Re: Opt out style recommends

2016-04-09 Thread Håkon Alstadheim
Den 08. april 2016 19:31, skrev Josh Triplett:

 

> emacs24-common Recommends: emacs24-el
>
> I don't think all but the most unusual configurations need the elisp
> source of the functionality already provided by the main emacs24
> package.  Emacs/elisp developers will want this.
>
>
There is often two sides to such arguments:
- An editor needs a scripting and configuration language. emacs has
elisp. If you want to be able to see what knobs are available for
adjusting, you look at the source. When your scripts have errors, you
want to be able to view source to find out what you did wrong.
- If you will never be scripting emacs, you are better off with pico or
nano as an editor.

In other words: not all of the things you mention are quick no-brainers
to get changed :-/



Re: Opt out style recommends

2016-04-09 Thread Ole Streicher
Håkon Alstadheim  writes:
> Den 08. april 2016 19:31, skrev Josh Triplett:
>> emacs24-common Recommends: emacs24-el
>>
>> I don't think all but the most unusual configurations need the elisp
>> source of the functionality already provided by the main emacs24
>> package.  Emacs/elisp developers will want this.
>>
>>
> There is often two sides to such arguments:
> - An editor needs a scripting and configuration language. emacs has
> elisp. If you want to be able to see what knobs are available for
> adjusting, you look at the source. When your scripts have errors, you
> want to be able to view source to find out what you did wrong.

As you describe it, the source file have a similar function as the debug
files for a library, which are (for a good reason) also not set as
Recommends.

Emacs (and many of its lisp libraries) are quite stable today; so in the
rare case of an error, you could just add the source later and re-run
the problem.

> - If you will never be scripting emacs, you are better off with pico or
> nano as an editor.

I use emacs since >20 years, and love it. However, I *very* rarely do
emacs scripting, and almost never outside of some configuration. Sorry,
I don't see this as an argument.

To do scripting, you also usually don't need the sources.

For me, the lisp source are really unused, and I think that I am not a
rare, exceptional case.

Best regards

Ole



Re: Opt out style recommends

2016-04-09 Thread Jonas Smedegaard
Quoting Russ Allbery (2016-04-09 03:20:25)
> Adam Borowski  writes:
>> Like:
>> xfce4-power-manager -> upower -> libimobiledevice4 -> usbmuxd
>
>> Is the recommendation from libimobiledevice4 to usbmuxd valid?  Sure 
>> it is -- the library is useless without the daemon.
[...]
> So, where this goes wrong is the upower -> libimobiledevice4 
> dependency. As you say, the dependency is correct (or at least 
> correct-ish): we don't want to dlopen everything and try to push all 
> those patches upstream.  But this is the weakest link of this whole 
> chain, yet has the strongest dependency.
>
> I think a more correct fix would (unfortunately) involve a new binary 
> package field that we don't currently have: Depends-Shallow (for lack 
> of a better term) that acts like Depends *except* disables Recommends 
> processing for anything below the shallow dependencies in the tree.  
> So if everything you're installing only Depends-Shallow on 
> libimobiledevice4, you don't get the recommendation; if anything 
> straight depends on it, you do.

I disagree that we need a new field: Simply lower to at most suggest the 
daemon: It is for the daemon to declare a stronger dependency.

Anyone needing the daemon can install the daemon - you shouldn't expect 
libraries to pull in daemons (just as you shouldn't expect documentation 
to pull in binaries).


>> And, many maintainers could take this as an attack: "what, my package 
>> is useless?!?".  Like, openssh-server -> libwrap0 -> tcpd.  I'd say 
>> pretty much anyone today uses other means for limiting access to ssh; 
>> tcpd does have near-universal popcon (95.79%!) but protocols listed 
>> in its description (telnet ftp rsh rlogin finger) and complete dearth 
>> of new bug reports (it received tons in the past) make me think it's 
>> not actually used anymore.
> 
> I still use tcpd for openssh-server.  (This is not an argument for 
> keeping the chain, just a data point.)  tcpd, unlike iptables, can 
> whitelist domains.  It's weak security, but it's good for defense in 
> depth and making the constant brute force attacks die down a bit.

I agree it is no argument for keeping the chain: Those using tcpd can 
install that - or install a metapackage that depends on or recommends 
it.


 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private


signature.asc
Description: signature


Re: Opt out style recommends

2016-04-09 Thread Sune Vuorela
On 2016-04-09, Jonas Smedegaard  wrote:
> I disagree that we need a new field: Simply lower to at most suggest the =
> daemon: It is for the daemon to declare a stronger dependency.
> Anyone needing the daemon can install the daemon - you shouldn't expect =
> libraries to pull in daemons (just as you shouldn't expect documentation =
> to pull in binaries).

Sometimes, the daemon is an implementation detail of the library. Or a
hard requirement for the library to function. Sometimes it is even a
hard requirement for the library to not crash.

/Sune



Re: Opt out style recommends

2016-04-09 Thread Jonas Smedegaard
Quoting Sune Vuorela (2016-04-09 10:34:24)
> On 2016-04-09, Jonas Smedegaard  wrote:
>> I disagree that we need a new field: Simply lower to at most suggest 
>> the = daemon: It is for the daemon to declare a stronger dependency. 
>> Anyone needing the daemon can install the daemon - you shouldn't 
>> expect = libraries to pull in daemons (just as you shouldn't expect 
>> documentation = to pull in binaries).
>
> Sometimes, the daemon is an implementation detail of the library. Or a
> hard requirement for the library to function. Sometimes it is even a
> hard requirement for the library to not crash.

Such (rare, I suspect) cases would require Depends, not Recommends as is 
discussed in this here, I believe.

 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private


signature.asc
Description: signature


Bug#820520: ITP: r-cran-phylobase -- GNU R base package for phylogenetic structures and comparative data

2016-04-09 Thread Andreas Tille
Package: wnpp
Severity: wishlist
Owner: Andreas Tille 

* Package name: r-cran-phylobase
  Version : 0.8.2
  Upstream Author : Francois Michonneau 
* URL : https://cran.r-project.org/web/packages/phylobase/
* License : GPL-2+
  Programming Lang: R
  Description : GNU R base package for phylogenetic structures and 
comparative data
 This R package provides a base S4 class for comparative methods,
 incorporating one or more trees and trait data as these are used in
 other packages dealing with phylogenetic structures and comparative data.


Remark: This package belongs to a pyramid of dependencies for r-cran-treescape
and will be maintained by the Debian Med team at
   svn://anonscm.debian.org/debian-med/trunk/packages/R/r-cran-phylobase/trunk/



Re: Remove clamav-unofficial-sigs

2016-04-09 Thread Francois Gouget
On Wed, 6 Apr 2016, Marco d'Itri wrote:
[...]
> > A year ago a user also mentioned that there is a new upstream version 
> I have some doubts about the quality of this fork, so I plan to 
> investigate in detail what has changed before blindly adopting it.

What about uploading a new version with the si_dbs line commented out in 
00-clamav-unofficial-sigs.conf as suggested last year in: 
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783228

The SecuriteInfo databases are unusable anyway so there would be nothing 
lost, and this would at least stop the corresponding syslog spam, making 
the rest of the package that much more usable.

And marking bugs 774763 and 784832 as duplicates of 783228 would clean 
things up a bit too and has no reason to block on fixing access to 
SecuriteInfo.

-- 
Francois Gouget   http://fgouget.free.fr/
A particle is an irreducible representation of the Poincaré Group - Eugene 
Wigner

Re: Opt out style recommends

2016-04-09 Thread Adam Borowski
On Sat, Apr 09, 2016 at 08:34:24AM +, Sune Vuorela wrote:
> On 2016-04-09, Jonas Smedegaard  wrote:
> > I disagree that we need a new field: Simply lower to at most suggest the =
> > daemon: It is for the daemon to declare a stronger dependency.
> > Anyone needing the daemon can install the daemon - you shouldn't expect =
> > libraries to pull in daemons (just as you shouldn't expect documentation =
> > to pull in binaries).
> 
> Sometimes, the daemon is an implementation detail of the library. Or a
> hard requirement for the library to function. Sometimes it is even a
> hard requirement for the library to not crash.

