Re: Orphaning openssl-gost-engine

2025-01-25 Thread Carlos Rodriguez-Fernandez
I'll take it. Thank you Dmitry. On 1/23/25 10:38 AM, Dmitry Belyavskiy wrote: Dear colleagues, I orphan openssl-gost-engine for personal reasons -- Dmitry Belyavskiy OpenPGP_signature.asc Description: OpenPGP digital signature -- ___ devel maili

Re: Proposal for vendoring/bundling golang packages by default

2025-01-20 Thread Carlos Rodriguez-Fernandez
These are all great points. I also second the Golang change. However, just to clarify, Go and Rust both generate ELF binaries as well, but Golang is not comparable to the some of the other examples mentioned. If you have a vulnerability in a package in Python, for example, you can deliver one s

Re: rpmlint+readelf corrupted interpreter on generated binaries

2025-01-16 Thread Carlos Rodriguez-Fernandez
Now I recall, it was happening in Zulu CI for my package, and all I could do was to ignore it as known issue while waiting for the rpmlint update. No workaround. On 1/15/25 8:33 AM, Carlos Rodriguez-Fernandez wrote: Thank you Miro, I was certain that I had sent a fix for that to rpmlint

Re: rpmlint+readelf corrupted interpreter on generated binaries

2025-01-15 Thread Carlos Rodriguez-Fernandez
Thank you Miro, I was certain that I had sent a fix for that to rpmlint. The problem went away in my package in the CI (bodhi or Zulu, can't recall), perhaps rpmlint was updated for the affected CI back then or was removed from the gating/ci pipelines, or I removed rpmlint from the gating/ci.

Re: Orphaned packages looking for new maintainers

2025-01-14 Thread Carlos Rodriguez-Fernandez
I took the golang cgroup ones, since I'm familiarized with it, as well as with golang. Also trying to start getting into golang packages. On 1/14/25 5:00 PM, maxwell--- via devel-announce wrote: olang(github.com/containerd/containerd/cio) = 1.6.23-1.fc41, golang(github.com/containerd/container

Re: F42 Change Proposal: Optimized Binaries for the AMD64 / x86_64 Architecture (v2) (self-contained)

2025-01-12 Thread Carlos Rodriguez-Fernandez
Well, I take that back, there is no second fork, ... just an exec of the target binary. So, when you launch a program, you would see two exec, one for the loader itself, and one for the final binary, for what I can understand. On 1/12/25 3:54 PM, Carlos Rodriguez-Fernandez wrote: It looks

Re: F42 Change Proposal: Optimized Binaries for the AMD64 / x86_64 Architecture (v2) (self-contained)

2025-01-12 Thread Carlos Rodriguez-Fernandez
It looks into the cmd line it was invoked with, then generates the path based on the u-arch, and then exec the actual binary. There are total two fork/exec: one to launch the hwcaps-loader (what /usr/bin/foo points to), and the fork-exec that hwcaps-loader does to run the actual binary. I'm to

Re: Orphaned packages looking for new maintainers

2025-01-08 Thread Carlos Rodriguez-Fernandez
Hi Jerry, I made you main admin of the three projects. I stayed as admin in case you need a hand. Thank you, Carlos R.F. On 1/8/25 4:07 PM, Jerry James wrote: On Wed, Jan 8, 2025 at 8:29 AM Carlos Rodriguez-Fernandez wrote: I'm taking because of their dependencies: * lrcalc * Sin

Re: Orphaned packages looking for new maintainers

2025-01-08 Thread Carlos Rodriguez-Fernandez
I'm taking because of their dependencies: * lrcalc * Singular * imlib2 * cliquer If any of the previous admin, committers, or collaborators to those packages want to take it, please let me know. Regards, Carlos R.F. On 1/7/25 10:46 PM, maxwell--- via devel-announce wrote: Report start

Re: Two easy packages in Python and C for a swap review

2025-01-01 Thread Carlos Rodriguez-Fernandez
Hi Lukasz, I took the C lang one. I'm almost done with the review. Regards, Carlos R.F. On 1/1/25 9:41 AM, Łukasz Wojniłowicz wrote: Hi all, Anyone willing to swap for equally easy packages? dmenu-wayland - An efficient dynamic menu for wayland (wlroots) https://bugzilla.redhat.com/show_b

Re: Revocation of provenpackager access from pbrobinson

2024-12-16 Thread Carlos Rodriguez-Fernandez
Peter said: > some are *ignored*, some *sit for months without action*, others have outlined this in the thread as well. If there was a way where people *put a readme* or something with details I believe it would remove a LOT of the friction. (emphasis added). I think there is a frustrati

Re: Orphaned packages looking for new maintainers

2024-12-10 Thread Carlos Rodriguez-Fernandez
:28 AM Carlos Rodriguez-Fernandez wrote: I agree. This dead package has probably security issues waiting to be discovered. There are the other projects as well that would need some relook at its http-parser dependency and see if it can be dropped: julia, cantor, and LabPlot. It looks like the http

Re: Orphaned packages looking for new maintainers

2024-12-09 Thread Carlos Rodriguez-Fernandez
Gallagher wrote: On Sat, Dec 7, 2024 at 12:21 PM Carlos Rodriguez-Fernandez wrote: I took sparse, and http-parser. http-parser in particular is a dead project upstream. However, there is a good set of packages depending on it. There are also past contributors. If any of the past contributors want

Re: Findings by static analyzers in Fedora 42 Critical Path Packages

2024-11-15 Thread Carlos Rodriguez-Fernandez
That went on the wrong thread, sorry, lol. -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduc

Re: Findings by static analyzers in Fedora 42 Critical Path Packages

2024-11-15 Thread Carlos Rodriguez-Fernandez
because of something else? Thank you, Carlos R.F. On 11/14/24 10:14 PM, Carlos Rodriguez-Fernandez wrote: Thanks for sharing the report. I looked into the libcap ones and they all appear to be false positives, but I can see why gcc struggles to figure it out. I forwarded them to the upstream

Re: Findings by static analyzers in Fedora 42 Critical Path Packages

2024-11-15 Thread Carlos Rodriguez-Fernandez
A few were actually good, and they were fixed right away upstream. Thanks again for the report! Carlos R.F. On 11/14/24 10:14 PM, Carlos Rodriguez-Fernandez wrote: Thanks for sharing the report. I looked into the libcap ones and they all appear to be false positives, but I can see why gcc

Re: Findings by static analyzers in Fedora 42 Critical Path Packages

2024-11-14 Thread Carlos Rodriguez-Fernandez
Thanks for sharing the report. I looked into the libcap ones and they all appear to be false positives, but I can see why gcc struggles to figure it out. I forwarded them to the upstream developer for confirmation. Thank you, Carlos R.F. On 11/14/24 12:47 AM, Siteshwar Vashisht wrote: Hello,

Re: RFC: Moving to -O3 for Fedora Linux

2024-10-30 Thread Carlos Rodriguez-Fernandez
://ieeexplore.ieee.org/abstract/document/8109001 On 10/30/24 10:37 PM, Carlos Rodriguez-Fernandez wrote: It would be great to see some empirical analysis about binary size increase, its impact on RAM consumption, and actual speed benefit, especially on Fedora. I'm having a hard time finding anything abo

Re: RFC: Moving to -O3 for Fedora Linux

2024-10-30 Thread Carlos Rodriguez-Fernandez
It would be great to see some empirical analysis about binary size increase, its impact on RAM consumption, and actual speed benefit, especially on Fedora. I'm having a hard time finding anything about it. Regards, Carlos R.F. On 10/30/24 7:46 PM, Neal Gompa wrote: Hey folks, I know the idea

libcap update to 2.71

2024-10-28 Thread Carlos Rodriguez-Fernandez
Hello all, I'll be updating libcap from 2.70 to 2.71 in rawhide[1]. No breaking ABI changes. Best, Carlos R.F. [1] https://bugzilla.redhat.com/show_bug.cgi?id=2321892 OpenPGP_signature.asc Description: OpenPGP digital signature -- ___ devel mail

Re: Orphaning golang-helm-3

2024-07-30 Thread Carlos Rodriguez-Fernandez
Thank you Mikel, indeed, for keeping helm available in Fedora. On 7/30/24 9:02 AM, Davide Cavalca wrote: On 2024-07-27 09:03, Davide Cavalca wrote: Hey folks, I have orphaned golang-helm-3. The package currently fails to build due to broken dependencies, and in general it's been pretty painful

Re: Fedora & AI Survey Now Live Until July 16th

2024-07-01 Thread Carlos Rodriguez-Fernandez
I found myself too in that situation, where I was forced to rank things that I don't consider suitable at all. For example, my first and second choice, I do mean it, ... my 3rd, not at all, however, it will count to the result as a "3rd" choice, artificially. I went ahead and clarified my choi

Re: Issues with cgo and stack protection

2024-06-16 Thread Carlos Rodriguez-Fernandez
h is called right before the stack protection check is missing a check for "STATE_SKIPPED", but I may be wrong. Anyway, I'll be submitting a BUG for annobin-annocheck. Regards, Carlos R.F. On 6/14/24 07:41, Carlos Rodriguez-Fernandez wrote: So, I found out the stack-prot test was

Re: Issues with cgo and stack protection

2024-06-14 Thread Carlos Rodriguez-Fernandez
CGO_CFLAGS="${CFLAGS}" CGO_LDFLAGS="${LDFLAGS}" GO_BUILD_FLAGS="-buildmode=pie -a -v -x -ldflags='-compressdwarf=false -B gobuildid'" all ``` Regards, Carlos R.F. On 6/13/24 09:30, Carlos Rodriguez-Fernandez wrote: Hi All, The build of libcap in Rawhide is fail

Issues with cgo and stack protection

2024-06-13 Thread Carlos Rodriguez-Fernandez
Hi All, The build of libcap in Rawhide is failing the static analysis because of the stack protection not enabled [1]. ``` Hardened: /usr/sbin/captree: FAIL: stack-prot test because stack protection not enabled (lto:threadentry) Hardened: /usr/sbin/captree: FAIL: stack-prot test because stack

libcap version minor bump to 2.70 in rawhide

2024-05-20 Thread Carlos Rodriguez-Fernandez
Hi all, I'll be updating libcap to 2.70 in rawhide. It brings the following: * A minor enhancement to `cap` output * A new flag `-f` to `setcap` * Enhancements to the man pages. * Minor cleanup in pam_cap internals No lib API changes. Regards, Carlos R.F. OpenPGP_signature.asc Description:

Re: mdadm Update in Rawhide

2024-05-08 Thread Carlos Rodriguez-Fernandez
If a maintainer changes the version, they would need to find the URL and download the sign file again and do the switcharoo. The key, on the other hand, won't likely change, and if there is a change, it is good to detect it. Are you sure you don't want to make the signature also a url source so

Re: mdadm Update in Rawhide

2024-05-08 Thread Carlos Rodriguez Fernandez
as having trouble finding the public key(s). I'll look more into this > now. > > They sign the tar archive before it is compressed, so I'll have to stray > from the standard way of verifying the sigs in the docs a little. > > Thanks for the info. > > On Wed, May 8, 2

Re: mdadm Update in Rawhide

2024-05-08 Thread Carlos Rodriguez-Fernandez
Would you want to validate the tar download with the signature provided by upstream? It has ".sign" files [1]. The public keys should be in here [2] [1] https://mirrors.edge.kernel.org/pub/linux/utils/raid/mdadm/ [2] https://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git/plain/keys On 5/8/24

Re: Need SELinux help for fail2ban!

2024-05-05 Thread Carlos Rodriguez-Fernandez
2024 at 4:49 PM Carlos Rodriguez-Fernandez mailto:carlosrodrifernan...@gmail.com>> wrote: The suggestion for one of the comments of using `/run/fail2ban(/.*)?` instead of `/run/fail2ban.*` doesn't work? I try to be very careful with making changes in SELinux and I don'

Re: Need SELinux help for fail2ban!

2024-05-05 Thread Carlos Rodriguez-Fernandez
I don't think the problem is the "fc" file, but the fact that the file in /run/fail2ban didn't get relabeled when the users updated, or the selinux subpackage didn't get updated at all. That explains why it works on a fresh system. The specificity of "/run/fail2ban(/.*)?" is better and safer,

Re: Need SELinux help for fail2ban!

2024-05-04 Thread Carlos Rodriguez-Fernandez
The suggestion for one of the comments of using `/run/fail2ban(/.*)?` instead of `/run/fail2ban.*` doesn't work? On 5/4/24 13:05, Richard Shaw wrote: I still don't understand SELinux and would appreciate an assist! fail2ban-server is unable to create the socket file /run/fail2ban/fail2ban.s

Re: F41 Change Proposal: Drop Mandatory Requires on JRE (system-wide)

2024-05-02 Thread Carlos Rodriguez-Fernandez
:35, Kevin Kofler via devel wrote: Carlos Rodriguez-Fernandez wrote: How could that be expressed so that those are caught quickly at build time? Someone wants to depend on a java lib that has been tested only in JRE 8 to 11, but wants to build the package with JRE 17+, or vice-versa, for example. Pe

Re: F41 Change Proposal: Drop Mandatory Requires on JRE (system-wide)

2024-05-02 Thread Carlos Rodriguez-Fernandez
On 5/2/24 11:58, Christopher wrote: On Thu, May 2, 2024 at 6:59 AM Kevin Kofler via devel wrote: Carlos Rodriguez-Fernandez wrote: Regarding the proposal as a whole, I think the proposal idea makes a lot of sense, but for apps depending on system jar libraries, there should be a way to speci

Re: F41 Change Proposal: Drop Mandatory Requires on JRE (system-wide)

2024-04-30 Thread Carlos Rodriguez-Fernandez
Marián, I echo your concerns, however, regarding jars with multiple bytecode versions, aren't java rpm expected to build their sources with one specific JDK? (per the guidelines) how can multiple bytecode version end up in the JAR in that scenario? Regarding the proposal as a whole, I think

Re: RFC: Flaws detected by static analyzers in Fedora 41 Core Critical Path Packages

2024-04-24 Thread Carlos Rodriguez-Fernandez
Rodriguez-Fernandez wrote: Hi Siteshwar, Thank you for the report. The libcap subtask failed [1] for a known issue, which is present in libcap 2.69-3 in Fedora rawhide, but was already fixed two weeks ago. Fedora rawhide has 2.69-8, and I can confirm it is the case when I run the fedora:41 images

Re: RFC: Flaws detected by static analyzers in Fedora 41 Core Critical Path Packages

2024-04-24 Thread Carlos Rodriguez-Fernandez
Hi Siteshwar, Thank you for the report. The libcap subtask failed [1] for a known issue, which is present in libcap 2.69-3 in Fedora rawhide, but was already fixed two weeks ago. Fedora rawhide has 2.69-8, and I can confirm it is the case when I run the fedora:41 images. 2.69-8 should have be

Re: Three steps we could take to make supply chain attacks a bit harder

2024-04-13 Thread Carlos Rodriguez-Fernandez
On 4/13/24 01:44, Richard W.M. Jones wrote: On Fri, Apr 12, 2024 at 04:50:13PM -0500, Chris Adams wrote: Once upon a time, Richard W.M. Jones said: So the problem with github is they don't allow you to have 2FA on a backup device (or rather, it *is* possible, but the process is ludicrous[1])

Re: Three steps we could take to make supply chain attacks a bit harder

2024-04-12 Thread Carlos Rodriguez Fernandez
son wrote: > > On Thu, 2024-04-11 at 19:52 -0700, Carlos Rodriguez-Fernandez wrote: > > > I was hesitant to have MFA for a while. Imagine losing a phone with > tons > > > of tokens. What a hassle to recover from that. I found it less than > > > ideal for practical r

Re: Three steps we could take to make supply chain attacks a bit harder

2024-04-12 Thread Carlos Rodriguez-Fernandez
sharing an option just in case it could serve someone that is hesitating by giving some ideas :). On 4/12/24 09:47, Adam Williamson wrote: On Thu, 2024-04-11 at 19:52 -0700, Carlos Rodriguez-Fernandez wrote: I was hesitant to have MFA for a while. Imagine losing a phone with tons of tokens. What a

Re: Orphaned packages looking for new maintainers

2024-04-12 Thread Carlos Rodriguez-Fernandez
Regarding libteam, the author of the package is the maintainer, email in bugzilla is different than the one on the project. I wonder if Jiro just missed the notification that his package is failing to build in F40. On 4/12/24 07:09, Maxwell G wrote: Report started at 2024-04-12 13:04:40 UTC

Re: Three steps we could take to make supply chain attacks a bit harder

2024-04-11 Thread Carlos Rodriguez-Fernandez
I was hesitant to have MFA for a while. Imagine losing a phone with tons of tokens. What a hassle to recover from that. I found it less than ideal for practical reasons. However, I decided instead to buy two Yubikey (primary and backup), and I add the QRs to both of them with the Yubico App. I

Re: convert everything to rpmautospec?

2024-04-08 Thread Carlos Rodriguez-Fernandez
Thank you Zbigniew and Miro for the link. On 4/8/24 02:18, Zbigniew Jędrzejewski-Szmek wrote: On Sun, Apr 07, 2024 at 09:08:49PM -0700, Carlos Rodriguez-Fernandez wrote: On 4/7/24 21:07, Carlos Rodriguez-Fernandez wrote: Not all commits correspond with a new release downstream, and not all

Re: convert everything to rpmautospec?

2024-04-07 Thread Carlos Rodriguez-Fernandez
Not all commits correspond with a new release downstream, and not all commit messages are relevant to the end user to be part of the change log. For example, commits related with increasing gating test coverage efforts, or setting up gating.yaml itself. Another example is linting setting and/

Re: Three steps we could take to make supply chain attacks a bit harder

2024-04-01 Thread Carlos Rodriguez-Fernandez
Matthew Miller, Unit tests, even though in theory developer should mock dependencies to isolate their code to the maximum, in reality, it is not that clear cut. Therefore, those unit tests do serve to some extent as a validation that their code works with the system libraries and platforms pre

Re: Three steps we could take to make supply chain attacks a bit harder

2024-04-01 Thread Carlos Rodriguez-Fernandez
Chris, The specific points of entry were evading the strength of open source: many skilled eyes. Therefore, there is value in programmatically enforcing that everything used as an input in a build must have been exposed to *normal opensource workflows*. It is a very simple principle, yet very

Re: Three steps we could take to make supply chain attacks a bit harder

2024-04-01 Thread Carlos Rodriguez-Fernandez
golang, it is mingled with the source code in `_test.go` files. In C, it depends on the programmers convention. On 4/1/24 09:29, Adam Williamson wrote: On Mon, 2024-04-01 at 05:58 -0700, Carlos Rodriguez-Fernandez wrote: Test isolation is still assuming the attack comes in the test phase. As I

Re: Three steps we could take to make supply chain attacks a bit harder

2024-04-01 Thread Carlos Rodriguez-Fernandez
inary. However, that would still increase the attack complexity. [1] https://github.com/carlosrodfern/rpmseclint On 3/31/24 19:02, Carlos Rodriguez-Fernandez wrote: Regarding downstream defense, prohibiting blobs or differences between tars and git repos may be overkill or difficult at this moment

Re: Three steps we could take to make supply chain attacks a bit harder

2024-04-01 Thread Carlos Rodriguez-Fernandez
Williamson wrote: On Sun, 2024-03-31 at 22:13 -0700, Carlos Rodriguez-Fernandez wrote: Adam, Is there a way already to achieve test isolation during the rpm build? Nothing systematic that I'm aware of, no. It would be tricky because there is no one universal Standard Test System (not

Re: Three steps we could take to make supply chain attacks a bit harder

2024-04-01 Thread Carlos Rodriguez-Fernandez
t, so that's why I was thinking of something more like at the file system level (e.g., a snapshot that it is then restored, or something like that). On 3/31/24 23:20, Adam Williamson wrote: On Sun, 2024-03-31 at 22:13 -0700, Carlos Rodriguez-Fernandez wrote: Adam, Is there a way already

Re: Three steps we could take to make supply chain attacks a bit harder

2024-03-31 Thread Carlos Rodriguez-Fernandez
Adam, Is there a way already to achieve test isolation during the rpm build? Beside doing something ad-hoc with git init or some file system feature, I was wondering if there is something already available and standardized. Regards, Carlos R.F. On 3/31/24 20:27, Adam Williamson wrote: On Su

Re: Three steps we could take to make supply chain attacks a bit harder

2024-03-31 Thread Carlos Rodriguez-Fernandez
Regarding downstream defense, prohibiting blobs or differences between tars and git repos may be overkill or difficult at this moment, but a tool to assist maintainers in the identification and analysis of these situations where attacks may be hidden into can be very helpful. Regarding the l

Re: Three steps we could take to make supply chain attacks a bit harder

2024-03-31 Thread Carlos Rodriguez-Fernandez
downstream project doesn't get "dirty" during and after the build, and/or commits are not modified during and after the build. But this doesn't solve the specific xz problem. That one requires different kinds of defense techniques. On 3/31/24 08:10, Carlos Rodriguez-Ferna

Re: Three steps we could take to make supply chain attacks a bit harder

2024-03-31 Thread Carlos Rodriguez-Fernandez
Going in that same route, if 2FA becomes mandatory, then we have a stronger defense of the GPG public key in the user profile. The attacker would need not only the credentials, but the 2FA device to change the public GPG. That then makes one step further possible: enforce commit signing on the

Re: Three steps we could take to make supply chain attacks a bit harder

2024-03-30 Thread Carlos Rodriguez-Fernandez
Hi Artem, I disagree that the idea is not appropriate. Ensuring that the tar.gz you are getting is exactly what it is in the git repo reduces a lot of risk. So, it makes a lot of sense to get rid of the practice of distributing tar.gz with pregenerated build scripts not present in the git rep

Re: Three steps we could take to make supply chain attacks a bit harder

2024-03-30 Thread Carlos Rodriguez-Fernandez
I like the idea of the security path as well, where all packages in that path have upstream subject to higher security standards (that means helping them to achieve it as well), and greater defense downstream in any way possible. Two things that came to mind I shared in another channel: * no b

Re: Redis will no longer be OSS... now what?

2024-03-28 Thread Carlos Rodriguez-Fernandez
ng the defacto replacement for redis in most places. On Thu, Mar 28, 2024 at 1:09 PM Carlos Rodriguez-Fernandez mailto:carlosrodrifernan...@gmail.com>> wrote: Valkey is another fork, sponsored by the Linux Foundation. https://www.linuxfoundation.org/press/linux-foundation-launc

Re: Redis will no longer be OSS... now what?

2024-03-28 Thread Carlos Rodriguez-Fernandez
Valkey is another fork, sponsored by the Linux Foundation. https://www.linuxfoundation.org/press/linux-foundation-launches-open-source-valkey-community It came out just today. On 3/23/24 11:35, Jonathan Wright via devel wrote: KeyDB builds are in Bodhi and ready for testing for all Fedora versi

Re: Request for Review for Two New Packages

2024-02-06 Thread Carlos Rodriguez-Fernandez
Hi All, The bmake-based mk-configure package review is completed. Could someone please review libmaa? It is a C language one. Thank you, Carlos R.F. On 1/13/24 12:10, Carlos Rodriguez Fernandez wrote: Hi All, I posted two new packages for review. Feedback is highly appreciated :) mk

Request for Review for Two New Packages

2024-01-13 Thread Carlos Rodriguez Fernandez
Hi All, I posted two new packages for review. Feedback is highly appreciated :) mk-configure https://bugzilla.redhat.com/show_bug.cgi?id=2257985 libmaa https://bugzilla.redhat.com/show_bug.cgi?id=2257986 Some context: I took the orphan package dictd. Dictd depends on libmaa. The dictd spec wa

Re: Inactive packages removed from packager group

2023-11-19 Thread Carlos Rodriguez-Fernandez
Hi all, I have been in the process of becoming a co-maintainer of *libcap*. But I still need the sponsorship part of it. Hoping it is resolved before the 6 weeks mark. I got the non-responsive issue approved, the sponsorship issue, and the PR with updates, tests converted to tmt, and cleanups

Re: Orphaning all my packages

2023-10-03 Thread Carlos Rodriguez Fernandez
Because when they ask “where is the code?”, they are asking a different question than yours :) Regards, Carlos On Tue, Oct 3, 2023 at 2:30 PM Simo Sorce wrote: > On Tue, 2023-10-03 at 23:13 +0200, Leon Fauster via devel wrote: > > Am 03.10.23 um 21:29 schrieb Simo Sorce: > > > On Tue, 2023-10-0

Re: Orphaning all my packages

2023-10-03 Thread Carlos Rodriguez-Fernandez
Leon, I don't think this has ever been about whether a piece of code is present in version 8 (using your example), but about the free (gratis) availability of the combination of version 7 with selected backports from version 8 that has been thoroughly tested by RedHat teams and their infrastru

Re: Making sense of golang packaging guidelines

2023-07-20 Thread Carlos Rodriguez Fernandez
Hi Fabio, Robert-André, Thank you for the explanation. It makes sense. Golang has this uniqueness about libs that removes some of the shared objects pros but I see there are other things at play. Thank you, Carlos. On Thu, Jul 20, 2023 at 1:44 PM wrote: > On 7/20/23 8:20 PM, Carlos Rodrig

Making sense of golang packaging guidelines

2023-07-20 Thread Carlos Rodriguez Fernandez
Hi all, I am interested in packaging some golang programs for Fedora (and EPEL), and I read through the guidelines: https://docs.fedoraproject.org/en-US/packaging-guidelines/Golang/ My question is more about the reasoning for the recommended handling of dependencies. Other language platforms hav

Re: CentOS Stream, RHEL, and Fedora [was Re: What is Fedora?]

2023-07-14 Thread Carlos Rodriguez-Fernandez
On 7/14/23 00:02, Vitaly Zaitsev via devel wrote: On 14/07/2023 08:16, Carlos Rodriguez-Fernandez wrote: After much discussion, the AlmaLinux OS Foundation board today has decided to drop the aim to be 1:1 with RHEL. AlmaLinux OS will instead aim to be Application Binary Interface (ABI

Re: CentOS Stream, RHEL, and Fedora [was Re: What is Fedora?]

2023-07-13 Thread Carlos Rodriguez-Fernandez
This is actually good news, especially for the CentOS Stream project. https://almalinux.org/blog/future-of-almalinux/ Quotes: After much discussion, the AlmaLinux OS Foundation board today has decided to drop the aim to be 1:1 with RHEL. AlmaLinux OS will instead aim to be Application Bin

Re: Red Hat & Fedora -- largely stepping out of this ecosystem

2023-07-02 Thread Carlos Rodriguez-Fernandez
will eventually create ABI compatibility issues, and it is also not what we have been told. Am I missing something? Thank you for your feedback. Regards, Carlos On 7/2/23 07:35, Michael Catanzaro wrote: On Fri, Jun 30 2023 at 11:09:41 AM -0700, Carlos Rodriguez-Fernandez wrote: Going forwar

Re: Red Hat & Fedora -- largely stepping out of this ecosystem

2023-07-01 Thread Carlos Rodriguez-Fernandez
On 7/1/23 12:33, Piotr Szubiakowski wrote: I think we all have a problem understanding what this announcement means. I do believe CentOS Stream is awesome software. It has to be since it's close to what RHEL is. My problem with CentOS Stream is that it's not a distribution of my choice, and I

Re: Red Hat & Fedora -- largely stepping out of this ecosystem

2023-06-30 Thread Carlos Rodriguez-Fernandez
That's not what is happening on those patches, Leslie. The RH engineers are adding the patches to the package which is basically how backporting works (as in all distros that do it), and then adding themselves as the maintainers that added the patches. Well documented as it should. They did not

Re: Red Hat & Fedora -- largely stepping out of this ecosystem

2023-06-27 Thread Carlos Rodriguez-Fernandez
The distros that provide commercial support beside RedHat have been sort of doing something similar. Canonical provides Ubuntu LTS, a distro with 5 years of development, and then additional 5 years of maintenance for those with subscription. SUSE, also, 5 years major release support for OpenS