Re: [gentoo-dev] Proposal to end-of-life tree-clean old profiles/updates/ files

2012-12-10 Thread Ulrich Mueller
> On Mon, 10 Dec 2012, Sergei Trofimovich wrote:

> gentoo-x86/profiles/updates $ LANG=C ls -1 --sort=time
> [long list omitted]

> old entries are done in different context (comparing to 2012):

> - some packages change names 2 or 3 times
> - slots have different meaning

> moreover:

> -  if you set your PORTDIR to different directory you'll get all
>that full update. And will break the system. Old profile entries
>used to break eclass-manpages and latex-base (due to double
>renaming)

It's worse: Bad entries in the old files may go unnoticed for a long
time. But if such a file is updated for whatever reason, it will be
reprocessed on users' systems, including any bad entries contained in
it.

> Thus the reason for removal is simple: old entries are potentially
> buggy as nobody verifies them.

I wouldn't even know how to verify them.

Let's remove that cruft. We can be extra conservative and keep five
years of backlog (i.e. everything from before 2008 would be removed
now).

Ulrich



[gentoo-dev] Packages up for grabs

2012-12-10 Thread Benedikt Böhm
Due to limited time and resources these packages are up for grabs:

- app-shells/shish
- dev-db/mysqltuner
- dev-libs/dietlibc
- dev-libs/gecode
- net-analyzer/bwm-ng
- net-analyzer/nagios-check_mysql_health

These packages have been reduced to herd maintainers:

- media-libs/libraw
- media-libs/gexiv2


Re: [gentoo-dev] Proposal to end-of-life tree-clean old profiles/updates/ files

2012-12-10 Thread Michael Haubenwallner

On 12/10/2012 12:10 AM, "Paweł Hajdan, Jr." wrote:
>> I propose that we say, once a year, schedule a tree-cleaning of old
>> updates files.  These updates files could be added to a tarball made
>> available for download.  That way if they are needed to update a system
>> older than what the main tree has been tree-cleaned to. They can then be
>> manually downloaded, extracted to the normal location and then run the
>> "fixpackages" command.
> 
> I think that complicates the process. :-/ But maybe the advantages
> outweigh that.
> 
>> The main question here is what is a reasonable length of time to keep
>> the updates actively in-tree?
>>
>>  -- From my experience in the forums, I think any updates older than 
>> 4 years should be subject to tree-cleaning.  
> 
> Yeah, 4 years is ancient and would probably be non-trivial to update anyway.
> 
>>  -- Most old systems that have been updated tend to be less than that,
>> probably about 2 years.
> 
> 2 years seem reasonable.

For the records:
We do have some Gentoo box serving as VirtualBox host here, installed in early 
2010,
not updated since then, with an uptime of 836 days right now. It is subject to 
upgrade,
but there may come another year until that to happen ("never change a running 
system").
Although I do not expect the update to be trivial, keeping things like pkgmove 
for at
least 4 years sounds reasonable.

/haubi/



Re: [gentoo-dev] borked release media

2012-12-10 Thread Chí-Thanh Christopher Nguyễn
Greg KH schrieb:
> On Mon, Dec 10, 2012 at 12:21:29AM +0100, Chí-Thanh Christopher Nguyễn wrote:
>> Greg KH schrieb:
 No, all we need is to enable EFI stub support in the kernel, and
 integrate the initramfs using CONFIG_INITRAMFS_SOURCE and place it in
 some location where UEFI looks for it (/efi/boot/bootx64.efi).

 This has the disadvantage of not allowing to pass additional kernel
 parameters during boot. But it might still be an acceptable stopgap
 measure if the alternative is to not boot at all.
>>> No, don't do that for an "install" kernel, that way is madness, just use
>>> a real UEFI bootloader which can handle an initrd and the like properly
>> Can you explain what problems you see with that? How does
>> CONFIG_INITRAMFS_SOURCE handle initrd improperly?
> Ah, didn't notice that, it might work, have you tried it?

Yes, it works here.
This is the kernel which I used to boot my development box at work
(including genkernel initramfs for mdraid+luks+lvm):
http://dev.gentoo.org/~chithanh/efi/boot/bootx64.efi

It has hardcoded crypt_root and real_root via CONFIG_CMDLINE, and
initramfs executables are built with -march=bdver2 so this particular
file will probably not be useful to many people.


