Re: using perl in preinst script

2010-12-30 Thread Philipp Kern
On 2010-12-30, Peter Samuelson  wrote:
>> On 2010-12-28, Carsten Hey  wrote:
>> > system.  The remaining perl library packages could be removed after
>> > installing debconf-english.
> [Philipp Kern]
>> "You don't care about non-native speakers?"  SCNR.
> That's not how I read it at all.  I think he's just saying,
> debconf-i18n requires perl, but that in itself is not a barrier to
> removing perl-base from Essential, because debconf-english (its
> alternative) does not need it.  Obviously the discussion of what
> belongs in the Essential set is not at all the same thing as the
> discussion of what packages debootstrap should install by default
> (a "base system").

I know.  It was ironic, thus the "Sorry, could not resist.".  I recently
listened to a talk where there was a complaint about gdm running a full Gnome
session and why the heck this was necessary.  It was countered with "so you
don't care about disabled people!?" argument because you want screenreader
and input method infrastructure available.

But that's way off-topic. ;)

Kind regards
Philipp Kern



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/slrnihop2a.afk.tr...@kelgar.0x539.de



[vu...@gnome.org: Cross-distro meeting about application installer]

2010-12-30 Thread Stefano Zacchiroli
- Forwarded message from Vincent Untz  -

Date: Wed, 29 Dec 2010 18:49:48 +0100
From: Vincent Untz 
To: distributi...@lists.freedesktop.org
Subject: Cross-distro meeting about application installer

Hi all,

We're organizing a cross-distro meeting in January to discuss the
"application installer" topic. It's a hot topic in many distros at the
moment, and we believe it's an area where we can collaborate a lot.

I've contacted various people privately already (from Debian, Fedora,
Mageia, openSUSE and Ubuntu), and there's interest in such a meeting.

All the information about the meeting is at
http://distributions.freedesktop.org/wiki/Meetings/AppInstaller2011

If you'd like to attend the meeting, or if there's any specific topic
that you'd like to see discussed, please edit the wiki page!

(I'll be away from mails for a few days, but I'll reply to questions
when I come back, if you have any :-))

Cheers,

Vincent

-- 
Les gens heureux ne sont pas pressés.
___
Distributions mailing list
distributi...@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/distributions


- End forwarded message -

-- 
Stefano Zacchiroli -o- PhD in Computer Science \ PostDoc @ Univ. Paris 7
z...@{upsilon.cc,pps.jussieu.fr,debian.org} -<>- http://upsilon.cc/zack/
Quando anche i santi ti voltano le spalle, |  .  |. I've fans everywhere
ti resta John Fante -- V. Capossela ...| ..: |.. -- C. Adams


signature.asc
Description: Digital signature


Bug#608364: ITP: dmedia -- A simple distributed media library

2010-12-30 Thread Bilal Akhtar
Package: wnpp
Severity: wishlist
Owner: Bilal Akhtar 


* Package name: dmedia
  Version : 0.2-1
  Upstream Author : Jason Gerard DeRose 
* URL : http://launchpad.net/dmedia
* License : AGPL
  Programming Lang: Python
  Description : A simple distributed media library

 DMedia is a simple distributed media library which greatly
facilitates playing of media files and storing their metadata
for quick access. It stores the metadata of the media files in
CouchDB. Media files can also be loaded remotely over a network
connection.



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101230104439.2991.79377.report...@localhost6



Bug#608371: ITP: libparallel-prefork-perl -- A simple prefork server framework

2010-12-30 Thread Dominic Hargreaves
Package: wnpp
Severity: wishlist
Owner: Dominic Hargreaves 

* Package name: libparallel-prefork-perl
  Version : 0.11
  Upstream Author : Kazuho Oku 
* URL : http://search.cpan.org/dist/Parallel-Prefork/
* License : Perl
  Programming Lang: Perl
  Description : A simple prefork server framework

This module is intended for use in operations that can be done in parallel
where the number of processes to be forked off should be limited, much like
Parallel::ForkManager. Parallel::Prefork also supports graceful shutdown
and run-time reconfiguration.



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101230110427.5498.68442.report...@carme.larted.org.uk



Bug#608375: ITP: libserver-starter-perl -- a superdaemon for hot-deploying server programs

2010-12-30 Thread Dominic Hargreaves
Package: wnpp
Severity: wishlist
Owner: Dominic Hargreaves 

* Package name: libserver-starter-perl
  Version : 0.09
  Upstream Author : Kazuho Oku 
* URL : http://search.cpan.org/dist/Server-Starter/
* License : Perl
  Programming Lang: Perl
  Description : a superdaemon for hot-deploying server programs

Server::Starter supports the deployment of server programs with graceful
restarts. It includes a script which works as a superdaemon that binds to
zero or more TCP ports, and repeatedly spawns the server program that
actually handles the necessary tasks (for example, responding to incoming
connections). The spawned server programs under Server::Starter call
accept(2) and handle the requests.



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101230111521.5574.81066.report...@carme.larted.org.uk



Re: Safe File Update (atomic)

2010-12-30 Thread Henrique de Moraes Holschuh
On Wed, 29 Dec 2010, Olaf van der Spek wrote:
> Writing a temp file, fsync, rename is often proposed. However, the

It is:
  write temp file (in same directory as file to be replaced), fsync temp
  file[1], rename (atomic), fsync directory[2].

[1] Makes sure file data has been commited to backend device before
the metadata update

[2] Makes sure the metadata has been commited to permantent storage.
Can often be ignored when you don't really care to know you will
get the new contents (as opposed to the old contents) in case of
a crash.  MTAs and spools, for example, MUST do it.

Which steps you can skip is filesystem-options/filesystem/
kernel-version/kernel dependent.  When the rename acts as a barrier, [1]
can be skipped, for example.  Tracking this is a losing proposition.

If we could use some syscall to make [1] into a simple barrier request
(guaranteed to degrade to fsync if barriers are not operating), it would
be better performance-wise.  This is what one should request of libc and
the kernels with a non-zero chance of getting it implemented (in fact,
it might even already exist).

> I've brought this up on linux-fsdevel and linux-ext4 but they (Ted)
> claim those exceptions aren't really a problem.

