Re: [gentoo-dev] [RFC] Decoupling stabilization from security bugs

2021-08-13 Thread Michał Górny
On Fri, 2021-08-13 at 12:50 -0400, Aaron Bauman wrote:
> On Thu, Aug 12, 2021 at 01:17:32PM -0700, Matt Turner wrote:
> > On Thu, Aug 12, 2021 at 5:53 AM Michał Górny  wrote:
> > > 
> 
> 
> 
> > To do that, I think we'd want to change what's required for the "clean
> > up" step. Since today the "clean up" step is dropping the vulnerable
> > package versions from the tree, it is dependent on
> > non-security-supported architectures completing the stabilization bug.
> > I think we'd like to break that dependence.
> > 
> 
> Yes, please. Thank you for bringing this up. This has been a hotly
> debated item in the past with former security leads dictating that
> "clean up" is not relevant to the security process, but it remained
> codified in documentation that it needs to occur.
> 
> It is indeed important, as leaving vulnerable versions is the tree is not
> good for anyone and impacts many other areas (e.g. promoting tree
> cleanliness).
> 
> Further, as mgorny mentioned in a follow-up email to this, we need to
> understand what is a "security supported" architecture. This has also
> been an issue in the past with council intervention needed to declare
> dropping specific arches to exp profiles and allowing security to drop
> support and subsequently move bugs forward.
> 
> And to continue on my soap box, we have a small blurb on the security
> page [1] which states what architectures are considered security supported.
> This is less than ideal. We also generally state that stable arches are
> supported and must be dealt with during the vulnerability process.
> 
> So, all in all, it is highly conflated IMHO and is *not* ideal for
> anyone to have to determine that a particular arch is stable but not
> security supported. 
> 
> As such, I advocate for any stable arch to be security supported by
> default. If the arch lags or is dropped then it goes to unstable
> (process TBD).
> 

Yes, this sounds like a good idea.  We should avoid having multiple
classifications for architectures.  If something's good enough to be
stable, it should be security supported.  If it's not, then it shouldn't
be stable.

In the end, I guess the primary problem is manpower.  Given that secbugs
are normally given priority, I don't really see a case for an arch that
would be not good enough to be security supported but at the same time
good enough to cope with the wider range of bugs.

-- 
Best regards,
Michał Górny





[gentoo-dev] Last rites: app-benchmarks/acovea and deps

2021-08-13 Thread David Seifert
# David Seifert  (2021-08-13)
# Dead upstream, new "forked" upstream that just added the last version
# on Github but doesn't maintain them. Unmaintained for the past 10
# years in ::gentoo, no other real distros package these anymore.
# HOMEPAGE leads to some scammy site.
# Bug #318143, #62, #626668, Removal in ~30 days.
dev-libs/libbrahe
dev-libs/libcoyotl
dev-libs/libevocosm
app-benchmarks/acovea
app-benchmarks/acovea-gtk


signature.asc
Description: This is a digitally signed message part


Re: [gentoo-dev] [RFC] Decoupling stabilization from security bugs

2021-08-13 Thread Aaron Bauman
On Thu, Aug 12, 2021 at 01:17:32PM -0700, Matt Turner wrote:
> On Thu, Aug 12, 2021 at 5:53 AM Michał Górny  wrote:
> >



> To do that, I think we'd want to change what's required for the "clean
> up" step. Since today the "clean up" step is dropping the vulnerable
> package versions from the tree, it is dependent on
> non-security-supported architectures completing the stabilization bug.
> I think we'd like to break that dependence.
>

Yes, please. Thank you for bringing this up. This has been a hotly
debated item in the past with former security leads dictating that
"clean up" is not relevant to the security process, but it remained
codified in documentation that it needs to occur.

It is indeed important, as leaving vulnerable versions is the tree is not
good for anyone and impacts many other areas (e.g. promoting tree
cleanliness).

Further, as mgorny mentioned in a follow-up email to this, we need to
understand what is a "security supported" architecture. This has also
been an issue in the past with council intervention needed to declare
dropping specific arches to exp profiles and allowing security to drop
support and subsequently move bugs forward.

And to continue on my soap box, we have a small blurb on the security
page [1] which states what architectures are considered security supported.
This is less than ideal. We also generally state that stable arches are
supported and must be dealt with during the vulnerability process.

So, all in all, it is highly conflated IMHO and is *not* ideal for
anyone to have to determine that a particular arch is stable but not
security supported. 

As such, I advocate for any stable arch to be security supported by
default. If the arch lags or is dropped then it goes to unstable
(process TBD).


[1]: https://www.gentoo.org/support/security/vulnerability-treatment-policy.html

-Aaron


signature.asc
Description: PGP signature


Re: [gentoo-dev] [RFC] Decoupling stabilization from security bugs

2021-08-13 Thread Jaco Kroon
Hi,

>> It would be nice to be able to resolve the security@-assigned but
>> before non-security-supported architectures are handled.
>>
>> To do that, I think we'd want to change what's required for the "clean
>> up" step. Since today the "clean up" step is dropping the vulnerable
>> package versions from the tree, it is dependent on
>> non-security-supported architectures completing the stabilization bug.
>> I think we'd like to break that dependence.
>>
>> I suggest that we redefine the "clean up" step to be: drop
>> security-supported architectures' keywords from vulnerable versions.
>> That would allow the security@-assigned bug to be resolved before
>> non-security-supported architectures are finished with stabilization.
>>
> To be honest, this sounds like doubling the effort for little benefit. 
> After all, removing the old version of the package doesn't resolve any
> problems on the end user systems -- upgrading does, and upgrading
> usually happens entirely independently of whether we've cleaned up or
> not.
>
> Maybe it'd easier to release GLSAs before cleanup happens?  We can
> always go the dekeywording way if arch teams are actually slacking.
>
I agree with both of you.  In particular, cleaning old versions should
not be a requirement for releasing the GLSA.  The faster the GLSA can
get out the better.  Removing the keywords is a novel idea, but honestly
not sure it's worth the effort.

Kind Regards,
Jaco




Re: [gentoo-dev] [PATCH] metadata/install-qa-check.d: add 60tmpfiles-path QA check

2021-08-13 Thread Ulrich Mueller
> On Fri, 13 Aug 2021, David Seifert wrote:

> On Mon, 2021-08-09 at 19:50 +0200, Thomas Deutschmann wrote:
>> Interesting. You don't even now my view on this but you already have
>> an opinion and are saying that I am the culprit. I think this is
>> called "prejudiced".

> To this day, we're still waiting for your view/statement/rebuttal of the
> points, but have yet to receive anything.

>> I am pretty sure that as a ComRel member you will abstain
>> from this case as you seem to be superior. I mean you are publicly 
>> attacking me for 10+ months, rejected any attempt from my side when I 
>> tried to speak with you to get things sorted and now you showed how 
>> biased your are...

> The last message I received from you was on 10 Jul. I have sent 3
> follow-up messages before Monday, 12 Jul (when the Bernd low hit
> Germany). Since then, nothing. And before you invoke the Bernd argument:
> I'm also a first responder, and while the high Rhine wasn't nearly as
> badly affected as the middle Rhine/Eifel area in terms of floodings, I
> understand that you might not have had the time to respond (even though
> you pushed 19 commits to ::gentoo on 13 Jul). That said, "let me check
> whether soap wrote something in PM" seems to have never occurred since
> 12 Jul at any point, which raises doubts as to whether this is such a
> critical issue after all...

Can you please take this discussion private? gentoo-dev is a technical
mailing list, and while [1] still qualifies as on-topic (IMHO), the
three messages following it in this sub-thread are off-topic here.

Ulrich

[1] 
https://archives.gentoo.org/gentoo-dev/message/565efeab6f253c402212fd8d8aa58945


signature.asc
Description: PGP signature


Re: [gentoo-dev] [PATCH] metadata/install-qa-check.d: add 60tmpfiles-path QA check

2021-08-13 Thread David Seifert
On Mon, 2021-08-09 at 19:50 +0200, Thomas Deutschmann wrote:
> On 2021-08-08 13:17, David Seifert wrote:
> > So you've created a big commotion... because you didn't get the
> > initial
> > point? Honestly, this seems to be a recurring theme at this point.
> > Someone suggests some improved check/some change, and nowadays you
> > can
> > bet 50 quid that Whissi will pop up and bikeshed it in some way.
> 
> No?
> 
> First of all, just because you disagree with something or believe a 
> discussion is wrong and or not necessary and start to frame it as 
> bikeshedding, it doesn't actually become bikeshedding. This is a very 
> sad and transparent attempt to silence people through defamation.
> 
> The draft contains an error. It's saying that "/etc/tmpfiles.d" became
> deprecated which is not true. Because this would imply that it was 
> previously acceptable for packages in Gentoo repository to install to 
> that location which is not correct. If a packages in ::gentoo
> installed 
> to /etc/tmpfiles.d before, this was already wrong.
> 
> And my point was and still is, that neither the commit message nor the
> eqawarn should use the wording "deprecated" because nothing has
> changed 
> -- no location became deprecated.
> 
> And this will also address parts of antarus' previous mail: Because
> this 
> QA check should be only about ::gentoo repository, this shouldn't
> affect 
> any other repository. I.e. in your own overlay, you are free to do 
> whatever you want and can't be forced to stick to Gentoo QA rules.
> 
> 
> > It's become a real problem at this point. In fact, we have proxy
> > maintainers publicly refusing to work on packages somehow involving
> > you
> > (I'll mention no names, but check the #-desktop backlog), because
> > your
> > personality boils down to three attributes nowadays:
> 
> I am not in that channel and never was. If you make such an
> allegation, 
> include facts so that I can respond. If you look at my complete
> history 
> at GitHub issues you will find that most people I worked with 
> appreciated to work with me. Of course there are some bugs/PRs where I
> rejected a requested change but I am not sure what your point is. This
> is normal because not every PR is valid.

#gentoo-desktop:

[00:00:00] - {Day changed to Friday, 6 August 2021}
[...]
[13:32:33]  soap: we went over this last week, 1. I'm not
making any more PRs where I do not receive the recognition I deserve and
2. working with Whissi is probably impossible ;(
[...]
[13:34:50]  I'm not sure how well it got through since he
didn't seem to respond to my concerns but I could also tell that he
really has an authoritative decision making style

Timestamps so you can verify it with a third-party. This is a public
statement, I will not share statements by people who have confided in
me.

> > 1. If I say the sky is blue, you'll say it's green. If I say it's
> > green,
> > you'll say it's blue. I've had at least 5 people tell me they see
> > the
> > exact same pattern in you (and no, mgorny is not part of that set,
> > before you throw that point at me). You're the textbook contrarian
> > of
> > Gentoo ("Wutbürger") right now.
> > 2. You'll tell people they are wrong, they aren't following
> > protocols,
> > they made a mistake, but you will never follow through with actually
> > telling people what/why or how. By the time people ask you "why?",
> > you've already disappeared. Given how frequently this happens in
> > multiple channels, projects and at different time points,
> > statistically,
> > this can't be explained by coincidence any more. This happens
> > practically on a daily basis, so you're not getting the benefit of
> > the
> > doubt any more.
> > 3. You can't let go. The security elections disaster right now is
> > the
> > prime example (yes, it's public, just check the history of the
> > Security
> > Project). This captures you so well: it's all about **community**
> > and
> > stuff, until you lose, then you start invoking technicalities and
> > procedural shenanigans to justify some ludicrous kind of "co-lead"
> > crap.
> > Frankly, it's embarrassing, and you're at the centre of it. Instead
> > of
> > accepting defeat (remember, community and democracy!), you just
> > fudge
> > the results.
> 
> Interesting. You don't even now my view on this but you already have
> an 
> opinion and are saying that I am the culprit. I think this is called 
> "prejudiced".

To this day, we're still waiting for your view/statement/rebuttal of the
points, but have yet to receive anything.

> I am pretty sure that as a ComRel member you will abstain
> from this case as you seem to be superior. I mean you are publicly 
> attacking me for 10+ months, rejected any attempt from my side when I 
> tried to speak with you to get things sorted and now you showed how 
> biased your are...

The last message I received from you was on 10 Jul. I have sent 3
follow-up messages before Monday, 12 Jul (when the Bernd low hit
Germany). Since then, 

[gentoo-dev] [PATCH 5/3] qmail.eclass: retire qmail_tcprules_fixup()

2021-08-13 Thread Rolf Eike Beer
This has been in all ebuilds since the move of the portage tree to git, so
everyone should have already moved the files.

Signed-off-by: Rolf Eike Beer 
---
 eclass/qmail.eclass| 22 --
 mail-mta/netqmail/netqmail-1.06-r14.ebuild |  4 
 mail-mta/notqmail/notqmail-1.08-r3.ebuild  |  4 
 mail-mta/notqmail/notqmail-.ebuild |  4 
 4 files changed, 34 deletions(-)

diff --git a/eclass/qmail.eclass b/eclass/qmail.eclass
index c25950cc303..7f4d1f77e42 100644
--- a/eclass/qmail.eclass
+++ b/eclass/qmail.eclass
@@ -374,28 +374,6 @@ qmail_rootmail_fixup() {
chown -R alias:qmail "${ROOT}${QMAIL_HOME}"/alias/.maildir 2>/dev/null
 }
 
-qmail_tcprules_fixup() {
-   mkdir -p "${TCPRULES_DIR}"
-   local POP_FILES=
-   use pop3 && POP_FILES="pop3 pop3.cdb"
-   for f in {smtp,qmtp,qmqp}{,.cdb} ${POP_FILES}; do
-   old="/etc/tcp.${f}"
-   new="${TCPRULES_DIR}/tcp.qmail-${f}"
-   fail=0
-   if [[ -f "${old}" && ! -f "${new}" ]]; then
-   einfo "Moving ${old} to ${new}"
-   cp "${old}" "${new}" || fail=1
-   else
-   fail=1
-   fi
-   if [[ "${fail}" = 1 && -f "${old}" ]]; then
-   eerror "Error moving ${old} to ${new}, be sure to check 
the"
-   eerror "configuration! You may have already moved the 
files,"
-   eerror "in which case you can delete ${old}"
-   fi
-   done
-}
-
 qmail_tcprules_build() {
for f in tcp.qmail-{smtp,qmtp,qmqp,pop3,pop3s}; do
# please note that we don't check if it exists
diff --git a/mail-mta/netqmail/netqmail-1.06-r14.ebuild 
b/mail-mta/netqmail/netqmail-1.06-r14.ebuild
index aef1ed5b4dd..e1f20404872 100644
--- a/mail-mta/netqmail/netqmail-1.06-r14.ebuild
+++ b/mail-mta/netqmail/netqmail-1.06-r14.ebuild
@@ -173,10 +173,6 @@ pkg_postinst() {
elog
 }
 
-pkg_preinst() {
-   qmail_tcprules_fixup
-}
-
 pkg_config() {
# avoid some weird locale problems
export LC_ALL=C
diff --git a/mail-mta/notqmail/notqmail-1.08-r3.ebuild 
b/mail-mta/notqmail/notqmail-1.08-r3.ebuild
index 382f241e719..6afc55ac3bd 100644
--- a/mail-mta/notqmail/notqmail-1.08-r3.ebuild
+++ b/mail-mta/notqmail/notqmail-1.08-r3.ebuild
@@ -173,10 +173,6 @@ pkg_postinst() {
elog
 }
 
-pkg_preinst() {
-   qmail_tcprules_fixup
-}
-
 pkg_config() {
# avoid some weird locale problems
export LC_ALL=C
diff --git a/mail-mta/notqmail/notqmail-.ebuild 
b/mail-mta/notqmail/notqmail-.ebuild
index 8673f74908f..224aaed0628 100644
--- a/mail-mta/notqmail/notqmail-.ebuild
+++ b/mail-mta/notqmail/notqmail-.ebuild
@@ -168,10 +168,6 @@ pkg_postinst() {
elog
 }
 
-pkg_preinst() {
-   qmail_tcprules_fixup
-}
-
 pkg_config() {
# avoid some weird locale problems
export LC_ALL=C
-- 
2.26.2



signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-dev] [PATCH 2/3] qmail.eclass: remove magic to query root group

2021-08-13 Thread Rolf Eike Beer
Am Freitag, 13. August 2021, 11:06:09 CEST schrieb Ulrich Mueller:
> > On Fri, 13 Aug 2021, Rolf Eike Beer wrote:
> > Am Donnerstag, 12. August 2021, 19:39:08 CEST schrieb Michael Orlitzky:
> >> On Thu, 2021-08-12 at 17:22 +0200, Rolf Eike Beer wrote:
> >> > The default owner is root:root anyway.
> >> 
> >> This is only true of you don't call insopts earlier with some other
> >> value. I see "insopts -o root -g qmail -m 700" in there so you might
> >> want to double check.
> > 
> > Not my day.
> > 
> > Ok, given that there are several places that change users and groups
> > and the subfunctions are not always called it would be very few places
> > where I can remove the root:root (about 3) and be sure that everything
> > works. For that reason I would just keep them all and go back to the
> > initial patch 2.
> 
> I believe the method of choice would be to execute the offending
> insopts/doins pair in a subshell, i.e. put a ( ) pair around them.

I will just do it the other way: explicitly reset it to defaults in the 2 
functions that actually set something special.


signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-dev] [RFC] Decoupling stabilization from security bugs

2021-08-13 Thread Lars Wendler
Hi Michał,

On Thu, 12 Aug 2021 14:53:33 +0200 Michał Górny wrote:

>Hello, everyone.
>
>TL;DR: I'd like to propose that stabilizations are done via blockers of
>security bugs instead of security bugs themselves, i.e. as any other
>stabilizations.
>
>
>Right now we're often performing security-related stabilizations via
>security bugs. This has a few problems, that are:
>
>1. Stabilization-related activity causes unnecessary mail to the widely
>subscribed security alias. That is, subscribed people get notified of
>package list changes, NATTkA results, every arch doing its work.
>However, in reality the security team only cares about stabilization
>being started, stalled or finished -- and for that, getting the usual
>'dependent bug added/closed' mail should be sufficient.
>
>2. NATTkA has no good way of distinguishing irrelevant security bugs
>from security bugs where something went wrong (and NATTkA doesn't use
>persistent state by design). The most important problem is that --
>unlike regular stablereqs -- security bugs aren't supposed to be closed
>after stabilization. It can't really distinguish a security bug 'left
>open' from a security bug with incorrect package list.
>
>3. Proxied maintainers without editbugs can't actually CC arches on
>security bugs since the bugs are assigned to security@.
>
>
>To resolve these problems going forward and establish consistent
>behavior in the future, I'd like to propose to disable 'package list'
>fields on security bugs and instead expect regular stabilization bugs
>to be used (and made block the security bugs) for stabilizations.
>While I understand that filing additional bugs might be cumbersome for
>some people, I don't think it's such a herculean effort to outweigh
>the problems solved.

Indeed, filing stablereq bugs is not really that big of a deal.

>In the end, consistency is a good thing and we've introduced a
>dedicated stabilization category to reduce the spread of stabilization
>bugs all around the place.
>
>WDYT?
>

I like this proposal and fully support it. Thanks for bringing it up.

Cheers
-- 
Lars Wendler
Gentoo package maintainer
GPG: 21CC CF02 4586 0A07 ED93  9F68 498F E765 960E 9B39


pgpd28bN2WpgH.pgp
Description: Digitale Signatur von OpenPGP


Re: [gentoo-dev] [PATCH 2/3] qmail.eclass: remove magic to query root group

2021-08-13 Thread Ulrich Mueller
> On Fri, 13 Aug 2021, Rolf Eike Beer wrote:

> Am Donnerstag, 12. August 2021, 19:39:08 CEST schrieb Michael Orlitzky:
>> On Thu, 2021-08-12 at 17:22 +0200, Rolf Eike Beer wrote:
>> > The default owner is root:root anyway.
>> 
>> This is only true of you don't call insopts earlier with some other
>> value. I see "insopts -o root -g qmail -m 700" in there so you might
>> want to double check.

> Not my day.

> Ok, given that there are several places that change users and groups
> and the subfunctions are not always called it would be very few places
> where I can remove the root:root (about 3) and be sure that everything
> works. For that reason I would just keep them all and go back to the
> initial patch 2.

I believe the method of choice would be to execute the offending
insopts/doins pair in a subshell, i.e. put a ( ) pair around them.

Ulrich


signature.asc
Description: PGP signature


[gentoo-dev] [PATCH 4/3] qmail.eclass: remove needless keepdirs

2021-08-13 Thread Rolf Eike Beer
Adding an extra keep file in the intermediate /var/qmail is never necessary,
and the binary directory is filled by the installation anyway.

Signed-off-by: Rolf Eike Beer 
---
 eclass/qmail.eclass | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/eclass/qmail.eclass b/eclass/qmail.eclass
index 4aeba918ed4..5fbfdd6af75 100644
--- a/eclass/qmail.eclass
+++ b/eclass/qmail.eclass
@@ -136,8 +136,8 @@ qmail_spp_src_compile() {
 qmail_base_install() {
einfo "Setting up basic directory hierarchy"
diropts -o root -g qmail -m 755
-   keepdir "${QMAIL_HOME}"/{,bin,control}
-   keepdir "${QMAIL_HOME}"/users
+   dodir "${QMAIL_HOME}"/{,bin}
+   keepdir "${QMAIL_HOME}"/{control,users}
diropts -o alias -g qmail -m 755
keepdir "${QMAIL_HOME}"/alias
 
-- 
2.26.2



signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-dev] [PATCH 2/3] qmail.eclass: remove magic to query root group

2021-08-13 Thread Rolf Eike Beer
Am Donnerstag, 12. August 2021, 19:39:08 CEST schrieb Michael Orlitzky:
> On Thu, 2021-08-12 at 17:22 +0200, Rolf Eike Beer wrote:
> > The default owner is root:root anyway.
> 
> This is only true of you don't call insopts earlier with some other
> value. I see "insopts -o root -g qmail -m 700" in there so you might
> want to double check.

Not my day.

Ok, given that there are several places that change users and groups and the 
subfunctions are not always called it would be very few places where I can 
remove the root:root (about 3) and be sure that everything works. For that 
reason I would just keep them all and go back to the initial patch 2.

Eike

signature.asc
Description: This is a digitally signed message part.


[gentoo-dev] XDG_DATA_DIRS handling under packages

2021-08-13 Thread Mart Raudsepp
Hello,

Unlike most other XDG base directories[1], we do not do anything with
XDG_DATA_DIRS - not in xdg_environment_reset, nor in ENV_UNSET.

This is now causing some issues.

Historically there was an issue[2] where a package added XDG_DATA_DIRS
via env.d, which meant that if the base package (x11-misc/xdg-utils)
wasn't yet installed, XDG_DATA_DIRS was set, but did not include the
default paths, which broke some things as demonstrated there.

Now there is an issue[3] where another package prepends other paths,
which are not accessible when sandboxed and some tests are trying to
access them. In my case, I'm now hitting this with flatpak, which
prepends these paths via profile.d instead (and does have correct
handling of the default dirs if XDG_DATA_DIRS was previously unset).

This is a fundamental thing, so just unsetting it only in that package
feels rather incomplete.
I would think that the correct fix would be add XDG_DATA_DIRS to
ENV_UNSET and also unsetting it in xdg_environment_reset (for the
benefit of older EAPIs), but I fear that in some cases we specifically
do need it to see what variables are in there. Perhaps prefix. If
that's the case, per-ebuild unsetting could be problematic for those
cases as well.

Or is there some way to avoid such use cases of XDG_DATA_DIRS additions
to not reach the portage environment in the first place?


Thoughts?


Mart

1. https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html
2. https://bugs.gentoo.org/635040
3. https://bugs.gentoo.org/701978


signature.asc
Description: This is a digitally signed message part


[gentoo-dev] Package up for grabs: dev-python/mpi4py

2021-08-13 Thread Michał Górny
Hi,

The following package is looking for a new maintainer:

  dev-python/mpi4py

The package is pretty specialistic, and would use a dedicated maintainer
who knows MPI.  Its only revdeps are sci-*/ packages.

It has two bugs open, one of them a test failure.  It is pending
a version bump.

-- 
Best regards,
Michał Górny