* Re: IPFire 2.17 - Core Update 91 release schedule
[not found] <6A691F9C-E1A7-480E-8D1E-12A37DD544C8@web.de>
@ 2015-06-11 9:46 ` Michael Tremer
2015-06-11 13:55 ` Aw: " Bernhard Bitsch
0 siblings, 1 reply; 13+ messages in thread
From: Michael Tremer @ 2015-06-11 9:46 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 2075 bytes --]
Hello,
just follow this guide:
http://wiki.ipfire.org/en/configuration/ipfire/pakfire/testing
-Michael
On Thu, 2015-06-11 at 11:44 +0200, Jan Lentfer wrote:
> Hi, could you shortly describe (possibly once more) how can follow the testing branch instead of the stable branch? TIA Jan
>
> Von meinem iPad gesendet
>
> > Am 11.06.2015 um 10:51 schrieb Michael Tremer <michael.tremer(a)ipfire.org>:
> >
> > Hello,
> >
> > I just wanted to update you quickly about the upcoming Core Update 91
> > release plan.
> >
> > There will be a new OpenSSL release at some time today (Thursday) which
> > fixes several security vulnerabilities in this library. We do not know
> > much about the severity of those vulnerabilities, yet, but we will
> > release a new Core Update any ways.
> >
> > The changes that have been pushed into the next branch will be released
> > as well with an exception of Python. The Python package won't build on
> > some systems and due to lack of time to debug this properly the Python
> > update has been postponed.
> >
> > As soon as the OpenSSL update is released we will start the build. We
> > expect this to be late at night (as it has been in the past) and
> > therefore the will be a build available Friday morning/noon European
> > time. The ARM build will take much longer to complete though.
> >
> > We will push that build to the testing tree so that as many people can
> > help testing as possibly can.
> >
> > If everything goes well we intend to release the final update 24 hours
> > after that - which will be Saturday some time after mid day.
> >
> > Best,
> > -Michael
> >
> > P.S. I was asked to send a short release plan for Core Updates on this
> > list because it is not so easy to find out what the current status is
> > sometimes. I would like your feedback about if this is a good idea and
> > if this is helping. I am hoping that it is helping us to engage more
> > testers into the testing procedure of new Core Updates and let you plan
> > some time for doing that.
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 13+ messages in thread
* Aw: Re: IPFire 2.17 - Core Update 91 release schedule
2015-06-11 9:46 ` IPFire 2.17 - Core Update 91 release schedule Michael Tremer
@ 2015-06-11 13:55 ` Bernhard Bitsch
2015-06-11 21:37 ` perl code cleanup (was: IPFire 2.17 - Core Update 91 release schedule) Michael Tremer
0 siblings, 1 reply; 13+ messages in thread
From: Bernhard Bitsch @ 2015-06-11 13:55 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 3218 bytes --]
Hi,
a thread in the forum showed up a little issue in our tests.
Some parts, don't know how many, just have a status of "untouched for a long time".
This is mainly true for Perl scripts in the WUI.
I would be a big effort to check all this files.
But some issues will come in sight, if at least during test period these files contain the lines
use strict;
use warnings;
use CGI::Carp 'fatalsToBrowser';
Perl does tolerate so much dirty coding. In such cases it isn't sure whether the intentions of the programmer meet the interpretation of the interpreter.
These three lines force a check and log possible errors to the WUI.
I fear, without these statements a couple of faulty test cases are reported as error-free.
Bernhard
> Gesendet: Donnerstag, 11. Juni 2015 um 11:46 Uhr
> Von: "Michael Tremer" <michael.tremer(a)ipfire.org>
> An: "Jan Lentfer" <Jan.Lentfer(a)web.de>
> Cc: "development(a)lists.ipfire.org" <development(a)lists.ipfire.org>
> Betreff: Re: IPFire 2.17 - Core Update 91 release schedule
>
> Hello,
>
> just follow this guide:
>
> http://wiki.ipfire.org/en/configuration/ipfire/pakfire/testing
>
> -Michael
>
> On Thu, 2015-06-11 at 11:44 +0200, Jan Lentfer wrote:
> > Hi, could you shortly describe (possibly once more) how can follow the testing branch instead of the stable branch? TIA Jan
> >
> > Von meinem iPad gesendet
> >
> > > Am 11.06.2015 um 10:51 schrieb Michael Tremer <michael.tremer(a)ipfire.org>:
> > >
> > > Hello,
> > >
> > > I just wanted to update you quickly about the upcoming Core Update 91
> > > release plan.
> > >
> > > There will be a new OpenSSL release at some time today (Thursday) which
> > > fixes several security vulnerabilities in this library. We do not know
> > > much about the severity of those vulnerabilities, yet, but we will
> > > release a new Core Update any ways.
> > >
> > > The changes that have been pushed into the next branch will be released
> > > as well with an exception of Python. The Python package won't build on
> > > some systems and due to lack of time to debug this properly the Python
> > > update has been postponed.
> > >
> > > As soon as the OpenSSL update is released we will start the build. We
> > > expect this to be late at night (as it has been in the past) and
> > > therefore the will be a build available Friday morning/noon European
> > > time. The ARM build will take much longer to complete though.
> > >
> > > We will push that build to the testing tree so that as many people can
> > > help testing as possibly can.
> > >
> > > If everything goes well we intend to release the final update 24 hours
> > > after that - which will be Saturday some time after mid day.
> > >
> > > Best,
> > > -Michael
> > >
> > > P.S. I was asked to send a short release plan for Core Updates on this
> > > list because it is not so easy to find out what the current status is
> > > sometimes. I would like your feedback about if this is a good idea and
> > > if this is helping. I am hoping that it is helping us to engage more
> > > testers into the testing procedure of new Core Updates and let you plan
> > > some time for doing that.
>
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: perl code cleanup (was: IPFire 2.17 - Core Update 91 release schedule)
2015-06-11 13:55 ` Aw: " Bernhard Bitsch
@ 2015-06-11 21:37 ` Michael Tremer
2015-06-12 10:31 ` Aw: " Bernhard Bitsch
0 siblings, 1 reply; 13+ messages in thread
From: Michael Tremer @ 2015-06-11 21:37 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 4837 bytes --]
Hi Bernhard,
I am not really sure in what way this is related to this Core Update. I
guess it is not.
On Thu, 2015-06-11 at 15:55 +0200, Bernhard Bitsch wrote:
> Hi,
>
> a thread in the forum showed up a little issue in our tests.
Which one?
> Some parts, don't know how many, just have a status of "untouched for a long time".
Indeed, we won't touch the web user interface in order to clean up the
code if we do not need to. It has been a nightmare from the very
beginning since we forked the project. We never invested much into
cleaning up the code because there will be a complete rewrite of the
entire thing.
That does not mean that we don't fix bugs though.
> This is mainly true for Perl scripts in the WUI.
Yes. Some other things have been replaced over time. The most recent
example is the setddns.pl script that was replaced by ddns.
> I would be a big effort to check all this files.
> But some issues will come in sight, if at least during test period these files contain the lines
>
> use strict;
> use warnings;
> use CGI::Carp 'fatalsToBrowser';
>
> Perl does tolerate so much dirty coding. In such cases it isn't sure whether the intentions of the programmer meet the interpretation of the interpreter.
> These three lines force a check and log possible errors to the WUI.
I am not really sure what you are saying here. If you want to clean up
the code that would be helpful. Eventually we will have to update our
version of perl and we know that huge chunks of the web user interface
code are incompatible to that. I have never done any actual testing if
it works but we have many features in the code that have been removed.
There is for example the smart match operator.
> I fear, without these statements a couple of faulty test cases are reported as error-free.
Of course we cannot ship code that will show error messages to the user.
Those changes should be also very small so that they can be easily
reviewed and should not cause too much damage. It is just essential to
keep the development process tidy to not create an even bigger mess.
New functionality or changed functionality should be done in separate
patches of course.
