Accepted aria2 1.37.0+debian-2 (source) into unstable

2024-06-10 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 10 Jun 2024 12:03:29 +0530
Source: aria2
Architecture: source
Version: 1.37.0+debian-2
Distribution: unstable
Urgency: low
Maintainer: Patrick Ruckstuhl 
Changed-By: Kartik Mistry 
Closes: 1071833
Changes:
 aria2 (1.37.0+debian-2) unstable; urgency=low
 .
   [ Patrick Ruckstuhl ]
   * debian/control:
 + Drop libgcrypt build dependency (Closes: #1071833).
 + Change pkg-config -> pkgconf
 + Adjust to latest version
 .
   [ Kartik Mistry ]
   * Simplify debian/watch file.
Checksums-Sha1:
 ba1309726630f5c0b398e610c3ccf3353b96b187 2177 aria2_1.37.0+debian-2.dsc
 a23a982dab313f777d06757a30eb1f99b9d966b9 6820 
aria2_1.37.0+debian-2.debian.tar.xz
Checksums-Sha256:
 31c9cdde02056c3a6c878fa0584623652f36d28620070d378095980a8bd896df 2177 
aria2_1.37.0+debian-2.dsc
 9ac6466ea25a7e4eef67ef6254d77f7641363648919fb0678258647b8f9c6b13 6820 
aria2_1.37.0+debian-2.debian.tar.xz
Files:
 36a4166b32799d516f6ee5509edfd0fa 2177 net optional aria2_1.37.0+debian-2.dsc
 a8371a6621be5b6c5ac326073ee15fba 6820 net optional 
aria2_1.37.0+debian-2.debian.tar.xz

-BEGIN PGP SIGNATURE-
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=49T7
-END PGP SIGNATURE-



pgpqeTBtBuqnv.pgp
Description: PGP signature


Accepted debian-edu-fai 2024.06.07.1 (source) into unstable

2024-06-07 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 07 Jun 2024 11:08:04 +0200
Source: debian-edu-fai
Architecture: source
Version: 2024.06.07.1
Distribution: unstable
Urgency: medium
Maintainer: Debian Edu Developers 
Changed-By: Mike Gabriel 
Changes:
 debian-edu-fai (2024.06.07.1) unstable; urgency=medium
 .
   * bin/debian-edu-fai_updateconfigspace:
 + Fix is-inside-(Git-)work-tree check.
Checksums-Sha1:
 3cc85177ecb460f1100a04b828338b9b5a8ca34e 1730 debian-edu-fai_2024.06.07.1.dsc
 805d55e46c587445f53a33de80dfbedf827846e0 76428 
debian-edu-fai_2024.06.07.1.tar.xz
 5ab57864ff5098233047aca9b3cd75b2c57b41d6 6587 
debian-edu-fai_2024.06.07.1_source.buildinfo
Checksums-Sha256:
 4d1b6a865714806b799db638e1ffd90073e9505e298fcab103ddc5a10023a56d 1730 
debian-edu-fai_2024.06.07.1.dsc
 d221ccd4c58ccf48724d2c723825340e5280daf34ce0a90da3ff2761631da872 76428 
debian-edu-fai_2024.06.07.1.tar.xz
 4c5cd5c5fe492d246d396261fbe13662b52b252f6187fbd00fa4cb66dd632a55 6587 
debian-edu-fai_2024.06.07.1_source.buildinfo
Files:
 95096eced139189648e12fa1e8116757 1730 admin optional 
debian-edu-fai_2024.06.07.1.dsc
 66a9f9106d1ad78530a0d154b4135554 76428 admin optional 
debian-edu-fai_2024.06.07.1.tar.xz
 7de2a2d3f1ecdab28ea25bb12d361ba9 6587 admin optional 
debian-edu-fai_2024.06.07.1_source.buildinfo

-BEGIN PGP SIGNATURE-
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=Gi0g
-END PGP SIGNATURE-



pgpXNYDagdPJn.pgp
Description: PGP signature


Accepted rust-debian-watch 0.2.7-1 (source) into unstable

2024-06-04 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 04 Jun 2024 20:55:18 +0100
Source: rust-debian-watch
Architecture: source
Version: 0.2.7-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Rust Maintainers 

Changed-By: Jelmer Vernooij 
Changes:
 rust-debian-watch (0.2.7-1) unstable; urgency=medium
 .
   * Package debian-watch 0.2.7 from crates.io using debcargo 2.6.1
Checksums-Sha1:
 b655b3ab69548bd7572382937e24e22f0ea8ccd0 2108 rust-debian-watch_0.2.7-1.dsc
 a9812d1b0768fee2958e894f9361c42e8ef122b2 10200 
rust-debian-watch_0.2.7.orig.tar.gz
 4e5642d6ca528626117971aebe5d5fe9383cdb8c 1996 
rust-debian-watch_0.2.7-1.debian.tar.xz
 87d7405d9210d1e31c08298cf534b56e209def65 17478 
rust-debian-watch_0.2.7-1_source.buildinfo
Checksums-Sha256:
 bea90b7c819991a5e99ee54cfca7a45e495e0f8e0105d6499630addd94572088 2108 
rust-debian-watch_0.2.7-1.dsc
 506bd868882fe7b6d5dbaaeb001174aa01fb267563f019ceaa6f31a8b6e9639f 10200 
rust-debian-watch_0.2.7.orig.tar.gz
 74d963db8755f449cf51313e1bb0b0386fb26309a1476ae4c8f907f7d25f8054 1996 
rust-debian-watch_0.2.7-1.debian.tar.xz
 1bf25dbfb83fb7911e348bd14218fd41840c17d98209311d32fd1e13468bcea6 17478 
rust-debian-watch_0.2.7-1_source.buildinfo
Files:
 8ad01e69ec9181da65bc103ec3399b1c 2108 rust optional 
rust-debian-watch_0.2.7-1.dsc
 a7b4d434eca26fe36deb2012970acc55 10200 rust optional 
rust-debian-watch_0.2.7.orig.tar.gz
 62689b36b2ade7352f389b961c61bf01 1996 rust optional 
rust-debian-watch_0.2.7-1.debian.tar.xz
 a51890b9493d4f0d01ae50431ac686d8 17478 rust optional 
rust-debian-watch_0.2.7-1_source.buildinfo

-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEgIoEfJX3ae+y722SMG8hYYBCUGYFAmZfcSoACgkQMG8hYYBC
UGaAMAf/TfaDjPtKyfrhlYOEup6qCYJDV2iegxxHInT4zcOeQ1ppfYFOZNr/7ht+
+i1XG+UXpRToJOgBLu//QH38ylvbLz36n/rAC6dTqny5P8SHtWYa+5FdCxdGLRDU
ehnkY8WXBZVfkeR2vGBeLRIebQrYmGKcl6gyj6XoUO1aSTaIEwVyHOA5zpWzqLcV
xgK/Cvl6WKciLTKrJSZFf7t//u7QSsjfBNIYB0TnNaJHqiehBLgjfn9fa3empVFu
P015yARXF9F0Q54kyGe/wPIyHCffpR/PGYd7ScSIj0L+YtQnTQXPQrtERvsH6pMY
4gJbIW3wYjoTzLGd5S3dZveDm8pCSQ==
=WD6e
-END PGP SIGNATURE-



pgpreKp64z5xq.pgp
Description: PGP signature


Accepted rust-debian-copyright 0.1.8-2 (source) into unstable

2024-06-04 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 04 Jun 2024 20:47:10 +0100
Source: rust-debian-copyright
Architecture: source
Version: 0.1.8-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Rust Maintainers 

Changed-By: Jelmer Vernooij 
Changes:
 rust-debian-copyright (0.1.8-2) unstable; urgency=medium
 .
   * Package debian-copyright 0.1.8 from crates.io using debcargo 2.6.1
Checksums-Sha1:
 a97f162b3e4648a8446387cf3169f2ecd9fe235c 2075 rust-debian-copyright_0.1.8-2.dsc
 705fc713a66b3abfbe7f66d2f0b4900c4b1f6d12 2288 
rust-debian-copyright_0.1.8-2.debian.tar.xz
 da54338325c3d996801c43464936399833bec5de 17256 
rust-debian-copyright_0.1.8-2_source.buildinfo
Checksums-Sha256:
 893bec55f9384e31c35a6c2f3edccaef50d120042f8da90d7eea8114178ee759 2075 
rust-debian-copyright_0.1.8-2.dsc
 b64047a50ffd9816d17ad85028129ee7a485a4f9858496befc3097a916daf49d 2288 
rust-debian-copyright_0.1.8-2.debian.tar.xz
 c5c4d3991c13208f4fb3147d6e8a2ea77ad975abd394a08e99178979b98b03be 17256 
rust-debian-copyright_0.1.8-2_source.buildinfo
Files:
 47056d958928c4c26f79894552ccf84f 2075 rust optional 
rust-debian-copyright_0.1.8-2.dsc
 e58c66076d766eeb62af64c1f33f5da4 2288 rust optional 
rust-debian-copyright_0.1.8-2.debian.tar.xz
 850f37b595ec6451e558314c558ec4c9 17256 rust optional 
rust-debian-copyright_0.1.8-2_source.buildinfo

-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEgIoEfJX3ae+y722SMG8hYYBCUGYFAmZfb0IACgkQMG8hYYBC
UGanRQf7Bi8GG/tg7dXwhD9xlMDjlb3AuZLtsS6uRmGR+2FTMEH3aF37fu8z/s41
xqb5aNQGaQ2Gj/p68xDB9xhGFPwPqFz1fROzeJXJQbIBVNZlE3pUTKcy8Q0tr9X1
wcuAGkQdkoIJWi+N6tOej1zejt0d6DTfhBY4a1VdnWPziU/xG2RxQMv5xwhkHwMB
z75mgyrnZcMJbtSTmIitQwFmmOGWQ0dNT/xQLAIXAFdMzKVpzRSlrr6Lf95jnTRk
cG+wytVV89lZnIWgnqUhJgz/lbFF/ojq0WvCzJs9GG6ePaFgRq9Qx4vBhNBR1cub
SaOh5YtLd+6MmdOtm0N/dZl/B5yLJg==
=nPMO
-END PGP SIGNATURE-



pgpO4kZL_3F1y.pgp
Description: PGP signature


Accepted rshim-user-space 2.0.31+debian-1 (source) into unstable

2024-06-04 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 30 May 2024 15:25:20 +0200
Source: rshim-user-space
Architecture: source
Version: 2.0.31+debian-1
Distribution: unstable
Urgency: medium
Maintainer: da...@debian.org
Changed-By: Taihsiang Ho (tai271828) 
Changes:
 rshim-user-space (2.0.31+debian-1) unstable; urgency=medium
 .
   * New upstream version 2.0.31+debian
   * debian/control: update Debian Policy version to 4.7.0
Checksums-Sha1:
 01bbd7e1f2f813b227b30fbcf255fb3c17f8 2044 
rshim-user-space_2.0.31+debian-1.dsc
 568a6dca46440bb99d547b807fefee1941e39955 78680 
rshim-user-space_2.0.31+debian.orig.tar.gz
 f53f3033d2b02ee6a05e7e28f4117300f5b5d034 2964 
rshim-user-space_2.0.31+debian-1.debian.tar.xz
 0a22610673cb5b09cd585f1c52dab0abbfb05b50 7434 
rshim-user-space_2.0.31+debian-1_source.buildinfo
Checksums-Sha256:
 8a06c5e702da31634c85e866c1098e80c6b5c94317bbd3d17f5bd3494d15bd4e 2044 
rshim-user-space_2.0.31+debian-1.dsc
 1f3c1bac7987189f36bf917b23ca00d2ea133ebcf74ca04cc4806e1d94bdaa80 78680 
rshim-user-space_2.0.31+debian.orig.tar.gz
 73070d4178ca9145ae01b247739cf391b4878a56e42410ba3341f6d2ea4125b4 2964 
rshim-user-space_2.0.31+debian-1.debian.tar.xz
 52d334e402b64db49b1199af757a91c5af8cbb6498bd3986ed258f791de70385 7434 
rshim-user-space_2.0.31+debian-1_source.buildinfo
Files:
 3059fe7b9d625b3948bcb4723f9ebcdc 2044 admin optional 
rshim-user-space_2.0.31+debian-1.dsc
 9a28df34845576bb4e4f0c6fc880a92c 78680 admin optional 
rshim-user-space_2.0.31+debian.orig.tar.gz
 5c5be4f25018e3087e5c1fb28a487689 2964 admin optional 
rshim-user-space_2.0.31+debian-1.debian.tar.xz
 1037cfef0807ed473b7d2f539acb5116 7434 admin optional 
rshim-user-space_2.0.31+debian-1_source.buildinfo

-BEGIN PGP SIGNATURE-
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=jfuI
-END PGP SIGNATURE-



pgpwufVdf75JX.pgp
Description: PGP signature


Accepted debian-installer-utils 1.149 (source) into unstable

2024-06-03 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 03 Jun 2024 09:26:41 +0100
Source: debian-installer-utils
Architecture: source
Version: 1.149
Distribution: unstable
Urgency: medium
Maintainer: Debian Install System Team 
Changed-By: Colin Watson 
Changes:
 debian-installer-utils (1.149) unstable; urgency=medium
 .
   [ Colin Watson ]
   * user-params: Exclude initrd, since it's sometimes hard to avoid syslinux
 appending it after "---".
 .
   [ Luca Boccassi ]
   * chroot_setup.sh: Mount efivarfs in /target if available.
Checksums-Sha1:
 af8d1d1e672c957235f5b09d7c0a1a3844f7ad9a 2285 debian-installer-utils_1.149.dsc
 ed4cb66247734feecc82693deea1c2113732d3fa 102916 
debian-installer-utils_1.149.tar.xz
Checksums-Sha256:
 ac1577c1f5188025e6afa31c7a32e6b1909f484695cc342b15367ad9cf01c159 2285 
debian-installer-utils_1.149.dsc
 400e37da530743340954f14b03bcb928ae44c4da19a4b34c8502ffd85a70e7ab 102916 
debian-installer-utils_1.149.tar.xz
Files:
 9c1c17af1072882ae50b6706aeaf61ee 2285 debian-installer standard 
debian-installer-utils_1.149.dsc
 5b8d9fcbff4c9819740cc3b52f78e3fd 102916 debian-installer standard 
debian-installer-utils_1.149.tar.xz

-BEGIN PGP SIGNATURE-
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=/CGG
-END PGP SIGNATURE-



pgp201vgnwVRz.pgp
Description: PGP signature


Bug#1072313: ITP: debpic -- Build Debian packages in a docker container

2024-05-31 Thread Aidan Gallagher
Package: wnpp
Severity: wishlist
Owner: Aidan Gallagher 
X-Debbugs-Cc: debian-devel@lists.debian.org, aidg...@gmail.com

* Package name: debpic
  Version : 1.0.0
  Upstream Author : Aidan Gallagher 
* URL : https://github.com/aidan-gallagher/debpic
* License : LGPL
  Programming Lang: Python
  Description : Build Debian packages in a docker container

 Debpic allows developers to build Debian package in an isolated environment.
 Invoke debpic in a repository without any arguments to simply build packages.
 The environment is composed from:
  * The Debian stable docker image.
  * Build dependencies described in the ./debian/control file.
  * Any additional developer tools described in ./developer-packages.txt.
  * Any packages defined in the --extra-pkg flag.


I previously opened an ITP for this package under its previous name 
"dpkg-buildenv". 
After some feedback I have since renamed it. I was informed on
https://mentors.debian.net/package/debpic/ that I should recreate an ITP using 
the new name.



Accepted debian-el 37.12 (source) into unstable

2024-05-29 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 19 May 2024 02:44:17 -0700
Source: debian-el
Built-For-Profiles: noudeb
Architecture: source
Version: 37.12
Distribution: unstable
Urgency: medium
Maintainer: Debian Emacsen team 
Changed-By: Xiyue Deng 
Closes: 1032662 1067902 1067922 1069908
Changes:
 debian-el (37.12) unstable; urgency=medium
 .
   * Bring back debian-autoloads.el (Closes: #1067902)
   * Fix comp warnings in debian-bug.el (Closes: #1067922)
   * Update distribution code names to recent releases
   * Append non-free-firmware to non-free when handling components
   * Move package info above copyright notice following existing practices
   * Bump package version to prepare for release
   * Make ITP/RFP template more aligned with reportbug
 - Move `Severity' above `Owner' in headers
 - Add `Programming lang' after `License' in email template
   * Update Standards-Version to 4.7.0; no change needed
   * Fix duplicates and broken entries in X-Debbugs-Cc (Closes: #1069908)
 - Stop passing "--list-cc=none" to reportbug
 - Unset $HOME to prevent reportbug from loading ~/.reportbugrc
   * Add zstd to depends of elpa-debian-el in debian/control
   * Add deb-view support for zstd compressed deb files (Closes: #1032662)
Checksums-Sha1:
 e052ac7073014052d97c4d6d2e2998105b416dec 1718 debian-el_37.12.dsc
 5ffb1813aafab9800756bf7151147aa4b2ee2124 56748 debian-el_37.12.tar.xz
 5577dc7867d22b3e7c60ff0a11c85f34250a98b4 10276 debian-el_37.12_source.buildinfo
Checksums-Sha256:
 bdfde1b28d6aaca4e5ba7a3ca3d64b725f83c9b94fca82a401297eee89956fd0 1718 
debian-el_37.12.dsc
 bd06bacad51a0b8c1874340fa76708cc70d9fb8c294d44eeda7118221df3a8d5 56748 
debian-el_37.12.tar.xz
 733353eee970667f59b13c7fdf8439de758e4a4bbe6b7ab0127a8ae8e84a75c9 10276 
debian-el_37.12_source.buildinfo
Files:
 21c578c15b1bbc92c2f16a2a93aafca9 1718 lisp optional debian-el_37.12.dsc
 f0f0d9581ead0cf93ff40abb76aa4dd0 56748 lisp optional debian-el_37.12.tar.xz
 14f5d982a59e260e18ece0e55d59b0d2 10276 lisp optional 
debian-el_37.12_source.buildinfo

-BEGIN PGP SIGNATURE-
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=2AYL
-END PGP SIGNATURE-



pgpNwtYLREjm9.pgp
Description: PGP signature


Accepted debian-reference 2.123 (source) into unstable

2024-05-28 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 28 May 2024 16:11:38 +0900
Source: debian-reference
Architecture: source
Version: 2.123
Distribution: unstable
Urgency: medium
Maintainer: Osamu Aoki 
Changed-By: Osamu Aoki 
Changes:
 debian-reference (2.123) unstable; urgency=medium
 .
   [ Andika Triwidada ]
   * Translated using Weblate (Indonesian)
 .
   [ eulalio ]
   * Translated using Weblate (Spanish)
 .
   [ houzhou-wu ]
   * Translated using Weblate (Chinese (Simplified))
 .
   [ Osamu Aoki ]
   * Update Makefile to not current status.
   * Trivial update of fi and ko removing junks.
Checksums-Sha1:
 94a6e422b774779a02310455522e87576ee9ed98 3067 debian-reference_2.123.dsc
 678b17d631b0bb880a0ba0c92fbd9bdf81e3623b 2198892 debian-reference_2.123.tar.xz
Checksums-Sha256:
 7db3f756bb2c3a504210ab50c15cdd3cbaca62af53707b1df6134d95e0324caa 3067 
debian-reference_2.123.dsc
 1ad2451b992e51064194d31991127f0f3247298e3eb80ca93807e88c447c7b4e 2198892 
debian-reference_2.123.tar.xz
Files:
 978080324b12caa335999f922aa5a17a 3067 doc optional debian-reference_2.123.dsc
 d37f897067ff59a0ec3c034b77f5a53e 2198892 doc optional 
debian-reference_2.123.tar.xz

-BEGIN PGP SIGNATURE-
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=A8h7
-END PGP SIGNATURE-



pgpHrIbHRDUUR.pgp
Description: PGP signature


Re: Debian 10 "buster" moved to archive.debian.org

2024-05-27 Thread Leandro Cunha
Hi,

On Fri, May 24, 2024 at 10:28 PM Otto Kekäläinen  wrote:
>
> Hi!
>
> So just to clarify, are you saying that a copy of
> https://security.debian.org/debian-security/dists/buster/ will never
> be archived at https://archive.debian.org/debian-security/dists/ like
> previous releases have been so far?
>
> This is not about getting *new security updates*, but purely a
> question of how moving Buster to archival works and how e.g. CI
> systems that test upgrades from Buster should work.
>
> I see that e.g.
> https://deb.debian.org/debian/dists/buster/main/binary-armel and
> https://deb.debian.org/debian/dists/buster-updates/main/binary-armel
> no longer exists, but have been archived at
> https://archive.debian.org/debian/dists/buster/main/binary-armel/ and
> https://archive.debian.org/debian/dists/buster-updates/main/binary-armel/.
>
> The 
> https://security.debian.org/debian-security/dists/buster/updates/main/binary-armel
> is now gone, is the intent for it to show up on archive.debian.org in
> some form?

True, you're right, the buster is missing from
https://archive.debian.org/debian-security/dists/ and I'm waiting for
a response from the people who take care of this repository about
this. I think they forgot to migrate.

-- 
Cheers,
Leandro Cunha



Accepted puppet-module-debian-archvsync 1.0.1-1 (source) into unstable

2024-05-27 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 27 May 2024 10:33:42 +0200
Source: puppet-module-debian-archvsync
Architecture: source
Version: 1.0.1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenStack 
Changed-By: Thomas Goirand 
Changes:
 puppet-module-debian-archvsync (1.0.1-1) unstable; urgency=medium
 .
   * New upstream release:
 - fix default rsync URL for archive.debian.org.
Checksums-Sha1:
 e7a7bbedc13a89fe75cf9e2759f5c405ca3d5b67 2263 
puppet-module-debian-archvsync_1.0.1-1.dsc
 ded7242b3bdc006909448ec190b18510df60246e 8516 
puppet-module-debian-archvsync_1.0.1.orig.tar.xz
 507c2a5cb4278b7fa9e09d22df66115dd2eaa534 2544 
puppet-module-debian-archvsync_1.0.1-1.debian.tar.xz
 7e6f25a48e5ffe3dfa5fa843610f53105aa72b29 7183 
puppet-module-debian-archvsync_1.0.1-1_amd64.buildinfo
Checksums-Sha256:
 bb4e2dbca4d1fdb642ab14173b885f52de146ea65d30a31cbb3bd61e8a56196b 2263 
puppet-module-debian-archvsync_1.0.1-1.dsc
 174f70b2b718348e851a06f5651b2fe81f492e7a5475edacda84535dd65af09e 8516 
puppet-module-debian-archvsync_1.0.1.orig.tar.xz
 1e23f4345a12356fb6088b0de4134bd9e9c67bf771bc50045cbfffb9080ec18e 2544 
puppet-module-debian-archvsync_1.0.1-1.debian.tar.xz
 9ae1dbdf7a58a78bc2ce4b2c923f871ed7573c67678aad51996b75c2e8055a99 7183 
puppet-module-debian-archvsync_1.0.1-1_amd64.buildinfo
Files:
 00304a0fb84f2c377437b7d47a0353b3 2263 admin optional 
puppet-module-debian-archvsync_1.0.1-1.dsc
 ff1e0b9a8d9461da8418a82bb5818d79 8516 admin optional 
puppet-module-debian-archvsync_1.0.1.orig.tar.xz
 3dddfadcdab413ecfc30ec6f6f292685 2544 admin optional 
puppet-module-debian-archvsync_1.0.1-1.debian.tar.xz
 9d31a7ee7ae520ac9cacc85c2b608701 7183 admin optional 
puppet-module-debian-archvsync_1.0.1-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=4han
-END PGP SIGNATURE-



pgpcYCeAb92T9.pgp
Description: PGP signature


Re: Debian 10 "buster" moved to archive.debian.org

2024-05-24 Thread Otto Kekäläinen
Hi!

