Re: Non-responsive maintainer: nando pavlix

2021-04-20 Thread Pierre-Yves Chibon
On Mon, Apr 19, 2021 at 11:51:35AM +0200, Miro Hrončok wrote:
> On 19. 04. 21 10:52, Pierre-Yves Chibon wrote:
> > On Fri, Apr 16, 2021 at 03:12:34PM +0200, Pierre-Yves Chibon wrote:
> > > Good Morning Everyone,
> > > 
> > > The packagers listed here have been receiving a daily email asking them to
> > > either adjust their bugzilla or their FAS account so the email address in 
> > > FAS
> > > matches an existing bugzilla account.
> > > 
> > > Having a bugzilla account is mandatory per:
> > > https://fedoraproject.org/wiki/Join_the_package_collection_maintainers#Create_a_Bugzilla_Account
> > > 
> > > - nando contacted since March 26th
> > > - pavlix contacted since March 18th
> > 
> > Thanks to zoglesby and liangwen12year for fixing their accounts.
> > 
> > Does anyone know how to contact nando and pavlix?
> 
> I know how to contact pavlix.

That seems to have worked, thanks!

The only person left is nando.


Pierre
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Cloud-33-20210420.0 compose check report

2021-04-20 Thread Fedora compose checker
No missing expected images.

Soft failed openQA tests: 1/7 (x86_64), 1/7 (aarch64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-Cloud-33-20210419.0):

ID: 862272  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/862272
ID: 862279  Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/862279

Passed openQA tests: 6/7 (x86_64), 6/7 (aarch64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: [dm-crypt] Kdump with full-disk LUKS encryption

2021-04-20 Thread Milan Broz
Hi,

TL;DR what you are trying to do is to actually reverse many security measures
we added. It is perhaps acceptable for debugging but hardly for real generic 
system.

- using memory-hard function increases cost of dictionary and brute-force 
attacks
You can always decrease amount of memory needed, but you should do it only
if you know that security margin is ok (like password is randomly generated
with enough entropy).

- key is in keyring to remove possibility for normal userspace to receive
the key from kernel. Moreover, there is no need to retain kernel in keyring once
dm-crypt device is activated. (It is still in kernel memory but only in crypto
functions context). (Systemd also uses keyring to cache passphrase but that's
different thing.)

You can still use old way for activation with --disable-keyring activation,
but then you disable this possibility.

More comments below.

On 19/04/2021 12:00, Kairui Song wrote:
> Hi all,
> 
> I'm currently trying to add kdump support for systemd with full-disk
> LUKS encryption. vmcores contain sensitive data so they should also be
> protected, and network dumps sometimes are not available. So kdump has
> to open the LUKS encrypted device in the kdump environment.
> 
> I'm using systemd/dracut, my work machine is running Fedora 34, and
> there are several problems I'm trying to solve:
> 1. Users have to input the password in the kdump kernel environment.
> But users often don't have shell access to the kdump environment.
> (headless server, graphic card not working after kexec, both are very
> common)
> 2. LUKS2 prefers Argon2 as the key derivation function, designed to
> use a lot of memory. kdump is expected to use a minimal amount of
> memory. Users will have to reserve a huge amount of memory for kdump
> to work (eg. 1G reserve for kdump with 4G total memory which is not
> reasonable).

When I added Argon2 to LUKS2, I actually expected such issues. Despite
some people beats me that they cannot use arbitrary amount of memory,
we have some hard limits that were selected that it should work on most recent
systems. Maybe kdump can live with it.

 - maximum memory cost limit is 4GB, no LUKS2 device can use more for Argon2
 - we never use more than half of available physical memory
   (measured on the host where the device was formatted)
 - required amount of memory is visible in LUKS2 metadata (luksDump)
   for the particular keyslot  (Memory: the value is in kB)
 - we use benchmark to calculate memory cost with prefered unlocking
   time 2 seconds (again, on the device where LUKS was formatted)
   Small systems (like RPi2) the uses much smaller acceptable values.
  You can configure all costs (time, memory, threads) during format
  or even set them to predefined values.

I am sorry, but there is really no way around this - and the requeired
memory must be physical memory (otherwise it slows down extremely).
This is a feature, not a bug :-)


> To fix these problems, I tried to pass the master key to the second
> kernel directly via initramfs. Kdump will modify the initramfs in
> ramfs to include the key, kexec_load it, and never write to any actual
> back storage. This worked with old LUKS configurations.

Well, passing volume key this way is quite insecure, but perhaps
acceptable for debugging.

> 
> But LUKS2/cryptsetup now stores the key in the kernel keyring by
> default. The key is accessible from userspace.

If you are talking about volume key (not passsphrase), it is not
available from userspace. Only reference to it. But you can use
this reference to construct in-kernel dm-crypt device.
Please read 
https://gitlab.com/cryptsetup/cryptsetup/-/blob/master/docs/Keyring.txt
 
> Users can enter the password to start kdump manually and then it will
> work, but usually people expect kdump service to start automatically.
> 
> (WIP patch series:
> https://lists.fedoraproject.org/archives/list/ke...@lists.fedoraproject.org/thread/RTYJEQ4BV25JYVYJHTTPOK476FUEJOWW/)
> 
> I've several ideas about how to improve it but not sure which one is
> better, and if this is a good idea after all:
> 1. Simply introduce a config to let systemd-cryptsetup disable kernel
> keyring on setup, there is currently no such option.

Well, that option could be useful anyway and we have support for it
in cryptsetup (--disable-keyring CLI option) and libcryptsetup, so why not.
Just this should not be a default option.

This is should be patch for systemd-cryptsetup only as libcryptsetup supports 
it.

...

> 2. If we can let the key stay in userspace for a little longer, eg.
> for systems booted with dracut/systemd, when
> systemd-cryptsetup@%s.service opens the crypt device, keep the key in
> dm-crypt. And later when services like kdump have finished loading,
> cryptsetup can refresh the device and store the key in the kernel
> keyring again.

We invalidate volume key in keyring after libceyposetup  operation
is finished (and kernel removes the reference once keyring garbage collection
is 

Re: Next for ARC - researching how to replace PDC

2021-04-20 Thread Aurelien Bompard
Hi!

> - fedora messaging - https://github.com/fedora-infra/fedora-messaging

Hmm, I don't think we're using PDC in fedora messaging, but I might be wrong. 
Where did you find it?


A.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Next for ARC - researching how to replace PDC

2021-04-20 Thread Neal Gompa
On Mon, Apr 19, 2021 at 5:13 AM Adam Saleh  wrote:
>
> Hi everyone,
>
> ARC team - that is me, Vipul and Mark, are looking to figure out
> possible ways how we could replace our current PDC [0] whose project
> has gone unmaintained for years [1].
>
> We plan to share what we find out in our
> https://fedora-arc.readthedocs.io/en/latest/pdc/index.html
>
> It would be really helpful if any other users of PDC would reach out,
> so that we don't leave anybody behind.
>
> First, is there anybody using the PDC UI? So far we have identified,
> only api/cli usage.
>
> Second, based on a cursory search through our infrastructure
> configuration far we identified usage in:
>
> - Release Engineering scripts - https://pagure.io/releng/
> - fedpkg - https://pagure.io/fedpkg
> - pungi - https://pagure.io/pungi/
> - fedfind - https://pagure.io/fedora-qa/fedfind
> - bodhi - https://github.com/fedora-infra/bodhi/
> - pagure - https://pagure.io/pagure/
> - MBS - https://pagure.io/fm-orchestrator/
> - mirrormanager scripts - https://pagure.io/Fedora-Infra/ansible
> - ODCS - https://pagure.io/odcs
> - the new hotness - https://github.com/fedora-infra/the-new-hotness
> - fedora messaging - https://github.com/fedora-infra/fedora-messaging
> - osbs client - https://github.com/containerbuildsystem/osbs-client
>
> Is there anything we are forgetting about?
>

GNOME Software uses it:
https://gitlab.gnome.org/GNOME/gnome-software/-/blob/master/plugins/fedora-pkgdb-collections/gs-plugin-fedora-pkgdb-collections.c

Absent of something better, Plasma Discover will too.



-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: [dm-crypt] Kdump with full-disk LUKS encryption

2021-04-20 Thread Kairui Song
Hi,

Thanks a lot, these info are very helpful.
Better to keep it for debugging for now, and ask users to use it very carefully.

On Tue, Apr 20, 2021 at 3:54 PM Milan Broz  wrote:
>
> Hi,
>
> TL;DR what you are trying to do is to actually reverse many security measures
> we added. It is perhaps acceptable for debugging but hardly for real generic 
> system.
>
> - using memory-hard function increases cost of dictionary and brute-force
> attacks
> You can always decrease amount of memory needed, but you should do it only
> if you know that security margin is ok (like password is randomly generated
> with enough entropy).
>
> - key is in keyring to remove possibility for normal userspace to receive
> the key from kernel. Moreover, there is no need to retain kernel in keyring 
> once
> dm-crypt device is activated. (It is still in kernel memory but only in crypto
> functions context). (Systemd also uses keyring to cache passphrase but that's
> different thing.)
>
> You can still use old way for activation with --disable-keyring activation,
> but then you disable this possibility.
>
> More comments below.
>
> On 19/04/2021 12:00, Kairui Song wrote:
> > Hi all,
> >
> > I'm currently trying to add kdump support for systemd with full-disk
> > LUKS encryption. vmcores contain sensitive data so they should also be
> > protected, and network dumps sometimes are not available. So kdump has
> > to open the LUKS encrypted device in the kdump environment.
> >
> > I'm using systemd/dracut, my work machine is running Fedora 34, and
> > there are several problems I'm trying to solve:
> > 1. Users have to input the password in the kdump kernel environment.
> > But users often don't have shell access to the kdump environment.
> > (headless server, graphic card not working after kexec, both are very
> > common)
> > 2. LUKS2 prefers Argon2 as the key derivation function, designed to
> > use a lot of memory. kdump is expected to use a minimal amount of
> > memory. Users will have to reserve a huge amount of memory for kdump
> > to work (eg. 1G reserve for kdump with 4G total memory which is not
> > reasonable).
>
> When I added Argon2 to LUKS2, I actually expected such issues. Despite
> some people beats me that they cannot use arbitrary amount of memory,
> we have some hard limits that were selected that it should work on most recent
> systems. Maybe kdump can live with it.
>
>  - maximum memory cost limit is 4GB, no LUKS2 device can use more for Argon2
>  - we never use more than half of available physical memory
>(measured on the host where the device was formatted)
>  - required amount of memory is visible in LUKS2 metadata (luksDump)
>for the particular keyslot  (Memory: the value is in kB)
>  - we use benchmark to calculate memory cost with prefered unlocking
>time 2 seconds (again, on the device where LUKS was formatted)
>Small systems (like RPi2) the uses much smaller acceptable values.
>   You can configure all costs (time, memory, threads) during format
>   or even set them to predefined values.
>
> I am sorry, but there is really no way around this - and the requeired
> memory must be physical memory (otherwise it slows down extremely).
> This is a feature, not a bug :-)
>
>
> > To fix these problems, I tried to pass the master key to the second
> > kernel directly via initramfs. Kdump will modify the initramfs in
> > ramfs to include the key, kexec_load it, and never write to any actual
> > back storage. This worked with old LUKS configurations.
>
> Well, passing volume key this way is quite insecure, but perhaps
> acceptable for debugging.
>
> >
> > But LUKS2/cryptsetup now stores the key in the kernel keyring by
> > default. The key is accessible from userspace.
>
> If you are talking about volume key (not passsphrase), it is not
> available from userspace. Only reference to it. But you can use
> this reference to construct in-kernel dm-crypt device.
> Please read 
> https://gitlab.com/cryptsetup/cryptsetup/-/blob/master/docs/Keyring.txt
>
> > Users can enter the password to start kdump manually and then it will
> > work, but usually people expect kdump service to start automatically.
> >
> > (WIP patch series:
> > https://lists.fedoraproject.org/archives/list/ke...@lists.fedoraproject.org/thread/RTYJEQ4BV25JYVYJHTTPOK476FUEJOWW/)
> >
> > I've several ideas about how to improve it but not sure which one is
> > better, and if this is a good idea after all:
> > 1. Simply introduce a config to let systemd-cryptsetup disable kernel
> > keyring on setup, there is currently no such option.
>
> Well, that option could be useful anyway and we have support for it
> in cryptsetup (--disable-keyring CLI option) and libcryptsetup, so why not.
> Just this should not be a default option.
>
> This is should be patch for systemd-cryptsetup only as libcryptsetup supports 
> it.
>
> ...
>
> > 2. If we can let the key stay in userspace for a little longer, eg.
> > for systems booted with dracut/systemd, when
> > syst

Fedora rawhide compose report: 20210420.n.0 changes

2021-04-20 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20210419.n.0
NEW: Fedora-Rawhide-20210420.n.0

= SUMMARY =
Added images:0
Dropped images:  0
Added packages:  11
Dropped packages:5
Upgraded packages:   140
Downgraded packages: 0

Size of added packages:  25.97 MiB
Size of dropped packages:2.13 MiB
Size of upgraded packages:   5.54 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   103.77 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =

= DROPPED IMAGES =

= ADDED PACKAGES =
Package: ghc-koji-0.0.1-1.fc35
Summary: Koji buildsystem XML-RPC API bindings
RPMs:ghc-koji ghc-koji-devel ghc-koji-doc ghc-koji-prof
Size:2.52 MiB

Package: gsl-lite-0.38.0-1.fc35
Summary: Header-only version of ISO C++ Guidelines Support Library (GSL)
RPMs:gsl-lite-devel
Size:340.16 KiB

Package: highfive-2.2.2-1.fc35
Summary: Header-only C++ HDF5 interface
RPMs:highfive-devel highfive-doc
Size:14.00 MiB

Package: hikari-2.3.0-1.fc35
Summary: Stacking Wayland compositor with tiling capabilities
RPMs:hikari
Size:4.46 MiB

Package: php-composer-xdebug-handler2-2.0.0-1.fc35
Summary: Restarts a process without Xdebug, version 2
RPMs:php-composer-xdebug-handler2
Size:22.47 KiB

Package: python-contextualbandits-0.3.14-1.fc35
Summary: Python Implementations of Algorithms for Contextual Bandits
RPMs:python-contextualbandits-doc python3-contextualbandits
Size:2.11 MiB

Package: python-doxytag2zealdb-0.3.1-1.fc35
Summary: Create a SQLite3 database from a Doxygen tag file
RPMs:doxytag2zealdb python3-doxytag2zealdb
Size:61.62 KiB

Package: python-op1repacker-0.2.6-1.fc35
Summary: Tool for unpacking, modding and repacking OP-1 firmware
RPMs:op1repacker
Size:86.27 KiB

Package: python-pydyf-0.0.2-2.fc35
Summary: Low-level PDF creator
RPMs:python3-pydyf
Size:18.95 KiB

Package: python-xeddsa-0.6.0~beta-3.fc35
Summary: Python implementation of the XEdDSA signature scheme
RPMs:python3-xeddsa
Size:476.09 KiB

Package: wlroots0.12-0.12.0-1.fc35
Summary: A modular Wayland compositor library
RPMs:wlroots0.12 wlroots0.12-devel
Size:1.90 MiB


= DROPPED PACKAGES =
Package: jakarta-messaging-2.0.3-2.fc34
Summary: JMS / Jakarta Messaging API
RPMs:jakarta-messaging jakarta-messaging-javadoc
Size:461.00 KiB

Package: jboss-el-3.0-api-1.0.13-6.fc34
Summary: JSR-341 Expression Language 3.0 API
RPMs:jboss-el-3.0-api jboss-el-3.0-api-javadoc
Size:455.43 KiB

Package: jboss-servlet-3.1-api-1.0.2-5.fc34
Summary: Java Servlet 3.1 API
RPMs:jboss-servlet-3.1-api jboss-servlet-3.1-api-javadoc
Size:620.90 KiB

Package: maven-verifier-1.7.2-4.fc34
Summary: Maven verifier
RPMs:maven-verifier maven-verifier-javadoc
Size:328.84 KiB

Package: saxpath-1.0-23.fc34
Summary: Simple API for XPath
RPMs:saxpath saxpath-javadoc
Size:311.40 KiB


= UPGRADED PACKAGES =
Package:  annobin-9.66-4.fc35
Old package:  annobin-9.65-2.fc35
Summary:  Annotate and examine compiled binary files
RPMs: annobin-annocheck annobin-docs annobin-plugin-clang 
annobin-plugin-gcc annobin-plugin-llvm
Added RPMs:   annobin-docs
Dropped RPMs: annobin
Size: 1.22 MiB
Size change:  -299.59 KiB
Changelog:
  * Fri Apr 09 2021 Nick Clifton  - 9.66-1
  - Fix anomolies reported by covscan.
  - Move documentation into a sub-package.

  * Thu Apr 15 2021 Martin Cermak  - 9.66-2
  - Fix bz1949570

  * Fri Apr 16 2021 Petr Pisar  - 9.66-3
  - Correct a package rename (bug #1949570)
  - Require docs subpackage by the other ones because of a license
  - Build-requiring perl-interpreter is enough

  * Mon Apr 19 2021 Petr Pisar  - 9.66-4
  - Bump a release


Package:  arm-image-installer-3.4-1.fc35
Old package:  arm-image-installer-3.3-1.fc35
Summary:  Writes binary image files to any specified block device
RPMs: arm-image-installer
Size: 53.48 KiB
Size change:  427 B
Changelog:
  * Mon Apr 19 2021 Paul Whalen  - 3.4-1
  - Update to 3.4
  - Add spi-flashing-disk script


Package:  audacity-3.0.2-2.fc35
Old package:  audacity-3.0.0-2.fc35
Summary:  Multitrack audio editor
RPMs: audacity audacity-manual
Size: 43.87 MiB
Size change:  -305.75 KiB
Changelog:
  * Mon Apr 19 2021 Gwyn Ciesla  - 3.0.2-1
  - 3.0.2

  * Mon Apr 19 2021 Gwyn Ciesla  - 3.0.2-2
  - Fix ffmpeg typo.


Package:  awscli-1.19.54-1.fc35
Old package:  awscli-1.19.53-1.fc35
Summary:  Universal Command Line Environment for AWS
RPMs: awscli
Size: 2.03 MiB
Size change:  -80 B
Changelog:
  * Mon Apr 19 2021 Gwyn Ciesla  - 1.19.54-1
  - 1.19.54


Package:  blender-1:2.92.0-5.fc35
Old package:  blender-1:2.92.0-3.fc35
Summary:  3D modeling, animation, rendering and post-production
RPMs: blender blender-rpm-macros
Size: 125.47 MiB
Size change:  -444 B
Changelog:
  * Mon Apr 19 2021 Luya Tshimbalanga  - 1:2.92.0-4
  - Rebuild for openxr

Schedule for Tuesdays's FESCo Meeting (2021-04-20)

2021-04-20 Thread Zbigniew Jędrzejewski-Szmek
Following is the list of topics that will be discussed in the
FESCo meeting Tuesday at 17:00UTC in #fedora-meeting on
irc.freenode.net.

To convert UTC to your local time, take a look at
  http://fedoraproject.org/wiki/UTCHowto

or run:
  date -d '2021-04-20 17:00 UTC'


Links to all issues to be discussed can be found at: 
https://pagure.io/fesco/report/meeting_agenda

= Discussed and Voted in the Ticket =

#2593 F35 Change: RPM 4.17 
https://pagure.io/fesco/issue/2593
APPROVED (+8, 0, 0)

#2594 F35 Change: Smaller Container Base Image (remove sssd-client, util-linux) 
https://pagure.io/fesco/issue/2594
APPROVED (+7, 0, 0)


= Followups =


= New business =

#2596 F35 Change: Switching Cyrus Sasl from BerkeleyDB to GDBM 
https://pagure.io/fesco/issue/2596

#2597 F35 Change: Debuginfod By Default 
https://pagure.io/fesco/issue/2597


= Open Floor = 

For more complete details, please visit each individual
issue.  The report of the agenda items can be found at
https://pagure.io/fesco/report/meeting_agenda

If you would like to add something to this agenda, you can
reply to this e-mail, file a new issue at
https://pagure.io/fesco, e-mail me directly, or bring it
up at the end of the meeting, during the open floor topic. Note
that added topics may be deferred until the following meeting. 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora 34 compose report: 20210420.n.0 changes

2021-04-20 Thread Fedora Rawhide Report
OLD: Fedora-34-20210419.n.0
NEW: Fedora-34-20210420.n.0

= SUMMARY =
Added images:0
Dropped images:  2
Added packages:  1
Dropped packages:0
Upgraded packages:   4
Downgraded packages: 0

Size of added packages:  3.37 MiB
Size of dropped packages:0 B
Size of upgraded packages:   198.96 MiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   112.93 KiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =

= DROPPED IMAGES =
Image: Astronomy_KDE live x86_64
Path: Labs/x86_64/iso/Fedora-Astronomy_KDE-Live-x86_64-34-20210419.n.0.iso
Image: Xfce raw-xz armhfp
Path: Spins/armhfp/images/Fedora-Xfce-34-20210419.n.0.armhfp.raw.xz

= ADDED PACKAGES =
Package: dionaea-0.7.0-9.fc33
Summary: Low interaction honeypot
RPMs:dionaea dionaea-doc python3-dionaea
Size:3.37 MiB


= DROPPED PACKAGES =

= UPGRADED PACKAGES =
Package:  pipewire-0.3.25-1.fc34
Old package:  pipewire-0.3.24-4.fc34
Summary:  Media Sharing Server
RPMs: pipewire pipewire-alsa pipewire-devel pipewire-doc 
pipewire-gstreamer pipewire-jack-audio-connection-kit pipewire-libs 
pipewire-plugin-jack pipewire-pulseaudio pipewire-utils
Size: 124.43 MiB
Size change:  114.55 KiB
Changelog:
  * Tue Apr 06 2021 Wim Taymans  - 0.3.25-1
  - Update to 0.3.25


Package:  plasma-discover-5.21.4-2.fc34
Old package:  plasma-discover-5.21.3-1.fc34
Summary:  KDE and Plasma resources management GUI
RPMs: plasma-discover plasma-discover-flatpak plasma-discover-libs 
plasma-discover-notifier plasma-discover-offline-updates 
plasma-discover-packagekit plasma-discover-snap
Size: 41.91 MiB
Size change:  3.91 KiB
Changelog:
  * Tue Apr 06 2021 Jan Grulich  - 5.21.4-1
  - 5.21.4

  * Fri Apr 16 2021 Rex Dieter  - 5.21.4-2
  - plasma-discover doesnt refresh metadata (#1903294)


Package:  xorg-x11-server-1.20.11-1.fc34
Old package:  xorg-x11-server-1.20.10-5.fc34
Summary:  X.Org X11 X server
RPMs: xorg-x11-server-Xdmx xorg-x11-server-Xephyr xorg-x11-server-Xnest 
xorg-x11-server-Xorg xorg-x11-server-Xvfb xorg-x11-server-common 
xorg-x11-server-devel xorg-x11-server-source
Size: 27.89 MiB
Size change:  -4.48 KiB
Changelog:
  * Wed Apr 14 2021 Olivier Fourdan  - 1.20.11-1
  - xserver 1.20.11 (CVE-2021-3472 / ZDI-CAN-1259)


Package:  xorg-x11-server-Xwayland-21.1.1-1.fc34
Old package:  xorg-x11-server-Xwayland-21.1.0-1.fc34
Summary:  Xwayland
RPMs: xorg-x11-server-Xwayland xorg-x11-server-Xwayland-devel
Size: 4.73 MiB
Size change:  -1.04 KiB
Changelog:
  * Wed Apr 14 2021 Olivier Fourdan  - 21.1.1-1
  - xwayland 21.1.1 (CVE-2021-3472 / ZDI-CAN-1259)



= DOWNGRADED PACKAGES =
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Next for ARC - researching how to replace PDC

2021-04-20 Thread Robert-André Mauchin

On 4/19/21 11:13 AM, Adam Saleh wrote:

Hi everyone,

ARC team - that is me, Vipul and Mark, are looking to figure out
possible ways how we could replace our current PDC [0] whose project
has gone unmaintained for years [1].

We plan to share what we find out in our
https://fedora-arc.readthedocs.io/en/latest/pdc/index.html

It would be really helpful if any other users of PDC would reach out,
so that we don't leave anybody behind.

First, is there anybody using the PDC UI? So far we have identified,
only api/cli usage.

Second, based on a cursory search through our infrastructure
configuration far we identified usage in:

- Release Engineering scripts - https://pagure.io/releng/
- fedpkg - https://pagure.io/fedpkg
- pungi - https://pagure.io/pungi/
- fedfind - https://pagure.io/fedora-qa/fedfind
- bodhi - https://github.com/fedora-infra/bodhi/
- pagure - https://pagure.io/pagure/
- MBS - https://pagure.io/fm-orchestrator/
- mirrormanager scripts - https://pagure.io/Fedora-Infra/ansible
- ODCS - https://pagure.io/odcs
- the new hotness - https://github.com/fedora-infra/the-new-hotness
- fedora messaging - https://github.com/fedora-infra/fedora-messaging
- osbs client - https://github.com/containerbuildsystem/osbs-client

Is there anything we are forgetting about?


fedscm-admin?

https://pagure.io/fedscm-admin/blob/main/f/fedscm_admin/pdc.py
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: [dm-crypt] Antw: [EXT] [systemd-devel] Kdump with full-disk LUKS encryption

2021-04-20 Thread Milan Broz
On 20/04/2021 08:05, Ulrich Windl wrote:
 Kairui Song  schrieb am 19.04.2021 um 12:00 in
> Nachricht
> :
>> Hi all,
>>
>> I'm currently trying to add kdump support for systemd with full‑disk
>> LUKS encryption. vmcores contain sensitive data so they should also be
>> protected, and network dumps sometimes are not available. So kdump has
>> to open the LUKS encrypted device in the kdump environment.
>>
>> I'm using systemd/dracut, my work machine is running Fedora 34, and
>> there are several problems I'm trying to solve:
>> 1. Users have to input the password in the kdump kernel environment.
>> But users often don't have shell access to the kdump environment.
>> (headless server, graphic card not working after kexec, both are very
>> common)
>> 2. LUKS2 prefers Argon2 as the key derivation function, designed to
>> use a lot of memory. kdump is expected to use a minimal amount of
>> memory. Users will have to reserve a huge amount of memory for kdump
>> to work (eg. 1G reserve for kdump with 4G total memory which is not
>> reasonable).
> 
> I'm not a LUKS specialist, but can't you use different KDFs in a different key
> slot?

Yes, you can (for LUKS2). There are also priorities, so you can configure 
"admin"
keyslot that is never used unless explicitly specified.
It can use different PBKDF and/or cost parameters.

But this is not a solution for the mentioned problem - they have to work
with arbitrary devices.

Milan

p.s.
Some lists on cc rejects replies without subscription, so do not
be surprised if you see only some replies.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-Rawhide-20210420.n.0 compose check report

2021-04-20 Thread Fedora compose checker
No missing expected images.

Compose FAILS proposed Rawhide gating check!
1 of 43 required tests failed
openQA tests matching unsatisfied gating requirements shown with **GATING** 
below

Failed openQA tests: 10/189 (x86_64), 10/127 (aarch64)

New failures (same test not failed in Fedora-Rawhide-20210419.n.0):

ID: 862406  Test: x86_64 Server-dvd-iso install_repository_hd_variation
URL: https://openqa.fedoraproject.org/tests/862406
ID: 862569  Test: aarch64 Workstation-raw_xz-raw.xz desktop_printing@uefi
URL: https://openqa.fedoraproject.org/tests/862569
ID: 862625  Test: x86_64 universal install_scsi_updates_img **GATING**
URL: https://openqa.fedoraproject.org/tests/862625
ID: 862677  Test: aarch64 universal install_blivet_lvmthin@uefi
URL: https://openqa.fedoraproject.org/tests/862677
ID: 862682  Test: aarch64 universal install_blivet_resize_lvm@uefi
URL: https://openqa.fedoraproject.org/tests/862682

Old failures (same test failed in Fedora-Rawhide-20210419.n.0):

ID: 862428  Test: x86_64 Server-dvd-iso modularity_tests
URL: https://openqa.fedoraproject.org/tests/862428
ID: 862431  Test: x86_64 Server-dvd-iso server_cockpit_updates
URL: https://openqa.fedoraproject.org/tests/862431
ID: 862491  Test: x86_64 Silverblue-dvd_ostree-iso release_identification
URL: https://openqa.fedoraproject.org/tests/862491
ID: 862546  Test: aarch64 Server-dvd-iso modularity_tests@uefi
URL: https://openqa.fedoraproject.org/tests/862546
ID: 862637  Test: x86_64 universal upgrade_2_server_domain_controller
URL: https://openqa.fedoraproject.org/tests/862637
ID: 862644  Test: x86_64 universal upgrade_server_domain_controller
URL: https://openqa.fedoraproject.org/tests/862644
ID: 862659  Test: x86_64 universal upgrade_2_realmd_client
URL: https://openqa.fedoraproject.org/tests/862659
ID: 862660  Test: x86_64 universal upgrade_realmd_client
URL: https://openqa.fedoraproject.org/tests/862660
ID: 862663  Test: aarch64 universal install_asian_language@uefi
URL: https://openqa.fedoraproject.org/tests/862663
ID: 862692  Test: aarch64 universal upgrade_2_server_domain_controller@uefi
URL: https://openqa.fedoraproject.org/tests/862692
ID: 862693  Test: aarch64 universal upgrade_minimal_64bit@uefi
URL: https://openqa.fedoraproject.org/tests/862693
ID: 862695  Test: aarch64 universal upgrade_server_domain_controller@uefi
URL: https://openqa.fedoraproject.org/tests/862695
ID: 862705  Test: aarch64 universal upgrade_2_realmd_client@uefi
URL: https://openqa.fedoraproject.org/tests/862705
ID: 862706  Test: aarch64 universal upgrade_realmd_client@uefi
URL: https://openqa.fedoraproject.org/tests/862706
ID: 862708  Test: x86_64 universal install_asian_language
URL: https://openqa.fedoraproject.org/tests/862708

Soft failed openQA tests: 6/127 (aarch64), 3/189 (x86_64)
(Tests completed, but using a workaround for a known bug)

New soft failures (same test not soft failed in Fedora-Rawhide-20210419.n.0):

ID: 862541  Test: aarch64 Server-dvd-iso install_vnc_client@uefi
URL: https://openqa.fedoraproject.org/tests/862541
ID: 862564  Test: aarch64 Workstation-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/862564

Old soft failures (same test soft failed in Fedora-Rawhide-20210419.n.0):

ID: 862399  Test: x86_64 Server-dvd-iso install_vncconnect_client
URL: https://openqa.fedoraproject.org/tests/862399
ID: 862440  Test: x86_64 Server-dvd-iso install_vnc_client
URL: https://openqa.fedoraproject.org/tests/862440
ID: 862497  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/862497
ID: 862503  Test: aarch64 Minimal-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/862503
ID: 862516  Test: aarch64 Server-dvd-iso install_vncconnect_client@uefi
URL: https://openqa.fedoraproject.org/tests/862516
ID: 862556  Test: aarch64 Server-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/862556
ID: 862578  Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/862578

Passed openQA tests: 175/189 (x86_64), 111/127 (aarch64)

New passes (same test not passed in Fedora-Rawhide-20210419.n.0):

ID: 862468  Test: x86_64 KDE-live-iso desktop_login
URL: https://openqa.fedoraproject.org/tests/862468
ID: 862518  Test: aarch64 Server-dvd-iso 
install_blivet_btrfs_preserve_home_uefi@uefi
URL: https://openqa.fedoraproject.org/tests/862518
ID: 862525  Test: aarch64 Server-dvd-iso install_vnc_server@uefi
URL: https://openqa.fedoraproject.org/tests/862525
ID: 862526  Test: aarch64 Server-dvd-iso 
server_freeipa_replication_master@uefi
URL: https://openqa.fedoraproject.org/tests/862526
ID: 862527  Test: aarch64 Server-dvd-iso 
server_freeipa_replication_replica@uefi
URL: https://openqa.fedoraproject.org/tests/

Re: [Fedocal] Reminder meeting : Prioritized bugs and issues

2021-04-20 Thread Ben Cotton
On Tue, Apr 20, 2021 at 7:06 AM  wrote:
>
> You are kindly invited to the meeting:
>Prioritized bugs and issues on 2021-04-21 from 11:00:00 to 12:00:00 
> America/Indiana/Indianapolis
>At fedora-meetin...@irc.freenode.net
>
The following bugs are on the agenda for tomorrow's meeting:

* Cpu usage very high until touchpad is touched ---
https://bugzilla.redhat.com/show_bug.cgi?id=1847627

* screen never reactivates after dimming or blanking ---
https://bugzilla.redhat.com/show_bug.cgi?id=1900890



-- 
Ben Cotton
He / Him / His
Senior Program Manager, Fedora & CentOS Stream
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Debuginfod By Default (Self-Contained Change proposal)

2021-04-20 Thread Frank Ch. Eigler

Hi -

Björn Persson writes:

> · How is it verified that files received from debuginfo servers have not
>   been tampered with?

Following up further to this, we're planning to add optional client-side
hash-verification of cached content, to provide some protection against
tampering:

https://sourceware.org/bugzilla/show_bug.cgi?id=27758

- FChE
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: wlroots 0.13.0 update for rawhide and f34

2021-04-20 Thread Artem Tim
Thank you for update. 'labwc' built 
https://koji.fedoraproject.org/koji/taskinfo?taskID=66343993
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-IoT-33-20210420.0 compose check report

2021-04-20 Thread Fedora compose checker
No missing expected images.

Failed openQA tests: 1/15 (aarch64)

Old failures (same test failed in Fedora-IoT-33-20210406.0):

ID: 863282  Test: aarch64 IoT-dvd_ostree-iso iot_clevis@uefi
URL: https://openqa.fedoraproject.org/tests/863282

Soft failed openQA tests: 1/16 (x86_64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-IoT-33-20210406.0):

ID: 863265  Test: x86_64 IoT-dvd_ostree-iso iot_clevis
URL: https://openqa.fedoraproject.org/tests/863265

Passed openQA tests: 15/16 (x86_64), 14/15 (aarch64)

Installed system changes in test x86_64 IoT-dvd_ostree-iso 
install_default_upload: 
System load changed from 0.29 to 0.11
Previous test data: https://openqa.fedoraproject.org/tests/845893#downloads
Current test data: https://openqa.fedoraproject.org/tests/863266#downloads
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Next for ARC - researching how to replace PDC

2021-04-20 Thread Kevin Fenzi
On Tue, Apr 20, 2021 at 04:57:34AM -0400, Neal Gompa wrote:
> 
> GNOME Software uses it:
> https://gitlab.gnome.org/GNOME/gnome-software/-/blob/master/plugins/fedora-pkgdb-collections/gs-plugin-fedora-pkgdb-collections.c
> 
> Absent of something better, Plasma Discover will too.

Thats actually not pdc. :) 

Thats a artisanally crafted static json file in the format the old pkgdb
used to publish.

But yes, it would be nice if whatever replaced pdc handled this case as
well. 

kevin


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: wlroots 0.13.0 update for rawhide and f34

2021-04-20 Thread Lyes Saadi

Rebuilt :)! Thank you for the update!

Le 19/04/2021 à 19:01, Aleksei Bavshin a écrit :

wlroots-0.13 is now available in rawhide.
The compatibility issues are resolved via `wlroots0.12` package which 
will be installed on update if there is anything that depends on 
`libwlroots.so.7`. No rebuilds are necessary.


If your package depends on the old wlroots API or hardware support, 
you may need to adjust build requirements to one of following:

    BuildRequires: pkgconfig(wlroots) = 0.12.0
    BuildRequires: (pkgconfig(wlroots) >= 0.12 with pkgconfig(wlroots) 
< 0.13)

for future builds.

---

@atim, @fnux, @lyessaadi, if you want to have new versions of 
cage/hikari/labwc to be available in f34 as a day 0 update, you are 
welcome to use the side-tag `f34-build-side-40158` (`fedpkg build 
--target=f34-build-side-40158`). Merge ETA is in 1 day.
Although in the case of hikari that might not work, as the side-tag 
does not contain libucl from `f34-updates-testing` :(



On 4/7/21 1:54 PM, Aleksei Bavshin wrote:

Greetings,

wlroots 0.13.0 and sway 1.6 have been released today. As usual, the 
update is API and ABI breaking and all dependent packages must be 
rebuilt. For all the dependents I identified either upstream patches 
or ETA for the new release and have successful copr builds.


I'm planning to create rawhide side-tag later today, rebuild all 
@sway-sig packages and send PRs with instructions to the packages I 
don't have access to. The side-tag will be merged in a week or when 
all the rebuilds are done.


I also plan to prepare a day 0 update for f34 once rawhide rebuilds 
are completed. Let me know if you have any concerns about that.


BCC: maintainer aliases for cage, labwc, phoc and wayfire




___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Fedora-34-20210420.n.0 compose check report

2021-04-20 Thread Fedora compose checker
Missing expected images:

Xfce raw-xz armhfp

Failed openQA tests: 2/189 (x86_64), 2/127 (aarch64)

New failures (same test not failed in Fedora-34-20210419.n.0):

ID: 862944  Test: x86_64 universal install_sata@uefi
URL: https://openqa.fedoraproject.org/tests/862944
ID: 863002  Test: aarch64 universal install_blivet_resize_lvm@uefi
URL: https://openqa.fedoraproject.org/tests/863002

Old failures (same test failed in Fedora-34-20210419.n.0):

ID: 862908  Test: x86_64 universal install_asian_language
URL: https://openqa.fedoraproject.org/tests/862908
ID: 862983  Test: aarch64 universal install_asian_language@uefi
URL: https://openqa.fedoraproject.org/tests/862983

Soft failed openQA tests: 6/127 (aarch64), 4/189 (x86_64)
(Tests completed, but using a workaround for a known bug)

New soft failures (same test not soft failed in Fedora-34-20210419.n.0):

ID: 863012  Test: aarch64 universal upgrade_2_server_domain_controller@uefi
URL: https://openqa.fedoraproject.org/tests/863012

Old soft failures (same test soft failed in Fedora-34-20210419.n.0):

ID: 862719  Test: x86_64 Server-dvd-iso install_vncconnect_client
URL: https://openqa.fedoraproject.org/tests/862719
ID: 862760  Test: x86_64 Server-dvd-iso install_vnc_client
URL: https://openqa.fedoraproject.org/tests/862760
ID: 862817  Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://openqa.fedoraproject.org/tests/862817
ID: 862823  Test: aarch64 Minimal-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/862823
ID: 862861  Test: aarch64 Server-dvd-iso install_vnc_client@uefi
URL: https://openqa.fedoraproject.org/tests/862861
ID: 862876  Test: aarch64 Server-raw_xz-raw.xz 
install_arm_image_deployment_upload@uefi
URL: https://openqa.fedoraproject.org/tests/862876
ID: 862898  Test: aarch64 Cloud_Base-qcow2-qcow2 cloud_autocloud@uefi
URL: https://openqa.fedoraproject.org/tests/862898
ID: 862957  Test: x86_64 universal upgrade_2_server_domain_controller
URL: https://openqa.fedoraproject.org/tests/862957
ID: 863362  Test: aarch64 Server-dvd-iso install_vncconnect_client@uefi
URL: https://openqa.fedoraproject.org/tests/863362

Passed openQA tests: 119/127 (aarch64), 182/189 (x86_64)

New passes (same test not passed in Fedora-34-20210419.n.0):

ID: 862839  Test: aarch64 Server-dvd-iso install_default_upload@uefi
URL: https://openqa.fedoraproject.org/tests/862839
ID: 862840  Test: aarch64 Server-dvd-iso server_cockpit_default@uefi
URL: https://openqa.fedoraproject.org/tests/862840
ID: 862842  Test: aarch64 Server-dvd-iso server_filesystem_default@uefi
URL: https://openqa.fedoraproject.org/tests/862842
ID: 862846  Test: aarch64 Server-dvd-iso 
server_freeipa_replication_master@uefi
URL: https://openqa.fedoraproject.org/tests/862846
ID: 862847  Test: aarch64 Server-dvd-iso 
server_freeipa_replication_replica@uefi
URL: https://openqa.fedoraproject.org/tests/862847
ID: 862848  Test: aarch64 Server-dvd-iso server_remote_logging_server@uefi
URL: https://openqa.fedoraproject.org/tests/862848
ID: 862849  Test: aarch64 Server-dvd-iso 
server_role_deploy_database_server@uefi
URL: https://openqa.fedoraproject.org/tests/862849
ID: 862850  Test: aarch64 Server-dvd-iso 
server_role_deploy_domain_controller@uefi
URL: https://openqa.fedoraproject.org/tests/862850
ID: 862852  Test: aarch64 Server-dvd-iso base_service_manipulation@uefi
URL: https://openqa.fedoraproject.org/tests/862852
ID: 862855  Test: aarch64 Server-dvd-iso realmd_join_sssd@uefi
URL: https://openqa.fedoraproject.org/tests/862855
ID: 862856  Test: aarch64 Server-dvd-iso base_reboot_unmount@uefi
URL: https://openqa.fedoraproject.org/tests/862856
ID: 862859  Test: aarch64 Server-dvd-iso release_identification@uefi
URL: https://openqa.fedoraproject.org/tests/862859
ID: 862862  Test: aarch64 Server-dvd-iso 
server_freeipa_replication_client@uefi
URL: https://openqa.fedoraproject.org/tests/862862
ID: 862863  Test: aarch64 Server-dvd-iso server_firewall_default@uefi
URL: https://openqa.fedoraproject.org/tests/862863
ID: 862864  Test: aarch64 Server-dvd-iso base_selinux@uefi
URL: https://openqa.fedoraproject.org/tests/862864
ID: 862865  Test: aarch64 Server-dvd-iso base_system_logging@uefi
URL: https://openqa.fedoraproject.org/tests/862865
ID: 862866  Test: aarch64 Server-dvd-iso modularity_tests@uefi
URL: https://openqa.fedoraproject.org/tests/862866
ID: 862867  Test: aarch64 Server-dvd-iso base_update_cli@uefi
URL: https://openqa.fedoraproject.org/tests/862867
ID: 862868  Test: aarch64 Server-dvd-iso server_cockpit_basic@uefi
URL: https://openqa.fedoraproject.org/tests/862868
ID: 862869  Test: aarch64 Server-dvd-iso base_services_start@uefi
URL: https://openqa.fedoraproject.org/tests/862869
ID: 862870  Test: aarch64 Server-dvd-iso realmd_join_cockpit@uefi
URL: https://openqa.fedoraproject.org/tests/862870
ID: 862871  Te

Fedora-IoT-34-20210420.0 compose check report

2021-04-20 Thread Fedora compose checker
No missing expected images.

Failed openQA tests: 1/15 (aarch64)

Old failures (same test failed in Fedora-IoT-34-20210418.0):

ID: 863382  Test: aarch64 IoT-dvd_ostree-iso iot_clevis@uefi
URL: https://openqa.fedoraproject.org/tests/863382

Soft failed openQA tests: 1/16 (x86_64)
(Tests completed, but using a workaround for a known bug)

Old soft failures (same test soft failed in Fedora-IoT-34-20210418.0):

ID: 863365  Test: x86_64 IoT-dvd_ostree-iso iot_clevis
URL: https://openqa.fedoraproject.org/tests/863365

Passed openQA tests: 15/16 (x86_64), 14/15 (aarch64)
-- 
Mail generated by check-compose:
https://pagure.io/fedora-qa/check-compose
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: Heads up, upcoming mass spec update to explicitly BuildRequire python3-setuptools

2021-04-20 Thread Victor Stinner
Congratulations, this change impacted tons of packages! That's also a
nice step towards more explicit build dependencies. I understood that
it's also the purpose of the pyproject.toml file ;-)

Victor

On Mon, Apr 19, 2021 at 2:39 PM Tomas Hrnciar  wrote:
>
> Hello everyone,
>
> we successfully pushed explicit python3-setuptools BuildRequire to all 
> affected packages. As mentioned in the Change proposal, there is no need to 
> rebuild them, it will be done together with Python 3.10. mass rebuild.
>
> Regards,
> Tomáš Hrnčiar
>
> On Fri, Mar 26, 2021 at 2:50 PM Tomas Hrnciar  wrote:
>>
>> Hello everyone,
>>
>> some of you might have already seen the F35 Change [0] we submitted last 
>> week.
>>
>> We are trying to reduce the number of Python packages unnecessarily 
>> Requiring python3-setuptools. If you are interested in technical details see 
>> the change proposal [1], there is a broad explanation of why we are doing 
>> this.
>>
>> If the change is approved by FESCo we plan to do the mass spec update that 
>> will add explicit BuildRequire on python3-setuptools for all affected 
>> packages. We'll try to make this addition consistent with the actual style 
>> used in the spec files, but nobody's perfect and there might be some 
>> discrepancies; so please, if your package is listed below, check this diff 
>> [2] to see how the change will look like. If you disagree with the way how 
>> the BuildRequires will be added, feel free to add it yourself in any other 
>> way you prefer before 2021-04-15. A push to the rawhide/main branch in 
>> dist-git is sufficient, no need to bump the release or rebuild the package.
>>
>> We plan to update the list of affected packages again before we actually do 
>> the change. If you wish to opt-out of this change entirely, please let us 
>> know by editing the change wiki page and moving your package into the 
>> "Packages to be ignored" section [3] before 2021-04-15. However, bear in 
>> mind that this will likely cause future failures to build from source if 
>> your package actually needs setuptools to build.
>>
>> Thank you for your cooperation.
>> Tomáš Hrnčiar
>>
>> [0] 
>> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/LGAUGOYHFKQXTS55IRWSIUVVAO3YHD5R/
>> [1] 
>> https://fedoraproject.org/wiki/Changes/Reduce_dependencies_on_python3-setuptools
>> [2] 
>> https://github.com/hrnciar/add-setuptools-buildrequire/compare/c082a1a...a60a447
>> [3] 
>> https://fedoraproject.org/wiki/Changes/Reduce_dependencies_on_python3-setuptools#Packages_to_be_ignored
>>
>> List of all affected packages:
>>
>> Maintainers by package:
>> 0ad  ignatenkobrain pcpa pwalter
>> OpenMolcas   jussilehtola
>> PyGreSQL hhorak jmlich odubaj panovotn pkubat praiskup
>> R2spec   pingou
>> ViTables tnorth zbyszek
>> ansible-review   dcallagh ttrinks
>> barman   slaanesh tsao
>> blender  design-sw hobbes1069 ignatenkobrain kwizart luya roma 
>> s4504kr slaanesh
>> btrfs-progs  ignatenkobrain josef ngompa sandeen
>> bumpversion  duriantang jdornak
>> calypso  rathann
>> cinchgreghellings
>> commissaire-client   mbarnes smilner
>> cppcheck c72578 jussilehtola sgrubb
>> cranclenkaseg
>> crudini  apevec jruzicka pbrady
>> cxxtest  mgieseki
>> datanommer   ralph
>> dlib bizdelnick luya
>> ec2-hibinit-agentdavdunc
>> electrum tredaell
>> fbthrift dcavalca filbranden salimma
>> fedora-messaging abompard
>> firefox  alexl caolanm erack gecko-maint jgrulich kalev kengert 
>> mbarnes rhughes rstrode sharkcz stransky tpopela ueno xhorak
>> follydcavalca filbranden salimma
>> fontforgefrixxon kevin pnemade
>> gajimmichich suraia
>> gau2grid jussilehtola
>> gfal2-python adev andreamanzi
>> gingalupinix
>> git-filter-repo  asn
>> gns3-gui kwizart
>> gns3-net-converter   kwizart
>> gns3-server  kwizart nucleo
>> gpsd fab mlichvar ttorling
>> h5py stevetraylen terjeros
>> khardmathstuf sdyroff
>> kismon   fab
>> koji ausil kevin mikem puiterwijk
>> lammps   ellio167 junghans
>> legofy   lkf williamjmorenor
>> libcaca  hubbitus slaanesh thias
>> libiptcdata  dcm hobbes1069 jchaloup
>> libnuml  sagitter
>> libreoffice  caolanm dtardon erack sbergmann
>> lldb airlied daveisfera jankratochvil sergesanspaille 
>> siddharths tstellar
>> llvm dmalcolm ignatenkobrain jakub jistone kyle scottt 
>> sergesanspaille siddharths tstellar
>> llvm10   sergesanspaille tstellar
>> llvm11   sergesanspaille tstellar
>> llvm7.0  jistone petersen se

Summary/Minutes from today's FESCo Meeting (2021-04-20)

2021-04-20 Thread Zbigniew Jędrzejewski-Szmek
= Discussed and Voted in the Ticket =

#2595 F35 Change: Erlang 24
https://pagure.io/fesco/issue/2595
APPROVED (+5, 0, 0)

= Meeting

Minutes: 
https://meetbot.fedoraproject.org/fedora-meeting/2021-04-20/fesco.2021-04-20-17.01.html
Minutes (text): 
https://meetbot.fedoraproject.org/fedora-meeting/2021-04-20/fesco.2021-04-20-17.01.txt
Log: 
https://meetbot.fedoraproject.org/fedora-meeting/2021-04-20/fesco.2021-04-20-17.01.log.html

Meeting summary
---
* init process  (zbyszek, 17:01:08)

* #2596 F35 Change: Switching Cyrus Sasl from BerkeleyDB to GDBM
  (zbyszek, 17:03:20)
  * LINK:

https://docs.google.com/spreadsheets/d/1z5eTSm3rtlKtEKPCxhI_wE861Xzg8kbvINWixSwQmLg/edit#gid=0
(dbelyavs, 17:12:25)
  * AGREED: APPROVED (+6, 0, 0)  (zbyszek, 17:31:09)
with the following qualification:
move cyrus-sasl db change contingency deadline to F35 branch date
(2021-08-10), add maybe/yes affected dependent packages to the
change proposal page for easier tracking, add test plan for
affected packages once changes land.

* #2597 F35 Change: Debuginfod By Default  (zbyszek, 17:31:40)
  * ACTION: dcantrell to raise the issue in a Council meeting  (zbyszek,
17:49:08)

* Next week's chair  (zbyszek, 18:07:27)
  * ACTION: sgallagh will chair next meeting  (sgallagh, 18:09:04)

* Open Floor  (sgallagh, 18:09:12)

Meeting ended at 18:11:27 UTC.




Action Items

* dcantrell to raise the issue in a Council meeting
* sgallagh will chair next meeting
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure


Re: F35 Change: Debuginfod By Default (Self-Contained Change proposal)

2021-04-20 Thread FUNG Chi Chuen Sampson
While trying to collect a backtrace for org.gnome.Tetravex, I got this in gdb:

===

Downloading separate debug info for /lib64/liblzma.so.5...
Download failed: Timer expired.  Continuing without debug info for 
/lib64/libbrotlicommon.so.1.
Missing separate debuginfo for /lib64/libbrotlicommon.so.1
Try: dnf --enablerepo='*debug*' install 
/usr/lib/debug/.build-id/0e/bb3270fdbf40dbe56ea79d6630ac594b897ffe.debug
Download failed: Timer expired.  Continuing without debug info for 
/lib64/libzstd.so.1.
Missing separate debuginfo for /lib64/libzstd.so.1
Try: dnf --enablerepo='*debug*' install 
/usr/lib/debug/.build-id/33/70d80a1bf749b3c2baaad0188c864ee9e4bbc4.debug
Downloading separate debug info for /lib64/liblz4.so.1...
Download failed: Timer expired.  Continuing without debug info for 
/home/fcc/.var/app/org.gnome.Tetravex/cache/debuginfod_client/a2429c266188acc10181f6936915f35274bb4a38/debuginfo.
Error while reading shared library symbols for /lib64/liblz4.so.1:
could not find '.gnu_debugaltlink' file for 
/home/fcc/.var/app/org.gnome.Tetravex/cache/debuginfod_client/a2429c266188acc10181f6936915f35274bb4a38/debuginfo
Downloading separate debug info for /lib64/libcap.so.2...

===

After running all the "Try" suggestions, the second run of gdb do not complain.

I wanted to know how I can collect the required backtrace so that I can attach 
it to the bugzilla entry to help developers to looking at the bug.

Thanks a lot!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure