Re: Q: Debian position on bundled libraries

2018-08-22 Thread Pierre-Elliott Bécue
Le jeudi 23 août 2018 à 06:59:45+0200, Alec Leamas a écrit :
> [may I keep bundled libraries?]

Hi Alec,

Please note that I'm a little new to the Policy and these packaging
questions, so my thoughts probably require to be confirmed by a more
experimented person.

Per Debian's Policy section 4.13[1], the embedding of a code from an
other software packages should be avoided, unless the included package is
explicitly intended to work this way.

I'd say that as soon as there's no other way of having your package work
(right, there's always another way, but my guess is that we don't expect
someone to do hours of work that'll be a pain in the ass to maintain just
for that, especially if the bundled library is a patched set of the original
one) properly, it won't be a problem.

That said, you'll have to reference properly the d/copyright file, and you
should probably strip out all trivially out-strippable libraries that are
already packaged in Debian or packageable by themselves.

HTH.

[1] https://www.debian.org/doc/debian-policy/ch-source.html#s-embeddedfiles

-- 
Pierre-Elliott Bécue
GPG: 9AE0 4D98 6400 E3B6 7528  F493 0D44 2664 1949 74E2
It's far easier to fight for one's principles than to live up to them.


signature.asc
Description: PGP signature


Re: salsa irker bot moved to ssl

2018-08-22 Thread Pierre-Elliott Bécue
Le jeudi 23 août 2018 à 07:01:21+0200, Alexander Wirt a écrit :
> On Thu, 23 Aug 2018, Raphael Hertzog wrote:
> 
> Hi,
> 
> > On Sun, 29 Jul 2018, Alexander Wirt wrote:
> > > in the face of the current spam attacks I implemented CertFP for my 
> > > irker instance. I also updated the default irc link in gitlab. However,
> > > it is possible that every project using the bot has to migrate the server
> > > setting to ssl. So if you miss messages from salsa bot, please check that 
> > > you
> > > use ircs://irc.oftc.net:6697/ as server setting in the irker integration. 
> > >  
> > 
> > Can't you do a global update in the gitlab database to replace the old
> > default value with the new default value ?
> > 
> > I just noticed that we're lacking notifications for most of our packages
> > in the pkg-security-team and the setup script we used[1] does not include
> > the IRC URI explicitly so it would have to be fixed first and then I would
> > have to rerun it on all our repositories.
> > 
> > A simple SQL update query would save us a lot of time. Thank you for
> > considering it.
> Sure, do you have the query? And please ensure not to affect bots
> running on other networks. 

Assuming the DB schema is the same on your instance (I don't see any reason
why it wouldn't)

Can you send me (the best would be in a file, but we may think about
alternatives) the output of

SELECT * FROM services WHERE type='IrkerService';

Cheers,

-- 
Pierre-Elliott Bécue
GPG: 9AE0 4D98 6400 E3B6 7528  F493 0D44 2664 1949 74E2
It's far easier to fight for one's principles than to live up to them.


signature.asc
Description: PGP signature


Re: salsa irker bot moved to ssl

2018-08-22 Thread Alexander Wirt
On Thu, 23 Aug 2018, Raphael Hertzog wrote:

Hi,

> On Sun, 29 Jul 2018, Alexander Wirt wrote:
> > in the face of the current spam attacks I implemented CertFP for my 
> > irker instance. I also updated the default irc link in gitlab. However,
> > it is possible that every project using the bot has to migrate the server
> > setting to ssl. So if you miss messages from salsa bot, please check that 
> > you
> > use ircs://irc.oftc.net:6697/ as server setting in the irker integration.  
> 
> Can't you do a global update in the gitlab database to replace the old
> default value with the new default value ?
> 
> I just noticed that we're lacking notifications for most of our packages
> in the pkg-security-team and the setup script we used[1] does not include
> the IRC URI explicitly so it would have to be fixed first and then I would
> have to rerun it on all our repositories.
> 
> A simple SQL update query would save us a lot of time. Thank you for
> considering it.
Sure, do you have the query? And please ensure not to affect bots
running on other networks. 

Alex


signature.asc
Description: PGP signature


Q: Debian position on bundled libraries

2018-08-22 Thread Alec Leamas
Dear list,

Still investigating packaging opencpn[1]. In this context I have looked
into the bundling [2].

Here is some libraries to unbundle; this could certainly could be done,
However, the core issue is a few libraries which cannot realistically be
unbundled. One example is mygdal, a heavily patched subset of the gdal
package.

So, before proceeding with this work I'd like to know how to handle a
situation like this. Under what conditions (if any) is bundling actually OK?

I deliberately avoid the "convenience copy" term used by the Policy
Manual since i think the term bundled is more accurate here - the plain
copies are not a problem.


Cheers!
--alec

[1] https://opencpn.org/
[2] https://github.com/OpenCPN/OpenCPN/issues/1124



Re: salsa irker bot moved to ssl

2018-08-22 Thread Raphael Hertzog
Hi,

On Sun, 29 Jul 2018, Alexander Wirt wrote:
> in the face of the current spam attacks I implemented CertFP for my 
> irker instance. I also updated the default irc link in gitlab. However,
> it is possible that every project using the bot has to migrate the server
> setting to ssl. So if you miss messages from salsa bot, please check that you
> use ircs://irc.oftc.net:6697/ as server setting in the irker integration.  

Can't you do a global update in the gitlab database to replace the old
default value with the new default value ?

I just noticed that we're lacking notifications for most of our packages
in the pkg-security-team and the setup script we used[1] does not include
the IRC URI explicitly so it would have to be fixed first and then I would
have to rerun it on all our repositories.

A simple SQL update query would save us a lot of time. Thank you for
considering it.

Cheers,

[1] https://salsa.debian.org/mehdi/salsa-scripts/blob/master/irker.sh
-- 
Raphaël Hertzog ◈ Debian Developer

Support Debian LTS: https://www.freexian.com/services/debian-lts.html
Learn to master Debian: https://debian-handbook.info/get/


signature.asc
Description: PGP signature


Bug#906986: ITP: golang-github-xanzy-go-gitlab -- Simple and uniform GitLab API for Go

2018-08-22 Thread Felix Lechner
Package: wnpp
Severity: wishlist
Owner: Felix Lechner 

* Package name: golang-github-xanzy-go-gitlab
  Version : 0.10.8
  Upstream Author : Sander van Harmelen 
* URL : https://github.com/xanzy/go-github/
* License : Apache-2.0
  Programming Lang: Go
  Description : Simple and uniform GitLab API for Go

This package provides a GitLab API that enables Go programs to interact
with GitLab in a simple and uniform way. It covers most of the existing
Gitlab API calls and is updated regularly to add new or missing endpoints.

A golang library, it is a prerequisite for git-lab (#898246).

The package will be maintained as part of the go-team on Salsa. Thank you!



Bug#906983: ITP: gr-dab -- Gnuradio blocks and tools for receiving DAB and DAB+ radio

2018-08-22 Thread Ruben Undheim
Package: wnpp
Severity: wishlist
Owner: Ruben Undheim 

* Package name: gr-dab
  Version : 0.1? (to be released)
  Upstream Author : Andreas Müller, Moritz Luca Schmid etc.
* URL : https://github.com/andrmuel/gr-dab
* License : GPL-3+
  Programming Lang: C++, Python
  Description : Gnuradio blocks and tools for receiving DAB and DAB+ radio



gr-dab contains necessary DSP blocks for receiving DAB and DAB+ transmissions
using a software defined radio such as hackrf, rtl-sdr, USRP etc.

Currently, I plan to maintain it myself, but it may also fit in the Hamradio
Maintainers Team with other GNU radio packages.



Migrating away from ucf without dpkg prompting

2018-08-22 Thread Mark Hindley
Hello,

I am working on fixing bug #905178 which is caused by moving away from using ucf
to manage /etc/default/apt-cacher back to handling it as a standard dpkg
conffile.

I have a working solution which avoids unnecessary prompting. This is to remove
the ucf version of the file in the preinst unless it is modified. dpkg then
installs the new version without prompting.

Can I check that this is the correct way to address it, or should I take an
alternative approach?

Many thanks.

Mark



Bug#906930: ITP: prometheus-trafficserver-exporter -- Prometheus exporter for Apache Traffic Server

2018-08-22 Thread Emanuele Rocca
Package: wnpp
Severity: wishlist
Owner: Emanuele Rocca 

* Package name: prometheus-trafficserver-exporter
  Version : 0.0.2
  Upstream Author : Greg Dallavalle
* URL : https://github.com/gdvalle/trafficserver_exporter
* License : Apache-2.0
  Programming Lang: Python
  Description : Prometheus exporter for Apache Traffic Server

 prometheus-trafficserver-exporter is an Apache Traffic Server metrics
 exporter for Prometheus. It uses the stats_over_http Traffic Server
 plugin to translate JSON data into Prometheus format.



Re: headsup - various redis modules now proprietary!

2018-08-22 Thread Chris Lamb
Hi Robert,

> RedisLabs have changed the license of various modules to be
> incompatible with DFSG guideline 6: the 'Common Clause' rider.
> 
> https://redislabs.com/community/commons-clause/
> 
> Some examples - redis-timeseries, redisearch, rejson, [..]

Filed RC bug for src:redisearch as #906920. As I understnd it, the
Redis server itself will remain BSD.


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-



Re: Bug#906907: ITP: pw -- A simple command-line password manager

2018-08-22 Thread Marc Haber
On Wed, 22 Aug 2018 09:49:28 +0200, Dashamir Hoxha
 wrote:
>On Wed, Aug 22, 2018 at 9:09 AM Carsten Schoenert 
>wrote:
>> This is the third ITP about 'pw'. The last one has produced a longish
>> thread on d-d.
>>
>> https://lists.debian.org/debian-devel/2018/07/msg00199.html
>>
>> The information about this new ITP says nothing about the addressed
>> concerns from the last one. What has been changed since then that would
>> qualify this ITP to been accepted into the archive?
>>
>
>It is actually the second attempt, because the first request had a mistake
>in the subject format and was quickly replaced by the second one.

You should make yourself familiar with how the BTS works. It allows
magically to rename a bug, and to close and re-open bugs.

-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Q: Where is keyring packaging guideline?

2018-08-22 Thread Kentaro Hayashi
Hi,

2018年8月21日(火) 14:39 Paul Wise :
>
> On Tue, Aug 21, 2018 at 1:21 PM, Kentaro Hayashi wrote:
>
> > I want to make 3rd party keyring package (ITP). In the advance, I
> > want to know a best practice about *keyring* packaging. Any hints?
>
> There are some best practices for using 3rd party apt repos here:
>
> https://wiki.debian.org/DebianRepository/UseThirdParty

Thanks!
I've not checked it, so it is very helpful.
It seems that what I want exactly.

> >   sudo apt install -y -V --allow-unauthenticated foobar-keyring
> >   This is reasonable because there is no correct key yet before
> >   installing it.
>
> I don't think this is appropriate at all. Instead, always use an
> out-of-band mechanism for confirming the appropriate OpenPGP keys.
> Having the keyring package in Debian itself is a good idea, but at
> very bare minimum, download the key or fingerprint from a website that
> uses a valid TLS certificate according to the X.509 CA trust model.

I know that it is not appropriate way, but I didn't know that wiki page [1]
at that time.

[1] https://wiki.debian.org/DebianRepository/UseThirdParty

> > So, I plan to make one more 3rd party keryring into Debian.>
> That seems like a reasonable way to provide a secure mechanism to install
it.

Now I understand that it is good enough to follow the instruction on wiki
content about 3rd party repository. [1]
No need to do 3rd party keyring ITP in this case.

Thanks for all kindly advice!

--
Kentaro Hayashi 


Bug#906913: ITP: golang-github-j-keck-arping -- library to ping a host per arp datagram or query a host mac address

2018-08-22 Thread Dmitry Smirnov
Package: wnpp
Severity: wishlist
Owner: Dmitry Smirnov 
X-Debbugs-CC: debian-devel@lists.debian.org, 
pkg-go-maintain...@lists.alioth.debian.org
Control: affects -1 golang-github-appc-cni

   Package name: golang-github-j-keck-arping
Version: 0.0~git20160618
Upstream Author: Jürgen Keck 
License: Expat
URL: https://github.com/j-keck/arping
Vcs-Browser: 
https://salsa.debian.org/go-team/packages/golang-github-j-keck-arping
Description: library to ping a host per arp datagram or query a host mac 
address
 arping is a native go library to ping a host per arp datagram or query a
 host mac address.


signature.asc
Description: This is a digitally signed message part.


Re: Bug#906907: ITP: pw -- A simple command-line password manager

2018-08-22 Thread Dashamir Hoxha
On Wed, Aug 22, 2018 at 9:09 AM Carsten Schoenert 
wrote:

> This is the third ITP about 'pw'. The last one has produced a longish
> thread on d-d.
>
> https://lists.debian.org/debian-devel/2018/07/msg00199.html
>
> The information about this new ITP says nothing about the addressed
> concerns from the last one. What has been changed since then that would
> qualify this ITP to been accepted into the archive?
>

It is actually the second attempt, because the first request had a mistake
in the subject format and was quickly replaced by the second one.

I have already replied this question here:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906907#20

In short, I have fixed the problem that was pointed out and I have also
made some other small changes/improvements. I can also provide
links to commits and changes if needed.


> Am 22.08.18 um 06:32 schrieb Dashamir Hoxha:
> > Package: wnpp
> > Severity: wishlist
> >
> > Description:
> >   A simple command-line password manager that keeps passwords inside a
> >   gpg encrypted tgz archive. The content of the archive is a directory
> tree
> >   with a file for each password entry. The first line of the file is the
> >   password, and the rest can optionally be additional or related info.
> >   It provides commands for manipulating the passwords, allowing the user
> >   to add, remove, edit, generate passwords etc.
> >
> > Repository: https://gitlab.com/dashohoxha/pw
> > Documentation: https://dashohoxha.gitlab.io/pw/man/
> >
>
> https://bugs.debian.org/903814
> https://bugs.debian.org/903814
> https://bugs.debian.org/906907
>
> --
> Regards
> Carsten Schoenert
>


Re: headsup - various redis modules now proprietary!

2018-08-22 Thread Andrey Rahmatullin
On Wed, Aug 22, 2018 at 01:02:30PM +1200, Robert Collins wrote:
> RedisLabs have changed the license of various modules to be
> incompatible with DFSG guideline 6: the 'Common Clause' rider.
> 
> https://redislabs.com/community/commons-clause/

"Therefore, the no-sale restriction imposed by Commons Clause means that
any software under this new license is non-open source by definition.
However, in practice, Commons Clause only adds a limitation concerning
fair use, and we believe that both licensing approaches share the same
core value of making software available for use by anyone."

Looks like everybody loses.

-- 
WBR, wRAR


signature.asc
Description: PGP signature


Re: Bug#906907: ITP: pw -- A simple command-line password manager

2018-08-22 Thread Carsten Schoenert
This is the third ITP about 'pw'. The last one has produced a longish
thread on d-d.

https://lists.debian.org/debian-devel/2018/07/msg00199.html

The information about this new ITP says nothing about the addressed
concerns from the last one. What has been changed since then that would
qualify this ITP to been accepted into the archive?

Am 22.08.18 um 06:32 schrieb Dashamir Hoxha:
> Package: wnpp
> Severity: wishlist
> 
> Description:
>   A simple command-line password manager that keeps passwords inside a
>   gpg encrypted tgz archive. The content of the archive is a directory tree
>   with a file for each password entry. The first line of the file is the
>   password, and the rest can optionally be additional or related info.
>   It provides commands for manipulating the passwords, allowing the user
>   to add, remove, edit, generate passwords etc.
> 
> Repository: https://gitlab.com/dashohoxha/pw
> Documentation: https://dashohoxha.gitlab.io/pw/man/
> 

https://bugs.debian.org/903814
https://bugs.debian.org/903814
https://bugs.debian.org/906907

-- 
Regards
Carsten Schoenert