On Thu, 3 Dec 2020, Michel Alexandre Salim wrote:
>> Apart from the usual package-not-available story (which I want to fix
>> as part of my work bringing up the EPEL Packagers SIG), my current
>> snag is that python-tox-current-env uses %generate_buildrequires which
>> does not work on CentOS 8:
>>
>> CentOS 8 is still on RPM 4.14:
>> <mock-chroot> sh-4.4# rpm -q rpm
>> rpm-4.14.2-37.el8.x86_64
>>
>> I'll put up a patch to hardcode dependencies for non-Fedora releases,
>> though that sorts of defeat the purpose of dynamic build
>> requirements.
>> Then again, this is only needed for EPEL8, since EPEL9 will have a
>> new enough RPM.
>>
> Given that %generate_buildrequires is the selling point of pyproject-
> rpm-macros, I'm guessing a better way forward for EPEL8 would be to not
> require it on EPEL8 since there's no way it would work, since RH won't
> update RPM?
>
> https://src.fedoraproject.org/rpms/pyproject-rpm-macros
Is %generate_buildrequires suppose to work for packages
which do not used python ?
From the name I would expect it to, but reading that doc makes me
think %generate_buildrequires *is* python specific.
If so, the name is misleading.
(I am also confused/suspicious of the point of a macro to automate
build requires, except as a step on a path to somewhere else.
If build requirements need to be stated explicitly,
then automating their statement is a good way of hiding an issue
that needs to be reviewed whenever changes are made.
)
--
Andrew C. Aitchison Kendal, UK
andrew(a)aitchison.me.uk
Folks -
Looks like RHEL 8.2 will have python 3.8 in addition to python 3.6. From
the 8.2 beta:
Red Hat Enterprise Linux 8 for x86_64 - AppStream Beta (RPMs)
Name Stream Profiles Summary
python27 2.7 [d][e] common [d] Python programming
language, version 2.7
python36 3.6 [d][e] build, common [d] Python programming
language, version 3.6
python38 3.8 [d][e] build, common [d] Python programming
language, version 3.8
Currently, %python_pkgversion is set to 3 in
/usr/lib/rpm/macros.d/macros.python-srpm from python-srpm-macros.
python3-devel is still provided only by python36-devel, so presumably all
EPEL8 python packages will continue to be built against python 3.6. But I
imagine that people will soon be asking for python 3.8 versions of EPEL
packages. How can we provide those? Does this have to be done in some
modular fashion - which seems to come back to the discussion of whether or not
every package has to become its own module or whether to group them together
somehow. Or since both python modules are "default" modules and we can
install both python36-devel and python38-devel at the same time, perhaps we
can define the python3_other* macros again for python38 and just go that way?
Thoughts?
--
Orion Poplawski
Manager of NWRA Technical Systems 720-772-5637
NWRA, Boulder/CoRA Office FAX: 303-415-9702
3380 Mitchell Lane orion(a)nwra.com
Boulder, CO 80301 https://www.nwra.com/
The following builds have been pushed to Fedora EPEL 9 updates-testing
hyperscan-5.4.0-4.el9
inxi-3.3.13-1.el9
libretls-3.5.0-1.el9
llvm11-11.1.0-6.el9
netcat-1.218-4.el9
perl-GD-SecurityImage-1.75-11.el9
python-scp-0.14.4-1.el9
rpki-client-7.6-2.el9
systemd-extras-250.3-1.el9
uglify-js-3.15.2-1.el9
Details about builds:
================================================================================
hyperscan-5.4.0-4.el9 (FEDORA-EPEL-2022-dae9ef8f98)
High-performance regular expression matching library
--------------------------------------------------------------------------------
Update Information:
Package for epel9
--------------------------------------------------------------------------------
ChangeLog:
* Thu Jan 20 2022 Fedora Release Engineering <releng(a)fedoraproject.org> - 5.4.0-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
* Wed Aug 11 2021 Jason Taylor <jtfas90(a)gmail.com> - 5.4.0-3
- Add build_wrapper script patch to fix FTBFS (#1987572)
* Thu Jul 22 2021 Fedora Release Engineering <releng(a)fedoraproject.org> - 5.4.0-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
* Tue Jan 26 2021 Jason Taylor <jtfas90(a)gmail.com> - 5.4.0-1
- Latest upstream release
* Tue Jan 26 2021 Fedora Release Engineering <releng(a)fedoraproject.org> - 5.3.0-6
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
* Mon Aug 10 2020 Jason Taylor <jtfas90(a)gmail.com> - 5.3.0-5
- Updated to new cmake macros
* Sat Aug 1 2020 Fedora Release Engineering <releng(a)fedoraproject.org> - 5.3.0-4
- Second attempt - Rebuilt for
https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
* Tue Jul 28 2020 Fedora Release Engineering <releng(a)fedoraproject.org> - 5.3.0-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
* Wed Jul 8 2020 Jeff Law <law(a)redhat.com> - 5.3.0-2
- Disable LTO
* Thu May 28 2020 Jason Taylor <jtfas90(a)gmail.com> - 5.3.0-1
- Latest upstream release
* Wed Jan 29 2020 Fedora Release Engineering <releng(a)fedoraproject.org> - 5.2.1-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2051622 - Please branch and build hyperscan in epel9
https://bugzilla.redhat.com/show_bug.cgi?id=2051622
--------------------------------------------------------------------------------
================================================================================
inxi-3.3.13-1.el9 (FEDORA-EPEL-2022-13a3d2b6f5)
A full featured system information script
--------------------------------------------------------------------------------
Update Information:
Update to 3.3.13.
--------------------------------------------------------------------------------
ChangeLog:
* Sun Feb 27 2022 Vasiliy N. Glazov <vascom2(a)gmail.com> - 3.3.13-1
- Update to 3.3.13
--------------------------------------------------------------------------------
================================================================================
libretls-3.5.0-1.el9 (FEDORA-EPEL-2022-c71b4534cb)
Port of libtls from LibreSSL to OpenSSL
--------------------------------------------------------------------------------
Update Information:
- Upgrade to 3.5.0 (#2058999)
--------------------------------------------------------------------------------
ChangeLog:
* Sun Feb 27 2022 Robert Scheck <robert(a)fedoraproject.org> 3.5.0-1
- Upgrade to 3.5.0 (#2058999)
* Thu Jan 20 2022 Fedora Release Engineering <releng(a)fedoraproject.org> - 3.4.2-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2058999 - libretls-3.5.0 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2058999
--------------------------------------------------------------------------------
================================================================================
llvm11-11.1.0-6.el9 (FEDORA-EPEL-2022-74d6b91768)
The Low Level Virtual Machine
--------------------------------------------------------------------------------
Update Information:
initial build for RHEL9
--------------------------------------------------------------------------------
ChangeLog:
* Sun Feb 6 2022 Jens Petersen <petersen(a)redhat.com> - 11.1.0-6
- Remove dependency on python3-recommonmark (like RHEL9 llvm)
* Wed May 19 2021 sguelton(a)redhat.com - 11.1.0-5
- Fix handling of llvm-config
* Thu May 6 2021 sguelton(a)redhat.com - 11.1.0-4
- Harmonize llvm-config handling with non-compat version
* Tue Apr 27 2021 sguelton(a)redhat.com - 11.1.0-3
- Fix llvm-config11 install path
* Tue Apr 13 2021 sguelton(a)redhat.com - 11.1.0-2
- Fix llvm-config-11 handling, see rhbz#1937816
* Tue Mar 23 2021 Josh Stone <jistone(a)redhat.com> - 11.1.0-1
- Update to 11.1.0 final
- Add fixes for rustc codegen
* Wed Feb 3 2021 Serge Guelton - 11.1.0-0.1.rc2
- 11.1.0-rc2 release
--------------------------------------------------------------------------------
================================================================================
netcat-1.218-4.el9 (FEDORA-EPEL-2022-1483999282)
OpenBSD netcat to read and write data across connections using TCP or UDP
--------------------------------------------------------------------------------
Update Information:
- Rebuilt for libretls 3.5.0
--------------------------------------------------------------------------------
ChangeLog:
* Sun Feb 27 2022 Robert Scheck <robert(a)fedoraproject.org> 1.218-4
- Rebuilt for libretls 3.5.0
* Thu Jan 20 2022 Fedora Release Engineering <releng(a)fedoraproject.org> - 1.218-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
--------------------------------------------------------------------------------
================================================================================
perl-GD-SecurityImage-1.75-11.el9 (FEDORA-EPEL-2022-82552de921)
Security image (captcha) generator
--------------------------------------------------------------------------------
Update Information:
This package contains the Perl module GD::SecurityImage, which gives you a basic
interface to create "security images".
--------------------------------------------------------------------------------
ChangeLog:
* Fri Jan 21 2022 Fedora Release Engineering <releng(a)fedoraproject.org> - 1.75-11
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
* Thu Jul 22 2021 Fedora Release Engineering <releng(a)fedoraproject.org> - 1.75-10
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
* Fri May 21 2021 Jitka Plesnikova <jplesnik(a)redhat.com> - 1.75-9
- Perl 5.34 rebuild
* Wed Jan 27 2021 Fedora Release Engineering <releng(a)fedoraproject.org> - 1.75-8
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
* Tue Jul 28 2020 Fedora Release Engineering <releng(a)fedoraproject.org> - 1.75-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
* Tue Jun 23 2020 Jitka Plesnikova <jplesnik(a)redhat.com> - 1.75-6
- Perl 5.32 rebuild
* Thu Jan 30 2020 Fedora Release Engineering <releng(a)fedoraproject.org> - 1.75-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2031800 - perl-GD-SecurityImage for EPEL 9
https://bugzilla.redhat.com/show_bug.cgi?id=2031800
--------------------------------------------------------------------------------
================================================================================
python-scp-0.14.4-1.el9 (FEDORA-EPEL-2022-dbc1febb02)
Scp module for paramiko
--------------------------------------------------------------------------------
Update Information:
update to version 0.14.4
--------------------------------------------------------------------------------
ChangeLog:
* Mon Feb 28 2022 chedi <chedi.toueiti(a)gmail.com> 0.14.4-1
- update to version 0.14.4 (#2058419)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2058419 - python-scp-0.14.4 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2058419
--------------------------------------------------------------------------------
================================================================================
rpki-client-7.6-2.el9 (FEDORA-EPEL-2022-552b87587f)
RPKI validator to support BGP Origin Validation
--------------------------------------------------------------------------------
Update Information:
- Rebuilt for libretls 3.5.0
--------------------------------------------------------------------------------
ChangeLog:
* Sun Feb 27 2022 Robert Scheck <robert(a)fedoraproject.org> 7.6-2
- Rebuilt for libretls 3.5.0
--------------------------------------------------------------------------------
================================================================================
systemd-extras-250.3-1.el9 (FEDORA-EPEL-2022-10eee90ae6)
System and Service Manager (optional components)
--------------------------------------------------------------------------------
Update Information:
# Changes with 250 * A new unit `systemd-boot-update.service` has been added.
If enabled (the default) and the `systemd-boot` loader is detected to be
installed, it is automatically updated to the newest version when out of date.
This is useful to ensure the boot loader remains up-to-date, and updates
automatically propagate from the OS tree in `/usr/`. * `systemd-boot` will
now build with SBAT by default in order to facilitate working with recent
versions of Shim that require it to be present. * `systemd-boot` can now
parse Microsoft Windows' Boot Configuration Data. This is used to robustly
generate boot entry titles for Windows. * A new setting `SaveIntervalSec=`
has been added to `systemd-timesyncd`, which may be used to automatically save
the current system time to disk in regular intervals. This is useful to maintain
a roughly monotonic clock even without RTC hardware and with some robustness
against abnormal system shutdown. * `.network` files gained a new
UplinkInterface in the `[IPv6SendRA]` section, for automatically propagating DNS
settings from other interfaces. * The static lease DHCP server logic in
`systemd-networkd` may now serve IP addresses outside of the configured IP pool
range for the server. * CAN support in `systemd-networkd` gained four new
settings `Loopback=`, `OneShot=`, `PresumeAck=`, `ClassicDataLengthCode=` for
tweaking CAN control modes. It gained a number of further settings for tweaking
CAN timing quanta. * The `[CAN]` section in `.network` file gained new
`TimeQuantaNSec=`, `PropagationSegment=`, `PhaseBufferSegment1=`,
`PhaseBufferSegment2=`, `SyncJumpWidth=`, `DataTimeQuantaNSec=`,
`DataPropagationSegment=`, `DataPhaseBufferSegment1=`,
`DataPhaseBufferSegment2=`, and `DataSyncJumpWidth=` settings to control bit-
timing processed by the CAN interface. * DHCPv4 client support in `systemd-
networkd` learnt a new `Label=` option for configuring the address label to
apply to configure IPv4 addresses. * The `[IPv6AcceptRA]` section of
`.network` files gained support for a new `UseMTU=` setting that may be used to
control whether to apply the announced MTU settings to the local interface. *
`systemd-networkd` now ships with new default `.network` files: `80-container-
vb.network` which matches host-side network bridge device created by `systemd-
nspawn`'s `--network-bridge` or `--network-zone` switch, and `80-6rd-
tunnel.network` which matches automatically created sit tunnel with 6rd prefix
when the DHCP 6RD option is received. * `systemd-networkd` and systemd-udevd
now support IP over InfiniBand interfaces. The `Kind=` setting in `.netdev` file
accepts `ipoib`. And `systemd.netdev` files gained the `[IPoIB]` section. *
`systemd-networkd` and systemd-udevd now support `net.ifname-policy=` option on
the kernel command-line. This is implemented through the `systemd-network-
generator` service that automatically generates appropriate `.link`, `.network`,
and `.netdev` files. * `systemd-networkd`'s handling of `Endpoint=`
resolution for WireGuard interfaces has been improved. * `systemd-networkd`
will now automatically configure routes to addresses specified in `AllowedIPs=`.
This feature can be controlled via `RouteTable=` and `RouteMetric=` settings in
`[WireGuard]` or `[WireGuardPeer]` sections. * `systemd-networkd` will now
once again automatically generate persistent MAC addresses for batadv and bridge
interfaces. Users can disable this by using `MACAddress=none` in `.netdev`
files. * The `[DHCPv4]` section in `.network` file gained a new `Use6RD=`
boolean setting to control whether the DHCPv4 client request and process the
DHCP 6RD option. * The `[DHCPv6PrefixDelegation]` section in `.network` file
is renamed to `[DHCPPrefixDelegation]`, as now the prefix delegation is also
supported with DHCPv4 protocol by enabling the `Use6RD=` setting. * The
`[DHCPPrefixDelegation]` section in `.network` file gained a new setting
`UplinkInterface=` to specify the upstream interface. * The `[DHCPv6]`
section in `.network` file gained a new setting `UseDelegatedPrefix=` to control
whether the delegated prefixes will be propagated to the downstream interfaces.
* The `[IPv6AcceptRA]` section of `.network` files now understands two new
settings `UseGateway=`/`UseRoutePrefix=` for explicitly configuring whether to
use the relevant fields from the IPv6 Router Advertisement records. * The
`ForceDHCPv6PDOtherInformation=` setting in the `[DHCPv6]` section is now
deprecated. Please use the `WithoutRA=` and `UseDelegatedPrefix=` settings in
the `[DHCPv6]` section and the `DHCPv6Client=` setting in the `[IPv6AcceptRA]`
section to control when the DHCPv6 client is started and how the delegated
prefixes are handled by the DHCPv6 client. * The `[CAKE]` section of
`.network` files gained various new settings `AutoRateIngress=`,
`CompensationMode=`, `FlowIsolationMode=`, `NAT=`, `MPUBytes=`,
`PriorityQueueingPreset=`, `FirewallMark=`, `Wash=`, `SplitGSO=`, and
`UseRawPacketSize=` for configuring CAKE. * The `IPv6Token=` section in the
`[Network]` section is deprecated, and the `[IPv6AcceptRA]` section gained the
`Token=` setting for its replacement. The `[IPv6Prefix]` section also gained the
`Token=` setting. The `Token=` setting gained `eui64` mode to explicitly
configure an address with the EUI64 algorithm based on the interface MAC
address. The `prefixstable` mode can now optionally take a secret key. The
`Token=` setting in the `[DHCPPrefixDelegation]` section now supports all
algorithms supported by the same settings in the other sections. * The
`[RoutingPolicyRule]` section of `.network` file gained a new
`SuppressInterfaceGroup=` setting. * The `IgnoreCarrierLoss=` setting in the
`[Network]` section of `.network` files now allows a duration to be specified,
controlling how long to wait before reacting to carrier loss. * The
`[DHCPServer]` section of `.network` file gained a new `Router=` setting to
specify the router address. * When discovering Windows installations
`systemd-boot` will now attempt to show the Windows version. * The color
scheme to use in `systemd-boot` may now be configured at build-time. *
`systemd-boot` gained the ability to change screen resolution during boot-time,
by hitting the `r` key. This will cycle through available resolutions and save
the last selection. * `systemd-boot` learnt a new hotkey `f`. When pressed
the system will enter firmware setup. This is useful in environments where it is
difficult to hit the right keys early enough to enter the firmware, and works on
any firmware regardless which key it natively uses. * `systemd-boot` gained
support for automatically booting into the menu item selected on the last boot
(using the `@saved` identifier for menu items). * `systemd-boot` gained
support for automatically loading all EFI drivers placed in the
`/EFI/systemd/drivers/` subdirectory of the EFI System Partition (ESP). These
drivers are loaded before the menu entries are loaded. This is useful e.g. to
load additional file system drivers for the `XBOOTLDR` partition. * `systemd-
boot` will now paint the input cursor on its own instead of relying on the
firmware to do so, increasing compatibility with broken firmware that doesn't
make the cursor reasonably visible. * `systemd-boot` now embeds a `.osrel` PE
section like we expect from Boot Loader Specification Type #2 Unified Kernels.
This means `systemd-boot` itself may be used in place of a Type #2 Unified
Kernel. This is useful for debugging purposes as it allows chain-loading one a
(development) `systemd-boot` instance from another. * `systemd-boot` now
supports a new `devicetree` field in Boot Loader Specification Type #1 entries:
if configured the specified device tree file is installed before the kernel is
invoked. This is useful for installing/applying new devicetree files without
updating the kernel image. * Similarly, `systemd-stub` now can read
devicetree data from a PE section `.dtb` and apply it before invoking the
kernel. * `systemd-stub` (the EFI stub that can be glued in front of a Linux
kernel) gained the ability to pick up credentials and sysext files, wrap them in
a cpio archive, and pass as an additional initrd to the invoked Linux kernel, in
effect placing those files in the `/.extra/` directory of the initrd
environment. This is useful to implement trusted initrd environments which are
fully authenticated but still can be extended (via sysexts) and parameterized
(via encrypted/authenticated credentials, see above). Credentials can be
located next to the kernel image file (credentials specific to a single boot
entry), or in one of the shared directories (credentials applicable to multiple
boot entries). * `systemd-stub` now comes with a full man page, that explains
its feature set and how to combine a kernel image, an initrd and the stub to
build a complete EFI unified kernel image, implementing Boot Loader
Specification Type #2. * `systemd-stub` may now provide the initrd to the
executed kernel via the LINUX_EFI_INITRD_MEDIA_GUID EFI protocol, adding
compatibility for non-x86 architectures. * `bootctl` learnt new `set-timeout`
and `set-timeout-oneshot` commands that may be used to set the boot menu time-
out of the boot loader (for all or just the subsequent boot). * `bootctl` and
`kernel-install` will now read `KERNEL_INSTALL_MACHINE_ID` and
`KERNEL_INSTALL_LAYOUT` from `kernel/install.conf`. The first variable specifies
the machine-id to use for installation. It would previously be used if set in
the environment, and now it'll also be read automatically from the config file.
The second variable is new. When set, it specifies the layout to use for
installation directories on the boot partition, so that tools don't need to
guess it based on the already-existing directories. The only value that is
defined natively is `bls`, corresponding to the layout specified in
https://systemd.io/BOOT_LOADER_SPECIFICATION/. Plugins for `kernel-install` that
implement a different layout can declare other values for this variable.
`bootctl install` will now write `KERNEL_INSTALL_LAYOUT=bls`, on the assumption
that if the user installed `systemd-boot` to the ESP, they intend to use the
entry layout understood by `systemd-boot`. It'll also write
`KERNEL_INSTALL_MACHINE_ID=` if it creates any directories using the ID (and it
wasn't specified in the config file yet). Similarly, `kernel-install` will now
write `KERNEL_INSTALL_MACHINE_ID=` (if it wasn't specified in the config file
yet). Effectively, those changes mean that the machine-id used for boot loader
entry installation is "frozen" upon first use and becomes independent of the
actual machine-id. Configuring `KERNEL_INSTALL_MACHINE_ID` fixes the
following problem: images created for distribution ("golden images") are built
with no machine-id, so that a unique machine-id can be created on the first
boot. But those images may contain boot loader entries with the machine-id used
during build included in paths. Using a "frozen" value allows unambiguously
identifying entries that match the specific installation, while still permitting
parallel installations without conflict. Configuring
`KERNEL_INSTALL_LAYOUT` obviates the need for `kernel-install` to guess the
installation layout. This fixes the problem where a (possibly empty) directory
in the boot partition is created from a different layout causing `kernel-
install` plugins to assume the wrong layout. A particular example of how this
may happen is the grub2 package in Fedora which includes directories under
`/boot` directly in its file list. Various other packages pull in grub2 as a
dependency, so it may be installed even if unused, breaking installations that
use the bls layout. * `bootctl` and `systemd-bless-boot` can now be linked
statically.
--------------------------------------------------------------------------------
ChangeLog:
* Sun Feb 27 2022 Robert Scheck <robert(a)fedoraproject.org> 250.3-1
- Upgrade to 250.3 (and synchronize with systemd-250.3-6.fc37)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2056276 - Updating CS9 with systemd-250 is causing a collision with epel 9 systemd-networkd
https://bugzilla.redhat.com/show_bug.cgi?id=2056276
[ 2 ] Bug #2058815 - Please update systemd-extras to 250-3 to match those in Stream 9
https://bugzilla.redhat.com/show_bug.cgi?id=2058815
--------------------------------------------------------------------------------
================================================================================
uglify-js-3.15.2-1.el9 (FEDORA-EPEL-2022-c888398441)
JavaScript parser, mangler/compressor and beautifier toolkit
--------------------------------------------------------------------------------
Update Information:
Uglify-JS 3.15.2
--------------------------------------------------------------------------------
ChangeLog:
* Mon Feb 28 2022 Mattias Ellert <mattias.ellert(a)physics.uu.se> - 3.15.2-1
- Update to 3.15.2
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2058862 - uglify-js-3.15.2 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2058862
--------------------------------------------------------------------------------
The following Fedora EPEL 8 Security updates need testing:
Age URL
4 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-333b5cbf08 barrier-2.4.0-1.el8
3 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-b2015c9ac8 seamonkey-2.53.11-1.el8
3 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-17ae719cb2 syncthing-1.18.6-3.el8
The following builds have been pushed to Fedora EPEL 8 updates-testing
inxi-3.3.13-1.el8
libretls-3.5.0-1.el8
netcat-1.218-4.el8
remmina-1.4.24-3.el8
rpki-client-7.6-2.el8
systemd-extras-250.3-1.el8
uglify-js3-3.15.2-1.el8
Details about builds:
================================================================================
inxi-3.3.13-1.el8 (FEDORA-EPEL-2022-1656e3e007)
A full featured system information script
--------------------------------------------------------------------------------
Update Information:
Update to 3.3.13.
--------------------------------------------------------------------------------
ChangeLog:
* Sun Feb 27 2022 Vasiliy N. Glazov <vascom2(a)gmail.com> - 3.3.13-1
- Update to 3.3.13
--------------------------------------------------------------------------------
================================================================================
libretls-3.5.0-1.el8 (FEDORA-EPEL-2022-ec1a3b365a)
Port of libtls from LibreSSL to OpenSSL
--------------------------------------------------------------------------------
Update Information:
- Upgrade to 3.5.0 (#2058999)
--------------------------------------------------------------------------------
ChangeLog:
* Sun Feb 27 2022 Robert Scheck <robert(a)fedoraproject.org> 3.5.0-1
- Upgrade to 3.5.0 (#2058999)
* Thu Jan 20 2022 Fedora Release Engineering <releng(a)fedoraproject.org> - 3.4.2-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2058999 - libretls-3.5.0 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2058999
--------------------------------------------------------------------------------
================================================================================
netcat-1.218-4.el8 (FEDORA-EPEL-2022-cc344c9935)
OpenBSD netcat to read and write data across connections using TCP or UDP
--------------------------------------------------------------------------------
Update Information:
- Rebuilt for libretls 3.5.0
--------------------------------------------------------------------------------
ChangeLog:
* Sun Feb 27 2022 Robert Scheck <robert(a)fedoraproject.org> 1.218-4
- Rebuilt for libretls 3.5.0
* Thu Jan 20 2022 Fedora Release Engineering <releng(a)fedoraproject.org> - 1.218-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
--------------------------------------------------------------------------------
================================================================================
remmina-1.4.24-3.el8 (FEDORA-EPEL-2022-a207fe2b18)
Remote Desktop Client
--------------------------------------------------------------------------------
Update Information:
- Add patch: 0001_fix_rare_crash_git_2609548e_and_9ed4c438.patch. - Add patch:
0002_drop_gnome_mediakeys_plugin_git_c901beef.patch. - Remove unneeded creation
of 'build' folder.
--------------------------------------------------------------------------------
ChangeLog:
* Sun Feb 27 2022 Phil Wyett <philip.wyett(a)kathenas.org> - 1.4.24-3
- Add patch: 0001_fix_rare_crash_git_2609548e_and_9ed4c438.patch.
- Add patch: 0002_drop_gnome_mediakeys_plugin_git_c901beef.patch.
- Remove unneeded creation of 'build' folder.
--------------------------------------------------------------------------------
================================================================================
rpki-client-7.6-2.el8 (FEDORA-EPEL-2022-e25309f59b)
RPKI validator to support BGP Origin Validation
--------------------------------------------------------------------------------
Update Information:
- Rebuilt for libretls 3.5.0
--------------------------------------------------------------------------------
ChangeLog:
* Sun Feb 27 2022 Robert Scheck <robert(a)fedoraproject.org> 7.6-2
- Rebuilt for libretls 3.5.0
--------------------------------------------------------------------------------
================================================================================
systemd-extras-250.3-1.el8 (FEDORA-EPEL-2022-5512b0117a)
System and Service Manager (optional components)
--------------------------------------------------------------------------------
Update Information:
# Changes with 250 * A new setting `SaveIntervalSec=` has been added to
`systemd-timesyncd`, which may be used to automatically save the current system
time to disk in regular intervals. This is useful to maintain a roughly
monotonic clock even without RTC hardware and with some robustness against
abnormal system shutdown. * `.network` files gained a new UplinkInterface in
the `[IPv6SendRA]` section, for automatically propagating DNS settings from
other interfaces. * The static lease DHCP server logic in `systemd-networkd`
may now serve IP addresses outside of the configured IP pool range for the
server. * CAN support in `systemd-networkd` gained four new settings
`Loopback=`, `OneShot=`, `PresumeAck=`, `ClassicDataLengthCode=` for tweaking
CAN control modes. It gained a number of further settings for tweaking CAN
timing quanta. * The `[CAN]` section in `.network` file gained new
`TimeQuantaNSec=`, `PropagationSegment=`, `PhaseBufferSegment1=`,
`PhaseBufferSegment2=`, `SyncJumpWidth=`, `DataTimeQuantaNSec=`,
`DataPropagationSegment=`, `DataPhaseBufferSegment1=`,
`DataPhaseBufferSegment2=`, and `DataSyncJumpWidth=` settings to control bit-
timing processed by the CAN interface. * DHCPv4 client support in `systemd-
networkd` learnt a new `Label=` option for configuring the address label to
apply to configure IPv4 addresses. * The `[IPv6AcceptRA]` section of
`.network` files gained support for a new `UseMTU=` setting that may be used to
control whether to apply the announced MTU settings to the local interface. *
`systemd-networkd` now ships with new default `.network` files: `80-container-
vb.network` which matches host-side network bridge device created by `systemd-
nspawn`'s `--network-bridge` or `--network-zone` switch, and `80-6rd-
tunnel.network` which matches automatically created sit tunnel with 6rd prefix
when the DHCP 6RD option is received. * `systemd-networkd` and systemd-udevd
now support IP over InfiniBand interfaces. The `Kind=` setting in `.netdev` file
accepts `ipoib`. And `systemd.netdev` files gained the `[IPoIB]` section. *
`systemd-networkd` and systemd-udevd now support `net.ifname-policy=` option on
the kernel command-line. This is implemented through the `systemd-network-
generator` service that automatically generates appropriate `.link`, `.network`,
and `.netdev` files. * `systemd-networkd`'s handling of `Endpoint=`
resolution for WireGuard interfaces has been improved. * `systemd-networkd`
will now automatically configure routes to addresses specified in `AllowedIPs=`.
This feature can be controlled via `RouteTable=` and `RouteMetric=` settings in
`[WireGuard]` or `[WireGuardPeer]` sections. * `systemd-networkd` will now
once again automatically generate persistent MAC addresses for batadv and bridge
interfaces. Users can disable this by using `MACAddress=none` in `.netdev`
files. * The `[DHCPv4]` section in `.network` file gained a new `Use6RD=`
boolean setting to control whether the DHCPv4 client request and process the
DHCP 6RD option. * The `[DHCPv6PrefixDelegation]` section in `.network` file
is renamed to `[DHCPPrefixDelegation]`, as now the prefix delegation is also
supported with DHCPv4 protocol by enabling the `Use6RD=` setting. * The
`[DHCPPrefixDelegation]` section in `.network` file gained a new setting
`UplinkInterface=` to specify the upstream interface. * The `[DHCPv6]`
section in `.network` file gained a new setting `UseDelegatedPrefix=` to control
whether the delegated prefixes will be propagated to the downstream interfaces.
* The `[IPv6AcceptRA]` section of `.network` files now understands two new
settings `UseGateway=`/`UseRoutePrefix=` for explicitly configuring whether to
use the relevant fields from the IPv6 Router Advertisement records. * The
`ForceDHCPv6PDOtherInformation=` setting in the `[DHCPv6]` section is now
deprecated. Please use the `WithoutRA=` and `UseDelegatedPrefix=` settings in
the `[DHCPv6]` section and the `DHCPv6Client=` setting in the `[IPv6AcceptRA]`
section to control when the DHCPv6 client is started and how the delegated
prefixes are handled by the DHCPv6 client. * The `[CAKE]` section of
`.network` files gained various new settings `AutoRateIngress=`,
`CompensationMode=`, `FlowIsolationMode=`, `NAT=`, `MPUBytes=`,
`PriorityQueueingPreset=`, `FirewallMark=`, `Wash=`, `SplitGSO=`, and
`UseRawPacketSize=` for configuring CAKE. * The `IPv6Token=` section in the
`[Network]` section is deprecated, and the `[IPv6AcceptRA]` section gained the
`Token=` setting for its replacement. The `[IPv6Prefix]` section also gained the
`Token=` setting. The `Token=` setting gained `eui64` mode to explicitly
configure an address with the EUI64 algorithm based on the interface MAC
address. The `prefixstable` mode can now optionally take a secret key. The
`Token=` setting in the `[DHCPPrefixDelegation]` section now supports all
algorithms supported by the same settings in the other sections. * The
`[RoutingPolicyRule]` section of `.network` file gained a new
`SuppressInterfaceGroup=` setting. * The `IgnoreCarrierLoss=` setting in the
`[Network]` section of `.network` files now allows a duration to be specified,
controlling how long to wait before reacting to carrier loss. * The
`[DHCPServer]` section of `.network` file gained a new `Router=` setting to
specify the router address.
--------------------------------------------------------------------------------
ChangeLog:
* Sun Feb 27 2022 Robert Scheck <robert(a)fedoraproject.org> 250.3-1
- Upgrade to 250.3 (and synchronize with systemd-250.3-6.fc37)
* Tue Dec 14 2021 Robert Scheck <robert(a)fedoraproject.org> 249.7-2
- Ship systemd-boot sub-package for x86_64 and aarch64 on RHEL 9
--------------------------------------------------------------------------------
================================================================================
uglify-js3-3.15.2-1.el8 (FEDORA-EPEL-2022-22e1ad8d98)
JavaScript parser, mangler/compressor and beautifier toolkit
--------------------------------------------------------------------------------
Update Information:
Uglify-JS 3.15.2
--------------------------------------------------------------------------------
ChangeLog:
* Mon Feb 28 2022 Mattias Ellert <mattias.ellert(a)physics.uu.se> - 3.15.2-1
- Update to 3.15.2
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2058862 - uglify-js-3.15.2 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2058862
--------------------------------------------------------------------------------
Hi,
This is my first post on this list, so let me briefly introduce myself. My name
is Niki Kovacs, I'm a 54-year old Austrian living in Montpezat, a small village
in South France, and I'm the manager of Microlinux, a small IT company with a
focus on Linux and free software.
I'm currently working on an enterprise class desktop configuration based on
Rocky Linux 8.5 and the KDE desktop environment.
Here's my post-install configuration script so you get a vague idea of what
this looks like:
https://gitlab.com/kikinovak/rocky-8-desktop/-/blob/main/rocky-setup.sh
I'm making extensive use of the EPEL repositories, and first things first, I
really want to thank you guys for the tremendous work you did on KDE. Plasma
from EPEL on Rocky Linux is very nice.
So far I have a crisp and clean bells-and-whistles KDE desktop, but a handful
of applications/components are missing.
First question: is this list the right place to ask for some of these
components to be included in EPEL ? I thought it would be, but please correct
me if I'm wrong.
Cheers from the sunny South of France,
Niki Kovacs
--
Microlinux - Solutions informatiques durables
7, place de l'église - 30730 Montpezat
Site : https://www.microlinux.fr
Blog : https://blog.microlinux.fr
Mail : info(a)microlinux.fr
Tél. : 04 66 63 10 32
Mob. : 06 51 80 12 12
The following Fedora EPEL 7 Security updates need testing:
Age URL
3 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-18ac3af1c8 varnish-4.0.5-3.el7
2 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-af77a11507 seamonkey-2.53.11-1.el7
The following builds have been pushed to Fedora EPEL 7 updates-testing
gtk-gnutella-1.2.2-1.el7
Details about builds:
================================================================================
gtk-gnutella-1.2.2-1.el7 (FEDORA-EPEL-2022-d1ea579ac2)
GUI based Gnutella Client
--------------------------------------------------------------------------------
Update Information:
Update to 1.2.2
--------------------------------------------------------------------------------
ChangeLog:
* Sat Feb 26 2022 Dmitry Butskoy <Dmitry(a)Butskoy.name> - 1.2.2-1
- update to 1.2.2
--------------------------------------------------------------------------------