Bug#941766: RFP: sblg -- static blog utility

2019-10-04 Thread Linda Lapinlampi
Package: wnpp
Severity: wishlist

* Package name: sblg
  Version : 0.5.7
  Upstream Author : Kristaps Dzonsons 
* URL : https://kristaps.bsd.lv/sblg/
* License : ISC
  Programming Lang: C
  Description : static blog utility

It's dead simple.

> sblg is a utility for creating static blogs. It knits together
> articles with templates to generate static HTML files, Atom feeds, and
> JSON files. It's built for use with make(1). No PHP, no database: just
> a simple UNIX tool for pulling data from articles and populating
> templates.

The ever so popular `jekyll` and `hugo` packages (available in Debian)
are big, considerably even over-engineered static HTML site generators.
They use Markdown for generating documents, instead of HTML that sblg
uses.

For an argument against Markdown, see:
https://undeadly.org/cgi?action=article&sid=20170304230520

Additionally, due to Markdown's syntax limitations, static generated
blogs with `jekyll` or `hugo` might not be able to use HTML description
lists and embed images, or they do with some Markdown extensions or by
embedding HTML into the Markdown source.

sblg has been actively maintained since 2014:
https://kristaps.bsd.lv/sblg/archive.html

The lowdown utility from the same upstream author is not required for
sblg, but may compliment it to add Markdown translation support.

The upstream's BSD.lv projects include other notable projects (for BSD),
such as acme-client, openrsync and mandoc.



Bug#910999: RFP: mxisd -- Federated Matrix Identity Server

2019-04-20 Thread Linda Lapinlampi
On Sun, Oct 14, 2018 at 03:54:16PM +, Johannes Keyser wrote:
> * Package name: mxisd
>   Version : 1.2.0
>   Upstream Author : Max Dor 
> * URL : https://github.com/kamax-matrix/mxisd
> * License : AGPL-3.0
>   Programming Lang: Java
>   Description : Federated Matrix Identity Server

As of mxisd 1.3.1, mxisd depends on undertow (libundertow-java) instead
of Spring Boot. undertow is not going to be included in Buster release:
https://bugs.debian.org/903916

I also looked at the potential dependencies required.

> mxisd dependencies missing from Debian GNU/Linux:
>
> * matrix-java-sdk
> * ormlite-jdbc
> * eddsa
> * libphonenumber-java (`8.7.1`) – there is `7.1.0` available, and a
>   newer Python package for `8.9.10`
> * firebase-admin
> * sqlite-jdbc (?)
> * twilio (Java)
> * sendgrid
> * zt-exec
>
> Testing stuff missing:
>
> * wiremock
> * unboundid
> * greenmail
>
> Other stuff:
>
> * `libc3p0-java` exists, but an older verison: `0.9.1.2`. mxisd
>depends on version `0.9.5.2` it seems.
> * `libmariadb-java` is quite much (?) newer in Debian than what mxisd
>depends on.
> *  libundertow-java is `1.4.25` in Debian, mxisd depends on
>`2.0.16.Final`

I've also understood from a conversation with the upstream author he's
not very interested to spend a lot of time on mxisd after the upcoming
1.4.0 release, but focus on gridepo stuff instead. Rewriting mxisd from
undertow to some other HTTP library (e.g. Jetty) is unlikely at this
time.

Attached is the output of gradle dependencies from mxisd 1.3.1 (current
stable version).
:dependencies


Root project


apiElements - API elements for main. (n)
No dependencies

archives - Configuration for archive artifacts.
No dependencies

compile - Dependencies for source set 'main' (deprecated, use 'implementation ' 
instead).
+--- org.slf4j:slf4j-simple:1.7.25
|\--- org.slf4j:slf4j-api:1.7.25
+--- commons-io:commons-io:2.5
+--- org.yaml:snakeyaml:1.23
+--- io.kamax:matrix-java-sdk:0.0.14-8-g0e57ec6
|+--- org.slf4j:log4j-over-slf4j:1.7.25
||\--- org.slf4j:slf4j-api:1.7.25
|+--- org.apache.commons:commons-lang3:3.7
|+--- commons-io:commons-io:2.5
|+--- commons-codec:commons-codec:1.11
|+--- com.squareup.okhttp3:okhttp:3.11.0
||\--- com.squareup.okio:okio:1.14.0
|+--- com.google.code.gson:gson:2.8.0
|\--- net.i2p.crypto:eddsa:0.1.0
+--- com.j256.ormlite:ormlite-jdbc:5.0
|\--- com.j256.ormlite:ormlite-core:5.0
+--- net.i2p.crypto:eddsa:0.1.0
+--- org.apache.directory.api:api-all:1.0.0
|+--- org.slf4j:slf4j-api:1.7.25
|+--- 
org.apache.servicemix.bundles:org.apache.servicemix.bundles.xpp3:1.1.4c_7
|+--- 
org.apache.servicemix.bundles:org.apache.servicemix.bundles.dom4j:1.6.1_5
||\--- xml-apis:xml-apis:1.0.b2
|+--- xml-apis:xml-apis:1.0.b2
|+--- commons-pool:commons-pool:1.6
|+--- org.apache.mina:mina-core:2.0.16
||\--- org.slf4j:slf4j-api:1.7.21 -> 1.7.25
|+--- commons-lang:commons-lang:2.6
|+--- commons-collections:commons-collections:3.2.2
|+--- 
org.apache.servicemix.bundles:org.apache.servicemix.bundles.antlr:2.7.7_5
|\--- commons-codec:commons-codec:1.10 -> 1.11
+--- dnsjava:dnsjava:2.1.8
+--- org.apache.httpcomponents:httpclient:4.5.3
|+--- org.apache.httpcomponents:httpcore:4.4.6
|+--- commons-logging:commons-logging:1.2
|\--- commons-codec:commons-codec:1.9 -> 1.11
+--- com.googlecode.libphonenumber:libphonenumber:8.7.1
+--- javax.mail:javax.mail-api:1.6.2
+--- com.sun.mail:javax.mail:1.6.2
|\--- javax.activation:activation:1.1
+--- com.google.firebase:firebase-admin:5.3.0
|+--- com.google.api-client:google-api-client:1.22.0
||+--- com.google.oauth-client:google-oauth-client:1.22.0
|||+--- com.google.http-client:google-http-client:1.22.0
||||+--- com.google.code.findbugs:jsr305:1.3.9 -> 3.0.0
||||\--- org.apache.httpcomponents:httpclient:4.0.1 -> 4.5.3 (*)
|||\--- com.google.code.findbugs:jsr305:1.3.9 -> 3.0.0
||+--- com.google.http-client:google-http-client-jackson2:1.22.0
|||+--- com.google.http-client:google-http-client:1.22.0 (*)
|||\--- com.fasterxml.jackson.core:jackson-core:2.1.3 -> 2.8.7
||\--- com.google.guava:guava-jdk5:17.0
|+--- com.google.api-client:google-api-client-gson:1.22.0
||+--- com.google.api-client:google-api-client:1.22.0 (*)
||\--- com.google.http-client:google-http-client-gson:1.22.0
|| +--- com.google.http-client:google-http-client:1.22.0 (*)
|| \--- com.google.code.gson:gson:2.1 -> 2.8.0
|+--- com.google.http-client:google-http-client:1.22.0 (*)
|+--- org.json:json:20160810
|+--- com.google.guava:guava:20.0
|+--- com.google.cloud:google-cloud-storage:1.2.1
||+--- com.google.cloud

Bug#922155: [Pkg-matrix-maintainers] ITP: matrix-archive-keyring -- OpenPGP archive key for the Matrix.org package repository

2019-02-21 Thread Linda Lapinlampi
I believe this package is ready for Debian now. I'm looking for a
sponsor now; more details in a RFS issue to follow.

Thanks to the few people in the #debian-matrix:matrix.org room for
testing experimental pre-releases.



Bug#922155: [Pkg-matrix-maintainers] ITP: matrix-archive-keyring -- OpenPGP archive key for the Matrix.org package repository

2019-02-20 Thread Linda Lapinlampi
On Tue, Feb 19, 2019 at 12:07:19PM +0100, Andrej Shadura wrote:
> On Tue, 19 Feb 2019 at 12:03, Linda Lapinlampi  wrote:
> > I'm excited to close this ITP bug with a +debian1 release in sid /
> > experimental soon. :)
> 
> I’ll have a look soon.

No big changes expected anymore, but I'm preparing 2015.12.09+ds.1 for
experimental or sid today. I'll probably upload to mentors.debian.net
then.

+debian was a misnomer, I forgot it should've been +ds.



Bug#922155: [Pkg-matrix-maintainers] ITP: matrix-archive-keyring -- OpenPGP archive key for the Matrix.org package repository

2019-02-19 Thread Linda Lapinlampi
An update:

While I don't have a salsa.d.o account yet for hosting the source,
attached is the current state of this package UNRELEASED. Technically,
this might be ready for the experimental distribution tree right now?
I'd have to check, to make sure.

I've split the source package "matrix-archive-keyring" into two binary
packages: "matrix-archive-keyring" and "matrix-archive-config".

I'm excited to close this ITP bug with a +debian1 release in sid /
experimental soon. :)


matrix-archive-keyring_2015.12.09+debian0.15.tar.xz
Description: application/xz


Bug#922155: [Pkg-matrix-maintainers] ITP: matrix-archive-keyring -- OpenPGP archive key for the Matrix.org package repository

2019-02-15 Thread Linda Lapinlampi
A small update on this ITP:

The attached source is the current state of this package, UNRELEASED.
It's not fit for the Debian distribution just yet; but I'll allow eager
early testers to find the source from here.

+debian1 version should follow soon for sid, to be sponsored. I'll
polish it a little further and go through the Debian Policy once more to
check for any remaining issues before this.


matrix-archive-keyring_2015.12.09+debian0.10.tar.xz
Description: application/xz


Bug#922155: [Pkg-matrix-maintainers] ITP: matrix-archive-keyring -- OpenPGP archive key for the Matrix.org package repository

2019-02-13 Thread Linda Lapinlampi
On Wed, Feb 13, 2019 at 05:17:27PM +0100, Ansgar wrote:
> More important is the question if the system should /trust/ the keys.
> 
> IMHO installing a non-Debian keyring should *not* make the keys trusted
> by APT by default (i.e. with the default answer if debconf is used).

I've agreed, it's the problem I'm trying to solve with this
matrix-archive-keyring package. As said in the OP of Bug#922155 (ITP):

> I have made this package install an OpenPGP-armored keyring to
> /usr/share/keyrings (instead of /etc/apt/trusted.gpg.d);

Since they are not in Dir::Etc::trusted or Dir::Etc::trustedparts, the
system won't trust the Matrix archive keys for APT by default (unless
the sysadmin has explicitly configured otherwise). By default,
sources.list(5) entries will need to specifically have

[signed-by:/usr/share/keyrings/matrix-archive-keyring.gpg]

for APT to trust the data sources with this package.

To clarify, trust to keys in the matrix-archive-keyring package is all a
multi-step opt-in:

1. Using the keyring to manually verify packages from Matrix.org (yes)
2. Trusting the keyring for Matrix.org APT sources (default: no)
3. Trusting the keyring for any APT sources (default: hell no)

What the Internet says to do and what's currently happening in practice:

1. Using the repository key to manually verify packages from Matrix.org
2. Trusting the repository key for Matrix.org APT sources (yes, but...)
3. Trusting the repository key for any APT sources (yikes)

There is an additional low priority debconf(1) question in
matrix-archive-keyring if #3 should be true, but with sane default of
"false" and a warning about it being unnecessary in most cases.
Although it's so trivial, I'm open to removing this option altogether if
desired for lacking much real use.

The other debconf(1) question (#2) serves to answer if the user should
trust packages from the third-party repository. If you meant the
description of that question does not adequately ask if the user should
/trust/ packages from that repository (instead of just mentioning they
are supplemental packages which are not officially supported), would you
like me to change the description for the release to point out trust
more prominently? The alternative may be a seperate contrib package for
a sources.list source.

> ubuntu-keyring does that; most other keyrings sadly do not follow this.

I'd suggest to file bugs. I've found many issues in the past few days.



Bug#922155: [Pkg-matrix-maintainers] ITP: matrix-archive-keyring -- OpenPGP archive key for the Matrix.org package repository

2019-02-13 Thread Linda Lapinlampi
On Tue, Feb 12, 2019 at 09:40:30PM +0100, Jonas Smedegaard wrote:
> Quoting Jonas Smedegaard (2019-02-12 19:38:57)
> > I believe this package belongs in contrib, as its only use-case is with 
> > together with software outside of Debian main.
> 
> ...and now posting to the actual bugreport as well.

I'm not opposed to having this matrix-archive-keyring package in the
contrib area, although for comparison I should note leap-archive-keyring
has no rdepends, the keyring package is available from Debian's main
archive area and is valid for verifying package signatures from leap.se.
An example of a package from deb.leap.se is bitmask-core (which is not
available in Debian), and it's not in the contrib area in the leap.se
repository.

Maybe this is an error/bug in the leap-archive-keyring package, but it
does seem confusing. The other *-archive-keyring packages in Debian main
seem to be at least vaguely related to the Debian Project or its teams,
although they are all (with the exception of debian-archive-keyring)
meant to be used with third-party data sources (usually with APT).

As of yesterday, there is also this high-priority debconf(1) question
template in the matrix-archive-keyring package:

Template: matrix-archive-keyring/sources.list
Type: boolean
Default: false
_Description: Use APT data sources from Matrix.org?
 The Matrix.org Debian package repository distributes supplemental Matrix.org
 related packages intended to work with the Debian distribution, but require
 software software outside of the distribution to either build or function.
 These packages are digitally signed with keys from matrix-archive-keyring.
 .
 The Debian Project will be unable to directly support issues faced from using
 supplemental packages from this third-party repository. Packages from these
 APT sources may be non-conforming to the technical requirements set in the
 Debian Policy for the Debian distribution.

(Sorry if I fell under the assumption the package will be usable on
Debian only, and not derivative distributions with different names.)

Choosing "yes" here would obviously enable the contrib bits from the
default of "false". And as I said, packages from Matrix.org are already
in the contrib area (Section: contrib/*).

If this debconf(1) question makes it a hard-requirement of contrib
archive area, I could split the main parts (keyring) and the debconf(1)
question (sources.list) to seperate packages in main and contrib
sections respectively if that is more desirable.

I have currently set the package's "Section:" to "contrib/misc", in any
case.

What do you think?



Bug#922155: ITP: matrix-archive-keyring -- OpenPGP archive key for the Matrix.org package repository

2019-02-12 Thread Linda Lapinlampi
Package: wnpp
Severity: wishlist
Owner: Linda Lapinlampi 

* Package name: matrix-archive-keyring
  Version : 2015.12.09
  Upstream Author : The Matrix.org Foundation CIC 
* URL : https://matrix.org/packages/debian/repo-key.asc
* License : GPLv3+ (key: public domain)
  Programming Lang: Make, sh
  Description : OpenPGP archive key for the Matrix.org package repository

The Matrix.org Debian package repository distributes digitally signed
releases of Matrix.org related packages. This package contains the
archive key used to verify those files, required by apt(8).

matrix-archive-keyring will also attempt to harden the apt-secure(8)
infrastructure by removing known previously installed (untrusted)
Matrix.org archive key(s) from apt(8)'s global trust database, which
have often been erroneously added via apt-key(8).



Hi, so there's few packages in Debian already such as matrix-synapse.
[1] And then there's Debian packages from third-party Matrix.org and
Riot.im package repositories at upstream.

The issue: Signing keys added to /etc/apt/trusted.gpg{,.d} will be
trusted by apt(8) for every repository, including Debian's main package
repository.

I'm currently seeing a "trend" on the Internet where tutorials and
guides suggest to use "apt-key add" to install Matrix.org's package
repository archive key recklessly without any regard to apt-secure(8).
More so, Matrix.org links to one of these guides itself. [2] Riot.im
(related to the same people running Matrix.org) also suggests "apt-key
add". [3] Synapse 0.99.0's `INSTALL.md` guide suggests to download a key
and add it via apt-key(8) too, [4] while this package is also available
from Debian.

The solution: A keyring package, as suggested by apt-secure(8).

If the sysadmin wants to install from Matrix.org or Riot.im package
repositories (instead of Debian's), fine. Who am I to argue? At least I
I can make their life more convenient while hardening APT's security for
everyone, while Debian doesn't have packages available for every
upstream package yet.

I have made this package install an OpenPGP-armored keyring to
/usr/share/keyrings (instead of /etc/apt/trusted.gpg.d); I'm also using
a db_install(8) postinst script to ensure that the keys in question
don't show up in two keyrings at once.

I will be also looking to configure debconf(1) to ask if the user also
wants to install the appropriate sources.list(5) file for the Matrix.org
and/or Riot.im repository with signed-by option.

Packages similar to this one exist in Debian: ubuntu-keyring,
leap-archive-keyring, pkg-mozilla-archive-keyring, etc.

I will be looking for a sponsor. I know someone from the Matrix
Packaging Team at Debian whom I'll be asking to kindly sponsor this
package. If they refuse, I know where to ask.

Thanks for your attention.

[1]: https://wiki.debian.org/Matrix
[2]: https://matrix.org/docs/guides/installing-synapse
[3]: https://riot.im/desktop.html
[4]: https://github.com/matrix-org/synapse/blob/release-v0.99.0/INSTALL.md



Bug#921676: RFP: webext-decentraleyes -- web extension for local emulation of Content Delivery Networks

2019-02-07 Thread Linda Lapinlampi
Package: wnpp
Severity: wishlist

* Package name: webext-decentraleyes
  Version : 2.0.9
  Upstream Author : Thomas Rientjes 
* URL : https://decentraleyes.org/
* AMO : 
https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/
* VCS : https://git.synz.io/Synzvato/decentraleyes
* License : MPL-2.0 (+ MIT, BSD, etc. for bundled resources)
  Programming Lang: Javascript
  Description : web extension for local emulation of Content Delivery 
Networks

> Websites have increasingly begun to rely much more on large
> third-parties for content delivery. Canceling requests for ads or
> trackers is usually without issue, however blocking actual content, not
> unexpectedly, breaks pages. The aim of this add-on is to cut-out the
> middleman by providing lightning speed delivery of local (bundled) files
> to improve online privacy.

I've been using this web extension on Firefox for a long while,
alongside webext-ublock-origin package from Debian to improve my privacy
experience while browsing.

Potential packagers, please note: It may be desirable to integrate this
web extension with libjs-* packages (/usr/share/javascript/*), where
supported.



Bug#921673: RFP: webext-decentraleyes -- web extension for local emulation of Content Delivery Networks

2019-02-07 Thread Linda Lapinlampi
Package: wnpp
Severity: wishlist

* Package name: webext-decentraleyes
  Version : 2.0.9
  Upstream Author : Thomas Rientjes 
* URL : https://decentraleyes.org/
* AMO : 
https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/
* VCS : https://git.synz.io/Synzvato/decentraleyes
* License : MPL-2.0 (+ MIT, BSD, etc. for bundled resources)
  Programming Lang: Javascript
  Description : web extension for local emulation of Content Delivery 
Networks

> Websites have increasingly begun to rely much more on large
> third-parties for content delivery. Canceling requests for ads or
> trackers is usually without issue, however blocking actual content, not
> unexpectedly, breaks pages. The aim of this add-on is to cut-out the
> middleman by providing lightning speed delivery of local (bundled) files
> to improve online privacy.

I've been using this web extension on Firefox for a long while,
alongside webext-ublock-origin package from Debian to improve my privacy
experience while browsing.

Potential packagers, please note: It may be desirable to integrate this
web extension with libjs-* packages (/usr/share/javascript/*), where
supported.