Bug#910608: RFS: libtheft/0.4.5-1 ITP #910296

2018-11-01 Thread Richard Ipsum
On Fri, 26 Oct 2018, at 02:47, Dmitry Bogatov wrote:
> 
> [2018-10-23 23:53] Richard Ipsum 
> > Fixed remaining issues, sorry this took me a while to get to.
> > I have uploaded a new version of the package to mentors.
> 
> Looks incredible clean, but I still found one issue :)
> 
> The package your does not follow multiarch path conventions.
> For example, for libyaml-dev
> 
>   /usr/lib
>   /usr/lib/x86_64-linux-gnu
>   /usr/lib/x86_64-linux-gnu/libyaml.a
>   /usr/lib/x86_64-linux-gnu/pkgconfig
>   /usr/lib/x86_64-linux-gnu/pkgconfig/yaml-0.1.pc
>   /usr/lib/x86_64-linux-gnu/libyaml.so
> 
> Since the package does not use autotools, I am afraid you will have to
> tinker with `override_dh_autoinstall' manually.

thanks for the feedback, I'm afraid I will be away for some time, so it may be 
several weeks before I'm able to look at fixing this.

Thanks,
Richard



Bug#910608: RFS: libtheft/0.4.5-1 ITP #910296

2018-10-23 Thread Richard Ipsum
On Sun, 21 Oct 2018, at 06:50, Gergely Nagy wrote:
> Hi!
> 
> I just had a quick look at the libtheft packaging on mentors, and
> noticed a few things that at the moment, prevent me from sponsoring the
> package. These are:

Hi! thanks for reviewing this!

> 
> - I was unable to find the public part of your GPG key, thus, was unable
>   to verify the signature on the source package. Where can one find it?

GPG key has now been uploaded to default keyservers, key id is 
3D3239533DAE7F5A9D322B7C52322452F1C90E1E

>   (Uploading it to a public key server might be best).
> - The package build-depends on `debhelper-compat (= 11)`, which works,
>   but it's a virtual package. I'd suggest build-depending on `debhelper
>   (>= 11)`, and adding a `debian/compat` file with "11" as its content.

skipping as discussed

>   This will get rid of one of the warnings on mentors, too.
> - debian/copyright does not document the license of `src/theft_hash.c`
>   (public domain, but that needs to be documented too).

fixed

> - debian/copyright does not document the license and author of
>   `debian/*`. In most cases - and theft is no exception - the Debian
>   packager is not the upstream author. If unspecified, the `*` wildcard
>   applies to `debian/*` too, which would be incorrect.

fixed

> - The control file does not set a Homepage - a minor thing, but while
>   fixing the other issues, might as well fix this one, and point the
>   Homepage field in debian/control to theft's GitHub.

fixed

> 
> Other than these, the package looks ok. Can you fix the above?
> 
> Drop me an email when done, and I'll have another look.

Fixed remaining issues, sorry this took me a while to get to.
I have uploaded a new version of the package to mentors.



Bug#910296: Your mail

2018-10-10 Thread Richard Ipsum
On Wed, 10 Oct 2018 14:31:19 +0100 Richard Ipsum  
wrote:
> 
> 



Bug#910608: RFS: libtheft/0.4.5-1 ITP #910296

2018-10-08 Thread Richard Ipsum
Package: sponsorship-requests
 Severity: wishlist

 Dear mentors,

 I am looking for a sponsor for my package "libtheft"

* Package name: libtheft
  Version : 0.4.5-1
  Upstream Author : Scott Vokes 
* URL : https://github.com/silentbicycle/theft
* License : ISC
  Section : libs

 It builds those binary packages:

   libtheft-dev - property-based testing for C

 To access further information about this package, please visit the following 
URL:

 https://mentors.debian.net/package/libtheft


 Alternatively, one can download the package with dget using this command:

   dget -x 
https://mentors.debian.net/debian/pool/main/libt/libtheft/libtheft_0.4.5-1.dsc

 More information about libtheft can be obtained from 
https://github.com/silentbicycle/theft
 and https://yakking.branchable.com/posts/property-testing-in-c/.

 Changes since the last upload:

 libtheft (0.4.5-1) unstable; urgency=medium

  * Initial release (Closes: #910296)

 -- Richard Ipsum   Thu, 04 Oct 2018 18:07:05 +0100

 Regards,
  Richard Ipsum



Bug#910296: ITP: libtheft-dev -- property-based testing for C

2018-10-04 Thread Richard Ipsum
Package: wnpp
Severity: wishlist
Owner: Richard Ipsum 

* Package name: libtheft-dev
  Version : 0.4.3
  Upstream Author : Scott Vokes 
* URL : https://github.com/silentbicycle/theft/
* License : ISC
  Programming Lang: C
  Description : property-based testing for C

theft is a C library for property-based testing.
Where example-based testing checks test results for specific input,
theft tests assert general properties ("for any possible input,
[some condition] should hold"), generate input, and search for
counter-examples that make the test fail. If theft finds any failures,
it also knows how to generate and test simpler variants of the input,
and then report the simplest counter-example found.

This package is useful as it provides Haskell-like quickcheck functionality
for C programs.



Bug#860453: Close sparseutils ITP?

2017-08-25 Thread Richard Ipsum
Hi,

There's no longer an intention to package sparseutils.

Which means this bug can be closed now.

Thanks,
Richard

-- 
Life is too short for POSIX compliance


signature.asc
Description: PGP signature


Bug#789753: Add Python 3 support to ca-certificates. (v2)

2015-11-22 Thread Richard Ipsum
Hi,

The attached patch is based on the patch provided by Andrew Wilcox,
I've verified that this patched version of certdata2pem.py produces
the same certificate filenames when run with python2 and python3 and
also when run with python2 without this patch.

I also checked that the contents of the certificates are identical between
the three cases: python2 without patch, python2 with patch
and python3 with patch.

A distribution I contribute to[1] is already using this patch,
since we use python3 by default.

Hope this helps,
Richard Ipsum

[1]: http://wiki.baserock.org/
>From b0631bb33bcf4745c84da200d434518fbf203326 Mon Sep 17 00:00:00 2001
From: Richard Ipsum <richard.ip...@codethink.co.uk>
Date: Fri, 20 Nov 2015 14:03:22 +
Subject: [PATCH] Add Python 3 support to ca-certificates.

This patch is based on the original sent by Andrew Wilcox
and fixes unicode conversions to work in both python2 and python3.
---
 mozilla/certdata2pem.py | 57 +++--
 1 file changed, 41 insertions(+), 16 deletions(-)

diff --git a/mozilla/certdata2pem.py b/mozilla/certdata2pem.py
index 0482894..7bd4d2d 100644
--- a/mozilla/certdata2pem.py
+++ b/mozilla/certdata2pem.py
@@ -25,13 +25,19 @@ import os.path
 import re
 import sys
 import textwrap
+import io
 
 objects = []
 
 # Dirty file parser.
 in_data, in_multiline, in_obj = False, False, False
 field, type, value, obj = None, None, None, dict()
-for line in open('certdata.txt', 'r'):
+
+# Python 3 will not let us decode non-ascii characters if we
+# have not specified an encoding, but Python 2's open does not
+# have an option to set the encoding. Python 3's open is io.open
+# and io.open has been backported to Python 2.6 and 2.7, so use io.open.
+for line in io.open('certdata.txt', 'rt', encoding='utf8'):
 # Ignore the file header.
 if not in_data:
 if line.startswith('BEGINDATA'):
@@ -53,7 +59,7 @@ for line in open('certdata.txt', 'r'):
 if type == 'MULTILINE_OCTAL':
 line = line.strip()
 for i in re.finditer(r'\\([0-3][0-7][0-7])', line):
-value += chr(int(i.group(1), 8))
+value.append(int(i.group(1), 8))
 else:
 value += line
 continue
@@ -70,13 +76,13 @@ for line in open('certdata.txt', 'r'):
 field, type = line_parts
 value = None
 else:
-raise NotImplementedError, 'line_parts < 2 not supported.'
+raise NotImplementedError('line_parts < 2 not supported.')
 if type == 'MULTILINE_OCTAL':
 in_multiline = True
-value = ""
+value = bytearray()
 continue
 obj[field] = value
-if len(obj.items()) > 0:
+if len(obj) > 0:
 objects.append(obj)
 
 # Read blacklist.
@@ -95,7 +101,7 @@ for obj in objects:
 if obj['CKA_CLASS'] not in ('CKO_NETSCAPE_TRUST', 'CKO_NSS_TRUST'):
 continue
 if obj['CKA_LABEL'] in blacklist:
-print "Certificate %s blacklisted, ignoring." % obj['CKA_LABEL']
+print("Certificate %s blacklisted, ignoring." % obj['CKA_LABEL'])
 elif obj['CKA_TRUST_SERVER_AUTH'] in ('CKT_NETSCAPE_TRUSTED_DELEGATOR',
   'CKT_NSS_TRUSTED_DELEGATOR'):
 trust[obj['CKA_LABEL']] = True
@@ -104,13 +110,13 @@ for obj in objects:
 trust[obj['CKA_LABEL']] = True
 elif obj['CKA_TRUST_SERVER_AUTH'] in ('CKT_NETSCAPE_UNTRUSTED',
   'CKT_NSS_NOT_TRUSTED'):
-print '!'*74
-print "UNTRUSTED BUT NOT BLACKLISTED CERTIFICATE FOUND: %s" % 
obj['CKA_LABEL']
-print '!'*74
+print('!'*74)
+print("UNTRUSTED BUT NOT BLACKLISTED CERTIFICATE FOUND: %s" % 
obj['CKA_LABEL'])
+print('!'*74)
 else:
-print "Ignoring certificate %s.  SAUTH=%s, EPROT=%s" % \
+print("Ignoring certificate %s.  SAUTH=%s, EPROT=%s" % \
   (obj['CKA_LABEL'], obj['CKA_TRUST_SERVER_AUTH'],
-   obj['CKA_TRUST_EMAIL_PROTECTION'])
+   obj['CKA_TRUST_EMAIL_PROTECTION']))
 
 for obj in objects:
 if obj['CKA_CLASS'] == 'CKO_CERTIFICATE':
@@ -121,13 +127,32 @@ for obj in objects:
   .replace('(', '=')\
   .replace(')', '=')\
   .replace(',', '_')
-bname = bname.decode('string_escape')
-fname = bname + '.crt'
+
+# this is the only way to decode the way NSS stores multi-byte UTF-8
+# and we need an escaped string for checking existence of things
+# otherwise we're dependant on the user's current locale.
+if bytes != str:
+# We're in python 3, convert the utf-8 string to a
+# sequence of bytes that represents this utf-8 string
+# then encode the byte-sequence as an escaped

Bug#756875: dvtm: Screen lock can be bypassed with empty password

2014-08-02 Thread Richard Ipsum
Package: dvtm
Version: 0.6-1
Severity: normal

Dear Maintainer,

To reproduce this bug:

1. Lock the screen (MOD + X), dvtm now displays Enter password
2. Press the return key, the screen is now unlocked


-- System Information: Debian Release: 7.6
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: i386 (i686)

Kernel: Linux 3.2.0-4-686-pae (SMP w/1 CPU core) Locale: LANG=en_GB.UTF-8, 
LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash

Versions of packages dvtm depends on: ii libc6 2.13-38+deb7u3 ii libncursesw5 
5.9-10

Versions of packages dvtm recommends: ii ncurses-term 5.9-10

dvtm suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#728240: libc6: S_IFMT constants not included when _POSIX_C_SOURCE is defined as 200112L

2013-10-29 Thread Richard Ipsum

Package: libc6
Version: 2.17-93
Severity: normal

The man page for stat states

POSIX.1-1990 did not describe the S_IFMT, S_IFSOCK, S_IFLNK, S_IFREG, 
S_IFBLK,
S_IFDIR, S_IFCHR, S_IFIFO, S_ISVTX constants, but instead demanded the 
use of the
macros S_ISDIR(), etc. The S_IF* constants are present in POSIX.1-2001 
and later.


However, when I write the following program:

#define _POSIX_C_SOURCE 200112L

#include sys/stat.h
#include stdio.h

int main(void)
{
printf(%d\n, S_IFMT);
return 0;
}

and compile

[camomile:~]% gcc -o foo foo.c
foo.c: In function ‘main’:
foo.c:9:17: error: ‘S_IFMT’ undeclared (first use in this function)
printf(%d\n, S_IFMT);
^
foo.c:9:17: note: each undeclared identifier is reported only once for 
each function it appears in



-- System Information:
Debian Release: jessie/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 3.11-1-686-pae (SMP w/1 CPU core)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libc6 depends on:
ii libgcc1 1:4.8.2-1

Versions of packages libc6 recommends:
ii libc6-i686 2.17-93

Versions of packages libc6 suggests:
ii debconf [debconf-2.0] 1.5.51
pn glibc-doc none
ii locales 2.17-93

-- debconf information:
glibc/disable-screensaver:
glibc/upgrade: true
glibc/restart-failed:
* libraries/restart-without-asking: true
glibc/restart-services:


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org