Best regards,
Chí-Thanh Christopher Nguyễn




Re: [gentoo-dev] borked release media

2012-12-10 Thread Maxim Kammerer
On Mon, Dec 10, 2012 at 2:52 AM, Rich Freeman  wrote:
> I really would like Gentoo to support a self-signed secure boot
> framework (obviously this would be for after the system is installed).

https://bugs.gentoo.org/show_bug.cgi?id=444830

You can see how such framework works by booting Liberté Linux 2012.3
on a machine with Secure Boot. Just extract the .zip file into USB key
root (or burn the .iso to CD), and import
EFI/Liberte-SecureBoot-CA.der certificate in UEFI Secure Boot
interface: http://dee.su/liberte-install (see “Secure Boot” section).

> The shim might work, but I'd hardly call it "secure boot" if every
> motherboard manufacturer and OEM in the world has the ability to sign
> things, even if MS vouched for them all.

I think there are some popular misunderstanding about the purpose of
shim. What shim essentially allows a user to do is to enroll custom
certificates into Secure Boot databases in an interactive,
user-friendly fashion (caveat emptor: I didn't try shim yet). It does
some clever UEFI API interaction and management of certificates in
protected variables, but the effect is identical to enrolling a
certificate into DB or KEK (OVMF names) via UEFI interface. Being
signed by MS is just a technical way to achieve that user
friendliness. So personally, I don't think that rushing to support
shim in Gentoo is that critical, since users can be expected to enroll
certificates by themselves.

-- 
Maxim Kammerer
Liberté Linux: http://dee.su/liberte



Re: [gentoo-dev] borked release media

2012-12-10 Thread Walter Dnes
On Sat, Dec 08, 2012 at 11:57:13PM -0500, Fernando Reyes wrote
> iirc the minimal install CD ISO is capable of booting from a USB device or 
> any removable media by just running the following commands. 
> 
> # isohybrid image.ISO
> # did if=image.ISO of=/dev/sdb bs=8192k
> 
> sdb being your removable device. Also keep in mind that any data on
> sdb will be wiped after running the dd command.

  Thanks.  Much easier than the instructions on the Gentoo wiki.

-- 
Walter Dnes 
I don't run "desktop environments"; I run useful applications



Re: [gentoo-dev] borked release media

2012-12-10 Thread Walter Dnes
On Sun, Dec 09, 2012 at 06:37:56PM -0800, Greg KH wrote

> Not necessarily, as I'm finding out with real hardware.  My only options
> on the box I have is to either zero out all keys, or specifically tell
> the BIOS what binary to run (doesn't need to be signed, and can not be
> changed after telling the BIOS to use it.)

  Howsabout the binary being Matthew Garret's chainloader shim as per
http://mjg59.dreamwidth.org/20303.html

> I'm working with others to see if we can programatically add keys,
> which we should, and if so we will offer the code up to do so (it's
> published already, we are working on getting it signed by the needed
> Microsoft keys right now.)

  He's already done the heavy lifting.  Aren't you re-inventing the
wheel?

-- 
Walter Dnes 
I don't run "desktop environments"; I run useful applications



Re: [gentoo-dev] borked release media

2012-12-10 Thread Greg KH
On Mon, Dec 10, 2012 at 10:31:25AM -0500, Walter Dnes wrote:
> On Sun, Dec 09, 2012 at 06:37:56PM -0800, Greg KH wrote
> 
> > Not necessarily, as I'm finding out with real hardware.  My only options
> > on the box I have is to either zero out all keys, or specifically tell
> > the BIOS what binary to run (doesn't need to be signed, and can not be
> > changed after telling the BIOS to use it.)
> 
>   Howsabout the binary being Matthew Garret's chainloader shim as per
> http://mjg59.dreamwidth.org/20303.html

That's a nice one, but note my previous comment about a bug in it at the
moment that prevents it from working on some hardware.  It's also a
valid solution for some implementations, have you tried it yourself?

> > I'm working with others to see if we can programatically add keys,
> > which we should, and if so we will offer the code up to do so (it's
> > published already, we are working on getting it signed by the needed
> > Microsoft keys right now.)
> 
>   He's already done the heavy lifting.  Aren't you re-inventing the
> wheel?

Not at all, we are sharing the same code base here, just two different
frontend implementations that do different things, with the same crypto
backend and local (MOK) key checking functionality, which was done by
SUSE.

Matthew's frontend "shim" code is nice and tiny, but the one I am
referring to provides the ability to enroll your own keys in the BIOS,
which shim does not.

Don't worry, we are all working together here, it's not like there is a
ton of people involved :)

greg "there is no cabal" k-h



Re: [gentoo-dev] borked release media

2012-12-10 Thread Maxim Kammerer
On Mon, Dec 10, 2012 at 8:36 PM, Greg KH  wrote:
> Matthew's frontend "shim" code is nice and tiny, but the one I am
> referring to provides the ability to enroll your own keys in the BIOS,
> which shim does not.

I just tried shim in OVMF, and it provides an interface to enroll keys
/ signatures. It works as advertised, even after enrolling “Microsoft
Corporation UEFI CA 2011” certificate into UEFI (instead of shim.efi
hash), which is supposedly trusted by vendors, but the keys and
signatures are only visible to shim — as I understand, it keeps them
in authenticated variables. I don't think the difference matters much
to the user. By the way, shim's interface is not much prettier than
the one provided by OVMF — I am a bit disappointed. :)

-- 
Maxim Kammerer
Liberté Linux: http://dee.su/liberte



[gentoo-dev] Getting EAPI 5 *use.stable.mask to work in gx86?

2012-12-10 Thread Michał Górny
Hello,

I think we're mostly aware what the use and benefits
of the *use.stable.mask files are.

They would be at least really useful in Python ebuilds, where we
have to either:

a) forcedly stabilize a particular Python implementation (like pypy),

b) don't support it all,

c) or just keep two package revisions around, one with 'stable' Python
implementations for stabilization and the other with all
implementations for testing users.


Therefore, having *use.stable.mask would be at least helpful to us. But
as far as I can see, the spec says we can use it only in profile dirs
with EAPI 5...

So far, I doubt anyone would want us to migrate our major profiles
to a newer EAPI, like EAPI 4, not to mention fresh 5. And of course,
that wouldn't follow our migration path practices.


Therefore, I see the following solutions:

1) duplicate most of the major profiles. Make an EAPI 5-enabled wrapper
profiles which will provide the *use.stable.mask files. Require users
to migrate to those profiles after getting an EAPI 5 capable package
manager (how?). Possibly mask the relevant flags completely in other
profiles.


2) change the rules. Make *use.stable.mask files not require EAPI 5
profile dirs but apply only to EAPI 5 packages. The outcome is similar
-- package managers without the feature ignore the ebuilds. If they
have EAPI 5, they should be able to handle stable unmasking as well.

Of course, it all falls apart because of package manager strictness.
We may want to change that retroactively and quickly release updated
package managers before the EAPI 5 support is spread wider (assuming
some transitional period before we will start using the files), or defer
it into EAPI 6.


Either way, I believe that *use.stable.mask would be very helpful if we
were able to use it. What are your thoughts?

-- 
Best regards,
Michał Górny


signature.asc
Description: PGP signature


Re: [gentoo-dev] Getting EAPI 5 *use.stable.mask to work in gx86?

2012-12-10 Thread Ian Stakenvicius
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 10/12/12 04:27 PM, Michał Górny wrote:
> Hello,
> 
> I think we're mostly aware what the use and benefits of the
> *use.stable.mask files are.
> 
> They would be at least really useful in Python ebuilds, where we 
> have to either:
> 
> a) forcedly stabilize a particular Python implementation (like
> pypy),
> 
> b) don't support it all,
> 
> c) or just keep two package revisions around, one with 'stable'
> Python implementations for stabilization and the other with all 
> implementations for testing users.
> 
> 
> Therefore, having *use.stable.mask would be at least helpful to us.
> But as far as I can see, the spec says we can use it only in
> profile dirs with EAPI 5...
> 
> So far, I doubt anyone would want us to migrate our major profiles 
> to a newer EAPI, like EAPI 4, not to mention fresh 5. And of
> course, that wouldn't follow our migration path practices.
> 
> 
> Therefore, I see the following solutions:
> 
> 1) duplicate most of the major profiles. Make an EAPI 5-enabled
> wrapper profiles which will provide the *use.stable.mask files.
> Require users to migrate to those profiles after getting an EAPI 5
> capable package manager (how?). Possibly mask the relevant flags
> completely in other profiles.
> 
> 
> 2) change the rules. Make *use.stable.mask files not require EAPI
> 5 profile dirs but apply only to EAPI 5 packages. The outcome is
> similar -- package managers without the feature ignore the ebuilds.
> If they have EAPI 5, they should be able to handle stable unmasking
> as well.
> 
> Of course, it all falls apart because of package manager
> strictness. We may want to change that retroactively and quickly
> release updated package managers before the EAPI 5 support is
> spread wider (assuming some transitional period before we will
> start using the files), or defer it into EAPI 6.
> 
> 
> Either way, I believe that *use.stable.mask would be very helpful
> if we were able to use it. What are your thoughts?
> 

I wonder how (2) would really differ from the current situation -- ie,
if there's a use.stable.mask file in a profiles dir, and portage is
too old to support it, doesn't it just get ignored?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iF4EAREIAAYFAlDGk/4ACgkQ2ugaI38ACPBkogEAsqOBZBa1n63+dkd/mz7XzFzy
XHoshXhY5kOMTMKz7NgBAI9JODGAp9VGlAZg2w7lOoAFTmvgQyElWY0AA/9Sn6h7
=rHGA
-END PGP SIGNATURE-



Re: [gentoo-dev] Getting EAPI 5 *use.stable.mask to work in gx86?

2012-12-10 Thread Michał Górny
On Mon, 10 Dec 2012 21:01:34 -0500
Ian Stakenvicius  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On 10/12/12 04:27 PM, Michał Górny wrote:
> > Hello,
> > 
> > I think we're mostly aware what the use and benefits of the
> > *use.stable.mask files are.
> > 
> > They would be at least really useful in Python ebuilds, where we 
> > have to either:
> > 
> > a) forcedly stabilize a particular Python implementation (like
> > pypy),
> > 
> > b) don't support it all,
> > 
> > c) or just keep two package revisions around, one with 'stable'
> > Python implementations for stabilization and the other with all 
> > implementations for testing users.
> > 
> > 
> > Therefore, having *use.stable.mask would be at least helpful to us.
> > But as far as I can see, the spec says we can use it only in
> > profile dirs with EAPI 5...
> > 
> > So far, I doubt anyone would want us to migrate our major profiles 
> > to a newer EAPI, like EAPI 4, not to mention fresh 5. And of
> > course, that wouldn't follow our migration path practices.
> > 
> > 
> > Therefore, I see the following solutions:
> > 
> > 1) duplicate most of the major profiles. Make an EAPI 5-enabled
> > wrapper profiles which will provide the *use.stable.mask files.
> > Require users to migrate to those profiles after getting an EAPI 5
> > capable package manager (how?). Possibly mask the relevant flags
> > completely in other profiles.
> > 
> > 
> > 2) change the rules. Make *use.stable.mask files not require EAPI
> > 5 profile dirs but apply only to EAPI 5 packages. The outcome is
> > similar -- package managers without the feature ignore the ebuilds.
> > If they have EAPI 5, they should be able to handle stable unmasking
> > as well.
> > 
> > Of course, it all falls apart because of package manager
> > strictness. We may want to change that retroactively and quickly
> > release updated package managers before the EAPI 5 support is
> > spread wider (assuming some transitional period before we will
> > start using the files), or defer it into EAPI 6.
> > 
> > 
> > Either way, I believe that *use.stable.mask would be very helpful
> > if we were able to use it. What are your thoughts?
> > 
> 
> I wonder how (2) would really differ from the current situation -- ie,
> if there's a use.stable.mask file in a profiles dir, and portage is
> too old to support it, doesn't it just get ignored?

Well, assuming the EAPI 5 support is applied at once, that portage
version will ignore EAPI 5 packages as well, making the file therefore
irrelevant.

-- 
Best regards,
Michał Górny


signature.asc
Description: PGP signature


Re: [gentoo-dev] Getting EAPI 5 *use.stable.mask to work in gx86?

2012-12-10 Thread Zac Medico
On 12/10/2012 01:27 PM, Michał Górny wrote:
> 1) duplicate most of the major profiles. Make an EAPI 5-enabled wrapper
> profiles which will provide the *use.stable.mask files. Require users
> to migrate to those profiles after getting an EAPI 5 capable package
> manager (how?). Possibly mask the relevant flags completely in other
> profiles.

I think this is the obvious solution. You can make users migrate by
adding "deprecated" files to the old profiles.
-- 
Thanks,
Zac