Re: [gentoo-dev] Devaway for me, for a whole year period(military service)

2009-02-08 Thread Dale
Panagiotis Christopoulos wrote:
> Hi fellow devs and users,
>
>   As some of you may already know, I won't be around this year,
> cause I have to join the greek army, starting from tomorrow
> morning. Feel free to touch my ebuilds. I will be in contact (via mail)
> with Marijn Schouten (hkBst) in case you want to hear any news of me.
> Keep up the great work, all of you, and don't break anything, cause I
> will have very little time when I'll be back home, to update the "worlds of
> my machinery" :P 
>
> ps: I have left an open screen session running irssi, on a remote machine, so
> you will see me online, but I'll be far away, probably :(
>
>   

Well, I'm a American but military is military.  Be safe and come back in
one HEALTHY piece!!

Dale

:-) :-) 



[gentoo-dev] Automated Package Removal and Addition Tracker, for the week ending 2009-02-08 23h59 UTC

2009-02-08 Thread Robin H. Johnson
The attached list notes all of the packages that were added or removed
from the tree, for the week ending 2009-02-08 23h59 UTC.

Removals:
sys-kernel/hppa-sources 2009-02-06 03:14:44 jer
profiles/default-linux/hppa 2009-02-06 05:40:23 jer
net-p2p/azureus 2009-02-06 11:46:56 caster
sys-apps/sysutils   2009-02-08 20:08:12 vapier

Additions:
app-arch/lzip   2009-02-02 19:28:05 vapier
net-p2p/freenet 2009-02-02 21:25:58 tommy
net-mail/Freemail   2009-02-02 21:28:43 tommy
dev-libs/liblinebreak   2009-02-02 22:22:33 alexxy
app-text/fbreader   2009-02-02 22:28:07 alexxy
games-board/pokerth 2009-02-03 01:52:57 mr_bones_
net-misc/ssvnc  2009-02-03 01:57:26 vapier
kde-misc/kopete-cryptography2009-02-03 10:51:25 alexxy
kde-misc/skanlite   2009-02-03 11:08:06 alexxy
sci-libs/libticables2   2009-02-03 14:47:38 bicatali
sci-libs/libticalcs22009-02-03 14:49:43 bicatali
sci-libs/libticonv  2009-02-03 14:51:03 bicatali
sci-libs/libtifiles22009-02-03 14:52:53 bicatali
sci-calculators/tiemu   2009-02-03 15:49:54 bicatali
sci-calculators/tilp2   2009-02-03 15:52:59 bicatali
dev-python/aquarium 2009-02-03 19:19:09 patrick
dev-python/html5lib 2009-02-03 19:45:28 patrick
dev-python/pycipher 2009-02-03 19:55:22 patrick
dev-python/librharris   2009-02-03 20:07:22 patrick
dev-python/pyconstruct  2009-02-03 21:05:58 patrick
dev-python/arrayterator 2009-02-03 21:22:50 patrick
dev-python/pysvg2009-02-03 22:06:12 patrick
dev-libs/distorm64  2009-02-03 23:12:38 patrick
dev-python/python-ptrace2009-02-03 23:15:34 patrick
dev-java/jettison   2009-02-05 00:22:59 betelgeuse
java-virtuals/jaxp-virtual  2009-02-05 00:34:14 betelgeuse
sys-cluster/osc-mpiexec 2009-02-05 02:59:51 jsbronder
dev-perl/DateTime-Format-HTTP   2009-02-05 14:02:47 tove
net-p2p/fms 2009-02-05 18:36:43 tommy
app-admin/smolt 2009-02-05 21:24:36 bangert
net-p2p/vuze-coreplugins2009-02-06 11:46:18 caster
net-p2p/vuze2009-02-06 11:46:35 caster
app-misc/pysmssend  2009-02-06 12:01:49 hwoarang
sci-biology/snpfile 2009-02-07 18:16:12 weaver
sci-biology/blossoc 2009-02-07 18:16:42 weaver
app-arch/xz-utils   2009-02-07 20:32:22 vapier

--
Robin Hugh Johnson
Gentoo Linux Developer
E-Mail : robb...@gentoo.org
GnuPG FP   : 11AC BA4F 4778 E3F6 E4ED  F38E B27B 944E 3488 4E85
Removed Packages:
sys-kernel/hppa-sources,removed,jer,2009-02-06 03:14:44
profiles/default-linux/hppa,removed,jer,2009-02-06 05:40:23
net-p2p/azureus,removed,caster,2009-02-06 11:46:56
sys-apps/sysutils,removed,vapier,2009-02-08 20:08:12
Added Packages:
app-arch/lzip,added,vapier,2009-02-02 19:28:05
net-p2p/freenet,added,tommy,2009-02-02 21:25:58
net-mail/Freemail,added,tommy,2009-02-02 21:28:43
dev-libs/liblinebreak,added,alexxy,2009-02-02 22:22:33
app-text/fbreader,added,alexxy,2009-02-02 22:28:07
games-board/pokerth,added,mr_bones_,2009-02-03 01:52:57
net-misc/ssvnc,added,vapier,2009-02-03 01:57:26
kde-misc/kopete-cryptography,added,alexxy,2009-02-03 10:51:25
kde-misc/skanlite,added,alexxy,2009-02-03 11:08:06
sci-libs/libticables2,added,bicatali,2009-02-03 14:47:38
sci-libs/libticalcs2,added,bicatali,2009-02-03 14:49:43
sci-libs/libticonv,added,bicatali,2009-02-03 14:51:03
sci-libs/libtifiles2,added,bicatali,2009-02-03 14:52:53
sci-calculators/tiemu,added,bicatali,2009-02-03 15:49:54
sci-calculators/tilp2,added,bicatali,2009-02-03 15:52:59
dev-python/aquarium,added,patrick,2009-02-03 19:19:09
dev-python/html5lib,added,patrick,2009-02-03 19:45:28
dev-python/pycipher,added,patrick,2009-02-03 19:55:22
dev-python/librharris,added,patrick,2009-02-03 20:07:22
dev-python/pyconstruct,added,patrick,2009-02-03 21:05:58
dev-python/arrayterator,added,patrick,2009-02-03 21:22:50
dev-python/pysvg,added,patrick,2009-02-03 22:06:12
dev-libs/distorm64,added,patrick,2009-02-03 23:12:38
dev-python/python-ptrace,added,patrick,2009-02-03 23:15:34
dev-java/jettison,added,betelgeuse,2009-02-05 00:22:59
java-virtuals/jaxp-virtual,added,betelgeuse,2009-02-05 00:34:14
sys-cluster/osc-mpiexec,added,jsbronder,2009-02-05 02:59:51
dev-perl/DateTime-Format-HTTP,added,tove,2009-02-05 14:02:47
net-p2p/fms,added,tommy,2009-02-05 18:36:43
app-admin/smolt,added,bangert,2009-02-05 21:24:36
net-p2p/vuze-coreplugins,added,caster,2009-02-06 11:46:18
net-p2p/vuze,added,caster,2009-02-06 11:46:35
app-misc/pysmssend,added,hwoarang,2009-02-06 12:01:49
sci-biology/snpfile,added,weaver,2009-02-07 18:16:12
sci-biology/blossoc,added,weaver,2009-02-07 18:16:42
app-ar

Re: [gentoo-dev] [RFC] DIGESTS metadata variable for cache validation

2009-02-08 Thread Zac Medico
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Ciaran McCreesh wrote:
> On Sun, 08 Feb 2009 15:27:54 -0800
> Zac Medico  wrote:
>>> Which is offset and more by the massive inconvenience of having to
>>> keep track of and store junk under version control.
>> I think you're making it out to be worse than it really is. Like I
>> said, I think we have a justifiable exception to the rule.
> 
> If you start encouraging this approach, are you prepared to make
> Portage warn extremely noisily if a repository-provided (as opposed to
> user generated) cache entry is found to be stale?

