Numba 0.61.2 and llvmlite 0.44.0 built with with python 3.13, numpy 2.2, and llvm-19

2025-04-13 Thread Diane Trout
Hello,

With help from upstream we've got versions of llvmlite and numba that
build with dependencies currently in Debian.

Numba built and passed tests for amd64 and arm64. It build but the
build time tests failed for mips64el, ppc64el, and s390x. Numba
couldn't build on armel, armhf,  i386, and riscv64 because the BD are
uninstallable.

Upstream mostly supports amd64 and arm64, with unofficial support for
ppcle64.

https://numba.readthedocs.io/en/stable/user/installing.html

Does this new version work for packages that need numba?

How important are mips64el, ppc64el, and s390x for other people using
packages dependent on numba?

Diane



Re: MBF: Packages which break with nocheck

2025-04-13 Thread Helmut Grohne
Hi Santiago,

On Sun, Apr 13, 2025 at 01:22:21PM +0200, Santiago Vila wrote:
> After building all the archive (trixie/sid) with nocheck, I only found 33 new
> packages which fail to build with nocheck that were not reported before. 
> Admittedly
> a little bit more than I expected, but certainly not "hundreds" as some 
> people feared.

Thanks for performing these builds!

For the rest of this mail, I am going to assume that "with nocheck"
means "when enabling the nocheck build profile" (see Simon's mail for
context). Please correct me if I'm wrong.

> My current plan for now would be to report them as "important" (using some
> usertag) with the following disclaimer:

I argue that the correct severity is serious. The release team agreed to
treat them as rc bugs about two years ago and I have reported more than
33 at rc severity. If we were not treating them as rc, the autoremover
could break trixie in the sense that it would no longer be
self-contained. So we should either have them rc, or change the behavior
of the autoremover to disregard  restrictions.

The other side of this is that erroneous  restrictions (and
that's what it is most of the time) are trivial to "fix". With rare
exceptions, you simply drop them. So while 33 may be a worrisome number
of additional rc bugs, the effort spent on fixing them is rather low in
practice.

That said, Emilio explicitly asked them not to be filed as rc on irc.
That feels like RT is not internally consistent here.  How about filing
them as rc now and tagging them trixie-ignore later if we deem the
effort too big?

When filing them, please ensure that you file them with the source
package ("Source: ..." or "Package: src:...") and add the ftbfs tag such
that other automatic ftbfs reporters don't file duplicates.

Helmut



Re: MBF: Packages which break with nocheck

2025-04-13 Thread Paul Gevers

Hi,

On 13-04-2025 17:12, Helmut Grohne wrote:

That said, Emilio explicitly asked them not to be filed as rc on irc.
That feels like RT is not internally consistent here.  How about filing
them as rc now and tagging them trixie-ignore later if we deem the
effort too big?



What I think he means, and I agree with him if I'm right, we don't want 
a _new_ systematic QA effort like this _at this stage_ of the release to 
add lots of RC bugs for a case where the RC-ness only comes from the way 
we run our autoremoval. I'm monitoring the "self-contained" state of 
trixie [1] for more then a year now and I've been filing (RC) bugs to 
make packages aware of problems (not only for this class of issues). 
Currently trixie is nearly fully self-contained in this respect. So at 
this moment this RC problem (running with nocheck build profile changes 
the content of the package) is in practice not a critical issue for trixie.


What I really want to avoid is that people get afraid to add the 
!nocheck profile. It's valuable to have, let's not scare people so late 
in the release cycle.


Paul

[1] https://qa.debian.org/dose/debcheck/src_testing_main/



OpenPGP_signature.asc
Description: OpenPGP digital signature


Re: Brief progress report on the Gatway to NEW project.

2025-04-13 Thread Sean Whitton
Hello,

Thanks for the links.  The checklist in itself seems like it would fix a
lot of problems.  Here are some comments:

- The item "A verbatim copy of the package’s copyright information is
  often required to be present in /usr/share/doc/PACKAGE/copyright, too;
  see Copyright considerations." doesn't seem clearly actionable.

  It's already basically covered by "All the copyright holders found by
  the copyright-grep CI test are mentionned in debian/copyright.".

- That requirement could be weakened: "All the copyright *notices* [not
  holders] found by the copyright-grep CI test are mentionned in
  debian/copyright except those where copyright *notices* are already
  installed in plain text in the binary package."  (this is the issue
  that "often required to be present" is trying to get at -- let me know
  if you're not clear on what I mean).

- Some items to check for preferred forms for modification would be
  helpful.  For example if there is a .jpg with metadata saying it was
  exported from Photoshop, then we also need the .psd in
  d/missing-sources.

- The grep copyright CI jobs are nice.  Hopefully over time we can tweak
  them to exclude duplicates etc..  It can be done collaboratively so
  that people's efforts can be pooled.

All in all, a great start to this effort.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Re: Bug#1094969: git linked with OpenSSL

2025-04-13 Thread Andreas Metzler
On 2025-04-13 Chris Hofstaedtler  wrote:
> brian m. carlson (one of the git upstream copyright holders) claims 
> in Bug #1094969 that git cannot be distributed when linked with 
> OpenSSL. IIRC the Debian position is to use the system library 
> exception.

> Indeed our /usr/lib/git-core/git-remote-https links against 
> libssl.so.3, probably via libcurl-gnutls.so.4.

> To avoid introducing distro-wide changes at a time where this seems 
> inappropriate, an option is to disable building git with libcurl.

> Below is a simple patch to accomplish this. Barring any new insights 
> or feedback from the involved maintainers, this might be a way out. 

> I believe all relevant people are in CC:, and they can figure this 
> out.  Details can be found in the bug.
[...] 

Hello,

well, we have decided to use the system library exception because we
thought we had the right to so, not because we hoped that no copyright
holder would notice. Undoing this for specific packages where a
copyright holders tells us he disagrees undermines this position. Imho we
need to either with using the exception or somebody(TM) needs to do a
license analysis of our packages and we then need to implement coding
changes to weed out any and all GPL<->openssl linkage.

Personally I doubt we have the manpower nowadays to switch back from
linking against OpenSSL.

cu Andreas



Re: Proposal: drop libcrypt-dev dependency from libc6-dev

2025-04-13 Thread Helmut Grohne
Hello fellow developers,

On Thu, Apr 10, 2025 at 07:37:32AM +0200, Helmut Grohne wrote:
> how about libc6-dev stops depending on libcrypt-dev?

with minor disagreement in details, I have received much positive
feedback and therefore moved forward.

> So far so good. That's 1 + 95 + 11 + 1 = 108 source packages from the 
> perl ecosystem in need of changes. What about others?

All of the perl ones have been filed and gregor already fixed (thanks!)
a significant fraction including all 11 perl-xs-dev  ones. I
guess that on third of these is fixed in git or unstable.

> few packages that indirectly use libcrypt. The following packages ship a 
> pkgconfig file containing -lcrypt and therefore need "Depends: 
> libcrypt-dev".
>  * guile-2.2-dev
>  * guile-3.0-dev
>  * heimdal-multidev
>  * libapr1-dev
>  * libidzebra-2.0-dev
>  * librep-dev
>  * libuser1-dev
>  * ruby3.1-dev
>  * ruby3.3-dev
> In addition, gauche-dev has gauche-config that also emits -lcrypt. Now 
> matching this up with the build failures yields four that will be fixed 
> be one of these being modified.

Bugs with patches are filed for these.
https://udd.debian.org/cgi-bin/bts-usertags.cgi?user=helm...@debian.org&tag=libcrypt-pkgconf
Notably, libuser is missing as I did a QA upload instead.

> So that's modifying another 110 + 9 + 1 + 6 = 126 source packages 
> outside the perl ecosystem. You'll find all of the mentioned categories 
> in the published logs as subdirectories. Please bear in mind that among 
> the packages that FTBFS in unstable, a small fraction would additionally 
> FTBFS without libcrypt and I've missed those. Expect a few more.

...

> build depend on libcrypt-dev (mostly to support bootstrapping). So if 
> you disregard all of those duplicates, what remains is 28 packages 
> missed in the FTBFS-based analysis:

I have not yet filed bugs for packages lacking "Build-Depends:
libcrypt-dev". That's a next step. I consider the perl-xs-dev
dependencies and the runtime dependencies more important as both of them
also affect other use cases (such as cross building).

> I'd appreciate explicit replies from:

Thanks for the quick feedback!

Regarding the timing of the glibc upload, I also am in favor of not
upgrading lots of these bugs to rc severity. Given the usertags, we may
monitor how the situation evolves in forky. I suggest once the remaining
unfixed bug count (across all categories) is 30 or less, we may proceed
and upgrade the remaining ones to rc.

Helmut



Re: Bug#1094969: git linked with OpenSSL

2025-04-13 Thread Chris Hofstaedtler
brian m. carlson (one of the git upstream copyright holders) claims 
in Bug #1094969 that git cannot be distributed when linked with 
OpenSSL. IIRC the Debian position is to use the system library 
exception.

Indeed our /usr/lib/git-core/git-remote-https links against 
libssl.so.3, probably via libcurl-gnutls.so.4.

To avoid introducing distro-wide changes at a time where this seems 
inappropriate, an option is to disable building git with libcurl.

Below is a simple patch to accomplish this. Barring any new insights 
or feedback from the involved maintainers, this might be a way out. 

I believe all relevant people are in CC:, and they can figure this 
out.  Details can be found in the bug.

Chris


diff -Nru git-2.49.0/debian/changelog git-2.49.0/debian/changelog
--- git-2.49.0/debian/changelog 2025-03-15 18:48:53.0 +0100
+++ git-2.49.0/debian/changelog 2025-04-13 22:18:18.0 +0200
@@ -1,3 +1,11 @@
+git (1:2.49.0-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Disable building with libcurl.
+
+ -- Chris Hofstaedtler   Sun, 13 Apr 2025 22:18:18 +0200
+
 git (1:2.49.0-1) unstable; urgency=low
 
   * new upstream release (see RelNotes/2.48.0.adoc, RelNotes/2.49.0.adoc).
diff -Nru git-2.49.0/debian/control git-2.49.0/debian/control
--- git-2.49.0/debian/control   2025-03-15 18:48:14.0 +0100
+++ git-2.49.0/debian/control   2025-04-13 22:18:18.0 +0200
@@ -3,9 +3,10 @@
 Priority: optional
 Maintainer: Jonathan Nieder 
 Uploaders: Anders Kaseorg 
+Build-Conflicts: libcurl4-gnutls-dev, libcurl4-openssl-dev
 Build-Depends: libz-dev, gettext,
  libpcre2-dev | libpcre3-dev,
- libcurl4-gnutls-dev, libexpat1-dev,
+ libexpat1-dev,
  subversion, libsvn-perl, libyaml-perl,
  tcl, python3,
  libhttp-date-perl | libtime-parsedate-perl,
diff -Nru git-2.49.0/debian/rules git-2.49.0/debian/rules
--- git-2.49.0/debian/rules 2025-03-15 18:36:51.0 +0100
+++ git-2.49.0/debian/rules 2025-04-13 22:18:18.0 +0200
@@ -10,6 +10,7 @@
 OPTS =NO_OPENSSL=1 prefix=/usr gitexecdir=/usr/lib/git-core \
   mandir=/usr/share/man htmldir=/usr/share/doc/git/html \
   INSTALLDIRS=vendor \
+  NO_CURL=1 \
   SANE_TOOL_PATH= INSTALL=install TAR=tar \
   NO_CROSS_DIRECTORY_HARDLINKS=1 NO_INSTALL_HARDLINKS=1 \
   NO_PERL_CPAN_FALLBACKS=1 \



Pending autoremoval of debian-reference* packages

2025-04-13 Thread textshell
I belive debian wants to provide its documentation as packages in stable 
releases.

But currently debian-reference is scheduled for auto removal on 2025-04-15
(which this mail bumps a bit into the future).
Maybe "nobody" is aware of this?

Anyone up to taking a look at this?

On Mon, 17 Mar 2025 08:14:02 +0100 Helmut Grohne  wrote:
> Package: 
> debian-reference-de,debian-reference-en,debian-reference-es,debian-reference-fr,debian-reference-id,debian-reference-it,debian-reference-ja,debian-reference-pt,debian-reference-pt-br,debian-reference-zh-cn,debian-reference-zh-tw
> Version: 2.125
> Severity: serious
> User: debian...@lists.debian.org
> Usertags: fileconflict
> Control: affects -1 + debian-reference-common
> 
> The debian-reference packages have a tricky undeclared file conflict
> that may break bookworm to trixie upgrades. In bookworm,
> debian-reference-common contains a symlink
> /usr/share/doc/debian-reference-common/docs pointing to
> ../../debian-reference whereas the debian-references-* packages in
> trixie install the same location as a directory. On the face of it, this
> is an undeclared file conflict. Really though, a bad unpack order can
> cause the unpack of the trixie files to be redirected and then go
> missing as this is a symlink to directory conversion moving between
> packages. The debian-refefence-* packages really need to prevent
> concurrent unpack with bookworm's debian-reference-common. Breaks and
> Replaces is not sufficient here. I think the options basically are using
> Conflicts or upgrading the versioned dependency on
> debian-reference-common to a Pre-Depends (requires consultation with
> d-devel). The latter option is a larger hammer and prevents a weird
> corner case that is not covered by Conflicts.
> 
> Helmut



MBF: Packages which break with nocheck

2025-04-13 Thread Santiago Vila

Hello.

After building all the archive (trixie/sid) with nocheck, I only found 33 new
packages which fail to build with nocheck that were not reported before. 
Admittedly
a little bit more than I expected, but certainly not "hundreds" as some people 
feared.

(The main reason there are not so many is that Helmut Grohne has been reporting 
those
every now and then).

My current plan for now would be to report them as "important" (using some
usertag) with the following disclaimer:


Disclaimer: This was going to be a release goal for trixie, but I'm reporting it
as "important" because it's not clear how many bugs of this type are acceptable
as RC at this point of the release cycle.


but of course I'm open to suggestions regarding the above text, particularly
from Release Managers.


On a personal note, I consider those bugs interesting to fix because I think 
there
should be a safe procedure to build all packages in the archive in a way which 
minimizes
build failures as much as possible.

Currently such procedure would be to build all the packages in the regular way 
and then retry
with nocheck those which fail to build. It would be more simple and 
straightforward if we were
able to build everything with nocheck from the beginning. It would be a sign of 
quality
and a milestone if one day we could get zero build failures doing that.

Thanks.



Re: MBF: Packages which break with nocheck

2025-04-13 Thread Simon McVittie

On Sun, 13 Apr 2025 at 13:22:21 +0200, Santiago Vila wrote:

After building all the archive (trixie/sid) with nocheck, I only found 33 new
packages which fail to build with nocheck that were not reported before. 
Admittedly
a little bit more than I expected, but certainly not "hundreds" as some people 
feared.

(The main reason there are not so many is that Helmut Grohne has been reporting 
those
every now and then).


I think there are two subtly different things that you could mean by 
"with nocheck":


1. DEB_BUILD_OPTIONS=nocheck, but no special build profiles
- therefore  build-dependencies are still installed
2. DEB_BUILD_OPTIONS=nocheck DEB_BUILD_PROFILES=nocheck
- therefore  build-dependencies are likely to be missing

(DEB_BUILD_PROFILES=nocheck without DEB_BUILD_OPTIONS=nocheck is not 
allowed by https://wiki.debian.org/BuildProfileSpec, and for convenience 
some build tools automatically convert it into (2.), with a warning.)


Failing to build in either of those configurations is a bug, and both 
could be argued to be either RC or non-RC depending on opinions and 
priorities, but in practice I think (1.) is going to succeed more often 
than (2.).


For example #1102605 is an example of a package that FTBFS when we do 
(2.) but would have succeeded if we do (1.). This is a fairly common 
failure mode, but I would expect packages that FTBFS in scenario (1.), 
but do build successfully if their tests had been run, to be very rare.



My current plan for now would be to report them as "important" (using some
usertag)


I think that seems reasonable, but in the template email please be clear 
about which scenario it was that you tried. Helmut's wording "fails to 
build from source in unstable when enabling the nocheck build profile" 
seems good - that unambiguously identifies scenario (2.).



On a personal note, I consider those bugs interesting to fix because I think 
there
should be a safe procedure to build all packages in the archive in a way which 
minimizes
build failures as much as possible.


If that's what you want, I think scenario (1.) is the one that will 
maximize your number of successful builds, although possibly at the cost 
of shipping software that compiles but does not work (in ways that 
build-time tests would have detected). Running build-time tests is a 
trade-off: it makes us less likely to ship broken software, at the cost 
of sometimes treating unimportant bugs (either in the software under 
test, or in the tests themselves) as more serious than they necessarily 
need to be.


Helmut has been testing scenario (2.) and reporting bugs when it 
fails, because it's interesting as a way to reduce build-dependencies 
for bootstrappability and cross-compiling, but the price he pays for 
that is that he'll sometimes see build failures like #1102605.


smcv



Re: MBF: Packages which break with nocheck

2025-04-13 Thread Santiago Vila

El 13/4/25 a las 15:22, Simon McVittie escribió:

On a personal note, I consider those bugs interesting to fix because I think 
there
should be a safe procedure to build all packages in the archive in a way which 
minimizes
build failures as much as possible.


If that's what you want, I think scenario (1.) is the one that will maximize 
your number of successful builds, although possibly at the cost of shipping 
software that compiles but does not work (in ways that build-time tests would 
have detected).


Yes, that's what I tested and what I was going to report. I'll make sure that 
the bug text is
not ambiguous, and also will use some usertag like 
ftbfs-deb-build-options-nocheck to
make it even more clear.

Thanks a lot!