Bug#941893: RFA: pam-dbus

2019-10-07 Thread Joachim Breitner
Package: wnpp
Severity: normal

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

pam-dbus (which allows you to configure a guest account where people can
log in when you approve it by approving a notification popup) was a fun
experiment from me years ago, but I never used it, and have not touched
it in a while. Since this is somewhat security-related, this really
shouldn’t be in the archive without an active maintainer. The UI part
needs porting to gtk3 (this kicks it off testing right now).

Is anyeone interest in taking it over (upstream and packaging)? Else
I’ll ask for its removal at some point in the future.


Cheers,
Joachim


-BEGIN PGP SIGNATURE-

iHEEARECADEWIQQxTjstYFpus1p9gRn2KOuTR0MgbAUCXZrynhMcbm9tZWF0YUBk
ZWJpYW4ub3JnAAoJEPYo65NHQyBsBQ0AoMieNUq0xpL03WQClQexpuyZbZ/AAJsG
3ItfHjbETUarrkS4tXmbPNFDKg==
=nTJc
-END PGP SIGNATURE-


Re: Debian and our frenemies of containers and userland repos

2019-10-07 Thread Shengjing Zhu
On Mon, Oct 7, 2019 at 1:23 PM Johannes Schauer  wrote:
>
> Quoting Paul Wise (2019-10-07 03:38:55)
> > On Sun, Oct 6, 2019 at 7:23 PM Simon McVittie wrote:
> > > FYI, this is because autopkgtest has an abstraction for multiple
> > > container/virtualization mechanisms (lxc, lxd, qemu, schroot)
> > It seems like this abstraction should be split out of the autopkgtest
> > source and then depended on by autopkgtest. Do any other such
> > abstraction layers exist?
>
> I do not know of any other such abstraction layers but would warmly welcome
> them not only for the purpose of including them in sbuild.
>

Not sure if containerd[1] and cri[2] are such abstraction layers. They
are widely used in cloud/container area.

For containerd, it supports both container and virtualization[3] backends.

[1] https://containerd.io/
[2] 
https://github.com/kubernetes/community/blob/master/contributors/devel/sig-node/container-runtime-interface.md
[3] https://katacontainers.io/

-- 
Shengjing Zhu



Re: Debian and our frenemies of containers and userland repos

2019-10-07 Thread Simon McVittie
On Mon, 07 Oct 2019 at 07:22:53 +0200, Johannes Schauer wrote:
> Specifically, currently autopkgtest is limited to providing a read-only layer
> for certain backends and its upstream has no intention of widening the scope 
> of
> the software [1]. This means that to upgrade an autopkgtest backend, the user
> has to apply backend-specific actions

I think "re-bootstrap, don't upgrade" is an equally good principle for
autopkgtest and sbuild? Both will be equally susceptible to accumulating
cruft during upgrades that wouldn't have been there in a fresh debootstrap,
which is undesired if you want the invariant that you are (building|testing)
in "today's" minimal environment.

smcv



Re: Debian and our frenemies of containers and userland repos

2019-10-07 Thread Shengjing Zhu
On Mon, Oct 7, 2019 at 6:29 PM Simon McVittie  wrote:
>
> On Mon, 07 Oct 2019 at 07:22:53 +0200, Johannes Schauer wrote:
> > Specifically, currently autopkgtest is limited to providing a read-only 
> > layer
> > for certain backends and its upstream has no intention of widening the 
> > scope of
> > the software [1]. This means that to upgrade an autopkgtest backend, the 
> > user
> > has to apply backend-specific actions
>
> I think "re-bootstrap, don't upgrade" is an equally good principle

Why not have a repository for it, like dockerhub. So this becomes
"pull latest build env", which saves lots of time("re-bootstrap" is
still slow nowadays).

-- 
Shengjing Zhu



Re: Debian and our frenemies of containers and userland repos

2019-10-07 Thread Philipp Kern
On 10/7/2019 1:17 PM, Shengjing Zhu wrote:
> On Mon, Oct 7, 2019 at 6:29 PM Simon McVittie  wrote:
>>
>> On Mon, 07 Oct 2019 at 07:22:53 +0200, Johannes Schauer wrote:
>>> Specifically, currently autopkgtest is limited to providing a read-only 
>>> layer
>>> for certain backends and its upstream has no intention of widening the 
>>> scope of
>>> the software [1]. This means that to upgrade an autopkgtest backend, the 
>>> user
>>> has to apply backend-specific actions
>>
>> I think "re-bootstrap, don't upgrade" is an equally good principle
> 
> Why not have a repository for it, like dockerhub. So this becomes
> "pull latest build env", which saves lots of time("re-bootstrap" is
> still slow nowadays).

In that case it'd probably be better to make bootstrapping faster rather
than trusting random binaries on the internet. (Unless we grow an
"assemble an image from debs" service on, say, ftp-master.)

Kind regards
Philipp Kern



Re: Debian and our frenemies of containers and userland repos

2019-10-07 Thread Shengjing Zhu
On Mon, Oct 7, 2019 at 7:21 PM Philipp Kern  wrote:
> In that case it'd probably be better to make bootstrapping faster rather
> than trusting random binaries on the internet. (Unless we grow an
> "assemble an image from debs" service on, say, ftp-master.)
>

We already have such, the cloud image service.(I think these images
only include minbase variant, not buildd variant).

https://cloud.debian.org/images/cloud/

-- 
Shengjing Zhu



Re: Debian and our frenemies of containers and userland repos

2019-10-07 Thread Johannes Schauer
Hi,

shameless plug for mmdebstrap incoming.

Quoting Philipp Kern (2019-10-07 13:21:36)
> On 10/7/2019 1:17 PM, Shengjing Zhu wrote:
> > On Mon, Oct 7, 2019 at 6:29 PM Simon McVittie  wrote:
> >> On Mon, 07 Oct 2019 at 07:22:53 +0200, Johannes Schauer wrote:
> >>> Specifically, currently autopkgtest is limited to providing a read-only 
> >>> layer
> >>> for certain backends and its upstream has no intention of widening the 
> >>> scope of
> >>> the software [1]. This means that to upgrade an autopkgtest backend, the 
> >>> user
> >>> has to apply backend-specific actions
> >> I think "re-bootstrap, don't upgrade" is an equally good principle
> > Why not have a repository for it, like dockerhub. So this becomes
> > "pull latest build env", which saves lots of time("re-bootstrap" is still
> > slow nowadays).
> In that case it'd probably be better to make bootstrapping faster rather
> than trusting random binaries on the internet. (Unless we grow an
> "assemble an image from debs" service on, say, ftp-master.)

creating a working sbuild chroot takes 10 seconds on my system:

$ time mmdebstrap --variant=essential unstable debian-unstable.tar
[...]
mmdebstrap [...]   8.35s user 1.73s system 99% cpu 10.166 total

Do we need to spend engineering effort to become faster than that?

Downloading "random binary from the internet" is less of a problem if we can
create images which are bit-by-bit identical to checksums that we can verify
through a trusted service. This is also already provided by mmdebstrap:

$ SOURCE_DATE_EPOCH=1570448177 mmdebstrap --variant=essential unstable - | 
sha256sum
[...]
f40a3d2e9e168c3ec6270de1be79c522ce9f2381021c25072353bb3b5e1703d6  -
$ SOURCE_DATE_EPOCH=1570448177 mmdebstrap --variant=essential unstable - | 
sha256sum
[...]
f40a3d2e9e168c3ec6270de1be79c522ce9f2381021c25072353bb3b5e1703d6  -

Lastly: yes, maybe "re-bootstrap, don't upgrade" is an equally good principle.
It has the advantage of not accumulating cruft. The sbuild-createchroot command
could gain an option which allows one to replace an existing chroot. Currently,
it refuses to work on already existing chroots.

Thanks!

cheers, josch


signature.asc
Description: signature


Potrzebujesz strony WWW, a nie chcesz zapłacić fortuny za realizację? Sprawdź nas.

2019-10-07 Thread Agencja WWW

Planujesz zmianę swojej *Strony* lub *Sklepu internetowego*? A może interesuje 
Cię nowy projekt?



Jedno jest pewne, trafiłeś w dobre ręce.

 Odpowiedz do nas maila z informacją* Tak*,
a my przygotujemy dla Ciebie bezpłatną wycenę.



Nasz Doradca Klienta wytłumaczy Ci sposób działania, po czym zaproponuje 
optymalne rozwiązania dla Twojego biznesu.


_ _ _
Strony i Sklepy WWW 
na dobrych warunkach!



Re: Debian and our frenemies of containers and userland repos

2019-10-07 Thread Philipp Kern

On 2019-10-07 13:43, Johannes Schauer wrote:

Quoting Philipp Kern (2019-10-07 13:21:36)

On 10/7/2019 1:17 PM, Shengjing Zhu wrote:
> On Mon, Oct 7, 2019 at 6:29 PM Simon McVittie  wrote:
>> On Mon, 07 Oct 2019 at 07:22:53 +0200, Johannes Schauer wrote:
>>> Specifically, currently autopkgtest is limited to providing a read-only 
layer
>>> for certain backends and its upstream has no intention of widening the 
scope of
>>> the software [1]. This means that to upgrade an autopkgtest backend, the 
user
>>> has to apply backend-specific actions
>> I think "re-bootstrap, don't upgrade" is an equally good principle
> Why not have a repository for it, like dockerhub. So this becomes
> "pull latest build env", which saves lots of time("re-bootstrap" is still
> slow nowadays).
In that case it'd probably be better to make bootstrapping faster 
rather

than trusting random binaries on the internet. (Unless we grow an
"assemble an image from debs" service on, say, ftp-master.)


creating a working sbuild chroot takes 10 seconds on my system:

$ time mmdebstrap --variant=essential unstable debian-unstable.tar
[...]
mmdebstrap [...]   8.35s user 1.73s system 99% cpu 10.166 total

Do we need to spend engineering effort to become faster than that?


I suppose that also depends on deb caching/pipe bandwidth? But yes, I 
find that totally fine.


Downloading "random binary from the internet" is less of a problem if 
we can
create images which are bit-by-bit identical to checksums that we can 
verify

through a trusted service. This is also already provided by mmdebstrap:

$ SOURCE_DATE_EPOCH=1570448177 mmdebstrap --variant=essential
unstable - | sha256sum
[...]
f40a3d2e9e168c3ec6270de1be79c522ce9f2381021c25072353bb3b5e1703d6  -
$ SOURCE_DATE_EPOCH=1570448177 mmdebstrap --variant=essential
unstable - | sha256sum
[...]
f40a3d2e9e168c3ec6270de1be79c522ce9f2381021c25072353bb3b5e1703d6  -


I think that's required, but not sufficient. That still depends on 
someone actually verifying this fact and publishing their proofs. 
Otherwise you need to do it yourself or risk getting a binary served to 
your build process only if not checked interactively[0].


Lastly: yes, maybe "re-bootstrap, don't upgrade" is an equally good 
principle.
It has the advantage of not accumulating cruft. The sbuild-createchroot 
command
could gain an option which allows one to replace an existing chroot. 
Currently,

it refuses to work on already existing chroots.


At work we always regenerate unless when you test multiple times locally 
in quick succession. Assuming that the result is not totally wasteful 
(e.g. by caching bootstrap debs locally) that seems like a good way to 
get predictable local build environments.


Kind regards and thanks
Philipp Kern

[0] It seems to be a standard tool these days to serve exploits only 
when the caller looks like the target environment. I.e. if you check the 
script you pipe into bash from a browser it looks fine, if you curl it 
into bash[1], it looks different.

[1] Yes, it seems like even that case can be identified.



Re: Debian and our frenemies of containers and userland repos

2019-10-07 Thread Ian Jackson
Paul Wise writes ("Re: Debian and our frenemies of containers and userland 
repos"):
> On Sun, Oct 6, 2019 at 7:23 PM Simon McVittie wrote:
> > FYI, this is because autopkgtest has an abstraction for multiple
> > container/virtualization mechanisms (lxc, lxd, qemu, schroot)
> 
> It seems like this abstraction should be split out of the autopkgtest
> source and then depended on by autopkgtest.

I agree.  I was the original designer of this interface and the
original author of autopkgtest.  I put the virtualisation abstractions
in src:autopkgtest just because it was convenient, not for any
principled reason.  I chose the name pattern "adt-virt-*".  I put
"adt" in it to avoid it being too much of a namespace grab, not
because this interface was intended only for the use of autopktest.

I think the current autopkgtest maintainer is not so keen on this
abstraction.  I would love it if we could split it out from the
autopkgtest package and I would volunteer to maintain it.

Martin, would such a move have your support ?

> Do any other such abstraction layers exist?

The closest I was aware of at the time was libvirt, which is not
really useable in the same way.  I think the interface I designed and
which has subsequently been significantly improved, is a good one, and
we should continue to develop and enhance it.

Thanks,
Ian.

-- 
Ian JacksonThese opinions are my own.

If I emailed you from an address @fyvzl.net or @evade.org.uk, that is
a private address which bypasses my fierce spamfilter.



ITP: libdata-url-java -- Support for the data protocol as specified in RFC 2397.

2019-10-07 Thread Felix Natter
Package: wnpp
Severity: wishlist
Owner: Felix Natter 

* Package name: libdata-url-java
  Version : 1.0.1
  Upstream Author : Rob Spoor 
* URL : https://github.com/robtimus/data-url/
* License : Apache-2.0
  Programming Lang: Java
  Description : Support for the data protocol as specified in RFC 2397.

The data-url library adds support for the data protocol as specified
in RFC 2397.

This is a dependency of freeplane-1.7.10. It will be
maintained within the java team.


Felix Natter



Re: Debian and our frenemies of containers and userland repos

2019-10-07 Thread Paul Wise
On Mon, 2019-10-07 at 11:29 +0100, Simon McVittie wrote:

> I think "re-bootstrap, don't upgrade" is an equally good principle for
> autopkgtest and sbuild? Both will be equally susceptible to accumulating
> cruft during upgrades that wouldn't have been there in a fresh debootstrap,
> which is undesired if you want the invariant that you are (building|testing)
> in "today's" minimal environment.

debootstrap uses a fair bit more time and resources than apt upgrade,
so I think that both are needed.

I don't want to be rebuilding sbuild/pbuilder chroots before each
package build, but an apt update and upgrade before each build starts
installing build-dependencies is reasonable.

At work we upgrade build containers interactively if needed, upgrade
them automatically daily and rebuild them from scratch weekly, this
feels like a reasonable compromise to me.

-- 
bye,
pabs

https://wiki.debian.org/PaulWise


signature.asc
Description: This is a digitally signed message part


Summary: Git Packaging Round 2 [comments by 11/05/2019]

2019-10-07 Thread Sam Hartman

This is a summary of discussions we had in August and September around
how we want to use salsa.  Presented so those involved in the discussion
can see if I'm calling consensus correctly and as a last opportunity for
others to comment.  A few tweaks from my original proposed
recommendations.  If you were OK with that version you can likely skip
this entirely, although I'd appreciate it if you'd search for "HOW YOU
CAN HELP" and glance at that section at least.


This message focuses on  the areas of the original recommendation that
received significant comment and includes the current recommendation at
the end.

As a reminder, this recommendation is purely optional; it is intended to
help those looking for best practices or newcomers searching for a
recommendation.  If it doesn't fit your needs, then find something that
does.

Discussion Comments


Teams
*

We were reminded at several points that the best practice is to find a
team and to maintain your package using their practices.  That was
always the intent, but I'm proposing to update and clarify this from the
top just to be extra clear.

Debian Group When no Specific Team
**

TL; DR: I think there is consensus behind recommending the Debian group
on Salsa when there is not an existing team to use.  This consensus is
not complete; some disagreed.  If after reading the summary people want
to have a quick vote, I think that would be fine.

In more detail: I proposed that the debian group would be a sensible
default if there is not a team project to use.  We had a wide ranging
discussion.

There are two big concerns with the debian group.  Technically, any DD
has push access to any repository in the group.  Also, as Ansgar pointed
out, the wiki page [1] says that it is reasonable to commit with no
prior discussion.

  [1]:
  
https://wiki.debian.org/Salsa/Doc#Collaborative_Maintenance:_.22Debian.22_group

My original text implied that the Debian group was a lot closer to
low-threshhold NMUs than a complete free-for-all.  In practice, I think
that's true: I think that the actual social conventions that get used in
practice are more conservative than the permissions granted technically
and by that wiki page.

Russ agreed that Debian is a sensible default [2].  Enrico agreed.
After re-reading the proposal, Jonas agreed that this was a reasonable
recommendation.  He would not have supported something stronger like a
policy which limited maintainers' flexibility when this recommendation
does not meet their needs.

  [2]: https://lists.debian.org/msgid-search/875zm0or60@hope.eyrie.org

Ian Jackson thought that recommending  the debian group would be reasonable if
we did three things:

* Document which maintainer branch format a maintainer is using

* Update documentation on when it is reasonable to push to the debian
  group

* document the above

David Bremner is uncomfortable with the idea of having all DDs have push
access to thousands of packages.  He doesn't think we have the social
conventions for that.
However he said he would be OK with the recommendation if we did as Ian
proposed (documenting branch format, documenting when to push).

Ansgar argued that documenting the branch format is unnecessary given
all the work you need to do to contribute to a package.  Several
disagreed arguing that it helped them do their work.

Bernd Zeimetz argued we didn't need a recommendation.  We could just
list places people could host with advantages and disadvantages.  Matt
Zagrabelny and Enrico argued that  having specific recommendations
lowered the bar to contributing because you did not need to evaluate the
advantages and disadvantages for your environment.  This is consistent
with feedback we received during the dh discussion and during the DPL
campaign.  (Enrico's message was posted to a related thread on -project,
not to debian-devel)


Ansgar argued that a recommendation could be harmful because we take a
long time to update documentation/recommendations and it would get out
of date.  Several people pointed out that under that argument we
wouldn't have documentation at all.
Even if the slope is not that slippery, the arguments about lowering the
bar to entry apply here too.  However having the recommendation become
out of date remains a residual risk.


Scott Kitterman is concerned that we are loosening the boundaries of
individual responsibility around what it means to be a maintainer too
far.  He's concerned that if we weaken the maintainer model too much,
that everyone will have responsibility.  He believes that is the same as
no one having responsibility.

It became clear in the discussion that the alternative to the debian
group is repositories hosted under individual salsa accounts.

The debian group is widely used today.  It certainly dominates any
individual salsa account.  It also dominates (at least in terms of
vcs-git in unstable) individual (non-team) accounts combined.  There are
some tea

Re: Summary: Git Packaging Round 2 [comments by 11/05/2019]

2019-10-07 Thread Holger Levsen
On Mon, Oct 07, 2019 at 09:22:46PM -0400, Sam Hartman wrote:
> [...] as a last opportunity for
> others to comment. 

what's the deadline to grok this 20k and respond?


-- 
cheers,
Holger

---
   holger@(debian|reproducible-builds|layer-acht).org
   PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C



signature.asc
Description: PGP signature