On 6/25/24 08:55, Matthias Urlichs wrote:
On 24.06.24 23:20, tho...@goirand.fr wrote:
I see it as signing the very thing that is pushed to the Debian archive. You aren't uploading a bunch of git SHA to the archive but a source package. It feels very normal that therefor, that is the thing that we would like you to sign. Too bad this is less convenient for your workflow, but that is the correct semantic.

Well, yes. Right now this is the case, and t2u adds an additional step to that equation which historically we didn't have.

However …

(a) the thing I'm signing isn't the thing I worked on. I didn't look at it and, given a git-centric work flow, nobody else will either. It feels very unnormal to me that I'm signing some artifact that I didn't even look at. Heck it felt unnormal to me 20 years ago when I joined and built my first packages.

I do not feel like it is a good point of argumentation that you're saying you wont look at the uploaded source package as an excuse. I do not believe it's a good thing as well, that you're saying you have a completely different view of what's going to end up in the archive. Altogether, it feels very wrong that you're taking all of that as an excuse to say you prefer to only sign a git tag and not bother with anything that goes after that.

(b) we might decide, sometime in the future, that sources.dgit.d.o is to be treated as part of "the Debian archive" and that our builders shall pull from there instead of unpacking a tarball if the maintainer used t2u, thus effectively removing your objection.

I do not care if it's the buildd or the Salsa CI that does the job of transforming your git tree into something usable by DAK. I don't care either whatever transformation of your source thing is involved, that's your own sauce, and I'm fine with whatever tooling you end up using. You have the full freedom to do what you feel like is more productive or convenient.

Though I do care that one signs (meaning: puts their approval stamp on) a source package when uploading, as this is the artifact that DAK will actually use (plus the resulting .deb built by the buildd network, but they use the same source package we're talking about, and it's supposed to be reproducible).

I do not think it is reasonable that a particular (git?) workflow, specific to the way *YOU* prefer working, gains special upload rights. I've read about the deb-rebase workflow, I would hate it, and prefer managing patches with quilt directly. Does this mean your tag2upload doesn't work for me? What if I do not like your workflow, and prefer my own way, and then we need a 2nd way of doing tag2upload? Do you think that then, a 2nd key used to sign tags shall be trusted by DAK? Or a 3rd one? Is there a limit and what is it, to your opinion?

Please do not misread me: I would love a tag2upload feature, and would use it myself. But I very much dislike the implementation you're proposing, which is basically, that we need to blindly trust a signed tag in Git + Salsa CI, and nothing else. This is broken in so many ways.

Cheers,

Thomas Goirand (zigo)

Reply via email to