Bug#840814: ITP: python-bitbucket-api -- library to interact with bitbucket API

2016-10-15 Thread 陳昌倬
Package: wnpp
Severity: wishlist
Owner: "ChangZhuo Chen (陳昌倬)" 

* Package name: python-bitbucket-api
  Version : 0.5.0
  Upstream Author : Name 
* URL : https://github.com/Sheeprider/BitBucket-api
* License : ISC
  Programming Lang: Python
  Description : library to interact with bitbucket API

 python-bitbucket-api provides an API to use the following features in
 bitbucket:
  * Access public user informations
  * Access public or private repositories, tags or branches
  * Create, update or delete one of your repository
  * Access, create, update or delete a service (hook)
  * Access, create or delete an SSH key
  * Download a repository as an archive
  * Access, create, update or delete an issue
  * Access, create, update or delete an issue comment

-- 
ChangZhuo Chen (陳昌倬) 
Debian Developer (https://nm.debian.org/public/person/czchen)
Key fingerprint = EC9F 905D 866D BE46 A896  C827 BE0C 9242 03F4 552D
  BA04 346D C2E1 FE63 C790  8793 CC65 B0CD EC27 5D5B


signature.asc
Description: PGP signature


Update GnuPG failed

2016-10-15 Thread Mechtilde
Hello,

since tha update on thursday I can't use GPG on Stretch.

There is gpg version 2.1.15-4.

Unter Jessie all things are fine with gpg 1.4.18

Unter Stretch I have no access to my private key and the public keyring.
I only see the keys which incomes with the mails after the update

What happens? The files of the secret key and the public keyring are
identical with the backup and at the Jessie machine.

What is the best way to fix it?

Kind regards

Mechtilde Stehmann
--
## Apache OpenOffice.org
## Freie Office Suite für Linux, MacOSX, Windows
## Debian
## Loook, calender-exchange-provider, libreoffice-canzeley-client
## PGP encryption welcome
## Key-ID 0x141AAD7F



Re: Update GnuPG failed

2016-10-15 Thread Henrique de Moraes Holschuh
On Sat, 15 Oct 2016, Mechtilde wrote:
> There is gpg version 2.1.15-4.
> Unter Jessie all things are fine with gpg 1.4.18
> 
> Unter Stretch I have no access to my private key and the public keyring.
> I only see the keys which incomes with the mails after the update
> 
> What happens? The files of the secret key and the public keyring are
> identical with the backup and at the Jessie machine.
> 
> What is the best way to fix it?

Please direct this kind of question to the debian-users mailinglist...

-- 
  Henrique Holschuh



Re: [pkg-gnupg-maint] Bug#840669: Bug#840669: Beware of leftover gpg-agent processes

2016-10-15 Thread Ian Jackson
Lots of this discussion has been focusing on the test suite process
leak problem.  But there are actually three separate use cases which
need something along the lines of my proposal; two of which are
regressions from gnupg1.


1. gnupg1-compatible authorisation lifetime:

Command line use of gpg by users outside of a desktop environment
(or who have disabled desktop environment passphrase sharing).  With
gnupg1 each call to gpg to sign or decrypt something would ask for the
user's authorisation for the specific action.

This is, in many (if not most) contexts a desirable security property.
(It's valuable even, or particularly, if none of the software invoking
gpg is malicious: because software can do unexpected things for other
reasons than malice.)

There should be a way for command line users (including users of
programs which themselves call gnupg) to have the same authorisation
lifetime as with gnupg1.  Personally I think this should be the
default, at least if there is no ambient gpg-agent found.  But even if
it is not going to be the default it should be available as a
configuration option.

I don't think any of the approaches advanced in this thread are able
to provide the gnupg1 authorisation lifetime model.  So this is a
regression in gnupg2 which is not addressed by any of the proposals
other than mine.

This is an especially serious regression in that in this use case
gnupg2 (currently) silently extends the scope of an authorisation in
an unexpected way.


2. Explicit programmatic control of authorisation lifetime:

Programs like debsign and dgit want to do what is in their model a
single high-level operation but which at the crypto level involves
multiple decryptions and/or sigantures.

It would be nice if such a program could, when invoked in a setup
without ambient authorisation, explicitly request authorisation once
and then apply it multiple times.

This is feature which is not present in gnupg1 (at least not without a
lot of explicit code to set up and tear down an agent), but which
would be useful and which I think cannot be provided by any of the
proposals other than mine.


3. Test suite process leakage.

This has been discussed extensively.  There are proposals including
use of inotify, explicit teardown by tools like schroot, and so on,
which address this use case.  They are not 100% perfect but would
probably suffice.


Thanks for your attention.

Ian.

-- 
Ian JacksonThese opinions are my own.

If I emailed you from an address @fyvzl.net or @evade.org.uk, that is
a private address which bypasses my fierce spamfilter.



uscan download from sourceforge doesn't download what you expect!

2016-10-15 Thread Steve M. Robbins
... at least not for boost.

I downloaded the latest release manually by following the links from boost.org 
to https://sourceforge.net/projects/boost/files/boost/1.62.0/
boost_1_62_0.tar.bz2/download

Then I remembered that Dimitri had written a watch file to use the Files-
Excluded facility.  So I ran uscan.  This leaves me the original download as 
well as the re-packed tarball.  Comparing the original download to my manual 
download indicated many differences.

Running uscan with --verbose led me to the reflector page https://
qa.debian.org/watch/sf.php/boost/ used by uscan.  The boost_1_62_0.tar.bz2 
link on that page leads to https://sourceforge.net/projects/boost/files/boost/
snapshots/master/boost_1_62_0.tar.bz2/download

Notice the crucial difference: the reflector is using "boost/snapshots/master" 
whereas the correct URL uses "boost/1.62.0".   The snapshots are pulled from 
the branch tip and are NOT actual releases.  So the reflector is listing bad 
URLs.  

Who can I contact to get https://qa.debian.org/watch/sf.php/boost/ fixed?

Note: I didn't look, so I have no idea if this is a widespread problem with 
the watch reflector.  I'd suggest that people do a spot-check on their own 
packages to see.

Thanks,
-Steve



signature.asc
Description: This is a digitally signed message part.


When should we https our mirrors?

2016-10-15 Thread Paul Tagliamonte
Howdy -devel,

It's that time of the year again - that's right, another paultag rant
with some grand ideas about the state of the world.


It seems like every month or so, someone pops into a channel and asks
why we aren't using https on our mirrors. This well-meaning question is
usually met with hositility (We do integrety checks via out of band
OpenPGP signatures, and mirrors aren't assumed to be private so knowing
what you have installed is nbd, some exotic pet arches may take a few
more CPU cycles to handshake) and associated pushback.



I find most of these arguments pretty boring, and I don't think the
"costs" outweigh the benefits.


I see no reason why the argument that the mirror server may be
compromised means we have to open ourselves up to trivial MITM and
installed packages / versions disclosure to everyone between me and the
server.

I see no reason why just because we check signatures later that I put
random data from the internet into memory and on disk, and run a program
over it without making sure it's at least the server I think I'm talking
to.

I see no reason why exotic pet arches that already take huge cycles to
process data are a reason to keep back the vast majority of our install
base.


So, the real question:

So, when are we going to push this? If not now, what criteria need to be
met? Why can't we https-ify the default CDN mirror today?

(Sadly this means my trick to MITM the debian mirrors with my LAN mirror
breaks, but this strikes me as a feature not a bug)

Toodles,
   paultag


signature.asc
Description: PGP signature


Re: uscan download from sourceforge doesn't download what you expect!

2016-10-15 Thread Dimitri John Ledkov
On 15 October 2016 at 18:47, Steve M. Robbins  wrote:
> ... at least not for boost.
>
> I downloaded the latest release manually by following the links from boost.org
> to https://sourceforge.net/projects/boost/files/boost/1.62.0/
> boost_1_62_0.tar.bz2/download
>

Yes, this is known to me, but I did not report. The redirector /
sourceforge make it hard to distinct identically named files in
different subfolders unfortunately.

I did too manually repackaged wrong tarballs by hand.

There is also possibly an upstream bug, because they name pre-release
snapshots identically to final released version number.

Regards,

Dimitri.

> Then I remembered that Dimitri had written a watch file to use the Files-
> Excluded facility.  So I ran uscan.  This leaves me the original download as
> well as the re-packed tarball.  Comparing the original download to my manual
> download indicated many differences.
>
> Running uscan with --verbose led me to the reflector page https://
> qa.debian.org/watch/sf.php/boost/ used by uscan.  The boost_1_62_0.tar.bz2
> link on that page leads to https://sourceforge.net/projects/boost/files/boost/
> snapshots/master/boost_1_62_0.tar.bz2/download
>
> Notice the crucial difference: the reflector is using "boost/snapshots/master"
> whereas the correct URL uses "boost/1.62.0".   The snapshots are pulled from
> the branch tip and are NOT actual releases.  So the reflector is listing bad
> URLs.
>
> Who can I contact to get https://qa.debian.org/watch/sf.php/boost/ fixed?
>
> Note: I didn't look, so I have no idea if this is a widespread problem with
> the watch reflector.  I'd suggest that people do a spot-check on their own
> packages to see.
>
> Thanks,
> -Steve
>

-- 
Regards,

Dimitri.



Re: When should we https our mirrors?

2016-10-15 Thread Dimitri John Ledkov
On 15 October 2016 at 19:03, Paul Tagliamonte  wrote:
>
> So, the real question:
>
> So, when are we going to push this? If not now, what criteria need to be
> met? Why can't we https-ify the default CDN mirror today?
>

It is my understanding that in 2016 there is a huge difference between
the following sniffed traffic information:

a) TLS traffic from a server to archive.debian.org host

b) HTTP traffic from a server to archive.debain.org/debian-security/dists/lenny

Since the latter reveals that the system is likely to be susceptible
to every single CVE since Lenny end of life.

I believe the TLS overhead costs are negligible, especially if one
uses ECC keys. The further privacy it buys one, is IMHO, well worth
the effort. I would be in favor of Debian mirrors to auto-enroll into
letsencrypt certs.

-- 
Regards,

Dimitri.



Re: When should we https our mirrors?

2016-10-15 Thread Jakub Wilk
There's nothing stopping mirror operators from enabling HTTPS. Some of them 
actually have done it already:

https://crt.sh/?q=ftp%25.%25.debian.org
(and there's more in non-*.debian.org domains)

We should have an official list of HTTPS mirrors, and encourage more operators 
to enable it.


On a semi-unrelated note:

Some of ftp*.*.d.o and cdimage.d.o mirrors serve random free (and sometimes 
non-free) software that is not Debian[*]. This may mislead inexperienced people 
into thinking that this software is endorsed or even produced by Debian. Should 
we insist that only Debian is served from these domains?



[*] See e.g.: https://ftp.se.debian.org/

--
Jakub Wilk



Re: When should we https our mirrors?

2016-10-15 Thread Tollef Fog Heen
]] Paul Tagliamonte 

> So, when are we going to push this? If not now, what criteria need to
> be met? Why can't we https-ify the default CDN mirror today?

The usual crypto answer: because key handling is hard.

Doing this for the per-country mirrors means that repointing mirrors
becomes a lot harder than it currently is, and this is something we do
on a daily basis.  We'd need a solution for deploying the TLS cert for,
say, ftp.de.d.o to ftp.se.d.o (or ftp.d.o) if ftp.d.o is down for
maintenance.

Doing this for deb.d.o would mean we need to get certs on both Fastly
and Cloudfront deployed, which is, frankly, a more realistic proposition
than jury-rigging something on the per-country mirrors.

-- 
Tollef Fog Heen
UNIX is user friendly, it's just picky about who its friends are



Bug#840893: ITP: ansible-tower-cli -- command line tool for Ansible Tower

2016-10-15 Thread Evgeni Golov
Package: wnpp
Severity: wishlist
Owner: Evgeni Golov 

* Package name: ansible-tower-cli
  Version : 3.0.1
  Upstream Author : Luke Sneeringer 
* URL : https://github.com/ansible/tower-cli
* License : Apache 2.0
  Programming Lang: Python
  Description : command line tool for Ansible Tower

 tower-cli is a command line tool for Ansible Tower. It allows Tower
 commands to be easily run from the Unix command line. It can also be
 used as a client library for other python apps, or as a reference for
 others developing API interactions with Tower's REST API.
 .
 This command line tool sends commands to the Tower API. It is capable of
 retrieving, creating, modifying, and deleting most objects within Tower.
 .
 A few potential uses include:
 * Launching playbook runs
 * Checking on job statuses
 * Rapidly creating objects like organizations, users, teams and more



Re: uscan download from sourceforge doesn't download what you expect!

2016-10-15 Thread Mattia Rizzolo
On Sat, Oct 15, 2016 at 12:47:21PM -0500, Steve M. Robbins wrote:
> Notice the crucial difference: the reflector is using 
> "boost/snapshots/master" 
> whereas the correct URL uses "boost/1.62.0".   The snapshots are pulled from 
> the branch tip and are NOT actual releases.  So the reflector is listing bad 
> URLs.  

This is really upstream doing something they should really not do:
version pre-releases the same as released stuff; also same filename…

> Who can I contact to get https://qa.debian.org/watch/sf.php/boost/ fixed?

look at the bottom of that page, there are links to the code; then send
a patch qa.debian.org's way (or try to report a patch-less bug).

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Bug#840897: general: framebuffer modules for non-dri graphics cards are not loaded

2016-10-15 Thread Michal Suchanek
Package: general
Severity: normal

Hello,

I dusted off a notebook with hardware serial port which also happens to have a
Mach64 graphics card.

Accidentally during system upgrade an extra display manager was installed which
broke the text console. Running two X servers without KMS is problematic.

Upstream has a solution that should prevent most of these problems. The current
X drivers seem to work reasonably well with fbdev so long as the fb module is
loaded before the X server is started. At least the Mach64 driver looks ok.
Since the X driver appears to have fbdev integration it should not break the
console so long as fbdev is available.

Unfortunately, atyfb is not loaded by Debian. What's worse, adding the driver
to /etc/modules or /etc/initramfs-tools/modules has no effect. The module is
not loaded.

So I would like the fbdev modules removed from whatever blacklist prevents
loading them and have them loaded on systems that don't have dri modules to
handle graphics.

Thanks

-- System Information:
Debian Release: stretch/sid
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable'), (500, 'oldstable')
Architecture: i386 (i686)

Kernel: Linux 4.7.0-1-686-pae (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)



Re: When should we https our mirrors?

2016-10-15 Thread Marco d'Itri
On Oct 15, Dimitri John Ledkov  wrote:

> I believe the TLS overhead costs are negligible, especially if one
This is not about the TLS overhead: the real issue is not being able to 
use sendfile(2).

> uses ECC keys. The further privacy it buys one, is IMHO, well worth
> the effort. I would be in favor of Debian mirrors to auto-enroll into
> letsencrypt certs.
This would fail spectacularly due to the per-domain rate limiting 
imposed by LE.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


requiring vhosts (was: Re: When should we https our mirrors?)

2016-10-15 Thread Adam Borowski
On Sat, Oct 15, 2016 at 09:24:15PM +0200, Jakub Wilk wrote:
> Some of ftp*.*.d.o and cdimage.d.o mirrors serve random free (and sometimes
> non-free) software that is not Debian[*]. This may mislead inexperienced
> people into thinking that this software is endorsed or even produced by
> Debian. Should we insist that only Debian is served from these domains?
> 
> 
> [*] See e.g.: https://ftp.se.debian.org/

Compare https://ftp.se.debian.org with https://ftp.acc.umu.se/ -- these look
quite similar to me...

The real reason is suggested by the "ftp." prefix: the site historically was
supposed to be used via ftp, and still supports it.  And ftp doesn't have
such a thing as vhosts.

Requiring a dedicated v4 IP is not a burden for a big 1st world mirror, but
might be problematic for someone smaller, especially if they carry a number
of projects other than Debian.


Meow!
-- 
A MAP07 (Dead Simple) raspberry tincture recipe: 0.5l 95% alcohol, 1kg
raspberries, 0.4kg sugar; put into a big jar for 1 month.  Filter out and
throw away the fruits (can dump them into a cake, etc), let the drink age
at least 3-6 months.



Re: When should we https our mirrors?

2016-10-15 Thread Josh Triplett
Marco d'Itri wrote:
> On Oct 15, Dimitri John Ledkov  wrote:
> > I believe the TLS overhead costs are negligible, especially if one
> This is not about the TLS overhead: the real issue is not being able to
> use sendfile(2).

If you really want to use sendfile (or splice or vmsplice) for your TLS
connections, see AF_ALG and https://lwn.net/Articles/666509/ .

However, I seriously doubt that any Debian mirror will become CPU-bound
doing TLS before it saturates available network or disk bandwidth.

> > uses ECC keys. The further privacy it buys one, is IMHO, well worth
> > the effort. I would be in favor of Debian mirrors to auto-enroll into
> > letsencrypt certs.
> This would fail spectacularly due to the per-domain rate limiting
> imposed by LE.

Let's Encrypt has a process to request lifting that rate limit, and I
imagine they'd have no problem doing so for debian.org subdomains.



Re: uscan download from sourceforge doesn't download what you expect!

2016-10-15 Thread Paul Wise
On Sun, Oct 16, 2016 at 1:47 AM, Steve M. Robbins wrote:

> Who can I contact to get https://qa.debian.org/watch/sf.php/boost/ fixed?

These days the reflector is just a proxy for the sourceforge RSS feeds:

https://sourceforge.net/projects/boost/rss?limit=1000

So check if the issue occurs in their RSS feed before sending a bug or patch.

-- 
bye,
pabs

https://wiki.debian.org/PaulWise



Re: When should we https our mirrors?

2016-10-15 Thread Paul Wise
On Sun, Oct 16, 2016 at 2:03 AM, Paul Tagliamonte wrote:

> So, when are we going to push this? If not now, what criteria need to be
> met? Why can't we https-ify the default CDN mirror today?

Exactly what actions do you mean by this?

Debian does not control what mirror operators do, they are free to add
https or not. Some do but most don't.

httpredir.d.o is not well maintained, but it could theoretically
support https if someone cared about it.

deb.d.o is backed by two commercial CDNs, see Tollef's mail about that.

-- 
bye,
pabs

https://wiki.debian.org/PaulWise



Re: When should we https our mirrors?

2016-10-15 Thread Paul Wise
On Sun, Oct 16, 2016 at 3:25 AM, Tollef Fog Heen wrote:

> Doing this for the per-country mirrors means that repointing mirrors
> becomes a lot harder than it currently is, and this is something we do
> on a daily basis.  We'd need a solution for deploying the TLS cert for,
> say, ftp.de.d.o to ftp.se.d.o (or ftp.d.o) if ftp.d.o is down for
> maintenance.

I never really liked the per-country mirrors being under debian.org,
redirectors would be a better option. I think we really need to
redesign the apt archive namespace for Debian.

-- 
bye,
pabs

https://wiki.debian.org/PaulWise



Re: When should we https our mirrors?

2016-10-15 Thread Aron Xu
On Sunday, October 16, 2016, Tollef Fog Heen  wrote:

> ]] Paul Tagliamonte
>
> > So, when are we going to push this? If not now, what criteria need to
> > be met? Why can't we https-ify the default CDN mirror today?
>
> The usual crypto answer: because key handling is hard.
>
> Doing this for the per-country mirrors means that repointing mirrors
> becomes a lot harder than it currently is, and this is something we do
> on a daily basis.  We'd need a solution for deploying the TLS cert for,
> say, ftp.de.d.o to ftp.se.d.o (or ftp.d.o) if ftp.d.o is down for
> maintenance.
>
>
I agree key handling is difficult, but it's not that hard to work
around such scenarios when HTTP 302 can be provided from the original
maintianers (i.e. through a temporary virtual machine).

Actually we have backup plan on ftp.cn.d.o and ftp2.cn.d.o
that is battle-tested. They would redirect traffic to selected mirrors in a
way similar to httpredir.d.o when outages happen. Performance and bandwidth
requirements are acceptable for a temporary service even they are of the
busiest FOSS mirrors in China.

The two mirrors are delivering most of the traffic through HTTPS
nowadays according to statistics because we've deployed User-Agent based
HTTPS redirection on all supported domains and never heard a complain.
Overhead is negligible because IOPS of disk arrays is always the most
significant problem and bandwidth the next.


> Doing this for deb.d.o would mean we need to get certs on both Fastly
> and Cloudfront deployed, which is, frankly, a more realistic proposition
> than jury-rigging something on the per-country mirrors.
>
>
There's no reason to not do it, but it doesn't cover parts in the world
like China where neither Fastly nor Cloudfront provides a decent service.

Best,
Aron


Re: When should we https our mirrors?

2016-10-15 Thread Aron Xu
On Sunday, October 16, 2016, Paul Wise  wrote:

> On Sun, Oct 16, 2016 at 3:25 AM, Tollef Fog Heen wrote:
>
> > Doing this for the per-country mirrors means that repointing mirrors
> > becomes a lot harder than it currently is, and this is something we do
> > on a daily basis.  We'd need a solution for deploying the TLS cert for,
> > say, ftp.de.d.o to ftp.se.d.o (or ftp.d.o) if ftp.d.o is down for
> > maintenance.
>
> I never really liked the per-country mirrors being under debian.org,
> redirectors would be a better option. I think we really need to
> redesign the apt archive namespace for Debian.
>
>
>
Yeah but at the risk of making it broken like pypi and npm to quite
some people including me.

 Best,
Aron


-- 
Regards,
Aron Xu


Bug#840907: ITP: winregfs -- Windows registry FUSE filesystem

2016-10-15 Thread Giovani Augusto Ferreira
Package: wnpp
Severity: wishlist
Owner: Giovani Augusto Ferreira 

* Package name: winregfs
  Version : 0.6
  Upstream Author : Jody Bruchon 
* URL : https://github.com/jbruchon/winregfs
* License : GPL-2
  Programming Lang: C
  Description : Windows registry FUSE filesystem

 winregfs is a FUSE-based filesystem driver that enables accessing of Windows
 registry hive files as ordinary filesystems. Registry hive file editing can
 be performed with ordinary shell scripts and command-line tools once mounted.
 .
 fsck.winregfs scans a Windows registry hive file for problems that indicate
 the hive has been damaged by hardware or software issues, reading recursively
 the  key  and  value  data structures in the registry hive.
 .
 This package is useful for pentesters, ethical hackers and forensics experts.



dput: Call for testers: replacing ‘/usr/bin/gpg’ with GPGME

2016-10-15 Thread Ben Finney
Howdy all,

I am preparing a new version of ‘dput’ that stops using ‘/usr/bin/gpg’,
and instead uses the GPGME library for GnuPG operations.


Currently, as of ‘dput’ version 0.10, GnuPG operations are done by
invoking the ‘/usr/bin/gpg’ command in a subprocess. This is fragile in
several ways, not least that it depends on stream output from the
command to determine the result of operations.

I expect GPGME https://gnupg.org/related_software/gpgme/> will make
it easier for ‘dput’ to support more systems.

So I am preparing a version of ‘dput’ > 0.10 that will stop using a
specific command path in a subprocess, and instead use the library API.

Before the release I would like to have some testers try the program for
regressions.

If your packaging workflow has unusual signing practices, or an unusual
GnuPG configuration, your help will be especially valuable to test this
change.

Please contact me at  to offer your packaging
system to test this new release.

-- 
 \“Sane people have an appropriate perspective on the relative |
  `\ importance of foodstuffs and human beings. Crazy people can't |
_o__) tell the difference.” —Paul Z. Myers, 2010-04-18 |
Ben Finney



Re: When should we https our mirrors?

2016-10-15 Thread Aron Xu
On Sunday, October 16, 2016, Aron Xu  wrote:

>
>
> On Sunday, October 16, 2016, Paul Wise  > wrote:
>
>> On Sun, Oct 16, 2016 at 3:25 AM, Tollef Fog Heen wrote:
>>
>> > Doing this for the per-country mirrors means that repointing mirrors
>> > becomes a lot harder than it currently is, and this is something we do
>> > on a daily basis.  We'd need a solution for deploying the TLS cert for,
>> > say, ftp.de.d.o to ftp.se.d.o (or ftp.d.o) if ftp.d.o is down for
>> > maintenance.
>>
>> I never really liked the per-country mirrors being under debian.org,
>> redirectors would be a better option. I think we really need to
>> redesign the apt archive namespace for Debian.
>>
>>
>>
> Yeah but at the risk of making it broken like pypi and npm to quite
> some people including me.
>
>
To make it clear, content delivery systems used by pypi and npm don't work
for many people in China because:

1) Major global CDN providers don't have decent services in the country
(except akamai and cloudflare but need special contract);

2) BGP based network topology discovery never work because eBGP routing is
not widely deployed for subscriber network;

There's more to mention for Debian:

3) cdn.debian.net / httpredir.d.o tend to exclude local mirrors because of
the synchronization delays are much higher than in EU/US, even current
ftpX.cn.d.o would easily exceed the tolerance of redirecting software.

Best
Aron


Re: uscan download from sourceforge doesn't download what you expect!

2016-10-15 Thread Paul Wise
On Sun, Oct 16, 2016 at 2:49 AM, Dimitri John Ledkov wrote:

> Yes, this is known to me, but I did not report. The redirector /
> sourceforge make it hard to distinct identically named files in
> different subfolders unfortunately.

This was a bug in the redirector, I've added additional links
containing the full path to the files. I couldn't modify the existing
links because that would break all existing sf.net using watch files.
I added a direct link to the sourceforge-run redirector too, so these
should both work:

version=3
opts="uversionmangle=s/_/./g,dversionmangle=s/\+dfsg$//" \
http://sf.net/boost/ .*/[.\d]+/boost_([\d_]*)\.tar.bz2

version=3
opts="uversionmangle=s/_/./g,dversionmangle=s/\+dfsg$//" \
http://sf.net/boost/
https://downloads.sourceforge.net/.*/[.\d]+/boost_([\d_]*)\.tar.bz2

-- 
bye,
pabs

https://wiki.debian.org/PaulWise



Bug#840915: ITP: python-github3.py -- comprehensive, actively developed and extraordinarily stable wrapper around the GitHub API (v3)

2016-10-15 Thread 陳昌倬
Package: wnpp
Severity: wishlist
Owner: "ChangZhuo Chen (陳昌倬)" 

* Package name: python-github3.py
  Version : 0.9.3
  Upstream Author : Ian Cordasco (sigmavirus24)
* URL : https://github.com/sigmavirus24/github3.py
* License : BSD-3-clause
  Programming Lang: Python
  Description : Python stable wrapper around the GitHub API (v3)

 github3.py is a comprehensive, actively developed and extraordinarily
 stable wrapper around the GitHub API (v3).

-- 
ChangZhuo Chen (陳昌倬) 
Debian Developer (https://nm.debian.org/public/person/czchen)
Key fingerprint = EC9F 905D 866D BE46 A896  C827 BE0C 9242 03F4 552D
  BA04 346D C2E1 FE63 C790  8793 CC65 B0CD EC27 5D5B


signature.asc
Description: PGP signature


Re: When should we https our mirrors?

2016-10-15 Thread Dimitri John Ledkov
On 15 October 2016 at 20:25, Tollef Fog Heen  wrote:
> ]] Paul Tagliamonte
>
>> So, when are we going to push this? If not now, what criteria need to
>> be met? Why can't we https-ify the default CDN mirror today?
>
> The usual crypto answer: because key handling is hard.
>
> Doing this for the per-country mirrors means that repointing mirrors
> becomes a lot harder than it currently is, and this is something we do
> on a daily basis.  We'd need a solution for deploying the TLS cert for,
> say, ftp.de.d.o to ftp.se.d.o (or ftp.d.o) if ftp.d.o is down for
> maintenance.
>

I'm not a sysadmin. My naive approach would be to have cname specified
on the certs that are subject to redirect. E.g. ftp.d.o should have
cname's for all country codes, such that any country mirror can fall
back to ftp.d.o.

Yes, it means that ftp.d.o can impersonate country mirrors. However,
we validate the integrity of the archive via gpg, this TLS thing is
only to encrypt the channel for the privacy of the requests.

> Doing this for deb.d.o would mean we need to get certs on both Fastly
> and Cloudfront deployed, which is, frankly, a more realistic proposition
> than jury-rigging something on the per-country mirrors.
>
> --
> Tollef Fog Heen
> UNIX is user friendly, it's just picky about who its friends are
>

-- 
Regards,

Dimitri.



Bug#840916: ITP: node-buffer-equal -- return whether two buffers are equal

2016-10-15 Thread Sruthi Chandran
Package: wnpp
Severity: wishlist
Owner: Sruthi Chandran 
X-Debbugs-CC: debian-devel@lists.debian.org

* Package name: node-buffer-equal
  Version : 1.0.0
  Upstream Author : James Halliday  (http://substack.net)
* URL : https://github.com/substack/node-buffer-equal
* License : Expat
  Programming Lang: JavaScript
  Description : return whether two buffers are equal



Bug#840917: ITP: tongue -- Lua I18N library 'Tongue'

2016-10-15 Thread Daniel Silverstone
Package: wnpp
Severity: wishlist
Owner: Daniel Silverstone 

* Package name: tongue
  Version : 0.8
  Upstream Author : Daniel Silverstone 
* URL : https://git.gitano.org.uk/tongue.git
* License : BSD
  Programming Lang: Lua
  Description : Lua I18N library 'Tongue'

Tongue is an internationalisation engine written in Lua which implements a
hierarchical language pack system for Lua programs to use in localising
messages into and out of themselves.

This package is a dependency of Gitano which I am trying to get packaged
into Stretch.  This is the last dependency which needs adding to Debian
as far as I can tell, before Gitano can go in.

I will be maintaining the package myself to begin with; though I do have
two potentially interested others for co-maintenance.

D.



Bug#840918: ITP: node-string-decoder -- The string_decoder module from Node core

2016-10-15 Thread Sruthi Chandran
Package: wnpp
Severity: wishlist
Owner: Sruthi Chandran 
X-Debbugs-CC: debian-devel@lists.debian.org

* Package name: node-string-decoder
  Version : 0.10.31
  Upstream Author : FIX_ME upstream author
* URL : https://github.com/rvagg/string_decoder
* License : Expat
  Programming Lang: JavaScript
  Description : The string_decoder module from Node core



Re: When should we https our mirrors?

2016-10-15 Thread Tollef Fog Heen
]] Dimitri John Ledkov 

> I'm not a sysadmin. My naive approach would be to have cname specified
> on the certs that are subject to redirect. E.g. ftp.d.o should have
> cname's for all country codes, such that any country mirror can fall
> back to ftp.d.o.

This would restrict us to always point a ftp.XX.d.o name to ftp.d.o.
Sometimes, it'd be more appropriate to point it to a closer geographical
mirror.  (Say ftp.nz were performing maintenance, it'd be a lot more
reasonable to send that traffic to Australia than to the Netherlands.)

Is this impossible to fix/work around?  No.  However, it requires more
thought and design than just slapping a few letsencrypt certs onto
some hosts.

-- 
Tollef Fog Heen
UNIX is user friendly, it's just picky about who its friends are



Re: When should we https our mirrors?

2016-10-15 Thread Tollef Fog Heen
]] Aron Xu 

> To make it clear, content delivery systems used by pypi and npm don't
> work for many people in China because:
> 
> 1) Major global CDN providers don't have decent services in the
> country (except akamai and cloudflare but need special contract);
> 
> 2) BGP based network topology discovery never work because eBGP
> routing is not widely deployed for subscriber network;

While I sympatise with people in China who have less than stellar access
to the entire internet, I don't think we should give the rest of the
world a worse experience just so everybody has the same set of
problems.  At the same time, if we can design a solution that works well
for everybody, that's of course preferable.

-- 
Tollef Fog Heen
UNIX is user friendly, it's just picky about who its friends are