Re: EPEL getting terminus-fonts added to 7
This requirement seems to be just in the fedora spec file -- it doesn't seem to be part of the upstream. From the man page, this is set with the '-fn' flag at runtime. I didn't look at xmonad, but there's nothing inherently in dmenu which seems to need it. I removed terminus-fonts with --nodeps from a test system, and it seems to run fine maybe that's an easier solution? Right I also put that idea to Christopher. I am not really sure why dmenu requires terminus-fonts in particular: though it does need some bitmap font to be installed to work. Jens ___ epel-devel mailing list epel-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/epel-devel
EPEL epel beta report: 20140709 changes
Compose started at Wed Jul 9 08:15:02 UTC 2014 New package: cgit-0.10.2-3.el7 A fast web interface for git New package: freight-0.3.5-4.el7 A modern take on the Debian archive New package: garcon-0.2.1-5.el7 Implementation of the freedesktop.org menu specification New package: jabberpy-0.5-0.27.el7 Python xmlstream and jabber IM protocol libs New package: joe-3.7-11.el7 An easy to use, modeless text editor New package: perl-Cairo-1.104-1.el7 Perl interface to the cairo library New package: perl-Glib-1.305-1.el7 Perl interface to GLib New package: perl-Gtk2-1.2492-1.el7 Perl interface to the 2.x series of the Gimp Toolkit library New package: perl-Pango-1.226-1.el7 Perl interface to the pango library New package: perl-XMLRPC-Lite-0.717-2.el7 Client and server implementation of XML-RPC protocol New package: python-XStatic-1.0.1-1.el7 XStatic base package with minimal support code New package: python-vobject-0.8.1c-8.el7 A python library for manipulating vCard and vCalendar files New package: quilt-0.63-2.el7 Scripts for working with series of patches New package: seren-0.0.18-2.el7 Simple VoIP program to create conferences from the terminal New package: terminus-fonts-4.38-3.el7 Clean fixed width font New package: xfce4-dev-tools-4.10.0-7.el7 Xfce developer tools New package: xfdashboard-0.2.0-1.el7 GNOME shell like dashboard for Xfce Removed package: docker-registry-0.6.5-1.el7 Removed package: php-channel-phpunit-1.3-7.el7 Removed package: python-backports-lzma-0.0.2-5.el7 Removed package: python-gunicorn-18.0-1.el7 Removed package: python-itsdangerous-0.23-1.el7 Removed package: python-requests-2.3.0-2.el7 Removed package: python-urllib3-1.8.2-3.el7 Updated Packages: copr-cli-1.35-1.el7 --- * Fri Jul 04 2014 Miroslav Suchý msu...@redhat.com 1.35-1 - [cli] stop waiting when the status is unknown * Fri Jul 04 2014 Miroslav Suchý msu...@redhat.com 1.34-1 - [cli] skipped state support lyx-2.1.1-1.el7 --- * Fri Jul 04 2014 José Matos jama...@fedoraproject.org - 2.1.1-1 - update to 2.1.1 * Sat Jun 07 2014 Fedora Release Engineering rel-...@lists.fedoraproject.org - 2.1.0-4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild * Thu May 22 2014 Petr Machata pmach...@redhat.com - 2.1.0-3 - Rebuild for boost 1.55.0 mingw-qt5-qtgraphicaleffects-5.3.1-1.el7 * Tue Jul 08 2014 Erik van Pienbroek epien...@fedoraproject.org - 5.3.1-1 - Update to 5.3.1 mingw-qt5-qtimageformats-5.3.1-1.el7 * Tue Jul 08 2014 Erik van Pienbroek epien...@fedoraproject.org - 5.3.1-1 - Update to 5.3.1 mingw-qt5-qtlocation-5.3.1-1.el7 * Tue Jul 08 2014 Erik van Pienbroek epien...@fedoraproject.org - 5.3.1-1 - Update to 5.3.1 mingw-qt5-qtmultimedia-5.3.1-1.el7 -- * Tue Jul 08 2014 Erik van Pienbroek epien...@fedoraproject.org - 5.3.1-1 - Update to 5.3.1 mingw-qt5-qtquick1-5.3.1-1.el7 -- * Tue Jul 08 2014 Erik van Pienbroek epien...@fedoraproject.org - 5.3.1-1 - Update to 5.3.1 mingw-qt5-qtscript-5.3.1-1.el7 -- * Tue Jul 08 2014 Erik van Pienbroek epien...@fedoraproject.org - 5.3.1-1 - Update to 5.3.1 mingw-qt5-qtsensors-5.3.1-1.el7 --- * Tue Jul 08 2014 Erik van Pienbroek epien...@fedoraproject.org - 5.3.1-1 - Update to 5.3.1 mingw-qt5-qtsvg-5.3.1-1.el7 --- * Tue Jul 08 2014 Erik van Pienbroek epien...@fedoraproject.org - 5.3.1-1 - Update to 5.3.1 mingw-qt5-qttools-5.3.1-1.el7 - * Sun Jul 06 2014 Erik van Pienbroek epien...@fedoraproject.org - 5.3.1-1 - Update to 5.3.1 mingw-qt5-qttranslations-5.3.1-1.el7 * Tue Jul 08 2014 Erik van Pienbroek epien...@fedoraproject.org - 5.3.1-1 - Update to 5.3.1 mingw-qt5-qtwebkit-5.3.1-1.el7 -- * Tue Jul 08 2014 Erik van Pienbroek epien...@fedoraproject.org - 5.3.1-1 - Update to 5.3.1 mono-2.10.8-8.el7 - * Tue Jul 08 2014 Leigh Scott leigh123li...@googlemail.com - 2.10.8-8 - move obsoletes to core package php-horde-Horde-Compress-Fast-1.0.3-1.el7 - * Wed Jul 09 2014 Remi Collet r...@fedoraproject.org - 1.0.3-1 - Update to 1.0.3 php-horde-horde-5.1.7-1.el7 --- * Mon Jul 07 2014 Remi Collet r...@fedoraproject.org - 5.1.7-1 - Update to 5.1.7 php-horde-imp-6.1.8-1.el7 - * Mon Jul 07 2014 Remi Collet r...@fedoraproject.org - 6.1.8-1 - Update to 6.1.8 php-horde-ingo-3.1.5-1.el7 -- * Mon Jul 07 2014 Remi Collet
Re: EPEL getting terminus-fonts added to 7
On Wed, Jul 9, 2014 at 4:02 PM, Jens Petersen peter...@redhat.com wrote: I strongly suggest that please also update this package to the latest version 4.39 instead of using 4.38. What is the advantage of 4.39? It is not in rawhide yet though... Version 4.39: - Added ballot, checkmark, heavy ballot and heavy checkmark. - Changed HT, LF etc. in sizes 14 and 18-hi2 to be proportional to the letter height, not the matrix height. - Added the powerline characters E0A0..E0A2 and E0B0..E0B3. - Added diameter (2300) - same gluph as empty set (2205). - Small improvements in size 32. ___ epel-devel mailing list epel-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/epel-devel
EPEL Fedora 6 updates-testing report
The following Fedora EPEL 6 Security updates need testing: Age URL 808 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2012-5620/bugzilla-3.4.14-2.el6 155 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-0440/fwsnort-1.6.4-1.el6 140 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-0590/oath-toolkit-2.0.2-4.el6 49 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1471/chicken-4.8.0.6-2.el6 46 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1477/drupal7-views-3.8-1.el6 30 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1584/python-djblets-0.7.30-2.el6 27 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1616/puppet-2.7.26-1.el6 18 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1693/perl-Email-Address-1.905-1.el6 13 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1732/seamonkey-2.21-7.ESR_24.6.0.el6 12 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1745/mediawiki119-1.19.17-1.el6 10 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1772/cacti-0.8.8b-7.el6 9 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1782/zarafa-7.1.10-1.el6 6 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1807/chrony-1.30-1.el6 6 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1816/ansible-1.6.6-1.el6 4 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1827/lz4-r119-1.el6 4 https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-1832/pnp4nagios-0.6.22-2.el6 The following builds have been pushed to Fedora EPEL 6 updates-testing AntTweakBar-1.16-1.el6 cgit-0.10.2-3.el6 fedfs-utils-0.9.6-1.el6 freight-0.3.5-4.el6 mono-2.10.8-4.el6 nx-libs-3.5.0.27-1.el6 perl-SOCKS-0.03-1.el6 php-horde-Horde-Compress-Fast-1.0.3-1.el6 php-horde-Horde-Imap-Client-2.23.2-1.el6 php-horde-Horde-Mime-2.4.3-1.el6 qpid-proton-0.7-3.el6 wqy-microhei-fonts-0.2.0-0.14.beta.el6 Details about builds: AntTweakBar-1.16-1.el6 (FEDORA-EPEL-2014-1860) GUI library for videogame property editing UIs Update Information: New upstream version ChangeLog: * Tue Jul 8 2014 David Brown david.br...@pnnl.gov - 1.16-1 - New upstream version * Fri Jun 6 2014 Fedora Release Engineering rel-...@lists.fedoraproject.org - 1.14-8 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild * Fri Aug 2 2013 Fedora Release Engineering rel-...@lists.fedoraproject.org - 1.14-7 - Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild * Wed Feb 13 2013 Fedora Release Engineering rel-...@lists.fedoraproject.org - 1.14-6 - Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild cgit-0.10.2-3.el6 (FEDORA-EPEL-2014-1859) A fast web interface for git Update Information: Update to 0.10.2. Fix httpd configuration file and SELinux documentation. Update to 0.10.2. Fixes bug #1114970 ChangeLog: * Tue Jul 8 2014 Pavel Raiskup prais...@redhat.com - 0.10.2-3 - currently epel-7-ppc64 does not have highlight package (#1117261) * Tue Jul 8 2014 Pavel Raiskup prais...@redhat.com - 0.10.2-2 - install README.SELinux documentation again (#1036123) - generate cgit.conf for httpd = 2.4 when needed * Tue Jul 1 2014 Kevin Fenzi ke...@scrye.com 0.10.2-1 - Update to 0.10.2. Fixes bug #1114970 References: [ 1 ] Bug #1114970 - cgit-0.10.2 is available https://bugzilla.redhat.com/show_bug.cgi?id=1114970 [ 2 ] Bug #1036123 - Fix selinux documentation and allow httpd to serve static files by default https://bugzilla.redhat.com/show_bug.cgi?id=1036123 fedfs-utils-0.9.6-1.el6 (FEDORA-EPEL-2014-1861) Utilities for mounting and managing FedFS Update Information: update to fedfs-utils 0.9.6 ChangeLog: * Tue Jul 8 2014 Chuck Lever chuck.le...@oracle.com - 0.9.6-1 - update to fedfs-utils 0.9.6 * Wed May 28 2014 Chuck Lever chuck.le...@oracle.com - 0.9.5-2 - EL6.6 has kernel and mountd junction support. Add -server subpackage
Re: EPEL getting terminus-fonts added to 7
Hi Christopher, Quite frankly, it's no needed as a MUST. You could let users to install. When I claimed over this package months ago, it's already there. I could drop this requires, but I need time to verify the conf file and make sure dmenu works still(no major changes in the display). Unfortunately, I don't have time now. Sure, I think it is not urgent and would suggest doing it initially just for Rawhide and I don't think it is something that has to be backported, but in the long term it probably makes sense to drop the explicit requires. I updated terminus-fonts to 4.39 for F22 and F21 earlier today, it could be backported later perhaps if necessary. Thanks, Jens ___ epel-devel mailing list epel-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/epel-devel
Re: EPEL Orphan or retire the TurboGears (v1) stack in 7
Hi Toshio, I have just noticed this message after I failed to install TurboGears (v1) on CentOS 7. We really need the TurboGears (v1) support via epel for el7. Migrating away from TurboGears V1 to V2 or to other framework seems impossible for us at the moment, though we know that we will have to migrate in future. Could you help to suggest what we could do to revive these packages and have epel7 will still support TurboGears( v1 )? -- Best Regards Jacky -Original Message- From: epel-devel-boun...@lists.fedoraproject.org [mailto:epel-devel-boun...@lists.fedoraproject.org] On Behalf Of Toshio Kuratomi Sent: Saturday, 21 June 2014 3:02 AM To: epel-devel@lists.fedoraproject.org Subject: Re: EPEL Orphan or retire the TurboGears (v1) stack in 7 On Mon, Jun 16, 2014 at 12:01:26PM -0700, Toshio Kuratomi wrote: If someone steps up to say they'll take ownership of TurboGears1 (one of the comaintainers or someone new), then I'll reassign these packages to them. If no one does, then I'll retire them in epel7 and ask that the packages be removed from the download repos before epel7 leaves beta. Someone can revive them later if they're interested. == Packages to be orphaned retired == * python-cherrypy2 * python-elixir * python-peak-rules * python-turbocheetah * bodhi * python-tgcaptcha2 * python-turboflot * python-turbokid (need to remove a spurious dep on this from TurboGears2) * python-turbojson (need to remove a spurious dep on this from TurboGears2) * python-paste-script (this one has other dependents in Fedora but none in EPEL7. Please speak up or revive this later if you're interested) These have now been retired. If someone is interested in them, feel free to revive. -Toshio [wargaming.net] EgzO3mXGcK This e-mail may contain CONFIDENTIAL AND PROPRIETARY INFORMATION and/or PRIVILEGED AND CONFIDENTIAL COMMUNICATION intended solely for the recipient and, therefore, may not be retransmitted to any party outside of the recipient's organization without the prior written consent of the sender. If you have received this e-mail in error please notify the sender immediately by telephone or reply e-mail and destroy the original message without making a copy. Wargaming.net accepts no liability for any losses or damages resulting from infected e-mail transmissions and viruses in e-mail attachment. kgzO3mXGcg ___ epel-devel mailing list epel-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/epel-devel
Fedora 21 Mass Branching
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi All, Fedora 21 has been branched, please be sure to do a git pull --rebase to pick up the new branch, as an additional reminder rawhide/f22 has had inheritance cut off from previous releases, so this means that anything you do for f21 you also have to do in the master branch and do a build there. This is the same as we did for fedora 19 and 20. Dennis -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBAgAGBQJTvN+zAAoJEH7ltONmPFDRBOAP/31mp+fzedIM0KMOuDvkgRRm /5NYjkWwwoR8ocFdGfSDsYPy/YPo5hJNnA41vtNTf6Sl2nZVRfniCiE15OXnwpfH FBV/fSqBODMnEi43q9hojVNE1abS3i9QLO966GaS5YexEcvRsd9PdVTtb20oU3qK dEFGChyXzD7H9HgaMN3cUBKBQisErwt7ZznNrPzxdGPJskXEf4R0Jcb3M7n9lJl3 GOH2mS93KTfty67/Kxqdq5WGJ0UeJL8lQJzfs61vgP8vnfFkI0Lojhr6uCuPIwoa vaLbE+7Z2Ky0J2/fNsMkmQzEnbTcUTEi0jTzEejrPcQSF2pKuQfWD5eBxai65V95 44eetg20Mir7s1NrJ3lkNgxwfeneNauRnTJpk8G24rr7f6fqA12TdvFvIqZLhB/o 0DFfHjme93kVtxndXy+Z9cqx2JViF83xc0l/4mcDed/T47hbDc0/gpfnyJdayi9X mwrWWLWqDo+uvwlMbJOPvIbfejDLZQ7PsBNFvZr/j2uiP0sqR33/ajJmEPyTB0/G Im0IJ2PQa1Em7Or7sCsJwF7gThXPfOvExEZ9gkG8cfDXdxQIcAo7CTmXz0J3fdY5 FFUenCy0BX0QrKWdQIQHhFiT2siKn5x/pG8k4C+vM/6iGlRoInAE4qrRojkOh4rH xIfMAdvlJkfp00FJwiob =MUNE -END PGP SIGNATURE- ___ devel-announce mailing list devel-annou...@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel-announce -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
PkgDB, pending ACL requests
Good Morning everyone! In the version 1.13 of pkgdb2 a new API endpoint has been added that just provide the list of pending ACL requests: https://admin.fedoraproject.org/pkgdb/api/pendingacls I just wanted to share with you the first line of its output: # Number of requests pending: 5492 Now I do realize that the branching that occured yesterday is blowing up this number compared to yesterday, but please be careful to log in pkgdb2 once a while and check out the pending ACL requests requiring your attention. Note: Since the same pkgdb2 release, there is a small notification showing-up and informing you about any pending ACL requests requiring your attention every time you log in the application :) Pierre -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: [corrected!] Re: 5tFTW: DNF and Mailing List Wars, F21 Branch, FESCo Election, Python 3.5, and Docs Beats (2014-07-08)
Am 09.07.2014 03:40, schrieb Matthew Miller: On Thursday, DNF version 0.5.3 was announced, along with Core DNF Plugins 0.1.1, which contains a new protected_packages plugin. So, there we go. It think it’s worth noting, though, that this a good example of how mailing list discussions often fail us. There were a lot of messages, but almost no new information in hundreds of posts — it’s mostly people going back and forth, feeling like they’re not being heard or listened to. And then, many people feeling frustrated and driven out of meaningful discourse by the noise. That’s a dynamic we need to change. If something is really important and you feel that your view isn't counted, there are other channels by which issues can be raised i like to add here that people who are shouting left and right i do not need that the discussion is idiotic and why they don't need that existing features are the root cause, especially in the DNF thread if someone does *not need* something which is very important for others but not in any case in his way he could be quiet instead flood the list and bugzilla with noise that in his opinion all people who don't want to lose existing features are dumb in fact it where around 5 people keep heating the discussion and burry the arguments of people which did not want more than what was present over years and now came back in DNF and it that case *you must* respond and try to explain why their arguments are wrong in case of upstream did not care and closed bugreports 2014/01 already signature.asc Description: OpenPGP digital signature -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
New Fedora 22 Change proposal: systemd-sysusers
Hi, for Atomic I'd like to investigate the new systemd-sysusers, so I wrote up a Change: https://fedoraproject.org/wiki/Changes/SystemdSysusers Note: for Fedora 22. The main motivation for me is it would allow Atomic to not be a Remix due to the not-in-Fedora shadow-utils patch[1] Further, it would potentially allow us to migrate away from /usr/lib/passwd and nss-altfiles which would be really nice. Though I'm still exploring that. [1] https://bugzilla.redhat.com/show_bug.cgi?id=1098304 -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: [corrected!] Re: 5tFTW: DNF and Mailing List Wars, F21 Branch, FESCo Election, Python 3.5, and Docs Beats (2014-07-08)
On Wed, Jul 09, 2014 at 01:13:30PM +0200, Reindl Harald wrote: in fact it where around 5 people keep heating the discussion and burry the arguments of people which did not want more than what was present over years and now came back in DNF and it that case *you must* respond and try to explain why their arguments are wrong in case of upstream did not care and closed bugreports 2014/01 already It is absolutely fine to respond and make the points. But if someone doesn't get it after that, it's okay to let the matter drop. In fact, it's the best thing to do. This is _particularly_ true when the person responding isn't doing so with a good attitude. When, as you say, people are heating the discussion, the best way to cool it down is to not throw fuel. You can't educate people who aren't interested in listening, and they're generally not the people making decisions anyway. In fact, it makes the situation worse because it makes it drives away people who might agree with you -- or be convinced. -- Matthew Miller mat...@fedoraproject.org Fedora Project Leader -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: New Fedora 22 Change proposal: systemd-sysusers
On Wed, Jul 09, 2014 at 06:19:19AM -0700, Colin Walters wrote: Hi, for Atomic I'd like to investigate the new systemd-sysusers, so I wrote up a Change: https://fedoraproject.org/wiki/Changes/SystemdSysusers Note: for Fedora 22. The main motivation for me is it would allow Atomic to not be a Remix due to the not-in-Fedora shadow-utils patch[1] Further, it would potentially allow us to migrate away from /usr/lib/passwd and nss-altfiles which would be really nice. Though I'm still exploring that. [1] https://bugzilla.redhat.com/show_bug.cgi?id=1098304 Colin, we're _really_ hoping to make Atomic a flagship feature for Fedora Cloud in F21. If I work on getting the shadow-utils patch landed, does that _conflict_ with the new approach? (And, are there any other blockers which would make this not a possibility?) -- Matthew Miller mat...@fedoraproject.org Fedora Project Leader -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: New Fedora 22 Change proposal: systemd-sysusers
- Original Message - Hi, for Atomic I'd like to investigate the new systemd-sysusers, so I wrote up a Change: https://fedoraproject.org/wiki/Changes/SystemdSysusers A move to something more declarative makes sense (whether in systemd or through some kind of long-expected declarative rpm facility doesn’t matter to me much.) The sysusers tool _really_ needs to use an existing API to manage the user database, though. As it is, the implementation * validates names incorrectly * breaks the configurable [UG]ID_MIN logic (http://fedoraproject.org/wiki/Features/1000SystemAccounts, and yes, that is actually used and needed) * is likely to break various readers software by not updating the shadow files * doesn’t do any auditing. We are currently already in a bad position by having two major implementations of maintaining the critical databases, we absolutely don’t want any more. At this point this means systemd-sysuers should either run the executables from shadow-utils, or link to libuser. (Or, I suppose, use accountsservice, but that ends up calling shadow-utils.). The plan is to have a single implementation, living around sssd. (Jakub knows more.) Either of two API points above are planned to use the sssd implementation, so can be relied on long-term. Mirek -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: New Fedora 22 Change proposal: systemd-sysusers
On Wed, Jul 9, 2014, at 06:34 AM, Matthew Miller wrote: Colin, we're _really_ hoping to make Atomic a flagship feature for Fedora Cloud in F21. If I work on getting the shadow-utils patch landed, does that _conflict_ with the new approach? It doesn't conflict, no. Let's discuss this in the bug, and thanks for helping with this! -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: [Base] The Base Design WG is looking for a new committee member!
