Re: Bits from the Release Team: bookworm freeze dates (preliminary)

2022-03-16 Thread Stephan Verbücheln
Did you mean 2023?

Regards
Stephan



Re: Bits from the Release Team: bookworm freeze dates (preliminary)

2022-03-16 Thread Stephan Verbücheln
Sorry, the follow-up mails loaded only after I wrote my response.

Regards
Stephan



Re: Bits from the Release Team: bookworm freeze dates (preliminary)

2022-03-16 Thread Pierre-Elliott Bécue

Leandro Cunha  wrote on 15/03/2022 at 23:18:37+0100:

> Hi,
>
> On Tue, Mar 15, 2022 at 7:05 PM Pierre-Elliott Bécue  wrote:
>>
>>
>> Leandro Cunha  wrote on 15/03/2022 at 
>> 22:57:39+0100:
>>
>> > On Tue, Mar 15, 2022 at 5:16 PM Pierre-Elliott Bécue  
>> > wrote:
>> >
>> >  Paul Gevers  wrote on 14/03/2022 at 21:43:38+0100:
>> >
>> >  > Dear all,
>> >  >
>> >  > We are currently considering the following dates as our freeze
>> >  > dates. If you are aware of major clashes of these dates with anything
>> >  > we depend on please let us know. We also like to stress again that we
>> >  > really would like to have a short Hard and Full Freeze (counting in
>> >  > weeks, rather than months), so please plan accordingly. If serious
>> >  > delays turn up during any of the Freeze steps, we rather (partially or
>> >  > completely) thaw bookworm again than staying frozen for a long time.
>> >  >
>> >  > 2023-01-12  - Milestone 1 - Transition and toolchain freeze
>> >  > 2023-02-12  - Milestone 2 - Soft Freeze
>> >  > 2023-03-12  - Milestone 3 - Hard Freeze - for key packages and
>> >  > packages without autopkgtests
>> >  > To be announced - Milestone 4 - Full Freeze
>> >  >
>> >  > On behalf of the Release Team,
>> >
>> >  Hi,
>> >
>> >  OOC, isn't that a bit "too short"? We started to work again in August
>> >  2021, it'll be less than two years until the freeze.
>> >
>> > Less than 1 year to go to milestone 1 starts in January.
>>
>> I was referring to the delay between the end of the freeze and the next
>> hard freeze.
>
> Ok. Debian has been releasing versions every 2 years for a long time.
> I was looking at the site here to remember the dates.
> It is a cycle that is being continued.
>
> https://www.debian.org/releases/

I always have been under the impression it was around 2.5 years between
releases, but indeed, this impression was false.

Thanks!
-- 
PEB


signature.asc
Description: PGP signature


Bug#1007766: ITP: mppp -- C++11/14/17/20 library for multiprecision arithmetic

2022-03-16 Thread Gürkan Myczko

Package: wnpp
Severity: wishlist
Owner: Gürkan Myczko 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: mppp
  Version : 0.26
  Upstream Authors: 2016-Francesco Biscani 
  URL : https://github.com/bluescarni/mppp
* License : MPL-2.0
  Description : C++11/14/17/20 library for multiprecision arithmetic
 Built on top of the GNU multiprecision stack (GMP, MPFR, MPC), mp++ was
 initially conceived as a GMP wrapper with special focus on performance 
with

 small operands. In particular, a small buffer optimisation and custom
 implementations of basic mathematical primitives are instrumental in 
achieving
 a performance increase, with respect to GMP and other integer 
multiprecision

 libraries, which can be substantial.



How to get rid of unused packages (Was: proposed MBF: packages still using source format 1.0)

2022-03-16 Thread Andreas Tille
Hi,

the MBF announcement inspired me to check some packages that might be
relevant for me (and started fixing these).  I also found some packages
where I was asking myself whether these might be interesting for anyone.
Just to give some example (maintainer in CC - Erik, its not specifically
against your package it was just some example).

The description of imgvtopgm reads:

PalmPilot/III Image Conversion utility
 This program can convert, compress, and decompress up to 4-bit grayscale
 images for displaying on the PalmPilot. It can take any pbm, pnm, pgm file
 generated by the netpbm package and convert it into a suitable image
 for the Pilot.
 .
 Together with netpbm many image formats, including JPEG, PNG, GIF, TIFF
 and BMP, could be converted into PDB format. This can be displayed on
 PalmPilot/III by viewers like "ImageViewer", "TinyViewer" or "Spec".


I'm not sure whether there are any PalmPilot devices out there.  At
least the actual *votes* in popcon[1] is down to zero now.  The package
was not uploaded by its maintainer for >10 years.  It received an NMU by
Adrian Bunk (in CC as well):

[2022-01-02] imgvtopgm 2.0-9.1 MIGRATED to testing (Debian testing watch)
[2021-12-27] Accepted imgvtopgm 2.0-9.1 (source) into unstable (Adrian Bunk)
[2011-02-23] imgvtopgm 2.0-9 MIGRATED to testing (Debian testing watch)
[2011-02-13] Accepted imgvtopgm 2.0-9 (source i386) (signed by: Erik Schanze) 

The changelog of that NMU was:

   * Non-maintainer upload.
   * debian/rules: Add build-{arch,indep}. (Closes: #999003)


>From my naive perspective this package caused some work from a quite
busy maintainer for no obvious user base.  May be I'm wrong in this
specific case but this observation raises my question:  Do we have any
means to get rid of packages that should be rather removed from the
distribution than draining resources.

If the answer is no should we possibly use the list of packages that are
not topic of the heated debate around the source format 1.0 (where
maintainers are obviously are caring about their packages just disagree
with format 3.0 format) to pick some packages that should be rather
removed than fixed?

Kind regards

  Andreas.

[1] https://qa.debian.org/popcon-graph.php?packages=imgvtopgm

-- 
http://fam-tille.de



Re: Bug#1007766: ITP: mppp -- C++11/14/17/20 library for multiprecision arithmetic

2022-03-16 Thread Jerome BENOIT



On 16/03/2022 13:44, Gürkan Myczko wrote:

Package: wnpp
Severity: wishlist
Owner: Gürkan Myczko 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name    : mppp
   Version : 0.26
   Upstream Authors: 2016-Francesco Biscani 
   URL : https://github.com/bluescarni/mppp
* License : MPL-2.0
   Description : C++11/14/17/20 library for multiprecision arithmetic
  Built on top of the GNU multiprecision stack (GMP, MPFR, MPC), mp++ was
  initially conceived as a GMP wrapper with special focus on performance with
  small operands. In particular, a small buffer optimisation and custom
  implementations of basic mathematical primitives are instrumental in achieving
  a performance increase, with respect to GMP and other integer multiprecision
  libraries, which can be substantial.



What is the advantages of mp++ over mpfrc++ which is already packaged ?

Chhers,
Jerome



OpenPGP_signature
Description: OpenPGP digital signature


Re: Bug#1007766: ITP: mppp -- C++11/14/17/20 library for multiprecision arithmetic

2022-03-16 Thread Gürkan Myczko

Hi Jerome,


What is the advantages of mp++ over mpfrc++ which is already packaged ?


Exactly the question I have been waiting for. Actually I can't tell, but 
forwarded the
question that was asking to use mp++... if I know more, I'll update the 
answer.



Chhers,
Jerome


Thanks,



Re: Seeking consensus for some changes in adduser

2022-03-16 Thread Marc Haber
Hi,

this is the summary follow-up to the adduser discussion we had in the
last eight days, and I hope that I was successful in working all of your
suggestions in the new text.

Original Message Text:
> (1)
> #202943, #202944, #398793, #442627, #782001
> The bug reporters are requesting the default for DIR_MODE to be changed
> from 0755 to 0700, making home directories readable for the user only.
> Policy 10.9 states that directories should be 0755, but the policy
> editors probably didn't have user home directories in mind when they
> wrote that. 
> 
> (1a) would it be necessary to handle --system accounts differently? I
>  think yes.
> (1b) should we stay with 0755 for --system accounts?
> (1c) does a change to 0700 for user accounts make sense?
> (1d) should it be 0751 (#398793)?
> (1e) how about ~/public_html that would break with 0750?
> 
> All those bugs referenced have more or less heated exchanges ranging
> from "it's fine" to "we should issue a DSA ASAP", most of them a decade
> old, so the times might have changed since then. Please note that the
> DIR_MODE _IS_ configurable in adduser, we're just discussing the
> default (which also applies for home directories created while still
> inside the Installer before a local admin can properly configure
> adduser).

The answer to question (1a) is yes.
A possible consensus would be to augment the DIR_MODE setting with a
SYSTEM_DIR_MODE setting that would apply to --system accounts, allowing
to handle system accounts and user accounts in a different way.

The answer to question (1b) is "yes, as the default".
The default of SYSTEM_DIR_MODE would be 0755, and we would document that
changing this default setting might affect the function of the system
since most packages expect their account's home directory to have mode
0755. This gives the local administrator maximum freedom while not
requiring changes to packages and keeping their behavior in sync with
policy. If SYSTEM_DIR_MODE is too restrictive, some packages will break,
if it's too permissive, some packages will become insecure. I do intend
to have SYSTEM_DIR_MODE in the manual page, but not in the default
configuration file.

My post-discussion answer to question (1c) is yes, but I am still open
for arguments. If noone convinces me, the default for DIR_MODE will be
changed to 2700 (see (4) below).
Currently, on a freshly installed system, /root is root:root 0700 and
has umask 022, while normal user accounts have their /home/user
user:user 0755 and have umask 022 as well.

While the root group is somewhat special (my brain refuses to consider
this a regular usergroup), I think that having /root restrictive is a
good example of what we actually want. The user having their own
per-user group AND 

I have checked that if /home/user is 0700, the entire subtree under
/home/user is unaccessible and the system doesn't care any more what the
permissions of the directories under /home/user are. This is something I
keep getting wrong so I wanted to be sure.

A setgid bit on a non-group-readable directory might seem strange
though. Are there arguments against doing so aside from the ugly "S" in
ls output?

(1e) has become a uncommon configuration, so we don't need to cater for
that any more by default. Users expert enough to have a public_html
directory can be held responsible to appropriately set up permissions
and/or ACLs.

I have a new question. Currently, adduser has a single Debconf question
regarding system-wide readable home directories. Should we take the
opportunity of removing this question and just assuming that a local
administrator will reset DIR_MODE if they feel like that? The caveat of
this is that the value can no longer be preseeded in the installer, but
that will only affect the _single_ account created during installation.
I feel that this may be worth the reduced complexity. What do you think?


> (2)
> #774046 #520037
> Which special characters should we allow for account names?
> 
> People demand being able to use a dot (which might break scripts using
> chown) and non-ASCII national characters in account names. The regex
> used to verify non-system accounts is configurable, so the policy can be
> locally relaxed at run-time.
> 
> For system-accounts, I'd like to stick to ASCII letters, numbers,
> underscores.

Adduser should be more orthogonal in handling of system and user
accounts. The following paragraphs describe how adduser should behave in
my opinion, and if it doesn't do right now, it will be changed.

There should be different regexp settings to define which account names
are allowed for system and user accounts. Both regexps should be
configurable at run time, and there should be command line options to
override the check. If overridden, the checks are disabled in their
entirety, relying on underlying tools (useradd) to reject really
unacceptable names.

For system accounts, the allowed chars are an optional leading
underscore, lower case letters, numbers, underscores, dashe

Debian DSA-5095-1 : linux - security update

2022-03-16 Thread Sona Das
Hi Team,

We are having High level threat in our Debian systems detected by our 
vulnerability scanners 
Debian DSA-5095-1 : linux - security update

Debian DSA-4994-1 : bind9 - security update

We tried to upgrade our Debian systems using the Debian repo but the affected 
packages didn’t received the package upgrade which takes care of the 
vulnerability. Below packages are affected and are not getting upgraded:
linux-headers-5.10.0-10-amd64_5.10.84-1
libirs-export161_1:9.11.19+dfsg-2.1




Best regards,
Sona Das
--- 
+91 7021926734 / 9768458639


CONFIDENTIALITY. This email and any attachments are confidential to Alef Edge, 
and may also be privileged, except where the email states it can be disclosed. 
If this email is received in error, please do not disclose the contents to 
anyone, notify the sender by return email, and delete this email (and any 
attachments) from your system.


-- 


CONFIDENTIALITY. This email and any attachments are confidential to Alef 
Edge Inc., and may also be privileged, except where the email states it can 
be disclosed. If this email is received in error, please do not disclose 
the contents to anyone, notify the sender by return email, and delete this 
email (and any attachments) from your system.


Re: How to get rid of unused packages (Was: proposed MBF: packages still using source format 1.0)

2022-03-16 Thread Adrian Bunk
On Wed, Mar 16, 2022 at 02:11:09PM +0100, Andreas Tille wrote:
>...
> I'm not sure whether there are any PalmPilot devices out there.  At
> least the actual *votes* in popcon[1] is down to zero now.

This is less convincing than it sounds, since popcon data is based only 
on a tiny and non-representative fraction of our users.

You cannot claim a package is unused solely based on popcon data.

Debian Med also has packages with zero popcon votes, users of software 
for exotic/ancient hardware or uncommon usecases (like Debian Med) are
not generating high popcon numbers.

> The package
> was not uploaded by its maintainer for >10 years.  It received an NMU by
> Adrian Bunk (in CC as well):
> 
> [2022-01-02] imgvtopgm 2.0-9.1 MIGRATED to testing (Debian testing watch)
> [2021-12-27] Accepted imgvtopgm 2.0-9.1 (source) into unstable (Adrian Bunk)
> [2011-02-23] imgvtopgm 2.0-9 MIGRATED to testing (Debian testing watch)
> [2011-02-13] Accepted imgvtopgm 2.0-9 (source i386) (signed by: Erik Schanze) 
> 
> The changelog of that NMU was:
> 
>* Non-maintainer upload.
>* debian/rules: Add build-{arch,indep}. (Closes: #999003)
> 
> 
> >From my naive perspective this package caused some work from a quite
> busy maintainer for no obvious user base.  May be I'm wrong in this
> specific case but this observation raises my question:  Do we have any
> means to get rid of packages that should be rather removed from the
> distribution than draining resources.

You are getting it wrong what was draining the resources.

It was not the package that was draining the resources,
it was the MBF that was draining the resources.

And these MBFs usually fail to make a convincing case that the benefits
are worth all the resources that are drained by the MBF.

> If the answer is no should we possibly use the list of packages that are
> not topic of the heated debate around the source format 1.0 (where
> maintainers are obviously are caring about their packages just disagree
> with format 3.0 format) to pick some packages that should be rather
> removed than fixed?

How do you define "rather removed"?

According to the BTS there was and is no known user-visible problem in 
the package that needed or needs fixing in the package you are using
as example.

I am still a regular user of my 15 year old iPod, and I was pretty 
annoyed when I had to do an emergency adoption (changing nothing but the 
maintainer field) of a package I use for it after seeing that someone 
thought it would be a good idea to do "RM: RoQA; Upstream not active, orphaned".

As DD I can do that if I notice, the average user cannot do anything and 
won't even notice until the next release in 1.5 years.

I do consider it a regression when we no longer ship a package in a 
release that was in the previous Debian release.
It is not a problem for us to continue shipping imgvtopgm.
And that's why I'd like to see a case made why it is better for our 
users when a package is no longer shipped.

It might or might not be possible to make the case for removal of this 
specific package, but "low popcon" or "abandoned upstream" alone are not
convincing points.

> Kind regards
> 
>   Andreas.
>...

cu
Adrian



cmake: get rid of -fno-fat-lto-objects

2022-03-16 Thread Jerome BENOIT

Hello,

One of my package builds with cmake.

All is fine except that the built static library gets the no-code-sections 
error complaint from lintian.
It appears [1,2] that /usr/share/cmake-3.22/Modules/Compiler/GNU.cmake enforces
 -fno-fat-lto-objects unconditionally for GCC + IPO

What is the easiest way to revert the  -fno-fat-lto-objects flags ?

Thanks in advance,
Jerome



[1] https://gitlab.kitware.com/cmake/cmake/-/issues/21696
[2] 
https://stackoverflow.com/questions/70806677/why-does-cmake-set-no-fat-lto-objects-when-i-enable-lto-ipo
--
Jerome BENOIT | calculus+at-rezozer^dot*net
https://qa.debian.org/developer.php?login=calcu...@rezozer.net
AE28 AE15 710D FF1D 87E5  A762 3F92 19A6 7F36 C68B



OpenPGP_signature
Description: OpenPGP digital signature


Re: cmake: get rid of -fno-fat-lto-objects

2022-03-16 Thread Timo Röhling

Hi Jerome,

* Jerome BENOIT  [2022-03-16 22:37]:

Hello,

One of my package builds with cmake.

All is fine except that the built static library gets the no-code-sections 
error complaint from lintian.
It appears [1,2] that /usr/share/cmake-3.22/Modules/Compiler/GNU.cmake enforces
-fno-fat-lto-objects unconditionally for GCC + IPO

What is the easiest way to revert the  -fno-fat-lto-objects flags ?

I recommend you explicitly disable LTO for the static library with:

   set_target_properties(staticlib PROPERTIES
 INTERPROCEDURAL_OPTIMIZATION OFF)

LTO does not really achieve anything for static libraries: They are
merely an archive of object files, so the linker is never invoked on
them. You might think that LTO is useful when the static library is
linked with an executable eventually. Alas, the LTO intermediate
code is very compiler-specific, so it will not work with a different
compiler and most likely not even with a different version of the
same compiler.

Alternatively, you could add a snippet such as

if(CMAKE_CXX_COMPILER_ID MATCHES "GNU|Clang")
target_compile_options(staticlib PRIVATE -ffat-lto-objects)
endif()

This will work because the target-specific compile options happen to
end up after the LTO compile options on the command line right now.
However, dh_strip will remove the intermediate code anyway, for the
reasons outlined above.


Cheers
Timo

--
⢀⣴⠾⠻⢶⣦⠀   ╭╮
⣾⠁⢠⠒⠀⣿⡁   │ Timo Röhling   │
⢿⡄⠘⠷⠚⠋⠀   │ 9B03 EBB9 8300 DF97 C2B1  23BF CC8C 6BDD 1403 F4CA │
⠈⠳⣄   ╰╯


signature.asc
Description: PGP signature


Re: cmake: get rid of -fno-fat-lto-objects

2022-03-16 Thread Jerome BENOIT

Hi Timo, thanks a lot for the hint.
Cheers,
Jerome

On 16/03/2022 23:21, Timo Röhling wrote:

Hi Jerome,

* Jerome BENOIT  [2022-03-16 22:37]:

Hello,

One of my package builds with cmake.

All is fine except that the built static library gets the no-code-sections 
error complaint from lintian.
It appears [1,2] that /usr/share/cmake-3.22/Modules/Compiler/GNU.cmake enforces
-fno-fat-lto-objects unconditionally for GCC + IPO

What is the easiest way to revert the  -fno-fat-lto-objects flags ?

I recommend you explicitly disable LTO for the static library with:

    set_target_properties(staticlib PROPERTIES
  INTERPROCEDURAL_OPTIMIZATION OFF)

LTO does not really achieve anything for static libraries: They are
merely an archive of object files, so the linker is never invoked on
them. You might think that LTO is useful when the static library is
linked with an executable eventually. Alas, the LTO intermediate
code is very compiler-specific, so it will not work with a different
compiler and most likely not even with a different version of the
same compiler.

Alternatively, you could add a snippet such as

     if(CMAKE_CXX_COMPILER_ID MATCHES "GNU|Clang")
     target_compile_options(staticlib PRIVATE -ffat-lto-objects)
     endif()

This will work because the target-specific compile options happen to
end up after the LTO compile options on the command line right now.
However, dh_strip will remove the intermediate code anyway, for the
reasons outlined above.


Cheers
Timo



--
Jerome BENOIT | calculus+at-rezozer^dot*net
https://qa.debian.org/developer.php?login=calcu...@rezozer.net
AE28 AE15 710D FF1D 87E5  A762 3F92 19A6 7F36 C68B



OpenPGP_signature
Description: OpenPGP digital signature


Re: Debian DSA-5095-1 : linux - security update

2022-03-16 Thread Ben Hutchings
On Wed, 2022-03-16 at 23:46 +0530, Sona Das wrote:
> Hi Team,
> 
> We are having High level threat in our Debian systems detected by our 
> vulnerability scanners 
> Debian DSA-5095-1 : linux - security update
> 
> Debian DSA-4994-1 : bind9 - security update
> 
> We tried to upgrade our Debian systems using the Debian repo but the affected 
> packages didn’t received the package upgrade which takes care of the 
> vulnerability. Below packages are affected and are not getting upgraded:
> linux-headers-5.10.0-10-amd64_5.10.84-1

This was replaced by linux-headers-5.10.0-11-amd64.  So long as you
install the metapackage linux-headers-amd64, replacements like this
should be upgraded automatically.

> libirs-export161_1:9.11.19+dfsg-2.1

This is the only version available in Debian.  It is built separately
from bind9 and is only used by the ISC DHCP server.

Ben.

-- 
Ben Hutchings
Make three consecutive correct guesses and you will be considered
an expert.


signature.asc
Description: This is a digitally signed message part


Re: Q: systemd-timer vs cron

2022-03-16 Thread Luca Boccassi
On Tue, 2022-03-15 at 15:32 +0100, Philip Hands wrote:
> Michael Biebl  writes:
> 
> > Am 15.03.22 um 03:31 schrieb Paul Wise:
> > > On Mon, 2022-03-14 at 11:47 +0100, Marco d'Itri wrote:
> > > 
> > > > Yes, this is true. These are the unit and script that I use,
> > > > and I think
> > > > that Debian would benefit from having something like this
> > > > available in
> > > > some common package.
> > > ...
> > > > $(systemctl status "$FAILED_UNIT" --full --lines=100)
> > > 
> > > Unfortunately for my cron jobs I need the entire output of the
> > > command
> > > invocation, don't want any output from prior runs of the command
> > > and
> > > don't want any of the output to end up in the systemd journal.
> > > 
> > > So I need something like StandardOutput=mail or to add some sort
> > > of
> > > wrapper script to each of the relevant systemd timers.
> > 
> > I might be mistaken here, but Luca hinted at
> > $MONITOR_INVOCATION_ID in his email which means one could easily
> > filter 
> > journal output for the last failed invocation using this 
> > $MONITOR_INVOCATION_ID.
> > Luca, is this understanding correct?
> > Afaics this would cover Paul's use case
> 
> Except for the "don't want any of the output to end up in the systemd
> journal" bit.
> 
> Cheers, Phil.

See other reply to pabs w.r.t. LogNamespace=.

-- 
Kind regards,
Luca Boccassi


signature.asc
Description: This is a digitally signed message part


Re: Q: systemd-timer vs cron

2022-03-16 Thread Luca Boccassi
On Wed, 2022-03-16 at 08:01 +0800, Paul Wise wrote:
> On Tue, 2022-03-15 at 13:28 +, Luca Boccassi wrote:
> 
> > Yes indeed, logs can be filtered by invocation id, eg:
> > 
> > journalctl INVOCATION_ID=abcdefg
> 
> That sounds useful.
> 
> > Also to make a unit's log "private" (not stored in the system
> > journal)
> > LogNamespace= can be used, see:
> > 
> > https://www.freedesktop.org/software/systemd/man/systemd.exec.html#LogNamespace=
> 
> That sounds useful too but not for my use-case due to:
> 
>   This option is only available for system services and is not
>   supported for services running in per-user instances of the
>   service manager.
> 
> I guess the reason for this is that it uses mount namespaces to
> override the journald socket, rather than just pointing the process
> at
> a different socket via another mechanism.

That will actually work from v251 too (as long as PrivateUsers=yes and
TemporaryFileSystem=/run are also configured), with one caveat: given
the journald instance is a system unit rather than a user one, a user
unit won't have privileges to start it automagically. But it's very
trivial to start it manually if you are configuring the user unit,
since it's just a template based on the chosen namespace.

Ie, for a unit with LogNamespace=foo, a 'systemctl start
systemd-journald@foo.service' once at boot will do the trick.

I'll see if I can make it work safely and automagically, without the
manual start, before the next release, but no promises.

Journal files will be stored under
/[var|run]/log/journal/.foo/ and be separated from the
system ones.

-- 
Kind regards,
Luca Boccassi


signature.asc
Description: This is a digitally signed message part


Bug#1007806: ITP: libencode-eucjpascii-perl -- Perl module supporting eucJP-ascii character encoding

2022-03-16 Thread Nick Morrott
Package: wnpp
Owner: Nick Morrott 
Severity: wishlist
X-Debbugs-CC: debian-devel@lists.debian.org, debian-p...@lists.debian.org

* Package name: libencode-eucjpascii-perl
  Version : 0.03
  Upstream Author : Hatuka*nezumi - IKEDA Soji 
* URL : https://metacpan.org/release/Encode-EUCJPASCII
* License : Artistic or GPL-1+
  Programming Lang: Perl
  Description : Perl module supporting eucJP-ascii character encoding

Encode::EUCJPASCII provides support for eucJP-ascii character encoding, an
eucJP-open mapping. The following encodings are supported:

 - eucJP-ascii
 - x-iso2022jp-ascii (7-bit counterpart)

Note: x-iso2022jp-ascii is an unofficial encoding name. It has never been
registered by any standards bodies.

The package will be maintained under the umbrella of the Debian Perl Group.

--
Generated with the help of dpt-gen-itp(1) from pkg-perl-tools.