Bug#1063633: ITP: python-autodocsumm -- API that automatically extends sphinx

2024-02-09 Thread Marcos Rodrigues de Carvalho (aka oday)
Package: wnpp
Severity: wishlist
Owner: "Marcos Rodrigues de Carvalho (aka oday)" 
X-Debbugs-Cc: debian-devel@lists.debian.org, marcosrcarvalh...@gmail.com

* Package name: python-autodocsumm
  Version : 0.2.12
  Upstream Contact: Philipp S. Sommer 
* URL : https://github.com/Chilipp/autodocsumm/
* License : apache-2.0
  Programming Lang: Python
  Description : API that automatically extends sphinx
  
  The Python autodocsumm module is a tool that helps developers write
  documentation for their Python programs in an easier and faster way.
  It does this automatically, creating summaries or "shortcuts" to the
  important parts of the code, such as functions and methods. 
  .
  The module is capable of:
- automatically create summaries
- produces explanatory comments
- customize summaries with extra details
- Allows Integration with Other Tools



Re: Changes to abi=+time64 behavior (was Re: 64-bit time_t transition in progress)

2024-02-09 Thread Peter Green


So when introducing a new soname (no just a new package name), then one
should move to time64 even on i386 ?


The problem with doing this is that

1. A reverse dependency may depend on more than one library that uses time_t
   in it's API. Said reverse dependency would not be able to be sanely built
   if libfoo uses 32-bit time_t in it's API and libbar uses 64-bit time_t in
   it's API.
2. If any of your reverse dependencies are libraries that expose time_t in
   their API they would have a similar problem.





Bug#1063628: ITP: python-command-runner -- a platform-agnostic external command execution library for python with extra goodies

2024-02-09 Thread Harlan Lieberman-Berg
Package: wnpp
Severity: wishlist
Owner: Harlan Lieberman-Berg 
X-Debbugs-Cc: debian-devel@lists.debian.org, an...@beanfield.com, 
hlieber...@debian.org

* Package name: python-command-runner
Version : 1.6.0
Upstream Contact: Orsiris de Jong
* URL : https://github.com/netinvent/command_runner
* License : BSD-3-clause
Programming Lang: Python 3
Description : a platform-agnostic external command execution library for 
python

command_runner's purpose is to run external commands from python, just like
subprocess on which it relies, while solving various problems a developer may
face among:
- Handling of all possible subprocess.popen / subprocess.check_output scenarios
  / python versions in one handy function without encoding / timeout hassle
- Allow stdout/stderr stream output to be redirected to callback functions /
  output queues / files so you get to handle output in your application while
  commands are running
-  Callback to optional stop check so we can stop execution from outside
  command_runner
- Callback with optional process information so we get to control the process
  from outside command_runner
- Callback once we're finished to ease thread usage
- Optional process priority and io_priority settings
- System agnostic functionality, the developer shouldn't carry the burden of 
Windows & Linux differences
- Optional Windows UAC elevation module compatible with CPython, PyInstaller & 
Nuitka
- Optional Linux sudo elevation compatible with CPython, PyInstaller & Nuitka

My plan is to maintain this package under the auspices of the Debian Python
Team. I am packaging this module in part because it is a direct dependency of
LibreNMS, though I don't currently have plans to package that.

Sincerely,

--
Harlan Lieberman-Berg
~hlieberman



Bug#1063612: ITP: corrosion -- Tool for integrating rust with an existing CMake project

2024-02-09 Thread Nilesh Patra
Package: wnpp
Severity: wishlist
Owner: Nilesh Patra 
X-Debbugs-Cc: debian-devel@lists.debian.org, nil...@debian.org

* Package name: corrosion
  Version : 0.4.7
  Upstream Contact: Andrew Gaspar
* URL : https://github.com/corrosion-rs/corrosion
* License : MIT
  Programming Lang: C++
  Description : Tool for integrating rust with an existing CMake project

  Corrosion, formerly known as cmake-cargo, is a tool for integrating Rust
  into an existing CMake project.
  .
  Corrosion can automatically import executables, static libraries,
  and dynamic libraries from a workspace or package manifest
  (Cargo.toml file).

Needed for angelfish to manage it easily. This will be maintained in the debian
namespace.



Bug#1063591: ITP: anew -- Tool for adding new lines to files, skipping duplicates (program)

2024-02-09 Thread Marcos Rodrigues de Carvalho (aka oday)
Package: wnpp
Severity: wishlist
Owner: "Marcos Rodrigues de Carvalho (aka oday)" 
X-Debbugs-Cc: debian-devel@lists.debian.org, debian...@lists.debian.org , 
marcosrcarvalh...@gmail.com

* Package name: anew
  Version : 0.1-1
  Upstream Contact: Tom Hudson 
* URL : https://github.com/tomnomnom/anew
* License : Expat
  Programming Lang: Go
  Description : Tool for adding new lines to files, skipping duplicates 
(program)
  
This program provides a tool for adding new lines to files while ensuring that
 duplicate lines are skipped. It offers a convenient solution for managing text
 files by preventing redundant data. The tool is designed to streamline file 
 editing processes and improve efficiency when working with large datasets or 
 configuration files. It can be useful in various scenarios, such as log 
 management, data processing, and configuration management tasks.