So just to clarify, are you saying that a copy of
https://security.debian.org/debian-security/dists/buster/ will never
be archived at https://archive.debian.org/debian-security/dists/ like
previous releases have been so far?

This is not about getting *new security updates*, but purely a
question of how moving Buster to archival works and how e.g. CI
systems that test upgrades from Buster should work.

I see that e.g.
https://deb.debian.org/debian/dists/buster/main/binary-armel and
https://deb.debian.org/debian/dists/buster-updates/main/binary-armel
no longer exists, but have been archived at
https://archive.debian.org/debian/dists/buster/main/binary-armel/ and
https://archive.debian.org/debian/dists/buster-updates/main/binary-armel/.

The 
https://security.debian.org/debian-security/dists/buster/updates/main/binary-armel
is now gone, is the intent for it to show up on archive.debian.org in
some form?



Re: changing existing entries in debian/changelog

2024-05-24 Thread Johannes Schauer Marin Rodrigues
Quoting Bill Allombert (2024-05-24 10:54:32)
> Le Fri, May 24, 2024 at 09:30:44AM +0200, Bastian Venthur a écrit :
> > Hi,
> > 
> > I'm having troubles finding the relevant parts in the developers reference.
> > I've uploaded a version to experimental and later found out that this
> > version fixes several bugs.
> > 
> > Can I rewrite existing changelog entries for already uploaded versions with
> > the next upload, i.e. by adding the relevant "closes" line to the previsions
> > version?
> 
> You need to use the option -v of dpkg-genchanges so that the relevant
> bugs are listed in the .changes file, so that they get automatically closed.

But then they get closed by the wrong version, no? Dev-ref says:

https://www.debian.org/doc/manuals/developers-reference/pkgs.en.html#when-bugs-are-closed-by-new-uploads

> To close any remaining bugs that were fixed by your upload, email the
> .changes file to xxx-d...@bugs.debian.org, where XXX is the bug number, and
> put Version: YYY and an empty line as the first two lines of the body of the
> email, where YYY is the first version where the bug has been fixed.

When I don't have the .changes file anymore, I just mail
xxx-d...@bugs.debian.org with a mail that has the "Version: YYY" line at the
top and then in the body explains that I'm manually closing it because I made a
mistake.

Thanks!

cheers, josch

signature.asc
Description: signature


Re: changing existing entries in debian/changelog

2024-05-24 Thread Bill Allombert
Le Fri, May 24, 2024 at 09:30:44AM +0200, Bastian Venthur a écrit :
> Hi,
> 
> I'm having troubles finding the relevant parts in the developers reference.
> I've uploaded a version to experimental and later found out that this
> version fixes several bugs.
> 
> Can I rewrite existing changelog entries for already uploaded versions with
> the next upload, i.e. by adding the relevant "closes" line to the previsions
> version?

You need to use the option -v of dpkg-genchanges so that the relevant
bugs are listed in the .changes file, so that they get automatically
closed.

Cheers,
-- 
Bill. 

Imagine a large red swirl here.



Re: changing existing entries in debian/changelog

2024-05-24 Thread Johannes Schauer Marin Rodrigues
Quoting Andrey Rakhmatullin (2024-05-24 09:37:45)
> On Fri, May 24, 2024 at 09:30:44AM +0200, Bastian Venthur wrote:
> > I'm having troubles finding the relevant parts in the developers reference.
> > I've uploaded a version to experimental and later found out that this
> > version fixes several bugs.
> > 
> > Can I rewrite existing changelog entries for already uploaded versions with
> > the next upload, i.e. by adding the relevant "closes" line to the previsions
> > version?
> You can if you want but it won't close the bugs, you'll still need to
> close them properly with manual action. SO it may be easier to just not edit
> them.

When I forget to add the "closes:" line to d/changelog, I will add it
retroactively (after having closed the bugs with the correct version manually)
because it allows others as well as future-me to look up in d/changelog to
which changes correspond to which bugs and bugs will have much more context for
a problem than a line in d/changelog.

Thanks!

cheers, josch

signature.asc
Description: signature


Re: changing existing entries in debian/changelog

2024-05-24 Thread Andrey Rakhmatullin
On Fri, May 24, 2024 at 09:30:44AM +0200, Bastian Venthur wrote:
> I'm having troubles finding the relevant parts in the developers reference.
> I've uploaded a version to experimental and later found out that this
> version fixes several bugs.
> 
> Can I rewrite existing changelog entries for already uploaded versions with
> the next upload, i.e. by adding the relevant "closes" line to the previsions
> version?
You can if you want but it won't close the bugs, you'll still need to
close them properly with manual action. SO it may be easier to just not
edit them.

-- 
WBR, wRAR


signature.asc
Description: PGP signature


changing existing entries in debian/changelog

2024-05-24 Thread Bastian Venthur

Hi,

I'm having troubles finding the relevant parts in the developers 
reference. I've uploaded a version to experimental and later found out 
that this version fixes several bugs.


Can I rewrite existing changelog entries for already uploaded versions 
with the next upload, i.e. by adding the relevant "closes" line to the 
previsions version?



Cheers,

Bastian

--
Dr. Bastian Venthur https://venthur.de
Debian Developer venthur at debian org



Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-22 Thread Paul Gevers

Hi

On 21-05-2024 1:08 p.m., Sean Whitton wrote:

PS: I've always wondered if the dgit server shouldn't track history, even if
uploads don't happen via it. A dgit clone could (should?) already provide
available history, even if no upload happened via it yet.


Well, 'dgit clone' adds a vcs-git remote pointing at the maintainer's
history.  So it sort of does this.  We could make it do more.


Huh. Than my workflow hides this. All I'm often seeing is just the tar 
content represented in a commit, the latest Debian packing in another 
and the merge of these two (if I recall and describe what I recall 
correctly). I always thought that dgit clone generated that on my 
computer if there was no git content on the dgit server. I'll try to 
remember this next time I run my no-changes-source-only upload script.


Paul


OpenPGP_signature.asc
Description: OpenPGP digital signature


Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-21 Thread Bernd Zeimetz
On Tue, 2024-05-21 at 09:11 -0600, Sam Hartman wrote:
> > > > > > "Otto" == Otto Kekäläinen  writes:
>     Otto> Would you be kind and try to understand the opposing
> viewpoint
>     Otto> by trying it for one day?
> 
>     Otto> You could go to
>     Otto>
> https://salsa.debian.org/debbugs-team/debbugs/-/merge_requests/19
>     Otto> and conduct a code review?
> 
> I have not done a code review  of that particular patch on salsa.
> I have done code reviews on salsa, many other gitlabs, and github.
> I find doing a code review in a web page far more frustrating than in
> email.

There are external paid integrations for gitlab which provide the
feature to send emails with full diffs for projects, so there should be
a way to add this feature to the Debian gitlab. I would guess by using
the API.
You can comment on merge requests by email already and you should even
be able to create a new one by mail (that feature exists in gitlab, no
idea if its enabled on salsa and I've never tried it anywhere else).

So I think if this is a feature more people are missing, find them and
spend some time together on creating an external service for salsa that
provides it would be well spent time.



-- 
 Bernd ZeimetzDebian GNU/Linux Developer
 http://bzed.dehttp://www.debian.org
 GPG Fingerprint: ECA1 E3F2 8E11 2432 D485  DD95 EB36 171A 6FF9 435F



Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-21 Thread Otto Kekäläinen
Hi!

On Sun, 19 May 2024 at 20:48, Don Armstrong  wrote:
>
> On Sun, 19 May 2024, Bill Allombert wrote:
> > Also debbugs is a special case:
> > The debbugs Debian package (as opposed to the debbugs software) have never 
> > been
> > really maintained. I am actually one of the very few users of this package
> > and I tried several times to get the maintainers to do a new upload but they
> > were clearly not interested.
>
> It's more that I'm prioritizing spending my (very) limited Debian time
> on keeping bugs.debian.org and debbugs itself working (and [very slowly]
> developing a new version of Debbugs with a more modern design in the
> hopes that others will contribute.)

Everyone else has very limited time to contribute to Debian as well.
Therefore we all need to think about what is the most efficient
workflow.

Perhaps you could consider how you can be a force multiplier and scale
your work? You could for example add some of the recent contributors as
developers or maintainers at
https://salsa.debian.org/groups/debbugs-team/-/group_members so they
can review/merge/push code, and you could review all submissions at
https://salsa.debian.org/debbugs-team/debbugs/-/merge_requests and
grow those contributors into co-maintainers instead of just ignoring
them?

Perhaps you can also consider optimizing your git workflows? For
example in the case of
https://salsa.debian.org/debbugs-team/debbugs/-/merge_requests/19 you
could have simply pressed "Merge" and everything would be good. Now
you decided to not use any of the support Salsa/Salsa-CI provides, you
did extra work to cherry-pick some commits (but not all), added your
extra commit to break the build and now there is new follow-up work to
be done for lapses that could have been easily avoided if Salsa-CI was
enabled.. (I did submit MR!20 though, you can just merge it)

I started this thread "Salsa - best thing in Debian in recent years?"
by asking people who resist Salsa to at least try using it for a while
before criticizing it so much.

What happened in this episode is a case in point. You sit in a "local
optima" of your current workflow and are not willing to invest a bit
extra effort to get to a place where Salsa+Salsa-CI can benefit and
decrease your extra work burden. Now both you and me ended up having
to do extra work that could easily have been avoided..

Personally I like Salsa a lot, and collaboration with maintainers who
embrace Salsa is a breeze, and I feel that my limited Debian time is
relatively productive. That is all thanks to Salsa. I wish those who
are not yet using it would give it a sincere try.



Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-21 Thread Sam Hartman
>>>>> "Otto" == Otto Kekäläinen  writes:
Otto> Would you be kind and try to understand the opposing viewpoint
Otto> by trying it for one day?

Otto> You could go to
Otto> https://salsa.debian.org/debbugs-team/debbugs/-/merge_requests/19
Otto> and conduct a code review?

I have not done a code review  of that particular patch on salsa.
I have done code reviews on salsa, many other gitlabs, and github.
I find doing a code review in a web page far more frustrating than in
email.
I appreciate other people have different experience.
Some of my experience but not all is  accessibility related.

I do find that   trying to put everyone into one user interface--whether
it is github or gitlab or whatever--means some people are going to be
left out.
Interfaces like email mean that people can develop their own tooling.
And for those who do and find tooling they really like that's superior
to a common UI like gitlab for *those people*.
But it's going to be inferior for people who do not spend significant
time on tooling; for those people a common web ui is going to be
superior.

And you can say that I can use my own tooling with gitlab.
That's sort of true.  But then you or people like you will get
frustrated  that I don't interact with your per-commit-line comments
entered in the website, or go to the website to resolve comments or
whatever.
And you'll say that if I just tried the website I'd like it.
And that won't be true, because I have, I do use it in my day job, and I
don't really like it that much.

Even so, I think it is enough better that Debian should move in that
direction.

But Otto, I would encourage you to have more compassion for people who
work with the world differently than you.
In this thread, and in the krb5 merge request we are discussing, you
really do seem to be jumping to an assumption that everyone approaches
code the same way.
And you don't appear to be taking the time to understand or value how
the people you are interacting with may deal with the world differently.

Rather than simply asking people  to try out your way, I'd encourage you
to ask me and others how they deal with code and what they like about
their work flow.
I'm not going to ask you to try it out, because it probably won't work
for you.
You've found something you  think is great.
But I am going to ask you to ask and listen.

I do think we should fall in on the salsa way.  I think it will
generally be better overall.
I do think some of us will suffer as a result.

But there appears to be an assumption here that if we just all tried
this new thing it would be great.
I would appreciate compassion for our differences and for how that's
just not true.
There will be trade offs.

--Sam



Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-21 Thread Luca Boccassi
On Tue, 21 May 2024 at 14:13, Andrey Rakhmatullin  wrote:
>
> On Tue, May 21, 2024 at 08:45:50PM +0900, Simon Richter wrote:
> > Hi,
> >
> > On 5/21/24 15:54, Andrey Rakhmatullin wrote:
> >
> > > > The Debian archive itself is a VCS, so git-maintained packaging is also 
> > > > a
> > > > duplication, and keeping the official VCS and git synchronized is 
> > > > causing
> > > > additional work for developers, which is why people are opposed to 
> > > > having it
> > > > mandated.
> >
> > > The Debian archive itself is a *bad* and *poor* VCS. It should be obvious
> > > in which areas it's poor, and it's bad e.g. because force pushes are
> > > enabled, the history is periodically truncated (though there is no easy
> > > way to get it anyway) etc.
> >
> > All of these things are *also* explicit features. We need a way to unpublish
> > things, and mirrors only want to keep a shallow subset.
> We don't have a way to unpublish things, and force pushes I meant are
> uploading things without including all previous changes, like all those
> NMUs silently not included in the next maintainer uploads.
> But, sure, some of the problems we have are explicitly features.
>
> > Representing the Debian archive in git would probably look like a massive
> > amount of submodules, because that's the only way to represent state across
> > multiple projects without extending it
> Sorry? I don't understand what you would use submodules for. Unless you
> meant literally mapping archive-as-VCS to a single literal VCS repo?

Yeah, I don't understand that either. It seems there is some
misunderstanding, the suggestion to use Salsa doesn't mean that the
current ftp servers are retired. It just means that Salsa is used for
sources, like it is already used in ~90% of the packages today as per
trends.debian.net. Now, whether someone wants to make tarballs and ftp
uploads happen transparently behind the curtain in a salsa-ci job or
something like that is really orthogonal to the idea that sources need
to be stored in git.



Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-21 Thread Holger Levsen
On Mon, May 20, 2024 at 04:11:02AM +0900, Simon Richter wrote:
> The Debian archive itself is a VCS, so git-maintained packaging is also a
> duplication, and keeping the official VCS and git synchronized is causing
> additional work for developers, which is why people are opposed to having it
> mandated.

I don't follow this conclusion because the premise "the Debian archive itself is
a VCS" is as right or wrong as the statements "earth is clock" or an "ocean is a
washing machine".

Or, to put it differently, "vi $file ; cp $file $file.bak ; vi $file" is also 
a VCS, but an even poorer one than the Debian archive.

Just because something has some VCS like properties it doesn't make it a VCS
as in the sense as people understand it in 2024.

IMO (very few) people object using a(n official) VCS is because it would change
their workflows and/or because they believe their needs are more important than
our needs. And saying "the Debian archive is a VCS and that causes conflicts
with another VCS" is a red herring at best, because as dak+git or dak+vim+copy
shows (or gosh, using different git repos) that using several VCS is possible 
and
done by millions daily.


-- 
cheers,
Holger

 ⢀⣴⠾⠻⢶⣦⠀
 ⣾⠁⢠⠒⠀⣿⡁  holger@(debian|reproducible-builds|layer-acht).org
 ⢿⡄⠘⠷⠚⠋⠀  OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C
 ⠈⠳⣄

It's not climate change nor climate crisis, it's climate disaster.


signature.asc
Description: PGP signature


Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-21 Thread Andrey Rakhmatullin
On Tue, May 21, 2024 at 08:45:50PM +0900, Simon Richter wrote:
> Hi,
> 
> On 5/21/24 15:54, Andrey Rakhmatullin wrote:
> 
> > > The Debian archive itself is a VCS, so git-maintained packaging is also a
> > > duplication, and keeping the official VCS and git synchronized is causing
> > > additional work for developers, which is why people are opposed to having 
> > > it
> > > mandated.
> 
> > The Debian archive itself is a *bad* and *poor* VCS. It should be obvious
> > in which areas it's poor, and it's bad e.g. because force pushes are
> > enabled, the history is periodically truncated (though there is no easy
> > way to get it anyway) etc.
> 
> All of these things are *also* explicit features. We need a way to unpublish
> things, and mirrors only want to keep a shallow subset.
We don't have a way to unpublish things, and force pushes I meant are
uploading things without including all previous changes, like all those
NMUs silently not included in the next maintainer uploads.
But, sure, some of the problems we have are explicitly features.

> Representing the Debian archive in git would probably look like a massive
> amount of submodules, because that's the only way to represent state across
> multiple projects without extending it 
Sorry? I don't understand what you would use submodules for. Unless you
meant literally mapping archive-as-VCS to a single literal VCS repo?


-- 
WBR, wRAR


signature.asc
Description: PGP signature


Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-21 Thread Simon Richter

Hi,

On 5/21/24 15:54, Andrey Rakhmatullin wrote:


The Debian archive itself is a VCS, so git-maintained packaging is also a
duplication, and keeping the official VCS and git synchronized is causing
additional work for developers, which is why people are opposed to having it
mandated.



The Debian archive itself is a *bad* and *poor* VCS. It should be obvious
in which areas it's poor, and it's bad e.g. because force pushes are
enabled, the history is periodically truncated (though there is no easy
way to get it anyway) etc.


All of these things are *also* explicit features. We need a way to 
unpublish things, and mirrors only want to keep a shallow subset.


Representing the Debian archive in git would probably look like a 
massive amount of submodules, because that's the only way to represent 
state across multiple projects without extending it -- and extending is 
a big no-no, because then we'd lose all the forge support. Submodules 
cannot represent the pristine-tar branch though.



It makes sense that some people want to replace it with a good VCS, but I
agree that adding a good VCS only gives us two VCSes because replacing
will never happen.


There are two axes here -- "good" and "fits the use case."

What I'm arguing is that git does not fit our use case, despite being 
good, because it is designed for something else. We can make it fit our 
use case by wrapping it, but then we have a choice between a thin veneer 
that breaks easily as people use git commands inside a source tree, when 
they should only be using gbp commands, or a completely opaque wrapper 
that loses us all the git integration from third-party tools like forges.


Because git treats packaging metadata as data, no correctness of 
metadata is enforced at this level. We could add this in the form of 
upload hooks, but then people would start complaining that they want to 
use the tools like they want. They would be wrong, but that is what 
happens with leaky abstractions.


This is the exact opposite of the mandatory-debhelper debate: requiring 
declarative packaging (and therefore calcifying all custom sequences 
into debhelper plugins) is precisely the opposite of "using git because 
it is familiar" -- the benefit of using the abstraction comes from 
denying access to the layer below and therefore hiding its complexity.


   Simon



Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-21 Thread Sean Whitton
Hello,

On Sun 19 May 2024 at 10:05am +02, Paul Gevers wrote:

>
> PS: I've always wondered if the dgit server shouldn't track history, even if
> uploads don't happen via it. A dgit clone could (should?) already provide
> available history, even if no upload happened via it yet.

Well, 'dgit clone' adds a vcs-git remote pointing at the maintainer's
history.  So it sort of does this.  We could make it do more.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-21 Thread Sean Whitton
Hello,

On Sun 19 May 2024 at 12:32pm -07, Otto Kekäläinen wrote:

> You could go to
> https://salsa.debian.org/debbugs-team/debbugs/-/merge_requests/19 and
> conduct a code review?
>
> You might discover that GitLab is useful and is not duplicating
> Debbugs or anything else in Debian - it is currently the only platform
> to conduct code reviews on in a way that has automatic testing and
> comment-response-resolved -tracking. Doing code reviews patches
> attached in email does not have that.
>
> If you try it out, and still think Salsa is bad for Debian, then I am
> more willing to accept your stanze.

I have tried it out, and am happy for those maintainers that like it to
use it, but I do not want to maintain most of my packages that way.
I want people to send me patches to the BTS / project ML.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-21 Thread Andrey Rakhmatullin
On Mon, May 20, 2024 at 04:11:02AM +0900, Simon Richter wrote:
> > My concern about Gitlab is not its *additions* to existing services, but
> > its *duplications* of core services already in Debian.
> 
> I agree, that's the key problem.
> 
> The Debian archive itself is a VCS, so git-maintained packaging is also a
> duplication, and keeping the official VCS and git synchronized is causing
> additional work for developers, which is why people are opposed to having it
> mandated.
The Debian archive itself is a *bad* and *poor* VCS. It should be obvious
in which areas it's poor, and it's bad e.g. because force pushes are
enabled, the history is periodically truncated (though there is no easy
way to get it anyway) etc.
It makes sense that some people want to replace it with a good VCS, but I
agree that adding a good VCS only gives us two VCSes because replacing
will never happen.


-- 
WBR, wRAR


signature.asc
Description: PGP signature


Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-20 Thread Bill Allombert
On Sun, May 19, 2024 at 08:38:58PM -0700, Don Armstrong wrote:
> On Sun, 19 May 2024, Bill Allombert wrote:
> > Also debbugs is a special case:
> > The debbugs Debian package (as opposed to the debbugs software) have never 
> > been
> > really maintained. I am actually one of the very few users of this package
> > and I tried several times to get the maintainers to do a new upload but they
> > were clearly not interested.
> 
> It's more that I'm prioritizing spending my (very) limited Debian time
> on keeping bugs.debian.org and debbugs itself working (and [very slowly]
> developing a new version of Debbugs with a more modern design in the
> hopes that others will contribute.)
> 
> > Ideally debbugs should be made non-native so that some else could
> > maintain the Debian package.
> 
> I'm happy to review patches that get the 2.6 branch of debbugs in shape
> where it can be released into Debian again if someone wants to take that
> effort. 

But precisely, one should not need to wait for a new 'upstream release' to
fix RC bugs that prevent the package to be part of a stable release.
Making it non native would allow that without requiring more of your time.

> I've just assumed that anyone using that package was running
> unstable or running debbugs out of git.

Perforce, since the package has not been in stable or testing for years.

Cheers,
-- 
Bill. 

Imagine a large red swirl here. 



gzip --rsyncable (was: Re: De-vendoring gnulib in Debian packages)

2024-05-20 Thread Simon Josefsson
"Theodore Ts'o"  writes:

> On Sun, May 12, 2024 at 04:27:06PM +0200, Simon Josefsson wrote:
>> Going into detail, you use 'gzip -9n' but I use git-archive defaults
>> which is the same as -n aka --no-name.  I agree adding -9 aka --best is
>> an improvement.  Gnulib's maint.mk also add --rsyncable, would you agree
>> that this is also an improvement?
>
> I'm not convinced --rsyncable is an improvement.  It makes the
> compressed object slightly larger, and in exchange, if the compressed
> object changes slightly, it's possible that when you rsync the changed
> file, it might be more efficient.  But in the case of PGP signed
> release tarballs, the file is constant; it's never going to change,
> and even if there are slight changes between say, e2fsprogs v1.47.0
> and e2fsprogs v1.47.1, in practice, this is not something --rsyncable
> can take advantage of, unless you manually copy
> e2fsprogs-v1.47.0.tar.gz to e2fsprogs-v1.47.1.tar.bz, and then rsync
> e2fsprogs-v1.471.tar.g and I don't think anyone is doing this,
> either automatically or manually.
>
> That being said, --rsyncable is mostly harmless, so I don't have
> strong feelings about changing it to add or remove in someone's
> release workflow.

Your example had me convinced, and I thought some more about why we
really should keep using it as it consumes a small percentage more CPU
and disk space.  I have realized that another common operation is
storing and transfering _several_ different releases of e2fsprogs.  I
would suspect that most releases of software is fairly similar to the
previous release when uncompressed.  With gzip --rsyncable, the tarballs
should then be mostly similar.  Without --rsyncable, they will largely
be different if I understand correctly.  This affects dedup-able storage
and transfer methods, and some anecdotical evidence suggests this
improvement is significant - going from 215GB to 176GB vs 13GB:

https://gitlab.archlinux.org/archlinux/infrastructure/-/merge_requests/429

Maybe someone could do some experiment to see if there is substance to
this argument, its not clear to me that the example is comparable.
Storing/transferring several releases for the same software could add
significant savings for larger set of archives.

As the downside seems fairly small, and the potential upside may be
significant, I will use and recommend --rsyncable for git-archive
release tarballs:

   git archive --format=tar --prefix=$PACKAGE-$VERSION/ HEAD | \
  env GZIP= gzip --no-name --best --rsyncable \
  > $PACKAGE-$VERSION-src.tar.gz

/Simon


signature.asc
Description: PGP signature


Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-20 Thread Otto Kekäläinen
> > Ideally debbugs should be made non-native so that some else could
> > maintain the Debian package.
>
> I'm happy to review patches that get the 2.6 branch of debbugs in shape
> where it can be released into Debian again if someone wants to take that
> effort. I've just assumed that anyone using that package was running
> unstable or running debbugs out of git.

I did not notice the release_2.6 branch before. What is the intent
with that branch? Do you want people to submit patches targeting
'master' or 'release_2.6'? How often do you plan to merge it to or
from 'master'?

The 'master' branch is still the default branch. The
https://salsa.debian.org/debbugs-team/debbugs/-/blob/master/README.md
does not mention anything about release_2.6. Should it?

I am a big fan of READMEs and recommend using them to convey guidance
to contributors (assuming you want to have contributors).



Re: Debian 10 "buster" moved to archive.debian.org

2024-05-20 Thread Leandro Cunha
Hi Otto,

In Buster's case, it would be becoming an ELTS soon and would have to use
Freexian's repositories. It would no longer be the security team with DLAs
that would take care of CVEs for ELTS, but the Frexian team.

So much so that if I look at the links below I didn't find anything (about
security) for versions with extended support.
https://archive.debian.org/debian/dists/
https://security.debian.org/debian-security/dists/

This point you mentioned is relevant. I will be following the finally of
this conversation.
Look, I hope I helped in some way and I realize that many users don't know
the Freexian repositories.

[1] https://www.freexian.com/lts/php/docs/access-apt-repositories
[2] https://wiki.debian.org/LTS/Extended

Cheers,

Leandro Cunha


Re: Debian 10 "buster" moved to archive.debian.org

2024-05-20 Thread Otto Kekäläinen
On Sat, 23 Mar 2024 at 01:32, Ansgar   wrote:
>
> Hi,
>
> Debian 10 "buster" has moved to archive.debian.org in order to free
> space on the main mirror network.  We plan to start removing files for
> non-LTS architectures in about two weeks; the existing Release files
> will then refer to no longer existing files on the main mirror network.
>
> An exception is the security archive (which already has no non-LTS
> architectures): we will only archive it after LTS support ended.

Would it be feasible to mirror the security section to
archive.debian.org as well?

As of today for example if one uses Buster on armhf one needs to have
the repos pointing to archive.debian.org but security still pointing
to deb.debian.org, which is confusing. It would be simpler for systems
that still have Buster could switch to archive.debian.org in one go
and not have to do it twice (once for main, and later for security).



Err:3 http://archive.debian.org/debian-security buster/updates Release
 404 Not Found [IP: 151.101.194.132 80]

Err:4 http://deb.debian.org/debian buster/main armel Packages
 404 Not Found [IP: 151.101.162.132 80]

Err:5 http://deb.debian.org/debian buster-updates/main armel Packages
 404 Not Found [IP: 151.101.162.132 80]



Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-19 Thread Don Armstrong
On Sun, 19 May 2024, Bill Allombert wrote:
> Also debbugs is a special case:
> The debbugs Debian package (as opposed to the debbugs software) have never 
> been
> really maintained. I am actually one of the very few users of this package
> and I tried several times to get the maintainers to do a new upload but they
> were clearly not interested.

It's more that I'm prioritizing spending my (very) limited Debian time
on keeping bugs.debian.org and debbugs itself working (and [very slowly]
developing a new version of Debbugs with a more modern design in the
hopes that others will contribute.)

> Ideally debbugs should be made non-native so that some else could
> maintain the Debian package.

I'm happy to review patches that get the 2.6 branch of debbugs in shape
where it can be released into Debian again if someone wants to take that
effort. I've just assumed that anyone using that package was running
unstable or running debbugs out of git.

-- 
Don Armstrong  https://www.donarmstrong.com

A people living under the perpetual menace of war and invasion is very
easy to govern. It demands no social reforms. It does not haggle over
expenditures on armaments and military equipment. It pays without
discussion, it ruins itself, and that is an excellent thing for the
syndicates of financiers and manufacturers for whom patriotic terrors
are an abundant source of gain.
 -- Anatole France



Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-19 Thread Simon Richter

Hi,

On 5/20/24 04:32, Otto Kekäläinen wrote:


I agree that duplication is bad - but I disagree that use of version
control duplicates the use of the Debian archive for source code
storage, or that use of GitLab for code reviews would duplicate
Debbugs.


Outside of DM uploads, I'm not sure that there is much of a need for a 
code review on packaging -- really what we want is to reduce the amount 
of code for packaging, by moving it into declarative frameworks whenever 
possible, so the vast majority of packaging changes should be trivial 
ones like upgrading a dependency version.



Would you be kind and try to understand the opposing viewpoint by
trying it for one day?


I am using it for most of my packages. It has not made my life easier, 
it's just another layer that I need to communicate my intentions through.


I generally do test builds of my packages in a local pbuilder instance, 
with a hook script to drop me into a shell if the build fails, so the 
workspace is kept for my investigation. The only CI system that offers a 
similar feature is Jenkins, but even there I can only inspect the files 
through a clunky web interface, as soon as I need to look at a binary 
file or search for a string, I need to download it as a zipfile, and 
re-running commands inside the same environment to test them is 
completely out.



You could go to
https://salsa.debian.org/debbugs-team/debbugs/-/merge_requests/19 and
conduct a code review?


At first glance, looks good to me.

Looking at the changes:

1. The outdated build dependency is not in the package currently in 
Debian. If it was, it would have been spotted by Debian's archive 
analysis tools already, without the need for a build attempt.


This static analysis is cheaper than a rebuild, so to achieve the same 
level of coverage, Salsa would need to perform a full archive rebuild 
daily, and it would still not catch the broken Suggests: in the binary.


2. The missing file in debian/docs was already reported as #903413.

3. The other changes are "upstream" changes, which should have a 
separate CI that is more extensive than "still builds."


Native packages should only be used for things where it does not make 
sense to maintain a separate upstream package because they only exist 
within the package ecosystem, like the "menu" package. Debbugs should 
really be split into separate "upstream" and "packaging" efforts.



You might discover that GitLab is useful and is not duplicating
Debbugs or anything else in Debian


Well, there is an issue tracker (where tickets go unresponded for a 
year), that is certainly a duplication of debbugs. It would make sense 
to maybe track "upstream" bugs there and forward them from debbugs (a 
feature not present in GitLab's issues handling, but important for 
package maintenance).


 - it is currently the only platform

to conduct code reviews on in a way that has automatic testing and
comment-response-resolved -tracking. Doing code reviews patches
attached in email does not have that.


Well, I take the diff, prepend each line with > and insert my comments, 
then send it back. The author then responds to that email, and once the 
discussion is over, I get a new proposed patch. Not much difference.



If you try it out, and still think Salsa is bad for Debian, then I am
more willing to accept your stanze.


It's not *bad*, but for a lot of our workflows, it's the wrong tool 
because the use cases it was designed for are different from ours, and 
there is little we can do to make them meet.


Debian's workflow for collaboration on things that are not yet 
release-ready is clunky to the point that almost no one uses it that 
way, but in principle it is there: one can always upload a package to 
experimental and get it autobuilt on the major architectures, and other 
DDs can download it from there if they want to take a look at it.


This workflow is what packaging in git mostly replaces: in 
pkg-electronics, we quite often have changes that are not ready for 
release that we want to distribute to the other team members. Quite 
often, these changes do not build straight away, and the reason they are 
shared is specifically so other people can take a look at them.


Git is a lot better for fostering this collaboration than uploads to 
experimental, because we get change tracking for individual files, which 
is invaluable when dealing with a behemoth like ghdl that takes a few 
hours to build and run tests.


The review process still takes place via mail here, because part of the 
process is that everyone involved needs to be able to build the package 
locally and investigate failures. We can quickly incorporate changes 
from others using git and do a minimal rebuild locally, that is useful, 
but this essentially means that we are pushing commits to an offside branch.


Attaching the discussion to individual changes is not that useful for us:

1. changing a

Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-19 Thread Otto Kekäläinen
Thanks for reply Jonas,

> > You could go to
> > https://salsa.debian.org/debbugs-team/debbugs/-/merge_requests/19 and
> > conduct a code review?
> >
> > You might discover that GitLab is useful and is not duplicating
> > Debbugs or anything else in Debian - it is currently the only platform
> > to conduct code reviews on in a way that has automatic testing and
> > comment-response-resolved -tracking. Doing code reviews patches
> > attached in email does not have that.
> >
> > If you try it out, and still think Salsa is bad for Debian, then I am
> > more willing to accept your stanze.
>
> But it *is* duplicating Debbugs: None of your valuable contributions
> posted as part of your code review appears on Debbugs.

Actually some of them are in Debbugs as patches, but hard to find as
there are 200+ open bugs.
However, the bugs.debian.org system does not offer code testing or
review facilitation.

Again, I invite you to test out
https://salsa.debian.org/debbugs-team/debbugs/-/merge_requests/19 for
_code review_ for the same reason I stated above.



Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-19 Thread Jonas Smedegaard
Quoting Otto Kekäläinen (2024-05-19 21:32:36)
> > > My concern about Gitlab is not its *additions* to existing services, but
> > > its *duplications* of core services already in Debian.
> >
> > I agree, that's the key problem.
> 
> I agree that duplication is bad - but I disagree that use of version
> control duplicates the use of the Debian archive for source code
> storage, or that use of GitLab for code reviews would duplicate
> Debbugs.
> 
> > > ...instead of lumping all those discussions into a discussion of ease of
> > > user interface for a single catch-all code forge that maybe make all those
> > > other complications go away by affecting all those questions and that way
> > > implicitly provides *some* answer to them all.
> >
> > Also, there is a difference between ease of use and intuitivity. GitLab
> > does not provide any tools that really make packaging easier. It is
> > initially more accessible to non-maintainers, because of familiarity,
> > but actual work happens outside of it.
> 
> Would you be kind and try to understand the opposing viewpoint by
> trying it for one day?
> 
> You could go to
> https://salsa.debian.org/debbugs-team/debbugs/-/merge_requests/19 and
> conduct a code review?
> 
> You might discover that GitLab is useful and is not duplicating
> Debbugs or anything else in Debian - it is currently the only platform
> to conduct code reviews on in a way that has automatic testing and
> comment-response-resolved -tracking. Doing code reviews patches
> attached in email does not have that.
> 
> If you try it out, and still think Salsa is bad for Debian, then I am
> more willing to accept your stanze.

But it *is* duplicating Debbugs: None of your valuable contributions
posted as part of your code review appears on Debbugs.

The developers of FreedomBox (which is a Debian Pure Blend, i.e. a
project fully within Debian) has embraced Salsa, and when I asked about
an issue with network instability for certain hardware, I was told that
it was in the issue tracker - which meant it was missing from Debbugs
while actively discussed in Salsa.

Salsa is *great* if you fully embrace it. Salsa is not good if you want
single features without fully embracing it.


 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/
 * Sponsorship: https://ko-fi.com/drjones

 [x] quote me freely  [ ] ask before reusing  [ ] keep private

signature.asc
Description: signature


Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-19 Thread Otto Kekäläinen
> > My concern about Gitlab is not its *additions* to existing services, but
> > its *duplications* of core services already in Debian.
>
> I agree, that's the key problem.

I agree that duplication is bad - but I disagree that use of version
control duplicates the use of the Debian archive for source code
storage, or that use of GitLab for code reviews would duplicate
Debbugs.

> > ...instead of lumping all those discussions into a discussion of ease of
> > user interface for a single catch-all code forge that maybe make all those
> > other complications go away by affecting all those questions and that way
> > implicitly provides *some* answer to them all.
>
> Also, there is a difference between ease of use and intuitivity. GitLab
> does not provide any tools that really make packaging easier. It is
> initially more accessible to non-maintainers, because of familiarity,
> but actual work happens outside of it.

Would you be kind and try to understand the opposing viewpoint by
trying it for one day?

You could go to
https://salsa.debian.org/debbugs-team/debbugs/-/merge_requests/19 and
conduct a code review?

You might discover that GitLab is useful and is not duplicating
Debbugs or anything else in Debian - it is currently the only platform
to conduct code reviews on in a way that has automatic testing and
comment-response-resolved -tracking. Doing code reviews patches
attached in email does not have that.

If you try it out, and still think Salsa is bad for Debian, then I am
more willing to accept your stanze.


- Otto



Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-19 Thread Simon Richter

Hi,

On 5/19/24 16:11, Jonas Smedegaard wrote:


My concern about Gitlab is not its *additions* to existing services, but
its *duplications* of core services already in Debian.


I agree, that's the key problem.

The Debian archive itself is a VCS, so git-maintained packaging is also 
a duplication, and keeping the official VCS and git synchronized is 
causing additional work for developers, which is why people are opposed 
to having it mandated.


The Debian archive is purpose-built for packaging, while git is 
general-purpose, and does not exactly fit our existing workflows. The 
main thing it adds is collaboration without releases.


It is quite obvious we want something like that, so we need to go back 
to the design of the Debian system and look if we can add flows to 
facilitate that.


The current debate feels a lot like "we need collaboration without 
releases as a feature, git provides that, let's use git", but we have 
more requirements than that, and my feeling is that these are falling by 
the wayside.



...instead of lumping all those discussions into a discussion of ease of
user interface for a single catch-all code forge that maybe make all those
other complications go away by affecting all those questions and that way
implicitly provides *some* answer to them all.


Also, there is a difference between ease of use and intuitivity. GitLab 
does not provide any tools that really make packaging easier. It is 
initially more accessible to non-maintainers, because of familiarity, 
but actual work happens outside of it.


   Simon


OpenPGP_0xEBF67A846AABE354.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature


Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-19 Thread Bill Allombert
On Sat, May 18, 2024 at 08:25:10PM -0700, Otto Kekäläinen wrote:
> Hi Bill and Wookey!
> 
> In a recent long thread on debian-devel you had somewhat negative
> sentiments towards the usefulness of Salsa.

I am not sure this characterize my position. I have no opposition to
Salsa (even though it is missing features Alioth had I relied on),
I am opposed to be forced to use it when it just increases
bureaucracy.

> I do see you doing good
> technical work for Debian and recently a MR from Bill too, so I was
> thinking that maybe you will change your mind when you read more
> in-depth arguments. This is my attempt to have you think about Salsa
> in a new light:
> 
> On Tue, 9 Apr 2024 at 11:41, Bill Allombert  wrote:
> > Having a repository on salsa or even "packaging team" does not prevent
> > a lack of maintainer, so this is not relevant.
> > Without a maintainer, no contribution will be merged in any case.
> 
> Consider this Merge Request to fix debbugs builds immediately, and to
> include Salsa-CI to keep the build from regressing again:
> https://salsa.debian.org/debbugs-team/debbugs/-/merge_requests/19

debbugs is a Debian-native package. So of course it needs an upstream git
repository.  All my Debian-native packages are maintained on Salsa (and before
Salsa on Alioth).

The MR I did was for lintian which is also Debian-native.

Also debbugs is a special case:
The debbugs Debian package (as opposed to the debbugs software) have never been
really maintained. I am actually one of the very few users of this package
and I tried several times to get the maintainers to do a new upload but they
were clearly not interested.
Ideally debbugs should be made non-native so that some else could maintain the
Debian package.

Cheers,
-- 
Bill. 

Imagine a large red swirl here. 



Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-19 Thread Jonas Smedegaard
Quoting Mathias Behrle (2024-05-19 11:08:58)
> * Jonas Smedegaard: " Re: Salsa - best thing in Debian in recent years? (Re:
>   finally end single-person maintainership)" (Sun, 19 May 2024 10:47:38 
> +0200):
> 
> 
> > i.e. you are being
> > asocial if you don't, and can expect your behavior being discussed as a
> > public-wide issue for the project).
> 
> I very much agree with all what you say, however could we rather say instead
> 
> -> i.e. you are not being collaborator friendly, and can expect your behavior 
> be
> frowned upon...
> 
> I am not a native english speaker, I think we can avoid to trap in a can of
> worms with problematic terms like 'asocial, unsocial, anti-social...' which
> could have quite special meanings in different cultures.

Thanks for raising awareness to this.  I was unaware that "asocial" was
disruptive to the conversation, but indeed danish dictionaries (I am no
native english speaker either) flag that word as condescending.


 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/
 * Sponsorship: https://ko-fi.com/drjones

 [x] quote me freely  [ ] ask before reusing  [ ] keep private

signature.asc
Description: signature


Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-19 Thread Mathias Behrle
* Jonas Smedegaard: " Re: Salsa - best thing in Debian in recent years? (Re:
  finally end single-person maintainership)" (Sun, 19 May 2024 10:47:38 +0200):


> i.e. you are being
> asocial if you don't, and can expect your behavior being discussed as a
> public-wide issue for the project).

I very much agree with all what you say, however could we rather say instead

-> i.e. you are not being collaborator friendly, and can expect your behavior be
frowned upon...

I am not a native english speaker, I think we can avoid to trap in a can of
worms with problematic terms like 'asocial, unsocial, anti-social...' which
could have quite special meanings in different cultures.

Best,
Mathias

-- 

Mathias Behrle
PGP/GnuPG key availabable from any keyserver, ID: 0xD6D09BE48405BBF6
AC29 7E5C 46B9 D0B6 1C71  7681 D6D0 9BE4 8405 BBF6



Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-19 Thread Jonas Smedegaard
Quoting Paul Gevers (2024-05-19 10:05:38)
> In this discussion about mandating things, I've been wondering
> 
> On 19-05-2024 9:11 a.m., Jonas Smedegaard wrote:
> >   * mandate VCS-tracking
> > * Yes
> >   * mandate the use of one specific VCS
> > * Yes: git
> 
> What do people think this should mean, a *should* or *must* in policy? 
> That the package has a RC bug if the packaging isn't tracked in git? And 
> if the packaging is in git but I forgot to push my latest changes to the 
> documented git server (this happens regularly to me as I do most uploads 
> with dgit)? RC? In all suites where the packaging version isn't pushed 
> for? And how about NMU's? (I just checked a random package without git: 
> aspell-am, last non-NMU upload was in 2013)?
> 
> If *must* and thus RC, can the issue be fixed by "NMU"? I.e. if the 
> person that did the changes, (and has nice local commits) somehow isn't 
> available, will the package (if not key) be auto-removed? Or can 
> everybody fix the repo? What if you don't have write access to the 
> existing repo? And then what if the uploader comes back and tries to 
> push the real history? What if my harddisk with local changes crashes 
> before I push (again, I forget that sometimes, but for me luckily dgit 
> will mostly have the commits).
> 
> Or is this "just a bug", maybe even at level important, but no other 
> consequences. Than I think this discussion is going to be moot. I don't 
> think there's much forcing possible and I think most already agree that 
> stuff *should* be in VCS, so this isn't going to change for those in 
> favor. And does it really add enough value if those that are forced are 
> just going to do "gbp import-dsc" for each upload to the archive on a 
> ./debian only repository? Because that (or better) we could already 
> automate (see also my PS).

With "mandate" I do not mean kick out if non-compliant.  Same as we (as
far as I am aware) mandate declaring Poilcy version followed by a
package, but don't kick out packages having mismatching declaration or
not following latest policy.

I think there is a big difference between saying that Salsa (or git, og
Debbugs, or public-wide WNPP work tracking) is an optional addon to
Debian, to saying that it is expected of everyone (i.e. you are being
asocial if you don't, and can expect your behavior being discussed as a
public-wide issue for the project).

So I disagree that tool-use severity of "important" makes progress moot.

I have met developers who have the view that we are already at the point
of non-use of Salsa being asocial behavior, and had at least one very
interested (and calm) exchange of such differing views at Debconf in
Kosovo.  Deciding project-wide where we are on that scale do help, I
think.


> PS: I've always wondered if the dgit server shouldn't track history, 
> even if uploads don't happen via it. A dgit clone could (should?) 
> already provide available history, even if no upload happened via it yet.

All the points that I listed are all about optional/expected/required
*contributor* streamlining.

If I understand your comment above about dgit correctly, it is about
automation of history tracking, which is (mostly) orthogonal to
*contributor* streamlining.

 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/
 * Sponsorship: https://ko-fi.com/drjones

 [x] quote me freely  [ ] ask before reusing  [ ] keep private

signature.asc
Description: signature


Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-19 Thread Paul Gevers

Two mistakes spotted 

On 19-05-2024 10:05 a.m., Paul Gevers wrote:
I think there's a large majority (maybe 
even consensus) that believe you *should* have the packaging in VCS


I meant "at least should", as in "should or must".


I think what pere did [3]


[3] 
https://people.skolelinux.org/pere/blog/45_orphaned_Debian_packages_moved_to_git__391_to_go.html


Paul


OpenPGP_signature.asc
Description: OpenPGP digital signature


Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-19 Thread Paul Gevers

Hi all,

In this discussion about mandating things, I've been wondering

On 19-05-2024 9:11 a.m., Jonas Smedegaard wrote:

  * mandate VCS-tracking
* Yes
  * mandate the use of one specific VCS
* Yes: git


What do people think this should mean, a *should* or *must* in policy? 
That the package has a RC bug if the packaging isn't tracked in git? And 
if the packaging is in git but I forgot to push my latest changes to the 
documented git server (this happens regularly to me as I do most uploads 
with dgit)? RC? In all suites where the packaging version isn't pushed 
for? And how about NMU's? (I just checked a random package without git: 
aspell-am, last non-NMU upload was in 2013)?


If *must* and thus RC, can the issue be fixed by "NMU"? I.e. if the 
person that did the changes, (and has nice local commits) somehow isn't 
available, will the package (if not key) be auto-removed? Or can 
everybody fix the repo? What if you don't have write access to the 
existing repo? And then what if the uploader comes back and tries to 
push the real history? What if my harddisk with local changes crashes 
before I push (again, I forget that sometimes, but for me luckily dgit 
will mostly have the commits).


Or is this "just a bug", maybe even at level important, but no other 
consequences. Than I think this discussion is going to be moot. I don't 
think there's much forcing possible and I think most already agree that 
stuff *should* be in VCS, so this isn't going to change for those in 
favor. And does it really add enough value if those that are forced are 
just going to do "gbp import-dsc" for each upload to the archive on a 
./debian only repository? Because that (or better) we could already 
automate (see also my PS).


I'm against mandating ("must"). I think there's a large majority (maybe 
even consensus) that believe you *should* have the packaging in VCS (and 
I agree with that). Most packages already are (hopefully maintained) in 
git (93% for testing) [1] on salsa (86%) [2], so I propose we stop the 
discussion. I think what pere did [3] changed more than this whole 
discussion: already 45 *orphaned* packages converted to git by 25 April, 
which means my numbers above are on the low side. The remaining 438 QA 
maintained (!!??) packages constitute close to 20% of the packages not 
in git.


Paul

PS: I've always wondered if the dgit server shouldn't track history, 
even if uploads don't happen via it. A dgit clone could (should?) 
already provide available history, even if no upload happened via it yet.


[1] https://trends.debian.net/vcs_testing-stacked.png
[2] https://trends.debian.net/vcs-hosting_testing-stacked.png


OpenPGP_signature.asc
Description: OpenPGP digital signature


Re: Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-19 Thread Jonas Smedegaard
Quoting Otto Kekäläinen (2024-05-19 05:25:10)
> In a recent long thread on debian-devel you had somewhat negative
> sentiments towards the usefulness of Salsa. I do see you doing good
> technical work for Debian and recently a MR from Bill too, so I was
> thinking that maybe you will change your mind when you read more
> in-depth arguments. This is my attempt to have you think about Salsa
> in a new light:
> 
> On Tue, 9 Apr 2024 at 11:41, Bill Allombert  wrote:
> > Having a repository on salsa or even "packaging team" does not prevent
> > a lack of maintainer, so this is not relevant.
> > Without a maintainer, no contribution will be merged in any case.
> 
> Consider this Merge Request to fix debbugs builds immediately, and to
> include Salsa-CI to keep the build from regressing again:
> https://salsa.debian.org/debbugs-team/debbugs/-/merge_requests/19
> 
> 1. If the package was not on git and Salsa, I would have no way to see
> what the maintainers have been doing in the years 2018-2023 (Debian
> repos had last upload in 2018)

With git (or another VCS) but *without Salsa, you would certainly not be
blind to existing development.

I agree with striving towards VCS tracking of all code in Debian, and
striving towards the use of a single VCS, and I think it is reasonable
to separate the discussion about that from the discussion about the
relevancy of Salsa.


> 2. If the package was not on Salsa, and had the MR feature active, I
> would not be able to submit a MR to fix the issues. Now the MR is up
> there, and anybody can review and comment it - thus we are not even
> dependent on the original maintainers alone.

With git but without Salsa, you would post a patch to Debbugs, that
would be up there for anybody to review and comment on.

Sure, you would not be able to specifically use a Gitlab routine without
having a Gitlab instance to do it on.  And reviewers and commenters
would need to be bothered with using email, which is different but not
inherently worse than having to be bothered with using Gitlab UIs.

Did you also post your MR as a patch in Debbugs?


> 3. The UI is easy and useful. I invite you to read my MR and add your
> review. I made have some extra instructions to make this very
> welcoming for people who do not "like" Salsa/GitLab and might feel
> that something is unintuitive

The UI of my email program is easy and useful.

You don't need to agree with me, you can pick another email system that
is more to your liking.  It is much harder with Gitlab to provide room
for different personal ways of working.  Please note, that I am here,
like yourself, not talking about different ways of structuring code in a
VCS, but about how the UI affects how you personally are able to
interact.

You and I quite likely use different text editor, and different email
application, and possibly also different web browser.  That affects how
easy and useful the personal end of collaboration is. The collective end
of collaboration must involve how (if at all) code is tracked in a VCS,
but it need not dictate UI at all.


> 4. If you don't want to use the web UI, you can also download my patch
> https://salsa.debian.org/debbugs-team/debbugs/-/merge_requests/19.patch
> and review by email. Or you can click in the UI once to subscribe the
> MR and then continue review/comments by email.

If you don't want to use a command-line or a scripted or a GUI-based
email application for receiving patches shared at Debbugs, you can use a
web-based email application - locally hosted or through a provider.

I already subscribe to Debbugs for the packages and teams I am most
interested in tracking contributions for.


> Personally I fully agree with the people stating that "Salsa is the
> best thing in Debian in the past 20 years". So far everyone I talked
> to who initially had reservations regarding using Salsa have started
> liking it after they learned a bit more how it works, and have seen
> things like Salsa-CI in action saving the Debian archive from needless
> widespread failures.

Debian is *not* helped by spreading issue tracking across multiple
independent data and communication networks.

My concern about Gitlab is not its *additions* to existing services, but
its *duplications* of core services already in Debian.

Please, let us separately discuss if we should...

 * mandate VCS-tracking
 * mandate the use of one specific VCS
 * mandate one specific VCS workflow
 * mandate collaborative packaging
 * mandate project-wide issue tracking
 * mandate a single project-wide issue-tracker

...instead of lumping all those discussions into a discussion of ease of
user interface for a single catch-all code forge that maybe make all those
other complications go away by affecting all those questions and that way
implicitly provides *some* answer to them all.

Personally, my curren

Salsa - best thing in Debian in recent years? (Re: finally end single-person maintainership)

2024-05-18 Thread Otto Kekäläinen
Hi Bill and Wookey!

In a recent long thread on debian-devel you had somewhat negative
sentiments towards the usefulness of Salsa. I do see you doing good
technical work for Debian and recently a MR from Bill too, so I was
thinking that maybe you will change your mind when you read more
in-depth arguments. This is my attempt to have you think about Salsa
in a new light:

On Tue, 9 Apr 2024 at 11:41, Bill Allombert  wrote:
> Having a repository on salsa or even "packaging team" does not prevent
> a lack of maintainer, so this is not relevant.
> Without a maintainer, no contribution will be merged in any case.

Consider this Merge Request to fix debbugs builds immediately, and to
include Salsa-CI to keep the build from regressing again:
https://salsa.debian.org/debbugs-team/debbugs/-/merge_requests/19

1. If the package was not on git and Salsa, I would have no way to see
what the maintainers have been doing in the years 2018-2023 (Debian
repos had last upload in 2018)

2. If the package was not on Salsa, and had the MR feature active, I
would not be able to submit a MR to fix the issues. Now the MR is up
there, and anybody can review and comment it - thus we are not even
dependent on the original maintainers alone.

3. The UI is easy and useful. I invite you to read my MR and add your
review. I made have some extra instructions to make this very
welcoming for people who do not "like" Salsa/GitLab and might feel
that something is unintuitive

4. If you don't want to use the web UI, you can also download my patch
https://salsa.debian.org/debbugs-team/debbugs/-/merge_requests/19.patch
and review by email. Or you can click in the UI once to subscribe the
MR and then continue review/comments by email.


Personally I fully agree with the people stating that "Salsa is the
best thing in Debian in the past 20 years". So far everyone I talked
to who initially had reservations regarding using Salsa have started
liking it after they learned a bit more how it works, and have seen
things like Salsa-CI in action saving the Debian archive from needless
widespread failures.

Thanks,

Otto



Accepted debian-science 1.14.6 (source) into unstable

2024-05-18 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 18 May 2024 22:50:49 +0200
Source: debian-science
Architecture: source
Version: 1.14.6
Distribution: unstable
Urgency: medium
Maintainer: Debian Science Team 

Changed-By: Andreas Tille 
Changes:
 debian-science (1.14.6) unstable; urgency=medium
 .
   * Remove r-cran-maptools from geography task since its removed from CRAN
   * Standards-Version: 4.7.0
   * meteorology-dev: s/pkg-config/pkgconf/
 .
   * start of automatic changelog entry *
 .
   * Changes in metapackage dependencies
-science-chemistry
 added:
   Recommends:  atomes
-science-dataacquisition-dev
 added:
   Recommends:  python3-trx-python
-science-datamanagement
 added:
   Recommends:  visidata
-science-geography
 removed:
   Recommends:  r-cran-maptools
-science-mathematics-dev
 added:
   Recommends:  libigraph-dev, liblibleidenalg-dev
 removed:
   Recommends:  libigraph0-dev
-science-statistics
 added:
   Recommends:  python3-hmmlearn
-science-viewing-dev
 added:
   Recommends:  python3-hvplot, python3-gneiss, python3-holoviews
Checksums-Sha1:
 dd4d36d851861b34e5f0d811df1351096d5a25ea 5324 debian-science_1.14.6.dsc
 ff51d649ead9a989630e4114d8b07a21f4b11504 107112 debian-science_1.14.6.tar.xz
 c0a8513a4b22d0e10d9575818a303e853365722e 19934 
debian-science_1.14.6_amd64.buildinfo
Checksums-Sha256:
 a9f4813efabf0d76affb8df0d6af7207692c9ec51e107b9a23fd60576297a400 5324 
debian-science_1.14.6.dsc
 87d6abc6aa63a4c07f9ec275fc71197d2f511f7a38aeb5715a45755d012d7f47 107112 
debian-science_1.14.6.tar.xz
 8980ce890204ea2d4c05ea72e8dd2f5c65ae919321b96b4a7afb7692dac39555 19934 
debian-science_1.14.6_amd64.buildinfo
Files:
 1f3ed72ff2a43b005f980c60d8907a0a 5324 science optional 
debian-science_1.14.6.dsc
 c27d68a885e71bedea4ec7deb039f7ee 107112 science optional 
debian-science_1.14.6.tar.xz
 9310b8ce4221cc34214406260f1467bc 19934 science optional 
debian-science_1.14.6_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=nJhZ
-END PGP SIGNATURE-



pgpMIWWPIPN0B.pgp
Description: PGP signature


Re: How to create a custom Debian ISO

2024-05-18 Thread Roland Clobus

+debian-live

Hello Aditya,

On 11/05/2024 10:21, Aditya Garg wrote:

I wanted to create a custom ISO of Debian, with the following customisations:

1. I want to add a custom kernel that supports my Hardware.
2. I want to add my own Apt repo which hosts various software packages to 
support my hardware.

I am not able to get any good documentation for the same. Please help.


Let me chime in on this thread as well.
I had a quick peek at the scripts you use [1].

It appears to me that you want to create a custom Debian Live ISO (not a 
netinst image). If so, you can take a look at live-build, which is used 
for the Debian live images.
Steps describing how to build a live ISO image are at [2] and a generic 
manual for live-build is at [3].


You can then build an ISO image from their packages, without the need 
for repacking (and automagically all checksums will match)


With kind regards,
Roland Clobus
Co-maintainer of live-build

[1] https://github.com/t2linux/T2-Ubuntu/tree/LTS
[2] https://wiki.debian.org/ReproducibleInstalls/LiveImages
[3] 
https://live-team.pages.debian.net/live-manual/html/live-manual/index.en.html




OpenPGP_signature.asc
Description: OpenPGP digital signature


Accepted rust-assorted-debian-utils 0.7.1-2 (source) into unstable

2024-05-18 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 18 May 2024 06:07:53 +
Source: rust-assorted-debian-utils
Architecture: source
Version: 0.7.1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Rust Maintainers 

Changed-By: Peter Michael Green 
Changes:
 rust-assorted-debian-utils (0.7.1-2) unstable; urgency=medium
 .
   * Team upload.
   * Package assorted-debian-utils 0.7.1 from crates.io using debcargo 2.6.1
   * Stop patching serde-yaml dependency.
Checksums-Sha1:
 9df27682cdff547456bbbeab221816279f9e49d6 2657 
rust-assorted-debian-utils_0.7.1-2.dsc
 8d5b6bdfaf670fb22ed159ddcebee29147aca6e3 2752 
rust-assorted-debian-utils_0.7.1-2.debian.tar.xz
 f3d8512694672e862773e34b60e1d5625f59fbf9 13027 
rust-assorted-debian-utils_0.7.1-2_source.buildinfo
Checksums-Sha256:
 12e3118f510f135a1320838b027f2e7b547132ef9bb006148f81413c937ef9c4 2657 
rust-assorted-debian-utils_0.7.1-2.dsc
 69e211ae4e2826dde55664271ce7027834cad359c1ff8219b2af107caed427cb 2752 
rust-assorted-debian-utils_0.7.1-2.debian.tar.xz
 555767affd06b21fbf325a3828bb19b6da0a4faa9c8aaa2736e7e58294f34d1e 13027 
rust-assorted-debian-utils_0.7.1-2_source.buildinfo
Files:
 c4d7b316087f9c1102f51934b8dcb47e 2657 rust optional 
rust-assorted-debian-utils_0.7.1-2.dsc
 bc2e413a071a52b4f874f4f3ec0e2c2b 2752 rust optional 
rust-assorted-debian-utils_0.7.1-2.debian.tar.xz
 5aebd607ce5e837ad4dee8ed3e70cc14 13027 rust optional 
rust-assorted-debian-utils_0.7.1-2_source.buildinfo

-BEGIN PGP SIGNATURE-

iQJIBAEBCAAyFiEEU0DQATYMplbjSX63DEjqKnqP/XsFAmZIYikUHHBsdWd3YXNo
QGRlYmlhbi5vcmcACgkQDEjqKnqP/XsrpQ//dQDZsyq9oNDqaArjOAtvvsVYpxCi
3Yfwbxmaz/fCirvjFieXotztJUpDwyALSl/pdgWQ75cgD1vDt8mqm88Z/8SSqfLM
ATIibSdtnpr8Ot0vg1aJAEyppKeRMG3R1hHZPCTvzDRJotSbQx7VK86/nIChL7dY
1q053Hl7RTCMMNRt7rW2QbwGs+xq1o0ikX3UHxdVmBsUm+2F0rZgIb6VWPt0CRko
+PiHKVRWAv7Aid4GYjk1J0NJMGk0sTveo6jxQaNDCcGyH7CLqRRg8SdpS97OKzP8
mu91/3zyeVcV5QevktmD/kdk0cH+dWIXXRM0xd9iBwn1rGQ28eLbpaovTVZ6hi0E
e4wVhIT/OQ7PTyFSqjhqfVpH56A8OhynKAuet3Pzrkxn9HrRN58zOF4W/eZsLJmr
MLIirGYhCGJnP8+tsD2E6WiE2Rky//5Gji3NWfnEDwnBuLm+TZ4s0mCabmOrxqS+
grRRV58G4kQeZAvRjc3gqmYPnnIgbHP86ccdqINacXDCg2Z5XpPRfabUtTXxqdhR
WbVPKRWGMOJIq6cpHpoKg828IdqKR/4265wxeqLbLvNcft3ZRIasCnRQjRX+nw+R
cgyEtmQVpW5sj8Mnp13OTip4SXbf+1RkyiLGDMcXPkkOuFqXJmG9BDOMpnynyQbG
/ls+6JlucGCWvWQ=
=y9w2
-END PGP SIGNATURE-



pgpUnNAzRehpR.pgp
Description: PGP signature


Re: How to create a custom Debian ISO

2024-05-17 Thread Bernd Zeimetz


Hi,



> I'm getting error 500 when attempting to open the source code. 

just try again later. Salsa seems to be having issues.


> Also, I'd prefer an offline install since the wifi firmware for the
> t2 Macs is extracted from macOS by the user and copied over to Linux.
> It cannot be redistributed legally.

You can still use the netinstall image. Its smaller, easier to
distribute and you or a user can add new things. You don't need to
distribute large parts of Debian just to replace the kernel and add a
repo.

But at the end the installers are all similar, it shouldn't make a
difference if you modify the netinstall or DVD installer.

Keep in mind that various kernel modules are loaded at install time as
needed, you might need to provide the appropriate udebs for your kernel
or modify the installer to be satisfied with what your kernel provides.

So yes, looking at the reform installer might be a good start.



Bernd



-- 
 Bernd Zeimetz    Debian GNU/Linux Developer
 http://bzed.dehttp://www.debian.org
 GPG Fingerprint: ECA1 E3F2 8E11 2432 D485  DD95 EB36 171A 6FF9 435F



Re: How to create a custom Debian ISO

2024-05-17 Thread Paul Wise
On Sat, 2024-05-11 at 08:21 +, Aditya Garg wrote:

> 1. I want to add a custom kernel that supports my Hardware.
> 2. I want to add my own Apt repo which hosts various software
> packages to support my hardware.

Please consider adding that hardware support to the mainline Linux
kernel and to the Debian Linux kernel packages and to Debian itself.

-- 
bye,
pabs

https://wiki.debian.org/PaulWise


signature.asc
Description: This is a digitally signed message part


Re: How to create a custom Debian ISO

2024-05-16 Thread Aditya Garg
Hi 

I'm getting error 500 when attempting to open the source code. Also, I'd prefer 
an offline install since the wifi firmware for the t2 Macs is extracted from 
macOS by the user and copied over to Linux. It cannot be redistributed legally.

> On 16 May 2024, at 7:45 PM, Johannes Schauer Marin Rodrigues 
>  wrote:
> 
> Hi,
> 
> I'm removing debian-project from the recipients.
> 
> Quoting Aditya Garg (2024-05-11 10:21:55)
>> I wanted to create a custom ISO of Debian, with the following customisations:
>> 
>> 1. I want to add a custom kernel that supports my Hardware.
>> 2. I want to add my own Apt repo which hosts various software packages to 
>> support my hardware.
>> 
>> I am not able to get any good documentation for the same. Please help.
> 
> I have a script which modifies/patches the official Debian netboot installer
> medium as it is published on ftp.debian.org so that it can be used to install
> Debian on the MNT Reform 2 open hardware laptop. To that end, the script is
> able to add:
> 
> - custom kernel
> - custom device trees
> - custom apt sources
> - custom apt pinning
> - custom package selection
> - custom d-i preseed.cfg
> - custom debconf templates
> - custom d-i post-base-installer and finish-install scripts
> 
> Feature highlights:
> 
> - works with stable, unstable, stable-backports
> - produces bit-by-bit reproduucible output
> - requires no superuser privileges to run
> 
> Source code here:
> 
> https://salsa.debian.org/reform-team/reform-debian-installer
> 
> This is the script that produces the debian-installer images that you can
> download from here:
> 
> https://reform.debian.net/d-i/
> 
> Maybe this helps.
> 
> Thanks!
> 
> cheers, josch
> 


Re: How to create a custom Debian ISO

2024-05-16 Thread Johannes Schauer Marin Rodrigues
Hi,

I'm removing debian-project from the recipients.

Quoting Aditya Garg (2024-05-11 10:21:55)
> I wanted to create a custom ISO of Debian, with the following customisations:
> 
> 1. I want to add a custom kernel that supports my Hardware.
> 2. I want to add my own Apt repo which hosts various software packages to 
> support my hardware.
> 
> I am not able to get any good documentation for the same. Please help.

I have a script which modifies/patches the official Debian netboot installer
medium as it is published on ftp.debian.org so that it can be used to install
Debian on the MNT Reform 2 open hardware laptop. To that end, the script is
able to add:

 - custom kernel
 - custom device trees
 - custom apt sources
 - custom apt pinning
 - custom package selection
 - custom d-i preseed.cfg
 - custom debconf templates
 - custom d-i post-base-installer and finish-install scripts

Feature highlights:

 - works with stable, unstable, stable-backports
 - produces bit-by-bit reproduucible output
 - requires no superuser privileges to run

Source code here:

https://salsa.debian.org/reform-team/reform-debian-installer

This is the script that produces the debian-installer images that you can
download from here:

https://reform.debian.net/d-i/

Maybe this helps.

Thanks!

cheers, josch

signature.asc
Description: signature


Re: How to create a custom Debian ISO

2024-05-16 Thread Aditya Garg
Well it's indeed not as easy as I thought as far as Debian ISOs are concerned.

I'll try to be more precise. I am a maintainer for Ubuntu on Linux on T2 Macs 
project: https://t2linux.org/.

We work to modify ISOs of commonly used distros by adding a custom kernel with 
drivers for T2 Macs and provide to the users. There has been a demand for 
Debian for a long time and I wish to provide the ISOs for the same. I would 
prefer making the ISO as similar to the official Debian ISO and just replace 
the Debian kernel with the customised kernel.

I've already set up an apt repo which hosts the kernels over here: 
https://github.com/AdityaGarg8/t2-ubuntu-repo

I'll be thankful if I get the best possible option.

On 11 May 2024, at 8:33 PM, Thomas Schmitt  wrote:

Hi,

Aditya Garg wrote to debian-devel:
I wanted to create a custom ISO of Debian, with the following customisations:
1. I want to add a custom kernel that supports my Hardware.
2. I want to add my own Apt repo which hosts various software packages to
support my hardware.
I am not able to get any good documentation for the same. Please help.

Marvin Renich wrote:
The package live-build from the Debian Live project might help you do
what you want.

Indeed the live-build package seems to be in use outside Debian's own
ISO production. Mailing list is
 debian-l...@lists.debian.org
There exists a manual
 https://live-team.pages.debian.net/live-manual/html/live-manual/index.en.html

Installation ISOs are made by package debian-cd, of which i am not aware
that it would have have users outside the official ISO production.i
Mailing list is
 debian...@lists.debian.org
Your impression about lack of documentation is not wrong as far as this
project is concerned. :))


Nevertheless the production step of packing up the ISO from a prepared
file tree is documented together with methods to use a Debian installation
ISO as base for the preparation:
 https://wiki.debian.org/RepackBootableISO

Packages may probably be added at the appropriate place in the directory
tree under /pool. (Managing a Debian repo is not my turf. Sorry for
being vague here.)

Changing the content of a Debian ISO might need some follow-up work in
administrative files of the ISO.
When merging Debian ISOs, my script
 
https://dev.lovelyhq.com/libburnia/libisoburn/raw/branch/master/test/merge_debian_isos
manipulates:
 /README.txt
 /dists/*/Release
and merges the files listed in /dists/*/Release.
You would have to explore whether these files are affected by your
changes.


Have a nice day :)

Thomas



Accepted debian-security-support 1:13+2024.05.15 (source) into unstable

2024-05-15 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 15 May 2024 09:56:16 +0200
Source: debian-security-support
Architecture: source
Version: 1:13+2024.05.15
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Team ,
Changed-By: Holger Levsen 
Closes: 1063756
Changes:
 debian-security-support (1:13+2024.05.15) unstable; urgency=medium
 .
   [ Moritz Muehlenhoff ]
   * Mark pdns-recursor as EOLed in bullseye.
   * Mark slurm-wlm as EOLed in bullseye.
 .
   [ Holger Levsen ]
   * Mark snort as unsupported in bullseye and buster. Closes: #1063756
Checksums-Sha1:
 556d3605f4f22c3811513066756414150bc1dd6d 1909 
debian-security-support_13+2024.05.15.dsc
 baef110f7253eb1098ddeaa260ba6a72ee1c8272 34772 
debian-security-support_13+2024.05.15.tar.xz
 1ad54e8ba33f5e55076c9fc5ffe4e8a0c933fe56 7453 
debian-security-support_13+2024.05.15_source.buildinfo
Checksums-Sha256:
 e3b4c06532de4ed3db0cc8613ecc72b56054573e41298984ad0e3262ef4c7924 1909 
debian-security-support_13+2024.05.15.dsc
 74369d5761e9204282af5ffd0f39a5b5706b28de965853e704dce2b22b2ab010 34772 
debian-security-support_13+2024.05.15.tar.xz
 9a50dee508363425391ccbf39f6a4dd00b1f2b1321e3ec83e73ebd8892375472 7453 
debian-security-support_13+2024.05.15_source.buildinfo
Files:
 28325d07fd5247950f59dc75adbb968f 1909 admin optional 
debian-security-support_13+2024.05.15.dsc
 791c3ced9d42ba367b2d6f48862c5bf4 34772 admin optional 
debian-security-support_13+2024.05.15.tar.xz
 23a5927ef6b769e0980f1291931d8460 7453 admin optional 
debian-security-support_13+2024.05.15_source.buildinfo

-BEGIN PGP SIGNATURE-
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=Rl82
-END PGP SIGNATURE-



pgpKEystFxkqF.pgp
Description: PGP signature


Accepted debian-security-support 1:13+2024.05.14 (source) into unstable

2024-05-14 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 14 May 2024 18:07:54 +0200
Source: debian-security-support
Architecture: source
Version: 1:13+2024.05.14
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Team ,
Changed-By: Holger Levsen 
Changes:
 debian-security-support (1:13+2024.05.14) unstable; urgency=medium
 .
   [ Markus Koschany ]
   * Add lucene-solr to security-support-ended.deb10.
 .
   [ Santiago Ruano Rincón ]
   * Mark nivida-cuda-toolkit as non-supported in buster.
 .
   [ Holger Levsen ]
   * Bump standards version to 4.7.0, no changes needed.
Checksums-Sha1:
 d49970ae2e4ebb03b2bafd591a0e7bef55d2396a 1909 
debian-security-support_13+2024.05.14.dsc
 a75f53ed75e92addb4d5c8493f02843151ead90c 34644 
debian-security-support_13+2024.05.14.tar.xz
 81b38a78f3ebf7d2385ab5da3f1557a13f482cc7 7512 
debian-security-support_13+2024.05.14_source.buildinfo
Checksums-Sha256:
 9601ee4ae504b63ecc65c867043b680a9dcd9d474506af326282a29e875d6b10 1909 
debian-security-support_13+2024.05.14.dsc
 6314ce11362660c17d5e40714cd6ea50ab782f0b32d3bd2923c04c398a09bbe2 34644 
debian-security-support_13+2024.05.14.tar.xz
 c8cd66574243ed95aa5d155199e0db133c48ca73f48fd8fc01d228107f845c60 7512 
debian-security-support_13+2024.05.14_source.buildinfo
Files:
 160a6c7653edac148fb3cdd4d4d98031 1909 admin optional 
debian-security-support_13+2024.05.14.dsc
 33943e3a5bd49fec6e42defe7b62cb5f 34644 admin optional 
debian-security-support_13+2024.05.14.tar.xz
 43b8930a33f81059cf16a5a9c9b7efce 7512 admin optional 
debian-security-support_13+2024.05.14_source.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEuL9UE3sJ01zwJv6dCRq4VgaaqhwFAmZDjOoACgkQCRq4Vgaa
qhzlFA/8DulDJTyAblFuCSqIS2a5ZH2EHZdCrugy4Vz1ccyV1zbtJHqgr8+dEYz0
SDgIW3Z/t1/VAho7aETm9ueZatLT7kRyF6/Fk0BXOI8+Pq98bNeubMra4SyofQDy
Y5UpBDYZ++uvUmxm8FPmdlJ5cZwEDn3akGbwOyGWsz9pu289244ANc2s8ckobkcu
RasKEiV13szJbf3oroXuQs3RfpCV6HrzuDATManCr2AvRGd9sEZNQmqbMz1oXDV8
StjSdIeb7VMhp3/ND7AZ2i4kFla3M+S9+lNGhtFkkhvHmrdw7kwQae52L+ZNOuhc
AXAjgBqD984CyMunCSKlPq6Zi9WrCijM7tujy07AGONy4PMiJCzIZMymliGNBScA
uSqBFvLcQTM5Il4Lp84TGxSC3Fv46NWlyaFcTJjVOPP6ARtpswqGnLxaLRXvXEOd
q9SIVI/ivaMqK8YPUPzmMB7hRNdnAO3diLpRZ5NNuYXKk0cgVSNSnun4YaIhqdD1
m4RlzRmqeD0hOyyzAeHGGmaJNZ3WLpaO6N13aPgAESeyzErzXl4ob+DESCZyWGK3
oE7dkgdSqWd3izKvnbx6FEq8Sa5aTr31havEC1ivEcyVLbUHtpOBHi6PzUudtf1Z
2tRLibm5eLQqfn/KNBxP46tWkpLoKbPAplB+6Fw+IiCWAXVUuSU=
=vBFN
-END PGP SIGNATURE-



pgpK53mjEHpGH.pgp
Description: PGP signature


Re: De-vendoring gnulib in Debian packages

2024-05-12 Thread Theodore Ts'o
On Sun, May 12, 2024 at 04:27:06PM +0200, Simon Josefsson wrote:
> Going into detail, you use 'gzip -9n' but I use git-archive defaults
> which is the same as -n aka --no-name.  I agree adding -9 aka --best is
> an improvement.  Gnulib's maint.mk also add --rsyncable, would you agree
> that this is also an improvement?

I'm not convinced --rsyncable is an improvement.  It makes the
compressed object slightly larger, and in exchange, if the compressed
object changes slightly, it's possible that when you rsync the changed
file, it might be more efficient.  But in the case of PGP signed
release tarballs, the file is constant; it's never going to change,
and even if there are slight changes between say, e2fsprogs v1.47.0
and e2fsprogs v1.47.1, in practice, this is not something --rsyncable
can take advantage of, unless you manually copy
e2fsprogs-v1.47.0.tar.gz to e2fsprogs-v1.47.1.tar.bz, and then rsync
e2fsprogs-v1.471.tar.g and I don't think anyone is doing this,
either automatically or manually.

That being said, --rsyncable is mostly harmless, so I don't have
strong feelings about changing it to add or remove in someone's
release workflow.

> Right, there is no requirement for orig.tar.gz to be filtered.  But then
> the outcome depends on upstream, and I don't think we can convince all
> upstreams about these concerns.  Most upstream prefer to ship
> pre-generated and vendored files in their tarballs, and will continue to
> do so.

Well, your blog entry does recognize some of the strong reasons why
upstreams will probably want to continue shipping them.  First of all,
not all compilation targets are guaranteed to have autoconf, automake,
et. al, installed.  E2fsprogs is portable to Windows, MacOS, AIX,
Solaris, HPUX, NetBSD, FreeBSD, and GNU/Hurd, in addition to Linux.
If the package subscribes to the 'all the world's Linux, and nothing
else exists/we have no interest in supporting anything elss', I'd ask
the question, why are they using autoconf in the first place?  :-)

Secondly, i have gotten burned with older versions of either autoconf
or the aclocal macros changing in incompatible ways between versions.
So my practice is to check into git the configure script as generated
by autoconf on Debian testing, which is my development system; and if
it fails on anything else, or when a new version of autoconf or
automake, etc. causes my configure script to break, I can curse, and
fix it myself instead of inflicting the breakage on people who are
downloading and trying to compile e2fsprogs.

 Let's assume upstream doesn't ship minimized tarballs that are
> free from vendored or pre-generated files.  That's the case for most
> upstream tarballs in Debian today (including e2fsprogs, openssh,
> coreutils).  Without filtering that tarball we won't fulfil the goals I
> mentioned in the beginning of my post.  The downsides with not filtering
> include (somewhat repeating myself):
>
> ...

Your arguments are made in a very general way --- there are potential
problems for _all_ autogenerated or vendored files.  However, I think
it's possible to simply things by explicitly restricting the problem
domain to those files auto-generated by autoconf, automake, libtool,
etc.  For example, the argument that this opens things up for bugs
could be fixed by having common code in a debhelper script that
re-generates all of the autoconf and related files.  This address your
"tedious" and "fragile" argument.

And if you are always regenerating those files, you don't need to
audit the code, since they are going to them, no?  And the generated
files from autoconf and friends have well understood licensing
concerns.

And by the way, all of your concerns about vendored files, and all of
my arguments for why it's no big deal apply to gnulib source files,
too, no?  Why are you so insistent on saying that upstream must never,
ever ship vendored files --- but I don't believe you are making this
argument for gnulib?

Yes, it's simpler if we have procrustean rules of the form "everything
MUST be shared libraries", and "never, EVER have generated or vendored
files".  However, I think we're much better off if we have targetted
solution which fix the 80 to 90% of the cases.  We agree that gnulib
isn't going to be a shared library; but the argument in favor of it
means that there are exception, and I think we need to have similar
accomodations files like configure, config.{guess,sub}.

Upstream *is* going to be shipping those files, and I don't think it's
worth it to deviate from upstream tarballs just to filter out those
files, even if it makes somethings simpler from your perspective.  So
I do hear your arguments; it's just on balance, my opinion is that it's
not worth it.

Cheers,

- Ted



Re: De-vendoring gnulib in Debian packages

2024-05-12 Thread Russ Allbery
Ansgar   writes:

> In ecosystems like NPM, Cargo, Golang, Python and so on pinning to
> specific versions is also "explicitly intended to be used"; they just
> sometimes don't include convenience copies directly as they have tooling
> to download these (which is not allowed in Debian).

Yeah, this is a somewhat different case that isn't well-documented in
Policy at the moment.

> (Arguably Debian should use those more often as keeping all software at
> the same dependency version is a futile effort IMHO...)

There's a straight tradeoff with security effort: more security work is
required for every additional copy of a library that exists in Debian
stable.  (And, of course, some languages have better support for having
multiple simultaneously-installed versions of the same library than
others.  Python's support for this is not great; the ecosystem expectation
is that one uses separate virtualenvs, which don't really solve the Debian
build dependency problem.)

-- 
Russ Allbery (r...@debian.org)  <https://www.eyrie.org/~eagle/>



Re: De-vendoring gnulib in Debian packages

2024-05-12 Thread Ansgar 


Hi,

On Sun, 2024-05-12 at 08:41 -0700, Russ Allbery wrote:
> "Theodore Ts'o"  writes:
> > And yet, we seem to have given a pass for gnulib, probably because it
> > would be too awkward to enforce that rule *everywhere*, so apparently
> > we've turned a blind eye.
> 
> No, there's an explicit exception for cases like gnulib.  Policy 4.13:
> 
>     Some software packages include in their distribution convenience
>     copies of code from other software packages, generally so that users
>     compiling from source don’t have to download multiple packages. Debian
>     packages should not make use of these convenience copies unless the
>     included package is explicitly intended to be used in this way.

In ecosystems like NPM, Cargo, Golang, Python and so on pinning to
specific versions is also "explicitly intended to be used"; they just
sometimes don't include convenience copies directly as they have
tooling to download these (which is not allowed in Debian).

(Arguably Debian should use those more often as keeping all software at
the same dependency version is a futile effort IMHO...)

Gnulib is just older and targeted at the C ecosystem which still has
worse tooling that pretty much everything else.

Ansgar




Re: De-vendoring gnulib in Debian packages

2024-05-12 Thread Russ Allbery
"Theodore Ts'o"  writes:

> The best solution to this is to try to promote people to put those
> autoconf macros that they are manually maintaining that can't be
> supplied in acinclude.m4, which is now included by default by autoconf
> in addition to aclocal.m4.

Or use a subdirectory named something like m4, so that you can put each
conceptually separate macro in a separate file and not mush everything
together, and use:

AC_CONFIG_MACRO_DIR([m4])

(and set ACLOCAL_AMFLAGS = -I m4 in Makefile.am if you're also using
Automake).

> Note that how we treat gnulib is a bit differently from how we treat
> other C shared libraries, where we claim that *all* libraries must be
> dynamically linked, and that include source code by reference is against
> Debian Policy, precisely because of the toil needed to update all of the
> binary packages should some security vulnerability gets discovered in
> the library which is either linked statically or included by code
> duplication.

> And yet, we seem to have given a pass for gnulib, probably because it
> would be too awkward to enforce that rule *everywhere*, so apparently
> we've turned a blind eye.

No, there's an explicit exception for cases like gnulib.  Policy 4.13:

Some software packages include in their distribution convenience
copies of code from other software packages, generally so that users
compiling from source don’t have to download multiple packages. Debian
packages should not make use of these convenience copies unless the
included package is explicitly intended to be used in this way.

-- 
Russ Allbery (r...@debian.org)  <https://www.eyrie.org/~eagle/>



Re: De-vendoring gnulib in Debian packages

2024-05-12 Thread Simon Josefsson
"Theodore Ts'o"  writes:

>> 1) Use upstream's PGP signed git-archive tarball.
>
> Here's how I do it in e2fsprogs which (a) makes the git-archive
> tarball be bit-for-bit reproducible given a particular git commit ID,
> and (b) minimizes the size of the tarball when stored using
> pristine-tar:
>
> https://github.com/tytso/e2fsprogs/blob/master/util/gen-git-tarball

Wow, written five years ago and basically the same thing that I suggest
(although you store pre-generated ./configure scripts in git).

Going into detail, you use 'gzip -9n' but I use git-archive defaults
which is the same as -n aka --no-name.  I agree adding -9 aka --best is
an improvement.  Gnulib's maint.mk also add --rsyncable, would you agree
that this is also an improvement?  Thus what I'm arriving at is this:

git archive --prefix=inetutils-$(git describe)/ HEAD |
   gzip --no-name --best --rsyncable > -o inetutils-$(git describe)-src.tar.gz

>> To reach our goals in the beginning of this post, this upstream tarball
>> has to be filtered to remove all pre-generated artifacts and vendored
>> code.  Use some mechanism, like the debian/copyright Files-Excluded
>> mechanism to remove them.  If you used a git-archive upstream tarball,
>> chances are higher that you won't have to do a lot of work especially
>> for pre-generated scripts.
>
> Why does it *has* to be filtered?  For the purposes of building, if
> you really want to nuke all of the pre-generated files, you can just
> move them out of the way at the beginning of the debian/rules run, and
> then move them back as part of "debian/rules clean".  Then you can use
> autoreconf -fi to your heart's content in debian/rules (modulo
> possibly breaking things if you insist on nuking aclocal.m4 and
> regenerating it without taking proper care, as discussed above).
>
> This also allows the *.orig.tar.gz to be the same as the upstream
> signed PGP tarball, which you've said is the ideal, no?

Right, there is no requirement for orig.tar.gz to be filtered.  But then
the outcome depends on upstream, and I don't think we can convince all
upstreams about these concerns.  Most upstream prefer to ship
pre-generated and vendored files in their tarballs, and will continue to
do so.  Let's assume upstream doesn't ship minimized tarballs that are
free from vendored or pre-generated files.  That's the case for most
upstream tarballs in Debian today (including e2fsprogs, openssh,
coreutils).  Without filtering that tarball we won't fulfil the goals I
mentioned in the beginning of my post.  The downsides with not filtering
include (somewhat repeating myself):

- Opens up for bugs causing pre-generated files not being re-generated
  even when they are used to build the package.  I think this is fairly
  common in Debian packages.  Making sure all pre-generated files are
  re-generated during build -- or confirming that the file is not used
  at all -- is tedious and fragile work.  Work that has to be done for
  every release.  Are you certain that ./configure is re-generated?  If
  it is not present you would notice.

- Auditing the pre-generated and vendored files for malicious content
  takes more time than not having to audit those files.  Especially if
  those files are not stored in upstream git.

- Pre-generated and vendored files trigger licensing concerns and
  require tedious work that doesn't improve the binary package
  deliverable.  Consider files like texinfo.tex for example, wouldn't it
  be better to strip that out of tarballs and not have to add it to
  debian/copyright?  If some code in a package, let's say getopt.c, is
  not used during build of the package, the license of that file doesn't
  have to be mentioned in debian/copyright if I understand correctly:
  https://www.debian.org/doc/debian-policy/ch-archive.html#s-pkgcopyright
  If in a few releases later, that file starts to get used during
  compilation, the package maintainer will likely not notice.  If it was
  filtered, the maintainer would notice.

The best is when upstream ship a tarball consistent with what I dream
*.orig.tar.gz should be: free of vendored and pre-generated files.
Debian package maintainers can take action before this happens, to reach
nice properties within Debian.  Maybe some upstream will adapt.

>> There is one design of gnulib that is important to understand: gnulib is
>> a source-only library and is not versioned and has no release tarballs.
>> Its release artifact is the git repository containing all the commits.
>> Packages like coreutils, gzip, tar etc pin to one particular commit of
>> gnulib.
>
> Note that how we treat gnulib is a bit differently from how we treat
> other C shared libraries, where we claim that *all* libraries must be
> dynamically linked, and that include source code by reference is
> against Debian Policy, precisely bec

Re: De-vendoring gnulib in Debian packages

2024-05-12 Thread Theodore Ts'o
On Sat, May 11, 2024 at 04:09:23PM +0200, Simon Josefsson wrote:
>The current approach of running autoreconf -fi is based on a
>misunderstanding: autoreconf -fi is documented to not replace certain
>files with newer versions:
>https://lists.nongnu.org/archive/html/bug-gnulib/2024-04/msg00052.html

And the root cause of *this* is because historically, people put their
own custom autoconf macros in aclocal.m4, so if autoreconf -fi
overwrote aclocal.m4, things could break.  This also means that
programmtically always doing "rm -f aclocal.m4 ; aclocal --install"
will break some packages.

The best solution to this is to try to promote people to put those
autoconf macros that they are manually maintaining that can't be
supplied in acinclude.m4, which is now included by default by autoconf
in addition to aclocal.m4.  Personally, I think the two names are
confusing and if it weren't for historical reasons, perhaps should
have been swapped, but oh, well

(For example, I have some custom local autoconf macros needed to
support MacOS in e2fsprogs's acinclude.m4.)

> 1) Use upstream's PGP signed git-archive tarball.

Here's how I do it in e2fsprogs which (a) makes the git-archive
tarball be bit-for-bit reproducible given a particular git commit ID,
and (b) minimizes the size of the tarball when stored using
pristine-tar:

https://github.com/tytso/e2fsprogs/blob/master/util/gen-git-tarball

> To reach our goals in the beginning of this post, this upstream tarball
> has to be filtered to remove all pre-generated artifacts and vendored
> code.  Use some mechanism, like the debian/copyright Files-Excluded
> mechanism to remove them.  If you used a git-archive upstream tarball,
> chances are higher that you won't have to do a lot of work especially
> for pre-generated scripts.

Why does it *has* to be filtered?  For the purposes of building, if
you really want to nuke all of the pre-generated files, you can just
move them out of the way at the beginning of the debian/rules run, and
then move them back as part of "debian/rules clean".  Then you can use
autoreconf -fi to your heart's content in debian/rules (modulo
possibly breaking things if you insist on nuking aclocal.m4 and
regenerating it without taking proper care, as discussed above).

This also allows the *.orig.tar.gz to be the same as the upstream
signed PGP tarball, which you've said is the ideal, no?

> There is one design of gnulib that is important to understand: gnulib is
> a source-only library and is not versioned and has no release tarballs.
> Its release artifact is the git repository containing all the commits.
> Packages like coreutils, gzip, tar etc pin to one particular commit of
> gnulib.

Note that how we treat gnulib is a bit differently from how we treat
other C shared libraries, where we claim that *all* libraries must be
dynamically linked, and that include source code by reference is
against Debian Policy, precisely because of the toil needed to update
all of the binary packages should some security vulnerability gets
discovered in the library which is either linked statically or
included by code duplication.

And yet, we seem to have given a pass for gnulib, probably because it
would be too awkward to enforce that rule *everywhere*, so apparently
we've turned a blind eye.

I personally think the "everything must be dynamically linked" to be
not really workable in real life, and should be an aspirational goal
--- and the fact that we treat gnulib differently is a great proof
point about how the current debian policy is not really doable in real
life if it were enforced strictly, everywhere, with no exceptions

Certainly for languages like Rust, it *can't* be enforced, so again,
that's another place where that rule is not enforced consistently; if
it were, we wouldn't be able to ship Rust programs.

- Ted



Accepted rshim-user-space 2.0.20+debian-3 (source) into unstable

2024-05-11 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 09 May 2024 00:18:46 +0200
Source: rshim-user-space
Architecture: source
Version: 2.0.20+debian-3
Distribution: unstable
Urgency: medium
Maintainer: da...@debian.org
Changed-By: Taihsiang Ho (tai271828) 
Closes: 1064920
Changes:
 rshim-user-space (2.0.20+debian-3) unstable; urgency=medium
 .
   * debian/rules: conditionally append for i386 arch (Closes: #1064920)
Checksums-Sha1:
 3fb06b6f60b1b5f9b77f81912bae806ed4503b3d 2044 
rshim-user-space_2.0.20+debian-3.dsc
 3126bb9814e9d163da419db590284046213bd992 2940 
rshim-user-space_2.0.20+debian-3.debian.tar.xz
 dc7b8222f8db54711b6290e3a7e16eb88611ac42 7609 
rshim-user-space_2.0.20+debian-3_source.buildinfo
Checksums-Sha256:
 4afd7f91f7b0ff03eae2c4d93f6797a3d7067f9564e37a3a4933966a354729ad 2044 
rshim-user-space_2.0.20+debian-3.dsc
 ed4ce3b0f680a62bc6d16340d9556f9da0351f2434701c1b38da54f137a585eb 2940 
rshim-user-space_2.0.20+debian-3.debian.tar.xz
 250a8bfa3450c6629f8e1876cd80293935e7dc6a168ee172660fcc0391e29620 7609 
rshim-user-space_2.0.20+debian-3_source.buildinfo
Files:
 d820b1b01ff144d172c21789e2c7a098 2044 admin optional 
rshim-user-space_2.0.20+debian-3.dsc
 5a592bd9ddf5ca6069f912cdd1450c74 2940 admin optional 
rshim-user-space_2.0.20+debian-3.debian.tar.xz
 2896c9907d0e43919c1022b7d081984e 7609 admin optional 
rshim-user-space_2.0.20+debian-3_source.buildinfo

-BEGIN PGP SIGNATURE-
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=i8YB
-END PGP SIGNATURE-



pgpkyRDQd_NLz.pgp
Description: PGP signature


Re: De-vendoring gnulib in Debian packages

2024-05-11 Thread Paul Eggert

On 2024-05-11 07:09, Simon Josefsson via Gnulib discussion list wrote:

I would assume that (some stripped down
version of) git is a requirement to do any useful work on any platform
these days, so maybe it isn't a problem


Yes, my impression also is that Git has migrated into the realm of 
cc/gcc in that everybody has it, so it can depend indirectly on a 
possibly earlier version of itself.


Although it is worrisome that our collective trusted computing base 
keeps growing, let's face it, if there's a security bug in Git we're all 
in big trouble anyway.




Re: De-vendoring gnulib in Debian packages

2024-05-11 Thread Simon Josefsson
Bruno Haible  writes:

> Simon Josefsson wrote:
>> Finally, while this is somewhat gnulib specific, I think the practice
>> goes beyond gnulib
>
> Yes, gnulib-tool for modules written in C is similar to
>
>   * 'npm install' for JavaScript source code packages [1],
>   * 'cargo fetch' for Rust source code packages [2],
>
> except that gnulib-tool is simpler: it fetches from a single source location
> only.
>
> How does Debian handle these kinds of source-code dependencies?

I don't know the details but I believe those commands are turned into
local requests for source code, either vendored or previously packaged
in Debian.  No network access during builds.  Same for Go packages,
which I have some experience with, although for Go packages they lose
the strict versioning so if Go package X declare a depedency on package
Y version Z then on Debian it may build against version Z+1 or Z+2 which
may in theory break and was not upstream's intended or supported
configuration.  We have a circular dependency situation for some core Go
libraries in Debian right now due to this.

I think fundamentally the shift that causes challenges for distributions
may be dealing with packages dependencies that are version >= X to
package dependencies that are version = X.  If there is a desire to
support that, some new patterns of the work flow is needed.  Some
package maintainers reject this approach and refuse to co-operate with
those upstreams, but I'm not sure if this is a long-term winning
strategy: it often just lead to useful projects not being available
through distributions, and users suffers as a result.

/Simon


signature.asc
Description: PGP signature


Re: De-vendoring gnulib in Debian packages

2024-05-11 Thread Bruno Haible
Simon Josefsson wrote:
> Finally, while this is somewhat gnulib specific, I think the practice
> goes beyond gnulib

Yes, gnulib-tool for modules written in C is similar to

  * 'npm install' for JavaScript source code packages [1],
  * 'cargo fetch' for Rust source code packages [2],

except that gnulib-tool is simpler: it fetches from a single source location
only.

How does Debian handle these kinds of source-code dependencies?

Bruno

[1] 
https://nodejs.org/en/learn/getting-started/an-introduction-to-the-npm-package-manager
[2] https://doc.rust-lang.org/cargo/commands/cargo-fetch.html





Re: How to create a custom Debian ISO

2024-05-11 Thread Hans
Am Samstag, 11. Mai 2024, 10:21:55 CEST schrieb Aditya Garg:
> Hello
> 
> I wanted to create a custom ISO of Debian, with the following
> customisations:
> 
> 1. I want to add a custom kernel that supports my Hardware.
> 2. I want to add my own Apt repo which hosts various software packages to
> support my hardware.
> 
> I am not able to get any good documentation for the same. Please help.

Hi Aditya,

mayebe you want to take a look at bootcdwrite. I have good experience made 
with bootcdwrite. Using this, you can create a boootable live iso with all 
your persoanl settings (including ~/home/* and users, including all personal 
settings.).

This ISO can be installed, too. Just bootr it, and you can install it from the 
live system.  

The ISO can be greater than 4,7GB, so it can be installen on an USB-stick.

For myself, i am using it for creating KALI-Linux (with all my settings, 
modules, exploits, settings etc. etc. etc. etc.). This ISO is about 30GB big 
and is an exact image of my installed system.

Doing so, I can boot it whereever I wan and have everything available.

If you want to do the same, just a hint: If your installed system resides on 
encrypted devices, you have to notice some special settings, otherwise it will 
not boot. Fell free, to ask for it.

Hope this helps.

Oh yes, another way is, just to create a livesystem with filesystem.squashfs. 
Then edit the filesystem.squashfs (it can be unpacked, edited and hen 
repacked). This is a little bit fiddly, but very versatile.

Last but not least, I believe (but here I am not sure)· you may build your own 
standard debian installer ISO and put in your own package versions (if this is 
what you want, then preferly ask the installer-crew - they know much better 
than me, because I never used an own build Debian-installer-ISO).

Have fun!

Best

Hans




De-vendoring gnulib in Debian packages

2024-05-11 Thread Simon Josefsson
All, (going out to both debian-devel and bug-gnulib, please be
  respectful of each community's different perspectives and trim Cc
  when focus shifts to any Debian or gnulib specific topics)
  (please pardon the accidental duplicate post to bug-gnulib...)

The content of upstream source code releases can largely be categorized
into 1) the actual native source-code from the upstream supplier, 2)
pre-generated artifacts from build tools (e.g., ./configure script) and
3) third-party maintained source code (e.g., config.guess or getopt.c).
The files in 3) may be referred to as "vendoring".  The habit of
including vendored and pre-generated artifacts is a powerful and
successful way to make release tarballs usable for users, going back to
the 1980's.  This habit pose some challenges for packaging though:

1) Pre-generated files (e.g., ./configure) should be re-generated to
   make sure the package is built from source code, and to allow patches
   on the toolchain used to generate the pre-generated files to have any
   effect.  Otherwise we risk using pre-generated files created using
   non-free or non-public tools, which if I understand correctly against
   Debian main policy.  Verifying that this happens for all
   pre-generated files in an upstream tarball is complicated, fragile
   and tedious work.  I think it is simple to find examples of mistakes
   in this area even for important top-popcon Debian packages.  The
   current approach of running autoreconf -fi is based on a
   misunderstanding: autoreconf -fi is documented to not replace certain
   files with newer versions:
   https://lists.nongnu.org/archive/html/bug-gnulib/2024-04/msg00052.html

2) If a security problem in vendored code is discovered, the security
   team may have to patch 50+ packages if the vendor origin is popular.
   Maybe even different versions of the same vendored code has to be
   patched.

3) Auditing the difference between the tarball and what is stored in
   upstream version control system (VCS) is challenging.  The xz
   incident exploited the fact that some pre-generated files aren't
   included in upstream VCS.  Some upstream react to this by adding all
   pre-generated artifacts to VCS -- OpenSSH seems to take the route of
   adding the generated ./configure script to git, which moves that file
   from 3) to 1) but the problem is remaining.

4) Auditing for license compliance is challenging, since not only do we
   have to audit all upstream's code but we also have to audit the
   license of pre-generated files and vendored source-code.

There are probably more problems involved, and probably better ways to
articulate the problems than what I managed to do above.  The Go and
Rust ecosystems solve some of these issues, which has other consequences
for packaging.  We have largely ignored that the same challenges apply
to many C packages, and I'm focusing on those that uses gnulib --
https://www.gnu.org/software/gnulib/ -- gzip, tar, grep, m4, sed, bison,
awk, coreutils, grub, libiconv, libtasn1, libidn2, inetutils, etc:
https://git.savannah.gnu.org/gitweb/?p=gnulib.git;a=blob;f=users.txt

Solving all of the problems for all packages will require some work and
will take time.  I've started to see if we can make progress on the
gnulib-related packages.  I'm speaking as contributor to gnulib and
maintainer of a couple of Debian packages, but still learning to
navigate -- the purpose of this post is to describe what I've done for
libntlm and ask for feddback to hopefully make this into a re-usable
pattern that can be applied to more packages.  It would be great to
improve collaboration on these topics between GNU and Debian.

So let's turn this post into a recipe for Debian maintainers of packages
that use gnulib to follow for their packages.  I'm assuming git for now
on, but feel free to mentally s/git/$VCS/.

The first step is to establish an upstream tarball that you want to work
with.  There are too many opinions floating around on this to make any
single solution a pre-requisite so here are the different approaches I
can identify, ordered by my own preference, and the considerations with
each.

1) Use upstream's PGP signed git-archive tarball.

   See my recent blog posts for this new approach.  The key property
   here is that there is no need to audit difference between upstream
   tarball and upstream git.

   
https://blog.josefsson.org/2024/04/01/towards-reproducible-minimal-source-code-tarballs-please-welcome-src-tar-gz/
   
https://blog.josefsson.org/2024/04/13/reproducible-and-minimal-source-only-tarballs/
  

2) Use upstream's PGP signed tarball.

   This is the current most common and recommended approach, as far as I
   know.

3) Create a PGP signed git-archive tarball.

   If upstream doesn't publish PGP signed tarballs, or if there is a
   preference from upstream or from you as Debian package maintainer to
   not do 1) or 2), then create a minimal source-only copy of the git
   archiv

Re: How to create a custom Debian ISO

2024-05-11 Thread Xingyou Chen

On 5/11/24 16:21, Aditya Garg wrote:

Hello

I wanted to create a custom ISO of Debian, with the following customisations:

1. I want to add a custom kernel that supports my Hardware.
2. I want to add my own Apt repo which hosts various software packages to 
support my hardware.

I am not able to get any good documentation for the same. Please help.


simple-cdd and underlying debian-cd works fine, you can add extra repo, 
and then extra packages to be included in final ISO, and even custom 
files or build steps.


These are tiny utilities, with one page intro and in source comments 
stating their usage, also ultimate self-explaining code.




Re: How to create a custom Debian ISO

2024-05-11 Thread Marvin Renich
* Aditya Garg  [240511 05:15]:
> Hello
> 
> I wanted to create a custom ISO of Debian, with the following customisations:
> 
> 1. I want to add a custom kernel that supports my Hardware.
> 2. I want to add my own Apt repo which hosts various software packages to 
> support my hardware.
> 
> I am not able to get any good documentation for the same. Please help.

[Redirecting to debian-user, dropping -project, M-F-T set to debian-user only]

First, please don't double-post the same message within a few minutes.
Give your message at least a half hour to show up before you decide it
wasn't received.

Second, neither debian-devel nor debian-project are appropriate lists
for this question.  You should use debian-u...@lists.debian.org or some
other user-oriented forum.  Also, posting a question to multiple lists
at once (called cross-posting) is considered rude in most situations.

To give a possible answer to your question, look at the Debian Live
project:  https://www.debian.org/devel/debian-live/

The package live-build from the Debian Live project might help you do
what you want.

...Marvin



How to create a custom Debian ISO

2024-05-11 Thread Aditya Garg
Hello

I wanted to create a custom ISO of Debian, with the following customisations:

1. I want to add a custom kernel that supports my Hardware.
2. I want to add my own Apt repo which hosts various software packages to 
support my hardware.

I am not able to get any good documentation for the same. Please help.

How to create a custom Debian ISO

2024-05-11 Thread Aditya Garg
Hello

I wanted to create a custom ISO of Debian, with the following customisations:

1. I want to add a custom kernel that supports my Hardware.
2. I want to add my own Apt repo which hosts various software packages to 
support my hardware.

I am not able to get any good documentation for the same. Please help.

Accepted nmon 16q+debian-1 (source) into unstable

2024-05-10 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 11 May 2024 07:05:42 +0200
Source: nmon
Architecture: source
Version: 16q+debian-1
Distribution: unstable
Urgency: medium
Maintainer: Salvatore Bonaccorso 
Changed-By: Salvatore Bonaccorso 
Changes:
 nmon (16q+debian-1) unstable; urgency=medium
 .
   * New upstream version 16q+debian
   * debian/rules: Update filename to compile (sync with new upstream)
   * Declare compliance with Debian policy 4.7.0
   * Update copyright years for debian/* packaging files
Checksums-Sha1: 
 46c808bbb172a79ca6bdd2ccdef731c3fcc4f746 1981 nmon_16q+debian-1.dsc
 3b83562f9511585d3c5ac74b6327671201f59c89 65031 nmon_16q+debian.orig.tar.gz
 db9ce4af7c17e005f3afe9cb9d8d11e2ec960cfc 4448 nmon_16q+debian-1.debian.tar.xz
Checksums-Sha256: 
 13aa1faef3723f0cb75e3ff5e86a1c629397b73f0a5c762c931e89c09b41eeb5 1981 
nmon_16q+debian-1.dsc
 5ac184b14624ecb8d69f500fd75c934432e9f8f98e9f878d4e9bf9c778513765 65031 
nmon_16q+debian.orig.tar.gz
 e2013a18dec897dcae5452b8f3431ed56888b86779159cce15fc0ec7312ef14c 4448 
nmon_16q+debian-1.debian.tar.xz
Files: 
 483894715ee341145a279af86088ca1f 1981 utils optional nmon_16q+debian-1.dsc
 06dc7b0eec03058326792011f7a8e41e 65031 utils optional 
nmon_16q+debian.orig.tar.gz
 8db813e9816c1b638e175d5ae5f18ef1 4448 utils optional 
nmon_16q+debian-1.debian.tar.xz

-BEGIN PGP SIGNATURE-

iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmY+/W9fFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
ZWJpYW4ub3JnAAoJEAVMuPMTQ89Ez0UP/Ap2n0KpMxVei0DZls+qJM5uVVmmTXPv
MIjghc0tjCPWFN73Hu3UX3PGFdAUxTMyRoEzLZXjB1uRENyZVOw5B0siCVc5nrUU
0De3sGLLXM4O2rfpSEdvMP1rpvuXk+PVagVbMh+1uQGRYEbwtOleD1s1arPYzWvR
W9uEU+FkKI49NdBcA4rHRVsswVHXDzbAFeAYNbwFvfglOp7MvYs6KPKWMQ4hZXY1
uD7Eu7v6yPbJiQK9CK71JiOFXGuNxebTaMVQaH2vhTHHPVTLd2as/RVXs6Fhq5of
24ZIIZEKrALL+mwO67sZznaEsxiPJuOa1/H29wbv5X63nVVocbBP3XkworfCXh5r
RMok8a5YWvMl/zpN5We8jAu9zAnOQp0LFkYIM1+wPuN/kDXasyMcLnTorjSP2VlL
RJNqeL/45wLy1yvcoepSqlnHfcPCPed/s3z2BY4hNpoV0IN3/1WHu52zaig7pu3R
7x4o0G2nriUpIvVhKEE7uVqRpW/bTvGejy6WKFQCntRfTvMLU0O8JV7MFxZC+l9u
mSWy5ezkmCJ6jvlXTvpaHiW1/uV60E5mgYCtfE4SKGSxBU6e2bpuRTVPGB+sD57V
8CJc3w+PyuxwyJ0pqJ3VOtpj30rRCcaQAGjd6bLkcTYbQV3Kqrwpl8NfK7M1ju2W
EFPR6fPBUulM
=+YjQ
-END PGP SIGNATURE-



pgpvNpVrEaz4a.pgp
Description: PGP signature


Re: Tool to build Debian packages not requiring root in containers ?

2024-05-09 Thread Timo Röhling

Hi Charles,

* Charles Plessy  [2024-05-08 07:27]:
I want to leverage our cluster to automate as much of the rebuilds 
as I

can, but could not find the right tool.  I tried to run sbuild in a
Singularity image and this failed.  However, I do not need the whole
power of engines like sbuild, as none of the packages involved require
root priviledges to build.
Have you tried the unshare backend for sbuild? It uses Linux 
namespaces instead of full-blown root privileges, and works really 
great for my regular packaging work. I have not tried running it 
inside a virtualization container, though.



Cheers
Timo

--
⢀⣴⠾⠻⢶⣦⠀   ╭╮
⣾⠁⢠⠒⠀⣿⡁   │ Timo Röhling   │
⢿⡄⠘⠷⠚⠋⠀   │ 9B03 EBB9 8300 DF97 C2B1  23BF CC8C 6BDD 1403 F4CA │
⠈⠳⣄   ╰╯


signature.asc
Description: PGP signature


Re: Tool to build Debian packages not requiring root in containers ?

2024-05-08 Thread Charles Plessy
Le Wed, May 08, 2024 at 08:02:41AM -0700, Otto Kekäläinen a écrit :
> 
> I read the docs on how Singularity is able to pull Docker images of Debian
> Sid and build on top of them, and run and exec just like Docker/Podman.
> Unfortunately it has its own Containerfile format (
> https://docs.sylabs.io/guides/3.5/user-guide/quick_start.html#singularity-definition-files)
> and the commands have their own syntax. I guess Debcraft could be extended
> to support it, but that would require at least one Singularity user as
> frequent contributor to test and develop Singularity-compatibility.
> 
> The entire code base is shell code. Perhaps you want to take a look if it
> looks hackable for you?

Hi Otto,

I looked at the code, and while it would be easy to replace the podman
commands to run containers, I wonder if there isn't a major roadblock:

The main use of Singularity containers is to provide static images for
software.  The default is that the image is read-only and has write
access to the host filesystems.  Thus, running apt upgrade in a
singularity container isn't something that is done usually.  It might
even be impossible, although I am not expert enough to make that
statement firmly.

Is there a chance debcraft can work from a static container provided by
the user?

I think that the key problem I have is that I want to use a build Debian
packages that need no root access and that do not need to install
dependencies that need root access, and I want to do that with user
privileges only.

Have a nice day,

Charles

-- 
Charles Plessy Nagahama, Yomitan, Okinawa, Japan
Debian Med packaging team http://www.debian.org/devel/debian-med
Tooting from home  https://framapiaf.org/@charles_plessy
- You  do not have  my permission  to use  this email  to train  an AI -



Re: Tool to build Debian packages not requiring root in containers ?

2024-05-08 Thread Otto Kekäläinen
Hi!


ti 7. toukok. 2024 klo 23.01 Charles Plessy  kirjoitti:

> Le Tue, May 07, 2024 at 08:17:31PM -0700, Otto Kekäläinen a écrit :
> >
> > Can you give me an example of a package you want to build and what is
> > the starting point, and I can tell you what command to issue to
> > https://salsa.debian.org/otto/debcraft to achieve it?
> >
> > It supports running Podman in user mode (=no root permissions needed),
>
> Hi Otto,
>
> it looks really great!
>
> Do you think you can make it work with Singularity/Apptainer instead of
> Podman?  Our cluster runs only singularity 3.5.2
> (https://docs.sylabs.io/guides/3.5/user-guide/).  Debian has version
> 4.1.2 in the singularity-container package.
>
> The conversion of a Docker container to the Singularity format is
> simple, and Singularity already mounts most of the local storage to make
> it visible and writable from within the container.
>

I read the docs on how Singularity is able to pull Docker images of Debian
Sid and build on top of them, and run and exec just like Docker/Podman.
Unfortunately it has its own Containerfile format (
https://docs.sylabs.io/guides/3.5/user-guide/quick_start.html#singularity-definition-files)
and the commands have their own syntax. I guess Debcraft could be extended
to support it, but that would require at least one Singularity user as
frequent contributor to test and develop Singularity-compatibility.

The entire code base is shell code. Perhaps you want to take a look if it
looks hackable for you?


Re: Tool to build Debian packages not requiring root in containers ?

2024-05-08 Thread Charles Plessy
Le Tue, May 07, 2024 at 08:17:31PM -0700, Otto Kekäläinen a écrit :
> 
> Can you give me an example of a package you want to build and what is
> the starting point, and I can tell you what command to issue to
> https://salsa.debian.org/otto/debcraft to achieve it?
> 
> It supports running Podman in user mode (=no root permissions needed),

Hi Otto,

it looks really great!

Do you think you can make it work with Singularity/Apptainer instead of
Podman?  Our cluster runs only singularity 3.5.2
(https://docs.sylabs.io/guides/3.5/user-guide/).  Debian has version
4.1.2 in the singularity-container package.

The conversion of a Docker container to the Singularity format is
simple, and Singularity already mounts most of the local storage to make
it visible and writable from within the container.

The typical packages that I want to build are the r-bioc-* collection.
Together, they represent a dependency graph deep of a dozen of layers,
which makes transitions work-intensive.

With tools like debcraft I would like to prepare a set of updated
packages for which I know that the CI tests pass, and that can be
uploaded all together at the same time when I we get green light from
the Release team.  (And to rebuild all of them if in the meantime the
contents of Unstable have changed significantly).

Have a nice day,

Charles

-- 
Charles Plessy Nagahama, Yomitan, Okinawa, Japan
Debian Med packaging team http://www.debian.org/devel/debian-med
Tooting from home  https://framapiaf.org/@charles_plessy
- You  do not have  my permission  to use  this email  to train  an AI -



Re: Tool to build Debian packages not requiring root in containers ?

2024-05-07 Thread Otto Kekäläinen
Hi!

On Tue, 7 May 2024 at 15:27, Charles Plessy  wrote:
..
> I want to leverage our cluster to automate as much of the rebuilds as I
> can, but could not find the right tool.  I tried to run sbuild in a
> Singularity image and this failed.  However, I do not need the whole
> power of engines like sbuild, as none of the packages involved require
> root priviledges to build.
>
> Do you have a suggestion for a tool can run in user mode in a container
> image having access to local storage on the host, and that given a
> Debian source control file will download the dependencies and build the
> package ?

Can you give me an example of a package you want to build and what is
the starting point, and I can tell you what command to issue to
https://salsa.debian.org/otto/debcraft to achieve it?

It supports running Podman in user mode (=no root permissions needed),
it loop-mounts a local directory (local storage), creates clean build
containers on the fly similar to sbuild but is much easier and faster
to use.

Example of how to build one of your packages with just pointing it at
the source git repo:

$ debcraft build https://salsa.debian.org/med-team/altree.git
Building container 'debcraft-debian-sid' in
'/tmp/tmp.brCZRhn2lL/debcraft-container' for downloader use
mkdir: created directory '/tmp/tmp.brCZRhn2lL/debcraft-container'
STEP 1/10: FROM debian:sid
...
$ ls -1 debcraft-build-altree-1715137513.a8c999a+master
altree_1.3.2-2_amd64.build
altree_1.3.2-2_amd64.buildinfo
altree_1.3.2-2_amd64.changes
altree_1.3.2-2_amd64.deb
altree-dbgsym_1.3.2-2_amd64.deb
altree-examples_1.3.2-2_all.deb
control.log
filelist.log
lintian.log

First build is a bit slow as it needs to download all the dependencies
and create a container, but the second run of 'debcraft build' inside
the source directory will be very fast as all container cache is
reused.



Tool to build Debian packages not requiring root in containers ?

2024-05-07 Thread Charles Plessy
Hello everybody,

I just re-suscribed :)

At work I have access to a nice cluster with plenty of nodes rich of 128
cores and 512 Gb RAM.  The nodes do not run Debian but Singularity is
available for virtualisation 
(https://en.wikipedia.org/wiki/Singularity_(software)).

And in Debian I am part of transitions involving more than 100 packages
every 6 months (r-api-bioc-*)…

I want to leverage our cluster to automate as much of the rebuilds as I
can, but could not find the right tool.  I tried to run sbuild in a
Singularity image and this failed.  However, I do not need the whole
power of engines like sbuild, as none of the packages involved require
root priviledges to build.

Do you have a suggestion for a tool can run in user mode in a container
image having access to local storage on the host, and that given a
Debian source control file will download the dependencies and build the
package ?

Have a nice day,

Charles

-- 
Charles Plessy Nagahama, Yomitan, Okinawa, Japan
Debian Med packaging team http://www.debian.org/devel/debian-med
Tooting from work,   https://fediscience.org/@charles_plessy
Tooting from home, https://framapiaf.org/@charles_plessy



Bug#1070494: ITP: linux-livepatching -- linux livepatching module for Debian

2024-05-06 Thread Santiago Ruano Rincón
Package: wnpp
Severity: wishlist
Owner: Emmanuel Arias , Santiago Ruano Rincón 

X-Debbugs-Cc: debian-devel@lists.debian.org, t...@security.debian.org, 
debian-ker...@lists.debian.org, debian-...@lists.debian.org, eam...@debian.org

* Package name: linux-livepatching   
  Version : 0.0.1 
  Upstream Contact: Emmanuel Arias , Santiago Ruano Rincón 

* URL : https://salsa.debian.org/debian/linux-livepatching
* License : GPL-2+
  Programming Lang: C, Shell scripting, Makefile
  Description : linux livepatching module for Debian

Livepatch modules from the Linux Kernel gives the possibility to apply
security fixes to the Kernel while minimizing the need of rebooting the
machine. We can list a lot of cases where users cannot or do not want to
reboot the system. For instance, while running complex scientific
computations, or systems that need to keeping services up and running as much
as possible without interruption. But in those cases, the system needs to be
stable and secure. Livepatching gives that possibility. For now, this package
is a prototype to do a first step to integrate linux livepatching into
Debian


More than an ITP, this is an Intent to Design an Implement.

(CCing debian-lts, since the subject was brought up there some time ago last
year, and there may be people interested. However, this is something that
should be discussed also with the kernel and the security teams. And as Ben
said during an LTS Team meeting, if this idea is implemented in Debian, it
must go through unstable first.)

Other than having serious fun, the goal of this is ITP is to bring livepatching
for security fixes for the kernel that have been available in the Debian
releases. For the moment, we are looking to design and implement a first
approach, that will live in experimental, while we solve the known and unknown
challenges.

# State of the art, what others do

As readers most be aware, some commercial distributions propose linux live
patching.  However, none of their services is freely (as in beer or as in
speech) available.

* RedHat:
Introduced Kpatch in 2014. Kpatch is packaged in debian, but its current status
is not good. It was removed from bullseye (currently only in buster, sid and
experimental)
https://www.redhat.com/en/blog/introducing-kpatch-dynamic-kernel-patching

* Suse
Released kGraft also in 2014, under GPL 2 (and 3 for userspace tools).
According to the wikipedia, it aims at being merged into the kernel, and a
minimalistic design became part of linux since 4.0.

* Ubuntu
Livepatching is included in Ubuntu Pro. No public details about the
implementation. This is offered as a service where it seems the modules are
downloaded directly from a Ubuntu server (not as a package).

# Mainline kernel

Documentation about livepatching support in the mainline kernel can be found
at:
https://www.kernel.org/doc/html/latest/livepatch/livepatch.html
We aim at building on top of it.


# Limitations and known questions 

As discussed with Salvatore some time ago, there are quite some things to 
consider:
* Triaging issues: who and how issues would be triaged?
* Preparing patches: how patches will be selected, backported and etcetera, and
  maintained as a patch stack for specific kernel versions, during the whole 
life
  of a Debian release.
  We don't intend to add any extra load to the already busy Kernel or Security
  teams. We aim at maintaining this as a team though.
* Testing: what are the requirements for the testing infrastructure? What kind
  of machines are needed for testing the patches before publishing them?

Also:
* Patches should be cumulative.
  How long a specific linux version/package would be supported? The goal of
  this project is to make it possible to apply a limited set security issues
  without rebooting. Until when, for how long?
* We limit the initial prototype to non-signed images. Secure Boot does not
  allow to install non-signed modules.
* We limit the initial prototype to amd64.

The initial prototype is based on binary module packaging, contrary to what
other vendors do. We will see how this scale.

Comments and questions are welcome in the ITP bug.

Cheers,

Emmanuel and Santiago

P.S. This is the outcome of one of our conversations during the MiniDebConf in
Santa Fe, Argentina. Thanks to the people that made it possible :-)


signature.asc
Description: PGP signature


Correction: New appointments for the Debian Technical Committee: csmall

2024-04-26 Thread Andreas Tille
Dear fellow developers,

sorry, the list of CTTE members in my last mail contained
   Simon McVittie 
but his term has ended already.  Thanks to Simon for his previous work
and here comes the corrected text (with no change but the correct list
of members).

As defined by our constitution (§6.2.2), the Debian Technical Committee
has recommended the appointment to the committee of:

  * Craig Small 

I agree with their recommendation, and hereby appoint Craig as member of
the Technical Committee, effective immediately.

For reference, the nominations and votes are recorded at:

https://bugs.debian.org/1065810

The Technical Committee now consists of:

  * Sean Whitton  (chair)
  * Christoph Berg 
  * Helmut Grohne 
  * Matthew Vernon 
  * Matthew Garrett 
  * Stefano Rivera 
  * Timo Röhling 
  * Craig Small 

Task Description:

The Technical Committee is established by the Debian Constitution,
section 6. It is the body which makes the final decision on technical
disputes in the Debian project.

More info about the Technical Committee, including recent decisions,
discussion and advice, may be found at:

https://www.debian.org/devel/tech-ctte

The previous CTTE Appointment mail can be found at:

https://lists.debian.org/debian-devel-announce/2023/07/msg0.html

Thanks to everyone on the committee who dedicate their time and skills
towards Debian as well as good luck for Craig for the new position!

  Andreas, Debian Project Leader



signature.asc
Description: PGP signature


Bug#1065810: Info received (New appointments for the Debian Technical Committee: csmall)

2024-04-26 Thread Debian Bug Tracking System
Thank you for the additional information you have supplied regarding
this Bug report.

This is an automatically generated reply to let you know your message
has been received.

Your message is being forwarded to the package maintainers and other
interested parties for their attention; they will reply in due course.

Your message has been sent to the package maintainer(s):
 Technical Committee 

If you wish to submit further information on this problem, please
send it to 1065...@bugs.debian.org.

Please do not send mail to ow...@bugs.debian.org unless you wish
to report a problem with the Bug-tracking system.

-- 
1065810: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1065810
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Re: debian-policy: clarify requirement for use of Static-Built-Using

2024-04-23 Thread Fabian Grünbichler
On Fri, Apr 19, 2024 at 07:59:19AM +0100, Sean Whitton wrote:
> Hello Go and Rust packagers,
> 
> On Thu 18 Apr 2024 at 11:29pm +03, Maytham Alsudany wrote:
> 
> > With the increasing amount of programs in Debian that Build-Depend and
> > statically link with Golang and Rust libraries, it's important that
> > the Debian Policy clearly sets out the requirements for declaring
> > these statically-linked libraries.
> 
> I think Maytham is right that updating Policy for this is a priority.
> It has been bothering me that misunderstandings of Built-Using have been
> proliferating somewhat among newer contributors.  See also #999785.
> 
> Could you take a look at his proposed changes to Policy in #1069256,
> please, and confirm they successfully reconcile Debian Policy with your
> team policies?

Speaking for the Rust side - I'd say they match our expected usage of
the field. A slight rephrasing of "linked to libraries in other
packages" might match it even better, since in Rust's case, we are
usually talking about linking to libraries compiled from sources shipped
in other packages (librust-X-dev only contains the sources and possibly
helper scripts needed to build them, but not the compiled library).

But it also covers static linking of native libraries, so the current
phrasing matches that. Might be bikeshedding/nitpicky though ;)

> I think that we should also include an explanation of why we have chosen
> to do this using a new field in d/control like Static-Built-Using.
> Policy is meant to be a record of our lessons learned in building a
> distribution, and the lessons learned in trying to handle these new
> hyper-statically linked language ecosystems seem important.
> 
> My immediate question is why the Haskell and OCaml team's approaches,
> were not copied.  They seem to work well and don't require a new field.
> That seems worth writing down.

I am not sure about the details of their approach... are those available
somewhere?

> Thank you Maytham for your work so far.

Thanks to both of you! :)



Accepted rshim-user-space 2.0.20+debian-2 (source) into unstable

2024-04-23 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 20 Apr 2024 19:26:49 +0200
Source: rshim-user-space
Architecture: source
Version: 2.0.20+debian-2
Distribution: unstable
Urgency: medium
Maintainer: da...@debian.org
Changed-By: Taihsiang Ho (tai271828) 
Closes: 1064920
Changes:
 rshim-user-space (2.0.20+debian-2) unstable; urgency=medium
 .
   * debian/rules: update CFLAG for FTBFS on armhf (Closes: #1064920)
   * debian/rules: conditionally append for armhf arch
   * debian/rules: apply the best practice of DEB_BUILD
Checksums-Sha1:
 4a346ccbdf8379f5bd7a55e1c33af218c612f1b5 2044 
rshim-user-space_2.0.20+debian-2.dsc
 15432a2092ac8956230f9e02f3efca0064a209ad 2908 
rshim-user-space_2.0.20+debian-2.debian.tar.xz
 45b1e36d2f8ea34541ce3c64bb83f2091dac6dba 7976 
rshim-user-space_2.0.20+debian-2_source.buildinfo
Checksums-Sha256:
 db49e5a77fc0691a005c06f30743920f16067426bf19f6352e7cebe9831528dd 2044 
rshim-user-space_2.0.20+debian-2.dsc
 7f0280d9997b945d780e949d8e18f4c80a52009aa76286e9a1a44a80fc0b1eec 2908 
rshim-user-space_2.0.20+debian-2.debian.tar.xz
 b6e8680d153428381f1161cc0f24beb33d9dcbe0e2690f699a2d2ef2908b66a6 7976 
rshim-user-space_2.0.20+debian-2_source.buildinfo
Files:
 b95b4cfe47530478e49244a96fd736ea 2044 admin optional 
rshim-user-space_2.0.20+debian-2.dsc
 65fb8723a7e9d4691bb5641d8655cc47 2908 admin optional 
rshim-user-space_2.0.20+debian-2.debian.tar.xz
 44df61d4e68cb7b31b1ae480d6179ba9 7976 admin optional 
rshim-user-space_2.0.20+debian-2_source.buildinfo

-BEGIN PGP SIGNATURE-
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=SOVQ
-END PGP SIGNATURE-



pgp0wU_XlUA6m.pgp
Description: PGP signature


Re: Please block glj....@gmail.com from Debian lists [Re: UOC and Britsh Council lawsuit]

2024-04-23 Thread Jose Luis Tallon

On 22/4/24 21:29, Steve Langasek wrote:

On Mon, Apr 22, 2024 at 05:11:39PM +0200, José Luis González González wrote:

I sent 5 minutes ago an email to "Plaza de Castilla *courts*" setting


                    ^^^

BS. It just doesn't work like this.  A regular citizen can't communicate 
with a Court by email.


    You can't even interact with a case proceedings until you are a 
party to a particular lawsuit.



it crystal clear that it was a long time ago the lawsuit to Universitat
Oberta de Catalunya and British Council had to be solved.

"Kinda or not"


--
Parkinson's Law: Work expands to fill the time alloted to it.



Please block glj....@gmail.com from Debian lists [Re: UOC and Britsh Council lawsuit]

2024-04-22 Thread Steve Langasek

On Mon, Apr 22, 2024 at 05:11:39PM +0200, José Luis González González wrote:
> I sent 5 minutes ago an email to "Plaza de Castilla *courts*" setting
> it crystal clear that it was a long time ago the lawsuit to Universitat
> Oberta de Catalunya and British Council had to be solved.
> 
> "Kinda or not"
> 

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
Ubuntu Developer   https://www.debian.org/
slanga...@ubuntu.com vor...@debian.org


signature.asc
Description: PGP signature


Accepted ncrack 0.7+debian-6 (source) into unstable

2024-04-21 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 22 Apr 2024 08:59:25 +0700
Source: ncrack
Architecture: source
Version: 0.7+debian-6
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Tools 
Changed-By: Arnaud Rebillout 
Closes: 1065799
Changes:
 ncrack (0.7+debian-6) unstable; urgency=medium
 .
   [ Vladimir Petko ]
   * d/p/{implicit-declaration-in-configure.patch, implicit-declaration-
 xmalloc.patch}: add missing headers and defines to resolve -
 Werror=implicit-function-declaration build failures (Closes:
 #1065799).
Checksums-Sha1:
 ca7dcf02216a45c8604a473b6313856476ef745e 1981 ncrack_0.7+debian-6.dsc
 b86cbe496f10b1e91698aa47241c79deaf1406c1 18368 
ncrack_0.7+debian-6.debian.tar.xz
 dc71067d66e5a508cea23175be51ea42f12613f1 6521 
ncrack_0.7+debian-6_source.buildinfo
Checksums-Sha256:
 60a6ac3348db68e6305bfb4a5afe7051ed6b3f83b050ae03282655580fab29e3 1981 
ncrack_0.7+debian-6.dsc
 94aa57df05fea534664dcb93f70880a22e80cbc144fda2254c89d65030bb2f1f 18368 
ncrack_0.7+debian-6.debian.tar.xz
 5ef07a634dcfb5789e2fe1078a42f1ec297e2f28f94f86ab4ce0c6d052041c36 6521 
ncrack_0.7+debian-6_source.buildinfo
Files:
 9a4414d222032421e81621d040cdfaf6 1981 net optional ncrack_0.7+debian-6.dsc
 4214d0ed4ac01aec244ffc0412d8a385 18368 net optional 
ncrack_0.7+debian-6.debian.tar.xz
 678cae5ed5c62d5638955d07396d486c 6521 net optional 
ncrack_0.7+debian-6_source.buildinfo

-BEGIN PGP SIGNATURE-

iQJFBAEBCgAvFiEE0Kl7ndbut+9n4bYs5yXoeRRgAhYFAmYlxNARHGFybmF1ZHJA
a2FsaS5vcmcACgkQ5yXoeRRgAhZdCxAAkY7IJTo0vtd82E4ddzeKtS2AxyGaTGbR
fXukJFYMmyjRAO/lZpd3RM+1j0KDgbG6eZr+gAv/+YFP+WOJK1gwSoiTBJcAZyWC
LW0Re6gl/WuxSDOMRuiEd2AS7CtMfvlTmfZmTCEtnnAcHUuE2HYH33SsoQYcp9ys
hiep8AdtbLG8UbEoCU7hCHXStqXcAeZPEWRtiCeIvsla1pczmIbUCQVf7wrS2bN/
zIWO/rRsdH7GY1pKW6T0Cz+lb6MU17bBs9wZBPxMzIDBc1005FqayU4JAANpUpq9
xmZv4koNCjmEOrFrfKtfuyB+C0xoAVigC8rWOgJmmO8F6DK81+dMoVGtP/DgeqKr
niDlY+nHdFxhjgV8/b567P3VMcCXDy5dY7Ebb9+jOrelaY/svW8Mq4Sa01lqgY2o
NW1mXGXFwqZou6s0lr5P/oBGQS+ttoRmgaRaYb7sQEUXHlSiyJNLKNMekILRHKcx
EuTwn+wwcufIhyDKze5vGNIKUjDQl6dRnzPfBH66JaEYhY6dwG6rFr6S8C33QmAt
mj1yf0pcM30tCZjH7c3i6HGkkt9PDIhOvnuoJnwHy5/mgEw5Nuy+bGlBT30VziL7
TrFsd0RlTEjSBfYMDr0kxEs36nEOIaDv7DD7oE6OwhETWFOBBiq5BgQY6rJMwV45
7E0Y/gUn12M=
=GkUR
-END PGP SIGNATURE-



pgpY6tTSZ9Q0S.pgp
Description: PGP signature


Results for Debian Project Leader 2024 Election

2024-04-19 Thread devotee
Greetings,

This message is an automated, unofficial publication of vote results.
 Official results shall follow, sent in by the vote taker, namely
Debian Project Secretary

This email is just a convenience for the impatient.
 I remain, gentle folks,

Your humble servant,
Devotee (on behalf of Debian Project Secretary)

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Starting results calculation at Sat Apr 20 00:01:05 2024

Option 1 "Andreas Tille"
Option 2 "Sruthi Chandran"
Option 3 "None of the above"

In the following table, tally[row x][col y] represents the votes that
option x received over option y.

  Option
  1 2 3 
===   ===   === 
Option 1  201   293 
Option 2135 280 
Option 3 6466   



Looking at row 2, column 1, Sruthi Chandran
received 135 votes over Andreas Tille

Looking at row 1, column 2, Andreas Tille
received 201 votes over Sruthi Chandran.

Option 1 Reached quorum: 293 > 46.3788745012209
Option 2 Reached quorum: 280 > 46.3788745012209


Option 1 passes Majority.   4.578 (293/64) >= 1
Option 2 passes Majority.   4.242 (280/66) >= 1


  Option 1 defeats Option 2 by ( 201 -  135) =   66 votes.
  Option 1 defeats Option 3 by ( 293 -   64) =  229 votes.
  Option 2 defeats Option 3 by ( 280 -   66) =  214 votes.


The Schwartz Set contains:
 Option 1 "Andreas Tille"



-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

The winners are:
 Option 1 "Andreas Tille"

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

-- 
The voters have spoken, the bastards... --unknown
DEbian VOTe EnginE
digraph Results {
  ranksep=0.25;
 "Andreas Tille\n4.58" [ style="filled" , color="powderblue", shape=egg, 
fontcolor="NavyBlue", fontname="Helvetica", fontsize=10  ];
 "Andreas Tille\n4.58" -> "Sruthi Chandran\n4.24" [ label="66" ];
 "Andreas Tille\n4.58" -> "None of the above" [ label="229" ];
 "Sruthi Chandran\n4.24" [ style="filled" , fontname="Helvetica", fontsize=10  
];
 "Sruthi Chandran\n4.24" -> "None of the above" [ label="214" ];
 "None of the above" [ style="filled" , shape=diamond, fontcolor="Red", 
fontname="Helvetica", fontsize=10  ];
}


pgp4ELkjaQSw4.pgp
Description: PGP signature


Re: Debian

2024-04-19 Thread José Luis González González
On Fri, 19 Apr 2024 10:09:26 +0200
José Luis González González  wrote:

> On Fri, 19 Apr 2024 09:59:57 +0200
> José Luis González González  wrote:
> 
> > On Fri, 19 Apr 2024 09:39:02 +0200
> > José Luis González González  wrote:
> > 
> > > Good day,
> > > 
> > > There's an issue with the dash package and maintainer, and mutt as well.
> > > 
> > > I even tried to reach dash maintainer privately and he is not even on
> > > the package's field (queried by dpkg), there's someone who is obviosly
> > > fake instead: Andrej Shadura 
> > > 
> > > The issues with dash so far, that I know, is the shell was bash when I
> > > switched to dash because of bash's Stallman's "Eight Megabytes And
> > > constantly Swapping *And Spying And Boycotting*", and after I enabled
> > > "fingerd" in my personal website's server and some time passed the
> > > package returned to dash, however there's at least one obvious back
> > > door, and program is going the way of bash, preventing from using the
> > > Operating system. This has happened before, thrice recently.
> > > 
> > > Additionally the files on /usr/share/doc/dash are wrong.
> > > 
> > > The main issues of mutt that I know so far is the documentation is
> > > useless for what I needed, which is using the program, and the package,
> > > that was installed, is missing from my computer, besides the maintainer
> > > being subversive as well.
> > > 
> > > If this is not solved I will cease to stop using Debian and Debian will
> > > die.
> > > 
> > > "Kinda or not"
> > 
> > The problems that I had in 2020 were life or death security problems
> > that prevented me to use my computer at all for almost one year. I even
> > lost my computer, had to buy another one in 2021 and reinstall
> > everything, with severe problems, that even involved having to go
> > several times to public library, and recording "the" DVD first disc
> > with non-free firmware adding it selectively from USB didn't work.
> > 
> > The problems in 2023 involved ceasing being able to use the computer
> > because of innumerable trojans, and having to resort to the public
> > library again because of the DVD that I had recorded with Debian 10.5
> > becoming subversive when I needed it to rescue my operating system and
> > turning as 11.5, which is not what I wanted at all. I ended up having
> > to record 11.5, install it, and even upgrade to 12.
> 
> There are similar issues with boa and dhttpd, and it seems Apache is going 
> that way.

Debian is finally unusable for me.



Re: Debian

2024-04-19 Thread Steve McIntyre
You've written a lot of text here in a few mails, replying to yourself
several times. This is not a positive pattern.

On Fri, Apr 19, 2024 at 11:58:18AM +0200, José Luis González González wrote:



>> There are similar issues with boa and dhttpd, and it seems Apache is going 
>> that way.
>
>nvi adds to the subversive ones, with bash, etc.

What on earth do you mean by "subversive" here??

-- 
Steve McIntyre, Cambridge, UK.st...@einval.com
"Arguing that you don't care about the right to privacy because you have
 nothing to hide is no different than saying you don't care about free
 speech because you have nothing to say."
   -- Edward Snowden



Re: Debian

2024-04-19 Thread José Luis González González
On Fri, 19 Apr 2024 10:09:26 +0200
José Luis González González  wrote:

> On Fri, 19 Apr 2024 09:59:57 +0200
> José Luis González González  wrote:
> 
> > On Fri, 19 Apr 2024 09:39:02 +0200
> > José Luis González González  wrote:
> > 
> > > Good day,
> > > 
> > > There's an issue with the dash package and maintainer, and mutt as well.
> > > 
> > > I even tried to reach dash maintainer privately and he is not even on
> > > the package's field (queried by dpkg), there's someone who is obviosly
> > > fake instead: Andrej Shadura 
> > > 
> > > The issues with dash so far, that I know, is the shell was bash when I
> > > switched to dash because of bash's Stallman's "Eight Megabytes And
> > > constantly Swapping *And Spying And Boycotting*", and after I enabled
> > > "fingerd" in my personal website's server and some time passed the
> > > package returned to dash, however there's at least one obvious back
> > > door, and program is going the way of bash, preventing from using the
> > > Operating system. This has happened before, thrice recently.
> > > 
> > > Additionally the files on /usr/share/doc/dash are wrong.
> > > 
> > > The main issues of mutt that I know so far is the documentation is
> > > useless for what I needed, which is using the program, and the package,
> > > that was installed, is missing from my computer, besides the maintainer
> > > being subversive as well.
> > > 
> > > If this is not solved I will cease to stop using Debian and Debian will
> > > die.
> > > 
> > > "Kinda or not"
> > 
> > The problems that I had in 2020 were life or death security problems
> > that prevented me to use my computer at all for almost one year. I even
> > lost my computer, had to buy another one in 2021 and reinstall
> > everything, with severe problems, that even involved having to go
> > several times to public library, and recording "the" DVD first disc
> > with non-free firmware adding it selectively from USB didn't work.
> > 
> > The problems in 2023 involved ceasing being able to use the computer
> > because of innumerable trojans, and having to resort to the public
> > library again because of the DVD that I had recorded with Debian 10.5
> > becoming subversive when I needed it to rescue my operating system and
> > turning as 11.5, which is not what I wanted at all. I ended up having
> > to record 11.5, install it, and even upgrade to 12.
> 
> There are similar issues with boa and dhttpd, and it seems Apache is going 
> that way.

nvi adds to the subversive ones, with bash, etc.



Accepted debian-keyring 2024.03.24 (source) into unstable

2024-04-19 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 24 Mar 2024 09:03:13 +
Source: debian-keyring
Architecture: source
Version: 2024.03.24
Distribution: unstable
Urgency: medium
Maintainer: Debian Keyring Maintainers 
Changed-By: Jonathan McDowell 
Changes:
 debian-keyring (2024.03.24) unstable; urgency=medium
 .
   [ Gunnar Wolf ]
   * Replace 0xE33E61A2E9B8C3A2 with 0xDD839B748F10AD4D (Gwen Weinholt)
 (RT #9447)
 .
   [ John Sullivan ]
   * Add new DD key 0xC6D50A4188C70E43 (Patrick Winnertz) (RT #9450)
   * Add new DM key 0x0B8D177155F6646E (Jean Charles Delépine) (RT #9448)
   * Add new DM key 0x6594486E01294708 (Guilherme Puida Moreira) (RT
 #9464)
 .
   [ Jonathan McDowell ]
   * Add new DM key 0x13498F032CCFE9DA (Tobias Heider) (RT #9451)
   * Add new DM key 0x1FBF96BB06B28691 (Juri Grabowski) (RT #9456)
   * Replace 0xE3E0A1C286B963EA with 0xB490E3DF337F3213 (Wolfgang Martin
 Borgert) (RT #9453)
   * Import changes sent to keyring.debian.org HKP interface:
 * 0x033C4CA276024834 Athos Coimbra Ribeiro  sig:3
 * 0x0B00FB6CEBE2D002 Ulises Vitulli  sig:3
 * 0x1762E0227034CF84 William Blough  sig:7
 * 0x1ABFA401CCAA707A Patryk Cisek  sig:3
 * 0x1E625DF64972FF9A Filip Hroch  sig:1
 * 0x22AFD1C0DAC8BC06 Santiago Ruano Rincón  sig:7
 * 0x2404C9546E145360 Gunnar Wolf  sig:3
 * 0x2834516CDA1E968D Håvard Flaget Aasen  sig:5
 * 0x293010013344 Gergely Riskó  sig:2
 * 0x2E7C0367B9BFA089 Scarlett Moore  sig:8
 * 0x3116BA5E9FFA69A3 Paul Wise  sig:3
 * 0x3357018EBC0A Fabian Grünbichler  sig:1
 * 0x47DAC12E5D3610E6 Yogeswaran Umasankar  sig:1
 * 0x4AD58E3068E669E2 Alexis Bienvenüe  sig:2
 * 0x4E142C216BDFC613 Jeremy Paul Arnold Sowden  uid:1 sig:3
 * 0x5291703BFA09034E Carlos Henrique Lima Melara  sig:1
 * 0x53FE7BBDA68910FC Ross Gammon  sig:2
 * 0x55E9F9F7AC1C443F Marc Dequènes  sig:7
 * 0x56A0D81F9F782DA9 Ricardo Ribalda Delgado  uid:1 sig:1
 * 0x57930DAB0B86B067 Joost van Baal  sig:3
 * 0x5ACE8D6E0C14A470 Luke Faraone  sig:50
 * 0x5B924EE310055CD3 Marcelo Jorge Vieira  sig:4
 * 0x5D5F6C020398A60A Peter Wienemann  sig:1
 * 0x634F4BD1E7AD5568 Enrico Zini  sig:4
 * 0x648047B2D723891C Jean-Philippe MENGUAL  sig:4
 * 0x6C6ACD6417B3ACB1 Roger Shimizu  sig:6
 * 0x6F31F7545A885252 Nicolas Dandrimont  sig:4
 * 0x72CF8E5E25B4C293 Matthias Ulrichs  uid:2 sig:9
 * 0x7541CFAAFC35EACF Stephen Gelman  sig:6
 * 0x766C8B3DDE6699FE Thomas Ward  sig:3
 * 0x793CF67E8F0D11DA Étienne Mollier  sig:3
 * 0x83016014251D1DB0 Carsten Schoenert  sig:1
 * 0x88237A6A53AB1B2E Harlan Lieberman-Berg  sub:2 sig:7
 * 0x90F0C9B18A6B4A19 Evangelos Ribeiro Tzaras  sig:2
 * 0x97A0FA0FC8F2DE45 Stefano Rivera  sig:3
 * 0x9C5C99EB05BD750A Paul Gevers  sig:4
 * 0x9D0470BDA6CDC457 Neutron Soutmun  sig:6
 * 0xB82A217AFDFE09F2 David Prévot  sig:3
 * 0xC21D9AD423A39727 Blair Noctis  sig:6
 * 0xC31F4FD949AB2B6C Dominique Dumont  uid:1 sig:9
 * 0xC32A4D0858F5A6EA Alper Nebi Yasak  sig:1
 * 0xC7F7F9660D82A682 Laurent Bigonville  sig:3
 * 0xCC65B0CDEC275D5B ChangZhuo Chen  sig:1
 * 0xD15D313882004173 Russ Allbery  sig:1
 * 0xD36F769BC11804F0 Theodore Ts'o  sig:3
 * 0xD73CF638C53C06BE Simon Josefsson  sig:4
 * 0xDECA0C9D30ED9FE3 Elana Hashman  sig:4
 * 0xE197012676B9B739 David Kalnischkies  sig:6
 * 0xE267B052364F028D NIIBE Yutaka  sig:2
 * 0xED63B6125A1D1561 Dima Kogan  sig:2
 * 0xEEED479E6CECF707 Ananthu C V  sig:10
 * 0xF15DCE5316051F27 Sergio Almeida Cipriano Junior  sig:2
 * 0xFA9DEC5DE11C63F1 Emmanuel Arias  sig:1
Checksums-Sha1:
 aaa9312065a16a2bcaa7b8262328e488a5cb39b7 1211 debian-keyring_2024.03.24.dsc
 3745c8f424458057d871139d3d5e1c0ae5036342 34633088 
debian-keyring_2024.03.24.tar.xz
 b522d7f9a525dec957d697336f23dc3c4bd0301d 6502 
debian-keyring_2024.03.24_amd64.buildinfo
Checksums-Sha256:
 01a0f254ee5e359352b24bab20d04e6fc388f5be5cd78577a2cadc0043cf7bcf 1211 
debian-keyring_2024.03.24.dsc
 87ce505e5c8a86fe10c3aee46f241e562a287731d56a3642ef9d6454df6a3fa4 34633088 
debian-keyring_2024.03.24.tar.xz
 d7a09601058ea770c48fb7db4210b97f0c68f8c1f6c10b7a9ae3831819995db4 6502 
debian-keyring_2024.03.24_amd64.buildinfo
Files:
 4f6afa292d8e5c60a0239ce3391cc315 1211 misc optional 
debian-keyring_2024.03.24.dsc
 55fac00e0e13abbe60c1e9824ea4441e 34633088 misc optional 
debian-keyring_2024.03.24.tar.xz
 5165f61c429de6976f083b322a1ac29e 6502 misc optional 
debian-keyring_2024.03.24_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iHUEARYKAB0WIQSAYP1ALvrBQa1odmMPwJuF4mk8PAUCZiImJwAKCRAPwJuF4mk8
PFvUAQDgNZT6gqT95tCYMaJc9AplmDTGu4IrMMiZ0IHhtsg1OAEAxzafrCKPoLwr
Iw+ve71Cqtvzl3rexAECuEkpqFLJpww=
=/YXt
-END PGP SIGNATURE-



pgpu34IuXDvxE.pgp
Description: PGP signature


Re: Debian

2024-04-19 Thread José Luis González González
On Fri, 19 Apr 2024 09:59:57 +0200
José Luis González González  wrote:

> On Fri, 19 Apr 2024 09:39:02 +0200
> José Luis González González  wrote:
> 
> > Good day,
> > 
> > There's an issue with the dash package and maintainer, and mutt as well.
> > 
> > I even tried to reach dash maintainer privately and he is not even on
> > the package's field (queried by dpkg), there's someone who is obviosly
> > fake instead: Andrej Shadura 
> > 
> > The issues with dash so far, that I know, is the shell was bash when I
> > switched to dash because of bash's Stallman's "Eight Megabytes And
> > constantly Swapping *And Spying And Boycotting*", and after I enabled
> > "fingerd" in my personal website's server and some time passed the
> > package returned to dash, however there's at least one obvious back
> > door, and program is going the way of bash, preventing from using the
> > Operating system. This has happened before, thrice recently.
> > 
> > Additionally the files on /usr/share/doc/dash are wrong.
> > 
> > The main issues of mutt that I know so far is the documentation is
> > useless for what I needed, which is using the program, and the package,
> > that was installed, is missing from my computer, besides the maintainer
> > being subversive as well.
> > 
> > If this is not solved I will cease to stop using Debian and Debian will
> > die.
> > 
> > "Kinda or not"
> 
> The problems that I had in 2020 were life or death security problems
> that prevented me to use my computer at all for almost one year. I even
> lost my computer, had to buy another one in 2021 and reinstall
> everything, with severe problems, that even involved having to go
> several times to public library, and recording "the" DVD first disc
> with non-free firmware adding it selectively from USB didn't work.
> 
> The problems in 2023 involved ceasing being able to use the computer
> because of innumerable trojans, and having to resort to the public
> library again because of the DVD that I had recorded with Debian 10.5
> becoming subversive when I needed it to rescue my operating system and
> turning as 11.5, which is not what I wanted at all. I ended up having
> to record 11.5, install it, and even upgrade to 12.

There are similar issues with boa and dhttpd, and it seems Apache is going that 
way.



Debian

2024-04-19 Thread José Luis González González
On Fri, 19 Apr 2024 09:39:02 +0200
José Luis González González  wrote:

> Good day,
> 
> There's an issue with the dash package and maintainer, and mutt as well.
> 
> I even tried to reach dash maintainer privately and he is not even on
> the package's field (queried by dpkg), there's someone who is obviosly
> fake instead: Andrej Shadura 
> 
> The issues with dash so far, that I know, is the shell was bash when I
> switched to dash because of bash's Stallman's "Eight Megabytes And
> constantly Swapping *And Spying And Boycotting*", and after I enabled
> "fingerd" in my personal website's server and some time passed the
> package returned to dash, however there's at least one obvious back
> door, and program is going the way of bash, preventing from using the
> Operating system. This has happened before, thrice recently.
> 
> Additionally the files on /usr/share/doc/dash are wrong.
> 
> The main issues of mutt that I know so far is the documentation is
> useless for what I needed, which is using the program, and the package,
> that was installed, is missing from my computer, besides the maintainer
> being subversive as well.
> 
> If this is not solved I will cease to stop using Debian and Debian will
> die.
> 
> "Kinda or not"

The problems that I had in 2020 were life or death security problems
that prevented me to use my computer at all for almost one year. I even
lost my computer, had to buy another one in 2021 and reinstall
everything, with severe problems, that even involved having to go
several times to public library, and recording "the" DVD first disc
with non-free firmware adding it selectively from USB didn't work.

The problems in 2023 involved ceasing being able to use the computer
because of innumerable trojans, and having to resort to the public
library again because of the DVD that I had recorded with Debian 10.5
becoming subversive when I needed it to rescue my operating system and
turning as 11.5, which is not what I wanted at all. I ended up having
to record 11.5, install it, and even upgrade to 12.



Re: debian-policy: clarify requirement for use of Static-Built-Using

2024-04-19 Thread Sean Whitton
Hello Go and Rust packagers,

On Thu 18 Apr 2024 at 11:29pm +03, Maytham Alsudany wrote:

> With the increasing amount of programs in Debian that Build-Depend and
> statically link with Golang and Rust libraries, it's important that
> the Debian Policy clearly sets out the requirements for declaring
> these statically-linked libraries.

I think Maytham is right that updating Policy for this is a priority.
It has been bothering me that misunderstandings of Built-Using have been
proliferating somewhat among newer contributors.  See also #999785.

Could you take a look at his proposed changes to Policy in #1069256,
please, and confirm they successfully reconcile Debian Policy with your
team policies?

I think that we should also include an explanation of why we have chosen
to do this using a new field in d/control like Static-Built-Using.
Policy is meant to be a record of our lessons learned in building a
distribution, and the lessons learned in trying to handle these new
hyper-statically linked language ecosystems seem important.

My immediate question is why the Haskell and OCaml team's approaches,
were not copied.  They seem to work well and don't require a new field.
That seems worth writing down.

Thank you Maytham for your work so far.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Bug#1069256: debian-policy: clarify requirement for use of Static-Built-Using

2024-04-18 Thread Maytham Alsudany
Package: debian-policy
Version: 4.7.0.0
Severity: normal
X-Debbugs-Cc: debian-devel@lists.debian.org

Dear Policymakers,

With the increasing amount of programs in Debian that Build-Depend and
statically link with Golang and Rust libraries, it's important that the
Debian Policy clearly sets out the requirements for declaring these
statically-linked libraries.

Currently, section 7.8 of the policy is a bit vague regarding stating static
libraries. It begins with saying:

  Some binary packages incorporate parts of other packages when built but do
  not have to depend on those packages. Examples include linking with static
  libraries or incorporating source code from another package during the build.

It then states:

  [The Built-Using field] should be used only when there are license or DFSG
  requirements to retain the referenced source packages. It should not be added
  solely as a way to locate packages that need to be rebuilt against newer
  versions of their build dependencies.

This makes it seem that Built-Using shouldn't be used to declare
statically-linked dependencies, though that is not the case[1].

In early 2022, Guillem added support for a new Static-Built-Using field to
dpkg, encouraging packagers to use it over Built-Using to specify
statically-linked dependencies [2]. The commit message states the following:

  This field mimics the previous Built-Using field semantics, but is
  specifically intended for shadow dependencies stemming from static builds.
  
  In Debian, the Rust and Go teams agreed to use this language agnostic field,
  instead of one for each of the languages. This means it can be easily
  supported by dpkg, and can be used by other languages and run-times.

This was also added to the deb-control(5) manpage, specifically differentiating
it from Built-Using as a field to be used "for static building purposes (for
example linking against static libraries, builds for source-centered languages
such as Go or Rust[...])".

The proposed change is to clarify and formally mandate the requirement to
declare statically-linked libraries used to build packages containing binaries
in Static-Built-Using. Attached is a draft patch of the proposed change.
Feedback is welcome!

Kind regards,
Maytham

[1]: The Go team requires that Built-Using is specified for packages containing
 binary programs, and this is evident in the templates outputted by
 dh-make-golang. (This is being migrated over to Static-Built-Using, the
 correct field for this purpose.)

 Similarly, the Rust team also requires that
 Static-Built-Using are specified, as evident in debcargo's output when
 generating d/control files. (X-Cargo-Built-Using is currently being used
 but will soon be replaced by Static-Built-Using with the next upload.)

 The Rust team also uses Built-Using when required, where dh-cargo/cargo
 will check for and collate a list of any packages with copyleft licenses
 in the dependency tree that require accompanying source.

[2]: 
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=16c412439c5eac5f32930946df9006dfc13efc02
 https://lists.debian.org/debian-devel-changes/2022/03/msg03007.html

From a9b9c513ae985fddca1bf9cceadce6d3d620ce53 Mon Sep 17 00:00:00 2001
From: Maytham Alsudany 
Date: Thu, 18 Apr 2024 22:29:01 +0300
Subject: [PATCH] Require use of Static-Built-Using to declare
 statically-linked libraries

---
 policy/ch-relationships.rst | 36 ++--
 1 file changed, 34 insertions(+), 2 deletions(-)

diff --git a/policy/ch-relationships.rst b/policy/ch-relationships.rst
index fb9dae8..31a1757 100644
--- a/policy/ch-relationships.rst
+++ b/policy/ch-relationships.rst
@@ -666,8 +666,8 @@ dependency to install.
 
 .. _s-built-using:
 
-Additional source packages used to build the binary - ``Built-Using``
--
+Additional source packages used to build the binary - ``Built-Using`` and ``Static-Built-Using``
+
 
 Some binary packages incorporate parts of other packages when built
 but do not have to depend on those packages. Examples include linking
@@ -676,6 +676,9 @@ package during the build. In this case, the source packages of those
 other packages are part of the complete source (the binary package is
 not reproducible without them).
 
+``Built-Using``
+~~~
+
 When the license of either the incorporated parts or the incorporating
 binary package requires that the full source code of the incorporating
 binary package be made available, the ``Built-Using`` field must list
@@ -710,6 +713,35 @@ requirements to retain the referenced source packages.  It should not
 be added solely as a way to locate packages that need to be rebuilt
 against newer versions of their build dependencies.
 
+``Static-Built-Using``
+~~
+
+Whe

Accepted dsniff 2.4b1+debian-33 (source) into unstable

2024-04-17 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 17 Apr 2024 14:53:41 +0700
Source: dsniff
Architecture: source
Version: 2.4b1+debian-33
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Tools 
Changed-By: Arnaud Rebillout 
Closes: 1066431
Changes:
 dsniff (2.4b1+debian-33) unstable; urgency=medium
 .
   * Add missing libnsl-dev to Build-Depends (Closes:#1066431).
Checksums-Sha1:
 e5832781b5fd29e352a26ddbc483367cf664aa05 2127 dsniff_2.4b1+debian-33.dsc
 ec4fe6359605a2a7ea44f7e63edf0a847b59f11d 30960 
dsniff_2.4b1+debian-33.debian.tar.xz
 489225d93d5a0d25edd8147f0e8c949583e72db6 6506 
dsniff_2.4b1+debian-33_source.buildinfo
Checksums-Sha256:
 1162c1df7c59a30df0431c17e214c7a360c4369d8556f94596e28686a0488011 2127 
dsniff_2.4b1+debian-33.dsc
 105549327ba5dcca8ecf77b1eb4a201bfccbef6cf504905cd705a78fbae2c984 30960 
dsniff_2.4b1+debian-33.debian.tar.xz
 939ae98abb84b45708e56cf23a5168241a448981e8a300212d12b019933e3c09 6506 
dsniff_2.4b1+debian-33_source.buildinfo
Files:
 0eff5f87516ec7e751c3f9f4df821524 2127 net optional dsniff_2.4b1+debian-33.dsc
 a1a1aa84bc550b2d54466fdf0cb20f14 30960 net optional 
dsniff_2.4b1+debian-33.debian.tar.xz
 2ebd9997a4a78edff4b0d9226cea4c82 6506 net optional 
dsniff_2.4b1+debian-33_source.buildinfo

-BEGIN PGP SIGNATURE-
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=IZWz
-END PGP SIGNATURE-



pgpFrWuTAerOr.pgp
Description: PGP signature


Bug#1068823: Stepwise Debian upgrade to enable systems with little free storage space to upgrade without breaks due to "No space left on device"

2024-04-13 Thread David Kalnischkies
On Thu, Apr 11, 2024 at 04:46:03PM +, mYnDstrEAm wrote:
> With the two commands above one can already split it up into two steps but 
> especially the second command still requires a lot of disk space.

I am going to assume that your "a lot of disk space" stems from the
*.deb files that are downloaded. If so, you can e.g. attach an USB disk/
drive and mount it e.g. under /media/apt-archives

Tell apt to use that directory instead of /var/cache/apt/archives, e.g.:
apt upgrade -o dir::cache::archives=/media/apt-archives

(for some more free MBs you could 'apt clean' and then move dir::cache
 elsewhere, but for that you need to create some directories in the
 target location and the binary caches are not THAT large to make it
 really worthwhile in practice. Similar for other files like
 /var/lib/apt aka dir::state::lists)


Instead of an USB drive you could do the same with e.g. an SD card, drop
them into RAM (if your device has surprisingly more RAM than disk) or
even use a network share (NFS, sshfs, … you name it). The filesystem is
not usually a concern (as in: even fat32 should work given we encode
away the : in epochs).

Note that whoever has write access to the files on the storage (or in
case of unencrypted transfer, also everyone who can meddle with transfer
over the network) could use that to attack you as apt (well, apt will
casually check them first, but after that and dpkg, who actually
interacts with them the most) will assume that the files in
/var/cache/apt/archives (or where ever else you stored them and told apt
to use them) are valid & trusted.


Note also that apt uses for its space check statvfs(3) f_bavail, as in,
depending on how you configured your disk, it should have a couple of
additional free blocks in reserve (typically 5%, see tune2fs(8) -m).
If you know what you are doing, you could decrease that value.


Note that the value apt displays is only an estimate, powered by what
the individual packages claim (via dpkg), which is an estimate. Also, if
you happen to have a 2GB installed, the upgrade will roughly take an
additional 2GB as dpkg would first extract the new files along the old
ones and then replace them in one swoop – so for a bit, you have that
package installed two times. Multiple this by group size, divide by
unchanged files and sprinkle some salt over it for flavour.
Predictions are hard, especially about the future.


I would in general not recommend to try approaches like upgrading
individual packages as that easily leads unsuspecting users into
situations that nobody else has encountered before: aka bugs in
packages that nobody else will encounter as they are either hidden
by the involved set usually being upgraded together as intended™ or
– which tends to be even worse – the breakage is known but ignored
on purpose as the solution is far worse than the problem (at least for
everyone doing upgrades the normal way – example: usrmerge). Also, but
that is just an aside, people grossly overestimate how easy it is for
packages to be upgraded individually (compare: t64 testing migration).


Best regards

David Kalnischkies


signature.asc
Description: PGP signature


Bug#1068823: Stepwise Debian upgrade to enable systems with little free storage space to upgrade without breaks due to "No space left on device"

2024-04-13 Thread Bernd Zeimetz
On Thu, 2024-04-11 at 16:46 +, mYnDstrEAm wrote:
> 
> For example, I think a good approach to this would be something like
> this (if the user is low on root partition disk space):
> 1. asking for *at least* 400MB to be available
> 2. if a parameter for stepwise is set or it detected low free disk
> space:
> 3. downloading the first 300 MB or so of packages
> 4. installing these
> 5. deleting the cached packages from /var/cache/apt/archives/
> 6. downloading the next batch up to the storage limit set at start
> 7. and so on (without exiting in-between)
> 

quick and dirty and not tested:

while apt -s upgrade | grep '^Inst' | head -1 | awk '{print $2}' |
xargs apt install; do apt clean; done

Use head -10 or whatever fits for more/less packages.

-- 
 Bernd ZeimetzDebian GNU/Linux Developer
 http://bzed.dehttp://www.debian.org
 GPG Fingerprint: ECA1 E3F2 8E11 2432 D485  DD95 EB36 171A 6FF9 435F



  1   2   3   4   5   6   7   8   9   10   >