Schedule for Thursday's FPC Meeting (2019-04-18 16:00 UTC)

2019-04-17 Thread James Antill
Following is the list of topics that will be discussed in the
FPCmeeting Thursday at 2019-04-18 16:00 UTC in #fedora-meeting-1 on
irc.freenode.net.
 Local time information (via. uitime):

= Day: Thursday ==2019-04-18 09:00
PDT  US/Pacific2019-04-18 12:00 EDT  -->
US/Eastern <--2019-04-18 16:00 UTC  UTC   2019-
04-18 17:00 BST  Europe/London 2019-04-18 18:00
CEST Europe/Berlin 2019-04-18 18:00
CEST Europe/Paris  2019-04-18 21:30
IST  Asia/Calcutta  New Day: Friday -
2019-04-19 00:00 HKT  Asia/Hong_Kong2019-04-19 00:00
+08  Asia/Singapore2019-04-19 01:00
JST  Asia/Tokyo2019-04-19 02:00 AEST Australia/Brisbane

 Links to all tickets below can be found at: 
https://pagure.io/packaging-committee/issues?status=Open&tags=meeting
= Followups =
#topic #382 Go Packaging Guidelines Draft.fpc 382
https://pagure.io/packaging-committee/issue/382
#topic #845 Wiki deprecation status.fpc 845
https://pagure.io/packaging-committee/issue/845
#topic #859 Scriptlet to replace a directory: try delete first? .fpc
859https://pagure.io/packaging-committee/issue/859
#topic #876 Mass Python 2 Package Removal - policies and
exceptions  .fpc 876https://pagure.io/packaging-committee/issue/876
= Open Floor = 
 For more complete details, please visit each individual
ticket.  Thereport of the agenda items can be found at:
https://pagure.io/packaging-committee/issues?status=Open&tags=meeting
 If you would like to add something to this agenda, you can:  * Reply
to this e-mail  * File a new ticket at: 
https://pagure.io/packaging-committee  * E-mail me directly  * Bring it
up at the end of the meeting, during the open floor topic. Notethat
added topics may be deferred until the following meeting.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


libqalculate soname change

2019-04-17 Thread Mukundan Ragavan
libqalculate soname bump is happening with update to v3.1. The following
packages are affected -

plasma-workspace
step
cantor
qalculate-kde

I will rebuild these in the coming days.Note that qalculate-kde is FTBFS
right now.



signature.asc
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


review swap: ibsim

2019-04-17 Thread Honggang LI
hi,

https://bugzilla.redhat.com/show_bug.cgi?id=1701070
https://github.com/linux-rdma/ibsim

ibsim emulates the fabric behavior by using MAD communication with the
SM/SA and the PerfMgr. This simple tool is ideally suitable for various
research, development, debug and testing tasks where IB subnet
management is involved.


I can review package wrote in C/bash as review swap.

thanks
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Can we maybe reduce the set of packages we install by default a bit?

2019-04-17 Thread Chris Murphy
On Wed, Apr 17, 2019 at 11:36 AM Lennart Poettering
 wrote:
>
> Yeah, all that stuff is stuff the kernel could do better on its
> own. If the CPU jitter stuff or the TPM stuff is a good idea, then why
> not add that to the kernel natively, why involve userspace with that?
> i.e. if the TPM and the CPU jitter stuff can be trusted, then the same
> thing as for CONFIG_RANDOM_TRUST_CPU=y should be done: pass the random
> data into the pool directly inside in the kernel.

$ grep CONFIG_HW_RANDOM_TPM /boot/config-5.0.6-300.fc30.x86_64
CONFIG_HW_RANDOM_TPM=y

I've got no idea if this is for TPM 1.x or 2.x or both.

> Well, no. I mean, the only way you can do that is by turning rngd into
> its own init system, if you want it to run before the init
> system.

/usr/lib/systemd/system/rngd.service contains

WantedBy=multi-user.target

I'm gonna guess Steve Grubb is wondering whether it could be wanted by
an earlier target, possibly cryptsetup-pre.target? I don't see a
service file in the upstream project so this may have been selected by
the Fedora packager as a known to work option.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Can we maybe reduce the set of packages we install by default a bit?

2019-04-17 Thread Zbigniew Jędrzejewski-Szmek
On Tue, Apr 16, 2019 at 09:06:02AM -0700, Adam Williamson wrote:
> On Tue, 2019-04-16 at 11:48 -0400, Matthias Clasen wrote:
> > On Tue, Apr 9, 2019 at 12:08 PM Lennart Poettering 
> > wrote:
> > 
> > > Heya,
> > > 
> > > today I installed the current Fedora 30 Workstation beta on my new
> > > laptop. It was a bumpy ride, I must say (the partitioner (blivet?)
> > > crashed five times or so on me, always kicking me out of anaconda
> > > again, just because I wanted to undo something). But I don't really
> > > want to discuss that. What I do want to discuss is this:
> > > 
> > > 
> > > 
> > > Ideally, the top 4 wouldn't be installed at all anymore (in case of
> > > the first two at least on the systems which do not need them). But if
> > > that's not in the cards, it would be great to at least not enable
> > > these services anymore in the default boot so that they are only a
> > > "systemctl enable" away for people who need them?
> > > 
> > > 
> > I think all of these are good ideas. "No udev-settle" seems like a nice
> > highlevel goal to shoot for.
> > 
> > Another one I might add: "No stuck stop jobs" - it annoys me every single
> > time when I reboot and something like rngd or conmon holds up my reboot
> > for several minutes for no reason at all.
> 
> I've seen the rngd stop thing, hadn't had time to investigate it yet as
> more urgent fires keep showing up :/

I opened a bug a while back, but it hasn't cropped up since I enabled
additional logging:
https://bugzilla.redhat.com/show_bug.cgi?id=1690364

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Can we maybe reduce the set of packages we install by default a bit?

2019-04-17 Thread stan
On Wed, 17 Apr 2019 15:14:54 -0400
Steve Grubb  wrote:

> Ah...the devil is in the details. It does not credit entropy. This
> can easily be tested. systemctl stop rngd. Then open 2 terminal
> windows. In one terminal start this shell script:
> 
> #!/bin/sh
> 
> while [ 1 ]
> do
> /bin/cat /proc/sys/kernel/random/entropy_avail
> sleep 1
> done
> 
> Then in another:
> 
> cat /dev/random >/dev/null
> 
> After a couple seconds, hit ctl-c to kill cat. Watch what happens to
> the entropy.
> 
> I have a Kabylake system idling. It takes 3 minutes for entropy to
> get back to 3k after stopping the consumer. At that point its losing
> about as much as its gaining. If I start rngd and do the same test,
> my entropy bounces back to over 3k in less than a second. As it
> stands today, rngd has a dramatic effect on entropy.

I run a daemon that harvests entropy from the atmosphere via an rtl2832
and feeds it into the kernel via /dev/random.  And, yes it makes a big
difference to feed the entropy pool.

When random.c was rewritten to use chacha instead of the modified
mersenne twister (4.xx?), the way entropy was used changed.  It used
to bleed constantly across from the pool that is /dev/random
into /dev/urandom when it was above the threshold set in
write_wakeup_threshold.  Now, it only checks when the kernel routine
for get_random is called and reseeds if enough entropy is present.  It
always has decremented and still decrements entropy available when
it uses some. Under mersenne it used to be possible to set a timer as
well, but that went away with chacha.  I patch to enable that feature
in the new random.c, so I can reseed the chacha on a periodic interval.

The rationale for chacha was that server farms were starving for
entropy, and it is considered more robust for low entropy conditions,
at least that is what I understand from my reading.  

As far as the CPU hardware entropy generators, those are not open
source, so it is not possible to determine if they have a
backdoor.  Research has shown, however, that if any true entropy is
fed into a stream with compromised entropy, it results in a stream with
better entropy.  That is, a system using a compromised hardware
generator will have more robust entropy when combined with other
sources of entropy.  The kernel does this via a hash to smear the mix.
An attacker can no longer utilize an attack knowing the bits came from
the compromised generator.

Things like the bit bubbler are reasonably cheap (~100 dollars US) and
provide enough entropy for a small server farm.   Even the rtl2832 (~10
dollars US) provides about 90 Kbytes of entropy per second (the kernel
entropy pool is 4kB). Not enough for monte carlo simulations, but plenty
for a home system or a few servers.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Can we maybe reduce the set of packages we install by default a bit?

2019-04-17 Thread Simo Sorce
On Wed, 2019-04-17 at 15:14 -0400, Steve Grubb wrote:
> Many have tried to convince upstream about this. If anyone here has 
> influence, 
> please try.

If upstream is currently resistant, what about turning rngd into a
loadable kernel module and then insure it is in the initramfs and
loaded at kernel boot time ?

Would this be a way to show upstream that this works and perhaps allow
inclusion later on ?

Simo.

-- 
Simo Sorce
Sr. Principal Software Engineer
Red Hat, Inc

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Stewardship SIG packages looking for permanent maintainer(s)

2019-04-17 Thread Fabio Valentini
Hi everybody,

The initial fallout of the recent mass-orphanings has been dealt with,
and almost no packages should still have broken dependencies.

At this point, we'd like to start distributing some packages we took
to maintainers whose packages actively (and directly) depend on things
we maintain.


