Re: gdbm license change

2011-11-15 Thread Honza Horak
On 11/14/2011 06:57 PM, Adam Jackson wrote:
 On Mon, 2011-11-14 at 18:18 +0100, Honza Horak wrote:
 Hi,

 GNU database indexing library (gdbm) has changed its license to GPLv3+.

 A quick scan says this affects:

 avahi-ui-tools (LGPLv2)
 gnu-smalltalk (GPLv2+ with exceptions)
 jpilot-backup (GPLv2+)
 libguestfs (LGPLv2+)
 librep (GPLv2+)
 man-db (GPLv2+ and GPLv3+)
 perl (unholy)
 perl-XML-LibXSLT (GPL+ or Artistic)
 q (GPLv2+)
 ruby-libs ((Ruby or GPLv2) and (GPL+ or Artistic))
 ypserv (GPLv2)

 - ajax

If there are some license issues not easy to solve, there is still a 
compat-gdbm package, which ships gdbm-1.8.3 with GPLv2+.

Honza
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

libcdio update coming to rawhide

2011-11-15 Thread Adrian Reber
I will soon update libcdio to 0.83 in rawhide which requires a rebuild
of following the packages:

audacious-plugins
cdw
gvfs
kover
libcddb
oxine
pragha
pycdio
qmmp
xmms2

I will rebuild these packages if the corresponding maintainers do not
object.

Adrian
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: New build of fedpkg (fedora-packager) coming to updates-testing / rawhide

2011-11-15 Thread Marek Goldmann
I see the same issue with clone on F16:

[goldmann@nightmare fedora]$ fedpkg clone appliance-tools
Could not execute clone: must be type, not classobj
[goldmann@nightmare fedora]$ rpm -q fedpkg
fedpkg-1.5-1.fc16.noarch

Downgrading to fedpkg-1.1-1.fc16.noarch helped.

--Marek

On 9 lis 2011, at 20:47, Jesse Keating wrote:

 On Nov 9, 2011, at 8:22 AM, Adam Jackson wrote:
 
 [ajax@f17 fedora]$ fedpkg co xorg-x11-server
 Could not execute clone: must be type, not classobj
 [ajax@f17 fedora]$ rpm -q fedpkg
 fedpkg-1.5-1.fc17.noarch
 
 whoops.  Looks like I screwed up the alias somehow.  For now, use clone 
 instead of co.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [fedora-arm] ARM Architecture - Package Updates in git

2011-11-15 Thread Jon Masters
On Mon, 2011-11-14 at 13:19 -0500, Chris Tyler wrote:
 The ARM Secondary Arch project[0] is working on an F15 release for the
 existing armv5tel architecture as well as the new armv7hl architecture
 (with hardfp ABI). This effort has been previously announced and is
 ongoing. A number of minor package changes are required as a result of
 this effort:

To add to this, we will shortly be commencing an effort to track rawhide
builds of primary on ARM, so these same fixes will of course land in the
devel branches of packages aswell. In the coming months, we hope to be
able to respond to packaging issues as they arise by shadow building
everything that lands in primary within a few days.

Jon.


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

F16, FTP-servers, sssd and LDAP-backend

2011-11-15 Thread Ola Thoresen
Not sure the -devel list is the correct place, but I believe this is not 
a -user-related question.

Has anyone tested (and successfully set up) an F16 based FTP-server with 
LDAP as auth-backend for sssd?

(And please, I do not need any you should use sftp and ssh-replies. 
This is a server supporting legacy systems where FTP is currently the 
only solution).

I have tested pure-ftpd, vsftpd and proftpd, and all of them fails to 
authenticate local users for FTP login.  Ssh-logins, pop3, imap and smtp 
(via sasl) works fine for the same users).

I have successfully set up pure-ftpd with LDAP-auth directly, instead of 
relying og sssd, and that works fine.
Except users do not have access to folders woth rwx-permissions for a 
secondary-group the are member of.
The same user has access to the folder logging in with ssh.

I have set SELinux to permissive mode, so it should not be a 
SELinux-issue.  I have removed the sssd-cache, and I have remove the 
initgroups for nsswitch.conf
- Before that, I was bitten by this bug:
https://bugzilla.redhat.com/show_bug.cgi?id=751450


Is there any reason why it seems like no ftpd-s are able to authenticate 
local users?

This was working fine on an older server, running vsftpd, but with 
pam/nscd, not pam/sssd.


Rgds.

Ola Thoresen
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: F16, FTP-servers, sssd and LDAP-backend

2011-11-15 Thread Ola Thoresen
On 15. nov. 2011 13:03, Ola Thoresen wrote:

 I have successfully set up pure-ftpd with LDAP-auth directly, instead of
 relying og sssd, and that works fine.
 Except users do not have access to folders woth rwx-permissions for a
 secondary-group the are member of.
 The same user has access to the folder logging in with ssh.


After changeing pure-ftpd.conf to include _both_ ldap and PAM:

LDAPConfigFile/etc/pure-ftpd/pureftpd-ldap.conf
PAMAuthentication yes

Users can now access dirs with their secondary GID.

They still can't login without the LDAP-config.



Rgds.


Ola Thoresen
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

rawhide report: 20111115 changes

2011-11-15 Thread Rawhide Report
Compose started at Tue Nov 15 08:15:02 UTC 2011

Broken deps for x86_64
--
4ti2-1.3.2-7.fc17.1.x86_64 requires libgmp.so.3()(64bit)
OpenGTL-0.9.15.1-3.fc17.x86_64 requires libLLVM-2.9.so()(64bit)
OpenGTL-devel-0.9.15.1-3.fc17.i686 requires libLLVM-2.9.so
OpenGTL-devel-0.9.15.1-3.fc17.x86_64 requires libLLVM-2.9.so()(64bit)
OpenGTL-libs-0.9.15.1-3.fc17.i686 requires libLLVM-2.9.so
OpenGTL-libs-0.9.15.1-3.fc17.x86_64 requires libLLVM-2.9.so()(64bit)
PackageKit-0.6.19-3.fc17.x86_64 requires libarchive.so.2()(64bit)
PackageKit-browser-plugin-0.6.19-3.fc17.x86_64 requires 
libarchive.so.2()(64bit)
PackageKit-command-not-found-0.6.19-3.fc17.x86_64 requires 
libarchive.so.2()(64bit)
PackageKit-debug-install-0.6.19-3.fc17.x86_64 requires 
libarchive.so.2()(64bit)
PackageKit-glib-0.6.19-3.fc17.i686 requires libarchive.so.2
PackageKit-glib-0.6.19-3.fc17.x86_64 requires libarchive.so.2()(64bit)
PackageKit-gstreamer-plugin-0.6.19-3.fc17.x86_64 requires 
libarchive.so.2()(64bit)
PackageKit-zif-0.6.19-3.fc17.x86_64 requires libarchive.so.2()(64bit)
anaconda-17.1-1.fc17.x86_64 requires libarchive.so.2()(64bit)
1:anerley-0.3.0-5.fc17.i686 requires libedataserver-1.2.so.15
1:anerley-0.3.0-5.fc17.i686 requires libcamel-1.2.so.29
1:anerley-0.3.0-5.fc17.x86_64 requires libedataserver-1.2.so.15()(64bit)
1:anerley-0.3.0-5.fc17.x86_64 requires libcamel-1.2.so.29()(64bit)
archivemount-0.6.1-5.fc15.x86_64 requires libarchive.so.2()(64bit)
claws-mail-plugins-archive-3.7.10-7.fc17.x86_64 requires 
libarchive.so.2()(64bit)
cmake-2.8.6-1.fc17.x86_64 requires libarchive.so.2()(64bit)
cmake-gui-2.8.6-1.fc17.x86_64 requires libarchive.so.2()(64bit)
comoonics-cdsl-py-0.2-18.noarch requires comoonics-base-py
comoonics-cluster-py-0.1-24.noarch requires comoonics-base-py
contextkit-0.5.15-2.fc15.i686 requires libcdb.so.1
contextkit-0.5.15-2.fc15.x86_64 requires libcdb.so.1()(64bit)
couchdb-1.0.3-2.fc16.x86_64 requires libicuuc.so.46()(64bit)
couchdb-1.0.3-2.fc16.x86_64 requires libicui18n.so.46()(64bit)
couchdb-1.0.3-2.fc16.x86_64 requires libicudata.so.46()(64bit)
curry-0.9.11-7.fc12.x86_64 requires libgmp.so.3()(64bit)
cvs2cl-2.73-1.fc17.noarch requires 
perl(CVS::Utils::ChangeLog::EntrySet::Output)
dh-make-0.55-3.fc15.noarch requires debhelper
dogtag-pki-9.0.0-8.fc17.noarch requires pki-console = 0:9.0.5
ease-0.4-9.fc17.i686 requires libpoppler.so.18
ease-0.4-9.fc17.i686 requires libclutter-gtk-0.10.so.0
ease-0.4-9.fc17.i686 requires libarchive.so.2
ease-0.4-9.fc17.x86_64 requires libpoppler.so.18()(64bit)
ease-0.4-9.fc17.x86_64 requires libclutter-gtk-0.10.so.0()(64bit)
ease-0.4-9.fc17.x86_64 requires libarchive.so.2()(64bit)
ease-devel-0.4-9.fc17.i686 requires pkgconfig(clutter-gtk-0.10)
ease-devel-0.4-9.fc17.x86_64 requires pkgconfig(clutter-gtk-0.10)
emacs-spice-mode-1.2.25-6.fc17.noarch requires gwave
evolution-couchdb-0.5.91-4.fc17.x86_64 requires 
libedataserver-1.2.so.15()(64bit)
evolution-couchdb-0.5.91-4.fc17.x86_64 requires 
libedata-cal-1.2.so.13()(64bit)
evolution-couchdb-0.5.91-4.fc17.x86_64 requires 
libedata-book-1.2.so.11()(64bit)
evolution-couchdb-0.5.91-4.fc17.x86_64 requires 
libecal-1.2.so.10()(64bit)
evolution-couchdb-0.5.91-4.fc17.x86_64 requires 
libcamel-provider-1.2.so.29()(64bit)
evolution-couchdb-0.5.91-4.fc17.x86_64 requires 
libcamel-1.2.so.29()(64bit)
fldigi-3.21.7-1.fc16.x86_64 requires libfltk_images.so.1.1()(64bit)
fldigi-3.21.7-1.fc16.x86_64 requires libfltk.so.1.1()(64bit)
gcc-python2-debug-plugin-0.6-3.fc17.x86_64 requires gcc = 0:4.6.1-9.fc17
gcc-python2-plugin-0.6-3.fc17.x86_64 requires gcc = 0:4.6.1-9.fc17
gcc-python3-debug-plugin-0.6-3.fc17.x86_64 requires gcc = 0:4.6.1-9.fc17
gcc-python3-plugin-0.6-3.fc17.x86_64 requires gcc = 0:4.6.1-9.fc17
1:geda-gattrib-1.6.2-2.fc16.x86_64 requires libgmp.so.3()(64bit)
1:geda-gnetlist-1.6.2-2.fc16.x86_64 requires libgmp.so.3()(64bit)
1:geda-gschem-1.6.2-2.fc16.x86_64 requires libgmp.so.3()(64bit)
1:geda-gsymcheck-1.6.2-2.fc16.x86_64 requires libgmp.so.3()(64bit)
1:geda-utils-1.6.2-2.fc16.x86_64 requires libgmp.so.3()(64bit)
genius-1.0.12-2.fc15.x86_64 requires libgmp.so.3()(64bit)
gnome-genius-1.0.12-2.fc15.x86_64 requires libgmp.so.3()(64bit)
gnome-phone-manager-0.66-6.fc17.x86_64 requires 
libedataserver-1.2.so.15()(64bit)
gnome-phone-manager-0.66-6.fc17.x86_64 requires 
libcamel-1.2.so.29()(64bit)
gnome-phone-manager-telepathy-0.66-6.fc17.x86_64 requires 
libedataserver-1.2.so.15()(64bit)

Re: F16, FTP-servers, sssd and LDAP-backend

2011-11-15 Thread Stephen Gallagher
On Tue, 2011-11-15 at 13:58 +0100, Ola Thoresen wrote:
 On 15. nov. 2011 13:03, Ola Thoresen wrote:
 
  I have successfully set up pure-ftpd with LDAP-auth directly, instead of
  relying og sssd, and that works fine.
  Except users do not have access to folders woth rwx-permissions for a
  secondary-group the are member of.
  The same user has access to the folder logging in with ssh.
 
 
 After changeing pure-ftpd.conf to include _both_ ldap and PAM:
 
 LDAPConfigFile/etc/pure-ftpd/pureftpd-ldap.conf
 PAMAuthentication yes
 
 Users can now access dirs with their secondary GID.
 
 They still can't login without the LDAP-config.


It should be working with *just* PAMAuthentication. Can you check to see
if /var/log/secure is showing any errors during login?

Also, please attach your /etc/pam.d/pure-ftpd
and /etc/pam.d/password-auth files so we can see if they're
misconfigured.


signature.asc
Description: This is a digitally signed message part
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: libcdio update coming to rawhide

2011-11-15 Thread Jay Greguske
On 11/15/2011 03:52 AM, Adrian Reber wrote:
 I will soon update libcdio to 0.83 in rawhide which requires a rebuild
 of following the packages:
 
 audacious-plugins
 cdw
 gvfs
 kover
 libcddb
 oxine
 pragha
 pycdio
 qmmp
 xmms2
 
 I will rebuild these packages if the corresponding maintainers do not
 object.
 
   Adrian

I own pycdio; build away! :)
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

[perl-Class-Field/f16] Initial import from review (rhbz #752836)

2011-11-15 Thread Daniel P. Berrange
Summary of changes:

  016a08a... Initial import from review (rhbz #752836) (*)

(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

Re: F16, FTP-servers, sssd and LDAP-backend

2011-11-15 Thread Ola Thoresen
On 15. nov. 2011 14:44, Stephen Gallagher wrote:


 It should be working with *just* PAMAuthentication. Can you check to see
 if /var/log/secure is showing any errors during login?

 Also, please attach your /etc/pam.d/pure-ftpd
 and /etc/pam.d/password-auth files so we can see if they're
 misconfigured.


Thanks (again) for helping out.

The server is a completely fresh install of F16, so no config-files 
should be left from old installations.

Auth is set up with authconfig.

I do get an error from pam_unix when the user tries to log in - but I 
get that for all services:

pure-ftp:

Nov 14 14:01:22 poseidon pure-ftpd: pam_unix(pure-ftpd:auth): 
authentication failure; logname= uid=0 euid=0 tty=pure-ftpd ruser=olen 
rhost=  user=olen
Nov 14 14:01:23 poseidon pure-ftpd: pam_sss(pure-ftpd:auth): 
authentication success; logname= uid=0 euid=0 tty=pure-ftpd ruser=olen 
rhost= user=olen

I get the same with dovecot:

Nov 15 15:10:20 poseidon auth: pam_unix(dovecot:auth): authentication 
failure; logname= uid=0 euid=0 tty=dovecot ruser=olen rhost=::1  user=olen
Nov 15 15:10:21 poseidon auth: pam_sss(dovecot:auth): authentication 
success; logname= uid=0 euid=0 tty=dovecot ruser=olen rhost=::1 user=olen


/etc/pam.d/pure-ftpd
#%PAM-1.0

# Sample PAM configuration file for Pure-FTPd.
# Install it in /etc/pam.d/pure-ftpd or add to /etc/pam.conf

auth   required pam_listfile.so item=user sense=deny 
file=/etc/ftpusers onerr=succeed
auth   include  password-auth
auth   required pam_shells.so
auth   required pam_nologin.so

accountinclude  password-auth

password   include  password-auth

sessionrequired pam_loginuid.so
sessioninclude  password-auth



/etc/pam.d/password-auth is a symlink to password-auth-ac


/etc/pam.d/password-auth
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
authrequired  pam_env.so
authsufficientpam_unix.so nullok try_first_pass
authrequisite pam_succeed_if.so uid = 500 quiet
authsufficientpam_sss.so use_first_pass
authrequired  pam_deny.so

account required  pam_unix.so broken_shadow
account sufficientpam_localuser.so
account sufficientpam_succeed_if.so uid  500 quiet
account [default=bad success=ok user_unknown=ignore] pam_sss.so
account required  pam_permit.so

passwordrequisite pam_cracklib.so try_first_pass retry=3 type=
passwordsufficientpam_unix.so sha512 shadow nullok 
try_first_pass use_authtok
passwordsufficientpam_sss.so use_authtok
passwordrequired  pam_deny.so

session optional  pam_keyinit.so revoke
session required  pam_limits.so
-session optional  pam_systemd.so
session [success=1 default=ignore] pam_succeed_if.so service in 
crond quiet use_uid
session required  pam_unix.so
session optional  pam_sss.so



/Ola (T)



-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: F16, FTP-servers, sssd and LDAP-backend

2011-11-15 Thread Jan Vcelak
You can try people on sssd-de...@lists.fedorahosted.org

Jan

- Original Message -
  I have successfully set up pure-ftpd with LDAP-auth directly,
  instead of
  relying og sssd, and that works fine.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [Test-Announce] Announcing the release of Fedora 16.

2011-11-15 Thread Gerd Hoffmann
On 11/15/11 00:38, Adam Williamson wrote:
 On Tue, 2011-11-08 at 17:48 +0100, Gerd Hoffmann wrote:
 Hi,

 Fedora 16 is not science fiction. It is here right now:
 http://get.fedoraproject.org

 Hmm, no jigdo downloads any more?
 
 Releng say they dropped jigdo due to overwhelming indifference (the
 download numbers for the jigdo images were tiny).

Yea, most users don't care probably.  Also note that the download page
never explained what these files are good for, so if you don't know what
it is you probably just skip over it.

For developers like me which have a F16 repo for mock builds anyway it
is quite useful though.  A large fraction of the stuff in Packages/ is
on my disk already, and with a jigdo I could save quite a bit on
bandwidth and download time over my not-exactly-fast internet link ...

Given the size of the jigdo files small download numbers are not a good
reason to stop that service IMHO.  Its not like we are saving tons of
mirror bandwidth ...

cheers,
  Gerd
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [Test-Announce] Announcing the release of Fedora 16.

2011-11-15 Thread Rahul Sundaram
On 11/08/2011 10:18 PM, Gerd Hoffmann wrote:
   Hi,
 
 Fedora 16 is not science fiction. It is here right now:
 http://get.fedoraproject.org
 
 Hmm, no jigdo downloads any more?

Yes.  Would be nice to have this back.  It is not a big burden.  Is it?

Rahul
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Getting grub launching the installer

2011-11-15 Thread David Howells
Sam Varshavchik mr...@courier-mta.com wrote:

 Up until F14 this worked fine. F15's pxeboot/vmlinuz made me stare at a blank
 screen, and the only available option, apparently, was the three- 
 fingered salute. I wrote it off as an F15 glitch.

 Now, same story with F16. Looks like I have to do a real PXE boot. No big
 deal, but it's a pain. Grub was much easier – copy two files over, edit
 menu.lst, and I'm done.

It took a long time to load from grub1 for me too - several minutes.  Loading
it by hand from grub2 was much quicker.  I had the joy of doing the latter as
two of the three machines I upgraded to F-16 failed to boot thereafter.

On one I had /boot on RAID1.  The installer generated a blank grub.cfg file
[BZ 750794], but I managed to coax it to dracut and thence to chroot on the
main rootfs.  (The dracut shell is horrible to use btw - no recallable,
editable command line history).  Then I managed to fill in the grub.cfg file.
_Why_ does dracut not load the md module unless the raid modules are loaded in
grub?!

On the other, the installer failed to generate an initramfs file, though the
grub2 installation was perfectly fine.  Rerunning the upgrade (by hand from
grub2's cli - I'd put the PXE images onto /boot and they were still there)
fixed that.

All in all, yesterday wasn't entirely fun.

David
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: F16, FTP-servers, sssd and LDAP-backend

2011-11-15 Thread Stephen Gallagher
On Tue, 2011-11-15 at 15:19 +0100, Ola Thoresen wrote:
 On 15. nov. 2011 14:44, Stephen Gallagher wrote:
 
 
  It should be working with *just* PAMAuthentication. Can you check to see
  if /var/log/secure is showing any errors during login?
 
  Also, please attach your /etc/pam.d/pure-ftpd
  and /etc/pam.d/password-auth files so we can see if they're
  misconfigured.
 
 
 Thanks (again) for helping out.
 
 The server is a completely fresh install of F16, so no config-files 
 should be left from old installations.
 
 Auth is set up with authconfig.
 
 I do get an error from pam_unix when the user tries to log in - but I 
 get that for all services:
 
 pure-ftp:
 
 Nov 14 14:01:22 poseidon pure-ftpd: pam_unix(pure-ftpd:auth): 
 authentication failure; logname= uid=0 euid=0 tty=pure-ftpd ruser=olen 
 rhost=  user=olen
 Nov 14 14:01:23 poseidon pure-ftpd: pam_sss(pure-ftpd:auth): 
 authentication success; logname= uid=0 euid=0 tty=pure-ftpd ruser=olen 
 rhost= user=olen
 
 I get the same with dovecot:
 
 Nov 15 15:10:20 poseidon auth: pam_unix(dovecot:auth): authentication 
 failure; logname= uid=0 euid=0 tty=dovecot ruser=olen rhost=::1  user=olen
 Nov 15 15:10:21 poseidon auth: pam_sss(dovecot:auth): authentication 
 success; logname= uid=0 euid=0 tty=dovecot ruser=olen rhost=::1 user=olen
 


Everything here looks correct. Seems like SSSD is authenticating the
user just fine. I'd say the bug is with pure-ftpd, then. File a BZ.


signature.asc
Description: This is a digitally signed message part
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: F16, FTP-servers, sssd and LDAP-backend

2011-11-15 Thread Ola Thoresen


 Everything here looks correct. Seems like SSSD is authenticating the
 user just fine. I'd say the bug is with pure-ftpd, then. File a BZ.


I'd have thought so as well, if at least one of pure-ftpd, proftpd or 
vsftpd had worked.
But they all show the same symptoms.

But I filed a report against pure-ftpd:

https://bugzilla.redhat.com/show_bug.cgi?id=754170

Thanks again.




-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: F16, FTP-servers, sssd and LDAP-backend

2011-11-15 Thread Jóhann B. Guðmundsson
On 11/15/2011 03:28 PM, Ola Thoresen wrote:

 Everything here looks correct. Seems like SSSD is authenticating the
 user just fine. I'd say the bug is with pure-ftpd, then. File a BZ.

 I'd have thought so as well, if at least one of pure-ftpd, proftpd or
 vsftpd had worked.
 But they all show the same symptoms.

 But I filed a report against pure-ftpd:

 https://bugzilla.redhat.com/show_bug.cgi?id=754170

 Thanks again.





I have seen one your mentioned problems with sssd+389ds+vsftp and 
secondary groups on RHEL6.

Users authenticate just fine and have no problems as long as they are in 
the same primary group or the owner of the files/directory.

Dont have a host to spare to test/duplicate this on F16 thou and have 
not had the time to investigate this any further to rule out and bugs or 
an pebcak issue.

JBG
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [Test-Announce] Announcing the release of Fedora 16.

2011-11-15 Thread Jim Meyering
Rahul Sundaram wrote:
 On 11/08/2011 10:18 PM, Gerd Hoffmann wrote:
   Hi,

 Fedora 16 is not science fiction. It is here right now:
 http://get.fedoraproject.org

 Hmm, no jigdo downloads any more?

 Yes.  Would be nice to have this back.  It is not a big burden.  Is it?

I have used them, too.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

[Test-Announce] Announcing the release of Fedora 16.

2011-11-15 Thread Andre Robatino
Gerd Hoffmann wrote:

 For developers like me which have a F16 repo for mock builds anyway it
 is quite useful though.  A large fraction of the stuff in Packages/ is
 on my disk already, and with a jigdo I could save quite a bit on
 bandwidth and download time over my not-exactly-fast internet link ...

Rsync should save almost exactly the same amount of bandwidth, since due
to the way its algorithm works it will avoid downloading unchanged
packages and download changed packages in full, just like jigdo. In
addition you don't have to download a jigdo template file.

(Sorry for not replying in-thread, but this reply doesn't show up in
Gmane at all, only the original message from a week ago.)



signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [Test-Announce] Announcing the release of Fedora 16.

2011-11-15 Thread Genes MailLists


  Its easy enough to build an iso using mock/pungi which will take
advantage of all your local packages ... I really don't know that jigdo
added anything to that - in fact using pungi you always get a fully
updated build without waiting for a jigdo list.

 gene
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: review swap

2011-11-15 Thread Brendan Jones
On 11/14/2011 09:31 PM, Julian Sikorski wrote:
 Hi,

 I would be willing to swap a review of gmtk [1] in rpmfusion for another
 review, be it RPM Fusion or Fedora, preferably not something overly
 complex. Feel free to contact me if you are interested.

 Cheers,
 Julian

 [1] https://bugzilla.rpmfusion.org/show_bug.cgi?id=1958

Hi Julian,

I have not reviewed on rpmfusion before but am sponsored in Fedora.

You can take your pick here, although zita-at1 is probably more in 
demand I would think.

https://bugzilla.redhat.com/buglist.cgi?query_format=advancedclassification=Fedoraproduct=Fedoracomponent=Package%20Reviewbug_status=NEWemailreporter1=1emailtype1=substringemail1=brendan.jones.it%40gmail.com

regards,

Brendan
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: gdbm license change

2011-11-15 Thread Richard W.M. Jones
On Mon, Nov 14, 2011 at 07:21:52PM +, Daniel P. Berrange wrote:
 On Mon, Nov 14, 2011 at 12:57:20PM -0500, Adam Jackson wrote:
  On Mon, 2011-11-14 at 18:18 +0100, Honza Horak wrote:
   Hi,
   
   GNU database indexing library (gdbm) has changed its license to GPLv3+.
  
  A quick scan says this affects:
 
  libguestfs (LGPLv2+)
 
 The LGPLv2+ libguestfs.so library does not link to libgdbm.so. So AFAICT,
 the libgdbm.so dependancy in the libguestfs RPM is solely for the generated
 appliance image which runs in the QEMU guest, and thus has no bearing on
 the libguestfs.so license.
 
 CC'ing rjones to confirm.

What Dan says here is correct.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
virt-p2v converts physical machines to virtual machines.  Boot with a
live CD or over the network (PXE) and turn machines into Xen guests.
http://et.redhat.com/~rjones/virt-p2v
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Anyone interested in abi-compatibility-checker?

2011-11-15 Thread Richard Shaw
Really?

So is no one interested in a abi compliance checker or it is no one is
interested in reviewing it?

Richard
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Getting grub launching the installer

2011-11-15 Thread Sam Varshavchik

David Howells writes:


It took a long time to load from grub1 for me too - several minutes.  Loading
it by hand from grub2 was much quicker.  I had the joy of doing the latter as
two of the three machines I upgraded to F-16 failed to boot thereafter.


I waited 10-15 minutes, no go.


On one I had /boot on RAID1.  The installer generated a blank grub.cfg file
[BZ 750794], but I managed to coax it to dracut and thence to chroot on the


Been there.


main rootfs.  (The dracut shell is horrible to use btw - no recallable,
editable command line history).  Then I managed to fill in the grub.cfg file.
_Why_ does dracut not load the md module unless the raid modules are loaded  
in

grub?!


At least you ended up with a bootable system. I had to back up (in rescue  
mode), wipe, reinstall, and restore a server because grub2 wouldn't install  
at all, during upgrade, because of bug 737508 (and I had no idea what was  
wrong, other than total foobar-age, Google was useless, and I didn't know  
that I could simply shave a megabyte off /boot to give grub2 more space to  
sit in), and F16's grub persistently complained about Error 16, no matter  
how much I re-fscked and resynced /boot.


At least it looks like now that this'll get fixed for F17.





pgpIb9RzAsGw8.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

git push permission denied

2011-11-15 Thread Neal Becker
I just had to setup a new machine, and new ssh keys.

I visited 

https://admin.fedoraproject.org/accounts/user/edit/

I chose my new id_rsa.pub to upload.

But I get:

git push --verbose
Pushing to ssh://nbec...@pkgs.fedoraproject.org/mercurial
Permission denied (publickey).
fatal: The remote end hung up unexpectedly

Hints?

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: git push permission denied

2011-11-15 Thread Neal Becker
Neal Becker wrote:

 I just had to setup a new machine, and new ssh keys.
 
 I visited
 
 https://admin.fedoraproject.org/accounts/user/edit/
 
 I chose my new id_rsa.pub to upload.
 
 But I get:
 
 git push --verbose
 Pushing to ssh://nbec...@pkgs.fedoraproject.org/mercurial
 Permission denied (publickey).
 fatal: The remote end hung up unexpectedly
 
 Hints?
 
ssh -v nbec...@pkgs.fedoraproject.org
ssh -v nbec...@pkgs.fedoraproject.org
OpenSSH_5.8p1, OpenSSL 1.0.0e-fips 6 Sep 2011
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Connecting to pkgs.fedoraproject.org [209.132.181.4] port 22.
debug1: Connection established.
debug1: identity file /home/nbecker/.ssh/id_rsa type 1
debug1: identity file /home/nbecker/.ssh/id_rsa-cert type -1
debug1: identity file /home/nbecker/.ssh/id_dsa type 2
debug1: identity file /home/nbecker/.ssh/id_dsa-cert type -1
debug1: Remote protocol version 2.0, remote software version OpenSSH_5.3
debug1: match: OpenSSH_5.3 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_5.8
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server-client aes128-ctr hmac-md5 none
debug1: kex: client-server aes128-ctr hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(102410248192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Server host key: RSA fe:2e:6a:86:f3:41:e7:03:95:ea:9c:7f:75:9c:ce:9d
debug1: Host 'pkgs.fedoraproject.org' is known and matches the RSA host key.
debug1: Found key in /home/nbecker/.ssh/known_hosts:7
debug1: ssh_rsa_verify: signature correct
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: Roaming not allowed by server
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey
debug1: Next authentication method: publickey
debug1: Offering RSA public key: /home/nbecker/.ssh/id_rsa
debug1: Authentications that can continue: publickey
debug1: Offering DSA public key: /home/nbecker/.ssh/id_dsa
debug1: Authentications that can continue: publickey
debug1: No more authentication methods to try.
Permission denied (publickey).

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: git push permission denied

2011-11-15 Thread Tony Breeds
On Tue, Nov 15, 2011 at 07:22:53PM -0500, Neal Becker wrote:
 I just had to setup a new machine, and new ssh keys.
 
 I visited 
 
 https://admin.fedoraproject.org/accounts/user/edit/
 
 I chose my new id_rsa.pub to upload.
 
 But I get:
 
 git push --verbose
 Pushing to ssh://nbec...@pkgs.fedoraproject.org/mercurial
 Permission denied (publickey).
 fatal: The remote end hung up unexpectedly
 
 Hints?

I had a similar problem that didn't make sense to me but manually adding
the new ssh key to my agent (even though it was already there) fixed it
for me.

Next time I rebooted/restarted my X session the problem was resolved.

One annoying gotcha I hit after adding the new key to my agent was that
many places now failed to auth as it tried each key in my agent and
exceeded the MaxAuthTries in sshd

I hope that helps.

Yours Tony


pgpI6Efaoz9Bw.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

[Bug 754159] perl-Devel-CallChecker checks for build-time Perl version

2011-11-15 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=754159

Fedora Update System upda...@fedoraproject.org changed:

   What|Removed |Added

 Status|MODIFIED|ON_QA

--- Comment #3 from Fedora Update System upda...@fedoraproject.org 2011-11-15 
19:32:22 EST ---
Package perl-Devel-CallChecker-0.003-2.fc16:
* should fix your issue,
* was pushed to the Fedora 16 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=updates-testing
perl-Devel-CallChecker-0.003-2.fc16'
as soon as you are able to.
Please go to the following url:
https://admin.fedoraproject.org/updates/FEDORA-2011-15984
then log in and leave karma (feedback).

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

Re: git push permission denied

2011-11-15 Thread Neal Becker
Tony Breeds wrote:

 On Tue, Nov 15, 2011 at 07:22:53PM -0500, Neal Becker wrote:
 I just had to setup a new machine, and new ssh keys.
 
 I visited
 
 https://admin.fedoraproject.org/accounts/user/edit/
 
 I chose my new id_rsa.pub to upload.
 
 But I get:
 
 git push --verbose
 Pushing to ssh://nbec...@pkgs.fedoraproject.org/mercurial
 Permission denied (publickey).
 fatal: The remote end hung up unexpectedly
 
 Hints?
 
 I had a similar problem that didn't make sense to me but manually adding
 the new ssh key to my agent (even though it was already there) fixed it
 for me.
 
 Next time I rebooted/restarted my X session the problem was resolved.
 
 One annoying gotcha I hit after adding the new key to my agent was that
 many places now failed to auth as it tried each key in my agent and
 exceeded the MaxAuthTries in sshd
 
 I hope that helps.
 
 Yours Tony

Yes, I just did 'ssh-add' and now fedpkg push works
Thanks


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Update packages available now for Fedora 16 Alpha on Power

2011-11-15 Thread Robert Knight
I've added the fedora-16-prerelease repo to three ppc systems on which 
I'm experimenting, two p720's and a Mac G5.  Updates went smoothly 
except that the installation of the updated kernel 
(kernel-3.1.0-7.fc16.ppc64) failed with the message

grubby fatal error: unable to find a suitable template

I've chased this down a bit and it appears to me to be a bug in grubby 
(grubby-8.3-1.fc16.ppc64).  Specifically, the code in the routine 
suitableImage builds a string called fullName which does not have a 
slash between the bootPrefix value and the rest of the name, so that the 
check for whether the file is readable fails.

I'm not the first one to have this error message from grubby.

https://bugzilla.redhat.com/show_bug.cgi?id=124246

stretches from 2004 to the present, for example.  Since there are a 
large number of cases where grubby issued that error message, they look 
to have accumulated in bug 124246.

There are other places in grubby.c where file names are formed.  I have 
not chased them all down.  I did use a hacked version of grubby which 
correctly forms the vmlinuz file name and I no longer got the grubby 
fatal error message.  It did not produce a yaboot.conf that was usable, 
however.  It was missing the initrd line.It may be related to

https://bugzilla.redhat.com/show_bug.cgi?id=725185

which is still open.

So, my questions are these:

1.  Is there a FAQ that will point me to how to search for bugzilla 
duplicates of these two problems?
2.  Should I just add to the entries with this new information?

and like that.

Regards,
Robert
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

[Bug 754091] New: perl-Padre-0.92 is available

2011-11-15 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.

Summary: perl-Padre-0.92 is available

https://bugzilla.redhat.com/show_bug.cgi?id=754091

   Summary: perl-Padre-0.92 is available
   Product: Fedora
   Version: rawhide
  Platform: Unspecified
OS/Version: Unspecified
Status: NEW
  Keywords: FutureFeature, Triaged
  Severity: unspecified
  Priority: unspecified
 Component: perl-Padre
AssignedTo: mmasl...@redhat.com
ReportedBy: upstream-release-monitor...@fedoraproject.org
 QAContact: extras...@fedoraproject.org
CC: fedora-perl-devel-l...@redhat.com, mmasl...@redhat.com
Classification: Fedora
  Story Points: ---
  Type: ---


Latest upstream release: 0.92
Current version in Fedora Rawhide: 0.90
URL: http://search.cpan.org/dist/Padre/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 698969] perl-Class-MOP should be retired

2011-11-15 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=698969

Marcela Mašláňová mmasl...@redhat.com changed:

   What|Removed |Added

 Status|ASSIGNED|CLOSED
 Resolution||RAWHIDE
Last Closed||2011-11-15 07:18:49

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 752698] The icon is packaged, but it doesn't show on Gnome 3.2.

2011-11-15 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=752698

Marcela Mašláňová mmasl...@redhat.com changed:

   What|Removed |Added

 CC||browning4...@hotmail.com,
   ||maxamillion@fedoraproject.o
   ||rg, otay...@redhat.com,
   ||samkr...@gmail.com,
   ||walt...@verbum.org
  Component|perl-Padre  |gnome-shell
 AssignedTo|mmasl...@redhat.com |otay...@redhat.com

--- Comment #2 from Marcela Mašláňová mmasl...@redhat.com 2011-11-15 08:00:08 
EST ---
It's most probably bug of gnome-shell.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Devel-CallChecker] Rebuild against Perl 5.14.2

2011-11-15 Thread Petr Pisar
commit c5887069cd2447ffe5ee9cf785022cc5c77e6073
Author: Petr Písař ppi...@redhat.com
Date:   Tue Nov 15 15:57:31 2011 +0100

Rebuild against Perl 5.14.2

 perl-Devel-CallChecker.spec |7 ++-
 1 files changed, 6 insertions(+), 1 deletions(-)
---
diff --git a/perl-Devel-CallChecker.spec b/perl-Devel-CallChecker.spec
index 79bae9f..a281c5e 100644
--- a/perl-Devel-CallChecker.spec
+++ b/perl-Devel-CallChecker.spec
@@ -1,7 +1,7 @@
 # This file is licensed under the terms of GNU GPLv2+.
 Name:   perl-Devel-CallChecker
 Version:0.003
-Release:1%{?dist}
+Release:2%{?dist}
 Summary:Custom op checking attached to subroutines
 License:GPL+ or Artistic
 Group:  Development/Libraries
@@ -21,6 +21,8 @@ BuildRequires:  perl(Test::More)
 # Optional tests:
 BuildRequires:  perl(Test::Pod) = 1.00
 BuildRequires:  perl(Test::Pod::Coverage)
+# XXX: This package stores build-time Perl version and checks it at run-time.
+# This package must be recompiled on each Perl upgrade. See bug #754159.
 Requires:   perl(:MODULE_COMPAT_%(eval `%{__perl} -V:version`; echo 
$version))
 Requires:   perl(DynaLoader)
 Requires:   perl(Exporter)
@@ -62,6 +64,9 @@ find $RPM_BUILD_ROOT -depth -type d -exec rmdir {} 
2/dev/null \;
 %{_mandir}/man3/*
 
 %changelog
+* Tue Nov 15 2011 Petr Pisar ppi...@redhat.com - 0.003-2
+- Rebuild against Perl 5.14.2 (bug #754159)
+
 * Mon Jul 11 2011 Petr Pisar ppi...@redhat.com 0.003-1
 - Specfile autogenerated by cpanspec 1.78.
 - Remove BuildRoot and defattr
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Devel-CallChecker/f16] Rebuild against Perl 5.14.2

2011-11-15 Thread Petr Pisar
Summary of changes:

  c588706... Rebuild against Perl 5.14.2 (*)

(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 754159] perl-Devel-CallChecker checks for build-time Perl version

2011-11-15 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=754159

Petr Pisar ppi...@redhat.com changed:

   What|Removed |Added

 Status|NEW |ASSIGNED
 Blocks||720339

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 754159] New: perl-Devel-CallChecker checks for build-time Perl version

2011-11-15 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.

Summary: perl-Devel-CallChecker checks for build-time Perl version

https://bugzilla.redhat.com/show_bug.cgi?id=754159

   Summary: perl-Devel-CallChecker checks for build-time Perl
version
   Product: Fedora
   Version: 16
  Platform: Unspecified
OS/Version: Unspecified
Status: NEW
  Severity: unspecified
  Priority: unspecified
 Component: perl-Devel-CallChecker
AssignedTo: ppi...@redhat.com
ReportedBy: ppi...@redhat.com
 QAContact: extras...@fedoraproject.org
CC: fedora-perl-devel-l...@redhat.com,
mmasl...@redhat.com, ppi...@redhat.com,
psab...@redhat.com
Classification: Fedora
  Story Points: ---
  Type: ---


Using this module on Perl 5.14.2 results in:

 callchecker0.h:7:3: error: #error this callchecker0.h is for Perl 5.14.1 only

This is because this package stores and compare Perl version at build-time.
This is intentional behavior and this package must be recompiled for Perl
5.14.2

F17--16 affected.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 754159] perl-Devel-CallChecker checks for build-time Perl version

2011-11-15 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=754159

--- Comment #2 from Fedora Update System upda...@fedoraproject.org 2011-11-15 
10:07:43 EST ---
perl-Devel-CallChecker-0.003-2.fc16 has been submitted as an update for Fedora
16.
https://admin.fedoraproject.org/updates/perl-Devel-CallChecker-0.003-2.fc16

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 754159] perl-Devel-CallChecker checks for build-time Perl version

2011-11-15 Thread bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=754159

Petr Pisar ppi...@redhat.com changed:

   What|Removed |Added

 Status|ASSIGNED|MODIFIED
   Fixed In Version||perl-Devel-CallChecker-0.00
   ||3-2.fc17

--- Comment #1 from Petr Pisar ppi...@redhat.com 2011-11-15 10:05:30 EST ---
To automate this dependency, perl should Provide: PERL_EXACT() symbol and the
few packages like this one could depend on ti then. In contrast to
PERL_COMPAT(), PERL_EXACT() would exist in one instance only.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

Re: [389-devel] Please review: csn_as_string - use slapi_uN_to_hex instead of sprintf

2011-11-15 Thread Nathan Kinder

On 11/15/2011 10:29 AM, Rich Megginson wrote:




--
389-devel mailing list
389-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/389-devel

ack.
--
389-devel mailing list
389-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/389-devel

[389-devel] Please review: uniqueid formatting - use slapi_u8_to_hex instead of sprintf

2011-11-15 Thread Rich Megginson



From 17837f58fcf4f09c3df531f274bf8786b65e983a Mon Sep 17 00:00:00 2001
From: Rich Megginson rmegg...@redhat.com
Date: Tue, 15 Nov 2011 13:50:49 -0700
Subject: [PATCH] uniqueid formatting - use slapi_u8_to_hex instead of sprintf

Use slapi_u8_to_hex for each part of the uuid to convert to string
instead of the sprintf.  This is about 10-11 times faster than
sprintf.  I've verified that this produces uuids identical to the
current sprintf based formatter.
---
 ldap/servers/slapd/uniqueid.c |   31 +--
 1 files changed, 21 insertions(+), 10 deletions(-)

diff --git a/ldap/servers/slapd/uniqueid.c b/ldap/servers/slapd/uniqueid.c
index adfb448..a65bbc6 100644
--- a/ldap/servers/slapd/uniqueid.c
+++ b/ldap/servers/slapd/uniqueid.c
@@ -152,6 +152,7 @@ int slapi_uniqueIDCompareString(const char *uuid1, const char *uuid2)
 */
 int slapi_uniqueIDFormat (const Slapi_UniqueID *uId, char **buff){
 	guid_t uuid_tmp;
+	char *ptr;
 	
 if (uId == NULL || buff == NULL)
 	{
@@ -173,16 +174,26 @@ int slapi_uniqueIDFormat (const Slapi_UniqueID *uId, char **buff){
 uuid_tmp.time_mid = htons(uuid_tmp.time_mid);
 uuid_tmp.time_hi_and_version = htons(uuid_tmp.time_hi_and_version);
 
-	sprintf (*buff, %2.2x%2.2x%2.2x%2.2x-%2.2x%2.2x%2.2x%2.2x-
-			 %2.2x%2.2x%2.2x%2.2x-%2.2x%2.2x%2.2x%2.2x, 
-			 ((PRUint8 *) uuid_tmp.time_low)[0], ((PRUint8 *) uuid_tmp.time_low)[1],
-			 ((PRUint8 *) uuid_tmp.time_low)[2], ((PRUint8 *) uuid_tmp.time_low)[3],
-			 ((PRUint8 *) uuid_tmp.time_mid)[0], ((PRUint8 *) uuid_tmp.time_mid)[1],
-			 ((PRUint8 *) uuid_tmp.time_hi_and_version)[0],
-			 ((PRUint8 *) uuid_tmp.time_hi_and_version)[1], 
-			 uuid_tmp.clock_seq_hi_and_reserved, uuid_tmp.clock_seq_low,
-			 uuid_tmp.node[0], uuid_tmp.node[1], uuid_tmp.node[2],
-			 uuid_tmp.node[3], uuid_tmp.node[4], uuid_tmp.node[5]);
+	ptr = slapi_u8_to_hex(((uint8_t *)uuid_tmp.time_low)[0], *buff, 0);
+	ptr = slapi_u8_to_hex(((uint8_t *)uuid_tmp.time_low)[1], ptr, 0);
+	ptr = slapi_u8_to_hex(((uint8_t *)uuid_tmp.time_low)[2], ptr, 0);
+	ptr = slapi_u8_to_hex(((uint8_t *)uuid_tmp.time_low)[3], ptr, 0);
+	*ptr++ = '-';
+	ptr = slapi_u8_to_hex(((uint8_t *)uuid_tmp.time_mid)[0], ptr, 0);
+	ptr = slapi_u8_to_hex(((uint8_t *)uuid_tmp.time_mid)[1], ptr, 0);
+	ptr = slapi_u8_to_hex(((uint8_t *)uuid_tmp.time_high_and_version)[0], ptr, 0);
+	ptr = slapi_u8_to_hex(((uint8_t *)uuid_tmp.time_high_and_version)[1], ptr, 0);
+	*ptr++ = '-';
+	ptr = slapi_u8_to_hex(uuid_tmp.clock_seq_hi_and_reserved, ptr, 0);
+	ptr = slapi_u8_to_hex(uuid_tmp.clock_seq_low, ptr, 0);
+	ptr = slapi_u8_to_hex(uuid_tmp.node[0], ptr, 0);
+	ptr = slapi_u8_to_hex(uuid_tmp.node[1], ptr, 0);
+	*ptr++ = '-';
+	ptr = slapi_u8_to_hex(uuid_tmp.node[2], ptr, 0);
+	ptr = slapi_u8_to_hex(uuid_tmp.node[3], ptr, 0);
+	ptr = slapi_u8_to_hex(uuid_tmp.node[4], ptr, 0);
+	ptr = slapi_u8_to_hex(uuid_tmp.node[5], ptr, 0);
+	*ptr = 0;
 
 	return UID_SUCCESS;
 }
-- 
1.7.1

--
389-devel mailing list
389-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/389-devel

Re: [389-devel] Please review: uniqueid formatting - use slapi_u8_to_hex instead of sprintf

2011-11-15 Thread Nathan Kinder

On 11/15/2011 01:12 PM, Rich Megginson wrote:





--
389-devel mailing list
389-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/389-devel

ack.
--
389-devel mailing list
389-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/389-devel