Re: Fedora Lifecycles: imagine longer-term possibilities

2018-11-13 Thread Michal Schorm
We, as a distro, just take a different approach.
To be bleeding edge requires to have releases often.

That allow us to manage changes like GCC, OpenSSL and so on quickly.
Struggling with upstream who don't adapt, can't adapt or don't want to
adapt at the same speed. (And OpenSSL patch isn't something you'd want
to write for serveral pojects you maintain ...)

That is what make us different distro with its own user base. Want the
very same but LTS system? try CentOS. Or RHEL.

--

Speaking for myslef, the trouble is to keep up with the system wide
changes even as a maintainer.
The MariaDB package for example:
In just last two years it went though 4 major releases - from 10.0 to 10.3.
I put a big effort into dividing server and client part, changing
packages layout and build dependency tree (for packages which need
MariaDB).
MariaDB also re-writtent the whole client library, huge change again.
Than OpenSSL, new GCC, python 2 removal ...
With so much changing, imagine the anguish of upgrades.

Last half a year I tried to make COPR repositories for each major
release (10.1-10.3) for every Fedora version (F27+). Worked well with
"15 minutes of best effort" rule. Not sure if anybody used it though.
Now I can slowly abadon the COPR thanks to modules which does the
trick. However all of the problems remained, while I should put more
energy and time into it.
* Rebuild 10.1 with new OpenSSL? don't think so ...
* Change package layout to undo some changes in releases that don
support it? not compatible with the rest of the OS ...
* Use release with old client library in Fedora version adjusted to
new one? breaks literaly everything ...

It's like "give me another folk working full time on it and I still
don't believe we could solve all of this".

What I wanted to express by this message is the fact, prolonging
software support time in Fedora means *a lot* of low-level work TBD.
I can maintain it either "bleeding edge style", geting users new
features literally ASAP, or "LTS style" defend the database from any
update to not break anything, bugfix and security fix only. (I'm doing
it for RHEL after all).
But not both.
That would require wide matrix of versions adapted to every change,
update and feature or not adapted at all (or just to some of them);
depending on whether the specific user pick LTS version or evolving
one.

Looked for a solution for over a year. Not finding any.
I keep saying RHEL & CentOS are our LTS versions.
Wishing good luck to your search.

--

Michal Schorm
Associate Software Engineer
Core Services - Databases Team
Red Hat

--


On Wed, Nov 14, 2018 at 12:37 AM Matthew Miller
 wrote:
>
>
> Hi everyone! Let's talk about something new and exciting. Since its
> first release fifteen years ago, Fedora has had a 13-month lifecycle
> (give or take). That works awesomely for many cases (like, hey, we're
> all here), but not for everyone. Let's talk about how we might address
> some of the users and use cases we're missing out on.
>
> When I talk to people about this, I often get "hey, you should do LTS
> or go to rolling releases.” As I've said before, on the surface that's
> a weird thing to say, since the actual user impact of those two
> different things is mostly _opposite_. So, digging in, it often really
> means "I don't want the pain and fear of big OS upgrades".
>
> We've addressed that in several ways: first, making upgrades better.
> (Thanks everyone who has worked on that.) A Fedora release-to-release
> update is normally not much more trouble than you might get some random
> Tuesday with a rolling release. Second, we have some things like Fedora
> Atomic Host and upcoming Fedora CoreOS and IoT which both implement a
> rolling stream on top of the Fedora release base. And finally, there's
> the coming-someday plans for gating Rawhide, making that a better
> proposition for people who really want to live on the edge.
>
> But there are some good cases for a longer lifecycle. For one thing,
> this has been a really big blocker for getting Fedora shipped on
> hardware. Second, there are people who really could be happily running
> Fedora but since we don't check the tickbox, they don't even look at us
> seriously. I'd love to change these things. To do that, we need
> something that lasts for 36-48 months.
>
> So, what would this look like? I have some ideas, but, really, there
> are many possibilities. That's what this thread is for. Let's figure it
> out. How would we structure repositories? How would we make sure we're
> not overworked? How would we balance this with getting people new stuff
> fast as well?
>
>
>
>
> --
> Matthew Miller
> 
> Fedora Project Leader
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 

Re: could Fedora please reverse its policy re End-Of-Life

2018-11-13 Thread Neal Gompa
On Tue, Nov 13, 2018 at 9:14 PM steve schooler  wrote:
>
>
> I am currently using Fedora 26.  When I first heard of your (new) End-Of-Life 
> policy, I hoped that the Fedora developer community would be so inundated 
> with complaints that the policy would be reversed.  Instead however, the 
> policy is being continued with Fedora 27.
>

This policy is not new. Our EOL policy has been this way for the
entire existence of the project (15 years!). Fedora releases are
effectively supported until the release after next, plus one month.
That usually equates to 13 months per release (give or take a month or
two).

Instead of supporting releases longer, we've elected to specifically
work towards making upgrades painless, so that it's not necessary to
stay on a particular release for the full length, and upgrading is
encouraged and well-supported.

If there's a problem with an upgrade, please feel free to file a bug
report in our bug tracker: https://bugz.fedoraproject.org.

As a final note: This is not the correct list for these kind of
inquiries. In the future, please discuss on our user support mailing
list: https://lists.fedoraproject.org/admin/lists/users.lists.fedoraproject.org/


--
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: could Fedora please reverse its policy re End-Of-Life

2018-11-13 Thread Kevin Kofler
steve schooler wrote:
> I am currently using Fedora 26.  When I first heard of your (new)
> End-Of-Life policy,

That policy is not new. It has been like that for years, and before that the 
lifetime was even shorter.

> If you agree but need to first alleviate current burdens, then I suggest
> revamping your management of spins.  Personally, my
> Fedora26-Cinnamon-spin-install _failed_.  Further, the problem was
> _immediately_ alleviated by my abandoning the spin, installing the
> _vanilla_ Fedora 26, and then _manually_ installing Cinnamon.  My rig has
> _no_ _video_ _card_; I use the mobo's onboard video.

The real issue that you have is that that happened. Why did installing from 
Cinnamon fail whereas installing Cinnamon after installing Fedora worked? If 
it was a driver issue fixed in an update, then you should simply install 
from the latest respin of the Cinnamon Spin, including all the updates:
https://dl.fedoraproject.org/pub/alt/live-respins/

The fact that your GPU is an onboard IGP is irrelevant. Driver issues can 
happen with IGPs and with dedicated GPUs just alike.

> I see _no_ _reason_ why the Fedora development community can't _replace_
> ALL OF ITS SPINS with user installation documents (instructions) the
> appropriate messages in the gui presented to the user at the end of the
> installation process.

Why would I want to install the whole GNOME that I don't use just to be able 
to install the desktop environment I actually use after the fact? That just 
does not make any sense whatsoever.

> Fedora's End-Of-Life policy be _changed_ from 13 months to 37 months.

Fedora never had such a long lifetime, and it is just not practical. It 
would mean supporting 7 releases at once!

Kevin Kofler
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


could Fedora please reverse its policy re End-Of-Life

2018-11-13 Thread steve schooler
This email is a hail mary pass.

I posted the following message to the Fedora forum:
   
https://ask.fedoraproject.org/en/question/129083/could-fedora-please-reverse-its-policy-re-end-of-life/
   

Part of the _closing_ response was for me to redirect the message to a 
fedora.org mailing list.  No joy attempting to access the fedora.org webpage, 
so I googled "fedora org mailing list".  This mailing list  _seems_ to be the 
most pertinent.  If this query is mis-directed, please either re-direct it or 
email me the correct email address or fedora org forum.

Note: I originally sent this message as an email and received an email response 
to post the message as a new thread, here.

The remainder of this email is my opinion.

I am currently using Fedora 26.  When I first heard of your (new) End-Of-Life 
policy, I hoped that the Fedora developer community would be so inundated with 
complaints that the policy would be reversed.  Instead however, the policy is 
being continued with Fedora 27.

I recognize that since Fedora is FREE, the developers face an enormous burden.  
However, I suspect that many will feel as I do that it is an onerous 
user-burden to have to frequently upgrade/re-install.  Further, 
forum-technical-support, regardless of how timely and incisive, doesn't 
compensate for the user-burden.

If you agree but need to first alleviate current burdens, then I suggest 
revamping your management of spins.  Personally, my 
Fedora26-Cinnamon-spin-install _failed_.  Further, the problem was 
_immediately_ alleviated by my abandoning the spin, installing the _vanilla_ 
Fedora 26, and then _manually_ installing Cinnamon.  My rig has _no_ _video_ 
_card_; I use the mobo's onboard video.

Internet-researching, I found that others had a similar experience.  I think 
that it is _not_ _practical_ for the Fedora development community to try to 
anticipate all of the anomalies caused by unusual hardware or drivers.  I see 
_no_ _reason_ why the Fedora development community can't _replace_ ALL OF ITS 
SPINS with user installation documents (instructions) + the appropriate 
messages in the gui presented to the user at the end of the installation 
process.  Naturally, you would want these "gui messages" _preserved_ as part of 
the installation, so that the "sleepy-user-installer" could be later directed 
to them as a forum query response.

Furthermore, the spin strategy that I am proposing transfers the 
_responsibility_ of the "spin install" (e.g. manually installing Cinnamon atop 
Fedora) where it _belongs_ (e.g. with the Cinnamon developers org).  Naturally, 
the "spin org" would expect that its developers would work _with_ the Fedora 
developers to resolve anomalies.

I advocate that this strategy be extended to _all_ spins, and that Fedora's 
End-Of-Life policy be _changed_ from 13 months to 37 months.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora Lifecycles: imagine longer-term possibilities

2018-11-13 Thread Stephen John Smoogen
On Tue, 13 Nov 2018 at 19:27, Matthew Miller  wrote:
>
>
> Hi everyone! Let's talk about something new and exciting. Since its
> first release fifteen years ago, Fedora has had a 13-month lifecycle
> (give or take). That works awesomely for many cases (like, hey, we're
> all here), but not for everyone. Let's talk about how we might address
> some of the users and use cases we're missing out on.
>
> When I talk to people about this, I often get "hey, you should do LTS
> or go to rolling releases.” As I've said before, on the surface that's
> a weird thing to say, since the actual user impact of those two
> different things is mostly _opposite_. So, digging in, it often really
> means "I don't want the pain and fear of big OS upgrades".
>
> We've addressed that in several ways: first, making upgrades better.
> (Thanks everyone who has worked on that.) A Fedora release-to-release
> update is normally not much more trouble than you might get some random
> Tuesday with a rolling release. Second, we have some things like Fedora
> Atomic Host and upcoming Fedora CoreOS and IoT which both implement a
> rolling stream on top of the Fedora release base. And finally, there's
> the coming-someday plans for gating Rawhide, making that a better
> proposition for people who really want to live on the edge.
>
> But there are some good cases for a longer lifecycle. For one thing,
> this has been a really big blocker for getting Fedora shipped on
> hardware. Second, there are people who really could be happily running
> Fedora but since we don't check the tickbox, they don't even look at us
> seriously. I'd love to change these things. To do that, we need
> something that lasts for 36-48 months.
>
> So, what would this look like? I have some ideas, but, really, there
> are many possibilities. That's what this thread is for. Let's figure it
> out. How would we structure repositories? How would we make sure we're
> not overworked? How would we balance this with getting people new stuff
> fast as well?
>

There are a lot of possibilities, but it is also that "something that
lasts for 36-48 months" probably means something different to everyone
involved.

To some set it means "Whatever was shipped on Day0 had only better get
backported fixes and maybe, maybe minor updates", to others it means
"well it shouldn't have any major api/abi updates in those 36-48
months.. " to the "so this just means it should be a rolling update as
long as everything always works or resets easily".  Is this
conversation completely blue-sky or are there boundaries we should
watch out for so we aren't arguing over "well why not make Fedora a
rebuild of Debian using a deb2rpm tool since they already are LTS" and
other people saying why not 


-- 
Stephen J Smoogen.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora Lifecycles: imagine longer-term possibilities

2018-11-13 Thread Matthew Miller

Hi everyone! Let's talk about something new and exciting. Since its
first release fifteen years ago, Fedora has had a 13-month lifecycle
(give or take). That works awesomely for many cases (like, hey, we're
all here), but not for everyone. Let's talk about how we might address
some of the users and use cases we're missing out on.

When I talk to people about this, I often get "hey, you should do LTS
or go to rolling releases.” As I've said before, on the surface that's
a weird thing to say, since the actual user impact of those two
different things is mostly _opposite_. So, digging in, it often really
means "I don't want the pain and fear of big OS upgrades".

We've addressed that in several ways: first, making upgrades better.
(Thanks everyone who has worked on that.) A Fedora release-to-release
update is normally not much more trouble than you might get some random
Tuesday with a rolling release. Second, we have some things like Fedora
Atomic Host and upcoming Fedora CoreOS and IoT which both implement a
rolling stream on top of the Fedora release base. And finally, there's
the coming-someday plans for gating Rawhide, making that a better
proposition for people who really want to live on the edge.

But there are some good cases for a longer lifecycle. For one thing,
this has been a really big blocker for getting Fedora shipped on
hardware. Second, there are people who really could be happily running
Fedora but since we don't check the tickbox, they don't even look at us
seriously. I'd love to change these things. To do that, we need
something that lasts for 36-48 months.

So, what would this look like? I have some ideas, but, really, there
are many possibilities. That's what this thread is for. Let's figure it
out. How would we structure repositories? How would we make sure we're
not overworked? How would we balance this with getting people new stuff
fast as well?




-- 
Matthew Miller

Fedora Project Leader
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora Rawhide-20181113.n.0 compose check report

2018-11-13 Thread Adam Williamson
On Tue, 2018-11-13 at 15:00 +, Fedora compose checker wrote:
> No missing expected images.
> 
> Failed openQA tests: 90/142 (x86_64), 24/24 (i386), 1/2 (arm)
> 
> New failures (same test did not fail in Rawhide-20181112.n.0):

Pretty much every failure today was caused by:
https://bugzilla.redhat.com/show_bug.cgi?id=1649531

some fairly innocuous-looking memory leak fixes in kbd somehow result
in no characters being shown on consoles. You can only see the cursor,
and color codes. Everything *works*, you just can't *see* it. This
breaks just about every openQA test as they all try to switch to a
console and do something at some point or other, and expect to be able
to 'see' what they're typing.

For now I've done a new kbd with the changes dropped, and a new Rawhide
is running. We've been fighting constantly to get a more-or-less fully
working Rawhide compose out for the last week or two, I'm hoping this
one will finally do the trick.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 29 release retrospective

2018-11-13 Thread Ben Cotton
Hi all,

Due to requests from folks on the North America west coast, I've
changed the time of the retrospective to 11am Eastern (1600 UTC). The
meeting will still be in
https://meet.jit.si/GuiltyCherriesSearchLoyally with notes taken in
#fedora-meeting-2 (this is a change). I apologize for the short
notice.

Here are topics that I have received. Please let me know if there are
other topics you want to see discussed.

* Unannounced changes to core packages
* "Go" decision despite bugs with updates

-- 
Ben Cotton
Fedora Program Manager
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Unexpected rebase of libsolv to 0.7.1 in F29, F28; please report any issues to bugzilla

2018-11-13 Thread Igor Gnatenko
On Tue, Nov 13, 2018 at 8:49 PM Randy Barlow
 wrote:
>
> On Tue, 2018-11-13 at 13:43 -0500, Neal Gompa wrote:
> > It wasn't a random rebase. A FESCo ticket was submitted and
> > approved[1]. However, there was a miscommunication that led to the
> > DNF
> > team not being aware it happened.
> >
> > [1]: https://pagure.io/fesco/issue/2009
>
> This was not approved - there was a -1 vote and so it was planned to be
> discussed in the next meeting.

I commented the ticket, but I will copy my response here: there was no
single -1 within a week after opening a ticket so to my knowledge the
ticket was approved.

> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Unexpected rebase of libsolv to 0.7.1 in F29, F28; please report any issues to bugzilla

2018-11-13 Thread Igor Gnatenko
On Tue, Nov 13, 2018 at 7:49 PM Peter Robinson  wrote:
>
> On Mon, Nov 12, 2018 at 3:35 PM Jaroslav Mracek  wrote:
> >
> > Hello everyone,
> >
> > There was an announcement of release libsolv-0.7.0 ([HEADS UP] libsolv 0.7) 
> > into rawhide, but the rebase also ended up in stable branches of Fedora 28 
> > and 29. This release could affect not only libsolv users, but also libdnf, 
> > PackageKit, microdnf, or dnf related applications.
> > I would like to ask everyone for intensive testing and reporting any issues 
> > concerning the rebase.
>
> How did this this happen? It's kind of strange that people weren't
> aware this was happening, what is some auto "git merge master"
> mistake. It's a fairly big problem to "accidentally" rebase to a major
> new release and not realise it was happening, especially on something
> so core as core updates infrastructure. What sort of things are you
> going to put in place to ensure random rebases don't just happen
> again?

It is not random rebase, there was even FESCo ticket.

> Peter
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Unexpected rebase of libsolv to 0.7.1 in F29, F28; please report any issues to bugzilla

2018-11-13 Thread Igor Gnatenko
On Mon, Nov 12, 2018 at 4:45 PM Jaroslav Mracek  wrote:
>
> Hello everyone,
>
> There was an announcement of release libsolv-0.7.0 ([HEADS UP] libsolv 0.7) 
> into rawhide, but the rebase also ended up in stable branches of Fedora 28 
> and 29. This release could affect not only libsolv users, but also libdnf, 
> PackageKit, microdnf, or dnf related applications.

libdnf, PK, microdnf and dnf **are** libsolv users.

> I would like to ask everyone for intensive testing and reporting any issues 
> concerning the rebase.

There is nothing in Fedora which is using any of functionality which
was changed in incompatible way (except for zypper which we handled
carefully with Neal Gompa in the same update).

If there won't be SONAME change, it would be released as 0.6.36 and no
one would notice any changes after rebase.

> Thanks a lot for your help
>
> Jaroslav
> on behalf of DNF team
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Unexpected rebase of libsolv to 0.7.1 in F29, F28; please report any issues to bugzilla

2018-11-13 Thread Randy Barlow
On Tue, 2018-11-13 at 13:43 -0500, Neal Gompa wrote:
> It wasn't a random rebase. A FESCo ticket was submitted and
> approved[1]. However, there was a miscommunication that led to the
> DNF
> team not being aware it happened.
> 
> [1]: https://pagure.io/fesco/issue/2009

This was not approved - there was a -1 vote and so it was planned to be
discussed in the next meeting.


signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Unexpected rebase of libsolv to 0.7.1 in F29, F28; please report any issues to bugzilla

2018-11-13 Thread Neal Gompa
On Tue, Nov 13, 2018 at 1:42 PM Peter Robinson  wrote:
>
> On Mon, Nov 12, 2018 at 3:35 PM Jaroslav Mracek  wrote:
> >
> > Hello everyone,
> >
> > There was an announcement of release libsolv-0.7.0 ([HEADS UP] libsolv 0.7) 
> > into rawhide, but the rebase also ended up in stable branches of Fedora 28 
> > and 29. This release could affect not only libsolv users, but also libdnf, 
> > PackageKit, microdnf, or dnf related applications.
> > I would like to ask everyone for intensive testing and reporting any issues 
> > concerning the rebase.
>
> How did this this happen? It's kind of strange that people weren't
> aware this was happening, what is some auto "git merge master"
> mistake. It's a fairly big problem to "accidentally" rebase to a major
> new release and not realise it was happening, especially on something
> so core as core updates infrastructure. What sort of things are you
> going to put in place to ensure random rebases don't just happen
> again?

It wasn't a random rebase. A FESCo ticket was submitted and
approved[1]. However, there was a miscommunication that led to the DNF
team not being aware it happened.

[1]: https://pagure.io/fesco/issue/2009



-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Unexpected rebase of libsolv to 0.7.1 in F29, F28; please report any issues to bugzilla

2018-11-13 Thread Peter Robinson
On Mon, Nov 12, 2018 at 3:35 PM Jaroslav Mracek  wrote:
>
> Hello everyone,
>
> There was an announcement of release libsolv-0.7.0 ([HEADS UP] libsolv 0.7) 
> into rawhide, but the rebase also ended up in stable branches of Fedora 28 
> and 29. This release could affect not only libsolv users, but also libdnf, 
> PackageKit, microdnf, or dnf related applications.
> I would like to ask everyone for intensive testing and reporting any issues 
> concerning the rebase.

How did this this happen? It's kind of strange that people weren't
aware this was happening, what is some auto "git merge master"
mistake. It's a fairly big problem to "accidentally" rebase to a major
new release and not realise it was happening, especially on something
so core as core updates infrastructure. What sort of things are you
going to put in place to ensure random rebases don't just happen
again?

Peter
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: [atomic-announce] Fedora Atomic Host Two Week Release Announcement: 29.20181113.0

2018-11-13 Thread Sinny Kumari
On Tue, Nov 13, 2018 at 10:14 PM  wrote:

>
> A new Fedora Atomic Host update is available via an OSTree update:
>
> Version: 29.20181113.0
> Commit(x86_64):
> 89bfa708d349a5856cc5cd3be441c07e1f96d0be2aa97e2b676f6004e7f6abed
> Commit(aarch64):
> d0e58aa379b37a39fd5e29b8d87d747b5a3a6aeaef91de751f7abd39fbbe2d51
> Commit(ppc64le):
> d8c4215c936a5e064dc4f1c9dbde5f08f77535995a7b3eddfed1fe2bad784a45
>
>
> We are releasing images from multiple architectures but please note
> that x86_64 architecture is the only one that undergoes automated
> testing at this time.
>
> Existing systems can be upgraded in place via e.g. `atomic host upgrade`.
>
> Corresponding image media for new installations can be downloaded from:
>
> https://getfedora.org/en/atomic/download/
>
> Alternatively, image artifacts can be found at the following links:
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/aarch64/images/Fedora-AtomicHost-29-20181113.0.aarch64.qcow2
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/aarch64/images/Fedora-AtomicHost-29-20181113.0.aarch64.raw.xz
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/aarch64/iso/Fedora-AtomicHost-ostree-aarch64-29-20181113.0.iso
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/ppc64le/images/Fedora-AtomicHost-29-20181113.0.ppc64le.qcow2
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/ppc64le/images/Fedora-AtomicHost-29-20181113.0.ppc64le.raw.xz
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/ppc64le/iso/Fedora-AtomicHost-ostree-ppc64le-29-20181113.0.iso
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/x86_64/images/Fedora-AtomicHost-29-20181113.0.x86_64.qcow2
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/x86_64/images/Fedora-AtomicHost-29-20181113.0.x86_64.raw.xz
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/x86_64/images/Fedora-AtomicHost-Vagrant-29-20181113.0.x86_64.vagrant-libvirt.box
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/x86_64/images/Fedora-AtomicHost-Vagrant-29-20181113.0.x86_64.vagrant-virtualbox.box
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/x86_64/iso/Fedora-AtomicHost-ostree-x86_64-29-20181113.0.iso
>
> Respective signed CHECKSUM files can be found here:
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/aarch64/images/Fedora-AtomicHost-29-20181113.0-aarch64-CHECKSUM
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/aarch64/iso/Fedora-AtomicHost-29-20181113.0-aarch64-CHECKSUM
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/ppc64le/images/Fedora-AtomicHost-29-20181113.0-ppc64le-CHECKSUM
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/ppc64le/iso/Fedora-AtomicHost-29-20181113.0-ppc64le-CHECKSUM
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/x86_64/images/Fedora-AtomicHost-29-20181113.0-x86_64-CHECKSUM
>
> https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/x86_64/iso/Fedora-AtomicHost-29-20181113.0-x86_64-CHECKSUM
>
> For direct download, the "latest" targets are always available here:
> x86_64:
> https://getfedora.org/atomic_qcow2_x86_64_latest
> https://getfedora.org/atomic_raw_x86_64_latest
> https://getfedora.org/atomic_vagrant_libvirt_x86_64_latest
> https://getfedora.org/atomic_vagrant_virtualbox_x86_64_latest
> https://getfedora.org/atomic_dvd_ostree_x86_64_latest
>
> aarch64:
> https://getfedora.org/atomic_qcow2_aarch64_latest
> https://getfedora.org/atomic_raw_aarch64_latest
> https://getfedora.org/atomic_dvd_ostree_aarch64_latest
>
> ppc64le:
> https://getfedora.org/atomic_qcow2_ppc64le_latest
> https://getfedora.org/atomic_raw_ppc64le_latest
> https://getfedora.org/atomic_dvd_ostree_ppc64le_latest
>
> Filename fetching URLs are available here:
> x86_64:
> https://getfedora.org/atomic_qcow2_x86_64_latest_filename
> https://getfedora.org/atomic_raw_x86_64_latest_filename
> https://getfedora.org/atomic_vagrant_libvirt_x86_64_latest_filename
> https://getfedora.org/atomic_vagrant_virtualbox_x86_64_latest_filename
> https://getfedora.org/atomic_dvd_ostree_x86_64_latest_filename
>
> aarch64:
> https://getfedora.org/atomic_qcow2_aarch64_latest_filename
> https://getfedora.org/atomic_raw_aarch64_latest_filename
> https://getfedora.org/atomic_dvd_ostree_aarch64_latest_filenam

Re: Ursa Major (modules in buildroot) enablement

2018-11-13 Thread Miroslav Suchý
Dne 05. 11. 18 v 16:22 Justin Forbes napsal(a):
> It
> is possible that some of this could be alleviated with a fairly simple
> change to mock.

There is no need for a change in Mock. Mock can consume modules for looong 
time. You can put in mock config something like:

# This is executed just before 'chroot_setup_cmd'.
config_opts['module_enable'] = ['list', 'of', 'modules']
config_opts['module_install'] = ['module1/profile', 'module2/profile']

This will enable and install the module in buildroot and make the RPMs 
available in buildroot.

Miroslav
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora Atomic Host Two Week Release Announcement: 29.20181113.0

2018-11-13 Thread noreply

A new Fedora Atomic Host update is available via an OSTree update:

Version: 29.20181113.0
Commit(x86_64): 89bfa708d349a5856cc5cd3be441c07e1f96d0be2aa97e2b676f6004e7f6abed
Commit(aarch64): 
d0e58aa379b37a39fd5e29b8d87d747b5a3a6aeaef91de751f7abd39fbbe2d51
Commit(ppc64le): 
d8c4215c936a5e064dc4f1c9dbde5f08f77535995a7b3eddfed1fe2bad784a45


We are releasing images from multiple architectures but please note
that x86_64 architecture is the only one that undergoes automated
testing at this time.

Existing systems can be upgraded in place via e.g. `atomic host upgrade`.

Corresponding image media for new installations can be downloaded from:

https://getfedora.org/en/atomic/download/

Alternatively, image artifacts can be found at the following links:
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/aarch64/images/Fedora-AtomicHost-29-20181113.0.aarch64.qcow2
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/aarch64/images/Fedora-AtomicHost-29-20181113.0.aarch64.raw.xz
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/aarch64/iso/Fedora-AtomicHost-ostree-aarch64-29-20181113.0.iso
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/ppc64le/images/Fedora-AtomicHost-29-20181113.0.ppc64le.qcow2
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/ppc64le/images/Fedora-AtomicHost-29-20181113.0.ppc64le.raw.xz
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/ppc64le/iso/Fedora-AtomicHost-ostree-ppc64le-29-20181113.0.iso
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/x86_64/images/Fedora-AtomicHost-29-20181113.0.x86_64.qcow2
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/x86_64/images/Fedora-AtomicHost-29-20181113.0.x86_64.raw.xz
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/x86_64/images/Fedora-AtomicHost-Vagrant-29-20181113.0.x86_64.vagrant-libvirt.box
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/x86_64/images/Fedora-AtomicHost-Vagrant-29-20181113.0.x86_64.vagrant-virtualbox.box
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/x86_64/iso/Fedora-AtomicHost-ostree-x86_64-29-20181113.0.iso

Respective signed CHECKSUM files can be found here:
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/aarch64/images/Fedora-AtomicHost-29-20181113.0-aarch64-CHECKSUM
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/aarch64/iso/Fedora-AtomicHost-29-20181113.0-aarch64-CHECKSUM
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/ppc64le/images/Fedora-AtomicHost-29-20181113.0-ppc64le-CHECKSUM
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/ppc64le/iso/Fedora-AtomicHost-29-20181113.0-ppc64le-CHECKSUM
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/x86_64/images/Fedora-AtomicHost-29-20181113.0-x86_64-CHECKSUM
https://alt.fedoraproject.org/pub/alt/atomic/stable/Fedora-29-updates-20181113.0/AtomicHost/x86_64/iso/Fedora-AtomicHost-29-20181113.0-x86_64-CHECKSUM

For direct download, the "latest" targets are always available here:
x86_64:
https://getfedora.org/atomic_qcow2_x86_64_latest
https://getfedora.org/atomic_raw_x86_64_latest
https://getfedora.org/atomic_vagrant_libvirt_x86_64_latest
https://getfedora.org/atomic_vagrant_virtualbox_x86_64_latest
https://getfedora.org/atomic_dvd_ostree_x86_64_latest

aarch64:
https://getfedora.org/atomic_qcow2_aarch64_latest
https://getfedora.org/atomic_raw_aarch64_latest
https://getfedora.org/atomic_dvd_ostree_aarch64_latest

ppc64le:
https://getfedora.org/atomic_qcow2_ppc64le_latest
https://getfedora.org/atomic_raw_ppc64le_latest
https://getfedora.org/atomic_dvd_ostree_ppc64le_latest

Filename fetching URLs are available here:
x86_64:
https://getfedora.org/atomic_qcow2_x86_64_latest_filename
https://getfedora.org/atomic_raw_x86_64_latest_filename
https://getfedora.org/atomic_vagrant_libvirt_x86_64_latest_filename
https://getfedora.org/atomic_vagrant_virtualbox_x86_64_latest_filename
https://getfedora.org/atomic_dvd_ostree_x86_64_latest_filename

aarch64:
https://getfedora.org/atomic_qcow2_aarch64_latest_filename
https://getfedora.org/atomic_raw_aarch64_latest_filename
https://getfedora.org/atomic_dvd_ostree_aarch64_latest_filename

ppc64le:
https://getfedora.org/atomic_qcow2_ppc64le_latest_filename
https://getfedora.org/atomic_raw_ppc64le_latest_filename
https://getfedora.org/atomic_dvd_ostree_ppc64le_latest_filenam

[Modularity] Working Group IRC meeting minutes (2018-11-13)

2018-11-13 Thread Nils Philippsen
=
#fedora-meeting-3: Weekly Meeting of the Modularity Working Group
=


Minutes: 
https://meetbot.fedoraproject.org/fedora-meeting-3/2018-11-13/modularity_wg.2018-11-13-15.04.html
Minutes (text): 
https://meetbot.fedoraproject.org/fedora-meeting-3/2018-11-13/modularity_wg.2018-11-13-15.04.txt
Log: 
https://meetbot.fedoraproject.org/fedora-meeting-3/2018-11-13/modularity_wg.2018-11-13-15.04.log.html


Meeting summary
---
* Roll Call  (nils, 15:04:39)

* Agenda  (nils, 15:05:33)
  * [asamalik] Module lifecycles  (nils, 15:06:14)
  * [asamalik] Stream default changes & Fedora Changes  (nils, 15:06:27)
  * [asamalik] Stream branch ownership for packages & modules  (nils,
15:06:50)
  * [ignatenkobrain/sgallagh] How do we keep rawhide sane? (re: forcing
people to latest modules)  (nils, 15:07:33)

* Module lifecycles  (nils, 15:08:17)
  * LINK: https://pagure.io/modularity/issue/112   (asamalik, 15:08:35)
  * This is a follow-up of a recent (well, a month ago?) threads on the
Devel list about how we define and manage module lifecycles,
containing a proposal and input from those threads in it  (asamalik,
15:10:02)

* Stream default changes & Fedora Changes  (nils, 15:14:48)
  * LINK: https://pagure.io/modularity/issue/114   (nils, 15:15:40)
  * Likely the least complex topic of the four we have today. I have a
very short proposal there, already two +1's from bcotton and
sgallagh  (asamalik, 15:16:11)
  * we'll give it more time for people to give their +1's and -1's on
this one  (asamalik, 15:25:14)

* Stream branch ownership for packages & modules  (nils, 15:25:54)
  * LINK: https://pagure.io/modularity/issue/115   (nils, 15:26:03)
  * A specific proposal regarding stream branch ownership. Already
includes some input from recent (a month ago?) discussion about
managing module lifecycles on the Devel list.  (asamalik, 15:26:59)

* How do we keep rawhide sane? (re: forcing people to latest modules)
  (reprise)  (nils, 15:44:15)
  * LINK: https://pagure.io/modularity/issue/108   (nils, 15:44:37)
  * we'll continue the discussion in the ticket  (asamalik, 15:51:35)

Meeting ended at 15:54:52 UTC.




Action Items






Action Items, by person
---
* **UNASSIGNED**
  * (none)




People Present (lines said)
---
* asamalik (73)
* nils (44)
* zodbot (19)
* langdon (18)
* contyk (12)
* sgallagh (6)
* ignatenkobrain (2)
* bcotton (2)
* mikedep333 (0)




Generated by `MeetBot`_ 0.1.4

.. _`MeetBot`: http://wiki.debian.org/MeetBot
-- 
Nils Philippsen"Those who would give up Essential Liberty to
Software Engineer   purchase a little Temporary Safety, deserve neither
Red Hat Liberty nor Safety."  --  Benjamin Franklin, 1759
PGP fingerprint:C4A8 9474 5C4C ADE3 2B8F  656D 47D8 9B65 6951 3011
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Schedule for Monday's FESCo Meeting (2018-11-12)

2018-11-13 Thread Randy Barlow
On Sat, 2018-11-10 at 12:41 -0500, Randy Barlow wrote:
> Following is the list of topics that will be discussed in the
> FESCo meeting Monday at 15:00UTC in #fedora-meeting-1 on
> irc.freenode.net.

We did not reach quorum yesterday, so the meeting was canceled.


signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora Rawhide-20181113.n.0 compose check report

2018-11-13 Thread Fedora compose checker
No missing expected images.

Failed openQA tests: 90/142 (x86_64), 24/24 (i386), 1/2 (arm)

New failures (same test did not fail in Rawhide-20181112.n.0):

ID: 308260  Test: x86_64 Server-dvd-iso install_repository_nfs_graphical
URL: https://openqa.fedoraproject.org/tests/308260
ID: 308266  Test: x86_64 Server-dvd-iso install_updates_nfs
URL: https://openqa.fedoraproject.org/tests/308266
ID: 308267  Test: x86_64 Server-dvd-iso install_repository_nfs_variation
URL: https://openqa.fedoraproject.org/tests/308267
ID: 308272  Test: x86_64 Everything-boot-iso install_default
URL: https://openqa.fedoraproject.org/tests/308272
ID: 308273  Test: x86_64 Everything-boot-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/308273
ID: 308274  Test: i386 Everything-boot-iso install_default
URL: https://openqa.fedoraproject.org/tests/308274
ID: 308275  Test: x86_64 Workstation-live-iso desktop_notifications_live
URL: https://openqa.fedoraproject.org/tests/308275
ID: 308276  Test: x86_64 Workstation-live-iso install_default_upload
URL: https://openqa.fedoraproject.org/tests/308276
ID: 308277  Test: x86_64 Workstation-live-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/308277
ID: 308287  Test: x86_64 Workstation-boot-iso install_default
URL: https://openqa.fedoraproject.org/tests/308287
ID: 308290  Test: x86_64 Workstation-boot-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/308290
ID: 308291  Test: i386 Workstation-live-iso install_default
URL: https://openqa.fedoraproject.org/tests/308291
ID: 308294  Test: x86_64 KDE-live-iso install_default_upload
URL: https://openqa.fedoraproject.org/tests/308294
ID: 308295  Test: x86_64 KDE-live-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/308295
ID: 308296  Test: x86_64 KDE-live-iso install_no_user
URL: https://openqa.fedoraproject.org/tests/308296
ID: 308301  Test: x86_64 KDE-live-iso desktop_notifications_live
URL: https://openqa.fedoraproject.org/tests/308301
ID: 308307  Test: i386 KDE-live-iso install_default
URL: https://openqa.fedoraproject.org/tests/308307
ID: 308310  Test: x86_64 AtomicHost-dvd_ostree-iso install_default
URL: https://openqa.fedoraproject.org/tests/308310
ID: 308311  Test: x86_64 AtomicHost-dvd_ostree-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/308311
ID: 308313  Test: x86_64 Silverblue-dvd_ostree-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/308313
ID: 308314  Test: x86_64 Silverblue-dvd_ostree-iso base_service_manipulation
URL: https://openqa.fedoraproject.org/tests/308314
ID: 308321  Test: x86_64 universal install_shrink_ntfs
URL: https://openqa.fedoraproject.org/tests/308321
ID: 308323  Test: x86_64 universal install_multi
URL: https://openqa.fedoraproject.org/tests/308323
ID: 308324  Test: x86_64 universal install_multi@uefi
URL: https://openqa.fedoraproject.org/tests/308324
ID: 308325  Test: x86_64 universal install_simple_free_space
URL: https://openqa.fedoraproject.org/tests/308325
ID: 308326  Test: x86_64 universal install_multi_empty
URL: https://openqa.fedoraproject.org/tests/308326
ID: 308327  Test: x86_64 universal install_simple_encrypted@uefi
URL: https://openqa.fedoraproject.org/tests/308327
ID: 308330  Test: x86_64 universal install_arabic_language
URL: https://openqa.fedoraproject.org/tests/308330
ID: 308331  Test: x86_64 universal install_asian_language
URL: https://openqa.fedoraproject.org/tests/308331
ID: 308333  Test: x86_64 universal install_sata@uefi
URL: https://openqa.fedoraproject.org/tests/308333
ID: 308335  Test: x86_64 universal install_ext3
URL: https://openqa.fedoraproject.org/tests/308335
ID: 308337  Test: x86_64 universal install_multi_empty@uefi
URL: https://openqa.fedoraproject.org/tests/308337
ID: 308339  Test: x86_64 universal install_blivet_lvmthin
URL: https://openqa.fedoraproject.org/tests/308339
ID: 308340  Test: x86_64 universal install_blivet_ext3@uefi
URL: https://openqa.fedoraproject.org/tests/308340
ID: 308341  Test: x86_64 universal install_blivet_btrfs@uefi
URL: https://openqa.fedoraproject.org/tests/308341
ID: 308342  Test: x86_64 universal install_blivet_no_swap@uefi
URL: https://openqa.fedoraproject.org/tests/308342
ID: 308347  Test: x86_64 universal install_updates_img_local
URL: https://openqa.fedoraproject.org/tests/308347
ID: 308348  Test: x86_64 universal install_xfs
URL: https://openqa.fedoraproject.org/tests/308348
ID: 308349  Test: x86_64 universal install_lvmthin
URL: https://openqa.fedoraproject.org/tests/308349
ID: 308350  Test: x86_64 universal install_no_swap
URL: https://openqa.fedoraproject.org/tests/308350
ID: 308351  Test: x86_64 universal install_iscsi
URL: https://openqa.fedoraproject.org/tests/308351
ID: 308352  Test: x86_64 universal install_blivet_ext3
URL: https://openqa.fedoraproject.org/test

Re: Orphaning/Intent to orphan the entire pulp stack

2018-11-13 Thread Stephen John Smoogen
On Tue, 13 Nov 2018 at 09:39, Patrick Creech  wrote:
>
> On Tue, 2018-11-13 at 07:56 +0100, Miro Hrončok wrote:
> > On 12. 11. 18 22:37, Patrick Creech wrote:
> > > The pulp team is orphaning the pulp 2 stack in fedora's repositories.
> > >
> > > The upstream project is focusing the majority of it's development efforts 
> > > on pulp 3, and is removing fedora support for the pulp 2 line.
> > >
> > > This will also assist other package's transitions to python 3 only, as 
> > > there have been cases where pulp prevented them from dropping python 2 in 
> > > fedora.
> >
> > If you orphan it, but not retire it, it won't help much.
>
> Ah, I was under the (possibly incorrect?) assumption that orphaning was the 
> beginning step in retiring?
>
> The resources I saw really only said that to retire it had to be orphaned, or 
> at least that's what I gleaned from those articles.
>
> Thoughts on how to proceed, since a good portion are already 'orphaned', and 
> the rest are waiting on action from the other 'owner'
>

It is usually correct when you have software which can be kept up by
someone else. If the code is dead and to be replaced by another.. then
retiring is correct.


> > > Packages being orphaned:
> > > - pulp
> > > - pulp-rpm
> > > - pulp-puppet
> > > - pulp-ostree
> > > - pulp-docker
> > > - pulp-python
> > > - python-crane
> >
> >
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org



-- 
Stephen J Smoogen.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora rawhide compose report: 20181113.n.0 changes

2018-11-13 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20181112.n.0
NEW: Fedora-Rawhide-20181113.n.0

= SUMMARY =
Added images:3
Dropped images:  0
Added packages:  9
Dropped packages:1
Upgraded packages:   173
Downgraded packages: 1

Size of added packages:  93.32 MiB
Size of dropped packages:495.07 KiB
Size of upgraded packages:   2.36 GiB
Size of downgraded packages: 39.55 MiB

Size change of upgraded packages:   111.49 MiB
Size change of downgraded packages: 13.37 KiB

= ADDED IMAGES =
Image: Server raw-xz aarch64
Path: Server/aarch64/images/Fedora-Server-Rawhide-20181113.n.0.aarch64.raw.xz
Image: Astronomy_KDE live x86_64
Path: Labs/x86_64/iso/Fedora-Astronomy_KDE-Live-x86_64-Rawhide-20181113.n.0.iso
Image: Astronomy_KDE live i386
Path: Labs/i386/iso/Fedora-Astronomy_KDE-Live-i386-Rawhide-20181113.n.0.iso

= DROPPED IMAGES =

= ADDED PACKAGES =
Package: mod_psgi-0.0.1-0.1.20120822git9732348.fc30
Summary: Apache httpd plugin for handling PSGI applications
RPMs:mod_psgi
Size:150.62 KiB

Package: perl-Net-IMAP-Client-0.9505-1.fc30
Summary: IMAP client library for Perl
RPMs:perl-Net-IMAP-Client
Size:52.38 KiB

Package: php-doctrine-event-manager-1.0.0-1.fc30
Summary: Simple PHP event system
RPMs:php-doctrine-event-manager
Size:11.63 KiB

Package: php-doctrine-persistence-1.0.1-1.fc30
Summary: Doctrine Persistence abstractions
RPMs:php-doctrine-persistence
Size:29.78 KiB

Package: php-doctrine-reflection-1.0.0-1.fc30
Summary: Additional reflection functionality
RPMs:php-doctrine-reflection
Size:15.26 KiB

Package: python-fsleyes-0.26.4-1.fc30
Summary: FSLeyes, the FSL image viewer
RPMs:python-fsleyes-doc python3-fsleyes
Size:32.49 MiB

Package: python-indexed_gzip-0.8.7-1.fc30
Summary: Fast random access of gzip files in Python
RPMs:python3-indexed_gzip
Size:1.97 MiB

Package: python-pybids-0.6.5-2.gite35ced6.fc30
Summary: Interface with datasets conforming to BIDS
RPMs:python-pybids-doc python3-pybids
Size:9.14 MiB

Package: rofi-1.5.1-6.fc30
Summary: A window switcher, application launcher and dmenu replacement
RPMs:rofi rofi-devel rofi-devel-doc rofi-themes
Size:49.46 MiB


= DROPPED PACKAGES =
Package: lekhonee-0.7-17.fc29
Summary: A blog client
RPMs:lekhonee lekhonee-lib
Size:495.07 KiB


= UPGRADED PACKAGES =
Package:  CuraEngine-1:3.5.1-1.fc30
Old package:  CuraEngine-1:3.4.1-1.fc30
Summary:  Engine for processing 3D models into G-code instructions for 3D 
printers
RPMs: CuraEngine
Size: 4.19 MiB
Size change:  125.09 KiB
Changelog:
  * Mon Nov 12 2018 Miro Hron??ok  - 0:3.5.1-2
  - Update to 3.5.1 (#1644323)

  * Mon Nov 12 2018 Miro Hron??ok  - 1:3.5.1-1
  - Fix the error in epoch/release


Package:  almanah-0.11.1-22.fc30
Old package:  almanah-0.11.1-21.fc29
Summary:  Application for keeping an encrypted diary
RPMs: almanah
Size: 1.57 MiB
Size change:  -28.11 KiB
Changelog:
  * Mon Nov 12 2018 Milan Crha  - 0.11.1-22
  - Rebuilt for evolution-data-server soname bump


Package:  android-file-transfer-3.7-1.fc30
Old package:  android-file-transfer-3.6-1.fc30
Summary:  Reliable Android MTP client with minimalist UI
RPMs: android-file-transfer
Size: 2.18 MiB
Size change:  1.56 KiB
Changelog:
  * Mon Nov 12 2018 Marek Blaha  - 3.7-1
  - New upstream release 3.7


Package:  bird-2.0.2-2.fc30
Old package:  bird-1.6.3-8.fc29
Summary:  BIRD Internet Routing Daemon
RPMs: bird bird-doc
Dropped RPMs: bird6
Size: 2.37 MiB
Size change:  -1.27 MiB
Changelog:
  * Mon Nov 12 2018 Stanislav Kozina  - 2.0.2-1
  - update to 2.0.2 (#1524385)

  * Mon Nov 12 2018 Stanislav Kozina  - 2.0.2-2
  - Run bird under bird user and group rather than root (#1397574)


Package:  blosc-1.14.4-1.fc30
Old package:  blosc-1.14.3-1.fc29
Summary:  High performance compressor optimized for binary data
RPMs: blosc blosc-bench blosc-devel
Size: 506.22 KiB
Size change:  -19.14 KiB
Changelog:
  * Mon Nov 12 2018 Zbigniew J??drzejewski-Szmek  - 1.14.4-1
  - Update to latest version (#1609768)


Package:  buildah-1.5-6.dev.gitfb2b2bd.fc30
Old package:  buildah-1.5-5.dev.git9add3c8.fc30
Summary:  A command line tool used for creating OCI Images
RPMs: buildah
Size: 23.43 MiB
Size change:  -84 B
Changelog:
  * Tue Nov 13 2018 Lokesh Mandvekar (Bot)  - 
1.5-6.dev.gitfb2b2bd
  - autobuilt fb2b2bd


Package:  caribou-0.4.21-13.fc30
Old package:  caribou-0.4.21-12.fc29
Summary:  A simplified in-place on-screen keyboard
RPMs: caribou caribou-antler caribou-devel caribou-gtk2-module 
caribou-gtk3-module python3-caribou
Dropped RPMs: python2-caribou
Size: 1.34 MiB
Size change:  -102.91 KiB
Changelog:
  * Mon Nov 12 2018 Miro Hron??ok  - 0.4.21-13
  - Remove python2 subpackage (#1628174)


Package:  cinnamon-4.0.1-1.fc30
Old package:  cinnamon-4.0.0-1.fc30
Summary

Re: Orphaning/Intent to orphan the entire pulp stack

2018-11-13 Thread Patrick Creech

> Thoughts on how to proceed, since a good portion are already 'orphaned', and 
> the rest are waiting on action from the other 'owner'

I did a little more digging this morning, and found the retire steps.  I have 
retired on master the same packages listed below.  Apologies for the confusion.

> > > Packages being orphaned:
> > > - pulp
> > > - pulp-rpm
> > > - pulp-puppet
> > > - pulp-ostree
> > > - pulp-docker
> > > - pulp-python
> > > - python-crane
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Orphaning/Intent to orphan the entire pulp stack

2018-11-13 Thread Patrick Creech
On Tue, 2018-11-13 at 07:56 +0100, Miro Hrončok wrote:
> On 12. 11. 18 22:37, Patrick Creech wrote:
> > The pulp team is orphaning the pulp 2 stack in fedora's repositories.
> > 
> > The upstream project is focusing the majority of it's development efforts 
> > on pulp 3, and is removing fedora support for the pulp 2 line.
> > 
> > This will also assist other package's transitions to python 3 only, as 
> > there have been cases where pulp prevented them from dropping python 2 in 
> > fedora.
> 
> If you orphan it, but not retire it, it won't help much.

Ah, I was under the (possibly incorrect?) assumption that orphaning was the 
beginning step in retiring? 

The resources I saw really only said that to retire it had to be orphaned, or 
at least that's what I gleaned from those articles.

Thoughts on how to proceed, since a good portion are already 'orphaned', and 
the rest are waiting on action from the other 'owner'

> > Packages being orphaned:
> > - pulp
> > - pulp-rpm
> > - pulp-puppet
> > - pulp-ostree
> > - pulp-docker
> > - pulp-python
> > - python-crane
> 
> 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Upstream tip wanted: CI service for Big Endian acrhes

2018-11-13 Thread Jun Aruga
I just created the topic on Travis community page.
https://travis-ci.community/t/multiarch-testing-tips/862

Jun
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Ursa Major (modules in buildroot) enablement

2018-11-13 Thread Jakub Cajka
> Please do not drag Go into this if you want to handwave Go away
> problems. Yes modules will be useful in Go but only to blow away in EPEL
> the rotten Go codebase RHEL ships.
> 
> But anyway, since you referred to GO.
> 
> Go is the perfect example of why bundling as a general approach does not
> work and does not scale. In case you haven't noticed years of bundling
> Go side has resulted in such a deep widespread rot Google is scrambling
> to write a Go v2 language version that will force Go projects to version
> and update.
> 
> All the people that claim bundling allows “using a slightly older
> version” (implying it's a good safe maintained older version) are lying
> through their teeth. Yes it allows doing that but that's not how people
> use it. And it does not matter if you bundle via self-provided windows
> DLLS, containers, flatpacks, modules or rhel versions.
> 
> Bundling basically allows reusing third party code blindly without any
> form of audit or maintenance. You take third party code, you adapt your
> code to its current API, and you forget about it.
> 
> You definitely *not* check it for security legal or other problems, you
> definitely *not* check regularly if CVEs or updates have been released,
> you definitely *not* try to maintain it yourself. Any bundler dev that
> tells you otherwise lies. The average bundler dev will tell you “Look at
> my wonderful up to date award-wining modern code, security problems? Ah,
> that, not my code, I bundle it, not my problem”.
> 
> It is however a *huge* problem for the people on the receiving end of
> the resulting software, static builds or not. Static builds do not add
> missing new features or fix security holes. They just remove the shared
> libs that could  be used by the sysadmin use to track them. And since
> malware authors do not bother identifying how software was compiled,
> before attempting to exploit it, static builds do not hinder them the
> slightest.
> 
> While trying to improve Go packaging in Fedora by myself I found serious
> old security issues in first-class Go code. First-class as in benefiting
> from huge publicised ongoing dev investments from major companies like
> Google, Red Hat or Microsoft. It’s not hard, you do not even need to
> write Go code, just take the bundled pile of components those bundle,
> and read the upstream changelog of those components for later versions.
> You will hit pearls like “emergency release because of *** CVE”. Or
> “need to change the API to fix a race in auth token processing”. And the
> answer of the projects that bundled a previous state of this code was
> never “we have a problem” or “we have fixed it some other way” but “go
> away, we haven’t planned to look or touch this code before  future>”.
> 
> And, again, I’m no Go dev, or dev in general, I didn’t even try any form
> of systematic audit, that was just the bits jumping to attention when I
> hit API changes and had to look at the code history to try to figure
> when they occurred. The day any bundled codebase is subjected to the
> kind of herd security research java was some years ago and CPUs are
> today sparks are going to fly all over the place.
> 
> And this is a natural phenomenon trivial to explain. Maintaining old
> code versions is hard. Upstreams are not interested in supporting you.
> You have to redo their work by yourself, while forbidding yourself API
> changes (if you were ready to accept them you wouldn't have bundled in
> the first place). And modern code is so deeply interdependent, freeze
> one link in the dependency web and you get cascading effects all other
> the place. You quickly end up maintaining old versions of every single
> link in this web. If you try to do it seriously, you effectively have to
> fork and maintain the whole codebase. IE all the no-support problems of
> barebones free software, with none of the community friends help that
> should come with it.
> 
> That's what RH tries to do for EL versions. It takes a *huge* dev
> investment to do in a semi-secure no-new features way. And after a
> decade, RH just dumps the result, because even with all those efforts,
> it reaches terminal state and has no future.
> 
> There is only one way to maintain cheaply lots of software components
> that call each other all over the place. That’s to standardise on the
> latest stable release of each of them (and when upstream does not
> release, the latest commit). And aggressively port everything to the
> updates of those versions when they occur. If you are rich, maintain a
> couple of those baselines, maximum. flatpackers do not say otherwise
> with their frameworks (except I think they deeply underestimate the
> required framework scope).
> 
> And sure, every once in a while, porting takes consequent effort, it can
> not be done instantaneously, devs are mobilized elsewhere, etc. That's
> when you use targeted compat packages, to organise the porting effort,
> to push the bits already ported while keeping t

[modularity] Contribute to Modularity architecture discussions

2018-11-13 Thread Adam Samalik
Just to make sure this reaches all interested parties, we have some
important discussions about Modularity going on in Pagure tickets:

Distribution Upgrades (reaching decision) — Handling modules, streams, and
defaults during major distribution upgrades.
* Tracker: https://tree.taiga.io/project/modularity-wg/epic/27
* Discussion: https://pagure.io/modularity/issue/108

Module Lifecycles in General (proposal) — The general concept of defining
and managing module lifecycles.
* Tracker: https://tree.taiga.io/project/modularity-wg/epic/3
* Discussion: https://pagure.io/modularity/issue/112

Defaults & Fedora Changes (proposal) — Communicating major changes in the
distribution introduced by new module stream defaults.
* Tracker: https://tree.taiga.io/project/modularity-wg/epic/35
* Discussion: https://pagure.io/modularity/issue/114

Branch Ownership (proposal) — Making sure that package and module owners
are clearly defined and relevant processes are in place.
* Tracker: https://tree.taiga.io/project/modularity-wg/epic/4
* Discussion: https://pagure.io/modularity/issue/115

Cheers!
Adam

-- 

Adam Šamalík
---
Software Engineer
Red Hat
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Golang review swaps

2018-11-13 Thread Ankur Sinha
On Mon, Nov 12, 2018 21:05:19 +0100, Robert-André Mauchin wrote:
> Hi,

Hi Robert,

> i need help reviewing these packages:
> 
> - golang-contrib-opencensus-exporter https://bugzilla.redhat.com/
> show_bug.cgi?id=1649059
> - golang-github-census-instrumentation-opencensus-proto https://
> bugzilla.redhat.com/show_bug.cgi?id=1649058
> 
> There are simple Golang packages, I'll swap with anything in exchange.
> 
I'll take them both up. Would you be able to review python-brian2 in
exchange please?

https://bugzilla.redhat.com/show_bug.cgi?id=1649127

-- 
Thanks,
Regards,

Ankur Sinha "FranciscoD"

https://fedoraproject.org/wiki/User:Ankursinha
Time zone: Europe/London


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org