Bug#466342: ITP: gmyth -- library for accessing MythTV backends

2008-02-17 Thread Mario Limonciello
Package: wnpp
Severity: wishlist
Owner: Mario Limonciello <[EMAIL PROTECTED]>


* Package name: gmyth
  Version : 0.7.0
  Upstream Author : 
 Alexsandro Jose Virginio dos Santos <[EMAIL PROTECTED]>
 Hallyson Luiz de Morais Melo <[EMAIL PROTECTED]>
 Leonardo Sobral Cunha <[EMAIL PROTECTED]>
 Rosfran Lins Borges <[EMAIL PROTECTED]>
* URL : http://gmyth.sourceforge.net/
* License : GPL
  Programming Lang: C
  Description : library for accessing MythTV backends

 A library intended to access mythtv backend functionalities
 Gmyth accesses MythTV backend functionalities from a glib/gobject perspective.
 It includes access to the program guide, recorded programs, scheduling, etc.

-- System Information:
Debian Release: lenny/sid
  APT prefers hardy-updates
  APT policy: (500, 'hardy-updates'), (500, 'hardy-security'), (500, 
'hardy-proposed'), (500, 'hardy-backports'), (500, 'hardy')
Architecture: i386 (i686)

Kernel: Linux 2.6.24-8-generic (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#466400: ITP: libnet-upnp-perl -- Perl extensions for UPnP

2008-02-18 Thread Mario Limonciello
Package: wnpp
Severity: wishlist
Owner: Mario Limonciello <[EMAIL PROTECTED]>


* Package name: libnet-upnp-perl
  Version : 1.2.1
  Upstream Author : Satoshi Konno <[EMAIL PROTECTED]>
* URL : skonno/Net-UPnP-1.2.1/
* License : Written by owner
  Programming Lang: Perl
  Description : Perl extensions for UPnP

 Net::UPnP provides support for applications that contact other
 devices via UPnP protocols.

-- System Information:
Debian Release: lenny/sid
  APT prefers hardy-updates
  APT policy: (500, 'hardy-updates'), (500, 'hardy-security'), (500, 
'hardy-proposed'), (500, 'hardy-backports'), (500, 'hardy')
Architecture: i386 (i686)

Kernel: Linux 2.6.24-8-generic (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#467368: ITP: gmyth-upnp -- The GObject based library for using a UPnP MythTV backend

2008-02-24 Thread Mario Limonciello
Package: wnpp
Severity: wishlist
Owner: Mario Limonciello <[EMAIL PROTECTED]>


* Package name: gmyth-upnp
  Version : 0.7
  Upstream Author : Alexsandro Jose Virginio dos Santos <[EMAIL PROTECTED]>
Hallyson Luiz de Morais Melo <[EMAIL PROTECTED]>
Leonardo Sobral Cunha <[EMAIL PROTECTED]>
Rosfran Lins Borges <[EMAIL PROTECTED]>
* URL : http://gmyth.sourceforge.net
* License : GPL,
  Programming Lang: C
  Description : The GObject based library for using a UPnP MythTV backend

 GMyth-UPnP is a library intended to access MythTV backend functionalities
 from a GLib/GObject perspective via UPnP. It includes access to the program 
 guide, recorded programs, scheduling, etc.

-- System Information:
Debian Release: lenny/sid
  APT prefers hardy-updates
  APT policy: (500, 'hardy-updates'), (500, 'hardy-security'), (500, 
'hardy-proposed'), (500, 'hardy-backports'), (500, 'hardy')
Architecture: i386 (i686)

Kernel: Linux 2.6.24-8-generic (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: RFC: DKMS - Dynamic Kernel Module Support

2008-09-11 Thread Mario Limonciello


David Paleino wrote:
> Sure, but I believe Mario intended "trasparently adding modules" -- i.e.
> modules you forgot to update&install would automatically be handled by DKMS on
> boot. Mario, am I wrong?
>   
Correct, the service will simply compile the modules for you.  
rmmod/modprobe/udev control of the modules is outside the scope of what
it handles. 
>
> I believe this is a bug in the zaptel init scripts... shouldn't they check
> whether they can be unloaded? Is there a --force option? But this is another
> story :)
>
>   
For the case that was mentioned for asterisk holding zaptel devices 
open, that's not what DKMS is here to solve.  DKMS is one step up the
chain producing the modules that are needed for Zaptel.
>
> Googling for "dkms zaptel" gives some results, but most for Mandriva. I 
> believe
> some effort should be made to make a "central repository" (like for
> autopackage, and for other similar "cross-vendor" projects) where to store
> "vanilla" tarballs. Mario, do you know of any "central source" currently
> available?
>   
The original plan for DKMS built modules was not to provide a central
repository for these modules.  They *should* all end up in the kernel in
the long term.  In cases that a vendor is providing a driver to be used
on a variety of distributions, they should be hosting it on their own
webspace generally.  Another usecase is putting it directly into
distributions that are most interesting to the vendor, but this is
significantly more work.  This is how a few drivers in Ubuntu are
handled at this point.
>   
>
> I'm sorry I haven't all that experience with DKMS to clearly confirm this.
> Mario, can you confirm?
>
>   
So if there were issues between the interaction of the Zaptel userspace
init script and DKMS producing the modules to be used, an upstart style
script will be needed so that Zaptel's userspace script doesn't get
launched unless DKMS is finished.

-- 
Mario Limonciello
*Dell | Linux Engineering*
[EMAIL PROTECTED]



signature.asc
Description: OpenPGP digital signature


Re: RFC: DKMS - Dynamic Kernel Module Support

2008-09-11 Thread Mario Limonciello
Hi Cohen:

Keep in mind, if there is a new kernel that gets installed, this will
build the driver for that kernel, but nothing will be activated until
you reboot.  That choice is your own.  Due to the kernel postinstall
service, you won't even need  to build the modules during the next boot
prior to the zaptel service starting.

Regards

Tzafrir Cohen wrote:
> On Thu, Sep 11, 2008 at 05:29:44PM +0200, David Paleino wrote:
>
>   
>
> Maybe it's possible (I'm not exactly sure. I think it's possible, at
> least in most cases). But do I want this? Do I want to shut down my PBX
> because of the Ubuntu kernel upgrade of the month?
>
> Which is why I never tried to add such an option to the init script, and
> why noone has asked for it.
>
>   

-- 
Mario Limonciello
*Dell | Linux Engineering*
[EMAIL PROTECTED]



signature.asc
Description: OpenPGP digital signature


Re: RFC: DKMS - Dynamic Kernel Module Support

2008-09-11 Thread Mario Limonciello
Hi David:

I'll add on the Ubuntu kernel team here to get some comments on this
postinstall hook functionality and it's origins.

Regards

David Paleino wrote:
> On Thu, 11 Sep 2008 10:00:38 +0200, David Paleino wrote:
>
>   
>> If you have AUTOINSTALL set to yes in a DKMS control file:
>>
>> 1) It includes a kernel postinstall hook. This means that, the moment kernel
>> headers get installed, your modules are automatically rebuilt.
>> 
>
> This is achieved through the installation of a script in:
>
> /etc/kernel/header_postinst.d/
> /etc/kernel/postinst.d/
> /etc/kernel/prerm.d/
>
> A quick search with apt-file didn't return any result.
> Is this approach supported by Debian? I remember grub updating itself when a
> new kernel is installed: is that a postinst by the kernel package itself?
>
> Kindly,
> David
>
>   

-- 
Mario Limonciello
*Dell | Linux Engineering*
[EMAIL PROTECTED]



signature.asc
Description: OpenPGP digital signature


Re: RFC: DKMS - Dynamic Kernel Module Support

2008-09-11 Thread Mario Limonciello
Hi Josselin:

As I understand, the dpkg maintainer (Michael Vogt) is implementing the
idea of package groups that have sticky dependencies.  This should mean
that when a package gets installed, it will need to register with the
package group.  When a kernel with a new ABI is available, it won't be
offered as an upgrade until all of the items in the package group are
available for the upgrade.

I've added him on to try to comment on this some more.

Josselin Mouette wrote:
> Le jeudi 11 septembre 2008 à 17:29 +0200, David Paleino a écrit :
>   
>
> This is definitely the correct way to build extra modules. This could
> mean:
>   * The end of the nightmare for users who need to rebuild their
> modules by hand every time the kernel ABI changes.
>   * More smoothness for testing migration of non-free modules, which
> could simply be shipped as source.
>
> Please go ahead in this direction.
>
> One of the issues I’m wondering about is: how do you ensure you always
> have the kernel headers for the installed kernels?
>
> Cheers,
>   

-- 
Mario Limonciello
*Dell | Linux Engineering*
[EMAIL PROTECTED]



signature.asc
Description: OpenPGP digital signature


Re: RFC: DKMS - Dynamic Kernel Module Support

2008-09-12 Thread Mario Limonciello


Tzafrir Cohen wrote:
> Upon initial inspection of the dkms script, it seems to generate
> deb packages whose name does not not include $KVERS . But I didn't test
> it.
>   
This is correct, because you don't want to have multiple DKMS packages
installed to support many versions of the kernel module.  The idea is
that if you were to ship a binary kernel module in the package, you
would be shipping the source with it.  When the user were to install
another kernel version, the source would be used to build a new binary
kernel module.

This will not, by far, be the first package to install manage that are
not contained within the package. You should see it just like the
byte-compilation of elisp or python modules: when a new
kernel/interpreter version is available, you need to compile/bytecompile
the drivers/modules that are handled by dkms/python-{central,support}.
The only thing that is different is that you need to ensure that the
headers are installed for each of the kernel images.

I would also much agree to install these files in a separate directory
tree from /lib/modules/2.6.xx-y-zzz, so that no confusion arises. /var
is not possible because it may not be mounted, but
think /lib/modules.dkms for example. This requires simple changes to
module-init-tools and initramfs-tools, but I think we can get something
working simply and correctly.



Earlier in this thread it was mentioned that since these compiled files
are not managed by dpkg, that perhaps they should be stored in /var. 
This is already the case, /var/lib/dkms is where everything is stored
at.  It's copied over to /lib/modules/... If there is a worry about
storing files in /lib/modules when they are copied, perhaps instead
making this action a symlink would be better?


-- 
Mario Limonciello
*Dell | Linux Engineering*
[EMAIL PROTECTED]



signature.asc
Description: OpenPGP digital signature


Bug#793446: ITP: fwupd -- Firmware update daemon

2015-07-23 Thread Mario Limonciello
Package: wnpp
Severity: wishlist
Owner: Mario Limonciello 

* Package name: fwupd
  Version : 0.1.4
  Upstream Author : Richard Hughes 
* URL : https://github.com/hughsie/fwupd
* License : GPL
  Programming Lang: C
  Description : Firmware update daemon

 fwupd is a daemon to allow session software to update device firmware. 
 You can either use a GUI software manager like GNOME Software to view and 
 apply updates, the command-line tool or the system D-Bus interface directly.
 Currently, firmware updates using the UEFI capsule format and for the 
 ColorHug are supported. More formats may be supported in the future.

Currently Daniel Jared Dominguez and I have been collaborating on packaging
for fwupd located at http://linux.dell.com/cgi-bin/cgit.cgi/debian/fwupd.git/

We are discussing assembling a packaging maintenance team for firmware related
packages such as fwupd, fwupdate, efivar, etc.

Upstream has not yet released the 0.1.4 release.  That is the first release that
should be put into Debian.  The 0.1.3 release doesn't yet properly support
UEFI capsules.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20150724055002.3479.1913.reportbug@supermario-XPS-13-9343



Bug#920777: ITP: libxmlb -- XML binary library

2019-01-28 Thread Mario Limonciello
Package: wnpp
Severity: wishlist
Owner: Mario Limonciello 

* Package name: libxmlb
  Version : 0.1.6
  Upstream Author : Richard Hughes 
* URL : https://github.com/hughsie/libxmlb
* License : LGPL2.1+
  Programming Lang: C
  Description : XML binary library

 The libxmlb library takes XML source, and
 converts it to a structured binary representation with a deduplicated string
 table -- where the strings have the NULs included.
 .
 This allows an application to mmap the binary XML file, do an XPath query and
 return some strings without actually parsing the entire document. This is all
 done using (almost) zero allocations and no actual copying of the binary data.

This package is used by newer versions of fwupd and gnome-software as a
mandatory
dependency.

It's intended to be maintained by the debian-efi team as part of supporting the
UEFI stack.



Bug#953565: ITP: libjcat -- JSON Catalog library

2020-03-10 Thread Mario Limonciello
Package: wnpp
Severity: wishlist
Owner: Mario Limonciello 

* Package name: libjcat
  Version : 0.1.0
  Upstream Author : Richard Hughes 
* URL : https://github.com/hughsie/libjcat
* License : LGPL 2.1+
  Programming Lang: C
  Description : JSON Catalog library

The libjcat library assembles checksum and metadata into a JSON based catalog.
This is used by other software to validate metadata.

This will be a dependency for fwupd in the future (1.4.0 release or newer).
It will be maintained by the debian-efi team which also maintains the rest of
the firmware updating stack for UEFI machines.

The packaging has already been started at https://salsa.debian.org/efi-
team/libjcat.  It will be uploaded when libjcat has it's first release.



Bug#855065: ITP: thunderbolt-software-user-space -- Thunderbolt daemon and userspace tools for thunderbolt NVM flashing

2017-02-13 Thread Mario Limonciello
Package: wnpp
Severity: wishlist
Owner: Mario Limonciello 

* Package name: thunderbolt-software-user-space
  Version : 2017.01.19
  Upstream Author : Intel Thunderbolt Linux Team 
* URL : https://github.com/01org/thunderbolt-software-user-
space.git
* License : BSD
  Programming Lang: C
  Description : Thunderbolt daemon and userspace tools for thunderbolt NVM
flashing

This daemon provides support for the Intel Thunderbolt daemon.
It provides support for peer-to-peer networks over Thunderbolt as well as the
ability to flash the Thunderbolt NVM in-band.

It will be used for the Thunderbolt plugin that is part of fwupd.
https://github.com/hughsie/fwupd/tree/master/plugins/thunderbolt

I'd like to maintain it as part of the UEFI team that already maintains fwupd,
fwupdate, and the rest of the UEFI tools stack.



Bug#820124: ITP: fwupdate-signed -- Linux Firmware Updater EFI signed binary

2016-04-05 Thread Mario Limonciello
Package: wnpp
Severity: wishlist
Owner: Mario Limonciello 

* Package name: fwupdate-signed
  Version : 1.11
  Upstream Author : Mario Limonciello 
* URL : https://launchpad.net/ubuntu/+source/fwupdate-signed
* License : (GPL-3+)
  Programming Lang: (Python)
  Description : Linux Firmware Updater EFI signed binary

This package will be maintained by debian-efi as a team.  That is the same team
that currently maintains the unsigned version of fwupdate.



Re: Change the expectation that emails should wrap at 80 characters

2025-03-02 Thread Mario Limonciello




On 3/2/25 12:27, Marc Haber wrote:

On Mon, Mar 03, 2025 at 01:39:11AM +0800, Blair Noctis wrote:

I installed mutt and tried to reply to that email,
and mutt showed me the Content-Transfer-Encoding: base64 source.
I'm not sure if that's what you saw.
If you saw the decoded text,
I copied it into vim and vim seems to wrap it just fine.


Thankfully you usually don't copy the message into vim, but you hit 
R)eply, L)ist Reply or reply A)ll and mutt fires up the Editor for you.



Would you kindly show me how it looked on your side?


In the Editor, the long lines show up as long lines, with the 
disadvantage that you either quote them not at all, or completely, or 
have to go through intra-line editing to just leave what you want to 
quote, and if it's a really long line vim will not show it at all 
instead of partially.


That is surely something that one could adapt to, but I'd hate having to.

Notes and Outlook have done incredible damage to E-Mail culture, 
introducing Top-Posting as the widely accepted (but totally inferior) 
way to have discussions in e-mail. Please let us consider using a method 
that doesn't make discussions harder.




The biggest problem with Outlook is that getting it to use plain text in 
any sane way is a lot of work.  It really messes up quoting.


So if you're conversing with someone who uses Outlook but hasn't 
reconfigured it top posting or changing text colors for HTML mail is the 
only "sane" way to tell who wrote what.


With how pervasive it is in the corporate world; it's going to be an 
uphill battle to change.


The "New Outlook" with Microsoft 365 is even worse.  I can't find a way 
to even *configure it* to do plain text and quoting sanely.


FWIW; I think that Thunderbird mostly gets things right when you send 
plain text email.  In the composing window you'll see where it does the 
wrapping for you at ~72-75 characters.


It defaults F=f, and when I looked at the source of what it was viewing, 
it was sent with the breaks on 72 for my test emails.  When you open an 
email the width automatically goes to match the width of your window. 
Seems like the best of both worlds to me.




Re: Reconsidering Debian’s Inclusion of Non-Free Firmware - A Call for Discussion

2025-03-07 Thread Mario Limonciello



On 3/7/25 12:42, Soren Stoutner wrote:

On Friday, March 7, 2025 11:33:53 AM MST Simon Josefsson wrote:

 > pan...@disroot.org writes:

 > > I urge Debian to rethink its decision to officially include non-free

 > > firmware and correct the social contract. Instead of making non-free

 > > firmware the default, Debian should ensure that users consciously

 > > choose to install it while being made aware of the implications.

 >

 > I agree and would personally come back to use Debian on some of my

 > laptops if there was a supported way to install Debian from official

 > installer images that did not promote non-free software by including

 > firmware on them.

 >

 > The recent AMD Microcode vulnerability is a good case-study on the

 > dangers of permitting non-free code to run on your CPU:

 >

 > https://bughunters.google.com/blog/5424842357473280/zen-and-the-art- 
of-microco


 > de-hacking

 >

 > There is no way for me as a user to audit that the Debian installer

 > images is not including vulnerable microcode, since source code for the

 > firmware is not available.



FTR there is a kernel patch that was introduced specifically because of 
this vulnerability.


https://git.kernel.org/torvalds/c/50cef76d5cb0e199cda19f026842560f6eedc4f7

The kernel patch separately verifies the sha256 of the microcode 
attempting to be loaded on an affected processor (both early or late) 
and rejects modified microcode.


If you are concerned with malware having tampered with the microcode 
before the kernel is loaded, there is a TPM2 PCR event log that the 
firmware records.  You can validate that the TPM2 PCR event log and the 
TPM2 PCR values match to ensure that you can trust it.


This is one of the checks that 'fwupdmgr security' will run and report 
if they don't match.


OpenPGP_0x2D192CA624770276.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1099862: ITP: passim -- A local caching server

2025-03-08 Thread Mario Limonciello
Package: wnpp
Severity: wishlist
Owner: Mario Limonciello 
X-Debbugs-Cc: debian-devel@lists.debian.org, supe...@gmail.com

* Package name: passim
  Version : 0.1.9
* URL : https://github.com/hughsie/passim
* License : LGPL2.1
  Programming Lang: C
  Description : A local caching server

Passim is used to cache small files (such as those from a CDN) to be able
to share with other clients on the local network that would otherwise be
downloading the same files.

I'm planning to maintain it in the debian-efi team as it is an optional
dependency for fwupd. Fwupd can use it to fetch files from the CDN and
then share them with other clients on the same local network.



Re: Change the expectation that emails should wrap at 80 characters

2025-03-13 Thread Mario Limonciello




   Mario Limonciello (hints of format=flowed support)


Thanks for the summary. I am of the camp of f=f.

At least with the MUA I'm using most of the time (Thunderbird) this is 
the default, and no one has complained to me directly about it for any 
email sent to the Kernel community or Debian community.


As it seems to be a polarizing discussion I do wonder if maybe it would 
make most sense to have a "proper" vote to determine which way the 
"silent majority" of developers actually lean?


OpenPGP_0x2D192CA624770276.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature


Re: Interesting learnings about Guix contributor dynamics that apply to Debian?

2025-05-23 Thread Mario Limonciello




On 5/23/25 11:59, Andrew M.A. Cater wrote:

On Fri, May 23, 2025 at 10:00:22AM -0400, Roberto C. Sánchez wrote:

On Fri, May 23, 2025 at 10:59:47AM +0200, Marc Haber wrote:

On Fri, 23 May 2025 08:57:36 +0100, "Jonathan Dowland"
 wrote:

On Thu May 22, 2025 at 4:56 PM BST, Ahmad Khalifa wrote:

It's alive, not sure if sponsored by Red Hat/Mozilla, but both use it
(and Kernel, KDE, the list goes on).


Red Hat have transitioned almost entirely to JIRA.


Thankfully that's not an option for us (not dfsg free).


But it could be an option. If Atlassian offered the Debian project free
(gratis) use of their platform (especially if they handle the
administration), why wouldn't we accept?


Three points:

Having used Jira - I think I'd rather stick hot needles in my eyes.
Atlassian are *EXTREMELY* unlikely to offer anyone gratis use of their software.
Do remember why we have Git to replace Bitkeeper - free gifts can get withdrawn.

Just my €0.02



If we're at that point of "considering" having a second system to the 
BTS (or to augment) what would be wrong with using Gitlab issues on Salsa?


I've done little research on the matter besides a quick search [1], but 
presumably the BTS software could be modified to build a bridge with the 
Gitlab issues?  Then perhaps maintainers for packages that want to opt 
in could set a flag to have the BTS forward everything from BTS to Salsa 
for their packages.


[1] https://docs.gitlab.com/administration/incoming_email/