Re: OpenSSL 1.1.0

2016-11-15 Thread Scott Leggett
On 2016-11-15.00:16, Adrian Bunk wrote:
> Bugs like "With Kurt's patch, apache2 crashes on startup with an invalid 
> free." 
> or #843988 will be a common sight on the list of RC bugs for several
> months in any scenario with OpenSSL 1.1 as default.
>
> ...
>
> 2. move the stretch release schedule by 6-12 months to have
>only OpenSSL 1.1 in stretch

So with OpenSSL 1.1 in stretch, the release schedule is going to move by
6-12 months regardless?

-- 
Regards,
Scott.


signature.asc
Description: Digital signature


Multipath (SAN disk) support broken in jessie

2016-11-15 Thread Allan Jacobsen
Hi

I am trying to set up a automatic PXE install of jessie on physical servers
connected to a SAN.
My problem is that multipath support seems to be very broken in jessie, and
after fixing the first problems, I am now stuck, as the install seems to
work but the server can not find its root filesystem after reboot.

The first problem is that the multipath udeb is broken as described in bug
#779579, the bug is closed, but the problem is actually not fixed, so I
have opened a new bugreport #843885 to see if we can get it fixed for real.
Maybe it is fixed, but the fix has not been ported to the netboot images.

The second problem is in the disk-detect udeb, which can not find the
multipath device that is found, the reason is a rename of mpath0-9 to
mpatha-z, there is a bug report for that #806713, and after that the
parted-multipath also needs to be patched for the same.

Now the rest of the install seems to work fine, but after reboot, the
server will not start, as it can not find its root, the problem may have to
do with the naming of partitions as in this bug report #827308, but does
that mean that I will have to give up on getting jessie to install on
multipath disks, and wait for stretch ?

Best regards
Allan Jacobsen


Re: OpenSSL 1.1.0

2016-11-15 Thread Jonas Smedegaard
Quoting Adrian Bunk (2016-11-14 23:16:14)
> On Mon, Nov 14, 2016 at 07:10:00PM +, Niels Thykier wrote:
>> Marco d'Itri:
>>> On Nov 14, Lisandro Damián Nicanor Pérez Meyer  wrote:
 And yes, I would step back and switch libssl-dev to provide 
 libssl1.0-dev and have libssl1.1-dev around for anyone who can 
 really do the switch.
>>> I would not: OpenSSL 1.0 does not support ChaCha20 so it would be a 
>>> very bad default for next year's release.
>>> Bad enough that I would have to use a different distribution for 
>>> some web servers.
[...]
> For Apache, the choices available are:
> 1. no ChaCha20 in Apache in stretch
> 2. move the stretch release schedule by 6-12 months to have
>only OpenSSL 1.1 in stretch
> 3. apply ChaCha20 patches to OpenSSL 1.0.2

4. use libapache2-mod-gnutls?

 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private



Re: OpenSSL 1.1.0

2016-11-15 Thread Bernd Zeimetz

On 2016-11-15 11:59, Jonas Smedegaard wrote:


4. use libapache2-mod-gnutls?


that might work for you, but its nothing the common debian user will
do.

--
 Bernd ZeimetzDebian GNU/Linux Developer
 http://bzed.dehttp://www.debian.org
 GPG Fingerprint: ECA1 E3F2 8E11 2432 D485  DD95 EB36 171A 6FF9 435F



Re: OpenSSL 1.1.0

2016-11-15 Thread Lisandro Damián Nicanor Pérez Meyer
On lunes, 14 de noviembre de 2016 16:51:04 ART Marco d'Itri wrote:
> On Nov 14, Lisandro Damián Nicanor Pérez Meyer  wrote:
> > And yes, I would step back and switch libssl-dev to provide libssl1.0-dev
> > and have libssl1.1-dev around for anyone who can really do the switch.
> I would not: OpenSSL 1.0 does not support ChaCha20 so it would be a very
> bad default for next year's release.
> Bad enough that I would have to use a different distribution for some
> web servers.

That's why I wrote:

  And if we **really** need to switch to libssl1.1 then we **really** need to
  delay the release by 6 months as a very minimum, maybe 1 year.

Yes, I also know that it sounds awful, but do we have another way out?

-- 
Ponga su mano en una estufa caliente por un minuto, y le parecerá como una
hora. Siéntese con una muchacha bonita por una hora, y le parecerá un minuto.
¡Eso es relatividad!.
 Albert Einstein (1879-1955)

Lisandro Damián Nicanor Pérez Meyer
http://perezmeyer.com.ar/
http://perezmeyer.blogspot.com/



signature.asc
Description: This is a digitally signed message part.


Re: OpenSSL 1.1.0

2016-11-15 Thread Lisandro Damián Nicanor Pérez Meyer
On lunes, 14 de noviembre de 2016 22:16:25 ART Jan Niehusmann wrote:
[snip] 
> (It's fine if packages which depend on libssl-dev get an RC-bug if they
> can't be compiled with OpenSSL 1.1. Packages which can't be ported
> should explicitly depend on libssl1.0-dev. That way we'll make progress
> towards a point where we can start a smooth transition.)

I *really* disagree with that. Swtiching libssl-dev to provide libssl1.1-dev 
means that some apps/libs will get automatically recompiled and some of them 
might even not FTBFS (because for example, they are ready to use 1.1).

That means we left the door open to crashes due to mixed libssl versions.

By letting libssl-dev provide libssl1.0 we do not open this door, and we let 
maintainers decide on a per-basis case.

-- 
You are the Doc, Doc!
  Marty McFly To Dr. Emmett Brown, Back to the Future III

Lisandro Damián Nicanor Pérez Meyer
http://perezmeyer.com.ar/
http://perezmeyer.blogspot.com/


signature.asc
Description: This is a digitally signed message part.


Re: OpenSSL 1.1.0

2016-11-15 Thread Bernd Zeimetz

On 2016-11-15 14:43, Lisandro Damián Nicanor Pérez Meyer wrote:

I *really* disagree with that. Swtiching libssl-dev to provide 
libssl1.1-dev
means that some apps/libs will get automatically recompiled and some of 
them

might even not FTBFS (because for example, they are ready to use 1.1).


If a 1.1.0 ready package ftbfs when libssl-dev points to 1.0 it is a bug 
that
should be fixed anyway. There is no real reason not to support both 
versions.



That means we left the door open to crashes due to mixed libssl 
versions.


By letting libssl-dev provide libssl1.0 we do not open this door, and 
we let

maintainers decide on a per-basis case.


And we have to maintain two openssl versions trough the release cycle.



--
 Bernd ZeimetzDebian GNU/Linux Developer
 http://bzed.dehttp://www.debian.org
 GPG Fingerprint: ECA1 E3F2 8E11 2432 D485  DD95 EB36 171A 6FF9 435F



Re: OpenSSL 1.1.0

2016-11-15 Thread Lisandro Damián Nicanor Pérez Meyer
On martes, 15 de noviembre de 2016 14:52:15 ART Bernd Zeimetz wrote:
> On 2016-11-15 14:43, Lisandro Damián Nicanor Pérez Meyer wrote:
> > I *really* disagree with that. Swtiching libssl-dev to provide
> > libssl1.1-dev
> > means that some apps/libs will get automatically recompiled and some of
> > them
> > might even not FTBFS (because for example, they are ready to use 1.1).
> 
> If a 1.1.0 ready package ftbfs when libssl-dev points to 1.0 it is a bug
> that
> should be fixed anyway. There is no real reason not to support both
> versions.

A bug which, IMO, should not be RC right now, but switching libssl-dev to 
provide libssl1.1 *now* will probably hide crashes in the case I described 
above.

So yes, I agree with you, I just don't agree this is the right time. Doing it 
as soon as the buster release cycle starts it's just fine.

> > That means we left the door open to crashes due to mixed libssl
> > versions.
> > 
> > By letting libssl-dev provide libssl1.0 we do not open this door, and
> > we let
> > maintainers decide on a per-basis case.
> 
> And we have to maintain two openssl versions trough the release cycle.

For stretch we will already have, except we delay the release by ~1 year. 
Which again, if it's deemed necessary, then we should consider it.

-- 
Una vez que hemos eliminado lo imposible, lo que queda, por improbable que
parezca, es la verdad.
  Sherlock Holmes

Lisandro Damián Nicanor Pérez Meyer
http://perezmeyer.com.ar/
http://perezmeyer.blogspot.com/


signature.asc
Description: This is a digitally signed message part.


Re: OpenSSL 1.1.0

2016-11-15 Thread Jan Niehusmann
On Tue, Nov 15, 2016 at 10:43:07AM -0300, Lisandro Damián Nicanor Pérez Meyer 
wrote:
> On lunes, 14 de noviembre de 2016 22:16:25 ART Jan Niehusmann wrote:
> [snip] 
> > (It's fine if packages which depend on libssl-dev get an RC-bug if they
> > can't be compiled with OpenSSL 1.1. Packages which can't be ported
> > should explicitly depend on libssl1.0-dev. That way we'll make progress
> > towards a point where we can start a smooth transition.)
> 
> I *really* disagree with that. Swtiching libssl-dev to provide libssl1.1-dev 
> means that some apps/libs will get automatically recompiled and some of them 
> might even not FTBFS (because for example, they are ready to use 1.1).
> 
> That means we left the door open to crashes due to mixed libssl versions.

I probably didn't state that clear enough: I don't think libssl-dev
should provide libssl1.1-dev.

But building packages - purely for testing purposes - against
libssl1.1-dev and reporting any issues is a good thing, and I even think
such bugs could be marked RC, to make sure we make progress.

At the same time, I don't want to remove packages which can't be ported
quickly. Therefore, either these bugs can't be RC, or there must be an
easy way for maintainers to opt out. One way of such an opt-out would be
changing the dependency to libssl1.0-dev.

However, the quoted paragraph was meant as a side-note only. It's not
important, at the moment.


The one thing we should decide *quickly* is if we want to revert
libssl-dev back to 1.0, or if we want to delay the freeze by several
months.

> By letting libssl-dev provide libssl1.0 we do not open this door, and we let 
> maintainers decide on a per-basis case.

Yes, and we avoid cases like with libcurl3, where the recompile to
libssl1.1 broke ABI compatibility of libcurl3 without notice.

Jan



Re: OpenSSL 1.1.0

2016-11-15 Thread Adrian Bunk
On Tue, Nov 15, 2016 at 09:37:01AM -0300, Lisandro Damián Nicanor Pérez Meyer 
wrote:
> On lunes, 14 de noviembre de 2016 16:51:04 ART Marco d'Itri wrote:
> > On Nov 14, Lisandro Damián Nicanor Pérez Meyer  wrote:
> > > And yes, I would step back and switch libssl-dev to provide libssl1.0-dev
> > > and have libssl1.1-dev around for anyone who can really do the switch.
> > I would not: OpenSSL 1.0 does not support ChaCha20 so it would be a very
> > bad default for next year's release.
> > Bad enough that I would have to use a different distribution for some
> > web servers.
> 
> That's why I wrote:
> 
>   And if we **really** need to switch to libssl1.1 then we **really** need to
>   delay the release by 6 months as a very minimum, maybe 1 year.
> 
> Yes, I also know that it sounds awful, but do we have another way out?

Yes, patching the OpenSSL 1.1 features that are really needed into the
Debian OpenSSL 1.0.2 package.

For ChaCha20 that's existing patches that are already being used
elsewhere.

cu
Adrian

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed



Re: OpenSSL 1.1.0

2016-11-15 Thread Adrian Bunk
On Tue, Nov 15, 2016 at 07:03:28PM +1100, Scott Leggett wrote:
> On 2016-11-15.00:16, Adrian Bunk wrote:
> > Bugs like "With Kurt's patch, apache2 crashes on startup with an invalid 
> > free." 
> > or #843988 will be a common sight on the list of RC bugs for several
> > months in any scenario with OpenSSL 1.1 as default.
> >
> > ...
> >
> > 2. move the stretch release schedule by 6-12 months to have
> >only OpenSSL 1.1 in stretch
> 
> So with OpenSSL 1.1 in stretch, the release schedule is going to move by
> 6-12 months regardless?

Shipping OpenSSL 1.1 as security-supported technology preview in stretch,
and a few packages that both work with OpenSSL 1.1 and do not have 
inter(r)dependencies with packages that don't work properly with OpenSSL 
1.1 could use it - that would be possible without negative impact on the 
release schedule.

> Regards,
> Scott.

cu
Adrian

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed



Bug#844424: ITP: ruby-airbrussh -- Airbrussh pretties up your SSHKit and Capistrano output

2016-11-15 Thread micah
Package: wnpp
Severity: wishlist
Owner: Micah Anderson 

* Package name: ruby-airbrussh
  Version : 1.1.1
  Upstream Author : Matt Brictson 
* URL : https://github.com/mattbrictson/airbrussh
* License : MIT
  Programming Lang: Ruby
  Description : Airbrussh pretties up your SSHKit and Capistrano output

Airbrush is a replacement log formatter for SSHKit that makes Capistrano output 
much easier on the eyes. It Provides concise, useful log output that is easy to 
read.

This package is a new dependency for capistrano, it will be maintained inside 
the pkg-ruby-extras team.



Re: OpenSSL 1.1.0

2016-11-15 Thread Ian Jackson
Lots of people have posted in this thread that they see problems with
our current approach to the openssl transition.

Do the openssl maintainers have an response ?

Thanks,
Ian.

-- 
Ian JacksonThese opinions are my own.

If I emailed you from an address @fyvzl.net or @evade.org.uk, that is
a private address which bypasses my fierce spamfilter.



Re: libc recently more aggressive about pthread locks in stable ?

2016-11-15 Thread Adrian Bunk
On Mon, Nov 14, 2016 at 10:31:18AM +0100, Gert Wollny wrote:
> Am Sonntag, den 06.11.2016, 01:12 -0200 schrieb Henrique de Moraes
> Holschuh:
> > 
> > 
> > 
> > Unfortunately, when hardware lock elision support was added to glibc
> > upstream, libpthreads was *not* changed to properly assert() this
> > forbidden condition on the non-hardware-elision codepaths.  Such an
> > assert() would have given us consistent behavior, thus flushing the
> > bugs out in the open... at the cost of a performance hit (I have no
> > idea how severe), and much screaming.
> 
> An alternative to find problems with (un-)locking should be to compile
> the program in question with -fsanitize=thread (on amd64) and run it.
> 
> Unfortunately, in current unstable with thread sanitizer one might get
> #796246 (at least I had this).

Does "-fsanitize=thread -no-pie" work for you?

> Best, 
> Gert 

cu
Adrian

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed



Re: OpenSSL 1.1.0 / transition process

2016-11-15 Thread Daniel Pocock
On 15/11/16 16:54, Ian Jackson wrote:
> Lots of people have posted in this thread that they see problems with
> our current approach to the openssl transition.
>
> Do the openssl maintainers have an response ?

I just started looking at this thread 2 minutes ago.  I really don't
know where to start.

Would the OpenSSL maintainers and/or release managers consider making a
wiki page about the transition with the most common questions about it,
similar to the upstream wiki but with a Debian focus?

The questions which come to my mind (and may already be answered):

- will it definitely go ahead for stretch?

- will the stretch freeze and release dates be delayed to allow people
to catch up?

- is it expected that package maintainers spend time patching for this,
or we can wait for upstreams to support it?

- given the huge number of packages listed on the transition page, I
couldn't help feeling that it would be useful to be able to get some
reports about how many packages have now had a bug forwarded upstream,
how many upstreams have released a newer version with the fix, how many
upstreams have a fix that is not released, etc

Wearing my upstream hat, I do hope to ensure my own packages support it
sooner rather than later.  Some of them will go into NEW though because
they have ABI or API version numbers in the binary package names, so
they won't be available immediately.

Regards,

Daniel



Re: DEP14 policy for two dots

2016-11-15 Thread Robie Basak
FTR, I answered most questions about "why not dgit?" in the thread I
just moved to vcs-pkg-discuss only[1].

For some specific questions here:

On Thu, Nov 10, 2016 at 12:31:31AM +, Ian Jackson wrote:
> dgit can work on Ubuntu too, in a readonly mode.  (It would be nice to
> make `dgit push' work on Ubuntu but that requires a suitable git
> server, and some configration on the dgit client side.)

A key difference with our system is that no infrastructure is required.
It's distributed (-able), with no special git remote.

> The --skip-patches is a vital difference.
> Has the decision to use --skip-patches been definitively taken ?

For now, to fulfill our use case, yes. In the general case, no, not at
all. Probably the best place to enter into this would be in a reply to
my fuller explanation of the reasons in [1].

> I would like to beg you to reconsider this, in the strongest possible
> terms.  --skip-patches generates a patches-unapplied tree.
> 
> A patches-unapplied tree:

Sorry, I missed reference to this list when I wrote [1]. I'll study
these and consider how they related to my reasons later.

> If you are making patches-unapplied trees I think you cannot possibly
> be representing the quilt patch stack of a `3.0 (quilt)' source
> package as a series of git commits.

Correct. This has not been our goal.

> Representing a `3.0 (quilt)' package that way is desirable, as it
> means that `git blame' and `git log' can be used to see which patches
> do what.

In contrast, in our Ubuntu development workflow, what you mention is not
a requirement, but what is a requirement is to use "git blame" and "git
log" to see when the quilt patches applied were altered. We don't want
to drill down as far as you are suggesting; instead, we want the
information at one level removed.

Robie


signature.asc
Description: PGP signature


Bug#844436: ITP: obsub -- Python module that implements the observer pattern via a decorator

2016-11-15 Thread Free Ekanayaka
Package: wnpp
Severity: wishlist
Owner: Free Ekanayaka 

* Package name: obsub
  Version : 0.2.0
  Upstream Author : Eduard Bopp 
* URL : https://github.com/aepsil0n/obsub
* License : CC0
  Programming Lang: Python
  Description : Python module that implements the observer pattern via a 
decorator

This module can decorate functions or modules so they become "observable". 
Consuming
code can subscribe callbacks to these decorated callables, which will be 
triggered
everytime the callables are invoked.



Multipath (SAN disk) support broken in jessie

2016-11-15 Thread Allan Jacobsen
Hi

I am trying to set up a automatic PXE install of jessie on physical servers 
connected to a SAN.
My problem is that multipath support seems to be very broken in jessie, and 
after fixing the first problems, I am now stuck, as the install seems to work 
but the server can not
find its root filesystem after reboot.

The first problem is that the multipath udeb is broken as described in bug 
#779579, the bug is closed, but the problem is actually not fixed, so I have 
opened a new bugreport
#843885 to see if we can get it fixed for real. Maybe it is fixed, but the fix 
has not been ported to the netboot images.

The second problem is in the disk-detect udeb, which can not find the multipath 
device that is found, the reason is a rename of mpath0-9 to mpatha-z, there is 
a bug report for that
#806713, and after that the parted-multipath also needs to be patched for the 
same.

Now the rest of the install seems to work fine, but after reboot, the server 
will not start, as it can not find its root, the problem may have to do with 
the naming of partitions
as in this bug report #827308, but does that mean that I will have to give up 
on getting jessie to install on multipath disks, and wait for stretch ?

Best regards
Allan Jacobsen



Re: Multipath (SAN disk) support broken in jessie

2016-11-15 Thread Florian Lohoff
Hi,

On Tue, Nov 15, 2016 at 08:49:15AM +0100, Allan Jacobsen wrote:
> that mean that I will have to give up on getting jessie to install on
> multipath disks, and wait for stretch ?

From >10 Years of experience with installer issues: Yes

Once the release is out my experience is that those niche bugs 
will not get any attention or fixing. So you better work around
those bugs ... The installer is scriptable and i have tons
of classes working around bugs in the last releases.

You better start testing Stretch NOW and report bugs ASAP.

Flo
-- 
Florian Lohoff f...@zz.de
 UTF-8 Test: The 🐈 ran after a 🐁, but the 🐁 ran away


signature.asc
Description: Digital signature


Re: DEP14 policy for two dots

2016-11-15 Thread Michael Hudson-Doyle
Robie forgot this bit (I think):

[1]
http://lists.alioth.debian.org/pipermail/vcs-pkg-discuss/2016-November/000909.html

Cheers,
mwh

On 16 November 2016 at 05:38, Robie Basak  wrote:

> FTR, I answered most questions about "why not dgit?" in the thread I
> just moved to vcs-pkg-discuss only[1].
>
> For some specific questions here:
>
> On Thu, Nov 10, 2016 at 12:31:31AM +, Ian Jackson wrote:
> > dgit can work on Ubuntu too, in a readonly mode.  (It would be nice to
> > make `dgit push' work on Ubuntu but that requires a suitable git
> > server, and some configration on the dgit client side.)
>
> A key difference with our system is that no infrastructure is required.
> It's distributed (-able), with no special git remote.
>
> > The --skip-patches is a vital difference.
> > Has the decision to use --skip-patches been definitively taken ?
>
> For now, to fulfill our use case, yes. In the general case, no, not at
> all. Probably the best place to enter into this would be in a reply to
> my fuller explanation of the reasons in [1].
>
> > I would like to beg you to reconsider this, in the strongest possible
> > terms.  --skip-patches generates a patches-unapplied tree.
> >
> > A patches-unapplied tree:
>
> Sorry, I missed reference to this list when I wrote [1]. I'll study
> these and consider how they related to my reasons later.
>
> > If you are making patches-unapplied trees I think you cannot possibly
> > be representing the quilt patch stack of a `3.0 (quilt)' source
> > package as a series of git commits.
>
> Correct. This has not been our goal.
>
> > Representing a `3.0 (quilt)' package that way is desirable, as it
> > means that `git blame' and `git log' can be used to see which patches
> > do what.
>
> In contrast, in our Ubuntu development workflow, what you mention is not
> a requirement, but what is a requirement is to use "git blame" and "git
> log" to see when the quilt patches applied were altered. We don't want
> to drill down as far as you are suggesting; instead, we want the
> information at one level removed.
>
> Robie
>


Re: OpenSSL 1.1.0 / transition process

2016-11-15 Thread Sebastian Andrzej Siewior
On 2016-11-15 17:42:59 [+0100], Daniel Pocock wrote:
> Would the OpenSSL maintainers and/or release managers consider making a
> wiki page about the transition with the most common questions about it,
> similar to the upstream wiki but with a Debian focus?

I started one at
https://wiki.debian.org/OpenSSL-1.1

> The questions which come to my mind (and may already be answered):
> 
> - will it definitely go ahead for stretch?
> 
> - will the stretch freeze and release dates be delayed to allow people
> to catch up?
> 
> - is it expected that package maintainers spend time patching for this,
> or we can wait for upstreams to support it?

I can't answer those. I just copied them into the Wiki hoping someone
will.

> - given the huge number of packages listed on the transition page, I
> couldn't help feeling that it would be useful to be able to get some
> reports about how many packages have now had a bug forwarded upstream,
> how many upstreams have released a newer version with the fix, how many
> upstreams have a fix that is not released, etc

I added to the wiki a few links:
- my ben page. Similar to release team's page but it shows which package
  moved to 1.0 and which more towards 1.1. (updated ~17.15 UTC).

- BTS user tags bugs. All bugs reported by Kurt and myself were user
  tagged.

> Regards,
> 
> Daniel

Sebastian



Re: OpenSSL 1.1.0

2016-11-15 Thread Sebastian Andrzej Siewior
On 2016-11-15 00:16:14 [+0200], Adrian Bunk wrote:
> And since 80% of all OpenSSL-using packages in unstable are still
> using libssl1.0.2 (binNMUs have not yet happened), all runtime
> issues observed so far are only the tip of the iceberg.
> Bugs like "With Kurt's patch, apache2 crashes on startup with an invalid 
> free." 
> or #843988 will be a common sight on the list of RC bugs for several
> months in any scenario with OpenSSL 1.1 as default.
Are you afraid of bugs or that nobody will look after them? Can't speak
for apache but #843988 got patched and so did #843532.

Sebastian



Re: OpenSSL 1.1.0 / transition process

2016-11-15 Thread Jonas Smedegaard
Quoting Sebastian Andrzej Siewior (2016-11-16 00:01:06)
> On 2016-11-15 17:42:59 [+0100], Daniel Pocock wrote:
> > Would the OpenSSL maintainers and/or release managers consider 
> > making a wiki page about the transition with the most common 
> > questions about it, similar to the upstream wiki but with a Debian 
> > focus?
> 
> I started one at
> https://wiki.debian.org/OpenSSL-1.1

Great!


> > The questions which come to my mind (and may already be answered):
> > 
> > - will it definitely go ahead for stretch?
> > 
> > - will the stretch freeze and release dates be delayed to allow 
> > people to catch up?
> > 
> > - is it expected that package maintainers spend time patching for 
> > this, or we can wait for upstreams to support it?
[...]
> - BTS user tags bugs. All bugs reported by Kurt and myself were user
>   tagged.

 - will those user-tagged bugs properly track all related issues too?

As an example, Bug#828590 for uwsgi is currently being addressed.  When 
I can hopefully upload that package tomorrow, the package evidently no 
longer fails to build from source and the FTBFS bug can therefore be 
closed.  But at the same time other bugs - less severe, but directly 
caused by the conflicting libssl libraries - will emerge¹.  I can try to 
treat such collateral issues as related - e.g. by cloning and adapting, 
and/or by keeping open the original bug and renaming it, and maybe by 
user-tagging (if someone documents what tagging is suitable - I sure 
don't want to make things worse by sloppy bug tagging).  But it seems to 
me that there is a real risk that some of the bugs tracked in above wiki 
page may miss out on some similar collateral problems in other packages.

 - Jonas

¹ uwsgi build-depends not only on libssl-dev, but also libapache-dev, 
php-dev and libcurl4-openssl-dev now linking against conflicting 
libssl*-dev packages.

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private



Bug#844469: ITP: golang-github-jessevdk-go-flags -- go command line option parser

2016-11-15 Thread Potter, Tim (HPE Linux Support)
Package: wnpp
Severity: wishlist
Owner: Tim Potter 
X-Debbugs-CC: debian-devel@lists.debian.org, 
pkg-go-maintain...@lists.alioth.debian.org

* Package name: golang-github-jessevdk-go-flags
  Version : 1+git20161025.376.0648c82-1
  Upstream Author : Jesse van den Kieboom
* URL : https://github.com/jessevdk/go-flags
* License : BSD-3-clause
  Programming Lang: Go
  Description : Go library for parsing command line arguments

This library provides similar functionality to the builtin flag library
of Go, but provides much more functionality and nicer formatting.

The library uses structs, reflection and struct field tags to allow
users to specify command line options. This results in very simple and
concise specification of your application options.



signature.asc
Description: Message signed with OpenPGP using GPGMail


Bug#844468: ITP: golang-github-jmoiron-sqlx -- General purpose extensions to golang's database/sql

2016-11-15 Thread Potter, Tim (HPE Linux Support)
X-Debbugs-CC: debian-devel@lists.debian.org, 
pkg-go-maintain...@lists.alioth.debian.org
Package: wnpp
Severity: wishlist
Owner: Tim Potter 

* Package name: golang-github-jmoiron-sqlx
  Version : sqlx-v1.1+git20160206.61.398dd58-1
  Upstream Author : Jason Moiron
* URL : https://github.com/jmoiron/sqlx
* License : Expat
  Programming Lang: Go
  Description : General purpose extensions to Golang's database/sql library

sqlx is a library which provides a set of extensions on Go's standard
database/sql library. The sqlx versions of sql.DB, sql.TX, sql.Stmt,
et al. all leave the underlying interfaces untouched, so that their
interfaces are a superset on the standard ones.  This makes it relatively
painless to integrate existing codebases using database/sql with sqlx.

Major additional concepts are:

  * Marshal rows into structs (with embedded struct support), maps, and slices
  * Named parameter support including prepared statements
  * Get and Select to go quickly from query to struct/slice



signature.asc
Description: Message signed with OpenPGP using GPGMail


Bug#844471: ITP: pdfkit -- Python wrapper for wkhtmltopdf to convert HTML to PDF using Webkit

2016-11-15 Thread Scott Kitterman
Package: wnpp
Severity: wishlist
Owner: Scott Kitterman 

* Package name: pdfkit
  Version : 0.5.0
  Upstream Author : Golovanov Stanislav 
* URL : https://github.com/JazzCore/python-pdfkit
* License : MIT/Expat
  Programming Lang: Python
  Description : Python wrapper for wkhtmltopdf to convert HTML to PDF using 
Webkit

 Python 2 and 3 wrapper for wkhtmltopdf utility to convert HTML to PDF using
 Webkit.
 .
 Wkhtmltopdf conversion and all wkhtmltopdf options are available in Python
 from this module

I intend to maintain this within the Debian Python Modules Team.



Bug#844472: ITP: golang-github-kisom-goutils -- Various TLS certificate and other utility libraries for Golang

2016-11-15 Thread Potter, Tim (HPE Linux Support)
X-Debbugs-CC: debian-devel@lists.debian.org, 
pkg-go-maintain...@lists.alioth.debian.org
Package: wnpp
Severity: wishlist
Owner: Tim Potter 

* Package name: golang-github-kisom-goutils
  Version : 0.0~git20161101.0.858c9cb-1
  Upstream Author : Kyle Isom
* URL : https://github.com/kisom/goutils
* License : Expat
  Programming Lang: Go
  Description : Various TLS certificate tools and other utility libraries 
for Golang

This package contains a collection of utility libraries for Golang, as well
as an assortment of tools mainly for displaying information about TLS
certificates and keys.



signature.asc
Description: Message signed with OpenPGP using GPGMail


Bug#844474: Subject: ITP: golang-github-geertjohan-go.rice -- Go package for embedding web resources into Go executables

2016-11-15 Thread Potter, Tim (HPE Linux Support)
X-Debbugs-CC: debian-devel@lists.debian.org, 
pkg-go-maintain...@lists.alioth.debian.org
Package: wnpp
Severity: wishlist
Owner: Tim Potter 

* Package name: golang-github-geertjohan-go.rice
  Version : 0.0~git20160123.0.0f3f5fd-1
  Upstream Author : Geert-Johan Riemer
* URL : https://github.com/GeertJohan/go.rice
* License : BSD-2-clause
  Programming Lang: Go
  Description : Go package for embedding web resources into Go executables

go.rice is a Golang package that makes working with resources such as
html, js, css, images and templates very easy. During development
go.rice will load required files directly from disk. Upon deployment
it is easy to add all resource files to a executable using the rice
tool, without changing the source code for your package. Several
methods are provided for adding resources to your binary by go.rice.



signature.asc
Description: Message signed with OpenPGP using GPGMail


Bug#844477: ITP: golang-github-cloudflare-redoctober -- Software-based two-man rule style encryption and decryption server

2016-11-15 Thread Potter, Tim (HPE Linux Support)
X-Debbugs-CC: debian-devel@lists.debian.org, 
pkg-go-maintain...@lists.alioth.debian.org
Package: wnpp
Severity: wishlist
Owner: Tim Potter 

* Package name: golang-github-cloudflare-redoctober
  Version : 0.0~git20161017.0.78e9720-1
  Upstream Author : Nicholas Sullivan
* URL : https://github.com/cloudflare/redoctober
* License : BSD-2-Clause
  Programming Lang: Go
  Description : Software-based two-man rule style encryption and decryption 
server

Red October is a software-based two-man rule style encryption and decryption 
server.
The two-man rule is a control mechanism designed to achieve a high level of 
security
by requiring the presence of two authorized people at all times. In the case of 
Red
October the two-man rule is implemented by encrypting data in such as way as to
require two authorised key-holds to decrypt it.



signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: OpenSSL 1.1.0 / transition process

2016-11-15 Thread Daniel Pocock


On 16/11/16 00:01, Sebastian Andrzej Siewior wrote:
> On 2016-11-15 17:42:59 [+0100], Daniel Pocock wrote:
>> Would the OpenSSL maintainers and/or release managers consider making a
>> wiki page about the transition with the most common questions about it,
>> similar to the upstream wiki but with a Debian focus?
> 
> I started one at
>   https://wiki.debian.org/OpenSSL-1.1
> 

Great, thanks for doing that, I dropped in a couple of additional
questions (testing upstream builds with travis-ci, testing on jessie)