Re: [gentoo-dev] News Item: Old Wine Versions Moving to Wine Overlay

2017-11-21 Thread Michał Górny
W dniu śro, 22.11.2017 o godzinie 01∶55 -0500, użytkownik NP-Hardass
napisał:
> Would like to get this out within the next day if no-one sees any issues.
> 
> Thanks!
> Title: Old Wine versions moving to wine-overlay
> Author: NP-Hardass 
> Content-Type: text/plain
> Posted: 2017-11-21
> Revision: 1
> News-Item-Format: 2.0
> Display-If-Installed: app-emulation/wine:0
> Display-If-Installed: app-emulation/wine-vanilla
> Display-If-Installed: app-emulation/wine-staging
> Display-If-Installed: app-emulation/wine-d3d9
> Display-If-Installed: app-emulation/wine-any
> 
> To reduce the burden on main Gentoo repository, older versions of Wine
> will be available only in the wine overlay. These ebuilds will still be
> fully supported by the Gentoo Wine Project.  This will result in
> upstream stable releases and the several most recent upstream devel
> releases being the only versions in ::gentoo; all versions meeting the
> criteria for support within Gentoo [1] will be available in ::wine.
> 
> To install the overlay you can either add the repos.conf file to your
> portage configuration directory or add the repository via layman.

What about eselect-repository? ;-P

> * To add the repos.conf file:
> # wget https://gitweb.gentoo.org/repo/proj/wine.git/plain/wine.conf -O \

Infra strongly discourages fetching straight from cgit. This is not
guaranteed to be stable.

> /etc/portage/repos.conf/wine.conf
> 
> Edit the /etc/portage/repos.conf/wine.conf file so that "location"
> points to your desired folder to install the overlay.
> # emaint sync --repo wine
> 
> * To install the overlay via layman:
> # layman -a wine

It's kinda surprising to see this after the repos.conf solution since it
was mentioned first.

> 
> [1]
> https://wiki.gentoo.org/wiki/Project:Wine/Policies_and_Procedures#Supported_versions

-- 
Best regards,
Michał Górny




[gentoo-dev] News Item: Old Wine Versions Moving to Wine Overlay

2017-11-21 Thread NP-Hardass
Would like to get this out within the next day if no-one sees any issues.

Thanks!
Title: Old Wine versions moving to wine-overlay
Author: NP-Hardass 
Content-Type: text/plain
Posted: 2017-11-21
Revision: 1
News-Item-Format: 2.0
Display-If-Installed: app-emulation/wine:0
Display-If-Installed: app-emulation/wine-vanilla
Display-If-Installed: app-emulation/wine-staging
Display-If-Installed: app-emulation/wine-d3d9
Display-If-Installed: app-emulation/wine-any

To reduce the burden on main Gentoo repository, older versions of Wine
will be available only in the wine overlay. These ebuilds will still be
fully supported by the Gentoo Wine Project.  This will result in
upstream stable releases and the several most recent upstream devel
releases being the only versions in ::gentoo; all versions meeting the
criteria for support within Gentoo [1] will be available in ::wine.

To install the overlay you can either add the repos.conf file to your
portage configuration directory or add the repository via layman.

* To add the repos.conf file:
# wget https://gitweb.gentoo.org/repo/proj/wine.git/plain/wine.conf -O \
/etc/portage/repos.conf/wine.conf

Edit the /etc/portage/repos.conf/wine.conf file so that "location"
points to your desired folder to install the overlay.
# emaint sync --repo wine

* To install the overlay via layman:
# layman -a wine

[1]
https://wiki.gentoo.org/wiki/Project:Wine/Policies_and_Procedures#Supported_versions
-- 
NP-Hardass



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] [RFC] GLEP 74 post-Council review update [v2]

2017-11-21 Thread Ulrich Mueller
> On Wed, 22 Nov 2017, Michał Górny wrote:

> W dniu wto, 21.11.2017 o godzinie 22∶48 +0100, użytkownik Ulrich Mueller
> napisał:
>> > > > > > On Tue, 21 Nov 2017, Michał Górny wrote:
>> > > > > > It is an error for a single file to be matched by multiple
>> > > > > > entries of different semantics, file size or checksum values.
>> > > > > > It is an error to specify another entry for a file matching
>> > > > > > ``IGNORE``, or one of its subdirectories.
>> > > [...]
>> > Indeed, the second part of that sentence needs to change. Do you
>> > have a suggestion how to word it best?
>>
>> "It is an error to specify another entry for a file that matches
>> ``IGNORE`` or that is covered by an ignored directory."

> I'm not sure if 'covered' wouldn't be confusing here.

Indeed, that verb can have many meanings.

> Maybe:

> | It is an error to specify another entry for a file that matches
> | ``IGNORE``, or that is located inside an ignored directory.

> ?

Works for me.

Ulrich


pgpTdGqgXiMnT.pgp
Description: PGP signature


Re: [gentoo-dev] [RFC] GLEP 74 post-Council review update [v2]

2017-11-21 Thread R0b0t1
On Mon, Nov 20, 2017 at 12:42 PM, Michał Górny  wrote:
> W dniu czw, 16.11.2017 o godzinie 11∶19 +0100, użytkownik Michał Górny
> napisał:
>> Hi, everyone.
>>
>> Here's the updated version of GLEP 74 taking into consideration
>> the points made during the Council pre-review.
>>
>> ReST: https://dev.gentoo.org/~mgorny/tmp/glep-0074.rst
>> HTML: https://dev.gentoo.org/~mgorny/tmp/glep-0074.html
>>
>
> New changes:
>
> 9d819c9 glep-0074: Disallow filenames containing whitespace

This seems like a bad idea. I apologize if this is covered in more
detail somewhere, but the only justification I can see is that the
current grammar does not permit quoting or some other method of
specifying whitespace as part of a field value.

Is there any way to assure that this won't break things in a
non-obvious way? I'm having a hard time imagining how it would be an
inflexible requirement to use a space in a filename, but it could come
up if it was necessary to use Portage on a non-Gentoo distribution.

It seems very arbitrary. I think the better solution is to use a better parser.

Cheers,
  R0b0t1



Re: [gentoo-dev] Re: [RFC, PATCH] user.eclass: gracefully return when unprivileged

2017-11-21 Thread Patrick McLean


On 2017-11-21 03:19 AM, Benda Xu wrote:
> Francesco Riosa  writes:
> 
>> maybe ewarn() is more appropriate than einfo()?
>> Just in case it's executed outside the scope of prefix
> 
> I can't remember any use case when portage (or, paludis, etc.) is
> executed as a normal user but not a from Prefix.
> 
> This message will only affect Prefix users, who won't be surprised that
> they cannot create new groups or users.  Therefore I think einfo is more
> appropriate.
> 
> 
> Furthermore, we do have Prefix that runs as a root, mostly usable on NAS
> or smartphones, when we do ultimately like portage to manage groups and
> users.

I use portage as non-root all the time when developing and testing
ebuilds, via the "ebuild" command.



Re: [gentoo-dev] Packages up for grabs

2017-11-21 Thread Georgy Yakovlev


> On Nov 21, 2017, at 1:01 PM, Manuel Rüger  wrote:
> 
> Packages up for grabs:
> 
> ...
> * dev-libs/libsodium


I’d take this one, since I’m proxy-maintaining net-dns/dnscrypt-proxy by the 
same upstream and libsodium is a direct dependency of 
net-dns/dnscrypt-proxy.

Regards,
Georgy.




Re: [gentoo-dev] [RFC] GLEP 74 post-Council review update [v2]

2017-11-21 Thread Michał Górny
W dniu wto, 21.11.2017 o godzinie 22∶48 +0100, użytkownik Ulrich Mueller
napisał:
> > > > > > On Tue, 21 Nov 2017, Michał Górny wrote:
> > > > > > It is an error for a single file to be matched by multiple
> > > > > > entries of different semantics, file size or checksum values.
> > > > > > It is an error to specify another entry for a file matching
> > > > > > ``IGNORE``, or one of its subdirectories.
> > > [...]
> > Indeed, the second part of that sentence needs to change. Do you
> > have a suggestion how to word it best?
> 
> "It is an error to specify another entry for a file that matches
> ``IGNORE`` or that is covered by an ignored directory."
> 

I'm not sure if 'covered' wouldn't be confusing here. Maybe:

| It is an error to specify another entry for a file that matches
| ``IGNORE``, or that is located inside an ignored directory.

?

-- 
Best regards,
Michał Górny




Re: [gentoo-dev] [RFC] GLEP 74 post-Council review update [v2]

2017-11-21 Thread Ulrich Mueller
> On Tue, 21 Nov 2017, Michał Górny wrote:

>> > > > It is an error for a single file to be matched by multiple
>> > > > entries of different semantics, file size or checksum values.
>> > > > It is an error to specify another entry for a file matching
>> > > > ``IGNORE``, or one of its subdirectories.

>> [...]

> Indeed, the second part of that sentence needs to change. Do you
> have a suggestion how to word it best?

"It is an error to specify another entry for a file that matches
``IGNORE`` or that is covered by an ignored directory."

Ulrich


pgpaRRJ0Ujxpx.pgp
Description: PGP signature


Re: [gentoo-dev] [RFC] GLEP 74 post-Council review update [v2]

2017-11-21 Thread Michał Górny
W dniu wto, 21.11.2017 o godzinie 21∶28 +0100, użytkownik Ulrich Mueller
napisał:
> > > > > > On Tue, 21 Nov 2017, Michał Górny wrote:
> > > > It is an error for a single file to be matched by multiple entries
> > > > of different semantics, file size or checksum values. It is an error
> > > > to specify another entry for a file matching ``IGNORE``, or one of its
> > > > subdirectories.
> > > 
> > > What about regular files in a directory (or subdirectory) matched
> > > by IGNORE? Looks like this case is not covered (?).
> > Ignored regular files must not have any other (e.g. DATA) entries.
> > Otherwise the expected behavior is unclear -- are we supposed to
> > verify the file or ignore it?
> 
> I still believe that the wording doesn't convey that. Maybe an example
> will clarify what I mean.
> 
> There is a directory foo/bar and a regular file foo/bar/quux in it.
> Now in Manifest there are these entries:
> 
>IGNORE foo/bar
>DATA foo/bar/quux  
> 
> The spec says: "It is an error to specify another entry for a file
> matching ``IGNORE``, or one of its subdirectories." However, file
> foo/bar/quux neither matches IGNORE nor is a subdirectory of it.

Indeed, the second part of that sentence needs to change. Do you have
a suggestion how to word it best?

-- 
Best regards,
Michał Górny




[gentoo-dev] Packages up for grabs

2017-11-21 Thread Manuel Rüger
Packages up for grabs:

* app-crypt/yubikey-manager-qt
* sys-apps/etckeeper
* sys-auth/yubico-piv-tool
* dev-libs/libsodium
* app-editors/retext
* sys-apps/rkflashtool
* dev-embedded/esptool
* app-shells/thefuck
* app-crypt/paperkey
* dev-util/bumpversion
* dev-python/python-afl
* dev-python/pyotherside
* dev-util/docker-distribution-pruner



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] [RFC] GLEP 74 post-Council review update [v2]

2017-11-21 Thread Ulrich Mueller
> On Tue, 21 Nov 2017, Michał Górny wrote:

>> > It is an error for a single file to be matched by multiple entries
>> > of different semantics, file size or checksum values. It is an error
>> > to specify another entry for a file matching ``IGNORE``, or one of its
>> > subdirectories.
>> 
>> What about regular files in a directory (or subdirectory) matched
>> by IGNORE? Looks like this case is not covered (?).

> Ignored regular files must not have any other (e.g. DATA) entries.
> Otherwise the expected behavior is unclear -- are we supposed to
> verify the file or ignore it?

I still believe that the wording doesn't convey that. Maybe an example
will clarify what I mean.

There is a directory foo/bar and a regular file foo/bar/quux in it.
Now in Manifest there are these entries:

   IGNORE foo/bar
   DATA foo/bar/quux  

The spec says: "It is an error to specify another entry for a file
matching ``IGNORE``, or one of its subdirectories." However, file
foo/bar/quux neither matches IGNORE nor is a subdirectory of it.

Ulrich


pgpXTymAHtpjt.pgp
Description: PGP signature


Re: [gentoo-dev] [RFC] GLEP 74 post-Council review update [v3]

2017-11-21 Thread Michał Górny
W dniu wto, 21.11.2017 o godzinie 19∶20 +0100, użytkownik Ulrich Mueller
napisał:
> > > > > > On Tue, 21 Nov 2017, Michał Górny wrote:
> > All paths specified in the Manifest file must consist of characters
> > corresponding to valid UTF-8 code points excluding the NULL character
> > (``U+``), the backwards slash (``\``) and characters classified
> > as whitespace in the current version of the Unicode standard
> > [#UNICODE]_. It is an error to use Manifest files in directories
> > containing files whose names contain the disallowed characters.
> > The forward slash (``/``) must be used as path separator.
> 
> In addition to whitespace, you should also exclude C0 controls (U+
> to U+001F), DEL (U+007F), and C1 controls (U+0080 to U+009F).
> 
> Rationale, these control characters can leave the user's terminal
> in an unusable state when a package manager tries to output such a
> filename in a message. As you reserve the backslash for a future
> escape mechanism, this shouldn't be a too severe restriction.
> 

Works for me. I'll update the spec later. Can you think of any other
sequences that should be explicitly forbidden?

-- 
Best regards,
Michał Górny




Re: [gentoo-dev] manifest-hashes changing to 'BLAKE2B SHA512' on 2017-11-21

2017-11-21 Thread Michał Górny
W dniu śro, 15.11.2017 o godzinie 17∶28 +0100, użytkownik Michał Górny
napisał:
> Hi, everyone.
> 
> The Council has approved the manifest-hashes switch on 2017-11-12
> meeting [1]. The transition will occur to the initial plan, with small
> changes. The updated plan is included at the end of this mail.
> 
> According to this plan, BLAKE2B will be enabled on 2017-11-21. This
> means that starting at this time, all new and updated DIST entries will
> use BLAKE2B+SHA512. Old DIST entries will still use the current hash set
> until updated.
> 
> The developers are required to upgrade to a package manager supporting
> this hash. That is:
> 
> a. Portage 2.3.5 when using py3.6+,
> 
> b. Portage 2.3.13 + pyblake2 installed manually,
> 
> c. Portage 2.3.13-r1 that includes the pyblake2 dep.
> 
> Modern (and old) Portage will refuse to update Manifests if it does not
> support the necessary hashes. However, Portage versions between 2.3.5
> and 2.3.13 inclusively will create Manifests missing BLAKE2B hash rather
> than failing when no hash provider is present. Those Manifests will be
> rejected by the git hook.
> 
> Users will not be affected noticeably as the SHA512 hash continues being
> used for compatibility.
> 
> 
> That said, I'd like to request developers not to start proactively
> converting all old Manifest entries to the new set immediately,
> and instead give some time for things to settle down.
> 
> 
> 
> The updated plan
> 
> 
> Already done:
> 
> - revbumped Portage with pyblake2 dep and started stabilizing it,
> 
> - added git update hook to reject invalid Manifest entries.
> 
> 2017-11-21 (T+7d):
> 
> - manifest-hashes = BLAKE2B SHA512

FYI, this is now online. Please ping me if you have any issues.

> 
> 2018-02-14 (T+3m):
> 
> - manifest-required-hashes = BLAKE2B
> 
> 2018-05-14 (T+6m):
> 
> - last rite fetch-restricted packages that do not use BLAKE2B.
> 
> The final removal of SHA512 will be decided by the Council separately.
> 
> 

-- 
Best regards,
Michał Górny




Re: [gentoo-dev] [RFC] GLEP 74 post-Council review update [v3]

2017-11-21 Thread Ulrich Mueller
> On Tue, 21 Nov 2017, Michał Górny wrote:

> All paths specified in the Manifest file must consist of characters
> corresponding to valid UTF-8 code points excluding the NULL character
> (``U+``), the backwards slash (``\``) and characters classified
> as whitespace in the current version of the Unicode standard
> [#UNICODE]_. It is an error to use Manifest files in directories
> containing files whose names contain the disallowed characters.
> The forward slash (``/``) must be used as path separator.

In addition to whitespace, you should also exclude C0 controls (U+
to U+001F), DEL (U+007F), and C1 controls (U+0080 to U+009F).

Rationale, these control characters can leave the user's terminal
in an unusable state when a package manager tries to output such a
filename in a message. As you reserve the backslash for a future
escape mechanism, this shouldn't be a too severe restriction.

Ulrich


pgpzrgA93CWHZ.pgp
Description: PGP signature


Re: [gentoo-dev] [RFC] GLEP 74 post-Council review update [v3]

2017-11-21 Thread Michał Górny
W dniu czw, 16.11.2017 o godzinie 11∶19 +0100, użytkownik Michał Górny
napisał:
> Hi, everyone.
> 
> Here's the updated version of GLEP 74 taking into consideration
> the points made during the Council pre-review.
> 
> ReST: https://dev.gentoo.org/~mgorny/tmp/glep-0074.rst
> HTML: https://dev.gentoo.org/~mgorny/tmp/glep-0074.html
> 
> Changes:
> 

5ba0654 glep-0074: Specify slash as path separator, disallow backwards
slash
d3b65ba glep-0074: Mention that newline needs to be restricted too in
rationale
54cc3ef glep-0074: Apply suggestions from Ulrich Müller


---
GLEP: 74
Title: Full-tree verification using Manifest files
Author: Michał Górny ,
Robin Hugh Johnson ,
Ulrich Müller 
Type: Standards Track
Status: Draft
Version: 1
Created: 2017-10-21
Last-Modified: 2017-11-16
Post-History: 2017-10-26, 2017-11-16
Content-Type: text/x-rst
Requires: 59, 61
Replaces: 44, 58, 60
---

Abstract


This GLEP extends the Manifest file format to cover full-tree file
integrity and authenticity checks. The format aims to be future-proof,
efficient and provide means of backwards compatibility.


Motivation
==

The Manifest files as defined by GLEP 44 [#GLEP44]_ provide the current
means of verifying the integrity of distfiles and package files
in Gentoo. Combined with OpenPGP signatures, they provide means to
ensure the authenticity of the covered files. However, as noted
in GLEP 57 [#GLEP57]_ they lack the ability to provide full-tree
authenticity verification as they do not cover any files outside
the package directory. In particular, they provide multiple ways
for a third party to inject malicious code into the ebuild environment.

Historically, the topic of providing authenticity coverage for the whole
repository has been mentioned multiple times. The most noteworthy effort
are GLEPs 58 [#GLEP58]_ and 60 [#GLEP60]_ by Robin H. Johnson from 2008.
They were accepted by the Council in 2010 but have never been
implemented. When potential implementation work started in 2017, a new
discussion about the specification arose. It prompted the creation
of a competing GLEP that would provide a redesigned alternative to
the old GLEPs.

This specification is designed with the following goals in mind:

1. It should provide means to ensure the authenticity of the complete
   repository, including preventing the injection of additional files.

2. The format should be universal enough to work both for the Gentoo
   repository and third-party repositories of different characteristics.

3. The Manifest files should be verifiable stand-alone, that is without
   knowing any details about the underlying repository format.


Specification
=

Manifest file format


This specification reuses and extends the Manifest file format defined
in GLEP 44 [#GLEP44]_. For the purpose of it, the *file type* field is
repurposed as a generic *tag* that could also indicate additional
(non-checksum) metadata. Appropriately, those tags can be followed by
other space-separated values.

Unless specified otherwise, the paths used in the Manifest files
are relative to the directory containing the Manifest file. The paths
must not reference the parent directory (``..``).

The Manifest files use UTF-8 encoding.


Manifest file locations and nesting
---

The ``Manifest`` file located in the root directory of the repository
is called top-level Manifest, and it is used to perform the full-tree
verification. In order to verify the authenticity, it must be signed
using OpenPGP, using the armored cleartext format.

The top-level Manifest may reference sub-Manifests contained
in subdirectories of the repository. The sub-Manifests are traditionally
named ``Manifest``; however, the implementation must support arbitrary
names, including the possibility of multiple (split) Manifests
for a single directory. The sub-Manifest can only cover the files inside
the directory tree where it resides.

The sub-Manifest can also be signed using OpenPGP armored cleartext
format. However, the signature verification can be omitted since it
already is covered by the signed top-level Manifest.


Directory tree coverage
---

The specification provides three ways of skipping Manifest verification
of specific files and directories (recursively):

1. explicit ``IGNORE`` entries in Manifest files,

2. injected ignore paths via package manager configuration,

3. using names starting with a dot (``.``) which are always skipped.

All files that are not ignored must be covered by at least one
of the Manifests.

A single file may be matched by multiple identical or equivalent
Manifest entries, if and only if the entries have the same semantics,
specify the same size and the checksums common to both entries match.
It is an error for a single file to be matched by multiple entries
of different semantics, file size or checksum values. It 

Re: [gentoo-dev] [RFC] GLEP 74 post-Council review update [v2]

2017-11-21 Thread Michał Górny
W dniu pon, 20.11.2017 o godzinie 22∶37 +0100, użytkownik Ulrich Mueller
napisał:
> > > > > > On Mon, 20 Nov 2017, Michał Górny wrote:
> > New changes:
> > 9d819c9 glep-0074: Disallow filenames containing whitespace
> > 4124b2f glep-0074: Explicitly specify UTF-8 encoding
> > 7f9bd9f glep-0074: Include suggestions from Daniel Campbell
> 
> Here are a few comments (quoting below only the parts of the text
> referenced by them):
> 
> > The Manifest files use UTF-8 encoding.
> 
> I don't understand the purpose of that requirement. The only place
> where bytes outside of the ASCII range can occur are names of
> distfiles, and these should simply be passed transparently. Otherwise,
> you would have to reject any sequence of non-ASCII bytes that doesn't
> form a valid UTF-8 sequence, which looks like an arbitrary restriction
> to me.

Let me reply in parts.

Why not plain ASCII? Because the spec tries to avoid entirely arbitrary
restrictions, and forcing everyone to use just ASCII entirely counts
as such.

Why not plain bytestring? Mostly because it's really PITA to work
on them in Python. Besides, you can't allow arbitrary bytestring since
you still need to apply restrictions making it safe to parse in text
context, i.e. forbid 0x20, 0x0A, possibly more. Which makes
the definition kinda silly in the end. Not to mention transferring files
over systems which can recode filenames but will not recode Manifest
contents.

Why UTF-8 then? Because it's quite reliable and widely established.
It works for most of the people out of the box. Those who use other
encodings can usually transcode reliably. It's what we're using
in ebuilds and everywhere else wrt GLEP 31, so I don't think we should
make Manifests any different.

> > It is an error for a single file to be matched by multiple entries
> > of different semantics, file size or checksum values. It is an error
> > to specify another entry for a file matching ``IGNORE``, or one of its
> > subdirectories.
> 
> What about regular files in a directory (or subdirectory) matched by
> IGNORE? Looks like this case is not covered (?).

Ignored regular files must not have any other (e.g. DATA) entries.
Otherwise the expected behavior is unclear -- are we supposed to verify
the file or ignore it?

> > All paths specified in the Manifest file must consist of characters
> > corresponding to valid UTF-8 code points excluding the NULL character
> > (``U+``) and characters classified as whitespace in the current
> > version of the Unicode standard [#UNICODE]_. It is an error to use
> > Manifest files in directories containing files whose names contain
> > the disallowed characters.
> 
> See above. I believe that NUL and ASCII whitespace (i.e. characters 09
> 0a 0b 0c 0d 20) should be excluded, but excluding byte sequences like
> "e1 9a 80" (which is the UTF-8 encoding for U+1680 "OGHAM SPACE MARK")
> doesn't make sense.

The restriction is meant to be intentionally wider to prevent problems
with implementations which e.g. use Python's str.split() or '\S' regular
expression character (Portage). When working in Unicode-compliant mode,
those can match additional whitespace characters, and I'm rejecting them
to be on the safe side.

> > During the verification process, the client should compare the timestamp
> > against the update time obtained from a local clock or a trusted time
> > source. If the comparison result indicates that the Manifest at the time
> > of receiving was already significantly outdated, the client should
> > either fail the verification or require manual confirmation from user.
> 
> s/from user./from the user./
> 
> > ``TIMESTAMP ``
> >   Specifies a timestamp of when the Manifest file was last updated.
> >   The timestamp must be a valid second-precision ISO8601 extended format
> 
> s/ISO8601/ISO 8601/

Both done.

> 
> > ``IGNORE ``
> >   Ignores a subdirectory or file from Manifest checks. If the specified
> >   path is present, it and its contents are omitted from the Manifest
> >   verification (always pass). *Path* must be a plain file or directory
> >   path without a trailing slash, and must not contain wildcards.
> 
> What does that mean? Wildcards are not special (so "foo*" will match
> literally), or wildcard characters like "*" are not allowed at all?

Not special. Will reword to:

| Wildcards are not supported and wildcard characters are interpreted
| literally.

> 
> > ``AUX   ...``
> >   Equivalent to the ``DATA`` type, except that the filename is relative
> >   to ``files/`` subdirectory.
> 
> s/to/to the/
> 
> > 3. Process all ``MANIFEST`` entries, recursively. Verify the Manifest
> >files according to `file verification`_ section, and include their
> 
> s/according to/according to the/
> 
> > 6. Verify the entries in *covered* set for incompatible duplicates
> 
> s/in *covered* set/in the *covered* set/
> 
> > 7. Verify all the files in the union of the *present* and *covered*
> >sets, according to `file verification`_ section.
> 
> 

[gentoo-dev] Re: [RFC, PATCH] user.eclass: gracefully return when unprivileged

2017-11-21 Thread Benda Xu
Francesco Riosa  writes:

> maybe ewarn() is more appropriate than einfo()?
> Just in case it's executed outside the scope of prefix

I can't remember any use case when portage (or, paludis, etc.) is
executed as a normal user but not a from Prefix.

This message will only affect Prefix users, who won't be surprised that
they cannot create new groups or users.  Therefore I think einfo is more
appropriate.


Furthermore, we do have Prefix that runs as root, mostly usable on NAS
or smartphones, when we do ultimately like portage to manage groups and
users.

Benda



[gentoo-dev] Re: [RFC, PATCH] user.eclass: gracefully return when unprivileged

2017-11-21 Thread Benda Xu
Francesco Riosa  writes:

> maybe ewarn() is more appropriate than einfo()?
> Just in case it's executed outside the scope of prefix

I can't remember any use case when portage (or, paludis, etc.) is
executed as a normal user but not a from Prefix.

This message will only affect Prefix users, who won't be surprised that
they cannot create new groups or users.  Therefore I think einfo is more
appropriate.


Furthermore, we do have Prefix that runs as a root, mostly usable on NAS
or smartphones, when we do ultimately like portage to manage groups and
users.

Benda



Re: [gentoo-dev] [RFC, PATCH] user.eclass: gracefully return when unprivileged

2017-11-21 Thread Francesco Riosa
On 11/20/17 05:09, hero...@gentoo.org wrote:
[...]
> diff --git a/eclass/user.eclass b/eclass/user.eclass
> index 86bcd282479..76a622df698 100644
> --- a/eclass/user.eclass
> +++ b/eclass/user.eclass
> @@ -103,6 +103,10 @@ egetent() {
>  # Default uid is (pass -1 for this) next available, default shell is
>  # /bin/false, default homedir is /dev/null, and there are no default groups.
>  enewuser() {
> + if [[ ${EUID} != 0 ]] ; then
> + einfo "Insufficient privileges to execute ${FUNCNAME[0]}"
maybe ewarn() is more appropriate than einfo()?
Just in case it's executed outside the scope of prefix

[...]



Re: [gentoo-dev] NEWS item for games destabling

2017-11-21 Thread Róbert Čerňanský
On Mon, 20 Nov 2017 21:53:52 -0800
Daniel Campbell  wrote:

> On Mon, Nov 20, 2017 at 11:36:33AM +0100, Róbert Čerňanský wrote:
> > On Mon, 20 Nov 2017 10:26:29 +0100
> > David Seifert  wrote:
> >   
> > > Round 2 (with correct whitespace this time):
> > > 
> > > Title: No stable KEYWORDS for Gentoo Games
> > > Author: David Seifert 
> > > Content-Type: text/plain
> > > Posted: 2017-11-20
> > > Revision: 1
> > > News-Item-Format: 1.0
> > > Display-If-Keyword: amd64 x86
> > > 
> > > As the Games team does not have enough manpower to keep tabs on
> > > all games packages, we have dropped all ebuilds maintained by the
> > > games project to unstable KEYWORDS (without those required by
> > > other stable packages). If you have any of these stable games
> > > packages installed, you will have to add them
> > > to /etc/portage/package.accept_keywords/ manually. Failures
> > > related to missing stable KEYWORDS will show up as
> > > 
> > >   The following keyword changes are necessary to proceed:
> > >(see "package.accept_keywords" in the portage(5) man page for
> > > more details)
> > >   # required by @selected
> > >   # required by @world (argument)
> > >   =games-action/0verkill-0.16-r4 ~amd64
> > > 
> > > While we accept that this will cause some irritation for the
> > > community, pretending we have a well supported games collection by
> > > having a wealth of stable games packages is misleading at best. We
> > > welcome contributions from outsiders willing to polish up the
> > > games landscape in Gentoo via the Proxy Maintainers.  
> > 
> > What does it mean for the future?  Should not users bother to test &
> > write stabilization request bugs for games anymore?  Or stabi
> > requests will still be accepted?
> 
> If I may take a stab at this (correct me if I'm wrong, soap):
> 
> It only means games are being dropped to ~arch (testing) until other
> maintainers (proxy or otherwise) step up to make sure the games really
> are stable. Packages that rarely get attention but are still marked
> "stable" dilutes the meaning of "stable", especially if you get
> installation or runtime problems that a proper testing of the package
> would have caught.
> 
> This results in bugs that should've been caught in the testing phase,
> confuses users (and developers), and redundant or obvious bugs being
> reported.
> 
> This reads like a "fresh slate" for games, allowing them to start from
> ~arch and ensure that stabilization procedures are correctly followed
> by those who step up. While this will create more stabilization bugs,
> it should, in theory, result in better ebuilds (which makes Gentoo
> maintenance better/easier) and games that have *actually* been tested.
> 
> I hope this explanation is both accurate and helpful.

It make sense to me.  Although the original news reads more like
"games will not go to stable unless they are proxy maintained" but --
in light of your explanation -- that's probably me reading it wrong.
It is certainly better if package keywords reflect the reality.  I
only hope this will not be happening very often, more like - never
again. ;-)

...and thanks games team and everyone who provides & maintains games
in Gentoo or did so in the past.  Availability of top-class games was
one of the things which attracted me to Gentoo (lots of years ago ;-) ).
Portage being able chew original commercial CD-s blown my mind back
then.  I think this is unique to Gentoo and no other distro had ever
possibility to install those games via package manager.

Robert


-- 
Róbert Čerňanský
E-mail: ope...@tightmail.com
Jabber: h...@jabber.sk