Right, it may be a hard requirement for the library.  It may be not a
requirement for an user of the library, if that library is pulled only
for an obscure feature.  The problem is, dependencies are transitive.

And in most languages it's tedious to make a library optional at runtime.

So some solution would be nice, be it Russ' new field or my moving such
dependencies away from libraries.

-- 
A tit a day keeps the vet away.



Bug#820547: ITP: harvest-tools -- archiving and postprocessing for reference-compressed genomic multi-alignments

2016-04-09 Thread Andreas Tille
Package: wnpp
Severity: wishlist
Owner: Andreas Tille 

* Package name: harvest-tools
  Version : 1.2
  Upstream Author : Todd Treangen 
* URL : https://github.com/marbl/harvest-tools
* License : BSD
  Programming Lang: C++, Python
  Description : archiving and postprocessing for reference-compressed 
genomic multi-alignments
 HarvestTools is a utility for creating and interfacing with Gingr files,
 which are efficient archives that the Harvest Suite uses to store
 reference-compressed multi-alignments, phylogenetic trees, filtered
 variants and annotations. Though designed for use with Parsnp and Gingr,
 HarvestTools can also be used for generic conversion between standard
 bioinformatics file formats.


Remark: This package belongs to a wider toolset to deal with genomic
alignments.  It will be packaged by the Debian Med team at
   https://anonscm.debian.org/git/debian-med/harvest-tools.git



gitlab package (was Re: Opt out style recommends)

2016-04-09 Thread Debian/GNU
hi,

On 04/08/2016 05:33 AM, Pirate Praveen wrote:
> See #819854 for a background.
> 
> Currently gitlab recommends letsencrypt, it means someone has to opt in for 
> letsencrypt by running something like
> 
> apt-get install gitlab letsencrypt
> 
> But I would like letsencrypt to be available by default (postinst asks if 
> they want t

while i really appreciate all the work you are doing for the gitlab
package, i honestly have the feeling that you are trying to make too
many decisions on behalf of the system administrator who wants to
install gitlab.

i really don't see any compelling reason why a package like gitlab
should force me to use any special means to encrypt my connection.
there are a number of reasons to use the Debian gitlab packages over the
ones provided by upstream (e.g. omnibus), and one of them is being able
to chose the components i would like to have on my system (or not).

but the way the package is heading seems to take away choices rather
than give me additional ones: e.g. using upstream's gitlab-ce omnibus
packages i am *free* to choose whatever method i like to setup an
encrypted webserver (allowing me to e.g. setup a gitlab instance that is
not accessible from the public internet - something that is impossible
with letsencrypt afaict).

i would love if the gitlab package in Debian was as *minimal* as
possible giving *me* (the admin) the freedom to choose the largest
possible set of components - probably (and likely) at the expense that I
(the admin) will need to setup quite a lot of things myself.

i guess there are *many* things to setup and this might make it
impossible for newbee administrators to setup their own gitlab instance.
but i think that there are ways to accomodate both the seasoned admin
(probably in a corporate environment dictating whatever policies) and
the any random developer (who want an instance for their personal use
without worrying too much about administration).

e.g. instead of making the 'gitlab' package work magic and conjure the
perfect configuration for any usecase, you could instead:

- add *good* documentation; with configuration examples, step-by-step
instructions to setup whatever additional service,...
- provide an *additional* package ("gitlab-to-go", but please cose a
better name :-)) which depends on 'gitlab' (and other packages like
'letsencrypt') and which does the magic to provide the "it just works"
experience for selected use-cases.

i really hope that this will simplify your work as a maintainer of such
a complex package. (or put otherwise: i think that the quest to come up
with a satisfying configuration for all potential users is NP-complete
and will indefinitely stall further packaging or make the package
unusable for some users or both)

a nice side effect might be that it would allow Debian gitlab packages
follow upstream more closely (e.g. Debian currently has
gitlab-8.4.3+dfst-12 whereas upstream currently has 8.6.4 (and the 8.4
series is at bugfix release 8.4.7; the numbers might be a bit misleading
though, as Debian might not be affected by a few bugs that triggered
there own bugfix release).


anyhow, thanks again for doing all the work to bring us gitlab.

fgmards
IOhannes




signature.asc
Description: OpenPGP digital signature


Re: /usr/bin/openssl failed on sso.debian.org

2016-04-09 Thread Enrico Zini
On Fri, Apr 08, 2016 at 09:06:33PM +0200, Jonas Smedegaard wrote:

> > Which is fine, I guess, for someone living in an ecosystem where
> > «authentication via "log in with your Google or Facebook account"» is
> > all your users would ever need.
> > 
> > I guess I should stop writing here, as at the moment I can think of a
> > lot of things to write, but nothing constructive among them.
> 
> The W3C public-rww list has some possibly interesting references related 
> to this issue: 
> https://www.w3.org/mid/https://www.w3.org/mid/20150730174424.GA7779@c
> 
> If similar issues arise, it might make sense to try get in touch with 
> them: WebID is quite similar to our setup, and therefore face exactly 
> the same problems from client side.

I have seen no sign that Chrome or Firefox developers have much interest
in supporting WebID either, and given how I've seen one of the WebID
people argue their case[1] with the Chrome and Firefox developers, the
little interest they might have had to start with is probably gone by
now :/


Enrico

[1] 
https://groups.google.com/a/chromium.org/forum/#!msg/blink-dev/pX5NbX0Xack/kmHsyMGJZAMJ
-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: /usr/bin/openssl failed on sso.debian.org

2016-04-09 Thread Jonas Smedegaard
Quoting Enrico Zini (2016-04-09 22:11:54)
> On Fri, Apr 08, 2016 at 09:06:33PM +0200, Jonas Smedegaard wrote:
>>> Which is fine, I guess, for someone living in an ecosystem where 
>>> «authentication via "log in with your Google or Facebook account"» 
>>> is all your users would ever need.
>>> 
>>> I guess I should stop writing here, as at the moment I can think of 
>>> a lot of things to write, but nothing constructive among them.
>>
>> The W3C public-rww list has some possibly interesting references 
>> related to this issue: 
>> https://www.w3.org/mid/https://www.w3.org/mid/20150730174424.GA7779@c
>>
>> If similar issues arise, it might make sense to try get in touch with 
>> them: WebID is quite similar to our setup, and therefore face exactly 
>> the same problems from client side.
>
> I have seen no sign that Chrome or Firefox developers have much 
> interest in supporting WebID either, and given how I've seen one of 
> the WebID people argue their case[1] with the Chrome and Firefox 
> developers, the little interest they might have had to start with is 
> probably gone by now :/

You can consider both WebID itself and the social skills of its 
defenders bad, yet still benefit from following their work.

But sure, you can also ignore that work (if that is what you imply).

 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private


signature.asc
Description: signature


Bug#820561: ITP: dh-elpa-test -- Debian helper tool for running ELPA package testsuites

2016-04-09 Thread Sean Whitton
Package: wnpp
Severity: wishlist
Owner: Sean Whitton 

* Package name: dh-elpa-test
  Version : 0.1.0
  Upstream Author : Sean Whitton 
* URL : N/A
* License : GPL-3+
  Programming Lang: Perl
  Description : Debian helper tool for running ELPA package testsuites

dh-elpa-test will try to run the upstream testsuites for ELPA packages
prepared with dh_elpa.  For ELPA packages, dh_auto_test alone is rarely
suitable.

I plan to maintain it as part of the pkg-emacsen team.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Re: Bug#820561: ITP: dh-elpa-test -- Debian helper tool for running ELPA package testsuites

2016-04-09 Thread Mattia Rizzolo
On Sat, Apr 09, 2016 at 02:53:05PM -0700, Sean Whitton wrote:
>   Description : Debian helper tool for running ELPA package testsuites
> 
> dh-elpa-test will try to run the upstream testsuites for ELPA packages
> prepared with dh_elpa.  For ELPA packages, dh_auto_test alone is rarely
> suitable.

Any reason this can't go in src:dh-elpa itself?

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  http://mapreri.org  : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Debian Project Leader Elections 2016: second call for votes

2016-04-09 Thread Zlatan Todoric
Sorry for top posting - but wrong year? (and thus wrong selection of 
candidates ;) )


On 04/10/2016 12:48 AM, Debian Project Secretary - Kurt Roeckx wrote:

Hi,

This is the 2nd call for votes for the DPL election.

  Voting period starts  Wed Apr  1 00:00:00 UTC 2015
  Votes must be received by Tue Apr 14 23:59:59 UTC 2015

This vote is being conducted as required by the Debian Constitution.
You may see the constitution at http://www.debian.org/devel/constitution.
For voting questions or problems contact secret...@debian.org.

The details of the candidate platform can be found at:
http://www.debian.org/vote/2015/platforms/

Also, note that you can get a fresh ballot any time before the end of
the vote by sending a mail to
bal...@vote.debian.org
with the subject "leader2015".

To vote you need to be a Debian Developer.


HOW TO VOTE

First, read the full text of the platform.

To cast a vote, it is necessary to send this ballot filled out to a
dedicated e-mail address, in a signed message, as described below.
The dedicated email address this ballot should be sent to is:

   leader2...@vote.debian.org

The form you need to fill out is contained at the bottom of this
message, marked with two lines containing the characters
'-=-=-=-=-=-'. Do not erase anything between those lines, and do not
change the choice names.

There are 4 choices in the form, which you may rank with numbers between
1 and 4. In the brackets next to your preferred choice, place a 1.
Place a 2 in the brackets next to your next choice. Continue until you
reach your last choice.  Do not enter a number smaller than 1 or larger
than 4.

You may skip numbers, leave some choices unranked, and rank options
equally.  Unranked choices are considered equally the least desired
choices, and ranked below all ranked choices.

To vote "no, no matter what", rank "None Of The Above" as more desirable
than the unacceptable choices, or you may rank the "None Of The Above"
choice and leave choices you consider unacceptable blank.  (Note: if the
"None Of The Above" choice is unranked, then it is equal to all other
unranked choices, if any -- no special consideration is given to the
"None Of The Above" choice by the voting software).

Finally, mail the filled out ballot to: leader2...@vote.debian.org.

Don't worry about spacing of the columns or any quote characters (">") that
your reply inserts.

NOTE: The vote must be GPG signed (or PGP signed) with your key that is
in the Debian keyring.  You may, if you wish, choose to send a signed,
encrypted ballot: use the vote key appended below for encryption.

The voting software (Devotee) accepts mail that either contains only an
unmangled OpenPGP message (RFC 2440 compliant), or a PGP/MIME mail
(RFC 3156 compliant).  To avoid problems I suggest you use PGP/MIME.

- - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=-
1455c447-77dc-4237-b0f9-be3897bb2b80
[   ] Choice 1: Mehdi Dogguy
[   ] Choice 2: Gergely Nagy
[   ] Choice 3: Neil McGovern
[   ] Choice 4: None Of The Above
- - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=-

--

The responses to a valid vote shall be signed by the vote key created
for this vote. The public key for the vote, signed by the Project
secretary, is appended below.

-BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG v1
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Re: Opt out style recommends

2016-04-09 Thread Henrique de Moraes Holschuh
On Fri, 08 Apr 2016, Russ Allbery wrote:
> So, where this goes wrong is the upower -> libimobiledevice4 dependency.
> As you say, the dependency is correct (or at least correct-ish): we don't
> want to dlopen everything and try to push all those patches upstream.  But
> this is the weakest link of this whole chain, yet has the strongest
> dependency.
> 
> I think a more correct fix would (unfortunately) involve a new binary
> package field that we don't currently have: Depends-Shallow (for lack of a
> better term) that acts like Depends *except* disables Recommends
> processing for anything below the shallow dependencies in the tree.  So if
> everything you're installing only Depends-Shallow on libimobiledevice4,
> you don't get the recommendation; if anything straight depends on it, you
> do.

Make it "downgrades recommends to suggests" and it might even work well.

But since there exists recommends one is much better off never downgrading,
we might end up needing a recommends-strong field as well that would never
be downgraded, to avoid the need to upgrade such recommends to depends.

At least it would end there with two extra headers (or some other way to
annotate recommends dependency headers in these two ways), so it is still
something that looks like it could work.

But how much of a trouble would such changes cause for the dependency
solvers?

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



Re: gitlab package (was Re: Opt out style recommends)

2016-04-09 Thread Pirate Praveen


On 2016, ഏപ്രിൽ 10 12:28:29 AM IST, "IOhannes m zmölnig (Debian/GNU)" 
 wrote:
>hi,
>
>On 04/08/2016 05:33 AM, Pirate Praveen wrote:
>> See #819854 for a background.
>> 
>> Currently gitlab recommends letsencrypt, it means someone has to opt
>in for letsencrypt by running something like
>> 
>> apt-get install gitlab letsencrypt
>> 
>> But I would like letsencrypt to be available by default (postinst
>asks if they want t
>
>while i really appreciate all the work you are doing for the gitlab
>package, i honestly have the feeling that you are trying to make too
>many decisions on behalf of the system administrator who wants to
>install gitlab.

I just want the service up and running after you install gitlab. Isn't it how 
every other service doing it?

>i really don't see any compelling reason why a package like gitlab
>should force me to use any special means to encrypt my connection.

It does not. Even earlier with letsencrypt in depends, it asks in post install 
if letsencrypt should be used. Now it is in recommends and you can just skip 
letsencrypt.

>there are a number of reasons to use the Debian gitlab packages over
>the
>ones provided by upstream (e.g. omnibus), and one of them is being able
>to chose the components i would like to have on my system (or not).

It is just the first attempt and making all components optional is in my todo. 
Patches to speed it up is welcome.

nginx is already made optional in last update. Next is database.

>but the way the package is heading seems to take away choices rather
>than give me additional ones: e.g. using upstream's gitlab-ce omnibus
>packages i am *free* to choose whatever method i like to setup an
>encrypted webserver (allowing me to e.g. setup a gitlab instance that
>is
>not accessible from the public internet - something that is impossible
>with letsencrypt afaict).

Already covered. You can choose not to use letsencrypt.

>i would love if the gitlab package in Debian was as *minimal* as
>possible giving *me* (the admin) the freedom to choose the largest
>possible set of components - probably (and likely) at the expense that
>I
>(the admin) will need to setup quite a lot of things myself.

Already answered.

>i guess there are *many* things to setup and this might make it
>impossible for newbee administrators to setup their own gitlab
>instance.
>but i think that there are ways to accomodate both the seasoned admin
>(probably in a corporate environment dictating whatever policies) and
>the any random developer (who want an instance for their personal use
>without worrying too much about administration).

Making all components optional will do it.
And the configuration files are there to do more tweaking.

>e.g. instead of making the 'gitlab' package work magic and conjure the
>perfect configuration for any usecase, you could instead:
>
>- add *good* documentation; with configuration examples, step-by-step
>instructions to setup whatever additional service,...
>- provide an *additional* package ("gitlab-to-go", but please cose a
>better name :-)) which depends on 'gitlab' (and other packages like
>'letsencrypt') and which does the magic to provide the "it just works"
>experience for selected use-cases.
>
>i really hope that this will simplify your work as a maintainer of such
>a complex package. (or put otherwise: i think that the quest to come up
>with a satisfying configuration for all potential users is NP-complete
>and will indefinitely stall further packaging or make the package
>unusable for some users or both)
>
>a nice side effect might be that it would allow Debian gitlab packages
>follow upstream more closely (e.g. Debian currently has
>gitlab-8.4.3+dfst-12 whereas upstream currently has 8.6.4 (and the 8.4
>series is at bugfix release 8.4.7; the numbers might be a bit
>misleading
>though, as Debian might not be affected by a few bugs that triggered
>there own bugfix release).

Its already 8.5.8. Three new gems are required for 8.6 and we are already 
working on it.

>
>anyhow, thanks again for doing all the work to bring us gitlab.
>
>fgmards
>IOhannes

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.



Re: Bug#820561: ITP: dh-elpa-test -- Debian helper tool for running ELPA package testsuites

2016-04-09 Thread Sean Whitton
Hello,

On Sat, Apr 09, 2016 at 10:26:57PM +, Mattia Rizzolo wrote:
> On Sat, Apr 09, 2016 at 02:53:05PM -0700, Sean Whitton wrote:
> >   Description : Debian helper tool for running ELPA package testsuites
> > 
> > dh-elpa-test will try to run the upstream testsuites for ELPA packages
> > prepared with dh_elpa.  For ELPA packages, dh_auto_test alone is rarely
> > suitable.
> 
> Any reason this can't go in src:dh-elpa itself?

Yeah.  If dh-elpa-test runs the tests for a package, dh_auto_test must
be disabled.  That's because dh_auto_test runs `make test`, and many
ELPA packages will run something that is incompatible with Debian if you
run `make test`.

If dh-elpa-test did not disable dh_auto_test, every package using it
would need boilerplate `override_dh_auto_test: /bin/true`.  But the only
way for a debhelper helper to disable dh_auto_test is in its sequencer
script.  If I put the code to disable dh_auto_test in dh_elpa's sequencer
script (/usr/share/perl5/Debian/Debhelper/Sequence/elpa.pm),
dh_auto_test would be disabled for *all* packages using dh_elpa, which
would be undesirable since some of them have test suites that *can* be
run with a simple `make test`.

So dh-elpa-test needs its own sequencer script in
/usr/share/perl5/Debian/Debhelper/Sequence, and so it also needs its own
corresponding /usr/bin/dh_elpa_test.  But then for ease of maintenance
it should be its own source package.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Re: Bug#820561: ITP: dh-elpa-test -- Debian helper tool for running ELPA package testsuites

2016-04-09 Thread Mattia Rizzolo
On Sat, Apr 09, 2016 at 09:14:29PM -0700, Sean Whitton wrote:
> > Any reason this can't go in src:dh-elpa itself?
> 
> Yeah.  If dh-elpa-test runs the tests for a package, dh_auto_test must
> be disabled.  That's because dh_auto_test runs `make test`, and many
> ELPA packages will run something that is incompatible with Debian if you
> run `make test`.
> 
> If dh-elpa-test did not disable dh_auto_test, every package using it
> would need boilerplate `override_dh_auto_test: /bin/true`.  But the only
> way for a debhelper helper to disable dh_auto_test is in its sequencer
> script.  If I put the code to disable dh_auto_test in dh_elpa's sequencer
> script (/usr/share/perl5/Debian/Debhelper/Sequence/elpa.pm),
> dh_auto_test would be disabled for *all* packages using dh_elpa, which
> would be undesirable since some of them have test suites that *can* be
> run with a simple `make test`.

If you put that in Debian::Debhelper::Sequence::elpa you could just
check for something (an exported variable?) and/or do some magic to
detect on your own, without having package maintainers having to do this
choice for all those packages, couldn't you?

> But then for ease of maintenance it should be its own source package.

this sounds kind of ominous to me: we're talking about an alleged
helper, maintained in the same team where dh-elpa is maintained. What
kind of difficult of maintenance would have it?  To me, it looks like
it would actually *easy* the maintenance, as I couldn't figure this
as something separated from dh-elpa, but only tightly united.



-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  http://mapreri.org  : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Re: Bug#820561: ITP: dh-elpa-test -- Debian helper tool for running ELPA package testsuites

2016-04-09 Thread Niels Thykier
Sean Whitton:
> So dh-elpa-test needs its own sequencer script in
> /usr/share/perl5/Debian/Debhelper/Sequence, and so it also needs its own
> corresponding /usr/bin/dh_elpa_test.  But then for ease of maintenance
> it should be its own source package.

Hi,

I am not aware of any reason why a package can only provide at most one
debhelper sequence?  If this is the primary reason for having two
packages, please assert that this assumption holds.

Thanks,
~Niels





signature.asc
Description: OpenPGP digital signature