That sounds great Michal. If you could join us tomorrow at our meeting at 15:00 UTC on #fedora-meeting that would be excellent. Thank you for your interest and see you tomorrow! Regards, Phil On 07/08/2014 02:31 PM, Michal Sekletar wrote: On Fri, Jun 27, 2014 at 06:13:01PM +0200, Phil Knirsch wrote: Hi everyone. Hello everyone, As Bill Nottingham has decided to resign from the committee we now have a free seat that we'd like to fill with another person. In order to fill this seat i'm therefore reaching out here to Fedora development to offer allow any applicant from the community to get in touch with us and let us know you're interested, why you're interested, why you think you'd be a good fit and maybe even the things you'd like to drive or accomplish in the Base Design WG. I am interested in becoming a member of Base Design WG. I'd like help with accomplishing goals of Base WG and make sure that we provide minimal but solid foundation for others to build upon. I believe my previous experience makes me a good fit for this position : * Red Hat employee since 2011, now member of Plumbers group * maintainer and contributor to various networking related projects * systemd maintainer in RHEL I'd like to help with integration of upstream changes in key components to the distribution and making sure they are not disruptive. Another area where I'd like to contribute are container use cases of Fedora Base. Ensuring we provide minimal, but easily extensible platform for sand-boxed/containerized apps. For more background on what the Base WG does, here our Fedora wiki: https://fedoraproject.org/wiki/Base In order to contact us you can either reply directly to me or join us during our regular meetings each Friday at 15:00 UTC on #fedora-meeting. I strongly suspect next weeks meeting will be canceled due to the US holiday, but after that we'll be doing weekly meetings again. Looking forward to see you there! Thanks regards, Phil -- Philipp Knirsch | Tel.: +49-711-96437-470 Manager Core Services| Fax.: +49-711-96437-111 Red Hat GmbH | Email: Phil Knirsch pknir...@redhat.com Wankelstrasse 5 | Web: http://www.redhat.com/ D-70563 Stuttgart, Germany -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct Michal -- Philipp Knirsch | Tel.: +49-711-96437-470 Manager Core Services| Fax.: +49-711-96437-111 Red Hat GmbH | Email: Phil Knirsch pknir...@redhat.com Wankelstrasse 5 | Web: http://www.redhat.com/ D-70563 Stuttgart, Germany -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
startxfce4 harmonization with the systemd-logind
startxfce4 harmonization with the systemd-logind https://bugzilla.redhat.com/show_bug.cgi?id=1117682 https://bugzilla.redhat.com/attachment.cgi?id=916668 As explained here, gphoto2 only as root - https://lists.fedoraproject.org/pipermail/users/2014-January/446166.html with the reference, systemd-logind not tracking startx sessions https://bugzilla.redhat.com/show_bug.cgi?id=806491 Applicable to Fedora 19 - 21 Rawhide. poma -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: startxfce4 harmonization with the systemd-logind
On Wed, 09 Jul 2014 10:21:55 +0200 poma pomidorabelis...@gmail.com wrote: startxfce4 harmonization with the systemd-logind https://bugzilla.redhat.com/show_bug.cgi?id=1117682 https://bugzilla.redhat.com/attachment.cgi?id=916668 As explained here, gphoto2 only as root - https://lists.fedoraproject.org/pipermail/users/2014-January/446166.html with the reference, systemd-logind not tracking startx sessions https://bugzilla.redhat.com/show_bug.cgi?id=806491 Applicable to Fedora 19 - 21 Rawhide. Thanks for the patch, will take a look. IMHO, There's no need to post to multiple lists and directly mail upstream folks when you file a bug with a patch though. kevin signature.asc Description: PGP signature -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: New Fedora 22 Change proposal: systemd-sysusers
On Wed, Jul 9, 2014, at 07:30 AM, Miloslav Trmač wrote: * validates names incorrectly We're talking about the equivalent of lu_name_allowed() from libuser? Something like the /* Allow trailing $ for samba machine accounts. */ ? But the usernames specified here are only for system users, they're not derived from dynamic input, so it seems to me we can be even more restrictive safely. Can you be more specific about the name validation? * breaks the configurable [UG]ID_MIN logic (http://fedoraproject.org/wiki/Features/1000SystemAccounts, and yes, that is actually used and needed) It *does* read that file since: http://cgit.freedesktop.org/systemd/systemd/commit/?id=f7dc3ab9f43b67abcbd34062b9352ab42debec49 This predates sysusers, but I'm assuming you mean the bug here is that it's read at build time and instead should be dynamic? * is likely to break various readers software by not updating the shadow files There was a discussion of that upstream, it's on the TODO. I agree with Lennart here that it seems nicer to just not have entries at all, but if it breaks some checking tool, doesn't hurt to add it either. * doesn’t do any auditing. I don't see libuser doing any either? Am I missing it? We are currently already in a bad position by having two major implementations of maintaining the critical databases, we absolutely don’t want any more. Those two being libuser and shadow-utils? At this point this means systemd-sysuers should either run the executables from shadow-utils, or link to libuser. (Or, I suppose, use accountsservice, but that ends up calling shadow-utils.). Hmm. Well, I do see a key distinction here being between system and non-system accounts. There's clearly a need for unification and caching around all of the many ways in which admins might want to store and manage non-system accounts, and I see SSSD providing a lot of value there. But system accounts are a lot more restricted; and we're not discussing (now) having them anywhere other than /etc/passwd in the traditional format, correct? In that case, I don't see significant complexity or cost to having multiple readers/writers. -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: New Fedora 22 Change proposal: systemd-sysusers
(This is all rather beside the point: fixing those particular things won’t eliminate any of the problems of triplicate implementations and splintered knowledge. But to spread the awareness of the area…) - Original Message - On Wed, Jul 9, 2014, at 07:30 AM, Miloslav Trmač wrote: * validates names incorrectly We're talking about the equivalent of lu_name_allowed() from libuser? Yes. But the usernames specified here are only for system users, they're not derived from dynamic input, so it seems to me we can be even more restrictive safely. True; to that extent this is not such a pressing problem. Can you be more specific about the name validation? The binding maximum length constraint is from the utmp format (UT_NAMESIZE - 1); LOGIN_NAME_MAX is an upper bound but not binding, and this has already ended up in systemd-sysuser’s documentation essentially promising to do the impossible/unsafe by using the non-binding maximum length. * breaks the configurable [UG]ID_MIN logic (http://fedoraproject.org/wiki/Features/1000SystemAccounts, and yes, that is actually used and needed) It *does* read that file since: http://cgit.freedesktop.org/systemd/systemd/commit/?id=f7dc3ab9f43b67abcbd34062b9352ab42debec49 This predates sysusers, but I'm assuming you mean the bug here is that it's read at build time and instead should be dynamic? Yes. * is likely to break various readers software by not updating the shadow files There was a discussion of that upstream, it's on the TODO. I agree with Lennart here that it seems nicer to just not have entries at all, On a typical system _no_ accounts are misssing from the shadow files, so tools and admins’ scripts are not designed and rigorously tested to handle this. (Early in its history, system-config-users had a _lot_ of problems with shadow/non-shadow mismatches.) Note also that if a tool needs to edit _one_ field within the shadow file, it needs to add some values for all the other fields (or at least the mandatory ones), and it’s not always obvious what value to use. So it’s actually much clearer for the system tools, which already know the default values of the fields based on their own configuration, to pre-create the shadow entries with the correct default values. (Though this applies especially to real users rather than passwordless system accounts.) * doesn’t do any auditing. I don't see libuser doing any either? Am I missing it? No, it’s also missing I’m afraid. We are currently already in a bad position by having two major implementations of maintaining the critical databases, we absolutely don’t want any more. Those two being libuser and shadow-utils? Yes, to my knowledge. At this point this means systemd-sysuers should either run the executables from shadow-utils, or link to libuser. (Or, I suppose, use accountsservice, but that ends up calling shadow-utils.). Hmm. Well, I do see a key distinction here being between system and non-system accounts. The two are distinct, but that doesn’t justify having three different writers with different policies maintaining a single database, for either of the cases. In that case, I don't see significant complexity or cost to having multiple readers/writers. The cost to write the new code in systemd-sysusers is already way larger than what would have been necessary to just call useradd, so it is inefficient by that measure already. Then add this discussion, and making any future changes in the design more costly (like your proposal for /usr/lib/passwd - one more implementation is one more place to patch; every future change would be all that much harder) Mirek -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: New Fedora 22 Change proposal: systemd-sysusers
On Wed, 09.07.14 06:19, Colin Walters (walt...@verbum.org) wrote: Hi, for Atomic I'd like to investigate the new systemd-sysusers, so I wrote up a Change: https://fedoraproject.org/wiki/Changes/SystemdSysusers Note: for Fedora 22. The main motivation for me is it would allow Atomic to not be a Remix due to the not-in-Fedora shadow-utils patch[1] Further, it would potentially allow us to migrate away from /usr/lib/passwd and nss-altfiles which would be really nice. Though I'm still exploring that. [1] https://bugzilla.redhat.com/show_bug.cgi?id=1098304 Ah, interesting. A week ago I filed this: https://fedorahosted.org/fpc/ticket/442 In order to get the process started to get this through FPC first. In that ticket I actually promised to bring this up on fedora-devel, but it appears that you beat me to it. The reason I haven't brought this up yet is because I wanted a nice way how we can make use of this from RPM scriptlets, so that packages can just stick to this declarative scheme, and be done. However, that's actually not that trivial: Some packages (notably polkit) rely on files owned by a system user that is not root. This means we need to do the user registration in %pre how it was always done. But if we do the user registration declaratively from files we ship in the RPM, then we could only run that from %post, which of course means that the files cannot be owned properly. Fortunately it's only a handful of packages which appear to require that though (but I didn't spend to much time to figure out the details). Our current way of thinking is to simply introduce a second syntax for the sysusers RPM macro: the few packages which need that would then be able to embedd the declaration of the user into %pre, while most users would be created via %post. The few packages which need that would contain the user definition at two places though: once in the file system in a drop-in file shipped in the RPM, and a second time, inline, in the %pre scriptlet. Not pretty... Not sure though what other options there are, that would be better... Anyway, I do like to see this feature implemented in Fedora. I think it's really crucial to get this done. Lennart -- Lennart Poettering, Red Hat -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: New Fedora 22 Change proposal: systemd-sysusers
On Wed, 09.07.14 10:30, Miloslav Trmač (m...@redhat.com) wrote: - Original Message - Hi, for Atomic I'd like to investigate the new systemd-sysusers, so I wrote up a Change: https://fedoraproject.org/wiki/Changes/SystemdSysusers A move to something more declarative makes sense (whether in systemd or through some kind of long-expected declarative rpm facility doesn’t matter to me much.) The sysusers tool _really_ needs to use an existing API to manage the user database, though. Yeah, because we dodn't want to intrdocue any new API we have carefully made sure that whenever we write pasword, group and shadow files we use existing APIs from glibc, more specifically putpwent(), putgrent(), putspent() and crypt_r(). This is about creating system users, not normal users, hence using anything more fancy than glibc's native APIs is wrong. This is not stuff which is supposed to land on an ActiveDirectory server or so. It's stuff we need to be able to recreate during earliest boot, before the first daemons start, where little else but the most basic file system is around. libuser is not useful for this kind of environment. It appears to me that libuser unsuccessfully duplicates APIs from glibc, shadow-utils and other packages. I mean, it's quite weird to have both passwd and lpasswd around, and then complaining to me that we don't need multiple implementations. I mean, I really don't understand why there are two implementations of this in the first place! Anyway, I can understand the reason for libuser's existence, but for the low-level stuff we do with systemd here this is simply not the right tool for the job. We want something so low level that glibc is the only right option. Also, note that with systemd we try to find solutions that work for most Linux distributions. libuser appears to be quite common on Fedora, but I am pretty sure that systemd is not the vehicle to make it standard on other distributions too, in particular via such a relatively auxiliary feature of systemd. As it is, the implementation * validates names incorrectly How so? Can you elaborate? Point me to normative documents? * breaks the configurable [UG]ID_MIN logic (http://fedoraproject.org/wiki/Features/1000SystemAccounts, and yes, that is actually used and needed) Well, this is something I really don't like. THis limit should be compile-time configurable, but not runtime-configurable. This is something the distributor needs to decide on, not something administrators should be able to change without recompiling. With systemd we kinda need to get something that works for the big picture, and I have doubts that this is something I want to see in the big picture, sorry. * is likely to break various readers software by not updating the shadow files Well, we don't update the shadow file, since a missing shadow entry is actually interpreted the exact way we want it here: as a disabled account, with no password set, where it is not possible to login to. That's the absolute correct default for system users. That said, it was brought to my attention that pwck doesn't agree with that. So I figure we'll update the shadow file too, the patch should be easy. It's on the todo list. * doesn’t do any auditing. Well, looking forward to a patch to add this. We are currently already in a bad position by having two major implementations of maintaining the critical databases, we absolutely don’t want any more. Good! We just use glibc APIs for writing those files. If you want only one implementation, why not get rid of libuser, and stick to glibc? ;-) At this point this means systemd-sysuers should either run the executables from shadow-utils, or link to libuser. (Or, I suppose, use accountsservice, but that ends up calling shadow-utils.). Sorry, I am not going to play your stacking game. This is supposed to be simple, work in a minimal early-boot environment, and use stuff that is commonly around on Linuxes, from embedded to servers. glibc APIs are. libuser is not. The plan is to have a single implementation, living around sssd. (Jakub knows more.) Either of two API points above are planned to use the sssd implementation, so can be relied on long-term. Mirek I am sorry, but to make this very clear: sssd has not place in early boot or in smaller setups. The problems we we want to solve with systemd we try to solve generically, and this means that I am not telling people to pull in sssd into the smallest of devices. sssd/libuser is fine for creating nomral users with, and fine for late-boot stuff, and fine for bigger setups. But other than that, glibc wins the day. Lennart -- Lennart Poettering, Red Hat -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: rawhide report: 20140709 changes
FYI, rawhide composed fine, but due to renaming and building a new rawhide composer machine it didn't properly sync the compose to the master mirror. :( I have corrected the issue and am manually syncing it over now. So, if you wonder why you didn't see any updates in yum/dnf, thats why. ;) kevin signature.asc Description: PGP signature -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: New Fedora 22 Change proposal: systemd-sysusers
