Re: Produce extra build artifacts during package builds

2024-08-02 Thread Mattia Rizzolo
On Fri, Aug 02, 2024 at 11:01:24AM +0100, Simon McVittie wrote:
> I also did some more concrete design and wrote a prototype -
> <https://lists.debian.org/debian-devel/2022/02/msg00238.html> as revised
> in <https://lists.debian.org/debian-devel/2022/02/msg00242.html>, and
> <https://salsa.debian.org/debian/sbuild/-/merge_requests/14> -
> although I never got as far as doing enough testing and polishing to get
> it to a production-ready status. I'm sorry that this did not stay as my
> top priority, but I can only have one top priority at a time.

Right, I read most of the emails in that thread and I did look at the
MR.
Unfortunately, I did so _after_ the BOF :\

> The artifacts that I'm primarily interested in are the results of failed
> testing

Right, that's also what we thought.

> But, when a test has failed, writing arbitrary imperative code to gather
> up the package-specific results (for example the images that were generated
> by the gtk4 test suite) is extra complexity for the package maintainer,
> which can have bugs, and is rarely tested because hopefully the tests
> usually pass. I dislike that as a pattern, and I'd strongly prefer a
> declarative syntax of some sort.

Consider that in my mind, most packages wouldn't have needed to write
any imperative code.
I was considering it for example within dh_auto_configure and
dh_auto_test, etc, those tools would be responsible for copying the
relevant test files into my proposed directory.

> In the design that I prototyped, it's declarative, loosely inspired by
> the equivalent Gitlab-CI feature:
> 
> - the maintainer can write patterns into debian/build-artifacts for
>   package-specific quirks like GTK's reftests
>   (#-prefixed comments are allowed)
> - tools like debhelper can append patterns to debian/extra-build-artifacts,
>   for example dh_auto_* in Meson mode should append "obj-*/meson-logs/*"

Well, I don't use debputy nor really understand it, so I don't
understand Niels' concerns.
But I could accept a file debian/extra-artifacts (for
maintainer-specified globs) and directory debian/extra-artifacts.d/
(for tools-provided globs).  dh_auto_clean should (eventually) learn to
clean this directory.

And I suspect that packages that want to be dynamic in the content of
this archive can simply `echo path/to/stuff >>
debian/extra-artifacts.d/package` during the build instead of my
proposed `cp`.


Just, if we do we need to keep this as simple as possible as multiple
tools will try to parse it.  I'd be ok with a plan list, at most accept
# at the start of a line for comments and empty lines.

> - the patterns reuse machine-readable debian/copyright syntax
> - as a result the -artifacts.tar.gz is always a subset of the build tree,
>   and inherits its layout, same as Gitlab's artifacts.zip

This might not work as we want to be able to collect, for example, stuff
from /tmp/.
OTOH, this can be handled by doing proper subfolders in the tarball.

> and sbuild (or pbuilder if you prefer) is responsible for enumerating files
> matching the given patterns and packing them into a tarball.

I was trying to have something else do the enumeration and have
sbuild/pbuilder only do the packing, but I can be convinced in doing the
enumeration sure.

> >* place the tar'ed-up artifacts in the usual results directory, with
> >  a predictive name (`$srcpkg_$ver_$arch.artifacts.tar.xz`?)
> 
> I prototyped this as the same name as the log file, except replacing the
> .build extension with -artifacts.tar.gz (so the filename has a timestamp
> in it). My rationale for this choice is that when tests fail, it's common
> to retry the build to see whether the tests are reproducibly failing or
> just flaky, so we want to collect one blob of artifacts per attempt, the
> same way we collect one log per attempt.
> 
> I don't know how the layers "above" sbuild such as buildd and wanna-build
> operate, and I don't have a way to test them, so my prototype stops at
> sbuild.

This can be left as an implementation detail of the build runner
(most likely, both sbuild and pbuilder will obtain a configuration knob
for this filename).

> > Matthias Klose would like to find a way to do something that at the end
> > of a build will look for and collect all the relevant files that are
> > produced during an ICE (for example all the pre-processor inputs, etc).
> > I'm not sure how to best solve it, but he was imagining a hook somewhere
> > (in dpkg?) that would look for them and copy them into the directory.
> 
> Perhaps dpkg or dh_auto_build could append appropriate patterns to my
> debian/extra-build-artifacts on build failure, so that this hook would
> just be acting as an extension 

Produce extra build artifacts during package builds

2024-08-02 Thread Mattia Rizzolo
Hello people,

just now at DebConf we had a small BOF to discuss this problem, that has
several times come up.

Lastly I think https://lists.debian.org/debian-devel/2022/02/msg00216.html
to which Simon had a quite nice answer.


This is what we came up with:
https://wiki.debian.org/BuildArtifacts#Design_proposal

I'm copying it here for reference:

 * decide on a directory name (`./debian/export_artifacts/`?)
 * the build process will dump any files that could be interesting to
   export in there (no decision if/how to define the structure within
   this directory)
   * potentially, all `dh_*` could copy there whatever is relevant to
 them (i.e., `dh_auto_configure` could export configure logs,
 `dh_auto_test` the various test logs, ..)
 * the containering tool (sbuild, pbuilder, ...) at the end of the
   build, regardless of the result of the build:
   * check if the directory exists, and it's non-empty
   * if true, tar it up
   * place the tar'ed-up artifacts in the usual results directory, with
 a predictive name (`$srcpkg_$ver_$arch.artifacts.tar.xz`?)
   * tbd if this should happen always or opt-in by the build caller
 * `buildd`/`pybuildd` will check if such file has been exported, if it
is, then it will be uploaded to some service
   * something as simple as an authenticate HTTP POST somewhere will
 do - no strong auth needed (right?)
 * this new service will simply just accept whatever upload and store it
 * possibly define an expiry rule for these artifacts to not hog all
   space needlessly


Matthias Klose would like to find a way to do something that at the end
of a build will look for and collect all the relevant files that are
produced during an ICE (for example all the pre-processor inputs, etc).
I'm not sure how to best solve it, but he was imagining a hook somewhere
(in dpkg?) that would look for them and copy them into the directory.




Looking for inputs!


-- 
regards,
        Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: How to ask efficiently for removal of 32 bit architectures of about 40 packages (Was: reverse dependenc)

2024-03-11 Thread Mattia Rizzolo
On Mon, Mar 11, 2024 at 09:12:30PM +0100, Andreas Tille wrote:
> I hope there is some better solution than sending single bug reports
> for those packages.  If ftpmaster tooling really needs single bug
> reports I wonder how I can automatically create such bug reports with
> always the same text, just targeting at different binary packages.
> 
> This also should include some means to work around the less than 5
> bug reports per hour SPAM protection means of BTS.


clone the bug however many time you need and retitle the clones?  What
matters for the ftp tooling is just the bug title, pretty much.
That's one single email...

-- 
regards,
    Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Question regarding uscan check on UDD

2024-01-05 Thread Mattia Rizzolo
On Tue, Jan 02, 2024 at 10:22:29PM -0800, Xiyue Deng wrote:
> I noticed a discrepancy of the uscan @ANY_VERSION@ substitute string on
> UDD and locally on my bookworm system.

That's because UDD is running on bullseye, not on bookworm, with
bullseye-backports' version of devscripts (which really really I should
go back to work on and update…)

-- 
regards,
        Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: debian/copyright format and SPDX

2023-09-08 Thread Mattia Rizzolo
On Fri, Sep 08, 2023 at 07:34:43AM -0700, Russ Allbery wrote:
> I don't think the file format is the most interesting part of SPDX.  They
> don't really have a competing format equivalent to the functionality of
> our copyright files (at least that I've seen; I vaguely follow their
> lists).  Last time I looked, they were doing a lot with XML, which I don't
> think anyone would adopt for new formats these days.  (YAML or TOML or
> something like that is now a lot more popular.)

Formally, SPDX is only a data model, which supports several
serializations formats.  The XML one is I believe the most common one
for some technically good reasons, but it does support YAML
serialization, as well as some lossy ones as well (like CSV, plaintext,
etc...).

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: -ffile-prefix-map option and reproducibility

2023-02-07 Thread Mattia Rizzolo
On Tue, Feb 07, 2023 at 04:41:47PM +0100, Stéphane Glondu wrote:
> When building packages, a -ffile-prefix-map option is automatically injected
> into CFLAGS. Where does it come from? Since when?
> 
> I suspect this was added to improve reproducibility. Ironically, it makes
> packages that capture this variable non reproducible, since the build path
> seems to be randomized (has it always been the case? since when?).

The build path has always been randomized since, or at least it has been
for as long as I've been involved in Debian.

> It is the
> case of OCaml (see #1030785), and seemingly of R as well (found by grepping
> in my /etc). I wouldn't be surprised other packages are affected as well.
> 
> Is there a way to not get this option? More elegant than explicitly
> filtering it out of CFLAGS in debian/rules...

Besides doing
DEB_BUILD_MAINT_OPTIONS=reproducible=-fixfilepath
I actually propose to you to filter out the whole option from being
saved.  I've seen a similar pattern in other packages in the past, and
all of those packages already had a filtering function in place to
remove other gcc flags that make no sense being saved (just looking at:
-   8: const("camlConfig__8"="-O2 -fno-strict-aliasing -fwrapv -pthread 
-fPIC -g -O2 -ffile-prefix-map=/build/ocaml-Vq2uKK/ocaml-4.13.1=. 
-fstack-protector-strong -Wformat -Werror=format-security");
+   8: const("camlConfig__8"="-O2 -fno-strict-aliasing -fwrapv -pthread 
-fPIC -g -O2 -ffile-prefix-map=/build/ocaml-xz3WL7/ocaml-4.13.1=. 
-fstack-protector-strong -Wformat -Werror=format-security");
makes me believe that many options have been stripped out…)

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Firmware GR result - what happens next?

2022-10-02 Thread Mattia Rizzolo
On Mon, Oct 03, 2022 at 01:18:55AM +0300, Dmitry Baryshkov wrote:
> вс, 2 окт. 2022 г. в 22:36, Steve Langasek :
> > > So this is the one bit that I don't think we currently have a good
> > > answer for. We've never had a specific script to run on upgrades (like
> > > Ubuntu do), so this kind of potentially breaking change doesn't really
> > > have an obvious place to be fixed.
> >
> > > Obviously we'll need to mention this in the release notes for
> > > bookworm. Should we maybe talk about adding an upgrade helper tool?
> >
> > I heartily endorse ubuntu-release-upgrader, it has been useful in addressing
> > uncounted upgrade issues over the years and I think something like this
> > would be a nice addition to Debian as well.  Two caveats:
> 
> I'd kindly ask against additional upgrade scripts. It is too easy to
> miss them, especially if one has been using Debian for ages with bare
> apt-get update && apt-get dist-upgrade.
> Moreover such a script will not help people that are already using testing.
> 
> For the past few decades, updating the setup was always a job of the
> package scripts.

This is getting OT in this thread, but I agree with the many that are
against such upgrading script.

I consider even the need for such thing a bug, as each package should
take care of its own quirks.

Besides, if something wants to mess with my system configuration, that's
an even greater bug for me (something that IME ubuntu has been doing
more and more over the last years).


I can live with an APT hook warning me if I have non-free but not
non-free-firmware, but I would prefer to even do without that.

For stable→stable updates there are the release notes for this tiny
change.
For testing/unstable users, they should really read d-d-a, and this
change be announced there (if it hasn't already).

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: FTBS bugs -- MBF?

2022-10-02 Thread Mattia Rizzolo
On Sun, Oct 02, 2022 at 10:57:11AM +0100, Simon McVittie wrote:
> > Packages that only build Architecture: all binary packages tend to use
> > Build-Depends-Indep.
> 
> Policy is quite clear about that being a bug. I think a better rule of
> thumb for maintainers in a hurry would be: if you don't have time to think
> about which dependency list is the right one, and preferably test the
> result (with a source-only build like Adam has been doing, a --build=all
> build, and a --build=any build), then the safe option is to put everything
> in B-D.


I totally agree, and I consider that a RC bug in my mind.

I would support filing all the bugs as sev:important, and bump them
right after the bookworm release (so we don't add all these RC bugs so
near the freeze, even if they are trivial to fix).

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: 'The' timestamp of a snapshot of deb.debian.org

2022-09-19 Thread Mattia Rizzolo
On Sun, Sep 18, 2022 at 10:58:37AM +0200, Roland Clobus wrote:
> All of these timestamps (for sid) are close to each other, but not
> identical. I would guess that the earliest timestamp is the 'real'
> timestamp, but it is accessible (on snapshot.d.o) only with a later
> timestamp.

Consider that the archive "freezes" when it starts working on an update.
Once it finishes its job it generates the Release files, and puts the
current timestamp *inside* the file.  But then that file gets copied
around, signed, etc and that will change the timestamp.

Also, for example, I just spotted a line on IRC saying that this time
around copying the archive from the live one to archive.debian.org also
reset the mtimes...

So I really wouldn't trust mtimes in any way, only what's inside the
Release file.

What's in the trace file is IIRC the time when the archive kicks the
mirrors off, which also happens after the generation of the indexes, and
really has no business in this discussion as it's only a tool mirrors
use to coordinate and see if they are too much out of sync.
As you noticed snapshots indexes by time of the archive run, which is…
honestly I don't particularly consider it a good idea myself but that's
how the design decision went I guess.
(does it make sense to archive twice if there were two mirror pushes for
the same identical set of index files?)

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Proposed MBF: wxwidgets3.2 transition

2022-09-13 Thread Mattia Rizzolo
On Mon, Sep 12, 2022 at 10:32:23PM -0400, Scott Talbert wrote:
> wxWidgets 3.2 (a new API/ABI stable release) has been released a few months
> ago and is now packaged in unstable as wxwidgets3.2.  Upstream has stopped
> supporting wxWidgets 3.0, so the Debian wx team would like to migrate all wx
> package users to wxwidgets3.2 for bullseye, with the plan to remove
> wxwidgets3.0 before release.
> 
> For most packages, the transition should be as simple as changing
> Build-Depends from libwxgtk3.0-gtk3-dev to libwxgtk3.2-dev.  Some packages
> may require small patches; I'm happy to help with those (and I have some
> already from working on this transition in Fedora already).

Question from somebody who doesn't know wxWidgets: if the update from
one release to the other is so simple (at least, you make it sound very
simple, and #1019416 has no blocking bugs, so I reckon everything
works?) then why is this not packaged like pretty much any other library
with an unversionde source package and an unversioned -dev binary
package?

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: fontconfig RC bugs (was: Re: key packages RC bugs of the month September)

2022-09-01 Thread Mattia Rizzolo
On Thu, Sep 01, 2022 at 04:08:20PM +0200, Johannes Schauer Marin Rodrigues 
wrote:
> > #960679 src:fontconfig
> > strict dependency of arch:any libfontconfig1 on arch:all 
> > fontconfig-config going wrong
> > https://bugs.debian.org/960679
> 
> fontconfig also has a second RC bug: #909750
> 
> The last maintainer upload of fontconfig was more than two years ago. Since
> then it has been NMU-ed by me and Julien Cristau.
> 
> Since there is no maintainer action on #960679 I wanted to ask the d-devel
> crowd if you see any problem with making fontconfig-config arch:any to fix it?
> 
> There is a patch for #909750 which I can apply in my next fontconfig NMU as
> well.

I don't see any reason why you wouldn't do this change following the
usual NMU procedure.

Just go ahead? :)

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: A mail relay server for Debian Members is live

2022-07-17 Thread Mattia Rizzolo
On Sat, Jul 16, 2022 at 11:49:31PM +0200, Pierre-Elliott Bécue wrote:
> This service is now operational behind mail-submit.debian.org (AKA
> stravinsky.debian.org). Documentation about how to use this service can
> be accessed via [1].

That's great!

> If you have any question or issue, please don't hesitate to reach out.

Question:
At this point, what about SPF?  Ignoring potential whitelists on mail
receivers, I think using this service doesn't provide extra advantages
than signing on our own servers.
Since there is now this system in place, I think it's fair that after a
transition period we kind of force DDs to relay their email through
Debian infrastracture to properly authenticate outgoing emails.

Do you have any sort of plan in mind?  I'd epxect to at least place a
"ip4:82.195.75.108 ~all" ¯\_(ツ)_/¯

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: UDD upstream importer seems to fail randomly for sf.net

2022-01-25 Thread Mattia Rizzolo
On Tue, Jan 25, 2022 at 10:36:52AM +0100, Andreas Tille wrote:
> Hi,
> 
> when checking UDD dashboard for the Debian Med team[1] I see lots of
> 
>debian/watch: uscan returned an error: In debian/watch no matching files 
> for watch line http://sf.net/
> 
> expressions.  I suspect that this affects all packages hosted at
> SourceForge.  When running uscan manually on my local machine uscan
> works nicely for at least five examples I've checked.  It seems there
> are circumstances when the UDD importer just fails while the watch file
> is perfectly OK?
> 
> I checked UDD (mirror) for success and failure when scanning
> http://sf.net/ watch files:
> 
> udd=> SELECT sf_success, count(*) from (select source, case when warnings 
> like 'In debian/watch no matching files for watch line%' THEN 'Fail' ELSE 
> 'Success' END as sf_success from upstream where watch_file like 
> '%http://sf.net/%') as tmp group by sf_success ;
>  sf_success | count 
> +---
>  Success|   731
>  Fail   |   544
…
> I admit I can not see any pattern inside the watch files - may be its
> just a "bad timing" effect.  Any ideas are welcome.

I blame the network, most likely just a temporary glitch *shrugs*.

With so many moving pieces it happens every so often...

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Dropping dpatch for bookworm

2022-01-16 Thread Mattia Rizzolo
On Fri, Jan 07, 2022 at 12:35:12AM +0100, Moritz Mühlenhoff wrote:
> There are only 24 packages left using dpatch and the vast majority of 
> remaining
> uses are packages which haven't seen a maintainer upload for a decade or 
> longer.
> 
> Some of these have existing "please migrate to source format 3(quilt)" bugs 
> already
> and in the interest of more streamlined packaging workflows and eliminating 
> technical
> debt I think it's time to remove dpatch for bookworm.
> 
> So unless there's objections, I'd bump existing bugs to RC and file bugs where
> they don't exist. And anything that doesn't get fixed/NMUd/removed can then
> be removed along with dpatch before the bookworm freeze.

ACK, thank you very much for taking charge of this!

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: chromium: Update to version 94.0.4606.61 (security-fixes)

2022-01-11 Thread Mattia Rizzolo
On Mon, Jan 10, 2022 at 02:21:48PM -0500, Andres Salomon wrote:
> On 1/10/22 05:01, Mattia Rizzolo wrote:
> > On Sun, Jan 09, 2022 at 11:23:20PM -0500, Andres Salomon wrote:
> > > Btw, https://salsa.debian.org/dilinger/chromium/-/tree/stable is my branch
> > > with cleaned-up commits. That's what I'll use for the NMU, which I'm
> > > preparing now.
> > If you all agree, you could finalize the tree, then I'll build again,
> > after which I could sponsor this after a couple days of testing.
> > 
> > I see that you changed debian/copyright compared to the one I used in my
> > build here, so I'll export the orig tarball again.  (normally with
> > Michel we'd share the sha256 of one's produced tarball to check we are
> > building with the same thing, so please share yours?)
> 
> 
> Thank you so much for testing! The sha256 that I have is
> cca093107bf6991b4777889012646455f8e520b446c9f27250653f98ed4bb7e0

Cool, this matches with the new tarball I produced.

Guess I'll restart a build with the stable branch now then.


BTW, my current build (from the v97 branch), just crashed on me.  Not
sure where, and I couldn't quickly reproduce it either; I was just
clicking ont he "extension bar", but I'm not even sure what I was
doing..  just saying :)

> I don't need a sponsor (I'm a developer), but thank you for the offer.

Ah!
Apologies!  I didn't look your name up, and I just assumed so from the
n...@debian.org address.  Well, happy then, less "work" for me :D

> Btw, hopefully Michael is just currently busy and is still interested in
> working on chromium?

I ralized that riku retaired formally last month (indeed, please drop
him from Uploaders, I also opened a bug (as MIA team) against chromium
last month).
About Micheal, that's unclear to me: he stated less than one year ago
that he would keep working on chromium, but he really is not answering
to anybody... so well, even if he is still interested, in a case as big
as chromium I think you really needs to show consideration and be at
least reachable.  Though it might just be my own opinion.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: chromium: Update to version 94.0.4606.61 (security-fixes)

2022-01-10 Thread Mattia Rizzolo
On Sun, Jan 09, 2022 at 11:23:20PM -0500, Andres Salomon wrote:
> Btw, https://salsa.debian.org/dilinger/chromium/-/tree/stable is my branch
> with cleaned-up commits. That's what I'll use for the NMU, which I'm
> preparing now.

If you all agree, you could finalize the tree, then I'll build again,
after which I could sponsor this after a couple days of testing.

I see that you changed debian/copyright compared to the one I used in my
build here, so I'll export the orig tarball again.  (normally with
Michel we'd share the sha256 of one's produced tarball to check we are
building with the same thing, so please share yours?)


Regarding the git repository/team on salsa.  What would you all think
about asking the salsa admins to bypass the team admins (gilbert and
riku) that have been silent all this time?
When Micheal started taking over, I didn't want to be too involved so I
didn't ask to be added to team together with him, but I suppose I got
sucked in by this matter a bit too much.
Otherwise I wonder about simply creating a new repository under debian/.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: chromium: Update to version 94.0.4606.61 (security-fixes)

2022-01-10 Thread Mattia Rizzolo
On Sun, Jan 09, 2022 at 12:56:28AM -0500, Andres Salomon wrote:
> 
> On 1/8/22 15:57, Mattia Rizzolo wrote:
> > On Thu, Jan 06, 2022 at 02:55:20AM -0500, Andres Salomon wrote:
> > > If you want to try with chromium 97; it now builds as an official build, 
> > > so
> > > those DCHECKs shouldn't even be compiled in. It also supports wayland
> > > automatically, in case that's related to your slowdowns.
> > > 
> > > https://salsa.debian.org/dilinger/chromium/-/tree/v97
> > I wanted to do this, but could it be that this version is for some
> > reason taking much more space than the previous one?  Here I have ~40 GB
> > free, and v96 built just fine (though I wasn't looking when it was
> > running), but now this failed already twice due to ENSPC.
> > 
> > I'll try looking for someplace more spacy but it's odd :)
> > 
> 
> Yeah, I think it's the debugging info; it's also breaking lld. It's a result
> of enabling official build, I'm working on it.

I see.

Well, it took me longer than I would have liked, but I finally got a
build out of that v97 branch (commit
2c2685aee67a677c85dd752aea08a7e571312116).

This one looks fully functional, gmail is as reactive as it used to be
(u.U after a few days with v96 and that slowness, now it feels so much
better lol) in the past, and after ~15 minutes of random usage it hasn't
crashed on me yet! \o/


It also fixed a problem I had with v93 where document google sheets
would look totally blank... so double happy now!

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: chromium: Update to version 94.0.4606.61 (security-fixes)

2022-01-08 Thread Mattia Rizzolo
On Thu, Jan 06, 2022 at 02:55:20AM -0500, Andres Salomon wrote:
> If you want to try with chromium 97; it now builds as an official build, so
> those DCHECKs shouldn't even be compiled in. It also supports wayland
> automatically, in case that's related to your slowdowns.
> 
> https://salsa.debian.org/dilinger/chromium/-/tree/v97

I wanted to do this, but could it be that this version is for some
reason taking much more space than the previous one?  Here I have ~40 GB
free, and v96 built just fine (though I wasn't looking when it was
running), but now this failed already twice due to ENSPC.

I'll try looking for someplace more spacy but it's odd :)

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: chromium: Update to version 94.0.4606.61 (security-fixes)

2022-01-07 Thread Mattia Rizzolo
On Thu, Jan 06, 2022 at 02:55:20AM -0500, Andres Salomon wrote:
> If you want to try with chromium 97; it now builds as an official build, so
> those DCHECKs shouldn't even be compiled in. It also supports wayland
> automatically, in case that's related to your slowdowns.
> 
> https://salsa.debian.org/dilinger/chromium/-/tree/v97

Thank you, let's try with this.

I've just started the build! :)


Also thanks for handling the py2 thing, however you should be aware that
build-depending on python-is-python3 is also not allowed :3
(however I personally prefer that than to have to inject an old binary..)

-- 
regards,
    Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: chromium: Update to version 94.0.4606.61 (security-fixes)

2022-01-05 Thread Mattia Rizzolo
On Wed, Jan 05, 2022 at 01:52:33PM +0100, Mattia Rizzolo wrote:
> I suppose I'll see how it goes in the coming few days.

So it's not crashing but it's being unbearably slow in gmail, to the
point that I just wasn't able to type a mail there, while throwing one
CPU core to 100%.
Also it was kind go generally slow in several other sites, compared to
v93.  Always compared to v93, it takes far longer (and by far much much
more CPU) to reopen the whole session (I keep ~50 tabs in 3 windows open
all the time, trusting the browser to reopen them where I left when I
close it).

I didn't mesure anything and I don't have any numbers to share, but
that's what I see.


At least, it looks like it has not been leaking as much memory as v93
was (that in this regard was buggier than v90).

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: chromium: Update to version 94.0.4606.61 (security-fixes)

2022-01-05 Thread Mattia Rizzolo
On Tue, Jan 04, 2022 at 06:46:46PM -0500, Andres Salomon wrote:
> On 1/4/22 15:15, Mattia Rizzolo wrote:
> > On Tue, Jan 04, 2022 at 02:50:20PM -0500, Andres Salomon wrote:
> > > I pushed a commit to the skip-a11y-checks branch, please give that a try. 
> > > I
> > > need to take a look at other distributions that are shipping chromium to 
> > > see
> > > if they're just disabling DCHECKs outright, or what.
> 
> Just took a look at fedora, arch, and ungoogle-chromium debian packaging.
> They're all setting is_official_build=true, which completely disables those
> DCHECKs. We should probably set it like that as well, although the
> dcheck_is_configurable=true thing that I added to the skip-a11y-checks
> branch should at least allow the DCHECKs to not be fatal - so there's no
> need to restart your build.


So, this one at least didn't crash on me as soon as I started.
Also, it looks like the saved passwords that went away came back, so I
reckon perhaps the local storage format changed in the upgrade, so v93
wasn't able to see them anymore, or something similar.

I suppose I'll see how it goes in the coming few days.


Thank you for your work!

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: chromium: Update to version 94.0.4606.61 (security-fixes)

2022-01-04 Thread Mattia Rizzolo
On Tue, Jan 04, 2022 at 02:50:20PM -0500, Andres Salomon wrote:
> Okay, that's funny - appears to be a fatal error due to being run under gdb.

Well, it was also crashing outside of gdb ^^

> I pushed a commit to the skip-a11y-checks branch, please give that a try. I
> need to take a look at other distributions that are shipping chromium to see
> if they're just disabling DCHECKs outright, or what.

build started...

-- 
regards,
        Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: chromium: Update to version 94.0.4606.61 (security-fixes)

2022-01-04 Thread Mattia Rizzolo
ger.cc(681)]
 Cannot use V8 Proxy resolver in single process mode.
[413:413:0104/174404.300230:FATAL:render_process_host_impl.cc(4227)] 
Check failed: host->GetBrowserContext() == browser_context (0x645f47d0 vs. 
0x658dcb30) Single-process mode does not support multiple browser contexts.

Thread 1 "chromium" received signal SIGABRT, Aborted.
__GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:49
49  ../sysdeps/unix/sysv/linux/raise.c: No such file or directory.
(gdb) bt
#0  __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:49
#1  0x74653536 in __GI_abort () at abort.c:79
#2  0x5d79e9e5 in base::debug::BreakDebuggerAsyncSafe() ()
#3  0x5d6ea9f4 in logging::LogMessage::~LogMessage() ()
#4  0x5d6eaffe in logging::LogMessage::~LogMessage() ()
#5  0x5aba348a in 
content::RenderProcessHostImpl::IsSuitableHost(content::RenderProcessHost*, 
content::IsolationContext const&, content::SiteInfo const&) ()
#6  0x5aba4733 in 
content::RenderProcessHostImpl::GetExistingProcessHost(content::SiteInstanceImpl*)
 ()
#7  0x5aba5b71 in 
content::RenderProcessHostImpl::GetProcessHostForSiteInstance(content::SiteInstanceImpl*)
 ()
#8  0x5acb37dc in content::SiteInstanceImpl::GetProcess() ()
#9  0x5ab7b3c4 in 
content::RenderFrameHostManager::CreateRenderFrameHost(content::RenderFrameHostManager::CreateFrameCase,
 content::SiteInstance*, int, 
mojo::PendingAssociatedRemote, 
base::TokenType const&, bool) ()
#10 0x5ab7b235 in 
content::RenderFrameHostManager::InitRoot(content::SiteInstance*, bool) ()
#11 0x5aa4d59e in content::FrameTree::Init(content::SiteInstance*, 
bool, std::__cxx11::basic_string, 
std::allocator > const&)
()
#12 0x5ad1a896 in 
content::WebContentsImpl::Init(content::WebContents::CreateParams const&) ()
#13 0x5ad0cbb1 in 
content::WebContentsImpl::CreateWithOpener(content::WebContents::CreateParams 
const&, content::RenderFrameHostImpl*) ()
#14 0x5ad0c8b1 in 
content::WebContents::Create(content::WebContents::CreateParams const&) ()
#15 0x608c633b in ProfilePickerView::Init(Profile*) ()
#16 0x608c61f0 in ProfilePickerView::OnSystemProfileCreated(Profile*, 
Profile::CreateStatus) ()
#17 0x5a62fec0 in 
base::internal::Invoker, std::allocator > const&, 
web_app::InstallResultCode), base::WeakPtr >, 
void (std::__cxx11::basic_string, 
std::allocator > const&, 
web_app::InstallResultCode)>::RunOnce(base::internal::BindStateBase*, 
std::__cxx11::basic_string, std::allocator > 
const&, web_app::InstallResultCode) ()
#18 0x5d399bcb in ProfileManager::CreateProfileAsync(base::FilePath 
const&, base::RepeatingCallback const&) 
()
#19 0x608c4442 in ProfilePickerView::Display(ProfilePicker::EntryPoint) 
()
#20 0x6076c476 in 
StartupBrowserCreator::LaunchBrowserForLastProfiles(base::CommandLine const&, 
base::FilePath const&, bool, Profile*, std::vector > const&) ()
#21 0x6076df14 in 
StartupBrowserCreator::ContinueProcessingCommandLineAfterEarlyWebAppCheck(base::CommandLine
 const&, base::FilePath const&, Profile*, bool, Profile*, std::vector > const&) ()
#22 0x6076bcd8 in 
StartupBrowserCreator::ProcessCmdLineImpl(base::CommandLine const&, 
base::FilePath const&, bool, Profile*, std::vector > const&) ()
#23 0x6076ae30 in StartupBrowserCreator::Start(base::CommandLine 
const&, base::FilePath const&, Profile*, std::vector > const&) ()
#24 0x5d1b86ef in ChromeBrowserMainParts::PreMainMessageLoopRunImpl() ()
#25 0x5d1b7ea8 in ChromeBrowserMainParts::PreMainMessageLoopRun() ()
#26 0x5a6b6ddc in content::BrowserMainLoop::PreMainMessageLoopRun() ()
#27 0x5acd2c36 in content::StartupTaskRunner::RunAllTasksNow() ()
#28 0x5a6b69ca in content::BrowserMainLoop::CreateStartupTasks() ()
#29 0x5a6b9598 in 
content::BrowserMainRunnerImpl::Initialize(content::MainFunctionParams const&) 
()
#30 0x5a6b4e22 in content::BrowserMain(content::MainFunctionParams 
const&) ()
#31 0x5d176f7d in 
content::ContentMainRunnerImpl::RunBrowser(content::MainFunctionParams&, bool) 
()
#32 0x5d1768df in content::ContentMainRunnerImpl::Run(bool) ()
#33 0x5d17419a in content::RunContentProcess(content::ContentMainParams 
const&, content::ContentMainRunner*) ()
#34 0x5d174a8b in content::ContentMain(content::ContentMainParams 
const&) ()
#35 0x58e0d721 in ChromeMain ()
#36 0x746547ed in __libc_start_main (main=0x58e0d5f0 , 
argc=11, argv=0x7fffdd38, init=, fini=, 
rtld_fini=, stack_end=0x7fffdd28) at 
../csu/libc-start.c:332
#37 0x58e0d52a in _start ()


-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: chromium: Update to version 94.0.4606.61 (security-fixes)

2022-01-03 Thread Mattia Rizzolo
On Mon, Jan 03, 2022 at 01:39:21PM +0100, Mattia Rizzolo wrote:
> On Sun, Jan 02, 2022 at 06:53:52PM +0100, Mattia Rizzolo wrote:
> > > > the v96 branch of https://salsa.debian.org/dilinger/chromium
> > 
> > FWIW, I'm trying to build it myself as well
> 
> Here it started chrashing as soon as I tried to open a new tab, and
> after that it refuses to load my main profile (but it loads others).

After rolling back, it seems to have nuked all of the saved passwords
and login information I had (I don't know if this is only an effect of
the rollback and they are actually there somewhere), as well as all
cookies.


-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: chromium: Update to version 94.0.4606.61 (security-fixes)

2022-01-03 Thread Mattia Rizzolo
On Sun, Jan 02, 2022 at 06:53:52PM +0100, Mattia Rizzolo wrote:
> > > the v96 branch of https://salsa.debian.org/dilinger/chromium
> 
> FWIW, I'm trying to build it myself as well

Here it started chrashing as soon as I tried to open a new tab, and
after that it refuses to load my main profile (but it loads others).


Here is what it prints on the console:

mattia@warren /tmp % chromium
[3249439:3249439:0103/133254.120313:ERROR:power_monitor_device_source_stub.cc(11)]
 Not implemented reached in virtual bool 
base::PowerMonitorDeviceSource::IsOnBatteryPower()
[3249485:3249485:0103/133254.419923:ERROR:gpu_init.cc(457)] Passthrough is not 
supported, GL is desktop, ANGLE is
[3249485:3249485:0103/133254.445016:ERROR:sandbox_linux.cc(376)] 
InitializeSandbox() called with multiple threads in process gpu-process.
[3249439:3249468:0103/133258.019370:ERROR:chrome_browser_main_extra_parts_metrics.cc(226)]
 crbug.com/1216328: Checking Bluetooth availability started. Please report if 
there is no report that this ends.
[3249439:3249468:0103/133258.020176:ERROR:chrome_browser_main_extra_parts_metrics.cc(229)]
 crbug.com/1216328: Checking Bluetooth availability ended.
[3249439:3249468:0103/133258.020199:ERROR:chrome_browser_main_extra_parts_metrics.cc(232)]
 crbug.com/1216328: Checking default browser status started. Please report if 
there is no report that this ends.
[3249439:3249468:0103/133258.284415:ERROR:chrome_browser_main_extra_parts_metrics.cc(236)]
 crbug.com/1216328: Checking default browser status ended.
[3249439:3249439:0103/133259.591406:FATAL:accessibility_paint_checks.cc(60)] 
Check failed: node_data.GetNameFrom() == 
ax::mojom::NameFrom::kAttributeExplicitlyEmpty (kAttribute vs. 
kAttributeExplicitlyEmpty) 0x55c6fb7c92d0: BookmarkButton is focusable but has 
no accessible name or placeholder, and is not explicitly marked as empty.
BrowserRootView -> NonClientView -> OpaqueBrowserFrameView -> BrowserView -> 
TopContainerView -> BookmarkBarView -> BookmarkButton
#0 0x55c6ef3a2d79 (/usr/lib/chromium/chromium+0x824bd78)
#1 0x55c6ef2d2353 (/usr/lib/chromium/chromium+0x817b352)
#2 0x55c6ef2ed596 (/usr/lib/chromium/chromium+0x8196595)
#3 0x55c6ef2edffe (/usr/lib/chromium/chromium+0x8196ffd)
#4 0x55c6f1fd483a (/usr/lib/chromium/chromium+0xae7d839)
#5 0x55c6f1fc7e92 (/usr/lib/chromium/chromium+0xae70e91)
#6 0x55c6f1fcb985 (/usr/lib/chromium/chromium+0xae74984)
#7 0x55c6f1fcb7a8 (/usr/lib/chromium/chromium+0xae747a7)
#8 0x55c6f25a21bc (/usr/lib/chromium/chromium+0xb44b1bb)
#9 0x55c6f1fc86ec (/usr/lib/chromium/chromium+0xae716eb)
#10 0x55c6f1fcc72c (/usr/lib/chromium/chromium+0xae7572b)
#11 0x55c6f0a59f58 (/usr/lib/chromium/chromium+0x9902f57)
#12 0x55c6f05f0b71 (/usr/lib/chromium/chromium+0x9499b70)
#13 0x55c6f063ef56 (/usr/lib/chromium/chromium+0x94e7f55)
#14 0x55c6f063e891 (/usr/lib/chromium/chromium+0x94e7890)
#15 0x55c6f0704e02 (/usr/lib/chromium/chromium+0x95ade01)
#16 0x55c6f0705928 (/usr/lib/chromium/chromium+0x95ae927)
#17 0x55c6eeead34a (/usr/lib/chromium/chromium+0x7d56349)
#18 0x55c6ef3421cd (/usr/lib/chromium/chromium+0x81eb1cc)
#19 0x55c6ef3632d6 (/usr/lib/chromium/chromium+0x820c2d5)
#20 0x55c6ef362a88 (/usr/lib/chromium/chromium+0x820ba87)
#21 0x55c6ef363892 (/usr/lib/chromium/chromium+0x820c891)
#22 0x55c6ef2f655f (/usr/lib/chromium/chromium+0x819f55e)
#23 0x55c6ef363e28 (/usr/lib/chromium/chromium+0x820ce27)
#24 0x55c6ef322a15 (/usr/lib/chromium/chromium+0x81cba14)
#25 0x55c6ec2baa33 (/usr/lib/chromium/chromium+0x5163a32)
#26 0x55c6ec2bc9de (/usr/lib/chromium/chromium+0x51659dd)
#27 0x55c6ec2b7e32 (/usr/lib/chromium/chromium+0x5160e31)
#28 0x55c6eed79f7d (/usr/lib/chromium/chromium+0x7c22f7c)
#29 0x55c6eed798df (/usr/lib/chromium/chromium+0x7c228de)
#30 0x55c6eed7719a (/usr/lib/chromium/chromium+0x7c20199)
#31 0x55c6eed77a8b (/usr/lib/chromium/chromium+0x7c20a8a)
#32 0x55c6eaa10721 ChromeMain
#33 0x7f7cbdfd17ed __libc_start_main
#34 0x55c6eaa1052a _start
Task trace:
#0 0x55c6f0705676 (/usr/lib/chromium/chromium+0x95ae675)
#1 0x55c6ef58b1c0 (/usr/lib/chromium/chromium+0x84341bf)
#2 0x55c6ef5b62dc (/usr/lib/chromium/chromium+0x845f2db)
IPC message handler context: 0xB99CF134
Crash keys:
  "total-discardable-memory-allocated" = "8388608"
  "gpu-gl-renderer" = "Mesa Intel(R) HD Graphics 520 (SKL GT2)"
  "gpu-gl-vendor" = "Intel"
  "gpu-generation-intel" = "9"
  "gpu-vsver" = "4.60"
  "gpu-psver" = "4.60"
  "gpu-driver" = "21.2.6"
  "gpu-devid" = "0x1916"
  "gpu-venid" = "0x8086"
  "ui_scheduler_async_stack" = "0x55C6F0705676 0x55C6EF58B1C0"
  "extension-1" = "oboonakemofpalcgghocfoadofidjkkk"
  "num-extensions" = "1"
  "switch-12" = "--origin-trial-disabled-features=CaptureHandle"
  "switch-11" 

Re: chromium: Update to version 94.0.4606.61 (security-fixes)

2022-01-02 Thread Mattia Rizzolo
On Sat, Jan 01, 2022 at 01:23:09PM -0500, Andres Salomon wrote:
> > I've got 96.0.4664.110 building on both bullseye and sid

Trying it, I see it still build-depends on python-jinja2.  That package
is now gone, so it's not actually buildable in sid anymore.

Correlated, do you know how long do they plan on keeping using python2?
That's plainly unsuitable, it really is not going to last much longer in
debian.

> > the v96 branch of https://salsa.debian.org/dilinger/chromium

FWIW, I'm trying to build it myself as well (after injecting an old
python-jinja2 and an old python-markupsafe).

> Alright, crashes are solved and the packages are now usable. After some
> cleanups (listing CVEs in changelogs,

This doesn't seem to be done as of the current tip of you v96 branch.

> merging/pushing a bunch of
> commits in my branch, possibly dropping strong stack protection from
> builds to silence warnings from older clang versions, and going through
> lintian errors/warnings), it should be ready to upload.

TBH, I don't think I am able to judge the appropriateness of most of
those changes...
Though I suspect I could close most of my eyes and upload it to
unstable: can't be much worse than what we have...

> How should I handle this? NMU to sid, let people try it out, and then
> deal with buster/bullseye? Upload everything all at once?

Procedure would be NMU to unstable first, IMHO.

> I also haven't heard from anyone on the chromium team yet - should I
> add myself as an uploader and do a normal (non-NMU) upload? Do any of
> them care?

Without hearing from them, adding yourself to Uploaders would be
inappropriate.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Bug#995212: chromium: Update to version 94.0.4606.61 (security-fixes)

2021-12-07 Thread Mattia Rizzolo
On Tue, Dec 07, 2021 at 07:31:09PM +0100, Tomas Pospisek wrote:
> > Obviously I cannot promise anything here; I'm currently even more in the 
> > dark
> > than you. :-) But if there's a list of relevant bugs somewhere, I at least
> > have a place to try to understand the issues at hand.

The one bug I had in mind when I wrote my email was this:

https://bugs.chromium.org/p/chromium/issues/detail?id=1250231

However I saw in the past also some cases of a bug reported, few
versions later bug fixed, but actually the bug wasn't even touched, so
most likely somebody else noticed "internally" but never saw the bug
report.


Besides that, look at the stupidly long list of patches.  I consider it
fair to say that for most of them chromium upstream could just trivially
incorporate build flags or support our needs: none of those patches
change foundamental behaviour or so.

> PS: I have included Mattia Rizzolo, Michael Gilbert and the Debian Chromium
> Team directly in the recipients, to be sure they see this email. I do hope
> you all do not mind.

That's all fine with me (also, I'm subscribed to d-d@ (and d-release@),
but I'm not actually involved in the maintenance.

Rather, I'm adding here Michel Le Bihan who actually maintained chromium
in the past 8+ months, and I can only say that he did a great job,
despite the short time.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Bug#995212: chromium: Update to version 94.0.4606.61 (security-fixes)

2021-12-06 Thread Mattia Rizzolo
On Mon, Dec 06, 2021 at 08:53:37PM +0100, Paul Gevers wrote:
> I have good experience with some of my upstreams where they supported me by
> adapting their build system to enable building without the bundled/vendored
> dependencies. Has this been tried? Would it be worth pursuing?

It has been, yes.

I was looking when Micheal reported a few bugs (after my prodding) to
get a few build issues solved (actual FTBFS when building with specific
build flags).  Even those bug reports were completely ignored with no
answer whatsoever; the patches also ignored.

I'm led to believe the chromium team is not really playing with the
community at all, rather they are just following their internal bug
tracker instead.
Likewise, they are obviously not interested in supporting anything that
is not the official Google Chrome build (if it can even said they are
"supoprting" that).

-- 
regards,
        Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: chromium: Update to version 94.0.4606.61 (security-fixes)

2021-12-05 Thread Mattia Rizzolo
> Am Sun, Dec 05, 2021 at 10:53:56AM +0100 schrieb Paul Gevers:
> > The problem really is lack of maintenance. In my opinion, chromium deserves
> > an active *team* to support it in Debian.
[..]
> > We'll not ship it in bookworm unless we see steady uploads
> > in unstable and we see security uploads in stable.

FWIW, as the person currently sponsoring the (few) uploads thatt happen,
I also approve of this.
I had some hopes for the current "team" (m)ilbert and Michel), but
gilbert's mail even started bouncing, and Micheal became less and less
responsive :(  - I understand it's a complicated package so yes, there
needs to be a real team: I also recommend you require an active (as
gilbert is not) DD in the team that actually maintains chromium (so not
me who just sponsor the uploads).

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: uscan roadmap

2021-12-01 Thread Mattia Rizzolo
On Wed, Dec 01, 2021 at 12:39:41PM +0100, Geert Stappers wrote:
> Summary: unhide redirectors

And not only.

> On Wed, Dec 01, 2021 at 09:11:17AM +0100, Yadd wrote:
> > after few discussions with some devscripts maintainers, we decided to build
> > a new "version=5" format for debian/watch.

To be clear, this is a *very* non-ready proposal that we are getting
through the wider community.  Nothing of this is implemented anywhere.

> >* URL and regex are separated
> >* Some default values change. For example, `dversionmangle` default
> >  value will be "auto" (drop +dfsg, ~ds,...), uversionmangle=s/-/~/g,
> >  filenamemangle=s/.*?(\d[\d\.]*@ARCHIVE_EXT@)/@PACKAGE@-$1/...

I honestly would like to add website-aware functionalities to uscan,
such as exactly this.

> I think the move from v4 to v5 is an excellent opportunity
> to express in the watch file that there is a dependency on a redirector.
[..]
>  Version: 5
>  Source: https://qa.debian.org/watch/sourceforge/ 
> -(.+)\.tar\.gz debian uupdate

I would like something like:
  Source: qa-redirector
  Source-Options:
   name: sourceforge
   project: 


Likewise, I would love if uscan could just learn how github, gitlab,
launchpad, etc are made so prople won't have to bother with sticking
urls into watchfiles, such as:

  Source: GitHub
  Source-Options:
   namespace: trendmicro
   project: tlsh
   match-on: tags|releases

To go either matching on https://github.com/trendmicro/tlsh/tags or
https://github.com/trendmicro/tlsh/releases. using then Scheme (a name
that, tbh, I don't particularly like right now) for the tags or releases
regex.

> And I think such change will allow removal of
> 
>bare
>Disable all site specific special case code such as URL
>redirector uses and page content alterations.
> 
> from the uscan code and uscan manual page  (they are in /usr/bin/uscan )
> 
> 
> The goal is to have documented that there are extra components being used.
> Avoiding nasty surprises.

this feels like the opposite direction I'm proposing above :D

> Awareness of redirectors will get us more redirectors.
> Those redirectors will help us to prevent that `uscan`
> must get a javascript interpreter.

Possibly, I'm indeed kind of unimpressed that we grew a parse for
nodejs' package.json and perl's META.json.  Though I accepted it because
I saw some value, I'm totally in awe of universes where that is actually
needed..

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Require packages to build without any configured DNS

2021-09-14 Thread Mattia Rizzolo
On Tue, Sep 14, 2021 at 10:05:01AM +0200, Johannes Schauer Marin Rodrigues 
wrote:
> Hi,
> 
> Quoting Mattia Rizzolo (2021-09-06 16:39:39)
> > As the pbuilder maintainer, I've been asked to make it serve a non-working
> > /etc/resolv.conf just to make that bug above moot, so I'm quite biased on 
> > the
> > matter myself :)
> 
> sbuild already disables network access for all chroot backends that support 
> it.

As several people already stated, this is *not* about network access.

> Schroot, the default chroot backend, currently doesn't allow this. See 
> #802849.

Likewise pbuilder, yes.

> The only chroot backend that allows disabling the network is the unshare
> backend. It does so, by unsharing the network namespace, only bringing up the
> loopback interface and writing an empty /etc/resolv.conf.

So you ship an *empty* /etc/resolv.conf?  Then I suppose you also can't
build packages using dnspython in their tests with your configuration?

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Require packages to build without any configured DNS

2021-09-06 Thread Mattia Rizzolo
Hi,

during the year, a src:dnspython change made it so that any software
importing that library now requires a valid /etc/resolv.conf with at
least one nameserver configured.

This also made it so that something between 50-100 packages now fail to
build if the build system doesn't have any working /etc/resolv.conf.  I
venture to say that this is a very reasonable configuration to have in a
build system that tries to be network-disabled.

It must be noted that no actual network operation happen, so this
doesn't fall into the "no network activity" bucket.


This is the bug that was filed against dnspython: https://bugs.debian.org/989171


Do anybody on the list have any opinion on where is the bug, on
dnspython, or on the build environment?


As the pbuilder maintainer, I've been asked to make it serve a
non-working /etc/resolv.conf just to make that bug above moot, so I'm
quite biased on the matter myself :)

-- 
regards,
    Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: src:developers-reference - pt_BR translation initiative

2021-08-25 Thread Mattia Rizzolo
On Wed, Aug 25, 2021 at 12:11:17PM +, Thiago Pezzo (tico) wrote:
> Hi, Sean,
> 
> > Please consider Debian Policy too! We've got po4a infra set up.
> That would be great too. Today we'll have our team's BoF at DebConf, I'll 
> talk about translating the Debian Policy.

That's all nice and dandy, however please make sure to keep up with
those translations...

/me - who is kind of not amused at how the German (and clearly also the
newly added Portuguese) are not keeping up at all with devscripts
-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Have the watch file checks stopped?

2021-08-23 Thread Mattia Rizzolo
On Mon, Aug 23, 2021 at 12:59:39PM +0200, Gard Spreemann wrote:
> Have the uscan watch file checks that feed qa.debian.org stopped? Is it
> on purpose? Perhaps a consequence of the recent release?

That's one part that's included in the UDD downtime reported here:
https://lists.debian.org/debian-qa/2021/08/msg0.html


-- 
regards,
        Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: inconsistent mailgraph settings

2021-08-21 Thread Mattia Rizzolo
On Sat, Aug 21, 2021 at 10:36:04AM +0200, Tomas Pospisek wrote:
> Hi Vincent,
> 
> On 20.08.21 16:50, Vincent Lefevre wrote:
> > My bug report https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989734
> > has been closed again, with no explanations.
> 
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989734;msg=12 claims that
> the bug was closed via
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989734;msg=10 . However I
> can't see why the latter mentioned message would close the bugreport. Can
> anybody shed some light on this?

Likely Jörg Frings-Fürst BCCed the -close@ address.  There are some
people who do that…

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Adding an epoch to the 'steam' package

2021-08-17 Thread Mattia Rizzolo
On Mon, Aug 16, 2021 at 03:08:24PM +0100, Simon McVittie wrote:
> I would like to add the same 1: epoch to the steam package in Debian
> and all of its binary packages, so that all of our version numbers
> (Valve's, Debian's and Ubuntu's) are directly comparable again.

ACK, I'm also fine with adding this epoch.

-- 
regards,
        Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Slower/no acceptance from dak?

2021-08-04 Thread Mattia Rizzolo
On Tue, Aug 03, 2021 at 03:11:09AM +0530, Utkarsh Gupta wrote:
> I've been facing issues with the acceptance emails for a while and was
> wondering if it's known or something, so asking here.

AFAIK, nothing is known.

> I've uploaded a couple of packages to unstable a while ago but that
> didn't make it through (at least that's what it looks like). Neither
> did I get the acceptance mail nor the rejection.

Please give package names as examples.
dak's log all use package names, it's too hard to grep by uploader
names.


Trying, the last packages processed with you as uploader is:
Jun 11 00:12:51 micro_2.0.9-1_source.changes processed successfully 
(uploader utka...@debian.org)
which was a while ago.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: What are desired semantics for /etc/shells?

2021-06-14 Thread Mattia Rizzolo
Hello,

I have no personal stake either, the same as the others who already
replied, but I guess I'll chime in as well.

On Mon, Jun 14, 2021 at 02:39:30PM +0200, Helmut Grohne wrote:
> > I think using triggers has an obvious benefit here, but depending in the
> > intended semantics of `/etc/shells`, implementing the part about preserving
> > user changes may be difficult. A possible solution could be moving
> > `/etc/shells` to `/var` and replacing it with a symbolic link when its 
> > contents
> > match with the generated one one.
> 
> At this time, my personal preference would be turning /etc/shells into a
> symbolic link to an autogenerated file. Replacing that link with a
> manually maintained file would keep the original flexibility at the
> slightly increased cost of having to manually update it for added or
> removed shells while providing significant improvements for the vast
> majority of users.

I have an enhancement proposal to your suggestion.

Add an /etc/shells.add and /etc/shell.remove or somesuch, that are
parsed while generating the proposed /var/ file, that are to
be used by the system administrator to instruct the debianutils trigger
to either remove a shell from the list even if it's installed, or to add
a shell to the list even if it's not installed.  It probably means that
the code handling the /var/ file should probably be callable
by other means than just a dpkg trigger, so that the system
administrator can force update the shell list when they update
add/remove files.

This way you'd entirely remove another case where you'd need to remove
the symlink and as such lose the ability to auto-update the file when
you add/remove shells (that are not otherwise already listed in the .add
and .remove files), and, in fact, make it possible for those systems to
be even more declarative since the administrators wouldn't be messing
with files that are already managed by other tools.


(this is somewhat inspired by /etc/hosts.{allow,deny})

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Bug#989607: ITP: 2geom -- robust computational geometry framework

2021-06-08 Thread Mattia Rizzolo
Package: wnpp
Severity: wishlist
Owner: Mattia Rizzolo 
X-Debbugs-Cc: debian-devel@lists.debian.org, debian-multime...@lists.debian.org
Control: block 989606 by -1

* Package name: 2geom
  Version : 1.1
  Upstream Author : Inkscape developers
* URL : https://gitlab.com/inkscape/lib2geom
* License : LGPLG-2.1 or MPL-1.1
  Programming Lang: C++
  Description : robust computational geometry framework

The library is descended from a set of geometric routines present in
Inkscape, a vector graphics editor based around the Scalable Vector
Graphics format, the most widespread vector graphics interchange format
on the Web and a W3C Recommendation. Due to this legacy, not all parts
of the API form a coherent whole (yet).
Rendering is outside the scope of this library, and it is assumed
something like libcairo or similar is employed for this.  2geom
concentrates on higher level algorithms and geometric computations.



This library was developed mainly to be used by Inkscape, but it's
released separately in the hope to be useful to others.

I plan to maintain it within the Debian Multimedia team (like I do for
inkscape), and welcome others to join me.

-- 
regards,
    Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Epoch bump for kernelshark

2021-05-25 Thread Mattia Rizzolo
On Sun, May 23, 2021 at 03:17:10PM -0500, Richard Laager wrote:
> On 5/23/21 8:34 AM, Sudip Mukherjee wrote:
> > And, as a result, upstream kernelshark is now at v2.0 but the Debian
> > packaged version is at v2.9.1 and I will need to add an epoch to the
> > version to package it directly from its new upstream repo.
> > 
> > Current version: 2.9.1-1
> > Proposed version: 1:2.0-1
> 
> How close is upstream to 3.0? If not close, are they willing to bump to 3.0
> anyway to avoid this versioning issue?

And in the meantime, I recommend you use 2.0-1 as source version, and
make the binary 2.9.1+really$(DEB_VERSION) (DEB_VERSION coming from
/usr/share/dpkg/pkg-info.mk)


-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Missing samba DSA-4513 changelog in https://metadata.ftp-master.debian.org/changelogs/

2021-05-01 Thread Mattia Rizzolo
On Sat, May 01, 2021 at 02:26:31PM +0900, Hideki Yamane wrote:
> On Wed, 7 Apr 2021 18:20:09 +0200
> Julien Cristau  wrote:
> > The samba package is held in stable-new by bug#939419, see
> > https://release.debian.org/proposed-updates/stable.html
> 
>  Thanks, Julien.
> 
>  Can we fix it with cherry-picking 
> https://salsa.debian.org/samba-team/samba/commit/bedd051122980c31dd1c1431ce9e40ba01dc5990
>  as 2:4.9.5+dfsg-5+deb10u2 then?

Rather, I think
https://debdiffs.raspbian.org/main/s/samba/samba_4.9.5+dfsg-5+deb10u1+rpi1.debdiff
would be more appropriate, as it is, for me, more appropriate than
dropping a binary.

-- 
regards,
    Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Proposed mass-bug filing: missing support for build-arch or build-indep

2021-04-19 Thread Mattia Rizzolo
On Mon, Apr 19, 2021 at 03:11:21PM +0200, Lucas Nussbaum wrote:
> I would like to propose a mass bug filing on source packages that miss
> support for build-arch or build-indep targets in debian/rules.

+1

> There are currently 411 packages in testing that do not include those
> targets, according to lintian's debian-rules-missing-recommended-target
> tag.  (I will also file a bug against lintian to reflect that those
> targets are now required).

That's way more than I'd expected, but as you mentions it's a good
indicator of not-greatly-maintained packages, so I'm cool with them.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: debtags.debian.org tag vocabulary now editable by all DDs

2021-04-08 Thread Mattia Rizzolo
Hi,

On Mon, Apr 05, 2021 at 06:26:19PM +0200, Enrico Zini wrote:
>  * I need help with routine dput-ting of tag data
> 
> I could still use help from one or more DDs, doing regular uploads of
> tags from the site to the archive.
> 
> It means running a script that generates a source package, GPG-signing
> it, and uploading it with dput. It needs to be done once a month or so,
> and I regularly miss doing that. If you're interested, get in touch and
> we can go through the script to make it work on your system.

I don't remember if this happened, but did you try to get dak to pull
automatically (or the other way around: debtags pushing automatically)
during dinstall, like it's done by i18n?

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Bug#982562: general: Storing upstream signatures next to upstream tarballs is problematic

2021-02-12 Thread Mattia Rizzolo
On Fri, 12 Feb 2021, 10:25 am Rene Engelhard,  wrote:

> Hi,
>
> Am 11.02.21 um 21:59 schrieb Raphaël Hertzog:
>
> > [1] For details it happened in dbus-glib:
> > https://snapshot.debian.org/package/dbus-glib/0.110-2/ -> it has .asc
> file
> > https://snapshot.debian.org/package/dbus-glib/0.110-3/ -> no .asc
> > https://snapshot.debian.org/package/dbus-glib/0.110-4/ -> no .asc
> > https://snapshot.debian.org/package/dbus-glib/0.110-5/ -> it has a
> > different .asc file
> >
> Why should anything else than -1 have a .asc file anyways in the upload?
>
> That's .orig.tar.xz (or whatever compression) and the accompanying
> .orig.tar.xz.asc.
>
> Since -2 etc don't upload the .orig again there's no need to upload the
> signature of the .orig again.


You are likely confusing the .dsc and the .changes.
The .dsc *always* refer to all the source files, even if not uploaded.
That clearly also includes the .asc.


>


Bug#982562: general: Storing upstream signatures next to upstream tarballs is problematic

2021-02-11 Thread Mattia Rizzolo
On Fri, 12 Feb 2021, 12:52 am Guillem Jover,  wrote:

> Then there's the problem with changing contents for already seen
> files, which seems like a dak bug. It does not allow to change a
> tarball once it has been seen, so I don't see why it should allow a
> changed .asc either?
>

That's not true.

Call it a dak bug or a feature, depending on where you stand.  Dak forgets
everything concerning a file as soon as it's not present in any suite it
manages.
This usually appears in the way of people uploading a package with the same
name and version of something that was removed long long ago and since then
archived and forgotten by dak.


It's totally possible to overwrite a tarball with the same filename too
that way, you just need to wait the appropriate amount of time and upload
things in a way that you replace the upstream tarball.
(Honestly I haven't tried this myself, but I have a package where if you'd
like I can actually go and try to prove my point).


Back to the original bug report: I personally believe that the signatures
there are fine, and I don't believe in the "upstream the re-sign an already
released tarball" story.  But I consider the current forgetfulness of dak
as a bug.


Re: Possible DEP proposal - contribution preferences

2021-02-09 Thread Mattia Rizzolo
On Tue, Feb 09, 2021 at 10:40:39AM -0800, Russ Allbery wrote:
> Jonas Smedegaard  writes:
> 
> > Let's see if Debian can agree on a single normalization of 822-ish
> > files.  For starters, I disagree that "wrap-and-sort -a" is a suitable
> > normalization, as that will involve re-indentation when keys change.
> > Instead, I propose this as starting point:
> 
> >   wrap-and-sort -ast
> 
> I've been using wrap-and-sort -ast on all of my packages for a while, with
> much the same justification.

Indeed, same here :)

> My recollection is that the relevant Config::Model model has a slightly
> different preferred normalization form?  Those are the two most common
> tools used for this, I think, so if the two of them could agree, that
> would go a long way towards having a common format (and this may have
> already happened without me knowing).

That's exactly what I'm saying in the above bug.
That bug asks to change wrap-and-sort's defaults, and my answer is
saying that if the default change, we should do the same to cme.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Possible DEP proposal - contribution preferences

2021-02-09 Thread Mattia Rizzolo
On Tue, Feb 02, 2021 at 01:55:19PM +, Jelmer Vernooij wrote:
>  * Whether or not contributors can feel free to reformat
>files (e.g. wrap-and-sort -a -v).
>("allow-reformatting" in lintian-brush.conf)

On this, please also read https://bugs.debian.org/895570#13

tl;dr: I honestly believe we should just decide on a format, and
converge towards it.
It apparently works quite well for python as a whole ecosystem, where
now pretty much nobody is "against" pep8 (or even black!).  There is no
reason we can't manage to decide on a wrapping format and stick with it.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Bug#981113: ITP: root -- open-source data analysis framework

2021-01-27 Thread Mattia Rizzolo
On Tue, Jan 26, 2021 at 04:59:48PM +0100, Christoph Biedl wrote:
> Julien Cristau wrote...
> 
> > On Tue, Jan 26, 2021 at 04:34:14PM +0100, Stephan Lachnit wrote:
> > > * Package name: root
> > [...]
> > > 
> > > I want to maintain ROOT in the science team. ROOT was already in Debian as
> > > `root-system` [1], but hasn't been updated since 2015.
> > > 
> > > [1] https://tracker.debian.org/pkg/root-system
> > > 
> > Please re-use the old name.  "root" is a terrible choice of package name.
> 
> At least. Even "root-system" is not very distict, I'd rather choose
> something like "root-analysis-framework", assuming that name is a good
> description for what the package does.

tbh I'd just keep root-system only for consistency with the past.

However I have another concern, rather than the name:

> > > I will probably go with a more easy maintainable route like I did with 
> > > Geant4
> > > for the start and do package splitting later.

I don't understand this statement.  It's not like it's the package split
that makes it more or less maintenable IMHO.  Actually, IME it's often a
more split package that might be somewhat easier to maintain.

The problem really is about somebody who can dedicate a long time to it,
not just one or two years.
For reference, just looking at tracker:
 * added in 2007, but the maintainer was immediately unavailable next
   year, so there were NMUs starting in 2009 not even 21 months after
   the first upload.  Removed in 2011 since nobody seriously picked it up
 * re-added in 2012, the maintainer looked motivated and clearly did
   quite a few uploads to maintain it, but that winded down in 2014, and
   after a bunch of NMUs was removed in 2016 (18 months after the last
   upload and 11 months after being removed from testing, so you can
   really just think of it as removed in 2015)

So history of this package shows that the interest wanes after ~2 years,
which meakes me wonder wether this is only driven by some external
factor, like some phd-driven work or similar.

I'm *not* in favor of adding such big piece of software to the archive,
if it's  interest is something that is assured to disappear in a couple
of years.  So please make sure of your motivation and state it.


You've been a DM for less than a year and you are already doing the NM
to become a DD, so I really hope the above history of src:root-system
doesn't happen again, at least not that quickly :)

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Updating dpkg-buildflags to enable reproducible=+fixfilepath by default

2021-01-09 Thread Mattia Rizzolo
On Sat, Jan 09, 2021 at 08:37:48PM +0100, Samuel Thibault wrote:
> Lisandro Damián Nicanor Pérez Meyer, le sam. 09 janv. 2021 15:53:41 -0300, a 
> ecrit:
> > # __FILE__ is a public, well defined API
> 
> ? My copy of C11 says
> 
> “
> __FILE__ The presumed name of the current source file (a character string 
> literal)
> ”
> 
> that's not so well-defined.  I would not expect it to necessarily
> contain the path to it.

In fact, empirically I've seen that __FILE__ is expanded to whatever
path gets passed to the compiler.
You can easily see how stuff build with cmake get a full path in there,
whereas stuff built with make gets a path relative to the Makefile.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Bugs "fails to migrate to testing for too long" (Was: cluster3 dropped out of testing)

2020-12-09 Thread Mattia Rizzolo
On Wed, Dec 09, 2020 at 09:44:25AM -0800, Diane Trout wrote:
> Could we add a note to tracker or excuses for non-free packages on what
> the developer needs to do to get it to migrate?

IMHO, that's inappropriate.  That would mean artificially adding into
britney something that is really a nuance of how the archive and buildd
system is currently set up.  Alright that's definitely doable, but I
consider this something that the maintainer of a non-free package ought
to know (it's clearly written in the devref, for starters).  There are
quite a few more details of how non-free is different from any other
suite, starting from how little testing of it there is.
Though I guess in the past years the britney report on tracker changed
enough to be more and more friendly to developers, so I guess the
release team (which is the team that would be in charge on the content
of the "testing migrations" box) would do it if talked to appropriately…

Even then, the message says that "cluster3 has no binaries on any arch"
- from there why can't one try to figure why there are no binaries?  I'm
positive that dumping the tracker link and that message in
debian-mentors@ would yield the reason why it's stuck quite quickly.
(note that the thread Andreas started on -devel@ is about the how people
seems to notice first the "failed to migrate to testing" bugs, not about
why cluster3 is not migrating).

> My understanding of your explanation is that we need to do a binary
> upload for non-free because it's not auto-built.

Rather, I encourage you to read the devref part on how to enable
auto-building.  The package seems to have XS-Autobuild: yes in d/control
even in oldoldstable, so I guess it means nobody sent the request to the
buildd admins.

> It's a difference from how main is handled and and it seems like
> putting documentation for the difference would help prevent confusion
> in the future.

I insist that such doc belongs to devref.  If that is lacking, devref
should be improved.  The current devref maintainer is very open to
patches :)

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Bugs "fails to migrate to testing for too long" (Was: cluster3 dropped out of testing)

2020-12-09 Thread Mattia Rizzolo
On Wed, Dec 09, 2020 at 10:17:56AM +0100, Andreas Tille wrote:
> I'd like to point to a discussion on the Debian Med mailing list which
> was caused by a "fails to migrate to testing for too long" bug.  I
> fully agree that these bugs should be filed.  However, the bugs are
> immediately set to "Done" later by the issuer of the bug.  I discussed
> this with Paul before and he said reasons for this - but I think its
> wrong since the issue vanishes from BTS and becomes invisible for the
> maintainers which is not helpful IMHO.
> 
> My suggestion is to not set those bugs to Done to keep the red flag
> for the package raised.

I'm instead convinced that closing those bugs directly is right.

The reason the packages are not migrating has nothing to do with the
bug, and keeping it open adds to the confusion as then it's reported as
a "regression" when really it isn't.

> On Tue, Dec 08, 2020 at 08:46:04PM -0800, tony mancill wrote:
> > Hi Diane,
> > 
> > On Tue, Dec 08, 2020 at 10:14:24AM -0800, Diane Trout wrote:
> > > My coworker noticed cluster3 dropped out of testing and I'm confused
> > > why.
> > > 
> > > https://tracker.debian.org/pkg/cluster3
> > > says that "cluster3 has no binaries on any arch", and there are no logs
> > > at buildd https://buildd.debian.org/status/package.php?p=cluster3 for
> > > it
> > > 
> > > However if I grab either the source package for 1.59+ds-2 or the
> > > current main branch from salsa and try building, I get a package with
> > > binaries.
> > > 
> > > The only mildly annoying thing is when I build in unstable, it ends up
> > > with a dependency on python3 (<< 3.10), python3 (>= 3.9~) which doesn't
> > > install on testing.
> > > 
> > > But the package seems to be fine, so any thoughts why it was held back?
> > 
> > Sometimes you can find this information in the PTS [1] in the News
> > section [2].  In this case cluster3 failed to migrate from unstable to
> > testing before a fixed deadline [3].  (Although I don't know exactly why
> > *that* happened.)

Because you seem to not be aware of how non-free works.  Non-free is not
autobuilt, so when Andreas uploaded 1.59+ds-2 without any binaries then
"cluster3 has no binaries on any arch".  Since there are no binaries
associated with the source, britney refuses to migrate it.  Indeed, one
could just do a binary-only build of it, upload it, and it would migrate
stright the next day.

Or one could ask for an exception to the non-free buildds as docuemnted
on 
https://www.debian.org/doc/manuals/developers-reference/pkgs.en.html#marking-non-free-packages-as-auto-buildable

As you can see, nothing relating to that bug.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: How to cleanup Ubuntu bugs for my Debian packages?

2020-11-29 Thread Mattia Rizzolo
Hello all,

For the sake of disclosure, I'm also an Ubuntu Developer.

On Sun, Nov 29, 2020 at 12:58:53PM +0100, Iustin Pop wrote:
> I have a Launchpad account, and the project itself lists my Launchpad
> account as "maintainer", but on the bug itself I can't mark it as "Won't
> fix", only as "Invalid". Which tells me that I'm missing _some_ rights
> in Ubuntu itself…

Indeed, there are some status that are restricted to the so called "bug
supervisor", which a team defined in the project settings in launchpad.
In the case of Ubuntu itself, that is the ~ubuntu-bugcontrol team
https://launchpad.net/~ubuntu-bugcontrol .  Users who are part of that
team have access to all the features of the bug tracker.

Another common limitation imposed on users that are not bug supervisors,
is that they cannot re-open an already closed bug.  Or, targeting a
series.

> I also have
> https://bugs.launchpad.net/ubuntu/+source/python-mox/+bug/852095, where
> again I can't mark "Won't fix" (it refers to distributions 8 years old)…

I've marked that as wontfix.

However, in the case of
https://bugs.launchpad.net/ubuntu/+source/python-pylibacl/+bug/1876350
"invalid" is the correct status, not "wontfix".


BTW, in case you missed it, if you are going to fix bugs reported on
launchpad, you can use "LP: #x" in the (debian) changelog and close
them, similarly to what you do to close bugs against the BTS.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Epoch version for golang-github-gomodule-redigo-dev?

2020-11-26 Thread Mattia Rizzolo
On Thu, 26 Nov 2020, 11:30 am Holger Levsen,  wrote:

>
> The technical problems I'm are aware of are that a.) version numbers
> (with and without epoch) need to be unique, so if you had 0:2.0.0-1
> you are not allowed to ever have 1:2.0.0-1 again. That's enforced
> by dak however.
>

That's not enforced by dak.  The only case it would be enforced is when
once try to upload the 1: version while the 0: is still published, which is
rare in the cases of epochs.

The other technical problem is that .deb filenames don't contain
> the epoch, which is a problem the archive


Which is the same problem as above, from my understanding.

There is that risk in having two filenames with different content across
history.


IIRC, there *used to* be an actual problem way back in some program that
couldn't handle the : in filenames, and that's why they are not present to
this day.  I argue that we could just put that : (or the %-encoded version,
to avoid accidentally ssh-ing somewhere...) and be done with whatever
problem.


The other problem, is that maintainers regularly forge to put the epoch
when writing version restrictions in d/control, but those are just bugs
that people should be aware of...



(Explicitly not drawing any conclusion here...)


Re: Bug#973637: flag debian/watch files that use older versions of the format

2020-11-03 Thread Mattia Rizzolo
On Mon, Nov 02, 2020 at 10:54:11PM +0100, Xavier wrote:
> But version 2 is really deprecated and it's
> not easy to maintain uscan with 4 versions (It took me a lot of hours to
> rewrite old uscan to modern Perl-OO).
> That's why I'd like to see a "error" tag for version ≤ 2.

Right, but currently version=2 is not explicitly marked as "deprecated"
anywhere.

Could you please send a MR updating the docs doing so?
I also think ds_warn() its usage would be good (then tracker.d.o and
others would rely the warning, etc).

> 3. After bullseye release, I'd like to propose to remove version=2
> support from uscan.

+1


For context of d-devel@, version=2 is currently used by a total of 350
packages in the whole archive, I reckon dropping support for it is
totally doable.

I think we can easily:
 1) mark the thing as deprecated in the manpage and warning at runtime
 2) add a note for the next DevNews
 3) wait a few months after the bullseye release
 4) MBF the remaining version=2 packages
 5) wait a few more months
 6) drop the support ~1/~1.5 years from now

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: DAM Key and identity requirements

2020-09-24 Thread Mattia Rizzolo
On Thu, 24 Sep 2020, 10:51 am Bastian Blank,  wrote:

> Hi Enrico
>
> On Sun, Sep 13, 2020 at 09:11:04AM +0200, Enrico Zini (DAM) wrote:
> >  * Minimum key size and acceptable algorithms are actually the domain of
> >keyring-maint, and we just check those for them.
> >At the time of writing this, a new key must be larger than 1024bits,
> >ideally at least 4096bits, and capable of hashes stronger than SHA1.
> >Please check [KDO] for more recent information.
>
> Hmm, this page do not really read like some sort of policy.
>
> It talks about key size in bits, which only applies to RSA.  What about
> X25519?
>

You should bring that to the keyring-maints.  However I can tell you that
EC keys are pretty much always considered good.

>  * An encryption subkey must be present, since various parts of our
> >infrastructure require it.
>
> Which parts?  While encryption subkeys are useful, I can't see anything
> _requiring_ this.
>

Besides NM sending encrypted tokens, also DSA: the db.d.o password is sent
encrypted during account creation, and ISTR also other things.

>  * A signature subkey must be there, since various parts of our
> >infrastructure require it. Also, it is needed to build up trust (see
> >below).
>
> Signing subkeys are pretty rare.  What is their use-case?
>

I believe the *sub*key bit was wrong, it most likely was talking about
signing capabilities (like above for encryption, it's all about
capabilities, not subkeys)

Also trust is built using certification, not signing (the C bit, not the
> S bit).  I don't think subkeys can hold a certification setting.
>

You clearly haven't read the rest of the mail that is talking how
certifications are no longer considered mandatory for the formation of
trust.


Re: Mass bugs filing: autopkgtest should be marked superficial (new list)

2020-09-19 Thread Mattia Rizzolo
On Sat, Sep 19, 2020 at 08:39:44PM +0100, Sudip Mukherjee wrote:
> After discussing with few people, I now intend to file them with
> "severity: important" and I will also reduce the severity of the
> previously open similar bugs to 'important'.

That's good.

But please also share your proposed text with this list (as the MBF
rules asks for).  Your past filings where IMHO written with a tone that
could be improved.  Also I would like to make sure that you include
stuff like your plans with the severity, references to the release team
decisions, etc.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: debian/rules and DEB_BUILD_PROFILES vs _OPTIONS

2020-09-07 Thread Mattia Rizzolo
On Mon, Sep 07, 2020 at 08:03:20AM +0200, Niels Thykier wrote:
> Mattia Rizzolo:
> >> Or do dpkg or debhelper apply some kind of mapping logic from _OPTIONS
> >> to _PROFILES for the popular options nocheck, nodoc, noopt?
> > 
> > debhelper does.  various helpers do things differently with such
> > options.  You should read the manpages for more details.
> > 
> 
> It does not in the general case.  It does for nodoc because
> $HISTORICAL_REASONS.

Oh, sorry.  I misunderstood the question, I read is as "does debhelper
apply some logic for _OPTIONS or _PROFILES", nothing relating to mapping
from one to the other.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: debian/rules and DEB_BUILD_PROFILES vs _OPTIONS

2020-09-06 Thread Mattia Rizzolo
On Sun, Sep 06, 2020 at 10:53:05PM +0200, Christian Kastner wrote:
> It seems that "nocheck" and "nodoc" can be used with both variables.
> 
> However, which one is to be used in debian/rules recipes? Or both, as
> suggested here [1]?

The thing is, according to the build profile spec, if you specify nodoc
or nocheck in _PROFILES you *MUST* also specify it on _OPTIONS (talking
about when you do the build), so…

> Looking at random packages, newer packages seem to favor just checking
> DEB_BUILD_PROFILES to conditionally build documentation, but that would
> mean that DEB_BUILD_OPTIONS as recommended by policy is not honored.

Yeah, that might cause chances of failing builds if built with nodoc I
guess…

> Or do dpkg or debhelper apply some kind of mapping logic from _OPTIONS
> to _PROFILES for the popular options nocheck, nodoc, noopt?

debhelper does.  various helpers do things differently with such
options.  You should read the manpages for more details.

> Or are we supposed to transition to just _PROFILES in the long term?

There were talks around that with the people involved in writing up the
_PROFILES spec, not sure where that go (nowhere I think).

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: we do recommend workflows (Re: Why Vcs-* fields are not at least recommended ?)

2020-08-19 Thread Mattia Rizzolo
On Wed, Aug 19, 2020 at 09:56:49AM +, Holger Levsen wrote:
> On Wed, Aug 19, 2020 at 02:18:08AM +0500, Andrey Rahmatullin wrote:
> > And we cannot recommend using a VCS because we don't usually recommend 
> > workflows.
> [...]
> > I don't think anything is "supposed" here. We don't recommend workflows
> 
> yes, we do. workflows and tools. i'm not sure why you think we don't?


And, specifically: 
https://lists.debian.org/debian-devel-announce/2020/04/msg9.html

It felt to me 2019 was one of the years of endless debates, kind of
surprised by that sentence indeed!

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: epoch bump for babl and gegl libraries

2020-08-17 Thread Mattia Rizzolo
On Mon, Aug 17, 2020 at 10:21:37AM +0100, Simon McVittie wrote:
> The GNOME team intend to add an epoch to the babl and gegl libraries,
…
> Historically, versions of these packages were shipped by the third-party
> deb-multimedia.org apt repository. That would have been fine, except that
> the maintainer(s) of deb-multimedia.org added an epoch to their versions.
> It is not clear to me why this was done, and it breaks the versioned
> dependency system, manifesting as frequent bug reports for gimp crashing
> on startup.

Question: what about changing the package name instead, and doing a
transition to a new library package name?  It would be perfect to catch
the occasion of a soname bump, but even then, we are only talking about
less than 10 packages to rebuild for a changed library package name.

> In principle we could add the epoch to only the binary packages,
> but it'll be a lot simpler and less confusing to add it to the source
> package's version. Some of the binary package names (particularly
> libbabl-dev and libgegl-dev) are going to be long-lived, so restricting
> the epoch bump to binary packages would not help us to eliminate the
> epoch in a future Debian release.

This wouldn't solve the problem of the -dev packages having the epoch in
the 3rd party repository, but since you mention that they already
removed the package altogether, I think this is fine: your average user
wouldn't have installed these binaries but only the shared library
binaries, and anybody dealing with building debian packages ought to
keep their system usable enough for that porpuse.  Over time, people who
even had those packages installed would notice somehow… or just
disappear by system reinstallation and whatnot.

> please do not interpret this as precedent for
> having Debian packages reflect epochs added in third-party repositories
> in general.

It's still not so nice though...

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: NMU for Imagemagick?

2020-06-28 Thread Mattia Rizzolo
On Sat, Jun 27, 2020 at 02:51:32PM +0200, Jonathan Carter wrote:
> so any objection if I look into making an NMU upload for this
> package?

You are asking here, but you didn't report on whether you tried to
contact:
 1) the maintainer (and here I'm referring to Bastien Roucariès)
 2) the security team
before trying to write to d-d@…

-- 
regards,
        Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Mass bug filing: dependencies on GTK 2

2020-04-29 Thread Mattia Rizzolo
On Wed, 29 Apr 2020, 9:29 pm Michael Biebl,  wrote:

> Am 29.04.20 um 19:37 schrieb Simon McVittie:
> > On Wed, 29 Apr 2020 at 18:04:41 +0200, Mattia Rizzolo wrote:
>
> >> I think you should
> >> file the bugs at severity:minor, given the amount of involved packages,
> >> and the fact that you state we might not be able to remove gtk2 in many
> >> many years.
> >
> > If you say so. I was going to use normal, like I did for the analogous
> > dbus-glib MBF; the practical difference between minor and normal doesn't
> > seem significant.
> >
>
> fwiw, I think normal seems about right.
>

I'm not fussy either way, that was mostly my 2¢ given you didn't specify in
the OP.
As you mention, the practical differences are next to non-existent.


>


Re: Mass bug filing: dependencies on GTK 2

2020-04-29 Thread Mattia Rizzolo
On Wed, Apr 29, 2020 at 10:38:27AM +0100, Simon McVittie wrote:
> Quite a lot of source packages (see attached list and dd-list) have
> Build-Depends on GTK 2 (libgtk2.0-dev), or produce binary packages with
> a Depends on it.
> 
> Mass-filed bugs for this will be usertagged to appear in
> https://udd.debian.org/cgi-bin/bts-usertags.cgi?user=pkg-gnome-maintainers%40lists.alioth.debian.org&tag=gtk2
> and will be marked as blocking #947713.

It is a huge list, but I think it's fine and you should start filing the
bugs.

You haven't included a copy of the proposed text, but I think you should
file the bugs at severity:minor, given the amount of involved packages,
and the fact that you state we might not be able to remove gtk2 in many
many years.

-- 
regards,
    Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Salsa update: no more "-guest" and more

2020-04-26 Thread Mattia Rizzolo
On Sun, Apr 26, 2020 at 10:12:41AM -0700, Sean Whitton wrote:
> On Sun 26 Apr 2020 at 02:36PM +02, Mattia Rizzolo wrote:
> > On Sun, Apr 26, 2020 at 02:07:54PM +0200, Bernd Zeimetz wrote:
> >> There are even cli tools that do the same stuff. I'd guess there is at 
> >> least one on Debian.
> > Indeed, after I first lost a phone, and a second one broke, leaving me
> > with a quite huge pain to recover my accounts, I started using
> > `oathtool` to manage the TOTP and HOTP codes, which is in Debian, and I
> > store the secret hash needed to generate the codes with `pass`.
> >
> > That said, for the only website where I need HOTP (Ubuntu SSO), I stored
> > that thing in the HOTP spot of my yubikey, and for everything else they
> > also support U2F so I likewise use my yubikey for those as well.
> 
> In such a case, though, haven't you essentially turned it back into one
> factor authentication (the single factor being your laptop)?

It's still two factor: something I know (password) and something I have
(my yubikey).

Since I sometimes I don't really know my passwords, I suppose at that
point the "something I know" instead of being the actual password is the
GPG passphrase used to decrypt the file that actually contains the
password, but it's still 2fa.
Still I wouldn't consider that to be tied to my laptop (the password
storage does live in my laptop, but it's encrypted AND duplicated
elsewhere).


-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Salsa update: no more "-guest" and more

2020-04-26 Thread Mattia Rizzolo
On Sun, Apr 26, 2020 at 02:07:54PM +0200, Bernd Zeimetz wrote:
> There are even cli tools that do the same stuff. I'd guess there is at least 
> one on Debian.

Indeed, after I first lost a phone, and a second one broke, leaving me
with a quite huge pain to recover my accounts, I started using
`oathtool` to manage the TOTP and HOTP codes, which is in Debian, and I
store the secret hash needed to generate the codes with `pass`.

That said, for the only website where I need HOTP (Ubuntu SSO), I stored
that thing in the HOTP spot of my yubikey, and for everything else they
also support U2F so I likewise use my yubikey for those as well.

> No need for a mobile phone.

mobile phones are overrated :P

-- 
regards,
        Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Third-party forks of packaged projects

2020-04-24 Thread Mattia Rizzolo
On Fri, Apr 24, 2020 at 05:28:51PM -0400, Kyle Edwards wrote:
> In that case, the depending
> project "vendors" the third-party dependency with the modifications
> that it needs.

Which is always horrible for us.
If you have any power, please don't do it.  Rather find a way to
monkey-patch whatever dependency function you are using or whatever is
possible in your case.

If the upstream maintainer of that library is not available anymore and
the project is clearly dormient, perhaps you can take over officially?
Or if that patch is "acceptable" just leave it on the bug tracker, and
within debian that patch could be applied, so that at least downstram we
can strip off that vendored library.  That's cleraly possible only if
that patch doesn't break stuff, etc.

> Obviously, "vendored" dependencies are a no-go in Debian, but how do
> situations like this get resolved?

vendored dependencies are not really a strict no-go.  cases like what
you describe are one reason to keep them vendored within a package, and
the security team tries keep a list of such vendored libraries, but
since few maintainers reports back changes in this area, that list is
not really that good (reason not to vendor libraries!!).

> I'm imagining the modified project
> could be packaged on its own the way any fork would - in that manner,
> it would not be much different from packaging MariaDB even though a
> package for MySQL already exists. Is my intuition correct here?

pacakaging that as a fork it's clearly possible, but it's much more
work, and usually doesn't make sense since that vendorerd patches
libraries likely won't be used by anything else, and would be updated
only together with the "main" software, so separating them is not really
useful.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: trends.debian.net updated

2020-04-11 Thread Mattia Rizzolo
On Sat, Apr 11, 2020 at 11:10:48AM +0200, Wouter Verhelst wrote:
> On Fri, Apr 03, 2020 at 10:41:55PM +0200, Lucas Nussbaum wrote:
> > https://trends.debian.net/ was just updated (with data until April 1st).
> 
> There is a significant bump in the number of co-maintained packages
> during the buster release cycle. It is not at all clear to me what
> happened there.
> 
> Do you have any idea?

My assumption is that the deprecation of alioth lead many "team" formed
by 1 or 2 people to be replaced by simply comaintained packages.
That, together with the the @packages.d.o maintainer address, I reckon
those might also be considered "comaintained" instead of "team
maintained".

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Announcing Debian Social

2020-03-22 Thread Mattia Rizzolo
On Thu, Mar 19, 2020 at 11:59:48PM +0100, Rhonda D'Vine wrote:
> Long-term, we plan to authenticate these services against the salsa.debian.org
> service. Some services are part of the way there, others may take some more
> time and collaboration with upstream.

I want to highlight this bit.
In the past formorer said no to this, as he doesn't want salsa to end up
like alioth and be used for too many things.  In particular, he said he
wouldn't want anybody to rely on salsa as a user database.  sso.d.o. is
the thing that should be used instead (but it's still lacking a proper
guest account backend).

That said, recently somebody else also rised this issue in #alioth, and
it turns out that the salsa admins team is not really on the same page
on this.

-- 
regards,
        Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Standardized way of extracting additional build-time artefacts (was: Re: RFC: Standardizing source package artifacts build paths)

2020-03-11 Thread Mattia Rizzolo
(note, this is a barely structured brain dump)

On Tue, Mar 10, 2020 at 08:10:55AM +0100, Niels Thykier wrote:
> >> Though, can you elaborate a bit on why the above approach would be
> >> better than a standard ENV variable a la AUTOPKGTEST_ARTIFACTS and some
> >> easy way to declare additional artifacts to be extracted?
> > 
> > Mainly, I'd prefer something declarative with glob patterns (a bit like
> > debian/clean or Gitlab-CI's artifacts:paths) rather than having to write
> > logic like these pseudo-patches:

Same.
Having such directory be hidden inside
/build/foo-1.2.3/debian/.build/artefacts/ is kind of a mouthful, but if
that gets to be standardized I think it would be awesome (builders
(sbuild, pbuilder, …) decide on the first '/build/foo-1.2.3/' part of
the path and they know of it; package building happens with CWD in that
place, so build tools should just try to stick to relative paths
'./debian/.build/artefacts/'; everything should Just Work that way).

One thing that strikes me of this proposal, is that you were trying to
"hide" that .build directory from the maintainer; doing this would be
going against that design decision.  This is the only "concern" I have
with the proposal.  Probably this can be avoided by providing a dh_
helper.

> Ack, I get the part of having a declarative mechanism for selecting files.

And then builder could just take out the whole directory.  If that gets
to be (g|x|)zipped or not would be an implementation detail of the
builders (sbuild, pbuilder, …) and of whatever frontend (launchpad,
buildd + wanna-build, …) is used.

> Just to clarify something related.  Should debhelper and other tools by
> default archive "certain files of possible interest" (e.g. config.log)?
> Or should we limit it to "on request only"?

That would be some nice automatism indeed, but I think it's something
for "later".  If you do, please consider these bits:
 * naming the files: you risk clashing with maintainer-set file names
 * deciding on whether to put those files there only on failure or all
   the time

> The former makes it simpler for people that are interested in the
> "default" parts but also bloats the archive for people that are
> interested in just one file.

"bloating" is indeed important.  If we start doing this, frontends need
to decide on a retaining policy.  Do we want maintainers to have a say
on this?  Like, adding a metadata file to the artifacts to indicate any
interest on those files (this is a successful build: keep for x
days/keep until next successful build + y days, etc etc).

> > I don't have any particular opinion on whether artifacts should be
> > collected into debian/.build/artifacts/, into $DPKG_ARTIFACTS/, or
> > directly into some sort of archive (Gitlab and Jenkins seem to use zip
> > files, which have the advantage of being seekable, so web frontends
> > can presumably read individual logs directly out of the zip file if
> > that's desirable).
> 
> Thanks for clarifying.  This answered the question I was trying to write. :)


I think I took care of those thoughts above, but to reiterate:
 * IMHO ./debian/.build/artefacts/ (or artifacts? :P) is a cool and
   accessible place for all interested software
 * perhaps, you could consider using
   ${DPKG_ARTEFACTS:-$PWD/debian/.build/artefacts} so that some builders
   can override the directory if they find it more convenient for some
   reason, but otherwise I'd rather stick to a stable, non-changable
   path.
 * I think eventual tarball/compression should be left as a matter for
   the build driver (sbuild, pbuilder, …).

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Standardized way of extracting additional build-time artefacts (was: Re: RFC: Standardizing source package artifacts build paths)

2020-03-11 Thread Mattia Rizzolo
On Tue, Mar 10, 2020 at 09:07:57AM +, Simon McVittie wrote:
> On Tue, 10 Mar 2020 at 07:19:59 +, Paul Wise wrote:
> > On Tue, Mar 10, 2020 at 7:12 AM Niels Thykier wrote:
> > > Standardized way of extracting additional build-time artefacts
> > 
> > This reminds me of the BYHAND stuff, I forget how that works though.
[…]
> Similarly, we probably don't want to publish the build products to users
> if the build(-time tests) failed (because we can't be confident that any
> products that were already produced are good), although we might well
> want to make them available through a contributor-oriented interface to
> help to debug the failures; but we do want to publish build and test logs
> to contributors, regardless of success or failure.

And this highlights one important aspect of such interface: such
artifacts would be collected even after a build failure.
That's not possible at all now.

> The .buildinfo file is arguably already in the same category as build
> and test logs. We currently capture it in the .changes file and upload
> it to ftp-master, but it isn't reproducible, and ftp-master doesn't
> republish it through our user-facing interface (the archive). Ideally,
> failed builds would capture their .buildinfo as well as their log for
> subsequent analysis, although I don't know whether they actually do.

That's somewhat of a tough argument, that I'd try to keep separate (it
has to do with the semantic meaning of a .buildinfo (i.e., it tries to
attach a *built artifacts* to the way it was build, a .buildinfo without
any hashes would be quite meaningless when tied to its original meaning.
Also, we do want it to be published, but we are still waiting for the
ftp-masters to tell us their distribution requirements...).

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Salsa "Emails on push" send only mails for tags

2020-02-24 Thread Mattia Rizzolo
Fyi:

https://salsa.debian.org/salsa/support/issues/195

On Mon, 24 Feb 2020, 4:05 pm Andreas Tille,  wrote:

> Hi,
>
> (hopefully) all repositories of the Debian Med team have set
>Emails on push
> trigger in the integration settings.  It is configured for both
>
>
> Triggers
>Push
>   Event will be triggered by a push to the repository)
>Tag push
>   Event will be triggered when a new tag is pushed to the repository
>
>
> This worked since we moved to Salsa but since some weeks only
> "Tag push" is triggering any mails.  Did I missed something
> that the behavious on push events had changed or is this a bug
> on Salsa which I should report?
>
> Kind regards
>
>   Andreas.
>
> --
> http://fam-tille.de
>
>


Re: Bug email to Maintainer, not Uploader?

2020-02-22 Thread Mattia Rizzolo
On Sat, Feb 22, 2020 at 12:35:14PM -0600, Steven Robbins wrote:
> 1. Subscribe to the Maintainer ML would produce an enormous amount of spam.  
> The maintainer is Debian-Science, which is listed in 790 packages, of which I 
> care about maybe 10.

You could do that coupled with some mail filtering locally, checking for
X-Debian-Package: foobar
X-Debian-PR-Package: foobar

but you'd still need to maintain that thing.

> I would prefer, instead, to suggest a mechanism to email uploaders.  Would 
> that be best suggested to the bts software or the pts software?

the bts is really "dumb" in this regards.  For sure it's not saving the
content of the Uploader fields anywhere.

IMHO, if anything, this would need to be a pts extension of sorts.  Or
you could script that: the pts also has a mail interface to handle
package subscription: you can do something that automatically send the
proper control mails whenever you start/stop co-maintaining a package.


Honestly though, I don't think going and clicking "subscribe" in a "few
dozens" package pages is too much.

On that note: remember that you should also remember to subscribe to the
salsa repositories to receive MR notifications... (this is a totally
unsolved problem still).  Fortunately Myon extended the DDPO to show
pending MRs...

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Bug email to Maintainer, not Uploader?

2020-02-22 Thread Mattia Rizzolo
On Sat, Feb 22, 2020 at 10:15:28AM -0600, Steven Robbins wrote:
> Most of my packages are team-maintained, so my email appears only 
> as the Uploader, not the Maintainer.   I am beginning to suspect this is the 
> cause of missing emails.  Is it?

Yes, nothing mails Uploaders.

> Is there a global method to inform bts to 
> send me email even when only an uploader?

Either you subscribe to the ML that is used as Maintainer, or you
subscribed through the PTS.

-- 
regards,
        Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Appstream + Gnome

2020-01-01 Thread Mattia Rizzolo
On Wed, Jan 01, 2020 at 01:17:34PM +0100, Jeff wrote:
> One of my packages is an application and ships a .desktop file and
> appstream xml. The tracker.debian.org page for the package complained
> that the ID for package didn't follow the {tld}.{vendor}.{product}
> scheme[1], so I modified so that it did.
> 
> Now I have a report from a Gnome 3 user that since the above change, it
> is no longer possible to add the application as a "favorite".
> 
> It seems that adding an application is only possible in Gnome 3 if the
> ID is exactly the same as the executable name.
> 
> Given there seem to be plenty of gnome-* applications that use the
> {tld}.{vendor}.{product} scheme, I seem to be missing something.

I was likewise hit by a similar issue.  It seems to be a Wayland bug,
rather than a Gnome bug though.
Also, none of the Gnome application are affected due to their heavy use
of Glib stuff that do enough magic to keep everythign working.

See https://bugs.debian.org/942600
https://gitlab.com/inkscape/inkscape/issues/539

If anybody could also help with my bug above, that would be awesome.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: https://tracker.debian.org/pkg/dballe

2019-12-30 Thread Mattia Rizzolo
On Mon, Dec 30, 2019 at 11:29:52AM +0100, Kurt Roeckx wrote:
> Note that the name of the .changes file by the maintainer and the
> buildd will be the same, and dak will reject it if that .changes
> file already exists.

That's true only in case of policy queues nowadays.

-- 
regards,
        Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: requirements and regulations concerning upgrade checks/statistics callback on program start

2019-12-26 Thread Mattia Rizzolo
On Thu, Dec 26, 2019 at 11:26:26AM +0100, Tomas Pospisek wrote:
> > are there any requirements or restriction what a program packaged in
> > Debian is allowed to do when starting up? Calibre is normally doing the
> > following checks:
> > - check for updates of itself
> > - check for updates of plugins
> > - send UID, OS, program version, and the icon theme selected in the
> >   program to the statistic site [1]
> > 
> > Which of the above actions are acceptable for Debian/main?
> > 
> > [1] https://calibre-ebook.com/dynamic/calibre-usage
> 
> The last point seems inacceptable to me if the user hasn't explicitly
> consented to it. Checking for updates might be annoying but is "OK" to me.

Considering this is debian, I'd probably say that none of those are
acceptable without a proper consent for the user.  Opt-in flags in the
preference windows about "automatically checks for (plugins|program)
updates at startup" would do it….

Silently sending out details like UID, OS, etc is a no-go in my mind
though.

See also the history of chromium that had to patch away similar
features.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: epoch bump request for protracker

2019-12-23 Thread Mattia Rizzolo
On Mon, Dec 23, 2019 at 09:41:57AM +0100, Andreas Henriksson wrote:
> Upstream renaming is a very rare (and AFAIK *only*) chance for you to
> actually get rid of epochs cleanly! I'd very much suggest you take this
> chance!
> 
> Basically what you do is rename everything and use the new version
> number, then you add transitional packages and for those you override
> version number generation in debian/rules and add an epoch *only* to the
> transitional packages.

I agree, please take the occasion of this rename and get rid of the
epoch!

However I have to be in disaccord with this example:

> override_dh_gencontrol:
>   dh_gencontrol -pmy-transitional-package -- -v1:$(DEB_VERSION)
>   dh_gencontrol --remaining-packages

I'd avoid using -v1:$(DEB_VERSION) and instead do something like
-v2.b37+really$(DEB_VERSION), so just to aovid an epoch also there.  You
may also build those transitional packages from the old source, and then
ask for RM once the +really version went into a stable release.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Python 2 removal in sid/bullseye: Progress and next steps

2019-11-11 Thread Mattia Rizzolo

Hi, I'm going to answer, even if I'm not Ondrej :)

On Tue, Nov 12, 2019 at 12:10:32AM +0900, Norbert Preining wrote:
> On Mon, 11 Nov 2019, Ondřej Nový wrote:
> > We are going to raise the severity of the py2removal bugs to "serious"
> > in several steps.  In the
> ...
> 
> Could you please give a time line of how you are planning to proceed?
> The next Debian release is still about 1.5 years away (extrapolating
> from the last N releases), so I don't see any extreme urgency to purge
> Debian from Py2 packages *now* at a time when it is even still
> supported?
> 
> Do you have any timeline? Plans beside "...we are going to raise
> ...remove..."?
> 
> I would strongly suggest to wait till january at least to start this process,
> upstream authors might wait till the last moment ...

I don't know about which particular timeline they were thinking about,
but I honestly hope they start already.
Sure, we are already at nearly half of the process, but now start the
much more complex cases.  Starting from leaf packages right now only
makes sense, it will take weeks to just start crawling the tree anyway.

> > We will also then file bug reports against ftp.debian.org to remove
> > such packages from unstable.  We are going to do this semi-
> 
> I think requesting the removal of packages that you are **not**
> maintaining is - to be polite - a bit unconventional (at least).
> This remains at the discretion of the maintainer as far as I remember.

That's not true.  RoQA have been used for years, and from what I could
see of the flow of RM bugs related to python2, quite a bit were already
done like that.
It might be unpolite at times, sure, but that's not really an excuse.

Anyway, if you properly maintain your packages, and you maintain
non-leaf packages you need not worry; if you maintain leaf packages, at
least share in the py2removal bugs your plans.  That ought to stop
people from removing your packages, even if it won't stop them to raise
the severity to RC when the time comes.

> > All dependency fields in debian/control and debian/tests/control must
> > also be updated to stop using the unversioned python 
> 
> Are all you "must" statements "policy decisions"? Or your personal wish
> list items?

They are "policy decisions" as in, "python policy" (even the package is
not yet updated).  Dependencies are already being automatically changed
by dh-python.  If there is one thing sure for bullseye, the
/usr/bin/python symlink won't be shipped.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: archive test rebuilds and reports for bullseye?

2019-11-08 Thread Mattia Rizzolo
On Fri, Nov 08, 2019 at 06:37:29PM +0100, Lucas Nussbaum wrote:
> UDD uses
> https://tests.reproducible-builds.org/debian/reproducible-tracker.json,
> but that only includes results for suite='bullseye'. Is that expected?

Yes, it's expected.  reproducible-tracker.json has only the data that is
supposed to be "useful" for maintainers without being distracting.  For
example, it also doesn't show blacklisted packages, or in other weird
states.
If you want all the data, that would be in reproducible.json with a
slight different structure; however in the past many times we received
complaints about unnecessary noise, so if you change I at least urge you
to limit what's displayed in DMD.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: dput problem: Ancient sha256sum?

2019-08-29 Thread Mattia Rizzolo
That said, the fact that your .orig.tar.gz changed is an indicator that you
are doing something fishy and you should double check your workflow.  You
should not be able to accidentally end up with a different .orig.tar.gz.

On Thu, 29 Aug 2019, 3:18 pm Peter Pentchev,  wrote:

> On Thu, Aug 29, 2019 at 03:49:57AM +0100, Ben Hutchings wrote:
> > On Thu, 2019-08-29 at 00:33 +0200, dettus wrote:
> > > So, I am trying to make a package out of my awesome project dMagnetic.
> > > I applied some patches, but unfortunately, now I am getting some
> errors.
> > > After each attempt to dput something, I get the following Email:
> > >
> > >
> > > What happened here? How can I fix it?
> >
> > I would guess that you previously uploaded dmagnetic version 0.17-1 and
> > now you are uploading (say) 0.17-2, with a repacked orig tarball.
> >
> > Since the upstream version is the same, the archive will use the same
> > orig tarball for them - you cannot replace it.  So, you need to build
> > your source package using the same orig tarball as before.
> >
> > Ben
>
> ...or, since this is mentors.d.n, you (dettus) could try to log into
> your account there, go to "Your packages", find the upload there and
> remove it. After that, try the dput again.
>
> Actually, no, don't do that. Since dmagnetic is a package that is not in
> Debian yet, the first version to be uploaded must have a -1 revision;
> rebuild your package as 0.17-1 and try to upload it again.  Then
> mentors.d.n will recognize that you are trying to upload a new version
> of the same package and (unlike the actual Debian archive) will allow
> you to replace the original upstream tarball.
>
> G'luck,
> Peter
>
> > > Hello,
> > >
> > > Unfortunately your package "dmagnetic" was rejected because of the
> > > following
> > > reason:
> > >
> > > dmagnetic dsc reference dmagnetic_0.17.orig.tar.gz, but the file
> differs:
> > > in dsc:
> 82c115920b5570e1e33c613b008736086db210bc8f9b2c2e75f970e9696d8ec5
> > > found: 64ca6eeb1d646e9992b134b4c89c7b0da5d2f9e141d03ffe29ff76729c4a4975
> > >
> > > Please, rebuild your package against the correct file.
> > >
> > > Please try to fix it and re-upload. Thanks,
> > >
> > > -- mentors.debian.net
> > > (The sha256sum in the .dsc file is correct, btw.)
>
> --
> Peter Pentchev  roam@{ringlet.net,debian.org,FreeBSD.org} p...@storpool.com
> PGP key:http://people.FreeBSD.org/~roam/roam.key.asc
> Key fingerprint 2EE7 A7A5 17FC 124C F115  C354 651E EFB0 2527 DF13
>


Re: Bits from the Release Team: ride like the wind, Bullseye!

2019-08-18 Thread Mattia Rizzolo
On Sun, Aug 18, 2019 at 08:54:21AM +0100, Ian Jackson wrote:
> > On 19/08/08 09:46, Paul Gevers wrote:
> > > I think we should also try to improve the visibility towards reverse
> > > dependencies that their autopkgtest is blocking other packages. I would
> > > love tracker (and the old pts) to show this on their page. (Working on
> > > such a patch is on my TODO list, except not at the top).
> 
> I already made grep-excuses print this information.  It has been very
> helpful to me.  Maybe we should make --autopkgtests the default ?

I think no: --autopkgtests requires quite a bit more computation and
connecting to udd and whatnot, I don't think that should be the default.
Especially because udd-mirror is starting to be under-dimensioned so
it's sometimes quite slow to serve responses (like in the times when its
importing a new dump).

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: package uploads not being processed

2019-07-20 Thread Mattia Rizzolo
On Sat, Jul 20, 2019 at 03:47:43PM +0530, Ritesh Raj Sarraf wrote:
> I made a couple of uploads in the last couple of weeks.
> I did get email confirmation for my uploads but that is it. None of my
> package uploads have been processed.

That's the obvious sign that your GPG key is not working anymore.

> thunarx-python_0.5.1-1_amd64.changes uploaded successfully to localhost
> mergerfs_2.28.1-1_source.changes uploaded successfully to localhost

20190720123419|process-upload|dak|thunarx-python_0.5.1-1_amd64.changes|Error 
while loading changes: No valid signature found. (GPG exited with status code 0)
20190720123419|process-upload|dak|mergerfs_2.28.1-1_source.changes|Error while 
loading changes: No valid signature found. (GPG exited with status code 0)

I.e. both your uploads are stuck in a loop, waiting for that signature
to validate.

Your GPG key is expired, so the way to go is:
 1. update your key expiry (and whatever subkey you might have used to
sign those files)
 2. upload the updated key to keyring.debian.org's hkp endpoint
 3. wait a few days for the keyring team to pick up the change and
publish it
 4. your uploads get accepted

Note that point 3 is going to happen in 3-5 days if everything goes as
planned, so you should hurry, or wait for the next keyring update at the
end of August!

And please add a note to your calendar to update the key expiry in the
next years.

-- 
regards,
        Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Debhelper compat levels

2019-05-22 Thread Mattia Rizzolo
On Wed, May 22, 2019 at 04:53:57PM +0200, Marc Haber wrote:
> >> So in order to do the backport, I first had to get debhelper 11 (or 12).
> >
> >You make it sound so hard, but in my own experience it really isn't.
> 
> I totally feel with Simon, especially in the later part of a stable
> release backporting becomes a pain in the butt because so many
> toolchain packages don't backport nicely.

I agree that some packages (and, sometimes, whole chain of packages)
can be hard to backport due to debhelper compat changes, but really,
this is not the case of debhelper itself here (which is the topic of the
discussion).

And if a given packages is giving derivatives or 3rd parties troubles in
backporting, that should be brought up with that single package's
maintainer, gently asking to revert back to a previous compat level or
something to ease the situation.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Debhelper compat levels

2019-05-22 Thread Mattia Rizzolo
On Wed, May 22, 2019 at 02:06:03PM +0200, Simon Richter wrote:
> So in order to do the backport, I first had to get debhelper 11 (or 12).

You make it sound so hard, but in my own experience it really isn't.

> The debhelper 12 package itself has a compat level of 12, which means I
> couldn't compile it without the package itself being installed. Downgrading
> the compat level to 10 and relaxing the build dependencies seems to have
> worked, so I had a debhelper 12 package.

That's not true.  debhelper doesn't require debhelper to build itself,
because it uses it runs itself instead of the system installed version.
You can easily note this in d/rules:

%:
./run dh $@

> This package then depends on dh-autoreconf, which in turn requires
> debhelper 11 to build, so I had to again downgrade a compat level and build
> dependencies to build.

1) you can drop the dh-autoreconf dependency in a private backport, it's
   not really needed if you don't use it
2) you can just build dh-autoreconf right after building debhelper, and
   you're done

debhelper's d/control has a bunch of comments in its Dependencies: and
Breaks: field, instructing people on the possible changes that can be
done if the dependencies listed there are too strict for one's use case.
Really dh-autoreconf is hardly the most annoying one.

>  - Should unstable/testing refrain from using any debhelper compat level
>that isn't supported in stable?

No, thank you.

>  - Should debhelper itself and its dependencies use a debhelper compat
>level that is supported in stable?

This doesn't really make sense, because debhelper doesn't use anything
other than dpkg-perl (and *this* is the only contraint that we need to
be afraid of, and it should stay at most at the version in the current
stable) and perl to build.  The dependencies can just be built after
debhelper.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Do we want to Require or Recommend DH

2019-05-13 Thread Mattia Rizzolo
On Mon, 13 May 2019, 4:43 pm Thibaut Paumard,  wrote:

> However converting a package with a more convoluted rules files
> will take humanpower. While it may be justified to convert a mildly
> complex rules file on a package that has some activity, I don't think I
> would invest those resources to convert a package that's been working
> for years without anyone touching it's rules files.
>

In the past I took the approach that nearly anything that required me to
tweak it's build system more than flipping configure switches meant that
the upstream build system needed _something_ to be more clever and do what
I wanted by itself.  That lead me to write patches that were then gladly
accepted and therefore further simplified the rules file even more.

So I would tend to treat this change as any other (e.g. the quilt
> format): on a best effort basis, whenever you have to touch a rules
> file, consider switching


I did just that on several NMUs that I did: I needed to mildly touch the
rules file, it proved easier to just rewrite it using dh :>

>
>


Re: Golang >= 1.12 in Buster?

2019-04-14 Thread Mattia Rizzolo
On Sun, Apr 14, 2019 at 12:00:18PM +0100, Toni Mueller wrote:
> I strongly think that this decision very wrong and should be reversed.
> If the RT absolutely insist on cutting down the number of Go versions, I
> am not opposed to see eg. golang-1.11 go, however, as I don't see a
> compelling case for having it. But others may disagree. In this way, I
> fully agree with Eric on this matter.

You shouldn't really complain to the release team, but rather to the
golang maintainers, that couldn't manage to move everything off golang
1.11 in time.
If that really was a issue.

It is not any different from how, e.g. the versions of boost, or llvm
are cut down every so often.

-- 
regards,
    Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: pbuilder: create: how to set specific UID for some system user (e.g., _apt)

2019-04-13 Thread Mattia Rizzolo
On Sat, Apr 13, 2019 at 11:29:47AM +0400, Jerome BENOIT wrote:
> on my box I put special access for _apt. Now I would like to create some 
> pbuilder ball.
> But the creation process is getting stick because _apt is set with an 
> arbitrary UID.
> What is the best way, if we can, to set this arbitrary UID for _apt to the 
> one used in my firewall ?

These are the options in my mind:

 * set APT::Sandbox::User to "root", and give up on sandboxing
 * add a hook to create a system user with the uid that you like, and
   set APT::Sandbox::User to that special user
 * add a hook to change the uid of the _apt user to the uid you want

In pbuilder, hooks G are the ones that should be used for this job, to
tweak the chroot right after debootstrap during its creation.  For the
first case, you can just inject that option through APTGETOPT (in the
other cases, it's probably a good idea to add a file in the chroot's
/etc/apt/apt.conf.d/; see also APTCONFDIR).

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-



Re: Bug#925288: ITP: diff-so-fancy -- Good-lookin' diffs. Actually… nah… The best-lookin' diffs.

2019-03-22 Thread Mattia Rizzolo
On Fri, Mar 22, 2019 at 05:06:10PM +0200, Peter Pentchev wrote:
> On Fri, Mar 22, 2019 at 03:34:37PM +0100, Adam Borowski wrote:
> [snip]
> > Highlighting changes inside the line is a massive improvement.
> > 
> > There's an implementation of this in "git" itself already, named
> > diff-highlight.  Alas, either I'm a complete idiot, or its documentation is
> > not quite adequate -- some time ago I wasted over an hour trying to get that
> > implementation to work, without success.
> 
> [roam@straylight ~]$ cat ~/bin/hdiff
> #!/bin/sh
> 
> : "${DIFF_HIGHLIGHT:=/usr/share/doc/git/contrib/diff-highlight}"
> 
> exec perl -I "$DIFF_HIGHLIGHT" -MDiffHighlight -- 
> "$DIFF_HIGHLIGHT/diff-highlight.perl" | exec less -r

Either this, or abuse your local sudo to run `make`, or convince the git
maintainer to apply the patch at https://bugs.debian.org/868871


(btw, I recommend less -R instead of -r)

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: French? (Re: Work-needing packages report for Mar 22, 2019)

2019-03-22 Thread Mattia Rizzolo
On Fri, Mar 22, 2019 at 11:59:08AM +0100, W. Martin Borgert wrote:
> On 2019-03-22 00:26, w...@debian.org wrote:
> >bootp (#924999), orphaned 2 days ago
> >  Description: serveur pour le protocole bootp avec gestion de DHCP
> ...
> >bsd-finger (#925001), orphaned 2 days ago
> >  Description: Programme de recherche de renseignements sur les
> >utilisateurs
> ...
> 
> Has WNPP report always been in French? :-)

Pierre-Elliot ran the orphaning script on his machine that has
LANG=fr_FR.  Apparently that was enough to affect `apt-cache`'s output,
but he didn't notice till too late :>

He promised to improve the script for the next time :P

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Removal of Wheezy and Jessie (except LTS) from mirrors

2019-03-21 Thread Mattia Rizzolo
On Thu, Mar 21, 2019 at 08:56:58AM +0100, Joerg Jaspert wrote:
> On 15347 March 1977, Thorsten Glaser wrote:
> 
> > deb http://archive.debian.org/debian wheezy main
> > deb http://archive.debian.org/debian-security wheezy/updates main
> > deb http://archive.debian.org/debian wheezy-updates main
> > deb http://archive.debian.org/debian wheezy-backports main
> > … out of which the second and third line don’t work.
> 
> > Looking manually, http://archive.debian.org/debian-security/dists/
> > misses anything past lenny, http://archive.debian.org/debian/dists/
> > similarily does not have any updates.
> 
> > Were the wheezy/updates and wheezy-updates merged into just wheezy
> > as last step before archiving, so that those two lines can just be
> > dropped?
> 
> Yes, it is common that the last point release, just at end of life time,
> takes in what was in those suites at that time.

Except that now, LTS keeps uploading to -security and there won't be a
subsequent point release pulling all of -security into the main suite,
so -security needs to be archived there as well.
(I don't remember if this was the state also with wheezy, it was with
jessie at least).

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: ITP: fossology -- FOSSology is an open source license compliance software system and toolkit.

2019-03-16 Thread Mattia Rizzolo
On Sat, Mar 16, 2019 at 05:00:30PM +, Adam D. Barratt wrote:
> On Sat, 2019-03-16 at 08:16 -0700, Sean Whitton wrote:
> > Hello,
> > 
> > On Sat 16 Mar 2019 at 10:17AM +08, Paul Wise wrote:
> > 
> > > On Sat, Mar 16, 2019 at 6:06 AM Guillem Jover wrote:
> > > 
> > > > $ deb-why-removed fossology
> > > 
> > > I think this script would be a good addition to devscripts, could
> > > you
> > > file a bug about that?
> > 
> > Very much seconded.  Could you at least share a copy in this thread,
> > please, Guillem?
> 
> That would be https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644575

And not only this, but it's also in the form of an open MR (that I
declied for buster, alas).
https://salsa.debian.org/debian/devscripts/merge_requests/107

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Remainings of old versions of packages in UDD / tracker

2019-01-22 Thread Mattia Rizzolo
On Tue, Jan 22, 2019 at 11:04:16AM +0100, Andreas Tille wrote:
> > You have a cruft libmuparser-doc (that interestingly is not listed in
> > the cruft-report…).
> 
> Should I file a separate bug report or will you deal with this?

Filed the one for libmuparser-doc myself.

BTW, the changelog of the first version without that -doc package did
not mention dropping the binary.  That's bad, please mention such
changes in the changelog.

> BTW, if we are talking about this I found two other packages:
> 
> $ rmadison -S -s unstable libmuscle
> 
> $ rmadison -S -s unstable libmems
> 
> Please let me know whether I should file separate bug reports about
> deleting libmuscle 3.7+4565-2 and libmems 1.6.0+4725-4.

These are the same of what you have been doing all these past days, so
I'll let you handle them. :)

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Remainings of old versions of packages in UDD / tracker

2019-01-22 Thread Mattia Rizzolo
On Tue, Jan 22, 2019 at 08:48:15AM +0100, Andreas Tille wrote:
> This has settled for R packages now but I found another really strange one:
> 
> $ rmadison muparser | grep "unstable "
> muparser   | 2.2.3-6| unstable   | source
> muparser   | 2.2.6.1+dfsg-1 | unstable   | source
> 
> According to buildd[1] muparser was build on all architectures.  There is
> a remaining version 2.2.3-6 and I have no idea why (neither why rmadison
> does not list binaries).

It does?
mattia@warren ~ % rmadison -S -s unstable muparser
libmuparser-dev | 2.2.6.1+dfsg-1 | unstable   | amd64, arm64, armel, armhf, 
hurd-i386, i386, kfreebsd-amd64, kfreebsd-i386, mips, mips64el, mipsel, 
ppc64el, s390x
libmuparser-doc | 2.2.3-6| unstable   | all
libmuparser2v5  | 2.2.6.1+dfsg-1 | unstable   | amd64, arm64, armel, armhf, 
hurd-i386, i386, kfreebsd-amd64, kfreebsd-i386, mips, mips64el, mipsel, 
ppc64el, s390x
muparser| 2.2.3-6| unstable   | source
muparser| 2.2.6.1+dfsg-1 | unstable   | source


You have a cruft libmuparser-doc (that interestingly is not listed in
the cruft-report…).


For the future, also what Lucas said may be relevant in some cases,
although luckily it's a rare matter and not many developers need to
mess with (or even know about) that.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: epoch for luakit versions

2019-01-14 Thread Mattia Rizzolo
On Mon, Jan 14, 2019 at 12:51:27PM +0100, Markus Demleitner wrote:
> For the luakit package that I'm trying to get back into Debian, I'd
> like to use an epoch in the version.
> 
> Here's the story: Originally (and still reflected on
> http://luakit.org), luakit used a date-based versioning scheme.  In
> 
> Meanwhile (and that's not yet reflected on luakit.org), there are
> releases on Github (https://github.com/luakit/luakit/releases) that
> follow a major.minor scheme, and the upstream maintainer has
> confirmed they want to keep that scheme in the future.

Sounds reasonable to me, with that being the original goal of epochs.

However, please use 1: and not 2: like what upstream seems to have used…

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Remainings of old versions of packages in UDD / tracker

2019-01-10 Thread Mattia Rizzolo
Hi Andreas,

On Tue, Jan 08, 2019 at 01:30:08PM +0100, Mattia Rizzolo wrote:
> cruft versions, usually hold up due to outdated binaries.
> 
> In this case of r-bioc-deseq2, the reason is outdated binaries in
> kfreebsd-amd64 and kfreebsd-i386.
> 
> 
> using rmadison is a very quick way to notice this, as you will see the
> discrepancy in the architecture list.

I see that you started filing a lot of RM requests to remove many of
such outdated binaries.
However I need to ask whether you try to understand what was blocking
those builds.  For example, looking at one of the last bugs you opened
to remove outdated binaries of r-cran-luminescence, I see those don't
seem to build just because r-cran-sp is missing a binNMUs against a new
enough r-base, which is something simple to take care of.

-- 
regards,
        Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Remainings of old versions of packages in UDD / tracker

2019-01-08 Thread Mattia Rizzolo
On Tue, Jan 08, 2019 at 01:25:48PM +0100, Andreas Tille wrote:
> I was seeking for remaining references to anonscm in packages in UDD.
> I've found the following strange hit:
> 
> udd=> select  source, version, maintainer, vcs_browser, release from sources 
> where source = 'r-bioc-deseq2' and release = 'sid' ;
> source |version|maintainer
> | vcs_browser 
>  | release 
> ---+---+--+--+-
>  r-bioc-deseq2 | 1.16.1-1  | Debian Med Packaging Team 
>  | 
> https://anonscm.debian.org/cgit/debian-med/r-bioc-deseq2.git | sid
>  r-bioc-deseq2 | 1.22.2+dfsg-1 | Debian R Packages Maintainers 
>| 
> https://salsa.debian.org/r-pkg-team/r-bioc-deseq2| sid
> (2 Zeilen)
> 
> 
> which means the source package r-bioc-deseq2 exists twice in sid.  There
> is also an entry in tracker[1] mentioning version 1.16.1-1 which should
> have gone since a long time.  The situation is similar for:

[…]

> Any idea why old versions of these packages might remain in UDD (and
> thus probably in tracker since it is reading UDD)?

cruft versions, usually hold up due to outdated binaries.

In this case of r-bioc-deseq2, the reason is outdated binaries in
kfreebsd-amd64 and kfreebsd-i386.


using rmadison is a very quick way to notice this, as you will see the
discrepancy in the architecture list.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: DEB_BUILD_OPTIONS vs DEB_BUILD_PROFILES: What is right and what is wrong?

2019-01-06 Thread Mattia Rizzolo
On Sun, Jan 06, 2019 at 02:55:30AM +0100, Axel Beckert wrote:
> Johannes Schauer wrote:
> > > A) lintian by mixing up build tags and build profiles? (Maybe this
> > >mentioning of build profiles was overseen when fixing #889746.)
> > 
> > I assume this to be the case.
> 
> Would be happy to hear, if Mattia sees this the same way.

Yes, it's an oversight.  ISTR you have commit rights for lintian, I
think you should just commit an s/profile/option/ in that description.

> > > If I want to build something with the build-profile nocheck, do I
> > > really have to set DEB_BUILD_OPTIONS myself separately to "nocheck" in
> > > addition to "-Pnocheck"? That sounds very counterintuitive to me…
> > 
> > I fear you currently have to manually set DEB_BUILD_OPTIONS=nocheck in 
> > addition
> > to -Pnocheck. The reason is, that currently no tool sets
> > DEB_BUILD_OPTIONS=nocheck if the nocheck build profile is active. This 
> > could be
> > changed in the future but I know of no such efforts right now.
> 
> Ok, this is really not what I expected to be the case, especially
> after #889746.

The reason for referring to _OPTIONS is that that's the one defined by
policy, and what everybody has been accustomed for many years.

But josch explained quite a few things already… :)

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: UsrMerge: building issue

2018-11-13 Thread Mattia Rizzolo
On Tue, Nov 13, 2018 at 04:13:47PM +0400, Jerome BENOIT wrote:
> I am encountering a UsrMerge issue with firehol: 
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913552
> When I build on a local Sid chroot environment, all is fine.
> But, apparently, now when we build from source, the environment seems to be 
> UsrMerg-ed [1].

It is since this weekend, when an updated debootstrap landed in
stretch-backports, and was used to create the new building chroots.
If you recreate your chroot now you'll find it's usr merged as well.

> Is there a way to impose a non-usr-merg-ed environment at build time when we 
> build from source ?

No.  It's a bug in your package, please fix it.

-- 
regards,
    Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Opt-in to continue as DD/DM? (was: I resigned in 2004)

2018-11-12 Thread Mattia Rizzolo
On Mon, Nov 12, 2018 at 09:43:20PM +0200, Lars Wirzenius wrote:
> Tollef Fog Heen :
> > (I also wonder if we should just require people to opt in to their
> > DD-ship on a yearly basis instead of doing most of the WAT/MIA dance. If
> > people can't be bothered to reply to a single email saying «yup, another
> > year please» with some reasonable amount of pinging and time to reply,
> > they are effectively MIA, at least if they haven't let people know on
> > -private or similar.)
> 
> I support automatically retiring DDs and DMs that don't repond to a
> ping, or don't upload, or don't vote, or otherwise show activity.

Since last year it already kind of happens for DMs, that are removed
from the keyring.  We in the MIA team still manually process all of them
before orphaning the packages, which is the much more nasty task than
you may think, given that apparently some people want to keep being in
Maintainer of stuff despite not uploading for years and having lost the
technical ability to upload years before as well (yes, I'm not kidding).

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: I resigned in 2004

2018-11-12 Thread Mattia Rizzolo
On Fri, Nov 09, 2018 at 09:29:29PM +0100, Mattia Rizzolo wrote:
> > Leave me alone.  Your project left me long ago.  Do not contact me with
> > regard to Debian bullshit.
> 
> ACK, we will have DAM remove you instead of retire.  I suppose there is
> no harm as you don't seem interested in the "benefits" that the
> "retired" DDs have over the "removed" ones.
> I'm sorry to have bothered you more than necessary.
> 
> 
> Good bye, and thank you for your contributions you made back then!

FYI, DAM took care of his request, and a couple of hours ago DSA
processed the request locking his account.

So the story can be considered officially closed.


> ¹ https://nm.debian.org/process/539

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


  1   2   3   >