Bug#1058704: ITP: nsncd -- Name service non-caching daemon

2023-12-14 Thread Geoffrey Thomas
Cool! I'm one of the upstream maintainers for nsncd and a (somewhat inactive) 
DM. The Debian packaging in the upstream repo was written when Debian Rust 
support was nowhere near as mature, but we run this at my workplace on Debian 
and would be delighted to switch to official packaging. If it's helpful, I'm 
happy to accept PRs against the upstream packaging as long as I can figure out 
a way to keep building on oldstable onwards. Let me know if I can help in any 
other way!

-- 
Geoffrey Thomas
geo...@ldpreload.com

On Thu, Dec 14, 2023, at 4:29 PM, Philipp Kern wrote:
> Package: wnpp
> Severity: wishlist
> Owner: Philipp Kern 
> X-Debbugs-Cc: debian-de...@lists.debian.org, pk...@debian.org
>
> * Package name: nsncd
>   Version : 1.4.1 (plus patches[1])
> * URL : https://github.com/twosigma/nsncd
> * License : Apache 2.0
>   Programming Lang: Rust
>   Description : Name service non-caching daemon
>
>  nsncd implements the NSCD (name-service caching daemon) protocol to
>  provide out-of-process NSS lookups but does not implement caching.
>
>  It is designed to provide high-performance NSS lookups for programs
>  that are not using the system libc, while providing semantics as if
>  NSCD were not being used.
>
> This is useful in environments in which you are mixing binaries from
> several sources. One such environment is Nix, where binaries will
> be linked to a (hermetic) glibc from the Nix store. By dropping the
> need to cache, nsncd is a lot simpler than nscd - it's only purpose
> is to decouple your binaries from the NSS modules you have configured,
> which will continue to run under the system glibc.
>
> I'm going to maintain the package for the time being. If the Rust team
> also wants to maintain Rust leaf software, I'm also happy to collaborate
> there.
>
> Kind regards
> Philipp Kern
>
> [1] The Nix people also added support for host resolution in
> https://github.com/nix-community/nsncd/.



Bug#1037342: python3-pyfuse3: should Recommends fuse3

2023-06-11 Thread Geoffrey Thomas
Package: python3-pyfuse3
Version: 3.2.1-2+b2
Severity: wishlist

Hi!

I tried running a sample filesystem with pyfuse3 on a fresh VM and got
"fuse: failed to exec fusermount3: No such file or directory".

I think the package should have Recommends: fuse3.

-- 
Geoffrey Thomas
geo...@ldpreload.com



Bug#913190: bash-completion: Update 'java' completion to support '.java' files

2023-04-12 Thread Geoffrey Thomas
Control: severity -1 normal

A side effect of the lack of support for .java files is that
bash-completion will turn slashes into dots for a Java command line. For
instance, if you type

$ java /home/

and press TAB, it will turn into

$ java .home.

IMO this raises the request from a new feature to a borderline bug,
because instead of simply failing to complete the final path component
(but letting the user type it in themselves or use M-/), it corrupts the
command line already entered by the user.

--
Geoffrey Thomas
geo...@twosigma.com



Bug#991156: unblock: config-package-dev/5.6 [pre-approval]

2021-07-15 Thread Geoffrey Thomas

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: config-package-...@mit.edu

Hi release team,

This is a pre-approval request to get a sense of your willingness to 
unblock config-package-dev to handle usrmerge/dpkg issues.


[ Reason ]

config-package-dev is a Debhelper (and CDBS) add-on for writing packages 
that use dpkg-divert to customize other packages' behavior. (The target 
audience is people customizing Debian for a university/company/etc. or 
preparing derivatives. Notable public users include Debathena and Whonix. 
That is, config-package-dev is a leaf package in the Debian archive, with 
no build-rdeps.)


As noted on https://wiki.debian.org/Teams/Dpkg/MergedUsr , "dpkg-divert is 
currently broken by" the current implementation of usrmerge. What this 
seems to mean, specifically, is that if you divert a binary by the wrong 
name - e.g., dpkg-divert /bin/less instead of /usr/bin/less - the 
diversion is useless, and the underlying package can overwrite a file that 
was supposed to be diverted.


I think config-package-dev ought to address this, somehow. Some options 
are listed in my email to our mailing list, where I also demonstrate what 
can go wrong: 
http://mailman.mit.edu/pipermail/config-package-dev/2021-July/66.html


Options range from just documenting the issue to actually trying to 
address it in some fashion. I don't yet have a change ready for any of 
these options; I'm trying to gauge what you think is acceptable vs. too 
risky at this point in freeze.


[ Impact ]

A user on a usrmerged system could easily notice a file in (e.g.) /usr/bin 
and try to build a config-package of it without realizing the file 
actually lives in (e.g.) /bin. Things would even appear to work after 
installing the config-package, because the file would get renamed on disk; 
they would break after the underlying package (the target of the 
diversion) gets upgraded or reinstalled.


[ Tests ]

The examples directory contains a handful of sample source packages using 
most of config-package-dev's features. autopkgtests cover building but not 
installing those packages, so testing would be manual. Also, the tests 
only cover the positive case, using the correct paths, as opposed to the 
negative case, but manual testing of that would be easy (see the linked 
email above for essentially a currently-failing test case).


[ Risks ]

As noted, this is a leaf package within the Debian archive, so the risk to 
Debian itself from getting the change wrong would be low.


The major alternative here would be fixing dpkg to handle diversions (and 
perhaps many other things) correctly on a usrmerged system. From the tone 
of the discussion, I would guess that this certainly isn't going to happen 
before Bullseye release, but if you're aware of work along those lines, I 
would be happy to wait for that / contribute to it / test it.


[ Checklist ]
  [ ] all changes are documented in the d/changelog
  [ ] I reviewed all changes and I approve them
  [ ] attach debdiff against the package in testing

[ Other info ]

I'm open to whatever level of change you think is fine. I would prefer 
fixing it (somehow) to merely documenting it; if you think I should try to 
fix it and come back with a debdiff, I'm happy to do that.


unblock config-package-dev/5.6

Thanks,
--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#974531: krb5: Please include upstream fix "Unregister thread key in SPNEGO finalization"

2020-11-11 Thread Geoffrey Thomas
Package: krb5
Version: 1.17-10

Hi maintainers,

We're affected by the bug fixed in this upstream krb5 commit:
https://github.com/krb5/krb5/commit/07ff54d0

I'm mostly filing this because we want this patch in Stretch LTS, but I think 
the process for that is including it in Sid and Buster first. I see that the 
patch is included in the latest 1.18 upload to experimental. It was backported 
to upstream's 1.17 branch here:
https://github.com/krb5/krb5/commit/994f5f51
but 1.17.2 hasn't been released yet.

I'd be happy to help by providing debdiffs or packages to sponsor or whatever 
if that's useful, but I'm guessing I should just wait for 1.17.2 to be released 
and reach unstable, and then file bugs for Buster and Stretch LTS?

Thanks,
-- 
Geoffrey Thomas
geo...@twosigma.com



Bug#873012: Patch for broken live migration in qemu in stretch

2019-04-05 Thread Geoffrey Thomas

Control: tag -1 patch

I ended up tracking this down - the problem is that the target qemu 
accepts the NBD connection from the source but does not handle any of the 
data on the socket. That plus Berni's comment that the NBD security 
patches caused the regression helped me figure out what was going wrong 
and get a proper fix to the security patches.


The patch 
nbd-fully-initialize-client-in-case-of-failed-negotiation-CVE-2017-9524.patch 
was not backported / cherry-picked properly. It's taken from this commit 
in qemu 2.10:


https://github.com/qemu/qemu/commit/df8ad9f128c15aa0a0ebc7b24e9a22c9775b67af

Note that the backported patch moves around a call to nbd_set_handlers(), 
which doesn't exist in the upstream commit. The upstream commit has a call 
to nbd_client_receive_next_request() which _isn't_ moved by the patch; 
that call doesn't exist in the backported commit. That's because this call 
to nbd_set_handlers() was changed to nbd_client_receive_next_request() in 
qemu 2.9:


https://github.com/qemu/qemu/commit/ff82911cd3f69f028f2537825c9720ff78bc3f19

If you adjust the backported patch to leave nbd_set_handlers() alone 
instead of moving it around, the NBD server starts to work, and live 
migration works again. I've tested this by patching the qemu on the target 
hypervisor and doing a live migration using Stretch's versions of 
OpenStack and libvirt (nova live-migration --block-migrate, VM disks are 
qcow2 on local disk).


I've attached a debdiff of the local build I'm using. You should be able 
to fix the version number in d/changelog and upload. If it would help for 
me to prepare packages for upload (I'll need sponsorship, but I can upload 
to mentors or something with my DM key) or open a pull request to Salsa, I 
can do that too. (Not totally sure what the process is for an update to 
stable.)


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.comdiff -Nru qemu-2.8+dfsg/debian/changelog qemu-2.8+dfsg/debian/changelog
--- qemu-2.8+dfsg/debian/changelog  2018-11-08 15:41:45.0 +
+++ qemu-2.8+dfsg/debian/changelog  2019-04-05 19:02:53.0 +
@@ -1,3 +1,14 @@
+qemu (1:2.8+dfsg-6+deb9u5+geofft1) stretch-security; urgency=medium
+
+  * Fix improper backport of CVE-2017-9524 fix that caused NBD
+connections to hang (Closes: #873012).
+- 
nbd-fully-initialize-client-in-case-of-failed-negotiation-CVE-2017-9524.patch:
+  Don't move nbd_set_handlers before nbd_negotiate.
+- nbd-fix-regression-on-resiliency-to-port-scan-CVE-2017-9524.patch:
+  Refresh.
+
+ -- Geoffrey Thomas   Fri, 05 Apr 2019 19:02:53 +
+
 qemu (1:2.8+dfsg-6+deb9u5) stretch-security; urgency=medium
 
   * Backport SSBD support (Closes: #908682)
diff -Nru 
qemu-2.8+dfsg/debian/patches/nbd-fix-regression-on-resiliency-to-port-scan-CVE-2017-9524.patch
 
qemu-2.8+dfsg/debian/patches/nbd-fix-regression-on-resiliency-to-port-scan-CVE-2017-9524.patch
--- 
qemu-2.8+dfsg/debian/patches/nbd-fix-regression-on-resiliency-to-port-scan-CVE-2017-9524.patch
  2018-05-26 10:04:06.0 +
+++ 
qemu-2.8+dfsg/debian/patches/nbd-fix-regression-on-resiliency-to-port-scan-CVE-2017-9524.patch
  2019-04-05 19:02:53.0 +
@@ -140,15 +140,15 @@
  }
  
  static void nbd_read(void *opaque)
-@@ -1410,7 +1410,7 @@ static coroutine_fn void nbd_co_client_start(void 
*opaque)
- nbd_set_handlers(client);
+@@ -1409,7 +1409,7 @@ static coroutine_fn void nbd_co_client_s
+ qemu_co_mutex_init(>send_lock);
  
  if (nbd_negotiate(data)) {
 -client_close(client);
 +client_close(client, false);
  goto out;
  }
- 
+ nbd_set_handlers(client);
 @@ -1418,11 +1418,17 @@ out:
  g_free(data);
  }
diff -Nru 
qemu-2.8+dfsg/debian/patches/nbd-fully-initialize-client-in-case-of-failed-negotiation-CVE-2017-9524.patch
 
qemu-2.8+dfsg/debian/patches/nbd-fully-initialize-client-in-case-of-failed-negotiation-CVE-2017-9524.patch
--- 
qemu-2.8+dfsg/debian/patches/nbd-fully-initialize-client-in-case-of-failed-negotiation-CVE-2017-9524.patch
  2018-05-26 10:04:06.0 +
+++ 
qemu-2.8+dfsg/debian/patches/nbd-fully-initialize-client-in-case-of-failed-negotiation-CVE-2017-9524.patch
  2019-04-05 19:02:53.0 +
@@ -51,14 +51,13 @@
 +QTAILQ_INSERT_TAIL(>clients, client, next);
  }
 +qemu_co_mutex_init(>send_lock);
-+nbd_set_handlers(client);
 +
  if (nbd_negotiate(data)) {
  client_close(client);
  goto out;
  }
 -qemu_co_mutex_init(>send_lock);
--nbd_set_handlers(client);
+ nbd_set_handlers(client);
  
 -if (exp) {
 -QTAILQ_INSERT_TAIL(>clients, client, next);


Bug#921401: RM: prelink -- ROM, dead upstream

2019-02-04 Thread Geoffrey Thomas

Package: ftp.debian.org
Severity: normal

Hi ftp-master,

Please remove src:prelink - the package is unmaintained upstream (no 
releases or SVN commits since 2013) and was removed from Fedora (where the 
upstream maintainer was packaging it) several releases ago. It has a bad 
habit of breaking binaries (see open bugs) and I don't think there's 
enough of a development community to really fix it; the remaining bugs 
likely require very arcane ELF magic to resolve properly.


There are two binary packages, prelink and execstack. I don't think 
execstack is of much use by itself, espcially because any build scripts 
etc. using execstack can generally be replaced with the linkerflag 
-Wl,-z,noexecstack (or execstack, whichever you need). But if someone's 
interested I can try to split it out of the prelink source package. 
(Fedora currently has an "execstack" source package from the prelink 
tarball, but I think they care more than we do because SELinux blocks 
programs with executable stacks by default.)


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#914036: config-package-dev: scripts directly access internal dpkg database

2019-02-03 Thread Geoffrey Thomas

On Sun, 18 Nov 2018, Guillem Jover wrote:


Source: config-package-dev
Source-Version: 5.5
Severity: important
User: debian-d...@lists.debian.org
Usertags: dpkg-db-access-blocker

Hi!

This package contain scripts that directly access the dpkg internal
database [S], instead of using the correct public interface
«dpkg --verify» (note that it currently does not return an error exit
code when it finds modified files, that will be fixed in 1.19.3, but
you can always just check the output).

 [S] check-files.mk, dh_configpackage


Both check-files.mk and dh_configpackage use dpkg-query --control-path 
$package md5sums, and only fall back to /var/lib/dpkg/info when that 
option doesn't exit. Is that enough?


(I can drop the fallback if you'd like - we wanted to support backports to 
LTSes but that code was written in 2011 so any current supported release 
certainly has --control-path. Relatedly, we could probably switch to 
--control-show at this point too if you'd like, but see also 
https://bugs.debian.org/735021 .)


I suppose we could use dpkg --verify, which would in theory simplify 
the code because (if I'm testing it right) it handles conffiles and 
non-conffiles just the same, and so we don't need a special case for 
dpkg-query -W'${Conffiles}'. But there are two downsides to it:


- It's less efficient, since it verifies all files in the package instead 
of just the one we want to check.


- As far as I can tell, it doesn't distinguish "This file has not been 
modified" from "I have no md5sums for this file". It's very rare to see a 
package with a missing or incomplete md5sums control file these days, but 
we do handle that case currently (we print an error if it's incomplete, 
and a warning if the package has no md5sums at all) and I'd like to keep 
handling it.


Do you think you can extend the --verify interface to support querying an 
individual file by name, and print an error if the file could not be 
verified?


If you can do a dpkg --verify-file (where dpkg figures out the package 
name, and prints an error if the file is unknown or the owning package 
doesn't provide md5sums) then I can skip most of the complexity in what 
I'm doing and just call that in newer versions of dpkg. :) I could also 
use a dpkg --verify "$package" --verify-file "$file", or something.


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com

Bug#891670: pymssql FTBFS with freetds-dev 1.00.82-2

2019-01-28 Thread Geoffrey Thomas
I've been busy, sorry - feel free to team upload/NMU it but I'm hoping to get 
to it this weekend.

-- 
Geoffrey Thomas (via mobile)
geo...@ldpreload.com

> On Jan 28, 2019, at 08:56, Raphael Hertzog  wrote:
> 
> Hi,
> 
>> On Sun, 24 Jun 2018, Geoffrey Thomas wrote:
>> Upstream is being slow to put out a new release, there's some blocker
>> involving the new freetds. I asked if that was resolved yet:
>> 
>> https://github.com/pymssql/pymssql/issues/528
>> 
>> At some point (probably in a month or two, honestly...) I'll cherry-pick the
>> relevant patches if there's no release, but I'd prefer to see upstream be
>> confident about the new freetds version.
> 
> There's a new upstream release available. We need this package
> updated for Python 3.7 for Kali so we will look into this if nobody
> else is quicker.
> 
> Cheers,
> -- 
> Raphaël Hertzog ◈ Debian Developer
> 
> Support Debian LTS: https://www.freexian.com/services/debian-lts.html
> Learn to master Debian: https://debian-handbook.info/get/



Bug#902323: python-pathlib: Should this package be removed?

2018-06-24 Thread Geoffrey Thomas

Source: python-pathlib
Version: 1.0.1-2

[cc python-pathlib2 uploader]

Hi! At the Brooklyn BSP, Lincoln and I were looking at the FTBFS #897496, 
and we found that this package is deprecated upstream in favor of 
python-pathlib2. This package hasn't had a Debian upload since 2015, and 
python-pathlib2 is actively maintained both upstream and in Debian. Also, 
there appear to be three remaining reverse dependencies in unstable (down 
from 4 in stable, beets switched to Python 3):


- python-pytest-benchmark
- python-pyscss
- python-eyed3

Does it make sense to switch those packages over to using python-pathlib2 
and remove python-pathlib?


If so, I'll move this bug to the FTP team and request removal once we get 
the switches to pathlib2 in. Lincoln is working on getting the upstream 
projects switched to pathlib2 and then submitting those patches to Debian. 
(pathlib2 requires doing `import pathlib2 as pathlib`, so there are code 
changes in addition to metadata/setup.py changes.)


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#874214: src:python-pathlib: please add python3-pathlib binary package

2018-06-24 Thread Geoffrey Thomas

Piotr,

What's the python3 package you're looking at / did you package it already? 
As far as I can tell, python-pathlib is deprecated upstream in favor of 
python-pathlib2, which is Python 2-only. (And Python 3 in Jessie and newer 
has pathlib in the standard library.)


We ran across at a BSP (from #897496, FTBFS) and it seems like probably 
python-pathlib should be RM'd; it has increasingly few reverse 
dependencies, and they should probably be switched to python-pathlib2 too. 
So I want to make sure there's no new uses of this package, before 
suggesting an RM!


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#881826: devscripts: sadt: does not parse debian/control with comments

2017-11-15 Thread Geoffrey Thomas

Package: devscripts
Version: 2.17.11
User: devscri...@packages.debian.org
Usertags: sadt

sadt fails to correctly parse debian/control files that include comments 
in their build-dependencies, for instance:


$ mkdir -p debian/tests
$ cat > debian/control << EOF
Source: s
Build-Depends:
# some comment here
 sl
EOF
$ cat > debian/tests/control << EOF
Tests: sl-exists
Depends: @builddeps@
EOF
$ cat > debian/tests/sl-exists << EOF
#!/bin/sh
dpkg -l sl
EOF
$ sadt
Traceback (most recent call last):
  File "/usr/bin/sadt", line 476, in 
main()
  File "/usr/bin/sadt", line 378, in main
for n, para in enumerate(deb822.Packages.iter_paragraphs(file)):
  File "/usr/lib/python3/dist-packages/debian/deb822.py", line 378, in 
iter_paragraphs
for section in parser:
apt_pkg.Error: E:Unable to parse package file  (1)

This is refused by libapt-pkg's deb822 format parser, but permitted by the 
pure-Python one in python-debian, as noted in a comment in python-debian:



:param use_apt_pkg: if sequence is a file, apt_pkg can be used
   if available to parse the file, since it's much much faster.  Set
   this parameter to True to enable use of apt_pkg. Note that the
   TagFile parser from apt_pkg is a much stricter parser of the
   Deb822 format, particularly with regards whitespace between
   paragraphs and comments within paragraphs. If these features are
   required (for example in debian/control files), ensure that this
   parameter is set to False.


The "Packages" subclass (which is intended for parsing Packages files in 
apt repos, not deb822 files in general) sets use_apt_pkg to true. The 
simplest fix is to change sadt line 378 to pass use_apt_pkg=False, but in 
theory, python-debian should gain a new subclass for debian/control files 
that has the _PkgRelationMixin but uses the more lenient parser.


If you would like me to commit this change to the collab-maint repo, let 
me know. I've confirmed that it does fix the problem.


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#881825: devscripts: sadt: does not parse tests separated by commas

2017-11-15 Thread Geoffrey Thomas

Package: devscripts
Version: 2.17.11
User: devscri...@packages.debian.org
Usertags: sadt

The autopkgtest spec says that test names can be separated by "comma 
and/or whitespace" [1]. sadt only understands tests separated by 
whitespace:


$ mkdir -p debian/tests
$ echo 'Source: foo' > debian/control
$ echo 'Tests: one, two' > debian/tests/control
$ ln -s /bin/true debian/tests/one
$ ln -s /bin/true debian/tests/two
$ sadt -v
one, ... SKIP (debian/tests/one, could not be made executable: [Errno 2] No 
such file or directory: 'debian/tests/one,')
two ... ok
--
Ran 2 tests

OK (skipped=1)

autopkgtest itself implements this with .replace(',', ' ').split() [2], 
which seems reasonable. Also the spec isn't clear but it looks like the 
same should be done with restrictions and features.


If you would like me to commit this change to the collab-maint repo, let 
me know. I've confirmed that it does fix the problem.


[1] 
https://anonscm.debian.org/git/autopkgtest/autopkgtest.git/tree/doc/README.package-tests.rst
[2] 
https://anonscm.debian.org/git/autopkgtest/autopkgtest.git/tree/lib/testdesc.py?h=4.3#n413

--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#876552: nm: [PATCH] gendered pronoun in explain_statement_am_ok

2017-09-23 Thread Geoffrey Thomas

Package: nm.debian.org
Tags: patch

The am_ok page has the sentence, "The applicant will be notified once an 
Application Manager is assigned who will contact him."


Attached is a patch to change the pronoun to "them". I think this is the 
only one-gender usage in nm2. (There are a couple of "he/she" or "him/her" 
usages; if you want to update those to "they" or "them" for consistency, 
I'm happy to send in a patch for that too.)


Thanks,
--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.comFrom 1cd7bca265e71c850f99c682b5aeba5ccf3fb20e Mon Sep 17 00:00:00 2001
From: Geoffrey Thomas <geo...@ldpreload.com>
Date: Sat, 23 Sep 2017 12:33:16 -0400
Subject: [PATCH 1/1] explain_statement_am_ok: Use gender-neutral pronoun

---
 process/templates/process/explain_statement_am_ok.html | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/process/templates/process/explain_statement_am_ok.html b/process/templates/process/explain_statement_am_ok.html
index 418d1c2..69126ee 100644
--- a/process/templates/process/explain_statement_am_ok.html
+++ b/process/templates/process/explain_statement_am_ok.html
@@ -6,7 +6,7 @@ information collected on this site, has a look to past contributions, asks a
 few questions if needed, and tries to build some trust that {{person.fullname}}
 should indeed be {{process.applying_for|desc_status}}.
 
-The applicant will be notified once an Application Manager is assigned who will contact him.
+The applicant will be notified once an Application Manager is assigned who will contact them.
 
 {% if edit %}
 As the Application Manager, paste a few lines describing the idea you have
-- 
2.1.4



Bug#875712: nova-placement-api fails to start with "unrecognized arguments"

2017-09-13 Thread Geoffrey Thomas
Package: nova-placement-api
Version: 2:14.0.0-4

Installing nova-placement-api results in a service that crashes (and 
gets respawned by systemd) with these logs:

systemd[1]: Starting OpenStack Compute Placement API...
systemd[1]: Started OpenStack Compute Placement API.
nova-placement-api[37773]: usage: nova-placement-api [-h] [--port PORT] -- 
[passed options]
nova-placement-api[37773]: nova-placement-api: error: unrecognized arguments: 
--config-file=/etc/nova/nova.conf 
--log-file=/var/log/nova/nova-placement-api.log
systemd[1]: nova-placement-api.service: Main process exited, code=exited, 
status=2/INVALIDARGUMENT
systemd[1]: nova-placement-api.service: Unit entered failed state.
systemd[1]: nova-placement-api.service: Failed with result 'exit-code'.
systemd[1]: nova-placement-api.service: Service hold-off time over, scheduling 
restart.
systemd[1]: Stopped OpenStack Compute Placement API.
systemd[1]: Starting OpenStack Compute Placement API...
[etc.]

It looks like nova-placement-api is not intended to be run as a standalone 
service, but is a wsgi script that should be called from Apache mod_wsgi.

-- 
Geoffrey Thomas
geo...@twosigma.com



Bug#873966: config-package-dev: transform operation error

2017-09-01 Thread Geoffrey Thomas

On Fri, 1 Sep 2017, Bruno Maitre wrote:


Dear Maintainer,

When using the transform operation dh_configpackage will output that kind
of error:

Can't use string ("/ARRAY(0x55f37e2c3080)") as an ARRAY ref while "strict refs" 
in use at /usr/bin/dh_configpackage line 394.

This error has been introduced by the correction of: 
#803962 : config-package-dev: Requires leading slashes un debian/*.displace


For this correction we iterrate through the differents operation arrays to
add a leading slash if needed.
The problem is that @transformfiles is an array of array since it's created
with filedoublearray function and not the filearray function like the others
operation arrays (which are simples arrays).
This lead to an add of a slash in front of the reference array ARRAY(0xXXX...) 
as can be seen in the error message.

Subsequent processing of transformfiles results in an error.

I've attached a patch with a way to fix this issue by removing transformfiles 
from the leading slashes verification loop and by checking leading slashes in 
the treatment of transformfiles itself as it was done before.


Note that I've triggered the error in a Debian testing environment and
the stable version is not affected.


Oops - thank you! I've applied the patch and I'll aim to do an upload that 
fixes this tonight.


Also, I could have sworn I did a test run of building all the examples in 
examples/, but indeed `apt-get source config-package-dev; cd 
examples/debhelper/debathena-transform-example-1.0; dpkg-buildpackage` 
fails. (And also fails in unstable because the example config file has 
changed location.) We should really add a test suite to make sure the 
examples build and produce the .debs we expect.


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#873043: debhelper: Please mv Debian lib/Debian for case-insensitive filesystems

2017-08-23 Thread Geoffrey Thomas

Package: debhelper
Version: 10.7.2
Tags: patch
Severity: wishlist

Hi Debhelper maintainers,

I would sort of like to use Debhelper to build Debian packages on macOS, 
as an alternative to homebrew etc. The general process of bootstrapping 
Debian on macOS takes a lot of steps, but one of the sillier steps is 
creating a case-sensitive disk image, because Debhelper ships both a 
debian/ and Debian/ directory. The default macOS root filesystem is 
case-preserving but not case-sensitive, so extracting a tarball containing 
debian/ and Debian/ will cause one directory to clobber the other.


I have a commit at
   https://gitlab.com/geofft/debhelper
which does a `git mv Debian lib/Debian` (removing the existing lib -> . 
symlink), plus a few fixes to point things at the Debian subdirectory. 
I've tested that the resulting binary packages are identical to the one in 
unstable, other than the changed path in debian/copyright (and the lack of 
doc/SMARTER-BUILDSYSTEMS, which seems not to have been committed to git). 
I've also confirmed that `prove -vwlr t`, as mentioned in the commit 
introducing the lib symlink, continues to pass. For review, you probably 
want to use `git show -M` on my patch to recognize the renames.


Can you please consider applying this patch? Thanks!

--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#871324: www.debian.org: [PATCH] Remove gendered pronouns in english/devel/join

2017-08-07 Thread Geoffrey Thomas

Package: www.debian.org
Severity: normal
Tags: patch

Hi www team,

Almost all of the pronouns in https://www.debian.org/devel/join are 
"they"/"them", but there are a few uses of "he"/"his" and one "(s)he" to 
refer to the applicant. Below is a patch to make them all consistent.


I haven't looked at the other languages (because I'm not super familiar 
with the norms for pronouns in other languages) so I'm not sure if the 
same issue exists in translations.


---

Index: nm-advocate.wml
===
RCS file: /cvs/webwml/webwml/english/devel/join/nm-advocate.wml,v
retrieving revision 1.15
diff -r1.15 nm-advocate.wml
51c51
< he will go through all steps of the New Member checks.
---

they will go through all steps of the New Member checks.

Index: nm-checklist.wml
===
RCS file: /cvs/webwml/webwml/english/devel/join/nm-checklist.wml,v
retrieving revision 1.26
diff -r1.26 nm-checklist.wml
33c33
< what (s)he has done for Debian and a few bits about future plans.
---

what they have done for Debian and a few bits about future plans.

Index: nm-step3.wml
===
RCS file: /cvs/webwml/webwml/english/devel/join/nm-step3.wml,v
retrieving revision 1.30
diff -r1.30 nm-step3.wml
71c71
<The Applicant can put the Social Contract in his own words,
---

   The Applicant can put the Social Contract in their own words,

125c125
< his understanding is up to the Application
---

their understanding is up to the Application

Index: nm-step4.wml
===
RCS file: /cvs/webwml/webwml/english/devel/join/nm-step4.wml,v
retrieving revision 1.20
diff -r1.20 nm-step4.wml
17c17
< Applicant will need to demonstrate his skills in this area.
---

Applicant will need to demonstrate their skills in this area.

28c28
<   By maintaining a package, a prospective Developer can show his
---

  By maintaining a package, a prospective Developer can show their

30c30
<   and how he works with Debian users and bug submitters.
---

  and how they work with Debian users and bug submitters.

34c34
<   The Applicant can demonstrate his skills in this area by writing
---

  The Applicant can demonstrate their skills in this area by writing


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#863166: aufs-dkms: Please enable CONFIG_AUFS_XATTR

2017-07-24 Thread Geoffrey Thomas

On Mon, 22 May 2017, Geoffrey Thomas wrote:

Can you enable CONFIG_AUFS_XATTR in config.mk for aufs? This allows aufs to 
support file capabilities (getcap/setcap) in aufs filesystems. Support has 
existed in aufs since early 2015 but the flag is off by default.


The lack of this option is a problem for Docker users:
https://github.com/moby/moby/issues/5650
https://stackoverflow.com/questions/44117543/getcap-setcap-not-working-in-docker-container-with-debian-stretch-host

I've tested that setting `CONFIG_AUFS_XATTR = y` in config.mk, and rebuilding 
the DKMS module, causes running getcap inside Docker to start working.


If it's possible to get this enabled for Stretch (either in the release or 
via stretch-backports), that would be very helpful -- it looks like the 
config option only enables setxattr etc. to be used on aufs inodes, so the 
risk of regressions is pretty low.


Hi maintainers,

Now that the freeze is over, can we get this change in buster and 
stretch-backports? Let me know if there's something I can do to help, 
e.g., test packages with this change in.


Thanks!

--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#863295: grr: Please remove dependency on prelink

2017-05-24 Thread Geoffrey Thomas

Package: grr-server
Version: 3.1.0.2+dfsg-2
Severity: wishlist

Hi!

I'm the current maintainer of prelink in Debian. The tool is pretty 
unloved upstream -- Fedora, where I get sources from, has removed it 
entirely in Fedora 23, and the latest release tarball isn't even in the 
usual place -- so there's a decent chance that prelink will leave Debian 
at some point in the next release cycle.


It looks like grr only uses prelink to un-prelink things, and that entire 
code is conditional on whether /usr/sbin/prelink exists. If I'm reading 
this right, that means there's no need to install prelink on the machines 
of people who install grr -- no binaries on their machines will be 
prelinked, so there's no need to un-prelink anything. So prelink doesn't 
need to be a dependency: grr will do the right thing if it's installed, 
but will skip over that code if it's not.


If that's correct, can you remove prelink from your Depends: line 
(whenever you next do an upload, no urgency)? That will avoid more people 
having prelink installed than necessary, and make it easier to remove 
prelink from Debian in the future.


Thanks,
--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#648230: Packaging (and RFS) for pymssql 2.1.1+dfsg-1

2017-05-24 Thread Geoffrey Thomas

Control: severity 709210 grave

On Wed, 24 May 2017, James Andrewartha wrote:


Hi Geoffrey, Joss, DPMT

There's been no substantive uploads of this package in the past 8 years,
and we've missed the chance to get a new package into stretch. I'm
tempted to request its removal from stretch given it's seriously buggy
#709210 and unmaintened.


Hi James,

Thanks for the reminder! I've fixed up the packaging to work with the 
current upstream release 2.1.3 and uploaded it, and I've filed an unblock 
request, bug #863287, to see if the release team is willing to get it into 
Stretch. I'll also try to get it into backports, either way.


Joss, I missed your reply before 2.1.3+dfsg-1 was tagged/uploaded but I 
added myself to Uploaders, and I can remove you from Maintainers in the 
next release. (I left the job where we were using SQL Server, but I'm able 
to test against SQL Server for Linux, because apparently we live in a 
world where Microsoft hosts an apt server and builds Debian packages with 
systemd unit files.) Thanks for all your past work on the package!


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#863287: unblock: pymssql/2.1.3+dfsg-1

2017-05-24 Thread Geoffrey Thomas

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hi release team!

I'd like to get an unblock for pymssql/2.1.3+dfsg-1. This is a new 
upstream release: the current version in oldstable, stable, and testing is 
broken against the version of freetds (the underlying C library for 
talking to MS-SQL servers) in Debian. See https://bugs.debian.org/648230 
and https://bugs.debian.org/709210 .


It will be more supportable for Stretch to package the new upstream 
version: it's a rewrite using Cython, and 1.x is unmaintained now. Because 
of the above problem, I think nobody is using the current Jessie/Stretch 
package (or if they are, they're modifying it). Meanwhile, I've used this 
packaging at my previous employer to build pymssql 2.1.1 in November 2015, 
and that's been working fine in production, so the 2.x package is 
well-tested.


It's also a leaf package (its only reverse-dependencies are as Suggests of 
python-sqlalchemy, python-sqlobject, and pyrit, alongside other backends 
for free software databases like MySQL and Postgres) so there shouldn't be 
a risk of regressions despite it being late in the release cycle.


The full debdiff is at https://ldpreload.com/tmp/pymssql_2.1.3+dfsg-1.debdiff
(not attaching it because it's 700 kB and debian-python is Cc'd).
It's probably easier to browse the full changes via
https://anonscm.debian.org/cgit/python-modules/packages/pymssql.git
but here's the changelog entry:

pymssql (2.1.3+dfsg-1) unstable; urgency=medium

  * Team upload.

  [ Ondřej Nový ]
  * Fixed VCS URL (https)

  [ Geoffrey Thomas ]
  * New upstream release (Closes: #648230), with DFSG repack to avoid
embedded freetds binaries.
- Be compatible with newer versions of freetds (Closes: #709210).
- Consistently respect as_dict (Closes: #590548).
- setup.py: Don't require setuptools_git.
  * Packaging cleanups:
- Switch from CDBS to dh sequencer, and bump d/compat to 9.
- Build for both Python 2 and 3 using pybuild.
- Update Standards-Version to 3.9.8 (no changes).
- Update copyright and follow machine-readable copyright spec.
- Switch to source format 3.0 (quilt).
- Use uscan and Files-Excluded in debian/copyright to simplify the
  DFSG repack target, and drop debian/rules get-orig-source (just
  call `uscan --rename`).
  * Add myself to Uploaders.

 -- Geoffrey Thomas <geo...@ldpreload.com>  Wed, 24 May 2017 14:16:13 -0400

If you don't want to take the new upstream release, I could try applying 
the random patch on GitHub to the current 1.x package, but I'd probably 
prefer that we just remove it from Stretch (so that users use the upstream 
release or something) instead of supporting the 1.x release for the entire 
Stretch lifecycle.


unblock pymssql/2.1.3+dfsg-1

Thanks,
--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com

Bug#863166: aufs-dkms: Please enable CONFIG_AUFS_XATTR

2017-05-22 Thread Geoffrey Thomas

Package: aufs-dkms
Version: 4.9+20161219-1

Hi maintainer,

Can you enable CONFIG_AUFS_XATTR in config.mk for aufs? This allows aufs 
to support file capabilities (getcap/setcap) in aufs filesystems. Support 
has existed in aufs since early 2015 but the flag is off by default.


The lack of this option is a problem for Docker users:
https://github.com/moby/moby/issues/5650
https://stackoverflow.com/questions/44117543/getcap-setcap-not-working-in-docker-container-with-debian-stretch-host

I've tested that setting `CONFIG_AUFS_XATTR = y` in config.mk, and 
rebuilding the DKMS module, causes running getcap inside Docker to start 
working.


If it's possible to get this enabled for Stretch (either in the release or 
via stretch-backports), that would be very helpful -- it looks like the 
config option only enables setxattr etc. to be used on aufs inodes, so the 
risk of regressions is pretty low.


Thanks,
--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#827468: ipmitool: postinst unintentionally starts ipmievd.service

2016-06-16 Thread Geoffrey Thomas

Package: ipmitool
Version: 1.8.14-4

Hi maintainer,

When I install the ipmitool package on Jessie (either 1.8.14-4 from 
stable, or a local backport of 1.8.17-1 to Jessie), the ipmievd.service 
systemd unit starts up, even though the packaging implies the intention is 
that it should not start up unless explicitly enabled. I think what's 
happening is that the package writes out an /etc/default/ipmievd that's 
supposed to disable the initscript, but on a machine where init is 
systemd, `invoke-rc.d ipmievd start` runs the systemd unit, which doesn't 
look at /etc/default/ipmievd.


Since the systemd unit is not explicitly enabled, after a reboot, ipmievd 
isn't running. So this looks like unintentional behavior.


I'm not sure what the right fix for this is. `dh_installinit --no-start` 
definitely solves the problem on systems where systemd is init, but maybe 
you want to restart ipmievd for systems that have it enabled and are using 
sysvinit as init.


Thanks,
--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#818318: git security updates for wheezy-backports?

2016-03-21 Thread Geoffrey Thomas
Hi git maintainers,

I believe the version of git in wheezy-backports is affected by last
week's security issues in #818318 (CVE-2016-2315 and CVE-2016-2324),
as well as by CVE-2015-7545, since both of those were applied to the
versions in wheezy and jessie.

Are you uploading patched versions to backports? Would it be helpful
for me to prepare and test an upload to backports? (I'd need
sponsorship, since I'm not a DD and also don't have a valid PGP key
currently.)

Thanks,
-- 
Geoffrey Thomas
geo...@hudson-trading.com



Bug#818602: r-cran-glmnet: Vcs-* URLs are wrong

2016-03-19 Thread Geoffrey Thomas

Package: r-cran-glmnet
Version: 2.0-2-2
Severity: minor

Hi maintainer,

You list the following Vcs-* URLs:

Vcs-Browser: http://anonscm.debian.org/cgit/debian-science/r-cran-glmnet.git
Vcs-Git: git://anonscm.debian.org/debian-science/r-cran-glmnet.git

which don't work; they're missing a "packages" directory in the path. The 
correct ones are


Vcs-Browser: 
http://anonscm.debian.org/cgit/debian-science/packages/r-cran-glmnet.git
Vcs-Git: git://anonscm.debian.org/debian-science/packages/r-cran-glmnet.git

Thanks for packaging this software!

--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#654924: Helping with tigervnc 1.5.0

2016-01-26 Thread Geoffrey Thomas
Hi maintainers,

I'm interested in using tigervnc for its 3D acceleration support. I
built tigervnc 1.5.0 from git (4a25ccd) on jessie, with a no-change
backport of fltk1.3 1.3.3-6, and it seems to work very well out of the
box: I can run GNOME 3 with llvmpipe inside the server, and the client
also works well.

Is there anything I can do to help get this package into Debian? I see
the thread at
http://lists.alioth.debian.org/pipermail/pkg-tigervnc-devel/Week-of-Mon-20160125/thread.html
seems to be making good progress. If I can do more testing or look at
copyrights or something, just let me know what's helpful!

Thanks for your work in packaging this.

-- 
Geoffrey Thomas
geo...@hudson-trading.com



Bug#810942: ITP: premailer - Turns CSS blocks into style attributes

2016-01-13 Thread Geoffrey Thomas
Package: wnpp
Severity: wishlist
Owner: Geoffrey Thomas <geo...@hudson-trading.com>

* Package name: premailer
  Version : 2.9.7
  Upstream Author : Peter Bengtsson <m...@peterbe.com>
* URL : http://github.com/peterbe/premailer
* License : BSD-3-Clause
  Programming Lang: Python
  Description : Turns CSS blocks into style attributes

 When you send HTML emails you can't use style tags but instead you have
 to put inline style attributes on every element. premailer parses an
 HTML page, looks up style blocks and parses the CSS. It then uses the
 lxml.html parser to modify the DOM tree of the page accordingly.

I intend to team-maintain this package in DPMT.

-- 
Geoffrey Thomas
geo...@hudson-trading.com



Bug#806761: python-botocore: requests.packages.urllib3.exceptions should be urllib3.exceptions

2015-11-30 Thread Geoffrey Thomas
Package: python-botocore
Version: 1.3.9-1
Severity: wishlist

Hi maintainer,

In the "Don't use duplicated modules" patch, in
botocore/retryhandler.py,
botocore.vendored.requests.packages.urllib3.exceptions becomes
requests.packages.urllib3.exceptions. But actually it should be just
urllib3.exceptions, matching all the other imports from
botocore.vendored.requests.packages.urllib3 from that patch.

When running against python-requests from jessie (I'm trying to build
botocore and boto3 for jessie-backports), that import doesn't actually
work; see bug #771349 for a similar issue. In Stretch, python-requests
(>= 2.7.0-3) has better devendorization logic that fixes that bug. So
I've marked this wishlist since I don't actually think it affects
Stretch. But it's still inconsistent.

I suppose the same change should also be made to the diff to
tests/unit/test_awsrequest.py in the "Don't use duplicated modules (in
tests)" patch.

Thanks,
-- 
Geoffrey Thomas
geo...@hudson-trading.com



Bug#533708: Licenses on libhugetlbfs files

2015-11-25 Thread Geoffrey Thomas
Hi Mel, Eric, and Jarod,

I'm looking into uploading libhugetlbfs to Debian, and I wanted to
double-check a few files with ambiguous copyright or license notices.
I assume they're all intended to be LGPLv2.1+ like the rest of the
package but they're not labeled as such.

* huge_page_setup_helper.py is labeled just "(c) Red Hat, Inc., 2009,"
but does not have a license statement. Jarod, can this be used under
LGPLv2.1+?

* Similarly, oprofile_start.sh just says "oprofile_start.sh (c) Mel
Gorman 2008" with no license statement. Mel, is this also LGPLv2.1+?

* A few files (TLBC/*, contrib/tlbmiss_cost.sh, cpupcstat,
oprofile_map_events.pl) are "Licensed under LGPL 2.1 as packaged with
libhugetlbfs." Eric, Mel, I assume that these are intended to be
LGPLv2.1 or any higher version, like the rest of the package?

Less importantly:

* alloc.c and two tests have _just_ a license, not a copyright
statement; I guess they're owned by IBM?

* There are a few other files without copyright notices, but right now
I'm assuming they're under the LGPL (though it would be great to have
comments on them, or a clear statement in a README). It's the ones
that have a copyright statement and no license that I want to be
particularly sure of.

* For the files that say things like "Copyright (C) 2005-2006 David
Gibson & Adam Litke, IBM Corporation.", do you know if the copyright
is held by the individuals as well as IBM, or just by IBM? I can just
copy these statements verbatim into debian/copyright, but it seems
worth clarifying.

Sorry about the annoyance, but Debian cares about getting this stuff
right (and I think that's a good policy, honestly). I can send in a
follow-up patch to add comments to the files that don't have copyright
notices once I get responses; I'd also be okay with a notice in the
README that clearly asserts a license for the entire package, if you'd
prefer that.

(By the way, I seem to be unable to subscribe to the librelist, which
is maybe where I should ask this - at least I have gotten no
confirmation email from my subscribe email, and I'm not sure how to
send without first subscribing as described in SubmittingCode.)

Also if there's anything you'd like me to be aware of when preparing
the Debian package or to package in a certain way, do let me know.

Thanks,
-- 
Geoffrey Thomas
geo...@hudson-trading.com



Bug#805488: pristine-tar: Does not efficiently compress gzip --rsyncable, dpkg's default

2015-11-18 Thread Geoffrey Thomas

Package: pristine-tar
Version: 1.33
Severity: important

(This bug may be a duplicate of other ones filed against pristine-tar; I 
haven't yet investigated their cause.)


pristine-tar seems not to know how to efficiently re-compress files 
compressed by gzip --rsyncable on both Jessie and Sid (which have gzip 
1.6-4). From a Sid chroot:


$ gunzip pristine-tar_1.33.tar.gz
$ gzip --rsyncable pristine-tar_1.33.tar
$ pristine-tar gendelta pristine-tar_1.33.tar.gz tmp
warning: pristine-gz cannot reproduce build of pristine-tar_1.33.tar.gz; 
storing 80% size diff in delta
(Please consider filing a bug report so the delta size can be improved.)

No such error happens if you leave off --rsyncable.

In fact, this happens on the unmodified tarball of pristine-tar itself 
(versions 1.31, 1.32, and 1.33, but not older versions):


$ apt-get source --download-only pristine-tar
$ pristine-tar gendelta pristine-tar_1.33.tar.gz tmp
warning: pristine-gz cannot reproduce build of pristine-tar_1.33.tar.gz; 
storing 86% size diff in delta
(Please consider filing a bug report so the delta size can be improved.)

I noticed this because uscan's repack mode calls mk-origtargz, which uses 
Debhelper::Compression, which uses Dpkg::Compression, which passes 
--rsyncable by default. From /usr/lib/perl5/Dpkg/Compression.pm:


gzip => {
file_ext => 'gz',
comp_prog => [ 'gzip', '--no-name', '--rsyncable' ],
decomp_prog => [ 'gunzip' ],
default_level => 9,
},

So I bet this affects a number of packages. For instance, this is how 
pristine-tar's own native tarballs were made:


$ gunzip < pristine-tar_1.33.tar.gz | gzip -9 --no-name --rsyncable | diff -s - 
pristine-tar_1.33.tar.gz
Files - and pristine-tar_1.33.tar.gz are identical

The changelog entry for pristine-tar 1.14 (August 2011) implies that it's 
supposed to support the --rsyncable option already, but perhaps since 
then, the gzip format has changed.


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#648230: Packaging (and RFS) for pymssql 2.1.1+dfsg-1

2015-11-18 Thread Geoffrey Thomas
Hi Joss,

I've updated pymssql to 2.1.1+dfsg-1, closing #648230, #709210, and
#590548, and pushed the packaging branch to DPMT git, in a new branch
"2.1.1". We've had trouble with the freetds incompatibility; the new
package solves the issue.

There are a few packaging cleanups described in debian/changelog.
Notably the new version reworks what sourceless files they include, so
I've decided to let uscan handle it and dropped the get-orig-source
target per advice on #debian-python.

Could you look over it before I push it to master?

Also, are you interested in sponsoring this upload?

Thanks,
-- 
Geoffrey Thomas
geo...@hudson-trading.com



Bug#793491: Packaging for rocksdb?

2015-11-17 Thread Geoffrey Thomas
Control: block 803502 by -1

Hi Laszlo,

I'm working on packaging osquery, which has rocksdb as a dependency. I
see that it's in the NEW queue; do you mind posting your packaging for
it somewhere so I can build-depend on the package as it will be in
Debian? (I could also make some local packaging of it, but that seems
like wasted effort.)

Thanks,
-- 
Geoffrey Thomas
geo...@hudson-trading.com



Bug#781948: [buildd-tools-devel] Bug#781948: --extra-package doesn't work

2015-11-04 Thread Geoffrey Thomas
So I got pinged about this by someone who realized that he didn't actually 
list all the necessary build-deps in --extra-package. Piotr, I 
noticed that your log is saying "but it is not going to be 
installed" -- that is, the package exists but cannot itself be installed 
-- instead of "but it is a virtual package" -- that is, the package does 
not exist and is merely referenced by sbuild-build-depends-dummy.


In particular, it looks like python3-plainbox has an exact-equality 
dependency on plainbox-secure-policy (= ${binary:Version}) | 
plainbox-insecure-policy (= ${binary:Version}), so you'll need to pass 
your rebuild of one of those into --extra-package, too.


Wookey, are you using the functionality to run sbuild from a directory 
instead of in a dsc? I don't use that myself, so I'd believe that it 
changes directory in a way I wasn't expecting. Your patch (maybe with a 
"$!" in there) sounds like a good idea.


Sven, what's the error message you're getting?

--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#803502: ITP: osquery -- operating system instrumentation framework

2015-10-30 Thread Geoffrey Thomas

Package: wnpp
Severity: wishlist
Owner: Geoffrey Thomas <geo...@ldpreload.com>

* Package name: osquery
  Version : 1.5.3+git20151029
  Upstream Author : Facebook
* URL : https://osquery.io/
* License : BSD-3-clause
  Programming Lang: C++
  Description : operating system instrumentation framework

  osquery allows you to write SQL-based queries to explore
  operating system data. With osquery, SQL tables represent abstract
  concepts such as running processes, loaded kernel modules, open
  network connections, browser plugins, hardware events or file hashes.

--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com



Bug#782532: [buildd-tools-devel] Bug#782532: sbuild: Error creating ubuntu chroot: debfoster not found

2015-04-13 Thread Geoffrey Thomas

On Mon, 13 Apr 2015, Dima Kogan wrote:


   I: Checking component main on http://us.archive.ubuntu.com/ubuntu...
   E: Couldn't find these debs: debfoster


It's worth noting that one of the Ubuntu patches is to remove the use of 
debfoster.


If there's a clever / robust way to make sbuild detect whether the target 
distro is Debian or Ubuntu, and conditionalize debfoster on that, that 
would both fix this bug and remove one of the deltas in Ubuntu.


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#782427: strace: Please configure --with-libunwind

2015-04-11 Thread Geoffrey Thomas

Package: strace
Version: 4.10-1
Severity: wishlist

Hi maintainer,

I'd like to request that you build strace with the --with-libunwind 
compiler flag, and build-dep on libunwind8-dev. This will add the `-k` 
option to strace, which will print libunwind-based backtraces on every 
system call, which is pretty nifty.


Right now the best way to do this (I think) is to use gdb to stop on every 
syscall, which doesn't offer the syscall-decode capabilities of strace.


I don't think that Debian's strace package is used in any context where 
the libunwind runtime dependency would be annoying, though I might be 
wrong about that.


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#780871: libxdo-dev: Please wrap xdo.h in extern C guards

2015-03-20 Thread Geoffrey Thomas

Package: libxdo-dev
Version: 1:3.20130111.1-3.1

Hi maintainer,

xdo.h isn't directly usable in C++ source files because it doesn't wrap 
functions in extern C {} when __cplusplus is defined. This means that a 
call to, say, xdo_init will resolve to the name-mangled version of the 
function, but libxdo.so provides an unmangled name.


It looks like the X headers handle this with the _XFUNCPROTOBEGIN and 
_XFUNCPROTOEND headers in X11/Xfuncproto.h, which you could use. 
Alternatively, you could just conditionally wrap the header in extern C 
yourself.


Thanks,
--
Geoffrey Thomas
gtho...@moka5.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#778510: dnsutils: Please include edns-client-subnet patch to dig

2015-02-15 Thread Geoffrey Thomas

Package: dnsutils
Version: 1:9.9.5.dfsg-8
Severity: wishlist
Tags: patch
X-Debbugs-CC: lin...@debian.org

Hi maintainers,

There's a patch available to add support for the edns-client-subnet 
extension to the `dig` command. The edns-client-subnet extension lets an 
intermediate DNS server (like Google Public DNS or OpenDNS) relay the 
client's original subnet to the destination DNS server, so that DNS-based 
CDNs can geolocate the actual client, not the IP address of the 
intermediate DNS server. There's more discussion and a link to the patch 
and the Internet-Draft on this site:

  http://www.afasterinternet.com/howitworks.htm

For testing purposes it's handy to be able to issue these queries from the 
command line, so you can see what DNS results would look like if you had a 
different IP address.


The patches linked above are minimal and easy to review (it doesn't look 
unreasonable at a casual glance, but I'm completely unfamiliar with BIND 
source), and apply cleanly to the version in unstable, except for one 
#define that was equivalently added upstream. I've built it locally and 
confirmed that it works, and I've attached my debdiff if that helps.


Can you consider including this? Or if you want upstream to weigh in, do 
you mind forwarding this request upstream? It looks like BIND has no 
public bugtracker, so I don't quite understand the process of requesting 
this from upstream.



Cc'ing the patch author -- I'm curious if there was any particular reason 
you didn't submit it to Debian (or if I missed the bug where you did), or 
you just didn't think there was interest or something.


Thanks,
--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.comdiff -u bind9-9.9.5.dfsg/debian/changelog bind9-9.9.5.dfsg/debian/changelog
--- bind9-9.9.5.dfsg/debian/changelog
+++ bind9-9.9.5.dfsg/debian/changelog
@@ -1,3 +1,10 @@
+bind9 (1:9.9.5.dfsg-8+geofft1) unstable; urgency=medium
+
+  * Apply the EDNS client subnet patch from
+http://wilmer.gaa.st/edns-client-subnet/
+
+ -- Geoffrey Thomas geo...@ldpreload.com  Sat, 14 Feb 2015 17:27:30 -0500
+
 bind9 (1:9.9.5.dfsg-8) unstable; urgency=medium
 
   * Launch rndc command in the background in networking scripts to avoid a
only in patch2:
unchanged:
--- bind9-9.9.5.dfsg.orig/bin/dig/dig.c
+++ bind9-9.9.5.dfsg/bin/dig/dig.c
@@ -187,6 +187,7 @@
  +domain=### (Set default domainname)\n
  +bufsize=###(Set EDNS0 Max UDP packet size)\n
  +ndots=###  (Set NDOTS value)\n
+ +client=addr(Set edns-client-subnet option)\n
  +[no]edns[=###] (Set EDNS version) [0]\n
  +[no]search (Set whether to use searchlist)\n
  +[no]showsearch (Search with intermediate results)\n
@@ -837,8 +838,25 @@
}
break;
case 'l': /* cl */
-   FULLCHECK(cl);
-   noclass = ISC_TF(!state);
+   switch (cmd[2]) {
+   case 'i':/* client */
+   FULLCHECK(client);
+   if (value == NULL)
+   goto need_value;
+   if (state  lookup-edns == -1)
+   lookup-edns = 0;
+   if (parse_netprefix(lookup-ecs_addr,
+   lookup-ecs_len,
+   value) != ISC_R_SUCCESS)
+   fatal(Couldn't parse client);
+   break;
+   case '\0':
+   FULLCHECK(cl);
+   noclass = ISC_TF(!state);
+   break;
+   default:
+   goto invalid_option;
+   }
break;
case 'm': /* cmd */
FULLCHECK(cmd);
only in patch2:
unchanged:
--- bind9-9.9.5.dfsg.orig/bin/dig/dighost.c
+++ bind9-9.9.5.dfsg/bin/dig/dighost.c
@@ -100,6 +100,9 @@
 
 #include dig/dig.h
 
+/* parse_netprefix */
+#include netdb.h
+
 #if ! defined(NS_INADDRSZ)
 #define NS_INADDRSZ 4
 #endif
@@ -801,6 +804,8 @@
looknew-new_search = ISC_FALSE;
looknew-done_as_is = ISC_FALSE;
looknew-need_search = ISC_FALSE;
+   looknew-ecs_addr = NULL;
+   looknew-ecs_len = 0;
ISC_LINK_INIT(looknew, link);
ISC_LIST_INIT(looknew-q);
ISC_LIST_INIT(looknew-connecting);
@@ -818,6 +823,7 @@
 dig_lookup_t *
 clone_lookup(dig_lookup_t *lookold, isc_boolean_t servers) {
dig_lookup_t *looknew;
+   size_t len;
 
debug(clone_lookup());
 
@@ -878,6 +884,19 @@
looknew-need_search = lookold-need_search;
looknew-done_as_is = lookold-done_as_is

Bug#705926: [buildd-tools-devel] Bug#705926: sbuild: Add basic DEP-8 autopkgtest

2014-09-10 Thread Geoffrey Thomas

On Mon, 22 Apr 2013, James Hunt wrote:


Dear Maintainer,

The attached debdiff adds a basic DEP-8 autopkgtest for sbuild. See:

- https://code.launchpad.net/~jamesodhunt/ubuntu/raring/sbuild/dep8-procenv
-
https://code.launchpad.net/~jamesodhunt/ubuntu/raring/sbuild/dep8-procenv/+merge/159596

In Ubuntu, the attached patch was generated to achieve the following:

* ability to detect if sbuilder is able to:
 - create a chroot for the current release.
 - build a package.
* check that the resulting package is installable and the binary runnable.

Thanks for considering the patch.


Hi,

Two quick questions about this. First, it appears that the patch uses 
`apt-get source` into the current directory, and doesn't change directory. 
It looks like the draft spec (README.package-tests.rst) says that you 
can't assume that the cwd is writable, and you should instead use $ADTTMP. 
Should there be a `cd $ADTTMP` at the top of the script?


Second, should we be merging the latest autopkgtest from sbuild 
0.64.1-1ubuntu6, including static sbuild signing keys? (I have some ideas 
for how to avoid the key requirement on recent distros by using 
[trusted=yes], but won't get around to trying it immediately.)


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#760200: config-package-dev: [PATCH] package.displace-extension can now contain .extension or extension

2014-09-01 Thread Geoffrey Thomas

On Mon, 1 Sep 2014, Dima Kogan wrote:


Here's a small patch to allow package.displace-extension files to
contain the extension without the .. This was a requirement that was
not stated anywhere, and not following it produced mysterious, silent
errors


Thanks, looks good to me. I don't think any of the config-package-dev 
maintainers actually use displace-extension files, since the default 
behavior (first word of the package name) is fine for our projects, so 
feedback on this interface in general is welcome.


I'll apply this before the next upload, and I (or someone else) will do at 
least one upload before the freeze.


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#745590: msmtp: linking against OpenSSL?

2014-04-24 Thread Geoffrey Thomas

On Fri, 25 Apr 2014, Emmanuel Bouthenot wrote:


It seems that your bug could be fixed by linking msmtp against
libgnutls28:


Interesting. I did glance at the code for GnuTLS 3.x before reporting this 
and thought I saw the chain-verification code was substantially similar to 
2.x's, but yes, I can confirm that if I apt-get install libgnutls28-dev 
and ./configure, the resulting build does work for me. So that works too. 
If you're confident in GnuTLS 3.x going forward, then that solution is 
fine with me. (I still think it's odd that upstream clearly intends to 
link against OpenSSL and has no exception, but whatever.)


Hm, do you know why libgnutls-dev still points at libgnutls26? #731175 has 
no details other than a vague comment about licensing.


Thanks,
--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#745590: msmtp: linking against OpenSSL?

2014-04-22 Thread Geoffrey Thomas

Package: msmtp
Version: 1.4.31-1
Severity: wishlist

Dear maintainer,

I find myself in the situation where OpenSSL is currently compatible with 
my email provider (pobox.com) and GnuTLS isn't (because of out-of-order 
intermediate certs, which it turns out OpenSSL is tolerant to and GnuTLS 
isn't). I would be interested in an msmtp linked against OpenSSL.


It looks like msmtp is licensed under GPL with no OpenSSL exception, but 
since upstream is largely one author who clearly intended their code to 
work with OpenSSL, it seems like it's worth asking for the licensing 
exception. Has this conversation already happened? If not, I'm happy to 
post to the mailing list asking for the exception, if you're open to 
changing the Debian packaging to link against OpenSSL instead.


It looks like there is another outstanding bug against msmtp (#745174) 
that also seems like OpenSSL would resolve it. Unfortunately, GnuTLS seems 
to be kind of a rare client for commercial email providers to support or 
test against, but OpenSSL is pretty popular on all platforms. I will 
separately report a bug against GnuTLS to address my specific issue, but 
converging on OpenSSL seems like it would also address both my current 
problem and several others.


Thanks for your attention, and also thanks for maintaining the msmtp 
package -- I use it daily for both personal and work email, and it works 
so well that I generally don't have to think about it. :)


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#744027: data point

2014-04-10 Thread Geoffrey Thomas

On Thu, 10 Apr 2014, Kurt Roeckx wrote:


What we really need is OCSP stapling.  That would mean that the
server asks the CA for the OCSP response and adds that response
in the TLS session, and the client doesn't have to contact the
CA anymore to ask for the status.  Only the server would need to
contact the CA.  The server should have enough time to be able to
refresh the OCSP response, which is valid for maximum 10 days.


Yes, agreed. Unfortunately not many sites enable it. I think it'd be 
productive to have Debian-packaged SSL _servers_ all support and document 
and maybe default to OCSP stapling, so that in a few years, maybe we can 
have the start of a working revocation protocol. Sadly, there isn't one 
right now, so I don't there's anything we can do today.


This documentation seems to imply that upstream Apache HTTPD does not 
usefully support stapling when intermediate certs are in play, which is 
basically always:


https://httpd.apache.org/docs/trunk/mod/mod_ssl.html#sslusestapling


I'm hereing some vague cases why OCSP mandatory checking can't be
enabled by default because some users can't contact the OCSP
server.  I've never had this problem myself and I think I've seen
way to many weird setups already to not consider this a real
problem.


Well, you'll have the problem as soon as you're being MITM'd. A cert 
verification solution that works fine when nobody's MITMing you is not 
particularly useful. :-)


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#744027: Please remove StartCom Certification Authority root certificate

2014-04-09 Thread Geoffrey Thomas

On Wed, 9 Apr 2014, Klemens Baum wrote:


StartCom provides cheap and even free SSL certificates via the
StartSSL brand. However, certificates revoking cerificates requires a
US$ 24.90 fee [3]. This discourages responsible sysadmin procedure and
and will ensure many compromised certificates remain in use.


I don't believe that any browser or HTTPS client in Debian checks 
revocations with hard failures if the CRL or OCSP responder is 
unreachable, so I don't see how this is relevant for decisions regarding 
Debian's default trust store. The certificate will (it seems) get reissued 
for free with a new key, so the compromised certificate will not be in 
use. And an attacker in a position to MITM is also in a position to 
make the revocation useless:


https://news.ycombinator.com/item?id=7556909
https://www.imperialviolet.org/2012/02/05/crlsets.html
https://twitter.com/agl__/status/453602748601495553

Multiple commentors on the HN thread you link to imply that StartCom is 
happy to reissue certs for free, but they charge for revocations, for 
instance: The title is misleading. StartCom is asking for its fee for 
revoking, that's all. Not making revocation free of cost isn't refusal to 
reissue cert.


If they were charging for reissues, there might be an argument here, but 
even if they didn't do revocations at all, I don't see how that affects 
security under the threat model used by the Debian packages that use on 
ca-certificates.



As a consequence you can't trust certificates signed by StartCom before
2014-04-07.


This only affects certs that were used on vulnerable versions of OpenSSL 
with allocation schemes that actually loaded the private key into freed 
memory that could be returned. I haven't seen a valid claim that this is 
anywhere near a significant fraction of the web.


http://blog.erratasec.com/2014/04/why-heartbleed-doesnt-leak-private-key.html
https://twitter.com/neelmehta/status/453625474879471616

--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#744027: data point

2014-04-09 Thread Geoffrey Thomas

On Wed, 9 Apr 2014, Kurt Roeckx wrote:


However, iceweasel/firefox by default is happy to ignore a OCSP
timeout.  You need to turn it on that it doesn't allow a timeout.
I have no idea why they use that as default.


Because it's an easy DoS if an attacker is in a position to MITM the 
connection between you and the OCSP service (or CRL file), no? And if the 
attacker can MITM the connection between you and the SSL service you're 
trying to talk to, they can probably also MITM the OCSP or CRL server.


Also (as Adam Langley points out in the stuff I linked to earlier in this 
bug report) the OCSP servers risk becoming a single point of failure if 
you do that. If a CA's OCSP server is down, everything they sign becomes 
inaccessible. That would be a bad default, and probably not something you 
want to turn on for yourself either.


Also also,
  http://www.thoughtcrime.org/papers/ocsp-attack.pdf
which appears to be still valid with Firefox at least:
  https://bugzilla.mozilla.org/505812
So there's really no value at all in using OCSP, it seems.

--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#744100: python-pelican: missing dependency on pkg_resources

2014-04-09 Thread Geoffrey Thomas

Package: python-pelican
Version: 3.2.1-1

Hi maintainers,

I installed python-pelican on a VPS running Ubuntu 13.10 and got:

geofft@cactuar:~/src/website/pelican-test$ pelican
Traceback (most recent call last):
  File /usr/bin/pelican, line 5, in module
from pkg_resources import load_entry_point
ImportError: No module named pkg_resources

I assume the package needs a dependency on python-pkg-resources, or 
I guess something in debian/pydist-overrides?


(Admittedly I haven't actually tested on Jessie, but there doesn't seem to 
be a dependency there or any relevant changes.)


Thanks,
--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#428554: Can't reproduce this problem

2014-03-03 Thread Geoffrey Thomas

On Sun, 2 Mar 2014, Carsten Schoenert wrote:


what about closing this bug?
The reported Icedove version out of the official repos for quite some
times and notheing else happen to this report quite over 6 years.


Hi Carsten,

There are a number of bugs against prelink that are outdated or irrelevant 
or fixed by the much-newer version I uploaded last week. I'm planning on 
systematically going through all of them and verifying whether there is 
any validity in them, although this may not be for a few weekends. I will 
probably end up closing this bug when that happens.


--
Geoffrey Thomas
gtho...@mokafive.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#657967: ITA: prelink

2014-02-13 Thread Geoffrey Thomas

retitle 657967 ITA: prelink -- ELF prelinking utility to speed up dynamic 
linking
owner 657967 !
thanks

I intend to adopt prelink and get it updated the newest upstream version. 
I've been in touch with asheesh about sponsoring it, and I'm going to plan 
to do an upload this weekend.


--
Geoffrey Thomas
gtho...@mokafive.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#735935: grub2: LVM trouble at boot after upgrade to 2.02 beta

2014-01-18 Thread Geoffrey Thomas

Package: grub-pc
Version: 2.02~beta2-3

Hi Colin,

I have the strangest issue which I am not even entirely confident is a 
GRUB issue, but it started right after upgrading my system to GRUB 2.02 
from experimental, and without other changes, and it's even reproducible 
when running my system inside kvm off a thumbdrive, so I'm going to 
provisionally blame it on the GRUB 2.02 beta build.


I'm running a pretty standard LVM setup -- there's other stuff on this 
hard disk (like the preinstalled Windows), but one of the MS-DOS 
partitions is an LVM PV, containing a VG named leveret, containing two 
LVs named root and swap. /boot itself is located on the root LV. 
Every time I start up, since the upgrade, the initramfs fails to find my 
root hard disk via its /dev/disk/by-uuid path, and dumps me to a shell. If 
I look inside /dev/mapper, I see a node for leveret-swap but not 
leveret-root. `lvm lvs` happily lists both nodes, though, and I can get 
my system to boot if I do `lvm vgchange -an`, `lvm vgchange -ay` (at which 
point both nodes appear, as well as the by-uuid symlink), and `exit`. 
(Resume-from-hibernate even worked after doing this, right after the 
upgrade.) There's nothing particularly suspicious-sounding in dmesg at any 
point.


The machine is a Toshiba L635 laptop, a few years old, BIOS boot only, 
running a somewhat out-of-date Debian testing, amd64. I'm running 
linux-image-3.9-1-amd64 3.9.8-1 (from testing this past summer or so) and 
lvm2 2.02.95-7. I'm happy to try to upgrade these, but since I haven't 
upgraded anything else on the system for a few weeks, I figured I'd report 
this and leave the system alone in case you had more questions about the 
current setup.


Let me know if you need any more information from me or want me to try 
anything. I'm at a bit of a loss how GRUB could have caused this, but I 
don't have any other ideas what's going on.


Thanks,
--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#735021: Dpkg::Path: Please expose dpkg-query --control-show and --control-list

2014-01-11 Thread Geoffrey Thomas

Package: libdpkg-query
Version: 1.17.5
Severity: wishlist

Hi,

dpkg-query's manpage says that --control-path is deprecated in favor of 
--control-show and --control-list, but Dpkg::Path only offers a wrapper 
around --control-path. Can you expose --control-show and --control-list 
via some API in Dpkg::Path?


Thanks,
--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#367320: Patch available

2013-12-28 Thread Geoffrey Thomas

On Sat, 2 Sep 2006, Ted Percival wrote:


I have written a patch that adds timestamps to the output of prelink
through a -T command-line option. The patch is attached as
prelink-timestamp.patch and has been sent upstream.


Hi Ted,

I notice this patch isn't present in current prelink SVN. Did you get a 
response from upstream about including it, or shall I resubmit it to them?


--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#618273: gambc has been orphaned

2013-12-21 Thread Geoffrey Thomas

tags 618273 - pending
thanks

The 2011 comment about a pending upload was from the previous maintainer, 
but this package was orphaned in 2012 ( http://bugs.debian.org/677709 ) 
due to lack of activity from that maintainer. So I'm untagging it as 
pending upload, for now, so that this bug's status is clearer.


Jackson Doak is working on taking over maintenance and has a 
slightly-newer version on mentors:

http://mentors.debian.net/package/gambc

It looks like it hasn't gotten any (nontrivial) reviews. I have a bunch of 
other pending Debian work that I'd like to get to over Christmas break, 
but if I get all of that done, I'm happy to take a look -- for whatever my 
review is worth, since I'm not a DD either. I talked to Jackson on IRC 
yesterday and he said that he's having trouble getting the current 
upstream release to build. I recall having trouble with this too last time 
I saw him mention it on IRC.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#718434: ca-certificates: should CAcert.org be included?

2013-12-05 Thread Geoffrey Thomas

clone 718434 -1
reassign -1 libnss3
retitle -1 nss: Please remove CAcert.org roots
thanks

On Thu, 5 Dec 2013, Raphael Geissert wrote:


On 16 November 2013 17:09, Thijs Kinkhorst th...@debian.org wrote:
[...]

This seems like an unlikely scenario, as CAcert is not enabled by default
in Debian's most used browsers, Iceweasel (Firefox) and Chromium.


I believe it is:
http://patch-tracker.debian.org/patch/series/view/nss/2:3.14.3-1/95_add_spi+cacert_ca_certs.patch

That said, I think it is time to start discontinuing the certificate.


Aha, thanks for finding that, I was wondering if I was crazy or had 
misconfigured my system, which is why I didn't say anything. :-)


nss maintainers: Please see the history of this bug for discussion about 
whether to continue to include CAcert's root in the ca-certificates 
package. A number of folks (including myself) believe that CAcert's 
security risk is too high and its benefit too low, these days. If 
ca-certificates removes the CAcert root, nss should presumably do 
likewise. I myself also think it makes sense to remove the CAcert root 
from nss now.


For the sake of clarity, since nss adds both SPI and CAcert in the same 
patch, the present discussion is only about CAcert and there is no 
proposal to drop SPI.


(See also #309564, the bug that originally added the CAcert and SPI roots 
to the nss package.)


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#718434: Bug #718434, please leave CAcert as is

2013-12-05 Thread Geoffrey Thomas

On Thu, 5 Dec 2013, Alessandro Vesely wrote:


I find CAcert pretty useful, and it is handy to have their certificate
installed by default.  From other contributions to this bug, it seems
their auditing, policies, or disclaimer have some issues.


Their code quality also has some issues, as described in this bug report, 
which directly impacts their trustworthiness to sign only valid requests.


Can you quantify what you mean by useful and handy? If your specific 
use case involves free SSL certificates, there are multiple other 
providers of such things in the Mozilla-distributed root set, that are 
linked to by the above ticket. Server admins who currently use CAcert will 
find it more useful to switch to such a root, regardless of whether Debian 
drops CAcert, because then their site's security can be verified on other 
platforms.


If there are use cases for CAcert other than the fact that their 
certificates are free-of-charge, I'd be curious to know that, but I'm 
under the impression that that's basically the only driver these days, and 
my arguments in this thread are mostly based on that.



From a practical POV, the incidents reported by THC[0] mention
different CAs, so I'd rather remove them than CAcert.


I believe all those roots were either removed from the Mozilla set, or 
rekeyed. For what it's worth, I'd be happy to see Debian be _more_ 
conservative than Mozilla in what roots it includes, just not less.


Note that CAcert has not rekeyed after the security issue that Ansgar 
found, and it's really the response to that issue (and lack of publicity) 
more than the issue itself that makes me uncomfortable with them as a 
default trusted root. Incidentally, that issue probably would have gotten 
widespread attention if CAcert was in the Mozilla list... Debian doesn't 
have the ability to generate the same sort of public outcry for roots that 
it's locally including.


If anything, it should made clear[er] that there is no endorsement or 
assumption of responsibility in distributing ca-certificates:  Just like 
any other package, it is done on a best-effort basis.


I actually do think that's the right policy for Debian, but in the form 
that Debian should pass the trust questions off to an entity like Mozilla 
who is willing to make those endorsements (since the only other real way 
to make no endorsement clear is to make no roots trusted by default). 
That's exactly what FreeBSD did:


http://www.freshports.org/security/ca-roots/

The port is deprecated since it is not supported by the FreeBSD Security 
Officer anymore.  The reason for this is that the ca-roots port makes 
promises with regard to CA verification which the current Security Officer 
(and deputy) do not want to make.


For people who need a general root certificate list see the 
security/ca_root_ns, but note that the difference in guarantees with 
regard to which CAs are included in ca_root_ns vs. ca-roots.  The 
ca_root_ns port basically makes no guarantees other than that the 
certificates comes from the Mozilla project.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#718434: ca-certificates: should CAcert.org be included?

2013-11-13 Thread Geoffrey Thomas
I'm curious what the status of this bug is -- is there a plan to remove 
CAcert in the next upload?


As far as I can tell, the only CA certificate sources making an active 
decision to ship CAcert are Debian, Mageia, and OpenBSD. All other 
OSes/distributions that do ship CAcert by default and trust it by 
default[3] do so either because they're downstream from Debian (in the 
case of e.g. Ubuntu) or because they are using Debian's package (in the 
case of e.g. Gentoo[4] and Arch[5]). Gentoo seems to have no policy or 
rules about what's included. OpenBSD seems to have no policy, possibly 
other than reasonably sane and We should probably think carefully (see 
r1.1 in [2]).


A friend of mine once complained to me that this means that webmasters who 
use Debian (or a Debian derivative) as their personal OS will often fall 
into the trap of setting up a website using CAcert, test it on their own 
machine, and then be surprised when users not on Debian get untrusted 
certificate errors. This is a pretty strong negative effect on usable 
security, and seems like a disservice to Debian users and other users of 
this bundle. Since it seems unlikely, eight years later, that CA curators 
who don't currently include CAcert are likely to start until they pass 
their audit, and Debian's CA bundle is by far the most widely-used of the 
bundles that include CAcert, the positive value of Debian continuing to 
ship CAcert's root on the grounds of solidarity with their mission seems 
nil.


For what it's worth, I also agree with the security concerns about CAcert 
-- I'm a little surprised that, given the code quality of the file that 
Ansgar found a vulnerability in, the root wasn't immediately distrusted. 
The specific reason I looked at this bug was that I found myself replying 
to a Reddit comment advocating for CAcert's inclusion in places other than 
Debian, and having to explain that Debian is not endorsing CAcert's 
security:

http://www.reddit.com/r/technology/comments/1qj1tz/http_20_to_be_https_only/cddfmz0?context=1

Debian's continued inclusion of CAcert in the default certificate store is 
inevitably interpreted as an endorsement of their security practices, 
despite the disclaimer in the package description (see also the discussion 
in #647848).


Incidentally, GlobalSign is now offering gratis wildcard certificates for 
open source projects[6], which they define as actively maintained 
projects under an OSI-approved license. Between that and StartCom's gratis 
offering[7], in my opinion 95% of the practical use cases for keeping 
CACert in Debian are probably covered.


[1] 
http://svnweb.mageia.org/packages/cauldron/rootcerts/current/SPECS/rootcerts.spec?view=markup
[2] http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/cert.pem
[3] http://wiki.cacert.org/InclusionStatus
[4] 
http://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/app-misc/ca-certificates/ca-certificates-20130906.ebuild?view=markup
[5] https://www.archlinux.org/packages/core/any/ca-certificates/
[6] https://www.globalsign.com/ssl/ssl-open-source/
[7] http://www.startssl.com/?app=1

--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#725040: Intention to use NMU to fix the bug

2013-10-15 Thread Geoffrey Thomas

On Tue, 15 Oct 2013, Sergei Golovan wrote:


Hi!

I've bumped the severity of this bug to serious to ensure Tcl/Tk 8.4
will not go to jessie when it'll become stable.

I'm planning to use NMU to fix this bug if there's no objection for that.


Hi Sergei,

The patch you posted looks good. Please go ahead and NMU -- I don't expect 
to have time to look at this package in detail for a couple of weeks.


Is the USE_INTERP_RESULT something that ought to be fixed in the project's 
codebase? If so, it would be totally awesome if you filed a bug either 
here or on the SourceForge project with a link or something to the issue.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#722103: sbuild: Pass --no-options to gpg when creating temporary archive key

2013-09-07 Thread Geoffrey Thomas

Package: sbuild
Version: 0.64.0-1
Tags: patch

Hi maintainer,

Jeffrey Hutzelman mentioned to me that `sbuild-update --keygen` was 
creating ASCII-armored archive keys instead of a binary keyring, which 
caused the process of signing the archive to fail. After some confusion on 
my part because it totally works for me, we found that he had the armor 
option set in his ~/.gnupg/gpg.conf, and that sbuild was respecting this 
configuration file.


In order to get consistent scripted behavior out of the gpg command, you 
need to pass --no-options. See also apt-key.


Very simple patch attached; you can also pull the single commit from the 
gpg-no-options branch of https://github.com/geofft/sbuild if that's easier 
. Jeff has confirmed that it fixes his problem.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.comFrom ad6d39482db4655a619eb26bc8c078deee0d3d87 Mon Sep 17 00:00:00 2001
From: Geoffrey Thomas geo...@ldpreload.com
Date: Wed, 21 Aug 2013 22:11:49 -0700
Subject: [PATCH] Sbuild::ChrootSetup: Pass --no-options to gpg

---
 lib/Sbuild/ChrootSetup.pm | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/lib/Sbuild/ChrootSetup.pm b/lib/Sbuild/ChrootSetup.pm
index ab16e3c..649c5f3 100644
--- a/lib/Sbuild/ChrootSetup.pm
+++ b/lib/Sbuild/ChrootSetup.pm
@@ -261,7 +261,7 @@ EOF
 	return $?
 }
 
-my @command = ('gpg', '--no-default-keyring', '--batch', '--gen-key',
+my @command = ('gpg', '--no-options', '--no-default-keyring', '--batch', '--gen-key',
$tmpfilename);
 $host-run_command(
 { COMMAND = \@command,
-- 
1.8.4



Bug#700522: [PULL] sbuild --extra-package (#700522) and --extra-repository (#714883)

2013-08-16 Thread Geoffrey Thomas
OK, I think the extra-package branch of https://github.com/geofft/sbuild 
is ready to be pulled. This adds functionality to make both locally-built 
.debs and additional apt repositories available to the build-dependency 
resolution process, without having to do any additional setup or 
customization of the chroot. The functionality should be compatible with 
any apt version inside the chroot that sbuild currently works with.


Thanks to Emanuele Aina and David Kalnischkies for extensive review on 
GitHub (mostly on the older add-package branch).


---

The following changes since commit d7f31eddcec5db5f5d0419daf520f9f19b857b5e:

  debian: Remove buildd preinst and correct init script dependencies 
(2013-05-17 23:31:10 +0100)

are available in the git repository at:

  https://github.com/geofft/sbuild extra-package

for you to fetch changes up to b22397d5e73f05a2ea08b993f4952d4dbda90b49:

  changelog for branch (2013-08-16 16:13:40 -0700)


Geoffrey Thomas (4):
  Sbuild::ResolverBase: Implement update_archive using apt-get update
  Implement --extra-package=package.deb
  Implement --extra-repository=deb scheme://...
  changelog for branch

 debian/changelog   |9 +
 lib/Sbuild/Conf.pm |   12 
 lib/Sbuild/Options.pm  |8 +++-
 lib/Sbuild/ResolverBase.pm |   73 
+
 man/sbuild.1.in|   24 
 5 files changed, 89 insertions(+), 37 deletions(-)

--
Geoffrey Thomas
gtho...@mokafive.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#719655: ITP: svnstsw -- SVNServe Tunnel-mode Setuid/setgid Wrapper

2013-08-13 Thread Geoffrey Thomas

Package: wnpp
Severity: wishlist
Owner: Geoffrey Thomas gtho...@mokafive.com

* Package name: svnstsw
  Version : 1.4
  Upstream Author : Richard Hansen svns...@ir.bbn.com
* URL : http://www.ir.bbn.com/~rhansen/svnstsw/
* License : 3-clause BSD
  Programming Lang: C
  Description : SVNServe Tunnel-mode Setuid/setgid Wrapper

svnstsw is a wrapper around svnserve that sets the tunnel user equal to 
the username of the user that started the wrapper. It is intended be made 
setuid or setgid by the local administrator, to allow local users on a 
shared system to invoke svnserve without having direct access to the 
repository itself.


---

svnstsw's upstream source is in contrib/ in the Subversion repository, but 
contrib/ is not distributed as part of the Subversion release tarball. I'm 
copying the subversion packagers in case they have thoughts, want to 
co-maintain, etc.


--
Geoffrey Thomas
gtho...@mokafive.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#717381: O: open-vm-tools -- Open VMware Tools for virtual machines hosted on VMware

2013-08-09 Thread Geoffrey Thomas

Hi Nate,

I noticed that you've been doing most of the Ubuntu uploads of 
open-vm-tools recently, and are packaging a newer upstream than Debian 
anyway. So I wanted to make sure you were aware that the Debian package 
has been orphaned and is in need of a new maintainer.


Sadly I'm not a Debian developer and wouldn't have time to offer 
sponsorship anyway, but as an occasional user of open-vm-tools, I'd like 
to see the Debian package continue to get maintained.


(Sorry for the noise if you're already aware of this -- just didn't see 
anything on the bug report.)


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#589737: Unknown symbol error in grub2 : 'grub_xputs'

2013-07-28 Thread Geoffrey Thomas

Hi maintainer and others,

I ran into this when installing Debian off the netboot kernel/initrd last 
night. I haven't attempted to reproduce the issue, but I think I ended up 
with GRUB being configured on my install media instead of my root disk, or 
something.


Specifically, I plugged a USB stick into an existing Wheezy system, 
formatted it and mounted /dev/sdc1 on /mnt/sdc, ran grub-install 
--boot-directory=/mnt/sdc/boot /dev/sdc, and downloaded the netboot 
kernel and initrd from Wheezy current to it. (This all worked fine.) I 
started up the installer by booting the USB stick on my new system, and 
manually booting that kernel and initrd at the GRUB prompt.


I noticed during the installer that my USB stick was detected fairly early 
in d-i, but I needed to run the Detect disks phase to get my root disk 
(I also backed up the old disk contents via openssh-client-udeb, before 
letting d-i format or install anything, which is why I noticed). My USB 
stick was /dev/sda, and the root d/targetisk was /dev/sdb.


After installing and rebooting, I got the error mentioned in this bug when 
booting off my hard disk, whether or not my USB install stick was plugged 
in. If I plugged in my USB stick and booted from that, I got the menu I 
expected, offering to boot up the newly-installed system, and that booted 
fine. This is why I vaguely suspect some parts of GRUB got installed to my 
USB stick instead of to the hard disk.


`dpkg-reconfigure grub-pc` got GRUB installed right on my new system, so 
now it reboots fine.


If it's relevant, the old system (where I formatted the USB stick) was 
Wheezy amd64, and the new system was Wheezy i386.


I might try reproducing this in a VM, but hopefully this is enough data to 
be somewhat helpful.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#710073: [buildd-tools-devel] Bug#710073: Bug#710073: sbuild: add copy-on-write support

2013-07-05 Thread Geoffrey Thomas

On Fri, 5 Jul 2013, Roger Leigh wrote:

I would suspect that we can make it use overlayfs using the same 
infrastructure--it'll just need teaching about the new filesystem type.


Hasn't overlayfs support been in schroot since 1.5.2-1 (May 2012)? I don't 
think any more support is needed on the sbuild side. Ubuntu seems to be 
making active use of overlayfs chroots -- mk-sbuild from ubuntu-dev-tools 
0.136 (November 2011) onwards makes them, and they carry no patches to 
schroot and no relevant patches to sbuild.


All you need a kernel with overlayfs support. Ubuntu's been carrying the 
patchset out of tree for a while.


(I was pretty sure I'd _used_ overlayfs chroots, so I was surprised by the 
implication that it doesn't work yet...)



By the way, regarding cowdancer and LD_PRELOAD, I semi-recently learned 
about fakeroot-ng, which implements fakeroot using ptrace instead of 
LD_PRELOAD and is therefore more reliable. I wonder if the same approach 
could be applied to cowdancer. (I've long wanted a fakeschroot that 
doesn't require elevated privilege in order to build things)


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#714883: sbuild: Support --add-repository to add an apt source for just one build

2013-07-04 Thread Geoffrey Thomas

On Wed, 3 Jul 2013, Geoffrey Thomas wrote:


Also want to take a crack at --add-repository? :-) [...]


It would a really nice thing to do but I'm not sure I will have the time
to look into that. :(

Is there an already open bug report for apt-get mentioning our use case
or would you care to open it? They seems two different issues and it
would be unfortunate to lose track of it once this bug gets closed.


I just reported #714877 to apt, with the partial work I did. I'm also cloning 
my original bug to a separate report for --add-repository, since that's a 
separate request from --add-(extra)-package.


I got a response pretty quickly from one of the apt maintainers pointing 
out that this can be done with apt-get as presently implemented, which is 
exciting, especially because this will work on existing chroots without 
requiring an apt upgrade. So I've implemented that suggestion on my Github 
branch (rebased on top of current master), and my existing patch for 
--add-repository now works properly.


https://github.com/geofft/sbuild/tree/add-package

The trick is that you can use apt-get update with -o Dir::Etc::sourcelist 
to point to the file, -o Dir::Etc::sourceparts pointing at an empty 
directory, and -o APT::List-Cleanup=0. Since this allows cleaning up the 
existing code in update_archive(), my first commit does this:


https://github.com/geofft/sbuild/commit/557d3946e9fcbd709e003c05fcb211315dab1fab

I think it'd be good to merge that patch now, since that's pure cleanup of 
existing code.


--
Geoffrey Thomas
gtho...@mokafive.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#714980: apt: Please run dh_clean in debian/rules clean

2013-07-04 Thread Geoffrey Thomas

Package: src:apt
Version: 0.9.9
Severity: wishlist

Hi folks,

debian/rules clean doesn't run dh_clean, which means that if you do a 
build and clean in a directory and then do a source build, your source 
package ends up with the debian/$package/ tmpdirs (the results of the last 
build) inside it, as well as some debhelper temp files. This makes my 
debdiffs look silly. Running dh_clean manually fixes this, as you'd 
expect.


It also clears out autom4te.cache, which seems to have ended up in some 
tarballs (like those in Ubuntu's quantal-updates, at least, which is what 
I'm running -- the _presence_ of autom4te.cache in Ubuntu's source 
tarballs makes my debdiffs look differently silly if I run dh_clean before 
building my source tarball).


Can you call dh_clean from debian/rules clean?

Thanks,
--
Geoffrey Thomas
gtho...@mokafive.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#714877: apt: Please support an apt-get update for a single repository only

2013-07-03 Thread Geoffrey Thomas

Package: apt
Version: 0.9.9
Severity: wishlist

Hi maintainers,

It would be useful to have the ability to apt-get update a single 
repository, without touching the state of other repositories or 
downloading their package lists. Updating a single sources.list.d file 
would also suffice, and might be easier in terms of syntax.



The primary use case for this would be sbuild: currently, the apt resolver 
needs to create a new repository inside the chroot and make apt aware of 
it, but if sbuild is run without --apt-update, running `apt-get update` 
(which updates every repository) would be inappropriate. So it resorts to 
doing some black magic to write out the appropriate /var/lib/apt/lists/ 
file without actually invoking apt:


http://sources.debian.net/src/sbuild/0.64.0-1/lib/Sbuild/ResolverBase.pm#L179

Being able to run `apt-get update sbuild-build-depends-archive.list` or 
something would be much cleaner.


The reason I care about this is that I'm hoping to extend sbuild to allow 
adding a new repository at the sbuild command line to provide build 
dependencies for the current build only (see bug #700522). I'd rather not 
add code to do _more_ of the black magic, and would prefer that apt had a 
documented interface to take a new sources.list.d file into account 
without updating everything else.


There's also a use case for normal end users with lots of repositories, 
where a full `apt-get update` takes a while, and they're only looking for 
a package in a specific repository.


I tried writing a patch for this, but the most obvious approach ended up 
with apt thinking that one sources.list.d file was the _only_ one 
configured (and forgetting all other repositories). Patch is attached 
because why not; I haven't had time to look into making it work properly, 
yet, but might end up doing so eventually.


--
Geoffrey Thomas
gtho...@mokafive.comdiff -Nru apt-0.9.7.5ubuntu5.2/apt-pkg/cachefile.cc apt-0.9.7.5ubuntu5.2+gthomas1/apt-pkg/cachefile.cc
--- apt-0.9.7.5ubuntu5.2/apt-pkg/cachefile.cc	2012-11-01 02:48:40.0 -0700
+++ apt-0.9.7.5ubuntu5.2+gthomas1/apt-pkg/cachefile.cc	2013-03-04 18:22:17.0 -0800
@@ -110,6 +110,20 @@
return true;
 }
 	/*}}}*/
+// CacheFile::BuildSourceListFile - Open and build one sources.list file/*{{{*/
+// -
+/* */
+bool pkgCacheFile::BuildSourceListFile(std::string file, OpProgress *Progress)
+{
+   if (SrcList != NULL)
+  return true;
+
+   SrcList = new pkgSourceList();
+   if (SrcList-Read(file) == false)
+  return _error-Error(_(The list of sources could not be read.));
+   return true;
+}
+	/*}}}*/
 // CacheFile::BuildPolicy - Open and build all relevant preferences	/*{{{*/
 // -
 /* */
diff -Nru apt-0.9.7.5ubuntu5.2/apt-pkg/cachefile.h apt-0.9.7.5ubuntu5.2+gthomas1/apt-pkg/cachefile.h
--- apt-0.9.7.5ubuntu5.2/apt-pkg/cachefile.h	2012-11-01 02:48:40.0 -0700
+++ apt-0.9.7.5ubuntu5.2+gthomas1/apt-pkg/cachefile.h	2013-03-04 18:22:12.0 -0800
@@ -62,6 +62,7 @@
bool BuildCaches(OpProgress *Progress = NULL,bool WithLock = true);
__deprecated bool BuildCaches(OpProgress Progress,bool const WithLock = true) { return BuildCaches(Progress, WithLock); };
bool BuildSourceList(OpProgress *Progress = NULL);
+   bool BuildSourceListFile(std::string file, OpProgress *Progress = NULL);
bool BuildPolicy(OpProgress *Progress = NULL);
bool BuildDepCache(OpProgress *Progress = NULL);
bool Open(OpProgress *Progress = NULL, bool WithLock = true);
diff -Nru apt-0.9.7.5ubuntu5.2/cmdline/apt-get.cc apt-0.9.7.5ubuntu5.2+gthomas1/cmdline/apt-get.cc
--- apt-0.9.7.5ubuntu5.2/cmdline/apt-get.cc	2012-11-09 00:40:44.0 -0800
+++ apt-0.9.7.5ubuntu5.2+gthomas1/cmdline/apt-get.cc	2013-03-04 18:21:04.0 -0800
@@ -1641,14 +1641,19 @@
 /* */
 bool DoUpdate(CommandLine CmdL)
 {
-   if (CmdL.FileSize() != 1)
-  return _error-Error(_(The update command takes no arguments));
+   if (CmdL.FileSize()  2)
+  return _error-Error(_(The update command takes at most one argument));
 
CacheFile Cache;
 
// Get the source list
-   if (Cache.BuildSourceList() == false)
-  return false;
+   if (CmdL.FileSize() == 2) {
+  if (Cache.BuildSourceListFile(CmdL.FileList[1]) == false)
+ return false;
+   } else {
+  if (Cache.BuildSourceList() == false)
+ return false;
+   }
pkgSourceList *List = Cache.GetSourceList();
 
// Create the progress


Bug#714149: sbuild: Let users push additional s to the build dependencies dummy archive

2013-07-03 Thread Geoffrey Thomas

clone 700522 -1
retitle -1 sbuild: Support --add-repository to add an apt source for just one 
build
block -1 by 714877
merge 700522 714149
kthxbye

On Wed, 3 Jul 2013, Emanuele Aina wrote:


merge 700522 714149
thanks


Cc cont...@bugs.debian.org :)


I'm open to suggestions for the command line option name: you used
--add-package, I used --add-extra-package but I'd also consider
--inject-package to differentiate it more from the current --add-*
options which operate on the control file.


Yeah, I'm not picky about the name. Though, I'm a fan of shorter names, 
especially since this is something that's very likely to be primarily used 
interactively instead of by scripts/cronjobs/etc. driving sbuild.



Also want to take a crack at --add-repository? :-) [...]


It would a really nice thing to do but I'm not sure I will have the time
to look into that. :(

Is there an already open bug report for apt-get mentioning our use case
or would you care to open it? They seems two different issues and it
would be unfortunate to lose track of it once this bug gets closed.


I just reported #714877 to apt, with the partial work I did. I'm also 
cloning my original bug to a separate report for --add-repository, since 
that's a separate request from --add-(extra)-package.


--
Geoffrey Thomas
gtho...@mokafive.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#714877: apt: Please support an apt-get update for a single repository only

2013-07-03 Thread Geoffrey Thomas

On Wed, 3 Jul 2013, David Kalnischkies wrote:


Your problem is the cleanup of unused files and the solution should be:
-o APT::List-Cleanup=0

In sofar you can implement the requested feature without changing apt code:
-o APT::List-Cleanup=0
-o Dir::Etc::sourcelist=/dev/null
-o Dir::Etc::sourceparts=/directory/with/just/a/few/sources.list.d/files/;
(or the other way around with just one file; I remember writing a patch for
behaving nicely if a directory is /dev/null – not sure what version this is
in though currently, but wheezy should have it at least)

Feel free to use this for sbuild as it will work in any APT version.


Oh man, this is fantastic! Updating just a local apt repository (made with 
dpkg-scanpackages) takes a fraction of a second. I'll use this for my 
sbuild branch, and send in a patch to use this for sbuild's current 
implementation.


I'd still like an actual feature for this, so that the syntax is more 
obvious, but I guess sbuild is running this inside the chroot and won't be 
able to rely on it. If you'd prefer not to add this as a feature, I'd be 
perfectly happy with documentation to this effect.


Thanks for the tip!

--
Geoffrey Thomas
gtho...@mokafive.com

Bug#714149: sbuild: Let users push additional s to the build dependencies dummy archivearchive

2013-07-02 Thread Geoffrey Thomas

On Wed, 26 Jun 2013, Emanuele Aina wrote:


When building related set of packages most people resort to set up a local
archive to enable the newly built packages to depend on locally built
dependencies for which the needed version has not hit the main archive yet.

Since sbuild already sets up a dummy archive for build dependencies, it could
also allow users to specify a list of packages that should be pushed there.

To do so I've added an --add-extra-package option that accepts a debfile and
can be used multiple times. It already allowed me to locally build packages
which depend on stuff not yet in the archive without any additional setup.

The git repo (`add-extra-package` branch) with the patches is at
http://cgit.collabora.com/git/user/em/sbuild/log/?h=add-extra-package

I also took the chance to refactor a bit the dummy archive handling and split
it out of the ResolverBase class. Even if not strictly needed it allowed me to
have a clear idea of the involved pieces and I think that the result is a bit
easier to understand and more flexible.

Comments and suggestions welcome, I'm not very proficient in Perl. :)


Hi Emanuele,

This looks like exactly what I was going for with this much smaller 
patch, written for bug #700522:

https://github.com/geofft/sbuild/commit/3f7ecfde5e07c66ec1d7e88fac7423f94400f68b

See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700522

Want to merge these two wishlist bugs? I haven't looked in detail at your 
refactoring, but it felt like my patch was adding this in a slightly 
questionable manner, so I'd be happy for yours to get merged instead if 
it's preferable.


Also want to take a crack at --add-repository? :-) My plan there was to 
patch `apt-get update` to let you update a single repository, clean up the 
existing messy code that you refactored into force_update_archive_list() 
to use that interface, and then allow adding a sources.list.d file and 
updating that. Unfortunately the most obvious way to implement that apt 
patch ends up with apt forgetting about every other source, and I didn't 
have time to try harder.


--
Geoffrey Thomas
gtho...@mokafive.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#712552: reportbug: Please describe difference between RFA and O better

2013-06-29 Thread Geoffrey Thomas

reopen 712552
thanks

On Sun, 30 Jun 2013, Sandro Tosi wrote:


Attached is a patch that rephrases both of these descriptions to make the
difference a little more distinct. In particular, it clarifies that the

...
please first fix http://www.debian.org/devel/wnpp/ and then we'll
update reportbug too.


That page includes reportbug's output, so there's a dependency here, 
unfortunately -- I can't fix that page without including a patch to 
reportbug's output.


Is the text that I proposed acceptable to you, for me to send in a patch 
to the website? If so, then feel free to close this, and I'll reopen this 
bug once I hear back from the web team. I don't want to say something 
about reportbug that the reportbug maintainers think is untrue.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#712116: DPkg::Pre-Install-Pkgs should receive multiarch-qualified package names

2013-06-17 Thread Geoffrey Thomas

tags 712116 + patch
thanks

Dear maintainers,

On Thu, 13 Jun 2013, Anders Kaseorg wrote:


The current input format for DPkg::Pre-Install-Pkgs hooks makes it
impossible to tell which architecture of a multiarch package is being
removed.  For example, removing libbz2-1.0:amd64 and libbz2-1.0:i386
results in this input:

libbz2-1.0 1.0.6-4  - **REMOVE**
libbz2-1.0 1.0.6-4  - **REMOVE**

Can we change the format to arch-qualify the package names as
${binary:Package} does?


Attached is a patch to add a new v3 mode for input to Pre-Install-Pkgs, 
and extend SendV2Pkgs to insert the architecture immediately after the 
name of the package. I've tested this locally and this seems to work fine 
for installing and removing native-arch, arch-all, and non-native-arch 
packages. (The native arch, not all, seems to get displayed for arch-all 
packages, which seems acceptable but a little confusing.)


So now a line of output is something like
libfuse2 i386 2.9.2-4  - **REMOVE**

I suppose what we're really interested in pkg.FullName(true), since we 
don't hugely care to see the architecture if it's the native one. So for 
our use case, v3 mode calling FullName(true) instead of Name() would also 
be fine. I'm not sure if this would make any existing scripts harder to 
implement, which is why I didn't include it. I suppose adding two new 
fields for Arch and FullName(true) would be the most useful, but it seems 
somewhat excessive.


Note that this issue applies to the configure step as well as to the 
remove step.


--
Geoffrey Thomas
geo...@mit.eduFrom 924125b8eae1dbe9e057dd620c2572ef5955d779 Mon Sep 17 00:00:00 2001
From: Geoffrey Thomas geo...@ldpreload.com
Date: Mon, 17 Jun 2013 00:51:44 -0700
Subject: [PATCH] Add a v3 mode that includes the architecture for
 Pre-Install-Pkgs input.

---
 apt-pkg/deb/dpkgpm.cc |8 +---
 apt-pkg/deb/dpkgpm.h  |2 +-
 doc/apt.conf.5.xml|5 +++--
 3 files changed, 9 insertions(+), 6 deletions(-)

diff --git a/apt-pkg/deb/dpkgpm.cc b/apt-pkg/deb/dpkgpm.cc
index 3bc31dc..732c58a 100644
--- a/apt-pkg/deb/dpkgpm.cc
+++ b/apt-pkg/deb/dpkgpm.cc
@@ -242,9 +242,9 @@ bool pkgDPkgPM::Remove(PkgIterator Pkg,bool Purge)
 // -
 /* This is part of the helper script communication interface, it sends
very complete information down to the other end of the pipe.*/
-bool pkgDPkgPM::SendV2Pkgs(FILE *F)
+bool pkgDPkgPM::SendV2Pkgs(FILE *F, unsigned int Version)
 {
-   fprintf(F,VERSION 2\n);
+   fprintf(F,VERSION %u\n, Version);

/* Write out all of the configuration directives by walking the 
   configuration tree */
@@ -280,6 +280,8 @@ bool pkgDPkgPM::SendV2Pkgs(FILE *F)
   pkgDepCache::StateCache S = Cache[I-Pkg];
   
   fprintf(F,%s ,I-Pkg.Name());
+  if (Version = 3)
+	 fprintf(F,%s ,I-Pkg.Arch());
   // Current version
   if (I-Pkg-CurrentVer == 0)
 	 fprintf(F,- );
@@ -404,7 +406,7 @@ bool pkgDPkgPM::RunScriptsWithPkgs(const char *Cnf)
 	 }
   }
   else
-	 SendV2Pkgs(F);
+	 SendV2Pkgs(F, Version);
 
   fclose(F);
   
diff --git a/apt-pkg/deb/dpkgpm.h b/apt-pkg/deb/dpkgpm.h
index aab39f6..2aa0556 100644
--- a/apt-pkg/deb/dpkgpm.h
+++ b/apt-pkg/deb/dpkgpm.h
@@ -79,7 +79,7 @@ class pkgDPkgPM : public pkgPackageManager
 
// Helpers
bool RunScriptsWithPkgs(const char *Cnf);
-   bool SendV2Pkgs(FILE *F);
+   bool SendV2Pkgs(FILE *F, unsigned int Version);
void WriteHistoryTag(std::string const tag, std::string value);
 
// apport integration
diff --git a/doc/apt.conf.5.xml b/doc/apt.conf.5.xml
index be1d7ad..39f47ec 100644
--- a/doc/apt.conf.5.xml
+++ b/doc/apt.conf.5.xml
@@ -691,8 +691,9 @@ DPkg::Pre-Install-Pkgs {/usr/sbin/dpkg-preconfigure --apt;};
 
  paraVersion 2 of this protocol dumps more information, including the 
  protocol version, the APT configuration space and the packages, files
- and versions being changed. Version 2 is enabled by setting 
- literalDPkg::Tools::options::cmd::Version/literal to 2. literalcmd/literal is a
+ and versions being changed. Version 3 also adds the architecture of the
+ package to the output. These versions can be enabled by setting
+ literalDPkg::Tools::options::cmd::Version/literal to 2 or 3. literalcmd/literal is a
  command given to literalPre-Install-Pkgs/literal./para/listitem
  /varlistentry
 
-- 
1.7.10.4



Bug#712627: sbuild: Please accept 0 as a source version number

2013-06-17 Thread Geoffrey Thomas

Package: sbuild
Version: 0.64.0-1
Tags: patch

Dear maintainer,

I have a very local package whose source version is 0 because don't have 
proper version numbering yet while the software is under initial 
development (debian/rules adds a build timestamp to the binary package). 
It doesn't build with sbuild, because sbuild checks the result of 
Dpkg::Version-new for perl falseness, and 0 is false.


Attached is a super-trivial patch to check for undef instead, since that's 
what Dpkg::Version is documented as returning on error. I've tested that 
my package now builds, but setting the version in debian/changelog to 
badversion still causes sbuild to fail.


--
Geoffrey Thomas
gtho...@mokafive.comFrom ffdb2d44754dd6d5f73da5e288928f0c30facff3 Mon Sep 17 00:00:00 2001
From: Geoffrey Thomas gtho...@mokafive.com
Date: Mon, 17 Jun 2013 18:44:15 -0700
Subject: [PATCH] sbuild: 0 is a valid version number

---
 bin/sbuild |2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/bin/sbuild b/bin/sbuild
index e12bf72..6711749 100755
--- a/bin/sbuild
+++ b/bin/sbuild
@@ -194,7 +194,7 @@ sub create_source_package ($) {
 
 my $dist = $pclog-{'Distribution'};
 my $pver = Dpkg::Version-new($version, check = 1);
-if (!$pver) {
+unless (defined $pver) {
 	Sbuild::Exception::Build-throw(
 	error = Bad version $version in $dsc/debian/changelog,
 	failstage = pack-source);
-- 
1.7.10.4



Bug#712552: reportbug: Please describe difference between RFA and O better

2013-06-16 Thread Geoffrey Thomas

Package: reportbug
Version: 6.4.4
Tags: patch

Dear wonderful maintainers,

On #debian-mentors the other day, I learned that there's a consensus that 
RFA is not merely a less-urgent version of O, but that in an RFA, the 
package maintainer retains the right to decide their successor and the 
package isn't up for immediate adoption by anyone who wants. See

  http://lists.debian.org/debian-qa/2012/09/msg00055.html
for some discussion.

I think I'd gotten the impression that RFA and O were equivalent except 
for urgency from the WNPP website

  http://www.debian.org/devel/wnpp/
which, in part, quotes reportbug's output:

2 OThe package has been `Orphaned'. It needs a new maintainer as
   soon as possible.
3 RFA  This is a `Request for Adoption'. Due to lack of time,
   resources, interest or something similar, the current
   maintainer is asking for someone else to maintain this
   package. They will maintain it in the meantime, but perhaps
   not in the best possible way. In short: the package needs a
   new maintainer.

This description, especially the last sentence, doesn't make the 
distinction clear. Can the text be rephrased to clarify that RFA is about 
soliciting volunteers, and not an open call for anyone to take over the 
package like O?


Attached is a patch that rephrases both of these descriptions to make the 
difference a little more distinct. In particular, it clarifies that the 
maintainer remains with RFA but not O, adds the word prospective before 
new maintainer in the RFA description, and drops the In short 
sentence. If you have alternate phrasing that you prefer, I'd be happy 
with that too.


I'll also follow up with a patch to the website to incorporate the text 
you decide on including, and also explicitly state that the appropriate 
response to an RFA is to contact the maintainer, instead of unilaterally 
retitling to ITA as the page currently suggests. (If you're planning on 
taking my phrasing, it'd be great if you could ack my patch promptly even 
if you don't commit it immediately, so I can use that phrasing in my patch 
to update the website.)


Thanks,
--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.comFrom 1300e055aa81f394be3406cd05989127835b32b2 Mon Sep 17 00:00:00 2001
From: Geoffrey Thomas geo...@ldpreload.com
Date: Sun, 16 Jun 2013 21:40:02 -0700
Subject: [PATCH] Update wnpp text to clarify distinction between RFA and O

---
 reportbug/debbugs.py |4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/reportbug/debbugs.py b/reportbug/debbugs.py
index 257ab10..ca988fc 100644
--- a/reportbug/debbugs.py
+++ b/reportbug/debbugs.py
@@ -591,9 +591,9 @@ def handle_wnpp(package, bts, ui, fromaddr, timeout, online=True, http_proxy=Non
   'a bug in an existing package, please press Enter to '
   'exit reportbug.)', {
 'O' :
-The package has been `Orphaned'. It needs a new maintainer as soon as possible.,
+The package has been `Orphaned', and no longer has a maintainer. It needs a new maintainer as soon as possible, and anyone interested is welcome to pick up the package.,
 'RFA' :
-This is a `Request for Adoption'. Due to lack of time, resources, interest or something similar, the current maintainer is asking for someone else to maintain this package. They will maintain it in the meantime, but perhaps not in the best possible way. In short: the package needs a new maintainer.,
+This is a `Request for Adoption'. The current maintainer is looking for a prospective new maintainer to transfer maintenance to. Until then, they will continue to maintain the package, but may not have the time, resources, or interest to maintain the package as well as possible.,
 'RFH' :
 This is a `Request For Help'. The current maintainer wants to continue to maintain this package, but they needs some help to do this, because their time is limited or the package is quite big and needs several maintainers.,
 'ITP' :
-- 
1.7.10.4



Bug#685972: kernel BUG at /build/buildd-linux_3.2.41-2-amd64-Wvc92F/linux-3.2.41/drivers/pci/msi.c:3 16!

2013-05-28 Thread Geoffrey Thomas
Devon, Dix, did either of you manage to reproduce this bug without 
out-of-tree modules?


I'm seeing something that appears to be similar (it's a panic, not a bug, 
on a ThinkPad X1, but still on resume from suspend and involving e1000e 
and free_msi_irqs), when VMware Player is running. I'd like to know if 
anyone else had any luck tracking this down.


Unfortunately because my issue is a panic, I'm not able to get a ton of 
information about it.


--
Geoffrey Thomas
gtho...@mokafive.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#709682: ITP: python-github -- Python library for the full Github API v3

2013-05-24 Thread Geoffrey Thomas

Package: wnpp
Owner: Geoffrey Thomas geo...@ldpreload.com
Severity: wishlist

* Package name: python-github
  Version : 1.15.0
  Upstream Author : Vincent Jacques vinc...@vincent-jacques.net
* URL : https://github.com/jacquev6/PyGithub
* License : LGPL-3+
  Programming Lang: Python
  Description : Python library for the full Github API v3

 pygithub is a Python library to access the Github API v3 (the current
 version of the API).  With it, you can manage your Github resources
 (repositories, user profiles, organizations, etc.) from Python scripts.

The code is compatible with both Python 2 and 3, so I'll provide both 
python-github and python3-github binary packages.


This is a dependency for tratihubis, a tool to migrate Trac tickets to 
Github issues, which I also intend to package. I'm planning for both of 
these to be team-maintained by the debian-python team.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#695361: man-db: Please revert workaround for less 456

2013-05-06 Thread Geoffrey Thomas

On Mon, 6 May 2013, Colin Watson wrote:


Thanks for the patch.  I'd like to review and upload this myself, but
it's a public holiday today so I don't know whether I'll quite get to it
before your deadline.  I will definitely get to it by tomorrow, if you
can wait until then.


I'm perfectly happy to wait -- it'll take a bit to get to testing anyway.

Speaking of migrations, I'm thinking through how to avoid the same problem 
(apt threatening to remove less) in saucy. Since man-db is Ubuntu-patched, 
it won't get automatically imported, so I guess the answer is just to hold 
off on merging (slash syncing, the patch is just M-A: foreign) until after 
less gets synced into Ubuntu. The other option would be to remove the 
Breaks entirely and decide it's not that important.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#695361: less: buggy backslash handling in prompt string: \ needs to be doubled

2013-05-05 Thread Geoffrey Thomas

On Sun, 5 May 2013, Sven Joachim wrote:


On 2013-03-22 11:01 +0100, Vincent Lefevre wrote:


On 2013-03-22 22:50:40 +1300, Jan Larres wrote:

version 457 of less, released in December, reverts to the old parsing
behaviour and makes the new one available as an option instead. So it
would probably be a better idea to upgrade to that version instead.


I agree. And what's important is that compatible versions of less
and man-db are installed at the same time.


Unfortunately that's currently impossible in Jessie because the version
of man-db there declares a Breaks: less ( 456), and less cannot
transition to testing because of this bug.  So it would be good to fix
it or downgrade the severity, since not being able to install both
man-db and less sucks.


Since upstream less has reverted this behavior, it seems to me that the 
right approach is to revert man-db's workaround, mark it as breaking less 
456 only (since  456 and = 457 are then both okay), and upload the new 
less upstream release as closing this bug.


Attached is a debdiff for the change to man-db needed to implement this. 
Since you can't have a Breaks field for a range bounded on both sides, 
I've just marked it as breaking less 456-1 and 456-1ubuntu1, the only 
known packaged versions. I've tested that building this patch works the 
way that you'd expect: apt neither installs the new version of less from 
unstable, nor attempts to remove it. I've also test-built the new less 
upstream release (458; 457 is no longer available) with no other changes 
to packaging, and it works fine and `man apt.conf` displays the right 
thing.


If the other folks on this bug report think this looks sane, I'll clone 
this bug and assign it to man-db.


In addition to uploading the new man-db packaging and the new less 
upstream, man-db upstream r1443 should be reverted.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.comdiff -Nru man-db-2.6.3/debian/changelog man-db-2.6.3/debian/changelog
--- man-db-2.6.3/debian/changelog   2012-12-16 04:18:24.0 -0800
+++ man-db-2.6.3/debian/changelog   2013-05-05 16:20:30.0 -0700
@@ -1,3 +1,10 @@
+man-db (2.6.3-3geofft1) unstable; urgency=low
+
+  * The incompatible change from less 456 has been reverted, so revert
+our patch and instead Break that version of less.
+
+ -- Geoffrey Thomas geo...@ldpreload.com  Sun, 05 May 2013 16:18:17 -0700
+
 man-db (2.6.3-3) unstable; urgency=low
 
   * Support parallel builds.
diff -Nru man-db-2.6.3/debian/control man-db-2.6.3/debian/control
--- man-db-2.6.3/debian/control 2012-12-16 04:17:47.0 -0800
+++ man-db-2.6.3/debian/control 2013-05-05 17:11:58.0 -0700
@@ -13,7 +13,7 @@
 Suggests: groff, less, www-browser
 Provides: man, man-browser
 Conflicts: man, suidmanager ( 0.50)
-Breaks: less ( 456)
+Breaks: less (= 456-1), less (= 456-1ubuntu1)
 Replaces: man, nlsutils, manpages-de ( 0.5-4)
 Multi-Arch: foreign
 Description: on-line manual pager
diff -Nru man-db-2.6.3/debian/patches/less-incompatibility.patch 
man-db-2.6.3/debian/patches/less-incompatibility.patch
--- man-db-2.6.3/debian/patches/less-incompatibility.patch  2012-12-16 
04:05:23.0 -0800
+++ man-db-2.6.3/debian/patches/less-incompatibility.patch  1969-12-31 
16:00:00.0 -0800
@@ -1,52 +0,0 @@
-Description: Handle incompatible change to option string escaping in less 456
-Author: Colin Watson cjwat...@debian.org
-Origin: backport, 
http://bazaar.launchpad.net/~cjwatson/man-db/trunk/revision/1443
-Bug-Debian: http://bugs.debian.org/695459
-Forwarded: not-needed
-Last-Update: 2012-12-16
-
-Index: b/src/man.c
-===
 a/src/man.c
-+++ b/src/man.c
-@@ -814,17 +814,35 @@
-   static char *escaped_string; 
-   char *ptr;
- 
--  /* 2*strlen will always be long enough to hold the escaped string */
-+  /* 4*strlen will always be long enough to hold the escaped string */
-   ptr = escaped_string = xrealloc (escaped_string, 
--   2 * strlen (string) + 1);
--  
-+   4 * strlen (string) + 1);
-+
-   while (*string) {
-+  /* less 456 requires dollar and backslash to be escaped in
-+   * the option string; this means that we need two
-+   * backslashes to effectively escape characters special in
-+   * prompt strings, and that displaying a backslash requires
-+   * two levels of escaping.  Note that this appears to be an
-+   * incompatible change, so this will overescape for earlier
-+   * versions of less.
-+   */
-   if (*string == '?' ||
-   *string == ':' ||
-   *string == '.' ||
--  *string == '%' ||
--  *string == '\\')
-+  *string == '%') {
-+  /* Special only in prompt strings

Bug#695361: man-db: Please revert workaround for less 456

2013-05-05 Thread Geoffrey Thomas

clone 695361 -1
reassign -1 man-db
retitle -1 man-db: Please revert workaround for less 456
severity -1 serious
# Justification: 695361 is serious
block 695361 by -1
tags -1 patch
thanks

Hi Colin,

In #695459 you added a workaround for the new backslash-escaping behavior 
in less 456-1. Upstream less 457 has since reverted this behavior unless 
opted in, so I think the sanest thing to do is to remove this workaround 
entirely from man-db, declare a Breaks on just version 456, and put less 

= 457 into testing.


Attached is a debdiff for a local test build to do this -- see also my 
comment in the less bug, #695361, reproduced below. Please incorporate and 
upload this change, and also revert the upstream commit of the workaround; 
then less 457 or above can be safely uploaded to close #695361.


I note that the maintainers of both man-db and less are on the 
LowThresholdNmu list, so since this is currently blocking sane 
dist-upgrades to testing (I'm caring because I tried to upgrade my laptop 
and apt is threatening to remove less), I'm happy to NMU either or both 
these packages, if that's easier for you. I'll wait for comments until 
tomorrow evening my time, about 24h, before doing so.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com

On Mon, 6 May 2013, Vincent Lefevre wrote:


On 2013-05-05 17:55:44 -0700, Geoffrey Thomas wrote:

Since upstream less has reverted this behavior, it seems to me that the
right approach is to revert man-db's workaround, mark it as breaking less
456 only (since  456 and = 457 are then both okay), and upload the new
less upstream release as closing this bug.

Attached is a debdiff for the change to man-db needed to implement this.
Since you can't have a Breaks field for a range bounded on both sides, I've
just marked it as breaking less 456-1 and 456-1ubuntu1, the only known
packaged versions. I've tested that building this patch works the way that
you'd expect: apt neither installs the new version of less from unstable,
nor attempts to remove it. I've also test-built the new less upstream
release (458; 457 is no longer available) with no other changes to
packaging, and it works fine and `man apt.conf` displays the right thing.


I haven't tested, but I think this is the way to do.

--
Vincent Lefèvre vinc...@vinc17.net - Web: http://www.vinc17.net/
100% accessible validated (X)HTML - Blog: http://www.vinc17.net/blog/
Work: CR INRIA - computer arithmetic / AriC project (LIP, ENS-Lyon)

diff -Nru man-db-2.6.3/debian/changelog man-db-2.6.3/debian/changelog
--- man-db-2.6.3/debian/changelog   2012-12-16 04:18:24.0 -0800
+++ man-db-2.6.3/debian/changelog   2013-05-05 16:20:30.0 -0700
@@ -1,3 +1,10 @@
+man-db (2.6.3-3geofft1) unstable; urgency=low
+
+  * The incompatible change from less 456 has been reverted, so revert
+our patch and instead Break that version of less.
+
+ -- Geoffrey Thomas geo...@ldpreload.com  Sun, 05 May 2013 16:18:17 -0700
+
 man-db (2.6.3-3) unstable; urgency=low
 
   * Support parallel builds.
diff -Nru man-db-2.6.3/debian/control man-db-2.6.3/debian/control
--- man-db-2.6.3/debian/control 2012-12-16 04:17:47.0 -0800
+++ man-db-2.6.3/debian/control 2013-05-05 17:11:58.0 -0700
@@ -13,7 +13,7 @@
 Suggests: groff, less, www-browser
 Provides: man, man-browser
 Conflicts: man, suidmanager ( 0.50)
-Breaks: less ( 456)
+Breaks: less (= 456-1), less (= 456-1ubuntu1)
 Replaces: man, nlsutils, manpages-de ( 0.5-4)
 Multi-Arch: foreign
 Description: on-line manual pager
diff -Nru man-db-2.6.3/debian/patches/less-incompatibility.patch 
man-db-2.6.3/debian/patches/less-incompatibility.patch
--- man-db-2.6.3/debian/patches/less-incompatibility.patch  2012-12-16 
04:05:23.0 -0800
+++ man-db-2.6.3/debian/patches/less-incompatibility.patch  1969-12-31 
16:00:00.0 -0800
@@ -1,52 +0,0 @@
-Description: Handle incompatible change to option string escaping in less 456
-Author: Colin Watson cjwat...@debian.org
-Origin: backport, 
http://bazaar.launchpad.net/~cjwatson/man-db/trunk/revision/1443
-Bug-Debian: http://bugs.debian.org/695459
-Forwarded: not-needed
-Last-Update: 2012-12-16
-
-Index: b/src/man.c
-===
 a/src/man.c
-+++ b/src/man.c
-@@ -814,17 +814,35 @@
-   static char *escaped_string; 
-   char *ptr;
- 
--  /* 2*strlen will always be long enough to hold the escaped string */
-+  /* 4*strlen will always be long enough to hold the escaped string */
-   ptr = escaped_string = xrealloc (escaped_string, 
--   2 * strlen (string) + 1);
--  
-+   4 * strlen (string) + 1);
-+
-   while (*string) {
-+  /* less 456 requires dollar and backslash to be escaped in
-+   * the option string; this means that we need two
-+   * backslashes to effectively escape characters special

Bug#702719: debian-maintainers: Please add Geoffrey Thomas as a DM

2013-04-27 Thread Geoffrey Thomas

On Fri, 12 Apr 2013, Aníbal Monsalve Salazar wrote:


On Thu, Apr 04, 2013 at 08:41:06AM +1100, Aníbal Monsalve Salazar wrote:

package debian-maintainers
tags 702719 + moreinfo
stop

Hello Geoffrey,

The output of keycheck.sh [1] is below.

[1] http://anonscm.debian.org/viewvc/nm/trunk/nm-templates/keycheck.sh

 pub   4096R/5C413520 2011-09-06 [expires: 2014-03-07]
   Key fingerprint = 8896 E71B 57BA F57C 0CB5  481D 5C52 4526 5C41 3520
 uid  Geoffrey Thomas geo...@mit.edu
 sig! A7D86B95 2011-10-02  Karl Ramm k...@debian.org
 sig! 70096AD1 2013-03-07  Asheesh Laroia ashe...@asheesh.org
 sig! BE595F6B 2012-05-19  Alexander Chernyakhovsky acher...@mit.edu
 sig! 7D86500B 2012-05-11  Colin Watson 
cjwat...@chiark.greenend.org.uk
 sig!35C413520 2012-05-08  Geoffrey Thomas geo...@mit.edu
 sig!35C413520 2013-03-07  Geoffrey Thomas geo...@mit.edu
 sig!35C413520 2011-09-06  Geoffrey Thomas geo...@mit.edu
 uid  Geoffrey Thomas geo...@ldpreload.com
 sig! A7D86B95 2011-10-02  Karl Ramm k...@debian.org
 sig! 70096AD1 2013-03-07  Asheesh Laroia ashe...@asheesh.org
 sig! BE595F6B 2012-05-19  Alexander Chernyakhovsky acher...@mit.edu
 sig! D53FDCB1 2012-05-10  Andrew Starr-Bochicchio a.star...@gmail.com
 sig! 7D86500B 2012-05-11  Colin Watson 
cjwat...@chiark.greenend.org.uk
 sig!35C413520 2012-05-08  Geoffrey Thomas geo...@mit.edu
 sig!35C413520 2013-03-07  Geoffrey Thomas geo...@mit.edu
 sig!35C413520 2011-09-06  Geoffrey Thomas geo...@mit.edu
 sub   4096R/1CF674CB 2011-09-06 [expires: 2013-05-08]
 sig! 5C413520 2012-05-08  Geoffrey Thomas geo...@mit.edu
 .
 Key is OpenPGP version 4 or greater.
 Key has 4096 bits.
 Valid e flag, but it expires Wed 08 May 2013 17:14:51 UTC.
 This is too soon!
 Please ask the applicant to extend the lifetime of their OpenPGP key.
 Valid s flag, expires Fri 07 Mar 2014 04:02:15 UTC.

Please extend the lifetime of your OpenPGP key.

Please upload it to a keyserver and remove the moreinfo tag of #702719.

Cheers, Aníbal


ping


Just did this (sorry, was travelling a bunch and my PGP key lives on a 
desktop at home). I've bumped the expiration for the encryption subkey to 
a year from now, and uploaded it to the standard keyservers (pgp.mit.edu, 
at least, has it). Is that sufficient, or do you want a jetring 
changeset thing too?


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com

Bug#702719: debian-maintainers: Please add Geoffrey Thomas as a DM

2013-03-10 Thread Geoffrey Thomas

Package: debian-maintainers
Severity: normal

Hi DM and keyring teams,

Please add me to the DM keyring. I've attached a jetring changeset with 
my key (5C5245265C413520).


Thanks,
--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.comComment: Add Geoffrey Thomas geo...@ldpreload.com as a Debian Maintainer
Date: Sun, 10 Mar 2013 10:07:57 -0700
Action: import
Recommended-By:
 Luke Faraone lfara...@debian.org, Asheesh Laroia paulprot...@debian.org
Agreement:
 http://lists.debian.org/debian-newmaint/2013/03/msg00011.html
Advocates:
 http://lists.debian.org/debian-newmaint/2013/03/msg00012.html
 http://lists.debian.org/debian-newmaint/2013/03/msg00013.html
Data: 
  -BEGIN PGP PUBLIC KEY BLOCK-
  Version: GnuPG v1.4.12 (GNU/Linux)
  
  mQINBE5lljEBEAC3IscYabtThjMtDFhu6j2rlhvckoixIdNpq/hqciERYCUqoJNP
  ipsAVoMVZDgL9rC+jMNFHWfIlPMoTSmArKYxOTp03OOsebcUlP4mwnyCPHPPOZCO
  ZH+5eoCdZptX/cA6p9nPDGfzrRbi3ff70dEkd4Xt/xQ6YJrJWFMJbjlpa0pAdCB+
  TU3gPqOkLv36NLNEATZM4roPXTn2pTxHpQyCzpb1FDihqaFrhchxvTP01O7ba+I2
  3oSfa65LFFqOl9ffJsnwmUlyTFXaChw0HBLs6ShAKGrlHL4rUg9vID6VwLjkpqAv
  nCgOn9vOTPkGZraHp2RlxlEkXuS1kxYgvWjyBKWnFZPW27N71EtjVJVveUG8xtqt
  cXaDOeOepetLct+NCg46rnmu1zaVLLJQyfPGaa5VkKqc525JKSUdnV+35VMtRUUC
  ZXnQ231boy8ERG9Yacqdjnf2FKBT993Je6uA8rUyMLhVwxNRoY1OOOMaBOiJ3xYx
  P+kh47WIXwTTbTY9UcKv5CBkskxptDscZsggpn5w38H0G5BuR9jTdrRD6UjqJnTz
  lz/KWunvXU69dUW4h3uVN0XB8lk/3cWOdGVwGbUonAsfj86gMIvtUtLd+210Kk4x
  KL4Ra1tB//gYnodxgA55ZG2+JrhuXg2aR8LHbBE6phuJ1XFWq3sw+lEzgQARAQAB
  tCBHZW9mZnJleSBUaG9tYXMgPGdlb2ZmdEBtaXQuZWR1PohGBBARAgAGBQJOiNPb
  AAoJELHKkuin2GuVrHQAnj6tpYfkeypLO31ixmSmgyhAUASbAJ9DcYvjcz+43F87
  Xnp/UZjlvKtJDokCHAQQAQIABgUCTojUWQAKCRDmNxb04GmUniWXEACfU5TRw8dt
  oC+7CiizkBfAdnLikNqNS/nKaPG1YUg9gnibpxdRVqODlEbys2zH48yW5sz7nGNQ
  ILFTYopDsE9O2sW7Pnf2ppF/wp+ib49CMB9I0DZ9y0jaDJ95dmfVJqN8cdwQbECA
  nqE3HWcSsctlz2nuPzWMLPts4iq6c49b/TxiFAf1QIq930/yYFEsB3OGK1hCELDX
  HLbvKC9uvNadzU3+6lsTiRG8Jo4O+4DVV9OG42Hqt5NnaMWBznHJVYDyHGOB4177
  /Po4zr7LIro4iiAU//ZWXGlyK6XnfVcBvUkOiAo0W0YtXZoQPttQGxp/QkLJbdhi
  Jlv47y35TBF20n0sZJqpkjBiAvrCAbMuW+N9f9bmeURxdjHQZtu3XdJrGSXp//mV
  w+ZrYxd48uuAUZnCx5P44mW4e4d3Rovy0Lw6sdY4Nv6I1GjPD03PWdaZ37n9vxEm
  vFSF97mU28UseDSuy5dUXdCBHIU+f0FnhrHMGYGYz2aCMWUBey7tqpRyqGUwRNjN
  +6l4bnw+2xH7wnpdVDpMQ5xdm6XMWOE/GK4zTeyVlUYQxsyEmvYyzyACQj3yIzhL
  oGhQHicf/JRel57smIfC7inhLmp08m8WNE1RkZMkpQdk7/KdJsJFiZ3u00RCUxCo
  648FxiW9PFyxsKNeWPCZcdGxqUpVtj/clYkCHAQQAQoABgUCTmWngwAKCRCYY8w5
  F0FpIAt1EACw1syk6hD3Ag5Lmnp54E4jxonMZEn3h48i3yfW+0DYRTDgyv8rK9S9
  TLiCMVUDpcvCUd98SRSr+MVDQw+KieTHlPlaGQJznvA6VekrlSzBw3Hxy7dCBxry
  57PEEKU0ry5RyyYP+XcmbNjR5sbXSAm4UG+H2KP5kkJutB04gsrPd58p5xcxfbuH
  0KvJJktREhfQoMXJ1t2Fr+dqZ8wh6p3XuCojk+diKayPrDZuqNnmC4NxvGlcCVt+
  l/Gh+J2aJk3bJf0cSIwjmq+4T4HvvabnnkQbSur7prVbK1sZ5hJEOU8c52CxAW8l
  xMX0zEMhgMXxvIhM0i7tiqbreNest0ceA3Q91tHK9copg650GBgdoGobl4TnNtgj
  KhC/1gLLREwLHHt9SVHkeimxCA7kzpfFlMeRVZj2u7igbEgxcYN6WJ0PgIUyPNp+
  5Lt46gAK1LgWiP9a74bLp8KhvMF7WdMj4SnmXF4/0fP1MJsdl6QqfAOYXEbaPFEF
  SSVrGU9oEibJaAf1QVAd7ytsooIuFGAbRDu6mQMH8epURuNTxnFiDPWlP/X6AImr
  MqQw2TftpVIeMwPm1RDLmJfEDhsKNgDDw6D/ogkW0YeKVQlZC8V6HwU1JMLPkpMs
  I2ZGOPHnAtfAqxpAE9T44FST9MMouWnsgwNyi8jP8w/VSSWggKVJyokCPgQTAQIA
  KAIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AFAk+pUsQFCQMk8BAACgkQXFJF
  JlxBNSCI6g//cOAQNxzlm0Edfwe3bNwerkgYap7S3A/ZOrhzHOc5Fb6CldK3HdsX
  +Xd/ZkznUIPVpTF5xF2KEW6dpCOpLOB/JNur6BqVSWX9upqFJiXcFraqzJ2yv9dc
  K1ASmQFHueV9MzpVh6A2ZV7UxxKPKfMRNLG68Uwv78Oh5Eozn16QSlsd44VDFt1f
  A3KXhBn9q/NAEerz7rINdrrsHi0U5SgaOdrQ+piWg4nqscas6ex/KGwLp96S5Wjb
  +unFEJisD/xc3QFcsRIfJDqBvbuIdJIN5sufiMTpLhO8yiJscvwl+V0a8Fx+FcEC
  zDwAWC33HA6wkEjALHZ33qbeQFMgWtSoQgf9BDWrhqXgjaqAhgdo6M72jVwjeeEe
  LeR8nHbBYP22fFVfrGpShc8oxgJyezWmQtK6trr4zywP1ZPTz6554kW57ETi5Ok7
  p1BzzeO73C+hy6gOHGZxQvvT4bQUnSwbfTsAot2YbOW8gqdXZM/xjO7UBt3QHsrX
  S2eXQsy79avWY5WcjsUvyS+foN7nmCTCWdfjC4JxiWTHUdtotqrRjEFK9hEnmaVA
  6psHSOqwiU3Q52RMhA84UHtn5P5AowusccF8L+P0FWj1H2j3Ert4op6ucZLR+0TR
  pfbawG8QV9BdxGmxSNWzV43VbTE6zHuWdFLSu9x1fWilFzdwK6asUamJAj4EEwEC
  ACgFAk5lnB0CGwMFCQCeNAAGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEFxS
  RSZcQTUgLLIP/iCHEKwUjY3xOhAXN2VSnD1GlfqTZWRGWaD/GRJtdEu1ZfCY7G3G
  Hd2BW7uvxvz27IlUa4ZkcI+HviAsz8jamdSQglhE4nHG/FgMrvttRzn9SXwRbZpc
  KE0jIvjJsIYqTyYV1K4p6utVln1ze+rWlY3hjPQPFWWw5XxsntzBQeNNhp/j4ccU
  m0ftm03AOskU5sfDBxKxRTH1/ZGiijv1vLL64I9bCB6Q8ywfEqXCJteFwK7NxylO
  6wJXlWGJLH/aPFoIaF/fMcFmIDMRnI7FPKRdJJbnD6A4EfWIv1OO0b8f+hugZz/2
  vcBUhcfIPZ8y1C5ivQQ3uLWZEDAk2I8domlZup6jokx4u118rU4HM8+aMXkTb6b7
  HaTZQmHTLd5/SjW+irydsEhzRkeyMLw3HmEKP3Fx/KhE6QoHL5+7GNfkNj4I+K8h
  IHNT8LVcQijMoAhVaHd7cldRxTx7StsuDlKKNm3EDodn6K+G6klzjrF3S+tPAPeQ
  u1GmbwZN9ZW6C6GOqwqtAY0KXH3H90IcuLkiiaghcajg5zLx26+JBYG6BziFSCnu
  MnjLFnLGtPKiaYeboiv8uqdwRw+kkcDgzCDF/Na5y3BwjssS//mdDMxYLAa9oryd
  C9cxzgmyZo1lAWK/+ekCgKn2qmNkD4ROipiMpe3Z/fzhBDSHXsS+DbDCiQIcBBAB
  AgAGBQJPuBH2AAoJELvHVt2+WV9rk+YP/jJWjh7ukIzUX2F191kzgPJscUlNB642
  10OU6nmNmkOsCULYCYROLv3AheoEgvvyxZq7zagds6r74GudSxYlrk4xCzaU5hB/
  MW0tznkFsJyIm8sceLRLLpNgTDiP6wrNLXDskOlinzcNx/I2SikK2xG2WZX9UYRk
  kv1f+p8T

Bug#700522: sbuild: Support for locally-built build dependencies

2013-02-13 Thread Geoffrey Thomas

Package: sbuild
Version: 0.63.2-1
Severity: wishlist
Tags: patch

Hi maintainers,

When I'm backporting packages locally with the help of sbuild, it's often 
the case that I need to backport a build-dependency too. Let's say that 
package foo version 2.0 depends on libbar1 (= 2.0~). If I backport 
libbar1, I need to make it available to the build of foo.


One way to do this is to configure my local schroot to have e.g. ~/apt 
configured as a repository. This might work okay on a personal machine, 
provided I remember to be conscientious about cleaning out ~/apt between 
builds and pass --apt-update, but I'm running into a situation at work 
where I'm using the same build machine for two different products (one of 
which should not be built with a backported libbar1), and cleaning out a 
local apt repository would be painful and also enforce unnecessary 
serialization on builds.


One way to do this would be to have multiple schroots for building the two 
products, only one of which has the local apt repo. This seems like a 
waste of space.


Attached is a patch that provides the --add-package option to sbuild, 
which makes a .deb from the host system available to apt in the build 
chroot for use when resolving build dependencies. Concretely, this means I 
can do something like


sbuild -d stable libbar1_2.0-1.dsc
sbuild -d stable --add-package=libbar1_2.0-1_amd64.deb foo_2.0-1.dsc

with non-hacked-up schroots, and have things work the way I expect.

The implementation of this patch simply copies the .deb into the directory 
for the local archive (for build-dependency resolution). This makes it a 
very small patch, and works out fine because it specifically is needed for 
build-dependency resolution. I'm not positive this is the right approach, 
though, and would be willing to write a longer patch.


Another feature along related lines would be --add-repository, e.g.

sbuild -d stable --add-repository=file:/home/geofft/apt ./ foo_2.0-1.dsc
or
sbuild -d stable --add-repository=http://local-archive/apt stable myrepo 
foo_2.0-1.dsc

I have a naive implementation of this, which doesn't actually work because 
`apt-get update` is not run after the local archive is created (which the 
manpage mentions). One approach would be to instead implement this 
somewhere before --apt-update executes, and have this imply --apt-update. 
Another would be to add functionality to apt to update only a single repo, 
which the manpage mentions would be useful (and I think I'd like that 
functionality for its own sake, anyway). Do you have thoughts on which 
approach would be better?


Both patches are available on my github add-package branch, although 
this is more intended for feedback than merge:

https://github.com/geofft/sbuild/commits/add-package

Thanks,
--
Geoffrey Thomas
gtho...@mokafive.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#607228: [buildd-tools-devel] Bug#607228: no way to run setup command inside a chroot

2013-02-13 Thread Geoffrey Thomas

On Mon, 3 Jan 2011, Roger Leigh wrote:


On Wed, Dec 15, 2010 at 04:36:46PM -0500, Sam Hartman wrote:

When --setup-hook was implemented in terms of --chroot-setup-commands,
the user it is run as changed.  Previously it was run as root; now it is
run as the build user.

That's problematic because there no longer seems to be a way a to run
commands as root in the chroot.


Yes, this looks like a regression, and we'll fix that so this continues
to work for you.  We might need to have setup commands that run as
root, and some as non-root.  I'll discuss it with Andres Mejia, who
wrote these features.


Has there been progress on this? Note that Ubuntu is carrying a patch to 
make --chroot-setup-commands run as root, which seems to be suboptimal for 
lots of reasons (e.g., I run Debian on my laptop and Ubuntu on some work 
machines, and generally expect sbuild to work fine on both provided the 
chroots are clean).



My use case is as follows.  I'm building a related set of packages that
inter-depend on each other under the control of a buildbot.  The build
slave (which runs sbuild) doesn't have the permissions necessary to
install into any apt archive.  So, I want to modify the chroot to have
an additional apt source.  The location of that source will depend on
which build slave it is, and so I'm running a setup hook to do this.


You might like to look at the most recent sbuild in unstable (or git).
We create a local apt archive during the build (when using the apt or
aptitude build-dep resolvers) and set this up and use it.  These are
ephemeral (they only last for the duration of the build), but the
logic to do the archive setup could be reused to do what you want.
We only use it to serve a couple of packages, but it might be useful
for your uses as well.


Oh hey. Sam, this is exactly what I implemented in #700522. Want to try my 
git branch and see if that works for your use case?


--
Geoffrey Thomas
gtho...@mokafive.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#672711: sbuild: --append-to-version should set source:Version substvar

2013-02-12 Thread Geoffrey Thomas

tags 672711 + patch
tags 681292 + patch
thanks

On Thu, 12 Jul 2012, Raphael Hertzog wrote:


If you tag the changelog entry with binary-only=yes then
dpkg-gencontrol will use the former changelog entry to find
out the version to put in ${source:Version}.

ftplib (3.1-1-9+b1) unstable; urgency=low, binary-only=yes

You should update --append-to-version to use this mechanism too.


Hi sbuild maintainers,

I was checking on the Debian bugs I opened to see what their status was, 
and didn't see progress on this, so I wanted to check to see if we were 
waiting on anything from dpkg, or could fix this now in sbuild. The 
conversation in #681292 seemd to indicate that you were okay with this 
approach.


The debian-672711 branch of https://github.com/geofft/sbuild.git has the 
following patch and a changelog entry:


--- a/lib/Sbuild/Build.pm
+++ b/lib/Sbuild/Build.pm
@@ -1324,7 +1324,7 @@ sub build {
}
$dists = $self-get_conf('DISTRIBUTION');

-   print F $name ($NMUversion) $dists; urgency=low\n\n;
+   print F $name ($NMUversion) $dists; urgency=low, 
binary-only=yes\n\n;
if ($self-get_conf('APPEND_TO_VERSION')) {
print F   * Append , $self-get_conf('APPEND_TO_VERSION'),
 to version number; no source changes\n;


Can you merge it?

Thanks,
--
Geoffrey Thomas
geo...@mit.edu


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#697430: fakeroot: Please separate preloaded libraries with colons

2013-01-05 Thread Geoffrey Thomas

Package: fakeroot
Version: 1.18.4-2

Hi fakeroot developers,

If @LDPRELOADVAR@ is already set, scripts/fakeroot.in separates LIBS with 
a space. This works fine for LD_PRELOAD on GNU/Linux, but not for 
DYLD_INSERT_LIBRARIES on Mac OS X, which must be colon-separated. So if 
you already have a library in DYLD_INSERT_LIBRARIES, this breaks usage of 
fakeroot:


dyld: could not load inserted library: 
/Users/gthomas/src/debian/b/lib/libfakeroot.dylib /tmp/d.dylib

/Users/gthomas/src/debian/b/bin/fakeroot: line 181: 75294 Trace/BPT trap: 
5   FAKEROOTKEY=$FAKEROOTKEY DYLD_INSERT_LIBRARIES=$LIB $@


Fortunately, glibc permits separating LD_PRELOAD with either a space or a 
colon (see the comment near line 1658 or so in elf/rtld.c, and the 
changelog entry of 1998-02-01). So I propose that you make 
scripts/fakeroot.in line 168 use a colon, which will fix the bug on OS X 
and continue to work fine on GNU platforms. (Because glibc tokenizes at 
_both_ spaces and colons, there is no problem if the existing LD_PRELOAD 
variable includes multiple preloads separated by spaces.)


I don't know if fakeroot supports any platforms that require 
@LDPRELOADVAR@ to be space-separated and not colon-separated, which would 
make my suggested fix not work.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#693672: config-package-dev: please support using debhelper dh instead of cdbs

2012-11-19 Thread Geoffrey Thomas

Hi Paul (and others reading this bug report),

If you're interested in looking at my branch, check out 
git://geofft.mit.edu/config-package-dev.git. Documentation is sparse 
(which is mostly why I haven't opened a Debian bug requesting it be 
merged), but if you have time to look at it, I'm definitely interested in 
code review and knowing if it fits folks' use cases and fits the syntax 
you'd expect. The examples directory in the source has Debhelper variants 
of all the CDBS examples, so that's probably the most obvious place to 
figure out what using the Debhelper version looks like.


I also have a vague intention of making this something suitable to be 
shipped in Debhelper itself; see the request for dh_divert in bug #41462.



Here are the notes I sent to the debathena mailing list when asking for 
review:


- You can generally use a Debhelper 7-style short rules file. You just 
need to use dh --with config-package instead of dh. (You can also 
invoke dh_configpackage by hand, with an old-style Debhelper rules file, 
but why would you do that.)


- What you would put in DEB_DIVERT_FILES goes in debian/foo.divert, etc.

- The syntax for debian/foo.transform is that each line contains a 
filename, followed by a command to transform it. This can either be some 
actual filter, e.g. etc/foo.conf.debathena sed -i 
's/foo.com/foo.mit.edu/', or a longer script in the packaging, e.g. 
etc/foo.conf.debathena debian/transform_foo.conf.debathena. The latter 
is helpful for porting CDBS packaging, or just transformations that would 
be more than one line.


- DEB_DIVERT_EXTENSION is now debian/foo.divert-extension. If you leave it 
off, it defaults to the first word of the package name. (I believe this 
happens to be correct for every single one of our current users, SIPB or 
otherwise.)


Before actual release, I intend to add more documentation to the 
dh_configpackage command, the ability to invoke it with arguments (just 
like you can call e.g. dh_install either with no arguments to parse 
debian/*.install, or with arguments to install that specific file), and 
more upstreamable names for the divert and remove operations. I'll 
start a separate thread about that.


[... Hm, I still haven't started that thread. I should go do that.]

--
Geoffrey Thomas
geo...@mit.edu

On Mon, 19 Nov 2012, Tim Abbott wrote:


Geoffrey Thomas actually has a branch adding support for doing it via debhelper 
-- Anders and I have unfortunately been slow about
reviewing it.  I'll see if I can find the time to get it out.

-Tim Abbott


On Mon, Nov 19, 2012 at 1:31 AM, Paul Wise p...@debian.org wrote:
  Package: config-package-dev
  Version: 4.13
  Severity: wishlist

  I personally prefer using debhelper's dh system instead of cdbs. It
  would be great if config-package-dev could support configuration
  packages built using debhelper's dh system and drop the cdbs dep.

  -- System Information:
  Debian Release: wheezy/sid
    APT prefers testing
    APT policy: (700, 'testing'), (600, 'unstable'), (550, 'experimental')
  Architecture: amd64 (x86_64)

  Kernel: Linux 3.6-trunk-amd64 (SMP w/4 CPU cores)
  Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
  Shell: /bin/sh linked to /bin/dash

  Versions of packages config-package-dev depends on:
  ii  cdbs  0.4.115+deb7u1

  --
  bye,
  pabs

  http://wiki.debian.org/PaulWise




--
    -Tim Abbott




Bug#693672: config-package-dev: please support using debhelper dh instead of cdbs

2012-11-19 Thread Geoffrey Thomas

On Tue, 20 Nov 2012, Paul Wise wrote:


It would be great to merge this branch, for now I've gone for a
workaround calling the cdbs Makefile before dh_installdeb.

The dh_divert stuff kinda ties into the declarative diversions stuff:

http://wiki.debian.org/SummerOfCode2011/DeclarativeDiversions

The diversions stuff in config-package-dev seems like a workaround for
dpkg being buggy with conffiles:

http://bugs.debian.org/363524
http://bugs.debian.org/49


Yup, DeclarativeDiversions seems like the right long-term answer, but dpkg 
doesn't currently support it (as far as I know?), and a bunch of 
config-package-dev users want support on old Debian/Ubuntu versions, so it 
won't be obsolete even when dpkg gets that support. It seems likely that 
we should have config-package-dev end up using declarative diversion 
support when that lands, but I don't think anyone's thought about 
designing that transition.


And yes, most of why config-package-dev diverts files in favor of a 
symlink to a new file, instead of to the new file itself, is to be more 
robust to dpkg.


--
Geoffrey Thomas
geo...@mit.edu


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#688713: timidity-daemon: mishandles conffiles

2012-10-11 Thread Geoffrey Thomas

On Thu, 11 Oct 2012, Sébastien Villemot wrote:


I have uploaded to DELAYED/2 a NMU of timidity versioned 2.13.2-40.1
which fixes that bug. The debdiff is attached. Don't hesitate to tell me
if I should delay the upload longer.


Thanks, but would you mind delaying until early next week? There are a 
couple of wrong patches in the current source package (see #649274), and I 
was hoping to ask for a single freeze exception to deal with that issue 
too and a couple of Ubuntu ones. I know I've been remiss about doing an 
upload, but if it's already past time that an NMU is reasonable, I will 
make a point of attempting to deal with it this weekend -- and if I don't, 
feel free to let the NMU proceed.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com

Bug#689070: Please take upstream D-Bus patches for CVE-2012-3524

2012-09-28 Thread Geoffrey Thomas

Package: dbus
Severity: serious
Justification: local privilege escalation
Tags: security

Hi,

CVE-2012-3524 is about setuid binaries linking libdbus being easily 
trickable to do bad things via a malicious PATH (for finding dbus-launch), 
or through a DBUS_* address variable using the unixexec address type. 
Initially the D-Bus developers thought that this should be fixed on the 
application side (hence the comment in the security-tracker), but decided 
that it would be better to have a defense-in-depth approach, and change 
_dbus_getenv to not succeed if the current program is setuid or similar, 
since that's faster than patching every relevant program.


There's a patch in the D-Bus 1.6.6 release that implements this. Many 
other distros, including RHEL/Fedora, SUSE, and Ubuntu have taken this 
patch already. There are some other hardening things in the 1.6.6 release 
that broke gnome-keyring, prompting a 1.6.8 release a few hours later to 
revert those; you should either take 1.6.8, or just backport the four 
patches that weren't reverted in 1.6.8:


http://cgit.freedesktop.org/dbus/dbus/commit/?id=23fe78ceefb6cefcd58a49c77d1154b68478c8d2
http://cgit.freedesktop.org/dbus/dbus/commit/?id=4b351918b9f70eaedbdb3ab39208bc1f131efae0
http://cgit.freedesktop.org/dbus/dbus/commit/?id=57ae3670508bbf4ec57049de47c9cae727a64802
http://cgit.freedesktop.org/dbus/dbus/commit/?id=f68dbdc3e6f895012ce33939fb524accf31bcca5

I think these are all easily backportable, but I'm happy to supply a 
debdiff if that'd make it easier for you.


More discussion of the issue can be found at

https://bugs.freedesktop.org/show_bug.cgi?id=52202
https://bugzilla.novell.com/show_bug.cgi?id=697105
https://bugzilla.redhat.com/show_bug.cgi?id=847402
http://seclists.org/oss-sec/2012/q3/29

--
Geoffrey Thomas
gtho...@mokafive.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#687582: alpine: deadlock in signal handler

2012-09-13 Thread Geoffrey Thomas

Package: alpine
Version: 2.02-3

Noting this here, although it's an upstream bug and I'll submit it 
upstream soon. After disconnecting my machine from the network and leaving 
alpine open, it hung with the prompt Waited 919 seconds for server reply. 
Break connection to server? and the message [MAIL FOLDER INBOX CLOSED 
DUE TO ACCESS ERROR]. gdb gives the following backtrace:


(gdb) bt
#0  __lll_lock_wait_private () at 
../nptl/sysdeps/unix/sysv/linux/x86_64/lowlevellock.S:97
#1  0x7f196507c30f in _L_lock_12013 () from /lib/x86_64-linux-gnu/libc.so.6
#2  0x7f196507a3d8 in __libc_free (mem=0x7f196538d1c0) at malloc.c:3736
#3  0x7f196509c67d in tzset_internal (always=value optimized out, 
explicit=value optimized out) at tzset.c:435
#4  0x7f196509c9eb in __tz_convert (timer=0x7fffa8af59b8, use_localtime=1, 
tp=0x7f1965390f00) at tzset.c:624
#5  0x7f196509aad9 in ctime (t=value optimized out) at ctime.c:32
#6  0x005ca3cc in debug_time (include_date=value optimized out, 
include_subseconds=value optimized out) at debugtime.c:63
#7  0x0054fda3 in add_review_message (message=value optimized out, 
level=5) at help.c:362
#8  0x005d0612 in output_debug_msg (dlevel=5, fmt=0x66921c 
end_signals(%d)\n) at debuging.c:323
#9  0x004ca2fb in end_signals (blockem=1) at signal.c:145
#10 0x004ca491 in auger_in_signal (sig=11) at signal.c:184
#11 signal handler called
#12 0x7f196507565d in malloc_consolidate (av=0x7f196538d1c0) at 
malloc.c:5169
#13 0x7f1965076f72 in _int_malloc (av=0x7f196538d1c0, bytes=1296) at 
malloc.c:4373
#14 0x7f1965079e1e in __libc_malloc (bytes=1296) at malloc.c:3660
#15 0x005d9528 in fs_get (size=value optimized out) at fs_unix.c:38
#16 0x00482bcf in update_index (state=0x1483040, screen=0x7fffa8af6340) 
at mailindx.c:1220
#17 0x004834d1 in index_lister (state=0x1483040, cntxt=0x14c7480, 
folder=0x1483129 INBOX, stream=0x14ff860, msgmap=0x1521420) at  mailindx.c:452
#18 0x0042c095 in main (argc=1, argv=0x7fffa8af8e78) at   alpine.c:1331

According to signal(7), ctime is not safe to be called from a signal 
handler (nor, more generally, are malloc or free). Probably debug messages 
from signal handler context should not attempt to display the time, or 
should use some built-in time implementation that doesn't malloc or care 
about timezones, or something.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#649274: Forming a new upstream for timidity (and reporting various issues with current deb pkg)

2012-06-10 Thread Geoffrey Thomas
, and am currently reading 
up on the Soundfont spec so I can make sense of the bug / your patch. :-)


I haven't yet looked at the remainder of your patches, but will do so now.


That rounds up the wrong (or so I believe) fixes in the Debian pkg.
As said I hope to do a new upstream release soon, amongst a lot of bugfixes
this will also include IPV6 support for the relevant bits of timidity.


Thanks, and thanks for identifying these issues. I see there's been a bit 
of activity a week or two ago in upstream (and upstream looks to have most 
the patches originally submitted with this bug report), so I'll see if I 
can just make a new orig tarball based on upstream git and drop our 
patches entirely.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#414264: alpine: 'Folder vulnerable' warning about /var/spool/mail

2012-06-09 Thread Geoffrey Thomas
I failed to notice this bug before filing http://pad.lv/992145 (since I 
wasn't sure the bug existed in Debian). I've linked that bug to this one.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#631758: (no subject)

2012-06-09 Thread Geoffrey Thomas

tags 631758 + patch
thanks

The patch at
https://github.com/geofft/alpine/commit/01674610679e4af4a6c6d890659573133609cec5.patch
rips out all the phone_home code, since there's no current party that's 
interested in usage counts.


I think I've failed to forward it to upstream correctly, though (I sent it 
as a git format-patch instead of attaching it to the SourceForge patch 
tracker). Asheesh, please poke me if I haven't fixed that by tomorrow.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#672711: sbuild: --append-to-version should set source:Version substvar

2012-05-12 Thread Geoffrey Thomas

Package: sbuild
Version: 0.62.6-1

Hi Roger,

As you saw on #debian-devel about a week ago, Paul Wise noticed (as a 
result of running the debian-derivatives analysis scripts on Debathena, 
which uses --append-to-version for all builds) that builds with 
--append-to-version do not correctly report the original/source package 
version number in the Source: field of the binary control file and binary 
.changes file. Namely, the field is expected to contain something of the 
form package (1.0), not just package, if the resulting binary package 
is not version 1.0. This works fine for sbuild's --binNMU option -- the 
binary package will be version e.g. 1.0+b1, but contain a Source: field of 
package (1.0).


On tracking this down a little further (and noticing that 
--append-to-version=+b2 did not exhibit this bug), I found that when 
dpkg-source generates substvars (in Dpkg::Substvar), it uses the following 
logic:


sub set_version_substvars {
my ($self, $version) = @_;

$self-{'vars'}{'binary:Version'} = $version;
$self-{'vars'}{'source:Version'} = $version;
$self-{'vars'}{'source:Version'} =~ s/\+b[0-9]+$//;
[...]
}

So the source:Version field is only correct when the binary version 
happens to end with a +bNNN (or when it is the same as the source version, 
of course). So sbuild did not need to specifically do anything about 
source:Version when --binNMU was the only option that changed the binary 
version from the source version, but this assumption is no longer true 
with --append-to-version.


I'm not sure what the right way to fix this is. Possibly sbuild itself 
should edit debian/substvars to change the source:Version field. I can't 
get --dpkg-source-opt=-Vsource:Version=1.0 to work, although maybe 
dpkg-source getting run before Hack binNMU version is relevant. Possibly 
dpkg-source gaining an option to be explicitly told the source package 
version is the most-right answer here, but would require changes in both 
sbuild and dpkg-dev.


--
Geoffrey Thomas
geo...@mit.edu



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#671085: vim: Please add Vala syntax highlighting

2012-05-01 Thread Geoffrey Thomas

Package: vim
Version: 2:7.3.429-2
Priority: wishlist

Hi maintainer,

Could you please add support for Vala (*.vala, *.vapi) syntax highlighting 
to the vim package?


There's a syntax script and instructions on how to add it to your .vimrc 
here:

  http://live.gnome.org/Vala/Vim
There are also comments in vala.vim itself about wanting to add some 
things to the global vimrc. The instructions also add parsing of valac 
errors, but I personally care less about those.


I suspect they're waiting for a 1.0 release of Vala before adding it 
upstream (as implied by the vala.vim comments), but given that there's an 
increasing amount of code in Vala, it would be good to have some form of 
syntax highlighting now.


If you'd like me to, I'm happy to give you a debdiff or something to 
implement this.


Thanks,
--
Geoffrey Thomas
gtho...@mokafive.com



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#670855: cyrus-sasl2-*-dbg doesn't correspond to cyrus-sasl2-*

2012-04-29 Thread Geoffrey Thomas

Source: cyrus-sasl2
Version: 2.1.25.dfsg1-4
Priority: wishlist

Hi,

It looks like cyrus-sasl2-{mit,heimdal}-dbg are the debug symbols for 
libsasl2-modules-gssapi-{mit,heimdal}, not cyrus-sasl2-{mit,heimdal} as 
their name would imply (in fact those packages got removed a while ago). 
This confuses me. Is there a reason not to rename them to 
libsasl2-modules-gssapi-{mit,heimdal}-dbg?


Thanks,
--
Geoffrey Thomas
geo...@mit.edu



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#663327: timidity: timidity does not update system wide mailcup database to play .midi files...

2012-03-12 Thread Geoffrey Thomas

On Sat, 10 Mar 2012, Oleksandr Gavenko wrote:


To fix this issue maintainer must create:

 $ cat /usr/lib/mime/packages/timidity
 audio/midi; timidity %s; description=MIDI file

and use update-mime(8) utility in postinstall script as say man page...


Thanks. I'll test this out on my system and roll it into the next version 
of the package if it works. I should probably get a chance to work on a 
release either this weekend or the next.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#663580: timidity: shouldn't daemonize when the parent process terminates

2012-03-12 Thread Geoffrey Thomas

On Mon, 12 Mar 2012, Gilles Filippini wrote:


Hi,

Timidity has some known problems working with pulseaudio [0], and one of 
the recommanded workarounds [1] is to launch it from the user session 
instead of running it as a system service. The problem is that - even if 
timidity wasn't launched as a daemon - it doesn't termminate itself at 
the end of the user session. Instead it daemonizes itself and stands 
running. This simply shouldn't happen when launched without the 'D' 
flag.


thanks,

_g.

[0] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=563252
[1] https://bugs.launchpad.net/ubuntu/+source/timidity/+bug/210472/comments/16


Interesting, and thank you for pointing me to that Ubuntu bug.

There's some suspicious behavior regarding SIGHUP in the ALSA module, 
which runs independent of the -D flag:


/* reset all when SIGHUP is received */
static RETSIGTYPE sig_reset(int sig)
{
if (alsactx.active) {
stop_sequencer(alsactx);
server_reset();
}
signal(SIGHUP, sig_reset);
}

and later
signal(SIGHUP, sig_reset);

I'm not sure what the intention is there, but it sounds plausible this 
should be daemon-only behavior. I'll try to take a closer look at it soon.


There's also a protocol of some sort to detect when a user session is 
exiting (I believe using X or D-Bus); we should probably implement that if 
X or D-Bus is available, which would make the use case you describe 
smoother.


--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#661565: ITP: nyancat -- Terminal-based Pop Tart Cat animation

2012-02-28 Thread Geoffrey Thomas

I certainly don't plan on uploading and abandoning this package, but
given the high level of opposition to this ITP, guess there is little
point pursuing it.

Jon


I'm not a DD, so I don't know how much my opinion counts, but I would have 
liked to see this in the archive. At the very least, I use sl as a 
standard demo package when I run packaging tutorials and such; nyancat 
would have been a somewhat easier-to-explain example. It'd be good to have 
this conveniently available when my school's student computing group runs 
an advertisement booth with a VT-100 attached to a modern computer running 
Debian. It would also be fun to integrate as a console-mode screensaver 
along the lines of cmatrix, which you mentioned.


If you end up deciding you really don't want to upload this, please leave 
this open as an RFP.


Thanks,
--
Geoffrey Thomas
http://ldpreload.com
geo...@ldpreload.com



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#655735: lvm2: Please backport Remove udev dependency to stable

2012-01-13 Thread Geoffrey Thomas

Package: lvm2
Version: 2.02.66-5

Hi,

We have a local package that build-depends on lvm2. Since the build chroot 
does not have udev installed, we're running into the issue noted in bug 
#543163 that the package does not depend on udev but the initscript does. 
This causes the udev postinst to fail, and installation of bulild deps to 
fail.


This has been fixed in 2.02.84-3, but that isn't present in stable.

We're working around this by manually depending on udev, so it isn't 
super high priority, but it would be appreciated if you could backport 
that fix to squeeze.


Thanks,
--
Geoffrey Thomas
geo...@mit.edu



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#655193: libkrb53: transitional package bumped from extra to standard

2012-01-08 Thread Geoffrey Thomas

Package: libkrb53
Version: 1.8.3+dfsg-4squeeze5
Severity: minor

Hi Sam,

I was searching for Priority: Standard packages that weren't installed on 
my machine, and noticed that libkrb53 1.8.3+dfsg-4squeeze2 is priority 
extra and 1.8.3+dfsg-4squeeze5 is priority standard. Presumably this was a 
typo or something in a recent upload, since the 4squeeze5 version is still 
a transitional package labeled may be removed if unneeded.


Feel free to close this bug if you don't think it's worth worrying about.

--
Geoffrey Thomas
geo...@mit.edu



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



  1   2   >