Once upon a time, Lennart Poettering mzerq...@0pointer.de said: On Wed, 09.07.14 10:30, Miloslav Trmač (m...@redhat.com) wrote: * breaks the configurable [UG]ID_MIN logic (http://fedoraproject.org/wiki/Features/1000SystemAccounts, and yes, that is actually used and needed) Well, this is something I really don't like. THis limit should be compile-time configurable, but not runtime-configurable. This is something the distributor needs to decide on, not something administrators should be able to change without recompiling. Please, no! As soon as you use disparate systems in a network environment, having differing versions of UID_MIN (where recompilation is required to change) is just wrong. As the message above sys, yes, that is actually used and needed. I see no valid justification for removing that functionality. -- Chris Adams li...@cmadams.net -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: New Fedora 22 Change proposal: systemd-sysusers
Am 09.07.2014 19:18, schrieb Chris Adams: Once upon a time, Lennart Poettering mzerq...@0pointer.de said: On Wed, 09.07.14 10:30, Miloslav Trmač (m...@redhat.com) wrote: * breaks the configurable [UG]ID_MIN logic (http://fedoraproject.org/wiki/Features/1000SystemAccounts, and yes, that is actually used and needed) Well, this is something I really don't like. THis limit should be compile-time configurable, but not runtime-configurable. This is something the distributor needs to decide on, not something administrators should be able to change without recompiling. and because someone decicdes to compile different the admin should be forced to re-compile? that's not how the world works! Please, no! As soon as you use disparate systems in a network environment, having differing versions of UID_MIN (where recompilation is required to change) is just wrong. As the message above sys, yes, that is actually used and needed. I see no valid justification for removing that functionality +1 UID_MIN 500 UID_MAX 6 GID_MIN 500 GID_MAX 6 still here in use and that won't change if somebody enforces to change that at compile time he don't care for any production setups not re-installed every year and decides to break things just for fun signature.asc Description: OpenPGP digital signature -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: rawhide report: 20140709 changes
On Wed, Jul 09, 2014 at 11:01:57 -0600, Kevin Fenzi ke...@scrye.com wrote: FYI, rawhide composed fine, but due to renaming and building a new rawhide composer machine it didn't properly sync the compose to the master mirror. :( I have corrected the issue and am manually syncing it over now. I am seeing the rawhide stuff now. Is the branched stuff going to show up soon? -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: rawhide report: 20140709 changes
On Wed, 9 Jul 2014 12:23:54 -0500 Bruno Wolff III br...@wolff.to wrote: On Wed, Jul 09, 2014 at 11:01:57 -0600, Kevin Fenzi ke...@scrye.com wrote: FYI, rawhide composed fine, but due to renaming and building a new rawhide composer machine it didn't properly sync the compose to the master mirror. :( I have corrected the issue and am manually syncing it over now. I am seeing the rawhide stuff now. Is the branched stuff going to show up soon? The branched compose failed this morning, we are fixing that up and hopefully there will be a branched tree later today. kevin signature.asc Description: PGP signature -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: New Fedora 22 Change proposal: systemd-sysusers
On Wed, 09.07.14 12:25, Miloslav Trmač (m...@redhat.com) wrote: Can you be more specific about the name validation? The binding maximum length constraint is from the utmp format (UT_NAMESIZE - 1); LOGIN_NAME_MAX is an upper bound but not binding, and this has already ended up in systemd-sysuser’s documentation essentially promising to do the impossible/unsafe by using the non-binding maximum length. Oh, well. If utmp really is the normative source for this then that's quite a pity, in particular since this appears not to be documented anywhere, even though people care quite often what the maximum length for usernames is. If 32chars as required by utmp is really the limit we should follow here, then I would really enjoy if we'd actually set LOGIN_NAME_MAX to the same value. Anyway, I have now added a check for UT_NAMESIZE-1: http://cgit.freedesktop.org/systemd/systemd/commit/?id=932ad62b84165b0acf690ea34c4b8083657ae244 There was a discussion of that upstream, it's on the TODO. I agree with Lennart here that it seems nicer to just not have entries at all, On a typical system _no_ accounts are misssing from the shadow files, so tools and admins’ scripts are not designed and rigorously tested to handle this. (Early in its history, system-config-users had a _lot_ of problems with shadow/non-shadow mismatches.) Note also that if a tool needs to edit _one_ field within the shadow file, it needs to add some values for all the other fields (or at least the mandatory ones), and it’s not always obvious what value to use. So it’s actually much clearer for the system tools, which already know the default values of the fields based on their own configuration, to pre-create the shadow entries with the correct default values. (Though this applies especially to real users rather than passwordless system accounts.) Well, we use glibc APIs. It would be good to document this in the respective manpages, most specifically putspent(3). Thanks. Hmm, it would be good btw, if libuser would actually use glibc APIs, for the precise reasons you are pointing out. As it appears though you reimplemented all those APIs for no reason... The two are distinct, but that doesn’t justify having three different writers with different policies maintaining a single database, for either of the cases. Well, sysusers is on the safe side here, we appear to be the only ones who actually use the lowest level APIs for this, there are, which are glibc's, but I figure I am repeating myself now... In that case, I don't see significant complexity or cost to having multiple readers/writers. The cost to write the new code in systemd-sysusers is already way larger than what would have been necessary to just call useradd, so it is inefficient by that measure already. Then add this discussion, and making any future changes in the design more costly (like yourd proposal for /usr/lib/passwd - one more implementation is one more place to patch; every future change would be all that much harder) Mirek Well, userass/adduser are something the distros currently deviate greatly in, and we needed somethign simple, safe, somewhat vwidely available and capable of running in earliest boot. The glibc APis provide that, no other API does that. Oh, also, libuser is a glib API. Nothing against glibc, but for the low-level stuff we do that runs with nothing around we try to be OOM safe, and stuff... Lennart -- Lennart Poettering, Red Hat -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Minutes from today's FESCo Meeting (2014-07-09)
=== #fedora-meeting: FESCO (2014-07-09) === Meeting started by mattdm at 17:01:56 UTC. The full logs are available at http://meetbot.fedoraproject.org/fedora-meeting/2014-07-09/fesco.2014-07-09-17.01.log.html . Meeting summary --- * init process (mattdm, 17:02:02) * #1311 Disable syscall auditing by default (mattdm, 17:04:21) * LINK: https://fedorahosted.org/fesco/ticket/1311 (mattdm, 17:04:25) * ACTION: mitr to close syscall auditing ticket, file bug, etc. (mattdm, 17:09:42) * #1322 F21 Changes - Progress on Changes Freeze (mattdm, 17:09:52) * LINK: https://fedorahosted.org/fesco/ticket/1322 (mattdm, 17:10:02) * ACTION: mattdm to take aperidoc updates to cloud wg and qa and web before next fesco (mattdm, 17:18:29) * Next week's chair (mattdm, 17:21:34) * t8m to chair next meeting (mattdm, 17:25:18) * Open Floor (mattdm, 17:25:22) * FESCo Town Hall is going to be this Friday, 13:00 UTC (mattdm, 17:25:54) * per-product config draft is potentially an alpha blocker (mattdm, 17:27:12) * fpc meeting which will cover this is tomorrow (thursday) at 16:00 UTC in #fedora-meeting-1 (mattdm, 17:28:37) Meeting ended at 17:33:36 UTC. Action Items * mitr to close syscall auditing ticket, file bug, etc. * mattdm to take aperidoc updates to cloud wg and qa and web before next fesco Action Items, by person --- * mattdm * mattdm to take aperidoc updates to cloud wg and qa and web before next fesco * mitr * mitr to close syscall auditing ticket, file bug, etc. * **UNASSIGNED** * (none) People Present (lines said) --- * mattdm (61) * jreznik (19) * sgallagh (17) * abadger1999 (11) * mitr (9) * zodbot (9) * nirik (8) * dgilmore (7) * t8m (6) * pjones (2) * jwb (1) * mmaslano (0) * kylem (0) Generated by `MeetBot`_ 0.1.4 .. _`MeetBot`: http://wiki.debian.org/MeetBot -- Matthew Miller mat...@fedoraproject.org Fedora Project Leader -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: New Fedora 22 Change proposal: systemd-sysusers
- Original Message - On Wed, 09.07.14 10:30, Miloslav Trmač (m...@redhat.com) wrote: - Original Message - A move to something more declarative makes sense (whether in systemd or through some kind of long-expected declarative rpm facility doesn’t matter to me much.) The sysusers tool _really_ needs to use an existing API to manage the user database, though. Yeah, because we dodn't want to intrdocue any new API we have carefully made sure that whenever we write pasword, group and shadow files we use existing APIs from glibc, more specifically putpwent(), putgrent(), putspent() and crypt_r(). This is about creating system users, not normal users, hence using anything more fancy than glibc's native APIs is wrong. I have already given examples where using a higher-level API would avoid mistakes _and_ make future changes easier; and none of the reasons offered convince me: This is not stuff which is supposed to land on an ActiveDirectory server or so. It's stuff we need to be able to recreate during earliest boot, before the first daemons start, where little else but the most basic file system is around. libuser is not useful for this kind of environment. libuser is not configured to edit LDAP if a system is configured as an LDAP client (that functionality exists but usually is only used by admins’ scripts with custom config files); shadow-utils even can’t do it at all. AFAIK both are quite usable in the environment described above. It appears to me that libuser unsuccessfully duplicates APIs from glibc, shadow-utils and other packages. Yes, it only duplicates a glibc API if we ignore all the code that isn’t in glibc, including all the things that systemd-sysusers got wrong; and shadow-utils doesn’t have a C API so libuser doesn’t duplicate a shadow-utils API. I mean, it's quite weird to have both passwd and lpasswd around, and then complaining to me that we don't need multiple implementations. I mean, I really don't understand why there are two implementations of this in the first place! I was not proposing to call the libuser command-line tools, so I don’t think they are relevant. I agree it is not good that there are two implementations, and as I already wrote, there is a plan (and people assigned to it) to fix this. Also, note that with systemd we try to find solutions that work for most Linux distributions. libuser appears to be quite common on Fedora, but I am pretty sure that systemd is not the vehicle to make it standard on other distributions too, in particular via such a relatively auxiliary feature of systemd. systemd has been happy to make so many different things de-facto standard that I can’t see this being an outlier. As it is, the implementation (Most discussed elsewhere in the thread.) * breaks the configurable [UG]ID_MIN logic (http://fedoraproject.org/wiki/Features/1000SystemAccounts, and yes, that is actually used and needed) Well, this is something I really don't like. I don’t like this either, but it is necessary and unavoidable. “I don’t want” and “sorry” just isn’t good enough for real-world deployments; that can only get a distribution kicked off the candidate list. We are currently already in a bad position by having two major implementations of maintaining the critical databases, we absolutely don’t want any more. Good! We just use glibc APIs for writing those files. If you want only one implementation, why not get rid of libuser, and stick to glibc? ;-) Because the glibc API is not at all the right one. (Way too low-level as systemd-sysusers has successfully demonstrated; impossible to add more fields; enshrines old bad design decisions, like having password expiration in 24-hour granularity.) Considering the actual library name is completely irrelevant, having the new API written and maintained by people whose _primary occupation_ is to understand accounts and identities seems like a good enough reason to have it done by sssd maintainers, as a library included within that project. And yes, the plan is to “get rid of libuser”, or rather to only have it a shim layer over the new sssd API. At this point this means systemd-sysuers should either run the executables from shadow-utils, or link to libuser. (Or, I suppose, use accountsservice, but that ends up calling shadow-utils.). Sorry, I am not going to play your stacking game. This is supposed to be simple, work in a minimal early-boot environment, and use stuff that is commonly around on Linuxes, from embedded to servers. glibc APIs are. libuser is not. I would be perfectly happy if it called shadow-utils. That’s 200 kB total, and definitely “commonly around on Linuxes”. Describing modularity, avoiding duplicate implementations, and keeping specialized knowledge private to specialized modules as a “stacking game” is not helping this discussion. The plan is to have a single implementation,
Re: New Fedora 22 Change proposal: systemd-sysusers
- Original Message - On Wed, 09.07.14 12:25, Miloslav Trmač (m...@redhat.com) wrote: Can you be more specific about the name validation? The binding maximum length constraint is from the utmp format (UT_NAMESIZE - 1); LOGIN_NAME_MAX is an upper bound but not binding, and this has already ended up in systemd-sysuser’s documentation essentially promising to do the impossible/unsafe by using the non-binding maximum length. snip If 32chars as required by utmp is really the limit we should follow here, then I would really enjoy if we'd actually set LOGIN_NAME_MAX to the same value. I agree that would be useful, but it would also break the glibc ABI I’m afraid (and undefining LOGIN_NAME_MAX to indicate that sysconf() should be used would break “only” the API). Yeah, the utmp connection is apparently not obvious to many people. Hmm, it would be good btw, if libuser would actually use glibc APIs, for the precise reasons you are pointing out. As it appears though you reimplemented all those APIs for no reason... For the excuse, I have inherited that code, and it is a part of the module API so not that attractive to just drop. As for future plans, I’m not inclined to rewrite this just for fun, especially when this is all going away in a about a year. Oh, also, libuser is a glib API. Nothing against glibc, but for the low-level stuff we do that runs with nothing around we try to be OOM safe, and stuff... I’m afraid the libuser’s ABI embeds a GLib dependency, so it won’t be removed; though recent-ish additions have added enough utility functions that many users of libuser don’t have to touch GLib themselves. *shrug* OOM-safety in a non-daemon is not all that useful. The right thing to do of course would be to use a way higher-level language that does 90% of what GLib does inherently as a part of the language instead of having to choose, and disagree about, a C utility library, but that’s where we are… Mirek -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
orphaning iperf (2.0.X)
iperf 2.0.* has a dead upstream, but last I checked 3.0.* (for which there appears to be a distinct rpm package, not maintained by me) isn't offering 100% feature parity. Not talking about 2.X - 3.X compatibility, but rather what all the 2.0 flags do vs. what the 3.X ones do :) Anyhow, while I think it might be still worth keeping 2.X around, I am totally swamped at the moment and can't do it justice, so free to a good home. Potential maintainers, please note there are two open bugs against iperf 2.0.5: 1108805 and 1116917, which you'd be inheriting as well. Thanks, --Gabriel -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
libuv 0.11.x for rawhide
Hi, I'm packaging neovim for Fedora and my builds failing[0], because using feature not available in 0.10.x releases. In Fedora libuv seems 0.10.x, so can you update it to 0.11.26 (now)? It's available[1]. If you don't want to break many packages, which using libuv - you can update it for rawhide. because f21 already branched - we can break rawhide I tho. [0]http://copr-be.cloud.fedoraproject.org/results/ignatenkobrain/neovim/fedora-rawhide-x86_64/neovim-0.0.0-1.git308953e.fc21/build.log [1]https://github.com/joyent/libuv/releases -- -Igor Gnatenko -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: fedora-release-$PRODUCT, /etc/issue, /etc/os-release, Per-Product Configs and more!
On 7 Jul 2014, at 11:17, Josh Boyer wrote: On Mon, Jul 7, 2014 at 9:02 AM, Stephen Gallagher sgall...@redhat.com wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 07/06/2014 03:43 AM, William wrote: On Thu, 2014-07-03 at 10:05 -0400, Josh Boyer wrote: That's misleading. Fedora hasn't been releasing do-it-yourself releases. Our previous install images were composed and tested by QA, including testing fedup upgrades from the previous release. With Fedora.next, we don't have an install image that is an equivalent of = F20. Perhaps I have missed them, but I've seen no discussion or plans around testing upgrades to F21 from F20. Unless the Products intend to test upgrading from F20, and/or QA intends to somehow test fedup from F20 to F21 in a non-product manner, we're essentially changing the semantics of upgrades. I agree it should still work, but saying it's a continuation of existing practice when it isn't is wrong. josh It's also misleading given how much focus has been given to the three new products that will be released: So why now is there a non-productised version? That's not been advertised much. I honestly don't know how much more we could have advertised that. We've been talking about it since the beginning. Particularly about how the Fedora Products are additive to the classic Fedora and that spins aren't going away (they're non-productized versions too). You're talking about additive in the they all use the same repos sense, but there is no planned install media that will be produced similar to the F20 release. There are the 3 products, and there are the spins. The product closest to the existing Fedora default is Workstation, and we're targeting a live media as the primary deliverable. There have been 0 plans or discussions around fedup/upgrades from F20 so far. While I appreciate that the Fedora project has goals that it wants to achieve with the three new products, I had assumed based on the explanations that I have read that: 1. There will not be any change in the repo structure -- no separate repos for separate products. 2. For those of us who are not interested in the new products or do not find their minimum package assurances to be important in our use cases, there will still be a traditional non-productized Fedora. 3. There will still be plain non-productized versions of /etc/os- release (or wherever the systemd guys are relocating it) and /etc/ fedora-release. 4. There would be, at least, a net install CD to install a traditional non-productized Fedora system. 5. A fedup upgrade will be possible from a traditional non- productized Fedora 20 system to a traditional non-productized Fedora 21 system and, in due time, from traditional non-productized Fedora 21 to 22, etc. Am I mistaken on any or all of this? -- Mike Pinkerton -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: libuv 0.11.x for rawhide
On Wed, Jul 09, 2014 at 23:00:12 +0400, Igor Gnatenko i.gnatenko.br...@gmail.com wrote: Hi, I'm packaging neovim for Fedora and my builds failing[0], because using feature not available in 0.10.x releases. In Fedora libuv seems 0.10.x, so can you update it to 0.11.26 (now)? Have you filed a bug against libuv for this (if there isn't already one). You could also offer to co-maintain libuv if you are willing to do that to speed things up. In that case I'd give the contact a heads up of what you want to do when you request access. -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: fedora-release-$PRODUCT, /etc/issue, /etc/os-release, Per-Product Configs and more!
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 07/09/2014 03:07 PM, Mike Pinkerton wrote: On 7 Jul 2014, at 11:17, Josh Boyer wrote: On Mon, Jul 7, 2014 at 9:02 AM, Stephen Gallagher sgall...@redhat.com wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 07/06/2014 03:43 AM, William wrote: On Thu, 2014-07-03 at 10:05 -0400, Josh Boyer wrote: That's misleading. Fedora hasn't been releasing do-it-yourself releases. Our previous install images were composed and tested by QA, including testing fedup upgrades from the previous release. With Fedora.next, we don't have an install image that is an equivalent of = F20. Perhaps I have missed them, but I've seen no discussion or plans around testing upgrades to F21 from F20. Unless the Products intend to test upgrading from F20, and/or QA intends to somehow test fedup from F20 to F21 in a non-product manner, we're essentially changing the semantics of upgrades. I agree it should still work, but saying it's a continuation of existing practice when it isn't is wrong. josh It's also misleading given how much focus has been given to the three new products that will be released: So why now is there a non-productised version? That's not been advertised much. I honestly don't know how much more we could have advertised that. We've been talking about it since the beginning. Particularly about how the Fedora Products are additive to the classic Fedora and that spins aren't going away (they're non-productized versions too). You're talking about additive in the they all use the same repos sense, but there is no planned install media that will be produced similar to the F20 release. There are the 3 products, and there are the spins. The product closest to the existing Fedora default is Workstation, and we're targeting a live media as the primary deliverable. There have been 0 plans or discussions around fedup/upgrades from F20 so far. While I appreciate that the Fedora project has goals that it wants to achieve with the three new products, I had assumed based on the explanations that I have read that: 1. There will not be any change in the repo structure -- no separate repos for separate products. This is true. 2. For those of us who are not interested in the new products or do not find their minimum package assurances to be important in our use cases, there will still be a traditional non-productized Fedora. This is nuanced. Fedora as a non-Productized repository will exist. See below. 3. There will still be plain non-productized versions of /etc/os-release (or wherever the systemd guys are relocating it) and /etc/fedora-release. This is true. 4. There would be, at least, a net install CD to install a traditional non-productized Fedora system. This is not strictly true. The *official* install media will be for one of the Products. There will also be install media and/or live images for the Spins. These Spins will essentially be installing specific package sets from non-productized Fedora. I do not know which or if any Spins will be providing the specific net install CD you're asking about. This will not be an *official* (read: tested by QA) method of installing Fedora. However, I see no reason why it wouldn't work. 5. A fedup upgrade will be possible from a traditional non-productized Fedora 20 system to a traditional non-productized Fedora 21 system and, in due time, from traditional non-productized Fedora 21 to 22, etc. This statement is true for F20-F21. For F21-F22, I want it to be possible to go from non-productized to productized *if the user wishes* (opt-in, not opt-out). Am I mistaken on any or all of this? -BEGIN PGP SIGNATURE- Version: GnuPG v1 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iEYEARECAAYFAlO9qS8ACgkQeiVVYja6o6Oa3ACbBm+zSBn3I2WLRhjU35d16644 emEAnjSHRMoSOX3aGXrobm+uxzYbSfaG =e1DI -END PGP SIGNATURE- -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: fedora-release-$PRODUCT, /etc/issue, /etc/os-release, Per-Product Configs and more!
On Wed, Jul 09, 2014 at 04:42:23PM -0400, Stephen Gallagher wrote: I do not know which or if any Spins will be providing the specific net install CD you're asking about. This will not be an *official* (read: tested by QA) method of installing Fedora. However, I see no reason why it wouldn't work. A few months ago* I remember the server WG talking about providing a minimal/netinstall image. Has this changed? * dredges up meeting logs -- http://meetbot.fedoraproject.org/teams/server-wg/server-wg.2014-02-25-16.00.html -- Matthew Miller mat...@fedoraproject.org Fedora Project Leader -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: New Fedora 22 Change proposal: systemd-sysusers
On Wed, 09.07.14 13:47, Miloslav Trmač (m...@redhat.com) wrote: Yeah, because we dodn't want to intrdocue any new API we have carefully made sure that whenever we write pasword, group and shadow files we use existing APIs from glibc, more specifically putpwent(), putgrent(), putspent() and crypt_r(). This is about creating system users, not normal users, hence using anything more fancy than glibc's native APIs is wrong. I have already given examples where using a higher-level API would avoid mistakes _and_ make future changes easier; and none of the reasons offered convince me: Well, there appears to be no higher-level API around. You are saying yourself that libuser is going away. It's also not OOM safe, pulls in the glib dependency, it bypassed the low-level glibc APIs. So I am not sure what you are telling me with that... We use the only widely established API there is, and that has a future, that is documented (though not parcitularly well), that is OOM safe, doesn't pull in any deps, and is pretty much exactly as low-level as we need it. That's glibc. I really don't see any other option here. It appears to me that libuser unsuccessfully duplicates APIs from glibc, shadow-utils and other packages. Yes, it only duplicates a glibc API if we ignore all the code that isn’t in glibc, including all the things that systemd-sysusers got wrong; and shadow-utils doesn’t have a C API so libuser doesn’t duplicate a shadow-utils API. Well, You should be aware that sysusers is less than a month old and has been part of a systemd release less than a week ago for the first time. If the only thing you could find is the user name length thing, the lack of updating of shadow and that we lack audit (which libuser also lacks), then I think we did a pretty good job so far... I mean, it's quite weird to have both passwd and lpasswd around, and then complaining to me that we don't need multiple implementations. I mean, I really don't understand why there are two implementations of this in the first place! I was not proposing to call the libuser command-line tools, so I don’t think they are relevant. I agree it is not good that there are two implementations, and as I already wrote, there is a plan (and people assigned to it) to fix this. Well, the plans are vague, involve daemons and stuff, and from all I heard are really not the right thing for a minimalist early-boot tool like systemd-sysusers... Also, note that with systemd we try to find solutions that work for most Linux distributions. libuser appears to be quite common on Fedora, but I am pretty sure that systemd is not the vehicle to make it standard on other distributions too, in particular via such a relatively auxiliary feature of systemd. systemd has been happy to make so many different things de-facto standard that I can’t see this being an outlier. Well, we can push stuff with systemd, sure, but it has to be convincing if we do it, we must be able to make a strong case. And quite frankly, you really didn't sell libuser so well, so far... I mean, you are even saying that it will go away... Good! We just use glibc APIs for writing those files. If you want only one implementation, why not get rid of libuser, and stick to glibc? ;-) Because the glibc API is not at all the right one. (Way too low-level as systemd-sysusers has successfully demonstrated; impossible to add more fields; enshrines old bad design decisions, like having password expiration in 24-hour granularity.) Considering the actual library name is completely irrelevant, having the new API written and maintained by people whose _primary occupation_ is to understand accounts and identities seems like a good enough reason to have it done by sssd maintainers, as a library included within that project. Well, you know, systemd-sysusers, as the name says is a tool solely for registering system users. Sure, the glibc API might not be the best in the world, but it does do the basic bits that we need it to do just fine. And the thing about primary occupation I can only read that you are telling me to stay off your lawn, because I don't understand stuff. And yes, the plan is to “get rid of libuser”, or rather to only have it a shim layer over the new sssd API. I am sorry, but I really don't see system user registration in the early-boot as something I would ever entrust in a full flegded sssd-like thing. Please understand that we are not duplicating adduser here. Already in the name of the tool we wanted to make clear thtat this is abotu system users, nothing else. The file format we defined has been reduced to the minimum possible, in order to make it difficult for people to use it for anything else than this (for example, you cannot set a shell for a user with this, as system users are not suppoed to be logged into, unless the admin later on manually sets a password and a shell). An API that wants to implement a
F-21 Branched report: 20140709 changes
Compose started at Wed Jul 9 20:16:43 UTC 2014 Broken deps for armhfp -- [APLpy] APLpy-0.9.8-5.fc21.noarch requires pywcs [PyKDE] PyKDE-3.16.6-14.fc20.armv7hl requires sip-api(10) = 0:10.0 [audtty] audtty-0.1.12-9.fc20.armv7hl requires libaudclient.so.2 [csound] csound-java-5.19.01-1.fc20.armv7hl requires libgcj_bc.so.1 csound-java-5.19.01-1.fc20.armv7hl requires java-gcj-compat csound-java-5.19.01-1.fc20.armv7hl requires java-gcj-compat csound-java-5.19.01-1.fc20.armv7hl requires java-1.5.0-gcj csound-tk-5.19.01-1.fc20.armv7hl requires libtk8.5.so csound-tk-5.19.01-1.fc20.armv7hl requires libtcl8.5.so [deltacloud-core] deltacloud-core-rackspace-1.1.3-1.fc20.noarch requires rubygem(cloudfiles) [dragonegg] dragonegg-3.4-0.3.rc0.fc21.armv7hl requires gcc = 0:4.8.2-14.fc21 [eclipse-jbosstools] eclipse-jbosstools-jst-4.1.1-2.fc21.noarch requires eclipse-wtp-jst-web eclipse-jbosstools-ws-4.1.1-2.fc21.noarch requires osgi(org.eclipse.jst.ws.annotations.core) [edelib] edelib-2.1-4.fc21.armv7hl requires libedelib.so edelib-devel-2.1-4.fc21.armv7hl requires libedelib.so [eucalyptus] eucalyptus-common-java-3.3.0-0.5.20130408git32052445.fc20.armv7hl requires hibernate3-jbosscache = 0:3.6.10-7 [flashrom] flashrom-0.9.6.1-5.svn1705.fc20.armv7hl requires libftdi.so.1 [gcc-python-plugin] gcc-python2-debug-plugin-0.12-18.fc21.armv7hl requires gcc = 0:4.8.2-14.fc21 gcc-python2-plugin-0.12-18.fc21.armv7hl requires gcc = 0:4.8.2-14.fc21 gcc-python3-debug-plugin-0.12-18.fc21.armv7hl requires libpython3.3dm.so.1.0 gcc-python3-debug-plugin-0.12-18.fc21.armv7hl requires gcc = 0:4.8.2-14.fc21 gcc-python3-plugin-0.12-18.fc21.armv7hl requires libpython3.3m.so.1.0 gcc-python3-plugin-0.12-18.fc21.armv7hl requires gcc = 0:4.8.2-14.fc21 [ghc-crypto-api] ghc-crypto-api-devel-0.11-5.fc21.armv7hl requires ghc-devel(entropy-0.2.2.1-ae359458c8f3b4c8838403b8c9a5a50a) [gnome-python2-desktop] gnome-python2-metacity-2.32.0-18.fc21.armv7hl requires libmetacity-private.so.0 [gofer] ruby-gofer-0.77.1-2.fc21.noarch requires rubygem(qpid) = 0:0.16.0 [golang-github-smarterclayton-go-systemd] golang-github-smarterclayton-go-systemd-devel-0-0.5.git5cb9e9e.fc21.noarch requires golang(github.com/guelfey/go.dbus) [grass] grass-6.4.3-5.fc21.armv7hl requires libtk8.5.so grass-6.4.3-5.fc21.armv7hl requires libtcl8.5.so [hfsutils] hfsutils-x11-3.2.6-24.fc20.armv7hl requires libtk8.5.so hfsutils-x11-3.2.6-24.fc20.armv7hl requires libtcl8.5.so [hibernate-search] hibernate-search-4.5.1-4.fc21.noarch requires mvn(org.apache.avro:avro) [ice] ice-php-3.5.1-4.fc21.armv7hl requires php(zend-abi) = 0:20121212-32 ice-php-3.5.1-4.fc21.armv7hl requires php(api) = 0:20121113-32 [jacorb] jacorb-2.3.1-12.fc21.noarch requires UNKNOWN-mvn(org.beanshell:bsh:UNKNOWN) [jboss-integration] jboss-integration-6.0.0-0.3.CR1.fc21.noarch requires mvn(jacorb:jacorb) [leiningen] leiningen-1.7.1-7.fc20.noarch requires maven-ant-tasks leiningen-1.7.1-7.fc20.noarch requires classworlds [libghemical] libghemical-2.99.1-24.fc20.armv7hl requires libf77blas.so.3 libghemical-2.99.1-24.fc20.armv7hl requires libatlas.so.3 [libopensync-plugin-irmc] 1:libopensync-plugin-irmc-0.22-7.fc20.armv7hl requires libopenobex.so.1 [ltsp] ltsp-client-5.4.5-8.fc21.armv7hl requires fuse-unionfs ltsp-server-5.4.5-8.fc21.armv7hl requires cdialog [mapserver] mapserver-java-6.2.1-7.fc21.armv7hl requires java-gcj-compat [meshmagick] meshmagick-0.6.0-20.svn2898.fc21.armv7hl requires libOgreMain.so.1.8.1 meshmagick-libs-0.6.0-20.svn2898.fc21.armv7hl requires libOgreMain.so.1.8.1 [mingw-tk] mingw32-tk-8.5.13-5.fc21.noarch requires mingw32(tcl85.dll) [netdisco] netdisco-1.1-7.fc21.noarch requires perl(SNMP::Info::Layer2::Bay) [openvas-client] openvas-client-3.0.3-8.fc20.armv7hl requires libopenvas_omp.so.6 openvas-client-3.0.3-8.fc20.armv7hl requires libopenvas_nasl.so.6 openvas-client-3.0.3-8.fc20.armv7hl requires libopenvas_misc.so.6 openvas-client-3.0.3-8.fc20.armv7hl requires libopenvas_hg.so.6 openvas-client-3.0.3-8.fc20.armv7hl requires libopenvas_base.so.6 [orsa] orsa-0.7.0-28.fc21.armv7hl requires libginac.so.2 orsa-mpich-0.7.0-28.fc21.armv7hl requires libginac.so.2 orsa-openmpi-0.7.0-28.fc21.armv7hl requires libginac.so.2 [php-pecl-parsekit] php-pecl-parsekit-1.3.0-5.fc21.armv7hl requires php(zend-abi) = 0:20121212-32 php-pecl-parsekit-1.3.0-5.fc21.armv7hl requires php(api) = 0:20121113-32 [python-pygit2] python-pygit2-0.20.2-3.fc21.armv7hl requires libgit2.so.0
Re: New Fedora 22 Change proposal: systemd-sysusers
A non-API related question... On Thursday 10 July 2014 01:49:41 Lennart Poettering wrote: Please understand that we are not duplicating adduser here. Already in the name of the tool we wanted to make clear thtat this is abotu system users, nothing else. The file format we defined has been reduced to the minimum possible, in order to make it difficult for people to use it for anything else than this. There are cases where a home directory of system users carry some semantics. Two examples from the top of my head: * Some tftpd implementations use it as the base path (and chroot into it) * Some anonymous ftpd implementation have similar use (chroot into ~ftp) So I assume *all* of these cases should be replaced by systemd explicit settings -- e.g: WorkingDirectory, RootDirectory in the unit file. Generally, I prefer the explicit systemd settings over home directory with magical effects, but I wonder if anyone is aware of existing system users which carry more complex semantics. Thanks, -- Oron Peled Voice: +972-4-8228492 o...@actcom.co.il http://users.actcom.co.il/~oron Promises are like babies: fun to make, but hell to deliver. -- Nadav Har'El -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: [ACTION REQUIRED][FINAL NOTICE] Retiring packages for Fedora 21 v4
On Tue, 2014-07-01 at 19:55 +0200, Till Maas wrote: The following packages are orphaned or did not build for two releases and will be retired when Fedora (F21) is branched, unless someone adopts them. If you know for sure that the package should be retired, please do so now with a proper reason: https://fedoraproject.org/wiki/How_to_remove_a_package_at_end_of_life According to https://fedoraproject.org/wiki/Schedule branching will occur on 2014-07-08. The packages will be retired starting 2014-07-04. If you intend to claim a package, please take it now. ddclient seems to have been retired apparently as a part of this process, going by the commit: http://pkgs.fedoraproject.org/cgit/ddclient.git/commit/?id=f741436ca38fd6c36ffbfbb26b3131b278657faa but it wasn't listed in this email. Was that an oversight? Was it listed somewhere else I didn't catch? It does show up as 'orphaned' in pkgdb: https://admin.fedoraproject.org/pkgdb/package/ddclient/ . -- Adam Williamson Fedora QA Community Monkey IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net http://www.happyassassin.net -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
[Bug 1116600] perl-IO-Socket-IP-0.30 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116600 Petr Pisar ppi...@redhat.com changed: What|Removed |Added Status|ON_QA |ASSIGNED External Bug ID||CPAN 95983 -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=hQjmjKQIgDa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116600] perl-IO-Socket-IP-0.30 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116600 Petr Pisar ppi...@redhat.com changed: What|Removed |Added External Bug ID||CPAN 97050 -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=Rsax84VdP0a=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116600] perl-IO-Socket-IP-0.30 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116600 Petr Pisar ppi...@redhat.com changed: What|Removed |Added Assignee|psab...@redhat.com |ppi...@redhat.com -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=M2iUgwUvmqa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[perl-IO-Socket-IP] Fix multihomed SSL
commit 8efa4cc6d6d8d39fe3e73678c2553f5b8fd77303 Author: Petr Písař ppi...@redhat.com Date: Wed Jul 9 09:21:46 2014 +0200 Fix multihomed SSL IO-Socket-IP-0.30-multihomed_SSL.patch | 58 perl-IO-Socket-IP.spec |8 - 2 files changed, 65 insertions(+), 1 deletions(-) --- diff --git a/IO-Socket-IP-0.30-multihomed_SSL.patch b/IO-Socket-IP-0.30-multihomed_SSL.patch new file mode 100644 index 000..1223385 --- /dev/null +++ b/IO-Socket-IP-0.30-multihomed_SSL.patch @@ -0,0 +1,58 @@ +Am Di 08. Jul 2014, 06:35:58, PEVANS schrieb: + I may have to revert this one because it's causing bad knock-on + effects with IO::Socket::SSL: + + https://rt.cpan.org/Ticket/Display.html?id=97050 + + Basically: the very thing it was supposed to fix, it has broken. Meh. + +Yes, unfortunately it wasn't as easy as I thought because the calling scheme inside IO::Socket::* (i.e. new - configure - connect ) isn't that simple if you have a class hierarchy and also try to implement multi-homing :( + +But I think I have a working patch (included, against 0.30). +The basic idea of the patch is that one has to distinguish between an error at the transport layer which can be solved with IP based multi-homing and an error at the application layer. One could expect the system error to be reflected inside $!, while an application error will probably not set $! (e.g. IO::Socket::SSL sets an $SSL_ERROR variable). So if connect fails, but $! is not set, one can assume error at the application layer and stop trying to fix it with IP based multi-homing. + +The other difference in the patch is to change $self-IO::Socket::IP::connect($addr) to CORE::connect($self,$addr), because if you have a look at the connect function it simple calls CORE::connect if an $addr argument is given. It was already right to not use $self-connect in this place, it was only a problem if called from inside the new - configure - connect chain. + +With this patch the tests inside IO::Socket::IP pass and also the tests of IO::Socket::SSL. + +Regards, +Steffen + +https://rt.cpan.org/Public/Bug/Display.html?id=95983 + +diff --git a/lib/IO/Socket/IP.pm b/lib/IO/Socket/IP.pm +index 1911145..16eb7c8 100644 +--- a/lib/IO/Socket/IP.pm b/lib/IO/Socket/IP.pm +@@ -601,7 +601,7 @@ sub setup + } + + if( defined( my $addr = $info-{peeraddr} ) ) { +- if( $self-IO::Socket::IP::connect( $addr ) ) { ++ if( $self-connect( $addr ) ) { + $! = 0; + return 1; + } +@@ -611,6 +611,13 @@ sub setup + return 0; + } + ++ # If connect failed but we have no system error there must be an error ++ # at the application layer, like a bad certificate with ++ # IO::Socket::SSL. ++ # In this case don't continue IP based multi-homing because the problem ++ # cannot be solved at the IP layer. ++ return 0 if ! $!; ++ + ${*$self}{io_socket_ip_errors}[0] = $!; + next; + } +@@ -651,7 +658,7 @@ sub connect +# (still in progress). This even works on MSWin32. +my $addr = ${*$self}{io_socket_ip_infos}[${*$self}{io_socket_ip_idx}]{peeraddr}; + +- if( $self-IO::Socket::IP::connect( $addr ) or $! == EISCONN ) { ++ if( CORE::connect( $self, $addr ) or $! == EISCONN ) { + delete ${*$self}{io_socket_ip_connect_in_progress}; + $! = 0; + return 1; diff --git a/perl-IO-Socket-IP.spec b/perl-IO-Socket-IP.spec index 39d83cb..611ccdf 100644 --- a/perl-IO-Socket-IP.spec +++ b/perl-IO-Socket-IP.spec @@ -1,11 +1,13 @@ Name: perl-IO-Socket-IP Version:0.30 -Release:1%{?dist} +Release:2%{?dist} Summary:Drop-in replacement for IO::Socket::INET supporting both IPv4 and IPv6 License:GPL+ or Artistic Group: Development/Libraries URL:http://search.cpan.org/dist/IO-Socket-IP/ Source0: http://www.cpan.org/authors/id/P/PE/PEVANS/IO-Socket-IP-%{version}.tar.gz +# Fix multihomed SSL, bug #1116600, CPAN RT#95983 +Patch0: IO-Socket-IP-0.30-multihomed_SSL.patch BuildArch: noarch BuildRequires: perl BuildRequires: perl(base) @@ -33,6 +35,7 @@ arguments and methods are provided in a backward-compatible way. %prep %setup -q -n IO-Socket-IP-%{version} +%patch0 -p1 %build perl Build.PL installdirs=vendor @@ -53,6 +56,9 @@ rm -f t/21nonblocking-connect-internet.t %{_mandir}/man3/* %changelog +* Wed Jul 09 2014 Petr Pisar ppi...@redhat.com - 0.30-2 +- Fix multihomed SSL (bug #1116600) + * Mon Jul 07 2014 Petr Pisar ppi...@redhat.com - 0.30-1 - 0.30 bump -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[perl-IO-Socket-IP/f21] Fix multihomed SSL
Summary of changes: 8efa4cc... Fix multihomed SSL (*) (*) This commit already existed in another branch; no separate mail sent -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[perl-IO-Socket-IP/f20] Fix multihomed SSL
commit 817e1f51da9591d219d7d005b99f6eb9497dd464 Author: Petr Písař ppi...@redhat.com Date: Wed Jul 9 09:21:46 2014 +0200 Fix multihomed SSL IO-Socket-IP-0.30-multihomed_SSL.patch | 58 perl-IO-Socket-IP.spec |8 - 2 files changed, 65 insertions(+), 1 deletions(-) --- diff --git a/IO-Socket-IP-0.30-multihomed_SSL.patch b/IO-Socket-IP-0.30-multihomed_SSL.patch new file mode 100644 index 000..1223385 --- /dev/null +++ b/IO-Socket-IP-0.30-multihomed_SSL.patch @@ -0,0 +1,58 @@ +Am Di 08. Jul 2014, 06:35:58, PEVANS schrieb: + I may have to revert this one because it's causing bad knock-on + effects with IO::Socket::SSL: + + https://rt.cpan.org/Ticket/Display.html?id=97050 + + Basically: the very thing it was supposed to fix, it has broken. Meh. + +Yes, unfortunately it wasn't as easy as I thought because the calling scheme inside IO::Socket::* (i.e. new - configure - connect ) isn't that simple if you have a class hierarchy and also try to implement multi-homing :( + +But I think I have a working patch (included, against 0.30). +The basic idea of the patch is that one has to distinguish between an error at the transport layer which can be solved with IP based multi-homing and an error at the application layer. One could expect the system error to be reflected inside $!, while an application error will probably not set $! (e.g. IO::Socket::SSL sets an $SSL_ERROR variable). So if connect fails, but $! is not set, one can assume error at the application layer and stop trying to fix it with IP based multi-homing. + +The other difference in the patch is to change $self-IO::Socket::IP::connect($addr) to CORE::connect($self,$addr), because if you have a look at the connect function it simple calls CORE::connect if an $addr argument is given. It was already right to not use $self-connect in this place, it was only a problem if called from inside the new - configure - connect chain. + +With this patch the tests inside IO::Socket::IP pass and also the tests of IO::Socket::SSL. + +Regards, +Steffen + +https://rt.cpan.org/Public/Bug/Display.html?id=95983 + +diff --git a/lib/IO/Socket/IP.pm b/lib/IO/Socket/IP.pm +index 1911145..16eb7c8 100644 +--- a/lib/IO/Socket/IP.pm b/lib/IO/Socket/IP.pm +@@ -601,7 +601,7 @@ sub setup + } + + if( defined( my $addr = $info-{peeraddr} ) ) { +- if( $self-IO::Socket::IP::connect( $addr ) ) { ++ if( $self-connect( $addr ) ) { + $! = 0; + return 1; + } +@@ -611,6 +611,13 @@ sub setup + return 0; + } + ++ # If connect failed but we have no system error there must be an error ++ # at the application layer, like a bad certificate with ++ # IO::Socket::SSL. ++ # In this case don't continue IP based multi-homing because the problem ++ # cannot be solved at the IP layer. ++ return 0 if ! $!; ++ + ${*$self}{io_socket_ip_errors}[0] = $!; + next; + } +@@ -651,7 +658,7 @@ sub connect +# (still in progress). This even works on MSWin32. +my $addr = ${*$self}{io_socket_ip_infos}[${*$self}{io_socket_ip_idx}]{peeraddr}; + +- if( $self-IO::Socket::IP::connect( $addr ) or $! == EISCONN ) { ++ if( CORE::connect( $self, $addr ) or $! == EISCONN ) { + delete ${*$self}{io_socket_ip_connect_in_progress}; + $! = 0; + return 1; diff --git a/perl-IO-Socket-IP.spec b/perl-IO-Socket-IP.spec index 2c059f6..7b30952 100644 --- a/perl-IO-Socket-IP.spec +++ b/perl-IO-Socket-IP.spec @@ -1,11 +1,13 @@ Name: perl-IO-Socket-IP Version:0.30 -Release:1%{?dist} +Release:2%{?dist} Summary:Drop-in replacement for IO::Socket::INET supporting both IPv4 and IPv6 License:GPL+ or Artistic Group: Development/Libraries URL:http://search.cpan.org/dist/IO-Socket-IP/ Source0: http://www.cpan.org/authors/id/P/PE/PEVANS/IO-Socket-IP-%{version}.tar.gz +# Fix multihomed SSL, bug #1116600, CPAN RT#95983 +Patch0: IO-Socket-IP-0.30-multihomed_SSL.patch BuildArch: noarch BuildRequires: perl BuildRequires: perl(base) @@ -33,6 +35,7 @@ arguments and methods are provided in a backward-compatible way. %prep %setup -q -n IO-Socket-IP-%{version} +%patch0 -p1 %build perl Build.PL installdirs=vendor @@ -53,6 +56,9 @@ rm -f t/21nonblocking-connect-internet.t %{_mandir}/man3/* %changelog +* Wed Jul 09 2014 Petr Pisar ppi...@redhat.com - 0.30-2 +- Fix multihomed SSL (bug #1116600) + * Mon Jul 07 2014 Petr Pisar ppi...@redhat.com - 0.30-1 - 0.30 bump -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[perl-IO-Socket-IP/f19] Fix multihomed SSL
commit 6f804a3698febc0fd4f11b5102b7d44715913179 Author: Petr Písař ppi...@redhat.com Date: Wed Jul 9 09:21:46 2014 +0200 Fix multihomed SSL IO-Socket-IP-0.30-multihomed_SSL.patch | 58 perl-IO-Socket-IP.spec |8 - 2 files changed, 65 insertions(+), 1 deletions(-) --- diff --git a/IO-Socket-IP-0.30-multihomed_SSL.patch b/IO-Socket-IP-0.30-multihomed_SSL.patch new file mode 100644 index 000..1223385 --- /dev/null +++ b/IO-Socket-IP-0.30-multihomed_SSL.patch @@ -0,0 +1,58 @@ +Am Di 08. Jul 2014, 06:35:58, PEVANS schrieb: + I may have to revert this one because it's causing bad knock-on + effects with IO::Socket::SSL: + + https://rt.cpan.org/Ticket/Display.html?id=97050 + + Basically: the very thing it was supposed to fix, it has broken. Meh. + +Yes, unfortunately it wasn't as easy as I thought because the calling scheme inside IO::Socket::* (i.e. new - configure - connect ) isn't that simple if you have a class hierarchy and also try to implement multi-homing :( + +But I think I have a working patch (included, against 0.30). +The basic idea of the patch is that one has to distinguish between an error at the transport layer which can be solved with IP based multi-homing and an error at the application layer. One could expect the system error to be reflected inside $!, while an application error will probably not set $! (e.g. IO::Socket::SSL sets an $SSL_ERROR variable). So if connect fails, but $! is not set, one can assume error at the application layer and stop trying to fix it with IP based multi-homing. + +The other difference in the patch is to change $self-IO::Socket::IP::connect($addr) to CORE::connect($self,$addr), because if you have a look at the connect function it simple calls CORE::connect if an $addr argument is given. It was already right to not use $self-connect in this place, it was only a problem if called from inside the new - configure - connect chain. + +With this patch the tests inside IO::Socket::IP pass and also the tests of IO::Socket::SSL. + +Regards, +Steffen + +https://rt.cpan.org/Public/Bug/Display.html?id=95983 + +diff --git a/lib/IO/Socket/IP.pm b/lib/IO/Socket/IP.pm +index 1911145..16eb7c8 100644 +--- a/lib/IO/Socket/IP.pm b/lib/IO/Socket/IP.pm +@@ -601,7 +601,7 @@ sub setup + } + + if( defined( my $addr = $info-{peeraddr} ) ) { +- if( $self-IO::Socket::IP::connect( $addr ) ) { ++ if( $self-connect( $addr ) ) { + $! = 0; + return 1; + } +@@ -611,6 +611,13 @@ sub setup + return 0; + } + ++ # If connect failed but we have no system error there must be an error ++ # at the application layer, like a bad certificate with ++ # IO::Socket::SSL. ++ # In this case don't continue IP based multi-homing because the problem ++ # cannot be solved at the IP layer. ++ return 0 if ! $!; ++ + ${*$self}{io_socket_ip_errors}[0] = $!; + next; + } +@@ -651,7 +658,7 @@ sub connect +# (still in progress). This even works on MSWin32. +my $addr = ${*$self}{io_socket_ip_infos}[${*$self}{io_socket_ip_idx}]{peeraddr}; + +- if( $self-IO::Socket::IP::connect( $addr ) or $! == EISCONN ) { ++ if( CORE::connect( $self, $addr ) or $! == EISCONN ) { + delete ${*$self}{io_socket_ip_connect_in_progress}; + $! = 0; + return 1; diff --git a/perl-IO-Socket-IP.spec b/perl-IO-Socket-IP.spec index 2c059f6..7b30952 100644 --- a/perl-IO-Socket-IP.spec +++ b/perl-IO-Socket-IP.spec @@ -1,11 +1,13 @@ Name: perl-IO-Socket-IP Version:0.30 -Release:1%{?dist} +Release:2%{?dist} Summary:Drop-in replacement for IO::Socket::INET supporting both IPv4 and IPv6 License:GPL+ or Artistic Group: Development/Libraries URL:http://search.cpan.org/dist/IO-Socket-IP/ Source0: http://www.cpan.org/authors/id/P/PE/PEVANS/IO-Socket-IP-%{version}.tar.gz +# Fix multihomed SSL, bug #1116600, CPAN RT#95983 +Patch0: IO-Socket-IP-0.30-multihomed_SSL.patch BuildArch: noarch BuildRequires: perl BuildRequires: perl(base) @@ -33,6 +35,7 @@ arguments and methods are provided in a backward-compatible way. %prep %setup -q -n IO-Socket-IP-%{version} +%patch0 -p1 %build perl Build.PL installdirs=vendor @@ -53,6 +56,9 @@ rm -f t/21nonblocking-connect-internet.t %{_mandir}/man3/* %changelog +* Wed Jul 09 2014 Petr Pisar ppi...@redhat.com - 0.30-2 +- Fix multihomed SSL (bug #1116600) + * Mon Jul 07 2014 Petr Pisar ppi...@redhat.com - 0.30-1 - 0.30 bump -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116600] perl-IO-Socket-IP-0.30 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116600 Petr Pisar ppi...@redhat.com changed: What|Removed |Added Status|ASSIGNED|MODIFIED Fixed In Version|perl-IO-Socket-IP-0.30-1.fc |perl-IO-Socket-IP-0.30-2.fc |21 |22 -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=yblpgA44epa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116600] perl-IO-Socket-IP-0.30 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116600 --- Comment #6 from Petr Pisar ppi...@redhat.com --- Fixed as perl-IO-Socket-IP-0.30-2.fc21 in F21. -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=CnqWteXS2Qa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116600] perl-IO-Socket-IP-0.30 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116600 --- Comment #7 from Fedora Update System upda...@fedoraproject.org --- perl-IO-Socket-IP-0.30-2.fc20 has been submitted as an update for Fedora 20. https://admin.fedoraproject.org/updates/perl-IO-Socket-IP-0.30-2.fc20 -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=roe5vHyIt3a=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116600] perl-IO-Socket-IP-0.30 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116600 --- Comment #8 from Fedora Update System upda...@fedoraproject.org --- perl-IO-Socket-IP-0.30-2.fc19 has been submitted as an update for Fedora 19. https://admin.fedoraproject.org/updates/perl-IO-Socket-IP-0.30-2.fc19 -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=kHVr8GKEWfa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1117675] New: Request EPEL7 branch
https://bugzilla.redhat.com/show_bug.cgi?id=1117675 Bug ID: 1117675 Summary: Request EPEL7 branch Product: Fedora Version: rawhide Component: perl-Cairo-GObject Assignee: berra...@redhat.com Reporter: dd...@cpan.org QA Contact: extras...@fedoraproject.org CC: berra...@redhat.com, perl-devel@lists.fedoraproject.org Hi, This module is a dependency for two modules i am trying to put into EPEL7. koji build supplied for perl-Cairo-GObject in EPEL7; http://koji.fedoraproject.org/koji/taskinfo?taskID=7119980 I would be happy to take responsibility for building this module in EPEL7 if required. -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=sXtS4aZqq5a=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Algorithm-CurveFit commit set to
user: jplesnik set for jplesnik acl: commit of package: perl-Algorithm-CurveFit from: Awaiting Review to: on branch: el5 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Algorithm-CurveFit -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Algorithm-CurveFit approveacls set to
user: jplesnik set for jplesnik acl: approveacls of package: perl-Algorithm-CurveFit from: Awaiting Review to: on branch: el5 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Algorithm-CurveFit -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-CGI-Compile approveacls set to
user: jplesnik set for jplesnik acl: approveacls of package: perl-CGI-Compile from: Awaiting Review to: on branch: el6 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-CGI-Compile -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-CGI-Compile commit set to
user: jplesnik set for jplesnik acl: commit of package: perl-CGI-Compile from: Awaiting Review to: on branch: el6 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-CGI-Compile -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-CGI-Compile commit set to Obsolete
user: jplesnik set for jplesnik acl: commit of package: perl-CGI-Compile from: Approved to: Obsolete on branch: epel7 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-CGI-Compile -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-CGI-Emulate-PSGI approveacls set to
user: jplesnik set for jplesnik acl: approveacls of package: perl-CGI-Emulate-PSGI from: Awaiting Review to: on branch: el6 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-CGI-Emulate-PSGI -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-CGI-Emulate-PSGI commit set to Obsolete
user: jplesnik set for jplesnik acl: commit of package: perl-CGI-Emulate-PSGI from: Approved to: Obsolete on branch: epel7 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-CGI-Emulate-PSGI -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-CGI-Emulate-PSGI commit set to
user: jplesnik set for jplesnik acl: commit of package: perl-CGI-Emulate-PSGI from: Awaiting Review to: on branch: el6 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-CGI-Emulate-PSGI -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Cache commit set to
user: jplesnik set for jplesnik acl: commit of package: perl-Cache from: Awaiting Review to: on branch: el5 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Cache -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Cache approveacls set to
user: jplesnik set for jplesnik acl: approveacls of package: perl-Cache from: Awaiting Review to: on branch: el5 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Cache -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-Algorithm-CurveFit watchbugzilla set to Obsolete
user: ppisar set for ppisar acl: watchbugzilla of package: perl-Algorithm-CurveFit from: Approved to: Obsolete on branch: f20 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Algorithm-CurveFit -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-Algorithm-CurveFit watchcommits set to Obsolete
user: ppisar set for ppisar acl: watchcommits of package: perl-Algorithm-CurveFit from: Approved to: Obsolete on branch: master To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Algorithm-CurveFit -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-Algorithm-CurveFit watchbugzilla set to Obsolete
user: ppisar set for ppisar acl: watchbugzilla of package: perl-Algorithm-CurveFit from: Approved to: Obsolete on branch: f19 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Algorithm-CurveFit -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-Algorithm-CurveFit watchbugzilla set to Obsolete
user: ppisar set for ppisar acl: watchbugzilla of package: perl-Algorithm-CurveFit from: Approved to: Obsolete on branch: master To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Algorithm-CurveFit -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-Algorithm-CurveFit watchcommits set to Obsolete
user: ppisar set for ppisar acl: watchcommits of package: perl-Algorithm-CurveFit from: Approved to: Obsolete on branch: f19 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Algorithm-CurveFit -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-Algorithm-CurveFit watchcommits set to Obsolete
user: ppisar set for ppisar acl: watchcommits of package: perl-Algorithm-CurveFit from: Approved to: Obsolete on branch: f20 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Algorithm-CurveFit -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Catalyst-Plugin-Session-State-Cookie commit set to
user: jplesnik set for jplesnik acl: commit of package: perl-Catalyst-Plugin-Session-State-Cookie from: Awaiting Review to: on branch: el6 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Catalyst-Plugin-Session-State-Cookie -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Catalyst-Plugin-Session-State-Cookie approveacls set to
user: jplesnik set for jplesnik acl: approveacls of package: perl-Catalyst-Plugin-Session-State-Cookie from: Awaiting Review to: on branch: el6 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Catalyst-Plugin-Session-State-Cookie -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-Algorithm-CurveFit watchbugzilla set to Obsolete
user: ppisar set for ppisar acl: watchbugzilla of package: perl-Algorithm-CurveFit from: Approved to: Obsolete on branch: f21 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Algorithm-CurveFit -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-Algorithm-CurveFit watchcommits set to Obsolete
user: ppisar set for ppisar acl: watchcommits of package: perl-Algorithm-CurveFit from: Approved to: Obsolete on branch: f21 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Algorithm-CurveFit -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 approveacls set to
user: jplesnik set for jplesnik acl: approveacls of package: perl-Compress-Raw-Bzip2 from: Awaiting Review to: on branch: el6 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 commit set to
user: jplesnik set for jplesnik acl: commit of package: perl-Compress-Raw-Bzip2 from: Awaiting Review to: on branch: el6 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-CGI-Compile watchbugzilla set to Obsolete
user: ppisar set for ppisar acl: watchbugzilla of package: perl-CGI-Compile from: Approved to: Obsolete on branch: f21 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-CGI-Compile -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-CGI-Compile watchbugzilla set to Obsolete
user: ppisar set for ppisar acl: watchbugzilla of package: perl-CGI-Compile from: Approved to: Obsolete on branch: master To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-CGI-Compile -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchcommits set to Approved
user: jplesnik set for jplesnik acl: watchcommits of package: perl-Compress-Raw-Bzip2 from: Obsolete to: Approved on branch: master To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchbugzilla set to Obsolete
user: jplesnik set for jplesnik acl: watchbugzilla of package: perl-Compress-Raw-Bzip2 from: Approved to: Obsolete on branch: f19 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-CGI-Compile watchcommits set to Obsolete
user: ppisar set for ppisar acl: watchcommits of package: perl-CGI-Compile from: Approved to: Obsolete on branch: master To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-CGI-Compile -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchcommits set to Obsolete
user: jplesnik set for jplesnik acl: watchcommits of package: perl-Compress-Raw-Bzip2 from: Approved to: Obsolete on branch: f20 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchbugzilla set to Obsolete
user: jplesnik set for jplesnik acl: watchbugzilla of package: perl-Compress-Raw-Bzip2 from: Approved to: Obsolete on branch: f20 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchbugzilla set to Obsolete
user: jplesnik set for jplesnik acl: watchbugzilla of package: perl-Compress-Raw-Bzip2 from: to: Obsolete on branch: el6 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-CGI-Compile watchcommits set to Obsolete
user: ppisar set for ppisar acl: watchcommits of package: perl-CGI-Compile from: Approved to: Obsolete on branch: f20 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-CGI-Compile -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchcommits set to Obsolete
user: jplesnik set for jplesnik acl: watchcommits of package: perl-Compress-Raw-Bzip2 from: Approved to: Obsolete on branch: f21 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-CGI-Compile watchbugzilla set to Obsolete
user: ppisar set for ppisar acl: watchbugzilla of package: perl-CGI-Compile from: Approved to: Obsolete on branch: f19 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-CGI-Compile -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-CGI-Compile watchcommits set to Obsolete
user: ppisar set for ppisar acl: watchcommits of package: perl-CGI-Compile from: Approved to: Obsolete on branch: f21 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-CGI-Compile -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchbugzilla set to Obsolete
user: jplesnik set for jplesnik acl: watchbugzilla of package: perl-Compress-Raw-Bzip2 from: Approved to: Obsolete on branch: master To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-CGI-Compile watchbugzilla set to Obsolete
user: ppisar set for ppisar acl: watchbugzilla of package: perl-CGI-Compile from: Approved to: Obsolete on branch: f20 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-CGI-Compile -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchcommits set to Obsolete
user: jplesnik set for jplesnik acl: watchcommits of package: perl-Compress-Raw-Bzip2 from: to: Obsolete on branch: el6 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchbugzilla set to Obsolete
user: jplesnik set for jplesnik acl: watchbugzilla of package: perl-Compress-Raw-Bzip2 from: Approved to: Obsolete on branch: f21 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchcommits set to Obsolete
user: jplesnik set for jplesnik acl: watchcommits of package: perl-Compress-Raw-Bzip2 from: Approved to: Obsolete on branch: f19 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchbugzilla set to Obsolete
user: jplesnik set for jplesnik acl: watchbugzilla of package: perl-Compress-Raw-Bzip2 from: to: Obsolete on branch: el5 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchcommits set to Obsolete
user: jplesnik set for jplesnik acl: watchcommits of package: perl-Compress-Raw-Bzip2 from: to: Obsolete on branch: el5 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] ppisar:perl-CGI-Compile watchcommits set to Obsolete
user: ppisar set for ppisar acl: watchcommits of package: perl-CGI-Compile from: Approved to: Obsolete on branch: f19 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-CGI-Compile -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchcommits set to Obsolete
user: jplesnik set for jplesnik acl: watchcommits of package: perl-Compress-Raw-Bzip2 from: Approved to: Obsolete on branch: master To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchbugzilla set to Approved
user: jplesnik set for jplesnik acl: watchbugzilla of package: perl-Compress-Raw-Bzip2 from: Obsolete to: Approved on branch: master To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchcommits set to Approved
user: jplesnik set for jplesnik acl: watchcommits of package: perl-Compress-Raw-Bzip2 from: Obsolete to: Approved on branch: f19 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchcommits set to Approved
user: jplesnik set for jplesnik acl: watchcommits of package: perl-Compress-Raw-Bzip2 from: Obsolete to: Approved on branch: el5 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchbugzilla set to Approved
user: jplesnik set for jplesnik acl: watchbugzilla of package: perl-Compress-Raw-Bzip2 from: Obsolete to: Approved on branch: el6 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[PkgDB] jplesnik:perl-Compress-Raw-Bzip2 watchbugzilla set to Approved
user: jplesnik set for jplesnik acl: watchbugzilla of package: perl-Compress-Raw-Bzip2 from: Obsolete to: Approved on branch: f19 To make changes to this package see: https://admin.fedoraproject.org/pkgdb/package/perl-Compress-Raw-Bzip2 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel