Re: [aur-general] [REVIEW REQUEST] python-viivakoodi

2016-12-02 Thread Quentin Bourgeois
On 16-12-01 21:57:08, Eli Schwartz via aur-general wrote:
> On 12/01/2016 08:24 PM, Quentin Bourgeois wrote:
> > I finally managed to upload to AUR[0]. I had to made some 
> > modification[1] in order to pass the different hooks on the server but
> > I think they would be ok.
> 
> So I see... especially the "every commit must have a .SRCINFO". I had
> kind of sort of assumed you would push the PKGBUILD you finally settled
> on as the initial PKGBUILD, but apparently you opted to preserve your
> learning experience for eternity. :p
> 
> Unfortunately that won't work, since your learning experience included a
> missing .SRCINFO which cannot be preserved. :D
Indeed, I did a pretty bad job with that, which, was not tested
enough.

I will try to come up with a better solution by tomorrow.
> 
> > Is it relevant to add some of this information
> > (runtime deps on setuptools) ? I don't remember having seen such
> > information while looking at the manpage/wiki. In the other hand I
> > don't known if its obvious for other.
> 
> Which manpage/wiki?
I was thinking of the wiki page that give instruction with Python
PKGBUILD[0]. 

> 
> I guess it is sort of assumed that people won't uninstall setuptools --
> it is part of the python package manager scene (distutils -> setuptools
> -> pip) and in a way it sort of competes with pacman.
> "The standard library is where modules go to die" but nevertheless, I am
> pretty sure the setuptools developers would love to make sure everyone
> always has it, no matter what.
> 
> But I will admit it wasn't obvious to me... until I learned the basics
> of python module packaging.
> 
> -- 
> Eli Schwartz

[0] https://wiki.archlinux.org/index.php/Python_PKGBUILD


signature.asc
Description: PGP signature


Re: [aur-general] TU Application: Baptiste Jonglez

2016-12-02 Thread Johannes Löthberg via aur-general

On 02/12, Giancarlo Razzolini wrote:

Em dezembro 2, 2016 11:18 NicoHood escreveu:


The signature itself is only a signed hash (sha256). So we do rely on
the collision resistance of sha256[1] (or whatever the GPG itself uses).
You are right, that hashes themselves are not enough to verify that the
original author provided this source. But it gives you the guarantee
that you downloaded the same source, as the maintainer(PKGBUILD writer) did.



GPG uses DSA[0]. And the signatures done using GPG are done in a way that
requires a key pair on the part of the person doing the signature. The
link you sent demonstrate precisely that. They are much more than simple
hashes.

[0] https://www.gnupg.org/gph/en/manual.html#AEN216


That's quite outdated, and RSA has been the default for quite a long 
time.


--
Sincerely,
 Johannes Löthberg
 PGP Key ID: 0x50FB9B273A9D0BB5
 https://theos.kyriasis.com/~kyrias/


signature.asc
Description: PGP signature


Re: [aur-general] TU Application: Baptiste Jonglez

2016-12-02 Thread NicoHood
>>
>> Besides this issue, I already mentioned another drawback of using HTTPS:
>> untrusted certificates (either expired, self-signed, or just signed by an
>> untrusted CA) will cause build failure.  This was a real issue for
>> OpenWRT, so they switched to using --no-check-certificate in 2010 [1] to
>> avoid build failures.  Sources are already validated with a checksum.
>>
>
> Well, relying only on checksums is not good enough in my opinion. We know
> for a fact that hashing algorithms are built on top of *reasonable* chance
> that collisions won't happen. Sure, the space of a SHA256 hash is
huge, but
> we must not just shrug over it. Because if we, as maintainers do, upstream
> will think they don't need to provide signed sources, because hashes are
> probably "good enough".
>

The signature itself is only a signed hash (sha256). So we do rely on
the collision resistance of sha256[1] (or whatever the GPG itself uses).
You are right, that hashes themselves are not enough to verify that the
original author provided this source. But it gives you the guarantee
that you downloaded the same source, as the maintainer(PKGBUILD writer) did.

That is what integrity is all about, that is not only a checksum! The
weakest spot though is the initial fetching of the source on which the
maintainer relies on. However with strong hashes you can at least ensure
that you (for a rebuild) download the exact same sources, as the
maintainer did. You just cannot prove who published that source itself.
Saying sha256 is not secure enough for that purpose would also say GPG
is not safe.

Correct me if I am wrong though. I'd be also nice to discuss this in the
email I recently opened and not in the TU Application. I think this is a
highly important topic, especially for those packages where we do not
have gpg and https available and you can only rely on the hash that the
maintainer gave out (AUR).

[1]https://www.bestvpn.com/wp-content/uploads/2015/03/Digital_Signature_diagram.png

Cheers
Nico




signature.asc
Description: OpenPGP digital signature


[aur-general] Signoff report for [community-testing]

2016-12-02 Thread Arch Website Notification
=== Signoff report for [community-testing] ===
https://www.archlinux.org/packages/signoffs/

There are currently:
* 0 new packages in last 24 hours
* 0 known bad packages
* 0 packages not accepting signoffs
* 2 fully signed off packages
* 23 packages missing signoffs
* 4 packages older than 14 days

(Note: the word 'package' as used here refers to packages as grouped by
pkgbase, architecture, and repository; e.g., one PKGBUILD produces one
package per architecture, even if it is a split package.)



== Incomplete signoffs for [community] (23 total) ==

* arm-none-eabi-newlib-2.4.0-4 (any)
0/2 signoffs
* darktable-2:2.2.0rc1-1 (i686)
0/1 signoffs
* devil-1.7.8-24 (i686)
0/1 signoffs
* gimp-ufraw-0.22-9 (i686)
0/1 signoffs
* keepalived-1.3.2-1 (i686)
0/1 signoffs
* libasl-0.1.7-1 (i686)
0/1 signoffs
* libfdk-aac-0.1.4.r88.5fd7e65-1 (i686)
0/1 signoffs
* monitoring-plugins-2.2-1 (i686)
0/1 signoffs
* openscenegraph-3.4.0-4 (i686)
0/1 signoffs
* vagrant-1.9.0-1 (i686)
0/1 signoffs
* vagrant-substrate-575.af28386-1 (i686)
0/1 signoffs
* xv-3.10a-22 (i686)
0/1 signoffs
* ziproxy-3.3.0-8 (i686)
0/1 signoffs
* darktable-2:2.2.0rc1-1 (x86_64)
1/2 signoffs
* devil-1.7.8-24 (x86_64)
0/2 signoffs
* gimp-ufraw-0.22-9 (x86_64)
0/2 signoffs
* keepalived-1.3.2-1 (x86_64)
0/2 signoffs
* libasl-0.1.7-1 (x86_64)
0/2 signoffs
* libfdk-aac-0.1.4.r88.5fd7e65-1 (x86_64)
0/2 signoffs
* monitoring-plugins-2.2-1 (x86_64)
0/2 signoffs
* openscenegraph-3.4.0-4 (x86_64)
0/2 signoffs
* vagrant-substrate-575.af28386-1 (x86_64)
1/2 signoffs
* ziproxy-3.3.0-8 (x86_64)
0/2 signoffs


== Completed signoffs (2 total) ==

* vagrant-1.9.0-1 (x86_64)
* xv-3.10a-22 (x86_64)


== All packages in [community-testing] for more than 14 days (4 total) ==

* libfdk-aac-0.1.4.r88.5fd7e65-1 (i686), since 2016-11-10
* libfdk-aac-0.1.4.r88.5fd7e65-1 (x86_64), since 2016-11-10
* libasl-0.1.7-1 (i686), since 2016-11-10
* libasl-0.1.7-1 (x86_64), since 2016-11-10


== Top five in signoffs in last 24 hours ==

1. hcartiaux - 2 signoffs
2. halosghost - 1 signoffs