Sure. Otherwise, it's confusing for the user when dependency
calculations take longer than usual for no apparent reason.
- --
Thanks,
Zac
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkmPbV8ACgkQ/ejvha5XGaN24ACg9LFy8dag9/riCwODjknQV/Ic
0koAn00PP5WJBo5UwMR6iATwfFOipTi6
=sOk8
-END PGP SIGNATURE-



Re: [gentoo-dev] [RFC] DIGESTS metadata variable for cache validation

2009-02-08 Thread Ciaran McCreesh
On Sun, 08 Feb 2009 15:27:54 -0800
Zac Medico  wrote:
> > Which is offset and more by the massive inconvenience of having to
> > keep track of and store junk under version control.
> 
> I think you're making it out to be worse than it really is. Like I
> said, I think we have a justifiable exception to the rule.

If you start encouraging this approach, are you prepared to make
Portage warn extremely noisily if a repository-provided (as opposed to
user generated) cache entry is found to be stale?

-- 
Ciaran McCreesh


signature.asc
Description: PGP signature


Re: [gentoo-dev] [RFC] DIGESTS metadata variable for cache validation

2009-02-08 Thread Zac Medico
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Ciaran McCreesh wrote:
> On Sun, 08 Feb 2009 15:03:48 -0800
> Zac Medico  wrote:
>>> No, it's just encouraging bad development practices.
>> It seems like you're making a rather arbitrary judgment.
> 
> Not storing generated content under revision control is hardly an
> arbitrary judgement. It's a well accepted software development bad
> practice.

In general, it's a good rule of thumb. However, in this case I think
we have a justifiable exception to the rule.

>>> If you're concerned that setting up an rsync mirror is difficult,
>>> why not make a tool that generates a tarball, including metadata,
>>> for a repo, and have people run that on a cron and distribute it
>>> via http? That's just as easy to host, and anyone running an
>>> overlay big enough to make this impractical already has the
>>> resources to deal with rsync instead...
>> I'm not saying that it necessarily "difficult" or "beyond the
>> resources", but it does create an unnecessary burden. I think that
>> it adds a significant level of convenience to be able to use a
>> version control system as a single distribution channel.
> 
> Which is offset and more by the massive inconvenience of having to
> keep track of and store junk under version control.

I think you're making it out to be worse than it really is. Like I
said, I think we have a justifiable exception to the rule.
- --
Thanks,
Zac
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkmPankACgkQ/ejvha5XGaNpnQCfVHgDPmfzUbfH6mIgmpUxcWda
xkYAoJ1s+DEd873rpRpDQkck6ZP7pclr
=K88a
-END PGP SIGNATURE-



Re: [gentoo-dev] [RFC] DIGESTS metadata variable for cache validation

2009-02-08 Thread Ciaran McCreesh
On Sun, 08 Feb 2009 15:03:48 -0800
Zac Medico  wrote:
> > No, it's just encouraging bad development practices.
> 
> It seems like you're making a rather arbitrary judgment.

Not storing generated content under revision control is hardly an
arbitrary judgement. It's a well accepted software development bad
practice.

> > If you're concerned that setting up an rsync mirror is difficult,
> > why not make a tool that generates a tarball, including metadata,
> > for a repo, and have people run that on a cron and distribute it
> > via http? That's just as easy to host, and anyone running an
> > overlay big enough to make this impractical already has the
> > resources to deal with rsync instead...
> 
> I'm not saying that it necessarily "difficult" or "beyond the
> resources", but it does create an unnecessary burden. I think that
> it adds a significant level of convenience to be able to use a
> version control system as a single distribution channel.

Which is offset and more by the massive inconvenience of having to
keep track of and store junk under version control.

-- 
Ciaran McCreesh


signature.asc
Description: PGP signature


Re: [gentoo-dev] [RFC] DIGESTS metadata variable for cache validation

2009-02-08 Thread Zac Medico
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Ciaran McCreesh wrote:
> On Sun, 08 Feb 2009 14:43:01 -0800
> Zac Medico  wrote:
>>> Sticking metadata cache files under version control really is a
>>> perfect example of doing it wrong...
>> Well, if you want to use timestamps, the alternative is to
>> distributors to use a protocol which preserves timestamps. This
>> creates an unnecessary burden. Allowing distribution of metadata
>> cache via version control systems is more flexible.
> 
> No, it's just encouraging bad development practices.

It seems like you're making a rather arbitrary judgment.

> If you're concerned that setting up an rsync mirror is difficult, why
> not make a tool that generates a tarball, including metadata, for a
> repo, and have people run that on a cron and distribute it via http?
> That's just as easy to host, and anyone running an overlay big enough
> to make this impractical already has the resources to deal with rsync
> instead...

I'm not saying that it necessarily "difficult" or "beyond the
resources", but it does create an unnecessary burden. I think that
it adds a significant level of convenience to be able to use a
version control system as a single distribution channel.
- --
Thanks,
Zac
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkmPZNMACgkQ/ejvha5XGaNqcgCg3GAWiklumvFhBtbWDYBPGz2+
u6IAoJ5eCaytti4FSmOHEtIrLSm10W4O
=n0eG
-END PGP SIGNATURE-



Re: [gentoo-dev] [RFC] DIGESTS metadata variable for cache validation

2009-02-08 Thread Ciaran McCreesh
On Sun, 08 Feb 2009 14:43:01 -0800
Zac Medico  wrote:
> > Sticking metadata cache files under version control really is a
> > perfect example of doing it wrong...
> 
> Well, if you want to use timestamps, the alternative is to
> distributors to use a protocol which preserves timestamps. This
> creates an unnecessary burden. Allowing distribution of metadata
> cache via version control systems is more flexible.

No, it's just encouraging bad development practices.

If you're concerned that setting up an rsync mirror is difficult, why
not make a tool that generates a tarball, including metadata, for a
repo, and have people run that on a cron and distribute it via http?
That's just as easy to host, and anyone running an overlay big enough
to make this impractical already has the resources to deal with rsync
instead...

-- 
Ciaran McCreesh


signature.asc
Description: PGP signature


Re: [gentoo-dev] [RFC] DIGESTS metadata variable for cache validation

2009-02-08 Thread Zac Medico
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Ciaran McCreesh wrote:
> On Sat, 07 Feb 2009 15:23:18 -0800
> Zac Medico  wrote:
>>> Well, usually you don't keep intermediate or generated files in a
>>> VCS, so why the metadata?
>> People who distribute overlays commonly ask if it's possible to
>> distribute metadata cache with the overlay. Using a format that
>> doesn't rely on timestamps will allow them to distribute metadata
>> cache using their existing infrastructure, which is typically git or
>> subversion. In addition to overlays, it would also be useful for
>> forks of the entire gentoo tree, such as the funtoo tree [1].
> 
> Are these people really all going to remember to run some command at
> the top level of the repository before every commit, and to git add the
> relevant files for everything (thus making really messy commits)?

The cache can be incrementally updated by a tool such as repoman, or
it can be updated in periodic batches by a cron job. The periodic
batch approach may be more convenient for eclass changes affect
large numbers of ebuilds.

> Sticking metadata cache files under version control really is a perfect
> example of doing it wrong...

Well, if you want to use timestamps, the alternative is to
distributors to use a protocol which preserves timestamps. This
creates an unnecessary burden. Allowing distribution of metadata
cache via version control systems is more flexible.
- --
Thanks,
Zac
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkmPX/QACgkQ/ejvha5XGaMPewCeOZYsNt2bv+CbOV58aV7isq4f
wCAAnA/10jcuad5NrP3BxyFZAYWH07ot
=iRw3
-END PGP SIGNATURE-



Re: [gentoo-dev] Re: Category tags on packages (was: new categories:)

2009-02-08 Thread Federico Ferri
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Ryan Hill wrote:
>
> I've always thought it would be cool to have user-created tag
> clouds, del.icio.us-style, on packages.g.o.  I expect this would be
> a hell of a lot of work to set up however.

initially, packages could be automatically tagges, based on the
following criteria:
- - category
- - common* words found in $DESCRIPTION
- - common* words found in metadata.xml: if any
- - extend the above with description found on the net

plus:
- - a hidden tag to indicate that tags were assigned automatically, to
be removed whenever the pkg tags are "reviewed" by a human


+= 2E-2

Federico Ferri
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkmPXfEACgkQV/B5axfzrPu46wCdFaTMWf4LSGCRHJJFB0xh0Vio
yYwAn0siZ5oIaec3H2PfDEc6q/t02b6D
=1Pjf
-END PGP SIGNATURE-




[gentoo-dev] Re: Category tags on packages (was: new categories:)

2009-02-08 Thread Ryan Hill
On Sun, 08 Feb 2009 19:07:58 +
Angelo Arrifano  wrote:

> I would keep existing categories and add a new TAG metadata to
> existing ebuilds. Something like TAG="kde music player lyrics lastfm
> visualization" for amarok, as example.
> 
> A public list of *ALLOWED* tags would be published on our www
> infrastructures.
> 
> Then during the portage metadata regeneration process, a new tags dir
> (under portage metadata dir) would be created with files for EACH tag.
> Each tag file would include the fully qualified name for the ebuilds
> in which the tag is present.
> 
> This way, given a set of tags, it is easy and fast too lookup which
> ebuilds match the given tags and how much (percentage) they match
> them.
> 
> For example:
> The user searches for "music gnome lyrics"
> 
> exaile is tagged as "(...) music gnome lyrics"
> gnome-mplayer is tagged as "(...) music gnome"
> amarok is tagged as "(...) music lyrics"
> (...)
> 
> So we can give an interest-ordered list to the user.
> 
> Just my two cents,
> Thanks all

I've always thought it would be cool to have user-created tag clouds,
del.icio.us-style, on packages.g.o.  I expect this would be a hell of a
lot of work to set up however.


-- 
gcc-porting,  by design, by neglect
treecleaner,  for a fact or just for effect
wxwidgets @ gentoo EFFD 380E 047A 4B51 D2BD C64F 8AA8 8346 F9A4 0662


signature.asc
Description: PGP signature


Re: [gentoo-dev] [RFC] DIGESTS metadata variable for cache validation

2009-02-08 Thread Ciaran McCreesh
On Sat, 07 Feb 2009 15:23:18 -0800
Zac Medico  wrote:
> > Well, usually you don't keep intermediate or generated files in a
> > VCS, so why the metadata?
> 
> People who distribute overlays commonly ask if it's possible to
> distribute metadata cache with the overlay. Using a format that
> doesn't rely on timestamps will allow them to distribute metadata
> cache using their existing infrastructure, which is typically git or
> subversion. In addition to overlays, it would also be useful for
> forks of the entire gentoo tree, such as the funtoo tree [1].

Are these people really all going to remember to run some command at
the top level of the repository before every commit, and to git add the
relevant files for everything (thus making really messy commits)?

Sticking metadata cache files under version control really is a perfect
example of doing it wrong...

-- 
Ciaran McCreesh


signature.asc
Description: PGP signature


Re: [gentoo-dev] [RFC] DIGESTS metadata variable for cache validation

2009-02-08 Thread Zac Medico
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Tiziano Müller wrote:
> Am Sonntag, den 08.02.2009, 12:36 -0800 schrieb Zac Medico:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>> Tiziano Müller wrote:
>>> But if your target is to reduce the size of the metadata cache, why
>>> store the hashes of the eclasses in the ebuild's metadata and not in a
>>> seperate dir? They have to be the same for every ebuild, don't they?
>>> In case you have an average number of eclasses which is bigger than 4,
>>> you can even store the full hash with less space used than with
>>> truncated hashes for all eclasses.
>> The problem with having eclass integrity data shared in a separate
>> file is that it creates a requirement for all cache entries which
>> reference the same eclasses to be consistent with one another. This
>> means that a single cache entry can no longer be updated atomically.
>> For example, before updating the shared eclass integrity data, you'd
>> want to make sure that you first discard all of the cache entries
>> which reference it. Although it can be done this way, I think it's
>> much more convenient to have all of the integrity data encapsulated
>> within each individual cache entry.
> Ok, let me see if I get this: Since parts of the content of a
> metadata-entry (like the DEPEND/RDEPEND vars) depend on the contents of
> the eclass used by the time a cache entry got generated, you want to
> store the eclass' hash in the ebuild entry to make sure the entry gets
> invalidated once the eclass changes. Is that correct?

Right. By having each cache entry encapsulate it's own integrity
data, the program updating the cache is never required to update
more than one file at a time. Having shared integrity data would
imply that the program would have the burden of maintaining
consistency across all cache entries.
- --
Thanks,
Zac
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkmPWTEACgkQ/ejvha5XGaOLHQCg0wGuRIkPCmQUQ2k14RjQlpv0
C54AoNqBaA6d3xyO6FuNz1GO7ZJ7y7E6
=D/ei
-END PGP SIGNATURE-



Re: [gentoo-dev] RFC: fox.eclass update

2009-02-08 Thread Matti Bickel
Hi,

  shame on me, here i'm wondering why noone replies...
  Sorry, i failed to send the updated patch o.O

  Here's the patch again w/ your suggestions included.
-- 
Regards, Matti Bickel
Signed/Encrypted email preferred (key 4849EC6C)
--- /usr/portage/eclass/fox.eclass  2008-10-12 14:36:35.0 +0200
+++ fox-proposed.eclass 2009-02-08 19:35:49.0 +0100
@@ -1,8 +1,12 @@
 # Copyright 1999-2005 Gentoo Foundation
 # Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/eclass/fox.eclass,v 1.8 2008/10/12 12:31:36 
mabi Exp $
+# $Header: /var/cvsroot/gentoo-x86/eclass/fox.eclass,v 1.7 2007/01/15 20:27:06 
mabi Exp $
 
-# fox eclass
+# @ECLASS: fox.eclass
+# @MAINTAINER: m...@gentoo.org
+# @BLURB: Common build and install functions for fox-related apps and library
+# @DESCRIPTION: Used by the x11-libs/fox library and all applications that come
+# with the upstream source tarball.
 #
 # This eclass allows building SLOT-able FOX Toolkit installations
 # (x11-libs/fox: headers, libs, and docs), which are by design
@@ -19,26 +23,22 @@
 # are API unstable; changes are made to the apps, and likely need to be
 # bumped together with the library.
 #
-# Here are sample [R]DEPENDs for the fox apps
-# fox versions that do not use this eclass are blocked in INCOMPAT_DEP below
-#  1.0: '=x11-libs/fox-1.0*'
-#  1.2: '=x11-libs/fox-1.2*'
+# Some concepts borrowed from gst-plugins and gtk-sharp-component eclasses
+#
+# @EXAMPLE: Here are sample [R]DEPENDs for the fox apps
 #  1.4: '=x11-libs/fox-1.4*'
 #  1.5: '~x11-libs/fox-${PV}'
 #  1.6: '=x11-libs/fox-${FOXVER}*'
-#
-# Some concepts borrowed from gst-plugins and gtk-sharp-component eclasses
 
-inherit eutils libtool versionator
+# could probably be lower
+WANT_AUTOCONF="latest"
+WANT_AUTOMAKE="latest"
 
+inherit autotools eutils libtool versionator
 
 FOX_PV="${FOX_PV:-${PV}}"
-PVP=(${FOX_PV//[-\._]/ })
-FOXVER="${PVP[0]}.${PVP[1]}"
-
-if [ "${FOXVER}" != "1.0" ] ; then
-   FOXVER_SUFFIX="-${FOXVER}"
-fi
+FOXVER=$(get_version_component_range 1-2)
+FOXVER_SUFFIX="-${FOXVER}"
 
 DESCRIPTION="C++ based Toolkit for developing Graphical User Interfaces easily 
and effectively"
 HOMEPAGE="http://www.fox-toolkit.org/";
@@ -46,44 +46,28 @@
 
 IUSE="debug doc profile"
 
-# from fox-1.0
-FOX_APPS="adie calculator pathfinder"
-# from fox-1.2+
-if [ "${FOXVER}" != "1.0" ] ; then
-   FOX_APPS="${FOX_APPS} shutterbug"
-   FOX_CHART="chart"
-fi
+# @ECLASS-VARIABLE: FOX_APPS
+# @DESCRIPTION: all applications that come with the fox toolkit source
+FOX_APPS="adie calculator pathfinder shutterbug chart"
 
 if [ "${PN}" != fox ] ; then
FOX_COMPONENT="${FOX_COMPONENT:-${PN}}"
 fi
 
-if [ "${FOXVER}" != "1.0" ] && [ -z "${FOX_COMPONENT}" ] ; then
-   DOXYGEN_DEP="doc? ( app-doc/doxygen )"
-fi
-
 if [ "${PN}" != reswrap ] ; then
RESWRAP_DEP="dev-util/reswrap"
 fi
 
-# These versions are not compatible with new fox layout
-# and will cause collissions - we need to block them
-INCOMPAT_DEP="!=sys-devel/automake-1.4
>=sys-apps/sed-4"
 
 S="${WORKDIR}/fox-${FOX_PV}"
 
 fox_src_unpack() {
unpack ${A}
-   cd ${S}
+   cd "${S}"
 
ebegin "Fixing configure"
 
@@ -103,14 +87,14 @@
done
 
# use the installed reswrap for everything else
-   for d in ${FOX_APPS} ${FOX_CHART} tests ; do
+   for d in ${FOX_APPS} tests ; do
sed -i -e 's:$(top_builddir)/utils/reswrap:reswrap:' \
${d}/Makefile.am || die "sed ${d}/Makefile.am error"
done
 
# use the installed headers and library for apps
for d in ${FOX_APPS} ; do
-   if version_is_at_least "1.6.34" ${PV} ; then
+   if version_is_at_least "1.6.34" ${PV}; then
sed -i \
-e "s:-I\$(top_srcdir)/include 
-I\$(top_builddir)/include:-I\$(includedir)/fox${FOXVER_SUFFIX}:" \
-e 's:$(top_builddir)/src/libFOX:-lFOX:' \
@@ -124,19 +108,13 @@
${d}/Makefile.am || die "sed ${d}/Makefile.am 
error"
fi
done
-
-   # Upstream often has trouble with version number transitions
-   if [ "${FOXVER}" == "1.5" ] ; then
-   sed -i -e 's:1.4:1.5:g' chart/Makefile.am
-   fi
-
eend
 
ebegin "Running automake"
-   automake-1.4 -a -c || die "automake error"
+   eautomake || die "automake error"
eend
 
-   elibtoolize
+   #elibtoolize
 }
 
 fox_src_compile() {
@@ -150,21 +128,21 @@
$(use_with profile profiling) \
|| die "configure error"
 
-   cd ${S}/${FOX_COMPONENT}
+   cd "${S}/${FOX_COMPONENT}"
emake || die "compile error"
 
# build class reference docs (FOXVER >= 1.2)
-   if use doc && [ "${FOXVER}" != "1.0" ] && [ -z "${FOX_COMPONENT}" ] ; 
then
-   cd ${S}/doc

[gentoo-dev] Devaway for me, for a whole year period(military service)

2009-02-08 Thread Panagiotis Christopoulos
Hi fellow devs and users,

  As some of you may already know, I won't be around this year,
cause I have to join the greek army, starting from tomorrow
morning. Feel free to touch my ebuilds. I will be in contact (via mail)
with Marijn Schouten (hkBst) in case you want to hear any news of me.
Keep up the great work, all of you, and don't break anything, cause I
will have very little time when I'll be back home, to update the "worlds of
my machinery" :P 

ps: I have left an open screen session running irssi, on a remote machine, so
you will see me online, but I'll be far away, probably :(

