Re: How to get ACLs for specific branch?
On Thu, Dec 21, 2017 at 9:04 PM Kevin Fenziwrote: > On 12/21/2017 05:13 PM, Christopher wrote: > ...snip... > > Can somebody either grant me access, point me to where ACLs are now > > managed, or just apply the patch according to my instructions in the > > bugzilla ticket? > > I am not sure why it was incorrect, but I forced it to refresh and it > seems right now. Can you try your push again? > > That worked. Thanks! > kevin > > ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Re: How to get ACLs for specific branch?
On 12/21/2017 05:13 PM, Christopher wrote: ...snip... > Can somebody either grant me access, point me to where ACLs are now > managed, or just apply the patch according to my instructions in the > bugzilla ticket? I am not sure why it was incorrect, but I forced it to refresh and it seems right now. Can you try your push again? kevin signature.asc Description: OpenPGP digital signature ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org
How to get ACLs for specific branch?
Hi, I am listed as "main admin" on https://src.fedoraproject.org/rpms/python-keyring I took over starting with EPEL7, though, so I don't have access to the el6 branch. The error is: $ git push Total 0 (delta 0), reused 0 (delta 0) remote: FATAL: W refs/heads/el6 rpms/python-keyring ctubbsii DENIED by refs/heads/el[0-9] remote: error: hook declined to update refs/heads/el6 To ssh://pkgs.fedoraproject.org/rpms/python-keyring ! [remote rejected] el6 -> el6 (hook declined) error: failed to push some refs to 'ssh:// ctubb...@pkgs.fedoraproject.org/rpms/python-keyring' This is strange, because there does not seem to be any UI to request changes. I have a bug fix for a long-standing bug in el6. I've already patched in epel7, but want to backport to el6 so I can close the bug. https://bugzilla.redhat.com/show_bug.cgi?id=924486 I tried to "Give" myself the project, but this only resulted in HTTP/500 error in Pagure. I can't give myself admin or commit, because I already have it (for most branches). Can somebody either grant me access, point me to where ACLs are now managed, or just apply the patch according to my instructions in the bugzilla ticket? Thanks, Christopher ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org
[Bug 1528497] perl-TeX-Encode-2.004 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528497 --- Comment #2 from Upstream Release Monitoring--- hotness's scratch build of perl-TeX-Encode-2.004-1.el7.src.rpm for rawhide completed http://koji.fedoraproject.org/koji/taskinfo?taskID=23833032 -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1528497] New: perl-TeX-Encode-2.004 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528497 Bug ID: 1528497 Summary: perl-TeX-Encode-2.004 is available Product: Fedora Version: rawhide Component: perl-TeX-Encode Keywords: FutureFeature, Triaged Assignee: tcall...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: perl-devel@lists.fedoraproject.org, tcall...@redhat.com Latest upstream release: 2.004 Current version/release in rawhide: 2.003-1.fc28 URL: http://search.cpan.org/dist/TeX-Encode/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from anitya: https://release-monitoring.org/project/12560/ -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1528497] perl-TeX-Encode-2.004 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528497 --- Comment #1 from Upstream Release Monitoring--- Created attachment 1371119 --> https://bugzilla.redhat.com/attachment.cgi?id=1371119=edit [patch] Update to 2.004 (#1528497) -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1528493] New: perl-Time-HiRes-1.9749 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528493 Bug ID: 1528493 Summary: perl-Time-HiRes-1.9749 is available Product: Fedora Version: rawhide Component: perl-Time-HiRes Keywords: FutureFeature, Triaged Assignee: ppi...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: perl-devel@lists.fedoraproject.org, ppi...@redhat.com Latest upstream release: 1.9749 Current version/release in rawhide: 1.9746-1.fc28 URL: http://search.cpan.org/dist/Time-HiRes/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from anitya: https://release-monitoring.org/project/3466/ -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1511243] perl-Mail-Message-3.004 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1511243 --- Comment #5 from Upstream Release Monitoring--- hotness's scratch build of perl-Mail-Message-3.004-1.el7.src.rpm for rawhide completed http://koji.fedoraproject.org/koji/taskinfo?taskID=23832960 -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1511243] perl-Mail-Message-3.004 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1511243 --- Comment #4 from Upstream Release Monitoring--- Created attachment 137 --> https://bugzilla.redhat.com/attachment.cgi?id=137=edit [patch] Update to 3.004 (#1511243) -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1511243] perl-Mail-Message-3.004 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1511243 Upstream Release Monitoringchanged: What|Removed |Added Summary|perl-Mail-Message-3.003 is |perl-Mail-Message-3.004 is |available |available --- Comment #3 from Upstream Release Monitoring --- Latest upstream release: 3.004 Current version/release in rawhide: 3.002-1.fc28 URL: http://search.cpan.org/dist/Mail-Message/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from anitya: https://release-monitoring.org/project/13324/ -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1528482] perl-Mock-Sub-1.08 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528482 --- Comment #2 from Upstream Release Monitoring--- hotness's scratch build of perl-Mock-Sub-1.08-1.el7.src.rpm for rawhide completed http://koji.fedoraproject.org/koji/taskinfo?taskID=23832931 -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1528483] New: perl-Module-CoreList-5.20171220 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528483 Bug ID: 1528483 Summary: perl-Module-CoreList-5.20171220 is available Product: Fedora Version: rawhide Component: perl-Module-CoreList Keywords: FutureFeature, Triaged Assignee: ppi...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: jose.p.oliveira@gmail.com, jples...@redhat.com, perl-devel@lists.fedoraproject.org, ppi...@redhat.com, st...@silug.org, tcall...@redhat.com Latest upstream release: 5.20171220 Current version/release in rawhide: 5.20171120-1.fc28 URL: http://search.cpan.org/dist/Module-CoreList/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from anitya: https://release-monitoring.org/project/3080/ -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1528482] perl-Mock-Sub-1.08 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528482 --- Comment #1 from Upstream Release Monitoring--- Created attachment 1371108 --> https://bugzilla.redhat.com/attachment.cgi?id=1371108=edit [patch] Update to 1.08 (#1528482) -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1528482] New: perl-Mock-Sub-1.08 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528482 Bug ID: 1528482 Summary: perl-Mock-Sub-1.08 is available Product: Fedora Version: rawhide Component: perl-Mock-Sub Keywords: FutureFeature, Triaged Assignee: de...@fateyev.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: de...@fateyev.com, perl-devel@lists.fedoraproject.org Latest upstream release: 1.08 Current version/release in rawhide: 1.07-4.fc27 URL: http://search.cpan.org/dist/Mock-Sub/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from anitya: https://release-monitoring.org/project/9327/ -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1528480] New: perl-JSON-2.97001 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528480 Bug ID: 1528480 Summary: perl-JSON-2.97001 is available Product: Fedora Version: rawhide Component: perl-JSON Keywords: FutureFeature, Triaged Assignee: emman...@seyman.fr Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: emman...@seyman.fr, jonstan...@gmail.com, p...@city-fan.org, perl-devel@lists.fedoraproject.org Latest upstream release: 2.97001 Current version/release in rawhide: 2.97-1.fc28 URL: http://search.cpan.org/dist/JSON/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from anitya: https://release-monitoring.org/project/12847/ -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Rawhide-20171221.n.0 compose check report
Missing expected images: Server boot x86_64 Server dvd i386 Workstation live i386 Server dvd x86_64 Server boot i386 Kde live i386 Failed openQA tests: 28/106 (x86_64), 1/2 (arm) New failures (same test did not fail in Rawhide-20171220.n.0): ID: 181857 Test: x86_64 KDE-live-iso desktop_notifications_postinstall URL: https://openqa.fedoraproject.org/tests/181857 ID: 181868 Test: x86_64 universal install_delete_pata@uefi URL: https://openqa.fedoraproject.org/tests/181868 ID: 181875 Test: x86_64 universal install_multi_empty@uefi URL: https://openqa.fedoraproject.org/tests/181875 ID: 181879 Test: x86_64 universal install_simple_encrypted URL: https://openqa.fedoraproject.org/tests/181879 ID: 181881 Test: x86_64 universal install_simple_free_space@uefi URL: https://openqa.fedoraproject.org/tests/181881 ID: 181887 Test: x86_64 universal install_iscsi URL: https://openqa.fedoraproject.org/tests/181887 ID: 181891 Test: x86_64 universal install_blivet_xfs URL: https://openqa.fedoraproject.org/tests/181891 ID: 181903 Test: x86_64 universal install_xfs URL: https://openqa.fedoraproject.org/tests/181903 ID: 181922 Test: x86_64 universal install_no_swap@uefi URL: https://openqa.fedoraproject.org/tests/181922 ID: 181934 Test: x86_64 universal install_blivet_no_swap@uefi URL: https://openqa.fedoraproject.org/tests/181934 Old failures (same test failed in Rawhide-20171220.n.0): ID: 181839 Test: x86_64 Workstation-live-iso desktop_notifications_live URL: https://openqa.fedoraproject.org/tests/181839 ID: 181858 Test: arm Minimal-raw_xz-raw.xz install_arm_image_deployment_upload URL: https://openqa.fedoraproject.org/tests/181858 ID: 181872 Test: x86_64 universal upgrade_2_server_64bit URL: https://openqa.fedoraproject.org/tests/181872 ID: 181880 Test: x86_64 universal install_simple_encrypted@uefi URL: https://openqa.fedoraproject.org/tests/181880 ID: 181892 Test: x86_64 universal install_blivet_software_raid URL: https://openqa.fedoraproject.org/tests/181892 ID: 181896 Test: x86_64 universal upgrade_minimal_64bit URL: https://openqa.fedoraproject.org/tests/181896 ID: 181897 Test: x86_64 universal upgrade_desktop_64bit URL: https://openqa.fedoraproject.org/tests/181897 ID: 181898 Test: x86_64 universal upgrade_server_64bit URL: https://openqa.fedoraproject.org/tests/181898 ID: 181899 Test: x86_64 universal upgrade_server_domain_controller URL: https://openqa.fedoraproject.org/tests/181899 ID: 181905 Test: x86_64 universal install_blivet_lvmthin URL: https://openqa.fedoraproject.org/tests/181905 ID: 181907 Test: x86_64 universal install_blivet_software_raid@uefi URL: https://openqa.fedoraproject.org/tests/181907 ID: 181908 Test: x86_64 universal install_blivet_lvmthin@uefi URL: https://openqa.fedoraproject.org/tests/181908 ID: 181909 Test: x86_64 universal install_package_set_kde URL: https://openqa.fedoraproject.org/tests/181909 ID: 181910 Test: x86_64 universal upgrade_2_minimal_64bit URL: https://openqa.fedoraproject.org/tests/181910 ID: 181911 Test: x86_64 universal upgrade_2_desktop_64bit URL: https://openqa.fedoraproject.org/tests/181911 ID: 181923 Test: x86_64 universal upgrade_kde_64bit URL: https://openqa.fedoraproject.org/tests/181923 ID: 181924 Test: x86_64 universal upgrade_desktop_encrypted_64bit URL: https://openqa.fedoraproject.org/tests/181924 ID: 181925 Test: x86_64 universal upgrade_2_kde_64bit URL: https://openqa.fedoraproject.org/tests/181925 ID: 181926 Test: x86_64 universal upgrade_2_desktop_encrypted_64bit URL: https://openqa.fedoraproject.org/tests/181926 Soft failed openQA tests: 50/106 (x86_64) (Tests completed, but using a workaround for a known bug) New soft failures (same test did not soft fail in Rawhide-20171220.n.0): ID: 181841 Test: x86_64 Workstation-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/181841 ID: 181844 Test: x86_64 Workstation-boot-iso install_default@uefi URL: https://openqa.fedoraproject.org/tests/181844 ID: 181845 Test: x86_64 KDE-live-iso install_default_upload URL: https://openqa.fedoraproject.org/tests/181845 ID: 181863 Test: x86_64 universal install_anaconda_text URL: https://openqa.fedoraproject.org/tests/181863 ID: 181865 Test: x86_64 universal install_repository_http_variation URL: https://openqa.fedoraproject.org/tests/181865 ID: 181931 Test: x86_64 universal install_kickstart_nfs URL: https://openqa.fedoraproject.org/tests/181931 Old soft failures (same test soft failed in Rawhide-20171220.n.0): ID: 181826 Test: x86_64 Everything-boot-iso install_default@uefi URL: https://openqa.fedoraproject.org/tests/181826 ID: 181827 Test: x86_64 Everything-boot-iso install_default URL: https://openqa.fedoraproject.org/tests/181827 ID: 181828 Test: x86_64 Workstation-live-iso install_default_upload URL: https://openqa.fedoraproject.org/tests/181828 ID: 181829
Re: Firefox "Looking Glass" fiasco
Solomon Peachy wrote: > There is a ginormous difference between not being able to legally ship > something and deliberately not shipping perhaps _the_ premium Free > Software application because you don't agree with every action of its > authors. The thing is, the question is whether Firefox even still qualifies as Free Software at all. We disagree with those actions for a reason, i.e., because they are attacks on users' freedom! Kevin Kofler ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Re: Firefox "Looking Glass" fiasco
Sergio Durigan Junior wrote: > Midori has been "revived" only recently. It stayed dead for a while, > without any activity on the codebase/IRC channel, and accumulating a few > CVE's here and there. Interesting. I'd expect the browser itself to not really be security- critical, the underlying web engine is. I guess the CVEs are things such as missing warnings for invalid certificates? > However, we shouldn't blindly adopt Midori as the default browser without > seriously looking at the health of the project Sure, that should be obvious. Though I am not proposing to make Midori THE default browser for all of Fedora, I am only proposing it as a default for those Spins where it fits the best technology-wise. > (that goes for any other browser, FWIW). The other two browsers in my list are active projects maintained by large trustworthy upstreams Fedora is already successfully working with: one (QupZilla/Falkon) is about to become the official browser of the KDE project, the other one (GNOME Web/Epiphany) is already the official browser of the GNOME project. So I don't think there is any need to worry about the health of those 2 projects. This also means that each of them is really the most suitable browser choice for the respective desktop environment, in the interest of providing an integrated user experience. The browser needs to return to being viewed as an integral part of the desktop environment, as it was in the Konqueror era. Firefox sticks out like a sore thumb on all of them. Kevin Kofler ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org
cone needs to be updated, here's a PR
When I built the new version of courier-unicode it broke cone, a cmdline email client. I attempted to contact the owners before the change and since with no response. I have no interest in being a maintainer of the package so could someone with permissions merge this? The latest upstream builds cleanly and appears to run in my light testing. I've also added checking the gpg signature of the source. Here's the PR: https://src.fedoraproject.org/rpms/cone/pull-request/1 Thanks, and have a happy holiday! -- Brian C. Lane (PST8PDT) ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Re: adding display authorization to other accounts is broken
On Thu, 2017-12-21 at 22:15 +0100, Rafal Luzynski wrote: > 20.12.2017 17:07 Przemek Klosowskiwrote: > > > > > > The primary logged-in session is of course authorized to access the main > > X11/wayland display, but it's often useful to add display authorization > > to other accounts. For instance, looking at disk space with 'baobab' > > works better as root because some areas of the filesystem are not > > readable to normal users (*). I used to do such authorization by > > > > xhost +si:localhost:root > > > > but it recently stopped working: > > https://bugzilla.redhat.com/show_bug.cgi?id=1527754 . Is there another > > way of authorizing display access for other accounts? If not, this is a > > fairly painful regression. > > The same here: > > https://pagure.io/system-config-language > https://bugzilla.redhat.com/show_bug.cgi?id=1274451 > > and AFAIUC the answer is that the applications should use polkit to > run privileged operations while being able to display regular user's GUI. Well, no, it's not exactly the same. Using xhost in this way has been a (grudgingly) documented workaround for Wayland's restrictions for some time now: https://fedoraproject.org/wiki/Common_F27_bugs#wayland-root-apps But it appears it has recently broken. That's a distinct thing from the existence of the restrictions in Wayland at all. -- Adam Williamson Fedora QA Community Monkey IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net http://www.happyassassin.net ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Re: adding display authorization to other accounts is broken
20.12.2017 17:07 Przemek Klosowskiwrote: > > > The primary logged-in session is of course authorized to access the main > X11/wayland display, but it's often useful to add display authorization > to other accounts. For instance, looking at disk space with 'baobab' > works better as root because some areas of the filesystem are not > readable to normal users (*). I used to do such authorization by > > xhost +si:localhost:root > > but it recently stopped working: > https://bugzilla.redhat.com/show_bug.cgi?id=1527754 . Is there another > way of authorizing display access for other accounts? If not, this is a > fairly painful regression. The same here: https://pagure.io/system-config-language https://bugzilla.redhat.com/show_bug.cgi?id=1274451 and AFAIUC the answer is that the applications should use polkit to run privileged operations while being able to display regular user's GUI. Regards, Rafał ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org
[EPEL-devel] Fedora EPEL 7 updates-testing report
The following Fedora EPEL 7 Security updates need testing: Age URL 1018 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-1087 dokuwiki-0-0.24.20140929c.el7 781 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-dac7ed832f mcollective-2.8.4-1.el7 363 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-04bc9dd81d libbsd-0.8.3-1.el7 260 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-d241156dfe mod_cluster-1.3.3-10.el7 258 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-7ecb12e378 python-XStatic-jquery-ui-1.12.0.1-1.el7 92 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-e27758bd23 libmspack-0.6-0.1.alpha.el7 30 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-e64eeb6ece nagios-4.3.4-5.el7 18 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-d704442ae7 qpid-cpp-1.37.0-1.el7 12 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-f2055d3f62 shellinabox-2.20-5.el7 12 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-77cc9084cb nodejs-6.12.2-1.el7 10 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-30026fdcc1 hostapd-2.6-7.el7 6 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-ae06399a6b heimdal-7.5.0-1.el7 3 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-9a67291cf1 json-c12-0.12.1-2.el7 1 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-263dafc1ae python-mistune-0.8.3-1.el7 0 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-957aa05f33 heketi-5.0.1-1.el7 The following builds have been pushed to Fedora EPEL 7 updates-testing certbot-0.20.0-1.el7 distribution-gpg-keys-1.17-1.el7 heketi-5.0.1-1.el7 python-acme-0.20.0-1.el7 python-certbot-apache-0.20.0-1.el7 python-certbot-nginx-0.20.0-1.el7 python-rpm-macros-3-18.el7 python36-3.6.3-5.el7 robodoc-4.99.41-13.el7 suricata-4.0.3-1.el7 wine-2.0.3-2.el7 zstd-1.3.3-1.el7 Details about builds: certbot-0.20.0-1.el7 (FEDORA-EPEL-2017-199b1e818a) A free, automated certificate authority client Update Information: Update to 0.20.0 distribution-gpg-keys-1.17-1.el7 (FEDORA-EPEL-2017-c3fabf46f2) GPG keys of various Linux distributions Update Information: Update Copr keys. heketi-5.0.1-1.el7 (FEDORA-EPEL-2017-957aa05f33) RESTful based volume management framework for GlusterFS Update Information: Security fix for CVE-2017-15103 and CVE-2017-15104 References: [ 1 ] Bug #1510147 - CVE-2017-15103 heketi: OS command injection in heketi API https://bugzilla.redhat.com/show_bug.cgi?id=1510147 [ 2 ] Bug #1510149 - CVE-2017-15104 heketi: Information disclosure through world readable file https://bugzilla.redhat.com/show_bug.cgi?id=1510149 python-acme-0.20.0-1.el7 (FEDORA-EPEL-2017-199b1e818a) Python library for the ACME protocol Update Information: Update to 0.20.0 python-certbot-apache-0.20.0-1.el7 (FEDORA-EPEL-2017-199b1e818a) The apache plugin for certbot Update Information: Update to 0.20.0 python-certbot-nginx-0.20.0-1.el7 (FEDORA-EPEL-2017-199b1e818a) The nginx plugin for certbot Update Information: Update to 0.20.0 python-rpm-macros-3-18.el7 (FEDORA-EPEL-2017-ddd7d1e59d) The unversioned Python RPM macros
Re: Firefox "shield"
On 21 December 2017 at 21:05, Gerald B. Coxwrote: > > > On Thu, Dec 21, 2017 at 10:35 AM, Ahmad Samir > wrote: >> >> I found this upstream bug report[1], and it's reproducible. So, >> there's something seriously screwed up upstream, and as someone said >> in the "firefox Looking Glass" thread on this list[2], looks like >> Marketing is overruling the security/privacy devs in Mozilla, I think >> he nailed the issue at the core of this debacle. > > > If you read the bug report it appears that this isn't a bug at all - but > rather someone going > into about:config and making assumptions which are incorrect. > The bug report had been updated _after_ I posted in this thread. ;) > There is a warning when you go into about:config - you're suppose to know > what you're doing. > True, but knowledge comes from docs, I did search around about the extensions.ui.experiment.hidden pref, but there's no documentation of it any where that I could see. Which is weird, given I always find pref names on https://dxr.mozilla.org . > If you want to disable shield studies, go into preferences/privacy security. > You don't need to fiddle > with about:config. > There's another report that changing settings via the preferences panel doesn't always stick https://bugzilla.mozilla.org/show_bug.cgi?id=1425663 -- Ahmad Samir ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org
[Bug 1528083] perl-HTTP-Message-6.14 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528083 Fedora Update Systemchanged: What|Removed |Added Status|MODIFIED|ON_QA --- Comment #3 from Fedora Update System --- perl-HTTP-Message-6.14-1.fc27 has been pushed to the Fedora 27 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2017-ace06804a3 -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1527723] perl-SOAP-Lite-1.24 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1527723 Fedora Update Systemchanged: What|Removed |Added Status|MODIFIED|ON_QA --- Comment #4 from Fedora Update System --- perl-SOAP-Lite-1.24-1.fc27 has been pushed to the Fedora 27 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2017-ca96a388c0 -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1527521] perl-SOAP-Lite-1.23 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1527521 Fedora Update Systemchanged: What|Removed |Added Status|CLOSED |ON_QA Resolution|WONTFIX |--- Keywords||Reopened --- Comment #7 from Fedora Update System --- perl-SOAP-Lite-1.24-1.fc27 has been pushed to the Fedora 27 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2017-ca96a388c0 -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[EPEL-devel] Fedora EPEL 6 updates-testing report
The following Fedora EPEL 6 Security updates need testing: Age URL 897 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7031 python-virtualenv-12.0.7-1.el6 891 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7168 rubygem-crack-0.3.2-2.el6 781 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-e2b4b5b2fb mcollective-2.8.4-1.el6 752 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-35e240edd9 thttpd-2.25b-24.el6 363 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-e3e50897ac libbsd-0.8.3-2.el6 92 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-4c76ddcc92 libmspack-0.6-0.1.alpha.el6 11 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-ed87c07972 hostapd-2.6-7.el6 11 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-6aaee32b7e optipng-0.7.6-6.el6 11 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-3432442a31 shellinabox-2.20-5.el6 7 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-0143bce8ee python34-3.4.5-4.el6 3 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-40e722a985 json-c12-0.12.1-2.el6 0 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-8d7c162c64 tor-0.2.9.14-1.el6 The following builds have been pushed to Fedora EPEL 6 updates-testing distribution-gpg-keys-1.17-1.el6 tor-0.2.9.14-1.el6 zstd-1.3.3-1.el6 Details about builds: distribution-gpg-keys-1.17-1.el6 (FEDORA-EPEL-2017-b40d8df69b) GPG keys of various Linux distributions Update Information: Update Copr keys. tor-0.2.9.14-1.el6 (FEDORA-EPEL-2017-8d7c162c64) Anonymizing overlay network for TCP Update Information: Update to latest LTS release References: [ 1 ] Bug #1520864 - CVE-2017-8819 CVE-2017-8820 CVE-2017-8821 CVE-2017-8822 CVE-2017-8823 tor: Multiple vulnerabilities [epel-6] https://bugzilla.redhat.com/show_bug.cgi?id=1520864 zstd-1.3.3-1.el6 (FEDORA-EPEL-2017-549d38052f) Zstd compression library Update Information: Latest upstream ___ epel-devel mailing list -- epel-devel@lists.fedoraproject.org To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Re: Firefox "shield"
On Thu, Dec 21, 2017 at 10:35 AM, Ahmad Samirwrote: > I found this upstream bug report[1], and it's reproducible. So, > there's something seriously screwed up upstream, and as someone said > in the "firefox Looking Glass" thread on this list[2], looks like > Marketing is overruling the security/privacy devs in Mozilla, I think > he nailed the issue at the core of this debacle. > If you read the bug report it appears that this isn't a bug at all - but rather someone going into about:config and making assumptions which are incorrect. There is a warning when you go into about:config - you're suppose to know what you're doing. If you want to disable shield studies, go into preferences/privacy security. You don't need to fiddle with about:config. ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Re: Firefox "shield"
On 21 December 2017 at 17:20, Dario Lescawrote: > > Il giorno gio, 21/12/2017 alle 15.56 +0100, Dario Lesca ha scritto: > > Il giorno sab, 16/12/2017 alle 19.11 -0500, Benjamin Kreuter ha > > scritto: > > > "extension.shield-recipe-client.enabled = true". > > > > The correct option is "extensions.shield-recipe-client.enabled" > > (extension is missing of 's'), ad for default is "true" > > > > Now I have set it to False. > > Another curious flag: "extensions.ui.experiment.hidden" > > in my config it is set to true, now I have set to false I found this upstream bug report[1], and it's reproducible. So, there's something seriously screwed up upstream, and as someone said in the "firefox Looking Glass" thread on this list[2], looks like Marketing is overruling the security/privacy devs in Mozilla, I think he nailed the issue at the core of this debacle. [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1425186 [2] https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/RFAJJBMKK6C2BEWJKCVBOLPWTGCFHWPW/ -- Ahmad Samir ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Re: Firefox "shield"
Il giorno gio, 21/12/2017 alle 15.56 +0100, Dario Lesca ha scritto: > Il giorno sab, 16/12/2017 alle 19.11 -0500, Benjamin Kreuter ha > scritto: > > "extension.shield-recipe-client.enabled = true". > > The correct option is "extensions.shield-recipe-client.enabled" > (extension is missing of 's'), ad for default is "true" > > Now I have set it to False. Another curious flag: "extensions.ui.experiment.hidden" in my config it is set to true, now I have set to false > > Thanks > > -- > Dario Lesca > (inviato dal mio Linux Fedora 27 Workstation) > ___ > devel mailing list -- devel@lists.fedoraproject.org > To unsubscribe send an email to devel-le...@lists.fedoraproject.org -- Dario Lesca (inviato dal mio Linux Fedora 27 Workstation) ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Re: Firefox "shield"
Il giorno sab, 16/12/2017 alle 19.11 -0500, Benjamin Kreuter ha scritto: > "extension.shield-recipe-client.enabled = true". The correct option is "extensions.shield-recipe-client.enabled" (extension is missing of 's'), ad for default is "true" Now I have set it to False. Thanks -- Dario Lesca (inviato dal mio Linux Fedora 27 Workstation) ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org
[rpms/perl-List-MoreUtils-XS] New Commits To "rpms/perl-List-MoreUtils-XS" (master)
The following commits were pushed to the repo "rpms/perl-List-MoreUtils-XS" on branch "master", which you are following: a2c8f390227ffc83c08c0efef52b8371c90bbe54Paul HowarthUpdate to 0.428 To view more about the commits, visit: https://src.fedoraproject.org/rpms/perl-List-MoreUtils-XS/commits/master ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1528276] New: perl-CPAN-Perl-Releases-3.44 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528276 Bug ID: 1528276 Summary: perl-CPAN-Perl-Releases-3.44 is available Product: Fedora Version: rawhide Component: perl-CPAN-Perl-Releases Keywords: FutureFeature, Triaged Assignee: jples...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: iarn...@gmail.com, jples...@redhat.com, perl-devel@lists.fedoraproject.org Latest upstream release: 3.44 Current version/release in rawhide: 3.42-1.fc28 URL: http://search.cpan.org/dist/CPAN-Perl-Releases/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from anitya: https://release-monitoring.org/project/5881/ -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1528079] perl-Dist-Zilla-Plugin-Test-Compile-2.058 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528079 Petr Šabatachanged: What|Removed |Added Status|ASSIGNED|CLOSED Fixed In Version||perl-Dist-Zilla-Plugin-Test ||-Compile-2.058-1.fc28 Resolution|--- |RAWHIDE Last Closed||2017-12-21 07:05:02 -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1528083] perl-HTTP-Message-6.14 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528083 --- Comment #2 from Fedora Update System--- perl-HTTP-Message-6.14-1.fc27 has been submitted as an update to Fedora 27. https://bodhi.fedoraproject.org/updates/FEDORA-2017-ace06804a3 -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1528083] perl-HTTP-Message-6.14 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528083 Petr Pisarchanged: What|Removed |Added Status|ASSIGNED|MODIFIED Fixed In Version||perl-HTTP-Message-6.14-1.fc ||28 --- Comment #1 from Petr Pisar --- A bug-fix release suitable for Fedora ≥ 27. -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1528074] perl-B-Generate-1.56 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528074 Petr Pisarchanged: What|Removed |Added Status|ASSIGNED|CLOSED Fixed In Version||perl-B-Generate-1.56-1.fc28 Resolution|--- |RAWHIDE Last Closed||2017-12-21 06:11:50 --- Comment #1 from Petr Pisar --- This release adds support for Perl 5.27.7. Safer for Rawhide only. -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1528074] perl-B-Generate-1.56 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1528074 Petr Pisarchanged: What|Removed |Added Status|NEW |ASSIGNED CC|jples...@redhat.com |ppi...@redhat.com Assignee|jples...@redhat.com |ppi...@redhat.com -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
[Bug 1527722] perl-Shell-Guess-0.08 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1527722 Petr Pisarchanged: What|Removed |Added Status|ASSIGNED|CLOSED Fixed In Version||perl-Shell-Guess-0.08-1.fc2 ||8 Resolution|--- |RAWHIDE Last Closed||2017-12-21 03:33:46 --- Comment #1 from Petr Pisar --- An enhancement release. Because it could change behavior, I will push it into Rawhide only. -- You are receiving this mail because: You are on the CC list for the bug. ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org