Can we switch off the testing removal messages related to t64 migration? (Was: Confusion over t64 migration)

2024-02-09 Thread Andreas Tille
Hi,

Am Fri, Feb 09, 2024 at 06:46:58PM +0100 schrieb Andreas Metzler:
> Looking at "your" bug #1062097 it looks like you were unlucky, mine all
> had a fat warning "NOTICE: these changes must not be uploaded to
> unstable yet!".

I also was trapping into that pitfall when I was intending to fix
an RC bug quickly and simply failed to read the whole message.
Just happens and was reverted soon.
 
> There was a little bit of discussion about the delay on
> https://lists.debian.org/debian-release/2024/02/msg00272.html but it
> has not yielded a plan yet.

I perfectly understand that complex things might lead to delays.
However, given that I'm in several teams with lots of libraries my
mailbox gets filled with lots of messages about testing removals 
which are absolutely useless since I can't do anything about this.

I wonder how we can get rid of these messages.  Two things come
into my mind:

  1. Demote severity of the time_t related bugs to non-RC
  2. Patch the script that sends testing removal warnings
 to ignore time_t related bugs

It would be very convinient if this could be solved.  Currently
I simply remove all mails containing the pattern "testing removal"
since I can't handle the current amount sensibly.  Unfortunately
that way I'm missing perfectly valid messages caused by "real"
RC bugs.

Just using the chance to thank all people working on time_t
transition and release team for the generally helpful mails
   Andreas.

-- 
http://fam-tille.de



Re: Confusion over t64 migration

2024-02-09 Thread Andreas Metzler
On 2024-02-09 John Goerzen  wrote:
[...]
> So at the moment, I am unclear why there are bugs filed with severity
> serious that apparently cannot be fixed.  Shouldn't they be normal with
> a tag wontfix until the relevant dpkg changes are in unstable?

> To put it another way, I'm not seeing why we are reporting RC bugs
> against a bunch of packages before it is possible to fix them.
[...]

Hello John,

Afaiui the transition has been delayed unexpectly. (#1063329). I *think*
the priority was also chosen as signal to avoid unstable uploads for the
already staged packages. Stuff should have happened quickly, before we
entered the autoremoval timer.

Looking at "your" bug #1062097 it looks like you were unlucky, mine all
had a fat warning "NOTICE: these changes must not be uploaded to
unstable yet!".

There was a little bit of discussion about the delay on
https://lists.debian.org/debian-release/2024/02/msg00272.html but it
has not yielded a plan yet.

cu Andreas
-- 
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'



Re: Changes to abi=+time64 behavior (was Re: 64-bit time_t transition in progress)

2024-02-09 Thread Bill Allombert
On Fri, Feb 09, 2024 at 05:36:53PM +0100, Ansgar wrote:
> Hi,
> 
> On Fri, 2024-02-09 at 15:24 +, Bill Allombert wrote:
> > when introducing a new soname (no just a new package name), then one
> > should move to time64 even on i386 ?
> 
> If you know all consumers of the package will be using appropriate
> compiler flags to get 64-bit time_t, then this is fine.
> 
> Otherwise provider and consumer would disagree about ABI and likely not
> work fully correct.
> 
> > But fundamentally, how do we know how third-party binaries are
> > compiled ?
> 
> They have to use `dpkg-buildflags` with equivalent ABI settings.

Third-party binaries might not be build on a Debian-based distro...

Cheers,
-- 
Bill. 

Imagine a large red swirl here. 



Re: Changes to abi=+time64 behavior (was Re: 64-bit time_t transition in progress)

2024-02-09 Thread Ansgar
Hi,

On Fri, 2024-02-09 at 15:24 +, Bill Allombert wrote:
> when introducing a new soname (no just a new package name), then one
> should move to time64 even on i386 ?

If you know all consumers of the package will be using appropriate
compiler flags to get 64-bit time_t, then this is fine.

Otherwise provider and consumer would disagree about ABI and likely not
work fully correct.

> But fundamentally, how do we know how third-party binaries are
> compiled ?

They have to use `dpkg-buildflags` with equivalent ABI settings.

Ansgar



Confusion over t64 migration

2024-02-09 Thread John Goerzen
Hi everyone,

Thanks to all that have put so much time and thought into the time_t
migration.  I am late to this party and am trying to figure my way
through it.

Quite a few of my packages are marked for removal from testing because
time_t migration bugs have been filed with severity serious.  Some of
these are filed against my own packages, but most are filed against
other packages which are dependencies of ones I maintain.

I am an uploader for gensio, which had a bug #1062097 reported for this
issue.  Like the others, it was reported as severity serious, tagged
found in the version in unstable.  This, of course, prevents migrations
to testing and also leads to removals from testing.

I uploaded a package with the enclosed patch quickly, but then was told
that was not the right thing to do.  I then uploaded a new version of
gensio with the change removed...  but again (and I'm not even sure how
this is the case, since the bug was resolved) it is marked for
autoremoval from testing.

So at the moment, I am unclear why there are bugs filed with severity
serious that apparently cannot be fixed.  Shouldn't they be normal with
a tag wontfix until the relevant dpkg changes are in unstable?

To put it another way, I'm not seeing why we are reporting RC bugs
against a bunch of packages before it is possible to fix them.

A key use case for me is uploading to bookworm-backports.  Of course,
that requires being in testing first.  What will happen with time_t in
bookworm-backports?

Thanks!

- John



Re: Changes to abi=+time64 behavior (was Re: 64-bit time_t transition in progress)

2024-02-09 Thread Simon McVittie
On Fri, 09 Feb 2024 at 15:24:50 +, Bill Allombert wrote:
> But fundamentally, how do we know how third-party binaries
> are compiled ?

We don't, but we can make some inferences.

If they are i386 binaries that already worked on Debian 12 or older,
and they call into time_t-sensitive ABIs (for instance X509_cmp_time()
in OpenSSL might be a good example), then they must have been compiled
with the expectation that time_t was 32-bit, because that's the ABI that
Debian 12 provided.

If they didn't already work on Debian 12 or older, then it isn't a
regression that they also don't work on Debian 13.

smcv



Re: Changes to abi=+time64 behavior (was Re: 64-bit time_t transition in progress)

2024-02-09 Thread Bill Allombert
Le Fri, Feb 09, 2024 at 10:20:40AM +, Simon McVittie a écrit :
> On Fri, 09 Feb 2024 at 05:03:23 +0100, Guillem Jover wrote:
> > if the maintainer
> > has requested it explicitly via DEB_BUILD_OPTIONS=abi=+time64, then
> > it should enable it also on i386 (changed behavior).
> > 
> > The reason is that this does not now break ABI for any package (in Debian
> > or out of Debian) that might have already opted-in to that feature, it
> > does not require adding all the necessary flags manually if one wants
> > to opt-in on i386, and makes it possible to selectively enable time64
> > on [non-library] packages where the binary backwards compatibility make
> > no sense
> 
> I think this is a good improvement. Another advantage of this change is
> that libraries that use time_t internally, but have been confirmed not to
> break ABI when it's enabled and don't call time_t APIs in their non-glibc
> dependencies, can easily opt-in to enabling it on i386 too. Some do this
> upstream already (like dbus and libsdl3 in experimental) but many don't.
> 
> To put this another way, the argument for not doing the transition to
> time64-everywhere on i386 was "we don't want to break third-party i386
> binaries", but ideally we should still be enabling time64, even on i386,
> in the cases where it *won't* break third-party binaries.

So when introducing a new soname (no just a new package name), then one
should move to time64 even on i386 ?
But fundamentally, how do we know how third-party binaries are compiled ?

Cheers,
-- 
Bill. 

Imagine a large red swirl here.



Bug#1063532: ITP: ford -- Fortran Documentation tool

2024-02-09 Thread Alastair McKinstry
Package: wnpp
Severity: wishlist
Owner: Alastair McKinstry 
X-Debbugs-Cc: debian-devel@lists.debian.org, debian-scie...@lists.debian.org

* Package name: ford
  Version : 7.0.5
  Upstream Contact: Christopher MacMackin 
* URL : https://github.com/Fortran-FOSS-Programmers/ford
* License : GPL
  Programming Lang: Python
  Description : Fortran Documentation tool

The goal of FORD is to be able to reliably produce documentation for modern
Fortran software which is informative and nice to look at. The documentation
should be easy to write and non-obtrusive within the code. While it will never
be as feature-rich as Doxygen, hopefully FORD will be able to provide a good
alternative for documenting Fortran projects.

Ford is already used (if present) by several projects packaged in Debian.

I intend to manage it in Salsa; perhaps in Debian-Science team.



Bug#1063521: ITP: pymbolic -- Easy Expression Trees and Term Rewriting library

2024-02-09 Thread Alastair McKinstry
Package: wnpp
Severity: wishlist
Owner: Alastair McKinstry 
X-Debbugs-Cc: debian-devel@lists.debian.org, debian-pyt...@lists.debian.org

* Package name: pymbolic
  Version : 2022.2
  Upstream Contact: Andreas Klöckner 
* URL : https://github.com/inducer/pymbolic
* License : MIT/X
  Programming Lang: Python
  Description : Easy Expression Trees and Term Rewriting library

I am packaging this as 

Pymbolic is a small expression tree and symbolic manipulation library. Two
things set it apart from other libraries of its kind:

* Users can easily write their own symbolic operations, simply by deriving
  from the builtin visitor classes.
* Users can easily add their own symbolic entities to do calculations
  with.

Pymbolic currently understands regular arithmetic expressions, derivatives,
sparse polynomials, fractions, term substitution, expansion. It automatically
performs constant folding, and it can compile its expressions into Python
bytecode for fast(er) execution.

It is not expected to be a replacement for Sympy, which is more complex.


Bug#1063520: ITP: codetiming -- A Timer package for Python code

2024-02-09 Thread Alastair McKinstry
Package: wnpp
Severity: wishlist
Owner: Alastair McKinstry 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: codetiming
  Version : 1.4.0
  Upstream Contact: David Beazley
* URL : https://pypi.python.org/pypi/codetiming
* License : MIT
  Programming Lang: Python
  Description : A Timer package for Python code

This is a dependency of loki-ecmwf, already submitted.
It is a simple timer class for Python.



Bug#1063517: ITP: adios4dolfinx -- ADIOS2Wrappers for DOLFINx

2024-02-09 Thread Francesco Ballarin
Package: wnpp
Severity: wishlist
Owner: Francesco Ballarin 
X-Debbugs-Cc: debian-devel@lists.debian.org, debian-scie...@lists.debian.org, 
francesco.balla...@unicatt.it

* Package name: adios4dolfinx
  Version : 0.7.3
  Upstream Contact: Jørgen S. Dokken 
* URL : http://jsdokken.com/adios4dolfinx/
* License : MIT
  Programming Lang: Python
  Description : ADIOS2Wrappers for DOLFINx

adios4dolfinx is an extension for DOLFINx to checkpoint meshes, meshtags
and functions using ADIOS2.

The code uses the adios2 Python-wrappers to write DOLFINx objects to file,
supporting N-to-M (recoverable) and N-to-N (snapshot) checkpointing.

For scalability, the code uses MPI Neighbourhood collectives for communication
across processes.

The package will be maintained within the Debian Science team, in
collaboration with Drew Parsons.


Re: Changes to abi=+time64 behavior (was Re: 64-bit time_t transition in progress)

2024-02-09 Thread Simon McVittie
On Fri, 09 Feb 2024 at 05:03:23 +0100, Guillem Jover wrote:
> if the maintainer
> has requested it explicitly via DEB_BUILD_OPTIONS=abi=+time64, then
> it should enable it also on i386 (changed behavior).
> 
> The reason is that this does not now break ABI for any package (in Debian
> or out of Debian) that might have already opted-in to that feature, it
> does not require adding all the necessary flags manually if one wants
> to opt-in on i386, and makes it possible to selectively enable time64
> on [non-library] packages where the binary backwards compatibility make
> no sense

I think this is a good improvement. Another advantage of this change is
that libraries that use time_t internally, but have been confirmed not to
break ABI when it's enabled and don't call time_t APIs in their non-glibc
dependencies, can easily opt-in to enabling it on i386 too. Some do this
upstream already (like dbus and libsdl3 in experimental) but many don't.

To put this another way, the argument for not doing the transition to
time64-everywhere on i386 was "we don't want to break third-party i386
binaries", but ideally we should still be enabling time64, even on i386,
in the cases where it *won't* break third-party binaries.

smcv



Re: Transparency into private keys of Debian

2024-02-09 Thread Simon Josefsson
Hans-Christoph Steiner  writes:

>> In business, such things are confirmed (often badly) by independent
>> audit. For a volunteer-driven community effort, we have to rely on
>> everyone to exercise their best judgement in these sorts of matters.
>
> Debian could also get independent, professional audits.  I think it
> would be a good use of the Debian pot of money, for example.  Or
> someone could submit a proposal to get Debian audited.  I'll be either
> Open Tech Fund or NLnet would do it:
>
> https://www.opentech.fund/labs/red-team-lab/
>
> Open Tech Fund already funds Tails, which is based on Debian.

That would be useful for the important keys like the apt release keys,
and would set an example for others to follow.  If there are things to
improve, it would be better if we know about them than allowing
attackers to find out on their own.  For DD keys, as Jemery noticed, I
don't think it is useful: uses of DD keys leave a quite auditable flow
already.

/Simon


signature.asc
Description: PGP signature