Bug#900874: O: schroot -- Execute commands in a chroot environment

2022-05-18 Thread Christoph Biedl
Christoph Biedl wrote...

> If anybody else wishes to maintain
> schroot, please go ahead before May 1st or the bullseye release,
> whatever comes first.

Well, that never happened, my bad. Somebody else asked me in private to take
this package, they have my blessings.

Christoph


signature.asc
Description: PGP signature


Bug#900874: O: schroot -- Execute commands in a chroot environment

2021-02-25 Thread Christoph Biedl
Control: retitle 900874 ITA: schroot -- Execute commands in a chroot

Raphaël Hertzog wrote...

> I just orphaned the schroot package. I never really want to assume its
> maintainance but it just happened that at some point I was unhappy with
> unresolved bugs with pending patches and someone had to step in and I did.
> 
> Now this package is still an important building block of our build
> infrastructure and it deserves a better maintainer than me (my last upload
> dates back to one year ago).

This package has been in limbo for way too long, and as nobody else has
stepped forward so far, I guess it's better I pick it up before worse
things happen (see #983087). But I'll have to arrange some things first,
so this will not start immediately. If anybody else wishes to maintain
schroot, please go ahead before May 1st or the bullseye release,
whatever comes first.

Putting this package under the maintainership of a yet-to-be-formed
Debian greybeard team might be an idea to think of.

Christoph


signature.asc
Description: PGP signature


Bug#900874: O: schroot -- Execute commands in a chroot environment

2019-08-08 Thread Calogero Lo Leggio
Hi everyone,


I update standards-version, dh compatibility version and solving several
lintian warnings/info:

https://salsa.debian.org/kalos-guest/schroot

I don't have enough experience to adopt the package, but I can help.



Happy hacking.

-- 

Calogero Lo Leggio






signature.asc
Description: OpenPGP digital signature


Bug#900874: O: schroot -- Execute commands in a chroot environment

2018-06-06 Thread Raphaël Hertzog
Package: wnpp
Severity: normal

I just orphaned the schroot package. I never really want to assume its
maintainance but it just happened that at some point I was unhappy with
unresolved bugs with pending patches and someone had to step in and I did.

Now this package is still an important building block of our build
infrastructure and it deserves a better maintainer than me (my last upload
dates back to one year ago).

The upstream maintainer (Roger Leigh) is still around and reachable
although he's not doing much work on schroot AFAIK.

The package is in Salsa in the debian group so all DD can easily
contribute to its maintainance:
https://salsa.debian.org/debian/schroot

The package description is:
 schroot allows users to execute commands or interactive shells in
 different chroots.  Any number of named chroots may be created, and
 access permissions given to each, including root access for normal
 users, on a per-user or per-group basis.  Additionally, schroot can
 switch to a different user in the chroot, using PAM for
 authentication and authorisation.  All operations are logged for
 security.
 .
 Several different types of chroot are supported, including normal
 directories in the filesystem, and also block devices.  Sessions,
 persistent chroots created on the fly from files (tar with optional
 compression) and Btrfs and LVM snapshots are also supported.
 .
 schroot supports kernel personalities, allowing the programs run
 inside the chroot to have a different personality.  For example,
 running 32-bit chroots on 64-bit systems, or even running binaries
 from alternative operating systems such as SVR4 or Xenix.
 .
 schroot also integrates with sbuild, to allow building packages with
 all supported chroot types, including session-managed chroot types
 such as Btrfs and LVM snapshots.
 .
 schroot shares most of its options with dchroot, but offers vastly
 more functionality.