Re: [gentoo-dev] Testing is not a valid reason to package.mask

2008-10-03 Thread Mart Raudsepp
On Thu, 2008-10-02 at 22:24 +0200, Jeroen Roovers wrote:
 # Gen 2 Developer [EMAIL PROTECTED] (`date`)
 # Masked for testing.
 =rofl-cat/omgpkg-ver
 
 
 Please people,
 
 
if you want to get something tested, then don't mask it.

Stuff with high impact better be masked for initial testing, such as new
versions of gcc, glibc and other parts of toolchain and build system,
and other similar things affecting other packages than itself. ~arch is
in my eyes something that updates shouldn't break vastly - a stable
candidate.
Of course when that initial testing is done with helping users, the
reason could be modified to tell things broke and what the tracking bug
is, or unmasked if it works fine with other packages.

-- 
Mart Raudsepp
Gentoo Developer
Mail: [EMAIL PROTECTED]
Weblog: http://planet.gentoo.org/developers/leio


signature.asc
Description: This is a digitally signed message part


Re: [gentoo-dev] Testing is not a valid reason to package.mask

2008-10-03 Thread Alec Warner
On Thu, Oct 2, 2008 at 8:16 PM, Jeroen Roovers [EMAIL PROTECTED] wrote:
 On Fri, 3 Oct 2008 04:23:33 +0200
 Dawid Węgliński [EMAIL PROTECTED] wrote:

 I don't think it's ok. ~arch isn't training ground. It's supposed to
 work, so asking arch teams to keywords packages that are not supposed
 to work isn't good.

 We have a testing branch and a stable branch, defined by the
 KEYWORDS variable in the ebuilds. Package.masking stuff saying you're
 testing is at the least uninformative and highly confusing and
 unfriendly to would-be testers when in the very same context this
 already means something different (namely, it's been too short a
 while, wait one or two months for this version to go stable, as the
 ~arch keywords would suggest).

~arch has always been for testing ebuilds; not packages.  You should
not be using ~arch to test stuff you know doesn't work; that is what
package.mask is for; to prevent users from accidentally installing
broken shit.


 The same term shouldn't be used to denote two ways of masking ebuilds,
 but that's beside the point of providing good reasons to package.mask
 ebuilds.


I completely agree that useful messages in package.mask are important.

-Alec

  Even saying that it would kill puppies would be more valid. Just be
  honest and tell people what is going on. Tell them that if they use
  Opera snapshots, they shouldn't care about losing mail or experience
  frequent crashes while browsing. Anything really, just don't tell
  them you're testing or you find yourself excluding them from the
  party with a really bad excuse.

 This is the place i agree with you. Anyway i think package still
 should be p.masked with good explanation of why it is masked.

 Welcome to the starting point of this thread! ;-)


 Kind regards,
 JeR




[gentoo-dev] [RFC] PROPERTIES=set for meta-packages that should behave like package sets (revised)

2008-10-03 Thread Zac Medico
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi everyone,

This is a revised version of the PROPERTIES=set proposal which has
been discussed previously [1].

Please consider a PROPERTIES=set value will serve to indicate that a
given ebuild should be exposed within the package set framework as a
package set. In order to expose such an ebuild as a package set, a
new sets profile configuration file will serve to define mappings
from set names to package atoms. Similar to the existing virtuals
file which is already supported by profiles, the sets file will
allow a given profile to override any mappings that have been
defined by parent profiles. The bulk of the mappings will be defined
in profiles/base/sets, since all profiles should inherit the same
set mappings unless they need to be overridden for some reason.

For the new sets profile configuration file format, the simplest
possible layout could have a set name in the first column and a
package atom in the second column. The package atom should match an
ebuild which exhibits the set property. In addition to the set
name and atom columns, we may also want to include an EAPI column
which the package manager can use to ensure that it parses the atom
syntax correctly.

Similar to the proposed virtual property [2], the set property
will indicate that dependency calculations should consider the
ebuild to have zero installation cost. Similar to glep 37 [3],
ebuilds that exhibit PROPERTIES=set should also define all of their
dependencies in the RDEPEND variable. Other than these constraints,
an ebuild which exhibits PROPERTIES=set should behave just like any
other ebuild. It should be installed and uninstalled just like any
other ebuild, including execution of all the normal ebuild phase
functions that would be executed for any other ebuild that does not
exhibit the set property.

I order to determine which atoms correspond to a given set, the
first step is to lookup the set name from the profile's sets
configuration files. The corresponding package atom is then resolved
to a specific ebuild which should exhibit the set property. The
dependency atoms from this ebuild's RDEPEND variable will serve to
make up the atoms of the package set. In cases when these atoms
resolve to other ebuilds that exhibit he set property then those
other ebuilds act as nested sets and this nesting process is
recursive with no limit on the depth of nesting. The nested sets do
not necessarily have to be mapped to specific set names by the
profile's sets configuration files. If nested sets are anonymous
in this sense then their atoms still become a part of the set that
they are nested within, just as they would if they had been given a
name by the profile's sets configuration files.

Does this seem like a good approach? Are there any suggestions for
improvements or alternative approaches?

[1]
http://archives.gentoo.org/gentoo-dev/msg_02020c2650449920c941adf46dbf7d6f.xml
[2]
http://archives.gentoo.org/gentoo-dev/msg_9d449a18a96a25a547fcfd40544085cf.xml
[3] http://archives.gentoo.org/proj/en/glep/glep-0037.html
- --
Thanks,
Zac


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkjlxX4ACgkQ/ejvha5XGaMv2gCggj2YCW3MkcW/Y/EQUPX+V38E
4DgAnR3d4mD5Y4S2qGZRbq8md1NJnLE7
=AdHx
-END PGP SIGNATURE-



[gentoo-dev] Re: proj/en/perl/outdated-cpan-packages.xml automatic update

2008-10-03 Thread Torsten Veller
* Robin H. Johnson [EMAIL PROTECTED]:
 On Fri, Oct 03, 2008 at 07:33:11AM +0200, Torsten Veller wrote:
  * Robin H. Johnson [EMAIL PROTECTED]:
   And something is broken with CPAN, just in time for us :-).
   Manually browsing give me:
   http://search.cpan.org/~rjbs/Email-MessageID-1.400/
  
  This version was released yesterday.
  
   But using CPAN itself gives me:
   Email::MessageID  1.351  
   R/RJ/RJBS/Email-MessageID-1.351.tar.gz
  It's in here:
  Last-Updated: Fri, 03 Oct 2008 00:26:55 GMT
  Email::MessageID  1.400 
  R/RJ/RJBS/Email-MessageID-1.400.tar.gz
 If you look at the commits that the script made, some of the CPAN
 mirrors had Email-MessageID-1.400 in the index, but others didn't.

http://cpan.org/misc/cpan-faq.html#Which_site_mirror:
http://www.cs.uu.nl/stats/mirmon/cpan.html:
The mirrors are not all syncing from the master site and sync
at different times probably only once a day while the master
gets update more often.
So a new module can be missing on some servers.

Then again some servers are not uptodate at all.

archive.cs.uu.nl: Fri, 03 Oct 2008 00:26:55 GMT
arwen.cs.dal.ca:  Wed, 01 Oct 2008 08:28:05 GMT
cpan.biz.net.id:  Thu, 02 Oct 2008 14:27:30 GMT
cpan.catalyst.net.nz: Fri, 03 Oct 2008 04:27:05 GMT
cpan.mirror.ac.za:Thu, 02 Oct 2008 14:27:30 GMT
cpan.mirrors.easynet.fr:  Fri, 03 Oct 2008 03:26:50 GMT
cpan.mirror.choon.net:Fri, 03 Oct 2008 04:27:05 GMT
cpan.mirror.clemson.edu:  Sat, 27 Sep 2008 22:26:48 GMT
cpan.net.pl:  Fri, 05 Sep 2008 00:02:47 GMT
cpan.triplemind.com:  Mon, 14 Jul 2008 03:02:58 GMT
cpan.velug.org.ve:Fri, 03 Oct 2008 04:27:05 GMT

For the scipt we should use a reliable mirror or the master site.

Thanks.



[gentoo-dev] Re: Testing is not a valid reason to package.mask

2008-10-03 Thread Duncan
Mart Raudsepp [EMAIL PROTECTED] posted [EMAIL PROTECTED],
excerpted below, on  Fri, 03 Oct 2008 10:06:39 +0300:

 Of course when that initial testing is done with helping users, the
 reason could be modified to tell things broke and what the tracking bug
 is, or unmasked if it works fine with other packages.

From previous discussions on this, that's really the point (besides the 
one about not masking it if testing is needed, which toolchain for 
instance pretty much has to do anyway).  If it has a tracking bug, it has 
the necessary info.  If it's just masked for testing, the necessary 
info isn't there.

This helps me as a user who often does that sort of testing, too.  Masked 
for testing simply isn't that useful.  A tracking bug, where I can see 
how that testing is progressing and what other sorts of stuff I might 
expect to have issues with if I DO test, now THAT's actual practical 
info!  Simply masked for testing is little better than no comment at 
all, or than a package revision bump without a changelog entry telling me 
what the big deal was that was worth the revision.  (That's another 
irritating one, but fortunately it doesn't happen so often any more.  
Thanks guys!)

-- 
Duncan - List replies preferred.   No HTML msgs.
Every nonfree program has a lord, a master --
and if you use the program, he is your master.  Richard Stallman




Re: [gentoo-dev] Testing is not a valid reason to package.mask

2008-10-03 Thread Thomas Sachau
Alec Warner schrieb:
 On Thu, Oct 2, 2008 at 8:16 PM, Jeroen Roovers [EMAIL PROTECTED] wrote:
 On Fri, 3 Oct 2008 04:23:33 +0200
 Dawid Węgliński [EMAIL PROTECTED] wrote:

 I don't think it's ok. ~arch isn't training ground. It's supposed to
 work, so asking arch teams to keywords packages that are not supposed
 to work isn't good.
 We have a testing branch and a stable branch, defined by the
 KEYWORDS variable in the ebuilds. Package.masking stuff saying you're
 testing is at the least uninformative and highly confusing and
 unfriendly to would-be testers when in the very same context this
 already means something different (namely, it's been too short a
 while, wait one or two months for this version to go stable, as the
 ~arch keywords would suggest).
 
 ~arch has always been for testing ebuilds; not packages.  You should
 not be using ~arch to test stuff you know doesn't work; that is what
 package.mask is for; to prevent users from accidentally installing
 broken shit.
 

Why do you need package.mask here? If you know, it does not work on that arch, 
dont keyword it. If
you know it does not work anywhere, why would you even think about adding that 
package?


-- 
Thomas Sachau

Gentoo Linux Developer



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] [RFC] PROPERTIES=set for meta-packages that should behave like package sets (revised)

2008-10-03 Thread Ciaran McCreesh
On Fri, 03 Oct 2008 00:10:56 -0700
Zac Medico [EMAIL PROTECTED] wrote:
 For the new sets profile configuration file format, the simplest
 possible layout could have a set name in the first column and a
 package atom in the second column. The package atom should match an
 ebuild which exhibits the set property. In addition to the set
 name and atom columns, we may also want to include an EAPI column
 which the package manager can use to ensure that it parses the atom
 syntax correctly.

We probably want to start putting a profile_eapi file in each profile
directory or something like that... Get package managers to refuse to
use any profile that contains a directory using an eapi it doesn't
know. This'll help sort out the slot deps in profiles issue too.

 Similar to the proposed virtual property [2], the set property
 will indicate that dependency calculations should consider the
 ebuild to have zero installation cost.

If we go this route, that needs to be a property of its own, really.
Otherwise we'll end up with a dozen properties all of which imply
particular different real properties.

 I order to determine which atoms correspond to a given set, the
 first step is to lookup the set name from the profile's sets
 configuration files. The corresponding package atom is then resolved
 to a specific ebuild which should exhibit the set property. The
 dependency atoms from this ebuild's RDEPEND variable will serve to
 make up the atoms of the package set. In cases when these atoms
 resolve to other ebuilds that exhibit he set property then those
 other ebuilds act as nested sets and this nesting process is
 recursive with no limit on the depth of nesting. The nested sets do
 not necessarily have to be mapped to specific set names by the
 profile's sets configuration files. If nested sets are anonymous
 in this sense then their atoms still become a part of the set that
 they are nested within, just as they would if they had been given a
 name by the profile's sets configuration files.

Why not just invent a syntax that lets you take an arbitrary ebuild
and use an arbitrary dep key from it as a set? Say, something like
@RDEPEND(=foo/bar-1.23) . No need for any PROPERTIES or mapping
mess at all...

 Does this seem like a good approach? Are there any suggestions for
 improvements or alternative approaches?

This looks to me as if you're trying to find uses for PROPERTIES,
rather than trying to find ways to solve a problem.

-- 
Ciaran McCreesh


signature.asc
Description: PGP signature


Re: [gentoo-dev] [RFC] PROPERTIES=set for meta-packages that should behave like package sets (revised)

2008-10-03 Thread Zac Medico
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Ciaran McCreesh wrote:
 On Fri, 03 Oct 2008 00:10:56 -0700
 Zac Medico [EMAIL PROTECTED] wrote:
 For the new sets profile configuration file format, the simplest
 possible layout could have a set name in the first column and a
 package atom in the second column. The package atom should match an
 ebuild which exhibits the set property. In addition to the set
 name and atom columns, we may also want to include an EAPI column
 which the package manager can use to ensure that it parses the atom
 syntax correctly.
 
 We probably want to start putting a profile_eapi file in each profile
 directory or something like that... Get package managers to refuse to
 use any profile that contains a directory using an eapi it doesn't
 know. This'll help sort out the slot deps in profiles issue too.

That's a good idea. If we do that then we can assume that all atoms
in the profile conform to the specified EAPI.

 Similar to the proposed virtual property [2], the set property
 will indicate that dependency calculations should consider the
 ebuild to have zero installation cost.
 
 If we go this route, that needs to be a property of its own, really.
 Otherwise we'll end up with a dozen properties all of which imply
 particular different real properties.

Perhaps, but there's a trade-off in having to specify two properties
when a single property can have compound meaning. For example,
Donnie (dberkholz) has previously expressed some concern about
PROPERTIES being more fine-grained than they need to be [1].

 I order to determine which atoms correspond to a given set, the
 first step is to lookup the set name from the profile's sets
 configuration files. The corresponding package atom is then resolved
 to a specific ebuild which should exhibit the set property. The
 dependency atoms from this ebuild's RDEPEND variable will serve to
 make up the atoms of the package set. In cases when these atoms
 resolve to other ebuilds that exhibit he set property then those
 other ebuilds act as nested sets and this nesting process is
 recursive with no limit on the depth of nesting. The nested sets do
 not necessarily have to be mapped to specific set names by the
 profile's sets configuration files. If nested sets are anonymous
 in this sense then their atoms still become a part of the set that
 they are nested within, just as they would if they had been given a
 name by the profile's sets configuration files.
 
 Why not just invent a syntax that lets you take an arbitrary ebuild
 and use an arbitrary dep key from it as a set? Say, something like
 @RDEPEND(=foo/bar-1.23) . No need for any PROPERTIES or mapping
 mess at all...

Well, that wouldn't allow for nesting. The idea behind the
PROPERTIES=set approach is to integrate meta-ebuilds into the sets
framework in a way maximizes reuse of the advantages that
meta-ebuilds have to offer [2].

 Does this seem like a good approach? Are there any suggestions for
 improvements or alternative approaches?
 
 This looks to me as if you're trying to find uses for PROPERTIES,
 rather than trying to find ways to solve a problem.

No, I'm trying to integrate meta-ebuilds into the sets framework and
it just happens the PROPERTIES metadata offers a convenient way to
separate meta-ebuilds from normal ebuilds.

[1]
http://archives.gentoo.org/gentoo-dev/msg_10a7e736c3bd2dea4223f599a463994e.xml
[2]
http://archives.gentoo.org/gentoo-dev/msg_f0c6b1f3a047fc83ef237e0304af6697.xml
- --
Thanks,
Zac
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkjmQBAACgkQ/ejvha5XGaP4sgCdEWuCSpUZKTwxKxOxZOTEIn3R
bgkAnROJHVeYYG5K7rorJloHjvjNUkAe
=fZP5
-END PGP SIGNATURE-



[gentoo-dev] Re: [gentoo-commits] gentoo-x86 commit in app-misc/anki: metadata.xml Manifest anki-0.9.8.1.ebuild ChangeLog

2008-10-03 Thread Christian Faulhammer
Hi,

welcome to your mentor reviews. :)

Heath Caldwell (hncaldwell) [EMAIL PROTECTED]:

 Index: metadata.xml
   flag name=kakasi
   Enable pkgapp-i18n/kakasi/pkg support for
 furigana generation /flag

 I tend to call it furigana instead of kakasi, as USE flags should
describe a purpose/function not the needed software to achieve it.

 Index: anki-0.9.8.1.ebuild
 ===
 # Copyright 1999-2008 Gentoo Foundation
 # Distributed under the terms of the GNU General Public License v2
 #
 $Header: /var/cvsroot/gentoo-x86/app-misc/anki/anki-0.9.8.1.ebuild,v
 1.1 2008/10/02 23:13:39 hncaldwell Exp $
 
 EAPI=1
 
 NEED_PYTHON=2.4
 inherit eutils multilib python
 
 DESCRIPTION=A spaced-repetition memory training program (flash
 cards) HOMEPAGE=http://ichi2.net/anki/index.html;
 SRC_URI=http://ichi2.net/anki/download/${P}.tgz;
 LICENSE=GPL-3
 SLOT=0
 KEYWORDS=~amd64 ~x86
 IUSE=+graph kakasi +sound
 
 RDEPEND==dev-python/PyQt4-4.3
   =dev-python/sqlalchemy-0.4.1
   =dev-python/simplejson-1.7.3
   =dev-python/pysqlite-2.3.0

 pysqlite is included with Python 2.5 (USE=sqlite enabled), so you
might upgrade to EAPI=2 and use USE dependencies or add a
built_with_use check into pkg_config.  Or ask the Python team how to
handle it in the best way.

 src_install() {
   dodoc CREDITS
 
   python_version
 
   insinto /usr/$(get_libdir)/python${PYVER}/site-packages
   doins -r ankiqt libanki/anki
 
   insinto /usr/$(get_libdir)/python${PYVER}/site-packages/anki
   doins -r designer icons icons.qrc icons_rc.py libanki/samples
 
   dobin ${PN}
 
   doicon icons/${PN}.png
   make_desktop_entry ${PN} ${PN} ${PN}.png Education
 }

 No installation routine available?

V-Li

-- 
Christian Faulhammer, Gentoo Lisp project
URL:http://www.gentoo.org/proj/en/lisp/, #gentoo-lisp on FreeNode

URL:http://www.faulhammer.org/


signature.asc
Description: PGP signature


Re: [gentoo-dev] Testing is not a valid reason to package.mask

2008-10-03 Thread Alec Warner
On Fri, Oct 3, 2008 at 5:06 AM, Thomas Sachau [EMAIL PROTECTED] wrote:
 Alec Warner schrieb:
 On Thu, Oct 2, 2008 at 8:16 PM, Jeroen Roovers [EMAIL PROTECTED] wrote:
 On Fri, 3 Oct 2008 04:23:33 +0200
 Dawid Węgliński [EMAIL PROTECTED] wrote:

 I don't think it's ok. ~arch isn't training ground. It's supposed to
 work, so asking arch teams to keywords packages that are not supposed
 to work isn't good.
 We have a testing branch and a stable branch, defined by the
 KEYWORDS variable in the ebuilds. Package.masking stuff saying you're
 testing is at the least uninformative and highly confusing and
 unfriendly to would-be testers when in the very same context this
 already means something different (namely, it's been too short a
 while, wait one or two months for this version to go stable, as the
 ~arch keywords would suggest).

 ~arch has always been for testing ebuilds; not packages.  You should
 not be using ~arch to test stuff you know doesn't work; that is what
 package.mask is for; to prevent users from accidentally installing
 broken shit.


 Why do you need package.mask here? If you know, it does not work on that 
 arch, dont keyword it. If
 you know it does not work anywhere, why would you even think about adding 
 that package?

Nuances ;)

What does a lack of keyword mean?  It means that no dev has bothered
to test the package on said arch.  It doesn't mean the package does
not work properly on said arch.  Users who run alt arches like sparc
end up ~arch keywording stuff locally all the time; it would be
unfortunate were they to keyword a totally broken package on sparc
just because the dev didn't keyword it.  Users often think this means
'lack of time' not 'does not function'.

What does -arch mean?  It means that the package *will* never work on
said arch (64-bit binaries on x86 for example); it does not mean 'this
package *may* not work'; so keywording broken packages with -arch is
also not quite correct (although arguably you could move from -arch,
to ~arch, to arch and maybe get away with it.)

Package.mask can be used for evaluating packages.  Many developers
would suggest using overlays for these types of packages; however not
everyone has an overlay and not everyone uses overlays so I don't
think there should be a hard and fast rule here.



 --
 Thomas Sachau

 Gentoo Linux Developer




[gentoo-dev] [RFC] Label profiles with EAPI for compatibility checks

2008-10-03 Thread Zac Medico
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi everyone,

Please consider a new eapi profile configuration file that will
designate the EAPI to which any package atoms within a given layer
of the profile stack must conform. This will allow package managers
to bail out with an informative error message if the user
accidentally selects a profile containing an EAPI that is not
supported by the currently installed package manager.

In order to allow mixed EAPIs in the profiles, and to avoid having
to configure the EAPI in every single layer, each directory of the
profile stack should be able to either override or inherit the EAPI
value that may have been defined in a previous layer of the profile
stack. If no EAPI has been previously defined then it can be assumed
to be 0.

The format of the configuration file can be very simple, containing
only the EAPI value and nothing more. For example, a file containing
 just a single 0 character, followed by a newline, could be
created at profiles/base/eapi in order to explicitly declare that
atoms in the base profile conform to EAPI 0. However, this
particular declaration would be redundant since the base profile
does not inherit from any other profile and therefore it's EAPI
would be assumed to be 0 anyway.

Does this seem like a good approach? Are there any suggestions for
improvements or alternative approaches?
- --
Thanks,
Zac
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkjmtEYACgkQ/ejvha5XGaNtSQCfXb2OQAYCEAe0Uuuu7Ou+DxyV
QZsAn0VpUbKqHJP0XRZSg6mhFKeUNXui
=qR8c
-END PGP SIGNATURE-



Re: [gentoo-dev] [RFC] PROPERTIES=set for meta-packages that should behave like package sets (revised)

2008-10-03 Thread Jorge Manuel B. S. Vicetto
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Zac Medico wrote:
 Hi everyone,
 
 This is a revised version of the PROPERTIES=set proposal which has
 been discussed previously [1].
 
 snip a detailed proposal about a new kind of set

Let me try show some real examples of the type of sets I would like to
use and how I'd like to use them, so that your proposal and the
discussion on sets can take this into account.

meta sets:
-  @kde 
# We don't include kdesdk on the global set
kde-base/kate

@kdeadmin
@kdeartwork
@kdebase
@kdeedu
@kdegames
@kdegraphics
@kdemultimedia
@kdenetwork
@kdepim
@kdetoys
@kdeutils
-  @kde 

simple sets (list of ebuilds)
-  @kdetoys 
kde-base/amor
kde-base/kteatime
kde-base/ktux
kde-base/kweather
-  @kdetoys 

sets with conditional deps
-  @compiz-fusion 
dev-python/compizconfig-python
x11-apps/ccsm
x11-apps/simple-ccsm
x11-libs/compiz-bcop
x11-libs/libcompizconfig
x11-plugins/compiz-fusion-plugins-main
x11-plugins/compiz-fusion-plugins-extra
x11-themes/emerald-themes
x11-wm/compiz
emerald? (x11-wm/emerald )
gnome? ( x11-libs/compizconfig-backend-gconf )
kde? ( x11-libs/compizconfig-backend-kconfig )
unsupported? ( x11-plugins/compiz-fusion-plugins-unsupported )
-  @compiz-fusion 

It would also be important to have versioned sets (depending on a slot,
for example). Marius Mauch (genone) suggested a very interesting way to
solve this by using a set config file (portage specific) that, as he
stated, should work if I got the syntax right from memory [current
Portage svn] (something similar to):

-  sets.conf 
[slot-4.1]
class=dbapi.VariableSet
variable=SLOT
include=4.1

[kdebase]
class=files.StaticFileSet
filename=kdebase

[kdebase-4.1]
class=base.DummyPackageSet
extend=kdebase
intersect=slot-4.1
-  sets.conf 

Being able to take advantage of use deps for packages would be a bonus:
kde? (
x11-libs/compizconfig-backend-kconfig
x11-wm/compiz[kde]
)


These type of sets cover what I need / would like to have at the moment.
How would I like to use them? I would like to have the sets defined in
the tree as base sets that users can tweak to their needs. So they
should be able to use something similar to package.use (package.use
itself?) to add desired conditional deps such as @compiz-fusion
- -emerald -gnome kde unsupported. With the sets operators being defined
by genone for Portage[1] '-', '/' users should also be able to create
sets with a list of packages they don't want to install, so if someone
wouldn't want to install kppp with @kdenetwork, they could create a
@kdenetwork-unwanted set with kppp and run emerge -av
@[EMAIL PROTECTED]. It would be really helpful if we
could have a package.mask like structure that allowed users to mask
deps from sets (does / could package.mask be used this way?) so that one
wouldn't be forced to run emerge -av @[EMAIL PROTECTED]
every time. Running emerge -av @kdenetwork/@installed  to reinstall
only installed deps or emerge -uDav @kdenetwork/@installed to update
the existing deps are also interesting ideas. Perhaps we should start
doing emerge -uDav @world/@installed.

Marius suggests the following for the subtraction issue (the same
warning as above):
-  sets.conf 
# assuming @kdenetwork is already defined in a higher level sets.conf

[kdenetwork-ignore]
class=base.DummyPackageSet
packages=kde-extra/i-dont-want-this

[kdenetwork]
remove=kdenetwork-ignore
-  sets.conf 

So this is what I would like to see with sets. Am I crazy? Is it
possible to do any of this? Anyone has some other needs?

- --
Regards,

Jorge Vicetto (jmbsvicetto) - jmbsvicetto at gentoo dot org
Gentoo- forums / Userrel / Devrel / SPARC / KDE

[1] -
http://planet.gentoo.org/developers/genone/2008/09/29/more_extensions_to_package_set_support
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkjm5yEACgkQcAWygvVEyAL6YwCZAaLiyKm8sUySAcgIgBdPDStT
ZcQAn3+FGPlnmlxKPdKOkWQizs//vuKP
=They
-END PGP SIGNATURE-



[gentoo-dev] Re: Testing is not a valid reason to package.mask

2008-10-03 Thread Ryan Hill
On Thu, 2 Oct 2008 22:24:35 +0200
Jeroen Roovers [EMAIL PROTECTED] wrote:

 Please people,
 
 
if you want to get something tested, then don't mask it.

Um... no?  One thing that package.mask has always been used for is
temporarily masking a package until it can be tested and then unleashed
on the general population.  It's not like we're putting masked stuff in
the tree with the hope that someone will find it and try it out.  You
mask a package, ask the user or whoever to test it, and unmask it when
it's ready.  We don't just throw untested stuff into the tree when we
suspect problems with it. ~arch is not a playground.  Already one of
the major complaints we see against Gentoo time and time again is that
it breaks too often and the maintenance burden is too high.  Why would
we want to exacerbate that?

We don't /want/ ~arch systems to get automatically widely exposed to
the stuff we're intending to get tested.  That's the whole point of
masking it!  We want it tested by a few people before we expose it to
the unwashed masses.

So, no, I'll continue using package.mask for testing just
as it always has been.  Sorry.


-- 
gcc-porting,  by design, by neglect
treecleaner,  for a fact or just for effect
wxwidgets @ gentoo EFFD 380E 047A 4B51 D2BD C64F 8AA8 8346 F9A4 0662


signature.asc
Description: PGP signature


[gentoo-portage-dev] [RFC] PROPERTIES=set for meta-packages that should behave like package sets (revised)

2008-10-03 Thread Zac Medico
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi everyone,

This is a revised version of the PROPERTIES=set proposal which has
been discussed previously [1].

Please consider a PROPERTIES=set value will serve to indicate that a
given ebuild should be exposed within the package set framework as a
package set. In order to expose such an ebuild as a package set, a
new sets profile configuration file will serve to define mappings
from set names to package atoms. Similar to the existing virtuals
file which is already supported by profiles, the sets file will
allow a given profile to override any mappings that have been
defined by parent profiles. The bulk of the mappings will be defined
in profiles/base/sets, since all profiles should inherit the same
set mappings unless they need to be overridden for some reason.

For the new sets profile configuration file format, the simplest
possible layout could have a set name in the first column and a
package atom in the second column. The package atom should match an
ebuild which exhibits the set property. In addition to the set
name and atom columns, we may also want to include an EAPI column
which the package manager can use to ensure that it parses the atom
syntax correctly.

Similar to the proposed virtual property [2], the set property
will indicate that dependency calculations should consider the
ebuild to have zero installation cost. Similar to glep 37 [3],
ebuilds that exhibit PROPERTIES=set should also define all of their
dependencies in the RDEPEND variable. Other than these constraints,
an ebuild which exhibits PROPERTIES=set should behave just like any
other ebuild. It should be installed and uninstalled just like any
other ebuild, including execution of all the normal ebuild phase
functions that would be executed for any other ebuild that does not
exhibit the set property.

I order to determine which atoms correspond to a given set, the
first step is to lookup the set name from the profile's sets
configuration files. The corresponding package atom is then resolved
to a specific ebuild which should exhibit the set property. The
dependency atoms from this ebuild's RDEPEND variable will serve to
make up the atoms of the package set. In cases when these atoms
resolve to other ebuilds that exhibit he set property then those
other ebuilds act as nested sets and this nesting process is
recursive with no limit on the depth of nesting. The nested sets do
not necessarily have to be mapped to specific set names by the
profile's sets configuration files. If nested sets are anonymous
in this sense then their atoms still become a part of the set that
they are nested within, just as they would if they had been given a
name by the profile's sets configuration files.

Does this seem like a good approach? Are there any suggestions for
improvements or alternative approaches?

[1]
http://archives.gentoo.org/gentoo-dev/msg_02020c2650449920c941adf46dbf7d6f.xml
[2]
http://archives.gentoo.org/gentoo-dev/msg_9d449a18a96a25a547fcfd40544085cf.xml
[3] http://archives.gentoo.org/proj/en/glep/glep-0037.html
- --
Thanks,
Zac


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkjlxX4ACgkQ/ejvha5XGaMv2gCggj2YCW3MkcW/Y/EQUPX+V38E
4DgAnR3d4mD5Y4S2qGZRbq8md1NJnLE7
=AdHx
-END PGP SIGNATURE-



[gentoo-portage-dev] [RFC] Label profiles with EAPI for compatibility checks

2008-10-03 Thread Zac Medico
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi everyone,

Please consider a new eapi profile configuration file that will
designate the EAPI to which any package atoms within a given layer
of the profile stack must conform. This will allow package managers
to bail out with an informative error message if the user
accidentally selects a profile containing an EAPI that is not
supported by the currently installed package manager.

In order to allow mixed EAPIs in the profiles, and to avoid having
to configure the EAPI in every single layer, each directory of the
profile stack should be able to either override or inherit the EAPI
value that may have been defined in a previous layer of the profile
stack. If no EAPI has been previously defined then it can be assumed
to be 0.

The format of the configuration file can be very simple, containing
only the EAPI value and nothing more. For example, a file containing
 just a single 0 character, followed by a newline, could be
created at profiles/base/eapi in order to explicitly declare that
atoms in the base profile conform to EAPI 0. However, this
particular declaration would be redundant since the base profile
does not inherit from any other profile and therefore it's EAPI
would be assumed to be 0 anyway.

Does this seem like a good approach? Are there any suggestions for
improvements or alternative approaches?
- --
Thanks,
Zac
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkjmtEYACgkQ/ejvha5XGaNtSQCfXb2OQAYCEAe0Uuuu7Ou+DxyV
QZsAn0VpUbKqHJP0XRZSg6mhFKeUNXui
=qR8c
-END PGP SIGNATURE-



Majordomo results: [gentoo-portage-dev] [RFC] Label profile

2008-10-03 Thread Majordomo
--

 -BEGIN PGP SIGNED MESSAGE-
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: Majordomo results: [gentoo-portage-dev]

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: Majordomo results: [gentoo-portage-dev]

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: Majordomo results: [gentoo-portage-dev]

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: Majordomo results: [gentoo-portage-dev]

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: Majordomo results: [gentoo-portage-dev]

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: Majordomo results: [gentoo-portage-dev]

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: Majordomo results: [gentoo-portage-dev]

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: Majordomo results: [gentoo-portage-dev]

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: Majordomo results: [gentoo-portage-dev]

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: Majordomo results: [gentoo-portage-dev]

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: Majordomo results: [gentoo-portage-dev]

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: Majordomo results: [gentoo-portage-dev]

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: Majordomo results: [gentoo-portage-dev]

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: Majordomo results: [gentoo-portage-dev]

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: [gentoo-portage-dev] Majordomo results:

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



Majordomo results: Majordomo results: [gentoo-portage-dev]

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Majordomo results: Majordomo results: Majordomo results: [g

2008-10-03 Thread Majordomo
--

 --
END OF COMMANDS



[gentoo-portage-dev] Spam Redux

2008-10-03 Thread Robin H. Johnson
Somebody subscribed a bad list manager to the list, and caused a mail
loop. I removed the offending list address now, but I don't know who did
it in the first place.

-- 
Robin Hugh Johnson
Gentoo Linux Developer  Infra Guy
E-Mail : [EMAIL PROTECTED]
GnuPG FP   : 11AC BA4F 4778 E3F6 E4ED  F38E B27B 944E 3488 4E85