I am one of the keepassxc maintainers. Bugreport
"Missing dependency: qt5-qtsvg libQt5Svg.so.5"
https://bugzilla.redhat.com/show_bug.cgi?id=1911210
made me wonder about the following thing:
I just installed a basic Fedora server to do a test concerning keepassxc
libs. Keepassxc spec file [1] does not contain any Requires dependency,
but when I install it, it triggers the installation of these libraries
[2] that are needed at runtime.
My question is: how can keepassxc trigger the installation of such
libraries if the spec file does not contain any Requires dependency that
should be the attribute to identify runtime dependencies that are needed
by the package?
Thank you
[1]:
https://src.fedoraproject.org/rpms/keepassxc/blob/master/f/keepassxc.spec
[2]:
fontconfig freetype glx-utils graphite2 harfbuzz langpacks-core-font-en
libICE libSM libX1 libX11-common libX11-xcb libXau libXdamage libXext
libXfixes libXi libXtst libXxf86vm libdrm libevdev libglvnd libglvnd-egl
libglvnd-glx libinput libjpeg-turbo libpciaccess libsodium libwacom
libwacom-data libwayland-client libwayland-server libxcb
libxkbcommon-x11 libxshmfence libyubikey llvm-libs mesa-filesystem
mesa-libEGL mesa-libGL mesa-libgbm mesa-libglapi mtdev pcre2-utf16
qt-settings qt5-qtbase qt5-qtbase-common qt5-qtbase-gui qt5-qtsvg
qt5-qtx11extras quazip-qt5 xcb-util xcb-util-image xcb-util-keysyms
xcb-util-renderutil xcb-util-wm xml-common ykpers Weak dependencies:
mesa-dri-drivers
Hi,
I sorry to tell you, that gpg-agents are inflating on numbers in Fedora
systems:
As far as I understand ssh-agents, you start ONE for each user, but
here, one for each repo is opened by PackageKit:
(today)
root 2530 0.0 0.0 151908 892 ? Ss 14:32 0:00
gpg-agent --homedir
/var/cache/PackageKit/32/metadata/updates-modular-32-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 2637 0.0 0.0 151908 896 ? Ss 14:32 0:00
gpg-agent --homedir
/var/cache/PackageKit/32/metadata/rpmfusion-free-32-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 2653 0.0 0.0 151908 796 ? Ss 14:32 0:00
gpg-agent --homedir
/var/cache/PackageKit/32/metadata/rpmfusion-nonfree-32-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 2668 0.0 0.0 151908 816 ? Ss 14:32 0:00
gpg-agent --homedir
/var/cache/PackageKit/32/metadata/updates-32-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 2693 0.0 0.0 151908 860 ? Ss 14:32 0:00
gpg-agent --homedir
/var/cache/PackageKit/32/metadata/fedora-32-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 2710 0.0 0.0 151908 708 ? Ss 14:32 0:00
gpg-agent --homedir
/var/cache/PackageKit/33/metadata/updates-modular-33-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 2723 0.0 0.0 151908 896 ? Ss 14:32 0:00
gpg-agent --homedir
/var/cache/PackageKit/33/metadata/updates-33-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 3393 0.0 0.0 151908 892 ? Ss 14:32 0:00
gpg-agent --homedir
/var/cache/PackageKit/31/metadata/fedora-modular-31-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 3404 0.0 0.0 151908 712 ? Ss 14:32 0:00
gpg-agent --homedir
/var/cache/PackageKit/31/metadata/rpmfusion-free-updates-31-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 3417 0.0 0.0 151908 800 ? Ss 14:32 0:00
gpg-agent --homedir
/var/cache/PackageKit/31/metadata/updates-modular-31-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 3438 0.0 0.0 151908 812 ? Ss 14:32 0:00
gpg-agent --homedir
/var/cache/PackageKit/31/metadata/rpmfusion-free-31-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 3451 0.0 0.0 151908 808 ? Ss 14:33 0:00
gpg-agent --homedir
/var/cache/PackageKit/31/metadata/rpmfusion-nonfree-31-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 3464 0.0 0.0 151908 936 ? Ss 14:33 0:00
gpg-agent --homedir
/var/cache/PackageKit/31/metadata/updates-31-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 3474 0.0 0.0 151908 948 ? Ss 14:33 0:00
gpg-agent --homedir
/var/cache/PackageKit/31/metadata/rpmfusion-nonfree-updates-31-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 3492 0.0 0.0 151908 768 ? Ss 14:33 0:00
gpg-agent --homedir
/var/cache/PackageKit/31/metadata/teamviewer-31-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 3512 0.0 0.0 151908 884 ? Ss 14:33 0:00
gpg-agent --homedir
/var/cache/PackageKit/31/metadata/fedora-31-x86_64.tmp/gpgdir
--use-standard-socket --daemon
root 3526 0.0 0.0 151908 888 ? Ss 14:33 0:00
gpg-agent --homedir
/var/cache/PackageKit/31/metadata/fedora-cisco-openh264-31-x86_64.tmp/gpgdir
--use-standard-socket --daemon
it would be more effective, if you give any programm who needs it, the
password directly, instead of having useless processes laying around ;)
https://bugzilla.redhat.com/show_bug.cgi?id=1895012
it's not even doing this for every system, as my private pc does not
have those (upgraded by dnf, and yes, it's installed), but others do
(upgraded by packagekit).
Systemd opens gpg-agents even for mailserver daemons, which do not need
nor know how to use them.
https://bugzilla.redhat.com/show_bug.cgi?id=1877308
No idea what caused this invasion lately, but bugreports about it, get
ignored.
Could someone please take a look and fix it, if it's bug.
best regards,
Marius Schwarz
I maintain packages that used to BR the packages in $SUBJECT, but with
their latest versions no longer do. I'm orphaning these packages. If
you need them, please pick them up.
--
Jerry James
http://www.jamezone.org/
Hello fellow developers.
I've joined this list quite a while ago, mostly to keep a pulse on the Fedora development community, but also to look to become a package contributor. But before getting to that, a few words about myself.
I've been "into computers" since mid-80's, started off with a 4.77 Mhz 8088 (IBM PCjr). I learned Unix in the early 90's on an IBM AIX system, where I picked up C programming and sysadmin experience. Which eventually took me into the world of Linux (I think it was kernel version 0.12, came on a boot disk and root disk pair I grabbed off a BBS, long before there was easy general public Internet access).
Anyway I've been focused on Red Hat based distros for the past 15 years, and at my current employer I oversee about 700 systems installed at customer locations (where I was the resource responsible for packaging our applications and creating system build images).
Any way, what I'd like to give back to the community is a really nice backup system called Snebu (Simple Network Encrypting Backup Utility). I initially developed this more than 8 years ago since there wasn't anything else that fit my needs -- I used it to back up my personal systems, and also in some lab environments. I've read plenty of rants that have been posted about how backups are either too difficult to set up, or don't support multiple clients, or require a repository encryption password to be placed in plain text on clients, and other issues people have. With that in mind, I believe that Snebu can be just what people want.
Before going through and submitting the package for formal review, I'd appreciate some feedback on what I have packaged up so far. The current release is at https://github.com/derekp7/snebu/releases/download/v1.1.0/snebu-1.1.0-1.fc3…, and the project web site is at https://www.snebu.com.
The main features that it has that are interesting: It maintains a centralized package database on the server (using SQLite3) tracking backup sets and metadata; actual files are stored in the filesystem as lzop compressed files using a file hash for the file name which leads to full cross-system file level de-duplication (so no proprietary file formats); uses a snapshot style backup strategy; it uses GNU tar as a serialization format to shuffle backups to the server which leads to how the public key encryption support was added by developing "tarcrypt"; and it works in single-system installs, client-push or server-pull backups, with no agent required on the client.
Another interesting project that I may spin off is the above mentioned "tarcrypt" command. This acts as a filter for tar files, which adds RSA key data to the header (passphrase protected private key, public key, HMAC signatures, etc), compresses and encrypts the file contents while keeping standard tar headers in place (with the additional encryption metadata added via extended PAX headers). The details on this project is at https://www.snebu.com/tarcrypt.html. So far tarcrypt is part of the Snebu repository, but if there is interest then it may eventually be spun out as an independent project.
BTW, the current .src.rpm file for Snebu mentioned above has passed through a valid build using the Fedora "mock" utility, and passed rpmlint. The only error rpmlint shows is:
snebu.src: W: spelling-error %description -l en_US de -> DE, ed, d
Not sure what that error is saying, as the text at the end of the message doesn't appear anywhere in the .spec file.
Thanks, and I look forward to your feedback.
Hello team,
openvdb-8.0.0 is released upstream meaning the soversion is now 8.0
resulting a break on dependent packages like OpenImageIO and Blender as
tested on COPR blender[1]. The commit is already complete
https://src.fedoraproject.org/rpms/openvdb
and it is a matter of building for proven packagers.
Thanks in advance
Reference:
[1] https://copr.fedorainfracloud.org/coprs/luya/blender-egl/build/1848958/
--
Luya Tshimbalanga
Fedora Design Team
Fedora Design Suite maintainer
A new build of ldns was done for Rawhide yesterday by law/pemensik:
https://koji.fedoraproject.org/koji/buildinfo?buildID=1660180
This build changes the soname of libreport from libldns.so.2 to
libldns.so.3.
This bump was not announced AFAICS, and none of its several
dependencies appear to have been rebuilt:
dnsperf-0:2.4.0-2.fc34.x86_64
dnssec-trigger-0:0.17-1.fc34.x86_64
flamethrower-0:0.11.0-1.fc34.x86_64
ldns-devel-0:1.7.0-32.fc33.x86_64
ldns-utils-0:1.7.0-32.fc33.x86_64
libreswan-0:4.1-3.fc34.x86_64
netresolve-backends-aresdns-0:0.0.1-0.28.20160317git.fc33.x86_64
netresolve-backends-avahi-0:0.0.1-0.28.20160317git.fc33.x86_64
netresolve-backends-compat-0:0.0.1-0.28.20160317git.fc33.x86_64
netresolve-backends-ubdns-0:0.0.1-0.28.20160317git.fc33.x86_64
netresolve-compat-0:0.0.1-0.28.20160317git.fc33.x86_64
netresolve-core-0:0.0.1-0.28.20160317git.fc33.x86_64
netresolve-tools-0:0.0.1-0.28.20160317git.fc33.x86_64
nordugrid-arc-plugins-needed-0:6.9.0-1.fc34.x86_64
opendnssec-0:2.1.7-1.fc34.x86_64
python3-ldns-0:1.7.0-32.fc33.x86_64
This broke today's Rawhide compose due to a KDE dependency chain that
involves libreswan:
https://koji.fedoraproject.org/koji/taskinfo?taskID=57780927
Please remember to announce soname bumps ahead of time and arrange
rebuilds of dependencies so this kind of problem can be avoided.
Thanks. I will try and rebuild things, at least compose-critical
things, now, but if straight rebuilds don't work might need people to
help out.
--
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net
A propos of some discussion of the Solarwinds news, it occurred to me
to check how many proven packager accounts there are in FAS. There are
251, which seems like a lot. Then it occurred to me to check how many
of them are inactive, so I wrote a little script:
===
#!/usr/bin/python3
import getpass
from fedora.client.fas2 import AccountSystem
from koji import ClientSession
username = input("FAS user name: ")
password = getpass.getpass("FAS password: ")
acc = AccountSystem(username=username, password=password)
pps = acc.group_members("provenpackager")
ks = ClientSession("https://koji.fedoraproject.org/kojihub")
for pp in pps:
user = ks.getUser(pp["username"])
if not user:
print(f"{pp['username']} NON-EXISTENT IN KOJI")
continue
uid = user["id"]
if ks.listBuilds(userID=uid, createdAfter="2019-01-01 00:00:00"):
continue
print(pp["username"])
===
Here is the list it produced:
alexl
alexlan
arg
athimm
atkac
bernie
bkabrda
bpepple
caillon
cebbert
chitlesh
cweyl
cwickert
davej
dbhole
dcbw
denis
dgregor
dsd
ecik
ensc
epienbro
fitzsim
gdk NON-EXISTENT IN KOJI
gemi
ianweller
iarnell
ilianaw
ishcherb
ivazquez
ixs
jcapik
jkeating
johnp
jpo
jreznik
jspaleta
jstanley
jsteffan
jwilson
kasal
katzj
kay
ke4qqq
kengert
kyle
kylev
laxathom
lennart
lmacken
lutter
markmc
mbarnes
mef
mjakubicek
mjg59
mmahut
mmaslano
mmcgrath
msrb
mstuchli
npmccallum
overholt
paragn
patches
pertusus
pjp
praveenp
pravins
rakesh
rkuska
rvokal
s4504kr
scop
sdake
sdz
skvidal
stahnma
steve
sundaram
thomasvs
toshio
tradej
tremble
tstclair
tuxbrewr
vakwetu
vicodan
willb
wolfy
that's 90 of the 251 who still have provenpackager privileges, but
haven't run any kind of Koji build since at least 2019-01-01 (if you
check, it turns out many of them haven't run a build since long before
then). Many of them, to my knowledge, don't work on Fedora at all any
more and haven't for years. At least one of them, to my and everyone
else's knowledge, is sadly dead and has been for some time. One account
- it's Greg Dekoenigsberg - somehow is in the FAS pp group but doesn't
exist in koji (any more?)
Perhaps we need a process for cleaning up membership of this extremely
powerful group? If the FAS password of *any one* of those user accounts
were somehow compromised (or if just one of them decided they had a
grudge against Fedora now and were going to have some fun), the results
could be...unfortunate.
--
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net
Hi,
We'd like to announce the public testing of Syngrafias, an Asciidoctor
collaboration tool - a service for Fedora documentation maintainers aiming
to
provide an environment where they can collaborate by sharing their workspace
among multiple contributors with active synchronization of edits at every
end
and live preview of the Asciidoctor files.
The preview version for public testing is now available here:
http://35.231.107.163/
Please note that as it has been deployed on a low-tier Google Cloud
instance,
the first load might take a while.
Syngrafias leverages WebSockets backend to significantly improve upon the
collaboration experience among multiple documentation writers and ensures an
ultralight implementation of the workspace server. (~2MB above Python
runtime)
It also includes the following features -
- Live Asciidoc editing and preview
- Workspace identity can be shared among multiple people to collaborate in
real time
- Documents can be exported locally and imported in different workspaces
- Unintrusive and focussed editing with cells inside a document
We would love to hear your feedback. Please keep in mind that this is a
testing
deployment and is currently running on an underpowered cloud instance. We
are
proposing it as a candidate GSoC project for it to be deployed, maintained
and
integrated in the Fedora Infrastructure this summer. Also the deployment
goes
offline on 8th January so be sure to check it out soon.
Feel free to provide ideas or bug reports at
https://github.com/t0xic0der/syngrafias or simply send an email reply to
this
thread with all kinds of feedback and suggestions.
---
Nasir Hussain
Hi all,
I filed https://pagure.io/fesco/issue/2512 asking FESCo to move all
automated emails to a separate list where people who want to follow
can, while I was part of the proliferation of compose reports coming
here, there is now a great deal of them, and they no longer seem to
trigger any conversation. I think that devel list would benefit from
having all automated reports sent to a reports-list and letting people
bring reports over when there is something to discuss. I was asked to
bring the request to the list for people to weigh in.
Thanks
Dennis