Bug#905339: Some open operations are DENIED by AppArmor

2018-08-11 Thread Haruki TSURUMOTO

Hi,

On 2018年08月04日 11:06, intrigeri wrote:

Control: tag -1 + moreinfo

Hi,

Haruki TSURUMOTO:


I had enabled AppArmor on my debian stretch machine.
I found some libvirt's open operations are DENIED by apparmor.

Indeed, the AppArmor policy for libvirt has been improved a lot since
Stretch, where it's far from being perfect.


Would you apply this patch for stretch?

(I'm not the libvirt maintainer but I work on AppArmor in Debian.)

I would happily work on backports for Stretch of fixes to user-visible
issues in the AppArmor policy. I probably won't have time to work on
fixes to issues that have no perceivable user impact apart of noise in
the logs. Could you please extract from your proposed patch the subset
that fits into the first category?

Cheers,


I am searching there are something user inconveniences.
libvirt collects host's resource for unknown reason.
IMO,  I think something user inconveniences is there.

Anyway, DENIED log was noisy for me.



Bug#905339: [Pkg-libvirt-maintainers] Bug#905339: Some open operations are DENIED by AppArmor

2018-08-11 Thread Haruki TSURUMOTO

Hi, sorry for my late reply.

On 2018年08月03日 20:42, Guido Günther wrote:

Hi,
thanks. Some comments inline below:

On Fri, Aug 03, 2018 at 08:23:21PM +0800, Haruki TSURUMOTO wrote:

Hi,

On 2018年08月03日 19:58, Guido Günther wrote:

Hi,
On Fri, Aug 03, 2018 at 07:31:33PM +0800, Haruki TSURUMOTO wrote:

Package: libvirt-daemon-system
Version: 3.0.0-4+deb9u3
Severity: normal
X-Debbugs-Cc:appar...@packages.debian.org

Dear maintainers, (CCed: apparmor-maintainers)

I had enabled AppArmor on my debian stretch machine.
I found some libvirt's open operations are DENIED by apparmor.
Please see below.

```
Jul 30 20:35:22 debian-tsr-nuc1 kernel: [   39.503726] audit: type=1400
audit(1532950522.067:41): apparmor="DENIED" operation="open"
profile="libvirt-2453a1d1-16fd-446a-b7df-3b1b0ac4a506"
name="/sys/devices/system/node/" pid=1307 comm="qemu-system-x86"
requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 30 20:35:22 debian-tsr-nuc1 kernel: [   39.503778] audit: type=1400
audit(1532950522.067:42): apparmor="DENIED" operation="open"
profile="libvirt-2453a1d1-16fd-446a-b7df-3b1b0ac4a506"
name="/sys/devices/system/cpu/" pid=1307 comm="qemu-system-x86"
requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 30 20:35:22 debian-tsr-nuc1 kernel: [   39.538158] audit: type=1400
audit(1532950522.103:43): apparmor="DENIED" operation="open"
profile="libvirt-2453a1d1-16fd-446a-b7df-3b1b0ac4a506"
name="/sys/module/vhost/parameters/max_mem_regions" pid=1307
comm="qemu-system-x86" requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 30 20:35:36 debian-tsr-nuc1 kernel: [   54.393592] audit: type=1400
audit(1532950536.959:46): apparmor="DENIED" operation="open"
profile="libvirt-974b3462-9525-49d8-82db-2a3eb9bb972f"
name="/sys/devices/system/node/" pid=1376 comm="qemu-system-x86"
requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 30 20:35:36 debian-tsr-nuc1 kernel: [   54.393648] audit: type=1400
audit(1532950536.959:47): apparmor="DENIED" operation="open"
profile="libvirt-974b3462-9525-49d8-82db-2a3eb9bb972f"
name="/sys/devices/system/cpu/" pid=1376 comm="qemu-system-x86"
requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 30 20:35:36 debian-tsr-nuc1 kernel: [   54.404634] audit: type=1400
audit(1532950536.967:48): apparmor="DENIED" operation="open"
profile="libvirt-974b3462-9525-49d8-82db-2a3eb9bb972f"
name="/sys/module/vhost/parameters/max_mem_regions" pid=1376
comm="qemu-system-x86" requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 31 12:51:24 debian-tsr-nuc1 kernel: [58602.024293] audit: type=1400
audit(1533009084.686:49): apparmor="DENIED" operation="open"
profile="libvirt-2453a1d1-16fd-446a-b7df-3b1b0ac4a506"
name="/proc/548/cmdline" pid=1307 comm="qemu-system-x86" requested_mask="r"
denied_mask="r" fsuid=64055 ouid=0
```

These policy conflicts were fixed in upstream.

