Notification: Closure of Failed Compose Issues from Last Release Cycle - Fedora 41

2024-11-18 Thread Samyak Jain
Hello, folks! \0/

We will close all failed compose issues that occurred over the last
release cycle in the Pagure Failed Composes Repository[1]. This action
will result in email notifications for each issue.

Currently, there are  issues, meaning  email notifications
will be triggered. To avoid inconvenience, we kindly suggest the
following:

- Set up a filter in your email client to automatically sort/clean or
archive these notifications.
- Temporarily mute notifications for this repository, if preferred.

We sincerely apologize for the volume of notifications this action may
generate and appreciate your understanding as we maintain a clean and
efficient repository.

Thank you for your cooperation.

Best regards,
Samyak Jain
Fedora Release Engineering Team

[1] https://pagure.io/releng/failed-composes/issues
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Non-responsive maintainer check for lbazan (Luis Enrique Bazan De Leon)

2024-11-18 Thread Wolfgang Ulbrich
Can you poke him again please? I see no reaction on bugreport 
https://bugzilla.redhat.com/show_bug.cgi?id=2184181
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Take ownership of golang-github-petermattis-goid

2024-11-18 Thread Kai A. Hiller

Hello,

I want to take ownership of /golang-github-petermattis-goid/. It got 
retied, because it was orphaned for 6+ weeks. The re-review bug is 
https://bugzilla.redhat.com/show_bug.cgi?id=2326926


Best wishes
Kai
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Non-responsive maintainer check for lbazan (Luis Enrique Bazan De Leon)

2024-11-18 Thread Wolfgang Ulbrich
Can you poke him again please. I see no reaction from him.
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


find-debuginfo failing with objcopy Permission denied error

2024-11-18 Thread Richard W.M. Jones
This is a weird one:

https://koji.fedoraproject.org/koji/taskinfo?taskID=125988419

+ /usr/bin/find-debuginfo -j48 --strict-build-id -m -i --build-id-seed 
1.55.2-1.fc42 --unique-debug-suffix -1.55.2-1.fc42.x86_64 
--unique-debug-src-base libguestfs-1.55.2-1.fc42.x86_64 --run-dwz 
--dwz-low-mem-die-limit 1000 --dwz-max-die-limit 11000 -S 
debugsourcefiles.list 
/builddir/build/BUILD/libguestfs-1.55.2-build/libguestfs-1.55.2
find-debuginfo: starting
Extracting debug info from 13 files
objcopy: unable to copy file 
'/builddir/build/BUILD/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so';
 reason: Permission denied
*** ERROR:: GDB exited with exit status 1 during index generation

The same thing happens on each architecture, for the same file.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-builder quickly builds VMs from scratch
http://libguestfs.org/virt-builder.1.html

-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: find-debuginfo failing with objcopy Permission denied error

2024-11-18 Thread Kevin Fenzi
On Mon, Nov 18, 2024 at 03:35:38PM +, Richard W.M. Jones wrote:
> On Mon, Nov 18, 2024 at 03:16:13PM +, Richard W.M. Jones wrote:
> > This is a weird one:
> > 
> > https://koji.fedoraproject.org/koji/taskinfo?taskID=125988419
> > 
> > + /usr/bin/find-debuginfo -j48 --strict-build-id -m -i --build-id-seed 
> > 1.55.2-1.fc42 --unique-debug-suffix -1.55.2-1.fc42.x86_64 
> > --unique-debug-src-base libguestfs-1.55.2-1.fc42.x86_64 --run-dwz 
> > --dwz-low-mem-die-limit 1000 --dwz-max-die-limit 11000 -S 
> > debugsourcefiles.list 
> > /builddir/build/BUILD/libguestfs-1.55.2-build/libguestfs-1.55.2
> > find-debuginfo: starting
> > Extracting debug info from 13 files
> > objcopy: unable to copy file 
> > '/builddir/build/BUILD/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so';
> >  reason: Permission denied
> > *** ERROR:: GDB exited with exit status 1 during index generation
> 
> I managed to reproduce this locally.  The file permissions look
> normal, albeit the file is write-protected:
> 
> -r-xr-xr-x. 1 rjones rjones 2885944 Nov 18 15:22 
> /home/rjones/d/fedora/libguestfs/rawhide/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so
> 
> I patched gdb-add-index to print the exact command which fails, and
> that is:
> 
> + objcopy --add-section 
> .gdb_index=/home/rjones/d/fedora/libguestfs/rawhide/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so.gdb-index
>  --set-section-flags .gdb_index=readonly 
> /home/rjones/d/fedora/libguestfs/rawhide/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so
>  
> /home/rjones/d/fedora/libguestfs/rawhide/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so
> objcopy: unable to copy file 
> '/home/rjones/d/fedora/libguestfs/rawhide/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so';
>  reason: Permission denied
> 
> It seems like it is trying to update the file in place, which is
> interesting.  Is that allowed?  Anyway as the permissions of the file
> are 0555 it won't be able to do that.  Is this a recent change in
> behaviour?

Perhaps the same thing as this thread:
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/GG4LQYBEKGWAGFSJ5PKTKJAOHLAB3A27/#QYIK5E642MDB4NGBXLRLLTMU7HAJOVV5

ie, debugedit 5.1?

kevin


signature.asc
Description: PGP signature
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Bodhi 8.2 in production: changes to karma requirements

2024-11-18 Thread Adam Williamson
On Mon, 2024-11-18 at 11:49 +, Zbigniew Jędrzejewski-Szmek wrote:
> 
> If there is something that the policy text says that is stronger than
> what Bodhi requires, then we should update the policy text immediately.

As of now there is not, because in 8.2 I made the tool to implement
what the policy says, which is the way around things ought to be. :D
Before 8.2, this was the case, yes.
-- 
Adam Williamson (he/him/his)
Fedora QA
Fedora Chat: @adamwill:fedora.im | Mastodon: @ad...@fosstodon.org
https://www.happyassassin.net




-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: find-debuginfo failing with objcopy Permission denied error

2024-11-18 Thread Richard W.M. Jones
On Mon, Nov 18, 2024 at 03:16:13PM +, Richard W.M. Jones wrote:
> This is a weird one:
> 
> https://koji.fedoraproject.org/koji/taskinfo?taskID=125988419
> 
> + /usr/bin/find-debuginfo -j48 --strict-build-id -m -i --build-id-seed 
> 1.55.2-1.fc42 --unique-debug-suffix -1.55.2-1.fc42.x86_64 
> --unique-debug-src-base libguestfs-1.55.2-1.fc42.x86_64 --run-dwz 
> --dwz-low-mem-die-limit 1000 --dwz-max-die-limit 11000 -S 
> debugsourcefiles.list 
> /builddir/build/BUILD/libguestfs-1.55.2-build/libguestfs-1.55.2
> find-debuginfo: starting
> Extracting debug info from 13 files
> objcopy: unable to copy file 
> '/builddir/build/BUILD/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so';
>  reason: Permission denied
> *** ERROR:: GDB exited with exit status 1 during index generation

I managed to reproduce this locally.  The file permissions look
normal, albeit the file is write-protected:

-r-xr-xr-x. 1 rjones rjones 2885944 Nov 18 15:22 
/home/rjones/d/fedora/libguestfs/rawhide/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so

I patched gdb-add-index to print the exact command which fails, and
that is:

+ objcopy --add-section 
.gdb_index=/home/rjones/d/fedora/libguestfs/rawhide/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so.gdb-index
 --set-section-flags .gdb_index=readonly 
/home/rjones/d/fedora/libguestfs/rawhide/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so
 
/home/rjones/d/fedora/libguestfs/rawhide/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so
objcopy: unable to copy file 
'/home/rjones/d/fedora/libguestfs/rawhide/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so';
 reason: Permission denied

It seems like it is trying to update the file in place, which is
interesting.  Is that allowed?  Anyway as the permissions of the file
are 0555 it won't be able to do that.  Is this a recent change in
behaviour?

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-p2v converts physical machines to virtual machines.  Boot with a
live CD or over the network (PXE) and turn machines into KVM guests.
http://libguestfs.org/virt-v2v

-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


RamaLama is now packaged up for Fedora.

2024-11-18 Thread Daniel Walsh
RamaLama is now available as a package for Fedora 40,41 and Rawhide. 
python-ramalama.


dnf install ramalama

You can also install it via pip/pipx from PyPi.

Try it out for your AI Inferencing needs.

github.com/containers/ramalama
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Findings by static analyzers in Fedora 42 Critical Path Packages

2024-11-18 Thread František Šumšal

Right after I sent this I got a response [0] to the gcc bug and turns out that 
the culprit is disabled LTO. And indeed, if I build systemd with `-fanalyzer 
-flto=auto`, (almost) all reports disappear:

With just -fanalyzer (meson setup build -Dc_args="-fanalyzer"):
$ grep warning: log-fanalyzer.txt | wc -l
1519

With -fanalyzer -lto=auto (meson setup build -Dc_args="-fanalyzer -lto=auto"):
$ grep warning: log-fanalyzer-lto.txt | wc -l
1

The LTO is being disabled in the csgcca wrapper since [1] because of some 
issues between -fanalyzer and LTO, but looks like disabling it has some 
disadvantages as well (not sure if they outweigh the advantages, I tested this 
only on systemd so far).

[0] https://gcc.gnu.org/bugzilla/show_bug.cgi?id=117662#c2
[1] 
https://github.com/csutils/cscppc/commit/d8d49b4cc92e0109b2654e9034c85e169bdc0566

On 11/18/24 18:25, František Šumšal wrote:

Hey,

Thank you for doing this!

I started taking apart systemd findings and reported a first issue against gcc 
[0], so we can hopefully squash the false positives from the results (at least 
the ones repored by gcc's -fanalyzer) and make them more useful.

One thing that comes to mind (especially after the battle in [1]): how does the 
gcc's -fanalyzer handle optimized builds? In Fedora we currently (IIRC) build 
with -O2, and if I do a systemd build locally with both -O0 and -O2, the latter 
one generates more warnings. There's also several notes in the official 
documentation [2] that some of the checks might not work when optimizations are 
enabled, since the analyzer runs quite late in the compilation process. Which 
also raises question - does optimization make -fanalyzer more prone to false 
positives? And does it make the findings less accurate?

Cheers,
Frantisek

[0] https://gcc.gnu.org/bugzilla/show_bug.cgi?id=117662
[1] https://github.com/csutils/cscppc/issues/46
[2] https://gcc.gnu.org/onlinedocs/gcc/Static-Analyzer-Options.html


On 11/14/24 08:47, Siteshwar Vashisht wrote:

Hello,

I am writing this message to get feedback from the community on new
findings by static analyzers in Critical Path Packages that have
changed in Fedora 42.

TLDR: This report[1] contains 37330 findings. Please review the report
and provide feedback.

A mass scan was performed this week on the packages that have changed
in Fedora 42. This report[1] contains all the new findings that have
been identified in the packages listed in Critical Path Packages.
Newly added findings since Fedora 41 are listed under ‘+’ column.
Please review the report and fix or report any findings upstream that
may be real bugs. Not all findings reported by OpenScanHub may be
actual bugs, so please verify reported findings before investing time
into fixing or reporting them. We hope this is helpful for the
packages you maintain and for the upstream projects. Questions can be
asked on the OpenScanHub mailing list[2]. If you want to see the full
logs of the scans, they are available on the tasks[3] page. User
documentation for performing a scan is available on the Fedora
wiki[4].

Constructive feedback is appreciated. Thank you!

[1] https://svashisht.fedorapeople.org/openscanhub/mass-scans/f42-13-Nov-2024/
[2] 
https://lists.fedoraproject.org/archives/list/openscan...@lists.fedoraproject.org/
[3] https://openscanhub.fedoraproject.org/task/
[4] https://fedoraproject.org/wiki/OpenScanHub







--
Frantisek Sumsal
GPG key ID: 0xFB738CE27B634E4B
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: ABI change in ImageMagick

2024-11-18 Thread Peter Pentchev
On Mon, Nov 18, 2024 at 09:17:48AM +0100, Remi Collet wrote:
> Le 16/11/2024 à 22:46, Peter Pentchev a écrit :
> 
> > Hm, ICBW, but, at least to me, this enum change looks like an actual
> > breaking ABI (not API) change. If a program was compiled to call that
> > function with the SentinelFilter value, the program code would pass
> > 32 as a parameter and invoke the function. If loaded with the new
> > version of the library, this would cause the function to assume that
> > the caller wanted to pass MagicKernelSharp2013Filter and... do something
> > unexpected.
> 
> No, SentinelFilter is a special value keeping track of first free value
> A program will never use this in an arg call (OK name is confusing)
> 
> Typical usage
> 
>   if (filter < SentinelFilter) {
>   SetResampleFilter(RF, filter);
>   } else {
>   printf("Bad filter value\n");
>   exit(1);
>   }

Ahh, okay. Thanks a lot for the explanation!

This only leaves one possible case for confusion: a user of the library
that somehow sees a now-valid value and compares it against their
"remembered" value for SentinelFilter, e.g. a callback or something.
But this seems to be a bit of a reach, so yeah, thanks again for
clearing this up, and sorry for stepping in uninformed :)

> Notice: the bad map change have been reverted,
> so 7.1.1-41 is OK with same ABI than 7.1.1-39

G'luck,
Peter

-- 
Peter Pentchev  r...@ringlet.net r...@debian.org pe...@morpheusly.com
PGP key:https://www.ringlet.net/roam/roam.key.asc
Key fingerprint 2EE7 A7A5 17FC 124C F115  C354 651E EFB0 2527 DF13


signature.asc
Description: PGP signature
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Obtaining the RPM_ARCH etc. environment variables

2024-11-18 Thread Sérgio Basto
On Mon, 2024-11-18 at 09:19 +0100, Florian Weimer wrote:
> Is
> 
>   eval `rpm --eval %___build_pre_env`
> 
> the canonical way to obtain definitions of these environment
> variables,
> or is there a better alternative?
> 

from https://bugzilla.redhat.com/show_bug.cgi?id=2043092#c80

to the "official" documentation, is in
/usr/lib/rpm/macros.d/macros.package-notes-srpm or at
https://src.fedoraproject.org/rpms/package-notes/raw/rawhide/f/macros.package-notes-srpm



> Thanks,
> Florian
> 

-- 
Sérgio M. B.
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Fedora rawhide compose report: 20241118.n.0 changes

2024-11-18 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20241117.n.0
NEW: Fedora-Rawhide-20241118.n.0

= SUMMARY =
Added images:0
Dropped images:  3
Added packages:  3
Dropped packages:0
Upgraded packages:   67
Downgraded packages: 0

Size of added packages:  2.65 MiB
Size of dropped packages:0 B
Size of upgraded packages:   209.27 MiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   -245.53 KiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =

= DROPPED IMAGES =
Image: Silverblue dvd-ostree x86_64
Path: 
Silverblue/x86_64/iso/Fedora-Silverblue-ostree-x86_64-Rawhide-20241117.n.0.iso
Image: Kinoite dvd-ostree aarch64
Path: Kinoite/aarch64/iso/Fedora-Kinoite-ostree-aarch64-Rawhide-20241117.n.0.iso
Image: Onyx dvd-ostree x86_64
Path: Onyx/x86_64/iso/Fedora-Onyx-ostree-x86_64-Rawhide-20241117.n.0.iso

= ADDED PACKAGES =
Package: python-eth-rlp-2.1.0-1.fc42
Summary: RLP definitions for common Ethereum objects in Python
RPMs:python3-eth-rlp
Size:15.13 KiB

Package: python-flask-sqlalchemy-lite-0.1.0-2
Summary: Adds SQLAlchemy support to Flask application
RPMs:python3-flask-sqlalchemy-lite
Size:23.31 KiB

Package: python-pyogrio-0.10.0-2.fc42
Summary: Vectorized spatial vector file format I/O using GDAL/OGR
RPMs:python3-pyogrio
Size:2.61 MiB


= DROPPED PACKAGES =

= UPGRADED PACKAGES =
Package:  antimicrox-3.5.0-1.fc42
Old package:  antimicrox-3.4.1-2.fc42
Summary:  Graphical program used to map keyboard buttons and mouse controls 
to a gamepad
RPMs: antimicrox
Size: 4.08 MiB
Size change:  1.03 KiB
Changelog:
  * Sun Nov 17 2024 Gergely Gombos  - 3.5.0-1
  - 3.5.0


Package:  cctz-2.4-1.fc42
Old package:  cctz-2.3-15.fc41
Summary:  Translating between absolute and civil times using time zone rules
RPMs: cctz cctz-devel
Size: 563.43 KiB
Size change:  36.29 KiB
Changelog:
  * Mon Nov 18 2024 Elliott Sales de Andrade  - 2.4-1
  - Update to latest version (#2264604)


Package:  cobbler-3.3.7-1.fc42
Old package:  cobbler-3.3.6-2.fc42
Summary:  Boot server configurator
RPMs: cobbler cobbler-selinux cobbler-tests cobbler-tests-containers
Size: 1.03 MiB
Size change:  3.61 KiB
Changelog:
  * Sun Nov 17 2024 Orion Poplawski  - 3.3.7-1
  - Update to 3.3.7 (CVE-2024-47533)


Package:  golang-github-aws-smithy-1.22.1-1.fc42
Old package:  golang-github-aws-smithy-1.22.0-1.fc42
Summary:  Smithy code generators for Go (in development)
RPMs: golang-github-aws-smithy-devel
Size: 237.38 KiB
Size change:  83 B
Changelog:
  * Fri Nov 15 2024 Packit  - 1.22.1-1
  - Update to 1.22.1 upstream release
  - Resolves: rhbz#2326619


Package:  golang-github-projectdiscovery-ratelimit-0.0.62-1.fc42
Old package:  golang-github-projectdiscovery-ratelimit-0.0.61-1.fc42
Summary:  A Golang blocking rate limit implementation
RPMs: golang-github-projectdiscovery-ratelimit-devel
Size: 17.46 KiB
Size change:  110 B
Changelog:
  * Sun Nov 17 2024 Packit  - 0.0.62-1
  - Update to 0.0.62 upstream release
  - Resolves: rhbz#2326720


Package:  jrnl-4.2-2.fc42
Old package:  jrnl-4.1-12.fc42
Summary:  Collect your thoughts and notes without leaving the command line
RPMs: jrnl
Size: 228.78 KiB
Size change:  5.13 KiB
Changelog:
  * Mon Nov 18 2024 Benjamin A. Beasley  - 4.2-1
  - Update to 4.2 (close RHBZ#2326878)

  * Mon Nov 18 2024 Benjamin A. Beasley  - 4.2-2
  - F41+: No longer need Obsoletes for the -doc package


Package:  kwin-6.2.3-2.fc42
Old package:  kwin-6.2.3-1.fc42
Summary:  KDE Window manager
RPMs: kwin kwin-common kwin-devel kwin-doc kwin-libs kwin-wayland
Size: 38.77 MiB
Size change:  -37.69 KiB
Changelog:
  * Sun Nov 17 2024 Alessandro Astone  - 6.2.3-2
  - Backport fix for keyboard focus after using the task switcher
https://bugs.kde.org/show_bug.cgi?id=495844
https://bugs.kde.org/show_bug.cgi?id=491398


Package:  libheif-1.19.3-3.fc42
Old package:  libheif-1.17.6-2.fc41
Summary:  HEIF and AVIF file format decoder and encoder
RPMs: heif-pixbuf-loader libheif libheif-devel libheif-tools
Size: 3.18 MiB
Size change:  850.02 KiB
Changelog:
  * Tue Nov 12 2024 Dominik Mierzejewski  - 1.19.3-1
  - update to 1.19.3 (resolves rhbz#2295525)
  - drop obsolete patches
  - enable OpenH264, OpenJPH (64-bit only) and Brotli decoders
  - run tests unconditionally, they no longer require special build options
  - drop conditional hevc subpackage
  - use fewer wildcards in the file lists
  - stop building rav1e and svt AV1 encoders as plugins

  * Sat Nov 16 2024 S??rgio Basto  - 1.19.3-2
  - Add support to multilib in devel sub-package
  - Resolves: rhbz#2279891

  * Sun Nov 17 2024 Dominik Mierzejewski  - 1.19.3-3
  - disable OpenJPH encoder support to work-around crashes


Package:  mingw-directxmath-3.20-1.fc42
Old package:  mingw-directxmath-3.19-2.fc41

Fedora eln compose report: 20241119.n.0 changes

2024-11-18 Thread Fedora ELN Report
OLD: Fedora-eln-20241118.n.0
NEW: Fedora-eln-20241119.n.0

= SUMMARY =
Added images:0
Dropped images:  0
Added packages:  0
Dropped packages:1
Upgraded packages:   29
Downgraded packages: 0

Size of added packages:  0 B
Size of dropped packages:484.52 KiB
Size of upgraded packages:   1.83 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   -3.37 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =

= DROPPED IMAGES =

= ADDED PACKAGES =

= DROPPED PACKAGES =
Package: openjph-0.18.0-1.eln143
Summary: Open-source implementation of JPEG2000 Part-15 (or JPH or HTJ2K)
RPMs:libopenjph
Size:484.52 KiB


= UPGRADED PACKAGES =
Package:  annobin-12.77-1.eln143
Old package:  annobin-12.75-1.eln143
Summary:  Annotate and examine compiled binary files
RPMs: annobin-annocheck annobin-docs annobin-libannocheck 
annobin-plugin-clang annobin-plugin-gcc annobin-plugin-llvm
Size: 5.44 MiB
Size change:  22.43 KiB
Changelog:
  * Fri Nov 15 2024 Nick Clifton   - 12.76-1
  - Annocheck: Rename rwx-seg test to load-segments.  Add more checks.  Add 
check for gaps as a future fail.
  - Annocheck: Add --no-allow-excpetions to disable exceptions for known 
special binaries.
  - Annocheck: Add --enable-future to enable future fail components in normal 
tests.
  - Annocheck: Fix bug preventing the inclusion of the rpm name in reports.

  * Fri Nov 15 2024 Nick Clifton   - 12.77-1
  - Annocheck: Fix overly long debug messages.


Package:  bodhi-client-8.2.0-2.eln143
Old package:  bodhi-client-8.2.0-1.eln143
Summary:  Bodhi client
RPMs: bodhi-client
Size: 90.62 KiB
Size change:  172 B
Changelog:
  * Mon Nov 11 2024 Carl George  - 8.2.0-2
  - Correctly mark COPYING file as a license
  - Remove unnecessary pytest-cov build requirement


Package:  clevis-21-7.eln143
Old package:  clevis-21-6.eln143
Summary:  Automated decryption framework
RPMs: clevis clevis-dracut clevis-luks clevis-pin-pkcs11 clevis-systemd 
clevis-udisks2
Size: 599.65 KiB
Size change:  2.91 KiB
Changelog:
  * Tue Nov 12 2024 Sergio Arroutbi  - 21-7
  - tpm2: use first PCR algorithm bank supported


Package:  egl-wayland-1.1.17^20241118giteeb29e1-5.eln143
Old package:  egl-wayland-1.1.17^20241101git218f678-4.eln143
Summary:  EGLStream-based Wayland external platform
RPMs: egl-wayland egl-wayland-devel
Size: 248.94 KiB
Size change:  1.16 KiB
Changelog:
  * Mon Nov 18 2024 Simone Caronni  - 
1.1.17^20241118giteeb29e1-5
  - Update to latest snapshot.


Package:  evolution-data-server-3.54.1-2.eln143
Old package:  evolution-data-server-3.54.1-1.eln143
Summary:  Backend data server for Evolution
RPMs: evolution-data-server evolution-data-server-devel 
evolution-data-server-doc evolution-data-server-langpacks 
evolution-data-server-perl evolution-data-server-tests
Size: 18.04 MiB
Size change:  -99.41 KiB
Changelog:
  * Mon Nov 18 2024 Adam Williamson  - 3.54.1-2
  - Backport MR #166 to fix build with GTK 4.17+
  - Rebuild for libphonenumber 8.13.50


Package:  guestfs-tools-1.53.5-1.eln143
Old package:  guestfs-tools-1.53.4-1.eln143
Summary:  Tools to access and modify virtual machine disk images
RPMs: guestfs-tools virt-win-reg
Size: 15.06 MiB
Size change:  17.80 KiB
Changelog:
  * Mon Nov 18 2024 Richard W.M. Jones  - 1.53.5-1
  - New upstream development version 1.53.5


Package:  kernel-6.12.0-65.eln143
Old package:  kernel-6.12.0-0.rc7.20241115gitcfaaa7d010d1.62.eln143
Summary:  The Linux kernel
RPMs: bpftool kernel kernel-64k kernel-64k-core kernel-64k-debug 
kernel-64k-debug-core kernel-64k-debug-devel kernel-64k-debug-devel-matched 
kernel-64k-debug-modules kernel-64k-debug-modules-core 
kernel-64k-debug-modules-extra kernel-64k-devel kernel-64k-devel-matched 
kernel-64k-modules kernel-64k-modules-core kernel-64k-modules-extra 
kernel-64k-uki-virt kernel-64k-uki-virt-addons kernel-abi-stablelists 
kernel-core kernel-cross-headers kernel-debug kernel-debug-core 
kernel-debug-devel kernel-debug-devel-matched kernel-debug-modules 
kernel-debug-modules-core kernel-debug-modules-extra kernel-debug-uki-virt 
kernel-debug-uki-virt-addons kernel-devel kernel-devel-matched kernel-doc 
kernel-headers kernel-modules kernel-modules-core kernel-modules-extra 
kernel-rt kernel-rt-core kernel-rt-debug kernel-rt-debug-core 
kernel-rt-debug-devel kernel-rt-debug-kvm kernel-rt-debug-modules 
kernel-rt-debug-modules-core kernel-rt-debug-modules-extra kernel-rt-devel 
kernel-rt-kvm kernel-rt-modules kernel-rt-modules-core kernel-rt-modules-extra 
kernel-tools kernel-tools-libs kernel-tools-libs-devel kernel-uki-virt 
kernel-uki-virt-addons kernel-zfcpdump kernel-zfcpdump-core 
kernel-zfcpdump-devel kernel-zfcpdump-devel-matched kernel-zfcpdump-modules 
kernel-zfcpdump-modules-core kernel-zfcpdump-modules-extra libperf

Re: find-debuginfo failing with objcopy Permission denied error

2024-11-18 Thread Richard W.M. Jones
On Mon, Nov 18, 2024 at 07:50:38AM -0800, Kevin Fenzi wrote:
> On Mon, Nov 18, 2024 at 03:35:38PM +, Richard W.M. Jones wrote:
> > On Mon, Nov 18, 2024 at 03:16:13PM +, Richard W.M. Jones wrote:
> > > This is a weird one:
> > > 
> > > https://koji.fedoraproject.org/koji/taskinfo?taskID=125988419
> > > 
> > > + /usr/bin/find-debuginfo -j48 --strict-build-id -m -i --build-id-seed 
> > > 1.55.2-1.fc42 --unique-debug-suffix -1.55.2-1.fc42.x86_64 
> > > --unique-debug-src-base libguestfs-1.55.2-1.fc42.x86_64 --run-dwz 
> > > --dwz-low-mem-die-limit 1000 --dwz-max-die-limit 11000 -S 
> > > debugsourcefiles.list 
> > > /builddir/build/BUILD/libguestfs-1.55.2-build/libguestfs-1.55.2
> > > find-debuginfo: starting
> > > Extracting debug info from 13 files
> > > objcopy: unable to copy file 
> > > '/builddir/build/BUILD/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so';
> > >  reason: Permission denied
> > > *** ERROR:: GDB exited with exit status 1 during index generation
> > 
> > I managed to reproduce this locally.  The file permissions look
> > normal, albeit the file is write-protected:
> > 
> > -r-xr-xr-x. 1 rjones rjones 2885944 Nov 18 15:22 
> > /home/rjones/d/fedora/libguestfs/rawhide/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so
> > 
> > I patched gdb-add-index to print the exact command which fails, and
> > that is:
> > 
> > + objcopy --add-section 
> > .gdb_index=/home/rjones/d/fedora/libguestfs/rawhide/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so.gdb-index
> >  --set-section-flags .gdb_index=readonly 
> > /home/rjones/d/fedora/libguestfs/rawhide/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so
> >  
> > /home/rjones/d/fedora/libguestfs/rawhide/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so
> > objcopy: unable to copy file 
> > '/home/rjones/d/fedora/libguestfs/rawhide/libguestfs-1.55.2-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so';
> >  reason: Permission denied
> > 
> > It seems like it is trying to update the file in place, which is
> > interesting.  Is that allowed?  Anyway as the permissions of the file
> > are 0555 it won't be able to do that.  Is this a recent change in
> > behaviour?
> 
> Perhaps the same thing as this thread:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/GG4LQYBEKGWAGFSJ5PKTKJAOHLAB3A27/#QYIK5E642MDB4NGBXLRLLTMU7HAJOVV5

The symptoms look the same.  This prompted me to go back to the last
successful libguestfs build to see if the same command failed but the
failure was ignored, and yes that's exactly what happened:

https://koji.fedoraproject.org/koji/buildinfo?buildID=2573135
https://kojipkgs.fedoraproject.org//packages/libguestfs/1.55.1/1.fc42/data/logs/x86_64/build.log

...
Extracting debug info from 13 files
objcopy: unable to copy file 
'/builddir/build/BUILD/libguestfs-1.55.1-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so';
 reason: Permission denied
objcopy: unable to copy file 
'/builddir/build/BUILD/libguestfs-1.55.1-build/BUILDROOT/usr/lib64/perl5/vendor_perl/auto/Sys/Guestfs/Guestfs.so';
 reason: Permission denied
DWARF-compressing 13 files
...

> ie, debugedit 5.1?

Yes it's this version.

I added this patch which fixed local builds, but it feels wrong somehow ...

diff --git a/libguestfs.spec b/libguestfs.spec
index 1ca2b3a..aa4d4f8 100644
--- a/libguestfs.spec
+++ b/libguestfs.spec
@@ -802,6 +802,10 @@ find $RPM_BUILD_ROOT -name .packlist -delete
 find $RPM_BUILD_ROOT -name '*.bs' -delete
 find $RPM_BUILD_ROOT -name 'bindtests.pl' -delete
 
+# debuginfo generation fails with debugedit >= 5.1 unless the files
+# are writable:
+find $RPM_BUILD_ROOT -name Guestfs.so -exec chmod u+w {} \;
+
 # golang: Ignore what libguestfs upstream installs, and just copy the
 # source files to %%{_datadir}/gocode/src.
 %ifarch %{golang_arches}

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
nbdkit - Flexible, fast NBD server with plugins
https://gitlab.com/nbdkit/nbdkit

-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Findings by static analyzers in Fedora 42 Critical Path Packages

2024-11-18 Thread František Šumšal

Hey,

Thank you for doing this!

I started taking apart systemd findings and reported a first issue against gcc 
[0], so we can hopefully squash the false positives from the results (at least 
the ones repored by gcc's -fanalyzer) and make them more useful.

One thing that comes to mind (especially after the battle in [1]): how does the 
gcc's -fanalyzer handle optimized builds? In Fedora we currently (IIRC) build 
with -O2, and if I do a systemd build locally with both -O0 and -O2, the latter 
one generates more warnings. There's also several notes in the official 
documentation [2] that some of the checks might not work when optimizations are 
enabled, since the analyzer runs quite late in the compilation process. Which 
also raises question - does optimization make -fanalyzer more prone to false 
positives? And does it make the findings less accurate?

Cheers,
Frantisek

[0] https://gcc.gnu.org/bugzilla/show_bug.cgi?id=117662
[1] https://github.com/csutils/cscppc/issues/46
[2] https://gcc.gnu.org/onlinedocs/gcc/Static-Analyzer-Options.html


On 11/14/24 08:47, Siteshwar Vashisht wrote:

Hello,

I am writing this message to get feedback from the community on new
findings by static analyzers in Critical Path Packages that have
changed in Fedora 42.

TLDR: This report[1] contains 37330 findings. Please review the report
and provide feedback.

A mass scan was performed this week on the packages that have changed
in Fedora 42. This report[1] contains all the new findings that have
been identified in the packages listed in Critical Path Packages.
Newly added findings since Fedora 41 are listed under ‘+’ column.
Please review the report and fix or report any findings upstream that
may be real bugs. Not all findings reported by OpenScanHub may be
actual bugs, so please verify reported findings before investing time
into fixing or reporting them. We hope this is helpful for the
packages you maintain and for the upstream projects. Questions can be
asked on the OpenScanHub mailing list[2]. If you want to see the full
logs of the scans, they are available on the tasks[3] page. User
documentation for performing a scan is available on the Fedora
wiki[4].

Constructive feedback is appreciated. Thank you!

[1] https://svashisht.fedorapeople.org/openscanhub/mass-scans/f42-13-Nov-2024/
[2] 
https://lists.fedoraproject.org/archives/list/openscan...@lists.fedoraproject.org/
[3] https://openscanhub.fedoraproject.org/task/
[4] https://fedoraproject.org/wiki/OpenScanHub




--
Frantisek Sumsal
GPG key ID: 0xFB738CE27B634E4B
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Bodhi 8.2 in production: changes to karma requirements

2024-11-18 Thread Mattia Verga via devel
Il 18/11/24 16:34, Adam Williamson ha scritto:
> On Mon, 2024-11-18 at 11:49 +, Zbigniew Jędrzejewski-Szmek wrote:
>> If there is something that the policy text says that is stronger than
>> what Bodhi requires, then we should update the policy text immediately.
> As of now there is not, because in 8.2 I made the tool to implement
> what the policy says, which is the way around things ought to be. :D
> Before 8.2, this was the case, yes.
> --
> Adam Williamson (he/him/his)
> Fedora QA
> Fedora Chat: @adamwill:fedora.im | Mastodon: @ad...@fosstodon.org
> https://www.happyassassin.net
>
I tried to summarize currently applied settings in a table:

https://docs.google.com/spreadsheets/d/1pPdWOX7YKSu-6pF6-20V7nECRdrHyj6xr4YEV54f_qo/edit?usp=sharing

Where settings are absent, defaults are used.
The idea is: an update can be pushed to stable either manually or 
automatically only after , or before if it 
reaches . Autopush settings can be equal or greater.

What is reported as "Stable by karma" in the Update page is just the 
autopush setting. Which can be confusing when the autopush is set to a 
higher value, so that we see, for example, "stable by karma = +5", but 
after +2 karma we get the "can be pushed to stable if maintainer wishes" 
message.

Mattia


-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Obtaining the RPM_ARCH etc. environment variables

2024-11-18 Thread Florian Weimer
Is

  eval `rpm --eval %___build_pre_env`

the canonical way to obtain definitions of these environment variables,
or is there a better alternative?

Thanks,
Florian

-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: PSA: tuned breaks boot loader entries for systemd-boot

2024-11-18 Thread Zbigniew Jędrzejewski-Szmek
On Sun, Nov 17, 2024 at 05:45:12PM +0100, Kevin Kofler via devel wrote:
> Zbigniew Jędrzejewski-Szmek wrote:
> > Heh, that's a cool idea. But that's not how standards work.
> > You cannot just insert things at random points in low-level config
> > files or protols. How do you think this would work?
> > You insert "$tuned_params", I insert "{tuned_params}", and GNU people
> > insert "@TUNED_PARAMS@", all because the spec didn't say that's
> > forbidden?
> 
> Unfortunately, that is exactly how standards work in the real world. Pretty 
> much any standardized language has dialects with incompatible extensions. 
> Sometimes even explicitly ignoring a rule in the standard that forbids an 
> extension at this place (and if you are lucky, the implementation providing 
> an off-by-default flag to actually enforce that rule, flag which may or may 
> not work reliably). Expecting any particular implementation to actually 
> strictly conform to a standard and to always flag all non-strictly-
> conforming input is not a realistic expectation.

Yes and no. I don't argue that extensions happen and that they even
are useful. The problem here is that the extension happened in a way
that was strictly incompatible with the existing implementations (and
to a large extent the very idea that lead to the creation of the format)
and was done on files in the location read by multiple implementations,
not some private directory.

So… taking your example, nowadays C is often used with GCC extensions.
systemd is a very heavy user of those, it won't even compile with a
compiler that doesn't have support. But the header files it installs
in /usr/include are standards-compliant. In fact we have a bunch of
tests, including compilation with '-ansi', to avoid introducing a
non-standard extension in a shared location. If we did that, we'd
effectively force anyone compiling against libsystemd to a higher
standard version.  People would be understandably unhappy and it'd get
immediately reverted.

Zbyszek
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Bodhi 8.2 in production: changes to karma requirements

2024-11-18 Thread Adam Williamson
On Mon, 2024-11-18 at 17:32 +, Mattia Verga via devel wrote:
> Il 18/11/24 16:34, Adam Williamson ha scritto:
> > On Mon, 2024-11-18 at 11:49 +, Zbigniew Jędrzejewski-Szmek wrote:
> > > If there is something that the policy text says that is stronger than
> > > what Bodhi requires, then we should update the policy text immediately.
> > As of now there is not, because in 8.2 I made the tool to implement
> > what the policy says, which is the way around things ought to be. :D
> > Before 8.2, this was the case, yes.
> > --
> > Adam Williamson (he/him/his)
> > Fedora QA
> > Fedora Chat: @adamwill:fedora.im | Mastodon: @ad...@fosstodon.org
> > https://www.happyassassin.net
> > 
> I tried to summarize currently applied settings in a table:
> 
> https://docs.google.com/spreadsheets/d/1pPdWOX7YKSu-6pF6-20V7nECRdrHyj6xr4YEV54f_qo/edit?usp=sharing
> 
> Where settings are absent, defaults are used.
> The idea is: an update can be pushed to stable either manually or 
> automatically only after , or before if it 
> reaches . Autopush settings can be equal or greater.

Yeah, that matches my understanding, and it matches the policy as
currently written.
> 
> What is reported as "Stable by karma" in the Update page is just the 
> autopush setting. Which can be confusing when the autopush is set to a 
> higher value, so that we see, for example, "stable by karma = +5", but 
> after +2 karma we get the "can be pushed to stable if maintainer wishes" 
> message.

Yeah, I did want to make some changes in the UI to clarify things
further, but I never got around to it and frontend stuff isn't natural
for me so it takes a while :\ If anyone else wants to do it that'd be
great.
-- 
Adam Williamson (he/him/his)
Fedora QA
Fedora Chat: @adamwill:fedora.im | Mastodon: @ad...@fosstodon.org
https://www.happyassassin.net




-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: RamaLama is now packaged up for Fedora.

2024-11-18 Thread Stephen Smoogen
On Mon, 18 Nov 2024 at 13:52, Daniel Walsh  wrote:

> RamaLama is now available as a package for Fedora 40,41 and Rawhide.
> python-ramalama.
>
> dnf install ramalama
>
> You can also install it via pip/pipx from PyPi.
>
> Try it out for your AI Inferencing needs.
>
> github.com/containers/ramalama
>
>
Slight correction. It will be available SOON in Fedora 40, 41 and is
available in rawhide. It has been built for Fedora 40 and 41 and is in
bodhi testing currently

* Fedora 40 https://bodhi.fedoraproject.org/updates/FEDORA-2024-9012e88666
* Fedora 41 https://bodhi.fedoraproject.org/updates/FEDORA-2024-1752a399c4

Please test and let me know if there are problems. I will fix and update as
needed.

> --
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>


-- 
Stephen Smoogen, Red Hat Automotive
Let us be kind to one another, for most of us are fighting a hard battle.
-- Ian MacClaren
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Fedora CI for large RPMs?

2024-11-18 Thread Nikita Popov
On Wed, Nov 13, 2024 at 12:38 PM František Lachman 
wrote:

> Hi Nikita,
>
> I can't speak on behalf of Fedora CI or Zuul but I want to mention that in
> the Packit team[0], we are trying to help in this situation of not having
> much capacity to maintain existing CI solutions for dist-git.
>
> Since Packit already have a (quite advanced) integration for the Testing
> Farm to be run on GitHub/GitLab pull requests, we decided to provide the
> same for dist-git pull-requests as well so there is the same experience in
> upstream and downstream. The code is mostly ready, but the hardest part is
> to agree on how to enable/tweak workflow (or if we should make it the
> default). And we are really happy to get feedback like this so we can learn
> from it from the very start.
>
> The current plan is to provide a prototype people can play with by the end
> of the year.
> If you want to follow our work, we have an epic for this here:
> https://github.com/packit/packit-service/issues/2453
>
> A small note to avoid confusion:
> This is independent of Packit's Fedora release automation. We can even
> give this a different branding.
> The thing that the Packit team will maintain the CI service and share a
> significant part of the code with Packit might be read as a technical
> detail.
> And since we use Testing Farm to run actual tests, no change in test
> definitions (thanks to tmt) should be needed.
>

Thanks, this sounds promising. We'd be happy to give this a try when it
becomes available. I found this document with a bit more info than the
issue:
https://github.com/packit/research/blob/main/research/integrations/fedora-ci/index.md

I'm not really familiar with packit's existing CI integrations -- do they
abort pending builds on new pushes, or do they continue running like in
Fedora CI / Zuul?

And just a few notes on the Koji Scratch build overload:
> * We are coordinating this effort with the Testing Farm team (that
> currently manages Zuul and is trying to deprecate[1] Fedora-CI). If/when
> Packit provides this functionality, the other two might be disabled (either
> in general or per-package).
>

Yeah, we wouldn't really be able to use the packit-based CI (at least
longer term) if we can't disable the old Fedora CI somehow, otherwise
people will yell at us again :)


> * Packit could use Copr instead to provide RPMs but this change of build
> system between CI and reality is probably not wanted.
>

Yes, I agree that it's important to use the same build infrastructure as
the "real" builds. For LLVM, we hit a different set of issues for each of
copr, fedora koji, centos stream koji and rhel brew. The hardware pool is
different each time and that can make a big difference for things like
openmp tests.

Regards,
Nikita
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Bodhi 8.2 in production: changes to karma requirements

2024-11-18 Thread Zbigniew Jędrzejewski-Szmek
On Sun, Nov 17, 2024 at 10:12:58AM -0800, Adam Williamson wrote:
> On Sun, 2024-11-17 at 18:35 +0100, Kevin Kofler via devel wrote:
> > Kevin Kofler via devel wrote:
> > > PS: I suspect the documentation was actually just an attempt to document
> > > the previous broken Bodhi policy implementation. (See
> > > https://github.com/fedora-infra/bodhi/issues/772 and
> > > https://github.com/fedora-infra/bodhi/issues/1033 – both got closed, but
> > > the issue was never properly fixed.)
> > 
> > PPS: Sorry, one more thing, I have to correct myself:
> > 
> > Actually, the issue was eventually fixed in that Bodhi has at some point 
> > started allowing to set the stable threshold even when unchecking the 
> > autopush checkbox, so it was possible before 8.2 to manually push updates 
> > to 
> > stable at +1.
> 
> > Though I still do not understand how a threshold makes any sense at all for 
> > manual pushes. Manual pushes should just always require only the minimum 
> > required by policy, as the person setting the threshold (to any allowed 
> > value) is the same as the one doing the push.
> > 
> > Settable thresholds have only ever made sense for automatic pushes. (So the 
> > bug was not that the threshold was not settable for manual pushes, but that 
> > the non-settable threshold was fixed to the wrong value, the default for 
> > automatic pushes (+3) instead of the minimum allowed (+1). Which is why I 
> > still do not consider this properly fixed.)
> 
> Yes, to be clear, in rewriting this code, I had the same opinion as
> you. The configurable thresholds only make sense as applying to
> autopush. There is no reason I can see to consider them as applying to
> manual push.

Agreed.
 
> That is in fact an interesting question, now I dig into it. Zbigniew
> seems to have done substantial rewrites on the karma requirements in
> 2021. These were:
> 
> https://pagure.io/fesco/fesco-docs/c/e57f002ee55810d1636e4460fe0d2c3515897c0b?branch=main
> https://pagure.io/fesco/fesco-docs/c/19bf26cef5d5e2a8d744ea28d8d54ec5374112e9?branch=main
> https://pagure.io/fesco/fesco-docs/c/33c510e462f0b4118a716a89315f6afef6f5354c?branch=main

[snip]

> So on the whole, I think you have a good point here, thanks for raising
> it. I will file a FESCo ticket and ask for them to consider the history
> here and decide if they want to make any changes based on this
> evaluation.
> 
> I think the current policy is written in a much more sensible and
> clearer form than the old one was, but the actual changes to the
> requirements that happened along the way may have been unintentional.

Yeah, the semantic changes to the policy text were either unintended
or were introduced to match what Bodhi actually implemented.

If there is something that the policy text says that is stronger than
what Bodhi requires, then we should update the policy text immediately.
For cases where the policy text and Bodhi agree, but are unnecessarilly
strict, let's change both at the same time. The old state where the
docs and code disagree was the least desirable.

Zbyszek
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: ABI change in ImageMagick

2024-11-18 Thread Remi Collet

Le 16/11/2024 à 22:46, Peter Pentchev a écrit :


Hm, ICBW, but, at least to me, this enum change looks like an actual
breaking ABI (not API) change. If a program was compiled to call that
function with the SentinelFilter value, the program code would pass
32 as a parameter and invoke the function. If loaded with the new
version of the library, this would cause the function to assume that
the caller wanted to pass MagicKernelSharp2013Filter and... do something
unexpected.


No, SentinelFilter is a special value keeping track of first free value
A program will never use this in an arg call (OK name is confusing)

Typical usage

if (filter < SentinelFilter) {
SetResampleFilter(RF, filter);
} else {
printf("Bad filter value\n");
exit(1);
}

Notice: the bad map change have been reverted,
so 7.1.1-41 is OK with same ABI than 7.1.1-39

Remi


--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Next Open NeuroFedora Meeting: Monday, 18 November 2024 (today) at 13:00 UTC

2024-11-18 Thread Ankur Sinha
Hello everyone,

Please join us at the next Open NeuroFedora team meeting on Monday, 18
November at 13:00 UTC.  The meeting is a public meeting, and open for
everyone to attend. You can join us over on Matrix in the Fedora Meeting
channel:

https://matrix.to/#/#meeting:fedoraproject.org

You can use this link to see the local time for the meeting:

https://www.timeanddate.com/worldclock/fixedtime.html?msg=Open+NeuroFedora+Meeting&iso=20241118T13&p1=1440&ah=1

or you can use this command in a terminal:

$ date -d 'Monday, November 18, 2024 13:00 UTC'

The meeting will be chaired by @ankursinha. The agenda for the
meeting is:

- New introductions and roll call.
- Tasks from last meeting: https://meetbot.fedoraproject.org/latest/neurofedora
- Open Pagure tickets: 
https://pagure.io/neuro-sig/NeuroFedora/issues?status=Open&tags=S%3A+Next+meeting
- Package health check: 
https://packager-dashboard.fedoraproject.org/dashboard?groups=neuro-sig
- Open package reviews check: 
https://bugzilla.redhat.com/show_bug.cgi?id=fedora-neuro
- CompNeuro lab compose status check: 
https://koji.fedoraproject.org/koji/packageinfo?packageID=30691
- Neuroscience query of the week
- Next meeting day, and chair.
- Open floor.

We hope to see you there!

The meeting announcement is also posted on the NeuroFedora blog here:

https://neuroblog.fedoraproject.org/2024/11/18/next-open-neurofedora-meeting-18-november-1300-utc.html

You can learn more about NeuroFedora here:
https://neuro.fedoraproject.org

-- 
Thanks,
Regards,
Ankur Sinha "FranciscoD" (He / Him / His) | 
https://fedoraproject.org/wiki/User:Ankursinha
Time zone: Europe/London


signature.asc
Description: PGP signature
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: HEADS UP: OpenImageIO 3.x SONAME bump

2024-11-18 Thread Richard Shaw
Sorry for the delay... $LIFE and $DAYJOB got in the way. Will be picking
this back up soon.

Thanks,
RIchard
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue