Re: Mini-DebConf in Cambridge, UK - October 10-13 2024

2024-06-28 Thread Geert Stappers
On Fri, Jun 28, 2024 at 11:23:57PM -0600, Gunnar Wolf wrote:
> Roberto C. Sánchez dijo [Tue, Jun 25, 2024 at 06:14:54AM -0400]:
> > On Tue, Jun 25, 2024 at 08:39:51AM +0530, Nilesh Patra wrote:
> > > On Mon, Jun 24, 2024 at 12:32:59PM +0100, Steve McIntyre wrote:
> > > > On Mon, Jun 24, 2024 at 12:18:56PM +0200, somebody *claiming* to be 
> > > > Luna Jernberg wrote:
> > > > 
> > > > 
> > > > 
> > > > Just to be 100% clear, that mail didn't come from Luna's normal gmail
> > > > account but was instead spoofed and sent via emkei.cz, a "free online
> > > > fake mailer". It's now blocked from Debian lists.
> > > 
> > > If what you're saying is correct (based on headers that make sense), it's 
> > > a bit
> > > concerning since someone is launching targeted spoofing attacks with the 
> > > name
> > > of actual Debian contributors.
> > > 
> > > The style of writing mail - everything in one line, CCing several lists is
> > > similar to how Luna writes it too. Freaky.
> 
> Sadly, we do have our resident, established, well-known favorite
> troll. And the project has quite recently made an announcement
> involving him:
> 
> https://lists.debian.org/debian-news/2024/msg0.html
> 
> So, given no evidence otherwise, I point my finger to said troll's
> general direction.
> 
> > AI can already generate audio and video that convincingly imitate real
> > people. Why not the same with email? Though, the implications are rather
> > serious.
> > 
> > Perhaps our policies need to evolve to expect (or require?)
> > cryptographic signatures from DDs in mailing list discussion. We may
> > eventually reach a point where AI can fabricate those as well, but that
> > seems to not be possible yet.
> 
> This time around we don't need to overcomplicate things given we know
> it is his establihed pattern to come up with false identities trying
> to smear sh*t on DD's noses.
> 


Advice for those who are unaware of trolls:

Do known that such energy sucking creatures exist and avoid them.



Groeten
Geert Stappers
-- 
Silence is hard to parse


signature.asc
Description: PGP signature


Re: Mini-DebConf in Cambridge, UK - October 10-13 2024

2024-06-28 Thread Gunnar Wolf
Roberto C. Sánchez dijo [Tue, Jun 25, 2024 at 06:14:54AM -0400]:
> On Tue, Jun 25, 2024 at 08:39:51AM +0530, Nilesh Patra wrote:
> > On Mon, Jun 24, 2024 at 12:32:59PM +0100, Steve McIntyre wrote:
> > > On Mon, Jun 24, 2024 at 12:18:56PM +0200, somebody *claiming* to be Luna 
> > > Jernberg wrote:
> > > 
> > > 
> > > 
> > > Just to be 100% clear, that mail didn't come from Luna's normal gmail
> > > account but was instead spoofed and sent via emkei.cz, a "free online
> > > fake mailer". It's now blocked from Debian lists.
> > 
> > If what you're saying is correct (based on headers that make sense), it's a 
> > bit
> > concerning since someone is launching targeted spoofing attacks with the 
> > name
> > of actual Debian contributors.
> > 
> > The style of writing mail - everything in one line, CCing several lists is
> > similar to how Luna writes it too. Freaky.

Sadly, we do have our resident, established, well-known favorite
troll. And the project has quite recently made an announcement
involving him:

https://lists.debian.org/debian-news/2024/msg0.html

So, given no evidence otherwise, I point my finger to said troll's
general direction.

> AI can already generate audio and video that convincingly imitate real
> people. Why not the same with email? Though, the implications are rather
> serious.
> 
> Perhaps our policies need to evolve to expect (or require?)
> cryptographic signatures from DDs in mailing list discussion. We may
> eventually reach a point where AI can fabricate those as well, but that
> seems to not be possible yet.

This time around we don't need to overcomplicate things given we know
it is his establihed pattern to come up with false identities trying
to smear sh*t on DD's noses.



Bug#1074463: ITP: bashbro -- A Bash-based web file browser.

2024-06-28 Thread Adam Danischewski
Package: wnpp
Severity: wishlist
Owner: Adam Danischewski 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: bashbro
  Version : 1.04.1
  Upstream Contact: Adam Danischewski 
* URL : https://github.com/victrixsoft/bashbro 
* License : GPL
  Programming Lang: Shell/Bash 
  Description : A Bash-based web file browser.

A Bash-based web file browser - allowing you to remotely browse, stream, 
view documents and save files via your web browser.

To start bashbro locally on port : 

  $> bashbro -s -p 

 -or- (condensed syntax)

  $> bashbro -sp

Bashbro is a rework of bashttpd (https://github.com/avleen/bashttpd)

It is rewritten, self-contained, simplified and enhanced - allowing 
for streaming of binary files including movies/music/pdf's.



Packaging Gecode twice to have newer snapshot for Minizinc

2024-06-28 Thread Kari Pahula
I have an unhappy situation with Gecode and Minizinc.

Gecode offers two things: A shared C++ library, and a flatzinc
programming language implementation.

Minizinc is a programming language as well, whose implementation works
by turning minizinc programs to flatzinc and uses an implementation to
execute it.  Much like the numerous languages outputting C or JS.
Minizinc also requires Gecode library to compile itself, but that's an
independent use from invoking a flatzinc executable.

Indeed, flatzinc has multiple implementations and minizinc has support
for picking one among them.  Gecode's is just the default one and the
one minizinc is bundled with in their upstream binaries.  Debian has
two others packaged, chuffed and ortools.  Unfortunately chuffed is
only a partial implementation and ortools is currently uninstallable
and updating it is pending on absl library upgrade (which is no mean
feat).

Gecode has last had a release in 2019 and the flatzinc implementation
offered by it is not sufficient to run current minizinc programs.  A
new Gecode release would be ideal but unfortunately prodding upstream
is unlikely to have any quick results as the person who used to do
them has passed away since.  Minizinc is actively developed and has
frequent releases.

The current release of Gecode is still sufficient for Minizinc's use
of it as a library and I expect it's going to remain that way.

Just packaging a Gecode snapshot would solve the issues, but it would
imply taking over the SONAME and I'm not willing to do that.  ABI
changes are upstream's call.

I'm considering packaging Gecode again as gecode-snapshot and also
keep the original gecode package.  I'd remove the flatzinc executable
from the original and only offer flatzinc from gecode-snapshot.

Alternatively I could pick another flatzinc as a default.  None of the
currently packaged options are up to the task and I'd have to pick yet
another one to package.  There are options, some of which are free
software.

Another option would be to update to the snapshot and still offer a
library but move it to some private directories and tell minizinc to
use it from there and users to not touch it.  There are no current
rdepends on it other than minizinc.  It wouldn't serve well any users
who would be using the library and it'd feel making an even more of a
special case of this compared to just going with gecode-snapshot.

If nobody objects I'll proceed with an ITP on gecode-snapshot.  If and
when upstream makes a release I'll retire the package.

This all relates to #1073819.  I looked at it but there's a limit to
what I can do to enable minizinc's features without touching the ABI.



Re: Reviving schroot as used by sbuild

2024-06-28 Thread Sam Hartman
> "Helmut" == Helmut Grohne  writes:

Helmut> In this work, limitations with --chroot-mode=unshare became
Helmut> apparent and that lead to Johannes, Jochen and me sitting
Helmut> down in Berlin pondering ideas on how to improve the
Helmut> situation. That is a longer story, but eventually Timo
Helmut> Röhling asked the innocuous question of why we cannot just
Helmut> use schroot and make it work with namespaces.

I'll be honest, I think building a new container backend makes no sense
at all.
There's a lot of work that has gone into systemd-nspawn, podman, docker,
crun, runc, and the related ecosystems.

I think an approach that allowed sbuild to actually use a real container
backend would be long-term more maintainable and would allow Debian's
DevOps practices to better align with the rest of the world.

I have some work I've been doing in this space which won't be useful to
you because it is not built on top of sbuild.
(Although I'd be happy to share under LGPL-3 for anyone interested.)

But I find that I disagree with the idea of writing a new container
runtime for sbuild so strongly that I can no longer use sbuild for
Debian work, so I started working on my own package building solution.

I realize that I have not  done a good job of being constructive here.
I intended to write some blog posts on this topic, but got sucked into
work and tag2upload.

In terms of constructive feedback:

* I think your intuition that sbuild --chroot=unshare is limiting is
  good.

* I would move toward a persistent namespace approach  because it is
  more similar to broadly used container backends.

* overlayfs/fuse-overlayfs are how the rest of the world is solving
  these problems (or snapshots and the like).  Directories are kind of a
  Debian-specific artifact that I find more and more awward to deal with
  as the rest of my work uses containers for CI/CD.
  


signature.asc
Description: PGP signature


Bug#1074420: ITP: python-yubihsm -- Python library for the YubiHSM 2

2024-06-28 Thread Colin Watson
Package: wnpp
Severity: wishlist
Owner: Colin Watson 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: python-yubihsm
  Version : 3.0.0
  Upstream Contact: Dain Nilsson 
* URL : https://github.com/Yubico/python-yubihsm
* License : Apache-2.0
  Programming Lang: Python
  Description : Python library for the YubiHSM 2

The YubiHSM 2 is a USB-attached device for managing cryptographic keys.
This package contains a Python interface to it, communicating via
yubihsm-connector.


We're in the process of starting to use a YubiHSM in Freexian, and I
have hardware that I can use to test this.  For some purposes (signing
using keys that are already loaded into the HSM) it's possible to just
interact with the HSM over PKCS#11, but for others we need finer control
over things like capabilities, and to do this from Python code it's more
pleasant to have a proper module rather than having to drive
yubihsm-shell from Python.

This package could reasonably live under either pkg-security-team or the
Python team, but I think I'll go with pkg-security-team since it's
pretty closely linked with the other YubiHSM packages I've uploaded
recently.

-- 
Colin Watson (he/him)  [cjwat...@debian.org]



Re: How does lintian use groff to validate man pages?

2024-06-28 Thread Andrey Rakhmatullin
On Fri, Jun 28, 2024 at 11:38:50AM +, c.bu...@posteo.jp wrote:
> > lintian-explain-tags can provide you with extensive information
> > ...
> > N:   LC_ALL=C.UTF-8 MANROFFSEQ='' MANWIDTH=80 \
> > N:   man --warnings -E UTF-8 -l -Tutf8 -Z  >/dev/null
> 
> Do I do something wrong? It is not working in my case (running on Debian
> 12):
> 
> groff LC_ALL=C.UTF-8 MANROFFSEQ='' MANWIDTH=80 man --warnings -E UTF-8 -l
> -Tutf8 -Z ./backintime.1 >/dev/null
> groff: unrecognized option '--warnings'

You prepended "groff" to the command.

-- 
WBR, wRAR


signature.asc
Description: PGP signature


Re: How does lintian use groff to validate man pages?

2024-06-28 Thread c . buhtz

Hello Étienne,

thanks for the reply.

Am 28.06.2024 13:00 schrieb Étienne Mollier:

lintian-explain-tags can provide you with extensive information
...
N:   LC_ALL=C.UTF-8 MANROFFSEQ='' MANWIDTH=80 \
N:   man --warnings -E UTF-8 -l -Tutf8 -Z  >/dev/null


Do I do something wrong? It is not working in my case (running on Debian 
12):


groff LC_ALL=C.UTF-8 MANROFFSEQ='' MANWIDTH=80 man --warnings -E UTF-8 
-l -Tutf8 -Z ./backintime.1 >/dev/null

groff: unrecognized option '--warnings'

Best,
Christian



Re: How does lintian use groff to validate man pages?

2024-06-28 Thread Étienne Mollier
Hi Christian,

c.bu...@posteo.jp, on 2024-06-28:
> from the past I do remember that lintian do use "groff" to validate/lint man
> pages and their syntax.
> I would like to know the exact call including options that lintian use to
> execute groff on a man page file.

lintian-explain-tags can provide you with extensive information
about issues lintian may report.  In your particular case, it
even should answer your question:

$ lintian-explain-tags groff-message
[…]
N:   You can see the warnings yourself by running the command used by 
Lintian:
N:   
N:   LC_ALL=C.UTF-8 MANROFFSEQ='' MANWIDTH=80 \
N:   man --warnings -E UTF-8 -l -Tutf8 -Z  >/dev/null
[…]

Hope this helps,  :)
-- 
  .''`.  Étienne Mollier 
 : :' :  pgp: 8f91 b227 c7d6 f2b1 948c  8236 793c f67e 8f0d 11da
 `. `'   sent from /dev/pts/1, please excuse my verbosity
   `-


signature.asc
Description: PGP signature


How does lintian use groff to validate man pages?

2024-06-28 Thread c . buhtz

Hello,

from the past I do remember that lintian do use "groff" to validate/lint 
man pages and their syntax.
I would like to know the exact call including options that lintian use 
to execute groff on a man page file.


I don't get it using the man page of groff. It alwas output a lot of man 
page syntax. And my man page can not be that shitty. ;)


Thanks,
Christian



Re: Builds that pass locally but fail on sbuild? (Re: Reviving schroot as used by sbuild)

2024-06-28 Thread Simon McVittie
On Thu, 27 Jun 2024 at 19:56:43 -0700, Otto Kekäläinen wrote:
> Could you point me to some Debian Bug # or otherwise share examples of
> cases when a build succeeded locally but failed on official Debian
> builders due to something that is specific for sbuild/schroot?

I can't easily point you to a Debian bug number, because I try to only
upload packages that live up to Debian's quality standards, which means
I've been routinely building packages for upload in sbuild/schroot for
several years; so if a package fails in that situation, I do not upload,
and retry as many times as it takes to get it right.

(I'm sure I've failed to do that several times, but I'm sorry, I mostly
can't remember specific instances or bug numbers; I generally try to fix
the regression as quickly as I can.)

But, some examples of packages and the reasons they fail:

- bubblewrap, repeatedly. Its test suite wants to create new user
  and filesystem namespaces, which is unconditionally not allowed by
  the kernel while inside a chroot (because the kernel doesn't want to
  allow filesystem namespaces to be used to escape from a chroot). The
  relevant tests have to be skipped in situations where they can't work.

  "Real" container managers that use pivot_root() instead of chroot(),
  such as Docker and Podman, sometimes allow creation of nested user
  namespaces (like bwrap by default, and docker --privileged), sometimes
  deny it (like bwrap --disable-userns, and Docker by default), and
  sometimes cannot allow it because some larger factor forces their hand:
  it's non-obvious what will work.

  The conditions for not being allowed to create new namespaces are
  relatively complicated and poorly-documented, and the error reporting is
  minimal (two or three errno values have to cover every possible failure
  mode), so this is something that has to be done by trial and error.

  Until recently, DSA'd machines all used
  /proc/sys/kernel/unprivileged_userns_clone to disable unprivileged
  creation of user namespaces anyway. This restriction has presumably
  been lifted for the buildds that use sbuild in unshare mode.

- xdg-desktop-portal, repeatedly. Its test suite uses FUSE, which is
  disabled (the module is prevented from loading) on official Debian
  buildds as a security hardening mechanism, even though on typical
  end-user or server Debian systems it works fine.

  This is one that I did have to find out via FTBFS, because I don't yet
  have a local build environment that replicates this restriction. I know
  that I should, and it's on my list.

- ostree, at least once. The test suite historically assumed that /var/tmp
  supports extended attributes, which is not true on all buildds (ordinary
  on-disk filesystems usually do support them, but tmpfs doesn't or didn't
  until recently, and some buildds with plenty of RAM operate in a tmpfs
  root filesystem to speed up their builds).

- flatpak, repeatedly. Same as bubblewrap, ostree and x-d-p, combined.

- dbus, historically. For a long time, when using the non-default
  DBUS_COOKIE_SHA1 authentication mechanism, libdbus ignored $HOME and
  instead used the "official" home directory from /etc/passwd
  (the equivalent of `getent passwd $(id -u) | cut -d: -f6`). Official
  buildds set the user's home directory to /nonexistent, so this fails.
  In production use, dbus normally uses EXTERNAL over AF_UNIX (and doesn't
  even allow DBUS_COOKIE_SHA1, as a piece of security hardening), but in
  its build-time tests it specifically exercises each auth mechanism and
  each transport, including DBUS_COOKIE_SHA1 over TCP (which is a
  terrible idea on Unix but is unfortunately necessary on Windows).

- GLib, ongoing (#972151). When the GLib test suite tests interoperability
  with libdbus, it (IMO reasonably!) expects ("localhost", AF_INET) to
  resolve to 127.0.0.1, but that doesn't work on IPv6-only buildds for
  relatively complicated reasons involving subtleties of glibc resolver
  behaviour (#952740). My local build environment still doesn't have code
  to reproduce this, and I'm sorry that I haven't provided workarounds or
  fixes in the GLib test suite or in libdbus' discouraged TCP code paths.
  If someone wants to work on this, skipping the interop tests for TCP on
  IPV6-only buildds would probably be more proportionate than adjusting
  libdbus' name-resolution behaviour for a feature nobody should be
  using in production anyway.

- Any package that assumes that if $XDG_RUNTIME_DIR is set, then it is
  set to a usable value (because historically schroot would set it to
  a value that exists/works on the host system, but does not exist and
  cannot be created inside the container). This is worked around by
  individual packages unsetting XDG_RUNTIME_DIR or setting it to a more
  useful value, or automatically by recent debhelper in a sufficiently
  high compat level (#942111).

> I have never run in such a situation despite doing Debian packaging
> for 10 years with fairly compl

Bug#1074409: ITP: jeolib-miallib -- JRC morphological and image processing library

2024-06-28 Thread Francesco P. Lovergine
Package: wnpp
Severity: wishlist
Owner: Francesco Paolo Lovergine 
X-Debbugs-Cc: debian-devel@lists.debian.org, debian-...@lists.debian.org

Package: wnpp
Severity: wishlist
Owner: Francesco Paolo Lovergine 
X-Debbugs-Cc: debian-devel@lists.debian.org, debian-...@lists.debian.org

* Package name: jeolib-miallib
  Version : 1.1.3
  Upstream Contact: Pieter Kempeneers 
* URL : https://github.com/ec-jrc/jeolib-miallib
* License : GPL
  Programming Lang: C
  Description : JRC morphological and image processing library

 Miallib is a C library including image processing and
 mathematical morphology algorithms used by Join Research Center
 in their Big Data Analytics Platform, with binding for Python
 provided.
 .
 This is the first component of the JRC PyJeo C++ and Python
 library, but can be used as a standalone library too.

-- 
⢀⣴⠾⠻⢶⣦⠀ Francesco Paolo Lovergine
⣾⠁⢠⠒⠀⣿⡁ Debian Developer
⢿⡄⠘⠷⠚⠋⠀ 0579 A97A 2238 EBF9 BE61
⠈⠳⣄ ED02 0F02 A5E1 1636 86A4