[EPEL-devel] How to retire/delete an EPEL branch?

2018-01-09 Thread Ding Yi Chen
I received a bug[1] asking to remove EPEL7 branch, as the package
LibRaw, is already in RHEL.

How should I do that?

Regards,


1. https://bugzilla.redhat.com/show_bug.cgi?id=1526701
-- 
Ding-Yi CHEN

Software Engineer, Globalization Group
Red Hat Asia-Pacific Pty Ltd
dc...@redhat.com
Twitter: @redhatway | Instagram: @redhatinc | Snapchat: @redhatsnaps 
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org


[EPEL-devel] [Fedocal] Reminder meeting : EPEL Steering Committee

2018-01-09 Thread smooge
Dear all,

You are kindly invited to the meeting:
   EPEL Steering Committee on 2018-01-10 from 18:00:00 to 19:00:00 GMT
   At fedora-meet...@irc.freenode.net

The meeting will be about:
The EPEL Steering Committee will have a weekly meeting to cover current tasks 
and problems needed to keep EPEL going.


Source: https://apps.fedoraproject.org/calendar/meeting/8724/

___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org


[EPEL-devel] Fedora EPEL 7 updates-testing report

2018-01-09 Thread updates
The following Fedora EPEL 7 Security updates need testing:
 Age  URL
 1037  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-1087   
dokuwiki-0-0.24.20140929c.el7
 800  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-dac7ed832f   
mcollective-2.8.4-1.el7
 382  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-04bc9dd81d   
libbsd-0.8.3-1.el7
 279  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-d241156dfe   
mod_cluster-1.3.3-10.el7
 111  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-e27758bd23   
libmspack-0.6-0.1.alpha.el7
  48  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-e64eeb6ece   
nagios-4.3.4-5.el7
  37  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-d704442ae7   
qpid-cpp-1.37.0-1.el7
  18  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-957aa05f33   
heketi-5.0.1-1.el7
  12  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-8d57a2487b   
monit-5.25.1-1.el7
   9  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-753e392fc4   
xrdp-0.9.5-1.el7
   5  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-2e2d08b1ff   
awstats-7.6-4.el7
   5  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-49ca8440a1   
gifsicle-1.90-1.el7


The following builds have been pushed to Fedora EPEL 7 updates-testing

easy-rsa-3.0.3-1.el7
librdkafka-0.11.3-1.el7
mint-x-icons-1.4.6-5.el7
mint-y-icons-1.1.3-2.el7
paper-icon-theme-1.4.0-2.el7
php-bartlett-php-compatinfo-db-1.28.0-1.el7
python-pymod2pkg-0.11.0-1.el7
rdopkg-0.45.0-5.el7
rho-0.0.31-1.el7
tcl-tclnagios-1.3-5.el7

Details about builds:



 easy-rsa-3.0.3-1.el7 (FEDORA-EPEL-2018-f3e8fb0991)
 Simple shell based CA utility

Update Information:

Update to 3.0.3 for modern openssl and ciphers.




 librdkafka-0.11.3-1.el7 (FEDORA-EPEL-2018-e49cc220fa)
 The Apache Kafka C library

Update Information:

Default changes  Change default queue.buffering.max.kbytes and
queued.max.message.kbytes to 1GB (#1304) win32: Use
sasl.kerberos.service.name for broker principal, not sasl.kerberos.principal
(#1502)  Enhancements  Default producer message offsets to OFFSET_INVALID
rather than 0 new nuget package layout + debian9 librdkafka build (#1513,
@mhowlett) Allow for calling rd_kafka_queue_io_event_enable() from the C++
world (#1483, @akhi3030) rdkafka_performance: allow testing latency with
different size messages (#1482, @tbsaunde)  Fixes  Improved stability on
termination (internal queues, ERR__DESTROY event) offsets_for_times() return
ERR__TIMED_OUT if brokers did not respond in time Let list_groups() return
ERR__PARTIAL with a partial group list (#1508) Properly handle infinite (-1)
rd_timeout:s throughout the code (#1539) Fix offsets_store() return value
when at least one valid partition portability: rdendian: add le64toh() alias
for older glibc (#1463) Add MIPS build and fix CRC32 to work on big endian
CPUs (@andoma, closes #1498) osx: fix endian checking for software crc32c
Fix comparison in rd_list_remove_cmp (closes #1493) stop calling
cnd_timedwait() with a timeout of 0h (#1481, @tbsaunde) Fix DNS cache logic
broker.address.ttl (#1491, @dacjames) Fix broker thread "hang" in CONNECT
state (#1397) Reset rkb_blocking_max_ms on broker DOWN to avoid busy-loop
during CONNECT (#1397) Fix memory leak when producev() fails (#1478)
Raise cmake minimum version to 3.2 (#1460) Do not assume LZ4 worst (best?)
case 255x compression (#1446 by @tudor) Fix ALL_BROKERS_DOWN re-generation
(fix by @ciprianpascu, #1101) rdkafka-performance: busy wait to wait short
periods of time  source: https://github.com/edenhill/librdkafka/releases




 mint-x-icons-1.4.6-5.el7 (FEDORA-EPEL-2018-5e92e7eb55)
 Icon theme for Linux Mint

Update Information:

- Use rpm filetriggers on Fedora and/or RHEL >= 8




 mint-y-icons-1.1.3-2.el7 (FEDORA-EPEL-2018-d86af40c33)
 The Mint-Y icon theme

Update Information:

- Use rpm filetriggers on Fedora and/or RHEL >= 8

[EPEL-devel] Fedora EPEL 6 updates-testing report

2018-01-09 Thread updates
The following Fedora EPEL 6 Security updates need testing:
 Age  URL
 910  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7168   
rubygem-crack-0.3.2-2.el6
 800  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-e2b4b5b2fb   
mcollective-2.8.4-1.el6
 771  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-35e240edd9   
thttpd-2.25b-24.el6
 382  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-e3e50897ac   
libbsd-0.8.3-2.el6
 111  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-4c76ddcc92   
libmspack-0.6-0.1.alpha.el6
  30  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-6aaee32b7e   
optipng-0.7.6-6.el6
  12  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-6e4ce19598   
monit-5.25.1-1.el6
   5  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-37c8dbd6f1   
gifsicle-1.90-1.el6
   2  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-8c9006d462   
heimdal-7.5.0-1.el6


The following builds have been pushed to Fedora EPEL 6 updates-testing

easy-rsa-3.0.3-1.el6
rho-0.0.31-1.el6

Details about builds:



 easy-rsa-3.0.3-1.el6 (FEDORA-EPEL-2018-4a6cbdd222)
 Simple shell based CA utility

Update Information:

Update to 3.0.3 for modern openssl and ciphers.




 rho-0.0.31-1.el6 (FEDORA-EPEL-2018-4846ddf8ae)
 An SSH system profiler

Update Information:

# Testing Rho  To set up Rho, you create profiles that control how to run each
scan. - Authentication profiles contain user credentials for a user with
sufficient authority to complete the scan (for example, a root user or one with
root-level access obtained through -sudo privilege escalation). - Network
profiles contain network identifiers (for example, a hostname, IP address, or
range of IP addresses) and the authentication profiles to be used for a scan.
Complete the following steps, repeating them as necessary to access all parts of
your environment that you want to scan: 1. Create at least one authentication
profile with root-level access to Rho: ``` rho auth add --name auth_name
--username root_name(--sshkeyfile key_file | --password) ```  a. At the Rho
vault password prompt, create a new Rho vault password. This password is
required to access the encrypted Rho data, such as authentication and network
profiles, scan data, and other information.  b. If you did not use the
sshkeyfile option to provide an SSH key for the username value, enter the
password of the user with root-level access at the connection password prompt.
For example, for an authentication profile where the authentication profile name
is roothost1, the user with root-level access is root, and the SSH key for the
user is in the path ~/.ssh/id_rsa, you would enter the following command: ```
rho auth add --name roothost1 --username root --sshkeyfile ~/.ssh/id_rsa ``` You
can also use the sudo-password option to create an authentication profile for a
user with root-level access who requires a password to obtain this privilege.
You can use the sudo-password option with either the sshkeyfile or the password
option. For example, for an authentication profile where the authentication
profile name is sudouser1, the user with root-level access is sysadmin, and the
access is obtained through the password option, you would enter the following
command: ``` rho auth add --name sudouser1 --username sysadmin --password
--sudo-password ```  After you enter this command, you are prompted to enter two
passwords. First, you would enter the connection password for the username user,
and then you would enter the password for the sudo command.  2. Create at least
one network profile that specifies one or more network identifiers, such as a
host name, an IP address, a list of IP addresses, or an IP range, and one or
more authentication profiles to be used for the scan: ``` rho profile add --name
profile_name --hosts host_name_or_file --auth auth_name ```  For example, for a
network profile where the name of the network profile is mynetwork, the network
to be scanned is the 192.0.2.0/24 subnet, and the authentication profiles that
are used to run the scan are roothost1 and roothost2, you would enter the
following command: ``` rho profile add --name mynetwork --hosts 192.0.2.[1:254]
--auth roothost1 roothost2 ```  You can also use a file to pass in the network
identifiers. If you use a file to enter multiple network identifiers, such as
multiple individual IP addresses, enter each on a single line. For example, for
a network profile where the path to this file is /home/user1/hosts_file, you
would enter the following command: ``` rho profile add