Re: Proposed MBF - removal of pcre3 by Bookworm

2023-07-02 Thread Alastair McKinstry



On 01/07/2023 14:44, Michael Stone wrote:

On Thu, Jun 29, 2023 at 08:55:11PM +0100, Matthew Vernon wrote:
Bookworm is now out; I will shortly be increasing the severity of the 
outstanding bugs to RC, with the intention being to remove src:pcre3 
from Debian before the trixie release.


You don't think that marking packages for removal two weeks after the 
bug is filed is a little much?


There's significant work creating and testing patches for this 
transition. Marking removal is too much.



--
Alastair McKinstry,
GPG: 82383CE9165B347C787081A2CBE6BB4E5D9AD3A5
ph: +353 87 6847928 e: alast...@sceal.ie, im: @sceal.ie:mckinstry



Bug#1040143: ITP: fonts-sahel -- Sahel Persian/Arabic truetype font family

2023-07-02 Thread Danial Behzadi
Package: wnpp
Severity: wishlist
Owner: Danial Behzadi 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: fonts-sahel
  Version : 4.3.0
  Upstream Contact: Saber Rastikerdar
* URL : https://rastikerdar.github.io/sahel-font/
* License : OFL-1.1
  Programming Lang: 
  Description : Sahel Persian/Arabic truetype font family

 Sahel is a free and open source font, designed by Saber Rastikerdar
 and many other people for persian and arabic language.



Bug#1040152: ITP: golang-cloudfoundry-clock -- time provider & rich fake for Go

2023-07-02 Thread Félix Sipma
Package: wnpp
Severity: wishlist
Owner: Félix Sipma 

* Package name: golang-cloudfoundry-clock
  Version : 1.1.0-1
  Upstream Author : Cloud Foundry
* URL : https://github.com/cloudfoundry/clock
* License : Apache-2.0
  Programming Lang: Go
  Description : time provider & rich fake for Go
 Provides a Clock interface, useful for injecting time dependencies in
 tests.

Newer restic depends on a newer golang-github-azure-azure-sdk-for-go, 
which depends on this package.

-- 
Félix


signature.asc
Description: PGP signature


Bug#1040156: ITP: golang-github-microsoft-applicationinsights-go -- Microsoft Application Insights SDK for Go

2023-07-02 Thread Félix Sipma
Package: wnpp
Severity: wishlist
Owner: Félix Sipma 

* Package name: golang-github-microsoft-applicationinsights-go
  Version : 0.4.4-1
  Upstream Author : Microsoft
* URL : https://github.com/microsoft/ApplicationInsights-Go
* License : Expat
  Programming Lang: Go
  Description : Microsoft Application Insights SDK for Go

 This project provides a Go SDK for Application Insights. Application
 Insights (http://azure.microsoft.com/en-us/services/application-insights/)
 is a service that allows developers to keep their applications
 available, performant, and successful.  This go package will allow you
 to send telemetry of various kinds (event, metric, trace) to the
 Application Insights service where they can be visualized in the Azure
 Portal.

Newer restic depends on a newer golang-github-azure-azure-sdk-for-go, 
which depends on this package.

-- 
Félix


signature.asc
Description: PGP signature


Bug#1040157: ITP: golang-github-azuread-microsoft-authentication-library-for-go -- Microsoft Authentication Library (MSAL) for Go

2023-07-02 Thread Félix Sipma
Package: wnpp
Severity: wishlist
Owner: Félix Sipma 

* Package name: 
golang-github-azuread-microsoft-authentication-library-for-go
  Version : 0.6.0-1
  Upstream Author : Microsoft
* URL : 
https://github.com/AzureAD/microsoft-authentication-library-for-go
* License : Expat
  Programming Lang: Go
  Description : Microsoft Authentication Library (MSAL) library for Go
 The Microsoft Authentication Library (MSAL) for Go is part of the
 Microsoft identity platform for developers (https://aka.ms/aaddevv2)
 (formerly named Azure AD) v2.0. It allows you to sign in users or apps
 with Microsoft identities (Azure AD
 (https://azure.microsoft.com/services/active-directory/) and Microsoft
 Accounts (https://account.microsoft.com)) and obtain tokens to call
 Microsoft APIs such as Microsoft Graph (https://graph.microsoft.io/) or
 your own APIs registered with the Microsoft identity platform. It is
 built using industry standard OAuth2 and OpenID Connect protocols.

Newer restic depends on a newer golang-github-azure-azure-sdk-for-go, 
which depends on this package.

-- 
Félix


signature.asc
Description: PGP signature


Re: Bug#1040157: Acknowledgement (ITP: golang-github-azuread-microsoft-authentication-library-for-go -- Microsoft Authentication Library (MSAL) for Go)

2023-07-02 Thread Félix Sipma
Woops, I just realized this is already in the new queue. (ITP - 
#1039471) Sorry for the noise.


On 2023-07-02 15:57+, Debian Bug Tracking System wrote:

Thank you for filing a new Bug report with Debian.

You can follow progress on this Bug here: 1040157: 
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1040157.

This is an automatically generated reply to let you know your message
has been received.

Your message is being forwarded to the package maintainers and other
interested parties for their attention; they will reply in due course.

As you requested using X-Debbugs-CC, your message was also forwarded to
debian-devel@lists.debian.org, debian...@lists.debian.org
(after having been given a Bug report number, if it did not have one).

Your message has been sent to the package maintainer(s):
w...@debian.org

If you wish to submit further information on this problem, please
send it to 1040...@bugs.debian.org.

Please do not send mail to ow...@bugs.debian.org unless you wish
to report a problem with the Bug-tracking system.


--
Félix


signature.asc
Description: PGP signature


Re: Proposed MBF - removal of pcre3 by Bookworm

2023-07-02 Thread Peter Pentchev
On Sun, Jul 02, 2023 at 10:14:58AM +0100, Alastair McKinstry wrote:
> 
> On 01/07/2023 14:44, Michael Stone wrote:
> > On Thu, Jun 29, 2023 at 08:55:11PM +0100, Matthew Vernon wrote:
> > > Bookworm is now out; I will shortly be increasing the severity of
> > > the outstanding bugs to RC, with the intention being to remove
> > > src:pcre3 from Debian before the trixie release.
> > 
> > You don't think that marking packages for removal two weeks after the
> > bug is filed is a little much?
> 
> There's significant work creating and testing patches for this transition.
> Marking removal is too much.

On the other hand, the bugs have been open for an year and a half now...

G'luck,
Peter

-- 
Peter Pentchev  r...@ringlet.net r...@debian.org p...@storpool.com
PGP key:http://people.FreeBSD.org/~roam/roam.key.asc
Key fingerprint 2EE7 A7A5 17FC 124C F115  C354 651E EFB0 2527 DF13


signature.asc
Description: PGP signature


Bug#1040176: ITP: cppdap -- C++11 implementation of the Debug Adapter Protocol

2023-07-02 Thread Timo Röhling
Package: wnpp
Severity: wishlist
Owner: Timo Röhling 
X-Debbugs-Cc: debian-devel@lists.debian.org

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

* Package name: cppdap
  Version : 1.58.0a
  Upstream Author : Google LLC
* URL : https://github.com/google/cppdap
* License : Apache-2.0
  Programming Lang: C++
  Description : C++11 implementation of the Debug Adapter Protocol

cppdap is a C++11 library to implement a Debug Adapter Protocol (DAP) client
or server. It provides C++ type-safe structures for the full DAP
specification, and provides a simple way to add custom protocol messages.

cppdap is a new dependency of CMake 3.27+

The package will be maintained by Timo Röhling 
at https://salsa.debian.org/debian/cppdap


-BEGIN PGP SIGNATURE-
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=BlS+
-END PGP SIGNATURE-


Re: Second take at DEP17 - consensus call on /usr-merge matters

2023-07-02 Thread Helmut Grohne
Hi Simon,

On Fri, Jun 30, 2023 at 08:06:15PM +0900, Simon Richter wrote:
> I think "backports" are missing as a user story.

I fully agree. What a serious omission. As a first step, I have updated
DEP17 to indicate which mitigations happen to work when being
backported. For instance, changing Replaces to Conflicts is something
that happens to just work for backports. Diverting dpkg-divert less so.

So in effect, the most likely outcome is that backports become very
fragile, because they essentially have to undo all the moves performed
in unstable. What we can do with relative ease is detect the problems
after they have been introduced.

I note that the quality of backports already leaves wishes. For
instance, kodi-addons-dev takes over /usr/bin/dh_kodiaddon_depends in
bullseye-backports from kodi-addons-dev-common in bullseye without
conflicts nor replaces. Likewise, nfs-ganesha-ceph takes over
/usr/lib/ganesha/libganesha_rados_*.so in bullseye-backports from
nfs-ganesha in bullseye.

Is making backports more fragile a reasonable trade-off for moving
forward?

> Most packages should be harmless, and the Contents file for
> bullseye-backports doesn't have too much in any of the affected directories.

Yeah, the number of affected cases should be relatively low, but when
things go wrong, it's bad. Is that ok if we can automatically detect it
(after it happened)?

> but the list of packages installing files into /lib is longer and includes
> all the kernel backports, so I guess that is another potential source of
> problems.

Without having looked, I'd expect the majority of practically affected
files below /lib to be systemd units and udev rules. These should not be
moved in backports, and as long as debhelper is being used, that might
just work.

> There might be an easy solution here, I have not investigated this very
> deeply because it is a workday and 11 hours out of every day are already
> spoken for.

I don't think there is an easy solution, but maybe it happens to work by
chance 90% (number made up) of the time and we shall be able to detect
the remaining 10%.

> > Stating a goal has been quite difficult, but I think that most of the
> > participants agree that we want to eliminate the file move moratorium
> > without getting problems in return.
> 
> I'd even widen that to "no more special handling needed in any place for the
> transition", with the moratorium being an example of that.

What other kind of special handling do you have in mind? I probably
agree.

> > When we get into mitigations, consensus is hard to come by. My
> > impression is that we have roughly two camps. One is in favour of major
> > changes to dpkg and the other is not.
> 
> It's difficult to summarize the situation in one sentence, because neither
> group is really objecting to dpkg changes, so I'd put the fault line at
> whether the transition should be facilitated through dpkg or not.

It's not clear to me, whether you'd consider M3 (a minor and revertable
mitigation in dpkg) to be covered by this or not.

> >   * Even if dpkg were fixed in trixie, trixie's libc6 would still be
> > unpacked using bookworm's dpkg. At least for this package, we cannot
> > rely on dpkg changes in trixie. Therefore we need workarounds or
> > spread the transition to forky. For other packages, even a
> > Pre-Depends on dpkg is not a guarantee that a changed dpkg will
> > perform the unpack.
> >   * Changes to dpkg will not fix bootstrapping.
> 
> The dpkg changes will fix bootstrapping, but we can't finish the transition
> until forky this way, because we need to be able to bootstrap with a libc6
> package that can be installed from bookworm.

Can you elaborate why? As far as I can see, debootstrap may perform the
initial unpack without help from dpkg. Then we invoke the unpakced dpkg
to configure essential packages. If dpkg plays any role in setting the
aliasing symbolic links, their creation will be late for running dpkg.
Maybe I'm missing something?

> We need to be careful here to not conflate the goal of the transition with
> the method for reaching it. We have consensus on the goal (basically,
> data.tar and filesystem matching is the definition of "done" I use for this
> transition).

I agree that we need to be careful about that conflation, because I
think you are conflating them. I disagree that the goal is having
data.tar and filesystem match up. You earlier argued that we are done
when special handling is no longer necessary and I see that as the goal.
Having all the files moved is one method to get there. We also seem to
have rough consensus that this is the preferre method.

> We do not have consensus on the technical implementation because there are
> people who believe the technical implementation proposed is not actually
> feasible. In my opinion, it is a 95% solution, which is very tempting but we
> need the remaining 5% as well. To a large extent, we are having this
> discussion because the usrmerge package l

Re: Proposed MBF - removal of pcre3 by Bookworm

2023-07-02 Thread Marco d'Itri
On Jul 02, Peter Pentchev  wrote:

> On the other hand, the bugs have been open for an year and a half now...
For something which has worked just fine for many years.

-- 
ciao,
Marco


signature.asc
Description: PGP signature