Phil Morrell <deb...@emorrp1.name> writes:

> On Fri, Jun 14, 2024 at 12:26:50PM +0100, Ian Jackson wrote:
>> Andreas Tille writes ("How is the original tarball obtained in tag2upload"):
>> > In many teams we keep the metadata about the
>> > orig.tar.$COMPRESSION tarball in pristine-tar branch.  In most cases
>> > this works flawlessly but I've observed some exceptions and read about
>> > potential problems with pristine-tar.
>> 
>> Firstly, if there is an orig in the archive, the t2u robot will use
>> that.  Failing that, it will use "git-deborig" which will call
>> "git-archive".  Currently there isn't any support for pristine-tar;
>> that would be possible in principle.
>
> (risking doing design on debian-vote, but it's a bit late for that)
>
> It's been my impression [citation needed] that pristine-tar/lfs still
> exists mainly out of inertia and simple tooling around it that makes it
> more of a why not. If we're gaining a mostly git-native upload workflow
> out of this, I think it would be wise to second-guess if this support is
> even needed in tag2upload.
>
> You're already using the archive to obtain the orig.tar where available,
> which neuters one of pristine-tar's purposes: to get everything needed
> to build past releases from just a git clone [1]. New upstream versions
> *for likely users of tag2upload*, I believe the git-archive generated
> tarball would be a sufficient incidental artifact to be uploaded -
> making tag2upload the authoritative one-off source instead of
> (presumably) upstream's forge generator.

What I think is missing is for tag2upload to be able to use and/or
verify upstream's PGP signed git-archive tarball.  The git archive
format is known to not be stable nor reproducible over time, and there
are upstream who PGP sign the the git-archive tarball.

I'm still a supporter of tag2upload on social grounds, but on technical
and security grounds there are several things that leaves me unimpressed
- but we are good at improving technical things over time.  FWIW, I
found Didier's "debconf22-94-lightning-talks.webm" talk to offer a
better approach, which is more consistent with reproducible artifacts:

https://meetings-archive.debian.net/pub/debian-meetings/2022/DebConf22/

As far as I can tell, tag2upload will make reproducible source artifacts
harder to achieve (git-archive is run as a SaaS, and may not match what
upstream publish) and verify (any PGP signatures from upstream on the
git-archive is thrown away), but in Didier's approach both properties
seems native and built in from the start.

/Simon

Attachment: signature.asc
Description: PGP signature

Reply via email to