Re: I say thanks for another release (F32)

2020-04-28 Thread Benjamin Kircher
On Tue, 2020-04-28 at 15:58 +,   sixpack13 wrote:
> Hallo
> 
> official Release statement isn't out yet, but I say thanks for
> another 
> nice Fedora release to *all* people made F32 happen.

Seconded. Thanks all for making this.

BK
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


python2-dns without DNSSEC support in rawhide

2020-04-28 Thread Lumir Balhar

Hello.

I'd like to switch python-dns crypto backend from pycryptodomex and 
ecdsa to python-cryptography. Upstream already did the same in master 
branch: https://github.com/rthalley/dnspython/pull/449


But, because python2-cryptography is not available in Fedora anymore, 
this change will disable DNSSEC functionality in python2-dns. There are 
only two packages depending on python2-dns: mailman and 
trac-spamfilter-plugin. I did a check and rebuild of both of them and it 
seems that they both work with the new version and there is no usage of 
DNSSEC in their codebases. COPR: 
https://copr.fedorainfracloud.org/coprs/lbalhar/dns/


PR: https://src.fedoraproject.org/rpms/python-dns/pull-request/5

If you think we should not merge the PR, let us know rather sooner than 
later.


Have a nice day.

Lumír
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: bodhi: stuck updates

2020-04-28 Thread Alexander Ploumistos
And thank you for taking care of this.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Block discard on more things

2020-04-28 Thread James Cassell

On Tue, Apr 28, 2020, at 6:51 PM, Chris Adams wrote:
> Now that Fedora 32 has fstrim.timer enabled by default... how about
> discards for the things that fstrim doesn't get?  Two main things I know
> of:
> 
> - swap: Do discard at swapon time by setting "discard=once" in
>   /etc/fstab would be somewhat similar to the periodic fstrim call.  I
>   don't know how much impact the "discard=pages" option might have (the
>   man page says it is asynchronous, but it might make low-memory
>   situations worse).
> 

Seems reasonable.

> - logical volumes: Set "issue_discards = 1" in /etc/lvm/lvm.conf so that
>   removed LVs get discarded.
> 

Could foreclose data recovery in case LV was removed entirely, so I'd leave it 
to fstrim.timer on the eventual filesystem.

V/r,
James Cassell
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Feedback on default partitioning and encryption

2020-04-28 Thread Chris Murphy
On Tue, Apr 28, 2020 at 1:52 PM Simo Sorce  wrote:
>
> On Tue, 2020-04-28 at 13:18 -0600, Chris Murphy wrote:
> > Long term, many solutions need to be considered. And not only
> > technical, but their impact on release engineering.
>
> What is the goal ?
>
> If the goal is just making it easy later, you could encrypt with a null
> default passphrase that the system uses automatically and do not ask
> the user.

Upstream dmcrypt folks don't seem to like this.
https://www.saout.de/pipermail/dm-crypt/2019-December/006290.html
https://www.saout.de/pipermail/dm-crypt/2019-December/006295.html

In that thread, there is a rejection of the very idea that (disk)
encryption by default is a good or necessary thing.  It unquestionably
does add complexity, and therefore risk to user data. I suspect
Anaconda folks won't want to support something upstream argues
against, and doesn't officially support. There could be good reasons
to go in a different direction than upstream advise, but there's
probably a reasonably higher burden on advocates proposing such a
plan.

>
> > Today's full disk encryption (except /boot) paradigm is long term
> > untenable. The negatives are the sole reason why they're not used by
> > default, even in a short term context.
>
> The fact something is not the default does not mean it is untenable.

The default status isn't part of the suitability assessment. I assert
it must be suitable to be a default, which does show my bias: defaults
are often perceived by most users as either recommended or safe, and I
try to assess defaults from that perspective.


> > The working group's evaluation so far, shows that alternatives are
> > only available in the long term. Hence the (re) evaluation of whether
> > encryption by default is such a good thing, that it should be enabled
> > by default for Fedora 33, despite the limitations of the current
> > design.
>
> I do not see how you can enable full disk encryption by default unless
> you accept that you are forcing user to use 2 passwords.
>
> If that is unacceptable (and it probably is) then it can't be a
> default.

Probably true.


> > It's not decided whether system data should be encrypted by default,
> > or made only opt in, and if so how to encrypt  them. The working group
> > is (perhaps painfully) aware that there are many options.
>
> Again it really depends on the threat model, if the evil made is the
> issue, then, unless you have a signed integrity model you have to
> encrypt the system as well.
>
> If the threat model is just stolen/lost laptop/disk then encrypting the
> user data only would be sufficient.

Right. And even if the long term goal is to account for Evil Maid,
doesn't disqualify an implementation that only protects the
stolen/lost laptop case. Building on prior advancements is acceptable,
no different than with UEFI Secure Boot.


> > The bootloader, kernel, initramfs, /usr definitely need to be trusted
> > (implies a need for integrity and authenticity).
>
> You cannot trust /usr w/o integrity checks.
>
> >  It's likely that /etc
> > /var and ~/ need to be trusted.
>
> I guess you need to define what you mean with trust on second thought,
> as I do not think I share the same definition with you.

Trust is a continuum and it can be misplaced. So whether I trust a
thing or not reflects more on me than the actual trustworthiness of
the thing under discussion. That's maybe the best concise definition I
can muster without verbose examples...

Insofar as /usr: If it is encrypted (cryptsetup LUKS default) I trust
that the confidentiality provided essentially makes it impossible for
an attacker to inject malware - this loss of precision needed for such
an attack by encryption gives it an illusory sense of integrity that
it really doesn't have. Therefore I do not trust that it's free from
either incidental corruption or a malicious attack on the ciphertext
that could e.g. cause something to crash or result in weird behavior.

If in addition to LUKS encryption, I were to add minimal integrity
checking via dm-integrity or Btrfs CRC-32C for everything, I trust
there's no incidental corruption; I'm not totally certain whether I
can really trust there's been no malicious attack. I can't assess it,
but suspect it depends on the particular attack (skill of the
attacker) and versions of many things.

Whereas if it were not encrypted, but employed either dm-verity,
dm-integrity or Btrfs using hmac:sha256, I would trust the contents
against either incidental or malicious attack - so long as I trust the
HMAC hasn't escaped my control.

As for /var and /etc, were they to be encrypted using fscrypt+ext4, I
can trust only that detailed user usage data (that which exists in
file extents) isn't being leaked. But the metadata isn't encrypted, so
could some skilled attacker look at the unencrypted /etc /var metadata
and infer that I use a VPN even if they can't acquire keys? I don't
know, I can't assess it. I also can't assess the demarcation line of
accept

ckermit?

2020-04-28 Thread Steven A. Falco

There was a failed build of ckermit for F32 back in early February by releng 
[1], and I don't see any later attempts for F32.  There is a successful build 
for ckermit for F33 from yesterday [2].

I'd like to request a rebuild for F32.  Is it sufficient to request that here, 
or is there some other procedure that I should use?

Also, I use ckermit daily as a terminal emulator, so if a co-maintainer is 
wanted, I'd be happy to volunteer - FAS ID stevenfalco.

Steve

[1] https://koji.fedoraproject.org/koji/buildinfo?buildID=1434605
[2] https://koji.fedoraproject.org/koji/buildinfo?buildID=1498879
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Block discard on more things

2020-04-28 Thread Chris Adams
Now that Fedora 32 has fstrim.timer enabled by default... how about
discards for the things that fstrim doesn't get?  Two main things I know
of:

- swap: Do discard at swapon time by setting "discard=once" in
  /etc/fstab would be somewhat similar to the periodic fstrim call.  I
  don't know how much impact the "discard=pages" option might have (the
  man page says it is asynchronous, but it might make low-memory
  situations worse).

- logical volumes: Set "issue_discards = 1" in /etc/lvm/lvm.conf so that
  removed LVs get discarded.

-- 
Chris Adams 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Orphaned packages looking for new maintainers (anaconda also affected)

2020-04-28 Thread Kevin Fenzi
On Tue, Apr 28, 2020 at 11:30:46PM +0200, Dominik 'Rathann' Mierzejewski wrote:
> On Tuesday, 28 April 2020 at 22:15, Kevin Fenzi wrote:
> [...]
> > I'm a bit more concerned with keybinder3. That's needed by blueberry
> > which we use in the Xfce spin. 
> 
> I care about blueberry as well, even though I use MATE.
> 
> > Leigh: You fixed the keybinder3 FTBFS, do you want to take ownership
> > too?
> > 
> > I guess I can take it if no one else wants to... 
> 
> ... but I really wouldn't like to take on another package, I have too
> much on my plate maintaining what I have already.

ok. I went ahead and took it. 

Co-maintainers welcome

kevin


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Feedback on default partitioning and encryption

2020-04-28 Thread Simo Sorce
On Tue, 2020-04-28 at 16:23 -0500, Michael Catanzaro wrote:
> On Tue, Apr 28, 2020 at 1:18 pm, Chris Murphy  
> wrote:
> > This is the dilemma. It necessarily needs a single schema, there is
> > only one default. Customizations aren't going away.
> 
> We're not trying to come up with something that works perfectly for 
> everyone. We're just trying to come up with a default that works 
> reasonably well for most users. That means:
> 
>  * Only one password prompt
>  * Password prompt must support ibus and normal expected range of 
> languages (i.e. not be done in plymouth), because not all the world 
> uses Latin alphabets
>  * Optimize for single-user systems, but don't break multi-user either
> 
> Regarding the use cases: "shared workstation vs personal desktop vs 
> personal laptop vs corporate laptop," we support all of the above. We 
> want to optimize for personal desktop, personal laptop, and corporate 
> laptop, not for shared workstation. We still need shared workstation 
> and multiuser laptop to *work*, though, but it's OK if it's not quite 
> as secure.
> 
> That said, the installer cannot know whether additional user accounts 
> will be created in the future, so the installer does not know which 
> use-case it's installing for. ;)

And people can change use over time.

I do not see an easy way out here anyway, good luck!

Simo.

-- 
Simo Sorce
RHEL Crypto Team
Red Hat, Inc



___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Feedback on default partitioning and encryption

2020-04-28 Thread David Kaufmann
On Tue, Apr 28, 2020 at 03:51:57PM -0400, Simo Sorce wrote:
> If the threat model is just stolen/lost laptop/disk then encrypting the
> user data only would be sufficient.

Strictly speaking I'd say /etc/shadow, /var/lib/{pgsql,mysql}/,
/etc/sysconfig/network-scripts/ and /etc/NetworkManager/ are
also quite likely to contain user data - the first as a
bruteforce-target, the second as these are quite often installed on dev
machines (in my experience), and the others as they often contain
passwords in plaintext, which may be even more critical as the actual
user data.

I'd say there is no way around full disk encryption, maybe lifting the
hard restriction on not having double encryption might be an option, but
I don't have any performance data on that.

All the best,
David


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Orphaned packages looking for new maintainers (anaconda also affected)

2020-04-28 Thread Dominik 'Rathann' Mierzejewski
On Tuesday, 28 April 2020 at 22:15, Kevin Fenzi wrote:
[...]
> I'm a bit more concerned with keybinder3. That's needed by blueberry
> which we use in the Xfce spin. 

I care about blueberry as well, even though I use MATE.

> Leigh: You fixed the keybinder3 FTBFS, do you want to take ownership
> too?
> 
> I guess I can take it if no one else wants to... 

... but I really wouldn't like to take on another package, I have too
much on my plate maintaining what I have already.

Regards,
Dominik
-- 
Fedora   https://getfedora.org  |  RPM Fusion  http://rpmfusion.org
There should be a science of discontent. People need hard times and
oppression to develop psychic muscles.
-- from "Collected Sayings of Muad'Dib" by the Princess Irulan
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 32 is available now!

2020-04-28 Thread Michael Catanzaro

On Tue, Apr 28, 2020 at 1:54 pm, Alan  wrote:
How do I switch desktops from gdm? switchdesk does not seem to work 
and

the control on the login screen seems to have gone away.


It's moved to the bottom-right corner of the login screen now.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Feedback on default partitioning and encryption

2020-04-28 Thread Michael Catanzaro
On Tue, Apr 28, 2020 at 1:18 pm, Chris Murphy  
wrote:

This is the dilemma. It necessarily needs a single schema, there is
only one default. Customizations aren't going away.


We're not trying to come up with something that works perfectly for 
everyone. We're just trying to come up with a default that works 
reasonably well for most users. That means:


* Only one password prompt
* Password prompt must support ibus and normal expected range of 
languages (i.e. not be done in plymouth), because not all the world 
uses Latin alphabets

* Optimize for single-user systems, but don't break multi-user either

Regarding the use cases: "shared workstation vs personal desktop vs 
personal laptop vs corporate laptop," we support all of the above. We 
want to optimize for personal desktop, personal laptop, and corporate 
laptop, not for shared workstation. We still need shared workstation 
and multiuser laptop to *work*, though, but it's OK if it's not quite 
as secure.


That said, the installer cannot know whether additional user accounts 
will be created in the future, so the installer does not know which 
use-case it's installing for. ;)


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Feedback on default partitioning and encryption

2020-04-28 Thread Matthew Miller
On Tue, Apr 28, 2020 at 12:36:22PM -0400, Simo Sorce wrote:
> So in the end I do not believe you can come up with a single schema for
> "workstation" unless you narrow down the scope of workstation to a
> smaller set of use cases to the exclusion of the others.

I think it's okay to do just that. We have other offerings for other
use-cases (like the media server you mentioned).


-- 
Matthew Miller

Fedora Project Leader
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 32 is available now!

2020-04-28 Thread Alan
On Tue, 2020-04-28 at 09:55 -0400, Matthew Miller wrote:
> It’s here! We’re proud to announce the release of Fedora 32.
> Thanks to the hard work of thousands of Fedora community
> members and contributors, we’re celebrating yet another 
> on-time release!
> 
> Read the official announcement at:
> 
> * https://fedoramagazine.org/announcing-fedora-32/
> 
> or just go ahead and grab it from: 
> 
> * https://getfedora.org/
> 

So far it looks very nice.

Only one issue...

How do I switch desktops from gdm? switchdesk does not seem to work and
the control on the login screen seems to have gone away.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Orphaned packages looking for new maintainers (anaconda also affected)

2020-04-28 Thread Kevin Fenzi
On Tue, Apr 28, 2020 at 08:01:31AM +0200, Dan Čermák wrote:
> Sérgio Basto  writes:
> 
> > On Mon, 2020-04-27 at 12:39 +0200, Miro Hrončok wrote:
> >> GConf2
> >
> > GConf2 is orphan, why ? no maintainers or a task force to be removed ?
> 
> GConf2 has been deprecated for well over a decade and afaik unmaintained
> for nearly half a decade. Thus: please just remove it from your
> dependencies and use gsettings instead (the upstream replacement).
> 
> Many packages might actually not require it at all: emacs was pulling it
> in, but it works just fine without it and with gsettings instead.

Yeah, I am happy to let GConf2 go into the night... thunar-vfs depends
on it, but thats just the old vfs layer Thunar used to use kept around
for compatibility. It should go also. 

I'm a bit more concerned with keybinder3. That's needed by blueberry
which we use in the Xfce spin. 

Leigh: You fixed the keybinder3 FTBFS, do you want to take ownership
too?

I guess I can take it if no one else wants to... 

kevin


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora 33 System-Wide Change proposal: Boost 1.73 upgrade

2020-04-28 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/F33Boost173

== Summary ==
This change brings Boost 1.73 to Fedora. This will mean Fedora ships with a
recent upstream Boost release.

== Owner ==

* Name: [[User:jwakely| Jonathan Wakely]]
* Email: jwak...@redhat.com

== Detailed Description ==

The aim is to synchronize Fedora with the most recent Boost release.
Because ABI stability is one of explicit Boost non-goals, this entails
rebuilding of all dependent packages. This has also always entailed yours
truly assisting maintainers of client packages in decoding cryptic
boost-ese seen in output from g++. Such care is to be expected this time
around as well.

The equivalent changes for previous releases were
[[Changes/F30Boost169|Fedora 30 Change]], [[Changes/F29Boost167|Fedora 29
Change]], [[Changes/F28Boost166|Fedora 28 Change]],
[[Changes/F27Boost164|Fedora 27 Change]], [[Changes/F26Boost163|Fedora 26
Change]], [[Changes/F25Boost161|Fedora 25 Change]],
[[Changes/F24Boost160|Fedora 24 Change]],  [[Changes/F23Boost159|Fedora 23
Change]] and [[Changes/F22Boost158|Fedora 22 Change]].

== Benefit to Fedora ==

Fedora 32 includes Boost 1.69 which is the same version as F31 and F30, and
is several releases behind the latest upstream release (Boost 1.73 is due
for release late April 2020).

Fedora will stay relevant, as far as Boost clients are concerned. Boost
1.73 brings four new components:
* [https://www.boost.org/libs/outcome/ Boost.Outcome], A set of tools for
reporting and handling function failures in contexts where directly
using C++ exception handling is unsuitable, from Niall Douglas.
* [https://www.boost.org/libs/histogram/ Boost.Histogram], Fast and
extensible multi-dimensional histograms with convenient interface for
C++14, from Hans Dembinski.
* [https://www.boost.org/libs/variant2/ Boost.Variant2], A never-valueless,
strong guarantee implementation of std::variant, from Peter Dimov.
* [https://www.boost.org/libs/nowide/ Boost.Nowide], Standard library
functions with UTF-8 API on Windows, from Artyom Beilis.
* [https://www.boost.org/libs/static_string/ Boost.StaticString], A
dynamically resizable string of characters with compile-time fixed capacity
and contiguous embedded storage, from Vinnie Falco and Krystian Stasiowski.

== Scope ==
* Proposal owners:
** Build will be done with Boost.Build v2 (which is the upstream-sanctioned
way of building Boost)
** Request a "f33-boost" [
https://docs.pagure.org/releng/sop_adding_side_build_targets.html build
system tag] ([
http://lists.fedoraproject.org/pipermail/devel/2011-November/159908.html
discussion]): TODO
** Build boost into that tag (take a look at the [
http://koji.fedoraproject.org/koji/buildinfo?buildID=606493 build #606493]
for inspiration)
** Post a request for rebuilds to fedora-devel
** Work on rebuilding dependent packages in the tag.
** When most is done, re-tag all the packages to rawhide
** Watch fedora-devel and assist in rebuilding broken Boost clients (by
fixing the client, or Boost).

* Other developers:
** Those who depend on Boost DSOs will have to rebuild their packages.
Feature owners will alleviate some of this work as indicated above, and
will assist those whose packages fail to build in debugging them.
** The existing `boost-nowide` package will need to be retired, as it is
now included in the upstream Boost release.


* Release engineering: [https://pagure.io/releng/issue/9421 #9421] (a check
of an impact with Release Engineering is needed)

* Policies and guidelines:
** Apart from scope, this is business as usual, so no new policies, no new
guidelines.

* Trademark approval: N/A (not needed for this Change)


== Upgrade/compatibility impact ==
* The `boost-jam` package has been replaced by `boost-b2`. The separate
`boost-nowide` package will be replace by a subpackage of `boost`.
* No manual configuration or data migration needed.
* Some impact on other packages needing code changes to rebuild.
Historically this hasn't been too much of a problem and could always be
resolved before deadline.

== How To Test ==
* No special hardware is needed.
* Integration testing simply consists of installing Boost packages (`dnf
install boost`) on Fedora and checking that it does not break other
packages (see below for a way to obtain a list of boost clients).


== User Experience ==
* Expected to remain largely the same.
* Developers building third-party software on Fedora may need to rebuild
against the new Boost packages, and may need to adjust their code if the
new Boost release is not source-compatible.
* Developers using `bjam` to build their own software will need to switch
to using the new name for the tool, `b2`

== Dependencies ==
Packages that must be rebuilt:
$ dnf repoquery -s --releasever=rawhide --whatrequires libboost\*
--disablerepo=* --enablerepo=fedora | sort -u

All clients:
$ dnf repoquery --releasever=rawhide --archlist=src --whatrequires
boost-devel --disablerepo='*' --enablerepo=fedora-source

== Contingency Plan ==

* Contin

Re: Feedback on default partitioning and encryption

2020-04-28 Thread Simo Sorce
On Tue, 2020-04-28 at 13:18 -0600, Chris Murphy wrote:
> On Tue, Apr 28, 2020 at 10:37 AM Simo Sorce  wrote:
> > I have a hard time commenting over the next 2 becuse it seem like the
> > probelm is not just technical, but there is no clear vision of whether
> > there is one and only one solution or if multiple solutions need to be
> > considered.
> 
> The short term is necessarily limited to the existing functionality of
> the installer. Shall "encrypt my data" be enabled by default or not?
> Seems like a good idea, but there are  knock on effects that have
> various deleterious effects. Is it worth enabling only in the short
> term? Or should it be left as is, and focus on the long term design
> and planning?
> 
> There are few examples of encryption enabled by default in the desktop
> world. Presently, that seems to be only Pop!_OS.
> 
> On mobile devices this is more common. But even more common than
> encryption is trustworthiness (integrity and authenticity of the
> image; and statelessness, with the option to do a reset).
> 
> Long term, many solutions need to be considered. And not only
> technical, but their impact on release engineering.

What is the goal ?

If the goal is just making it easy later, you could encrypt with a null
default passphrase that the system uses automatically and do not ask
the user.

> > I personally prefer to encrypt the whole disk, because the machine I
> > care for encrypting is a laptop that can potentially be
> > stolen/displaced easily. However I do not care at all that there are
> > two different step (encryption password and separate account password),
> > and in fact I prefer to keep them separate because I join the laptop to
> > a separate IDM system so the account password is not managed by the
> > laptop.
> 
> Custom ways of account management aren't going away. The scope of this
> topic is: Fedora Workstation defaults.

It just informs that the default depends on the environment, there is a
big difference on what the reasonable defaults are depending on use:
shared workstation vs personal desktop vs personal laptop vs corporate
laptop, etc...

> Today's full disk encryption (except /boot) paradigm is long term
> untenable. The negatives are the sole reason why they're not used by
> default, even in a short term context.

The fact something is not the default does not mean it is untenable.

> The working group's evaluation so far, shows that alternatives are
> only available in the long term. Hence the (re) evaluation of whether
> encryption by default is such a good thing, that it should be enabled
> by default for Fedora 33, despite the limitations of the current
> design.

I do not see how you can enable full disk encryption by default unless
you accept that you are forcing user to use 2 passwords.

If that is unacceptable (and it probably is) then it can't be a
default.


> > I would love to have TPM integration, but just using TPM is useless for
> > my use case, because if they steal my laptop they also get my TPM
> > chip. TPM is cool only as an additional component but alone it is
> > somewhat useless. If clevis is used then you can compose the TPM *and*
> > a passphrase (or other item like a tang server or a phone/bluetooth
> > beacon).
> 
> TPM is in the long term category. Support for it in dmcrypt/cryptsetup
> doesn't have an ETA. There's other integration work needed too. And I
> don't think it's seriously considered for protecting user data, for
> the reason you mention. Rather, it's considered for encrypting system
> data.
> 
> It's not decided whether system data should be encrypted by default,
> or made only opt in, and if so how to encrypt  them. The working group
> is (perhaps painfully) aware that there are many options.

Again it really depends on the threat model, if the evil made is the
issue, then, unless you have a signed integrity model you have to
encrypt the system as well.

If the threat model is just stolen/lost laptop/disk then encrypting the
user data only would be sufficient.

> The bootloader, kernel, initramfs, /usr definitely need to be trusted
> (implies a need for integrity and authenticity).

You cannot trust /usr w/o integrity checks.

>  It's likely that /etc
> /var and ~/ need to be trusted.

I guess you need to define what you mean with trust on second thought,
as I do not think I share the same definition with you.

>  The bootloader, kernel, initramfs, and
> /usr definitely do not need to be private, though it doesn't hurt to
> do so, there's nothing secret about them. Whereas ~/ definitely needs
> an option to be encrypted, possibly by default.

Whether something is confidential or not is a matter of threat model
again. But I do agree that in the common case you might consider
"distribution provided"-binaries as non-confidential and be left only
integrity but not confidentiality protected.

> Depending on whether and how /home or each ~/ are encrypted, there are
> considerations like user flatpaks and possible duplica

Re: Feedback on default partitioning and encryption

2020-04-28 Thread Chris Murphy
On Tue, Apr 28, 2020 at 10:37 AM Simo Sorce  wrote:
>
> I have a hard time commenting over the next 2 becuse it seem like the
> probelm is not just technical, but there is no clear vision of whether
> there is one and only one solution or if multiple solutions need to be
> considered.

The short term is necessarily limited to the existing functionality of
the installer. Shall "encrypt my data" be enabled by default or not?
Seems like a good idea, but there are  knock on effects that have
various deleterious effects. Is it worth enabling only in the short
term? Or should it be left as is, and focus on the long term design
and planning?

There are few examples of encryption enabled by default in the desktop
world. Presently, that seems to be only Pop!_OS.

On mobile devices this is more common. But even more common than
encryption is trustworthiness (integrity and authenticity of the
image; and statelessness, with the option to do a reset).

Long term, many solutions need to be considered. And not only
technical, but their impact on release engineering.



> I personally prefer to encrypt the whole disk, because the machine I
> care for encrypting is a laptop that can potentially be
> stolen/displaced easily. However I do not care at all that there are
> two different step (encryption password and separate account password),
> and in fact I prefer to keep them separate because I join the laptop to
> a separate IDM system so the account password is not managed by the
> laptop.

Custom ways of account management aren't going away. The scope of this
topic is: Fedora Workstation defaults.

Today's full disk encryption (except /boot) paradigm is long term
untenable. The negatives are the sole reason why they're not used by
default, even in a short term context.

The working group's evaluation so far, shows that alternatives are
only available in the long term. Hence the (re) evaluation of whether
encryption by default is such a good thing, that it should be enabled
by default for Fedora 33, despite the limitations of the current
design.



> I would love to have TPM integration, but just using TPM is useless for
> my use case, because if they steal my laptop they also get my TPM
> chip. TPM is cool only as an additional component but alone it is
> somewhat useless. If clevis is used then you can compose the TPM *and*
> a passphrase (or other item like a tang server or a phone/bluetooth
> beacon).

TPM is in the long term category. Support for it in dmcrypt/cryptsetup
doesn't have an ETA. There's other integration work needed too. And I
don't think it's seriously considered for protecting user data, for
the reason you mention. Rather, it's considered for encrypting system
data.

It's not decided whether system data should be encrypted by default,
or made only opt in, and if so how to encrypt  them. The working group
is (perhaps painfully) aware that there are many options.

The bootloader, kernel, initramfs, /usr definitely need to be trusted
(implies a need for integrity and authenticity). It's likely that /etc
/var and ~/ need to be trusted. The bootloader, kernel, initramfs, and
/usr definitely do not need to be private, though it doesn't hurt to
do so, there's nothing secret about them. Whereas ~/ definitely needs
an option to be encrypted, possibly by default.

Depending on whether and how /home or each ~/ are encrypted, there are
considerations like user flatpaks and possible duplication and
excessive space consumption. If they are LUKS-on-loop files as
systemd-homed proposes, there are file system resize considerations
when additional users are added, or when users later added actually
have more space requirements. This is substantially more secure than
fscrypt+ext4, but is fscrypt adequate for Workstation users by
default?

The performance impact of LUKS-on-loop files is negligible. I'm not
certain about fscrypt's impact. But these are also further
considerations.

>
> So in the end I do not believe you can come up with a single schema for
> "workstation" unless you narrow down the scope of workstation to a
> smaller set of use cases to the exclusion of the others.

This is the dilemma. It necessarily needs a single schema, there is
only one default. Customizations aren't going away.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 32 is available now!

2020-04-28 Thread clime
On Tue, 28 Apr 2020 at 16:08, Matthew Miller  wrote:
>
> It’s here! We’re proud to announce the release of Fedora 32.
> Thanks to the hard work of thousands of Fedora community
> members and contributors, we’re celebrating yet another
> on-time release!
>
> Read the official announcement at:
>
> * https://fedoramagazine.org/announcing-fedora-32/

Awesome!

>
> or just go ahead and grab it from:
>
> * https://getfedora.org/
>
> --
> Matthew Miller
> 
> Fedora Project Leader
> ___
> announce mailing list -- annou...@lists.fedoraproject.org
> To unsubscribe send an email to announce-le...@lists.fedoraproject.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/annou...@lists.fedoraproject.org
> ___
> announce mailing list -- annou...@lists.fedoraproject.org
> To unsubscribe send an email to announce-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/annou...@lists.fedoraproject.org
> ___
> devel-announce mailing list -- devel-annou...@lists.fedoraproject.org
> To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel-annou...@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: bodhi: stuck updates

2020-04-28 Thread Clement Verna
On Tue, 28 Apr 2020 at 18:41, Alexander Ploumistos <
alex.ploumis...@gmail.com> wrote:

> Hi,
>
> Almost a week ago, I built cmpfit and fityk in side tags on F31, F32
> and F33. While the builds for F33 moved directly to stable - as
> expected - the other two got stuck for 4 days. I noticed that I could
> push them manually to testing, which I did a little over two days ago,
> but they seem to be stuck again, transitioning from pending to
> testing. Updates for other packages I built around the same time and
> later are already in testing. These are the updates in question:
> https://bodhi.fedoraproject.org/updates/FEDORA-2020-8ee22c621f
> https://bodhi.fedoraproject.org/updates/FEDORA-2020-cc2ae07056
> Some help?
>

Hi,

It looks like Bodhi thinks that the builds were not signed so the update is
not going to be pushed. It looks that there is a bug there since the builds
are correctly tagged in koji.

I will manually fix these update and file a bug upstream so we can look a
fixing this.

Thanks for reporting the problem.


>
> Best regards
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora rawhide compose report: 20200428.n.0 changes

2020-04-28 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20200426.n.1
NEW: Fedora-Rawhide-20200428.n.0

= SUMMARY =
Added images:0
Dropped images:  2
Added packages:  6
Dropped packages:0
Upgraded packages:   93
Downgraded packages: 0

Size of added packages:  4.83 MiB
Size of dropped packages:0 B
Size of upgraded packages:   1.95 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   76.24 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =

= DROPPED IMAGES =
Image: Python_Classroom vagrant-virtualbox x86_64
Path: 
Labs/x86_64/images/Fedora-Python-Classroom-Vagrant-Rawhide-20200426.n.1.x86_64.vagrant-virtualbox.box
Image: Python_Classroom vagrant-libvirt x86_64
Path: 
Labs/x86_64/images/Fedora-Python-Classroom-Vagrant-Rawhide-20200426.n.1.x86_64.vagrant-libvirt.box

= ADDED PACKAGES =
Package: create-fake-rpm-2-1.fc33
Summary: Generate fake (S)RPM
RPMs:create-fake-rpm
Size:17.55 KiB

Package: mingw-biblesync-2.0.1-2.fc33
Summary: A Cross-platform library for sharing Bible navigation
RPMs:mingw32-biblesync mingw64-biblesync
Size:95.37 KiB

Package: python-jsonfield-3.1.0-1.fc33
Summary: A reusable Django field that allows you to store validated JSON in 
your model
RPMs:python3-jsonfield
Size:20.36 KiB

Package: python-jsonrpc-server-0.3.4-3.fc33
Summary: JSON RPC 2.0 server library
RPMs:python3-jsonrpc-server
Size:23.50 KiB

Package: python-spyking-circus-0.9.7-1.fc33
Summary: Fast and scalable spike sorting of large-scale extracellular recordings
RPMs:python-spyking-circus-doc python3-spyking-circus
Size:4.00 MiB

Package: zswap-cli-0.4.1-1.fc33
Summary: Command-line tool to control zswap options
RPMs:zswap-cli
Size:691.29 KiB


= DROPPED PACKAGES =

= UPGRADED PACKAGES =
Package:  Add64-3.9.0-1.fc33
Old package:  Add64-1.2.2-19.fc32
Summary:  An additive synthesizer using JACK
RPMs: Add64
Size: 783.16 KiB
Size change:  201.65 KiB
Changelog:
  * Sun Apr 26 2020 Erich Eickmeyer  - 3.9.0-1
  - New version 3.9.0


Package:  R-git2r-0.26.1-5.fc33
Old package:  R-git2r-0.26.1-4.fc32
Summary:  Provides Access to Git Repositories
RPMs: R-git2r
Size: 2.21 MiB
Size change:  -1.92 KiB
Changelog:
  * Mon Apr 27 2020 Igor Raits  - 0.26.1-5
  - Rebuild against libgit2 1.x


Package:  RBTools-1.0.3-1.fc33
Old package:  RBTools-1.0.2-6.fc32
Summary:  Tools for use with ReviewBoard
RPMs: RBTools
Size: 354.02 KiB
Size change:  10.66 KiB
Changelog:
  * Mon Apr 27 2020 Stephen Gallagher  - 1.0.3-1
  - Update to RBTools 1.0.3
  - https://www.reviewboard.org/docs/releasenotes/rbtools/1.0.3/


Package:  ansible-freeipa-0.1.10-1.fc33
Old package:  ansible-freeipa-0.1.9-1.fc33
Summary:  Roles and playbooks to deploy FreeIPA servers, replicas and 
clients
RPMs: ansible-freeipa
Size: 188.92 KiB
Size change:  9.58 KiB
Changelog:
  * Mon Apr 27 2020 Thomas Woerner  - 0.1.10-1
  - Update to version 0.1.10 with fixes and additional modules
https://github.com/freeipa/ansible-freeipa/releases/tag/v0.1.10


Package:  ckermit-9.0.302-22.fc33
Old package:  ckermit-9.0.302-20.fc31
Summary:  The quintessential all-purpose communications program
RPMs: ckermit
Size: 5.75 MiB
Size change:  154.42 KiB
Changelog:
  * Tue Jan 28 2020 Fedora Release Engineering  - 
9.0.302-21
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild

  * Mon Apr 27 2020 David Cantrell  - 9.0.302-22
  - Drop BR libtermcap-devel (#1799227)


Package:  cpuid-20200427-1.fc33
Old package:  cpuid-20200211-1.fc33
Summary:  Dumps information about the CPU(s)
RPMs: cpuid
Size: 128.02 KiB
Size change:  830 B
Changelog:
  * Mon Apr 27 2020 Fabian Affolter  - 20200427-1
  - Update to new upstream version 20200427 (rhbz#1828251)


Package:  cvc4-1.7-9.fc33
Old package:  cvc4-1.7-8.fc32
Summary:  Automatic theorem prover for SMT problems
RPMs: cvc4 cvc4-devel cvc4-java cvc4-libs cvc4-python3
Size: 41.93 MiB
Size change:  -1.74 MiB
Changelog:
  * Sat Apr 25 2020 Jerry James  - 1.7-9
  - Rebuild for cryptominisat 5.7.0
  - Add -cryptominisat patch to adapt to changes in 5.7.0


Package:  domoticz-2020.2-2.fc33
Old package:  domoticz-2020.1-2.fc33
Summary:  Open source Home Automation System
RPMs: domoticz
Size: 46.17 MiB
Size change:  267.98 KiB
Changelog:
  * Mon Apr 27 2020 Michael Cronenworth  - 2020.2-1
  - New stable release

  * Mon Apr 27 2020 Michael Cronenworth  - 2020.2-2
  - Link against older minizip


Package:  dummy-test-package-crested-0-324.fc33
Old package:  dummy-test-package-crested-0-308.fc33
Summary:  Dummy Test Package called Crested
RPMs: dummy-test-package-crested
Size: 28.87 KiB
Size change:  914 B
Changelog:
  * Sun Apr 26 2020 packagerbot  - 0-309
  - rebuilt

  * Sun Apr 26 2020 packagerbot  - 0-310

bodhi: stuck updates

2020-04-28 Thread Alexander Ploumistos
Hi,

Almost a week ago, I built cmpfit and fityk in side tags on F31, F32
and F33. While the builds for F33 moved directly to stable - as
expected - the other two got stuck for 4 days. I noticed that I could
push them manually to testing, which I did a little over two days ago,
but they seem to be stuck again, transitioning from pending to
testing. Updates for other packages I built around the same time and
later are already in testing. These are the updates in question:
https://bodhi.fedoraproject.org/updates/FEDORA-2020-8ee22c621f
https://bodhi.fedoraproject.org/updates/FEDORA-2020-cc2ae07056
Some help?

Best regards
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Feedback on default partitioning and encryption

2020-04-28 Thread Simo Sorce
On Tue, 2020-04-28 at 10:18 -0500, Michael Catanzaro wrote:
> Hi,
> 
> The Workstation Working Group would like to solicit feedback on three 
> outstanding Workstation issues:
> 
>  * fedora-workstation#54, "Default disk partitioning layout for 
> Workstation" [1][2]
>  * fedora-workstation#82, "encryption of user data (excludes system)" 
> [3][4]
>  * fedora-workstation#136, "encryption of system data (excludes user)" 
> [5][6]
> 
> We've been brainstorming on these issues for quite a while, and are 
> wondering if a wider audience might be able to help us decide what to 
> do. These are long threads, so I've posted summary comments [2][4][6] 
> in an attempt to summarize what I see as the most important points of 
> the previous discussion, but there's a lot of previous discussion and 
> it would be ideal to read or at least skim as much as possible to get a 
> feeling for what's already been considered before responding. I 
> encourage replies in the issues themselves, rather than on-list, to 
> keep discussion in one place. (An impossible expectation, I know)
> 
> Michael
> 
> [1] https://pagure.io/fedora-workstation/issue/54
> [2] https://pagure.io/fedora-workstation/issue/54#comment-644749
> [2] https://pagure.io/fedora-workstation/issue/82
> [4] https://pagure.io/fedora-workstation/issue/82#comment-644750
> [5] https://pagure.io/fedora-workstation/issue/136
> [6] https://pagure.io/fedora-workstation/issue/136#comment-644752


I commented on the first because I have direct experience over time.

I have a hard time commenting over the next 2 becuse it seem like the
probelm is not just technical, but there is no clear vision of whether
there is one and only one solution or if multiple solutions need to be
considered.

I personally prefer to encrypt the whole disk, because the machine I
care for encrypting is a laptop that can potentially be
stolen/displaced easily. However I do not care at all that there are
two different step (encryption password and separate account password),
and in fact I prefer to keep them separate because I join the laptop to
a separate IDM system so the account password is not managed by the
laptop.

I would love to have TPM integration, but just using TPM is useless for
my use case, because if they steal my laptop they also get my TPM
chip. TPM is cool only as an additional component but alone it is
somewhat useless. If clevis is used then you can compose the TPM *and*
a passphrase (or other item like a tang server or a phone/bluetooth
beacon).

That said, I am pretty sure there are cases of shared environment (say
media station at home) where users may like encryption but definitely
do not want to use 2 passwords. In that case using integrity to protect
read-only partitions and encryption only on personal homes makes a lot
more sense.

So in the end I do not believe you can come up with a single schema for
"workstation" unless you narrow down the scope of workstation to a
smaller set of use cases to the exclusion of the others.

Simo.

-- 
Simo Sorce
RHEL Crypto Team
Red Hat, Inc



___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


I say thanks for another release (F32)

2020-04-28 Thread sixpack13
Hallo

official Release statement isn't out yet, but I say thanks for another 
nice Fedora release to *all* people made F32 happen.

Running F32 since beta was released without bugs on an pure Intel box.
  - some very minor though, but ... -

nice !

stay healthy
-- 
sixpack13
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora-IoT-32-20200428.2 compose check report

2020-04-28 Thread Fedora compose checker
No missing expected images.

Failed openQA tests: 2/8 (x86_64)

Old failures (same test failed in Fedora-IoT-32-20200428.0):

ID: 588540  Test: x86_64 IoT-dvd_ostree-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/588540
ID: 588541  Test: x86_64 IoT-dvd_ostree-iso install_default_upload
URL: https://openqa.fedoraproject.org/tests/588541

Skipped non-gating openQA tests: 6 of 8
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Feedback on default partitioning and encryption

2020-04-28 Thread Michael Catanzaro

Hi,

The Workstation Working Group would like to solicit feedback on three 
outstanding Workstation issues:


* fedora-workstation#54, "Default disk partitioning layout for 
Workstation" [1][2]
* fedora-workstation#82, "encryption of user data (excludes system)" 
[3][4]
* fedora-workstation#136, "encryption of system data (excludes user)" 
[5][6]


We've been brainstorming on these issues for quite a while, and are 
wondering if a wider audience might be able to help us decide what to 
do. These are long threads, so I've posted summary comments [2][4][6] 
in an attempt to summarize what I see as the most important points of 
the previous discussion, but there's a lot of previous discussion and 
it would be ideal to read or at least skim as much as possible to get a 
feeling for what's already been considered before responding. I 
encourage replies in the issues themselves, rather than on-list, to 
keep discussion in one place. (An impossible expectation, I know)


Michael

[1] https://pagure.io/fedora-workstation/issue/54
[2] https://pagure.io/fedora-workstation/issue/54#comment-644749
[2] https://pagure.io/fedora-workstation/issue/82
[4] https://pagure.io/fedora-workstation/issue/82#comment-644750
[5] https://pagure.io/fedora-workstation/issue/136
[6] https://pagure.io/fedora-workstation/issue/136#comment-644752

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 32 is available now!

2020-04-28 Thread Ben Cotton
On Tue, Apr 28, 2020 at 11:10 AM  wrote:

>
> I noticed Jam is missing from the labs even though the ISO built and
> everything was fine for the beta. Is this an oversight?
>
> I already replied privately, but for public reference, this is an
oversight. I'll get it fixed shortly:
https://pagure.io/fedora-websites/issue/1031

-- 
Ben Cotton
He / Him / His
Senior Program Manager, Fedora & CentOS Stream
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


RE: Fedora 32 is available now!

2020-04-28 Thread erich
Hi Matthew,

> From: Matthew Miller 
> 
> It’s here! We’re proud to announce the release of Fedora 32.
> Thanks to the hard work of thousands of Fedora community members and
> contributors, we’re celebrating yet another on-time release!
> 
> Read the official announcement at:
> 
> * https://fedoramagazine.org/announcing-fedora-32/
> 

I noticed Jam is missing from the labs even though the ISO built and everything 
was fine for the beta. Is this an oversight?

Thanks,
Erich
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: What CPU extensions can we assume are available by arch?

2020-04-28 Thread Steven Munroe
>Kevin Kofler wrote:
>>Dave Love wrote:
>> As far as I can tell, it doesn't do dynamic dispatch.  Experimentally,
>> if you build with -mavx2 and run on ivybridge (or for skx and run on
>> haswell), the test code generates illegal instruction errors.  It's some
>> time ago since I looked at it, and I don't remember, but that's probably
>> why I thought it wasn't very useful, apart from only having x86 and arm
>> support.
>
>That's because it is a header-only library. It is either hard (and non-
>portable) or impossible to do dynamic dispatch in a header-only library,
>depending on the compiler and compiler version. (At least in past GCC
>versions, it was impossible. This may or may not have improved since.)
>Hence, dynamic dispatch, if desired, is left to the client application.
And
>I agree that this makes the library mostly useless.

Less useful then we would like. But could be part of the larger solution.
Properly structured they could help (not impede) building shared objects
with multiple implementations and dynamic selection for vector codes.

>You need an actual shared object with actual functions to do dynamic
>dispatch nicely and transparently.

I think the problem is lack of good documentation and examples. And perhaps
motivation. GLIBC has been doing this some time, but at the time is was
hard and difficult. But the compiler and runtime infrastructure has
improved since. Perhaps we can make this simple enough for wide application
to higher level libraries.

I am finding for the implementation of pveclib, that vector multiple
quadword (128-bit) precision multiplies are large enough, that you don't
want to expanded them in-line. But the vector multiply quadword itself and
the operations that implement it can and should be inline (for ppc64le). So
I was forced to cross that boundary.

Give me some time and I will have a documentation/examples that might
general useful.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora 32 is available now!

2020-04-28 Thread Matthew Miller
It’s here! We’re proud to announce the release of Fedora 32.
Thanks to the hard work of thousands of Fedora community
members and contributors, we’re celebrating yet another 
on-time release!

Read the official announcement at:

* https://fedoramagazine.org/announcing-fedora-32/

or just go ahead and grab it from: 

* https://getfedora.org/

-- 
Matthew Miller

Fedora Project Leader
___
announce mailing list -- annou...@lists.fedoraproject.org
To unsubscribe send an email to announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/annou...@lists.fedoraproject.org
___
announce mailing list -- annou...@lists.fedoraproject.org
To unsubscribe send an email to announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/annou...@lists.fedoraproject.org
___
devel-announce mailing list -- devel-annou...@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel-annou...@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


VMware NSX Engineer

2020-04-28 Thread uday field03
VMware NSX Engineer
The VMware NSX Engineer is an IT professional trained to effectively integrate 
and implement the VMware NSX security platform within a hybrid cloud 
infrastructure. The NSX Engineer must provide expertise in all aspects of 
network technology security for a VMware virtualized environment.

Virtual Cloud Network, built on VMware NSX technology, is a ubiquitous software 
layer from the data center to cloud to edge infrastructure. It provides a 
secure, consistent foundation that drives the business forward throughout the 
World.
https://www.fieldengineer.com/skills/vmware-nsx-engineer
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Teletypewriter Installer

2020-04-28 Thread uday field03
Teletypewriter Installer
A Teletypewriter (TTY) Installer is a professional who installs and repairs 
telegraphic transmitting and receiving equipment. A teletypewriter is known as 
an electromechanical typewriter meant for point-to-point communication. 
According to the U.S. Bureau of Labor and Statistics (BLS), a Teletypewriter 
Installer falls into the category of telecommunication equipment installer 
(telex).
https://www.fieldengineer.com/skills/teletypewriter-installer
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora-IoT-32-20200428.0 compose check report

2020-04-28 Thread Fedora compose checker
No missing expected images.

Failed openQA tests: 2/8 (x86_64)

New failures (same test not failed in Fedora-IoT-32-20200423.1):

ID: 588192  Test: x86_64 IoT-dvd_ostree-iso install_default@uefi
URL: https://openqa.fedoraproject.org/tests/588192
ID: 588193  Test: x86_64 IoT-dvd_ostree-iso install_default_upload
URL: https://openqa.fedoraproject.org/tests/588193

Skipped non-gating openQA tests: 6 of 8
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora-Cloud-31-20200428.0 compose check report

2020-04-28 Thread Fedora compose checker
No missing expected images.

Passed openQA tests: 1/1 (x86_64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora-Cloud-32-20200428.0 compose check report

2020-04-28 Thread Fedora compose checker
No missing expected images.

Soft failed openQA tests: 1/1 (x86_64)
(Tests completed, but using a workaround for a known bug)

ID: 588191  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/588191
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: What CPU extensions can we assume are available by arch?

2020-04-28 Thread Kevin Kofler
Dave Love wrote:
> As far as I can tell, it doesn't do dynamic dispatch.  Experimentally,
> if you build with -mavx2 and run on ivybridge (or for skx and run on
> haswell), the test code generates illegal instruction errors.  It's some
> time ago since I looked at it, and I don't remember, but that's probably
> why I thought it wasn't very useful, apart from only having x86 and arm
> support.

That's because it is a header-only library. It is either hard (and non-
portable) or impossible to do dynamic dispatch in a header-only library, 
depending on the compiler and compiler version. (At least in past GCC 
versions, it was impossible. This may or may not have improved since.) 
Hence, dynamic dispatch, if desired, is left to the client application. And 
I agree that this makes the library mostly useless.

You need an actual shared object with actual functions to do dynamic 
dispatch nicely and transparently.

Kevin Kofler
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Please keep an eye on AskFedora as we approach F32 release

2020-04-28 Thread Ankur Sinha
Hi folks,

We've already started to see Fedora 32 related questions on Ask Fedora.
May I please request you to look at AskFedora and answer questions when
possible, perhaps when you take short breaks from work?

https://ask.fedoraproject.org/

-- 
Thanks,
Regards,
Ankur Sinha "FranciscoD" (He / Him / His) | 
https://fedoraproject.org/wiki/User:Ankursinha
Time zone: Europe/London


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora-Cloud-30-20200428.0 compose check report

2020-04-28 Thread Fedora compose checker
No missing expected images.

Passed openQA tests: 1/1 (x86_64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: RFC: Feature macros (aka USE flags)

2020-04-28 Thread Panu Matilainen

On 4/28/20 10:53 AM, Nicolas Mailhot via devel wrote:

Le mardi 28 avril 2020 à 08:43 +0200, Petr Pisar a écrit :

On Mon, Apr 27, 2020 at 04:33:52PM +0200, Petr Šabata wrote:


%_use_ncurses %{lua:
if rpm.expand("%{name}") == "yourpackage1"
   or rpm.expand("%{name}") == "yourpackage2" then
   print(rpm.expand("%{bcond_with foo}%{with foo}"))
else
   print(rpm.expand("%{bcond_without foo}%{with foo}"))
end
}


%{name} use in macro logic is unsafe because %{name} does not exist in
the preamble before the Name: line, and the Name: line does not exist
before you start declaring package headers.


Just to clarify, this is true of all versions of rpm.


Once you’re in package
header declaration mode rpm parser behaviour will prevent you from
doing logic between headers blocks, so it all needs interleaving, which
ends un not possible sanely in any semi-complex spec file.

The rpm parser will now insult you with messages like
warning: undefined macro(s) in %{_sourcedir}: 
/var/lib/builder/rpmbuild/SOURCES/%{name}

if you try to use %{name} at the srpm level.

This is an rpm 4.15 change
https://src.fedoraproject.org/rpms/redhat-rpm-config/pull-request/83



And that's a redhat-rpm-config pull-request, which doesn't really 
explain a thing.


The actual background is in this bug: 
https://bugzilla.redhat.com/show_bug.cgi?id=1820349


- Panu -
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: RFC: Feature macros (aka USE flags)

2020-04-28 Thread Panu Matilainen

On 4/27/20 5:33 PM, Petr Šabata wrote:

On Mon, Apr 27, 2020 at 4:04 PM Petr Pisar  wrote:


On Mon, Apr 27, 2020 at 01:19:29PM +0200, Petr Šabata wrote:

Details in the gist:
https://gist.github.com/contyk/0f0585c57976ca18a293b3566408


I'm very interested in overriding the global settings:

(1) Is it possible to override them from a modulemd when building a module?

I guess the asnswer is define %_with_ and %_without_ macros in
a buildopts/rpms/macros section of the module. Could elaborate more
the "Compatibility with RPM's --with & --without options" section?


Yes, you can, and that's exactly how you would do that.

Currently the macros as defined with bconds, in the basic form for
enabled by default:

%_with_foo %{bcond_without foo}%{with foo}


Please note hat the RPM options and the macros have three states (true, false,
undefined) and %_with_foo 0 does not turn %bcond_without foo into false.
I don't ask about preserving a compatibility with this silly semantics, but
some clarification will be needed if this proposal becomes approved.


It might not work if with/without is set with these macros directly as
it is written right now. I'll have to test that.


(2) Is it possible to override them on a per-package basis?

E.g. I have ncurses in global.yaml:

 - name: ncurses
   description: Add support for ncurses.
   enabled: true

and I have plenty of packages that use the ncurses feature in my module. What
should I write to my modulemd so that "ncurses" feature for "pcre" package is
disabled, but all the other packages have it enabled? Or is it a completelly
illed request to have the same feature enabled at one package and disabled on
another one?


It is and that's actually how the local is implemented. 


Not entirely sure if we're talking about the same "local" here but I 
spotted this in the use-macros.spec:


# %%global local

for source in string.gmatch(rpm.expand("%{?local}"), "[%w_-]+")

Please avoid taking over such broadly generic names as "local" in the 
global macro namespace, rpm might well want to use %local as a macro 
primitive (opposite of %global) one day.



It extends the
basic definitions with %{name} checks like this:

%_use_ncurses %{lua:
if rpm.expand("%{name}") == "yourpackage1"
   or rpm.expand("%{name}") == "yourpackage2" then
   print(rpm.expand("%{bcond_with foo}%{with foo}"))
else
   print(rpm.expand("%{bcond_without foo}%{with foo}"))
end
}


Danger Will Robinson.

Such checks will on %{name} will only work after the Name: tag in the 
spec, which is not obvious from the outset, and there's a large set of 
packages in Fedora that only declare the name towards the end of the 
spec preamble.


- Panu -


I know it's not very user friendly. Maybe there's a better way that
doesn't blow up on recursive macro definition.

P
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: RFC: Feature macros (aka USE flags)

2020-04-28 Thread Nicolas Mailhot via devel
Le mardi 28 avril 2020 à 08:43 +0200, Petr Pisar a écrit :
> On Mon, Apr 27, 2020 at 04:33:52PM +0200, Petr Šabata wrote:
> > 
> > %_use_ncurses %{lua:
> > if rpm.expand("%{name}") == "yourpackage1"
> >   or rpm.expand("%{name}") == "yourpackage2" then
> >   print(rpm.expand("%{bcond_with foo}%{with foo}"))
> > else
> >   print(rpm.expand("%{bcond_without foo}%{with foo}"))
> > end
> > }

%{name} use in macro logic is unsafe because %{name} does not exist in
the preamble before the Name: line, and the Name: line does not exist
before you start declaring package headers.

Once you’re in package
header declaration mode rpm parser behaviour will prevent you from
doing logic between headers blocks, so it all needs interleaving, which
ends un not possible sanely in any semi-complex spec file.

The rpm parser will now insult you with messages like
warning: undefined macro(s) in %{_sourcedir}: 
/var/lib/builder/rpmbuild/SOURCES/%{name}

if you try to use %{name} at the srpm level.

This is an rpm 4.15 change
https://src.fedoraproject.org/rpms/redhat-rpm-config/pull-request/83

Regards,

-- 
Nicolas Mailhot
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org