syncing the MD/DM metadata to
disk, syncing ATA and so on (i.e. all the stuff the kernel does when you
invoke the reboot() syscall).

 You do realize that the *UPS* itself is programmed to shut down after
 30 seconds ? there is no sleep(30) here ...

Yes, but that is irrelevant for the race.

UPS code like that needs to sit in the kernel itself to properly
work. Adding userspace kludges which invokes this from userspace is a
recipe for desaster. 
   
   If *you* wan't to write kernel drivers for tons of UPS models using 
   serial/usb/network/... connections with tons of protocols (with 
   incomplete 
   documentation)... it's your freedom to do so ;)
  
  Well, what can I say. I don't maintain UPS stuff, I don't use UPS
  stuff.
 
 Oh this was *very* clear, no doubt you have never seen one. And given
 you haven't can you stop prescribing how things should work and instead
 discuss how we can make things work as things stand now ?

Well, I am not stupid. I can see a race when there is one. Are you claiming
the race above doesn't exist?

 You are the one pushing systemd, it is your duty to address the cases
 when it has to step out of the perfect world and actually meet the
 reality of how things actually work out there.

Right, and so I did. And I also pointed out that the current scheme is
borked.

   I am just pointing you to the fact that the current approach here
  is racy, but sorry, I won't fix this for you.
 
 Given a lot of UPSes have drivers written in proprietary Java programs
 and communicate to the device via serial/usbserial, there isn't much you
 can do on the kernel driver front.

Hmm?

I am pretty sure we don't want to run Java programs at late boot, as
root. This would be really bad.

In F16 we hope to make it possible to unmount the root fs at
shutdown. It will be the first time we can do something like this. To
implement this we'll have to copy the shutdown code into a tmpfs and
then replace the root dir with the tmpfs. We definitely don't want to
copy the JRE into the tmpfs before going down. 

Lennart

-- 
Lennart Poettering - Red Hat, Inc.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Kevin Kofler
Adam Jackson wrote:

 On 5/18/11 4:49 PM, Kevin Kofler wrote:
 The thing is, if we block the release for each and every known security
 issue, considering the time passing between notification and public
 availability of a fix, we will never be able to release anything. We have
 to draw the line somewhere, and the best way to do it is to use our
 time-based schedule.
 
 False induction.

Uh no, you can't dismiss my argument that easily…

If, say, it takes 2 weeks to get a fix for a critical security issue 
published/publishable (i.e. developed and put out of embargo), and if 
there's at least 1 critical security vulnerability in every 2-week interval, 
we will mathematically never be able to release if we treat all critical 
security vulnerabilities as blockers. (And that sentence remains true no 
matter how you define critical.) And this is just one of the possible 
constellations, and a very simplified one to prove my point. In practice, 
things are much more stochastic, but there are many possible scenarios in 
which each slippage will cause another.

You show no evidence whatsoever showing that this is not going to happen. So 
this means you MUST consider the scenario I pointed out at least as a worst-
case scenario. (Empirically, I'd actually expect it to be the average-case 
scenario, but I'll admit I have no statistical evidence to support that.)

 Now you're drawing lines.  Before you were saying this is impossible,
 we shouldn't try.  Moving the goalposts.

Call me when you see a security issue which actually fits my description 
(i.e. an automated worm which successfully exploits a service that's enabled 
by default, listening to more than just localhost by default and not 
firewalled by default), and that during the short release candidate time 
window, even. I haven't seen it happen in any of the 14 releases we did nor 
the 15th we're doing now, and I don't see it happening any time soon. This 
is purely theoretical.

Now I won't object to putting this exact item on the blocker list, but I 
don't expect it to get invoked, ever. I DO object to putting anything 
security-related OTHER than that up as a blocker, because we need to release 
at some point.

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: systemd questions

2011-05-18 Thread Robert Nichols
On 05/18/2011 04:04 PM, Lennart Poettering wrote:
 Host requests power down from UPS in 30s. Host then continues shut
 down. If the host now ends up taking more time then expected for
 shutting down it might still be busy at the time of the power going
 away. It's a race between UPS powering off and system finishing
 shutdown. It's a bet that your system is faster than 30s when
 unmounting the remaining file systems, syncing the MD/DM metadata to
 disk, syncing ATA and so on (i.e. all the stuff the kernel does when you
 invoke the reboot() syscall).

Here's another race.  Host requests power down from UPS in 30s.  Host
completes shutdown.  At some point during that 30s interval, commercial
power is restored.  Result: Host shuts down and never restarts.  Sorry
about that.

The way I've always prevented that is to have the host do a reboot,
not a shutdown, but send an immediate shutdown command to the UPS
just before sending control to the BIOS for the reboot.

-- 
Bob Nichols NOSPAM is really part of my email address.
 Do NOT delete it.

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Call for help: porting Sugar to NetworkManager 0.9 for Fedora 15

2011-05-18 Thread Adam Williamson
Hey, all. So, although the Fedora 15 final release has been signed off
on, we gave ourselves a bit of wiggle room. The current Sugar
implementation is known to have some significant issues, the major one
of which is that networking is badly broken. We are aiming to try and
fix these and do the Sugar-on-a-stick live spin late, incorporating
these fixes, as they do not need to touch any of the other live images
or the DVD.

The problem with networking is the NetworkManager 0.9 API change; it
caught Sugar, both upstream and within Fedora, a bit off guard. When the
change was discussed by FESCo the needs of KDE and anaconda were
considered and a plan developed, but no-one caught that the same problem
affected Sugar: Sugar has its own interface to NetworkManager, and that
needs to be either ported to 0.9, or adjusted to use the fallback 0.8ish
API that was implemented for knetworkmanager to use.

Unfortunately, our go-to Sugar guy, Peter Robinson, is struggling with
doing this as it's not really in his wheelhouse, and our upstream
contact at Sugar is busy with travel and Sugar release problems, so
getting this done has not been smooth sailing so far. Peter would be
very grateful of any help anyone could offer with the porting effort (to
either the 0.9 or 0.8-ish interface within current NetworkManager; we
don't care which, we just want typical Sugar networking to work.

We'd like to get this done so we can still spin up a Sugar live image
and push it out for release day, which is May 24, but in any case, the
sooner the better. If you'd like to help with this, please contact
Peter, myself, or Jared Smith via email or IRC, or just reply to this
mail. Peter's IRC nick is pbrobinson, mine is adamw, and Jared's is
jsmith. Thanks a lot!
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Fedora Talk: adamwill AT fedoraproject DOT org
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: systemd questions

2011-05-18 Thread Simo Sorce
On Wed, 2011-05-18 at 23:04 +0200, Lennart Poettering wrote:
 On Mon, 16.05.11 14:30, Simo Sorce (sso...@redhat.com) wrote:
 
  
  On Mon, 2011-05-16 at 18:59 +0200, Lennart Poettering wrote:
   On Mon, 16.05.11 14:32, Michal Hlavinka (mhlav...@redhat.com) wrote:
  
when ups recieves command for shutdown, it does not shutdown power 
immediately, but after 30 seconds. Given that this command should be 
executed 
after umount, synced disks,... when everything is ready for power off...
30 seconds proved to be enough time for this.
   
   This is not the case and never has been the case. The root disks
   traditionally could not be unmounted and hence MD/DM/MP and so on could
   not be disassembled before going down.
   
   Delaying shutdown by 30s is hack, not a fix for a race.
  
  What race are we talking about exactly ?
 
 Host requests power down from UPS in 30s. Host then continues shut
 down. If the host now ends up taking more time then expected for
 shutting down it might still be busy at the time of the power going
 away. It's a race between UPS powering off and system finishing
 shutdown. It's a bet that your system is faster than 30s when
 unmounting the remaining file systems, syncing the MD/DM metadata to
 disk, syncing ATA and so on (i.e. all the stuff the kernel does when you
 invoke the reboot() syscall).

You do realize that it is a race to get it done before the UPS runs out
of battery anyway ?

It's not perfect, but sysadmins are capable of assessing how much time
each of their server needs to shut down and make the UPS wait long
enough (battery permitting of course).

  You do realize that the *UPS* itself is programmed to shut down after
  30 seconds ? there is no sleep(30) here ...
 
 Yes, but that is irrelevant for the race.

Call it a race, call it a run, doesn't matter it is how things works in
this world right now.

I guess you could try to convince UPS vendors to use better ways, but
that's not how physical devices available to the public work right now.

 UPS code like that needs to sit in the kernel itself to properly
 work. Adding userspace kludges which invokes this from userspace is a
 recipe for desaster. 

If *you* wan't to write kernel drivers for tons of UPS models using 
serial/usb/network/... connections with tons of protocols (with 
incomplete 
documentation)... it's your freedom to do so ;)
   
   Well, what can I say. I don't maintain UPS stuff, I don't use UPS
   stuff.
  
  Oh this was *very* clear, no doubt you have never seen one. And given
  you haven't can you stop prescribing how things should work and instead
  discuss how we can make things work as things stand now ?
 
 Well, I am not stupid. I can see a race when there is one. Are you claiming
 the race above doesn't exist?

You are looking at the finger while people are pointing to the moon
right now.

  You are the one pushing systemd, it is your duty to address the cases
  when it has to step out of the perfect world and actually meet the
  reality of how things actually work out there.
 
 Right, and so I did. And I also pointed out that the current scheme is
 borked.

I am sorry that reality bothers you so much, but it is the hard old real
world ...

I am just pointing you to the fact that the current approach here
   is racy, but sorry, I won't fix this for you.
  
  Given a lot of UPSes have drivers written in proprietary Java programs
  and communicate to the device via serial/usbserial, there isn't much you
  can do on the kernel driver front.
 
 Hmm?
 
 I am pretty sure we don't want to run Java programs at late boot, as
 root. This would be really bad.

You know, it's not like there is a choice for many models ...

 In F16 we hope to make it possible to unmount the root fs at
 shutdown. It will be the first time we can do something like this. To
 implement this we'll have to copy the shutdown code into a tmpfs and
 then replace the root dir with the tmpfs. We definitely don't want to
 copy the JRE into the tmpfs before going down. 

It is not necessary, the hook can be called before you do that last
operation, the driver will command the UPS to wait long enough for that
operation to finish in time in 99% of the cases.
For the remaining 1% of the cases, admins will have to re-tune the delay
once power comes up and they find it wasn't enough time after all.

Simo.

-- 
Simo Sorce * Red Hat, Inc * New York


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: systemd questions

2011-05-18 Thread Simo Sorce
On Wed, 2011-05-18 at 16:48 -0500, Robert Nichols wrote:
 On 05/18/2011 04:04 PM, Lennart Poettering wrote:
  Host requests power down from UPS in 30s. Host then continues shut
  down. If the host now ends up taking more time then expected for
  shutting down it might still be busy at the time of the power going
  away. It's a race between UPS powering off and system finishing
  shutdown. It's a bet that your system is faster than 30s when
  unmounting the remaining file systems, syncing the MD/DM metadata to
  disk, syncing ATA and so on (i.e. all the stuff the kernel does when you
  invoke the reboot() syscall).
 
 Here's another race.  Host requests power down from UPS in 30s.  Host
 completes shutdown.  At some point during that 30s interval, commercial
 power is restored.  Result: Host shuts down and never restarts.  Sorry
 about that.
 
 The way I've always prevented that is to have the host do a reboot,
 not a shutdown, but send an immediate shutdown command to the UPS
 just before sending control to the BIOS for the reboot.

What you should do is to configure the BIOS to always boot on power-up.

This way the UPS will remove power, figure out power is returned,
reapply power and the BIOS will reboot the machine.

That's how this problem should normally be handled, then there is the
reality of broken BIOSes, broken UPSs, and general unlucky
circumstances :)

Simo.

-- 
Simo Sorce * Red Hat, Inc * New York


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


F-15 Branched report: 20110518 changes

2011-05-18 Thread Branched Report
Compose started at Wed May 18 13:15:47 UTC 2011

Broken deps for x86_64
--
db4o-7.4-2.fc13.x86_64 requires mono(Mono.GetOptions) = 0:2.0.0.0
dh-make-0.55-3.fc15.noarch requires debhelper
file-browser-applet-0.6.6-1.fc15.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
glunarclock-0.34.1-1.fc14.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-applet-bubblemon-2.0.15-1.fc13.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-applet-cpufire-1.6-3.fc14.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-applet-globalmenu-0.7.9-1.fc15.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-applet-grandr-0.4.1-2.fc12.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-applet-music-2.5.1-5.fc15.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-applet-sensors-2.2.7-4.fc15.i686 requires libpanel-applet-2.so.0
gnome-applet-sensors-2.2.7-4.fc15.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-applet-sshmenu-3.18-3.fc15.noarch requires ruby(panelapplet2)
gnome-applet-window-picker-0.5.8-2.fc14.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
1:gnome-applets-2.32.0-3.fc15.x86_64 requires 
libpanel-applet-3.so.0()(64bit)
1:gnome-applets-2.32.0-3.fc15.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
1:gnome-applets-2.32.0-3.fc15.x86_64 requires libgweather.so.1()(64bit)
gnome-netstatus-2.28.2-1.fc15.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-pilot-conduits-2.32.1-2.fc15.x86_64 requires 
libgpilotd.so.5()(64bit)
gnome-pilot-conduits-2.32.1-2.fc15.x86_64 requires 
libgpilotdcm.so.4()(64bit)
gnome-pilot-conduits-2.32.1-2.fc15.x86_64 requires 
libgpilotdconduit.so.3()(64bit)
gnome-python2-applet-2.32.0-1.fc14.x86_64 requires 
libpanel-applet-2.so.0()(64bit)
gnome-python2-brasero-2.32.0-1.fc14.x86_64 requires 
libbrasero-media.so.1()(64bit)
gnome-python2-brasero-2.32.0-1.fc14.x86_64 requires 
libbrasero-burn.so.1()(64bit)
gnome-python2-evince-2.32.0-1.fc14.x86_64 requires 
libevview.so.3()(64bit)
gnome-python2-evince-2.32.0-1.fc14.x86_64 requires 
libevdocument.so.3()(64bit)
gnome-python2-evolution-2.32.0-1.fc14.x86_64 requires 
libcamel-1.2.so.19()(64bit)
gnome-python2-gdl-2.25.3-22.fc15.x86_64 requires libgdl-1.so.3()(64bit)
gnome-python2-totem-2.32.0-1.fc14.x86_64 requires 
libgnome-media-profiles.so.0()(64bit)
gnome-rdp-0.2.3-6.fc12.x86_64 requires mono(Mono.Data.SqliteClient) = 
0:2.0.0.0
gnotime-2.3.0-8.fc15.x86_64 requires libgtkhtml-3.15.so.19()(64bit)
gnubiff-2.2.13-4.fc15.x86_64 requires libpanel-applet-2.so.0()(64bit)
gnustep-back-0.18.0-4.fc14.x86_64 requires libobjc.so.2()(64bit)
gnustep-back-0.18.0-4.fc14.x86_64 requires 
libgnustep-base.so.1.20()(64bit)
gnustep-examples-1.3.0-4.fc15.x86_64 requires 
libgnustep-base.so.1.20()(64bit)
gnustep-examples-1.3.0-4.fc15.x86_64 requires libobjc.so.2()(64bit)
gnustep-gui-0.18.0-2.fc14.x86_64 requires 
libgnustep-base.so.1.20()(64bit)
gnustep-gui-0.18.0-2.fc14.x86_64 requires libobjc.so.2()(64bit)
gnustep-gui-libs-0.18.0-2.fc14.i686 requires libobjc.so.2
gnustep-gui-libs-0.18.0-2.fc14.i686 requires libgnustep-base.so.1.20
gnustep-gui-libs-0.18.0-2.fc14.x86_64 requires 
libgnustep-base.so.1.20()(64bit)
gnustep-gui-libs-0.18.0-2.fc14.x86_64 requires libobjc.so.2()(64bit)
gold-2.1.12.2-5.fc15.noarch requires perl(Data::Properties)
gorm-1.2.12-2.fc15.i686 requires libobjc.so.2
gorm-1.2.12-2.fc15.i686 requires libgnustep-base.so.1.20
gorm-1.2.12-2.fc15.x86_64 requires libgnustep-base.so.1.20()(64bit)
gorm-1.2.12-2.fc15.x86_64 requires libobjc.so.2()(64bit)
gpx-viewer-0.2.0-3.fc14.x86_64 requires libchamplain-0.6.so.0()(64bit)
gpx-viewer-0.2.0-3.fc14.x86_64 requires 
libchamplain-gtk-0.6.so.0()(64bit)
gpx-viewer-0.2.0-3.fc14.x86_64 requires libgdl-1.so.3()(64bit)
gyachi-plugin-libnotify-1.2.10-3.fc14.x86_64 requires 
libnotify.so.1()(64bit)
honeyd-1.5c-13.fc15.x86_64 requires libevent-1.4.so.2()(64bit)
intellij-idea-9.0.1.94.399-12.fc15.x86_64 requires commons-collections
libopenvrml-0.18.6-4.fc14.1.i686 requires libboost_thread-mt.so.1.44.0
libopenvrml-0.18.6-4.fc14.1.i686 requires 
libboost_filesystem-mt.so.1.44.0
libopenvrml-0.18.6-4.fc14.1.x86_64 requires 
libboost_filesystem-mt.so.1.44.0()(64bit)
libopenvrml-0.18.6-4.fc14.1.x86_64 requires 
libboost_thread-mt.so.1.44.0()(64bit)
libopenvrml-gl-0.18.6-4.fc14.1.i686 requires 
libboost_thread-mt.so.1.44.0
libopenvrml-gl-0.18.6-4.fc14.1.i686 requires 
libboost_filesystem-mt.so.1.44.0
libopenvrml-gl-0.18.6-4.fc14.1.x86_64 requires 
libboost_filesystem-mt.so.1.44.0()(64bit)
  

Re: systemd questions

2011-05-18 Thread Matthew Garrett
On Wed, May 18, 2011 at 07:42:17PM -0400, Simo Sorce wrote:

  I am pretty sure we don't want to run Java programs at late boot, as
  root. This would be really bad.
 
 You know, it's not like there is a choice for many models ...

That's really not a given. For anything short of us having to send http 
requests, there's no fundamental reason why this can't be done 
in-kernel. For cases where we do have to send http requests, well, 
that's kind of a separate issue (you want to run java after you've 
unmounted all the filesystems?)

 It is not necessary, the hook can be called before you do that last
 operation, the driver will command the UPS to wait long enough for that
 operation to finish in time in 99% of the cases.
 For the remaining 1% of the cases, admins will have to re-tune the delay
 once power comes up and they find it wasn't enough time after all.

Or we could work on fixing the problem. We're not talking about an 
incredibly large maount of code.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: systemd questions

2011-05-18 Thread Genes MailLists
On 05/18/2011 09:06 PM, Matthew Garrett wrote:
 On Wed, May 18, 2011 at 07:42:17PM -0400, Simo Sorce wrote:

 You know, it's not like there is a choice for many models ...
 
 That's really not a given. For anything short of us having to send http 
 requests, there's no fundamental reason why this can't be done 
 in-kernel. For cases where we do have to send http requests, well, 
 that's kind of a separate issue (you want to run java after you've 
 unmounted all the filesystems?)


  A bunch of individual UPS kernel drivers feels inappropriate to me.

 But if there is some common kernel functionality that could be used by
and help all UPS devices that feels more reasonable. What functionality
do think needs be added to the kernel so that the userspace UPS code
could be better ?


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: systemd questions

2011-05-18 Thread Robert Nichols
On 05/18/2011 06:42 PM, Simo Sorce wrote:
 On Wed, 2011-05-18 at 16:48 -0500, Robert Nichols wrote:
 On 05/18/2011 04:04 PM, Lennart Poettering wrote:
 Host requests power down from UPS in 30s. Host then continues shut
 down. If the host now ends up taking more time then expected for
 shutting down it might still be busy at the time of the power going
 away. It's a race between UPS powering off and system finishing
 shutdown. It's a bet that your system is faster than 30s when
 unmounting the remaining file systems, syncing the MD/DM metadata to
 disk, syncing ATA and so on (i.e. all the stuff the kernel does when you
 invoke the reboot() syscall).

 Here's another race.  Host requests power down from UPS in 30s.  Host
 completes shutdown.  At some point during that 30s interval, commercial
 power is restored.  Result: Host shuts down and never restarts.  Sorry
 about that.

 The way I've always prevented that is to have the host do a reboot,
 not a shutdown, but send an immediate shutdown command to the UPS
 just before sending control to the BIOS for the reboot.

 What you should do is to configure the BIOS to always boot on power-up.

 This way the UPS will remove power, figure out power is returned,
 reapply power and the BIOS will reboot the machine.

Telling my UPS to turn off merely shuts down the inverter.  If it is
not currently running on the inverter (because commercial power is
available), that is effectively a no-op, and power at the UPS output
remains on.  Telling the BIOS to boot on power-up (which is how mine
is configured, BTW) does nothing since _power_never_went_away_.  All
the BIOS sees is a command to shut down, which it does.  And stays
that way.  Absent manual intervention, the only thing that would bring
the system back up would be a power failure long enough to exceed the
capacity of the essentially unloaded UPS, and that would be _quite_ a
long time.

-- 
Bob Nichols NOSPAM is really part of my email address.
 Do NOT delete it.

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: systemd questions

2011-05-18 Thread Matthew Garrett
On Wed, May 18, 2011 at 09:27:23PM -0400, Genes MailLists wrote:
 On 05/18/2011 09:06 PM, Matthew Garrett wrote:
  On Wed, May 18, 2011 at 07:42:17PM -0400, Simo Sorce wrote:
 
  You know, it's not like there is a choice for many models ...
  
  That's really not a given. For anything short of us having to send http 
  requests, there's no fundamental reason why this can't be done 
  in-kernel. For cases where we do have to send http requests, well, 
  that's kind of a separate issue (you want to run java after you've 
  unmounted all the filesystems?)
 
 
   A bunch of individual UPS kernel drivers feels inappropriate to me.

Drivers have to live somewhere. We've traditionally put them in the 
kernel rather than in userland.

  But if there is some common kernel functionality that could be used by
 and help all UPS devices that feels more reasonable. What functionality
 do think needs be added to the kernel so that the userspace UPS code
 could be better ?

If the kernel is able to send requests itself then it can do so when it 
would otherwise be requesting that the firmware halt the system. That 
means you can guarantee that the system is in a consistent state.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: systemd questions

2011-05-18 Thread seth vidal
On Thu, 2011-05-19 at 02:06 +0100, Matthew Garrett wrote:
 On Wed, May 18, 2011 at 07:42:17PM -0400, Simo Sorce wrote:
 
   I am pretty sure we don't want to run Java programs at late boot, as
   root. This would be really bad.
  
  You know, it's not like there is a choice for many models ...
 
 That's really not a given. For anything short of us having to send http 
 requests, there's no fundamental reason why this can't be done 
 in-kernel. For cases where we do have to send http requests, well, 
 that's kind of a separate issue (you want to run java after you've 
 unmounted all the filesystems?)
 
  It is not necessary, the hook can be called before you do that last
  operation, the driver will command the UPS to wait long enough for that
  operation to finish in time in 99% of the cases.
  For the remaining 1% of the cases, admins will have to re-tune the delay
  once power comes up and they find it wasn't enough time after all.
 
 Or we could work on fixing the problem. We're not talking about an 
 incredibly large maount of code.

We are however talking about a lot of different upses and while it is
not specifically fedora's problem we do need to have this handled
before rhel7, for example, is run on serious systems.

-sv


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Thu, 2011-05-19 at 10:00 +0800, Eugene Teo wrote:

 I say, local privilege escalations with publicly available exploits, and
 remotely triggerable vulnerabilities. If such an issue is known before
 Final, we should attempt to address it before releasing.

Note, a release criterion would have a stronger result: you say 'attempt
to address it before releasing', but the effect of a release criterion
is that issues which breach it *must* be fixed before we release; the
release would slip until it was addressed. If you want a weaker effect,
the NTH process (which works off more flexible 'principles' rather than
strict criteria) is appropriate: an NTH bug is one for which we will
break a release freeze to take a fix, but which doesn't block the
release (if a fix isn't ready in time, we still go ahead and release).

Once we have consensus on a release criterion - or not having a release
criterion - I'll make a follow-up proposal for an NTH principle to cover
less serious security issues.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Fedora Talk: adamwill AT fedoraproject DOT org
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


Re: systemd questions

2011-05-18 Thread Matthew Garrett
On Wed, May 18, 2011 at 10:42:02PM -0400, seth vidal wrote:

 We are however talking about a lot of different upses and while it is
 not specifically fedora's problem we do need to have this handled
 before rhel7, for example, is run on serious systems.

If it's a functional requirement, it'll get written. Fedora's decision 
making process isn't beholden to the RHEL release cycle, and nor should 
it be.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel


[perl-Ouch/f14] 0.0401 bump

2011-05-18 Thread Petr Sabata
Summary of changes:

  9b50363... 0.0401 bump (*)

(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 701119] perl-Ouch-0.0401 is available

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=701119

--- Comment #4 from Fedora Update System upda...@fedoraproject.org 2011-05-18 
05:57:50 EDT ---
perl-Ouch-0.0401-1.fc15 has been submitted as an update for Fedora 15.
https://admin.fedoraproject.org/updates/perl-Ouch-0.0401-1.fc15

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 701119] perl-Ouch-0.0401 is available

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=701119

--- Comment #3 from Fedora Update System upda...@fedoraproject.org 2011-05-18 
05:57:24 EDT ---
perl-Ouch-0.0401-1.fc14 has been submitted as an update for Fedora 14.
https://admin.fedoraproject.org/updates/perl-Ouch-0.0401-1.fc14

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 701119] perl-Ouch-0.0401 is available

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=701119

Fedora Update System upda...@fedoraproject.org changed:

   What|Removed |Added

 Status|ASSIGNED|MODIFIED

Bug 701119 depends on bug 701237, which changed state.

Bug 701237 Summary: Review Request: perl-Test-Trap - Trap exit codes, 
exceptions, output, etc
https://bugzilla.redhat.com/show_bug.cgi?id=701237

   What|Old Value   |New Value

 Status|MODIFIED|ON_QA
 Status|ON_QA   |CLOSED
 Resolution||ERRATA

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 705744] New: perl-App-cpanminus-1.4007 is available

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.

Summary: perl-App-cpanminus-1.4007 is available

https://bugzilla.redhat.com/show_bug.cgi?id=705744

   Summary: perl-App-cpanminus-1.4007 is available
   Product: Fedora
   Version: rawhide
  Platform: Unspecified
OS/Version: Unspecified
Status: NEW
  Keywords: FutureFeature, Triaged
  Severity: unspecified
  Priority: unspecified
 Component: perl-App-cpanminus
AssignedTo: mmasl...@redhat.com
ReportedBy: upstream-release-monitor...@fedoraproject.org
 QAContact: extras...@fedoraproject.org
CC: fedora-perl-devel-l...@redhat.com, mmasl...@redhat.com
Classification: Fedora
  Story Points: ---


Latest upstream release: 1.4007
Current version in Fedora Rawhide: 1.4006
URL: http://search.cpan.org/dist/App-cpanminus/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 705744] perl-App-cpanminus-1.4007 is available

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=705744

Petr Pisar ppi...@redhat.com changed:

   What|Removed |Added

 Status|NEW |ASSIGNED
 CC|mmasl...@redhat.com |ppi...@redhat.com
 AssignedTo|mmasl...@redhat.com |ppi...@redhat.com

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


File App-cpanminus-1.4007.tar.gz uploaded to lookaside cache by ppisar

2011-05-18 Thread Petr Pisar
A file has been added to the lookaside cache for perl-App-cpanminus:

56fc1d8fce7da489e64c20597392ebc7  App-cpanminus-1.4007.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[perl-App-cpanminus] 1.4007 bump

2011-05-18 Thread Petr Pisar
commit a13bf0e0928d0e88871d0bfeb3f04f804a934c50
Author: Petr Písař ppi...@redhat.com
Date:   Wed May 18 13:03:08 2011 +0200

1.4007 bump

LWP is optional since this package bundles HTTP::Tiny. Upstream
recognized LWP being heavy. Follow upstream decision in RPM package
dependencies.

 .gitignore  |1 +
 perl-App-cpanminus.spec |8 ++--
 sources |2 +-
 3 files changed, 8 insertions(+), 3 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index 8ae55e2..40e7c8f 100644
--- a/.gitignore
+++ b/.gitignore
@@ -15,3 +15,4 @@ App-cpanminus-0.9935.tar.gz
 /App-cpanminus-1.4004.tar.gz
 /App-cpanminus-1.4005.tar.gz
 /App-cpanminus-1.4006.tar.gz
+/App-cpanminus-1.4007.tar.gz
diff --git a/perl-App-cpanminus.spec b/perl-App-cpanminus.spec
index caf00c4..4b800b8 100644
--- a/perl-App-cpanminus.spec
+++ b/perl-App-cpanminus.spec
@@ -1,5 +1,5 @@
 Name:   perl-App-cpanminus
-Version:1.4006
+Version:1.4007
 Release:1%{?dist}
 Summary:Library for get, unpack, build and install CPAN modules
 License:GPL+ or Artistic
@@ -18,7 +18,6 @@ Requires:   perl(Getopt::Long)
 Requires:   perl(IO::File)
 Requires:   perl(IO::Socket)
 Requires:   perl(JSON)
-Requires:   perl(LWP)
 Requires:   perl(Module::Build)
 Requires:   perl(Parse::CPAN::Meta)
 Requires:   perl(Time::Local)
@@ -63,6 +62,11 @@ make test
 %{_bindir}/cpanm
 
 %changelog
+* Wed May 18 2011 Petr Pisar ppi...@redhat.com - 1.4007-1
+- 1.4007 bump
+- LWP is optional since this package bundles HTTP::Tiny. Upstream recognized
+  LWP being heavy. Follow upstream decision in RPM package dependencies.
+
 * Tue May 17 2011 Petr Pisar ppi...@redhat.com - 1.4006-1
 - 1.4006 bump
 - Fix obsoleted version string
diff --git a/sources b/sources
index 7ff7012..a1fdeab 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-31fdeb09bfd81ee102f083fac989cd67  App-cpanminus-1.4006.tar.gz
+56fc1d8fce7da489e64c20597392ebc7  App-cpanminus-1.4007.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 705744] perl-App-cpanminus-1.4007 is available

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=705744

Petr Pisar ppi...@redhat.com changed:

   What|Removed |Added

 Status|ASSIGNED|CLOSED
   Fixed In Version||perl-App-cpanminus-1.4007-1
   ||.fc16
 Resolution||RAWHIDE
Last Closed||2011-05-18 07:37:39

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


File CGI-PSGI-0.15.tar.gz uploaded to lookaside cache by eseyman

2011-05-18 Thread Emmanuel Seyman
A file has been added to the lookaside cache for perl-CGI-PSGI:

58a39711add2b48229710688c5f81cfd  CGI-PSGI-0.15.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[perl-CGI-PSGI] Update to 0.15

2011-05-18 Thread Emmanuel Seyman
commit 7a3e83aa469f84f5a43158f462b9dfa572294bff
Author: Emmanuel Seyman emmanuel.sey...@club-internet.fr
Date:   Wed May 18 20:40:16 2011 +0200

Update to 0.15

 .gitignore |1 +
 perl-CGI-PSGI.spec |   15 ++-
 sources|2 +-
 3 files changed, 8 insertions(+), 10 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index bafe00e..8b38570 100644
--- a/.gitignore
+++ b/.gitignore
@@ -2,3 +2,4 @@ CGI-PSGI-0.11.tar.gz
 /CGI-PSGI-0.12.tar.gz
 /CGI-PSGI-0.13.tar.gz
 /CGI-PSGI-0.14.tar.gz
+/CGI-PSGI-0.15.tar.gz
diff --git a/perl-CGI-PSGI.spec b/perl-CGI-PSGI.spec
index 586b0a6..2efa4b8 100644
--- a/perl-CGI-PSGI.spec
+++ b/perl-CGI-PSGI.spec
@@ -1,12 +1,11 @@
 Name:   perl-CGI-PSGI
-Version:0.14
-Release:2%{?dist}
+Version:0.15
+Release:1%{?dist}
 Summary:Enable your CGI.pm aware applications to adapt PSGI protocol
 License:GPL+ or Artistic
 Group:  Development/Libraries
 URL:http://search.cpan.org/dist/CGI-PSGI/
 Source0:
http://www.cpan.org/authors/id/M/MI/MIYAGAWA/CGI-PSGI-%{version}.tar.gz
-BuildRoot:  %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
 BuildArch:  noarch
 BuildRequires:  perl
 BuildRequires:  perl(CGI)
@@ -32,8 +31,6 @@ to STDOUT.
 make %{?_smp_mflags}
 
 %install
-rm -rf $RPM_BUILD_ROOT
-
 make pure_install DESTDIR=$RPM_BUILD_ROOT
 
 find $RPM_BUILD_ROOT -type f -name .packlist -exec rm -f {} \;
@@ -44,16 +41,16 @@ find $RPM_BUILD_ROOT -depth -type d -exec rmdir {} 
2/dev/null \;
 %check
 make test
 
-%clean
-rm -rf $RPM_BUILD_ROOT
-
 %files
-%defattr(-,root,root,-)
 %doc Changes README
 %{perl_vendorlib}/*
 %{_mandir}/man3/*
 
 %changelog
+* Wed May 18 2011 Emmanuel Seyman emmanuel.sey...@club-internet.fr - 0.15-1
+- Update to 0.15
+- Spec clean-up
+
 * Tue Feb 08 2011 Fedora Release Engineering rel-...@lists.fedoraproject.org 
- 0.14-2
 - Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
 
diff --git a/sources b/sources
index 4ecda0c..3cd9287 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-31d2bd2cd3b4d0ae196e93e11e7fd98f  CGI-PSGI-0.14.tar.gz
+58a39711add2b48229710688c5f81cfd  CGI-PSGI-0.15.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 701119] perl-Ouch-0.0401 is available

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=701119

Fedora Update System upda...@fedoraproject.org changed:

   What|Removed |Added

 Status|MODIFIED|ON_QA

--- Comment #5 from Fedora Update System upda...@fedoraproject.org 2011-05-18 
14:42:00 EDT ---
Package perl-Ouch-0.0401-1.fc15:
* should fix your issue,
* was pushed to the Fedora 15 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=updates-testing perl-Ouch-0.0401-1.fc15'
as soon as you are able to.
Please go to the following url:
https://admin.fedoraproject.org/updates/perl-Ouch-0.0401-1.fc15
then log in and leave karma (feedback).

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[perl-CGI-Application-Plugin-RateLimit/f14] Initial import (#701183).

2011-05-18 Thread Emmanuel Seyman
commit e76050d7e4074a8eb59282bf92b8c01a1f2317a7
Author: Emmanuel Seyman emmanuel.sey...@club-internet.fr
Date:   Thu May 19 01:08:16 2011 +0200

Initial import (#701183).

 .gitignore |1 +
 perl-CGI-Application-Plugin-RateLimit.spec |   59 
 sources|1 +
 3 files changed, 61 insertions(+), 0 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index e69de29..9d26531 100644
--- a/.gitignore
+++ b/.gitignore
@@ -0,0 +1 @@
+/CGI-Application-Plugin-RateLimit-1.0.tar.gz
diff --git a/perl-CGI-Application-Plugin-RateLimit.spec 
b/perl-CGI-Application-Plugin-RateLimit.spec
new file mode 100644
index 000..71a54bc
--- /dev/null
+++ b/perl-CGI-Application-Plugin-RateLimit.spec
@@ -0,0 +1,59 @@
+Name:   perl-CGI-Application-Plugin-RateLimit
+Version:1.0
+Release:2%{?dist}
+Summary:Limits runmode call rate per user
+License:GPL+ or Artistic
+Group:  Development/Libraries
+URL:http://search.cpan.org/dist/CGI-Application-Plugin-RateLimit/
+Source0:
http://www.cpan.org/authors/id/S/SA/SAMTREGAR/CGI-Application-Plugin-RateLimit-%{version}.tar.gz
+BuildArch:  noarch
+BuildRequires:  perl(CGI)
+BuildRequires:  perl(CGI::Application)
+BuildRequires:  perl(Class::Accessor::Fast)
+BuildRequires:  perl(DBD::SQLite)
+BuildRequires:  perl(DBI)
+BuildRequires:  perl(ExtUtils::MakeMaker)
+BuildRequires:  perl(File::Temp)
+BuildRequires:  perl(Test::More)
+Requires:   perl(CGI::Application)
+Requires:   perl(:MODULE_COMPAT_%(eval `%{__perl} -V:version`; echo 
$version))
+
+%{?perl_default_filter}
+
+%description
+This module provides protection against a user calling a runmode too
+frequently. A typical use-case might be a contact form that sends email.
+You'd like to allow your users to send you messages, but thousands of
+messages from a single user would be a problem.
+
+%prep
+%setup -q -n CGI-Application-Plugin-RateLimit-%{version}
+
+%build
+%{__perl} Makefile.PL INSTALLDIRS=vendor
+make %{?_smp_mflags}
+
+%install
+
+make pure_install PERL_INSTALL_ROOT=$RPM_BUILD_ROOT
+
+find $RPM_BUILD_ROOT -type f -name .packlist -exec rm -f {} \;
+find $RPM_BUILD_ROOT -depth -type d -exec rmdir {} 2/dev/null \;
+
+%{_fixperms} $RPM_BUILD_ROOT/*
+
+%check
+make test
+
+
+%files
+%doc Changes README
+%{perl_vendorlib}/*
+%{_mandir}/man3/*
+
+%changelog
+* Sat May 14 2011 Emmanuel Seyman emmanuel.sey...@club-internet.fr - 1.0-2
+- Clean up spec as per package review (#701183)
+
+* Thu Nov 25 2010 Emmanuel Seyman emmanuel.sey...@club-internet.fr 1.0-1
+- Specfile autogenerated by cpanspec 1.78.
diff --git a/sources b/sources
index e69de29..05ff7e7 100644
--- a/sources
+++ b/sources
@@ -0,0 +1 @@
+1013c2f223e9a28ecc203c64f8995b0d  CGI-Application-Plugin-RateLimit-1.0.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


File DBIx-Class-Cursor-Cached-1.001001.tar.gz uploaded to lookaside cache by iarnell

2011-05-18 Thread Iain Arnell
A file has been added to the lookaside cache for perl-DBIx-Class-Cursor-Cached:

11f9b448244bace1fd79658d7909d9be  DBIx-Class-Cursor-Cached-1.001001.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[perl-DBIx-Class-Cursor-Cached] initial import (rhbz#684511)

2011-05-18 Thread Iain Arnell
commit 200054dc8ac9f8d1967ad19a9d215a1b389bf9dd
Author: Iain Arnell iarn...@gmail.com
Date:   Thu May 19 04:55:29 2011 +0200

initial import (rhbz#684511)

 .gitignore |1 +
 perl-DBIx-Class-Cursor-Cached.spec |   67 
 sources|1 +
 3 files changed, 69 insertions(+), 0 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index e69de29..76652fa 100644
--- a/.gitignore
+++ b/.gitignore
@@ -0,0 +1 @@
+/DBIx-Class-Cursor-Cached-1.001001.tar.gz
diff --git a/perl-DBIx-Class-Cursor-Cached.spec 
b/perl-DBIx-Class-Cursor-Cached.spec
new file mode 100644
index 000..11e6222
--- /dev/null
+++ b/perl-DBIx-Class-Cursor-Cached.spec
@@ -0,0 +1,67 @@
+Name:   perl-DBIx-Class-Cursor-Cached
+Version:1.001001
+Release:1%{?dist}
+Summary:Cursor class with built-in caching support
+License:GPL+ or Artistic
+Group:  Development/Libraries
+URL:http://search.cpan.org/dist/DBIx-Class-Cursor-Cached/
+Source0:
http://www.cpan.org/authors/id/A/AR/ARCANEZ/DBIx-Class-Cursor-Cached-%{version}.tar.gz
+BuildArch:  noarch
+BuildRequires:  perl = 1:5.8.1
+BuildRequires:  perl(Cache::FileCache)
+BuildRequires:  perl(Carp::Clan) = 6.0
+BuildRequires:  perl(DBD::SQLite) = 1.25
+BuildRequires:  perl(DBIx::Class) = 0.08124
+BuildRequires:  perl(DBIx::Class::Core)
+BuildRequires:  perl(DBIx::Class::Schema)
+BuildRequires:  perl(Digest::SHA1)
+BuildRequires:  perl(ExtUtils::MakeMaker)
+BuildRequires:  perl(Test::More)
+Requires:   perl(Carp::Clan) = 6.0
+Requires:   perl(DBIx::Class) = 0.08124
+Requires:   perl(:MODULE_COMPAT_%(eval `%{__perl} -V:version`; echo 
$version))
+
+%{?filter_setup:
+%filter_from_requires /perl(Carp::Clan)$/d
+%{?perl_default_filter}
+}
+
+%description
+This module provides a DBIx cursor class with built-in caching support.
+
+%prep
+%setup -q -n DBIx-Class-Cursor-Cached-%{version}
+
+%build
+%{__perl} Makefile.PL INSTALLDIRS=vendor --skipdeps
+make %{?_smp_mflags}
+
+%install
+make pure_install DESTDIR=$RPM_BUILD_ROOT
+
+find $RPM_BUILD_ROOT -type f -name .packlist -exec rm -f {} \;
+find $RPM_BUILD_ROOT -depth -type d -exec rmdir {} 2/dev/null \;
+
+%{_fixperms} $RPM_BUILD_ROOT/*
+
+%check
+make test
+
+%files
+%defattr(-,root,root,-)
+%doc Changes
+%{perl_vendorlib}/*
+%{_mandir}/man3/*
+
+%changelog
+* Thu Mar 31 2011 Iain Arnell iarn...@gmail.com 1.001001-1
+- update to latest upstream version
+
+* Wed Mar 16 2011 Iain Arnell iarn...@gmail.com 1.001000-3
+- use skipdeps for Module::AutoInstall
+
+* Mon Mar 14 2011 Iain Arnell iarn...@gmail.com 1.001000-2
+- R/BR perl(DBIx::Class) = 0.8124 to avoid test failures
+
+* Sun Mar 13 2011 Iain Arnell iarn...@gmail.com 1.001000-1
+- Specfile autogenerated by cpanspec 1.79.
diff --git a/sources b/sources
index e69de29..c02363f 100644
--- a/sources
+++ b/sources
@@ -0,0 +1 @@
+11f9b448244bace1fd79658d7909d9be  DBIx-Class-Cursor-Cached-1.001001.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


File Parallel-Iterator-1.00.tar.gz uploaded to lookaside cache by iarnell

2011-05-18 Thread Iain Arnell
A file has been added to the lookaside cache for perl-Parallel-Iterator:

879051d329ea79f59eb4b03bb0bf7c87  Parallel-Iterator-1.00.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[perl-Parallel-Iterator] initial import (rhbz#704705)

2011-05-18 Thread Iain Arnell
commit ef87bdab1737e5e49add83ebad3de39b2d17ab0c
Author: Iain Arnell iarn...@gmail.com
Date:   Thu May 19 04:57:29 2011 +0200

initial import (rhbz#704705)

 .gitignore  |1 +
 perl-Parallel-Iterator.spec |   60 +++
 sources |1 +
 3 files changed, 62 insertions(+), 0 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index e69de29..48b7f3c 100644
--- a/.gitignore
+++ b/.gitignore
@@ -0,0 +1 @@
+/Parallel-Iterator-1.00.tar.gz
diff --git a/perl-Parallel-Iterator.spec b/perl-Parallel-Iterator.spec
new file mode 100644
index 000..2d795a6
--- /dev/null
+++ b/perl-Parallel-Iterator.spec
@@ -0,0 +1,60 @@
+Name:   perl-Parallel-Iterator
+Version:1.00
+Release:1%{?dist}
+Summary:Simple parallel execution
+License:GPL+ or Artistic
+Group:  Development/Libraries
+URL:http://search.cpan.org/dist/Parallel-Iterator/
+Source0:
http://www.cpan.org/authors/id/A/AN/ANDYA/Parallel-Iterator-%{version}.tar.gz
+BuildArch:  noarch
+BuildRequires:  perl(Config)
+BuildRequires:  perl(IO::Handle)
+BuildRequires:  perl(IO::Select)
+BuildRequires:  perl(lib)
+BuildRequires:  perl(Module::Build)
+BuildRequires:  perl(POSIX)
+BuildRequires:  perl(Storable)
+BuildRequires:  perl(strict)
+BuildRequires:  perl(Test::More)
+BuildRequires:  perl(warnings)
+Requires:   perl(:MODULE_COMPAT_%(eval `%{__perl} -V:version`; echo 
$version))
+
+%{?perl_default_filter}
+
+%description
+The map function applies a user supplied transformation function to
+each element in a list, returning a new list containing the
+transformed elements.
+
+This module provides a 'parallel map'. Multiple worker processes are forked so
+that many instances of the transformation function may be executed
+simultaneously.
+
+For time consuming operations, particularly operations that spend most of their
+time waiting for I/O, this is a big performance win. It also provides a simple
+idiom to make effective use of multi CPU systems.
+
+%prep
+%setup -q -n Parallel-Iterator-%{version}
+
+%build
+%{__perl} Build.PL installdirs=vendor
+./Build
+
+%install
+./Build install destdir=$RPM_BUILD_ROOT create_packlist=0
+find $RPM_BUILD_ROOT -depth -type d -exec rmdir {} 2/dev/null \;
+
+%{_fixperms} $RPM_BUILD_ROOT/*
+
+%check
+./Build test
+
+%files
+%doc Changes README
+%{perl_vendorlib}/*
+%{_mandir}/man3/*
+
+%changelog
+* Sat May 14 2011 Iain Arnell iarn...@gmail.com 1.00-1
+- Specfile autogenerated by cpanspec 1.79.
diff --git a/sources b/sources
index e69de29..0a9f26b 100644
--- a/sources
+++ b/sources
@@ -0,0 +1 @@
+879051d329ea79f59eb4b03bb0bf7c87  Parallel-Iterator-1.00.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[perl-Parallel-Iterator/f15] initial import (rhbz#704705)

2011-05-18 Thread Iain Arnell
Summary of changes:

  ef87bda... initial import (rhbz#704705) (*)

(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[perl-Parallel-Iterator/f14] initial import (rhbz#704705)

2011-05-18 Thread Iain Arnell
Summary of changes:

  ef87bda... initial import (rhbz#704705) (*)

(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[perl-Parallel-Iterator/f13] initial import (rhbz#704705)

2011-05-18 Thread Iain Arnell
Summary of changes:

  ef87bda... initial import (rhbz#704705) (*)

(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 705966] New: perl-HTTP-Server-Simple-PSGI: the F13 and F14 RPMS fail to require perl(HTTP::Server::Simple::CGI)

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.

Summary: perl-HTTP-Server-Simple-PSGI: the F13 and F14 RPMS fail to require 
perl(HTTP::Server::Simple::CGI)

https://bugzilla.redhat.com/show_bug.cgi?id=705966

   Summary: perl-HTTP-Server-Simple-PSGI: the F13 and F14 RPMS
fail to require perl(HTTP::Server::Simple::CGI)
   Product: Fedora
   Version: 14
  Platform: Unspecified
OS/Version: Linux
Status: NEW
  Severity: high
  Priority: unspecified
 Component: perl-HTTP-Server-Simple-PSGI
AssignedTo: rc040...@freenet.de
ReportedBy: j...@di.uminho.pt
 QAContact: extras...@fedoraproject.org
CC: rc040...@freenet.de, fedora-perl-devel-l...@redhat.com
Classification: Fedora
  Story Points: ---


Description of problem:
The Fedora 13 and Fedora 14 RPMS of perl-HTTP-Server-Simple-PSGI aren't
requiring 
perl(HTTP::Server::Simple::CGI) as the Fedora 15 RPMS are. This breaks 
the module usage in F13 and F14 as one of its requirements fail to install.


Version-Release number of selected component (if applicable):
perl-HTTP-Server-Simple-PSGI-0.14-2.fc13
perl-HTTP-Server-Simple-PSGI-0.14-2.fc14.noarch.rpm

How reproducible:
Always


Additional info:


$ diff (rpm -qpR perl-HTTP-Server-Simple-PSGI-0.14-2.fc14.noarch.rpm) (rpm
-qpR perl-HTTP-Server-Simple-PSGI-0.14-2.fc15.noarch.rpm)
2a3
 perl(HTTP::Server::Simple::CGI)  
9d9
 rpmlib(VersionedDependencies) = 3.0.3-1



$ diff (rpm -qpR perl-HTTP-Server-Simple-PSGI-0.14-2.fc13.noarch.rpm) (rpm
-qpR perl-HTTP-Server-Simple-PSGI-0.14-2.fc15.noarch.rpm)
2c2,3
 perl(:MODULE_COMPAT_5.10.1)  
---
 perl(:MODULE_COMPAT_5.12.3)  
 perl(HTTP::Server::Simple::CGI)  
9d9
 rpmlib(VersionedDependencies) = 3.0.3-1

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 705966] perl-HTTP-Server-Simple-PSGI: the F13 and F14 RPMS fail to require perl(HTTP::Server::Simple::CGI)

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=705966

--- Comment #1 from Jose Pedro Oliveira j...@di.uminho.pt 2011-05-18 23:15:00 
EDT ---
The module HTTP::Server::Simple::PSGI pulls HTTP::Server::Server::CGI with the
following line

   * use base qw/HTTP::Server::Simple::CGI/;

which only appears to be extracted correctly by rpm 4.9 (and not by rpm 4.8.x).


Source:
http://cpansearch.perl.org/src/MIYAGAWA/HTTP-Server-Simple-PSGI-0.14/lib/HTTP/Server/Simple/PSGI.pm

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


File Devel-Cover-0.78.tar.gz uploaded to lookaside cache by iarnell

2011-05-18 Thread Iain Arnell
A file has been added to the lookaside cache for perl-Devel-Cover:

fd26cd6df23bc3f2c38324884c976718  Devel-Cover-0.78.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[perl-DBIx-Class-Cursor-Cached/f15] initial import (rhbz#684511)

2011-05-18 Thread Iain Arnell
Summary of changes:

  200054d... initial import (rhbz#684511) (*)

(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[perl-Devel-Cover] update to 0.78

2011-05-18 Thread Iain Arnell
commit a1cbab94f8de06ffd48a35a96496da7ba7ce1812
Author: Iain Arnell iarn...@gmail.com
Date:   Thu May 19 05:20:59 2011 +0200

update to 0.78

 .gitignore|1 +
 perl-Devel-Cover.spec |   23 +--
 sources   |2 +-
 3 files changed, 15 insertions(+), 11 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index 7967f4f..6034d06 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1 +1,2 @@
 Devel-Cover-0.66.tar.gz
+/Devel-Cover-0.78.tar.gz
diff --git a/perl-Devel-Cover.spec b/perl-Devel-Cover.spec
index 3402b10..4176ecb 100644
--- a/perl-Devel-Cover.spec
+++ b/perl-Devel-Cover.spec
@@ -1,19 +1,21 @@
 Name:   perl-Devel-Cover
-Version:0.66
-Release:3%{?dist}
+Version:0.78
+Release:1%{?dist}
 Summary:Code coverage metrics for Perl
 
 Group:  Development/Libraries
 License:GPL+ or Artistic
 URL:http://search.cpan.org/dist/Devel-Cover/
 Source0:
http://www.cpan.org/authors/id/P/PJ/PJCJ/Devel-Cover-%{version}.tar.gz
-BuildRoot:  %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
 
+BuildRequires:  perl(JSON::PP)
 BuildRequires:  perl(Template)
 BuildRequires:  perl(PPI::HTML) = 1.07
 BuildRequires:  perl(Perl::Tidy) = 20060719
 BuildRequires:  perl(Pod::Coverage)
 BuildRequires:  perl(Test::Differences)
+BuildRequires:  perl(Test::More)
+BuildRequires:  perl(Test::Warn)
 BuildRequires:  perl(ExtUtils::MakeMaker)
 Requires:   perl(:MODULE_COMPAT_%(eval `%{__perl} -V:version`; echo 
$version))
 Requires:   perl(Pod::Coverage)
@@ -22,6 +24,7 @@ Requires:   perl(Test::Differences)
 # Requires:   perl(PPI::HTML) = 1.07
 # Requires:   perl(Perl::Tidy) = 20060719
 
+%{?perl_default_filter}
 
 %description
 This module provides code coverage metrics for Perl.
@@ -30,6 +33,7 @@ This module provides code coverage metrics for Perl.
 %prep
 %setup -q -n Devel-Cover-%{version}
 
+find lib -type f -print0 | xargs -0 chmod 0644
 
 %build
 %{__perl} Makefile.PL INSTALLDIRS=vendor OPTIMIZE=$RPM_OPT_FLAGS
@@ -37,7 +41,6 @@ make %{?_smp_mflags}
 
 
 %install
-rm -rf $RPM_BUILD_ROOT
 make pure_install DESTDIR=$RPM_BUILD_ROOT
 find $RPM_BUILD_ROOT -type f -name .packlist -exec rm -f {} ';'
 find $RPM_BUILD_ROOT -type f -name '*.bs' -empty -exec rm -f {} ';'
@@ -49,13 +52,8 @@ chmod -R u+w $RPM_BUILD_ROOT/*
 make test
 
 
-%clean
-rm -rf $RPM_BUILD_ROOT
-
-
 %files
-%defattr(-,root,root,-)
-%doc BUGS CHANGES README TODO all_versions cpancover create_gold session.vim
+%doc CHANGES README docs/BUGS docs/TODO
 %{_bindir}/*
 %{perl_vendorarch}/Devel/
 %{perl_vendorarch}/auto/Devel/
@@ -64,6 +62,11 @@ rm -rf $RPM_BUILD_ROOT
 
 
 %changelog
+* Thu May 19 2011 Iain Arnell iarn...@gmail.com 0.78-1
+- update to latest upstream version
+- clean up spec for modern rpmbuild
+- use perl_default_filter
+
 * Tue Feb 08 2011 Fedora Release Engineering rel-...@lists.fedoraproject.org 
- 0.66-3
 - Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
 
diff --git a/sources b/sources
index 32ea7ab..8a4fde4 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-db1a982fc82454c4f5a2d8edcc857cf3  Devel-Cover-0.66.tar.gz
+fd26cd6df23bc3f2c38324884c976718  Devel-Cover-0.78.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 703430] perlbrew-0.20 is available

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=703430

--- Comment #4 from Fedora Update System upda...@fedoraproject.org 2011-05-19 
00:58:11 EDT ---
perlbrew-0.20-1.fc15 has been pushed to the Fedora 15 stable repository.  If
problems still persist, please make note of it in this bug report.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[perl-HTTP-Server-Simple-PSGI/f14] R: perl(HTTP::Server::Simple::CGI) (BZ #705966).

2011-05-18 Thread corsepiu
commit 12acbda4c8099106ee786c6f2f40fb0ad737c316
Author: Ralf Corsépius corse...@fedoraproject.org
Date:   Thu May 19 07:40:16 2011 +0200

R: perl(HTTP::Server::Simple::CGI) (BZ #705966).

 perl-HTTP-Server-Simple-PSGI.spec |6 +-
 1 files changed, 5 insertions(+), 1 deletions(-)
---
diff --git a/perl-HTTP-Server-Simple-PSGI.spec 
b/perl-HTTP-Server-Simple-PSGI.spec
index ee1192c..4324de0 100644
--- a/perl-HTTP-Server-Simple-PSGI.spec
+++ b/perl-HTTP-Server-Simple-PSGI.spec
@@ -1,6 +1,6 @@
 Name:   perl-HTTP-Server-Simple-PSGI
 Version:0.14
-Release:2%{?dist}
+Release:2%{?dist}.1
 Summary:PSGI handler for HTTP::Server::Simple
 License:GPL+ or Artistic
 Group:  Development/Libraries
@@ -11,6 +11,7 @@ BuildRequires:  perl(ExtUtils::MakeMaker)
 BuildRequires:  perl(HTTP::Server::Simple) = 0.42
 BuildRequires:  perl(Test::More)
 Requires:   perl(:MODULE_COMPAT_%(eval `%{__perl} -V:version`; echo 
$version))
+Requires:   perl(HTTP::Server::Simple::CGI)
 
 %description
 HTTP::Server::Simple::PSGI is a HTTP::Server::Simple based HTTP server that
@@ -43,6 +44,9 @@ make test
 %{_mandir}/man3/*
 
 %changelog
+* Thu May 19 2011 Ralf Corsépius corse...@fedoraproject.org 0.14-2.1
+- R: perl(HTTP::Server::Simple::CGI) (BZ #705966).
+
 * Mon Mar 14 2011 Ralf Corsépius corse...@fedoraproject.org 0.14-2
 - Spec cleanup.
 
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-HTTP-Server-Simple-PSGI/f13] R: perl(HTTP::Server::Simple::CGI) (BZ #705966).

2011-05-18 Thread corsepiu
Summary of changes:

  12acbda... R: perl(HTTP::Server::Simple::CGI) (BZ #705966). (*)

(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 703430] perlbrew-0.20 is available

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=703430

Fedora Update System upda...@fedoraproject.org changed:

   What|Removed |Added

 Status|ON_QA   |CLOSED
   Fixed In Version||perlbrew-0.20-1.fc15
 Resolution||ERRATA
Last Closed||2011-05-19 00:58:15

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Bug 705966] perl-HTTP-Server-Simple-PSGI: the F13 and F14 RPMS fail to require perl(HTTP::Server::Simple::CGI)

2011-05-18 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=705966

--- Comment #2 from Fedora Update System upda...@fedoraproject.org 2011-05-19 
01:55:54 EDT ---
perl-HTTP-Server-Simple-PSGI-0.14-2.fc13.1 has been submitted as an update for
Fedora 13.
https://admin.fedoraproject.org/updates/perl-HTTP-Server-Simple-PSGI-0.14-2.fc13.1

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel