Bug#555979: debian-policy: Symlinks pointing beyond the root of the file system

2014-11-23 Thread Anthony Towns
On Sun, Nov 23, 2014 at 01:25:50PM +0100, Bill Allombert wrote:
 On Sun, Nov 23, 2014 at 01:58:41AM +, Anthony Towns wrote:
  On Sat, Nov 22, 2014 at 12:39:44PM +0500, Andrey Rahmatullin wrote:
   On Thu, Nov 12, 2009 at 04:31:52PM -0800, Russ Allbery wrote:
Lintian has a tag:
Tag: symlink-has-too-many-up-segments
Severity: serious
  
   + Symbolic links must not traverse above the root directory.
  
  This isn't listed in https://release.debian.org/jessie/rc_policy.txt 
  
  I don't see any reason why it should be RC; so s/must/should/ IMO.
 
 Is it your position that an issue that cause the FTP masters to reject the
 package at upload time is not necessarily RC ?

Yes; or more particularly, that FTP masters should reject packages with
any bug that's easy to fix and easy to detect with no (or very minimal)
false positives, whether it's RC or not.

Cheers,
aj


-- 
To UNSUBSCRIBE, email to debian-policy-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141123224220.ga29...@master.debian.org



Re: Bug#555979: debian-policy: Symlinks pointing beyond the root of the file system

2014-11-22 Thread Anthony Towns
On Sat, Nov 22, 2014 at 12:39:44PM +0500, Andrey Rahmatullin wrote:
 On Thu, Nov 12, 2009 at 04:31:52PM -0800, Russ Allbery wrote:
  Lintian has a tag:
  Tag: symlink-has-too-many-up-segments
  Severity: serious

 + Symbolic links must not traverse above the root directory.

This isn't listed in https://release.debian.org/jessie/rc_policy.txt 

I don't see any reason why it should be RC; so s/must/should/ IMO.

  for symlinks that contain so many ../ segments that they traverse above
  the root of the file system.  This tag is currently used by ftpmaster to
  reject uploads, but this behavior is not explicitly prohibited by Policy
  (although it violates both shoulds in 10.5).

Violating a should in policy means it is prohibited...

Cheers,
aj, thinking policy should just drop the must distinction entirely...


-- 
To UNSUBSCRIBE, email to debian-policy-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141123015841.ga8...@master.debian.org



Re: init system policy

2014-11-17 Thread Anthony Towns
On 16 November 2014 23:28, Anthony Towns a...@erisian.com.au wrote:

 Hi *,

 I've drafted up a document that I think matches reality on how init
 systems work in Debian. It's at:

   https://github.com/ajtowns/debian-init-policy

 and in (hopefully) easy-to-read pdf format at:


 https://github.com/ajtowns/debian-init-policy/releases/download/2014-11-16-1/init-policy.pdf


​Updated with various suggestions:

​
https://github.com/ajtowns/debian-init-policy/releases/download/2014-11-18-1/init-policy.pdf

​Cheers,
aj​


-- 
Anthony Towns a...@erisian.com.au


init system policy

2014-11-16 Thread Anthony Towns
Hi *,

I've drafted up a document that I think matches reality on how init systems
work in Debian. It's at:

  https://github.com/ajtowns/debian-init-policy

and in (hopefully) easy-to-read pdf format at:


https://github.com/ajtowns/debian-init-policy/releases/download/2014-11-16-1/init-policy.pdf

It's in three sections -- what admins should know, what daemon maintainers
should know, and what init-system maintainers should know. (The last
section isn't actually written up) I think it probably makes sense for
section 1 to end up as user docs, while section 2 and 3 should go into
policy, but for the time being I wanted to get it all in one place to make
it a bit easier to review, and make sure the advice to everyone is actually
consistent.

I've incorporated everything I think is relevant from current policy (in
theory the git history shows what I dropped; might not be that easy to
follow in practice). I've also included the status argument (bug#291148)
for init scripts, and documented LSB-style status messages versus echo
status messages.

​I'm not sure if it makes more sense to reincorporate it into the current
policy document, or have it as a separate document. Seems like there are
lots of independent policy documents these days (python, perl, etc), so
maybe a good approach would be to compromise by keeping the separate
policies as separate documents, but to package them all into
debian-policy.deb...

I've kept the musts to a minimum -- I think it makes sense to call things
RC if they're going to deadlock the system or otherwise seriously confuse
init, but everything else is just a regular bug (ie should). Happy to
change that if the release manager's think something I've missed something
crucial, but fairly opposed to severity inflation otherwise. Conversely,
I've left a lot of things as should (or should usually) -- I think it's
fair to call not supporting standard interfaces a bug, especially given
that doesn't necessarily force anyone to work on fixing it.

Anyway, corrections and additions appreciated; I'm not really an expert on
init systems, so I've probably missed some bits. Upstart, and openrc and
any other alternative inits could probably use some more info in
particular. I had a quick go at trying to figure out what the deal with
those was, but didn't really get anywhere. If anyone is up for giving a
rundown of how the heck all the non-init systemd stuff (logind,
systemd-shim, ...?) works when you're running a different init, that would
probably be useful for the third section. There might be some bits where
the rationale's not clear too.

I figure I'll post a patch to get this added to -policy towards the end of
the week; comments before then appreciated. Either on this list or as
issues (or pull requests!) in github would be best, I guess.

Cheers,
aj

-- 
Anthony Towns a...@erisian.com.au


Re: Phoning home

2008-02-26 Thread Anthony Towns
On Mon, Feb 25, 2008 at 04:25:28PM -0800, Steve Langasek wrote:
 On Mon, Feb 25, 2008 at 10:16:29AM +0100, Giacomo A. Catenazzi wrote:
  Speaking as a human being, I would suggest that Debian policy should be
  that all phoning home MUST be enabled explicitly, and MUST be turned
  off by default.
 should here would only mean that we've failed to correctly define phoning
 home.

So that'd be something like Packages should not communicate on the
network except as specifically necessary for their functionality. In
particular they must not `phone home' by contacting a central service to
report user statistics back to the author, unless the user specifically
enables that option. ?

Cheers,
aj



signature.asc
Description: Digital signature


Re: priorities

2008-01-09 Thread Anthony Towns
On Mon, Dec 10, 2007 at 05:38:50PM +0100, Marc 'HE' Brockschmidt wrote:
  We have:
  required/essential -- stuff that can't be removed: libc, dpkg, etc
  important -- the rest of base, stuff necessary to bootstrap and
  recover a usable and useful system
 I have to admit that I don't see why we can't merge those two. At the
 moment, these packages are in required without being marked as
 essential:
 debconf

For debootstrap, any package (that can be) pre-depended upon by an
important package must be required.

 debconf-i18n dselect e2fslibs gcc-4.2-base initscripts libacl1
 libattr1 libblkid1 libc6 libcap1 libcomerr2 libdb4.3 libdevmapper1.02.1
 libgcc1 liblocale-gettext-perl libncurses5 libpam-modules libpam-runtime
 libpam0g libselinux1 libsepol1 libslang2 libss2 libstdc++6
 libtext-charwidth-perl libtext-iconv-perl libtext-wrapi18n-perl libuuid1
 lsb-base makedev mawk passwd procps sysv-rc tzdata zlib1g

 I don't see what makes those required-but-not-important or why the
 packages in important aren't required.

Those are all depended on by essential packages...

Cheers,
aj



signature.asc
Description: Digital signature


Re: priorities

2007-12-07 Thread Anthony Towns
On Thu, Dec 06, 2007 at 11:03:08PM -0600, Manoj Srivastava wrote:
 Frankly, I suggest we look at the list of Unix commands as
  specified by the SUS -- which can also be seen at:
http://en.wikipedia.org/wiki/List_of_Unix_programs
 So -- how many of the standard unix commands as defined by that
  page are not part of the standard section?

I guess one of the the things I wonder every now and then
is whether we really should be keeping standard as implying a
... traditional/historical/whatever Unix system, with pr and lpr and tcsh
and bc and dc and whatever else that people would traditionally expect,
instead of moving them to a task that can be installed only by people
who actually know what they are, and then making sure we provide a real
Unix system in that case. But by the looks of things there's still not
much need for a change there, at least at this point.

Cheers,
aj



signature.asc
Description: Digital signature


Bug#432564: Allow debian/rules to not be a makefile

2007-12-06 Thread Anthony Towns
On Tue, Jul 10, 2007 at 01:42:03PM -0700, Don Armstrong wrote:
 On Tue, 10 Jul 2007, Russ Allbery wrote:
  I also could have sworn that we recently tightened this requirement,
  but I can find no mention of that in changelog with some quick
  searches. Am I just imagining things?
 It was tightened about 2 or 3 years ago, iirc.

See the previous policy bugs for this issue, 88111 and 148941:

  It'll have happened during Manoj's incorporation of the packaging-manual
  into policy. See 72949. You'll notice you seconded it... :)

-- http://lists.debian.org/debian-policy/2001/03/msg00020.html 

While they might seem old enough to have been lost in history, they were
only actually closed in April last year...

 Regardless, even requiring debian/rules to be a makefile doesn't
 actually do much, because someone could do something like: 
 .DEFAULT: 
 debian/irule $@
 or whatever.

 People should be using make, but if they have a valid reason for doing
 something else, policy shouldn't get in the way.

And policy doesn't get in their way, because they can just do the above...

Benefits of using a makefile include (as discussed in the previous
bug reports),

  Also the debian/rules VAR=VALUE ... syntax is used by dpkg-buildpackage.

  debian/rules [variable=value ...] target [variable=value ...]
  exit: 0 if OK, non-0 otherwise
  debian/rules -q target
  exit: 2 if target cannot be built (doesn't exist), non-2 otherwise

It looks like there was more in the thread than the bug log.

Cheers,
aj



signature.asc
Description: Digital signature


priorities (was: Re: RFC: cups as default printing system for lenny?)

2007-12-06 Thread Anthony Towns
Kind of reviving an old thread, but anyway:

On Sun, Nov 11, 2007 at 07:12:35PM +0100, Marc 'HE' Brockschmidt wrote:
 I believe it to be one of the more important bits of a standard Unix
 *desktop* installation - but this just reminds me of the fact that I'm
 quite uncomfortable with keeping a system like package priorities around
 for much longer. Diverging use-cases (like in this case) show that one
 definition of standard isn't really helpful anymore.

Haven't we more or less already moved away from priorities as meaning
anything particularly important? We have:

required/essential -- stuff that can't be removed: libc, dpkg, etc
important -- the rest of base, stuff necessary to bootstrap and
recover a usable and useful system
standard -- a minimal collection of useful stuff we'd like to see on
every Debian system
optional -- all the good software in the world
extra -- obscure stuff

All the really important questions are which bits of optional (and
occassionally extra) are useful for a given user.

I'm not sure if there's any point to continuing to try to make sure that
nothing = optional conflicts with anything else = optional.

 I think we may want to start thinking about getting rid of the whole
 thing and switching to something which allows us to express more complex
 importance measurements for packages. In fact, d-i and its task system
 have been a step in that direction, so we maybe should evaluate if we
 want to formalize it a bit more and get it into policy to replace
 priorities.

required and important are both needed by debootstrap, so can't be gotten
rid of (though they could be changed to use some other field/name).

Priority: standard currently contains:

at, bc, dc, lsof, file, less, sharutils, strace
dnsutils, ftp, host, ssh, mtr-tiny, finger, w3m, whois
doc-debian, doc-linux-text
exim, mailx, mutt, procmail, mime-support, mpack
gettext-base, locales
pciutils
perl (not just perl-base), python
reportbug
selinux policy

That seems a pretty reasonable set of functionality to put on all Debian
boxes (unless the admin specifically says otherwise), afaics.

It might be sensible to replace ftp with lftp these days, though. And
I'm not sure what happened to the exim v postfix defaults discussion a
little while ago, and maybe procmail/mpack aren't all that necessary.

It also includes, but afaics, probably doesn't need to (anymore):

ispell, dictionaries-common, iamerican, ibritish, wamerican
m4, texinfo (???)
mtools (access unmounted msdos filesystems, not NTFS though)
nfs-common, portmap (enables mounting NFS shares)
pidentd (is IDENT still used on today's internet, with all its NAT?)
openbsd-inetd  (needed by pidentd)
tcsh (people who remember what it is know how to install it)
time (???)
telnet (netcat is important, as is wget)

But as far as default installs for anything of any real meaning,
I just don't see Priorities as being relevant anymore.

Cheers,
aj



signature.asc
Description: Digital signature


Bug#432564: Allow debian/rules to not be a makefile

2007-12-06 Thread Anthony Towns
On Thu, Dec 06, 2007 at 06:31:50PM +0100, Lo?c Minier wrote:
 On Thu, Dec 06, 2007, Anthony Towns wrote:
   Regardless, even requiring debian/rules to be a makefile doesn't
   actually do much, because someone could do something like: 
   .DEFAULT: 
   debian/irule $@
   or whatever.
   People should be using make, but if they have a valid reason for doing
   something else, policy shouldn't get in the way.
  And policy doesn't get in their way, because they can just do the above...
  Except it completely breaks any hope to benefit of this new Policy
  requirement:

Uh, this isn't a new policy requirement. It's been a MUST in policy for
years before you even applied to be a DD, eg.

  - passing -j2 might not be honored (Policy doesn't require it anyway)
  - querying the list of targets (to check for build-arch for example)
with a make flag wont work either (Policy doesn't require it anyway)

That's true -- but at least by specifically hacking your way out of
make land by something like the above, it's clear that it's your job to
make those features work. It'll partially honour those things too, eg
make -j2 binary-indep binary-all will run both targets at once.

As opposed to writing debian/rules as a #!/bin/sh script and then
wondering why people are invoking it with weird flags, multiple targets,
or variables as parameters instead of in the environment.

Cheers,
aj



signature.asc
Description: Digital signature


Bug#402975: debian-policy: Introduce a requirement for internationalisation of debconf templates

2006-12-14 Thread Anthony Towns
On Wed, Dec 13, 2006 at 10:33:51PM +0100, Christian Perrier wrote:
 + Packages which use the Debian Configuration management
 + specification must allow for translation of their messages
 + by using a gettext-based system such as the one provided by
 + the packagepo-debconf/package package.

 I'm perfectly aware that this introduces a must without doing it a
 should before, which is probably not very common practice. However, given
 the low impact of this change after two NMU campaigns on existing packages
 to make them switch to po-debconf, this would indeed be possible, in my
 opinion.

I'd suggest should along with the use of usertags to track bugs that
aren't fixed, and regular NMUing to make sure the issues actually get
fixed as necessary.

I'm strongly in favour of having proactive translation and QA teams
that track classes of problems independently of the release team and
make use of NMUs and similar to ensure they're consistently fixed across
the distribution.  I think we've got the technology and the ability to
handle that without using the must/RC-severity stuff and bothering the
release team.

Cheers,
aj



signature.asc
Description: Digital signature


Re: First draft of review of policy must usage

2006-10-29 Thread Anthony Towns
On Sat, Oct 28, 2006 at 12:58:34PM -0700, Russ Allbery wrote:
 If a csh script does not start
 with /bin/csh (or name some specific csh implementation; maybe there's an
 opportunity for wording improvement) or doesn't depend on c-shell, it's
 broken and won't work on a Debian system.  That sounds rather RC to me.

If it were the only thing in a package it would be grave, but if it's
just a random script no one actually uses, it would just be a minor/normal
bug, afaics.

Cheers,
aj




signature.asc
Description: Digital signature


Re: Proposal to delay the decition of the DPL of the withdrawal of the Package Policy Committee delegation

2006-10-28 Thread Anthony Towns
On Fri, Oct 27, 2006 at 10:01:26PM -0500, Manoj Srivastava wrote:
  The technical committee charter and the policy process both adopt
  the principle that the people making the change [..] only act in an
  editorial capacity -- reviewing changes and committing them
  appropriately, but not do actual design work in their formal hats.
 But they also take the lead in discussions, and can and do
  decide if there are opposing opinions as to which opinion carries
  the day. Part of taking lead in the discussion is having the ability
  to say Stop, we have heard all arguments on this already, based on
  the current positions of people on the list, this option is what we
  shall decide to do..

Agreed absolutely.

The only point I'm emphasising is that you don't just have to hear the
arguments, you have to ensure they're made somewhere that others can
hear them too.

 Understand this: the old policy process proposal was written
  in this atmosphere. If you read back in the archives, you'll find
  that I did mention back in those days (and often later as well) that
  we had to walk softly, since we had no real constitutional authority
  to be changing at all.

Okay, that seems pretty clearly an untenable situation.

 Since there was no authority for a moderator, the process was
  overly bureaucratic.

My assumption had always been that the maintainers of debian-policy
would act as moderators.

  You said on IRC yesterday that you'd consider treating the current
  discussion as pre-proposal stuff, and follow the proper process once
  a conclusion was reached -- that sounds fine to me, but continually
  reserving the right not to do the BTS dance doesn't. If the
  process isn't suitable for the policy editors, it should be changed
  for everyone, rather than a short cut setup for the
  delegates/editors/ctte.
 The old process, meant for pre delegation days, really should
  be revised. It is not really followed in practice a whole lot, to be
  honest.

It was followed while bugs were actively incorporated into policy; iirc
that stopped for a while, and never really resumed. I couldn't say what
the correct process for getting a change into policy would be now (well,
two weeks ago), beyond post to -policy, and talk to Manoj.

 The stress should be on review, rough consensus, input from
  domain experts,  sane, _contained_ discussion, and technical
  correctness being the goal, not popularity of opinion. The old
  process did not really ensure any of this (apart from a nebulous
  consensus as a goal.)

Absolutely, though consensus should still be a goal, of course.

 I never said there will be no review. Indeed, since I am
  conducting this process, the review has to be even more strict -- I
  dare not abridge discussion nor decide what is expert testimony as
  readily as I would in a discussion I was not involved in. 

I don't think that's a desirable situation either; if a policy delegate
wishes to put forward a change, a different delegate should be around
to moderate discussion appropriately.
 
 In the old days, I had no authority to overrule even a single
  objection. Now I think that Debian has changed -- no matter what the
  issue, you can probably find a handful of very vocal people to block
  it. 

Heh.

So does something like the following sound plausible?

  1. Trivial policy updates that don't change the substance of policy
 (markup changes, fixing typos) will be made by the policy maintainers
 as they see fit.

  2. Other changes will have a patch submitted against a bug assigned
 to the debian-policy package in the BTS, and forwarded on to any
 developers specifically affected by the proposed changes.

  3. Once three developers or one of the policy maintainers (other than
 the proposer) have indicated they support the proposed change,
 the bug can be tagged confirmed, and will then be reviewed by
 the policy maintainers as a group.

  4. If the policy maintainers are satisfied with the proposed change, the
 patch will be committed to the policy revision control system and
 the bug will be tagged pending.

  5. If at any point the policy maintainers are not satisfied with
 the proposed change or the reasoning behind it, they may make
 suggestions tag the bug wontfix, and/or close the bug.

  6. Policy should be designed to meet the concerns of all developers, and
 all suggestions should be taken into account as far as possible.

That has a single process that applies to everybody, seems reasonably
quick for changes the maintainers propose, works even if there's only
one active policy maintainer, and requires at least one person other than
the proposer to review every change.

I'd suggest closing bugs that have been open for too long or seen too
much discussion with a message like If this change is still desired,
please open a new bug with a brief summary of discussion to date and the
latest proposal. 

Re: Policy delegation

2006-10-25 Thread Anthony Towns
On Tue, Oct 24, 2006 at 11:27:47PM -0500, Manoj Srivastava wrote:
 Given that there is no delegated power to change the technical
  policy, I can only see that the technical policy may be changed by a
  GR, or by the technical committee. 6. Technical committee

I think you're mistaken, and that policy maintenance comes under the
usual powers of the individual developers maintaining policy, namely
section 3.1 (make any technical or nontechnical decision with regard
to their own work). But you're the secretary, so on constitutional
interpretation your word's final.

  So the policy editors have no
  right to upload any new manual, unless the constitutional issues are
  clarified by the project.

As per that interpretation, I've added a REJECT for uploads of
debian-policy. I won't be looking into formally creating a new delegation
'til after etch has released, at which point I hope we can find at
least four people who'll be active in maintaining policy according to
the policy process we've had for quite some time.

 Since it would be unfair of any one who has write permissions
  to the policy 

All developers have the ability to upload new versions of policy (or at
least did, prior to the REJECT).

 Or, perhaps, the tech ctte can directly take over the policy
  manual, as provided for by the constitution. 

Maintenance of the policy manual is designed to be a lightweight task
that doesn't require significant creative or editorial judgement (that
being exercised in the drafting and discussion of proposed changes prior
to the actual inclusion), that doesn't seem entirely out of the question
should policy need updating prior to etch's release.

Cheers,
aj



signature.asc
Description: Digital signature


Re: First draft of review of policy must usage

2006-10-25 Thread Anthony Towns
On Wed, Oct 25, 2006 at 09:20:34AM -0500, Manoj Srivastava wrote:
 The only normative words are MUST, SHOULD, MAY, and
  RECOMMENDED.  I am considering using upper case where we expect
  conformance.

Didn't the definitions of MUST/SHOULD/MAY get removed in your patch though?

Cheers,
aj



signature.asc
Description: Digital signature


Policy delegation

2006-10-24 Thread Anthony Towns
Hi,

I'm withdrawing the Package Policy Committee delegation made by Branden
in June last year, in:

http://lists.debian.org/debian-devel-announce/2005/06/msg00017.html

That leaves debian-policy maintained by subscribers to the debian-policy
mailing list, according to the process described by the policy-process
document in that package. TTBOMK recent versions of policy have been
maintained using arch as the revision control system of choice, and are
available from:

http://arch.debian.org/arch/private/srivasta/archive-etch/debian-policy/

Policy describes itself thus:

This manual describes the policy requirements for the Debian GNU/Linux
distribution.  This includes the structure and contents of the Debian
archive and several design issues of the operating system, as well as
technical requirements that each package must satisfy to be included
in the distribution.

The policy-process document recommends that there be between 4 and 8
policy maintainers/editors, who do not have any special powers and in
particular do not have any creative power nor act as a central control
over the contents of policy. Anyone who would like to help maintain
policy is encouraged and welcome to do so, following the guidelines in
policy-process for proposing and uploading changes.

Cheers,
aj

-- 
Anthony Towns
Debian Project Leader


signature.asc
Description: Digital signature


Re: Automated testing - design and interfaces

2005-11-18 Thread Anthony Towns
On Fri, Nov 18, 2005 at 12:23:49PM +, Ian Jackson wrote:
 (Note: sorry about my earlier header mixup.  This thread is on the
 wrong list so I'm crossposting this reply to -project and -policy and
 have set Reply-To to point to -policy.  I will also quote more of
 Stefano's message than would usually be sensible, to give readers in
 -policy an easier time.)

This isn't even implemented, so it can hardly be ready to be added to
-policy; I think Steve was right in choosing -devel as the right list...

Cheers,
aj



signature.asc
Description: Digital signature


Re: Bug#224509: [PROPOSAL] Correct spurious promise regarding TTY availability

2003-12-21 Thread Anthony Towns
On Sat, Dec 20, 2003 at 02:23:36AM +0100, Tore Anderson wrote:
  Well, I considered submitting this bug on dpkg instead of policy.
  However, statements from the policy editors on numerous occations have
  given me the impression that policy seeks to document current practise,
  not enforce changes.  

Yes, and current practice is that a controlling terminal is required...

  Hence, as dpkg does not check for /dev/tty
  availability, I think it is policy that should change, not dpkg.

dpkg doesn't check that all Essential: yes packages are installed, either.
Which is to say, just because dpkg doesn't check some condition, it
doesn't mean that other packages will continue working if you violate it.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

   Linux.conf.au 2004 -- Because we can.
   http://conf.linux.org.au/ -- Jan 12-17, 2004


pgprZVnIgMOrX.pgp
Description: PGP signature


Re: Should we allow packages to depend on packages with lower priority values?

2003-12-19 Thread Anthony Towns
On Mon, Dec 08, 2003 at 03:17:19PM +0100, Marc Haber wrote:
 Let A and B both be packages that provide virtual package C. A is the
 default C in Debian, and is therefore Priority: important. A depends
 on E and F, which must be Priority: important as well, as required by
 current Policy.

 Now let's look at a system where the local administrator has decided
 to use B instead of A. 


 Since E and F are Priority: important, dselect
 happily proceeds to install E and F on the system, even if they are
 not needed since the system in question uses B instead of A.

Now let's consider what happens if they've already installed the system,
with A, and hence E and F. The run dselect, or apt-get, or even dpkg, and
install B, remove A and are left with B, E and F.

If that's not what's desired, your dependencies are wrong.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

   Linux.conf.au 2004 -- Because we can.
   http://conf.linux.org.au/ -- Jan 12-17, 2004


pgp3aIS5qijU2.pgp
Description: PGP signature


Re: Colons in upstream version.

2003-10-31 Thread Anthony Towns
On Sat, Nov 01, 2003 at 02:51:48AM +0200, Richard Braakman wrote:
 On Sat, Nov 01, 2003 at 01:19:51AM +0100, Josip Rodin wrote:
  On Sun, Oct 26, 2003 at 01:53:26PM +0100, Bernhard R. Link wrote:
   Policy 5.6.11 describes the upstream version part as:
   | if there is no epoch then colons are not allowed.
  ~
   Thus I suggest 5.6.11 to be changed so that colons are no longer allowed
  Please read and reconsider :)
 This just means that colons are _sometimes_ allowed in the upstream
 version (namely when the package already has an epoch for some reason).
 Having them sometimes allowed is even worse than having them always
 allowed, so it makes me support the proposal more strongly :)

Huh? Upstream versions can only sometimes have -es too, big deal.

I'd be more inclined to fix the tools, personally, or to say that
within Debian, we'll translate upstream colons to something else
than removing the support from dpkg or changing its meaning.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

Australian DMCA (the Digital Agenda Amendments) Under Review!
-- http://azure.humbug.org.au/~aj/blog/copyright/digitalagenda


pgpOG8oKWko5Y.pgp
Description: PGP signature


[EMAIL PROTECTED]: FHS 2.3 beta]

2003-09-17 Thread Anthony Towns
- Forwarded message from Christopher Yeoh [EMAIL PROTECTED] -
From: Christopher Yeoh [EMAIL PROTECTED]
Subject: FHS 2.3 beta
Date: Thu, 11 Sep 2003 11:30:40 +1000
To: Lsb-Discuss [EMAIL PROTECTED],
debian-lsb@lists.debian.org
X-Mailer: VM 7.17 under Emacs 21.3.2


A beta release of FHS 2.3 is now available. The original announcment,
together with diff is available here:

http://www.samba.org/~cyeoh/fhs_2.3_changes.txt

A PDF of the beta can be downloaded here:

http://www.samba.org/~cyeoh/fhs-2.3-beta.pdf

Please send any comments to [EMAIL PROTECTED]
or directly against the bug database at http://bugs.freestandards.org

Chris
-- 
[EMAIL PROTECTED]
IBM OzLabs Linux Development Group
Canberra, Australia
- End forwarded message -



Re: what is policy about?

2003-08-28 Thread Anthony Towns
On Wed, Aug 27, 2003 at 04:50:29PM -0400, Sam Hartman wrote:
 For example if the
 release team did not add some requirement because they didn't believe
 it was a best practice, I would find that problematic.

Let's rephrase that to be even simpler: if there was something in policy
that the release team didn't thing was best practice, that would be
problematic. That's true as long as the release team consists of people
who're fairly clueful about packaging, and applies to any other group
that's fairly clueful about packaging, too.

What I'm claiming is that having things that are considered best practice
be written down in multiple places is counterproductive and confusing; as
is mixing them up with things that aren't really about packaging at all.

 Basically I'm happy if things work together; I don't want a split of
 policy to turn into two competing visions of Debian.  I especially am
 uncomfortable with two competing visions of Debian when one of the
 visions is controlled by a roughly consensus-based process, but that
 one that matters is controlled by a small cabal.

Uh, yeah, *that*'s constructive.

You do remember that we tried getting RC policy to be controlled by
-policy, and it didn't work, right? Too many things that shouldn't be RC
getting made RC, too many things getting made RC by accident or default,
too much effort required to convince people that their pet fancy shouldn't
be RC, and the RC policy not being up to date enough when it counts,
and all.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

   ``Is this some kind of psych test?
  Am I getting paid for this?''


pgpUIkasUDfTj.pgp
Description: PGP signature


Re: what is policy about?

2003-08-27 Thread Anthony Towns
On Tue, Aug 26, 2003 at 02:02:44PM -0400, Sam Hartman wrote:
 I'd see it as a problem if there were some best
 practice in policy that was implemented by a good fraction of the
 packages but the release team were not willing to accept that practice
 as a release requirement.  

Nope, no chance of that. Release requirements are the _bare minimum_
requirements that package must satisfy. The simplest counter-example
is documentation. It's certainly best practice to write good user
documentation for all our programs and packages. While we mightn't
be there yet, I'd certainly hope that one day more than just a good
fraction of packages have good documentation. But nevertheless, I expect
we'll still be willing to accept new, undocumented or poorly-documented
packages in Debian when they have useful new features that aren't otherwise
available. 

Sure, not having documentation is still a bug, and it should be filed
and fixed, but that's a _far_ stretch from not being willing to make
the package available to users.

Again: there is _no_ need to think of policy as a stick to beat people
over the head with. We're _all_ sensible people who want to make Debian
the highest quality software distribution in existance, even if we
might disagree on how to go about it. We don't need to coerce people
with threats for every trivial little thing, and it's probably actively
harmful to try to do so. Policy's at its best when it simply says what
should be done, and explains why doing other things isn't as good;
not when it declares such-n-such must be done, lest the wrath of the
release manager descend upon you all.

Is having documentation for all your programs Debian best practice? Is
it Debian's policy to have documentation for all programs? Does Debian
require all programs to have documentation?

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

   ``Is this some kind of psych test?
  Am I getting paid for this?''


pgpzXqkFS2QSr.pgp
Description: PGP signature


Bug#207132: debian-policy is missing gcc transition plans

2003-08-26 Thread Anthony Towns
On Mon, Aug 25, 2003 at 12:26:16PM +0200, Josip Rodin wrote:
http://people.debian.org/~rmurray/c++transition.html
  Ps: you might want to consider retiring the libc6 transition document.
 I'd rather if we dropped all such transitional issues from the Policy
 manual. They're just bother and don't really have to be here to be mandated
 by the project (examples abound -- libc6-migration, fhs migration, C++ 3
 transition...). The technical committee can make a statement and be done
 with it.

I'd rather we stopped looking at policy as mandating things. There
are three things policy's trying to do at the moment:

1) specify technical standards, like version formats and package
   names

2) specify packaging and coding best practices

3) specify release requirements

All these things are necessary if we want to maintain Debian as a
highly integrated system -- people don't come to the project with the
same expectations and experience, and we don't want to inflict the same
mistakes on our users in perpetuity as new developers come along.

http://people.debian.org/~ajt/sarge_rc_policy.txt is a good start at
separating out (3), and I'm happy for the release team to continue
maintaining that, even though it obviously is a little redundant wrt
policy.

(1) is easy to separate out -- there's only a couple of sections that
specify APIs and formats rather than implications, mostly from the old
packaging manual.

That leaves (2) though, which really includes things like transition
documents, and subproject policies, and most of the current debian-policy
document.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

   ``Is this some kind of psych test?
  Am I getting paid for this?''


pgp8ZZlt10wZC.pgp
Description: PGP signature


Re: Bug#207132: debian-policy is missing gcc transition plans

2003-08-26 Thread Anthony Towns
On Tue, Aug 26, 2003 at 12:50:53AM -0500, Manoj Srivastava wrote:
   In my view, policy is supposed to represent the minimum set of
  rules that packages follow to allow the parts to dovetail together.

I don't think that makes sense -- getting packages to dovetail together
isn't something that can be achieved once and forever more; once we've got
libraries and file hierarchies making sense and fitting together, we're
not going to stop, we're going to start working on getting documentation
put together in more consistent fashions, or stop Gnome from spewing
assertions to xterms, or any number of other things.

But doing any of that requires a document that's willing to cover all
the things we're trying to achieve. Having many documents doesn't work,
because packagers coming to Debian need to be able to find *everything*
that affects them; having stuff undocumented doesn't work because
otherwise not only won't new people know it, but those of us who decided
what we'd do are liable to forget.

   The developers reference is the best repository of best
  practices -- common techniques that over time have been discovered
  to be desirable to adopt.

No, it's not. The developer's reference is about procedures; debian
policy is about packaging. And this is utterly appropriate; working
out what to do (packaging policy), and how to do (uploading policy) are
fundamentally different things. Procedures, like when to upload NMUs or
the use of DELAYED queues, change by dictate and mood; technical policy
whether you consider that best practices change only when new problems
are noticed, or when new procedures become possible.

Moving these things into other documents is a *mistake* -- it was a
mistake when we did it to the packaging manual, one which continues to
make policy confusing and difficult to follow, and it's a mistake to
extend chapter six of the developers reference.

  [...] but by and
  large, the goal is to pare it down to a ruleset _required_ for
  packages to interact and integrate tightly together.

What, exactly, do you think this means?

It's not required in the sense that the package won't be
allowed in Debian, or in a Debian stable release; that's
http://people.debian.org/~ajt/sarge_rc_policy.txt.

It's not required in the sense that the packages won't work at all,
or even that it won't work for the majority of people; that would be
even shorter than the sarge_rc_policy.

   I, however, agree that policy is not a stick to beat
  developers on the head with, which is another way of stating what you
  said.

The Axiom of Choice is obviously true; the Well Ordering Principle is
obviously false; and who can tell about Zorn's Lemma?

(You did just disagree with me, then restate my comment and agree with it,
right?)

If you're not going to beat people on the head with policy, the only
merit it has *at all* is as a compendium of well thought out advice to
package maintainers about how to do their work. That is the *precise*
definition of best practices documents.

By contrast, sarge_rc_policy is a list of requirements, and is something
to beat people over the head with.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

   ``Is this some kind of psych test?
  Am I getting paid for this?''


pgpRzo5ld1LpH.pgp
Description: PGP signature


Bug#206684: debian-policy: Proposal for going ahead with mandatory debconf use for prompting

2003-08-22 Thread Anthony Towns
On Fri, Aug 22, 2003 at 07:46:56AM +0200, Christian Perrier wrote:
 This proposal is what I think to be the next step : make this a must

This won't be happening for sarge. If you want it to happen, please focus
your efforts on finding packages that don't do it, and supplying patches
to add the features instead.

Cheers,
/\_
aj   -- wearing Release Manager hat

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

   ``Is this some kind of psych test?
  Am I getting paid for this?''


pgplfCJPMYIN3.pgp
Description: PGP signature


Bug#172436: Security concerns regarding browser proposal

2003-08-17 Thread Anthony Towns
On Mon, Aug 04, 2003 at 08:56:23AM -0400, Matt Zimmerman wrote:
 In making it safe, you are no longer implementing esr's specification.  It
 will break on nontrivial cases, such as the -remote commands for netscape:
 
 BROWSER=netscape -raise -remote \openURL(%s, new-window)\:lynx

Wouldn't something like

$ BROWSER=/usr/bin/netscape-remote
or
$ BROWSER=/home/aj/bin/browser
$ cat /home/aj/bin/browser
#!/bin/sh

if [ $DISPLAY ]; then
galeon $1
else
lynx $1
fi

make more sense and be simpler (ie, having programs invoke BROWSER directly)?

Wouldn't it then make more sense to have /usr/bin/sensible-browser be
used when BROWSER is unset, and have that do a slightly cleverer check
of which browsers are available? (alternatives-based using text-browser
and x11-browser and some fallbacks, maybe?)

Certainly that's more in line with how we handle EDITOR and such at
the moment.

Use of $BROWSER is then:

char *browser = getenv(BROWSER);
if (!browser) browser = /usr/bin/sensible-browser;

execl(browser, browser, url, NULL);

And security is a matter of ensuring sensible-browser, x11-browser and
test-browser can all handle arbitrary, unchecked input as $1. This can
probably be managed by either (a) checking that url doesn't start with
-, or (b) using wrapper scripts so lynx-browser invokes 'lynx --
$1', eg, or (c) changing the execl line to:

execl(browser, browser, --, url, NULL);

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

   ``Is this some kind of psych test?
  Am I getting paid for this?''


pgpNh2thqZR6S.pgp
Description: PGP signature


Bug#203650: Poor recommendation in dpkg-statoverride section

2003-08-17 Thread Anthony Towns
On Fri, Aug 01, 2003 at 02:05:02AM -0400, Joey Hess wrote:
 Andrew Suffield wrote:
  Hold that thought. We hashed out a few ideas on IRC; more in a few
  days. Meanwhile, let's assume it will be solved... anything else?
 I missed that discussion, but the obvious approach in fakeroot is user
 autovivification (to bottow a term from perl) on chown.

Or getpwnam(), maybe? How that'd mix in with getpwent() might be
confusing.

Debian packages aren't necessarily built under fakeroot, though, so this
can't necessarily be relied on.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

   ``Is this some kind of psych test?
  Am I getting paid for this?''


pgpekTm1rRR1L.pgp
Description: PGP signature


Re: Policy for 32-bit uids/gids?

2003-07-08 Thread Anthony Towns
On Wed, Jul 02, 2003 at 01:15:09PM -0500, Steve Langasek wrote:
 However, with the
 recent availability of 32-bit uids, this seems unnecessary.  I would
 suggest allocating a 16-bit range out of the remaining (2^32-2^16) uids
 for Samba's use, and the same for gids; even something as small as 5000
 uids should be ok, since admins always have the option of choosing a
 different range -- it's just a question of how useful the defaults will
 be to our users.

Is there any reason it should be a statically (and hence globally)
allocated 5000 numbers? Another way of doing it would be to have something
like:

/etc/reserved-uids
1:100 debian-static
100:999 debian-dynamic
1000:2 local
3:5 reservedA
6:64999 debian-static2
65000:65533 reservedB
65534 nobody
65545 reservedC
65536:7 samba

The theory being that:

adduser chooses a uid from the local block to do its thing

samba chooses uids from the samba block to do its thing

in your postinst, you ask how many uids may i reserve? with a
default answer of (say) 5000, and add that to
/etc/reserved-uids with some sort of update-reserved-uids
tool

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

   ``Is this some kind of psych test?
  Am I getting paid for this?''


pgpNqRjcSOuSU.pgp
Description: PGP signature


Re: Modernising menu manual icons requirement

2003-05-16 Thread Anthony Towns
On Wed, May 14, 2003 at 07:53:19PM -0400, Joey Hess wrote:
 Of course you'll get better results in such scaling if you have more
 colors available. The problem, I think, is that some of the window
 managers that support icons, like fvwm, do not do scaling, or don't do
 it very well.

Couldn't update-menus dump some pre-scaled icons into /var or /usr somewhere
for such window managers?

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

  ``Dear Anthony Towns: [...] Congratulations -- 
you are now certified as a Red Hat Certified Engineer!''



Re: Versioned Symbols

2003-03-11 Thread Anthony Towns
On Mon, Mar 10, 2003 at 10:47:40AM -0300, Henrique de Moraes Holschuh wrote:
 Agreed.  As far as programs build on Debian systems won't run elsewhere,
 it is just a matter of pushing the versioning of said core libraries to the
 LSB, which shouldn't be too difficult if we do it right and send in patches.

Uh, no, the LSB doesn't standardise every library that is shipped by every
distribution other than Debian.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

  ``Dear Anthony Towns: [...] Congratulations -- 
you are now certified as a Red Hat Certified Engineer!''



Re: Versioned Symbols

2003-03-09 Thread Anthony Towns
On Sat, Mar 08, 2003 at 04:16:47PM -0500, Sam Hartman wrote:
 I think that we should implement versioned symbols.  

Uhh, versioned symbols means that programs built on Debian systems won't
run elsewhere. That's not something we should be doing, except in very
specific cases where the gain outweighs the drawback.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

  ``Dear Anthony Towns: [...] Congratulations -- 
you are now certified as a Red Hat Certified Engineer!''


pgptOckMPsbDE.pgp
Description: PGP signature


Re: [devel-ref] author/homepage in description

2002-12-17 Thread Anthony Towns
On Mon, Dec 16, 2002 at 12:12:08PM +0100, Wichert Akkerman wrote:
 Previously Adam DiCarlo wrote:
  Well, before I venture on this, is there a way we can store certain
  data in control.tar.gz or something but without bloating the Packages
  file?
 No.

Well, strictly, there obviously is: postinsts don't end up in Packages.gz
after all. It doesn't make any sense for this though.

 It is relevant to the discusison though.. do we want to bloat the
 Packages file with usptream author  homepage information as well?

The Packages file is mainly meant to be all the information you
should need to work out whether you want to install a package or not:
description, what other packages you need, a file name to download,
etc. A More-Info-URL: field might make sense here in that it'd let
you find out more about the package, see screeenshots and so forth.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

``Australian Linux Lovefest Heads West''
   -- linux.conf.au, Perth W.A., 22nd-25th January 2003



Bug#170019: debian-policy: Ambiguity in section 11.7.2 (Configuration files: Location)

2002-11-21 Thread Anthony Towns
On Thu, Nov 21, 2002 at 12:40:32PM +0100, Josip Rodin wrote:
 Frankly, it should be enough to simply mandate /etc for all configuration
 files, I don't know why we keep this exception for other directories.

Technically, it's enough to mandate /etc, but suggesting the use of
symlinks from /usr might make life a bit easier for some maintainers who
are aghast at the thought of rewriting upstream to use /etc natively.
*cough*143825*cough*

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''



Bug#167422: general: files in /usr/share should be world-readable

2002-11-11 Thread Anthony Towns
On Sun, Nov 10, 2002 at 11:26:31AM -0800, Thomas Bushnell, BSG wrote:
  /usr/share is not appropriate for that, as it is the OS's playground
  (and I can't see any use for the OS installing secrets there). 
  For site-specific secrets /usr/local/share is a better choice.
 root users is not somehow not the OS.  For example, root users store
 secrets in the shadow password files.
 I'm speaking of secrets that *OS* programs need to have, and which
 should be shared among cooperating machines.

That doesn't particularly make sense. If the secret is distributed
as part of Debian, it's not a secret -- anyone can buy their own copy
of Debian, pull apart the debs and find out what it is themselves quite
happily. So the secret has to vary between machines, which either makes
it configuration info that's site specific, in which case it should go
into /etc, or variable data maintained entirely by a program, in which
case it should go into /var, or completely site-specific in which case
it should go somewhere site-specific, like /home, /srv, /usr/local, etc.
The contents of /etc and /var are allowed to be shared amongst machines,
it's simply expected that which files get shared and how is more
complicated than for /usr, since they're much more site-specific.

For reference,

$ find /usr \! -perm -004
$

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''



Bug#167422: general: files in /usr/share should be world-readable

2002-11-11 Thread Anthony Towns
On Sun, Nov 10, 2002 at 10:02:42PM -0800, Thomas Bushnell, BSG wrote:
 One such thing that can be shared, but which should also be secret, is
 a nethack bones level file.  That shouldn't go in /var, because it
 *should* be shared normally by a group of cooperating machines.

Portions of /var are sharable:

   Here is a summarizing chart.  This chart is only an example for a common
   FHS-compliant system, other chart layouts are possible within FHS-
   compliance.

  +-+-+-+
  | | shareable   | unshareable |
  +-+-+-+
  |static   | /usr| /etc|
  | | /opt| /boot   |
  +-+-+-+
  |variable | /var/mail   | /var/run|
  | | /var/spool/news | /var/lock   |
  +-+-+-+

If you want to share nethack bones files, you put them in /var/games/nethack,
or similar, then share it.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''



Bug#167422: general: files in /usr/share should be world-readable

2002-11-11 Thread Anthony Towns
On Sun, Nov 10, 2002 at 11:02:51PM -0800, Thomas Bushnell, BSG wrote:
 Still, I'm loath to create extra rules that we don't need.  In
 general, yes, *every* file should be readable, and it's appropriate to
 file bug reports for the Debian packages which needlessly prevent
 files from being readable.  But I don't think we should ensconse a
 rule here.

We've already got that as a rule, anyway, see 11.9. Permissions and owners:

 Files should be owned by `root.root', and made writable only by the
 owner and universally readable (and executable, if appropriate), that
 is mode 644 or 755.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''



Re: Essentialness of awk

2002-09-28 Thread Anthony Towns
On Fri, Sep 27, 2002 at 03:49:09PM +0200, Santiago Vila wrote:
 Several years ago it was agreed that awk would be essential (which
 is currently implemented by a Depends: awk in base-files).

Err, shouldn't base-files Pre-Depends: awk? (In effect, base-files is the
Essential: yes package that provides the awk functionality (since mawk
and gawk *aren't* Essential: yes), so it should use a Pre-Depends:
to ensure that functionality is available even while base-files is
unconfigured.

 I was going to propose a patch against the current policy document,
 but there is a little problem:
Since dpkg will not prevent upgrading of other packages while an
essential package is in an unconfigured state, all essential packages
must supply all of their core functionality even when unconfigured. If
the package cannot satisfy this requirement it must not be tagged as
essential, and any packages depending on this package must instead
have explicit dependency fields as appropriate.

Since awk and gawk aren't tagged Essential: yes, I'm not sure this
really applies.

 This paragraph was added to fix Bug#50832 but if we follow it strictly
 then all the awk packages are in violation, since they use the
 alternative mechanism to update the awk symlink in /usr/awk and
 therefore do not provide their core functionality until they are
 configured.

Given that a /usr/bin/awk link is made available as part of the initial
install, I don't think there's any way of it becoming unavailable even
though alternatives are used.

 More to the point, I don't see why we should not be able to do the
 same with /bin/sh and bash/dash. 

Suppose bash version X includes /bin/sh in the .deb; bash version Y (
X), doesn't.

# dpkg --install bash_Y*.deb foo*.deb

bash Y is unpacked over the top of bash X; /bin/sh is removed if present
since it's no longer in the package
foo's #!/bin/sh preinst script is run, it dies horribly, dpkg aborts

I think it's possible to avoid this by having bash Y's preinst dpkg-divert
/bin/sh, and make a new symlink that's not controlled by dpkg in preinst,
then unpack, then use update-alternatives in postinst. I actually thought
that's roughly what bash was doing these days, but apparently not. Using
dpkg-divert like that is probably fairly risky -- I'm not sure how it'll
cope with the various things people are already doing to /bin/sh --
so you'd want to be fairly thorough working out how every possible case
would be handled.

 As of today, is it still true that
 dpkg will not prevent upgrading of other packages while an essential
 package is in an unconfigured state? Why should dpkg unconfigure an
 essential package to begin with?

apt-get will try to avoid it, dpkg won't. dpkg treats Essential: yes as
don't let me accidently --remove or --purge it, it's only convention
that lets us treat them as you don't need to specify a dependency on
these packages.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgpPkXgP60QdC.pgp
Description: PGP signature


Re: Essentialness of awk

2002-09-28 Thread Anthony Towns
On Fri, Sep 27, 2002 at 06:09:13PM -0400, Joey Hess wrote:
 (The other special cases I am aware of are the daemon starting mess,
 which will be fixed by invoke-rc.d, some fairly unavoidable dpkg
 bootstrapping, some timezone thing, and an exim mess since it still
 doesn't use debconf.)

The aim was to drop exim from base entirely to make the postfix and qmail
types all happy. We missed that for woody, but we ought to be able to do it
for sarge.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''



Re: Essentialness of awk

2002-09-28 Thread Anthony Towns
On Fri, Sep 27, 2002 at 09:59:25PM +0200, Santiago Vila wrote:
 What I mean is that the current policy wording about essential
 packages is sub-optimal. The important thing is not that essential
 packages work even if they are unconfigured, the important thing is
 that once they are configured (by debootstrap) they should not be
 unconfigured again.

No -- they're unconfigured every time dpkg unpacks a new version. That's
what unconfigured means.

I think I understand what you're getting at, but I can't think of a way
to say it. There's a problem that if there's a new required package then
it has to fail to break any essential packages when you start unpacking
and installing it. Mostly that can be handled by pre-depends: (for new
libraries that essential packages need) and replaces: (for splitting
essential packages), I think.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgpwWiy808j8g.pgp
Description: PGP signature


Re: Essentialness of awk

2002-09-28 Thread Anthony Towns
On Sat, Sep 28, 2002 at 01:53:58PM +0200, Santiago Vila wrote:
   I was going to propose a patch against the current policy document,
   but there is a little problem:
  Since dpkg will not prevent upgrading of other packages while an
  essential package is in an unconfigured state, all essential packages
  must supply all of their core functionality even when unconfigured. If
  the package cannot satisfy this requirement it must not be tagged as
  essential, and any packages depending on this package must instead
  have explicit dependency fields as appropriate.

  Given that a /usr/bin/awk link is made available as part of the initial
  install, I don't think there's any way of it becoming unavailable even
  though alternatives are used.
 Exactly, but still none of the awk packages will work when unconfigured
 (before they are bootstrapped), as policy seems to forbid.

I don't really see what relevance policy has to bootstrapping in that
sense; I mean, dpkg is unpacked before libc6 (they're done alphabetically
initially, iirc) which violates a pre-depends, eg. Even essential packages
are allowed to assume /usr/bin/awk works before they're installed,
that the mawk and gawk packages happen to assume that fact in order to
ensure that /usr/bin/awk continues working while they're unpacked is no
great problem.

  # dpkg --install bash_Y*.deb foo*.deb
  bash Y is unpacked over the top of bash X; /bin/sh is removed if present
  since it's no longer in the package
  foo's #!/bin/sh preinst script is run, it dies horribly, dpkg aborts
 Indeed, but bash version Y (X) which does not provide /bin/sh in the .deb
 is, in some way, a step backwards as far as bootstrapping is concerned.

It's no big deal either way.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''



Bug#162120: debian-policy: Deletion of configuration files--should it be preserved?

2002-09-25 Thread Anthony Towns
On Tue, Sep 24, 2002 at 09:05:12PM -0700, Thomas Bushnell, BSG wrote:
 I didn't say that it was the best way to go about things; even Manoj
 didn't say that.

So you're saying bugs should be filed to encourage packages to choose
a less optimal way of doing things than what currently happens?

 No, a perfectly reasonable alternative would be to change policy to
 match.  I don't care which alternative is chosen.

And, further, you don't actually care which is the best solution, but
you're trying to sanctify it for future generations?

Look everyone, the policy process failing as you watch!

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgpa7xN7YvNv4.pgp
Description: PGP signature


Bug#162120: debian-policy: Deletion of configuration files--should it be preserved?

2002-09-25 Thread Anthony Towns
On Wed, Sep 25, 2002 at 12:47:29PM -0500, Manoj Srivastava wrote:
   I fail to see a reason why we should over ride user changes
  whener we, the maintairners, feel a capricious whimsy to doso, even
  when we believe our way is the one true way, and the silly admin
  ought to know better than to meddle in the affairs of his betters.
 
   manoj
  trying to counter some rhetoric on this report

If you're trying to counter some rhetoric, could you _please_ do it
with something other than rhetoric of your own?

No one is saying that rewriting your /etc/inetd.conf to remove all the
local changes you've made is a clever thing to do. You're not arguing
against people not preserving user changes in general, you're arguing
against the specific case of reinstating removed configuration files.

Now, you gave an example in another message that you might want to do
that in creating a honeypot. I've no idea why you would -- removing the
config file doesn't buy you anything (the daemon still starts, you can
still start the daemon with other options if you either edit the config
file or specify a different config file on the command line), and a better
effect can be achieved by making it so you can remove inetd entirely
(which was what the thread on -devel was originally about). If you need
the same effect you would get by removing the file, you can simply clear
it or comment everything else, which also has the benefit of the results
matching your intuition (ie, inetd starts, and nothing happens).

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''



Bug#162120: debian-policy: Deletion of configuration files--should it be preserved?

2002-09-24 Thread Anthony Towns
On Tue, Sep 24, 2002 at 11:11:20AM -0500, Manoj Srivastava wrote:
 justification: this is not a flaw in the policy, at best, this may be
 a proposal to change policy to codifying, in my opinion, a less
 desirable behaviour, and should be treated like any other proposal

For heaven's sake, does someone have to disagree with _EVERYTHING_?

   Sorry, this is a bug in those packages. 

No, it is not.

 dpkg has always had
  the correct behavour of not reinstalling conffiles that are removed;
  and so do packages managing configuration files using ucf.

That's really great. The reason some packages _don't_ use dpkg or ucf for
managing their configuration files is because dpkg's and ucf's behaviour
is _not_ always desirable. That's an utterly bogus line of argument,
and an absolutely _meaningless_ one -- it's making policy for policy's
sake rather than because it actually benefits anyone.

   Policy, while documenting practice for the most part, should
  not recommend or condone broken behavour just because packages are
  broken.

The. Packages. Are. Not. Broken. It's that simple. How many times have you
found base-passwd recreating /etc/passwd and /etc/group a nuisance? Never?
Funny that.

Why the fuck do we have to have a debate about this?

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgp3dhOVdk7AK.pgp
Description: PGP signature


Bug#162120: debian-policy: Deletion of configuration files--should it be preserved?

2002-09-24 Thread Anthony Towns
On Tue, Sep 24, 2002 at 07:54:15PM -0700, Thomas Bushnell, BSG wrote:
 We have to have a debate about it because there is an actual
 substantive disagreement between you and Manoj.  

Really? What is it? I only saw comments that amount to I interpret
policy this way and other things do it this way, neither of which is
a response to my original request for someone to give a good reason why
randomly deleting config files of installed packages is the best way to
go about things, and should be supported.

 If you don't think
 it's that important, then say so, and Manoj could put in a policy
 change to make explicit that deletions must be preserved.

Well, I suppose I could change the scripts to cope, and change inetd to
just enable all its internal services unless told otherwise, so anyone
who was stupid enough to think removing the config file would do any
good could get their machine DoS'ed off the .net thanks to a handful of
untracable spoofed packets. Because, hey, personal whims, and the letter
of policy are what matters, not the needs of our userbase, right?

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgpOq1UedMSBo.pgp
Description: PGP signature


Bug#32263: Splitting CGI-BIN

2002-09-23 Thread Anthony Towns
On Mon, Sep 23, 2002 at 05:34:44PM -0500, Manoj Srivastava wrote:
   Have we decided on whether aj's proposed changes (below) are
  what we reached a consensus on?
 ==
  /usr/lib/cgi-bin/
  packages dump CGI scripts in here willy-nilly
  ~wwwdata/cgi-bin/
  packages make symlinks to /usr/lib/cgi-bin/blah in postinst,
   based on some setting in /etc/ somewhere
  So that admins can just rm symlinks to scripts they don't need, or,
  if they want to be absolutely sure they don't get any cgi-bin scripts
  they don't want, change the config file.
 ==
   Hmm. What happens if I remove a symlink, and then the package
  is upgraded?

I'd assume what we'd want is for the symlink to stay removed. Something like:

if [ $1 = configure ]; then
  if [ $2 =  ] || dpkg --compare-versions $2 -lt 1.0.3-5; do
# first install, or first install since support for update-cgi 
# added
update-cgi --add /usr/lib/cgi-bin/foo
  fi
fi

should handle that, I think.

Probably with:

update-cgi --disable /usr/lib/cgi-bin/foo
(which notes whether or not there was a symlink for foo
 somewhere and removes the symlink, for dpkg --remove)

update-cgi --enable /usr/lib/cgi-bin/foo
(which looks at the note, and recreates the symlink if 
 appropriate)

update-cgi --remove /usr/lib/cgi-bin/foo
(which just removes the symlink)

at appropriate places in the *rm scripts.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''



Bug#32263: Splitting CGI-BIN

2002-09-20 Thread Anthony Towns
On Fri, Sep 20, 2002 at 12:13:25AM -0500, Manoj Srivastava wrote:
   Would it not be a desirable goal to ultimately have the users
  using the /cgi-lib for system scripts, and /cgi-bin for local
  scripts, and have distinct name spaces?

I don't see why?

There are two reasons for name spaces: you need one so that packages
can dump their files on the filesystem without having to worry about
overwriting users' CGI scripts. You also need a namespace so you can
decide which scripts are available for the webserver -- this might be a
full hierarchy, effectively, if you're serving different web sites and
want different CGI scripts available on each.

I don't see any value to letting the guy browsing your website be able
to tell the difference between local CGI scripts and remote ones though.
It seems beneficial not to, even, so you can have replace your homebrew
build of http://example.com/cgi-bin/analog with the prepackaged version,
without having to do any work or put any thought into it. 

Maybe I don't understand the cases where you want to have a link to
a CGI script in a package, though? Perhaps the real problem comes when
dealing with subsystems that happen to be operated through CGI scripts --
linuxconf or similar things do that, don't they? I'm not really seeing any
cases where that's a nuisance to deal with, but I don't use such things,
so maybe that's where I'm missing something?

Cheers, 
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''



Bug#32263: Splitting CGI-BIN

2002-09-19 Thread Anthony Towns
On Thu, Sep 19, 2002 at 11:26:54AM -0400, Brian White wrote:
  What would y'all think about having cgi-bin managed more like, umm:
  /usr/lib/cgi-bin/
  packages dump CGI scripts in here willy-nilly
  ~wwwdata/cgi-bin/
  packages make symlinks to /usr/lib/cgi-bin/blah in 
  postinst,
   based on some setting in /etc/ somewhere
 This has how I've done my site, but it's a pain.  

It's only a pain because at the moment you have to make the symlinks
yourself, though, isn't it?

 Also, many webmasters
 run virtual websites and thus such symlinks would have to be done (or not
 done) for each webspace and that's not something can be easily automated.

Hrm. If they want the same CGI scripts on all their web sites, it's easy,
just point the cgi-bin alias for each vhost to the one directory.

If they want fine-grained control over their CGI scripts (This client
only gets access to any given CGI script when it's approved by the
techies, and they pay $5), then it's not an issue, since they'll be
making the symlinks by hand anyway.

It's only when they want fine-grained control of local CGI scripts,
but all the pre-packaged CGI scripts on each vhost, that we could do any
better. Of course, if they _really_ want that, they could just setup the
cgi-lib alias themselves. But I would've _thought_ the other two cases
would be the common ones, though?

Actually, fixing that'd be trivial too. Make your config file look like:

] $ cat /etc/cgi-scripts
] cgi-symlink-dirs=/var/www/cgi-bin /srv/foo.com/cgi-bin /srv/bar.com/cgi-bin

and have an update-cgi script of some sort that does the parsing for you.

You could be a little bit more fine-grained too, if that was worthwhile.

Being able to easily disable a couple of prepackaged CGI scripts seems
like a common enough behaviour to optimise for.

Or maybe not, of course.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgpOPMe1nVSfq.pgp
Description: PGP signature


Bug#160776: debian-policy: [PROPOSAL] debconf spec updates to conform with reality

2002-09-17 Thread Anthony Towns
On Fri, Sep 13, 2002 at 11:46:59AM -0400, Joey Hess wrote:
 These modifications to the debconf spec simply make it conform to the
 reality of how some things work now. This is part of an effort to make
 debconf and cdebconf better substitutes for each other.

Seconded.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''



Bug#160248: section 13.3 unnecessarily obscure

2002-09-09 Thread Anthony Towns
On Mon, Sep 09, 2002 at 07:20:14PM +0100, Andrew Suffield wrote:
 + The system administrator should be able to delete files in
 + `/usr/share/doc' without causing any programs to break. A package
 + should not directly reference files that it places there. 

Sure it should: ``further documentation may be found in
/usr/share/doc/foo''.  Better would probably be to say A package should
not require the existance of any files in /usr/share/doc to run. Which
is pretty much repeating yourself, if that matters.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''



Re: [RFC] *-rc.d - rc.d-* transition

2002-09-08 Thread Anthony Towns
On Sun, Sep 08, 2002 at 11:58:31AM -0700, Chris Waters wrote:
 The second
 reason is also about consistency: during the transition, there will be
 some packages using update-rc.d and some using rc.d-update, which may
 confuse people studying our packages.  Not strong reasons, but reasons
 nonetheless.

It also breaks partial upgrades once the transition is complete:
upgrading sysvinit to an rc.d-update only version will mean you're
no longer able to upgrade old packages to anything but rc.d-update
compliant versions.  If one of those packages happen to have become
unmaintained in the meantime, you're a bit screwed. There's no way of
avoiding this, since update-rc.d is considered essential and no one
depends on it. You could do a tedious usr/share/doc-style transition over
two or three releases, but there just isn't any point to all this. How
pretty names are isn't *that* important. If they were, we'd've changed
/etc to /conf and so on years ago.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgpnIOcIYPTmV.pgp
Description: PGP signature


Re: [RFC] *-rc.d - rc.d-* transition

2002-09-07 Thread Anthony Towns
On Fri, Sep 06, 2002 at 06:50:03PM -0300, Henrique de Moraes Holschuh wrote:
 As it was talked in Debconf2, we would be better off if we renamed all
 *-rc.d utilities (invoke-rc.d, policy-rc.d, update-rc.d) to rc.d-*
 (rc.d-invoke, rc.d-policy, rc.d-update).

Uh, that seems entirely gratuitous.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgphy9BNwBVa2.pgp
Description: PGP signature


Re: [RFC] *-rc.d - rc.d-* transition

2002-09-07 Thread Anthony Towns
On Sat, Sep 07, 2002 at 01:14:17PM +0200, Andreas Schuldei wrote:
 * Anthony Towns (aj@azure.humbug.org.au) [020907 13:11]:
  On Fri, Sep 06, 2002 at 06:50:03PM -0300, Henrique de Moraes Holschuh wrote:
   As it was talked in Debconf2, we would be better off if we renamed all
   *-rc.d utilities (invoke-rc.d, policy-rc.d, update-rc.d) to rc.d-*
   (rc.d-invoke, rc.d-policy, rc.d-update).
  Uh, that seems entirely gratuitous.
 I can not parse your comment.

It's a waste of time, for no technical benefit. If we have to change the
name anyway, then choosing a better name is worthwhile, but we don't need
to change the name, so we shouldn't go around deprecating every single
script that manages init.d scripts, and confusing all the developers
and admins who've already taken the time to learn how update-rc.d works.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgp44asywSFKP.pgp
Description: PGP signature


Re: Debian LSB Status

2002-08-30 Thread Anthony Towns
On Thu, Aug 29, 2002 at 06:57:38PM -0500, Chris Lawrence wrote:
  It had been my
  understanding that our init system and/or runlevels were an issue as
  well; is that a part of the spec we don't have to comply with for the
  specific certification we are seeking?  
 [The] 1.2 spec [clarified] that the expected behavior of init scripts and
 runlevels called for in the specification only applied to
 LSB-conformant applications, and not to LSB-conformant implementations
 (i.e. distributions). 

There were actually a couple of other init-script related problems too.

One was that the LSB allowed LSB packages to specify which runlevels
they'd be run in, and gave meanings to those runlevels -- which, naturally
enough, matched Red Hat's defaults and didn't match ours. This has been
fixed to allow the install_initd binary to map them as appropriate. Our
install_initd doesn't actually take advantage of this possibility at the
moment, though. See:
  http://www.linuxbase.org/spec/refspecs/LSB_1.2.0/gLSB/runlevels.html

Another was that the LSB claims control over the /etc/init.d/ namespace,
and thus limits the scripts distributions can put in there without
risking a conflict with some future LSB package. All the init.d scripts in
woody/i386 are reserved for LSB compliant distributions, however, so this
shouldn't be a problem. See http://www.lanana.org/lsbreg/init/init.txt
Note that we should probably either make a practice of registering our
script names with LANANA as we create them in future, or start using
/etc/init.d/debian.org-foo. :-/

I'm not sure which of these would've been what was discussed at debconf,
but they've all been adequately fixed, as far as I'm aware.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgpIsK8ihjIaP.pgp
Description: PGP signature


Bug#81852: Why do non-free programs with crypto have to be treated differently?

2002-08-30 Thread Anthony Towns
On Fri, Aug 30, 2002 at 09:20:25PM -0500, Manoj Srivastava wrote:
   Proposal is to change section 2.1.5 of the Debian policy to say:
  Non-free programs with cryptographic program code need to be stored
  on the non-us server because of export restrictions of the U.S.
   Umm. Is this right? Why are non-free programs being treated
  differently? 

Yup, it's right. They're treated differently because not all non-free
crypto software can be exported from the US under the exemption we're
using. It would probably be possible to handle some of it, but working
differentiating between dfsg-free/non-free is hard enough, without adding
a non-free-but-okay-for-crypto-export category too.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''



Re: Debian LSB Status

2002-08-28 Thread Anthony Towns
On Thu, Aug 15, 2002 at 07:37:10AM -0700, Grant Bowman wrote:
 What is (specifically) the current Debian perspective on LSB status?

Debian 3.0r0 (woody), is close, but not quite, in compliance with LSB 1.2.
The outstanding issues are:

* alien's permissions and ownership handling (the woody version
  uses the cpio portion of the rpm exclusively, which is buggy;
  the version in unstable fixes the known problems)

* pax has a minor POSIX violation wrt the major/minor numbers in
  non-device fields (also fixed in unstable)

* our glibc has a number of POSIX compliance bugs; see Bug#156821

* kernel 2.4.18 has a number of POSIX compliance bugs, fixed
  in 2.4.19. There're 2.4.19 kernel-images in unstable, but the
  bf2.4 version used for boot-floppies hasn't been updated; see
  Bug#158026.

* our glibc has the traditional Linux version of nice(), whose
  behaviour doesn't comply with POSIX. A waiver's been requested,
  see: http://www.opengroup.org:8000/lsb/publicpr/PRView?PR=0014

* the LSB runtime tests have buggy implementations of the msync
  and mprotect tests -- the former results in a false FAIL, the
  latter in a false FAIL or a hang, depending on your circumstances.
  Waivers have been granted for these, see:
http://www.opengroup.org:8000/lsb/publicpr/PRView?PR=0009
http://www.opengroup.org:8000/lsb/publicpr/PRView?PR=0010

The alien, pax, and kernel changes should be fine for a point revision
of woody, as should the glibc changes in Bug#156821, if accepted by
the maintainers. The nice() changes probably aren't acceptable for a
point revision (that's Joey's (Martin Schulze, stable release manager)
opinion and mine, anyway), but it seems plausible that a waiver can be
granted at least for the time being.

In the meantime, you should be able to make your system LSB 1.2
compliant by:

(a) running woody
(b) adding deb http://people.debian.org/~ajt/lsb/ woody/lsb main
to your sources.list, and installing libc6, and alien
(c) running a 2.4.19 (or later) kernel
(d) installing the lsb package

and you should be able to demonstrate your system's complaince by:

(e) installing pax (from the woody/lsb site)
(f) installing tcsh
(g) downloading the lsb-runtime-tests package from
  http://ftp.freestandards.org/pub/lsb/test_suites/released/binary/
(h) installing the test suite with `alien -ic lsb-runtime-tests-*.rpm'
(i) setting up a password for the new vsx0 user, logging in as the
vsx0 user (preferably at the console), and running ./run_tests
(accepting the default options)
(g) kill -9'ing the T.mprotect processes when they hang the
test suite

Note the tests take many hours to run, and that they create users and put
include many setuid root binaries that are probably trivially exploitable,
and it's probably a good idea to reformat and reinstall after running it.
The testsuite isn't really meant for users to run over their own system.

Finally, if you find an LSB package you want to install in general, running

(h) alien -i lsb-blah-*.rpm

on it. (The extra `-c' for the lsb-runtime-tests rpm is due to a bug in the
runtime-tests: it's missing the required dependency on lsb)

Anyway, once there's a decision on the nice() issue, we'll be aiming to
get an official compliance statement done so as to obtain the available
bragging rights.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgpqNjGlRpipa.pgp
Description: PGP signature


Re: Bug#157131: PROPOSAL] Suggest to minimize optimization when DEB_BUILD_OPTIONS contains debug

2002-08-19 Thread Anthony Towns
On Mon, Aug 19, 2002 at 01:14:31PM +0200, Josip Rodin wrote:
 On Sun, Aug 18, 2002 at 06:48:24PM -0500, Branden Robinson wrote:
  (BTW, someone's mailer is a complete piece of crap.  What the F is up
  with mangling the subject line like that?)
 The BTS doesn't like the [ at the start of the Subject line, for some reason.

It thinks space, : and [ all look alike, apparently, and drops it when
getting rid of Bug123456:. Been that way forever, afaict, or at least
since September '99. Might be fixed now.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''



Re: Rewriting policy soonish if poss.

2002-07-31 Thread Anthony Towns
On Wed, Jul 31, 2002 at 07:33:44AM -0600, Julian Gilbey wrote:
 On Wed, Jul 31, 2002 at 02:13:36AM +1000, Anthony Towns wrote:
  __Debian Standards Document__
dpkg:
 *  version format
 *  maintainer scripts are run when and under what circumstances

Both of these are irrelevant to just about everybody, I'd've thought.
Version number comparison is checked with 'dpkg --compare-versions', and
the format is checked automatically by various tools. I've never found
it necessary to look at the details of either except when I'm poking at
apt or dpkg's internals, or when I've needed to do something really weird.

 *  what control file fields mean

Again, _what_ the fields mean (Essential: yes -- you can't uninstall
a package easily, Depends: foo -- don't install this package unless
foo's already installed) is a separate issue to when/why they should
be used, and what effects their use has (Essential: yes -- installed
on all Debian systems, so doesn't require a Depends unless it's new,
in which case you need a versioned dependency, because of this rule,
essential packages need to work unconfigured, etc).

 But with the wonders of XML includes, we can simply have the common
 pieces in appropriate separate external files (or something cleverer,
 but that's a detail) and include them in both places.

I think you're getting a bit over excited about the wonders of XML...

 In this way,
 they will be both in the specs document (useful for specs!) and the
 guidelines (useful for package developers) and always be in sync - yeah!

Including them in the guidelines just gets in the way.  That's what I
was saying about trying to write up the BPP and finding the version
comparison, etc section being uncomfortable.  If package developers
need them, they should look in the specs.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgp271nWJsXk6.pgp
Description: PGP signature


Re: Rewriting policy soonish if poss.

2002-07-31 Thread Anthony Towns
On Thu, Aug 01, 2002 at 12:06:55AM +0900, Oohara Yuuma wrote:
 On Thu, 1 Aug 2002 00:08:03 +1000,
 Anthony Towns aj@azure.humbug.org.au wrote:
  Version number comparison is checked with 'dpkg --compare-versions', and
  the format is checked automatically by various tools. I've never found
  it necessary to look at the details of either except when I'm poking at
  apt or dpkg's internals, or when I've needed to do something really weird.
 You say I should read the source of dpkg when I need to do
 something really weird about version number (cope with -pre and -beta,
 rebuild with dbs and so on)?  Digits, dots and hyphens do not
 always work.

No, I'm saying you should read the Specs Document. 

(Advice on coping with -pre and -beta and such should be in the Best
Practices doc anyway though -- generalising from how the version
comparison stuff works to a good way of handling pre-versions is
non-trivial. Well, without ~, it is, anyway.)

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''



Re: Rewriting policy soonish if poss.

2002-07-30 Thread Anthony Towns
 internals
will mean your programs don't work, so you should obviously care about
the specs doc. And, really, who here *doesn't* want their packages to
be the best they possibly can be?

Forgetting whether all the above's good or bad momentarily, is it at
least clear what I'm saying, and that for any given desirable bit of
policy, there's some way of including it?

Cheers,
aj

(Comparing the BPP/DSD dichotomy with the policy/packaging-manual split
is left as an exercise to the reader...)

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgpbHYqjsMHNq.pgp
Description: PGP signature


Re: Rewriting policy soonish if poss.

2002-07-30 Thread Anthony Towns
On Tue, Jul 30, 2002 at 11:44:38AM -0600, Julian Gilbey wrote:
  __Debian Standards Document__
dpkg:
 Most of the dpkg setup is so intricately connected with the packaging
 process, that separating out some of this seems somewhat weird.
 Although I guess that since this stuff is so clear and well-defined,
 it would be somewhat reasonable to simply cross-reference it.

Well, the version format ([epoch]:[upstream]-[debian]), and particularly
how version numbers are compared can be split out reasonably. The
intricate details of how a .deb is made up, likewise. The archive's
expectations of what a source package is (and what a .changes file is,
for that matter), don't really affect the details of packaging much,
either. The debian/rules interface might or mightn't be worth specing
outside of policy, I don't know if anything but dpkg-buildpackage
actually needs to care that much.

 I guess I'm mostly with you on this one now.

Cool.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgp8bt5kNOwLl.pgp
Description: PGP signature


Re: Rewriting policy soonish if poss.

2002-07-27 Thread Anthony Towns
On Thu, Jul 25, 2002 at 08:40:13AM -0600, Julian Gilbey wrote:
 I'd like to rewrite policy soonish.  

Into what, exactly?

Last time this came up we had a nice flamewar about it, but didn't seem
to resolve anything -- does it really make sense to do a rewrite while we
as a project don't seem to have a clear idea of what policy's meant to be?

Talking to Manoj the other day, I think it finally made sense to me what
he was getting at, which leads me to think what we might be aiming at is
to split policy into three separate docs:

-- Release Critical Issues
(a straight out list of problems that get a package pulled
 from testing, maintained by the RM)

-- Debian Best Packaging Practices
(guidelines on how to do packaging well, generally)

-- The Debian Specifications Document
(fairly formal specs on things like the version number
 format, format of .debs, layout of source packages,
 control file fields probably, update-rc.d spec, menu
 file format, and so on)

Violations of the latter document can probably be checked completely
automatically, and in many cases won't even make it into the archive.
Many of the BPP guidelines will be able to be checked by lintian/linda
too hopefully, at best only a few of them are worth RC bugs, though.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgpouqAHJuxV4.pgp
Description: PGP signature


Re: /usr/doc

2002-07-22 Thread Anthony Towns
On Sun, Jul 21, 2002 at 05:12:52PM -0400, Joey Hess wrote:
 If noone who is faimilar with the history and aims of this transition
 has any objects, the I will upload the new debhelper tomorrow, I guess.

Sounds good. I suppose Santiago'll also be uploading a base-files without
/usr/doc, if he hasn't already.

Anyway, I'd thought we were considering removing all the symlinks in one
shot rather than waiting for every package to be updated. Indeed, Manoj's
message to the tech ctte said:

] We create the postinst, prerm now, installing the symlink, Once
] the move is over, we just have a prerm script removing the
] symlink. another release, (potato+2), we stop bothering, since we
] would have handled the most common case (and provide an base-files
] postinst script removing the symlinks for upgrades at that point).

Of course, this script's lack of existance atm is no reason not to upload
a new debhelper, etc.

The only thing that could cause problems is packages that still use
/usr/doc, which has been considered a RC bug for quite a while already,
and hand written prerms that are broken and fail if their symlink isn't
present. I don't think that's a showstopper, personally.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgpJPLMS7GUdJ.pgp
Description: PGP signature


Bug#151328: debian-policy: [PROPOSAL] virtual package debconf-2.0

2002-06-29 Thread Anthony Towns
On Fri, Jun 28, 2002 at 10:08:11PM -0400, Joey Hess wrote:
 Until these differences are identified, and resolved in the spec or at
 least implemented the same in debconf and cdebconf, it may be best if
 packages use debconf | debconf-protocol-2.0 in their dependencies so
 that dselect et al will pick the currently more sane choice by default.

If debconf is standard or higher, and cdebconf is extra (or
optional), debconf'll be chosen anyway (according to the old packaging
manual [0]), so this shouldn't be necessary. Considering it'll also have
already been installed everywhere anyway (by debootstrap, or by virtue
of being the only debconf in previous releases), this doesn't seem like
an issue at all.

Seconded.

Cheers,
aj

[0] wtf does debian-policy conflict: with the old packaging manual? It
doesn't replace any files in it, and the packaging manual is still
quite useful to have around considering it _still_ hasn't been
properly replaced. Section 8.6, Defaults for satisfying dependencies
- ordering is the relevant section in this case, in particular:

 Usually dselect will suggest to the user that they select the package
 with the most `fundamental' class (eg, it will prefer Base packages to
 Optional ones), or the one that they `most wanted' to select in some
 sense.

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``If you don't do it now, you'll be one year older when you do.''


pgpGCIgzMskJL.pgp
Description: PGP signature


Re: RFD: Essential packages, /, and /usr

2002-06-22 Thread Anthony Towns
On Fri, Jun 21, 2002 at 01:53:58PM -0400, Joey Hess wrote:
 Take shoop benchmarks (this is an old shoop tree I had lying around):
 
 bash: 1000 shoop 1st-stage resolver method calls  : 0:05.51
 ash : 1000 shoop 1st-stage resolver method calls  : 0:01.33
 bash: 1000 shoop 2nd-stage resolver method calls  : 0:08.33
 ash : 1000 shoop 2nd-stage resolver method calls  : 0:02.23
 bash: 1000 shoop 2nd-stage(nocache) resolver method calls : 0:08.19
 ash : 1000 shoop 2nd-stage(nocache) resolver method calls : 0:02.27
 
 (On a TM5800 with the cpu set to run at 333 to 533 mhz.)

Any chance of a rerun with posh (sources are in queue/new and readable)
or pdksh?

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: RFD: Essential packages, /, and /usr

2002-06-22 Thread Anthony Towns
On Fri, Jun 21, 2002 at 06:05:39PM -0400, Clint Adams wrote:
  sake. I understand the alleged benefits of ash (small, loads faster on a
  slow/small memory machine). Why would I, Debian user, benefit from being
  able to run pdksh as /bin/sh? (Remembering that standards compliance, in
  and of itself, does not give me a sexual thrill.)
 I answered this explicitly already.  It gives you a smaller,
 faster-loading shell and it supports brace expansions, which are the
 number one bug filed against #!/bin/sh scripts.

As far as I can tell there are two possibilities here:

(a) it is pdksh or posh, and it already works at least as well
as ash on the various #!/bin/sh scripts in Debian, or

(b) it is pdksh or posh or similar, and it doesn't yet work as
well as ash on the various #!/bin/sh scripts in Debian, due to
various POSIX extensions that we use and it doesn't support

In (a)'s case, this means that we can just say Actually, as it
turns out, we don't merely support ash and bash as /bin/sh at
present, actually we lucked out and we already support ash, bash
and pdksh! and have no more problems continuing to support pdksh as
we're going to have continuing to support ash. If this is the case,
then there's *still* no value in minimising /bin/sh: we can get the
smaller-faster-loading-more-reliable-shell that you're talking about
without having to fix all your various bugs. Whichever shell you're
talking obviously already supports kill -9, type and command, and whatever
other useful features that we currently use and you want us to stop using.

If this is supposedly the case, it'd be helpful to know which shell this
is, and if it does actually work as well as you're hypothesising.

 So, if someone needs to run a low-memory machine in production, [...]

In (b)'s case, on the other hand, you _can't_ run whatever shell you're
talking about on a production, because it _doesn't_ work as well as ash,
and this entire line of argument's erroneous.

 Is this not an answer?

Well, no, it really isn't. If some shell already works better with than
some other supported shell in practice, then it's supported de facto --
continuing to support it doesn't require signficant changes to current
practice, by definition. As such, it doesn't make sense to use that as
an argument about why we should change current practice.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpgl01DfMsVr.pgp
Description: PGP signature


Re: Bug#97671: RFD: Essential packages, /, and /usr

2002-06-22 Thread Anthony Towns
On Sat, Jun 22, 2002 at 02:02:00AM -0500, Manoj Srivastava wrote:
 Branden == Branden Robinson [EMAIL PROTECTED] writes:
  Branden * Release critical bugs are _very_ rare.; and
  Branden * Release critical bugs should be the domain of the Release Manager,
  Branden Then we really don't need a tight connection between the
  Branden serious severity and release-criticality at all.

Sorry, but this doesn't follow. Treating serious as a severity or a
tag is largely immaterial, and the fundamental point of the serious
severity or tag is as an aid to release management.

  Branden The Release Manager can strip the release-critical tag off
  Branden of any bug he wants.  This is how things have *always*
  Branden worked in reality.  

No, it's not. In reality, things have always just been ignored, rather
than being formally stripped of release-criticality.

   I find myself in strong and vehement agrement with Branden on
  this point.

Branden brought up a number of interesting and good points (and, even
better, simple) in the discussion he's referencing, but it was at the end
of a pretty long winded and vicious argument about the referenced bug,
and there was too much of an agree to anything just to get this over
with on my behalf. Which isn't to say I don't agree with much of it,
but I need some time to sit and look at this calmly before I can have
a considered opinion on it.

OTOH, there is one part that I have had plenty of opportunity to think
about: and personally I don't believe debian-policy should have _any_
influence over the severity of a bug. If there're already good reasons for
increasing the severity of a bug without policy, then that's good enough.
If there aren't, policy shouldn't be forcing them on people.

There're plenty of ways we can improve Debian without raising the members
of the policy list as being better or more powerful than other developers.

Beyond _all_ other things, this is the major problem with the serious
severity and release-critical bugs (and debian-policy@) at the moment.

And as much as I'd like to be able to say it's better to have -policy be
better and more powerful than the release manager for general democratic
and consensus principles, I'm sorry, but it simply hasn't worked, and
I'm yet to see *anyone* even remotely interested in making it work.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpweSghV8iHS.pgp
Description: PGP signature


Re: RFD: Essential packages, /, and /usr

2002-06-21 Thread Anthony Towns
 that packages we install have useful documentation, or that
  they're sensibly configured out of the box, or that window manager menus
  are usefully setup to display all the interesting apps you have installed,
  or all the other nice things Debian does.
 Do you think I waited until after the alleged date of woody's release to
 file serious bugs because I was confused?  

Evidently. If you want to get them all fixed before the next release,
file them early, and check up on their progress in a couple of months. The
severity has *nothing* to do with that.

  I'm all too well aware that everyone thinks their pet fetish needs to
  be made a must in policy or it'll be utterly pointless to try to do
  anything about it at all, but, well, you're wrong.
 I'll try to be presumptuous about the meaning of policy now:
 | The standard shell interpreter `/bin/sh' can be a symbolic link to any
 | POSIX compatible shell, if `echo -n' does not generate a newline.[1]
 This means that /bin/sh should be almost POSIX-compatible.  

Yes. It's also wrong.

If you want to argue about what is the case, I'll take the way the archive
looks over policy's opinion any day.

If you want to argue about what should be the case, I'll take arguments
about practical utility and difficulty over policy's opinion any day.

For the former, the echo -n exemption isn't nearly enough: we also need
a fancier test, command -v, we don't support the funny \c characters in
echo, and probably various other things.

For the latter, you're yet to show *any* practical utility in using other
shells -- and indeed you've demonstrated some reasons why you would *not*
want to use other shsels, and you've already shown that we've got a fair
way to go before we do support them.

 | Thus, shell scripts specifying `/bin/sh' as interpreter should only
 | use POSIX features.
 This isn't a must because such shell scripts must be allowed to use
 non-POSIX features, such as start-stop-daemon and what-have-you.

Huh? Surely running scripts present on the filesystem is a POSIX feature?

Violations of shoulds are normal bugs; if the above indicates what
you seem to imply it does (ie, that calling start-stop-daemon breaks
that guideline), then we ought to be filing bugs for every package that
invokes start-stop-daemon from a script.

 | If a script requires non-POSIX features from | the shell interpreter,
 | the appropriate shell must be specified in the first line of the script
 | (e.g., `#!/bin/bash') and the package must depend on the package
 | providing the shell (unless the shell package is marked `Essential',
 | as in the case of `bash').
 If this were not a must, then anyone could make a #!/bin/sh script that
 would not run on bash, and it would not be a valid bug.  

If it were a should, not a must, they would file a normal bug, and it'd
get fixed. I'm not seeing the problem. Please make sure you've read
section 1.1 of policy, particularly the paragraph beginning In this
manual, the words _must_, _should_ and _may_, 

 Perhaps you'd
 think it was a bug.  Nevertheless, I can imagine one or two maintainers
 telling you that bash isn't a supported #!/bin/sh for this package.

And I can imagine them getting a bug report from every user that runs
their package. I can also imagine there being a fairly quick consensus
on any list it was brought to that that was a stupid thing to do.

Policy isn't a stick to beat people with, even when they make the most
appalling idiocies. Stop pretending it is, or that -- if it isn't --
that we have no other possible recourse to ensure we produce a high
quality system.

If you can't justify a change without reference to policy, then you
shouldn't be suggesting it, let alone demanding it. Policy's a convenient
way to make sure you don't have to endlessly repeat yourself when filing
bugs, or explaining to new maintainers how things should be packaged, but
it's not a substitute for good sense.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpWrcEZ4GNE6.pgp
Description: PGP signature


Re: RFD: Essential packages, /, and /usr

2002-06-21 Thread Anthony Towns
SUSv3 scripts will work on Debian (due to the echo -n issue,
at least)

Hrm. Is there anything more to this issue that actually affects anyone
using Debian? I can't think of anything. So that just leaves:

(4) Debian Policy underspecifies or misspecifies /bin/sh: it's not
clear which POSIX extensions can be expected (eg, policy
uses test's -a/-o/() parameters in some examples)

(5) Clint wants to remove the -n exception for echo, which
contradicts (rather than extends) POSIX.

Do you really disagree with any of the above, in a way that you can
actually manage to justify with something beyond handwaving? Can we
possibly use this as a basis for establishing some sort of consensus on
this issue?

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpUWS2inaKak.pgp
Description: PGP signature


Re: RFD: Essential packages, /, and /usr

2002-06-20 Thread Anthony Towns
 sense
if I spell it out as separate sentences? And really, none of the above
have much to do with getting woody out at this point in time, either.

  and a bunch of other things. I can see obvious benefits from the latter,
  I can't see *any* benefits from being as obsessive as you're being with
  the former.
 Mind-boggling, that.

Well, you're welcome to enlighten me at any time.

  Well, no, that's not really true. I don't mind having random scripts
  work on random other Unices, that's neat. And I wouldn't overly mind if
  you'd taken the time to do a little polite write up of why kill -9
  isn't something we should do, post it to -devel along with citations
  people can easily check to the appropriate standards, and then file
  minor or wishlist bugs about it.
 Why do you think the bug severity levels are lies too?  It violates a
 must directive.

It also violates a should directive in the previous sentence, and
considering the second sentence is just a restatement of the first, that
means policy's buggy. The correct resolution, the one that leads to the
better distribution, is the one that resolves both those directives to
being should.

  Because, to be blunt, there are a million things that're a million
  times more important than whether you can use something other than bash
  as /bin/sh.
 No, it's the absolute most important thing in the two universes.  Have you
 ever had need to put Debian on a small amount of flash, and wanted to be
 as space-efficient as possible?  If you have only packages that use
 #!/bin/sh scripts, you can get rid of the Essential bash, and save over
 400K.

Sure, and you can do that with ash already, which is 82kB compared to
394kB for zsh. You can't do it incredibly reliably because scripts are
allowed to randomly use bash wherever they want to.

Hrm, how strange:

lrwxrwxrwx1 root root   21 May  5  2001 /bin/zsh - 
/etc/alternatives/zsh*
lrwxrwxrwx1 root root   12 Apr  4 15:26 /etc/alternatives/zsh 
- /usr/bin/zsh*
lrwxrwxrwx1 root root9 Apr  4 15:20 /usr/bin/zsh - 
/bin/zsh4*

The postinst seems right though, so I guess this is some bizarre upgrade
bug. For some reason I've got /usr/bin/zsh listed as an alternative for
/bin/sh in /etc/alternatives/zsh on that machine.

  Which is what policy is, if you ask me.
 This is also probably why you think violations of 'must' directives
 should get priority 'wishlist' bugs.

No, I think that because policy is buggy. These bugs deserve
wishlist/minor severity only -- that's their correct priority as far as
Debian's users go. Things that don't work in ash deserve normal severity
-- they're not *that* important, but at least people have some reason
to care about that. Given that policy doesn't accurately depict that,
well, there's a bug in policy.

  No, the professionalism and commitment to excellence of Debian maintainers
  is what ensures that.
 Well, since we can't get that, perhaps we should set some sort of
 policy.

We can't get that? Since when?

Are you refusing to be professional or offer a commitment to excellence?
Maybe you should quit for the good of the project then. I haven't seen
any evidence of either from you, but I'm happy to take you at your word.

  Perhaps you should look again at all the packages you've been filing bugs
  against. If you make /bin/sh something else, and lots of stuff breaks,
  that's evidence that you're missing a needed feature.
 A feature is needed just because someone uses it?  

Well, yes. If things stop working without a particular feature, they
need it.

The question is whether we want to change things so that feature isn't
needed, and if so, how much we want to change that.

  That's nice. In future, before filing bugs against a bunch of packages
  for something you think's a policy violation, gain a consensus on -devel
  about it first. It's a simple rule, and it prevents a lot of annoyance.
 I think that you're the only one who has bothered to claim that it's not
 a policy violation to violate policy.

*shrug* You're the only one who's gone on a bug filing rampage about
it too. Since you're so scarily alone in that, clearly you're wrong.

In any event, that guideline is there for exactly this reason: establish
the consensus that you're right -- even if you don't see how anyone
could possibly think otherwise -- *THEN* file the bugs.

  You'd think the people who insist on rules being followed to the letter
  would bother to read and follow them themselves, no?
 Manoj told me to file bugs; I didn't get the impression that he thought
 must was a typo.

Sorry, Manoj is cool and all, but he's not a walking talking consensus
all by himself.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpKNMWt5r7KJ.pgp
Description: PGP signature


Re: RFD: Essential packages, /, and /usr

2002-06-19 Thread Anthony Towns
On Wed, Jun 19, 2002 at 05:20:19AM -0400, Clint Adams wrote:
  I'm surprised by how many package scripts use kill, but the number is
  not excessive.
 On the other hand, no one seems to want to fix these.  

Imagine, people actually wanting a justification beyond random document
X says so for bugs filed at a serious severity.

 Instead of a
 one-line fix, histrionics, bug-closings, and references to Solaris seem
 to be in order.

See, this would be an example of using policy as a stick to beat people
with. That some document somewhere -- be it POSIX, SUS, the LSB spec, or
debian-policy -- says you should do something one way means *absolutely
nothing*. The *only* reason to do things one way instead of another is
because doing them that way is *more effective*.

debian-policy is *only* useful in that almost all of its comments are
time-tested instructions on how to do things in the most effective way.

If you really want a document that says what features of the shell we
rely on, that's fine: write one. Base it on SUS, or POSIX as necessary,
but don't pretend POSIX or SUS is correct as it stands, least of all
when you find evidence that *directly contradicts* such an assumption.

Perhaps policy isn't a stick isn't the best way of phrasing these
things, maybe a better way of phrasing it is policy isn't the law. Every
time we find a contradiction between what we think is the right way of
doing things and what policy, POSIX, or whatever says, policy should be
put on trial just as much as any given developer.

Surely we're all here looking for the *right* way to do things, not
merely the documented way.

Cheers,
aj, getting sick of regretting anew the link between policy and
release-criticalness everytime there's any sort of thread on -policy

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpf27aWzNWPw.pgp
Description: PGP signature


Re: RFD: Essential packages, /, and /usr

2002-06-19 Thread Anthony Towns
On Wed, Jun 19, 2002 at 07:59:33AM -0400, Clint Adams wrote:
  Imagine, people actually wanting a justification beyond random document
  X says so for bugs filed at a serious severity.
 How about I litter all my #!/bin/sh postinsts with useless zshisms?

How about we add I'm not such an idiot to break my packages just because
I get in an argument with aj? to the new-maintainer PP check?

 Scenario A: Anthony Towns puts kill -s KILL $pid in preinst of
 netkit-inetd.  Script works on all POSIX-compliant shells.
 
 Scenario B: Anthony Towns puts kill -9 $pid in preinst of netkit-inetd.
 Script BREAKS on some POSIX-compliant shells.

Scenario A: Script works on bash and ash, which are the two main shells anyone
has a reason to use as /bin/sh on Debian.

Scenario B: Script works on bash and ash, which are the two main shells anyone
has a reason to use as /bin/sh on Debian.

 Why is one choice not obviously preferable to the other?

Because you're biasses don't happen to be mine.

It happens to be a lot of work to make something comply with the letter of
POSIX's minimal specification for /bin/sh, especially since it seems to
be intent on becoming more minimal as time passes, and since it doesn't
seem to worry itself too much with existing BSD or Linux systems.

It's also a lot of work to do heaps of other useful things in Debian: make
it release faster, improve it's security, have all the neat new GUI apps
get a similar degree of reliability as our server programs tend to have,
and a bunch of other things. I can see obvious benefits from the latter,
I can't see *any* benefits from being as obsessive as you're being with
the former.

Well, no, that's not really true. I don't mind having random scripts
work on random other Unices, that's neat. And I wouldn't overly mind if
you'd taken the time to do a little polite write up of why kill -9
isn't something we should do, post it to -devel along with citations
people can easily check to the appropriate standards, and then file
minor or wishlist bugs about it.

Because, to be blunt, there are a million things that're a million
times more important than whether you can use something other than bash
as /bin/sh.

  debian-policy is *only* useful in that almost all of its comments are
  time-tested instructions on how to do things in the most effective way.
 No.  That would be a best practices document.

Which is what policy is, if you ask me.

 Policy is useful in that it ensures consistency and interoperability.  

No, the professionalism and commitment to excellence of Debian maintainers
is what ensures that.

  If you really want a document that says what features of the shell we
  rely on, that's fine: write one. Base it on SUS, or POSIX as necessary,
  but don't pretend POSIX or SUS is correct as it stands, least of all
  when you find evidence that *directly contradicts* such an assumption.
 The only evidence I see that directly contradicts such an assumption is
 the dearth of shell features mandated.

Perhaps you should look again at all the packages you've been filing bugs
against. If you make /bin/sh something else, and lots of stuff breaks,
that's evidence that you're missing a needed feature.

You do realise we use policy as an aid to developing a distribution,
not develop a distribution as an aid to writing policy, right?

  Perhaps policy isn't a stick isn't the best way of phrasing these
  things, maybe a better way of phrasing it is policy isn't the law. Every
  time we find a contradiction between what we think is the right way of
  doing things and what policy, POSIX, or whatever says, policy should be
  put on trial just as much as any given developer.
 Fine.  That doesn't mean you should go around pretending that there's
 an exemption for 'kill -9' in Policy.

That's nice. In future, before filing bugs against a bunch of packages
for something you think's a policy violation, gain a consensus on -devel
about it first. It's a simple rule, and it prevents a lot of annoyance.

You'd think the people who insist on rules being followed to the letter
would bother to read and follow them themselves, no?

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpQoKxZNQ1aC.pgp
Description: PGP signature


Re: RFD: Essential packages, /, and /usr

2002-06-18 Thread Anthony Towns
On Tue, Jun 18, 2002 at 07:58:21AM -0400, Clint Adams wrote:
  Notice or some other nice English word... when the admin puts binaries in
  a $PATH, they need to be aware of the consequences. If they put something in
  a place where it can replace a Debian binary, how do we know it's
 Why would someone, being told that '/usr/local is for the administrator;
 Debian doesn't touch it' assume that package scripts will go around
 running things in /usr/local?

Just because they've been told Debian won't put things in there, that
doesn't mean the things in there won't be run if they're in the PATH.

I don't think anyone would be surprised or dismayed for particularly long
at having, say, /usr/local/bin/dpkg executed instead of /usr/bin/dpkg if
/usr/local/bin happens to be earlier in their PATH. If, as a sysadmin, you
don't ever want that to happen, you should remove /usr/local/{bin,sbin}
(and /opt/bin and whatever else) from your PATH before running
dpkg. That's not overly onerous.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpBhpzaTtNCR.pgp
Description: PGP signature


Re: RFD: Essential packages, /, and /usr

2002-06-18 Thread Anthony Towns
On Tue, Jun 18, 2002 at 03:56:12AM -0400, Clint Adams wrote:
  I would also support the addition of UP since all the POSIX shells in
  Debian support it with the exception of ash which does not currently
  support history.  Since history support is unlikely to affect scripting,
  it would be acceptable for us to specify UP as well as XSI.
 I'd be happy with SUSv3, UP relevant to non-interactive use, and the
 appropriate subset of XSI.  Of course, you realize that this reverses
 the 'echo -n' exception and that [...]

...you therefore have to say SUSv3, UP-noninteractive, XSI-something,
and a BSD echo (ie, with a functioning -n).

There're probably other exceptions too. Compatability with what we're
distributing, compatability with other distributions, compatability
with other free Unices are all more important than blind adherance to
the standard du jour.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpDpz4GFr3Wh.pgp
Description: PGP signature


Re: RFD: Essential packages, /, and /usr

2002-06-17 Thread Anthony Towns
On Sun, Jun 16, 2002 at 07:31:32PM +0200, Jochen Voss wrote:
 On Sun, Jun 16, 2002 at 11:53:50PM +1000, Anthony Towns wrote:
  On Sun, Jun 16, 2002 at 01:48:21AM -0500, Branden Robinson wrote:
   Documentation good.  Ad hockery bad.
  That's your opinion, not mine, and not the word of God that you make it
  out to be.
 Sorry Anthony, but are you really telling us that in your
 opinion not documenting technical things should be prefered
 to documenting them?

Ad hockery can often be quite productive and helpful and useful, all of which
are good, not bad. I'd cite Linux as a whole as an example.

Documentation can often be a nuisance: if there's too much of it or
if it's badly written so it's hard to find anything, or if it doesn't
match reality, or if the burden of maintaining the documentation stops
you from doing things that would be productive.

Things are very rarely as simple as four legs good, two legs bad.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgp74MbRgXNq8.pgp
Description: PGP signature


Re: RFD: Essential packages, /, and /usr

2002-06-17 Thread Anthony Towns
On Sun, Jun 16, 2002 at 03:13:23PM -0500, Branden Robinson wrote:
  Aj, on the other hand, is logically asking for continuing to
   use package priority
 I thought he was asking that we use package essentiality, though I
 suppose one could argue that essential is a virtual priority, one
 higher than any others.
 
 Alternatively, my grep-available command needs to be changed.

If you need to use a binary that's not in an Essential: yes package, but
is in /bin, you can Depend: upon that package, then use it. /sbin/ifconfig
from net-tools, or /bin/ip from iproute for example.

The required priority is meant to be essential + dependencies,
but isn't quite, for reference.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpFv3tGqEkF3.pgp
Description: PGP signature


Re: RFD: Essential packages, /, and /usr

2002-06-17 Thread Anthony Towns
On Mon, Jun 17, 2002 at 10:32:03AM -0500, Steve Greenland wrote:
 On 16-Jun-02, 15:30 (CDT), Chris Waters [EMAIL PROTECTED] wrote: 
  On Sun, Jun 16, 2002 at 02:17:12PM -0500, Steve Greenland wrote:
   It's not superfluous: if it's up to the developer, then they can move a
   binary from one to the other with no warning or discussion.
  Not if that binary has its location specified in the FHS, which most
  of the ones we're discussing do. 
 Manoj and Anthony have argued
 (to my understanding) that the current situation of Early running
 init scripts can on on whatever the maintainers feel like putting in
 /bin:/sbin is acceptable. To me, it seems sloppy.

It seems sloppy is a pretty poor argument for moving every binary not
specifically mentioned in the FHS into /usr and gratuitously breaking
any scripts that needed them where they are.

Are you sloppy when you exercise your judgement about your packages? Why
would you expect everyone else to be?

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpPafxa3cfD1.pgp
Description: PGP signature


Re: RFD: Essential packages, /, and /usr

2002-06-16 Thread Anthony Towns
On Thu, Jun 13, 2002 at 01:17:45PM -0500, Branden Robinson wrote:
  So why waste everyone's time discussing it rather than just using sed
  or /bin/sh and getting on with your life?
 Because this isn't just about me, and it isn't just about cut(1).[1]

cut was what was brought up. Do you really care about ddate being in
/bin rather than /usr/bin?

 It's about what authors of early-running init scripts in general can
 expect to have at their disposal.  

They can expect to have what they absolutely need, and pretty much nothing
else. If there's something cut can do that sed can't that's absolutely
needed by an init script that needs to run before /usr's mounted it'd
be reasonable to move it. If it's just a nuisance to have to learn a
different tool, well, that's not a reason to move cut.

   The set of files provided by Debian's Essential packages is, in
   fact, minimal.
  Depends what you mean.
 Yup.  So what *does* Debian mean?

  ddate, dpkg, dselect, factor, find, mawk, perl, sort, tr, tsort, uniq,
  update-rc.d, whoami, xargs, and yes are all in essential packages and
  in /usr/bin.
 As are logger, [...]

The items listed above are ones that generally need to be in essential
packages. Particularly perl, sort, tr and kin. That is to say, they need
to be available for the Debian packaging tools to function.

 Are all of the above necessary for minimal operations?  Certainly not.

But they don't need to be available to mount /usr. Whether they're
needed for minimal operations depends on which of those options you're
referring to.

 Should every single one of these be off-limits to early-running init
 scripts and people attempting to recover their systems?  I don't think
 so.

If they're not in /usr, they're off-limits. And the burden of proof lies
on you to demonstrate why you absolutely must have any particular one
available beforehand.

 Given that test and which are extremely useful for figuring out what's
 on the system for control flow purposes, 

If you're running before /usr's mounted, you're using stuff from /bin
or /sbin, so there's not a huge amount of benefit to being able to
figure out where you're running from. Further, /bin/bash is available
and provides both type and test as builtins.

  Essential packages are the ones needed to maintain a Debian system;
  utilities in /bin and /sbin are ones needed to recover a system.
 Okay, great.  Where's our official list of utilities needed to recover a
 system.  

OH NO! THERE'S _NO OFFICIAL LIST_!!! THEREFORE EVERYTHING I SAY MUST BE
WRONG OH WOE IS ME!!

 What can early-running init scripts, not to mention sysadmins
 ACTUALLY TRYING TO RECOVER A SYSTEM, rely upon to be present?

Depends how badly your system's screwed. In some cases you can't rely
on anything working (libc6 is screwed, sash isn't installed, the kernel
got corrupted, you have a hardware failure...).

   Are you suggesting that we substitute your judgement of
   what is minimal for the Debian Policy Manual's?
  People like Herbert's judgement is what was used to write the policy
  manual.
 I hate to break it to you, but I'm the author of several accepted policy
 proposals as well.

Then maybe you should consider actually having a discussion about
it, rather than, say, appealing to scripture at every chance you can
(the Debian Policy Manual's [judgement] or Where's the official list
of utilities needed to recover a system[?]) or dismissing reasonable
objections out of hand (I invite your participation if you have something
to contribute beyond don't do that, then.).

   I'm CCing debian-policy as a means of RFD.  I invite your participation
   if you have something to contribute beyond don't do that, then.
  Sometimes so don't do that, then is the right answer.
 See above.  All I hear from you are arguments for the status quo, [...]

Sometimes the status quo happens to be quite a good compromise of all
the various interests at stake.

 Given the tone of your reply, Anthony, that means you.

Ah, yes, clearly your lack of satisfaction with things means others should
be proactive in providing for your happiness.

If you have a problem with some particular program being in /bin instead
of /usr/bin or vice-versa, discuss it with the maintainer and provide a
convincing argument why it shouldn't be where it is. Or don't, run off
to mummy, or -policy or the tech-ctte and whine about how no one ever
plays fair with you like you usually seem to. Whatever.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: RFD: Essential packages, /, and /usr

2002-06-16 Thread Anthony Towns
On Sun, Jun 16, 2002 at 01:48:21AM -0500, Branden Robinson wrote:
 On Sun, Jun 16, 2002 at 03:16:12PM +1000, Anthony Towns wrote:
  On Thu, Jun 13, 2002 at 01:17:45PM -0500, Branden Robinson wrote:
So why waste everyone's time discussing it rather than just using sed
or /bin/sh and getting on with your life?
   Because this isn't just about me, and it isn't just about cut(1).[1]
  cut was what was brought up. Do you really care about ddate being in
  /bin rather than /usr/bin?
 No.  Is it your position that every executable from an Essential package
 that isn't already in /sbin or /sbin is as frivolous as ddate?
 If not, why imply it?

I'm sorry if you're unable to understand my inferences. That particular
one was that not all programs in essential packages need to be in
/bin. One of dpkg, update-rc.d or ddate ought to be enough of an example
to demonstrate that without going off on too much of a pointless tangent.

If you don't want to claim that all programs in essential packages need
to be in /bin or /sbin, then you've established two things:

* that minimal means different things when talking
  about the contents of /bin and /sbin compared to the contents
  of essential packages

* that programs that do go in /bin or /sbin need stronger
  recommendations than just they're important enough to be in
  an essential package.

   It's about what authors of early-running init scripts in general can
   expect to have at their disposal.  
  They can expect to have what they absolutely need, and pretty much nothing
  else.
 So, rather than establishing any guidelines for what they're going to
 absolutely need, we'll just tell them that what they absolutely need
 is whatever happens to be in /bin or /sbin today.

No, we'll tell them to use their common sense. You don't absolutely need
cut, since you can use sed instead.

  If there's something cut can do that sed can't that's absolutely
  needed by an init script that needs to run before /usr's mounted it'd
  be reasonable to move it. If it's just a nuisance to have to learn a
  different tool, well, that's not a reason to move cut.
 s/cut/$anything/

If you're going to try to generalise a concrete example at least do it
right: 

s/cut/some tool proposed to be added to /bin/g
s/sed/any tool already in /bin or /sbin/g
s/an init script/a program/g

 And if the package maintainer disagrees?

Which package maintainer?

 The set of files provided by Debian's Essential packages is, in
 fact, minimal.
Depends what you mean.
   Yup.  So what *does* Debian mean?
 Interesting that you didn't bother to propose an answer to this. 

Interesting that you *still* haven't noticed that it's an ambiguous
question, that *can't* be answered (correctly) until you clarify what
you mean.

  The items listed above are ones that generally need to be in essential
  packages. Particularly perl, sort, tr and kin. That is to say, they need
  to be available for the Debian packaging tools to function.
 That's the definition of an Essential package, not the definition of a
 minimal Debian system.

A minimal Debian system is one that has all the essential packages
installed with their dependencies satisfied (so libc6 and mawk and such
as well).

This has nothing to do with the contents of /bin or /sbin. It has to do with
the fact that the word minimal is used in different contexts.

Do you realise that sash.deb provides /bin/sash and is priority: optional?

  If they're not in /usr, they're off-limits.
 As are the POSIX utilities for determining whether or not they're in
 /usr.

*shrug* POSIX has absolutely no relevance here.

  And the burden of proof lies on you to demonstrate why you absolutely
  must have any particular one available beforehand.
 Translation: the intersection of all Essential package maintainers'
 opinions shall determine what will be possible before /usr is mounted.

Well, no. The original was in English, so you don't need to translate it
at all. If you want something added to /bin or /sbin that's currently
under /usr, *YOU* have to provide a convincing argument as to why it
needs to be moved.

As opposed to complain about how there's no convincing argument as to
why it's where it is.

  Further, /bin/bash is available and provides both type and test as
  builtins.
 Bad news for any Debian port that wants to use ash as its Essential
 shell, then.

Well, yes. bash is Essential: yes, and may be assumed to be present on
all Debian systems. If some port wants to change that assumption they
get to clean up the mess.

  OH NO! THERE'S _NO OFFICIAL LIST_!!! THEREFORE EVERYTHING I SAY MUST BE
  WRONG OH WOE IS ME!!
 We have neither a list nor a set of guidelines documented anywhere as to
 what the maintainer of an early-running init script can expect to
 accomplish.  Instead, he has to experiment, [...]

Or he could ask on -mentors or -devel if he can't figure out how to use
the tools in /bin

Re: RFD: Essential packages, /, and /usr

2002-06-13 Thread Anthony Towns
On Tue, Jun 11, 2002 at 12:35:27PM -0500, Branden Robinson wrote:
 On Fri, Jun 07, 2002 at 02:55:23PM +1000, Herbert Xu wrote:
  Anyway, there are already plenty of tools in /bin capable of performing
  the task of cut(1).
 Sure.  

So why waste everyone's time discussing it rather than just using sed
or /bin/sh and getting on with your life?

 The set of files provided by Debian's Essential packages is, in
 fact, minimal.

Depends what you mean. ddate, dpkg, dselect, factor, find, mawk, perl,
sort, tr, tsort, uniq, update-rc.d, whoami, xargs, and yes are all
in essential packages and in /usr/bin. Essential packages are the ones
needed to maintain a Debian system; utilities in /bin and /sbin are ones
needed to recover a system.

 Are you suggesting that we substitute your judgement of
 what is minimal for the Debian Policy Manual's?

People like Herbert's judgement is what was used to write the policy
manual.

 I'm CCing debian-policy as a means of RFD.  I invite your participation
 if you have something to contribute beyond don't do that, then.

Sometimes so don't do that, then is the right answer.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpdFKDPybJX0.pgp
Description: PGP signature


Re: Working on debian developer's reference and best packaging practices

2002-05-13 Thread Anthony Towns
On Mon, May 13, 2002 at 01:29:59AM -0500, Manoj Srivastava wrote:
 Anthony == Anthony Towns aj@azure.humbug.org.au writes:
  Anthony The documentation should be found wherever the dpkg
  Anthony maintainers want it, not wherever the -policy maintainers
  Anthony think might be fun.

   What policy contains won't be documentation. It shall be a
  standard interface that must be implemented by any Debian packaging
  tool -- and be the only policy requirement from Debian packages and
  packaging tools.

   Since dpkg folk have already stated their commitment to not
  changing interfaces out from under all the packages, this ought not
  to be any inconvenience to them. Having a standard interface would
  enable us to, *gasp*, allow the implementation of another packaging
  tool. 

Julian, please note the above: this is who's talking about dpkg anyway.

There is _absolutely_ no call for other packaging tools, and absolutely
_no_ need for a standard to make this easy or possible. Further, writing
such standards _without_ implementing two or more interoperable tools
is poor practice and generally results in useless standards. Reforming
policy into a pointless standards document, while gutting all the useful
best practices information into an as-yet hypothetical new document
seems a lot like a pointless exercise in bureacracy.

As one of the agitators for a policy team rather than a policy dictator,
one might've hoped that at the very least you might at least try to reach
a consensus, rather than dictating from on high about what policy will
and won't be.

A simple question: who, today, will be helped by having a document
called debian policy that documents the interfaces to dpkg? How
will this be more helpful than the existing dpkg manpages, or other
alternatives. Likewise, who is being helped, today, by the documentation
about best practices in policy?

BTW, I don't think I ever got a firm answer on which bits of policy
describe best practices rather than standards, and are thus
unsuitable.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgp6ZxFcz2t5d.pgp
Description: PGP signature


Re: Working on debian developer's reference and best packaging practices

2002-05-13 Thread Anthony Towns
On Mon, May 13, 2002 at 01:45:33AM -0500, Manoj Srivastava wrote:
 Anthony == Anthony Towns aj@azure.humbug.org.au writes:
   *Sigh*. Let me see if I can dot the i's and cross the t's. A
   package should be buildable using the bits mentioned in policy. Any
   package may, however, choose to add any extra bits added by dpkg,
   (perhaps buigld depending on a new dpjg version if the change is not
   compatible with older versions).
  Anthony This, uh, doesn't make sense.
   Really?

Yes, really.

  Anthony A package should be buildable using nothing more than
  Anthony  [foo]. Unless it chooses not to be.
  Anthony ...seems to be what you just said. 
   Umm. I fail to see how else I can define sufficient, and
  optional, new, added features.  Policy defines the minimal,
  sufficient interface.

Sufficient for what? Certainly not sufficient to build all Debian
packages, since they can use the optional, new, added features that
aren't included.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpsy1TxSeaaY.pgp
Description: PGP signature


Re: Working on debian developer's reference and best packaging practices

2002-05-13 Thread Anthony Towns
On Mon, May 13, 2002 at 10:42:02AM -0500, Manoj Srivastava wrote:
 Anthony == Anthony Towns aj@azure.humbug.org.au writes:
  Anthony There is _absolutely_ no call for other packaging tools, and
  Anthony absolutely _no_ need for a standard to make this easy or
   Yeah, right. There is never any need for competition or
  diversification, or any standards that may acknowledge the difference
  between an interface and documentation of a specific implementation.

No. There is plenty of need for some standardisation. There is no need for
*this* standardisation.

  Anthony . Reforming policy into a pointless standards
  Anthony document, while gutting all the useful best practices
  Anthony information into an as-yet hypothetical new document seems a
  Anthony lot like a pointless exercise in bureacracy.
   Whatever. I see you have no interest in meaningful dialog
  (pointless standard), 

If you're interested in meaningful dialogue, I'd invite you to answer the
question you cut from my previous mail:

] A simple question: who, today, will be helped by having a document 
] called debian policy that documents the interfaces to dpkg?

Perhaps I should've written standardises instead of documents. The
meaning of the question, to try to avoid pedantic squabbles, is please
name the people who'll benefit from these changes. If you can't name
anyone, I'd contend quite strongly that you've got no way of judging if
the changes are successful or not, and thus a good chance of doing them
poorly. Further, since no one needs them, doing them is a waste of time
and energy.

  I'll refrain from pointing out that policy has
  always defined the format of version numbers, Control files,
  changelogs, and other details of how a package interfaces with the
  packaging system. Chapters 3, 4, 5, 6, 7, and 8 of the curtrent
  policy already define the interface.

I'm so glad you refrained from doing that.

  Anthony As one of the agitators for a policy team rather than a
  Anthony policy dictator, one might've hoped that at the very least
  Anthony you might at least try to reach a consensus, rather than
  Anthony dictating from on high about what policy will and won't be.
   Had I been a dictator (unlike the  RM), we would never have
  been having this pointlessly futile discussion. 

If you were seeking consensus, rather than having already decided,
this wouldn't be a pointless or futile discussion.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpoW4AhYgcRR.pgp
Description: PGP signature


Re: The Serious severity

2002-05-09 Thread Anthony Towns
On Mon, May 06, 2002 at 07:17:12PM +0200, Marcus Brinkmann wrote:
 On Tue, May 07, 2002 at 12:12:16AM +1000, Anthony Towns wrote:
  On Sat, May 04, 2002 at 10:08:51AM -0400, Marcus Brinkmann wrote:
   I don't care about now, I care about the next release, or the release
   after that.
  Then how about you spend a moment thinking about it from _my_ perspective
  and stop whining until the next release or the release after that. Yeesh.
 If I wait until the next release happens, 

How about you wait 'til _this_ release happens, then?

 Debian development is asynchronous.

That's a nice idea in theory.

Cheers,
a bottleneck j

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: init.d scripts and LSB

2002-05-09 Thread Anthony Towns
On Tue, May 07, 2002 at 01:57:51PM +0200, Marcus Brinkmann wrote:
  No, the purpose of the LSB is to provide a standard ABI and API for
  applications to link and program against, whether or not the
  underlying system has the Linux kernel or not.
 It has a strange name for that purpose.  Is it just a misnomer?

Refer back to the /usr thread on another list...

 Is the purpose only to run applications that are within the scope of what
 the LSB defines?  What about programs like CD burner software, audio
 applications and other programs that use kernel-specific ioctls?  Are the
 ioctl interfaces defined in the LSB?

The LSB's very incomplete. The latest version still specifies things that
make it impossible for Debian GNU/Linux to meet the standard, let alone
FreeBSD, Solaris or the Hurd. The next version will be somewhat better,
and later versions will hopefully continue the trend.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Bug#146023: suggested patch against policy, documenting libexec, or current custom on use of lib for binaries in lib* packages

2002-05-09 Thread Anthony Towns
On Mon, May 06, 2002 at 05:41:20PM -0500, Manoj Srivastava wrote:
 Junichi == Junichi Uekawa [EMAIL PROTECTED] writes:
  Junichi I think this was discussed enough in -devel already, but
  Junichi some good points about /libexec was given.  I've noticed
  Junichi that some known good practice is not documented in policy,
   Firstly, there is no such consensus that I can see. Secondly,
  I have not seen any technical reason to make Packages
  change. 

Did you look at the patch, or just read the introduction? Junichi just
seems to be codifying current practice (If you want to include support
stuff in a lib* package, put it in /usr/lib/pkgname so when you install
libfoo2, you don't get file conflicts), not introducing random new
stuff (Put stuff in /libexec! Yay hurd! Yay BSD! Boo FHS!). Are there
any packages that don't comply with the patch, that don't already have
problems with the fourth paragraph of section 11.3?

  Junichi and I propose the following patch:
   This is way premature.

Patches are almost always a good thing, even if they're completely
unsuitable to be applied. This one doesn't seem particularly unsuitable.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpX4Y1MWeRep.pgp
Description: PGP signature


Re: Working on debian developer's reference and best packaging practices

2002-05-09 Thread Anthony Towns
On Mon, May 06, 2002 at 06:11:46PM +0100, Julian Gilbey wrote:
 On Fri, May 03, 2002 at 08:02:50PM +1000, Anthony Towns wrote:
  I'm concerned about this because when I tried passing over
  release-critical policy issues to the policy group, it didn't work. [..]
 Strawman (to quote lots of others).  As a concept, it's very good, but
 as we discovered, the implementation was poor.  

As a concept it sucked, we just didn't realise it at the time. -policy
isn't competent at judging which issues should be release critical. We
didn't realise this before we tried, no we have tried and it's blatanly
obvious.

I'd suspect the reason it doesn't work is because there's no downside
for -policy to making a rule a release-critical issue, compared to not
doing it.  You guys don't have to try to coerce people into fixing their
RC bugs in a timely manner, nor throw out packages that don't have their
RC bugs fixed, nor deal with the people who absolutely need the package.

The only downside has been that if you try adding a release critical
requirement, I'll jump down your throats. And that doesn't have any wins
over me just deciding which issues are RC and which aren't.

 My suggestion for a
 policy rewrite it to move to the standard RFC uses of MUST and SHOULD,
 and indication RC-ness in an orthogonal way.

In short, this isn't going to happen. There'll be a separate document,
maintained by the release manager. It may or may not be included in
debian-policy.deb. I'm inclined to think it'd be better if it were in
that package, but we'll see.

  Further, considering that everyone seems to think that the -policy
  group have done pretty poorly at their actual job -- maintaining
  the policy document so that it's readable, consistent and useful --
  it doesn't seem like a good idea to broaden its scope. Rewriting it
  into something comprehensible, making the already approved of changes,
  and merging all the subpolicies (at least debconf, perl, and python)
  is likely to be more than enough work for the forseeable future.
 Thanks.  Appreciated.  We need to rewrite policy, and have known this
 for absolutely ages, but when it absorbed the old packaging manual, it
 introduced the contradictions (oops).  I vaguely recall that at that
 time, a freeze was effectively placed on substantially rewriting
 policy because of the upcoming freeze of woody.

This was about six months ago, and you and Manoj were too busy to do
anything at all about it (and there aren't any other active policy
editors to do it). The packaging manual was included about four months
earlier than that. It doesn't really matter. Doing a good rewrite of
what's currently in there, incorporating all the separate mini-policies
that're about, and adding all the new policies that need to be added
will be a lot of work, even without trying to make a dpkg standard.

  We are still in this
 freeze period, and both Manoj and I are itching to rewrite the current
 spaghetti which is called policy.

So start. Rewriting means no changes to the substance anyway (or so I'd
assume), which means there aren't any problems at all with it as far as
I'm concerned (with my release manager hat on).

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Working on debian developer's reference and best packaging practices

2002-05-09 Thread Anthony Towns
On Mon, May 06, 2002 at 06:19:54PM +0100, Julian Gilbey wrote:
   Then each section could either have the structure:
 Policy dictate s
 Discussion, useful information, guidelines, examples
   or we could merge them, and have policy dictates all in the form MUST,
   SHOULD, MAY, MUST NOT, etc., as in the RFCs. 
  I'm quite confident that trying to differentiate between requirements
  and guidelines like this will turn out to be completely unhelpful and
  a large waste of time, personally.
 Don't RFCs do this frequently?  And I've never heard people making
 such a complaint about them.

RFCs have a different goal to -policy. RFCs specify things that get
implemented by different groups and have to be interoperable. -policy
doesn't.

There is only one dpkg, there is only one apt, there is only one
Debian, and the point of -policy is to make all of these more effective,
not to help random people with nothing better to do implement clones.

If we were doing the latter (and you and Manoj seem to want to wrt dpkg
for no reason I can fathom), then must/should would be useful. But
we're not. If people want to clone dpkg (or finish of libapt-inst so
it can actually install packages; or implement Herring (if anyone even
*remembers* it...)) then more power to them. If someone does do this,
then it might turn out that there are some incompatibilities that need to
be handled specially by packages, and we'll probably add these to policy
when we find them.

Maybe, some day, there'll be a handful of competing dpkgs and we will
need a standards document to say what constitutes a valid dpkg, but
that ain't today. So why waste time on it?

   (As far as RC issues
   goes, this could be marked by (RC) after the MUST/SHOULD/whatever,
   with a catchall at the start of policy that the final decision on what
   is RC rests with the release manager.)
  As far as RC issues go, they'll be specified in an entirely separate
  document, not maintained by the policy group.
 Do you really expect bug submitters to consult yet another document,
 or is it just so that you can point people to it and say See, this is
 not considered an RC bug!?  

Bug submitters already look at another document. That document will
merely change from being the entirety of policy, to something a fair
bit shorter and a fair bit more on-point.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpPKnPlErWu0.pgp
Description: PGP signature


Re: Working on debian developer's reference and best packaging practices

2002-05-09 Thread Anthony Towns
On Mon, May 06, 2002 at 06:11:46PM +0100, Julian Gilbey wrote:
 On Fri, May 03, 2002 at 08:02:50PM +1000, Anthony Towns wrote:
  If the dpkg authors would like to hand off some of their design decisions
  to -policy on a generalised basis, I'm sure they'd say so. It seems a bit,
  well, wrong-headed for -policy to be trying to take control of dpkg though.
 Quite: IMHO discussion is about where the documentation should be
 found, not about the maintenance or control of dpkg! [...]

The documentation should be found wherever the dpkg maintainers want it,
not wherever the -policy maintainers think might be fun.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgppwpCLf7rcw.pgp
Description: PGP signature


Re: The Serious severity

2002-05-09 Thread Anthony Towns
On Thu, May 09, 2002 at 08:02:04PM +0200, Wichert Akkerman wrote:
 Previously Anthony Towns wrote:
  On Mon, May 06, 2002 at 07:17:12PM +0200, Marcus Brinkmann wrote:
   Debian development is asynchronous.
  That's a nice idea in theory.
 It just to be true before we had testing.

I can assure you I had a lot less time to do stuff like fiddle with the
BTS when I was trying to get potato released.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgp7rP9xFz705.pgp
Description: PGP signature


Re: Working on debian developer's reference and best packaging practices

2002-05-09 Thread Anthony Towns
On Mon, May 06, 2002 at 05:19:09PM -0500, Manoj Srivastava wrote:
 Anthony == Anthony Towns aj@azure.humbug.org.au writes:
  Anthony The real question is whether maintainers are meant to build
  Anthony using the features of dpkg, or the ones listed in
   *Sigh*. Let me see if I can dot the i's and cross the t's. A
  package should be buildable using the bits mentioned in policy. Any
  package may, however, choose to add any extra bits added by dpkg,
  (perhaps buigld depending on a new dpjg version if the change is not
  compatible with older versions).

This, uh, doesn't make sense.

A package should be buildable using nothing more than
 [foo]. Unless it chooses not to be.

...seems to be what you just said. 

If you want to say something like Packages should specify a versioned
build-dependency if they use features from a package that weren't
available in both the last two stable releases, that's fine by me ---
but you don't have to write out a dpkg spec to say that. (If you want to
make sure it works, you could set up a buildd with a two year old chroot,
or similar, and file bug reports with patches when you find problems)

Speccing out dpkg is not what policy is for, and doesn't win us anything.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpk2pz1Mzxxs.pgp
Description: PGP signature


Re: Working on debian developer's reference and best packaging practices

2002-05-09 Thread Anthony Towns
-project Bcc'ed only.

On Thu, May 09, 2002 at 11:17:28PM +0100, Julian Gilbey wrote:
 On Fri, May 10, 2002 at 04:02:47AM +1000, Anthony Towns wrote:
  On Mon, May 06, 2002 at 06:19:54PM +0100, Julian Gilbey wrote:
 Then each section could either have the structure:
 or we could merge them, and have policy dictates all in the form MUST,
 SHOULD, MAY, MUST NOT, etc., as in the RFCs. 
I'm quite confident that trying to differentiate between requirements
and guidelines like this will turn out to be completely unhelpful and
a large waste of time, personally.
   Don't RFCs do this frequently?  And I've never heard people making
   such a complaint about them.
  RFCs have a different goal to -policy. RFCs specify things that get
  implemented by different groups and have to be interoperable. -policy
  doesn't.

  There is only one dpkg, [...]
 Who's talking about dpkg here?

Manoj, for one:

] [...] The policy group shall never propose additions to
] dpkg functionality, the way the section shalll be formulated. What
] shall be in the section is what the maintainers _must_ have in order
] for their packages to be built.  This is the core interface that dpkg
] already presents [...]

 Policy covers far more than that.

Actually it covers different things than that, which is my whole point.
The RFC-style M/S/M remarks are just tangential.

 For
 example, when talking about shared and static libraries, there may be
 exceptional cases where both the shared library and the development
 parts (headers and static library) live in the same package.  Then one
 would say something like Source packages providing shared libraries
 SHOULD produce a binary package containing the shared library and
 another binary package containing the development files (headers and
 statically compiled library).  The shared library MUST be compiled
 with the -fPIC option and the static library MUST NOT be compiled with
 this option.  ...  (Please don't correct me on details here -- I
 haven't checked them up and that's not the point.)

Which is to say that if I demonstrate that your MUST or MUST NOT
could happen to have exceptions, that you're not going to listen, and
thus I've got no way of usefully demonstrating my point, which is that
almost every MUST you might choose will have some sort of exception,
and thus should be a SHOULD.

In the above, for example, the xlibs-pic package provides static libraries
that are compiled with -fPIC, making your MUST NOT inappropriate.

 So here, the SHOULD means that it must behave in this way unless
 there are exceptional circumstances, and the MUST means that there
 are no exceptions.  I may be wrong in the details of this specific
 case, but this is the way I am thinking.

I completely understand the distinction you're trying to make, I just
think you'll find that there aren't many situations where MUST is
appropriate, and that there aren't any where it's particularly useful.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpgaQaTQneov.pgp
Description: PGP signature


Re: Working on debian developer's reference and best packaging practices

2002-05-06 Thread Anthony Towns
On Sat, May 04, 2002 at 09:02:24PM -0500, Manoj Srivastava wrote:
 Adam == Adam Heath [EMAIL PROTECTED] writes:
  Adam We(Wichert and I) implement features that users want, when we
  Adam have time.  We implement those that are interesting to us when
  Adam we have free time.  I don't think either one of us would feel
  Adam comfortable being led by another group.
   Strawman. The policy group shall never propose additions to
  dpkg functionality, the way the section shalll be formulated. What
  shall be in the section is what the maintainers _must_ have in order
  for their packages to be built.  

That statement's a bit ambiguous.

The real question is whether maintainers are meant to build using the
features of dpkg, or the ones listed in debian-policy. The former makes
sense and works; the latter means that any new features in dpkg have to
go through the hurdle of debian-policy for no good reason.

We already expect dpkg not to break existing packages, we already are
happy to ignore features in dpkg that are useless, we've no need to
support different implementations of dpkg (anyone remember Herring?) --
and if we did, they'd have to support the undocumented-in-policy features
that some packages will be using anyway -- and we already have a few
people who need to be convinced of any major changes (apt needs to
grok Packages files as well as dpkg, apt-ftparchive needs to be able to
grok .debs and source packages), and we already have plenty of areas to
discuss any changes if discussion is needed.

   Having that in policy serves two purposes -- it is a quick,
  minimal reference to the standard interface to packaging tools for
  debian developers,

Policy is not a HOWTO, and doesn't work as a HOWTO. If you want a quick
minimal dpkg reference, use the packaging manual or the man pages,
or write a HOWTO.

   and it shall be the common basis that any other
  packaging tool apart from dpkg must implement in order to qualify.

Like I've already said -- standardisation for standardisation's sake.

   From time to time, the dpkg authors could ask for additional
  functions to be added to the core set, at your discretion, when you
  think it has become a part of the standard interface debian packages
  have to the packaging system(s).

If stuff's added to policy after it's been tried in various packages,
then it doesn't document enough for reimplementations of dpkg, if it's
added before, it'll have to document things before they've been tried
and demonstrated to be useful.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: The Serious severity

2002-05-06 Thread Anthony Towns
On Sat, May 04, 2002 at 10:08:51AM -0400, Marcus Brinkmann wrote:
 I don't care about now, I care about the next release, or the release
 after that.

Then how about you spend a moment thinking about it from _my_ perspective
and stop whining until the next release or the release after that. Yeesh.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpgzrtYVrGAd.pgp
Description: PGP signature


Re: The Serious severity

2002-05-04 Thread Anthony Towns
On Fri, May 03, 2002 at 05:27:30PM +0200, Marcus Brinkmann wrote:
 On Fri, May 03, 2002 at 08:16:32PM +1000, Anthony Towns wrote:
  On Thu, May 02, 2002 at 07:15:09PM -0400, Joey Hess wrote:
   Seems to me that if bug severity is orthagonal to release criticality
  People keep saying that, but it's not true [0]. Release critical bugs
  are those that are serious, grave or critical.
 Either this is not true, or the BTS documentation is wrong.  [[hurd isn't
 treated the same as i386]]

There are many unwritten rules about how bugs need to be treated,
and they change depending on what seems the best way to get a working
release out.  In particular, filing hurd bugs at high severities before
release (especially when people are already uploading relatively untested
packages with high urgencies) seems likely to lower the quality of woody
dramatically. Adding arch tags aren't possible in the short term,
and it's not particularly clear that they'd be helpful at solving that
particular problem.

You're quite welcome to hax0r the BTS slightly to make
it easier to track hurd bugs. You can, eg, add your own
pseudo-header to say X-This-Is-RC-For-Hurd: yes and then
grep through the bug spool later to find them all again and
upgrade them when you are actually near release. Or have a
special submitter address (debian-hurd@lists.debian.org) and use
http://bugs.debian.org/from:debian-hurd@lists.debian.org to look over
them.

Helping hurd release sometime in the next few years isn't important
enough to risk breaking Linux/i386 now.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgp4mEkq8ZEHW.pgp
Description: PGP signature


Re: The Serious severity

2002-05-04 Thread Anthony Towns
On Sat, May 04, 2002 at 10:16:09AM +0200, Marcus Brinkmann wrote:
 And, why should the severity only be useful for the release manager, and
 released architectures?  

Think about it for a while from any perspective but a hurd hacker's for
heavens sake. Think about what should get the highest priority right now,
a hurd release in a few years or an i386 release in a few weeks. Think
about the usual effects of uploads to fix hurd specific bugs (which is to
say: breakage everywhere else). Think about how much time I can possibly
devote to your whims about the BTS considering the various other things
I can devote my time too. Think about whether anyone else at all can
or will do anything about them. Think about the sort of ratio of effort
that's reasonable to put into doing things versus justifying why they're
done this way. Think about whether there's any real practical benefit
to insisting on someone else doing things the way you want, rather than
you just hacking around the problem yourself and getting stuff done.

_Think about things_ godammit.

Cheers,
aj, who wishes he'd remember that he'd given up on transparency already

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Working on debian developer's reference and best packaging practices

2002-05-03 Thread Anthony Towns
Is there any reason for this thread to still be on -project? It's entirely
about rewriting debian-policy now, isn't it?

On Thu, May 02, 2002 at 03:32:11PM +0200, Wichert Akkerman wrote:
  So if the dpkg reference doesn't document everything that Debian needs
  in this respect, what is the best thing to do?
 dpkg allows things that Debian does not. Version numbering for NMUs is
 a good example of a policy that Debian adds on top of what dpkg
 provides.

The use of the Essential: keyword is similar (as far as dpkg is
concerned, that keyword just makes it harder to --remove stuff; as far
as policy is concerned it allows you to refrain from listing things in
Depends:), as is the use of Priority: and Section:.

 There will be a reference manual for dpkg that documents only dpkg
 specifics. You are free to copy parts of that into Debian policy,
 but I would rather have them as seperate documents. That means
 people will need to read both, but that might give them a better
 understanding of how Debian is build.

ObShot: Much like, say, people used to have to read both the packaging
manual and policy...

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpw4sycuuSy4.pgp
Description: PGP signature


Re: Working on debian developer's reference and best packaging practices

2002-05-03 Thread Anthony Towns
On Thu, May 02, 2002 at 03:20:45PM -0500, Manoj Srivastava wrote:
 Julian == Julian Gilbey [EMAIL PROTECTED] writes:
  Julian Surely either everything necessary should be in the dpkg reference or
  Julian everything necessary should be in policy. q
   On the other hand, all packages must not be left to the whimsy
  of the dpkg developers either;

This is rather non-sensical: all packages /are/ left to the whimsy of
the dpkg developers. If you don't believe me, I'm sure Wichert or Adam
will be happy to introduce some random bugs in dpkg 1.10.x to demonstrate.

If the dpkg authors would like to hand off some of their design decisions
to -policy on a generalised basis, I'm sure they'd say so. It seems a bit,
well, wrong-headed for -policy to be trying to take control of dpkg though.

  since potentially large numbers of
  packages would be impacted by such changes.

The dpkg maintainers are well aware of the likely impact of their changes,
and are quite able to ask for advice when it's needed.

I'm concerned about this because when I tried passing over
release-critical policy issues to the policy group, it didn't work. Not
only did everyone regularly and frequently lose track of what the point of
must versus should was, but people just weren't very good at knowing
when to choose which. Which is fine: we tried an experiment, it didn't
work out how we'd hope, let's move on. But let's not just repeat the
same mistake when there's no reason to do so.

Further, considering that everyone seems to think that the -policy
group have done pretty poorly at their actual job -- maintaining
the policy document so that it's readable, consistent and useful --
it doesn't seem like a good idea to broaden its scope. Rewriting it
into something comprehensible, making the already approved of changes,
and merging all the subpolicies (at least debconf, perl, and python)
is likely to be more than enough work for the forseeable future.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpCM38Ezsm7I.pgp
Description: PGP signature


Re: The Serious severity

2002-05-03 Thread Anthony Towns
On Thu, May 02, 2002 at 07:15:09PM -0400, Joey Hess wrote:
 Seems to me that if bug severity is orthagonal to release criticality

People keep saying that, but it's not true [0]. Release critical bugs
are those that are serious, grave or critical. Bugs that will stop the
release of that package are release critical bugs that haven't been
specifically exempted by the release manager. Exemptions only happen
just before a release, and only happen on a discretionary basis, and
don't last for a particularly long time.

There may be subtle differences between the meanings of the various
terms, but they are *very* strongly correlated, which is right at the
other extreme from orthogonality.

Cheers,
aj

[0] It's not even spelt right! But it's Joey, so that's okay.

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpHNkJjHKpQg.pgp
Description: PGP signature


Re: Working on debian developer's reference and best packaging practices

2002-05-03 Thread Anthony Towns
On Thu, May 02, 2002 at 02:59:36PM -0500, Manoj Srivastava wrote:
 Julian == Julian Gilbey [EMAIL PROTECTED] writes:
  Julian People *used* to make that complaint.  And if we now move to having a
  Julian lean policy standards document and a developers reference and a best
  Julian programming advice document and a dpkg documentation document, we'll
  Julian have even more complaints in that direction.
   I beg to differ. The reason people used to complain was there
  was no single place one could go to to get a definitive reference for
  all the things a package maintainer _must_ do in order to achieve
  interoperability and prevent bug reports.

Uh, people complain about lots of things. It doesn't make them right, or
their suggested alternatives correct.

   In the new scheme of things, the policy manual would be the
  place to look at. For further assistance, one could look at the
  developers reference (HOWTO), 

The developers-reference describes how to go about uploading new versions
of your own packages or someone else's, how stable, testing, and unstable
work (once someone actually knows, anyway), how the mailing lists work
and so forth.

debian-policy currently describes (or, attempts to, or is intended to)
the way packages should be constructed when those decisions aren't
dictated by the tools.

The packaging-manual used to describe the way the dpkg tools worked. Other
documents (the update-inetd manpage, the stuff in /usr/doc/debconf,
the debhelper manpages, etc) describe how other tools work.

   This is a far cry from the old muddle and multiple locations
  for must do things we had in the past.

I think you overstate the problems that used to exist.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

 ``BAM! Science triumphs again!'' 
-- http://www.angryflower.com/vegeta.gif


pgpEhxnUSFVdx.pgp
Description: PGP signature


  1   2   3   4   5   >