Feature request/ideas

2005-02-22 Thread Frank Hemer
In response to an old thread/message from dec 04, 
(http://lists.gnu.org/archive/html/bug-cvs/2004-12/msg00150.html) I would 
like to add some suggestions:

The cvsnt commitid feature for the log cmd is a very neet feature because it 
allows to collect all versions that belong to a single commit.

Another idea is a diff extension:
Set to a specific revision (using the diff -r option), I would like to compare 
this revision against its direct parent.

Any comments?

Regards
Frank


___
Bug-cvs mailing list
Bug-cvs@gnu.org
http://lists.gnu.org/mailman/listinfo/bug-cvs


CVS build fails with --disable-client option

2005-02-22 Thread Jim Salter
$ ./configure --disable-client
$ make
...
if gcc -DHAVE_CONFIG_H -I. -I. -I..  -I../lib -I../lib -I../diff 
-I../zlib -I/usr/kerberos/include -Ino/include  -g -O2 -MT edit.o -MD 
-MP -MF .deps/edit.Tpo -c -o edit.o edit.c; \
then mv -f .deps/edit.Tpo .deps/edit.Po; else rm -f 
.deps/edit.Tpo; exit 1; fi
edit.c: In function `edit_fileproc':
edit.c:350: error: structure has no member named `isremote'
make[2]: *** [edit.o] Error 1


___
Bug-cvs mailing list
Bug-cvs@gnu.org
http://lists.gnu.org/mailman/listinfo/bug-cvs


Re: Windows POSIX

2005-02-22 Thread Ingolf Steinbach
Hi Conrad,

On Tuesday 22 February 2005 04:34, Conrad T. Pino wrote:
 How does abstracting all CVS I/O calls for files, pipes
 and sockets sound to you?

Emulating non-blocking I/O (including select()) with Windows
API functions (asynchronous ReadFile()/WriteFile() and
WaitForMultipleObjects()) is a nightmare. For instance
 a) you cannot cancel an asynchronous ReadFile() operation
and then reliably determine the amount of data already
read.
 b) cancelling a ReadFile() operation (via CancelIo())
automatically cancels any other I/O operation on the same
handle
 c) you cannot determine the amount of data which can be
read immediately (without blocking) for all kinds of
input sources.
Non-blocking writing has its own problems.

Maybe there is an easy solution for this, but I have not yet
found it.

Kind regards
Ingolf
-- 

Ingolf Steinbach   Jena-Optronik GmbH
[EMAIL PROTECTED]   ++49 3641 200-147
PGP: 0x7B3B5661  213C 828E 0C92 16B5  05D0 4D5B A324 EC04



___
Bug-cvs mailing list
Bug-cvs@gnu.org
http://lists.gnu.org/mailman/listinfo/bug-cvs


Re: Windows POSIX

2005-02-22 Thread Frank Hemer
 Maybe there is an easy solution for this, but I have not yet
 found it.

What about taking some code/adapt code from cvsnt?
I have not taken a detailed look at it, but there must already be some 
abstraction done ...

Frank


___
Bug-cvs mailing list
Bug-cvs@gnu.org
http://lists.gnu.org/mailman/listinfo/bug-cvs


Re: FAQ-O-Matic pserver protocol

2005-02-22 Thread Derek Price
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Larry Jones wrote:
| Guus Leeuw jr. writes:
|
| I take this as a veto for no switches, but merely cvs passwd
| which would run only: a) if pserver protocol b) the user in
| questo is listed in CVSROOT/passwd on the pserver
|
|
| I don't even like the idea of doing that, but I won't veto it if
| Derek and Mark think it's a good idea.
Given the security deficiencies already inherent in the pserver
protocol, I can't see much harm in allowing passwords to be changed
via a CVS interface.  Requiring a user to type perl in on the shell
command line to change a CVS password doesn't seem to me to add much
additional security when the passwords are already so easily
compromised.  Might as well allow users who have already decided
pserver is secure enough for them the convenience of a passwd interface.
Hrm.  Then again, the more I consider the implications of a `cvs
passwd' command, the less appealing it sounds.  Firstly, in the
recommended pserver configuration, if you fail to heed all the dire
warnings we provide about pserver in the first place, the CVS team
recommends that the CVSROOT module only be writable by members of some
cvs admin group, perhaps `cvsadmin', since otherwise anyone could
check in a CVSROOT/passwd file, add it to CVSROOT/checkoutlist, and
overwrite your passwd file, mapping their account to any user on the
system that they wished, other than root.
To work around this in such a way as to allow any user to change their
own password, a few possible solutions come to mind.  The cvs pserver
would need to either keep root privileges longer than it currently
does, an option which is definitely out or, alternatively, perhaps a
second `cvspasswd' executable with setgid cvsadmin privileges could be
installed.  This sounds slightly more secure, but still opens the
possibility of new weaknesses in the `cvspasswd' executable.
Perhaps some reasonable compromise could be reached, possibly
involving relocation of the CVS passwd file into /etc/cvs/ or somesuch
as has been suggested in the past, but most of what I can come up with
still involves the potentially dangerous setgid executable.
The stated position of the CVS team has been to recommend using some
sort of :ext:/ssh access combination using system userids when
security is a concern.  This is an acknowledgement that CVS gets few
security audits and it is best to rely on tools that do get thorough
security audits for CVS access.  This also saves on the time of the
CVS maintainers by allowing us to leverage existing tools where
security is concerned.
I am still willing to discuss this matter, particularly because my
personal design philosophy tends to favor new features as progress,
with faith that the problems in a new design will be discovered and
solved later, but, at the risk of sounding stifiling, the potential
for new security issues arising in the already flawed pserver design
is real and I think these issues need to be addressed before anything
like this should be adopted.
Then again, perhaps the right approach would be to allow the passwd
command but continue to recommend clamping down permisions on CVSROOT
such that it can't be used.  This does sounds like a contradictory
position, though, and might help mislead naive and beginning users.  I
guess I'm with Larry, at least until these issues are satisfactorily
addressed.
Cheers,
Derek
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.0 (Cygwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCG1eULD1OTBfyMaQRArD0AJ9cBZ0gstVvKuOiKQ1zGtx9wzorbQCg05zb
lzv3Z0v2G1kjQB1m4+Hntj0=
=PVTD
-END PGP SIGNATURE-

___
Bug-cvs mailing list
Bug-cvs@gnu.org
http://lists.gnu.org/mailman/listinfo/bug-cvs


Re: CVS Feature Branch - Windows Build Broken - run_add_arg, run_piped

2005-02-22 Thread Derek Price
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Conrad T. Pino wrote:
| The following patch fixes all build errors.
|
| I don't claim it works and I don't claim it doesn't work.
|
| It's a good guess and I'd appreciate feedback before committing.
It looked good and I committed it.  Thanks for noticing strtok is
unneeded.  I'm installing that in src too.
Cheers,
Derek
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.0 (Cygwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCG2EYLD1OTBfyMaQRAhymAJ95eRtkjJuvSkdggD7/zf3JGlhC7ACg1iDT
oqCsUnX/yqmSKe3LPNB3+kQ=
=xo2X
-END PGP SIGNATURE-

___
Bug-cvs mailing list
Bug-cvs@gnu.org
http://lists.gnu.org/mailman/listinfo/bug-cvs


Re: CVS Feature Branch - Windows Build Broken - run_add_arg, run_piped

2005-02-22 Thread Derek Price
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Derek Price wrote:
| Thanks for noticing strtok is unneeded.  I'm installing that in src
| too.
Er, I thought I saw that there was an extra strtok decl in src too,
but I guess not.  Thanks regardless.
Cheers,
Derek
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.0 (Cygwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCG2GrLD1OTBfyMaQRAsZQAKDm8DdEhvPluUGox8dw31ErYVUgAACeP49g
ALfrHVSUOt6FwEwsUfzMviQ=
=/HY1
-END PGP SIGNATURE-

___
Bug-cvs mailing list
Bug-cvs@gnu.org
http://lists.gnu.org/mailman/listinfo/bug-cvs


Re: lines modified in newly-added files

2005-02-22 Thread Derek Price
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Neil Conway wrote:
| Derek Price wrote:
|
| You will need to count the total number of lines in the HEAD
| revision and keep it up to date as added and deleted lines for
| other revisions are processed. Later, in `cvs log', these new
| fields should be usable in conjunction with added and removed
| lines to get the output you are after.
|
|
| Ah, I see. Thanks very much for the detailed explanation of the
| issues involved -- I'll take a look at implementing this, and get
| back to you.
You're welcome.  I'm looking forward to seeing a patch!
Regards,
Derek
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.0 (Cygwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCG2T1LD1OTBfyMaQRAvreAKCTZH0tKWqyDGMYEex7T5oGXByBrQCfcGzS
CFxVmfBd30/xvh6NNVB7I28=
=yv9H
-END PGP SIGNATURE-

___
Bug-cvs mailing list
Bug-cvs@gnu.org
http://lists.gnu.org/mailman/listinfo/bug-cvs


RE: Changing passwords for CVS Users (pserver protocol)

2005-02-22 Thread Jim.Hyslop
Derek Price wrote:
 The patch does what you said it would on stable, but something else is
 wrong on feature.  The new watch6-2 test fails - basically, 
 the previous
 watch add appears to be failing without reporting the error.  I've
 attached a revised patch, with the failing tests (which, 
 again, pass on
 stable).

OK, I'll look into the problems on feature.

-- 
Jim Hyslop
Senior Software Designer
Leitch Technology International Inc. ( http://www.leitch.com )
Columnist, C/C++ Users Journal ( http://www.cuj.com/experts )



___
Bug-cvs mailing list
Bug-cvs@gnu.org
http://lists.gnu.org/mailman/listinfo/bug-cvs


Re: FAQ-O-Matic pserver protocol

2005-02-22 Thread Brian Murphy
Derek Price wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Larry Jones wrote:
| Guus Leeuw jr. writes:
|
| I take this as a veto for no switches, but merely cvs passwd
| which would run only: a) if pserver protocol b) the user in
| questo is listed in CVSROOT/passwd on the pserver
|
|
| I don't even like the idea of doing that, but I won't veto it if
| Derek and Mark think it's a good idea.
Given the security deficiencies already inherent in the pserver
protocol, I can't see much harm in allowing passwords to be changed
via a CVS interface.  Requiring a user to type perl in on the shell
command line to change a CVS password doesn't seem to me to add much
additional security when the passwords are already so easily
compromised.  Might as well allow users who have already decided
pserver is secure enough for them the convenience of a passwd interface.
Hrm.  Then again, the more I consider the implications of a `cvs
passwd' command, the less appealing it sounds.  Firstly, in the
recommended pserver configuration, if you fail to heed all the dire
warnings we provide about pserver in the first place, the CVS team
recommends that the CVSROOT module only be writable by members of some
cvs admin group, perhaps `cvsadmin', since otherwise anyone could
check in a CVSROOT/passwd file, add it to CVSROOT/checkoutlist, and
overwrite your passwd file, mapping their account to any user on the
system that they wished, other than root.
To work around this in such a way as to allow any user to change their
own password, a few possible solutions come to mind.  The cvs pserver
would need to either keep root privileges longer than it currently
does, an option which is definitely out or, alternatively, perhaps a
second `cvspasswd' executable with setgid cvsadmin privileges could be
installed.  This sounds slightly more secure, but still opens the
possibility of new weaknesses in the `cvspasswd' executable.
Perhaps some reasonable compromise could be reached, possibly
involving relocation of the CVS passwd file into /etc/cvs/ or somesuch
as has been suggested in the past, but most of what I can come up with
still involves the potentially dangerous setgid executable.
The stated position of the CVS team has been to recommend using some
sort of :ext:/ssh access combination using system userids when
security is a concern.  This is an acknowledgement that CVS gets few
security audits and it is best to rely on tools that do get thorough
security audits for CVS access.  This also saves on the time of the
CVS maintainers by allowing us to leverage existing tools where
security is concerned.
I am still willing to discuss this matter, particularly because my
personal design philosophy tends to favor new features as progress,
with faith that the problems in a new design will be discovered and
solved later, but, at the risk of sounding stifiling, the potential
for new security issues arising in the already flawed pserver design
is real and I think these issues need to be addressed before anything
like this should be adopted.
Then again, perhaps the right approach would be to allow the passwd
command but continue to recommend clamping down permisions on CVSROOT
such that it can't be used.  This does sounds like a contradictory
position, though, and might help mislead naive and beginning users.  I
guess I'm with Larry, at least until these issues are satisfactorily
addressed.
I have plans to impliment pserver with ssl support, it doesn't seem too 
awful.
Would there be any takers?

/Brian
___
Bug-cvs mailing list
Bug-cvs@gnu.org
http://lists.gnu.org/mailman/listinfo/bug-cvs


Re: FAQ-O-Matic pserver protocol

2005-02-22 Thread Derek Price
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Brian Murphy wrote:
| Derek Price wrote:
|
| -BEGIN PGP SIGNED MESSAGE- Hash: SHA1
|
| Larry Jones wrote:
|
| | Guus Leeuw jr. writes: | | I take this as a veto for no
| switches, but merely cvs passwd | which would run only: a) if
| pserver protocol b) the user in | questo is listed in
| CVSROOT/passwd on the pserver | | | I don't even like the idea of
| doing that, but I won't veto it if | Derek and Mark think it's a
| good idea.
|
|
| Given the security deficiencies already inherent in the pserver
| protocol, I can't see much harm in allowing passwords to be
| changed via a CVS interface.  Requiring a user to type perl in on
| the shell command line to change a CVS password doesn't seem to
| me to add much additional security when the passwords are already
| so easily compromised.  Might as well allow users who have
| already decided pserver is secure enough for them the convenience
| of a passwd interface.
|
| Hrm.  Then again, the more I consider the implications of a `cvs
| passwd' command, the less appealing it sounds.  Firstly, in the
| recommended pserver configuration, if you fail to heed all the
| dire warnings we provide about pserver in the first place, the
| CVS team recommends that the CVSROOT module only be writable by
| members of some cvs admin group, perhaps `cvsadmin', since
| otherwise anyone could check in a CVSROOT/passwd file, add it to
| CVSROOT/checkoutlist, and overwrite your passwd file, mapping
| their account to any user on the system that they wished, other
| than root.
|
| To work around this in such a way as to allow any user to change
| their own password, a few possible solutions come to mind.  The
| cvs pserver would need to either keep root privileges longer than
| it currently does, an option which is definitely out or,
| alternatively, perhaps a second `cvspasswd' executable with
| setgid cvsadmin privileges could be installed.  This sounds
| slightly more secure, but still opens the possibility of new
| weaknesses in the `cvspasswd' executable.
|
| Perhaps some reasonable compromise could be reached, possibly
| involving relocation of the CVS passwd file into /etc/cvs/ or
| somesuch as has been suggested in the past, but most of what I
| can come up with still involves the potentially dangerous setgid
| executable.
|
| The stated position of the CVS team has been to recommend using
| some sort of :ext:/ssh access combination using system userids
| when security is a concern.  This is an acknowledgement that CVS
| gets few security audits and it is best to rely on tools that do
| get thorough security audits for CVS access.  This also saves on
| the time of the CVS maintainers by allowing us to leverage
| existing tools where security is concerned.
|
| I am still willing to discuss this matter, particularly because
| my personal design philosophy tends to favor new features as
| progress, with faith that the problems in a new design will be
| discovered and solved later, but, at the risk of sounding
| stifiling, the potential for new security issues arising in the
| already flawed pserver design is real and I think these issues
| need to be addressed before anything like this should be adopted.
|
|
| Then again, perhaps the right approach would be to allow the
| passwd command but continue to recommend clamping down permisions
| on CVSROOT such that it can't be used.  This does sounds like a
| contradictory position, though, and might help mislead naive and
| beginning users.  I guess I'm with Larry, at least until these
| issues are satisfactorily addressed.
|
| I have plans to impliment pserver with ssl support, it doesn't seem
|  too awful. Would there be any takers?
I would definitely favor pserver with SSL support as an improvement
over vanilla pserver.  If you do implement this, please see what you
can do about remaining compatible with CVSNT's SSL pserver mode
(sserver?).
This would not change the `cvs passwd' command issues, however.  A
secure CVSROOT dir (which is necessary to prevent just anybody from
overwriting the CVSROOT/passwd file as things stand) still either
prevents `cvs passwd' from running or opens another potential security
hole.  I might be interested in seeing the setgid `cvspasswd'
executable, though.  Such a beast might be small enough to make
auditing fairly easy and should require few changes once it stabilizes.
Regards,
Derek
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.0 (Cygwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCG6fFLD1OTBfyMaQRAvW8AJ0UlX+jawNnq/CsnIvZU5QE3Y1hJwCgk6Qg
dr08Y/w/VDwsvtzWqg6uzzU=
=9dXO
-END PGP SIGNATURE-

___
Bug-cvs mailing list
Bug-cvs@gnu.org
http://lists.gnu.org/mailman/listinfo/bug-cvs