[gentoo-dev] Re: Packages up for grabs

2017-03-27 Thread Marek Szuba
On 2017-03-26 21:50, aide...@gentoo.org wrote:

> app-backup/burp
I'll grab this one unless anyone minds.

-- 
MS



signature.asc
Description: OpenPGP digital signature


[gentoo-dev] News item: changed default bedup configuration file in >=app-backup/burp-2.0.0

2017-04-19 Thread Marek Szuba

-- 
MS
Title: app-backup/burp: default config file for bedup
Author: Marek Szuba 
Posted: 2017-04-24
Revision: 1
News-Item-Format: 2.0
Display-If-Installed: app-backup/burp

Starting with version 2.0.54, the default configuration file of the
burp-aware deduplication tool bedup will change from

  /etc/burp/burp-server.conf

to

  /etc/burp/burp.conf .

The latter is the value used by upstream and with burp2 bedup being
a part of the main executable rather than a standalone tool,
maintaining old Gentoo behaviour would needlessly complicate the code.

If you want to keep using burp-server.conf with bedup, you can specify
it on the command line:

  bedup -c /etc/burp/burp-server.conf



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] News item: changed default bedup configuration file in >=app-backup/burp-2.0.0

2017-04-20 Thread Marek Szuba
On 2017-04-19 17:39, Gokturk Yuksek wrote:

>> Display-If-Installed: app-backup/burp
> Wouldn't you wanna limit this to <2.0.54 ? Otherwise this will pop
> up for the consumers of 2.0.54 as well.
Might as well, although at present there is no 2.0.54.

>> /etc/burp/burp.conf .
> You have an extra '.' at the end.
Yes, it's a full stop at the end of the sentence. Come to think of it it
looks confusing though, I'll remove it.

> I think upstream using the new path is enough justification, do you 
> really need to justify it any further?
It's not like that. Upstream has always used $sysconfdir/burp.conf , by
default however that file provides client-mode configuration and bedup
refuses to run unless it is pointed to a server-mode config file. Making
bedup use $sysconfig/burp-server.conf by default is achieved in burp-1
ebuilds through the means of a Gentoo patch.

> Maybe it's better to also provide a one-liner of 'mv' for people who 
> just want to upgrade to the new path.
It is not the matter of the config file having been renamed, burp has
always come with both burp.conf and burp-server.conf.

> Overall, my impression is that people handle conf file changes in 
> pkg_postinst() with REPLACING_VERSIONS rather than news items.
See above.

> How fatal are the consequences of not updating the conf file path?
> Would the program abort or misbehave?
Abort. Please note however that in a typical production scenario bedup
would be run periodically by cron or a similar tool, i.e. without admin
intervention, meaning that for everyone who doesn't review their logs
carefully backup deduplication would simply quietly stop working.

-- 
MS



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] Packages up for grabs

2017-04-27 Thread Marek Szuba
On 2017-04-27 12:58, Dirkjan Ochtman wrote:

> The proxy maintainer for syncthing just resigned, anyone want to pick
> it up?
I'll take it.

-- 
MS



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] Re: taking a break from arches stabilization

2017-07-12 Thread Marek Szuba
On 2017-07-12 00:26, Kristian Fiskerstrand wrote:

>> Question is what's more a problem: Having an outdated stable
>> package because nobody cared about stabilizing a new version (in
>> most cases this will end with a rushed stabilization once a
>> security bug was fixed in the package) or move a package in time
>> from ~ARCH to ARCH and deal with the fallout sometimes.
> Easy, keep the working package any time
Seconded.

That said, let me repeat something I mentioned during the last
discussion about stabilisation procedures: for me at least the problem
with stabilisation has never really been with version upgrades, it's
with packages which do not even have a single stable version. For
reference, as of right now my "version bump" keyword file lists 8 atoms
(half of them referring to GIMP-2.9, which should not be stabilised
anyway) - whereas my "not in stable" file lists 61.

-- 
MS



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] [RFC] Future of gentoo's stable and unstable trees: what are your thoughts?

2017-07-28 Thread Marek Szuba
On 2017-07-28 12:43, Andreas K. Huettel wrote:

>> I continue to feel that maintaining two worlds (stable+unstable) 
>> carries with it an unneccessary cost.
> That's not feasible. It would kill off any semi-professional or
> professional Gentoo use, where a minimum of stability is required.
This. VERY much this. I do not care about having all the latest stuff on
work machines, what I want them is to a) remain up to date
security-wise, and b) actually survive updates. In fact, problems with
the latter was what led us a couple of years ago to quickly conclude
evaluation of a certain other rolling-upgrade operating system.

-- 
MS



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] New item for sys-kernel/hardened-sources removal

2017-08-16 Thread Marek Szuba
On 2017-08-15 17:01, Francisco Blas Izquierdo Riera (klondike) wrote:

> I'd like to get this one up by Saturday so that we can proceed with
> masking and removing of the hardened-sources after upstream stopped
> releasing new patches.
> 
> This is my first time writting a news item so all input will be appreciated.

Two tiny bits of formal nitpicking from my side:
 - it's "grsecurity" (not a typo, they do use a lowercase g except when
the name appears at the beginning of a sentence), not "grsec";
 - the patches were not *distributed by* grsecurity, they *are*
grsecurity. The vendor's name is Open Source Security, Inc.


-- 
Marecki



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] Changing PMS to Portage Manager Specification

2017-08-16 Thread Marek Szuba
On 2017-08-14 23:46, William L. Thomson Jr. wrote:

> pkgcore - does not support EAPI 6, only experimental EAPI 5

Side note - according to

https://wiki.gentoo.org/wiki/Project:Package_Manager_Specification

pkgcore has supported EAPI 6 since version 0.9.3. Considering it says
exactly the same for EAPI 5, this is almost certainly a mistake - but
I'd rather confirm this here before changing the page.

-- 
Marecki



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] Last rites: net-misc/asterisk-g729, sci-libs/coinhsl, some games-*/* (BLAKE2B)

2018-05-21 Thread Marek Szuba
On 2018-05-15 22:49, Michał Górny wrote:

> # Michał Górny  (15 May 2018)
> # Remaining fetch-restricted game packages missing BLAKE2B hashes.
> # Please provide updated hashes if you have the matching distfiles.
> # Bug #642876.  Removal in 30 days.

I have got access to several of these but it turns out that in most
cases one has to do more than merely recompute the digests. I reckon it
is up to the maintainers to decide whether to proceed after all or let
the packages quietly expire.

> games-action/shadowgrounds-bin
> games-action/shadowgrounds-survivor-bin

I updated these two on Friday. Left them masked for now though, just in
case the games project is not interested in maintaining them after all -
both use deprecated EAPI version and eclasses.

> games-action/trine2

I have only got archives for Trine 2 Complete Edition, i.e. the version
with the Goblin Menace expansion included. At a glance it seems the
ebuild should work with that one as well but it WOULD be changing the
product served by the package.

> games-rpg/bastion

The archives from HumbleBundle.com seem to be completely different from
what the ebuild uses right now.

> games-rpg/penumbra-collection

The latest version available from HumbleBundle.com depends on
media-libs/libsdl2 and friends rather than media-libs/libsdl. Otherwise
seems okay.

-- 
Marecki



signature.asc
Description: OpenPGP digital signature


[gentoo-dev] Last rites: app-misc/subsurface

2016-09-09 Thread Marek Szuba
# Martin Gysel  via g-p-m (09 Sep 2016)
# Versions currently in Portage are old and block removal of other
# packages. Current versions require building against modified versions
# of dev-libs/libdivecomputer and kde-apps/marble which must be fetched
# from Git, and which are not versioned (upstream uses branch tags).
# Finally, upstream considers distribution-maintained packages deprecated.
# Removal in 30 days.
app-misc/subsurface




signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] Last rites: app-misc/subsurface

2016-09-12 Thread Marek Szuba
On 2016-09-11 14:19, Martin Gysel wrote:

>> +1.  Any package whose upstream says "don't build this yourself" is
>> hostile to open source principles. 
> just to make it clear, upstream never said such thing nor are they in
> any way hostile to open source principles (I suppose you wouldn't state
> that if you know subsurface's developers).
They have, however, used the term "deprecated" to describe
distribution-maintained packages. It's right there on the download page.

And yes, I know (and so do at least several other devs) that one of the
major contributors to Subsurface is one Linus Torvalds.

-- 
MS



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] [RFC] New USE_EXPAND: LLVM_TARGETS

2016-09-27 Thread Marek Szuba
On 2016-09-27 22:51, Raymond Jennings wrote:

> Doesn't VIDEO_CARDS factor in on xorg-server's video driver
> selection?
It does. Which is why with the way things are now, and which Michał's
proposal should improve, someone with an amdgpu-compatible card will
still have xf86-video-ati lying around - VIDEO_CARDS=radeon will pull it in.

-- 
MS



signature.asc
Description: OpenPGP digital signature


[gentoo-dev] News item: migration from sys-cluster/singularity to app-containers/apptainer

2022-02-22 Thread Marek Szuba
Dear everyone,

This should be a fairly straightforward thing for the users to do but
since manual intervention IS necessary, let us have a news item about
it! The date is a placeholder because apptainer upstream has not
released 1.0.0 yet, that said I want to have the news item ready for
publication as soon as they have (I've already got the ebuild ready).

As usual, comments and suggestions are most welcome.

-- 
Marecki





[gentoo-dev] [PATCH] Add 2022-03-01-singularity_to_apptainer

2022-02-22 Thread Marek Szuba
Signed-off-by: Marek Szuba 
---
 ...2022-03-01-singularity_to_apptainer.en.txt | 27 +++
 1 file changed, 27 insertions(+)
 create mode 100644 
2022-03-01-singularity_to_apptainer/2022-03-01-singularity_to_apptainer.en.txt

diff --git 
a/2022-03-01-singularity_to_apptainer/2022-03-01-singularity_to_apptainer.en.txt
 
b/2022-03-01-singularity_to_apptainer/2022-03-01-singularity_to_apptainer.en.txt
new file mode 100644
index 000..150c947
--- /dev/null
+++ 
b/2022-03-01-singularity_to_apptainer/2022-03-01-singularity_to_apptainer.en.txt
@@ -0,0 +1,27 @@
+Title: Transition from sys-cluster/singularity to app-containers/apptainer
+Author: Marek Szuba 
+Posted: 2022-03-01
+Revision: 1
+News-Item-Format: 2.0
+Display-If-Installed: sys-cluster/singularity
+
+In autumn 2021 the Singularity project joined the Linux Foundation
+and changed its name to Apptainer [1]. The change has been reflected
+in the renaming of executables/configuration files and environment
+variables, as well as a reset of version numbers back to 1.0.0.
+
+Apptainer packages include compatibility symlinks to old Singularity
+executables, continue to honour old environment variables and will upon
+the first run import user data from Singularity directories. Therefore,
+for most users it will be sufficient to deselect the old package and
+install the new one, e.g.:
+
+emerge --deselect sys-cluster/singularity
+emerge app-containers/apptainer
+
+However, customisations made to system-wide configuration
+in /etc/singularity will have to be applied to /etc/apptainer by hand,
+and since the bash-completion rule file has been renamed as well any and
+all customisations here will have to be updated accordingly as well.
+
+[1] https://apptainer.org/news/community-announcement-20211130/
-- 
2.34.1




Re: [gentoo-dev] proposal: use only one hash function in manifest files

2022-04-07 Thread Marek Szuba

On 2022-04-06 19:34, Rich Freeman wrote:


This is one of those low cost, low risk, high reward situations IMO.


*puts on Council hat*

The above pretty much covers my own opinion on the subject.

--
Marecki


OpenPGP_signature
Description: OpenPGP digital signature


[gentoo-dev] News item: breaking change to app-backup/borgmatic user-configuration handling

2022-05-18 Thread Marek Szuba
A couple of breaking changes have been introduced in borgmatic-1.6.0.
Only some borgmatic users will be affected but seeing as it is a backup
tool, I feel it does warrant a news item.

-- 
Marecki






[gentoo-dev] [PATCH] 2022-05-20-borgmatic-config-changes: new item

2022-05-18 Thread Marek Szuba
Signed-off-by: Marek Szuba 
---
 .../2022-05-20-borgmatic-config-changes.en.txt | 14 ++
 1 file changed, 14 insertions(+)
 create mode 100644 
2022-05-20-borgmatic-config-changes/2022-05-20-borgmatic-config-changes.en.txt

diff --git 
a/2022-05-20-borgmatic-config-changes/2022-05-20-borgmatic-config-changes.en.txt
 
b/2022-05-20-borgmatic-config-changes/2022-05-20-borgmatic-config-changes.en.txt
new file mode 100644
index 000..672a0fe
--- /dev/null
+++ 
b/2022-05-20-borgmatic-config-changes/2022-05-20-borgmatic-config-changes.en.txt
@@ -0,0 +1,14 @@
+Title: Breaking configuration changes in borgmatic-1.6.0
+Author: Marek Szuba 
+Posted: 2022-05-20
+Revision: 1
+News-Item-Format: 2.0
+Display-If-Installed: app-backup/borgmatic
+
+Version 1.6.0 of app-backup/borgmatic has introduced some breaking
+changes to the way Borgmatic handles the merging of its configuration
+files and executes command hooks. If you use these features, please
+review your Borgmatic config files to make sure they continue to work
+correctly with >=app-backup/borgmatic-1.6.0. For details, see [1].
+
+[1] https://github.com/borgmatic-collective/borgmatic/releases/tag/1.6.0
-- 
2.35.1




[gentoo-dev] Re: Packages up for grabs: e.g. www-servers/nginx, www-apps/nikola, app-admin/rsyslog, ...

2022-06-08 Thread Marek Szuba

On 2022-06-05 09:28, Joonas Niilola wrote:


sys-process/incron


I'll take this one, with Infra as fallback maintainers.

--
Marecki


OpenPGP_signature
Description: OpenPGP digital signature


[gentoo-dev] Re: Packages up for grabs: x11-misc/lightdm, sys-apps/fwupd, net-im/pidgin, media-sound/mumble, app-emulation/virtualbox, app-editors/nano, app-shells/zsh and more

2022-06-29 Thread Marek Szuba

On 2022-06-29 08:15, Joonas Niilola wrote:


acct-group/lightdm
acct-user/lightdm
app-admin/keepassxc
mail-mta/msmtp
sys-apps/gptfdisk
sys-apps/lm-sensors
sys-fs/ddrescue
x11-misc/lightdm
x11-misc/lightdm-gtk-greeter


I'll take these.

--
Marecki


OpenPGP_signature
Description: OpenPGP digital signature


Re: [gentoo-dev] Packages up for grabs: x11-misc/lightdm, sys-apps/fwupd, net-im/pidgin, media-sound/mumble, app-emulation/virtualbox, app-editors/nano, app-shells/zsh and more

2022-06-29 Thread Marek Szuba

On 2022-06-29 08:35, Sam James wrote:


dev-libs/libxmlb
dev-libs/libjcat
sys-apps/fwupd
sys-apps/fwupd-efi
sys-libs/libblockdev
sys-libs/libsmbios


This is the fwupd stack.

I'm tempted for these but I only have one machine which uses them.

I'll see if anyone else is a better set of hands first.


Sorry, I'd assumed libjcat was here as it's AFAIK only useful really for fwupd, 
but it wasn't in the original list.

But may still be relevant if interested in fwupd. Would need to speak to 
Marecki if you are interested though.


A second pair of hands on the whole lot (I have always co-maintained 
dev-libs/libjcat with poly-c, and had already added myself to 
sys-apps/fwupd before the for-grabs call went out due to having observed 
my ticket for it having been dropped to m-n; will add myself to the rest 
shortly) will definitely be welcome! They have, sadly, been a bit 
neglected of late.


--
Marecki


OpenPGP_signature
Description: OpenPGP digital signature


[gentoo-dev] gnome-extra/gtkhtml: last rites

2022-06-30 Thread Marek Szuba

A GNOME 2-era library with no consumers left in the tree, marked
as deprecated since March 2022. Removal in 30 days (Bug #855299).

--
Marecki


OpenPGP_signature
Description: OpenPGP digital signature


Re: [gentoo-dev] Switching default password hashes from sha512 to yescrypt

2022-07-25 Thread Marek Szuba

On 2022-07-25 15:35, Peter Stuge wrote:


Mikhail Koliada wrote:

This idea has been fluctuating in my head for quite a while given
that the migration had happened a while ago [0] and some other
major distributions have already adopted yescrypt as their default algo
by now [1].


Please only do that based on proven merit and nothing else.


https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/ 
, https://www.password-hashing.net/ , the fact we still us the default 
number of rounds (i.e. 5000) with SHA512 which is *ridiculously* weak 
for modern hardware, lack of Argon2 support in libxcrypt for the time 
being due to upstream having decided to wait for an official RFC. You 
can probably find more yourself if you look.


--
Marecki


OpenPGP_signature
Description: OpenPGP digital signature


Re: [gentoo-dev] Add systemd/merged-usr profiles

2022-09-05 Thread Marek Szuba

On 2022-08-31 17:27, Mike Gilbert wrote:


The only pain point I see is for users with /usr on a separate
filesystem and that are not using an appropriate initramfs.


As mentioned on IRC earlier on today, another (although this would be 
less of a pain point and more of a sneaky changes to run-time behaviour 
of a system) might be ebuilds which rely on PATH precedence of /usr/bin 
over /bin to override binaries installed in the latter by other 
packages. Some examples:


 - app-arch/lbzip2[symlink] - installs /usr/bin/b{,un}zip2 to override 
/bin/b{,un}zip2 installed by app-arch/bzip2;


 - app-arch/pigz[symlink] - ditto for g{,un}zip and app-arch/gzip;

 - app-arch/gzip installs the symlink /bin/uncompress pointing to 
gunzip, app-arch/ncompress installs /usr/bin/uncompress pointing to 
compress.


There probably are more though, and I feel these will all need a 
systemic change - eselect modules? shell aliases? - to how such 
overrides are handled. Still, for the time being packages which have 
such behaviour controlled by USE flags should me added to 
package.use.force of relevant profiles.


--
Marecki


OpenPGP_signature
Description: OpenPGP digital signature


[gentoo-dev] RFC: virtual/dbus

2022-09-07 Thread Marek Szuba

Dear everyone,

I wonder if we should create a virtual package to allow our users - or 
at least those who run systemd anyway - to choose between sys-apps/dbus 
and sys-apps/dbus-broken as D-Bus implementation for their systems. The 
usual "Gentoo is about choice" thing aside, there is now at least one, 
security-related, problem with the former which can be worked around by 
switching to the latter: https://github.com/systemd/systemd/issues/22737


WDYT?

PS. Cc'ing maintainers of both packages to see what they might have got 
to say about this.


--
Marecki


OpenPGP_signature
Description: OpenPGP digital signature


[gentoo-dev] Re: RFC: virtual/dbus

2022-09-08 Thread Marek Szuba

On 2022-09-07 17:29, Mike Gilbert wrote:


A virtual seems a bit pointless for the following reasons:

[...]
> 2. dbus-broker[launcher] utilizes config files installed by dbus, and
> actually RDEPENDs on sys-apps/dbus for that reason.

Yeah, I failed at reading - even the README of dbus-broker clearly 
states "You still need the dbus reference implementation installed, 
since it provides tools used by many applications, as well as the 
dbus.socket unit file."



If you can think of some way to encourage users to install/enable
dbus-broker, that seems like a good idea to me.


Makes sense, I'll think about it.

--
Marecki


OpenPGP_signature
Description: OpenPGP digital signature


Re: [gentoo-dev] Re: RFC: virtual/dbus

2022-09-08 Thread Marek Szuba

On 2022-09-07 17:36, John Helmert III wrote:


If you find a security issue, please file a security bug. I'm not
really sure what the security impact of this is, though.


I'm not sure if this is a security issue per se (which is why I 
described it as security-related), here - the default configuration IS 
the more secure one.


> I'm not really sure what the security impact of this is, though.

The impact is that systemd+dbus-daemon users currently have to disable 
DynamicUser functionality for units communicating over D-Bus in order 
for said communication to actually work.


--
Marecki


OpenPGP_signature
Description: OpenPGP digital signature


[gentoo-dev] Co-maintainer needed for app-admin/ansible-lint

2022-11-01 Thread Marek Szuba

Dear everyone,

I really could use a hand with app-admin/ansible-lint. Not that it is 
exactly complicated to maintain, quite the opposite - it's just that 
upstream has adopted a rather rapid release cycle and now it feels that 
as soon as I have tested and pushed an ebuild for a version, another one 
pops up. And that's even without creating tarballs of Ansible Galaxy 
collections used by the test suite, which is something I would very much 
like to introduce at some point so that we no longer have to skip so 
many tests.


All offers gratefully received!

--
Marecki


OpenPGP_signature
Description: OpenPGP digital signature


[gentoo-dev] Last rites: app-editors/elvis

2022-12-05 Thread Marek Szuba
No releases since 2003 (!), upstream effectively dead, no Unicode 
support, EAPI 6. Removal in 30 days (#884429)


--
Marecki


OpenPGP_signature
Description: OpenPGP digital signature


[gentoo-dev] Last rites: app-dicts/sword-* app-text/sword-modules

2023-01-26 Thread Marek Szuba

# Upstream keeps the module files unversioned so it is only the use of
# mirroring that has prevented us from seeing regular hash mismatches
# - and it is not clear for many of the modules whether we are allowed
# to mirror them or not. A convoluted and fragile process has been
# required to detect new modules and versions, and the request for a
# Repology-friendly upstream endpoint appears to have stalled.
# Please switch to managing SWORD modules on a per-user basis, using
# tools bundled with app-text/sword (see e.g.
# 
https://wiki.crosswire.org/SWORD_Module_Source_Discovery_and_Module_Updating)

# or appropriate functionality in GUI front-end software.
# Removal in 30 days. Bug #892069.

--
Marecki


OpenPGP_signature
Description: OpenPGP digital signature


[gentoo-dev] Breaking changes in dev-libs/msgpack-5.0.0

2023-02-06 Thread Marek Szuba

Dear everyone,

Having not been given any love for a long time, we have now got in the 
tree a version of dev-libs/msgpack newer than 3.3.0 - namely 5.0.0. Yes, 
we have managed to skip the entire major version 4 (yay?)! Anyway, the 
version in question introduces at least two breaking changes:


 - since 4.0.0, the (header-only) C++ library is no longer bundled with 
the C one. As a consequence, a new(ish) package dev-cpp/msgpack-cxx has 
been introduced and  >=dev-libs/msgpack-5.0.0 no longer provide 
IUSE="boost cxx";


 - since 5.0.0 CMake modules for both the C and the C++ variant of 
msgpack have different names, which might break cmake-based revdeps 
which have not been updated accordingly.


In light of the above, both dev-cpp/msgpack-cxx and 
>=dev-libs/msgpack-5.0.0 are currently masked in order to give the 
maintainers of msgpack devreps ample time to test compatibility with the 
new versions. They will, however, be unmasked on the 3rd of March unless 
major problems are encountered with the revdep update. There is a 
tracker bug "msgpack-5" which can be used to group related issues.


On behalf of the Vim project,
--
Marecki



OpenPGP_signature
Description: OpenPGP digital signature


Re: [gentoo-dev] Breaking changes in dev-libs/msgpack-5.0.0

2023-02-06 Thread Marek Szuba

On 2023-02-06 15:57, Michał Górny wrote:


Given there's only a handful of revdeps, perhaps you could simply test
them?


I can and have in fact already begun, starting with packages affected by 
IUSE changes. Can't hurt to let maintainers know, though!


--
Marecki



OpenPGP_signature
Description: OpenPGP digital signature


[gentoo-dev] Packages up for grabs: media-gfx/rawtherapee media-libs/libiptcdata

2023-02-24 Thread Marek Szuba


In light of the current (proxied) maintainer having stated they no 
longer have a Linux desktop and therefore expect difficulties in 
continuing to maintain their packages,


media-gfx/rawtherapee
and
media-libs/libiptcdata

are now up for grabs. Both are up to date in the tree. They have also 
got one open bug each - the former might need a dependency update, the 
latter appears to fail a documentation-consistency check when emerged 
with USE=doc.


--
Marecki


OpenPGP_signature
Description: OpenPGP digital signature


[gentoo-dev] [RFC PATCH] Add Ansible package-stabilisation group

2023-08-21 Thread Marek Szuba
This is very much for future reference, seeing as stabilisation groups
are still very much work in progress. Anyway, the point here is to make
it easier to avoid in the future the fairly regular occurrence of
Portage complaining about having to hold back newly stabilised Ansible
Core owing to version restrictions set in Ansible ebuilds.

-- 
Marecki





[gentoo-dev] [PATCH] metadata: Add stabilisation group for Ansible

2023-08-21 Thread Marek Szuba
Signed-off-by: Marek Szuba 
---
 metadata/stabilization-groups/ansible | 2 ++
 1 file changed, 2 insertions(+)
 create mode 100644 metadata/stabilization-groups/ansible

diff --git a/metadata/stabilization-groups/ansible 
b/metadata/stabilization-groups/ansible
new file mode 100644
index 000..b259400a0fc
--- /dev/null
+++ b/metadata/stabilization-groups/ansible
@@ -0,0 +1,2 @@
+app-admin/ansible
+app-admin/ansible-core
-- 
2.41.0




[gentoo-dev] Last rites: media-gfx/gmic

2023-10-25 Thread Marek Szuba

Upstream uses a massive home-made Makefile which has since the beginning
required massive amounts of patching to make it behave reasonably
(as well as to fix the problems which ostensibly led upstream to
abandoning CMake, and which they immediately re-introduced in their NIH
solution) and which if anything have only got worse since then. One,
optional, reverse dependency in the tree.
Removal on 2023-11-26. Bug #916289.

--
Marecki


OpenPGP_signature.asc
Description: OpenPGP digital signature


[gentoo-dev] Package up for grabs: media-gfx/gmic

2023-10-27 Thread Marek Szuba
Currently last-rited but since it seems there is interest in keeping it 
in the tree, I have just returned it to the state in which it was before 
I took over its maintenance 3 years ago (i.e. m-n). To anyone willing to 
put up with the updates of the megapatch, the regularly emerging QA 
issues and the unresponsive upstream: good luck. You will need it.


A request (and, to make it absolutely clear, nothing more than a 
request): PLEASE don't unmask gmic unless it gets a new maintainer. 
We've got enough junk packages as it is.


--
Marecki


OpenPGP_signature.asc
Description: OpenPGP digital signature


[gentoo-dev] Re: Last rites: media-gfx/gmic

2023-10-27 Thread Marek Szuba

On 2023-10-26 02:29, Jonas Stein wrote:


this is a very powerful package with many users.


...but sadly, very few maintainers. It was m-n when I took it over 3 
years ago, as apparently no-one found it worth looking after following 
the disbanding of the Graphics project - and that was back when upstream 
still used CMake! Telling the truth I wasn't exactly interested either, 
it's just that it happened to be an optional dependency of 
media-gfx/darktable.



Thank you for maintaining it till now.


You're very welcome!

Could you address the exact problems to upstream, so they are aware and 
can improve it?
I think not only Gentoo, but also other distributions suffer if it does 
not build smooth.


I used to do that. It seemed to have little to no effect so in the end I 
just gave up.


Looks to me as if the package is not broken now, but there is a lack of 
manpower to update it. 30 days is the minimum for a removal.


There are two outstanding QA issues (ignored LDFLAGS and pre-stripped 
binaries) in 3.3.1 pertaining to USE=gimp and USE=qt5. Prior to adding 
that version I tried to leverage qmake-utils.eclass in the Qt parts of 
the package, which hopefully would have got rid of these issues - but 
resulted in a wall of actual errors. This has been the last straw as far 
as me maintaining G'MIC is concerned.



I suggest to keep it for a few more months.


Fine by me if someone actually maintains it. I've just dropped 
media-gfx/gmic back to m-n to make it clear that I do not intend to 
block it from being reactivated.


--
Marecki



OpenPGP_signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] Re: Last rites: media-gfx/gmic

2023-10-27 Thread Marek Szuba

On 2023-10-26 04:41, Eli Schwartz wrote:

This is of course either untrue or every kind of over-reaction, and 
users have commented there to the effect of being willing to help

sort things out but there has been radio silence.


...which, sadly, has been my _overall_ experience with G'MIC upstream.


I think this also offers some compelling arguments against
maintainers being willing to  deal with the challenges of this
software -- this is a pretty steep social cost to investing time and
effort into caring about, using, or maintaining such software.


Given where this package has come from, I have got a nagging feeling
that its maintainers suffer from a problem that is fairly common among
computational scientists (and before anyone gets offended, a quick
reminder that I myself am in fact a computational scientist... Plus just
have a look at what many sci-* ebuilds have to look like) - namely that
however brilliant they might be at devising algorithms, they are rather
less adept at developing actual software.

Consider some of the issues I have come up against while maintaining 
this package (disclaimer: I haven't checked if any of these have been 
fixed in Git since the release of 3.3.1:


 - the reason for the megapatch, i.e. features being enabled 
automagically depending on the presence/absence of dependencies at build 
time. Not that big of a problem for end-users but very much 
distro-unfriendly;


 - one of the alleged reasons for G'MIC upstream to have switched from 
CMake to a hand-crafted Makefile (and one which said Makefile still 
fails to fix), namely building without X11 support. Given all that is 
needed to address the issue is something along the lines of "if !X11 
CFLAGS+=-Dcimg_display=0", I simply do not understand why this remains open;


- the use of RPATH="." with shared libraries in spite of it being widely 
considered a security risk, and apparently without any actual reason 
(media-gfx/gmic appears to work perfectly well with the relevant linker 
flag patched out);


- the use of backslash-whitespace construct in the hand-crafted Makefile 
causes build issues on systems with grep 3.8 or newer. For the record, 
GNU grep-3.8 was released over a year ago and Gentoo is now on 3.11;


- downright broken target dependency chains, even with -j1 (that bit 
falls under "if anything, the handcrafted Makefile has got worse since 
its introduction");


- a rather quirky way of locating the GIMP plug-in directory, including 
attempting to write to that directory when it hasn't been located - or 
even when the GIMP plug-in is not to be built.


I rest my case.


Marecki -- is there any specific concern that it's likely to rot
quickly if it lacks a maintainer?


The megapatch has to be updated on a fairly regular basis so at the very 
least, we would end up without updates. On top of that we have got the 
usual problems cropping up every time we add a new gcc/clang version, 
having to support MUSL (let's be honest, even among the more mature 
projects testing against non-glibc is rare), slibtool... So yes, I 
consider media-gfx/gmic very likely to rot quickly without continuous 
maintenance.


--
Marecki


OpenPGP_signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] RFC: banning "AI"-backed (LLM/GPT/whatever) contributions to Gentoo

2024-02-27 Thread Marek Szuba

On 2024-02-27 14:45, Michał Górny wrote:


In my opinion, at this point the only reasonable course of action
would be to safely ban "AI"-backed contribution entirely.  In other
words, explicitly forbid people from using ChatGPT, Bard, GitHub
Copilot, and so on, to create ebuilds, code, documentation, messages,
bug reports and so on for use in Gentoo.


I very much support this idea, for all the three reasons quoted.

2. Quality concerns.  LLMs are really great at generating plausibly 
looking bullshit.  I suppose they can provide good assistance if you

are careful enough, but we can't really rely on all our contributors
being aware of the risks.


https://arxiv.org/abs/2211.03622


3. Ethical concerns.


...yeah. Seeing as we failed to condemn the Russian invasion of Ukraine 
in 2022, I would probably avoid quoting this as a reason for banning 
LLM-generated contributions. Even though I do, as mentioned above, very 
much agree with this point.


--
Marecki


OpenPGP_signature.asc
Description: OpenPGP digital signature


[gentoo-dev] Package up for grabs: net-misc/connman-gtk

2024-05-15 Thread Marek Szuba

Dear everyone,

After over a decade of standing behind Connman, I have in recent months 
come to the conclusion that there are now better (or at least 
better-documented) network-management solutions available for all of my 
use cases. As a result, I no longer use net-misc/connman-gtk .


This is essentially a zero-maintenance package - it has seen very, very 
few bugs since having been added to the tree, it continues to work fine 
for the time being, and I have just bumped it to EAPI 8. However, it has 
currently got no upstream (the relevant GitHub repository got archived 
in 2021) so if/when changes to its dependencies or to the toolchains 
eventually render it non-functional, the future maintainer will likely 
be on their own. Were I still there at that point in time I would 
probably just last-rite it, then again perhaps there is someone here 
able and willing to give this tool a fighting chance!


--
Marecki


OpenPGP_signature.asc
Description: OpenPGP digital signature


[gentoo-dev] Retirement

2024-06-12 Thread Marek Szuba

Dear everyone,

I hesitated for quite a while before making this decision, mostly due to 
"if not me, who else?" considerations - but in the end, I feel the time 
has come for me to hand in my OpenPGP keys and retire from Gentoo 
development at the end of June.


These ~8 years have been a very interesting time for me, not in the 
least thanks to my involvement in getting Gentoo Linux ready for 64-bit 
RISC-V and my term on the Council. That said, when Roy mentioned in 
response to one of the other recent retirements that this is supposed to 
be fun, I realised that - with all the obscure test failures I was never 
able to reproduce, the perennial battles for compatibility with 
alternative toolchains and MUSL, the loss of co-maintainers of several 
packages, the growing number of bugs specific to arches I haven't got 
much interest in as far as Gentoo is concerned, and the changes to my 
personal circumstances which began about 2 years ago and have yet to 
conclude - that this has been anything *but* fun for me lately.


I am planning to spend the next 2.5 weeks tackling at least part of my 
current bug backlog. Will see how far ahead I can get with this.


Thank you for your work, ladies and gentlemen of Gentoo. And good luck.

--
Marecki


OpenPGP_signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] Packages up for grabs: app-misc/gramps, dev-libs/granite, media-gfx/sane-frontends, media-gfx/yafaray, net-dialup/freeradius, sys-apps/miller

2018-10-10 Thread Marek Szuba
On 2018-10-09 21:58, Michał Górny wrote:

> app-misc/gramps

Having actually worked together with the proxied maintainer on
introducing version 4 into the tree, I'll take this one.

-- 
MS



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] Best way to create a GLEP 63 compliant GPG key on Nitrocard?

2019-04-24 Thread Marek Szuba
On 2019-04-24 13:41, Rich Freeman wrote:

> What is the recommended way to create an on-card key?

I haven't got my NitroKey yet but between the specifications (which say
NK2 can hold up to 3 private RSA keys) and my prior experience with
OpenPGP smartcards (which have always had at most one slot each assigned
to authentication, encryption and signing), chances are pretty high you
cannot have two separate signing keys in hardware. If so, your best bet
is probably to generate the primary key in software (preferably with
usage bits stripped down so that it can ONLY be used for signing keys),
generate hardware subkeys associated with it, then stash the private
primary key away somewhere.

-- 
MS



Re: [gentoo-dev] Best way to create a GLEP 63 compliant GPG key on Nitrocard?

2019-04-25 Thread Marek Szuba
On 2019-04-24 20:34, Rich Freeman wrote:

> The only reason to have a separate primary key is to have an offline
>  copy,

Not quite. First and foremost, you don not want to have an offline copy
of the primary private key - you want to have the primary ENTIRELY
offline. Secondly, the reason for that is not (just) to have a backup
but that the primary private key gives you virtually unlimited control.
Create pretty much any number of additional subkeys? Check. Assign
additional user IDs? Check. Change expiration dates? Check. And so on...
In short, having the primary private key compromised means A LOT of
trouble - and not just for the key owner either, the primary is also
used to sign other people's public keys so it could mess up other users'
trust databases.

> So, maintaining this requirement with a Nitrokey means that we in 
> reality have the primary key online most of the time,

Seeing as separating the primary and the signing key has been part of
OpenPGP best practices for a long, long time, I have got highly mixed
feelings about this statement. On the one hand, it is not reasonable to
expect someone with no or minimal prior knowledge of OpenPGP to master
it overnight. On the other, we are not just some random people from Teh
Intarwebz and we *have* been using OpenPGP signatures on commits for
quite a while now.

> when if it were the same as the signing key then both would be 
> offline in the Nitrokey.

Using a hardware security device is not the same as making the key
offline - especially given that the Gentoo NitroKey workflow as
currently posted on the Wiki suggests disabling forcesig, which could
effectively leave the signing private key unlocked for extended periods
of time.

> Also, by generating the key outside the Nitrokey it is exposed to a 
> far higher risk of compromise.

As Kristian has already mentioned, in principle one could keep the
primary private key on a separate token.

> In any case, I think it is far more likely that somebody generating 
> keys using software has a rooted box than somebody is going to come 
> up with a way to extract keys from a Nitrokey.

You do not have to extract keys from a smartcard in order to be able to
use keys physically present on it. All you have to do observe the
smartcard user's PIN - either physically or using said rooted box - then
nick the smartcard off them, ehich given that we are talking about keys
that are supposed to be used on a regular basis might be very simple.
Hell, if said smartcard contains the primary key you might even return
it to them once you're done compromising them (e.g. by generating your
own set of subkeys) and chances are pretty good that as long as
everything keeps on working fine for them, it will take a quite a while
before anyone notices.

Conversely, even a software-generated primary key stored on a
software-encrypted USB stick might be more secure simply because with it
being only occasionally required, it can be stored somewhere hard to
access. You don't even need a vault (which, incidentally, is something I
have found people trying to make fun of crypto nerds mention a lot)
either - my personal experience has taught me that giving to a trusted
family member or friend who doesn't live with you is not a bad solution
either.

> Really the only thing we're missing with the Nitrokey is some form of
> attestation to ensure the keys are in fact generated on the device.

That would indeed be nice to have, unfortunately I do not think the
current hardware supports this. I know recent YubiKeys do but only in
PIV mode (i.e. for X.509).

On the other hand, vulnerabilities such as ROCA show clearly that
generating the private key on a smartcard does NOT necessarily make it
more secure than generating it in software, importing it into the
smartcard and wiping the original.

-- 
MS



Re: [gentoo-dev] [PATCH] glep-0063: Allow a single primary/signing key for smartcards

2019-04-25 Thread Marek Szuba
On 2019-04-25 12:32, Rich Freeman wrote:

> The OpenPGP smartcard standard, and the Nitrokey Pro smartcards that
> are being distributed to Gentoo developers, do not support having a
> separate primary/signing key for keys that are generated on the cards.
> As a result they can only be used in accordance with our current
> requirements if the keys are generated in software, which places them
> at a higher risk of compromise.
> 
> The intent of the separate primary key is to reduce the risk of it
> being compromised by keeping it offline.  However, if it were
> generated on a smartcard it would be exclusively be maintained
> offline, so it is counterproductive to require that it be generated
> online and then recommend that it be kept offline after this.
> Additionally this key needs to be brought back online anytime the key
> expiration is updated, which is at least annually.
> 
> I believe this is creating a false sense of security, and that
> developers should be encouraged to generate new keys using their
> smartcards, so that these keys are never stored outside the protected
> hardware.  By default gpg creates revocation certificates at this time
> as well.  If a key is lost it can still be revoked, and of course the
> gpg fingerprint associated with the developer can be changed in any
> case and is the de-facto root of our trust system.  These failure
> modes really are no different from an offline primary key that is
> separate from the signing keys.
> 
> The revision adds an exception for keys generated on a smartcard.

I very much oppose this change, see my comments in the "Best way to
create a GLEP 63 compliant GPG key on Nitrocard?" thread for details.

Regarding the very accurate comment that requiring a separate primary
key does not guarantee said primary key is handled securely - I know it
might be overly optimistic of me but I kind of expect developers of a
mainstream Linux distribution to be able to grasp and follow OpenPGP
best practices.

Incidentally, having been using smartcards of various sort in my
workflows for 5+ years now I find their most obvious benefit is not that
they store crypto keys securely but that they make the use of keys *more
convenient*. Worried about persistence of the private key on your drive,
especially on a shared system? Remove the card and the key is
inaccessible, and since it was never handled by the system itself there
should be no traces of it even in RAM. Fed up with resetting user
passwords being a significant part of your sysadmin duties due to some
people seemingly being unable to retain "at least 16 characters long and
a minimum 3 character classes" in their wetware? Smartcard PINs can be
much shorter because smartcards can lock up after a fairly small number
of having entered the PIN wrong. In fact, although the official Gentoo
rationale for the use of Nitrokeys as stated on the relevant Wiki page
is that it makes the signing keys more secure, the recommendation to
disable forcesig does hint at the ease-of-use factor as well.


-- 
MS



Re: [gentoo-dev] [PATCH] user.eclass: die if hard coded UID or GID is already in use

2019-05-29 Thread Marek Szuba
On 2019-05-27 16:45, William Hubbs wrote:

> If a package hard codes the UID or GID when adding a user or group to
> the system and that UID/GID already exists, we should abort rather than
> changing the UID/GID.

+1. It is of course my personal opinion but years of having been working
with various scientific software pipelines have made me rabidly allergic
to tools which do a different thing than what they were asked to do
unless explicitly allowed to do it this way. And what is the point of
specifying a "preferred" xID anyway? We cannot rely on these values
anywhere so IMHO all they do is add noise. And no, in my book "it has
always been like this" is not by itself a good reason to maintain the
status quo.

-- 
MS



[gentoo-dev] [PATCH] profiles: add more language codes to desc/l10n.desc

2019-06-12 Thread Marek Szuba

All of these are supported by recent versions of app-text/tesseract.
Checked against ISO-639 using the code tables from
https://iso639-3.sil.org/ .

Signed-off-by: Marek Szuba 
---
 profiles/desc/l10n.desc | 14 ++
 1 file changed, 14 insertions(+)

diff --git a/profiles/desc/l10n.desc b/profiles/desc/l10n.desc
index 4d30aa57eb3..e5e21346174 100644
--- a/profiles/desc/l10n.desc
+++ b/profiles/desc/l10n.desc
@@ -41,8 +41,10 @@ bs - Bosnian
 ca - Catalan
 ca-valencia - Catalan (Valencian)
 cak - Kaqchikel
+ceb - Cebuano
 chr - Cherokee
 cnr - Montenegrin
+co - Corsican
 cs - Czech
 cy - Welsh
 da - Danish
@@ -53,6 +55,7 @@ de-DE - German (Germany)
 dgo - Dogri (individual language)
 doi - Dogri (macrolanguage)
 dsb - Lower Sorbian
+dv - Dhivehi
 dz - Dzongkha
 el - Modern Greek
 en - English
@@ -88,13 +91,16 @@ he - Hebrew
 hi - Hindi
 hr - Croatian
 hsb - Upper Sorbian
+ht - Haitian
 hu - Hungarian
 hy - Armenian
 ia - Interlingua
 id - Indonesian
 is - Icelandic
 it - Italian
+iu - Inuktitut (macrolanguage)
 ja - Japanese
+jv - Javanese
 ka - Georgian
 kab - Kabyle
 kk - Kazakh
@@ -120,6 +126,7 @@ mn - Mongolian
 mni - Manipuri
 mr - Marathi
 ms - Malay (macrolanguage)
+mt - Maltese
 my - Burmese
 nan - Min Nan Chinese
 nb - Norwegian Bokmål
@@ -134,9 +141,11 @@ om - Oromo
 or - Oriya (macrolanguage)
 pa - Punjabi
 pl - Polish
+ps - Pashto (macrolanguage)
 pt - Portuguese
 pt-BR - Portuguese (Brazil)
 pt-PT - Portuguese (Portugal)
+qu - Quechua (macrolanguage)
 rm - Romansh
 ro - Romanian
 ru - Russian
@@ -156,6 +165,7 @@ sr - Serbian
 sr-Latn - Serbian (Latin script)
 ss - Swati
 st - Southern Sotho
+su - Sundanese
 sv - Swedish
 sw - Swahili (macrolanguage)
 sw-TZ - Swahili (Tanzania)
@@ -165,9 +175,11 @@ ta-LK - Tamil (Sri Lanka)
 te - Telugu
 tg - Tajik
 th - Thai
+ti - Tigrinya
 tk - Turkmen
 tl - Tagalog
 tn - Tswana
+to-TO - Tonga (Tonga Islands)
 tr - Turkish
 ts - Tsonga
 tt - Tatar
@@ -178,6 +190,8 @@ uz - Uzbek
 ve - Venda
 vi - Vietnamese
 xh - Xhosa
+yi - Yiddish (macrolanguage)
+yo - Yoruba
 zh - Chinese
 zh-CN - Chinese (China)
 zh-TW - Chinese (Taiwan)
-- 
2.21.0





signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] [PATCH] profiles: add more language codes to desc/l10n.desc

2019-06-12 Thread Marek Szuba
On 2019-06-12 16:12, Michał Górny wrote:

>> +dv - Dhivehi
> 
> IANA registry says:
> 
> | Subtag: dv
> | Description: Dhivehi
> | Description: Divehi
> | Description: Maldivian
> 
> So maybe make it 'Dhivehi (Maldivian)'?

Originally I had all three names here but then I noticed that for at
least some of the existing entries which in the SIL database are
described by multiple names, lb for instance, only the first one from
the list is used. Personally I have got no opinion either way.

>> +to-TO - Tonga (Tonga Islands)
> 
> Why not just 'to'?

Good point, "to" does specifically refer to Tonga Islands Tonga after
all. I think I've been overly cautious here.

-- 
MS



signature.asc
Description: OpenPGP digital signature


[gentoo-dev] [PATCH v2] profiles: add more language codes to desc/l10n.desc

2019-06-13 Thread Marek Szuba
Many thanks for the feedback, here is the revised patch:

* * *

All of these are supported by recent versions of app-text/tesseract.
Checked against ISO-639 using the code tables from
https://iso639-3.sil.org/ .

Signed-off-by: Marek Szuba 
---
 profiles/desc/l10n.desc | 14 ++
 1 file changed, 14 insertions(+)

diff --git a/profiles/desc/l10n.desc b/profiles/desc/l10n.desc
index 4d30aa57eb3..e5e21346174 100644
--- a/profiles/desc/l10n.desc
+++ b/profiles/desc/l10n.desc
@@ -41,8 +41,10 @@ bs - Bosnian
 ca - Catalan
 ca-valencia - Catalan (Valencian)
 cak - Kaqchikel
+ceb - Cebuano
 chr - Cherokee
 cnr - Montenegrin
+co - Corsican
 cs - Czech
 cy - Welsh
 da - Danish
@@ -53,6 +55,7 @@ de-DE - German (Germany)
 dgo - Dogri (individual language)
 doi - Dogri (macrolanguage)
 dsb - Lower Sorbian
+dv - Dhivehi
 dz - Dzongkha
 el - Modern Greek
 en - English
@@ -88,13 +91,16 @@ he - Hebrew
 hi - Hindi
 hr - Croatian
 hsb - Upper Sorbian
+ht - Haitian
 hu - Hungarian
 hy - Armenian
 ia - Interlingua
 id - Indonesian
 is - Icelandic
 it - Italian
+iu - Inuktitut
 ja - Japanese
+jv - Javanese
 ka - Georgian
 kab - Kabyle
 kk - Kazakh
@@ -120,6 +126,7 @@ mn - Mongolian
 mni - Manipuri
 mr - Marathi
 ms - Malay (macrolanguage)
+mt - Maltese
 my - Burmese
 nan - Min Nan Chinese
 nb - Norwegian Bokmål
@@ -134,9 +141,11 @@ om - Oromo
 or - Oriya (macrolanguage)
 pa - Punjabi
 pl - Polish
+ps - Pushto
 pt - Portuguese
 pt-BR - Portuguese (Brazil)
 pt-PT - Portuguese (Portugal)
+qu - Quechua
 rm - Romansh
 ro - Romanian
 ru - Russian
@@ -156,6 +165,7 @@ sr - Serbian
 sr-Latn - Serbian (Latin script)
 ss - Swati
 st - Southern Sotho
+su - Sundanese
 sv - Swedish
 sw - Swahili (macrolanguage)
 sw-TZ - Swahili (Tanzania)
@@ -165,9 +175,11 @@ ta-LK - Tamil (Sri Lanka)
 te - Telugu
 tg - Tajik
 th - Thai
+ti - Tigrinya
 tk - Turkmen
 tl - Tagalog
 tn - Tswana
+to - Tonga (Tonga Islands)
 tr - Turkish
 ts - Tsonga
 tt - Tatar
@@ -178,6 +190,8 @@ uz - Uzbek
 ve - Venda
 vi - Vietnamese
 xh - Xhosa
+yi - Yiddish
+yo - Yoruba
 zh - Chinese
 zh-CN - Chinese (China)
 zh-TW - Chinese (Taiwan)
-- 
2.21.0





signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] [PATCH v2] profiles: add more language codes to desc/l10n.desc

2019-06-13 Thread Marek Szuba
On 2019-06-13 13:46, Jaco Kroon wrote:

> Any chance of adding en-NZ?
> 
> asterisk-core-sounds depends on L10N USE_EXPAND and there is an upstream
> en-NZ pack.  It's the only language pack for which there isn't currently
> an option already in the list here.

Sure, why not. Looks reasonably enough to me.

-- 
MS



[gentoo-dev] [PATCH v3] profiles: add more language tags to desc/l10n.desc

2019-06-14 Thread Marek Szuba
Changes since v2: added en-NZ, updated the description.

* * *

All of these are supported by upstream in net-misc/asterisk-core-sounds
(en-NZ) and recent versions of app-text/tesseract (the rest). Checked
against ISO-639 using the code tables from https://iso639-3.sil.org/
and against the IANA language-subtag registry using the list from
https://www.iana.org/assignments/language-subtag-registry/language-subtag-registry

Signed-off-by: Marek Szuba 
---
 profiles/desc/l10n.desc | 15 +++
 1 file changed, 15 insertions(+)

diff --git a/profiles/desc/l10n.desc b/profiles/desc/l10n.desc
index 4d30aa57eb3..5a68f285809 100644
--- a/profiles/desc/l10n.desc
+++ b/profiles/desc/l10n.desc
@@ -41,8 +41,10 @@ bs - Bosnian
 ca - Catalan
 ca-valencia - Catalan (Valencian)
 cak - Kaqchikel
+ceb - Cebuano
 chr - Cherokee
 cnr - Montenegrin
+co - Corsican
 cs - Czech
 cy - Welsh
 da - Danish
@@ -53,12 +55,14 @@ de-DE - German (Germany)
 dgo - Dogri (individual language)
 doi - Dogri (macrolanguage)
 dsb - Lower Sorbian
+dv - Dhivehi
 dz - Dzongkha
 el - Modern Greek
 en - English
 en-AU - English (Australia)
 en-CA - English (Canada)
 en-GB - English (United Kingdom)
+en-NZ - English (New Zealand)
 en-US - English (United States)
 en-ZA - English (South Africa)
 eo - Esperanto
@@ -88,13 +92,16 @@ he - Hebrew
 hi - Hindi
 hr - Croatian
 hsb - Upper Sorbian
+ht - Haitian
 hu - Hungarian
 hy - Armenian
 ia - Interlingua
 id - Indonesian
 is - Icelandic
 it - Italian
+iu - Inuktitut
 ja - Japanese
+jv - Javanese
 ka - Georgian
 kab - Kabyle
 kk - Kazakh
@@ -120,6 +127,7 @@ mn - Mongolian
 mni - Manipuri
 mr - Marathi
 ms - Malay (macrolanguage)
+mt - Maltese
 my - Burmese
 nan - Min Nan Chinese
 nb - Norwegian Bokmål
@@ -134,9 +142,11 @@ om - Oromo
 or - Oriya (macrolanguage)
 pa - Punjabi
 pl - Polish
+ps - Pushto
 pt - Portuguese
 pt-BR - Portuguese (Brazil)
 pt-PT - Portuguese (Portugal)
+qu - Quechua
 rm - Romansh
 ro - Romanian
 ru - Russian
@@ -156,6 +166,7 @@ sr - Serbian
 sr-Latn - Serbian (Latin script)
 ss - Swati
 st - Southern Sotho
+su - Sundanese
 sv - Swedish
 sw - Swahili (macrolanguage)
 sw-TZ - Swahili (Tanzania)
@@ -165,9 +176,11 @@ ta-LK - Tamil (Sri Lanka)
 te - Telugu
 tg - Tajik
 th - Thai
+ti - Tigrinya
 tk - Turkmen
 tl - Tagalog
 tn - Tswana
+to - Tonga (Tonga Islands)
 tr - Turkish
 ts - Tsonga
 tt - Tatar
@@ -178,6 +191,8 @@ uz - Uzbek
 ve - Venda
 vi - Vietnamese
 xh - Xhosa
+yi - Yiddish
+yo - Yoruba
 zh - Chinese
 zh-CN - Chinese (China)
 zh-TW - Chinese (Taiwan)
-- 
2.21.0





signature.asc
Description: OpenPGP digital signature


[gentoo-dev] [PATCH 0/6] User/group assignment: burp, rtkit, syncthing

2019-06-26 Thread Marek Szuba
Here is the RFC for acct-* packages corresponding to users and groups
created by packages I currently maintain. This is also a request to
reserve the respective UIDs/GIDs, namely:

Groups:
 - burp - 501
 - rtkit - 133

Users:
 - burp - 501
 - rtkit - 133
 - syncthing - 502

rtkit user and group have got their IDs reserved in both Arch and
Fedora, I have opted for consistency with the former.





[gentoo-dev] [PATCH 4/6] acct-user/burp: Add 'burp' user (UID 501)

2019-06-26 Thread Marek Szuba
Signed-off-by: Marek Szuba 
---
 acct-user/burp/burp-0.ebuild | 12 
 acct-user/burp/metadata.xml  |  8 
 2 files changed, 20 insertions(+)
 create mode 100644 acct-user/burp/burp-0.ebuild
 create mode 100644 acct-user/burp/metadata.xml

diff --git a/acct-user/burp/burp-0.ebuild b/acct-user/burp/burp-0.ebuild
new file mode 100644
index 000..660c98f57b9
--- /dev/null
+++ b/acct-user/burp/burp-0.ebuild
@@ -0,0 +1,12 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-user
+
+DESCRIPTION="User for the app-backup/burp server"
+ACCT_USER_ID=501
+ACCT_USER_GROUPS=( burp )
+
+acct-user_add_deps
diff --git a/acct-user/burp/metadata.xml b/acct-user/burp/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-user/burp/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
-- 
2.21.0




[gentoo-dev] [PATCH 2/6] acct-group/rtkit: Add 'rtkit' group (GID 133)

2019-06-26 Thread Marek Szuba
Same GID as in Arch Linux.

Signed-off-by: Marek Szuba 
---
 acct-group/rtkit/metadata.xml   | 8 
 acct-group/rtkit/rtkit-0.ebuild | 9 +
 2 files changed, 17 insertions(+)
 create mode 100644 acct-group/rtkit/metadata.xml
 create mode 100644 acct-group/rtkit/rtkit-0.ebuild

diff --git a/acct-group/rtkit/metadata.xml b/acct-group/rtkit/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-group/rtkit/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
diff --git a/acct-group/rtkit/rtkit-0.ebuild b/acct-group/rtkit/rtkit-0.ebuild
new file mode 100644
index 000..9361f86968b
--- /dev/null
+++ b/acct-group/rtkit/rtkit-0.ebuild
@@ -0,0 +1,9 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-group
+
+DESCRIPTION="Group for the Realtime Policy and Watchdog Daemon"
+ACCT_GROUP_ID=133
-- 
2.21.0




[gentoo-dev] [PATCH 3/6] acct-group/syncthing: Add 'syncthing' group (GID 502)

2019-06-26 Thread Marek Szuba
Signed-off-by: Marek Szuba 
---
 acct-group/syncthing/metadata.xml   | 8 
 acct-group/syncthing/syncthing-0.ebuild | 9 +
 2 files changed, 17 insertions(+)
 create mode 100644 acct-group/syncthing/metadata.xml
 create mode 100644 acct-group/syncthing/syncthing-0.ebuild

diff --git a/acct-group/syncthing/metadata.xml 
b/acct-group/syncthing/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-group/syncthing/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
diff --git a/acct-group/syncthing/syncthing-0.ebuild 
b/acct-group/syncthing/syncthing-0.ebuild
new file mode 100644
index 000..a015336764f
--- /dev/null
+++ b/acct-group/syncthing/syncthing-0.ebuild
@@ -0,0 +1,9 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-group
+
+DESCRIPTION="Group for the system-wide net-p2p/syncthing server"
+ACCT_GROUP_ID=502
-- 
2.21.0




[gentoo-dev] [PATCH 1/6] acct-group/burp: Add 'burp' group (GID 501)

2019-06-26 Thread Marek Szuba
Signed-off-by: Marek Szuba 
---
 acct-group/burp/burp-0.ebuild | 9 +
 acct-group/burp/metadata.xml  | 8 
 2 files changed, 17 insertions(+)
 create mode 100644 acct-group/burp/burp-0.ebuild
 create mode 100644 acct-group/burp/metadata.xml

diff --git a/acct-group/burp/burp-0.ebuild b/acct-group/burp/burp-0.ebuild
new file mode 100644
index 000..ff29d3a2cd7
--- /dev/null
+++ b/acct-group/burp/burp-0.ebuild
@@ -0,0 +1,9 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-group
+
+DESCRIPTION="Group for the app-backup/burp server"
+ACCT_GROUP_ID=501
diff --git a/acct-group/burp/metadata.xml b/acct-group/burp/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-group/burp/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
-- 
2.21.0




[gentoo-dev] [PATCH 6/6] acct-user/syncthing: Add 'syncthing' user (UID 502)

2019-06-26 Thread Marek Szuba
Signed-off-by: Marek Szuba 
---
 acct-user/syncthing/metadata.xml   |  8 
 acct-user/syncthing/syncthing-0.ebuild | 14 ++
 2 files changed, 22 insertions(+)
 create mode 100644 acct-user/syncthing/metadata.xml
 create mode 100644 acct-user/syncthing/syncthing-0.ebuild

diff --git a/acct-user/syncthing/metadata.xml b/acct-user/syncthing/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-user/syncthing/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
diff --git a/acct-user/syncthing/syncthing-0.ebuild 
b/acct-user/syncthing/syncthing-0.ebuild
new file mode 100644
index 000..e9a04702f3d
--- /dev/null
+++ b/acct-user/syncthing/syncthing-0.ebuild
@@ -0,0 +1,14 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-user
+
+DESCRIPTION="User for the system-wide net-p2p/syncthing server"
+ACCT_USER_ID=502
+ACCT_USER_HOME=/var/lib/syncthing
+ACCT_USER_HOME_PERMS=0770
+ACCT_USER_GROUPS=( syncthing )
+
+acct-user_add_deps
-- 
2.21.0




[gentoo-dev] [PATCH 5/6] acct-user/rtkit: Add 'rtkit' user (UID 133)

2019-06-26 Thread Marek Szuba
Same UID as in Arch Linux.

Signed-off-by: Marek Szuba 
---
 acct-user/rtkit/metadata.xml   |  8 
 acct-user/rtkit/rtkit-0.ebuild | 12 
 2 files changed, 20 insertions(+)
 create mode 100644 acct-user/rtkit/metadata.xml
 create mode 100644 acct-user/rtkit/rtkit-0.ebuild

diff --git a/acct-user/rtkit/metadata.xml b/acct-user/rtkit/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-user/rtkit/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
diff --git a/acct-user/rtkit/rtkit-0.ebuild b/acct-user/rtkit/rtkit-0.ebuild
new file mode 100644
index 000..0e63e6514a1
--- /dev/null
+++ b/acct-user/rtkit/rtkit-0.ebuild
@@ -0,0 +1,12 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-user
+
+DESCRIPTION="User for the Realtime Policy and Watchdog Daemon"
+ACCT_USER_ID=133
+ACCT_USER_GROUPS=( rtkit )
+
+acct-user_add_deps
-- 
2.21.0




[gentoo-dev] [PATCH v2 0/6] User/group assignment: burp, rtkit, syncthing

2019-06-27 Thread Marek Szuba


Thank you for your feedback, here is the second version of the patch
set.
Changes:
 - shifted the IDs for burp and syncthing into the appropriate LSB range;
   the Wiki page has been updated accordingly.

* * *

Here is the RFC for acct-* packages corresponding to users and groups
created by packages I currently maintain. This is also a request to
reserve the respective UIDs/GIDs, namely:

Groups:
 - burp - 498
 - rtkit - 133
 - syncthing - 499

Users:
 - burp - 498
 - rtkit - 133
 - syncthing - 499





[gentoo-dev] [PATCH 1/6] acct-group/burp: Add 'burp' group (GID 498)

2019-06-27 Thread Marek Szuba
Signed-off-by: Marek Szuba 
---
 acct-group/burp/burp-0.ebuild | 9 +
 acct-group/burp/metadata.xml  | 8 
 2 files changed, 17 insertions(+)
 create mode 100644 acct-group/burp/burp-0.ebuild
 create mode 100644 acct-group/burp/metadata.xml

diff --git a/acct-group/burp/burp-0.ebuild b/acct-group/burp/burp-0.ebuild
new file mode 100644
index 000..f9d68d05dab
--- /dev/null
+++ b/acct-group/burp/burp-0.ebuild
@@ -0,0 +1,9 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-group
+
+DESCRIPTION="Group for the app-backup/burp server"
+ACCT_GROUP_ID=498
diff --git a/acct-group/burp/metadata.xml b/acct-group/burp/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-group/burp/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
-- 
2.21.0




[gentoo-dev] [PATCH 2/6] acct-group/rtkit: Add 'rtkit' group (GID 133)

2019-06-27 Thread Marek Szuba
Same GID as in Arch Linux.

Signed-off-by: Marek Szuba 
---
 acct-group/rtkit/metadata.xml   | 8 
 acct-group/rtkit/rtkit-0.ebuild | 9 +
 2 files changed, 17 insertions(+)
 create mode 100644 acct-group/rtkit/metadata.xml
 create mode 100644 acct-group/rtkit/rtkit-0.ebuild

diff --git a/acct-group/rtkit/metadata.xml b/acct-group/rtkit/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-group/rtkit/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
diff --git a/acct-group/rtkit/rtkit-0.ebuild b/acct-group/rtkit/rtkit-0.ebuild
new file mode 100644
index 000..9361f86968b
--- /dev/null
+++ b/acct-group/rtkit/rtkit-0.ebuild
@@ -0,0 +1,9 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-group
+
+DESCRIPTION="Group for the Realtime Policy and Watchdog Daemon"
+ACCT_GROUP_ID=133
-- 
2.21.0




[gentoo-dev] [PATCH 4/6] acct-user/burp: Add 'burp' user (UID 498)

2019-06-27 Thread Marek Szuba
Signed-off-by: Marek Szuba 
---
 acct-user/burp/burp-0.ebuild | 12 
 acct-user/burp/metadata.xml  |  8 
 2 files changed, 20 insertions(+)
 create mode 100644 acct-user/burp/burp-0.ebuild
 create mode 100644 acct-user/burp/metadata.xml

diff --git a/acct-user/burp/burp-0.ebuild b/acct-user/burp/burp-0.ebuild
new file mode 100644
index 000..f6c78b24856
--- /dev/null
+++ b/acct-user/burp/burp-0.ebuild
@@ -0,0 +1,12 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-user
+
+DESCRIPTION="User for the app-backup/burp server"
+ACCT_USER_ID=498
+ACCT_USER_GROUPS=( burp )
+
+acct-user_add_deps
diff --git a/acct-user/burp/metadata.xml b/acct-user/burp/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-user/burp/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
-- 
2.21.0




[gentoo-dev] [PATCH 3/6] acct-group/syncthing: Add 'syncthing' group (GID 499)

2019-06-27 Thread Marek Szuba
Signed-off-by: Marek Szuba 
---
 acct-group/syncthing/metadata.xml   | 8 
 acct-group/syncthing/syncthing-0.ebuild | 9 +
 2 files changed, 17 insertions(+)
 create mode 100644 acct-group/syncthing/metadata.xml
 create mode 100644 acct-group/syncthing/syncthing-0.ebuild

diff --git a/acct-group/syncthing/metadata.xml 
b/acct-group/syncthing/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-group/syncthing/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
diff --git a/acct-group/syncthing/syncthing-0.ebuild 
b/acct-group/syncthing/syncthing-0.ebuild
new file mode 100644
index 000..4e7ab771bb4
--- /dev/null
+++ b/acct-group/syncthing/syncthing-0.ebuild
@@ -0,0 +1,9 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-group
+
+DESCRIPTION="Group for the system-wide net-p2p/syncthing server"
+ACCT_GROUP_ID=499
-- 
2.21.0




[gentoo-dev] [PATCH 6/6] acct-user/syncthing: Add 'syncthing' user (UID 499)

2019-06-27 Thread Marek Szuba
Signed-off-by: Marek Szuba 
---
 acct-user/syncthing/metadata.xml   |  8 
 acct-user/syncthing/syncthing-0.ebuild | 14 ++
 2 files changed, 22 insertions(+)
 create mode 100644 acct-user/syncthing/metadata.xml
 create mode 100644 acct-user/syncthing/syncthing-0.ebuild

diff --git a/acct-user/syncthing/metadata.xml b/acct-user/syncthing/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-user/syncthing/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
diff --git a/acct-user/syncthing/syncthing-0.ebuild 
b/acct-user/syncthing/syncthing-0.ebuild
new file mode 100644
index 000..136d34e4cdb
--- /dev/null
+++ b/acct-user/syncthing/syncthing-0.ebuild
@@ -0,0 +1,14 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-user
+
+DESCRIPTION="User for the system-wide net-p2p/syncthing server"
+ACCT_USER_ID=499
+ACCT_USER_HOME=/var/lib/syncthing
+ACCT_USER_HOME_PERMS=0770
+ACCT_USER_GROUPS=( syncthing )
+
+acct-user_add_deps
-- 
2.21.0




[gentoo-dev] [PATCH 5/6] acct-user/rtkit: Add 'rtkit' user (UID 133)

2019-06-27 Thread Marek Szuba
Same UID as in Arch Linux.

Signed-off-by: Marek Szuba 
---
 acct-user/rtkit/metadata.xml   |  8 
 acct-user/rtkit/rtkit-0.ebuild | 12 
 2 files changed, 20 insertions(+)
 create mode 100644 acct-user/rtkit/metadata.xml
 create mode 100644 acct-user/rtkit/rtkit-0.ebuild

diff --git a/acct-user/rtkit/metadata.xml b/acct-user/rtkit/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-user/rtkit/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
diff --git a/acct-user/rtkit/rtkit-0.ebuild b/acct-user/rtkit/rtkit-0.ebuild
new file mode 100644
index 000..0e63e6514a1
--- /dev/null
+++ b/acct-user/rtkit/rtkit-0.ebuild
@@ -0,0 +1,12 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-user
+
+DESCRIPTION="User for the Realtime Policy and Watchdog Daemon"
+ACCT_USER_ID=133
+ACCT_USER_GROUPS=( rtkit )
+
+acct-user_add_deps
-- 
2.21.0




Re: [gentoo-dev] Re: Why aren't GSoC projects affecting ::gentoo discussed on regular mls?

2019-06-27 Thread Marek Szuba
On 2019-06-27 04:16, Benda Xu wrote:

> Michał, you were overreacting to the word "GSoC" since our original RFC
> at gentoo-dev.  Please, just ignore GSoC when you are executing your
> experise of QA.  Gentoo should be developed independently, regardless of
> whether any development effort is supported by 3rd party.
[...]
> Personally I don't regard the GSoC selection and decision process
> interesting to all the Gentoo devs.

In my opinion Michał has got a very good point regarding potential PR
consequences of us rejecting GSoC work. Of course it can be done, I've
seen my share of student projects of various sort getting binned
immediately after implementation - but more often than not it shows a
lack of of foresight, at best, on behalf of institutions which requested
manpower for such projects. Yes, it is good for you to have eventually
brought this to -dev - but IMHO it really is too late. In the future, I
would STRONGLY advise having a general discussion before having even a
single line of code written.

-- 
MS



[gentoo-dev] [PATCH 0/4] User/group assignment: stdiscosrv, strelaysrv

2019-07-01 Thread Marek Szuba
Further to my RFC from last week, net-p2p/syncthing optionally installs
two auxiliary components - the discovery server and the relay server
- which run as their own users. The following patch set creates appropriate
acct-* packages for them. This is also a request to reserve the respective
UIDs/GIDs, namely:

Groups:
 - stdiscosrv - 497
 - strelaysrv - 496

Users:
 - stdiscosrv - 497
 - strelaysrv - 496

The relevant Wiki page has already been updated accordingly.





[gentoo-dev] [PATCH 1/4] acct-group/stdiscosrv: Add 'stdiscosrv' group (GID 497)

2019-07-01 Thread Marek Szuba
Signed-off-by: Marek Szuba 
---
 acct-group/stdiscosrv/metadata.xml| 8 
 acct-group/stdiscosrv/stdiscosrv-0.ebuild | 9 +
 2 files changed, 17 insertions(+)
 create mode 100644 acct-group/stdiscosrv/metadata.xml
 create mode 100644 acct-group/stdiscosrv/stdiscosrv-0.ebuild

diff --git a/acct-group/stdiscosrv/metadata.xml 
b/acct-group/stdiscosrv/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-group/stdiscosrv/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
diff --git a/acct-group/stdiscosrv/stdiscosrv-0.ebuild 
b/acct-group/stdiscosrv/stdiscosrv-0.ebuild
new file mode 100644
index 000..478159a9351
--- /dev/null
+++ b/acct-group/stdiscosrv/stdiscosrv-0.ebuild
@@ -0,0 +1,9 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-group
+
+DESCRIPTION="Group for the Syncthing discovery server"
+ACCT_GROUP_ID=497
-- 
2.21.0




[gentoo-dev] [PATCH 3/4] acct-user/stdiscosrv: Add 'stdiscosrv' user (UID 497)

2019-07-01 Thread Marek Szuba
Signed-off-by: Marek Szuba 
---
 acct-user/stdiscosrv/metadata.xml|  8 
 acct-user/stdiscosrv/stdiscosrv-0.ebuild | 14 ++
 2 files changed, 22 insertions(+)
 create mode 100644 acct-user/stdiscosrv/metadata.xml
 create mode 100644 acct-user/stdiscosrv/stdiscosrv-0.ebuild

diff --git a/acct-user/stdiscosrv/metadata.xml 
b/acct-user/stdiscosrv/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-user/stdiscosrv/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
diff --git a/acct-user/stdiscosrv/stdiscosrv-0.ebuild 
b/acct-user/stdiscosrv/stdiscosrv-0.ebuild
new file mode 100644
index 000..06485edd765
--- /dev/null
+++ b/acct-user/stdiscosrv/stdiscosrv-0.ebuild
@@ -0,0 +1,14 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-user
+
+DESCRIPTION="User for the Syncthing discovery server"
+ACCT_USER_ID=497
+ACCT_USER_HOME=/var/lib/stdiscosrv
+ACCT_USER_HOME_PERMS=0770
+ACCT_USER_GROUPS=( stdiscosrv )
+
+acct-user_add_deps
-- 
2.21.0




[gentoo-dev] [PATCH 2/4] acct-group/strelaysrv: Add 'strelaysrv' group (GID 496)

2019-07-01 Thread Marek Szuba
Signed-off-by: Marek Szuba 
---
 acct-group/strelaysrv/metadata.xml| 8 
 acct-group/strelaysrv/strelaysrv-0.ebuild | 9 +
 2 files changed, 17 insertions(+)
 create mode 100644 acct-group/strelaysrv/metadata.xml
 create mode 100644 acct-group/strelaysrv/strelaysrv-0.ebuild

diff --git a/acct-group/strelaysrv/metadata.xml 
b/acct-group/strelaysrv/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-group/strelaysrv/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
diff --git a/acct-group/strelaysrv/strelaysrv-0.ebuild 
b/acct-group/strelaysrv/strelaysrv-0.ebuild
new file mode 100644
index 000..ddb60b5ea64
--- /dev/null
+++ b/acct-group/strelaysrv/strelaysrv-0.ebuild
@@ -0,0 +1,9 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-group
+
+DESCRIPTION="Group for the Syncthing relay server"
+ACCT_GROUP_ID=496
-- 
2.21.0




[gentoo-dev] [PATCH 4/4] acct-user/strelaysrv: Add 'strelaysrv' user (UID 496)

2019-07-01 Thread Marek Szuba
Signed-off-by: Marek Szuba 
---
 acct-user/strelaysrv/metadata.xml|  8 
 acct-user/strelaysrv/strelaysrv-0.ebuild | 14 ++
 2 files changed, 22 insertions(+)
 create mode 100644 acct-user/strelaysrv/metadata.xml
 create mode 100644 acct-user/strelaysrv/strelaysrv-0.ebuild

diff --git a/acct-user/strelaysrv/metadata.xml 
b/acct-user/strelaysrv/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-user/strelaysrv/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
diff --git a/acct-user/strelaysrv/strelaysrv-0.ebuild 
b/acct-user/strelaysrv/strelaysrv-0.ebuild
new file mode 100644
index 000..4208dc590e0
--- /dev/null
+++ b/acct-user/strelaysrv/strelaysrv-0.ebuild
@@ -0,0 +1,14 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-user
+
+DESCRIPTION="User for the Syncthing relay server"
+ACCT_USER_ID=496
+ACCT_USER_HOME=/var/lib/strelaysrv
+ACCT_USER_HOME_PERMS=0770
+ACCT_USER_GROUPS=( strelaysrv )
+
+acct-user_add_deps
-- 
2.21.0




[gentoo-dev] News item about interoperability restrictions of >=net-p2p/syncthing-1.2.0

2019-07-15 Thread Marek Szuba
Hello,

Please find attached a news item warning the users of net-p2p/syncthing
that version 1.2.0 and newer do not interoperate with version 0.14.45
and older. I have included the same warning in the 1.2.0 ebuild, that
said I believe this deserves a news item because a) it could affect
mission-critical file-replication set-ups, and b) old versions panic and
shut down when fed incompatible data.

Thank you in advance for any and all feedback!


-- 
MS
Title: Syncthing 1.2.0 and newer do not interoperate with 0.14.45 and older
Author: Marek Szuba 
Posted: 2019-07-18
Revision: 1
News-Item-Format: 2.0
Display-If-Installed: net-p2p/syncthing

Starting with version 1.2.0, Syncthing always uses large, variable-sized,
blocks to index and transfer files larger than 256 MiB [1]. Syncthing
version 0.14.45 and older will initially appear to accept files scanned
with large blocks, but will later panic during some internal file
operations. Do NOT enable large blocks in clusters with devices still
on v0.14.45 or older, e.g. Debian Stretch servers using official packages.

[1] https://docs.syncthing.net/advanced/folder-uselargeblocks.html


signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] [PATCH 0/6] Make 'split-usr' USE flag global and use it in gen_usr_ldscript

2019-07-15 Thread Marek Szuba
On 2019-07-15 12:38, Jaco Kroon wrote:

> I'm personally using a separate /usr (On numerous systems) and other
> than one problem I've encountered this isn't actually currently an issue
> for me, and the reason this specific case was an issue was due to one
> single tool (which unfortunately I can't remember now) having been
> installed into /usr where I'd personally expect it to go into /.

The issue is not with *split* /usr, it's with the scenario currently
being adopted by many Linux distros (e.g. Fedora or Debian) in which
/bin, /sbin, /lib and /lib64 are symlinks to respective subdirectories
of /usr. The purpose of the changes at hand is, as described by floppym
in his initial post, to pave the way towards making merged /usr workable
on Gentoo for the average user.

-- 
MS



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] [PATCH 0/6] Make 'split-usr' USE flag global and use it in gen_usr_ldscript

2019-07-15 Thread Marek Szuba
On 2019-07-15 14:59, Jaco Kroon wrote:

> I've seen arguments that it's a historic split, and to an extent this is
> true, however, having critical system recovery (and basic boot) stuff in
> /, on as small as possible a partition, with the bulk of the system on
> /usr makes a lot of sense for me.

That's one of the reasons, yes. For a more in-depth discussion, see

https://www.freedesktop.org/wiki/Software/systemd/TheCaseForTheUsrMerge/

as well as the Fedora feature the above mentions.

-- 
MS



[gentoo-dev] Re: News item about interoperability restrictions of >=net-p2p/syncthing-1.2.0

2019-07-18 Thread Marek Szuba
On 2019-07-18 11:12, Kristian Fiskerstrand wrote:

> Should we be more specific as to how not to enable it here? is it a
> USE-flag? does it require a package mask for newer versions if it is
> always used for the newer ones?

Good point, this should explicitly say "do not emerge new versions". My
own thoughts on the matter have been that since we are now in the
process of stabilising syncthing-1.1.4 (i.e. the latest version which
does not force the use of large blocks) and that I do not intend to push
the 1.2.0 ebuild until stabilisation has been concluded, it would be up
to individual users to mask newer versions should they insist on using
~arch ebuilds.

> Also cluster immediately made me think of server<>client relationship
> and this only affecting server side, which probably doesn't fit well
> with syncthing, but admittedly I don't use it so not familiar with the
> nomenclature.

I guess it is a bit subjective and/or based on one's experience, in my
case "cluster" brings to mind a cluster of peers. Anyway, this is the
wording from the official upstream statement so I would rather not
change it unless there is a good reason for it - like the
Gentoo-specific clarification you have suggested above.

PS. For the record, I have already published this news item (a couple of
hours ahead of schedule I am afraid, I didn't remember the exact time I
submitted the RFC) so I'll include your comments in the second revision.

-- 
MS



[gentoo-dev] Package up for grabs: dev-libs/amdgpu-pro-opencl

2019-09-30 Thread Marek Szuba

For those of you not familiar with it, dev-libs/amdgpu-pro-opencl
packages the OpenCL bits of the proprietary, binary-only AMDGPU-Pro
software stack into a form compatible with the Open Source amdgpu
environment in general and Gentoo in particular. It has been working
surprisingly well for an ugly hack it is but now that we have Radeon
Open Compute-based OpenCL support for amdgpu (which will eventually be
fully Open Source and at the moment only requires proprietary libraries
for one last feature, image support) in the tree I feel it is time for
it to go - especially given that it only support AMD GPUs older than
Vega 10.

Unfortunately it would be awkward to simply last-rite because the
ROC-based implementation does not support ABI_X86_32
(dev-libs/rocm-opencl-runtime and its dependencies may or may not work
in 32-bit mode but have neither multilib support nor x86 keywords at
present, whereas the closed-source components are only available for
native amd64).

No open tickets on Bugzilla, binaries for both versions currently in the
tree are still available, and beyond the obvious shortcoming of not
supporting more recent GPUs in spite of upstream providing appropriate
libraries (I haven't tried packaging them because my AMD GPU is too old
to test them on), no real problems at the moment.

-- 
MS



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] Change Bugzilla status to IN_PROGRESS when pull request is linked

2019-10-25 Thread Marek Szuba
On 2019-10-25 17:00, Ralph Seichter wrote:

> For convenience, would it be possible to automatically change the status
> of bugs from (UN)CONFIRMED to IN_PROGRESS when Larry The Cow attaches a
> pull request? I tend to forget to change the status myself, and perhaps
> I am not alone in feeling my age in that fashion. ;-)

I am against this, for the same reason as Michał and Kent - to me "in
progress" means "the maintainer is working on it", not "someone has just
made a PR on GitHub which the maintainer may or may not accept".

-- 
MS



[gentoo-dev] RFC: UID/GID assignment for net-analyzer/suricata

2019-12-06 Thread Marek Szuba
Hello,

I hereby order... no, wait. Let me start over. Seeing as I am now in the
process of reviving net-analyzer/suricata in the tree (5.0.0 builds and
tests fine for me, there are however a few installation-time QA issues
I'd like to take care of before pushing this), I would like to request
UID/GID 477 for the Suricata user/group. There is no such user in either
Arch or Fedora.

Let me know if you have any questions or comments.

-- 
Marecki



signature.asc
Description: OpenPGP digital signature


[gentoo-dev] [PATCH 2/2] acct-user/suricata: new user for UID 477

2019-12-11 Thread Marek Szuba
Package-Manager: Portage-2.3.79, Repoman-2.3.16
Signed-off-by: Marek Szuba 
---
 acct-user/suricata/metadata.xml  |  8 
 acct-user/suricata/suricata-0.ebuild | 14 ++
 2 files changed, 22 insertions(+)
 create mode 100644 acct-user/suricata/metadata.xml
 create mode 100644 acct-user/suricata/suricata-0.ebuild

diff --git a/acct-user/suricata/metadata.xml b/acct-user/suricata/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-user/suricata/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
diff --git a/acct-user/suricata/suricata-0.ebuild 
b/acct-user/suricata/suricata-0.ebuild
new file mode 100644
index 000..015bea8d022
--- /dev/null
+++ b/acct-user/suricata/suricata-0.ebuild
@@ -0,0 +1,14 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-user
+
+DESCRIPTION="User for Suricata IDS"
+ACCT_USER_ID=477
+ACCT_USER_HOME=/var/lib/suricata
+ACCT_USER_HOME_PERMS=0750
+ACCT_USER_GROUPS=( suricata )
+
+acct-user_add_deps
-- 
2.23.0




[gentoo-dev] [PATCH 1/2] acct-group/suricata: new group for GID 477

2019-12-11 Thread Marek Szuba
Package-Manager: Portage-2.3.79, Repoman-2.3.16
Signed-off-by: Marek Szuba 
---
 acct-group/suricata/metadata.xml  | 8 
 acct-group/suricata/suricata-0.ebuild | 9 +
 2 files changed, 17 insertions(+)
 create mode 100644 acct-group/suricata/metadata.xml
 create mode 100644 acct-group/suricata/suricata-0.ebuild

diff --git a/acct-group/suricata/metadata.xml b/acct-group/suricata/metadata.xml
new file mode 100644
index 000..3e5026ee375
--- /dev/null
+++ b/acct-group/suricata/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   mare...@gentoo.org
+       Marek Szuba
+   
+
diff --git a/acct-group/suricata/suricata-0.ebuild 
b/acct-group/suricata/suricata-0.ebuild
new file mode 100644
index 000..11ead7b3086
--- /dev/null
+++ b/acct-group/suricata/suricata-0.ebuild
@@ -0,0 +1,9 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-group
+
+DESCRIPTION="Group for Suricata IDS"
+ACCT_GROUP_ID=477
-- 
2.23.0




Re: [gentoo-dev] [PATCH 2/2] acct-user/suricata: new user for UID 477

2019-12-12 Thread Marek Szuba
On 2019-12-11 13:54, Michael Orlitzky wrote:

>> +ACCT_USER_HOME=/var/lib/suricata
>> +ACCT_USER_HOME_PERMS=0750
> 
> Please don't set these unless it's absolutely necessary. The rationale
> for this has finally been committed to the devmanual, but has yet to be
> pushed to the website. In the meantime it's here:
> 
>> http://michael.orlitzky.com/articles/gentoo_glep81_user_package_guidelines.xhtml

Thank you for this detailed explanation! As far as I can tell there is
indeed no need for this user to have a home directory other than that's
the way it was done in old Suricata ebuilds - so I'll just drop these
two lines (and also use $PN as the name of the primary group) from the
final commit.

-- 
MS



[gentoo-dev] RFC: Introducing VIDEO_CARDS=iris to virtual/opencl

2019-12-16 Thread Marek Szuba

Penny for your thoughts, guys: I am thinking about splitting the
video_cards_i965 condition in virtual/opencl so that NEO is pulled in by
video_cards_iris instead, and I wonder if there is anything I haven't
thought about.

The reason why I would like to do this is that there is clear
correspondence between compatibility matrices of the Iris OpenGL driver
and the NEO OpenCL driver - both only work on Broadwell and newer. There
are differences of course, most notably that the old OpenCL driver
(Beignet) is already considered deprecated for systems supported by NEO
whereas the old OpenGL driver in Mesa (i965) is still the official one
even for newer systems.

Nb. to the best of my knowledge it is safe to set VIDEO_CARDS=iris even
globally because if both i965 and iris are available, Mesa for now still
prefers the former unless the environment variable
MESA_LOADER_DRIVER_OVERRIDE has been set to 'iris'.

There would of course have to be a news item advising the users of
virtual/opencl + dev-libs/intel-neo to adjust their USE flags.

What do you think, guys?

-- 
Marecki



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] RFC: Introducing VIDEO_CARDS=iris to virtual/opencl

2019-12-20 Thread Marek Szuba
On 2019-12-17 21:21, Matt Turner wrote:

>> What do you think, guys?
> 
> I don't love it.
> 
> I don't like the mess that has become VIDEO_CARDS=... either. radeon
> vs radeonsi vs amdgpu.
[...]

I hear you and very much agree, especially regarding the Radeon mess.
That said, it seems what we are complaining about is the whole
VIDEO_CARDS system rather than the introduction of 'iris' into
virtual/opencl.

The current situation with OpenCL providers for Intel GPUs ugly even
disregarding the above. Basically, it is:

1. Set VIDEO_CARDS: i965

2a. If you do not set ABI_X86: 32 for virtual/opencl, it will pull in
dev-libs/intel-neo

2a.1. NEO may or may not work but with the former more likely than the
latter (it's been a few years since Broadwell architecture came out);

2b. If, however, you DO enable 32-bit x86 ABI it will pull
dev-libs/beignet instead

2b.1. Beignet at least for the time being is likely to work even on
modern systems but nowhere nearly as well as NEO would and without
official upstream support.


In contrast, reassigning NEO to video_cards_iris would make the
Intel-GPU provider tree much more straightforward:

1. For i965, you would get dev-libs/beignet regardless of whether you
want 32-bit x86 ABI or not;

2. For iris, you would get dev-libs/intel-neo for native 64 bits and
nothing (okay, technically it would fall back to media-libs/mesa - but
the fact Mesa is considered a fallback OpenCL provider for all GPUs is a
completely different can of worms) for 32-bit x86 ABI.


-- 
MS



signature.asc
Description: OpenPGP digital signature


[gentoo-dev] [PATCH 1/2] acct-group/xrootd: new group for GID 469

2019-12-20 Thread Marek Szuba
Package-Manager: Portage-2.3.79, Repoman-2.3.16
Signed-off-by: Marek Szuba 
---
 acct-group/xrootd/metadata.xml| 8 
 acct-group/xrootd/xrootd-0.ebuild | 9 +
 2 files changed, 17 insertions(+)
 create mode 100644 acct-group/xrootd/metadata.xml
 create mode 100644 acct-group/xrootd/xrootd-0.ebuild

diff --git a/acct-group/xrootd/metadata.xml b/acct-group/xrootd/metadata.xml
new file mode 100644
index 000..46a304a17de
--- /dev/null
+++ b/acct-group/xrootd/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   sci-phys...@gentoo.org
+   Gentoo Physics Project
+   
+
diff --git a/acct-group/xrootd/xrootd-0.ebuild 
b/acct-group/xrootd/xrootd-0.ebuild
new file mode 100644
index 000..7a62ea791cd
--- /dev/null
+++ b/acct-group/xrootd/xrootd-0.ebuild
@@ -0,0 +1,9 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-group
+
+DESCRIPTION="Group for the XRootD server"
+ACCT_GROUP_ID=469
-- 
2.24.1




[gentoo-dev] [PATCH 2/2] acct-user/xrootd: new user for UID 469

2019-12-20 Thread Marek Szuba
enewuser in net-libs/xrootd ebuilds has set the home directory to
"${EPREFIX}"/var/spool/xrootd but as far as I can recall from my
personal experience or see in the documentation, it isn't really
necessary for that user to have a home directory.

Package-Manager: Portage-2.3.79, Repoman-2.3.16
Signed-off-by: Marek Szuba 
---
 acct-user/xrootd/metadata.xml|  8 
 acct-user/xrootd/xrootd-0.ebuild | 12 
 2 files changed, 20 insertions(+)
 create mode 100644 acct-user/xrootd/metadata.xml
 create mode 100644 acct-user/xrootd/xrootd-0.ebuild

diff --git a/acct-user/xrootd/metadata.xml b/acct-user/xrootd/metadata.xml
new file mode 100644
index 000..46a304a17de
--- /dev/null
+++ b/acct-user/xrootd/metadata.xml
@@ -0,0 +1,8 @@
+
+http://www.gentoo.org/dtd/metadata.dtd";>
+
+   
+   sci-phys...@gentoo.org
+   Gentoo Physics Project
+   
+
diff --git a/acct-user/xrootd/xrootd-0.ebuild b/acct-user/xrootd/xrootd-0.ebuild
new file mode 100644
index 000..7b0eaaf9584
--- /dev/null
+++ b/acct-user/xrootd/xrootd-0.ebuild
@@ -0,0 +1,12 @@
+# Copyright 2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit acct-user
+
+DESCRIPTION="User for the XRootD server"
+ACCT_USER_ID=469
+ACCT_USER_GROUPS=( "${PN}" )
+
+acct-user_add_deps
-- 
2.24.1




Re: [gentoo-dev] crypto@ packages up for grabs

2020-01-10 Thread Marek Szuba
On 2020-01-08 21:16, Mikle Kolyada wrote:

> app-crypt/chntpw
> app-crypt/rainbowcrack

I'll take these two.

-- 
MS



signature.asc
Description: OpenPGP digital signature


[gentoo-dev] Last rites: dev-libs/beignet

2020-02-24 Thread Marek Szuba

Deprecated upstream in Q1'2018 in favour of dev-libs/intel-neo and
while it officially remains the recommended solution for "legacy HW
platforms" not supported by NEO (i.e. Sandy Bridge, Ivy Bridge and
Haswell GPUs), there has been no repository activity since August 2018.
Only really suitable for code development due to poor performance, some
OpenCL-aware software (e.g. media-gfx/darktable) explicitly blacklists
Beignet devices.
Upstream does not support LLVM versions newer than 7, third-party
patches exist for 8 and 9 but Beignet built against those versions fails
some unit tests.

Removal in 30 days. Bug #710640.

-- 
Marecki



signature.asc
Description: OpenPGP digital signature


[gentoo-dev] RFC: Removing ABI_X86_32 support from virtual/opencl

2020-02-28 Thread Marek Szuba
Hello,

I think the time has come to follow the example of CUDA and stop
supporting ABI_X86_32, both natively and in multilib configurations, in
virtual/opencl.


Let us have a quick look at OpenCL providers currently listed in
virtual/opencl-2:

1. No 32-bit support:

 - dev-libs/intel-neo (Intel GPUs from Broadwell onwards) - upstream has
confirmed NEO requires a 64-bit system and stated they have no plans to
add 32-bit support;

 - dev-libs/rocm-opencl-runtime (AMD GPUs supported by the amdgpu
driver) - ROC ebuilds support neither multilib nor native x86, no 32-bit
binary packages produced by upstream;

 - dev-util/intel-ocl-sdk (Intel CPUs) - closed-source, and while there
*are* 32-bit builds for Windows Intel only supports 64-bit Linux;


2. Partial 32-bit support:

 - x11-drivers/nvidia-drivers (Nvidia GPUs) - all versions currently
available in the tree support amd64 multilib but only one of them
(390.132-r1, which according to the Nvidia Web site only supports legacy
GPUs) supports both KEYWORDS=x86 and USE=uvm.

3. Do support ABI_X86_32:

 - dev-libs/beignet (Intel Sandy Bridge, Ivy Bridge and Haswell GPUs) -
last-rited due to having been effectively orphaned by upstream and lack
of official support for LLVM versions newer than 7;

 - dev-libs/amdgpu-pro-opencl (AMD Polaris) - proprietary, hacky (it
basically pulls OpenCL-related parts of the AMDGPU Pro stack in hope
they will work with the open AMDGPU stack, which is not something AMD
supports), no longer maintained in Gentoo;

 - media-libs/mesa[opencl] (old Radeon and Nvidia GPUs) - the only
provider without a huge list of caveats, if you both have an old-enough
GPU and do not mind only being able to use OpenCL 1.1. it actually seems
to work fine.


In other words, nearly every other provider either is or should be
(ROCm) wrapped in the "abi_x86_64? ( ! abi_x86_32 ( ... ) )" guard. This
makes virtual/opencl multilib support minimal at best and native-x86
support is even more limited.

Do we even want to still bother? Especially the multilib bit, seeing as
unless there is some super-special proprietary 32-bit OpenCL-aware
software out there, OpenCL support in Wine seems to be the only thing
that actually needs it - and I have my doubts regarding the usefulness
of running OpenCL-aware Windows software under Linux.

What do you think, guys?

Moreover, assuming we do decide to make OpenCL support 64-bit only, what
do you reckon should be done? Things I have thought of:
 1. News item;
 2. Mask USE=abi_x86_32 in virtual/opencl for all profiles and
USE=opencl globally for x86 profiles;
 3. At some point later, remove the x86 keyword from virtual/opencl.


-- 
Marecki



signature.asc
Description: OpenPGP digital signature


[gentoo-dev] Last rites: dev-go/ed25519

2020-03-04 Thread Marek Szuba
Most of upstream code has got merged into x-crypto (dev-go/go-crypto),
and since go-1.13 subsequently into the Go standard library.
Original code is no longer maintained and contains known bugs.
Removal in 30 days. Bug #711520.

-- 
MS



signature.asc
Description: OpenPGP digital signature


[gentoo-dev] News item: Removing ABI_X86_32 support from virtual/opencl

2020-03-04 Thread Marek Szuba
This will be shown as relevant to everyone who has installed
virtual/opencl, i.e. also to people on amd64 who have NOT enabled
abi_x86_32 for this package - but there is no way to filter news items
by use flags, is there? Anyway, comments are welcome!

 * * *

Title: Removing ABI_X86_32 support from virtual/opencl
Author: Marek Szuba 
Posted: 2020-03-09
Revision: 2
News-Item-Format: 2.0
Display-If-Installed: virtual/opencl

From April 2020 onwards virtual/opencl will no longer provide support
for the 32-bit ABI on either multilib amd64 or native x86 systems. The
reason for this is that most modern OpenCL providers currently available
from Gentoo only support the 64-bit ABI anyway. Therefore, we intend
to initially mask:
 - virtual/opencl in x86 profiles,
 - USE=abi_x86_32 for virtual/opencl in all profiles, and
 - USE=opencl in x86 profiles.
and follow up with removal of multilib support and x86 keywords from
virtual/opencl.

Note that this change will only affect the virtual package, i.e. OpenCL
providers which do support ABI_X86_32 will continue to advertise this
capability. Users of such providers who wish to retain 32-bit OpenCL
support are advised to add virtual/opencl to package.provided; see
portage(5) for details.

-- 
MS



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] Packages up for grabs: app-office/magicpoint, sys-apps/flashrom

2020-03-26 Thread Marek Szuba
On 2020-03-23 20:33, Jonas Stein wrote:

> sys-apps/flashrom

I'll take this one, I still use it from time to time.

-- 
MS



signature.asc
Description: OpenPGP digital signature


[gentoo-dev] RFC: Rethinking virtual/opencl and eselect-opencl

2020-04-02 Thread Marek Szuba
(with many thanks to everyone who mulled on this problem in #gentoo-dev
yesterday, mattst88 in particular)

So, yesterday's attempt to begin phasing support for 32-bit OpenCL out
of Gentoo (which, to remind everyone who may not have followed the
earlier discussion, would essentially acknowledge the status quo of most
OpenCL providers only supporting native amd64 ABI) has failed miserably:
the masking of abi_x86_32 in virtual/opencl on amd64 and of
virtual/opencl as a whole on x86 resulted in breakages in the dependency
graph.

On the one hand, there are several packages keyworded x86 which
unconditionally depend on virtual/opencl:
 - dev-libs/clhpp
 - dev-python/pyopencl
 - net-wireless/cpyrit-opencl
 - sci-libs/clblas
 - sci-libs/clblast
This is the easier part of the problem - seeing as most OpenCL providers
we now have in the tree (the exceptions being proprietary AMD and NVidia
drivers for legacy GPUs) do not support x86 anyway, it should be safe to
simply drop the keyword.

On the other, there is the much hairier issue of multilib-capable packages:
 - dev-libs/cl
 - app-emulation/crossover-bin
 - app-emulation/wine-staging
 - app-emulation/wine-vanilla
 - app-text/tesseract
 - media-libs/opencv
 - media-libs/x264
 - media-video/ffmpeg
for which the consensus of yesterday's discussion seems to be that
assuming the dropping of multilib or opencl support altogether is not an
option, we would have to have separate src_configure (at the very least)
stages for different ABIs.


It seems therefore that the easiest way of phasing out 32-bit OpenCL
would be for virtual/opencl to list a dummy provider that is both
keyworded x86 and multilib-capable, and provides both header files and
libraries reverse dependencies need to build successfully regardless of
what OpenCL devices, if any, are actually available. Fortunately there
already are packages in the tree which do just that - OpenCL ICD
loaders, i.e. dev-libs/ocl-icd (has stable keywords for both amd64 and
x86) and, since yesterday evening, dev-libs/opencl-icd-loader (the
official Khronos Group ICD loader, the first tagged version of which got
released in mid-March).

Then, between mattst88 and myself we have come to the conclusion that it
might in fact make sense to have virtual/opencl provide *only* an ICD
loader and merely inform the users what hardware-specific runtimes are
available. Advantages of this approach:
 - both ocl-icd and opencl-icd-loader are keyworded x86 (actually, I
realised this morning that I have made a mistake with the latter because
it is no longer up to developers to keyword things for x86 themselves -
but I *have* tested this in a 32-bit chroot) and multilib-capable so
they will keep the dependency tree consistent even if there are no
actual OpenCL runtimes capable of supporting abi_x86_32;
 - intel-neo, rocm-opencl-runtime, amdgpu-pro-opencl and mesa[opencl]
all actually *require* an IDC loader to work, intel-ocl-sdk (or at least
version 4 of it) works fine through a loader, and given
nvidia-drivers[uvm] ebuilds install an ICD file, I presume they are fine
with the loader as well;
 - not having to switch between OpenCL runtimes would allow us to phase
out eselect-opencl (similarly to how the introduction of an OpenGL
loader has allowed us to get rid of eselect-opengl), or at the very
least limit it to the management of OpenCL header files;
 - it would make it easier for users to enable out-of-tree runtimes,
e.g. manually installed whole AMDGPU-Pro stack or Beignet from an overlay;
 - the current VIDEO_CARDS-based way of selecting runtimes is quite
often misleading, namely:
* intel-neo only supports Intel GPUs from Broadwell onwards rather
than everything served by the i965 driver;
* amdgpu-pro-opencl is not compatible Vega 10 and newer GPUs, and to
make it worse it causes segfaults rather than simply ignore such GPUs;
* nvidia-drivers[uvm] is actually several sets of drivers, with
different versions appropriate for different GPUs;
* mesa[opencl] only supports some (old) Nvidia GPUs;
* intel-ocl-sdk does not support non-Intel amd64 CPUs.
  Having the options presented to users in human-readable fashion will
IMHO work better.


Therefore, mattst88 and I (or to clarify: the write-up is mine but Matt
has contributed several important points to it) would like to propose
the following steps to take:

1. Introduce a new version of virtual/opencl with RDEPEND consisting
*only* of app-eselect/eselect-opencl and
dev-libs/ocl-icd[khronos-headers], with the list of actual runtimes
moved to a postinst message and expanded to explain what works where;

2. Have all ebuilds of OpenCL runtimes depend on virtual/opencl
(replacing the dependency on dev-libs/ocl-icd wherever it is present)
but do NOT call "eselect opencl" if they currently do;

3. Test if downstream applications are happy with the new unified OpenCL
headers required by the Khronos Group ICD loader and if they are, add
dev-libs/opencl-icd-loader to virtual/opencl as a

[gentoo-dev] [PATCH] virtual/opencl: new version

2020-04-04 Thread Marek Szuba
Instead of pulling in various OpenCL runtimes, only depend on
eselect-opencl and an OpenCL ICD loader (dev-libs/ocl-icd) in order
to provide hardware-independent header files and libraries for
OpenCL-aware software to build against. Actual runtimes are now simply
suggested to the user via a postinst message.

Signed-off-by: Marek Szuba 
---
 virtual/opencl/opencl-3.ebuild | 31 +++
 1 file changed, 31 insertions(+)
 create mode 100644 virtual/opencl/opencl-3.ebuild

diff --git a/virtual/opencl/opencl-3.ebuild b/virtual/opencl/opencl-3.ebuild
new file mode 100644
index 000..9851d1ccbeb
--- /dev/null
+++ b/virtual/opencl/opencl-3.ebuild
@@ -0,0 +1,31 @@
+# Copyright 1999-2020 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=6
+
+inherit multilib-build
+
+DESCRIPTION="Virtual for OpenCL API"
+SLOT="0"
+KEYWORDS="~amd64 ~x86"
+
+RDEPEND="app-eselect/eselect-opencl
+   dev-libs/ocl-icd[khronos-headers,${MULTILIB_USEDEP}]"
+
+pkg_postinst() {
+   elog
+   elog "In order to take advantage of OpenCL you will need a runtime for 
your hardware."
+   elog "Currently included in Gentoo are:"
+   elog
+   elog "dev-libs/intel-neo - integrated Intel GPUs from Broadwell 
onwards. Open. 64-bit only"
+   elog "dev-libs/rocm-opencl-runtime - AMD GPUs supported by the 
amdgpu kernel driver. Mostly open [1]. 64-bit only"
+   elog "media-libs/mesa[opencl] - some older AMD GPUs; see [2]. Open. 
32-bit support"
+   elog "dev-libs/amdgpu-pro-opencl - AMD Polaris GPUs. Proprietary, 
provided as-is. 32-bit support"
+   elog "dev-util/intel-ocl-sdk - Intel CPUs. Proprietary. 64-bit only"
+   elog "x11-drivers/nvidia-drivers[uvm] - Nvidia GPUs; specific 
package versions required for older ones [3]. Proprietary. 32-bit support"
+   elog
+   elog " [1] Proprietary library from dev-libs/hsa-ext-rocr required for 
image support"
+   elog " [2] https://dri.freedesktop.org/wiki/GalliumCompute/";
+   elog " [3] https://www.nvidia.com/en-us/drivers/unix/legacy-gpu/";
+   elog
+}
-- 
2.24.1




[gentoo-dev] [PATCH] Refactor virtual/opencl to provide the API, not an implementation

2020-04-04 Thread Marek Szuba
As proposed in my e-mail to the list from two days ago. Advantage:
OpenCL-aware ebuilds will have something to compile and link against
regardless of whether the runtime invoked by the ICD loader supports
abi_x86_32 or not, or indeed even if there is no suitable runtime in the
Gentoo tree.





Re: [gentoo-dev] [PATCH] virtual/opencl: new version

2020-04-05 Thread Marek Szuba
On 2020-04-05 06:44, Michał Górny wrote:

>> +EAPI=6
> Is there really a good reason to use an old EAPI here?

None other than me having assumed that there must have been an important
reason why such a simple ebuild had not been bumped to EAPI 7 yet. Will
change this in the next iteration.

>> +RDEPEND="app-eselect/eselect-opencl
>> +dev-libs/ocl-icd[khronos-headers,${MULTILIB_USEDEP}]"
> 
> Wouldn't it make sense to remove the virtual and just have stuff depend
> on that instead?

It would if there only were only one ICD loader in the tree - but there
are two, this one and dev-libs/opencl-icd-loader. Overall it seems the
latter might be preferable in the long run (official Khronos Group
loader, much smaller output library, supports the new unified headers,
the last ocl-icd release came out in November 2017 and there has been
minimal repo activity since then) but with it having only been
officially released in mid-March and with me having only just added it
to Gentoo, I feel I'd rather test it for a while before listing it as an
alternative in the virtual.

Moreover, for the time being we still need eselect-opencl here even if
we are no longer to use to switch between implementations because
somewhat surprisingly (to me anyway), the package in questions installs
OpenCL header files too.

> This looks like README.gentoo material.

Will do.

-- 
MS



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] RFC: Rethinking virtual/opencl and eselect-opencl

2020-04-05 Thread Marek Szuba
On 2020-04-02 15:31, Marek Szuba wrote:

> 3. Test if downstream applications are happy with the new unified OpenCL
> headers required by the Khronos Group ICD loader and if they are, add
> dev-libs/opencl-icd-loader to virtual/opencl as an alternative to ocl-icd;

Quick update on this: today I have attempted to rebuild and test various
OpenCL-dependent packages using the unified headers and
dev-libs/opencl-icd-loader. The good news is, they have all been
perfectly happy with them. The bad news is, I actually had to manually
symlink all contents
/usr/lib/OpenCL/vendors/opencl-icd-loader/include/CL/ into
/usr/include/CL/ for this to work because eselect-opencl contains a
hard-coded list of expected vendor header files.

In other words, it will be necessary to either teach eselect-opencl how
to handle the unified headers or make it possible for it to let the
contents of /usr/include/CL be. Personally I am leaning towards the
latter - it doesn't even handle legacy headers that well (it installs
several versions into /usr/lib/OpenCL/global but in the end offers no
way of switching between them), and in any case even its description
suggests its job is to switch between implementations rather than handle
global headers.

-- 
MS



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] RFC: Rethinking virtual/opencl and eselect-opencl

2020-04-06 Thread Marek Szuba
On 2020-04-06 06:27, Michał Górny wrote:

> While at it, is there any chance to rewrite eselect-opencl so that it
> stops writing into /usr and uses environment approach like eselect-
> opengl does?

I think I'd rather just nuke eselect-opencl altogether and force the use
of an ICD loader for all implementations. Looks like it will be easier
than Matt and I thought too, touch wood:
 - as previously mentioned, most of the runtimes currently in the tree
actually REQUIRE using an ICD loader. Of the remaining two, I know for a
fact at least the latest version of intel-ocl-sdk works fine via a
loader so the only one that remains to be verified is
x11-drivers/nvidia-drivers[uvm];
 - likewise, I have confirmed that with the possible exception of
x11-drivers/nvidia-drivers[uvm], none of the presently available
runtimes install their own header files that would have to be symlinked
into place by eselect-opencl.

-- 
MS



signature.asc
Description: OpenPGP digital signature


[gentoo-dev] [PATCH v2] Refactor virtual/opencl to provide the API, not an implementation

2020-04-06 Thread Marek Szuba
Changes since v1:
 * bump EAPI to 7
 * use readme.gentoo for the postinst message
 * do not depend on app-eselect/eselect-opencl
 * make note in the comments about dev-libs/opencl-icd-loader to explain
   why we need a virtual in the first place





[gentoo-dev] [PATCH] virtual/opencl: new version

2020-04-06 Thread Marek Szuba
One, instead of pulling in various OpenCL runtimes, only depend on
an OpenCL ICD loader (dev-libs/ocl-icd, with dev-libs/opencl-icd-loader
to be added later) in order to provide hardware-independent header
files and libraries for OpenCL-aware software to build against.
Actual runtimes are now simply suggested to the user via a postinst
message / README.gentoo file.

Two, do not depend on eselect-opencl either - both ICD loaders pull in
their own OpenCL headers so there is no need to depend on the legacy
headers provided by this package, and for being able to switch to a
specific loader it is enough for loaders themselves to depend on this.

Signed-off-by: Marek Szuba 
---
 virtual/opencl/files/README.gentoo | 18 ++
 virtual/opencl/opencl-3.ebuild | 25 +
 2 files changed, 43 insertions(+)
 create mode 100644 virtual/opencl/files/README.gentoo
 create mode 100644 virtual/opencl/opencl-3.ebuild

diff --git a/virtual/opencl/files/README.gentoo 
b/virtual/opencl/files/README.gentoo
new file mode 100644
index 000..aa2dc0ef519
--- /dev/null
+++ b/virtual/opencl/files/README.gentoo
@@ -0,0 +1,18 @@
+In order to take advantage of OpenCL you will need a runtime for your hardware.
+Currently included in Gentoo are:
+
+ * open:
+- dev-libs/intel-neo - integrated Intel GPUs from Broadwell onwards. 
64-bit only;
+- dev-libs/rocm-opencl-runtime - AMD GPUs supported by the amdgpu kernel 
driver.
+  Image support still requires a proprietary extension [1]. 64-bit only;
+- media-libs/mesa[opencl] - some older AMD GPUs; see [2]. 32-bit support;
+
+ * proprietary:
+- dev-libs/amdgpu-pro-opencl - AMD Polaris GPUs. 32-bit support;
+- dev-util/intel-ocl-sdk - Intel CPUs (*not* GPUs). 64-bit only;
+- x11-drivers/nvidia-drivers[uvm] - Nvidia GPUs; specific package versions
+  required for older devices [3]. 32-bit support.
+
+ [1] dev-libs/hsa-ext-rocr
+ [2] https://dri.freedesktop.org/wiki/GalliumCompute/
+ [3] https://www.nvidia.com/en-us/drivers/unix/legacy-gpu/
diff --git a/virtual/opencl/opencl-3.ebuild b/virtual/opencl/opencl-3.ebuild
new file mode 100644
index 000..6268723a166
--- /dev/null
+++ b/virtual/opencl/opencl-3.ebuild
@@ -0,0 +1,25 @@
+# Copyright 1999-2020 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit multilib-build readme.gentoo-r1
+
+DESCRIPTION="Virtual for OpenCL API"
+SLOT="0"
+KEYWORDS="~amd64 ~x86"
+
+# Will add dev-libs/opencl-icd-loader here as an alternative once all potential
+# file collisions with eselect-opencl have been resolved
+RDEPEND="dev-libs/ocl-icd[khronos-headers,${MULTILIB_USEDEP}]"
+
+# so that src_install() doesn't fail on missing directory
+S="${WORKDIR}"
+
+src_install() {
+   readme.gentoo_create_doc
+}
+
+pkg_postinst() {
+   readme.gentoo_print_elog
+}
-- 
2.24.1




[gentoo-dev] [PATCH] Migrate (non-Nvidia) OpenCL providers to virtual/opencl-3

2020-04-08 Thread Marek Szuba
Now that we have got two OpenCL ICD loaders in the tree, that
starting with version 3, virtual/opencl will only pull an ICD loader
rather than any specific implementation, and that we are in the process
of following the footsteps of OpenGL in migrating away from using
eselect to switch between OpenCL implementations in favour of always
going through a loader, update implementations accordingly.
Specifically: depend on >=virtual/opencl-3 rather than on any specific
ICD loader, and make sure even implementations which previously ran
standalone use one.

Note that while the same should be done for x11-drivers/nvidia-drivers,
all the ebuilds there are marked stable so they will have to be handled
with more care.

Maintainers whose sign-off is needed: candrews for ROCm, zerochaos for
intel-ocl-sdk, the X11 project for Mesa.





  1   2   3   >