The list of packages that are "leaf packages" as far as the
Stewardship SIG is concerned, is:

- apache-commons-discovery
- json_simple
- nodejs-array-union
- nodejs-arrify
- nodejs-set-immediate-shim

Owners of directly dependent packages have been added to CC. Please
consider adopting some of these packages, otherwise they'll probably
end up orphaned and/or retired in the forseeable future. To claim a
package, simply submit a ticket with us, and we will gladly give the
package a new home.

See: https://www.pagure.io/stewardship-sig/new_issue
("package_adoption_request" template)


At the end of this E-Mail, all packages that directly depend on our
"leaf packages" are listed.
A more detailed report with complete dependency information can be viewed at:

https://decathorpe.fedorapeople.org/stewardship-sig.html


Thanks,
Fabio - for the Stewardship SIG


# Reverse package dependencies

apache-commons-discovery:
- eclipse-webtools
- jenkins
- stapler
- mx4j

json_simple:
- azureus
- cassandra
- eclipse-webtools
- hadoop
- jts
- ldaptive
- tika
- derby
- zookeeper

nodejs-array-union:
- nodejs-globby
- nodejs-multimatch

nodejs-arrify:
- nodejs-globby
- nodejs-load-grunt-tasks
- nodejs-minimist-options
- nodejs-multimatch
- nodejs-test-exclude

nodejs-set-immediate-shim:
- nodejs-each-async
- nodejs-readdirp
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora 30 Final blocker status email #2

2019-04-17 Thread Ben Cotton
Final freeze begins on Tuesday, 16 April. Fedora 30 release is
currently scheduled for 30 April.

Action summary


Accepted blockers
-
1. https://bugzilla.redhat.com/show_bug.cgi?id=1683197
ACTION: halfline to remove problematic patch

2. https://bugzilla.redhat.com/show_bug.cgi?id=1691909
ACTION: halfline to investigate

3. https://bugzilla.redhat.com/show_bug.cgi?id=1690429
ACTION: Upstream gnome-shell developers to identify and fix issue

4. https://bugzilla.redhat.com/show_bug.cgi?id=1688462
ACTION: dnf team to implement proposed fix

6. https://bugzilla.redhat.com/show_bug.cgi?id=1666920
ACTION: systemd maintainers to merge the patch for F30 and verify if
it fixes the issue

Proposed blockers
-

1. https://bugzilla.redhat.com/show_bug.cgi?id=1699179
ACTION: QA to verify with new compose

2. https://bugzilla.redhat.com/show_bug.cgi?id=1693409
ACTION: Further investigation of issue

3. https://bugzilla.redhat.com/show_bug.cgi?id=1698200
ACTION: lvrabec to clarify status of fix

4. https://bugzilla.redhat.com/show_bug.cgi?id=1699099
NEEDINFO: adamw
ACTION: Further investigation of issue

5. https://bugzilla.redhat.com/show_bug.cgi?id=1698550
ACTION: Further investigation of issue

6. https://bugzilla.redhat.com/show_bug.cgi?id=1697591
ACTION: x11 maintainers to identify and implement a fix


Bug-by-bug detail
=

Accepted blockers
-
1. https://bugzilla.redhat.com/show_bug.cgi?id=1683197 - gdm - ASSIGNED
gdm Fails to load with "nomodeset"

Halfline will remove or modify a patch that causes gdm to wait for a
seat to report CanGraphical. This is not yet accepted upstream and we
don’t have a clear record of why this was added.

2. https://bugzilla.redhat.com/show_bug.cgi?id=1691909 - gdm - NEW
GDM fallback from Wayland to X11 no longer works because it takes too
long to start gnome-shell (affects 'basic graphics mode' / nomodeset,
maybe other cases)

The three second timeout in gdm is too short to catch gnome-shell
failure. We need to figure out a more robust way of detecting failure
(or kick the can down the road by extending the timeout). Halfline is
going to investigate today or Monday

3. https://bugzilla.redhat.com/show_bug.cgi?id=1690429 - gnome-shell - NEW
sometimes icon not showing for eg firefox in gnome-shell overview dash

Problem is not Fedora-specific, it also occurs on Arch. An issue is
open upstream (https://gitlab.gnome.org/GNOME/gnome-shell/issues/1053)

4. https://bugzilla.redhat.com/show_bug.cgi?id=1688462 - libdnf - NEW
System upgrades involving modular content require explicit
--setopt=module_platform_id to work correctly

Updated fedora-release packages are pushed, which partially address
the issue. The dnf maintainers have been authorized by FESCo to
implement the remaining fix on F29+.

6. https://bugzilla.redhat.com/show_bug.cgi?id=1666920 -
iscsi-initiator-utils - POST
iSCSI installs fail to boot since systemd-240 (Fedora-Rawhide-20181222.n.1)

A patch exists (https://github.com/systemd/systemd/commit/30fdb8962a)
in rawhide that may fix the issue, but it is not in F30.

Proposed blockers
-
1. https://bugzilla.redhat.com/show_bug.cgi?id=1699179 - anaconda - ASSIGNED
"Installation Source" spoke not configuring automatically

When the graphical installer starts up and shows the hub, the
"Installation Source" shows the following: "Error setting up base
repository". This may already be fixed in a recent compose.

2. https://bugzilla.redhat.com/show_bug.cgi?id=1693409 - gdm -NEW
gdm/X start fails on 'nomodeset' UEFI boot on multiple bare metal
systems: "Cannot run in framebuffer mode. Please specify busIDs for
all framebuffer devices"

Testing done by QA team and community members shows this behavior
across multiple hardware configurations. ‘nomodeset’ does not appear
to work on any hardware. Further investigation is needed.

3. https://bugzilla.redhat.com/show_bug.cgi?id=1698200 - selinux-policy - NEW
selinux-policy-3.14.3-27.fc30 broke systemd-modules-load.service
loading (denials for modules.softdep and modules.dep.bin)

selinux-policy-3.14.3-27.fc30 - seems to have broken
systemd-modules-load.service. Maintainer included a commit comment,
but it’s not clear if this is a fix and what the status is.

4. https://bugzilla.redhat.com/show_bug.cgi?id=1699099 - selinux-policy - NEW
gnome-initial-setup 3.32.0+ crashes due to SELinux denials

GNOME 3.32.0 triggers SELinux denials when gnome-initial-setup tries
to execute /etc/ld.so.cache and /usr/lib/locale/locale-archive. It’s
not yet clear why this is happening.

5. https://bugzilla.redhat.com/show_bug.cgi?id=1698550 - shim - NEW
Fedora install media error out with SecureBoot or Grub error in
UEFI-only mode on T450s

With the latest firmware, booting fails with SecureBoot and CSM off.

6. https://bugzilla.redhat.com/show_bug.cgi?id=1697591 - xorg-x11-server - NEW
modesetting driver on some Intel hardware fails to start after kernel
4.20.13 update


Re: Can we maybe reduce the set of packages we install by default a bit?

2019-04-17 Thread Steve Grubb
On Wednesday, April 17, 2019 1:36:08 PM EDT Lennart Poettering wrote:
> On Mi, 17.04.19 10:55, Steve Grubb (sgr...@redhat.com) wrote:
> > On Wednesday, April 17, 2019 4:38:18 AM EDT Lennart Poettering wrote:
> > > What's the story anyway for rngd? Why would userspace be better at
> > > providing entropy to the kernel than the kernel itself? Why do we
> > > enable it on desktops at all, such systems should not be
> > > entropy-starved. Do we need this at all now that the kernel can use
> > > RDRAND itself?
> > 
> > The kernel uses RDRAND/SEED but it does not increment the entropy
> > estimate based on it. Another interesting thing is that TPM chips also
> > have entropy
> 
> That's not true anymore. There's a kernel compile time option now for
> that in CONFIG_RANDOM_TRUST_CPU=y. And yes, the Fedora kernel sets
> that since a while.

Ah...the devil is in the details. It does not credit entropy. This can easily 
be tested. systemctl stop rngd. Then open 2 terminal windows. In one terminal 
start this shell script:

#!/bin/sh

while [ 1 ]
do
/bin/cat /proc/sys/kernel/random/entropy_avail
sleep 1
done

Then in another:

cat /dev/random >/dev/null

After a couple seconds, hit ctl-c to kill cat. Watch what happens to the 
entropy.

I have a Kabylake system idling. It takes 3 minutes for entropy to get back 
to 3k after stopping the consumer. At that point its losing about as much as 
its gaining. If I start rngd and do the same test, my entropy bounces back to 
over 3k in less than a second. As it stands today, rngd has a dramatic effect 
on entropy.


> > available, but the kernel does not use it. So, if you have a hardware
> > based entropy source such as TPM, you need rngd to move the entropy to
> > the kernel. And it also can mine CPU jitter to create some entropy on
> > its own. And it also supports the NIST beacon if you want that kind of
> > entropy. Rngd greatly helps system recover from low entropy situations.
> 
> Yeah, all that stuff is stuff the kernel could do better on its
> own. 

Many have tried to convince upstream about this. If anyone here has influence, 
please try.

> If the CPU jitter stuff or the TPM stuff is a good idea, then why
> not add that to the kernel natively, why involve userspace with that?

I agree.  :-)

> i.e. if the TPM and the CPU jitter stuff can be trusted, then the same
> thing as for CONFIG_RANDOM_TRUST_CPU=y should be done: pass the random
> data into the pool directly inside in the kernel.

And credit entropy!

> > > rngd runs as regular system service, hence what's the point of that
> > > altogether? I mean, it runs so late during boot, at a point where the
> > > entropy pool is full anyway,
> > 
> > I'd really like to see it start much earlier. Any way to make that
> > happen?
> 
> Well, no. I mean, the only way you can do that is by turning rngd into
> its own init system, if you want it to run before the init
> system.
> 
> > > RNG, and it does that super early). So, why run a service that is
> > > supposed to fill up the entropy pool at a point where we don't need it
> > > anymore, and if the kernel can do what it does most likely already on
> > > its own?
> > 
> > The kernel cannot recover quickly when stressed for continued entropy
> > depletion. For example, we are required to be able to supply all guest
> > VM's with entropy from the host. They draw down the entropy pools which
> > need replenishment. The kernel is constantly starved for entropy.
> 
> That's not how the entropy pool works. Once it is full it's full, and
> it doesn't run empty anymore.

Empirical  evidence suggests otherwise. See the test above.
 
> > I think you're being harsh without really looking deeply into the
> > problem. If we could set a sysctl to tell the kernel to use a TPM or
> > increment entropy estimate when RDSEED is used, I'd agree we should
> > consider this. And to be
> 
> OK, so I guess that point in time is now. Though it's not a sysctl,
> but a compile time option (see above).

It looks as though it may be controlled as a boot commandline option, too. 
But that is likely intended to disable the effect it has.

-Steve

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Updating/rebuilding of coin-or packages

2019-04-17 Thread Jason L Tibbitts III
> "AT" == Antonio Trande  writes:

AT> Is it correct tagging an absolute path with %doc?

Yes, it's fine; that just sets the flag that tells RPM "this
file/directory contains documentation".  That's not really any different
than, say, using %config to set the "this is a configuration file" flag.

It's when you use %doc on a relative path that the magic bit of copying
things from %_builddir into %buildroot/%_docdir occurs.

 - J<
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Can we maybe reduce the set of packages we install by default a bit?

2019-04-17 Thread Japheth Cleaver

On 4/17/2019 10:36 AM, Lennart Poettering wrote:

On Mi, 17.04.19 10:55, Steve Grubb (sgr...@redhat.com) wrote:


On Wednesday, April 17, 2019 4:38:18 AM EDT Lennart Poettering wrote:

rngd runs as regular system service, hence what's the point of that
altogether? I mean, it runs so late during boot, at a point where the
entropy pool is full anyway,

I'd really like to see it start much earlier. Any way to make that
happen?

Well, no. I mean, the only way you can do that is by turning rngd into
its own init system, if you want it to run before the init
system.


This seems like a false dichotomy, no? Surely, things like this are a 
possibility:

https://lists.freedesktop.org/archives/systemd-devel/2010-September/000225.html

But beyond that, is there really no way to lift this earlier in the boot 
logic?


-jc

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Sphinx and xindy

2019-04-17 Thread Jason L Tibbitts III
> "JJ" == Jerry James  writes:

JJ> Somebody out there has been involved with past attempts to build
JJ> xindy.  Please, I would like to make progress on this so I can get
JJ> back to building the coq stack's new versions.  Which package used
JJ> to contain xindy?

It is/was part of texlive-base.  Look at line 20 of the texlive-base
spec:

# Not ppc64, not s390x, not aarch64 due to lack of clisp
# code SIGSEGV's on armv7hl
%global xindy_arches empty

JJ> How does one attempt to build it?

Just set that define appropriately.  It was disabled in
ac0adc86c6ee1f2559e4313f210b828778388999 because I guess there's some
sort of circular build dependency and I guess it never got turned back
on again.  Before that it was set to:

%global xindy_arches %{ix86} x86_64

And before acf14dee9c90d6f8b775adc0c1c5151d7df28642 that included arm:

%global xindy_arches %{arm} %{ix86} x86_64

To go back further you have to go back to the texlive package before
-base was split out.

My suggestion?  Package it as an entirely separate package to avoid any
kind of circular build dependency.  Call it xindy or texlive-xindy; I've
no preference.

 - J<
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Bigger packages (Was: Re: Fedora rawhide compose report: 20190417.n.0 changes)

2019-04-17 Thread Tomasz Kłoczko
On Wed, 17 Apr 2019 at 17:00, Fedora Rawhide Report <
rawh...@fedoraproject.org> wrote:
[..]

> Package:  at-spi2-core-2.32.1-2.fc31
> Old package:  at-spi2-core-2.32.1-1.fc30
> Summary:  Protocol definitions and daemon for D-Bus at-spi
> RPMs: at-spi2-core at-spi2-core-devel
> Size: 1.77 MiB
> Size change:  42.01 KiB
> Changelog:
>   * Tue Apr 16 2019 Adam Williamson  - 2.32.1-2
>   - Rebuild with Meson fix for #1699099
>
>
> Package:  atomix-3.32.1-2.fc31
> Old package:  atomix-3.32.1-1.fc30
> Summary:  Puzzle game: Build molecules out of isolated atoms
> RPMs: atomix
> Size: 2.85 MiB
> Size change:  20.33 KiB
> Changelog:
>   * Tue Apr 16 2019 Adam Williamson  - 3.32.1-2
>   - Rebuild with Meson fix for #1699099
>

I'm not sure did anyone noticed that but despite fact that fixing #1699099
should introduce relatively small change each rebuild recently introduces
bigger packages.
I'm still investigating this but looks like that change (ELF files length
increase) is not related to the meson or #1699099 but to binutils.

Tomasz
-- 
Tomasz Kłoczko | LinkedIn: http://lnkd.in/FXPWxH
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Can we maybe reduce the set of packages we install by default a bit?

2019-04-17 Thread Jason L Tibbitts III
> "LP" == Lennart Poettering  writes:

LP> That's not true anymore. There's a kernel compile time option now
LP> for that in CONFIG_RANDOM_TRUST_CPU=y. And yes, the Fedora kernel
LP> sets that since a while.

Isn't this arch-dependent?

config RANDOM_TRUST_CPU
bool "Trust the CPU manufacturer to initialize Linux's CRNG"
depends on X86 || S390 || PPC
default n

Not sure what happens on ARM but I think it would need to be considered.

 - J<
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Can we maybe reduce the set of packages we install by default a bit?

2019-04-17 Thread Simo Sorce
On Wed, 2019-04-17 at 19:36 +0200, Lennart Poettering wrote:
> On Mi, 17.04.19 10:55, Steve Grubb (sgr...@redhat.com) wrote:
> 
> > On Wednesday, April 17, 2019 4:38:18 AM EDT Lennart Poettering wrote:
> > > On Di, 16.04.19 09:06, Adam Williamson (adamw...@fedoraproject.org) wrote:
> > > 
> > > 
> > > > > I think all of these are good ideas. "No udev-settle" seems like a
> > > > > nice
> > > > > highlevel goal to shoot for.
> > > > > 
> > > > > 
> > > > > 
> > > > > Another one I might add: "No stuck stop jobs" - it annoys me every
> > > > > single
> > > > > time when I reboot and something like rngd or conmon holds up my
> > > > > reboot
> > > > > for several minutes for no reason at all.
> > > > 
> > > > 
> > > > 
> > > > I've seen the rngd stop thing, hadn't had time to investigate it yet as
> > > > more urgent fires keep showing up :/
> > > 
> > > What's the story anyway for rngd? Why would userspace be better at
> > > providing entropy to the kernel than the kernel itself? Why do we
> > > enable it on desktops at all, such systems should not be
> > > entropy-starved. Do we need this at all now that the kernel can use
> > > RDRAND itself?
> > 
> > The kernel uses RDRAND/SEED but it does not increment the entropy estimate
> > based on it. Another interesting thing is that TPM chips also have
> > entropy
> 
> That's not true anymore. There's a kernel compile time option now for
> that in CONFIG_RANDOM_TRUST_CPU=y. And yes, the Fedora kernel sets
> that since a while.
> 
> > available, but the kernel does not use it. So, if you have a hardware based
> > entropy source such as TPM, you need rngd to move the entropy to the kernel.
> > And it also can mine CPU jitter to create some entropy on its own. And it
> > also supports the NIST beacon if you want that kind of entropy. Rngd greatly
> > helps system recover from low entropy situations.
> 
> Yeah, all that stuff is stuff the kernel could do better on its
> own. If the CPU jitter stuff or the TPM stuff is a good idea, then why
> not add that to the kernel natively, why involve userspace with that?
> i.e. if the TPM and the CPU jitter stuff can be trusted, then the same
> thing as for CONFIG_RANDOM_TRUST_CPU=y should be done: pass the random
> data into the pool directly inside in the kernel.

Big +1, I've been saying this for ages as well ...

> > > rngd runs as regular system service, hence what's the point of that
> > > altogether? I mean, it runs so late during boot, at a point where the
> > > entropy pool is full anyway,
> > 
> > I'd really like to see it start much earlier. Any way to make that
> > happen?
> 
> Well, no. I mean, the only way you can do that is by turning rngd into
> its own init system, if you want it to run before the init
> system.
> 
> > > RNG, and it does that super early). So, why run a service that is supposed
> > > to fill up the entropy pool at a point where we don't need it anymore, and
> > > if the kernel can do what it does most likely already on its own?
> > 
> > The kernel cannot recover quickly when stressed for continued entropy
> > depletion. For example, we are required to be able to supply all guest VM's
> > with entropy from the host. They draw down the entropy pools which need
> > replenishment. The kernel is constantly starved for entropy.
> 
> That's not how the entropy pool works. Once it is full it's full, and
> it doesn't run empty anymore.
> 
> > I think you're being harsh without really looking deeply into the problem. 
> > If
> > we could set a sysctl to tell the kernel to use a TPM or increment entropy
> > estimate when RDSEED is used, I'd agree we should consider this. And
> > to be
> 
> OK, so I guess that point in time is now. Though it's not a sysctl,
> but a compile time option (see above).

I concur,
I would really like to see rngd become a thing of the past as well.
The kernel has all the tools and access needed to reseed itself,
*requiring* a racy userspace tool to do the kernel's job is a bit
ridiculous.

Simo.

-- 
Simo Sorce
Sr. Principal Software Engineer
Red Hat, Inc

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Can we maybe reduce the set of packages we install by default a bit?

2019-04-17 Thread Lennart Poettering
On Mi, 17.04.19 10:55, Steve Grubb (sgr...@redhat.com) wrote:

> On Wednesday, April 17, 2019 4:38:18 AM EDT Lennart Poettering wrote:
> > On Di, 16.04.19 09:06, Adam Williamson (adamw...@fedoraproject.org) wrote:
> >
> >
> > > > I think all of these are good ideas. "No udev-settle" seems like a
> > > > nice
> > > > highlevel goal to shoot for.
> > > >
> > > >
> > > >
> > > > Another one I might add: "No stuck stop jobs" - it annoys me every
> > > > single
> > > > time when I reboot and something like rngd or conmon holds up my
> > > > reboot
> > > > for several minutes for no reason at all.
> > >
> > >
> > >
> > > I've seen the rngd stop thing, hadn't had time to investigate it yet as
> > > more urgent fires keep showing up :/
> >
> > What's the story anyway for rngd? Why would userspace be better at
> > providing entropy to the kernel than the kernel itself? Why do we
> > enable it on desktops at all, such systems should not be
> > entropy-starved. Do we need this at all now that the kernel can use
> > RDRAND itself?
>
> The kernel uses RDRAND/SEED but it does not increment the entropy estimate
> based on it. Another interesting thing is that TPM chips also have
> entropy

That's not true anymore. There's a kernel compile time option now for
that in CONFIG_RANDOM_TRUST_CPU=y. And yes, the Fedora kernel sets
that since a while.

> available, but the kernel does not use it. So, if you have a hardware based
> entropy source such as TPM, you need rngd to move the entropy to the kernel.
> And it also can mine CPU jitter to create some entropy on its own. And it
> also supports the NIST beacon if you want that kind of entropy. Rngd greatly
> helps system recover from low entropy situations.

Yeah, all that stuff is stuff the kernel could do better on its
own. If the CPU jitter stuff or the TPM stuff is a good idea, then why
not add that to the kernel natively, why involve userspace with that?
i.e. if the TPM and the CPU jitter stuff can be trusted, then the same
thing as for CONFIG_RANDOM_TRUST_CPU=y should be done: pass the random
data into the pool directly inside in the kernel.

> > rngd runs as regular system service, hence what's the point of that
> > altogether? I mean, it runs so late during boot, at a point where the
> > entropy pool is full anyway,
>
> I'd really like to see it start much earlier. Any way to make that
> happen?

Well, no. I mean, the only way you can do that is by turning rngd into
its own init system, if you want it to run before the init
system.

> > RNG, and it does that super early). So, why run a service that is supposed
> > to fill up the entropy pool at a point where we don't need it anymore, and
> > if the kernel can do what it does most likely already on its own?
>
> The kernel cannot recover quickly when stressed for continued entropy
> depletion. For example, we are required to be able to supply all guest VM's
> with entropy from the host. They draw down the entropy pools which need
> replenishment. The kernel is constantly starved for entropy.

That's not how the entropy pool works. Once it is full it's full, and
it doesn't run empty anymore.

> I think you're being harsh without really looking deeply into the problem. If
> we could set a sysctl to tell the kernel to use a TPM or increment entropy
> estimate when RDSEED is used, I'd agree we should consider this. And
> to be

OK, so I guess that point in time is now. Though it's not a sysctl,
but a compile time option (see above).

Lennart

--
Lennart Poettering, Berlin
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Python 3.7 setuptools

2019-04-17 Thread Adam Williamson
On Wed, 2019-04-17 at 17:54 +0100, Luke Hinds wrote:
> On Wed, Apr 17, 2019 at 5:34 PM Luke Hinds  wrote:
> 
> > Apologies if not the correct, list , I was not sure if I should post here
> > or to python-devel
> > 
> > I would like to use setuptools within a python3.7 project.
> > 
> > I install ptyhon3.7 using dnf
> > 
> > I then install python3-setuptools
> > 
> > Using python3.7 I get an import error:
> > 
> > # python3.7
> > Python 3.7.2 (default, Jan 19 2019, 10:24:44)
> > [GCC 8.2.1 20181215 (Red Hat 8.2.1-6)] on linux
> > Type "help", "copyright", "credits" or "license" for more information.
> > > > > import setuptools
> > Traceback (most recent call last):
> >   File "", line 1, in 
> > ModuleNotFoundError: No module named 'setuptools'
> > 
> > It works for 3.6
> > 
> > # python3
> > Python 3.6.5 (default, Mar 29 2018, 18:20:46)
> > [GCC 8.0.1 20180317 (Red Hat 8.0.1-0.19)] on linux
> > Type "help", "copyright", "credits" or "license" for more information.
> > > > > import setuptools
> > > > > 
> > 
> > This is expected, as set up tools resides in
> > `/usr/lib/python3.6/site-packages/setuptools`
> > 
> > What would be the tidy / recommended way of using a module for 3.7 with
> > dnf managing the packages (rather than pip / virtual-envs).
> > 
> > 
> > 
> To answer myself, I omitted to state I was using Fedora 29.
> 
> Fedora 30 resolves this for me, as 3.7 is the default.
> 
> I would still however, be interested in what the recommended approach is
> for users on Fedora 29.

There kind of isn't one. The alternative-versioned Python interpreter
packages exist for specific purposes like doing CI; we don't ship a
complete library environment for those versions. Whatever you're doing
with them is actually expected to get libraries and stuff some other
way...probably pip and virtualenvs. :P This is AIUI, anyway.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Python 3.7 setuptools

2019-04-17 Thread Luke Hinds
On Wed, Apr 17, 2019 at 5:34 PM Luke Hinds  wrote:

> Apologies if not the correct, list , I was not sure if I should post here
> or to python-devel
>
> I would like to use setuptools within a python3.7 project.
>
> I install ptyhon3.7 using dnf
>
> I then install python3-setuptools
>
> Using python3.7 I get an import error:
>
> # python3.7
> Python 3.7.2 (default, Jan 19 2019, 10:24:44)
> [GCC 8.2.1 20181215 (Red Hat 8.2.1-6)] on linux
> Type "help", "copyright", "credits" or "license" for more information.
> >>> import setuptools
> Traceback (most recent call last):
>   File "", line 1, in 
> ModuleNotFoundError: No module named 'setuptools'
>
> It works for 3.6
>
> # python3
> Python 3.6.5 (default, Mar 29 2018, 18:20:46)
> [GCC 8.0.1 20180317 (Red Hat 8.0.1-0.19)] on linux
> Type "help", "copyright", "credits" or "license" for more information.
> >>> import setuptools
> >>>
>
> This is expected, as set up tools resides in
> `/usr/lib/python3.6/site-packages/setuptools`
>
> What would be the tidy / recommended way of using a module for 3.7 with
> dnf managing the packages (rather than pip / virtual-envs).
>
>
>
To answer myself, I omitted to state I was using Fedora 29.

Fedora 30 resolves this for me, as 3.7 is the default.

I would still however, be interested in what the recommended approach is
for users on Fedora 29.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora Rawhide-20190417.n.0 compose check report

2019-04-17 Thread Fedora compose checker
Missing expected images:

Atomichost raw-xz x86_64
Atomichost qcow2 x86_64

Compose FAILS proposed Rawhide gating check!
7 of 47 required tests failed
openQA tests matching unsatisfied gating requirements shown with **GATING** 
below

Failed openQA tests: 23/146 (x86_64), 6/24 (i386), 1/2 (arm)

ID: 385915  Test: x86_64 Server-dvd-iso server_freeipa_replication_master
URL: https://openqa.fedoraproject.org/tests/385915
ID: 385918  Test: x86_64 Server-dvd-iso modularity_tests
URL: https://openqa.fedoraproject.org/tests/385918
ID: 385920  Test: x86_64 Server-dvd-iso 
server_role_deploy_domain_controller **GATING**
URL: https://openqa.fedoraproject.org/tests/385920
ID: 385922  Test: x86_64 Server-dvd-iso server_realmd_join_kickstart 
**GATING**
URL: https://openqa.fedoraproject.org/tests/385922
ID: 385924  Test: x86_64 Server-dvd-iso realmd_join_cockpit
URL: https://openqa.fedoraproject.org/tests/385924
ID: 385925  Test: x86_64 Server-dvd-iso realmd_join_sssd **GATING**
URL: https://openqa.fedoraproject.org/tests/385925
ID: 385927  Test: x86_64 Server-dvd-iso server_freeipa_replication_replica
URL: https://openqa.fedoraproject.org/tests/385927
ID: 385929  Test: x86_64 Server-dvd-iso server_freeipa_replication_client
URL: https://openqa.fedoraproject.org/tests/385929
ID: 385938  Test: x86_64 Workstation-live-iso desktop_browser **GATING**
URL: https://openqa.fedoraproject.org/tests/385938
ID: 385940  Test: x86_64 Workstation-live-iso desktop_update_graphical
URL: https://openqa.fedoraproject.org/tests/385940
ID: 385944  Test: x86_64 Workstation-live-iso base_selinux
URL: https://openqa.fedoraproject.org/tests/385944
ID: 385947  Test: x86_64 Workstation-live-iso apps_startstop
URL: https://openqa.fedoraproject.org/tests/385947
ID: 385948  Test: x86_64 Workstation-boot-iso install_default **GATING**
URL: https://openqa.fedoraproject.org/tests/385948
ID: 385949  Test: x86_64 Workstation-boot-iso memory_check
URL: https://openqa.fedoraproject.org/tests/385949
ID: 385950  Test: x86_64 Workstation-boot-iso memory_check@uefi
URL: https://openqa.fedoraproject.org/tests/385950
ID: 385951  Test: x86_64 Workstation-boot-iso install_default@uefi 
**GATING**
URL: https://openqa.fedoraproject.org/tests/385951
ID: 385953  Test: i386 Workstation-boot-iso install_default
URL: https://openqa.fedoraproject.org/tests/385953
ID: 385954  Test: i386 Workstation-boot-iso memory_check
URL: https://openqa.fedoraproject.org/tests/385954
ID: 385967  Test: x86_64 KDE-live-iso apps_startstop
URL: https://openqa.fedoraproject.org/tests/385967
ID: 385970  Test: arm Minimal-raw_xz-raw.xz 
install_arm_image_deployment_upload
URL: https://openqa.fedoraproject.org/tests/385970
ID: 385993  Test: x86_64 universal upgrade_server_domain_controller
URL: https://openqa.fedoraproject.org/tests/385993
ID: 385994  Test: x86_64 universal upgrade_realmd_client
URL: https://openqa.fedoraproject.org/tests/385994
ID: 386005  Test: x86_64 universal install_blivet_ext3@uefi
URL: https://openqa.fedoraproject.org/tests/386005
ID: 386009  Test: x86_64 universal install_blivet_software_raid@uefi
URL: https://openqa.fedoraproject.org/tests/386009
ID: 386010  Test: x86_64 universal install_blivet_lvmthin@uefi
URL: https://openqa.fedoraproject.org/tests/386010
ID: 386049  Test: x86_64 universal install_blivet_xfs
URL: https://openqa.fedoraproject.org/tests/386049
ID: 386055  Test: i386 universal install_blivet_no_swap
URL: https://openqa.fedoraproject.org/tests/386055
ID: 386056  Test: i386 universal install_blivet_software_raid
URL: https://openqa.fedoraproject.org/tests/386056
ID: 386057  Test: i386 universal install_repository_http_graphical 
**GATING**
URL: https://openqa.fedoraproject.org/tests/386057
ID: 386067  Test: i386 universal install_package_set_kde
URL: https://openqa.fedoraproject.org/tests/386067

Soft failed openQA tests: 2/24 (i386), 4/146 (x86_64)
(Tests completed, but using a workaround for a known bug)

ID: 385930  Test: i386 Server-boot-iso install_default
URL: https://openqa.fedoraproject.org/tests/385930
ID: 385931  Test: i386 Server-dvd-iso install_default
URL: https://openqa.fedoraproject.org/tests/385931
ID: 385990  Test: x86_64 universal upgrade_minimal_64bit
URL: https://openqa.fedoraproject.org/tests/385990
ID: 385992  Test: x86_64 universal upgrade_server_64bit
URL: https://openqa.fedoraproject.org/tests/385992
ID: 386029  Test: x86_64 universal upgrade_2_server_64bit
URL: https://openqa.fedoraproject.org/tests/386029
ID: 386050  Test: x86_64 universal upgrade_2_minimal_64bit
URL: https://openqa.fedoraproject.org/tests/386050

Passed openQA tests: 119/146 (x86_64), 16/24 (i386)

Skipped non-gating openQA tests: 1 of 172
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
T

Python 3.7 setuptools

2019-04-17 Thread Luke Hinds
Apologies if not the correct, list , I was not sure if I should post here
or to python-devel

I would like to use setuptools within a python3.7 project.

I install ptyhon3.7 using dnf

I then install python3-setuptools

Using python3.7 I get an import error:

# python3.7
Python 3.7.2 (default, Jan 19 2019, 10:24:44)
[GCC 8.2.1 20181215 (Red Hat 8.2.1-6)] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import setuptools
Traceback (most recent call last):
  File "", line 1, in 
ModuleNotFoundError: No module named 'setuptools'

It works for 3.6

# python3
Python 3.6.5 (default, Mar 29 2018, 18:20:46)
[GCC 8.0.1 20180317 (Red Hat 8.0.1-0.19)] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import setuptools
>>>

This is expected, as set up tools resides in
`/usr/lib/python3.6/site-packages/setuptools`

What would be the tidy / recommended way of using a module for 3.7 with dnf
managing the packages (rather than pip / virtual-envs).
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: openmpi breakage on Rawhide

2019-04-17 Thread Björn 'besser82' Esser
Am Mittwoch, den 17.04.2019, 18:09 +0200 schrieb Björn 'besser82' Esser:
> Am Mittwoch, den 17.04.2019, 09:59 -0600 schrieb Christoph Junghans:
> > I think a rebuild will fix the problem:
> > https://src.fedoraproject.org/rpms/openmpi/pull-request/5
> > 
> > On Wed, Apr 17, 2019 at 9:53 AM Christoph Junghans <
> > jungh...@votca.org
> > > wrote:
> > > Hi all,
> > > 
> > > Some of my packages failed to build due to a openmpi breakage
> > > 
> > > DEBUG util.py:554:  BUILDSTDERR: Error:
> > > DEBUG util.py:554:  BUILDSTDERR:  Problem: package
> > > openmpi-devel-3.1.3-3.fc31.x86_64 requires
> > > libmpi.so.40()(64bit)(openmpi-x86_64), but none of the providers
> > > can
> > > be installed
> > > DEBUG util.py:554:  BUILDSTDERR:   - package
> > > openmpi-devel-3.1.3-3.fc31.x86_64 requires
> > > libmpi_cxx.so.40()(64bit)(openmpi-x86_64), but none of the
> > > providers
> > > can be installed
> > > DEBUG util.py:554:  BUILDSTDERR:   - package
> > > openmpi-devel-3.1.3-3.fc31.x86_64 requires
> > > libmpi_mpifh.so.40()(64bit)(openmpi-x86_64), but none of the
> > > providers
> > > can be installed
> > > DEBUG util.py:554:  BUILDSTDERR:   - package
> > > openmpi-devel-3.1.3-3.fc31.x86_64 requires
> > > libmpi_usempif08.so.40()(64bit)(openmpi-x86_64), but none of the
> > > providers can be installed
> > > DEBUG util.py:554:  BUILDSTDERR:   - package
> > > openmpi-devel-3.1.3-3.fc31.x86_64 requires
> > > libmpi_usempi_ignore_tkr.so.40()(64bit)(openmpi-x86_64), but none
> > > of
> > > the providers can be installed
> > > DEBUG util.py:554:  BUILDSTDERR:   - package
> > > openmpi-devel-3.1.3-3.fc31.x86_64 requires
> > > libmpi_java.so.40()(64bit)(openmpi-x86_64), but none of the
> > > providers
> > > can be installed
> > > DEBUG util.py:554:  BUILDSTDERR:   - package
> > > openmpi-devel-3.1.3-3.fc31.x86_64 requires
> > > liboshmem.so.40()(64bit)(openmpi-x86_64), but none of the
> > > providers
> > > can be installed
> > > DEBUG util.py:554:  BUILDSTDERR:   - package
> > > openmpi-devel-3.1.3-3.fc31.x86_64 requires openmpi = 3.1.3-3.fc31,
> > > but
> > > none of the providers can be installed
> > > DEBUG util.py:554:  BUILDSTDERR:   - conflicting requests
> > > DEBUG util.py:554:  BUILDSTDERR:   - nothing provides
> > > libosmcomp.so.4()(64bit) needed by openmpi-3.1.3-3.fc31.x86_64
> 
> Merged and building.
> 
> https://koji.fedoraproject.org/koji/taskinfo?taskID=34241927


Unfortunately the build failed on S390X arch for some infrastructural
reason.  I've resubmitted the task:

https://koji.fedoraproject.org/koji/taskinfo?taskID=34242038


signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: openmpi breakage on Rawhide

2019-04-17 Thread Björn 'besser82' Esser
Am Mittwoch, den 17.04.2019, 09:59 -0600 schrieb Christoph Junghans:
> I think a rebuild will fix the problem:
> https://src.fedoraproject.org/rpms/openmpi/pull-request/5
> 
> On Wed, Apr 17, 2019 at 9:53 AM Christoph Junghans  > wrote:
> > Hi all,
> > 
> > Some of my packages failed to build due to a openmpi breakage
> > 
> > DEBUG util.py:554:  BUILDSTDERR: Error:
> > DEBUG util.py:554:  BUILDSTDERR:  Problem: package
> > openmpi-devel-3.1.3-3.fc31.x86_64 requires
> > libmpi.so.40()(64bit)(openmpi-x86_64), but none of the providers can
> > be installed
> > DEBUG util.py:554:  BUILDSTDERR:   - package
> > openmpi-devel-3.1.3-3.fc31.x86_64 requires
> > libmpi_cxx.so.40()(64bit)(openmpi-x86_64), but none of the providers
> > can be installed
> > DEBUG util.py:554:  BUILDSTDERR:   - package
> > openmpi-devel-3.1.3-3.fc31.x86_64 requires
> > libmpi_mpifh.so.40()(64bit)(openmpi-x86_64), but none of the
> > providers
> > can be installed
> > DEBUG util.py:554:  BUILDSTDERR:   - package
> > openmpi-devel-3.1.3-3.fc31.x86_64 requires
> > libmpi_usempif08.so.40()(64bit)(openmpi-x86_64), but none of the
> > providers can be installed
> > DEBUG util.py:554:  BUILDSTDERR:   - package
> > openmpi-devel-3.1.3-3.fc31.x86_64 requires
> > libmpi_usempi_ignore_tkr.so.40()(64bit)(openmpi-x86_64), but none of
> > the providers can be installed
> > DEBUG util.py:554:  BUILDSTDERR:   - package
> > openmpi-devel-3.1.3-3.fc31.x86_64 requires
> > libmpi_java.so.40()(64bit)(openmpi-x86_64), but none of the
> > providers
> > can be installed
> > DEBUG util.py:554:  BUILDSTDERR:   - package
> > openmpi-devel-3.1.3-3.fc31.x86_64 requires
> > liboshmem.so.40()(64bit)(openmpi-x86_64), but none of the providers
> > can be installed
> > DEBUG util.py:554:  BUILDSTDERR:   - package
> > openmpi-devel-3.1.3-3.fc31.x86_64 requires openmpi = 3.1.3-3.fc31,
> > but
> > none of the providers can be installed
> > DEBUG util.py:554:  BUILDSTDERR:   - conflicting requests
> > DEBUG util.py:554:  BUILDSTDERR:   - nothing provides
> > libosmcomp.so.4()(64bit) needed by openmpi-3.1.3-3.fc31.x86_64


Merged and building.

https://koji.fedoraproject.org/koji/taskinfo?taskID=34241927


signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: openmpi breakage on Rawhide

2019-04-17 Thread Christoph Junghans
I think a rebuild will fix the problem:
https://src.fedoraproject.org/rpms/openmpi/pull-request/5

On Wed, Apr 17, 2019 at 9:53 AM Christoph Junghans  wrote:
>
> Hi all,
>
> Some of my packages failed to build due to a openmpi breakage
>
> DEBUG util.py:554:  BUILDSTDERR: Error:
> DEBUG util.py:554:  BUILDSTDERR:  Problem: package
> openmpi-devel-3.1.3-3.fc31.x86_64 requires
> libmpi.so.40()(64bit)(openmpi-x86_64), but none of the providers can
> be installed
> DEBUG util.py:554:  BUILDSTDERR:   - package
> openmpi-devel-3.1.3-3.fc31.x86_64 requires
> libmpi_cxx.so.40()(64bit)(openmpi-x86_64), but none of the providers
> can be installed
> DEBUG util.py:554:  BUILDSTDERR:   - package
> openmpi-devel-3.1.3-3.fc31.x86_64 requires
> libmpi_mpifh.so.40()(64bit)(openmpi-x86_64), but none of the providers
> can be installed
> DEBUG util.py:554:  BUILDSTDERR:   - package
> openmpi-devel-3.1.3-3.fc31.x86_64 requires
> libmpi_usempif08.so.40()(64bit)(openmpi-x86_64), but none of the
> providers can be installed
> DEBUG util.py:554:  BUILDSTDERR:   - package
> openmpi-devel-3.1.3-3.fc31.x86_64 requires
> libmpi_usempi_ignore_tkr.so.40()(64bit)(openmpi-x86_64), but none of
> the providers can be installed
> DEBUG util.py:554:  BUILDSTDERR:   - package
> openmpi-devel-3.1.3-3.fc31.x86_64 requires
> libmpi_java.so.40()(64bit)(openmpi-x86_64), but none of the providers
> can be installed
> DEBUG util.py:554:  BUILDSTDERR:   - package
> openmpi-devel-3.1.3-3.fc31.x86_64 requires
> liboshmem.so.40()(64bit)(openmpi-x86_64), but none of the providers
> can be installed
> DEBUG util.py:554:  BUILDSTDERR:   - package
> openmpi-devel-3.1.3-3.fc31.x86_64 requires openmpi = 3.1.3-3.fc31, but
> none of the providers can be installed
> DEBUG util.py:554:  BUILDSTDERR:   - conflicting requests
> DEBUG util.py:554:  BUILDSTDERR:   - nothing provides
> libosmcomp.so.4()(64bit) needed by openmpi-3.1.3-3.fc31.x86_64
>
> Christoph
>
> --
> Christoph Junghans
> Web: http://www.compphys.de



-- 
Christoph Junghans
Web: http://www.compphys.de
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


openmpi breakage on Rawhide

2019-04-17 Thread Christoph Junghans
Hi all,

Some of my packages failed to build due to a openmpi breakage

DEBUG util.py:554:  BUILDSTDERR: Error:
DEBUG util.py:554:  BUILDSTDERR:  Problem: package
openmpi-devel-3.1.3-3.fc31.x86_64 requires
libmpi.so.40()(64bit)(openmpi-x86_64), but none of the providers can
be installed
DEBUG util.py:554:  BUILDSTDERR:   - package
openmpi-devel-3.1.3-3.fc31.x86_64 requires
libmpi_cxx.so.40()(64bit)(openmpi-x86_64), but none of the providers
can be installed
DEBUG util.py:554:  BUILDSTDERR:   - package
openmpi-devel-3.1.3-3.fc31.x86_64 requires
libmpi_mpifh.so.40()(64bit)(openmpi-x86_64), but none of the providers
can be installed
DEBUG util.py:554:  BUILDSTDERR:   - package
openmpi-devel-3.1.3-3.fc31.x86_64 requires
libmpi_usempif08.so.40()(64bit)(openmpi-x86_64), but none of the
providers can be installed
DEBUG util.py:554:  BUILDSTDERR:   - package
openmpi-devel-3.1.3-3.fc31.x86_64 requires
libmpi_usempi_ignore_tkr.so.40()(64bit)(openmpi-x86_64), but none of
the providers can be installed
DEBUG util.py:554:  BUILDSTDERR:   - package
openmpi-devel-3.1.3-3.fc31.x86_64 requires
libmpi_java.so.40()(64bit)(openmpi-x86_64), but none of the providers
can be installed
DEBUG util.py:554:  BUILDSTDERR:   - package
openmpi-devel-3.1.3-3.fc31.x86_64 requires
liboshmem.so.40()(64bit)(openmpi-x86_64), but none of the providers
can be installed
DEBUG util.py:554:  BUILDSTDERR:   - package
openmpi-devel-3.1.3-3.fc31.x86_64 requires openmpi = 3.1.3-3.fc31, but
none of the providers can be installed
DEBUG util.py:554:  BUILDSTDERR:   - conflicting requests
DEBUG util.py:554:  BUILDSTDERR:   - nothing provides
libosmcomp.so.4()(64bit) needed by openmpi-3.1.3-3.fc31.x86_64

Christoph

-- 
Christoph Junghans
Web: http://www.compphys.de
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora rawhide compose report: 20190417.n.0 changes

2019-04-17 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20190416.n.0
NEW: Fedora-Rawhide-20190417.n.0

= SUMMARY =
Added images:1
Dropped images:  1
Added packages:  47
Dropped packages:1
Upgraded packages:   227
Downgraded packages: 0

Size of added packages:  27.83 MiB
Size of dropped packages:24.88 KiB
Size of upgraded packages:   5.10 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   -81.34 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =
Image: KDE raw-xz armhfp
Path: Spins/armhfp/images/Fedora-KDE-armhfp-Rawhide-20190417.n.0-sda.raw.xz

= DROPPED IMAGES =
Image: Python_Classroom raw-xz armhfp
Path: 
Labs/armhfp/images/Fedora-Python-Classroom-armhfp-Rawhide-20190416.n.0-sda.raw.xz

= ADDED PACKAGES =
Package: aopalliance-1.0-17.module_f28+3939+dc18cd75
Summary: Java/J2EE AOP standards
RPMs:aopalliance
Size:16.06 KiB

Package: apache-commons-cli-1.4-4.module_f28+3939+dc18cd75
Summary: Command Line Interface Library for Java
RPMs:apache-commons-cli
Size:72.81 KiB

Package: apache-commons-codec-1.11-3.module_f28+3939+dc18cd75
Summary: Implementations of common encoders and decoders
RPMs:apache-commons-codec
Size:287.44 KiB

Package: apache-commons-io-1:2.6-3.module_f28+3939+dc18cd75
Summary: Utilities to assist with developing IO functionality
RPMs:apache-commons-io
Size:222.54 KiB

Package: apache-commons-lang3-3.7-3.module_f28+3939+dc18cd75
Summary: Provides a host of helper utilities for the java.lang API
RPMs:apache-commons-lang3
Size:481.69 KiB

Package: apache-commons-logging-1.2-13.module_f28+3939+dc18cd75
Summary: Apache Commons Logging
RPMs:apache-commons-logging
Size:84.02 KiB

Package: atinject-1-28.20100611svn86.module_f28+3939+dc18cd75
Summary: Dependency injection specification for Java (JSR-330)
RPMs:atinject
Size:19.03 KiB

Package: cdi-api-1.2-8.module_f28+3939+dc18cd75
Summary: CDI API
RPMs:cdi-api
Size:68.52 KiB

Package: geronimo-annotation-1.0-23.module_f28+3939+dc18cd75
Summary: Java EE: Annotation API v1.3
RPMs:geronimo-annotation
Size:24.16 KiB

Package: glassfish-el-3.0.1-0.7.b08.module_f28+3939+dc18cd75
Summary: J2EE Expression Language Implementation
RPMs:glassfish-el-api
Size:103.92 KiB

Package: google-guice-4.1-11.module_f28+3939+dc18cd75
Summary: Lightweight dependency injection framework for Java 5 and above
RPMs:google-guice
Size:469.03 KiB

Package: guava20-20.0-8.module_f28+3939+dc18cd75
Summary: Google Core Libraries for Java
RPMs:guava20
Size:2.06 MiB

Package: hawtjni-1.16-2.module_f28+3939+dc18cd75
Summary: Code generator that produces the JNI code
RPMs:hawtjni-runtime
Size:41.92 KiB

Package: httpcomponents-client-4.5.5-4.module_f28+3939+dc18cd75
Summary: HTTP agent implementation based on httpcomponents HttpCore
RPMs:httpcomponents-client httpcomponents-client-cache
Size:868.07 KiB

Package: httpcomponents-core-4.4.10-3.module_f28+3939+dc18cd75
Summary: Set of low level Java HTTP transport components for HTTP services
RPMs:httpcomponents-core
Size:636.32 KiB

Package: jansi-1.17.1-1.module_f28+3939+dc18cd75
Summary: Jansi is a java library for generating and interpreting ANSI escape 
sequences
RPMs:jansi
Size:77.76 KiB

Package: jansi-native-1.7-7.module_f28+3939+dc18cd75
Summary: Jansi Native implements the JNI Libraries used by the Jansi project
RPMs:jansi-native
Size:438.54 KiB

Package: jboss-interceptors-1.2-api-1.0.0-8.module_f28+3939+dc18cd75
Summary: Java EE Interceptors 1.2 API
RPMs:jboss-interceptors-1.2-api
Size:32.13 KiB

Package: jsoup-1.11.3-3.module_f28+3939+dc18cd75
Summary: Java library for working with real-world HTML
RPMs:jsoup
Size:384.86 KiB

Package: kiwix-lib-4.1.0-1.fc31
Summary: Common code base for all Kiwix ports
RPMs:kiwix-lib kiwix-lib-devel
Size:1.13 MiB

Package: lua-basexx-0.4.0-2.fc31
Summary: BaseXX encoding and decoding library for Lua
RPMs:lua-basexx lua5.1-basexx
Size:22.38 KiB

Package: lua-binaryheap-0.4-1.fc31
Summary: Binary heap implementation for Lua
RPMs:lua-binaryheap lua5.1-binaryheap
Size:31.24 KiB

Package: lua-bitop-1.0.2-4.fc31
Summary: C extension module for Lua which adds bit-wise operations on numbers
RPMs:lua5.1-bitop
Size:71.92 KiB

Package: lua-compat53-0.7-1.fc31
Summary: Compatibility module providing Lua-5.3-style APIs for Lua 5.1
RPMs:lua5.1-compat53
Size:220.90 KiB

Package: lua-fifo-0.2-1.fc31
Summary: FIFO library for Lua
RPMs:lua-fifo lua5.1-fifo
Size:19.65 KiB

Package: lua-lpeg-patterns-0.5-1.fc31
Summary: A collection of LPEG patterns
RPMs:lua-lpeg-patterns lua5.1-lpeg-patterns
Size:46.29 KiB

Package: lua-luaossl-20181207-1.fc31
Summary: Most comprehensive OpenSSL module in the Lua universe
RPMs:lua-luaossl lua-luaossl-doc lua5.1-luaossl
Size:1.15 MiB

Package: lua-mmdb-0.2-1.fc31
Summary: MaxMind database parser for Lua

Re: fedora-img-dl: a tool for downloading Fedora iso's and images

2019-04-17 Thread Adam Williamson
On Wed, 2019-04-17 at 08:56 +0100, Richard W.M. Jones wrote:
> There are some sites which let you PXE boot Linux distros over the
> internet (https://netboot.xyz/ being the most notable).

Surely the most notable for Fedora is https://boot.fedoraproject.org/ ?
:)
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Can we maybe reduce the set of packages we install by default a bit?

2019-04-17 Thread Steve Grubb
On Wednesday, April 17, 2019 4:38:18 AM EDT Lennart Poettering wrote:
> On Di, 16.04.19 09:06, Adam Williamson (adamw...@fedoraproject.org) wrote:
> 
> 
> > > I think all of these are good ideas. "No udev-settle" seems like a
> > > nice
> > > highlevel goal to shoot for.
> > >
> > >
> > >
> > > Another one I might add: "No stuck stop jobs" - it annoys me every
> > > single
> > > time when I reboot and something like rngd or conmon holds up my
> > > reboot
> > > for several minutes for no reason at all.
> >
> >
> >
> > I've seen the rngd stop thing, hadn't had time to investigate it yet as
> > more urgent fires keep showing up :/
> 
> What's the story anyway for rngd? Why would userspace be better at
> providing entropy to the kernel than the kernel itself? Why do we
> enable it on desktops at all, such systems should not be
> entropy-starved. Do we need this at all now that the kernel can use
> RDRAND itself?

The kernel uses RDRAND/SEED but it does not increment the entropy estimate 
based on it. Another interesting thing is that TPM chips also have entropy 
available, but the kernel does not use it. So, if you have a hardware based 
entropy source such as TPM, you need rngd to move the entropy to the kernel. 
And it also can mine CPU jitter to create some entropy on its own. And it 
also supports the NIST beacon if you want that kind of entropy. Rngd greatly 
helps system recover from low entropy situations.


> rngd runs as regular system service, hence what's the point of that
> altogether? I mean, it runs so late during boot, at a point where the
> entropy pool is full anyway, 

I'd really like to see it start much earlier. Any way to make that happen?

> and we need the kernel's RNG much much earlier already (already because
> systemd assigns a uuid to each service invocation that derives from kernel
> RNG, and it does that super early). So, why run a service that is supposed
> to fill up the entropy pool at a point where we don't need it anymore, and
> if the kernel can do what it does most likely already on its own?

The kernel cannot recover quickly when stressed for continued entropy 
depletion. For example, we are required to be able to supply all guest VM's 
with entropy from the host. They draw down the entropy pools which need 
replenishment. The kernel is constantly starved for entropy.

> Isn't it time to kick rngd out of the default install, in particular
> on the workstation image? Isn't keeping it around just cargo culting?

I think you're being harsh without really looking deeply into the problem. If 
we could set a sysctl to tell the kernel to use a TPM or increment entropy 
estimate when RDSEED is used, I'd agree we should consider this. And to be 
honest, it should be running during an anaconda or kickstart install in order 
to safely setup an encrypted disk. Also, livecd uses are starved for entropy 
and must use rngd to be responsive and safe. If you have a TPM, the best use 
you'll get out of it is providing random numbers via rngd. :-)

-Steve

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


fedmsg is deprecated - Fedora infrastructure messages now available via AMQP

2019-04-17 Thread Jeremy Cline

Hello folks,

Over the last several months, Fedora Infrastructure has been working
towards migrating away from fedmsg (ZeroMQ, on which it is based). As of
last week, the Fedora AMQP message broker is available outside the
infrastructure network. If you're currently consuming the ZeroMQ
messages published by Fedora via fedmsg or any other ZeroMQ client,
please look into migrating to AMQP as the ZeroMQ endpoint will
eventually be shut down. Until that occurs, all messages are available
via both AMQP and ZeroMQ.

For folks using Python, a fedmsg replacement library and command-line
interface have been written called "fedora-messaging".  This package is
available on PyPI, in Fedora 29+, and is also available in the Fedora
Infrastructure repositories for EPEL7 and Fedora 28. Library and CLI
documentation is available online[0]. Documentation specifically for
consuming messages from the public AMQP broker is available at
https://fedora-messaging.readthedocs.io/en/stable/fedora-broker.html

If you are *not* using Python, or if re-inventing wheels is something
you enjoy, you can receive these messages using the AMQP client library
of your choice: https://www.rabbitmq.com/devtools.html has a number of
clients in various languages listed.

This is a new service and library, so there are bound to be a few
hiccups along the way. Please report any issues you encounter with the
broker on the infrastructure list, and any issues with the library or
the documentation on the issue tracker[1] (or the infrastructure list if
you don't have a GitHub account) and we'll make sure they're addressed
as soon as possible.

[0] https://fedora-messaging.readthedocs.io/en/stable/index.html
[1] https://github.com/fedora-infra/fedora-messaging/issues

Regards,
Jeremy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Module's package branch name to be aligned?

2019-04-17 Thread Vít Ondruch
I think the rules for module branches should be stricter. After several
back and forth in discussions with Jun about stream branches for Ruby, I
believe that the concept of "using upstream major versions as branches"
[1] is not enough and can work just for the simplest cases.

We should use ${module}-${stream} branches everywhere (the "stream-"
prefix would be useful as well, because it would explain the semantics
use after the prefix).

For example, if we have "foo" module with "1.0" and "2.0" streams and it
ships "bar" and "baz" components, the components should have appropriate
"(stream-)foo-1.0" and "(stream-)foo-2.0" branches.

We could also utilize `git symbolic-ref` to link the branches if needed 


Vít



Dne 16. 04. 19 v 15:25 Jun Aruga napsal(a):
> Hi,
>
> I like to see "package branch name" of each modules to be aligned more.
>
> Here is a list of the current module, the module stream name, the
> package branch name, another package name. There are some patterns on
> the list.
>
> # module, the module stream name (module/foo's branch), the package
> branch name (rpms/foo's branch), another package name (rpms/bar's
> branch)
> mongodb3.6  3.6 None
> nodejs8 8 None
> perl5.24 fXX fXX
> python3 3.6   None  None
> python36   3.6   None  master
> ruby   2.5   ruby-2.5 master
> scala  2.10 javapackages javapackages
> varnish   6 stream-6 stream-6
>
> See more detail at https://pagure.io/jaruga-modules-branches
> I think "None" is same with "master" technically.
>
> In case of modules/ruby, we ruby team decided "the package branch
> name" as "ruby-X.Y" with a module name prefix against "X.Y" documented
> in the naming guideline.
> Because a package of a module A (ex. modules/ruby) can be used also in
> a module B (ex. modules/rubygem-rails, modules/vagrant and etc.
> In this case, a package branch name needs to have  "ruby-X.Y",
> "rubygem-rails-X.Y", "vargrant-X.Y".
>
> Do you like to see some alignments for the naming?
> Hopefully after the discussion here in this thread, below page will be 
> updated.
> https://docs.fedoraproject.org/en-US/modularity/making-modules/naming-guidelines/#_package_branch_name
>
> Regards,
> Jun
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: fedora-img-dl: a tool for downloading Fedora iso's and images

2019-04-17 Thread Jens-Ulrik Petersen
On Mon, Apr 15, 2019 at 5:55 PM Dan Čermák 
wrote:

> cool project! I see a certain overlap with fedora-mediawriter though, as
> that one can download ISOs too.
>

Okay, thanks, my own use-case is more downloading Live images for local
testing.

I've skimmed the sources (is this upstream:
> https://github.com/juhp/fedora-img-dl?) to take a look whether you
> verify the GPG signatures of the downloaded images, but couldn't find
> anything like that (although I can barely read Haskell). If your tool
> would do that, I'd consider that a killer feature.


Okay, I implemented it yesterday in version 0.3 along with support for
Spins.
Available now in
https://copr.fedorainfracloud.org/coprs/petersen/fedora-img-dl/.

Cheers, Jens
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Can we maybe reduce the set of packages we install by default a bit?

2019-04-17 Thread Daniel P . Berrangé
On Wed, Apr 17, 2019 at 10:38:18AM +0200, Lennart Poettering wrote:
> On Di, 16.04.19 09:06, Adam Williamson (adamw...@fedoraproject.org) wrote:
> 
> > > I think all of these are good ideas. "No udev-settle" seems like a nice
> > > highlevel goal to shoot for.
> > >
> > > Another one I might add: "No stuck stop jobs" - it annoys me every single
> > > time when I reboot and something like rngd or conmon holds up my reboot
> > > for several minutes for no reason at all.
> >
> > I've seen the rngd stop thing, hadn't had time to investigate it yet as
> > more urgent fires keep showing up :/
> 
> What's the story anyway for rngd? Why would userspace be better at
> providing entropy to the kernel than the kernel itself? Why do we
> enable it on desktops at all, such systems should not be
> entropy-starved. Do we need this at all now that the kernel can use
> RDRAND itself?

IIUC, RDRAND exists from IvyBridge generation CPUs onwards for Intel
or EPYC CPUs for AMD. I've no idea what the story is for non-x86 CPUs
& RDRAND equivalent.

Anyway, whether we can rely on RDRAND depends on what we consider the
minimum targetted CPU models & architectures. I'm guessing that we
do intend Fedora to work correctly in CPUs predating/lacking RDRAND.

KVM guests can have a virtio-rng device provided on any architecture,
which feeds from host's /dev/urandom, but it is unfortunately fairly
rare for public cloud providers to enable it :-(

rngd includes support for the "jitter entropy" source which uses
CPU jitter to feed the RNG. At least in RHEL, this is the recommended
option when the CPUs lack RDRAND or equivalent and is why rngd
is enabled by default there. IIUC it is reading the jitter entropy
from the kernel's crypto APIs, optionally applying AES to data, and
then feeding it back into the kernel's rng pool.

> rngd runs as regular system service, hence what's the point of that
> altogether? I mean, it runs so late during boot, at a point where the
> entropy pool is full anyway, and we need the kernel's RNG much much
> earlier already (already because systemd assigns a uuid to each
> service invocation that derives from kernel RNG, and it does that
> super early). So, why run a service that is supposed to fill up the
> entropy pool at a point where we don't need it anymore, and if the
> kernel can do what it does most likely already on its own?

/dev/random can get depleted after boot. Though modern recommendation
is for apps to use /dev/urandom by default (or getrandom/getentropy
syscalls), some probably still uses /dev/random for historical baggage
reasons.

Regards,
Daniel
-- 
|: https://berrange.com  -o-https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o-https://fstop138.berrange.com :|
|: https://entangle-photo.org-o-https://www.instagram.com/dberrange :|
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Can we maybe reduce the set of packages we install by default a bit?

2019-04-17 Thread Lennart Poettering
On Di, 16.04.19 09:06, Adam Williamson (adamw...@fedoraproject.org) wrote:

> > I think all of these are good ideas. "No udev-settle" seems like a nice
> > highlevel goal to shoot for.
> >
> > Another one I might add: "No stuck stop jobs" - it annoys me every single
> > time when I reboot and something like rngd or conmon holds up my reboot
> > for several minutes for no reason at all.
>
> I've seen the rngd stop thing, hadn't had time to investigate it yet as
> more urgent fires keep showing up :/

What's the story anyway for rngd? Why would userspace be better at
providing entropy to the kernel than the kernel itself? Why do we
enable it on desktops at all, such systems should not be
entropy-starved. Do we need this at all now that the kernel can use
RDRAND itself?

rngd runs as regular system service, hence what's the point of that
altogether? I mean, it runs so late during boot, at a point where the
entropy pool is full anyway, and we need the kernel's RNG much much
earlier already (already because systemd assigns a uuid to each
service invocation that derives from kernel RNG, and it does that
super early). So, why run a service that is supposed to fill up the
entropy pool at a point where we don't need it anymore, and if the
kernel can do what it does most likely already on its own?

Isn't it time to kick rngd out of the default install, in particular
on the workstation image? Isn't keeping it around just cargo culting?

Lennart

--
Lennart Poettering, Berlin
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: fedora-img-dl: a tool for downloading Fedora iso's and images

2019-04-17 Thread Richard W.M. Jones
On Tue, Apr 16, 2019 at 02:05:40PM -0700, Adam Williamson wrote:
> On Tue, 2019-04-16 at 21:55 +0100, Richard W.M. Jones wrote:
> > On Mon, Apr 15, 2019 at 09:57:26AM -0700, Adam Williamson wrote:
> > > On Mon, 2019-04-15 at 17:22 +0800, Jens-Ulrik Petersen wrote:
> > > > Hi, I made a small cli tool for downloading Fedora iso's etc.
> > > > 
> > > > It can download rawhide, branched, beta, and released isos (eg 
> > > > Workstation
> > > > Live etc), and even WS Live respins (support for spins coming later).
> > > > 
> > > > You can try it now from <
> > > > https://copr.fedorainfracloud.org/coprs/petersen/fedora-img-dl/>;;.
> > > > 
> > > > Feedback is welcome.
> > > 
> > > I already basically wrote this:
> > > 
> > > https://pagure.io/fedora-qa/fedfind
> > > 
> > > it has a lot more capabilities, and is used quite heavily in various
> > > tools and processes the QA team uses.
> > 
> > Well I can go one better here and say there's a way to *not* download
> > the ISOs :-)
> > 
> > https://rwmj.wordpress.com/2019/04/13/virt-install-nbdkit-live-install/#content
> 
> But you still need to know where the ISO you want to use *is*, which
> fedfind can help you with ;)

Absolutely :-) There's also the question Chris Murphy asked on that
posting about whether in fact it actually downloads the whole ISO
anyway (because of the way our ISOs contain a squashfs containing an
ext4 image[1]).

If we did go for lazy downloading this would be an opportunity to use
a format which is more attuned to this purpose.  And it could also
contain much more content, since it would only be downloaded on
demand.

There are some sites which let you PXE boot Linux distros over the
internet (https://netboot.xyz/ being the most notable).  I have a
vision that we could do this officially for Fedora one day, so you
could entirely try out Fedora without any download or local install
(until you decided you want to perform the local install).

Of course I have already written the nbdkit plugin for this too ...

  https://rwmj.wordpress.com/2019/02/19/nbdkit-linuxdisk-plugin/#content

Rich.

[1] 
https://rwmj.wordpress.com/2009/07/15/unpack-the-russian-doll-of-a-f11-live-cd/

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
libguestfs lets you edit virtual machines.  Supports shell scripting,
bindings from many languages.  http://libguestfs.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: FF v dnf needs-restarting

2019-04-17 Thread Kamil Paral
On Tue, Apr 16, 2019 at 4:56 PM Bojan Smojver  wrote:

> I'm guessing most of you here probably observed this behaviour with dnf
> when FF is upgraded. Even after FF restarted, dnf needs-restarting reports
> that it needs restarting. Does that sound like a bug or is this somehow
> intentional?
>
> I'm seeing this in f29 and previous releases are the same. Once I upgrade
> to f30, I'm planning to open a bug on this if it's still the same, unless
> someone tells me this is how it's supposed to work.
>

I see the same behavior (F29). However, "sudo tracer -ea" doesn't complain
about Firefox. The question is which tool is correct. My current guess is
tracer.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org