Re: F28 Self Contained Change: Django 2.0

2018-01-03 Thread Matthias Runge
On Tue, Dec 12, 2017 at 06:06:46PM +0100, Jan Kurik wrote: > = Proposed Self Contained Change: Django 2.0 = > https://fedoraproject.org/wiki/Changes/Django20 For curious folks, there is a copr[1] with django 2.0 builds to try out. I'm going to strip current Django-1.11 builds down to remove the p

January 2018 Elections: Nomination & Campaign period is open

2018-01-03 Thread Brian Exelbierd
Today we are starting the Nomination & Campaign period during which we accept nominations to the "steering bodies" of the following teams: * FESCo (Engineering) (5 seats) [1] * Fedora Council (2 seats) [2] * Mindshare (2 seats) [3] This period is open until 2018-Jan-10 at 23:59:59 UTC. The nomin

Re: Fedora rawhide compose report: 20180101.n.0 changes

2018-01-03 Thread Jonathan Wakely
On 02/01/18 12:45 +, Zbigniew Jędrzejewski-Szmek wrote: On Mon, Jan 01, 2018 at 10:13:15PM +, Fedora Rawhide Report wrote: [python-lmiwbem] python2-lmiwbem-0.7.2-16.fc28.aarch64 requires boost-python >= 0:1.50.0 Hmm, boost-python was renamed to python2-boost, and then to boost-p

Re: Fedora rawhide compose report: 20180101.n.0 changes

2018-01-03 Thread Zbigniew Jędrzejewski-Szmek
On Wed, Jan 03, 2018 at 11:43:34AM +, Jonathan Wakely wrote: > On 02/01/18 12:45 +, Zbigniew Jędrzejewski-Szmek wrote: > >On Mon, Jan 01, 2018 at 10:13:15PM +, Fedora Rawhide Report wrote: > >>[python-lmiwbem] > >>python2-lmiwbem-0.7.2-16.fc28.aarch64 requires boost-python >= 0:1.50

Re: Fedora rawhide compose report: 20180101.n.0 changes

2018-01-03 Thread Jonathan Wakely
On 03/01/18 12:55 +, Zbigniew Jędrzejewski-Szmek wrote: On Wed, Jan 03, 2018 at 11:43:34AM +, Jonathan Wakely wrote: On 02/01/18 12:45 +, Zbigniew Jędrzejewski-Szmek wrote: >On Mon, Jan 01, 2018 at 10:13:15PM +, Fedora Rawhide Report wrote: >>[python-lmiwbem] >>python2-lm

[Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-03 Thread Tomasz Kłoczko
Hi, I'm trying to follow procedure described on https://fedoraproject.org/wiki/Mass_package_changes Description of the current state === At the moment more than many spec files have %post/%postu/%postrans scriptles in which is done updating hicolor theme cache by calling: gt

Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-03 Thread Igor Gnatenko
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, 2018-01-03 at 16:53 +0100, Tomasz Kłoczko wrote: > Hi, > > I'm trying to follow procedure described on > https://fedoraproject.org/wiki/Mass_package_changes > > Description of the current state > === > > At the moment m

Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-03 Thread Charalampos Stratakis
- Original Message - > From: "Tomasz Kłoczko" > To: "Development discussions related to Fedora" > > Sent: Wednesday, January 3, 2018 4:53:24 PM > Subject: [Proposal] Mass change: remove executing gtk-update-icon-cache in > %post/%postu/%postrans to update hicolor > theme cache > > Hi,

Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-03 Thread Philip Kovacs
Can we remove the gtk-update-icon-cache entries from our packages now, manually, in advance of the mass update?   On Wednesday, January 3, 2018 11:10 AM, Charalampos Stratakis wrote: - Original Message - > From: "Tomasz Kłoczko" > To: "Development discussions related to Fedora

Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-03 Thread Tomasz Kłoczko
On 3 January 2018 at 17:09, Igor Gnatenko wrote: [..] > First thing you should do is to open a ticket for FPC[0] in order to fix > guidelines. > > Once it is approved by FPC, I can help you dealing with this as a proven > packager since it is trivial enough. Done https://pagure.io/packaging-commi

Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-03 Thread Igor Gnatenko
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, 2018-01-03 at 16:30 +, Philip Kovacs wrote: > Can we remove the gtk-update-icon-cache entries from our packages now, > manually, in advance of the mass update? Before FPC approves that it's really not needed, strictly speaking is viol

Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-03 Thread Tomasz Kłoczko
On 3 January 2018 at 17:09, Charalampos Stratakis wrote: [..] > You might want to take a look at https://pagure.io/python-fixrequires which > is from a python-SIG member, and modify it for your usecase. > > It basically forks a repo, makes the changes to the SPEC, pushes it to your > fork and cr

Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-03 Thread Tomasz Kłoczko
On 3 January 2018 at 17:41, Igor Gnatenko wrote: [..] >> Can we remove the gtk-update-icon-cache entries from our packages now, >> manually, in advance of the mass update? > > Before FPC approves that it's really not needed, strictly speaking is > violation > of packaging guidelines... Just adde

Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-03 Thread Neal Gompa
On Wed, Jan 3, 2018 at 11:42 AM, Tomasz Kłoczko wrote: > On 3 January 2018 at 17:09, Charalampos Stratakis wrote: > [..] >> You might want to take a look at https://pagure.io/python-fixrequires which >> is from a python-SIG member, and modify it for your usecase. >> >> It basically forks a repo,

Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-03 Thread Tomasz Kłoczko
Tomasz Kłoczko | Tel: 0774 1209067 | LinkedIn: http://lnkd.in/FXPWxH On 3 January 2018 at 18:08, Tomasz Kłoczko wrote: [..] > So IMO Fedora documentation should be modified more in this direction > and those +1300 spec files about hicolor theme icons cache update it > is only ATM biggest part of

Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-03 Thread Zbigniew Jędrzejewski-Szmek
On Wed, Jan 03, 2018 at 05:33:38PM +0100, Tomasz Kłoczko wrote: > On 3 January 2018 at 17:09, Igor Gnatenko > wrote: > [..] > > First thing you should do is to open a ticket for FPC[0] in order to fix > > guidelines. > > > > Once it is approved by FPC, I can help you dealing with this as a proven

Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-03 Thread Tomasz Kłoczko
On 3 January 2018 at 18:08, Neal Gompa wrote: [..] >> Many years ago when I've been working on PLD we wrote such spec >> indentation tool using few KB awk script. using this script was >> possible to keep the same style across all spec files with: >> - put in exact order spec fields in spec preamb

Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-03 Thread Tomasz Kłoczko
On 3 January 2018 at 18:16, Zbigniew Jędrzejewski-Szmek wrote: [..] >> Done https://pagure.io/packaging-committee/issue/736 > > Once the guidelines are removed, I think the optimum way is to > a) generate patches for all 1300 packages > b) post them publicly > c) allow the public-at-large and a fe

Intent to retire eigen2

2018-01-03 Thread Sandro Mani
Hi eigen2 has long since been EOL, was actually already retired once in Fedora, but brought back alive to keep avogadro building (which didn't build against eigen3 >= 3.3). Avogadro has since received proper upstream eigen3 support, and the Fedora package has switched to using eigen3. There a

Re: Intent to retire eigen2

2018-01-03 Thread Sandro Mani
On 03.01.2018 18:59, Sandro Mani wrote: Hi eigen2 has long since been EOL, was actually already retired once in Fedora, but brought back alive to keep avogadro building (which didn't build against eigen3 >= 3.3). Avogadro has since received proper upstream eigen3 support, and the Fedora pac

Self Introduction: Kevin Howell

2018-01-03 Thread Kevin Howell
Hi folks, I'm a Red Hat employee since 2014 and have been a long-time user of Fedora. On the job I work on mostly subscription-manager ( https://github.com/candlepin/subscription-manager ) and also candlepin ( https://github.com/candlepin/candlepin ). I dabble in various other tiny side-projects (

RPM for libblocksruntime?

2018-01-03 Thread Ron Olson
Hi all- I know this has come up before, though I apologize that I couldn't find the info, but what is preventing Fedora from including "libblocksruntime" as an available RPM? Debian provides it: https://packages.debian.org/source/jessie/libblocksruntime and it's a requirement for compiling A

[Test-Announce] Fedora 28 Rawhide 20180103.n.0 nightly compose nominated for testing

2018-01-03 Thread rawhide
Announcing the creation of a new nightly release validation test event for Fedora 28 Rawhide 20180103.n.0. Please help run some tests for this nightly compose if you have time. For more information on nightly release validation testing, see: https://fedoraproject.org/wiki

Fedora Rawhide-20180103.n.0 compose check report

2018-01-03 Thread Fedora compose checker
Missing expected images: Server dvd i386 Workstation live i386 Server boot i386 Kde live i386 Failed openQA tests: 97/128 (x86_64), 1/2 (arm) New failures (same test did not fail in Rawhide-20180102.n.0): ID: 183659 Test: x86_64 Server-boot-iso install_default@uefi URL: https://openqa.fedo

Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-03 Thread Adam Williamson
On Wed, 2018-01-03 at 17:42 +0100, Tomasz Kłoczko wrote: > On 3 January 2018 at 17:09, Charalampos Stratakis wrote: > [..] > > You might want to take a look at https://pagure.io/python-fixrequires which > > is from a python-SIG member, and modify it for your usecase. > > > > It basically forks a

[Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Adam Williamson
Hi folks! So you might have read some stories today about an issue that's being described as a design flaw in some CPUs which makes it possible for unprivileged users on an affected system to read from privileged memory locations. It seems like there are some complex questions still being figured

[Test-Announce] Re: Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Adam Williamson
On Wed, 2018-01-03 at 15:02 -0800, Adam Williamson wrote: > Hi folks! > > So you might have read some stories today about an issue that's being > described as a design flaw in some CPUs which makes it possible for > unprivileged users on an affected system to read from privileged memory > location

Re: Fedora Rawhide-20180103.n.0 compose check report

2018-01-03 Thread Adam Williamson
On Wed, 2018-01-03 at 20:43 +, Fedora compose checker wrote: > Missing expected images: > > Server dvd i386 > Workstation live i386 > Server boot i386 > Kde live i386 These are due to: https://github.com/rhinstaller/lorax/pull/299 Once a lorax package build with that fix shows up in Rawhide

[Test-Announce] Re: Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Adam Williamson
On Wed, 2018-01-03 at 15:02 -0800, Adam Williamson wrote: > Hi folks! > > So you might have read some stories today about an issue that's being > described as a design flaw in some CPUs which makes it possible for > unprivileged users on an affected system to read from privileged memory > location

Re: [Test-Announce] Re: Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread stan
On Wed, 03 Jan 2018 16:39:34 -0800 Adam Williamson wrote: > On Wed, 2018-01-03 at 15:02 -0800, Adam Williamson wrote: > > Hi folks! > > > > So you might have read some stories today about an issue that's > > being described as a design flaw in some CPUs which makes it > > possible for unprivileg

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread stan
On Wed, 03 Jan 2018 15:02:11 -0800 Adam Williamson wrote: > * We know that the fix can lead to reduced performance in some cases > (this affects synthetic benchmarks rather more than real-world > performance). The kernel team thinks the fix is sufficiently important > that it should go out despit

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Philip Kovacs
Any word on the performance hit before you push to stable?  Is it discernible? On Wednesday, January 3, 2018 8:15 PM, stan wrote: On Wed, 03 Jan 2018 15:02:11 -0800 Adam Williamson wrote: > * We know that the fix can lead to reduced performance in some cases > (this affects synthetic

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Adam Williamson
On Wed, 2018-01-03 at 18:13 -0700, stan wrote: > On Wed, 03 Jan 2018 15:02:11 -0800 > Adam Williamson wrote: > > > * We know that the fix can lead to reduced performance in some cases > > (this affects synthetic benchmarks rather more than real-world > > performance). The kernel team thinks the f

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Adam Williamson
On Thu, 2018-01-04 at 01:35 +, Philip Kovacs wrote: > Any word on the performance hit before you push to stable? Is it > discernible? So far as I've read, the general consensus is that you're probably not going to notice it in most usage. Some specific synthetic benchmarks are showing impac

Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Adam Williamson
On Wed, 2018-01-03 at 17:48 -0800, Adam Williamson wrote: > > This is certainly not correct. Both the Google researchers and Red > Hat's security team have stated that many other CPUs and CPU families > are affected. ARM has already released a statement acknowledging that > several of their CPUs,

Re: [Test-Announce] Re: Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Matthew Miller
On Wed, Jan 03, 2018 at 06:06:11PM -0700, stan wrote: > It turns out that AMD processors are not affected by this problem. This is not completely clear. AMD processors seem to be not affected by at least some forms of the "Meltdown" variant of the problem; I don't think we can confidently state an

Re: [Test-Announce] Re: Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Brendan Conoboy
On 01/03/2018 08:24 PM, Matthew Miller wrote: On Wed, Jan 03, 2018 at 06:06:11PM -0700, stan wrote: It turns out that AMD processors are not affected by this problem. This is not completely clear. AMD processors seem to be not affected by at least some forms of the "Meltdown" variant of the pr

Re: [Test-Announce] Re: Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Adam Williamson
On Wed, 2018-01-03 at 21:49 -0700, Brendan Conoboy wrote: > This is probably where the "AMD is safe" rumor started, but that is > only 1/3, maybe 2/3. Now that the context is public let's be clear: > even AMD processors are vulnerable without the patched kernel Adam has > asked for help testing

Re: [Test-Announce] Re: Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-03 Thread Adam Williamson
On Wed, 2018-01-03 at 22:14 -0800, Adam Williamson wrote: > On Wed, 2018-01-03 at 21:49 -0700, Brendan Conoboy wrote: > > This is probably where the "AMD is safe" rumor started, but that is > > only 1/3, maybe 2/3. Now that the context is public let's be clear: > > even AMD processors are vulner

Fedora Rawhide-20180103.n.0 compose check report

2018-01-03 Thread Fedora compose checker
Missing expected images: Server dvd i386 Workstation live i386 Server boot i386 Kde live i386 Failed openQA tests: 15/128 (x86_64), 1/2 (arm) Old failures (same test failed in Rawhide-20180102.n.0): ID: 183999 Test: x86_64 Server-dvd-iso server_role_deploy_domain_controller URL: https://op