I just tried building qt-creator for EPEL 7 beta, but it failed because the
appdata-tools package doesn't seem to be available. Is that not part of
EL/EPEL 7 beta? Should I just remove the use of it from the .spec? Or is
there a better solution?
Thanks,
Dave
- Original Message -
Sorry, I should have tried pdb first, because this one has nothing to do
with rpm-python. I can see modname='PyQt4.uic.pyuic', and prior to the
exception site is a line 'loader = importer.find_module(modname)', which
is where the None came from. I can confirm
On 14 March 2014 00:00, Jon jdisn...@gmail.com wrote:
Done!
$ koji untag-build --force f19-updates-testing
guacamole-client-0.8.3-5.fc19
$ koji untag-build --force f20-updates-testing
guacamole-client-0.8.3-5.fc20
Thanks,
--Simone
--
You cannot discover new oceans unless you have the
On 13 March 2014 20:01, Rex Dieter rdie...@math.unl.edu wrote:
Did you delete the bodhi updates too? If so, (in short), don't do that.
To tell the truth I don't remember, but I think I did.
So updates that are retired should be left as they are without deleting
them so they still appear
- Original Message -
Existing NIST and Red Hat documentation on OpenSCAP says that it's for
enterprise-level Linux infrastructure. Is any Fedora 21 product targeted
mainly for enterprise deployment? Is OpenSCAP being retargeted for general
purpose level infrastructure. If so, will
On 03/14/2014 08:05 AM, Bohuslav Kabrda wrote:
- Original Message -
Sorry, I should have tried pdb first, because this one has nothing to do
with rpm-python. I can see modname='PyQt4.uic.pyuic', and prior to the
exception site is a line 'loader = importer.find_module(modname)', which
Existing NIST and Red Hat documentation on OpenSCAP says that it's for
enterprise-level Linux infrastructure.
The possibilities of SCAP protocol:
[1] http://scap.nist.gov/
[2] http://csrc.nist.gov/publications/nistpubs/800-126-rev2/SP800-126r2.pdf
[3]
- Original Message -
Existing NIST and Red Hat documentation on OpenSCAP says that it's for
enterprise-level Linux infrastructure. Is any Fedora 21 product targeted
mainly for enterprise deployment? Is OpenSCAP being retargeted for general
purpose level infrastructure. If
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Fri, Mar 14, 2014 at 05:05:28AM -0400, Jaroslav Reznik wrote:
- Original Message -
Existing NIST and Red Hat documentation on OpenSCAP says that it's for
enterprise-level Linux infrastructure. Is any Fedora 21 product targeted
What is the prospect of getting mate 1.8 for fedora 20?
Thanks.
--
Brian Millett
I can't see him through this encounter suit.
'Trust me, its better this way.'
-- [ Alexander and Kyle (re: Kosh), The Gathering]
--
devel mailing list
devel@lists.fedoraproject.org
On Fri, Mar 14, 2014 at 06:25:03AM -0400, Jan Lieskovsky wrote:
One hypothetical [*] scenario coming to my mind being the users might be
willing to provide customized policy content to Fedora installation. Let's
suppose the case there is a SCAP content for vulnerability checking (and
On Fri, Mar 14, 2014 at 09:25:16AM -0400, Eric H. Christensen wrote:
I disagree with this assessment. The workstation is exactly where much of
these hardening needs to take place. I can't see an installation that
wouldn't benefit from this feature.
If there's a default policy that would
Jan Lieskovsky (jlies...@redhat.com) said:
Is any Fedora 21 product targeted
mainly for enterprise deployment?
The vice versa view. Rather effort to use security configuration,
vulnerability and patch
management also in Fedora product(s) (provide necessary tools to allow it).
The
https://bugzilla.redhat.com/show_bug.cgi?id=1076567
Bug ID: 1076567
Summary: perl-Thread-Queue-3.04 is available
Product: Fedora
Version: rawhide
Component: perl-Thread-Queue
Keywords: FutureFeature, Triaged
Assignee:
On Fri, Mar 14, 2014 at 06:25:03AM -0400, Jan Lieskovsky wrote:
One hypothetical [*] scenario coming to my mind being the users might be
willing to provide customized policy content to Fedora installation. Let's
suppose the case there is a SCAP content for vulnerability checking (and
Jan Lieskovsky (jlies...@redhat.com) said:
Is any Fedora 21 product targeted
mainly for enterprise deployment?
The vice versa view. Rather effort to use security configuration,
vulnerability and patch
management also in Fedora product(s) (provide necessary tools to allow it).
The
https://bugzilla.redhat.com/show_bug.cgi?id=1076558
Paul Howarth p...@city-fan.org changed:
What|Removed |Added
Status|NEW |CLOSED
On Fri, 2014-03-14 at 11:22 -0400, Jan Lieskovsky wrote:
On Fri, Mar 14, 2014 at 06:25:03AM -0400, Jan Lieskovsky wrote:
One hypothetical [*] scenario coming to my mind being the users might be
willing to provide customized policy content to Fedora installation. Let's
suppose the
Main topics for today was meeting time tech specs.
On the topic of meeting time we agreed to keep the meeting at 15:00 UTC
for now.
For tech specs we did a quick 2nd review of the changes lately to
Workstation and Server, but none of the changes there are critical for Base.
Agreed to
On Fri, 2014-03-14 at 01:45 +0100, Lennart Poettering wrote:
On Thu, 13.03.14 18:07, Martin Langhoff (martin.langh...@gmail.com) wrote:
My Lenovo X220, running up-to-date F20 occasionally gets into a state where
closing the laptop lid does not trigger suspend.
I want to narrow down on
On Fri, Mar 14, 2014 at 09:25:16AM -0400, Eric H. Christensen wrote:
I disagree with this assessment. The workstation is exactly where much of
these hardening needs to take place. I can't see an installation that
wouldn't benefit from this feature.
If there's a default policy that
On Fri, Mar 14, 2014 at 11:38:31AM -0500, Dan Williams wrote:
The lid switch is exposed as input device in Linux. logind opens that
device and reacts on it. However it gives DEs the chance to inhibit
this if they desire so. Gnome at least doesn't inhibit it perminantly
though, but some
2014-03-14 16:03 GMT+01:00 Bill Nottingham nott...@splat.cc:
I'm looking at this from a different angle. Do we, out of the box in
anaconda, have a spoke for configuring SELinux policy specifics (or
downloading new policies)? Do we, out of the box in anaconda, have a spoke
for setting the F21
On Mar 14, 2014 7:52 AM, Brian Millett bmill...@gmail.com wrote:
What is the prospect of getting mate 1.8 for fedora 20?
Prospect is good.
We're QAing on Rawhide at the moment.
Dan
Sent from my Google Nexus 5
--
devel mailing list
devel@lists.fedoraproject.org
2014-03-14 17:01 GMT+01:00 Jan Lieskovsky jlies...@redhat.com:
Jan Lieskovsky (jlies...@redhat.com) said:
I'm looking at this from a different angle. Do we, out of the box in
anaconda, have a spoke for configuring SELinux policy specifics (or
downloading new policies)? Do we, out of
On Fri, Mar 14, 2014 at 12:38:59PM -0400, Jan Lieskovsky wrote:
I am afraid there isn't a default policy that would suit every possible
use case Fedora OS can be used at. Yes, there's something like common
understanding / agreement which technologies can be considered safe at
current level of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Fri, Mar 14, 2014 at 03:00:20PM +, Matthew Garrett wrote:
On Fri, Mar 14, 2014 at 09:25:16AM -0400, Eric H. Christensen wrote:
I disagree with this assessment. The workstation is exactly where much of
these hardening needs to take
On Fri, Mar 14, 2014 at 12:41 PM, Tomasz Torcz to...@pipebreaker.pl wrote:
systemd-inhibit --list
Fantastic info - Tomasz and Lennart. Thanks!
m
--
martin.langh...@gmail.com
- ask interesting questions
- don't get distracted with shiny stuff - working code first
~
On Friday, March 14, 2014 03:00:20 PM Matthew Garrett wrote:
I disagree with this assessment. The workstation is exactly where much of
these hardening needs to take place. I can't see an installation that
wouldn't benefit from this feature.
If there's a default policy that would make
On Fri, Mar 14, 2014 at 02:51:10PM -0400, Steve Grubb wrote:
On Friday, March 14, 2014 03:00:20 PM Matthew Garrett wrote:
If there's a default policy that would make sense for most workstation
users, we should just make that the default.
Right now there is just one policy. In there future
On Friday, March 14, 2014 06:53:42 PM Matthew Garrett wrote:
On Fri, Mar 14, 2014 at 02:51:10PM -0400, Steve Grubb wrote:
On Friday, March 14, 2014 03:00:20 PM Matthew Garrett wrote:
If there's a default policy that would make sense for most workstation
users, we should just make that the
On Fri, 14 Mar 2014 10:09:42 -0700
Dan Mashal dan.mas...@gmail.com wrote:
On Mar 14, 2014 7:52 AM, Brian Millett bmill...@gmail.com wrote:
What is the prospect of getting mate 1.8 for fedora 20?
Prospect is good.
We're QAing on Rawhide at the moment.
Dan
Sent from my Google Nexus
On Fri, Mar 14, 2014 at 02:57:33PM -0400, Steve Grubb wrote:
On Friday, March 14, 2014 06:53:42 PM Matthew Garrett wrote:
Having separate server, workstation and cloud products means we can
apply separate defaults without requiring user interaction. Beyond that,
why would an end user want
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Fri, Mar 14, 2014 at 12:38:59PM -0400, Jan Lieskovsky wrote:
On Fri, Mar 14, 2014 at 09:25:16AM -0400, Eric H. Christensen wrote:
I disagree with this assessment. The workstation is exactly where much of
these hardening needs to take
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Fri, Mar 14, 2014 at 06:59:18PM +, Matthew Garrett wrote:
On Fri, Mar 14, 2014 at 02:57:33PM -0400, Steve Grubb wrote:
On Friday, March 14, 2014 06:53:42 PM Matthew Garrett wrote:
Having separate server, workstation and cloud products
On Fri, Mar 14, 2014 at 02:39:51PM -0400, Eric H. Christensen wrote:
On Fri, Mar 14, 2014 at 03:00:20PM +, Matthew Garrett wrote:
If there's a default policy that would make sense for most workstation
users, we should just make that the default. If there isn't, how are we
going to
On Fri, Mar 14, 2014 at 03:06:06PM -0400, Eric H. Christensen wrote:
You're making an assumption that I wouldn't want my personal box to be
hardened at install or that the enterprise has an automated way of
doing a deployments. Why make it harder to use the operating system
when a simpler
Miloslav Trmač (m...@volny.cz) said:
There are two ways to avoid this limitation and get better security: either
be a security expert or paranoid yourself (and in that case you don't need
anaconda's handholding), or have an expert (that you trust or have to
listen to) make an informed choice
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Fri, Mar 14, 2014 at 07:31:55PM +, Matthew Garrett wrote:
On Fri, Mar 14, 2014 at 02:39:51PM -0400, Eric H. Christensen wrote:
On Fri, Mar 14, 2014 at 03:00:20PM +, Matthew Garrett wrote:
If there's a default policy that would make
On Fri, Mar 14, 2014 at 03:41:30PM -0400, Eric H. Christensen wrote:
On Fri, Mar 14, 2014 at 07:31:55PM +, Matthew Garrett wrote:
How does the average user make an informed decision about whether an
available security policy is appropriate for them?
I guess we'll have to describe the
Am 14.03.2014 20:31, schrieb Matthew Garrett:
On Fri, Mar 14, 2014 at 02:39:51PM -0400, Eric H. Christensen wrote:
On Fri, Mar 14, 2014 at 03:00:20PM +, Matthew Garrett wrote:
If there's a default policy that would make sense for most workstation
users, we should just make that the
2014-03-14 20:41 GMT+01:00 Bill Nottingham nott...@splat.cc:
Now take the general case of all interactive installs. If we accept that
the
end user, in general, does not have the expertise to decide on the details
of the security policy, how does exposing it in the installer in this way
help?
2014-03-14 20:47 GMT+01:00 Reindl Harald h.rei...@thelounge.net:
why is only the average user relevant?
how do usesers get advanced?
by notice things which sounds interesting, ignore them the
first time, use Google and doing the same again no longer
skip things
Offering the user to use
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Fri, Mar 14, 2014 at 08:51:08PM +0100, Miloslav Trmač wrote:
2014-03-14 20:47 GMT+01:00 Reindl Harald h.rei...@thelounge.net:
why is only the average user relevant?
how do usesers get advanced?
by notice things which sounds
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Fri, Mar 14, 2014 at 07:45:53PM +, Matthew Garrett wrote:
On Fri, Mar 14, 2014 at 03:41:30PM -0400, Eric H. Christensen wrote:
On Fri, Mar 14, 2014 at 07:31:55PM +, Matthew Garrett wrote:
How does the average user make an informed
Am 14.03.2014 20:51, schrieb Miloslav Trmač:
2014-03-14 20:47 GMT+01:00 Reindl Harald h.rei...@thelounge.net
mailto:h.rei...@thelounge.net:
why is only the average user relevant?
how do usesers get advanced?
by notice things which sounds interesting, ignore them the
On Fri, Mar 14, 2014 at 03:56:47PM -0400, Eric H. Christensen wrote:
On Fri, Mar 14, 2014 at 07:45:53PM +, Matthew Garrett wrote:
The failure mode of making the wrong choice regarding an encrypted
partition or the default user being an administrator involves the system
*continuing to
On 14 March 2014 13:45, Matthew Garrett mj...@srcf.ucam.org wrote:
On Fri, Mar 14, 2014 at 03:41:30PM -0400, Eric H. Christensen wrote:
On Fri, Mar 14, 2014 at 07:31:55PM +, Matthew Garrett wrote:
How does the average user make an informed decision about whether an
available security
Thanks for putting me right, will have to look into this properly. I
was mainly looking at Anaconda and F20 for my HP DL140 G3 servers
which there are problems with the video with.
On 14 March 2014 01:05, Adam Williamson awill...@redhat.com wrote:
On Thu, 2014-03-13 at 14:38 +, Aaron Gray
So a friend of mine has been wrangling with suexec trying to configure it
for his needs, and he has become quite furious over the fact that suexec
isn't configurable.
Then he finds out that Debian actually has a version of suexec[1] that lets
you use a conf file to configure suexec. My question
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Fri, Mar 14, 2014 at 08:01:53PM +, Matthew Garrett wrote:
On Fri, Mar 14, 2014 at 03:56:47PM -0400, Eric H. Christensen wrote:
On Fri, Mar 14, 2014 at 07:45:53PM +, Matthew Garrett wrote:
The failure mode of making the wrong choice
On Mar 14, 2014, at 1:06 PM, Eric H. Christensen spa...@fedoraproject.org
wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Fri, Mar 14, 2014 at 06:59:18PM +, Matthew Garrett wrote:
On Fri, Mar 14, 2014 at 02:57:33PM -0400, Steve Grubb wrote:
On Friday, March 14, 2014
On 14 March 2014 16:24, Eric H. Christensen spa...@fedoraproject.orgwrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Fri, Mar 14, 2014 at 08:01:53PM +, Matthew Garrett wrote:
On Fri, Mar 14, 2014 at 03:56:47PM -0400, Eric H. Christensen wrote:
On Fri, Mar 14, 2014 at
On Fri, Mar 14, 2014 at 06:24:36PM -0400, Eric H. Christensen wrote:
On Fri, Mar 14, 2014 at 08:01:53PM +, Matthew Garrett wrote:
If an incorrect choice means that the software the user wants to run
won't run, that's going to be a problem for the user. And we presumably
expect that
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Fri, Mar 14, 2014 at 04:25:48PM -0600, Chris Murphy wrote:
On Mar 14, 2014, at 1:06 PM, Eric H. Christensen spa...@fedoraproject.org
wrote:
On Fri, Mar 14, 2014 at 06:59:18PM +, Matthew Garrett wrote:
On Fri, Mar 14, 2014 at 02:57:33PM
A file has been added to the lookaside cache for perl-Task-Kensho-Toolchain:
2ac28ffcb84973d8fff8c0aeb85491aa Task-Kensho-Toolchain-0.36.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
commit 17cba2abea76d41573a136f1e8f23faa9d1cd8c1
Author: Jitka Plesnikova jples...@redhat.com
Date: Fri Mar 14 09:17:00 2014 +0100
0.36 bump
.gitignore |1 +
Task-Kensho-Toolchain-0.36-Do-not-use-Carton.patch | 28 +++
perl-PDL has broken dependencies in the epel-7 tree:
On ppc64:
perl-PDL-2.7.0-2.el7.1.ppc64 requires perl(PDL::Slatec)
Please resolve this as soon as possible.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
https://bugzilla.redhat.com/show_bug.cgi?id=1076558
Bug ID: 1076558
Summary: perl-DateTime-1.08 is available
Product: Fedora
Version: rawhide
Component: perl-DateTime
Keywords: FutureFeature, Triaged
Assignee:
https://bugzilla.redhat.com/show_bug.cgi?id=1076560
Bug ID: 1076560
Summary: perl-experimental-0.007 is available
Product: Fedora
Version: rawhide
Component: perl-experimental
Keywords: FutureFeature, Triaged
Assignee:
https://bugzilla.redhat.com/show_bug.cgi?id=1076561
Bug ID: 1076561
Summary: perl-ExtUtils-MakeMaker-6.92 is available
Product: Fedora
Version: rawhide
Component: perl-ExtUtils-MakeMaker
Keywords: FutureFeature, Triaged
https://bugzilla.redhat.com/show_bug.cgi?id=1076563
Bug ID: 1076563
Summary: perl-Net-Twitter-4.01003 is available
Product: Fedora
Version: rawhide
Component: perl-Net-Twitter
Keywords: FutureFeature, Triaged
Assignee:
https://bugzilla.redhat.com/show_bug.cgi?id=1076566
Bug ID: 1076566
Summary: perl-Text-CSV_XS-1.05 is available
Product: Fedora
Version: rawhide
Component: perl-Text-CSV_XS
Keywords: FutureFeature, Triaged
Assignee:
https://bugzilla.redhat.com/show_bug.cgi?id=1076569
Bug ID: 1076569
Summary: perl-WebService-Linode-0.20 is available
Product: Fedora
Version: rawhide
Component: perl-WebService-Linode
Keywords: FutureFeature, Triaged
https://bugzilla.redhat.com/show_bug.cgi?id=1076570
Bug ID: 1076570
Summary: perl-XML-LibXML-2.0113 is available
Product: Fedora
Version: rawhide
Component: perl-XML-LibXML
Keywords: FutureFeature, Triaged
Assignee:
A file has been added to the lookaside cache for perl-experimental:
0912342b713a18c89515e213ad640d8d experimental-0.007.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
commit 0561e7cc294613255a2abc4743423bc1d173f101
Author: Petr Písař ppi...@redhat.com
Date: Fri Mar 14 16:10:06 2014 +0100
0.007 bump
.gitignore |1 +
perl-experimental.spec |7 +--
sources|2 +-
3 files changed, 7 insertions(+), 3 deletions(-)
https://bugzilla.redhat.com/show_bug.cgi?id=1076560
Petr Pisar ppi...@redhat.com changed:
What|Removed |Added
Status|ASSIGNED|CLOSED
Fixed In
A file has been added to the lookaside cache for perl-DateTime:
e928c3cdf31b7e39b2f7865f4037ce8b DateTime-1.08.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
A file has been added to the lookaside cache for perl-ExtUtils-MakeMaker:
e855e0e2f7d72b39a2822b9d6a788b45 ExtUtils-MakeMaker-6.92.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
commit 09e1565583bd062b2a6c53294f1ea62a31659e70
Author: Petr Písař ppi...@redhat.com
Date: Fri Mar 14 16:51:49 2014 +0100
6.92 bump
.gitignore |1 +
perl-ExtUtils-MakeMaker.spec |5 -
sources |2 +-
3 files changed, 6 insertions(+), 2
commit 8f63f18ddeaabf31fb31b08e1430d116b137af24
Author: Paul Howarth p...@city-fan.org
Date: Fri Mar 14 15:52:37 2014 +
1.08 bump
perl-DateTime.spec |5 -
sources|2 +-
2 files changed, 5 insertions(+), 2 deletions(-)
---
diff --git a/perl-DateTime.spec
https://bugzilla.redhat.com/show_bug.cgi?id=1076561
Petr Pisar ppi...@redhat.com changed:
What|Removed |Added
Status|ASSIGNED|CLOSED
Fixed In
The lightweight tag 'perl-DateTime-1.08-1.fc21' was created pointing to:
8f63f18... 1.08 bump
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel
A file has been added to the lookaside cache for perl-Thread-Queue:
337a4e003426f716638a6c4d03324bd5 Thread-Queue-3.04.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
commit ab4ac1f7c3fce5ab021f8d0c4bf8b9c8e848f715
Author: Petr Písař ppi...@redhat.com
Date: Fri Mar 14 17:02:55 2014 +0100
3.04 bump
.gitignore |1 +
perl-Thread-Queue.spec |5 -
sources|2 +-
3 files changed, 6 insertions(+), 2 deletions(-)
---
https://bugzilla.redhat.com/show_bug.cgi?id=1076567
Petr Pisar ppi...@redhat.com changed:
What|Removed |Added
Status|NEW |CLOSED
mojomojo has broken dependencies in the rawhide tree:
On x86_64:
mojomojo-1.10-1.fc20.noarch requires
perl(HTML::FormFu::Element::reCAPTCHA)
On i386:
mojomojo-1.10-1.fc20.noarch requires
perl(HTML::FormFu::Element::reCAPTCHA)
On armhfp:
mojomojo-1.10-1.fc20.noarch
perl-Elasticsearch has broken dependencies in the rawhide tree:
On x86_64:
perl-Elasticsearch-1.05-1.fc21.noarch requires perl(Hijk) = 0:0.12
On i386:
perl-Elasticsearch-1.05-1.fc21.noarch requires perl(Hijk) = 0:0.12
On armhfp:
perl-Elasticsearch-1.05-1.fc21.noarch
perl-Catalyst-Controller-HTML-FormFu has broken dependencies in the rawhide
tree:
On x86_64:
perl-Catalyst-Controller-HTML-FormFu-0.09004-4.fc20.noarch requires
perl(HTML::FormFu::MultiForm)
On i386:
perl-Catalyst-Controller-HTML-FormFu-0.09004-4.fc20.noarch requires
perl-Language-Expr has broken dependencies in the rawhide tree:
On x86_64:
perl-Language-Expr-0.19-4.fc19.noarch requires
perl(:MODULE_COMPAT_5.16.2)
On i386:
perl-Language-Expr-0.19-4.fc19.noarch requires
perl(:MODULE_COMPAT_5.16.2)
On armhfp:
https://fedorahosted.org/389/ticket/47733
https://fedorahosted.org/389/attachment/ticket/47733/0001-Ticket-47733-ds-logs-many-Operation-error-fetching-N.patch
--
389-devel mailing list
389-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/389-devel
https://fedorahosted.org/389/ticket/47740
https://fedorahosted.org/389/attachment/ticket/47740/0001-Ticket-47740-Crash-caused-by-changesto-certmap.c.patch
--
Mark Reynolds
389 Development Team
Red Hat, Inc
mreyno...@redhat.com
--
389-devel mailing list
389-devel@lists.fedoraproject.org
https://fedorahosted.org/389/ticket/47740
https://fedorahosted.org/389/attachment/ticket/47740/0001-Ticket-47740-Crash-caused-by-changes-to-certmap.c.patch
--
Mark Reynolds
389 Development Team
Red Hat, Inc
mreyno...@redhat.com
--
389-devel mailing list
389-devel@lists.fedoraproject.org
Hey folks,
One of the new features coming in Python 3.4 is Victor Stinner's changes
to allow runtime configurable memory allocators, and the associated
tracemalloc module to record details of memory allocations within the
CPython runtime and extensions modules.
Victor is looking for feedback on
85 matches
Mail list logo