https://bugzilla.redhat.com/show_bug.cgi?id=2265944
Bug ID: 2265944
Summary: Missing dependency for package
nwipe-0.35.2.fc39.x86-64
Product: Fedora
Version: 39
Hardware: x86_64
OS: Linux
Status: NEW
Component: nwipe
Keywords: Desktop
Severity: medium
Assignee: rebus(a)seznam.cz
Reporter: petitpoussin750(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: davide(a)cavalca.name,
epel-packagers-sig(a)lists.fedoraproject.org,
nick.craig.law(a)gmail.com, rebus(a)seznam.cz
Target Milestone: ---
Classification: Fedora
When launching nwipe, I got a message in the terminal telling me to install the
hdparm package
"[2024/02/25 22:46:36] info: The value of Selected_Customer.Contact_Phone in
/etc/nwipe/nwipe.conf has been set to Not Applicable (CP).
[2024/02/25 22:46:36] info: nwipe configuration successfully written to
/etc/nwipe/nwipe.conf
[2024/02/25 22:46:36] warning: /etc/nwipe/nwipe_customers.csv does not exist.
[2024/02/25 22:46:36] info: Created /etc/nwipe/nwipe_customers.csv
[2024/02/25 22:46:36] info: Filled /etc/nwipe/nwipe_customers.csv with basic
configuration
[2024/02/25 22:46:36] info: nwipe 0.35
[2024/02/25 22:46:36] info: Linux version 6.5.6-300.fc39.x86_64 (mockbuild@f
e458d2eae0b4ff0bb0a00a41dbf9744) (gcc (GCC) 13.
2.1 20230918 (Red Hat 13.2.1-3), GNU ld version
2.40-13.fc39) #1 SMP PREEMPT_DYNAMIC Fri Oct
6 19:57:21 UTC 2023
[2024/02/25 22:46:36] warning: hdparm command not found.
[2024/02/25 22:46:36] warning: Required by nwipe for HPA/DCO detection and
correction and ATA secure erase.
[2024/02/25 22:46:36] warning : ** Please install hdparm **.
"
Reproducible: Always
Steps to Reproduce:
1.dnf install nwipe
2.run nwipe
Actual Results:
Nwipe only starts when the dependency is present or installed (after the error
message)
Expected Results:
when installing nwipe, hdparm is present as a dependency
how to fix it :
1. dnf install hdparm
2. run nwipe
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2265944
Report this comment as SPAM:
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=rep...