-- 
Panagiotis Christopoulos ( pchrist )
( Gentoo Lisp Project )


pgpkCRknmK3W1.pgp
Description: PGP signature


Re: [gentoo-dev] [RFC] DIGESTS metadata variable for cache validation

2009-02-08 Thread Tiziano Müller
Am Sonntag, den 08.02.2009, 12:36 -0800 schrieb Zac Medico:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> Tiziano Müller wrote:
> > Am Sonntag, den 08.02.2009, 00:59 -0800 schrieb Zac Medico:
> >> -BEGIN PGP SIGNED MESSAGE-
> >> Hash: SHA1
> >>
> >> Tiziano Müller wrote:
> >>> Am Samstag, den 07.02.2009, 15:23 -0800 schrieb Zac Medico:
>  -BEGIN PGP SIGNED MESSAGE-
>  Hash: SHA1
> 
>  Tiziano Müller wrote:
> > Am Montag, den 02.02.2009, 12:34 -0800 schrieb Zac Medico:
>  I like that idea. That way it's not necessary to bump the EAPI in
>  order to change the hash function. So, a typical DIGESTS value might
>  look like this:
> > You still have to bump the EAPI in case you want to use a new hash not
> > already available now (like SHA-3). The advantage of noting the used
> > hash is that new PMs can handle old metadata cache.
> 
> That's true.
> 
>  SHA1 02021be38b a28b191904 3992945426 6ec21b29a3
> >>> Sleeping over it again I don't think that truncating a hash is a good
> >>> idea (truncating it from 40 to 10 digits makes the possibility of
> >>> collisions much much higher).
> >> The probability of collision is much higher, but it's still
> >> relatively small. Given the "avalanche effect" that is typical of
> >> cryptographic hash functions, it's extremely unlikely that collision
> >> will occur in such a way that it will cause a problem for cache
> >> validation.
> > The "avalanche effect" as I understood it is required for a hash
> > function to avoid simple calculations of collisions (what the diffusion
> > is for crypto algorithms). So, small changes should affect as many
> > numbers in the hash as possible. But you don't have only small changes
> > here in case somebody patches an eclass, so, the only thing which counts
> > is the probability of a collision.
> 
> Well, the avalanche effect helps in the sense that the leftmost 10
> digits would serve approximately as well as any other 10 digits out
> of all of them. But you're right about the probability of a
> collision being what really matters. With 10 hex digits, we've got a
> space of 16^10 = 1.1e12 possible combinations. Given a space that
> large, the probability of a collision pretty small.
> 
> >>> But if you want to go this way, I'd say you should use something like
> >>> SHA1t (t for truncated) to make sure we can use full hashes once we feel
> >>> it's appropriate.
> >> We could, but I think SHA1 would also be fine since one can infer
> >> from the length of the string that it's been truncated.
> > No, guessing is a bad thing here because it could be truncated because
> > of faulty metadata. But the main motivation is that if you write SHA1
> > everyone reading it expects it to be a full SHA1 hash, which it isn't.
> 
> Well, if the metadata is faulty then the digests are unlikely to
> match and the cache will be discarded anyway as invalid. However, I
> think your point is still somewhat valid, so SHA1t is fine with me
> if that makes more people happy. Does anyone else have a preference
> here?
> 
> > But if your target is to reduce the size of the metadata cache, why
> > store the hashes of the eclasses in the ebuild's metadata and not in a
> > seperate dir? They have to be the same for every ebuild, don't they?
> > In case you have an average number of eclasses which is bigger than 4,
> > you can even store the full hash with less space used than with
> > truncated hashes for all eclasses.
> 
> The problem with having eclass integrity data shared in a separate
> file is that it creates a requirement for all cache entries which
> reference the same eclasses to be consistent with one another. This
> means that a single cache entry can no longer be updated atomically.
> For example, before updating the shared eclass integrity data, you'd
> want to make sure that you first discard all of the cache entries
> which reference it. Although it can be done this way, I think it's
> much more convenient to have all of the integrity data encapsulated
> within each individual cache entry.
Ok, let me see if I get this: Since parts of the content of a
metadata-entry (like the DEPEND/RDEPEND vars) depend on the contents of
the eclass used by the time a cache entry got generated, you want to
store the eclass' hash in the ebuild entry to make sure the entry gets
invalidated once the eclass changes. Is that correct?


-- 
---
Tiziano Müller
Gentoo Linux Developer, Council Member
Areas of responsibility:
  Samba, PostgreSQL, CPP, Python, sysadmin
E-Mail : dev-z...@gentoo.org
GnuPG FP   : F327 283A E769 2E36 18D5  4DE2 1B05 6A63 AE9C 1E30


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: [gentoo-dev] Announcement of The G Palmtop Environment ebuilds

2009-02-08 Thread Petteri Räty
Angelo Arrifano wrote:
> 
> [ -z "${GPE_MIRROR}" ] && 
> GPE_MIRROR="http://gpe.linuxtogo.org/download/source";
> [ -z "${GPE_TARBALL_SUFFIX}" ] && GPE_TARBALL_SUFFIX="gz"
> SRC_URI="${GPE_MIRROR}/${P}.tar.${GPE_TARBALL_SUFFIX}"
> 

Use [[ here.

> 
> # @FUNCTION: gpe_src_compile
> # @DESCRIPTION: (Cross-)Compiles a GPE package.
> gpe_src_compile() {
>   tc-export CC
>   has "${EAPI:-0}" 0 1 && gpe_src_configure "$@"
>   # miknix: Code belo must NOT die, some packages dont really build 
> anything,
>   # just install.
>   emake PREFIX=/usr
> }
> 

The packages that don't build anything can do:
src_compile() { :; } or you can have a variable for skipping the build
step.

Regards,
Petteri



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] [RFC] DIGESTS metadata variable for cache validation

2009-02-08 Thread Zac Medico
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Tiziano Müller wrote:
> Am Sonntag, den 08.02.2009, 00:59 -0800 schrieb Zac Medico:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>> Tiziano Müller wrote:
>>> Am Samstag, den 07.02.2009, 15:23 -0800 schrieb Zac Medico:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Tiziano Müller wrote:
> Am Montag, den 02.02.2009, 12:34 -0800 schrieb Zac Medico:
 I like that idea. That way it's not necessary to bump the EAPI in
 order to change the hash function. So, a typical DIGESTS value might
 look like this:
> You still have to bump the EAPI in case you want to use a new hash not
> already available now (like SHA-3). The advantage of noting the used
> hash is that new PMs can handle old metadata cache.

That's true.

 SHA1 02021be38b a28b191904 3992945426 6ec21b29a3
>>> Sleeping over it again I don't think that truncating a hash is a good
>>> idea (truncating it from 40 to 10 digits makes the possibility of
>>> collisions much much higher).
>> The probability of collision is much higher, but it's still
>> relatively small. Given the "avalanche effect" that is typical of
>> cryptographic hash functions, it's extremely unlikely that collision
>> will occur in such a way that it will cause a problem for cache
>> validation.
> The "avalanche effect" as I understood it is required for a hash
> function to avoid simple calculations of collisions (what the diffusion
> is for crypto algorithms). So, small changes should affect as many
> numbers in the hash as possible. But you don't have only small changes
> here in case somebody patches an eclass, so, the only thing which counts
> is the probability of a collision.

Well, the avalanche effect helps in the sense that the leftmost 10
digits would serve approximately as well as any other 10 digits out
of all of them. But you're right about the probability of a
collision being what really matters. With 10 hex digits, we've got a
space of 16^10 = 1.1e12 possible combinations. Given a space that
large, the probability of a collision pretty small.

>>> But if you want to go this way, I'd say you should use something like
>>> SHA1t (t for truncated) to make sure we can use full hashes once we feel
>>> it's appropriate.
>> We could, but I think SHA1 would also be fine since one can infer
>> from the length of the string that it's been truncated.
> No, guessing is a bad thing here because it could be truncated because
> of faulty metadata. But the main motivation is that if you write SHA1
> everyone reading it expects it to be a full SHA1 hash, which it isn't.

Well, if the metadata is faulty then the digests are unlikely to
match and the cache will be discarded anyway as invalid. However, I
think your point is still somewhat valid, so SHA1t is fine with me
if that makes more people happy. Does anyone else have a preference
here?

> But if your target is to reduce the size of the metadata cache, why
> store the hashes of the eclasses in the ebuild's metadata and not in a
> seperate dir? They have to be the same for every ebuild, don't they?
> In case you have an average number of eclasses which is bigger than 4,
> you can even store the full hash with less space used than with
> truncated hashes for all eclasses.

The problem with having eclass integrity data shared in a separate
file is that it creates a requirement for all cache entries which
reference the same eclasses to be consistent with one another. This
means that a single cache entry can no longer be updated atomically.
For example, before updating the shared eclass integrity data, you'd
want to make sure that you first discard all of the cache entries
which reference it. Although it can be done this way, I think it's
much more convenient to have all of the integrity data encapsulated
within each individual cache entry.
- --
Thanks,
Zac
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkmPQjkACgkQ/ejvha5XGaNFUACfQvVYgNiZNK8PVReTZKN47wQU
9wkAniltb1ivZYGgmhn/eli2fpprkOlI
=2mbq
-END PGP SIGNATURE-



Re: [gentoo-dev] Category tags on packages (was: new categories:)

2009-02-08 Thread Rémi Cardona

Le 08/02/2009 20:07, Angelo Arrifano a écrit :

I would keep existing categories and add a new TAG metadata to existing
ebuilds. Something like TAG="kde music player lyrics lastfm
visualization" for amarok, as example.


If anything, this sort of extra information should go to metadata.xml.

Cheers,

Rémi



Re: [gentoo-dev] Category tags on packages (was: new categories:)

2009-02-08 Thread Angelo Arrifano
I would keep existing categories and add a new TAG metadata to existing
ebuilds. Something like TAG="kde music player lyrics lastfm
visualization" for amarok, as example.

A public list of *ALLOWED* tags would be published on our www
infrastructures.

Then during the portage metadata regeneration process, a new tags dir
(under portage metadata dir) would be created with files for EACH tag.
Each tag file would include the fully qualified name for the ebuilds in
which the tag is present.

This way, given a set of tags, it is easy and fast too lookup which
ebuilds match the given tags and how much (percentage) they match them.

For example:
The user searches for "music gnome lyrics"

exaile is tagged as "(...) music gnome lyrics"
gnome-mplayer is tagged as "(...) music gnome"
amarok is tagged as "(...) music lyrics"
(...)

So we can give an interest-ordered list to the user.

Just my two cents,
Thanks all
-- 
Angelo Arrifano 
Gentoo Linux ARM/OMAP850 Developer




Re: [gentoo-dev] Category tags on packages (was: new categories:)

2009-02-08 Thread Tiziano Müller
Am Sonntag, den 08.02.2009, 18:59 +0100 schrieb Federico Ferri:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> Nirbheek Chauhan wrote:
> > ${PORTDIR}/tags/games/puzzles/ksudoku -> ../../../kde-base/ksudoku
> > ${PORTDIR}/tags/games/puzzles/sudoku/ksudoku ->
> ../../../../kde-base/ksudoku
> > ${PORTDIR}/tags/dying/amarok -> ../media-sound/amarok
> 
> - --
> 
> I like the tag idea.
> I don't like tag as described above.
> I feel having tags organized in hierarchical way is inappropriate.
> that just makes another organization of packages in categories.
> 
> tags <-> packages is a many-to-many relation.
> 
> 
> 
> btw, if the DESCRIPTION field is well written, it functions as a tag.

Please, don't.

> e.g.:
> 
> $ eix -c -S dockapp -S net
> [N] x11-plugins/allin1 (--): All in one monitoring dockapp: RAM, CPU,
> Net, Power, df, seti
> [N] x11-plugins/wmifinfo (0.09): a dockapp for monitoring network
> interfaces.
> [N] x11-plugins/wminet (3.0.0): dockapp for monitoring internet
> connections to and from your computer.
> [N] x11-plugins/wmitime (0.3): Overglorified clock dockapp w/time,
> date, and internet time
> [N] x11-plugins/wmnd (0.4.11-r1): WindowMaker Network Devices (dockapp)
> [N] x11-plugins/wmnetload (1.3-r2): Network interface monitor dockapp
> [N] x11-plugins/wmwifi (0.6): wireless network interface monitor dockapp
> Found 7 matches.
> 
> although DESCRIPTION doesn't contain "obvious" tags.
> perhaps it's worth the addition of a TAGS field (?) that has to be
> searched just like DESCRIPTION

It's metadata-stuff, why not put it there?

You have two possibilities:

a) Introduce new elements:

  foo
  bar


b) Think of herds as tags, then you have many packages already tagged.
To be able to add new herds/tags without messing up with the
maintainer-info, I'd then introduce new attributes for  and
instead of writing foo meaning that a package is maintainer
by team "foo" just write foo
instead.
Then you can use the "herd" element in metadata.xml freely as a tag.

Cheers,
Tiziano


-- 
---
Tiziano Müller
Gentoo Linux Developer, Council Member
Areas of responsibility:
  Samba, PostgreSQL, CPP, Python, sysadmin
E-Mail : dev-z...@gentoo.org
GnuPG FP   : F327 283A E769 2E36 18D5  4DE2 1B05 6A63 AE9C 1E30


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: [gentoo-dev] Category tags on packages (was: new categories:)

2009-02-08 Thread Tiziano Müller
Am Sonntag, den 08.02.2009, 23:41 +0530 schrieb Nirbheek Chauhan:
> On Sun, Feb 8, 2009 at 11:40 PM, Nirbheek Chauhan
>  wrote:
> > On Sun, Feb 8, 2009 at 11:29 PM, Federico Ferri  
> > wrote:
> >> tags <-> packages is a many-to-many relation.
> >
> > Aren't tags _made_ to be many-to-many?
> 
> ie, symlinking can allow that kind of relationship
> 

No, symlinking sucks for various reasons. Here are some:
- filesystem access is slow
- moving packages from one category to another gets even worse because
you have to check for deadlinks
- you have to check for deadlinks anyway because people forget to remove
them when removing packages
- good luck with that on Gentoo/Prefix-Interix


-- 
---
Tiziano Müller
Gentoo Linux Developer, Council Member
Areas of responsibility:
  Samba, PostgreSQL, CPP, Python, sysadmin
E-Mail : dev-z...@gentoo.org
GnuPG FP   : F327 283A E769 2E36 18D5  4DE2 1B05 6A63 AE9C 1E30


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: [gentoo-dev] Category tags on packages (was: new categories:)

2009-02-08 Thread Federico Ferri
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Nirbheek Chauhan wrote:
>> I like the tag idea. I don't like tag as described above. I feel
>> having tags organized in hierarchical way is inappropriate. that
>> just makes another organization of packages in categories.
>
> KDE and OLPC are looking towards hierarchical tags as the future of
>  content management. People don't really use folders, they use
> tags:
>
> "Holidays" > "2008" > "Switzerland" "Open Source" > "Gentoo" >
> "portage"
>

the above looks exactly like folders (unless you elaborate on that)

I don't know what KDE or OLPC are thinking. when I tag my stuff I'd
probably have:
photo001.jpg {2008,holidays,nature,switzerland}
photo002.jpg {2008,holidays,fun,switzerland,zurich}
photo158.jpg {2009,computer,me,misc}
(the order of tags here is alphabetical)

> tags <-> packages is a many-to-many relation.
>>
>> Aren't tags _made_ to be many-to-many?
>
> ie, symlinking can allow that kind of relationship

can you show an example (of many-2-many relation, with symlinks)?


Federico Ferri
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkmPJHsACgkQV/B5axfzrPtbpACfcq8qpQdkneWplS8H3XgEiry1
1qUAoKZcMUGDyro8nHwrSvNwflm0nyGn
=PV0+
-END PGP SIGNATURE-




Re: [gentoo-dev] Category tags on packages (was: new categories:)

2009-02-08 Thread Nirbheek Chauhan
On Sun, Feb 8, 2009 at 11:40 PM, Nirbheek Chauhan
 wrote:
> On Sun, Feb 8, 2009 at 11:29 PM, Federico Ferri  wrote:
>> tags <-> packages is a many-to-many relation.
>
> Aren't tags _made_ to be many-to-many?

ie, symlinking can allow that kind of relationship


-- 
~Nirbheek Chauhan



Re: [gentoo-dev] Category tags on packages (was: new categories:)

2009-02-08 Thread Nirbheek Chauhan
On Sun, Feb 8, 2009 at 11:29 PM, Federico Ferri  wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Nirbheek Chauhan wrote:
>> ${PORTDIR}/tags/games/puzzles/ksudoku -> ../../../kde-base/ksudoku
>> ${PORTDIR}/tags/games/puzzles/sudoku/ksudoku ->
> ../../../../kde-base/ksudoku
>> ${PORTDIR}/tags/dying/amarok -> ../media-sound/amarok
>
> - --
>
> I like the tag idea.
> I don't like tag as described above.
> I feel having tags organized in hierarchical way is inappropriate.
> that just makes another organization of packages in categories.

KDE and OLPC are looking towards hierarchical tags as the future of
content management. People don't really use folders, they use tags:

"Holidays" > "2008" > "Switzerland"
"Open Source" > "Gentoo" > "portage"

>
> tags <-> packages is a many-to-many relation.

Aren't tags _made_ to be many-to-many?


-- 
~Nirbheek Chauhan



Re: [gentoo-dev] Category tags on packages (was: new categories:)

2009-02-08 Thread Federico Ferri
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Nirbheek Chauhan wrote:
> ${PORTDIR}/tags/games/puzzles/ksudoku -> ../../../kde-base/ksudoku
> ${PORTDIR}/tags/games/puzzles/sudoku/ksudoku ->
../../../../kde-base/ksudoku
> ${PORTDIR}/tags/dying/amarok -> ../media-sound/amarok

- --

I like the tag idea.
I don't like tag as described above.
I feel having tags organized in hierarchical way is inappropriate.
that just makes another organization of packages in categories.

tags <-> packages is a many-to-many relation.



btw, if the DESCRIPTION field is well written, it functions as a tag.
e.g.:

$ eix -c -S dockapp -S net
[N] x11-plugins/allin1 (--): All in one monitoring dockapp: RAM, CPU,
Net, Power, df, seti
[N] x11-plugins/wmifinfo (0.09): a dockapp for monitoring network
interfaces.
[N] x11-plugins/wminet (3.0.0): dockapp for monitoring internet
connections to and from your computer.
[N] x11-plugins/wmitime (0.3): Overglorified clock dockapp w/time,
date, and internet time
[N] x11-plugins/wmnd (0.4.11-r1): WindowMaker Network Devices (dockapp)
[N] x11-plugins/wmnetload (1.3-r2): Network interface monitor dockapp
[N] x11-plugins/wmwifi (0.6): wireless network interface monitor dockapp
Found 7 matches.

although DESCRIPTION doesn't contain "obvious" tags.
perhaps it's worth the addition of a TAGS field (?) that has to be
searched just like DESCRIPTION


just my 2E-2
Federico Ferri
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkmPHZIACgkQV/B5axfzrPu9ewCgr2XRqbTy9XycR5g0KeFWtOnV
ou8An2WKDEeIsPioWHn/lVEtPrHF4QNg
=GvLh
-END PGP SIGNATURE-




Re: [gentoo-dev] [RFC] DIGESTS metadata variable for cache validation

2009-02-08 Thread Tiziano Müller
Am Sonntag, den 08.02.2009, 00:59 -0800 schrieb Zac Medico:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> Tiziano Müller wrote:
> > Am Samstag, den 07.02.2009, 15:23 -0800 schrieb Zac Medico:
> >> -BEGIN PGP SIGNED MESSAGE-
> >> Hash: SHA1
> >>
> >> Tiziano Müller wrote:
> >>> Am Montag, den 02.02.2009, 12:34 -0800 schrieb Zac Medico:
>  For the digest format, I suggest that we use the leftmost 10
>  hexadecimal digits of the SHA-1 digest. The rationale for limiting
>  it to 10 digits (out of 40) is to save space. Due to the avalanche
>  effect [2], 10 digits should be sufficient to ensure that problems
>  resulting from hash collisions are extremely unlikely.
> >>> I'd recommend to prefix the digest with a "{TYPE}" (like for hashed
> >>> passwords) to be able to change the digest algorithm as needed
> >>> (especially in regards to the current SHA successor competition).
> >>> This allows a future package manager which might use SHA-3 for hashing
> >>> (once it's released) to still check old digests. Furthermore it would
> >>> allow for easier transition and only needs a definition of allowed
> >>> hashes instead of a specific one.
> >> I like that idea. That way it's not necessary to bump the EAPI in
> >> order to change the hash function. So, a typical DIGESTS value might
> >> look like this:
You still have to bump the EAPI in case you want to use a new hash not
already available now (like SHA-3). The advantage of noting the used
hash is that new PMs can handle old metadata cache.

> >>
> >> SHA1 02021be38b a28b191904 3992945426 6ec21b29a3
> > 
> > Sleeping over it again I don't think that truncating a hash is a good
> > idea (truncating it from 40 to 10 digits makes the possibility of
> > collisions much much higher).
> 
> The probability of collision is much higher, but it's still
> relatively small. Given the "avalanche effect" that is typical of
> cryptographic hash functions, it's extremely unlikely that collision
> will occur in such a way that it will cause a problem for cache
> validation.
The "avalanche effect" as I understood it is required for a hash
function to avoid simple calculations of collisions (what the diffusion
is for crypto algorithms). So, small changes should affect as many
numbers in the hash as possible. But you don't have only small changes
here in case somebody patches an eclass, so, the only thing which counts
is the probability of a collision.

> 
> > But if you want to go this way, I'd say you should use something like
> > SHA1t (t for truncated) to make sure we can use full hashes once we feel
> > it's appropriate.
> 
> We could, but I think SHA1 would also be fine since one can infer
> from the length of the string that it's been truncated.
No, guessing is a bad thing here because it could be truncated because
of faulty metadata. But the main motivation is that if you write SHA1
everyone reading it expects it to be a full SHA1 hash, which it isn't.

But if your target is to reduce the size of the metadata cache, why
store the hashes of the eclasses in the ebuild's metadata and not in a
seperate dir? They have to be the same for every ebuild, don't they?
In case you have an average number of eclasses which is bigger than 4,
you can even store the full hash with less space used than with
truncated hashes for all eclasses.

-- 
---
Tiziano Müller
Gentoo Linux Developer, Council Member
Areas of responsibility:
  Samba, PostgreSQL, CPP, Python, sysadmin
E-Mail : dev-z...@gentoo.org
GnuPG FP   : F327 283A E769 2E36 18D5  4DE2 1B05 6A63 AE9C 1E30


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: [gentoo-dev] [RFC] DIGESTS metadata variable for cache validation

2009-02-08 Thread Zac Medico
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Tiziano Müller wrote:
> Am Samstag, den 07.02.2009, 15:23 -0800 schrieb Zac Medico:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>> Tiziano Müller wrote:
>>> Am Montag, den 02.02.2009, 12:34 -0800 schrieb Zac Medico:
 For the digest format, I suggest that we use the leftmost 10
 hexadecimal digits of the SHA-1 digest. The rationale for limiting
 it to 10 digits (out of 40) is to save space. Due to the avalanche
 effect [2], 10 digits should be sufficient to ensure that problems
 resulting from hash collisions are extremely unlikely.
>>> I'd recommend to prefix the digest with a "{TYPE}" (like for hashed
>>> passwords) to be able to change the digest algorithm as needed
>>> (especially in regards to the current SHA successor competition).
>>> This allows a future package manager which might use SHA-3 for hashing
>>> (once it's released) to still check old digests. Furthermore it would
>>> allow for easier transition and only needs a definition of allowed
>>> hashes instead of a specific one.
>> I like that idea. That way it's not necessary to bump the EAPI in
>> order to change the hash function. So, a typical DIGESTS value might
>> look like this:
>>
>> SHA1 02021be38b a28b191904 3992945426 6ec21b29a3
> 
> Sleeping over it again I don't think that truncating a hash is a good
> idea (truncating it from 40 to 10 digits makes the possibility of
> collisions much much higher).

The probability of collision is much higher, but it's still
relatively small. Given the "avalanche effect" that is typical of
cryptographic hash functions, it's extremely unlikely that collision
will occur in such a way that it will cause a problem for cache
validation.

> But if you want to go this way, I'd say you should use something like
> SHA1t (t for truncated) to make sure we can use full hashes once we feel
> it's appropriate.

We could, but I think SHA1 would also be fine since one can infer
from the length of the string that it's been truncated.
- --
Thanks,
Zac
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkmOnvwACgkQ/ejvha5XGaPtSACeOS21UYlvkMQy5q86B+9aKHpH
DnUAoK1P83uKFEd2uzfc2t+QhArMHeEZ
=jPpV
-END PGP SIGNATURE-



Re: [gentoo-dev] [RFC] DIGESTS metadata variable for cache validation

2009-02-08 Thread Tiziano Müller
Am Samstag, den 07.02.2009, 15:23 -0800 schrieb Zac Medico:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> Tiziano Müller wrote:
> > Am Montag, den 02.02.2009, 12:34 -0800 schrieb Zac Medico:
> >> For the digest format, I suggest that we use the leftmost 10
> >> hexadecimal digits of the SHA-1 digest. The rationale for limiting
> >> it to 10 digits (out of 40) is to save space. Due to the avalanche
> >> effect [2], 10 digits should be sufficient to ensure that problems
> >> resulting from hash collisions are extremely unlikely.
> > I'd recommend to prefix the digest with a "{TYPE}" (like for hashed
> > passwords) to be able to change the digest algorithm as needed
> > (especially in regards to the current SHA successor competition).
> > This allows a future package manager which might use SHA-3 for hashing
> > (once it's released) to still check old digests. Furthermore it would
> > allow for easier transition and only needs a definition of allowed
> > hashes instead of a specific one.
> 
> I like that idea. That way it's not necessary to bump the EAPI in
> order to change the hash function. So, a typical DIGESTS value might
> look like this:
> 
> SHA1 02021be38b a28b191904 3992945426 6ec21b29a3

Sleeping over it again I don't think that truncating a hash is a good
idea (truncating it from 40 to 10 digits makes the possibility of
collisions much much higher).
But if you want to go this way, I'd say you should use something like
SHA1t (t for truncated) to make sure we can use full hashes once we feel
it's appropriate.

-- 
---
Tiziano Müller
Gentoo Linux Developer, Council Member
Areas of responsibility:
  Samba, PostgreSQL, CPP, Python, sysadmin
E-Mail : dev-z...@gentoo.org
GnuPG FP   : F327 283A E769 2E36 18D5  4DE2 1B05 6A63 AE9C 1E30


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil