I'm still around, I had a kidney failure recently hence not able to answer.
Regards.
H.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct:
https://docs.fedo
Hi,
(This message is cross-posted to the Fedora devel and R SIG Fedora
mailing lists.)
Currently, R-core installs macros.R which defines one macro:
%_R_make_search_index /usr/lib/rpm/R-make-search-index.sh
This script does nothing, and there is no mention of this macro in our
guidelines. The m
The following Fedora EPEL 6 Security updates need testing:
Age URL
36 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2019-12f1eb1b1f
tomcat-7.0.94-1.el6
The following builds have been pushed to Fedora EPEL 6 updates-testing
holland-1.1.18-1.el6
lua-dbi-0.7.2-1.el6
Details a
Please remove me from your mailing list.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
Lis
> "RF" == Richard Fearn writes:
RF> According to
RF>
https://docs.fedoraproject.org/en-US/packaging-guidelines/#_architecture_build_failures:
>> If a Fedora package does not successfully compile, build or work on
>> an architecture, then those architectures should be listed in the
>> spec i
Hi,
> By following the process, all of your packages will get orphaned.
> If that is your desire, shall we do it directly?
That part, please don't :)
The reason why I'm encouraging people to become co-maintainers is
because I won't be unavailable forever, but longer than the orphan
grace period.
hmmm. from the root.log
DEBUG util.py:585: BUILDSTDERR: Error:
DEBUG util.py:585: BUILDSTDERR: Problem: conflicting requests
DEBUG util.py:585: BUILDSTDERR: - nothing provides kernel >= 4.18.0
needed by firewalld-0.6.4-1.fc31.noarch
how to deal with this? Wait for a new firewalld package?
On Thu, 2019-07-25 at 11:04 -0700, Adam Williamson wrote:
> On Thu, 2019-07-25 at 10:28 +, Zbigniew Jędrzejewski-Szmek wrote:
> > On Thu, Jul 25, 2019 at 09:51:31AM +0100, Peter Robinson wrote:
> > > > On Wed, 2019-07-24 at 15:48 -0400, Matthew Miller wrote:
> > > > > On Wed, Jul 24, 2019 at 01
On Thu, 2019-07-25 at 10:28 +, Zbigniew Jędrzejewski-Szmek wrote:
> On Thu, Jul 25, 2019 at 09:51:31AM +0100, Peter Robinson wrote:
> > > On Wed, 2019-07-24 at 15:48 -0400, Matthew Miller wrote:
> > > > On Wed, Jul 24, 2019 at 01:32:29PM +0100, Peter Robinson wrote:
> > > > > In general there's
On Thu, Jul 25, 2019 at 1:11 PM Kevin Fenzi wrote:
> On 7/25/19 3:48 AM, Kaleb Keithley wrote:
> > Yet Another Ceph Build Stuck in Pending Testing
> >
> > https://bodhi.fedoraproject.org/updates/FEDORA-2019-623fb9419e
> >
> > Would someone please give it a kick.
>
> Done.
>
Thanks
>
> And sor
Jason L Tibbitts III wrote:
> > "JO" == Joe Orton writes:
>
> JO> In the historic CVS-based build system which predated what we now
> JO> use, we could do GPG key verification at the time of downloading and
> JO> importing a new tarball.
>
> You're right; tmz dug up a copy of the old Mak
On 7/25/19 3:48 AM, Kaleb Keithley wrote:
> Yet Another Ceph Build Stuck in Pending Testing
>
> https://bodhi.fedoraproject.org/updates/FEDORA-2019-623fb9419e
>
> Would someone please give it a kick.
Done.
And sorry again this continues to happen. ;(
kevin
signature.asc
Description: OpenPG
As a maintainer of python-certifi, I wish to get rid of python2-certifi.
It has some dependencies:
$ repoquery --repo=rawhide{,-source} --whatrequires python2-certifi
python2-dulwich-0:0.19.11-2.fc31.x86_64
$ repoquery --repo=rawhide{,-source} --whatrequires python2-dulwich
hg-git-0:0.8.11-4.fc
> "JO" == Joe Orton writes:
JO> In the historic CVS-based build system which predated what we now
JO> use, we could do GPG key verification at the time of downloading and
JO> importing a new tarball.
You're right; tmz dug up a copy of the old Makefile.common file:
https://tmz.fedorapeople.or
On 7/25/19 3:04 AM, Peter Lemenkov wrote:
> Hello All!
> It started to get stuck again. Right now I'm experiencing this issue
> with RabbitMQ for F-30 and F-31:
>
> * https://koji.fedoraproject.org/koji/taskinfo?taskID=36457376
> * https://koji.fedoraproject.org/koji/taskinfo?taskID=36457345
So,
Good Morning Everyone,
I just wanted to let everyone know that this is now live.
You can see all the updates going through (or not) to rawhide in:
https://bodhi.fedoraproject.org/releases/F31
Many many thanks to all the people involved, I'm afraid I'll miss some but I'll
take the risk, so here it
Hi,
Due to a dependency on Eclipse, findbugs-contrib can no longer be
built on non-64-bit architectures. According to
https://docs.fedoraproject.org/en-US/packaging-guidelines/#_architecture_build_failures:
> If a Fedora package does not successfully compile, build or work on an
> architecture,
No missing expected images.
Compose FAILS proposed Rawhide gating check!
3 of 45 required tests failed
openQA tests matching unsatisfied gating requirements shown with **GATING**
below
Failed openQA tests: 12/147 (x86_64), 1/2 (arm)
New failures (same test not failed in Fedora-Rawhide-20190724.
OLD: Fedora-Rawhide-20190724.n.0
NEW: Fedora-Rawhide-20190725.n.0
= SUMMARY =
Added images:0
Dropped images: 2
Added packages: 4
Dropped packages:9
Upgraded packages: 72
Downgraded packages: 0
Size of added packages: 592.48 KiB
Size of dropped packages
On 2019-07-25, Björn Persson wrote:
> Verifying the signature as part of the build ensures that packagers
> don't forget to verify it.
>
Then it's a job for "fedpkg new-sources" or spectool, not for rpmbuild.
>> (4) Verification of modified archives conflicts with a legal requirement
>> that Fedo
Le 2019-07-25 12:17, Björn Persson a écrit :
Hit,
An RPM spec is not a place for golfing. Readable code takes priority
over saving keystrokes.
Then it should be implemented cleanly in a declarative syntax,
with %{gpg_signatureX} and %{gpg_keyringX} variables matching
%{sourceX}, and a single
On Thu, Jul 25, 2019 at 3:17 AM wrote:
>
> On Wed, 2019-07-24 at 14:31 -0700, Adam Williamson wrote:
> > On Wed, 2019-07-24 at 14:24 -0700, Adam Williamson wrote:
> > BTW, as a general note, it seems there's a trend building up where
> > quite significant changes to anaconda's design are being mad
On Wed, Jul 24, 2019 at 3:50 PM Matthew Miller wrote:
>
> On Wed, Jul 24, 2019 at 09:48:01AM -0400, Ben Cotton wrote:
> > > https://fedoraproject.org/wiki/Changes/F31Boost170
> > > == Summary ==
> > > This change brings Boost 1.70 to Fedora. This will mean Fedora ships
> > > with a recent upstream
Pierre-Yves Chibon wrote:
> I'm more worried about it relying on GPG at the moment considering the state
> of
> the SKS network [1].
> What are the changes that we end up breaking a build if we suddenly get a
> poisoned key? Are we going to break just a build or could this have more
> annoying con
On Thu, Jul 25, 2019 at 12:46:11PM +0200, Björn Persson wrote:
> Joe Orton wrote:
> > We'd put the set of trusted GPG keys in the repository alongside the
> > spec file, using some standard filename, and the build system would try
> > check the .asc against the keys when downloading (or uploading
Yet Another Ceph Build Stuck in Pending Testing
https://bodhi.fedoraproject.org/updates/FEDORA-2019-623fb9419e
Would someone please give it a kick.
Thanks
--
Kaleb
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email t
Joe Orton wrote:
> On Wed, Jul 24, 2019 at 11:15:26PM +0200, Igor Gnatenko wrote:
> > Hello,
> >
> > we've got new section in Packaging Guidelines about verifying upstream
> > sources[0] with GPG. Please use it whenever possible :)
> >
> > Thanks!
> >
> >
> > [0]
> > https://docs.fedoraproject
Hello, Remi Collet.
Thu, 25 Jul 2019 11:16:54 +0200 you wrote:
> Additional question, what will happen when the key will expire ?
Expired keys cannot be used for signing or encrypting. But they still
can be used for decrypting and verifying signatures.
--
Sincerely,
Vitaly Zaitsev (vit...@easy
On Thu, Jul 25, 2019 at 06:46:24AM -, Petr Pisar wrote:
> On 2019-07-24, Igor Gnatenko wrote:
> > we've got new section in Packaging Guidelines about verifying upstream
> > sources[0] with GPG. Please use it whenever possible :)
> [...]
> > [0]
> > https://docs.fedoraproject.org/en-US/packagi
Vít Ondruch wrote:
> Dne 25. 07. 19 v 8:46 Petr Pisar napsal(a):
> > (1) I don't agree this feature is helpful. If we don't trust ./sources
> > file content in dist-git, we cannot trust keyring stored in the the same
> > dist-git repository. In other words it only brings another code into
> > spec
On Thu, Jul 25, 2019 at 09:51:31AM +0100, Peter Robinson wrote:
> > On Wed, 2019-07-24 at 15:48 -0400, Matthew Miller wrote:
> > > On Wed, Jul 24, 2019 at 01:32:29PM +0100, Peter Robinson wrote:
> > > > In general there's usecases where a low resource desktop is useful,
> > > > such on devices with
On Thu, Jul 25, 2019 at 11:29:56AM +0200, Miro Hrončok wrote:
> On 23. 07. 19 22:51, Pierre-Yves Chibon wrote:
> > Good Morning Everyone,
> >
> > TL;DR: On July 24th we will turn on the first phase of Rawhide package
> > gating,
> > for single build updates.
>
> Where at https://bodhi.fedoraproj
Petr Pisar wrote:
> On 2019-07-24, Igor Gnatenko wrote:
> > we've got new section in Packaging Guidelines about verifying upstream
> > sources[0] with GPG. Please use it whenever possible :)
> [...]
> > [0]
> > https://docs.fedoraproject.org/en-US/packaging-guidelines/#_source_file_verification
BTW, there is this proposal:
https://github.com/rpm-software-management/rpm/issues/463
Vít
Dne 25. 07. 19 v 11:17 Joe Orton napsal(a):
> On Wed, Jul 24, 2019 at 11:15:26PM +0200, Igor Gnatenko wrote:
>> Hello,
>>
>> we've got new section in Packaging Guidelines about verifying upstream
>> sou
On 25. 07. 19 12:00, Artur Iwicki wrote:
My packages built fine on i686, but I've had a different cpio-related error on
s390x:
DEBUG util.py:585: BUILDSTDERR: error: unpacking of archive failed on file
[...]: cpio: read failed - Inappropriate ioctl for device
Is this just some random one-of
Hello All!
It started to get stuck again. Right now I'm experiencing this issue
with RabbitMQ for F-30 and F-31:
* https://koji.fedoraproject.org/koji/taskinfo?taskID=36457376
* https://koji.fedoraproject.org/koji/taskinfo?taskID=36457345
чт, 11 июл. 2019 г. в 19:14, Kevin Fenzi :
>
> On 7/11/19
My packages built fine on i686, but I've had a different cpio-related error on
s390x:
>DEBUG util.py:585: BUILDSTDERR: error: unpacking of archive failed on file
>[...]: cpio: read failed - Inappropriate ioctl for device
Is this just some random one-off thing, or did anyone else get the same er
Is it really a good idea to launch the mass rebuild now,
when cpio is broken on i386 ?
https://bugzilla.redhat.com/show_bug.cgi?id=1729382
And
https://koji.fedoraproject.org/koji/taskinfo?taskID=36501622
Probably going to have lot of FTBFS
Remi
___
On 23. 07. 19 22:51, Pierre-Yves Chibon wrote:
Good Morning Everyone,
TL;DR: On July 24th we will turn on the first phase of Rawhide package gating,
for single build updates.
Where at https://bodhi.fedoraproject.org/ do I find the rawhide updates?
--
Miro Hrončok
--
Phone: +420777974800
IRC:
On Wed, Jul 24, 2019 at 11:15:26PM +0200, Igor Gnatenko wrote:
> Hello,
>
> we've got new section in Packaging Guidelines about verifying upstream
> sources[0] with GPG. Please use it whenever possible :)
>
> Thanks!
>
>
> [0]
> https://docs.fedoraproject.org/en-US/packaging-guidelines/#_sourc
Additional question, what will happen when the key will expire ?
Ok, probably not going to happen in Fedora, but may happen in some other
distributions, supported for more years
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send
Le 24/07/2019 à 23:15, Igor Gnatenko a écrit :
> Hello,
>
> we've got new section in Packaging Guidelines about verifying upstream
> sources[0] with GPG. Please use it whenever possible :)
Looking at the Guidelines...
Implementing it for PHP...
I agree with Petr and Wit, I don't see any real ben
> On Wed, 2019-07-24 at 15:48 -0400, Matthew Miller wrote:
> > On Wed, Jul 24, 2019 at 01:32:29PM +0100, Peter Robinson wrote:
> > > In general there's usecases where a low resource desktop is useful,
> > > such on devices with only 1Gb of RAM where Workstation doesn't provide
> > > a good experien
On 2019-07-25, Petr Pisar wrote:
> On 2019-07-23, Mohan Boddu wrote:
>>
>> Hi all,
>>
>> Per the Fedora 31 schedule[1] we will be starting a mass rebuild for Fedora
>> 31 tomorrow. We are doing a mass rebuild for Fedora 31 for all the changes
>> listed in
>>
>> https://pagure.io/releng/issue/8555
On Wed, 2019-07-24 at 15:29 +0200, Jiri Eischmann wrote:
> Kamil Paral píše v St 24. 07. 2019 v 13:37 +0200:
> > On Tue, Jul 23, 2019 at 7:44 PM Ben Cotton
> > wrote:
> > > https://fedoraproject.org/wiki/Changes/Anaconda_Reclaim_Disk_Space
> > >
> > > The Manual Partitioning screen supports all a
Dne 25. 07. 19 v 8:46 Petr Pisar napsal(a):
> On 2019-07-24, Igor Gnatenko wrote:
>> we've got new section in Packaging Guidelines about verifying upstream
>> sources[0] with GPG. Please use it whenever possible :)
> [...]
>> [0]
>> https://docs.fedoraproject.org/en-US/packaging-guidelines/#_sou
On Thu, Jul 25, 2019 at 01:38:23AM +0200, Miro Hrončok wrote:
> On 24. 07. 19 17:30, Robbie Harwood wrote:
> > Pierre-Yves Chibon writes:
> >
> > > When you run `fedpkg build` on Rawhide, your package will be built in
> > > a new koji tag (which will be the default target for Rawhide). The
> > >
On Wed, 2019-07-24 at 14:31 -0700, Adam Williamson wrote:
> On Wed, 2019-07-24 at 14:24 -0700, Adam Williamson wrote:
> > On Wed, 2019-07-24 at 15:29 +0200, Jiri Eischmann wrote:
> > > Kamil Paral píše v St 24. 07. 2019 v 13:37 +0200:
> > > > On Tue, Jul 23, 2019 at 7:44 PM Ben Cotton
> > > > wrot
On 2019-07-23, Mohan Boddu wrote:
> --===2842249291292134861==
> Content-Type: multipart/alternative; boundary="614583058e5d7a59"
>
> --614583058e5d7a59
> Content-Type: text/plain; charset="UTF-8"
>
> Hi all,
>
> Per the Fedora 31 schedule[1] we will be starting
49 matches
Mail list logo