Hi,
I'm a big fan of neovim (emacs users jump to 'emacs:' ;-). neovim has support
for the Language Server Protocol and there is a nice plugin called 'null-ls'
[1] which allows you to hook linters and formatters into neovim.
I've added support for rpmspec in 'null-ls' so you can get feedback dir
Il 21/02/22 22:09, Fabio Valentini ha scritto:
> Hi!
> I would recommend that you use the standard source handling as
> documented on the SourceURL page.
> The forge macros are no longer actively maintained or developed, the
> last fix / update they received was almost two years ago.
> The original
OLD: Fedora-36-20220220.n.0
NEW: Fedora-36-20220221.n.0
= SUMMARY =
Added images:0
Dropped images: 1
Added packages: 32
Dropped packages:0
Upgraded packages: 103
Downgraded packages: 0
Size of added packages: 37.94 MiB
Size of dropped packages:0 B
Size of
OLD: Fedora-Rawhide-20220220.n.0
NEW: Fedora-Rawhide-20220221.n.0
= SUMMARY =
Added images:0
Dropped images: 2
Added packages: 33
Dropped packages:0
Upgraded packages: 112
Downgraded packages: 0
Size of added packages: 31.03 MiB
Size of dropped packages:0
On 2/21/22 22:17, Ian McInerney via devel wrote:
> On Tue, Feb 22, 2022 at 2:15 AM Demi Marie Obenour
> wrote:
>
>> On 2/21/22 14:16, Vitaly Zaitsev via devel wrote:
>>> On 21/02/2022 19:25, Demi Marie Obenour wrote:
FIDO keys are significantly more secure than OTPs, and FAS should get
On Tue, Feb 22, 2022 at 2:15 AM Demi Marie Obenour
wrote:
> On 2/21/22 14:16, Vitaly Zaitsev via devel wrote:
> > On 21/02/2022 19:25, Demi Marie Obenour wrote:
> >> FIDO keys are significantly more secure than OTPs, and FAS should get
> >> support for them. OTPs are still phishable, whereas FID
On 2/21/22 14:16, Vitaly Zaitsev via devel wrote:
> On 21/02/2022 19:25, Demi Marie Obenour wrote:
>> FIDO keys are significantly more secure than OTPs, and FAS should get
>> support for them. OTPs are still phishable, whereas FIDO2 generally
>> isn’t.
>
> OTP is absolutely free. FIDO2 requires t
On Sun, 2022-02-20 at 15:37 -0800, Adam Williamson wrote:
> On Sun, 2022-02-20 at 20:26 +, Jonathan Dieter wrote:
> > I've just pushed zchunk-1.2.0 to all active Fedora branches, and
> > it's
> > passed the (admittedly non-comprehensive) zchunk test suite, but
> > I'm
> > seeing 2 OpenQA failed
On 2/21/22 15:09, Fabio Valentini wrote:
So, if you plan to package releases / tags from your GitHub project,
just use what's documented here:
https://docs.fedoraproject.org/en-US/packaging-guidelines/SourceURL/#_git_tags
Glad I asked. Thanks!
--
==
On Mon, Feb 21, 2022 at 9:55 PM Ian Pilcher wrote:
>
> Can anyone suggest a good (simple) example SPEC file that I can
> reference as an example of how to use the forgemeta macro?
>
> I'm trying to build SPEC files for a couple of personal GitHub-hosted
> projects, and I'd like to make them as rob
Can anyone suggest a good (simple) example SPEC file that I can
reference as an example of how to use the forgemeta macro?
I'm trying to build SPEC files for a couple of personal GitHub-hosted
projects, and I'd like to make them as robust as possible. Even though
I have no current plans to try t
On Monday, February 21, 2022 2:58:43 PM EST Richard W.M. Jones wrote:
> > if (arg2) {
> > arg1->bar = (char [])(char *)memcpy(malloc((size)*sizeof(char)), (const
> > char *)(arg2), sizeof(char)*(size));
> > } else {
> > arg1->bar = 0;
> > }
> >
> > which results in
> >
> > error: cast specifies a
On Mon, Feb 21, 2022 at 01:22:53PM -0500, Steve Grubb wrote:
> Hello,
>
> I have a FTBFS package, audit, that has a strange problem that I'd like to
> run by the devel list. It is a common idiom in the kernel to do something
> like:
>
> struct foo{
> unsigned int barlen;
> char
This idiom is known as “flexible array member,” and it is standardized since
C99. The “bar[0]” syntax you mention is a GCC extension predating C99.
I’m not that familiar with the nuances of SWIG, but it looks like SWIG doesn’t
understand this at all, and is treating “bar” as a pointer member and
On 21/02/2022 19:25, Demi Marie Obenour wrote:
FIDO keys are significantly more secure than OTPs, and FAS should get
support for them. OTPs are still phishable, whereas FIDO2 generally
isn’t.
OTP is absolutely free. FIDO2 requires the purchase of a special
hardware token.
--
Sincerely,
Vi
Dear maintainers.
Based on the current fail to build from source policy, the following packages
should be retired from Fedora 36 approximately one week before branching.
However, 5 weekly reminders are required and I forgot to start this sooner,
hence the retirement will happen in 1 week, i.e. M
The following packages are orphaned and will be retired when they
are orphaned for six weeks, unless someone adopts them. If you know for sure
that the package should be retired, please do so now with a proper reason:
https://fedoraproject.org/wiki/How_to_remove_a_package_at_end_of_life
Note: If
On 2/20/22 19:08, Adam Williamson wrote:
> On Sun, 2022-02-20 at 16:42 +, Gary Buhrmaster wrote:
>> Unfortunately, last I checked, the FAS account
>> system did not support adding something
>> like a FIDO2 security key to an account(**).
>> Even if it did, I suspect not all the other parts
>> o
Hello,
I have a FTBFS package, audit, that has a strange problem that I'd like to
run by the devel list. It is a common idiom in the kernel to do something
like:
struct foo{
unsigned int barlen;
char bar[];
};
There are about 80 instances of this in the kernel headers. When one
On Thu, 2022-02-17 at 13:46 -0500, Ken Dreyer wrote:
> Your email made me look at this upstream
> (https://github.com/packit/specfile). It looks interesting! I wonder
> if we could use it more broadly (like for pyrpkg). It reminds me of
> https://github.com/containerbuildsystem/dockerfile-parse .
>
On Mon, Feb 21, 2022 at 8:35 AM Alexander Bokovoy wrote:
> This is not ready for general consumption but we plan to have something
> to submit to Rawhide in a month or so. Enrolling IPA users into this
> would be similar to already existing RADIUS proxy authentication path in
> FreeIPA.
Excellen
All current versions of *Fedora* have CMake 3.20 or later, so you
shouldn’t have any problems there.
When packaging for EPEL, you rely on the package versions that were
released with the corresponding version of Red Hat Enterprise Linux.
RHEL aims to provide long-term stability, so these mostl
Also it's possible to use gopass which is able to store the OTP seed secured by
GPG and keep the GPG keys on a Yubikey to ensure their safety.
Best,
Fale
On Mon, Feb 21, 2022, at 11:03, Björn Persson wrote:
> Adam Williamson wrote:
> > However, it supports Google Authenticator-style OTPs. Folks
Adam Williamson wrote:
> However, it supports Google Authenticator-style OTPs. Folks
> with infra privileges on their accounts (like me) are already required
> to use these. It works fine. I preferred being able to use a yubikey so
> I don't always have to open an app on my phone and retype a six d
No missing expected images.
Soft failed openQA tests: 1/8 (x86_64), 1/8 (aarch64)
(Tests completed, but using a workaround for a known bug)
Old soft failures (same test soft failed in Fedora-Cloud-34-20220220.0):
ID: 1139139 Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://op
No missing expected images.
Soft failed openQA tests: 1/8 (x86_64), 1/8 (aarch64)
(Tests completed, but using a workaround for a known bug)
Old soft failures (same test soft failed in Fedora-Cloud-35-20220220.0):
ID: 1139007 Test: x86_64 Cloud_Base-qcow2-qcow2 cloud_autocloud
URL: https://op
On su, 20 helmi 2022, Kevin Fenzi wrote:
On Sun, Feb 20, 2022 at 04:43:13PM -0800, Gary Buhrmaster wrote:
On Sun, Feb 20, 2022, 16:09 Adam Williamson
wrote:
> It used to support these, but the support was lost with the recent
> rewrite. However, it supports Google Authenticator-style OTPs. Fol
> From: Roberto Sassu via devel [mailto:devel@lists.fedoraproject.org]
> Sent: Friday, February 18, 2022 4:27 PM
[...]
> Unlike the previous version of DIGLIM, this one does not
> have any dependency (I just had to add rpmplugin.h in
> the rpm-devel package).
>
> It can be configured with two si
> From: David Sastre [mailto:d.sastre.med...@gmail.com]
> Sent: Saturday, February 19, 2022 11:56 PM
> (Secure Boot is concerned only with verifying the trustworthiness of the
> bootloader.
> From https://man7.org/linux/man-pages/man7/kernel_lockdown.7.html:
> The Kernel Lockdown feature is designe
29 matches
Mail list logo