Re: How to get ACLs for specific branch?

2017-12-21 Thread Christopher
On Thu, Dec 21, 2017 at 9:04 PM Kevin Fenzi  wrote:

> On 12/21/2017 05:13 PM, Christopher wrote:
> ...snip...
> > Can somebody either grant me access, point me to where ACLs are now
> > managed, or just apply the patch according to my instructions in the
> > bugzilla ticket?
>
> I am not sure why it was incorrect, but I forced it to refresh and it
> seems right now. Can you try your push again?
>
>
That worked. Thanks!


> kevin
>
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: How to get ACLs for specific branch?

2017-12-21 Thread Kevin Fenzi
On 12/21/2017 05:13 PM, Christopher wrote:
...snip...
> Can somebody either grant me access, point me to where ACLs are now
> managed, or just apply the patch according to my instructions in the
> bugzilla ticket?

I am not sure why it was incorrect, but I forced it to refresh and it
seems right now. Can you try your push again?

kevin




signature.asc
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


How to get ACLs for specific branch?

2017-12-21 Thread Christopher
Hi,

I am listed as "main admin" on
https://src.fedoraproject.org/rpms/python-keyring
I took over starting with EPEL7, though, so I don't have access to the el6
branch.

The error is:
$ git push
Total 0 (delta 0), reused 0 (delta 0)
remote: FATAL: W refs/heads/el6 rpms/python-keyring ctubbsii DENIED by
refs/heads/el[0-9]
remote: error: hook declined to update refs/heads/el6
To ssh://pkgs.fedoraproject.org/rpms/python-keyring
 ! [remote rejected] el6 -> el6 (hook declined)
error: failed to push some refs to 'ssh://
ctubb...@pkgs.fedoraproject.org/rpms/python-keyring'

This is strange, because there does not seem to be any UI to request
changes.

I have a bug fix for a long-standing bug in el6. I've already patched in
epel7, but want to backport to el6 so I can close the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=924486

I tried to "Give" myself the project, but this only resulted in HTTP/500
error in Pagure. I can't give myself admin or commit, because I already
have it (for most branches).

Can somebody either grant me access, point me to where ACLs are now
managed, or just apply the patch according to my instructions in the
bugzilla ticket?

Thanks,
Christopher
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


[Bug 1528497] perl-TeX-Encode-2.004 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528497



--- Comment #2 from Upstream Release Monitoring 
 ---
hotness's scratch build of perl-TeX-Encode-2.004-1.el7.src.rpm for rawhide
completed http://koji.fedoraproject.org/koji/taskinfo?taskID=23833032

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1528497] New: perl-TeX-Encode-2.004 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528497

Bug ID: 1528497
   Summary: perl-TeX-Encode-2.004 is available
   Product: Fedora
   Version: rawhide
 Component: perl-TeX-Encode
  Keywords: FutureFeature, Triaged
  Assignee: tcall...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: perl-devel@lists.fedoraproject.org,
tcall...@redhat.com



Latest upstream release: 2.004
Current version/release in rawhide: 2.003-1.fc28
URL: http://search.cpan.org/dist/TeX-Encode/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.

Based on the information from anitya: 
https://release-monitoring.org/project/12560/

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1528497] perl-TeX-Encode-2.004 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528497



--- Comment #1 from Upstream Release Monitoring 
 ---
Created attachment 1371119
  --> https://bugzilla.redhat.com/attachment.cgi?id=1371119=edit
[patch] Update to 2.004 (#1528497)

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1528493] New: perl-Time-HiRes-1.9749 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528493

Bug ID: 1528493
   Summary: perl-Time-HiRes-1.9749 is available
   Product: Fedora
   Version: rawhide
 Component: perl-Time-HiRes
  Keywords: FutureFeature, Triaged
  Assignee: ppi...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: perl-devel@lists.fedoraproject.org, ppi...@redhat.com



Latest upstream release: 1.9749
Current version/release in rawhide: 1.9746-1.fc28
URL: http://search.cpan.org/dist/Time-HiRes/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.

Based on the information from anitya: 
https://release-monitoring.org/project/3466/

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1511243] perl-Mail-Message-3.004 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1511243



--- Comment #5 from Upstream Release Monitoring 
 ---
hotness's scratch build of perl-Mail-Message-3.004-1.el7.src.rpm for rawhide
completed http://koji.fedoraproject.org/koji/taskinfo?taskID=23832960

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1511243] perl-Mail-Message-3.004 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1511243



--- Comment #4 from Upstream Release Monitoring 
 ---
Created attachment 137
  --> https://bugzilla.redhat.com/attachment.cgi?id=137=edit
[patch] Update to 3.004 (#1511243)

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1511243] perl-Mail-Message-3.004 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1511243

Upstream Release Monitoring  
changed:

   What|Removed |Added

Summary|perl-Mail-Message-3.003 is  |perl-Mail-Message-3.004 is
   |available   |available



--- Comment #3 from Upstream Release Monitoring 
 ---
Latest upstream release: 3.004
Current version/release in rawhide: 3.002-1.fc28
URL: http://search.cpan.org/dist/Mail-Message/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.

Based on the information from anitya: 
https://release-monitoring.org/project/13324/

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1528482] perl-Mock-Sub-1.08 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528482



--- Comment #2 from Upstream Release Monitoring 
 ---
hotness's scratch build of perl-Mock-Sub-1.08-1.el7.src.rpm for rawhide
completed http://koji.fedoraproject.org/koji/taskinfo?taskID=23832931

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1528483] New: perl-Module-CoreList-5.20171220 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528483

Bug ID: 1528483
   Summary: perl-Module-CoreList-5.20171220 is available
   Product: Fedora
   Version: rawhide
 Component: perl-Module-CoreList
  Keywords: FutureFeature, Triaged
  Assignee: ppi...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: jose.p.oliveira@gmail.com, jples...@redhat.com,
perl-devel@lists.fedoraproject.org, ppi...@redhat.com,
st...@silug.org, tcall...@redhat.com



Latest upstream release: 5.20171220
Current version/release in rawhide: 5.20171120-1.fc28
URL: http://search.cpan.org/dist/Module-CoreList/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.

Based on the information from anitya: 
https://release-monitoring.org/project/3080/

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1528482] perl-Mock-Sub-1.08 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528482



--- Comment #1 from Upstream Release Monitoring 
 ---
Created attachment 1371108
  --> https://bugzilla.redhat.com/attachment.cgi?id=1371108=edit
[patch] Update to 1.08 (#1528482)

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1528482] New: perl-Mock-Sub-1.08 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528482

Bug ID: 1528482
   Summary: perl-Mock-Sub-1.08 is available
   Product: Fedora
   Version: rawhide
 Component: perl-Mock-Sub
  Keywords: FutureFeature, Triaged
  Assignee: de...@fateyev.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: de...@fateyev.com, perl-devel@lists.fedoraproject.org



Latest upstream release: 1.08
Current version/release in rawhide: 1.07-4.fc27
URL: http://search.cpan.org/dist/Mock-Sub/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.

Based on the information from anitya: 
https://release-monitoring.org/project/9327/

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1528480] New: perl-JSON-2.97001 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528480

Bug ID: 1528480
   Summary: perl-JSON-2.97001 is available
   Product: Fedora
   Version: rawhide
 Component: perl-JSON
  Keywords: FutureFeature, Triaged
  Assignee: emman...@seyman.fr
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: emman...@seyman.fr, jonstan...@gmail.com,
p...@city-fan.org, perl-devel@lists.fedoraproject.org



Latest upstream release: 2.97001
Current version/release in rawhide: 2.97-1.fc28
URL: http://search.cpan.org/dist/JSON/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.

Based on the information from anitya: 
https://release-monitoring.org/project/12847/

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


Fedora Rawhide-20171221.n.0 compose check report

2017-12-21 Thread Fedora compose checker
Missing expected images:

Server boot x86_64
Server dvd i386
Workstation live i386
Server dvd x86_64
Server boot i386
Kde live i386

Failed openQA tests: 28/106 (x86_64), 1/2 (arm)

New failures (same test did not fail in Rawhide-20171220.n.0):

ID: 181857  Test: x86_64 KDE-live-iso desktop_notifications_postinstall
URL: https://openqa.fedoraproject.org/tests/181857
ID: 181868  Test: x86_64 universal install_delete_pata@uefi
URL: https://openqa.fedoraproject.org/tests/181868
ID: 181875  Test: x86_64 universal install_multi_empty@uefi
URL: https://openqa.fedoraproject.org/tests/181875
ID: 181879  Test: x86_64 universal install_simple_encrypted
URL: https://openqa.fedoraproject.org/tests/181879
ID: 181881  Test: x86_64 universal install_simple_free_space@uefi
URL: https://openqa.fedoraproject.org/tests/181881
ID: 181887  Test: x86_64 universal install_iscsi
URL: https://openqa.fedoraproject.org/tests/181887
ID: 181891  Test: x86_64 universal install_blivet_xfs
URL: https://openqa.fedoraproject.org/tests/181891
ID: 181903  Test: x86_64 universal install_xfs
URL: https://openqa.fedoraproject.org/tests/181903
ID: 181922  Test: x86_64 universal install_no_swap@uefi
URL: https://openqa.fedoraproject.org/tests/181922
ID: 181934  Test: x86_64 universal install_blivet_no_swap@uefi
URL: https://openqa.fedoraproject.org/tests/181934

Old failures (same test failed in Rawhide-20171220.n.0):

ID: 181839  Test: x86_64 Workstation-live-iso desktop_notifications_live
URL: https://openqa.fedoraproject.org/tests/181839
ID: 181858  Test: arm Minimal-raw_xz-raw.xz 
install_arm_image_deployment_upload
URL: https://openqa.fedoraproject.org/tests/181858
ID: 181872  Test: x86_64 universal upgrade_2_server_64bit
URL: https://openqa.fedoraproject.org/tests/181872
ID: 181880  Test: x86_64 universal install_simple_encrypted@uefi
URL: https://openqa.fedoraproject.org/tests/181880
ID: 181892  Test: x86_64 universal install_blivet_software_raid
URL: https://openqa.fedoraproject.org/tests/181892
ID: 181896  Test: x86_64 universal upgrade_minimal_64bit
URL: https://openqa.fedoraproject.org/tests/181896
ID: 181897  Test: x86_64 universal upgrade_desktop_64bit
URL: https://openqa.fedoraproject.org/tests/181897
ID: 181898  Test: x86_64 universal upgrade_server_64bit
URL: https://openqa.fedoraproject.org/tests/181898
ID: 181899  Test: x86_64 universal upgrade_server_domain_controller
URL: https://openqa.fedoraproject.org/tests/181899
ID: 181905  Test: x86_64 universal install_blivet_lvmthin
URL: https://openqa.fedoraproject.org/tests/181905
ID: 181907  Test: x86_64 universal install_blivet_software_raid@uefi
URL: https://openqa.fedoraproject.org/tests/181907
ID: 181908  Test: x86_64 universal install_blivet_lvmthin@uefi
URL: https://openqa.fedoraproject.org/tests/181908
ID: 181909  Test: x86_64 universal install_package_set_kde
URL: https://openqa.fedoraproject.org/tests/181909
ID: 181910  Test: x86_64 universal upgrade_2_minimal_64bit
URL: https://openqa.fedoraproject.org/tests/181910
ID: 181911  Test: x86_64 universal upgrade_2_desktop_64bit
URL: https://openqa.fedoraproject.org/tests/181911
ID: 181923  Test: x86_64 universal upgrade_kde_64bit
URL: https://openqa.fedoraproject.org/tests/181923
ID: 181924  Test: x86_64 universal upgrade_desktop_encrypted_64bit
URL: https://openqa.fedoraproject.org/tests/181924
ID: 181925  Test: x86_64 universal upgrade_2_kde_64bit
URL: https://openqa.fedoraproject.org/tests/181925
ID: 181926  Test: x86_64 universal upgrade_2_desktop_encrypted_64bit
URL: https://openqa.fedoraproject.org/tests/181926

Soft failed openQA tests: 50/106 (x86_64)
(Tests completed, but using a workaround for a known bug)

New soft failures (same test did not soft fail in Rawhide-20171220.n.0):

ID: 181841  Test: x86_64 Workstation-boot-iso install_default
URL: https://openqa.fedoraproject.org/tests/181841
ID: 181844  Test: x86_64 Workstation-boot-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/181844
ID: 181845  Test: x86_64 KDE-live-iso install_default_upload
URL: https://openqa.fedoraproject.org/tests/181845
ID: 181863  Test: x86_64 universal install_anaconda_text
URL: https://openqa.fedoraproject.org/tests/181863
ID: 181865  Test: x86_64 universal install_repository_http_variation
URL: https://openqa.fedoraproject.org/tests/181865
ID: 181931  Test: x86_64 universal install_kickstart_nfs
URL: https://openqa.fedoraproject.org/tests/181931

Old soft failures (same test soft failed in Rawhide-20171220.n.0):

ID: 181826  Test: x86_64 Everything-boot-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/181826
ID: 181827  Test: x86_64 Everything-boot-iso install_default
URL: https://openqa.fedoraproject.org/tests/181827
ID: 181828  Test: x86_64 Workstation-live-iso install_default_upload
URL: https://openqa.fedoraproject.org/tests/181828
ID: 181829   

Re: Firefox "Looking Glass" fiasco

2017-12-21 Thread Kevin Kofler
Solomon Peachy wrote:
> There is a ginormous difference between not being able to legally ship
> something and deliberately not shipping perhaps _the_ premium Free
> Software application because you don't agree with every action of its
> authors.

The thing is, the question is whether Firefox even still qualifies as Free 
Software at all. We disagree with those actions for a reason, i.e., because 
they are attacks on users' freedom!

Kevin Kofler
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Firefox "Looking Glass" fiasco

2017-12-21 Thread Kevin Kofler
Sergio Durigan Junior wrote:
> Midori has been "revived" only recently.  It stayed dead for a while,
> without any activity on the codebase/IRC channel, and accumulating a few
> CVE's here and there.

Interesting. I'd expect the browser itself to not really be security-
critical, the underlying web engine is. I guess the CVEs are things such as 
missing warnings for invalid certificates?

> However, we shouldn't blindly adopt Midori as the default browser without
> seriously looking at the health of the project

Sure, that should be obvious. Though I am not proposing to make Midori THE 
default browser for all of Fedora, I am only proposing it as a default for 
those Spins where it fits the best technology-wise.

> (that goes for any other browser, FWIW).

The other two browsers in my list are active projects maintained by large 
trustworthy upstreams Fedora is already successfully working with: one 
(QupZilla/Falkon) is about to become the official browser of the KDE 
project, the other one (GNOME Web/Epiphany) is already the official browser 
of the GNOME project. So I don't think there is any need to worry about the 
health of those 2 projects.

This also means that each of them is really the most suitable browser choice 
for the respective desktop environment, in the interest of providing an 
integrated user experience. The browser needs to return to being viewed as 
an integral part of the desktop environment, as it was in the Konqueror era. 
Firefox sticks out like a sore thumb on all of them.

Kevin Kofler
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


cone needs to be updated, here's a PR

2017-12-21 Thread Brian C. Lane
When I built the new version of courier-unicode it broke cone, a cmdline
email client. I attempted to contact the owners before the change and
since with no response. I have no interest in being a maintainer of the
package so could someone with permissions merge this?

The latest upstream builds cleanly and appears to run in my light
testing. I've also added checking the gpg signature of the source.

Here's the PR:

https://src.fedoraproject.org/rpms/cone/pull-request/1

Thanks, and have a happy holiday!

-- 
Brian C. Lane (PST8PDT)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: adding display authorization to other accounts is broken

2017-12-21 Thread Adam Williamson
On Thu, 2017-12-21 at 22:15 +0100, Rafal Luzynski wrote:
> 20.12.2017 17:07 Przemek Klosowski  wrote:
> > 
> > 
> > The primary logged-in session is of course authorized to access the main
> > X11/wayland display, but it's often useful to add display authorization
> > to other accounts. For instance, looking at disk space with 'baobab'
> > works better as root because some areas of the filesystem are not
> > readable to normal users (*). I used to do such authorization by
> > 
> > xhost +si:localhost:root
> > 
> > but it recently stopped working:
> > https://bugzilla.redhat.com/show_bug.cgi?id=1527754 . Is there another
> > way of authorizing display access for other accounts? If not, this is a
> > fairly painful regression.
> 
> The same here:
> 
> https://pagure.io/system-config-language
> https://bugzilla.redhat.com/show_bug.cgi?id=1274451
> 
> and AFAIUC the answer is that the applications should use polkit to
> run privileged operations while being able to display regular user's GUI.

Well, no, it's not exactly the same. Using xhost in this way has been a
(grudgingly) documented workaround for Wayland's restrictions for some
time now:

https://fedoraproject.org/wiki/Common_F27_bugs#wayland-root-apps

But it appears it has recently broken. That's a distinct thing from the
existence of the restrictions in Wayland at all.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: adding display authorization to other accounts is broken

2017-12-21 Thread Rafal Luzynski
20.12.2017 17:07 Przemek Klosowski  wrote:
>
>
> The primary logged-in session is of course authorized to access the main
> X11/wayland display, but it's often useful to add display authorization
> to other accounts. For instance, looking at disk space with 'baobab'
> works better as root because some areas of the filesystem are not
> readable to normal users (*). I used to do such authorization by
>
> xhost +si:localhost:root
>
> but it recently stopped working:
> https://bugzilla.redhat.com/show_bug.cgi?id=1527754 . Is there another
> way of authorizing display access for other accounts? If not, this is a
> fairly painful regression.

The same here:

https://pagure.io/system-config-language
https://bugzilla.redhat.com/show_bug.cgi?id=1274451

and AFAIUC the answer is that the applications should use polkit to
run privileged operations while being able to display regular user's GUI.

Regards,

Rafał
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


[EPEL-devel] Fedora EPEL 7 updates-testing report

2017-12-21 Thread updates
The following Fedora EPEL 7 Security updates need testing:
 Age  URL
 1018  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-1087   
dokuwiki-0-0.24.20140929c.el7
 781  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-dac7ed832f   
mcollective-2.8.4-1.el7
 363  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-04bc9dd81d   
libbsd-0.8.3-1.el7
 260  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-d241156dfe   
mod_cluster-1.3.3-10.el7
 258  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-7ecb12e378   
python-XStatic-jquery-ui-1.12.0.1-1.el7
  92  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-e27758bd23   
libmspack-0.6-0.1.alpha.el7
  30  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-e64eeb6ece   
nagios-4.3.4-5.el7
  18  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-d704442ae7   
qpid-cpp-1.37.0-1.el7
  12  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-f2055d3f62   
shellinabox-2.20-5.el7
  12  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-77cc9084cb   
nodejs-6.12.2-1.el7
  10  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-30026fdcc1   
hostapd-2.6-7.el7
   6  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-ae06399a6b   
heimdal-7.5.0-1.el7
   3  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-9a67291cf1   
json-c12-0.12.1-2.el7
   1  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-263dafc1ae   
python-mistune-0.8.3-1.el7
   0  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-957aa05f33   
heketi-5.0.1-1.el7


The following builds have been pushed to Fedora EPEL 7 updates-testing

certbot-0.20.0-1.el7
distribution-gpg-keys-1.17-1.el7
heketi-5.0.1-1.el7
python-acme-0.20.0-1.el7
python-certbot-apache-0.20.0-1.el7
python-certbot-nginx-0.20.0-1.el7
python-rpm-macros-3-18.el7
python36-3.6.3-5.el7
robodoc-4.99.41-13.el7
suricata-4.0.3-1.el7
wine-2.0.3-2.el7
zstd-1.3.3-1.el7

Details about builds:



 certbot-0.20.0-1.el7 (FEDORA-EPEL-2017-199b1e818a)
 A free, automated certificate authority client

Update Information:

Update to 0.20.0




 distribution-gpg-keys-1.17-1.el7 (FEDORA-EPEL-2017-c3fabf46f2)
 GPG keys of various Linux distributions

Update Information:

Update Copr keys.




 heketi-5.0.1-1.el7 (FEDORA-EPEL-2017-957aa05f33)
 RESTful based volume management framework for GlusterFS

Update Information:

Security fix for CVE-2017-15103 and CVE-2017-15104

References:

  [ 1 ] Bug #1510147 - CVE-2017-15103 heketi: OS command injection in heketi API
https://bugzilla.redhat.com/show_bug.cgi?id=1510147
  [ 2 ] Bug #1510149 - CVE-2017-15104 heketi:  Information disclosure through 
world readable file
https://bugzilla.redhat.com/show_bug.cgi?id=1510149




 python-acme-0.20.0-1.el7 (FEDORA-EPEL-2017-199b1e818a)
 Python library for the ACME protocol

Update Information:

Update to 0.20.0




 python-certbot-apache-0.20.0-1.el7 (FEDORA-EPEL-2017-199b1e818a)
 The apache plugin for certbot

Update Information:

Update to 0.20.0




 python-certbot-nginx-0.20.0-1.el7 (FEDORA-EPEL-2017-199b1e818a)
 The nginx plugin for certbot

Update Information:

Update to 0.20.0




 python-rpm-macros-3-18.el7 (FEDORA-EPEL-2017-ddd7d1e59d)
 The unversioned Python RPM macros


Re: Firefox "shield"

2017-12-21 Thread Ahmad Samir
On 21 December 2017 at 21:05, Gerald B. Cox  wrote:
>
>
> On Thu, Dec 21, 2017 at 10:35 AM, Ahmad Samir 
> wrote:
>>
>> I found this upstream bug report[1], and it's reproducible. So,
>> there's something seriously screwed up upstream, and as someone said
>> in the "firefox Looking Glass" thread on this list[2], looks like
>> Marketing is overruling the security/privacy devs in Mozilla, I think
>> he nailed the issue at the core of this debacle.
>
>
> If you read the bug report it appears that this isn't a bug at all - but
> rather someone going
> into about:config and making assumptions which are incorrect.
>

The bug report had been updated _after_ I posted in this thread. ;)

> There is a warning when you go into about:config - you're suppose to know
> what you're doing.
>

True, but knowledge comes from docs, I did search around about the
extensions.ui.experiment.hidden pref, but there's no documentation of
it any where that I could see. Which is weird, given I always find
pref names on https://dxr.mozilla.org .

> If you want to disable shield studies, go into preferences/privacy security.
> You don't need to fiddle
> with about:config.
>

There's another report that changing settings via the preferences
panel doesn't always stick
https://bugzilla.mozilla.org/show_bug.cgi?id=1425663

-- 
Ahmad Samir
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


[Bug 1528083] perl-HTTP-Message-6.14 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528083

Fedora Update System  changed:

   What|Removed |Added

 Status|MODIFIED|ON_QA



--- Comment #3 from Fedora Update System  ---
perl-HTTP-Message-6.14-1.fc27 has been pushed to the Fedora 27 testing
repository. If problems still persist, please make note of it in this bug
report.
See https://fedoraproject.org/wiki/QA:Updates_Testing for
instructions on how to install test updates.
You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-2017-ace06804a3

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1527723] perl-SOAP-Lite-1.24 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1527723

Fedora Update System  changed:

   What|Removed |Added

 Status|MODIFIED|ON_QA



--- Comment #4 from Fedora Update System  ---
perl-SOAP-Lite-1.24-1.fc27 has been pushed to the Fedora 27 testing repository.
If problems still persist, please make note of it in this bug report.
See https://fedoraproject.org/wiki/QA:Updates_Testing for
instructions on how to install test updates.
You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-2017-ca96a388c0

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1527521] perl-SOAP-Lite-1.23 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1527521

Fedora Update System  changed:

   What|Removed |Added

 Status|CLOSED  |ON_QA
 Resolution|WONTFIX |---
   Keywords||Reopened



--- Comment #7 from Fedora Update System  ---
perl-SOAP-Lite-1.24-1.fc27 has been pushed to the Fedora 27 testing repository.
If problems still persist, please make note of it in this bug report.
See https://fedoraproject.org/wiki/QA:Updates_Testing for
instructions on how to install test updates.
You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-2017-ca96a388c0

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[EPEL-devel] Fedora EPEL 6 updates-testing report

2017-12-21 Thread updates
The following Fedora EPEL 6 Security updates need testing:
 Age  URL
 897  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7031   
python-virtualenv-12.0.7-1.el6
 891  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7168   
rubygem-crack-0.3.2-2.el6
 781  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-e2b4b5b2fb   
mcollective-2.8.4-1.el6
 752  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-35e240edd9   
thttpd-2.25b-24.el6
 363  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-e3e50897ac   
libbsd-0.8.3-2.el6
  92  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-4c76ddcc92   
libmspack-0.6-0.1.alpha.el6
  11  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-ed87c07972   
hostapd-2.6-7.el6
  11  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-6aaee32b7e   
optipng-0.7.6-6.el6
  11  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-3432442a31   
shellinabox-2.20-5.el6
   7  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-0143bce8ee   
python34-3.4.5-4.el6
   3  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-40e722a985   
json-c12-0.12.1-2.el6
   0  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-8d7c162c64   
tor-0.2.9.14-1.el6


The following builds have been pushed to Fedora EPEL 6 updates-testing

distribution-gpg-keys-1.17-1.el6
tor-0.2.9.14-1.el6
zstd-1.3.3-1.el6

Details about builds:



 distribution-gpg-keys-1.17-1.el6 (FEDORA-EPEL-2017-b40d8df69b)
 GPG keys of various Linux distributions

Update Information:

Update Copr keys.




 tor-0.2.9.14-1.el6 (FEDORA-EPEL-2017-8d7c162c64)
 Anonymizing overlay network for TCP

Update Information:

Update to latest LTS release

References:

  [ 1 ] Bug #1520864 - CVE-2017-8819 CVE-2017-8820 CVE-2017-8821 CVE-2017-8822 
CVE-2017-8823 tor: Multiple vulnerabilities [epel-6]
https://bugzilla.redhat.com/show_bug.cgi?id=1520864




 zstd-1.3.3-1.el6 (FEDORA-EPEL-2017-549d38052f)
 Zstd compression library

Update Information:

Latest upstream

___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org


Re: Firefox "shield"

2017-12-21 Thread Gerald B. Cox
On Thu, Dec 21, 2017 at 10:35 AM, Ahmad Samir 
wrote:

> I found this upstream bug report[1], and it's reproducible. So,
> there's something seriously screwed up upstream, and as someone said
> in the "firefox Looking Glass" thread on this list[2], looks like
> Marketing is overruling the security/privacy devs in Mozilla, I think
> he nailed the issue at the core of this debacle.
>

If you read the bug report it appears that this isn't a bug at all - but
rather someone going
into about:config and making assumptions which are incorrect.

There is a warning when you go into about:config - you're suppose to know
what you're doing.

If you want to disable shield studies, go into preferences/privacy
security.  You don't need to fiddle
with about:config.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Firefox "shield"

2017-12-21 Thread Ahmad Samir
On 21 December 2017 at 17:20, Dario Lesca  wrote:
>
> Il giorno gio, 21/12/2017 alle 15.56 +0100, Dario Lesca ha scritto:
> > Il giorno sab, 16/12/2017 alle 19.11 -0500, Benjamin Kreuter ha
> > scritto:
> > > "extension.shield-recipe-client.enabled = true".
> >
> > The correct option is "extensions.shield-recipe-client.enabled"
> > (extension is missing of 's'), ad for default is "true"
> >
> > Now I have set it to False.
>
> Another curious flag: "extensions.ui.experiment.hidden"
>
> in my config it is set to true, now I have set to false


I found this upstream bug report[1], and it's reproducible. So,
there's something seriously screwed up upstream, and as someone said
in the "firefox Looking Glass" thread on this list[2], looks like
Marketing is overruling the security/privacy devs in Mozilla, I think
he nailed the issue at the core of this debacle.

[1] https://bugzilla.mozilla.org/show_bug.cgi?id=1425186
[2] 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/RFAJJBMKK6C2BEWJKCVBOLPWTGCFHWPW/

--
Ahmad Samir
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Firefox "shield"

2017-12-21 Thread Dario Lesca
Il giorno gio, 21/12/2017 alle 15.56 +0100, Dario Lesca ha scritto:
> Il giorno sab, 16/12/2017 alle 19.11 -0500, Benjamin Kreuter ha
> scritto:
> > "extension.shield-recipe-client.enabled = true".
> 
> The correct option is "extensions.shield-recipe-client.enabled"
> (extension is missing of 's'), ad for default is "true"
> 
> Now I have set it to False.

Another curious flag: "extensions.ui.experiment.hidden"

in my config it is set to true, now I have set to false


> 
> Thanks
> 
> -- 
> Dario Lesca
> (inviato dal mio Linux Fedora 27 Workstation)
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
-- 
Dario Lesca
(inviato dal mio Linux Fedora 27 Workstation)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Firefox "shield"

2017-12-21 Thread Dario Lesca
Il giorno sab, 16/12/2017 alle 19.11 -0500, Benjamin Kreuter ha
scritto:
> "extension.shield-recipe-client.enabled = true".

The correct option is "extensions.shield-recipe-client.enabled"
(extension is missing of 's'), ad for default is "true"

Now I have set it to False.

Thanks

-- 
Dario Lesca
(inviato dal mio Linux Fedora 27 Workstation)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


[rpms/perl-List-MoreUtils-XS] New Commits To "rpms/perl-List-MoreUtils-XS" (master)

2017-12-21 Thread pagure

The following commits were pushed to the repo "rpms/perl-List-MoreUtils-XS" on 
branch
"master", which you are following:
a2c8f390227ffc83c08c0efef52b8371c90bbe54Paul HowarthUpdate to 0.428



To view more about the commits, visit:
https://src.fedoraproject.org/rpms/perl-List-MoreUtils-XS/commits/master
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1528276] New: perl-CPAN-Perl-Releases-3.44 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528276

Bug ID: 1528276
   Summary: perl-CPAN-Perl-Releases-3.44 is available
   Product: Fedora
   Version: rawhide
 Component: perl-CPAN-Perl-Releases
  Keywords: FutureFeature, Triaged
  Assignee: jples...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: iarn...@gmail.com, jples...@redhat.com,
perl-devel@lists.fedoraproject.org



Latest upstream release: 3.44
Current version/release in rawhide: 3.42-1.fc28
URL: http://search.cpan.org/dist/CPAN-Perl-Releases/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.

Based on the information from anitya: 
https://release-monitoring.org/project/5881/

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1528079] perl-Dist-Zilla-Plugin-Test-Compile-2.058 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528079

Petr Šabata  changed:

   What|Removed |Added

 Status|ASSIGNED|CLOSED
   Fixed In Version||perl-Dist-Zilla-Plugin-Test
   ||-Compile-2.058-1.fc28
 Resolution|--- |RAWHIDE
Last Closed||2017-12-21 07:05:02



-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1528083] perl-HTTP-Message-6.14 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528083



--- Comment #2 from Fedora Update System  ---
perl-HTTP-Message-6.14-1.fc27 has been submitted as an update to Fedora 27.
https://bodhi.fedoraproject.org/updates/FEDORA-2017-ace06804a3

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1528083] perl-HTTP-Message-6.14 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528083

Petr Pisar  changed:

   What|Removed |Added

 Status|ASSIGNED|MODIFIED
   Fixed In Version||perl-HTTP-Message-6.14-1.fc
   ||28



--- Comment #1 from Petr Pisar  ---
A bug-fix release suitable for Fedora ≥ 27.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1528074] perl-B-Generate-1.56 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528074

Petr Pisar  changed:

   What|Removed |Added

 Status|ASSIGNED|CLOSED
   Fixed In Version||perl-B-Generate-1.56-1.fc28
 Resolution|--- |RAWHIDE
Last Closed||2017-12-21 06:11:50



--- Comment #1 from Petr Pisar  ---
This release adds support for Perl 5.27.7. Safer for Rawhide only.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1528074] perl-B-Generate-1.56 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1528074

Petr Pisar  changed:

   What|Removed |Added

 Status|NEW |ASSIGNED
 CC|jples...@redhat.com |ppi...@redhat.com
   Assignee|jples...@redhat.com |ppi...@redhat.com



-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org


[Bug 1527722] perl-Shell-Guess-0.08 is available

2017-12-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1527722

Petr Pisar  changed:

   What|Removed |Added

 Status|ASSIGNED|CLOSED
   Fixed In Version||perl-Shell-Guess-0.08-1.fc2
   ||8
 Resolution|--- |RAWHIDE
Last Closed||2017-12-21 03:33:46



--- Comment #1 from Petr Pisar  ---
An enhancement release. Because it could change behavior, I will push it into
Rawhide only.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org