Indeed they are not.  Code has been dealing with them for years.  You
name the temp file properly, and teach your program to clean old ones up
*safely* (see vim swap file handling for an example) when it starts.

vim is a good example: nobody gets surprised by vim swap-files left over
when vim/computer crashes. And vim will do something smart with them if
it finds them in the current directory when it is started.

BTW: safely removing a file is also tricky.  AFAIK, one must open it RW,
in exclusive mode. stat it by fd and check whether it is what one
expects (regular file, ownership).  unlink it by fd.  close the fd.

> Is there a code snippet or lib function that handles this properly?

I don't know.  I'd be interested in the answer, though :-)

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101230114655.ga19...@khazad-dum.debian.net



Bug#608377: ITP: libhtml-quoted-perl -- extract structure of quoted HTML mail message

2010-12-30 Thread Dominic Hargreaves
Package: wnpp
Severity: wishlist
Owner: Dominic Hargreaves 

* Package name: libhtml-quoted-perl
  Version : 0.02
  Upstream Author : Ruslan Zakirov 
* URL : http://search.cpan.org/dist/HTML-Quoted/
* License : not yet determined
  Programming Lang: Perl
  Description : extract structure of quoted HTML mail message

Like Text::Quoted, this module extracts the structure of quoted
text in mail messages, but for HTML email.

NB: the current CPAN release is marked as experimental and is missing
a licence. I will clarify these points with the author before uploading.



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101230113310.7199.91797.report...@carme.larted.org.uk



Bug#608380: ITP: libregexp-common-net-cidr-perl -- provide patterns for CIDR blocks

2010-12-30 Thread Dominic Hargreaves
Package: wnpp
Severity: wishlist
Owner: Dominic Hargreaves 

* Package name: libregexp-common-net-cidr-perl
  Version : 0.02
  Upstream Author : Ruslan U. Zakirov 
* URL : http://search.cpan.org/dist/Regexp-Common-net-CIDR/
* License : not yet determined
  Programming Lang: Perl
  Description : provide patterns for CIDR blocks

This module provides regexp patterns for CIDR netblocks.

NB: The licence for this software is not yet determined. I will
check with the author before uploading.



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101230113901.7325.38289.report...@carme.larted.org.uk



Re: Safe File Update (atomic)

2010-12-30 Thread Olaf van der Spek
On Thu, Dec 30, 2010 at 12:46 PM, Henrique de Moraes Holschuh
 wrote:
>  write temp file (in same directory as file to be replaced), fsync temp

What if the target name is actually a symlink? To a different volume?
What if you're not allowed to create a file in that dir.

> If we could use some syscall to make [1] into a simple barrier request
> (guaranteed to degrade to fsync if barriers are not operating), it would
> be better performance-wise.  This is what one should request of libc and
> the kernels with a non-zero chance of getting it implemented (in fact,
> it might even already exist).

My proposal was O_ATOMIC:
// begin transaction
open(fname, O_ATOMIC | O_TRUNC);
write; // 0+ times
close;

Seems like the ideal API from the app's point of view.

>> I've brought this up on linux-fsdevel and linux-ext4 but they (Ted)
>> claim those exceptions aren't really a problem.
>
> Indeed they are not.  Code has been dealing with them for years.  You

Code has been wrong for years to, based on the reason reports about
file corruption with ext4.

> name the temp file properly, and teach your program to clean old ones up
> *safely* (see vim swap file handling for an example) when it starts.

What about restoring meta-data? File-owner?

> vim is a good example: nobody gets surprised by vim swap-files left over
> when vim/computer crashes. And vim will do something smart with them if
> it finds them in the current directory when it is started.

I'm sure the vim code is far from trivial. I think this complexity is
part of the reason most apps don't bother.

> BTW: safely removing a file is also tricky.  AFAIK, one must open it RW,
> in exclusive mode. stat it by fd and check whether it is what one

Exclusive mode? Linux doesn't know about mandatory locking (AFAIK).

> expects (regular file, ownership).  unlink it by fd.  close the fd.
>
>> Is there a code snippet or lib function that handles this properly?
>
> I don't know.  I'd be interested in the answer, though :-)

I'll ask glibc.

Olaf


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktikm+dacfnq7lort9vo7p-m-gvn0dgqxup5au...@mail.gmail.com



Bug#608392: ITP: underscore -- functional programming aid for JavaScript working well with jQuery

2010-12-30 Thread Jonas Smedegaard
Package: wnpp
Severity: wishlist
Owner: Jonas Smedegaard 

* Package name: underscore
  Version : 1.1.3
  Upstream Author : Jeremy Ashkenas 
* URL : http://documentcloud.github.com/underscore/
* License : Expat
  Programming Lang: JavaScript
  Description : functional programming aid for JavaScript working well with 
jQuery

 Underscore is a utility-belt library for JavaScript that provides a lot
 of the functional programming support that you would expect in
 Prototype.js (or Ruby), but without extending any of the built-in
 JavaScript objects.  It's the tie to go along with jQuery's tux.
 .
 Underscore provides 60-odd functions that support both the usual
 functional suspects: map, select, invoke - as well as more specialized
 helpers: function binding, javascript templating, deep equality
 testing, and so on.  It delegates to built-in functions, if present, so
 modern browsers will use the native implementations of forEach, map,
 reduce, filter, every, some and indexOf.



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101230142859.15188.13649.report...@localhost.localdomain



Re: Safe File Update (atomic)

2010-12-30 Thread Shachar Shemesh

On 30/12/10 13:46, Henrique de Moraes Holschuh wrote:




Is there a code snippet or lib function that handles this properly?


I don't know.  I'd be interested in the answer, though :-)




I'm working on one under the MIT license. Will probably release it by 
the end of this week. Will also handle copying the permissions over and 
following symlinks.


Shachar

--
Shachar Shemesh
Lingnu Open Source Consulting Ltd.
http://www.lingnu.com


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d1c9d3b.6060...@debian.org



Bug#608395: ITP: varnisnncsa-vhost -- Wrapper around 'varnishncsa' tool to save varnish logs with virtualhost

2010-12-30 Thread Joenio Costa
Package: wnpp
Severity: wishlist
Owner: Joenio Costa 


* Package name: varnisnncsa-vhost
  Version : 0.1
  Upstream Author : Joenio Costa 
* URL : http://gitorious.org/varnisnncsa-vhost
* License : GPL2
  Programming Lang: Perl
  Description : Wrapper around 'varnishncsa' tool to save varnish logs with 
virtualhost

This simple script uses varnishncsa tool to provide a way to store varnish logs
with vhost, cause varnish by default until version 2.1.5 not allow to customize
log formats.



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101230143644.28765.80997.report...@case.neuromancer



Re: Safe File Update (atomic)

2010-12-30 Thread Olaf van der Spek
On Thu, Dec 30, 2010 at 3:51 PM, Shachar Shemesh  wrote:
> I'm working on one under the MIT license. Will probably release it by the
> end of this week. Will also handle copying the permissions over and
> following symlinks.

Sounds great!
Got a project page already?
What aboue file owner? Meta-data (ACL)?

Olaf


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktik-o2mu47dfdvm8kedobjfhw7swkxcwy9fwh...@mail.gmail.com



Re: Safe File Update (atomic)

2010-12-30 Thread Mike Hommey
On Thu, Dec 30, 2010 at 03:30:29PM +0100, Olaf van der Spek wrote:
> > name the temp file properly, and teach your program to clean old ones up
> > *safely* (see vim swap file handling for an example) when it starts.
> 
> What about restoring meta-data? File-owner?

owner, permissions, acl, xattrs, and whatever other future stuff can be
stored about files, which then all applications should be made aware of?
Yay for simplicity.

Mike


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101230151011.ga12...@glandium.org



Re: Safe File Update (atomic)

2010-12-30 Thread Shachar Shemesh

On 30/12/10 17:02, Olaf van der Spek wrote:

On Thu, Dec 30, 2010 at 3:51 PM, Shachar Shemesh  wrote:
   

I'm working on one under the MIT license. Will probably release it by the
end of this week. Will also handle copying the permissions over and
following symlinks.
 

Sounds great!
Got a project page already?
   
No. I was doing it as code to accompany an article on my company's site 
about how it should be done. I was originally out to write the article, 
and then decided to add code. A good thing, too, as recursively 
resolving symbolic links is not trivial. There is an extremely simple 
way to do it on Linux, but it will not work on all platforms (the *BSD 
platforms, including Mac, do not have /proc by default).

What aboue file owner? Meta-data (ACL)?

Olaf
   


The current code (I'm still working on it, or I would have released it 
already, but it's about 80% done) does copy owner data over (but ignores 
failures), but does not handle ACLs. I decided to postpone this 
particular hot potato until I can get a chance to see how to do it (i.e. 
- never had a chance on Linux) AND how to do it in a cross-platform way 
(the code is designed to work on any Posix). Pointers/patches once 
released are, of course, welcome :-)


Shachar

--
Shachar Shemesh
Lingnu Open Source Consulting Ltd.
http://www.lingnu.com


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d1ca143.9020...@debian.org



Re: Safe File Update (atomic)

2010-12-30 Thread Olaf van der Spek
On Thu, Dec 30, 2010 at 4:12 PM, Shachar Shemesh  wrote:
> No. I was doing it as code to accompany an article on my company's site
> about how it should be done. I was originally out to write the article, and
> then decided to add code. A good thing, too, as recursively resolving
> symbolic links is not trivial. There is an extremely simple way to do it on
> Linux, but it will not work on all platforms (the *BSD platforms, including
> Mac, do not have /proc by default).

Depending on /proc is probably not reasonable.
Are you sure it will be atomic? ;)

>> What aboue file owner? Meta-data (ACL)?
>>
>> Olaf
>>
>
> The current code (I'm still working on it, or I would have released it
> already, but it's about 80% done) does copy owner data over (but ignores
> failures), but does not handle ACLs. I decided to postpone this particular

How do you preserve owner (as non-root)?

> hot potato until I can get a chance to see how to do it (i.e. - never had a
> chance on Linux) AND how to do it in a cross-platform way (the code is
> designed to work on any Posix). Pointers/patches once released are, of
> course, welcome :-)

The reason I asked for a kernelland solution is because it's hard if
not impossible to do properly in userland. But some kernel devs (Ted
and others) don't agree. They reason that the desire to preserve all
meta-data isn't reasonable by itself.

Olaf


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktik93zn1yjf5xyq_+rhaonrj1bszcafpnmkrt...@mail.gmail.com



Re: Safe File Update (atomic)

2010-12-30 Thread Henrique de Moraes Holschuh
On Thu, 30 Dec 2010, Olaf van der Spek wrote:
> On Thu, Dec 30, 2010 at 12:46 PM, Henrique de Moraes Holschuh
>  wrote:
> >  write temp file (in same directory as file to be replaced), fsync temp
> 
> What if the target name is actually a symlink? To a different volume?

Indeed. You have to check that first, of course :-(  This is about safe
handling of such functions, symlinks always have to be derreferenced and
their target checked.  After that, you operate on the target, if the symlink
changes, your operations will not.

> What if you're not allowed to create a file in that dir.

You fail the write.  Or the user has to request the unsafe handling
(truncate + write).  Or you have to detect it will happen and switch modes
if you're allowed to.

> > If we could use some syscall to make [1] into a simple barrier request
> > (guaranteed to degrade to fsync if barriers are not operating), it would
> > be better performance-wise.  This is what one should request of libc and
> > the kernels with a non-zero chance of getting it implemented (in fact,
> > it might even already exist).
> 
> My proposal was O_ATOMIC:
> // begin transaction
> open(fname, O_ATOMIC | O_TRUNC);
> write; // 0+ times
> close;
> 
> Seems like the ideal API from the app's point of view.

POSIX filesystems do not support it, so you'd need glibc to do everything
your application would have to get that atomicity.  I.e. it should go in a
separate lib, anyway, and you will have to code for it in the app :(

It is not transparent.  It cannot be.  What about mmap()?  What about
read+write patterns?

At most you could have an "open+write+close" function that encapsulate most
of the crap, with a few options to tell it what to do if it finds a symlink
or mismatched owner, what to do if it cannot do it in an atomic way, etc.

I suppose one could actually ask for a non-posix interface to do all those
three operations in one syscall, but I don't think the kernel people will
want to implement it.  It would make sense only if object stores become
commonplace (where this thing is likely an object store primitive, anyway).

> >> I've brought this up on linux-fsdevel and linux-ext4 but they (Ted)
> >> claim those exceptions aren't really a problem.
> >
> > Indeed they are not.  Code has been dealing with them for years.  You
> 
> Code has been wrong for years to, based on the reason reports about
> file corruption with ext4.

Code written to *deal with files safely* by people who wanted to get it
right and actually checked what needs to be done, has been right for years.
And has piss-poor performance.

Code written by random joe which has no clue about the braindamages of POSIX
and Unix, well... this thread shows how much crap is really needed.

One can, obviously, have most filesystems be super-safe, and create a new
fadvise or something to say "this is crap, be unsafe if you can".
Performance will be poor, everything will be safe, and the extra fsyncs()
will not hurt much because the fs would do it anyway.

> > name the temp file properly, and teach your program to clean old ones up
> > *safely* (see vim swap file handling for an example) when it starts.
> 
> What about restoring meta-data? File-owner?

Hmm, yes, more steps if you want to do something like that, as you must do
it with the target open in exclusive mode.  close target only after the
rename went ok.

But if the file owner is not yourself, you really should change it, not to
mention you might not want to complete the operation in the first place.

A lib for this is a really good idea :p

> > vim is a good example: nobody gets surprised by vim swap-files left over
> > when vim/computer crashes. And vim will do something smart with them if
> > it finds them in the current directory when it is started.
> 
> I'm sure the vim code is far from trivial. I think this complexity is
> part of the reason most apps don't bother.

That I agree with completely.

> > BTW: safely removing a file is also tricky.  AFAIK, one must open it RW,
> > in exclusive mode. stat it by fd and check whether it is what one
> 
> Exclusive mode? Linux doesn't know about mandatory locking (AFAIK).

Yeah... races everywhere...

> > expects (regular file, ownership).  unlink it by fd.  close the fd.
> >
> >> Is there a code snippet or lib function that handles this properly?
> >
> > I don't know.  I'd be interested in the answer, though :-)
> 
> I'll ask glibc.

This really should be in a separate lib.  You want it to be usable outside
of glibc systems, and you CAN implement it (slow that it will be) on
anything POSIX.  You need only some help of the kernel to speed it up, and
that has to be detected at compile time (support) and runtime (availability
of the feature) anyway.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-deve

Re: Safe File Update (atomic)

2010-12-30 Thread Henrique de Moraes Holschuh
On Thu, 30 Dec 2010, Olaf van der Spek wrote:
> The reason I asked for a kernelland solution is because it's hard if
> not impossible to do properly in userland. But some kernel devs (Ted
> and others) don't agree. They reason that the desire to preserve all
> meta-data isn't reasonable by itself.

It isn't.  And you can do it anyway:

1. open target, keep it open.
2. do the safe open+write dance on the temp target.
3. get metadata from target by fd
4. apply metadata to temp target by fd
5. atomic rename
6. close both fds
7. sync parent dir.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101230152401.gb4...@khazad-dum.debian.net



Re: Safe File Update (atomic)

2010-12-30 Thread Olaf van der Spek
On Thu, Dec 30, 2010 at 4:20 PM, Henrique de Moraes Holschuh
 wrote:
>> What if the target name is actually a symlink? To a different volume?
>
> Indeed. You have to check that first, of course :-(  This is about safe
> handling of such functions, symlinks always have to be derreferenced and
> their target checked.  After that, you operate on the target, if the symlink
> changes, your operations will not.

That's not really atomic.

>> What if you're not allowed to create a file in that dir.
>
> You fail the write.

That's a regression from the non-atomic case.

> Or the user has to request the unsafe handling
> (truncate + write).  Or you have to detect it will happen and switch modes
> if you're allowed to.
>
>> > If we could use some syscall to make [1] into a simple barrier request
>> > (guaranteed to degrade to fsync if barriers are not operating), it would
>> > be better performance-wise.  This is what one should request of libc and
>> > the kernels with a non-zero chance of getting it implemented (in fact,
>> > it might even already exist).
>>
>> My proposal was O_ATOMIC:
>> // begin transaction
>> open(fname, O_ATOMIC | O_TRUNC);
>> write; // 0+ times
>> close;
>>
>> Seems like the ideal API from the app's point of view.
>
> POSIX filesystems do not support it, so you'd need glibc to do everything

Not yet, but I assume it'll be added when there's enough demand.

> your application would have to get that atomicity.  I.e. it should go in a
> separate lib, anyway, and you will have to code for it in the app :(

Why would it have to go in a separate lib?

> It is not transparent.  It cannot be.  What about mmap()?  What about
> read+write patterns?

They either happen before or after this atomic transaction. Comparable
to the rename workaround.

> At most you could have an "open+write+close" function that encapsulate most
> of the crap, with a few options to tell it what to do if it finds a symlink
> or mismatched owner, what to do if it cannot do it in an atomic way, etc.
>
> I suppose one could actually ask for a non-posix interface to do all those
> three operations in one syscall, but I don't think the kernel people will

There's no need for a single syscall.

> want to implement it.  It would make sense only if object stores become
> commonplace (where this thing is likely an object store primitive, anyway).

Nah. Tons of files are written in one go. All could use this atomic flag.

>> >> I've brought this up on linux-fsdevel and linux-ext4 but they (Ted)
>> >> claim those exceptions aren't really a problem.
>> >
>> > Indeed they are not.  Code has been dealing with them for years.  You
>>
>> Code has been wrong for years to, based on the reason reports about
>> file corruption with ext4.
>
> Code written to *deal with files safely* by people who wanted to get it
> right and actually checked what needs to be done, has been right for years.
> And has piss-poor performance.

Isn't fixing / improving that a good thing?

> Code written by random joe which has no clue about the braindamages of POSIX
> and Unix, well... this thread shows how much crap is really needed.

So you agree that this should be improved?

> One can, obviously, have most filesystems be super-safe, and create a new
> fadvise or something to say "this is crap, be unsafe if you can".
> Performance will be poor, everything will be safe, and the extra fsyncs()
> will not hurt much because the fs would do it anyway.

I actually think this can be done with better performance then the
rename workaround.

>> > name the temp file properly, and teach your program to clean old ones up
>> > *safely* (see vim swap file handling for an example) when it starts.
>>
>> What about restoring meta-data? File-owner?
>
> Hmm, yes, more steps if you want to do something like that, as you must do
> it with the target open in exclusive mode.  close target only after the
> rename went ok.
>
> But if the file owner is not yourself, you really should change it, not to
> mention you might not want to complete the operation in the first place.

Why? Of course write access to the file is required.

>> I'll ask glibc.
>
> This really should be in a separate lib.  You want it to be usable outside
> of glibc systems, and you CAN implement it (slow that it will be) on
> anything POSIX.  You need only some help of the kernel to speed it up, and
> that has to be detected at compile time (support) and runtime (availability
> of the feature) anyway.

Olaf


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktinhoftnychhjsd6og04jrvyube8ul55szyyl...@mail.gmail.com



Re: Safe File Update (atomic)

2010-12-30 Thread Olaf van der Spek
On Thu, Dec 30, 2010 at 4:24 PM, Henrique de Moraes Holschuh
 wrote:
> On Thu, 30 Dec 2010, Olaf van der Spek wrote:
>> The reason I asked for a kernelland solution is because it's hard if
>> not impossible to do properly in userland. But some kernel devs (Ted
>> and others) don't agree. They reason that the desire to preserve all
>> meta-data isn't reasonable by itself.
>
> It isn't.

Why not?

> And you can do it anyway:
>
> 1. open target, keep it open.
> 2. do the safe open+write dance on the temp target.
> 3. get metadata from target by fd
> 4. apply metadata to temp target by fd
> 5. atomic rename
> 6. close both fds
> 7. sync parent dir.

Doesn't work for file-owner.
How does it handle meta-data you don't know about yet?

Olaf


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktimgqaavbzgwndr6bf87=1bvb1au++qje29d+...@mail.gmail.com



Re: Safe File Update (atomic)

2010-12-30 Thread Shachar Shemesh

On 30/12/10 13:46, Henrique de Moraes Holschuh wrote:




Is there a code snippet or lib function that handles this properly?
 

I don't know.  I'd be interested in the answer, though :-)

   


I'm working on one under the MIT license. Will probably release it by 
the end of this week. Will also handle copying the permissions over and 
following symlinks.


Shachar

--
Shachar Shemesh
Lingnu Open Source Consulting Ltd.
http://www.lingnu.com


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d1c9c74.2050...@shemesh.biz



Bug#608409: ITP: diaspora-x2 -- web-based client for XMPP-based decentral social networking

2010-12-30 Thread Jonas Smedegaard
Package: wnpp
Severity: wishlist
Owner: Jonas Smedegaard 

* Package name: diaspora-x2
  Version : 0~git20101222
  Upstream Author : Ben Nolan 
* URL : https://github.com/bnolan/diaspora-x2
* License : Expat (maybe - still working on resolving that)
  Programming Lang: CoffeeScript
  Description : web-based client for XMPP-based decentral social networking

 Diaspora x² is a web-based client for XMPP-based decentral social
 networking.
 .
 Diaspora x² is based on the frontend part of Diaspora (the Ruby on
 Rails project launched early fall of 2010 at much attention),
 reimplemented in CoffeeScript and redesigned to connect to use XMPP
 as developed at http://open.buddycloud.com/ .



--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101230170807.11041.14691.report...@localhost.localdomain



Bug#608410: ITP: libmodule-starter-smart-perl -- Module::Starter plugin to add new modules into existing distributions

2010-12-30 Thread Alessandro Ghedini
Package: wnpp
Severity: wishlist
Owner: Alessandro Ghedini 

* Package name: libmodule-starter-smart-perl
  Version : 0.0.2
  Upstream Author : Ruey-Cheng Chen 
* URL : http://search.cpan.org/dist/Module-Starter-Smart/
* License : Artistic or GPL-1+ (same as Perl)
  Programming Lang: Perl
  Description : Module::Starter plugin to add new modules into existing 
distributions

Module::Starter::Smart is a simple helper plugin for Module::Starter. It
overrides the create_distro, create_modules, and create_t subroutines 
defined in whichever engine plugin in use (say, Module::Starter::Simple). 
.
When invoked with an existing distribution, the plugin may bypass the
create_basedir subroutine, pull in a list of existing modules as well as 
test files, create new modules, and recreate the manifest file accordingly.



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101230171048.24235.55172.report...@pc-ale.rete



Re: Safe File Update (atomic)

2010-12-30 Thread Henrique de Moraes Holschuh
On Thu, 30 Dec 2010, Olaf van der Spek wrote:
> On Thu, Dec 30, 2010 at 4:24 PM, Henrique de Moraes Holschuh
>  wrote:
> > On Thu, 30 Dec 2010, Olaf van der Spek wrote:
> >> The reason I asked for a kernelland solution is because it's hard if
> >> not impossible to do properly in userland. But some kernel devs (Ted
> >> and others) don't agree. They reason that the desire to preserve all
> >> meta-data isn't reasonable by itself.
> >
> > It isn't.
> 
> Why not?

You touched it, it is not the same file/inode anymore.

> How does it handle meta-data you don't know about yet?

It doesn't.  You need a "copy inode without the file data" filesystem
interface to be able to do that in the first place.  It might exist, but I
never heard of it.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101230174822.ga20...@khazad-dum.debian.net



Re: Safe File Update (atomic)

2010-12-30 Thread Olaf van der Spek
On Thu, Dec 30, 2010 at 6:48 PM, Henrique de Moraes Holschuh
 wrote:
>> Why not?
>
> You touched it, it is not the same file/inode anymore.

That's again a regression from the non-atomic case.

>> How does it handle meta-data you don't know about yet?
>
> It doesn't.  You need a "copy inode without the file data" filesystem
> interface to be able to do that in the first place.  It might exist, but I
> never heard of it.

You wouldn't need that with O_ATOMIC.

Olaf


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktimyynyyyw2osbkbg8wxgv2ybrdotzymzlu83...@mail.gmail.com



Re: Safe File Update (atomic)

2010-12-30 Thread Shachar Shemesh

On 30/12/10 19:48, Henrique de Moraes Holschuh wrote:


It doesn't.  You need a "copy inode without the file data" filesystem
interface to be able to do that in the first place.  It might exist, but I
never heard of it.

   


If my (extremely leaky) memory serves me right, Windows has it. It's 
called "delete and then rename". It is not atomic (since when do Windows 
care about not breaking stuff), but it does exactly that.


If you delete a file and quickly (yes, this feature is time based) 
rename a different file to the same name, the new file will receive all 
metadata information the old file had (including owner, permissions etc.)


Just thought I'd share this little nugget to show you how much worse 
non-posix has it.


Shachar

--
Shachar Shemesh
Lingnu Open Source Consulting Ltd.
http://www.lingnu.com


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d1ccc38.6000...@debian.org



Re: Safe File Update (atomic)

2010-12-30 Thread Shachar Shemesh

On 30/12/10 17:17, Olaf van der Spek wrote:

On Thu, Dec 30, 2010 at 4:12 PM, Shachar Shemesh  wrote:
   

No. I was doing it as code to accompany an article on my company's site
about how it should be done. I was originally out to write the article, and
then decided to add code. A good thing, too, as recursively resolving
symbolic links is not trivial. There is an extremely simple way to do it on
Linux, but it will not work on all platforms (the *BSD platforms, including
Mac, do not have /proc by default).
 

Depending on /proc is probably not reasonable.
Are you sure it will be atomic? ;)

   
open old file, get fd (we'll assume it's 5). Do readlink on 
/proc/self/fd/5, and get file's real path. Do everything in said path. 
It's atomic, in the sense that the determining point in time is the 
point in which you opened the old file.


How do you preserve owner (as non-root)?

   
I thought I answered that. Best effort. You perform the chown, but do 
not bother with the return code. If it succeeded, great. If not, well, 
you did your best.


The reason I asked for a kernelland solution is because it's hard if
not impossible to do properly in userland. But some kernel devs (Ted
and others) don't agree. They reason that the desire to preserve all
meta-data isn't reasonable by itself.
   
I'm with Henrique on that one. I am more concerned with the amount of 
non-Posix code that needs to go into this than preserving all attributes.


Shachar

--
Shachar Shemesh
Lingnu Open Source Consulting Ltd.
http://www.lingnu.com


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d1ccd81.3010...@debian.org



Re: Safe File Update (atomic)

2010-12-30 Thread Olaf van der Spek
On Thu, Dec 30, 2010 at 7:15 PM, Shachar Shemesh  wrote:
> If my (extremely leaky) memory serves me right, Windows has it. It's called
> "delete and then rename". It is not atomic (since when do Windows care about
> not breaking stuff), but it does exactly that.
>
> If you delete a file and quickly (yes, this feature is time based) rename a
> different file to the same name, the new file will receive all metadata
> information the old file had (including owner, permissions etc.)
>
> Just thought I'd share this little nugget to show you how much worse
> non-posix has it.

You're kidding me. Got any source to back this up?

Olaf


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktik8ywzth67auoukrxmt2w1urmpgahnbg4k9s...@mail.gmail.com



Re: Safe File Update (atomic)

2010-12-30 Thread Olaf van der Spek
On Thu, Dec 30, 2010 at 7:20 PM, Shachar Shemesh  wrote:
>> Depending on /proc is probably not reasonable.
>> Are you sure it will be atomic? ;)
>>
>>
>
> open old file, get fd (we'll assume it's 5). Do readlink on /proc/self/fd/5,
> and get file's real path. Do everything in said path. It's atomic, in the
> sense that the determining point in time is the point in which you opened
> the old file.
>>
>> How do you preserve owner (as non-root)?
>>
>>
>
> I thought I answered that. Best effort. You perform the chown, but do not
> bother with the return code. If it succeeded, great. If not, well, you did
> your best.

Ah. Another regression.

>>
>> The reason I asked for a kernelland solution is because it's hard if
>> not impossible to do properly in userland. But some kernel devs (Ted
>> and others) don't agree. They reason that the desire to preserve all
>> meta-data isn't reasonable by itself.
>>
>
> I'm with Henrique on that one. I am more concerned with the amount of
> non-Posix code that needs to go into this than preserving all attributes.

With kernel support you would only need a single non-POSIX flag.
Please be sure to document all assumptions / limitations of your variant.

Olaf


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktimzgfzwpj8phtevdycbxwwd5s7pp+enlcpi+...@mail.gmail.com



Re: Safe File Update (atomic)

2010-12-30 Thread Ben Hutchings
On Thu, 2010-12-30 at 19:29 +0100, Olaf van der Spek wrote:
> On Thu, Dec 30, 2010 at 7:15 PM, Shachar Shemesh  wrote:
> > If my (extremely leaky) memory serves me right, Windows has it. It's called
> > "delete and then rename". It is not atomic (since when do Windows care about
> > not breaking stuff), but it does exactly that.
> >
> > If you delete a file and quickly (yes, this feature is time based) rename a
> > different file to the same name, the new file will receive all metadata
> > information the old file had (including owner, permissions etc.)
> >
> > Just thought I'd share this little nugget to show you how much worse
> > non-posix has it.
> 
> You're kidding me. Got any source to back this up?

http://support.microsoft.com/?kbid=172190

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part


Re: Safe File Update (atomic)

2010-12-30 Thread Olaf van der Spek
On Thu, Dec 30, 2010 at 7:46 PM, Ben Hutchings  wrote:
>> You're kidding me. Got any source to back this up?
>
> http://support.microsoft.com/?kbid=172190

Interesting. Although no longer available on Vista / 7.

Olaf


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktinuqjcgdg0aazqkiomfthqyorfzc89y7xquu...@mail.gmail.com



Bitcoin donation

2010-12-30 Thread cyclonite
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Dear friends,

I have been looking in your site for any reference to Bitcoin for making a 
small donation.

As you probably know, Bitcoin (bitcoin.org) is a new kind of a P2P 
crypto-currency in which the general public can make donations, macro or 
micropayments in a secure and anonymous way usually without any transaction fee 
involved.

You can change Bitcoins for real Dollars (eg: https://mtgox.com) or purchase 
services or goods in an increasing number of sites.

In order to receive donations you only have to publish one of your accounts as 
generated by the bitcoin client or any specialized bitcoin trader (eg: 
mybitcoin.com)

Currently some projects as www.i2p2.de, www.torrentservers.net and 
organizations like the EFF are accepting donations.

In my opinion this kind of decentralized solution without the need to trust any 
middlemen is much better than Paypal (Visa, Mastercard ...) for security-minded 
people as most of your donors are.

If you are interested in pushing Bitcoin forward, do not hesitate to contact me 
if you have any doubt.

Yours,
Cyclonite
-BEGIN PGP SIGNATURE-
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=52Cw
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/n1r-_s5jd0o...@safe-mail.net



Bug#608424: ITP: backbone -- some Backbone for JS Apps with Models, Views, Collections, and Events

2010-12-30 Thread Jonas Smedegaard
Package: wnpp
Severity: wishlist
Owner: Jonas Smedegaard 

* Package name: backbone
  Version : 0.3.3
  Upstream Author : Jeremy Ashkenas 
* URL : http://documentcloud.github.com/backbone/
* License : Expat
  Programming Lang: JavaScript
  Description : some Backbone for JS Apps with Models, Views, Collections, 
and Events

 Backbone supplies structure to JavaScript-heavy applications by
 providing models key-value binding and custom events, collections with
 a rich API of enumerable functions, views with declarative event
 handling, and connects it all to your existing application over a
 RESTful JSON interface.



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101230194600.29119.55004.report...@localhost.localdomain



Re: Bug#608377: ITP: libhtml-quoted-perl -- extract structure of quoted HTML mail message

2010-12-30 Thread Dominic Hargreaves
On Thu, Dec 30, 2010 at 11:33:10AM +, Dominic Hargreaves wrote:

> NB: the current CPAN release is marked as experimental and is missing
> a licence. I will clarify these points with the author before uploading.

This was a mistake; this module does in fact come with a Free licence
but I failed to spot it at the search.cpan.org listing.

With regards to the 'experimental' description, I will initially
upload this to Debian experimental, along with the RT package which
requires it.

Cheers,
Dominic.

-- 
Dominic Hargreaves | http://www.larted.org.uk/~dom/
PGP key 5178E2A5 from the.earth.li (keyserver,web,email)


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101230212525.go4...@urchin.earth.li



Re: Bug#608395: ITP: varnisnncsa-vhost -- Wrapper around 'varnishncsa' tool to save varnish logs with virtualhost

2010-12-30 Thread Joenio Costa
On Thu, Dec 30, 2010 at 07:48:16PM +0100, Tollef Fog Heen wrote:
> This is fairly pointless as 3.0 supports user-specifiable formats and
> filtering and will be out in 2011Q1 so varnishncsa-vhost won't ever be
> in a stable release where it makes sense to have it.

I figured it out.

I had packaged it and uploaded to my personal repository, maybe can be
usefull to someone:

http://sede.colivre.coop.br/~joenio/debian/

-- 
Joenio Costa
- www.Colivre.coop.br
- www.Perl.org.br
- Salvador.pm.org

GNU/Linux User #431067 http://counter.li.org


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101230214119.ga30...@debian



Re: Bitcoin donation

2010-12-30 Thread Petter Reinholdtsen

[Cyclonite]
> Dear friends,
>
> I have been looking in your site for any reference to Bitcoin for
> making a small donation.

As far as I know, none of the organisations accepting donations on
behalf of the Debian project accept bitcoin.

We are considering it for the SLX Debian Labs foundation which accept
donations for the Debian Edu/Skolelinux project, but have not
concluded yet.  I am the chair of the SLX Debianc Labs foundation.  I
believe there are some accounting and legal issues as well as some
practical issues to consider before we can accept it.

Given that the EFF with its privacy sensitive target group so far has
only received 2483.8 bitcoins[1] to its bitcoin donation address, it
seem unlikely that Debian will receive much money this way any time
soon.

But it might be interesting to support the bitcoin system by accepting
donations, and give users of bitcoin more to spend their bitcoins
on. :)

 1 Extracted using "lynx -dump 
http://blockexplorer.com/address/1MCwBbhNGp5hRm5rC1Aims2YFRe2SXPYKt|grep 
Received:|grep Block|awk '{sum = sum + $6} END { print sum}'".

Happy hacking,
-- 
Petter Reinholdtsen


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/2flr5cy5398@login1.uio.no



Re: securing/monitoring Debian devel environment

2010-12-30 Thread Christian Kastner
On 12/22/2010 05:10 PM, Yaroslav Halchenko wrote:
> May be there is a lightweight utility which could be used for
> monitoring, e.g. it would report suspicious actions being taken from
> within a monitored environment?  e.g., it would
> 
> * sanitize environment variables
> * monitor open/socket/... syscalls and report abnormal activities
>   (e.g. opening network connection, writing to a file outside of
>   build-tree,/tmp/, etc)
> * provide a summary at the end on the invoked actions by the target
>   command
> 
> I guess a possible solution which would not only monitor but
> guarantee would be SELinux, but I am afraid it might be somewhat
> cumbersome to setup policies across the variety of packages I maintain.
> So I just wanted to monitor to start with.

In private communication, Yaroslav and I have been bouncing some crude
ideas around, which I'm going to summarize here.

Of the possible approaches we discussed, two seem to fulfill the
requirements above:
 * SystemTap [0,1]
 * auditd [2,3]

[0] http://sourceware.org/systemtap/
[1] http://packages.debian.org/sid/systemtap
[2] http://people.redhat.com/sgrubb/audit/
[3] http://packages.debian.org/sid/auditd

note that SELinux was excluded for the reasons Yaroslav mentioned above.

SYSTEMTAP: The SystemTap approach appeared the most promising at first
glance, as it is fully scriptable and the Beginner's Guide contains
ready-to-use scripts covering basically all the requirements mentioned
above. Yaroslav also discussed this with #systemtap, they pointed out
some issues WRT fork()s etc but otherwise had no major objections.

SystemTap has one drawback: it requires a kernel with debugging stuff
enabled (see #568866), which AFAIUI is only available on i386/amd64 and
requires 1.5GB disk space.


AUDITD: Seeing that SystemTap's purpose goes way beyond simple auditing,
I took a shot at auditd -- which is supported by the standard kernel --
with the goal of producing a simple wrapper script for debuild.

My initial optimism and success was dampened as I gained more experience
with auditd and it's goals. To elaborate, it is quite simple to create
auditing rules achieving the goals above, however an approach "tailored"
to package-build-audit *only* is a pain. For example, it is easy to
monitor *all* access to /etc/shadow or changes to /bin/login, it is
quite hard to limit the monitoring to a *process tree* (our building
process).

Furthermore, generating sensible reports from the data above wasn't all
too easy as well. ausearch and aureport are very useful, but one must
still pre- or postprocess their respective outputs to get the desired
results.

Finally, it appears -- at least to me -- that Prelude IDS (already
packaged) is the way to go. It is a full-scale, real-time IDS (using the
auditing subsystem) with numerous features including plugin support for
sensors and also good reporting. The initial objective is just a subset
of Prelude's goal, and seeing as there is a lot of weight thrown behind
Prelude, the merit of a custom solution (based on the raw auditing data)
is probably debatable.


Anyway, I'm at my limits here -- even though the idea and the available
technology is highly interesting, I do not have the necessary time
available ATM to go deeper. If there's anyone security-minded with time
on his/her hands, the ball is yours...


Regards,
Christian


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d1d0e7d.5030...@kvr.at



Re: securing/monitoring Debian devel environment

2010-12-30 Thread Olaf van der Spek
On Thu, Dec 30, 2010 at 11:58 PM, Christian Kastner  wrote:
> to package-build-audit *only* is a pain. For example, it is easy to
> monitor *all* access to /etc/shadow or changes to /bin/login, it is
> quite hard to limit the monitoring to a *process tree* (our building
> process).

Does the build process run as root? If so, I think it shouldn't. If
not, it can't read /etc/shadow.
About elevation via sudo: don't enable/use ssh/sudo/etc from the
account you use to build.

Olaf


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktikh_rvdsjy+2_=lut0qcqggersg=ebnwv2-5...@mail.gmail.com



Re: Static linking: pkgconfig vs libtool

2010-12-30 Thread Enrico Weigelt
* Russ Allbery  schrieb:

> pkg-config is much superior to libtool, since libtool includes all the
> libraries on dynamic links as well, which creates unwanted shared library
> dependencies and causes other problems.  Because of that, the trend in
> Debian is to empty that information from libtool *.la files or not ship
> them at all, making them useless for static linking information.

Gentoo is also in process of getting rid of .la files.


cu
-- 
--
 Enrico Weigelt, metux IT service -- http://www.metux.de/

 phone:  +49 36207 519931  email: weig...@metux.de
 mobile: +49 151 27565287  icq:   210169427 skype: nekrad666
--
 Embedded-Linux / Portierung / Opensource-QM / Verteilte Systeme
--


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101230233959.ga10...@nibiru.local



Re: using perl in preinst script

2010-12-30 Thread Carsten Hey
* Philipp Kern [2010-12-29 05:38 +]:
> On 2010-12-28, Carsten Hey  wrote:
> > ...  One reason for this is that dpkg's perl scripts were rewritten
> > in C.
>
> I know you phrased it differently but wasn't the motivation for this
> rewrite to be more robust in the base system on upgrades?  I.e. do not
> rely on Perl and thus avoid adding more contraints on how the base
> upgrade must be performed to keep dpkg working properly.

I don't know what the main motivation was, although making upgrades more
robust seems to be a possible and a good one.

http://wiki.debian.org/Teams/Dpkg/RoadMap says:
| Make dpkg.deb contain only sh and C programs (to help embedded
| distros, to make it possible to remove perl-base from essential)


Regards
Carsten


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101231005641.ga6...@furrball.stateful.de



Re: Safe File Update (atomic)

2010-12-30 Thread Henrique de Moraes Holschuh
On Thu, 30 Dec 2010, Henrique de Moraes Holschuh wrote:
> BTW: safely removing a file is also tricky.  AFAIK, one must open it RW,
> in exclusive mode. stat it by fd and check whether it is what one
> expects (regular file, ownership).  unlink it by fd.  close the fd.

Eh, as it was pointed to me by private mail, this is obviously a load of
crap :p  There is no unlink by fd.  Sorry about that.

The attacks here are races by messing with intermediate path components,
which are either not worth bothering with, or have to be avoided in a
much more convoluted manner.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101231021723.ga9...@khazad-dum.debian.net



Bug#608460: ITP: pev -- Utility to get Product Version of PE32 executables

2010-12-30 Thread Fernando Mercês
Package: wnpp
Severity: wishlist
Owner: "Fernando Mercês" 


* Package name: pev
  Version : 0.22
  Upstream Author : Fernando Mercês 
* URL : http://coding40.mentebinaria.com.br
* License : GPL
  Programming Lang: C
  Description : Utility to get Product Version of PE32 executables

pev is a little text-based tool to get the Product Version field of PE32
executables (EXE, DLL, OCX etc).



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101231041516.8420.58585.report...@brussels



Re: Safe File Update (atomic)

2010-12-30 Thread Shachar Shemesh

On 30/12/10 17:02, Olaf van der Spek wrote:

Got a project page already?
   


Watch this space. Actual code coming soon(tm).

https://github.com/Shachar/safewrite

Shachar

--
Shachar Shemesh
Lingnu Open Source Consulting Ltd.
http://www.lingnu.com


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d1d743b.8080...@shemesh.biz