[EPEL-devel] Fedora EPEL 7 updates-testing report

2022-12-14 Thread updates
The following Fedora EPEL 7 Security updates need testing:
 Age  URL
  10  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-10049c7b14   
libbsd-0.11.7-2.el7
   4  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-0b26ab3924   
xrdp-0.9.21-1.el7


The following builds have been pushed to Fedora EPEL 7 updates-testing

eggdrop-1.9.4-1.el7

Details about builds:



 eggdrop-1.9.4-1.el7 (FEDORA-EPEL-2022-9f1012a19f)
 World's most popular Open Source IRC bot

Update Information:

# Eggdrop v1.9.4  ## General changes   - Fixed a DNS bug causing Eggdrop to
often hang on DCC or telnet connections   - BETA: Added `-systemd` option to
`autobotchk` script to restart Eggdrop via systemd instead of cron   - Reverted
matchattr match syntax to previous functionality. Matching against `-` as a flag
will once again successfully match against `no` flags, instead of returning an
error.   - Fixed some inaccurate log messages   - Fixed some format specifiers
that could cause crashes in certain situations   - Fixed logging of `TAGMSG`
messages   - Fixed unspecified behavior of `freeaddrinfo()` on some BSD systems
## Tcl API changes   - Moved the `gotmsg` function back as a raw bind. It was
inadvertantly moved to a rawt bind in 1.9.3, causing issuse with scripts
attempting to unbind this internal reference

ChangeLog:

* Thu Dec 15 2022 Robert Scheck  1.9.4-1
- Upgrade to 1.9.4 (#2142049)

References:

  [ 1 ] Bug #2142049 - eggdrop-1.9.4 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2142049


___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Add Fedora Auto Firstboot Services to desktop variants (System-Wide Change proposal)

2022-12-14 Thread Michael Catanzaro via devel
> On Thu, 2022-12-15 at 00:11 +, Michael Catanzaro via devel wrote:
> 
> Well, except that we ship Firefox in the default OS image and to make
> that play video, overlaying openh264 is *exactly* what's needed.

Ah, drat... well there's not a lot of great options, then. We can (a) change it 
to use Fedora Flatpak and convince Cisco to host an extension, or (b) give up 
on the goal of not having any default overlays, or (c) give up on users being 
able to watch most videos. Please let's not do (c)?
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Add Fedora Auto Firstboot Services to desktop variants (System-Wide Change proposal)

2022-12-14 Thread Adam Williamson
On Thu, 2022-12-15 at 00:11 +, Michael Catanzaro via devel wrote:
> For Fedora Flatpaks, the solution would have to be Flatpak extensions
> hosted by Cisco: overlaying OpenH264 on the host system won't
> actually accomplish anything useful. Even if you need it for a
> command line tool like ffmpeg, you're probably using a toolbx
> container for that, so again it's just not nearly so important on the
> host system.

Well, except that we ship Firefox in the default OS image and to make
that play video, overlaying openh264 is *exactly* what's needed.

That sucks, though. It needs fixing somehow. Hopefully not by just
telling people to use the upstream Flathub Firefox, because I
appreciate the work our maintainer does to provide a build with (IMHO)
superior choices.
-- 
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Add Fedora Auto Firstboot Services to desktop variants (System-Wide Change proposal)

2022-12-14 Thread Michael Catanzaro via devel
> One solution to reduce the time taken by client side layering and those 
> issues mentioned
> above is to move the package overrides back to the server side by using a 
> layering
> approach similar to the one used to build containers. This is the goal of 
> this change:
> https://fedoraproject.org/wiki/Changes/OstreeNativeContainerStable. It 
> enables users to
> make custom builds of Silverblue/Kinoite with their own selection of packages 
> and changes
> and then to distribute them as an image to their systems, getting the full 
> benefits of
> pure image based updates back if they don't do any local changes anymore.

We can't do that on Fedora infrastructure, though, because we cannot distribute 
OpenH264. It would have to be done by Cisco. Seems like a no-go.

But it might be OK to just not run fedora-autofirstboot for Silverblue/Kinoite. 
Thing is, system multimedia codecs are really a lot less important on 
Silverblue/Kinoite than they are on traditional desktops. What users really 
care most about is whether their _applications_ can play videos. That's a 
solved problem for anything using Flathub. For Fedora Flatpaks, the solution 
would have to be Flatpak extensions hosted by Cisco: overlaying OpenH264 on the 
host system won't actually accomplish anything useful. Even if you need it for 
a command line tool like ffmpeg, you're probably using a toolbx container for 
that, so again it's just not nearly so important on the host system.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Add Fedora Auto Firstboot Services to desktop variants (System-Wide Change proposal)

2022-12-14 Thread Timothée Ravier
The main issue with this change for Silverblue/Kinoite is that this introduces 
client side layering by default for all users.

To understand why this is not a good idea, I need to recap a few things: how 
rpm-ostree client side layering works, the general goal behind rpm-ostree and 
image based updates and what we're trying to do in 
https://fedoraproject.org/wiki/Changes/OstreeNativeContainerStable.

First, let's start with rpm-ostree client side layering.

When you update a "pristine" Silverblue system, the following happens:
1. rpm-ostree looks into the remote ostree repo for the latest version commit 
and downloads all the files needed for it into the local repo.
2. Once this is done, it creates a new deployments, which is a new copy of /usr 
made mostly of hardlinks to the repo.
3. Then you can reboot and you're done.

When you enable client side layering, because you want to change something in 
the image, remove a package, add a new one, etc., the following happens:
1. rpm-ostree has to fetch the needed files into the repo like in the previous 
case (step 1).
2. But then, instead of creating directly creating a new deployment, it creates 
a temporary one with the content of the latest commit.
3. From this temporary deployment, rpm-ostree is able to fetch all RPM metadata 
from the Fedora repos, then resolve the dependencies for the 
added/replaced/removed packages and download the RPMs as needed.
4. It will then create a temporary writable overlay on top of the temporary 
deployment, perform the package installations, replacements, removals and 
optionally rebuild the initrd.
5. Then it will process the files in this overlay to create a new ostree commit.
6. Finally, it will deploy this new commit into a new deployment to be used 
after a reboot.

Given the additional steps required when client side layering is used, updates 
will take longer to be downloaded, prepared and installed and will require more 
CPU and memory.

Additionally, any operation done on the temporary deployment may fail: missing 
dependencies, conflicts, wrong package signatures, etc.

The idea behind rpm-ostree hybrid model is that you don't have to manage 
package conflicts, installation, etc. on the client side and instead rely on 
the server composing a working image for you. With client side layering, this 
guarantee goes away and the user will have to intervene when it fails.

This is the main reason why we recommend to be careful with client side 
layering: it may fail and you'll have to figure out why, just like you need to 
figure out dependency resolutions issues on a classic DNF based system.

The main goal of Silverblue is to get rid of this issue in the first place by 
relying only on images by default. Users may choose to override things in the 
image but they would have to do that on purpose, via the command line, 
hopefully knowing that they are now responsible when something fails.

Note that neither GNOME Software nor Plasma Discover support managing client 
side layered packages right now. GNOME Sofware pre-downloads packages, 
essentially making the first step invisible to the user and only then notifies 
the user to trigger the 2nd and 3rd steps. Plasma Discover is not yet capable 
of doing that but I'm working on it.

So yes, client side layering is fully supported in Silverblue/Kinoite as it 
enables debugging, testing, workarounds, etc. but we don't want to expose users 
to it by default as this is not a good user experience.

One solution to reduce the time taken by client side layering and those issues 
mentioned above is to move the package overrides back to the server side by 
using a layering approach similar to the one used to build containers. This is 
the goal of this change: 
https://fedoraproject.org/wiki/Changes/OstreeNativeContainerStable. It enables 
users to make custom builds of Silverblue/Kinoite with their own selection of 
packages and changes and then to distribute them as an image to their systems, 
getting the full benefits of pure image based updates back if they don't do any 
local changes anymore.

I hope that explained things in more details.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Meeting for 2022-12-14

2022-12-14 Thread Stephen Smoogen
[2022-12-14-16:47]  Meeting ended Wed Dec 14 21:47:14 2022 UTC.
Information about Zodbot's MeetBot at
https://fedoraproject.org/wiki/Zodbot#Meeting_Functions .
[2022-12-14-16:47]  Minutes:
https://meetbot.fedoraproject.org/fedora-meeting/2022-12-14/epel.2022-12-14-20.59.html
[2022-12-14-16:47]  Minutes (text):
https://meetbot.fedoraproject.org/fedora-meeting/2022-12-14/epel.2022-12-14-20.59.txt
[2022-12-14-16:47]  Log:
https://meetbot.fedoraproject.org/fedora-meeting/2022-12-14/epel.2022-12-14-20.59.log.html

Next meeting is 2022-12-21

-- 
Stephen Smoogen, Red Hat Automotive
Let us be kind to one another, for most of us are fighting a hard battle.
-- Ian MacClaren
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Fedora CoreOS Meeting Minutes 2022-12-14

2022-12-14 Thread Dusty Mabe
Minutes: 
https://meetbot.fedoraproject.org/fedora-meeting-1/2022-12-14/fedora_coreos_meeting.2022-12-14-16.31.html
Minutes (text): 
https://meetbot.fedoraproject.org/fedora-meeting-1/2022-12-14/fedora_coreos_meeting.2022-12-14-16.31.txt
Log: 
https://meetbot.fedoraproject.org/fedora-meeting-1/2022-12-14/fedora_coreos_meeting.2022-12-14-16.31.log.html


#fedora-meeting-1: fedora_coreos_meeting



Meeting started by dustymabe at 16:31:06 UTC. The full logs are
available at
https://meetbot.fedoraproject.org/fedora-meeting-1/2022-12-14/fedora_coreos_meeting.2022-12-14-16.31.log.html
.



Meeting summary
---
* roll call  (dustymabe, 16:31:10)

* meetings for the remainder of 2022  (dustymabe, 16:36:53)
  * AGREED: the remaining meetings of the year, scheduled for 12/21 and
12/28 are canceled due to the holidays  (dustymabe, 16:38:49)

* tracker: Fedora 38 changes considerations  (dustymabe, 16:40:04)
  * LINK: https://github.com/coreos/fedora-coreos-tracker/issues/1357
(dustymabe, 16:40:13)
  * LINK: https://pagure.io/fedora-autofirstboot/issue/8   (travier,
16:58:06)
  * LINK:
https://github.com/coreos/fedora-coreos-tracker/labels/F37-Changes
(dustymabe, 17:16:01)

* open floor  (dustymabe, 17:18:12)
  * we will still attempt to put out a triple release on the week of the
26th  (dustymabe, 17:18:58)
  * the console changes finally landed in stable (today)
https://github.com/coreos/fedora-coreos-tracker/issues/567
(dustymabe, 17:20:11)
  * GCP SEV support landed in the triple release today too:
https://github.com/coreos/fedora-coreos-tracker/issues/1202
(dustymabe, 17:20:50)
  * LINK:

https://communityblog.fedoraproject.org/fedora-linux-38-development-schedule/
(dustymabe, 17:24:13)

Meeting ended at 17:26:04 UTC.




Action Items






Action Items, by person
---
* **UNASSIGNED**
  * (none)




People Present (lines said)
---
* dustymabe (116)
* jlebon (51)
* travier (39)
* zodbot (23)
* walters (8)
* ravanelli (2)
* gursewak (1)
* aaradhak (1)




Generated by `MeetBot`_ 0.4

.. _`MeetBot`: https://fedoraproject.org/wiki/Zodbot#Meeting_Functions
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[rpms/perl-Mail-IMAPTalk] PR #1: Update license to SPDX format

2022-12-14 Thread Michal Josef Špaček

mspacek merged a pull-request against the project: `perl-Mail-IMAPTalk` that 
you are following.

Merged pull-request:

``
Update license to SPDX format
``

https://src.fedoraproject.org/rpms/perl-Mail-IMAPTalk/pull-request/1
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Re: Updating tox to 4 in EPEL 9

2022-12-14 Thread Andrew C Aitchison

On Wed, 14 Dec 2022, Stephen Smoogen wrote:


On Wed, 14 Dec 2022 at 09:45, Miro Hrončok  wrote:


Hello folks.

A new major version of tox was released. The bump form version 3 to
version 4
should be flawless to users but breaks all the plugins that have not been
updated to the new API yet.

I would like to avoid the need to maintain tox 3 in EPEL9 for many years
after
upstream abandoned it (they have no intention to do maintenance releases
for
tox 3.x).

We are currently upgrading to tox 4 in Fedora Rawhide. When the dust
settles
I'd like to have the possibility to update it in EPEL too.

One way to do it is to package a new tox4 component in EPEL 9 (and make it
conflict with tox < 4) and keep the old tox around until it breaks (the
breakage might mean it no longer supports a newly added Python version
being
added to RHEL 9).



How does this sound?

Add a tox4 which conflicts with tox3 and tox. Then release a tox3 which
replaces tox and has a prominent END-OF-LIFE file and possibly in the Info
that this is the last release of tox3 and it will be removed from EPEL
around RHEL-9.2. Then set tox3's shelf-life to 2023-07-01 in pdc. (move
dates to what you want). Then it goes and everyone knows why it went.


Should tox3 and tox4 *provide* tox ?

--
Andrew C. Aitchison  Kendal, UK
   and...@aitchison.me.uk___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Curious how Upstream Release Monitoring works

2022-12-14 Thread Michal Konecny
There is a plan to automate that when you request a new package in 
Fedora [0],

but it's still work in progress.

The notification settings are now explained in the-new-hotness 
documentation [1]

with new coming in upcoming release of src.fedoraproject.org.

Michal

[0] - https://pagure.io/releng/issue/10110
[1] - 
https://the-new-hotness.readthedocs.io/en/stable/user-guide.html#notifications-settings


On 14. 12. 22 16:44, Sérgio Basto wrote:

On Wed, 2022-12-14 at 09:36 -0600, Ron Olson wrote:

Hey all-

I’m curious how Upstream Monitoring works; I got a BZ filed that
Swift 5.7.2 is available, which I’m building now, but what surprised
me was how fast the new version was detected and brought to my
attention. Does it use The New Hotness? I set that up awhile ago but
I don’t think it files BZ tickets (and I must not have it set up
correctly as it hasn’t notified me about any releases for the past
year).

To be clear this isn’t a complaint, if anything it’s an awesome
feature and I’m just curious what the mechanism is that makes it
work.


Hi , what package is concrete ?
you need mapping in https://release-monitoring.org/


for example https://release-monitoring.org/project/6221/ and in
src.fedoraproject.org you need set scratch builds
https://src.fedoraproject.org/rpms/smb4k


Ron
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines:
https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it:
https://pagure.io/fedora-infrastructure/new_issue

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Curious how Upstream Release Monitoring works

2022-12-14 Thread Sérgio Basto
On Wed, 2022-12-14 at 09:36 -0600, Ron Olson wrote:
> Hey all-
> 
> I’m curious how Upstream Monitoring works; I got a BZ filed that
> Swift 5.7.2 is available, which I’m building now, but what surprised
> me was how fast the new version was detected and brought to my
> attention. Does it use The New Hotness? I set that up awhile ago but
> I don’t think it files BZ tickets (and I must not have it set up
> correctly as it hasn’t notified me about any releases for the past
> year).
> 
> To be clear this isn’t a complaint, if anything it’s an awesome
> feature and I’m just curious what the mechanism is that makes it
> work.


Hi , what package is concrete ? 
you need mapping in https://release-monitoring.org/


for example https://release-monitoring.org/project/6221/ and in
src.fedoraproject.org you need set scratch builds
https://src.fedoraproject.org/rpms/smb4k

> Ron
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines:
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue

-- 
Sérgio M. B.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Curious how Upstream Release Monitoring works

2022-12-14 Thread Fabio Valentini
On Wed, Dec 14, 2022 at 4:38 PM Ron Olson  wrote:
>
> Hey all-
>
> I’m curious how Upstream Monitoring works; I got a BZ filed that Swift 5.7.2 
> is available, which I’m building now, but what surprised me was how fast the 
> new version was detected and brought to my attention. Does it use The New 
> Hotness? I set that up awhile ago but I don’t think it files BZ tickets (and 
> I must not have it set up correctly as it hasn’t notified me about any 
> releases for the past year).
>
> To be clear this isn’t a complaint, if anything it’s an awesome feature and 
> I’m just curious what the mechanism is that makes it work.

There's several components involved to make this work:

- anitya, which powers release-monitoring.org: this is where you need
to set up the project and set the Fedora package name for it, and
which crawls projects for new versions regularly
- the-new-hotness: the service which files bugs for new versions
detected by anitya, if "Monitoring" is enabled for a package on
src.fedoraproject.org

I wonder why "(and I must not have it set up correctly as it hasn’t
notified me about any releases for the past year)." happened, though.

Fabio
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Curious how Upstream Release Monitoring works

2022-12-14 Thread Ron Olson
Hey all-

I’m curious how Upstream Monitoring works; I got a BZ filed that Swift 5.7.2 is 
available, which I’m building now, but what surprised me was how fast the new 
version was detected and brought to my attention. Does it use The New Hotness? 
I set that up awhile ago but I don’t think it files BZ tickets (and I must not 
have it set up correctly as it hasn’t notified me about any releases for the 
past year).

To be clear this isn’t a complaint, if anything it’s an awesome feature and I’m 
just curious what the mechanism is that makes it work.

Ron
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Re: Updating tox to 4 in EPEL 9

2022-12-14 Thread Stephen Smoogen
On Wed, 14 Dec 2022 at 09:45, Miro Hrončok  wrote:

> Hello folks.
>
> A new major version of tox was released. The bump form version 3 to
> version 4
> should be flawless to users but breaks all the plugins that have not been
> updated to the new API yet.
>
> I would like to avoid the need to maintain tox 3 in EPEL9 for many years
> after
> upstream abandoned it (they have no intention to do maintenance releases
> for
> tox 3.x).
>
> We are currently upgrading to tox 4 in Fedora Rawhide. When the dust
> settles
> I'd like to have the possibility to update it in EPEL too.
>
> One way to do it is to package a new tox4 component in EPEL 9 (and make it
> conflict with tox < 4) and keep the old tox around until it breaks (the
> breakage might mean it no longer supports a newly added Python version
> being
> added to RHEL 9).
>
>
How does this sound?

Add a tox4 which conflicts with tox3 and tox. Then release a tox3 which
replaces tox and has a prominent END-OF-LIFE file and possibly in the Info
that this is the last release of tox3 and it will be removed from EPEL
around RHEL-9.2. Then set tox3's shelf-life to 2023-07-01 in pdc. (move
dates to what you want). Then it goes and everyone knows why it went.




> Is that a sensible approach for EPEL?
>
> --
> Miro Hrončok
> --
> Phone: +420777974800
> IRC: mhroncok
> ___
> epel-devel mailing list -- epel-devel@lists.fedoraproject.org
> To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>


-- 
Stephen Smoogen, Red Hat Automotive
Let us be kind to one another, for most of us are fighting a hard battle.
-- Ian MacClaren
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[rpms/perl-Mail-IMAPTalk] PR #1: Update license to SPDX format

2022-12-14 Thread Michal Josef Špaček

mspacek opened a new pull-request against the project: `perl-Mail-IMAPTalk` 
that you are following:
``
Update license to SPDX format
``

To reply, visit the link below
https://src.fedoraproject.org/rpms/perl-Mail-IMAPTalk/pull-request/1
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Updating tox to 4 in EPEL 9

2022-12-14 Thread Miro Hrončok

Hello folks.

A new major version of tox was released. The bump form version 3 to version 4 
should be flawless to users but breaks all the plugins that have not been 
updated to the new API yet.


I would like to avoid the need to maintain tox 3 in EPEL9 for many years after 
upstream abandoned it (they have no intention to do maintenance releases for 
tox 3.x).


We are currently upgrading to tox 4 in Fedora Rawhide. When the dust settles 
I'd like to have the possibility to update it in EPEL too.


One way to do it is to package a new tox4 component in EPEL 9 (and make it 
conflict with tox < 4) and keep the old tox around until it breaks (the 
breakage might mean it no longer supports a newly added Python version being 
added to RHEL 9).


Is that a sensible approach for EPEL?

--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Playing with cross-compilers for FPC

2022-12-14 Thread Artur Frenszek-Iwicki
Hey all,

I've been maintaining the Free Pascal Compiler [0] in Fedora for some time now.
A couple of times I played around with the idea of building and packaging FPC
cross-compilers. Lately I gave it another go and arrived and some quite
workable results. If you're interested, you can check them out in COPR. [1]

During the process of packaging the cross-compilers, there were a couple of
issues I came across and wanted to ask for some opinion/guidance.


1. Separate package or not
The most basic issue would be whether the cross-compilers should be built from
a separate SRPM, or be a part of the main package. For both possibilities,
I see some pros and cons.

Cross-compilers in one package:
+ Everything's in one place
+ The cross-compilers are built from the same source
- Main .spec file becomes way more complicated
- Package for native compiler can get blocked by cross-compilers not building

Separate package for cross-compilers:
+ The spec for the native compiler can remain relatively simple
+ Worst case scenario, we can ship an updated version of the native compiler
  and fix cross-compiler errors later
- A lot of duplication between native and cross .spec file
- Need to track sources/patches from main package in the cross package,
  comes with a risk of things de-syncing

Personally I'd favour the "separate package" approach.


2. Naming - base name
Yes, the eternal problem. So far, I went with naming the cross-compiler package
"fpcross", which reflects what upstream does - e.g. if the native compiler
for aarch64 is "ppca64", the cross-compiler is "ppcrossa64".

I wonder if using "fpc-cross" would be more readable. Yet another solution
would be to hide the native/cross distinction and use "%package -n" to build
cross-compilers with just the "fpc-" prefix.


3. Naming - per arch
So far, for simplicity, I went with naming the cross-compilers
"fpcross-${ARCH}", e.g. "fpcross-aarch64", with packages for MS Windows
being named "fpcross-win32" and "fpcross-win64". Looking at some other
packages (like binutils), I wonder if it would be better to use the arch+os
format, like "fpcross-i386-linux" and "fpcross-i386-win32".


4. Configuration
FPC uses a configuration file, located at /etc/fpc.cfg (it can be overridden
by a user creating a file at ~/.fpc.cfg, but that's beside the point).
Inside said config file, there's this problematic bit:

#IFDEF CPU64
-Fu/usr/lib64/fpc/$fpcversion/units/$fpctarget
-Fu/usr/lib64/fpc/$fpcversion/units/$fpctarget/*
-Fu/usr/lib64/fpc/$fpcversion/units/$fpctarget/rtl
#ELSE
-Fu/usr/lib/fpc/$fpcversion/units/$fpctarget
-Fu/usr/lib/fpc/$fpcversion/units/$fpctarget/*
-Fu/usr/lib/fpc/$fpcversion/units/$fpctarget/rtl
#ENDIF

This tells the compiler that, when compiling for 64-bit targets, it should
look for unit files in "/usr/lib64/fpc/...", and when compiling for 32-bit
targets, to look in "/usr/lib/fpc/...". The problem here is that this is
based on the *target* architecture, not the *host* architecture, so
cross-compiling from x86_64 for i386 will have the compiler look in /usr/lib/
instead of /usr/lib64/. Which brings the following dilemma:

a) Install stuff required to cross-compile for 32-bit targets in /usr/lib/,
   instead of the more appropriate /usr/lib64/. 
   
b) Instead of using the default config file, ship a custom one that makes
   the compiler always look in /usr/lib64/ on 64-bit arches
   and /usr/lib/ on 32-bit arches.

I think that from a packaging perspective, b) would be cleaner,
though it adds yet one more thing that needs maintaining.


Let me know what you think.

Cheers,
A.FI.

[0] https://src.fedoraproject.org/rpms/fpc
[1] https://copr.fedorainfracloud.org/coprs/suve/fpcross/
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Re: libssh2 epel vs rhel-8-for-x86_64-appstream-rpms

2022-12-14 Thread Stephen Smoogen
On Tue, 13 Dec 2022 at 20:18, Maxwell G via epel-devel <
epel-devel@lists.fedoraproject.org> wrote:

> On Tue Dec 13, 2022 at 16:47 +0100, Leon Fauster via epel-devel wrote:
>
> Hi Leon,
>
> > I noticed that on a RHEL8 workstation the deprecated and removed package
> > from EL8.0 - libssh2, does not get substituted by the package from epel:
> >
> > libssh2-1.8.0-8.module+el8.0.0+4084+cceb9f44.1.x86_64
> > vs
> > libssh2-1.9.0-5.el8.x86_64
> >
> > only possible with
> >
> >   yum update libssh2 --disablerepo=rhel-8-for-x86_64-appst*
> >
> > is this intentional?
> >
> > yum distrosync
> >
> > tries to install the obsolete version 1.8.0 again.
> >
> > How to solve this conflict? Its seems not to be a "module" problem
> > otherwise it would not install the epel version at all, right?
>
> Have you tried adding `module_hotfixes=true` [1] to the EPEL repo
> configuration file (/etc/yum.repos.d/epel.repo IIRC)?
>
>
> [1]:
> https://dnf.readthedocs.io/en/latest/modularity.html#hotfix-repositories


It isn't going to help. The libssh2-1.8.0 is a dead package and no longer
meant to be shipped in any module.

-- 
Stephen Smoogen, Red Hat Automotive
Let us be kind to one another, for most of us are fighting a hard battle.
-- Ian MacClaren
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Fedora rawhide compose report: 20221214.n.0 changes

2022-12-14 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20221213.n.0
NEW: Fedora-Rawhide-20221214.n.0

= SUMMARY =
Added images:1
Dropped images:  5
Added packages:  4
Dropped packages:1
Upgraded packages:   190
Downgraded packages: 0

Size of added packages:  5.31 GiB
Size of dropped packages:1.99 MiB
Size of upgraded packages:   3.20 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   11.60 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =
Image: LXDE live x86_64
Path: Spins/x86_64/iso/Fedora-LXDE-Live-x86_64-Rawhide-20221214.n.0.iso

= DROPPED IMAGES =
Image: Server dvd s390x
Path: Server/s390x/iso/Fedora-Server-dvd-s390x-Rawhide-20221213.n.0.iso
Image: Container_Base docker s390x
Path: 
Container/s390x/images/Fedora-Container-Base-Rawhide-20221213.n.0.s390x.tar.xz
Image: Container_Minimal_Base docker s390x
Path: 
Container/s390x/images/Fedora-Container-Minimal-Base-Rawhide-20221213.n.0.s390x.tar.xz
Image: Everything boot s390x
Path: 
Everything/s390x/iso/Fedora-Everything-netinst-s390x-Rawhide-20221213.n.0.iso
Image: Server boot s390x
Path: Server/s390x/iso/Fedora-Server-netinst-s390x-Rawhide-20221213.n.0.iso

= ADDED PACKAGES =
Package: java-latest-openjdk-portable-1:19.0.1.0.10-2.rolling.fc38
Summary: OpenJDK 19 Runtime Environment portable edition
RPMs:java-latest-openjdk-portable java-latest-openjdk-portable-devel 
java-latest-openjdk-portable-devel-fastdebug 
java-latest-openjdk-portable-devel-slowdebug 
java-latest-openjdk-portable-fastdebug java-latest-openjdk-portable-slowdebug 
java-latest-openjdk-portable-static-libs 
java-latest-openjdk-portable-static-libs-fastdebug 
java-latest-openjdk-portable-static-libs-slowdebug
Size:5.06 GiB

Package: nodejs16-1:16.18.1-5.fc38
Summary: JavaScript runtime
RPMs:nodejs16 nodejs16-devel nodejs16-docs nodejs16-full-i18n nodejs16-libs 
nodejs16-npm v8-9.4-devel
Size:123.94 MiB

Package: nodejs18-1:18.12.1-5.fc38
Summary: JavaScript runtime
RPMs:nodejs nodejs-devel nodejs-docs nodejs-full-i18n nodejs-libs 
nodejs-npm v8-10.2-devel
Size:127.03 MiB

Package: rust-pep440-0.2.0-1.fc38
Summary: Parse and compare Python PEP440 style version numbers
RPMs:rust-pep440+default-devel rust-pep440-devel
Size:49.29 KiB


= DROPPED PACKAGES =
Package: spectral-0-18.20201224gitfba0df0.fc37
Summary: Glossy cross-platform Matrix client
RPMs:spectral
Size:1.99 MiB


= UPGRADED PACKAGES =
Package:  annobin-10.95-1.fc38
Old package:  annobin-10.94-1.fc38
Summary:  Annotate and examine compiled binary files
RPMs: annobin-annocheck annobin-docs annobin-libannocheck 
annobin-plugin-clang annobin-plugin-gcc annobin-plugin-llvm
Size: 4.85 MiB
Size change:  -14.86 KiB
Changelog:
  * Mon Dec 12 2022 Nick Clifton   - 10.95-1
  - Annocheck: Avoid using debug filename when parsing notes in a debuginfo 
file.  (#2152280)


Package:  apptainer-1.1.4-1.fc38
Old package:  apptainer-1.1.3-2.fc38
Summary:  Application and environment virtualization
RPMs: apptainer apptainer-suid
Size: 106.46 MiB
Size change:  13.66 KiB
Changelog:
  * Tue Dec 13 2022 Dave Dykstra  - 1.1.4
  - Update to upstream 1.1.4.


Package:  ara-1.6.1-1.fc38
Old package:  ara-1.5.7-5.fc37
Summary:  Records Ansible playbooks and makes them easier to understand and 
troubleshoot
RPMs: ara-doc python3-ara python3-ara+mysql python3-ara+postgresql 
python3-ara+server python3-ara-tests
Added RPMs:   python3-ara+mysql python3-ara+postgresql python3-ara+server
Dropped RPMs: ara python3-ara-server
Size: 15.60 MiB
Size change:  7.33 MiB
Changelog:
  * Tue Dec 06 2022 Maxwell G  - 1.6.0-1
  - Update to 1.6.0.

  * Tue Dec 13 2022 Maxwell G  - 1.6.1-1
  - Update to 1.6.1.


Package:  bcel-6.5.0-3.fc38
Old package:  bcel-6.5.0-2.fc37
Summary:  Byte Code Engineering Library
RPMs: bcel bcel-javadoc
Size: 1.43 MiB
Size change:  -31.54 KiB
Changelog:
  * Thu Dec 01 2022 Mikolaj Izdebski  - 6.5.0-3
  - Fix arbitrary bytecode produced via out-of-bounds writing
  - Resolves: CVE-2022-42920


Package:  breeze-icon-theme-5.101.0-1.fc38
Old package:  breeze-icon-theme-5.100.0-1.fc38
Summary:  Breeze icon theme
RPMs: breeze-icon-theme breeze-icon-theme-rcc
Size: 11.48 MiB
Size change:  62.96 KiB
Changelog:
  * Mon Dec 12 2022 Marc Deop  - 5.101.0-1
  - 5.101.0
  - use new macros to simplify code


Package:  byacc-2.0.20221106-1.fc38
Old package:  byacc-2.0.20220128-2.fc37
Summary:  Berkeley Yacc, a parser generator
RPMs: byacc
Size: 467.64 KiB
Size change:  2.37 KiB
Changelog:
  * Tue Nov 29 2022 Arjun Shankar  - 2.0.20221106-1
  - Rebase to byacc-2.0-20221106 (#2141488)


Package:  cacti-spine-1.2.22-2.fc38
Old package:  cacti-spine-1.2.22-1.fc38
Summary:  Threaded poller for Cacti written in C
RPMs: cacti-spine
Size: 340.73 KiB
Size change:  -15 B
Changelog:
  * Tue

[rpms/perl-Mail-JMAPTalk] PR #1: Package tests and update license to SPDX format

2022-12-14 Thread Michal Josef Špaček

mspacek merged a pull-request against the project: `perl-Mail-JMAPTalk` that 
you are following.

Merged pull-request:

``
Package tests and update license to SPDX format
``

https://src.fedoraproject.org/rpms/perl-Mail-JMAPTalk/pull-request/1
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Upgrade ImageMagick to version 7 (Self-Contained Change proposal)

2022-12-14 Thread Vít Ondruch
Good to see this proposal and I am glad that you have worked out the way 
together.



Vít


Dne 12. 12. 22 v 17:43 Sérgio Basto napsal(a):

On Mon, 2022-12-12 at 10:57 -0500, Ben Cotton wrote:

https://fedoraproject.org/wiki/Changes/ImageMagick7

This document represents a proposed Change. As part of the Changes
process, proposals are publicly announced in order to receive
community feedback. This proposal will only be implemented if
approved
by the Fedora Engineering Steering Committee.


== Summary ==
Upgrade {{package|ImageMagick}} to the latest 7.x version.

== Owner ==
* Name: [[User:Ngompa| Neal Gompa]], [[User:Sergiomb| Sérgio Basto]],
[[User:Carlwgeorge| Carl George]]
* Email: ngomp...@gmail.com, ser...@serjux.com, c...@redhat.com


== Detailed Description ==
{{package|ImageMagick}} in Fedora is currently on the 6.x version
series. The latest version series is 7.x, and
[https://legacy.imagemagick.org/ upstream now recommends upgrading to
it]. Some of this work has been verified ahead of time in
[https://copr.fedorainfracloud.org/coprs/ngompa/ImageMagick7-dev/ a
COPR project], which will be the starting point for the transition.

We will attempt to avoid introducing an ImageMagick6
compatibility package, but if it is needed, it will be introduced.

== Feedback ==
This was
[https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproj
ect.org/thread/OO2IBDMPNSKAHCJF5QY27CNAJYAFPZBY/
discussed on the development mailing list prior to this Change] with
most commentators agreeing that upgrading the default package
("ImageMagick") and creating a compatibility package if needed of the
legacy version ("ImageMagick6") is the right approach for Fedora.

The Change Owners privately discussed and came to the conclusion we
should try this and proceed forward.

== Benefit to Fedora ==
This brings us in line with upstream recommendations on how to ship
ImageMagick, and gives users and developers access to the latest
features and fixes being made available in the ImageMagick software.

== Scope ==
* Proposal owners:
** Update {{package|ImageMagick}} to version 7:
https://src.fedoraproject.org/rpms/ImageMagick/pull-request/10
** Rebuild reverse dependencies to link to v7 libraries
** Any packages that cannot build or be adapted to build for v7 will
need to switch to {{package|GraphicsMagick}} or an ImageMagick6
compatibility package will be introduced for them
** As much as possible will be done in a side-tag to merge into
Rawhide

* Other developers: N/A

* Release engineering: [https://pagure.io/releng/issue/11185 #11185]
* Policies and guidelines: N/A (not needed for this Change)
* Trademark approval: N/A (not needed for this Change)
* Alignment with Objectives: N/A

== Upgrade/compatibility impact ==
The main compatibility impact will be that third party packages will
need to adapt to ImageMagick v7 or use alternatives instead. Within
Fedora itself, these choices will be handled already.

== How To Test ==
Install and use any of the packages

== User Experience ==
This is largely an invisible change, so as long as applications using
ImageMagick still work.

== Dependencies ==
Reverse dependencies of the ImageMagick libraries.

== Contingency Plan ==
* Contingency mechanism: In the event not everything can be migrated
to ImageMagick 7, then the ImageMagick6 compatibility package will be
introduced for them and they will be switched to that.
* Contingency deadline: Final freeze
* Blocks release? No

== Documentation ==
N/A (not a System Wide Change)

== Release Notes ==
The ImageMagick package is now based on the latest version 7 series.
This brings new enhancements, including support for more image
formats
and features like HDR.


Hi,

I talked to Neal yesterday and the result is this proposal .

We may provide a compat-ImageMagick if it is need, but the proposal is
betting that we won't need it.
F36 and F37 are out of scope for now, after "getting IM7 in F38 will
let us see how things go, and we can follow up from there"

Also later, EPEL Steering Committee  will have to decide if want add
IM7 on EPEL 9 and 8 and how , or following this proposal or doing a new
package ImageMagick7

Best regards,
--
Sérgio M. B.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


OpenPGP_signature
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 

[Test-Announce] Fedora 38 Rawhide 20221214.n.0 nightly compose nominated for testing

2022-12-14 Thread rawhide
Announcing the creation of a new nightly release validation test event
for Fedora 38 Rawhide 20221214.n.0. Please help run some tests for this
nightly compose if you have time. For more information on nightly
release validation testing, see:
https://fedoraproject.org/wiki/QA:Release_validation_test_plan

Notable package version changes:
lorax - 20221210.n.0: lorax-38.3-1.fc38.src, 20221214.n.0: lorax-38.4-2.fc38.src

Test coverage information for the current release can be seen at:
https://openqa.fedoraproject.org/testcase_stats/38

You can see all results, find testing instructions and image download
locations, and enter results on the Summary page:

https://fedoraproject.org/wiki/Test_Results:Fedora_38_Rawhide_20221214.n.0_Summary

The individual test result pages are:

https://fedoraproject.org/wiki/Test_Results:Fedora_38_Rawhide_20221214.n.0_Installation
https://fedoraproject.org/wiki/Test_Results:Fedora_38_Rawhide_20221214.n.0_Base
https://fedoraproject.org/wiki/Test_Results:Fedora_38_Rawhide_20221214.n.0_Server
https://fedoraproject.org/wiki/Test_Results:Fedora_38_Rawhide_20221214.n.0_Cloud
https://fedoraproject.org/wiki/Test_Results:Fedora_38_Rawhide_20221214.n.0_Desktop
https://fedoraproject.org/wiki/Test_Results:Fedora_38_Rawhide_20221214.n.0_Security_Lab

Thank you for testing!
-- 
Mail generated by relvalconsumer: https://pagure.io/fedora-qa/relvalconsumer
___
test-announce mailing list -- test-annou...@lists.fedoraproject.org
To unsubscribe send an email to test-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test-annou...@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2153194] New: perl-libintl-perl-1.33 is available

2022-12-14 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2153194

Bug ID: 2153194
   Summary: perl-libintl-perl-1.33 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-libintl-perl
  Keywords: FutureFeature, Triaged
  Assignee: emman...@seyman.fr
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: emman...@seyman.fr, perl-devel@lists.fedoraproject.org
  Target Milestone: ---
Classification: Fedora



Releases retrieved: 1.33
Upstream release that is considered latest: 1.33
Current version/release in rawhide: 1.32-7.fc37
URL: http://search.cpan.org/dist/libintl-perl/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from Anitya:
https://release-monitoring.org/project/5950/


To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/perl-libintl-perl


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2153194
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-14 Thread Vitaly Zaitsev via devel

On 14/12/2022 00:53, Michael Catanzaro via devel wrote:

Thank you _very much_  Neal, Fabio, and Zbigniew for your efforts to revisit 
that decision.


This proposal was rejected and you don't like it. So please please stop 
attacking other people.


--
Sincerely,
  Vitaly Zaitsev (vit...@easycoding.org)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[rpms/perl-Mail-JMAPTalk] PR #1: Package tests and update license to SPDX format

2022-12-14 Thread Michal Josef Špaček

mspacek opened a new pull-request against the project: `perl-Mail-JMAPTalk` 
that you are following:
``
Package tests and update license to SPDX format
``

To reply, visit the link below
https://src.fedoraproject.org/rpms/perl-Mail-JMAPTalk/pull-request/1
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue