Bug#1061142: ITP: python-crispy-bootstrap4 -- Bootstrap 4 template pack for django-crispy-forms

2024-01-19 Thread Michael Fladischer
Package: wnpp
Severity: wishlist
Owner: Michael Fladischer 
X-Debbugs-Cc: debian-devel@lists.debian.org

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

* Package name: python-crispy-bootstrap4
  Version : 2023.1
  Upstream Contact: David Smith
* URL : https://github.com/django-crispy-forms/crispy-bootstrap4
* License : Expat
  Programming Lang: Python
  Description : Bootstrap 4 template pack for django-crispy-forms

 Bootstrap4 template pack for django-crispy-forms. This template pack was
 included with the core django-crispy-forms package until version 2.0.

I intend to maintain it as part of DPT.

-BEGIN PGP SIGNATURE-

iQFPBAEBCgA5FiEEqVSlRXW87UkkCnJc/9PIi5l90WoFAmWqYmAbHGZsYWRpc2No
ZXJtaWNoYWVsQGZsYWRpLmF0AAoJEP/TyIuZfdFqJG8H/3zBQeDFQDOpA7zyIKvm
ycvac4e+Dfzj4cmodrsJOwUYKxQ2w1Y7P+wkoia+7RjdEDLn/qdbauii2JPyNxww
1p3OnA1MMjx1SHXy0BQos7Zdt0I7xGugpVAuX8Cv/rhDYNW6bF+GCI7glzlxvMGg
AzjfJwr5Xnl7AoGl1G/OzHJdnlVfcpbBEnYtNZcdzP0igfrpTzXbdNP28AIy1iU1
we/pgbGGM6exd/yxAMmvYAwIrXO4KPMMjUyGcDjljb8pcPYeDYPwPZBMP1ZtD3ML
4JOG8pwm6+NgjZVmfybhutVG5/4UWRywGk2zr2lGFlZMwmIsYZzGCyuZLUsGrL7T
DYU=
=EBwq
-END PGP SIGNATURE-



Re: Limited security support for Go/Rust? Re ssh3

2024-01-19 Thread Adam Borowski
On Mon, Jan 15, 2024 at 10:17:17AM +0100, Bastian Blank wrote:
> On Sun, Jan 14, 2024 at 04:24:57PM +0100, Simon Josefsson wrote:
> > Isn't that what the text refers to?  Vendoring and static linking are
> > two examples of the same problem that the security team may encounter.
> 
> We accept vendoring of autoconf/automake/gnulib distro wide.

We _did_ accept that in the past, but these days you get smacked with a RC
bug for not building from source.

> Please show practical problems with it?

* not working on new archs (most of the work of making sure autoconfage gets
  rebuilt was done by arm64 porters when it was a new thing)
* not being able to fix bugs in autoconfage
* failing to adapt to changes in the toolchain

> The vendoring of gnulib, well, is old and maybe you could
> show that it is a problem in the sources that have it, aka they don't
> handle security fixes and at the same time don't change the library.

Gnulib has not been useful for ages, thus packages still shipping vendored
copies are harmless -- functions that gnulib was meant to provide
implementation for were missing on ancient unices like HP-UX or SCO that
are long dead by now.  A glance at recent commits in gnulib shows a lot of
retrocomputing names: Windows, OS/2, MacOS 10.5, AIX, on hardware of that
level of recency.  It's not used for new ports: the most recent reference
to riscv in commit messages is from _2018_.


Thus, I say the problem with vendored libraries is mostly unrelated to
that of static linking, and thus they don't need to share a solution.

> Here the problem is embedded into the language oekosystem itself.  It is
> not a choice of the software author to do static linking.

It's mostly an issue with the deployment scheme at Google: I heard they
recompile all their software and reinstall it on their fleet EVERY WEEK.
This is about the only case where non-special-case (/sbin/ldconfig etc)
static linking works.

Then they shared their internal project with the world (good) without caring
how it affects others (bad).  Unlike them, we can't rebuild the world every
time a bug is fixed (security or not).


Meow!
-- 
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁'Russkiy voyennyi korabl, idi nakhuy'
⢿⡄⠘⠷⠚⠋⠀
⠈⠳⣄



Re: Limited security support for Go/Rust? Re ssh3

2024-01-19 Thread Simon Josefsson
Adam Borowski  writes:

> On Mon, Jan 15, 2024 at 10:17:17AM +0100, Bastian Blank wrote:
>> On Sun, Jan 14, 2024 at 04:24:57PM +0100, Simon Josefsson wrote:
>> > Isn't that what the text refers to?  Vendoring and static linking are
>> > two examples of the same problem that the security team may encounter.
>> 
>> We accept vendoring of autoconf/automake/gnulib distro wide.
>
> We _did_ accept that in the past, but these days you get smacked with a RC
> bug for not building from source.

What do you mean?  Can you show me _any_ package in Debian that
re-bootstrap itself using gnulib during package build?  If by source you
mean the source code in gnulib, not the vendored version shipping with
many packages.

If a security bug is found in gnulib code, one approach to fix it would
be to patch the Debian gnulib package, and then automatically rebuild
all packages that uses that gnulib function.

I believe it is rare for packages in Debian to re-bootstrap itself from
gnulib sources.  Look at coreutils, sed, grep, tar, wget, libidn2, etc,
none of them do that.  Certainly not a RC bug.

The situation now when a security bug in gnulib is found, you will have
to patch all packages using that code manually per-package.

>> The vendoring of gnulib, well, is old and maybe you could
>> show that it is a problem in the sources that have it, aka they don't
>> handle security fixes and at the same time don't change the library.
>
> Gnulib has not been useful for ages, thus packages still shipping vendored
> copies are harmless -- functions that gnulib was meant to provide
> implementation for were missing on ancient unices like HP-UX or SCO that
> are long dead by now.  A glance at recent commits in gnulib shows a lot of
> retrocomputing names: Windows, OS/2, MacOS 10.5, AIX, on hardware of that
> level of recency.  It's not used for new ports: the most recent reference
> to riscv in commit messages is from _2018_.

I think you underestimate how often gnulib is used, and how well it
works on modern platforms, and how much gnulib code is used that's not
in glibc or other system shared libraries.  I assume coreutils, sed,
tar, gzip etc were important bootstrapping packages for riscv, and they
all build fine thanks in large extent due to gnulib being written in a
architecture independent way.

/Simon


signature.asc
Description: PGP signature


Bug#1061153: ITP: sigsum-go -- tools for public and transparent logging of signed checksums

2024-01-19 Thread Simon Josefsson
Package: wnpp
Severity: wishlist
Owner: Simon Josefsson 

* Package name: sigsum-go
  Version : 1.7.1-1
  Upstream Author : The Sigsum Project Authors
* URL : https://git.glasklar.is/sigsum/core/sigsum-go
* License : BSD-2-Clause
  Programming Lang: Go
  Description : tools for public and transparent logging of signed checksums

 The goal of Sigsum is to provide building blocks that can be used to
 enforce public logging of signed checksums.
 .
 This package contains the sigsum-key, sigsum-submit, sigsum-verify,
 and sigsum-monitor command line tools.

I hope to maintain this package as part of Debian Go Packaging Team:

https://salsa.debian.org/go-team/packages/sigsum-go

/Simon


signature.asc
Description: PGP signature


Debtags: understanding the heuristics of "Checks and hints" in the online editor

2024-01-19 Thread André Maroneze

Hi,

I want to use debtags metadata for a research project, but I'll need to 
improve it to get good results (I'll use it for thousands of packages).


I started contributing, by adding and removing some tags using the 
online tag editor, but the "Checks and hints" part seems wrong to me in 
several cases.


For instance,with package alsamixergui: I downloaded the source code, 
and it contains exclusively C++ sources and headers. I don't see a 
single C source nor header.


However, the package has the tag "implemented-in::C". And if I replace 
it with "implemented-in::C++", the "Checks and hints" part of the tag 
editor still claims: "There is a 100% chance that the tag 
implemented-in::C is missing".


So, either I misunderstood its meaning, or there is an issue with the 
heuristics. Could someone please clarify it to me?



--
André Maroneze
Researcher/Engineer CEA/List
Software Safety and Security Laboratory



Please help test the PAM in experimental

2024-01-19 Thread Sam Hartman

There are a number of changes, and I'd just like a bit more confidence
that it works as expected before uploading to unstable in about a week.

Changes include:

* Running pam_umask with usergroups support by default.

* libpam-modules now depends on libsystemd0 because utmp is not
  y2038-clean and upstream has decided to depend on elogind for that.

* New PAM upstream and thus newly rebased patches.

So, it would be helpful especially if you would install libpam-modules
and libpam0g from experimental.


signature.asc
Description: PGP signature


Bug#1061158: ITP: discord-rpc -- library for Discord Rich Presence integration

2024-01-19 Thread David James
Package: wnpp
Severity: wishlist
Owner: David James 
X-Debbugs-Cc: debian-devel@lists.debian.org, davidjamescastor...@proton.me

* Package name: discord-rpc
  Version : 3.4.0
  Upstream Contact: Discord, Inc
* URL : https://github.com/discord/discord-rpc
* License : MIT
  Programming Lang: C, C++, CMake, Python
  Description : library for Discord Rich Presence integration

This is a library for integrating Discord features into games and 
applications. For example, it allows an application to connect to Discord and 
show in-game activity on a user's profile.

It is also a Citra dependency. There are multiple FOSS projects
aside from Citra that also integrate this library and could make use of this 
package if they were ever packaged themselves (e.g. Duckstation, PCSX2 etc.).

I would be maintaining this package myself, but would need a sponsor.



Re: Debtags: understanding the heuristics of "Checks and hints" in the online editor

2024-01-19 Thread Paul Wise
On Fri, 2024-01-19 at 18:24 +0100, André Maroneze wrote:

> I want to use debtags metadata for a research project

The debtags service is planned to be shutdown and the data no longer
published, as there is no-one in Debian who wants to maintain it.

https://lists.debian.org/msgid-search/20231126160111.7nr56b7oje6uw...@enricozini.org

> I started contributing, by adding and removing some tags using the
> online tag editor, but the "Checks and hints" part seems wrong to me
> in several cases.

Sounds like there may be bugs that need fixing, but first there would
need to be a new maintainer who could take over the project. If you
were willing to be the primary code maintainer, perhaps you could find
some Debian member willing to be the service maintainers and review and
deploy all of the changes you could make, at least until you become a
Debian member on the basis of your debtags and other contributions.

-- 
bye,
pabs

https://wiki.debian.org/PaulWise


signature.asc
Description: This is a digitally signed message part


Re: Bug#1036884: 64-bit time_t: updated archive analysis, proposed transition plan with timeline

2024-01-19 Thread Steve Langasek
Hi again,

On Sun, Jan 07, 2024 at 01:09:48PM +0100, Rene Engelhard wrote:
> Am 07.01.24 um 04:38 schrieb Steve Langasek:
> > The ordering here would be:
> > - dpkg will be uploaded to experimental with 64-bit time_t in the default
> >flags

> > - the source packages which need an ABI change
> >("source-packages"+"lfs-and-depends-time_t") and do not already have
> >versions in experimental, will have sourceful NMUs to experimental with
> >the new binary package names in order to clear binary NEW, in 
> > coordination

> > - once these packages have all cleared binary NEW, the new dpkg defaults
> >will be uploaded to unstable

> And in the meanwhile in experimental it will be built with the old time_t on
> other architectures.

> Since the new dpkg won't be picked up.

> Not in the experimental builders unstable+experimental chroots which only
> install experimental packages when Build-Depends: need them.

> (For an undefined time given how much the packages later in the chain wait
> in NEW)

> Especially on armhf which is affected. Or will you do the source NMUs on
> armhf/i386? (For some packages where some features are disabled on 32bit
> this is probably not a good idea)

There is no intention here to do the source NMUs on armhf/i386; they will be
done on amd64.

Yes, autobuilds of these packages in experimental would, in the naive
implementation, still build with the old ABI and the new name.

I am not overly concerned about this, experimental is a staging ground for
developers and not something that folks are intended to install from in
production.  And there would be very few if any reverse-dependencies of
these packages uploaded to experimental to pick up the new name.  The intent
is to work with the ftp team to batch-accept these through binary NEW once
all of the uploads are done, and then promptly proceed with upgrades to
experimental.

Do you have a different suggestion?

Note that even including a versioned build-dependency on dpkg-dev in the
uploads to experimental doesn't really address the possibility of ABI skew
if reverse-dependencies are uploaded during the critical window where dpkg
has not yet been uploaded to unstable, because *those* packages will not
have a versioned build-dependency on dpkg: so will link against the
libraries with the new names but will themselves be using the old ABI.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
Ubuntu Developer   https://www.debian.org/
slanga...@ubuntu.com vor...@debian.org


signature.asc
Description: PGP signature