Il 04/09/22 00:01, Adam Williamson ha scritto:
> On Sat, 2022-09-03 at 13:04 -0700, Kevin Fenzi wrote:
>> On Sat, Sep 03, 2022 at 12:24:11PM -0700, Adam Williamson wrote:
>>> So, I have a probably-controversial idea for a follow-up on this.
>>>
>>> Even after this sweep, we have 141 proven packager
On 04/09/2022 00:01, Adam Williamson wrote:
But yeah, looking at that, one 'loophole' is it doesn't check if
they're actually needing*proven* packager powers - just packager
powers. If a proven packager is only building packages they have
explicit commit rights to, they may not need proven packa
On 04/09/2022 02:40, Adam Williamson wrote:
Maybe if there are
folks like that they'd be happy to drop the privileges so if they do
lose their laptop or something, the consequences are more limited.
We just need to force all proven packagers to use 2FA. Problem solved.
--
Sincerely,
Vitaly Z
Can someone give me hint as to what I'm doing wrong here, I have a C++
package that builds fine for f35 & f36 with x86_64 & aarch64, but
which fails on f37-x86_64 (the build is ok on f37-aarch64):
https://copr.fedorainfracloud.org/coprs/bpostle/IfcOpenShell/build/4771106/
[ 0%] Building CXX obje
OLD: Fedora-Rawhide-20220903.n.0
NEW: Fedora-Rawhide-20220904.n.0
= SUMMARY =
Added images:1
Dropped images: 1
Added packages: 0
Dropped packages:1
Upgraded packages: 32
Downgraded packages: 0
Size of added packages: 0 B
Size of dropped packages:1.33 MiB
OLD: Fedora-37-20220903.n.0
NEW: Fedora-37-20220904.n.0
= SUMMARY =
Added images:2
Dropped images: 0
Added packages: 0
Dropped packages:1
Upgraded packages: 0
Downgraded packages: 0
Size of added packages: 0 B
Size of dropped packages:1.33 MiB
Size of
I noticed on the packager dashboard that I have a package that was failing
for EPEL 7[1] and I have since fixed it, but I don't need to build a new
package and Koschei hasn't attempted a rebuild since 6/29.
While I could just ignore it, I was wondering if there was a way to force a
rebuild? I see
Il 19/08/22 18:53, Gary Buhrmaster ha scritto:
> On Fri, Aug 19, 2022 at 10:47 AM P J P wrote:
>
>> * Interesting numbers there.
> (see below on another number)
>
>> * While I get that such pruning from time to time is generally good.
>>What happens to the packages orphaned by removing inactiv
On Sun, Sep 4, 2022 at 1:38 PM Mattia Verga via devel
wrote:
> If anyone wants to have a look to what packages **may** be orphaned when
> those users are removed from the packager group, I've set up a script
> and uploaded the results here [1].
Thanks for doing this.
The list does not look undu
On Sun, 2022-09-04 at 03:02 +, Gary Buhrmaster wrote:
> On Sun, Sep 4, 2022 at 1:06 AM Kevin Fenzi wrote:
>
> > Perhaps it would be better (although more noisy) to just mail all
> > provenpackagers every cycle and ask if anyone would like to leave the
> > group?
>
> One should ask a PP (I am
On Sun, 2022-09-04 at 10:18 +0200, Vitaly Zaitsev via devel wrote:
> On 04/09/2022 02:40, Adam Williamson wrote:
> > Maybe if there are
> > folks like that they'd be happy to drop the privileges so if they do
> > lose their laptop or something, the consequences are more limited.
>
> We just need t
Hi folks! I'm proposing we cancel the QA meeting tomrrow. It's a holiday
in North America and I don't have anything much for the agenda again.
There will be a blocker review meeting on Tuesday, due to the holiday.
If you're aware of anything it would be useful to discuss this week,
please do reply
Hey!
Can't join on Tuesday next week as i will be at the Red Hat Open Tour
Stockholm event then
On 9/4/22, Adam Williamson wrote:
> Hi folks! I'm proposing we cancel the QA meeting tomrrow. It's a holiday
> in North America and I don't have anything much for the agenda again.
> There will be a b
On Sun, Sep 4, 2022 at 3:52 PM Adam Williamson
wrote:
> Well, not really. 2FA isn't a magic bullet. I would be in favor of
> doing this, but you can't treat any security measure as solving all
> your problems completely.
Nothing is a magic bullet (and most security can be bypassed
with the $10 (
On Sun, Sep 4, 2022 at 3:48 PM Adam Williamson
wrote:
> Personally, once a year wouldn't be anywhere near frequent enough to
> trigger me to Do Something About It - it took me years to turn off
> Bugzilla's "hey look you have needinfo bugs!" thing and I was getting
> that every *day*. :P But I du
On Sun, Sep 4 2022 at 04:48:10 PM +, Gary Buhrmaster
wrote:
However, last this was discussed, the Fedora AAA system(s)
did not (yet?) support the full fido2/webauthn/passkey
functionality, so at this time such full integration is just a
dream(*).
You don't have to be a provenpackager to b
On su, 04 syys 2022, Gary Buhrmaster wrote:
On Sun, Sep 4, 2022 at 3:52 PM Adam Williamson
wrote:
Well, not really. 2FA isn't a magic bullet. I would be in favor of
doing this, but you can't treat any security measure as solving all
your problems completely.
Nothing is a magic bullet (and mo
On Sun, Sep 4, 2022 at 6:29 PM Alexander Bokovoy wrote:
> You might want to watch our Nest with Fedora 2022 talk. More features
> are coming too, we are working on a direct FIDO2 integration in SSSD and
> FreeIPA .
Thanks for the update. Good news about the progress. I will watch the talk
Here we go:
- F37: https://bodhi.fedoraproject.org/updates/FEDORA-2022-8414514ae6
- rawhide: https://bodhi.fedoraproject.org/updates/FEDORA-2022-0c2d48988e
After the mass rebuild in the F37 side tag, we tagged all builds also
in a rawhide side tag, rebuilt everything in one go, untagged the F37
b
Bruno Postle wrote on 2022/09/04 17:44:
Can someone give me hint as to what I'm doing wrong here, I have a C++
package that builds fine for f35 & f36 with x86_64 & aarch64, but
which fails on f37-x86_64 (the build is ok on f37-aarch64):
https://copr.fedorainfracloud.org/coprs/bpostle/IfcOpenShel
On Sun, Sep 4, 2022 at 1:38 PM Mattia Verga wrote:
> If anyone wants to have a look to what packages **may** be orphaned
> when those users are removed from the packager group, I've set up a
> script and uploaded the results here [1].
>
> Do not be too scared by those results: there's still plent
21 matches
Mail list logo