Re: [EPEL-devel] [Extra Packages for Enterprise Linux] #8: EPEL-latest link rpm

2014-10-31 Thread Extra Packages for Enterprise Linux
#8: EPEL-latest link rpm
-+
  Reporter:  smooge  |  Owner:  epel-wranglers
  Type:  enhancement | Status:  new
  Priority:  minor   |  Milestone:
 Component:  Policy problem  |Version:
Resolution:  |   Keywords:
-+
Changes (by ktdreyer):

 * cc: ktdreyer@… (added)


-- 
Ticket URL: https://fedorahosted.org/epel/ticket/8#comment:3
Extra Packages for Enterprise Linux https://fedoraproject.org/wiki/EPEL
Extra Packages for Enterprise Linux
___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


[EPEL-devel] Fedora EPEL 7 updates-testing report

2014-10-31 Thread updates
The following Fedora EPEL 7 Security updates need testing:
 Age  URL
  13  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3454/rubygem-httpclient-2.4.0-2.el7
  13  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3432/drupal7-7.32-1.el7
  13  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3328/zarafa-7.1.11-1.el7
   8  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3530/phpMyAdmin-4.2.10.1-1.el7
   2  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3672/hostapd-2.3-1.el7
   2  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3621/php-Smarty-3.1.21-1.el7
   2  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3642/Pound-2.7-0.4.d.el7.1
   0  
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-3664/konversation-1.5-7.el7


The following builds have been pushed to Fedora EPEL 7 updates-testing

ansible-inventory-grapher-1.0.1-2.el7
ansible-lint-1.0.4-1.el7
conky-manager-2.3.1-1.el7
dbus-sharp-0.7.0-11.el7
dbus-sharp-glib-0.5.0-9.el7
e3-2.8-6.el7
epson-inkjet-printer-escpr-1.4.3-1.1lsb3.2.el7
fex-1.20100416.2814-7.el7
geany-themes-1.24-2.el7
globus-authz-3.10-1.el7
globus-authz-callout-error-3.5-1.el7
globus-callout-3.13-1.el7
globus-common-15.26-1.el7
globus-ftp-client-8.13-1.el7
globus-ftp-control-5.12-1.el7
globus-gass-cache-9.5-1.el7
globus-gass-cache-program-6.5-1.el7
globus-gass-copy-9.12-1.el7
globus-gass-server-ez-5.7-1.el7
globus-gass-transfer-8.8-1.el7
globus-gatekeeper-10.8-1.el7
globus-gfork-4.7-1.el7
globus-gram-client-13.10-1.el7
globus-gram-client-tools-11.7-1.el7
globus-gram-job-manager-14.22-2.el7
globus-gram-job-manager-callout-error-3.5-1.el7
globus-gram-job-manager-condor-2.5-1.el7
globus-gram-job-manager-lsf-2.6-1.el7
globus-gram-job-manager-scripts-6.7-1.el7
globus-gram-job-manager-slurm-2.4-2.el7
globus-gram-protocol-12.12-1.el7
globus-gridftp-server-7.12-1.el7
globus-gridmap-callout-error-2.4-1.el7
globus-gridmap-verify-myproxy-callout-2.7-1.el7
globus-gsi-callback-5.6-1.el7
globus-gsi-cert-utils-9.10-1.el7
globus-gsi-credential-7.7-1.el7
globus-gsi-openssl-error-3.5-1.el7
globus-gsi-proxy-core-7.7-1.el7
globus-gsi-proxy-ssl-5.7-1.el7
globus-gsi-sysconfig-6.8-1.el7
globus-gss-assist-10.12-1.el7
globus-gssapi-error-5.4-1.el7
globus-gssapi-gsi-11.13-1.el7
globus-io-10.12-1.el7
globus-openssl-module-4.6-1.el7
globus-proxy-utils-6.9-1.el7
globus-rsl-10.9-1.el7
globus-scheduler-event-generator-5.7-1.el7
globus-xio-4.15-1.el7
globus-xio-gridftp-driver-2.8-1.el7
globus-xio-gsi-driver-3.6-1.el7
gudev-sharp-0.1-14.el7
holland-1.0.10-3.el7
konversation-1.5-7.el7
libfaketime-0.9.6-1.el7
libffado-2.1.0-4.el7
nfs-ganesha-2.1.0-11.el7
nodejs-seq-0.3.5-2.el7
nodejs-silent-npm-registry-client-0.0.1-1.el7
nodejs-strscanner-0.0.8-2.el7
perl-qpid-0.30-1.el7
php-horde-Horde-Core-2.15.0-2.el7
php-horde-Horde-Dav-1.1.1-1.el7
php-horde-Horde-History-2.3.2-1.el7
php-horde-Horde-Secret-2.0.4-1.el7
php-horde-Horde-Test-2.4.5-1.el7
php-horde-horde-5.2.2-1.el7
php-horde-imp-6.2.3-1.el7
php-horde-ingo-3.2.2-1.el7
php-horde-kronolith-4.2.3-1.el7
php-horde-nag-4.2.2-1.el7
php-horde-turba-4.2.3-1.el7
php-horde-wicked-2.0.2-1.el7
php-react-promise-2.1.0-1.el7
python-libqutrub-1.0-3.el7
python-naftawayh-0.2-4.el7
python-qpid-0.30-1.el7
python-qpid_messaging-0.30-1.el7
qpid-cpp-0.30-3.el7
rubygem-qpid_messaging-0.30.0-1.el7
ssmtp-2.64-14.el7
taglib-sharp-2.0.3.7-11.el7
xfce4-netload-plugin-1.2.0-6.el7
xournal-0.4.8-3.el7

Details about builds:



 ansible-inventory-grapher-1.0.1-2.el7 (FEDORA-EPEL-2014-3678)
 Creates graphs representing ansible inventory

Update Information:

Initial package

References:

  [ 1 ] Bug #1146929 - Review Request: ansible-inventory-grapher - Creates 
graphs representing ansible inventory
https://bugzilla.redhat.com/show_bug.cgi?id=1146929




 ansible-lint-1.0.4-1.el7 (FEDORA-EPEL-2014-3711)
 Best practices checker for Ansible

Update Information:

Initial package

References:

  [ 1 ] Bug #1146928 - Review Request: ansible-lint - Best practices checker 
for Ansible
https://bugzilla.redhat.com/show_bug.cgi?id=1146928

Re: [EPEL-devel] epel-release: consider adding %epel macro ?

2014-10-31 Thread Rex Dieter
Rex Dieter wrote:

 I'd like to be able to conditionalize some package features depending on
 if
 epel repo is enabled or not.  One way to accomplish that goal is if epel-
 release defined some macro, say, something like %{epel}, similar to
 %{feodra} or %{rhel}
 
 (I don't care what the macro is named, as long as the bikeshed remains
 blue)
 
 My primary motivation is to simplify the task of doing something like:
 https://copr.fedoraproject.org/coprs/rdieter/kde4/
 where I currently end up patching various .spec files (mostly to enable
 features due to having epel available), and I'd like to be able to
 minimize having to do that.

As a followup, it would appear that COPR is starting to define macros:
copr_projectname
copr_username
(as well as redefining 'vendor')

So the urgency to do this in epel specifically is less, but I still think it 
is a good idea.

-- Rex

___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


Re: [EPEL-devel] epel-release: consider adding %epel macro ?

2014-10-31 Thread Rex Dieter
Rex Dieter wrote:

 Rex Dieter wrote on Oct 16:
 
 I'd like to be able to conditionalize some package features depending on
 if
 epel repo is enabled or not.  One way to accomplish that goal is if epel-
 release defined some macro, say, something like %{epel}, similar to
 %{feodra} or %{rhel}
 
 (I don't care what the macro is named, as long as the bikeshed remains
 blue)
 
 My primary motivation is to simplify the task of doing something like:
 https://copr.fedoraproject.org/coprs/rdieter/kde4/
 where I currently end up patching various .spec files (mostly to enable
 features due to having epel available), and I'd like to be able to
 minimize having to do that.
 
 thoughts?
 
 ping, any comment or objection?
 
 I'll work on a patch for epel-release to implement a %{epel} macro, in
 case anyone was waiting for implementation details.

Here's the epel-release patch as promised (epel7 branch), attached.

-- RexFrom 6208a680f648b1ac0e0eb3582d5d85a76cdb48bd Mon Sep 17 00:00:00 2001
From: Rex Dieter rdie...@math.unl.edu
Date: Fri, 31 Oct 2014 07:36:53 -0500
Subject: [PATCH] implement %epel macro

---
 epel-release.spec |9 -
 macros.epel   |3 +++
 2 files changed, 11 insertions(+), 1 deletions(-)
 create mode 100644 macros.epel

diff --git a/epel-release.spec b/epel-release.spec
index 9427b01..c0c0965 100644
--- a/epel-release.spec
+++ b/epel-release.spec
@@ -1,6 +1,6 @@
 Name:   epel-release   
 Version:7
-Release:2
+Release:3
 Summary:Extra Packages for Enterprise Linux repository configuration
 
 Group:  System Environment/Base 
@@ -14,6 +14,7 @@ Source0:http://download.fedoraproject.org/pub/epel/RPM-GPG-KEY-EPEL-7
 Source1:GPL	
 Source2:epel.repo	
 Source3:epel-testing.repo	
+Source4:macros.epel
 
 BuildArch: noarch
 Requires:  redhat-release =  %{version} 
@@ -41,6 +42,7 @@ install -Dpm 644 %{SOURCE0} \
 install -dm 755 $RPM_BUILD_ROOT%{_sysconfdir}/yum.repos.d
 install -pm 644 %{SOURCE2} %{SOURCE3}  \
 $RPM_BUILD_ROOT%{_sysconfdir}/yum.repos.d
+install -pm -D ${SOURCE3} $RPM_BUILD_ROOT/usr/lib/rpm/macros.d/macros.epel
 
 %clean
 rm -rf $RPM_BUILD_ROOT
@@ -50,9 +52,14 @@ rm -rf $RPM_BUILD_ROOT
 %doc GPL
 %config(noreplace) /etc/yum.repos.d/*
 /etc/pki/rpm-gpg/*
+/usr/lib/rpm/macros.d/macros.epel
+
 
 
 %changelog
+* Fri Oct 31 2014 Rex Dieter rdie...@fedoraproject.org 7-3
+- implement %%epel macro
+
 * Tue Sep 02 2014 Kevin Fenzi ke...@scrye.com 7-2
 - Make repo files config(noreplace). Fixes bug #1135576
 
diff --git a/macros.epel b/macros.epel
new file mode 100644
index 000..fb4413f
--- /dev/null
+++ b/macros.epel
@@ -0,0 +1,3 @@
+# epel macros
+
+%epel %{?rhel}%{!?:rhel:7}
-- 
1.7.1


___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


Re: [EPEL-devel] epel-release: consider adding %epel macro ?

2014-10-31 Thread Jeff Sheltren
On Fri, Oct 31, 2014 at 5:42 AM, Rex Dieter rdie...@math.unl.edu wrote:

 Rex Dieter wrote:

  +%epel %{?rhel}%{!?:rhel:7}

 typo alert ^^ (in the second part), but hopefully you get the idea.

 Or, if you'd rather not depend on %rhel macro, and just hard-code to 7,
 that
 would be fine too.



The approach looks good to me.

The patch needs a little work though: besides the typo you mentioned, the
install line is copying the wrong SOURCE file.

I see %rhel is present on CentOS -- I can't speak to other rebuilds though.
It would be nice to verify that.

Bonus points for a second patch to remove all the extra trailing whitespace
happening in this spec :)

-Jeff
___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


Re: [EPEL-devel] EPEL 7 cloud-initramfs-tools/dracut-modules-growroot

2014-10-31 Thread Fred Wittekind

On 10/31/2014 4:44 AM, Juerg Haefliger wrote:



On Thu, Oct 30, 2014 at 8:30 PM, Fred Wittekind 
r...@twister.dyndns.org mailto:r...@twister.dyndns.org wrote:



 On 8/7/2014 1:29 PM, Fred Wittekind wrote:

 On 8/5/2014 5:55 PM, Juerg Haefliger wrote:

 Hi Fred,

 On Tue, Aug 5, 2014 at 10:33 PM, Fred Wittekind 
r...@twister.dyndns.org mailto:r...@twister.dyndns.org wrote:

 
  How soon might a el7 version of this package be available?  I can 
see that there is already a bug entered in bugzilla for it 
(https://bugzilla.redhat.com/show_bug.cgi?id=1117416) and it's listed 
here https://apps.fedoraproject.org/packages/cloud-initramfs-tools 
(with no release yet).


 I just started to look at this today. I hope to have something ready 
for testing later this week.


 ...Juerg

 I tried the patch in the bug report linked above, and it it tries to 
work.  boot.log shows that it is unable to write to the partition table.


 Have you gotten far enough in your testing to have any results, 
maybe the same as mine?


 Fred


 Any progress towards a release?

Not really. I looked into it but it doesn't seem to be a trivial thing 
to do with systemd. RHEL7 ships with a kernel that is new enough and 
is capable of online resizing partitions, so the initrd hack is not 
required. Is there a specific reason why you need this package in EPEL7?


I've built the package with the patch provided in the bugreport, and it 
tries, but, it fails to be able to write to the partition table, I get 
the same results command line.  I've tried with and without SELinux.   I 
am looking for a automated way to do this, on first boot after a drive 
resize.  So far I haven't found a manual way to do it that works.  I 
know I could create a second PV, and add it to a VG, and then resize the 
LV, but, would prefer not to do it this way, seems messy.


Fred

___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


Re: [EPEL-devel] [Extra Packages for Enterprise Linux] #22: Meeting Agenda for 2014-10-10

2014-10-31 Thread Extra Packages for Enterprise Linux
#22: Meeting Agenda for 2014-10-10
--+
  Reporter:  smooge   |  Owner:  smooge
  Type:  defect   | Status:  closed
  Priority:  major|  Milestone:
 Component:  Package request  |Version:
Resolution:  worksforme   |   Keywords:
--+
Changes (by smooge):

 * status:  new = closed
 * resolution:   = worksforme


-- 
Ticket URL: https://fedorahosted.org/epel/ticket/22#comment:1
Extra Packages for Enterprise Linux https://fedoraproject.org/wiki/EPEL
Extra Packages for Enterprise Linux
___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


Re: [EPEL-devel] [Extra Packages for Enterprise Linux] #2: How to handle systemd service activation defaults in EPEL7

2014-10-31 Thread Extra Packages for Enterprise Linux
#2: How to handle systemd service activation defaults in EPEL7
-+
  Reporter:  orion   |  Owner:  epel-wranglers
  Type:  task| Status:  new
  Priority:  major   |  Milestone:  EPEL-7
 Component:  Policy problem  |Version:
Resolution:  |   Keywords:
-+

Comment (by smooge):

 +1 to put in EPEL-release

-- 
Ticket URL: https://fedorahosted.org/epel/ticket/2#comment:9
Extra Packages for Enterprise Linux https://fedoraproject.org/wiki/EPEL
Extra Packages for Enterprise Linux
___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


Re: [EPEL-devel] [Extra Packages for Enterprise Linux] #4: Decide on criteria to unretire packages.

2014-10-31 Thread Extra Packages for Enterprise Linux
#4: Decide on criteria to unretire packages.
-+
  Reporter:  till|  Owner:  epel-wranglers
  Type:  defect  | Status:  new
  Priority:  major   |  Milestone:
 Component:  Policy problem  |Version:
Resolution:  |   Keywords:
-+

Comment (by smooge):

 Agreed by bstinson, Evolution, smooge, nirik

 a) smooge volunteers to be a reviewer who will do reviews of needed
 packages on Friday afternoons after I have been retrained.
 b) We have a bug-killing day once a month where CentOS packagers help
 c) We expect all packages that have been removed from the collection over
 14 days to be re-reviewed. [This is to match upstream FESCO policy]

-- 
Ticket URL: https://fedorahosted.org/epel/ticket/4#comment:3
Extra Packages for Enterprise Linux https://fedoraproject.org/wiki/EPEL
Extra Packages for Enterprise Linux
___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


Re: [EPEL-devel] [Extra Packages for Enterprise Linux] #4: Decide on criteria to unretire packages.

2014-10-31 Thread Extra Packages for Enterprise Linux
#4: Decide on criteria to unretire packages.
-+
  Reporter:  till|  Owner:  epel-wranglers
  Type:  task| Status:  closed
  Priority:  major   |  Milestone:
 Component:  Policy problem  |Version:
Resolution:  fixed   |   Keywords:
-+
Changes (by smooge):

 * resolution:   = fixed
 * type:  defect = task
 * status:  new = closed


-- 
Ticket URL: https://fedorahosted.org/epel/ticket/4#comment:4
Extra Packages for Enterprise Linux https://fedoraproject.org/wiki/EPEL
Extra Packages for Enterprise Linux
___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


Re: [EPEL-devel] [Extra Packages for Enterprise Linux] #8: EPEL-latest link rpm

2014-10-31 Thread Extra Packages for Enterprise Linux
#8: EPEL-latest link rpm
-+
  Reporter:  smooge  |  Owner:  epel-wranglers
  Type:  enhancement | Status:  new
  Priority:  minor   |  Milestone:
 Component:  Policy problem  |Version:
Resolution:  |   Keywords:
-+

Comment (by smooge):

 Will start looking at what needs to be done in MASH to get this working
 since this will be helpful to multiple projects.

-- 
Ticket URL: https://fedorahosted.org/epel/ticket/8#comment:4
Extra Packages for Enterprise Linux https://fedoraproject.org/wiki/EPEL
Extra Packages for Enterprise Linux
___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


Re: [EPEL-devel] [Extra Packages for Enterprise Linux] #8: EPEL-latest link rpm

2014-10-31 Thread Extra Packages for Enterprise Linux
#8: EPEL-latest link rpm
-+--
  Reporter:  smooge  |  Owner:  smooge
  Type:  enhancement | Status:  accepted
  Priority:  minor   |  Milestone:
 Component:  Policy problem  |Version:
Resolution:  |   Keywords:
-+--
Changes (by smooge):

 * status:  new = accepted
 * owner:  epel-wranglers = smooge


-- 
Ticket URL: https://fedorahosted.org/epel/ticket/8#comment:5
Extra Packages for Enterprise Linux https://fedoraproject.org/wiki/EPEL
Extra Packages for Enterprise Linux
___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


Re: Font issues in F21

2014-10-31 Thread Hans de Goede
Hi,

On 10/30/2014 11:01 PM, Orion Poplawski wrote:
 As a fix for this:
 
 https://bugzilla.redhat.com/show_bug.cgi?id=1046341
 
 The following symbolic link was added to xorg-x11-font-utils:
 
 lrwxrwxrwx. 1 root root 12 Aug 18 23:08 /usr/share/fonts/X11 - ../X11/fonts
 
 This causes fontconfig to search the full X11 hierarchy whereas before it only
 searched the Type1 and TTF subdirs.
 
 This fix has triggered:
 
 https://bugzilla.redhat.com/show_bug.cgi?id=1158468
 
 and I suspect other issues will crop up as well.
 
 Can some font experts weigh in on how to properly solve the first issue
 without triggering the second?

The first issue can be fixed by patching luit to search under 
/usr/share/X11/fonts
rather then /usr/share/fonts/X11, my thinking behind adding the symlink was that
their will likely be other apps with the same problem as luit. So I asked my
fellow graphics team members about why we were using /usr/share/X11/fonts 
instead
of /usr/share/fonts/X11 in the first place, and there did not seem be a special
reason, so I added the symlink.

Since the symlink is clearly causing issues I'll do an update removing the 
symlink
and another update fixing luit, and push them as one update in bodhi, which 
should
resolve both issues. As said their will likely be more cases of the luit 
problem
hiding elsewhere, but since the symlink is causing issues, we will need to fix 
those
on a case by case basis.

Regards,

Hans

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Remove Perl from minimal build root

2014-10-31 Thread Vít Ondruch
Dne 30.10.2014 v 18:57 Matěj Cepl napsal(a):
 On 2014-10-30, 14:04 GMT, Chris Adams wrote:
 Once upon a time, Vít Ondruch vondr...@redhat.com said:
 I am pretty sure, that this was already discussed many times, but I
 proposed to drop the seemingly last dependency of RPM on Perl in this
 [1] ticket and hence Perl from minimal buildroot (unless it will be
 pulled in by some other packages). The RPM maintainers as well as Perl
 maintainers seems to be in favor of this change.
 One other thing to check for is spec files that use perl (maybe when the
 resulting package does not).  I know I've written spec files that use
 perl to fix things and what not.
 Sure, it should be checked, but not that it would free those 
 packages from being broken. Let me quote 
 https://fedoraproject.org/wiki/Packaging:Guidelines

 Note: If you call perl or python in your spec file (and it 
 is not already a BuildRequires for the package), you need to 
 explicitly add a BuildRequires for perl or python.

 Moreover, perl is not (and I believe it never was) in the list 
 in 
 https://fedoraproject.org/wiki/Packaging:Guidelines#Exceptions_2

 Matěj


This is really good point Matěj, thanks for bringing this up!


Vít
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Remove Perl from minimal build root

2014-10-31 Thread Vít Ondruch
Dne 31.10.2014 v 00:37 Nico Kadel-Garcia napsal(a):
 On Thu, Oct 30, 2014 at 3:01 PM, Richard Hughes hughsi...@gmail.com wrote:
 On 30 October 2014 14:02, Vít Ondruch vondr...@redhat.com wrote:
 If you have any comments, please speak up now.
 No comment, just lots of thanks!

 Richard
 I tried this, *twice*. Once way, way back when with Red Hat 6.x (not
 RHEL 6.x, Red Hat 6.x, think back to around 2001). It was not pleasant
 work, there are a *lot* of hidden dependencies. And once about 6 years
 ago to to shrink and secure a CentOS build, along with ripping out gcc
 and build tools.

 It really wasn't pretty to watch, and I don't recommend burning your
 timne on this. I wound up writing a lot of plugins to work around the
 dependencies, and it rapidly exceeded the expense and time of just
 installing perl.

I understand, but fortunately time is changing and some things are
better now then they used to be. I can't say this will be successful,
but as I said, RPM, which was the usual excuse, is Perl independent,
with the last exception I suggest to get rid off and I believe that Perl
team can now do bootstrap and rebuild of all Perl packages, which should
help with testing prior this lands, so all these makes me optimistic.


Vít
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Font issues in F21

2014-10-31 Thread nicolas . mailhot
De: Hans de Goede hdego...@redhat.com
Hi,

On 10/30/2014 11:01 PM, Orion Poplawski wrote:

 Can some font experts weigh in on how to properly solve the first issue
 without triggering the second?

 The first issue can be fixed by patching luit to search under 
 /usr/share/X11/fonts
 rather then /usr/share/fonts/X11, my thinking behind adding the symlink was 
 that
 their will likely be other apps with the same problem as luit. 

The root of the problem of course is that luit and other similar apps have 
still not be updated to use fontconfig properly, 12 years after it was 
introduced. And every time someone adds a hack to avoid fixing those apps it 
breaks something else.

I personnaly think that short of making them fail fast and hard nothing will 
convince their upstreams to look at fontconfig and till then they will continue 
to produce side effects on the rest of the system. You get all the problems 
that caused fontconfig to be written in the first place, without any hope of 
improvement (since the solution is to use fontconfig, it was written to handle 
font discovery sanely).

Regards,

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Font issues in F21

2014-10-31 Thread Hans de Goede
Hi,

On 10/31/2014 10:20 AM, nicolas.mail...@laposte.net wrote:
 De: Hans de Goede hdego...@redhat.com
 Hi,
 
 On 10/30/2014 11:01 PM, Orion Poplawski wrote:
 
 Can some font experts weigh in on how to properly solve the first issue
 without triggering the second?
 
 The first issue can be fixed by patching luit to search under 
 /usr/share/X11/fonts
 rather then /usr/share/fonts/X11, my thinking behind adding the symlink was 
 that
 their will likely be other apps with the same problem as luit. 
 
 The root of the problem of course is that luit and other similar apps have 
 still not be updated to use fontconfig properly, 12 years after it was 
 introduced. And every time someone adds a hack to avoid fixing those apps it 
 breaks something else.
 
 I personnaly think that short of making them fail fast and hard nothing will 
 convince their upstreams to look at fontconfig and till then they will 
 continue to produce side effects on the rest of the system. You get all the 
 problems that caused fontconfig to be written in the first place, without any 
 hope of improvement (since the solution is to use fontconfig, it was written 
 to handle font discovery sanely).

Erm, luit is not looking for font files at all, it is an encoding translator, as
such it wants the encoding files found under /usr/share/X11/fonts/encodings. 
Which
it expects to be under /usr/share/fonts/X11/encodings. Fixing this in luit is 
trivial,
but I was afraid other apps would have similar hardcoded paths, so the symlink
seemed like a good idea.

Sorry for the problems I've caused by adding the X11 symlink I'll push an
updated package reverting it asap.

Regards,

Hans
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

rawhide report: 20141031 changes

2014-10-31 Thread Fedora Rawhide Report
Compose started at Fri Oct 31 05:15:03 UTC 2014
Broken deps for i386
--
[3Depict]
3Depict-0.0.16-3.fc22.i686 requires libmgl.so.7.2.0
[Sprog]
Sprog-0.14-27.fc20.noarch requires perl(:MODULE_COMPAT_5.18.0)
[alienarena]
alienarena-7.66-4.fc22.i686 requires libode-double.so.3
[audtty]
audtty-0.1.12-9.fc20.i686 requires libaudclient.so.2
[authhub]
authhub-0.1.2-3.fc19.i686 requires libjson.so.0
[cab]
cab-0.1.9-12.fc22.i686 requires cabal-dev
[collectd]
collectd-onewire-5.4.1-10.fc22.i686 requires libowcapi-2.9.so.7
[condor]
condor-plumage-8.1.4-7.a1a7df5.fc22.i686 requires libmongoclient.so
[debconf]
debconf-1.5.53-1.fc22.noarch requires perl(:MODULE_COMPAT_5.18.2)
[deltacloud-core]
deltacloud-core-rackspace-1.1.3-1.fc20.noarch requires 
rubygem(cloudservers)
deltacloud-core-rackspace-1.1.3-1.fc20.noarch requires 
rubygem(cloudfiles)
[django-recaptcha]
django-recaptcha-0.1-7.20091212svn6.fc21.noarch requires python-django14
[dnssec-check]
dnssec-check-1.14.0.1-4.fc20.i686 requires libval-threads.so.14
dnssec-check-1.14.0.1-4.fc20.i686 requires libsres.so.14
[dragonegg]
dragonegg-3.4-0.3.rc0.fc21.i686 requires libLLVM-3.4.so
dragonegg-3.4-0.3.rc0.fc21.i686 requires gcc = 0:4.8.2-14.fc21
[edelib]
edelib-2.1-5.fc22.i686 requires libedelib.so
edelib-devel-2.1-5.fc22.i686 requires libedelib.so
[eucalyptus]
eucalyptus-common-java-3.3.0-0.5.20130408git32052445.fc20.i686 requires 
hibernate3-jbosscache = 0:3.6.10-7
[fatrat]
1:fatrat-1.2.0-0.21.beta2.fc22.i686 requires libtorrent-rasterbar.so.7
[flush]
flush-0.9.12-10.fc22.i686 requires libtorrent-rasterbar.so.7
[gcc-python-plugin]
gcc-python2-debug-plugin-0.13-1.fc22.1.i686 requires gcc = 
0:4.9.1-11.fc22
gcc-python2-plugin-0.13-1.fc22.1.i686 requires gcc = 0:4.9.1-11.fc22
gcc-python3-debug-plugin-0.13-1.fc22.1.i686 requires gcc = 
0:4.9.1-11.fc22
gcc-python3-plugin-0.13-1.fc22.1.i686 requires gcc = 0:4.9.1-11.fc22
[gdesklet-SlideShow]
gdesklet-SlideShow-0.9-16.fc21.noarch requires gdesklets
[gdesklets-citation]
gdesklets-citation-2.0-3.20120702git355e2ee.fc19.noarch requires 
gdesklets
[gedit-valencia]
gedit-valencia-0.4.0-1.20131223git94442bf.fc21.i686 requires 
libvala-0.24.so.0
[ghc-hjsmin]
ghc-hjsmin-0.1.4.7-3.fc22.i686 requires 
libHSoptparse-applicative-0.9.0-ghc7.6.3.so
[glances]
glances-2.1.2-2.fc22.noarch requires python-psutil = 0:2.0.0
[gnome-shell-extensions]
gnome-shell-extension-common-3.15.1-1.fc22.noarch requires gnome-shell 
= 0:3.15.1
[gofer]
ruby-gofer-0.77.1-2.fc21.noarch requires rubygem(qpid) = 0:0.16.0
[iwhd]
iwhd-1.6-11.fc22.i686 requires libmongoclient.so
[kmid2]
kmid2-2.4.0-7.fc22.i686 requires libdrumstick-file.so.0
kmid2-2.4.0-7.fc22.i686 requires libdrumstick-alsa.so.0
[leiningen]
leiningen-1.7.1-7.fc20.noarch requires maven-ant-tasks
leiningen-1.7.1-7.fc20.noarch requires classworlds
[libghemical]
libghemical-2.99.1-24.fc20.i686 requires libf77blas.so.3
libghemical-2.99.1-24.fc20.i686 requires libatlas.so.3
[libopensync-plugin-irmc]
1:libopensync-plugin-irmc-0.22-7.fc20.i686 requires libopenobex.so.1
[ltsp]
ltsp-client-5.4.5-8.fc21.i686 requires fuse-unionfs
ltsp-server-5.4.5-8.fc21.i686 requires cdialog
[meshmagick]
meshmagick-0.6.0-20.svn2898.fc21.i686 requires libOgreMain.so.1.8.1
meshmagick-libs-0.6.0-20.svn2898.fc21.i686 requires libOgreMain.so.1.8.1
[monodevelop-vala]
monodevelop-vala-2.8.8.1-6.fc21.i686 requires vala  0:0.25.0
[netdisco]
netdisco-1.1-7.fc21.noarch requires perl(SNMP::Info::Layer2::Bay)
[nwchem]
nwchem-openmpi-6.3.2-11.fc21.i686 requires libmpi_usempi.so.1
[ocaml-cairo]
1:ocaml-cairo-1.2.0-0.18.git08b40192975.fc22.i686 requires ocaml(Gdk) = 
0:f378ca801294b82336e5c6c17354aafa
[ocaml-camlimages]
ocaml-camlimages-4.1.0-8.fc22.i686 requires ocaml(Gdk) = 
0:f378ca801294b82336e5c6c17354aafa
ocaml-camlimages-4.1.0-8.fc22.i686 requires ocaml(GDraw) = 
0:deb7a227126b52043bc5519b151161a3
[ocaml-cryptokit]
ocaml-cryptokit-1.9-6.fc22.i686 requires ocaml(Obj) = 
0:31e1329a4c3d9c2947b31f79b700fcfd
[ocaml-mysql]
ocaml-mysql-1.1.2-4.fc22.i686 requires ocaml(Obj) = 
0:31e1329a4c3d9c2947b31f79b700fcfd
[ocaml-ocamlnet]
ocaml-ocamlnet-3.7.4-9.fc22.i686 requires ocaml(GdkEvent) = 
0:888bfbb798af9ae801076132037be1fb
ocaml-ocamlnet-3.7.4-9.fc22.i686 requires ocaml(Gdk) = 
0:f378ca801294b82336e5c6c17354aafa
ocaml-ocamlnet-3.7.4-9.fc22.i686 requires ocaml(GObj) = 
0:aaf1de74e8c9dee7550f58369abca98b
ocaml-ocamlnet-3.7.4-9.fc22.i686 requires ocaml(GDraw) = 
0:deb7a227126b52043bc5519b151161a3
ocaml-ocamlnet-3.7.4-9.fc22.i686 requires 

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Michal Schmidt
On 10/31/2014 02:47 AM, Matthew Miller wrote:
 Oct 30 21:39:47 ubik.home.mkmiller.org systemd[1]: Found ordering cycle on 
 basic.target/start
 Oct 30 21:39:47 ubik.home.mkmiller.org systemd[1]: Breaking ordering cycle by 
 deleting job sysinit.target/start

Matthew,

are you showing only messages at loglevel warning and higher?
Because in between these two lines I'd expect to see some
Found dependency on service/job_type at loglevel info.

Regards,
Michal

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Matthew Miller
On Fri, Oct 31, 2014 at 12:33:20PM +0100, Michal Schmidt wrote:
  Oct 30 21:39:47 ubik.home.mkmiller.org systemd[1]: Found ordering cycle on 
  basic.target/start
  Oct 30 21:39:47 ubik.home.mkmiller.org systemd[1]: Breaking ordering cycle 
  by deleting job sysinit.target/start
 are you showing only messages at loglevel warning and higher?
 Because in between these two lines I'd expect to see some
 Found dependency on service/job_type at loglevel info.

That's everything with _COMM=systemd since boot. Possibly loglevel
itself is set low? I'll enable more debugging and post that.

-- 
Matthew Miller
mat...@fedoraproject.org
Fedora Project Leader
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

F-21 Branched report: 20141031 changes

2014-10-31 Thread Fedora Branched Report
Compose started at Fri Oct 31 07:15:02 UTC 2014
Broken deps for armhfp
--
[PyQuante]
PyQuante-libint-1.6.4-11.fc21.1.armv7hl requires libint(armv7hl-32) = 
0:1.1.6-2.fc21
[audtty]
audtty-0.1.12-9.fc20.armv7hl requires libaudclient.so.2
[authhub]
authhub-0.1.2-3.fc19.armv7hl requires libjson.so.0
[avro]
avro-mapred-1.7.5-9.fc21.noarch requires hadoop-mapreduce
avro-mapred-1.7.5-9.fc21.noarch requires hadoop-client
[cduce]
cduce-0.5.5-9.fc21.armv7hl requires ocaml(Camlp4) = 
0:ebd368022fd2bc7b305a42902efa4c90
[cp2k]
cp2k-2.5.1-8.fc21.armv7hl requires libint(armv7hl-32) = 0:1.1.6-2.fc21
cp2k-mpich-2.5.1-8.fc21.armv7hl requires libint(armv7hl-32) = 
0:1.1.6-2.fc21
cp2k-openmpi-2.5.1-8.fc21.armv7hl requires libmpi_usempi.so.1
cp2k-openmpi-2.5.1-8.fc21.armv7hl requires libint(armv7hl-32) = 
0:1.1.6-2.fc21
[deltacloud-core]
deltacloud-core-rackspace-1.1.3-1.fc20.noarch requires 
rubygem(cloudservers)
deltacloud-core-rackspace-1.1.3-1.fc20.noarch requires 
rubygem(cloudfiles)
[django-recaptcha]
django-recaptcha-0.1-7.20091212svn6.fc21.noarch requires python-django14
[dragonegg]
dragonegg-3.4-0.3.rc0.fc21.armv7hl requires gcc = 0:4.8.2-14.fc21
[edelib]
edelib-2.1-5.fc21.armv7hl requires libedelib.so
edelib-devel-2.1-5.fc21.armv7hl requires libedelib.so
[eucalyptus]
eucalyptus-common-java-3.3.0-0.5.20130408git32052445.fc20.armv7hl 
requires hibernate3-jbosscache = 0:3.6.10-7
[fatrat]
1:fatrat-1.2.0-0.21.beta2.fc21.armv7hl requires 
libtorrent-rasterbar.so.7
[flush]
flush-0.9.12-10.fc21.armv7hl requires libtorrent-rasterbar.so.7
[freesteam]
freesteam-ascend-2.1-6.20140724svn753.fc21.armv7hl requires 
libascend.so.1
[gdesklet-SlideShow]
gdesklet-SlideShow-0.9-16.fc21.noarch requires gdesklets
[gdesklets-citation]
gdesklets-citation-2.0-3.20120702git355e2ee.fc19.noarch requires 
gdesklets
[gedit-valencia]
gedit-valencia-0.4.0-1.20131223git94442bf.fc21.armv7hl requires 
libvala-0.24.so.0
[gnome-python2-desktop]
gnome-python2-metacity-2.32.0-18.fc21.armv7hl requires 
libmetacity-private.so.0
[gofer]
ruby-gofer-0.77.1-2.fc21.noarch requires rubygem(qpid) = 0:0.16.0
[leiningen]
leiningen-1.7.1-7.fc20.noarch requires maven-ant-tasks
leiningen-1.7.1-7.fc20.noarch requires classworlds
[libghemical]
libghemical-2.99.1-24.fc20.armv7hl requires libf77blas.so.3
libghemical-2.99.1-24.fc20.armv7hl requires libatlas.so.3
[libopensync-plugin-irmc]
1:libopensync-plugin-irmc-0.22-7.fc20.armv7hl requires libopenobex.so.1
[ltsp]
ltsp-client-5.4.5-8.fc21.armv7hl requires fuse-unionfs
ltsp-server-5.4.5-8.fc21.armv7hl requires cdialog
[meshmagick]
meshmagick-0.6.0-20.svn2898.fc21.armv7hl requires libOgreMain.so.1.8.1
meshmagick-libs-0.6.0-20.svn2898.fc21.armv7hl requires 
libOgreMain.so.1.8.1
[monodevelop-vala]
monodevelop-vala-2.8.8.1-6.fc21.armv7hl requires vala  0:0.25.0
[netdisco]
netdisco-1.1-7.fc21.noarch requires perl(SNMP::Info::Layer2::Bay)
[ocaml-pa-do]
ocaml-pa-do-0.8.16-3.fc21.armv7hl requires ocaml(Camlp4) = 
0:ebd368022fd2bc7b305a42902efa4c90
[openslides]
openslides-1.3.1-3.fc21.noarch requires python-django  0:1.5
[openstack-nova]
openstack-nova-compute-2014.1.2-1.fc21.noarch requires 
libvirt-daemon-xen
[openvas-client]
openvas-client-3.0.3-8.fc20.armv7hl requires libopenvas_omp.so.6
openvas-client-3.0.3-8.fc20.armv7hl requires libopenvas_nasl.so.6
openvas-client-3.0.3-8.fc20.armv7hl requires libopenvas_misc.so.6
openvas-client-3.0.3-8.fc20.armv7hl requires libopenvas_hg.so.6
openvas-client-3.0.3-8.fc20.armv7hl requires libopenvas_base.so.6
[perl-RT-Authen-ExternalAuth]
perl-RT-Authen-ExternalAuth-0.11-5.fc21.noarch requires rt3
[perl-RT-Extension-CommandByMail]
perl-RT-Extension-CommandByMail-0.07-10.fc21.noarch requires 
perl(RT::Interface::Email)
[pipelight-selinux]
pipelight-selinux-0.2.1-2.fc21.noarch requires pipelight-common
pipelight-selinux-0.2.1-2.fc21.noarch requires pipelight-common
pipelight-selinux-0.2.1-2.fc21.noarch requires pipelight
pipelight-selinux-0.2.1-2.fc21.noarch requires pipelight
[pootle]
pootle-2.1.6-8.fc21.noarch requires python-django14
[python-askbot-fedmsg]
python-askbot-fedmsg-0.1.0-2.fc21.noarch requires askbot
[python-coffin]
python-coffin-0.3.7-3.fc21.noarch requires python-django14
[python-django-addons]
python-django-addons-0.6.6-2.fc21.noarch requires python-django14
[python-django-longerusername]
python-django-longerusername-0.4-5.20130204gite4e85d7d.fc21.noarch 
requires python-django14
[rubygem-linecache19]
rubygem-linecache19-0.5.13-6.fc20.armv7hl requires libruby.so.2.0

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Matthew Miller
On Fri, Oct 31, 2014 at 07:39:42AM -0400, Matthew Miller wrote:
 On Fri, Oct 31, 2014 at 12:33:20PM +0100, Michal Schmidt wrote:
   Oct 30 21:39:47 ubik.home.mkmiller.org systemd[1]: Found ordering cycle 
   on basic.target/start
   Oct 30 21:39:47 ubik.home.mkmiller.org systemd[1]: Breaking ordering 
   cycle by deleting job sysinit.target/start
  are you showing only messages at loglevel warning and higher?
  Because in between these two lines I'd expect to see some
  Found dependency on service/job_type at loglevel info.
 That's everything with _COMM=systemd since boot. Possibly loglevel
 itself is set low? I'll enable more debugging and post that.

Oct 31 07:42:29 ubik systemd[1]: Found ordering cycle on basic.target/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on sysinit.target/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on 
systemd-update-utmp.service/verify-active
Oct 31 07:42:29 ubik systemd[1]: Found dependency on 
systemd-tmpfiles-setup.service/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on 
systemd-journal-flush.service/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on remote-fs.target/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on remote-fs-pre.target/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on nfs-client.target/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on gssproxy.service/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on basic.target/start
Oct 31 07:42:29 ubik systemd[1]: Breaking ordering cycle by deleting job 
systemd-update-utmp.service/verify-active
Oct 31 07:42:29 ubik systemd[1]: Job systemd-update-utmp.service/verify-active 
deleted to break ordering cycle starting with basic.target/start
Oct 31 07:42:29 ubik systemd[1]: Deleting job 
systemd-update-utmp-runlevel.service/start as dependency of job 
systemd-update-utmp.service/verify-active
Oct 31 07:42:29 ubik systemd[1]: Found ordering cycle on basic.target/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on sysinit.target/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on auditd.service/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on 
systemd-tmpfiles-setup.service/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on 
systemd-journal-flush.service/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on remote-fs.target/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on remote-fs-pre.target/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on nfs-client.target/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on gssproxy.service/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on basic.target/start
Oct 31 07:42:29 ubik systemd[1]: Breaking ordering cycle by deleting job 
auditd.service/start
Oct 31 07:42:29 ubik systemd[1]: Job auditd.service/start deleted to break 
ordering cycle starting with basic.target/start
Oct 31 07:42:29 ubik systemd[1]: Found ordering cycle on basic.target/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on sysinit.target/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on 
systemd-tmpfiles-setup.service/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on 
systemd-journal-flush.service/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on remote-fs.target/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on remote-fs-pre.target/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on nfs-client.target/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on gssproxy.service/start
Oct 31 07:42:29 ubik systemd[1]: Found dependency on basic.target/start
Oct 31 07:42:29 ubik systemd[1]: Breaking ordering cycle by deleting job 
systemd-tmpfiles-setup.service/start
Oct 31 07:42:29 ubik systemd[1]: Job systemd-tmpfiles-setup.service/start 
deleted to break ordering cycle starting with basic.target/start
Oct 31 07:42:29 ubik systemd[1]: Looking at job sshd-keygen.service/stop 
conflicted_by=no
Oct 31 07:42:29 ubik systemd[1]: Looking at job sshd-keygen.service/start 
conflicted_by=no
Oct 31 07:42:29 ubik systemd[1]: Fixing conflicting jobs 
sshd-keygen.service/stop,sshd-keygen.service/start by deleting job 
sshd-keygen.service/stop
Oct 31 07:42:29 ubik systemd[1]: Looking at job plymouth-quit.service/stop 
conflicted_by=yes
Oct 31 07:42:29 ubik systemd[1]: Looking at job plymouth-quit.service/start 
conflicted_by=no
Oct 31 07:42:29 ubik systemd[1]: Fixing conflicting jobs 
plymouth-quit.service/stop,plymouth-quit.service/start by deleting job 
plymouth-quit.service/start
Oct 31 07:42:29 ubik systemd[1]: Looking at job gdm.service/start 
conflicted_by=no
Oct 31 07:42:29 ubik systemd[1]: Looking at job gdm.service/stop 
conflicted_by=no
Oct 31 07:42:29 ubik systemd[1]: Fixing conflicting jobs 
gdm.service/start,gdm.service/stop by deleting job gdm.service/stop
Oct 31 07:42:29 ubik systemd[1]: Looking at job getty@tty1.service/stop 
conflicted_by=yes
Oct 31 07:42:29 ubik systemd[1]: Looking at job getty@tty1.service/start 

Re: Remove Perl from minimal build root

2014-10-31 Thread Matěj Cepl
On 2014-10-31, 08:54 GMT, Vít Ondruch wrote:
 This is really good point Matěj, thanks for bringing this up!

It’s like alcoholism: once lawyer, always lawyer, I am afraid.

Best,

Matěj

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Matthew Miller
By the way, 

sudo systemctl start systemd-tmpfiles-setup
sudo rm /var/run/nologin
sudo systemctl restart gdm

got me to a functioning GNOME desktop.


-- 
Matthew Miller
mat...@fedoraproject.org
Fedora Project Leader
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Michal Schmidt
On 10/31/2014 12:57 PM, Matthew Miller wrote:
 Oct 31 07:42:29 ubik systemd[1]: Found ordering cycle on basic.target/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on sysinit.target/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on 
 systemd-update-utmp.service/verify-active
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on 
 systemd-tmpfiles-setup.service/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on 
 systemd-journal-flush.service/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on remote-fs.target/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on 
 remote-fs-pre.target/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on nfs-client.target/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on gssproxy.service/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on basic.target/start
 Oct 31 07:42:29 ubik systemd[1]: Breaking ordering cycle by deleting job 
 systemd-update-utmp.service/verify-active

This ordering cycle was introduced recently by changes in nfs-utils's
unit files when nfs-client.target got an After dependency on
gssproxy.

nfs-client.target wants to be started before any remote filesystems are
mounted (which is before basic.target).
gssproxy.service has default dependencies, so it wants to
start quite late during boot (after basic.target).

[CC Steve.]

Regards,
Michal
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Lennart Poettering
On Fri, 31.10.14 07:57, Matthew Miller (mat...@fedoraproject.org) wrote:

 On Fri, Oct 31, 2014 at 07:39:42AM -0400, Matthew Miller wrote:
  On Fri, Oct 31, 2014 at 12:33:20PM +0100, Michal Schmidt wrote:
Oct 30 21:39:47 ubik.home.mkmiller.org systemd[1]: Found ordering cycle 
on basic.target/start
Oct 30 21:39:47 ubik.home.mkmiller.org systemd[1]: Breaking ordering 
cycle by deleting job sysinit.target/start
   are you showing only messages at loglevel warning and higher?
   Because in between these two lines I'd expect to see some
   Found dependency on service/job_type at loglevel info.
  That's everything with _COMM=systemd since boot. Possibly loglevel
  itself is set low? I'll enable more debugging and post that.
 
 Oct 31 07:42:29 ubik systemd[1]: Found ordering cycle on basic.target/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on sysinit.target/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on 
 systemd-update-utmp.service/verify-active
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on 
 systemd-tmpfiles-setup.service/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on 
 systemd-journal-flush.service/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on remote-fs.target/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on 
 remote-fs-pre.target/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on nfs-client.target/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on gssproxy.service/start
 Oct 31 07:42:29 ubik systemd[1]: Found dependency on basic.target/start

So the problem appears to be that gssproxy.service been ordered before
remote-fs-pre.target. That target is ordered before
basic.target. However gssproxy.service also is ordered after
basic.target (simply because all services by default are ordered
before basic.target, unless they explicitly specify
DefaultDependencies=no), hence there's an ordering cycle.

Most likely some NFS maintainers tried to move gss-proxy.service into
the early boot, and didn't set DefaultDependencies=no.

That said, services running in early boot must be written in a
specific style (i.e. not assume /var to be around, and suchlike), I
do wonder if gssproxy is ready for that.

Anyway, long story short: file a bug against the gssproxy package.

Lennart

-- 
Lennart Poettering, Red Hat
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Matthew Miller
On Fri, Oct 31, 2014 at 01:44:27PM +0100, Michal Schmidt wrote:
 This ordering cycle was introduced recently by changes in nfs-utils's
 unit files when nfs-client.target got an After dependency on
 gssproxy.

Are you sure? Looks like I last updated nfs-utils on Oct 26th, and I've
rebooted several times since then without incident — it's only after
this last update that the problem occured.

I mean, I believe you that this is a problem, but did something else
change too?

-- 
Matthew Miller
mat...@fedoraproject.org
Fedora Project Leader
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: ca-certificates 2014.2.1 will remove several still valid CA certificates with weak keys

2014-10-31 Thread Kai Engert
On Wed, 2014-10-15 at 12:28 +0200, Vít Ondruch wrote:
 Nevertheless, I am still unsure how to proceed with RubyGems. Should I
 ship the bundled certificates again? Or should I wait until somebody
 notices?

Sorry for my late reply, because I didn't have a good suggestion
earlier.

We should work with the upstream OpenSSL and the GnuTLS projects, and
motivate them to implement more advanced path building. This would be a
long term project.

For the short term, I'd like to suggest the following strategy:

All legacy root CA certificates, which seem to be required for full
compatibility with either OpenSSL or GnuTLS, will continue to be
included and enabled in the ca-certificates package.

For users who are willing to accept the breakage and prefer using the
latest trust, only, we provide a mechanism to disable the legacy trust.

I've described the proposed approach in more detail at
https://bugzilla.redhat.com/show_bug.cgi?id=1158197

I've pushed experimental packages with this implementation to Rawhide
and updates-testing for Fedora 21. I have disabled the karma automatism,
because I'll be offline for the next 2 weeks, and don't want things to
go live while I'm away. I think it will be helpful to collect test
feedback during that time, and see if it's suitable, and make a
ship/no-ship decision of this approach later.

So, to answer Vít's original question:

I'd prefer if RubyGems didn't ship its own copy. I think our recent
achievement that all software packages on a system use the same
(default) set of trusted CA certificates is a good improvement, and I
think we should keep it.

Thanks
Kai


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

[Base] Base Design WG agenda meeting 31 October 2014 15:00 UTC on #fedora-meeting

2014-10-31 Thread Phil Knirsch

Agenda:
 - Status buildrequires cleanup work (davids  nils!)
 - Update on factory-reset work
 - Docker update
 - Phil on PTO for 3 weeks
 - Open Floor

Thanks  regards, Phil

--
Philipp Knirsch  | Tel.:  +49-711-96437-470
Manager Core Services| Fax.:  +49-711-96437-111
Red Hat GmbH | Email: Phil Knirsch pknir...@redhat.com
Wankelstrasse 5  | Web:   http://www.redhat.com/
D-70563 Stuttgart, Germany
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Michal Schmidt
On 10/31/2014 02:03 PM, Matthew Miller wrote:
 On Fri, Oct 31, 2014 at 01:44:27PM +0100, Michal Schmidt wrote:
 This ordering cycle was introduced recently by changes in nfs-utils's
 unit files when nfs-client.target got an After dependency on
 gssproxy.
 
 Are you sure? Looks like I last updated nfs-utils on Oct 26th, and I've
 rebooted several times since then without incident — it's only after
 this last update that the problem occured.
 
 I mean, I believe you that this is a problem, but did something else
 change too?

Maybe you already had an ordering cycle on Oct 26, but different units
were chosen for deletion when breaking the cycle, and by luck it had
fewer directly observable consequences.
Could you check older logs for ordering cycles?

Michal

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Matthew Miller
On Fri, Oct 31, 2014 at 02:15:45PM +0100, Michal Schmidt wrote:
 Maybe you already had an ordering cycle on Oct 26, but different units
 were chosen for deletion when breaking the cycle, and by luck it had
 fewer directly observable consequences.
 Could you check older logs for ordering cycles?

Yeah, I was just doing that, and there's no ordering cycle logged
before late last night (e.g. the ill-fated reboot).

That said, as you expected, disabling nfs-client.target does make the
system boot successfully. I'm still getting a problem with
dev-mqueue.mount, though:

Oct 31 09:19:46 ubik systemd[1]: dev-mqueue.mount: Directory /dev/mqueue to 
mount over is not empty, mounting anyway.
Oct 31 09:19:46 ubik mount[4484]: mount: mount point /dev/mqueue does not exist
Oct 31 09:19:46 ubik systemd[1]: dev-mqueue.mount mount process exited, 
code=exited status=32
Oct 31 09:19:46 ubik systemd[1]: Failed to mount POSIX Message Queue File 
System.


On a related but different note — is there a way to detect potential
ordering cycles from a set of RPMs on disk (possibly installed in a
chroot or something) _without_ actually booting? Maybe we could add a
taskotron check for that for packages with changes to systemd unit
files. (I realize that what is enabled on people's systems will have an
impact, but we could check against a set of defaults at least.)


-- 
Matthew Miller
mat...@fedoraproject.org
Fedora Project Leader
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Michal Schmidt
On 10/31/2014 02:30 PM, Matthew Miller wrote:
 Oct 31 09:19:46 ubik systemd[1]: dev-mqueue.mount: Directory /dev/mqueue to 
 mount over is not empty, mounting anyway.
 Oct 31 09:19:46 ubik mount[4484]: mount: mount point /dev/mqueue does not 
 exist
 Oct 31 09:19:46 ubik systemd[1]: dev-mqueue.mount mount process exited, 
 code=exited status=32
 Oct 31 09:19:46 ubik systemd[1]: Failed to mount POSIX Message Queue File 
 System.

I saw this too, but didn't look into it.

 On a related but different note — is there a way to detect potential
 ordering cycles from a set of RPMs on disk (possibly installed in a
 chroot or something) _without_ actually booting? Maybe we could add a
 taskotron check for that for packages with changes to systemd unit
 files. (I realize that what is enabled on people's systems will have an
 impact, but we could check against a set of defaults at least.)

It's not the perfect solution, but this command would report
the cycle you saw:
/usr/lib/systemd/systemd --test --system

Michal
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Igor Gnatenko
I see many this messages. But Matthew solution haven't fixed my problem.

-Igor Gnatenko
On Oct 31, 2014 4:42 PM, Michal Schmidt mschm...@redhat.com wrote:

 On 10/31/2014 02:30 PM, Matthew Miller wrote:
  Oct 31 09:19:46 ubik systemd[1]: dev-mqueue.mount: Directory /dev/mqueue
 to mount over is not empty, mounting anyway.
  Oct 31 09:19:46 ubik mount[4484]: mount: mount point /dev/mqueue does
 not exist
  Oct 31 09:19:46 ubik systemd[1]: dev-mqueue.mount mount process exited,
 code=exited status=32
  Oct 31 09:19:46 ubik systemd[1]: Failed to mount POSIX Message Queue
 File System.

 I saw this too, but didn't look into it.

  On a related but different note — is there a way to detect potential
  ordering cycles from a set of RPMs on disk (possibly installed in a
  chroot or something) _without_ actually booting? Maybe we could add a
  taskotron check for that for packages with changes to systemd unit
  files. (I realize that what is enabled on people's systems will have an
  impact, but we could check against a set of defaults at least.)

 It's not the perfect solution, but this command would report
 the cycle you saw:
 /usr/lib/systemd/systemd --test --system

 Michal
 --
 devel mailing list
 devel@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel
 Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: ca-certificates 2014.2.1 will remove several still valid CA certificates with weak keys

2014-10-31 Thread Nikos Mavrogiannopoulos
On Fri, 2014-10-31 at 14:05 +0100, Kai Engert wrote:
 On Wed, 2014-10-15 at 12:28 +0200, Vít Ondruch wrote:
  Nevertheless, I am still unsure how to proceed with RubyGems. Should I
  ship the bundled certificates again? Or should I wait until somebody
  notices?
 
 Sorry for my late reply, because I didn't have a good suggestion
 earlier.
 
 We should work with the upstream OpenSSL and the GnuTLS projects, and
 motivate them to implement more advanced path building. This would be a
 long term project.

Is there some issue with gnutls in F21? As far as I understand it should
work as expected with the certificates removed.

 So, to answer Vít's original question:
 I'd prefer if RubyGems didn't ship its own copy. I think our recent
 achievement that all software packages on a system use the same
 (default) set of trusted CA certificates is a good improvement, and I
 think we should keep it.

More than agree. No package should try provide better defaults than
the shipped ca-certificates, not only because it won't be better, but
because this is system configuration which administrators can and _do_
change. 

regards,
Nikos


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Bruno Wolff III

On Thu, Oct 30, 2014 at 21:47:36 -0400,
 Matthew Miller mat...@fedoraproject.org wrote:

Updated my rawhide system. Now it doesn't boot cleanly. Will try to
figure out the details in the morning (long week!), but Found ordering
cycle on basic.target/start seems to be part of it, and I wanted to
see if anyone else is hitting this (and possibly caution care on
upgrading right now).

Note Breaking ordering cycle by deleting job sysinit.target/start.

The system partially comes up, but there is a _lot_ of failure-to-work
afterwards - probably related.


I have a similar but not identical issue on some of my systems. It has 
been a problem for a couple of weeks that I have been avoiding by using 
older initramfs for. I haven't wanted to spend the time to figure out 
exactly what is triggering the problem. (It doesn't happen on all of 
my machines.)

--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Kevin Fenzi
On Fri, 31 Oct 2014 14:01:12 +0100
Lennart Poettering mzerq...@0pointer.de wrote:

 So the problem appears to be that gssproxy.service been ordered before
 remote-fs-pre.target. That target is ordered before
 basic.target. However gssproxy.service also is ordered after
 basic.target (simply because all services by default are ordered
 before basic.target, unless they explicitly specify
 DefaultDependencies=no), hence there's an ordering cycle.
 
 Most likely some NFS maintainers tried to move gss-proxy.service into
 the early boot, and didn't set DefaultDependencies=no.
 
 That said, services running in early boot must be written in a
 specific style (i.e. not assume /var to be around, and suchlike), I
 do wonder if gssproxy is ready for that.
 
 Anyway, long story short: file a bug against the gssproxy package.

I don't think this explains all the problems folks are having with
systemd-217. 

I have gssproxy disabled here and still see loops and issues. 
I did not with 216. gssproxy itself hasn't been updated in a long time. 

Happy to provide info from my install here, what info would be good to
get from everyone?

Perhaps in bug would be a better place to collect it: 

https://bugzilla.redhat.com/show_bug.cgi?id=1159117

kevin




signature.asc
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: ca-certificates 2014.2.1 will remove several still valid CA certificates with weak keys

2014-10-31 Thread Michael Catanzaro
On Fri, 2014-10-31 at 15:00 +0100, Nikos Mavrogiannopoulos wrote:
  We should work with the upstream OpenSSL and the GnuTLS projects,
 and
  motivate them to implement more advanced path building. This would
 be a
  long term project.
 
 Is there some issue with gnutls in F21? As far as I understand it
 should
 work as expected with the certificates removed.

It works as expected in the sense that GnuTLS can no longer handle major
web sites like Amazon and Kickstarter, this being the natural
consequence of removing a root before the certificates issued by it have
expired


signature.asc
Description: This is a digitally signed message part
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: ca-certificates 2014.2.1 will remove several still valid CA certificates with weak keys

2014-10-31 Thread Nikos Mavrogiannopoulos
On Fri, 2014-10-31 at 09:49 -0500, Michael Catanzaro wrote:
   We should work with the upstream OpenSSL and the GnuTLS projects,
  and
   motivate them to implement more advanced path building. This would
  be a
   long term project.
  Is there some issue with gnutls in F21? As far as I understand it
  should
  work as expected with the certificates removed.
 
 It works as expected in the sense that GnuTLS can no longer handle major
 web sites like Amazon and Kickstarter, this being the natural
 consequence of removing a root before the certificates issued by it have
 expired

Are you sure that this is the case with the current package? My F21 can
no longer connect to network to test, but gnutls in it should
reconstruct the chain similarly to what nss does (not very similarly to
be precise but the end result should be the same). If it is not the case
please report it as bug and I'll check it out.

regards,
Nikos


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: ca-certificates 2014.2.1 will remove several still valid CA certificates with weak keys

2014-10-31 Thread Reindl Harald


Am 31.10.2014 um 15:53 schrieb Nikos Mavrogiannopoulos:

On Fri, 2014-10-31 at 09:49 -0500, Michael Catanzaro wrote:

We should work with the upstream OpenSSL and the GnuTLS projects,

and

motivate them to implement more advanced path building. This would

be a

long term project.

Is there some issue with gnutls in F21? As far as I understand it
should
work as expected with the certificates removed.


It works as expected in the sense that GnuTLS can no longer handle major
web sites like Amazon and Kickstarter, this being the natural
consequence of removing a root before the certificates issued by it have
expired


Are you sure that this is the case with the current package? My F21 can
no longer connect to network to test, but gnutls in it should
reconstruct the chain similarly to what nss does (not very similarly to
be precise but the end result should be the same). If it is not the case
please report it as bug and I'll check it out.


the point is that if somebody buys a certificate for 6 years he may have 
a checklist when to change them and if some 3rd party decides to remove 
the CA certificate - game over for users of that 3rd party


from where will you reconstruct the chain?

* webserver a) has a certificate for 6 years
* the issuer is CA b) which you remove
* you make that certificate invalid by intention
* frankly, that certificate still shows i am valid until
* that certificate would have to be replaced
* that won't happen in many cases

you can hope and expect that large internet copmanies are doing that in 
a timely manner, but you *really really* can not expect that from 
anybody out there and you won't notice small websites and other services 
breaking caused by that


the worst case is that somebody with no technical clue installed the 
certificate, becomes very few complaints, verfies that it works 
everywhere and claims Fedora to be broken - and frankly he is just right 
with that claim because nobody but the CA is in the position to revoke 
CA certs which are valid


there is a difference in CA's call back certificates and force there 
users to re-new their certificates or a random OS supplier just removes 
them from the chain - the CA normally knows which certificates are 
issued for which customer with a specific CA certificate - the blind 
butcher making CA certificates invalid don't know


the whole CA trust idea is broken by design, but you won't fix it by 
remove vaild CA certificates *without coordinate that with the affected 
CA and make sure all affected customer certificates are replaced*




signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Michal Schmidt
On 10/31/2014 03:42 PM, Kevin Fenzi wrote:
 On Fri, 31 Oct 2014 14:01:12 +0100
 Lennart Poettering mzerq...@0pointer.de wrote:
 
 So the problem appears to be that gssproxy.service been ordered before
 remote-fs-pre.target. That target is ordered before
 basic.target. However gssproxy.service also is ordered after
 basic.target (simply because all services by default are ordered
 before basic.target, unless they explicitly specify
 DefaultDependencies=no), hence there's an ordering cycle.

 Most likely some NFS maintainers tried to move gss-proxy.service into
 the early boot, and didn't set DefaultDependencies=no.

 That said, services running in early boot must be written in a
 specific style (i.e. not assume /var to be around, and suchlike), I
 do wonder if gssproxy is ready for that.

 Anyway, long story short: file a bug against the gssproxy package.
 
 I don't think this explains all the problems folks are having with
 systemd-217. 

I wonder if the new ordering dependency between
systemd-journal-flush.service and systemd-tmpfiles-setup.service
(added in 74055aa76 journalctl: add new --flush command and make use
of it in systemd-journal-flush.service) participates in the ordering
cycles.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Suggested Freeze Policy change for Fedora 22+

2014-10-31 Thread Stephen Gallagher
I talked to several people over the last couple days about what we can
do to try to avoid the hero testing treadmill that we've been on
during every Freeze in recent memory (specifically that we're usually
fixing Blocker bugs until the day before the Go/No-Go meeting and that
means that our QA team is pulling all-night test runs basically every
week).

I made the following suggestion to both Adam Williamson and David
Cantrell over the last couple of days and both seemed to think that this
is a reasonable approach (but for different reasons, interestingly).

Beginning with Alpha Freeze in Fedora 22, the policy would be amended to
include the following:
1. As currently, the Go/No-Go meeting must be held on the Thursday
preceding the planned Tuesday of public release.
2. At 1600 UTC on the Monday preceding Go/No-Go, a check of the known
Blocker list must be performed. If there are any blocker bugs that are
not marked as MODIFIED or ON_QA (meaning that they are filed as an
update in Bodhi), then the Go/No-Go meeting that week is canceled (or
converted to a Blocker Bug review) and a slip is *automatic*.
3. Relevant to the above, a Release Candidate compose must be started
immediately after the above blocker review and must complete
successfully by 1300 UTC on Tuesday. Otherwise, the Go/No-Go meeting
that week is canceled  (or converted to a Blocker Bug review) and a slip
is *automatic*.
4. If *new* blockers are discovered (or regressed) between the Monday
blocker review and Thursday Go/No-Go, it is *permissible* for another
compose to be created if the following conditions are met:
 a. The fix is capable of being produced and built quickly.
 b. There is at least 24 hours remaining between the expected completion
of the compose and the Go/No-Go meeting.

The idea here is to ensure that there is a clear engineering deadline in
order to guarantee that the QA team has a reasonable time period in
which to perform validation tests. I think this approach is too risky
this late in the F21 process, which is why I propose this only for
Fedora 22 and later.


signature.asc
Description: This is a digitally signed message part
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Lennart Poettering
On Fri, 31.10.14 16:13, Michal Schmidt (mschm...@redhat.com) wrote:

 On 10/31/2014 03:42 PM, Kevin Fenzi wrote:
  On Fri, 31 Oct 2014 14:01:12 +0100
  Lennart Poettering mzerq...@0pointer.de wrote:
  
  So the problem appears to be that gssproxy.service been ordered before
  remote-fs-pre.target. That target is ordered before
  basic.target. However gssproxy.service also is ordered after
  basic.target (simply because all services by default are ordered
  before basic.target, unless they explicitly specify
  DefaultDependencies=no), hence there's an ordering cycle.
 
  Most likely some NFS maintainers tried to move gss-proxy.service into
  the early boot, and didn't set DefaultDependencies=no.
 
  That said, services running in early boot must be written in a
  specific style (i.e. not assume /var to be around, and suchlike), I
  do wonder if gssproxy is ready for that.
 
  Anyway, long story short: file a bug against the gssproxy package.
  
  I don't think this explains all the problems folks are having with
  systemd-217. 
 
 I wonder if the new ordering dependency between
 systemd-journal-flush.service and systemd-tmpfiles-setup.service
 (added in 74055aa76 journalctl: add new --flush command and make use
 of it in systemd-journal-flush.service) participates in the ordering
 cycles.

Ahh, indeed. It moves remote-fs.target into the early-boot where it
doesn't belong.

My fault.

Will drop the remote-fs.target dep from the flush service.

Thanks for tracking this down.

Lennart

-- 
Lennart Poettering, Red Hat
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: ca-certificates 2014.2.1 will remove several still valid CA certificates with weak keys

2014-10-31 Thread Kai Engert
On Fri, 2014-10-31 at 15:00 +0100, Nikos Mavrogiannopoulos wrote:
  Sorry for my late reply, because I didn't have a good suggestion
  earlier.
  
  We should work with the upstream OpenSSL and the GnuTLS projects, and
  motivate them to implement more advanced path building. This would be a
  long term project.
 
 Is there some issue with gnutls in F21? As far as I understand it should
 work as expected with the certificates removed.

I confirm that using GnuTLS 3.3.9-2.fc21 on Fedora 21 testing, 
with ca-certificates-2014.2.1-1.3.fc21,
and ca-legacy set to disabled,
the command
  gnutls-cli -p443 www.amazon.com
reports a trusted certificate.

That's great, thanks Nikos for fixing it in the newer GnuTLS on Fedora
21!

(Just for the record, using gnutls 3.1.27 on Fedora 20, and a scratch
build of the new ca-certificates package, and set to disabled, the
certificate is still rejected, which I understand is because of the
older GnuTLS version.)

If anyone can still see problems with GnuTLS and the above configuration
(disable) on Fedora 21, please let us know which site has the issue.

This means, the remaining package that needs fixing is OpenSSL.

Thanks
Kai


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Lennart Poettering
On Fri, 31.10.14 16:20, Lennart Poettering (mzerq...@0pointer.de) wrote:

 On Fri, 31.10.14 16:13, Michal Schmidt (mschm...@redhat.com) wrote:
 
  On 10/31/2014 03:42 PM, Kevin Fenzi wrote:
   On Fri, 31 Oct 2014 14:01:12 +0100
   Lennart Poettering mzerq...@0pointer.de wrote:
   
   So the problem appears to be that gssproxy.service been ordered before
   remote-fs-pre.target. That target is ordered before
   basic.target. However gssproxy.service also is ordered after
   basic.target (simply because all services by default are ordered
   before basic.target, unless they explicitly specify
   DefaultDependencies=no), hence there's an ordering cycle.
  
   Most likely some NFS maintainers tried to move gss-proxy.service into
   the early boot, and didn't set DefaultDependencies=no.
  
   That said, services running in early boot must be written in a
   specific style (i.e. not assume /var to be around, and suchlike), I
   do wonder if gssproxy is ready for that.
  
   Anyway, long story short: file a bug against the gssproxy package.
   
   I don't think this explains all the problems folks are having with
   systemd-217. 
  
  I wonder if the new ordering dependency between
  systemd-journal-flush.service and systemd-tmpfiles-setup.service
  (added in 74055aa76 journalctl: add new --flush command and make use
  of it in systemd-journal-flush.service) participates in the ordering
  cycles.
 
 Ahh, indeed. It moves remote-fs.target into the early-boot where it
 doesn't belong.
 
 My fault.
 
 Will drop the remote-fs.target dep from the flush service.
 
 Thanks for tracking this down.

Would be good if somebody who ran into this problem could check if
this change fixes it:

http://cgit.freedesktop.org/systemd/systemd/commit/units/systemd-journal-flush.service.in?id=919699ec301ea507edce4a619141ed22e789ac0d

(the actual commit unfortunately contains an unrelated change to
nspawn, I fucked that up, sorry. Ignore everything but the change to
systemd-journal-flush.service)

Thanks,

Lennart

-- 
Lennart Poettering, Red Hat
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: ca-certificates 2014.2.1 will remove several still valid CA certificates with weak keys

2014-10-31 Thread Nikos Mavrogiannopoulos
On Fri, 2014-10-31 at 16:11 +0100, Reindl Harald wrote:

  Are you sure that this is the case with the current package? My F21 can
  no longer connect to network to test, but gnutls in it should
  reconstruct the chain similarly to what nss does (not very similarly to
  be precise but the end result should be the same). If it is not the case
  please report it as bug and I'll check it out.
 
 the point is that if somebody buys a certificate for 6 years he may have 
 a checklist when to change them and if some 3rd party decides to remove 
 the CA certificate - game over for users of that 3rd party
 
 from where will you reconstruct the chain?
 * webserver a) has a certificate for 6 years
 * the issuer is CA b) which you remove

I'm also not particularly fond of this approach as it adds complexity to
an otherwise very complex protocol. However, in gnutls an alternative
certificate path is calculated if there is a trusted certificate which
has the same name as the issuer of a CA certificate in the path, and it
also has the same key.

This is the particular case that Kai refers to. For example in that
case, a verisign intermediate certificate was removed, and replaced with
a root CA certificate, that has the same DN, and the same key.

regards,
Nikos


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Suggested Freeze Policy change for Fedora 22+

2014-10-31 Thread Bruno Wolff III

On Fri, Oct 31, 2014 at 11:17:39 -0400,
 Stephen Gallagher sgall...@redhat.com wrote:


The idea here is to ensure that there is a clear engineering deadline in
order to guarantee that the QA team has a reasonable time period in
which to perform validation tests. I think this approach is too risky
this late in the F21 process, which is why I propose this only for
Fedora 22 and later.


Are the automatic slips always going to be a full week? While we normally 
slip full week, there have been cases recently where slips of less than a 
week have been contemplated.

--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Kevin Fenzi
On Fri, 31 Oct 2014 16:30:31 +0100
Lennart Poettering mzerq...@0pointer.de wrote:

 On Fri, 31.10.14 16:20, Lennart Poettering (mzerq...@0pointer.de)
 wrote:
 
  On Fri, 31.10.14 16:13, Michal Schmidt (mschm...@redhat.com) wrote:
  
   On 10/31/2014 03:42 PM, Kevin Fenzi wrote:
On Fri, 31 Oct 2014 14:01:12 +0100
Lennart Poettering mzerq...@0pointer.de wrote:

So the problem appears to be that gssproxy.service been
ordered before remote-fs-pre.target. That target is ordered
before basic.target. However gssproxy.service also is ordered
after basic.target (simply because all services by default are
ordered before basic.target, unless they explicitly specify
DefaultDependencies=no), hence there's an ordering cycle.
   
Most likely some NFS maintainers tried to move
gss-proxy.service into the early boot, and didn't set
DefaultDependencies=no.
   
That said, services running in early boot must be written in a
specific style (i.e. not assume /var to be around, and
suchlike), I do wonder if gssproxy is ready for that.
   
Anyway, long story short: file a bug against the gssproxy
package.

I don't think this explains all the problems folks are having
with systemd-217. 
   
   I wonder if the new ordering dependency between
   systemd-journal-flush.service and systemd-tmpfiles-setup.service
   (added in 74055aa76 journalctl: add new --flush command and make
   use of it in systemd-journal-flush.service) participates in the
   ordering cycles.
  
  Ahh, indeed. It moves remote-fs.target into the early-boot where it
  doesn't belong.
  
  My fault.
  
  Will drop the remote-fs.target dep from the flush service.
  
  Thanks for tracking this down.
 
 Would be good if somebody who ran into this problem could check if
 this change fixes it:
 
 http://cgit.freedesktop.org/systemd/systemd/commit/units/systemd-journal-flush.service.in?id=919699ec301ea507edce4a619141ed22e789ac0d
 
 (the actual commit unfortunately contains an unrelated change to
 nspawn, I fucked that up, sorry. Ignore everything but the change to
 systemd-journal-flush.service)

Yep. Seems to fix up the looping here. ;) 

I still see: 

Oct 31 09:42:29 voldemort.scrye.com systemd[1]: Cannot add dependency job for 
unit nfs.target, ignoring: Unit nfs.target failed to load: No such file or 
directory.
Oct 31 09:42:29 voldemort.scrye.com systemd[1]: Cannot add dependency job for 
unit systemd-readahead-replay.service, ignoring: Unit 
systemd-readahead-replay.service failed to load: No such file or directory.
Oct 31 09:42:29 voldemort.scrye.com systemd[1]: Cannot add dependency job for 
unit systemd-readahead-collect.service, ignoring: Unit 
systemd-readahead-collect.service failed to load: No such file or directory.

But those seem cosmetic/unrelated. 

Thanks much for the quick fix!

kevin


signature.asc
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Tomasz Torcz
On Fri, Oct 31, 2014 at 09:46:13AM -0600, Kevin Fenzi wrote:
 
 I still see: 
 
 Oct 31 09:42:29 voldemort.scrye.com systemd[1]: Cannot add dependency job for 
 unit nfs.target, ignoring: Unit nfs.target failed to load: No such file or 
 directory.
 Oct 31 09:42:29 voldemort.scrye.com systemd[1]: Cannot add dependency job for 
 unit systemd-readahead-replay.service, ignoring: Unit 
 systemd-readahead-replay.service failed to load: No such file or directory.
 Oct 31 09:42:29 voldemort.scrye.com systemd[1]: Cannot add dependency job for 
 unit systemd-readahead-collect.service, ignoring: Unit 
 systemd-readahead-collect.service failed to load: No such file or directory.
 
 But those seem cosmetic/unrelated. 

  Readahead was removed from systemd, so if you were using it, you should 
remove stale symlinks.

-- 
Tomasz TorczThere exists no separation between gods and men:
xmpp: zdzich...@chrome.pl   one blends softly casual into the other.

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Lennart Poettering
On Fri, 31.10.14 16:55, Tomasz Torcz (to...@pipebreaker.pl) wrote:

 On Fri, Oct 31, 2014 at 09:46:13AM -0600, Kevin Fenzi wrote:
  
  I still see: 
  
  Oct 31 09:42:29 voldemort.scrye.com systemd[1]: Cannot add dependency job 
  for unit nfs.target, ignoring: Unit nfs.target failed to load: No such file 
  or directory.
  Oct 31 09:42:29 voldemort.scrye.com systemd[1]: Cannot add dependency job 
  for unit systemd-readahead-replay.service, ignoring: Unit 
  systemd-readahead-replay.service failed to load: No such file or directory.
  Oct 31 09:42:29 voldemort.scrye.com systemd[1]: Cannot add dependency job 
  for unit systemd-readahead-collect.service, ignoring: Unit 
  systemd-readahead-collect.service failed to load: No such file or directory.
  
  But those seem cosmetic/unrelated. 
 
   Readahead was removed from systemd, so if you were using it, you should 
 remove stale symlinks.

I figure systemd.rpm is currently missing the right postinst scripts
to remove those automatically on upgrade...

Lennart

-- 
Lennart Poettering, Red Hat
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Igor Gnatenko
Fixes my problem, but black screen instead of gdm
On Oct 31, 2014 7:31 PM, Lennart Poettering mzerq...@0pointer.de wrote:

 On Fri, 31.10.14 16:20, Lennart Poettering (mzerq...@0pointer.de) wrote:

  On Fri, 31.10.14 16:13, Michal Schmidt (mschm...@redhat.com) wrote:
 
   On 10/31/2014 03:42 PM, Kevin Fenzi wrote:
On Fri, 31 Oct 2014 14:01:12 +0100
Lennart Poettering mzerq...@0pointer.de wrote:
   
So the problem appears to be that gssproxy.service been ordered
 before
remote-fs-pre.target. That target is ordered before
basic.target. However gssproxy.service also is ordered after
basic.target (simply because all services by default are ordered
before basic.target, unless they explicitly specify
DefaultDependencies=no), hence there's an ordering cycle.
   
Most likely some NFS maintainers tried to move gss-proxy.service
 into
the early boot, and didn't set DefaultDependencies=no.
   
That said, services running in early boot must be written in a
specific style (i.e. not assume /var to be around, and suchlike), I
do wonder if gssproxy is ready for that.
   
Anyway, long story short: file a bug against the gssproxy package.
   
I don't think this explains all the problems folks are having with
systemd-217.
  
   I wonder if the new ordering dependency between
   systemd-journal-flush.service and systemd-tmpfiles-setup.service
   (added in 74055aa76 journalctl: add new --flush command and make use
   of it in systemd-journal-flush.service) participates in the ordering
   cycles.
 
  Ahh, indeed. It moves remote-fs.target into the early-boot where it
  doesn't belong.
 
  My fault.
 
  Will drop the remote-fs.target dep from the flush service.
 
  Thanks for tracking this down.

 Would be good if somebody who ran into this problem could check if
 this change fixes it:


 http://cgit.freedesktop.org/systemd/systemd/commit/units/systemd-journal-flush.service.in?id=919699ec301ea507edce4a619141ed22e789ac0d

 (the actual commit unfortunately contains an unrelated change to
 nspawn, I fucked that up, sorry. Ignore everything but the change to
 systemd-journal-flush.service)

 Thanks,

 Lennart

 --
 Lennart Poettering, Red Hat
 --
 devel mailing list
 devel@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel
 Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Tomasz Torcz
On Thu, Oct 30, 2014 at 09:47:36PM -0400, Matthew Miller wrote:
 Oct 30 21:39:37 ubik.home.mkmiller.org systemd[1]: Configuration file 
 /usr/lib/systemd/system/auditd.service is marked world-inaccessible. This has 
 no effect as configuration data is accessible via APIs without restrictions. 
 Proceeding anyway.

  Nb. audit maintainer still refuses to fix this bug.
https://bugzilla.redhat.com/show_bug.cgi?id=959483
  
  
-- 
Tomasz TorczThere exists no separation between gods and men:
xmpp: zdzich...@chrome.pl   one blends softly casual into the other.

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Igor Gnatenko
systemd-logind: failed to get session: PID 879 doesnt belong to any known
session
On Oct 31, 2014 7:31 PM, Lennart Poettering mzerq...@0pointer.de wrote:

 On Fri, 31.10.14 16:20, Lennart Poettering (mzerq...@0pointer.de) wrote:

  On Fri, 31.10.14 16:13, Michal Schmidt (mschm...@redhat.com) wrote:
 
   On 10/31/2014 03:42 PM, Kevin Fenzi wrote:
On Fri, 31 Oct 2014 14:01:12 +0100
Lennart Poettering mzerq...@0pointer.de wrote:
   
So the problem appears to be that gssproxy.service been ordered
 before
remote-fs-pre.target. That target is ordered before
basic.target. However gssproxy.service also is ordered after
basic.target (simply because all services by default are ordered
before basic.target, unless they explicitly specify
DefaultDependencies=no), hence there's an ordering cycle.
   
Most likely some NFS maintainers tried to move gss-proxy.service
 into
the early boot, and didn't set DefaultDependencies=no.
   
That said, services running in early boot must be written in a
specific style (i.e. not assume /var to be around, and suchlike), I
do wonder if gssproxy is ready for that.
   
Anyway, long story short: file a bug against the gssproxy package.
   
I don't think this explains all the problems folks are having with
systemd-217.
  
   I wonder if the new ordering dependency between
   systemd-journal-flush.service and systemd-tmpfiles-setup.service
   (added in 74055aa76 journalctl: add new --flush command and make use
   of it in systemd-journal-flush.service) participates in the ordering
   cycles.
 
  Ahh, indeed. It moves remote-fs.target into the early-boot where it
  doesn't belong.
 
  My fault.
 
  Will drop the remote-fs.target dep from the flush service.
 
  Thanks for tracking this down.

 Would be good if somebody who ran into this problem could check if
 this change fixes it:


 http://cgit.freedesktop.org/systemd/systemd/commit/units/systemd-journal-flush.service.in?id=919699ec301ea507edce4a619141ed22e789ac0d

 (the actual commit unfortunately contains an unrelated change to
 nspawn, I fucked that up, sorry. Ignore everything but the change to
 systemd-journal-flush.service)

 Thanks,

 Lennart

 --
 Lennart Poettering, Red Hat
 --
 devel mailing list
 devel@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel
 Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Michal Schmidt
On 10/31/2014 04:57 PM, Igor Gnatenko wrote:
 systemd-logind: failed to get session: PID 879 doesnt belong to any known 
 session

That's not necessarily related to the problem. I have this message in
the log even when gdm works fine.

Michal

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Kevin Fenzi
On Fri, 31 Oct 2014 20:04:24 +0400
Igor Gnatenko i.gnatenko.br...@gmail.com wrote:

 Probably. How to debug?
 On Oct 31, 2014 8:01 PM, Michal Schmidt mschm...@redhat.com wrote:
 
  On 10/31/2014 04:57 PM, Igor Gnatenko wrote:
   systemd-logind: failed to get session: PID 879 doesnt belong to
   any
  known session
 
  That's not necessarily related to the problem. I have this message
  in the log even when gdm works fine.
 
  Michal

One possible reason for this:

what version of mutter do you have? You might have the new 3.15 one,
but the older gnome-shell. Either downgrade mutter or upgrade
gnome-shell from the one just built in koji. 

They would have both gone out in today's rawhide, but there was a build
failure on the gnome-shell build. 

kevin


signature.asc
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Igor Gnatenko
Probably. How to debug?
On Oct 31, 2014 8:01 PM, Michal Schmidt mschm...@redhat.com wrote:

 On 10/31/2014 04:57 PM, Igor Gnatenko wrote:
  systemd-logind: failed to get session: PID 879 doesnt belong to any
 known session

 That's not necessarily related to the problem. I have this message in
 the log even when gdm works fine.

 Michal


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: RHEL 6.6 MPI mess

2014-10-31 Thread Dave Love
Orion Poplawski or...@cora.nwra.com writes:

 Just a quick note - this discussion belongs on the EPEL mailing list.

Apologies.  I don't remember seeing that when I read the instructions to
try to get packages into EPEL.  I'll check whether it's there/obvious
when I have a chance.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Igor Gnatenko
I have all packages from koji.
On Oct 31, 2014 8:10 PM, Kevin Fenzi ke...@scrye.com wrote:

 On Fri, 31 Oct 2014 20:04:24 +0400
 Igor Gnatenko i.gnatenko.br...@gmail.com wrote:

  Probably. How to debug?
  On Oct 31, 2014 8:01 PM, Michal Schmidt mschm...@redhat.com wrote:
 
   On 10/31/2014 04:57 PM, Igor Gnatenko wrote:
systemd-logind: failed to get session: PID 879 doesnt belong to
any
   known session
  
   That's not necessarily related to the problem. I have this message
   in the log even when gdm works fine.
  
   Michal

 One possible reason for this:

 what version of mutter do you have? You might have the new 3.15 one,
 but the older gnome-shell. Either downgrade mutter or upgrade
 gnome-shell from the one just built in koji.

 They would have both gone out in today's rawhide, but there was a build
 failure on the gnome-shell build.

 kevin

 --
 devel mailing list
 devel@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel
 Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Requiring all files in /usr to be world-readable?

2014-10-31 Thread Andrew Lutomirski
I filed an FPC ticket: https://fedorahosted.org/fpc/ticket/467

Thoughts?
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: ca-certificates 2014.2.1 will remove several still valid CA certificates with weak keys

2014-10-31 Thread Michael Catanzaro
On Fri, 2014-10-31 at 15:53 +0100, Nikos Mavrogiannopoulos wrote:
 Are you sure that this is the case with the current package? My F21
 can
 no longer connect to network to test, but gnutls in it should
 reconstruct the chain similarly to what nss does (not very similarly
 to
 be precise but the end result should be the same). If it is not the
 case
 please report it as bug and I'll check it out.

No, I haven't tested this in a month or two. If there's been recent work
on NSS compatibility, that's awesome.

Complicating the matter is that these pages sometimes work and sometimes
don't (CDN magic I suppose) so we really have to rely on bug reports to
know if there's breakage, and we won't get those unless the compat
certificates are removed (which I certainly don't suggest).

Thanks,

Michael


signature.asc
Description: This is a digitally signed message part
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Requiring all files in /usr to be world-readable?

2014-10-31 Thread Chris Adams
Once upon a time, Andrew Lutomirski l...@mit.edu said:
 I filed an FPC ticket: https://fedorahosted.org/fpc/ticket/467
 
 Thoughts?

I've filed individual bugs in the past.  IMHO every file that is
RPM-installed that is not marked config should be world-readable
(regardless of location).  There is no reason for any other permissions.
-- 
Chris Adams li...@cmadams.net
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Self Introduction: Alexander Ploumistos

2014-10-31 Thread Alexander Ploumistos
Hello everyone,

I've decided to join the package maintainers and I would like to introduce
myself.

I have been a linux user since 2001 and a Red Hat/Fedora user since 2003.
My main systems run on Fedora (of course) and Gentoo. I have a background
in chemistry, particularly molecular modeling and for the past decade I
have been working as a general purpose IT guy and part-time
web-developer. I build systems, I design and deploy SOHO networks, I do
some light pen-testing and provide tech support. I have experience coding
in Fortran, Perl, PHP, Python, shell scripts, (X)HTML/CSS, I have worked
with several CMSs -though in the past few years mostly with Joomla- and I
have built some customized versions of embedded distros such as OpenWRT and
other device-related software. During the past decade I have done
alpha/beta/QA testing for a number of projects (most of them FLOSS) and I
have provided translations and bug reports for others.

I would like to give back something more than bug reports and translations
and also improve my coding skills along the way. I have a couple of
programs that I would like to maintain, but for the moment there remains an
issue with their licenses.

There is also a patched version of libatasmart, that takes care of an issue
with several older Western Digital hard drives, that is awaiting review (
https://bugzilla.redhat.com/show_bug.cgi?id=1157150) and I would really
appreciate it if someone could take the time to look into that.

Best Regards
Alexander
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: ca-certificates 2014.2.1 will remove several still valid CA certificates with weak keys

2014-10-31 Thread Michael Catanzaro
On Fri, 2014-10-31 at 16:28 +0100, Kai Engert wrote:
 I confirm that using GnuTLS 3.3.9-2.fc21 on Fedora 21 testing, 
 with ca-certificates-2014.2.1-1.3.fc21,
 and ca-legacy set to disabled,
 the command
   gnutls-cli -p443 www.amazon.com
 reports a trusted certificate.

This isn't a recent change, see [1]. I presume Amazon is most likely
still broken in Epiphany (when these roots are removed) as there's been
no action on [1], where we decided that gnutls-cli accepted
www.amazon.com because it uses certs if they're valid for either email
or TLS, whereas GLib only uses certs if they're valid for TLS.

Note that due to CDN magic, sites like Amazon load lots of subresources
like images and CSS over connections using unrelated certs, so a more
reliable test is to actually open the web page in a browser.

P.S. To both Kai and Nikos: thanks for all your effort on this matter. A
couple months ago I was quite worried, but now I expect things will turn
out fine.

[1] https://bugzilla.redhat.com/show_bug.cgi?id=1134602


signature.asc
Description: This is a digitally signed message part
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Requiring all files in /usr to be world-readable?

2014-10-31 Thread Miloslav Trmač
- Original Message -
 I filed an FPC ticket: https://fedorahosted.org/fpc/ticket/467
 
 Thoughts?

My intuition is that if an application needs _everything_ in /usr to be 
readable then it is likely broken.  Something being placed in /usr does _not_ 
imply that it is supposed to be used by everyone.   An administrator can come 
and change the permissions at any time, and the packaging guideline would not 
affect anything not included in Fedora-distributed RPMs.  And if we look only 
at the cases that would be helped by the proposed guideline, i.e. only 
depending on Fedora RPM-distributed files (but not being particular about what 
the purpose of kind of file this is), the application would probably be better 
off just opening and reading the RPMs from repos directly instead of reusing 
whatever local damage could have been done to the partition.

Perhaps there are useful subsets of files in /usr where mandating this would be 
useful; but all of /usr is seems like an unnecessary overreach.

(And to the specific examples brought up: No opinion on systemd services; 
making setuid binaries not world-readable has a _definite_ benefit when prelink 
is set up, OTOH that is no longer a default.)
Mirek
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Requiring all files in /usr to be world-readable?

2014-10-31 Thread Andrew Lutomirski
On Fri, Oct 31, 2014 at 10:59 AM, Miloslav Trmač m...@redhat.com wrote:
 - Original Message -
 I filed an FPC ticket: https://fedorahosted.org/fpc/ticket/467

 Thoughts?

 My intuition is that if an application needs _everything_ in /usr to be 
 readable then it is likely broken.  Something being placed in /usr does _not_ 
 imply that it is supposed to be used by everyone.   An administrator can come 
 and change the permissions at any time, and the packaging guideline would not 
 affect anything not included in Fedora-distributed RPMs.  And if we look only 
 at the cases that would be helped by the proposed guideline, i.e. only 
 depending on Fedora RPM-distributed files (but not being particular about 
 what the purpose of kind of file this is), the application would probably be 
 better off just opening and reading the RPMs from repos directly instead of 
 reusing whatever local damage could have been done to the partition.

I'm fine with having various user tools that want to read from /usr
stop working as non-root if the admin changes the permissions.  But I
think they should work by default.


 Perhaps there are useful subsets of files in /usr where mandating this would 
 be useful; but all of /usr is seems like an unnecessary overreach.

That's why I think that individual exceptions should be allowed.  I
don't yet know of a case where I would agree that an exception would
be a good idea, but I don't want to rule it out.


 (And to the specific examples brought up: No opinion on systemd services; 
 making setuid binaries not world-readable has a _definite_ benefit when 
 prelink is set up, OTOH that is no longer a default.)

I certainly agree with the prelink issue, but I think that that issue
is obsolete.  There's already a guideline stating that suid binaries
MUST be PIE, and the guideline claims (hopefully correctly) that
prelink doesn't work for PIE executables, so there shouldn't be any
prelinked suid binaries in the first place.

--Andy
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Suggested Freeze Policy change for Fedora 22+

2014-10-31 Thread Stephen Gallagher



On Fri, 2014-10-31 at 10:34 -0500, Bruno Wolff III wrote:
 On Fri, Oct 31, 2014 at 11:17:39 -0400,
   Stephen Gallagher sgall...@redhat.com wrote:
 
 The idea here is to ensure that there is a clear engineering deadline in
 order to guarantee that the QA team has a reasonable time period in
 which to perform validation tests. I think this approach is too risky
 this late in the F21 process, which is why I propose this only for
 Fedora 22 and later.
 
 Are the automatic slips always going to be a full week? While we normally 
 slip full week, there have been cases recently where slips of less than a 
 week have been contemplated.

Well, we learned during those questions that it's a matter of
coordination with the mirrors. They expect to have our master trees
prepared at certain times or they can't be mirrored out in time for the
Tuesday launches. So really, we need to keep to the same schedule
wherever possible.


signature.asc
Description: This is a digitally signed message part
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: ca-certificates 2014.2.1 will remove several still valid CA certificates with weak keys

2014-10-31 Thread Nikos Mavrogiannopoulos
- Original Message -
 This isn't a recent change, see [1]. I presume Amazon is most likely
 still broken in Epiphany (when these roots are removed) as there's been
 no action on [1], where we decided that gnutls-cli accepted
 www.amazon.com because it uses certs if they're valid for either email
 or TLS, whereas GLib only uses certs if they're valid for TLS.
 Note that due to CDN magic, sites like Amazon load lots of subresources
 like images and CSS over connections using unrelated certs, so a more
 reliable test is to actually open the web page in a browser.
 [1] https://bugzilla.redhat.com/show_bug.cgi?id=1134602

I've reassigned the original bug to gnutls and closed with next release (F21). 
A fix for F20 is very hard to occur and would most probably introduce 
unncessary issues. If anything remains, feel free to reopen with more 
information. 

regards,
Nikos
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Self Introduction: Alexander Ploumistos

2014-10-31 Thread Orion Poplawski
On 10/31/2014 11:28 AM, Alexander Ploumistos wrote:
 Hello everyone,
 
 I've decided to join the package maintainers and I would like to introduce 
 myself.
...
 There is also a patched version of libatasmart, that takes care of an issue
 with several older Western Digital hard drives, that is awaiting review
 (https://bugzilla.redhat.com/show_bug.cgi?id=1157150) and I would really
 appreciate it if someone could take the time to look into that.
 
 Best Regards
 Alexander

I've closed that NOTABUG - we already have libatasmart in Fedora.  Although
perhaps we need some new maintainers, even upstream.   Lennart - comments?

https://bugzilla.redhat.com/show_bug.cgi?id=921430
https://bugs.freedesktop.org/show_bug.cgi?id=61998

-- 
Orion Poplawski
Technical Manager 303-415-9701 x222
NWRA, Boulder/CoRA Office FAX: 303-415-9702
3380 Mitchell Lane   or...@nwra.com
Boulder, CO 80301   http://www.nwra.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Self Introduction: Alexander Ploumistos

2014-10-31 Thread Alexander Ploumistos
So am I allowed to submit it to bodhi, or does it still need to be approved
beforehand? I'm sorry for the mix-up, but it wasn't clear in the wiki.

2014-10-31 22:09 GMT+02:00 Orion Poplawski or...@cora.nwra.com:

 On 10/31/2014 11:28 AM, Alexander Ploumistos wrote:
  Hello everyone,
 
  I've decided to join the package maintainers and I would like to
 introduce myself.
 ...
  There is also a patched version of libatasmart, that takes care of an
 issue
  with several older Western Digital hard drives, that is awaiting review
  (https://bugzilla.redhat.com/show_bug.cgi?id=1157150) and I would really
  appreciate it if someone could take the time to look into that.
 
  Best Regards
  Alexander

 I've closed that NOTABUG - we already have libatasmart in Fedora.  Although
 perhaps we need some new maintainers, even upstream.   Lennart - comments?

 https://bugzilla.redhat.com/show_bug.cgi?id=921430
 https://bugs.freedesktop.org/show_bug.cgi?id=61998

 --
 Orion Poplawski
 Technical Manager 303-415-9701 x222
 NWRA, Boulder/CoRA Office FAX: 303-415-9702
 3380 Mitchell Lane   or...@nwra.com
 Boulder, CO 80301   http://www.nwra.com
 --
 devel mailing list
 devel@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel
 Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

5tFTW: Fedora Beta, Council Elections, Strategic Planning, Outreach Committee, and FUDCon Reports (2014-10-31)

2014-10-31 Thread Matthew Miller
Reposted from http://fedoramagazine.org/5tftw-2014-10-31/.

Fedora is a big project, and it’s hard to keep up with everything that
goes on. This series highlights interesting happenings in five
different areas every week. It isn’t comprehensive news coverage — just
quick summaries with links to each. Here are the five things for
October 31st, 2014:


Fedora Beta due Next Week
-

I’ll keep this item short: Fedora 21 Beta is Go, and will be available
Tuesday, November 4th. Next week, we’ll do an all-beta 5tFTW.

This puts the final release target at December 9th. As always, these
targets are more like guidelines than deadlines, but as we are verging
on the holiday season we are going to make extra effort to avoid
further adjustment.

  * 
https://lists.fedoraproject.org/pipermail/devel-announce/2014-October/001455.html
  * http://fedoraproject.org/wiki/Releases/21/Schedule
  * https://www.youtube.com/watch?v=6GMkuPiIZ2k


Council Update and Elections


The Fedora Council — our new top-level leadership body — includes
two of seats appointed by elected committees and two seats elected by
the Fedora Contributor community at large. The appointed seats covering
Fedora Engineering and Fedora Outreach (more on that below) are now
filled, by Josh Boyer and Christoph Wickert respectively.
(Congratulations and thank you to Josh and Christoph!) Now it’s time to
fill the elected seats — see the schedule announcement for details.

Quick summary: nomination period next week; “campaign” week after that,
and finally a week for community voting after that. The Council will
take over from the Fedora Project Board when this is complete.

  * https://fedoraproject.org/wiki/Council
  * https://lists.fedoraproject.org/pipermail/announce/2014-October/003236.html
  * http://fedoraproject.org/wiki/Board


Fedora Objectives
-

If you haven’t seen it already, I would like everyone who cares about
what Fedora does and where the project is going to take a look at my
recent Fedora Magazine article about Fedora objectives — why, how, and
eventually what.

As I mentioned a few weeks ago, high-level strategy discussions can
feel disconnected and pointless. This is a process by which we can
actually connect them into what we’re doing in a meaningful way, and by
doing so increase the impact of our actions. Take a look, and take part
in upcoming discussions on the public board discuss list.

  * http://fedoramagazine.org/lets-talk-about-fedora-project-objectives/
  * https://lists.fedoraproject.org/pipermail/announce/2014-October/003235.html
  * https://admin.fedoraproject.org/mailman/listinfo/board-discuss


Fedora Outreach Steering Committee?
---

Fedora has long had two high-level elected steering committees, FESCo,
the Fedora Engineering Steering Committee, and FAmSCo, the Fedora
Ambassadors Steering Committee. The meritocratic representative
positions on the Council are appointed by these committees.

This is straightforward for the relatively wide-reaching FESCo, but the
seat appointed by FAmSCo is actually intended to represent a much
broader section of the project than ambassadors alone. This lead to a
discussion about creating a new Outreach steering committee, tying
together and coordinating efforts of Ambassadors, Marketing,
Brand/Design, some aspects of the product Working Groups, Docs, various
support channels — overall, all the parts of the project which are
outward looking rather than focused on building the distro and
infrastructure.

Since FAmSCo has successfully delegated a lot of responsibility to
regional ambassadors committees, and since the new Council will work on
the high level community budget, this new body would make FAmSCo
obsolete — so we’re not just piling on yet more committees, here!

If you’re interested, join the new Fedora Outreach mailing list and
let’s start building this!

  * https://fedoraproject.org/wiki/Fedora_Engineering_Steering_Committee
  * http://fedoraproject.org/wiki/Fedora_Ambassadors_Steering_Committee
  * https://lists.fedoraproject.org/mailman/listinfo/outreach


Reports from FUDCon Managua
---

As promised last week, some updates from FUDCon Managua, our
user-and-developer conference held this year in Nicaragua. Check out
reports from:

-   Alejandro Prez (Lots of pictures and people!)
-   William Moreno Reyes (In Spanish *and* English!)
-   Rino Rondan (All in Spanish, although the photographs are
multilingual)
-   Robert Mayr (Just “day 0″ so far; check back for more updates
from robyduck!)
-   Kiara Navarro (In Spanish with a lot of details, and again a lot
of photos — and also, there’s part 2 and part 3)
-   Abdel G. Martínez L. (Particularly, highlights positive impact
of the event on project contribution — nice!)
-   Daniel Bruno (In English)

Thanks to everyone who made these reports, and thanks to the FUDCon
LATAM organizers, and 

Re: possibly problem with rawhide (systemd-217?): Found ordering cycle on basic.target/start

2014-10-31 Thread Igor Gnatenko
yeah. gnome-shell 3.15.1 fixes problem.

On Fri, Oct 31, 2014 at 7:09 PM, Kevin Fenzi ke...@scrye.com wrote:
 On Fri, 31 Oct 2014 20:04:24 +0400
 Igor Gnatenko i.gnatenko.br...@gmail.com wrote:

 Probably. How to debug?
 On Oct 31, 2014 8:01 PM, Michal Schmidt mschm...@redhat.com wrote:

  On 10/31/2014 04:57 PM, Igor Gnatenko wrote:
   systemd-logind: failed to get session: PID 879 doesnt belong to
   any
  known session
 
  That's not necessarily related to the problem. I have this message
  in the log even when gdm works fine.
 
  Michal

 One possible reason for this:

 what version of mutter do you have? You might have the new 3.15 one,
 but the older gnome-shell. Either downgrade mutter or upgrade
 gnome-shell from the one just built in koji.

 They would have both gone out in today's rawhide, but there was a build
 failure on the gnome-shell build.

 kevin

 --
 devel mailing list
 devel@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel
 Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct



-- 
-Igor Gnatenko
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

[Test-Announce] Significant bug in fedup to Fedora 21, do not use it right now

2014-10-31 Thread Adam Williamson
There's a major bug with fedup to Fedora 21 right at the moment,
discovered this morning by Robin Lee (thanks Robin). We should be able
to deal with it some way or another in time for Beta release day, but
for right now it's not a very good idea *at all* to try and upgrade any
system you care about to F21 with fedup. (Of course, it's never a good
idea to upgrade to a pre-release without a recovery plan!)

https://www.happyassassin.net/2014/10/31/psa-dont-fedup-to-fedora-21-right-now/
https://bugzilla.redhat.com/show_bug.cgi?id=1159292

Of course, if you want to help out with solving this, it'll be a great
help. It'd be good to have folks confirm that the bug happens any time
the 'install updated packages' boot takes more than 15 minutes, and
maybe that the scratch builds I've posted in the bug -
https://bugzilla.redhat.com/show_bug.cgi?id=1159292#c18 - solve it (the
final fix may be different, but that bodge should at least illustrate
that the problem is really what we think it is, if it works).
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net

___
test-announce mailing list
test-annou...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/test-announce
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Suggested Freeze Policy change for Fedora 22+

2014-10-31 Thread Bruno Wolff III

On Fri, Oct 31, 2014 at 14:44:06 -0400,
 Stephen Gallagher sgall...@redhat.com wrote:


Well, we learned during those questions that it's a matter of
coordination with the mirrors. They expect to have our master trees
prepared at certain times or they can't be mirrored out in time for the
Tuesday launches. So really, we need to keep to the same schedule
wherever possible.


I was really questioning that the policy didn't say how long the slip is, 
rather than what the amount is. Though my opinion is that it is better 
to always slip a week as the one or two day slips will just encourage 
more of what you are trying to avoid.


I think there is real risk of burn out in the QA volunteers, with not only 
the quick turn around commonly needed for testing right before release, 
but also with the really long blocker meetings leading up to that. 
--

devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

File Email-Sender-1.300016.tar.gz uploaded to lookaside cache by jplesnik

2014-10-31 Thread Jitka Plesnikova
A file has been added to the lookaside cache for perl-Email-Sender:

758b2dcb2ca1dfb6f9c94ddf94aa0a57  Email-Sender-1.300016.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Email-Sender] 1.300016 bump

2014-10-31 Thread Jitka Plesnikova
commit 03f7b37cfa4599bc6add291982c863259a1e7dfb
Author: Jitka Plesnikova jples...@redhat.com
Date:   Fri Oct 31 11:21:50 2014 +0100

1.300016 bump

 .gitignore |1 +
 perl-Email-Sender.spec |   39 ---
 sources|2 +-
 3 files changed, 30 insertions(+), 12 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index a9b9972..fec99a6 100644
--- a/.gitignore
+++ b/.gitignore
@@ -8,3 +8,4 @@ Email-Sender-0.101760.tar.gz
 /Email-Sender-0.110005.tar.gz
 /Email-Sender-0.120001.tar.gz
 /Email-Sender-0.120002.tar.gz
+/Email-Sender-1.300016.tar.gz
diff --git a/perl-Email-Sender.spec b/perl-Email-Sender.spec
index e96395e..4e5d69e 100644
--- a/perl-Email-Sender.spec
+++ b/perl-Email-Sender.spec
@@ -1,6 +1,6 @@
 Name:   perl-Email-Sender
-Version:0.120002
-Release:6%{?dist}
+Version:1.300016
+Release:1%{?dist}
 Summary:A library for sending email
 License:GPL+ or Artistic
 Group:  Development/Libraries
@@ -8,35 +8,49 @@ URL:http://search.cpan.org/dist/Email-Sender/
 Source0:
http://www.cpan.org/authors/id/R/RJ/RJBS/Email-Sender-%{version}.tar.gz
 BuildArch:  noarch
 BuildRequires:  perl(Capture::Tiny) = 0.08
+BuildRequires:  perl(Carp)
 BuildRequires:  perl(Config)
 BuildRequires:  perl(Cwd)
 BuildRequires:  perl(Data::Dumper)
-BuildRequires:  perl(Email::Abstract) = 3
+BuildRequires:  perl(Email::Abstract) = 3.006
 BuildRequires:  perl(Email::Address)
 BuildRequires:  perl(Email::Simple) = 1.998
+BuildRequires:  perl(Errno)
 BuildRequires:  perl(Exporter)
-BuildRequires:  perl(ExtUtils::MakeMaker) = 6.11
+BuildRequires:  perl(ExtUtils::MakeMaker)
+BuildRequires:  perl(Fcntl)
+BuildRequires:  perl(File::Basename)
+BuildRequires:  perl(File::Path) = 2.06
+BuildRequires:  perl(File::Spec)
 BuildRequires:  perl(File::Temp)
+BuildRequires:  perl(IO::File)
+BuildRequires:  perl(IO::Handle)
 BuildRequires:  perl(JSON)
+BuildRequires:  perl(lib)
 BuildRequires:  perl(List::MoreUtils)
-BuildRequires:  perl(Moose) = 0.70
-BuildRequires:  perl(Moose::Role)
+BuildRequires:  perl(Module::Runtime)
+BuildRequires:  perl(Moo) = 1.08
+BuildRequires:  perl(Moo::Role)
+BuildRequires:  perl(MooX::Types::MooseLike::Base)
 BuildRequires:  perl(Net::SMTP)
 BuildRequires:  perl(Net::SMTP::SSL)
 BuildRequires:  perl(Pod::Coverage::TrustPod)
+BuildRequires:  perl(Scalar::Util)
+BuildRequires:  perl(strict)
 BuildRequires:  perl(Sub::Exporter)
 BuildRequires:  perl(Sub::Exporter::Util)
 BuildRequires:  perl(Sub::Override)
+BuildRequires:  perl(Sys::Hostname)
 BuildRequires:  perl(Test::MinimumVersion)
 BuildRequires:  perl(Test::MockObject)
 BuildRequires:  perl(Test::More) = 0.96
-BuildRequires:  perl(Test::Pod)
-BuildRequires:  perl(Test::Pod::Coverage)
-BuildRequires:  perl(Throwable::Error) = 0.100090
+BuildRequires:  perl(Test::Pod) = 1.41
+BuildRequires:  perl(Throwable::Error) = 0.23
 BuildRequires:  perl(Try::Tiny)
-Requires:   perl(Email::Abstract) = 3
+BuildRequires:  perl(warnings)
+Requires:   perl(Email::Abstract) = 3.006
 Requires:   perl(Net::SMTP::SSL)
-Requires:   perl(Throwable::Error) = 0.100090
+Requires:   perl(Throwable::Error) = 0.23
 Requires:   perl(:MODULE_COMPAT_%(eval `%{__perl} -V:version`; echo 
$version))
 
 %{?perl_default_filter}
@@ -72,6 +86,9 @@ RELEASE_TESTING=1 make test
 %{_mandir}/man3/*
 
 %changelog
+* Fri Oct 31 2014 Jitka Plesnikova jples...@redhat.com - 1.300016-1
+- 1.300016 bump
+
 * Mon Sep 01 2014 Jitka Plesnikova jples...@redhat.com - 0.120002-6
 - Perl 5.20 rebuild
 
diff --git a/sources b/sources
index f5cf315..a1e465e 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-8671410f17dc316d925bbcdeb97af9c6  Email-Sender-0.120002.tar.gz
+758b2dcb2ca1dfb6f9c94ddf94aa0a57  Email-Sender-1.300016.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

Broken dependencies: perl-Qt

2014-10-31 Thread buildsys


perl-Qt has broken dependencies in the rawhide tree:
On x86_64:
perl-Qt-0.96.0-11.fc22.x86_64 requires perl(:MODULE_COMPAT_5.18.2)
perl-Qt-0.96.0-11.fc22.x86_64 requires libperl.so.5.18()(64bit)
On i386:
perl-Qt-0.96.0-11.fc22.i686 requires perl(:MODULE_COMPAT_5.18.2)
perl-Qt-0.96.0-11.fc22.i686 requires libperl.so.5.18
On armhfp:
perl-Qt-0.96.0-11.fc22.armv7hl requires perl(:MODULE_COMPAT_5.18.2)
perl-Qt-0.96.0-11.fc22.armv7hl requires libperl.so.5.18
Please resolve this as soon as possible.


--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Throwable/f21] 0.200012 bump

2014-10-31 Thread Jitka Plesnikova
commit b222b8a852b633ba269b7641f44a2bdd87a8fe89
Author: Jitka Plesnikova jples...@redhat.com
Date:   Fri Oct 31 12:16:00 2014 +0100

0.200012 bump

 .gitignore  |1 +
 perl-Throwable.spec |   34 +++---
 sources |2 +-
 3 files changed, 25 insertions(+), 12 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index dcf69b7..14c355a 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,2 +1,3 @@
 Throwable-0.101110.tar.gz
 Throwable-0.102080.tar.gz
+/Throwable-0.200012.tar.gz
diff --git a/perl-Throwable.spec b/perl-Throwable.spec
index 4da71c7..c00c5a4 100644
--- a/perl-Throwable.spec
+++ b/perl-Throwable.spec
@@ -1,22 +1,31 @@
 Name:   perl-Throwable
-Version:0.102080
-Release:12%{?dist}
+Version:0.200012
+Release:1%{?dist}
 Summary:Role for classes that can be thrown
 License:GPL+ or Artistic
 Group:  Development/Libraries
 URL:http://search.cpan.org/dist/Throwable/
 Source0:
http://www.cpan.org/authors/id/R/RJ/RJBS/Throwable-%{version}.tar.gz
 BuildArch:  noarch
-BuildRequires:  perl(Devel::StackTrace) = 1.21
+BuildRequires:  perl
 BuildRequires:  perl(ExtUtils::MakeMaker) = 6.11
-BuildRequires:  perl(Moose) = 0.87
-BuildRequires:  perl(Test::More)
-BuildRequires:  perl(Test::Pod)
-BuildRequires:  perl(Test::Pod::Coverage)
-BuildRequires:  perl(Pod::Coverage::TrustPod)
-
-Requires:   perl(Devel::StackTrace) = 1.21
+BuildRequires:  perl(strict)
+BuildRequires:  perl(warnings)
+# Run-time
+BuildRequires:  perl(Carp)
+BuildRequires:  perl(Devel::StackTrace) = 1.32
+BuildRequires:  perl(Module::Runtime) = 0.002
+BuildRequires:  perl(Moo) = 1.01
+BuildRequires:  perl(Moo::Role)
+BuildRequires:  perl(overload)
+BuildRequires:  perl(Scalar::Util)
+BuildRequires:  perl(Sub::Quote)
+# Tests
+BuildRequires:  perl(base)
+BuildRequires:  perl(Test::More) = 0.96
 Requires:   perl(:MODULE_COMPAT_%(eval `%{__perl} -V:version`; echo 
$version))
+Requires:   perl(Devel::StackTrace) = 1.32
+Requires:   perl(overload)
 
 %{?perl_default_filter}
 
@@ -41,7 +50,7 @@ find $RPM_BUILD_ROOT -depth -type d -exec rmdir {} 
2/dev/null \;
 %{_fixperms} $RPM_BUILD_ROOT/*
 
 %check
-RELEASE_TESTING=1 make test
+make test
 
 %files
 %defattr(-,root,root,-)
@@ -50,6 +59,9 @@ RELEASE_TESTING=1 make test
 %{_mandir}/man3/*
 
 %changelog
+* Fri Oct 31 2014 Jitka Plesnikova jples...@redhat.com - 0.200012-1
+- 0.200012 bump
+
 * Sat Jun 07 2014 Fedora Release Engineering rel-...@lists.fedoraproject.org 
- 0.102080-12
 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
 
diff --git a/sources b/sources
index 46fbe41..a510396 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-f048e133a92eab91a1975001d2a55a38  Throwable-0.102080.tar.gz
+458e43d3ec7a816720d5f6aa614b46e1  Throwable-0.200012.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

Re: FESCo to orphan iarnell's packages

2014-10-31 Thread Petr Šabata
On Thu, Oct 30, 2014 at 03:15:00PM +0100, Petr Pisar wrote:
 Hello,
 
 as you could read in last (2014-10-29) FESCo meeting minutes
 https://lists.fedoraproject.org/pipermail/devel/2014-October/203801.html,
 packages under Iain Arnell's maintence
 https://admin.fedoraproject.org/pkgdb/packager/iarnell/ will be orphaned
 because Iain is not functional anymore.
 
 It's about four hunders mostly Perl packages. Please feel free to take care
 about them after dgilmore announces the act on the Fedora devel mailing list.
 
 -- Petr

I'm willing to maintain most of them.

I hope it won't be just me, however :)

P


pgp__7ngGLft6.pgp
Description: PGP signature
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Throwable/f20] 0.200012 bump

2014-10-31 Thread Jitka Plesnikova
commit 2760eda5d4a2e8f522756e180dd71bab529605d4
Author: Jitka Plesnikova jples...@redhat.com
Date:   Fri Oct 31 12:45:45 2014 +0100

0.200012 bump

 .gitignore  |1 +
 perl-Throwable.spec |   34 +++---
 sources |2 +-
 3 files changed, 25 insertions(+), 12 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index dcf69b7..14c355a 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,2 +1,3 @@
 Throwable-0.101110.tar.gz
 Throwable-0.102080.tar.gz
+/Throwable-0.200012.tar.gz
diff --git a/perl-Throwable.spec b/perl-Throwable.spec
index bbeca7c..a40d804 100644
--- a/perl-Throwable.spec
+++ b/perl-Throwable.spec
@@ -1,22 +1,31 @@
 Name:   perl-Throwable
-Version:0.102080
-Release:11%{?dist}
+Version:0.200012
+Release:1%{?dist}
 Summary:Role for classes that can be thrown
 License:GPL+ or Artistic
 Group:  Development/Libraries
 URL:http://search.cpan.org/dist/Throwable/
 Source0:
http://www.cpan.org/authors/id/R/RJ/RJBS/Throwable-%{version}.tar.gz
 BuildArch:  noarch
-BuildRequires:  perl(Devel::StackTrace) = 1.21
+BuildRequires:  perl
 BuildRequires:  perl(ExtUtils::MakeMaker) = 6.11
-BuildRequires:  perl(Moose) = 0.87
-BuildRequires:  perl(Test::More)
-BuildRequires:  perl(Test::Pod)
-BuildRequires:  perl(Test::Pod::Coverage)
-BuildRequires:  perl(Pod::Coverage::TrustPod)
-
-Requires:   perl(Devel::StackTrace) = 1.21
+BuildRequires:  perl(strict)
+BuildRequires:  perl(warnings)
+# Run-time
+BuildRequires:  perl(Carp)
+BuildRequires:  perl(Devel::StackTrace) = 1.32
+BuildRequires:  perl(Module::Runtime) = 0.002
+BuildRequires:  perl(Moo) = 1.01
+BuildRequires:  perl(Moo::Role)
+BuildRequires:  perl(overload)
+BuildRequires:  perl(Scalar::Util)
+BuildRequires:  perl(Sub::Quote)
+# Tests
+BuildRequires:  perl(base)
+BuildRequires:  perl(Test::More) = 0.96
 Requires:   perl(:MODULE_COMPAT_%(eval `%{__perl} -V:version`; echo 
$version))
+Requires:   perl(Devel::StackTrace) = 1.32
+Requires:   perl(overload)
 
 %{?perl_default_filter}
 
@@ -41,7 +50,7 @@ find $RPM_BUILD_ROOT -depth -type d -exec rmdir {} 
2/dev/null \;
 %{_fixperms} $RPM_BUILD_ROOT/*
 
 %check
-RELEASE_TESTING=1 make test
+make test
 
 %files
 %defattr(-,root,root,-)
@@ -50,6 +59,9 @@ RELEASE_TESTING=1 make test
 %{_mandir}/man3/*
 
 %changelog
+* Fri Oct 31 2014 Jitka Plesnikova jples...@redhat.com - 0.200012-1
+- 0.200012 bump
+
 * Wed Jan 29 2014 Ralf Corsépius corse...@fedoraproject.org - 0.102080-11
 - Remove bogus R: perl(ExtUtils::MakeMaker) (RHBZ #1052853).
 - Remove redundant R: perl(Moose).
diff --git a/sources b/sources
index 46fbe41..a510396 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-f048e133a92eab91a1975001d2a55a38  Throwable-0.102080.tar.gz
+458e43d3ec7a816720d5f6aa614b46e1  Throwable-0.200012.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1159047] Please update to at least v1.300011

2014-10-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1159047

Jitka Plesnikova jples...@redhat.com changed:

   What|Removed |Added

   Assignee|iarn...@gmail.com   |jples...@redhat.com



-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=2BEjWtdFKYa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

File Net-DNS-SEC-0.21.tar.gz uploaded to lookaside cache by pwouters

2014-10-31 Thread Paul Wouters
A file has been added to the lookaside cache for perl-Net-DNS-SEC:

4cd803cf77f853b3079fdf539aa92749  Net-DNS-SEC-0.21.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Net-DNS-SEC] - Updated to 0.21, restores canonicalization of a RRSIG’s Signer Name

2014-10-31 Thread Paul Wouters
commit 8f8d1c603165a34c5086b1d250f80dc99193a09d
Author: Paul Wouters pwout...@redhat.com
Date:   Fri Oct 31 11:00:36 2014 -0400

- Updated to 0.21, restores canonicalization of a RRSIG’s Signer Name

 .gitignore|1 +
 perl-Net-DNS-SEC.spec |7 +--
 sources   |2 +-
 3 files changed, 7 insertions(+), 3 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index aa5af1c..fdbe9d3 100644
--- a/.gitignore
+++ b/.gitignore
@@ -3,3 +3,4 @@ Net-DNS-SEC-0.14.tar.gz
 /Net-DNS-SEC-0.17.tar.gz
 /Net-DNS-SEC-0.18.tar.gz
 /Net-DNS-SEC-0.20.tar.gz
+/Net-DNS-SEC-0.21.tar.gz
diff --git a/perl-Net-DNS-SEC.spec b/perl-Net-DNS-SEC.spec
index 81ac06b..b9c3e8e 100644
--- a/perl-Net-DNS-SEC.spec
+++ b/perl-Net-DNS-SEC.spec
@@ -1,6 +1,6 @@
 Name:   perl-Net-DNS-SEC
-Version:0.20
-Release:2%{?dist}
+Version:0.21
+Release:1%{?dist}
 Summary:DNSSEC modules for Perl
 License:GPL+ or Artistic 
 Group:  Development/Libraries
@@ -61,6 +61,9 @@ make test
 %{_mandir}/man3/*
 
 %changelog
+* Fri Oct 31 2014 Paul Wouters pwout...@redhat.com - 0.21-1
+- Updated to 0.21, restores canonicalization of a RRSIG’s Signer Name
+
 * Thu Aug 28 2014 Jitka Plesnikova jples...@redhat.com - 0.20-2
 - Perl 5.20 rebuild
 
diff --git a/sources b/sources
index ffa1467..3214f15 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-8f376c0e2473744689457efa642f75bf  Net-DNS-SEC-0.20.tar.gz
+4cd803cf77f853b3079fdf539aa92749  Net-DNS-SEC-0.21.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Email-Sender/f21] 1.300016 bump

2014-10-31 Thread Jitka Plesnikova
commit f4dc437d0055e03948f4530eeed14cae6596002b
Author: Jitka Plesnikova jples...@redhat.com
Date:   Fri Oct 31 16:00:04 2014 +0100

1.300016 bump

 .gitignore |1 +
 perl-Email-Sender.spec |   39 ---
 sources|2 +-
 3 files changed, 30 insertions(+), 12 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index a9b9972..fec99a6 100644
--- a/.gitignore
+++ b/.gitignore
@@ -8,3 +8,4 @@ Email-Sender-0.101760.tar.gz
 /Email-Sender-0.110005.tar.gz
 /Email-Sender-0.120001.tar.gz
 /Email-Sender-0.120002.tar.gz
+/Email-Sender-1.300016.tar.gz
diff --git a/perl-Email-Sender.spec b/perl-Email-Sender.spec
index 93b3f80..ac5db64 100644
--- a/perl-Email-Sender.spec
+++ b/perl-Email-Sender.spec
@@ -1,6 +1,6 @@
 Name:   perl-Email-Sender
-Version:0.120002
-Release:5%{?dist}
+Version:1.300016
+Release:1%{?dist}
 Summary:A library for sending email
 License:GPL+ or Artistic
 Group:  Development/Libraries
@@ -8,35 +8,49 @@ URL:http://search.cpan.org/dist/Email-Sender/
 Source0:
http://www.cpan.org/authors/id/R/RJ/RJBS/Email-Sender-%{version}.tar.gz
 BuildArch:  noarch
 BuildRequires:  perl(Capture::Tiny) = 0.08
+BuildRequires:  perl(Carp)
 BuildRequires:  perl(Config)
 BuildRequires:  perl(Cwd)
 BuildRequires:  perl(Data::Dumper)
-BuildRequires:  perl(Email::Abstract) = 3
+BuildRequires:  perl(Email::Abstract) = 3.006
 BuildRequires:  perl(Email::Address)
 BuildRequires:  perl(Email::Simple) = 1.998
+BuildRequires:  perl(Errno)
 BuildRequires:  perl(Exporter)
-BuildRequires:  perl(ExtUtils::MakeMaker) = 6.11
+BuildRequires:  perl(ExtUtils::MakeMaker)
+BuildRequires:  perl(Fcntl)
+BuildRequires:  perl(File::Basename)
+BuildRequires:  perl(File::Path) = 2.06
+BuildRequires:  perl(File::Spec)
 BuildRequires:  perl(File::Temp)
+BuildRequires:  perl(IO::File)
+BuildRequires:  perl(IO::Handle)
 BuildRequires:  perl(JSON)
+BuildRequires:  perl(lib)
 BuildRequires:  perl(List::MoreUtils)
-BuildRequires:  perl(Moose) = 0.70
-BuildRequires:  perl(Moose::Role)
+BuildRequires:  perl(Module::Runtime)
+BuildRequires:  perl(Moo) = 1.08
+BuildRequires:  perl(Moo::Role)
+BuildRequires:  perl(MooX::Types::MooseLike::Base)
 BuildRequires:  perl(Net::SMTP)
 BuildRequires:  perl(Net::SMTP::SSL)
 BuildRequires:  perl(Pod::Coverage::TrustPod)
+BuildRequires:  perl(Scalar::Util)
+BuildRequires:  perl(strict)
 BuildRequires:  perl(Sub::Exporter)
 BuildRequires:  perl(Sub::Exporter::Util)
 BuildRequires:  perl(Sub::Override)
+BuildRequires:  perl(Sys::Hostname)
 BuildRequires:  perl(Test::MinimumVersion)
 BuildRequires:  perl(Test::MockObject)
 BuildRequires:  perl(Test::More) = 0.96
-BuildRequires:  perl(Test::Pod)
-BuildRequires:  perl(Test::Pod::Coverage)
-BuildRequires:  perl(Throwable::Error) = 0.100090
+BuildRequires:  perl(Test::Pod) = 1.41
+BuildRequires:  perl(Throwable::Error) = 0.23
 BuildRequires:  perl(Try::Tiny)
-Requires:   perl(Email::Abstract) = 3
+BuildRequires:  perl(warnings)
+Requires:   perl(Email::Abstract) = 3.006
 Requires:   perl(Net::SMTP::SSL)
-Requires:   perl(Throwable::Error) = 0.100090
+Requires:   perl(Throwable::Error) = 0.23
 Requires:   perl(:MODULE_COMPAT_%(eval `%{__perl} -V:version`; echo 
$version))
 
