Re: Use a buildroot override here?

2025-03-10 Thread Michal Domonkos
On Mon, Mar 10, 2025 at 09:40:02PM +0900, Mamoru TASAKA wrote:
> Untagged gcc-15.0.1-0.9.fc42  from gcc-15.0.1-0.9.fc42
> 
> (It can be done yourself by
>  $ koji untag-build f42-build-side-107435 gcc-15.0.1-0.9.fc42
>  but for now I did it)

Oh... Of course!  Somehow, this simple solution didn't even cross my mind.

That did the trick [1], thank you very much (also for the quick response)!

[1] https://bodhi.fedoraproject.org/updates/FEDORA-2025-7f959f01d8

-- 
Michal Domonkos / RPM.org / Red Hat

-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


F43 Change Proposal RPM 6.0 (system-wide)

2025-03-10 Thread Aoife Moloney via devel-announce
Wiki - https://fedoraproject.org/wiki/Changes/RPM-6.0
Discussion thread -
https://discussion.fedoraproject.org/t/f43-change-proposal-rpm-6-0-system-wide/146855

This is a proposed Change for Fedora Linux.
This document represents a proposed Change. As part of the Changes
process, proposals are publicly announced in order to receive
community feedback. This proposal will only be implemented if approved
by the Fedora Engineering Steering Committee.



== Summary ==
Update RPM to the upcoming 6.0 major release.

== Owner ==
* Name: [[User:Pmatilai| Panu Matilainen]]
* Email: pmati...@redhat.com


== Detailed Description ==
Update RPM to the upcoming 6.0 release for several security improvements.

Note: adopting Fedora to the new v6 package package format is
explicitly NOT IN SCOPE for this change. RPM 6.0 in Fedora 43 will
ship with v4 package generation as default, regardless of the upstream
default.

== Feedback ==


== Benefit to Fedora ==

The major theme in 6.0 is increased security and related improvements:
* enforcing signature checking on by default
* OpenPGP keys are referred to by their fingerprint or full key id
where fingerprint not available (compared to the short keyid in
previous versions)
* OpenPGP keys can be updated with `rpmkeys --import ` and
corresponding API(s)
* support for multiple signatures per package (also an enabler for
Post-Quantum signatures later on)
* support for automatic signing on package build (mainly for local use)
* support for signing with Sequoia-sq as an alternative to GnuPG

A less direct benefit is enabling the testing of the new v6 package
format in the wider ecosystem.

Last but not least: with the release of 6.0, the RPM 4.x branch will
go into a strict maintenance-only mode, there will be no further
development on that branch.

== Scope ==

This is the first RPM version to support the new v6 package format,
but adopting Fedora to the new package format is explicitly not in
scope for this change.

* Proposal owners:
** Rebase RPM
** Assist dealing with incompatibilities

* Other developers:
** Test and report issues
** Adjust 3rd party software/tools to work with the new formats and
defaults where needed
** Test v6 package behavior with 3rd party software/tools (optional)

* Release engineering: [https://pagure.io/releng/issue/12616 #12616]

* Policies and guidelines: N/A

* Trademark approval: N/A

* Alignment with the Fedora Strategy: N/A


== Upgrade/compatibility impact ==

* Existing package build+install workflows may need to be adjusted due
to enforced signature checking being the default.
* 3rd party scripts and tools may need adjusting to the new key
addressing format and other signature related output changes.

== Early Testing (Optional) ==

Do you require 'QA Blueprint' support? N

== How To Test ==
Rpm receives a thorough and constant testing via every single package
build, system installs and updates, but of particular interest in this
release are
* updating previously imported keys
* manipulating the rpm keyring via rpmkeys
* testing the new v6 package format compatibility with 3rd party
software (requires building packages with %_rpmformat set to 6)

== User Experience ==

* The most noticeable change is that RPM now refuses to install
packages whose signature hasn't been positively verified, whether due
to being unsigned, missing key or otherwise. This can be worked around
by supplying `--nosignature` on the command line, or more permanently,
changing the `%_pkgverify_level` macro to the former default of
`digest`, but these should be only temporary measures, users are
encouraged to import necessary keys and/or setup automatic signing for
their (local) builds instead.
* Signature and key related output has changed: upper/lower case is
followed consistently in related output, and OpenPGP keys are always
addressed either by their fingerpring hash or the full keyid, whereas
previously a collision prone, short key id was used.
* `rpmkeys` is now the official tool for manipulating the rpm keyring.
Other methods such as manipulating `gpg-pubkey` pseudo-packages
manually are deprecated and should be updated to either the rpmkeys
tool or the newly provided keyring APIs.

== Dependencies ==

* The soname does not change so no rebuilds are required for
dependencies or otherwise
* There are no dependencies to other Fedora changes.
* This is the first version of rpm built as C++, so rpm gains a
runtime dependency on libstdc++.
* Signing with Sequoia additionally requires sequoia-sq >= 1.0, but
this is an optional dependency and even then, only for signing
packages.

== Contingency Plan ==

* Contingency mechanism: Revert back to RPM 4.20
* Contingency deadline: Beta freeze
* Blocks release? No

== Documentation ==
* [https://github.com/rpm-software-management/rpm/discussions/3602 The
road to RPM 6.0 blog]
* [https://rpm.org/wiki/Releases/6.0.0 Draft release notes] (subject to change)
* [https://rpm-software-management.github.io/rpm/manual/ Upstream
reference

Re: Konflux: What is the right time?

2025-03-10 Thread kendell clark
Hello

On Mon, Mar 10, 2025, 12:12 PM Richard W.M. Jones  wrote:

> On Sun, Mar 09, 2025 at 01:00:38PM -0700, Adam Williamson wrote:
> > On Sat, 2025-03-08 at 11:31 -0800, Michel Lind wrote:
> > > If this is both too heavy to evaluate on recent hardware, and also not
> reproducibly deployable, it seems to currently be in a state where it has
> all the drawbacks of Kubernetes but none of the benefits yet? Maybe we
> should get to a point where people can reasonably deploy it before
> considering it ready to be evaluated.
> >
> > Well, you don't need to deploy it for yourself, really. There is a
> > public test Fedora deployment where you can play with it:
> >
> > https://github.com/konflux-ci/community/blob/main/sigs/fedora/cluster.md
>
> Thanks for this link.  The instance is:
>
>
> https://konflux.apps.kfluxfedorap01.toli.p1.openshiftapps.com/application-pipeline
>
> It's very very slow ...  Most of the time I'm looking at a spinning
> blue circle.  I actually thought it was stuck, but it does eventually
> render a page (after a minute or two).
>
> The other sections (like "Applications", "Secrets") didn't render
> anything even after waiting 10 minutes.  Also if I go to "Services"
> and select "All Services" I get a bewildering array of choices which
> seem to take me to some different thing entirely?  I got loads of
> "Sentry error ID" and 404s when I tried to do anything here.
>
> So it seems like quite an early alpha, which is fine of course, but
> I'm still not entirely sure what I'm looking at here.
>
> Gitlab has a CI pipeline already which we use quite successfully
> upstream on several different projects.  Is this a replacement for that?
>
> Rich.
>
> --
> Richard Jones, Virtualization Group, Red Hat
> http://people.redhat.com/~rjones
> Read my programming and virtualization blog: http://rwmj.wordpress.com
> virt-top is 'top' for virtual machines.  Tiny program with many
> powerful monitoring features, net stats, disk stats, logging, etc.
> http://people.redhat.com/~rjones/virt-top
>
> --
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Konflux: What is the right time?

2025-03-10 Thread Michael Catanzaro
On Mon, Mar 10 2025 at 11:11:33 AM +00:00:00, Richard W.M. Jones 
 wrote:

Thanks for this link.  The instance is:

https://konflux.apps.kfluxfedorap01.toli.p1.openshiftapps.com/application-pipeline


I played around for about 3 minutes and am very confused. The overview 
page looks like an advertisement for Konflux itself. Why does it not 
show builds?


There are so many menu items, and they are for stuff other than builds:

* AI/ML: what does this possibly have to do with builds?
* Automation, Containers: I guess this could plausibly be related to 
builds

* Deploy: what would this do? Deployment must be managed by bodhi.
* Identity and Access Management: why would packagers need access to 
this?

* Integrations and Notifications
* Inventories (what is an inventory?)
* Observability and Monitoring (I wonder what this means)
* Security (I wonder what this means)
* Subscriptions and Spend (???)
* System Configuration
* Try and Buy

I wasn't able to actually view any of these pages because the spinners 
just keep spinning. I assume this demo instance is so drastically 
under-resourced as to be effectively broken. But just from looking over 
the menu items, I'm pretty confused. It doesn't seem like it's designed 
to be a distro build system. Why would a Fedora packager ever need to 
Try and Buy or track Subscriptions and Spend? I haven't done more than 
just look at the overview page and the menu items, but what I see so 
far seems pretty drastically divorced from Fedora's actual needs.


Optimistic take: maybe we could give it a face lift to remove the 
extraneous stuff.


Michael


--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F43 Change Proposal RPM 6.0 (system-wide)

2025-03-10 Thread Adam Williamson
On Mon, 2025-03-10 at 16:42 +0100, Florian Weimer wrote:
> > * The most noticeable change is that RPM now refuses to install
> > packages whose signature hasn't been positively verified, whether due
> > to being unsigned, missing key or otherwise. This can be worked around
> > by supplying `--nosignature` on the command line, or more permanently,
> > changing the `%_pkgverify_level` macro to the former default of
> > `digest`, but these should be only temporary measures, users are
> > encouraged to import necessary keys and/or setup automatic signing for
> > their (local) builds instead.
> 
> Does this impact installations via “dnf install”?

I would assume so, since rpm is still under dnf in the end.

> What's the impact on typical Fedora CI tests?

We would need to make sure the CI systems download signed packages,
somehow. AFAIK they currently don't. openQA certainly doesn't.

I've been working on https://github.com/fedora-infra/bodhi/pull/5859 to
help with this, but there turned out to be some subtleties that I
didn't have time to deal with yet (and then I went on vacation).
-- 
Adam Williamson (he/him/his)
Fedora QA
Fedora Chat: @adamwill:fedora.im | Mastodon: @ad...@fosstodon.org
https://www.happyassassin.net




-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: What is Konflux? What is Fedora Build System was Re: Konflux: What is the right time?

2025-03-10 Thread Kevin Fenzi
Yeah, I broadly agree with what smooge noted here. The idea isn't to
just swap konflux in for koji and call it a day, but rather to use
konflux as a build pipeline.

The promise of konflux I could see it taking on things that are
currently done by:

pkgs / src.fedoraproject.org - it could download sources and verify
them, removing the need to upload in many cases.

robosignatory/sigul - it could handle signing artifacts and coordinating
what artifacts are signed when by what.

bodhi - bodhi could get out of the business of composing things and move
to just being a UI to test and provide info back to konflux

and others possibly.

The things that I liked about what I have heard include ability for
releng to define the pipeline of whats 'official', but at the same time
users / sigs could define what they want to produce/distribute.

As for other arches, my understanding is that for those all thats
required is builder nodes of that arch. konflux will connect to them and
build, no need for a bunch of extra clusters.

I share some other folks concerns with some things I have seen, like I
am not sure if the openshift permissions model will work for us, and
the rpm building stuff is still really early, etc.

I think there's a lot of promise, but to answer the question in the
subject, I think the right time to discuss this in detail is probibly
later this year when more things are known/have had time to develop,
but by all means folks should look at provide feedback as they can.

kevin
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Heads-up: spatialindex 2.1.0 coming to F43/Rawhide

2025-03-10 Thread Ben Beasley
In one week, 2025-03-18, or slightly later, in collaboration with Scott 
Logan (FAS: cottsay), I plan to update spatialindex from 1.9.3 to 2.1.0 
in F43/Rawhide[1].


Upstream reports that “There are no significant major enhancements or 
refactorings that should change any behaviors. It had been a long time 
(almost 5 years!) since a release and 2.0.0 was the next version 
number...”[2][3]


Nevertheless, the SONAME version has changed, and therefore I plan to 
use provenpackager privilege to rebuild the following packages in the 
same side tag:


    - minetest
    - qgis

Testing in COPR[4] revealed no incompatibilities. This impact check also 
covered the python-Rtree package, which will not need to be rebuilt 
because it does not link the library, instead loading it at runtime 
using Python’s ctypes module.


A similar update for Fedora 42 appears technically feasible, but isn’t 
planned because it doesn’t seem justified at this point in the release 
cycle.


– Ben Beasley (FAS: music)


[1] https://src.fedoraproject.org/rpms/spatialindex/pull-request/3

[2] https://github.com/libspatialindex/libspatialindex/releases/tag/2.0.0

[3] https://github.com/libspatialindex/libspatialindex/releases/tag/2.1.0

[4] https://copr.fedorainfracloud.org/coprs/music/spatialindex/packages/


--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Installing Forgejo from the Fedora repository doesn't end with a working instance – at least for me

2025-03-10 Thread Zbigniew Jędrzejewski-Szmek
On Sun, Mar 09, 2025 at 07:41:31PM -0400, Neal Gompa wrote:
> > We should probably try and get this into Fedora proper, right? Ideally 
> > everything needed by Fedora infrastructure is in Fedora itself, it took us 
> > a few years to get there with mailman so the earlier we start the better
> >
> 
> Yes indeed, starting now would allow us to start on the right foot.

Yes. Normal packaging should be a requirement for tools that are expected
to be used by the standard Fedora packager or for Fedora infrastracture.

For two separate reasons:
- that software is easier to use and deploy, in particular to keep updated.
- passing through a packaging review is a proof of minimal quality of the
  software. Going through the steps for packaging will uncover
  possible license problems, emedded libraries, and other shenanigans
  that might not go unnoticed as long as some build&deployment script
  is being used.

  And we want to get this info _before_ we commit to the tool.

Zbyszek
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Fedora rawhide compose report: 20250310.n.0 changes

2025-03-10 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20250309.n.1
NEW: Fedora-Rawhide-20250310.n.0

= SUMMARY =
Added images:0
Dropped images:  1
Added packages:  3
Dropped packages:0
Upgraded packages:   20
Downgraded packages: 0

Size of added packages:  569.15 KiB
Size of dropped packages:0 B
Size of upgraded packages:   1.28 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   4.49 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =

= DROPPED IMAGES =
Image: i3 live aarch64
Path: Spins/aarch64/iso/Fedora-i3-Live-aarch64-Rawhide-20250309.n.1.iso

= ADDED PACKAGES =
Package: libxchange-1.0.0~rc5-1.fc43
Summary: Structured data representation and JSON support for C/C++
RPMs:libxchange libxchange-devel libxchange-doc
Size:469.89 KiB

Package: rust-strum0.26-0.26.3-1.fc43
Summary: Helpful macros for working with enums and strings
RPMs:rust-strum0.26+default-devel rust-strum0.26+derive-devel 
rust-strum0.26+phf-devel rust-strum0.26+std-devel 
rust-strum0.26+strum_macros-devel rust-strum0.26-devel
Size:50.83 KiB

Package: rust-strum_macros0.26-0.26.4-1.fc43
Summary: Helpful macros for working with enums and strings
RPMs:rust-strum_macros0.26+default-devel rust-strum_macros0.26-devel
Size:48.43 KiB


= DROPPED PACKAGES =

= UPGRADED PACKAGES =
Package:  asahi-audio-3.1-2.fc43
Old package:  asahi-audio-3.1-1.fc43
Summary:  PipeWire DSP profiles for Apple Silicon machines
RPMs: asahi-audio
Size: 1.78 MiB
Size change:  -14 B
Changelog:
  * Mon Mar 10 2025 Davide Cavalca  - 3.1-2
  - Require lv2-triforce >= 0.2.0 due to a breaking change


Package:  ballerburg-1.2.3-1.fc43
Old package:  ballerburg-1.2.2-4.fc42
Summary:  Two players, two castles, and a hill in between
RPMs: ballerburg
Size: 392.33 KiB
Size change:  -1.07 KiB
Changelog:
  * Sun Mar 09 2025 Andrea Musuruane  - 1.2.3-1
  - Updated to new upstream release


Package:  ckb-next-0.6.1-1.fc43
Old package:  ckb-next-0.6.0-7.fc42
Summary:  Unofficial driver for Corsair RGB keyboards
RPMs: ckb-next
Size: 5.76 MiB
Size change:  477.28 KiB
Changelog:
  * Sun Mar 09 2025 Artur Frenszek-Iwicki  - 0.6.1-1
  - Update to v0.6.1
  - Switch to Qt6


Package:  dosbox-staging-0.82.0-4.fc43
Old package:  dosbox-staging-0.82.0-3.fc42
Summary:  Modern continuation of DOSBox with advanced features
RPMs: dosbox-staging
Size: 10.91 MiB
Size change:  -41.53 KiB
Changelog:
  * Sat Mar 08 2025 Otto Liljalaakso  - 0.82.0-4
  - Disable SSE2 and SSSE3 (rhbz#2347233)


Package:  duply-2.5.5-1.fc43
Old package:  duply-2.5.3-3.fc42
Summary:  Wrapper for duplicity
RPMs: duply
Size: 50.47 KiB
Size change:  -118 B
Changelog:
  * Sun Mar 09 2025 Thomas Moschny  - 2.5.5-1
  - Update to 2.5.5.


Package:  kernel-6.14.0-0.rc5.20250307git00a7d39898c8.47.fc43
Old package:  kernel-6.14.0-0.rc5.20250306git848e07631744.46.fc43
Summary:  The Linux kernel
RPMs: kernel kernel-core kernel-debug kernel-debug-core 
kernel-debug-devel kernel-debug-devel-matched kernel-debug-modules 
kernel-debug-modules-core kernel-debug-modules-extra 
kernel-debug-modules-internal kernel-debug-uki-virt 
kernel-debug-uki-virt-addons kernel-devel kernel-devel-matched kernel-doc 
kernel-modules kernel-modules-core kernel-modules-extra kernel-modules-internal 
kernel-selftests-internal kernel-tools kernel-tools-libs 
kernel-tools-libs-devel kernel-uki-virt kernel-uki-virt-addons libperf 
libperf-devel perf python3-perf rtla rv
Size: 1.18 GiB
Size change:  5.55 MiB
Changelog:
  * Fri Mar 07 2025 Fedora Kernel Team  
[6.14.0-0.rc5.00a7d39898c8.46]
  - Revert "redhat/configs: automotive: disable CONFIG_AIO" (Davide Caratti)
  - redhat/configs: automotive disable ARCH_TEGRA_241_SOC (Eric Chanudet)
  - rhel_files: ensure all qdiscs are in modules-core (Davide Caratti) 
[RHEL-79818]
  - redhat/configs: automotive: Disable MRP/8021Q_MVRP Protocol (Dorinda Bassey)
  - Linux v6.14.0-0.rc5.00a7d39898c8

  * Fri Mar 07 2025 Fedora Kernel Team  
[6.14.0-0.rc5.00a7d39898c8.47]
  - apply -Wno-error=unterminated-string-initialization temporarily (Thorsten 
Leemhuis)
  - include/linux: Adjust headers for C23 (Jakub Jelinek)
  - x86/insn_decoder_test: allow longer symbol-names (David Rheinsberg)

  * Fri Mar 07 2025 Justin M. Forbes  
[6.14.0-0.rc5.20250307git00a7d39898c8.47]
  - Fix up some debug module loading issues due to BTF mismatch (Justin M. 
Forbes)


Package:  kmod-34.1-1.fc43
Old package:  kmod-34-1.fc43
Summary:  Linux kernel module management utilities
RPMs: kmod kmod-devel kmod-libs
Size: 987.41 KiB
Size change:  -309 B
Changelog:
  * Sat Mar 08 2025 Josh Boyer  - 34.1-1
  - New upstream v34.1
  - Resolves: rhbz#2350269


Package:  libidn2-2.3.8-1.fc43
Old package:  libidn2-2.3.7-3.fc42
Summary:  Library to support IDNA2008 internationalized

Re: F43 Change Proposal: Switch to JXL format for Default Wallpaper (self-contained)

2025-03-10 Thread Aoife Moloney
This change has been filed with FESCo https://pagure.io/fesco/issue/3376
for F42 as per the change owners guidance. Please note that the F42 change
proposal deadline was January 14. Any changes landing after this date are
assumed to be intended for F43. I do have a bad habit of assuming that
changes in the ReadyForWrangler queue are for the next release if the
deadlines have passed by a few weeks, which was the case when this one was
submitted, but I didnt double check the release target so apologies for the
confusion.

On Sat, Mar 1, 2025 at 6:21 PM Luya Tshimbalanga 
wrote:

>
> On 2025-02-26 13:12, Michael Catanzaro wrote:
>
> On Mon, Feb 24 2025 at 01:54:15 PM -05:00:00, Neal Gompa
>   wrote:
>
> Didn't we already do this? I adapted KDE Plasma, MiracleWM, LXQt, and
> COSMIC for this in F42 already.
>
>
> And now GNOME is switching back to regular JPEG, see:
>
> https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/6886#note_2360630
>
> https://gitlab.gnome.org/GNOME/gsettings-desktop-schemas/-/merge_requests/102
>
> So if we're aiming for consistency, we have already failed
>
>
> Author of the proposal here. It looks like the change recently happened
> few days ago and the proposal is indeed for Fedora 42 Beta
> which should give enough chances to find unexpected bugs before the final
> release. Let remind Fedora used PNG format for default wallpaper for a very
> long time
> instead of JPEG.
>
> Thanks for sending the ticket here and looking at
>
> https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/6886#note_2360630
>
> upstream JPEG-XL developers are very active investigating the root cause
> linking both gdk-pixbuf-loader and djxl to the slowdown as highlighted
> on https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/6886#note_2363790
>
> Should the issue fail to get solved upstream before the final release, we
> can defer for Fedora 43 and switch back to PNG. It is up to FESCo.
>
> --
> Luya Tshimbalanga
> Fedora Design Team
> Fedora Design Suite maintainer
>
> --
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>


-- 

Aoife Moloney

Fedora Operations Architect

Fedora Project

Matrix: @amoloney:fedora.im

IRC: amoloney
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Replacing regular file with directory on RPM upgrade ?

2025-03-10 Thread Daniel P . Berrangé
In the packaging guidelines we call out the problematic upgrades for
replacing a directory with a non-directory, or replacing a symlink
with a directory.

We don't mention replacing a regular file with a directory though.
Empirically that appears to be a broken scenario too.

# ls -al /usr/lib64/gimp/3.0/plug-ins/gmic_gimp_qt 
-rwxr-xr-x. 1 root root 10443848 Aug 29  2024 
/usr/lib64/gimp/3.0/plug-ins/gmic_gimp_qt

# dnf update --enablerepo=updates-testing gmic-gimp
...snip...
[5/8] Upgrading gmic-gimp-0:3.5.2-4.fc41.x86_64
>>> [RPM] failed to open dir gmic_gimp_qt of 
>>> /usr/lib64/gimp/3.0/plug-ins/gmic_gimp_qt/: cpio: mkdir failed - File exists
>>> [RPM] unpacking of archive failed on file 
>>> /usr/lib64/gimp/3.0/plug-ins/gmic_gimp_qt/gmic_gimp_qt;67ceae1e: cpio: 
>>> mkdir failed - Directory not empty
>>> Unpack error: gmic-gimp-0:3.5.2-4.fc41.x86_64


Did something change in cpio, or has it always been broken for regular file
to directory replacement too, and our docs were thus always incomplete ?

With regards,
Daniel

[1] 
https://docs.fedoraproject.org/en-US/packaging-guidelines/Directory_Replacement/
-- 
|: https://berrange.com  -o-https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o-https://fstop138.berrange.com :|
|: https://entangle-photo.org-o-https://www.instagram.com/dberrange :|

-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Replacing regular file with directory on RPM upgrade ?

2025-03-10 Thread Miroslav Suchý

Dne 10. 03. 25 v 10:22 dop. Daniel P. Berrangé napsal(a):

Did something change in cpio, or has it always been broken for regular file
to directory replacement too, and our docs were thus always incomplete ?


It was always this way.

The same for replacing a file with symlink. Or vice versa.

--
Miroslav Suchy, RHCA
Red Hat, Manager, Packit and CPT, #brno, #fedora-buildsys

--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Replacing regular file with directory on RPM upgrade ?

2025-03-10 Thread Daniel P . Berrangé
On Mon, Mar 10, 2025 at 10:26:12AM +0100, Miroslav Suchý wrote:
> Dne 10. 03. 25 v 10:22 dop. Daniel P. Berrangé napsal(a):
> > Did something change in cpio, or has it always been broken for regular file
> > to directory replacement too, and our docs were thus always incomplete ?
> 
> It was always this way.
> 
> The same for replacing a file with symlink. Or vice versa.

Ok, so the packaging docs should say that /any/ change in file type between
dir, regular & symlink needs special handling with lua scriptlets. I'll see
about submitting a docs patch.

With regards,
Daniel
-- 
|: https://berrange.com  -o-https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o-https://fstop138.berrange.com :|
|: https://entangle-photo.org-o-https://www.instagram.com/dberrange :|

-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


F43 Change Proposal: Deprecate the Gold Linker (system-wide)

2025-03-10 Thread Aoife Moloney via devel-announce
Wiki - https://fedoraproject.org/wiki/Changes/DeprecateGoldLinker
Discussion thread -
https://discussion.fedoraproject.org/t/f43-change-proposal-deprecate-the-gold-linker-system-wide/146851

This is a proposed Change for Fedora Linux.
This document represents a proposed Change. As part of the Changes
process, proposals are publicly announced in order to receive
community feedback. This proposal will only be implemented if approved
by the Fedora Engineering Steering Committee.


== Summary ==
The goal of this change is to deprecate the binutils-gold subpackage
of the binutils package.  This will allow its eventual removal from
Fedora.

== Owner ==
* Name: Nick Clifton
* Email: ni...@redhat.com


== Detailed Description ==
The GOLD linker is no longer being developed in the upstream GNU
Binutils project.  Given that there are now four linkers available to
Fedora users (ld.bfd, ld.gold, lld, mold) deprecating one of them
should not cause a lot of disruption and should reduce the maintenance
burden for the binutils maintainers.


== Feedback ==

I reached out to the maintainers of the packages that currently use
gold.  Almost all of them were willing to switch to another linker
immediately:
* ghc
  No longer uses gold.
* llvm
  Uses gold for tests.  Willing to change.
* meson
  Only used for testing.  Willing to drop as the test is not gold specific.
* perfetto
  Uses gold.  Might be a hard req.  Maintainers checking with upstream
developers.
* pypy3.10
  Willing to drop.  Test build in a PR to make this change succeeded.
https://src.fedoraproject.org/rpms/pypy3.10/pull-request/33
* python-torch
  No longer uses gold.
* qt5-qtwebengine
  Willing to switch to another linker if it works
* rust
  Gone as of rust-1.85.0-2.fc43
* swift-lang
  Uses gold.  Package might become deprecated.


== Benefit to Fedora ==

* Reduces the complexity of Fedora by removing a linker that is no
longer needed.
* Reduces the maintenance burden of the binutils package by removing a
component that is no longer being developed upstream.
* Simplifies a developer's experience by reducing the number of
choices for a linker from 4 to 3.

== Scope ==
* Proposal owners:

Add the deprecated() tag to the binutils-gold subpackage of the
binutils package in rawhide.  Add a comment explaining why the gold
linker is being deprecated.  Bump the NVR and build.  Wait for
responses, if any, from other package maintainers.

Make an announcement on the devel mailing list, informing developers
that gold is now deprecated.

Optional (I am not sure if this counts as part of the deprecation, or
will require a separate change request): After the next Fedora release
is out, change the binutils package so that it does not build gold by
default.  Instead it would need the builder to add the ''--with gold''
option.  A release after that, remove the option to build gold
entirely.

* Other developers:

For developers who are currently using the gold linker in their
project(s), a decision will have to be made as to whether they should
switch to a different linker or stay with gold.  Since deprecation
does not actually remove the linker from the distribution, not making
any change will still work.

For package maintainers who package(s) use gold a similar choice
should be made although again not changing anything will still work.


* Release engineering: [https://pagure.io/releng/issue/12622]

There should be no need to change the installer or update package
delivery because of this change.


* Policies and guidelines: N/A (not needed for this Change)

The packaging guidelines are linker agnostic, so there is no need to
alter them because of this change.

* Trademark approval: N/A (not needed for this Change)


* Alignment with the Fedora Strategy:

The change aligns with the strategy of increasing the number of active
contributors in the sense that it simplifies the binutils package,
making it easier to maintain, and it removes one of the linker choices
available to developers, making their choice simpler.

== Upgrade/compatibility impact ==

There should be no affect on users or developers upgrading from
earlier versions of Fedora.  Since the binutils-gold rpms will still
be available (albeit marked as deprecated) no-one should notice any
change.  The only possible exception to this is for developers who are
creating new packages for Fedora and who want to use gold.  They will
need to switch to a different linker.

== Early Testing (Optional) ==

Do you require 'QA Blueprint' support? N

== How To Test ==

No special hardware, data or the like is needed to test this change.

In fact in theory no testing is necessary at all.  Since the change is
to add a ''deprecated()'' tag to the binutils-gold sub-package the
only people who will be affected are packagers who want to add a
dependency upon gold.  So all existing packages should be unaffected.

As for actual testing I guess a dummy package could be created that
has a ''BuildRequires: binutils-gold'' dependency and 

Re: force merging of the remaining pull requests for sysusers

2025-03-10 Thread Zbigniew Jędrzejewski-Szmek
On Mon, Mar 03, 2025 at 10:43:25AM +, Zbigniew Jędrzejewski-Szmek wrote:
> Below is the list of PRs to merge. They all pass CI or the CI failed
> for unrelated reasons. I'll look at each PR before merging, so if
> there is an ongoing discussion or requests from the maintainers, I'll
> not merge the PR. (Some are false positives in the sense that there
> already are comments there. I don't have a automatic way of filtering
> those out.)

I merged most of the PRs. A few that remain:

https://src.fedoraproject.org/rpms/boinc-client/pull-request/5 - maintainer 
indicated a different approach is wanted
https://src.fedoraproject.org/rpms/condor/pull-request/4 - rebased, ftbfs
https://src.fedoraproject.org/rpms/copr-dist-git/pull-request/1 - maintainer 
indicated a different approach is wanted
https://src.fedoraproject.org/rpms/erlang/pull-request/4 - rebased
https://src.fedoraproject.org/rpms/freeipa/pull-request/24 - maintainer 
indicated a different approach is wanted
https://src.fedoraproject.org/rpms/ganglia/pull-request/2 - maintainer 
indicated a different approach is wanted
https://src.fedoraproject.org/rpms/koji/pull-request/24 - maintainer indicated 
a different approach is wanted
https://src.fedoraproject.org/rpms/mariadb10.11/pull-request/14 - unclear ftbfs
https://src.fedoraproject.org/rpms/mysql8.0/pull-request/6 - rebased
https://src.fedoraproject.org/rpms/nats-server/pull-request/2 - unclear ftbfs
https://src.fedoraproject.org/rpms/pcp/pull-request/29  - maintainer indicated 
a different approach is wanted
https://src.fedoraproject.org/rpms/smokeping/pull-request/1 - maintainer 
indicated a different approach is wanted
https://src.fedoraproject.org/rpms/svxlink/pull-request/3 - rebased
https://src.fedoraproject.org/rpms/systemtap/pull-request/31 - maintainer 
indicated a different approach is wanted
https://src.fedoraproject.org/rpms/wesnoth/pull-request/3 - rebased
https://src.fedoraproject.org/rpms/znc/pull-request/8 - maintainer indicated a 
different approach is wanted

We're getting close ;)

Zbyszek

> As discussed previously, those PRs are for rawhide, but also work for
> F42. They are not compatible with F41- or EPEL. They can be used as a
> good basis for making a version that backwards compatible, for folks
> that want to maintain a single branch. Please use/change the PR as you
> see fit, just let me know in a comment or close the PR.
> 
> https://src.fedoraproject.org/rpms/NetworkManager-fortisslvpn/pull-request/2
> https://src.fedoraproject.org/rpms/NetworkManager-openvpn/pull-request/6
> https://src.fedoraproject.org/rpms/abrt/pull-request/45
> https://src.fedoraproject.org/rpms/addrwatch/pull-request/3
> https://src.fedoraproject.org/rpms/akmods/pull-request/24
> https://src.fedoraproject.org/rpms/amanda/pull-request/10
> https://src.fedoraproject.org/rpms/anyterm/pull-request/1
> https://src.fedoraproject.org/rpms/apt/pull-request/17
> https://src.fedoraproject.org/rpms/asterisk/pull-request/22
> https://src.fedoraproject.org/rpms/autossh/pull-request/2
> https://src.fedoraproject.org/rpms/avahi/pull-request/18
> https://src.fedoraproject.org/rpms/bacula/pull-request/5
> https://src.fedoraproject.org/rpms/barman/pull-request/2
> https://src.fedoraproject.org/rpms/beanstalkd/pull-request/2
> https://src.fedoraproject.org/rpms/beep/pull-request/2
> https://src.fedoraproject.org/rpms/bind9-next/pull-request/11
> https://src.fedoraproject.org/rpms/bitcoin-core/pull-request/2
> https://src.fedoraproject.org/rpms/boinc-client/pull-request/5
> https://src.fedoraproject.org/rpms/bzflag/pull-request/1
> https://src.fedoraproject.org/rpms/c-icap/pull-request/1
> https://src.fedoraproject.org/rpms/ccache/pull-request/22
> https://src.fedoraproject.org/rpms/cjdns/pull-request/5
> https://src.fedoraproject.org/rpms/clamav/pull-request/41
> https://src.fedoraproject.org/rpms/condor/pull-request/4
> https://src.fedoraproject.org/rpms/copr-backend/pull-request/2
> https://src.fedoraproject.org/rpms/copr-dist-git/pull-request/1
> https://src.fedoraproject.org/rpms/copr-frontend/pull-request/3
> https://src.fedoraproject.org/rpms/copr-keygen/pull-request/3
> https://src.fedoraproject.org/rpms/crack/pull-request/1
> https://src.fedoraproject.org/rpms/darkstat/pull-request/3
> https://src.fedoraproject.org/rpms/davfs2/pull-request/2
> https://src.fedoraproject.org/rpms/dbus-broker/pull-request/15
> https://src.fedoraproject.org/rpms/dhcp-forwarder/pull-request/1
> https://src.fedoraproject.org/rpms/dist-git/pull-request/1
> https://src.fedoraproject.org/rpms/dlt-daemon/pull-request/1
> https://src.fedoraproject.org/rpms/dnsdist/pull-request/1
> https://src.fedoraproject.org/rpms/erlang/pull-request/4
> https://src.fedoraproject.org/rpms/etcd/pull-request/10
> https://src.fedoraproject.org/rpms/fapolicyd/pull-request/12
> https://src.fedoraproject.org/rpms/firebird/pull-request/4
> https://src.fedoraproject.org/rpms/freeipa/pull-request/24
> https://src.fedoraproject.org/rpms/ganglia/pull-request/2

Re: F43 Change Proposal RPM 6.0 (system-wide)

2025-03-10 Thread Michel Lind


On Mon, Mar 10, 2025, at 5:44 AM, Aoife Moloney via devel-announce wrote:
> Wiki - https://fedoraproject.org/wiki/Changes/RPM-6.0
> Discussion thread -
> https://discussion.fedoraproject.org/t/f43-change-proposal-rpm-6-0-system-wide/146855
>
> This is a proposed Change for Fedora Linux.
> This document represents a proposed Change. As part of the Changes
> process, proposals are publicly announced in order to receive
> community feedback. This proposal will only be implemented if approved
> by the Fedora Engineering Steering Committee.
>
>
>
> == Summary ==
> Update RPM to the upcoming 6.0 major release.
>
> == Owner ==
> * Name: [[User:Pmatilai| Panu Matilainen]]
> * Email: pmati...@redhat.com
>
>
> == Detailed Description ==
> Update RPM to the upcoming 6.0 release for several security improvements.
>
snip

>
> == Benefit to Fedora ==
>
> The major theme in 6.0 is increased security and related improvements:
>
snip

> * support for signing with Sequoia-sq as an alternative to GnuPG

Is this not already supported in the current RPM? I seem to remember dealing 
with issues due to us using sequoia-sq and it being stricter with some non 
compliant signatures on third party packages signed with other cryptographic 
libraries

Best regards,

-- 
 _o) Michel Lind
_( ) identities: https://keyoxide.org/5dce2e7e9c3b1cffd335c1d78b229d2f7ccc04f2
 README: https://michel-slm.name/
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F43 Change Proposal RPM 6.0 (system-wide)

2025-03-10 Thread Daniel P . Berrangé
On Mon, Mar 10, 2025 at 12:44:44PM +, Aoife Moloney via devel-announce 
wrote:
> Wiki - https://fedoraproject.org/wiki/Changes/RPM-6.0
> Discussion thread -
> https://discussion.fedoraproject.org/t/f43-change-proposal-rpm-6-0-system-wide/146855
> 
> This is a proposed Change for Fedora Linux.
> This document represents a proposed Change. As part of the Changes
> process, proposals are publicly announced in order to receive
> community feedback. This proposal will only be implemented if approved
> by the Fedora Engineering Steering Committee.
> 
> 
> 
> == Summary ==
> Update RPM to the upcoming 6.0 major release.
> 
> == Owner ==
> * Name: [[User:Pmatilai| Panu Matilainen]]
> * Email: pmati...@redhat.com


> == Benefit to Fedora ==
> 
> The major theme in 6.0 is increased security and related improvements:
> * enforcing signature checking on by default

snip

> * support for automatic signing on package build (mainly for local use)

Can someone elaborate on how this will work in practice ?

Will RPM be autogenerate a local key per machine for the purpose
of automatic signatures, that is already in the trusted keyring ?

ie, so that 'rpmbuild ...spec && sudo rpm -ivh ...' will "just work" ?

If so, how will this work if you add mock into the mix? Will the
mock env use the local signing key from the "host" install, as
opposed to a different local signing key in the mock chroot ?
Or will we need to get the key used by mock and register it on
the "host", in order to then install the just built package ?

Also same question, but building in mock and then transferring
the package over to a different machine for installation ? Can
the local signing key from mock be easily transferred too ?


> == Upgrade/compatibility impact ==
> 
> * Existing package build+install workflows may need to be adjusted due
> to enforced signature checking being the default.
> * 3rd party scripts and tools may need adjusting to the new key
> addressing format and other signature related output changes.

I presume the intent is that the (probably many) regressions that these
changes will trigger, will *not* be considered justification to trigger
the contingency plan, unless the impact unexpectedly severe ?

IOW, we're fully expecting stuff to break and users are expected to
do the work to fix compatibility asap.

> == Contingency Plan ==
> 
> * Contingency mechanism: Revert back to RPM 4.20
> * Contingency deadline: Beta freeze
> * Blocks release? No

With regards,
Daniel
-- 
|: https://berrange.com  -o-https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o-https://fstop138.berrange.com :|
|: https://entangle-photo.org-o-https://www.instagram.com/dberrange :|

-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Self introduction & looking for sponsor for ccls

2025-03-10 Thread Antonio

Hi all,

Yes, Dan was kind enough to tell me exactly this.

I will take me some time, though, as I have some other priorities.

Thanks and kind regards,
Antonio

El 8/3/25 a las 14:23, Michel Lind escribió:

Hi Antonio,

First of all, welcome!

On Thu, Mar 6, 2025, at 7:27 AM, Antonio wrote:

Hi Dan!

This is indeed appreciated. No better sponsor!

This will be my first contribution. I've read [1] and followed all
instructions there, but I'm stuck. What should I do now?


Because the package has been retired for too long, you need to submit it for 
review request again as if it's a new package (base it on the retired spec with 
any improvement that's necessary)

Mark the issue as blocking FE-NEEDSPONSOR, and probably reply here or to Dan 
with the issue URL so he sees it.

Best regards,



--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Schedule for Tuesday's FESCo Meeting (2025-03-11)

2025-03-10 Thread Fabio Alessandro Locati via devel
Following is the list of topics that will be discussed in the
FESCo meeting Tuesday at 17:00 UTC in #meeting:fedoraproject.org
on Matrix.

To convert UTC to your local time, take a look at
  http://fedoraproject.org/wiki/UTCHowto

or run:
  date -d '2025-03-11 17:00 UTC'

Links to all issues to be discussed can be found at: 
https://pagure.io/fesco/report/meeting_agenda

= Discussed and Voted in the Ticket =

#3369 [FastTrack] Update Emacs to 30.1 in active non rawhide branches
https://pagure.io/fesco/issue/3369
APPROVED (6, 0, 0)

#3367 Late Change for F42: The Copilot Runtime Verification Framework
https://pagure.io/fesco/issue/3367
APPROVED (5, 0, 0)

= Followups =

#3364 F42 Incomplete Changes Report
https://pagure.io/fesco/issue/3364

= New business =

= Open Floor = 

For more complete details, please visit each individual
issue.  The report of the agenda items can be found at
https://pagure.io/fesco/report/meeting_agenda

If you would like to add something to this agenda, you can
reply to this e-mail, file a new issue at
https://pagure.io/fesco, e-mail me directly, or bring it
up at the end of the meeting, during the open floor topic. Note
that added topics may be deferred until the following meeting. 
-- 
Fabio Alessandro "Fale" Locati
fale.io
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Next Open NeuroFedora Meeting: Monday, 10 March 2025 (today) at 13:00 UTC

2025-03-10 Thread Ankur Sinha
Hello everyone,

Please join us at the next Open NeuroFedora team meeting on Monday, 10
March at 13:00 UTC.  The meeting is a public meeting, and open for
everyone to attend. You can join us over on Matrix in the Fedora Meeting
channel:

https://matrix.to/#/#meeting:fedoraproject.org

You can use this link to see the local time for the meeting:

https://www.timeanddate.com/worldclock/fixedtime.html?msg=Open+NeuroFedora+Meeting&iso=20250310T13&p1=1440&ah=1

or you can use this command in a terminal:

$ date -d 'Monday, March 10, 2025 13:00 UTC'

The meeting will be chaired by @ankursinha. The agenda for the
meeting is:

- New introductions and roll call.
- Tasks from last meeting: https://meetbot.fedoraproject.org/latest/neurofedora
- Open Pagure tickets: 
https://pagure.io/neuro-sig/NeuroFedora/issues?status=Open&tags=S%3A+Next+meeting
- Package health check: 
https://packager-dashboard.fedoraproject.org/dashboard?groups=neuro-sig
- Open package reviews check: 
https://bugzilla.redhat.com/show_bug.cgi?id=fedora-neuro
- CompNeuro lab compose status check: 
https://koji.fedoraproject.org/koji/packageinfo?packageID=30691
- Neuroscience query of the week
- Next meeting day, and chair.
- Open floor.

We hope to see you there!

The meeting announcement is also posted on the NeuroFedora blog here:

https://neuroblog.fedoraproject.org/2025/03/10/next-open-neurofedora-meeting-10-march-2025-1300-utc.html

You can learn more about NeuroFedora here:
https://neuro.fedoraproject.org

-- 
Thanks,
Regards,
Ankur Sinha "FranciscoD" (He / Him / His) | 
https://fedoraproject.org/wiki/User:Ankursinha
Time zone: Europe/London


signature.asc
Description: PGP signature
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


F43 Change Proposal: Retire gtk3-rs, gtk-rs-core v0.18, and gtk4-rs v0.7 (self-contained)

2025-03-10 Thread Aoife Moloney via devel-announce
Wiki - 
https://fedoraproject.org/wiki/Changes/Retire_gtk3-rs,_gtk-rs-core_v0.18,_and_gtk4-rs_v0.7
Discussion thread -
https://discussion.fedoraproject.org/t/f43-change-proposal-retire-gtk3-rs-gtk-rs-core-v0-18-and-gtk4-rs-v0-7-self-contained/146853


This is a proposed Change for Fedora Linux.
This document represents a proposed Change. As part of the Changes
process, proposals are publicly announced in order to receive
community feedback. This proposal will only be implemented if approved
by the Fedora Engineering Steering Committee.


== Summary ==

The Rust bindings for GTK3 (and related libraries) are unmaintained
upstream, and are no longer updated in lockstep with bindings for GLib
and other related libraries. The packages for gtk3-rs were previously
[https://fedoraproject.org/wiki/Changes/Deprecate_gtk3-rs deprecated].

This is the next step - the removal of the packages for gtk3-rs, and
the compat packages for old versions of gtk-rs-core (v0.18) and
gtk4-rs (v0.7) that are associated with them.

== Owner ==

* Name: [[User:Decathorpe| Fabio Valentini]]
* Email: decathorpe (at) gmail (dot) com



== Detailed Description ==

The Rust bindings for GTK3 have been officially on basic maintenance
only since the release of
[https://gtk-rs.org/blog/2023/02/10/new-release.html gtk-rs 0.17], and
the last release that included updated GTK3 bindings was
[https://gtk-rs.org/blog/2023/08/28/new-release.html gtk-rs 0.18]. As
a result, the most recent version continues to pull in compat packages
for version 0.18 of gtk-rs-core (Rust bindings for GLib, pango, cairo,
etc.), which has not been maintained either, since it was obsoleted by
versions 0.19 and 0.20 upstream.

These Rust bindings receive regular fixes for safety and correctness
issues - continuing to depend on old versions is not ideal, since only
critical fixes are backported to the Fedora packages for these
obsolete versions (if that is even possible). The upstream project
does not backport fixes or release new versions of older release
branches at all.

This also affects packages that continue to depend on version 0.7 of
the bindings for GTK4. However, packages that only depend on crates
from gtk-rs-core or gtk4-rs do have a migration path to newer versions
of these crates, whereas packages that depend on crates from gtk3-rs
need to port from GTK3 to GTK4 first.

== Feedback ==

N/Y

== Benefit to Fedora ==

The Rust bindings for GTK3 - and gtk-rs 0.18 in general - are
obsolete. This Change ensures that Fedora ships less obsolete software
and / or fewer obsolete versions of packages.

== Scope ==

* Proposal owners:

Retire the following packages:

 gtk3-rs / libhandy-rs packages (unmaintained upstream):
   rust-atk
   rust-atk-sys
   rust-gdk
   rust-gdk-sys
   rust-gtk
   rust-gtk-sys
   rust-libhandy
   rust-libhandy-sys

 gtk-rs-core v0.18 compat packages:
   rust-cairo-rs0.18
   rust-cairo-sys-rs0.18
   rust-gdk-pixbuf0.18
   rust-gdk-pixbuf-sys0.18
   rust-gio0.18
   rust-gio-sys0.18
   rust-glib0.18
   rust-glib-sys0.18
   rust-glib-build-tools
   rust-gobject-sys0.18
   rust-graphene-rs0.18
   rust-graphene-sys0.18
   rust-pango0.18
   rust-pango-sys0.18
   rust-pangocairo0.18
   rust-pangocairo-sys0.18

 gtk4-rs v0.7 / libadwaita-rs v0.5 compat packages:
   rust-gdk4_0.7
   rust-gdk4-sys0.7
   rust-gsk4_0.7
   rust-gsk4-sys0.7
   rust-gtk4_0.7
   rust-gtk4-sys0.7
   rust-libadwaita0.5
   rust-libadwaita-sys0.5

The Change Owner(s) will file Pull Requests for dependent packages to
move to newer versions of those libraries, where possible.

=== Other developers ===

There are some applications in Fedora that depend on these old bindings:

* helvum → libadwaita-rs v0.5 and gtk-rs-core v0.18 compat packages
* squeekboard → obsolete GTK3 bindings and gtk-rs-core v0.18 compat packages
* system76-keyboard-configurator → obsolete GTK3 bindings and
gtk-rs-core v0.18 compat packages
* wildcard → libadwaita-rs v0.5 and gtk4-rs v0.7 compat packages

All of these packages are either co-maintained by the Rust SIG or are
maintained by a member of the Rust SIG.

Most of these projects already have begun work on porting to a newer
version of gtk-rs, or have been aware that continuing to depend on the
obsolete GTK3 bindings is a problem for years:

* helvum: https://gitlab.freedesktop.org/pipewire/helvum/-/commit/f325595
* squeekboard: https://gitlab.gnome.org/World/Phosh/squeekboard/-/issues/64
* system76-keyboard-configurator:
https://github.com/pop-os/keyboard-configurator/issues/133
* wildcard: https://gitlab.gnome.org/World/Wildcard/-/issues/42

Packages that will not or cannot be ported to a newer version of
gtk-rs in time - for example because it would also involve a port from
GTK3 to GTK4 - will be broken, and should likely also be retired from
Fedora.

=== Release engineering ===

N/A (not needed for this Change)

=== Policies and guidelines ===

N/A (not needed for this Change)

=== Trademark approval ===

N/A (not needed for this Change)

=== Alignme

Re: Use a buildroot override here?

2025-03-10 Thread Mamoru TASAKA

Michal Domonkos wrote on 2025/03/10 21:27:

Hello,

I'd like to submit a F42 update (rpm-4.20.1-1.fc42) but, in order for the build
to succeed, it requires a new build of gcc which fixes a failure on i686 [1].
The respective gcc update [2] is, however, currently on hold, due to the
pending F42 freeze.

Creating a side-tag and tagging the new gcc build in makes my build succeed but
I'm not able to submit a bodhi update from such a side-tag, due to that pending
gcc update already existing.

What's the proper way, if any, to submit my update for testing while the freeze
is still in effect?  Should I use a buildroot override instead (which seems to
be generally discouraged nowadays)?

Thanks,

[1] https://koji.fedoraproject.org/koji/taskinfo?taskID=130084538
[2] https://bodhi.fedoraproject.org/updates/FEDORA-2025-6a12d86df4



Untagged gcc-15.0.1-0.9.fc42  from gcc-15.0.1-0.9.fc42

(It can be done yourself by
 $ koji untag-build f42-build-side-107435 gcc-15.0.1-0.9.fc42
 but for now I did it)

Regards,
Mamoru
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


F43 Change Proposal: Migrate to lastlog2 (system-wide)

2025-03-10 Thread Aoife Moloney via devel-announce
Wiki - https://fedoraproject.org/wiki/Changes/Migrate_to_lastlog2
Discussion thread -
https://discussion.fedoraproject.org/t/f43-change-proposal-migrate-to-lastlog2-system-wide/146854

This is a proposed Change for Fedora Linux.
This document represents a proposed Change. As part of the Changes
process, proposals are publicly announced in order to receive
community feedback. This proposal will only be implemented if approved
by the Fedora Engineering Steering Committee.

== Summary ==
Migrate lastlog and all functionality associated with it (e.g.
pam_lastlog, the PAM service files) to lastlog2.

== Owner ==
* Name: [[User:ipedrosa| Iker Pedrosa]]
* Email: 


== Detailed Description ==
The Year 2038 problem (Y2038) poses a significant threat to systems
relying on 32-bit time representations. It's crucial to address this
before it impacts Fedora. This proposal suggests replacing the current
lastlog utility with lastlog2, a robust and widely adopted solution
already integrated into distributions like Debian and openSUSE.

lastlog reports the last login of a given user or of all users who did
ever login on a system. The standard `/var/log/lastlog` implementation
using `lastlog.h` from glibc uses a 32bit time_t in struct lastlog on
bi-arch systems like x86-64 (so which can execute 64bit and 32bit
binaries). So even if you have a pure 64bit system, on many
architectures using glibc this leads to the
[https://www.thkukuk.de/blog/Y2038_glibc_utmp_64bit/ Y2038 problem].
lastlog2 is a Y2038 safe implementation of lastlog and it is
considered as the natural replacement.

lastlog2 offers a comprehensive solution, including not just the
lastlog2 binary for interacting with user login information, but also
a dedicated library and a PAM module for seamless integration and
accurate user tracking.  Critically, lastlog2 provides a migration
path for existing lastlog data.

== Feedback ==
This Fedora System-Wide Change is open to feedback and other proposals
from the community.

== Benefit to Fedora ==
* Y2038 safe: it addresses the core issue by using a time
representation that avoids the Y2038 overflow.
* SQLite3 backend: it leverages a modern and efficient database for
storing login information.
* PAM module integration: data collection is handled exclusively
through a PAM module, allowing any tool to utilize the information
without requiring modifications to existing packages. This ensures
broad compatibility and avoids cascading changes.
* Backward compatibility: output is designed to be as compatible as
possible with the traditional lastlog format, minimizing disruption to
existing workflows.
* Data migration: it provides a mechanism to import existing data from
the legacy `/var/log/lastlog` file, preserving valuable login history.
* Scalability: the database size scales with the number of users, not
the largest UID, offering improved performance and resource
utilization, especially in environments with sparse UID allocation.

This change offers a proactive and well-supported solution to the
Y2038 problem within Fedora, ensuring the continued reliability and
security of the system. In short, lastlog2 is part of the util-linux
project, which Fedora has been using for years, and which has been
accepted by different communities such as Debian or OpenSuse as the
ideal replacement for lastlog.

== Scope ==
* Proposal owners: shadow-utils, PAM and util-linux projects need to
change their configuration to stop providing lastlog functionality and
start providing lastlog2. authselect project needs to replace
pam_lastlog by pam_lastlog2 in the PAM stack and update fedora content
accordingly. Finally, util-linux needs to migrate the existing
database from lastlog to lastlog2 format during the upgrade process.

* Other developers: N/A

* Release engineering: [https://pagure.io/releng/issue/12608 #12608]

* Policies and guidelines: N/A

* Trademark approval: N/A

* Alignment with the Fedora Strategy: N/A

== Upgrade/compatibility impact ==
Nothing will be affected, since the old database format from lastlog
will be automatically migrated to the new lastlog2 format.

== How To Test ==
Two different scenarios come to my mind:
# New system: once the system is correctly installed authenticate as a
user and run `lastlog2` for this user. The timestamp of the last login
should match the one that recently happened.
# Old system: once the system is correctly updated authenticate as
root and run `lastlog2` for another user. The timestamp of the last
login should have happened before the update happened.

== User Experience ==
`lastlog` and `pam_lastlog` don't exist anymore and are replaced by
`lastlog2` and `pam_lastlog2`. They should behave in a similar manner
to the aforementioned artifacts, thus no other change will be
experienced by the user.

== Dependencies ==
There are no other dependencies.

== Contingency Plan ==
* Contingency mechanism: If any change was committed revert it.
* Contingency deadline: Just before beta freeze.
* Blocks

F42 Change Proposal: Copilot Runtime Verification Framework (self-contained)

2025-03-10 Thread Aoife Moloney via devel-announce
Wiki - 
https://fedoraproject.org/wiki/Changes/Copilot_Runtime_Verification_Framework
Discussion thread -
https://discussion.fedoraproject.org/t/f42-change-proposal-copilot-runtime-verification-framework-self-contained/146848

This is a proposed Change for Fedora Linux.
This document represents a proposed Change. As part of the Changes
process, proposals are publicly announced in order to receive
community feedback. In this instance, this proposal has been previewed
by the  Fedora Engineering Steering Committee and members of Fedora QA
as it is a late change, https://pagure.io/fesco/issue/3367, and has
been provisionally approved as acceptable for F42 release, pending
community feedback. If any feedback is received that alters the change
proposal in a significant way, it will be resubmitted to FESCo for a
further review and vote.

== Summary ==

[https://copilot-language.github.io/ Copilot Language and Runtime
Verification System] is
a stream-based runtime-verification framework for generating hard
real-time C code.


== Owner ==

* Name: [[User:fdedden|Frank Dedden]]
* Email: 
* Name: [[User:Petersen|Jens Petersen]]
* Email: 


== Detailed Description ==

Copilot is a realtime programming language and Runtime Verification
framework, developed for NASA.
It allows users to write concise programs in a simple but powerful way
using a stream-based approach.

Programs can be interpreted for testing, or translated C99 code to be
incorporated in a project, or as a standalone application. The C99
backend ensures us that the output is constant in memory and time,
making it suitable for systems with hard realtime requirements.

== Feedback ==


== Benefit to Fedora ==
This is a new feature in Fedora which will of interest to those
developing specific critical embedded systems
requiring a high level of software assurance.


== Scope ==
* Proposal owners:
** build the copilot stack for Rawhide/F42: version 3.19 is packaged [done]

* Other developers:

* Release engineering: [https://pagure.io/releng/issues #Releng issue number]

* Policies and guidelines: N/A (not needed for this Change)

* Trademark approval: N/A (not needed for this Change)

* Alignment with the Fedora Strategy:


== Upgrade/compatibility impact ==


== Early Testing (Optional) ==

== How To Test ==
* `sudo dnf install ghc-copilot-devel`
* follow the documentation below for tutorial examples



== User Experience ==

Users will be able to easily install the Copilot verification
framework and test it.


== Dependencies ==


== Contingency Plan ==

* Contingency mechanism: N/A (not a System Wide Change)
* Contingency deadline: N/A (not a System Wide Change)
* Blocks release? N/A (not a System Wide Change)

== Documentation ==

* https://copilot-language.github.io/documentation.html
* https://github.com/Copilot-Language/copilot
* https://ntrs.nasa.gov/citations/20240010993

== Release Notes ==


-- 
Aoife Moloney

Fedora Operations Architect

Fedora Project

Matrix: @amoloney:fedora.im

IRC: amoloney

-- 
___
devel-announce mailing list -- devel-annou...@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel-annou...@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue
-- 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Self introduction & looking for sponsor for ccls

2025-03-10 Thread Antonio

Hi all,

So I've been doing some experiments with latest ccls version on COPR [1] 
and this is what I found:


1.- It won't build on rawhide

rawhide currently sports clang/llvm v20, and ccls simply fails to build 
with that (this would require changes upstream since the LLVM libs have 
changed).


2.- It builds in _some_ platforms with clang/llvm v17

- Builds go though in fedora40 (aarch64, x86_64), but rpm/check-rpaths 
complains [2] (even though I used "Requires: llvm17-libs").

- On rawhide/x86_64 the clang c++/v17 compiler seems to be broken. [3]
- On rawhide/aarch64 the LLVM17 libraries seem incompatible (even though 
they are good in fedora 40). [4]


So I think in order to have ccls up an running we'll have to build an 
older clang/llvm combination (ccls tests require clang v6). But building 
clang & llvm v6 just to have ccls is probably overkill.


So things look bad for ccls. I'll do some other experiments, and see if 
there're any plans to support LLVM20 upstream in the future. Any other 
ideas/suggestions to have ccls running are welcome.


Thanks and kind regards,
Antonio

[1]
https://copr.fedorainfracloud.org/coprs/vieiro/ccls/build/8747711/

[2]
ERROR   0010: file '/usr/bin/ccls' contains an empty runpath in 
[/usr/lib64/llvm17/lib:]


https://download.copr.fedorainfracloud.org/results/vieiro/ccls/fedora-40-aarch64/08747711-ccls/builder-live.log.gz
https://download.copr.fedorainfracloud.org/results/vieiro/ccls/fedora-40-x86_64/08747711-ccls/builder-live.log.gz

[3]
https://download.copr.fedorainfracloud.org/results/vieiro/ccls/fedora-rawhide-x86_64/08747711-ccls/builder-live.log.gz

-- Check for working CXX compiler: /usr/lib64/llvm17/bin/clang++ - broken
CMake Error at /usr/share/cmake/Modules/CMakeTestCXXCompiler.cmake:73 
(message):

  The C++ compiler
"/usr/lib64/llvm17/bin/clang++"
  is not able to compile a simple test program.

[4]
/usr/lib64/llvm17/include/llvm/ADT/SmallVector.h:582:47: error: no type 
named 'const_iterator' in 'llvm::SmallVectorTemplateBase'

  582 |   using const_iterator = typename SuperClass::const_iterator;
  |  ~^~
https://download.copr.fedorainfracloud.org/results/vieiro/ccls/fedora-rawhide-aarch64/08747711-ccls/builder-live.log.gz



El 10/3/25 a las 10:15, Antonio escribió:

Hi all,

Yes, Dan was kind enough to tell me exactly this.

I will take me some time, though, as I have some other priorities.

Thanks and kind regards,
Antonio

El 8/3/25 a las 14:23, Michel Lind escribió:

Hi Antonio,

First of all, welcome!

On Thu, Mar 6, 2025, at 7:27 AM, Antonio wrote:

Hi Dan!

This is indeed appreciated. No better sponsor!

This will be my first contribution. I've read [1] and followed all
instructions there, but I'm stuck. What should I do now?


Because the package has been retired for too long, you need to submit 
it for review request again as if it's a new package (base it on the 
retired spec with any improvement that's necessary)


Mark the issue as blocking FE-NEEDSPONSOR, and probably reply here or 
to Dan with the issue URL so he sees it.


Best regards,





--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue