Re: Mandatory LC_ALL=C.UTF-8 during package building

2024-06-07 Thread Gioele Barabucci

On 07/06/24 14:32, Guillem Jover wrote:

Related to this, dpkg-buildpackage 1.20.0 gained a --sanitize-env,
which for now on Debian and derivatives sets LC_COLLATE=C.UTF-8 and
umask=0022.


That's great news!


But _iff_ we end up with dpkg-buildpackage being declared the only
supported entry point, [...]
Personally, I really appreciate how dpkg-buildpackage more and more 
provides a standardized API to/for building Debian packages.


However I would prefer to have this API explicitly described in Policy 
rather than hidden and implicitly defined by the code of a specific program.


What I propose is a new section in Policy [1] that explicitly lists all 
these environment requirements (umask, LC_*, SOURCE_DATE_EPOCH, TMPDIR, 
/bin/sh = POSIX shell + -n, etc). Each builder would then be changed to 
be conformant by default, with the option to steer away if desired (for 
example `dpkg-buildpackage --with-env-var LC_ALL=fr_FR.UTF-8`). This 
would create an uniform environment while preserving the ability to run 
d/rules with user-specific settings.


[1] Or any other similarly "binding" document.

Regards,

--
Gioele Barabucci



Mandatory LC_ALL=C.UTF-8 during package building

2024-06-06 Thread Gioele Barabucci

Hi,

setting LC_ALL=C.UTF-8 in d/rules is a common way to fix many 
reproducibility problems. It is also, in general, a more sane way to 
build packages, in comparison to using whatever locale settings happen 
to be set during a build. However, sprinkling a variant of `export 
LC_ALL=C.UTF-8` in every d/rules is error-prone and a waste of 
maintainers' time.


Would it be possible to set in stone that packages are supposed to 
always be built in an environment where LC_ALL=C.UTF-8, or, in other 
words, that builders must set LC_ALL=C.UTF-8?


In which document should this rule be stated? Policy?

Regards,

--
Gioele Barabucci



Re: finally end single-person maintainership

2024-04-12 Thread Gioele Barabucci

On 12/04/24 15:00, Marc Haber wrote:

On Fri, 12 Apr 2024 09:26:10 +, Mike Gabriel
 wrote:

Also regarding gbp, my packaging workflow does not require it
(debian/-folder-only in Git). Being enforced to use some other pkg'ing
style would reduce my fun and end up with less productivity, I fear.
The gbp workflow has its pros, but for me it is a too complex overhead
without much gain to the end result (the uploaded package).


The debian/-only layout was quite common in the svn days and back then
we had adequate tooling to support that but those tools have rotted
away, it feels unnatural to me, and, frankly, exim's debian/-only
layout (that I introduced myself fifteen^wtwenty years ago) is the
main reason why I am a mostly inactive member on the exim team since I
still don't know any more how to properly build the package.


This is not an endorsement of debian/-only repos, but building 
debian/-only packages using gbp is not hard:


$ git clone https://salsa.debian.org/exim-team/exim4.git
$ cd exim4
$ cat < debian/gbp.conf
[DEFAULT]
export-dir = ../
overlay = True
debian_branch = master
EOF
$ origtargz
$ gbp buildpackage --git-ignore-new --git-no-create-orig

(This is more a praise of gbp rather than a defense of debian/-only repos.)

--
Gioele Barabucci



Re: finally end single-person maintainership

2024-04-09 Thread Gioele Barabucci

On 09/04/24 18:52, Wookey wrote:

So why mandate salsa rather than make dgit more official?


Independently from whether salsa should be mandated, "git", "salsa" and 
"dgit" are three different things and should not be used as replacement 
of one another.


Asking maintainers "to use git" means: please push your changes, even 
those unreleased to a public git repository (salsa, github, codeberg, 
your own domain...), so other people can contribute 1) knowing that they 
are working against the same sources the maintainer has on their hard 
drive, and 2) using git-based workflows.


dgit is both a Web interface to browse git repositories as wells as a 
system to access the Debian archive as if it were a git repository, so 
you can "dgit push" a branch and have the resulting binary uploaded to 
the archive. (Yes, I'm simplifying here, but that's the gist.)


Salsa is a forge, i.e. a combination of a Web interface, a git server, 
and a set of integrated features. In comparison to dgit, salsa has, like 
most forges:


* Merge requests: where people can suggest changes and discuss them with 
line-based comments (accessible via email, no need to use the Web interface)


* Continuous integration pipelines: as soon as you push a commit, 
Salsa-CI will try to build a package, cross build it, test it against 
piuparts, lintian a bunch of other QA tools (kudos to the Salsa-CI 
developers).


* Integrations with two dozen tools (irc, jenkins, mattermost, bugzilla, 
but funnily enough not BTS).


* Project specific wikis, snippets, Docker images.

* And with tag2upload salsa fulfills 50% of dgit functionality.

Regards,

--
Gioele Barabucci



Re: About Package Maintenance

2024-04-09 Thread Gioele Barabucci

On 09/04/24 08:52, Simon Richter wrote:

Otoh, I am fully aware of the "you can't force a volunteer to do
things", knowing that I myself would be the first one to violently
oppose a decision that I don't like while - at the same time - being
mad at some core package maintainers who have forced the project to jump
through even more burning hoops to finally get the usrmerge migration


The project has always had, and continues to have the two options 
"submit a patch" and "replace the maintainer." We have processes for that.


No one, especially not the people driving the usrmerge migration, wants 
to do that, because that would require taking on a long-term commitment 
and the responsibility that comes with it, when they would prefer to do 
a drive-by contribution.


Hence we are having a debate again whether there should be a mechanism 
to force maintainers to accept any patch thrown at them by someone 
"authorized" to perform a global change. No result can be reached from 
this debate, because there is no difference between force-accepting a 
contribution and replacing a maintainer.


Between forcing maintainers to accept drive-by patches as-is and 
replacing them, there is also the option of asking maintainers to 
respond to patches in a "timely"* fashion instead of letting them rot in 
the BTS or forcing the requester to do an NMU.


"A timely response" could be two weeks for packages in 
(build-)essential, one month for top-10% popcon packages, three months 
for all other packages. Tagging as "wontfix" would also be an OK 
response, at least the project will have a clear and explicit view of 
what is blocking distro-wide changes.


Regards,

--
Gioele Barabucci



Re: finally end single-person maintainership

2024-04-07 Thread Gioele Barabucci

On 07/04/24 23:11, Bill Allombert wrote:

What is your opinion about pushing logtool to Salsa?


Not speaking for logtool obviously, but maintaining simple packages on salsa is
just useless bureaucracy.


As a contributor, having a package on salsa is extremely useful, far 
from "useless".


By clicking on "fork" (or running the equivalent CLI command) I get a 
copy of the package, with all its history, a Debian-specific CI, the 
ability to work on different features or bug fixes at the same time and 
independently from one another, the possibility to send a merge request, 
that can be annotate line-by-line by all other Debian contributors.


A package with a repo on salsa is sending a clean message: go away, I 
don't want your contribution.



Most of the actual packager work is not reflected in the source
package. Testing that the package integrates well with the rest of
Debian,


That time is better invested writing autopkgtests and letting Salsa-CI 
and debci run the tests. Having autopkgtests also lowers the barrier to 
contribute because the contributors can now be more confident of the 
fact that their changes did not cause any issue.



replying to bug reports,


Not affected by having a repo on salsa.


communicating with upstream etc.


Upstream that in 99% of the cases uses a git repo.


I maintain a number of packages. Some are on Salsa, some are not, some are team
maintained, some are not, some use dh, some use debhelper etc.
This is a matter of efficiency, one size does not fit all.


The lack of a standardized sanctioned workflow is the main reason 
(together with unresponsive maintainers) why big cross-distro changes 
are nigh impossible to carry out. I would not classify it as a big 
advantage.


Regards,

--
Gioele Barabucci



Re: Validating tarballs against git repositories

2024-04-01 Thread Gioele Barabucci

On 31/03/24 08:59, Sven Joachim wrote:

The coreutils bootstrap script fetches files over the network, so it is
not possible to build the Debian package from upstream git tags.  At the
very least it would lack any translations, and there is also the
problem of the gnulib submodule.

Aren't these the same kinds of problem that affect go and rust packages?

--
Gioele Barabucci



Re: Validating tarballs against git repositories

2024-03-31 Thread Gioele Barabucci

On 30/03/24 20:43, Iustin Pop wrote:

On 2024-03-30 11:47:56, Luca Boccassi wrote:

On Sat, 30 Mar 2024 at 09:57, Iustin Pop  wrote:

Give me good Salsa support for autopkgtest + lintian + piuparts, and
easy support (so that I just have to toggle one checkbox), and I'm
happy. Or even better, integrate all that testing with Salsa (I don't
know if it has "CI tests must pass before merging"), and block tagging
on the tagged version having been successfully tested.


This is all already implemented by Salsa CI? You just need to include
the yml and enable the CI in the settings


I will be the first to admit I'm not up to date on latest Salsa news,
but see, what you mention  - "include the yml" - is exactly what I don't
want.


Salsa CI is enabled by default for all projects in the debian/ namespace 
<https://salsa.debian.org/debian/>.


Adding a yml file or changing the CI settings to reference the Salsa CI 
pipeline is needed only for projects in team- or maintainer-specific 
repositories, or when the dev wants to enable additional tests (or 
configure/block the default tests).


Regard,

--
Gioele Barabucci



Git and SHA1 collisions (Was: Re: Validating tarballs against git repositories)

2024-03-30 Thread Gioele Barabucci

On 30/03/24 23:09, Simon Josefsson wrote:

Russ Allbery  writes:

Simon Josefsson  writes:

Sean Whitton  writes:



We did some analysis on the SHA1 vulnerabilities and determined that
they did not meaningfully affect dgit & tag2upload's design.



Can you share that analysis?  As far as I understand, it is possible for
a malicious actor to create a git repository with the same commit id as
HEAD, with different historic commits and tree content.  I thought a
signed tag is merely a signed reference to a particular commit id.  If
that commit id is a SHA1 reference, that opens up for ambiguity given
recent (well, 2019) results on SHA1.  Of course, I may be wrong in any
of the chain, so would appreciate explanation of how this doesn't work.


I believe you're talking about two different things.  I think Sean is
talking about preimage resistance, which assumes that the known-good
repository is trusted, and I believe Simon is talking about manufactured
collisions where the attacker controls both the good and the bad
repository.


Right.  I think the latter describes the xz scenario: someone could have
pushed a maliciously crafted commit with a SHA1 collision commit id, so
there are two different git repositories with that commit id, and a
signed git tag on that commit id authenticates both trees, opening up
for uncertainty about what was intended to be used.  Unless I'm missing
some detail of how git signed tag verification works that would catch
this.


Git contains a couple of countermeasures meant to greatly reduce the 
practical feasibility of such manipulations.


The first is the fact that it uses a hardened SHA-1 function that 
produces different hashes when it is fed one of the known collision 
seeds ("disturbance vectors"). This hardened version of SHA-1 is only 
resistant against known attacks, but it substantially raises the bar 
from "use one of these files downloaded from the Web" to "set up your 
own collision generator that will work only once for this specific 
attack and once discovered will no longer work".


From https://lwn.net/Articles/716093/


Git can be configured with the USE_SHA1DC build time configuration
variable to use SHA-1 implementation from shattered.io that detects
attempted collisions

From https://shattered.io/


Is Hardened SHA-1 vulnerable? No, SHA-1 hardened with
counter-cryptanalysis (see ‘how do I detect the attack’) will detect
cryptanalytic collision attacks.


The second countermeasure is the fact that if two objects (e.g., 
commits) happen to have the same hash, then Git will use the one it has 
seen first. In the common case in which the original author has pushed a 
commit and the attacker subsequently pushed a malicious version of that 
commit with the same hash, then all people that fetch that repository 
will always see (as in, write to disk during a checkout) the original 
version, not the malicious version. The malicious version will still be 
in the git pack, but git will ignore it.


From https://marc.info/?l=git=115678778717621=2

Nope. If it has the same SHA1, it means that when we receive the 
object from the other end, we will _not_ overwrite the object we 
already have. […] if we ever see a collision, the "earlier" object

in any particular repository will always end up overriding


With these countermeasures in places, in order to successfully pull a 
collusion attack, the attacker must:


1. Create an unseen collision seed.
2. Have access to the server that hosts the official repo to remove 
traces of the original commit.

3. Hope that nobody pulled the repo before they tampered it.
4. Hope that nobody will notice a series of random characters being 
shown during operations like git log -p.


Sure, SHA1 is broken, should be avoided and not relied upon. And many 
people can easily see how to work around the countermeasures put in 
place by SHA1.


But pulling a successful collision attack is not a trivial task. For 
instance, the xz attacker did not have all that was required to carry it 
out (for example they had no direct access to the git servers... yet).


Regards,

--
Gioele Barabucci



Re: Validating tarballs against git repositories

2024-03-30 Thread Gioele Barabucci

On 30/03/24 14:08, Jonathan Carter wrote:

On 2024/03/30 12:43, Sean Whitton wrote:

On 2024-03-30 08:02:04, Gioele Barabucci wrote:

Now it is time to take a step forward:

1. new upstream release;
2. the DD/DM merges the upstream release VCS into the Debian VCS;
3. the buildd is notified of the new release;
4. the buildd creates and uploads the non-reviewed-in-practice blobs 
"source

deb" and "binary deb" to unstable.

This change would have three advantages:

I think everyone fully agrees this is a good thing, no need to list the
advantages.

 >

It is also already fully implemented as tag2upload, and is merely as yet
undeployed, for social reasons.


My understanding is that DSA aren't quite comfortable with it, since it 
would need to archive GPG signing key (or a keypair trusted by DAK)?


Don't the buildd already work like in similar way?

The source deb is signed by the DD, the buildd checks the signature of 
the source deb, then builds and signs the binary debs.


In the future the tag is signed by the DD, the buildd checks the 
signature of the tag, then builds and signs the source deb and the 
binary debs.


--
Gioele Barabucci



Re: Validating tarballs against git repositories

2024-03-30 Thread Gioele Barabucci

On 30/03/24 13:38, Jonathan Carter wrote:

On 2024/03/30 11:05, Simon Josefsson wrote:
1. Move towards allowing, and then favoring, git-tags over source 
tarballs

 >

Some people have suggested this before -- and I have considered adopting
that approach myself, but one thing that is often overlooked is that
building from git usually increase the Build-Depends quite a lot
compared to building from tarball


How in the world do you jump to that conclusion?


Usually it's due to thing like precompiled documentation: 
{man,info}pages, HTML pages.


To generate these files you usually need texinfo, groff, pandoc, sphinx, 
etc. All big packages with plenty of runtime and build-time dependencies.


But as I said, for cases like arch rebootstraps,  can remove the 
need to bootstrap a long (and often circular) chain of dependencies.


Regards,

--
Gioele Barabucci



Re: Validating tarballs against git repositories

2024-03-30 Thread Gioele Barabucci

On 30/03/24 10:05, Simon Josefsson wrote:

Antonio Russo  writes:


1. Move towards allowing, and then favoring, git-tags over source tarballs


Some people have suggested this before -- and I have considered adopting
that approach myself, but one thing that is often overlooked is that
building from git usually increase the Build-Depends quite a lot
compared to building from tarball, and that will more likely trigger
cyclic dependencies.  People that do bootstrapping for new platforms or
cross-platform dislike such added dependency.


Most of the time such added dependencies could be worked around with 
build profiles and cross building. More widespread support for , 
 and Multi-Arch annotations can greatly reduce the number of 
deps needed to bootstrap an architecture.


Just as an example, bootstrapping coreutils currently requires 
bootstrapping at least 68 other packages, including libx11-6 [1]. If 
coreutils supported  [2], the transitive closure of its 
Build-Depends would be reduced to 20 packages, most of which in 
build-essential.


[1] 
https://buildd.debian.org/status/fetch.php?pkg=coreutils=amd64=9.4-3.1=1710441056=1

[2] https://bugs.debian.org/1057136

Regards,

--
Gioele Barabucci



Re: Validating tarballs against git repositories

2024-03-30 Thread Gioele Barabucci

On 30/03/24 01:21, Antonio Russo wrote:

3. Have tooling that automatically checks the sanitized sources against
the development RCSs.


git-buildpackage and pristine-tar can be used for that.


4. Look unfavorably on upstreams without RCS.


And look unfavorably on Debian packages without VCS. And, in addition:

5. Require something like tag2upload to create new releases of Debian 
packages.


For too many core packages there is an opaque "something happens on the 
Debian maintainer laptop" step that has no place in 2024. We have no 
idea how many Debian DDs/DMs machiens have been compromised because of 
this attack. (Hopefully zero.) Any future upload of source debs may, in 
principle, contain malicious code.


The workflow for Debian packages has already gone from:

1. new upstream release;
2. something happens on the DD/DM machine;
3. the DD/DM uploads two non-reviewed-in-practice blobs (source deb, 
binary deb) to unstable.


to:

1. new upstream release;
2. something happens on the DD/DM machine;
3. the DD/DM uploads a non-reviewed-in-practice blob (source deb) to the 
buildd;

4. the buildd compiles the source deb into the binary deb;
5. the buildd uploads a non-reviewed-in-practice blob (binary deb) to 
unstable.


This change moved a lot of trust from the hands (and machines) of a 
myriad of DDs/DMs into a handful of closely guarded build machines. A 
compromised gcc on the DD/DM machine is no longer a problem. But a 
compromised tar/dpkg/debhelper still is.


Now it is time to take a step forward:

1. new upstream release;
2. the DD/DM merges the upstream release VCS into the Debian VCS;
3. the buildd is notified of the new release;
4. the buildd creates and uploads the non-reviewed-in-practice blobs 
"source deb" and "binary deb" to unstable.


This change would have three advantages:

* Make the whole process happen outside the DD/DM computer, so it 
becomes more public and easier to review (commits vs debs), removing 
many chances for compromises.


* Close two specific attack vectors (hiding code in upstream release 
tarballs and in source debs) that have always existed and for one of 
which we have now proof of exploitation.


* Force attackers to do their work under public scrutiny, raising the 
complexity and the cost of carrying out an attack.


Yes, such a workflow will not stop many other attack vectors, but at 
least _these_ attack vectors will be stopped.


Regards,

--
Gioele Barabucci



Re: On merging bin and sbin

2024-02-28 Thread Gioele Barabucci

On 28/02/24 19:08, Peter Pentchev wrote:

On Wed, Feb 28, 2024 at 08:47:48AM -0600, r...@neoquasar.org wrote:

From: Gioele Barabucci 

This is a quick'n'dirty list of binaries present in both /bin and /sbin:

arping bin net/iputils-arping sbin net/arping (+ Conflicts:)


Are any of these (like arping) literally duplicates of the same binary for some 
reason? Or are they true conflicts (different binaries with the same name)?


I don't know about many of the others (although I have my suspicions), but
the two programs that just happen to both be called arping are not
the same at all: they have different functionality, conflicting
command-line options, etc.


And that is one of issues.

Without looking, could you say which package installs `arping` in /bin 
and make it available for non-root users?


Policy also has a couple of things to say. For example 
https://www.debian.org/doc/debian-policy/ch-files.html#binaries



Two different packages must not install programs with different
functionality but with the same filenames
That can (should?) be interpreted as "no same basename". Otherwise root 
will face and ambiguous choice between the one in /bin and the one in /sbin.


In any case, many of these clashes are known. This is why some of these 
packages declare Conflicts: with each other. However...



Be aware that adding Conflicts is normally not the best solution when
two packages provide the same files. Depending on the reason for that
conflict, using alternatives or renaming the files is often a better
approach.

https://www.debian.org/doc/debian-policy/ch-relationships.html#conflicting-binary-packages-conflicts

Regards,

--
Gioele Barabucci



Re: On merging bin and sbin

2024-02-28 Thread Gioele Barabucci

On 28/02/24 14:12, rhys wrote:

Last thing:  The idea of detecting cases where multiple binaries have the same name is a 
verey good one.  It should also be possible to automate this effort in a number of ways.  
I would be happy to help with this, if it's just a matter of someone putting in the 
effort.  A number of "crude by effective" methods have already come to mind, 
some of which only require access to the repos to accomplish.  (The laziest method 
involves having a test machine with EVERY package installed... but I'm not sure if that 
is practical.)


Contents-{all,amd64} has most of the info you need. dumat.db has _all_ 
the info you need (and cacin is using that).


This is a quick'n'dirty list of binaries present in both /bin and /sbin:

arping bin net/iputils-arping sbin net/arping (+ Conflicts:)
bitesize bin devel/ubuntu-dev-tools sbin misc/libbpf-tools
crm bin mail/crm114 sbin admin/crmsh
fai bin python/python3-flask-autoindex sbin admin/fai-client
faxq bin comm/mgetty-fax sbin comm/hylafax-server (+ Conflicts:)
gearmand bin perl/gearman-server sbin misc/gearman-job-server
htpasswd bin httpd/apache2-utils sbin web/merecat (+ Conflicts:)
ipp* bin net/ippsample sbin net/cups-ipp-utils (+ Conflicts:)
newaliases bin mail/esmtp-run sbin 
mail/courier-mta,mail/opensmtpd,mail/ssmtp (+ Conflicts: + Provide:)

raddebug bin libs/librad0-tools sbin net/freeradius
sendfax bin comm/hylafax-client sbin comm/mgetty-fax (+ Conflicts:)
sethdlc bin hamradio/ax25-tools sbin comm/dahdi
siggen bin sound/siggen sbin utils/tripwire
sslh bin perl/libnet-proxy-perl sbin net/sslh (+ Conflicts:)
tcpconnect bin net/tcputils sbin misc/libbpf-tools
tcpd bin graphics/tcm sbin net/tcpd
update-locale bin web/gosa-dev sbin localization/locales

Regards,

--
Gioele Barabucci



Re: On merging bin and sbin

2024-02-28 Thread Gioele Barabucci

On 28/02/24 12:25, Ansgar  wrote:

 This can be good, but it can also be seen as a pollution of
your shell completion. I note that Fedora seems to have added /sbin to
the user $PATH by default, which is not what Debian has done. I do not
think we have consensus on this and would raise an objection of my own.


/sbin not in PATH by default makes many more veteran users unhappy. 


Also non veteran users, given that certain commands in /sbin just work 
fine when run as non-root (or actually should _not_ be run as root 
because they trust their input). For example:


* fatlabel
* findfs
* fsck.*
* isosize
* mkfs.*
* route
* tarcat

But aside from the $PATH question, cacin work on ensuring that there are 
no conflicts between /sbin and /bin is worth pursuing as these conflicts 
are just bugs waiting to happen.


Regards,

--
Gioele Barabucci



Re: Another take on package relationship substvars

2024-02-24 Thread Gioele Barabucci

On 24/02/24 11:26, Bernd Zeimetz wrote:

On Thu, 2024-02-22 at 20:52 +0100, IOhannes m zmölnig wrote:

I think there are some packages that even demote `${shlibs:Depends}`
to Recommends.


Absolutely. collectd for example - otherwise you would install *all*
plugin dependencies with collectd, which would be a big waste of space.

The other option would be to make one packe per plugin as redhat does,
but do we really want 20 packages with a single file?


Yes, please. So that installing package collectd-foo ensures that all 
the required dependencies are installed, instead of having to hunt them 
down (a task better left to the package maintainers rather than the end 
users).


PS: I volunteer to do the splitting.

Regards,

--
Gioele Barabucci



Re: Proposal for how to deal with Go/Rust/etc security bugs

2024-01-24 Thread Gioele Barabucci

On 24/01/24 14:01, Luca Boccassi wrote:

how does that work for those applications that require rust, go and friends?
Are you proposing that everything that needs them should be be distributed by a
flatpak or similar mechanism instead?


Those applications are not shipped in the distribution. If somebody
wants to use them, they'll have to figure it out, just like for
everything else that is not shipped in the distribution, which is
already a subset of all available software in the world.


The risk is that that subset will get even smaller and miss out on new 
developments: Debian will then be stuck as a "C distribution" and with C 
& Co becoming more and more legacy, that means that Debian will become a 
"legacy distribution".


It is nice to know that, even if the paradigms are changing, one can 
still apt install caddy, etcd, acmetool, influxdb, prometheus, sq, 
firefox...


--
Gioele Barabucci



Re: Policy: should libraries depend on services (daemons) that they can speak to?

2024-01-15 Thread Gioele Barabucci

On 15/01/24 18:58, Russ Allbery wrote:

When you have the case of an application that optionally wants to do foo,
a shared library that acts as a client, and a daemon that does foo, there
are three options:


From the point of view a Debian package there are four options: 
Depends:, Recommends:, Suggests:, Enhances:, [nothing].


Perhaps a fifth category is needed for this 
shared-library-that-talks-to-a-deamon scenarion.


Or the whole D/R/S system could be changed to be more explicit about why 
a package Depends: or Recommends: another one:


* LinksToLibrary (Depends:)
* UsesProgram (Depends:)
* UsesProgramInMaintscript (Pre-Depends:)
* TalksToDaemon (Depends:)
* TalksToDaemonIfAvailable (Recommends:/Suggests:)
* LoadsAtRuntimeIfAvailable (Recommends:/Suggests:)
* IsPluginFor (Enhances:)

Regards,

--
Gioele Barabucci



Drawbacks of lack of mandated packaging workflow (Was: Re: Bug#1036884: 64-bit time_t: updated archive analysis, proposed transition plan with timeline)

2024-01-06 Thread Gioele Barabucci

On 05/01/24 21:17, Paul Gevers wrote:
Another worry, how will you provide the required changes to the 
maintainers of the packages? Via BTS? For those working on salsa: MR? 
Both? Something else? Obviously we should not end in the situation that 
a new upload goes back to the old name (or are the ftp-masters so keen 
on this transition that that won't happen? But what about newer versions 
with the old name already in experimental, conform the former worry?). 
I've seen NMU's being ignored by subsequent uploads by the maintainer, 
even when they fixed RC issues which were then reintroduced.


Aren't all these problems just inherent in Debian's lack of a mandated 
packaging tooling and workflow [1,2]?


And the fact that maintainers can decide to maintain their packages in 
idiosyncratic ways (e.g., no VCS) "just because"?


[1] https://salsa.debian.org/debian/grow-your-ideas/-/issues/24
[2] https://salsa.debian.org/debian/grow-your-ideas/-/issues/34

Regards,

--
Gioele Barabucci



Re: Deprecation of /etc/alternatives? (Re: Reaction to potential PGP schism)

2023-12-24 Thread Gioele Barabucci

On 24/12/23 08:54, Alastair McKinstry wrote:
While we are on the topic of alternatives, I hope to see the 
maintscript-based /etc/alternatives paradigm deprecated in favor of 
the package-based X-is-X paradigm introduced by `python-is-python3`.


They have different use-cases.  alternatives allows for 
co-installability (and importantly - co-"buildability" with 
dependencies). the X-is-X guarantees essentially the opposite.


I don't see X-is-X as a different use case when it comes to 
applications: both gnupg and sq-chameleon-gnupg could be installed at 
the same time.


After the installation there would be no /usr/bin/gpg. Once the user 
installs, say, ggp-is-gnupg then /usr/bin/gpg will point to 
/usr/bin/gpg-gnupg. Users (and scripts) are still free to install the 
other package and use /usr/bin/gpg-sq. The only Conflicts: here would be 
between gpg-is-gnupg and gpg-is-sq-chameleon.


Regards,

--
Gioele Barabucci




Deprecation of /etc/alternatives? (Re: Reaction to potential PGP schism)

2023-12-23 Thread Gioele Barabucci

On 22/12/23 00:40, Daniel Kahn Gillmor wrote:

If you're asking about using /etc/alternatives or something like that to
provide some sort of generic swapping capability, or a dpkg Provides:,
such that /usr/bin/gpg on some systems would point toward the
"chameleon", i would want to see some significant archive-wide testing
done before we even consider inflicting that on our normal users.


While we are on the topic of alternatives, I hope to see the 
maintscript-based /etc/alternatives paradigm deprecated in favor of the 
package-based X-is-X paradigm introduced by `python-is-python3`.


In this scenario gnupg will ship gpg as /usr/bin/gpg-gnupg, while 
sequoia-chameleon-gnupg will ship its gpg as /usr/bin/gpg-sq. Then the 
user can decide to install gpg-is-gnupg or gpg-is-sequoia (with the 
distro-wide preference expressed setting the appropriate Recommends in 
gnupg or sequoia-chameleon-gnupg).


Regards,

--
Gioele Barabucci



Re: Reaction to potential PGP schism

2023-12-21 Thread Gioele Barabucci

On 21/12/23 04:16, Daniel Kahn Gillmor wrote:

# What Can Debian Do About This?

I've attempted to chart one possible path out of part of this situation
by proposing a minimized, simplified interface to some common baseline
OpenPGP semantics -- in particular, the "Stateless OpenPGP" interface,
or "sop", as documented here:

https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/


Hi, thanks for the detailed overview.

As the Uploader of rust-sequoia-openpgp, what do you think of the 
related sequoia-chameleon-gnupg project [1] (drop-in replacement for gpg 
that uses sequoia internally)?


Would it work as a stop-gap measure while the Debian infrastructure 
moves from GnuPG to something else (to `sop`, for instance)?


Regards,

[1] https://gitlab.com/sequoia-pgp/sequoia-chameleon-gnupg not yet in 
Debian AFAIK


--
Gioele Barabucci



Re: New Essential package procps-base

2023-11-14 Thread Gioele Barabucci

On 14/11/23 11:11, Helmut Grohne wrote:

I welcome the effort in general. Like Andreas, I question whether having
pidof remain essential is useful. A quick codesearch
https://codesearch.debian.net/search?q=%5Cbpidof%5Cb=0 suggests
that we have less than 500 source packages that even mention it. Many
uses are in test suites or documentation, so the final number will be
lower still.


Last year Andreas and I had a quick look at what it would take to remove 
all pidof instances from maintscripts. In a couple of days we fixed a 
dozen packages.


This is our progress log: <https://salsa.debian.org/-/snippets/621>.

In short, there are only 23 packages whose maintscripts assume the 
presence of pidof and that need to be fixed.


Regards,

--
Gioele Barabucci



Re: reference Debian package of multiple binaries sharing one man page

2023-11-11 Thread Gioele Barabucci

On 11/11/23 08:12, Tobias Frost wrote:

On Fri, Nov 10, 2023 at 08:20:35PM +0100, Norwid Behrnd wrote:

I seek a maintained Debian package which provides multiple binaries sharing one
man page in common -- do you know an example?


devscripts - it links debchange.1 to dch.1 via debian/links  (dh_link)

$grep -r dch debian/links
/usr/bin/debchange  /usr/bin/dch


Please note that using d/links for manpages breaks building packages 
with , unless dh-exec is used and the manpages links are marked 
with .


Regards,

--
Gioele Barabucci



Re: Bug#1041731: Hyphens in man pages

2023-10-16 Thread Gioele Barabucci

On 16/10/23 08:36, Gard Spreemann wrote:

I've also found scdoc to be a quite pleasant and very lightweight alternative


I've noticed that the bullet points in man pages produced by scdoc are 
"off" compared to those produced by "pod2man". For example compare


https://manpages.debian.org/unstable/scdoc/scdoc.5.en.html#LISTS

to

https://manpages.debian.org/unstable/debhelper/debhelper.7.en.html#Substitutions_in_debhelper_config_files

The scdoc-produced lists are typeset with small dots, and have no spaces 
between the bullet points and the text. The pod2man lists have instead 
large dots and contain a space between the bullet points and the text.


Perhaps is it just a bug in the man-to-html conversion? Or is scdoc 
producing wrong roff markup?


Regards,

--
Gioele Barabucci



Re: Hyphens in man pages

2023-10-15 Thread Gioele Barabucci

On 15/10/23 19:13, Johannes Schauer Marin Rodrigues wrote:

Quoting Gioele Barabucci (2023-10-15 17:59:32)

On 15/10/23 17:33, Iustin Pop wrote:

At least you're not lazy. I am, so what I did many times is add a
build-depends on pandoc, and write the man page in rst or md. I think
that's a worse solution (pandoc is really heavy), but at least, I don't
have to go back to *roff.


Another option for the members of the lazy club is `podlators-perl`.


that is a virtual package provided by perl. What mechanism exactly are you
referring to when mentioning podlators-perl?


I was referring to `pod2man`, provided by the `podlators` Perl module.

`podlators-perl` is currently provided by `perl` but once upon a time it 
was a standalone package. Old habits. :)


--
Gioele Barabucci



Re: Hyphens in man pages

2023-10-15 Thread Gioele Barabucci

On 15/10/23 17:33, Iustin Pop wrote:

At least you're not lazy. I am, so what I did many times is add a
build-depends on pandoc, and write the man page in rst or md. I think
that's a worse solution (pandoc is really heavy), but at least, I don't
have to go back to *roff.


Another option for the members of the lazy club is `podlators-perl`.

The `.pod` syntax is OK, and it is not as heavy a dependency as pandoc.

Regards,

--
Gioele Barabucci



MR against patched package (Was: Please give a test to cron package, in experimental)

2023-10-10 Thread Gioele Barabucci

On 10/10/23 10:15, Alex wrote:
So I wonder why you don't just provide an additional branch 
"master-patched" against which merge requests can be opened without the 
risk of causing conflicts with existing patches.


This can be easily done with git-buildpackage's `pq` (patch queue) 
subcommand. And it could be automated on salsa.d.o with a post-receive hook.


```
$ # turn debian/patches* into a branch
$ gbp pq import
$ # force push the generated branch to the repo on salsa
$ git push -f salsa patch-queue/master:master-patched
```

MRs against master-patched will then be possible, but they will require 
one extra step from the maintainer (i.e. `gbp pq export`) to turn these 
MRs into normal standalone patch files stored in debian/patches.


Regards,

PS: `gbp pq import/export` is a much better interface to debian/patches 
compared to plain `quilt`.


--
Gioele Barabucci



Re: Bug#1053165: ITS: nunit

2023-09-28 Thread Gioele Barabucci

On 28/09/23 17:22, Bastian Germann wrote:
Okay. What do you suggest for "team maintained" packages where there is 
no active team member?
File MIA processes for each of the uploaders? And then? The MIA team's 
bugs are not RC bugs,


An automatic time-based "orphaning + RC" process like the one described 
in [1] would solve (or greatly reduce) of most of these issues.


I think, just letting such packages rot for one or two decades does not 
help anybody, certainly not our users.


I'd say that this whole discussion reinforces the need for a third 
option between "it's fully maintained" and "it's orphaned" [2]. A third 
option that recognizes and provides rules for low-commitment QA work on 
non-actively maintained packages.


[1] https://lists.debian.org/debian-devel/2023/09/msg00237.html
[2] https://lists.debian.org/debian-devel/2023/09/msg00358.html

Regards,

--
Gioele Barabucci



Re: Abandonware in testing (Re: lpr/lpd)

2023-09-25 Thread Gioele Barabucci

On 25/09/23 14:29, Wookey wrote:

It's actually quite well-maintained, just not by the maintainer:
someone else has uploaded the last 3 upstream versions via
debian-mentors.


I think this example shows the need for a level of maintainership that 
sits between "fully maintained" and "orphaned". (Or a rethinking of the 
concept of "orphan packages".)


Right now in Debian there is a distinction between:

1) maintained packages (Maintainer: "foo")

and

2) orphaned packages (Maintainer: "Debian QA Group").

State 1 is the desired state of a package: somebody (a single person or 
a team) looks after this package, packages and tests new releases, and 
is expected to respond to inquiries (bug reports, MRs, NMUs) within a 
reasonable time.


State 2 is an undesired state that should be addressed. Somebody from 
the QA team (= theoretically the whole of Debian) may have a look at it 
in case of transitions or RC bugs. But what Debian really desires is 
that somebody will adopt this package and put their name in the 
Maintainer: field.


What I think is needed is a state 3 (or 1.5) that formalizes what Wookey 
described: there is an informal group of people that may take care of a 
package, but they don't feel like having their names attached to it nor 
want the responsibility of being the ones in charge for timely fixes or 
quick replies.


The way I picture it, "state 3" packages would have something like 
"Debian Caretaking Team" in the Maintainer: field (not the usual "QA 
Group", and have autotests in lieu of a specific person/team that takes 
care of manually testing the package.


Has such a third category already been discussed or explored?

--
Gioele Barabucci



Abandonware in testing (Re: lpr/lpd)

2023-09-23 Thread Gioele Barabucci

On 22/09/23 09:41, Christoph Biedl wrote:

I doubt simple rules will really work out, rules like that
one I had in mind "Packages are removed from testing once they have been
orphaned/last maintainer-uploaded more than five years ago".


Maybe something more nuanced may work.

For example: packages are removed from testing if:

- have been orphaned/last maintainer-uploaded more than 2 releases ago,
- have no autopkgtests OR autopkgtests fail OR are not 
lintian/piuparts-clean.


Regards,

--
Gioele Barabucci



Re: debian testing daily build: installing GRUB/Bootloader and initramfs failing!!

2023-09-17 Thread Gioele Barabucci

On 17/09/23 09:46, André Verwijs wrote:
debian testing daily build:  installing GRUB/Bootloader and initramfs 
failing!!


Probably you stumbled upon this problem: https://bugs.debian.org/1040899

The root cause has (hopefully) been fixed by the Debian Installer team 
and will be released soon: https://bugs.debian.org/1031183


Regards,

--
Gioele Barabucci



Re: /usr/-only image

2023-09-16 Thread Gioele Barabucci

On 15/09/23 20:44, Luca Boccassi wrote:

In fact, Marco yesterday told me the only blocker to boot a minimal
Debian image with only /usr is PAM


Related: For compat >= 14 dh_installpam will install PAM modules in 
/usr, not /etc:


https://salsa.debian.org/debian/debhelper/-/merge_requests/63

--
Gioele Barabucci



Re: Default font: Transition from DejaVu to Noto

2023-09-12 Thread Gioele Barabucci

On 12/09/23 08:24, Fabian Greffrath wrote:

Instead, even
the fonts-noto-core package installs a full pack of 268 (!) font files.
This is discussed in detail in #983291 [1].


The issues is not that there are too many files, but that these files 
become extra entries in font pickers (1 entry for every ~3 files).


Why not collapse all these font files into a few new font files using 
fontforge or a variant of nototools's merge_fonts.py?


For example Noto Serif {Ahom, Bengali, Devanagari, Malayalam, Tamil, 
Thai, …} could be merged into "Noto Serif Asia". Then, Noto * {Africa, 
America, Asia, Europe, Oceania, Symbols} could be shipped in the 
fonts-noto-aggregated package and their entries added to Debian's 
fontconfig as default fallbacks. This would greatly alleviate the 
problem of having too many entries in the font pickers, yet provide the 
same coverage of fonts-noto-core.


Regards,

--
Gioele Barabucci



Re: /usr/-only image

2023-09-11 Thread Gioele Barabucci

On 10/09/23 22:42, Russ Allbery wrote:

Luca Boccassi  writes:

It is being slowly worked towards, but we are still at the prerequisites
at this time. Hopefully we'll have some usable experiments for the
Trixie timeline, but nothing definite yet.


Just to make this explicit, one of the prerequisites that has not yet
happened is for Debian to agree that this is even something that we intend
to do.


An even bigger prerequisite is that many upstream projects does not yet 
support working without /etc or (orthogonally) reading their default 
configuration from /usr.


In my personal experience I found that working directly with upstream 
projects on supporting stateless installs (no /etc, no /var) and 
factory-resets (the system keeps working after `rm -Rf /etc /var`) has a 
better return in investment compared to trying to integrate Debian- or 
distro-specific patches.


Perhaps a more approachable goal for Debian towards statelessness is to 
reach the point where no packages ship files in /var. That is often a 
matter of passing the right parameters to `dh_auto_configure`.


Regards,

--
Gioele Barabucci



Re: proposal: dhcpcd-base as standard DHCP client starting with Trixie

2023-07-11 Thread Gioele Barabucci

On 11/07/23 23:06, Sam Hartman wrote:

However, there are some significant disadvantages to netplan:

1) It's an extra layer. [...]

2) It's a layer that you cannot ignore when editing the config. [...]


I'd also add 3) It requires Python and various Python libraries. At 
least the CLI tool does.


In some circumstances installing Python and a bunch of libraries is not 
going to be a big issue (e.g., in desktop installs), but for many server 
installations that is an unnecessary new burden.


(To be fair, Lukas opened his email stating that for minimal 
installations sd-netwokd is a more fitting alternative. I just wanted to 
explicitly mention one reason supporting that statement.)


Regards,

--
Gioele Barabucci



Re: Second take at DEP17 - consensus call on /usr-merge matters

2023-07-08 Thread Gioele Barabucci

On 08/07/23 09:44, Timo Röhling wrote:

Alternatively, we could move all files except for the few critical
ones (/bin/sh, dynamic loader)


Allow me to add some hard data to this discussion.

In essential (proper) there are 153 files that need to be moved, 
distributed across 15 packages (+ base-files).


Packages and number of files to be moved:

  1 libc-bin
  1 login
  1 sed
  1 tar
  2 bash
  3 dash
  3 debianutils
  3 dpkg
  3 grep
  5 hostname
  7 sysvinit-utils
 14 gzip
 28 coreutils
 36 util-linux
 45 ncurses-base

Even the most convoluted and lock-stepped procedure can surely be 
carried out over a single day in an all-hands-on-deck effort. Especially 
if the files of non-critical packages are moved before the flag day.


Regards,

--
Gioele Barabucci



Re: FTBFS (reprotest) on all recent uploads

2023-06-20 Thread Gioele Barabucci

On 20/06/23 10:25, Peter B wrote:

On 20/06/2023 05:31, Joachim Zobel wrote:

  I can see two logs of successful builds and a
diff for them.


Looks to me like the 2nd build is aborting.
     ..
I: Building the package
I: user script 
/srv/workspace/pbuilder/1086848/tmp/hooks/A99_set_merged_usr starting

Re-configuring usrmerge...
removed '/etc/unsupported-skip-usrmerge-conversion'
dpkg-query: package 'usrmerge' is not installed and no information is 
available

Use dpkg --info (= dpkg-deb --info) to examine archive files.
/usr/sbin/dpkg-reconfigure: usrmerge is not installed
[...]

This is happening for a lot of packages, but reprotest seems fine on Salsa.


It looks like this issue has been fixed yesterday:

https://salsa.debian.org/qa/jenkins.debian.net/-/commit/9951365b854660b4c3ea770c11414f254c50151a


--
Gioele Barabucci



Re: Adding epoch to kworkflow package to correct a wrong upstream version

2023-03-13 Thread Gioele Barabucci

On 12/03/23 19:13, Peter Wienemann wrote:

On 12.03.23 18:48, IOhannes m zmölnig wrote:

Could lintian warn when a date based version is used?


Lintian already does this - see [0].

[0] 
https://salsa.debian.org/lintian/lintian/-/blob/f03fc15a45df4965e374b1e3a40c51cf6fe545ed/tags/n/new-package-uses-date-based-version-number.tag



Given than epochs are kind of a big deal, maybe that warning could be 
raised to the level of error (or added to ftp-master's autoreject tags), 
so that a package will be accepted only if that tag is explicitly 
overridden.


Regards,

--
Gioele Barabucci



Re: An email address for drive-by bug reports?

2023-03-01 Thread Gioele Barabucci

On 01/03/23 16:22, Sam Hartman wrote:

Socially and culturally I do want to emphasize the idea that if you
aren't willing (any more) to put energy behind your problem report, it's
entirely fine if no one is going to put energy behind fixing it.


That seems to me like a perfectly fine social agreement.

And not much different to what happens with orphaned packages (you don't 
maintain the package anymore, don't expect others to put in the effort 
to do it).


Regards,

--
Gioele Barabucci



An email address for drive-by bug reports?

2023-02-28 Thread Gioele Barabucci
Should there be a standard email address for "I'm reporting this because 
I noticed it, but I'm not interested in it"-bug reports?


Orphaned packages get their maintainer address set to 
. Shouldn't something similar be available for bugs?


For example I have opened bugs years ago against packages that I do not 
use anymore. These reports are still valid and sometime others comment 
on them, but I would no longer be able to, for example, respond to 
`moreinfo` requests. At the same time these bugs clutter the bugs.d.o 
page associated to my email address.


It would be nice to have a separate email address to which these bugs 
could be reassigned (maybe after a minimum amount of time?).


It could be as simple as a the address of a dedicated mailing list.

Regards,

--
Gioele Barabucci



Bug#1030668: dinstall could run more often (every hour?)

2023-02-06 Thread Gioele Barabucci

Package: ftp.debian.org
Severity: wishlist
X-Debbugs-CC: debian-devel@lists.debian.org

Dear FTP masters,

could dinstall be run more frequently, for example every hour?

Currently dinstall is run only once every 6 hours. This means that many 
operations are blocked for a long time. For instance uploading a -2 
version after a package has cleared the NEW queue.


Such long delays tend to ruin the development flow, especially of 
volunteers that happen to have just a couple of hours at their disposal. 
This is a well known source of frustration [1].


[1] 
https://michael.stapelberg.ch/posts/2019-03-10-debian-winding-down/#old-infrastructure-package-uploads


Given that a dinstall run generally takes only few minutes, it should be 
feasible to run dinstall at least hourly.


Regards,

--
Gioele Barabucci



Bug#1029723: ITP: bats-file -- Helper library providing filesystem-related assertions for Bats

2023-01-26 Thread Gioele Barabucci

Package: wnpp
Severity: wishlist
Owner: Gioele Barabucci 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: bats-file
  Version : 0.3.0
* URL : https://github.com/bats-core/bats-file
* License : CC0
  Programming Lang: Bash
  Description : Helper library providing filesystem-related 
assertions for Bats


bats-file provides various assertions and helpers to simplify writing 
Bats tests that deal with files and filesystems.


For example:

* assert_file_contains: Check if the file content matches a regex.
* assert_file_owner: Check if a specific user owns the file.
* assert_symlink_to: Check if the file is a symlink to the target.
* temp_make: Create a temp directory for the current test in BATS_TMPDIR.

--
Gioele Barabucci



Re: propose: provide "docker" package as docker, not wmdocker

2022-12-05 Thread Gioele Barabucci

On 05/12/22 18:19, Andreas Metzler wrote:

how do you avoid that people who still have got the transitional docker
(--> wmdocker) package installed end up being upgraded to real docker
(from docker.io)?


How was the transition from git-the-file-viewer to git-the-VCS handled 
in lenny/squeeze?


Regards,

--
Gioele Barabucci



Bug#1021609: ITP: bats-assert -- Helper library providing common assertions for Bats

2022-10-11 Thread Gioele Barabucci

Package: wnpp
Severity: wishlist
Owner: Gioele Barabucci 
X-Debbugs-Cc: debian-devel@lists.debian.org, gio...@svario.it

* Package name: bats-assert
  Version : 2.0.0
* URL : https://github.com/bats-core/bats-assert
* License : CC0
  Programming Lang: Bash
  Description : Helper library providing common assertions for Bats

bats-assert provides various ready-made assertions that can be used
to make Bats tests simpler to understand and to debug.

For example:

* assert_success: exit status is 0.
* assert_output: output contains given content.
* assert_line: a specific line of output contains given content.

--
Gioele Barabucci



Bug#1021048: ITP: bats-support -- Supporting library to test bats helper libraries

2022-10-01 Thread Gioele Barabucci

Package: wnpp
Severity: wishlist
Owner: Gioele Barabucci 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: bats-support
  Version : 0.3.0
* URL : https://github.com/bats-core/bats-support
* License : CC0-1.0
  Programming Lang: bash
  Description : Supporting library to test bats helper libraries

bats-support is a supporting library providing common functions to test 
helper libraries written for Bats.


Features:

* error reporting
* output formatting
* language tools

--
Gioele Barabucci



Re: Automatic trimming of changelogs in binary packages

2022-09-07 Thread Gioele Barabucci

On 06/09/22 11:42, Andrey Rahmatullin wrote:

On Tue, Sep 06, 2022 at 12:11:38PM +0300, Hakan Bayındır wrote:

Stuffing them behind a command, possibly making them online only in the
process will arguably make system troubleshooting and administration harder,
esp. if the system has connectivity issues.

If something critical breaks, I can boot to recovery and look at the logs
and changelogs of recently updated packages. Having recent-ish changelogs on
the disk arguably accelerates the fixing process.

I don't think removing recent-ish changelogs from the disk is proposed
here.



Andrey is correct: what is being proposed is just trimming the installed 
changelogs, not removing them completely. And the full logs will remain 
in the source packages.


Regards,

--
Gioele Barabucci



Re: Automatic trimming of changelogs in binary packages

2022-09-07 Thread Gioele Barabucci

On 06/09/22 10:25, Paul Wise wrote:

On Tue, 2022-09-06 at 07:13 +0200, Gioele Barabucci wrote:


* Packages not meant to be included in Debian (and without access to a
changelog server): Creators that want to preserve the full history can
use the `--no-trim` option to disable the trimming.


Most derivatives aren't going to have a changelog server so I don't
think it makes sense to enable it by default on all derivatives.

Perhaps the dpkg vendor could be used as guidance for when the trimming
should occur by default? Unless Debian/Ubuntu, disable by default.


I have searched the debhelper's source code and its documentation for 
how it handles derivative distros, and it seems to me that


1) derivative distros are not handled at all,

2) the implicit policy is that vendors will modify the default 
parameters to suit their needs.


In addition (or in alternative) to what Niels suggested in the other 
reply, derivatives could add to their patchsets a 1-line patch to make 
`--no-trim` the default. That would be in line with the kind of 
modifications that derivs to fit Debian to their needs, wouldn't it?


Regards,

--
Gioele Barabucci



Re: Automatic trimming of changelogs in binary packages

2022-09-05 Thread Gioele Barabucci

On 18/08/22 21:18, Gioele Barabucci wrote:
Does anybody have objective objections against activating automatic 
changelog trimming in binary packages?


Hi,

a couple of weeks since the initial email (thanks everybody for the 
input), my reading is that there is now consensus in going ahead with 
the proposed automatic trimming of changelogs.


## Addressed contrary objections

In particular, I understand that all contrary objections that were 
raised have been satisfyingly addressed:


* Packages not meant to be included in Debian (and without access to a 
changelog server): Creators that want to preserve the full history can 
use the `--no-trim` option to disable the trimming.


* Third-party repositories: Their administrators can provide access to 
the full changelogs by setting `Changelogs:` in the `Release` file, or 
can use `--no-trim` in the packages that they distribute.


* Users should be made aware that changelogs have been trimmed: 
`dh_installchangelogs` has been modified to add a comment at the end of 
the trimmed changelogs.


* Source packages should retain full changelogs: This is, in fact, 
already the case: only the changelogs included in the binary packages 
are trimmed.


* Reproducible output: Once trimming will be enabled in 
`dh_installchangelogs`, either the changelogs will be trimmed (default) 
or not (due to the explicit use of `--no-trim`). This ensures the 
reproducibility of packages.


## Non-blocking concerns to be addressed in the future

In addition, there were concerns and ideas that were raised as non 
blocking and that will be discussed and addressed in the future:


* Perhaps have dpkg treat changelogs as metadata: There are pros 
(deduplication) and cons (the need to have a new command like `dpkg 
--show-changelog`).


* d-security has no online changelogs: Fixing this has been proposed in 
2008 (https://bugs.debian.org/490848) but it did not seem to sparkle 
enough interest at the time (and users of d-security are unlikely to be 
interested in changelog entries older than old-old-stable).


* apt changelog could be instructed to choose between the local and the 
remote changelogs, perhaps via options like `Changelogs::PreferOnline` 
(to complement `AlwaysOnline`) and `--full`.


* Maybe the URLs used by the tracker to link to the changelogs and the 
URLs used by apt to fetch the changelogs could be aligned.


Regards,

--
Gioele Barabucci



Re: Automatic trimming of changelogs in binary packages

2022-08-19 Thread Gioele Barabucci



On 19/08/22 11:31, Michael Biebl wrote:
I guess this could be solved by dpkg creating symlinks from the "master 
copy" which is per-source to /usr/share/doc/$binpkg/


Maybe the "master copy" could be in `/usr/share/doc/src:$pkg/`?

/usr/share/doc/openssh-{client,server}/X → /usr/share/doc/src:openssh/X

Regards,

--
Gioele Barabucci



Re: Automatic trimming of changelogs in binary packages

2022-08-19 Thread Gioele Barabucci



On 19/08/22 10:35, Philip Hands wrote:

How about making the end of the trimmed file be a standard footer
including a hint about how one can get hold of the rest of the
changelog, and then have `apt changelog` look out for that footer in the
local copies in order to know that they've been trimmed, and that it
should therefore try to download the full version.



This two-line footer is added to the trimmed changelogs:

# Older entries have been removed from this changelog.
# To read the complete changelog use `apt changelog foobar`.

Regards,

--
Gioele Barabucci



Re: Automatic trimming of changelogs in binary packages

2022-08-19 Thread Gioele Barabucci

On Fri, 19 Aug 2022 00:46:21 +0200, Guillem Jover wrote:

My objections from that time still stand:

  <https://lists.debian.org/debian-devel/2020/03/msg00482.html>

I would also like to highlight David Kalnischkies reply:

  <https://lists.debian.org/debian-devel/2020/03/msg00309.html>


Dear Guillem,

I believe all factual objections raised in those two email are well 
handled by the proposed `dh_installchangelogs` MR.


Here are the factual objections in those emails, reordered and 
reformatted for sake of readability:


Doing that trimming globally would also mean that this applies even 
to packages that are for local or derived use where something like 
«apt changelog» will in most cases not work.
Maintainers of packages _meant_ to be installed locally (i.e., 
distributed outside repos) can use `--no-trim`.


Packages distributed by Debian derivatives can (and should) set the 
`Changelogs` field in their Release files [1], or provide an appropriate 
`Acquire::Changelogs::URI::Origin::DISTRO` apt.conf.d snippet.



Assuming the repository supports it. I have yet to encounter a
third-party which does, so if Debian would trim e.g. in debhelper by 
default some care might need to be applied so that this happens only

to packages which end up in Debians repositories… which could
complicate reproducibility as its clear for a buildd, but my local
sbuild…

Similar to the point above, if the third-party developers are

1) willingly distributing their packages via a repository that does not 
set `Changelogs:` and

2) also really want to make the full changelogs available,

then they can pass `--no-trim` to `dh_installchangelogs`.

The explicit use of `--no-trim` will make the packages reproducible.


The benefit of treating all packages the same is that tools working
with changelogs can handle the grunt work: "apt{,-get} changelog pkg"
prefers the changelog on disk if available – except for repositories
which identify as "Ubuntu" for which it will always download the
online changelog for display.
(I read this as a comment _in favor_ of automatic trimming, but maybe 
I'm just reading it through rose-tinted glasses.)


Once automatic changelog trimming is the default, then fixing `apt 
changelog` is a matter of setting 
`Acquire::Changelogs::AlwaysOnline::Origin::Debian` to true in apt.conf.d/


A proposal I've been floating around from time to time has been to 
instead make the changelog and copyright files deb/dpkg metadata 
(which they really are anyway IMO).
That is indeed a good idea. And, by implementing it in addition to 
`dh_installchangelogs` auto-trimming, it will even further reduce the 
amount of wasted space and bandwidth.


Regards,

[1] 
https://salsa.debian.org/apt-team/apt/-/blob/main/doc/apt.conf.5.xml#L628


--
Gioele Barabucci



Automatic trimming of changelogs in binary packages

2022-08-18 Thread Gioele Barabucci



Hello,

in 2020 there was a brief discussion on debian-devel@ about trimming 
changelogs [1,2].


Now there is a working implementation of said functionality in 
`dh_installchangelogs` [3].


This implementation, combined with the evolution of the apt/dpkg 
ecosystem that happened in the meantime, provides now all the benefits 
of changelog trimming (less wasted space and bandwidth worldwide, 
reduced processing time) without the downsides discussed at the time.


## In detail

* `dh_installchangelogs` is modified install in binary packages the 
trimmed changelogs, i.e. changelogs that contain only entries more 
recent than the release date of oldstable.


* The trimming is done automatically in compat >= 14.

* The `--no-trim` option allows package maintainers that want to ship 
the whole changelog a way to do so.


* The full changelogs are preserved in the source packages and thus 
available via `apt changelog` and similar mechanisms.


* The trimming process happens at build time and requires no 
modification to the changelogs stored in the VCS repos, nor changes to 
the packaging.


## Data on file size reduction

On a sample of ~13.000 packages, the median reduction in size of 
gzip-9'ed changelogs is 56% (mean 50%).


Ancient packages or heavily developed packages gain a lot from trimming 
the changelogs. Some examples (gzipped → trimmed+gzipped):


* debian-keyring: 664k  → 47k (-92%)
* dpkg (essential): 223k → 22k (-90%)
* apt (essential): 156k → 14k (-90%)
* systemd: 110k → 23k (-78%)
* gcc-12: 189k → 18k (-90%)
* python3.9: 48k → 4k (-90%)
* e2fsprogs: 68k → 7k (-89%)

## Consensus

Does anybody have objective objections against activating automatic 
changelog trimming in binary packages?


Regards,

[1] https://lists.debian.org/debian-devel/2020/03/msg00299.html
[2] https://bugs.debian.org/954313
[3] https://salsa.debian.org/debian/debhelper/-/merge_requests/80

--
Gioele Barabucci



Userscript to manage reports directly from bugs.debian.org

2015-12-09 Thread Gioele Barabucci
Hello,

I made a Greasemonkey userscript to manage bug reports from
bugs.debian.org. It allows manipulating the tags list, the severity, the
forwarded to address, and so on. It generates clickable mailto: links
with all the needed commands for control@bdo. It is available at

https://anonscm.debian.org/cgit/users/gioele-guest/bst-userscripts.git/

(direct link
<https://anonscm.debian.org/cgit/users/gioele-guest/bts-userscripts.git/plain/manage-debian-bugs-via-web.user.js>)

Once the script is installed you can change the existing fields like
"severity" and "tags" (they are now editable text fields) and add fields
that are not there yet (click on "Additional fields..."). When changes
are detected, a list of pending changes will appear. You can submit
these changes in various ways: clicking on "submit via control" will
generate an email ready to be sent to `cont...@bugs.debian.org`;
clicking on "via bts" will show the command line to use to send these
commands via the `bts` command line utility; using the "reply" and
"close" that will add the necessary "Control" lines to those email.

The script is good enough for my needs. It is definitely not
finished nor ready to be used by the public at large. The script has
been tested only with Firefox 42. Bug reports and patches are welcome.

Background. Some weeks ago I came across the bug page for dash and it
looked like it could use some triaging. I then discovered how unpleasant
it is to manage those bug reports, especially if you did not receive the
bug original bug report. I have composed and sent many emails to ###@,
###-done@ and control@, but I thought it would had been much more
productive to have a script collect all the needed pieces of information
for me and put them in a ready-to-send email. This is that script.

I hope this may be useful to other people as well.

Cheers,

--
Gioele Barabucci <gio...@svario.it>



Accepted fonts-radisnoir 0.9b-3 (source all) into unstable, unstable

2015-11-23 Thread Gioele Barabucci
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 22 Nov 2015 01:41:13 +
Source: fonts-radisnoir
Binary: fonts-radisnoir ttf-radisnoir
Architecture: source all
Version: 0.9b-3
Distribution: unstable
Urgency: medium
Maintainer: Debian Fonts Task Force <pkg-fonts-de...@lists.alioth.debian.org>
Changed-By: Gioele Barabucci <gio...@svario.it>
Description:
 fonts-radisnoir - font inspired by Bayer Universal and Bauhaus
 ttf-radisnoir - transitional dummy package for fonts-radisnoir
Closes: 659725 661459
Changes:
 fonts-radisnoir (0.9b-3) unstable; urgency=medium
 .
   * Prepare for new Debian release
   * Convert to git-buildpackage
   * Drop dependency on fontforge
   * Drop maintscripts, used only for defoma (Closes: #659725)
   * Update compat to version 9
   * Add Multi-Arch field to control
   * Remove dirs file: it is no longer needed
   * Install OTF files in /usr/share/fonts/opentype
   * Make debian/copyright machine-readable
   * Bump Standards-Version to 3.9.6 (no changes needed)
   * Remove debian/watch: the source site is gone
   * Adopt package (Closes: #661459)
   * Fix description to reference the correct typeface
   * Rename package to fonts-radisnoir
   * Add Vcs-* fields
   * Install only the OpenType version
Checksums-Sha1:
 c587141439af7964b583d2c6985332dd5e506db2 2013 fonts-radisnoir_0.9b-3.dsc
 65232e6347fe1bf188e8916b24e29912dc008e75 30537 fonts-radisnoir_0.9b.orig.tar.gz
 4acb46c8a454f14310bfaf7a4f30bb1fc360063c 4120 
fonts-radisnoir_0.9b-3.debian.tar.xz
 cc86360bdc9932f09c6a37a08659fcb2d78a2d36 14384 fonts-radisnoir_0.9b-3_all.deb
 8668ec5a7a8a192e38c0be9ae5fa82faa223a2ab 4552 ttf-radisnoir_0.9b-3_all.deb
Checksums-Sha256:
 74172fe8d6c50226a2c41a92c0d0bb7c21dd6af426e09ac6dfbc368b2916a7fc 2013 
fonts-radisnoir_0.9b-3.dsc
 b03f1e51f1bd306190955f7796d55c11e3b69b7a08c477218803828bd6003d93 30537 
fonts-radisnoir_0.9b.orig.tar.gz
 3d0a7ba882e4c0a2d588e8295c41463f70cb43ef85df7d14272981fd48cf71ca 4120 
fonts-radisnoir_0.9b-3.debian.tar.xz
 b20c5c5b494ac1d8d0c0c2aae30fd35bd7bce7db070cd2a5ffd031626c86e95b 14384 
fonts-radisnoir_0.9b-3_all.deb
 b12dbea1baa3b94900d93e81c1ac1d2cca21c146f2cfb3cef141b71d19d0cdcd 4552 
ttf-radisnoir_0.9b-3_all.deb
Files:
 0d3cae75ef0d932095f3bfd75365b7fa 2013 fonts optional fonts-radisnoir_0.9b-3.dsc
 a450d4001b8450565acebd55aa6e0752 30537 fonts optional 
fonts-radisnoir_0.9b.orig.tar.gz
 8d673320a81db17be5132bd49c99fd37 4120 fonts optional 
fonts-radisnoir_0.9b-3.debian.tar.xz
 9e0c40341606d51b56a40ce67517aeca 14384 fonts optional 
fonts-radisnoir_0.9b-3_all.deb
 ea34a1542976cc3e67ac0d569e19d59c 4552 oldlibs extra 
ttf-radisnoir_0.9b-3_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBCAAGBQJWUbitAAoJEMvqjpcMzVnf1FwP/26k6sdlCIPgE2ytnOTuhf6z
zU2Mlw5YaYrsLfW+kDh2Zl259F37sTz05AEh5DNcGww7HZnOeN5ekhsg8jly9BBZ
VZpAXsWCl9eld5xzKYFF+k7nXQIZWSLWxVHazTu/4F2hCc6PDRR7+t+Sj0bcD5Xb
+vGt6PzkxX/+PDqIkmv1atYJwCzQmSl7wVULdmXxCGemMS1Dc9hvCe0rI1r5u1ix
Hph66aUUVXVXvZNGACFK2hzoeMlqZ4u8rZhgG2Pz1H6cAcAia/lh16NFg/GdgKF2
MOOuP9ugri6cvDju9y4ws4ehG5/blrPoD6nuAcDaYO+c+vuftGc1ve+yBYDYp0Jd
bLfxaFJEbY+XMsYOCqabCkOPCCyxUvPetqL68EOaXFgh+R5ZUK1NAnZSqhNdtfbF
MPRuHgSwAii0zBOb0cfti2Kheq6fx5I+qLGRG98G06Cnb6suUW2wgXHaiFbfwWTH
81oEO5jkh9kxd/8NCjiAj/6WUq3cJbN4fh94twmahIOqSFMktePjf46jvrWXZhdt
tO/x/yLBwpprhwxSTA1EpjJj71yIpjRVkwJd881lcHYm5n8ngKOeBDPw3dZKFscT
PBuQNycEBBZA4JOppHdLy6aYzDlBddUEZ1IghfdXaIc7C6OB7nMPNIF6mdQoLTNE
kdxtiIKFOl+uDi7GI3dQ
=fDks
-END PGP SIGNATURE-



Accepted fonts-femkeklaver 1.0-2 (source all) into unstable, unstable

2015-11-19 Thread Gioele Barabucci
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 17 Nov 2015 23:22:18 +
Source: fonts-femkeklaver
Binary: fonts-femkeklaver ttf-femkeklaver
Architecture: source all
Version: 1.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Fonts Task Force <pkg-fonts-de...@lists.alioth.debian.org>
Changed-By: Gioele Barabucci <gio...@svario.it>
Description:
 fonts-femkeklaver - simple handwriting font
 ttf-femkeklaver - transitional dummy package for fonts-femkeklaver
Closes: 804917
Changes:
 fonts-femkeklaver (1.0-2) unstable; urgency=medium
 .
   * Prepare for new Debian version
   * Update debian/copyright to follow copyright-format/1.0
   * Format the CC-BY-SA-3 licence
   * Remove package name from install file
   * Ignore generated files in debian/
   * Update compat to version 9
   * Update font homepage
   * Add Multi-Arch field to control
   * Bump Standards-Version to 3.9.6 (no changes needed)
   * Drop fontconfig from Recommends
   * Use standard font path
   * Adopt package (Closes: #804917)
   * Update copyright information
   * Add GPL short text
   * Add Vcs-* fields
   * Move details about the relicensing in the copyright file
   * Extend description of the font style
   * Rename package to fonts-femkeklaver
Checksums-Sha1:
 6a537e34c013133c75867162363f4308854bcad0 2057 fonts-femkeklaver_1.0-2.dsc
 98b79efc3fd11d31b7068f35c0540078079a0c6d 60003 
fonts-femkeklaver_1.0.orig.tar.bz2
 74060c5c390835b2a9ee58813b1d1c83e1ab4c2f 10228 
fonts-femkeklaver_1.0-2.debian.tar.xz
 0997c9ec11e021b0ff16688010454e4f489f56fb 61644 fonts-femkeklaver_1.0-2_all.deb
 eeb1416d36cfb01181c465a79f0e9fd6b7da8709 10632 ttf-femkeklaver_1.0-2_all.deb
Checksums-Sha256:
 04cc1a8efb6c0d376745aaea39963b63d978d9e51b6b5d0b22917d4123f8a420 2057 
fonts-femkeklaver_1.0-2.dsc
 866d5e3101108bca259e1baaf070a8216440f6dab26e7e1a38b81de6d9d6dc77 60003 
fonts-femkeklaver_1.0.orig.tar.bz2
 0e75b5edce1060606630c636775146c4d26d0c34b42bcbb6c5dc5b529c6da0f4 10228 
fonts-femkeklaver_1.0-2.debian.tar.xz
 a7606a03c1eebf00c2d68fdd1e77b0956a23fe717cb9b032e56e97c189bcc36e 61644 
fonts-femkeklaver_1.0-2_all.deb
 f23e6fe07cdb6082981662e5e62f13c481a8c8c8d24c31ed3eb5e0ef8bc09910 10632 
ttf-femkeklaver_1.0-2_all.deb
Files:
 5d9ddf8dcd71fa31f7a956979b4b608f 2057 x11 optional fonts-femkeklaver_1.0-2.dsc
 e710544d7fc4652d1a8f73ac5e606242 60003 x11 optional 
fonts-femkeklaver_1.0.orig.tar.bz2
 0e6bf32dcb8f8bb4741a9da34727db6d 10228 x11 optional 
fonts-femkeklaver_1.0-2.debian.tar.xz
 d9f2579600b14b1057991c6f721a136f 61644 x11 optional 
fonts-femkeklaver_1.0-2_all.deb
 60679058a5867810a45ea8ae8d4a2cd9 10632 oldlibs extra 
ttf-femkeklaver_1.0-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=qkS1
-END PGP SIGNATURE-



Accepted fonts-kristi 20100000-2 (source all) into unstable, unstable

2015-11-03 Thread Gioele Barabucci
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 20 Oct 2015 22:17:04 +
Source: fonts-kristi
Binary: fonts-kristi
Architecture: source all
Version: 2010-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Fonts Task Force <pkg-fonts-de...@lists.alioth.debian.org>
Changed-By: Gioele Barabucci <gio...@svario.it>
Description:
 fonts-kristi - casual cursive script typeface with a "felt-tip pen" feel
Changes:
 fonts-kristi (2010-2) unstable; urgency=medium
 .
   * Improve summary and description
Checksums-Sha1:
 9b676986f14fb7ffe3deb298408618bbcf603a4f 1970 fonts-kristi_2010-2.dsc
 839a7c1da52a430dac701ee1bff328075f14abf1 35107 
fonts-kristi_2010.orig.tar.gz
 5a150aa4c3db8bdcdcc928e5c52afaa6c6541dce 5360 
fonts-kristi_2010-2.debian.tar.xz
 1032be7b3e21cd4d4880efc052b6cf067577cd3e 35532 fonts-kristi_2010-2_all.deb
Checksums-Sha256:
 abefbd56cfeab938000ab72e0044958eddf4af6504fec9206dc9005a7a0cdd00 1970 
fonts-kristi_2010-2.dsc
 5f3ace7b270e1b8434024d4d27e3c452d1b7e3e746d2de52fece745a96d62783 35107 
fonts-kristi_2010.orig.tar.gz
 8258b6e5cdb7b22759f66d1d53f5dbe803e3c69291062aca5e06918e6ff6e034 5360 
fonts-kristi_2010-2.debian.tar.xz
 5e83d77b76fe24a5c13f928f436a30dfbe231bb2aab2e615405a2133a1c2e4d8 35532 
fonts-kristi_2010-2_all.deb
Files:
 34f8c8f0e30c4cbbb7bb5b96303531c3 1970 fonts optional 
fonts-kristi_2010-2.dsc
 8ed95f43cc7d052778e3d5a199ee10a9 35107 fonts optional 
fonts-kristi_2010.orig.tar.gz
 cc0f292254987802e532413b5da7df90 5360 fonts optional 
fonts-kristi_2010-2.debian.tar.xz
 1d48f21cd4fadcbbc81a6b367757723b 35532 fonts optional 
fonts-kristi_2010-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBCAAGBQJWMfNjAAoJEMvqjpcMzVnfZg8QANizl0p4UFqVHwCYzeKoPZD6
VjYy29BDpxcUHPDZ3dgXzx8jK1Kw634Lq6DoJVfFBfEeABftafV13s8Al+eX2EaU
DS2mC0fWnsDCALmLPLjjal1OSa735OQH0PRgEr0CJUqJ0xkyajtmmjy9r38qP8+a
oJzUKf6hVkxst5LsDxJFL70Dm8A6HyRyLgYu5wWDr5Kf6UQ8kacWVsXL+kJTLi/N
yE7UQ45LmuSTv+MElXTabeNwjHjI3vlF6Aj3kVJMWvrTEfFuaIryq9iAaWsTo9BH
5LPj8kjlbEyQDuiroLz6qRYeSOBKtbIxuyuGj5dpXdKVrNalSEie3/gguAodWEw+
kikiZrD/KoZSIyUGBmxczv8Kj+xbT/pmMMOTknabillN8RJ9kM5baJMUijosfTU5
OWQBqjGE/EQP2zfWSIgLU+Frge1RZKAxSOHeZD0F+EK2eAoyuYI9LoMO9YU2MJVb
EcSbatBPOcQpQeOUs6XF88dIeFnxD79M1TMun7CgRUbNaQMxye5kArKz/+5HlGxi
VehZr8fhm/WCPBv5lzSecfOgJ9LfFn2Jhr0kLG/zNAmnopiPsWzf/jGTW0qrSZ0V
iTsChE6PVRzA+tbrjEDdVHTOMFJYwpTVW+DyXvRYWeKZT1rNrQmD9bSX6idS41Wt
LKtFVzClZ8PxY6nAAQ1s
=rsHY
-END PGP SIGNATURE-



Bug#803690: ITP: fonts-pompiere -- a playful script font

2015-11-01 Thread Gioele Barabucci
Package: wnpp
Severity: wishlist
Owner: Gioele Barabucci <gio...@svario.it>

* Package name: fonts-pompiere
  Version : 20110715
  Upstream Author : Karolina Lach for Sorkin Type
* URL : https://www.google.com/fonts/specimen/Pompiere
* License : OFL-1.1
  Programming Lang: TTF
  Description : a playful script font

Pompiere is a low contrast condensed sans serif TrueType font
designed by Karolina Lach.
However unlike most sans it has very tall ascenders and very
small x-height. Pompiere is playful and even a little sweet.

This font was inspired by a handmade sign seen outside of NYC
firefighters Squad Co. 18 in the West Village of Manhattan.
Because of its small x-height and modest weight it will work
best at medium to large sizes.



Bug#800815: ITP: fonts-kristi -- Kristi font

2015-10-03 Thread Gioele Barabucci
Package: wnpp
Severity: wishlist
Owner: Gioele Barabucci <gio...@svario.it>

* Package name: fonts-kristi
  Version : 2010
  Upstream Author : Birgit Pulk
* URL : https://www.google.com/fonts/specimen/Kristi
* License : OFL-1.1
  Description : Kristi font

Kristi is a free TrueType font designed by Birgit Pulk.
It is a calligraphy font inspired by old chancery typefaces. The font
simulates writing with a felt-tip pen.



Accepted fonts-leckerli-one 20110000-1 (source all) into unstable, unstable

2015-10-01 Thread Gioele Barabucci
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 08 Sep 2015 20:56:49 +
Source: fonts-leckerli-one
Binary: fonts-leckerli-one
Architecture: source all
Version: 2011-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Fonts Task Force <pkg-fonts-de...@lists.alioth.debian.org>
Changed-By: Gioele Barabucci <gio...@svario.it>
Description:
 fonts-leckerli-one - Leckerli One font
Closes: 798202
Changes:
 fonts-leckerli-one (2011-1) unstable; urgency=medium
 .
   * Initial release. (Closes: #798202)
Checksums-Sha1:
 0a0f007cdaf4106876d6a2ea57a0e31f24e1c98f 1896 fonts-leckerli-one_2011-1.dsc
 1e30ea465bc9fdf27f92d85e4bb4b4aab9f11fa4 26482 
fonts-leckerli-one_2011.orig.tar.gz
 7f046013e4ff85f5111d7cec8110e088e4254164 5288 
fonts-leckerli-one_2011-1.debian.tar.xz
 26083cd5a4160b5d9db8acf46f809bceea289d93 26650 
fonts-leckerli-one_2011-1_all.deb
Checksums-Sha256:
 54f2811cf3250d36d8055476c386e1d6413240422975a54be8197aad7c048b95 1896 
fonts-leckerli-one_2011-1.dsc
 ee16bbcedd7f04c427815d7ae5af8ef9369525bb8e5e8864f40bc45b722a6038 26482 
fonts-leckerli-one_2011.orig.tar.gz
 4949686e9bf1bbb118bfb107d2c1d53c383bae64f6c50cb5ab5ac3a4945c401d 5288 
fonts-leckerli-one_2011-1.debian.tar.xz
 f97fb88259725f188095fe6e976612e63d7329b9a8daa6caa10e1fb1acb33fb9 26650 
fonts-leckerli-one_2011-1_all.deb
Files:
 2c419119160ca8d7f119217dc7d181f7 1896 fonts optional 
fonts-leckerli-one_2011-1.dsc
 741d6076a72c53a85e0409c664ebc3ee 26482 fonts optional 
fonts-leckerli-one_2011.orig.tar.gz
 3298e05a1f343cbf09315a281d57977f 5288 fonts optional 
fonts-leckerli-one_2011-1.debian.tar.xz
 6c2b56ae173c2c8444d8900a25b73b26 26650 fonts optional 
fonts-leckerli-one_2011-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=O5Zp
-END PGP SIGNATURE-



Bug#798202: ITP: fonts-leckerli-one -- Leckerli One font

2015-09-06 Thread Gioele Barabucci
Package: wnpp
Severity: wishlist
Owner: Gioele Barabucci <gio...@svario.it>

* Package name: fonts-leckerli-one
  Version : 2011
  Upstream Author : Gesine Todt
* URL : 
http://www.example.org://www.google.com/fonts/specimen/Leckerli+One
* License : OFL-1.1
  Description : Leckerli One font

Leckerli One is a free Open Type font designed by Gesine Todt.
It is a fat display typeface with irregular brush shapes and a
handwritten feeling.



Accepted ruby-filepath 0.6-1 (source all)

2013-10-27 Thread Gioele Barabucci
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 15 Sep 2013 14:59:44 +
Source: ruby-filepath
Binary: ruby-filepath
Architecture: source all
Version: 0.6-1
Distribution: unstable
Urgency: low
Maintainer: Debian Ruby Extras Maintainers 
pkg-ruby-extras-maintain...@lists.alioth.debian.org
Changed-By: Gioele Barabucci gio...@svario.it
Description: 
 ruby-filepath - small library to manipulate paths
Closes: 723905
Changes: 
 ruby-filepath (0.6-1) unstable; urgency=low
 .
   * Initial release (Closes: #723905)
Checksums-Sha1: 
 0c239e7dcaf169e4af796ecf7ceb6494167cd487 2054 ruby-filepath_0.6-1.dsc
 a4ad7c31d028a91b4616804f5c63dc4ddac787c8 19073 ruby-filepath_0.6.orig.tar.gz
 69da814a6118f837a043354c4f2617c1a7a37227 5303 ruby-filepath_0.6-1.debian.tar.gz
 7952e2bd5fae5524b2645baec2cb017994cd5de7 12330 ruby-filepath_0.6-1_all.deb
Checksums-Sha256: 
 6a246e9a32119e6b25eac260effb30a3c44a16e06fb599d9f4883c92aff63bf4 2054 
ruby-filepath_0.6-1.dsc
 9160d8f745fa401c951365f4692a5ab3483cd96703f85143f0894b9cc80d5dba 19073 
ruby-filepath_0.6.orig.tar.gz
 b330a9c2af53c3ffa2f19d019698dfff7abda89b426830b898adaa132d68ae5a 5303 
ruby-filepath_0.6-1.debian.tar.gz
 1f4c07920c2d6696459c9fff9e9fcb64634c386cc4c2e82077986aa99efce5fe 12330 
ruby-filepath_0.6-1_all.deb
Files: 
 92a0b2b28aac14c852f01d9c7ac23b2b 2054 ruby optional ruby-filepath_0.6-1.dsc
 5edfd1c1e29c7e3b10a9fcb5f7b5c594 19073 ruby optional 
ruby-filepath_0.6.orig.tar.gz
 8a39d8b7d9b9fce35a72d45c8b4f137f 5303 ruby optional 
ruby-filepath_0.6-1.debian.tar.gz
 315e8fb7f160f7c407e95420a702da2a 12330 ruby optional 
ruby-filepath_0.6-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
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=dyIu
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vajoc-00023g...@franck.debian.org



Bug#725318: ITP: ruby-launchy -- helper class for launching cross-platform applications in a fire and forget manner

2013-10-03 Thread Gioele Barabucci
Package: wnpp
Severity: wishlist
Owner: Gioele Barabucci gio...@svario.it

* Package name: ruby-launchy
  Version : 2.3.0
  Upstream Author : Jeremy Hinegardner
* URL : http://rubygems.org/gems/launchy
* License : ISC
  Programming Lang: Ruby
  Description : helper class for launching cross-platform applications in a 
fire and forget manner

From the homepage:

 Launchy is helper class for launching cross-platform applications in a fire
 and forget manner.

 There are application concepts (browser, email client, etc) that are common
 across all platforms, and they may be launched differently on each platform.
 Launchy is here to make a common approach to launching external application
 from within ruby programs.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20131004054342.1786.83303.reportbug@nida



Bug#725320: ITP: rumember -- Remember The Milk Ruby API and command line client

2013-10-03 Thread Gioele Barabucci
Package: wnpp
Severity: wishlist
Owner: Gioele Barabucci gio...@svario.it

* Package name: rumember
  Version : 1.0.1
  Upstream Author : Tim Pope
* URL : https://github.com/tpope/rumember
* License : MIT
  Programming Lang: Ruby
  Description : Remember The Milk Ruby API and command line client

From the homepage:

 The sole motivation for this project was a quick way to capture to-dos
 from the command line. As such, I've chosen a chosen a very short command
 name of ru (something I'd normally never allow myself to do). All
 arguments are joined with spaces and used to invoke Remember The Milk's
 Smart Add feature.

 ru buy milk


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20131004054907.1827.51854.reportbug@nida



Bug#723905: ITP: ruby-filepath -- Small gem to manipulate paths

2013-09-20 Thread Gioele Barabucci
Package: wnpp
Severity: wishlist
Owner: Gioele Barabucci gio...@svario.it

* Package name: ruby-filepath
  Version : 0.6
  Upstream Author : Gioele Barabucci gio...@svario.it
* URL : https://rubygems.org/gems/filepath
* License : CC0
  Programming Lang: Ruby
  Description : Small gem to manipulate paths

From the gemspec:

The Filepath class provides immutable objects with dozens of convenience
methods for common operations such as calculating relative paths,
concatenating paths, finding all the files in a directory or modifying
all the extensions of a list of filenames at once.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130921053621.4229.40348.reportbug@nida