Re: On upstart implementing Debian Policy §9.11.1 on behalf of sysv init scripts

2013-06-21 Thread Dmitrijs Ledkovs
On 20 June 2013 16:32, Tollef Fog Heen  wrote:
> ]] Dmitrijs Ledkovs
>
>> if init_is_upstart; then
>> upstart_job=/etc/init/$(basename ${0:-}).conf
>> if [ -f ${upstart_job:-} ] && [ ! -L ${upstart_job:-} ]; then
>
> Why the -L ?
>

! -L =  not a symlink, upstart jobs cannot be symlinks. Above is a
very basic sanity check.
I haven't checked, but if above is implemented, the logic of checking
"equivalent upstart job is available" should match the one already
implemented in the update-rc.d / incoke-rc.d / service commands.
So consider above more of a working proof of concept, rather than
final code proposal.

Regards,

Dmitrijs.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CANBHLUgc0mNkGRej0w+ECmwrh-RfDw+eV=x=jrhdddox2bu...@mail.gmail.com



Work-needing packages report for Jun 21, 2013

2013-06-21 Thread wnpp
The following is a listing of packages for which help has been requested
through the WNPP (Work-Needing and Prospective Packages) system in the
last week.

Total number of orphaned packages: 480 (new: 0)
Total number of packages offered up for adoption: 153 (new: 1)
Total number of packages requested help for: 60 (new: 0)

Please refer to http://www.debian.org/devel/wnpp/ for more information.



No new packages have been orphaned, but a total of 480 packages are
orphaned.  See http://www.debian.org/devel/wnpp/orphaned
for a complete list.



The following packages have been given up for adoption:

   olive (#712937), offered today
 Installations reported by Popcon: 56

152 older packages have been omitted from this listing, see
http://www.debian.org/devel/wnpp/rfa_bypackage for a complete list.



For the following packages help is requested:

   apt-xapian-index (#567955), requested 1235 days ago
 Description: maintenance tools for a Xapian index of Debian packages
 Reverse Depends: ept-cache fuss-launcher goplay packagesearch
 Installations reported by Popcon: 75694

   asymptote (#517342), requested 1574 days ago
 Description: script-based vector graphics language inspired by
   MetaPost
 Installations reported by Popcon: 4553

   athcool (#278442), requested 3159 days ago
 Description: Enable powersaving mode for Athlon/Duron processors
 Installations reported by Popcon: 61

   balsa (#642906), requested 634 days ago
 Description: An e-mail client for GNOME
 Reverse Depends: balsa-dbg
 Installations reported by Popcon: 1202

   bastille (#592137), requested 1048 days ago
 Description: Security hardening tool
 Installations reported by Popcon: 152

   cardstories (#624100), requested 787 days ago
 Description: Find out a card using a sentence made up by another
   player
 Installations reported by Popcon: 12

   chromium-browser (#583826), requested 1117 days ago
 Description: Chromium browser
 Reverse Depends: chromium chromium-browser chromium-browser-dbg
   chromium-browser-inspector chromium-browser-l10n chromium-dbg
   chromium-l10n mozplugger
 Installations reported by Popcon: 17269

   cups (#532097), requested 1475 days ago
 Description: Common UNIX Printing System
 Reverse Depends: bluez-cups chromium cups cups-backend-bjnp
   cups-browsed cups-bsd cups-client cups-daemon cups-dbg cups-filters
   (58 more omitted)
 Installations reported by Popcon: 122739

   debtags (#567954), requested 1235 days ago
 Description: Enables support for package tags
 Reverse Depends: goplay packagesearch
 Installations reported by Popcon: 2476

   fbcat (#565156), requested 1254 days ago
 Description: framebuffer grabber
 Installations reported by Popcon: 151

   flightgear (#487388), requested 1825 days ago
 Description: Flight Gear Flight Simulator
 Installations reported by Popcon: 586

   freeipmi (#628062), requested 756 days ago
 Description: GNU implementation of the IPMI protocol
 Reverse Depends: freeipmi freeipmi-bmc-watchdog freeipmi-ipmidetect
   freeipmi-tools libfreeipmi-dev libfreeipmi12 libipmiconsole-dev
   libipmiconsole2 libipmidetect-dev libipmidetect0 (2 more omitted)
 Installations reported by Popcon: 2914

   gnat-4.4 (#539633), requested 1892 days ago
 Description: backport bug fixes from trunk (GCC 4.5)
 Reverse Depends: ghdl gnat-4.4 libgnat-4.4 libgnat-4.4-dbg
   libgnatprj-dev libgnatprj4.4 libgnatprj4.4-dbg libgnatprj4.4-dev
   libgnatvsn-dev libgnatvsn4.4 (2 more omitted)
 Installations reported by Popcon: 1833

   gnat-gps (#496905), requested 1757 days ago
 Description: co-maintainer needed
 Reverse Depends: gnat-gps gnat-gps-dbg
 Installations reported by Popcon: 501

   gnokii (#677750), requested 369 days ago
 Description: Datasuite for mobile phone management
 Reverse Depends: gnokii gnokii-cli gnokii-smsd gnokii-smsd-mysql
   gnokii-smsd-pgsql gnome-phone-manager libgnokii-dev libgnokii6
   xgnokii
 Installations reported by Popcon: 2048

   gnupg (#660685), requested 486 days ago
 Description: GNU privacy guard - a free PGP replacement
 Reverse Depends: apt bootstrap-base cdebootstrap cdebootstrap-static
   cdebootstrap-udeb clamav-unofficial-sigs cloud-utils
   debian-archive-keyring debian-edu-archive-keyring
   debian-ports-archive-keyring (48 more omitted)
 Installations reported by Popcon: 151794

   gpa (#663405), requested 467 days ago
 Description: GNU Privacy Assistant (GPA)
 Installations reported by Popcon: 657

   gradle (#683666), requested 322 days ago
 Description: Groovy based build system
 Reverse Depen

Re: On upstart implementing Debian Policy §9.11.1 on behalf of sysv init scripts

2013-06-21 Thread Dmitrijs Ledkovs
On 20 June 2013 18:26, Russ Allbery  wrote:
> Dmitrijs Ledkovs  writes:
>
>> Thus in a bug report 712763 [4], included below, I instead propose
>> instead shipping slightly larger block of code in the upstart package
>> which is sourced by /lib/lsb/init-functions from init-functions.d
>> directory. Something along the lines of:
>
>> if init_is_upstart; then
>> upstart_job=/etc/init/$(basename ${0:-}).conf
>> if [ -f ${upstart_job:-} ] && [ ! -L ${upstart_job:-} ]; then
>> case "${1:-}" in
>> start|restart|force-reload)
>> exit 1
>> ;;
>> stop)
>> exit 0
>> ;;
>> esac
>> fi
>> fi
>
> Libraries, even shell libraries, should generally not call exit.  It's
> very surprising behavior.  The overall program flow should remain under
> the control of the main program.

In general I agree, and I think this was one of points of including
helper-free check in the policy & including a helper in the
init-functions, which one can call as appropriate.

Another fundamental question is: should direct invocation of
/etc/init.d/ be outright deprecated? and thus even stronger
safe-guards put in place (e.g. something at the scale of chmod -x
/etc/init.d/*)
or shall we allow people shooting themselves in the foot and allow
init.d scripts not to have upstart-safeguard if a maintainer does not
wish to include one? E.g. update-rc.d / incoke-rc.d
/ service works correctly with sysv-init & upstart, but if one invokes
init.d scripts directly and they happen to be managed by upstart,
leave those users on their own? At the moment policy is a must: "SysV
init scripts for which an equivalent upstart job is available __must__
query the output of the..."

Regards,

Dmitrijs.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CANBHLUgzgF+YvnsZXxv4hYvEx-jm4M_p=kTZv=yaqjuuq18...@mail.gmail.com



Re: On upstart implementing Debian Policy §9.11.1 on behalf of sysv init scripts

2013-06-21 Thread Chow Loong Jin
On Fri, Jun 21, 2013 at 10:34:54AM +0100, Dmitrijs Ledkovs wrote:
> On 20 June 2013 18:26, Russ Allbery  wrote:
> > Dmitrijs Ledkovs  writes:
> >
> >> Thus in a bug report 712763 [4], included below, I instead propose
> >> instead shipping slightly larger block of code in the upstart package
> >> which is sourced by /lib/lsb/init-functions from init-functions.d
> >> directory. Something along the lines of:
> >
> >> if init_is_upstart; then
> >> upstart_job=/etc/init/$(basename ${0:-}).conf
> >> if [ -f ${upstart_job:-} ] && [ ! -L ${upstart_job:-} ]; then
> >> case "${1:-}" in
> >> start|restart|force-reload)
> >> exit 1
> >> ;;
> >> stop)
> >> exit 0
> >> ;;
> >> esac
> >> fi
> >> fi
> >
> > Libraries, even shell libraries, should generally not call exit.  It's
> > very surprising behavior.  The overall program flow should remain under
> > the control of the main program.
> 
> In general I agree, and I think this was one of points of including
> helper-free check in the policy & including a helper in the
> init-functions, which one can call as appropriate.
> 
> Another fundamental question is: should direct invocation of
> /etc/init.d/ be outright deprecated? and thus even stronger
> safe-guards put in place (e.g. something at the scale of chmod -x
> /etc/init.d/*)
> or shall we allow people shooting themselves in the foot and allow
> init.d scripts not to have upstart-safeguard if a maintainer does not
> wish to include one? E.g. update-rc.d / incoke-rc.d
> / service works correctly with sysv-init & upstart, but if one invokes
> init.d scripts directly and they happen to be managed by upstart,
> leave those users on their own? At the moment policy is a must: "SysV
> init scripts for which an equivalent upstart job is available __must__
> query the output of the..."

I think printing out a noisy warning and allowing people to shoot themselves in
the foot would be good. I reckon a significant number of legacy
(custom/proprietary) scripts currently attempt to poke /etc/init.d/foo directly.
Perhaps allowing the sysadmin to choose the desired behaviour via debconf would
do..

One point of concern that just occurred to me is that on an Upstart-booted,
running system that was just upgraded to include this init-functions snippet,
Upstart wouldn't know about init.d-started services, and wouldn't be able to
stop them. Additionally, due to the `exit 0' that occurs if [ $1 = stop ], you
wouldn't be able to stop the process using the traditional sysvinit script
either. You'd end up needing to kill the service manually or trawl through the
init script to figure out how to kill it properly.

-- 
Kind regards,
Loong Jin


signature.asc
Description: Digital signature


Bug#712972: ITP: mp4parser -- Generic parser and writer for ISO 14496 based files

2013-06-21 Thread Emmanuel Bourg
Package: wnpp
Severity: wishlist
Owner: Emmanuel Bourg 

* Package name: mp4parser
  Version : 1.0-RC-23
  Upstream Author : Sebastian Annies 
* URL : http://code.google.com/p/mp4parser/
* License : Apache-2.0
  Programming Lang: Java
  Description : Generic parser and writer for ISO 14496 based files

The MP4 Parser project consists in:

* ISO Parser, an API for reading and writing the MP4 file structure. It is a low
level tool dealing with the so called boxes but it is as well as dealing with
structure like tracks and movies.

* ISO Viewer, a Swing application that helps you to visualize the MP4 box 
structure. 


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130621103710.9248.39099.reportbug@debiandev



Re: ITP: ruby-em-hiredis -- fast and simple Redis client for EventMachine

2013-06-21 Thread Per Andersson
On Fri, Jun 21, 2013 at 7:32 AM, Faidon Liambotis  wrote:
> On 06/21/13 02:59, Per Andersson wrote:
>>
>> Package: wnpp
>
>
> Please use X-Debbugs-Cc when filing ITP bugs (or reportbug, which does this
> automatically). Do not Cc debian-devel directly, as it's impossible for
> someone to properly reply to your bug report without looking its bug number
> up on the WNPP bug index.

Sure, thanks for the tip.


> Also, the whole point of Cc'ing ITPs to debian-devel is for people to get a
> chance to make notes/raise questions/object, so you should wait a day or two
> before uploading, not upload within three hours or so.

Reasonable of course.


> Finally, like any bug
> report, when someone does take the time to make a comment on an ITP of
> yours, it is customary to at least reply to them addressing or rejecting
> their concerns :)

Absolutely. Something in particular that you have in mind?


Thanks for taking the time to enlighten me!


Best,
Per

> Cheers,
> Faidon


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cabyrxsqnjooiyj07xzkj4xibpmy43o10u62soh8futunk-2...@mail.gmail.com



Re: On upstart implementing Debian Policy §9.11.1 on behalf of sysv init scripts

2013-06-21 Thread Dmitrijs Ledkovs
On 21 June 2013 11:24, Chow Loong Jin  wrote:
> On Fri, Jun 21, 2013 at 10:34:54AM +0100, Dmitrijs Ledkovs wrote:
>> On 20 June 2013 18:26, Russ Allbery  wrote:
>> > Dmitrijs Ledkovs  writes:
>> >
>> >> Thus in a bug report 712763 [4], included below, I instead propose
>> >> instead shipping slightly larger block of code in the upstart package
>> >> which is sourced by /lib/lsb/init-functions from init-functions.d
>> >> directory. Something along the lines of:
>> >
>> >> if init_is_upstart; then
>> >> upstart_job=/etc/init/$(basename ${0:-}).conf
>> >> if [ -f ${upstart_job:-} ] && [ ! -L ${upstart_job:-} ]; then
>> >> case "${1:-}" in
>> >> start|restart|force-reload)
>> >> exit 1
>> >> ;;
>> >> stop)
>> >> exit 0
>> >> ;;
>> >> esac
>> >> fi
>> >> fi
>> >
>> > Libraries, even shell libraries, should generally not call exit.  It's
>> > very surprising behavior.  The overall program flow should remain under
>> > the control of the main program.
>>
>> In general I agree, and I think this was one of points of including
>> helper-free check in the policy & including a helper in the
>> init-functions, which one can call as appropriate.
>>
>> Another fundamental question is: should direct invocation of
>> /etc/init.d/ be outright deprecated? and thus even stronger
>> safe-guards put in place (e.g. something at the scale of chmod -x
>> /etc/init.d/*)
>> or shall we allow people shooting themselves in the foot and allow
>> init.d scripts not to have upstart-safeguard if a maintainer does not
>> wish to include one? E.g. update-rc.d / incoke-rc.d
>> / service works correctly with sysv-init & upstart, but if one invokes
>> init.d scripts directly and they happen to be managed by upstart,
>> leave those users on their own? At the moment policy is a must: "SysV
>> init scripts for which an equivalent upstart job is available __must__
>> query the output of the..."
>
> I think printing out a noisy warning and allowing people to shoot themselves 
> in
> the foot would be good. I reckon a significant number of legacy
> (custom/proprietary) scripts currently attempt to poke /etc/init.d/foo 
> directly.
> Perhaps allowing the sysadmin to choose the desired behaviour via debconf 
> would
> do..
>

I'm not sure I understand you.

> One point of concern that just occurred to me is that on an Upstart-booted,
> running system that was just upgraded to include this init-functions snippet,
> Upstart wouldn't know about init.d-started services, and wouldn't be able to
> stop them. Additionally, due to the `exit 0' that occurs if [ $1 = stop ], you
> wouldn't be able to stop the process using the traditional sysvinit script
> either. You'd end up needing to kill the service manually or trawl through the
> init script to figure out how to kill it properly.
>

Only if both are present:
/etc/init/myservice.conf
/etc/init.d/myservice

The /etc/init.d/myservice, should exit/do nothing if and only if PID1
is upstart, since upstart is managing myservice via a native upstart
job.

If there is no equivalent upstart job (as I think is the case in your
example above), the init.d script must continue to function correctly
as per debian policy (including start/stop/restart).
Thus the init-functions.d snippet above does a check of if upstart is
PID1 and the '/etc/init/myservice.conf' exists, and only then adds the
appropriate exit 1/0. And in the case of upstart-booted system it will
indeed be managing "myservice".

Are you talking about a case where a package is upgraded from
sysv-init.d only to an upstart&sysv-init.d capable version? As per
current recommendations, such services are stopped in preinst (cleanly
via init.d script) & started in postinst (potentially by upstart). [1]

Maybe I didn't understand the scenario you described. Can you please elaborate?

[1] https://wiki.ubuntu.com/UpstartCompatibleInitScripts

Regards,

Dmitrijs.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/canbhlugvkssirjxadahg+bgycgtz1berqstyeyqkpyiub+m...@mail.gmail.com



Re: ITP: foreman -- manage Procfile-based applications

2013-06-21 Thread Per Andersson
On Mon, Jun 10, 2013 at 3:48 AM, Faidon Liambotis  wrote:
> On 06/10/13 03:46, Per Andersson wrote:
>>
>> * Package name: foreman
>>Version : 0.63.0
>>Upstream Author : David Dollar 
>> * URL : http://github.com/ddollar/foreman
>> * License : MIT
>>Programming Lang: Ruby
>>Description : manage Procfile-based applications
>>
>>   Foreman is a manager for Procfile-based applications. Its aim is to
>> abstract
>>   away the details of the Procfile format, and allow you to either run
>> your
>>   application directly or export it to some other process management
>> format.
>
>
> There's a more popular/more complicated piece of software called Foreman[1],
> for which there's an RFP already[2], as well as a component of that,
> foremancli, already in Debian. Upstream provides a package too, although you
> could argue it isn't our problem if there's a naming conflict.

I saw this but decided to ignore it for now since there hasn't been any activity
with Foreman in over a year. If the name conflict arise in Debian it is a pretty
small matter to change it then I think. I.e. Foreman[1] renaming to
theforeman as
the upstream web page or this foreman renaming to ruby-foreman or some such,
it is not a big thing IMHO.


> Nevertheless, I think it'd be best to avoid a package naming conflict
> between the two apparently completely unrelated applications.

I agree.


> Oh, and BTW, you should probably explain what a Procfile is on the long
> description of your package as it's not immediately obvious.

I will add this.


Thanks for taking the time to make Debian better!


Best,
Per

> Regards,
> Faidon
>
> 1: http://www.theforeman.org/
> 2: http://bugs.debian.org/663101


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CABYrXSQQ6cggW9qf+JtxvVFU=z3dkk6+oiwmjbi9r3wwzht...@mail.gmail.com



Re: Bug#712908: ITP: stencil-clojure -- implementation of the Mustache template system for Clojure

2013-06-21 Thread Wolodja Wentland
On Thu, Jun 20, 2013 at 20:09 +0200, Eugenio Cano-Manuel Mendoza wrote:
> Package: wnpp
> Severity: wishlist
> Owner: "Eugenio Cano-Manuel Mendoza" 
> 
> * Package name: stencil-clojure
>   Version : 0.3.2
>   Upstream Author : David Santiago 
> * URL : https://github.com/davidsantiago/stencil
> * License : EPL-1
>   Programming Lang: Clojure, Java
>   Description : implementation of the Mustache template system for Clojure
> 
> Stencil is a Clojure implementation of Mustache, a template system.
> Mustache lacks of control flow statements such as if/else conditionals
> or for loops; it instead features section tag processing lists and
> lambdas. Mustache also enforces a strong separation of logic from
> presentation.

Thanks for working on this, but the description could certainly be improved.
The first step would be something like:

---
 Description : implementation of mustache templates for Clojure
 .
 Stencil is a Clojure implementation of Mustache, a template system.
 Mustache lacks any explicit control flow statements such as if/else
 conditionals or for loops, but instead features section tag processing lists
 and lambdas. Mustache also enforces a strong separation of logic from
 presentation.
---

But I am not too happy about the "section tag processing lists lambdas. Can't
think of anything better right now, but lets find something that makes the
design decisions behind mustache and why one would want to use it a bit
clearer. A good idea is probably to look into the other mustache libraries
(ruby-mustache, libjs-mustache, node-mustache) for inspiration.
-- 
Wolodja 

4096R/CAF14EFC
081C B7CD FF04 2BA9 94EA  36B2 8B7F 7D30 CAF1 4EFC


signature.asc
Description: Digital signature


Re: On upstart implementing Debian Policy §9.11.1 on behalf of sysv init scripts

2013-06-21 Thread Chow Loong Jin
On Fri, Jun 21, 2013 at 11:52:40AM +0100, Dmitrijs Ledkovs wrote:
> On 21 June 2013 11:24, Chow Loong Jin  wrote:
> > On Fri, Jun 21, 2013 at 10:34:54AM +0100, Dmitrijs Ledkovs wrote:
> >> On 20 June 2013 18:26, Russ Allbery  wrote:
> >> > Dmitrijs Ledkovs  writes:
> >> >
> >> >> Thus in a bug report 712763 [4], included below, I instead propose
> >> >> instead shipping slightly larger block of code in the upstart package
> >> >> which is sourced by /lib/lsb/init-functions from init-functions.d
> >> >> directory. Something along the lines of:
> >> >
> >> >> if init_is_upstart; then
> >> >> upstart_job=/etc/init/$(basename ${0:-}).conf
> >> >> if [ -f ${upstart_job:-} ] && [ ! -L ${upstart_job:-} ]; then
> >> >> case "${1:-}" in
> >> >> start|restart|force-reload)
> >> >> exit 1
> >> >> ;;
> >> >> stop)
> >> >> exit 0
> >> >> ;;
> >> >> esac
> >> >> fi
> >> >> fi
> >> >
> >> > Libraries, even shell libraries, should generally not call exit.  It's
> >> > very surprising behavior.  The overall program flow should remain under
> >> > the control of the main program.
> >>
> >> In general I agree, and I think this was one of points of including
> >> helper-free check in the policy & including a helper in the
> >> init-functions, which one can call as appropriate.
> >>
> >> Another fundamental question is: should direct invocation of
> >> /etc/init.d/ be outright deprecated? and thus even stronger
> >> safe-guards put in place (e.g. something at the scale of chmod -x
> >> /etc/init.d/*)
> >> or shall we allow people shooting themselves in the foot and allow
> >> init.d scripts not to have upstart-safeguard if a maintainer does not
> >> wish to include one? E.g. update-rc.d / incoke-rc.d
> >> / service works correctly with sysv-init & upstart, but if one invokes
> >> init.d scripts directly and they happen to be managed by upstart,
> >> leave those users on their own? At the moment policy is a must: "SysV
> >> init scripts for which an equivalent upstart job is available __must__
> >> query the output of the..."
> >
> > I think printing out a noisy warning and allowing people to shoot 
> > themselves in
> > the foot would be good. I reckon a significant number of legacy
> > (custom/proprietary) scripts currently attempt to poke /etc/init.d/foo 
> > directly.
> > Perhaps allowing the sysadmin to choose the desired behaviour via debconf 
> > would
> > do..
> >
> 
> I'm not sure I understand you.

I'm saying that some people may have custom scripts, cronjobs or whatnot calling
/etc/init.d/ directly, and may not be very pleased about /etc/init.d/ scripts
losing their +x permissions and breaking these scripts.

Hence, rather than completely disabling the init.d scripts, I'd rather that
invoking an init.d script directly prints out a big fat warning on stderr that
lets the admin know, while still doing something sane (starting the service
anyway). Kinda like how Ubuntu's sysvinit.d scripts currently operate right now.

> > One point of concern that just occurred to me is that on an Upstart-booted,
> > running system that was just upgraded to include this init-functions 
> > snippet,
> > Upstart wouldn't know about init.d-started services, and wouldn't be able to
> > stop them. Additionally, due to the `exit 0' that occurs if [ $1 = stop ], 
> > you
> > wouldn't be able to stop the process using the traditional sysvinit script
> > either. You'd end up needing to kill the service manually or trawl through 
> > the
> > init script to figure out how to kill it properly.
> >
> 
> [...]
> 
> Are you talking about a case where a package is upgraded from
> sysv-init.d only to an upstart&sysv-init.d capable version? As per
> current recommendations, such services are stopped in preinst (cleanly
> via init.d script) & started in postinst (potentially by upstart).

No, I'm talking about upgrading an upstart installation that doesn't have that
init-functions snippet in place, to one that does. Are you going to bring down
all sysvinit-started processes when that happens, so that Upstart can track
them?

-- 
Kind regards,
Loong Jin


signature.asc
Description: Digital signature


Re: On upstart implementing Debian Policy §9.11.1 on behalf of sysv init scripts

2013-06-21 Thread Dmitrijs Ledkovs
On 21 June 2013 15:05, Chow Loong Jin  wrote:
> On Fri, Jun 21, 2013 at 11:52:40AM +0100, Dmitrijs Ledkovs wrote:
>> On 21 June 2013 11:24, Chow Loong Jin  wrote:
>> > On Fri, Jun 21, 2013 at 10:34:54AM +0100, Dmitrijs Ledkovs wrote:
>> >> On 20 June 2013 18:26, Russ Allbery  wrote:
>> >> > Dmitrijs Ledkovs  writes:
>> >> >
>> >> >> Thus in a bug report 712763 [4], included below, I instead propose
>> >> >> instead shipping slightly larger block of code in the upstart package
>> >> >> which is sourced by /lib/lsb/init-functions from init-functions.d
>> >> >> directory. Something along the lines of:
>> >> >
>> >> >> if init_is_upstart; then
>> >> >> upstart_job=/etc/init/$(basename ${0:-}).conf
>> >> >> if [ -f ${upstart_job:-} ] && [ ! -L ${upstart_job:-} ]; then
>> >> >> case "${1:-}" in
>> >> >> start|restart|force-reload)
>> >> >> exit 1
>> >> >> ;;
>> >> >> stop)
>> >> >> exit 0
>> >> >> ;;
>> >> >> esac
>> >> >> fi
>> >> >> fi
>> >> >
>> >> > Libraries, even shell libraries, should generally not call exit.  It's
>> >> > very surprising behavior.  The overall program flow should remain under
>> >> > the control of the main program.
>> >>
>> >> In general I agree, and I think this was one of points of including
>> >> helper-free check in the policy & including a helper in the
>> >> init-functions, which one can call as appropriate.
>> >>
>> >> Another fundamental question is: should direct invocation of
>> >> /etc/init.d/ be outright deprecated? and thus even stronger
>> >> safe-guards put in place (e.g. something at the scale of chmod -x
>> >> /etc/init.d/*)
>> >> or shall we allow people shooting themselves in the foot and allow
>> >> init.d scripts not to have upstart-safeguard if a maintainer does not
>> >> wish to include one? E.g. update-rc.d / incoke-rc.d
>> >> / service works correctly with sysv-init & upstart, but if one invokes
>> >> init.d scripts directly and they happen to be managed by upstart,
>> >> leave those users on their own? At the moment policy is a must: "SysV
>> >> init scripts for which an equivalent upstart job is available __must__
>> >> query the output of the..."
>> >
>> > I think printing out a noisy warning and allowing people to shoot 
>> > themselves in
>> > the foot would be good. I reckon a significant number of legacy
>> > (custom/proprietary) scripts currently attempt to poke /etc/init.d/foo 
>> > directly.
>> > Perhaps allowing the sysadmin to choose the desired behaviour via debconf 
>> > would
>> > do..
>> >
>>
>> I'm not sure I understand you.
>
> I'm saying that some people may have custom scripts, cronjobs or whatnot 
> calling
> /etc/init.d/ directly, and may not be very pleased about /etc/init.d/ scripts
> losing their +x permissions and breaking these scripts.
>

I see, ok.

> Hence, rather than completely disabling the init.d scripts, I'd rather that
> invoking an init.d script directly prints out a big fat warning on stderr that
> lets the admin know, while still doing something sane (starting the service
> anyway). Kinda like how Ubuntu's sysvinit.d scripts currently operate right 
> now.
>

Unfortunately doing that is not possible, whilst also simultaneously
supporting sysvinit and upstart in the archive. Because as per policy
at the moment we must preserve fully working sysv init scripts.

>> > One point of concern that just occurred to me is that on an Upstart-booted,
>> > running system that was just upgraded to include this init-functions 
>> > snippet,
>> > Upstart wouldn't know about init.d-started services, and wouldn't be able 
>> > to
>> > stop them. Additionally, due to the `exit 0' that occurs if [ $1 = stop ], 
>> > you
>> > wouldn't be able to stop the process using the traditional sysvinit script
>> > either. You'd end up needing to kill the service manually or trawl through 
>> > the
>> > init script to figure out how to kill it properly.
>> >
>>
>> [...]
>>
>> Are you talking about a case where a package is upgraded from
>> sysv-init.d only to an upstart&sysv-init.d capable version? As per
>> current recommendations, such services are stopped in preinst (cleanly
>> via init.d script) & started in postinst (potentially by upstart).
>
> No, I'm talking about upgrading an upstart installation that doesn't have that
> init-functions snippet in place, to one that does. Are you going to bring down
> all sysvinit-started processes when that happens, so that Upstart can track
> them?
>

I see now what your question is.

Upstart only supervises processes configured with native upstart jobs.
Thus one cannot use upstart to stop sysv init scripts, one should use
`service` command which can correctly stop init scripts and upstart
jobs alike.

>> > Upstart wouldn't know about init.d-started services, and wouldn't be able 
>> > to
>> > stop them.

That's always true, upstart manages only natively configured jobs.

>>> Additionally, due to 

Encrypted popcon submissions

2013-06-21 Thread Bill Allombert
Dear Debian people,

I upload popularity-contest 1.58 which add support for encrypted submissions.
For this release it is not activated by default. 
Please help test this feature by adding
ENCRYPT="yes"
to /etc/popularity-contest.conf to activate it.

Once this feature has seen proper testing, we will activate it by default.

There are two other features worthy of note in 1.58:

  * popularity-contest now report the dpkg Vendor field. This will allow to 
track submission by derivative distribution.

  * popularity-contest now trucate the reported atime and ctime to multiple of
12 hours to reduce information leak.

Cheers,
-- 
Bill. 

Imagine a large red swirl here.


signature.asc
Description: Digital signature


Re: Encrypted popcon submissions

2013-06-21 Thread Michael Biebl
Hi,

Am 21.06.2013 17:08, schrieb Bill Allombert:
>   * popularity-contest now report the dpkg Vendor field. This will allow to 
> track submission by derivative distribution.

Thanks for that, that sounds immensly useful.
I hope popcon.d.o is updated to make use of that information.

Michael
-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#713019: ITP: aspectj-maven-plugin -- AspectJ compiler Maven Plugin

2013-06-21 Thread Emmanuel Bourg
Package: wnpp
Severity: wishlist
Owner: Emmanuel Bourg 

* Package name: aspectj-maven-plugin
  Version : 1.4
  Upstream Author : Kaare Nilsen 
* URL : http://mojo.codehaus.org/aspectj-maven-plugin
* License : MIT
  Programming Lang: Java
  Description : AspectJ compiler Maven Plugin

Handles AspectJ usage within Maven. Functionality provided is: weaving of
aspects (or existing aspects from libraries) with the test and/or main classes,
weaving of pre-existing jars and ajdoc reporting.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130621213853.10767.60865.reportbug@debiandev



Re: Encrypted popcon submissions

2013-06-21 Thread Jakub Wilk

* Bill Allombert , 2013-06-21, 17:08:
I upload popularity-contest 1.58 which add support for encrypted 
submissions.


Great news. :-)

BTW, you probably want to pass --no-options to gpg.

--
Jakub Wilk


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130621220128.ga1...@jwilk.net



Re: ITP: foreman -- manage Procfile-based applications

2013-06-21 Thread Joerg Jaspert
On 13249 March 1977, Per Andersson wrote:

>> There's a more popular/more complicated piece of software called Foreman[1],
>> for which there's an RFP already[2], as well as a component of that,
>> foremancli, already in Debian. Upstream provides a package too, although you
>> could argue it isn't our problem if there's a naming conflict.
> I saw this but decided to ignore it for now since there hasn't been any 
> activity
> with Foreman in over a year. If the name conflict arise in Debian it is a 
> pretty
> small matter to change it then I think. I.e. Foreman[1] renaming to
> theforeman as
> the upstream web page or this foreman renaming to ruby-foreman or some such,
> it is not a big thing IMHO.

In Debian its actually a pretty big matter. The more so the longer the
wrongly named package exists in Debian. So it is *much* preferred to not
have it at all, if the conflict is known from the beginning.

-- 
bye, Joerg


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/87sj0ahp3d@lennier.ganneff.de



Re: Encrypted popcon submissions

2013-06-21 Thread Paul Wise
On Fri, Jun 21, 2013 at 11:08 PM, Bill Allombert wrote:

> I upload popularity-contest 1.58 which add support for encrypted submissions.
...
> Once this feature has seen proper testing, we will activate it by default.
...
>   * popularity-contest now report the dpkg Vendor field. This will allow to
> track submission by derivative distribution.
>
>   * popularity-contest now trucate the reported atime and ctime to multiple of
> 12 hours to reduce information leak.

I wonder if the release team would accept a backport of these features
to popcon in stable/oldstable. GPG and time truncation are security
enhancements and reporting the dpkg Vendor field is very useful and
has no risks. Once GPG is tested, would you consider doing a
stable/oldstable update before the next point release?

-- 
bye,
pabs

http://wiki.debian.org/PaulWise


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CAKTje6GHAovgiA=hkskpm5d+nmc08qfcbf5ik4nnls4sa4r...@mail.gmail.com



Re: [Popcon-developers] Encrypted popcon submissions

2013-06-21 Thread Petter Reinholdtsen
[Paul Wise]
> I wonder if the release team would accept a backport of these
> features to popcon in stable/oldstable. GPG and time truncation are
> security enhancements and reporting the dpkg Vendor field is very
> useful and has no risks. Once GPG is tested, would you consider
> doing a stable/oldstable update before the next point release?

I suspect the new encryption feature would break
popcon.skolelinux.org, as we have not investigated the new feature and
use popularity-contest directly from Debian.  Our collector would
start getting encrypted submissions and lack the key to decrypt them.

For Jessie, I hope we have time to figure out a solution, but for
Wheezy we are not going to rewrite that part of our system.

-- 
Happy hacking
Petter Reinholdtsen
One of the Debian Edu developers


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130622040019.ge28...@ulrik.uio.no



Re: [Popcon-developers] Encrypted popcon submissions

2013-06-21 Thread Paul Wise
On Sat, Jun 22, 2013 at 12:00 PM, Petter Reinholdtsen wrote:

> I suspect the new encryption feature would break
> popcon.skolelinux.org, as we have not investigated the new feature and
> use popularity-contest directly from Debian.  Our collector would
> start getting encrypted submissions and lack the key to decrypt them.

This could be solved by having a mapping between encryption keys and
URLs. A mechanism that would allow derivatives to just drop some
files/dirs into their base-files package would probably be the
easiest.

Also you could just have popcon in DebianEdu submit only to the Debian
popcon site, IIRC DebianEdu sets the dpkg vendor field to something
other than Debian?

> For Jessie, I hope we have time to figure out a solution, but for
> Wheezy we are not going to rewrite that part of our system.

Fair enough.

-- 
bye,
pabs

http://wiki.debian.org/PaulWise


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CAKTje6HfTEs4_=-ymezgj0yuz+fswvk_1oadwpn98wxb7bm...@mail.gmail.com



Re: [Popcon-developers] Encrypted popcon submissions

2013-06-21 Thread Petter Reinholdtsen
[Paul Wise]
> This could be solved by having a mapping between encryption keys and
> URLs. A mechanism that would allow derivatives to just drop some
> files/dirs into their base-files package would probably be the
> easiest.

I suspect the easiest way would be to allow more than one GPG key to
be used when encrypting, and finding the keys in a .d directory.

> Also you could just have popcon in DebianEdu submit only to the
> Debian popcon site, IIRC DebianEdu sets the dpkg vendor field to
> something other than Debian?

Debian Edu do not set the dpkg vendor field in Wheezy and earlier.  I
created http://bugs.debian.org/712996 > to track its inclusion
yesterday.

-- 
Happy hacking
Petter Reinholdtsen


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130622043814.gf28...@ulrik.uio.no