How To Install ghc-hackage-security-prof on Fedora 36

In this tutorial we learn how to install ghc-hackage-security-prof in Fedora 36. ghc-hackage-security-prof is Haskell hackage-security profiling library

Introduction

In this tutorial we learn how to install ghc-hackage-security-prof on Fedora 36.

What is ghc-hackage-security-prof

This package provides the Haskell hackage-security profiling library.

We can use yum or dnf to install ghc-hackage-security-prof on Fedora 36. In this tutorial we discuss both methods but you only need to choose one of method to install ghc-hackage-security-prof.

Install ghc-hackage-security-prof on Fedora 36 Using dnf

Update yum database with dnf using the following command.

sudo dnf makecache --refresh

After updating yum database, We can install ghc-hackage-security-prof using dnf by running the following command:

sudo dnf -y install ghc-hackage-security-prof

Install ghc-hackage-security-prof on Fedora 36 Using yum

Update yum database with yum using the following command.

sudo yum makecache --refresh

After updating yum database, We can install ghc-hackage-security-prof using yum by running the following command:

sudo yum -y install ghc-hackage-security-prof

How To Uninstall ghc-hackage-security-prof on Fedora 36

To uninstall only the ghc-hackage-security-prof package we can use the following command:

sudo dnf remove ghc-hackage-security-prof

ghc-hackage-security-prof Package Contents on Fedora 36

/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Client.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Client/Formats.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Client/Repository.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Client/Repository/Cache.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Client/Repository/HttpLib.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Client/Repository/Local.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Client/Repository/Remote.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Client/Verify.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/JSON.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Key.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Key/Env.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Server.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF/Common.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF/FileInfo.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF/FileMap.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF/Header.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF/Layout/Cache.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF/Layout/Index.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF/Layout/Repo.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF/Mirrors.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF/Paths.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF/Patterns.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF/Root.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF/Signed.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF/Snapshot.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF/Targets.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/TUF/Timestamp.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Trusted.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Trusted/TCB.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Util/Base64.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Util/Checked.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Util/Exit.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Util/IO.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Util/JSON.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Util/Lens.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Util/Path.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Util/Pretty.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Util/Some.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Util/Stack.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Hackage/Security/Util/TypedEmbedded.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Prelude.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/Text/JSON/Canonical.p_hi
/usr/lib64/ghc-8.10.5/hackage-security-0.6.0.1/libHShackage-security-0.6.0.1-43cKEQp7NEp5dE5pEtiu9C_p.a

References

Summary

In this tutorial we learn how to install ghc-hackage-security-prof on Fedora 36 using yum and [dnf]((/fedora/36/dnf/).