Accepted supercat 0.5.5-4.3 (source amd64) into unstable

2016-08-02 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Wed, 03 Aug 2016 02:45:30 +1000
Source: supercat
Binary: supercat
Architecture: source amd64
Version: 0.5.5-4.3
Distribution: unstable
Urgency: medium
Maintainer: Kumar Appaiah <aku...@debian.org>
Changed-By: Craig Sanders <c...@taz.net.au>
Description:
 supercat   - program that colorizes text for terminals and HTML
Changes:
 supercat (0.5.5-4.3) unstable; urgency=medium
 .
   * Non-maintainer upload
   * added automake to Build-Depends for /usr/bin/aclocal
Checksums-Sha1:
 1a520697b68abec650b1067a9f81f0a9b48eb5a0 1844 supercat_0.5.5-4.3.dsc
 665b0ce3008d03cc57382bfbf59dce79f2ccae7e 5488 supercat_0.5.5-4.3.debian.tar.xz
 1c1adce46f4d7b29f4a7313e3abf8be4480b37b0 17944 supercat_0.5.5-4.3_amd64.deb
Checksums-Sha256:
 f1b629ea50d6829b6ce0f764b539ac475baeaad854237b9a35bd8e6bb65e6817 1844 
supercat_0.5.5-4.3.dsc
 2d10e8e1dc9de3c44514122cf9e822ca0d6811ea7596a90e7ee5a8409a97594c 5488 
supercat_0.5.5-4.3.debian.tar.xz
 0c3c472936a55a33fa8f7b802a6f2644f93f55d389e4a4a727af724a7469eb39 17944 
supercat_0.5.5-4.3_amd64.deb
Files:
 96b107d2aef22fd27a2afff3f4b0762e 1844 utils optional supercat_0.5.5-4.3.dsc
 4982c7d510cd055d1ceecbd5f6ef4940 5488 utils optional 
supercat_0.5.5-4.3.debian.tar.xz
 d1f2d728910bcaba48eb4bba9460c721 17944 utils optional 
supercat_0.5.5-4.3_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=L3CB
-END PGP SIGNATURE-



Accepted supercat 0.5.5-4.2 (source amd64) into unstable

2016-08-02 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Wed, 03 Aug 2016 01:53:39 +1000
Source: supercat
Binary: supercat
Architecture: source amd64
Version: 0.5.5-4.2
Distribution: unstable
Urgency: medium
Maintainer: Kumar Appaiah <aku...@debian.org>
Changed-By: Craig Sanders <c...@taz.net.au>
Description:
 supercat   - program that colorizes text for terminals and HTML
Changes:
 supercat (0.5.5-4.2) unstable; urgency=medium
 .
   * Non-maintainer upload
   * added autoconf to Build-Depends for autoupdate and autoreconf
Checksums-Sha1:
 45c94c55116c2503acd91552894e4315338832c0 1834 supercat_0.5.5-4.2.dsc
 159166c16c40088492a13bf7e1cd8cc167d834bc 5468 supercat_0.5.5-4.2.debian.tar.xz
 a9d7831673d5715d703d9d0c403d2b754b15dc48 17912 supercat_0.5.5-4.2_amd64.deb
Checksums-Sha256:
 ea724c5981cef4b70d8e47b90a375883bb682552d236a5dfaedb95e8bf57f90f 1834 
supercat_0.5.5-4.2.dsc
 d94e5dfc2984195ce3181cde2291c7ee7c9f68c17df06fcc2304c832456aca72 5468 
supercat_0.5.5-4.2.debian.tar.xz
 c3b5298a08c64ddd6ced4073cf2019913ee64dccc05b2929579580ac4d5681bd 17912 
supercat_0.5.5-4.2_amd64.deb
Files:
 33ae3e79277416c0f3c7300271d9d804 1834 utils optional supercat_0.5.5-4.2.dsc
 dd28b0eebafb42cd49191412fd71307c 5468 utils optional 
supercat_0.5.5-4.2.debian.tar.xz
 76fee5d902366aa21e57ca2db2cb3386 17912 utils optional 
supercat_0.5.5-4.2_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJXoMQSAAoJEGNJDgVeB3TFqGAP/05sNHrmdJWIhs9qqeMHABhn
snePmAE76lxf3tSkjIOVYP6rFO5syELVXvRSki+F9eqWAXbdMYuXkumT6D5tdqpk
Ho6x4TrRCAKre3l/v6TUHUBEXCsaxmQF3qVu7jQc8+PxBIZcZ57oiiz/QGcXTNGD
2b/YsQfBxqRXF81Q7BECzRgbd1B49suHmFUA9CKJYqGUpmlK+cJXEwwqw981NJOS
lbpWE+KkzT2OLxV6xNRNgmxlOpj/deipWnmobm9SJtR18zjjB73V95Ih3bAzCEgm
gG2y1svxG3VNIIldHhL/vBYOOB7KJ261awF5/W6GifGf4VXjwES9raF2N73iUeni
aLEBG0Iuo4wN4wM6obAZAtaIspFhTRc5tZXSHSho1kGBCeZujZ5cxgRr3WHVmVd0
YNJHSzXGh7Ebqj6qbOt+XQQ4FSW+27YCNkdIHYdlqdLzpR0WeWW9cHRzWPQkF2GY
ZTdNJrbiER3i0a2ZLyTyPAWYIAes8e41HgHMhddJpFyKEAgZV8Gqg1BGew9dosKQ
cRfJxXBDpo9Wt4uSGjDxHaS/u62Tuktjtuq9N7j3xfBR8+xnHEeIpwbKRV9+A1S6
qAqmupIyilSpc4wz/j+Z4qnrqR3Q0soBCD0YHLUUkYEh5UOPOI5u/hT6iagJOrwM
kfEMJWeOTT1wkDEjm36Z
=7Obt
-END PGP SIGNATURE-



Accepted supercat 0.5.5-4.1 (source amd64) into unstable

2016-08-02 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 02 Aug 2016 18:49:51 +1000
Source: supercat
Binary: supercat
Architecture: source amd64
Version: 0.5.5-4.1
Distribution: unstable
Urgency: medium
Maintainer: Kumar Appaiah <aku...@debian.org>
Changed-By: Craig Sanders <c...@taz.net.au>
Description:
 supercat   - program that colorizes text for terminals and HTML
Closes: 777396 793725 832079
Changes:
 supercat (0.5.5-4.1) unstable; urgency=medium
 .
   * Non-maintainer upload
   * applied patch from Maria Valentina Marin <marival...@gmail.com> to make
 the mtimes reproducible (Closes: #793725)
   * applied patch from Chris Lamb <la...@debian.org> to make the build
 reproducible (Closes: #777396)
   * fixed to work with input lines >= 1024 characters long (20KB should be
 plenty for pkg Depends: Lines)
   * added spcrc-dpkg-l and spcrc-package config files for colourising debian
 pkg info (Closes: #832079)
   * modified debian/rules to use latest autoconf and automake. deleted
 auto-generated files.
   * modified debian/rules to use dpkg-buildflags for hardening
Checksums-Sha1:
 e687ab1e5a3763606c53f1b8b58f6bcbc70c07c2 1824 supercat_0.5.5-4.1.dsc
 fac87399101fdb2108e06d42ca9288a40e61eec0 5424 supercat_0.5.5-4.1.debian.tar.xz
 a3f1bf6c36b0419a229c46f22c85b8281ecb7a01 17860 supercat_0.5.5-4.1_amd64.deb
Checksums-Sha256:
 ac4d90496017f6a39884c2580c73cfc1616abb4e4e9871f0aa7eb39b9acd2dc5 1824 
supercat_0.5.5-4.1.dsc
 02e0b8acf13cd3bd2c9c3452f887a97da263a548578d26544564f3eb2f452397 5424 
supercat_0.5.5-4.1.debian.tar.xz
 9012c2923093963708863a285e4c4fe1ce74849af199c6333918b7d0b112e194 17860 
supercat_0.5.5-4.1_amd64.deb
Files:
 7e3f8e5a67ef918603684ca462685e29 1824 utils optional supercat_0.5.5-4.1.dsc
 3bffc921a479f4ea6d67393ae099 5424 utils optional 
supercat_0.5.5-4.1.debian.tar.xz
 c50b48045671b72afd120959ce40b1e6 17860 utils optional 
supercat_0.5.5-4.1_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=M8rB
-END PGP SIGNATURE-



Accepted dlocate 1.07 (source all) into unstable

2016-07-02 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 21 Jun 2016 13:33:28 +1000
Source: dlocate
Binary: dlocate
Architecture: source all
Version: 1.07
Distribution: unstable
Urgency: medium
Maintainer: Craig Sanders <c...@taz.net.au>
Changed-By: Craig Sanders <c...@taz.net.au>
Description:
 dlocate- fast alternative to dpkg -L and dpkg -S
Closes: 407412 532061 532704 563595 567080 614664 733864 788661
Changes:
 dlocate (1.07) unstable; urgency=medium
 .
   * updated VERSION_BANNER
   * (Closes: #532061,  #407412, #532704, #563595, #567080, #614664, #733864, 
#788661, #567080)
Checksums-Sha1:
 b1547b080b1c63ca80b3eab7293299d9e6ba54da 1359 dlocate_1.07.dsc
 2f404fc907bb18cfefd23b1b69ead0ada2d20f62 42010 dlocate_1.07.tar.gz
 930c7d2241071f10b01d571edfd1dc6fc5c597ea 23770 dlocate_1.07_all.deb
Checksums-Sha256:
 fecd039d0ec73ecf568f85adc378f0074083ab3ecafe36e79e4b648066df3d99 1359 
dlocate_1.07.dsc
 d5205cdb5072f30cbe82b50612ac5fce2b31ceac934ceac4f54bbda359af83b6 42010 
dlocate_1.07.tar.gz
 9e3a18aeeb83ef6d445789b26a763176c7753cc4c7d29f664ae87d147a0de6ff 23770 
dlocate_1.07_all.deb
Files:
 762318633187c41e84aed6c4356d01f2 1359 utils optional dlocate_1.07.dsc
 a4700b408865baba3199de12d48658d8 42010 utils optional dlocate_1.07.tar.gz
 9356966b79982583a14cb3213e1798aa 23770 utils optional dlocate_1.07_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=Gn0X
-END PGP SIGNATURE-



Accepted arpwatch 2.1a15-1 (source amd64)

2009-09-11 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 01 Sep 2009 20:00:54 +1000
Source: arpwatch
Binary: arpwatch
Architecture: source amd64
Version: 2.1a15-1
Distribution: unstable
Urgency: low
Maintainer: KELEMEN Péter f...@debian.org
Changed-By: Craig Sanders c...@taz.net.au
Description: 
 arpwatch   - Ethernet/FDDI station activity monitor
Closes: 288994 289426 315215 321504 427867 529097
Changes: 
 arpwatch (2.1a15-1) unstable; urgency=low
 .
   * Non-maintainer upload to fix some outstanding bugs
   * latest upstream release (Closes: #427867)
   * converted packaging from dbs to debhelper
   * applied all existing patches from old 2.1a13 package
   * made bihourly.sh an example, and copied bihourly cron script from
 arpwatch-2.1a13
   * added my pretty-print-arpwatch.pl script as an example
   * deleted duplicate errs= line from bihourly (Closes: #321504)
   * fixed sprintf in ec.c to zero-pad MAC addresses (Closes: #315215)
   * Applied patch from Sebastian Reichelt sebasti...@gmx.de to
 initialise interface variable (Closes: #289426)
   * updated watch file to v3 (Closes: #529097)
   * applied patch from Sebastian Reichelt to display IP in subject if
 hostname unknown (Closes: #288994)
   * updated ethercodes.dat from latest IEEE listing (~5000 new entries)
   * made /usr/share/arpwatch/ethercodes.dat a conffile so upgrades wont
 silently overwrite it if the user updates it.
   * installed arpwatch's *.awk scripts into /usr/lib/arpwatch and edited
 massagevendor to set AWKPATH before running awk.
Checksums-Sha1: 
 ca0ecda47da32b9c7e7f2794fae1c22d71a95960 772 arpwatch_2.1a15-1.dsc
 8097b4d49679bd73a32799e7ba89b7702abaf2f9 235957 arpwatch_2.1a15-1.tar.gz
 00b25396a430f71d59c5c5c3bf38b95fbc0e3bb5 186496 arpwatch_2.1a15-1_amd64.deb
Checksums-Sha256: 
 b7a325406b2a0417aa42ab698b0504d63e2192d6992d390b7225982dbba89bed 772 
arpwatch_2.1a15-1.dsc
 bc075264862f0061d5cdb060c5c29539bb767ed28f6a5515d2758b1788dfa500 235957 
arpwatch_2.1a15-1.tar.gz
 78e01bce6db01d71e943f234c1622122140f989503f5ce9919d92e52dc22c9c9 186496 
arpwatch_2.1a15-1_amd64.deb
Files: 
 9692ee2ff63eef7405d614649454df75 772 admin optional arpwatch_2.1a15-1.dsc
 4681c0ef975f7d6c8a80818a2d8df2b3 235957 admin optional arpwatch_2.1a15-1.tar.gz
 6c26c0a4932c5d6dc7241a1204369956 186496 admin optional 
arpwatch_2.1a15-1_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkqq4CUACgkQ7DJoEM1WJvDZyACfQ0HzyaoYY+SlstVKqLttTnbq
6hgAn3EuZLwXOjM8ZZrb1PiVbU9wPJuv
=1kDF
-END PGP SIGNATURE-


Accepted:
arpwatch_2.1a15-1.dsc
  to pool/main/a/arpwatch/arpwatch_2.1a15-1.dsc
arpwatch_2.1a15-1.tar.gz
  to pool/main/a/arpwatch/arpwatch_2.1a15-1.tar.gz
arpwatch_2.1a15-1_amd64.deb
  to pool/main/a/arpwatch/arpwatch_2.1a15-1_amd64.deb


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



NMU etiquette (arpwatch package)

2009-09-01 Thread Craig Sanders
(Please CC me on replies as i'm not subscribed to debian-devel)

it's been a long time since I've done this, so i'd like to know what
the current etiquette is for an NMI.

arpwatch has had only sporadic NMU updates since 2004.  I've packaged
the latest version and applied a bunch of patches from the BTS (all that
applied cleanly without conflicting with other patches), and fixed a few
other minor bugs.  most of these bugs are years old.

I'd like to upload this to unstable, but i don't want to maintain the
package forever.  I've mostly worked on this NMU because I wanted to
fix the sprintf for printing MAC addresses (zero-padded with %02x
rather than just %x), and decided I may as well fix some of the other
outstanding bugs too.

probably the only really controversial thing about this NMU is that i've
dumped the dbs-based packaging, and just gone with debhelper.  I don't
have time to learn dbs and have no inclination to do so, either. i like
the *idea* of dbs but not the practice (i find it's a pain to work with
-- it was easier for me to re-package the latest version of arpwatch
from scratch than it was to figure out how dbs works just to make a
one-line change for the sprintf problem). given that arpwatch has hardly
been touched for the last few years, i'd guess that dbs is putting off
other potential NMUs or maybe even an adopter too.


anyway, here's the changelog entry:

arpwatch (2.1a15-1) unstable; urgency=low

  * not-so-new upstream release (Closes: #427867)
  * converted packaging from dbs to debhelper
  * applied all existing patches from old 2.1a13 package
  * made bihourly.sh an example, and copied bihourly cron script from 2.1a13
  * deleted duplicate errs= line from bihourly (Closes: #321504)
  * fixed sprintf in ec.c (Closes: #315215)
  * Applied patch from Sebastian Reichelt sebasti...@gmx.de to initialise 
interface variable (Closes: #289426)
  * updated watch file to v3 (Closes: #529097)
  * applied patch from Sebastian Reichelt to display IP in subject if hostname 
unknown (Closes: #288994)

 -- Craig Sanders c...@taz.net.au  Tue, 01 Sep 2009 20:00:54 +1000


craig

-- 
craig sanders c...@taz.net.au


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: NMU etiquette (arpwatch package)

2009-09-01 Thread Craig Sanders
On Tue, Sep 01, 2009 at 09:30:04PM -0700, Steve Langasek wrote:
 I'm glad to see that Peter has approved of your NMU proposal, as
 migrating away from hand-rolled debian/rules files is a goal that
 I heartily support.  However, your original question was one of
 etiquette, and I don't think that's been addressed in this thread.

 Yes, replacing the build system of a package in an NMU without the
 consent of the maintainer is an NMU faux pas. :-) 

yep, i figured that. which is why i made a point of highlighting the
fact that i'd done it.

 NMUers should limit themselves to changes that directly fix bugs, and
 steer clear of design decisions regarding the packaging.

my initial intent was just to fix the MAC address sprintf for myself,
and use it on my own systems. then i looked at the dbs packaging for a
while and the amount of work involved in just figuring out how it worked
was too much, so i decided to just repackage the latest version for
myself. and, of course, i kept all the previous patches and changes from
the previous package. and then i fixed some of the other bug reports.

when i'd done all that i figured it would be a shame to let that work go
to waste on just my own systems and decided to find out about current
NMU practices. arpwatch is quite useful for those who need it and
doesn't really have any newer or better-maintained alternatives that do
the same job.

so, it's kind of an accidental NMU. i started off just wanting to fix
a very minor problem for myself and a few hours later ended up with a
complete new package.

anyway, i'll be testing my arpwatch package on my own boxes for a while
and, if i haven't introduced any new bugs, i'll upload it in a few days.

 If some of those design decisions mean no one is willing to NMU the
 package and the package falls into disrepair as a result, then it's a
 candidate for orphaning via the QA team processes; but we shouldn't
 force the issue by replacing a build system we don't like with another
 that the /maintainer/ may dislike just as much when they come back to
 the package.

apart from occasional NMU over the last 5 years, arpwatch seems
abandoned.  IMO a working, updated, bug-fixed package is better than
just letting it drop out of debian entirely - especially when it does a
unique and useful job that no other package does.

but then, i've never been precious about ownership of packages - mine or
anyone else's.  IMO, getting stuff done is far more important than WHO
does it. and if the package's official maintainer doesn't like what was
done in an NMU they can always ignore it or re-do it in their preferred
style when they get around to it.

but if Peter K had said not to upload it, i'd keep it as a private
package, or just put it up on my web site for anyone else to download
outside of debian.

i may have misread it but Peter seemed to hint that he'd like someone to
adopt arpwatch...hopefully the new form of the package will make it more
appealing (or less unappealing) to someone.

 Other polite conventions regarding NMUs are spelled out in the developer's
 reference http://www.debian.org/doc/developers-reference/pkgs.html#nmu.

thanks.

craig

-- 
craig sanders c...@taz.net.au


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Accepted dlocate 1.02 (source all)

2009-06-02 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 03 Jun 2009 11:24:02 +1000
Source: dlocate
Binary: dlocate
Architecture: source all
Version: 1.02
Distribution: unstable
Urgency: low
Maintainer: Craig Sanders c...@taz.net.au
Changed-By: Craig Sanders c...@taz.net.au
Description: 
 dlocate- fast alternative to dpkg -L and dpkg -S
Closes: 42 531641
Changes: 
 dlocate (1.02) unstable; urgency=low
 .
   * fixed example in dlocate.1 man page again (Closes: #42)
   * added '-k', and '-K' commands to list kernels and related packages
   * added optional support for gzip compression of 
/var/lib/dlocate/dlocatedb.txt
   * added support output filters (--package-only, --filename-only) (Closes: 
#531641)
Checksums-Sha1: 
 dfea8a017a0b53918393b3dec6f4f833328c34f6 687 dlocate_1.02.dsc
 28029313f6021efa6cd7d3051677e29ea8ccd237 37601 dlocate_1.02.tar.gz
 6b3aa0e90f915df27f01e6e6cde2a2692d4e5dd3 22470 dlocate_1.02_all.deb
Checksums-Sha256: 
 2c429005c29fe038672e52aa94471ade831bdb49e04c1133c34805cf9065681a 687 
dlocate_1.02.dsc
 1d3473d1327ab2a34c12a674e56717b104b1957799dd1a80f9e322f3a422dd89 37601 
dlocate_1.02.tar.gz
 27f1fddbc8b6af73cab0652287cac2a9fbf5a50af1c8d09adf0284daadb70d65 22470 
dlocate_1.02_all.deb
Files: 
 c402f55e5da6f19df5c6d322641248a8 687 utils optional dlocate_1.02.dsc
 8274443ea8282737b845f1496caf8c1a 37601 utils optional dlocate_1.02.tar.gz
 61c75c697dda54801a100d6ab005b6f0 22470 utils optional dlocate_1.02_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkol0eQACgkQ7DJoEM1WJvCg4gCfe/w4+Jh/oFXz7vBYCDhD+hDX
uUEAn2MrhId8PRwqvJeHb87JHDoQVD/g
=5oZF
-END PGP SIGNATURE-


Accepted:
dlocate_1.02.dsc
  to pool/main/d/dlocate/dlocate_1.02.dsc
dlocate_1.02.tar.gz
  to pool/main/d/dlocate/dlocate_1.02.tar.gz
dlocate_1.02_all.deb
  to pool/main/d/dlocate/dlocate_1.02_all.deb


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Accepted dlocate 1.01 (source all)

2009-05-31 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 01 Jun 2009 09:56:54 +1000
Source: dlocate
Binary: dlocate
Architecture: source all
Version: 1.01
Distribution: unstable
Urgency: low
Maintainer: Craig Sanders c...@taz.net.au
Changed-By: Craig Sanders c...@taz.net.au
Description: 
 dlocate- fast alternative to dpkg -L and dpkg -S
Closes: 304045
Changes: 
 dlocate (1.01) unstable; urgency=low
 .
   * added support for diversions (Closes: #304045)
   * fixed copy/paste error for -P (now correctly passes -P to grep rather than 
-E)
   * really moved the four dpkg-* man pages to section 8
Checksums-Sha1: 
 83d1509f73d89e034720bb8838247913107280d9 687 dlocate_1.01.dsc
 f5764e14afda3c2bd3c2f2a18b7de71b1ae69c76 37071 dlocate_1.01.tar.gz
 04a7ae3f417b861c7e8c18ba18858c0c43cf2e39 20518 dlocate_1.01_all.deb
Checksums-Sha256: 
 e78bcc38b1065ced1f2ee334204f49bd6860855cb0e2f8df13e23592550c9d5c 687 
dlocate_1.01.dsc
 426d64ccf376bc42ea441d7d4eb3da43bd7d56db4bcb4cd6afb50dca25d59d8b 37071 
dlocate_1.01.tar.gz
 c67e228df131a9cd93c70c4520beea4c561ffbd15dea98668517ebc0de04a945 20518 
dlocate_1.01_all.deb
Files: 
 8331c94de5a7f84352f859f13fe68134 687 utils optional dlocate_1.01.dsc
 83d96c92457885d9143ca0e3b453ddce 37071 utils optional dlocate_1.01.tar.gz
 2e0692339e7dcf13f3f786d2dceddea3 20518 utils optional dlocate_1.01_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkojGWkACgkQ7DJoEM1WJvBqLACePRlRaGUeiZ7jOOtFt0U6MBFv
FHUAnRR5lYmL0hJPK+09oYD039epN+Er
=8z9N
-END PGP SIGNATURE-


Accepted:
dlocate_1.01.dsc
  to pool/main/d/dlocate/dlocate_1.01.dsc
dlocate_1.01.tar.gz
  to pool/main/d/dlocate/dlocate_1.01.tar.gz
dlocate_1.01_all.deb
  to pool/main/d/dlocate/dlocate_1.01_all.deb


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Accepted dlocate 1.0 (source all)

2009-05-30 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sat, 30 May 2009 16:53:51 +1000
Source: dlocate
Binary: dlocate
Architecture: source all
Version: 1.0
Distribution: unstable
Urgency: low
Maintainer: Craig Sanders c...@taz.net.au
Changed-By: Craig Sanders c...@taz.net.au
Description: 
 dlocate- fast alternative to dpkg -L and dpkg -S
Closes: 49922 42 494651 494673 501870 505997 512446 513470 518309 523501
Changes: 
 dlocate (1.0) unstable; urgency=low
 .
   * no longer use frcode and locate, see discussion in 494673.  removed
 dependency on locate package. (Closes: #505997, #494651, #494673)
   * added support for several GNU grep options, -E, -F, -G, -P, and -w
   * the extra grep options obsolete the request for shell glob patterns 
(Closes: #49922)
   * checked for empty $PKGS (Closes: #523501)
   * fixed '-man' option, so that it doesn't break on man directories with 
locales
   * tired of people filing the same bug because they misunderstand the purpose 
of '-man'.  added 'sort -u'.  (Closes: #501870)
   * updated and fixed dlocate.1 man page (Closes: #518309)
   * corrected 'dlocate -l' example in man page (Closes: #42)
   * moved man pages for dpkg-hold, dpkg-unhold, dpkg-purge, dpkg-remove to 
section 8 (Closes: #512446)
   * added --verbose option to aid in debugging dlocate
   * fixed bug that broke support for multiple packages in most commands
   * fixed '-s' command so that it only calls grep-dctrl once if there are 
multiple package names
   * applied following 6 lintian fixes from era eriksson: (Closes: #513470)
   * debian/control: revert dependency on awk; as per Lintian error,
 it is in practice essential, and should not be declared
   * debian/copyright: add copyright year; disambiguate license as GPL v2
 (fix lintian warning)
   * debian/rules: move binary-arch commands to binary-indep; do not ignore
 errors from make clean (fix lintian warnings)
   * debian/changelog: fix typo in 0.96.1 s/dancy/dency/ (fix lintian warning)
   * debian/postinst: don't use explicit path for /usr/sbin (fix lintian 
warning)
   * debian/postrm: add -e flag (fix lintian warning)
Checksums-Sha1: 
 305ea6a207a8073b1090e12eea51f6667b38c56b 683 dlocate_1.0.dsc
 4cb84953028e25b0fe2f7a9be38943a8ecb1f4e8 36544 dlocate_1.0.tar.gz
 e0f59394157ce1590e03ba0fb6d095a47e0c4eab 20172 dlocate_1.0_all.deb
Checksums-Sha256: 
 d317e27b1372891684495372399cc4144c78e8803c7435e1008aeaf924ed050c 683 
dlocate_1.0.dsc
 e0ecac3b651fd9dcebaf900aab88d23e94713bbce526f87c7890febd70da7375 36544 
dlocate_1.0.tar.gz
 d8e33720d26e8b52d4a7f490c7a13e10dcebe3c8f56bc56fd11c1244b28093c7 20172 
dlocate_1.0_all.deb
Files: 
 bddbc804eb0748fd92490c0a3f12c2f5 683 utils optional dlocate_1.0.dsc
 ffe6f95a7306256cac513f3e5b1793ef 36544 utils optional dlocate_1.0.tar.gz
 92ffd6360871a713a741b612d6ad16dc 20172 utils optional dlocate_1.0_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkohBB4ACgkQ7DJoEM1WJvDfJwCffy6J5k89TUGKpWqJkQcSkvwQ
EcgAnj8SzwgpykWiT0auEkEAN2BYFgZr
=G71/
-END PGP SIGNATURE-


Accepted:
dlocate_1.0.dsc
  to pool/main/d/dlocate/dlocate_1.0.dsc
dlocate_1.0.tar.gz
  to pool/main/d/dlocate/dlocate_1.0.tar.gz
dlocate_1.0_all.deb
  to pool/main/d/dlocate/dlocate_1.0_all.deb


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Accepted dlocate 0.96 (source all)

2008-06-27 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 27 Jun 2008 18:46:38 +1000
Source: dlocate
Binary: dlocate
Architecture: source all
Version: 0.96
Distribution: unstable
Urgency: low
Maintainer: Craig Sanders [EMAIL PROTECTED]
Changed-By: Craig Sanders [EMAIL PROTECTED]
Description: 
 dlocate- fast alternative to dpkg -L and dpkg -S
Closes: 488222
Changes: 
 dlocate (0.96) unstable; urgency=low
 .
   * accidentally deleted cron.daily rather than updating it.  restored it.
 (Closes: 488222)
   * updated postinst to generate /var/lib/dlocate/dpkg.list with tab-
 separated fields, the same way that /etc/cron.daily/dlocate does.
 also removed COLUMNS=200 because the postinst doesn't need it any
 more than the cron.daily does.
   * updated man page for update-dlocatedb to note additional author
Checksums-Sha1: 
 0a329c85c7c36173c952dfbb15ff8529eb22964c 687 dlocate_0.96.dsc
 4387ad39467588d941176fbba5f3d88b3e905c48 33990 dlocate_0.96.tar.gz
 8b631b66e94bf60426e7f5fcfb0faedd3b355870 17814 dlocate_0.96_all.deb
Checksums-Sha256: 
 60c41bc02a77ebef06d42e3b18ae65005997c2cd7f2d0e95a5c60ed76ba86559 687 
dlocate_0.96.dsc
 b19f842301c7f7dc727f83ac72b56bc3e1a85cf5837ab517cbe4d744b290afe1 33990 
dlocate_0.96.tar.gz
 56ed7df50002cbf0a9de89f5cf1d6270b3f2a88b8bdbffe07b6d972354ecee85 17814 
dlocate_0.96_all.deb
Files: 
 408b40a3b8feb200e943a7b38faa1157 687 utils optional dlocate_0.96.dsc
 62b9ac5029821259134611a19205f577 33990 utils optional dlocate_0.96.tar.gz
 4c0490de23d39ecc8f5092d166cd35cd 17814 utils optional dlocate_0.96_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkhkqaAACgkQ7DJoEM1WJvDXXgCeKAwKRDZ8YqZqnpeC8k+Fpxi7
OywAn1GstIGFee7+T3Z103ynayR5OOQn
=jH6e
-END PGP SIGNATURE-


Accepted:
dlocate_0.96.dsc
  to pool/main/d/dlocate/dlocate_0.96.dsc
dlocate_0.96.tar.gz
  to pool/main/d/dlocate/dlocate_0.96.tar.gz
dlocate_0.96_all.deb
  to pool/main/d/dlocate/dlocate_0.96_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted dlocate 0.96.1 (source all)

2008-06-27 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 27 Jun 2008 19:58:57 +1000
Source: dlocate
Binary: dlocate
Architecture: source all
Version: 0.96.1
Distribution: unstable
Urgency: low
Maintainer: Craig Sanders [EMAIL PROTECTED]
Changed-By: Craig Sanders [EMAIL PROTECTED]
Description: 
 dlocate- fast alternative to dpkg -L and dpkg -S
Changes: 
 dlocate (0.96.1) unstable; urgency=low
 .
   * version 0.95 introduced a dependancy on awk, which is an optional
 package. the simple awk script has only been tested on my system
 with gawk, but it doesn't do anything gawkish so should work with
 mawk or original-awk. fixed Depends line.
Checksums-Sha1: 
 c594c884e3868e9da3917b611c934d5ccd64f462 695 dlocate_0.96.1.dsc
 936936a124ac2ebe7096b6cf52c52981009016b9 34011 dlocate_0.96.1.tar.gz
 3615eea5c388afd2b00825c520f101298e7522a3 17948 dlocate_0.96.1_all.deb
Checksums-Sha256: 
 0edc1dbabd7d2f7c8c06c3da3ac069a2d90542e2526eb49f0b610438069289fa 695 
dlocate_0.96.1.dsc
 e86ffac37d642f67f9c793d873edb7f47a5529172b8a192df6996754a9818e1c 34011 
dlocate_0.96.1.tar.gz
 694f78e72aa50af65cc0ccbb234a47464531acf9e34e76a9c530cb15b6fa3afb 17948 
dlocate_0.96.1_all.deb
Files: 
 82638ab56d48b2b4b383907d85c9b494 695 utils optional dlocate_0.96.1.dsc
 32a6c408187d0c4c64504d21855ad9ff 34011 utils optional dlocate_0.96.1.tar.gz
 46623765e9ca9d0d995286a1b2f4e960 17948 utils optional dlocate_0.96.1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkhkvN8ACgkQ7DJoEM1WJvAXBACeMV3n1SKBKt2eMFbD8mK5FWTb
9UAAn1EB1t/MqW90ava1j75iw4Luej8q
=3/66
-END PGP SIGNATURE-


Accepted:
dlocate_0.96.1.dsc
  to pool/main/d/dlocate/dlocate_0.96.1.dsc
dlocate_0.96.1.tar.gz
  to pool/main/d/dlocate/dlocate_0.96.1.tar.gz
dlocate_0.96.1_all.deb
  to pool/main/d/dlocate/dlocate_0.96.1_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted dlocate 0.95 (source all)

2008-06-26 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 26 Jun 2008 20:53:30 +1000
Source: dlocate
Binary: dlocate
Architecture: source all
Version: 0.95
Distribution: unstable
Urgency: low
Maintainer: Craig Sanders [EMAIL PROTECTED]
Changed-By: Craig Sanders [EMAIL PROTECTED]
Description: 
 dlocate- fast alternative to dpkg -L and dpkg -S
Closes: 42314 43145 43146 45057 54073 63902 67650 76149 78621 83196 84018 91785 
100694 101426 129186 129251 132930 132931 314276 337711 456292 457572 42 
487471
Changes: 
 dlocate (0.95) unstable; urgency=low
 .
   * changed cron.daily to not use ionice if kernel version 2.6.13
   * redirected stderr from ionice to /dev/null to avoid error
 messages if running under vserver or other environments without
 CFQ scheduling (Closes: #456292)
   * added Pawel Chmielowski [EMAIL PROTECTED] patch to
 update-dlocatedb which re-uses any old data from the existing
 dlocatedb.  (Closes: #457572)
   * changed separator character when building the search regexp so
 that we don't end up grepping for everything.  (Closes: #42)
   * while/read loops in bash are abysmally slow.  replaced that loop
 in 'dlocate -l' section with an awk script.  vast improvement in
 speed.
 Note: this required changing the field separator in $DPKGLIST from
 space to tab, so anyone who parses that file directly (nobody, i
 think) may need to modify their scripts.
 (Closes: #487471)
   * finally close some bugs that were actually closed ages ago in
 NMUs.  (Closes: #314276, #337711, #83196, #54073, #63902, #84018, #67650, 
#78621, #132930, #91785, #100694, #101426, #129251,  #132931, #129186, #76149, 
#43145, #43146, #45057, #42314)
Checksums-Sha1: 
 d2d38a87fa9bae80b6d9ef600c1c52c73d7832c5 687 dlocate_0.95.dsc
 813879660d08425d6333789beeae2f040d698a24 33764 dlocate_0.95.tar.gz
 50a3488b99ea2bea1587c068e060a7a04043e23d 17158 dlocate_0.95_all.deb
Checksums-Sha256: 
 527dc0d77e4cf958c7426f8b3f7a43c68bc674774c384420049896648140ceab 687 
dlocate_0.95.dsc
 0f95bd4ebecef3cee077c5304b55e6222fdcbe207fa10d206be1ab86de49a88e 33764 
dlocate_0.95.tar.gz
 add94e2b480a91747edce211bf1c135bba975886f56408c9d6dd5919d4c6a1e1 17158 
dlocate_0.95_all.deb
Files: 
 ecdae4a0d47aba9fa0913a88db8ac68d 687 utils optional dlocate_0.95.dsc
 dd25608870600fa3ca400504e2fb91c5 33764 utils optional dlocate_0.95.tar.gz
 771445427304cc5725f03e01ce3b7ab9 17158 utils optional dlocate_0.95_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkhjfxQACgkQ7DJoEM1WJvBoVQCfQjMLqSdThtK/oAsBVhgZl8je
wrQAnjPGvz61iEOp8S+jkXGgz1n3wu9c
=03AR
-END PGP SIGNATURE-


Accepted:
dlocate_0.95.dsc
  to pool/main/d/dlocate/dlocate_0.95.dsc
dlocate_0.95.tar.gz
  to pool/main/d/dlocate/dlocate_0.95.tar.gz
dlocate_0.95_all.deb
  to pool/main/d/dlocate/dlocate_0.95_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted dlocate 0.94 (source all)

2007-12-02 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 03 Dec 2007 07:43:37 +1100
Source: dlocate
Binary: dlocate
Architecture: source all
Version: 0.94
Distribution: unstable
Urgency: low
Maintainer: Craig Sanders [EMAIL PROTECTED]
Changed-By: Craig Sanders [EMAIL PROTECTED]
Description: 
 dlocate- fast alternative to dpkg -L and dpkg -S
Closes: 350818 354644 453952
Changes: 
 dlocate (0.94) unstable; urgency=low
 .
   * optimisation for '-S' and 'DEFAULT' commands.  run locate once
 only with multiple filenames on the command line.  significantly
 faster when searching for multiple filenames.  slighly slower
 when searching for only one filename.
   * the optimisation also means that $result is the exit-code of
 all searches combined, rather than just the exit-code of the
 last search to be run.
   * this also fixes the double-vision symption reported in bug#354644
 i'll close this bug for now, but may reopen it if it turns out
 that an --exact-match option would be useful.  (Closes: #354644)
   * added '--ignore-case','-i' option for package and filename
 searches ('-l','-S', and default command).  (Closes: #350818)
   * used ionice in /etc/cron.daily/dlocate (Closes: #453952)
Files: 
 508c0ce3e1d0535560df3c8695376675 483 utils optional dlocate_0.94.dsc
 e2e99b4c294a50fa91db396dfa3fbc05 32918 utils optional dlocate_0.94.tar.gz
 8b3eb28d752136b527e2062b31b2d1f6 16606 utils optional dlocate_0.94_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHUxwy7DJoEM1WJvARAnWsAJ9fKzH4ELCgZRrEWhbiL3KM/BP3AACeLCdA
LQeIAoXPOhd29Cj+kFidtjw=
=rIEP
-END PGP SIGNATURE-


Accepted:
dlocate_0.94.dsc
  to pool/main/d/dlocate/dlocate_0.94.dsc
dlocate_0.94.tar.gz
  to pool/main/d/dlocate/dlocate_0.94.tar.gz
dlocate_0.94_all.deb
  to pool/main/d/dlocate/dlocate_0.94_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted dlocate 0.93 (source all)

2007-11-29 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 29 Nov 2007 18:27:22 +1100
Source: dlocate
Binary: dlocate
Architecture: source all
Version: 0.93
Distribution: unstable
Urgency: low
Maintainer: Craig Sanders [EMAIL PROTECTED]
Changed-By: Craig Sanders [EMAIL PROTECTED]
Description: 
 dlocate- fast alternative to dpkg -L and dpkg -S
Closes: 220351 307371 447140
Changes: 
 dlocate (0.93) unstable; urgency=low
 .
   * minor fix to -lsbin.  now excludes all non-files, rather than
 just directories.  also follows symlinks.
   * added '--' option to make it possible to search for partial
 files like -conf, -ls, and other '-*' that happen to match
 dlocate options.  did i already mention that dlocate's
 arg processing really sucks and needs a rewrite?
   * added Makefile rules (make test) to automate testing of dlocate
 output, and to remind me to update the version banner in dlocate.
 (NOTE: breaks backwards-compatibility for anyone who relies on
 the old behaviour!)
   * check for unknown options (Closes: #220351, #307371)
   * only print header for 'dlocate -l' if there are any matching
 packages found. (Closes: #447140)
   * fixed dlocate's stderr redirection so that 'make test' works.
 (possible bug in bash - '/dev/stderr' treated differently to '2')
Files: 
 f51f7c5b1ec43fd3fd779506b97cc808 483 utils optional dlocate_0.93.dsc
 91fbe0c5c7bb3d6406f500dfb9ae4774 32335 utils optional dlocate_0.93.tar.gz
 f0c22767fb377e101e8558dc5d3c1da0 15988 utils optional dlocate_0.93_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHTmoG7DJoEM1WJvARAhpdAJ9v5Zu//s4xf9C6W5tVefoWxQ6D2QCfQ0xY
RvrHHnVyQYD4nhJALaQsgmw=
=sUZw
-END PGP SIGNATURE-


Accepted:
dlocate_0.93.dsc
  to pool/main/d/dlocate/dlocate_0.93.dsc
dlocate_0.93.tar.gz
  to pool/main/d/dlocate/dlocate_0.93.tar.gz
dlocate_0.93_all.deb
  to pool/main/d/dlocate/dlocate_0.93_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted dlocate 0.92 (source all)

2007-11-26 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 26 Nov 2007 19:26:50 +1100
Source: dlocate
Binary: dlocate
Architecture: source all
Version: 0.92
Distribution: unstable
Urgency: low
Maintainer: Craig Sanders [EMAIL PROTECTED]
Changed-By: Craig Sanders [EMAIL PROTECTED]
Description: 
 dlocate- fast alternative to dpkg -L and dpkg -S
Closes: 452746
Changes: 
 dlocate (0.92) unstable; urgency=low
 .
   * passed '--' to egrep so you can search for partial package names
 like '-utils', '-tools', etc.
   * fixed a bug in -md5check which prevented it from checking some
 packages with spaces in the filenames.
   * used '-r' (--no-run-if-empty) everywhere with xargs.
 (Closes: #452746)
   * also changed numerous tests of [ -e $PKG.* ] to [ -s $PKG.* ]
 to test for 'exists and not empty' rather than just 'exists'.
   * removed output of double-quotes (0x22) surrounding $PKG to
 make stderr output more parser-friendly.
   * added simple script to test dlocate output prior to uploading
 a new version (script is in source package only)
Files: 
 8bb0aaa39208b7f7f5b5266f676756a6 483 utils optional dlocate_0.92.dsc
 9c184f9d9bc20f47b94c905c644ec75b 13750 utils optional dlocate_0.92.tar.gz
 41298b90fc0ab39373f389d25f38e79e 15448 utils optional dlocate_0.92_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHSoQ37DJoEM1WJvARAvrdAJ9Kjwit6dqhtIOUBWW/4cvKgyTB2QCfXW8G
aNIcLshwY02axxzlWDCnM3I=
=3sXr
-END PGP SIGNATURE-


Accepted:
dlocate_0.92.dsc
  to pool/main/d/dlocate/dlocate_0.92.dsc
dlocate_0.92.tar.gz
  to pool/main/d/dlocate/dlocate_0.92.tar.gz
dlocate_0.92_all.deb
  to pool/main/d/dlocate/dlocate_0.92_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted dlocate 0.91 (source all)

2007-11-22 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 22 Nov 2007 21:20:26 +1100
Source: dlocate
Binary: dlocate
Architecture: source all
Version: 0.91
Distribution: unstable
Urgency: low
Maintainer: Craig Sanders [EMAIL PROTECTED]
Changed-By: Craig Sanders [EMAIL PROTECTED]
Description: 
 dlocate- fast alternative to dpkg -L and dpkg -S
Changes: 
 dlocate (0.91) unstable; urgency=low
 .
   * corrected minor mistake in dpkg-remove man page.
Files: 
 e307984c7d181a4f2b8cbc694f61f27e 483 utils optional dlocate_0.91.dsc
 1c1cc2bc171c6bf231be14493455608c 12212 utils optional dlocate_0.91.tar.gz
 a0f53b9e2a3179acb2ce47e91119e073 15068 utils optional dlocate_0.91_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHRVgi7DJoEM1WJvARAo7zAJ0YeHolQl4eppa1APUPekI5zyHR2QCfbRjJ
pGo6UuDMiPcV52bWbeOjJwQ=
=tp1S
-END PGP SIGNATURE-


Accepted:
dlocate_0.91.dsc
  to pool/main/d/dlocate/dlocate_0.91.dsc
dlocate_0.91.tar.gz
  to pool/main/d/dlocate/dlocate_0.91.tar.gz
dlocate_0.91_all.deb
  to pool/main/d/dlocate/dlocate_0.91_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted dlocate 0.9 (source all)

2007-11-22 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 22 Nov 2007 20:48:19 +1100
Source: dlocate
Binary: dlocate
Architecture: source all
Version: 0.9
Distribution: unstable
Urgency: low
Maintainer: Craig Sanders [EMAIL PROTECTED]
Changed-By: Craig Sanders [EMAIL PROTECTED]
Description: 
 dlocate- fast alternative to dpkg -L and dpkg -S
Closes: 380081 452297
Changes: 
 dlocate (0.9) unstable; urgency=low
 .
   * cron.daily doesn't need to have COLUMNS=200.  this was fixed in dpkg
 years ago.
   * redirect error output from -lsbin to /dev/null.  (Closes: #452297)
   * made -lsbin output consistent with other -ls options
   * added dpkg-hold, dpkg-unhold, dpkg-remove, and dpkg-purge to /usr/sbin.
 simple command line tools that i've been using for years to
 flag/unflag a package for hold, or flag it to be removed or purged.
 They *ONLY* change the status of the package which will be noticed
 the next time dpkg, dselect, or apt-get is run.
   * write simple man pages for dpkg-{hold,unhold,remove,purge}
   * really fixed bad handling of first arg this time (Closes: #380081)
   * updated date in dlocate.1 man page
Files: 
 331846d283a98f14b29451038faf0f23 481 utils optional dlocate_0.9.dsc
 d98c3427c0769e7cf6eac92229f2f24c 12195 utils optional dlocate_0.9.tar.gz
 b108bc76b535b5545315fb20507cc3f3 15008 utils optional dlocate_0.9_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHRVXN7DJoEM1WJvARAs37AJ0a36LlyPjhfrNzYZpsyAP8xJBV9gCcDrrT
yNx/ZGK2AYUJiMlzSrDrg30=
=/wUp
-END PGP SIGNATURE-


Accepted:
dlocate_0.9.dsc
  to pool/main/d/dlocate/dlocate_0.9.dsc
dlocate_0.9.tar.gz
  to pool/main/d/dlocate/dlocate_0.9.tar.gz
dlocate_0.9_all.deb
  to pool/main/d/dlocate/dlocate_0.9_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted dlocate 0.6 (source all)

2007-11-20 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 20 Nov 2007 23:12:18 +1100
Source: dlocate
Binary: dlocate
Architecture: source all
Version: 0.6
Distribution: unstable
Urgency: low
Maintainer: Craig Sanders [EMAIL PROTECTED]
Changed-By: Craig Sanders [EMAIL PROTECTED]
Description: 
 dlocate- fast alternative to dpkg -L and dpkg -S
Closes: 65974 223698 224947 261733 268288 290562 319251 354285 360824 360824 
375271 380081 451750
Changes: 
 dlocate (0.6) unstable; urgency=low
 .
   * Applied patch from Andreas Metzler: GNU locate has been split off to
 a separate package. Adapt dlocate to work both with the new and the
 old setup.  (Closes: #451750)
   * always pass '--' to locate.  (Closes: #360824, #360824)
   * can not reproduce bug 65974.  my guess is that update-dlocatedb hadn't
 been run.  (Closes: #65974)
   * error messages now go to stderr (Closes: 375271)
   * first option is no longer a special case (Closes: #380081)
   * 'LINES=40' isn't needed.  removed.  (Closes: #224947)
   * shameful trailing blanks removed from -l output (Closes: #261733)
   * 'dlocate -l' no longer outputs one header for each package name.
 (Closes: #268288, #319251, #354285)
   * added '/' to start of dlocate -man regexp.  (Closes: #290562)
   * dlocate now has --version and -V options (Closes: #223698)
   * dlocate really needs a rewrite.  it started as a QD hack and grew
 beyond that.  the remaining bugs need a rewrite to fix.
 expect a rewrite from scratch soon.
Files: 
 c5c3d6c7133bcd240d48bbf465a2f6fd 480 utils optional dlocate_0.6.dsc
 b1408d95f3888183731ec7e767a4c01b 9966 utils optional dlocate_0.6.tar.gz
 e15d24e2b1bd8c3e1c1deb3d22148381 10480 utils optional dlocate_0.6_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHQtTb7DJoEM1WJvARAtXsAJ487/M32t/aPpTNFmbB5wgLBK/BaACgiTIx
i6lyxVLUU6Z78LrNFTb7+l4=
=mRga
-END PGP SIGNATURE-


Accepted:
dlocate_0.6.dsc
  to pool/main/d/dlocate/dlocate_0.6.dsc
dlocate_0.6.tar.gz
  to pool/main/d/dlocate/dlocate_0.6.tar.gz
dlocate_0.6_all.deb
  to pool/main/d/dlocate/dlocate_0.6_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted dlocate 0.7 (source all)

2007-11-20 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 21 Nov 2007 01:53:17 +1100
Source: dlocate
Binary: dlocate
Architecture: source all
Version: 0.7
Distribution: unstable
Urgency: low
Maintainer: Craig Sanders [EMAIL PROTECTED]
Changed-By: Craig Sanders [EMAIL PROTECTED]
Description: 
 dlocate- fast alternative to dpkg -L and dpkg -S
Closes: 208425 289351 354648 361125 441109 441183 447141
Changes: 
 dlocate (0.7) unstable; urgency=low
 .
   * fixed small bug in arg handling
   * added more commentary and examples in the dlocate man page to resolve
 various searching issues (both locate and egrep are different to dpkg's
 shell-style pattern matching).
 Also added 'SEE ALSO locate(1)' to the man page.
 (Closes: #441183, #208425, #447141)
   * man page for dpkg is in section 1.  (Closes: #354648)
   * added -lsman option to list full path/filename of man pages.
 (Closes: #361125, #289351)
   * added -lsbin option to list full path/filename of binaries
 (Closes: #441109)
Files: 
 3170a73d8bde3b5b75b20cd0437c1945 481 utils optional dlocate_0.7.dsc
 ed10d933687c99063018a0b365159e2d 10633 utils optional dlocate_0.7.tar.gz
 ab546230567b85a2abe0bd9894ae82f3 11270 utils optional dlocate_0.7_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHQvZ67DJoEM1WJvARAgOHAJ9J4zGL4N6/lqKIwfHLJcAR0jgMMgCfUkh6
FuLGUE/MjHrWR9U+YgKFtas=
=tZNl
-END PGP SIGNATURE-


Accepted:
dlocate_0.7.dsc
  to pool/main/d/dlocate/dlocate_0.7.dsc
dlocate_0.7.tar.gz
  to pool/main/d/dlocate/dlocate_0.7.tar.gz
dlocate_0.7_all.deb
  to pool/main/d/dlocate/dlocate_0.7_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted dlocate 0.8 (source all)

2007-11-20 Thread Craig Sanders
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 21 Nov 2007 10:29:20 +1100
Source: dlocate
Binary: dlocate
Architecture: source all
Version: 0.8
Distribution: unstable
Urgency: low
Maintainer: Craig Sanders [EMAIL PROTECTED]
Changed-By: Craig Sanders [EMAIL PROTECTED]
Description: 
 dlocate- fast alternative to dpkg -L and dpkg -S
Closes: 61790 361196 413804
Changes: 
 dlocate (0.8) unstable; urgency=low
 .
   * call md5sum -c with '-' rather than /dev/stdin (Closes: #413804)
   * can not reproduce 61790, and nobody else has ever reported anything
 similar.  probably some problem with cron on Lazarus' system at the
 time (Apr 2000).  (Closes: #61790)
   * improved error messages from update-dlocatedb.  also modified
 script to comply with 'use strict;'.  (Closes: #361196)
Files: 
 c57a51cac011257a0a0b38e00f8c56a5 481 utils optional dlocate_0.8.dsc
 e8f8405c67c97470f669595fc27c68fe 10860 utils optional dlocate_0.8.tar.gz
 ec3b466e858465cacc576ccd1aea3e69 11522 utils optional dlocate_0.8_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHQ26z7DJoEM1WJvARAl7lAJ4tuAWGbOBQAFDXB2dVo4lWN5oUfwCfbg8g
vrnQYKmows3x18dreRMJ7m4=
=TOxI
-END PGP SIGNATURE-


Accepted:
dlocate_0.8.dsc
  to pool/main/d/dlocate/dlocate_0.8.dsc
dlocate_0.8.tar.gz
  to pool/main/d/dlocate/dlocate_0.8.tar.gz
dlocate_0.8_all.deb
  to pool/main/d/dlocate/dlocate_0.8_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: nethack popularity contest - number_pad?

2003-10-17 Thread Craig Sanders
On Thu, Oct 16, 2003 at 06:30:26PM -0700, Joshua Kwan wrote:
 Which is better? I like the default keys because you learn how to use nvi
 very efficiently knowing the hjkl-style keys :) I'm searching for as many
 opinions as possible so please speak up!

i agree.  hjkl keys are betterand gives the plausible excuse that playing
nethack is really just training for vi :)

craig




Re: tmda: Challenge-response is fundamentally broken (RAPNAP)

2003-09-08 Thread Craig Sanders
On Sat, Sep 06, 2003 at 11:32:04PM +1000, Russell Coker wrote:
 DNSBL's and spamassasin seem quite good at dealing with spam and are much
 less annoying.  That combined with some new laws that are being enacted to
 combat spam should keep it to a managable level.

oh, please tell me that these new laws are going to be the replacement of Duck
Season with Spammer Season (Jan to Dec in any year).

that'll work.  i sometimes think that it's the ONLY thing that will really work.

craig




Re: music sheet

2003-09-08 Thread Craig Sanders
On Tue, Sep 09, 2003 at 09:11:09AM +1000, Matthew Palmer wrote:
 On Tue, Sep 09, 2003 at 01:00:11AM +0200, Josip Rodin wrote:
  On Mon, Sep 08, 2003 at 06:55:31PM -0400, Jim Penny wrote:
 Do you have the sheet music for dueling banjos?  I would like to
 get it if possible.

If you spelt it differently - Duelling Banjos - you'd get some nice
hits at Google for Duelling Banjos sheet music.
   
   The problem, amazingly enough, is that he did google for dueling
   banjos sheet music,
  
  You missed the spelling detail -- one l vs two. With the latter, Debian
  list archives aren't in the top ten.
  
  Of course, Matthew's post with the other spelling will now probably muddy
  that distinction, too. :)
 
 Aaaah crap, didn't think of that.  Of course, with all the quoting, we're
 pushing it ever higher...

why dont we just put up a page on www.debian.org with the requested sheet music
(or, if it's copyrighted then appropriate links to sites where it can be
found).

we could also put the tale of Google and The Dueling Banjos on the same page.

then make sure that there are enough links to this page that it gets the
highest rank on google (perhaps by editing the archives to include a link in
every page that mentions the song).

craig

ps: i just searched google for it myself and debian is down to 6th  7th place. 
 




Re: IMPORTANT: your message to html-tidy

2003-09-08 Thread Craig Sanders
On Sun, Sep 07, 2003 at 11:09:57PM -0700, Steve Lamb wrote:
 On Mon, 8 Sep 2003 15:40:15 +1000
 Matthew Palmer [EMAIL PROTECTED] wrote:
  On Mon, Sep 08, 2003 at 06:04:39AM +0100, Karsten M. Self wrote:
   I'm coming to the view that we're approaching the era where all mail is
   going to have to be subject to filtering, at the MTA level.
  
  Depends on how useful you want your e-mail box to be.  g
 
 It has been my experience that filtering at the MTA level has increased
 the usefulness of my mailbox considerably.  

aol me too /aol

stats from last week's mail.log (from my home mail server which handles mail
for about half a dozen people):

  1 Bad HELO
 10 RBL proxies.relays.monkeys.com
 11 Recipient Domain Not Found
 22 RBL relays.ordb.org
 25 strict 7-bit headers
 31 Relay access denied
 32 RBL taiwan.blackholes.us
 34 Sobig.F Virus
 42 body checks
 49 RBL spamdomains.blackholes.easynet.nl
 56 header checks
 61 RBL dnsbl.sorbs.net
182 IP Address in HELO
193 RBL brazil.blackholes.us
218 RBL blackholes.easynet.nl
271 Local access rule: Helo command rejected
342 RBL hongkong.blackholes.us
492 RBL dynablock.easynet.nl
924 RBL sbl.spamhaus.org
   1080 Local address forgery
   1099 Recipient address rejected
   1133 Sender Domain Not Found
   1771 RBL list.dsbl.org
   1825 Dynamic IP Trespass
   1902 RBL cn-kr.blackholes.us
   2471 Local access rule: Client host rejected
   3005 Need FQDN address
   3581 Local access rule: Sender address rejected
   4267 User unknown

  25130 TOTAL


Spamassassin stats:
382 spam
   4093 clean
   4475 TOTAL

Percentages:
spam:non-spam (25512/29605) 86.17%
accepted spam (382/4475) 8.54%
rejected spam (25130/25512) 98.50%


i'm reasonably happy with that.  98.5% of all spam was rejected outright.  only
382 spams (1.5%) made it through my postfix access lists, RBLs, etc to be
tagged by spamassassin.

these stats also demonstrate just how bad the spam problem has become.  86% of
all attempts to deliver mail to my server were spam, ~25500 spams and ~4100
legit messages.

if i wasn't blocking spam at the MTA, then at least half of those spams would
have ended up in MY personal mailbox (or, more likely, tagged by spamassassin
and saved into my spam.incoming folder)about 13000 more spams than i
currently receive.


craig

ps: i love postfix.  it has the best anti-spam features of any MTA.

pps: anyone who wants my simple spam-stats.pl script can get it from
http://taz.net.au/postfix/scripts/





Re: non-free software included in contrib

2003-09-01 Thread Craig Sanders
On Mon, Sep 01, 2003 at 09:47:46AM +1000, Matthew Palmer wrote:
 Ah, reductio ad absurdum.  Such a wonderful means of demonstrating that you
 can't think up a decent argument, so you'll take something to it's illogical
 extreme to try and scare some people.

more accurately, it is a useful tool for highlighting the absurdity of a given
argument by pointing out the inevitable and logical conclusions of that
argument.

craig




Re: Bug#207300: tmda: Challenge-response is fundamentally broken

2003-08-31 Thread Craig Sanders
On Sat, Aug 30, 2003 at 10:42:17AM +1000, Brian May wrote:
 On Fri, Aug 29, 2003 at 03:48:13PM +1000, Craig Sanders wrote:
  the point that you keep on missing is that TMDA and similar programs send
  confirmation emails to innocent third-parties who did *NOT* send an
  email.
  
  TMDA and all C-R systems are broken-by-design, just as many stupid end-user
  autoresponders and AV-scanners that send notifications back to the forged
  sender address are broken-by-design.
 
 You saying that any SMTP MTA that sends bounces to unauthenticated E-Mail
 addresses is also broken?

no, i am not saying that.

 That is the idea behind autorespoonders after all, to tell the sender
 that his mail didn't get through because it didn't meet some required
 criteria.

the difference are :

1. a bounce is NOT the same thing as generating a new notification or
confirmation message.


2. with modern MTAs that can reject mail from spammers/spamware/viruses during
the SMTP session, there is no bounce message at all.  by issuing a 5xx reject
code during the smtp session, it leaves the task of bouncing the message up to
the senderand very few (none, to my knowledge) virus or spamware programs
have any code at all to send bounces.  they just ignore the reject and move on
to spamming the next victim address.

this is beneficial both to the mail server itself (which is not clogged up with
thousands of undeliverable bounces) and also to the poor bastard who has had
their address forged by spamware or virus.

reasons for rejecting during the smtp session include: unknown recipient, relay
access denied, blacklisting (open relay, dialup/dynamic pool, known spam domain
etc), local policies (message size, quota, etc), obvious spam/virus (e.g.
content-filtering) and many others.


3. it is reasonable and correct for an MTA to assume that the sender
address is correct.  that is its job.

it is not at all reasonable for an anti-virus or anti-spam system to make that
assumption - almost all spam and most viruses are from forged addresses.
this has been known for years, it is absolutely inexcusable that any anti-virus
or anti-spam tool has been programmed without this knowledge in mind.


4. if an anti-virus or anti-spam mail system can NOT reject the mail during the
smtp session then it MUST NOT send any notification/bounce back to the sender.
the correct thing to do is to either tag the message and deliver it to the
recipient address (perhaps after removing or de-fanging any virus), or to
quarrantine it (and optionally send the *recipient* a notification message, or
just let them check their quarranitine box every so often).



 The other option which many people seem to want is to discard the E-Mail
 without giving either party any indication of what happened.

 E-Mail that looks suspicious can be valid mail at times, for instance
 somebody I knew tried to send a ZIP file that happened to be executable via
 E-Mail.
 
 Do you simply discard such E-Mails (which gives no indication that something
 went wrong), or do you try to contact the sender to indicate that something
 went wrong?

the answer to this is obvious:

you reject it and leave it up to the sending mta/client to deal with it.

if the sender is spamware or virus, there won't be any bounce message (nor
should there be).

if the sender is a legitimate client, then the user will be notified (usually
via a dialog box) and the message will stay in the outbound queue or be bounced
to the inbox or an error mbox.

if the sender is a mail server, then it will bounce the message back
to the original sender.  if it was a legitimate email that bounced (e.g. 
unknown recipient) then that is what is supposed to happen.  the only time this
is a problem is when the sending MTA is an open relay, and the address was 
forged.
there isn't much that can be done about that, however bounces from an open
relay server will be rejected by any MTA that uses an open-relay blacklist (so 
no
bounce will be delivered to the forged address).


 One approach for instance would be to modify the SMTP standard, and say if a
 host accepts the E-Mail then it is guaranteed to get it to the destination
 (ie. it signal OK until the message has been delivered), but that would break
 store-and-forward capabilities of secondary mail servers.

that is pretty much the standard now, except that a host which accepts a
message MUST either deliver it (directly or forward it on to the next hop), or
it MUST bounce it.

that word accept is crucial, however.  if you don't accept the message (i.e.
if you reject it with a 5xx reject code) then it's not your responsibility to
either deliver or bounce it...it is the responsibility of the sending client or
server.

 Even encryption does not help here, or at least I have not seen any proposals
 for any system that could scale to the Internet. GPG for instance only
 verifies the sender to the receiver, it could not be used to verify every
 sender to the MTAs involved.

encryption

Re: Bug#207300: tmda: Challenge-response is fundamentally broken

2003-08-31 Thread Craig Sanders
On Sat, Aug 30, 2003 at 04:01:19PM +1000, Russell Coker wrote:
 Backup MX servers serve no useful purpose in the modern Internet, this is why 
 big sites such as microsoft.com and hotmail.com don't have them.

agreed.

 If you have a backup MX then it should know all the acceptable email
 addresses in your domain and enforce all rules regarding acceptable content.
 Then it can block content through SMTP 550 and 450 codes.

yes.

if you don't have 100% administrative control over your backup MX server(s) 
then you
should NOT be using them.


craig




Re: Bug#207300: tmda: Challenge-response is fundamentally broken

2003-08-31 Thread Craig Sanders
On Sat, Aug 30, 2003 at 11:49:40PM +, Brian May wrote:
 On Sat, Aug 30, 2003 at 04:01:19PM +1000, Russell Coker wrote:
   That is the idea behind autorespoonders after all, to tell the sender
   that his mail didn't get through because it didn't meet some required
   criteria.
  
  A SMTP 550 code can convey all the information that is needed for bounces.
 
 There are two problems with this.
 
 1. The modular design of SMTP agents like postfix do not allow 
 scanning of messages before the message has been accepted by the
 MTA at the SMTP session. I think you would have to add hooks
 into smtpd, but that is going to complicate the code.

not true.

postfix header_checks and body_checks check the message *before* it is accepted
by the MTA.  if it fails the test, a final 5xx reject code is issued rather
than a 2xx accepted code.


recent experimental versions of postfix also allow the same thing to be
done with content-filters, although use of this feature is not recommended
by Wietse due to the time it takes for a filter like spamassassin to run - there
is a risk of smtp timeouts, especially on busy servers.


 2. All checks have to be automatic, and there is no chance of manual
 review to ensure that the messages where geniune before bouncing it.
 
 The list of known solutions follows:
 
 (nil)

actually, the known solution is:

 - reject if you possibly can, tag and deliver otherwise.

craig




Re: Bug#207300: tmda: Challenge-response is fundamentally broken

2003-08-29 Thread Craig Sanders
On Thu, Aug 28, 2003 at 08:21:22AM -0700, Adam McKenna wrote:
 On Thu, Aug 28, 2003 at 12:35:25PM +0100, Karsten M. Self wrote:
  #2, Misplaced burden, is the reason for the 'grave' severity.
 
 People have a right to ask that unkown people that e-mail them confirm the
 e-mail.  

the point that you keep on missing is that TMDA and similar programs send
confirmation emails to innocent third-parties who did *NOT* send an email.

TMDA and all C-R systems are broken-by-design, just as many stupid end-user
autoresponders and AV-scanners that send notifications back to the forged
sender address are broken-by-design.

such software is too brain-damaged to use.  there is more than enough spam,
viruses and other garbage clogging SMTP servers around the world without making
things worse by using programs which falsely claim to be part of the solution.

junk like this does not solve the problem, it is not part of the solution - it
just amplifies the original problem: every virus or spam with forged headers
results in even more confirmation and/or notification messages being sent
in response.

in short, it is automated spamware that contributes to denial of service
attacks.

craig




Re: logging out a ssh-user

2003-07-27 Thread Craig Sanders
this question really belongs on debian-user, not on debian-devel.

On Sat, Jul 26, 2003 at 07:55:28PM +0200, Dennis Stampfer wrote:
 I have to log out a user who is logged in via ssh.  The information that he
 is not allowed to login comes from the utmp-file like the pid to  kill.  

if he's not allowed to login, then why not set his shell to /bin/false?

 If he's logged in via telnet, I can do the job by killing that pid.  That
 does not work with ssh: For some reason, all what I get out of utmp is the
 pid of the listening sshd which I can't kill if I don't want to disable
 ssh-logins.

that would be because you're killing the wrong sshd PID.

 I solved it by adding 2 to that pid to reach the child-ssh, checking if it is
 sshd and owned by the user who is to be logged out.  If that all is ok, I
 kill that pid.

run ps and grep for the tty that he's logged in on.  e.g. if he's on pts/3:

# ps aux | grep pts/3$
cas   7002  0.0  0.7  6352 1920 ?S17:00   0:00 sshd: [EMAIL 
PROTECTED]/3

then kill it:

# kill -1 7002

or in one line:

# ps aux | grep pts/3$ | awk '{print $2}' | xargs kill -1



alternatively, apt-get install slay and run slay USERNAME.

craig





Re: Debian 10th birthday gear

2003-07-11 Thread Craig Sanders
On Tue, Jul 08, 2003 at 06:10:33PM +0800, Cameron Patrick wrote:
 On Tue, Jul 08, 2003 at 11:11:13AM +0200, Sebastian Rittau wrote:
 |100 million users
 |   1000 installations
 | 
 | I would recommend to exchange these last two lines. More installations
 | than users?
 
 If you read it more carefully it implies that there are 100 000 users per
 installation - which also seems rather unlikely. :)

you're all making a big mistake.  those numbers were obviously binary, not
decimal.

craig




Re: Debconf or not debconf : Conclusion

2003-07-06 Thread Craig Sanders
On Thu, Jul 03, 2003 at 02:36:24PM -0500, Steve Langasek wrote:
 [...]
 This upstream change makes no sense from a usability standpoint; this new
 stunnel package would be pretty useless to me, and I wouldn't want to have it
 automatically installed on my systems if I were using the previous, working
 version.  By the time a debconf note is sent, it's too late.

the new version of stunnel is much better than the old one.

i got bitten by the upgrade to 4.0-4 (when the init.d script didn't start
stunnel unless ENABLED=1 in /etc/default/stunnel).

big deal.  i noticed it quickly enough and it took me less than a minute to
scan the docs and discover that i should edit /etc/default/stunnel.  the worst
that happened was that my uucp-over-tcp clients weren't able to connect for a
while.


IMO, anyone who does an upgrade without bothering to check that important
services are still running correctly afterwards is just plain sloppy and
deserves whatever their negligence causes.  

the same applies to anyone who doesn't test upgrades of critical services on
another, unimportant machine first...and for really important packages, it's a
good idea to make sure you have a backup copy of the old version of the package
before upgrading (dpkg-repack is useful here if it has been cleaned out of your
local /var/cache/apt/archives)if the new version proves to be broken,
revert to the old version.

debian packages aren't a substitute for a competent and careful system admin,
they're just a tool to make the sysadmin's job easier.

craig




Re: Debconf or not debconf : Conclusion

2003-07-06 Thread Craig Sanders
On Thu, Jul 03, 2003 at 04:49:19PM -0400, Joey Hess wrote:
 If I ever add filtering to the notes debconf allows to be displayed,
 notes that refer the user to README.Debian will be at the top of the
 list to never be displayed.
 
 Of course, I am much more likely to bow to the pressure of notes like
 the one you're apparently adding, and completly disable all notes at
 some point, rather than adding filtering. I don't like arms races.

how about a configuration option so that debconf notes get sent to
an email address rather than to the screen?

craig




Re: Bug#198957: ITP: email -- Send email from command line, either via MTA or SMTP, with optional encryption

2003-06-29 Thread Craig Sanders
On Sat, Jun 28, 2003 at 03:33:16PM -0500, Steve Langasek wrote:
 On Sat, Jun 28, 2003 at 04:08:05PM +0100, Millis Miller wrote:
  E) Email does binary attachments and uses MIME (mime types, base64
  encoding) to attach and send them with the message.  You can't do this
  by doing what is described above.  You can UUEncode it, but A LOT of
  mail clients don't support UUEncoding anymore.  Plus, you can attach
  multiple binary files with email, not just one UUEncoded file.  For
  instance:
  uuencode file.bin | gpg --clearsign | mail 
 
 OTOH, the above features seem useful.

mime-construct does multiple mime attachments.  it does an excellent job, a
very useful and versatile tool.

it doesn't do uuencode, but a) uuencode is deprecated and should be avoided,
and b) that's easy enough to do anyway:

   (for i in file1.bin file2.bin file3.bin ; uuencode $i ; echo ; done) | \
   gpg --clearsign | mail ...



FWIW, i don't think that mere duplication of existing functionality is a reason
for a package not to be included in debian(*), but email is a really bad name
for this program and this package.  it's far too generic.


(*) the only criteria for inclusion in debian are:

1. is it free?
2. is someone willing to package and maintain it?

craig




Re: Packages: an average 66321 bytes per line of description

2003-06-24 Thread Craig Sanders
On Mon, Jun 23, 2003 at 09:10:09PM -0500, Steve Langasek wrote:
 On Tue, Jun 24, 2003 at 07:56:42AM +0800, Dan Jacobson wrote:
  Fellas, looking in the Packages files, some big packages have little
  descriptions, some little packages have big descriptions, 
 
 and this package description went wee wee wee, all the way home.
 
 Why does this belong on debian-devel instead of debian-curiosa?

because some packages have really crappy  useless descriptions.

the worst culprits are usually sets of binary packages from the one source file
which have package descriptions like libfoo-dev = dev files for libfoo,
libfoo-doc = documention for libfoo, and libfoo = runtime files for foo
library, without bothering to describe what foo actually is.

well, duh! like nobody would ever guess that a package called libfoo-doc was
the documentation for libfoo.  tell the reader something we DON'T know.

a package description is supposed to tell someone who has never heard of foo
before a little bit about it, not just multiple variations of foo's name.

craig




Re: Packages: an average 66321 bytes per line of description

2003-06-24 Thread Craig Sanders
On Tue, Jun 24, 2003 at 04:15:29PM -0500, Steve Langasek wrote:
 On Tue, Jun 24, 2003 at 10:41:59PM +0200, Josip Rodin wrote:
  On Tue, Jun 24, 2003 at 07:17:58PM +0200, Torsten Landschoff wrote:
the worst culprits are usually sets of binary packages from the one 
source file
which have package descriptions like libfoo-dev = dev files for 
libfoo,
libfoo-doc = documention for libfoo, and libfoo = runtime files for 
foo
library, without bothering to describe what foo actually is.
 
well, duh! like nobody would ever guess that a package called 
libfoo-doc was
the documentation for libfoo.  tell the reader something we DON'T know.
 
   But he knows what libfoo is - or at least he is just a
   $ apt-cache show libfoo
   away from that information. Do we need to duplicate the description of a
   library package in each and every supporting package?

not much use when you're in dselect, wondering what foo is and whether it's a
good or useful thing to install.

also not much use when the description for libfoo just says runtime files for
foo, and none of the other obviously associated packages bother to describe it
either.

the person who packages it knows what it is, but he/she has to assume that the
reader doesn't and should therefore provide a brief but useful description.
not everyone catches every single announcement on slashdot or freshmeat or
sourceforge, not everyone is fully aware of every project in every niche.

  Not all of it, but you can't object to duplicating a single sentence saying
  what it is.
 
 When the sentence in question is the one that goes in the short description,
 and already fills the available space without prepending runtime files for
 foo ?  Is the concern here with the short descs (I don't expect much from
 short descs of affiliate packages), or with the long descs?

the concern is with package descriptions that assume that the reader knows
what foo is.

just having a brief description in one of 3 or 4 or more packages (and some
i've seen don't even bother describing it in one) isn't good enough.  each
individual package needs that brief description.
 
craig




Re: Packages: an average 66321 bytes per line of description

2003-06-24 Thread Craig Sanders
On Wed, Jun 25, 2003 at 07:07:46AM +0800, Dan Jacobson wrote:
 Anyway, one liner snob descriptions just have to go.
 
 $ apt-cache show emacs21
 Description: The GNU Emacs editor
  GNU Emacs is the extensible self-documenting text editor.
 
 Oops, I see, it is self-documenting.

that's actually a perfectly adequate description.  it tells someone
who has never heard of emacs before that it is an editor.  good enough.

a description doesn't have to (and shouldn't!) summarise all of a package's
features, all it needs to do is give someone a rough idea of what kind of
beastie it is.

for a package like emacs, it's basically impossible to summarise all of its
features anyway.

craig




optional filtering and/or tagging is the perfect compromise

2003-06-16 Thread Craig Sanders
On Sun, Jun 15, 2003 at 09:22:08AM -0500, Manoj Srivastava wrote:
 As I have said before, as long as the default is to not cause data loss for
 everyone (since dropping emails may cause data loss), but allow people to opt
 in to have their mail filtered, I would have no objection.  Opt in filtering
 is fine, and what other people do with their email is certainly no business
 of mine. 

this is a more than reasonable compromise - so please let's do it.

craig




Re: Problems with XFS patch and SMP

2002-12-08 Thread Craig Sanders
On Sun, Dec 08, 2002 at 04:26:03PM -0500, Bob Hilliard wrote:
  Bug#171943 reports that dictd 1.8.0 fails to start with the
 following error message:
 
 [EMAIL PROTECTED]:~$ /usr/sbin/dictd -d nofork
 :I: 2535 starting dictd 1.8.0/rf on Linux 2.4.19-xfs Tue Dec  3 23:43:09 2002
 dictd (dict_index_open): Cannot mmap index file /dev/null(dict_index_open) 
 Cannot mmap index file /dev/nulldict_index_open: No such device
 (dict_index_open) dict_index_open: No such device

that looks like it may be a configuration errorwhy else would it be
trying to mmap /dev/null?

  I have not experienced any problems with this version in woody,
 sarge or sid, using a 2.4.18 kernel, and I have not received any other
 similar bug reports.
 
  The reporter is running a 2.4.19 kernel with the XFS patch and
 SMP support.  Are there any known issues with the XFS patch and SMP
 support that could contribute to this problem?

not that i've noticed.  i've been running 2.4.19  XFS on my SMP
workstation for over a month without any problems at all.

Linux siva.taz.net.au 2.4.19-xfs #1 SMP Sat Nov 2 14:31:23 EST 2002 i686 
unknown unknown GNU/Linux

 Is anyone running dictd with a 2.4.19 kernel with the XFS patch and
 SMP support?

i'm running the dict client on this machine, but not the dict server.
i'm running the server on another machine (currently running ancient
kernel 2.4.9 with XFS patches).

i just installed dictd 1.8.0-1 and one small dictionary (dict-elements)
to test it.  it seems to run and answer queries without problems.

running it with dictd -d nofork shows:

[EMAIL PROTECTED] [11:04:49] ~# /usr/sbin/dictd -d nofork
:I: 1493 starting dictd 1.8.0/rf on Linux 2.4.19-xfs Mon Dec  9 11:05:02 2002
:I: elements  130 20751507646260

a query for potassium results in the following output:

:C: dict 1.8.0/rf on Linux 2.4.19-xfs
:D: * potassium 1
:I: quit: d/m/c = 1/0/7; 0.000r 0.000u 0.000s

if you have any other tests you'd like me to run, i'll leave dictd
installed here for a day or two...then i'll remove it.

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: bill gates Linux

2002-12-06 Thread Craig Sanders
On Fri, Dec 06, 2002 at 03:07:17AM -0800, [EMAIL PROTECTED] wrote:
 [...]
 I am trying to avoid the problem which I have of needing a degree in
 Rocket Science to even see anything on my computer which originates
 from the blessed Linus kernal. Who in this world can actually read
 hexadecimal code anyway.

either 1) you're a troll or 2) you resent having to learn or understand
anything about your computer or 3) both.  

in any case, my advice to you is thæ same: linux is probably not for
you, you would be happier staying with windows.

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: Are we losing users to Gentoo?

2002-11-21 Thread Craig Sanders
On Thu, Nov 21, 2002 at 12:15:12PM -0800, Thomas Bushnell, BSG wrote:
 Craig Sanders [EMAIL PROTECTED] writes:
 
  i remember a year or so ago when i complained about this worthless
  practice i said that it would end up consuming hundreds of megabytes
  - i was told that was ridiculous, it would never happen.
 
 Megabytes!  Horrors.  You counted up to 96 MB in your computation,

what computation?  i provided an example directory listing taken
directly out of my debian mirror.

the approx 310MB came directly from du:

falls:/home/ftp/pub/mirrors/debian/pool/main/k# du -sck kernel-image-*i386
14360   kernel-image-2.2.20-i386
3572kernel-image-2.2.20-reiserfs-i386
7544kernel-image-2.2.20-udma100-ext3-i386
14124   kernel-image-2.2.21-i386
14128   kernel-image-2.2.22-i386
85560   kernel-image-2.4.16-i386
76528   kernel-image-2.4.18-i386
96712   kernel-image-2.4.19-i386
312528  total

*i386 missed one, should have been *i386*.  add another ~20MB for:

19268   kernel-image-2.4.18-i386bf


these figures don't include the alsa-modules or linux-wlan-ng kernel
module packages that have to be compiled for each specific kernel (add
another approx 17MB for those at the moment).


 which I will assume to be correct.

how generous of you.  you could have quibbled about every line of the
directory listing i provided, but you restrained yourself - for that
small mercy, i will be forever in your debt.

 Current cost of hard disk is something between $1.00 and $1.50 per
 gigabyte.

it's not just the cost of disk space, it's the cost of bandwidth too -
and recurring bandwidth expenses cost a LOT more than disks (once-off
capital expenditure)


 Branden, could we afford to buy a couple 110 GB disks to hold this
 increase?

can debian afford to buy the same for every mirror too?  or pay the
bandwidth costs of about 100MB per debian release of each kernel
version?  at an average of 4 or 5 debian releases per kernel-image
package, that's about 400 or 500MB per kernel version.  

bandwidth isn't free, nor is it universally cheap.  some countries are
still paying up to $0.20 per MB for downloads, or even more.

work out the cost for your location.  even in the US where bandwidth is
relatively cheap, it still adds up to real money.

every mirror has this expense, just to provide allegedly optimised
kernels for people who are too lazy to compile their own, who probably
wouldn't even notice the optimisation anyway.


craig 

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: Are we losing users to Gentoo?

2002-11-21 Thread Craig Sanders
On Thu, Nov 21, 2002 at 07:27:06PM -0600, Steve Langasek wrote:
 On Fri, Nov 22, 2002 at 12:01:12PM +1100, Craig Sanders wrote:
 
  Current cost of hard disk is something between $1.00 and $1.50 per
  gigabyte.
 
  it's not just the cost of disk space, it's the cost of bandwidth too
  - and recurring bandwidth expenses cost a LOT more than disks
  (once-off capital expenditure)
 
 Are you referring to the increase in bandwidth requirements for the
 mirroring itself?  

yep.

i wouldn't mind so much if all the extra i386 kernels were in a separate
subdirectory under pool/main/k/ - then there would be no need to update
regexp exclusion patterns every time there's a new i386 compatible
architecture or a new compile-time option.

it would still be wasteful, but a lot easier to manage.

 I wouldn't expect an increase in the number of available kernels to
 lead to an increase in the number of kernel packages users need to
 have installed.

right, no significant increase.  those who upgrade every day know that
it costs them, and it only affects them if they use the debian-supplied
kernels rather than compile their own.  at worst, it's probably less
than 10MB per week.

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: Packages.bz2, Sources.bz2, Contents-*.bz2, oh my

2002-09-03 Thread Craig Sanders
/Packages.bz2
 dc75329fbbb6556e26e52ad798ba73760484154f   87 
non-free/binary-sparc/Release
 b43dc9ac181b4dbdac2ee33b8f888aacadf9839c   107883 
non-free/source/Sources
 3eacdacb58f276b1b4c08e42e28f6168fa72abea31343 
non-free/source/Sources.gz
 691a356bbb9fb6909a584f6618ba23f915b0b15e26431 
non-free/source/Sources.bz2
 e77f4e372bfd9d13ae0de223849dd927ad381ff0   88 
non-free/source/Release
 c41143e0699764810c3a3433b5ff133289a3860114235 
main/debian-installer/binary-alpha/Packages
 1c08ba8db13f88635116c518b6014f14be55e202 4462 
main/debian-installer/binary-alpha/Packages.gz
 46fb71630491e58d5d4163cab13c980db44fa30c14257 
main/debian-installer/binary-arm/Packages
 81c5ba8e04d3c79eaa879f75dd1097c08df460a3 4477 
main/debian-installer/binary-arm/Packages.gz
 9810fae5665c2123eef1cf8712dd224ccaed00d914160 
main/debian-installer/binary-hppa/Packages
 aa0e152302c53b3abfa2773df1f8083d1ac1ee60 4482 
main/debian-installer/binary-hppa/Packages.gz
 82c9d2c18d312290c56f3ed16ad277d3630e0c87 9154 
main/debian-installer/binary-hurd-i386/Packages
 a7ffca40f79120c23359e00c096a16643920b370 3001 
main/debian-installer/binary-hurd-i386/Packages.gz
 9bf55fcb4accfaa23a8cc9c42241571b39a0223734318 
main/debian-installer/binary-i386/Packages
 5612c4ecb49ec3d2b00be0868c406f1bd4b68a40 7084 
main/debian-installer/binary-i386/Packages.gz
 a9d2fa8c511504e934835cac50b1476b0c257b5814341 
main/debian-installer/binary-ia64/Packages
 e763a99f0fd6914fe47c0fe4979300642ce6d625 4482 
main/debian-installer/binary-ia64/Packages.gz
 f130ec50a1ffe420af228f49fe1ff587d6275d3d14157 
main/debian-installer/binary-mips/Packages
 f5bed8be4f5c2adc579b2f30bcb58d4d616a3843 4473 
main/debian-installer/binary-mips/Packages.gz
 c3ef04b00ec2f9f250aa81b30c94202f8ede120914237 
main/debian-installer/binary-mipsel/Packages
 5e76e18a9cd8ff9b46679a9f27ebe1eee5cfb648 4480 
main/debian-installer/binary-mipsel/Packages.gz
 c50f2e125f56656fd8ef570597778db4922b099314299 
main/debian-installer/binary-m68k/Packages
 52302dcc18d75f969aac4f469be57af376b5768d 4488 
main/debian-installer/binary-m68k/Packages.gz
 b94db7e7f11e6cfd5b5bef8bf5a07a799b0c32f519870 
main/debian-installer/binary-powerpc/Packages
 47e5e62a496fec22615f91cdff4d2ac77fd21226 5321 
main/debian-installer/binary-powerpc/Packages.gz
 0dc78e4041945a843b7ca92b338d5c6d63003d1115386 
main/debian-installer/binary-s390/Packages
 107ea89e39afb295bf99477bd9ebe7483c808dcb 4817 
main/debian-installer/binary-s390/Packages.gz
 8386c10cbcb3bebadc101a577e8516c3c3e46b50 1518 
main/debian-installer/binary-sh/Packages
 2cb939e446daf4b319b1c172ecd283ece2aee0f6  654 
main/debian-installer/binary-sh/Packages.gz
 e6d7f7afad5eba7c04f6be8b4f64971ba5cb762314195 
main/debian-installer/binary-sparc/Packages
 9ca48708f119e3776fae836e2a8ab026d59244a5 4482 
main/debian-installer/binary-sparc/Packages.gz



craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: XFree 4.2.0 - again

2002-04-16 Thread Craig Sanders
On Tue, Apr 16, 2002 at 05:14:51AM +0300, Lasse Karkkainen wrote:
 You are probably sick and tired of this topic, but ...
 IT'S A QUARTER YEAR ANNIVERSARY OF 4.2.0 RELEASE!
 
 Yes, it really has been three (3) months (!) since it was released.

so?  4.1 works just fine.

 Time to throw some gasoline on the flames ... Branden apparently is
 incapable of releasing it. So, I suggest that anyone, with enough
 knowledge and TIME, reading this, would volunteer as XFree package
 maintainer. Branden's comments suggest that he just doesn't have
 enough time for that.

this may shock the hell out of Branden but i think he does an
*excellent* job with the XFree packages.

i may have some disagreements with him on various issues, but i have no
problem at all with the quality or frequency of his work.  debian needs
more developers of his caliber. he took on X (an incredibly difficult
set of packages) when everybody else had too much sense to even think
about doing it and has done a fantastic job with it.

there's a lot more to packaging a program than just compiling it and
hoping that it mostly works on your own system.  if you want that kind
of quality-control then try redhat's contrib packages.

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: GNU FDL (was Re: Bug#141561: gnu-standards: Non-free software in main)

2002-04-08 Thread Craig Sanders
On Sun, Apr 07, 2002 at 10:08:53PM -0500, David Starner wrote:
 On Sun, Apr 07, 2002 at 10:26:48PM -0400, Colin Walters wrote:
   So the FDL is a free license because it's inconvenient for it to
   be not?
  
  No, they're saying that a vast majority of programs which are widely
  considered free by our community are using this license.  Thus, the
  onus is on you to put forth a real argument for why it's not free.
 
 Um, it fails section 3 (Modifications permitted) of the DFSG? A
 strictly literal reading of the DFSG clearly prohibits Invariant
 Sections. Any body claiming that the FDL (with Invariant Sections) is
 free is basically proposing a change in the DFSG, or at least the
 readings or scope thereof. I'd say the onus is on the people who want
 to change the status quo.

you're not allowed to change the license or the author's name of a
GPL-licensed program so, by your strictly literal reading of the DFSG
that makes the GPL non-free.

The GPL, BSD license and other licenses we consider to be DFSG-free all
allow invariant sections - specifically, attribution, copyright,
license, and similar administrivia.

even where this isn't specifically stated in the license, tradition 
custom within the free software community take it as a given that these
things are not to be changedbut acknowledging that requires the
application of common sense, which just proves that you're not playing
the debian game.

personally, i think that many debian people just like to argue
pedantically for the sake of arguing pedantically.  doesn't matter what
the issue is, the main thing is that a good (i.e. long-winded and
tedious) argument is had until everyone is bored into apathy.

this practice is, of course, a wonderful morale booster.  hip hip hooray.

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: serious bug. Evolution and Microsoft mentality.

2002-01-09 Thread Craig Sanders
On Wed, Jan 09, 2002 at 01:47:02AM -0800, Jonathan Walther wrote:
 I object to attempts to lock me in to a single MUA.  

so do i.  it's evil.

 While I'm evaluating I expect to be able to continue using Mutt until
 I am confident enough in Evolution to cut the umbilical cord.

i learnt long ago not to evaluate new MUAs on my main mailbox - or even
with my usual login account.  strange new MUAs (especially GUI ones)
have a nasty habit of doing weird shit to mailboxes.   they move it
around or helpfully convert it to their own non-standard format or
some other annoying thing.

to evaluate an MUA safely, create another account on your system (you
can have mail delivered to it by setting up .forward to CC your real
account's mail to it) and login as (or su - to) that userid before
running the MUA.

better yet, just stick with mutt.  It Workstm  :-)

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: How to put files at a location determined at install-time.

2002-01-01 Thread Craig Sanders
On Mon, Dec 31, 2001 at 07:09:41PM +0100, Marc L. de Bruin wrote:
 So, the root-user might want the files to be physically installed on
 /raid1, e.g. /raid1/mydata, so that a user blah (/raid1/home/blah)
 can make a hardlink from /raid1/home/blah/afile to
 /raid1/mydata/afile.

if the local sysadmin wants this, then they can move-and-symlink the
directories to wherever they want.

e.g. say your package uses /var/foo, but the sysadmin wants that data to
be in /raid1/home/foo:

mv /var/foo /raid1/home/   # alternatively use cp -af or tar 
   # followed by rm -rf
ln -s /raid1/home/foo /var/


this doesn't require any weird or special-case handling in the package.
it's a fairly normal systems administration task.  for example, it's not
at all uncommon to move-and-symlink /usr/doc and /usr/share/doc to
another partition when the /usr partition is too small.

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: What config file for a .pm perl module ?

2001-12-28 Thread Craig Sanders
On Fri, Dec 28, 2001 at 01:11:15PM +0100, Eric Van Buggenhaut wrote:
   print Dumper($virtula1);
 
 I spent some time try to understand why it was failing ;)

oops. yeah.  i should have cut-and-pasted the script i got working in
/tmp instead of what i originally typed in the message.  there were a
few obvious errors in the message.  but the point was to be provide
illustration of how to go about it, not an exact solution for your
problem.  i.e. method, not detail.


---cut here---
#! /usr/bin/perl -w

use Data::Dumper ;
use strict ;

my @fields = qw(hostname username password port database attributes 
connect driver dbhost) ;

my $virtual1 = {} ;

while () {
chomp ;
s/#.*// ;
s/^\s*|\s*$//g ;   # strip leading  trailing spaces
next if (/^$/) ;
my @line = split /\|/ ;
foreach(1..8) {  # loop from $fields[1]..$fields[8]
$virtual1-{$line[0]}-{$fields[$_]} = $line[$_] ;
} ;
} ;

print Dumper($virtual1) ;
---cut here---

from the (modified) input you provided, this produces output like this:


---cut here---
$VAR1 = {
  'personales' = {
'driver' = 'mysql',
'username' = 'root',
'attributes' = '{}',
'database' = 'acs',
'port' = '',
'password' = 'op.re,13',
'dbhost' = 'localhost',
'connect' = 
'DBI:mysql:database=PaginasPersonales:host=localhost'
  },
  'acs' = {
 'driver' = 'mysql',
 'username' = 'root',
 'attributes' = '{}',
 'database' = 'acs',
 'port' = '',
 'password' = 'op.re,13',
 'dbhost' = 'localhost',
 'connect' = 'DBI:mysql:database=acs:host=localhost'
   }
};
---cut here---

which is pretty much the structure you wanted.



other comments:

i still think you should use a field separator which isn't in the field
contents - much simpler, and far less prone to error.

there's also no need to have quotes (`) around the connect string -
you'll only have to strip them off before using it.

also, why have the connect string at all when it can be built up from
the details provided in the other fields?  it seems to me that the
fields you need are:

 username
 dbi_driver
 attributes
 db_name
 db_host
 db_port
 db_user
 db_password

the connect string can be built up like so:

$connect = DBI:$driver:database=$db_name:host=$db_host ;

(using db_port, db_user, and db_password as well if required)

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: What config file for a .pm perl module ?

2001-12-27 Thread Craig Sanders
On Thu, Dec 27, 2001 at 07:03:38PM +0100, Eric Van Buggenhaut wrote:
 I wanted to be able to use a config file similar to /etc/passwd like:
 
 #This is the list of users needed by DBIx::Password
 #(/usr/lib/perl5/DBIx/Password.pm)
 #
 #Syntax is:
 #host:username:password:port:database:attributes:connect:driver:host
 #
 #You can use simple quotes when field contains colon(s)
 
 acs:root:op.re,13::acs:{}:'DBI:mysql:database=acs:host=localhost':mysql:localhost
 personales:root:op.re,13::acs:{}:'DBI:mysql:database=PaginasPersonales:host=localhost':mysql:localhost
 

since you have : characters within fields, it's far simpler to use
another character (e.g. pipe) as the field separator, like so:

acs|root|op.re,13||acs|{}|DBI:mysql:database=acs:host=localhost|mysql|localhost
personales|root|op.re,13||acs|{}|DBI:mysql:database=PaginasPersonales:host=localhost|mysql|localhost

TAB characters would be another good choice for field separator...or
anything which isn't going to appear within the fields.

 while (IN) {
 next if (/^#/ || /^$/);
 @host = m/:?([^':]*)||:?'([^']*)'/g;
 foreach (@host) {print $_ };
 print \n;
 }

try:

# set up an array containing the field names in order, so that
# we can use a for loop rather than a whole bunch of assignment
# statements.
@fields = qw(hostname username password port database attributes 
 connect driver dbhost);

my %virtual1 = {};

while () {
  chomp ;
  s/#.*//;  # strip comments
  s/^\s*|\s*$//g;   # strip leading  trailing spaces
  next if (/^$/);   # ignore blank lines (incl. comments)
  my @line = split /\|/ ;

  # do whatever you need with @line
  # $line[0] = hostname
  # $line[1] = username
  # $line[2] = password
  # ...
  # $line[8] = dbhost
  foreach(1..8) {  # loop from $fields[1]..$fields[8]
$virtual1-{$line[0]}-{$fields[$_]} = $line[$_] ;
  } ;

};
close(IN);

you can verify that this does what you want by using the Data::Dumper
module. e.g. by adding something like the following lines to the script:

use Data::Dumper ;
print $Dumper($virtual1);




alternatively, use the IniConf module (in package libiniconf-perl).  it
uses ugly multi-line windows style .ini configurations, but the IniConf
module parses it automatically into a hash for you.  it's almost ideal
for what you want to do, if you can handle the ugliness of .ini style
configurations.


craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: Flamewars Why pedantic spelling is good.

2001-12-22 Thread Craig Sanders
On Sat, Dec 22, 2001 at 02:55:13AM -0600, Adam Heath wrote:
 On Sat, 22 Dec 2001, Craig Sanders wrote:
  yawn.  you're wrong.  again.
 
 I have seen no quotes from you, of other, *outside* sources, that show
 'zonefile' in widespread use.  I *have* seen posts saying that 'zone
 file' is, however.

i don't feel under any obligation to act as a dictionary for lazy or
stupid people, however earlier in this thread i already gave two
examples of other DNS-related packages within debian that use the word
'zonefile'.  in the description, no less.

i guess you must have missed that because i failed to highlight the
significance with an enormous flashing neon sign for the congenitally
stupid.  well here it is, just for you:

BLINK
Package: autodns-dhcp
 autodns-dhcp uses bind 8's dynamic update features to update a zonefile

Package: zone-file-check
Filename: pool/main/z/zone-file-check/zone-file-check_1.01-3_all.deb
Description: Syntax-checker for BIND zonefiles
 This script is used for syntax-checking your zone-files after a
 of zonefiles, but also if you just want to check a single file.
/BLINK


any search on google or other search engines will reveal many thousands
of uses of the word 'zonefile'.  like i said, it's in common usage in
the field and has been for years.  but that couldn't possibly be
evidence, could it?  after all, that would mean i was right and that
would be embarrassing to admit to, wouldn't it?



 [blah blah blah]
 All procedures were followed.  To the letter.  So, that obviously means that
 the bugs are incorrect.  Not.

there's more to a bug report than following procedure to the letter.
relevance and correctness are more important attributes.

the bug reports i complained about were incorrect because neither
zonefile nor usenet are in any way spelling errors.  and frankly, i
don't give a damn whether you or anyone else agrees or disagrees.  it's
not in the least bit important.

now please shut up and stop wasting everyone's time with this tedious
thread.

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: Flamewars Why pedantic spelling is good.

2001-12-22 Thread Craig Sanders
 [ drivel deleted ]

in a word, No.

btw, learn to spell authoritative.  

OTOH, it's kind of amusing to read someone who can't spell attempt to
harangue me over spelling.

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: thomas's trivia crusade

2001-12-22 Thread Craig Sanders
On Sat, Dec 22, 2001 at 11:17:34AM +0100, [EMAIL PROTECTED] wrote:
 Craig [EMAIL PROTECTED]@Sat, 22 Dec 2001 03:50:08 +0100:
   they are actually *REAL* bugs that affect the operation of the
   package, not trivial items like spelling mistakes that affect
   nothing.

 And because developer x does not fix his bugs, you think you shouldn't
 fix your bugs either? Think about your developer karma[0] man! ;-)

no, that's not what i said.

i said that there are real bugs that are actually worth spending time
on...as opposed to non-bugs like whinges about the words zonefile and
usenet.

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: Completely OT, just to quickly prove a point.

2001-09-27 Thread Craig Sanders
On Wed, Sep 26, 2001 at 10:08:04PM -0600, Russel Ingram wrote:
 On Thu, 27 Sep 2001, Craig Sanders wrote:
 
   I've used the make-kpkg command to create kernel packages, but they
   always come out with a custom-1.00 label on them and I haven't figured
   out how to get around that.
 
  RTFM.  see the --revision option.
 
 Does anyone else on this list see this as a fairly unhelpful, and
 insulting response to a reasonable question?  Please reply to me directly
 and to [EMAIL PROTECTED]  DO NOT REPLY TO THE LIST!

do not reply to me.

i'm not interested in any comments related to any issues raised by this
over-sensitive loser.

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: XFS Kernel image packaging

2001-09-26 Thread Craig Sanders
On Tue, Sep 25, 2001 at 01:12:52PM -0600, Russel Ingram wrote:
 Pardon me if I sound like a newbie here.  I am fairly new to the
 Debian way, but I am a Linux veteran.  I have noticed that there are
 patches available in the debian package tree for the XFS filesystem
 but there are no available kernel-image packages with XFS already
 built in.  Is there a specific reason for this or is it just because
 no one has stepped forward to offer such a package?

because it's not necessary.

we already have way too many kernel-images with trivial feature
variations - that have no business being in debian supplied kernels, but
should be compiled by those who need them when they need them. debian
should provide only the bare minimum number of kernel images that are
required to install debian...anything else should be a custom kernel
compile by the end user.

if and when XFS support gets into the mainstream kernel, then support
for it should be compiled in.  until then, it's only one of many optional
patches available.

in the meantime, if you want to compile a kernel with xfs support:

1. apt-get install kernel-source-2.4.9 kernel-package 

   (you'll also need gcc and bin86 and so on, of course...and libdb3-dev
   if you want to compile aic7xxx support)

2. download the appropriate patch version from
   ftp://oss.sgi.com/projects/xfs/download/

3. patch the kernel

4. there will be one reject, in .../linux/init/main.c - it's easy enough to
   patch this by hand with vi.

5. run make config and make-kpkg  - whatever your usual kernel compile
   procedure is.


i've done this dozens of times now. it works.


 I've used the make-kpkg command to create kernel packages, but they
 always come out with a custom-1.00 label on them and I haven't figured
 out how to get around that.

RTFM.  see the --revision option.

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: isync vs mailsync

2001-09-07 Thread Craig Sanders
On Wed, Sep 05, 2001 at 09:43:09AM +1000, Brian May wrote:
 Despite these problems, Gnus is the only program I have seen that will
 highlight replies to my mail, something I find very valuable in large
 mailing lists like this one.

btw, mutt will do that. it highlights messages sent by or to you. dunno
if it looks at References: or In-Reply-To: lines for that, but it
certainly uses From:, To:, and CC: headers.

makes it quite easy to spot your messages and replies to them in large
threads.

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: reopening ECN bugreport/netbase

2001-09-06 Thread Craig Sanders
On Thu, Sep 06, 2001 at 01:37:02AM -0500, Scott Dier wrote:
 * Craig Sanders [EMAIL PROTECTED] [010905 20:17]:
  the correct solution is to NOT compile ECN support into the distribution
  kernels. that's a choice that should be left up to the individual system
 
 So, lets fix one problem by creating another problem!  ECN isn't there
 anymore!

no, that isn't a problem. the kernel works just fine without ECN being
enabled.

if you want it, you do what every other user of the linux kernel has to do
and compile a new kernel with support for it.

quite frankly, if someone doesn't know how to compile a kernel then
they're not qualified to decide whether they want to use it or not. in
that case, the correct course of action for a package maintainer is to
cause the least harm.

the fact is that there is no possibility of harm if ECN is disabled
in the kernel, while there IS possibility of harm if it is enabled.
therefore it should be disabled by default. 

anyone who is running servers busy enough that they actually need ECN
should have enough of a clue to know how to compile a kernel and enable
it.

 What if some users were actually using that?

see above.

since it's only been enabled in recent kernel-image packages, very few
(if any) people will be be surprised by it being removed again.


 ECN IS NOT A USELESS RFC. ECN IS NOT A USELESS RFC.

of course it's not.  it will eventually be universal.


 some people actually like to use this stuff.

yes, i know.  i use it.

however, it's an experimental feature which isn't needed on the debian 
distributed kernel images.

it might be appropriate to have it on by default in a year or so. but
not now.

craig

ps: why is it that so many people get so upset if their pet
feature-of-the-month isn't the default in debian? debian's defaults
should conform to the principles of Least Suprise and Least Harm, not
the principle of Maximal GeeWhizzery.

it's only a default, get over it.

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: reopening ECN bugreport/netbase

2001-09-05 Thread Craig Sanders
On Wed, Sep 05, 2001 at 04:32:42PM +0200, Tomas Pospisek wrote:

   if ! grep /proc/sys/net/ipv4/tcp_ecn /etc/sysctl.conf /dev/null;
   then echo sys/net/ipv4/tcp_ecn=0  /etc/sysctl.conf
   fi
 
 to the kernel-image-2.4.x postinst.

no, this is broken and evil. kernel-image packages should NOT override
someone who chooses to have ECN enabled.

the problem is that recent kernel-images have ECN support compiled in.

they shouldn't.

the correct solution is to NOT compile ECN support into the distribution
kernels. that's a choice that should be left up to the individual system
admin - if they want it, they can compile a kernel to support it.


craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: sysctl should disable ECN by default

2001-09-02 Thread Craig Sanders
On Mon, Sep 03, 2001 at 07:44:19AM +1000, Herbert Xu wrote:
 1. CONFIG_INET_ECN must be turned on, otherwise the user will have to
 recompile the kernel to use it.

yes, that is correct.

if the user wants ECN, they should compile the kernel to enable it.

[...]
 So do whatever you want, but please do it in the right place.

which is in the kernel-image .config file.

1. stock kernel-images should only include options which are necessary for
booting  installing debian

2. they should not include non-essential experimental features.

ECN fails on both counts.



ECN is a good thing, and widespread adoption of it should be encouraged
- BUT enabling it should require an informed act by the user since it is
likely to result in network outages at the moment.

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch




Re: support for older distributions

2001-05-09 Thread Craig Sanders
On Wed, May 09, 2001 at 04:49:04PM +1000, Brian May wrote:
 You say stable is old. That is exactly Russell's point. Some people
 want a mostly stable system, but need some up-to-date packages from
 woody.

that's a choice people have to make.

you can have an old 'stable' release, or you can have an up-to-date
'unstable' release. there really is no in-between, no matter how hard
you might try to convince yourself otherwise.

if you upgrade one package, you may have to upgrade another...and
another...and if you're going to do that, you're better off upgrading
to the version(s) in unstable because they're more likely to be tested
and debugged by other people than a package recompiled for an old debian
release.

 I wouldn't suggest going any further back then stable though.
 
 Craig for example, ask yourself: why is libc6-2.2.2-potato1 (or
 Craig whatever the potato version would be) any better or
 Craig safer than just installing libc6-2.2.2 from woody or sid? 
 Craig i can't see how it could be, and all you've achieved is
 Craig having two divergent versions of 2.2.2 to support.
 
 I think you missed Russell's point.  That was: compile unstable
 packages against stable's libc6. So libc6 would not be included in
 this list.

libc6 was only an example.

if not libc6, then libgtk or libfoo or libbar - or any application or
tool.

why is application bar any *more* reliable or trustworthy just because
it is compiled against an old version of libc6 in potato?

it's not. all you're doing is deluding yourself that your system is more
stable than it would be if it was running unstable. the truth is that
it is likely to be *less* stable because that particular combination of
compiler/libraries/application version is less tested than what is in
unstable.

the sole advantage to this is so that you can lie to your boss and say
we're running the stable release and be telling only a half-truth (or
half-lie...doesn't matter, it's still bullshit)


now it's your system, you can do whatever you want with it. that's not
the point i'm making. i just don't like self-deception being touted as
reality.


 Craig debian is a live distribution, easily upgraded in place
 Craig at any time over the internet - why limit yourself to
 Craig looking at debian in a way which is more suited to
 Craig commercial CD-ROM only closed source systems?
 
 Because some people don't want to upgrade libc6 on a stable system
 (ie. they want a mostly stable system), but require new features of
 particular packages in unstable, and are willing to risk the chance
 that these new packages may be broken.

isn't this what 'testing' was supposed to be for? so that people could
run almost-bleeding-edge systems where packages have had the really
serious bugs discovered and fixed by foolhardy people like me who run
unstable?


 Craig IMO, forcing debian into that model is missing a large part
 Craig of the point of debian.
 
 Craig potato's been released. woody's getting closer to
 Craig freeze. lets move on.
 
 woody's release is still months away (dare I say almost a year?).

it might not take so long if people didn't get distracted by obsessively
backporting rather than moving on to the next release.


 Sure, another approach is to compile your own version of the unstable
 package, but Russell takes then one step further to have a central
 repository for unstable package for stable. Instead of the current
 situation of having many different apt repositories, each with
 different selections of packages compiled for stable, you would have
 one big repository that could be used by everyone.

a fine idea (really, i'm not being sarcastic).

but ALL it is doing is making yet another unstable. 

think about it: that's all it is - just another unstable tree, but with
different versions of stuff.

why bother?

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: support for older distributions

2001-05-09 Thread Craig Sanders
On Wed, May 09, 2001 at 06:36:30PM +1000, Brian May wrote:
  Craig == Craig Sanders [EMAIL PROTECTED] writes:
 
 Craig why is application bar any *more* reliable or trustworthy
 Craig just because it is compiled against an old version of libc6
 Craig in potato?
 
 It is not so much the new application I was thinking of, but all the
 old stable applications that already exist on the system.

 So recompiling foo for stable might produce a broken version of foo.
 fine. Downgrade or remove the package again. Problem solved. Nothing
 lost in the process, except time taken to down load, recompile and
 test the package.

 But installing a new version of libc6 on a stable system has the
 potential for breaking the whole system.

ok, i see your point but don't think that libc6 is that much of a
special case - any package has the potential to break the whole system.
admittedly, some (libc6, ldso, bash, etc) more than others...but the
potential is still there.

IMO  IME the biggest risk to a system running unstable is not so much
bugs in libc6 or whatever, it's 1. bugs in package pre,post scripts: a
simple typing error like rm -rf / var/spool/foo can wipe out a system
(not that i've seen this one - i'm just aware of the possibility...so
i upgrade non-vital systems first); and 2. faulty depends/conflicts or
version mismatch (e.g. apache modules needing to be recompiled for major
releases of apache)



it gets even more interesting when you want an upgraded version of some
application which depends on a newer version of some library which, in
turn, depends on a whole bunch of other stuff including a newer libc6.
what do you do then? do you recompile the whole dependancy chain (incl.
libc6) for potato or do you say bugger it, it's less hassle and less
risk to upgrade to unstable?

at what point does recompiling for stable stop being a convenience for
potato users and start being being a dead-end duplication of unstable?

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: support for older distributions

2001-05-08 Thread Craig Sanders
On Mon, May 07, 2001 at 02:45:53PM +0200, Russell Coker wrote:
 Currently there are two usable repositories of Potato packages.
 There's a repository of kernel-related packages to run 2.4.x kernels
 on Potato, and there's a repository of LDAP related packages and other
 things that Wichert is maintaining.

 Both of these are good work, but even combined they don't provide what
 I consider to be adequate support for Potato.

 I would like a version of Potato that is not entirely frozen.  It
 should have updates not only for security reasons but also for
 addition of new programs, and for adding new programs which add
 significant functionality and don't break things (such as Wichert's
 LDAP packages).

why?

aside from the installer floppies (which aren't relevant for upgrades),
the main significant difference between potato and woody (or between
any versions of debian for that matter) is the version numbers of the
packages included.

the distinction between versions of debian is entirely arbitrary, a
matter of consensus reality rather than actual reality.

your suggestion would add a huge load of administrative and maintainence
overhead in order to support a convenient fiction - providing little or
no real benefit. worse than that, it subverts the only real point in
having versioned releases - the ability to know what is included in any
released version.

debian provides mechanisms for easy upgrade between release versions,
and we always have provided that - why complicate matters with branched
sub-releases of old versions? 


you also risk creating greater problems back-porting packages from
testing or unstable - they would be divergent packages which don't get
anywhere near the same amount of testing and usage as packages in the
mainline development cycle.

for example, ask yourself: why is libc6-2.2.2-potato1 (or whatever the
potato version would be) any better or safer than just installing
libc6-2.2.2 from woody or sid? i can't see how it could be, and all
you've achieved is having two divergent versions of 2.2.2 to support.


debian is a live distribution, easily upgraded in place at any time
over the internet - why limit yourself to looking at debian in a way
which is more suited to commercial CD-ROM only closed source systems?

IMO, forcing debian into that model is missing a large part of the point
of debian.

potato's been released. woody's getting closer to freeze. lets move on.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-30 Thread Craig Sanders
On Thu, Apr 26, 2001 at 07:48:02PM +1000, Herbert Xu wrote:


 I won't go below that as an SMP kernel is always required,

no it's not.

anyone running SMP ought to have enough of a clue to compile their own
kernel.

why should everyone else pay the price for their cluelessness?


 and the 686 flavour covers a very large chunk of the
 i386 userbase.

a 386 kernel covers all of the ia32 userbase.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-30 Thread Craig Sanders
On Sat, Apr 28, 2001 at 02:15:50PM +1000, Herbert Xu wrote:

 Please also consider that if the user were to compile his own kernel,
 he would face the problem of having to recompile the modules packages
 if they're needed.

use kernel-package and all the module packages are compiled automatically,
with the modules_image target.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-30 Thread Craig Sanders
On Mon, Apr 30, 2001 at 12:41:22PM +0200, Torsten Landschoff wrote:
 On Mon, Apr 30, 2001 at 05:19:12PM +1000, Craig Sanders wrote:
  anyone running SMP ought to have enough of a clue to compile their
  own kernel.

 This is the point where I disagree. I really hate having to build my
 own kernel just to do some tests with a fresh installation.

so you have spent good money on a high-end SMP machine but you're not
willing to put in 5(*) minutes work (running make config or menuconfig or
xconfig) to build a kernel which is optimised for your hardware.

strange.

IMO, it's even stranger when you consider that it's 5 minutes work only
for the first time that you compile a kernel for that machine (or type
of machine if you have a bunch of similar or identical machines). after
that, it's less work because you can re-use the old .config file and
just run make oldconfig to handle any new compile-time options.



(*) i'm not including the 3-15 minutes (depending on CPU and disk speed
and memory) it takes to actually compile the kernel because that can run
in the background - it's not work, it's just waiting (or getting on with
something else while it's compiling)

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: Many ports open by default

2001-04-30 Thread Craig Sanders
On Sun, Apr 29, 2001 at 10:29:58PM -0600, Dwayne C. Litzenberger wrote:
 I suspect it's already been discussed before, so I'll ask instead of
 flaming.  (See!  I can learn!)

many times before.

 Why does a server automatically get run just because it's installed?

because if you didn't want it to run, you wouldn't have installed it.

if you want to install it but not run it, then edit the startup script.

simple.

 Shouldn't the default be to not run daemons unless they are explicitly
 enabled, [...]

no, users shouldn't install daemon packages if they don't want the
daemon to run - or they should learn how to edit the startup scripts (or
inetd.conf) if they want non-standard behaviour.

craig


--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: Many ports open by default

2001-04-30 Thread Craig Sanders
On Mon, Apr 30, 2001 at 02:25:34AM -0400, Andres Salomon wrote:

 If there's nothing that depends on portmap, then default to not
 installing portmap.

speaking of portmap, debian's portmap is not an insecure thing to run by
default because it is compiled with tcp-wrappers support and rejects all
non-localhost connections that aren't explicitly allowed (by ip address)
in /etc/hosts.allow

 Having daemons shut off by default is not the way to go, however.

yep.


craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: Many ports open by default

2001-04-30 Thread Craig Sanders
On Mon, Apr 30, 2001 at 07:37:21AM -0500, Warren A. Layton wrote:
 Well, not everyone that installs ssh wants to run the server (some may
 just want to use the client to connect to other machines). This is
 just one example; I'm sure that there are many more.

that means either:

1. ssh and sshd should be split into separate packages.  if it bothers you
enough, file a bug report.  i'm happy with the way it is.

or

2. the handful of people who want the ssh client but not the ssh daemon
can learn how to edit /etc/init.d/ssh

craig


--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-26 Thread Craig Sanders
On Wed, Apr 25, 2001 at 09:56:58PM -0500, Rob Browning wrote:
 Just in case anyone else was confused, I'm still in favor of having at
 least *one* precompiled kernel per-architecture, so no one *has* to
 compile a kernel,

i think everyone is in favour of that.

the issue is whether it's appropriate to have a dozen or so kernel-image
packages (and associated kernel-headers packages) per kernel version,
when one(*) will do.

(*) or whatever the minimum number is that will boot on all ia32 boxes.

craig
--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-26 Thread Craig Sanders
On Wed, Apr 25, 2001 at 02:18:30AM +1000, Daniel Stone wrote:
 I could disagree pretty heavily by pointing that this would be shit as
 it would add an hour to the install. Why not just provide a stock i386
 kernel and let people compile it later on? Some people need to patch
 in mm/swap patches, netfilter patches, their own hacks, etc, etc.

please pay attention. 

nobody (at least as far as i can tell) has suggested getting rid of the
stock kernel-image package, so there will be no effect at all on people
who just want to install the system and run it.

the point at issue is whether there should be dozens of kernel-image and
kernel-headers packages when one is enough to do the job.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-25 Thread Craig Sanders
On Wed, Apr 25, 2001 at 10:31:46AM +1000, Herbert Xu wrote:
 On Tue, Apr 24, 2001 at 05:26:27PM -0700, Aaron Lehmann wrote:
  Ok, so why did this come up at all in the discussion of the kernel
  package bloat? It seems to me that providing optimized kernels is a

 Because someone asked why the kernel-headers necessary.  Their
 presence allows both our module maintainers and other maintainers
 to compile modules easily.  It doesn't mean that they will.  But it
 certainly makes it a lot more likely.

no, it makes it a lot less likely.

a person/company producing a binary kernel module is FAR more likely to
create one for debian if they only have to create one module, rather
than a dozen or so. 

even if they can be bothered putting in the effort to figure out exactly
what kernel-headers package(s) and how it all works, they need installed
it's still a lot more work to produce and support a dozen versions(*) of
their module rather than just one.

(*) per kernel version that they choose to support.

 You seem to be confusing the kernel-header discussion with the
 kernel-image discussion.  Please go back and reread the thread.

they're one and the same. kernel-{image,headers} package bloat has
been the topic of this thread from the beginning.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-25 Thread Craig Sanders
On Wed, Apr 25, 2001 at 04:56:19PM +1000, Herbert Xu wrote:
  a person/company producing a binary kernel module is FAR more likely to
  create one for debian if they only have to create one module, rather
  than a dozen or so. 
 
 There two discussions here:
 
 1. The number of kernel flavours.
 2. The need for kernel-headers for each flavour.
 
 I was talking about 2.

i am, and always have been, talking about the bloated number of
kernel-{image,headers} packages.

sometimes that requires demolishing some of the digressions in order to
force things back to the point.

   You seem to be confusing the kernel-header discussion with the
   kernel-image discussion.  Please go back and reread the thread.
 
  they're one and the same. kernel-{image,headers} package bloat has
  been the topic of this thread from the beginning.

 In that case, you're mixing them up as well.

you are mistaken.  i started the thread, i know what i started.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: Referring what kernel-images to build to the technical committee?

2001-04-25 Thread Craig Sanders
On Wed, Apr 25, 2001 at 08:30:31PM -0400, Sam Hartman wrote:
 [...]

i think you've done a good job of summarising the issues.

i hope we can resolve this soon.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-24 Thread Craig Sanders
On Tue, Apr 24, 2001 at 07:30:47PM +1000, Herbert Xu wrote:
 On Tue, Apr 24, 2001 at 08:47:44AM +1000, Craig Sanders wrote:
  
  what is the DIFFERENCE between kernel-headers-2.4.2 and all the other
  2.4.2 kernel headers packages?
 
 Kernel-headers-2.4.2 is built with the default config file, and the
 other ones are built with their respective config files.

so, what's the difference between all the packages? they're the same
header files from the same kernel source tree, aren't they?

  and while you're at it, how about answering the other questions that
  you ignored in my last message?

 Which were?

   it's only one kernel, one source tree...so where do all these
different header files come from? what's the point of them? what do
they provide that just plain kernel-headers-2.4.2 doesn't provide?

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-24 Thread Craig Sanders
On Sun, Apr 22, 2001 at 09:18:33AM -0500, Adam Heath wrote:
 [...good stuff deleted...]
 
 Now, it doesn't take a genius, to see how this will cascade.  
 
 [...more good stuff deleted...]
 
 The best way to handle all this, is to train users how to compile a kernel,
 or, let them pick the optimization they want, and we compile the kernel for
 them.  

well said.  couldn't agree more.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-23 Thread Craig Sanders
On Mon, Apr 23, 2001 at 07:24:13PM +1000, Herbert Xu wrote:
 How are they going to compile a kernel if they haven't even installed
 Linux?  

that's obvious. by installing linux and then compiling a kernel.

 The most important function of initrd is to reduce the number of
 kernel images needed on boot floppies to one.

you're missing the point again.

nobody is disputing that using initrd was a good idea - it's a useful
tool.

what is being disputed is the package bloat of having dozens of
kernel-image packages taking up approx 110MB for EACH kernel version.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-23 Thread Craig Sanders
On Mon, Apr 23, 2001 at 09:37:55PM +1000, Herbert Xu wrote:
 Andreas Metzler [EMAIL PROTECTED] wrote:
 
  mean by module builders [...] especially those outside Debian. The
  people from alsa who do not use Debian (How would they use a
  debian-package?) or debian-users who no debian-developers (= no
  @debian.org email-adress)? Pointers to documentation to enlighten me
  are welcome.
 
 I'm talking about people like VMWare, i.e., people who distribute binary
 only modules.

you're still failing to explain this point adequately.

what, exactly, is the difference between kernel-headers-2.4.2 and:

kernel-headers-2.4.2-386
kernel-headers-2.4.2-586
kernel-headers-2.4.2-586tsc
kernel-headers-2.4.2-686-smp
kernel-headers-2.4.2-686
kernel-headers-2.4.2-k6
kernel-headers-2.4.2-k7
kernel-headers-2.4.2-pentium4
kernel-headers-2.4.2-pentiumiii
kernel-headers-2.4.2-pentiumiii-smp

?

it's only one kernel, one source tree...so where do all these different
header files come from?  what's the point of them?  what do they provide
that just plain kernel-headers-2.4.2 doesn't provide?

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-23 Thread Craig Sanders
On Mon, Apr 23, 2001 at 06:59:55AM +0800, zhaoway wrote:
  this actually *helps* new users.
 
 Why?
 
 I can see your suggestion help mirrors (The trade-off is
 questionable.) But I can't see why it could help users.

because new users are better off when they learn how to control their
system.

ignorance is not bliss.  ignorance is a crippling affliction, especially
when it comes to computers.

anything that promotes ignorance by hiding the messy details of
operating a computer is fundamentally wrong.

 I certainly don't think that make users (even make the task easier) to
 compile a kernel can do help to most of the users 

nobody is making them do anything. it's only if they need the slightly
enhanced performance of a kernel optimised for their exact CPU that they
need to compile a kernel.

yes, it's better for every system to have a custom compiled kernel, but
a plain 386 kernel will suffice for most people. the CPU optimisations
for 486, k6, k7, p3, p4 and so on just aren't worth taking 5 times the
storage space and 5 times the number of packages per kernel...if a user
wants that negligible performance gain then they should compile the
kernel themselves.

the only excuse i can see for having all those kernel-image packages is
to cater to the idiots in the slashdot crowd who say cool, distribution
X rocks because it has kernel x.y.z and completely fail to understand
that any kernel can be run with any distribution as long as the support
tools (modutils, etc) are up to date.

is that worth hundreds of MB in the archive, gigabytes of bandwidth to
sync mirrors, and an extra CD in the release? no, not at all. no way.


 (That is *not* a task they should be bothered at all.)

if they don't want to do it, they don't have to.

if they can't be bothered, they're not even going to notice the difference
between a 386 kernel and a k7 kernel.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-23 Thread Craig Sanders
On Tue, Apr 24, 2001 at 08:39:00AM +1000, Herbert Xu wrote:
 On Tue, Apr 24, 2001 at 08:20:42AM +1000, Craig Sanders wrote:
  what, exactly, is the difference between kernel-headers-2.4.2 and:
  
  kernel-headers-2.4.2-386
  kernel-headers-2.4.2-586
  kernel-headers-2.4.2-586tsc
  kernel-headers-2.4.2-686-smp
  kernel-headers-2.4.2-686
  kernel-headers-2.4.2-k6
  kernel-headers-2.4.2-k7
  kernel-headers-2.4.2-pentium4
  kernel-headers-2.4.2-pentiumiii
  kernel-headers-2.4.2-pentiumiii-smp
  
  ?
 
 These packages contain the modules directory and the autoconf.h file,
 neither of which you can do without if you want to compile binary modules
 with checksums.

you're still not answering the question.

what is the DIFFERENCE between kernel-headers-2.4.2 and all the other
2.4.2 kernel headers packages?

why are they needed?  

and while you're at it, how about answering the other questions that you
ignored in my last message?


craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-23 Thread Craig Sanders
On Tue, Apr 24, 2001 at 08:37:35AM +1000, Herbert Xu wrote:
 On Tue, Apr 24, 2001 at 08:15:03AM +1000, Craig Sanders wrote:
  On Mon, Apr 23, 2001 at 07:24:13PM +1000, Herbert Xu wrote:
   How are they going to compile a kernel if they haven't even installed
   Linux?  
  
  that's obvious. by installing linux and then compiling a kernel.
 
 I hope you're being facetious.

ask a stupid question, get a stupid answer.


   The most important function of initrd is to reduce the number of
   kernel images needed on boot floppies to one.
  
  you're missing the point again.
  
  nobody is disputing that using initrd was a good idea - it's a useful
  tool.
 
 Huh? Did you see what I was responding too? Just because this is in a
 thread about bloat, it doesn't mean that we aren't allowed to talk about
 other things.

in normal circumstances, that would be fine and pass without comment.

however, you have been using initrd as a distraction from the real issue
of kernel bloat.  you're willing to go off on long digressions about how
wonderful initrd is, but ignore the issue of package bloat.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: Why does typing navigator run mozilla?

2001-04-23 Thread Craig Sanders
On Mon, Apr 23, 2001 at 05:32:45PM -0400, Matt Zimmerman wrote:
 Running the 'navigator' binary will communicate with a running version
 of Navigator, if one exists.  This feature has been in Navigator
 years.

yep, it's been there for years. it's mostly useful, but occasionally
annoying when you really do want to run another instance of navigator.

(the only times i want to do that is when paranoia makes me start up a
new navigator binary before connecting to my bank's https site, then
kill it afterwards. now that i'm using Galeon as my regular browser,
that's no problem - i just start up netscape whenever i need to visit an
SSL site)


i just learnt to work around it, because i'd be even more annoyed if it
started up a new binary every time.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-22 Thread Craig Sanders
On Sun, Apr 22, 2001 at 01:38:42PM +1000, Herbert Xu wrote:
  if the user needs a more specific kernel (e.g. with SMP or compiled
  for a P2 or a K6 or whatever) then they can use manoj's excellent
  kernel-package (one of debian's best features, IMO) to build a
  custom kernel.

 This is exactly our disagreement.  My position is that it is well
 within our capabilities to make this unnecessary.  And you disagree
 with that which is fine with me.

i disagree with you primarily because the cost of having so many
kernel-image packages is too high.

that cost is over 100MB per kernel version, that's several hundred MB
with several kernel versions available (1 or 2 x 2.2.x kernels and 1 or
2 x 2.4.x kernels, possibly a 2.5.x kernel as well)

that means extra bandwidth consumed to sync each and every mirror
site...repeated every time a kernel-image is added to or upgraded in
the archive. that could easily run into several gigabytes per month
PER mirror...and dozens of gigabytes extra per month for master and
ftp.debian.org to feed all the mirrors.

there's also an economic cost too, of course. some places in the
world have much cheaper bandwidth than Australia, some have much more
expensive bandwidth, but here in Australia, a GB costs about $AUD200 (~=
$USD100) to download. that's at $0.20/MB, an average price for Australia
- some people pay more than that (as much as $0.35/MB), some pay less
(as little as $0.07/MB)...so the price per GB ranges from $AUD70 to $AUD350.


it also means more space consumed on the CD-ROM - several hundred MB
extra wasted on kernel images in the release will mean at least one
extra CD-ROM. that means a more expensive release, and more difficult
and time-consuming to produce.

it also means more gigabytes of bandwidth used by people mirroring the
ISO images.


the benefit of having all those extra kernel-image packages around is
soemwhere been non-existant and negligible...but the cost is enormous.

it's just plain wrong, and it should not happen.

just as you stated you'd be filing bug-reports to get 2.2.17 kernel
image removed from the archive, i'll be filing package should not
exist bugs against all the excess kernel-image bugs.

the correct thing to do is to encourage and educate our users about
compiling their own kernel. if it's too hard then we should try to
make it easier.

why pander to ignorance when ignorance is a curable affliction? it's
much better to cure it through education than to support and encourage
it.

what you want to do is detrimental in the long run - it serves to
perpetuate the myth that compiling kernels is extremely difficult, and
encourages laziness and ignorance on the part of the user.


 Most are.  In my opinioin, there isn't anything that is particular
 important to most people which haven't been modularised yet.

you seem to think that optimisations for specific ia32 sub-architectures
are important enough to package...

  2. it is, in general, *far* better to run a kernel which is specific to
  your exact hardware and your exact requirements than to use a generic
  kernel with a bunch of options you don't use and don't care about
  compiled in.
 
 IMHO, with the current 2.4.* setup, the difference between compiling your
 own and using the preexisting one is so minimal that most people will be
 able to use the precompiled one rather than building their own.

there's good reason to worry about kernel modules now that there are
known hax0r stealth modules which exist purely to hide the fact that a
system has been compromised.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-22 Thread Craig Sanders
On Sun, Apr 22, 2001 at 12:09:12AM -0500, David Starner wrote:
 On Sat, Apr 21, 2001 at 09:28:02PM -0500, Rahul Jain wrote:
  Unless you care about performace. Which is the main reason to use
  different packages for each CPU type.

 I compile my own kernels, and have for a long time. But it's a pain to
 go through all the poorly-documented options and takes quite a while
 to select those options and actually build a kernel. And then there's
 the times I have to go back and recompile because I left out my mouse
 drivers, or ide-scsi, or vfat. It's entirely rational to want to pick
 up the 10% improvement from hitting the right button in dselect and
 not worry about the 20% from recompiling the kernel.

in that case, a far better solution is a package containing a bunch
of pre-generated kernel .config files, plus a menu script to copy
your choice to the right subdirectory (e.g. /usr/local/src/linux or
wherever)...then run make menuconfig or make xconfig to let you
tweak the .config before compiling.

that would be one package, taking maybe a few hundred kilobytes total.

call it kernel-helper and make it depend on kernel-package.

problem solved.


btw, if you've been compiling your own kernels for a long time then you
probably do somthing similar to what i do - copy in the .config from the
previous version and run make oldconfig before make menuconfig and
make-kpkg. i've been doing this for years and it's a great way to manage
kernels. i even make copies of the .config files which are specific to
particular machines.

for example, if i want to compile 2.4.2 for a machine called foobar
and i have a previously saved .config for 2.2.17 for that machine
then i copy it into /usr/local/src/linux, run make oldconfig, make
menuconfig, and then build the kernel with make-kpkg...and finally copy
it to the right machine with scp.

similar, if machine barfoo is very similar to machine foobar then i
might use foobar's .config as the base for creating barfoo's .config.


perhaps doing this is not completely obvious to new users. in that
case, we should be teaching them that this kind of thing is possible,
educating our users to make effective use of the existing tools.

we have good tools for managing kernel .config files and kernel
versions. kernel-package is an outstanding piece of work...manoj has
done some lots of other cool work too, but this by itself is more than
enough to earn a great deal of respect.

if users don't know that this exists or don't realise how useful it is,
then that can be solved with education.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-22 Thread Craig Sanders
On Sun, Apr 22, 2001 at 10:16:36PM +1000, Herbert Xu wrote:
 We clearly disagree, so let's leave it at that.

no.

  just as you stated you'd be filing bug-reports to get 2.2.17 kernel
  image removed from the archive, i'll be filing package should not
  exist bugs against all the excess kernel-image bugs.

 Go ahead, I'll close them as soon as they're filed.

and i'll open them again or file new ones.

what you are doing is broken.



 And what does this have to do with our discussion?

it's about as relevant as the rest of your digression on initrd and
modules.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-22 Thread Craig Sanders
On Sun, Apr 22, 2001 at 10:23:04PM +1000, Herbert Xu wrote:
  in that case, a far better solution is a package containing a bunch
  of pre-generated kernel .config files, plus a menu script to copy
  [...]
  that would be one package, taking maybe a few hundred kilobytes total.
  call it kernel-helper and make it depend on kernel-package.
 
 But why not take this one step further, let's just distribute what's
 in build-essential and let the users compile the rest.  Let's
 rewind the clock back to times when men were men, and they compiled
 everything on their own box :)

how is that taking it one step further?

what i suggested was providing tools and documentation to assist users
in building their own custom kernels, rather than providing a bloated
number of still-generic kernels.

this actually *helps* new users. what you want to do doesn't help at
all, in fact it causes harm.


craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-22 Thread Craig Sanders
On Mon, Apr 23, 2001 at 08:00:50AM +1000, Hamish Moffatt wrote:
 I do that too; what's the oldconfig step needed for though? I just
 jump straight to menuconfig and it always seems OK.

i find it easier to deal with new config questions. it uses your old
answers as input for any questions, and only prompts you to input
answers to new questions.

 I agree that it is not too hard to compile your own kernel.  I never
 use Debian's standard kernel-image packages (except on my 68K Mac,
 where it takes too long to recompile).

is there such a thing as cross-compilation for the kernel?

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: kernel-{image,headers} package bloat

2001-04-22 Thread Craig Sanders
On Sun, Apr 22, 2001 at 03:36:02PM -0700, Aaron Lehmann wrote:
 On Mon, Apr 23, 2001 at 08:33:43AM +1000, Craig Sanders wrote:
  is there such a thing as cross-compilation for the kernel?
 
 Yes - porting to new architectures would be nearly impossible
 otherwise.

yep, true...but is it deep kernel hacker wizardry or is it accessible to
mere mortals :)


 kernel-package even supports cross-compilation IIRC.

cool, i didn't know thatdon't actually have any need for it. i was
just curious.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: Dual CPU compilation.

2001-04-22 Thread Craig Sanders
On Sun, Apr 22, 2001 at 10:15:28PM -0400, Simon Law wrote:
 I'm the lucky new owner of a dual Pentium Pro system.  It seems,
 however, that compiling stuff just doesn't use my extra CPU.  I know I
 can compile with 'make -j 2' to use the second processor; but I don't
 know how to convince kernel-package and dpkg-deb (apt-get source) to
 do that for me.  Any tips?

this question belongs on debian-user, not debian-devel.

type:

export MAKE='make -j3' 

before running make-kpkg.

note that the kernel is known to have problems compiling reliably when
you use make -j. this won't be fixed until Keith Owens and others have
got their fixed kernel build system into the kernel tree - that won't
happen until 2.5.x i believe.

i've successfully compiled several kernels using -j3, but it's not
something i'd want to rely on at the moment.

craig

--
craig sanders [EMAIL PROTECTED]

  GnuPG Key: 1024D/CD5626F0 
Key fingerprint: 9674 7EE2 4AC6 F5EF 3C57  52C3 EC32 6810 CD56 26F0




Re: tar -I incompatibility

2001-01-09 Thread Craig Sanders
On Mon, Jan 08, 2001 at 12:28:15AM +1100, Hamish Moffatt wrote:
 Frankly, I don't see why gnu tar needs to be compatible with
 OS-specific versions because most of those are feature-poor anyway.

the one reason for gnu tar to do that is so that it can be a drop-in
replacement for those crappy versions.

on every non-linux machine i have to use, the first thing i do is
download and compile all the GNU tools including tar.  i then change
the PATH setting to include /usr/local/bin/gnu at the start.

if the GNU commands were not backwards-compatible then it would
be dangerous to do that.


 I agree with the suggestion that we modify tar for Debian to
 provide -I at least for compatibility for one more release.

i think that whatever we do is going to be broken somehow.

leaving it as -I means that GNU tar would no longer be a drop-in
replacement for a proprietary tar.

changing it to -j means that an upgraded GNU tar is no longer a drop-in
replacement for older versions of GNU tar.

both options suck.

craig

--
craig sanders




Bug#81396: root shell fscked after upgrade to woody

2001-01-06 Thread Craig Sanders
On Sun, Jan 07, 2001 at 04:38:10AM +0200, Eray Ozkural (exa) wrote:

 We use telnet here because this is a diverse university network; we
 can't force people to run ssh and any moron could go root on this
 machine if he really wanted to. 

why not?

the most you'd have to do is put up a single web page with links to
local copies of ssh clients for various platforms...and optionally
replace telnetd with a script (or tcp-wrapper's twist capability)
which printed a message displaying the URL and advising the user to
install an ssh client. telnet problem solved with a minimum of user
support calls.

there's really no excuse for running (non-ssl) telnetd any more. good
free ssh clients are available for just about every operating system.


craig

--
craig sanders




Re: bugs + rant + constructive criticism (long)

2001-01-04 Thread Craig Sanders
On Wed, Jan 03, 2001 at 11:11:50PM -0700, John Galt wrote:
 On Thu, 4 Jan 2001, Craig Sanders wrote:
  Mail-Followup-To is the correct header to use.
 
 Mail-Followup-To isn't even a registered header!  The closest thing to a
 registry that RFC822 implies is in the hands of SRI International is

the thing about internet standards such as the RFCs is that they tell
you what you *must* do, and what you *must not* do. as long as you
follow those rules faithfully you are free to implement as many other
good ideas as you like.

 http://www.dsv.su.se/jpalme/ietf/mail-headers/
 
 (jpalme is as much of a member as one can be of the IETF RFC822 WG)
 
 which says that a Followup-To: header is from RFC 1036, but RFC 1036 is
 for USENET messages, not email.  The only thing I can think of is that
 somebody liked the usenet idea of the followup-to: and just appended a
 mail on it.  Just because somebody breaks the standards does NOT mean that
 everybody should.  

well done! it only took you a few years to catch on. that header has
been in common usage for several years.

btw, it's interesting that you mention Jacob Palme. take a look at the
following document written by him in November 1997:

http://www.ietf.org/proceedings/98dec/I-D/draft-ietf-drums-mail-followup-to-00.txt

Network Working Group   Jacob Palme
Internet Draft Stockholm University/KTH
draft-ietf-drums-mail-followup-to-00.txt
Expires: May 1998 November 1997


   The difference between pine and mutt is that you KNOW the
   overflows in pine
 
  incorrect, again. the difference between mutt and pine is that
  mutt is a decent piece of free software that works and follows the
  relevant standards, while pine is a broken piece of non-free shit
  which doesn't.

 Horsefeathers!  The Mail-followup-to: header is NOT a part of the
 relevant standards!

that wasn't what i said, and i in no way meant to imply that failure to
implement an optional but well-documented and well-known header is what
makes pine broken. pine is broken in numerous other ways.

craig

--
craig sanders




Re: bugs + rant + constructive criticism (long)

2001-01-04 Thread Craig Sanders
On Wed, Jan 03, 2001 at 11:15:23PM +0100, Sven Burgener wrote:
 On Wed, Jan 03, 2001 at 05:23:55PM +1100, Craig Sanders wrote:
  the new 'testing' distribution (sid) should be even better - nearly
  all the benefits of 'unstable' but tested to at least install properly
  without error.
 
 Wrong: unstable-sid; testing-woody.

yes, my mistake.  i don't know why i called it sid when i know it isn't.  a
brainfart.

my comments about the usefulness of the 'testing' distribution still
apply.

 Personally, I would recommend the use of 'testing' in a production
 environment, but not unstable. One doesn't always have the time to
 fix problems related to the distribution itself whilst working in a
 production environment.

i would recommend the use of either testing or unstable or stable
depending upon the particular requirements of the situation.

stable is good when you don't need or want any change at all.

testing is good when you want/need to be mostly up-to-date with the
latest versions but don't have the time to deal with packaging errors.

unstable is good when you want/need to be up-to-date and have both the
time and the skill to deal with any problems that may arise.



most people with a decent net connection will probably settle for using
'testing'however that won't be much use if nobody uses 'unstable' as
unstable packages won't get installed and tested, so bug reports won't
be filed, so unstable packages will move into testing without actually
having been tested by anyone.


craig

--
craig sanders




Re: bugs + rant + constructive criticism (long)

2001-01-04 Thread Craig Sanders
On Wed, Jan 03, 2001 at 09:23:23PM -0900, Ethan Benson wrote:
 btw is it Mail-Copies-To: never or Mail-Copies-To: nobody ?  i have
 seen both which is correct?  (assuming any MUA actually pays any
 attention to this header anyway)

'nobody' is correct.

'never' is deprecated but still observed by many MUAs.

from the draft of Mail-Copies-To posted to the usenet-format list on 6
Nov 2000 (Message-Id: [EMAIL PROTECTED]):


6.  Optional Headers

6.1.  Mail-Copies-To

   The Mail-Copies-To header indicates whether or not the poster wishes
   to have followups to an article emailed in addition to being posted
   to Netnews and, if so, establishes the address to which they should
   be sent.

   The content syntax makes use of syntax defined in [MESSFOR], but
   subject to the revised definition of local-part given in section 5.2.

  Mail-Copies-To-content= copy-addr / nobody / poster
  copy-addr = mailbox

   The keyword nobody indicates that the author does not wish copies
   of any followup postings to be emailed.

   The keyword poster indicates that the author wishes a copy of any
   followup postings to be emailed to him.

   Otherwise, this header contains a copy-addr to which the author
   wishes a copy of any followup postings to be sent.

NOTE: Some existing practice uses the keyword never in place
of nobody and always in place of poster. These usages are
deprecated, but followup agents MAY observe them.



craig

--
craig sanders




Re: bugs + rant + constructive criticism (long)

2001-01-04 Thread Craig Sanders
On Thu, Jan 04, 2001 at 10:43:05AM -0800, Philip Brown wrote:
 [ Craig Sanders writes ]
  On Wed, Jan 03, 2001 at 11:26:25AM -0800, Philip Brown wrote:
   And in the case of the debian mailing lists, you should reply to the
   list.
  some replies should go to the list, and some replies should be private.
  it's up to the person writing the reply to make that decision, not the
  list software.
 
 But the primary point of a mailing list is for discussion ON THE LIST.
 Do you want to disagree with that?

yes, of course i will disagree with that because it's wrong.

there are as many primary purposes of mailing lists as there are mailing
lists.

 So headers should be optimized for group discussion.
 Replying to individuals is a secondary function.

that's for the person writing the reply to decide, not you and not the
list operator.

 setting reply-to back to the list just makes it difficult (or in
 some cases impossible) to reply privately. ...  however reply-to
 munging by list software does have the serious disadvantage of
 replacing any Reply-To header created by the original author of a
 message.

 So what, if the mailing software rewrites From: to have any reply-to
 information from the original sender? Then the information is still
 available.

so your proposed solution to the evils of header munging is to do more
header munging in an attempt to correct the problem?  what a great idea!

there are better solutions, including the Mail-Followup-To header which
has been documented and in use for years. all decent MUAs should have
implemented it by now. if they haven't then they are inadequate.

  the Reply-To header exists for the *person* who originally sent the
  message to be able to direct replies to their preferred destination. it
  is not there so that mailing lists can screw with it.
 
 So your argument is
  A mailing list is not a person, so it can't use reply-to:.
 Bad argument.

no, my argument is that if a list sets the reply-to header then it makes it
difficult (or impossible in some cases) to reply privately to the author of
a message, so it should not do it.

not munging the Reply-To header also follows the principle of doing
least harm. if a reply is accidentally sent privately, no harm is done -
just forward the message to the list if it matters.  OTOH if a private
reply is accidentally sent to the list (which happens all too often when
Reply-To points back to the list) then harm is done with no possibility
of undoing it because confidential or embarrasing material is now posted
(and probably archived) publicly.

setting Reply-To back to the list is brain-damaged and moronic behaviour
on the part of the list operator.

 [http://faqs.org/rfcs/rfc822.html]
 
 rfc822, section 4.4.3, EXPLICITLY MENTIONS 
 text message teleconferencing groups 
   (eg mailing lists) as potential users of the reply-to header,
 expressly for the purpose of having reply direct email to the list

yes, and the people who wrote that (and many others) have since
realised and stated that it is broken and causes many more problems
than it solves. that's why there are other documents recommending the
Followup-To and Mail-Followup-To and other headers.

this has been discussed many times over many years.  you're not adding
anything new to the discussion.


 And finally, example A.3.3 EXPLICITLY shows that reply-to is NOT
 exclusively for who wrote the message. It is for Where do you want
 replies to normally go to

what's your point?

it is for the person who wrote the message to direct where replies are
to go.


craig

--
craig sanders




Re: bugs + rant + constructive criticism (long)

2001-01-03 Thread Craig Sanders
On Tue, Jan 02, 2001 at 07:45:53PM -0800, Jim Lynch wrote:

 But... if you are using woody for -production-, I'm sorry again, but
 that's an idiot move... and you know that if you have spent -any- time
 at all on OPN, much less enough to get familiar enough to help others
 on channel.

 And if you're talking about -sid-... rotflmao :)

 Now being serious: I hope you NEVER advise people on #debian to use
 anything not released for production. If I see it, you get devoiced
 QUICKLY.

WTF for? you want to censor someone because they express opinions which
you don't like?

you might disagree, but unstable is just as safe to use on production
systems as stable - especially for people who have a clue and have
sufficient experience with debian.

the main difference between 'stable' and 'unstable' is that stable has
old versions with old bugs and old security holes while unstable has new
versions with new bugs and new security holes. take your pick.

i have no hesitation in recommending that people run unstable if they
need the new features/bugfixes and if they have enough of a clue to cope
with occasional packaging problems or are willing to learn how (it's not
very hard - just become familiar with dpkg and apt).

(if people don't have a clue, then i don't recommend that they run
either stable or unstable. i recommend that they either acquire one in a
hurry or go find a more appropriate career or hobby)

as long as you test upgrades on an unimportant machine first there's
little chance of a problem.

i've been running *all* of my production servers on debian unstable for
years (since 1995) with no major problems. they don't all get upgraded
every day, but most get upgraded at least once every two weeks.

i use unstable for building gateway boxes and workstations too...in
fact, every debian box i build is debian unstable - so far, i've
personally built over 200 of them and guided/supervised the building of
many more. i have every intention of building more 'unstable' boxes as i
need them.

i'm sure that most debian developers have similar experiences with
unstable. it may be too much trouble for the completely clueless but
it's fine for anyone who's not afraid of getting their hands dirty.


the new 'testing' distribution (sid) should be even better - nearly
all the benefits of 'unstable' but tested to at least install properly
without error.

craig

--
craig sanders




Re: bugs + rant + constructive criticism (long)

2001-01-03 Thread Craig Sanders
On Wed, Jan 03, 2001 at 06:16:17AM -0800, Jim Lynch wrote:
 If you want to advocate the use of unstable software, please be my
 guest... but not on #debian. it changes daily, and can potentially
 break every day, potentially disasterously. So -no-. It's NOT
 appropriate to tell people to run servers on unstable software.

if i ever happen to be on #debian and someone has a problem where the
best solution is to upgrade to unstable (either a full dist-upgrade or
just selected packages) then i certainly will recommend exactly that.

it is *always* appropriate to provide a good solution to a problem -
whether it accords with your opinion or not.


 On the other hand... if you want to -pay- me to take the support load
 for a limited period of time, I'll open the door, for a limited period
 of time. I'm a volunteer there, you already know what a volunteer is
 if you have anything at all to do with debian.

there's no need to be so pompous and pretentious. you're just another
volunteer, not the Thought Police.

craig

--
craig sanders




Re: bugs + rant + constructive criticism (long)

2001-01-03 Thread Craig Sanders
On Wed, Jan 03, 2001 at 11:26:25AM -0800, Philip Brown wrote:
 [ D-Man writes ]
  Try mutt and its L command.  The L command means list-reply, aka
  only send a message to the list, not to all recepients.  It also sets
  a header flag so that other well-behaved MUA's don't send you an extra
  copy of their replies since you will get it on the list anyway.
 
 guess what?
 not everyone uses mutt.
 not everyone should.

mutt's not the only decent MUA around. there are other which work
properly.

  Reply-to is meant to send a message back to the person who wrote
  the first one, not to someone they wrote the message to.

 reply-to is meant to direct where you should send replies to.

 And in the case of the debian mailing lists, you should reply to the
 list.

bullshit.

some replies should go to the list, and some replies should be private.
it's up to the person writing the reply to make that decision, not the
list software.

setting reply-to back to the list just makes it difficult (or in
some cases impossible) to reply privately. it provides no benefit
that can not be better achieved by either a) using a decent mailer,
or b) having a bit of a clue and editing the To, and Cc: headers
appropriately. however reply-to munging by list software does have the
serious disadvantage of replacing any Reply-To header created by the
original author of a message.

the Reply-To header exists for the *person* who originally sent the
message to be able to direct replies to their preferred destination. it
is not there so that mailing lists can screw with it.

craig

--
craig sanders




Re: bugs + rant + constructive criticism (long)

2001-01-03 Thread Craig Sanders
On Wed, Jan 03, 2001 at 09:53:04PM -0700, John Galt wrote:
   In fact, the only thing the RFC says to do is to honor Reply-To: headers,
   which I might note you didn't include in your message.
  
  Why should I, when it would be no different from my From: header?
 
 It would be in your case: 
 
 Reply-to: debian-devel@lists.debian.org

no, that would make it difficult for people to reply privately to him.

Mail-Followup-To is the correct header to use.

 The difference between pine and mutt is that you KNOW the overflows in
 pine

incorrect, again. the difference between mutt and pine is that mutt is
a decent piece of free software that works and follows the relevant
standards, while pine is a broken piece of non-free shit which doesn't.

 mutt allegedly shares code with pine...

since the source-code of both programs is readily available it should be
easy enough to check this allegation.


craig

--
craig sanders




Re: What do you wish for in an package manager?

2000-12-26 Thread Craig Sanders
On Sun, Dec 24, 2000 at 08:41:43PM +, Mark Seaborn wrote:
 Dwayne C . Litzenberger [EMAIL PROTECTED] writes:
 
  So my question is: What do you wish for in a package manager?
 
 I want a system where I can install multiple versions of a library (or
 any package really) and say which version I want each program on the
 system to use, possibly on a per-user basis.  The present system is a
 disaster waiting to happen:  If I install a package from unstable, it
 often wants to replace my version of libc from stable with one from
 unstable.  If this new libc is broken it could bring down the whole
 system, when what I really want to happen is for the new package to
 use the unstable libc and everything else carry on using the stable
 libc.

this is the risk you take when you use unstable. if that risk is too
great for you, then stick to the stable release.

it's a small - tiny, even - risk, but it's there.  deal with it.

the amount of effort and bloat required to implement this idea for the
handful of people who would find any use at all for it just isn't worth
it. it's a gross violation of the KISS principle and would greatly
increase the complexity of systems administration.

when i upgrade a package, i want it to replace the previous version -
i don't want to keep the last n versions around just on the off-chance
i might have some use for them (e.g. the last 10 versions of libc6 or
the last 10 versions of xbooks would waste an enormous amount of disk
space). if i really need more than one version of a library installed, i
can compile it in /usr/local and set LD_PRELOAD appropriately.


craig

--
craig sanders




Re: CGI bug scripts

2000-09-11 Thread Craig Sanders
On Sun, Sep 10, 2000 at 04:56:29PM -0700, Joey Hess wrote:
 Julian Gilbey wrote:
  Is it my imagination, or is bugreport.cgi *really* slow?  I think that
  we should really investigate the possibility of using mod_perl.  It's
  using CGI.pm, which is *big* and takes time to load.  I've written
  scripts which I use under mod_perl and the time difference is
  astonishing.
 
 You can also just not use CGI.pm, which is horrendously bloated for most
 tasks.

or modify it to run under speedycgi, which gives most of the benefits
of mod_perl (persistent perl scripts, persistent database connections,
compile-once rather than on every request, etc) without the hassles of
mod_perl.

unlike mod_perl, most CGI scripts work under speedyCGI with little or no
modification...the main thing you have to remember is that the script is
now persistent, so you have to be careful about use of global variables
and even more careful about correctly initialising your variables - they
will retain their values from one execution to the next.

for many CGI scripts, the only change you have to make is change the #!
/usr/bin/perl line to #! /usr/bin/speedy.

mod_perl still has it's uses - speedy and mod_perl perform similar but
far from identical tasks. for some jobs, mod_perl is better while for
other jobs, speedy is better.


craig

--
craig sanders


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



  1   2   3   4   >