Fedora-Cloud-30-20191128.0 compose check report

2019-11-27 Thread Fedora compose checker
No missing expected images.

Passed openQA tests: 1/1 (x86_64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Samuel Sieb

On 11/27/19 6:49 PM, Chris wrote:

+ Sérgio: In regards to why sub-packages:
    * Purely for modularity and isolation.  Users who just use Apprise 
for... say Discord and Email, don't need the other 49 packages.  But 
someone hosting a notification web service might want all of them except 
the ones that utilize local libraries (one uses the DBus interface as an 
example). Each package has absolutely no external dependences except 
maybe 2.


Given that they're only one python file, making modules for each one 
seems rather excessive, especially since they don't have external 
dependencies.  Depending on what the dependencies are for the two that 
do, it might be worth making subpackages for those only.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Chris
Thank you all for replying with so much information! I just had a few
comments:
+ I'm officially afraid of the texlive spec file.

+ Sérgio: In regards to why sub-packages:
   * Purely for modularity and isolation.  Users who just use Apprise
for... say Discord and Email, don't need the other 49 packages.  But
someone hosting a notification web service might want all of them except
the ones that utilize local libraries (one uses the DBus interface as an
example). Each package has absolutely no external dependences except maybe
2.

+ Samuel: Thank you for your points.
   * I don't honestly think my package really has much of a following.  So
I see maybe frustrating a handful of people at worst case by changing
everything up.  But you still raise some good points. Maybe I could do what
'nagios-plugins' does and has a general package that does nothing but
'Recommends' (or Requires) many others (hauling them all in). This was
brought up by Igor; i like this idea.

+ Tom: Thank you for the lua example!
   * While this is somewhat cryptic to me at first glance (not knowing it);
I imagine once it works, it doesn't have to be touched again.  Of the 50
some odd services (to-be-sub-packages), about 2 of them actually have
external dependencies.  I presume there is some black magic taking place in
the %build section that is allowing these templates to work?
   * Here is what my current working-spec-file looks like (without
sub-packages):
https://github.com/caronc/apprise/blob/master/packaging/redhat/python-apprise.spec
  * Since I really want to maintain backwards compatibility with EPEL7, I
imagine I'm going to have double the entries to accommodate Python 2.7
references too... :(

+ Richard: Thank you very much for sharing those references, I had a look
into each specfile and first of... whoa... they're very big  But one
thing I noticed is nbdkit is slightly inconsistent with some of the other
package (or vs versa?):
   * sub-packages in nbdkit are formatted as: 'ndbkit-{name}-{type}' (where
{type} would be plugin) while other packages (such as libvirt) does it's
sub-packages as 'libvirtd-{type}-{plugin}'. Is there a preference or a
standard I should use?
   * Also, this goes slightly against Tom's suggestion (using an lua
in-line script). While everything is in plain English using your examples;
well, it's just 'a-lot' of content.  I saw some discussion going back and
forth which is better; but I guess it's preference at the end.

Chris

On Wed, Nov 27, 2019 at 12:38 PM Chris Adams  wrote:

> Once upon a time, Matej Grabovsky  said:
> > Can you please explain what you mean? What are the alternatives if
> > there really are over 5000 packages in CTAN?
>
> Why does all of CTAN need to go into one source RPM?
> --
> Chris Adams 
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


F30+F31: systemupgrades added unfullfillable module dependencies

2019-11-27 Thread Marius Schwarz
Hi,

I just found this on Bugzilla and i think it needs immediate intervention:

https://bugzilla.redhat.com/show_bug.cgi?id=1767422

release upgrades involved: F29->F30 & F30->F31

- removing the mentioned packages do not fix the problem
- they complain about issues in the next release

Conclusion:

Something is not working as planed.

Tasks needed:

Autofix for those errors.

Short version: [retranslated from german dnf output]

# uname -a
Linux eve... 5.3.12-200.fc30.x86_64 #1 SMP Thu Nov 21 22:47:04 UTC 2019
x86_64 x86_64 x86_64 GNU/Linux
[root@eve ]# dnf erase gimp
problems with modular dependencies:

 Problem 1: conflicting requests
  - nothing provides module(platform:f31) needed by module
gimp:2.10:3120191106095052:f636be4b-0.x86_64
 Problem 2: conflicting requests
  - nothing provides module(platform:f31) needed by module
meson:latest:3120191009081836:dc56099c-0.x86_64
 Problem 3: conflicting requests
  - nothing provides module(platform:f31) needed by module
ninja:latest:3120190304180949:f636be4b-0.x86_64
dependencies got resolved.

 Package  Architecture   
Version   Repository
Size

Entfernen:
 gimp x86_64 
2:2.10.14-1.module_f30+6995+c35e2138  @updates-modular 
109 M
Dependencie packages getting removed:
 gimp-help-de noarch 
2.10.0-1.fc30 @updates  
62 M
no longer needed dependencies getting removed:
 gimp-help    noarch 
2.10.0-1.fc30 @updates  
61 M
 libmypaint   x86_64 
1.4.0-1.fc30  @updates 
721 k
 mypaint-brushes  noarch 
1.3.0-3.fc30  @fedora  
3.3 M

[...]

Removed:
  gimp-2:2.10.14-1.module_f30+6995+c35e2138.x86_64 
gimp-help-de-2.10.0-1.fc30.noarch    gimp-help-2.10.0-1.fc30.noarch
  libmypaint-1.4.0-1.fc30.x86_64   
mypaint-brushes-1.3.0-3.fc30.noarch

Fertig.
[root@eve ]# dnf erase test
problems with modular dependencies:

 Problem 1: conflicting requests
  - nothing provides module(platform:f31) needed by module
gimp:2.10:3120191106095052:f636be4b-0.x86_64
 Problem 2: conflicting requests
  - nothing provides module(platform:f31) needed by module
meson:latest:3120191009081836:dc56099c-0.x86_64
 Problem 3: conflicting requests
  - nothing provides module(platform:f31) needed by module
ninja:latest:3120190304180949:f636be4b-0.x86_64


(1 A.M. here)
good night,
Marius
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: python3 entry_points console scripts packaging question

2019-11-27 Thread Kevin Fenzi
On Wed, Nov 27, 2019 at 05:11:37PM +0100, Dominique Martinet wrote:
> Miro Hrončok wrote on Wed, Nov 27, 2019 at 04:32:27PM +0100:
...snip...
> > And in Fedora, when you ahve both of those, it also means that
> > /usr/bin/python3 is Python 3.8.
> 
> Ok, I thought it was just much less likely but it would also fail on
> upgrade, good to know.
> 
> 
> > However, this might not be the case for EPELs.
> 
> Yes, they have python36-setuptools and python34-setuptools at the same
> time right now, and the packages do not conflict in any way.
> 
> > The easiest way to ensure a specific shebang is:
> > 
> >%global __python3 /usr/bin/python%{python3_version}
> 
> Thanks, I will add that for our EPEL builds only.

Just to note, the python34 stack in epel7 is the 'old' one. 
Everyone should if at all possible use the 3.6 stack now.

kevin


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Reproducible builds/bootstrap

2019-11-27 Thread Chris Murphy
On Wed, Nov 27, 2019 at 12:18 PM Neal Gompa  wrote:
>
> On Wed, Nov 27, 2019 at 2:12 PM Chris Murphy  wrote:
> > The order of work needed:
> > A. Upstream squashfs needs zstd support merged. There's patches
> > Fedora's squashfs-tools are carrying that add this support. But it's
> > probably fair to say this is for testing purposes, because upstream
> > squashfs may have a different implementation in mind. I'm not sure of
> > the status of this.
>
> squashfs-tools v4.4 has it included. The project moved to GitHub last
> year: https://github.com/plougher/squashfs-tools

Ahh yes it does, cool. And the change log shows reproducible builds
support as well.

>
> > B. Koji needs to learn about existing support for plain squashfs images in 
> > Lorax
> > https://pagure.io/koji/issue/1622
> > C. Releng needs to update build scripts to create plain squashfs images
> > https://pagure.io/releng/issue/8646
>
> livecd-tools probably needs that too...

It might need logic to handle a plain squashfs image, yes. I think
right now it expects to find a nested ext4.


>
> > D. Releng needs to decide whether to use zstd instead of xz, and then
> > koji needs to support it, but before that A. above must happen.
> > https://pagure.io/releng/issue/8581
> >
> > I floated this idea to the Btrfs list. The discussion explores Btrfs
> > and alternatives. A Btrfs approach is more work and coordination, flat
> > out. But also offers more features for free: always on metadata and
> > data checksumming could obviate the slow monolithic md5 ISO media
> > checker; simple, consistent, transparent overlay for LiveOS (either
> > transient in-memory, or persistent on-drive), seed/sprout fast
> > replication option. All of that support is in-kernel so you don't need
> > a sophisticated initramfs to do such assembly on the client, or
> > complicated build system to create such images. There is a lot of
> > *other* work to get there, but then I think it's a lot saner, less
> > fragile, and a lot more consumable across distributions. Could that be
> > mimicked with plain squashfs on dm-verity? Sure. And that's also
> > mentioned in this thread.
> > https://lore.kernel.org/linux-btrfs/CAJCQCtTPwQnzwkpk=4zszxfwtc7hymyetxp-9xuu_tsvotw...@mail.gmail.com/
> >
>
> I'd love to explore using Btrfs for doing it. I have no idea how to
> get started with that...

Before Btrfs specific, I'd ask how much compression configurability is
needed in the compose system and where? That relates to plain squashfs
images as well as hypothetical Btrfs images. Is there any advantage to
having Rawhide use zstd:3 since these nightlies are throw away? These
would be much faster to create and use than xz or zstd:16, but the ISO
size would be a lot bigger, maybe 25% bigger. And then for branched
nightlies, RCs, and releases, use zstd:16 or even zstd:19? Could the
granularity be compress=low,medium,high? And that is then translated
by lmc or even the installer, into the specific level numbers? This is
in effect the question I'm posing here:
https://pagure.io/releng/issue/8581#comment-613760

Btrfs specifically, you'd probably want the installer to learn how to
enable Btrfs compression, at least in kickstarts, so that it's
possible to create an ISO with a highly compressed Btrfs rootfs image
rather than nesting it in squashfs. And then that support has to go
all the way up: lorax, lmc, kojis - just like the plain squashfs
feature.

Next, create a Btrfs spin predicated on exactly cloning either Fedora
Workstation or Silverblue. The two differences would be: ISO contains
a Btrfs rootfs, and the installer default/autopartitioning uses Btrfs.
The first instance of such a spin would make Btrfs almost incidental
and pointless, but from there it could be tweeked in straightforward
fashion to take advantage of Btrfs specific things. And beyond that
I'd say we need a separate thread. :-D

I just thought of a cute wrench to just cavalierly throw in the
general direction of all that I just wrote: What if this future image
isn't based on ISO? What if it assumes it's going to be used only for
USB sticks and PXE? Do things get simper and more reliable? At what
expense? And what if it assumes Fedora CoreOS as the base?

Hmm...

-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora rawhide compose report: 20191127.n.0 changes

2019-11-27 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20191126.n.1
NEW: Fedora-Rawhide-20191127.n.0

= SUMMARY =
Added images:3
Dropped images:  1
Added packages:  8
Dropped packages:0
Upgraded packages:   89
Downgraded packages: 122

Size of added packages:  770.65 MiB
Size of dropped packages:0 B
Size of upgraded packages:   2.86 GiB
Size of downgraded packages: 904.44 MiB

Size change of upgraded packages:   20.74 MiB
Size change of downgraded packages: 354.66 MiB

= ADDED IMAGES =
Image: Cloud_Base vmdk ppc64le
Path: Cloud/ppc64le/images/Fedora-Cloud-Base-Rawhide-20191127.n.0.ppc64le.vmdk
Image: Cloud_Base raw-xz ppc64le
Path: Cloud/ppc64le/images/Fedora-Cloud-Base-Rawhide-20191127.n.0.ppc64le.raw.xz
Image: Cloud_Base qcow2 ppc64le
Path: Cloud/ppc64le/images/Fedora-Cloud-Base-Rawhide-20191127.n.0.ppc64le.qcow2

= DROPPED IMAGES =
Image: Workstation live ppc64le
Path: 
Workstation/ppc64le/iso/Fedora-Workstation-Live-ppc64le-Rawhide-20191126.n.1.iso

= ADDED PACKAGES =
Package: eclipse-1:4.13-5.module_f32+7107+10e06045
Summary: An open, extensible IDE
RPMs:eclipse-equinox-osgi eclipse-jdt eclipse-p2-discovery eclipse-pde 
eclipse-platform eclipse-swt
Size:643.17 MiB

Package: eclipse-ecf-3.14.5-3.module_f32+6792+7663b3b5
Summary: Eclipse Communication Framework (ECF) Eclipse plug-in
RPMs:eclipse-ecf-core eclipse-ecf-runtime eclipse-ecf-sdk
Size:4.50 MiB

Package: eclipse-emf-2.19.0-1.module_f32+6792+7663b3b5
Summary: EMF and XSD Eclipse plug-ins
RPMs:eclipse-emf-core eclipse-emf-runtime eclipse-emf-sdk eclipse-emf-xsd
Size:14.90 MiB

Package: python-stompest-2.3.0-1.20191018git715f358.fc32
Summary: STOMP library for Python including a synchronous client
RPMs:python3-stompest python3-stompest-twisted
Size:151.25 KiB

Package: python39-3.9.0~a1-1.fc32
Summary: Version 3.9 of the Python interpreter
RPMs:python39
Size:106.89 MiB

Package: rust-lexical-core-0.6.2-1.fc32
Summary: Lexical, to- and from-string conversion routines
RPMs:rust-lexical-core+arrayvec-devel rust-lexical-core+correct-devel 
rust-lexical-core+default-devel rust-lexical-core+dtoa-devel 
rust-lexical-core+grisu3-devel rust-lexical-core+noinline-devel 
rust-lexical-core+radix-devel rust-lexical-core+rounding-devel 
rust-lexical-core+ryu-devel rust-lexical-core+std-devel 
rust-lexical-core+table-devel rust-lexical-core+trim_floats-devel 
rust-lexical-core+unchecked_index-devel rust-lexical-core-devel
Size:460.02 KiB

Package: rust-lexical-core0.4-0.4.6-1.fc32
Summary: Lexical, to- and from-string conversion routines
RPMs:rust-lexical-core0.4+arrayvec-devel rust-lexical-core0.4+correct-devel 
rust-lexical-core0.4+default-devel rust-lexical-core0.4+dtoa-devel 
rust-lexical-core0.4+grisu3-devel rust-lexical-core0.4+radix-devel 
rust-lexical-core0.4+rounding-devel rust-lexical-core0.4+ryu-devel 
rust-lexical-core0.4+std-devel rust-lexical-core0.4+table-devel 
rust-lexical-core0.4+trim_floats-devel 
rust-lexical-core0.4+unchecked_index-devel rust-lexical-core0.4-devel
Size:447.88 KiB

Package: rust-nom4-4.2.3-1.fc32
Summary: Byte-oriented, zero-copy, parser combinators library
RPMs:rust-nom4+alloc-devel rust-nom4+default-devel 
rust-nom4+lazy_static-devel rust-nom4+regex-devel rust-nom4+regexp-devel 
rust-nom4+regexp_macros-devel rust-nom4+std-devel 
rust-nom4+verbose-errors-devel rust-nom4-devel
Size:159.43 KiB


= DROPPED PACKAGES =

= UPGRADED PACKAGES =
Package:  ImageMagick-1:6.9.10.75-1.fc32
Old package:  ImageMagick-1:6.9.10.67-1.fc32
Summary:  An X application for displaying and manipulating images
RPMs: ImageMagick ImageMagick-c++ ImageMagick-c++-devel 
ImageMagick-devel ImageMagick-djvu ImageMagick-doc ImageMagick-libs 
ImageMagick-perl
Size: 39.87 MiB
Size change:  -21.74 KiB
Changelog:
  * Tue Nov 26 2019 Michael Cronenworth  - 1:6.9.10.75-1
  - Update to 6.9.10.75


Package:  Thunar-1.8.11-1.fc32
Old package:  Thunar-1.8.9-2.fc32
Summary:  Thunar File Manager
RPMs: Thunar Thunar-devel Thunar-docs
Size: 10.09 MiB
Size change:  31.31 KiB
Changelog:
  * Tue Nov 26 2019 Kevin Fenzi  - 1.8.11-1
  - Update to 1.8.11. Fixes bug #1775329


Package:  args4j-2.33-7.module_f32+7107+10e06045
Old package:  args4j-2.33-7.module_f32+7102+8b1132d5
Summary:  Java command line arguments parser
RPMs: args4j args4j-javadoc args4j-parent args4j-tools
Size: 291.75 KiB
Size change:  215 B

Package:  bind-32:9.11.13-2.fc32
Old package:  bind-32:9.11.13-1.fc32
Summary:  The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) 
server
RPMs: bind bind-chroot bind-devel bind-dlz-bdb bind-dlz-filesystem 
bind-dlz-ldap bind-dlz-mysql bind-dlz-mysqldyn bind-dlz-sqlite3 
bind-dnssec-utils bind-libs bind-libs-lite bind-license bind-lite-devel 
bind-pkcs11 bind-pkcs11-devel bind-pkcs11-libs bind-pkcs11-utils bind-sdb 
bind-sdb-chroot bind-utils python3-bind
Size

Fedora-Rawhide-20191127.n.0 compose check report

2019-11-27 Thread Fedora compose checker
No missing expected images.

Compose FAILS proposed Rawhide gating check!
26 of 43 required tests failed, 17 results missing
openQA tests matching unsatisfied gating requirements shown with **GATING** 
below

Failed openQA tests: 99/161 (x86_64), 1/2 (arm)

New failures (same test not failed in Fedora-Rawhide-20191126.n.1):

ID: 489656  Test: x86_64 Server-boot-iso install_default@uefi **GATING**
URL: https://openqa.fedoraproject.org/tests/489656
ID: 489657  Test: x86_64 Server-boot-iso install_default **GATING**
URL: https://openqa.fedoraproject.org/tests/489657
ID: 489695  Test: x86_64 Everything-boot-iso install_default@uefi **GATING**
URL: https://openqa.fedoraproject.org/tests/489695
ID: 489696  Test: x86_64 Everything-boot-iso install_default **GATING**
URL: https://openqa.fedoraproject.org/tests/489696
ID: 489742  Test: x86_64 universal install_kickstart_user_creation 
**GATING**
URL: https://openqa.fedoraproject.org/tests/489742
ID: 489752  Test: x86_64 universal install_kickstart_firewall_disabled 
**GATING**
URL: https://openqa.fedoraproject.org/tests/489752
ID: 489781  Test: x86_64 universal install_mirrorlist_graphical **GATING**
URL: https://openqa.fedoraproject.org/tests/489781
ID: 489796  Test: x86_64 universal install_kickstart_hdd
URL: https://openqa.fedoraproject.org/tests/489796
ID: 489816  Test: x86_64 universal install_kickstart_firewall_configured 
**GATING**
URL: https://openqa.fedoraproject.org/tests/489816
ID: 489817  Test: x86_64 universal install_kickstart_nfs
URL: https://openqa.fedoraproject.org/tests/489817

Old failures (same test failed in Fedora-Rawhide-20191126.n.1):

ID: 489660  Test: x86_64 Server-dvd-iso install_default_upload **GATING**
URL: https://openqa.fedoraproject.org/tests/489660
ID: 489665  Test: x86_64 Server-dvd-iso install_default@uefi **GATING**
URL: https://openqa.fedoraproject.org/tests/489665
ID: 489682  Test: x86_64 Server-dvd-iso install_repository_hd_variation
URL: https://openqa.fedoraproject.org/tests/489682
ID: 489683  Test: x86_64 Server-dvd-iso install_vnc_server
URL: https://openqa.fedoraproject.org/tests/489683
ID: 489689  Test: x86_64 Server-dvd-iso install_vncconnect_server
URL: https://openqa.fedoraproject.org/tests/489689
ID: 489697  Test: x86_64 Workstation-live-iso desktop_notifications_live
URL: https://openqa.fedoraproject.org/tests/489697
ID: 489698  Test: x86_64 Workstation-live-iso install_default@uefi 
**GATING**
URL: https://openqa.fedoraproject.org/tests/489698
ID: 489699  Test: x86_64 Workstation-live-iso install_default_upload 
**GATING**
URL: https://openqa.fedoraproject.org/tests/489699
ID: 489712  Test: x86_64 KDE-live-iso desktop_notifications_live
URL: https://openqa.fedoraproject.org/tests/489712
ID: 489713  Test: x86_64 KDE-live-iso install_no_user **GATING**
URL: https://openqa.fedoraproject.org/tests/489713
ID: 489714  Test: x86_64 KDE-live-iso install_default@uefi **GATING**
URL: https://openqa.fedoraproject.org/tests/489714
ID: 489715  Test: x86_64 KDE-live-iso install_default_upload **GATING**
URL: https://openqa.fedoraproject.org/tests/489715
ID: 489728  Test: arm Minimal-raw_xz-raw.xz 
install_arm_image_deployment_upload
URL: https://openqa.fedoraproject.org/tests/489728
ID: 489730  Test: x86_64 Silverblue-dvd_ostree-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/489730
ID: 489731  Test: x86_64 Silverblue-dvd_ostree-iso install_default_upload
URL: https://openqa.fedoraproject.org/tests/489731
ID: 489740  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud **GATING**
URL: https://openqa.fedoraproject.org/tests/489740
ID: 489741  Test: x86_64 universal support_server
URL: https://openqa.fedoraproject.org/tests/489741
ID: 489743  Test: x86_64 universal install_scsi_updates_img **GATING**
URL: https://openqa.fedoraproject.org/tests/489743
ID: 489744  Test: x86_64 universal install_multi **GATING**
URL: https://openqa.fedoraproject.org/tests/489744
ID: 489745  Test: x86_64 universal install_multi@uefi **GATING**
URL: https://openqa.fedoraproject.org/tests/489745
ID: 489746  Test: x86_64 universal install_no_swap
URL: https://openqa.fedoraproject.org/tests/489746
ID: 489747  Test: x86_64 universal install_iscsi
URL: https://openqa.fedoraproject.org/tests/489747
ID: 489748  Test: x86_64 universal install_blivet_ext3
URL: https://openqa.fedoraproject.org/tests/489748
ID: 489749  Test: x86_64 universal install_blivet_xfs
URL: https://openqa.fedoraproject.org/tests/489749
ID: 489750  Test: x86_64 universal install_blivet_software_raid
URL: https://openqa.fedoraproject.org/tests/489750
ID: 489751  Test: x86_64 universal install_simple_encrypted
URL: https://openqa.fedoraproject.org/tests/489751
ID: 489753  Test: x86_64 universal install_pxeboot
URL: https://openqa.fedoraproject.org/tests/489753
ID: 489754  Test: x86_64 universal install_pxeboot@uefi
URL: 

Re: bugs for non-EOL releases are being closed as EOL by a script

2019-11-27 Thread Ben Cotton
The bugzilla EOL script is running with correct input now. I just
published a Community Blog post[1] that describes what happened and
how I'll prevent it from happening again. Thank you to everyone who
let me know about the error quickly. I apologize for the confusion and
extra work this created.

[1] https://communityblog.fedoraproject.org/accidental-eol-bug-closures/

-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Reproducible builds/bootstrap

2019-11-27 Thread Neal Gompa
On Wed, Nov 27, 2019 at 2:12 PM Chris Murphy  wrote:
>
> On Wed, Nov 27, 2019 at 7:17 AM Pablo Greco  wrote:
> >
> > I'm starting to work on a project to make Fedora fully reproducible and 
> > bootstrappable from scratch.
> > I know it is a long term plan and still working on the steps, but it would 
> > be good to know the current status, if there is an internal interest in 
> > this, if someone is already working (or planning to).
>
> One small cog in the wheel that affects reproducibility in images is
> file systems. There are currently two parts to this when creating
> Fedora images: the rootfs is on ext4, and ext4 creation and writes are
> non-deterministic; that ext4 is then nested into a squashfs image
> using xz. Parallelized xz is non-deterministic, where parallelize zstd
> is reproducible, as I understand it. But that should be confirmed.
>
> The order of work needed:
> A. Upstream squashfs needs zstd support merged. There's patches
> Fedora's squashfs-tools are carrying that add this support. But it's
> probably fair to say this is for testing purposes, because upstream
> squashfs may have a different implementation in mind. I'm not sure of
> the status of this.

squashfs-tools v4.4 has it included. The project moved to GitHub last
year: https://github.com/plougher/squashfs-tools

> B. Koji needs to learn about existing support for plain squashfs images in 
> Lorax
> https://pagure.io/koji/issue/1622
> C. Releng needs to update build scripts to create plain squashfs images
> https://pagure.io/releng/issue/8646

livecd-tools probably needs that too...

> D. Releng needs to decide whether to use zstd instead of xz, and then
> koji needs to support it, but before that A. above must happen.
> https://pagure.io/releng/issue/8581
>
> I floated this idea to the Btrfs list. The discussion explores Btrfs
> and alternatives. A Btrfs approach is more work and coordination, flat
> out. But also offers more features for free: always on metadata and
> data checksumming could obviate the slow monolithic md5 ISO media
> checker; simple, consistent, transparent overlay for LiveOS (either
> transient in-memory, or persistent on-drive), seed/sprout fast
> replication option. All of that support is in-kernel so you don't need
> a sophisticated initramfs to do such assembly on the client, or
> complicated build system to create such images. There is a lot of
> *other* work to get there, but then I think it's a lot saner, less
> fragile, and a lot more consumable across distributions. Could that be
> mimicked with plain squashfs on dm-verity? Sure. And that's also
> mentioned in this thread.
> https://lore.kernel.org/linux-btrfs/CAJCQCtTPwQnzwkpk=4zszxfwtc7hymyetxp-9xuu_tsvotw...@mail.gmail.com/
>

I'd love to explore using Btrfs for doing it. I have no idea how to
get started with that...


-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Reproducible builds/bootstrap

2019-11-27 Thread Chris Murphy
On Wed, Nov 27, 2019 at 7:17 AM Pablo Greco  wrote:
>
> I'm starting to work on a project to make Fedora fully reproducible and 
> bootstrappable from scratch.
> I know it is a long term plan and still working on the steps, but it would be 
> good to know the current status, if there is an internal interest in this, if 
> someone is already working (or planning to).

One small cog in the wheel that affects reproducibility in images is
file systems. There are currently two parts to this when creating
Fedora images: the rootfs is on ext4, and ext4 creation and writes are
non-deterministic; that ext4 is then nested into a squashfs image
using xz. Parallelized xz is non-deterministic, where parallelize zstd
is reproducible, as I understand it. But that should be confirmed.

The order of work needed:
A. Upstream squashfs needs zstd support merged. There's patches
Fedora's squashfs-tools are carrying that add this support. But it's
probably fair to say this is for testing purposes, because upstream
squashfs may have a different implementation in mind. I'm not sure of
the status of this.
B. Koji needs to learn about existing support for plain squashfs images in Lorax
https://pagure.io/koji/issue/1622
C. Releng needs to update build scripts to create plain squashfs images
https://pagure.io/releng/issue/8646
D. Releng needs to decide whether to use zstd instead of xz, and then
koji needs to support it, but before that A. above must happen.
https://pagure.io/releng/issue/8581

I floated this idea to the Btrfs list. The discussion explores Btrfs
and alternatives. A Btrfs approach is more work and coordination, flat
out. But also offers more features for free: always on metadata and
data checksumming could obviate the slow monolithic md5 ISO media
checker; simple, consistent, transparent overlay for LiveOS (either
transient in-memory, or persistent on-drive), seed/sprout fast
replication option. All of that support is in-kernel so you don't need
a sophisticated initramfs to do such assembly on the client, or
complicated build system to create such images. There is a lot of
*other* work to get there, but then I think it's a lot saner, less
fragile, and a lot more consumable across distributions. Could that be
mimicked with plain squashfs on dm-verity? Sure. And that's also
mentioned in this thread.
https://lore.kernel.org/linux-btrfs/CAJCQCtTPwQnzwkpk=4zszxfwtc7hymyetxp-9xuu_tsvotw...@mail.gmail.com/


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[Test-Announce] Fedora 32 Rawhide 20191127.n.0 nightly compose nominated for testing

2019-11-27 Thread rawhide
Announcing the creation of a new nightly release validation test event
for Fedora 32 Rawhide 20191127.n.0. Please help run some tests for this
nightly compose if you have time. For more information on nightly
release validation testing, see:
https://fedoraproject.org/wiki/QA:Release_validation_test_plan

Notable package version changes:
pungi - 20191122.n.0: pungi-4.1.40-3.fc32.src, 20191127.n.0: 
pungi-4.1.40-4.fc32.src

Test coverage information for the current release can be seen at:
https://www.happyassassin.net/testcase_stats/32

You can see all results, find testing instructions and image download
locations, and enter results on the Summary page:

https://fedoraproject.org/wiki/Test_Results:Fedora_32_Rawhide_20191127.n.0_Summary

The individual test result pages are:

https://fedoraproject.org/wiki/Test_Results:Fedora_32_Rawhide_20191127.n.0_Installation
https://fedoraproject.org/wiki/Test_Results:Fedora_32_Rawhide_20191127.n.0_Base
https://fedoraproject.org/wiki/Test_Results:Fedora_32_Rawhide_20191127.n.0_Server
https://fedoraproject.org/wiki/Test_Results:Fedora_32_Rawhide_20191127.n.0_Cloud
https://fedoraproject.org/wiki/Test_Results:Fedora_32_Rawhide_20191127.n.0_Desktop
https://fedoraproject.org/wiki/Test_Results:Fedora_32_Rawhide_20191127.n.0_Security_Lab

Thank you for testing!
-- 
Mail generated by relvalconsumer: https://pagure.io/fedora-qa/relvalconsumer
___
test-announce mailing list -- test-annou...@lists.fedoraproject.org
To unsubscribe send an email to test-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test-annou...@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


PSA: please stop manually titling Bodhi updates

2019-11-27 Thread Adam Williamson
Hey folks!

Since the new Bodhi UI rolled out recently I've noticed a big uptick in
updates where the update creator manually set the update title.

This is a problem because in every single case so far, the manually-
created title is worse than an auto-generated title would have been.

If you just leave that box blank, Bodhi will set the update title to be
the NVR(s) of the package(s) in the update, just like it always has.
But the new UI seems to really encourage people to override this and
write a title manually...and people are picking titles that are worse.
e.g. https://bodhi.fedoraproject.org/updates/FEDORA-2019-edc1551b22
where the auto-generated title would have been 
"container-selinux-2.123.0-1.fc31" but the update author manually set it to 
"container-selinux", which is clearly much less useful.

I've filed a Bodhi issue asking for the UI to be tweaked again to make
manual titling less attractive:
https://github.com/fedora-infra/bodhi/issues/3809

but until then, can I just ask folks to resist the temptation, unless
you really really have a good reason to override the auto-generated
title? You don't *have* to set this field, even though the UI kinda
looks like you do. Thanks!
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Chris Adams
Once upon a time, Matej Grabovsky  said:
> Can you please explain what you mean? What are the alternatives if
> there really are over 5000 packages in CTAN?

Why does all of CTAN need to go into one source RPM?
-- 
Chris Adams 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: bugs for non-EOL releases are being closed as EOL by a script

2019-11-27 Thread Ben Cotton
Update: all of the accidentally closed bugs should now be unclosed. I
know what went wrong (spoiler alert: human error) and even better, I
know how to help guard against this in the future. I am going to
implement that and then re-run the script with the correct input.

-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: python3 entry_points console scripts packaging question

2019-11-27 Thread Dominique Martinet
Miro Hrončok wrote on Wed, Nov 27, 2019 at 04:32:27PM +0100:
> If I understand this properly, your package requires (in Fedora):
> 
>  - /usr/bin/python3
>  - python3.8dist(setuptools)

Yes, on Fedora 31 the current requires for clustershell (to continue
with that example) contain these:
$ rpm -q --requires python3-clustershell
/usr/bin/python3
python(abi) = 3.7
python3-PyYAML
python3-setuptools
python3.7dist(pyyaml)
python3.7dist(setuptools)
rpmlib(CompressedFileNames) <= 3.0.4-1
rpmlib(FileDigests) <= 4.6.0-1
rpmlib(PartialHardlinkSets) <= 4.0.4-1
rpmlib(PayloadFilesHavePrefix) <= 4.0-1
rpmlib(PayloadIsZstd) <= 5.4.18-1

> And in Fedora, when you ahve both of those, it also means that
> /usr/bin/python3 is Python 3.8.

Ok, I thought it was just much less likely but it would also fail on
upgrade, good to know.


> However, this might not be the case for EPELs.

Yes, they have python36-setuptools and python34-setuptools at the same
time right now, and the packages do not conflict in any way.

> The easiest way to ensure a specific shebang is:
> 
>%global __python3 /usr/bin/python%{python3_version}

Thanks, I will add that for our EPEL builds only.

-- 
Dominique
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Reproducible builds/bootstrap

2019-11-27 Thread Richard W.M. Jones
On Wed, Nov 27, 2019 at 09:34:23AM -0500, Neal Gompa wrote:
> As far as bootstrapping from scratch, I believe Richard W. M. Jones
> and David Abdurachmanov went through this process for Fedora RISC-V.
> They may have more to say about how that was done...

It depends exactly how far "from scratch" you want to go.  For RISC-V
because there were no .riscv64.rpm packages to start with, we had to
do a full bootstrap entirely from nothing, and that's pretty
complicated.  I saved the instructions here:

https://github.com/rwmjones/fedora-riscv-bootstrap

However I guess for reproducible builds you don't mind starting from
the existing (non-reproducible) RPMs, in which case it's basically the
same as a Fedora Mass Rebuild, just schedule the packages to be built
in your "shadow" Koji in alphabetical order.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-builder quickly builds VMs from scratch
http://libguestfs.org/virt-builder.1.html
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: python3 entry_points console scripts packaging question

2019-11-27 Thread Miro Hrončok

On 27. 11. 19 16:20, Dominique Martinet wrote:

Hi,


Some context first, skip to the end if you want.

We have a few python packages at $work with setuptools entry_points
console scripts - basically setuptools creates a small python script for
you loading a module and calling the function you specified.

For example, clustershell here defines four commands (clubak cluset
clush and nodeset) here:
https://github.com/cea-hpc/clustershell/blob/master/setup.py#L57


Setuptool embeds whatever python command was executed for running
setup.py at the start of the script, so if the command used in the spec
file was %py3_install as per the guidelines or even %{__python3}
setup.py something, you will get a #!/usr/bin/python3 shebang in your
scripts.

On the other hand, the script depends on what just got installed in
/usr/lib/python3.x/site-packages, so if python3 gets a major upgrade and
the /usr/bin/python3 link changes, the script will stop working
complaining that whatever it tried to import does not exist, while in
reality everything is still there, works if you run it with the right
python version, and the rpm requires ensure this properly.


For packages in fedora this doesn't matter as much as there is a python
mass rebuild when this happens, but I'm not sure it happens with epel
version bump, and it certainly doesn't happen for our internal packages
(hence this message!)



Now for the big question, should we try using `python%{python3_version}`
or fixing the link in scripts somehow for our rpms ?
Can anyone think of a cleaner way?

Another idea that just came to mind would be to try to write in the spec
file that we require /usr/bin/python3 to point to a specific version, so
that at least it fails to upgrade, but that doesn't sound much better
and I wouldn't know how to do that anyway.


If I understand this properly, your package requires (in Fedora):

 - /usr/bin/python3
 - python3.8dist(setuptools)

And in Fedora, when you ahve both of those, it also means that /usr/bin/python3 
is Python 3.8.


However, this might not be the case for EPELs. The easiest way to ensure a 
specific shebang is:


   %global __python3 /usr/bin/python%{python3_version}

--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


python3 entry_points console scripts packaging question

2019-11-27 Thread Dominique Martinet
Hi,


Some context first, skip to the end if you want.

We have a few python packages at $work with setuptools entry_points
console scripts - basically setuptools creates a small python script for
you loading a module and calling the function you specified.

For example, clustershell here defines four commands (clubak cluset
clush and nodeset) here:
https://github.com/cea-hpc/clustershell/blob/master/setup.py#L57


Setuptool embeds whatever python command was executed for running
setup.py at the start of the script, so if the command used in the spec
file was %py3_install as per the guidelines or even %{__python3}
setup.py something, you will get a #!/usr/bin/python3 shebang in your
scripts.

On the other hand, the script depends on what just got installed in
/usr/lib/python3.x/site-packages, so if python3 gets a major upgrade and
the /usr/bin/python3 link changes, the script will stop working
complaining that whatever it tried to import does not exist, while in
reality everything is still there, works if you run it with the right
python version, and the rpm requires ensure this properly.


For packages in fedora this doesn't matter as much as there is a python
mass rebuild when this happens, but I'm not sure it happens with epel
version bump, and it certainly doesn't happen for our internal packages
(hence this message!)



Now for the big question, should we try using `python%{python3_version}`
or fixing the link in scripts somehow for our rpms ?
Can anyone think of a cleaner way?

Another idea that just came to mind would be to try to write in the spec
file that we require /usr/bin/python3 to point to a specific version, so
that at least it fails to upgrade, but that doesn't sound much better
and I wouldn't know how to do that anyway.


Thanks,
-- 
Dominique
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: debuginfod non-standard-uid and cache permissions

2019-11-27 Thread Frank Ch. Eigler
Hi -

> These are all done deliberately through the following constructs in the spec 
> file:
> 
> In %pre to create the debuginfod user:
> 
>getent group debuginfod >/dev/null || groupadd -r debuginfod
>getent passwd debuginfod >/dev/null || \
>useradd -r -g debuginfod -d /var/cache/debuginfod -s /sbin/nologin \
>-c "elfutils debuginfo server" debuginfod
>exit 0

These are all intended to use the preferred "dynamic allocation" model:

https://docs.fedoraproject.org/en-US/packaging-guidelines/UsersAndGroups/

- FChE
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Richard W.M. Jones
On Wed, Nov 27, 2019 at 02:33:15PM +, Richard W.M. Jones wrote:
> I also maintain projects with a large (though not this large) number
> of subpackages, eg: nbdkit has 25+:
> 
>   https://koji.fedoraproject.org/koji/buildinfo?buildID=1417304
[...]
> libvirt and qemu have a very large number too:
> 
>   https://koji.fedoraproject.org/koji/buildinfo?buildID=1411277
>   https://koji.fedoraproject.org/koji/buildinfo?buildID=1415318

I forgot to mention another thing here.  nbdkit, libvirt and qemu also
have metapackages which pull in a "good selection" of the subpackages,
which is ideal for users who don't want to sort through all of them,
or want to deploy those in particular scenarios.  eg. "qemu" pulls in
all subpackages of qemu.  "nbdkit" pulls in the server and the basic
plugins, but not the esoteric plugins with complex dependencies.
"libvirt-client" pulls in the libvirt client libraries and tools but
not the server stuff.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-top is 'top' for virtual machines.  Tiny program with many
powerful monitoring features, net stats, disk stats, logging, etc.
http://people.redhat.com/~rjones/virt-top
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: bugs for non-EOL releases are being closed as EOL by a script

2019-11-27 Thread Ben Cotton
On Wed, Nov 27, 2019 at 9:26 AM Dominik 'Rathann' Mierzejewski
 wrote:
>
> Ben, stop the script and fix it, please.
>
I stopped it as soon as I saw Richard's email. I'm going through the
~150 bugs that were closed and reopening them as appropriate. Please
be patient, as it will take a little bit to work through them.

-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: bugs for non-EOL releases are being closed as EOL by a script

2019-11-27 Thread Fabio Valentini
On Wed, Nov 27, 2019 at 3:27 PM Dominik 'Rathann' Mierzejewski
 wrote:
>
> On Wednesday, 27 November 2019 at 15:22, Richard W.M. Jones wrote:
> > https://bugzilla.redhat.com/show_bug.cgi?id=1774713#c13
>
> Not only reviews:
> https://bugzilla.redhat.com/show_bug.cgi?id=1777310
> https://bugzilla.redhat.com/show_bug.cgi?id=1763148
>
> Ben, stop the script and fix it, please.

This has happened for a few of my open bugs as well (one of them was
opened for "rawhide" only two days ago, so something is definitely
broken).

Fabio

> Regards,
> Dominik
> --
> Fedora   https://getfedora.org  |  RPM Fusion  http://rpmfusion.org
> There should be a science of discontent. People need hard times and
> oppression to develop psychic muscles.
> -- from "Collected Sayings of Muad'Dib" by the Princess Irulan
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Reproducible builds/bootstrap

2019-11-27 Thread Neal Gompa
On Wed, Nov 27, 2019 at 9:17 AM Pablo Greco  wrote:
>
> I'm starting to work on a project to make Fedora fully reproducible and 
> bootstrappable from scratch.
> I know it is a long term plan and still working on the steps, but it would be 
> good to know the current status, if there is an internal interest in this, if 
> someone is already working (or planning to).
>

I believe Dennis was last interested in this recently, though the last
time it was seriously worked on was when Dhiru Kholia was doing this
in Fedora 23 for the Reproducible Builds project. Since then, RPM has
gained a number of features for supporting reproducibility, some of
them from our friends at SUSE who have been pushing this hard for
openSUSE itself. I've done a small bit of work here and there for
this, too.

The current state of things is that we could relatively quickly start
verifying the reproducibility of Fedora by running a shadow Koji that
has the following flags set in the target tag where builds occur:

%clamp_mtime_to_source_date_epoch 1
%use_source_date_epoch_as_buildtime 1
%_buildhost koji.fedoraproject.org

We already set the following in redhat-rpm-config[0]:
%source_date_epoch_from_changelog 1

It would likely be quite safe for us to add
"%clamp_mtime_to_source_date_epoch 1" to redhat-rpm-config without
seriously inhibiting things. That would just leave a shadow Koji to
only need "%use_source_date_epoch_as_buildtime" and "%_buildhost" set.
These settings should never be forcibly set in redhat-rpm-config, as
they impact third-party packagers and their workflows. Thankfully,
Koji supports having macros set on build target tags directly since
Koji 1.18[1].

As far as bootstrapping from scratch, I believe Richard W. M. Jones
and David Abdurachmanov went through this process for Fedora RISC-V.
They may have more to say about how that was done...

[0]: 
https://src.fedoraproject.org/rpms/redhat-rpm-config/c/86aae600e62fadc18760d95d1fddd323cf9e9a86
[1]: https://docs.pagure.org/koji/release_notes_1.18/#system-changes


--
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Richard W.M. Jones
On Tue, Nov 26, 2019 at 08:49:31PM -0500, Chris wrote:
> Hi guys,
> 
> I just wanted to poll you for some advice.  My notification tool I maintain
> supports more than 50+ services now, but the only package isolation I do
> within 2 RPMs.  One for the actual CLI (for admin's who want to use it) and
> the other is for the backend library (for Devs). I only ask because each
> supported service is very modular.

collectd seems comparable.  It has countless subpackages each for a
different service:

  https://koji.fedoraproject.org/koji/buildinfo?buildID=1406178

I also maintain projects with a large (though not this large) number
of subpackages, eg: nbdkit has 25+:

  https://koji.fedoraproject.org/koji/buildinfo?buildID=1417304

libguestfs has a similar number:

  https://koji.fedoraproject.org/koji/buildinfo?buildID=1417302

libvirt and qemu have a very large number too:

  https://koji.fedoraproject.org/koji/buildinfo?buildID=1411277
  https://koji.fedoraproject.org/koji/buildinfo?buildID=1415318

As long as the packages have a purpose I see no reason to stop
packaging things discretely like this.

[...]
> Is it advisable to go this route? I presume there is no easy way to
> transition without breaking users existing setup? I don't know what the d/l
> stats are; so there may not be a large enough audience to even need to
> worry about this?
> 
> What are your thoughts and/or advice?

As long as the packaging is sensible, go for it.  It's a good way to
reduce the number of dependencies a package pulls in.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-top is 'top' for virtual machines.  Tiny program with many
powerful monitoring features, net stats, disk stats, logging, etc.
http://people.redhat.com/~rjones/virt-top
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Package review bug against Rawhide was just closed as EOL by a script

2019-11-27 Thread Ben Cotton
On Wed, Nov 27, 2019 at 9:23 AM Richard W.M. Jones  wrote:
>
> https://bugzilla.redhat.com/show_bug.cgi?id=1774713#c13
>
Whoops! Looks like part of my filter didn't apply. Thankfully, only
150 bugs were updated. Thanks for catching that quickly.

-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


bugs for non-EOL releases are being closed as EOL by a script

2019-11-27 Thread Dominik 'Rathann' Mierzejewski
On Wednesday, 27 November 2019 at 15:22, Richard W.M. Jones wrote:
> https://bugzilla.redhat.com/show_bug.cgi?id=1774713#c13

Not only reviews:
https://bugzilla.redhat.com/show_bug.cgi?id=1777310
https://bugzilla.redhat.com/show_bug.cgi?id=1763148

Ben, stop the script and fix it, please.

Regards,
Dominik
-- 
Fedora   https://getfedora.org  |  RPM Fusion  http://rpmfusion.org
There should be a science of discontent. People need hard times and
oppression to develop psychic muscles.
-- from "Collected Sayings of Muad'Dib" by the Princess Irulan
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Package review bug against Rawhide was just closed as EOL by a script

2019-11-27 Thread Richard W.M. Jones
https://bugzilla.redhat.com/show_bug.cgi?id=1774713#c13

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-top is 'top' for virtual machines.  Tiny program with many
powerful monitoring features, net stats, disk stats, logging, etc.
http://people.redhat.com/~rjones/virt-top
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Reproducible builds/bootstrap

2019-11-27 Thread Pablo Greco
I'm starting to work on a project to make Fedora fully reproducible and 
bootstrappable from scratch.
I know it is a long term plan and still working on the steps, but it would be 
good to know the current status, if there is an internal interest in this, if 
someone is already working (or planning to).

Thanks for the info.

Pablo
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


debuginfod non-standard-uid and cache permissions

2019-11-27 Thread Mark Wielaard
Hi fedora devel list,

The new elfutils upstream comes with a debuginfod server which we want
packaged (as a sub-package) for fedora. Testing looks good and
everything seems to work, but rpmlint flags a couple of issues that I
don't think should be real issues. Could someone help me understand why
rpmlint seems unhappy with:

   elfutils-debuginfod.x86_64: W: non-standard-uid /var/cache/debuginfod 
debuginfod
   elfutils-debuginfod.x86_64: W: non-standard-gid /var/cache/debuginfod 
debuginfod
   elfutils-debuginfod.x86_64: E: non-standard-dir-perm /var/cache/debuginfod 
700
   elfutils-debuginfod.x86_64: W: non-standard-uid 
/var/cache/debuginfod/debuginfod.sqlite debuginfod
   elfutils-debuginfod.x86_64: W: non-standard-gid 
/var/cache/debuginfod/debuginfod.sqlite debuginfod
   elfutils-debuginfod.x86_64: E: non-readable 
/var/cache/debuginfod/debuginfod.sqlite 600
   elfutils-debuginfod.x86_64: E: zero-length 
/var/cache/debuginfod/debuginfod.sqlite

These are all done deliberately through the following constructs in the spec 
file:

In %pre to create the debuginfod user:

   getent group debuginfod >/dev/null || groupadd -r debuginfod
   getent passwd debuginfod >/dev/null || \
   useradd -r -g debuginfod -d /var/cache/debuginfod -s /sbin/nologin \
   -c "elfutils debuginfo server" debuginfod
   exit 0

In %install to create the dir/file artifacts:

   mkdir -p ${RPM_BUILD_ROOT}%{_localstatedir}/cache/debuginfod
   touch ${RPM_BUILD_ROOT}%{_localstatedir}/cache/debuginfod/debuginfod.sqlite

And in %files to install them with the right permissions:

   %dir %attr(0700,debuginfod,debuginfod) %{_localstatedir}/cache/debuginfod
   %verify(not md5 size mtime) %attr(0600,debuginfod,debuginfod) 
%{_localstatedir}/cache/debuginfod/debuginfod.sqlite

Should anything be done differently or does any of that violate
(rpmlint) policy somehow?

Thanks,

Mark
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Planned Outage - Taskotron and ResultsDB - 2019-11-26 19:00 UTC

2019-11-27 Thread Tim Flink
I hit a hiccup during the upgrade but everything should be back to
normal and upgraded.

If you notice anything not working correctly, please let us know in
#fedora-admin or #fedora-qa.

Thanks,

Tim

On Tue, 26 Nov 2019 11:58:36 -0700
Tim Flink  wrote:

> Apologies for the last minute nature of this outage, the details
> behind the upgrade were under debate and we didn't want to announce a
> time until we were sure about what was going to happen when.
> 
> Seeing as the machines are running F29, they need to be upgraded as
> it's going EOL today.
> 
> Tim
> 
> 
> 
> 
> There will be an outage starting at 2019-11-26 21:00 UTC, which will
> last approximately 3 hours.
> 
> To convert UTC to your local time, take a look at
> https://fedoraproject.org/wiki/UTCHowto or run:
> 
> date -d '2019-11-26 19:00 UTC'
> 
> Reason for outage:
> 
> We will be upgrading the servers which host Taskotron and ResultsDB to
> newer versions of Fedora.
> 
> Affected Services:
> 
> Taskotron, ResultsDB and anything which uses ResultsDB as a data
> source (Bodhi, gating etc.)
> 
> Ticket Link:
> 
> https://pagure.io/fedora-infrastructure/issue/8420
> 
> Contact Information:
> 
> Please join #fedora-admin in irc.freenode.net or add comments to the
> ticket for this outage above.



pgp0vHeRKl7Wq.pgp
Description: OpenPGP digital signature
___
devel-announce mailing list -- devel-annou...@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel-annou...@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Planned Outage - Taskotron and ResultsDB - 2019-11-26 19:00 UTC

2019-11-27 Thread Tim Flink
Apologies for the last minute nature of this outage, the details
behind the upgrade were under debate and we didn't want to announce a
time until we were sure about what was going to happen when.

Seeing as the machines are running F29, they need to be upgraded as
it's going EOL today.

Tim




There will be an outage starting at 2019-11-26 21:00 UTC, which will
last approximately 3 hours.

To convert UTC to your local time, take a look at
https://fedoraproject.org/wiki/UTCHowto or run:

date -d '2019-11-26 19:00 UTC'

Reason for outage:

We will be upgrading the servers which host Taskotron and ResultsDB to
newer versions of Fedora.

Affected Services:

Taskotron, ResultsDB and anything which uses ResultsDB as a data source
(Bodhi, gating etc.)

Ticket Link:

https://pagure.io/fedora-infrastructure/issue/8420

Contact Information:

Please join #fedora-admin in irc.freenode.net or add comments to the
ticket for this outage above.


pgpAIRab4ZYRV.pgp
Description: OpenPGP digital signature
___
devel-announce mailing list -- devel-annou...@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel-annou...@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Zbigniew Jędrzejewski-Szmek
On Wed, Nov 27, 2019 at 11:25:25AM +, Ankur Sinha wrote:
> On Wed, Nov 27, 2019 10:45:00 +, Ian McInerney wrote:
> > Tex isn't really the best example for the insane package numbers (since the
> > main Tex system, CTAN, actually does define them as separate packages). It
> > would be interesting to know if anyone actually does just install one or two
> > rather than all... I know that I usually just install all of them on new
> > systems.
> 
> Oh, I almost never install the whole thing. I install whatever packages
> I need only, taking advantage of the great packaging work that the
> maintainers have put in.

Yeah, me too. I usually run latex/xelatex/whatever, read any errors,
and just do dnf install -y tex(foobar.sty) as needed. For a handful
of required imports this works fine.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Martin Kolman
On Wed, 2019-11-27 at 07:44 +0100, Igor Gnatenko wrote:
> No, 50 is perfectly fine. As others mentioned, we have much bigger amount of 
> them in texlive.
Yeah, I also don't really see a problem in making packages more granular. There 
are many usecaseswhere you want that,
such as installation images or minimal cloud images and containers.
If packages are not granular, you need to resort to ugly hacks that are hard to 
maintain  if you want to make yourimage
smaller. With granular packages you can install only what you really need, no 
hacks required!

> If those are like plugins which may or may not require other packages, I 
> would split them. And probably put Recommends
> in the main package for the most used ones.
> 
> On Wed, Nov 27, 2019, 02:58 Chris  wrote:
> > Hi guys,
> > 
> > I just wanted to poll you for some advice.  My notification tool I maintain 
> > supports more than 50+ services now, but
> > the only package isolation I do within 2 RPMs.  One for the actual CLI (for 
> > admin's who want to use it) and the
> > other is for the backend library (for Devs). I only ask because each 
> > supported service is very modular.
> > 
> > I kind of like the way nagios-plugins breaks apart it's check_scripts into 
> > many sub-packages, but 50+ subpackages
> > seems a bit extreme... or is it? It certainly seems like a bit of a 
> > nightmare to maintain; it would be one very
> > large .spec file.
> > 
> > You can see the directory structure here on GitHub:
> > https://github.com/caronc/apprise
> > 
> > Effectively every single file in "apprise/plugins/Notify*.py" is it's own 
> > plugin-able module.  You can add/remove
> > content into here and the tool adapts. Thus the sub-packages would only 
> > include 1 file per RPM.
> > 
> > Is it advisable to go this route? I presume there is no easy way to 
> > transition without breaking users existing
> > setup? I don't know what the d/l stats are; so there may not be a large 
> > enough audience to even need to worry about
> > this?
> > 
> > What are your thoughts and/or advice?
> > ___
> > 
> > devel mailing list -- devel@lists.fedoraproject.org
> > 
> > To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> > 
> > Fedora Code of Conduct: 
> > https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > 
> > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> > 
> > List Archives: 
> > https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> > 
> 
> ___devel mailing list -- 
> devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Jindrich Novy
Your reply completely lacks any point. Why is TeX Live the best example of
what
to avoid when packaging in Fedora?

Having 50+ subpackages is perfectly justified once there is a reason why.
For TeX Live it is that upstream (CTAN) actually maintains package
dependencies and they do add and remove packages from different TeX Live
collections, e.g. LaTeX, XeTeX, etc. That means the complete package set is
actually generated from upstream metadata to give users freedom to not to
install hundreds of MBs of stuff they don't need - as it was previously
with teTeX. And also to be automatically synced with upstream.

Jindrich


On Wed, Nov 27, 2019 at 10:20 AM Nikos Mavrogiannopoulos 
wrote:

> On Wed, Nov 27, 2019 at 4:46 AM Sam Varshavchik 
> wrote:
> >
> > Chris writes:
> >
> > > Hi guys,
> > >
> > >
> > > I just wanted to poll you for some advice.  My notification tool I
> maintain
> > > supports more than 50+ services now, but the only package isolation I
> do
> >
> > You should really count the number of texlive subpackages…
>
> I think that from the user perspective that's the best example of what
> to avoid when packaging in Fedora.
>
> regards,
> Nikos
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Ankur Sinha
On Wed, Nov 27, 2019 10:45:00 +, Ian McInerney wrote:
> Tex isn't really the best example for the insane package numbers (since the
> main Tex system, CTAN, actually does define them as separate packages). It
> would be interesting to know if anyone actually does just install one or two
> rather than all... I know that I usually just install all of them on new
> systems.

Oh, I almost never install the whole thing. I install whatever packages
I need only, taking advantage of the great packaging work that the
maintainers have put in.

We have a page here on the NeuroFedora documentation about installing
LaTeX on Fedora (please feel free to improve it):
https://docs.fedoraproject.org/en-US/neurofedora/latex/

and, I hacked up this script that tries to install the packages needed
by a LaTeX project on Fedora:
https://github.com/sanjayankur31/100_dotfiles/blob/master/bin/fedora-install-texlive-deps.sh

-- 
Thanks,
Regards,
Ankur Sinha "FranciscoD" (He / Him / His) | 
https://fedoraproject.org/wiki/User:Ankursinha
Time zone: Europe/London


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Nicolas Mailhot via devel

Le 2019-11-27 11:45, Ian McInerney a écrit :

Tex isn't really the best example for the insane package numbers
(since the main Tex system, CTAN, actually does define them as
separate packages). It would be interesting to know if anyone actually
does just install one or two rather than all... I know that I usually
just install all of them on new systems.


TEX includes things shared with the rest of the system (for example 
fonts), forcing the users of those things to install a huge TEX blob 
just to get the subset they need is not a good user experience.


Regards,
--
Nicolas Mailhot
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Ian McInerney
Tex isn't really the best example for the insane package numbers (since the
main Tex system, CTAN, actually does define them as separate packages). It
would be interesting to know if anyone actually does just install one or
two rather than all... I know that I usually just install all of them on
new systems.

-Ian

On Wed, Nov 27, 2019 at 10:36 AM Matej Grabovsky 
wrote:

> On Wed, Nov 27, 2019 at 10:20 AM Nikos Mavrogiannopoulos
>  wrote:
> >
> > I think that from the user perspective that's the best example of what
> > to avoid when packaging in Fedora.
>
> Can you please explain what you mean? What are the alternatives if
> there really are over 5000 packages in CTAN?
>
> Arch Linux has packaged bundles like texlive-science or texlive-music,
> but these seem less usable as individual packages can't be installed.
> Moreover, it might be difficult to find which of the bundles includes
> the one specific package you need.
>
> Kind regards,
> Matěj Grabovský
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Matej Grabovsky
On Wed, Nov 27, 2019 at 10:20 AM Nikos Mavrogiannopoulos
 wrote:
>
> I think that from the user perspective that's the best example of what
> to avoid when packaging in Fedora.

Can you please explain what you mean? What are the alternatives if
there really are over 5000 packages in CTAN?

Arch Linux has packaged bundles like texlive-science or texlive-music,
but these seem less usable as individual packages can't be installed.
Moreover, it might be difficult to find which of the bundles includes
the one specific package you need.

Kind regards,
Matěj Grabovský
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[Test-Announce] Fedora 29 EOL

2019-11-27 Thread Mohan Boddu
Hello all,

As of the 26th of November 2019, Fedora 29 has reached its end of life for
updates and support. No further updates, including security updates,
will be available for Fedora 29. Fedora 30 will continue to receive
updates until
approximately one month after the release of Fedora 32. The
maintenance schedule of Fedora releases is documented on the Fedora
Project wiki [0]. The Fedora Project wiki also contains instructions
[1] on how to upgrade from a previous release of Fedora to a version
receiving updates.

Mohan Boddu.

[0] 
https://fedoraproject.org/wiki/Fedora_Release_Life_Cycle#Maintenance_Schedule
[2] https://docs.fedoraproject.org/en-US/quick-docs/dnf-system-upgrade/
___
test-announce mailing list -- test-annou...@lists.fedoraproject.org
To unsubscribe send an email to test-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test-annou...@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Nicolas Mailhot via devel

Le 2019-11-27 10:37, Tom Hughes a écrit :

On 27/11/2019 09:30, Nicolas Mailhot via devel wrote:

The clean way to do it is to put the list of things to generate 
against in a spec variable, and write the generator logic in a (lua) 
rpm macro. That keeps the generation inside the spec instead of moving 
some package creation steps outside our the shared and audited build 
infra.


How is a file in distgit "outside our the shared and audited build
infra" exactly? The spec file is just a file in distgit after all!


Yes, I misunderstood, as long as the generation logic is done inside the 
spec (via inlined macros, or detached files %{load}-ed), the end result 
is perfectly fine


What is not fine is when people use an external generator to write a 
spec file. And then fed this build output to the build infra. That moves 
spec assembly outside the normal managed build process.


Regards,

--
Nicolas Mailhot
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora-Cloud-31-20191127.0 compose check report

2019-11-27 Thread Fedora compose checker
No missing expected images.

Passed openQA tests: 1/1 (x86_64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Tom Hughes

On 27/11/2019 09:30, Nicolas Mailhot via devel wrote:

The clean way to do it is to put the list of things to generate against 
in a spec variable, and write the generator logic in a (lua) rpm macro. 
That keeps the generation inside the spec instead of moving some package 
creation steps outside our the shared and audited build infra.


How is a file in distgit "outside our the shared and audited build
infra" exactly? The spec file is just a file in distgit after all!

The actual list in question is right here:

https://src.fedoraproject.org/rpms/lodash/blob/master/f/lodash-modules.txt

Obviously I could inline that in the spec file but I fail to see
what that does other than make the spec file massive...

Tom

--
Tom Hughes (t...@compton.nu)
http://compton.nu/
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Nicolas Mailhot via devel

Le 2019-11-27 07:44, Igor Gnatenko a écrit :

No, 50 is perfectly fine. As others mentioned, we have much bigger
amount of them in texlive.


It's not just about the number of subpackages. Each package you publish 
will end up as a separate node in the dependency graph.


Since functional plugins tend to accumulate dependency links once 
published (things that need those plugins, and things the plugins need 
to work), splitting the plugins is a requirement to avoid unmanageable 
dependency hairballs.


The reason upstreams move to a plugin architecture, is precisely to 
isolate the requirements of each plugin from the requirements of the 
others


Regards,

--
Nicolas Mailhot
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Nicolas Mailhot via devel

Le 2019-11-27 08:08, Tom Hughes a écrit :

On 27/11/2019 01:49, Chris wrote:

I kind of like the way nagios-plugins breaks apart it's check_scripts 
into many sub-packages, but 50+ subpackages seems a bit extreme... or 
is it? It certainly seems like a bit of a nightmare to maintain; it 
would be one very large .spec file.


If the subpackages are sufficiently identical you can just use lua
to programatically generate the relevant spec fragment - see lodash
for an example:


That’s also how it is done for go packages and in the proposed fonts 
packaging update. Though it is heavier upstream-agnostic lifting, you 
may not need this level of abstraction just for 50 packages.


https://pagure.io/fonts-rpm-macros/blob/master/f/templates/rpm/spectemplate-fonts-0-simple.spec
https://pagure.io/go-rpm-macros/blob/master/f/templates/rpm/spectemplate-go-0-source-minimal.spec


It just reads the list of modules from a text file in the distgit repo
and generates the spec fragment for each one.


The clean way to do it is to put the list of things to generate against 
in a spec variable, and write the generator logic in a (lua) rpm macro. 
That keeps the generation inside the spec instead of moving some package 
creation steps outside our the shared and audited build infra.


Regards,

--
Nicolas Mailhot
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Is 50+ RPM Subpackages too extreme?

2019-11-27 Thread Nikos Mavrogiannopoulos
On Wed, Nov 27, 2019 at 4:46 AM Sam Varshavchik  wrote:
>
> Chris writes:
>
> > Hi guys,
> >
> >
> > I just wanted to poll you for some advice.  My notification tool I maintain
> > supports more than 50+ services now, but the only package isolation I do
>
> You should really count the number of texlive subpackages…

I think that from the user perspective that's the best example of what
to avoid when packaging in Fedora.

regards,
Nikos
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 32 System-Wide Change proposal: Disallow Empty Password By Default

2019-11-27 Thread Zbigniew Jędrzejewski-Szmek
On Tue, Nov 26, 2019 at 09:53:49AM -0600, Michael Catanzaro wrote:
> On Tue, Nov 26, 2019 at 9:35 am, Chris Adams  wrote:
> >That should be considered a bug IMHO...
> 
> At least for rescue mode, probably yes, but I don't know what to do
> about it. Can we make systemd's rescue prompt ask for username and
> allow logging in with any user account (goal being to log in to
> admin account then 'sudo -i')? Or would there be problems with that?
> Clearly it's not designed for that purpose, and it seems
> intentional.

systemd does not implement user authentication by itself: it just spawns
getty/gdm/etc during normal runtime, and sulogin for emergency logins.
We generally do not want to re-implement this functionality in systemd.
selinux has some special permissions for sulogin, etc.
Ideally, sulogin would get the capability to pick an alternative user.
util-linux already has the code to select and authenticate users, so
it'd be just a question of some design work and rearranging the code.

On Tue, Nov 26, 2019 at 09:39:59AM -0700, Chris Murphy wrote:
> Mabee systemd-homed is in
> a position to solve this by having early enough authentication
> capability by rescue.target time that any admin user can login?

Actually, it may. Things are confusing here, because systemd-homed is
implemented together with changes to how user metadata querying is done:
instead of using dbus, a brokerless and much simpler varlink query is used.
That last part is what would be relevant to early-boot logins, because
less services need to be up to bring up the user session.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org