Re: editors/vim, editors/vim-lite maintainership request

2013-12-02 Thread John W. O'Brien
On 12/2/13 2:02 PM, Mikhail Tsatsenko wrote:
 As I can see maintainer of vim  vim-lite ports is just reset, so I
 want to maintain them.

It looks like you're too late by minutes.

https://svnweb.freebsd.org/ports?view=revisionrevision=335535

But there's good news too!

https://svnweb.freebsd.org/ports?view=revisionrevision=335537

--
neirbowj



signature.asc
Description: OpenPGP digital signature


Trouble verifying a pkg-repo signature manually

2014-02-08 Thread John W. O'Brien
Hello freebsd-ports@,

I'm trying to build and maintain my own package repository and
understand how everything is put together in the process. Right now, I'm
having trouble understanding how the signatures are made and verified.
The following should illustrate both the problem I'm having and how I
think things are supposed to work.

My environment
--

# pkg -v
1.2.6
# openssl version
OpenSSL 0.9.8y 5 Feb 2013
# uname -a
FreeBSD .saltant.net 9.2-STABLE FreeBSD 9.2-STABLE #1 r260112: Mon
Dec 30 18:26:07 EST 2013
r...@.saltant.net:/usr/obj/usr/src/sys/NARB  amd64


Build a package
---

# cd /usr/ports/devel/pkgconf
# make PACKAGES=/tmp/packages package
[...]
===  Building package for pkgconf-0.9.4
# ls -lR /tmp/packages
total 4
drwxr-xr-x  2 root  wheel  512 Feb  8 18:32 All

/tmp/packages/All:
total 24
-rw-r--r--  1 root  wheel  23488 Feb  8 18:32 pkgconf-0.9.4.txz


Prepare the keys


# cd /tmp/keys
# openssl genrsa -out repo.key 2048
Generating RSA private key, 2048 bit long modulus
+++
...+++
e is 65537 (0x10001)
# openssl rsa -in repo.key -pubout repo.pub
writing RSA key


Generate the repo
-

# pkg repo /tmp/packages /tmp/keys/repo.key
Generating repository catalog in /tmp/packages: done!


Testing the signature
-

# cd /tmp/test
# tar xf /tmp/packages/digests.txz
# openssl dgst -verify /tmp/keys/repo.pub \
-signature signature -sha256 digests
Verification Failure


Making and testing a new signature
--

# openssl dgst -sign /tmp/repo.key -sha256 -binary digests  test_sig
# openssl dgst -verify /tmp/keys/repo.pub \
-signature test_sig -sha256 digests
Verified OK

I would be grateful if somebody could point me in the right direction,
or disabuse me of some obvious misconception.

Regards,
John



signature.asc
Description: OpenPGP digital signature


Re: Trouble verifying a pkg-repo signature manually

2014-02-08 Thread John W. O'Brien
On 2/8/14 6:50 PM, John W. O'Brien wrote:
 Hello freebsd-ports@,
 
 I'm trying to build and maintain my own package repository and
 understand how everything is put together in the process. Right now, I'm
 having trouble understanding how the signatures are made and verified.
 The following should illustrate both the problem I'm having and how I
 think things are supposed to work.
[...]
 Testing the signature
 -
 
 # cd /tmp/test
 # tar xf /tmp/packages/digests.txz
 # openssl dgst -verify /tmp/keys/repo.pub \
 -signature signature -sha256 digests
 Verification Failure
[...]

I think I found out why this doesn't work.

Inside pkg-repo(8), the code that actually generates the signature [0],
signs an ASCII-encoded, zero-terminated [1] representation of the SHA256
digest. I would guess that inside openssl dgst ... -sha256 ... the
signature generation and verification are operating on a SHA256 blob
(i.e. unterminated binary).

So, the next best way I've come up with to verify a repo by hand is this:

# openssl rsautl -pubin -inkey /tmp/keys/repo.pub \
-verify -in test_sig -asn1parse
0:d=0  hl=2 l=  49 cons: SEQUENCE
2:d=1  hl=2 l=  13 cons:  SEQUENCE
4:d=2  hl=2 l=   9 prim:   OBJECT:sha256
   15:d=2  hl=2 l=   0 prim:   NULL
   17:d=1  hl=2 l=  32 prim:  OCTET STRING
   - 7d b0 d6 38 8c 0f 28 53-2a 76 40 4f d6 84 8f 24
}..8..(S*v@O...$
  0010 - e5 0a a1 57 45 ec f1 31-14 aa d0 4c 9a d0 fc 17
...WE..1...L
# sha256 -q digests
7db0d6388c0f28532a76404fd6848f24e50aa15745ecf13114aad04c9ad0fc17

I just visually compare the OCTET STRING to the digest.

[0] rsa_sign()
https://github.com/freebsd/pkg/blob/master/libpkg/rsa.c#L175
[2] sha256_hash()
https://github.com/freebsd/pkg/blob/master/libpkg/utils.c#L343



signature.asc
Description: OpenPGP digital signature


Redport builds are all finished without logs

2014-02-10 Thread John W. O'Brien
Hello decke,

Could you help me understand what's going on with this build [0]? Did an
admin kill the job, and if so, why? Otherwise, what happened and is it
because I'm doing something wrong?

Thank you,
John

[0] https://redports.org/buildarchive/20140210032800-24135/



signature.asc
Description: OpenPGP digital signature


Re: Redport builds are all finished without logs

2014-02-15 Thread John W. O'Brien
On 2/10/14 9:52 AM, John W. O'Brien wrote:
 Could you help me understand what's going on with this build [0]? Did an
 admin kill the job, and if so, why? Otherwise, what happened and is it
 because I'm doing something wrong?
 
 [0] https://redports.org/buildarchive/20140210032800-24135/

Continuing to troubleshoot this. I've been adding ports to TEST_DEPENDS
one by one, and found an instance where the /before/ [1] works but the
/after/ [2] does not.

The implicated port is math/py-statsmodels (maintainer CC'd).

I'm still not clear on the circumstances under which Redports winds up
in the finished state, and consequently am unable to avoid it or work
around it. Any help or advice would be appreciated.

Thank you,
John

[1] https://redports.org/buildarchive/20140215154500-1493/
[2] https://redports.org/buildarchive/20140215163200-621/



signature.asc
Description: OpenPGP digital signature


Re: Redport builds are all finished without logs

2014-02-15 Thread John W. O'Brien
On 2/15/14 12:53 PM, John W. O'Brien wrote:
 On 2/10/14 9:52 AM, John W. O'Brien wrote:
 Could you help me understand what's going on with this build [0]? Did an
 admin kill the job, and if so, why? Otherwise, what happened and is it
 because I'm doing something wrong?

 [0] https://redports.org/buildarchive/20140210032800-24135/
 
 Continuing to troubleshoot this. I've been adding ports to TEST_DEPENDS
 one by one, and found an instance where the /before/ [1] works but the
 /after/ [2] does not.
 
 The implicated port is math/py-statsmodels (maintainer CC'd).
 
 I'm still not clear on the circumstances under which Redports winds up
 in the finished state, and consequently am unable to avoid it or work
 around it. Any help or advice would be appreciated.
 
 [1] https://redports.org/buildarchive/20140215154500-1493/
 [2] https://redports.org/buildarchive/20140215163200-621/

I see the problem. math/py-statsmodels depends on math/py-pandas. So the
bad news is that I cannot include the former in TEST_DEPENDS for the
latter and expect much at all from Redports. The good news is that I can
now fix my port to be more readily testable.

For the benefit of those who come after, would it make sense to augment
the description of the finished state [3] to mention the possibility
of circular dependencies, which don't appear to be covered by the other
detectable termination conditions?

Regards,
John

[3] https://redports.org/wiki/Buildstatus



signature.asc
Description: OpenPGP digital signature


Re: [CFT+BRAINSTORM] One USE_ to rule them all

2013-02-10 Thread John W. O'Brien

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 02/07/2013 04:52 AM, Baptiste Daroussin wrote:

 Let's go for USES then!

 regards,
 Bapt

Clearly I'm a bit late to the party here, and I don't wish to reopen
litigation of this particular design choice. However, I would like to
respectfully suggest that, in addition to the grep-ability of a keyword,
it is useful to inform selection on the basis of whether it is to be
used in a declarative or imperative sense.

The on-its-way-out USE_BLAH is imperative, whereas USES has a
declarative flavor. In cases where the purpose is to tell the ports
machinery to *do* something, I favor the imperative where it can be
applied naturally. The declarative---statements of fact---are dandy for
things like CONFLICTS, HAS_CONFIGURE, and PORTNAME.

Consider this notional capability, BLAH, that is available from ports or
even base, but which some ports bring with them (think libz or the
client library for some protocol). If port X has its own BLAH, then
USES=BLAH is a true statement but an erroneous usage in the context of
port X. This is why USE would be better.

In any case, thank you for embarking on this valuable consolidation.

Cheers,
John
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/

iQEcBAEBAgAGBQJRF/LsAAoJEEdKvTwaez9w7/UH/jsInJF7A99LbFwPFxIlNwV1
hGDN7kZATxs55wfbk8q+EndQkXuwcQebOVQUO5GT+xOCvj8GLR9odEtDff21vjnc
RnfpTzDXI+ynL/oX/rmibqTkUdb7Srd9iXhpxD4dAudIkmNA2XA6LInOhRdEcUq3
d/7n84ZppE22ia+tpfIFqGnDpwO4bPB3l/1gwy8MqQhXwodwHQiREHkevWmlA8S+
xdqpVm2byOXF+nlSmf/k8N1SOVWc9VErEaine9wM9+Cz7StuTRENiWe3gDyh3GMp
L/292a1roKZM/bM5GhsJSB2Vl22V7dk+q8+szTxjOQr4uWa4mhiJ3DexO04PdsU=
=SBg1
-END PGP SIGNATURE-

___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Discover stored options different from port defaults/defines

2014-03-30 Thread John W. O'Brien
Hello ports@,

In the bad old days before poudriere and various improvements to
OptionsNG came to town, when I was using portmaster* to handle upgrades,
I cobbled together a configuration management practice that involved
using rsync and git to store /var/db/ports in a repository. The usual
workflow looked roughly like this:

svn up /usr/ports
portmaster -dga
# handle changes to OPTIONS_DEFINE and its brethren here
rsync -rpt --del --exclude distfiles /var/db/ports/ /path/to/repo
cd /path/to/repo
git commit -a -m Store options that changed

A downside of this approach is that it couldn't distinguish between
options I care about (Always do this and Never do this) and options
I don't care about (Do what the maintainer thinks is best). The only
upstream changes that would bubble to the surface of their own accord
were NEW_OPTIONS when OPTIONS_DEFINE changed.

When I switched from portmaster to poudriere+pkgng, I migrated
/var/db/ports to /usr/local/etc/poudriere.d/$jail-$ports-$set-options
and that worked OK for a little while. However, this compounded the old
problem in that now even NEW_OPTIONS would arrive silently.

The first part of my solution to these problems is to store only the
options that I know I care about. That is, I know I need to find out
where a stored option disagrees with the default.

I couldn't figure out how to use the stock tools to peel apart currently
stored options from current default options, so I wrote a
``nondefaultconfig`` target for Mk/bsd.port.mk (see attached), set all
the common options (DOCS, IPv6, etc) explicitly in /etc/make.conf using
OPTIONS_SET/OPTIONS_UNSET, and ran the new target against all of my
installed ports, replacing a subtree full of options files with a
single, quite modest make.conf. To make this more generally-useful, it
would need to behave more like NEW_OPTIONS.

   cd /usr/ports
   pkg info -aoq | sort | xargs -n1 make nondefaultconfig -C \
 /usr/local/etc/poudriere.d/$jail-make.conf
   rm -fr /usr/local/etc/poudriere.d/$jail-$ports-$set-options

At this point, any option not configured by $jail-make.conf will be
allowed to vary according to the whims of the maintainer. The next part
of the problem that I would like to solve is learning about options that
I don't yet know I care about (OPTIONS_DEFINE gains a member), and
secondarily to learn when an option is past caring (OPTIONS_DEFINE loses
a member that I used to care about), so that I can update
$jail-make.conf in an orderly fashion.

I welcome any comments on my approach so far, or suggestions about how I
might proceed.

Regards,
John

* Made the bad old days less bad.
Index: Mk/bsd.port.mk
===
--- Mk/bsd.port.mk  (revision 349597)
+++ Mk/bsd.port.mk  (working copy)
@@ -6060,6 +6060,27 @@
 .endif
 .endif # config-conditional
 
+NONDEFAULT_OPTIONS_SET=
+NONDEFAULT_OPTIONS_UNSET=
+.for opt in ${ALL_OPTIONS}
+.   if empty(OPTIONS_DEFAULT:M${opt})  !empty(PORT_OPTIONS:M${opt})  
empty(OPTIONS_SET:M${opt})
+NONDEFAULT_OPTIONS_SET+=${opt}
+.   endif
+.   if !empty(OPTIONS_DEFAULT:M${opt})  empty(PORT_OPTIONS:M${opt})  
empty(OPTIONS_UNSET:M${opt})
+NONDEFAULT_OPTIONS_UNSET+=${opt}
+.   endif
+.endfor
+
+.if !target(nondefaultconfig)
+nondefaultconfig:
+.   if !empty(NONDEFAULT_OPTIONS_SET)
+   @${ECHO_MSG} ${OPTIONS_NAME}_SET=  ${NONDEFAULT_OPTIONS_SET}
+.   endif
+.   if !empty(NONDEFAULT_OPTIONS_UNSET)
+   @${ECHO_MSG} ${OPTIONS_NAME}_UNSET=${NONDEFAULT_OPTIONS_UNSET}
+.   endif
+.endif # nondefaultconfig
+
 .if !target(showconfig)
 .include ${PORTSDIR}/Mk/bsd.options.desc.mk
 MULTI_EOL= : you have to choose at least one of them


signature.asc
Description: OpenPGP digital signature


Re: Discover stored options different from port defaults/defines

2014-03-31 Thread John W. O'Brien
On 3/30/14 10:21 PM, Randy Pratt wrote:
 On Sun, 30 Mar 2014 17:13:15 -0400
 John W. O'Brien j...@saltant.com wrote:
 
 [blah blah blah]

[...]
 The first part of my solution to these problems is to store only the
 options that I know I care about. That is, I know I need to find out
 where a stored option disagrees with the default.

 I couldn't figure out how to use the stock tools to peel apart currently
 stored options from current default options, so I wrote a
 ``nondefaultconfig`` target for Mk/bsd.port.mk (see attached), set all
 the common options (DOCS, IPv6, etc) explicitly in /etc/make.conf using
 OPTIONS_SET/OPTIONS_UNSET, and ran the new target against all of my
 installed ports, replacing a subtree full of options files with a
 single, quite modest make.conf. To make this more generally-useful, it
 would need to behave more like NEW_OPTIONS.

cd /usr/ports
pkg info -aoq | sort | xargs -n1 make nondefaultconfig -C \
  /usr/local/etc/poudriere.d/$jail-make.conf
rm -fr /usr/local/etc/poudriere.d/$jail-$ports-$set-options

[...]
 
 I found this posting useful to find OPTIONS:
 
 http://docs.freebsd.org/cgi/mid.cgi?CAOjFWZ45ACYnaByYxxrGoyqTOeS7_EDV6MwoH98-GtDe-F3Yug
 
 The mailing list archives seem to be missing for the past month PR187557
 so here an excerpt from my notes:
 
 On 3/4/2014 9:40 AM, Thierry Thomas wrote:
 from within a port's directory,

 make showconfig

 will show you the current options set and

 make __MAKE_CONF=/dev/null PORT_DBDIR=/var/empty showconfig

 will show you the defaults.
 
 See make(1)'s -C option for specifying ports pathname.
 
 It shouldn't take too much to write a small script and find
 the diff in the output for each command.

Randy,

I like that this approach doesn't muck with /usr/ports/Mk/. I doubt I
would have discovered __MAKE_CONF on my own, but now that I know to look
for it, I see that it's covered early in make(1):

 First of all, the initial list of specifications will be read from
 the system makefile, sys.mk, unless inhibited with the -r option.
 The standard sys.mk as shipped with FreeBSD also handles
 make.conf(5), the default path to which can be altered via the
 make variable __MAKE_CONF.

-John



signature.asc
Description: OpenPGP digital signature


Re: Discover stored options different from port defaults/defines

2014-03-31 Thread John W. O'Brien
On 3/31/14 3:47 PM, Kevin Oberman wrote:
 This is something I've wanted to have for quite a while, but never
 enough to dig through the Makefiles.
 
 I think the proper way would be for make showconfig to print out the
 current config as it does now, but to tag default options (e.g. '+') so
 that it would be easy to note that some option that you never touched
 and probably don't really even understand had had the default changed
 and you probably want to match that change.

There are two dimensions, though, and the showconfig annotations you
describe captures just one of them.

1.  Is this option set the same as the default?
2.  Is this an option I care about pinning?

Your proposal addresses #1. I already solved this for myself in an
ad-hoc manner. I placed an additional requirement on my solution that it
generate machine-readable output. Incidentally, there was a compelling
thread a few months ago which briefly discussed [0] the possibility of
teaching core CLI tools to output structured data like XML, JSON, etc.
The ports machinery would be another great candidate for that kind of
capability.

