Accepted bitcoin 0.13.1-0.1 (source amd64) into unstable

2016-10-27 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 28 Oct 2016 13:40:17 +1000
Source: bitcoin
Binary: bitcoind bitcoin-qt bitcoin-tx libbitcoinconsensus0 
libbitcoinconsensus-dev
Architecture: source amd64
Version: 0.13.1-0.1
Distribution: unstable
Urgency: medium
Maintainer: Debian Bitcoin Packaging Team 
<pkg-bitcoin-de...@lists.alioth.debian.org>
Changed-By: Anthony Towns <a...@erisian.com.au>
Description:
 bitcoin-qt - peer-to-peer network based digital currency - GUI
 bitcoin-tx - peer-to-peer network based digital currency - transaction tool
 bitcoind   - peer-to-peer network based digital currency - daemon
 libbitcoinconsensus-dev - bitcoin blockchain library development files
 libbitcoinconsensus0 - bitcoin blockchain library
Closes: 841706
Changes:
 bitcoin (0.13.1-0.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * New upstream release.
   * Patch for -latomic is included upstream, so drop Debian-specific patch.
   * Add semi-colons for hppa patch. (Closes: Bug#841706)
Checksums-Sha1:
 6d62c81e91a13f0957ad62e8961beb3abd881e47 2644 bitcoin_0.13.1-0.1.dsc
 c61dbb3a89d452e83e4ce454ee677c64dfda46b3 5952081 bitcoin_0.13.1.orig.tar.gz
 14b4626ef22f431a2e1ddc18fd64c53afec3946b 36400 bitcoin_0.13.1-0.1.debian.tar.xz
 3a2040b557fa67dd5c6e595766f93ca15dd1f86f 41668944 
bitcoin-qt-dbgsym_0.13.1-0.1_amd64.deb
 1e2e3870ba45a8e592981a1a3c25405be25e9e08 3108510 
bitcoin-qt_0.13.1-0.1_amd64.deb
 de5a94038599703b92df616783311f714b6aa45a 4544926 
bitcoin-tx-dbgsym_0.13.1-0.1_amd64.deb
 97e6da707277b741a13a2abd243b8a45e02b3506 409546 bitcoin-tx_0.13.1-0.1_amd64.deb
 5a519136ae88c763af233ff2361a89c3d74bffe8 29081084 
bitcoind-dbgsym_0.13.1-0.1_amd64.deb
 e1d91ee3ee9d13da19c0b74a22b569aa1591895e 1489210 bitcoind_0.13.1-0.1_amd64.deb
 a807ad6cb613071d61078fd8ff633d690412752a 145638 
libbitcoinconsensus-dev_0.13.1-0.1_amd64.deb
 40d3e3159c7bbf2452ac5c35bf7a2c48dbf4250c 1031324 
libbitcoinconsensus0-dbgsym_0.13.1-0.1_amd64.deb
 41112782b454db9e5c16cb35f73530fe6bc20a0e 227810 
libbitcoinconsensus0_0.13.1-0.1_amd64.deb
Checksums-Sha256:
 ef29c5724b9b42dee3d25e49516f6522394965f2de4340a9187485f16a08127f 2644 
bitcoin_0.13.1-0.1.dsc
 97d4a1aea7aed957e76f8f5e6ba2a2bfc66c1fcbdaf76ee46bd0650e5957eaa9 5952081 
bitcoin_0.13.1.orig.tar.gz
 e1c55196e6b6172ba40a7f7be8e3587d5155b2a493529a7070a35b08a4c45a5d 36400 
bitcoin_0.13.1-0.1.debian.tar.xz
 ecd3be3d2c0bea654ffb4fd0ff129d0bf9fdc9f2a2e4313971cc08de60410693 41668944 
bitcoin-qt-dbgsym_0.13.1-0.1_amd64.deb
 ef0c1cd32ef1846c1959423d0428e28c719a3f29b28906c136697b9278124ae0 3108510 
bitcoin-qt_0.13.1-0.1_amd64.deb
 7efb11fc2409b7ac7b40d00e42e051366c156bc65388ebf20b877b280edd0387 4544926 
bitcoin-tx-dbgsym_0.13.1-0.1_amd64.deb
 80b87121e880465fedcfb65470e5f7b10d75577efc543309016de27dae3b57e4 409546 
bitcoin-tx_0.13.1-0.1_amd64.deb
 1681a726b6213b2fbeebad37b5be8039b53f88f52e29851073c2454c4278bece 29081084 
bitcoind-dbgsym_0.13.1-0.1_amd64.deb
 4c089bb307efc40a1935c99011e045872dfd2197fa0ff286597484ee0ce1a230 1489210 
bitcoind_0.13.1-0.1_amd64.deb
 b81c306ca7ddc6f006153219e27f3f307051171237713556c5f6d5536ddc6068 145638 
libbitcoinconsensus-dev_0.13.1-0.1_amd64.deb
 0eaf9aaff38d2524d30abc3caad3b47ba058e4ee9a30907938b8dc74f500c15e 1031324 
libbitcoinconsensus0-dbgsym_0.13.1-0.1_amd64.deb
 649c39da20d33376060ae1540eee94a4072eecc3055901c19e99252c9e6d61cf 227810 
libbitcoinconsensus0_0.13.1-0.1_amd64.deb
Files:
 853bb7d9acb7953cdd8348bddf074c29 2644 utils optional bitcoin_0.13.1-0.1.dsc
 3ccb66404e6da9b995a607de997ca3bf 5952081 utils optional 
bitcoin_0.13.1.orig.tar.gz
 5e2eb44d9a52ce20ff8f031b8e25a230 36400 utils optional 
bitcoin_0.13.1-0.1.debian.tar.xz
 33b4b357d6f88218de73b5ca41b4c596 41668944 debug extra 
bitcoin-qt-dbgsym_0.13.1-0.1_amd64.deb
 849b33e1a89b3026ea4cedc2bba8368a 3108510 utils optional 
bitcoin-qt_0.13.1-0.1_amd64.deb
 31ac38c96e58441bf4f1935d11340a53 4544926 debug extra 
bitcoin-tx-dbgsym_0.13.1-0.1_amd64.deb
 e3cf387d078bd33584b765e687e8b4f7 409546 utils optional 
bitcoin-tx_0.13.1-0.1_amd64.deb
 23e7b31d87dcd0b402a99a8d9e1f20da 29081084 debug extra 
bitcoind-dbgsym_0.13.1-0.1_amd64.deb
 bc990053ce218f978d123159d11f05c6 1489210 utils optional 
bitcoind_0.13.1-0.1_amd64.deb
 d808c281bc7f7c1d868271b08f0cb952 145638 libdevel optional 
libbitcoinconsensus-dev_0.13.1-0.1_amd64.deb
 5127293117ce244684f4ba415f1ac709 1031324 debug extra 
libbitcoinconsensus0-dbgsym_0.13.1-0.1_amd64.deb
 3cf4686c30e2dbb2e1e8e9bf41a8d01b 227810 libs optional 
libbitcoinconsensus0_0.13.1-0.1_amd64.deb

-BEGIN PGP SIGNATURE-

iQIvBAEBCAAZBQJYEs/nEhxhakBlcmlzaWFuLmNvbS5hdQAKCRBhd7NVgqjYplB8
D/9Dx/FjX+LbqFreA7W1K6eJuRra2QBEKbS6FKWLZgtpVbmjpMzYiu+MaAUOI9AT
sKslc7ByMeXusU4xzBF4PkOWsWU1zs6PH7dwUuCfg19mDFRPbV9HMZ4w94Tpmetm
Im0QITh12OCaEqYXKlB4DD2RIXZUtXrSYnZSZwAzPwI+/KDhzZ69jXKODnnv/9P8
N4520Xblb8C8j3Reufm61C5EPWszod22IYUkF85UW1lyXf3CqHR9zWXpPeUto6kZ
f3QJrZ8xNjXZCkpAlfaoAM3ELmddYsBnktG4zVRGRm2I+2oIx1GRezJwK5LjkPUs
ajQt7SdPAjGfH59FK

Accepted bitcoin 0.13.1-0.1~exp1 (source amd64) into experimental

2016-10-27 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Thu, 27 Oct 2016 18:30:35 +1000
Source: bitcoin
Binary: bitcoind bitcoin-qt bitcoin-tx libbitcoinconsensus0 
libbitcoinconsensus-dev
Architecture: source amd64
Version: 0.13.1-0.1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Bitcoin Packaging Team 
<pkg-bitcoin-de...@lists.alioth.debian.org>
Changed-By: Anthony Towns <a...@erisian.com.au>
Description:
 bitcoin-qt - peer-to-peer network based digital currency - GUI
 bitcoin-tx - peer-to-peer network based digital currency - transaction tool
 bitcoind   - peer-to-peer network based digital currency - daemon
 libbitcoinconsensus-dev - bitcoin blockchain library development files
 libbitcoinconsensus0 - bitcoin blockchain library
Closes: 841706
Changes:
 bitcoin (0.13.1-0.1~exp1) experimental; urgency=medium
 .
   * Non-maintainer upload.
   * New upstream release.
   * Patch for -latomic is included upstream, so drop Debian-specific patch.
   * Add semi-colons for hppa patch. (Closes: Bug#841706)
Checksums-Sha1:
 baeaea8a8f1cad6661a76c82645ba32a6d8abf04 2664 bitcoin_0.13.1-0.1~exp1.dsc
 c61dbb3a89d452e83e4ce454ee677c64dfda46b3 5952081 bitcoin_0.13.1.orig.tar.gz
 7269bb1077ef411e12e31cd3d4d0b89fd7a61bd3 36420 
bitcoin_0.13.1-0.1~exp1.debian.tar.xz
 005114adba249b32cc9ee79e767065b4007bb452 41668938 
bitcoin-qt-dbgsym_0.13.1-0.1~exp1_amd64.deb
 54bea9794c8f9c1eef331118a62818f3afef48f1 3108576 
bitcoin-qt_0.13.1-0.1~exp1_amd64.deb
 3e2a23b1e89ec8861f5472475aed08b0daa9b5b5 4544932 
bitcoin-tx-dbgsym_0.13.1-0.1~exp1_amd64.deb
 7814f0e4c6048bfb2856623303a31c675aa73cca 409470 
bitcoin-tx_0.13.1-0.1~exp1_amd64.deb
 b5aeaa1b8ecb2ae9e15c240ed81a6eac7b2fb500 29081088 
bitcoind-dbgsym_0.13.1-0.1~exp1_amd64.deb
 a2c7481b1f7718fe706aa3c60a3ad290078fd930 1489690 
bitcoind_0.13.1-0.1~exp1_amd64.deb
 fe0ea12e1f47360f8cb6c25f0ea12f5bf1942067 145838 
libbitcoinconsensus-dev_0.13.1-0.1~exp1_amd64.deb
 f73d0ae4892172d042c75f101d61af3e55fdf0d1 1031328 
libbitcoinconsensus0-dbgsym_0.13.1-0.1~exp1_amd64.deb
 bfd8ba34b7d37ce323ecfc2ea3533363ba18d413 227752 
libbitcoinconsensus0_0.13.1-0.1~exp1_amd64.deb
Checksums-Sha256:
 95bc0c047779ce5bad0f5ca83c140fe15e2cd864098ab544f97a7d593c7d69bf 2664 
bitcoin_0.13.1-0.1~exp1.dsc
 97d4a1aea7aed957e76f8f5e6ba2a2bfc66c1fcbdaf76ee46bd0650e5957eaa9 5952081 
bitcoin_0.13.1.orig.tar.gz
 c8a909c695d2ce85ecb4a7f601b1ce4c38b3db8bb5d36bb4c2fdb28be311db98 36420 
bitcoin_0.13.1-0.1~exp1.debian.tar.xz
 900477d1c923f7969309fc227e974747bebd0b92f88369fc5eee523d18ea9d3c 41668938 
bitcoin-qt-dbgsym_0.13.1-0.1~exp1_amd64.deb
 78f505268bb52ef73d1b9f43dcbcd5eb1603349a4303857a9a71f5bacfff0b35 3108576 
bitcoin-qt_0.13.1-0.1~exp1_amd64.deb
 3f1d9f1fd01910568ced5353a8f8f3212a56dd688d504cc95a4ed721f72cba59 4544932 
bitcoin-tx-dbgsym_0.13.1-0.1~exp1_amd64.deb
 c9723f1655b74e7b95c51dbf656c8470121d89cb3db30bde0b59f8c1592a159b 409470 
bitcoin-tx_0.13.1-0.1~exp1_amd64.deb
 b29179f62c5d5b1b749f03a817b08c6ecb04cda9ab8bd211ff6ea201313dedc3 29081088 
bitcoind-dbgsym_0.13.1-0.1~exp1_amd64.deb
 7600b5714ed29b3adca47f140e9465c7cf0f89e4ce20447835ce177f327a620a 1489690 
bitcoind_0.13.1-0.1~exp1_amd64.deb
 fad1ec817262c1feabb5acffd2dc7a99619f922ae426b84eedaed314e90f5428 145838 
libbitcoinconsensus-dev_0.13.1-0.1~exp1_amd64.deb
 7b8354a16d7d3ce986c63d9c9f4d1f03bc9d262c7d634308e28ee8e96a6fa603 1031328 
libbitcoinconsensus0-dbgsym_0.13.1-0.1~exp1_amd64.deb
 914c5d5c495bef901f41415120126088c3351dde64439b38a7dd51a9d09e1627 227752 
libbitcoinconsensus0_0.13.1-0.1~exp1_amd64.deb
Files:
 88ea7c7b46fe27a37187e94daef1eadb 2664 utils optional 
bitcoin_0.13.1-0.1~exp1.dsc
 3ccb66404e6da9b995a607de997ca3bf 5952081 utils optional 
bitcoin_0.13.1.orig.tar.gz
 5ceee3cf1de48c600c838b9fd15a0d87 36420 utils optional 
bitcoin_0.13.1-0.1~exp1.debian.tar.xz
 b19d09554c54f418c53cb354c9a097cb 41668938 debug extra 
bitcoin-qt-dbgsym_0.13.1-0.1~exp1_amd64.deb
 1dc4e47c65bb9ab279ded04afb3ee5b9 3108576 utils optional 
bitcoin-qt_0.13.1-0.1~exp1_amd64.deb
 0799536f4b61693184fce15b570e0eb2 4544932 debug extra 
bitcoin-tx-dbgsym_0.13.1-0.1~exp1_amd64.deb
 35efba74233f9d02c8a28f52c95e997e 409470 utils optional 
bitcoin-tx_0.13.1-0.1~exp1_amd64.deb
 17f5d5dcd6868d624e1aaf119d675888 29081088 debug extra 
bitcoind-dbgsym_0.13.1-0.1~exp1_amd64.deb
 834bca9502ff0f15cef7525132520168 1489690 utils optional 
bitcoind_0.13.1-0.1~exp1_amd64.deb
 1524333cec99065ba261ff6868f9d941 145838 libdevel optional 
libbitcoinconsensus-dev_0.13.1-0.1~exp1_amd64.deb
 bc1bcc53193db5d5964a7d074ec47abb 1031328 debug extra 
libbitcoinconsensus0-dbgsym_0.13.1-0.1~exp1_amd64.deb
 e613bb39dbd834fcaad4ec1932520a84 227752 libs optional 
libbitcoinconsensus0_0.13.1-0.1~exp1_amd64.deb

-BEGIN PGP SIGNATURE-

iQIvBAEBCAAZBQJYEb78EhxhakBlcmlzaWFuLmNvbS5hdQAKCRBhd7NVgqjYpkdr
EADAoZALLRTXh6QuahjiWP/im2kBe0ryknDeHngRM1ky+XGT+/wXfC6xaWmnNz/9
NsMO6cOug+cizweGrRKQgAuOzZ2pCGE3uXmLp7/rgaGUsEkg/5HV

Accepted bitcoin 0.13.0-0.1 (source amd64) into unstable

2016-10-21 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 21 Oct 2016 17:13:13 +1000
Source: bitcoin
Binary: bitcoind bitcoin-qt bitcoin-tx libbitcoinconsensus0 
libbitcoinconsensus-dev
Architecture: source amd64
Version: 0.13.0-0.1
Distribution: unstable
Urgency: medium
Maintainer: Debian Bitcoin Packaging Team 
<pkg-bitcoin-de...@lists.alioth.debian.org>
Changed-By: Anthony Towns <a...@erisian.com.au>
Description:
 bitcoin-qt - peer-to-peer network based digital currency - GUI
 bitcoin-tx - peer-to-peer network based digital currency - transaction tool
 bitcoind   - peer-to-peer network based digital currency - daemon
 libbitcoinconsensus-dev - bitcoin blockchain library development files
 libbitcoinconsensus0 - bitcoin blockchain library
Closes: 835809 835963
Changes:
 bitcoin (0.13.0-0.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * New upstream release.
   * Allow compilation with gcc/g++ 6. (Closes: Bug#835963)
   * Additional fixes for openssl 1.1 compatibility. (See Bug#828248)
   * Check if -latomic is needed (it is on mips*).
   * Remove reproducible build patch, since leveldb build system is
 no longer used in 0.13. (See Bug#791834)
   * Update description since the blockchain is much more than "several GB"
 now. (Closes: Bug#835809)
Checksums-Sha1:
 a3ced73480eed55f6c8af6949631503c2ff56001 2644 bitcoin_0.13.0-0.1.dsc
 4a8b138aabfd14ba8ddd06f93995e9ad6173c58d 5833967 bitcoin_0.13.0.orig.tar.gz
 ec48767d1373a71575ea612c839b788d97ea3df1 36340 bitcoin_0.13.0-0.1.debian.tar.xz
 ebded62d643e4e204fd943d9b52bfc825d2683bd 41595874 
bitcoin-qt-dbgsym_0.13.0-0.1_amd64.deb
 32e3865ec5c2a691852ec3a6267adf2daa449132 3039502 
bitcoin-qt_0.13.0-0.1_amd64.deb
 a031f96468b2b500a00677a85df22026cb1c266a 4532406 
bitcoin-tx-dbgsym_0.13.0-0.1_amd64.deb
 6f4163c4a1dcaac5758b31254afc257fc5d5ae3c 416768 bitcoin-tx_0.13.0-0.1_amd64.deb
 7b6b879fbd324ade47d2f10ade0188b8c18f824d 29012436 
bitcoind-dbgsym_0.13.0-0.1_amd64.deb
 2bf5f8c30e098291748bb6e97041c547bac01460 1490796 bitcoind_0.13.0-0.1_amd64.deb
 5118448adea390331c6688d01c9c7e1ddda1f444 154646 
libbitcoinconsensus-dev_0.13.0-0.1_amd64.deb
 68dcc152e4bb319069d4c140063c75de309c4238 1028458 
libbitcoinconsensus0-dbgsym_0.13.0-0.1_amd64.deb
 43ca6a532d41d70d764ba37498323bdff56f88e8 236572 
libbitcoinconsensus0_0.13.0-0.1_amd64.deb
Checksums-Sha256:
 51065ee03b322a17e6b18a5c3f6c7dfa0eaf628b2cd727b04e80dd3d9c6ffef4 2644 
bitcoin_0.13.0-0.1.dsc
 852581d21716b74e0539f7fd2f9c17f5506f1c21c5cec6642b0286823ba97193 5833967 
bitcoin_0.13.0.orig.tar.gz
 3b5787fdce7a86b134808b029462ba9de38c339ccdb992e1c69419f533e15121 36340 
bitcoin_0.13.0-0.1.debian.tar.xz
 72231347c08a3f87cd0884d2a2f1192cc0e97bf35385aa481e7100f785bf22ef 41595874 
bitcoin-qt-dbgsym_0.13.0-0.1_amd64.deb
 a7319a42c93a5f1b05621ac0fb42a4db9c71a10cd80079c8fbe2e6faa4d61ae7 3039502 
bitcoin-qt_0.13.0-0.1_amd64.deb
 c7f42eabfb90895857dc7d1991352709a13d09039fa5d67243e6d7ec83ae3751 4532406 
bitcoin-tx-dbgsym_0.13.0-0.1_amd64.deb
 fcaf412821c720941dbac8222583819b87d8d70570659ee1d8ab4629d3b93c5a 416768 
bitcoin-tx_0.13.0-0.1_amd64.deb
 c316ca9de9851a8495bd717eb7ae190d230c71cac138d553ed9f4316feccc2c5 29012436 
bitcoind-dbgsym_0.13.0-0.1_amd64.deb
 fab005cb41692905204b62496323ecd79f610569bed62b0e1c8fff8f2c4c560f 1490796 
bitcoind_0.13.0-0.1_amd64.deb
 2e0db1db01f8885add189086bcede5b5f06923d5aa1fa1ea61e3e5435f6c7e50 154646 
libbitcoinconsensus-dev_0.13.0-0.1_amd64.deb
 ab9af99e88f2b60c639cf070fb8f76d37e6dfb8cc9ab3da0fcfd532b5b488012 1028458 
libbitcoinconsensus0-dbgsym_0.13.0-0.1_amd64.deb
 76752fc018a651a214986afe92eda998d150e43254c416e33ffd9c298622772f 236572 
libbitcoinconsensus0_0.13.0-0.1_amd64.deb
Files:
 9f65a79769d8a751217308acb4b99df6 2644 utils optional bitcoin_0.13.0-0.1.dsc
 1cee144c1a359d0f202be401744f9be7 5833967 utils optional 
bitcoin_0.13.0.orig.tar.gz
 07537ca8ad4fd60d2ad0ae65f9daaec5 36340 utils optional 
bitcoin_0.13.0-0.1.debian.tar.xz
 aa47a8fdb2c672df7fd72ee93742d32e 41595874 debug extra 
bitcoin-qt-dbgsym_0.13.0-0.1_amd64.deb
 706f20d238c90caca93f19a9b517fe13 3039502 utils optional 
bitcoin-qt_0.13.0-0.1_amd64.deb
 6ab6f3907a56699c7c387fa01150c3b1 4532406 debug extra 
bitcoin-tx-dbgsym_0.13.0-0.1_amd64.deb
 c692e4ff91508e7d142aeccb5aba2a0f 416768 utils optional 
bitcoin-tx_0.13.0-0.1_amd64.deb
 ceb368f316f4023b130f15a2d20abb97 29012436 debug extra 
bitcoind-dbgsym_0.13.0-0.1_amd64.deb
 ccbc02016ec48300f0ece5c103ee8241 1490796 utils optional 
bitcoind_0.13.0-0.1_amd64.deb
 447bfa0ca8eac189afeb5175f7fb5b12 154646 libdevel optional 
libbitcoinconsensus-dev_0.13.0-0.1_amd64.deb
 5b93f8867c7205255e77c6d224e3f0b8 1028458 debug extra 
libbitcoinconsensus0-dbgsym_0.13.0-0.1_amd64.deb
 d1aa706ffb8addf5b7ac0ed2ffb6bde3 236572 libs optional 
libbitcoinconsensus0_0.13.0-0.1_amd64.deb

-BEGIN PGP SIGNATURE-

iQIvBAEBCAAZBQJYCc70EhxhakBlcmlzaWFuLmNvbS5hdQAKCRBhd7NVgqjYpi5z
EADeqo1KzUdBujjZTCj0Z+xjMmldh6GLCzEvUfFSQGz1B3advylrMHXfQ

Accepted bitcoin 0.13.0-0.1~exp1 (source) into experimental

2016-08-23 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 23 Aug 2016 17:06:04 +1000
Source: bitcoin
Binary: bitcoind bitcoin-qt bitcoin-tx libbitcoinconsensus0 
libbitcoinconsensus-dev
Architecture: source
Version: 0.13.0-0.1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Bitcoin Packaging Team 
<pkg-bitcoin-de...@lists.alioth.debian.org>
Changed-By: Anthony Towns <a...@erisian.com.au>
Description:
 bitcoin-qt - peer-to-peer network based digital currency - GUI
 bitcoin-tx - peer-to-peer network based digital currency - transaction tool
 bitcoind   - peer-to-peer network based digital currency - daemon
 libbitcoinconsensus-dev - bitcoin blockchain library development files
 libbitcoinconsensus0 - bitcoin blockchain library
Changes:
 bitcoin (0.13.0-0.1~exp1) experimental; urgency=medium
 .
   * Non-maintainer upload.
   * New upstream release.
   * Allow compilation with gcc/g++ 6. (See Bug#812275)
   * Additional fixes for openssl 1.1 compatibility. (See Bug#828248)
   * Check if -latomic is needed (it is on mips*).
Checksums-Sha1:
 b142ffe6882e1262b6c7f82dac646ee2c345f733 2664 bitcoin_0.13.0-0.1~exp1.dsc
 4a8b138aabfd14ba8ddd06f93995e9ad6173c58d 5833967 bitcoin_0.13.0.orig.tar.gz
 aee08daf9f8eb825f936e6f1788ba43c30ffaf0e 36296 
bitcoin_0.13.0-0.1~exp1.debian.tar.xz
Checksums-Sha256:
 f316eddbf878ca5986a96f536d5704ec0b7bf978f39d77859da7943b9066bbb8 2664 
bitcoin_0.13.0-0.1~exp1.dsc
 852581d21716b74e0539f7fd2f9c17f5506f1c21c5cec6642b0286823ba97193 5833967 
bitcoin_0.13.0.orig.tar.gz
 537b7b24f1e6426665d3110bbc7c5317c2be86782865197ef01362c9465b33c7 36296 
bitcoin_0.13.0-0.1~exp1.debian.tar.xz
Files:
 a17260514f2afca1e6e196ce4ddeee11 2664 utils optional 
bitcoin_0.13.0-0.1~exp1.dsc
 1cee144c1a359d0f202be401744f9be7 5833967 utils optional 
bitcoin_0.13.0.orig.tar.gz
 8ac5a4062cf3160cb7956b48afff71be 36296 utils optional 
bitcoin_0.13.0-0.1~exp1.debian.tar.xz

-BEGIN PGP SIGNATURE-
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=5xLe
-END PGP SIGNATURE-



Accepted bitcoin 0.13.0~rc3-0.1 (source amd64) into experimental

2016-08-22 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 20 Aug 2016 02:22:48 +1000
Source: bitcoin
Binary: bitcoind bitcoin-qt bitcoin-tx libbitcoinconsensus0 
libbitcoinconsensus-dev
Architecture: source amd64
Version: 0.13.0~rc3-0.1
Distribution: experimental
Urgency: medium
Maintainer: Debian Bitcoin Packaging Team 
<pkg-bitcoin-de...@lists.alioth.debian.org>
Changed-By: Anthony Towns <a...@erisian.com.au>
Description:
 bitcoin-qt - peer-to-peer network based digital currency - GUI
 bitcoin-tx - peer-to-peer network based digital currency - transaction tool
 bitcoind   - peer-to-peer network based digital currency - daemon
 libbitcoinconsensus-dev - bitcoin blockchain library development files
 libbitcoinconsensus0 - bitcoin blockchain library
Changes:
 bitcoin (0.13.0~rc3-0.1) experimental; urgency=medium
 .
   * Non-maintainer upload.
   * New upstream release candidate.
   * Allow compilation with gcc/g++ 6. (See Bug#812275)
   * Additional fixes for openssl 1.1 compatibility. (See Bug#828248)
Checksums-Sha1:
 9ba03e29e8ec6a4576545a2881eb1fa36b9b8c94 2672 bitcoin_0.13.0~rc3-0.1.dsc
 ae1c6fe94b12097404fbdb8facc9e4df0e899f4e 5834659 bitcoin_0.13.0~rc3.orig.tar.gz
 f6cb6200e4935fbc9796356e8abcfb7c02f8b06b 35612 
bitcoin_0.13.0~rc3-0.1.debian.tar.xz
 6c121b1854e2412ac9076f1fc7ffee0c7c0549cd 41424204 
bitcoin-qt-dbgsym_0.13.0~rc3-0.1_amd64.deb
 fdfed68f66ff1afc26ca3d30ba9c6e8e233e29d0 3036730 
bitcoin-qt_0.13.0~rc3-0.1_amd64.deb
 de57cfe28c1f09292534075f247359bb39d10ee8 4522328 
bitcoin-tx-dbgsym_0.13.0~rc3-0.1_amd64.deb
 03dcce1af21162107ea7a1537cd8c8c4d9d8fbe5 416240 
bitcoin-tx_0.13.0~rc3-0.1_amd64.deb
 602bce1aa21d7f44fda2452dae0d372adcda6846 28917178 
bitcoind-dbgsym_0.13.0~rc3-0.1_amd64.deb
 d57f1cfc40a1667c7ee626183be76121621e3aad 1490110 
bitcoind_0.13.0~rc3-0.1_amd64.deb
 867212a94b535176428efd0ce7da07e1f5b5c694 153914 
libbitcoinconsensus-dev_0.13.0~rc3-0.1_amd64.deb
 a2bbcb3db30702b6eb29827a9d2d13566a120747 1028630 
libbitcoinconsensus0-dbgsym_0.13.0~rc3-0.1_amd64.deb
 401b670743cfeaccc94ed8523b0782e891df54a0 236156 
libbitcoinconsensus0_0.13.0~rc3-0.1_amd64.deb
Checksums-Sha256:
 84aeb3e5998603a7f4a243fc34c03acc0782f8020a98e4a5e19bb243cf858c85 2672 
bitcoin_0.13.0~rc3-0.1.dsc
 8a942cb976227cff83af12f9ce1a7c6bf9d9cbc5d31c8e07ee2a4c04271e0d58 5834659 
bitcoin_0.13.0~rc3.orig.tar.gz
 a464fe5477b83bafa507d1045c96b2ba8df1797836a68a3a5dbacc11b08f8b5d 35612 
bitcoin_0.13.0~rc3-0.1.debian.tar.xz
 dbca2b12acb1ee4874e155698b689dcf86da59f48334b20f6a7890b2e3320277 41424204 
bitcoin-qt-dbgsym_0.13.0~rc3-0.1_amd64.deb
 ec7e73fc0cc074b9a06a0a05c236489da8af08a3ad5c62ebec3943b6ccbf821a 3036730 
bitcoin-qt_0.13.0~rc3-0.1_amd64.deb
 b264556b6e05a7bba6d21bfe4f1538dcd6bafac87ca1bfe99e2d5d604156711c 4522328 
bitcoin-tx-dbgsym_0.13.0~rc3-0.1_amd64.deb
 c0bc8a1b8336d50e1c97a2b8195fd97e40fd9fb8e6ca3ef4d4a4927918304d16 416240 
bitcoin-tx_0.13.0~rc3-0.1_amd64.deb
 1942781b71ecd838d7cf3e248621177beaf8342c26904656feae510edb8d14cc 28917178 
bitcoind-dbgsym_0.13.0~rc3-0.1_amd64.deb
 7d6b3461094072682179e6bd1fc5ef267a68aab003f27528d4083feaa71fdc4d 1490110 
bitcoind_0.13.0~rc3-0.1_amd64.deb
 6ebd9f5fa30eafbe542fefdbf8ffa0f6da99e08b6ab2357b818075597504c61a 153914 
libbitcoinconsensus-dev_0.13.0~rc3-0.1_amd64.deb
 d905ee755e3b2ecf5bfe591f6faf537595ddcdfa40d4dacecff0cd947bd452e6 1028630 
libbitcoinconsensus0-dbgsym_0.13.0~rc3-0.1_amd64.deb
 00bba66eb7522511408241542519941a050371d6ebdfcf59b10ea433c5bbdfea 236156 
libbitcoinconsensus0_0.13.0~rc3-0.1_amd64.deb
Files:
 b0187be51a5cd86c46add786f21ad620 2672 utils optional bitcoin_0.13.0~rc3-0.1.dsc
 b3b845729531145be9bebbe5ec136fb0 5834659 utils optional 
bitcoin_0.13.0~rc3.orig.tar.gz
 33ad067e0eb25fbfde353f2ad1ab9d04 35612 utils optional 
bitcoin_0.13.0~rc3-0.1.debian.tar.xz
 7b1502ce0feb515bc101f4e4ca4be372 41424204 debug extra 
bitcoin-qt-dbgsym_0.13.0~rc3-0.1_amd64.deb
 ae27fb8ef1ecd6e444c902f68d43eaff 3036730 utils optional 
bitcoin-qt_0.13.0~rc3-0.1_amd64.deb
 abd456e9bce8b9077710838ea9b1f92a 4522328 debug extra 
bitcoin-tx-dbgsym_0.13.0~rc3-0.1_amd64.deb
 7edf70faaa0b5515dc0701d1cab999cb 416240 utils optional 
bitcoin-tx_0.13.0~rc3-0.1_amd64.deb
 a3906f34f05937cfef557b473cd4f605 28917178 debug extra 
bitcoind-dbgsym_0.13.0~rc3-0.1_amd64.deb
 921b1fed330e469693b72411a22fd67b 1490110 utils optional 
bitcoind_0.13.0~rc3-0.1_amd64.deb
 f09a040af9def4edadeaae369a43c0cd 153914 libdevel optional 
libbitcoinconsensus-dev_0.13.0~rc3-0.1_amd64.deb
 949869909dab8bc2bb04ff56ca984cea 1028630 debug extra 
libbitcoinconsensus0-dbgsym_0.13.0~rc3-0.1_amd64.deb
 95228f239be75ec2a46257bd886ff117 236156 libs optional 
libbitcoinconsensus0_0.13.0~rc3-0.1_amd64.deb

-BEGIN PGP SIGNATURE-

iQIvBAEBCAAZBQJXt0IHEhxhakBlcmlzaWFuLmNvbS5hdQAKCRBhd7NVgqjYpvoX
EADHvxUPLC8Q6I11GTANKV4bHbzMlDXGQobQkscFCO146u0+KgYp7N3Nr6COK0D/
XJMhZTRSFXqD1KIg6PjO9bveJOB5BQHENpr18kPyU6uvwFGbPM3aZCZTqOLz/uOK
aebr86UdnvPTMO+h4ZqkMOrJwJ4nep+coy1OuxIXuHkWgdIKB1MxjsF8KN

Accepted bitcoin 0.12.1-0.1 (source amd64) into unstable

2016-08-22 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 19 Aug 2016 18:48:51 +1000
Source: bitcoin
Binary: bitcoind bitcoin-qt bitcoin-tx libbitcoinconsensus0 
libbitcoinconsensus-dev
Architecture: source amd64
Version: 0.12.1-0.1
Distribution: unstable
Urgency: medium
Maintainer: Debian Bitcoin Packaging Team 
<pkg-bitcoin-de...@lists.alioth.debian.org>
Changed-By: Anthony Towns <a...@erisian.com.au>
Description:
 bitcoin-qt - peer-to-peer network based digital currency - GUI
 bitcoin-tx - peer-to-peer network based digital currency - transaction tool
 bitcoind   - peer-to-peer network based digital currency - daemon
 libbitcoinconsensus-dev - bitcoin blockchain library development files
 libbitcoinconsensus0 - bitcoin blockchain library
Closes: 791834 808969 812275 822203 828248
Changes:
 bitcoin (0.12.1-0.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * New upstream release. (Closes: Bug#822203)
   * Remove cdbs from debian/rules, add debian/copyright-check to help
 with updating debian/copyright info (Closes: Bug#808969)
   * Update dependencies to qt5.
   * Add dependency on libdevent-dev.
   * Add dependency on libzmq for ZeroMQ support.
   * Force use of gcc/g++ 5. (Closes: Bug#812275)
   * Compatibility patch for OpenSSL 1.1 opaque types. (Closes: Bug#828248)
   * Apply reproducible build patch from Reiner Herrmann. (Closes: Bug#791834)
   * Bump standards version.
Checksums-Sha1:
 75fec1287e7909f8083d67d9764c173f94acef88 2658 bitcoin_0.12.1-0.1.dsc
 a4aa233bf4587169925c6b7c1dfc288ef3b0bc40 6751284 bitcoin_0.12.1.orig.tar.gz
 342640f62053156d912ebff69300dd944f6789f3 35548 bitcoin_0.12.1-0.1.debian.tar.xz
 f14f4db09b5071c708d5012122311e6eae8fef85 34998476 
bitcoin-qt-dbgsym_0.12.1-0.1_amd64.deb
 8bd4a93f7f617c50e7b5b71d7de3c3cc56fc8789 3699984 
bitcoin-qt_0.12.1-0.1_amd64.deb
 645eb920ad20fbba5ef0f7a65cd933440d24773c 3777508 
bitcoin-tx-dbgsym_0.12.1-0.1_amd64.deb
 e62b1be2378c83d2a33c1ead35074eccd7baad2b 388430 bitcoin-tx_0.12.1-0.1_amd64.deb
 6c916b63946fcf706a10f4845db23c2f11659f83 24958558 
bitcoind-dbgsym_0.12.1-0.1_amd64.deb
 ff98c6ccbf22fbd2cef17e52503a5c7dd62ffbb8 1481674 bitcoind_0.12.1-0.1_amd64.deb
 df1aa04172cbb3bbfccb920d6c972a62929195cf 110360 
libbitcoinconsensus-dev_0.12.1-0.1_amd64.deb
 b2ce67955e14ba54b07ca62263ecbe4eb6428337 647630 
libbitcoinconsensus0-dbgsym_0.12.1-0.1_amd64.deb
 b47fabe1864f8d307f4fe640872c4f149566417e 195320 
libbitcoinconsensus0_0.12.1-0.1_amd64.deb
Checksums-Sha256:
 485b8b526357d429ac9c638099e0b0ac555261a6bae2b92a72a56c06dfb358ab 2658 
bitcoin_0.12.1-0.1.dsc
 7bdc287575067461c123e1afcb48843f9f78eb5e6cac95b413e2e09f1f7fc7bd 6751284 
bitcoin_0.12.1.orig.tar.gz
 9e1632e375aec3c6cc3848ba17a1ecd4918f9a359352b555cfc0e621e3bc8751 35548 
bitcoin_0.12.1-0.1.debian.tar.xz
 25a321e39a228835d21a4916f93da09f6f4819c38c75008064829e0e1d53df57 34998476 
bitcoin-qt-dbgsym_0.12.1-0.1_amd64.deb
 9814bd1b8317742b2d3ed7e3974f2a0df3ccf1d0051652709b34491ca046def9 3699984 
bitcoin-qt_0.12.1-0.1_amd64.deb
 100078b351be7c13c69e39342f140653f83ebf3c26efad0ef8819e2a79a09acb 3777508 
bitcoin-tx-dbgsym_0.12.1-0.1_amd64.deb
 72b4f57b02d8f67b53b865c6145e71b6dcf6b49acac763d01430d076ffd58482 388430 
bitcoin-tx_0.12.1-0.1_amd64.deb
 6909953b723a9070263d610fdd1f6fc2bf68c9b4e3a2874d6bfe11a07bb5a292 24958558 
bitcoind-dbgsym_0.12.1-0.1_amd64.deb
 8c5c6821619de58c5bbdcca73c528505f069846c9443b6a26ce59910346e576d 1481674 
bitcoind_0.12.1-0.1_amd64.deb
 9f1406ca35381480fdce5843659261c226c834e5476100a4402b61f02b2e1c62 110360 
libbitcoinconsensus-dev_0.12.1-0.1_amd64.deb
 211cf805889b14480917d4bd72dfa9b4c3de18f206782d908d922c77362b0118 647630 
libbitcoinconsensus0-dbgsym_0.12.1-0.1_amd64.deb
 72498af83bf62082ff91eebadaf4b877b96995f60e95add4338d28452587ab80 195320 
libbitcoinconsensus0_0.12.1-0.1_amd64.deb
Files:
 a25660598381e536b6c054bc7b78424b 2658 utils optional bitcoin_0.12.1-0.1.dsc
 94229fa506422290e60b215055f74434 6751284 utils optional 
bitcoin_0.12.1.orig.tar.gz
 22a282327dc92e0705d5c2898fd886f4 35548 utils optional 
bitcoin_0.12.1-0.1.debian.tar.xz
 3aeb964d16a0e0532acabb5a64e3b74f 34998476 debug extra 
bitcoin-qt-dbgsym_0.12.1-0.1_amd64.deb
 ebe889cfbe5637268d68a3cf43809d55 3699984 utils optional 
bitcoin-qt_0.12.1-0.1_amd64.deb
 f663b095a6b9e436affda21d018bfa72 3777508 debug extra 
bitcoin-tx-dbgsym_0.12.1-0.1_amd64.deb
 9b7e9c58877c78853dc9e8da28a0f3af 388430 utils optional 
bitcoin-tx_0.12.1-0.1_amd64.deb
 7e2e84404a99a27c41286ee176556b21 24958558 debug extra 
bitcoind-dbgsym_0.12.1-0.1_amd64.deb
 da27283e1575a603eac630f52b6d2e67 1481674 utils optional 
bitcoind_0.12.1-0.1_amd64.deb
 65a19912d02346d6b80b52b7e28a1765 110360 libdevel optional 
libbitcoinconsensus-dev_0.12.1-0.1_amd64.deb
 b541386f5b52dc89933c75c78fbb4999 647630 debug extra 
libbitcoinconsensus0-dbgsym_0.12.1-0.1_amd64.deb
 7ee55a71f36196478b9c9bace01ff3fd 195320 libs optional 
libbitcoinconsensus0_0.12.1-0.1_amd64.deb

-BEGIN PGP SIGNATURE-

iQIvBAE

Re: DAK Commands for Bikesheds

2015-09-20 Thread Anthony Towns
On Thu, Sep 17, 2015 at 01:42:58PM +0200, Joerg Jaspert wrote:
> Please check if I forgot something obvious or if there is some big error
> in it. Patches/git trees to merge from/... are welcome.

dcut from dput-ng uses $login-$timestamp rather than "EPOCH" per se. Does
this actually matter, or is it just convention though?

] The file needs to be signed by a valid key from the Debian uploader
] keyrings.

Does the $login in the filename have to correspond to the signing
key? Ditto the Uploader: field?

] This file has to be uploaded to ftp.upload.debian.org.

I presume dak-commands will be queue-able if anyone updates
queued? There's nothing fundamental preventing it, right?

-1 on abbreviated command names fwiw; it's a text file so

  Action: create-bikeshed

seems fine to me. I'd be a little inclined to have "bikeshed-create"
personally, YMMV obviously. "update-bikeshed-acl" or "bikeshed-acl"
or similar might be clearer than "access-bikeshed".

I kind of think "Bikeshed: foo" might be better than "Name: foo" ?
We have "Package: foo" not "Name: foo" in the Packages file, eg.

] if the name conflicts with an existing bikeshed a
] random string will be appended to it.

Outright rejection would be better here, IMO. The user can always add
a random string themselves if that's what they actually want.

] Package: A name of a source package to import from the base-suite.
] Repeat as often as needed.

That's unusual. Is having multiple packages on a single header also
valid? eg:

  Package: glibc, systemd, sysvinit

?

If "Master:" is specified, is the uploader implicitly considered a
master as well, or do they need to specify themselves? (It seems they
are implicitly considered a master when updating the bikeshed's ACLs)
I would have thought "Owner:" would make more sense than "Master:" fwiw.

] including dropping a bikeshed

(Demolishing would be a more amusing verb :)

(Likewise, "modify-bs" should clearly be "paint-bikeshed" given it only
changes things that have no technical effect...)

For the "Master" and "Uploader" fields, it would probably be nice if
you could specify DDs by uid instead of just fingerprint. (Especially
so that updates to the keyring were automatically reflected in bikeshed
permissions)

] (eg., DMs need an ACL set for their package).

It seems like it would be good to have some way of letting a DM hack on a
package that they can't do in unstable -- ie, where they can practice,
or demo their ideas, etc. This might be handy for "summer of code"
projects for example.

I wonder if it might be better to have two permissions arrangements: (a)
don't specify any fingerprints, and anyone who can upload to unstable
can upload to the bikeshed (same ACLs for DMs), or (b) do specify
fingerprints, and those keyholders can upload anything in the bikeshed
(no ACLs for DMs), but no one else can.

Has the Auto-Update / mergeback stuff been implemented yet? It doesn't
seem like it quite makes sense as is:

] Auto-Update: True or False. Automatically update packages imported
] from the base suite, whenever they get updated in the base suite. This
] may possibly break packages uploaded directly to the bikeshed.

This option doesn't really seem useful to me -- rather than say
"base-suite: jessie; auto-update:yes", why wouldn't you say "add both
jessie and bs-my-awesome-thing to your sources.list"? If the base-suite
is testing or unstable, users will have to have testing/unstable in
their sources list anyway in order to get library dependencies most of
the time...

To me, it seems more useful to have two commands:

  Action: bikeshed-pull-from
  Bikeshed: bs-my-awesome-thing
  Suite: experimental
  Packages: apt, xorg

and

  Action: bikeshed-push-to-base
  Bikeshed: bs-my-awesome-thing

The thinking being that you'd use a bikeshed like:

  a) "bikeshed-create" -- voila, empty repo, with rules about what
 can go into it, and a base-suite for resolving dependencies

  b) "bikeshed-pull-from" -- add some packages from other suites (not
 necessarily the base-suite)

  c) upload -- add some of your own packages

  d) "bikeshed-push-to-base" -- (mergeback) move some/all of the packages
 in the bikeshed into the bikeshed's base suite

(Autobuilders would use the base-suite and the bikeshed to resolve build
dependencies; if the base-suite was a bikeshed itself, then recurse)

If "auto-update" let me say "if a new source for foo arrives in unstable,
rebuilt it in my bikeshed (with base-suite: stable) automatically",
that would be cool, but...

Are mergebacks atomic? ie if you try to mergeback 10 packages, and one of
them fails, do you get 0 merged back or 9? 0 would probably be better,
to avoid the case where the 1 that failed was a dependency of the 9
that succeeded.

] Command files allow Debian Developers to handle various archive
] related tasks without the help of a FTPMaster. 

This forbids DMs from creating bikesheds, doing any "owner" actions on a
bikeshed, and doing mergebacks, no? (That seems 

Re: DAK Commands for Bikesheds

2015-09-20 Thread Anthony Towns
On Sun, Sep 20, 2015 at 03:48:24PM +0200, Joerg Jaspert wrote:
> > That's unusual. Is having multiple packages on a single header also
> > valid? eg:
> >   Package: glibc, systemd, sysvinit
> > ?
> I think it's cleaner to have one per package tag, but its either that or
> only one line, comma-seperated. No preference here.

*shrug* No real preference here either.

> > (It seems they are implicitly considered a master when updating the
> > bikeshed's ACLs) I would have thought "Owner:" would make more sense
> > than "Master:" fwiw.
> Then you end up having multiple owners. 

I don't see a problem with that (eg, owner@bugs.d.o has multiple
recipients). But again, *shrug*.

> > For the "Master" and "Uploader" fields, it would probably be nice if
> > you could specify DDs by uid instead of just fingerprint. (Especially
> > so that updates to the keyring were automatically reflected in bikeshed
> > permissions)
> Fingerprint handling is way easier, especially when taking DMs in
> account, so that is noted, but will probably not be in the very first
> version.

I think uid handling would be pretty easy:

 - change the bikeshed_acl table from "suite, level, fingerprint"
   (level being "master" or "uploader") to "suite, level, uid, fingerprint".

 - add a "check" constraint on bikeshed_acl:
 CHECK ((uid IS NULL AND fingerprint IS NOT NULL) OR
(uid IS NOT NULL AND fingerprint IS NULL))

 - when querying fingerprints for a suite, instead of:
 SELECT fingerprint FROM bikeshed_acl WHERE suite = {} AND level = {}

   use
 SELECT COALESCE(acl.fingerprint, fp.fingerprint)
  FROM bikeshed_acl AS acl OUTER JOIN fingerprint AS fp ON
   (acl.uid = fp.uid)
 WHERE acl.suite = {} AND acl.level = {}

Happy to have another look when there's enough code to suggest an
actual patch.

> > ] (eg., DMs need an ACL set for their package).
> > It seems like it would be good to have some way of letting a DM hack on a
> > package that they can't do in unstable -- ie, where they can practice,
> > or demo their ideas, etc. This might be handy for "summer of code"
> > projects for example.
> 
> Ack.
> 
> > I wonder if it might be better to have two permissions arrangements: (a)
> > don't specify any fingerprints, and anyone who can upload to unstable
> > can upload to the bikeshed (same ACLs for DMs), or (b) do specify
> > fingerprints, and those keyholders can upload anything in the bikeshed
> > (no ACLs for DMs), but no one else can.
> 
> So basically what it is now (set no uploader and its same as for
> unstable, set fingerprints and its those), except for the "DMs need an
> ACL" is turned into "DMs don't need an ACL for a package, if listed as
> an Uploader in this bikeshed"? That would allow them to upload all
> packages to that bikeshed.
> 
> Alternative would be to add that as a third option, so one would have
> 
>  - free for all, ACLs for DMs (as unstable)
>  - free for all listed, ACLs for DMs
>  - free for all listed, no ACLs for DMs

Oh, yes! That would just be:

  Action: bikeshed-acl
  Bikeshed: bs-foo
  DM-ACLs: off
  Uploader: [dm fp]
  Uploader: [dd fp]

> The idea is to say "Make me a bikeshed of packages foo and bar, keep em
> updated with my base suite, i'm rebuilding against them everytime they
> update". It's not thinking about the end user here, that sure can add
> both suites.

In that case you actually want a bikeshed of packages foo, bar and baz;
so that you can upload baz to the bikeshed when you rebuild it, no? But
then you also get new versions of baz if you set auto-update.

But I'm not seeing the advantage over setting the base-suite and just
listing baz for your bikeshed. Everytime foo/bar changes you upload a
new baz, and the autobuilders pull the new foo/bar from your base-suite
as build-deps, and you're done.



I'm assuming that an upload to a bikeshed gets REJECTed if:

 - uploader isn't in the acl for the bikeshed
 - it's not a listed package for the bikeshed

 - it's not in the overrides for unstable (or base-suite?)
 - it fails standard corruption checks (bad tarball, lintian)
 - it has an older version that what's already in the bikeshed
 - it has an older version that what's already in the base-suit ?

> > To me, it seems more useful to have two commands:
> >   Action: bikeshed-pull-from
> >   Bikeshed: bs-my-awesome-thing
> >   Suite: experimental
> >   Packages: apt, xorg
> > and
> >   Action: bikeshed-push-to-base
> >   Bikeshed: bs-my-awesome-thing
> 
> > The thinking being that you'd use a bikeshed like:
> >   a) "bikeshed-create" -- voila, empty repo, with rules about what
> >  can go into it, and a base-suite for resolving dependencies
> >   b) "bikeshed-pull-from" -- add some packages from other suites (not
> >  necessarily the base-suite)
> >   c) upload -- add some of your own packages
> >   d) "bikeshed-push-to-base" -- (mergeback) move some/all of the packages
> >  in the bikeshed into the bikeshed's base suite
> 
> > (Autobuilders 

Re: Summary of the DebConf firmware discussion

2015-08-29 Thread Anthony Towns
On Fri, Aug 28, 2015 at 04:33:04PM +0100, Steve McIntyre wrote:
 This now means that more and more users end up enabling non-free just
 to be able to get at this firmware, which is a problem for many
 reasons.

 1. Split up non-free?
 -
 Yes - need to work out details.

(a)

I'd argue non-free is already split up -- that's what the Section:
header in the Packages file is for. That's certainly good enough for
just pulling some selection of debs out for an installer image; and it
seems like it wouldn't be too much work to use apt pinning to allow it
to prevent non-firmware from non-free from getting in. For example,
having the installer drop:

  Package: *
  Pin: release c=non-free
  Pin-Priority: -1

  Package: *
  Pin: release c=non-free,s=non-free/kernel
  Pin-Priority: 500

into /etc/apt/preferences.d/10allow-non-free-firmware. 

(Note: Pin: release s= doesn't actually work. I /think/ it could be made
to work, though maybe it shouldn't (section doesn't appear in the Release
file after all). Worst case, Pin: package section=non-free/kernel
could be made to work, I think)

(b)

In, hopefully, the mid-term, doesn't this sound like a job for bikesheds
[0]? Drop non-free (and contrib?) entirely, and have a non-free or
non-free-firmware-blob bikeshed, and have the installer-with-firmware come
as part of the bikeshed. Nothing special about non-free at all that way,
as other bikesheds could also have their own installer.

[0] aka Debian PPAs for those who aren't au fait with the new terminology

(c)

Splitting non-free into separate components (ie, so you'd
say main contrib non-free/firmware non-free/gfdl) under
ftp.debian.org/debian/dists/* would be bad though, IMO -- it makes
non-free require more attention (from archive admins, maintainers, users)
when we should be working to give non-free less attention.

 *IMPORTANT*: We need to make sure that the messaging about this split
 is clear; just because we're splitting non-free firmware out of the
 default non-free area, that doesn't mean that we're suddenly endorsing
 it as a concept!

(I think demoting non-free to one of many bikesheds would be a massive
messaging improvement here)

 2. Include non-free-firmware on official media?
 ---
 NO.

Would the following be technically feasible?

 - I want to install Debian
 - download official USB installation image
 - write it to USB stick

 - Oh, I need non-free network drivers
 - download non-free firmware
 - mount installation image
 - copy firmware onto installation image
 - umount
 - boot, install

Having installation on non-free firmware systems require a token amount
of additional work by the user would be a fairly clear indication that
non-free is bad, and it would be very clear that the official images,
and in fact, every image we produce, doesn't include non-free firmware.

 3. Advertise the unofficial firmware-included media better?
 -
 Yes.

If we advertise them, it feels like doublespeak to call them unofficial
to me. 

(Which is bad, though still better than not doing anything to prefer
fully free stuff, and also better than making it a PITA for people to
run Debian on common hardware, though, if those are the only alternatives)

 5. Anything else we can do to improve the situation?
 

I wonder if it would make sense / be interesting to do more of the
preparation work prior to the install. For instance:

   If a user's machine includes hardware that needs non-free firmware,
   maybe we could suggest known-good alternatives that would offer
   similar functionality without the problematic firmware.

If you could review this before install (on a web page, eg), and then
choose where you want the non-free stuff or free alternatves (after
browsing wiki links etc to fully inform yourself), you could download
the firmware udebs you might need and a preseeding file corresponding
to that choice, then effectively boot directly to an installed, working
system, with no further questions.

Also, having a hardware database that you could query before purchasing
a new computer would be even better, no? 

(If you added a popcon style feedback loop where install results were
uploaded back to a Debian server, you could log the time installation
took, and use that info to provide future installs onto the same hardware
with similar configurations with an *accurate* progress bar...)

Cheers,
aj



Re: Facilitating external repositories

2015-08-17 Thread Anthony Towns
On Mon, Aug 17, 2015 at 11:15:08AM +0200, David Kalnischkies wrote:
 On Sun, Aug 16, 2015 at 12:06:53PM +, Anthony Towns wrote:
 The user interface improvement might be worth it anyhow, but selling
 this as huge security improvement is just wrong, which is all I am
 against.

I think it's a practical security improvement -- having one point you
can exploit is a lot better than having four points you can exploit. 

But the desired use case is still grab stuff from someone on the Internet
that I don't know well and give it root permissions on my system,
and I don't think you can make that secure in any absolute sense.

If there's any further improvements possible, I can't think of them. :(

  With extrepos as I describe them, the steps are:
   1. You hear about a cool repo from somewhere, and are told to just
  get the example-abc123 repo.
   2. You run extrepo add example-abc123, and run apt to install the
  packages.

[3. check sigs on the key]

 That should ideally still include 3. as especially with a centralized
 site you are susceptible to end up with bad data stored under a similar
 name, like you do if you trust short keyids for gpg.

Sure. In fact, why should extrepo add display that? Is there a web
service that can work out trust paths...?

 That wasn't an all engines full stop. My initial comment on this was you
 will *eventually* need to deal with merging in the funky gui tools adding
 sources. (highlight by me).  

Ah, right -- I definitely read that as all engines full stop. My bad.

 And for the record, I think it is really
 really bad to even suggest that it is okay to ignore warnings. They are
 displayed for a reason – in that case there is a fair chance the user
 meant to configure another source but actually didn't.

Yes, in real use, definitely. I've been kindof focussing on an absolute
minimum viable solution. There are another few bits I've been handwaving
over too for the record:

 - updating a repo (if it needs a new key or new url) is impossible
   as far as I've described

 - there's no way to relate repos (jessie vs wheezy base; stable vs
   dev versions; canonical site vs mirror)

 - providing a search function on extrepos.debian.net might be actively
   /harmful/ for security (ie, it'd be hard to avoid malicious repo
   creators being more effective at SEO on extrepos.d.n than legit
   repo creators)

But (as I said to David in person) seems like it's time to have some code
to throw stones at, rather than just list posts now...

Cheers,
aj



Re: Facilitating external repositories

2015-08-16 Thread Anthony Towns
On Sat, Aug 15, 2015 at 12:47:42PM +0200, David Kalnischkies wrote:
  I think my working assumption is anyone can register, and it's done
  automatically. If you want to ensure the URL is owned by the register,
  you could use a dummy DNS record (please add
 extrepo-de684554ae0c3440.example.org CNAME extrepos.debian.net.
  to your DNS).
 Srsly? Until now it sounded very open, but DNS records are far from
 being available for everyone (and far from being secured) beside that
 there can be multiple archives on the same domain. Try again.

Like I said, my working assumption is anyone can register and it's done
automatically, ie no check at all. You wanted something harder, not me :)

A less obstruse check would be:

 - is the nominated key the signing key for the repo's Release file?
 - can the person sign an extrepo request with that signing key?

which should be about sufficient to demonstrate control of the domain
and key.

  Or did you mean that the DD signs the sources.list file directly? 
  Well,
  then my key isn't usable for that right now, but in exchange the DD
  might have a slight problem in assuring the correctness of what he 
  is
  signing: I am the owner of example.org/debian. Trust me.
I'm not sure this is a problem -- if you're not the owner of
example.org/debian, then the files I download from there won't have your
signature. If they do have your signature, then it's just the question
of whether I trust your random repo, and I can't figure that out just
from knowing who you are.
   … I was thinking man-in-the-middle here. If I can register
   example.org/debian with a key of my choosing I can do really bad things,
   especially if example.org is the domain of a Debian mirror and I manage
   to trick people into adding this e.g. by claiming that this is a faster
   mirror…
 […]
  If you put in a /different/ key and go to the trouble of intercepting
  some users' traffic to example.org, things look slightly different:
 […]
  There's a few problems with doing that:
   a) anybody whose traffic to example.org you can't intercept will
  get an error if they check that repo against the nominated signing key.
  if extrepos.d.n does minimal sanity checking before adding a repo,
  this makes this attack a non-starter afaics.
 So, let me get this straight: The reason we need extrepo.d.o is because
 there could be an all consuming man-in-the-middle exchanging the
 description as well as the download of the archive key with something of
 his own choosing, but if we have extrepo.d.o this is suddently no longer
 a problem because it is too unlikely that there is such a man-in-the-
 middle.

Obviously not.

Here's how you currently setup an external repo as securely as possible:

 1. You hear about a cool repo from somewhere, and are told to go to
https://example.org/debian/README.html for more instructions.

 2. You read that page, and obtain a line to add to sources.list and
a key to add to apt-key.

 3. You (maybe) look at the key to see if it's signed by someone you
know, and doesn't look shady.

 4. You add the key and sources.list entry, and run apt to install the
packages.

If https and example.org are secure, or if you are able to verify the
key using the web of trust, this is fine (although it requires a bit of
effort). 

If neither of those are reliable (because you've got a Lenovo laptop
so anyone can fake SSL on you or just because its an http:// url not an
https:// one; and because you don't understand gpg so don't know about
the web of trust, or because someone in the Debian keyring isn't 100%
perfect, eg), then there's a MITM attack: I capture your traffic to
example.org, replace the README, key and repo, and you're stuck.

That's the MITM attack that's avoidable.

There's an entirly separate attack that's fundamental to external repos:
I make an external repo of my own, pretend that it's good, get people
to install from it, but actually upload bad things into it. In that case
I'm not in the middle though, I'm an endpoint.

With extrepos as I describe them, the steps are:

 1. You hear about a cool repo from somewhere, and are told to just
get the example-abc123 repo.

 2. You run extrepo add example-abc123, and run apt to install the
packages.

extrepo uses a Debian signed certificate linking example-abc123 to a
unique key and url, so that anyone who tries to get that repo is pointing
to the same place.

If you want to tell people to go to a different repo -- example-123abc
say, that's fine; but allowing that is a required feature. Likewise,
you could MITM the forums that are raving about what a great repo
example-abc123 is, and make them look like they're raving about
example-123abc, but I don't think that's avoidable.

   b) if someone's trying to install a PPA for secured-ssh, why would
   they go through extrepos?
 Because editing sources.list is hard and running 'extrepo add
 ppa-whatever-16734' is 

Re: Facilitating external repositories

2015-08-13 Thread Anthony Towns
On Thu, Aug 13, 2015 at 11:23:19AM +0200, David Kalnischkies wrote:
 On Wed, Aug 12, 2015 at 11:12:05PM +, Anthony Towns wrote:
  I'm not sure if the idea is PPAs can only be added to by DDs/DMs. [...]
 There is a session about Debian PPAs at 2015-08-21 17:00..18:00
 @ DebConf, so all the details there I presume, but as far as public
 information up to today goes (which I have seen) is that they are
 limited to DD/DM, on Debian infrastructure and signed by the usual
 archive signing key, so that trust in the archive-key isn't an issue
 here – the problem is just in easily adding PPAs to your sources which
 while currently bundled in this thread as well, I would like to avoid as
 a topic for now to focus on the archive-key part for external archives
 which aren't signed by Debian.

Yeah, that mostly sounds straightforward -- apt key is already fine,
uploads and new repos don't add much more risk than unstable already has,
everything in PPAs goes to a central server and can be tracked so it's
not easy to use PPAs to sneak things onto individual systems.

The downside is it limits things to DDs/DMs, so it doesn't make it much
easier to get totally new stuff available for Debian users, so that's
where extrepos come in.

  To use an external repo, you need a deb822 sources.list file and a pubkey.
  
  To get those, you contact extrepos.debian.net, and either do some sort
  of search, or plug in a 6+ digit hex code. extrepos.debian.net spits
  back a signed bundle of the repo's public key and a deb822 sources.list
  (which includes a description of what the repo is meant to contain), both
  named to match the 6+ digit hex code.
 That could work (see also below), you just need to figure out a way of
 registering an external repository at extrepos.debian.org now, which
 involves deciding who can register one and how to ensure that what
 I register is actually owned by me because…

I think my working assumption is anyone can register, and it's done
automatically. If you want to ensure the URL is owned by the register,
you could use a dummy DNS record (please add
   extrepo-de684554ae0c3440.example.org CNAME extrepos.debian.net.
to your DNS).

Or did you mean that the DD signs the sources.list file directly? Well,
then my key isn't usable for that right now, but in exchange the DD
might have a slight problem in assuring the correctness of what he is
signing: I am the owner of example.org/debian. Trust me.
  I'm not sure this is a problem -- if you're not the owner of
  example.org/debian, then the files I download from there won't have your
  signature. If they do have your signature, then it's just the question
  of whether I trust your random repo, and I can't figure that out just
  from knowing who you are.
 … I was thinking man-in-the-middle here. If I can register
 example.org/debian with a key of my choosing I can do really bad things,
 especially if example.org is the domain of a Debian mirror and I manage
 to trick people into adding this e.g. by claiming that this is a faster
 mirror…

I still don't think this is true?

Let's suppose you've found a mirror of a PPA that's intended for building
honeypots, so it has a version of sshd with a bad random number generator
and a couple of known exploits. It's signed by the Debian archive keyring.

Now I create an extrepo as follows:

  Type: deb deb-src
  URI: http://mirror.example.org/debian-ppas/honeypot/
  Suite: stable
  Section: main
  Description: security enhanced sshd
   This repo contains enhaned builds of sshd and some related
   utilities with vastly improved security options over the
   standard builds in Debian.
  Signing-Key:
   [archive signing key goes here]

How is that an advantage over just setting up my own extrepo with
dangerous packages and a misleading description?

If you put in a /different/ key and go to the trouble of intercepting
some users' traffic to example.org, things look slightly different:

  Type: deb deb-src
  URI: http://mirror.example.org/debian-ppas/secured-ssh
  Suite: stable
  Section: main
  Description: security enhanced sshd
   This repo contains enhaned builds of sshd and some related
   utilities with vastly improved security options over the
   standard builds in Debian.
  Signing-Key:
   [*MY* signing key goes here]

There's a few problems with doing that:

 a) anybody whose traffic to example.org you can't intercept will
get an error if they check that repo against the nominated signing key.
if extrepos.d.n does minimal sanity checking before adding a repo,
this makes this attack a non-starter afaics.

 b) if someone's trying to install a PPA for secured-ssh, why would they
go through extrepos?

 c) if you've gotten someone to install your extrepo, and they'll agree to
install things signed by your key, why not just point them directly
at a server you control? if you do that, you can be much nastier,
eg by serving a real secured ssh to most people, and a vulnerable

Re: Facilitating external repositories

2015-08-12 Thread Anthony Towns
(Piling onto this after a dc15 dinner convo referencing it)

On Tue, Jul 28, 2015 at 12:41:45AM +0200, Wouter Verhelst wrote:
 On Sat, Jul 25, 2015 at 07:27:21PM +0200, David Kalnischkies wrote:
  On Thu, Jul 23, 2015 at 10:14:21AM +0200, Wouter Verhelst wrote:

(apologies if the identity of who's being quoted below is confusing)

So aiui there's three levels of repos we're talking about:

 - Debian controlled: main, contrib, non-free; stable, testing, unstable,
   experimental

 - PPAs: Debian hosted, but more loosely controlled. experimental gone
   wild? maybe third party uploads? probably only free things?

 - External repos: all sorts of random crap.

(I'm not sure where the line between Debian PPAs and external repos is)

As far as trust goes, I think we can (and have to) assume that people
can install Debian safely somehow; and from that point on have access
to a current debian-archive-key as well as the debian-keyring and
debian-maintainers keyrings.

I think the level of trust you would want for PPAs then is probably that
you're able to see a name and description (like rust2.0, this will
give you pre-alpha access to packages of rust as it goes towards 2.0) and
be confident that what you install will match what you expect from that.

I'm not sure what checks will go into putting stuff in PPAs; being Debian
hosted it would be possible to block uploads based on lintian checks,
or limit PPAs to a specific set of packages (so the rust2.0 PPA couldn't
sneak an update to libc6 in), or limit updates that change the Provides:
or Conflicts: headers.

I'm not sure if the idea is PPAs can only be added to by DDs/DMs. If
not, can anonymous folks setup a PPA for pirated software, or try to
compromise the PPA build system or similar? If PPAs are for DDs and DMs
only, I'm presuming they can just use the existing Debian keyring to sign
the PPA Release files.

Anyhoo.

To make external repos both secure and easy, I think you want to do
two things:

 - make sure that it's easy to check that when you're talking about
   Bob's cool custom wordpress debs that you can be sure you don't
   end up at a different repo that your friend uses

 - limit the damage a bad repo can do (particularly by accident, though
   if you can limit malicious repos too, that's a bonus)

To check that a repo is the same, I think you need to have a trusted
party tie some sort of canonical name to a repo description. I think
the canonical name could be a URL or it could be a shortened hash of the
description (like a git commit id); and presumably the trusted third party
would be a debian.org registry service. I kind-of like the hash idea since
that makes it more difficult to repurpose a repo without changing its id.

So I think that adds up to:

   - Apt will try to download it from a default location in the repository
 (or perhaps a location specified in the deb822 sources.list file
 itself).
  What the heck is it in this sentence? I envision deb822 sources.list
  file, but reading the location of the file from the file itself seems
  a bit hard to pull of in practice…
 I was thinking of having apt auto-update the file which is put there, so
 that if something changes (e.g., new signatures), we pick that up.

To use an external repo, you need a deb822 sources.list file and a pubkey.

To get those, you contact extrepos.debian.net, and either do some sort
of search, or plug in a 6+ digit hex code. extrepos.debian.net spits
back a signed bundle of the repo's public key and a deb822 sources.list
(which includes a description of what the repo is meant to contain), both
named to match the 6+ digit hex code.

The user can then edit the sources.list file as desired (choose a
different mirror, set a particular pin priority, ...?)


From the POV of someone maintaining an external repo, all you have to do
beyond making the packages and setting up the Packages files and signing
your work is give it a permanent description and upload the whole thing
to extrepos.d.n which will then generate the 6+ digit hex code identifier,
sign the set of things, and make it available for download.

Updates to the repo work automatically.

Updating the key should be straightforward -- sign the new key with
the old one and upload to extrepos.d.n. Supporting a cold storage
key-signing-key could also work.

You'd presumably want to be able to blacklist repos, in case they're
taken down, their key is compromised, or they're found to be doing
malicious or illegal things. That would mean polling extrepos.d.n,
possibly during apt-get update?

You might want to go further and let users rate repos; but maybe
that could be done externally (eg, on a reddit board or a forum). You
probably wouldn't want listing on extrepos.d.n to be taken as any sort
of endorsement by Debian (or SPI) though.

 I'm not suggesting this be part of the base system. It should be part of
 the desktop task, probably, but that one is large enough already that
 this shouldn't make much of a difference.

Stetch goal: improvements to testing-proposed-updates / experimental?

2015-04-28 Thread Anthony Towns
Hi,

(I'm attempting to bcc: -release, but leave discussion on -devel)

Back during the freeze, there was a discussion on -private (Please respect
Freeze Policy) about uploading new stuff to unstable (vs experimental or
testing-proposed-updates). I'm going to summarise the overall goal as are
there any good ways in which unstable can be more pleasant during the
freeze for people who want to keep running unstable -- eg, I run unstable
so I can keep up with cool upstream stuff, but people stop uploading cool
upstream stuff during the freeze. Obviously, in improving things here, it
shouldn't make things harder for people working on the release (either the
release team or the other developers working on related packages).

A few ideas were proposed, including:

 - RM approval should be required before packages get into
testing-proposed-updates, rather than only for the testing-proposed-updates
to testing step

 - uploads to t-p-u should have their bug fix claims checked (ie, that one
of the bugs the uploads claims to fix is an RC bug that's present in
testing; that all the bugs have already been fixed in an upload to unstable)

 - testing users should be encouraged to run apt-listbugs and include t-p-u
in their sources.list

 - packages should be able to be migrated from experimental to unstable,
rather than requiring a separate upload

 - during the freeze, uploads to unstable that bump sonames should be held
for RM review (or that will otherwise prevent new uploads of other packages
to unstable from being suitable for promotion to testing)

​ - add automated testing for t-p-u (piuparts, ci.d.n?)

 - remove uploads from t-p-u if an RC bug is found in them?

​Do folks think those things are worth investigating further, and in
particular, would ftpmaster and the release team ​be interested in
reviewing/accepting patches along those lines or are there showstoppers
with the ideas themselves?
​
​I guess the other interesting questions are something like:

 - are there any obvious ways in which the freeze could be shortened?
 - are there any obvious ways the freeze brought on earlier, without being
lengthened?
 - are there any obvious ways in which the ​release team's workload during
the freeze can be reduced?

I was wondering if maybe it'd be possible to do some sort of statistical
review of uploads accepted to testing during the freeze (how many RC bug
fixes required more RC bug fixes, how long it took for library transitions
to get in sync, etc) and get some ideas for those things. Otherwise,
nothing much jumped out at me...

Cheers,
aj

-- 
Anthony Towns a...@erisian.com.au


Accepted beanbag 1.9.2-1 (source all) into unstable

2015-03-31 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 31 Mar 2015 23:08:59 +1000
Source: beanbag
Binary: python-beanbag python3-beanbag python-beanbag-doc
Architecture: source all
Version: 1.9.2-1
Distribution: unstable
Urgency: low
Maintainer: Anthony Towns a...@debian.org
Changed-By: Anthony Towns a...@debian.org
Description:
 python-beanbag - Helper module for accessing REST APIs
 python-beanbag-doc - Documentation for Python BeanBag module
 python3-beanbag - Helper module for accessing REST APIs
Changes:
 beanbag (1.9.2-1) unstable; urgency=low
 .
   * New upstream. Various bug fixes and improvements.
   * Lowers sphinx version in Build-Dep.
   * Adds python-requests-oauthlib to Suggests.
   * Switch maintainer email address to @debian.org.
Checksums-Sha1:
 6a727787d801e04229bbd91b6fa34b12a548b941 2042 beanbag_1.9.2-1.dsc
 41eec6f2c5fc99c5401e4e612f524adfc4575379 27016 beanbag_1.9.2.orig.tar.gz
 eaa2d3267426b5991c9865f589931712c7aa10cf 2072 beanbag_1.9.2-1.debian.tar.xz
 4602d1ad628ce8fd7797b359585cf5e01463ee53 11938 python-beanbag_1.9.2-1_all.deb
 6fd7d2b8e124e9bf00decea9d66460fc4b1972f4 12044 python3-beanbag_1.9.2-1_all.deb
 9eecb8928e6f7b467176b9a78be5352bf5180b6f 37492 
python-beanbag-doc_1.9.2-1_all.deb
Checksums-Sha256:
 bdef1096227f76eaa7508793961023a06be2ca1ffcd828a9c74a08292c201dbb 2042 
beanbag_1.9.2-1.dsc
 c6aa1e90ad229a6352e4e5f2d468b9cbf3522d74f7a6ac963e88cba769aaf780 27016 
beanbag_1.9.2.orig.tar.gz
 d114bec03948d719debf88cde02efa1a11c2a7cededf6194767fca85e668a911 2072 
beanbag_1.9.2-1.debian.tar.xz
 ebeed22553aa18a009662e5ac59483bb6954944572716a80eadaab9ed5bdc196 11938 
python-beanbag_1.9.2-1_all.deb
 76a91a5f67a8324feb38420db7095ef0aa2bbfe1aa485a2acb52c347ba3d4298 12044 
python3-beanbag_1.9.2-1_all.deb
 184c7e071ae73b0bd400d20e0dd316b8c32cfc96d28784a4ba068a89e13be103 37492 
python-beanbag-doc_1.9.2-1_all.deb
Files:
 d324927cd48ae5591f6767ae2a8ffea7 2042 python optional beanbag_1.9.2-1.dsc
 47bfccbc3224d1595ae787f994f99720 27016 python optional 
beanbag_1.9.2.orig.tar.gz
 5696c323a561ce154a04340fd37a04cd 2072 python optional 
beanbag_1.9.2-1.debian.tar.xz
 4354414fcce8f8016102ea23fd6953cf 11938 python optional 
python-beanbag_1.9.2-1_all.deb
 77f6299df5c2a7587516de16b47d953b 12044 python optional 
python3-beanbag_1.9.2-1_all.deb
 cdea4e9f934390f1ee9e54c148165b80 37492 doc optional 
python-beanbag-doc_1.9.2-1_all.deb

-BEGIN PGP SIGNATURE-
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=GXBe
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1ycwiv-6t...@franck.debian.org



Accepted beanbag 1.9.1-1 (source all) into unstable, unstable

2015-03-25 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Wed, 18 Mar 2015 14:58:56 +1000
Source: beanbag
Binary: python-beanbag python3-beanbag python-beanbag-doc
Architecture: source all
Version: 1.9.1-1
Distribution: unstable
Urgency: low
Maintainer: Anthony Towns a...@erisian.com.au
Changed-By: Anthony Towns a...@erisian.com.au
Description:
 python-beanbag - Helper module for accessing REST APIs
 python-beanbag-doc - Documentation for Python BeanBag module
 python3-beanbag - Helper module for accessing REST APIs
Closes: 780840
Changes:
 beanbag (1.9.1-1) unstable; urgency=low
 .
   * Initial release (Closes: Bug#780840)
Checksums-Sha1:
 05699186e4595fb5c61691378420cb8838bbcd82 2045 beanbag_1.9.1-1.dsc
 5f20d539ddc6458ca554018f7df48613b527e1d4 22767 beanbag_1.9.1.orig.tar.gz
 dc32e254448057775ae6f53df7198b51ade917a9 1920 beanbag_1.9.1-1.debian.tar.xz
 06e8c59ab6bbbdd5f6c1d0f799cd7072b8a54c80 10786 python-beanbag_1.9.1-1_all.deb
 9efb6c16a5d27856eacd74b73f5270909418730a 10878 python3-beanbag_1.9.1-1_all.deb
 5deae49ec67660f814456d5a96ae64573df52aa9 33302 
python-beanbag-doc_1.9.1-1_all.deb
Checksums-Sha256:
 d2f8a48767e67f5c838970b2e5a14de1936ce64b9d02a3ee819d8d9a0d3a40db 2045 
beanbag_1.9.1-1.dsc
 3143d6272595c85f809903aea52803e883d7676a042921c01256571c09059d57 22767 
beanbag_1.9.1.orig.tar.gz
 3feafb8093ba5678635b29a0d4e55c051e9a2c95f4825d6236456dc87690f48e 1920 
beanbag_1.9.1-1.debian.tar.xz
 c8f4dbcc6c64eaeedb5e74c1335e972797cb1a2b6301b312d2ddfb44aebd29ea 10786 
python-beanbag_1.9.1-1_all.deb
 14e85265a1d90387398fa50bbad2d7e704d517430ce9c37ff86a75ca993b1f25 10878 
python3-beanbag_1.9.1-1_all.deb
 c5ceeedc16380ec763c05c0a2745d6e0fab149977d6803ad10351b522fc5de7c 33302 
python-beanbag-doc_1.9.1-1_all.deb
Files:
 76c8a4181b3916c3268a8f024591d9a4 2045 python optional beanbag_1.9.1-1.dsc
 103dbf74aa33047966da1a10c8c1305a 22767 python optional 
beanbag_1.9.1.orig.tar.gz
 b4e8c5b02ad80bfff56a6444e1a2829a 1920 python optional 
beanbag_1.9.1-1.debian.tar.xz
 a9fd5131c4e35a3eadb280a5ca5c5661 10786 python optional 
python-beanbag_1.9.1-1_all.deb
 a173f99c32a3bf40649a9187b27086f9 10878 python optional 
python3-beanbag_1.9.1-1_all.deb
 24d4847ba3aa4b308163bf0202e94023 33302 doc optional 
python-beanbag-doc_1.9.1-1_all.deb

-BEGIN PGP SIGNATURE-

iQIcBAEBCAAGBQJVDBsiAAoJEGF3s1WCqNim/9YP/j0KvC/l7QhMdnb9Ze4l21JO
bxKb322bhwX8rh59YlsyQDo9guQcjmoNKzC+2ocseWMplmYHpjFvu1A+7H7NZ4vf
BLgOj7sdakh7iAWDorhlI1CJtLxufoJmTd46X+fD14ejIxS01kXH8sQaNxTNFLCr
BjKRi4ElGDt0PIf7fWtixwxA72I5odPmgSlOFif/dbpe8nV1CncbRfmQGOFnAHNG
7imn7whHad8Kl8oIhm2TYZdWxO1N5OiRkXf/bqxl3GnQgEVbC3yGhm8rqnLRCTXZ
ZE0RH5qz30QS7FqrP0jI4z4EBjj4OP0FJP5byg/PbQxJZbQQK5YfAp/SBwfs2WAi
VPhjn8uQTNfvbyvN39vgqU9+oF/xzJUzq0+tKSaX/mliAS2Krb7oOqfRk1jHIb92
DPfIBl/IJ3wulDTZViQRMgxgLbKg5Hod6HeJR0a918Z/Qil/JuzJHqq+i+lf4Qgw
3HFZZZ//25HHVAxWN9mcKbUJ4KuN4t50IxWJE/xDm9dWTybsVTBmn1J1095ijKSN
zJ2ExTvlQRX6adWG7vDOusCLh2BDwuqR+slRIyKMC9p1fJNtAgxkpjZYSHwdRBsv
olu7QUFJGxbAH+7RDG92uVfpj+VaIaMfKyU+6cndtTmnnJKf2Jp8lhFkrIyqB+Xg
RecTPbdgGEHHR0PuBvVs
=+NPg
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1yaniy-0004og...@franck.debian.org



Re: oauth2 sprint at DebConf?

2015-03-20 Thread Anthony Towns
On Thu, Mar 19, 2015 at 01:16:19PM +0100, Vincent Danjean wrote:
 Le 19/03/2015 10:11, Enrico Zini a écrit :
  Hello,
  
  the oauth2 part of our single signon system is in need of a team of people 
  to maintain it, and my experience so far has been that nobody seems to 
  understand oauth2[1].
 
 After your mail and a quick look in google, I found a overview
 of oauth2 that seems (at least to me) very interesting and clear,
 but it is in French. If some can/want to read it:
 http://www.bubblecode.net/fr/2013/03/10/comprendre-oauth2/

There's a link on that page that says English, clicking it goes to:

http://www.bubblecode.net/en/2013/03/10/understanding-oauth2/

I've only skimmed it, but it seems readable...

Cheers,
aj


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150321055423.ga18...@master.debian.org



Bug#780840: ITP: python-beanbag -- Helper module for accessing REST APIs

2015-03-20 Thread Anthony Towns
Package: wnpp
Severity: wishlist
Owner: Anthony Towns a...@erisian.com.au

* Package name: python-beanbag
  Version : 1.9.1
  Upstream Author : Anthony Towns a...@erisian.com.au
* URL : https://pypi.python.org/pypi/beanbag/
* License : MIT
  Programming Lang: Python
  Description : Helper module for accessing REST APIs

BeanBag is a simple module that lets you access REST APIs in an easy
way. See `http://beanbag.readthedocs.org/` for more information.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150320120715.32662.25496.reportbug@navy



Re: Pre-Depends: init-system-helpers

2014-11-17 Thread Anthony Towns
On Mon, Nov 17, 2014 at 10:10:58AM -0200, Henrique de Moraes Holschuh wrote:
 On Mon, 17 Nov 2014, Anthony Towns wrote:
  Having a single tool that does the basic stuff admins and maintainers need
  independent of init system seems like the right approach to me. *-rc.d
  is a terrible name for such a tool, though :(
 Err, yes.  There were complains about the -rc.d prefix way back in Debconf2,
 but the truth is the ship had sailed already (due to update-rc.d).
 Migrating to a new tool with a less obnoxious name isn't a problem, 

Heh, isn't a problem seems a bit understated...

 but this
 needs to be planned carefully as it is going to span at least two stable
 releases.  And invoke-rc.d and update-rc.d compatibility interfaces will
 have to be kept around for a *long* time, probably for at least two more
 stable releases, to avoid breaking things for third-party packages that
 don't use the LSB compatibility layer.

If deb-systemd-* were to get merged in, it might be worth doing a name
change at the same time, I guess. Changing either before jessie doesn't
seem remotely plausible.

I wonder if it would make sense to just merge it all into the service
command; ie:

   # service --use-policy ssh start
   # service --use-policy ssh restart
   # service ssh enable
   # service acpid.socket mask-for-upgrade

in place of:

   # invoke-rc.d ssh start
   # invoke-rc.d ssh restart
   # update-rc.d ssh enable
   # deb-systemd-helper mask acpid.socket

I wonder a bit if it wouldn't make even more sense to just make the common
command be systemctl, with Debian-specific patches for --use-policy
and the various extra behaviours where necessary. Maybe just having a
systemctl script with mostly compatible syntax provided for alternative
inits would be a better approach. (The disadvantage to that would be
that systemctl's a C program, so patching Debian specific options would
be harder than with sh/perl scripts like service/deb-systemd-*/*-rc.d)

Cheers,
aj


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141117143624.ga4...@master.debian.org



Re: Being part of a community and behaving

2014-11-17 Thread Anthony Towns
On Mon, Nov 17, 2014 at 11:05:13AM +0100, Bj??rn Mork wrote:
 m...@linux.it (Marco d'Itri) writes:
  On Nov 17, Steve Langasek vor...@debian.org wrote:
   This is what many still (retorically) wonder about: we the systemd 
   maintainers did not reject that change,
https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=15;bug=746578
  Please try to be less selective in your quoting: the issue was still 
  being discussed.
 I see.  So any systemd bug with a 'wontfix' tag is still considered open
 for discussion?  That's good to know.  Thanks.

Isn't any (open) bug tagged wontfix still open for discussion? If you've
got new information, or a new approach that the maintainer might prefer,
you can post it to the bug and discuss it with the maintainer...

(That said, I didn't see any discussion in that bug from people listed
in the systemd Uploaders line other than Michael Biebl's complaint about
a systemd-shim bug two months after the wontfix tag was added. That
doesn't *look* like it was still being discussed to me. Maybe that
just means someone summarising irc/list discussions to the bug would
have been helpful)

Cheers,
aj


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141117144829.gb4...@master.debian.org



Re: Pre-Depends: init-system-helpers

2014-11-17 Thread Anthony Towns
On Mon, Nov 17, 2014 at 02:38:04PM -0200, Henrique de Moraes Holschuh wrote:
 On Mon, 17 Nov 2014, Anthony Towns wrote:
  If deb-systemd-* were to get merged in, it might be worth doing a name
  change at the same time, I guess. Changing either before jessie doesn't
  seem remotely plausible.
  
  I wonder if it would make sense to just merge it all into the service
  command; ie:
  
 # service --use-policy ssh start
 # service --use-policy ssh restart
 # service ssh enable
 # service acpid.socket mask-for-upgrade
 
 service is an user interface, while deb-systemd-*, invoke-rc.d, and
 update-rc.d are first and foremost to be used by a package's maintainer
 scripts (postinst, etc).  They have different design goals.

My understanding is that update-rc.d is the recommended way for admins
to enable/disable services. Is that incorrect? (It's what I've documented
in my proposed init guide/policy)

Obvious alternative idea, provide a maintainer script oriented tool
under a different name:

  service-maintscript ssh start
  service-maintscript ssh enable
  service-maintscript acpid.socket mask-for-upgrade

But if we did that how would we recommend admins enable/disable
services? Just use the native stuff (rm /etc/rc?.d/S*ssh; systemctl
disable ssh)?

 IMHO it is best that we keep system interfaces separate from user interfaces
 like service, 

Yeah, I see where you're coming from. My intuition goes the other way;
that it's better to have a single tool for both uses if that's feasible.
We don't have anything special for doing cron jobs via packages compared
to what admins might do to add a cron job, eg. Maybe that's a bad
intuition though.

BTW, it occured to me that it seems like a wart that update-rc.d doesn't
respect policy-rc.d -- as it stands, policy-rc.d can prevent a service
from (re)starting during install/upgrade, but it'll still start on the
next boot. Is that just something that never got thought of / done,
or does it actually make sense?

Cheers
aj


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141117170715.ga13...@master.debian.org



Re: Pre-Depends: init-system-helpers

2014-11-17 Thread Anthony Towns
On Mon, Nov 17, 2014 at 09:22:39AM -0800, Russ Allbery wrote:
 Anthony Towns a...@erisian.com.au writes:
  BTW, it occured to me that it seems like a wart that update-rc.d doesn't
  respect policy-rc.d -- as it stands, policy-rc.d can prevent a service
  from (re)starting during install/upgrade, but it'll still start on the
  next boot. Is that just something that never got thought of / done, or
  does it actually make sense?
 Consider, for example, bootstrapping a new system in a local chroot that
 will then be deployed as a virtual image.  You want policy-rc.d to prevent
 starting any daemons from the chroot while you're installing and
 configuring packages, but you still want all the service management links
 and policy installed as normal so that, after you turn this into a cloud
 image, everything will run properly.

Thanks, that makes sense.

I was thinking more along the lines of:

 - do the install with policy-rc.d overriding which services are active
 - once you change your policy (once you've finished bootstrapping), you
   change or remove policy-rc.d, and continue on your merry way

But having update-rc.d obey policy-rc.d would stop that from working
right; having /init/ obey policy-rc.d would work fine, but that's just
crazy complicated.

Followup question: does anyone actually use the detailed features of
policy-rc.d or is always used in practice to turn all init scripts off?

Cheers,
aj


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141117183719.ga2...@master.debian.org



Re: Being part of a community and behaving

2014-11-16 Thread Anthony Towns
On Sun, Nov 16, 2014 at 05:11:47PM -0500, Theodore Ts'o wrote:
  I would, for example, have classified the discussions / arguments in the
  systemd-sysv | systemd-shim bug ...
 I was really confused that this needed to go to the TC; from what I
 could tell, it had no downside systems using systemd, and it made
 things better on non-systemd systems.  What was the downside of making
 the change, and why did it have to go to the TC instead of the
 maintainer simply accepting the patch?

Reading through the bug log, I saw the following complaint from Michael
biebl (one of the systemd maintainers), dated 6th Sept:

Steve, as long as bugs like [1] are not fixed in systemd-shim, I'm not
going to make it the first alternative. Installing a half-broken logind
whould be a disservice to our users.

 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746578#27

The next mail in the bug log is Ian referring the bug to the tech ctte
on 17th Sept; that was followed by some discussion over the next few
days (18th, 19th, 23rd Sept). Ian proposed a resolution to overrule
the systemd maintainers on the 1st of Nov, and called for a vote on the
5th of Nov. (For context, the GR vote was called for on the 2nd of Nov
with the CFV going out on the 4th; the jessie freeze was announced at
the end of the 5th)

The bug referenced as [1] above was #756076 which was set as grave on
18th September, with a fix developed upstream on the 5th Nov, which was
then uploaded to Debian on the same day (by Martin Pitt):

 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756076#56
 
https://github.com/desrt/systemd-shim/commit/a8c45a19a87b8dcd55d451c3dd37e34eca291435
 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756076#82

I assume that RC bug was one blocker from the systemd maintainers'
POV, but that bug doesn't seem to have been considered by the technical
committee in its deliberations at all (at least in so far as Steve as
systemd-shim maintainer is distinct from Steve as tech-ctte member).

Cheers,
aj


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141116233111.ga22...@master.debian.org



Re: Pre-Depends: init-system-helpers

2014-11-16 Thread Anthony Towns
On Sun, Nov 16, 2014 at 01:43:37PM -0800, Steve Langasek wrote:
 Can someone of the systemd maintainers please explain why this is being done
 as a separate helper instead of integrating with the tools that are already
 defined in policy and already part of the base system (e.g., invoke-rc.d)?

I think

 deb-systemd-invoke ~= invoke-rc.d
 deb-systemd-helper ~= update-rc.d

deb-systemd-helper supports more options than update-rc.d (is-enabled,
was-enabled, debian-installed, update-state, reenable, mask, and unmask
in addition to enable and disable; and purge in place of remove), though.

update-rc.d already supports enabling and disabling .service
units. Adding the ability to specify foo.socket as well as having
foo for foo.service seems straightfoward, and adding the additional
actions needed to cope with upgrading services that could be restarted
by dbus/etc during upgrade likewise seems sane.

invoke-rc.d also works with .service units already; extending it to take
over deb-systemd-invoke also seems like it would be straightforward.

Having a single tool that does the basic stuff admins and maintainers need
independent of init system seems like the right approach to me. *-rc.d
is a terrible name for such a tool, though :(

   https://github.com/ajtowns/debian-init-policy
 While this policy mentions deb-systemd-helper, there's no explanation of
 when or why it should be used.

2.2.4 Maintainer scripts mentions when and why... Patches welcome if
more explanataion is needed...

Cheers,
aj


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141117002546.ga5...@master.debian.org



Re: libpam-systemd [Re: Being part of a community and behaving]

2014-11-16 Thread Anthony Towns
On Sun, Nov 16, 2014 at 03:52:39PM -0800, Don Armstrong wrote:
 On Sun, 16 Nov 2014, Anthony Towns wrote:
  I assume that RC bug was one blocker from the systemd maintainers'
  POV, but that bug doesn't seem to have been considered by the
  technical committee in its deliberations at all (at least in so far as
  Steve as systemd-shim maintainer is distinct from Steve as tech-ctte
  member).
 We actually discussed this in the bug log.[1] 

I was presuming Steve was speaking with his systemd-shim maintainer
hat on for that email. Filing an RC bug doesn't help users of unstable,
only users of testing (and hence stable); the systemd maintainers may
have wanted to protect systemd users tracking unstable from systemd-shim
breakage. I didn't see any evidence that they thought marking that bug
as RC addressed their concerns.

 An RC bug against
 systemd-shim is the appropriate technical means of making sure that a
 buggy systemd-shim is not allowed into the release.

That's true in theory; in practice, systemd-shim wasn't removed from
testing despite having a grave bug in the month leading up to the freeze,
so anyone running unstable or testing would still have been hit by the
bug until the fix made it through.

If the bug hadn't been fixed and the release team tried removing
systemd-shim from jessie, I'd presume the tech ctte would've overruled
the RC-ness of the bug anyway.

Cheers,
aj


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141117004204.gb5...@master.debian.org



Re: Please more fish (was: so long and thanks for all the fish)

2014-11-10 Thread Anthony Towns
Hey Joey,

On Sun, Nov 09, 2014 at 06:12:13PM -0400, Joey Hess wrote:
 Please take that message with a pound of salt. I was upset when I wrote
 it, it's probably not accurate, and I've left[1] for reasons that are
 much more broadly structural, and are certianly not the fault of the
 technical committee, or indeed of any one person.

I wonder if you could describe what you think made Debian of '96
awesome? I miss reading inspiring manifestos of how things are meant to
work in a hypothetical perfect world that makes everyone happy.

(For me, I'd say what was cool about Debian back in that day was it
was an anarchic collaboration that's doing cool, useful things with
software. When I think about it, I usually conclude that Debian still
wins because everything else interesting seems way more structured
(ie, either corporate or benevolent dictator), but maybe if I like
anarchic then the collaboration should be more ad-hoc anyway, and
existing structures aren't relevant...)

 [1] Almost. Still need to orphan git-annex, git-repair, and github-backup.
  #768516: (O: etckeeper -- store /etc in git, mercurial, bzr or darcs)

Planning on staying involved with those as upstream?

FWIW, you might want to consider retaining your DDship despite orphaning
everything, dropping any roles, unsubscribing from any mailing lists,
seceding from the constitution, etc. There's not much obligation in
keeping the account, and if you find yourself using some package that
needs a bug fix, being able to do an NMU is handy (presuming you're not
switching to a different distro, anyway). At least, I haven't had anyone
begrudge me keeping my account while not doing anything much.

(Also, can we contact your ego or superego directly via email too?)

Cheers,
aj


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141110140124.ga9...@master.debian.org



Accepted gitit 0.10.4-2 (source all amd64) into unstable

2014-10-01 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Wed, 01 Oct 2014 06:39:58 +1000
Source: gitit
Binary: gitit libghc-gitit-dev libghc-gitit-prof libghc-gitit-doc
Architecture: source all amd64
Version: 0.10.4-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Haskell Group 
pkg-haskell-maintain...@lists.alioth.debian.org
Changed-By: Anthony Towns a...@debian.org
Description:
 gitit  - Wiki engine backed by a git or darcs filestore
 libghc-gitit-dev - Wiki engine backed by a git or darcs 
filestore${haskell:ShortBlur
 libghc-gitit-doc - Wiki engine backed by a git or darcs 
filestore${haskell:ShortBlur
 libghc-gitit-prof - Wiki engine backed by a git or darcs 
filestore${haskell:ShortBlur
Closes: 736189
Changes:
 gitit (0.10.4-2) unstable; urgency=medium
 .
   * Add source files for minified JQuery (Closes: Bug#736189).
   * Add lintian override for JQuery sources.
Checksums-Sha1:
 8098c663f8a59e81355281983600c3915abcc663 5217 gitit_0.10.4-2.dsc
 aa3fbaf938c6ce682a20727d6a64b6665bf8 51080 gitit_0.10.4-2.debian.tar.xz
 1cb5b78e2c482c0a9a6267571ef1d0c29638dd22 155272 
libghc-gitit-doc_0.10.4-2_all.deb
 07dac1607cba46965063374fd9a9d585f53df8b1 9098422 gitit_0.10.4-2_amd64.deb
 27100cfd29305a9f5b52e067d775f61a91cbd998 739714 
libghc-gitit-dev_0.10.4-2_amd64.deb
 eb21a854aa4ccfbf38bcd818855c4369abdde99f 1480978 
libghc-gitit-prof_0.10.4-2_amd64.deb
Checksums-Sha256:
 f4c53cec31f862c6665878209457afac6128134d2e529a699f387f41ce3a517d 5217 
gitit_0.10.4-2.dsc
 a91592524cec8c3e4bb6a80bbb84baea026395e54ea96d5a53f6c43ad4cf5e47 51080 
gitit_0.10.4-2.debian.tar.xz
 5fe79089611e851a41f1238003e95ae65fc424e70c3c4bafabfb3aff190367b2 155272 
libghc-gitit-doc_0.10.4-2_all.deb
 fb7bdda5af31a18f87e52fdd375123f18736e092dc5daf3c820a7be89f26e688 9098422 
gitit_0.10.4-2_amd64.deb
 b162c43b5cf50653f5413f3dabed5a17e115a9df7d28397eb199c1c7d1f0b01f 739714 
libghc-gitit-dev_0.10.4-2_amd64.deb
 7cf345f2bfb21784c3c704adc755c9ed3c98398541ccf01b88982e5f0ca722a6 1480978 
libghc-gitit-prof_0.10.4-2_amd64.deb
Files:
 c177648baefa2661caff046acb5715bc 155272 doc extra 
libghc-gitit-doc_0.10.4-2_all.deb
 c02cd0dd583925cac19a1eb876eb4aee 9098422 haskell extra gitit_0.10.4-2_amd64.deb
 5bbd6fee07c4ed184c1e8b452f3aecda 739714 haskell extra 
libghc-gitit-dev_0.10.4-2_amd64.deb
 6a6f09fe68497fda6924735a1c2aab7d 1480978 haskell extra 
libghc-gitit-prof_0.10.4-2_amd64.deb
 3c13e91d9df84ddc6e27586252c683d1 5217 haskell extra gitit_0.10.4-2.dsc
 a9d41da5588c9b0fbf69e435519d35c9 51080 haskell extra 
gitit_0.10.4-2.debian.tar.xz

-BEGIN PGP SIGNATURE-
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=UM1I
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1xzrkx-bo...@franck.debian.org



Re: Better pdiff handling for apt

2014-01-20 Thread Anthony Towns
On Fri, Jan 17, 2014 at 04:13:34PM +0100, David Kalnischkies wrote:
 On Sat, Jan 04, 2014 at 07:34:07PM +0100, David Kalnischkies wrote:
  So, I guess merging both could cross a lot of points of your list and
  be relatively easily feed into unstable for proper field-testing.
  (a upload of my part was planed as a christmas present to experimental,
   but as usual: If you want to make deity laugh, tell her your plans)
 I just did this merging the other day and Michael pushed it to experimental
 (again), so everyone should feel free to give it a spin, you might be in
 for a pleasant surprise ??? depending on how much you trusted the
 benchmark in my previous mail.
 [technical, it was indeed as easy as using my POC and Anthonys rred and
  put some minor glue between them ??? very nice :D ]

Very nice indeed.

There's an extra patch at 

  https://github.com/ajtowns/apt/commits/better-pdiffs-dk

that makes a couple of minor cleanups in rred.cc. I think there's a few
more to do, but I got confused as to how the pkgAcqIndexMergeDiffs stuff
works, and will need to print that out to grok it, I expect...

 Breakage potential:
 I decided for now to enable client-side merge by default but with
 detection for the X-Patch-Precedence field reprepro has introduced?? if it
 has merged patches on the server side, which falls back to the old
 handling. 

Ah, nice, that seems like it should make it backwards compatible in
practice.

It looks to me like dak and reprepro are the only tools that generate
pdiffs currently, fwiw.

Cheers,
aj


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20140120192156.ga27...@master.debian.org



Better pdiff handling for apt

2014-01-04 Thread Anthony Towns
Salut tout le monde,

Some time ago (*cough* 2009), I had a play with working out how to
apply pdiffs more efficiently than apt currently does, and implemented
a proof of concept in python [0]. There weren't any replies (even a
ooo, cool) when I posted to the deity list, so I left it at that;
though trolling google now, I see that it got mentioned on -devel [1]
not all that long ago (*cough* 2012), so apparently it did get read
after all. Not that it looks like it would've done much good, because
it seems like the script I put on the web, and the one I was actually
using are completely different to the extent that the one on the web
even has syntax errors. WTF?

Anyhoo... Like many, I've been getting annoyed at how tedious pdiff
application is over the past year, so over Christmas I thought I'd
have a go at patching apt to do things properly. I've got it to the
point where it works now, and apt-get update reports things like:

   Fetched 199 MB in 50s (3919 kB/s)

over a 50kB/s link when updating testing+unstable for i386+amd64 for a
day's worth of changes, rather than reporting 7000 B/s over a megabit
link. It should also be much more pleasant on SSDs, since it only
attempts to write each diff twice (once compressed, once
uncompressed), and each packages file once; rather than writing each
diff once, and the Packages file once for each diff.

My patched apt source is up on github at:

   https://github.com/ajtowns/apt/tree/better-pdiffs

My current theory is that it's best to re-specify the .diff/Index
format by adding an additional header

   Patch-Step-Size: 1 1 4 3 2 1 1

which would indicate that there are six patches available, and that if
you start from the oldest known version, you should apply patch 1,
then patch 2 (patch 1 + 1), then patch 3 (patch 2 + 1), then patch 7
(patch 3 + 4), and then you're done (patch 7 + 1 == patch 8, which
doesn't exist). If you wanted to run an archive where you only had to
download one patch and apply it no matter how old your Packages file
was, the line would look like:

   Patch-Step-Size: 12 11 10 9 8 7 6 5 4 3 2 1

(I think a nice efficient compromise method would be Patch-Step-Size:
8 8 4 4 4 4 2 2 1, which would only update a lg(diffs) each time you
updated the packages file, and only require users to download and
apply a maximum of lg(diffs) to get up to date)

If the line's not present, it should be treated as:

   Patch-Step-Size: 1 1 1 1 1 1 1 ...

which would be compatible with the way Debian does things, but
presumably not with some derivatives.

Anyway, the code works adequately as a proof of concept and I don't
think it should need a major re-write, but the things I think still
need doing to it are:

 * make sure main sha256/sha512/etc hashes are being checked after
patches are applied
 * verify that diff sha1 hashes are being checked on download
 * don't keep diffs around after they've been applied
 * add support for Patch-Step-Size as above
 * more robust parsing of diff files in rred method
 * review code paths in acquire-item to make sure they're sane
 * fix up debug message for rred method and diff acquire-item classes
 * consider just reading the gzipped diffs directly rather than
uncompressing them
 * check that the http downloads are being done as efficiently as possible (?)
 * consider leaving the diffs in partial/
 * allow resuming downloading diffs, rather than always redownloading
them from scratch
 * add an option to only allow diffs up to a fixed total size for
embedded systems (since the diffs are loaded into memory as a whole
before being applied)
 * add/update test suite?
 * fix up any code style issues
 * fix up rred method so it can be used directly from the command line
to merge and apply ed-diffs
 * work out where ed diffs get generated these days, and provide patch
to generate Patch-Step-Size header, and optionally use rred method to
update patches to make it a bit easier to download stuff

If anyone wants to poke around, please do!

Cheers,
aj

[0] https://lists.debian.org/deity/2009/08/msg00169.html
[1] https://lists.debian.org/debian-devel/2012/02/msg00411.html

-- 
Anthony Towns a...@erisian.com.au


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cajs_lcvjtdczrc7nneappeffv0kjwls3iq9s+xe9x1__dgm...@mail.gmail.com



Top level directory /run added to Fedora/Suse

2011-03-30 Thread Anthony Towns
Hi,

Via LWN I see:

 I just uploaded a new version of systemd into F15, which establishes a
 directory /run in the root directory.
 ...
 In the past weeks key people from the Debian, Suse, Ubuntu and Fedora
 camps (and others, too) discussed the whole issue forth and back, ...
 ...
 With this upload Fedora and Suse have already adopted /run now. Debian
 folks will suggest this for their coming release. Ubuntu has agreed with
 introducing /run as well.

 -- http://lwn.net/Articles/436012/

I hadn't seen any hint of this up 'til now, and with a quick peruse couldn't
find any posts. Are there any? If so, any urls?

Anyway, I'd like to give a +1000 to this, and offer my thanks to the
nameless Debianites who've pushed this forward. And hey, can we nominate the
Debian/Suse/Ubuntu/Fedora cabal^Wrepresentatives who've already made such
progress as the new FHS maintainers while we're at it? :)

Cheers,
aj

-- 
Anthony Towns a...@erisian.com.au


Some stats...

2010-08-02 Thread Anthony Towns
Hey *,

I did a blog post last night with some (IMO) interesting stats. If
you're interested, the post is at:

  
http://www.erisian.com.au/wordpress/2010/08/02/some-lenny-development-cycle-stats

It's based on some dynamic javascripty charts of various numbers I
could pull out that seemed interesting (RC bugs, the buildd graphs,
and an LD50 one I made up). The source graphs are up on merkel and are
kinda interesting; the only issue is the graphs are drawn on the
client side which given the amount of data involved can be a bit slow
on iceweasel; chromium-browser from unstable or google-chrome seems to
handle it alright though. URLs:

  http://merkel.debian.org/~ajt/plots/counts.html
-- RC bugs
  http://merkel.debian.org/~ajt/plots/ld50.html
-- how long it takes to fix bugs (weekly data points)
  http://merkel.debian.org/~ajt/plots/buildd-1.html
-- architecture buildd performances
  http://merkel.debian.org/~ajt/plots/buildd-2.html
-- architecture up-to-dateness

The box at the bottom right lets you do a rolling average, and you can
click and drag to choose a particular date range to view. I haven't
set it up to automatically update yet.

Cheers,
aj

-- 
Anthony Towns a...@erisian.com.au


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlkti=ehe=tapjwl+kkyetjmzy7_ybgfquetzoak...@mail.gmail.com



Re: Bug#540215: Introduce dh_checksums

2010-03-09 Thread Anthony Towns
Hey Russ,

On Tue, Mar 9, 2010 at 13:57, Russ Allbery r...@debian.org wrote:
 Joey Hess jo...@debian.org writes:
 Russ Allbery wrote:
 It's also always worth bearing in mind that while a really good
 attacker can do all sorts of complex things that make them very hard to
 find, most attackers are stupid and straightforward.
 It's stupid and straightforward to install /usr/local/bin/ls. debsums
 will not detect it.
 True.  Adding new binaries is, in my experience, more common than
 modifying binaries already on the system.
 I don't really mean to be arguing for debsums as a security mechanism,
 more just commenting on the general question.

So what's the goal here? Basic integrity checking by defending against
random corruption due to occassional hardware, software or admin
errors? Or an additional security layer verifying that the installed
system software is still exactly what it was intended to be?

(Or, I guess, a third option would be that it's just some security
theatre to make people feel more comfortable about their system's
integrity, without actually adding any technical guarantees.)

For basic integrity checking, I'm finding the dpkg patch I posted the
other day works fairly nicely -- I've reinstalled the handful of
packages that don't provide md5sums files so dpkg would generate the
hashes file for me, and now I've got hashes for every package on my
system, without having to worry about policy getting changed or
packages getting reuploaded, or having to worry about bugs like any
random packages I might use not following the new policy.

And now that I actually look at debsums, rather than just checking
with md5sum -c directly, I see debsums already gets invoked by apt by
default to ensure that there's an md5sums file for every package. And
that's been there for a fair while, based on Bug#132767.

If the idea is just to catch a wide swathe of accidental errors,
doesn't it make sense to stick with md5 as being cheap and unlikely to
have accidental collisions, do the md5sum generation in either apt or
dpkg to guarantee it's done for all installed packages, and leave it
at that? That means we could get rid of a bunch of policy and code
from package build scripts, which seems like it could only be a good
thing; and it also seems pretty easy to do for squeeze (since it's
already done as far as apt is concerned, and there's a patch for dpkg
if desired, and no other packages need to be changed).

The only drawback seems to be that you end up verifying what was
actually installed, and that might differ from verifying what was
meant to be installed in the event that the deb you're installing gets
corrupted while you're reading it, despite having previously passing
its own secure hash check.

OTOH, if the idea is to do more than just basic integrity checking of
dpkg-installed files, to aid in detection of and recovery from
malicious/deliberate changes, it seems like there's a lot of things
that ought to be done differently to how debsums/pkg.md5sums work
(secure hash, checking conffiles, stuff in /var, checking added files,
checking additional diversions, preventing
addition/deletion/modification of the md5sums files...).

(Well, better handling of the md5sums files themselves could be useful
for basic integrity checking too -- a disk/fs error that trashes files
in /var/lib/dpkg/info/ can be inconvenient too)

Cheers,
aj

-- 
Anthony Towns a...@erisian.com.au


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/87b3a4191003091145p26467cag8d2d4cfb9dc20...@mail.gmail.com



Re: md5sums files

2010-03-06 Thread Anthony Towns
(I'm not subscribed to this list, so go ahead and Cc me)

On Thu, Mar 4, 2010 at 02:05, Peter Samuelson pe...@p12n.org wrote:
 [Wouter Verhelst]
  I must say I was somewhat surprised by these numbers. Out of 2483
  packages installed on my laptop, 2340 install md5sums.
 The surprising part, perhaps, is that dpkg itself didn't just generate
 the other 143 md5sums files at installation time.

The easy (and usually correct) reason for things like that is dpkg's
source is scary.

 I suggested this a long time ago and of course was met with so where's
 your patch?  Of course I was not willing to do the work.

See? Anyway, my patch is attached. It makes dpkg create a foo.hashes
when unpacking foo, whose contents looks like:

MD5:32b5e22f8e336b2f34e0dd87652e6dfc  usr/share/doc/mawk/changelog.gz
MD5:87a34f1f55ac3f7fec2c7fc82565e8eb  usr/share/doc/mawk/changelog.Debian.gz
...

Verification is a matter of something like:

$ cat /var/lib/dpkg/info/*.hashes | sed -n 's/^MD5://p' | (cd /;
md5sum -c) | grep -v ': OK$'

There's an option (--hash) that you can set to none to avoid
spending time calculating md5s if you so choose. Adding support for
sha1/sha256/whatever should be straightforward; afaik dpkg only has
code for md5 already built in though (though just invoking
/usr/bin/sha1sum etc would be an option of course).

Of course another option is just to pull the md5sums directly from the deb:

$ ar p /var/cache/apt/archives/ifupdown_0.6.9_i386.deb data.tar.gz |
tar --to-command='printf %s%s\n $(md5sum - | sed s/-$//)
${TAR_FILENAME#./}'  -xzf - |
diff - /var/lib/dpkg/info/ifupdown.md5sums
1,3d0
 346208729633adf45e2fa3f2bd3b19c6  etc/init.d/ifupdown
 c6fffaae03271f1641920105ce68796b  etc/init.d/ifupdown-clean
 fab851ca87c5deb9d6f665e610184648  etc/default/ifupdown
4a2
 a0f11cf1809a468c49b72e0aa0a8e26b  sbin/ifup

(md5sums doesn't normally list conffiles, but does list hardlinks; the
above command does the opposite)

 But
 fundamentally, shipping a md5sums file is really just a tradeoff in
 download size vs. installation speed, not unlike gzip vs. bzip2.

Advantages of doing in when unpacking:
 - choice of checksum is the admin's decision
 - we can quickly roll out support for sha1/sha256/crc/... checksums
by just changing one package
 - admin has hashes of exactly what was unpacked, no matter the source
 - no concerns about bugs in dh_md5sums or similar resulting in bad checksums

Advantages of doing it when uploading:
 - provides some sort of double check of what's being uploaded
 - saves CPU time on users' machines

For me, I'd rather have dpkg generate the hashes.

Cheers,
aj

--
Anthony Towns a...@erisian.com.au
diff -urb dpkg-1.15.5.6/debian/changelog dpkg-1.15.5.6-aj/debian/changelog
--- dpkg-1.15.5.6/debian/changelog	2010-01-09 04:02:03.0 +1000
+++ dpkg-1.15.5.6-aj/debian/changelog	2010-03-07 04:13:03.171356041 +1000
@@ -1,3 +1,11 @@
+dpkg (1.15.5.6+aj) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Automatically create /var/lib/dpkg/info/pkg.hashes containing MD5 hashes
+for unpacked files.
+
+ -- Anthony Towns a...@lazuline  Sun, 07 Mar 2010 04:12:32 +1000
+
 dpkg (1.15.5.6) unstable; urgency=low
 
   * dpkg-source: with format 3.0 (quilt) ensure quilt's .pc directory is
diff -urb dpkg-1.15.5.6/configure.ac dpkg-1.15.5.6-aj/configure.ac
--- dpkg-1.15.5.6/configure.ac	2010-01-08 18:00:34.0 +1000
+++ dpkg-1.15.5.6-aj/configure.ac	2010-03-07 04:38:32.547372468 +1000
@@ -51,6 +51,16 @@
 esac])
 AC_SUBST(admindir)
 
+# Allow alternative default hash function
+hashtype=md5
+AC_ARG_WITH(hashtype,
+	AS_HELP_STRING([--with-hashtype=HASH],
+	   [hash function to use for .hashes files]),
+[case $with_hashtype in
+  md5|none) hashtype=$with_hashtype ;;
+  *) AC_MSG_ERROR([invalid hashtype specified]) ;;
+esac])
+AC_SUBST(hashtype)
 
 # Checks for programs.
 AC_PROG_CC
diff -urb dpkg-1.15.5.6/src/Makefile.am dpkg-1.15.5.6-aj/src/Makefile.am
--- dpkg-1.15.5.6/src/Makefile.am	2010-01-09 03:23:06.0 +1000
+++ dpkg-1.15.5.6-aj/src/Makefile.am	2010-03-07 04:28:18.771356095 +1000
@@ -6,6 +6,7 @@
 AM_CPPFLAGS = \
 	-DLOCALEDIR=\$(localedir)\ \
 	-DADMINDIR=\$(admindir)\ \
+	-DHASHTYPE=\$(hashtype)\ \
 	-idirafter $(top_srcdir)/lib/compat \
 	-I$(top_builddir) \
 	-I$(top_srcdir)/lib
diff -urb dpkg-1.15.5.6/src/main.c dpkg-1.15.5.6-aj/src/main.c
--- dpkg-1.15.5.6/src/main.c	2010-01-09 03:23:06.0 +1000
+++ dpkg-1.15.5.6-aj/src/main.c	2010-03-07 04:29:59.271360858 +1000
@@ -187,6 +187,7 @@
 const char *admindir= ADMINDIR;
 const char *instdir= ;
 struct pkg_list *ignoredependss = NULL;
+const char *hashtype= HASHTYPE;
 
 static const struct forceinfo {
   const char *name;
@@ -516,6 +517,7 @@
   { admindir,  0,   1, NULL,  admindir, NULL,  0 },
   { instdir,   0,   1, NULL,  instdir,  NULL,  0 },
   { ignore-depends,0,   1, NULL,  NULL,  ignoredepends, 0 },
+  { hash,  0,   1, NULL

Re: md5sums files

2010-03-06 Thread Anthony Towns
On Sun, Mar 7, 2010 at 10:28, Goswin von Brederlow goswin-...@web.de wrote:
 Anthony Towns a...@erisian.com.au writes:
 Advantages of doing it when uploading:
  - provides some sort of double check of what's being uploaded
  - saves CPU time on users' machines
   - avoids having bad checksums due to the user having bad hardware
     (which is one big use case of the files)

Big? It only makes a difference if:
  a) the corruption happens as soon as it's written, not after some time
  b) the file is too big/the system is too loaded to keep the file in
the page cache
  c) the system memory is corrupted just enough to screw the file but
not everything else

Compared to random make install invocations changing files in the
system and similar, that doesn't strike me as a big use case.

In any event, it's fairly easy to generate the checksum in the same
pass as generating the file, see the attached patch. (It's not as easy
to generalise to other hashes as the previous one, unfortunately)

If you're still worried, perhaps about having read() return bogus data
from the .deb that happens to still be valid when passed through
ungzip and untar and after you've already verified the entire file by
md5/sha1/sha256 when downloading, you're getting to the point of
trying to safely install on an actively malicious system, and
nothing's going to make that work.

Cheers,
aj

-- 
Anthony Towns a...@erisian.com.au
diff -x configure -x '*.m4' -x Makefile.in -urbN dpkg-1.15.5.6/configure.ac dpkg-1.15.5.6-aj/configure.ac
--- dpkg-1.15.5.6/configure.ac	2010-01-08 18:00:34.0 +1000
+++ dpkg-1.15.5.6-aj/configure.ac	2010-03-07 04:38:32.547372468 +1000
@@ -51,6 +51,16 @@
 esac])
 AC_SUBST(admindir)
 
+# Allow alternative default hash function
+hashtype=md5
+AC_ARG_WITH(hashtype,
+	AS_HELP_STRING([--with-hashtype=HASH],
+	   [hash function to use for .hashes files]),
+[case $with_hashtype in
+  md5|none) hashtype=$with_hashtype ;;
+  *) AC_MSG_ERROR([invalid hashtype specified]) ;;
+esac])
+AC_SUBST(hashtype)
 
 # Checks for programs.
 AC_PROG_CC
diff -x configure -x '*.m4' -x Makefile.in -urbN dpkg-1.15.5.6/debian/changelog dpkg-1.15.5.6-aj/debian/changelog
--- dpkg-1.15.5.6/debian/changelog	2010-01-09 04:02:03.0 +1000
+++ dpkg-1.15.5.6-aj/debian/changelog	2010-03-07 04:13:03.171356041 +1000
@@ -1,3 +1,11 @@
+dpkg (1.15.5.6+aj) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Automatically create /var/lib/dpkg/info/pkg.hashes containing MD5 hashes
+for unpacked files.
+
+ -- Anthony Towns a...@lazuline  Sun, 07 Mar 2010 04:12:32 +1000
+
 dpkg (1.15.5.6) unstable; urgency=low
 
   * dpkg-source: with format 3.0 (quilt) ensure quilt's .pc directory is
diff -x configure -x '*.m4' -x Makefile.in -urbN dpkg-1.15.5.6/lib/dpkg/buffer.c dpkg-1.15.5.6-aj/lib/dpkg/buffer.c
--- dpkg-1.15.5.6/lib/dpkg/buffer.c	2010-01-09 03:23:06.0 +1000
+++ dpkg-1.15.5.6-aj/lib/dpkg/buffer.c	2010-03-07 15:50:33.379710844 +1000
@@ -60,6 +60,13 @@
 	case BUFFER_WRITE_MD5:
 		buffer_md5_init(write_data);
 		break;
+	case BUFFER_WRITE_DUP:
+		{
+		  struct buffer_data *bddup = write_data-arg.ptr;
+		  buffer_init(NULL, bddup[0]);
+		  buffer_init(NULL, bddup[1]);
+		}
+		break;
 	}
 	return 0;
 }
@@ -90,6 +97,13 @@
 	case BUFFER_WRITE_MD5:
 		buffer_md5_done(write_data);
 		break;
+	case BUFFER_WRITE_DUP:
+		{
+		  struct buffer_data *bddup = write_data-arg.ptr;
+		  buffer_done(NULL, bddup[0]);
+		  buffer_done(NULL, bddup[1]);
+		}
+		break;
 	}
 	return 0;
 }
@@ -126,6 +140,14 @@
 	case BUFFER_WRITE_MD5:
 		MD5Updatestruct buffer_write_md5ctx *)data-arg.ptr)-ctx), buf, length);
 		break;
+	case BUFFER_WRITE_DUP:
+		{
+		  struct buffer_data *bddup = data-arg.ptr;
+  ret = buffer_write(bddup[0], buf, length, desc);
+		  if (ret != length) return ret;
+  ret = buffer_write(bddup[1], buf, length, desc);
+		}
+		break;
 	default:
 		internerr(unknown data type '%i' in buffer_write,
 		  data-type);
diff -x configure -x '*.m4' -x Makefile.in -urbN dpkg-1.15.5.6/lib/dpkg/buffer.h dpkg-1.15.5.6-aj/lib/dpkg/buffer.h
--- dpkg-1.15.5.6/lib/dpkg/buffer.h	2010-01-08 18:00:34.0 +1000
+++ dpkg-1.15.5.6-aj/lib/dpkg/buffer.h	2010-03-07 15:53:23.319707965 +1000
@@ -36,6 +36,7 @@
 #define BUFFER_WRITE_NULL		3
 #define BUFFER_WRITE_STREAM		4
 #define BUFFER_WRITE_MD5		5
+#define BUFFER_WRITE_DUP		6
 
 #define BUFFER_READ_FD			0
 #define BUFFER_READ_STREAM		1
@@ -52,6 +53,14 @@
 	buffer_hash(buf, hash, BUFFER_WRITE_MD5, limit)
 
 #if HAVE_C99
+# define fd_fdmd5(fd1, fd2, hash, limit, ...) \
+	do { \
+	struct buffer_data fdhash[2]; \
+fdhash[0].arg.i = fd2; fdhash[0].type = BUFFER_WRITE_FD; \
+fdhash[1].arg.ptr = hash; fdhash[1].type = BUFFER_WRITE_MD5; \
+buffer_copy_IntPtr(fd1, BUFFER_READ_FD, fdhash, BUFFER_WRITE_DUP, \
+	   limit, __VA_ARGS__); \
+} while(0)
 # define fd_md5(fd, hash, limit

Re: Bits from the release team and request for discussion

2009-08-10 Thread Anthony Towns
On Fri, Jul 31, 2009 at 05:39:23AM +1000, Anthony Towns wrote:
 On Thu, Jul 30, 2009 at 07:28:58PM +0200, Luk Claes wrote:
  About freeze timing we think that DebConf should definitely not fall
  into a freeze

  We noticed that releases in the first quarter of the year
  worked out quite well in the past like both Etch and Lenny. Taking these
  into consideration we think it would be best to freeze in December.

  We'll be consulting all key teams within Debian to see how their plans
  and schedules can fit into a new timeline. Before the end of August we
  hope to have finished this process of consultation and be able to
  present the new plan to you.

 Why not have a developer poll as to what month(s) would most suit
 people for the freeze, rather than limiting it to key teams?

So, with August almost half-way over, I guess the release team's not
going to be doing much more to seek input from non-key teams/developers.

I still think it'd be interesting and useful to get broader input,
though. Something like a choice amongst the following questions by GR
might work:

  1. The Debian project recommends that the release team target
 December 2009 for squeeze's freeze, and work hard to avoid allowing
 the freeze to slip by more than a few weeks. The project notes this
 is approximately 10 months after lenny's release, and approximately
 18 months after lenny's freeze. The project acknowledges this may
 assist in synchronising Debian 6.0 and Ubuntu 10.04 LTS, may assist
 in setting up regular freezes every second December, and is intended
 to allow Debian 6.0 to be released prior to DebConf 2010.

  2. The Debian project recommends that the release team target
 January-February 2010 for squeeze's freeze, following a December
 release summit with maintainers/upstreams for major packages to
 allow some new upstream releases that occur early in the freeze to be
 included. The project acknowledges this may assist in synchronising
 Debian 6.0 and Ubuntu 10.04 LTS, and may assist in setting up
 regular freezes every second year. The project notes this may or
 may not allow Debian 6.0 to be released prior to DebConf 2010.

  3. The Debian project recommends that the release team target
 March/April 2010 for squeeze's freeze. The project acknowledges
 this will likely mean the freeze will be active during DebConf 10.

  4. The Debian project recommends that the release team target
 May-July 2010 for squeeze's freeze. The project notes that this
 is approximately two years after lenny's freeze, and acknowledges
 this will mean the freeze will be active during DebConf 10.

  5. The Debian project recommends that the release team target
 October-December 2010 for squeeze's freeze. The project notes that
 this will be after DebConf 10 has finished, and between 20-22 months
 after lenny's release. The project acknowledges that depending on
 the length of the freeze, this may mean squeeze will be released
 more than two years after lenny.

Any thoughts? We could have such a vote over and done in about two weeks,
with the DPL's consent, and it'd seem a lot more inclusive and less
cabal-tastic than how things seem to be working atm...

Cheers,
aj



signature.asc
Description: Digital signature


Re: Bits from the release team and request for discussion

2009-08-04 Thread Anthony Towns
On Tue, Aug 04, 2009 at 01:09:14PM +0200, Philipp Kern wrote:
 I'm grateful for those suggestions, Anthony.  That page is just a pain
 to maintain though.  Not everything on it is up-to-date yet but I updated
 quite some chunks.

So make it easy to maintain... Attached is an example converting it to
yaml with python table generation, coping with waivers.

I've made it automatically classify any arch with any failures as at risk,
rather than letting it remain listed as a candidate. It'd probably be better
to have any warnings imply at risk and any failures come pretty close to
meaning no, though...

Anyway, have a look, see what you think.

It'd be really nice to have all the buildd criteria be measurable (and then
automated). One idea might be to change fast security and redundancy into
speed/load measures, something like:

alpha   amd64   armels390
buildd-speed  95%100% 50%113%
(%ge of i386/amd64) 

buildd-load   55% 60% 95% 20%   

n-buildds   2   3   6   1

idle-buildds  0.9 1.2 0.3 0.8

where speed is calculated as the overall average of:

time-to-build-on-$ARCH / time-to-build-on-i386/amd64

(ie, dpkg takes 20s to build on alpha, versus 13s to build on i386 after
and amd64+source upload would give 154%)

load is the percentage of time on average that each buildd is actually 
building something, and idle-buildds is n-buildds * (1 - buildd-load). 
Release criteria are then something like buildd-speed = 50%,
idle-buildds = 1.

Cheers,
aj

#!/usr/bin/env python

# Copyright (c) 2009 Anthony Towns
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.

import sys, yaml

### formatting helpers

def FAIL(value): return (red,value)
def WARN(value): return (yellow,value)
def PASS(value): return (lime,value)

def c_truth(value):
if value == True:
return PASS(yes)
elif value == False:
return FAIL(no)
else:
return WARN(value)

def c_untruth(value):
if value == True:
return FAIL(yes)
elif value == False:
return PASS(no)
else:
return WARN(value)

def c_host(value):
if not value: return FAIL(none)
return PASS('a href=http://db.debian.org/machines.cgi?host=%s;yes/a'%(value))

def c_list(maybe,okay):
def c_list_f(value):
n=len(value)
str='acronym title=%s%s/acronym' % (, .join(value),n)
if n  maybe: return FAIL(str)
if n = okay: return PASS(str)
return WARN(str)
return c_list_f

def c_num(maybe,okay):
def c_list_f(value):
if value  maybe: return FAIL(value)
if value = okay: return PASS(value)
return WARN(value)
return c_list_f

def c_str(value):
if not value: return FAIL(-)
return PASS(value)

# criteria

criteria = [
(available, c_truth),
(portbox,   c_host),
(porters,   c_list(2,5)),
(users, c_num(30,50)),
(installer, c_str),
(archive-coverage,  c_num(90,95)),
(archive-uptodate,  c_num(95,97)),
(buildds,   c_list(2,2)),
(buildd-redundancy, c_truth),
(buildd-fast-sec,   c_truth),
(buildd-247,c_truth),
(concerns-rm,   c_untruth),
(concerns-srm,  c_untruth),
(concerns-dsa,  c_untruth),
(concerns-sec,  c_untruth),
(candidate, c_truth),
]

# table output

def dump_table(info,waivers):
arches=info.keys()
arches.sort()

candidacy_at_risk = {}

print table
print trtd/td
for arch in arches:
print td%s/td % (arch)
candidacy_at_risk[arch] = False
print /tr

for c,c_fn in criteria:
print trtd%s/td % (c)
for arch in arches:
v=info[arch].get(c,None)

if c==candidate and candidacy_at_risk[arch]:
if v == True: v = at risk

if v is not None:
col,contents = c_fn(v)
else:
col,contents = FAIL(-)

w = waivers.get(arch,{}).get(c,None)
if w:
col=cyan
contents += ' a href=%s(w)/a' % (w)

if col==red:
candidacy_at_risk[arch]=True

print 'td bgcolor=%s%s/td' % (col,contents)

print /tr

print

Re: Bits from the release team and request for discussion

2009-08-03 Thread Anthony Towns
On Fri, Jul 31, 2009 at 05:39:23AM +1000, Anthony Towns wrote:
 So, http://release.debian.org/squeeze/arch_qualify.html lists kfreebsd-*
 and m68k as not release candidates, and arm, ia64, mips and powerpc as
 at risk in addition to alpha and hppa. Only m68k is listed as having
 RM concerns.  Is that page actually reflecting the release team's view
 of architecture status at all, and could it be made to correspond a bit
 more closely either way?

So arm's dropped off that page, kfreebsd-* have been bumped to TBD,
and alpha, hppa are still accompanied by ia64, powerpc, mips and s390 as
being at risk. There's lots of fields with just a ? -- apparently
there's no info on whether the RMs have concerns about everything but
amd64, m68k, s390 and sparc... Anyway, some suggestions:

m68k isn't available anymore, afaics -- it's not in unstable;
doesn't seem any point having it in the list afaics

amd64 has d-i support, surely? it did for lenny, despite lenny's
page...

querying port maintainers for amd64 and i386 seems like a waste of
time. is there really any concern that no one will be
around to support them?

the foo-concerns should probably have two possible states: no,
or yes with one or more links to mailing list threads
stating those concerns

having the Porting machine answer be yes with a link to
the appropriate http://db.debian.org/machines.cgi?host=foo
page would be as informative and help make the table
take up less space

using blue to distinguish waived requirements might be helpful,
with something like Users: 45 (w) to save space. Having
(w) link to a list post explaining the waiver would
probably be helpful for people who'd like to understand
why armel gets a waiver for multiple buildds but hppa
doesn't, eg.

both s390 and alpha seem to be keeping up with the build
up-to-dateness requirements, based on the buildd.d.o
graphs. probably worth linking the row headings for those
percentages to the buildd.d.o graphs, really

redoing the qualification page every release seems pointless; it's
a wiki page so it's not automatically up to date or
correct, and still needs to be validated by the release
team; and arch maintainers don't seem to particularly be
excited about doing it for exiting architectures... after
initial qualification, why not have the status page be
the canonical summary, linking to list posts for further
information as necessary?

Cheers,
aj


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Bits from the release team and request for discussion

2009-07-30 Thread Anthony Towns
On Thu, Jul 30, 2009 at 07:28:58PM +0200, Luk Claes wrote:
 Architectures
 =
 As some of you might have noticed, we added the architectures
 kfreebsd-i386 and kfreebsd-amd64 to testing. [...]
 However, two architectures also have issues we need to bring to your
 attention: We sent mails to the porters of both alpha and hppa [...]

So, http://release.debian.org/squeeze/arch_qualify.html lists kfreebsd-*
and m68k as not release candidates, and arm, ia64, mips and powerpc as
at risk in addition to alpha and hppa. Only m68k is listed as having
RM concerns.  Is that page actually reflecting the release team's view
of architecture status at all, and could it be made to correspond a bit
more closely either way?

 About freeze timing we think that DebConf should definitely not fall
 into a freeze

Past freezes were:

potato  2000/01 - 2000/08   (DebConf 0 was early 2000/07)
woody   2001/07 - 2002/07   (DebConf 1 was immediately after the
 policy freeze started, DebConf 2 happened
 a week or two before woody released)
sarge   2005/05 - 2005/06   (DebConf 5 was a month after release)
etch2006/12 - 2007/04   (DebConf 7 was three months after release)
lenny   2008/07 - 2009/02   (DebConf 8 was in 2008/08, a month into the 
freeze)

How you relate DebConf 3 and DebConf 4 to sarge's freeze is up for
debate, I suppose; while sarge officially froze a month before release,
that's not necessarily real.

I really don't see what the big deal with having debconf during a freeze
is though...

 and that we should leave time after DebConf to integrate
 the possibly disruptive changes we introduced by doing cool stuff at
 DebConf. 

Fixing RC bugs is pretty cool...

 We noticed that releases in the first quarter of the year
 worked out quite well in the past like both Etch and Lenny. Taking these
 into consideration we think it would be best to freeze in December.

Etch was intended to freeze in October, with a release in December; the freeze
was delayed because of a high bug count (250 RC bugs). I think there was pretty
heavy peer pressure to have any transitions and major uploads done well before
December for etch. And lenny, of course, was frozen in July...

 We'll be consulting all key teams within Debian to see how their plans
 and schedules can fit into a new timeline. Before the end of August we
 hope to have finished this process of consultation and be able to
 present the new plan to you.

Why not have a developer poll as to what month(s) would most suit
people for the freeze, rather than limiting it to key teams? Also, how
about soliciting input from our users, just in case they have something
interesting to add? Maybe LTS-syncing will turn out to be something users
really do/don't want, or maybe there are other priorities they have that
are worth considering.

Cheers,
aj



signature.asc
Description: Digital signature


merkel fs issues

2009-01-14 Thread Anthony Towns
Hello,

There seem to be some issues with the ftp mirror on merkel:

$ pwd
/srv/ftp.debian.org/ftp
$ ls -l dists/sid/Contents-powerpc.diff/ | tail -n2
-rw-rw-r-- 1 archvsync archvsync   2053 Jan 14 13:40 Index
?- ? ? ?  ?? 
dists/sid/Contents-powerpc.diff/2008-11-08-0841.02.gz

Though I guess that looks like it's over NFS to spohr now, so hopefully
doesn't imply there's local corruption on merkel.

Cheers,
aj


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Results for General Resolution: Lenny and resolving DFSG violations

2008-12-29 Thread Anthony Towns
On Mon, Dec 29, 2008 at 10:03:20AM -0500, Theodore Tso wrote:
 On Mon, Dec 29, 2008 at 03:02:41PM +1000, Anthony Towns wrote:
  Using the word software as the basis for the divide might be too much:
 I'm not convinced that leaving important parts of Debian undocumented
 over doctrinal disputes over licensing terms is actually in the best
 interests of users, but I recognize that's a position that people of
 good will can (and have) disagreed upon.  If it were up to me, I would
 have Debian work towards a system where packages could be tagged to
 allow enable common user preferences (we won't be able to make
 everyone happy) be enforced by what packages they can see/install.

Sure, I agree, and have supported similar proposals in the past. [0]

  [0] http://lists.debian.org/debian-project/2005/04/msg00074.html

 Separating packages into separate sections to support these sorts of
 policy preferences is a hack, 

Not entirely. The pool/main (and dists/*/main) separation makes it easy
for mirrors to only get DFSG-free stuff (ie, they can just use rsync,
rather than needing to parse Debian-specific policy files). 

Otherwise, though, yes, definitely agree.

 I like this a lot.  However, I do have a few nits...
 We, the members of the Debian project, make the following pledge:
 1. We will build a free operating system
We will create and provide an integrated system of free software
that anyone can use. We will make all our work publically available
as free software.
 Given how literalistic some members of our community can be about
 interpreting Foundation Documents, the second sentence is a little
 worrying.  I can easily imagine a Free Software Fanatic using the
 second sentance as an argument that we must stop distributing the
 non-free section, since non-free is, by definition, not Free Software.

The non-free stuff in non-free isn't our work though -- it's stuff
other people have made that we redistribute. our work is things like
debbugs, dak, debhelper, *.diff.gz, etc.

Maybe some DDs write non-free software that gets packaged, but that
can at least be differentiated by Joe Random j...@example.com versus
using a d.o address.

 And it could easily be argued that the work that Debian Developers to
 package non-free packages, which is after all distributed on the
 Debian FTP servers and via Debian Mirrors, would fall under the scope
 of All our work.

I think any packaging code, even for non-free stuff, should be DFSG-free.
That might require dual-licensing, but that's okay.

 I'm not sure what you were trying to state by the second sentence
 above; one approach might be to simply strike it from the draft.  Or
 were you trying to add the constraint that any work authored by DD's
 on behalf of the Debian Project should be made available under a free
 software license, even if in combination with other software being
 packaged, the result is non-free?

Pretty much, yeah.

 2. We will build a superior operating system
We will collect and distribute the best software available, and
strive to continually improve it by making use of the best tools
and techniques available.
 I'm worried about the first clause, because of the absolutist word
 best in best software available.  Again, some literally minded
 DD's could view this as meaning that the best is the enemy of the
 good, and use this as bludgeon to say that since we have package X, we
 should not have packages Y or Z, because, X is the *best*.   

There's nothing there that says we won't also distribute the worst
software available, though. If you're worried about the best being
exclusionary, though, the same applies to tools/techniques. If bugzilla
is the best tool for bug tracking, we must immediately stop using
debbugs, eg. Ditto wiki software, list software, etc.

 I would certainly be willing to second and support such a proposal,
 should you decide that you are willing to make it as a formal proposal
 for a GR.

So that's one, but at least four more would be needed...

Here's a wiki page for people who think this is a reasonable or desirable
sort of thing to do: http://wiki.debian.org/SocialContractRevision . I've
only added my caveats, not ones that other people have already brought up.

Cheers,
aj



signature.asc
Description: Digital signature


Re: Results for General Resolution: Lenny and resolving DFSG violations

2008-12-29 Thread Anthony Towns
On Mon, Dec 29, 2008 at 10:10:24PM +0900, Osamu Aoki wrote:
 But the way you wrote in 4 as we will make any private discussions
 publically available at the earliest opportunity. is problematic since
 it is 100% disclosure pledge. I suggest something along we will make
 any private discussions publically available at the earliest opportunity
 to the extent appropriate for this objective.  I am using this
 objective as to allow anyone to follow our discussions.   I hope
 someone can rephrase this better. 

IMO, discussion that leads to technical changes, is really part of the
source, much like in-code comments, READMEs, and version control logs. If
you've got access to the reasoning that led up to a decision, you can
have a much better understanding of what's going on, just as if you have
access to criticisms being made, and what people propose to do about them,
you've got a much better idea of what the code's capabilities are.

There's nothing wrong with having a closed discussion with some friends
about how to improve your packages, but it's much better if after the fact
you make that discussion available to everyone who might be interested.

The same thing applies to discussions about the direction of Debian --
when it might release, how decisions get made, what exciting new things
we might consider doing. These are important bits of information that
users, upstream, and developers of other distros should have access to.

That doesn't mean *every* private discussion DDs have -- gosh, wasn't
the football exciting last night? isn't very interesting to Debian, eg.
But equally, it's not especially on-topic for most Debian areas, either.
If there's a casual environment -- like debconf, or a pub, or an IRC
channel; there's no need for complete logs or video records for everyone
to be able to pore over, but summaries of the technical bits would be
a win.

  Since it's worded as a pledge, it might make sense that if it (or
  something like it) is ever adopted, that existing developers membership
  being dependent on them agreeing to the pledge. That didn't happen with
  the previous SC change, but it seems strange to claim to have a social
  contract when a significant number of members don't actually support
  it 100%.
 I am not sure about the last part.  If you said when a significant
 number of members don't actually abide by it 100%., I can agree.  As
 much as we are discussing SC change now, we should allow us to discuss
 changing it as long as we abide by the current SC during its valid term.
 I mean people with view to have stricter FREE requirement should not be
 forced to leave project via this pledge process. 

I don't think the text I wrote puts any limits on how much you can support
free stuff; it only puts limits on how much you can ignore other people's
opinions and how poorly you can treat other people. If you only want to
license your work under the MIT license, and never the GPL because you think
that is too restrictive, eg, you can perfectly well make that pledge.

 To me, none of us made action which does not abide to the valid current
 SC.  We only overruled a part of SC when it conflicted with another one
 in SC via GR.  I.e. 100% free vs. user.

I'm not saying the project doesn't support the SC as it stands, just that
some DDs don't. That applies to both the remain 100% free claim (it's
silly to do that now, because it wouldn't be a functioanl OS or we've
never been 100% free up 'til now, how can we `remain' that way?) or the
we support [non-free works'] use and provide infrastructure for non-free
packages (but Debian will remain 100% free, I certainly won't,
non-free should be dropped).

It makes sense that day-to-day decisions that flow from the social
contract might result in disagreements (eg, is the GFDL ever free?,
should non-free be released as part of stable, or kept separately?,
should packages in non-free ever delay packages in main getting released
into testing or stable?), but when the social contract *itself* is the
cause of disagreement within the project, I find that troubling.

 Although I did not agree to the current SC vote, I have been abiding to
 the current SC. Thus we casted our vote for this GR for lenny.

Yeah, you can abide by a document you don't support, but if it's
possible to get a document that 95% of the project as it stands actually
*supports*, I think it makes sense to consider whether keeping the remaining
5% who have principled disagreements with some part or other is going to
be a good way of running the project.

My draft was written with the aim of being something that who simply
want complete (software) freedom above all else could readily agree with,
and sign their name to, as can people who don't much care about the politics
or philosophy of free software and just want to keep some non-free packages
well maintained. Maybe it doesn't succeed at that, I don't know.

  Anyway, given the last proposal I made [0] went nowhere, [...]
 This is Technical 

Re: Results for General Resolution: Lenny and resolving DFSG violations

2008-12-28 Thread Anthony Towns
On Sun, Dec 28, 2008 at 12:04:43AM +, devo...@vote.debian.org wrote:
 In the following table, tally[row x][col y] represents the votes that
 option x received over option y.
   Option
   1 2 3 4 5 6 7 
 ===   ===   ===   ===   ===   ===   === 
 Option 1   4660727389   117 
 Option 2281 160   160   171   177   224 
 Option 325561 125   137   151   204 
 Option 4253   121   146 160   166   194 
 Option 5234   105   128   135 136   191 
 Option 6220   118   134   125   134 180 
 Option 7226   129   145   153   160   169   

 Dropping Option 1 because of Majority. [...]
 Dropping Option 2 because of Majority. [...]
 Dropping Option 3 because of Majority. [...]
 Dropping Option 4 because of Majority. [...]
 Dropping Option 6 because of Majority. [...]

 The Schwartz Set contains:
Option 5 Assume blobs comply with GPL unless proven otherwise

If you consider the same results, without the supermajority requirements
for options 2, 3, 4 and 6, you get:

Winner: Option 2: Allow Lenny to release with proprietary firmware

It beats the second choice by 39 votes (160 versus 121), which is:

Second: Option 4: Empower the release team to decide ...

They beat the third choice by 99 votes (160 versus 61) and 11 votes (146 versus 
125) respectively, which is:

Third: Option 3: Allow Lenny to release with DFSG violations

They in turn beat the fourth choice (which was the winning option,
choice 5) by, respectively, 66 votes (171 versus 105), 25 votes (160
versus 135), and 9 votes (137 versus 128).

Fourth: Option 5: Assume blobs comply with GPL unless proven otherwise
(winner as per listed supermajority requirements and devotee's mail)

Option 5 beat option 6 by only two votes (136 versus 134), while the others
beat option 6 by, respectively, 59 votes (177 v 118), and 41 votes (166 v 125),
17 votes (151 v 134).

Fifth: Option 6: Exclude source requirements for firmware (defined)

Further discussion came sixth, beaten by between 95 votes (option 2),
and 11 votes (option 6), with Reaffirm the social contract last, defeated
by further discussion by 109 votes.

The only differences between the text of options 2 and 5 seems to be that
option 2 says:

Option 2: Allow Lenny to release with proprietary firmware

 4. We give priority to the timely release of Lenny over sorting
every bit out; for this reason, we will treat removal of sourceless
firmware as a best-effort process, and deliver firmware as part of
Debian Lenny as long as we are legally allowed to do so.

whereas option 5 has an additional subclause:

Option 5: Assume blobs comply with GPL unless proven otherwise

 4. [same text as above, with the addition of:]
and the firmware is distributed upstream under a license that
complies with the DFSG.

It's possible that has no practical difference, in which case all the
furour over the running of the vote has no practical effect.

If there are actual cases where the difference is important (firmware
still included in the kernel or other packages that's explicitly licensed
as non-free, rather than being licensed under the GPL or other free
license, but not including something that looks like source code),
then I guess it's a question of whether the immediate past secretary's
ruling on the supermajority requirements for the vote are going to be
considered binding.

 The voters have spoken, the bastards... --unknown

Cheers,
aj



signature.asc
Description: Digital signature


Re: Results for General Resolution: Lenny and resolving DFSG violations

2008-12-28 Thread Anthony Towns
On Sun, Dec 28, 2008 at 09:08:04PM +1000, Anthony Towns wrote:
 Further discussion came sixth, beaten by between 95 votes (option 2),
 and 11 votes (option 6), with Reaffirm the social contract last, defeated
 by further discussion by 109 votes.

Oh, a further thought came to mind. One way to simplify the vote is to
look at who ranked option 1 (reaffirm the SC/delay lenny) first. 

There were a few interesting votes, that didn't rank any option first,
namely:

V: 6353227etobi Tobias Grimm
V: -77---7  msameer Mohammed Sameer
V: 2-- pape Gerrit Pape

(There's nothing special about those votes from a constitutional POV, but
they're an interesting way of communicating none of these options are my
first choice, imho)

Aside from those, everyone indicated some choice as #1. Five people ranked
Option 1 as #1 _in addition to_ some other option, namely:

V: 111amaya Amaya Rodrigo Sastre
V: 112bartm Bart Martens
V: 1---1-2 guus Guus Sliepen
V: 1231---  reg Gregory Colpart
V: 1132457 tale Tapio Lehtonen

Additionally, 27 voters ranked option #1 above all other options (not
counting p...@d.o, listed above):

V: 145-2-3  adejong Arthur de Jong
V: 1-2   bahner Lars Bahner
V: 1356472 ballombe Bill Allombert
V: 132  bas Bas Zoetekouw
V: 1-2bayle Christian Bayle
V: 1546372   brlink Bernhard Link
V: 1465732  cmb Chris Boyle
V: 1667273   daniel Daniel Baumann
V: 1---3-2  dmn Damyan Ivanov
V: 1267225 edelhard Edelhard Becker
V: 1-2  godisch Martin Godisch
V: 1456273  guillem Guillem Jover
V: 1345362igloo Ian Lynagh
V: 1237465   jaqque John Robinson
V: 1546372   js Jonas Smedegaard
V: 1--  lbrenta Ludovic Brenta
V: 1345672 mmagallo Marcelo Magallon
V: 1346562 pabs Paul Wise
V: 1--paulwaite Paul Waite
V: 1346275   peters Peter Samuelson
V: 1236254  rmh Robert Millan
V: 177   roktas Recai Oktas
V: 1256473   schizo Clint Adams
V: 1564372 stew Mike O'Connor
V: 1456273   tb Thomas Bushnell
V: 1--22-- timo Timo Jyrinki
V: 1345672  vlm Vince Mulhollon

Additionally, of the voters who ranked FD first, there was only one
voter who then ranked option #1 above all the other options:

V: 231 toni Toni Mueller

By my count, that's a total of 29 developers in favour of a fairly strict
interpretation of the social contract compared to the other options
available, along with another 5 who consider that equally with some
(but not all) of the other options, out of the 367 developers counted
in the tally.

That compares (somewhat loosely) with 42 developers (out of 323) voting FD
above Release etch even with kernel firmware issues in the 2006 vote [0],
or the 38 developers (out of 396) who voted for the Reaffirm changes option
in the 2004 vote [1].

  [0] http://www.debian.org/vote/2006/vote_007
  [1] http://www.debian.org/vote/2004/vote_004

As percentages, that's 9.6% in 2004, 13% in 2006, and 9.3% in 2008 --
though the comparison is particularly weak since unlike the 2004 and 2008
ballots, the 2006 ballot doesn't distinguish between voters trying to say
I don't want to vote on this and I don't want to see etch release with
non-DFSG-free firmware. Those seem like lower numbers than I might have
expected. YMMV.

Also somewhat interesting: there were 17 developers who didn't express
any preference amongst the options on offer (all simply voted in favour
of further discussion):

V: 221  ana Ana Beatriz Guerrero L??pez
V: 221   anibal Anibal Monsalve Salazar
V: --1arjan Arjan Oosting
V: 221  bureado Jose Parrella
V: 771  costela Leo Costela
V: --1   dajobe Dave Beckett
V: 221  filippo Filippo Giunchedi
V: --1  florian Florian Ernst
V: 221 francois Francois Marier
V: --1helen Helen Faulkner
V: --1  jluebbe Jan L??bbe
V: --1jordi Jordi Mallach
V: --1lange Thomas Lange
V: 771 mace Miah Gregory
V: --1  mhy Mark Hymers
V: --1  sto Sergio Talens-Oliag
V: 221vince Vincent Sanders

And there were an additional 22 voters who just didn't distinguish between
the various let lenny release options (8

Re: Results for General Resolution: Lenny and resolving DFSG violations

2008-12-28 Thread Anthony Towns
On Sun, Dec 28, 2008 at 08:45:16PM -0500, Theodore Tso wrote:
 On Mon, Dec 29, 2008 at 12:48:24AM +, Simon Huggins wrote:
  I wonder how many DDs were ashamed to vote the titled Reaffirm the
  social contract lower than the choices that chose to release.
 I'm not ashamed at all; I joined before the 1.1 revision to the Debian
 Social Contract, which I objected to them, and I still object to now.
 If there was a GR which chainged the Debian Social contract which
 relaxed the first clause to only include __software__ running on the
 Host CPU, I would enthusiastically vote for such a measure.

So what would such a SC look like?

We previously had a vote to revert the SC to 1.0, and while it defeated
reaffirming the current SC, it lost to the option of simply postponing it.
Maybe with nearly four years of experience since then, that's changed
though.

Using the word software as the basis for the divide might be too much:
we've already done a lot of work restricting main to DFSG-free docs, and
I think it makes sense to keep that. Having main be a functioning bunch
of free stuff with a minimal and decreasing amount of random non-free
stuff we still need to support it works well, it seems to me.

Back in the day, I tried writing a version of the SC that felt both
inspiring and within the bounds of what we could actually meet. It looked
like:

   We, the members of the Debian project, make the following pledge:

   1. We will build a free operating system

  We will create and provide an integrated system of free software
  that anyone can use. We will make all our work publically available
  as free software.

   2. We will build a superior operating system

  We will collect and distribute the best software available, and
  strive to continually improve it by making use of the best tools
  and techniques available.

   3. We will build a universal operating system

  We will accept the use of our operating system by all users,
  for all purposes, without discrimination. We will support our
  users to the best of our ability in all the choices they make,
  no matter what our opinion of those choices may be.

   4. We will be open about our activities

  We will conduct our affairs in public and allow anyone to follow our
  discussions. Where public disclosure is not immediately feasible
  we will make any private discussions publically available at the
  earliest opportunity.

   5. We will respect the community

  We will ensure that members of the community can easily and
  effectively contribute their skills and views to the project. We
  will respect the membership of the community, and ensure that our
  treatment of their contributions reflects that respect.

It doesn't try to say how these goals are met, leaving that up to the DPL,
ftpmaster, debian-policy, individual maintainers and future resolutions
by the project. I think that makes sense by and large, but having the
project state that explicitly might be necessary to avoid continuing
ambiguity and arguments. 

For example, having non-free in the archive and the BTS (and potentially
buildds and elsewhere) is implied by point (3) (ie, supporting Debian
users who choose to use non-free software to the best of our ability),
and potentially using non-free software ourselves (such as qmail or pgp
in the past) may be implied by point (2) (using the best available tools
and techniques to do the best job we can). I would personally prefer
for the project to have the freedom to decide those sorts of things
on a day-to-day basis through regular decision making (maintainers,
list debate, DPL, ftpmaster, RM, tech-ctte, simple majority vote), but
I don't know if the rest of the project will buy that these days. I'm
fairly sure some people won't, at any rate.

It drops the 100% free phrasing we've had in the past, because
fundamentally what we have isn't 100% free. It might be three-nines
edging onto four-nines, but we don't even have an accurate measurement.
Calling main as it stands today an integrated system of free software
seems the best compromise between staying focussed on freedom, not
claiming to be completely free until we are, and not devolving into
impenetrable jargon that I could come up with.

It redoes the we will not hide problems phrasing in a way that,
I think, reflects the intent better than the current wording, which
seems to support just about everything but the BTS to be done in
secret. Unfortunately that's some way off current practice wrt conducting
project activities on restricted machines, private IRC channels, unlogged
IRC channels, in personal emails, and on private lists.

I don't think the community clause is terribly well worded, but
that's what you get when you make stuff up out of whole cloth rather
than building on previous attempts.

One other thing the above does is, unlike the current SC, is use the word
Debian to refer solely to the project -- so it 

Re: Bug reports of DFSG violations are tagged ???lenny-ignore????

2008-10-21 Thread Anthony Towns
On Mon, Oct 20, 2008 at 10:55:00AM -0700, Thomas Bushnell BSG wrote:
 On Mon, 2008-10-20 at 11:43 -0500, Manoj Srivastava wrote:

Interesting; Manoj's post isn't in the -vote archives on master. I wonder
why that is?

  Actually, I think we need a GR on the lines of
  ,
  |  http://www.debian.org/vote/2006/vote_007
  |  General Resolution: Handling source-less firmware in the Linux kernel
  `
  To get a special dispensation for lenny.
 I think this would be insane.  [...]
 I object to a second round of this.  I was ok with it once, [...]

Hrm, were you? Hey, we can check!

V: 12tb Thomas Bushnell
 -- http://www.debian.org/vote/2004/gr_editorial_tally.txt

(in favour of editorial amendments GR that made all non-free anything
 unambiguously unsuitable for main; except maybe license texts)

V: 3457216   tb Thomas Bushnell
 -- http://www.debian.org/vote/2004/gr_sarge_tally.txt

(The Debian Project resolves that it will not compromise on freedom,
 and will never knowingly issue another release (excluding point
 updates to stable releases) that contains anything in the main  or
 contrib sections which is not free software according to the DFSG.;
 with the various proposed exceptions for sarge ranged between [2] and
 [5], further discussion at [6], and reverting the previous GR at [7])

V: 12tb Thomas Bushnell
  -- http://www.debian.org/vote/2006/vote_004_tally.txt

 (Reaffirms that programmatic works distributed in the Debian system
  (IE, in main) must be 100% Free Software, regardless of whether the
  work is designed to run on the CPU, a subsidiary processing unit,
  or by some other form of execution.; Further Discussion won the day)

V: 231   tb Thomas Bushnell
  -- http://www.debian.org/vote/2006/vote_007_tally.txt

 (Options were Release etch with DFSG problems, but no regressions
  compared to sarge, exemptions for images and for firmware while
  technically needed but with no specific end date, and further
  discussion; the first option won the day)

Seems to me you held pretty much the same opinions then as you do now...

 The kernel team should *fix the bug* and not just sit on their hands.

You know, I haven't been paying any attention, but somehow I don't think
the kernel team have really just been sitting on their hands. It just
seems like maybe there's a third option, you know? Well, I don't and maybe
I'm mistaken, so as a show of good faith, here's a photo of me sitting
on my hands [0]. Because, hey, _someone_ must have been doing it, right?

 We should not release until it's fixed.

Why don't we embrace the principle fully, and remove all our old releases
too? That's not sarcasm -- I just don't see a reason to reject that idea,
but not also to keep compromising until there's no longer anything to
compromise with. AFAICS, the idea is to stop Debian users and developers
from kidding themselves that they've got a free OS and force them to fix
the remaining problems until they do. And if that's really a good idea,
why not commit to it? 

But hey, I never saw the problem with only wanting to distribute free
/software/, and we know where that sort of thinking leads!

 Moreover, at the time, there was an amendment proposed to make it as
 long as required and it got fewer votes than the one-time thing.
 Pretty clearly, we *already decided* this issue, and we need no vote.

We decided there would be an exception for sarge, and another one for
etch. I don't think there's been any decision made via GR on lenny,
and even if there had been, another GR could quite reasonably overturn
it if enough people felt it was warranted.

 We need the relevant maintainers to be told your unwillingness to fix
 this means we will not be able to release.

What good do you think that will do? Here, let me try:

Thomas: your continued inaction and unwillingness to code an acceptable
solution to this issue, in spite of being aware of the problem since
at least 2004 -- over four years ago! -- means we will continue to do
releases with non-free software.

Did it do any good? Is there something different about other maintainers
that will make that logic work better on them, than you?

 I object very strongly to the feeling that I am being held hostage by
 developers who will not fix the bug, and then protest emergency! we
 must release! no delay! we'll do it next time! and then sit on their
 hands again for another go-round.  The solution is to refuse to play
 along, and to say, hey, you had two years; we're just going to wait
 until you fix the bug.

Hey, you've had four years; we're just going to keep releasing until
you fix the bug.

Hint: you're not being held hostage by anyone, seriously. You know how
you can tell? Two words: Stockholm syndrome.

Cheers,
aj, who knows what completely ignoring the lists is like, and wants a
fresh comparison of that to randomly trolling into 

Re: Adding lzma to dpkg's Pre-Depends

2008-04-01 Thread Anthony Towns
On Tue, Apr 01, 2008 at 08:05:06AM +0300, Guillem Jover wrote:
 As per policy 3.5 I'm bringing this up here. I'd like to add lzma to
 dpkg's Pre-Depends, so that we can use lzma compressed packages after
 lenny w/o having to add an lzma Pre-Depends on each .deb package
 compressed that way.

Hrm. Alternatively, the packages _do_ pre-depend on lzma though; and
you're aiming to avoid that by making lzma Essential:yes -- in the same
way packages that pre-depend on perl or bash don't need an explicit
dependency.

libz and libbz2 are both included statically; would it make more sense to
do the same thing with the lzma (ie, copy the binary into /usr/lib/dpkg),
instead of making lzma essential?

Cheers,
aj



signature.asc
Description: Digital signature


Re: Blueray software, was: What CDs and DVDs should we produce for lenny?

2008-03-17 Thread Anthony Towns
On Mon, Mar 17, 2008 at 08:16:55AM -0500, Ron Johnson wrote:
 On 03/17/08 04:47, Philip Charles wrote:
 [snip]
  worrying about.  Even then bluray disc(s) will take up about the same 
  space as a CD set.
 

21GB on CD is 21GB on Bluray. Physical space isn't an issue for us.

Cheers,
aj


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: What CDs and DVDs should we produce for lenny?

2008-03-17 Thread Anthony Towns
On Mon, Mar 17, 2008 at 01:39:40PM +, Steve McIntyre wrote:
 [ /me sets the Reply-To: to debian-cd again... ]

But not Mail-Followup-To:...

 At a bare minimum:
- installer - downloadable  (business card)
- installer+base - downloadable (netinst)
  - CD - disk 1 downloadable, disk 2+ jigdo-only
  - DVD - disk 1 downloadable, disk 2+ jigdo-only
  - BD - one image jigdo-only
 That's 25MB + 650MB + 4GB of images per-arch, for about 61GB in total,
 plus a whole bunch of jigdo images (about 500?).

So more like 25 + 150 + 650 + 4000 = 4825 per arch, for about 63GB in
total. Either way.

 Is it possible to create a jigdo image without creating the full
 ISO? ie, to go from a list of files you want on the ISO straight to a
 jigdo template without the intervening step of actually copying all the
 files around?
 Oh, absolutely. That's one of the biggest changes I made in
 debian-cd/mkisofs to improve performance. However... if we want to
 continue providing torrent downloads (which are very popular, I
 understand) then we do still need to make the full images too.

So, there's three user scenarios, I guess:

- great network access, download everything directly (netinst
  gets the process started quickest, and downloading everything
  is fine)

- good network access but don't want to download debs multiple
  times, or want to download in bulk in advance (run a proxy or
  mirror; or download DVD/CD images, and use them)

- bad network access (buy/download everything on DVD/CD/BD and use
  it to install, or populate a local mirror)

And there's four ways we can get debs to people:

- regular archive (apt, netinst, jigdo)
- raw images (download via cd mirrors)
- torrented images (download via cd torrents)
- vendors burn images and mail them to people

If you're buying/mailing images, it's out of our hands, provided vendors
can get images in the first place, so ignore that. Our regular archive
is already mostly optimised, so the more people using it, the better;
that's just a matter of more jigdo use, afaics.

That leaves us with torrent and http iso downloaders -- possible lots or
possibly not too many depending on whether we can make jigdo any easier.
But I don't think there's any way to avoid that, it's just a question
of how many, isn't it?

I guess there's an inequality like:

images on mirrors = images on torrents = images via jigdo

And images on torrents = images you have to generate. And the inequalities
go the other way too:

ease of downloading = ease of torrenting = ease of jigdoing

and the real question is where you say if you really want the 23rd CD
for mipsel, you're probably smart/dedicated enough to use jigdo.

The other thing we /could/ do is encourage people who've done successful
Debian installs to help contribute by participating in a torrent after
the fact -- you could do all sorts of things like have a FUSE filesystem
that takes a (partial) mirror and a jigdo file and lets you see fake iso
files, which you then seed via bittorrent, eg. You could automate that,
so it's just a question like the popcon one: Do you wish to participate
as a torrent seed for other people installing Debian? Yes [No]

Another option would be a jigdo firefox plugin -- even if a pure
javascript jigdo turns out too hard, a plugin ought to be pretty
easy. Otherwise there's Java potentially, but at that point you start
getting into OS-specific scenarios, and worrying about ActiveX or .NET
and installers or whatever, at which point things get too hard. :-/

I guess another option would be to have a virtual appliance that will
do all the jigdo stuff for you by running a cut down Debian in a virtual
machine (vmplayer, qemu, etc) and generating the isos for you.

Hrm. In the real world, does jigdo actually saturate broadband bandwidth?
It's been a long time since I've tried it, but I vaguely remember it
not actually being very speedy. Ah, it was the stop downloading, add
files to image that used to slow things down, but seem less of an issue
now. The repeated wgets probably still aren't great for that matter,
since it serialises downloading and establishing connections.

Cheers,
aj



signature.asc
Description: Digital signature


Re: What CDs and DVDs should we produce for lenny?

2008-03-16 Thread Anthony Towns
On Sun, Mar 16, 2008 at 11:59:52PM +, Steve McIntyre wrote:
  2 small CDs per arch (business card, netinst)
  ~30 CDs per arch for a full CD set
  ~4 DVDs per arch for a full DVD set
  (total 353 CDs, 51 DVDs, 426 GB)

Bluray image? Apparently there's been a winner in the format wars,
and we could probably fit an entire arch on a single disc...

Should we be counting a live CD/DVD/BD image in there too?

Is it possible to do a javascript implementation of jigdo, so we could
reasonably just publish a list of the files that need to go on most of
the CDs instead of the entire iso images? If you can download an image
via jigdo just by clicking in your browser, that'd seem like we could
rely on jigdo much more heavily than we have.

How many different boot images do we have these days? We used to have
a different boot image on each of the first N CDs, do we still do that?

Is there really a lot of value in the netinst image, versus the business
card? You're going to be downloading stuff anyway, so the only difference
I can see is if your system can download once you've got base installed,
but can't from the installer. Would it be simpler just to expect that
class of people to grab a full CD/DVD image (and thus have more than just
base available once they've rebooted and are trying to get net working)?

At a bare minimum:

- installer - downloadable (business card)
- installer+base - jigdo-only? (netinst)
- CD - disk 1 downloadable, disk 2+ jigdo-only
- DVD - disk 1 downloadable, disk 2+ jigdo-only
- BD - one image jigdo-only

That's 25MB + 650MB + 4GB of images per-arch, for about 61GB in total,
plus a whole bunch of jigdo images (about 500?).

Is it possible to create a jigdo image without creating the full
ISO? ie, to go from a list of files you want on the ISO straight to a
jigdo template without the intervening step of actually copying all the
files around?

If so, then the cost of having all sorts of images available becomes
pretty small: generate a jigdo, let people who want it download the
image using a javascript capable web browser.

Cheers,
aj



signature.asc
Description: Digital signature


Re: dpkg semi-hijack - an announcement (also, triggers)

2008-03-09 Thread Anthony Towns
On Sun, Mar 09, 2008 at 07:52:28PM +0100, Raphael Hertzog wrote:
 On Sun, 09 Mar 2008, Raphael Hertzog wrote:
  On Sun, 09 Mar 2008, Ian Jackson wrote:
   With this message I am unilaterally declaring myself a maintainer of
   dpkg, and also declaring that Guillem is no longer a maintainer.
  For the record, Ian has been removed from the dpkg group on Alioth and
  we asked for an UNACCEPT of his upload, but I'm not sure it will be done
  on time as none of the ftpmasters responded yet to my queries on IRC.
 The package got unaccepted by Anthony Towns.

Beyond that, any additional uploads of dpkg will be REJECTed until you
guys resolve this nonsense. Flamewars on -devel, ignoring functional
patches for months on end, package hijacks and requests for UNACCEPTs
aren't the way to maintain dpkg.

Cheers,
aj



signature.asc
Description: Digital signature


Re: dpkg semi-hijack - an announcement (also, triggers)

2008-03-09 Thread Anthony Towns
On Sun, Mar 09, 2008 at 10:38:44PM -0500, Steve Greenland wrote:
 On 09-Mar-08, 19:30 (CDT), Daniel Stone [EMAIL PROTECTED] wrote: 
  I was going to ask on which grounds exactly you were judging the dpkg
  team's competence (and that of iwj's: have you reviewed the branch
  yourself? can you confidently say that it's all fine?),
 The problem is not the dpkg team has reviewed the patch and had problems
 with it, it's that they've ignored it for 6 months.

That's not the full picture. 

Ian's been trying to be involved in the dpkg team for longer than six
months, and not been incredibly effective at that; eg from July:

   I will of course be careful about controversial changes.  For example,
   I'll refrain from committing my formatting fixup from #375711 until
   we've come to a conclusion.  I hope you can trust my judgement about
   what would be a controversial change.

   -- http://lists.debian.org/debian-dpkg/2007/07/msg00013.html 

Ian then reposted the triggers spec and published a git tree for the patch,
with the following comment:

   I'd appreciate it if no-one reformatted it or change the style.  If
   you have disagreements with the code please discuss it here on the
   list before making any changes.  Checking a significantly changed
   version into the main Debian git will cause snarl-ups because our
   merges will constantly need resolving.

   -- http://lists.debian.org/debian-dpkg/2007/08/msg00014.html
   -- http://lists.debian.org/debian-dpkg/2007/08/msg9.html

Ian then reimplemented the status file parsing using flex, in a way he
reported was faster, but hadn't tested, and suggested it get included in
sid.

   I have written over the weekend a replacement for lib/fields.c and
   most of lib/parse.c, which uses flex (and flex start conditions) to
   generate a table-driven scanner-cum-parser.  I haven't tested this
   fully for correctness yet, but I have done basic functionality tests
   and some performance tests.

   ...

   The downside is that it's 100K longer in code size. ...

   Anyway, I think we should deploy the flex-based scanner in sid (after
   I've tested it a bit more) and then think at our leisure about how to
   improve the shared code situation.

   -- http://lists.debian.org/debian-dpkg/2007/08/msg00028.html

Guillem replied to that patch within about four days, but the git tree
Ian developed it in was based on the triggers tree, so can't be easily
merged independently.

In October, Joey proposed his v3 source package format, which is one of
the other major outstanding patches. I don't believe it has any stylistic
problems, but it still seems to be being reinvented/redisgned, rather than
being applied.

   -- http://lists.debian.org/debian-dpkg/2007/10/msg9.html
   -- http://lists.debian.org/debian-dpkg/2008/02/msg00012.html
  http://lists.debian.org/debian-dpkg/2008/02/msg00079.html
  http://lists.debian.org/debian-dpkg/2008/02/msg00131.html

Also in October, Colin Watson asked what the status of triggers was. Ian
replied:

   The implementation of triggers is not going to change incompatibly.
   It's well-tested now in Ubuntu and should just be merged into Debian's
   dpkg.

   -- http://lists.debian.org/debian-dpkg/2007/10/msg00107.html

Guillem replied to that:

   Err, well of course it's highly desirable to not do such kind of
   changes without good reason, but I don't think the fact that it has been
   deployed in a derivative distro means that we should blindly merge any
   such code drops without review and/or possible changes.

   -- http://lists.debian.org/debian-dpkg/2007/10/msg00132.html

Ian replied to that:

   Don't be ridiculous.  This is offensive to me personally.

   This code has been
* designed with extensive input from this mailing list in Debian fora
* written by dpkg's original maintainer
* tested extensively
* available for merging for several months

   -- http://lists.debian.org/debian-dpkg/2007/10/msg00138.html

Guillem didn't reply to that; his next comment on triggers a couple of weeks
later was, in response to Ian:

This isn't a matter of preference, I'm afraid.  I reverted this
because the change was wrong.  NULL is incorrect in that context (a
stdarg function expecting a char*), because it may be #define'd to 0.

   That's true, but then I agree with others [0] that an environment that
   defines NULL to 0 (even if the standard allows that) is not sane. Such
   ancient environment will also not be able to cope with modern software
   like gtk, anyway.

   [0] http://lwn.net/Articles/93577/

   -- http://lists.debian.org/debian-dpkg/2007/10/msg00228.html

There were a couple of messages that sounded promising in regards to a
productive conclusion at the end of that month:

   -- http://lists.debian.org/debian-dpkg/2007/10/msg00230.html
   -- http://lists.debian.org/debian-dpkg/2007/10/msg00231.html

Nothing much happened in Nov or Dec; both Ian and Guillem posted about
random other stuff, a 

Re: Google Summer of Code 2008

2008-02-28 Thread Anthony Towns
On Wed, Feb 27, 2008 at 01:53:17PM +, Jon Dowland wrote:
 On Wed, Feb 27, 2008 at 09:42:17AM +0100, Lucas Nussbaum
 wrote:
  (1) Forbid DDs and people in the NM process waiting for
  FD/DAM to apply as students.
 What if we do this, and still do not get many new people
 applying? How about a policy of prioritising
 non-DD/NM/DM/whatever contributions, rather than outright
 forbidding established people?

Uh, applicants who're already familiar with the project (both Debian
and the specific GSoC project they're applying for) have a much better
chance of success; applicants who are already DDs have a much easier
time actually contributing than people who aren't. Hamstringing ourselves
and our applicants by discouraging prior involvement is crazy.

For comparison: I mentored the same project in 2006 and 2007 with
different students; the 2006 student unfortunately wasn't able to get
anywhere; the 2007 student has been involved in Debian as a sponsored
package maintainer for a while that happened to be related to the topic,
worked on academic research also related to the topic, and at the end
of the summer was was one of the test cases for deployment of Debian
Maintainers; he was impressively successful at the GSoC task and has
been continuing with it since then.

Sorry, but preferncing people with no experience or involvement is a
*completely* backwards approach, however you water it down.

That said, GSoC is meant to be about *learning* and *getting people
involved* in the project and mentorship, so a student who's already
really experienced with Debian will still need to find some area that
they don't already know inside and out, aren't already involved in
completely, and can find someone who knows more about it than they do
to act as their mentor.

Cheers,
aj



signature.asc
Description: Digital signature


Re: dpkg-buildpackage now reorganizing debian/control Depends field??

2008-02-23 Thread Anthony Towns
On Fri, Feb 22, 2008 at 06:23:28PM -0800, Daniel Burrows wrote:
   Would it be possible to only re-order elements that were introduced by
 a variable substitution?  That would make the list deterministic without
 changing what the maintainer wrote.

At best you could:

(a) sort substvar dependencies
(b) drop repeated deps from substvars

without messing up the maintainer's ordering. If you've got, say:

Depends: foo, bar, ${baz:Depends}

with ${baz:Depends} expanding to foo (= 1.2), then you have the choice
of:

Depends: foo, bar, foo (= 1.2)# duplicates foo dep uselessly

Depends: bar, foo (= 1.2) # drops explicitly added dep,
   # and reorders, changing apt's
   # behaviour

Depends: foo (= 1.2), bar # adds version info from shlibdep
   # to explicit dep

I'm not sure the latter actually has the exact same behaviour as the
first; if foo2 Provides: foo and has a higher Priority: the first Depends:
might install foo2,bar,foo instead of just foo and bar; likewise if bar
Depends: foo2|foo.

For comparison, if you had:

Depends: foo (= 1.3), bar, ${baz:Depends}

ending up with

Depends: bar, foo (= 1.3)

instead of just ignoring the redundant baz:Depends entirely seems a
bit silly. 

The *safest* way of doing eliminations is thus probably:

new_deps = []
for dep in expands_substvars(cur_deps):
add = 1
for odep in new_deps:
if odep.implies(dep): add = 0
if add:
new_deps.append(dep)

And if you're willing to have `foo, bar, foo (= 1.2)' - `foo (= 1.2),
bar' (as per above), then something like:

new_deps = []
for dep in expands_substvars(cur_deps):
add = 1
for odep_pos in range(len(new_deps)):
odep = new_deps[odep_pos]

if odep is None:
continue
elif odep.implies(dep):
add = 0
break
elif dep.implies(odep):
if add:
new_deps[odep_pos] = dep
else:
new_deps[odep_pos] = None
add = 0
if add:
new_deps.append(dep)
new_deps = [ x for x in new_deps if x is not None]

would work.

The new_deps[odep_pos] = None portion lets you turn:

foo, foo (= 1.0), foo (= 2.0), foo (= 1.5)

into:

new_dep still to look at
foo, foo (= 1.0), foo (= 2.0), foo (= 1.5)
foo foo (= 1.0), foo (= 2.0), foo (= 1.5)
foo (= 1.0),   foo (= 2.0), foo (= 1.5)
foo (= 1.0), foo (= 2.0)  foo (= 1.5)
foo (= 1.5)

Cheers,
aj



signature.asc
Description: Digital signature


Re: Meaning of the Altering package upload rules

2008-02-15 Thread Anthony Towns
On Fri, Feb 15, 2008 at 11:45:45AM +0100, Stefano Zacchiroli wrote:
 Hence I think we should push for source upload. 

Stop pushing and start programming. A technical approach to this would
be implementing something along the lines of

http://lists.debian.org/debian-devel/2006/07/msg00544.html

It's trivial for interested DDs to setup an autobuilder; and if you're
not willing to trivial work to demonstrate a policy change is useful,
arguing's just a waste of everyone's time.

Cheers,
aj



signature.asc
Description: Digital signature


Re: Proposition: 'NMU' upload of wxwidgets 2.8

2008-02-04 Thread Anthony Towns
On Sun, Feb 03, 2008 at 04:30:09PM -0600, William Pitcock wrote:
  Currently, the packages that are asking for wx2.8 are almost all available
  and releasable in earlier versions, built against wx2.6.  Uploading wx2.8 to
  unstable implies that it's suitable for apps to build against, which by all
  accounts it is not.
 Maybe an upload to experimental would be appropriate then?

Usually.

Cheers,
aj


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: [proposal] Documenting which revision is installed

2007-12-30 Thread Anthony Towns
On Fri, Dec 28, 2007 at 08:20:01AM +0100, Frans Pop wrote:
 I agree with Anthony that it is very much preferable to have a solution
 that's just able to automatically determine the correct version.

Okay, so here's a updated version that generates both debian_version and
lsb-release as specced by dato, if it's given arguments of debian-version
or dato-release, and has appropriate perms.

In order for it to be useful, I guess it'd need to be in base, and hence
written in perl or C (unless we decided to add python to base).

] $ ./debian_version.py debian-version
] /etc/debian_version should contain:
] lenny
] $ ./debian_version.py dato-release
] /etc/lsb-release should contain:
] DISTRIB_ID=Debian
] DISTRIB_RELEASE=lenny
] DISTRIB_CODENAME=lenny
] DISTRIB_DESCRIPTION=Debian x.y Testing distribution - Not Released

] $ ./debian_version.py noisy
] Packages seem to be from Debian release lenny
] Debian x.y Testing distribution - Not Released
] ['mirror.internode.on.net_pub_debian_dists_lenny_Release', 
'http.us.debian.org_debian_dists_lenny_Release']
]  89.4% HIT RATE (1293 of 1447)
]  95.3% of installed packages available
]   4.4% of matching packages could be upgraded
]   1.8% of matching packages are more recent

] $ sudo rm /etc/debian_version /etc/lsb-release
] $ sudo ./debian_version.py debian-version dato-release
] $ cat /etc/debian_version; echo ; cat /etc/lsb-release
] lenny
] 
] DISTRIB_ID=Debian
] DISTRIB_RELEASE=lenny
] DISTRIB_CODENAME=lenny
] DISTRIB_DESCRIPTION=Debian x.y Testing distribution - Not Released

Cheers,
aj

#!/usr/bin/env python

# Copyright 2007 Anthony Towns
# GPL v2 or later.

import apt_pkg, sys, os

apt_pkg.init()

def try_write(file):
try:
f = open(file, w)
except IOError:
f = sys.stdout
f.write(%s should contain:\n % file)
return f

def uniq(l):
return dict( [(x,1) for x in l] ).keys()

def get_installed():
vs = {}
i = open(/var/lib/dpkg/status, r)
p,v,x = None,None,None
for l in i.xreadlines():
	l = l.rstrip()
	if l.startswith(Package: ): p = l[l.find( )+1:]
	if l.startswith(Version: ): v = l[l.find( )+1:]
	if l.startswith(Status: ):
	x = l.split( )[1:]
	if l == :
	if x and x[0] != hold and x[1] == ok and x[2] == installed:
		vs[p] = v
	p,v,x = None,None,None
i.close()
return vs

vlal = /var/lib/apt/lists
arch = .join(os.popen(dpkg --print-architecture, r).readlines()).rstrip()

def releases():
urs = {}
for path in os.listdir(vlal):
if not path.endswith(_Release.gpg): continue
path = path[:-4]

	release_info = []
	o,l,s,v,c = [None] * 5
	for l in open(os.path.join(vlal,path)).xreadlines():
	l = l.rstrip()
	if l[0] !=  :
		release_info.append(
			(l[:l.find(:)], l[l.find(:)+1:].lstrip()) )
	else:
		x = release_info[-1]
		x = (x[0], x[1] + \n + l[1:])
		release_info[-1] = x
	release_info_l = release_info
	release_info = dict(release_info)

	vendor = filter(None, [
		release_info.get(Label, None),
		release_info.get(Origin, None),
		unknown] ) [0]

	version = filter(None, [
		release_info.get(Version, None),
		release_info.get(Codename, None),
		release_info.get(Suite, None),
		unknown] ) [0]

	pkgs = [x for x in os.listdir(vlal) 
			if x.startswith(path[:-7])
			and x.endswith(_binary-%s_Packages % arch) ]

	k = (vendor,version)
	if k not in urs: urs[k] = ([],[],[])
	urs[k][0].append( path )
	urs[k][1].append( release_info )
	urs[k][2].extend( pkgs )

res = []
for k,v in urs.iteritems():
	(vendor, version) = k
(paths, rels, pkgs) = v
	res.append( (vendor, version, paths, rels, readlist(pkgs)) )

return res

def readlist(files):
vs = {}
for file in files:
i = open(os.path.join(vlal, file), r)
p,v = None,None
for l in i.xreadlines():
  	l = l.rstrip()
	if l.startswith(Package: ): p = l[l.find( )+1:]
	if l.startswith(Version: ): v = l[l.find( )+1:]
	if l == :
	vs[p] = v
	p,v = None,None
i.close()
return vs.items()

def compare(installed, list):
same, new, old = 0,0,0
tryagain = dict(installed)
for (p, tv) in list:
if p in installed:
if tv == installed[p]:
	same += 1
		del tryagain[p]
	else:
x = apt_pkg.VersionCompare(installed[p], tv)
	if x  0:
		old += 1
	elif x  0:
		new += 1
	else:
		same += 1
		del tryagain[p]
return same,new,old,tryagain

installed = get_installed()
release_pkgs = releases()

noisy = (noisy in sys.argv[1:])
iterate = (iterate in sys.argv[1:])
debian_version = (debian-version in sys.argv[1:])
dato_release = (dato-release in sys.argv[1:])

intro = Packages
while installed:
best = 0,len(installed),0,-,-,[],-,[]
for vendor, version, path, rels, packages in release_pkgs:
same,new,old,tryagain = compare(installed, packages)
if same  best[0]:
	best = same,new,old,vendor,version,rels,path,tryagain

Re: [proposal] Documenting which revision is installed

2007-12-27 Thread Anthony Towns
On Thu, Dec 27, 2007 at 04:21:20PM +0100, Adeodato Sim?? wrote:
 * Anthony Towns [Thu, 27 Dec 2007 17:34:49 +1000]:
  On Wed, Dec 26, 2007 at 11:53:25PM +0100, Adeodato Sim?? wrote:
   *Personally*, I like the idea of Javier Fern??ndez-Sanguino expressed in
   the mail linked above of keeping debian_version as is, and introducing
   /etc/lsb-release with detailed information like:
 DISTRIB_ID=Debian
 DISTRIB_RELEASE=4.0
 DISTRIB_CODENAME=etch
 DISTRIB_DESCRIPTION=Debian GNU/Linux 4.0 'etch'
  The problem with base-files providing /etc/debian_version is that it means
  /etc/debian_version can really only tell you what version of base-files
  is installed. So if you upgrade every other package but base-files from
  4.0r1 to 4.0r2, you have all the functionality of 4.0r2 but get reported as
  4.0r1, and if you just upgrade base-files, you get reported as 4.0r2 while
  still having the bugs from 4.0r1 that were meant to have been fixed.
 Yes, of course. And this is brought up whenever there's talk about
 /etc/debian_version. :-)

Right, so why not fix it properly? (Did you read the rest of my mail?)

 However, I believe that most people wanting more detail in that file, or
 another file, are aware of such limitations, 

The main limitation is that it's a nuisance to update -- you can't
differentiate testing and unstable because of that, eg, and when we're due
for a release we end up having testing/unstable pretend they're really
stable already for a while, eg. Updating it more often just makes that
more of a nuisance.

Cheers,
aj



signature.asc
Description: Digital signature


Re: wxwidgets 2.8, anyone?

2007-12-26 Thread Anthony Towns
On Sun, Dec 23, 2007 at 02:26:30PM +0100, Bernd Zeimetz wrote:
 1. Get wx2.4 out of the archive _soon_. There's a list in wiki.d.o about
 the status of the last applications using wx2.4, if I remember right.
 Their maintainers had more than enough time to et them migrated to 2.6
 (or 2.8, if there would be 2.8).

Sounds like these should be NMUed. gnue-{forms,designer}, openrpg, and
trustedsql sound easy; and jugglemaster is a new package depending on
an oldlib, tsk. That just leaves ctsim, newpki-client and surex-aven
requiring any actual work.

Cheers,
aj



signature.asc
Description: Digital signature


Re: [proposal] Documenting which revision is installed

2007-12-26 Thread Anthony Towns
On Wed, Dec 26, 2007 at 11:53:25PM +0100, Adeodato Sim?? wrote:
 *Personally*, I like the idea of Javier Fern??ndez-Sanguino expressed in
 the mail linked above of keeping debian_version as is, and introducing
 /etc/lsb-release with detailed information like:
   DISTRIB_ID=Debian
   DISTRIB_RELEASE=4.0
   DISTRIB_CODENAME=etch
   DISTRIB_DESCRIPTION=Debian GNU/Linux 4.0 'etch'

The problem with base-files providing /etc/debian_version is that it means
/etc/debian_version can really only tell you what version of base-files
is installed. So if you upgrade every other package but base-files from
4.0r1 to 4.0r2, you have all the functionality of 4.0r2 but get reported as
4.0r1, and if you just upgrade base-files, you get reported as 4.0r2 while
still having the bugs from 4.0r1 that were meant to have been fixed.

Maybe it would be better to have aptitude or similar actually analyse
what's installed compared to the available Packages/Release files,
and generate a /etc/debian_version or /etc/lsb-release file based on
that. It wouldn't require any additional downloads -- it'd just be a matter
of:

- looking at /var/lib/apt/lists/*_Release to see what the latest
  available revision is

- looking at /var/lib/dpkg/status and /var/lib/apt/lists/*_Packages
  to see if the packages on this system are actually updated to
  that revision
  
- based on the above updating /etc/debian_version to reflect the
  version of Debian actually installed

And that way the only things needed for getting the right version would
be (the equivalent of):

# update Release file
apt-get update
apt-get dist-upgrade
aptitude debian-version-update

with no need to worry about multiple branches of base-files or whatever,
or worrying what apt pinning says the admin's intending to install
or similar.

I'm at a bit of a loss as to how you'd do it properly (using python-apt
or something, say), but a proof of concept is attached. Example output:

$ ./debian_version.py 
Packages seem to be from Debian release lenny
 91.7% HIT RATE (1325 of 1445)
 95.5% of installed packages available
  2.2% of matching packages could be upgraded
  1.8% of matching packages are more recent

$ ./debian_version.py 
Packages seem to be from Debian release 4.0r1
 87.3% HIT RATE (517 of 592)
 97.3% of installed packages available
  0.0% of matching packages could be upgraded
 10.2% of matching packages are more recent

$ ./debian_version.py iterate
Packages seem to be from Debian release 4.0r1
 87.3% HIT RATE (517 of 592)
 97.3% of installed packages available
  0.0% of matching packages could be upgraded
 10.2% of matching packages are more recent

Remaining packages seem to be from Debian release 4.0-updates
 61.3% HIT RATE (46 of 75)
 68.0% of installed packages available
  9.8% of matching packages could be upgraded
  0.0% of matching packages are more recent

Remaining packages seem to be from Debian-Security release etch
 10.3% HIT RATE (3 of 29)
 24.1% of installed packages available
 14.3% of matching packages could be upgraded
 42.9% of matching packages are more recent

Remaining packages:
bzr: 0.15-1
...

Cheers,
aj

#!/usr/bin/env python

# Copyright 2007 Anthony Towns
# GPL v2 or later.

import apt_pkg, sys, os

apt_pkg.init()

def get_installed():
vs = {}
i = open(/var/lib/dpkg/status, r)
p,v,x = None,None,None
for l in i.xreadlines():
	l = l.rstrip()
	if l.startswith(Package: ): p = l[l.find( )+1:]
	if l.startswith(Version: ): v = l[l.find( )+1:]
	if l.startswith(Status: ):
	x = l.split( )[1:]
	if l == :
	if x and x[0] != hold and x[1] == ok and x[2] == installed:
		vs[p] = v
	p,v,x = None,None,None
i.close()
return vs

vlal = /var/lib/apt/lists
arch = .join(os.popen(dpkg --print-architecture, r).readlines()).rstrip()

def releases():
urs = {}
for path in os.listdir(vlal):
if not path.endswith(_Release.gpg): continue
path = path[:-4]

	o,l,s,v,c = [None] * 5
	for l in open(os.path.join(vlal,path)).xreadlines():
	l = l.rstrip()
	if l.startswith(Origin: ):   o = l[l.find( )+1:]
	if l.startswith(Label: ):L = l[l.find( )+1:]
	if l.startswith(Suite: ):s = l[l.find( )+1:]
	if l.startswith(Version: ):  v = l[l.find( )+1:]
	if l.startswith(Codename: ): c = l[l.find( )+1:]

	vendor = filter(None, [L,o,unknown])[0]
	version = filter(None, [v,c,s,unknown])[0]

	pkgs = [x for x in os.listdir(vlal) 
			if x.startswith(path[:-7])
			and x.endswith(_binary-%s_Packages % arch) ]

	k = (vendor,version)
	if k not in urs: urs[k] = ([],[])
	urs[k][0].append( path )
	urs[k][1].extend( pkgs )

res = []
for k,v in urs.iteritems():
	(vendor, version) = k
(paths, pkgs) = v
	res.append( (vendor, version, paths, readlist(pkgs)) )

return res

def readlist(files):
vs = {}
for file

Accepted ifupdown 0.7~alpha3 (source amd64)

2007-12-21 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 22 Dec 2007 00:31:16 +1000
Source: ifupdown
Binary: ifupdown
Architecture: source amd64
Version: 0.7~alpha3
Distribution: experimental
Urgency: low
Maintainer: Anthony Towns [EMAIL PROTECTED]
Changed-By: Anthony Towns [EMAIL PROTECTED]
Description: 
 ifupdown   - high level tools to configure network interfaces
Closes: 431059 456918
Changes: 
 ifupdown (0.7~alpha3) experimental; urgency=low
 .
   * Apply patches from Andreas Henriksson (Closes: Bug#456918)
 - Fix aadr typo in IPv6 loopback method
 - Add dependency on new version of iproute that supports specifying
   netmasks as dotted-quads.
 - Re-add netmask field for backwards compatibility.
 - Flush addresses when taking down a static inet interface.
   (Closes: Bug#431059)
 - Switch inet/dhcp and inet6/static methods to iproute.
 - Update test cases.
 - Support for conversion of ifconfig format hwaddress to iproute format
   hwaddress.
   * Update Build-Depends: to reflect name change from nowebm to noweb.
   * Move DH_COMPAT setting from debian/rules to debian/compat file.
   * Don't ignore errors from make clean in debian/rules clean target.
   * Escape hypens in interfaces.5 manpage.
   * Don't create /usr/bin or /usr/sbin directories.
   * Bump Standards-Version.
Files: 
 78cf4d98ffc82cba2dea72f58d7a41de 536 admin important ifupdown_0.7~alpha3.dsc
 88c01c56bc0cd7b03ad8872a8419eeed 395670 admin important 
ifupdown_0.7~alpha3.tar.gz
 245708bb4309bb72f26e2b4f3c6f1c31 53802 admin important 
ifupdown_0.7~alpha3_amd64.deb

-BEGIN PGP SIGNATURE-

iD8DBQFHa857Oxe8dCpOPqoRAlEEAJ4+iOXYZ7l37j/JCM/7jkNuMbLxUgCeLyNh
uedAAxJRQNvBzVtIlyzr4Pw=
=DnRS
-END PGP SIGNATURE-


Accepted:
ifupdown_0.7~alpha3.dsc
  to pool/main/i/ifupdown/ifupdown_0.7~alpha3.dsc
ifupdown_0.7~alpha3.tar.gz
  to pool/main/i/ifupdown/ifupdown_0.7~alpha3.tar.gz
ifupdown_0.7~alpha3_amd64.deb
  to pool/main/i/ifupdown/ifupdown_0.7~alpha3_amd64.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: priorities

2007-12-07 Thread Anthony Towns
On Thu, Dec 06, 2007 at 11:03:08PM -0600, Manoj Srivastava wrote:
 Frankly, I suggest we look at the list of Unix commands as
  specified by the SUS -- which can also be seen at:
http://en.wikipedia.org/wiki/List_of_Unix_programs
 So -- how many of the standard unix commands as defined by that
  page are not part of the standard section?

I guess one of the the things I wonder every now and then
is whether we really should be keeping standard as implying a
... traditional/historical/whatever Unix system, with pr and lpr and tcsh
and bc and dc and whatever else that people would traditionally expect,
instead of moving them to a task that can be installed only by people
who actually know what they are, and then making sure we provide a real
Unix system in that case. But by the looks of things there's still not
much need for a change there, at least at this point.

Cheers,
aj



signature.asc
Description: Digital signature


Re: priorities

2007-12-07 Thread Anthony Towns
On Fri, Dec 07, 2007 at 08:25:05AM +0100, NN_il_Confusionario wrote:
 Question: is there somewhere on the net a script (*) such that:
 * it installs required/essential packages (_all_ of them but _only_
   them) of such a release as a chroot in that directory

You could create a variant for debootstrap. That's not very hard,
depending on your mood:

# cp /usr/share/debootstrap/scripts/sid my-sid
# patch EOF
@@ -9,7 +9,7 @@
 mirror_style release
 download_style apt
 finddebs_style from-indices
-variants - buildd fakechroot
+variants - buildd fakechroot minbase
 
 if doing_variant fakechroot; then
 test $FAKECHROOT = true || error 1 FAKECHROOTREQ This variant 
requires fakechroot environment to be started
@@ -37,6 +37,8 @@
   # ldd.fake needs binutils
   required=$required binutils
 fi
+
+if doing_variant minbase; then base=apt; fi
 }
 
 first_stage_install () {
EOF
# debootstrap --variant=minbase sid target/ 
http://mirror.internode.on.net/pub/debian/ 

If you don't want apt and its dependencies, you can add --include=ed
--exclude=apt as arguments, or similar. If you don't have anything
at all in base, you'll get some ugly error messages, but I think it'll
still work.

OTOH, there's not much reason not to have that in debootstrap by default,
afaics. What the hey, patch committed. Look for it in version 1.0.8 when
it gets released.

 Every time I do someting like that, too much time is spent for
 dependency hunting. Ad every time I forget to save the list of packages :-(

debootstrap --print-debs will give you a list of packages. It includes
both required and base in the same list, so you have to look for the split
yourselve (zlibg1 and adduser atm), but that's not too hard hopefully.

Cheers,
aj



signature.asc
Description: Digital signature


priorities (was: Re: RFC: cups as default printing system for lenny?)

2007-12-06 Thread Anthony Towns
Kind of reviving an old thread, but anyway:

On Sun, Nov 11, 2007 at 07:12:35PM +0100, Marc 'HE' Brockschmidt wrote:
 I believe it to be one of the more important bits of a standard Unix
 *desktop* installation - but this just reminds me of the fact that I'm
 quite uncomfortable with keeping a system like package priorities around
 for much longer. Diverging use-cases (like in this case) show that one
 definition of standard isn't really helpful anymore.

Haven't we more or less already moved away from priorities as meaning
anything particularly important? We have:

required/essential -- stuff that can't be removed: libc, dpkg, etc
important -- the rest of base, stuff necessary to bootstrap and
recover a usable and useful system
standard -- a minimal collection of useful stuff we'd like to see on
every Debian system
optional -- all the good software in the world
extra -- obscure stuff

All the really important questions are which bits of optional (and
occassionally extra) are useful for a given user.

I'm not sure if there's any point to continuing to try to make sure that
nothing = optional conflicts with anything else = optional.

 I think we may want to start thinking about getting rid of the whole
 thing and switching to something which allows us to express more complex
 importance measurements for packages. In fact, d-i and its task system
 have been a step in that direction, so we maybe should evaluate if we
 want to formalize it a bit more and get it into policy to replace
 priorities.

required and important are both needed by debootstrap, so can't be gotten
rid of (though they could be changed to use some other field/name).

Priority: standard currently contains:

at, bc, dc, lsof, file, less, sharutils, strace
dnsutils, ftp, host, ssh, mtr-tiny, finger, w3m, whois
doc-debian, doc-linux-text
exim, mailx, mutt, procmail, mime-support, mpack
gettext-base, locales
pciutils
perl (not just perl-base), python
reportbug
selinux policy

That seems a pretty reasonable set of functionality to put on all Debian
boxes (unless the admin specifically says otherwise), afaics.

It might be sensible to replace ftp with lftp these days, though. And
I'm not sure what happened to the exim v postfix defaults discussion a
little while ago, and maybe procmail/mpack aren't all that necessary.

It also includes, but afaics, probably doesn't need to (anymore):

ispell, dictionaries-common, iamerican, ibritish, wamerican
m4, texinfo (???)
mtools (access unmounted msdos filesystems, not NTFS though)
nfs-common, portmap (enables mounting NFS shares)
pidentd (is IDENT still used on today's internet, with all its NAT?)
openbsd-inetd  (needed by pidentd)
tcsh (people who remember what it is know how to install it)
time (???)
telnet (netcat is important, as is wget)

But as far as default installs for anything of any real meaning,
I just don't see Priorities as being relevant anymore.

Cheers,
aj



signature.asc
Description: Digital signature


Re: priorities

2007-12-06 Thread Anthony Towns
On Thu, Dec 06, 2007 at 07:42:06AM -0800, Russ Allbery wrote:
 Anthony Towns [EMAIL PROTECTED] writes:
  It also includes, but afaics, probably doesn't need to (anymore):
  ispell, dictionaries-common, iamerican, ibritish, wamerican
  m4, texinfo (???)
 texinfo possibly for info and dating from the days of needing to have an
 info reader to get real documentation for many of the GNU tools?

But texinfo only includes:
/usr/bin/texi2pdf
/usr/bin/texindex
/usr/bin/texi2dvi
/usr/bin/ginstall-info
/usr/bin/makeinfo

The info browser is in the info package (which is priority:important)...

  mtools (access unmounted msdos filesystems, not NTFS though)
 Probably obsolete at this point.

  pidentd (is IDENT still used on today's internet, with all its NAT?)
  openbsd-inetd  (needed by pidentd)
 identd is still used somewhat, mostly with IRC, but it's almost certainly
 optional rather than standard.

  tcsh (people who remember what it is know how to install it)
 Having a /bin/csh falls into present on all Unix systems and likely to
 provoke WTF reactions if not there.  

Which isn't a requirement for standard, but hey...

 Also, I'm pretty sure that tcsh is
 very comfortably the second-most-used interactive shell, way ahead of
 zsh, on Linux systems.

#rank nameinst  vote   old recent no-files
2 bash   69802 58316  2596  8885 5
305   mailx  62713 16369 30995 15343 6
438   tcsh   60057  9042 37123 13886 6
488   mutt   59151  7662 32588 18895 6
555   mtools 60985  6035 40222 14723 5
570   reportbug  61436  5780 40836 14816 4
588   time   61236  5539 41423 14267 7
885   dash   11100  2615  7604   876 5 
1014  zsh 3801  2002  1366   431 2

Of course, there's half a zillion different zsh packages that should have
their stats combined, but whatever.

I find it pretty surprising that somewhere between 1 in 8 systems
(vote/max(inst)) and 1 in 5 systems ((vote+old)/vote) still have tcsh
used recently tbh.

  time (???)
 Likewise.  time is a standard Unix program.

And which is a built-in on bash, tcsh and zsh, so doesn't seem terribly
useful most of the time... (not dash though)

Cheers,
aj



signature.asc
Description: Digital signature


Re: priorities

2007-12-06 Thread Anthony Towns
On Thu, Dec 06, 2007 at 10:26:11AM -0600, Manoj Srivastava wrote:
  I'm not sure if there's any point to continuing to try to make sure
  that nothing = optional conflicts with anything else = optional.
 Hmm.  Can you elaborate on this, please? Is it because it is too
  hard to achieve this? Or you think this is something unattainable even
  in theory? It is a nice invariant, if only we could get it to hold for
  Debian.

I don't have any statistics to back the following up.

I don't think we have been doing it very thoroughly for years now, so
at best it's something that's often true, but not always (eg, there's
only one mail-transport-agent of priority optional or higher -- except
there's actually three: exim4-daemon-light (standard), exim4-daemon-heavy
and nbsmtp).

It requires us to choose a winner amongst similar packages that use
Conflicts instead of alternatives, when really we'd rather leave that
up to our users (or people maintaining derivative distros, or tasksel
or whatever).

I don't think it serves an actual point -- back in the day saying install
everything of priority optional or above was a feasible way of getting
a really powerful and useful Debian system. That's not really plausible
anymore thanks to the sheer amount of software.

  optional -- all the good software in the world
  extra -- obscure stuff
 If we are removing the invariant that everything in optional
  should not conflict with anything else in optional, and extra is where
  the conflicing packages go, is there any reason to retain extra as a
  distinct section?

Being able to classify software as Unless you have a really special need,
you don't want this still seems somewhat useful to me. I also somewhat
like the idea of having your average free software package in main at
a higher priority than your average non-free software package.

Cheers,
aj


signature.asc
Description: Digital signature


Re: priorities

2007-12-06 Thread Anthony Towns
On Thu, Dec 06, 2007 at 05:09:36PM -0600, Manoj Srivastava wrote:
 On Thu, 06 Dec 2007 13:34:10 -0800, Ben Pfaff [EMAIL PROTECTED] said: 
  I use time in benchmarking scripts. 
 I do not find the built in time to be a substitute for the good
  old fashioned time command. Observe:

Why are either of those reasons to have /usr/bin/time on every Debian
machine? We're not talking about removing the package entirely...

(For comparison: nc/telnet are basic diagnostic tools to investigate why
you can't run apt-get, reportbug, an email program and a web browser are
needed for contacting remote humans if you get into problems installing
or recovering a Debian system)

Cheers,
aj



signature.asc
Description: Digital signature


Accepted debian-maintainers 1.5 (source all)

2007-11-26 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 27 Nov 2007 03:14:00 +1000
Source: debian-maintainers
Binary: debian-maintainers
Architecture: source all
Version: 1.5
Distribution: unstable
Urgency: low
Maintainer: Debian Maintainer Keyring Team [EMAIL PROTECTED]
Changed-By: Anthony Towns [EMAIL PROTECTED]
Description: 
 debian-maintainers - GPG keys of Debian maintainers
Closes: 452011 452600 452605 452719 452861 452881
Changes: 
 debian-maintainers (1.5) unstable; urgency=low
 .
   [ Joey Hess ]
   * Added Debian maintainer Aurélien GÉRÔME. Closes: #452600
   * Added Debian maintainer Arthur Loiret. Closes: #452605
   * Added Debian maintainer Jelmer Vernooij. Closes: #452881
 .
   [ Anthony Towns ]
   * Changed Katrik Mistry's deletion changeset to include links to
 mails requesting removal and a summary of the reason.
   * Added Debian maintainer Adriaan Peeters. Closes: #452861
   * Added Debian maintainer Ondrej Certik. Closes: #452719
   * Added Debian maintainer Asheesh Laroia. Closes: #452011
Files: 
 169dfabe964ce452360f6f0281128317 979 misc extra debian-maintainers_1.5.dsc
 925e2284dafd03bff1b0ea191bbbdc8d 419447 misc extra 
debian-maintainers_1.5.tar.gz
 647d67cf570bfb9b3e6f788f8cd0fa5c 238962 misc extra 
debian-maintainers_1.5_all.deb
 e89807be043af81bdb8493c26efe774c 300434 raw-keyring - 
debian-maintainers_1.5_all.gpg

-BEGIN PGP SIGNATURE-

iD8DBQFHSv93Oxe8dCpOPqoRArWUAJ4xSruQO/10pNTRWGurJyehQnwpxQCeIEVg
cRu2l/3/Jx12OciC5isNtgc=
=g4DV
-END PGP SIGNATURE-


Accepted:
debian-maintainers_1.5.dsc
  to pool/main/d/debian-maintainers/debian-maintainers_1.5.dsc
debian-maintainers_1.5.tar.gz
  to pool/main/d/debian-maintainers/debian-maintainers_1.5.tar.gz
debian-maintainers_1.5_all.deb
  to pool/main/d/debian-maintainers/debian-maintainers_1.5_all.deb
debian-maintainers_1.5_all.gpg byhand


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted debian-maintainers 1.0 (source all)

2007-11-18 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sun, 18 Nov 2007 18:13:54 +1000
Source: debian-maintainers
Binary: debian-maintainers
Architecture: source all
Version: 1.0
Distribution: unstable
Urgency: low
Maintainer: Debian Maintainer Keyring Team [EMAIL PROTECTED]
Changed-By: Anthony Towns [EMAIL PROTECTED]
Description: 
 debian-maintainers - GPG keys of Debian maintainers
Changes: 
 debian-maintainers (1.0) unstable; urgency=low
 .
   * Add James Troup, Michael Beattie, Ryan Murray, Joerg Jaspert, Brian
 Nelson, Marc Brockschmidt, and Christoph Berg to the Uploaders: field
 to enable automatic byhand acceptance.
Files: 
 6cd9f8ef1fa26ba4db7c0b667046c73e 1048 misc extra debian-maintainers_1.0.dsc
 ccbc47f20a4d53053e9359787f36925f 169901 misc extra 
debian-maintainers_1.0.tar.gz
 46eb0e705443086288fd1b2a00156588 32964 misc extra 
debian-maintainers_1.0_all.deb
 71e49a5a21da0537542a801fcbfcf04f 41984 raw-keyring - 
debian-maintainers_1.0_all.gpg

-BEGIN PGP SIGNATURE-

iD8DBQFHP/SvOxe8dCpOPqoRAo0QAJ9QKeQNxdKgyqef2IsVdQ9a9MZrKQCdH/0+
cVz7bwnJXDBLECWkhEIKS/E=
=zkL2
-END PGP SIGNATURE-


Accepted:
debian-maintainers_1.0.dsc
  to pool/main/d/debian-maintainers/debian-maintainers_1.0.dsc
debian-maintainers_1.0.tar.gz
  to pool/main/d/debian-maintainers/debian-maintainers_1.0.tar.gz
debian-maintainers_1.0_all.deb
  to pool/main/d/debian-maintainers/debian-maintainers_1.0_all.deb
debian-maintainers_1.0_all.gpg byhand


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted debian-maintainers 0.07 (source all)

2007-11-13 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 14 Nov 2007 00:53:27 +1000
Source: debian-maintainers
Binary: debian-maintainers
Architecture: source all
Version: 0.07
Distribution: unstable
Urgency: low
Maintainer: Debian Maintainer Keyring Team [EMAIL PROTECTED]
Changed-By: Anthony Towns [EMAIL PROTECTED]
Description: 
 debian-maintainers - GPG keys of Debian maintainers
Changes: 
 debian-maintainers (0.07) unstable; urgency=low
 .
   * Update README advice on where to send advocacy mails.
Files: 
 9c971e077d8e4989039d89dca52b2ea9 718 misc extra debian-maintainers_0.07.dsc
 b2305c1e6a8cb2eafe1e779791cae357 183725 misc extra 
debian-maintainers_0.07.tar.gz
 1a90f63030b03bde72e9aaee0215d3fb 9664 misc extra 
debian-maintainers_0.07_all.deb
 8996dfe784f4fbe28262a1ddb83f451c 6116 raw-keyring - 
debian-maintainers_0.07_all.gpg

-BEGIN PGP SIGNATURE-

iD8DBQFHObrOOxe8dCpOPqoRAmEDAJ9eSV+9jtuezIbgYjGKE/RlueybBgCePCsd
jLNjt3nFmIrinupu+eCI3qw=
=rVOb
-END PGP SIGNATURE-


Accepted:
debian-maintainers_0.07.dsc
  to pool/main/d/debian-maintainers/debian-maintainers_0.07.dsc
debian-maintainers_0.07.tar.gz
  to pool/main/d/debian-maintainers/debian-maintainers_0.07.tar.gz
debian-maintainers_0.07_all.deb
  to pool/main/d/debian-maintainers/debian-maintainers_0.07_all.deb
debian-maintainers_0.07_all.gpg byhand


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted debian-maintainers 0.07 (source all)

2007-11-13 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 14 Nov 2007 00:53:27 +1000
Source: debian-maintainers
Binary: debian-maintainers
Architecture: source all
Version: 0.07
Distribution: unstable
Urgency: low
Maintainer: Debian Maintainer Keyring Team [EMAIL PROTECTED]
Changed-By: Anthony Towns [EMAIL PROTECTED]
Description: 
 debian-maintainers - GPG keys of Debian maintainers
Changes: 
 debian-maintainers (0.07) unstable; urgency=low
 .
   * Update README advice on where to send advocacy mails.
Files: 
 9c971e077d8e4989039d89dca52b2ea9 718 misc extra debian-maintainers_0.07.dsc
 b2305c1e6a8cb2eafe1e779791cae357 183725 misc extra 
debian-maintainers_0.07.tar.gz
 1a90f63030b03bde72e9aaee0215d3fb 9664 misc extra 
debian-maintainers_0.07_all.deb
 8996dfe784f4fbe28262a1ddb83f451c 6116 raw-keyring - 
debian-maintainers_0.07_all.gpg

-BEGIN PGP SIGNATURE-

iD8DBQFHObrOOxe8dCpOPqoRAmEDAJ9eSV+9jtuezIbgYjGKE/RlueybBgCePCsd
jLNjt3nFmIrinupu+eCI3qw=
=rVOb
-END PGP SIGNATURE-


Accepted:
debian-maintainers_0.07.dsc
  to pool/main/d/debian-maintainers/debian-maintainers_0.07.dsc
debian-maintainers_0.07.tar.gz
  to pool/main/d/debian-maintainers/debian-maintainers_0.07.tar.gz
debian-maintainers_0.07_all.deb
  to pool/main/d/debian-maintainers/debian-maintainers_0.07_all.deb
debian-maintainers_0.07_all.gpg byhand


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted debian-maintainers 0.06 (source all)

2007-10-31 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 31 Oct 2007 18:40:58 +1000
Source: debian-maintainers
Binary: debian-maintainers
Architecture: source all
Version: 0.06
Distribution: unstable
Urgency: low
Maintainer: Debian Maintainer Keyring Team [EMAIL PROTECTED]
Changed-By: Anthony Towns [EMAIL PROTECTED]
Description: 
 debian-maintainers - GPG keys of Debian maintainers
Changes: 
 debian-maintainers (0.06) unstable; urgency=low
 .
   [ Joey Hess ]
   * Explicitly build-depend on gnupg rather than rely on jetring pulling it in,
 since runtests uses it directly.
   * Documentation/process updates.
   * Add links to new advocacy mails posted for DMs for whom we previously
 used the nm.debian.org advocacy status.
 .
   [ Anthony Towns ]
   * Add more advocacy mails and add the corresponding Debian uid of the
 advocates.
   * Sigh, actually update the index file and sig too.
Files: 
 063090f34ec4a5f0c65ac53024b4cdf6 718 misc extra debian-maintainers_0.06.dsc
 976547e9d9346b2251f93576cd0caea7 183662 misc extra 
debian-maintainers_0.06.tar.gz
 deaf43c7a1e3022676ba9658aaa4c172 9576 misc extra 
debian-maintainers_0.06_all.deb
 8996dfe784f4fbe28262a1ddb83f451c 6116 raw-keyring - 
debian-maintainers_0.06_all.gpg

-BEGIN PGP SIGNATURE-

iD8DBQFHKEY1Oxe8dCpOPqoRAp4qAKCZ2TpTKGrjQ3SRoEv58NnM27Xb/ACeK26a
gzQGsMJfSgEXW3itnZRJ1OQ=
=pRgJ
-END PGP SIGNATURE-


Accepted:
debian-maintainers_0.06.dsc
  to pool/main/d/debian-maintainers/debian-maintainers_0.06.dsc
debian-maintainers_0.06.tar.gz
  to pool/main/d/debian-maintainers/debian-maintainers_0.06.tar.gz
debian-maintainers_0.06_all.deb
  to pool/main/d/debian-maintainers/debian-maintainers_0.06_all.deb
debian-maintainers_0.06_all.gpg byhand


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted debian-maintainers 0.01 (source all)

2007-10-17 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 18 Oct 2007 02:27:20 +1000
Source: debian-maintainers
Binary: debian-maintainers
Architecture: source all
Version: 0.01
Distribution: unstable
Urgency: low
Maintainer: Debian Maintainer Keyring Team [EMAIL PROTECTED]
Changed-By: Anthony Towns [EMAIL PROTECTED]
Description: 
 debian-maintainers - GPG keys of Debian maintainers
Changes: 
 debian-maintainers (0.01) unstable; urgency=low
 .
   [ Joey Hess ]
   * Initial release.
   * Added Debian maintainer Miriam Ruiz
 .
   [ Anthony Towns ]
   * Added Debian maintainer Fathi Boudra
   * Added Debian maintainer Cameron Dale
   * Invoke gpg --list-keys in debian/rules build to make sure
 $HOME/.gnupg exists. Possibly should set GNUPGHOME instead.
Files: 
 05fd134163a67cdae45aae804216f1e5 694 misc extra debian-maintainers_0.01.dsc
 63ea19782522a4481b57dbe910957024 395993 misc extra 
debian-maintainers_0.01.tar.gz
 1de8829f8ddf92558eddf048926c3c30 9124 misc extra 
debian-maintainers_0.01_all.deb
 8996dfe784f4fbe28262a1ddb83f451c 6116 raw-keyring - debian-maintainers.gpg

-BEGIN PGP SIGNATURE-

iD8DBQFHFjukOxe8dCpOPqoRArbuAJ9u0cGUevcBGRdM0oDIDMRkBbXdAwCfbkI9
m50nkdLmKkzyV8VC+RkA5ig=
=GCk2
-END PGP SIGNATURE-


Accepted:
debian-maintainers_0.01.dsc
  to pool/main/d/debian-maintainers/debian-maintainers_0.01.dsc
debian-maintainers_0.01.tar.gz
  to pool/main/d/debian-maintainers/debian-maintainers_0.01.tar.gz
debian-maintainers_0.01_all.deb
  to pool/main/d/debian-maintainers/debian-maintainers_0.01_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted gzip 1.3.12-3.2 (source amd64)

2007-10-14 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sun, 14 Oct 2007 23:50:29 +1000
Source: gzip
Binary: gzip
Architecture: source amd64
Version: 1.3.12-3.2
Distribution: unstable
Urgency: low
Maintainer: Bdale Garbee [EMAIL PROTECTED]
Changed-By: Anthony Towns [EMAIL PROTECTED]
Description: 
 gzip   - The GNU compression utility
Closes: 434275
Changes: 
 gzip (1.3.12-3.2) unstable; urgency=low
 .
   * Non-maintainer upload.
   * Stop zdiff from dropping cmp's output. Patch thanks to Jorg-Volker Peetz
 (Closes: Bug#434275)
Files: 
 4d9e2e82fbebb222e13ddaf14bd43bfd 546 utils required gzip_1.3.12-3.2.dsc
 8b9929d026560db3aba3510b8abc6bfd 20326 utils required gzip_1.3.12-3.2.diff.gz
 45bb3bcee439121c9dce0fa843394bf1 106486 utils required 
gzip_1.3.12-3.2_amd64.deb

-BEGIN PGP SIGNATURE-

iD8DBQFHEiRzOxe8dCpOPqoRApaZAJ9ojJx/TZ2rzlgKXmd3pFsNe2dc2ACcDJaZ
7krN5v9cgCroBd+qfCmHtSM=
=27y8
-END PGP SIGNATURE-


Accepted:
gzip_1.3.12-3.2.diff.gz
  to pool/main/g/gzip/gzip_1.3.12-3.2.diff.gz
gzip_1.3.12-3.2.dsc
  to pool/main/g/gzip/gzip_1.3.12-3.2.dsc
gzip_1.3.12-3.2_amd64.deb
  to pool/main/g/gzip/gzip_1.3.12-3.2_amd64.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: pristine tarball generator

2007-10-06 Thread Anthony Towns
On Wed, Oct 03, 2007 at 03:38:54PM +0300, Faidon Liambotis wrote:
 There's also --rsyncable which is appears mostly (if not only) on Debian
 and unfortunately can't be figured out from the headers.

 Multipart gzips would also not work even though I haven't yet find any.

Both these are cases where the .gz file is equivalent to cat'ing two
(or more) .gz files together, I would've thought, and should be able
to be dealt with as such, possibly just by checking for a header, or by
previously matching gzip output suddenly not matching anymore?

Cheers,
aj


signature.asc
Description: Digital signature


Re: pristine tarball generator

2007-10-02 Thread Anthony Towns
On Tue, Oct 02, 2007 at 04:15:44PM -0400, Joey Hess wrote:
 BTW, the next release of pristine-tar will support generating pristine
 gz files too, so will fully support pristine .orig.tar.gz. Regenerating
 pristine gz files from small deltas is quite a lot trickier, and
 currently works for about 99% of the .orig.tar.gz files in the Debian
 archive. Many thanks to paravoid for making it happen..

Oh wow, that's cool. Any chance of a post/blog on how that was achieved?

Cheers,
aj


signature.asc
Description: Digital signature


Re: Packages with RFCs deleted

2007-09-20 Thread Anthony Towns
On Thu, Sep 20, 2007 at 09:46:47AM +0900, Charles Plessy wrote:
 Le Wed, Sep 19, 2007 at 01:08:40AM +1000, Anthony Towns a ?crit :
  For what it's worth, we don't do that. References I'm aware of:
  http://lists.debian.org/debian-legal/2003/05/msg00092.html
  http://lists.debian.org/debian-legal/2003/05/msg00149.html
 Hi Anthony,
 thank for the links. So in the end, am I right to say that, since the
 point of view of the FTP team is that RFC are software, orig.tar.gz
 files which contain them fail to comply the DFSG and therefore are not
 accepted in main?

It's not my POV that RFCs are software, no :) 

It is the POV of ftpmaster that everything in main, whether it be a .deb,
.tar.gz or .diff.gz needs to meet the DFSG though.

As you can probably tell from the second link above, I'm not personally
very invested in having .orig.tar.gz's be pristine versus removing
unused non-free stuff from them, but the position we've taken in the
past has been to insist on it being removed, and I think it's worth
being consistent.

Cheers,
aj



signature.asc
Description: Digital signature


Re: Packages with RFCs deleted

2007-09-18 Thread Anthony Towns
On Tue, Sep 18, 2007 at 11:24:21PM +0900, Charles Plessy wrote:
 Le Mon, Sep 17, 2007 at 03:35:15PM -0500, Peter Samuelson a ?crit :
 I fully agree with what you write. Indeed what I support is not to ignore
 the RFC or other similarly non-free, non-programmatic files, but to
 document them in the copyright file, tolerate them in the source package,
 exlude them from the binary packages in main, and ship them in non-free
 if they are non-redundant and provide an added value. 

For what it's worth, we don't do that. References I'm aware of:

http://lists.debian.org/debian-legal/2003/05/msg00092.html
http://lists.debian.org/debian-legal/2003/05/msg00149.html

Packages in main can build packages in contrib, provided they don't rely
on any non-free packages to do so (so you can build a data installer
package, eg, but that's about it).

So non-free stuff can't be included in the main source package, and
non-free stuff can't be used to build a package in main, nor can it be
generated from a source in main.

Cheers,
aj



signature.asc
Description: Digital signature


Re: Debian's Linux kernel continues to regress on freedom

2007-09-12 Thread Anthony Towns
On Wed, Sep 12, 2007 at 02:07:55PM +0200, Luk Claes wrote:
 What about adding clarifications, what about summarising parts of the RFC? 

You don't need a free license to do either of those things, though, which
is part of the reason why...

 It's more about the freedom to fix things or to use things than it is to 
 make it buggy... It's also not only about Debian, but in fact more about 
 the freedom of our users to modify RFCs...

...modifying RFCs isn't a freedom most people value even slightly. Which
is fine -- we distribute a bunch of stuff that doesn't have that freedom
to people who appreciate having it packaged anyway -- that's one of the
reasons we have non-free.

If making RFCs available via non-free is awkward, or we're worried adding
more interesting stuff to non-free might encourage people to use other
non-free stuff they wouldn't otherwise, those are technical problems
we can fix by improving our packaging tools and making non-free more
fine-grained respectively.

What's the value in continuing to debate this topic? [0]

Cheers,
aj

[0] Well, other than giving us an excuse to call each other wackos
and morons, of course...



signature.asc
Description: Digital signature


Re: Debian's Linux kernel continues to regress on freedom

2007-09-12 Thread Anthony Towns
(-kernel dropped)

On Wed, Sep 12, 2007 at 03:47:43PM -0500, Manoj Srivastava wrote:
 On Wed, 12 Sep 2007 21:07:43 +0300, Faidon Liambotis [EMAIL PROTECTED] 
 said: 
  Sune Vuorela wrote:
  On 2007-09-12, Faidon Liambotis [EMAIL PROTECTED] wrote:
  You're not checking for copyright violations or for non-free stuff
  in all other packages.
  I obviously meant all other *existing* source packages, i.e. all the
  uploads that don't pass through NEW.
 Can you point me to violations of the DFSG, please? 

Just for the record, if other developers are repeatedly adding non-free
stuff to packages in main without due care, it'd be technically plausible
to run those uploads through NEW processing too. But we have lots of
checks to ensure DDs are able to do a good job of sorting out free
and non-free stuff, and the system of expecting updates to be good the
vast majority of the time, filing bugs when they're not, and having them
properly fixed seems superior in every way, so I'd /really/ hope nothing
like that will be necessary.

 I think every maintainer is supposed to be doing this for their
  own packages.  Only when we have evidence that the maintainers are not
  doing their job does Joerg have to spend his time doing their job for
  them.

NEW processing is a second chance to catch these and other problems before
they hit the distro; it's not something that can replace maintainers
catching the problems at first pass. It's more like manual retraining of
a spam filter -- you don't want it to be the common case that ftpmaster
reviews licenses anymore than you want most spams to be looked at by a
human. But just as you do want a human checking over at least a selection
of messages and any misclassifications to make sure your spam filter's on
track, if we want our policies on copyrights to be consistent, we want
to be regularly reviewing the copyrights of some sampling of packages,
and we want to pay closer attention to any edge cases where we notice
things aren't going the way we want them to.

ftpmaster samples packages with new names for copyright and other
problems; most of the rest of the time we (ftpmaster, -legal, etc) only
investigate further if there's some evidence there's an actual problem.

At the point where it hits ftpmaster, though, the aim seems to me to
be at least as much to ensure maintainers are doing the checks right
(and consistently throughout Debian) as to do the checks themselves.

Cheers,
aj, who right atm can't think of a much higher compliment than comparing
something to his spam filter



signature.asc
Description: Digital signature


Re: Why no Opera?

2007-09-11 Thread Anthony Towns
On Tue, Sep 11, 2007 at 06:26:45PM +0200, Juliusz Chroboczek wrote:
  The Firefox monoculture is doing a lot of harm to our community.
  So, I don't know what monoculture you're referring to.
 Popcon gives 23000 for iceweasel, 500 for dillo, and 18 for netsurf.
 (Correct me if I'm wrong, but I believe that konqueror statistics are
 not significant since it's also used as a file manager.)

It's certainly significant as a web browser, just hard to get meaningful
statistics about it from popcon. You missed epiphany though, unless
you're really talking about a Gecko monoculture.

 nameinst  vote   old recent no-files
 iceweasel  41897 22448  6839 1260010
 epiphany-browser   32506 11395  7614 13493 4
 w3m53921  6902 30282 16735 2
 konqueror  15175  5983  5437  3754 1
 lynx   14852  5558  7840  1451 3
 iceape-browser  4802  1974  1706  1122 0
 dillo   1810   519  1015   275 1
 w3m-img  721 0 0 0   721

 If that's not a monoculture, I don't know what is.

Depends on whether you define monoculture as only one strain, or as a
preponderance of one strain. 

The problem with the former is that if you have a problem that wipes
out that strain, you don't have any alternatives that can take over. In
the latter case, you do have alternatives, it's just that it's going to
involve a lot of growth on their behalf to do the taking over, which is
still hard, but much easier.

Old link: http://azure.humbug.org.au/~aj/blog/2004/05/11

Cheers,
aj



signature.asc
Description: Digital signature


Re: virtualbox-ose: package hijack?

2007-09-05 Thread Anthony Towns
On Wed, Sep 05, 2007 at 11:39:42AM +0200, Daniel Baumann wrote:
 Michael Meskes wrote:
  I have no idea what Daniel really did on the package.
 I did about 90% of the inital packaging.

Which just left the last 90% of the packaging, I guess.

 Patrick uploaded removed me from changelog in the two last uploads
 (virtualbox 1.4.0svn4130-dfsg-1 and virtualbox-ose 1.4.0svn4130-dfsg-1
 that is) without notifying me. In all previous uploads to NEW, I was in
 the co-maintainer.

FWIW, the uploads of virtualbox to NEW were:

|virtualbox_1.4.0-1_amd64.changes:
20070618213209|process-unchecked|Moving to new
20070709174342|process-new|rejected
|virtualbox_1.4.0svn3946-dfsg-1_i386.changes
20070801121715|process-unchecked|Moving to new
20070801222037|process-new|rejected
|virtualbox_1.4.0svn3946-dfsg-2_i386.changes
20070801143204|process-unchecked|Moving to new
20070801222028|process-new|rejected
|virtualbox_1.4.0svn3946-dfsg-1_i386.changes
20070802113206|process-unchecked|Moving to new
20070812215652|process-new|rejected
|virtualbox_1.4.0svn4130-dfsg-1_amd64.changes
20070824113207|process-unchecked|Moving to new
20070827060822|process-new|rejected

The .dsc from the first 3946-dfsg-1 above (1st August) listed:
  Maintainer: Patrick Winnertz [EMAIL PROTECTED]
  Uploaders: Philipp Hug [EMAIL PROTECTED], Marvin Stark [EMAIL PROTECTED]

If you weren't involved in the uploads to NEW over the past month to
notice, it seems reasonably fair to say you weren't co-maintaining the
package. If that's something that was just a one month thing, fine;
but it's not the end of the world either way.

|virtualbox_1.4.0svn4130-dfsg-1_amd64.changes
20070830124706|process-unchecked|Moving to new
20070901080307|process-new|Accepting changes
|virtualbox_1.4.0svn4130-dfsg-1_i386.changes
20070901194714|process-unchecked|Accepting changes

|virtualbox-ose_1.4.0svn4130-dfsg-1_amd64.changes
20070903134705|process-unchecked|Moving to new
20070903173435|process-new|Accepting changes
|virtualbox-ose_1.4.0svn4130-dfsg-1_i386.changes
20070904094702|process-unchecked|Accepting changes

|virtualbox-ose_1.5.0-dfsg-1_i386.changes
20070905054704|process-unchecked|Accepting changes
|virtualbox-ose_1.5.0-dfsg-1_amd64.changes
20070905070206|process-unchecked|Accepting changes

Then doing an upload that goes to a new upstream revision, adds code
which doesn't have a license at all, let alone a DFSG-free one, without
consulting the people you're claiming to be co-maintaining the package
with doesn't sound very impressive either.

 Upstream is generally cooperative and understands the problems, hence I
 see this a bit more relaxed (for the next few days only, until it's
 sorted out). However, if ftp-master do disagree, I'll can re-upload
 1.4.0, superseeding the 1.5.0 upload.

Personally, I don't think you should be even considering uploading
anything right now -- the above seems to me to have been some pretty bad
judgement calls, and the contents of an Uploaders: field or the lack of
a proper license for something upstream intends to be free software can
all wait for a day or two.

For a package that's been in unstable for under a week to require a
renaming due to trademarks, have a hijack war and thread on -devel,
and start getting new upstream versions with non-DFSG code strikes me
as pretty unimpressive all round, really...

Cheers,
aj


signature.asc
Description: Digital signature


Re: virtualbox-ose: package hijack?

2007-09-05 Thread Anthony Towns
On Wed, Sep 05, 2007 at 02:49:25PM +0200, Raphael Hertzog wrote:
 On Wed, 05 Sep 2007, Patrick Winnertz wrote:
  This was no good work which was quicked hacked together. 
 I'm sorry, but when I upload a new upstream release of Django, I don't
 check every new file.
 It's all good that you do it, but it's not necessarily a requirement
 and I find it hard to blame daniel for that. 

Uh, Daniel included a file that doesn't have a DFSG license in an upload
to main. That's not good enough. Reviewing diffs of upstream changes is
one way to avoid it; it's not the only way, but if you're not going to do
it, you still need to accept the blame for the mistakes you let through.

Patrick's packages got a pretty thorough grilling for copyright issues
by Joerg in the rejections from NEW over the past month, that Daniel's
upload wrecked that work is something to be really quite embarassed about,
not to excuse because it'd take a lot of effort to avoid.

Cheers,
aj



signature.asc
Description: Digital signature


Re: what happened to social contract?

2007-08-30 Thread Anthony Towns
On Wed, Aug 29, 2007 at 10:41:10PM -0400, [EMAIL PROTECTED] wrote:
 # Our priorities are our users and free software
  I must have misunderstood, I thought this was what Debian was all
  about.

Which is fine, but the problem is there's so many ways of working on
those priorities that nobody can be involved in all of them. So once
you've picked some particular ways, your challenge is to find some other
folks that're likewise interested; and since you've picked something
that involves non-free stuff, you've immediately ruled out most of the
people who're active on this list, who're here because they want to make
a completely free operating system, for which opera just isn't relevant.

At this point non-free stuff's probably specialist enough to warrant
it's own group, rather than using -devel/-legal/etc, so it's easy to
find the handful of other people who're interested in non-free stuff in
Debian to make it work as well as possible. OTOH, while I'm interested
in improving non-free, my priorities are elsewhere too atm...

Cheers,
aj



signature.asc
Description: Digital signature


Re: proposed release goal: DEBIAN/md5sums for all packages

2007-08-17 Thread Anthony Towns
On Fri, Aug 17, 2007 at 05:05:28PM -0500, Peter Samuelson wrote:
 I'd opt for dpkg generating the checksums upon _extracting_ the .deb
 file.  [...]

Where's the code for that?

Changing write_filelist_except to update a new .md5 control file ought to
be possible. You'd probably want to add a *newhash to struct filenamenode,
though, and fill it out when unpacking, but working out the hash while
unpacking (rather than running over every file to be unpacked twice)
would mean hax0ring into the fd_fd_copy() invocation in tarobject()
(archives.c), which seems tricky.

Cheers,
aj


signature.asc
Description: Digital signature


Re: /bin/sh diversions

2007-08-03 Thread Anthony Towns
On Wed, Aug 01, 2007 at 10:13:38PM -0700, Steve Langasek wrote:
 On Thu, Aug 02, 2007 at 06:54:49AM +0200, Mike Hommey wrote:
  diversions are far from being atomic.
 True, but it is persistent across upgrades and doesn't require any
 particular support from the package.

Is it a bug (or a missing feature) that diversions aren't atomic?

The --rename option to dpkg-divert means it can be done atomically if
dpkg-divert is clever enough, at least in all the ways that count.

Cheers,
aj, surprised it's not already atomic



signature.asc
Description: Digital signature


Re: /bin/sh diversions

2007-08-01 Thread Anthony Towns
On Wed, Aug 01, 2007 at 06:00:21PM +0200, Pierre Habouzit wrote:
 On Wed, Aug 01, 2007 at 12:53:03PM -0300, Henrique de Moraes Holschuh wrote:
  OTOH, specifically using something else than /bin/sh for a fast
  POSIX-with-the-extensions-Debian-mandates shell (i.e. forget posh, but dash
  is good) does NOT need /bin/sh to point to it, so it can't trip on such
  issues caused by external factors outside of Debian's control.
   Afaict ubuntu did the change, and the sky didn't fell apart.

It did cause a bunch of problems for Ubuntu users, though:

https://bugs.launchpad.net/ubuntu/+source/dash/+bug/61463

Cheers,
aj



signature.asc
Description: Digital signature


Re: Bug#435058: ITP: smolt -- Fedora hardware profiler

2007-07-29 Thread Anthony Towns
On Sun, Jul 29, 2007 at 08:25:58AM +0200, Mike Hommey wrote:
 On Sat, Jul 28, 2007 at 09:28:46PM -0400, Ricky Zhou [EMAIL PROTECTED] 
 wrote:
  Package: wnpp
  Severity: wishlist
  Owner: Ricky Zhou [EMAIL PROTECTED]
  
  * Package name: smolt
Version : 0.9.8.3
Upstream Author : Mike McGrath [EMAIL PROTECTED]
  * URL : https://hosted.fedoraproject.org/projects/smolt/
  * License : GPL
Programming Lang: Python
Description : Fedora hardware profiler
  
  The Fedora hardware profiler is a server-client system that does a
  hardware scan against a machine and sends the results to a public Fedora
  Project turbogears server.  The sends are anonymous and should not
  contain any private information other than the physical hardware
  information and basic OS info.
 What is the added value for Debian users of sending these informations
 *to Fedora* ?

Modifying the package so it sends the data to a Debian server running
the same/similar software to Fedora's sounds reasonable though.

Not completely sure that there's much benefit to maintaining separate
servers for Debian data and Fedora data -- but *reporting* the data
separate would probably be a good thing if the proportion of Fedora users
with smolt is significantly different to the proportion of Debian users
with smolt. (That's because making a mistake on that score would be both
easy if the data were combined, and lead to wrong comparisons between
total Debian and Fedora users, to the detriment of whoever has the lower
proportion of users running smolt, which would presumably be Debian)

Integrating it with pop-con (or vice-versa) would be interesting.

Cheers,
aj


signature.asc
Description: Digital signature


Re: stupid dependencies on update-inetd

2007-07-29 Thread Anthony Towns
On Sun, Jul 29, 2007 at 03:59:13AM +0200, Marco d'Itri wrote:
 On Jul 29, Russ Allbery [EMAIL PROTECTED] wrote:
  So is anything ever valid other than openbsd-inetd | inet-superserver as a
  dependency?  I keep getting confused on the rules around using virtual
  packages.  Would rlinetd | inet-superserver be okay?  Would
 Formally yes, but I do not think there is a reason for a package to
 choose a different default.
  inet-superserver all by itself be okay?
 No, but this would be taken care of by
 virtual-package-depends-without-real-package-depends (which explains
 the part you are missing).

Isn't openbsd-inetd priority:standard? That's enough to make the
real-package unnecessary, afaik (and that lets the default inetd be
changed simply by changing the priorities of the packages, rather than
the dependencies of lots of packages).

I would've thought the Build-Dependency stuff isn't relevant for inetds.

I think policy has had confusing advice on this for a long time now --
ttbomk the only cases where an explicit dependency on a real package is
either useful or needed is when all the alternatives can be installed
concurrently and are at priority:optional so that dselect and apt can
select one easily when there's no hints to be taken from the priority
levels; and when consistency is useful for the buildds, for much the
same reason.

Cheers,
aj



signature.asc
Description: Digital signature


Re: Looking for new FTP assistants

2007-07-09 Thread Anthony Towns
On Tue, Jul 10, 2007 at 12:02:32AM +0200, Lucas Nussbaum wrote:
  People really do use both package priorities and sections still for
  selecting packages in the package management tools, and it would be great
  to have them fixed.
 Seconded. I tried once to install all optional packages at the same
 time (which is supposed to work). But it failed miserably.
 But couldn't all the override stuff be something that could be worked on
 by people without being FTP assistants? Exporting the overrides list to
 $RANDOM_VCS and allowing people to submit patches in an easy way could
 be enough...

Committing override changes is already an ftpassistant task, normally
individually, but I think bulk changes are possible too. Personally I'd
look very favourably on anyone who wanted to become an ftpassistant
who not only went and found the problems with the overrides but also
prepared and verified a list of the changes needed (this package needs
its priority raised; that one needs its priority lowered; once all these
changes are made there aren't any new problems because having raised
one package one of its dependencies also needs its priority raised; etc).

We have a bunch of override change requests outstanding, mostly because
the ftpmaster alias is so absurdly heavily spammed that they get lost in
the noise; having more structured checking of priorities/sections that
someone actually took the time to monitor would probably make that much
better. (The idea being that you'd detect a problem when the override
differs from the value in the package, and then either annotate that with
a bug number because the package's value is wrong, or fix the override
to match the package)

ATM no one's paying any real attention to this; which does mean that
there's not a lot of help to be had in working out how to make it
better. OTOH, it also means it's not that hard to become an expert on
the topic (no one else really knows that much about it) or the most
effective contributor (no one else is doing much)... :)

Cheers,
aj



signature.asc
Description: Digital signature


Re: ftp.debian.org lacking behind and p.d.o too

2007-07-03 Thread Anthony Towns
On Mon, Jul 02, 2007 at 01:44:04PM -0400, Anthony Towns wrote:
 On Mon, Jul 02, 2007 at 02:48:34PM +0200, Daniel Leidert wrote:
  Can someone tell me, why ftp.debian.org is lacking behind? 
 Apparently it's out of disk :(

This is now fixed. Thanks for the report.

Cheers,
aj



signature.asc
Description: Digital signature


Re: ftp.debian.org lacking behind and p.d.o too

2007-07-02 Thread Anthony Towns
On Mon, Jul 02, 2007 at 02:48:34PM +0200, Daniel Leidert wrote:
 Can someone tell me, why ftp.debian.org is lacking behind? 

Apparently it's out of disk :(

(250G for the current archive, 44GB for archived suites, 11G for an old
packages.d.o, and the remaining 15G or so looks like it's used in .~tmp~/
directories from incomplete --partial rsyncs)

Cheers,
aj



signature.asc
Description: Digital signature


Accepted ifupdown 0.7~alpha2 (source powerpc)

2007-06-19 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 18 Jun 2007 15:47:21 +0100
Source: ifupdown
Binary: ifupdown
Architecture: source powerpc
Version: 0.7~alpha2
Distribution: experimental
Urgency: low
Maintainer: Anthony Towns [EMAIL PROTECTED]
Changed-By: Anthony Towns [EMAIL PROTECTED]
Description: 
 ifupdown   - high level tools to configure network interfaces
Changes: 
 ifupdown (0.7~alpha2) experimental; urgency=low
 .
   * Add command line interface options (ifup -o foo=bar eth1). Yay!
   * Switch to using iproute instead of ifconfig/route. Thanks to Andrew
 Pollock.
   * Drop support for kernels prior to 2.1.100 (and that don't have NETLINK
 for iproute).
   * Drop support for specifying a netmask in static inet interfaces.
   * Bump DH_COMPAT to 4 (from 1!)
Files: 
 b6f5758f6a14b2c8ff2fe23cb147d5f4 537 admin important ifupdown_0.7~alpha2.dsc
 a6af3aebbdd6e8c5eacd193c06c56f1d 377554 admin important 
ifupdown_0.7~alpha2.tar.gz
 76cdfa4d6a0a2aba36b6b50a68c16a8a 52920 admin important 
ifupdown_0.7~alpha2_powerpc.deb

-BEGIN PGP SIGNATURE-

iD8DBQFGdxX5Oxe8dCpOPqoRAgYVAJ4qJcPSYNvpcEMpzPZLXi0NfUcTawCfetUX
K6Y3L/YqEWtJ4+mkNhTWhTk=
=zWxk
-END PGP SIGNATURE-


Accepted:
ifupdown_0.7~alpha2.dsc
  to pool/main/i/ifupdown/ifupdown_0.7~alpha2.dsc
ifupdown_0.7~alpha2.tar.gz
  to pool/main/i/ifupdown/ifupdown_0.7~alpha2.tar.gz
ifupdown_0.7~alpha2_powerpc.deb
  to pool/main/i/ifupdown/ifupdown_0.7~alpha2_powerpc.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted ifupdown 0.7~alpha1 (source powerpc)

2007-06-18 Thread Anthony Towns
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 18 Jun 2007 15:47:21 +0100
Source: ifupdown
Binary: ifupdown
Architecture: source powerpc
Version: 0.7~alpha1
Distribution: experimental
Urgency: low
Maintainer: Anthony Towns [EMAIL PROTECTED]
Changed-By: Anthony Towns [EMAIL PROTECTED]
Description: 
 ifupdown   - high level tools to configure network interfaces
Changes: 
 ifupdown (0.7~alpha1) experimental; urgency=low
 .
   * Add command line interface options (ifup -o foo=bar eth1). Yay!
   * Switch to using iproute instead of ifconfig/route. Thanks to Andrew
 Pollock.
   * Drop support for kernels prior to 2.1.100 (and that don't have NETLINK
 for iproute).
   * Drop support for specifying a netmask in static inet interfaces.
   * Bump DH_COMPAT to 4 (from 1!)
Files: 
 df2329c88a69f4d7efaa76ec898162ee 537 admin important ifupdown_0.7~alpha1.dsc
 477323fc8b668ff0b99a3e82e1fcc511 377529 admin important 
ifupdown_0.7~alpha1.tar.gz
 070337841fe3aa97c7b7bb5db29123cf 52932 admin important 
ifupdown_0.7~alpha1_powerpc.deb

-BEGIN PGP SIGNATURE-

iD8DBQFGdp7pOxe8dCpOPqoRAsIiAJ4hOTcFhqPWo1MJvCZ5KulOuKalcgCfbz6S
yFAmb+XwDfhZfT4J5itRi84=
=/38S
-END PGP SIGNATURE-


Accepted:
ifupdown_0.7~alpha1.dsc
  to pool/main/i/ifupdown/ifupdown_0.7~alpha1.dsc
ifupdown_0.7~alpha1.tar.gz
  to pool/main/i/ifupdown/ifupdown_0.7~alpha1.tar.gz
ifupdown_0.7~alpha1_powerpc.deb
  to pool/main/i/ifupdown/ifupdown_0.7~alpha1_powerpc.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: License discussions in Debian (was: discussion with the FSF: GPLv3, GFDL, Nexenta)

2007-06-05 Thread Anthony Towns
On Mon, Jun 04, 2007 at 11:08:39PM +0200, Frank K?ster wrote:
 Anthony Towns [EMAIL PROTECTED] wrote:
  See, given that as an ftpmaster I'm one of the folks who actually
  implements the policy on what's accepted into main or not, it's not my
  loss at all.
 I think that Debian would very much benefit if there was a place (call
 it [EMAIL PROTECTED] or whatever) where our policy with regard to
 individual software's licenes could be discussed with the input of those
 who actually set this policy: the ftpmasters.

Yes, that's the main reason for my involvement in this thread.

Though it's not just ftpmasters, it's Debian developers in general; so
that we don't end up with a consensus on debian-legal (or in ftpmaster)
that doesn't match the views of Debian as a whole.

AFAICS, that means welcoming developers who don't know the difference
between subpoena and summons, not using it as a reason to ignore
them completely.

 If debian-legal isn't the place for you (and AFAIK none of the other
 ftpmasters is a regular), maybe we need a new start and a different
 format.  

I used to be a regular on -legal, and I'm still subscribed. My views
(such as people who aren't speaking on behalf of the project shouldn't
make it sound like they are...) don't seem particularly welcome though,
so I tend not to bother.

I don't see any particular reason to think a new start or format would
help much, but I'm open to suggestions.

Cheers,
aj



signature.asc
Description: Digital signature


Re: Reasonable maximum package size ?

2007-06-05 Thread Anthony Towns
On Tue, Jun 05, 2007 at 06:28:53PM +0900, Charles Plessy wrote:
 Le Tue, Jun 05, 2007 at 10:09:07AM +0200, Michael Hanke a ?crit :
  My question is now: Is it reasonable to provide this rather huge amount
  of data in a package in the archive?
  An alternative to a dedicated package would be to provide a
  download/install script for the data (like the msttcorefonts package)
  that is called at package postinst.
 I recently had a heretic idea that I did not dare to submit yet: we
 could port fink to Debian, and use it to build .debs from info files
 shipped in Debian packages in main, and sources downloaded from
 upstream's FTP sites.

Some thoughts on constraints:

* it's better to have stuff distributed by Debian than sourced
  elsewhere; we're a distribution, distributing is What We Do

* it's better for users to have stuff in .deb's, so they don't
  have to worry about different ways of managing different stuff
  on their system

* some large data sets are just compiled -- it can be good to
  distribute a small amount of source in a .deb and compile
  it on the user's machine.

* some large data sets are compiled but it takes long enough that
  we don't want to do it on user's machines, so we have the usual
  source/deb situation here, and that's fairly easy too.

* (***) many data sets don't fit those patterns though, but
  instead are just a bunch of data that needs to be shipped to
  users. doubling that by having it duplicated in a .orig.tar.gz
  and _all.deb is less than ideal

* some data sets have large raw data and large compiled versions,
  so need a large source _and_ a large .deb containing different
  info. nothing much to be done in that case, though

* (###) having .deb's generated on a user's system means they
  can't use aptitude or apt-get to install them easily; having
  .deb's generated on mirrors requires smart mirroring software
  rather than just rsync or similar; having .deb's generated by
  the maintainer or buildds requires both the source and .deb
  to be mirrored separately; having .deb's be the source format
  requires converting from the upstream source format adding
  complexity and making it harder to trace how the packaging
  worked

For the ***'d case, it seems like having a debian.org mirror network
that distributes unprocessed data tarballs, that're converted into debs
and installed on user's systems would be workable.

I don't see how we could resolve that with the ###'d concern though.

If we were to resolve the ###'d concern by changing apt etc, we could
conceivably add foobar_1.0.7-1_data.tar.bz2 files to the archive in the
existing sections, for instance, and providing some form of Packages.gz
file for them.

I guess an evil solution to *** that doesn't cause problems with ###
would be to create a dummy source package that Build-Depends: on the
exact version of the package it builds, so that uploads include a
basically empty .tar.gz that just has instructions on how to download
new versions of the data, and an unprocessed copy of the actual data
converted to _all.deb form. That'd give the correct behaviour for all
the tools we've got, avoid unnecessarily duplicating the data, and maybe
not be *too* confusing.

Hrm, actually, I kind-of like that approach...

I'm not sure if avoiding duplicating the data (1G of data is bad, but
1G of the same data in a .orig.tar.gz _and_ a .deb is absurd) is enough
to just use the existing archive and mirror network, or if it'd still be
worth setting up a separate apt-able archive under debian.org somewhere
for _really_ big data.

Bug#38902 for hysterical interest, btw.

Cheers,
aj



signature.asc
Description: Digital signature


Re: License discussions in Debian

2007-06-05 Thread Anthony Towns
On Tue, Jun 05, 2007 at 12:07:52PM +0200, Frank K?ster wrote:
 You could ask Anthony whether you're allowed to publish his reasons on
 -legal.  That would do the project a great favor.

You could just ask me directly you know...

]  I thought choice-of-venue is non-free by default?
] 
] Via Simon Phipps's talk at debconf, we've got Sun on the record
] as interpreting choice of venue as only being relevant when the
] two parties to a suit both have a presence in multiple jurisdictions,
] including the one that's chosen, which means it's not a problem at all.
] 
] For the other case, even if Sun did want to make German laws apply to
] an Australian or similar, I don't think that holds up as a claim anyway.

I don't think that's a particularly useful addition to what's already
been in this thread. Well, beyond as inspiration as to how much better
-legal could do if it was willing to come to with a conclusion of the
form this license is flawed in these novel ways, but none of them are
enough to make it non-free for Debian.

Cheers,
aj



signature.asc
Description: Digital signature


Re: License discussions in Debian

2007-06-05 Thread Anthony Towns
On Tue, Jun 05, 2007 at 09:08:31AM +0200, Frank K?ster wrote:
 That's true, as an ideal.  In reality, you can't expect every DD or even
 maintainer to subscribe to -legal except when they've got a particular
 problem to discuss.  

Sure, but you don't need or want that. All you need is an unbiassed
sampling of developers to participate, which is to say the list needs
to be just as open to extremist opinions from people who think the GFDL
is completely free as people who think the GPL is actually non-free.

AFAICS the only way that's going to happen is by taking the view that
Debian's definition of free as per the DFSG-free is just one view
you can take, and that people who take alternative views -- whether
stricter or more liberal, whether focussed on legal details or ignorant
of them in favour of just doing stuff -- are still worth listening to,
even though their views on what's free or not may well be fundamentally
different to Debian's.

If the only question is is this free or not? then you're going to get
turf wars because there's just no middle ground, and whoever gets to make
that decision controls the debate. Even just having analyses take the form
of these are the consequences, personally I'd avoid them, though Debian
doesn't think the problem's a big enough deal to worry about; Don agrees
with me, but Francesco doesn't seems like it'd be most of the way there.

But as it stands, -legal's analysis seems to me more to fit the mold of
this is conceivably bad in some circumstances, not the same as anything
in any good licenses, therefore it's non-free, and that's all there is
to it.

 I'm not sure, however, that this is the general attitude on -legal: I've
 never encountered it.  

Take Don and Jordi G. H.'s exchange this month:

]  If you disagree with the determination of the Developers, you can
]  easily install the work from non-free, or cease supporting Debian in
]  its entirety. The choice is yours, really.
] 
] Our way or the highway isn't a nice thought either. Do you really
] think that the DDs that voted against putting the GFDL in non-free
] should fork off too? Debian is the best distro out there, and I'm very
] loyal to it, but I'malso  very unhappy with its treatement of the
] GFDL, and I think this horrible mess should be fixed.

And no, to be fair, skimming the archives does indicate it's not the
general attitude at all, and I'm also pleased to have stumbled across
an example of Michael Poole noting he's not a lawyer or DD while giving
his thoughts/advice. Equally, if -legal were working 100% how I wanted
it to, that'd just mean I'd be happy to trust it implicitly and wouldn't
pay any attention to it at all; which probably means that the times
I do pay attention now are the times it's going (imo) severely wrong,
which is going to produce a pretty biassed view on my behalf.

Comparing Ted Tso's and Thomas Bushnell's views, as cited on LWN some time
ago [0] is probably a good reference point too. Having disagreements like
the current one over choice of venue be escalated into claims that are
one set of DDs are trying to prov[e] they are Holier Than Stallman,
or another are sell[ing] out [freedom] isn't very helpful if we want
the DFSG to be useful at helping upstreams and users.

In *my* opinion, and ymmv etc, analysing licenses so that we can say:

* These are almost certainly the effects, which barely anyone
  disagrees with (GPL is viral, CDDL is viral and GPL
  incompatible, QPL requires modifications to be made as patches)

* These are things that might not happen, but that you might be
  concerned at (GFDL stuff can't be encrypted, or even have Unix
  permission bits set? CDDL leaves you vulnerable to nuisance
  suits in foreign countries)

* These are ways you can avoid some of the drawbacks (use
  MIT instead of the old BSD license, explicitly limit when
  choice of venue comes into play)

* Different people and organisations may reasonably have different
  views on the acceptability of various effects -- the FSF view
  the Affero GPL and GFDL as free, OSI views the APSL as free;
  and you may want to make a different choice to any or all of
  those organisations. Debian's choices are focussed on ensuring
  we can develop and distribute a high quality operating system
  that works for our users. This may mean we'll accept some
  licenses that aren't as free as we'd like them to be, in
  some cases (such as licenses with patch clauses, or obnoxious
  advertising clauses, etc).

From what I've seen, debian-legal isn't very good at accepting anything
less free than it'd like. Which is pretty understandable, but not really
helpful either in advocating Debian's views (which are more accepting),
or in working with other groups (upstream or down) who don't have the
patience for endless nitpicking.

It could also be a lot better 

Re: discussion with the FSF: GPLv3, GFDL, Nexenta

2007-06-05 Thread Anthony Towns
On Tue, Jun 05, 2007 at 02:09:06AM -0700, Steve Langasek wrote:
 Why doesn't it matter?  If I've been sued because of something I've actually
 done that infringed the license, then surely the DFSG and Debian shouldn't
 be concerned with that (other than the question of whether what I've done is
 something that the DFSG requires of copyright holders); but if I'm being
 sued over something I *didn't* do, [...]

If you're going to be sued for something you didn't do, and lose because
in your absence you're assumed to have done it, why not go the whole
hog and just have them assert you've used/distributed a program you've
never actually used/distributed?

AFAICS this is an issue only when there's a not completely trivial
possibility that you have actually violated the license.

 - If I don't have the resources to fight the case in a court overseas, I
   risk summary judgement; the cost to me is the liberty to travel unmolested
   to Australia at some future date when I might have resources for travel.

Speaking of which, the linux.conf.au 2008 CFP is open:

http://linux.conf.au/presentations

I suspect that anyone who can get their paper accepted will be able to get
their travel costs covered by one of LCA, Debian or the Linux Foundation.

(Kickass segues 'r' us)

 * If I get sued in Oregon, I have a wide range of local resources at my
   disposal to help me find appropriate legal representation; if I get
   sued in Australia, I'm stretching my connections pretty thin to find
   and evaluate legal counsel, and this process is going to cost more
   time and money on my part (and may leave me with inferior legal
   counsel anyway in the end due to logistical issues)

For Australia, assuming you were being sued over free software stuff
that you'd be doing in good faith, I think we could do a fairly good
job helping you out.

 * Effective realtime communication with the lawyer is more expensive
   (transoceanic phone calls), and more inconvenient due to timezone
   differences (fine, fine, not for *me*, but you know what I mean)

Yes, Australian lawyers seem to be in a very inconvenient timezone for
me... ;)

 As an analogy, suppose that a license included the following clause:
   By distributing the covered work, you agree that the copyright holder can
   compel you at any time to play in an on-line black jack tournament at his
   website, geekblackjackstars.net, with an initial ante of $100.
 Should Debian consider this to be a free license because the clause won't
 necessarily be invoked and because some people win at blackjack?

Clearly not. BTW, that site doesn't seem to exist.

The difference between blackjack and choice of venue is that in one
case you're being compelled to do something, and in the other you're
pre-determining an argument. AFAICS that breaks that analogy.

Two different analogous licenses might be:

  By distributing the covered work, you agree that the copyright holder
  can sue you for violations of the license.

  If you distribute the covered work, the licensor agrees not to sue you
  in any jurisdiction other than Berlin, Germany.

I'd consider both those to be clearly free. Choice of venue goes beyond
either of them, certainly. But I'm still not seeing a way in which it
goes so far beyond them as to become non-free.

Heck, is choice of venue actually different to the combination of those
clauses?

  Simon Phipps' argument, presented at debconf last year, is (aiui) that
  the clause only comes into play when both parties are organisations
  that cross multiple jurisdictions anyway -- in which case they're both
  presumed to have a presence in the given jurisdiction anyway, and could
  reasonably be expected to be following its rules, afaics.
 Has this opinion been confirmed by a lawyer on *SPI's* payroll, not just by
 one on *Sun's* payroll? :)  

TTBOMK, no. ITYM acting on behalf of SPI rather than on SPI's payroll
btw. :)

 [...] The current
 clause, though, puts the copyright holder in the dealer's seat, and the
 house always wins.

Well, that's only true over the long term, and I don't think it's
necessarily true even over the long term for court cases.

Cheers,
aj



signature.asc
Description: Digital signature


Re: Reasonable maximum package size ?

2007-06-05 Thread Anthony Towns
On Tue, Jun 05, 2007 at 03:58:08PM +0200, Frans Pop wrote:
 IMO it would be worth it if we could split out gigabytes of data from the 
 main archive and thus significantly reduce the bandwidth needed for 
 mirror syncs. Especially if that data is only used by an extremely small 
 subset of users/developers.

Hrm, packages larger than 50MB in sid/i386 (main, contrib and non-free) [0]:

Eclipse NLS: (76MB)
 76498868 eclipse-platform-nls

Software: (104MB) (not arch:all)
104032026 gcc-snapshot

Clipart: (144MB)
144354894 openclipart-png

Documentation: (147MB)
 52801680 context-doc-nonfree
 94869090 koffice-doc

TeX: (192MB)
 56200406 texlive-fonts-extra
 56559816 tetex-src
 79907246 texlive-latex-extra

Debug packages: (369MB) (not arch:all)
 53959746 boson-dbg
 55430908 icedove-dbg
 56274922 koffice-dbg
 57383550 libqt4-debug
 59787420 iceape-dbg
 86404478 libgl1-mesa-dri-dbg

Game data: (1,413MB)
 52247006 nexuiz-music
 52552812 scorched3d-data
 60332050 vegastrike-music
 63569974 fillets-ng-data
 69398222 beneath-a-steel-sky
 75266604 openarena-data
 86669382 torcs-data-tracks
100913422 tremulous-data
103359260 freedroidrpg-data
132611332 vdrift-full
138455838 nexuiz-data
140544192 vegastrike-data
161313228 fgfs-base
176337384 sauerbraten-data

Largest deb in unstable is sauerbraten-data at 176MB, largest
arch-specific deb is atlas3-test for ia64 at 158MB. Total size of debs
in sid/i386 is 17,259MB, so packages above 50MB make up about 10%-15%
of the archive by size already.

Moving game data elsewhere would require some way for games in main to
depend on data elsewhere.

Moving -dbg data elsewhere would presumably require some way to upload
to both archives in a single step, and we'd want to keep them reasonably
tightly coupled.

Not moving -dbg stuff elsewhere would mean there'd be no need to worry
about supporting arch-specific stuff, afaics. OTOH, if we did support
arch-specific stuff, maybe it'd make sense to move the game engines
into the other area along with the data if there's no point to having
the engine without a huge amount of data to use it with.

 The advantages would be: [...]
 - make it possible to not include such data on the regular binary CDs,
   but for example on separate arch-independent data CDs

Particularly for game data, it seems like it'd make more sense (at least
from a user's pov) to include the game code and the game data on the same
CD, given they'd always be installed at the same time. I've no idea if
that could realistically be done, or if there's any point thinking about
it 'til later though.

Cheers,
aj

[0] find dists/sid -name Packages.gz | 
xargs zcat | 
awk '/^Package:/ {P=$2} /^Architecture:/ {A=$2} /^Size:/ {S=$2} /^$/ 
{if (S  5000) { print S, P, A }}' | 
sort -n | uniq | less



signature.asc
Description: Digital signature


Re: discussion with the FSF: GPLv3, GFDL, Nexenta

2007-06-05 Thread Anthony Towns
On Mon, Jun 04, 2007 at 07:55:18PM +0200, Francesco Poli wrote:
 On Mon, 4 Jun 2007 19:30:36 +1000 Anthony Towns wrote:
  And I mean, I know what a GR is for, why are you telling me? It's
  still not a *good solution* for deciding these things; it's a last
  resort, and the only other options we currently have a ftpmaster
  decides and it's obvious to pretty much everybody.
 I'm rather surprised to hear you saying that, since you seem to have
 been the proposer of GR-2006-001...

Sometimes you have to choose the best of a lot of bad options. When that
happens, it's often good to spend some time trying to get better options
for the future.

 [...]
  The official position of Debian is what we allow in main.
 That is to say?  Bugs never happen?!?  Nothing can possibly enter main
 by mistake or overlook?!?

Of course it can -- official positions can be wrong, can be made by
mistake or without due care, and can be changed.

 [...]
  Unfortunately, since -legal in general becomes an amorphous set of
  individuals who reserve the right to hold whatever opinions they like
  whenever questioned, there's little hope of -legal ever learning from
  its mistakes.
 Are you going to call the orwellian thought police, since I hold my
 *own* opinions?!?

You don't need to call the thought police, you only have to think of
them and they'll know to come!

Cheers,
aj



signature.asc
Description: Digital signature


  1   2   3   4   5   6   7   8   9   >