I attached a patch which backported from these commit.
https://libvirt.org/git/?p=libvirt.git;a=commit;h=e7f5d627f93c1c71260d2a795a1227b16b0d3186
https://libvirt.org/git/?p=libvirt.git;a=commit;h=0af5ced4b81b68be7016d1f8755db3d0c3249278

Would you apply this patch for stretch?

Can you provide debdiff for a fixed package?
   -- Guido

debdiff is here:

Is this a *tested* dediff?

Yes, I installed own build package, and tested it.

I attach new debdiff.
Is this qualifying for condition?
diff -Nru libvirt-3.0.0/debian/changelog libvirt-3.0.0/debian/changelog
--- libvirt-3.0.0/debian/changelog	2018-03-13 03:11:51.0 +0900
+++ libvirt-3.0.0/debian/changelog	2018-08-03 21:53:49.0 +0900
@@ -1,3 +1,10 @@
+libvirt (3.0.0-4+deb9u4) stretch; urgency=medium
+
+  * apparmor: apply apparmor-allow-access-host-resources-and-cmdline.patch
+(Closes: #905339)
+
+ -- Haruki TSURUMOTO   Fri, 03 Aug 2018 21:53:49 +0900
+
 libvirt (3.0.0-4+deb9u3) stretch-security; urgency=high
 
   * gbp: switch branch to stretch
diff -Nru libvirt-3.0.0/debian/patches/apparmor-allow-access-host-resources-and-cmdline.patch libvirt-3.0.0/debian/patches/apparmor-allow-access-host-resources-and-cmdline.patch
--- libvirt-3.0.0/debian/patches/apparmor-allow-access-host-resources-and-cmdline.patch	1970-01-01 09:00:00.0 +0900
+++ libvirt-3.0.0/debian/patches/apparmor-allow-access-host-resources-and-cmdline.patch	2018-08-03 21:53:49.0 +0900
@@ -0,0 +1,25 @@
+Allow apparmor access host resources and process cmdline
+These policy conflicts were fixed in upstream.
+--- a/examples/apparmor/libvirt-qemu
 b/examples/apparmor/libvirt-qemu
+@@ -21,6 +21,10 @@

Bug#905339: [Pkg-libvirt-maintainers] Bug#905339: Some open operations are DENIED by AppArmor

2018-08-03 Thread Haruki TSURUMOTO

Hi,

On 2018年08月03日 19:58, Guido Günther wrote:

Hi,
On Fri, Aug 03, 2018 at 07:31:33PM +0800, Haruki TSURUMOTO wrote:

Package: libvirt-daemon-system
Version: 3.0.0-4+deb9u3
Severity: normal
X-Debbugs-Cc: appar...@packages.debian.org

Dear maintainers, (CCed: apparmor-maintainers)

I had enabled AppArmor on my debian stretch machine.
I found some libvirt's open operations are DENIED by apparmor.
Please see below.

```
Jul 30 20:35:22 debian-tsr-nuc1 kernel: [   39.503726] audit: type=1400
audit(1532950522.067:41): apparmor="DENIED" operation="open"
profile="libvirt-2453a1d1-16fd-446a-b7df-3b1b0ac4a506"
name="/sys/devices/system/node/" pid=1307 comm="qemu-system-x86"
requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 30 20:35:22 debian-tsr-nuc1 kernel: [   39.503778] audit: type=1400
audit(1532950522.067:42): apparmor="DENIED" operation="open"
profile="libvirt-2453a1d1-16fd-446a-b7df-3b1b0ac4a506"
name="/sys/devices/system/cpu/" pid=1307 comm="qemu-system-x86"
requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 30 20:35:22 debian-tsr-nuc1 kernel: [   39.538158] audit: type=1400
audit(1532950522.103:43): apparmor="DENIED" operation="open"
profile="libvirt-2453a1d1-16fd-446a-b7df-3b1b0ac4a506"
name="/sys/module/vhost/parameters/max_mem_regions" pid=1307
comm="qemu-system-x86" requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 30 20:35:36 debian-tsr-nuc1 kernel: [   54.393592] audit: type=1400
audit(1532950536.959:46): apparmor="DENIED" operation="open"
profile="libvirt-974b3462-9525-49d8-82db-2a3eb9bb972f"
name="/sys/devices/system/node/" pid=1376 comm="qemu-system-x86"
requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 30 20:35:36 debian-tsr-nuc1 kernel: [   54.393648] audit: type=1400
audit(1532950536.959:47): apparmor="DENIED" operation="open"
profile="libvirt-974b3462-9525-49d8-82db-2a3eb9bb972f"
name="/sys/devices/system/cpu/" pid=1376 comm="qemu-system-x86"
requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 30 20:35:36 debian-tsr-nuc1 kernel: [   54.404634] audit: type=1400
audit(1532950536.967:48): apparmor="DENIED" operation="open"
profile="libvirt-974b3462-9525-49d8-82db-2a3eb9bb972f"
name="/sys/module/vhost/parameters/max_mem_regions" pid=1376
comm="qemu-system-x86" requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 31 12:51:24 debian-tsr-nuc1 kernel: [58602.024293] audit: type=1400
audit(1533009084.686:49): apparmor="DENIED" operation="open"
profile="libvirt-2453a1d1-16fd-446a-b7df-3b1b0ac4a506"
name="/proc/548/cmdline" pid=1307 comm="qemu-system-x86" requested_mask="r"
denied_mask="r" fsuid=64055 ouid=0
```

These policy conflicts were fixed in upstream.

I attached a patch which backported from these commit.
https://libvirt.org/git/?p=libvirt.git;a=commit;h=e7f5d627f93c1c71260d2a795a1227b16b0d3186
https://libvirt.org/git/?p=libvirt.git;a=commit;h=0af5ced4b81b68be7016d1f8755db3d0c3249278

Would you apply this patch for stretch?

Can you provide debdiff for a fixed package?
  -- Guido

debdiff is here:
```
diff -Nru libvirt-3.0.0/debian/changelog libvirt-3.0.0/debian/changelog
--- libvirt-3.0.0/debian/changelog    2018-03-13 03:11:51.0 +0900
+++ libvirt-3.0.0/debian/changelog    2018-08-03 13:26:45.0 +0900
@@ -1,3 +1,10 @@
+libvirt (3.0.0-4+deb9u3.ownbuild) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * apparmor: Allow-access-host-resource-and-cmdline.patch
+
+ -- Haruki TSURUMOTO   Fri, 03 Aug 2018 13:26:45 +0900
+
 libvirt (3.0.0-4+deb9u3) stretch-security; urgency=high

   * gbp: switch branch to stretch
diff -Nru 
libvirt-3.0.0/debian/patches/apparmor-allow-access-host-resource-and-cmdline.patch 
libvirt-3.0.0/debian/patches/apparmor-allow-access-host-resource-and-cmdline.patch
--- 
libvirt-3.0.0/debian/patches/apparmor-allow-access-host-resource-and-cmdline.patch 
1970-01-01 09:00:00.0 +0900
+++ 
libvirt-3.0.0/debian/patches/apparmor-allow-access-host-resource-and-cmdline.patch 
2018-08-03 13:26:45.0 +0900

@@ -0,0 +1,25 @@
+Allow apparmor access host resource and process cmdline
+These polociy conflicts were fixed in upstream.
+--- a/examples/apparmor/libvirt-qemu
 b/examples/apparmor/libvirt-qemu
+@@ -21,6 +21,10 @@
+   /dev/ptmx rw,
+   /dev/kqemu rw,
+   @{PROC}/*/status r,
++  # When qemu is signaled to terminate, it will read cmdline of signaling
++  # process for reporting purposes. Allowing read access to a process
++  # cmdline may leak sensitive information embedded in the cmdline.
++  @{PROC}/@{pid}/cmdline

Bug#905339: Some open operations are DENIED by AppArmor

2018-08-03 Thread Haruki TSURUMOTO

Package: libvirt-daemon-system
Version: 3.0.0-4+deb9u3
Severity: normal
X-Debbugs-Cc: appar...@packages.debian.org

Dear maintainers, (CCed: apparmor-maintainers)

I had enabled AppArmor on my debian stretch machine.
I found some libvirt's open operations are DENIED by apparmor.
Please see below.

```
Jul 30 20:35:22 debian-tsr-nuc1 kernel: [   39.503726] audit: type=1400 
audit(1532950522.067:41): apparmor="DENIED" operation="open" 
profile="libvirt-2453a1d1-16fd-446a-b7df-3b1b0ac4a506" 
name="/sys/devices/system/node/" pid=1307 comm="qemu-system-x86" 
requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 30 20:35:22 debian-tsr-nuc1 kernel: [   39.503778] audit: type=1400 
audit(1532950522.067:42): apparmor="DENIED" operation="open" 
profile="libvirt-2453a1d1-16fd-446a-b7df-3b1b0ac4a506" 
name="/sys/devices/system/cpu/" pid=1307 comm="qemu-system-x86" 
requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 30 20:35:22 debian-tsr-nuc1 kernel: [   39.538158] audit: type=1400 
audit(1532950522.103:43): apparmor="DENIED" operation="open" 
profile="libvirt-2453a1d1-16fd-446a-b7df-3b1b0ac4a506" 
name="/sys/module/vhost/parameters/max_mem_regions" pid=1307 
comm="qemu-system-x86" requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 30 20:35:36 debian-tsr-nuc1 kernel: [   54.393592] audit: type=1400 
audit(1532950536.959:46): apparmor="DENIED" operation="open" 
profile="libvirt-974b3462-9525-49d8-82db-2a3eb9bb972f" 
name="/sys/devices/system/node/" pid=1376 comm="qemu-system-x86" 
requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 30 20:35:36 debian-tsr-nuc1 kernel: [   54.393648] audit: type=1400 
audit(1532950536.959:47): apparmor="DENIED" operation="open" 
profile="libvirt-974b3462-9525-49d8-82db-2a3eb9bb972f" 
name="/sys/devices/system/cpu/" pid=1376 comm="qemu-system-x86" 
requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 30 20:35:36 debian-tsr-nuc1 kernel: [   54.404634] audit: type=1400 
audit(1532950536.967:48): apparmor="DENIED" operation="open" 
profile="libvirt-974b3462-9525-49d8-82db-2a3eb9bb972f" 
name="/sys/module/vhost/parameters/max_mem_regions" pid=1376 
comm="qemu-system-x86" requested_mask="r" denied_mask="r" fsuid=64055 ouid=0
Jul 31 12:51:24 debian-tsr-nuc1 kernel: [58602.024293] audit: type=1400 
audit(1533009084.686:49): apparmor="DENIED" operation="open" 
profile="libvirt-2453a1d1-16fd-446a-b7df-3b1b0ac4a506" 
name="/proc/548/cmdline" pid=1307 comm="qemu-system-x86" 
requested_mask="r" denied_mask="r" fsuid=64055 ouid=0

```

These policy conflicts were fixed in upstream.

I attached a patch which backported from these commit.
https://libvirt.org/git/?p=libvirt.git;a=commit;h=e7f5d627f93c1c71260d2a795a1227b16b0d3186
https://libvirt.org/git/?p=libvirt.git;a=commit;h=0af5ced4b81b68be7016d1f8755db3d0c3249278

Would you apply this patch for stretch?

Regards,
Allow apparmor access host resource and process cmdline
These polociy conflicts were fixed in upstream.
--- a/examples/apparmor/libvirt-qemu
+++ b/examples/apparmor/libvirt-qemu
@@ -21,6 +21,10 @@
   /dev/ptmx rw,
   /dev/kqemu rw,
   @{PROC}/*/status r,
+  # When qemu is signaled to terminate, it will read cmdline of signaling
+  # process for reporting purposes. Allowing read access to a process
+  # cmdline may leak sensitive information embedded in the cmdline.
+  @{PROC}/@{pid}/cmdline r,
   # Per man(5) proc, the kernel enforces that a thread may
   # only modify its comm value or those in its thread group.
   owner @{PROC}/@{pid}/task/@{tid}/comm rw,
@@ -152,3 +156,9 @@
   /etc/udev/udev.conf r,
   /sys/bus/ r,
   /sys/class/ r,
+
+  # for gathering information about available host resources
+  /sys/devices/system/cpu/ r,
+  /sys/devices/system/node/ r,
+  /sys/devices/system/node/node[0-9]*/meminfo r,
+  /sys/module/vhost/parameters/max_mem_regions r,


Bug#903242: Is there a canonical way to install libvirt-daemon with systemd settings, such as "libvirt-bin" ?

2018-07-08 Thread Haruki TSURUMOTO
Package: libvirt
Version: 3.0.0-4+deb9u3
Severity: normal

Dear maintainers,
I have a question about libvirtd packages.

I have tried installing libvirtd packages on my machine.
According to Debian Administrator's Handbook,
https://debian-handbook.info/browse/en-US/stable/sect.virtualization.html#id-1.15.5.14
libvirt-bin provides the libvirtd daemon

However, "libvirt-bin" is dropped in debian stretch.
So, I installed "libvird-daemon" on my system
then I connect to libvirtd from remote machine's virt-manager but error
occured.
libvirtd is not working since systemd services were not installed.

Traditional "libvirt-bin" package depends "libvirt-daemon-system".

IMHO, "libvird-daemon" should recommends to install "libvirt-daemon-system"
or Is there a canonical way to install libvirt-daemon with systemd
settings, such as "libvirt-bin" ?

Thanks.

-- 
Haruki TSURUMOTO
PGP Fingerprint:3718 C84E 4EDA 1B5C 4F26 8639 9D3D EE3F 63A6 000E



signature.asc
Description: OpenPGP digital signature


Bug#850335: golang-goyaml: FTBFS (failing tests)

2017-02-11 Thread Haruki TSURUMOTO
Hi,
This package is removed from sid at Jul 2016(#832414)
So, golang-goyaml is not present in stretch.


-- 
Haruki TSURUMOTO
PGP Fingerprint:3718 C84E 4EDA 1B5C 4F26 8639 9D3D EE3F 63A6 000E



signature.asc
Description: OpenPGP digital signature


Bug#854851: Please remove or replace lenma images

2017-02-10 Thread Haruki TSURUMOTO
Package: binaryornot
Version: 0.4.0-1
Severity: serious

tests/files/lena.gif and tests/files/lena.jpg are not DFSG-compatible
files. So please remove or replace with other free images.

-- 
Haruki TSURUMOTO
PGP Fingerprint:3718 C84E 4EDA 1B5C 4F26 8639 9D3D EE3F 63A6 000E



signature.asc
Description: OpenPGP digital signature


Bug#789834: golang-doozer: FTBFS: cannot find package [..] goprotobuf/proto

2017-02-10 Thread Haruki TSURUMOTO
Hi,

I think this FTBFS has already solved.

-- 
Haruki TSURUMOTO
PGP Fingerprint:3718 C84E 4EDA 1B5C 4F26 8639 9D3D EE3F 63A6 000E



signature.asc
Description: OpenPGP digital signature


Bug#854850: Upstream URL is missing

2017-02-10 Thread Haruki TSURUMOTO
Package: golang-doozer
Version: 0.0~git20130909-1
Severity: wishlist

Dear maintainer,
Homepage's URL(https://github.com/4ad/doozer) is missing.
I have searched near repository on GitHub.
But I didn't find moved repository(there are a few of same name
repository which looks like forked from this)

Thanks.
-- 
Haruki TSURUMOTO
PGP Fingerprint:3718 C84E 4EDA 1B5C 4F26 8639 9D3D EE3F 63A6 000E



signature.asc
Description: OpenPGP digital signature


Bug#819641: golang-github-jinzhu-gorm: FTBFS: FAIL: TestScannableSlices (0.00s)

2017-02-10 Thread Haruki TSURUMOTO
Control: clone -1 -2
Control: reassign -2 golang-github-mattn-go-sqlite3 1.1.0~dfsg1-2
Control: retitle -2 sqlite3.go's bind func causes cgo pointer panic.

Hi,
I think this runtime panic is caused by library of mattn/go-sqlite3.
Debian package version of mattn/go-sqlite3 is v1.1.0 which released at
Sep 2015. it's before Go 1.6 release. Go 1.6 changed spec of cgo pointer.
Upstream Recent Version v1.2.0 is fixed this by this
commit(https://github.com/mattn/go-sqlite3/commit/b76c61051faaf0baf3215e6f811003d98639b702)

I attached a patch ported from this commit which fixed
golang-github-jinzhu-gorm's FTBFS on my local machine.

-- 
Haruki TSURUMOTO
PGP Fingerprint:3718 C84E 4EDA 1B5C 4F26 8639 9D3D EE3F 63A6 000E
This patch fixes cgo's pointer runtime panic
Ported from https://github.com/mattn/go-sqlite3/commit/b76c61051faaf0baf3215e6f811003d98639b702Index: golang-github-mattn-go-sqlite3-1.1.0~dfsg1/sqlite3.go
===
--- golang-github-mattn-go-sqlite3-1.1.0~dfsg1.orig/sqlite3.go	2015-09-05 23:49:54.0 +0900
+++ golang-github-mattn-go-sqlite3-1.1.0~dfsg1/sqlite3.go	2017-02-11 14:16:40.738620174 +0900
@@ -480,11 +480,11 @@
 		case float64:
 			rv = C.sqlite3_bind_double(s.s, n, C.double(v))
 		case []byte:
-			var p *byte
-			if len(v) > 0 {
-p = [0]
+			if len(v) == 0 {
+rv = C._sqlite3_bind_blob(s.s, n, nil, 0)
+			} else {
+rv = C._sqlite3_bind_blob(s.s, n, unsafe.Pointer([0]), C.int(len(v)))
 			}
-			rv = C._sqlite3_bind_blob(s.s, n, unsafe.Pointer(p), C.int(len(v)))
 		case time.Time:
 			b := []byte(v.UTC().Format(SQLiteTimestampFormats[0]))
 			rv = C._sqlite3_bind_text(s.s, n, (*C.char)(unsafe.Pointer([0])), C.int(len(b)))


signature.asc
Description: OpenPGP digital signature


Bug#828814: grafana: FTBFS: sqlstore/sqlstore.go:96: cannot assign to x.Logger

2017-01-26 Thread Haruki TSURUMOTO
Hi,

IMO, This FTBFS comes from golang-github-go-xorm-xorm-dev package's
imcompatible changes.
According to the upstream release
page(https://github.com/go-xorm/xorm/releases), version 0.5.0 of xorm
changed logging interface.
v0.5.3 is packaged into unstable at June 2016.

Anyone know how to solve this?

Regards,

-- 
Haruki TSURUMOTO
PGP Fingerprint:3718 C84E 4EDA 1B5C 4F26 8639 9D3D EE3F 63A6 000E



Bug#852601: API key is not available

2017-01-26 Thread Haruki TSURUMOTO
>Please see #845988 and /usr/share/doc/minitube/NEWS.Debian.gz.
> Sorry, but this is wontfix.

Oh, I missed d/NEWS file. Thank you for your time.

-- 
Haruki TSURUMOTO
PGP Fingerprint:3718 C84E 4EDA 1B5C 4F26 8639 9D3D EE3F 63A6 000E



Bug#852601: API key is not available

2017-01-25 Thread Haruki TSURUMOTO
Package: minitube
Version: 2.5.2-2
Severity: important

Dear maintainer,
minitube requires YouTube API keys.(IMO, it required at build time)
Upsteram's binary package (http://flavio.tordini.org/minitube) is
usable,But Debian version is not.

Thanks.
-- 
Haruki TSURUMOTO
PGP Fingerprint:3718 C84E 4EDA 1B5C 4F26 8639 9D3D EE3F 63A6 000E


```
$ uname -a
Linux debian-vm-tsr 4.8.0-2-amd64 #1 SMP Debian 4.8.11-1 (2016-12-02)
x86_64 GNU/Linux
$ minitube --version
Minitube 2.5.2

Usage: minitube [options]
Options:
  --toggle-playing  Start or pause playback.
  --nextSkip to the next video.
  --previousGo back to the previous video.
  --stop-after-this Stop playback at the end of the video.

$ minitube
QIODevice::read (QFile, ":/functions.js"): device not open
No available API keys
403 "Error transferring
https://www.googleapis.com/youtube/v3/videoCategories?part=snippet=ja-JP=us
- server replied: Forbidden"
QNetworkReply::NetworkError(ContentOperationNotPermittedError)
403 "Error transferring
https://www.googleapis.com/youtube/v3/videos?part=snippet,contentDetails,statistics=mostPopular=1
- server replied: Forbidden"
QNetworkReply::NetworkError(ContentOperationNotPermittedError)
403 "Error transferring
https://www.googleapis.com/youtube/v3/videoCategories?part=snippet=en=us
- server replied: Forbidden"
QNetworkReply::NetworkError(ContentOperationNotPermittedError)
403 "Error transferring
https://www.googleapis.com/youtube/v3/search?part=snippet=video=50=ppap
- server replied: Forbidden"
QNetworkReply::NetworkError(ContentOperationNotPermittedError)
"Error transferring
https://www.googleapis.com/youtube/v3/search?part=snippet=video=50=ppap
- server replied: Forbidden"
```




signature.asc
Description: OpenPGP digital signature


Bug#851817: [pkg-go] Bug#851817: Bug#851817: Vendoring libraries

2017-01-20 Thread Haruki TSURUMOTO
Hi.

>When I packaged the prometheus ecosystem, most of the vendored
>dependencies were not present in Debian. I packaged about 30 different
>libraries to remove vendoring and left just a couple of them. There
>were a couple of libs that were just too small and specific to justify
>separate packages (not used directly by prometheus), and in the case of
>the consul API because there is an API incompatibility with the package
>present in Debian.

I get the point. I tried to review that vendored library's
compability with already debian packaged libraries.
Does it make sense?

===
hashicorp/go-cleanhttp
Compability:
OK, almost same(only comment change:
https://github.com/hashicorp/go-cleanhttp/commit/ad28ea4487f05916463e2423a55166280e8254b5),
used from only consul (not prometheus)
===
hashicorp/consul
Compability:
Some codes are older than golang-github-hashicorp-consul-dev package
===
hashicorp/serf
Compability:
Looks good, Almost same(unnecessary codes were removed and a short
comment is different:
https://github.com/hashicorp/serf/commit/979180d19cb3c60f58fda490533e8e22a21c5aae)

===
influxdb/influxdb
Compability:
Complex, looks hard to replace with golang-github-influxdb-influxdb-dev
package, there are incompatible changes.
===

> But I disagree with the severity of this bug, the policy only marks
>this requirement as a "should", so it is not serious.

OK.

Thanks.

-- 
Haruki TSURUMOTO
PGP Fingerprint:3718 C84E 4EDA 1B5C 4F26 8639 9D3D EE3F 63A6 000E



signature.asc
Description: OpenPGP digital signature


Bug#851817: Vendoring libraries

2017-01-18 Thread Haruki TSURUMOTO
Package: prometheus
Version: 1.2.3+ds2-5
Severity: serious
X-Debbugs-CC: pkg-go-maintain...@lists.alioth.debian.org

Dear maintainers,
Prometheus depends on many libraries, including source codes located
into vendor directory.
Is this a violation for Debian Policy 4.13 ?
"4.13 Convenience copies of code"
https://www.debian.org/doc/debian-policy/ch-source.html#s-embeddedfiles

Some libraries of vendor/*  had already packaged in Debian,
 (ex: golang-github-hashicorp-go-cleanhttp-dev,
golang-github-hashicorp-consul-dev)
Can't we use these instead of vendoring method ?

Regards,

-- 
Haruki TSURUMOTO
PGP Fingerprint:3718 C84E 4EDA 1B5C 4F26 8639 9D3D EE3F 63A6 000E



Bug#799454: golang-git2go: FTBFS: could not determine kind of name for C.GIT_CHECKOUT_SAFE_CREATE

2016-12-28 Thread Haruki TSURUMOTO
Dear Maintainers,

I think this bug was solved at upstream.
Can't we update?

Regards,

-- 
Haruki TSURUMOTO
PGP Fingerprint:3718 C84E 4EDA 1B5C 4F26 8639 9D3D EE3F 63A6 000E



signature.asc
Description: OpenPGP digital signature


Bug#844469: ITP: golang-github-jessevdk-go-flags -- go command line option parser

2016-12-11 Thread Haruki TSURUMOTO
Hello Tim
golang-github-jessevdk-go-flags is already packaged as golang-go-flags-dev

$ apt-cache showsrc golang-go-flags-dev | grep Homepage
Homepage: https://github.com/jessevdk/go-flags

Thanks
--
Haruki TSURUMOTO
PGP Fingerprint:3718 C84E 4EDA 1B5C 4F26 8639 9D3D EE3F 63A6 000E



signature.asc
Description: OpenPGP digital signature


Bug#846294: [pkg-go] Bug#846294: [peco] Binary ist statically linked

2016-12-01 Thread Haruki TSURUMOTO
>> Is that intentional? I would expect it to be dynamically linked.

Yes, go applications links libraries statically.

--
Haruki TSURUMOTO
PGP Fingerprint:3718 C84E 4EDA 1B5C 4F26 8639 9D3D EE3F 63A6 000E



signature.asc
Description: OpenPGP digital signature


Bug#844699: ITP: tdiary-style-gfm -- GFM Style for tDiary

2016-11-19 Thread Haruki Tsurumoto
Hello,

I have seen upstream repository of this,
"tdiary-style-gfm.gemspec" says license is MIT License,
but LICENSE.txt is the GPLv3.

I think that to fix this mistake is better.
In addition, tDiary is licensed under the GPLv2(seems not GPLv2+)
 
http://metadata.ftp-master.debian.org/changelogs/main/t/tdiary/tdiary_3.1.3-3_copyright

It can combined with tDiary?

Thanks.
--
Haruki TSURUMOTO
PGP Fingerprint:3718 C84E 4EDA 1B5C 4F26 8639 9D3D EE3F 63A6 000E



signature.asc
Description: OpenPGP digital signature


Bug#843031: [pkg-go] Bug#843031: golang-github-nsf-termbox-go-dev: fails to upgrade from 'jessie' - trying to overwrite /usr/share/gocode/src/github.com/nsf/termbox-go/_demos/editbox.go

2016-11-04 Thread Haruki Tsurumoto
Hi,

Thank you for reporting.
I am discussing to fix it with my sponsor.

--
Haruki TSURUMOTO




signature.asc
Description: OpenPGP digital signature


Bug#839262: ITP: golang-github-lestrrat-go-pdebug-dev -- Utilities for my print debugging fun

2016-09-30 Thread Haruki TSURUMOTO
Package: wnpp
Severity: wishlist
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: golang-github-lestrrat-go-pdebug-dev
  Upstream Author : Daisuke Maki
* URL : https://github.com/lestrrat/go-pdebug
* License : Expat
  Programming Lang: Go
  Description : Utilities for my print debugging fun. YMMV
 Package pdebug provides tools to produce debug logs
the way the author (Daisuke Maki a.k.a. lestrrat) likes.
 All of the functions are no-ops unless you compile
with the `-tags debug` option.



Bug#831576: RFP: peco -- Simplistic interactive filtering tool

2016-07-17 Thread Haruki TSURUMOTO
Package: wnpp
Severity: wishlist

* Package name: peco
  Version : 0.3.6
  Upstream Author : Daisuke Maki, mattn, syohex
* URL : https://github.com/peco/peco
* License : MIT
  Programming Lang: Go
  Description : Simplistic interactive filtering tool

peco (pronounced peh-koh) is based on a python tool, percol.
percol was darn useful, but I wanted a tool that was a single binary,
and forget about python. peco is written in Go,
and therefore you can just grab the binary releases
and drop it in your $PATH.

peco can be a great tool to filter stuff like logs, process stats,
find files, because unlike grep, you can type as you think and look
through the current results.