 %{?perl_default_filter}
@@ -72,6 +86,9 @@ RELEASE_TESTING=1 make test
 %{_mandir}/man3/*
 
 %changelog
+* Fri Oct 31 2014 Jitka Plesnikova jples...@redhat.com -1.300016-1
+- 1.300016 bump
+
 * Sat Jun 07 2014 Fedora Release Engineering rel-...@lists.fedoraproject.org 
- 0.120002-5
 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
 
diff --git a/sources b/sources
index f5cf315..a1e465e 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-8671410f17dc316d925bbcdeb97af9c6  Email-Sender-0.120002.tar.gz
+758b2dcb2ca1dfb6f9c94ddf94aa0a57  Email-Sender-1.300016.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Net-DNS-SEC/f21] (3 commits) ...- Updated to 0.21, restores canonicalization of a RRSIG’s Signer Name

2014-10-31 Thread Paul Wouters
Summary of changes:

  a76e169... * Sat Aug 16 2014 Paul Wouters pwout...@redhat.com - 0.20 (*)
  bc6ab3b... Perl 5.20 rebuild (*)
  8f8d1c6... - Updated to 0.21, restores canonicalization of a RRSIG’s (*)

(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Net-DNS-SEC/f20: 3/3] Merge branch 'master' into f20

2014-10-31 Thread Paul Wouters
commit ffebbcb585f9c27052f6abbd5dc23365449694e3
Merge: 75f20d1 8f8d1c6
Author: Paul Wouters pwout...@redhat.com
Date:   Fri Oct 31 11:10:07 2014 -0400

Merge branch 'master' into f20

 .gitignore|1 +
 perl-Net-DNS-SEC.spec |8 +++-
 sources   |2 +-
 3 files changed, 9 insertions(+), 2 deletions(-)
---
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Net-DNS-SEC/f20] (3 commits) ...Merge branch 'master' into f20

2014-10-31 Thread Paul Wouters
Summary of changes:

  bc6ab3b... Perl 5.20 rebuild (*)
  8f8d1c6... - Updated to 0.21, restores canonicalization of a RRSIG’s (*)
  ffebbcb... Merge branch 'master' into f20

(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Net-DNS-SEC/el6] - Updated to 0.21, restores canonicalization of a RRSIG’s Signer Name

2014-10-31 Thread Paul Wouters
commit 9945af6cd0dba15e41455f4b872ed07404d07cf1
Author: Paul Wouters pwout...@redhat.com
Date:   Fri Oct 31 11:13:53 2014 -0400

- Updated to 0.21, restores canonicalization of a RRSIG’s Signer Name

 .gitignore|1 +
 perl-Net-DNS-SEC.spec |5 -
 sources   |2 +-
 3 files changed, 6 insertions(+), 2 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index aa5af1c..fdbe9d3 100644
--- a/.gitignore
+++ b/.gitignore
@@ -3,3 +3,4 @@ Net-DNS-SEC-0.14.tar.gz
 /Net-DNS-SEC-0.17.tar.gz
 /Net-DNS-SEC-0.18.tar.gz
 /Net-DNS-SEC-0.20.tar.gz
+/Net-DNS-SEC-0.21.tar.gz
diff --git a/perl-Net-DNS-SEC.spec b/perl-Net-DNS-SEC.spec
index fb0d8da..5947016 100644
--- a/perl-Net-DNS-SEC.spec
+++ b/perl-Net-DNS-SEC.spec
@@ -1,5 +1,5 @@
 Name:   perl-Net-DNS-SEC
-Version:0.20
+Version:0.21
 Release:1%{?dist}
 Summary:DNSSEC modules for Perl
 License:GPL+ or Artistic 
@@ -61,6 +61,9 @@ make test
 %{_mandir}/man3/*
 
 %changelog
+* Fri Oct 31 2014 Paul Wouters pwout...@redhat.com - 0.21-1
+- Updated to 0.21, restores canonicalization of a RRSIG’s Signer Name
+
 * Sat Aug 16 2014 Paul Wouters pwout...@redhat.com - 0.20-1
 - Updated to 0.20, fixes - (zero) salt fields in NSEC3 representation
 - Remove inappropriate deprecation warning in DNSKEY.pm (0.19 upstream)
diff --git a/sources b/sources
index ffa1467..3214f15 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-8f376c0e2473744689457efa642f75bf  Net-DNS-SEC-0.20.tar.gz
+4cd803cf77f853b3079fdf539aa92749  Net-DNS-SEC-0.21.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1159047] Please update to at least v1.300011

2014-10-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1159047



--- Comment #1 from Fedora Update System upda...@fedoraproject.org ---
perl-Email-Sender-1.300016-1.fc21 has been submitted as an update for Fedora
21.
https://admin.fedoraproject.org/updates/perl-Email-Sender-1.300016-1.fc21

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=FctQcUbVv4a=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Email-Sender/f20] 1.300016 bump

2014-10-31 Thread Jitka Plesnikova
commit 9edf3fb8869d7168e382897a6c2c4e1452147cec
Author: Jitka Plesnikova jples...@redhat.com
Date:   Fri Oct 31 16:32:27 2014 +0100

1.300016 bump

 .gitignore |1 +
 perl-Email-Sender.spec |   39 ---
 sources|2 +-
 3 files changed, 30 insertions(+), 12 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index a9b9972..fec99a6 100644
--- a/.gitignore
+++ b/.gitignore
@@ -8,3 +8,4 @@ Email-Sender-0.101760.tar.gz
 /Email-Sender-0.110005.tar.gz
 /Email-Sender-0.120001.tar.gz
 /Email-Sender-0.120002.tar.gz
+/Email-Sender-1.300016.tar.gz
diff --git a/perl-Email-Sender.spec b/perl-Email-Sender.spec
index 4fbce43..df065e6 100644
--- a/perl-Email-Sender.spec
+++ b/perl-Email-Sender.spec
@@ -1,6 +1,6 @@
 Name:   perl-Email-Sender
-Version:0.120002
-Release:4%{?dist}
+Version:1.300016
+Release:1%{?dist}
 Summary:A library for sending email
 License:GPL+ or Artistic
 Group:  Development/Libraries
@@ -8,35 +8,49 @@ URL:http://search.cpan.org/dist/Email-Sender/
 Source0:
http://www.cpan.org/authors/id/R/RJ/RJBS/Email-Sender-%{version}.tar.gz
 BuildArch:  noarch
 BuildRequires:  perl(Capture::Tiny) = 0.08
+BuildRequires:  perl(Carp)
 BuildRequires:  perl(Config)
 BuildRequires:  perl(Cwd)
 BuildRequires:  perl(Data::Dumper)
-BuildRequires:  perl(Email::Abstract) = 3
+BuildRequires:  perl(Email::Abstract) = 3.006
 BuildRequires:  perl(Email::Address)
 BuildRequires:  perl(Email::Simple) = 1.998
+BuildRequires:  perl(Errno)
 BuildRequires:  perl(Exporter)
-BuildRequires:  perl(ExtUtils::MakeMaker) = 6.11
+BuildRequires:  perl(ExtUtils::MakeMaker)
+BuildRequires:  perl(Fcntl)
+BuildRequires:  perl(File::Basename)
+BuildRequires:  perl(File::Path) = 2.06
+BuildRequires:  perl(File::Spec)
 BuildRequires:  perl(File::Temp)
+BuildRequires:  perl(IO::File)
+BuildRequires:  perl(IO::Handle)
 BuildRequires:  perl(JSON)
+BuildRequires:  perl(lib)
 BuildRequires:  perl(List::MoreUtils)
-BuildRequires:  perl(Moose) = 0.70
-BuildRequires:  perl(Moose::Role)
+BuildRequires:  perl(Module::Runtime)
+BuildRequires:  perl(Moo) = 1.08
+BuildRequires:  perl(Moo::Role)
+BuildRequires:  perl(MooX::Types::MooseLike::Base)
 BuildRequires:  perl(Net::SMTP)
 BuildRequires:  perl(Net::SMTP::SSL)
 BuildRequires:  perl(Pod::Coverage::TrustPod)
+BuildRequires:  perl(Scalar::Util)
+BuildRequires:  perl(strict)
 BuildRequires:  perl(Sub::Exporter)
 BuildRequires:  perl(Sub::Exporter::Util)
 BuildRequires:  perl(Sub::Override)
+BuildRequires:  perl(Sys::Hostname)
 BuildRequires:  perl(Test::MinimumVersion)
 BuildRequires:  perl(Test::MockObject)
 BuildRequires:  perl(Test::More) = 0.96
-BuildRequires:  perl(Test::Pod)
-BuildRequires:  perl(Test::Pod::Coverage)
-BuildRequires:  perl(Throwable::Error) = 0.100090
+BuildRequires:  perl(Test::Pod) = 1.41
+BuildRequires:  perl(Throwable::Error) = 0.23
 BuildRequires:  perl(Try::Tiny)
-Requires:   perl(Email::Abstract) = 3
+BuildRequires:  perl(warnings)
+Requires:   perl(Email::Abstract) = 3.006
 Requires:   perl(Net::SMTP::SSL)
-Requires:   perl(Throwable::Error) = 0.100090
+Requires:   perl(Throwable::Error) = 0.23
 Requires:   perl(:MODULE_COMPAT_%(eval `%{__perl} -V:version`; echo 
$version))
 
 %{?perl_default_filter}
@@ -72,6 +86,9 @@ RELEASE_TESTING=1 make test
 %{_mandir}/man3/*
 
 %changelog
+* Fri Oct 31 2014 Jitka Plesnikova jples...@redhat.com - 1.300016-1
+- 1.300016 bump
+
 * Mon Aug 05 2013 Petr Pisar ppi...@redhat.com - 0.120002-4
 - Perl 5.18 rebuild
 
diff --git a/sources b/sources
index f5cf315..a1e465e 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-8671410f17dc316d925bbcdeb97af9c6  Email-Sender-0.120002.tar.gz
+758b2dcb2ca1dfb6f9c94ddf94aa0a57  Email-Sender-1.300016.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1159047] Please update to at least v1.300011

2014-10-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1159047



--- Comment #2 from Fedora Update System upda...@fedoraproject.org ---
perl-Email-Sender-1.300016-1.fc20 has been submitted as an update for Fedora
20.
https://admin.fedoraproject.org/updates/perl-Email-Sender-1.300016-1.fc20

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=AvIy7LNzPRa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

Re: FESCo to orphan iarnell's packages

2014-10-31 Thread Emmanuel Seyman
* Petr Šabata [31/10/2014 12:27] :

 I'm willing to maintain most of them.
 I hope it won't be just me, however :)

I'll be glad to give a hand, especially for all HTML/HTTP-related modules.

Emmanuel
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Locale-Maketext-Fuzzy/f20] Upstream upgrade.

2014-10-31 Thread corsepiu
Summary of changes:

  3becdbc... Upstream upgrade. (*)

(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1136340] perl-Qt-0.96.0-12.fc22: FTBFS with Perl 5.20

2014-10-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1136340

Chris chrisbu...@gmail.com changed:

   What|Removed |Added

 CC||chrisbu...@gmail.com



--- Comment #9 from Chris chrisbu...@gmail.com ---
This appears to be a change in Perl's behavior.  The way the operator
overloading in PerlQt works is that it first tries to find an operator method
on the class itself, and then next it tries to find one in the so-called
QGlobalSpace, which is a place defined by the smoke library for global Qt
functions.  Perl passes the underlying XS code the full package and function
being called, which PerlQt splits into 2 strings, one for the package name, and
one for the method name.  PerlQt null-terminates the package name string, and
in previous versions of Perl, this modification did not affect the source
$AUTOLOAD variable.  In Perl 5.20.0, it does update the Perl variable, and then
causes confusion down the line.

I've pushed both Petr's change, and a change to fix this issue, to the master
branch in perlqt's git repo at git://anongit.kde.org/perlqt.  Can someone try
it out?

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=Myhc6HxrS4a=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-qpid/f20] (15 commits) ...Rebased on Qpid 0.30 rebased.

2014-10-31 Thread Darryl L . Pierce
Summary of changes:

  85c9d7c... Rebased on Qpid 0.22. (*)
  fb3b419... Perl Makefile.PL now generates the Swig bindings source. (*)
  e88eed1... Updated build to fix dependency issues on qpid-cpp. (*)
  11fcf0d... Rebased on Qpid 0.24. (*)
  ab54c51... Merge branch 'master' into f19 (*)
  448e6f4... Merge branch 'f20' into f19 (*)
  f97686f... Rebase on Qpid 0.28. (*)
  f0c7c8f... - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass (*)
  2d2a2ed... qpid-cpp now builds on ARM (*)
  2a322ac... Updated the virtual package dependencies. (*)
  19552ba... Merge branch 'master' into f21 (*)
  e55afa6... - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_M (*)
  185facd... Fixed a typo in the requires. (*)
  92466c1... Perl 5.20 rebuild (*)
  14b81f1... Rebased on Qpid 0.30 rebased. (*)

(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-10-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083

Marianne Feifer mfei...@redhat.com changed:

   What|Removed |Added

 CC|mfei...@redhat.com  |

Kurt Seifried kseifr...@redhat.com changed:

   What|Removed |Added

 Whiteboard|impact=important,public=201 |impact=important,public=201
   |40327,reported=20140318,sou |40327,reported=20140318,sou
   |rce=distros,cvss2=6.8/AV:N/ |rce=distros,cvss2=6.8/AV:N/
   |AC:M/Au:N/C:P/I:P/A:P,rhel- |AC:M/Au:N/C:P/I:P/A:P,rhel-
   |6/libyaml=affected,rhel-7/l |6/libyaml=affected,rhel-7/l
   |ibyaml=affected,rhscl-1/rub |ibyaml=affected,rhscl-1/rub
   |y193-libyaml=affected,rhscl |y193-libyaml=affected,rhscl
   |-1/libyaml=affected,mrg-1/l |-1/libyaml=affected,mrg-1/l
   |ibyaml=wontfix,mrg-2/libyam |ibyaml=wontfix,mrg-2/libyam
   |l=wontfix,rhn_satellite_5.3 |l=wontfix,rhn_satellite_5.3
   |/libyaml=affected,rhn_satel |/libyaml=affected,rhn_satel
   |lite_5.4/libyaml=affected,r |lite_5.4/libyaml=affected,r
   |hn_satellite_5.5/libyaml=af |hn_satellite_5.5/libyaml=af
   |fected,rhn_satellite_5.6/li |fected,rhn_satellite_5.6/li
   |byaml=affected,rhn_satellit |byaml=affected,rhn_satellit
   |e_6/libyaml=affected,rhui-2 |e_6/libyaml=affected,rhui-2
   |/libyaml=wontfix,sam-1/liby |/libyaml=wontfix,sam-1/liby
   |aml=defer,cfme-5/mingw-liby |aml=defer,cfme-5/mingw-liby
   |aml=defer,cfme-5/ruby193-li |aml=wontfix,cfme-5/ruby193-
   |byaml=defer,openstack-3/lib |libyaml=affected,openstack-
   |yaml=affected,openstack-3/r |3/libyaml=affected,openstac
   |uby193-libyaml=affected,ope |k-3/ruby193-libyaml=affecte
   |nstack-4/libyaml=affected,o |d,openstack-4/libyaml=affec
   |penshift-enterprise-1/ruby1 |ted,openshift-enterprise-1/
   |93-libyaml=wontfix,openshif |ruby193-libyaml=wontfix,ope
   |t-1/ruby193-libyaml=affecte |nshift-1/ruby193-libyaml=af
   |d,fedora-all/libyaml=affect |fected,fedora-all/libyaml=a
   |ed,epel-all/libyaml=affecte |ffected,epel-all/libyaml=af
   |d,fedora-all/perl-YAML-LibY |fected,fedora-all/perl-YAML
   |AML=affected,epel-6/perl-YA |-LibYAML=affected,epel-6/pe
   |ML-LibYAML=affected |rl-YAML-LibYAML=affected



-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=F5MTEYZhwya=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-10-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083

Kurt Seifried kseifr...@redhat.com changed:

   What|Removed |Added

 Depends On||1159403
 Depends On||1159404



-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=5OjhtbrSpxa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1017972] [abrt] shutter-0.90-2.fc19: g_str_hash: Process /usr/bin/perl was killed by signal 11 (SIGSEGV)

2014-10-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1017972

Fedora Update System upda...@fedoraproject.org changed:

   What|Removed |Added

 Status|MODIFIED|CLOSED
   Fixed In Version||shutter-0.93-1.fc20
 Resolution|--- |ERRATA
Last Closed||2014-10-31 21:44:44



--- Comment #14 from Fedora Update System upda...@fedoraproject.org ---
shutter-0.93-1.fc20, perl-WebService-Dropbox-1.22-2.fc20 has been pushed to the
Fedora 20 stable repository.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=pavujEDqy0a=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 1153984] perl-WebService-Linode-0.23 is available

2014-10-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1153984

Fedora Update System upda...@fedoraproject.org changed:

   What|Removed |Added

 Status|ON_QA   |CLOSED
   Fixed In Version||perl-WebService-Linode-0.23
   ||-1.fc20
 Resolution|--- |ERRATA
Last Closed||2014-10-31 21:46:37



--- Comment #5 from Fedora Update System upda...@fedoraproject.org ---
perl-WebService-Linode-0.23-1.fc20 has been pushed to the Fedora 20 stable
repository.  If problems still persist, please make note of it in this bug
report.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=wOvNxnGYMSa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel