libwacom soname bump

2021-12-12 Thread Peter Hutterer
Hi all, libwacom had a soname bump for the upcoming release. I've already rebuilt - libinput - cinnamon, cinnamon-control-center and cinnamon-settings-daemon - mutter, gnome-control-center, gnome-settings-daemon - kcm_wacomtablet (FTBFS though, #2031611) That should be it, if you have a package n

Re: Packaging pgAdmin4

2021-12-12 Thread Andreas Schneider
On Thursday, December 9, 2021 6:59:17 PM CET Ben Beasley wrote: > I haven’t looked at pgAdmin4, but I’m the current maintainer of > nodejs-svgo and several other Fedora packages that use the new NodeJS > packaging guidelines. I’m not the original packager for nodejs-svgo, and > I wasn’t the firs

Re: I quit packaging

2021-12-12 Thread Orion Poplawski
On 12/12/21 15:18, Emmanuel Seyman wrote: * Volker Fröhlich [12/12/2021 23:03] : All of my packages are up for grabs. For the curious, volter maintains the following packages: * cptutils * dans-gdal-scripts * e00compr * esniper * freexl * gdal * grass * libgeotiff * librast

Re: I quit packaging

2021-12-12 Thread Orion Poplawski
On 12/12/21 15:03, Volker Fröhlich wrote: I don't want to be a package maintainer anymore. All of my packages are up for grabs. Volker (FAS volter) Volker - Sorry to see you go. Thank you for all your work over the years! Orion -- Orion Poplawski he/him/his - surely the least important

Fedora-Rawhide-20211212.n.0 compose check report

2021-12-12 Thread Fedora compose checker
No missing expected images. Compose FAILS proposed Rawhide gating check! 1 of 43 required tests failed openQA tests matching unsatisfied gating requirements shown with **GATING** below Failed openQA tests: 10/228 (x86_64), 18/159 (aarch64) New failures (same test not failed in Fedora-Rawhide-20

Fedora-IoT-35-20211212.1 compose check report

2021-12-12 Thread Fedora compose checker
No missing expected images. Failed openQA tests: 1/15 (aarch64) Old failures (same test failed in Fedora-IoT-35-20211211.0): ID: 1085359 Test: aarch64 IoT-dvd_ostree-iso iot_clevis@uefi URL: https://openqa.fedoraproject.org/tests/1085359 Soft failed openQA tests: 1/16 (x86_64) (Tests comple

Re: wxGTK-devel vs wxGTK3-devel

2021-12-12 Thread Scott Talbert
On Sun, 12 Dec 2021, Steven A. Falco wrote: I also noticed that python3-wxpython4 appears to require the 3.0 branch, so that might be what is causing both 3.0 and 3.1 of wxGTK to be dragged in: $ rpm -q --requires python3-wxpython4 ... libwx_baseu-3.0.so.0()(64bit) ... Is there a version of p

Re: I quit packaging

2021-12-12 Thread Emmanuel Seyman
* Volker Fröhlich [12/12/2021 23:03] : > > All of my packages are up for grabs. For the curious, volter maintains the following packages: * cptutils * dans-gdal-scripts * e00compr * esniper * freexl * gdal * grass * libgeotiff * librasterlite2 * libspatialite * mingw-polyclipping * po

I quit packaging

2021-12-12 Thread Volker Fröhlich
I don't want to be a package maintainer anymore. All of my packages are up for grabs. Volker (FAS volter) ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct

wxGTK-devel vs wxGTK3-devel

2021-12-12 Thread Steven A. Falco
The KiCad package is currently built using wxGTK3-devel (and python3-wxpython4). The upstream KiCad developers have an interest in switching to the 3.1 branch of wxGTK, available in the wxGTK-devel package. I'm running a trial build of KiCad, substituting wxGTK-devel in place of wxGTK3-devel

Fedora rawhide compose report: 20211212.n.0 changes

2021-12-12 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20211211.n.0 NEW: Fedora-Rawhide-20211212.n.0 = SUMMARY = Added images:0 Dropped images: 5 Added packages: 0 Dropped packages:0 Upgraded packages: 67 Downgraded packages: 0 Size of added packages: 0 B Size of dropped packages:0 B Size

Re: Orphaned packages looking for new maintainers​

2021-12-12 Thread Sebastian Crane
Dear all, I noticed that Fennel was listed as orphaned on this list. As a great fan of Lisp and Fennel in particular, I'd be delighted to take on maintainership of Fennel as my first package. If it still needs a maintainer, please let know how to adopt the package! Best wishes and many thanks, S

[Test-Announce] 2021-12-13 @ 16:00 UTC - Fedora QA Meeting

2021-12-12 Thread Adam Williamson
# Fedora Quality Assurance Meeting # Date: 2021-12-13 # Time: 16:00 UTC (https://fedoraproject.org/wiki/Infrastructure/UTCHowto) # Location: #fedora-meeting on irc.libera.chat Greetings testers! We're coming up on end of year when many folks will be busy over the holidays, so let's have a final m

Re: F36 Change: Enable fs-verity in RPM (System-Wide Change proposal)

2021-12-12 Thread Lennart Poettering
On Do, 09.12.21 23:55, Fedora Development ML (devel@lists.fedoraproject.org) wrote: > > On Do, 02.12.21 14:36, Ben Cotton (bcotton(a)redhat.com) wrote: > > > > Hmm, so what I am really missing on the feature page: what's the > > attack scenario here? Usually security features come with an attack

Re: F36 Change: Enable fs-verity in RPM (System-Wide Change proposal)

2021-12-12 Thread Florian Weimer
* Zbigniew Jędrzejewski-Szmek: > Some more questions about how the verification happens… IIUC, I need to > load some keys to the kernel keyring, and then set > fs.verity.require_signatures. > > Where do the keys come from? How are the keys themselves verified? > At what time are they loaded and b

Re: pipewire memory usage

2021-12-12 Thread Dominique Martinet
Fabio Valentini wrote on Sun, Dec 12, 2021 at 12:25:11PM +0100: > > on my laptop, /usr/bin/pipewire uses 56M RSS, 5M SHR, > > but/usr/bin/pipewire-pulse uses 347M RSS, 4M SHR. > > 56M is okeyish, but 347M seems a lot. I think firefox is going > > through pipewire-pulse, so that interface might

Re: pipewire memory usage

2021-12-12 Thread Zbigniew Jędrzejewski-Szmek
On Sun, Dec 12, 2021 at 12:25:11PM +0100, Fabio Valentini wrote: > On Sat, Dec 11, 2021 at 6:46 PM Zbigniew Jędrzejewski-Szmek > wrote: > > > > Hi, > > > > on my laptop, /usr/bin/pipewire uses 56M RSS, 5M SHR, > > but/usr/bin/pipewire-pulse uses 347M RSS, 4M SHR. > > 56M is okeyish, but 347M s

Re: F36 Change: Enable fs-verity in RPM (System-Wide Change proposal)

2021-12-12 Thread Zbigniew Jędrzejewski-Szmek
On Fri, Dec 10, 2021 at 10:47:52AM +0100, Vít Ondruch wrote: > > Dne 10. 12. 21 v 0:08 Davide Cavalca via devel napsal(a): > >On Fri, 2021-12-03 at 22:08 +, Richard W.M. Jones wrote: > >>I'm unclear about the threat model - this is an attacker who is > >>someone able to overwrite single files

Re: F36 Change: Enable fs-verity in RPM (System-Wide Change proposal)

2021-12-12 Thread Zbigniew Jędrzejewski-Szmek
Some more questions about how the verification happens… IIUC, I need to load some keys to the kernel keyring, and then set fs.verity.require_signatures. Where do the keys come from? How are the keys themselves verified? At what time are they loaded and by whom? (Let's say that I'm an attacker wit

Re: pipewire memory usage

2021-12-12 Thread Fabio Valentini
On Sat, Dec 11, 2021 at 6:46 PM Zbigniew Jędrzejewski-Szmek wrote: > > Hi, > > on my laptop, /usr/bin/pipewire uses 56M RSS, 5M SHR, > but/usr/bin/pipewire-pulse uses 347M RSS, 4M SHR. > 56M is okeyish, but 347M seems a lot. I think firefox is going > through pipewire-pulse, so that interface

Re: F36 Change: Enable fs-verity in RPM (System-Wide Change proposal)

2021-12-12 Thread Zbigniew Jędrzejewski-Szmek
> * at run time, if the fsverity rpm plugin is enabled, rpm will install > the fsverity signature key and enable fsverity on files that are > installed. This requires CONFIG_FS_VERITY_BUILTIN_SIGNATURES=y. Currently our kernels are built without that. It seems like a simple addition (the amount of

Re: F36 Change: Make Rescue Mode Work With Locked Root (System-Wide Change proposal)

2021-12-12 Thread Vitaly Zaitsev via devel
On 12/12/2021 03:49, Neal Gompa wrote: So I strongly suspect they'll become the new standard anyway. TPM is a typical black box. I can't trust it because all hardware TPM implementations are proprietary. No one guarantees that it has no backdoors. -- Sincerely, Vitaly Zaitsev (vit...@easyc

Re: F36 Change: Enable fs-verity in RPM (System-Wide Change proposal)

2021-12-12 Thread Zbigniew Jędrzejewski-Szmek
On Fri, Dec 03, 2021 at 05:31:21PM -, Boris Burkov via devel wrote: > The top-level hash is calculated for each file, then that hash is signed with > the inputted rsa key pair and the signed hash is appended to the array of > signed hashes in the rpm metadata. I am guessing the way we worded

Fedora-Cloud-34-20211212.0 compose check report

2021-12-12 Thread Fedora compose checker
No missing expected images. Failed openQA tests: 1/8 (aarch64) New failures (same test not failed in Fedora-Cloud-34-20211211.0): ID: 1084836 Test: aarch64 Cloud_Base-qcow2-qcow2 base_service_manipulation@uefi URL: https://openqa.fedoraproject.org/tests/1084836 Soft failed openQA tests: 1/

Fedora-Cloud-35-20211212.0 compose check report

2021-12-12 Thread Fedora compose checker
No missing expected images. Soft failed openQA tests: 1/8 (x86_64), 1/8 (aarch64) (Tests completed, but using a workaround for a known bug) Old soft failures (same test soft failed in Fedora-Cloud-35-20211211.0): ID: 1084812 Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud URL: https://op