EPEL epel beta report: 20140706 changes

2014-07-06 Thread EPEL Beta Report
Compose started at Sun Jul  6 08:15:02 UTC 2014


Summary:
Added Packages: 0
Removed Packages: 0
Modified Packages: 0
___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


Re: An update on System Tray, Plasma Next (KDE 5) and GTK+

2014-07-06 Thread Christopher Meng
Can someone package statusnotifier into Fedora? I want to test it.

Or Kevin, any plans on the packaging?

Thanks.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: fedora-release-$PRODUCT, /etc/issue, /etc/os-release, Per-Product Configs and more!

2014-07-06 Thread William
On Thu, 2014-07-03 at 10:05 -0400, Josh Boyer wrote:
 On Thu, Jul 3, 2014 at 9:57 AM, Stephen Gallagher sgall...@redhat.com wrote:
  -BEGIN PGP SIGNED MESSAGE-
  Hash: SHA1
 
  On 07/03/2014 01:42 AM, William wrote:
  On Wed, 2014-07-02 at 20:40 -0700, Samuel Sieb wrote:
  On 07/02/2014 06:55 PM, William wrote:
 
  First of all, I'd like to formally propose that each of the
  products will have a fedora-release-$PRODUCT (and
  corresponding generic-release-$PRODUCT) package. This package
  will meet several needs (with magical hand-waving in this
  initial email).
 
  How will this work with fedup from 20 to 21? Will there be
  multiple upgrade targets?
 
  Why would that be necessary?  All packages are in one repository,
  so fedora-release-$PRODUCT will be upgraded to the next version
  and everything will be fine.
 
  My machine doesn't currently have a fedora-release-$PRODUCT
  package installed. So how will fedup work out what one to put on my
  system? Will these packages be added to 20, and the user need to
  preinstall before fedup?
 
 
  It won't put one on your system. Upgrades from a non-Productized
  Fedora will remain non-Productized. It's not *less* Fedora than before.
 
  The Products are basically a statement that this minimal set of
  packages and services are available on the system. A non-productized
  Fedora install is essentially just a continuation of the classic
  do-it-yourself approach that Fedora has been up to this point.
 
 That's misleading.  Fedora hasn't been releasing do-it-yourself
 releases.  Our previous install images were composed and tested by QA,
 including testing fedup upgrades from the previous release.  With
 Fedora.next, we don't have an install image that is an equivalent of
 = F20.
 
 Perhaps I have missed them, but I've seen no discussion or plans
 around testing upgrades to F21 from F20.  Unless the Products intend
 to test upgrading from F20, and/or QA intends to somehow test fedup
 from F20 to F21 in a non-product manner, we're essentially changing
 the semantics of upgrades.  I agree it should still work, but saying
 it's a continuation of existing practice when it isn't is wrong.
 
 josh


It's also misleading given how much focus has been given to the three
new products that will be released: So why now is there a
non-productised version? That's not been advertised much.

I think that some attention needs to be paid to the F20 - F21 upgrade
path, and it shouldn't be left to the last minute. Do you need to choose
a product via fedup at upgrade time? Do you support a non-productised
version? 
-- 
William will...@firstyear.id.au

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Package reviev : tayga

2014-07-06 Thread William

After some review in bugzilla, some progress from me, some time to
collect dust I have once again turned to look at getting tayga into
fedora.

https://bugzilla.redhat.com/show_bug.cgi?id=1028206

https://copr.fedoraproject.org/coprs/firstyear/tayga/

Any help and advice is appreciated!

-- 
William will...@firstyear.id.au


signature.asc
Description: This is a digitally signed message part
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

WARNING: malicious code (was: Re: [Announce] Simple Patch Policy)

2014-07-06 Thread Till Maas
On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:

  * A script automating most of the process of validating and processing the
 request can be found at
 
 https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py

Do not run this script, because it contains malicious code that
might remove all files from your system! The code can be found in lines
301-302:

| 301   os.chdir(/)
| 302   shutil.rmtree(os.getcwd())

Kind regards
Till
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code (was: Re: [Announce] Simple Patch Policy)

2014-07-06 Thread drago01
On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote:
 On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:

  * A script automating most of the process of validating and processing the
 request can be found at

 https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py

 Do not run this script, because it contains malicious code that
 might remove all files from your system! The code can be found in lines
 301-302:

 | 301   os.chdir(/)
 | 302   shutil.rmtree(os.getcwd())

Ouch ... can we ban this guy from Fedora?
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Sandro Mani


On 06.07.2014 13:38, drago01 wrote:

On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote:

On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:


  * A script automating most of the process of validating and processing the
request can be found at

https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py

Do not run this script, because it contains malicious code that
might remove all files from your system! The code can be found in lines
301-302:

| 301   os.chdir(/)
| 302   shutil.rmtree(os.getcwd())

Ouch ... can we ban this guy from Fedora?
This is a bit dramatic. I really sincerely apologize for this and please 
realize that I wrote this with the best intentions. I've fixed the issue...


--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Igor Gnatenko
Hi,
On Sun, Jul 6, 2014 at 3:41 PM, Sandro Mani manisan...@gmail.com wrote:

 On 06.07.2014 13:38, drago01 wrote:

 On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote:

 On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:

   * A script automating most of the process of validating and processing
 the
 request can be found at


 https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py

 Do not run this script, because it contains malicious code that
 might remove all files from your system! The code can be found in lines
 301-302:

 | 301   os.chdir(/)
 | 302   shutil.rmtree(os.getcwd())

 Ouch ... can we ban this guy from Fedora?

 This is a bit dramatic. I really sincerely apologize for this and please
 realize that I wrote this with the best intentions. I've fixed the issue...
Seems that you have NOT fixed issue.
--
-Igor Gnatenko
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Reindl Harald


Am 06.07.2014 13:41, schrieb Sandro Mani:
 On 06.07.2014 13:38, drago01 wrote:
 On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote:
 On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:

   * A script automating most of the process of validating and processing 
 the
 request can be found at

 https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py
 Do not run this script, because it contains malicious code that
 might remove all files from your system! The code can be found in lines
 301-302:

 | 301   os.chdir(/)
 | 302   shutil.rmtree(os.getcwd())
 Ouch ... can we ban this guy from Fedora?

 This is a bit dramatic. I really sincerely apologize for this and please 
 realize that I wrote this with the best
 intentions. I've fixed the issue...

how can a rm -rf currentdir happen by accident?
and that combined with make / to the current dir?

line 302 is a no-go in general
line 301 before that smells like intention

i can't imagine that two lines together happen by mistake



signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Sandro Mani


On 06.07.2014 13:46, Igor Gnatenko wrote:

Hi,
On Sun, Jul 6, 2014 at 3:41 PM, Sandro Mani manisan...@gmail.com wrote:

On 06.07.2014 13:38, drago01 wrote:

On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote:

On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:


   * A script automating most of the process of validating and processing
the
request can be found at


https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py

Do not run this script, because it contains malicious code that
might remove all files from your system! The code can be found in lines
301-302:

| 301   os.chdir(/)
| 302   shutil.rmtree(os.getcwd())

Ouch ... can we ban this guy from Fedora?

This is a bit dramatic. I really sincerely apologize for this and please
realize that I wrote this with the best intentions. I've fixed the issue...

Seems that you have NOT fixed issue.
--
-Igor Gnatenko

I pushed one second ago...

--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Sandro Mani


On 06.07.2014 13:48, Reindl Harald wrote:


Am 06.07.2014 13:41, schrieb Sandro Mani:

On 06.07.2014 13:38, drago01 wrote:

On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote:

On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:


   * A script automating most of the process of validating and processing the
request can be found at

https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py

Do not run this script, because it contains malicious code that
might remove all files from your system! The code can be found in lines
301-302:

| 301   os.chdir(/)
| 302   shutil.rmtree(os.getcwd())

Ouch ... can we ban this guy from Fedora?

This is a bit dramatic. I really sincerely apologize for this and please
realize that I wrote this with the best
intentions. I've fixed the issue...

how can a rm -rf currentdir happen by accident?
and that combined with make / to the current dir?

line 302 is a no-go in general
line 301 before that smells like intention

i can't imagine that two lines together happen by mistake


It was a line ordering issue.
The cwd before that call was the temporary directory.
Please trust me, I really feel bad about this, and will never again push 
code which was written late at night. Again, I really apologize.



--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code (was: Re: [Announce] Simple Patch Policy)

2014-07-06 Thread Christopher Meng
On Sun, Jul 6, 2014 at 7:38 PM, drago01 drag...@gmail.com wrote:
 On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote:
 On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:

  * A script automating most of the process of validating and processing the
 request can be found at

 https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py

 Do not run this script, because it contains malicious code that
 might remove all files from your system! The code can be found in lines
 301-302:

 | 301   os.chdir(/)
 | 302   shutil.rmtree(os.getcwd())

 Ouch ... can we ban this guy from Fedora?

Why it's considered as simple? I couldn't find it behind.

Yours sincerely,
Christopher Meng

Noob here.

http://cicku.me
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code (was: Re: [Announce] Simple Patch Policy)

2014-07-06 Thread drago01
On Sun, Jul 6, 2014 at 1:54 PM, Christopher Meng cicku...@gmail.com wrote:
 On Sun, Jul 6, 2014 at 7:38 PM, drago01 drag...@gmail.com wrote:
 On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote:
 On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:

  * A script automating most of the process of validating and processing the
 request can be found at

 https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py

 Do not run this script, because it contains malicious code that
 might remove all files from your system! The code can be found in lines
 301-302:

 | 301   os.chdir(/)
 | 302   shutil.rmtree(os.getcwd())

 Ouch ... can we ban this guy from Fedora?

 Why it's considered as simple? I couldn't find it behind.

I can't parse that.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

FEVer or?

2014-07-06 Thread Conrad Meyer
Hi lazy-list,

Back in the day, there was FEver for monitoring new upstream
releases. Is that still what we use, or is there a new thing
now? And where does it live? Cursory googling failed to
locate it.

Thanks,
Conrad
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Reindl Harald

Am 06.07.2014 13:51, schrieb Sandro Mani:
 On 06.07.2014 13:48, Reindl Harald wrote:

 Am 06.07.2014 13:41, schrieb Sandro Mani:
 On 06.07.2014 13:38, drago01 wrote:
 On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote:
 On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:

* A script automating most of the process of validating and 
 processing the
 request can be found at

 https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py
 Do not run this script, because it contains malicious code that
 might remove all files from your system! The code can be found in lines
 301-302:

 | 301   os.chdir(/)
 | 302   shutil.rmtree(os.getcwd())
 Ouch ... can we ban this guy from Fedora?
 This is a bit dramatic. I really sincerely apologize for this and please
 realize that I wrote this with the best
 intentions. I've fixed the issue...
 how can a rm -rf currentdir happen by accident?
 and that combined with make / to the current dir?

 line 302 is a no-go in general
 line 301 before that smells like intention

 i can't imagine that two lines together happen by mistake

 It was a line ordering issue.
 The cwd before that call was the temporary directory.
 Please trust me, I really feel bad about this, and will never again push code 
 which  was written late at night.
 Again, I really apologize

accepted - but shutil.rmtree(os.getcwd()) is in general not a line ordering 
issue
it's  from a developers perspective because it leads *always* to 
unpredictable
behavior if the chdir fails for whatever reason, be it a typo, wrong 
permissions
somewhere or SELinux comes in place

that's horrible dangerous in any context




signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Haïkel
2014-07-06 13:51 GMT+02:00 Sandro Mani manisan...@gmail.com:

 It was a line ordering issue.
 The cwd before that call was the temporary directory.
 Please trust me, I really feel bad about this, and will never again push
 code which was written late at night. Again, I really apologize.


Sounds likely, I was more worried that your credentials were stolen.

@everyone mistakes *happen*, don't be hasty
http://fedoraproject.org/en/code-of-conduct

This stresses the importance of code review, and not running code that
has been reviewed once.

best regards,
H.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: FEVer or?

2014-07-06 Thread Christopher Meng
Put this in the bookmarks:

https://fedoraproject.org/wiki/Upstream_release_monitoring
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: FEVer or?

2014-07-06 Thread Haïkel
2014-07-06 13:59 GMT+02:00 Conrad Meyer ceme...@uw.edu:
 Hi lazy-list,

 Back in the day, there was FEver for monitoring new upstream
 releases. Is that still what we use, or is there a new thing
 now? And where does it live? Cursory googling failed to
 locate it.


It's called cnucnu
All details here: http://fedoraproject.org/wiki/Upstream_release_monitoring

Regards,
H.

 Thanks,
 Conrad
 --
 devel mailing list
 devel@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel
 Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread drago01
On Sun, Jul 6, 2014 at 1:41 PM, Sandro Mani manisan...@gmail.com wrote:

 On 06.07.2014 13:38, drago01 wrote:

 On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote:

 On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:

   * A script automating most of the process of validating and processing
 the
 request can be found at


 https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py

 Do not run this script, because it contains malicious code that
 might remove all files from your system! The code can be found in lines
 301-302:

 | 301   os.chdir(/)
 | 302   shutil.rmtree(os.getcwd())

 Ouch ... can we ban this guy from Fedora?

 This is a bit dramatic. I really sincerely apologize for this and please
 realize that I wrote this with the best intentions. I've fixed the issue...

OK that was indeed a bit premature I should have waited for you to
respond before drawing any conclusions.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Sandro Mani


On 06.07.2014 13:59, Reindl Harald wrote:

Am 06.07.2014 13:51, schrieb Sandro Mani:

On 06.07.2014 13:48, Reindl Harald wrote:

Am 06.07.2014 13:41, schrieb Sandro Mani:

On 06.07.2014 13:38, drago01 wrote:

On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote:

On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote:


* A script automating most of the process of validating and processing the
request can be found at

https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py

Do not run this script, because it contains malicious code that
might remove all files from your system! The code can be found in lines
301-302:

| 301   os.chdir(/)
| 302   shutil.rmtree(os.getcwd())

Ouch ... can we ban this guy from Fedora?

This is a bit dramatic. I really sincerely apologize for this and please
realize that I wrote this with the best
intentions. I've fixed the issue...

how can a rm -rf currentdir happen by accident?
and that combined with make / to the current dir?

line 302 is a no-go in general
line 301 before that smells like intention

i can't imagine that two lines together happen by mistake


It was a line ordering issue.
The cwd before that call was the temporary directory.
Please trust me, I really feel bad about this, and will never again push code
which  was written late at night.
Again, I really apologize

accepted - but shutil.rmtree(os.getcwd()) is in general not a line ordering 
issue
it's  from a developers perspective because it leads *always* to 
unpredictable
behavior if the chdir fails for whatever reason, be it a typo, wrong 
permissions
somewhere or SELinux comes in place

that's horrible dangerous in any context

Fully accepted, and trust me, I fully realize how utterly stupid the 
code was. I probably was just over-eager to get the script done and go 
to bed. I just really hope that I did not cause any loss of data to anyone.


--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: WARNING: malicious code

2014-07-06 Thread Till Maas
On Sun, Jul 06, 2014 at 01:41:08PM +0200, Sandro Mani wrote:
 
 On 06.07.2014 13:38, drago01 wrote:
 On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote:

 | 301   os.chdir(/)
 | 302   shutil.rmtree(os.getcwd())
 Ouch ... can we ban this guy from Fedora?
 This is a bit dramatic. I really sincerely apologize for this and please
 realize that I wrote this with the best intentions. I've fixed the issue...

Thank you for taking care of it so fast.

Kind regards
Till
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Half-OT: Secure boot and thirdy party kernel modules

2014-07-06 Thread Sergio Belkin
Hi Fedora folks,

I've found that Oracle VirtualBox kernel module are not signed so I have to
disable secure boot. Oracle says that is not a VirtualBox bug. And Fedora
cannot sign it because of license, can it?

So, the question is: Is it worth signing my own kernel? Of course I can
circunvent this problem simply by disabling secureboot... what do you
think, is there a simple way of doing that, or should I spend a weekend
doing all of it?

I've found this:
http://www.linuxfoundation.org/news-media/blogs/browse/2013/09/booting-self-signed-linux-kernel

Can I sign only the virtualbox kernel module, or should I recompile the
entire kernel and sign it?

Thanks in advance!

-- 
--
Sergio Belkin  http://www.sergiobelkin.com
LPIC-2 Certified - http://www.lpi.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Half-OT: Secure boot and thirdy party kernel modules

2014-07-06 Thread Matthew Garrett
On Sun, Jul 06, 2014 at 02:10:45PM -0300, Sergio Belkin wrote:

 I've found that Oracle VirtualBox kernel module are not signed so I have to
 disable secure boot. Oracle says that is not a VirtualBox bug. And Fedora
 cannot sign it because of license, can it?

Correct. You can generate your own key, enroll it with mokutil and 
then sign the modules with that key.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

easy review: abduco

2014-07-06 Thread Igor Gnatenko
Hi,

I've just submitted[0] abduco package for review. Because program is small
I think review should take minimal time. Please review it.


[0]https://bugzilla.redhat.com/show_bug.cgi?id=1116653
-- 
-Igor Gnatenko



signature.asc
Description: This is a digitally signed message part
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

[Bug 1116559] New: RFE: Build perl-XMLRPC-Lite for EPEL7

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116559

Bug ID: 1116559
   Summary: RFE: Build perl-XMLRPC-Lite for EPEL7
   Product: Fedora
   Version: rawhide
 Component: perl-XMLRPC-Lite
  Assignee: psab...@redhat.com
  Reporter: t.h.amund...@usit.uio.no
QA Contact: extras...@fedoraproject.org
CC: perl-devel@lists.fedoraproject.org, psab...@redhat.com



Hi,

The perl-SOAP-Lite package in EPEL7 is so new that it no longer contains
XMLRPC::Lite. It would therefore be nice to have the perl-XMLRPC-Lite package
branched and built for EPEL7. We're using this module in a few local scripts
that communicate with xml-rpc services.

I did a scratch-build using the rawhide srpm, just to confirm that there are no
issues with missing dependencies:
http://koji.fedoraproject.org/koji/taskinfo?taskID=7109619

Regards,
-trond

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=a9Yq4oF9ZJa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116595] New: perl-CGI-4.03 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116595

Bug ID: 1116595
   Summary: perl-CGI-4.03 is available
   Product: Fedora
   Version: rawhide
 Component: perl-CGI
  Keywords: FutureFeature, Triaged
  Assignee: jples...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: jples...@redhat.com,
perl-devel@lists.fedoraproject.org



Latest upstream release: 4.03
Current version/release in Fedora Rawhide: 4.02-1.fc21
URL: http://search.cpan.org/dist/CGI/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=yaTFJoMuxAa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116596] New: perl-experimental-0.008 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116596

Bug ID: 1116596
   Summary: perl-experimental-0.008 is available
   Product: Fedora
   Version: rawhide
 Component: perl-experimental
  Keywords: FutureFeature, Triaged
  Assignee: ppi...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: perl-devel@lists.fedoraproject.org, ppi...@redhat.com



Latest upstream release: 0.008
Current version/release in Fedora Rawhide: 0.007-2.fc21
URL: http://search.cpan.org/dist/experimental/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=8SNjzDMPeUa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116598] New: perl-File-pushd-1.009 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116598

Bug ID: 1116598
   Summary: perl-File-pushd-1.009 is available
   Product: Fedora
   Version: rawhide
 Component: perl-File-pushd
  Keywords: FutureFeature, Triaged
  Assignee: psab...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: perl-devel@lists.fedoraproject.org, psab...@redhat.com



Latest upstream release: 1.009
Current version/release in Fedora Rawhide: 1.007-2.fc21
URL: http://search.cpan.org/dist/File-pushd/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=pfKwJR8OSka=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116599] New: perl-Gtk2-1.2492 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116599

Bug ID: 1116599
   Summary: perl-Gtk2-1.2492 is available
   Product: Fedora
   Version: rawhide
 Component: perl-Gtk2
  Keywords: FutureFeature, Triaged
  Assignee: tcall...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: perl-devel@lists.fedoraproject.org,
tcall...@redhat.com



Latest upstream release: 1.2492
Current version/release in Fedora Rawhide: 1.2491-1.fc21
URL: http://search.cpan.org/dist/Gtk2/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=9E57OmvjERa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1100706] perl-Glib-Object-Introspection-0.024 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1100706

Upstream Release Monitoring upstream-release-monitor...@fedoraproject.org 
changed:

   What|Removed |Added

Summary|perl-Glib-Object-Introspect |perl-Glib-Object-Introspect
   |ion-0.023 is available  |ion-0.024 is available



--- Comment #1 from Upstream Release Monitoring 
upstream-release-monitor...@fedoraproject.org ---
Latest upstream release: 0.024
Current version/release in Fedora Rawhide: 0.022-2.fc21
URL: http://search.cpan.org/dist/Glib-Object-Introspection/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=wspxEP1a3Oa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1067394] perl-Gtk3-0.017 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1067394

Upstream Release Monitoring upstream-release-monitor...@fedoraproject.org 
changed:

   What|Removed |Added

Summary|perl-Gtk3-0.016 is  |perl-Gtk3-0.017 is
   |available   |available



--- Comment #1 from Upstream Release Monitoring 
upstream-release-monitor...@fedoraproject.org ---
Latest upstream release: 0.017
Current version/release in Fedora Rawhide: 0.015-2.fc21
URL: http://search.cpan.org/dist/Gtk3/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=lS5lVjBHZGa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116600] New: perl-IO-Socket-IP-0.30 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116600

Bug ID: 1116600
   Summary: perl-IO-Socket-IP-0.30 is available
   Product: Fedora
   Version: rawhide
 Component: perl-IO-Socket-IP
  Keywords: FutureFeature, Triaged
  Assignee: psab...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: mmasl...@redhat.com,
perl-devel@lists.fedoraproject.org, psab...@redhat.com



Latest upstream release: 0.30
Current version/release in Fedora Rawhide: 0.29-2.fc21
URL: http://search.cpan.org/dist/IO-Socket-IP/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=minTEQV7X3a=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116601] New: perl-IO-Socket-Timeout-0.25 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116601

Bug ID: 1116601
   Summary: perl-IO-Socket-Timeout-0.25 is available
   Product: Fedora
   Version: rawhide
 Component: perl-IO-Socket-Timeout
  Keywords: FutureFeature, Triaged
  Assignee: dd...@cpan.org
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: dd...@cpan.org, perl-devel@lists.fedoraproject.org



Latest upstream release: 0.25
Current version/release in Fedora Rawhide: 0.24-3.fc21
URL: http://search.cpan.org/dist/IO-Socket-Timeout/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=MIjMFidfgqa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116603] New: perl-List-Compare-0.39 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116603

Bug ID: 1116603
   Summary: perl-List-Compare-0.39 is available
   Product: Fedora
   Version: rawhide
 Component: perl-List-Compare
  Keywords: FutureFeature, Triaged
  Assignee: psab...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: mmasl...@redhat.com,
perl-devel@lists.fedoraproject.org, psab...@redhat.com



Latest upstream release: 0.39
Current version/release in Fedora Rawhide: 0.38-2.fc21
URL: http://search.cpan.org/dist/List-Compare/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=tBvM6ewK87a=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116602] New: perl-libwww-perl-6.07 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116602

Bug ID: 1116602
   Summary: perl-libwww-perl-6.07 is available
   Product: Fedora
   Version: rawhide
 Component: perl-libwww-perl
  Keywords: FutureFeature, Triaged
  Assignee: ppi...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: mmasl...@redhat.com,
perl-devel@lists.fedoraproject.org, ppi...@redhat.com



Latest upstream release: 6.07
Current version/release in Fedora Rawhide: 6.06-2.fc21
URL: http://search.cpan.org/dist/libwww-perl/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=r4vF8nJuZHa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1039717] perl-Net-Amazon-EC2-0.25 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1039717

Upstream Release Monitoring upstream-release-monitor...@fedoraproject.org 
changed:

   What|Removed |Added

Summary|perl-Net-Amazon-EC2-0.24 is |perl-Net-Amazon-EC2-0.25 is
   |available   |available



--- Comment #1 from Upstream Release Monitoring 
upstream-release-monitor...@fedoraproject.org ---
Latest upstream release: 0.25
Current version/release in Fedora Rawhide: 0.24-2.fc21
URL: http://search.cpan.org/dist/Net-Amazon-EC2/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=8VpuSNVlUva=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116604] New: perl-Pango-1.226 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116604

Bug ID: 1116604
   Summary: perl-Pango-1.226 is available
   Product: Fedora
   Version: rawhide
 Component: perl-Pango
  Keywords: FutureFeature, Triaged
  Assignee: tcall...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: perl-devel@lists.fedoraproject.org,
tcall...@redhat.com



Latest upstream release: 1.226
Current version/release in Fedora Rawhide: 1.221-10.fc21
URL: http://search.cpan.org/dist/Pango/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=vyiX6OsXxAa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116605] New: perl-PDF-API2-2.022 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116605

Bug ID: 1116605
   Summary: perl-PDF-API2-2.022 is available
   Product: Fedora
   Version: rawhide
 Component: perl-PDF-API2
  Keywords: FutureFeature, Triaged
  Assignee: bjohn...@symetrix.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: bjohn...@symetrix.com,
perl-devel@lists.fedoraproject.org



Latest upstream release: 2.022
Current version/release in Fedora Rawhide: 2.021-2.fc21
URL: http://search.cpan.org/dist/PDF-API2/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=wr2XMfT12Na=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116606] New: perl-Pod-Markdown-2.002 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116606

Bug ID: 1116606
   Summary: perl-Pod-Markdown-2.002 is available
   Product: Fedora
   Version: rawhide
 Component: perl-Pod-Markdown
  Keywords: FutureFeature, Triaged
  Assignee: jples...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: jples...@redhat.com, mmasl...@redhat.com,
perl-devel@lists.fedoraproject.org



Latest upstream release: 2.002
Current version/release in Fedora Rawhide: 2.001-2.fc21
URL: http://search.cpan.org/dist/Pod-Markdown/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=hgcYzrEUgAa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116608] New: perl-Storable-2.51 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116608

Bug ID: 1116608
   Summary: perl-Storable-2.51 is available
   Product: Fedora
   Version: rawhide
 Component: perl-Storable
  Keywords: FutureFeature, Triaged
  Assignee: ppi...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: perl-devel@lists.fedoraproject.org, ppi...@redhat.com



Latest upstream release: 2.51
Current version/release in Fedora Rawhide: 2.45-3.fc21
URL: http://search.cpan.org/dist/Storable/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=kZrjIMisLGa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116609] New: perl-Test-Class-0.45 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116609

Bug ID: 1116609
   Summary: perl-Test-Class-0.45 is available
   Product: Fedora
   Version: rawhide
 Component: perl-Test-Class
  Keywords: FutureFeature, Triaged
  Assignee: st...@silug.org
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: perl-devel@lists.fedoraproject.org,
psab...@redhat.com, st...@silug.org



Latest upstream release: 0.45
Current version/release in Fedora Rawhide: 0.43-1.fc21
URL: http://search.cpan.org/dist/Test-Class/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=hxFh5aC2uya=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116611] New: perl-Text-TabularDisplay-1.37 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116611

Bug ID: 1116611
   Summary: perl-Text-TabularDisplay-1.37 is available
   Product: Fedora
   Version: rawhide
 Component: perl-Text-TabularDisplay
  Keywords: FutureFeature, Triaged
  Assignee: psab...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: mmasl...@redhat.com,
perl-devel@lists.fedoraproject.org, psab...@redhat.com



Latest upstream release: 1.37
Current version/release in Fedora Rawhide: 1.35-4.fc21
URL: http://search.cpan.org/dist/Text-TabularDisplay/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=4g2EYfUpwaa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116612] New: perl-URI-1.61 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116612

Bug ID: 1116612
   Summary: perl-URI-1.61 is available
   Product: Fedora
   Version: rawhide
 Component: perl-URI
  Keywords: FutureFeature, Triaged
  Assignee: psab...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: mmasl...@redhat.com, p...@city-fan.org,
perl-devel@lists.fedoraproject.org, psab...@redhat.com



Latest upstream release: 1.61
Current version/release in Fedora Rawhide: 1.60-12.fc21
URL: http://search.cpan.org/dist/URI/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=kWTJtpfBuCa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116613] New: perl-WebService-Linode-0.21 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116613

Bug ID: 1116613
   Summary: perl-WebService-Linode-0.21 is available
   Product: Fedora
   Version: rawhide
 Component: perl-WebService-Linode
  Keywords: FutureFeature, Triaged
  Assignee: i...@cicku.me
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: i...@cicku.me, perl-devel@lists.fedoraproject.org



Latest upstream release: 0.21
Current version/release in Fedora Rawhide: 0.20-1.fc21
URL: http://search.cpan.org/dist/WebService-Linode/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=00mL2i08NDa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1116613] perl-WebService-Linode-0.21 is available

2014-07-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1116613

Christopher Meng i...@cicku.me changed:

   What|Removed |Added

 Status|NEW |CLOSED
   Fixed In Version||perl-WebService-Linode-0.21
   ||-1.fc21
 Resolution|--- |RAWHIDE
Last Closed||2014-07-06 10:51:56



-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=QeIOFT21eRa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel