Re: Next attempt to add Blends to Debian installer

2022-01-18 Thread Philip Hands
Andreas Tille  writes:

...
> As far as I understood Phil's last posting he is working on an enhanced
> tasksel.

Actually, what I've been working on is infrastructure to allow others to
contribute to such an effort.

I've recently enabled a CI pipeline in the tasksel master branch, so
anyone forking that will now get the benefit of this work for free (as
long as they set the CI file to be 'debian/salsa-ci.yml').

I intend to blog about the details shortly, but a quick run down is that
this pipeline was triggered by a commit to my fork:

  https://salsa.debian.org/philh/tasksel/-/pipelines/337031

which (via a multi-project pipeline) generates a mini-iso:

  
https://salsa.debian.org/installer-team/debian-installer/-/jobs/2364015/artifacts/file/public/gtk-mini.iso

that is configured to use an additional apt repo, which in this case
includes a version of tasksel built from the above branch:

  
https://salsa.debian.org/installer-team/branch2repo/-/jobs/2364013/artifacts/browse/public/pool/main/t/tasksel/

which one can then download the min-iso for testing, and/or cause to be
automatically tested with openQA, as seen here:

  
https://openqa.debian.net/tests/overview?groupid=13&build=-salsa-337031:philh:tasksel:salsa-CI_tasksel

where if one drills down to the logs, and search for 'salsaci', one can
see that the tasksel packages came from the extra repo:

  https://openqa.debian.net/tests/37964/logfile?filename=_collect_data-debs.txt

The same is true for udebs that are included at build time, and that
would be expected to be downloaded at d-i runtime, so simply by creating
named branches with the same name across all the (u)debs that one wants
to test together you can get hold of a mini-iso that will use those
versions in preference to the released versions, without needing to know
anything about building d-i or debian CDs.

Hopefully that lowers the bar enough so that people can concentrate on
the bits they want to improve without immediately getting stuck on how
they could possibly test their efforts.

However, I've not really put much thought into what actually needs to be
changed in order to address the Blends Selection problem.

In the past when this has come up I've come up with some temporary hacks
that worked around the lack of a decent user interface, but if we want
to fix this properly then I think Steve has a point that one way to do
that is to extend debconf, and then use new features in tasksel.

I don't have anything like a design for how that should look in my head
though -- I guess interested parties should get together and come up
with a design _before_ we start trying to implement it :-)

Cheers, Phil.
-- 
|)|  Philip Hands  [+44 (0)20 8530 9560]  HANDS.COM Ltd.
|-|  http://www.hands.com/http://ftp.uk.debian.org/
|(|  Hugo-Klemm-Strasse 34,   21075 Hamburg,GERMANY


signature.asc
Description: PGP signature


Bug#1003942: ITP: cisco7crack -- Crypt and decrypt the cisco type 7 passwords

2022-01-18 Thread Guilherme de Paula Xavier Segundo
Package: wnpp
Severity: wishlist
Owner: Guilherme de Paula Xavier Segundo 
X-Debbugs-Cc: debian-devel@lists.debian.org, guilherme@gmail.com

* Package name: cisco7crack
  Version : 0.0~git20121221.f1c21dd-1
  Upstream Author : Davide Madrisan 
* URL : https://github.com/madrisan/cisco7crack
* License : GPL-2+
  Programming Lang: C
  Description : Crypt and decrypt the cisco type 7 passwords

Crypt and decrypt the cisco type 7 passwords

 This tool is used to crack Cisco Type 7 passwords. Can be used to encrypt
 and decrypt Cisco device passwords.
 .
 Originally designed in order to allow quick decryption of stored passwords,
 Type 7 passwords are not a secure form of password storage. There are many
 tools available that can easily decrypt these passwords. Use of Type 7
 passwords should be avoided unless required by a feature that is in use on
 the Cisco IOS device.



Bug#1003950: ITP: pyobjcryst -- Object-Oriented Crystallographic Library Python3 bindings

2022-01-18 Thread Neil Williams
Package: wnpp
Severity: wishlist
Owner: Neil Williams 
X-Debbugs-Cc: debian-devel@lists.debian.org, codeh...@debian.org

* Package name: pyobjcryst
  Version : 2.2.1-1
  Upstream Author : Prof. Simon Billinge 
* URL : https://github.com/diffpy/pyobjcryst
* License : BSD-like custom
  Programming Lang: C++, Python
  Description : Object-Oriented Crystallographic Library Python3 bindings

 Python bindings to ObjCryst++, the Object-Oriented Crystallographic Library.
 .
 Some examples offer 3D support which can use python3-ipywidgets.
 .
 This package installs the library for Python 3.

This package is to be maintained within the Debian PaN Maintainers team
and Debian Science Team.

The package build-depends in libobjcryst (ITP #1001380) which in turn
build-depends on cctbx (ITP: 679905), so packaging work will continue
for a while until cctbx is accepted from NEW and libobjcryst can go
through NEW.



Re: The future of src:ntp

2022-01-18 Thread Thomas Goirand

On 1/17/22 21:13, Marco d'Itri wrote:

On Jan 17, Bernhard Schmidt  wrote:


What do you think?

chrony is MUCH better since Debian 10, I agree that it should be the
preferred NTP client for when systemd-timesyncd is not enough.
You can definitely spend your time on something more fun and more
useful.



+1

"chronyc tracking" r0x! :)

Thomas Goirand (zigo)



Bug#1003961: ITP: cwl-upgrader -- Common Workflow Language standalone document upgrader

2022-01-18 Thread Jonas Smedegaard
Package: wnpp
Severity: wishlist
Owner: Jonas Smedegaard 
X-Debbugs-Cc: debian-devel@lists.debian.org

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

* Package name: cwl-upgrader
  Version : 1.2.2
  Upstream Author : Common Workflow Language contributors 

* URL : https://github.com/common-workflow-language/cwl-upgrader
* License : Apache-2.0
  Programming Lang: Python
  Description : Common Workflow Language standalone document upgrader

 cwl-upgrader is a standalone upgrader
 for Common Workflow Language documents
 from draft-3, v1.0, and v1.1 to v1.2.
 .
 It does not check for correctness of the input document,
 for that one can use the CWL reference implementation
 available for Debian in package cwltool.
 .
 The Common Workflow Language (CWL) is a standard
 for describing computational data-analysis workflows,
 aiming to allow the creation of a workflow
 that is portable and thus may be run reproducibly
 in different computational environments.

This package will be maintained in the collaborative Debian section of
Salsa.

 - Jonas

-BEGIN PGP SIGNATURE-
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=FM+D
-END PGP SIGNATURE-



Re: The future of src:ntp

2022-01-18 Thread Paride Legovini
Bernhard Schmidt wrote on 17/01/2022:
> ntpsec and ntp should be largely configuration compatible, so even a 
> takeover of the binary package names might be practical.

I played a bit with ntpsec some time ago, I remember being very pleased
with it, and I think it can very well replace ntp in Bookworm. The
incompatible changes [1] are not blockers IMHO, provided that they're
documented.

I'd prefer making ntp a dummy package depending on ntpsec rather than
having src:ntpsec takeover bin:ntp. A dummy package will allow us to
easily switch back to ntp from ntp.org if needed, and to document the
incompatible changes in NEWS.Debian.

Paride

[1] https://docs.ntpsec.org/latest/ntpsec.html#incompatible



Re: The future of src:ntp

2022-01-18 Thread Moritz Mühlenhoff
Bernhard Schmidt  wrote:
> However, development for ntp.org is slow, upstream still using BitKeeper 
> is cumbersome, and even the testsuite needs to be fixes on some 
> architectures for new releases. Both ntpsec and chrony are (from my POV) 
> the better alternatives now. To a point where I would rather use chrony 
> for new deployments, but I'm shying away from not using my own work 
> anymore for the lack of real-life testing.

Agreed, I think we should simply remove src:ntp at this point. Fedora
migrated existing installs to ntpsec it seems:
(https://fedoraproject.org/wiki/Changes/NtpReplacement

Cheers,
Moritz



Re: The future of src:ntp

2022-01-18 Thread Michael Biebl

Am 18.01.22 um 19:44 schrieb Moritz Mühlenhoff:

Bernhard Schmidt  wrote:

However, development for ntp.org is slow, upstream still using BitKeeper
is cumbersome, and even the testsuite needs to be fixes on some
architectures for new releases. Both ntpsec and chrony are (from my POV)
the better alternatives now. To a point where I would rather use chrony
for new deployments, but I'm shying away from not using my own work
anymore for the lack of real-life testing.


Agreed, I think we should simply remove src:ntp at this point. Fedora
migrated existing installs to ntpsec it seems:
(https://fedoraproject.org/wiki/Changes/NtpReplacement


I think Fedora prefers chrony instead of ntpsec.

Fwiw, I'm with Marco here: If systemd-timesyncd (a simple SNTP client 
which is enabled by default) doesn't fit your needs, chrony is a great 
alternative.


If "ntp" the binary package would become a transitional package that 
installs chrony, that'd be fine with me if that eases the transition.


I'd also be ok if src:ntp would just be dropped and we document that in 
our release notes accordingly.




OpenPGP_signature
Description: OpenPGP digital signature


Re: The future of src:ntp

2022-01-18 Thread Marco d'Itri
On Jan 18, Michael Biebl  wrote:

> I think Fedora prefers chrony instead of ntpsec.
Fedora even uses btrfs, so who cares. :-)
The interesting point is that RHEL switched to chrony for RHEL 7.

Also, I want to add that chrony is not just better as a client, but also 
as a NTP server.
https://engineering.fb.com/2020/03/18/production-engineering/ntp-service/
offers quite some insights.

> If "ntp" the binary package would become a transitional package that
> installs chrony, that'd be fine with me if that eases the transition.
I am not sure that this would be practical since they cannot share the 
same configuration.
I have no objections if somebody wants to work on packaging ntpsec, but 
I do not think that either ntp or ntpsec should be promoted over chrony 
nowadays.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Re: The future of src:ntp

2022-01-18 Thread Paride Legovini
Marco d'Itri wrote on 18/01/2022:
> On Jan 18, Michael Biebl  wrote:
> 
>> If "ntp" the binary package would become a transitional package that
>> installs chrony, that'd be fine with me if that eases the transition.
> I am not sure that this would be practical since they cannot share the 
> same configuration.
> I have no objections if somebody wants to work on packaging ntpsec, but 
> I do not think that either ntp or ntpsec should be promoted over chrony 
> nowadays.

But ntpsec is already packaged and actively maintained, which is why I
propose making ntp a transitional package installing ntpsec.

After all bin:ntp has always been a specific NTP implementation, I think
it's OK if it's replaced by an almost compatible fork, less OK if a
completely different implementation is brought in instead. Dropping ntp
altogether will certainly surprise some users.

Paride



Bug#1003985: ITP: yggdrasil-go -- foo

2022-01-18 Thread John Goerzen
Package: wnpp
Severity: wishlist
Owner: John Goerzen 
X-Debbugs-Cc: debian-devel@lists.debian.org

Package: wnpp
Severity: wishlist
Owner: John Goerzen 

* Package name: yggdrasil-go
  Version : 0.4.2-1
  Upstream Author : Yggdrasil Network
* URL : https://github.com/yggdrasil-network/yggdrasil-go
* License : LGPL
  Programming Lang: Go
  Description : Scalable, distributed, encrypted IPv6 overlay network

 Yggdrasil is a fully end-to-end encrypted
 IPv6 network. It is lightweight, self-arranging, supported on multiple
 platforms and allows pretty much any IPv6-capable application to
 communicate securely with other Yggdrasil nodes. Yggdrasil does not
 require you to have IPv6 Internet connectivity - it also works over IPv4.



Bug#1003988: ITP: golang-github-arceliar-phony -- A ponylang-inspired actor model library for Go

2022-01-18 Thread John Goerzen
Package: wnpp
Severity: wishlist
Owner: John Goerzen 

* Package name: golang-github-arceliar-phony
  Version : 0.0~git20210209.dde1a8d-1
  Upstream Author : Arceliar
* URL : https://github.com/Arceliar/phony
* License : MPL-2.0
  Programming Lang: Go
  Description : A ponylang-inspired actor model library for Go

 Phony is a Pony-inspired proof-of-concept
 implementation of shared-memory actor-model concurrency in the Go
 programming language. Actors automatically manage goroutines and use
 asynchronous causal messaging (with backpressure) for communcation. This
 makes it easy to write programs that are free from deadlocks, goroutine
 leaks, and many of the for loops over select statements that show up in
 boilerplate code. The down side is that the code needs to be written in
 an asynchronous style, which is not idiomatic to Go, so it can take some
 getting used to.



Re: The future of src:ntp

2022-01-18 Thread Richard Laager

[I'm the Debian ntpsec maintainer.]

On 1/18/22 11:21 AM, Paride Legovini wrote:
> I'd prefer making ntp a dummy package depending on ntpsec rather than
> having src:ntpsec takeover bin:ntp.

If I understand correctly, you're suggesting src:ntp builds bin:ntp that 
is a dummy package which depends on ntpsec?


Another option would be to have src:ntpsec build the bin:ntp dummy 
package and remove src:ntp entirely.


Either seems fine to me. I don't have a strong preference. I can 
implement whatever is necessary on the ntpsec side.


And for either option, probably likewise ntp-doc -> ntpsec-doc, ntpdate 
-> ntpsec-ntpdate, and if I broke out ntpdig as suggested in bug 
#1003966, sntp -> ntpsec-ntpdig.


There are some differences. For example, ntp stores its configuration 
file at /etc/ntp.conf while ntpsec uses /etc/ntpsec/ntp.conf. [1] But 
bin:ntpsec's postinst already handles that transition.


On 1/18/22 5:03 PM, Paride Legovini wrote:
> bin:ntp has always been a specific NTP implementation, I think
> it's OK if it's replaced by an almost compatible fork, less OK if a
> completely different implementation is brought in instead.

I'm biased here, but I agree. I think it makes the most sense to 
transition existing ntp installs to ntpsec, not chrony, as ntpsec is a 
drop-in replacement with a shared code history. This is my position even 
if we think that chrony should be the default for new installs. On that 
topic, I think the current default of systemd-timesyncd is fine.


[1] When I was first packaging ntpsec, I was going to have it share as 
many paths, service names, etc. with ntp (as upstream NTPsec does). But 
this lead to issues with certain tooling (e.g. around init scripts) and 
ultimately I decided it was better to use a different namespace. This 
does mean that Debian ntpsec is patched and diverges a bit from upstream 
NTPsec.


--
Richard



OpenPGP_signature
Description: OpenPGP digital signature