Bug#1029121: bullseye-pu: package lxc/4.0.6-2+deb11u2

2023-01-17 Thread Mathias Gibbens
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: pkg-lxc-de...@lists.alioth.debian.org, gib...@debian.org
Control: affects -1 + src:lxc

[ Reason ]
The version of lxc in bullseye is affected by the low-severity
CVE-2022-47952 which was fixed in the recent release of lxc 5.0.2
(uploaded to unstable yesterday). As the fix was trivial to apply to
the version of lxc in bullseye, I think it would be beneficial to
include it in the next point release.

[ Impact ]
Affected versions of lxc suffer a minor information leak which allows a
local user to infer whether any file exists, even within a protected
directory tree.

[ Tests ]
A manual proof-of-concept test is provided in the upstream commit
fixing this issue.

[ Risks ]
There are no changes to any of the logic of lxc; the error messages
which are returned are modified to be identical in every error case,
preventing the information leak.

[ Checklist ]
  [*] *all* changes are documented in the d/changelog
  [*] I reviewed all changes and I approve them
  [*] attach debdiff against the package in (old)stable
  [*] the issue is verified as fixed in unstable

[ Changes ]
Backport upstream commit 1b0469530d7a38b8f8990e114b52530d1bf7f3b8,
which fixes CVE-2022-47952. (The line numbers in the diff shifted
slightly, otherwise no changes to the patch.)

[ Other info ]
The source debdiff is attached.
diff -Nru lxc-4.0.6/debian/changelog lxc-4.0.6/debian/changelog
--- lxc-4.0.6/debian/changelog	2022-01-13 19:57:39.0 +
+++ lxc-4.0.6/debian/changelog	2023-01-18 02:53:46.0 +
@@ -1,3 +1,9 @@
+lxc (1:4.0.6-2+deb11u2) bullseye; urgency=medium
+
+  * Backport fix for CVE-2022-47952
+
+ -- Mathias Gibbens   Wed, 18 Jan 2023 02:53:46 +
+
 lxc (1:4.0.6-2+deb11u1) bullseye; urgency=medium
 
   * lxc-download: Switch GPG server.
diff -Nru lxc-4.0.6/debian/patches/fix-CVE-2022-47952.patch lxc-4.0.6/debian/patches/fix-CVE-2022-47952.patch
--- lxc-4.0.6/debian/patches/fix-CVE-2022-47952.patch	1970-01-01 00:00:00.0 +
+++ lxc-4.0.6/debian/patches/fix-CVE-2022-47952.patch	2023-01-18 02:53:23.0 +
@@ -0,0 +1,69 @@
+From 1b0469530d7a38b8f8990e114b52530d1bf7f3b8 Mon Sep 17 00:00:00 2001
+From: Maher Azzouzi 
+Date: Sun, 25 Dec 2022 13:50:25 +0100
+Subject: [PATCH] Patching an incoming CVE (CVE-2022-47952)
+
+lxc-user-nic in lxc through 5.0.1 is installed setuid root, and may
+allow local users to infer whether any file exists, even within a
+protected directory tree, because "Failed to open" often indicates
+that a file does not exist, whereas "does not refer to a network
+namespace path" often indicates that a file exists. NOTE: this is
+different from CVE-2018-6556 because the CVE-2018-6556 fix design was
+based on the premise that "we will report back to the user that the
+open() failed but the user has no way of knowing why it failed";
+however, in many realistic cases, there are no plausible reasons for
+failing except that the file does not exist.
+
+PoC:
+> % ls /l
+> ls: cannot open directory '/l': Permission denied
+> % /usr/lib/x86_64-linux-gnu/lxc/lxc-user-nic delete lol lol /l/h/tt h h
+> cmd/lxc_user_nic.c: 1096: main: Failed to open "/l/h/tt" <- file does not exist.
+> % /usr/lib/x86_64-linux-gnu/lxc/lxc-user-nic delete lol lol /l/h/t h h
+> cmd/lxc_user_nic.c: 1101: main: Path "/l/h/t" does not refer to a network namespace path < file exist!
+
+Signed-off-by: MaherAzzouzi 
+Acked-by: Serge Hallyn 
+---
+ src/lxc/cmd/lxc_user_nic.c | 15 ++-
+ 1 file changed, 6 insertions(+), 9 deletions(-)
+
+diff --git a/src/lxc/cmd/lxc_user_nic.c b/src/lxc/cmd/lxc_user_nic.c
+index a91e2259d5..69bc6f17d1 100644
+--- a/src/lxc/cmd/lxc_user_nic.c
 b/src/lxc/cmd/lxc_user_nic.c
+@@ -1088,20 +1088,17 @@ int main(int argc, char *argv[])
+ 	} else if (request == LXC_USERNIC_DELETE) {
+ 		char opath[LXC_PROC_PID_FD_LEN];
+ 
+-		/* Open the path with O_PATH which will not trigger an actual
+-		 * open(). Don't report an errno to the caller to not leak
+-		 * information whether the path exists or not.
+-		 * When stracing setuid is stripped so this is not a concern
+-		 * either.
+-		 */
++		// Keep in mind CVE-2022-47952: It's crucial not to leak any
++		// information whether open() succeeded of failed.
++
+ 		netns_fd = open(args.pid, O_PATH | O_CLOEXEC);
+ 		if (netns_fd < 0) {
+-			usernic_error("Failed to open \"%s\"\n", args.pid);
++			usernic_error("Failed while opening netns file for \"%s\"\n", args.pid);
+ 			_exit(EXIT_FAILURE);
+ 		}
+ 
+ 		if (!fhas_fs_type(netns_fd, NSFS_MAGIC)) {
+-			usernic_error("Path \"%s\" does not refer to a network namespace path\n", args.pid);
++			usernic_error("Failed while opening netns file for \"%s\"\n", args.pid);
+ 			close(

Bug#1035564: unblock: lxd/5.0.2-5

2023-05-05 Thread Mathias Gibbens
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Control: affects -1 + src:lxd

Please unblock package lxd

[ Reason ]
Added a missing Replaces in d/control for bin:lxd-client to address an
upgrade edge case from bullseye where lxc was already installed and
some other package being upgraded Depends/Recommends lxd which could
potentially result in a dpkg error (see #1034971).

lxd has autopkgtests, but as we're now within 20 days of the full
freeze, a manual unblock is required.

[ Impact ]
There's a chance that an upgrade from bullseye to bookworm might fail.

Additionally, this upload of lxd to unstable reset the migration
counter before lxd 5.0.2-4 was able to migrate with a fix for running
with the version of qemu in testing.

[ Tests ]
I manually tested installing lxd-client on a bullseye system with lxc
installed:

> Preparing to unpack lxd-client_5.0.2-3_amd64.deb ...
> Unpacking lxd-client (5.0.2-3) ...
> dpkg: error processing archive lxd-client_5.0.2-3_amd64.deb (--install):
>  trying to overwrite '/usr/share/bash-completion/completions/lxc', which is 
> also in package lxc 1:4.0.6-2+deb11u2
> dpkg-deb: error: paste subprocess was killed by signal (Broken pipe)

With the fix:

> Preparing to unpack .../lxd-client_5.0.2-5_amd64.deb ...
> Unpacking lxd-client (5.0.2-5) ...
> Replacing files in old package lxc (1:4.0.6-2+deb11u2) ...

[ Risks ]
I don't believe there are any risks with this change.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]
As mentioned, lxd 5.0.2-4 had been on track to automatically migrate
around May 14 with a fix for use with the version of qemu in testing
(see #1030365). Since the requested debdiff is against the version of
lxd in testing, it contains changes from both -4 and -5.

unblock lxd/5.0.2-5
diff -Nru lxd-5.0.2/debian/changelog lxd-5.0.2/debian/changelog
--- lxd-5.0.2/debian/changelog	2023-03-08 02:27:33.0 +
+++ lxd-5.0.2/debian/changelog	2023-05-05 12:42:21.0 +
@@ -1,3 +1,16 @@
+lxd (5.0.2-5) unstable; urgency=medium
+
+  * Add missing Replaces in d/control for lxd-client to fix potential bullseye
+upgrade issue (Closes: #1034971)
+
+ -- Mathias Gibbens   Fri, 05 May 2023 12:42:21 +
+
+lxd (5.0.2-4) unstable; urgency=medium
+
+  * Cherry-pick upstream fix for qemu >= 7.2 (Closes: #1030365)
+
+ -- Mathias Gibbens   Sun, 23 Apr 2023 17:50:08 +
+
 lxd (5.0.2-3) unstable; urgency=medium
 
   * Cherry-pick upstream commit to fix issue with btrfs-progs >= 6.0
diff -Nru lxd-5.0.2/debian/control lxd-5.0.2/debian/control
--- lxd-5.0.2/debian/control	2023-03-08 02:27:33.0 +
+++ lxd-5.0.2/debian/control	2023-05-05 12:42:21.0 +
@@ -99,8 +99,9 @@
 Package: lxd-client
 # The lxc binary doesn't depend on liblxc1, so it can be built for any architecture
 Architecture: any
-# lxc prior to 5.0.0 shipped a file that conflicts with LXD (see #1010843)
-Breaks: lxc (<< 1:5.0.0)
+# lxc prior to 5.0.1 shipped a file that conflicts with LXD (see #1010843, #1034971)
+Breaks: lxc (<< 1:5.0.1)
+Replaces: lxc (<< 1:5.0.1)
 Depends: ${misc:Depends},
  ${shlibs:Depends}
 Built-Using: ${misc:Built-Using}
diff -Nru lxd-5.0.2/debian/patches/006-cherry-pick-btrfs-fix.patch lxd-5.0.2/debian/patches/006-cherry-pick-btrfs-fix.patch
--- lxd-5.0.2/debian/patches/006-cherry-pick-btrfs-fix.patch	2023-03-08 02:27:33.0 +
+++ lxd-5.0.2/debian/patches/006-cherry-pick-btrfs-fix.patch	2023-05-05 12:42:21.0 +
@@ -1,3 +1,6 @@
+From: Mathias Gibbens 
+Description: Cherry-pick upstream commit to fix issue with btrfs-progs >= 6.0
+Origin: https://github.com/lxc/lxd/pull/11333
 From e7c852e43c0479060e630adb50342d2552a6cdad Mon Sep 17 00:00:00 2001
 From: Thomas Parrott 
 Date: Tue, 7 Feb 2023 10:04:27 +
diff -Nru lxd-5.0.2/debian/patches/007-cherry-pick-qemu-fix.patch lxd-5.0.2/debian/patches/007-cherry-pick-qemu-fix.patch
--- lxd-5.0.2/debian/patches/007-cherry-pick-qemu-fix.patch	1970-01-01 00:00:00.0 +
+++ lxd-5.0.2/debian/patches/007-cherry-pick-qemu-fix.patch	2023-05-05 12:42:21.0 +
@@ -0,0 +1,90 @@
+From: Mathias Gibbens 
+Description: Cherry-pick upstream fix for qemu >= 7.2, rebase, and drop SEV features not in current LTS release
+Origin: https://github.com/lxc/lxd/pull/11594
+diff --git a/lxd/instance/drivers/driver_qemu.go b/lxd/instance/drivers/driver_qemu.go
+index 9dcdd9da7..08211b034 100644
+--- a/lxd/instance/drivers/driver_qemu.go
 b/lxd/instance/drivers/driver_qemu.go
+@@ -2878,17 +2878,11 @@ func (d *qemu) generateQemuConfigFile(mountInfo *storagePools.MountInfo, busName
+ // addCPUMemoryConfig adds the qemu config required for setting the number of virtualised CPUs and memory.
+ // If sb is nil 

Re: Bug#1050256: autopkgtest fails on debci

2023-09-01 Thread Mathias Gibbens
Control: block 1038315 by -1
Control: block 1042880 by -1

  I don't think we have a good understanding of the root cause of this
issue. Initially we thought this was a known upstream issue with all-
but very recent versions of apparmor and a corresponding lxc profile
fix [0]. However, it appears this is a different issue that somehow
depends on the interaction of bookworm's versions of the kernel,
apparmor, and/or lxc.

  A minimal reproducer is to install bookworm and create a container
with a systemd service using a hardening option like
PrivateNetwork=yes. With the latest bookworm kernel (6.1.38-4), the
service will fail. But, grab a kernel from testing (6.4.11-1) and then
things work -- with no other changes required. I tried the "oldest"
kernel on snapshot.d.o post 6.1 series (6.3.1+1~exp1 [1]) and the
service works properly with that version as well. So, something changed
in the kernel (either upstream or in Debian's packaging) between 6.1
and 6.3 that "unbreaks" services within lxc containers.

  Given that simply installing a newer kernel fixes things, I am
hesitant to start making changes to lxc until we actually understand
what's changed when running the newer kernel and how it's affecting
lxc's behavior.

On Thu, 2023-08-31 at 19:54 +0200, Christian Boltz wrote:
> That said - the DENIED log entry translates to
> 
> unix send type=dgram,
> 
> You could try if adding this rule to the lxc-autopkgtest-lxc-iomhit_*
> profile helps - but if the issue is really on the kernel side, my
> hope is limited).

  I have tried tweaking the apparmor profile that's generated for
containers (the relevant part is defined in the variable
AA_PROFILE_UNIX_SOCKETS in src/lxc/lsm/apparmor.c), but haven't had any
success in a workaround. I am not super familiar with apparmor, so
maybe I'm not specifying things right, but I've previously tried the
sort of rules Christian suggested, none of which have had any affect.

On Fri, 2023-09-01 at 13:23 +0200, Michael Biebl wrote:
> The only way to fix the container was to use the aforementioned 
> `lxc.apparmor.profile = unconfined`.
> I think we should do that as the breakage is rather widespread and I 
> already see individual packages trying to work around that to at
> least keep debci afloat.

  I strongly dislike the idea of blanketly disabling apparmor profiles
by default for all lxc installs, since apparmor is one of the ways of
helping to ensure isolation of containers. For the specific instance of
debci, /etc/lxc/default.conf can be modified post-lxc install to change
lxc.apparmor.profile from "generated" to "unconfined" for the time
being.

Mathias

---

[0] -- https://github.com/lxc/lxc/issues/4333
[1] -- https://snapshot.debian.org/package/linux-signed-amd64/6.3.1%2B1~exp1/


signature.asc
Description: This is a digitally signed message part


Re: Bug#1050256: autopkgtest fails on debci

2023-09-04 Thread Mathias Gibbens
On Mon, 2023-09-04 at 01:00 -0700, John Johansen wrote:
> I took a quick look through v6.1..v6.3.1
> 
> there is a patch that I think is the likely fix, it first landed in v6.2
> 
> 1cf26c3d2c4c apparmor: fix apparmor mediating locking non-fs unix sockets

  Thanks for the pointer John -- I think that is the fix we've been
looking for!

  Commit 1cf26c3d2c4c doesn't apply cleanly to the v6.1 tree due to the
other commits from the patchset of Oct 3, 2022 that modified a bunch of
the apparmor code. Because I couldn't quickly cherry-pick all the
changes without amassing a large diff, I made the small proof-of-
concept patch at the end of this message and applied it to the  6.1.38-
4 kernel from bookworm. Booting with the patched kernel allows services
to start up in containers without any issues. :)

  So, I think the next step should be to get that commit properly
backported to the v6.1 longterm tree and included in an upstream
release. Hopefully that would be able to happen in enough time so that
it is bundled with the kernel updates for bookworm's point release next
month. If not, we should be sure to get it into Debian's packaging so
at least there's a proper fix available.

  I'm happy to help test any proposed patch for this fix on my end.

Mathias

-

> --- a/security/apparmor/lib.c 2023-09-04 16:08:28.818066140 +
> +++ b/security/apparmor/lib.c 2023-09-04 16:09:17.56661 +
> @@ -355,6 +355,9 @@
>   perms->allow |= map_other(dfa_other_allow(dfa, state));
>   perms->audit |= map_other(dfa_other_audit(dfa, state));
>   perms->quiet |= map_other(dfa_other_quiet(dfa, state));
> +
> + // For testing only!
> + perms->allow |= AA_MAY_LOCK;
>  }
>  
>  /**


signature.asc
Description: This is a digitally signed message part


Re: Bug#1050256: autopkgtest fails on debci

2023-09-14 Thread Mathias Gibbens
On Mon, 2023-09-04 at 12:39 -0700, John Johansen wrote:
> On 9/4/23 12:32, Michael Biebl wrote:
> > John, could you help with getting this fix into 6.1.x?
> 
> yes, I am working on a patch.

Hi John,

  I wanted to check in to see if you've had a chance to work on that
patch for the 6.1 kernel. The deadline for package updates being
included in the 12.2 point release is in roughly two weeks, but given
this will be a patch for the kernel I'd really like to have something
tested and handed over to the src:linux team well before then.

Thanks,
Mathias


signature.asc
Description: This is a digitally signed message part


Re: Bug#1050256: autopkgtest fails on debci

2023-09-14 Thread Mathias Gibbens
On Mon, 2023-09-11 at 13:45 +0200, Michael Biebl wrote:
> Am 09.09.23 um 14:20 schrieb intrigeri:
> 
> > At this stage it seems clear that the bug and the corresponding
> > ideal fix are in the AppArmor part of src:linux, and the bug
> > affects at least src:apparmor and src:lxc. I'd like to reflect this
> > in the metadata of #1050256 by reassigning the bug to Linux, and
> > adding "affects" indications. I'll do so in the next few days
> > unless someone objects soon.
> 
> It also affects at least
> src:systemd, src:pdns, src:policykit-1
> All those packages have added workarounds for this issue.
> I'll revert the workaround in systemd and notify the maintainers of
> pdns and policykit-1.
> 
> > Doing so will also be an opportunity for me to sum up the problem
> > for the maintainers of src:linux, and let them know about our
> > desired timeline: ideally this would be fixed in the upcoming
> > Bookworm point-release.

  Not having heard any objections, please feel free to reassign this
bug. As you said, this will give the src:linux maintainers a heads up,
even if the patch isn't quite ready yet (but hopefully in time for the
12.2 point release).

Mathias


signature.asc
Description: This is a digitally signed message part


Bug#1052007: bookworm-pu: package lxcfs/5.0.3-1+deb12u1

2023-09-15 Thread Mathias Gibbens
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: pkg-lxc-de...@lists.alioth.debian.org, gib...@debian.org
Control: affects -1 + src:lxcfs

[ Reason ]
lxcfs 5.0.3-1 has a bug where /proc/cpuinfo is not properly reported
within a 32bit arm container when the 64bit host has more than ~13
CPUs. This was initially reported in #1036818 and impacts some
autopkgtests run on the ci.debian.net arm hosts.

I have uploaded lxcfs 5.0.4-1 to unstable with a fix cherry-picked from
the upstream main branch, and would like to include it in bookworm's
version of lxcfs so that the CI arm servers can operate properly.

[ Impact ]
autopkgtests run on the CI infrastructure have been erroneously failing
for some packages, requiring workarounds. Fixing this will allow
autopkgtests for armel/armhf runs to be useful once again.

[ Tests ]
I have tested the patch locally in a QEMU VM, both when initially
debugging the issue as well as installing the proposed update. The
changes have been reviewed and accepted by the upstream developers.

[ Risks ]
The risk of regression is limited -- the changes have been reviewed and
accepted by the upstream developers. The fix is small and targeted.

[ Checklist ]
  [*] *all* changes are documented in the d/changelog
  [*] I reviewed all changes and I approve them
  [*] attach debdiff against the package in (old)stable
  [*] the issue is verified as fixed in unstable

[ Changes ]
Backport upstream commit fc8f593bda9eb4692daa07512ef6ba60dc39aded,
which was merged upstream earlier today and will be included in the
next release of lxcfs. There's also a small change to adjust the
default branch used by gbp to reflect the new branch for bookworm
fixes.

[ Other info ]
The source debdiff is attached.
diff -Nru lxcfs-5.0.3/debian/changelog lxcfs-5.0.3/debian/changelog
--- lxcfs-5.0.3/debian/changelog	2023-01-17 01:21:28.0 +
+++ lxcfs-5.0.3/debian/changelog	2023-09-15 21:32:11.0 +
@@ -1,3 +1,11 @@
+lxcfs (5.0.3-1+deb12u1) bookworm; urgency=medium
+
+  * Cherry-pick upstream fix for /proc/cpuinfo being empty within an arm32
+container with large numbers of CPUs (See: #1036818)
+  * Adjust branch in d/gbp.conf
+
+ -- Mathias Gibbens   Fri, 15 Sep 2023 21:32:11 +
+
 lxcfs (5.0.3-1) unstable; urgency=medium
 
   [ Mathias Gibbens ]
diff -Nru lxcfs-5.0.3/debian/gbp.conf lxcfs-5.0.3/debian/gbp.conf
--- lxcfs-5.0.3/debian/gbp.conf	2023-01-17 01:21:28.0 +
+++ lxcfs-5.0.3/debian/gbp.conf	2023-09-15 21:32:07.0 +
@@ -1,3 +1,3 @@
 [DEFAULT]
 pristine-tar = True
-debian-branch = master
+debian-branch = debian/bookworm
diff -Nru lxcfs-5.0.3/debian/patches/000-fix-arm32-personality.patch lxcfs-5.0.3/debian/patches/000-fix-arm32-personality.patch
--- lxcfs-5.0.3/debian/patches/000-fix-arm32-personality.patch	1970-01-01 00:00:00.0 +
+++ lxcfs-5.0.3/debian/patches/000-fix-arm32-personality.patch	2023-09-15 21:32:07.0 +
@@ -0,0 +1,88 @@
+From fc8f593bda9eb4692daa07512ef6ba60dc39aded Mon Sep 17 00:00:00 2001
+From: Mathias Gibbens 
+Date: Mon, 4 Sep 2023 00:13:57 +
+Subject: [PATCH] proc: Fix /proc/cpuinfo not respecting personality
+
+It was found that the personality within the container was not being
+properly respected, which for large numbers of CPUs would break
+reporting of /proc/cpuinfo in arm32 containers running on an arm64 host.
+
+Signed-off-by: Mathias Gibbens 
+---
+ src/proc_fuse.c | 49 +++--
+ 1 file changed, 47 insertions(+), 2 deletions(-)
+
+diff --git a/src/proc_fuse.c b/src/proc_fuse.c
+index 25af10a1..40eb2680 100644
+--- a/src/proc_fuse.c
 b/src/proc_fuse.c
+@@ -82,6 +82,45 @@ static off_t get_procfile_size(const char *path)
+ 	return answer;
+ }
+ 
++static off_t get_procfile_size_with_personality(const char *path)
++{
++	struct fuse_context *fc = fuse_get_context();
++	__u32 host_personality = liblxcfs_personality(), caller_personality;
++	bool change_personality;
++	int ret;
++	off_t procfile_size_ret;
++
++	if (get_task_personality(fc->pid, &caller_personality) < 0)
++		return log_error(0, "Failed to get caller process (pid: %d) personality", fc->pid);
++
++	/* do we need to change thread personality? */
++	change_personality = host_personality != caller_personality;
++
++	if (change_personality) {
++		ret = personality(caller_personality);
++		if (ret == -1)
++			return log_error(0, "Call to personality(%d) failed: %s\n",
++	caller_personality, strerror(errno));
++
++		lxcfs_debug("task (tid: %d) personality was changed %d -> %d\n",
++(int)syscall(SYS_gettid), ret, caller_personality);
++	}
++
++	procfile_size_ret = get_procfile_size(path);
++
++	if (change_personality) {
++		ret = personality(host_personality);
++		if (ret == -1)
++			return log_error(0, "Call to personality(%d) failed: %s\n",
++	hos

Bug#1052479: bookworm-pu: package lxc/1:5.0.2-1+deb12u1

2023-09-22 Thread Mathias Gibbens
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: pkg-lxc-de...@lists.alioth.debian.org, gib...@debian.org
Control: affects -1 + src:lxc

[ Reason ]
lxc 1:5.0.2-1 contains a typo in its IPv6 NAT rules, as reported in
#1049976. This prevents the lxc-net service from starting if
LXC_IPV6_NAT is set to true.

This was fixed in lxc version 5.0.3, which I have recently uploaded to
unstable. I would like to include this fix in bookworm's version of lxc
as it's a trivial fix affecting an actual Debian user.

[ Impact ]
IPv6 NAT is broken in bookworm's current version of lxc.

[ Tests ]
The changes have been reviewed and accepted by the upstream developers.

[ Risks ]
No risks -- a simple typo fix that has been fixed upstream since
February.

[ Checklist ]
  [*] *all* changes are documented in the d/changelog
  [*] I reviewed all changes and I approve them
  [*] attach debdiff against the package in (old)stable
  [*] the issue is verified as fixed in unstable

[ Changes ]
Backport upstream commit 4de047f51365cc06a626ee9de49fec5f76556c66,
which was included in lxc version 5.0.3. There's also a small change to
adjust the default branch used by gbp to reflect the new branch for
bookworm fixes.

[ Other info ]
The source debdiff is attached.
diff -Nru lxc-5.0.2/debian/changelog lxc-5.0.2/debian/changelog
--- lxc-5.0.2/debian/changelog	2023-01-17 02:53:00.0 +
+++ lxc-5.0.2/debian/changelog	2023-09-22 16:35:52.0 +
@@ -1,3 +1,10 @@
+lxc (1:5.0.2-1+deb12u1) bookworm; urgency=medium
+
+  * Cherry-pick upstream "fix nftables syntax for IPv6 NAT" (Closes: #1049976)
+  * Adjust branch in d/gbp.conf
+
+ -- Mathias Gibbens   Fri, 22 Sep 2023 16:35:52 +
+
 lxc (1:5.0.2-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru lxc-5.0.2/debian/gbp.conf lxc-5.0.2/debian/gbp.conf
--- lxc-5.0.2/debian/gbp.conf	2023-01-17 02:53:00.0 +
+++ lxc-5.0.2/debian/gbp.conf	2023-09-22 16:35:47.0 +
@@ -1,3 +1,3 @@
 [DEFAULT]
 pristine-tar = True
-debian-branch = master
+debian-branch = debian/bookworm
diff -Nru lxc-5.0.2/debian/patches/0100-fix-nftables-ipv6.patch lxc-5.0.2/debian/patches/0100-fix-nftables-ipv6.patch
--- lxc-5.0.2/debian/patches/0100-fix-nftables-ipv6.patch	1970-01-01 00:00:00.0 +
+++ lxc-5.0.2/debian/patches/0100-fix-nftables-ipv6.patch	2023-09-22 16:35:47.0 +
@@ -0,0 +1,34 @@
+From 4de047f51365cc06a626ee9de49fec5f76556c66 Mon Sep 17 00:00:00 2001
+From: Quentin Lyons <36303164+n0...@users.noreply.github.com>
+Date: Sun, 12 Feb 2023 02:03:42 +
+Subject: [PATCH] lxc-net.in: fix nftables syntax for IPv6 NAT
+
+The nftables masquarade rule for IPv6 was using the IPv4 syntax. This
+resulted in the following error when starting the lxc-net.service with
+LXC_IPV6_NAT="true" and nftables:
+
+Feb 11 18:54:54 pc lxc-net[4936]: Error: conflicting protocols specified: ip6 vs. ip
+Feb 11 18:54:54 pc lxc-net[4936]:  
+Feb 11 18:54:54 pc lxc-net[4917]: Failed to setup lxc-net.
+Feb 11 18:54:54 pc systemd[1]: lxc-net.service: Main process exited, code=exited, status=1/FAILURE
+Feb 11 18:54:54 pc systemd[1]: lxc-net.service: Failed with result 'exit-code'.
+Feb 11 18:54:54 pc systemd[1]: Failed to start LXC network bridge setup.
+
+Signed-off-by: Quentin Lyons <36303164+n0...@users.noreply.github.com>
+---
+ config/init/common/lxc-net.in | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/config/init/common/lxc-net.in b/config/init/common/lxc-net.in
+index efee9b96f0..e9ab88890a 100755
+--- a/config/init/common/lxc-net.in
 b/config/init/common/lxc-net.in
+@@ -92,7 +92,7 @@ start_nftables() {
+ add table ip6 lxc;
+ flush table ip6 lxc;
+ add chain ip6 lxc postrouting { type nat hook postrouting priority 100; };
+-add rule ip6 lxc postrouting ip saddr ${LXC_IPV6_NETWORK} ip daddr != ${LXC_IPV6_NETWORK} counter masquerade;
++add rule ip6 lxc postrouting ip6 saddr ${LXC_IPV6_NETWORK} ip6 daddr != ${LXC_IPV6_NETWORK} counter masquerade;
+ "
+ fi
+ NFT_RULESET="${NFT_RULESET};
diff -Nru lxc-5.0.2/debian/patches/series lxc-5.0.2/debian/patches/series
--- lxc-5.0.2/debian/patches/series	2023-01-17 02:53:00.0 +
+++ lxc-5.0.2/debian/patches/series	2023-09-22 16:35:47.0 +
@@ -1,3 +1,4 @@
 0004-apparmor.d-Sets-container-base-accordingly-to-container-base.in.patch
 0005-lxc.service-Starts-after-remote-fs.target.patch
 0004-nesting-Extend-mount-permissions-in-apparmor-to-allo.patch
+0100-fix-nftables-ipv6.patch


signature.asc
Description: This is a digitally signed message part


Bug#1052007: bookworm-pu: package lxcfs/5.0.3-1+deb12u1

2023-09-23 Thread Mathias Gibbens
On Sat, 2023-09-23 at 20:36 +0100, Adam D. Barratt wrote:
> Please go ahead.

  Uploaded, thanks!

Mathias


signature.asc
Description: This is a digitally signed message part


Bug#1052479: bookworm-pu: package lxc/1:5.0.2-1+deb12u1

2023-09-23 Thread Mathias Gibbens
On Sat, 2023-09-23 at 21:29 +0100, Adam D. Barratt wrote:
> 
> Please go ahead.

  Uploaded, thanks!

Mathias


signature.asc
Description: This is a digitally signed message part


Re: Coordingating/planning various golang transitions

2024-07-14 Thread Mathias Gibbens
On Sat, 2024-07-13 at 12:53 -0400, Reinhard Tartler wrote:
> Hi,
> 
> We currently ship docker version 20.10 in Debian oldstable, stable and
> currently testing. This is an EOL version that I really don't think Debian
> trixie should be shipping with.
> 
> I've been working over the last couple of weeks (months?) on updating
> podman and docker to recent versions, including:
> 
> docker.io -> 26.1
> containerd -> 1.7
> podman -> 5
> 
> All of these packages are built successfully in experimental and I have
> received test reports that they appear to work fine. So let's get them into
> unstable/testing!
> 
> While doing so, I've encountered that those new versions really require
> updated versions of golang-grpc and protobuf. I've been looking at that set
> of packages last month, see the thread starting at [1]. The situation is
> not pretty.

[snip]

> Unfortunately, I won't be able to make it to Busan this year. It would be
> amazing if these transitions could be discussed in person and a plan could
> be devised that would end with trixie shipping a modern version of docker
> and related packages.

  I will be attending DebCamp and DebConf, and during those couple of
weeks can spend some focused time helping get these newer versions into
unstable. Especially with Reinhard staging a lot of this in
experimental, hopefully there won't be anything too unexpected or
problematic.

  We're about six months out from the trixie freezes starting. I think
that's more than enough time to complete these transitions and be
confident adjacent dependencies haven't been accidentally broken in
some manner.

On Sun, 2024-07-14 at 02:37 +, weepingclown wrote:
> First of all thank you for your hard work. I would like to help you
> out, but am limited currently in time and my golang knowldege as a
> whole. But my understanding is that the go team plans to have a bof
> at the debconf this time, so probably this topic can be brought up
> and hopefully you get good reinforcements. I myself will try to be
> invovled depending on my availability.

  I don't think I've seen a Go Team BoF, but I did add a Go Team
listing to the sprints wiki page: https://wiki.debian.org/DebConf/24/Sprints.

Mathias


signature.asc
Description: This is a digitally signed message part


Re: Coordingating/planning various golang transitions

2024-07-22 Thread Mathias Gibbens
  Are there any objections to starting the process of uploading
packages to unstable, following the outline that Reinhard provided
(quoted at the end of the message)? I'm here at DebCamp and would be
happy to start working through the uploads and any other hand-holding
to get the migration underway.

  I know we've got an item on the BoF to discuss this, but maybe by
next week we could have a status update of how things are going?

  I've spend some time today checking things in experimental and
building a few other packages against those versions, and at least from
what I have testing things appear to be working OK with the newer
versions.

Mathias

On Sat, 2024-07-13 at 20:48 -0400, Reinhard Tartler wrote:
> My pitch would be to start with sourceful uploads of (and in that order):
> 
> - golang-google-genproto
> - golang-google-grpc
> - golang-github-grpc-ecosystem-grpc-gateway.v2
> - golang-github-google-cel-go
> - golang-opentelemetry-otel
> - golang-github-googleapis-gnostic
> - etcd
> - golang-gogottrpc
> - golang-github-containerd-btrfs
> - golang-github-containerd-go-cni
> - golang-github-containerd-go-runc
> - golang-github-coreos-bbolt
> - golang-github-google-certificate-transparency
> - golang-github-lightstep-lightstep-tracer-common
> - golang-github-kurin-blazer
> - golang-google-cloud
> - golang-github-containerd-cgroups
> - golang-github-containerd-typeurl
> - containerd
> - golang-github-cloudflare-cfssl
> - rootlesskit
> - docker.io
> - golang-github-fsouza-go-dockerclient
> - golang-github-openshift-imagebuilder
> - golang-github-containers-storage
> - golang-github-containers-image
> - golang-github-containers-common
> - golang-github-containers-buildah
> - libpod



signature.asc
Description: This is a digitally signed message part


Re: Coordingating/planning various golang transitions

2024-07-24 Thread Mathias Gibbens
On Thu, 2024-07-25 at 13:36 +0900, Graham Inggs wrote:
> On Tue, 23 Jul 2024 at 16:38, Reinhard Tartler  wrote:
> > I am aware that right now we have a number of transitions going on right now
> > https://release.debian.org/transitions/, however, none of them are 
> > obviously interfering
> > with the transition I'm proposing below. Therefore it seems to me that 
> > now'ish might be
> > a good time to start to give us enough time to deal with surprises.
> > 
> > I have also not seen a response to my inquiry below in 10 days. I 
> > understand that
> > at least some of you might be on vacation or traveling to Debcamp/Debconf. 
> > I am actively
> > seeking your input, guidance, and ideally a simple "yes, the plan sounds 
> > agreeable and the
> > risk is acceptable". In order to make this easier to track for you, I'm 
> > usertagging this bug
> > and re-assigning this to "release.debian.org".
> > 
> > I'm CC'ing the list of DDs who have agreed to help with triaging, fixing 
> > and uploading packages
> > that are affected by this transition. I'm banking on the help of the whole 
> > golang team to
> > assist with making this transition as smooth as humanly possible.
> > 
> > I'd appreciate any kind of reply, ideally in the form of: "please hold of, 
> > here is a list
> > of things we need to consider and/or look at first.".
> 
> I'm not aware of anything that should block this, please go ahead.
> 
> Feel free to update this bug if anything gets stuck migrating to testing.

  I will begin with uploading golang-google-genproto and golang-google-
grpc to unstable shortly.

Mathias


signature.asc
Description: This is a digitally signed message part


Migration status of golang-google-genproto

2024-07-31 Thread Mathias Gibbens
Hi,

  For the past ~4 days the testing excuses for golang-google-genproto
has said that it would attempt migration to testing, but that hasn't
happened yet. Is something else stuck, or somewhere I could look to see
why it hasn't migrated yet?

Thanks,
Mathias


signature.asc
Description: This is a digitally signed message part


Bug#1076109: Coordingating/planning various golang transitions

2024-07-31 Thread Mathias Gibbens
  Here's an update, one week into the transition:

  ~35 packages have been successfully uploaded to unstable, including
containerd, docker.io, etcd, and libpod.

  * siretart and zhsj have been working on containerd, packaging a few
new dependencies and getting its autopkgtest passing again.

  * etcd needs some attention to its autopkgtests, I think zhsj might
be looking into this

  * For some reason golang-google-genproto hasn't yet migrated into
testing. I pinged the release team this morning to see if they can help
figure out why.

  * golang-google-grpc needs some cleanup of DH_GOLANG_EXCLUDES in
d/rules to properly exclude source files that can't compile due to
other missing dependencies. (Probably can be done after this migration
completes.)

  Getting etcd happy once again and a new upload of golang-google-grpc
with an additional Breaks line should, I think, finally get a large
chunk of the recently uploaded packages fully happy and able to migrate
to testing.

Mathias

On Sat, 2024-07-13 at 12:53 -0400, Reinhard Tartler wrote:
> Hi,
> 
> We currently ship docker version 20.10 in Debian oldstable, stable and
> currently testing. This is an EOL version that I really don't think Debian
> trixie should be shipping with.
> 
> I've been working over the last couple of weeks (months?) on updating
> podman and docker to recent versions, including:
> 
> docker.io -> 26.1
> containerd -> 1.7
> podman -> 5
> 
> All of these packages are built successfully in experimental and I have
> received test reports that they appear to work fine. So let's get them into
> unstable/testing!
> 
> While doing so, I've encountered that those new versions really require
> updated versions of golang-grpc and protobuf. I've been looking at that set
> of packages last month, see the thread starting at [1]. The situation is
> not pretty.
> 
> My takeaway is that we need to update a large number of packages at the
> same time, starting with src:golang-google-genproto
> and src:golang-google-grpc. This will unblock a number of packages that are
> currently in experimental, and will allow them to enter unstable. However,
> this comes with the risk of breaking other packages.
> 
> I've been chasing down the stack of dependency fairly far, but I feel I'm
> reaching my capacity of how far I'm able to push this transition. I'm
> therefore requesting help from the Debian release and golang teams. It is
> simply not feasible for me to backtest that large amount of packages. I've
> been going through that stack all the way to podman 5.0.3, and can tell
> that it is feasible for us as a project. I'm asking for your expertise on
> what's the best way to get this project through.
> 
> I'd like to have these transitions coordinated so that we can minimize the
> disruption for testing. Dear Release Team, please have a look at let me
> know what you think. When would be a good time for me (or anyone else) to
> start the transition? What kind of information would be useful for that
> decision making?
> 
> For your convenience, I believe the following listing is a good starting
> set of packages to look at:
> 
> siretart@x1:/ $ build-rdeps --distribution testing
> golang-google-genproto-dev
> Reverse Build-depends in testing/main:
> --
> 
> caddy
> cloudsql-proxy
> containerd
> crowdsec
> crowdsec-custom-bouncer
> crowdsec-firewall-bouncer
> distrobuilder
> docker-libkv
> docker.io
> etcd
> fastnetmon
> fever
> gh
> go-containerregistry
> gobgp
> golang-collectd
> golang-entgo-ent
> golang-github-anacrolix-dms
> golang-github-anacrolix-ffprobe
> golang-github-anacrolix-missinggo
> golang-github-anacrolix-tagflag
> golang-github-backblaze-blazer
> golang-github-canonical-candid
> golang-github-census-instrumentation-opencensus-proto
> golang-github-checkpoint-restore-checkpointctl
> golang-github-containerd-errdefs
> golang-github-containerd-nri
> golang-github-containerd-stargz-snapshotter
> golang-github-containers-buildah
> golang-github-containers-common
> golang-github-containers-image
> golang-github-containers-ocicrypt
> golang-github-containers-psgo
> golang-github-containers-storage
> golang-github-crc-org-crc
> golang-github-crowdsecurity-go-cs-bouncer
> golang-github-docker-leadership
> golang-github-expediadotcom-haystack-client-go
> golang-github-francoispqt-gojay
> golang-github-fsouza-go-dockerclient
> golang-github-go-kit-kit
> golang-github-gogo-status
> golang-github-googleapis-gax-go
> golang-github-googlecloudplatform-guest-logging-go
> golang-github-grafana-grafana-plugin-model
> golang-github-gravitational-trace
> golang-github-grpc-ecosystem-go-grpc-middleware
> golang-github-grpc-ecosystem-go-grpc-prometheus
> golang-github-grpc-ecosystem-grpc-gateway
> golang-github-grpc-ecosystem-grpc-opentracing
> golang-github-hashicorp-go-discover
> golang-github-hashicorp-go-getter
> golang-github-hashicorp-go-plugin
> golang-github-jacobsa-gcloud
> golang-github-juju-persistent-cookiejar
> golang

Re: Migration status of golang-google-genproto

2024-08-04 Thread Mathias Gibbens
> On 2024-07-31 21:50:33 +0000, Mathias Gibbens wrote:
> > Hi,
> > 
> >   For the past ~4 days the testing excuses for golang-google-genproto
> > has said that it would attempt migration to testing, but that hasn't
> > happened yet. Is something else stuck, or somewhere I could look to see
> > why it hasn't migrated yet?
> 
> Migrating it makes other packages uninstallable:
> 
> trying: golang-google-genproto
> skipped: golang-google-genproto (169, 0, 618)
> got: 38+6865: a-4:a-11:a-13:a-0:i-1:m-8:p-0:r-6865:s-1
> * amd64: golang-github-hashicorp-go-discover-dev, 
> golang-github-lightstep-lightstep-tracer-common-dev, 
> golang-github-smallstep-certificates-dev
> 
> (from https://release.debian.org/britney/update_output.txt)

  Thanks for that pointer, Sebastian. It did help identify why that
package hadn't yet migrated. Would be nice if that could be integrated
into the excuses page at some point.

Mathias


signature.asc
Description: This is a digitally signed message part


Bug#1057116: bookworm-pu: package lxc/1:5.0.2-1+deb12u2

2023-11-29 Thread Mathias Gibbens
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: pkg-lxc-de...@lists.alioth.debian.org, gib...@debian.org
Control: affects -1 + src:lxc

[ Reason ]
The version of lxc in bookworm fails to create ephemeral copies of
containers. This is affecting Debian users, as two different bugs have
been reported in addition to an upstream bug report.

A fix was merged into the upstream repo earlier today, and I have
cherry-picked it into the packaging for unstable which I have just
uploaded. I would like to get this fix into bookworm, as it is a
regression compared to lxc in bullseye.

[ Impact ]
The version of lxc currently in bookworm cannot create ephemeral copies
of containers.

[ Tests ]
The changes have been reviewed and accepted by the upstream developers.
I have tested that creation of normal and ephemeral containers works as
expected in bookworm with this patch.

[ Risks ]
Minor/none -- the specific variable being checked was fixed to be a
more correct one that could never be NULL, which was the root cause of
the bug. This does technically change the behavior of lxc by fixing the
bug, but I don't think there is any risk of a regression in other lxc
behavior.

[ Checklist ]
  [*] *all* changes are documented in the d/changelog
  [*] I reviewed all changes and I approve them
  [*] attach debdiff against the package in (old)stable
  [*] the issue is verified as fixed in unstable

[ Changes ]
Cherry-pick and rebase upstream commit
0e932812ae2ac4dec58e413c0d95d581385b9756, which has been merged into
the upstream repo. There is also renaming of the `bdev_type` variable
to `__bdev_type` which was included in the upstream commit; I have left
that in, so the changes to bookworm packaging can be a direct cherry-
pick of the upstream fix.

[ Other info ]
The source debdiff is attached.
diff -Nru lxc-5.0.2/debian/changelog lxc-5.0.2/debian/changelog
--- lxc-5.0.2/debian/changelog	2023-09-22 16:35:52.0 +
+++ lxc-5.0.2/debian/changelog	2023-11-30 01:17:33.0 +
@@ -1,3 +1,9 @@
+lxc (1:5.0.2-1+deb12u2) bookworm; urgency=medium
+
+  * Cherry-pick upstream fix for creating ephemeral copies (See #1001713)
+
+ -- Mathias Gibbens   Thu, 30 Nov 2023 01:17:33 +
+
 lxc (1:5.0.2-1+deb12u1) bookworm; urgency=medium
 
   * Cherry-pick upstream "fix nftables syntax for IPv6 NAT" (Closes: #1049976)
diff -Nru lxc-5.0.2/debian/patches/0101-cherry-pick-fix-ephemeral-copies.patch lxc-5.0.2/debian/patches/0101-cherry-pick-fix-ephemeral-copies.patch
--- lxc-5.0.2/debian/patches/0101-cherry-pick-fix-ephemeral-copies.patch	1970-01-01 00:00:00.0 +
+++ lxc-5.0.2/debian/patches/0101-cherry-pick-fix-ephemeral-copies.patch	2023-11-30 01:17:33.0 +
@@ -0,0 +1,155 @@
+From 0e932812ae2ac4dec58e413c0d95d581385b9756 Mon Sep 17 00:00:00 2001
+From: Christian Brauner 
+Date: Wed, 29 Nov 2023 15:57:04 +0100
+Subject: [PATCH] conf: fix ephemeral copies
+
+Don't rely on rootfs->bdev_type because that may be NULL. Use storage->type
+instead which can't be NULL.
+
+Co-Developed-by: Mathias Gibbens 
+Signed-off-by: Mathias Gibbens 
+Reported-by: Mathias Gibbens 
+Signed-off-by: Christian Brauner 
+---
+ src/lxc/conf.c| 21 -
+ src/lxc/conf.h|  4 ++--
+ src/lxc/confile.c |  4 ++--
+ src/lxc/storage/storage.c |  4 ++--
+ src/lxc/storage/storage.h |  2 +-
+ 5 files changed, 19 insertions(+), 16 deletions(-)
+
+diff --git a/src/lxc/conf.c b/src/lxc/conf.c
+index 9158713..e338ed7 100644
+--- a/src/lxc/conf.c
 b/src/lxc/conf.c
+@@ -536,16 +536,21 @@ int lxc_rootfs_init(struct lxc_conf *conf, bool userns)
+ 	struct stat st;
+ 	struct statfs stfs;
+ 	struct lxc_rootfs *rootfs = &conf->rootfs;
++	const char *type;
+ 
+ 	ret = lxc_storage_prepare(conf);
+ 	if (ret)
+ 		return syserror_set(-EINVAL, "Failed to prepare rootfs storage");
++	type = rootfs->storage->type;
++
++	if (!type)
++		return syserror_set(-EINVAL, "Storage type neither set nor automatically detected");
+ 
+ 	if (!is_empty_string(rootfs->mnt_opts.userns_path)) {
+ 		if (!rootfs->path)
+ 			return syserror_set(-EINVAL, "Idmapped rootfs currently only supported with separate rootfs for container");
+ 
+-		if (rootfs->bdev_type && !strequal(rootfs->bdev_type, "dir"))
++		if (type && !strequal(type, "dir"))
+ 			return syserror_set(-EINVAL, "Idmapped rootfs currently only supports the \"dir\" storage driver");
+ 	}
+ 
+@@ -555,14 +560,12 @@ int lxc_rootfs_init(struct lxc_conf *conf, bool userns)
+ 	if (userns)
+ 		return log_trace(0, "Not pinning because container runs in user namespace");
+ 
+-	if (rootfs->bdev_type) {
+-		if (strequal(rootfs->bdev_type, "overlay") ||
+-		strequal(rootfs->bdev_type, "overlayfs"))
+-			return log_trace_errno(0, 

Bug#1057116: bookworm-pu: package lxc/1:5.0.2-1+deb12u2

2023-12-02 Thread Mathias Gibbens
On Sat, 02 Dec 2023 19:17:28 + "Adam D. Barratt"
 wrote:
> Please go ahead.

  Uploaded, thanks!

Mathias


signature.asc
Description: This is a digitally signed message part


Bug#1063371: nmu: golang-github-go-jose-go-jose, golang-github-tinylib-msgp

2024-02-06 Thread Mathias Gibbens
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: binnmu
Tags: bookworm-backports
Control: affects -1 + src:golang-github-go-jose-go-jose
Control: affects -1 + src:golang-github-tinylib-msgp

nmu golang-github-go-jose-go-jose_3.0.1-2~bpo12+1 . amd64 . bookworm-backports 
. -m "Build on buildd"
nmu golang-github-tinylib-msgp_1.1.9-1~bpo12+1 . amd64 . bookworm-backports . 
-m "Build on buildd"

  I would like for the amd64 builds to happen on official buildds,
rather than relying on my amd64 upload as part of processing through
BACKPORTS-NEW. I'm not sure when the next update in unstable to either
package will be, so I'd like to schedule a binNMU.

Thanks,
Mathias


signature.asc
Description: This is a digitally signed message part


Bug#1063371: nmu: golang-github-go-jose-go-jose, golang-github-tinylib-msgp

2024-02-06 Thread Mathias Gibbens
Control: tags -1 bookworm-backports


signature.asc
Description: This is a digitally signed message part


Bug#1064869: nmu: cowsql, golang-github-cowsql-go-cowsql

2024-02-26 Thread Mathias Gibbens
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: binnmu
Tags: bookworm-backports
Control: affects -1 + src:cowsql
Control: affects -1 + src:golang-github-cowsql-go-cowsql

nmu cowsql_1.15.4-1~bpo12+1 . amd64 . bookworm-backports . -m "Build on buildd"
nmu golang-github-cowsql-go-cowsql_1.22.0-2~bpo12+1 . amd64 . 
bookworm-backports . -m "Build on buildd"

  I would like for the amd64 builds to happen on official buildds,
rather than relying on my amd64 upload as part of processing through
BACKPORTS-NEW. I'm not sure when the next update in unstable to either
package will be, so I'd like to schedule a binNMU.

Thanks,
Mathias


signature.asc
Description: This is a digitally signed message part


Bug#1063371: nmu: golang-github-tinylib-msgp

2024-03-27 Thread Mathias Gibbens
Control: retitle -1 nmu: golang-github-tinylib-msgp
Control: affects -1 - src:golang-github-go-jose-go-jose

  I've backported a newer version of golang-github-go-jose-go-jose,
which resolves the need for a binNMU of that package.

  A binNMU is still requested for golang-github-tinylib-msgp in
bookworm-backports.

Mathias


signature.asc
Description: This is a digitally signed message part


Bug#1064869: nmu: golang-github-cowsql-go-cowsql

2024-05-03 Thread Mathias Gibbens
Control: retitle -1 nmu: golang-github-cowsql-go-cowsql
Control: affects -1 - src:cowsql


  I've backported a newer version of cowsql, which resolves the need
for a binNMU of that package.

  A binNMU is still requested for golang-github-cowsql-go-cowsql in
bookworm-backports.

Mathias


signature.asc
Description: This is a digitally signed message part


Bug#1091164: bookworm-pu: package lxc/1:5.0.2-1+deb12u3

2025-01-02 Thread Mathias Gibbens
On Thu, 2025-01-02 at 20:39 +, Adam D. Barratt wrote:
> Control: tags -1 + confirmed
> 
> On Sun, 2024-12-22 at 18:59 +, Mathias Gibbens wrote:
> > The version of lxc in bookworm segfaults when attempting to use a
> > shared host rootfs. Originally reported against lxc in sid as bug
> > #1085241, I have verified the issue is also present in bookworm.
> 
> Please go ahead.

  Uploaded, thanks!

Mathias


signature.asc
Description: This is a digitally signed message part


Bug#1091164: bookworm-pu: package lxc/1:5.0.2-1+deb12u3

2024-12-22 Thread Mathias Gibbens
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: pkg-lxc-de...@lists.alioth.debian.org, gib...@debian.org
Control: affects -1 + src:lxc

[ Reason ]
The version of lxc in bookworm segfaults when attempting to use a
shared host rootfs. Originally reported against lxc in sid as bug
#1085241, I have verified the issue is also present in bookworm.

The fix was included in the lxc 6.0.3 release, which has recently
migrated to testing. The relevant commit applies cleanly to lxc 5.0.2.

[ Impact ]
The version of lxc currently in bookworm will unexpectedly segfault if
configured to use a shared rootfs.

[ Tests ]
This issue was fixed in lxc 6.0.3. I have verified that lxc no longer
segfaults in bookworm with this fix applied.

[ Risks ]
Minor/none -- a missing check was added which will prevent null pointer
dereferencing.

[ Checklist ]
  [*] *all* changes are documented in the d/changelog
  [*] I reviewed all changes and I approve them
  [*] attach debdiff against the package in (old)stable
  [*] the issue is verified as fixed in unstable

[ Changes ]
Cherry-pick upstream commit d5c2d1efff92b2b992f10b29bd459a4b07875025,
which was included in the lxc 6.0.3 release.

[ Other info ]
The source debdiff is attached.
diff -Nru lxc-5.0.2/debian/changelog lxc-5.0.2/debian/changelog
--- lxc-5.0.2/debian/changelog	2023-11-30 01:17:33.0 +
+++ lxc-5.0.2/debian/changelog	2024-12-22 18:35:15.0 +
@@ -1,3 +1,10 @@
+lxc (1:5.0.2-1+deb12u3) bookworm; urgency=medium
+
+  * Cherry-pick upstream fix for null pointer dereference when using a shared
+rootfs (See #1085241)
+
+ -- Mathias Gibbens   Sun, 22 Dec 2024 18:35:15 +
+
 lxc (1:5.0.2-1+deb12u2) bookworm; urgency=medium
 
   * Cherry-pick upstream fix for creating ephemeral copies (See #1001713)
diff -Nru lxc-5.0.2/debian/patches/0102-cherry-pick-fix-null-pointer-dereference.patch lxc-5.0.2/debian/patches/0102-cherry-pick-fix-null-pointer-dereference.patch
--- lxc-5.0.2/debian/patches/0102-cherry-pick-fix-null-pointer-dereference.patch	1970-01-01 00:00:00.0 +
+++ lxc-5.0.2/debian/patches/0102-cherry-pick-fix-null-pointer-dereference.patch	2024-12-20 03:27:46.0 +
@@ -0,0 +1,27 @@
+From d5c2d1efff92b2b992f10b29bd459a4b07875025 Mon Sep 17 00:00:00 2001
+From: Steven Galgano 
+Date: Mon, 14 Oct 2024 15:16:36 -0400
+Subject: [PATCH] Avoid null pointer dereference when using shared rootfs.
+ rootfs->storage not set by lxc_storage_prepare when using a shared rootfs.
+
+Fixes: https://github.com/lxc/lxc/issues/4476
+Signed-off-by: Steven Galgano 
+---
+ src/lxc/conf.c | 4 
+ 1 file changed, 4 insertions(+)
+
+diff --git a/src/lxc/conf.c b/src/lxc/conf.c
+index 4b46d24bfe..6a14c60360 100644
+--- a/src/lxc/conf.c
 b/src/lxc/conf.c
+@@ -341,6 +341,10 @@ int lxc_rootfs_init(struct lxc_conf *conf, bool userns)
+ 	ret = lxc_storage_prepare(conf);
+ 	if (ret)
+ 		return syserror_set(-EINVAL, "Failed to prepare rootfs storage");
++
++	if (!rootfs->storage)
++		return log_trace(0, "Not pinning because container does not have storage");
++
+ 	type = rootfs->storage->type;
+ 
+ 	if (!type)
diff -Nru lxc-5.0.2/debian/patches/series lxc-5.0.2/debian/patches/series
--- lxc-5.0.2/debian/patches/series	2023-11-30 01:17:33.0 +
+++ lxc-5.0.2/debian/patches/series	2024-12-22 18:33:00.0 +
@@ -3,3 +3,4 @@
 0004-nesting-Extend-mount-permissions-in-apparmor-to-allo.patch
 0100-fix-nftables-ipv6.patch
 0101-cherry-pick-fix-ephemeral-copies.patch
+0102-cherry-pick-fix-null-pointer-dereference.patch


signature.asc
Description: This is a digitally signed message part


Bug#1100970: pre-approval: qemu 10.0 for trixie

2025-03-21 Thread Mathias Gibbens
  Just a heads up that this might impact Incus/LXD. The release of qemu
9.2 required several updates due to API changes; I haven't looked at
qemu 10 at all, so I don't know what sort of changes were made in the
upcoming release.

  I don't think this should block the upload of qemu to unstable, just
be aware that updates to Incus/LXD might be needed if issues are found
as we get further into the trixie freeze.

Mathias


signature.asc
Description: This is a digitally signed message part


Bug#1100970: pre-approval: qemu 10.0 for trixie

2025-03-25 Thread Mathias Gibbens
On Tue, 2025-03-25 at 12:14 +0300, Michael Tokarev wrote:
> 21.03.2025 18:34, Mathias Gibbens wrote:
> >    Just a heads up that this might impact Incus/LXD. The release of qemu
> > 9.2 required several updates due to API changes; I haven't looked at
> > qemu 10 at all, so I don't know what sort of changes were made in the
> > upcoming release.
> 
> I was able to find just one update which had to be done for incus for
> qemu 9.2 - the bootindex json property, which were erroneously marked
> as type string in qemu in the past, and 9.2 fixed this by requiring it
> to be integer, as it should've been.  Which other updates were required?

  Yes, fixing argument typing was one of the larger changes[1], along
with dealing with the removal of virtfs-proxy-helper[2]. The need to
fix argument types was an obvious change, but the removal of virtfs-
proxy-helper wasn't notice until Colin filed a bug about it. There were
a couple other smaller updates[3,4] as well.

  I did ping Stéphane, and he said he didn't see anything in the
deprecation list for the qemu 10 release[5] that looks like it will
affect Incus, but we'll still want to test things once qemu 10 is
uploaded to unstable.

Mathias

[1] -- https://github.com/lxc/incus/pull/1531
[2] -- https://github.com/lxc/incus/pull/1547
[3] -- https://github.com/lxc/incus/pull/1601
[4] -- https://github.com/lxc/incus/pull/1594
[5] -- https://www.qemu.org/docs/master/about/deprecated.html


signature.asc
Description: This is a digitally signed message part


Bug#1100970: pre-approval: qemu 10.0 for trixie

2025-03-31 Thread Mathias Gibbens
On Thu, 2025-03-27 at 09:33 +0300, Michael Tokarev wrote:
> I uploaded qemu 10.0.0-rc1 to unstable yesterday, now it is already built
> and installed on all architectures, ready for testing.

  So far just one minor issue has been found, and is already fixed
upstream[1]. I'll be updating the Incus package later today, and have
the fix staged for LXD.

Mathias

[1] -- https://github.com/lxc/incus/pull/1871


signature.asc
Description: This is a digitally signed message part


Bug#1104691: bookworm-pu: package logcheck/1.4.2+deb12u1

2025-05-04 Thread Mathias Gibbens
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: gib...@debian.org, richard.lewis.deb...@googlemail.com
Control: affects -1 + src:logcheck

[ Reason ]
The version of logcheck in bookworm does not respect the removal of
/etc/logcheck/header.txt in bullseye prior to updating to bookworm.
Originally reported in bug #1049412, fixed by logcheck 1.4.4 uploaded
to unstable yesterday.

While likely academic at this point in the bookworm lifecycle, it's a
fairly easy fix to include.

[ Impact ]
There's currently a minor regression for users upgrading from bullseye
to bookworm who had previously removed /etc/logcheck/header.txt.

[ Tests ]
I have tested the bullseye->proposed-bookworm-update->trixie->sid
upgrade path, both with and without removing the header.txt file, and
verified it remains deleted if removed prior to starting the upgrade
path.

[ Risks ]
Minor/none -- logic was added to logcheck's pre/postinst scripts to
handle the removal of /etc/logcheck/header.txt.

[ Checklist ]
  [*] *all* changes are documented in the d/changelog
  [*] I reviewed all changes and I approve them
  [*] attach debdiff against the package in (old)stable
  [*] the issue is verified as fixed in unstable

[ Changes ]
Cherry-pick relevant fix from unstable commit
8cc01d30a3156eaa2f21b14e468eccd0b0666c3c.

[ Other info ]
The source debdiff is attached.
diff -Nru logcheck-1.4.2/debian/changelog logcheck-1.4.2+deb12u1/debian/changelog
--- logcheck-1.4.2/debian/changelog	2023-03-01 22:49:39.0 +
+++ logcheck-1.4.2+deb12u1/debian/changelog	2025-05-04 16:43:20.0 +
@@ -1,3 +1,16 @@
+logcheck (1.4.2+deb12u1) bookworm; urgency=medium
+
+  [ Mathias Gibbens ]
+  * Update d/gbp.conf for debian/bookworm branch
+
+  [ Richard Lewis ]
+  * Ensure that if a user deleted /etc/logcheck/header.txt before
+upgrading to bookworm then the file stays deleted (Closes: #1049412).
+NB that the best way to suppress the header is to set INTRO=0 in
+/etc/logcheck/logcheck.conf
+
+ -- Mathias Gibbens   Sun, 04 May 2025 16:43:20 +
+
 logcheck (1.4.2) unstable; urgency=medium
 
   * More explicitly mention the default checking of the systemd journal
diff -Nru logcheck-1.4.2/debian/gbp.conf logcheck-1.4.2+deb12u1/debian/gbp.conf
--- logcheck-1.4.2/debian/gbp.conf	2023-03-01 22:49:39.0 +
+++ logcheck-1.4.2+deb12u1/debian/gbp.conf	2025-05-04 16:43:20.0 +
@@ -1,8 +1,8 @@
 [DEFAULT]
+debian-branch = debian/bookworm
+dist = DEP14
 
 [buildpackage]
-#pbuilder = true
-#export-dir = ../build-area
 sign-tags = true
 
 [import-orig]
diff -Nru logcheck-1.4.2/debian/logcheck.postinst logcheck-1.4.2+deb12u1/debian/logcheck.postinst
--- logcheck-1.4.2/debian/logcheck.postinst	2023-03-01 22:49:39.0 +
+++ logcheck-1.4.2+deb12u1/debian/logcheck.postinst	2025-05-04 16:43:20.0 +
@@ -66,6 +66,14 @@
 chown logcheck:logcheck "$f" || true
 chmod u=rwx,g=rx,o= "$f" || true   # drwxr-x---
 		done
+
+	# remove once trixie is stable (see also preinst)
+	if [ -f /etc/logcheck/header.txt.was-deleted-before-bookworm ]; then
+		echo "Preserving user-deletion of /etc/logcheck/header.txt -- packaged version is left at /etc/logcheck/header.txt.dpkg-new"
+		mv -f /etc/logcheck/header.txt /etc/logcheck/header.txt.dpkg-new || true
+		rm -f /etc/logcheck/header.txt.was-deleted-before-bookworm || true
+	fi
+
   ;;
 
   abort-upgrade|abort-remove|abort-deconfigure)
diff -Nru logcheck-1.4.2/debian/logcheck.preinst logcheck-1.4.2+deb12u1/debian/logcheck.preinst
--- logcheck-1.4.2/debian/logcheck.preinst	1970-01-01 00:00:00.0 +
+++ logcheck-1.4.2+deb12u1/debian/logcheck.preinst	2025-05-04 16:43:20.0 +
@@ -0,0 +1,10 @@
+#!/bin/sh
+set -e
+
+# preserve deletion of /etc/logcheck/header.txt if upgrading from <= 1.4.1 --- see #1049412
+if [ "$1" = "upgrade" ] && [ ! -f /etc/logcheck/header.txt ] && dpkg --compare-versions "$2" le-nl 1.4.1; then
+	echo "You deleted /etc/logcheck/header.txt before bookworm: this deletion will be preserved. However, it would be better to set INTRO=0 in /etc/logcheck.conf instead."
+	touch /etc/logcheck/header.txt.was-deleted-before-bookworm || :
+fi
+
+#DEBHELPER#


signature.asc
Description: This is a digitally signed message part


Bug#1104691: bookworm-pu: package logcheck/1.4.2+deb12u1

2025-05-10 Thread Mathias Gibbens
  Uploaded, thanks!

Mathias


signature.asc
Description: This is a digitally signed message part


Bug#1100970: pre-approval: qemu 10.0 for trixie

2025-05-07 Thread Mathias Gibbens
  One minor regression involving NVME hotplugging has been identified;
I've just opened bug #1104889 about this. While not a show-stopper, it
does make the use of NVME virtual devices impossible in Incus.

Mathias


signature.asc
Description: This is a digitally signed message part


Bug#1107459: unblock: openrct2/0.4.23+ds-1 (pre-approval)

2025-06-07 Thread Mathias Gibbens
Package: release.debian.org
Control: affects -1 + src:openrct2
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: Michał Janiszewski , gib...@debian.org
Severity: normal

Please unblock package openrct2 (pre-approval)

[ Reason ]
I received the following request from one of the OpenRCT2 developers
today:

On Sat, 2025-06-07 at 21:18 +0200, Michał Janiszewski wrote:
> I'm one of the developers of OpenRCT2 and I wanted to ask if it would
> be possible to update the package in trixie to 0.4.23, our latest
> release? [snip] We have implemented a lot of performance-related
> improvements and it would be great to see those in use, especially on
> low-powered devices such as raspberry pi, when it eventually trickles
> there.

[ Impact ]
Without the update, trixie will include an older version of OpenRCT2
that is missing out on various performance-related improvements.

I do plan to provide backported versions of OpenRCT2 during trixie's
lifetime, similar to how I've done for bookworm.

[ Tests ]
I have been uploading new releases of openrct2 to experimental since
the soft freeze began and have installed them locally to verify the
game operates as expected.

[ Risks ]
None; openrct2 is a leaf package in contrib and I've performed my
normal play testing of the version uploaded to experimental.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [ ] attach debdiff against the package in testing

[ Other info ]
No debdiff, since it would be huge when comparing against 0.4.21+ds-1
in testing.

I've attached the relevant changelog entries for the two uploads to
unstable.

unblock openrct2/0.4.23+ds-1
openrct2 (0.4.23+ds-1~exp1) experimental; urgency=medium

  * New upstream release
    - Rebase patches as needed

 -- Mathias Gibbens   Sat, 07 Jun 2025 14:57:57 +

openrct2 (0.4.22+ds-1~exp1) experimental; urgency=medium

  * New upstream release
- Drop patch to disable version check and rely on new cmake flag
    - Rebase patches as needed

 -- Mathias Gibbens   Sun, 04 May 2025 19:37:24 +


signature.asc
Description: This is a digitally signed message part


Bug#1109244: unblock: b43-fwcutter/1:019-14 (pre-approval)

2025-07-13 Thread Mathias Gibbens
Package: release.debian.org
Control: affects -1 + src:b43-fwcutter
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: gib...@debian.org
Severity: normal

Pre-approval request to unblock package b43-fwcutter

[ Reason ]
At some point, the site hosting b43 firmware referenced by this package
went offline. This causes the install of firmware-b43-installer to
fail, as reported in bug #1109025. A copy of the firmware exists in a
GitHub repo, and a single line change restores the package's
functionality.

[ Impact ]
Users are unable to automatically fetch the necessary b43 firmware for
their wireless network cards.

[ Tests ]
I verified installing the updated package in a clean trixie container
worked and was able to properly fetch and extract the firmware.

[ Risks ]
Singe line change in postinst script to adjust download URL.

There is a lingering issue about the redistributabilty of the firmware
by the remote end, but that issue pre-dates this package's postinst
breakage.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]
debdiff included below

unblock b43-fwcutter/1:019-14

-

diff -Nru b43-fwcutter-019/debian/changelog b43-fwcutter-019/debian/changelog
--- b43-fwcutter-019/debian/changelog   2024-11-30 22:44:53.0 +
+++ b43-fwcutter-019/debian/changelog   2025-07-14 05:52:41.0 +
@@ -1,3 +1,10 @@
+b43-fwcutter (1:019-14) unstable; urgency=medium
+
+  * QA upload.
+  * Update remote site where firmware can be fetched (Closes: #1109025)
+
+ -- Mathias Gibbens   Mon, 14 Jul 2025 05:52:41 +
+
 b43-fwcutter (1:019-13) unstable; urgency=medium
 
   * QA upload.
diff -Nru b43-fwcutter-019/debian/firmware-b43-installer.postinst 
b43-fwcutter-019/debian/firmware-b43-installer.postinst
--- b43-fwcutter-019/debian/firmware-b43-installer.postinst 2024-11-30 
22:44:53.0 +
+++ b43-fwcutter-019/debian/firmware-b43-installer.postinst 2025-07-14 
05:43:51.0 +
@@ -19,7 +19,7 @@
 
 DOWNLOAD="${BROADCOM_WL}.tar.bz2"
 
-URL="https://www.lwfinger.com/b43-firmware/${DOWNLOAD}";
+URL="https://github.com/minios-linux/b43-firmware/releases/download/b43-firmware/${DOWNLOAD}";
 
 FIRMWARE_INSTALL_DIR="/usr/lib/firmware"


signature.asc
Description: This is a digitally signed message part


Bug#1109763: bookworm-pu: package b43-fwcutter/1:019-8+deb12u1

2025-07-23 Thread Mathias Gibbens
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: gib...@debian.org
Control: affects -1 + src:b43-fwcutter

[ Reason ]
firmware-b43-installer fails to install in bookworm due to a brokenupstream URL.

[ Impact ]
Users running the current stable Debian release cannot properly install
the firmware required for their wireless NIC.

[ Tests ]
I have verified the package correctly fetches the firmware when using
the updated URL.

[ Risks ]
Minor/none -- single line change to update download URL.

[ Checklist ]
  [*] *all* changes are documented in the d/changelog
  [*] I reviewed all changes and I approve them
  [*] attach debdiff against the package in (old)stable
  [*] the issue is verified as fixed in unstable

[ Changes ]
Cherry-pick relevant fix from unstable commit
5a328aadbd836a27ea3c320645fede7f1d272905.

[ Other info ]
The source debdiff is attached.
diff -Nru b43-fwcutter-019/debian/changelog b43-fwcutter-019/debian/changelog
--- b43-fwcutter-019/debian/changelog   2023-02-20 13:51:02.0 +
+++ b43-fwcutter-019/debian/changelog   2025-07-23 11:05:22.0 +
@@ -1,3 +1,10 @@
+b43-fwcutter (1:019-8+deb12u1) bookworm; urgency=medium
+
+  * QA upload.
+  * Update remote site where firmware can be fetched (Closes: #1109025)
+
+ -- Mathias Gibbens   Wed, 23 Jul 2025 11:05:22 +
+
 b43-fwcutter (1:019-8) unstable; urgency=medium

   * QA upload.
diff -Nru b43-fwcutter-019/debian/firmware-b43-installer.postinst b43-fwcutter-019/debian/firmware-b43-installer.postinst
--- b43-fwcutter-019/debian/firmware-b43-installer.postinst 2023-02-20 13:51:02.0 +
+++ b43-fwcutter-019/debian/firmware-b43-installer.postinst 2025-07-23 11:05:22.0 +
@@ -19,7 +19,7 @@

 DOWNLOAD="${BROADCOM_WL}.tar.bz2"

-URL="https://www.lwfinger.com/b43-firmware/${DOWNLOAD}";
+URL="https://github.com/minios-linux/b43-firmware/releases/download/b43-firmware/${DOWNLOAD}";

 FIRMWARE_INSTALL_DIR="/lib/firmware"


signature.asc
Description: This is a digitally signed message part


Re: Bug#1109513: Likely golang-github-golang-protobuf-1-{3,5}-dev transition

2025-07-27 Thread Mathias Gibbens
  What makes this tricky is that golang-github-golang-protobuf-1-3
provides pre-APIv2 protobuf libraries and golang-github-golang-
protobuf-1-5 provides APIv2. While some code might compile with both
versions, they are runtime incompatible and mixing resulting binaries
will result most likely in crashes.

  I think that a Breaks+Replaces as suggested in bug #1109655 isn't
correct. I'm not familiar enough with the details to be able to
confidently suggest the correct solution to this problem. I did mention
this on the debian-go mailing list hoping to solicit feedback from
others.

  The affected packages in bugs #1109513-7 are all golang development
libraries, which aren't expected to be used other than building golang
packages. I think the odds of an end user encountering the upgrade
issue is low, although it would still be good to fix.

Mathias


signature.asc
Description: This is a digitally signed message part


RT: trixie-no-auto-remove request for #1109513 & friends

2025-07-31 Thread Mathias Gibbens
Release Team,

  I'd like to ask that you tag #1109513 & merged friends with trixie-
no-auto-remove. Pretty late in the release freeze cycle a few bugs were
filed against golang libraries that don't cleanly dist-upgrade from
bookworm due to the golang-github-golang-protobuf-1-3-dev -> golang-
github-golang-protobuf-1-5-dev transition last summer. Post trixie
upgrade, a simple `apt install ...-dev` is enough to hit apt through
installing the updated packages.

  protobuf-1-3 provides a pre-v2 API, while protobuf-1-5 provides the
v2 API. As such, it's not a straightforward replacement exercise to
update all golang packages to use the protobuf-1-5 library. A handful
of additional bugs have been filed identifying golang packages that
still depend on protobuf-1-3 (#1110159-64), but those might in turn
have additional dependencies that would require an update and/or
rebuild.

  Given that these are development libraries intended for building
other golang packages, and therefore unlikely to be installed by an end
user, and that we're in the final freeze, I would request that the
trixie-no-auto-remove tag be applied since an autorm would remove a ton
of other golang packages that really should be part of the trixie
release. Once forky development opens up, we can then address the
dependency issues.

Thanks,
Mathias


signature.asc
Description: This is a digitally signed message part


Bug#1109763: bookworm-pu: package b43-fwcutter/1:019-8+deb12u1

2025-07-30 Thread Mathias Gibbens
On Mon, 2025-07-28 at 22:26 +0100, Jonathan Wiltshire wrote:
> Please go ahead.

  Uploaded, thanks.

Mathias


signature.asc
Description: This is a digitally signed message part