Re: Error while retiring breathe
On Thu, Apr 7, 2016 at 8:44 AM, Kevin Fenzi wrote: > On Wed, 6 Apr 2016 21:09:11 -0700 > Dave Johansen wrote: > > > I'm renaming breathe [1] to python-breathe [2]. I just tried to retire > > breathe in f22 using the instructions on the wiki [3] and got the > > following error: > > Could not retire package: Error while decoding JSON: Expecting value: > > line 1 column 1 (char 0) > > > > Am I doing something wrong? > > This seems to be a bug in pkgdb's openid handling that we are having > trouble tracking down to fix. ;( > > Workaround: > > rm -f ~/.fedora/openidbaseclient-sessions.cache > > and re-run the retire. > > The bug is: > https://bugzilla.redhat.com/show_bug.cgi?id=1317579 When trying that, I got this error: $ fedpkg retire "Renamed to python-breathe" dead.package found, package probably already retired - will not remove files from git or overwrite existing dead.package file Everything up-to-date FAS password for user daveisfera: Could not retire package: HTTPSConnectionPool(host='admin.fedoraproject.org', port=443): Max retries exceeded with url: /pkgdb//api/package/retire/ (Caused by ResponseError('too many 500 error responses',)) -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Fedora rawhide compose report: 20160408.n.2 changes
OLD: Fedora-Rawhide-20160408.n.1 NEW: Fedora-Rawhide-20160408.n.2 = SUMMARY = Added packages: 4 Dropped packages:0 Upgraded packages: 55 Downgraded packages: 0 Size of added packages: 4.62 MiB Size of dropped packages:0.00 B Size of upgraded packages: 257.14 MiB Size of downgraded packages: 0.00 B Size change of upgraded packages: -8.56 MiB Size change of downgraded packages: 0.00 B = ADDED PACKAGES = Package: chck-0-1.20160408git2efd6cd.fc25 Summary: Collection of C utilities RPMs:chck chck-devel Size:343104 bytes Package: mkdocs-bootswatch-0.4.0-1.fc25 Summary: Bootswatch themes for MkDocs RPMs:mkdocs-bootswatch Size:188274 bytes Package: nacl-gcc-4.4.3-17.20150504gitf80d6b9.fc25 Summary: C and C++ compilers for nacl RPMs:nacl-gcc Size:4020414 bytes Package: plasma-integration-5.6.1-1.fc25 Summary: Qt Platform Theme integration plugin for Plasma RPMs:plasma-integration Size:287518 bytes = DROPPED PACKAGES = = UPGRADED PACKAGES = Package: beust-jcommander-1.47-3.fc25 Old package: beust-jcommander-1.47-3.fc24 Summary: Java framework for parsing command line parameters RPMs: beust-jcommander beust-jcommander-javadoc Size: 141696 bytes Size change: -2544 bytes Package: bluedevil-5.6.1-1.fc25 Old package: bluedevil-5.5.5-1.fc25 Summary: Bluetooth stack for KDE RPMs: bluedevil Size: 1224658 bytes Size change: -4688 bytes Changelog: * Fri Apr 08 2016 Rex Dieter - 5.6.1-1 - 5.6.1 Package: breeze-gtk-5.6.1-1.fc25 Old package: breeze-gtk-5.5.5-1.fc25 Summary: Breeze widget theme for Gtk2 and Gtk3 RPMs: breeze-gtk Size: 1341618 bytes Size change: -69312 bytes Changelog: * Fri Apr 08 2016 Rex Dieter - 5.6.1-1 - 5.6.1 Package: checkpolicy-2.5-2.fc25 Old package: checkpolicy-2.5-1.fc24 Summary: SELinux policy compiler RPMs: checkpolicy Size: 889842 bytes Size change: -5344 bytes Changelog: * Fri Apr 08 2016 Petr Lautrbach - 2.5-2 - Add support for portcon dccp protocol Package: ed-1.13-1.fc25 Old package: ed-1.12-2.fc24 Summary: The GNU line editor RPMs: ed Size: 231274 bytes Size change: -2972 bytes Changelog: * Tue Apr 05 2016 Karsten Hopp 1.13-1 - update to 1.13 Package: eog-3.20.0-2.fc25 Old package: eog-3.20.0-1.fc25 Summary: Eye of GNOME image viewer RPMs: eog eog-devel eog-tests Size: 11903286 bytes Size change: -636 bytes Changelog: * Fri Apr 08 2016 Debarshi Ray - 3.20.0-2 - Prevent a crash when queueing a new draw (GNOME #665897) Package: gap-pkg-genss-1.6.4-1.fc25 Old package: gap-pkg-genss-1.6.3-2.fc24 Summary: Randomized Schreier-Sims algorithm RPMs: gap-pkg-genss Size: 322894 bytes Size change: -824 bytes Changelog: * Thu Apr 07 2016 Jerry James - 1.6.4-1 - New upstream version Package: gap-pkg-gpd-1.43-1.fc25 Old package: gap-pkg-gpd-1.34-2.fc24 Summary: Groupoids, group graphs, and groupoid graphs RPMs: gap-pkg-gpd Size: 519226 bytes Size change: 19460 bytes Changelog: * Thu Apr 07 2016 Jerry James - 1.43-1 - New upstream version (bz 1284892) Package: gap-pkg-orb-4.7.6-1.fc25 Old package: gap-pkg-orb-4.7.5-2.fc24 Summary: Methods to enumerate orbits in GAP RPMs: gap-pkg-orb Size: 2126406 bytes Size change: -5168 bytes Changelog: * Thu Apr 07 2016 Jerry James - 4.7.6-1 - New upstream version (bz 1315679) Package: gap-pkg-semigroups-2.7.4-1.fc25 Old package: gap-pkg-semigroups-2.6-2.fc24 Summary: GAP methods for semigroups RPMs: gap-pkg-semigroups Size: 1335734 bytes Size change: 39788 bytes Changelog: * Thu Apr 07 2016 Jerry James - 2.7.4-1 - New upstream version (bz 1287388) Package: gap-pkg-spinsym-1.5-5.fc25 Old package: gap-pkg-spinsym-1.5-4.fc24 Summary: GAP package for Brauer tables of spin-symmetric groups RPMs: gap-pkg-spinsym Size: 401030 bytes Size change: -1080 bytes Changelog: * Thu Apr 07 2016 Jerry James - 1.5-5 - Rebuild for gap 4.8.3 Package: jackcess-2.1.3-1.fc25 Old package: jackcess-2.1.2-2.fc24 Summary: Java library for reading from and writing to MS Access databases RPMs: jackcess jackcess-javadoc Size: 1128492 bytes Size change: 608 bytes Changelog: * Fri Apr 08 2016 gil cattaneo 2.1.2-3 - rebuilt with bcprov 1.54 * Fri Apr 08 2016 gil cattaneo 2.1.3-1 - update to 2.1.3 Package: jackcess-encrypt-2.1.1-1.fc25 Old package: jackcess-encrypt-2.1.0-3.fc25 Summary: Java implementation of the encryption service for MS Access RPMs: jackcess-encrypt jackcess-encrypt-javadoc Size: 173784 bytes Size change: 6372 bytes Package: jasypt-1.9.2-4.fc25 Old package: jasypt-1.9.2-3.fc24 Summary: Java Simplified Encryption RPMs: jasypt jasypt
Fedora 24-20160408.n.1 compose check report
Missing expected images: Cloud_base raw-xz x86_64 Cloud_base raw-xz i386 Atomic raw-xz x86_64 Images in this compose but not 24-20160408.n.0: Kde live i386 Xfce live x86_64 Mate live i386 Mate live x86_64 Scientific_kde live x86_64 Kde live x86_64 Jam_kde live x86_64 Cinnamon live i386 Games live x86_64 Jam_kde live i386 Scientific_kde live i386 Astronomy_kde live i386 Astronomy_kde live x86_64 Games live i386 Xfce live i386 Workstation live x86_64 Robotics live x86_64 Workstation live i386 Robotics live i386 Cinnamon live x86_64 No images in 24-20160408.n.0 but not this. Failed openQA tests: 7/63 (x86_64), 16/17 (i386) ID: 12361 Test: x86_64 Server-dvd-iso base_service_manipulation URL: https://openqa.fedoraproject.org/tests/12361 ID: 12360 Test: x86_64 Server-dvd-iso base_services_start URL: https://openqa.fedoraproject.org/tests/12360 ID: 12359 Test: x86_64 Server-dvd-iso base_selinux URL: https://openqa.fedoraproject.org/tests/12359 ID: 12352 Test: i386 universal install_package_set_kde URL: https://openqa.fedoraproject.org/tests/12352 ID: 12350 Test: i386 universal upgrade_desktop_32bit URL: https://openqa.fedoraproject.org/tests/12350 ID: 12349 Test: i386 universal install_lvmthin URL: https://openqa.fedoraproject.org/tests/12349 ID: 12348 Test: i386 universal install_ext3 URL: https://openqa.fedoraproject.org/tests/12348 ID: 12347 Test: i386 universal install_btrfs URL: https://openqa.fedoraproject.org/tests/12347 ID: 12346 Test: i386 universal install_software_raid URL: https://openqa.fedoraproject.org/tests/12346 ID: 12345 Test: i386 universal install_simple_encrypted URL: https://openqa.fedoraproject.org/tests/12345 ID: 12344 Test: i386 universal install_scsi_updates_img URL: https://openqa.fedoraproject.org/tests/12344 ID: 12343 Test: i386 universal install_repository_http_graphical URL: https://openqa.fedoraproject.org/tests/12343 ID: 12342 Test: i386 universal install_package_set_minimal URL: https://openqa.fedoraproject.org/tests/12342 ID: 12307 Test: x86_64 universal install_kickstart_hdd URL: https://openqa.fedoraproject.org/tests/12307 ID: 12301 Test: x86_64 universal install_delete_partial@uefi URL: https://openqa.fedoraproject.org/tests/12301 ID: 12294 Test: i386 Workstation-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/12294 ID: 12293 Test: i386 Server-dvd-iso install_default URL: https://openqa.fedoraproject.org/tests/12293 ID: 12292 Test: i386 Workstation-live-iso install_default URL: https://openqa.fedoraproject.org/tests/12292 ID: 12291 Test: i386 Server-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/12291 ID: 12285 Test: x86_64 Workstation-live-iso install_default@uefi URL: https://openqa.fedoraproject.org/tests/12285 ID: 12284 Test: x86_64 Workstation-live-iso install_default_upload URL: https://openqa.fedoraproject.org/tests/12284 ID: 12283 Test: i386 Everything-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/12283 ID: 12282 Test: i386 KDE-live-iso install_default URL: https://openqa.fedoraproject.org/tests/12282 Passed openQA tests: 53/63 (x86_64), 1/17 (i386) Skipped openQA tests: 3 of 80 -- Mail generated by check-compose: https://git.fedorahosted.org/cgit/fedora-qa.git/tree/check-compose -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Fedora Rawhide-20160408.n.1 compose check report
Missing expected images: Kde live i386 Workstation live i386 Kde live x86_64 Cloud_base raw-xz x86_64 Cloud_base raw-xz i386 Atomic raw-xz x86_64 Kde raw-xz armhfp Workstation live x86_64 No images in this compose but not Rawhide-20160408.n.0 Images in Rawhide-20160408.n.0 but not this: Docker_base docker x86_64 Failed openQA tests: 5/53 (x86_64), 15/15 (i386) ID: 12272 Test: i386 universal install_package_set_kde URL: https://openqa.fedoraproject.org/tests/12272 ID: 12271 Test: i386 universal upgrade_2_desktop_32bit URL: https://openqa.fedoraproject.org/tests/12271 ID: 12270 Test: i386 universal upgrade_desktop_32bit URL: https://openqa.fedoraproject.org/tests/12270 ID: 12269 Test: i386 universal install_lvmthin URL: https://openqa.fedoraproject.org/tests/12269 ID: 12268 Test: i386 universal install_ext3 URL: https://openqa.fedoraproject.org/tests/12268 ID: 12267 Test: i386 universal install_btrfs URL: https://openqa.fedoraproject.org/tests/12267 ID: 12266 Test: i386 universal install_software_raid URL: https://openqa.fedoraproject.org/tests/12266 ID: 12265 Test: i386 universal install_simple_encrypted URL: https://openqa.fedoraproject.org/tests/12265 ID: 12264 Test: i386 universal install_scsi_updates_img URL: https://openqa.fedoraproject.org/tests/12264 ID: 12263 Test: i386 universal install_repository_http_graphical URL: https://openqa.fedoraproject.org/tests/12263 ID: 12262 Test: i386 universal install_package_set_minimal URL: https://openqa.fedoraproject.org/tests/12262 ID: 12258 Test: x86_64 universal install_package_set_kde URL: https://openqa.fedoraproject.org/tests/12258 ID: 12244 Test: x86_64 universal install_kickstart_user_creation URL: https://openqa.fedoraproject.org/tests/12244 ID: 12237 Test: x86_64 universal install_kickstart_firewall_configured URL: https://openqa.fedoraproject.org/tests/12237 ID: 12235 Test: x86_64 universal install_european_language URL: https://openqa.fedoraproject.org/tests/12235 ID: 12227 Test: x86_64 universal install_kickstart_hdd URL: https://openqa.fedoraproject.org/tests/12227 ID: 12215 Test: i386 Server-dvd-iso install_default URL: https://openqa.fedoraproject.org/tests/12215 ID: 12209 Test: i386 Everything-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/12209 ID: 12208 Test: i386 Server-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/12208 ID: 12207 Test: i386 Workstation-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/12207 Passed openQA tests: 48/53 (x86_64) -- Mail generated by check-compose: https://git.fedorahosted.org/cgit/fedora-qa.git/tree/check-compose -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Fedora 24 compose report: 20160408.n.1 changes
OLD: Fedora-24-20160408.n.0 NEW: Fedora-24-20160408.n.1 = SUMMARY = Added packages: 1 Dropped packages:0 Upgraded packages: 74 Downgraded packages: 0 Size of added packages: 484.57 KiB Size of dropped packages:0.00 B Size of upgraded packages: 686.37 MiB Size of downgraded packages: 0.00 B Size change of upgraded packages: -2.55 MiB Size change of downgraded packages: 0.00 B = ADDED PACKAGES = Package: ghc-pipes-safe-2.2.2-1.fc24 Summary: Safety for the pipes ecosystem RPMs:ghc-pipes-safe ghc-pipes-safe-devel Size:496204 bytes = DROPPED PACKAGES = = UPGRADED PACKAGES = Package: GeoIP-GeoLite-data-2016.04-1.fc24 Old package: GeoIP-GeoLite-data-2016.03-1.fc24 Summary: Free GeoLite IP geolocation country database RPMs: GeoIP-GeoLite-data GeoIP-GeoLite-data-extra Size: 25373356 bytes Size change: -89132 bytes Changelog: * Wed Apr 06 2016 Paul Howarth - 2016.04-1 - Update to April 2016 databases Package: NetworkManager-1:1.2.0-0.8.rc1.fc24 Old package: NetworkManager-1:1.2.0-0.8.beta3.fc24 Summary: Network connection manager and user applications RPMs: NetworkManager NetworkManager-adsl NetworkManager-bluetooth NetworkManager-config-connectivity-fedora NetworkManager-config-server NetworkManager-glib NetworkManager-glib-devel NetworkManager-libnm NetworkManager-libnm-devel NetworkManager-team NetworkManager-tui NetworkManager-wifi NetworkManager-wwan Size: 21673526 bytes Size change: 279880 bytes Changelog: * Tue Apr 05 2016 Lubomir Rintel - 1:1.2.0-0.7.rc1 - Update to NetworkManager 1.2-rc1 Package: NetworkManager-fortisslvpn-1.2.0-0.4.rc1.fc24 Old package: NetworkManager-fortisslvpn-1.2.0-0.4.beta3.fc24 Summary: NetworkManager VPN plugin for Fortinet compatible SSLVPN RPMs: NetworkManager-fortisslvpn NetworkManager-fortisslvpn-gnome Size: 315216 bytes Size change: 532 bytes Changelog: * Tue Apr 05 2016 Lubomir Rintel - 1.2.0-0.4.rc1 - Update to NetworkManager-fortisslvpn 1.2-rc1 Package: NetworkManager-libreswan-1.2.0-0.4.rc1.fc24 Old package: NetworkManager-libreswan-1.2.0-0.4.beta3.fc24 Summary: NetworkManager VPN plug-in for IPsec VPN RPMs: NetworkManager-libreswan NetworkManager-libreswan-gnome Size: 425408 bytes Size change: -72 bytes Changelog: * Tue Apr 05 2016 Lubomir Rintel - 1.2.0-0.4.rc1 - Update to NetworkManager-libreswan 1.2-rc1 Package: NetworkManager-openconnect-1.2.0-0.3.rc1.fc24 Old package: NetworkManager-openconnect-1.2.0-0.3.beta3.fc24 Summary: NetworkManager VPN plugin for openconnect RPMs: NetworkManager-openconnect Size: 1229558 bytes Size change: 240 bytes Changelog: * Tue Apr 05 2016 Lubomir Rintel - 1:1.2.0-0.3.rc1 - Update to NetworkManager-openconnect 1.2-rc1 Package: NetworkManager-openvpn-1:1.2.0-0.3.rc1.fc24 Old package: NetworkManager-openvpn-1:1.2.0-0.3.beta3.fc24 Summary: NetworkManager VPN plugin for OpenVPN RPMs: NetworkManager-openvpn NetworkManager-openvpn-gnome Size: 874660 bytes Size change: 13532 bytes Changelog: * Tue Apr 05 2016 Lubomir Rintel - 1:1.2.0-0.3.rc1 - Update to NetworkManager-openvpn 1.2-rc1 Package: NetworkManager-pptp-1:1.2.0-0.3.rc1.fc24 Old package: NetworkManager-pptp-1:1.2.0-0.3.beta3.fc24 Summary: NetworkManager VPN plugin for PPTP RPMs: NetworkManager-pptp NetworkManager-pptp-gnome Size: 539364 bytes Size change: 520 bytes Changelog: * Tue Apr 05 2016 Lubomir Rintel - 1:1.2.0-0.3.rc1 - Update to NetworkManager-pptp 1.2-rc1 Package: NetworkManager-vpnc-1:1.2.0-0.4.rc1.fc24 Old package: NetworkManager-vpnc-1:1.2.0-0.4.beta3.fc24 Summary: NetworkManager VPN plugin for vpnc RPMs: NetworkManager-vpnc NetworkManager-vpnc-gnome Size: 599500 bytes Size change: 228 bytes Changelog: * Tue Apr 05 2016 Lubomir Rintel - 1:1.2.0-0.4.rc1 - Update to NetworkManager-vpnc 1.2-rc1 Package: bijiben-3.20.0-2.fc24 Old package: bijiben-3.20.0-1.fc24 Summary: Simple Note Viewer RPMs: bijiben Size: 1442122 bytes Size change: -4156 bytes Changelog: * Sun Apr 03 2016 Mathieu Bridon - 3.20.0-2 - Drop the Zeitgeist dependency. Package: bip-0.8.9-10.fc24 Old package: bip-0.8.9-9.fc24 Summary: IRC Bouncer RPMs: bip Size: 422826 bytes Size change: -256 bytes Changelog: * Thu Mar 31 2016 Brian C. Lane 0.8.9-10 - Use %{_tmpfilesdir} macro instead of /etc/tmpfiles.d Package: catfish-1.4.2-1.fc24 Old package: catfish-1.4.1-1.fc24 Summary: A handy file search tool RPMs: catfish Size: 177998 bytes Size change: -376 bytes Changelog: * Mon Apr 04 2016 Mamoru TASAKA - 1.4.2-1 - 1.4.2 Package: ccsm-1:0.8.12.3.0-2.fc24 Old package: ccsm-1:0.8.12.3.0-1.fc24 Summary: Plugin and configuration tool - Compiz Fusion Project RPMs
[Test-Announce] 2016-04-11 @ 15:00 UTC - Fedora QA Meeting
# Fedora Quality Assurance Meeting # Date: 2016-04-11 # Time: 15:00 UTC (https://fedoraproject.org/wiki/Infrastructure/UTCHowto) # Location: #fedora-meeting on irc.freenode.net Greetings testers! It's meeting time again on Monday! We have a few follow ups from last week and an upcoming Test Day, so we can have a quick meeting to check in. I'm hoping we'll be done in 30-40 minutes so we can have a break before blocker review. If anyone has any other items for the agenda, please reply to this email and suggest them! Thanks. == Proposed Agenda Topics == 1. Previous meeting follow-up * sumantro and arvind (new RH interns) to set up Test Day for Fedora Media Writer before Beta freeze * adamw and pschindl to oversee the Test Day and make sure planning is well underway by next week (2016-04-11), otherwise step in * adamw to get dgilmore to chime in on the ticket with his thoughts 2. Fedora 24 status 3. Test Day status 4. Open Floor -- Adam Williamson Fedora QA Community Monkey IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net http://www.happyassassin.net ___ test-announce mailing list test-annou...@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/test-annou...@lists.fedoraproject.org -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
[Test-Announce] 2016-04-04 @ 16:00 UTC - Fedora 24 Blocker Review
# F24 Blocker Review meeting # Date: 2016-04-11 # Time: 16:00 UTC # Location: #fedora-blocker-review on irc.freenode.net Hi folks! We have a few proposed blockers to review, so let's take a look at them. There is 1 proposed Beta blocker and there are 2 proposed Final blockers...so it might be a short meeting! (OK, OK, famous last words). If you have time this weekend, you can take a look at the proposed or accepted blockers before the meeting - the full lists can be found here: https://qa.fedoraproject.org/blockerbugs/ . Remember to check each outstanding milestone (Beta and Final). We'll be evaluating these bugs to see if they violate any of the Release Criteria and warrant the blocking of a release if they're not fixed. Information on the release criteria for F24 can be found on the wiki [0]. For more information about the Blocker and Freeze exception process, check out these links: - https://fedoraproject.org/wiki/QA:SOP_blocker_bug_process - https://fedoraproject.org/wiki/QA:SOP_freeze_exception_bug_process And for those of you who are curious how a Blocker Review Meeting works - or how it's supposed to go and you want to run one - check out the SOP on the wiki: - https://fedoraproject.org/wiki/QA:SOP_Blocker_Bug_Meeting Have a good weekend and see you on Monday! [0] https://fedoraproject.org/wiki/Fedora_Release_Criteria -- Adam Williamson Fedora QA Community Monkey IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net http://www.happyassassin.net ___ test-announce mailing list test-annou...@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/test-annou...@lists.fedoraproject.org -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Fedora rawhide compose report: 20160408.n.1 changes
OLD: Fedora-Rawhide-20160408.n.0 NEW: Fedora-Rawhide-20160408.n.1 = SUMMARY = Added packages: 0 Dropped packages:0 Upgraded packages: 80 Downgraded packages: 0 Size of added packages: 0.00 B Size of dropped packages:0.00 B Size of upgraded packages: 1.13 GiB Size of downgraded packages: 0.00 B Size change of upgraded packages: 4.32 MiB Size change of downgraded packages: 0.00 B = ADDED PACKAGES = = DROPPED PACKAGES = = UPGRADED PACKAGES = Package: GAPDoc-1.5.1-10.fc25 Old package: GAPDoc-1.5.1-9.fc24 Summary: GAP documentation tool RPMs: GAPDoc GAPDoc-latex Added RPMs: GAPDoc-latex Size: 1401740 bytes Size change: bytes Changelog: * Thu Apr 07 2016 Jerry James - 1.5.1-10 - Rebuild for gap 4.8.3 - Split out LaTeX dependencies into a -latex subpackage Package: apache-poi-3.14-1.fc25 Old package: apache-poi-3.13-2.fc24 Summary: The Java API for Microsoft Documents RPMs: apache-poi apache-poi-javadoc Size: 14021336 bytes Size change: 650084 bytes Changelog: * Wed Mar 16 2016 gil cattaneo 3.14-1 - Update to 3.14 Package: apacheds-2.0.0-0.3.M21.fc25 Old package: apacheds-2.0.0-0.2.M21.fc24 Summary: Apache Directory Server RPMs: apacheds apacheds-core apacheds-http-integration apacheds-i18n apacheds-javadoc apacheds-kerberos apacheds-osgi apacheds-protocols apacheds-server apacheds-service apacheds-wrapper Size: 4675922 bytes Size change: -1096 bytes Changelog: * Fri Apr 08 2016 gil cattaneo - 2.0.0-0.3.M21 - rebuilt Package: atoum-2.6.1-1.fc25 Old package: atoum-2.6.0-1.fc25 Summary: PHP Unit Testing framework RPMs: atoum Size: 403198 bytes Size change: 128 bytes Changelog: * Fri Apr 08 2016 Remi Collet - 2.6.1-1 - update to 2.6.1 Package: autossh-1.4e-3.fc25 Old package: autossh-1.4e-2.fc24 Summary: Utility to autorestart SSH tunnels RPMs: autossh Size: 105118 bytes Size change: 2720 bytes Changelog: * Wed Mar 23 2016 Ville Skytt - 1.4e-3 - Add systemd service Package: fontforge-20160404-2.fc25 Old package: fontforge-20160404-1.fc25 Summary: Outline and bitmap font editor RPMs: fontforge fontforge-devel fontforge-doc Size: 21308986 bytes Size change: 4484 bytes Changelog: * Wed Apr 06 2016 Parag Nemade - 20160404-2 - Move from python2 to python3 support Package: gap-4.8.3-1.fc25 Old package: gap-4.7.9-2.fc24 Summary: Computational discrete algebra RPMs: gap gap-core gap-devel gap-libs gap-online-help gap-vim Size: 59513566 bytes Size change: 1781964 bytes Changelog: * Thu Apr 07 2016 Jerry James - 4.8.3-1 - New upstream release Package: gap-pkg-aclib-1.2-5.fc25 Old package: gap-pkg-aclib-1.2-4.fc24 Summary: Almost Crystallographic groups library for GAP RPMs: gap-pkg-aclib Size: 255418 bytes Size change: -1008 bytes Changelog: * Thu Apr 07 2016 Jerry James - 1.2-5 - Rebuild for gap 4.8.3 Package: gap-pkg-alnuth-3.0.0-6.fc25 Old package: gap-pkg-alnuth-3.0.0-5.fc24 Summary: Algebraic number theory for GAP RPMs: gap-pkg-alnuth Size: 397246 bytes Size change: -1272 bytes Changelog: * Thu Apr 07 2016 Jerry James - 3.0.0-6 - Rebuild for gap 4.8.3 Package: gap-pkg-atlasrep-1.5.1-1.fc25 Old package: gap-pkg-atlasrep-1.5.0-5.fc24 Summary: GAP interface to the Atlas of Group Representations RPMs: gap-pkg-atlasrep Size: 24257610 bytes Size change: 69028 bytes Changelog: * Thu Apr 07 2016 Jerry James - 1.5.1-1 - New upstream version Package: gap-pkg-autodoc-2016.03.08-1.fc25 Old package: gap-pkg-autodoc-2016.02.16-1.fc24 Summary: Generate documentation from GAP source code RPMs: gap-pkg-autodoc Size: 405970 bytes Size change: 29728 bytes Changelog: * Thu Apr 07 2016 Jerry James - 2016.03.08-1 - New upstream version (bz 1314938) Package: gap-pkg-autpgrp-1.6-5.fc25 Old package: gap-pkg-autpgrp-1.6-4.fc24 Summary: Compute the automorphism group of a p-Group in GAP RPMs: gap-pkg-autpgrp Size: 198478 bytes Size change: -1268 bytes Changelog: * Thu Apr 07 2016 Jerry James - 1.6-5 - Rebuild for gap 4.8.3 Package: gap-pkg-browse-1.8.6-6.fc25 Old package: gap-pkg-browse-1.8.6-5.fc24 Summary: GAP browser for 2-dimensional arrays of data RPMs: gap-pkg-browse Size: 3860906 bytes Size change: -1792 bytes Changelog: * Thu Apr 07 2016 Jerry James - 1.8.6-6 - Rebuild for gap 4.8.3 Package: gap-pkg-carat-2.1.4-4.fc25 Old package: gap-pkg-carat-2.1.4-3.fc24 Summary: GAP interface to CARAT RPMs: gap-pkg-carat Size: 179034 bytes Size change: -1256 bytes Changelog: * Thu Apr 07 2016 Jerry James - 2.1.4-4 - Rebuild for gap 4.8.3 Package: gap-pkg-congruence-1.1.1-4.fc25 Old package
Planned Outage: buildsystem and related - 2016-04-12 21:00 UTC
Planned Outage: buildsystem and related - 2016-04-12 21:00 UTC There will be an outage starting at 2016-04-12 21:00 UTC, which will last approximately 4 hours. To convert UTC to your local time, take a look at http://fedoraproject.org/wiki/Infrastructure/UTCHowto or run: date -d '2016-04-12 21:00 UTC' Reason for outage: We will be applying system updates and rebooting servers. During the outage window services may be up and down again as we reboot various servers. Affected Services: koji.fedoraproject.org pkgs.fedoraproject.org bodhi.fedoraproject.org apps.fedoraproject.org/koschei apps.fedoraproject.org/mdapi Services not listed are not affected by this outage. Contact Information: Ticket Link: https://fedorahosted.org/fedora-infrastructure/ticket/5226 Please join #fedora-admin or #fedora-noc on irc.freenode.net or add comments to the ticket for this outage above. pgpzrUceeTPA5.pgp Description: OpenPGP digital signature ___ devel-announce mailing list devel-annou...@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel-annou...@lists.fedoraproject.org -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Re: Summary/Minutes for today's FESCo meeting (2016-04-08)
On Sat, Apr 09, 2016 at 12:08:21AM +0530, Parag Nemade wrote: > https://meetbot.fedoraproject.org/fedora-meeting/2016-04-08/fesco.2016-04-08-17.00.log.html [...] 18:01:51 No one reads the FESCo minutes... ^ FALSE! :) -- Matthew Miller Fedora Project Leader -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Summary/Minutes for today's FESCo meeting (2016-04-08)
=== #fedora-meeting: FESCO (2016-04-08) === Meeting started by paragan at 17:00:07 UTC. The full logs are available at https://meetbot.fedoraproject.org/fedora-meeting/2016-04-08/fesco.2016-04-08-17.00.log.html . Meeting summary --- * init process (paragan, 17:00:07) * #1518 Software packaged in Fedora should not be allowed to implement DRM schemes that cannot be disabled (paragan, 17:03:11) * LINK: https://fedorahosted.org/fesco/ticket/1518 (paragan, 17:03:12) * AGREED: FESCo asserts that Firefox in its current incarnation meets its standard for Free Software for inclusion in Fedora. Other packages may be proposed on a case-by-case basis (5, 0, 0) (paragan, 17:11:47) * #1565 Fedora schedule must continue to track core library ABI or risk serious ABI implications (paragan, 17:13:32) * LINK: https://fedorahosted.org/fesco/ticket/1565 (paragan, 17:13:33) * AGREED: Fedora Schedule should always schedule mass rebuilds (if needed) after glibc final freeze. (5, 1, 0) (paragan, 18:12:30) * LINK: https://fedoraproject.org/wiki/Fedora_Release_Life_Cycle (nirik, 18:20:41) * Next week's chair (paragan, 18:28:46) * nirik to chair next week meeting (paragan, 18:30:10) * Open Floor (paragan, 18:30:22) Meeting ended at 18:34:44 UTC. Action Items Action Items, by person --- * **UNASSIGNED** * (none) People Present (lines said) --- * sgallagh (94) * dgilmore (71) * paragan (65) * codonell (61) * nirik (34) * number80 (19) * zodbot (13) * maxamillion (7) * kalev (0) * jwb (0) * jsmith (0) Generated by `MeetBot`_ 0.1.4 .. _`MeetBot`: http://wiki.debian.org/MeetBot -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Re: TPMs, measured boot and remote attestation in Fedora
On Fri, Apr 08, 2016 at 11:36:33AM +0200, Florian Weimer wrote: > On 04/08/2016 10:28 AM, Matthew Garrett wrote: > > With what we now know about malicious actors targeting the system boot > > chain (even down to the firmware), this kind of TPM-based work is a > > vital part of helping keep our users secure. > > On the other hand, it can easily be abused to restrict user freedom. > For example, video streaming sites might not be willing to serve content > to users who cannot cryptographically prove they are running an approved > operating system with an approved browser. The practical issues around enforcing this kind of remote attestation have proven to be sufficiently intractable that literally nobody has ever ended up doing it (I thought Netflix had for ChromeOS devices - it turned out I was wrong). > Remote attestation only works with a trusted counterpart who rejects > access once a breach is detected. Who do you expect to be the > counterpart for Fedora users? Is there anyone who offers such a service > without also requiring to use their own operating system? Openstack has some support for this, although I wouldn't recommend using it. The setup I'm envisaging is for server deployments within a single administrative domain - this way it's entirely under the control of whoever controls the machines anyway. -- Matthew Garrett | mj...@srcf.ucam.org -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Re: TPMs, measured boot and remote attestation in Fedora
On Fri, Apr 08, 2016 at 09:23:07AM +, Petr Pisar wrote: > I'm curious how you would predict hash of initramfs because it is > generated on the host and depends on dracut configuration and presence > of various optionally installed packages. initrd is certainly a more difficult one. One thing we can do is work on making dracut builds reproducible - that way they should be consistent across identical machines in a cluster. -- Matthew Garrett | mj...@srcf.ucam.org -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Re: TPMs, measured boot and remote attestation in Fedora
On Fri, Apr 08, 2016 at 09:09:23AM +, Gregory Maxwell wrote: > The TPM style of remote attest is quite unfriendly to free software. > It puts basically the entire operating system in the trusted domain, > and you cannot change even a bit of it without "breaking the seal". > So if you want any use of remote attest at all, there is a huge swath > of your system which are are "compelled" under threat of loss of > access to whatever functionality remote-attest was providing to make > no modification-- or even, potentially, no upgrade to a very new or > less common version. Remote attestation is primarily useful within a single administrative domain. Outside that case it's far too easy to subvert (easiest approach: simply add a second TPM to your system and program whatever PCRs you want), and the privacy concerns remain sufficiently problematic that I don't see anybody pushing for it in the near future. > I think any time invested to make remote attest of any kind work would > better be spent on support for Intel SGX, which creates limited > remote-attestable sandboxes which (assuming Intel made no mistakes :) > ) have strong security and confidentiality regardless of what else is > running on the system. These sandboxes also have no outside access > except via limited channels, so (again assuming no mistakes/backdoors > on Intel's part); and the published security model is stronger (e.g. > encrypted ram) and more suitable for user-friendly uses (for example, > it would be straight-forward to use SGX to implement a bitcoin wallet > that could enforce user specified transfer limits, even against a > total security compromise of the host-- and if the RA part is as > usuable as it could be, even prove to third party auditors that your > keys have these security properties (the RA functionality for SGX is > not yet documented in public, AFAIK)). SGX has some interesting properties, but it's unhelpful in the rather more common case of "I'm running a bunch of servers and I want to know that they're trustworthy before I give them access to resources". Rearchitecting a large number of apps into a more SGXy world is a far from trivial task. -- Matthew Garrett | mj...@srcf.ucam.org -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Re: weakdeps and the buildroot
On Friday, April 8, 2016 1:02:40 PM CDT Vít Ondruch wrote: > This applies just for Rawhide, right? > > Vít Nope, we have no way to set it for just one target. everything using dnf has it set. Dennis > Dne 7.4.2016 v 18:40 Dennis Gilmore napsal(a): > > Hi All, > > > > Following the decision of FPC that weak deps must not be installed > > into the > > > buildroot[1] koji has been changed to set install_weak_deps to 0. What > > this > > > means is that some builds may fail due to missing things. if you > > encounter > > > this the correct fix is to add BuildRequires to you package for > > everything you > > > explicitly need to build > > > > Regards > > > > Dennis > > > > > > [1] https://meetbot.fedoraproject.org/fedora-meeting-1/2016-03-24/fpc. > > 2016-03-24-16.01.log.html > > > > > > ___ > > devel-announce mailing list > > devel-annou...@lists.fedoraproject.org > > http://lists.fedoraproject.org/admin/lists/devel-announce@lists.fedoraprojec > t.org > > -- > > devel mailing list > > devel@lists.fedoraproject.org > > http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org signature.asc Description: This is a digitally signed message part. -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Fedora 24-20160408.n.0 compose check report
Missing expected images: Kde live i386 Workstation live i386 Kde live x86_64 Cloud_base raw-xz x86_64 Cloud_base raw-xz i386 Atomic raw-xz x86_64 Workstation live x86_64 No images in this compose but not 24-20160407.n.2 No images in 24-20160407.n.2 but not this. Failed openQA tests: 3/53 (x86_64), 14/15 (i386) ID: 12204 Test: x86_64 universal install_updates_img_local URL: https://openqa.fedoraproject.org/tests/12204 ID: 12201 Test: i386 universal install_package_set_kde URL: https://openqa.fedoraproject.org/tests/12201 ID: 12199 Test: i386 universal upgrade_desktop_32bit URL: https://openqa.fedoraproject.org/tests/12199 ID: 12198 Test: i386 universal install_lvmthin URL: https://openqa.fedoraproject.org/tests/12198 ID: 12197 Test: i386 universal install_ext3 URL: https://openqa.fedoraproject.org/tests/12197 ID: 12196 Test: i386 universal install_btrfs URL: https://openqa.fedoraproject.org/tests/12196 ID: 12195 Test: i386 universal install_software_raid URL: https://openqa.fedoraproject.org/tests/12195 ID: 12194 Test: i386 universal install_simple_encrypted URL: https://openqa.fedoraproject.org/tests/12194 ID: 12193 Test: i386 universal install_scsi_updates_img URL: https://openqa.fedoraproject.org/tests/12193 ID: 12192 Test: i386 universal install_repository_http_graphical URL: https://openqa.fedoraproject.org/tests/12192 ID: 12191 Test: i386 universal install_package_set_minimal URL: https://openqa.fedoraproject.org/tests/12191 ID: 12190 Test: x86_64 universal install_scsi_updates_img URL: https://openqa.fedoraproject.org/tests/12190 ID: 12172 Test: x86_64 universal install_kickstart_hdd URL: https://openqa.fedoraproject.org/tests/12172 ID: 12148 Test: i386 Workstation-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/12148 ID: 12147 Test: i386 Everything-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/12147 ID: 12144 Test: i386 Server-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/12144 ID: 12139 Test: i386 Server-dvd-iso install_default URL: https://openqa.fedoraproject.org/tests/12139 Passed openQA tests: 50/53 (x86_64), 1/15 (i386) -- Mail generated by check-compose: https://git.fedorahosted.org/cgit/fedora-qa.git/tree/check-compose -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Re: TPMs, measured boot and remote attestation in Fedora
On Fri, Apr 8, 2016, at 05:36 AM, Florian Weimer wrote: > Remote attestation only works with a trusted counterpart who rejects > access once a breach is detected. Who do you expect to be the > counterpart for Fedora users? Is there anyone who offers such a service > without also requiring to use their own operating system? A use case for this is having Kubernetes cluster masters request attestation, and worker nodes provide it. One could s/Kubernetes/any other clustering system/, but it's a modern example. -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Fedora Rawhide-20160408.n.0 compose check report
Missing expected images: Kde live i386 Workstation live i386 Kde live x86_64 Cloud_base raw-xz x86_64 Cloud_base raw-xz i386 Atomic raw-xz x86_64 Kde raw-xz armhfp Workstation live x86_64 No images in this compose but not Rawhide-20160407.n.5 No images in Rawhide-20160407.n.5 but not this. Failed openQA tests: 7/53 (x86_64), 15/15 (i386) ID: 12133 Test: x86_64 universal install_updates_img_local URL: https://openqa.fedoraproject.org/tests/12133 ID: 12129 Test: i386 universal install_package_set_kde URL: https://openqa.fedoraproject.org/tests/12129 ID: 12128 Test: i386 universal upgrade_2_desktop_32bit URL: https://openqa.fedoraproject.org/tests/12128 ID: 12127 Test: i386 universal upgrade_desktop_32bit URL: https://openqa.fedoraproject.org/tests/12127 ID: 12126 Test: i386 universal install_lvmthin URL: https://openqa.fedoraproject.org/tests/12126 ID: 12125 Test: i386 universal install_ext3 URL: https://openqa.fedoraproject.org/tests/12125 ID: 12124 Test: i386 universal install_btrfs URL: https://openqa.fedoraproject.org/tests/12124 ID: 12123 Test: i386 universal install_software_raid URL: https://openqa.fedoraproject.org/tests/12123 ID: 12122 Test: i386 universal install_simple_encrypted URL: https://openqa.fedoraproject.org/tests/12122 ID: 12121 Test: i386 universal install_scsi_updates_img URL: https://openqa.fedoraproject.org/tests/12121 ID: 12120 Test: i386 universal install_repository_http_graphical URL: https://openqa.fedoraproject.org/tests/12120 ID: 12119 Test: i386 universal install_package_set_minimal URL: https://openqa.fedoraproject.org/tests/12119 ID: 12118 Test: x86_64 universal install_scsi_updates_img URL: https://openqa.fedoraproject.org/tests/12118 ID: 12110 Test: x86_64 universal install_kickstart_firewall_configured URL: https://openqa.fedoraproject.org/tests/12110 ID: 12108 Test: x86_64 universal install_european_language URL: https://openqa.fedoraproject.org/tests/12108 ID: 12101 Test: x86_64 universal upgrade_minimal_64bit URL: https://openqa.fedoraproject.org/tests/12101 ID: 12100 Test: x86_64 universal install_kickstart_hdd URL: https://openqa.fedoraproject.org/tests/12100 ID: 12089 Test: x86_64 universal install_package_set_kde URL: https://openqa.fedoraproject.org/tests/12089 ID: 12076 Test: i386 Server-dvd-iso install_default URL: https://openqa.fedoraproject.org/tests/12076 ID: 12071 Test: i386 Workstation-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/12071 ID: 12070 Test: i386 Everything-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/12070 ID: 12064 Test: i386 Server-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/12064 Passed openQA tests: 46/53 (x86_64) -- Mail generated by check-compose: https://git.fedorahosted.org/cgit/fedora-qa.git/tree/check-compose -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Re: TPMs, measured boot and remote attestation in Fedora
On Fri, Apr 8, 2016, at 05:23 AM, Petr Pisar wrote: > I'm curious how you would predict hash of initramfs because it is > generated on the host and depends on dracut configuration and presence > of various optionally installed packages. That's true for a system managed by yum/dnf, but rpm-ostree (as used by Fedora Atomic Host), always uses host-independent initramfs images. -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Re: Schedule for Friday's FESCo Meeting (2016-04-08)
On 04/08/2016 12:30 AM, Parag Nemade wrote: > Hi, >Please note that I feel only one ticket is there in this week that > need discussion. If any other existing open ticket need to be > discussed then we can discuss that in the meeting but I am adding only > one new ticket on the Agenda of this meeting. > > > Following is the list of topics that will be discussed in the FESCo > meeting Friday at 17:00UTC in #fedora-meeting on irc.freenode.net. > > To convert UTC to your local time, take a look at > http://fedoraproject.org/wiki/UTCHowto > > or run: > date -d '2016-04-08 17:00 UTC' > > > Links to all tickets below can be found at: > https://fedorahosted.org/fesco/report/9 > > = New business = > > #topic #1565 Fedora schedule must continue to track core library ABI > or risk serious ABI implications > .fesco 1565 > https://fedorahosted.org/fesco/ticket/1565 > What happened to ticket 1518? I think we need to at least make a final decision and assertion to answer the remaining question. signature.asc Description: OpenPGP digital signature -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Fedora 24 compose report: 20160408.n.0 changes
OLD: Fedora-24-20160407.n.2 NEW: Fedora-24-20160408.n.0 = SUMMARY = Added packages: 0 Dropped packages:0 Upgraded packages: 0 Downgraded packages: 0 Size of added packages: 0.00 B Size of dropped packages:0.00 B Size of upgraded packages: 0.00 B Size of downgraded packages: 0.00 B Size change of upgraded packages: 0.00 B Size change of downgraded packages: 0.00 B = ADDED PACKAGES = = DROPPED PACKAGES = = UPGRADED PACKAGES = = DOWNGRADED PACKAGES = Broken deps for armhfp -- [IBSimu] IBSimu-1.0.5-11.b.fc23.armv7hl requires libgsl.so.0 [IQmol] IQmol-2.3.0-9.fc24.armv7hl requires libOpenMeshCore.so.3.2 IQmol-2.3.0-9.fc24.armv7hl requires libboost_iostreams.so.1.58.0 IQmol-2.3.0-9.fc24.armv7hl requires libboost_serialization.so.1.58.0 [ape] ape-2.2.0-2.fc22.armv7hl requires libgsl.so.0 [bangarang] bangarang-2.1-9.fc24.armv7hl requires libnepomuk.so.4 [coin-or-Bonmin] coin-or-Bonmin-1.8.1-8.fc24.armv7hl requires libasl.so.1 coin-or-Bonmin-1.8.1-8.fc24.armv7hl requires libmp.so.1 [coin-or-Couenne] coin-or-Couenne-0.5.2-6.fc23.armv7hl requires libasl.so.1 coin-or-Couenne-0.5.2-6.fc23.armv7hl requires libmp.so.1 [coin-or-OS] coin-or-OS-2.9.3-5.fc23.armv7hl requires libasl.so.1 coin-or-OS-2.9.3-5.fc23.armv7hl requires libmp.so.1 [coot] coot-0.8.2-1.fc24.armv7hl requires libgsl.so.0 [docker-registry] docker-registry-0.9.1-5.fc24.noarch requires python-docker-registry-core >= 0:2.0.2-1 [eclipse-jbosstools] eclipse-jbosstools-as-4.2.2-1.fc22.noarch requires osgi(org.eclipse.tm.terminal) [ejabberd] ejabberd-16.01-4.fc24.armv7hl requires erlang-asn1(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-cache_tab(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-compiler(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-crypto(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-eldap(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-erts(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-inets(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-jiffy(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-kernel(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-lager(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-mnesia(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-oauth2(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-odbc(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-p1_iconv(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-p1_mysql(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-p1_pam(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-p1_pgsql(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-p1_sip(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-p1_stringprep(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-p1_stun(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-p1_tls(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-p1_utils(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-p1_xml(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-p1_yaml(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-p1_zlib(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-public_key(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-riak_client(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-sasl(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-ssl(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-stdlib(armv7hnl-32) ejabberd-16.01-4.fc24.armv7hl requires erlang-syntax_tools(armv7hnl-32) [erlang-basho_metrics] erlang-basho_metrics-1.0.0-24.fc24.armv7hl requires erlang(erl_nif_version) = 0:2.10 erlang-basho_metrics-1.0.0-24.fc24.armv7hl requires erlang-erts(armv7hnl-32) erlang-basho_metrics-1.0.0-24.fc24.armv7hl requires erlang-kernel(armv7hnl-32) erlang-basho_metrics-1.0.0-24.fc24.armv7hl requires erlang-stdlib(armv7hnl-32) [erlang-bitcask] erlang-bitcask-1.6.3-10.fc24.armv7hl requires erlang(erl_nif_version) = 0:2.10 erlang-bitcask-1.6.3-10.fc24.armv7hl requires erlang-erts(armv7hnl-32) erlang-bitcask-1.6.3-10.fc24.armv7hl requires erlang-kernel(armv7hnl-32) erlang-bitcask-1.6.3-10.fc24.armv7hl requires erlang-stdlib(armv7hnl-32) [gcc-python-plugin] gcc-python2-debug-plugin-0.15-2.fc24.armv7hl requires gcc = 0:6.0.0-0.12.fc24 gcc-python2-plugin-0.15-2.fc24.armv7hl requires gcc = 0:6.0.0-0.12.f
Fwd: Broken dependencies: trustedqsl
I not sure what's going on here. I keep getting these emails but it's showing fc24 but I've built a rawhide package since then (showing fc25 dist tag): http://koji.fedoraproject.org/koji/buildinfo?buildID=750028 trustedqsl has broken dependencies in the rawhide tree: On x86_64: tqsllib-devel-2.4-11.fc24.1.x86_64 requires tqsllib(x86-64) = 0:2.4-11.fc24 On i386: tqsllib-devel-2.4-11.fc24.1.i686 requires tqsllib(x86-32) = 0:2.4-11.fc24 On armhfp: tqsllib-devel-2.4-11.fc24.1.armv7hl requires tqsllib(armv7hl-32) = 0:2.4-11.fc24 Please resolve this as soon as possible. -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Re: No Rich boolean deps in Requires/Recommends for f24
> From: "Kevin Fenzi" > On Thu, 7 Apr 2016 07:54:36 -0400 > Neal Gompa wrote: > > On Thu, Apr 7, 2016 at 7:37 AM, Stephen Gallagher > > wrote: > > > On 04/06/2016 04:49 AM, Jason L Tibbitts III wrote: > > >>> "PP" == Petr Pisar writes: > > >> > > >> PP> This changes meaning regarding to F25. Previous text banned > > >> PP> rich strong dependencies in F24 only. This current text > > >> PP> extends the ban to all Fedoras. > > >> > > >> PP> Is that intentional? > > >> > > >> It's currently correct according to FESCo's request as I > > >> understood it. While f25 might still be able to compose, if the > > >> tools aren't fixed before the next branch then we'll have to back > > >> things out or end up back in a situation where we can't mash > > >> updates. > > > > > > I'd say it's fine for now. Our *hope* is that we will be able to > > > support them for F25 at some point, but composes *right now* > > > probably don't work, so I think this wording is fine. > > > So you don't expect that mash could be fixed/replaced before the F24 > > release in June, then? I've talked to relengs and port of mash [1] will not happen any time soon. In best case it should make composes for F25. This is more complicated as pungi, mash and signed repos are linked together and the replacement of whole releng tools will not happen in a day. They plan bigger refactoring during the migration of these tools and replace them one by one. We are trying to allocate resources to make this done. Pungi-5 is almost ready to replace current yum based version and making a library from mash using DNF would probably take 1 man-month. Honza [1] https://bugzilla.redhat.com/show_bug.cgi?id=1156546 -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Re: weakdeps and the buildroot
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 This applies just for Rawhide, right? Vít Dne 7.4.2016 v 18:40 Dennis Gilmore napsal(a): > Hi All, > > Following the decision of FPC that weak deps must not be installed into the > buildroot[1] koji has been changed to set install_weak_deps to 0. What this > means is that some builds may fail due to missing things. if you encounter > this the correct fix is to add BuildRequires to you package for everything you > explicitly need to build > > Regards > > Dennis > > > [1] https://meetbot.fedoraproject.org/fedora-meeting-1/2016-03-24/fpc. > 2016-03-24-16.01.log.html > > > ___ > devel-announce mailing list > devel-annou...@lists.fedoraproject.org > http://lists.fedoraproject.org/admin/lists/devel-annou...@lists.fedoraproject.org > > > -- > devel mailing list > devel@lists.fedoraproject.org > http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJXB4/JAAoJEAzgnueZF7h8cT0P/jP4j18X6+aJ29K21FtsX9ND N1kgEA4KzEfhPjawKgrN8s3qyc72KHZIQK8FBjLI2ZRx77NifwE96nOdH4JpGSpQ OFosp6DCiYw0GEE9Tl5E23GNGe1hxrSFk4xKXk8djMU5F2+oKlbwbguZ3SL2felJ smm7YayJ2BFK6grg8hgVcFQrhxlefbM/AS2ZRJhVJLFR4PeVv2OH5pZFcqW/tIik ipKfYFZVj9NMyEro7HD5vV3dqqVrbz7dqo0WjTcAsk9aRcPP3RYnCK8f+7vnjfzo 7c5i1x783qEKwrlbkDY+zdPLhJgBSs5sOaMCmdbherQ+SRf1e9DWpxC7H97sDBrZ vWtyS9ZpIoZAaYv2RLy/7QG6U5H11I/kAG+U33YCVk4kPA158RIQHHyfbHPvRLg7 ytswBwnAWV8vR7lwu8Dn2CLs59JSk/eT/n23io5MKXD6UM7fYt8RGuUQ1v8Ki4e5 F6vA579Z8p4TChF+Cc2uHE9srjuZjG1O2BGdjsBSwKXiiNeYuUKfJwYEfQRf4+VT /JZsXo3Ogt3iMw4W/gZO2idWTQ3EPgZL5Umk+1i4cx0T+sGW9QxwUwOxHURVuN1R 6xkbQWMzQdXuzOVpOgzw7iONte9iDNuWWdtBVRbeiqcDDkfLeu3qua9qLdyfoaqM auBnsfmEjjQACwnLEg1C =f7lG -END PGP SIGNATURE- -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Fedora rawhide compose report: 20160408.n.0 changes
OLD: Fedora-Rawhide-20160407.n.5 NEW: Fedora-Rawhide-20160408.n.0 = SUMMARY = Added packages: 1 Dropped packages:1 Upgraded packages: 19 Downgraded packages: 0 Size of added packages: 340.24 KiB Size of dropped packages:762.26 KiB Size of upgraded packages: 324.88 MiB Size of downgraded packages: 0.00 B Size change of upgraded packages: 7.50 MiB Size change of downgraded packages: 0.00 B = ADDED PACKAGES = Package: ndctl-52-1.fc25 Summary: Manage "libnvdimm" subsystem devices (Non-volatile Memory) RPMs:ndctl ndctl-devel ndctl-libs Size:348402 bytes = DROPPED PACKAGES = Package: cryptobone-1.0.1-10.fc25 Summary: Secure Communication Under Your Control RPMs:cryptobone Size:780550 bytes = UPGRADED PACKAGES = Package: bouncycastle-mail-1.54-1.fc25 Old package: bouncycastle-mail-1.52-7.fc24 Summary: S/MIME and CMS libraries for Bouncy Castle RPMs: bouncycastle-mail bouncycastle-mail-javadoc Size: 238012 bytes Size change: 40240 bytes Changelog: * Thu Apr 07 2016 Mat Booth - 1.54-1 - Update to 1.54, fixes rhbz#1275175 - Install with mvn_install - Allow tests to run Package: bouncycastle-pg-1.54-1.fc25 Old package: bouncycastle-pg-1.52-9.fc24 Summary: Bouncy Castle OpenPGP API RPMs: bouncycastle-pg bouncycastle-pg-javadoc Size: 610896 bytes Size change: 5100 bytes Changelog: * Thu Apr 07 2016 Mat Booth - 1.54-1 - Update to 1.54 - Fix most of the test failures Package: bouncycastle-pkix-1.54-1.fc25 Old package: bouncycastle-pkix-1.52-8.fc24 Summary: Bouncy Castle PKIX, CMS, EAC, TSP, PKCS, OCSP, CMP, and CRMF APIs RPMs: bouncycastle-pkix bouncycastle-pkix-javadoc Size: 1265924 bytes Size change: 48784 bytes Changelog: * Thu Apr 07 2016 Mat Booth - 1.54-1 - Update to 1.54, fixes rhbz#1275172 - Install with mvn_install - Move some tests that were erroneously in the main jar, avoids a runtime dep on junit in OSGi metadata - Fix most of the test failures Package: kernel-4.6.0-0.rc2.git3.1.fc25 Old package: kernel-4.6.0-0.rc2.git2.1.fc25 Summary: The Linux kernel RPMs: kernel kernel-PAE kernel-PAE-core kernel-PAE-devel kernel-PAE-modules kernel-PAE-modules-extra kernel-core kernel-cross-headers kernel-devel kernel-headers kernel-lpae kernel-lpae-core kernel-lpae-devel kernel-lpae-modules kernel-lpae-modules-extra kernel-modules kernel-modules-extra kernel-tools kernel-tools-libs kernel-tools-libs-devel perf python-perf Size: 282496372 bytes Size change: 1092 bytes Changelog: * Thu Apr 07 2016 Justin M. Forbes - 4.6.0-0.rc2.git3.1 - Linux v4.6-rc2-88-gc4004b0 Package: libcdaudio-0.99.12p2-23.fc25 Old package: libcdaudio-0.99.12p2-22.fc24 Summary: Control operation of a CD-ROM when playing audio CDs RPMs: libcdaudio libcdaudio-devel Size: 202036 bytes Size change: 12988 bytes Changelog: * Thu Apr 07 2016 S??rgio Basto - 0.99.12p2-23 - Add license tag. - Add patch libcdaudio-0.99.12-segfault.patch, from https://sourceforge.net/p/libcdaudio/patches/5/ - Spec clean-up. Package: libmlx4-1.0.6-5.fc25 Old package: libmlx4-1.0.6-4.fc24 Summary: Mellanox ConnectX InfiniBand HCA Userspace Driver RPMs: libmlx4 libmlx4-static Size: 184940 bytes Size change: -13240 bytes Changelog: * Thu Mar 31 2016 Honggang Li - 1.0.6-5 - Rebuild against latest libibverbs - Backport RHEL7 patches - Move modprobe and setup script to rdma package Package: libreswan-3.17-1.fc25 Old package: libreswan-3.16-1.fc24 Summary: IPsec implementation with IKEv1 and IKEv2 keying protocols RPMs: libreswan Size: 3424050 bytes Size change: -10256 bytes Changelog: * Thu Feb 04 2016 Fedora Release Engineering - 3.16-1.1 - Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild * Thu Apr 07 2016 Paul Wouters - 3.17-1 - Updated to 3.17 for CVE-2016-3071 - Disable LIBCAP_NG as it prevents unbound-control from working properly - Temporarilly disable WERROR due to a few minor known issues Package: mapnik-3.0.10-2.fc25 Old package: mapnik-3.0.10-1.fc25 Summary: Free Toolkit for developing mapping applications RPMs: mapnik mapnik-demo mapnik-devel mapnik-static mapnik-utils Size: 17563394 bytes Size change: -50468 bytes Changelog: * Thu Apr 07 2016 Tom Hughes - 3.0.10-2 - Add patch for regression round-tripping empty strings - Require libxml2-devel from mapnik-devel Package: maven-3.3.9-4.fc25 Old package: maven-3.3.9-3.fc24 Summary: Java project management and project comprehension tool RPMs: maven maven-javadoc Size: 2921856 bytes Size change: -2028 bytes Changelog: * Thu Apr 07 2016 Mikolaj Izdebski - 3.3.9-4 - Force SLF4J SimpleLogger re-initialization - Resolves: rhbz#1324832 Package: pki-console-10.3.0.a2-
Re: TPMs, measured boot and remote attestation in Fedora
On 04/08/2016 10:28 AM, Matthew Garrett wrote: > With what we now know about malicious actors targeting the system boot > chain (even down to the firmware), this kind of TPM-based work is a > vital part of helping keep our users secure. On the other hand, it can easily be abused to restrict user freedom. For example, video streaming sites might not be willing to serve content to users who cannot cryptographically prove they are running an approved operating system with an approved browser. Remote attestation only works with a trusted counterpart who rejects access once a breach is detected. Who do you expect to be the counterpart for Fedora users? Is there anyone who offers such a service without also requiring to use their own operating system? Florian -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Re: TPMs, measured boot and remote attestation in Fedora
On 2016-04-08, Matthew Garrett wrote: > Doing this well involves knowing what the expected values are to begin > with. Some of these values come from the firmware, and so we can't do > much about them without the assistance of the system vendors. But these > values don't tend to change over the course of a system's lifetime > (unless you update the firmware), so it's much easier to do something > about that. Other components *do* change over time as we update grub or > the kernel, and it's immensely helpful to be able to identify these > ahead of time. > > In CoreOS we've started shipping bundles of the expected PCR values with > each release. I'd like to start exploring how to do the same in Fedora. > Things are much easier in CoreOS since we don't ship individual OS > components, and so the values are very much tied to OS releases - in > Fedora they'd mostly be associated with individual packages. It'd be > easy to bundle the values in with the packages themselves, but that's > harder for admins to extract. A central location to publish this kind of > metadata would be ideal. > I'm curious how you would predict hash of initramfs because it is generated on the host and depends on dracut configuration and presence of various optionally installed packages. -- Petr -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Re: TPMs, measured boot and remote attestation in Fedora
On Fri, Apr 8, 2016 at 8:28 AM, Matthew Garrett wrote: [snip] > Remote attestation is a mechanism by which a remote machine can request > (but not compel) another machine to provide evidence of the PCR state. > The TPM provides a signed bundle of information including the PCR values > and the event log, and the remote machine verifies that the signature > corresponds to the key it expected to see. The remote machine can then > examine the log, ensure that it matches the PCR values and analyse each > individual log entry to ensure that it matches an expected value. In a > data centre, this means that it can then flag whether a machine is > running in an expected state or not - if someone has tampered with the > boot process, the information will not match the policy. > > Doing this well involves knowing what the expected values are to begin > with. Some of these values come from the firmware, and so we can't do > much about them without the assistance of the system vendors. But these > values don't tend to change over the course of a system's lifetime > (unless you update the firmware), so it's much easier to do something > about that. Other components *do* change over time as we update grub or > the kernel, and it's immensely helpful to be able to identify these > ahead of time. The TPM style of remote attest is quite unfriendly to free software. It puts basically the entire operating system in the trusted domain, and you cannot change even a bit of it without "breaking the seal". So if you want any use of remote attest at all, there is a huge swath of your system which are are "compelled" under threat of loss of access to whatever functionality remote-attest was providing to make no modification-- or even, potentially, no upgrade to a very new or less common version. Even if it is not overtly used in user-hostile ways, many applications of this would make opaque proprietary operating systems on a much more even playing field with Free Software. I think any time invested to make remote attest of any kind work would better be spent on support for Intel SGX, which creates limited remote-attestable sandboxes which (assuming Intel made no mistakes :) ) have strong security and confidentiality regardless of what else is running on the system. These sandboxes also have no outside access except via limited channels, so (again assuming no mistakes/backdoors on Intel's part); and the published security model is stronger (e.g. encrypted ram) and more suitable for user-friendly uses (for example, it would be straight-forward to use SGX to implement a bitcoin wallet that could enforce user specified transfer limits, even against a total security compromise of the host-- and if the RA part is as usuable as it could be, even prove to third party auditors that your keys have these security properties (the RA functionality for SGX is not yet documented in public, AFAIK)). -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
TPMs, measured boot and remote attestation in Fedora
Some people who installed the Fedora 24 Alpha from scratch on bare-metal BIOS-based systems may have found that their system didn't boot. Sorry about that - it's my fault, and it's fixed now. But it happened as a result of some new code in grub that gives us some really exciting functionality. Trusted Platform Modules (or TPMs) are small devices that sit on many system motherboards. They're usually attached over the LPC bus, which means two things: 1) Communicating with them isn't very fast 2) There's no support for device-initiated DMA, which means there's no way they can directly read system state Measured boot is a process whereby each component in the boot chain "measures" the next component. In the TPM 1.x world (which is where most of us still are), that measurement is in the form of a SHA1 hash of the next component. So, on a BIOS system, the firmware measures itself, the firmware measures its configuration, the firmware measures any option ROMs on plugin cards, the firmware measures the MBR of the disk, the MBR measures the grub stage 1, the grub stage 1 measures the grub stage 2, the grub stage 2 measures the kernel and so on. Each of these measurements is written into a register on the TPM called a Platform Configuration Register, or PCR. Attempting to write to a PCR doesn't directly replace the old contents with the new value. Instead, the TPM concatenates the two values and stores the SHA1 of that concatenated value. Unless you've comprehensively broken SHA1, there's no way for you to set a PCR to a specific value unless you perform exactly the same set of writes. Each of these writes is logged. The log includes the hash that was written to the TPM, an event type and a description of the event. TPMs initialise their PCRs in a known state, so by emulating the behaviour of the TPM and replaying the entries in the log, you can verify that the TPM reached the state it's in by performing the actions recorded in the log. TPMs can be configured to encrypt data or keys in such a way that they will only decrypt or use them if the PCRs are set to specific values. With grub measuring the boot process, this means that you can encrypt a secret in such a way that the TPM will only decrypt it when the values match. An example of using this for boot security is TPMTOTP (https://github.com/mjg59/tpmtotp) which provides a direct mechanism for a user to verify that their boot process (including firmware) has not been tampered with. Remote attestation is a mechanism by which a remote machine can request (but not compel) another machine to provide evidence of the PCR state. The TPM provides a signed bundle of information including the PCR values and the event log, and the remote machine verifies that the signature corresponds to the key it expected to see. The remote machine can then examine the log, ensure that it matches the PCR values and analyse each individual log entry to ensure that it matches an expected value. In a data centre, this means that it can then flag whether a machine is running in an expected state or not - if someone has tampered with the boot process, the information will not match the policy. Doing this well involves knowing what the expected values are to begin with. Some of these values come from the firmware, and so we can't do much about them without the assistance of the system vendors. But these values don't tend to change over the course of a system's lifetime (unless you update the firmware), so it's much easier to do something about that. Other components *do* change over time as we update grub or the kernel, and it's immensely helpful to be able to identify these ahead of time. In CoreOS we've started shipping bundles of the expected PCR values with each release. I'd like to start exploring how to do the same in Fedora. Things are much easier in CoreOS since we don't ship individual OS components, and so the values are very much tied to OS releases - in Fedora they'd mostly be associated with individual packages. It'd be easy to bundle the values in with the packages themselves, but that's harder for admins to extract. A central location to publish this kind of metadata would be ideal. With what we now know about malicious actors targeting the system boot chain (even down to the firmware), this kind of TPM-based work is a vital part of helping keep our users secure. The remote attestation features also make it easier for admins to keep their data centres secure. We have an opportunity here to make Fedora the first general-purpose operating system to provide resistance to this kind of attack out of the box, and I think it's worth taking it. There's still some additional work to do, such as making it possible to assign local policy to which things get logged into which PCR. But I think we're in a great position to start developing well-integrated features that take advantage of this kind of hardware-level secur
Re: weakdeps and the buildroot
Dne 8.4.2016 v 04:03 Ralf Corsepius napsal(a): > Has this change and the mapping which buildroot uses dnf rsp. yum been > reflected to the mock packages [1]? Yes. Mock used DNF for rawhide for ages to test this setup before it landed in Koji and we have been waiting for necessary code change in Koji and once Koji enabled it for rawhide and F24 targets, we enabled it for F24 in Mock too. > [1] IMHO, the different incarnations of mock-packages and their target > mock-configurations should match the situation in > the buildroots 1:1 as close as possible. This is my goal too. If you are aware of some configuration in Koji, which differ from default Mock config, then feel free to open BZ. However there are some settings, which will likely remain different. E.g: Koji: config_opts['plugin_conf']['root_cache_enable'] = False Mock: config_opts['plugin_conf']['root_cache_enable'] = True Disabling this by default will affect the packagers and have big impact on default performance. Lots of people will be forced to enable it manually. So it is better that only Koji (and Copr) disable it. -- Miroslav Suchy, RHCA Red Hat, Senior Software Engineer, #brno, #devexp, #fedora-buildsys -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
Fedora Rawhide-20160407.n.5 compose check report
Missing expected images: Kde live i386 Workstation live i386 Kde live x86_64 Cloud_base raw-xz x86_64 Cloud_base raw-xz i386 Atomic raw-xz x86_64 Kde raw-xz armhfp Workstation live x86_64 Images in this compose but not Rawhide-20160331.n.0: Minimal raw-xz armhfp Soas raw-xz armhfp Xfce raw-xz armhfp Lxde raw-xz armhfp Server raw-xz armhfp Docker_base docker x86_64 No images in Rawhide-20160331.n.0 but not this. Failed openQA tests: 11/53 (x86_64), 15/15 (i386) ID: 12059 Test: x86_64 universal install_updates_img_local URL: https://openqa.fedoraproject.org/tests/12059 ID: 12058 Test: x86_64 Server-dvd-iso base_service_manipulation URL: https://openqa.fedoraproject.org/tests/12058 ID: 12057 Test: x86_64 Server-dvd-iso base_services_start URL: https://openqa.fedoraproject.org/tests/12057 ID: 12056 Test: x86_64 Server-dvd-iso base_selinux URL: https://openqa.fedoraproject.org/tests/12056 ID: 12048 Test: x86_64 universal install_kickstart_hdd URL: https://openqa.fedoraproject.org/tests/12048 ID: 11968 Test: i386 universal install_package_set_kde URL: https://openqa.fedoraproject.org/tests/11968 ID: 11967 Test: i386 universal upgrade_2_desktop_32bit URL: https://openqa.fedoraproject.org/tests/11967 ID: 11966 Test: i386 universal upgrade_desktop_32bit URL: https://openqa.fedoraproject.org/tests/11966 ID: 11965 Test: i386 universal install_lvmthin URL: https://openqa.fedoraproject.org/tests/11965 ID: 11964 Test: i386 universal install_ext3 URL: https://openqa.fedoraproject.org/tests/11964 ID: 11963 Test: i386 universal install_btrfs URL: https://openqa.fedoraproject.org/tests/11963 ID: 11962 Test: i386 universal install_software_raid URL: https://openqa.fedoraproject.org/tests/11962 ID: 11961 Test: i386 universal install_simple_encrypted URL: https://openqa.fedoraproject.org/tests/11961 ID: 11960 Test: i386 universal install_scsi_updates_img URL: https://openqa.fedoraproject.org/tests/11960 ID: 11959 Test: i386 universal install_repository_http_graphical URL: https://openqa.fedoraproject.org/tests/11959 ID: 11958 Test: i386 universal install_package_set_minimal URL: https://openqa.fedoraproject.org/tests/11958 ID: 11957 Test: x86_64 universal install_scsi_updates_img URL: https://openqa.fedoraproject.org/tests/11957 ID: 11956 Test: x86_64 universal install_kickstart_user_creation URL: https://openqa.fedoraproject.org/tests/11956 ID: 11949 Test: x86_64 universal install_kickstart_firewall_configured URL: https://openqa.fedoraproject.org/tests/11949 ID: 11948 Test: x86_64 universal install_kickstart_firewall_disabled URL: https://openqa.fedoraproject.org/tests/11948 ID: 11947 Test: x86_64 universal install_european_language URL: https://openqa.fedoraproject.org/tests/11947 ID: 11928 Test: x86_64 universal install_package_set_kde URL: https://openqa.fedoraproject.org/tests/11928 ID: 11913 Test: i386 Everything-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/11913 ID: 11908 Test: i386 Server-dvd-iso install_default URL: https://openqa.fedoraproject.org/tests/11908 ID: 11907 Test: i386 Workstation-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/11907 ID: 11901 Test: i386 Server-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/11901 Passed openQA tests: 42/53 (x86_64) -- Mail generated by check-compose: https://git.fedorahosted.org/cgit/fedora-qa.git/tree/check-compose -- devel mailing list devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org