-Michael
>
> Bernhard
>
> > Gesendet: Donnerstag, 11. Juni 2015 um 11:46 Uhr
> > Von: "Michael Tremer" <michael.tremer(a)ipfire.org>
> > An: "Jan Lentfer" <Jan.Lentfer(a)web.de>
> > Cc: "development(a)lists.ipfire.org" <development(a)lists.ipfire.org>
> > Betreff: Re: IPFire 2.17 - Core Update 91 release schedule
> >
> > Hello,
> >
> > just follow this guide:
> >
> > http://wiki.ipfire.org/en/configuration/ipfire/pakfire/testing
> >
> > -Michael
> >
> > On Thu, 2015-06-11 at 11:44 +0200, Jan Lentfer wrote:
> > > Hi, could you shortly describe (possibly once more) how can follow the testing branch instead of the stable branch? TIA Jan
> > >
> > > Von meinem iPad gesendet
> > >
> > > > Am 11.06.2015 um 10:51 schrieb Michael Tremer <michael.tremer(a)ipfire.org>:
> > > >
> > > > Hello,
> > > >
> > > > I just wanted to update you quickly about the upcoming Core Update 91
> > > > release plan.
> > > >
> > > > There will be a new OpenSSL release at some time today (Thursday) which
> > > > fixes several security vulnerabilities in this library. We do not know
> > > > much about the severity of those vulnerabilities, yet, but we will
> > > > release a new Core Update any ways.
> > > >
> > > > The changes that have been pushed into the next branch will be released
> > > > as well with an exception of Python. The Python package won't build on
> > > > some systems and due to lack of time to debug this properly the Python
> > > > update has been postponed.
> > > >
> > > > As soon as the OpenSSL update is released we will start the build. We
> > > > expect this to be late at night (as it has been in the past) and
> > > > therefore the will be a build available Friday morning/noon European
> > > > time. The ARM build will take much longer to complete though.
> > > >
> > > > We will push that build to the testing tree so that as many people can
> > > > help testing as possibly can.
> > > >
> > > > If everything goes well we intend to release the final update 24 hours
> > > > after that - which will be Saturday some time after mid day.
> > > >
> > > > Best,
> > > > -Michael
> > > >
> > > > P.S. I was asked to send a short release plan for Core Updates on this
> > > > list because it is not so easy to find out what the current status is
> > > > sometimes. I would like your feedback about if this is a good idea and
> > > > if this is helping. I am hoping that it is helping us to engage more
> > > > testers into the testing procedure of new Core Updates and let you plan
> > > > some time for doing that.
> >
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 13+ messages in thread
* Aw: Re: perl code cleanup (was: IPFire 2.17 - Core Update 91 release schedule)
2015-06-11 21:37 ` perl code cleanup (was: IPFire 2.17 - Core Update 91 release schedule) Michael Tremer
@ 2015-06-12 10:31 ` Bernhard Bitsch
0 siblings, 0 replies; 13+ messages in thread
From: Bernhard Bitsch @ 2015-06-12 10:31 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 3793 bytes --]
Hi Michael,
> Hi Bernhard,
>
> I am not really sure in what way this is related to this Core Update. I
> guess it is not.
>
You are right. I was just thinking about a post to the mailing list, when your annoucement about the new test release arrived.
Because of the relation to testing, I posted my proposal in this thread.
> On Thu, 2015-06-11 at 15:55 +0200, Bernhard Bitsch wrote:
> > Hi,
> >
> > a thread in the forum showed up a little issue in our tests.
>
> Which one?
https://forum.ipfire.org/viewtopic.php?f=22&t=13965&p=86585#p86576
When looking at the code of this web page, I found errors ( the standard language files are not used, "undefined" vars ) which are reported by switching on the debug output.
> > Some parts, don't know how many, just have a status of "untouched for a long time".
>
> Indeed, we won't touch the web user interface in order to clean up the
> code if we do not need to. It has been a nightmare from the very
> beginning since we forked the project. We never invested much into
> cleaning up the code because there will be a complete rewrite of the
> entire thing.
Nevertheless there are possible errors or "issues" in this code.
> That does not mean that we don't fix bugs though.
>
> > This is mainly true for Perl scripts in the WUI.
>
> Yes. Some other things have been replaced over time. The most recent
> example is the setddns.pl script that was replaced by ddns.
If we don't know the errors, they can't be fixed. My proposal reports those deficiencies.
Even whilst testing phase this should be done.
> > I would be a big effort to check all this files.
> > But some issues will come in sight, if at least during test period these files contain the lines
> >
> > use strict;
> > use warnings;
> > use CGI::Carp 'fatalsToBrowser';
> >
> > Perl does tolerate so much dirty coding. In such cases it isn't sure whether the intentions of the programmer meet the interpretation of the interpreter.
> > These three lines force a check and log possible errors to the WUI.
>
> I am not really sure what you are saying here. If you want to clean up
> the code that would be helpful. Eventually we will have to update our
> version of perl and we know that huge chunks of the web user interface
> code are incompatible to that. I have never done any actual testing if
> it works but we have many features in the code that have been removed.
> There is for example the smart match operator.
>
A new version of Perl doesn't really help. The Perl interpreter is built around compatibility to older versions and coding styles.
To achieve this assumptions about the semantics of the "dirty code" are made. These must not meet the intention of the programmer of the original code.
> > I fear, without these statements a couple of faulty test cases are reported as error-free.
>
> Of course we cannot ship code that will show error messages to the user.
This is an old discussion in software development: "Should the released code contain checks for correctness ( 'assert' in C, 'use strict' in Perl, ...)?"
My (personal) answer: Yes! Because these errors shouldn't show up in the shipped product, but the conditions proven are essential for a effective functioning.
> Those changes should be also very small so that they can be easily
> reviewed and should not cause too much damage. It is just essential to
> keep the development process tidy to not create an even bigger mess.
>
In first application the addition proposed is small ( 3 lines per cgi file) and doesn't change processing of programs without "issues".
The corrections for errors shown may be of a greater extent. But they are necessary, thus the effort is legitimate.
Bernhard
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: IPFire 2.17 - Core Update 91 release schedule
2015-06-12 15:15 ` Michael Tremer
@ 2015-06-13 13:20 ` Arne Fitzenreiter
0 siblings, 0 replies; 13+ messages in thread
From: Arne Fitzenreiter @ 2015-06-13 13:20 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 63 bytes --]
Hi,
arm images are now also on the server for testing.
Arne
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: IPFire 2.17 - Core Update 91 release schedule
2015-06-12 20:42 ` Arne Fitzenreiter
@ 2015-06-13 5:51 ` Stefan Schantl
0 siblings, 0 replies; 13+ messages in thread
From: Stefan Schantl @ 2015-06-13 5:51 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 728 bytes --]
Hello Arne,
just installed the new core update a couple of minutes ago.
I did some quick tests, hostapd now is starting again without any
problems and all of my VPN connections got established.
I will do some more testing and reporting if there are still any issues.
-Stefan
> Hello,
>
> the OpenSSL Team has released a hotfix update for an ABI breakage short
> after uploading the build to testing so we are forced to update the
> core91 package.
> If you have installed core91 already please check the OpenSSL version.
> If this is older than 1.0.2c please reinstall core91 by resetting
> /opt/pakfire/db/core/mine to 90 and upgrade again.
>
> This hotfix will fix the hostapd and maybee more problems.
>
> Arne
>
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: IPFire 2.17 - Core Update 91 release schedule
2015-06-11 20:39 ` Michael Tremer
2015-06-12 15:15 ` Michael Tremer
@ 2015-06-12 20:42 ` Arne Fitzenreiter
2015-06-13 5:51 ` Stefan Schantl
1 sibling, 1 reply; 13+ messages in thread
From: Arne Fitzenreiter @ 2015-06-12 20:42 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 422 bytes --]
Hello,
the OpenSSL Team has released a hotfix update for an ABI breakage short
after uploading the build to testing so we are forced to update the
core91 package.
If you have installed core91 already please check the OpenSSL version.
If this is older than 1.0.2c please reinstall core91 by resetting
/opt/pakfire/db/core/mine to 90 and upgrade again.
This hotfix will fix the hostapd and maybee more problems.
Arne
^ permalink raw reply [flat|nested] 13+ messages in thread
* re: IPFire 2.17 - Core Update 91 release schedule
@ 2015-06-12 16:10 Paul Simmons
0 siblings, 0 replies; 13+ messages in thread
From: Paul Simmons @ 2015-06-12 16:10 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 128 bytes --]
Michael, there's a problem with hostapd - please see bug 10881
https://bugzilla.ipfire.org/show_bug.cgi?id=10881
Thanks,
Paul
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: IPFire 2.17 - Core Update 91 release schedule
2015-06-11 20:39 ` Michael Tremer
@ 2015-06-12 15:15 ` Michael Tremer
2015-06-13 13:20 ` Arne Fitzenreiter
2015-06-12 20:42 ` Arne Fitzenreiter
1 sibling, 1 reply; 13+ messages in thread
From: Michael Tremer @ 2015-06-12 15:15 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 2726 bytes --]
Quick update: There is a ABI breakage in the OpenSSL package which needs
to be fixed upstream. The OpenSSL developers sent out an email to
everyone announcing that a new release will be uploaded today.
After that has been done we will rebuild the update and re-upload.
While we are at it we will include an other security update for
strongswan.
Best,
-Michael
On Thu, 2015-06-11 at 22:39 +0200, Michael Tremer wrote:
> Hello,
>
> the x86 build is done and uploaded. You can start testing now. Please
> report any issues if you find any.
>
> The change log is over here:
> http://planet.ipfire.org/post/ipfire-2-17-core-update-91-is-available-for-testing
>
> Best,
> -Michael
>
> On Thu, 2015-06-11 at 10:55 -0500, Rod Rodolico wrote:
> > Michael,
> >
> > I for one appreciate this kind of message. It lets me plan my testing
> > and deployment planning.
> >
> > Thank you,
> >
> > Rod
> >
> > On 06/11/2015 03:51 AM, Michael Tremer wrote:
> > > Hello,
> > >
> > > I just wanted to update you quickly about the upcoming Core Update 91
> > > release plan.
> > >
> > > There will be a new OpenSSL release at some time today (Thursday) which
> > > fixes several security vulnerabilities in this library. We do not know
> > > much about the severity of those vulnerabilities, yet, but we will
> > > release a new Core Update any ways.
> > >
> > > The changes that have been pushed into the next branch will be released
> > > as well with an exception of Python. The Python package won't build on
> > > some systems and due to lack of time to debug this properly the Python
> > > update has been postponed.
> > >
> > > As soon as the OpenSSL update is released we will start the build. We
> > > expect this to be late at night (as it has been in the past) and
> > > therefore the will be a build available Friday morning/noon European
> > > time. The ARM build will take much longer to complete though.
> > >
> > > We will push that build to the testing tree so that as many people can
> > > help testing as possibly can.
> > >
> > > If everything goes well we intend to release the final update 24 hours
> > > after that - which will be Saturday some time after mid day.
> > >
> > > Best,
> > > -Michael
> > >
> > > P.S. I was asked to send a short release plan for Core Updates on this
> > > list because it is not so easy to find out what the current status is
> > > sometimes. I would like your feedback about if this is a good idea and
> > > if this is helping. I am hoping that it is helping us to engage more
> > > testers into the testing procedure of new Core Updates and let you plan
> > > some time for doing that.
> > >
> >
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: IPFire 2.17 - Core Update 91 release schedule
2015-06-11 15:55 ` Rod Rodolico
@ 2015-06-11 20:39 ` Michael Tremer
2015-06-12 15:15 ` Michael Tremer
2015-06-12 20:42 ` Arne Fitzenreiter
0 siblings, 2 replies; 13+ messages in thread
From: Michael Tremer @ 2015-06-11 20:39 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 2174 bytes --]
Hello,
the x86 build is done and uploaded. You can start testing now. Please
report any issues if you find any.
The change log is over here:
http://planet.ipfire.org/post/ipfire-2-17-core-update-91-is-available-for-testing
Best,
-Michael
On Thu, 2015-06-11 at 10:55 -0500, Rod Rodolico wrote:
> Michael,
>
> I for one appreciate this kind of message. It lets me plan my testing
> and deployment planning.
>
> Thank you,
>
> Rod
>
> On 06/11/2015 03:51 AM, Michael Tremer wrote:
> > Hello,
> >
> > I just wanted to update you quickly about the upcoming Core Update 91
> > release plan.
> >
> > There will be a new OpenSSL release at some time today (Thursday) which
> > fixes several security vulnerabilities in this library. We do not know
> > much about the severity of those vulnerabilities, yet, but we will
> > release a new Core Update any ways.
> >
> > The changes that have been pushed into the next branch will be released
> > as well with an exception of Python. The Python package won't build on
> > some systems and due to lack of time to debug this properly the Python
> > update has been postponed.
> >
> > As soon as the OpenSSL update is released we will start the build. We
> > expect this to be late at night (as it has been in the past) and
> > therefore the will be a build available Friday morning/noon European
> > time. The ARM build will take much longer to complete though.
> >
> > We will push that build to the testing tree so that as many people can
> > help testing as possibly can.
> >
> > If everything goes well we intend to release the final update 24 hours
> > after that - which will be Saturday some time after mid day.
> >
> > Best,
> > -Michael
> >
> > P.S. I was asked to send a short release plan for Core Updates on this
> > list because it is not so easy to find out what the current status is
> > sometimes. I would like your feedback about if this is a good idea and
> > if this is helping. I am hoping that it is helping us to engage more
> > testers into the testing procedure of new Core Updates and let you plan
> > some time for doing that.
> >
>
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: IPFire 2.17 - Core Update 91 release schedule
2015-06-11 8:51 Michael Tremer
@ 2015-06-11 15:55 ` Rod Rodolico
2015-06-11 20:39 ` Michael Tremer
0 siblings, 1 reply; 13+ messages in thread
From: Rod Rodolico @ 2015-06-11 15:55 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 1826 bytes --]
Michael,
I for one appreciate this kind of message. It lets me plan my testing
and deployment planning.
Thank you,
Rod
On 06/11/2015 03:51 AM, Michael Tremer wrote:
> Hello,
>
> I just wanted to update you quickly about the upcoming Core Update 91
> release plan.
>
> There will be a new OpenSSL release at some time today (Thursday) which
> fixes several security vulnerabilities in this library. We do not know
> much about the severity of those vulnerabilities, yet, but we will
> release a new Core Update any ways.
>
> The changes that have been pushed into the next branch will be released
> as well with an exception of Python. The Python package won't build on
> some systems and due to lack of time to debug this properly the Python
> update has been postponed.
>
> As soon as the OpenSSL update is released we will start the build. We
> expect this to be late at night (as it has been in the past) and
> therefore the will be a build available Friday morning/noon European
> time. The ARM build will take much longer to complete though.
>
> We will push that build to the testing tree so that as many people can
> help testing as possibly can.
>
> If everything goes well we intend to release the final update 24 hours
> after that - which will be Saturday some time after mid day.
>
> Best,
> -Michael
>
> P.S. I was asked to send a short release plan for Core Updates on this
> list because it is not so easy to find out what the current status is
> sometimes. I would like your feedback about if this is a good idea and
> if this is helping. I am hoping that it is helping us to engage more
> testers into the testing procedure of new Core Updates and let you plan
> some time for doing that.
>
--
Rod Rodolico
Daily Data, Inc.
POB 140465
Dallas TX 75214-0465
214.827.2170
http://www.dailydata.net
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: IPFire 2.17 - Core Update 91 release schedule
[not found] <CAFHX57dDn27REQhoqBysqwZKCmTB72fxXKFtaFHPcqTW-wtqOg@mail.gmail.com>
@ 2015-06-11 11:52 ` Michael Tremer
0 siblings, 0 replies; 13+ messages in thread
From: Michael Tremer @ 2015-06-11 11:52 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 5323 bytes --]
That looks fine what you did. We just have not built and uploaded the
update yet.
As the email says we are waiting for the OpenSSL update and will need
some time to do the build.
-Michael
On Thu, 2015-06-11 at 12:44 +0200, Jacques Hylkema wrote:
> Hi,
>
>
> I tried to follow the guide, but it doesn't work:
>
>
> [root(a)fw-test ~]# cat /opt/pakfire/etc/pakfire.conf
> ...
> $version = "2.17.1";
>
>
> $mainserver = "pakfire.ipfire.org";
>
>
> $cachedir = "/opt/pakfire/cache";
> $dbdir = "/opt/pakfire/db";
> $coredir = "/opt/pakfire/db/core";
> $tmpdir = "/opt/pakfire/tmp";
> $logdir = "/opt/pakfire/logs";
> ...
>
>
>
>
> [root(a)fw-test ~]# pakfire update --force
>
> server-list.db 100.00% |=============================>| 312.00
> B
> packages_list.db 100.00% |=============================>| 3.52
> KB
> core-list.db 100.00% |=============================>| 248.00
> B
> [root(a)fw-test ~]# pakfire upgrade --force
> CORE ERROR: No new upgrades available. You are on release 90.
> [root(a)fw-test ~]# cat /opt/pakfire/db/core/mine
> 90
> [root(a)fw-test ~]#
>
>
>
> Met vriendelijke groet,
> With kind regards,
>
> Jacques Hylkema
> ICT Manager
> Tel +31 (0)342-407040
> E-mail j.hylkema(a)intronics.nl
>
> LinkedIn
>
> Email
>
> Website
>
> Intronics
> Member of the TKH-group
> Intronics
> Postbus 123, 3770
> AC
> Koolhovenstraat
> 1E
> 3772
> MT Barneveld
> Computer
> Connectivity
> Industrial
> Connectivity
> Audio/Video
> Retail
> Tel. +31
> (0)342-407040
> Tel. +31
> (0)342-407080
> Tel. +31
> (0)342-407040
> Tel. +31
> (0)46-4269000
> Fax +31
> (0)342-412114
> sales(a)intronics.nl
> www.intronics.nl
>
>
> Disclaimer:
> This message (including any attachments) is confidential and may be
> privileged. If you have received it by mistake please notify the
> sender by return e-mail and delete this message from your system. Any
> unauthorised use or dissemination of this message in whole or in part
> is strictly prohibited. Please note that e-mails are susceptible to
> change. Intronics shall not be liable for the improper or incomplete
> transmission of the information contained in this communication nor
> for any delay in its receipt or damage to your system. Intronics does
> not guarantee that the integrity of this communication has been
> maintained nor that this communication is free of viruses,
> interceptions or interference.
>
> P
> Please consider the environment
> before printing this e-mail
>
>
>
>
>
>
>
> 2015-06-11 11:46 GMT+02:00 Michael Tremer <michael.tremer(a)ipfire.org>:
> Hello,
>
> just follow this guide:
>
> http://wiki.ipfire.org/en/configuration/ipfire/pakfire/testing
>
> -Michael
>
> On Thu, 2015-06-11 at 11:44 +0200, Jan Lentfer wrote:
> > Hi, could you shortly describe (possibly once more) how can
> follow the testing branch instead of the stable branch? TIA
> Jan
> >
> > Von meinem iPad gesendet
> >
> > > Am 11.06.2015 um 10:51 schrieb Michael Tremer
> <michael.tremer(a)ipfire.org>:
> > >
> > > Hello,
> > >
> > > I just wanted to update you quickly about the upcoming
> Core Update 91
> > > release plan.
> > >
> > > There will be a new OpenSSL release at some time today
> (Thursday) which
> > > fixes several security vulnerabilities in this library. We
> do not know
> > > much about the severity of those vulnerabilities, yet, but
> we will
> > > release a new Core Update any ways.
> > >
> > > The changes that have been pushed into the next branch
> will be released
> > > as well with an exception of Python. The Python package
> won't build on
> > > some systems and due to lack of time to debug this
> properly the Python
> > > update has been postponed.
> > >
> > > As soon as the OpenSSL update is released we will start
> the build. We
> > > expect this to be late at night (as it has been in the
> past) and
> > > therefore the will be a build available Friday
> morning/noon European
> > > time. The ARM build will take much longer to complete
> though.
> > >
> > > We will push that build to the testing tree so that as
> many people can
> > > help testing as possibly can.
> > >
> > > If everything goes well we intend to release the final
> update 24 hours
> > > after that - which will be Saturday some time after mid
> day.
> > >
> > > Best,
> > > -Michael
> > >
> > > P.S. I was asked to send a short release plan for Core
> Updates on this
> > > list because it is not so easy to find out what the
> current status is
> > > sometimes. I would like your feedback about if this is a
> good idea and
> > > if this is helping. I am hoping that it is helping us to
> engage more
> > > testers into the testing procedure of new Core Updates and
> let you plan
> > > some time for doing that.
>
>
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 13+ messages in thread
* IPFire 2.17 - Core Update 91 release schedule
@ 2015-06-11 8:51 Michael Tremer
2015-06-11 15:55 ` Rod Rodolico
0 siblings, 1 reply; 13+ messages in thread
From: Michael Tremer @ 2015-06-11 8:51 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 1479 bytes --]
Hello,
I just wanted to update you quickly about the upcoming Core Update 91
release plan.
There will be a new OpenSSL release at some time today (Thursday) which
fixes several security vulnerabilities in this library. We do not know
much about the severity of those vulnerabilities, yet, but we will
release a new Core Update any ways.
The changes that have been pushed into the next branch will be released
as well with an exception of Python. The Python package won't build on
some systems and due to lack of time to debug this properly the Python
update has been postponed.
As soon as the OpenSSL update is released we will start the build. We
expect this to be late at night (as it has been in the past) and
therefore the will be a build available Friday morning/noon European
time. The ARM build will take much longer to complete though.
We will push that build to the testing tree so that as many people can
help testing as possibly can.
If everything goes well we intend to release the final update 24 hours
after that - which will be Saturday some time after mid day.
Best,
-Michael
P.S. I was asked to send a short release plan for Core Updates on this
list because it is not so easy to find out what the current status is
sometimes. I would like your feedback about if this is a good idea and
if this is helping. I am hoping that it is helping us to engage more
testers into the testing procedure of new Core Updates and let you plan
some time for doing that.
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 13+ messages in thread
end of thread, other threads:[~2015-06-13 13:20 UTC | newest]
Thread overview: 13+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
[not found] <6A691F9C-E1A7-480E-8D1E-12A37DD544C8@web.de>
2015-06-11 9:46 ` IPFire 2.17 - Core Update 91 release schedule Michael Tremer
2015-06-11 13:55 ` Aw: " Bernhard Bitsch
2015-06-11 21:37 ` perl code cleanup (was: IPFire 2.17 - Core Update 91 release schedule) Michael Tremer
2015-06-12 10:31 ` Aw: " Bernhard Bitsch
2015-06-12 16:10 IPFire 2.17 - Core Update 91 release schedule Paul Simmons
[not found] <CAFHX57dDn27REQhoqBysqwZKCmTB72fxXKFtaFHPcqTW-wtqOg@mail.gmail.com>
2015-06-11 11:52 ` Michael Tremer
-- strict thread matches above, loose matches on Subject: below --
2015-06-11 8:51 Michael Tremer
2015-06-11 15:55 ` Rod Rodolico
2015-06-11 20:39 ` Michael Tremer
2015-06-12 15:15 ` Michael Tremer
2015-06-13 13:20 ` Arne Fitzenreiter
2015-06-12 20:42 ` Arne Fitzenreiter
2015-06-13 5:51 ` Stefan Schantl
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox