Bug#567377: ITP: lal -- Lal is a clock for the dock. Nothing more, nothing less.

2010-01-28 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


* Package name: lal
  Version : 1.1
  Upstream Author : Dave Foster 
* URL : http://projects.l3ib.org/lal
* License : GPL
  Programming Lang: C
  Description : Lal is a clock for the dock. Nothing more, nothing less.

 Lal is a clock for the dock. Nothing more, nothing less. It is a very
 simple tool especially helpful for those that are using openbox. It
 can use various colors, sizes, formats, etc. It can accept any POSIX
 date format.
 .
 Window managers that are reported to work well with lal:
  - FVWM
  - OpenBox
  - Enlightenment
  - ion3


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkth3t0ACgkQ3y7Nst6YLGUwkQCgj4EjmTlVPMky0KhxY3xhfwAb
R+cAoJNGsrXYWov6i8Eh1MwMwQ3mkvUY
=p3mD
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#574913: ITP: lal -- dockable clock applet for various window managers

2010-03-21 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


* Package name: lal
  Version : 2.0-1
  Upstream Author : Mikael Magnusson 
  : Dave Foster 
  : Thayer Williams 
* URL : http://projects.l3ib.org/lal/
* License : GPL
  Programming Lang: C
  Description : dockable clock applet for various window managers

Description: dockable clock applet for various window managers
 Lal is a clock for the dock. Nothing more, nothing less. It is a very
 simple tool especially helpful for those that are using openbox. It
 can use various colors, sizes, formats, etc. It can accept any POSIX
 date format.


Note: Version 1.1 is currently sitting in the upload queue. I am hoping
to finish version 2.0 within a few months that will come with many new
features such as a calendar. One goal of the new version will be to check
through the code to see if this tiny file can be stripped down at all to
make it even more light weight.
I'm working with the upstream authors to bring this release which is why
I refer to anticipated features for this version.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkum0ZoACgkQ3y7Nst6YLGX9tACggPO7tHb1OCPmBCWu98sc0j+K
lDYAn0Klh5YnSuQg6K9M6MVp5chydLXg
=Y0kR
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20100322021039.1702.21480.report...@michael-desktop



Re: Bug#791857: ITP: daemonize -- tool to run a command as a daemon

2015-07-09 Thread Michael Lustfield
>>> > I can say that it does: start-stop-daemon misses some functionality you
>>> > need for programs that don't daemonise and log to stdout/stderr, which
>>> > is something I needed only last week. Having said that, I think that
>>> This looks like a job for systemd.
>>>
>>
>> Yes, all problems are just nails for that hammer!
>
> Systemd does starting/stopping and managing services very well.
> The tool you want to use in this case is systemd-run, which starts a
> transient service for the command you want to run in the background.
> Cheers,
> Matthias

Of course, we shouldn't expect everyone to use systemd-run because
that's locking into an init system which should quite obviously be
avoided.

It does seem like daemonize serves a very unique purpose where
start-stop-daemon is a bit overkill or cumbersome. It's obviously
something that would never be used in an init script where
start-stop-daemon is actually appropriate. However, I can see a few
situations where I would launch this from a script. Not only that...
but I can see myself rewriting some scripts to make use of this if it
were included in Debian.

Just my two cents.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/CAL4L7=AtLW0RfiM0-v0Y=bpwsa9om3ky0epo4d-_qwyptiz...@mail.gmail.com



Re: Bug#791857: ITP: daemonize -- tool to run a command as a daemon

2015-07-09 Thread Michael Lustfield
>> Of course, we shouldn't expect everyone to use systemd-run because
>> that's locking into an init system which should quite obviously be
>> avoided.
>
> That, again.
>
> The person who suggested using systemd merely pointed out that the task
> of turning a regular process into daemon is trivially solvable using
> systemd-run.  This kind of implies that if the OP uses systemd, they
> could just read the appropriate manual page and have their task solved.

When I read it, it came across a bit different from that. It sounded
like that was to be considered "the" approach instead of one option.
Related to a bit further down...

>> It does seem like daemonize serves a very unique purpose where
>> start-stop-daemon is a bit overkill or cumbersome. It's obviously
>> something that would never be used in an init script where
>> start-stop-daemon is actually appropriate. However, I can see a few
>> situations where I would launch this from a script. Not only that...
>> but I can see myself rewriting some scripts to make use of this if it
>> were included in Debian.
>
> Two points:
>
> * It seems you have missed a message in this thread mentioning the
>   `daemon` package which is in Debian (since ages) and is able to
>   daemonize a regular program.

You're right. I missed (spaced on) that note. Which helped contribute
to my feelings above. I guess my argument is invalid. I'm sorry for
the noise then!

> * Not to bash the maintainers of `start-stop-daemon` but this program
>   is sort of a hack as it can't do most of what's expected from a
>   daemonizer: it can't capture the standard output streams of the
>   child it spawns and redirect them to syslog, and it can't restart the
>   child when that dies.

It can be a pain in the bum, but does (mostly) work... I need to start
playing with daemon!


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/CAL4L7=d7dpzvsfixytjkkammqqgaqgwuma7a0axylkmhyx-...@mail.gmail.com



Re: please document why a package has been dropped from Testing/Bullseye

2021-05-10 Thread Michael Lustfield
On Sun, 9 May 2021 07:30:04 +0200
Harald Dunkel  wrote:

> Hi folks,
> 
> https://packages.debian.org/search?keywords=rsnapshot doesn't tell, so I 
> wonder
> what is the recommended way to find out why rsnapshot (or any other package)
> has been dropped from Testing?

I was wondering what the easiest and most sensible way would be to find/share
this information. My first thought was feeding something like
'aptitude search ~o' into a script that checks for RM bugs in the bug tracker.
It seems like it would be an easy enough trigger to write, but it would be
time-consuming to run and would add a fair bit of load to the bug tracker.

> rsnapshot is still in Sid. I found #986709, of course, but this information
> should be much easier to access.

I should have asked that the removal include sid. For personal things, I've
been fairly happy with restic+b2 as a replacement. For servers, 

-- 
Michael Lustfield



Re: automatic NEW processing [was Re: Need help with Multi-Arch in systemd]

2021-07-20 Thread Michael Lustfield
On Wed, 14 Jul 2021 18:48:24 +0200
Philipp Kern  wrote:

> On 14.07.21 13:47, Michael Biebl wrote:
> > Am 14.07.21 um 12:59 schrieb Simon McVittie:  
> I do recall that the FTP masters would've been generally open to have 
> such an auto-approver (but maybe I'm wrong), but that no-one stepped up 
> yet to code it up?

A few of us came up with some proof of concept designs/models, but we
ultimately dropped the effort when it became clear the team wasn't interested
in such tools. We considered continuing with a tool that would work for
individual users reviewing their own work, but there just wasn't enough
interest for that either.

I'd be happy to help resurrect (the personal-use version of) the project/effort
if there's any chance I won't be working on it by myself...



Re: General Resolution: Voting secrecy: First call for votes: corrected ballot

2022-03-15 Thread Michael Lustfield
YP/3ra2wGH/L5TWI2ohEkvFmg53/NAE33wmgjtjnbU
> tZkEQPWvCbeg6iJKgk7O4AAx9XgUu0HFRY+FQSN4lsC+SyaG53WQ9baDGia6jc4Y
> iHMgELdOPNC47yp4qC30AV6nBptjjJv2QyYq8gOej/I2hSf5YtpdnA7Q3lsymA9E
> +iPIcV1QO9IX0WU3+6Hu3PP7rKugJTsM1YjlrOzjHB3WAPyngw38drcIxBc/d7Uy
> 1FRD/l2I5SBvRPOEiZH/2hZXbeT1yQkphwTVpHfsBtkPxnv5ERILBWRVOW5lKcg4
> yyXASzkbngaIbfacgC0b17WfEvX+yeKWFAeEn2/A0uRrVkgjY1yT7kfFq8OFNqRc
> v9FW3PQDG6pFMKdtvzaI0PMujclXhtp29FzHqBGdLiOuJgn6qJ0IfUoKPtGR7J6o
> AiB7ojGH14wiXxWJA8cQpyxz1+6x3bCvxlDU+TW3qn1WNYDON+1USVpwOvUct8ru
> jn2a2OoFYxI2gun1ZPuqQdhHyTKuVhNJ5674NlmBVGG1YlQWQVxElEreMkqUdS17
> w8CjNEu+yCkl3dsQuZLdOrIcgEqSZt22i6HA5hldWD8JiJ46iMsEZIfYelqHBuDe
> J+OmT4PR0Q/klrwA3Jq06xEr/o2RvDzzvT39KW4QBOVZiQPwLV/8BIQ/TDqoIvoI
> NjoyiQIzBBABCgAdFiEE5eUlYN2RxVbdvaXQIGTFNkHCXl0FAmIs0yoACgkQIGTF
> NkHCXl2QpQ/8CHQeNMwzDqxu6mR9wrOuM37J5QoHX1wUbr5yXVqOXpVjPHLvbRWW
> OVf798x+jQ92NFUi1ANYn2nr9Fgtp0YNkpX3w8nd32j3SivtB1+TeoFXJbvtJbT+
> F3KI0X63FTFiuNLU3rcupO+b78jRO3awJnxw3eiWM6KGAraE146mqVIk5PBJFF0h
> RJkg+GK5SLZ0otRpNAquoN6HcX9ToLGc2HlDL8S4IWVqFKPh8R8Eb6RbKEjM4htj
> 2azL06CCHZlACrg3I68zO9bhRXdwbyOzbQ6M3jymvSqJl0fB9DTDAFzaG1LhF+00
> ghXqqJeAexQzcN5tZ0Xc4ZZfNFjvGBVmBoucHHO11L2CwNZPzH2DrLPuH6KzsmoE
> wq/XHiLAonqHIsc/YM32l98v+8Ro1LreyGqc1KYKvKnvlDg1C3KKK6ObcDsL02IL
> yw2Ksu4ZJLv73aqOjw/B04Qyf82JKVGkmVe7FwjjsZLDDrH1ZcZ03g2057Du0A/r
> 2bm6Y6+dmYyrjWfKmAVJRbPHttnt7T2OUJSg8oThBBe3FKTq5O1i5Vba+cjHP/QR
> YLZtumRi9JdACs6VI6KcJbf7rvTd6NcOp3NNjog5NgjAhuVjTQAi5364QAlYO2q/
> 7KA/UlciI2jyYOu5oirFeOGLCo98rqeoIi+tf7whXT6z+cqCvcv0L/+5Ag0EYizS
> 0wEQAMi+pNlhNpgmUW8NGNKowBbj1HjZnSMNCeuJl4J0pit6WzF6ulLY0uuA9rEu
> /EO46tGU2iHu1QzLTmtpj480mm9FPLiJAv8dooKRCyjdkR9hw33iCZSI/u8pKI1i
> +EbovJEVVvX2g5ci1cMQ7G8uRhC3GQ/63yBiWQ6OT+retorKFAnQY14S1i8r8eU1
> gEuTOJsUU/J8XylrMOSSfkU5NnyE9fZzB07+1e8mrsXlq9qQhntcdCQ46q7f87vw
> iG5gzdXhy7tYpNHUd9syZyQMTYxxq4gaU8B9cHX5RUFqvwTR9WqBrv8qMeWNzZbg
> IYnVCyS6f44lWtyopSUSw5aAOwYyYyIfIL9iym1rRJqReIUYA5fT5kSchbR9LUAI
> Pfo/mZII8uCqirD+l3cDn9syiuATW5ubnVlCGWLFdbtZkrPmwU7n38Q7YrZK59o7
> cHR1lQ5qwim5B0fF90Qo/nRgwOk4fWNxhlwMCdUoeHtoAZSmuDPK8oDp6SqVdxaW
> Qrsx2hnG6rKoclVMwTyEyNazcDaq9ZzMlIFRArw791J/lK3MtxnsXz3t2vonbEe1
> mvblJ8celOd3NwZU1JDtJxSrNXgI1YJxtyu53m3rlWE7G9/s7JrEpS1fbyDux+Uo
> dWc8LifnOD/AKKINNM0mJOyfcZa9wg1/rtyKMJ1zgHkZA25RABEBAAGJAiUEGAEI
> AA8FAmIs0tMCGwwFCQAbr4AACgkQiJt5aSvVtOONlBAAqbbaZ3+iVNxppqjxB3+Q
> /v/olcD2OHBT7qRG5Lflkg/NucjxfF/6OGcRk2dX4kRxefEBG1B2gLsbrUKXnPCP
> Z97ElV5OuMXOrWmYa8XYLLK3nee/b5wxAKQp60qhcD7qdmWigAnZXOLhZjeRsRym
> QsC2Zqs4vRFKKgZ+SftMRIZ1C9lLXeaWvyZm+szxUz6v82hpwVhHMirJCBa+DM/b
> WXwOnlEF7j/8M1noMzUJaYXXOYVHjJSCJkWV4vvlVwKp1MNKdbYwq7jKHZxdxBMB
> y9w4TReIlNYLgaGzo94rBA9MVF4OOniLjEHZKx303IOSFqZlnFtEAHZUGON6uVBC
> 40nISOGgLON2BKej8kRR+5u46m1x7mleeX0cUMLZGTvTNSfgedpCaGGcyWXRTJjh
> Nl/tEb6FJ5n2YAmNg7rx6EgGw7KcGzhLwcEIhess4zAjjOMYMXsG+xHe8jLMMA+v
> dl/h62M+KKWne7zTraPvruPfSNazi4dZ+OQSGd1IU7THIQeLzPQy3xmaGODCT2Rb
> rgG5a3UmG3beq8INyM32dTCPBdaylVEvHCFV7pLJQqV4rbsjI4y1Pj80Q1nKAWd6
> KaEdm9RLst8dlGr/yqF2eKW6Anrq0BnIk2P+1WUNT6kYw3uR54zEMJsEyHhGthHv
> rBx9Eic2hgSnl4hB+jxtJJ0=
> =anKA
> -END PGP PUBLIC KEY BLOCK-
> 


-- 
Michael Lustfield


pgp0Y_kvkV8z1.pgp
Description: OpenPGP digital signature


Re: General Resolution: Voting secrecy: First call for votes: corrected ballot

2022-03-15 Thread Michael Lustfield
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


> VOTING FORM
> 
> - - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=-
> 6acf7f89-3eb2-492c-8715-98ae65b5f9d2
> [4] Choice 1: Hide identities of Developers casting a particular vote
> [1] Choice 2: Hide identities of Developers casting a particular vote and 
> allow verification
> [3] Choice 3: Reaffirm public voting
> [2] Choice 4: None of the above
> - - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=-
> 
> --
> 
> BALLOT OPTIONS
> 
> 
> Choice 1: Hide identities of Developers casting a particular vote
> =
> 
> Rationale
> =
> 
> During the vote for GR_2021_002, several developers said they were
> uncomfortable voting because under the process at that time, their name
> and ballot ranking would be public.
> A number of participants in the discussion believe that we would get
> election results that more accurately reflect the will of the developers
> if we do not make the name associated with a particular vote on the
> tally sheet public.
> Several people believed that the ranked votes without names attached
> would still be valuable public information.
> 
> This proposal would treat all elections like DPL elections.
> At the same time it relaxes the requirement that the secretary must
> conduct a vote via email.  If the requirement for email voting is
> removed, then an experiment is planned at least with the belenios voting
> system [1]. belenios may provide better voter secrecy and an easier
> web-based voting system than our current email approach.
> If this proposal passes, adopting such an alternative
> would require sufficient support in the project but would not require
> another constitutional amendment.
> 
> [1]: https://lists.debian.org/yhotrixtz3aip...@roeckx.be
> 
> This proposal increases our reliance on the secretary's existing power
> to decide how votes are conducted.  The lack of an override mechanism
> for secretary decisions about how we conduct votes has not been a
> problem so far.  However, if we are going to rely on this power to
> consider questions like whether the project has sufficient consensus to
> adopt an alternate voting mechanism, we need an override mechanism.
> So, this proposal introduces such a mechanism.
> 
> Summary of Changes
> ==
> 
> 1) Do not make the identity of a voter casting a particular vote
> public.
> 
> 2) Do not require that votes be conducted by email.
> 
> 3) Clarify that the developers can replace the secretary at any time.
> 
> 4) Provide a procedure for overriding the decision of the project
> secretary or their delegate.  Overriding the decision of what super
> majority is required or overriding the determination of election
> outcome requires a 3:1 majority.  The chair of the technical committee
> decides who conducts such votes.
> 
> 6) Codify that our election system must permit independent verification
> of the outcome given the votes cast and must permit developers to
> confirm their vote is included in the votes cast.
> 
> General Resolution
> ==
> 
> The developers resolve to make the changes to the Debian Constitution
> embodied in git commit ed88a1e3c1fc367ee89620a73047d84a797c9a1d.
> As of February 23, 2022, this commit can be found at
> https://salsa.debian.org/hartmans/webwml/-/commit/ed88a1e3c1fc367ee89620a73047d84a797c9a1d
> 
> For convenience a word-diff of the changes is included below.  In case
> the diff differs from the commit, the commit governs.
> 
> @@ -179,9 +179,27 @@ earlier can overrule everyone listed later.
>   
> 
>   
> [-In case of-]{+Appoint+} a [-disagreement between-]{+new secretary.
> In the normal case ( §7.2) where+} the project
> leader and {+secretary agree on+} the [-incumbent-]{+next+} secretary,
> [-appoint a new secretary.-]{+this power of+}
> {+the developers is not used.+}
>   
>   {++}
> {+Override a decision of the project secretary or their+}
> {+delegate.+}
> 
> {+Overriding the determination of what super majority is required+}
> {+for a particular ballot option or overriding the determination of+}
> {+the outcome of an election requires the developers to agree by a+}
> {+3:1 majority.  The determination of the majority required to+}
> {+override a decision of the secretary is not subject to+}
> {+override.+}
> 
> {+The chair of the technical committee decides who acts as+}
> {+secretary for a general resolution to override a decision of the+}
> {+project secretary or their delegate. If the decision was not made+}
> {+by the chair of the technical committee, the committee chair may+}
> {+themselves act as secretary. The decision of who acts as secretary+}
> {+for such a general resolution is not subject to override.+}

Re: General Resolution: Voting secrecy: First call for votes: corrected ballot

2022-03-15 Thread Michael Lustfield
Eh, I obviously forgot to fix up the reply-to bit. Sorry for the noise.
-- 
Michael Lustfield



Re: Bits from the DPL (August 2019)

2019-10-01 Thread Michael Lustfield
On Tue, 1 Oct 2019 14:32:10 +
Holger Levsen  wrote:

> On Tue, Oct 01, 2019 at 09:57:38AM -0400, Sam Hartman wrote:
> > I'd say it is a consensus of those who prioritize participating in this
> > discussion enough to do so, consented to by the rest of the project.  
> 
> I'm sorry, but I disagree. Silence is not always consent.

^ 100% agreed- silence does not mean consensus/consent

When it comes to things like forcing the use of Debian's Gitlab (& other
topics), I've remained silent because my disagreement was already voiced by
others, with more detailed reasoning than I would have provided.

Am I really expected to add a "me too" response every time I agree with what
someone else took the time to write... making it harder for people with limited
time to follow? This seems especially cruel to those that don't speak English
natively, and those that rely on translation services.

-- 
Michael Lustfield



Re: Idea: frontend tool for more efficient license reviewing based on tree-structured IR

2019-12-27 Thread Michael Lustfield
On Fri, 27 Dec 2019 01:56:07 +
Mo Zhou  wrote:

> [...]
> My idea
> ---
> 
> ## Motivations

I've had similar motivations. Since becoming a Trainee, I've found the review
process to be rather painful. I think the slow and klunky tools we use are a
big problem and likely contribute significantly to the burnout this team sees.

> ## Core

It sounds like we have similar ideas--a bit of automated review, and more
convenient manual review.

> How to proceed
> --
> 
> * a group of interested contributors.
> 
> * GSoC / Outreachy sounds good.
> 
> Several months ago I've already started a python script based on this idea.
> I'm struggling with UI programming (I'm really not good in this area).
> Specifically, when I found myself stuck at adding custom keybinding under the
> urwid framework, I postponed the idea indefinitely.
> 
> [1] -project: "Do we still value contributions?"
> [2] -project: "possibly exhausted ftp-masters"
> 

I started a similar effort when I first became a trainee. Unfortunately, a lot
of our non-trainees seem to be burned out, which means no reviews, and no
reviews means a lack of confidence in whatever system I'm building.

I can handle basic UI design and know a couple people that are very good at it.
I'm also able to host some infrastructure for what I have in mind. Can you
share the source you've been working on? I'm currently turning my notes into
something a bit more intelligible.

-- 
Michael Lustfield



Re: Idea: frontend tool for more efficient license reviewing based on tree-structured IR

2020-01-03 Thread Michael Lustfield
On Sat, 28 Dec 2019 13:49:18 +
Mo Zhou  wrote:
> On Fri, Dec 27, 2019 at 04:00:33PM -0600, Michael Lustfield wrote:
> > I started a similar effort when I first became a trainee. Unfortunately, a 
> > lot
> > of our non-trainees seem to be burned out, which means no reviews, and no
> > reviews means a lack of confidence in whatever system I'm building.  
> 
> Is it published somewhere?

Not really... What I have is more a specification than anything.
It's pretty long-winded, so I'll send it to you directly (and anyone else 
interested).

-- 
Michael Lustfield



Re: call for ftpmaster's transparency

2020-02-09 Thread Michael Lustfield
On Thu, 06 Feb 2020 10:32:42 +1100
Dmitry Smirnov  wrote:

> IMHO it is disturbing that one of the most essential processes in Debian
> -- acceptance of new and modified packages -- operates almost in secrecy.

This is an understandable perspective, but secrecy probably isn't the best word.

> To make matters worse ftp-masters rarely leave their comments in ITP
> issues. As I've recently learned that have profound effect on processing of
> new packages.

I personally think this sounds like a fantastic (and not very difficult) idea.

Where do you propose the bug mail be sent for NEW/binNEW packages without an
ITP?

> One of my packages spent a year in the NEW queue at some point raising to
> position number 4. Apparently before release of Buster (2019-07-06) member
> of ftp-masters team left an internal (invisible to the public) comment on
> my package that was not communicated to me until 7 months later when my
> package was rejected based on that comment. The comment could have been
> addressed without delay if it was left on the corresponding ITP issue where
> it belong.

I suspect when you say, "member of ftp-masters team," what you mean is
"FTP-Masters Trainee." FWIW- Trainees are not technically part of the team. We
get just enough access to be able to provide package reviews. Those reviews are
then either discussed with us or sent back in a rejection/prod message.

I agree that it could be valuable to see comments; however, they're almost
always going to be from Trainees. Since we're not technically part of the team,
it's important that we don't speak on behalf of the team. Publishing Trainee
comments would effectively be doing that.


> A precious time was lost but more importantly one can see that current
> process requires an extra effort to communicate with maintainers -- a
> something that would not be necessary if ftp-masters use the official
> channel that exist specifically to discuss introduction of new packages --
> ITP bug reports.
> [...]

I would personally *LOVE* to see ITPs be a requirement for *ALL* new packages.
Making it a requirement and expecting ftp-masters to ignore any upload until
the ITP has existed for at least X days would be absolutely fantastic. It would
fix some redundant library uploads (see golang/nodejs/etc.) and it would
provide a mandatory level of review by the wider community.

Back when I tried to get gitea packaged for main, I had a number of ITPs
commented/closed mentioning the alternate library name or a reason it can't be
packaged.

> I'd like Debian project leader to engage in the matter of improving
> transparency of ftp-masters team operations and procedures.

This feels a lot like starting a GR and not allowing appropriate discussion.
It's heavy-handed, isn't going to get anywhere, and is going to hurt feelings.

> As very minimum I recommend to change current ftp-master procedures to use
> ITP bugs instead of internal comments whenever possible, for the sake of
> transparency and to optimise communication.

I replied to this idea above.

> I want to encourage a public discussion regarding opening of the ftp-master
> mail list to the public. Currently reasons for unjustified secrecy of ftp-
> master processes is not explained...

It's often said that emotions don't play well with productive discussions.
Adding phrases such as "where it belong", using "secrecy" over "privacy",
calling it "unjustified", and immediately jumping to demands of the DPL are
accusatory and inflammatory, and will likely just get you ignored or start an
unproductive flame war.


I too would love to engage in a civil discussion about ways to improve the
situation. Let's start with this-

Why do reviews take so long?
- The team is tiny
- Much of the team seems very burned out
- The ones that are active tend to stick to source or "unloved" tasks
- There are some very large and/or messy packages that need review
- There are a lot of redundant tasks and frequently-made mistakes
  + A little more automation could help that
- (my opinion) The tools are archaic, cumbersome, and inefficient
  + Fixing this would be a very (non-technically) difficult task
  + An idea I have would help to bring transparency to the process...
^ it's missing an interest requirement :(

-- 
Michael Lustfield


pgpsLUD8ax93J.pgp
Description: OpenPGP digital signature


Re: FTP Team -- call for volunteers

2020-03-15 Thread Michael Lustfield
On Sun, 15 Mar 2020 05:10:21 +0100
Adam Borowski  wrote:

> On Sat, Mar 14, 2020 at 08:04:01PM -0400, Scott Kitterman wrote:
> > On Saturday, March 14, 2020 6:37:46 PM EDT Martin wrote:  
> > > On 2020-03-14 13:37, Sean Whitton wrote:  
> > > > (packages in NEW must not be downloaded from ftp-master.d.o to your
> > > > local machine)  
> > > Just curious: Why is that the case?  
> > Out of an abundance of caution.  Until after the package has been reviewed, 
> > there's no knowing if it's distributable and downloading a package from ftp-
> > master.d.o to another machine outside debian.org is a distrubution.  
> [...]
> This "abundance of caution" rule is utterly obsolete this millenium.  It
> made some sense when distributing software was done by snail-mailing a
> floppy or a stack of them.

My knee-jerk response is to agree. There is a lock which also applies to
reviewing a package. This means only one person can be looking at it at a time.
We often just open a github/gitlab/etc. page if multiple people need to discuss
the package (usually team member asking a trainee something). The content has
already been distributed. Why should this be any different from mentors.d.n,
where such practice is required?

The problem is that this server is *the* distribution point for the Debian
archive. This feels like a weird gray area that shouldn't be messed around with.

Personally, I was shocked when I found out we do review on the same server that
hosts the archive. I would have expected a separate server for review. However,
my expectation comes from younger environments, where CD/CI and extensive code
review processes are expected. When I try to picture how the current system
evolved (more evident as you dig into dak source...), it makes sense.

Making a new server to push reviews to would remove that gray area, since it
would effectively be identical to mentors.d.n; especially considering how
easily one could upload to ftp-master instead of mentors... (guilty)

Something like this would take a pretty deep dive into dak, and a new server,
and all the goodies that would go along with such a transition.

Unfortunately, from my view, such a change would be nearly impossible. I can't
even get documentation fixes merged into dak or even reviewed. I don't imagine
such a large change would ever get accepted.


If we could even just do something like an DNA, saying we will definitely
destroy everything we download, we'd at least be able to write our own review
tools. :/



Re: DFSG of disk image with contrib package

2020-03-16 Thread Michael Lustfield
On Mon, 16 Mar 2020 18:25:17 +0100
Emmanuel Kasper  wrote:

> Am I right in keeping these disk image as "contrib", or I am
> overcomplicating by keeping these multiple disk image builds ?

Yes, this seems logical. It matches how we handle other packages; if it
requires non-free to build, then it's non-free.

-- 
Michael Lustfield



Re: What to do when DD considers policy to be optional? [kubernetes]

2020-03-24 Thread Michael Lustfield
On Mon, 23 Mar 2020 18:47:18 -0700
Sean Whitton  wrote:

> Hello Dmitry, Janos, others,
> 
> On Mon 23 Mar 2020 at 05:32PM +11, Dmitry Smirnov wrote:
> 
> > What would be best to do in such situation?  
>
> [...]
> 
> I think that I would start by filing an RC bug.

+1

If you run into issues, then you'll want to contact the ftp-masters team.

It would be helpful if the bug mentioned the two solutions I'm aware of:
- Revert the offending changes
- Migrate from main to non-free

The latter would be much easier, but would destroy all the work you put in. :(

> > [...]
> > As a person who originally introduced Kubernetes to Debian I can say that it
> > is indeed a lot of work to maintain this package and to reuse packaged
> > libraries. But I've demonstrated that it is possible at least to some 
> > extent.

As a person who temporarily introduced gitea into Debian, I fully understand.
Unfortunately, I've found that such problems are often a result of poorly
written code where the approach tends to be, "I don't know how to do this
thing, so I'll copy a module that does this and 200 other things just as
poorly." 

The lesson I learned was-
Just because something /can/ be packaged, does not mean it /should/ be packaged.
(pabs warned me about this hundreds of hours prior to me giving up)

> > I don't recall a situation when policing of how a package is maintained 
> > would
> > be necessary long after package is accepted...

It's rare, but it happens. My most recent experience was with bitlbee.
Unfortunately, our current auto-reject system is quite limited. Catching things
like this automatically is (currently) not possible and Debian relies of folks
like you. (btw- thanks for this report)

> > What do we do to ensure quality work in situation of technological hijack
> > when maintainer is unwilling to follow the practice or comply with policy?
> >
> > This is not a technical disagreement so I think that involving technical
> > committee may not be the right way to handle the problem... Or is it?  

TC is not needed. This is a clear policy violation that the new maintainer
appears to have known about, even before the upload.

It concerns me that they thought this package warranted an exception...
-- 
Michael Lustfield



Re: What to do when DD considers policy to be optional? [kubernetes]

2020-03-24 Thread Michael Lustfield
On Tue, 24 Mar 2020 10:14:08 +
Paul Wise  wrote:

> On Tue, Mar 24, 2020 at 6:17 AM Vincent Bernat wrote:
> 
> > Kubernetes is already using Go modules. They happen to have decided to
> > keep shipping a `vendor/` directory but this is not uncommon. It is
> > often considered as a protection against disappearing modules. So, there
> > is nothing to be done upstream. And BTW, there are currently 616
> > dependencies, pinned to a specific version.  
> 
> I wonder if the existence of Software Heritage could convince them
> disappearing modules aren't a problem, or if another service is
> needed.

I think this is a symptom of the tools being used. Using 'go vendor' is a
documented step in nearly all golang-based "release tutorials." Most never even
get as far as considering that maybe their source should have a version,
because the toolset mentality is "download latest at build time."

The 'go vendor' approach is especially bad within the Debian context because it
will download any/all modules that are referenced. In some cases, 'go get [..]'
can go from downloading a single repository to downloading 200+ because one (1)
extra dependency was added for one (1) extra feature that almost nobody will
ever use.

It's nearly guaranteed that at least a large handful of those will have no
license at all and at least one is going to have large embedded non-dfsg blobs.

Or, to summarize my rant...

These lazy young whipper snappers don't know what good source looks like!

.. back in my day, we coded on paper, had real bugs, and that's just the way we
liked it.

-- 
Michael Lustfield



Re: What to do when DD considers policy to be optional? [kubernetes]

2020-03-24 Thread Michael Lustfield
On Wed, 25 Mar 2020 02:07:13 +0100
Marco d'Itri  wrote:
> On Mar 24, Russ Allbery  wrote:
> [...]
> The main reason for mostly forbidding vendored libraries has been that 
> the security team rightly argues that in the event of a security issue 
> it would be too much work to 1) hunt each package using a vendored 
> library and 2) patch and rebuild all of them.
> This does not really matter for Go and Rust software because 1) the list 
> of (vendored) dependencies can be extracted automatically at build time 
> and 2) all this software would have to be rebuilt anyway since these 
> languages do not support or do not use dynamic linking.
> 
> Also, shared libraries save memory when multiple programs using them are 
> run concurrently, but nowadays this kind of saving is rarely meaningful.

My point earlier was that it's not just a security problem. We have established
that Debian does, and will continue to, care about fulfilling license
obligations, including distributing license and copyright information with the
package.

Bluntly put, I have yet to see a project that doesn't treat 'vendor/' as a black
box of collected libraries. These directories are rarely reviewed and it is
trivial (default) to wind up including extra libs between builds. Even if it's
possible to restrict that list, I doubt it would be done.

I was (pleasantly) surprised to see d/copyright updated in this package.
However, this is not maintainable-
   https://sources.debian.org/src/kubernetes/1.17.4-1/debian/copyright/


> Because of these reasons maybe we should consider supporting vendored 
> libraries in some cases.

My opinion is still a very hard "No."

This sounds (to me) rather akin to- "since app devs tend to be lazy, should we
be the same?"


One last thing to consider... NEW reviews are already an intense process. If
this package hit NEW /and/ we allowed vendored libs, you could safely expect me
to never complete that particular review. I doubt I'm the only one; that's
essentially ~200 package reviews wrapped into 1.

-- 
Michael Lustfield



Regarding vendor/ libraries... [Was: Re: What to do when DD considers policy to be optional? [kubernetes]]

2020-03-24 Thread Michael Lustfield
On Tue, 24 Mar 2020 19:25:49 -0700
Russ Allbery  wrote:

> Michael Lustfield  writes:
> 
> > One last thing to consider... NEW reviews are already an intense
> > process. If this package hit NEW /and/ we allowed vendored libs, you
> > could safely expect me to never complete that particular review. I doubt
> > I'm the only one; that's essentially ~200 package reviews wrapped into
> > 1.  
> 
> I'll repeat a point that I made earlier but put a bit of a sharper point
> on it: We should thoughtfully question whether the current approach to
> license review that we as a project ask ftpmasters to do is a correct
> investment of project resources.
> 
> The current approach to NEW license review is not a law of nature.  It's a
> choice.  Other choices are possible, such as trusting license declarations
> by upstream and then handling upstream mistakes that are later discovered
> as RC bugs.  The project is much better at sharing the load of handling RC
> bugs than it is at sharing the load of NEW license reviews.
> 
> Most of the ecosystems that make extensive use of vendored packages also
> make extensive use of license metadata.  Sometimes that license metadata
> is wrong, and we will have to have a process for dealing with those
> errors.  But the purpose of Debian is not to be a license checking service
> for the entire free software world.  It's to build a distribution adhering
> to a set of principles but with the understanding that we will sometimes
> make errors and fix them later as bugs, not be perfect and error-free at
> any of our principles, including our licensing principles.  For everything
> other than licenses, we accept the risk that we will incorporate upstream
> errors in our distribution until someone points them out via a bug report.
> 
> We do not *have* to do a detailed file-by-file review of the correctness
> of upstream's license metadata when packaging.  This is a choice.  By
> choosing to do this, we absolutely catch bugs... just like we would catch
> bugs if we did a detailed file-by-file review of any other property of
> upstream code.  For many other types of bugs (including ones that arguably
> have a more severe impact on our users than licensing bugs, such as
> security bugs), we often make trade-off decisions in favor of accepting a
> risk of upstream mistakes and having to fix them later.

Scott K. reminded me that the policy in question is a "should" and not a
"must." This is a pretty important distinction that I forgot about. In
practice, it's useful for when a single file is taken from a large project,
sometimes including weird build tools.

Assuming d/copyright is actually correct (it's not..), then it's not a policy
violation. However, for all of the reasons mentioned, and especially because
most of that work was already complete, I have to agree with the term sloppy.

We obviously need to continue the vendor/ discussion, but I think switching
threads would be a good idea.

-- 
Michael Lustfield



Re: What to do when DD considers policy to be optional? [kubernetes]

2020-03-24 Thread Michael Lustfield
Ehm... perhaps we should practice some de-escalation techniques, please. :/

On Wed, 25 Mar 2020 13:55:50 +1100
Dmitry Smirnov  wrote:
> On Wednesday, 25 March 2020 6:08:23 AM AEDT Janos LENART wrote:
> > Debian Policy, paragraph 4.13 states:  
> 
> There are several problems with how you did it too. You did not use anyone's 
> advise, ignored Salsa repository, threw away _everything_ and made no effort 
> to understand how and why things were implemented, let alone appreciated 
> prior work or tried to improve it. What you did is technological hijack of 
> the package, a gross violation of practices.
> 
> Imagine I'll upload a package to NEW, get in reviewed and accepted for what 
> it is then re-upload as something entirely different bundled with 500+ 
> dependencies that were not reviewed then claim that policy allows it?

I missed this earlier...

With regard to the kubernetes package, I don't see anything to indicate it was
abandoned. I'll also assume that the current maintainer (Dmitry) was not
contacted by Janos. Considering how quickly this started after the upload, this
seems like a safe bet.

Janos- If that's correct, then this would indeed be considered a "hostile
takeover" of the package. It would be nice to assume that this was simple
oversight of forgotten communication.

No matter the actual facts- please remember how important communication is to
our community.

So... with Dmitry still active in Debian and still holding interest in the
package, the path forward seems obvious, doesn't it? One person is interested
in maintaining the package per our standards, and another is interested in
getting it updated.



FTP-Master Review Process

2020-03-29 Thread Michael Lustfield
Hello fellow masochists,
... err, I mean Debian Developers,

There has been a lot of talk lately about the FTP-Masters team and how some
issues should be fixed. Back in December, I alluded to a proposal that I was
working on. I hoped to get a little further into writing source prior to this
point, but life happens and now seems to be a much more appropriate time than
later.


In my "proposal" [1], I outline the concerns that have been noted (from mailing
lists, IRC, and private discussions) and then provide a few potential solutions.

Although some source code exists, this is a discussion for later. I want to take
a very systematic and structured approach to this.

To outline...
 1. Identify a problem
 2. Evaluate the cause
 3. Consider solutions
 4. Evaluate the solution
- Does it solve the problem?
- Does it introduce new problems?
- What will it take to implement?
- Would any developer be willing to work on it?
- Will it be maintainable in the long-term?
- etc.
 5. Build some prototypes
 6. Re-evaluate the solution (copy #4)
 7. Finish design requirements
 8. Start building
 9. Lotsa testing
 10. Start discussing implementation

Note... I am using the term proposal because very little of what I put forth is
in any way a design document. It's just many thoughts tossed at a page that now
require critical review. (critical -- be picky, not rude)

Once the discussion is over (or degrades), I will begin writing a design
document. After complete, I will ask for additional comment and interested
developers.


Side note-
An important road block to be aware of is that implementing almost any of the
proposed solutions will require significant (time & effort) changes to the main
archive server. It will also likely require some legal counsel. I'll omit the
gritty details since this is mostly just FYI, but it's also worth considering
team size and availability (see: $current_issue) when it comes to 
implementation.


[1] https://salsa.debian.org/mtecknology/ftpmaster-proposal

-- 
Michael Lustfield



Re: How much data load is acceptable in debian/ dir and upstream (Was: edtsurf_0.2009-7_amd64.changes REJECTED)

2020-09-15 Thread Michael Lustfield
On Tue, 15 Sep 2020 08:55:40 +0200
Tobias Frost  wrote:

> On Mon, Sep 14, 2020 at 03:32:54PM -0500, Richard Laager wrote:
> 
> > >> Don't forget to mention the copyright information.  
> > > 
> > > In principle yes, but these data are not copyrightable as far as I know.
> > > Nilesh has mentioned the origin of data in debian/tests/README to
> > > provide a reference.  If you consider this information not sufficient
> > > please let us know a better way.  
> 
> Note, IANAL;
> I don't know if DATA itself is copyrightable, however, the act of collecting
> data can to my understanding constitute copyright.

Nor am I, but I can assure you... it gets absurdly gray after data has been
published. Many publications reference data from other existing publications.
The assumption is generally- it's silly to re-create all the work all over
again to investigate a new idea when other sources have already gone through
the effort of producing that data.

Copyright law is also kinda interesting in this regard; not just because of
"fair use" laws, but also because because published scientific data is generally
intended to be re-used and verified.

Taking published data and sticking it into tests to ensure the same data results
doesn't just verify published data was correct; it also provides potential new
discoveries when the results no longer appear to be correct.

Citations are typically expected, but so is data re-use.

(citations -> d/copyright)



Re: UID and GID generation

2016-08-15 Thread Michael Lustfield
> [...]

In the original scenario, the concern was was with shared media having
uid/gid numbers that don't match what's on the system. In that
scenario, this was viewed as a security concern. This is not a
security concern because once someone has physical access to your
unencrypted data, it's no longer your data. That's just an unfortunate
truth. You can give me a HD w/ Windows on it, tell me you set up the
file system permissions to be really super duper secure, but... I'm
just going to walk around the file system as if you gave me higher
than administrator access. Whatever isn't encrypted is now something I
have access to.

For the above scenario, the let's say the data is encrypted. If you're
giving the other party the key so they can open it... it's no longer
your data.

The next scenario I recall from this thread was about the small
business scenario. The typical response to that is obviously
centralized authentication. I know scenarios where that's not possible
or the logistics are absurd. The next best thing is configuration
management utilities. In my personal opinion, if your company is large
enough to have servers, it's large enough that config management is no
longer optional.

If you can go along with that, you can get something like this (salt example):
local_users:
  - michael:
uid: 4001
gid: 4001
pwd: 
keys:
  - ssh_key1
  - ssh_key2
  - timmy:
uid: 4002
gid: 4002
pwd: 
  - freddy:
terminated: True

When tools like sssd take a remote uid/gid and translate that to a
local translated uid/gid, I don't believe that's a security concern so
much as a concern of things breaking if you start getting collisions.
Ya, that's a security concern if sssd generates uid/gid numbers that
collide with numbers that other tools that want to use those
specifically, but I'm convinced this behavior has nothing to do with
security. This behavior only makes collisions unlikely, it does not,
in any way, guarantee that collisions will never happen.

In fact... Story time! One of the first times I started playing with
sssd, I was rolling it out in a mid-size enterprise (~24,000
employees). One a few servers, the uid/gid numbers that sssd came up
with collided with over 80% of the existing local system users. This
was a design issue that needed to be resolved, not something that
needed a band-aid. Because centralized user management already
existed, miscellaneous uid/gid numbers were sent up river to AD and
then every system was migrated to using those numbers. End result...
collisions can't happen because we don't let them.


tl;dr -- Randomizing uid/gid numbers does not improve security, it
just decreases the probability of that security hole being accessible.
Enforcing the same uid/gid everywhere *will* prevent collisions.


Sorry, I got a bit long winded. That's what I get when I write fun
emails on my break. :(



Re: Bug#834756: ITP: powershell -- scripting language interpreter built on .NET

2016-08-19 Thread Michael Lustfield
On Thu, Aug 18, 2016 at 12:17 PM, Marcin Kulisz  wrote:
> On 2016-08-18 16:27:23, Luke W Faraone wrote:
>> Package: wnpp
>> Severity: wishlist
>> Owner: Luke W Faraone 
>>
>> * Package name: powershell
>>   Version : 6.0.0~alpha9
>>   Upstream Author : Microsoft
>> * URL : https://github.com/PowerShell/PowerShell
>> * License : Expat
>>   Programming Lang: C#
>>   Description : scripting language interpreter built on .NET


Heh... ya' know what... I can recall a time when I had to scramble to
figure out how to deploy a windows system in a particular environment
so that I had Windows available so that I could load up a powershell
script. In typical Windows fashion, the effort it took me to deal with
the "enhanced security features" windows provides was quite
frustrating, on top of having to find a way to run some queries to
grant myself domain admin rights because 20,000 people were impacted
and people didn't think it was a problem worth staying late for.
Anyway, if I could have run "aptitude install powershell" and run the
queries directly against our problem child from my debian workstation,
well... that'd have been quite swell, pardon my language.

As a Debian guy that gets cranky outside of *nix-land, I think
powershell is a pile of garbage, but I've been in positions where
having it in the repos would have been like a gift from god delivered
on a silver/gold platter.

Side note... I'm actually incredibly impressed that microsoft released
powershell with such a free and open license. I don't get the
impression this is actually the powershell-in-windows source. I get
the impression it's just a portion, but... whatever. It also seems
like it's sort of a trial to see if they want to continue open
sourcing MS SQL (I don't think they did, yet...). I've cried a few
times in meetings where they decide that's the DB of choice. Why?
MariaDB is just so much nicer and easier and has support and
dummy-proof docs... anyway, I would have been much less frustrated at
the decision if aptitude install mssql-server were a thing. I can
still deploy that with a config management system! :D



Re: Is missing SysV-init support a bug?

2016-08-26 Thread Michael Lustfield
> >> sysvinit or another alternative.
> > Barely noticeable:
> >
> >
https://qa.debian.org/popcon-graph.php?packages=systemd-sysv+upstart+openrc+sysvinit-core+systemd-shim&show_installed=on&want_legend=on&want_ticks=on&from_date=2014-01-01&to_date=&hlght_date=&date_fmt=%25Y-%25m&beenhere=1
>
> This graph only shows that systemd users tend to install popcon package
> too. I don't think you can rely on this statistics to argue that
> sysvinit is no longer used by users.
>

Heheh... Who would have thought that the people choosing to remove sysD and
install sysV would also be the ones removing popcon (and 288 others from
the minimal no-tasksel install...)?

I actually remove popcon because I don't want my level of insanity to
impact others. :p

My understanding, before the debate ever popped up in the first place, was
that maintainers get to ignore (NOT close) minor bugs with non-default xyz
and that they are absolutely not allowed to stand in the way of anyone
willing/able to continue maintenance.

It seemed pretty simple to me... As people stop using xyz, they stop
supporting it, if that happens, xyz as a whole will deteriorate and
eventually gave the chopping block.

Nice, easy, and gradual removal by consensus. :)

Maybe I missed something, but ya... the case reported looks like an
incredibly excellent example of what we've agreed is a big no-no.


ITP: gogs -- self hosted git service

2016-10-05 Thread Michael Lustfield
retitle 792101 ITP: gogs -- A painless self-hosted Git service.
owner 792101 !
thanks

Updated Details:

* Package name: gogs
  Version : 0.9.97
  Upstream Author : The Gogs Authors
* URL : https://github.com/gogits/gogs
* License : MIT
  Homepage: https://gogs.io/
  Programming Lang: Golang
  Description : A painless self-hosted Git service.
  .
  Gogs is a self-hosted service aiming to provide a similar set of features to
  gitlab and github while remaining lightweight and easy.

I intend to package gogs. I have reached out to the gogs developers to make
them aware of this intention and have offered to discuss what that may mean for
them.

Although upstream makes frequent releases, these seem to rarely have security
fixes so I don't anticipate any significant concerns backporting security
issues. (feel free to double check me!)

-- 
Michael Lustfield


pgpQ5tJiDtmWa.pgp
Description: OpenPGP digital signature


Bug#840588: ITP: golang-github-lunny-log -- A compatible log extension

2016-10-12 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

* Package name: golang-github-lunny-log
  Version : 0.0~git20160921.0.7887c61-1
  Upstream Author : Lunny Xiao
* URL : https://github.com/lunny/log
* License : BSD-3-clause
  Programming Lang: Go
  Description : A compatible log extension

 log GoDoc (https://godoc.org/github.com/lunny/log)
 .
 简体中文 (https://github.com/lunny/log/blob/master/README_CN.md)
 Installation
 .
 go get github.com/lunny/log
 .
 Features• Add color support for unix console• Implemented dbwriter
 to save log to database• Implemented FileWriter to save log to file
 by date or time.• Location configurationExample For Single File: Go f,
 _ := os.Create("my.log") log.Std.SetOutput(f)
 .
 .
 For Multiple Writer: Go f, _ := os.Create("my.log")
 log.Std.SetOutput(io.MultiWriter(f, os.Stdout))
 .
 .
 For log files by date or time: Go w := log.NewFileWriter(log.FileOptions{
 ByType:log.ByDay, Dir:"./logs",
 }) log.Std.SetOutput(w)
 .
 About This repo is an extension of Golang log.  LICENSE BSD License
  http://creativecommons.org/licenses/BSD/
  (http://creativecommons.org/licenses/BSD/)

I am packaging this as part of an ITP for gogs. This is a dependency for one of
the gogs dependencies. (and far from the only one)



Bug#841279: ITP: golang-github-gogits-go-gogs-client -- Gogs API client in Go.

2016-10-19 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

* Package name: golang-github-gogits-go-gogs-client
  Version : 0.0~git20160830.0.d8aff57-1
  Upstream Author : Gogs
* URL : https://github.com/gogits/go-gogs-client
* License : MIT
  Programming Lang: Go
  Description : Gogs API client in Go.

 Gogs API client in Go This package is still in experiment, see Wiki
 (https://github.com/gogits/go-gogs-client/wiki) for documentation.
 License This project is under the MIT License. See the LICENSE
 (https://github.com/gogits/gogs/blob/master/LICENSE) file for the full
 license text.

This is being packaged as a build dependency to gogs.



Bug#842433: ITP: golang-github-gogits-cron -- a cron library for gogs

2016-10-28 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

* Package name: golang-github-gogits-cron
  Version : 0.0~git20160810.32.7f3990a-1
  Upstream Author : Gogs
* URL : https://github.com/gogits/cron
* License : Expat
  Programming Lang: Go
  Description : a cron library for gogs

 GoDoc (http://godoc.org/github.com/robfig/cron) Build Status
 (https://travis-ci.org/robfig/cron)

TODO: perhaps reasoning



Bug#842434: ITP: bluemonday -- bluemonday: a fast golang HTML sanitizer (inspired by the OWASP Java HTML Sanitizer) to scrub user generated content of XSS

2016-10-29 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

* Package name: bluemonday
  Version : 0.0~git20161012.0.f77f16f-1
  Upstream Author : Microcosm
* URL : https://github.com/microcosm-cc/bluemonday
* License : BSD-3-clause
  Programming Lang: Go
  Description : HTML sanitizer to scrub user generated content of XSS

 Bluemonday takes untrusted user generated content as an input, and will
 return HTML that has been sanitised against a whitelist of approved HTML
 elements and attributes so that you can safely include the content in
 your web page.


I'm packaging this library as a dependency of gogs, but this seems to be a
useful and well written library for preventing XSS.



Bug#842435: ITP: golang-github-microcosm-cc-bluemonday -- bluemonday: a fast golang HTML sanitizer (inspired by the OWASP Java HTML Sanitizer) to scrub user generated content of XSS

2016-10-29 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

* Package name: golang-github-microcosm-cc-bluemonday
  Version : 0.0~git20161012.0.f77f16f-1
  Upstream Author : Microcosm
* URL : https://github.com/microcosm-cc/bluemonday
* License : BSD-3-clause
  Programming Lang: Go
  Description : HTML sanitizer to scrub user generated content of XSS

 Bluemonday takes untrusted user generated content as an input and will
 return HTML that has been sanitised against a whitelist of approved HTML
 elements and attributes so that you can safely include the content in
 your web page.


I'm packaging this library as a dependency of gogs, but this seems to be a
useful and well written library for preventing XSS.



Re: wording: "reverse dependence" vs "depender"

2017-01-01 Thread Michael Lustfield
On Jan 1, 2017 4:37 PM, "Ben Finney"  wrote:

Adam Borowski  writes:

> Oi you lot!

Wassp!?

> I wonder, would it be better if we switched to using the word
> "depender" in place of "reverse dependency"?

I don't know a simple term in English that carries that meaning.

To me, “depender” feel like a neologism and does not make me confident
the reader would know what is meant. I vote −1 to that term.


I imagine any non-English speaker would significantly oppose creating new
slang for this. I had to scratch my head when I read the subject wondering
if it was a typo for defender.

I can't, at this moment, think of a decent alternative.


Re: Python 3.6 in stretch

2017-01-09 Thread Michael Lustfield
On Mon, Jan 9, 2017 at 1:54 PM, Ben Finney  wrote:
> Adam Borowski  writes:
>
>> On Tue, Jan 10, 2017 at 05:35:34AM +1100, Ben Finney wrote:
>> > Andrey Rahmatullin  writes:
>> >
>> > > On Sun, Jan 08, 2017 at 06:55:45PM +0100, Galbo Branbert wrote:
>> > > > Thanks for the info, didn't know that the transition freeze was
>> > > > actually the version freeze for minor versions of Python.
>> > > A minor version upgrade would be 3.5.3 -> 3.5.4. 3.5 -> 3.6 is a
>> > > lot of changes.
>> >
>> > Galbo is referring correctly to the minor version, as specified in
>> > https://www.python.org/dev/peps/pep-0440/> and Semantic Versioning
>> > http://semver.org/>.
>> > […]
>>
>> Not every project uses semver.
>
> We're not talking about “every project”. We are talking specifically
> about Python, where “minor version” has the meaning Gablo used.

I agree, Python intends to use semver. However, in practice, they do
not. If 3.5 to 3.6 was a typical "minor version," our expectation
would be that the update comes with security updates and bug fixes
(not feature changes). Python uses the microversion position for this.
More importantly... is this really a point that matters?

Is not the point that matters the fact that 3.5 to 3.6 introduced
significant changes? As such, it seems the argument about whether this
is a minor version bump, a significant one, or whatever we wanna call
it are moot. The version change /does/ introduce significant changes
and this carries substantial risk to even consider rolling at this
point.

Remember, we have a long freeze, not so we can continue to sneak in
cool features, but rather so we can ensure a high quality release.



Bug#853084: Solution

2017-01-29 Thread Michael Lustfield
After seeing the resolution, I would say the solution should be adding
pulseaudio to either recommends (most likely) or to depends of the plugin.

On Jan 29, 2017 10:30, "Fredrik Nyqvist" 
wrote:

> Hi,
>
> I may have sent the bug report too early...
>
> I noticed now that I have to install pulseaudio first. After I did this
> the plugin works.
>
> Should pulseaudio be installed by default?
>
> /Fredrik
>
>


Re: Depends/Recommends from libraries

2017-03-09 Thread Michael Lustfield
On Mar 9, 2017 12:22 PM, "Russ Allbery"  wrote:


Sure, but hopefully we find and report those as bugs.  I personally run
without recommends on Debian unstable on several different types of
systems and report these problems whenever I run into them.


I'm in this same boat. I disable installing recommends on all but one of my
systems, including my laptop's and other devices. If (when) I have issues
or check out new software, I take a look at those lists to see what I might
want.


Heh.. I remember using gnome, kde, xfce, etc. and they all seemed to have
this problem in one way or another. After enough battling, I eventually
arrived at the conclusion that these desktop environments were written to
be super complete, not super lean. They were for everybody, not for me.

I ended up switching to openbox and a whole different selection of
"desktop" utilities and even had to write some myself. Issues like this
have completely evaporated for me.


Re: The deal with our old logo[s?] (the penguin one)

2017-03-15 Thread Michael Lustfield
On Mar 15, 2017 19:06, "Samuel Henrique"  wrote:

As some of you may not know, Debian used to have a penguin logo[1].


Thanks for making me feel young!

The only reference i could find of it does not tell much[1].


I heard rumor once that, as a newer DD, it's possible to cast votes on
previous decisions. This makes me want to cast another vote for that
comforting, friendly, and correct swirl. There's just something about it
that I've always loved, something that's always made me feel like I'm home.

I could also find some (almost none) detail about the first logo from a
cool guy's blog[2]*.


Thanks for this as well! I genuinely love it and might make it my next
tattoo! I was six years of age when it was published and my life has been
spun 4,140 degrees by it's existence so it actually seems fitting.

Where can i read more about our logo's history? (at least for how long they
were used)


If you learn of anything outside of this thread, could you keep us updated?


Re: Bug#857394: Debian Policy violation -- libgegl-dev contains duplicate copy of openCL library files

2017-04-14 Thread Michael Lustfield
On Fri, Apr 14, 2017 at 11:40 AM, Enrico Weigelt, metux IT consult
 wrote:
> On 14.04.2017 14:34, ian_br...@mail.ru wrote:
> [...]
> By the way: is there any automatic way for creating the -dfsg trees out
> of the upstream ? (I prefer working directly w/ git repos instead of
> additional patching)

We do indeed have magic for this!

https://pkg-perl.alioth.debian.org/howto/repacking.html#2.1._Copyright_file

Add Files-Excluded to the first paragraph in d/copyright.
Add two version mangle options to d/watch.
Let uscan be awesome. :)



Re: website maintenance

2017-05-16 Thread Michael Lustfield
>>> Our users are really complaining about our look&feel in the web

I expect that less than ten people on earth would disagree with you.

> Unfortunately, I don't have the web abilities (web technologies,
> design, UX, whatever) that this task requires.
[..]
> Someone have suggested to invest a bit of our money into some paid
> work. I believe this idea is something worth exploring too.

I've been working on packaging gitea but I'm reaching a point where
too much needs to change in either unstable or experimental for it to
be sensible until after freeze, so I now have some time available.

I don't claim to be an expert by any means, but I do have some
background in website development and know of some resources that
could be helpful. (google can fill in any blanks here, no I'm not
proud of my PHP knowledge)

If we're going to seriously discuss reworking www.debian.org, can we
talk about what changes actually need to take place? Let's start the
requirements gathering phase, ya? What functions does the current
implementation not provide? What do we need to see out of the next
option? We have a lot of web services that share a similar theme. The
minimalistic design provides an easy way to keep a unified theme
across all services and makes it easy to render correctly across all
browsers regardless of the latest and greatest ecmascript or $foo. You
can safely assume Debian is a group of people that will not be okay
with requiring javascript to correctly render pretty much anything
[1].

I'm sure it's been discussed before, but I don't know what functional
requirements we face, what services utilize the same theme/design,
what their templates need to look like, what kind of resources are
typically accessed and under what load and why, how content updates
are deployed, etc. Before even beginning any work, I think it's
important the requirements phase for a project like this be completed
in relatively painful detail.

[1] That's why our updates are so clean. ;)



Re: website maintenance

2017-05-16 Thread Michael Lustfield
On Tue, May 16, 2017 at 2:22 AM, Michael Lustfield  wrote:
>>>> Our users are really complaining about our look&feel in the web
[... blah blah ...]
For some reason, the entire other chunk of this thread found it's way
to my junk folder. I'm not sure why that happened but I see there's
actually been some discussion started so please ignore me.

I'll follow up when either I read through a wiki page or create one to
start keeping track of opinions. :)



Re: Switch default installation image link?

2017-06-06 Thread Michael Lustfield
I'll chime in to what others have said. I think DVD images should not
be the default/main download venue. Even though the careful package
ordering by (alleged?) popularity, I am sure a great deal of Debian
installs use under half of the packages provided by the first DVD (and
many that are not there, of course). A completely offline user will
have to juggle no matter if they got the DVD, and a connected user (no
matter their available bandwidth) will spend more time waiting for the
network if they choose to install from DVD.


Usually, when I hear about people downloading the DVD over a slow
paid-per-bit connection, they do it so that they can burn multiple copies
and share so that what people have to download is kept to a minimum.


I'm​ sure other reasons exist where the DVD is the sane option, but the
netinst iso is the only thing I ever considered using.


Re: UMASK 002 or 022?

2017-06-30 Thread Michael Lustfield
I personally prefer a global 0027, but I've heard arguments for 0077.

I also did a quick web search and found wiki pages meant to discuss the
default. I imagine the most helpful course of action would be to read
through the existing discussions and then contribute facts that haven't
been shared... ideally without the emotions and opinions present here.

I never read anywhere that a form decision was made, just that there hasn't
been cause for change.

My preference of 0027 doesn't make sense for the typical family. Their
default doesn't make sense for me.

I got the impression this was never changed was because people that care
can do a search for how to change it, change it, and no longer care. I use
configuration management to set it and haven't thought about it again.


Re: P.S. Re: Debian 9 in a VM with Proxmox 5 system

2017-07-12 Thread Michael Lustfield
On Jul 12, 2017 03:39, "Holger Levsen"  wrote:

On Tue, Jul 11, 2017 at 10:44:47AM -0500, Don Armstrong wrote:
> On Tue, 11 Jul 2017, Bjørn Mork wrote:
> > Previously I could ask a user to do e.g. 'ifconfig wwan0'. Now?
>
> sudo ip link; sudo ip addr;

no need for sudo, this is enough:

ip link ; ip addr

or even shorter:

ip l ; ip a


I don't believe the point had anything to do with ifconfig vs. ip. Rather,
it's no longer possible for people doing remote troubleshooting to make an
educated guess what the name of the interface in question is.

Imagine destining to the lay user how to read and parse the bits from the
ip command output that you're after. Now, instead of knowing it's the
add-on card and asking for bits of "ip addr show eth1", you're now along
them to run "ip addr" and figure out which of the devices might be what
you're looking for.

In another scenario, system automation doesn't often involve management of
network interfaces, but it's also not rare. I had been able to look at DCIM
and know what address ethX would have assigned. At the moment, I'm not
really sure how to handle the new naming scheme. I miss simple and
(globally) predictable.


ITP: golang-github-bsm-pool -- simple connection pool in Go

2017-07-17 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

* Package name: golang-github-bsm-pool
  Version : 0.0~git20161215.0.502d32d-1
  Upstream Author : Black Square Media Ltd
* URL : https://github.com/bsm/pool
* License : Expat
  Programming Lang: Go
  Description : simple connection pool in Go

 BSM Pool implements a simple connection pool for Go.
 .
 Features:
 - thread-safe
 - lock-free
 - stack-based rather than queue-based
   + connections that have been used recently are more likely to be re-used
 - supports pool shrinking (reap idle connections)

This is being packaged as a new dependency to golang-github-bsm-redeo.


pgpOF1Qlhw0JT.pgp
Description: OpenPGP digital signature


ITP: golang-github-mitchellh-go-homedir -- detect the user's home directory without cgo

2017-07-17 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

* Package name: golang-github-mitchellh-go-homedir
  Version : 0.0~git20161203.0.b8bc1bf-1
  Upstream Author : 2013 Mitchell Hashimoto
* URL : https://github.com/mitchellh/go-homedir
* License : Expat
  Programming Lang: Go
  Description : detect the user's home directory without cgo

 This golang library implements methods for detecting the user's home directory
 without the use of cgo, so the library can be used in cross-compilation
 environments.
 .
 Usage:
 - homedir.Dir()
   + get the home directory for a user
 - homedir.Expand()
   + expand the ~ in a path to the home directory

This is being packaged as a new dependency of golang-github-spf13-cobra,
which is being packaged as a dependency of gitea.



ITP: golang-github-ssor-bom -- small tools for cleaning bom from byte array or reader

2017-07-18 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

* Package name: golang-github-ssor-bom
  Version : 0.0~git20170302.0.6ed919a-1
  Upstream Author : Asher
* URL : https://github.com/ssor/bom
* License : Expat
  Programming Lang: Go
  Description : small Go library to clean bom from byte array or reader

  This golang library implements a utility to clean bom from a byte array
  or byte reader.
  .
  Example(s):
  .
 bs := []byte{bom0, bom1, bom2, 0x11} result := CleanBom(bs)
  .
 bs := []byte{bom0, bom1, bom2, 0x11} result :=
 NewReaderWithoutBom(bytes.NewReader(bs))

This is being packaged as a new dependency of golang-github-jaytaylor-html2text,
which is being packaged as a dependency of gitea.


pgp_2zE_PcMvK.pgp
Description: OpenPGP digital signature


Re: OpenSSL disables TLS 1.0 and 1.1

2017-08-07 Thread Michael Lustfield
On Aug 7, 2017 8:23 AM, "Joerg Jaspert"  wrote:

On 14757 March 1977, Kurt Roeckx wrote:

> This will likely break certain things that for whatever reason
> still don't support TLS 1.2. I strongly suggest that if it's not
> supported that you add support for it, or get the other side to
> add support for it.

In many cases this isnt possible.


I can think of a lot of "enterprise" tools that have been built for older
versions of Java. In most cases, the vendors have no interest in doing
anything required to get away from a TLSv1.0 requirement. I'm also aware
some of the well-known search engine bots that support only TLSv1.0.

Is there an actual need for the removal of TLS v1.{0,1}? Are either
considered broken or unsupported by upstream? If not, I'd be much more
concerned about what's going to start breaking by making this change.

Shouldn't a change like this at least start with packages such as nginx,
apache, etc. and seeing if they can drop those from the default
configuration? Heck, I'm sure we could even include a comment along the
lines of "if you need to re-enable older TLS versions due to application
compatibility, please respond to bug #123".

I'm not sure what exactly would be a better idea, but disabling globally
with no easy workaround sounds like a recipe for pain and very angry users.


ITP: libjs-jquery-minicolor -- Tiny color picker built on jQuery

2017-08-07 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

* Package name: libjs-jquery-minicolor
  Version : 2.2.6
  Upstream Author : 2017 A Beautiful Site, LLC
* URL : https://github.com/claviska/jquery-minicolors
* License : Expat
  Programming Lang: Javascript
  Description : Tiny color picker built on jQuery

 This package provides a library with methods to display a mini color picker
 using jQuery.
 .
 API Documentation: https://labs.abeautifulsite.net/jquery-minicolors/#api

This JS library is being packaged as a build dependency of gitea (a gogs fork).
There are a lot of build dependencies and I would love some help. If anyone is
interested in handling this package, please feel free to contact me!



ITP: libjs-cssrelpreload -- JavaScript to load CSS asynchronously

2017-08-07 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

* Package name: libjs-cssrelpreload
  Version : 1.3.1
  Upstream Author : 2016 Filament Group
* URL : https://github.com/filamentgroup/loadCSS
* License : Expat
  Programming Lang: Javascript
  Description : JavaScript to load CSS asynchronously

 This JavaScript library provides functions to load CSS asynchronously.
 .
 Referencing CSS stylesheets with link[rel=stylesheet] or @import causes
 browsers to delay page rendering while a stylesheet loads. When loading
 stylesheets that are not critical to the initial rendering of a page, this
 blocking behavior is undesirable. The new  standard
 enables loading stylesheets asynchronously, without blocking rendering, and
 loadCSS provides a JavaScript polyfill for that feature to allow it to work
 across browsers, as well as providing its own JavaScript method for loading
 stylesheets.

This JS library is being packaged as a build dependency of gitea (a gogs fork).
There are a lot of build dependencies and I would love some help. If anyone is
interested in handling this package, please feel free to contact me!



ITP: libjs-pdfjs -- PDF reader in JavaScript

2017-08-07 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

* Package name: libjs-pdfjs
  Version : 1.8.188
  Upstream Author : 2012 Mozilla Foundation
* URL : https://github.com/mozilla/pdf.js
* License : Apache-2.0
  Programming Lang: Javascript
  Description : PDF reader in JavaScript

 This JavaScript library provides a Portable Document Format (PDF) viewer that
 is built with HTML5. This project aims to provide a general-purpose, web
 standards-based platform for parsing and rendering PDFs.

This JS library is being packaged as a build dependency of gitea (a gogs fork).
There are a lot of build dependencies and I would love some help. If anyone is
interested in handling this package, please feel free to contact me!



ITP: libjs-vue -- JS library for building interactive web applications

2017-08-07 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

* Package name: libjs-vue
  Version : 2.4.2
  Upstream Author : 2013-2017 Yuxi (Evan) You
* URL : https://github.com/vuejs/vue
* License : Expat
  Programming Lang: Javascript
  Description : JS library for building interactive web applications

 This Javascript library implements functions for building interactive web
 interfaces. It provides data-reactive components with a simple and flexible
 API.
 .
 Core features:
 - Declarative rendering with a plain JS object based reactivity system
 - Component-oriented development style with tooling support
 - Lean and extensible core
 - Flexible transition effect system
 - Fast without the need for complex optimization


This JS library is being packaged as a build dependency of gitea (a gogs fork).
There are a lot of build dependencies and I would love some help. If anyone is
interested in handling this package, please feel free to contact me!



ITP: libjs-swaggerui -- Assets to dynamically generate documentation

2017-08-07 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

* Package name: libjs-swaggerui
  Version : 3.1.4
  Upstream Author : 2017 SmartBear Software
* URL : https://github.com/swagger-api/swagger-ui
* License : Apache-2.0
  Programming Lang: Javascript
  Description : Collection of assets to dynamically generate documentation

 Swagger UI is a collection of HTML, Javascript, and CSS assets that allow
 anyone to visualize and interact with an API's resources without needing to
 have any implementation logic in place. It provides visual documentation,
 making it easy for back-end implementation and client-side consumption.

This JS library is being packaged as a build dependency of gitea (a gogs fork).
There are a lot of build dependencies and I would love some help. If anyone is
interested in handling this package, please feel free to contact me!



ITP: libjs-semantic -- JS framework based around principles from natural language

2017-08-07 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 

* Package name: libjs-semantic
  Version : 2.2.13
  Upstream Author : semantic-ui.com
* URL : https://github.com/Semantic-Org/Semantic-UI
* License : Expat
  Programming Lang: Javascript
  Description : JS framework based around principles from natural language

 Semantic allows developers to build beautiful websites fast, with concise
 HTML, intuitive javascript, and simplified debugging, helping make front-end
 development a delightful experience. Semantic is responsively designed
 allowing your website to handle multiple devices. Semantic integrates  with
 frameworks such as React, Angular, Meteor, and Ember.

This JS library is being packaged as a build dependency of gitea (a gogs fork).
There are a lot of build dependencies and I would love some help. If anyone is
interested in handling this package, please feel free to contact me!



Re: ITP: libjs-pdfjs -- PDF reader in JavaScript

2017-08-13 Thread Michael Lustfield
On Sun, 13 Aug 2017 15:24:47 +0200
Guus Sliepen  wrote:

> Is this not the same as libjs-pdf, which is already packaged?
> 

Yup, it's the exact same. Thanks for noticing and mentioning it! :D


pgpog7LscUIwo.pgp
Description: OpenPGP digital signature


Re: openssl/libssl1 in Debian now blocks offlineimap?

2017-08-15 Thread Michael Lustfield
On Aug 15, 2017 08:05, "Kurt Roeckx"  wrote:


> Do you really think that big companies like cable provides give a
>  about what Debian deprecates?  I was personally fighting with similar
> problems in Firefox and the internal side at my university.

My problem is that if we don't do something, TLS 1.0 will be used
for an other 10 year, and that's just not acceptable. So I would


Nobody said we should do nothing, but it should be clear by this point that
this total removal is going to cause a lot of problems for admins and users.

like to do something so that hopefully by the time Buster releases
you can disable TLS 1.0 by default, and that almost no users would
need to enable it again.


If Debian is going to be the only motivating factor for change then the
pressure that causes the change will be from system admins hosting
applications. These admins will *NEED* to re-enable older versions.

Companies might not listen to customers, but vendors listen to the money
providers. It's rarely a fast change, though. It's usually a ticket tossed
into the wishlist pile until enough people make noise.


I'm currently working on a project with a client to replace TLSv1.0 with
TLSv1.2. We're hoping to have this rolled out in a lab in the next four
months, but it's been a "priority" project for over two years.

It's not for lack of motivation or effort; there are a lot of interesting
roll-out issues. This is when motivation to change already exists. "Some
distro disabled support for it" is going to lead to vendors outright
saying, "use a different distro and wait until we get around to it."

I imagine users would be more inclined to just switch to a different
distribution that doesn't break their chrome/firefox/internet's. If a
client came to us and said their agent broke because their OS dropped that
support, our choice would be to say tough luck.

Having TLS 1.0 (and 1.1) enabled by default itself is not a
problem, it's actually using it that's a problem. There are
clearly still too many that don't support TLS 1.2, but it's
getting better.


I don't think it was answered... Is there an actual reason that this needs
to be handled urgently? Is TLSv1.0/v1.1 considered broken? Is there a
reason there was no discussion on this list before the decision was made
and pushed?

Disabling the protocols is the only way I know how to identify
all the problems. And I would like to encourage everybody to
contact the other side if things break and get them to upgrade.


It might be the only way you know, but this list has lots of admin types
that could probably help out. Perhaps you could upload a fixed openssl so
we can open that discussion about what's appropriate?


I've already suggested dropping it from all default configs for a release
cycle. It's not until the next release that we can assume a majority of
pro-active admins will have been made aware that we(Debian) are deprecating
older TLS versions.

Dropping out-of-the box support sounds like a great idea, but the back-out
option needs to be easy and should be able to be toggled per-application,
giving people a chance to react to this change instead of making them
scramble for a patch.


Re: Single Sign On for Debian

2017-08-22 Thread Michael Lustfield
On Tue, 22 Aug 2017 18:10:39 +0200
Geert Stappers  wrote:

> On Tue, Aug 22, 2017 at 04:29:49PM +0200, gregor herrmann wrote:
> > On Tue, 22 Aug 2017 09:45:10 +0200, Alexander Wirt wrote:
> >   
> > > Specifially one LDAP (db.d.o.) Backend and one Oauth2 (gitlab) Backend?
> > [...]
> [...]

This seems like backward thinking to me.

> Thing that I hope is that Alioth successors will have the various services
> on separate machines. So that we have not again the situation when replacing
> a Source Code Management system we also have to replace the machine
> with all the -guest accounts.

I whole heartedly agree! One of the current challenges with replacing Alioth is
because of how many services it's providing. If Alioth were not being used for
guest accounts, this wouldn't even be a discussion.

Using Gitlab (or any VCS) as the user db for guest accounts means adding a
dependency that could block future upgrades... kinda like now. This is not a
future-proof design and will come at a future cost.

I'm happy to help implement an SSO solution that Gitlab is capable of using,
but I argue against using Gitlab as a future user database.


Side note... I got cert-based SSO working on https://gitea.debian.net/. It
actually ended up being pretty easy and kinda fun. I have a ticket with
upstream to support populating the email address, but that'll be a while.

Cheers,
-- 
Michael Lustfield



Re: New httpd-fastcgi virtual package

2017-09-20 Thread Michael Lustfield
On Tue, 19 Sep 2017 16:47:33 +0200
Xavier  wrote:

> Hi all,
> 
> The authoritative list of virtual package provides:
>  httpd   a HTTP server
>  httpd-cgi   a CGI-capable HTTP server
>  httpd-wsgi  a WSGI-capable HTTP server (python 2 API)
>  httpd-wsgi3 a WSGI-capable HTTP server (python 3 API)
> 
> I would like to propose this:
>  httpd-fastcgi   a FastCGI-capable HTTP server (or server
>  plugin)

As much as it rubs me the wrong way, I don't see many reasons to avoid creating
this. In fact, the only reason I have is that it could encourage people to
think fcgi is okay to use.

This virtual package could probably be satisfied by libapache2-mod-fcgid,
fcgiwrap, or spawn-fcgi. I believe fcgiwrap has some systemd magic-sauce that
would, in theory, provide a relatively simple way for apps to listen on a
well-known unix-socket path (similar to the way uwsgi works).

Personally, I always recommend uwsgi over any of the avaialable cgi/fastcgi
servers, such as php-fpm, ruby-fcgi, python-fcgi, etc. When you have uwsgi
available, and it's capable of handling all those languages, including legacy
raw-cgi apps, it seems kinda silly to use anything else. ;)

(even mailman runs great behind it..)

-- 
Michael Lustfield



Re: ftp master uploads disappearing?

2017-10-02 Thread Michael Lustfield
On Mon, Oct 2, 2017 at 2:49 AM, Andreas Tille  wrote:
> Hi Carsten,
>
> On Sun, Oct 01, 2017 at 06:00:05PM +0200, Carsten Schoenert wrote:
>> Guido pointed me some times ago to the following additions to my local
>> setup in ~/.gbp.conf. That do the trick always create a *source.changes
>> file too.
>>
>> > $ cat ~/.gbp.conf
>> > ...
>> > [buildpackage]
>> > ...
>> > pbuilder = True
>> > pbuilder-options=--source-only-changes --hookdir /home/carsten/.pbuilder
>> > ...
>> >
>>
>> You can also use the command line to add this option(s).
>>
>> > $ gbp buildpackage ... --git-pbuilder-options="--source-only-changes ..."
>
> I tried both but with no success. :-(

Then you obviously need a third option!
I use `SOURCE_ONLY_CHANGES=yes` in `~/.pbuilderrc`.



Bug#882090: ITP: node-yamljs -- JavaScript YAML 1.2 Parser & Encoder

2017-11-18 Thread Michael Lustfield
Package: wnpp
Severity: wishlist
Owner: Michael Lustfield 
X-Debbugs-CC: debian-devel@lists.debian.org

* Package name: node-yamljs
  Version : 0.3.0
  Upstream Author : Jeremy Faivre 
* URL : https://github.com/jeremyfa/yaml.js#readme
* License : Expat
  Programming Lang: JavaScript
  Description : JavaScript YAML 1.2 Parser & Encoder

 YAML.js is a stand-alone YAML 1.2 parser and encoder. It works under
 node.js and all major browsers. This package also includes some command
 line YAML/JSON conversion utilities.
 .
 Example Usage:
   // load string to object
   nativeObject = YAML.parse(yamlString);
   // load file to object
   nativeObject = YAML.load('file.yml');


This is being packaged as a dependency of semantic-ui, which is a dependency
of gitea.


pgpVjHXCkPjKL.pgp
Description: OpenPGP digital signature


Re: Debian Stretch new user report (vs Linux Mint)

2017-12-04 Thread Michael Lustfield
On Mon, 4 Dec 2017 23:41:34 +0500
Andrey Rahmatullin  wrote:

> On Mon, Dec 04, 2017 at 10:34:05AM -0800, Russ Allbery wrote:
> > For the discoverability, I would be quite comfortable with putting both
> > the free and the non-free download links prominantly on the page with the
> > non-free link going to or closely tied with a page that discusses the
> > issues, explains why we have this installer even though we don't really
> > want to, and maybe links to the FSF Respects Your Freedom pages to suggest
> > a hardware alternative.  
> There are alternatives?

As long as I avoid Nvidia, I usually have excellent luck finding systems
(specifically laptops) that work well without anything from non-free. With
servers, I usually need something for the networking drivers but nothing else.

-- 
Michael Lustfield



Re: gitlab package (was Re: Opt out style recommends)

2016-04-11 Thread Michael Lustfield
On Mon, Apr 11, 2016 at 3:41 AM, Jonathan Dowland  wrote:
> On Mon, Apr 11, 2016 at 03:18:58PM +0530, Pirate Praveen wrote:
>> 1.Most people in the world including myself thought encryption was an
>> optional thing two years back.
>>
>> 2.automating ssl was not possible before letsencrypt. Now you just need to
>> click/press yes button to get an encrypted service running.
>
> The "normal" way this was done before letsencrypt was with the 'snake oil'
> local SSL CA/cert and self-signing. Obviously not suitable for production use,
> but perfectly fine for an initial install/testing; it is also simpler than
> worrying about talking to LE (especially in a postinst/root/possibly 
> unattended
> context) and a more appropriate initial state for a private/corporate install.
>

I feel like tossing in my two cents as well since this would likely
impact me down the road...

I'm also against a package such as gitlab (or drupal, wordpress,
dokuwiki, etc.) trying to mess around with my TLS certificates. I'm
also very much opposed to it even being a prompt during installation.
I'm well aware that gitlab-ci is a beast (and a kludgy mess... god
save your soul taking on that feller), but an initial installation
should be getting things going and being out of the users face. In
most situations, I would venture a guess that gitlab is sitting on
internal servers and not publicly accessible. That kinda puts a damper
on nice automated ssl with letsencrypt, doesn't it? (k.. not always,
but in the typical situation) However, that old option with
snakeoil... that still works in these environments. I personally use
the letsencrypt infrastructure for some projects, but refuse to use
their incredibly bloated client stuff. I use alternative client tools
that suite my needs much better than the letsencrypt app does.

If anything, shouldn't it be the web server (nginx, tengine, etc.)
that would "suggest" letsencrypt? They won't recommend/suggest that
package because SSL is a separate thing entirely. I would dare say, at
this point, most admins that care about encryption also implement
automation tools such as salt and ansible and already have well tested
systems in place for certificates.

In this particular case, I would suggest first making letsencrypt a
Suggests. Then, I would suggest considering snakeoil for the https or
just installing with http-only and providing a documented tool for
moving to using letsencrypt. You and I both know that we're only
talking about a web server configuration... shouldn't the web server
be the one suggesting it? ... it doesn't because the web server
packages consider SSL/TLS to be its own thing entirely that shouldn't
be mixed in with other package deployments.

tl;dr .. my opinion: letsencrypt should be a suggests; gitlab should
do either https or do a self-signed cert; and letsencrypt integration
should come post-install
Just my opinions/thoughts. :)



Re: gitlab package (was Re: Opt out style recommends)

2016-04-12 Thread Michael Lustfield
On Apr 12, 2016 00:34, "Tollef Fog Heen"  wrote:
>
> ]] Michael Lustfield
>
> > In this particular case, I would suggest first making letsencrypt a
> > Suggests. Then, I would suggest considering snakeoil for the https or
> > just installing with http-only and providing a documented tool for
> > moving to using letsencrypt. You and I both know that we're only
> > talking about a web server configuration... shouldn't the web server
> > be the one suggesting it? ... it doesn't because the web server
> > packages consider SSL/TLS to be its own thing entirely that shouldn't
> > be mixed in with other package deployments.
>
> The web app might well need to know whether it's being accessed over TLS
> or not.  If it is, any cookies it sets should be marked with «secure» so
> they're never sent in plaintext.

An app should know about HTTP vs. HTTPS, yes. However, that's not relevant
to this discussion because an app should be finding that information via a
header the web server sends it. It's one of the standard headers that
nobody pays much attention to. :)

I think party of the problem here is the whole omnibus logic that wants to
configure the whole environment which immediately steps on sys admin toes.

The best thing I can think of is to stick with HTTP out of the box and have
another utility that handles modifying configuration.

You could have all of these prompts (http vs. https; managed certs vs.
letsencrypt) be debconf questions with a post install script that reads
those answers. If nothing was selected, use the default. Otherwise, do
whatever else. This would provide flexibility to rerun and modify later as
well. At least this would be suitable to how gitlab-omnibus likes to
configure itself and it's "modules."

For admins with config management tools, they can pre-answer your debconf
questions and have SSL right away if they so choose. The reconfiguration
can easily be triggered via dpkg reconfigure, which tends to be a first
step for extra config in Debian.

This lets you deploy gitlab out of the box in a manner that is the most
likely to work on all systems and leaves the ability to configure extras to
your heart's content.

Either that or I'm missing something. If I am, please teach me my lesson! :)


Re: why, nicely explained (Re: Genesis of the git.d.o/gitlab.d.o confusion (Was: Next steps for gitlab.debian)

2016-06-08 Thread Michael Lustfield
On Wed, 8 Jun 2016 15:47:46 +, Holger Levsen
 wrote:
>Thanks for this nice summary. It helped me understand things better.

I'm... actually gonna save this for later because it helps me understand
the alioth workflow.

I'm still relatively fresh to Debian dev and can say, without any doubt,
alioth was (continues to be) the hardest part, by far for me to wrap my
head around.


Re: why, nicely explained (Re: Genesis of the git.d.o/gitlab.d.o confusion (Was: Next steps for gitlab.debian)

2016-06-08 Thread Michael Lustfield
On Wed, Jun 8, 2016 at 12:39 PM, Milan Kupcevic  wrote:

> On 06/08/2016 02:55 PM, Michael Lustfield wrote:
> > On Wed, 8 Jun 2016 15:47:46 +, Holger Levsen
> > mailto:hol...@layer-acht.org>> wrote:
> >>Thanks for this nice summary. It helped me understand things better.
> >
> > I'm... actually gonna save this for later because it helps me understand
> > the alioth workflow.
> >
>
> [...]
>
> Great sarcasm.
>
> Milan
>


This was not in any way intended as sarcasm. If it came across as such,
please accept this as my apology.

Alioth has been, and continues to be, the hardest thing for me to wrap my
head around.

Whatever option (gitlab, gogs, gitolite) is rolled out and is able to
eventually replace at least the git (and projects) functionality of Alioth
would very much help me, and others, dive into other projects.

Currently, I don't like to even poke at other projects that I'm not already
familiar with; I'm scared I'll break something because I don't understand
the workflows and processes involved. I /did/ star that message and save it
for future use because I /did/ find it valuable.

Again, I'm sorry if I came across sarcastic. Hopefully elaborating helps
explain what I meant originally. :)


Re: Keysigning via Video Conferencing

2016-06-23 Thread Michael Lustfield
On Thu, Jun 23, 2016 at 9:28 AM, Lars Wirzenius  wrote:

> On Thu, Jun 23, 2016 at 09:23:07AM -0700, Nikolaus Rath wrote:
> > As I said in my other email, I am wondering if the extra burden is worth
> > the gain in security.
>
> Is there an extra burden? Seems to me that it'd happen naturally if
> you contribute to Debian and as part of that interact with other
> Debian people.
>

I would consider this an extra burden, yes. I've been playing with Linux
for over a decade, have many DD's that know me by IRC handle, email
address, and nothing else; a face to face meeting has never happened
organically. The one time in my life I found a DD to sign my key, I had to
schedule a time where work conveniently had me within an hour drive (one
way) of that person. I would, personally, consider having an established
relationship with someone you can recognize the face of because of
face-to-face meetings as a bonus. It would allow you to feel comfortable
verifying identity over a video conference. Just a bonus, though, I
wouldn't ever make that my requirement.

What is it we're really trying to protect against? Signing a key doesn't
mean you trust that person's work, it means you trust that person is who
they say they are. We want to prevent an evil doer from getting a key into
the keyring by pretending to be someone else. We have a completely
different process for establishing trust of a persons work and that's all
outlined in the DM/DD application process. Our face-to-face meeting and
chat is a way to see if their government says they are who they claim to be.

Obviously, documents can be forged. You can ask what forms of ID they'll be
bringing and use the search-o-matic to figure out signs of a counterfeit,
but almost nobody is going to have the equipment to fully check every type
of ID. Verifying a legal identity by means that are good enough for other
organizations is only the first step in our identification process. Next
up, we take the piece of paper home and start our own extended verification
process (typos, existing work, etc.) followed by sending that encrypted
signature back to the user via email (an address you should have verified
has no typos) where the user needs to decrypt with their private key.

I believe there's a document out there called Trusting Trust which
discusses drawing a line between what is and is not practical. We trust C
developers to not create bugs that introduce authentication back-doors
during future builds. Why? Because, even if we /could/ read through the C
source and review everything that's changing, we're still not going to
catch everything for the same reason that bugs exist in the first place.
Heck, we can't keep bugs out of our applications written in C even assuming
C itself is entirely bug free.

The point I'm attempting to make is that it's not practical to check every
anti-forgery feature of every document. It's not (always) practical to
verify an identity based on a long history of in-person interactions.
Meeting someone, checking the features that don't require special
equipment, having a chat with them, verifying no typos exist, and looking
at existing work signed by that key, and sending an encrypted signature to
that address is what we have decided is practical.

Is this not why we require DD signatures in the first place? We're trusting
that all DD's have put in enough effort to ensure the identity of every key
they've signed. Kinda like being an op in a #debian* IRC channel; you're
automatically held to a higher standard when accepting the role. I feel
like the established policies do a good job of meeting in the middle of the
two extremes that have been discussed. We're trusting all DD's to follow
the policies that have been decided on as the practical line. If a few DD's
choose to adhere to a higher standard, so-be-it, but a lower standard
should be avoided. I know DD's that trust something signed with my key is
me. None of them will sign my key because they've never met me. It would be
concerning if they were willing to because it reduces the overall integrity
of the Debian project.

Somewhere, I saw it mentioned that you should be able to verify based on
history only and their legal name doesn't matter. I don't entirely
disagree. The chances of the NSA building a super computer to contribute to
Debian, become a DD, and add backdoors into unwatched packages are pretty
low. However, this does create hurdles for someone that has left the
project under poor circumstances to build a new identity that they use to
harm the project. It's also comforting to imagine every DD/DM is real
person, just like the rest of us, and is the person they claim to be.


tl;dr -- +1 existing policies :)