Anyway, I used the information from #1 as hints about what I was
thinking about #2 at the time I originally configured the port. Then I
put ${OPTIONS_NAME}_SET=FOO and ${OPTIONS_NAME}_UNSET=BAR in make.conf
as a way to express and record #2.

For example:

devel_git_SET= GITWEB GUI
editors_vim_UNSET= RUBY

I can feed this, and little else, to poudriere and remain confident that
as long as devel/git knows about the options GITWEB and GUI, and
editors/vim knows about the option RUBY, I can update my ports tree and
rebuild my packages until the sun comes up and those options will remain
pinned.

 A 'pkg info' option to provide a list of changed defaults in installed
 ports would be even nicer. Something equivalent to pkg version -vl\
 perhaps. But just doing it in make showconfig would make a script that
 would parse 'pkg version' optput and do a make showconfig, only
 printing out the tagged lines, when any changes are noted would be trivial.

Would pkg-info be the place for this? It's looking at state data that
has no notion of history. pkg-info could show available options,
defaults, and built-with options, all as of build-time. It would be up
to pkg-upgrade to send up a flare, on request, if these sets changed
from the currently-installed package to the about-to-be-installed package.

I would also be interested in an equivalent a poudriere feature, because
it's at the moment I update a ports tree in preparation for building new
packages that I want to know if a port I build just grew a new option
that I might want to pin per #2.

Regards,
John

[0]
http://lists.freebsd.org/pipermail/freebsd-stable/2013-December/076205.html



signature.asc
Description: OpenPGP digital signature


Re: Snag in math/py-numpy: checksum fails

2012-11-10 Thread John W. O'Brien
On 10/28/2012 09:58 PM, Thomas Mueller wrote:
 This time, the checksum apparently fails on two files in math/py-numpy.
[snip]

 = SHA256 Checksum OK for numpy-1.6.2.tar.gz.
 = SHA256 Checksum mismatch for numpy-ref.pdf.
 = SHA256 Checksum mismatch for numpy-user.pdf.
 ===  Giving up on fetching files: numpy-ref.pdf numpy-user.pdf 
[snip]
 http://docs.scipy.org/doc/numpy/numpy-ref.pdf
 http://docs.scipy.org/doc/numpy/numpy-user.pdf

As others have noted, this problem arises when upgrading math/py-numpy
because the PDFs across versions are not distinguishable by file name.
Cached distfiles are not replaced but fail the checksum step.
science/py-scipy has this problem too.

I've filed a bug report upstream for numpy, and will follow-up in due
course with an equivalent ticket for scipy.

http://projects.scipy.org/numpy/ticket/2245

In the mean time, the work-around is to manually delete
$DISTDIR/numpy-{ref,user}.pdf before upgrading. Until this is resolved
upstream (or if it never is), perhaps the maintainer would develop a
local versioning system, or accept a patch that implements one.

Regards,
John
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Maintainer timeout on ports/192904: [patch] www/nginx: Optionally support SPNEGO via 3rd party http_auth_gss module

2014-09-16 Thread John W. O'Brien
Last action was assignment to maintainer on 2014-08-22 (3 wk ago) by
marino@. I would appreciate either an available committer or some
feedback on the offered patch.

Thank you,
John

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=192904



signature.asc
Description: OpenPGP digital signature


Re: Should poudriere skip (IGNORE) a port marked BROKEN?

2015-12-13 Thread John W. O'Brien
On 12/13/15 3:25 AM, Kurt Jaeger wrote:
> Hi!
> 
> [ports marked BROKEN are build in poudriere and fail]
> 
>> But poudriere goes ahead with the build, fails on the broken dependency,
>> and skips the port without printing or logging my helpful BROKEN message.
>>
>> Is this by design, or a flaw in my understanding or in poudriere's
>> implementation?
> 
> This is by design, there are two places:
> 
> /usr/local/share/poudriere/testport.sh
> 
> and
> 
> /usr/local/share/poudriere/bulk.sh
> 
> where TRYBROKEN=yes is exported, so that /usr/ports/Mk/bsd.port.mk
> starts the build anyway.
> 
> When I try to debug if I use BROKEN in the right manner,
> I edited the testport.sh or bulk.sh script not to set TRYBROKEN 8-}
> 

Thank you, Kurt.



signature.asc
Description: OpenPGP digital signature


security/john maintainer timeout PR 204903 2015-11-30

2016-01-15 Thread John W. O'Brien
Are there any committers willing to take this bug? Current timeout is
sitting at about six weeks depending on how you count.

security/john: OPENMP option has no effect
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=204903

Thank you,
John



signature.asc
Description: OpenPGP digital signature


Re: net/freeradius3 maintainer timeout on 202684

2016-07-17 Thread John W. O'Brien
On 7/17/16 5:02 AM, Kubilay Kocak wrote:
> On 17/07/2016 11:17 AM, John W. O'Brien wrote:
>> Hello all,
>>
>> I was just going through my old bugs and found this one still open from
>> 2016-02-27. Is there a committer willing and available to take a look?
>>
>> net/freeradius3 w/ non-standard config option depends on IDN
>> https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=202684
>>
>> Thank you,
>> John
>>
> 
> Re-triaged, open for anyone to assign, please confirm QA pass
> 
> Thanks John :)

Confirmed, with artifacts posted to the bug. There are QA issues with
this port, but my proposed patch introduces no new ones.



signature.asc
Description: OpenPGP digital signature


net/freeradius3 maintainer timeout on 202684

2016-07-16 Thread John W. O'Brien
Hello all,

I was just going through my old bugs and found this one still open from
2016-02-27. Is there a committer willing and available to take a look?

net/freeradius3 w/ non-standard config option depends on IDN
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=202684

Thank you,
John



signature.asc
Description: OpenPGP digital signature


net/freeradius3 maintainer is ignoring the port (timeout)

2017-11-06 Thread John W. O'Brien
Hello FreeBSD ports,

The maintainer of net/freeradius3 is unresponsive on two open bugs, both
with proposed patches.

In one case [0], the submitter responded to feedback on 2016-02-03,
there has been no further action on the part of the maintainer, and the
port remains broken w.r.t. Kerberos.

In the other case [1], there was already one maintainer timeout (5 mo as
of 2016-07-17). The bug was reassigned to the maintainer on 2017-08-18,
and there has been no further action.

I would appreciate it if somebody could give these bugs the attention
they need.

Also, I ask that if the maintainer is unable or unwilling to attend to
reported problems, that the port be released so that others could more
easily work to improve it.

Regards,
John

[0] net/freeradius3: Fix pkg-plist with IDN option
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=202684
[1] net/freeradius3: Does not link properly against selected kerberos
implementation
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=205493



signature.asc
Description: OpenPGP digital signature


Re: net/freeradius3 maintainer is ignoring the port (timeout)

2017-11-09 Thread John W. O'Brien
On 2017/11/09 09:30, Ryan Steinmetz wrote:
> On (11/08/17 20:31), John W. O'Brien wrote:
>> On 2017/11/07 19:16, Ryan Steinmetz wrote:
>>> On (11/06/17 22:11), John W. O'Brien wrote:
>>>> Hello FreeBSD ports,
>>>>
>>>> The maintainer of net/freeradius3 is unresponsive on two open bugs,
>>>> both
>>>> with proposed patches.
>>>
>>> John,
>>>
>>> I was reviewing these two issues tonight and, if I am not mistaken, the
>>> IDN issue was resolved in a commit on 7/17/17:
>>> https://svnweb.freebsd.org/ports/head/net/freeradius3/pkg-plist?r1=442287=446076
>>>
>>
>> Hi Ryan,
>>
>> The change you cite allows the port to build with the IDN option.
>> However, it appears that this fragment of the Makefile needs some TLC.
>> Is the IDN module experimental or not?
> 
> To me, this feels a little nit-picky and isn't something that an
> end-user is actually going to see.

Are port OPTIONS for end-users?

>> # freetds module is still experimental
>> .if ${PORT_OPTIONS:MIDN} && empty(PORT_OPTIONS:MEXPERIMENTAL)
>> EXPM=   yes
>> .endif
>>
>>> I also believe that the Kerberos issue was resolved on 4/1/16:
>>> https://svnweb.freebsd.org/ports/head/net/freeradius3/Makefile?r1=412347=412348;
>>>
>>>
>>> Can you please verify your ports tree is current (you should see
>>> FreeRADIUS 3.0.15) and then confirm/deny?
>>
>> $ svn info /usr/ports | grep Revision
>> Revision: 453233
>> $ svn log -v -r 453233:HEAD /usr/ports/net/freeradius3
>> 
>>
>> The issue persists. Here are some relevant excerpts from a poudriere
>> testport build.
>>
> 
> OK so MIT Kerberos integration isn't 100%, but the Heimdal stuff works.
> 
> I'll check this out.

Please see the PR for more details and a proposed solution.

I would be glad to help review a refreshed patch.

>> [...]
>> ---Begin OPTIONS List---
>> ===> The following configuration options are available for
>> freeradius3-3.0.15_1:
>>     DEVELOPER=off: Enable developer options
>>     DOCS=off: Build and/or install documentation
>>     EDIR=off: Enable eDirectory support (implies LDAP)
>>     EXPERIMENTAL=off: Build experimental modules
>>     FIREBIRD=off: With Firebird database support (EXPERIMENTAL)
>>     FREETDS=off: FreeTDS library support
>>     HEIMDAL=off: With Heimdal Kerberos support
>>     HEIMDAL_PORT=off: With Heimdal Kerberos from ports
>>     IDN=off: International Domain Names support
>>     KERBEROS=on: Kerberos support
>>     LDAP=off: LDAP protocol support
>>     MYSQL=off: MySQL database support
>>     PERL=on: Perl scripting language support
>>     PGSQL=off: PostgreSQL database support
>>     PYTHON=off: Python bindings or support
>>     REDIS=off: Redis key-value store database support
>>     REST=off: Enable RESTful API support
>>     RUBY=off: Ruby bindings or support
>>     SQLITE3=off: SQLite 3 database support
>>     UDPFROMTO=off: Compile in UDPFROMTO support
>>     UNIXODBC=off: With unixODBC database support
>>     USER=on: Run as user freeradius, group freeradius
>> ===> Use 'make config' to modify these settings
>> ---End OPTIONS List---
>>
>> --CONFIGURE_ARGS--
>> --without-rlm_sql_sqlite --with-rlm_krb5
>> --with-rlm-krb5-lib-dir=/usr/local/lib --wi
>> th-rlm-krb5-include-dir=/usr/local/include --without-edir
>> --without-rlm_ldap --without-rlm_sql_mysql --without-rlm_sql_postgresql
>> --without-rlm_sql_unixodbc --without-rlm_sql_firebird --with-rlm_perl
>> --without-rlm_python --without-rlm_ruby --with-ruby=no
>> --without-rlm_redis --without-rlm_rediswho --without-rlm_rest
>> --without-rlm_freetds --without-rlm_idn --without-experimental-modules
>> --quiet --without-docdir --with-openssl-libraries=/usr/local/lib
>> --with-logdir=/var/log  --with-openssl-includes=/usr/local/include
>> --prefix=/usr/local --libdir=/usr/local/lib/freeradius-3.0.15
>> --localstatedir=/var  --without-rlm_eap_ikev2  --without-rlm_eap_tnc
>> --without-rlm_eap2  --without-rlm_opendirectory  --without-rlm_sql_db2
>> --without-rlm_sql_iodbc  --without-rlm_sql_sybase  --without-rlm_yubikey
>> --without-rlm_sql_oracle  --without-rlm_securid
>> --without-rlm_cache_memcached  --with-vmps
>> --with-collectdclient-lib-dir=/dev/null  --disable-openssl-version-check
>> --with-pic --prefix=/usr/local ${_LATE_CONFIGURE_ARGS}
>> --End CONFIGURE_ARGS--
>>
>> --CONFIGU

Re: net/freeradius3 maintainer is ignoring the port (timeout)

2017-11-08 Thread John W. O'Brien
On 2017/11/06 22:31, Kubilay Kocak wrote:
[...]
> If you'd like (or are offering) to maintain the port, please create a
> separate issue updating the MAINTAINER line and have it depend on the
> existing open issues (so they can be committed first).
> 
> The maintainer change can then be made after maintainer timeout (2+ weeks).
> 
> It's much easier and preferred to update maintainers with an explicit
> offer and change (in a bug), than to release a port with the possible
> prospect of having no maintainer.

Thank you, koobs. I will keep that strategy in mind in the future.

-John



signature.asc
Description: OpenPGP digital signature


Re: net/freeradius3 maintainer is ignoring the port (timeout)

2017-11-08 Thread John W. O'Brien
On 2017/11/07 19:16, Ryan Steinmetz wrote:
> On (11/06/17 22:11), John W. O'Brien wrote:
>> Hello FreeBSD ports,
>>
>> The maintainer of net/freeradius3 is unresponsive on two open bugs, both
>> with proposed patches.
> 
> John,
> 
> I was reviewing these two issues tonight and, if I am not mistaken, the
> IDN issue was resolved in a commit on 7/17/17:
> https://svnweb.freebsd.org/ports/head/net/freeradius3/pkg-plist?r1=442287=446076

Hi Ryan,

The change you cite allows the port to build with the IDN option.
However, it appears that this fragment of the Makefile needs some TLC.
Is the IDN module experimental or not?

# freetds module is still experimental
.if ${PORT_OPTIONS:MIDN} && empty(PORT_OPTIONS:MEXPERIMENTAL)
EXPM=   yes
.endif

> I also believe that the Kerberos issue was resolved on 4/1/16:
> https://svnweb.freebsd.org/ports/head/net/freeradius3/Makefile?r1=412347=412348;
> 
> Can you please verify your ports tree is current (you should see
> FreeRADIUS 3.0.15) and then confirm/deny?

$ svn info /usr/ports | grep Revision
Revision: 453233
$ svn log -v -r 453233:HEAD /usr/ports/net/freeradius3


The issue persists. Here are some relevant excerpts from a poudriere
testport build.

[...]
---Begin OPTIONS List---
===> The following configuration options are available for
freeradius3-3.0.15_1:
 DEVELOPER=off: Enable developer options
 DOCS=off: Build and/or install documentation
 EDIR=off: Enable eDirectory support (implies LDAP)
 EXPERIMENTAL=off: Build experimental modules
 FIREBIRD=off: With Firebird database support (EXPERIMENTAL)
 FREETDS=off: FreeTDS library support
 HEIMDAL=off: With Heimdal Kerberos support
 HEIMDAL_PORT=off: With Heimdal Kerberos from ports
 IDN=off: International Domain Names support
 KERBEROS=on: Kerberos support
 LDAP=off: LDAP protocol support
 MYSQL=off: MySQL database support
 PERL=on: Perl scripting language support
 PGSQL=off: PostgreSQL database support
 PYTHON=off: Python bindings or support
 REDIS=off: Redis key-value store database support
 REST=off: Enable RESTful API support
 RUBY=off: Ruby bindings or support
 SQLITE3=off: SQLite 3 database support
 UDPFROMTO=off: Compile in UDPFROMTO support
 UNIXODBC=off: With unixODBC database support
 USER=on: Run as user freeradius, group freeradius
===> Use 'make config' to modify these settings
---End OPTIONS List---

--CONFIGURE_ARGS--
--without-rlm_sql_sqlite --with-rlm_krb5
--with-rlm-krb5-lib-dir=/usr/local/lib --wi
th-rlm-krb5-include-dir=/usr/local/include --without-edir
--without-rlm_ldap --without-rlm_sql_mysql --without-rlm_sql_postgresql
--without-rlm_sql_unixodbc --without-rlm_sql_firebird --with-rlm_perl
--without-rlm_python --without-rlm_ruby --with-ruby=no
--without-rlm_redis --without-rlm_rediswho --without-rlm_rest
--without-rlm_freetds --without-rlm_idn --without-experimental-modules
--quiet --without-docdir --with-openssl-libraries=/usr/local/lib
--with-logdir=/var/log  --with-openssl-includes=/usr/local/include
--prefix=/usr/local --libdir=/usr/local/lib/freeradius-3.0.15
--localstatedir=/var  --without-rlm_eap_ikev2  --without-rlm_eap_tnc
--without-rlm_eap2  --without-rlm_opendirectory  --without-rlm_sql_db2
--without-rlm_sql_iodbc  --without-rlm_sql_sybase  --without-rlm_yubikey
 --without-rlm_sql_oracle  --without-rlm_securid
--without-rlm_cache_memcached  --with-vmps
--with-collectdclient-lib-dir=/dev/null  --disable-openssl-version-check
--with-pic --prefix=/usr/local ${_LATE_CONFIGURE_ARGS}
--End CONFIGURE_ARGS--

--CONFIGURE_ENV--
MAKE=gmake ac_cv_path_PERL=/usr/local/bin/perl
ac_cv_path_PERL_PATH=/usr/local/bin/perl  PERL_USE_UNSAFE_INC=1
XDG_DATA_HOME=/wrkdirs/usr/ports/net/freeradius3/work
XDG_CONFIG_HOME=/wrkdirs/usr/ports/net/freeradius3/work
HOME=/wrkdirs/usr/ports/net/freeradius3/work TMPDIR="/tmp"
PATH=/wrkdirs/usr/ports/net/freeradius3/work/.bin:/sbin:/bin:/usr/sbin:/usr/bin:/usr/games:/usr/local/sbin:/usr/local/bin:/root/bin
SHELL=/bin/sh CONFIG_SHELL=/bin/sh
CONFIG_SITE=/usr/ports/Templates/config.site lt_cv_sys_max_cmd_len=262144
--End CONFIGURE_ENV--

--MAKE_ENV--
OPENSSLBASE=/usr/local OPENSSLDIR=/usr/local/openssl
OPENSSLINC=/usr/local/include OPENSSLLIB=/usr/local/lib
OPENSSLRPATH=/usr/local/lib PERL_USE_UNSAFE_INC=1
XDG_DATA_HOME=/wrkdirs/usr/ports/net/freeradius3/work
XDG_CONFIG_HOME=/wrkdirs/usr/ports/net/freeradius3/work
HOME=/wrkdirs/usr/ports/net/freeradius3/work TMPDIR="/tmp"
PATH=/wrkdirs/usr/ports/net/freeradius3/work/.bin:/sbin:/bin:/usr/sbin:/usr/bin:/usr/games:/usr/local/sbin:/usr/local/bin:/root/bin
NO_PIE=yes WITHOUT_DEBUG_FILES=yes WITHOUT_KERNEL_SYMBOLS=yes
SHELL=/bin/sh NO_LINT=YES PREFIX=/usr/local  LOCALBASE=/usr/local
LIBDIR="/usr/lib"  CC="cc" CFLAGS="-O2 -pipe  -I/usr/local

Practice of "Sponsored by" in commit messages

2018-05-14 Thread John W. O'Brien
Hello FreeBSD Ports,

The Committer's Guide section on Commit Log Messages [0], doesn't cover
the use of the "Sponsored by" key word. As a non-committer contributor,
it only recently occurred to me to wonder what work that credit is
intended to represent, and whether some light definition would be
helpful to reduce ambiguity.

When a committer credits a sponsor of theirs, from which the contributor
received no sponsorship, the portrayal feels a little awkward. Does this
strike the list as a problem, and if so, how ought it be solved?

To make this concrete, allow me to illustrate the situation.

Alice, working on her own time, prepares and contributes a patch. Bob,
who works for Acme Corp, reviews and commits the patch on company time.
The commit message includes "Sponsored by: Acme Corp". Alice eagerly
awaits her check from Acme Corp. Should the commit message have read
"Sponsored by: Acme Corp (Bob)"?

This could be extensible to multiple sponsorships. If, instead, Alice
prepares the patch having received a grant to do so from Best Sys Dev,
the commit message could state "Sponsored by: Acme Corp (Bob), Best Sys
Dev (Alice)".

[0]
https://www.freebsd.org/doc/en_US.ISO8859-1/articles/committers-guide/article.html#commit-log-message

PS: I realize that this issue transcends ports, but it's not clear where
I should send this instead, and this list seems like it would have a
reasonably high concentration of people with a stake in the discussion.

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


Maintainer timeout: dns/dnsperf bug 227812

2018-05-12 Thread John W. O'Brien
Hello FreeBSD Ports,

I believe we have reached the two week maintainer timeout on bug 227812
[0]. A tested patch has been ready to commit without feedback since
2018-04-27T16:28:10Z.

Are there any committers within earshot able and willing to take this bug?

[0] dns/dnsperf: Update to 2.1.0.0
https://bugs.freebsd.org/227812

Thank you,

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


Re: Practice of "Sponsored by" in commit messages

2018-05-18 Thread John W. O'Brien
On 2018/05/18 00:43, Eitan Adler wrote:
> On 17 May 2018 at 21:15, Kurt Jaeger <li...@opsec.eu> wrote:
>> Hi!
>>
>>> The FreeBSD project could help by asking committers to qualify
>>> "Sponsored by" lines to indicate which participant(s) is(are) sponsored,
>>> in way that is equivalent to the way that the actual work itself is
>>> customarily attributed.
>>
>> This sounds reasonable, so I suggest that you submit a
>> patch to the ports handbook that describes it for maintainers
>> and committers.
> 
> One thing to note: FreeBSD has a custom patch to subversion to detect
> "ORGANIZATION_NAME" and automatically append it to the default
> template. This is likely why its getting added in unexpected places.
> 

How do you think I should handle that in my forthcoming doc patch? Is
there a related bug I should file against services?

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


Re: Practice of "Sponsored by" in commit messages

2018-05-18 Thread John W. O'Brien
On 2018/05/18 00:15, Kurt Jaeger wrote:
> Hi!
> 
>> The FreeBSD project could help by asking committers to qualify
>> "Sponsored by" lines to indicate which participant(s) is(are) sponsored,
>> in way that is equivalent to the way that the actual work itself is
>> customarily attributed.
> 
> This sounds reasonable, so I suggest that you submit a
> patch to the ports handbook that describes it for maintainers
> and committers. 
> 

Thank you. I will prepare a patch. It seems like it should be against
the Committers' Guide [0], though. Also, since this would apply to trees
besides ports, is there a venue besides this list where I should solicit
feedback?

[0]
https://www.freebsd.org/doc/en_US.ISO8859-1/articles/committers-guide/article.html#commit-log-message

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


Re: Practice of "Sponsored by" in commit messages

2018-05-19 Thread John W. O'Brien
On 2018/05/18 16:32, John W. O'Brien wrote:
> On 5/18/18 14:20, Kurt Jaeger wrote:
>> Hi!
>>
>>>>>>> The FreeBSD project could help by asking committers to qualify
>>>>>>> "Sponsored by" lines to indicate which participant(s) is(are) sponsored,
>>>>>>> in way that is equivalent to the way that the actual work itself is
>>>>>>> customarily attributed.
>>
>>>>>> This sounds reasonable, so I suggest that you submit a
>>>>>> patch to the ports handbook that describes it for maintainers
>>>>>> and committers.
>>
>>>>> One thing to note: FreeBSD has a custom patch to subversion to detect
>>>>> "ORGANIZATION_NAME" and automatically append it to the default
>>>>> template. This is likely why its getting added in unexpected places.
>>
>>>> How do you think I should handle that in my forthcoming doc patch? Is
>>>> there a related bug I should file against services?
>>
>>> Its a client side patch of the subversion binary.  I'm not sure the
>>> best way to handle it beyond perhaps changing the template a bit?
>>
>> What change would be needed ? There's already a Sponsored by field ?
>>
>> The custom patch is here:
>>
>> https://svnweb.freebsd.org/ports/head/devel/subversion/files/extra-patch-fbsd-template?revision=411397=markup
> 
> I agree that this won't necessarily need to change. If anything, a very
> small reminder to committers, or suggestive wording change, to fix-up
> the the sponsorship line when applicable. I will submit a separate bug
> with a candidate change that depends on the doc bug. I won't mind if the
> doc bug is accepted and the subversion portbug is closed WONTFIX upon
> review.
> 

Patch away [1]!

[1] devel/subversion: Update "Sponsored by" microcopy in FBSD extra patch
https://bugs.freebsd.org/228362

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


Re: Practice of "Sponsored by" in commit messages

2018-05-18 Thread John W. O'Brien
On 5/18/18 14:20, Kurt Jaeger wrote:
> Hi!
> 
>>>>>> The FreeBSD project could help by asking committers to qualify
>>>>>> "Sponsored by" lines to indicate which participant(s) is(are) sponsored,
>>>>>> in way that is equivalent to the way that the actual work itself is
>>>>>> customarily attributed.
> 
>>>>> This sounds reasonable, so I suggest that you submit a
>>>>> patch to the ports handbook that describes it for maintainers
>>>>> and committers.
> 
>>>> One thing to note: FreeBSD has a custom patch to subversion to detect
>>>> "ORGANIZATION_NAME" and automatically append it to the default
>>>> template. This is likely why its getting added in unexpected places.
> 
>>> How do you think I should handle that in my forthcoming doc patch? Is
>>> there a related bug I should file against services?
> 
>> Its a client side patch of the subversion binary.  I'm not sure the
>> best way to handle it beyond perhaps changing the template a bit?
> 
> What change would be needed ? There's already a Sponsored by field ?
> 
> The custom patch is here:
> 
> https://svnweb.freebsd.org/ports/head/devel/subversion/files/extra-patch-fbsd-template?revision=411397=markup

I agree that this won't necessarily need to change. If anything, a very
small reminder to committers, or suggestive wording change, to fix-up
the the sponsorship line when applicable. I will submit a separate bug
with a candidate change that depends on the doc bug. I won't mind if the
doc bug is accepted and the subversion portbug is closed WONTFIX upon
review.

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


Re: Practice of "Sponsored by" in commit messages

2018-05-17 Thread John W. O'Brien
On 2018/05/14 20:25, Julian Elischer wrote:
> On 15/5/18 7:40 am, John W. O'Brien wrote:
>> Hello FreeBSD Ports,
>>
>> The Committer's Guide section on Commit Log Messages [0], doesn't cover
>> the use of the "Sponsored by" key word. As a non-committer contributor,
>> it only recently occurred to me to wonder what work that credit is
>> intended to represent, and whether some light definition would be
>> helpful to reduce ambiguity.
>>
>> When a committer credits a sponsor of theirs, from which the contributor
>> received no sponsorship, the portrayal feels a little awkward. Does this
>> strike the list as a problem, and if so, how ought it be solved?
>>
>> To make this concrete, allow me to illustrate the situation.
>>
>> Alice, working on her own time, prepares and contributes a patch. Bob,
>> who works for Acme Corp, reviews and commits the patch on company time.
>> The commit message includes "Sponsored by: Acme Corp". Alice eagerly
>> awaits her check from Acme Corp. Should the commit message have read
>> "Sponsored by: Acme Corp (Bob)"?
> 
> Probably not for just a review, unless it was pretty in depth and took
> many hours.

It sounds like my example didn't make the point I intended. I was trying
to highlight the fact that the unqualified credit in the example makes
it seem like Alice's efforts were funded by the sponsor when they
weren't. If Alice's efforts were trivial while Bob's were substantial,
maybe that's no big deal. If the reverse is true, then I think there is
a problem, which is why I propose qualifying the credit.

Ambiguous:Sponsored by: Acme Corp
Qualified:Sponsored by: Acme Corp (Bob)

To be clear, a committer who "just" reviews and commits a contributed
patch should definitely be able to credit their employer at their
discretion.

> However we want to give some sort of acknowledgement
> to companies that do allow their work to be incorporated, and who allow
> their employees to do some FreeBSD work as part of their duties.
> It also makes their name familiar to the readers of the commit emails
> and often results in others seeking work there etc.
>  "Sponsored by:"  generally means "some (maybe small) part of this work
> was developed
> by someone being paid". It does not specify how much, and it is
> generally left to the committer
> to decide if it was meaningful.   In some cases it is deliberately NOT
> entered despite
> the developer being paid. (e.g. when a company is in stealth mode, or
> when some political
> issue is relevant and people don't want to draw attention).

I agree that the practice should not aim to quantify the relative
contributions, and that the decision to credit a sponsor should be left
to each participant.

>> This could be extensible to multiple sponsorships. If, instead, Alice
>> prepares the patch having received a grant to do so from Best Sys Dev,
>> the commit message could state "Sponsored by: Acme Corp (Bob), Best Sys
>> Dev (Alice)".
>>
>> [0]
>> https://www.freebsd.org/doc/en_US.ISO8859-1/articles/committers-guide/article.html#commit-log-message
>>
>>
>> PS: I realize that this issue transcends ports, but it's not clear where
>> I should send this instead, and this list seems like it would have a
>> reasonably high concentration of people with a stake in the discussion.
>>
> 


-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


Re: Practice of "Sponsored by" in commit messages

2018-05-17 Thread John W. O'Brien
On 2018/05/14 20:14, Maxim Sobolev wrote:
> What's wrong with a current practice. Why is it of any concern to you,
> John? Just curious that is not very clear from your message. It is like
> someone trying to moderate what people in general or some group in
> particular (e.g. freebsd committers) are allowed to put on their
> t-shirts just because you find it offensive or inappropriate.

I don't find crediting sponsors offensive nor inappropriate. Quite the
contrary. What I find problematic is when multiple people do work, not
all with sponsorship or the same sponsorship, and only one person's
sponsor is mentioned in a way that seems to imply that all the work was
sponsored.

What I'm proposing is not to end or ban the practice, but to improve and
refine it so that sponsors are credited for what they sponsor and not
for what they don't sponsor.

Is that clearer?

> On Mon, May 14, 2018, 4:40 PM John W. O'Brien <j...@saltant.com
> <mailto:j...@saltant.com>> wrote:
> 
> Hello FreeBSD Ports,
> 
> The Committer's Guide section on Commit Log Messages [0], doesn't cover
> the use of the "Sponsored by" key word. As a non-committer contributor,
> it only recently occurred to me to wonder what work that credit is
> intended to represent, and whether some light definition would be
> helpful to reduce ambiguity.
> 
> When a committer credits a sponsor of theirs, from which the contributor
> received no sponsorship, the portrayal feels a little awkward. Does this
> strike the list as a problem, and if so, how ought it be solved?
> 
> To make this concrete, allow me to illustrate the situation.
> 
> Alice, working on her own time, prepares and contributes a patch. Bob,
> who works for Acme Corp, reviews and commits the patch on company time.
> The commit message includes "Sponsored by: Acme Corp". Alice eagerly
> awaits her check from Acme Corp. Should the commit message have read
> "Sponsored by: Acme Corp (Bob)"?
> 
> This could be extensible to multiple sponsorships. If, instead, Alice
> prepares the patch having received a grant to do so from Best Sys Dev,
> the commit message could state "Sponsored by: Acme Corp (Bob), Best Sys
> Dev (Alice)".
> 
> [0]
> 
> https://www.freebsd.org/doc/en_US.ISO8859-1/articles/committers-guide/article.html#commit-log-message
> 
> PS: I realize that this issue transcends ports, but it's not clear where
> I should send this instead, and this list seems like it would have a
> reasonably high concentration of people with a stake in the discussion.


-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


Re: Practice of "Sponsored by" in commit messages

2018-05-17 Thread John W. O'Brien
On 2018/05/17 19:18, Maxim Sobolev wrote:
> John, no, not really, sorry. Work is done, credit is given. The form and
> amount of this credit is between whoever does the work and whoever is
> being credited. I don't see why is there any third-party to be involved
> in governing whether or not this credit is "appropriate", "sufficient"
> or "all encompassing" for the work in question. This is just a credit,
> it does not affect the quality of work, nor the license (which is
> 2-clause BSD) nor the copyright holder. Three things that really matter
> long-time. So "Sponsored by" it's just the message on the t-shirt,
> having only meaning to whoever produces the piece and whoever wears it,
> but nothing in particular to the outside world. IMHO.

I fear that you and I are still not on the same page. The difference
between a t-shirt and a commit message is that two or three or four
people can all do work on the same commit, but only one person can wear
a t-shirt.

Taking the analogy further, if you hang a t-shirt with your employer's
logo on a piece of work that you and I collaborated to produce, don't
you think my employer might feel slighted? What if I had done 80% of the
work?

> On Thu, May 17, 2018 at 3:43 PM, John W. O'Brien <j...@saltant.com
> <mailto:j...@saltant.com>> wrote:
> 
> On 2018/05/14 20:14, Maxim Sobolev wrote:
> > What's wrong with a current practice. Why is it of any concern to you,
> > John? Just curious that is not very clear from your message. It is like
> > someone trying to moderate what people in general or some group in
> > particular (e.g. freebsd committers) are allowed to put on their
> > t-shirts just because you find it offensive or inappropriate.
> 
> I don't find crediting sponsors offensive nor inappropriate. Quite the
> contrary. What I find problematic is when multiple people do work, not
> all with sponsorship or the same sponsorship, and only one person's
> sponsor is mentioned in a way that seems to imply that all the work was
> sponsored.
> 
> What I'm proposing is not to end or ban the practice, but to improve and
> refine it so that sponsors are credited for what they sponsor and not
> for what they don't sponsor.
> 
> Is that clearer?
> 
> > On Mon, May 14, 2018, 4:40 PM John W. O'Brien <j...@saltant.com 
> <mailto:j...@saltant.com>
> > <mailto:j...@saltant.com <mailto:j...@saltant.com>>> wrote:
> >
> >     Hello FreeBSD Ports,
> >
> >     The Committer's Guide section on Commit Log Messages [0],
> doesn't cover
> >     the use of the "Sponsored by" key word. As a non-committer
> contributor,
> >     it only recently occurred to me to wonder what work that credit is
> >     intended to represent, and whether some light definition would be
> >     helpful to reduce ambiguity.
> >
> >     When a committer credits a sponsor of theirs, from which the
> contributor
> >     received no sponsorship, the portrayal feels a little awkward.
> Does this
> >     strike the list as a problem, and if so, how ought it be solved?
> >
> >     To make this concrete, allow me to illustrate the situation.
> >
> >     Alice, working on her own time, prepares and contributes a
> patch. Bob,
> >     who works for Acme Corp, reviews and commits the patch on
> company time.
> >     The commit message includes "Sponsored by: Acme Corp". Alice
> eagerly
> >     awaits her check from Acme Corp. Should the commit message
> have read
> >     "Sponsored by: Acme Corp (Bob)"?
> >
> >     This could be extensible to multiple sponsorships. If,
> instead, Alice
> >     prepares the patch having received a grant to do so from Best
> Sys Dev,
> >     the commit message could state "Sponsored by: Acme Corp (Bob),
> Best Sys
> >     Dev (Alice)".
> >
> >     [0]
> >   
>  
> https://www.freebsd.org/doc/en_US.ISO8859-1/articles/committers-guide/article.html#commit-log-message
> 
> <https://www.freebsd.org/doc/en_US.ISO8859-1/articles/committers-guide/article.html#commit-log-message>
> >
> >     PS: I realize that this issue transcends ports, but it's not
> clear where
> >     I should send this instead, and this list seems like it would
> have a
> >     reasonably high concentration of people with a stake in the
> discussion.


-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


Re: Practice of "Sponsored by" in commit messages

2018-05-17 Thread John W. O'Brien
On 2018/05/17 19:36, Maxim Sobolev wrote:
> Well, if your  employer feels  slighted it's for him to bring it up with
> you (see my previous rant on the amount and scope of the credit and who
> parties involved). And then for you to bring it up with me if you feel
> brave enough. :) I don't see how and why FreeBSD project can help in
> this highly hypothetical scenario by putting some rules around. Do we
> have any real-world examples of this happening, bring me at least one
> out of probably tents of thousands of times people used "Sponsored by"
> in their commit messages. Just a single one, please! )

The FreeBSD project could help by asking committers to qualify
"Sponsored by" lines to indicate which participant(s) is(are) sponsored,
in way that is equivalent to the way that the actual work itself is
customarily attributed.

Examples showing this idea in action:

r470149 | krion
PR: 228292 [1], 227223 [2]
Submitted by:   maintainer [1], 0mp@ [2]

[Interpretation: The maintainer did some work to prepare a patch, 0mp
did some work to prepare a patch, and krion combined the patches and
performed the commit.]

r470018 | kan
Reviewed by:jhb, bapt

[Interpretation: kan prepared a patch, jhb and bapt reviewed it, kan
committed it.]


Examples where I perceive no problem:

r470130 | truckman
PR: 228172
Approved by:Leo Vandewoestijne <freebsd@dns.company> (maintainer)
Sponsored by:   Farsight Security, Inc.

[Interpretation: truckman did the work on Farsight company time; Leo
signed-off, but did little or no work, and either doesn't have a sponsor
or chose not to credit the sponsor.]

r469997 | mat
PR: 228149
Reported by:Niels Bakker
Sponsored by:   Absolight

[Interpretation: Niels called attention to a problem, but did little or
no work on producing a patch, and either doesn't have a sponsor or chose
not to credit the sponsor; mat did the work to produce a patch on
Absolight company time.]


Examples showing where improvement is needed:

r469984 | dteske
Reviewed by:mat (mentor; earlier version), imp (mentor), dbaio
Approved by:imp (mentor)
Sponsored by:   Smule, Inc.
Differential Revision:  https://reviews.freebsd.org/D15415

[Uncertainty: Was the review by mat, imp, and dbaio all done on Smule
company time? Doesn't mat work for Absolight? Maybe he was working on
his own time for this one. Maybe acting as a mentor takes hardly any
time. Possible improvements include "Sponsored by: Smule, Inc.
(dteske)", or "Sponsored by: Smule, Inc. (dteske), Absolight (mat)", or...]

r469709 | miwi
PR: 228117
Submitted by:   maintainer
Sponsored by: iXsystems Inc.

[Uncertainty: Does the maintainer work for iXsystems too? Did the
sponsorship cover preparation of the patch or just the work to commit
it? Possible improvements include "Sponsored by: iXsystems Inc. (miwi)",
or "Sponsored by: iXsystems Inc. (miwi, maintainer)", or...]


Are non-committer contributors entitled to specify sponsorship credits?
Should I start requesting sponsorship credit under the name of my small,
one-man consulting operation? If I do, would that discourage committers
from taking my bugs who want to be able to credit their own employers
for the commit?

> On Thu, May 17, 2018 at 4:29 PM, John W. O'Brien <j...@saltant.com
> <mailto:j...@saltant.com>> wrote:
> 
> On 2018/05/17 19:18, Maxim Sobolev wrote:
> > John, no, not really, sorry. Work is done, credit is given. The form and
> > amount of this credit is between whoever does the work and whoever is
> > being credited. I don't see why is there any third-party to be involved
> > in governing whether or not this credit is "appropriate", "sufficient"
> > or "all encompassing" for the work in question. This is just a credit,
> > it does not affect the quality of work, nor the license (which is
> > 2-clause BSD) nor the copyright holder. Three things that really matter
> > long-time. So "Sponsored by" it's just the message on the t-shirt,
> > having only meaning to whoever produces the piece and whoever wears it,
> > but nothing in particular to the outside world. IMHO.
> 
> I fear that you and I are still not on the same page. The difference
> between a t-shirt and a commit message is that two or three or four
> people can all do work on the same commit, but only one person can wear
> a t-shirt.
> 
> Taking the analogy further, if you hang a t-shirt with your employer's
> logo on a piece of work that you and I collaborated to produce, don't
> you think my employer might feel slighted? What if I had done 80% of the
> work?
> 
> > On Thu, May 17, 2018 at 3:43 PM, John W. O'Brien <j...@sa

Re: Practice of "Sponsored by" in commit messages

2018-05-18 Thread John W. O'Brien
On 2018/05/18 07:38, John W. O'Brien wrote:
> On 2018/05/18 00:15, Kurt Jaeger wrote:
>> Hi!
>>
>>> The FreeBSD project could help by asking committers to qualify
>>> "Sponsored by" lines to indicate which participant(s) is(are) sponsored,
>>> in way that is equivalent to the way that the actual work itself is
>>> customarily attributed.
>>
>> This sounds reasonable, so I suggest that you submit a
>> patch to the ports handbook that describes it for maintainers
>> and committers. 
>>
> 
> Thank you. I will prepare a patch. It seems like it should be against
> the Committers' Guide [0], though. Also, since this would apply to trees
> besides ports, is there a venue besides this list where I should solicit
> feedback?
> 
> [0]
> https://www.freebsd.org/doc/en_US.ISO8859-1/articles/committers-guide/article.html#commit-log-message
> 

Patch away [0]!

[0] https://bugs.freebsd.org/228353

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


CFT/CFR: Update ELK stack to 5.6.6 (D14003)

2018-01-27 Thread John W. O'Brien
Good day FreeBSD Ports,

I would appreciate review [0] and test of my proposed patch to update
the ELK stack ports to the latest version in the 5.x series.

The maintainer has not yet responded to my request for review.

[0] https://reviews.freebsd.org/D14003

Thank you,

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B
0x474ABD3C1A7B3F70 (expires 2018-03-14)





signature.asc
Description: OpenPGP digital signature


Re: CFT/CFR: Update ELK stack to 5.6.7 (D14003)

2018-02-04 Thread John W. O'Brien
On 2018/02/04 14:02, John W. O'Brien wrote:
> On 2018/01/27 12:20, John W. O'Brien wrote:
>> I would appreciate review [0] and test of my proposed patch to update
>> the ELK stack ports to the latest version in the 5.x series.
>>
>> The maintainer has not yet responded to my request for review.
>>
>> [0] https://reviews.freebsd.org/D14003
> 
> I have revised the patch based on testing and further inspection and
> submitted ports/225665 [1] to complete the update.
> 
> [1] Update ELK stack to 5.6.6
> https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=225665
> 

Shortly after my last message I became aware of the new upstream release
(5.6.7 on 2018-01-30) and revised the review and bug accordingly. Sorry
for the churn.

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B
0x474ABD3C1A7B3F70 (expires 2018-03-14)



signature.asc
Description: OpenPGP digital signature


Re: CFT/CFR: Update ELK stack to 5.6.6 (D14003)

2018-02-04 Thread John W. O'Brien
On 2018/01/27 12:20, John W. O'Brien wrote:
> I would appreciate review [0] and test of my proposed patch to update
> the ELK stack ports to the latest version in the 5.x series.
> 
> The maintainer has not yet responded to my request for review.
> 
> [0] https://reviews.freebsd.org/D14003

I have revised the patch based on testing and further inspection and
submitted ports/225665 [1] to complete the update.

[1] Update ELK stack to 5.6.6
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=225665

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B
0x474ABD3C1A7B3F70 (expires 2018-03-14)



signature.asc
Description: OpenPGP digital signature


New port: dns/bind9stats -- Munin plugin for BINDv9 stats channel

2018-02-11 Thread John W. O'Brien
Hello FreeBSD ports,

This new port [0] has not gotten any committer love for the last two
weeks. I would appreciate feedback or to have it added to the ports tree.

[0] dns/bind9stats: Munin plugin to collect BINDv9 data from the
statistics channel
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=225508

Thank you,

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B
0x474ABD3C1A7B3F70 (expires 2018-03-14)



signature.asc
Description: OpenPGP digital signature


New port: textproc/elasticsearch6

2018-02-14 Thread John W. O'Brien
I'm glad to see this in the tree and appreciate the work pi@ and
w.schwarzenfeld have done.

I'm puzzled about why tj@, who is AWOL, ended up as maintainer. Could
somebody help me understand this?

$ svn log -c 461559 /usr/ports | egrep "^r[0-9]|Submitted"
r461559 | pi | 2018-02-12 01:49:48 -0500 (Mon, 12 Feb 2018) | 10 lines
Submitted by:   w.schwarzenf...@utanet.at
$ svn diff -c 461559 /usr/ports | grep MAINTAINER
+MAINTAINER=t...@freebsd.org

Nothing against tj@, by the way.

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B
0x474ABD3C1A7B3F70 (expires 2018-03-14)



signature.asc
Description: OpenPGP digital signature


Re: New Flask ports: Flask-Moment, Flask-Mail, Flask-SAML, Flask-Kerberos

2018-04-16 Thread John W. O'Brien
On 2018/03/01 23:04, John W. O'Brien wrote:
> These new ports have not gotten any committer love for some time. I
> would appreciate any feedback or to have them added to the ports tree.
[...]
> 2017-12-26
> www/py-flask-moment
> https://bugs.freebsd.org/224587
>
> 2017-12-26
> mail/py-flask-mail
> https://bugs.freebsd.org/224588
> 
> 2018-01-16
> security/py-flask-kerberos
> https://bugs.freebsd.org/225199
> 
> 2018-01-16
> security/py-flask-saml
> https://bugs.freebsd.org/225202

Hello all,

Please excuse the cross-posting, but these new ports have not gotten any
attention from freebsd-python@ so I'm expanding the call for committers
to freebsd-ports@.

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


New port: net/gobgp -- BGP routing daemon implemented in golang

2018-02-26 Thread John W. O'Brien
Hello FreeBSD ports,

This new port [0] has not gotten any committer love for the last two
weeks since it was last refreshed. I would appreciate feedback or to
have it added to the ports tree, as I'm sure nork (maintainer) would too.

[0] net/gobgp: Add a new port GoBGP, which is a BGP routing daemon
implemented in golang.
https://bugs.freebsd.org/218678

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B
0x474ABD3C1A7B3F70 (expires 2018-03-14)



signature.asc
Description: OpenPGP digital signature


Re: New port: net/gobgp -- BGP routing daemon implemented in golang

2018-02-27 Thread John W. O'Brien
On 2018/02/27 13:21, Kurt Jaeger wrote:
> Hi!
> 
>>> This new port [0] has not gotten any committer love for the last two
>>> weeks since it was last refreshed. I would appreciate feedback or to
>>> have it added to the ports tree, as I'm sure nork (maintainer) would too.
>>>
>>> [0] net/gobgp: Add a new port GoBGP, which is a BGP routing daemon
>>> implemented in golang.
>>> https://bugs.freebsd.org/218678
>>
>> Testbuilds are fine, I'll do a runtest this evening, then commit.
> 
> Runtest looks fine. Committed, thanks very much!
> 

Thank you, Kurt.

nork: Congratulations on your new port.

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B
0x474ABD3C1A7B3F70 (expires 2018-03-14)



signature.asc
Description: OpenPGP digital signature


Re: security/py-gssapi: Strip libraries; add ssl -- needs a committer

2018-10-26 Thread John W. O'Brien
On 2018/10/06 16:31, John W. O'Brien wrote:
> Hello FreeBSD-Python,
> 
> Are there any friendly neighborhood committers available to take
> Nathan's patch [0]?
> 
> [0] https://bugs.freebsd.org/231189

Hello FreeBSD Ports,

Nathan's patch hasn't been getting any love over in FreeBSD Python. Are
there any committers here who are available and would be willing to take
this bug?

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


Re: security/py-gssapi: Strip libraries; add ssl -- needs a committer

2018-11-10 Thread John W. O'Brien
On 2018/10/26 19:41, John W. O'Brien wrote:
> On 2018/10/06 16:31, John W. O'Brien wrote:
>> Hello FreeBSD-Python,
>>
>> Are there any friendly neighborhood committers available to take
>> Nathan's patch [0]?
>>
>> [0] https://bugs.freebsd.org/231189
> 
> Hello FreeBSD Ports,
> 
> Nathan's patch hasn't been getting any love over in FreeBSD Python. Are
> there any committers here who are available and would be willing to take
> this bug?
> 

Hello again,

It's been two more weeks with no attention to this patch, which is ready
to commit. Could I entice a committer to pick it up?

Thank you,

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


Re: security/py-gssapi: Strip libraries; add ssl -- needs a committer

2018-11-11 Thread John W. O'Brien
On 2018/11/11 03:35, Kurt Jaeger wrote:
> Hi!
> 
>>>> [0] https://bugs.freebsd.org/231189
> [...]
>> It's been two more weeks with no attention to this patch, which is ready
>> to commit. Could I entice a committer to pick it up?
> 
> Committed, thanks! It took me a while to clean up after the
> 12/openssl111 update.
> 

Thank you, Kurt.

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


New port: selectors2

2018-09-16 Thread John W. O'Brien
Hello FreeBSD Python,

Are there any friendly neighborhood committers willing and able to take
this bug [0]. I would appreciate any feedback or to have it added to the
ports tree.

Also, the absence of this port is a blocker for updating
net-mgmt/py-ncclient to the latest version [1].

[0] [NEW PORT] devel/py-selectors2: Backported, durable, and portable
I/O selectors for python
https://bugs.freebsd.org/230873
[1] net-mgmt/py-ncclient: Update to 0.6.2
https://bugs.freebsd.org/230874

Thank you,

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


Maintainer timeout: print/latex-beamer bug 241766

2019-12-15 Thread John W. O'Brien
Hello FreeBSD Ports,

I believe we have exceeded the two week maintainer timeout on bug 241766
[0]. A patch has been awaiting attention since 2019-11-25T19:11:52Z.

Are there any committers within earshot able and willing to take this bug?

[0] print/latex-beamer: update to 3.57 and unbreak
https://bugs.freebsd.org/241766

Thank you,

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


ports/243787: [NEW PORT] net/mcjoin: Simple multicast testing application for UNIX

2020-02-29 Thread John W. O'Brien
Hello FreeBSD Ports,

This contribution [0] has been awaiting attention for about four weeks,
since 2020-02-01 22:20:44 UTC. Are there any friendly, neighborhood
committers who would be willing and available to take it?

[0] https://bugs.freebsd.org/243787

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


Re: ports/243787: [NEW PORT] net/mcjoin: Simple multicast testing application for UNIX

2020-03-01 Thread John W. O'Brien
On 2020/03/01 03:35, Kurt Jaeger wrote:
> Hi!
> 
>> This contribution [0] has been awaiting attention for about four weeks,
>> since 2020-02-01 22:20:44 UTC. Are there any friendly, neighborhood
>> committers who would be willing and available to take it?
>>
>> [0] https://bugs.freebsd.org/243787
> 
> Done. Thanks for the cool application, I already have a use case for this 8-)
> 
> Btw, the cause of the delay is a large surge in open ports PRs in
> the last 3-5 weeks, from approx. 250 to 430.
> 

Thank you, Kurt. I understand that folks have a lot of demands on their
time, PR surge or not, and appreciate your taking the time on this one.

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature


Maintainer timeout: databases/rrdtool bug 244808

2020-03-30 Thread John W. O'Brien
Hello FreeBSD Ports,

I believe we have exceeded the two week maintainer timeout on bug 244808
[0]. A patch has been awaiting attention since 2020-03-14T17:55:20Z.

Are there any committers within earshot able and willing to take this
bug? swills' buildbot recently posted a successful result.

[0] databases/rrdtool: "VRULE:0" may cause segmentation fault
https://bugs.freebsd.org/244808

Thank you,

-- 
John W. O'Brien
OpenPGP keys:
0x33C4D64B895DBF3B



signature.asc
Description: OpenPGP digital signature