Archive signature for sid broken?

2024-06-25 Thread Roland Clobus

Hello developers,

is the signature for sid broken?
When I do 'apt-get update', it complains about an invalid key, but that 
key mentions bullseye, not sid.


A similar error shows for 'debootstrap sid sid'

With kind regards,
Roland Clobus
---
Get:4 http://deb.debian.org/debian unstable InRelease [198 kB]
Err:4 http://deb.debian.org/debian unstable InRelease
  The following signatures were invalid: BADSIG 0E98404D386FA1D9 Debian 
Archive Automatic Signing Key (11/bullseye) 

Reading package lists... Done
W: An error occurred during the signature verification. The repository 
is not updated and the previous index files will be used. GPG error: 
http://deb.debian.org/debian unstable InRelease: The following 
signatures were invalid: BADSIG 0E98404D386FA1D9 Debian Archive 
Automatic Signing Key (11/bullseye) 
W: Failed to fetch http://deb.debian.org/debian/dists/unstable/InRelease 
 The following signatures were invalid: BADSIG 0E98404D386FA1D9 Debian 
Archive Automatic Signing Key (11/bullseye) 
W: Some index files failed to download. They have been ignored, or old 
ones used instead.

---


OpenPGP_signature.asc
Description: OpenPGP digital signature


Re: Archive signature for sid broken?

2024-06-25 Thread Roland Clobus

Hello Jérémy,

On 25/06/2024 13:00, Jérémy Lal wrote:
Le mar. 25 juin 2024 à 10:11, Roland Clobus <mailto:rclo...@rclobus.nl>> a écrit :


Hello developers,

is the signature for sid broken?
When I do 'apt-get update', it complains about an invalid key, but that
key mentions bullseye, not sid.

A similar error shows for 'debootstrap sid sid'

If you use a apt-cacher-ng, it's
https://bugs.debian.org/1003865 <https://bugs.debian.org/1003865>


Thanks. I'm indeed using apt-cacher-ng, but I think I tried to run it 
without the proxy as well, but anyway... it works now.


With kind regards,
Roland

--
For the record: I've done many things:
* systemctl restart apt-cacher-ng.service
* rm -fr /var/lib/apt/lists;mkdir -p var/lib/apt/lists/partial
* I've removed from ../debrep/dists/sid the InRelease* and Release* files



Re: How to create a custom Debian ISO

2024-05-18 Thread Roland Clobus

+debian-live

Hello Aditya,

On 11/05/2024 10:21, Aditya Garg wrote:

I wanted to create a custom ISO of Debian, with the following customisations:

1. I want to add a custom kernel that supports my Hardware.
2. I want to add my own Apt repo which hosts various software packages to 
support my hardware.

I am not able to get any good documentation for the same. Please help.


Let me chime in on this thread as well.
I had a quick peek at the scripts you use [1].

It appears to me that you want to create a custom Debian Live ISO (not a 
netinst image). If so, you can take a look at live-build, which is used 
for the Debian live images.
Steps describing how to build a live ISO image are at [2] and a generic 
manual for live-build is at [3].


You can then build an ISO image from their packages, without the need 
for repacking (and automagically all checksums will match)


With kind regards,
Roland Clobus
Co-maintainer of live-build

[1] https://github.com/t2linux/T2-Ubuntu/tree/LTS
[2] https://wiki.debian.org/ReproducibleInstalls/LiveImages
[3] 
https://live-team.pages.debian.net/live-manual/html/live-manual/index.en.html




OpenPGP_signature.asc
Description: OpenPGP digital signature


Re: Embedded buildpath via rpath using cmake

2022-02-04 Thread Roland Clobus

On 04/02/2022 11:58, Simon McVittie wrote:

For packages where the RPATH or RUNPATH is temporarily set during build
(to be able to run unit tests without setting LD_LIBRARY_PATH) but then
removed before installation with `chrpath -d` or equivalent code in CMake,
I don't think this is going to be detectable statically, because the
only traces left in the final binary are:

- the build-ID will be different, because the RPATH/RUNPATH was part of
   the data that gets hashed to create the build-ID
- if the length of the build directory changes, then the block of zero
   bytes that previously contained the RPATH/RUNPATH (before it was
   overwritten) will have a different length


I've written a detection for this build-ID mismatch in diffoscope some 
time ago. [1]


It does not require two builds to detect a mismatched NT_GNU_BUILD_ID, 
so perhaps it make sense to migrate this code to lintian (in addition to 
the already mentioned 'custom-library-search-path'. [2]


With kind regards,
Roland Clobus

[1] 
https://sources.debian.org/src/diffoscope/202/diffoscope/comparators/elf.py/?hl=646#L646

[2] https://lintian.debian.org/tags/custom-library-search-path


OpenPGP_signature
Description: OpenPGP digital signature


'The' timestamp of a snapshot of deb.debian.org

2022-09-18 Thread Roland Clobus

Hello Debian developers,

I'm looking for 'the' timestamp of the Debian Archive, which will allow 
me to virtually travel through time to re-generate a specific state of 
Debian.


I've looked at the following places:
* http://ftp.debian.org/debian/dists/bullseye/InRelease
  File timestamp: 2022-09-10 10:27
  Content: Sat, 10 Sep 2022 10:18:01 UTC
* https://deb.debian.org/debian/dists/bookworm/InRelease
  File timestamp: 2022-09-18 02:14
  Content: Sun, 18 Sep 2022 02:12:23 UTC
* https://deb.debian.org/debian/dists/sid/InRelease
  File timestamp: 2022-09-18 02:14
  Content: Sun, 18 Sep 2022 02:12:23 UTC
* https://deb.debian.org/debian/dists/sid/Release
  File timestamp: 2022-09-18 02:13
  Content: Sun, 18 Sep 2022 02:12:23 UTC
* https://deb.debian.org/debian/project/trace/ftp-master.debian.org
  File timestamp: 2022-09-18 08:22
  Content: Sun Sep 18 02:23:16 UTC 2022
* 
https://snapshot.debian.org/archive/debian/20220918T030507Z/dists/sid/InRelease

  URL timestamp: 2022-09-18T03:05:07Z
  File timestamp: 2016-05-18 23:01:23 symlinked to 2022-09-18 03:05:07
  Content: Sun, 18 Sep 2022 02:12:23 UTC
* 
https://snapshot.debian.org/archive/debian/20220918T030507Z/project/trace/ftp-master.debian.org

  URL timestamp: 2022-09-18T03:05:07Z
  File timestamp: 2022-09-18 03:05:07
  Content: Sun Sep 18 02:23:16 UTC 2022
* Did I miss another file?

All of these timestamps (for sid) are close to each other, but not 
identical. I would guess that the earliest timestamp is the 'real' 
timestamp, but it is accessible (on snapshot.d.o) only with a later 
timestamp.


Is there a mechanism that prevents additional updates from being 
(partly) included while the dak synchronisation takes place?


With kind regards,
Roland Clobus


OpenPGP_signature
Description: OpenPGP digital signature


Re: 'The' timestamp of a snapshot of deb.debian.org

2022-09-21 Thread Roland Clobus

Hello all,

Thank you all for your replies so far.

On 19/09/2022 16:41, Mattia Rizzolo wrote:

On Sun, Sep 18, 2022 at 10:58:37AM +0200, Roland Clobus wrote:

All of these timestamps (for sid) are close to each other, but not
identical. I would guess that the earliest timestamp is the 'real'
timestamp, but it is accessible (on snapshot.d.o) only with a later
timestamp.


Consider that the archive "freezes" when it starts working on an update.
Once it finishes its job it generates the Release files, and puts the
current timestamp *inside* the file.  But then that file gets copied
around, signed, etc and that will change the timestamp.


So if the archive is frozen when it starts to work on an update, that 
moment sounds to me as 'the' timestamp of the archive.
Change Request: Could that timestamp be preserved and used for the 
timestamp inside the (In)Release file, instead of using 'now' (which is 
slightly later) when generating the (In)Release file?



Also, for example, I just spotted a line on IRC saying that this time
around copying the archive from the live one to archive.debian.org also
reset the mtimes...


In the live-build scripts, I reset the mtime of such generated files to 
have them match their content.



So I really wouldn't trust mtimes in any way, only what's inside the
Release file.


Ack.


What's in the trace file is IIRC the time when the archive kicks the
mirrors off, which also happens after the generation of the indexes, and
really has no business in this discussion as it's only a tool mirrors
use to coordinate and see if they are too much out of sync.


The trace file is currently used in the live-build scripts, but I'll 
change that to use (In)Release instead.



As you noticed snapshots indexes by time of the archive run, which is…
honestly I don't particularly consider it a good idea myself but that's
how the design decision went I guess.


The timestamps of snapshot.d.o are the only timestamps that I currently 
know that allow me to re-generate older images.
Change Request: Could the use the timestamp from (In)Release instead of 
'now' as well?


As to the origin of my question:
The snapshot-mirror has been offline for a while, and I've used 
deb.debian.org to generate my test images (for the reproducible 
live-build-based live-ISO images). I've compared the timestamps of the 
InRelease file at deb.d.o with the timestamp in the URL available on 
snapshot.d.o and I've noticed a difference.
That means that all images that I've generated using deb.d.o cannot be 
verified at any later moment than within the same dak-round (which last 
for 6 hours).
Now that the snapshot-mirror is online again, I'll use that timestamp 
again, and thus I'll be able to generate the same image from any 
required timestamp. So effectively 'the' timestamp is found in the URL 
of snapshot.d.o, but I would like to have that one identical to the 
timestamp of InRelease.


With kind regards,
Roland Clobus


PS: Regarding these change requests: I could write some patches, but I'm 
still busy getting the reproducible live-images onto the automated 
testing platform and after confirmation of their proper functioning on 
the official Debian download pages (so it will take some time, before I 
can work on that. If anyone would be faster than I would be: thanks in 
advance)


OpenPGP_signature
Description: OpenPGP digital signature


Starting the weekly live images building again

2022-11-21 Thread Roland Clobus

Hello lists,

It is now at least a year after the weekly live images have not been 
generated and distributed from official Debian hardware [1].


However, in the mean time a lot has happened, and a lot has not (yet) 
happened.


First: what has happened:
* Live-images are generated on a regular schedule by Jenkins [2] (daily 
for Sid, weekly for Bookworm, monthly for Bullseye)
* These images are based on the tool 'live-build', as was the case until 
Jessie

* The live-build tool has seen maintenance and works well
* The images are verified to be reproducible [3]
* Only after the verification passes, the images are pushed onto openQA [4]
* The images are verified to boot on BIOS, non-secure UEFI and 
secure-boot UEFI for both CD-ROM and USB devices (a 3x2 matrix test)
* All regular desktop environments (GNOME, KDE, XFCE, LXQT, LXDE, Mate, 
Cinnamon) (for amd64) are verified to be bootable and to have a working 
Firefox and CUPS PDF-printing
* For some desktop environments the default applications are tested 
whether they start or not
* All boot menu entries are checked, to see whether they are able to 
proceed to the first stable screen

* The d-i installer is run and the installed hard disk image is booted
* Overall: The live images are in good shape

Thankfully, I had lots of help for the bottlenecks that I encountered.

Second: what has not happened (yet):
* The images are not generated and distributed by official Debian 
hardware (by adjusting the existing scripts in the live-setup repo)
* The boot menu in the live-build based images has not been adjusted to 
look more like the live-wrapper based images (e.g. the localisation 
submenu with the lots of languages)

* The Calamares installer is not tested automatically by openQA
* The firmware repository is not included
* The content of the live images is not totally reviewed (but there are 
also some rough edges on the live-wrapper based images)
* The d-i installer cannot be run totally off-line yet (which the 
live-wrapper image is capable of)


I'm currently quite happy with the state of the automated testing, which 
I see as a major precondition before publishing the images.


Third: what needs to happen (soon):
* Given that the release of Bookworm is getting closer and closer, the 
next step will be to start generating the images officially again (since 
the current images are not on servers that are designed for such high 
traffic)
* More maintainers/testers are needed, supporting so many variants needs 
to be done by a team
* The news that Debian will have/does have live images again needs to be 
spread


With kind regards,
Roland Clobus

[1] https://lists.debian.org/debian-cd/2021/10/msg8.html
[2] https://jenkins.debian.net/view/live/
[3] 
https://hamburg-2022.mini.debconf.org/talks/11-reproducible-builds-as-applied-to-non-compiler-output/

[4] https://openqa.debian.net/group_overview/14


OpenPGP_signature
Description: OpenPGP digital signature


Re: [DEVEL] Enable support for Renesas platform (section: live images)

2022-11-21 Thread Roland Clobus

On 19/11/2022 09:56, Paul Wise wrote:

On Fri, 2022-11-18 at 15:20 +0700, Huỳnh Thành Hưng wrote:

I’m from Renesas Electronics Corporation,



My group is developing to support running Debian OS on our devices,
also for getting ARM System Ready IR certificate.

...

Can you help me to enable those configs, also support the official
release version of Debian Live Installer ISO which support Renesas
platform?


Debian does not yet support the ARM architecture at all with our live
images, please contact the Debian Live Team about that. Currently the
live images for the future Debian bookworm release are not being built,
but that may change before the final release.

https://wiki.debian.org/Teams/Live


I posted a summary about the current status of the live images a few 
minutes ago: https://lists.debian.org/debian-devel/2022/11/msg00221.html


Given that Debian Stable (hence its name) is stable and will receive bug 
fixes, but not typically additional features, I would recommend you to 
target Bookworm (the next release).


If you want to create live images, I recommend you to take a look at the 
online manual at 
https://live-team.pages.debian.net/live-manual/html/live-manual/index.en.html
The scripts can be highly customised, e.g. to contain custom kernels 
(see 8.2.10)


With kind regards,
Roland Clobus


OpenPGP_signature
Description: OpenPGP digital signature


Re: Starting the weekly live images for Bookworm building again

2023-01-16 Thread Roland Clobus

Hello lists (sorry for cross-posting to so many lists),

This is a follow-up of my mail from 2022-11-21 [A1].

I've made progress in the last two months, but would like to have some 
merge requests approved, to get more traction and to allow others to 
jump aboard and make the live images for Bookworm possible.


As you can see, this affects many teams:
* live-setup: a MR to generate all live images for Bookworm [A2]
* localechooser: A minor fix [A3]
* live-installer: A better user experience after the installer is 
finished [A4]
* live-build: Various installer improvements, including off-line 
installation [A5]


With kind regards,
Roland Clobus

[A1] https://lists.debian.org/debian-devel/2022/11/msg00221.html
[A2] https://salsa.debian.org/images-team/live-setup/-/merge_requests/2
[A3] 
https://salsa.debian.org/installer-team/localechooser/-/merge_requests/7
[A4] 
https://salsa.debian.org/installer-team/live-installer/-/merge_requests/3

[A5] https://salsa.debian.org/live-team/live-build/-/merge_requests/297


OpenPGP_signature
Description: OpenPGP digital signature


Re: Starting the weekly live images for Bookworm building again

2023-03-20 Thread Roland Clobus

My last cross-post. Follow-up please on debian-live

Hello Steve and lists,

On 19/03/2023 16:13, Steve McIntyre wrote:

So, after some delay from me and some further delays from various
Debian machines committing suicide, I've got bookworm live builds
running again. \o/


Thanks for merging the changes.


I've taken Roland's updated patches and tweaked a little more in the
setup.git and live-setup.git repos, and we now have live builds
integrated. Changes I've added:

  * turned on source tarball generation using LB_SOURCE=true, and
disable the external source build that we did for the older
live-wrapper builds


That's a good way to enable the source tarballs. I haven't looked at 
that part of live-build for a while, so the source tarball might need 
some love.



  * when building on casulana, warn about archive updates rather than
restarting builds
  * don't attempt to build i386 live images any more, they're not useful
  * tweaked logging


And an additional change to use the installer images from the repository 
instead of rebuilding them from git [1].

That change is now causing the missing kernel modules for d-i.

I've rebuilding the installer images from git, after the discussion in 
#1006800 [2], to save the d-i team from doing an upload for every single 
kernel bump, while bookworm was not yet in freeze. (That is a recurring 
issue for every release [3])



So, *builds* work fine but I've not *yet* tested actually
booting/using one of these images in any way. I've just triggered a
full build of "testing" live images now, please help test if you can
once they're in place at [2] in a couple of hours from now.

> [2] https://get.debian.org/images/weekly-live-builds/

In openQA [4] the live images that were generated by Jenkins [5]
have been tested for a while now. Now we can switch and use these new 
images instead of the images from Jenkins. Since both images are 
generated by the same script, I wouldn't expect many issues.



I don't yet know how close we are to having full non-free-firmware
integration with the live images; I expect there might be some more
work needed there yet, but I'd love to be proven wrong. :-)


This weekend I've written the missing parts, non-free-firmware images 
are now generated by default by live-build, and the ISO images are still 
bit-for-bit reproducible.


With kind regards,
Roland Clobus

[1] 3cef309a5cfa4758ba33480b170734133b7104b5
[2] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006800
[3] #986506, https://lists.debian.org/debian-boot/2021/03/msg00166.html
[4] https://openqa.debian.net/group_overview/14
[5] https://jenkins.debian.net/view/live/


OpenPGP_signature
Description: OpenPGP digital signature


Re: Should l10n packages be Recommends or Suggests?

2024-12-05 Thread Roland Clobus

On 05/12/2024 16:43, Theodore Ts'o wrote:

Currently e2fsprogs recommends e2fsprogs-l10n.   In Debian Policy, it states:

This declares a strong, but not absolute, dependency.

The Recommends field should list packages that would be found
together with this one in all but unusual installations.

It seems to me that po translation files are borderline considering it
a "strong dependency".  Is it really "the most unusual installations"?
I wouldn't think so, but I acknowledge my privilege coming from a
native English speaker.

Given recent discussions about depends vs recommends vs suggests
inflation, I'm thinking about down-prioritizing e2fsprogs-l10n from
recommends to suggests.

Thoughts, comments?


How about adding the translations to the main package e2fsprogs, and let 
the package 'localepurge' remove them? For people who care about 
installed size, that package helps to remove undesired translation 
files. (Although all translations will then be downloaded while 
installing e2fsprogs)


With kind regards,
Roland Clobus


OpenPGP_signature.asc
Description: OpenPGP digital signature


Theme for Trixie: Ceratopsian in the installer

2025-01-10 Thread Roland Clobus

Hello Debian-cd,

Now that the theme for Trixie is known:
https://bits.debian.org/2024/12/ceratopsian-will-be-the-default-theme-for-debian-13.html

I've been synchronising the images for live-build.

And some questions arose:
* Does the Ceratopsian theme also require a new plymouth screen?
* I'm missing the '13' or any other version indication in the GRUB 
screen. Could/Should that be added? The alpha1 image uses a text element 
to indicate the version. Live-build could do that too, instead of a 
number in the image.
* The d-i alpha1 image uses the old GRUB image (but modified to remove 
the '12'), will that be updated for alphaX?


You can see a GNOME live image booting at:
isolinux boot: 
https://openqa.debian.net/tests/344974/video?filename=video.ogv

GRUB boot: https://openqa.debian.net/tests/345084/video?filename=video.ogv
The d-i alpha1 image uses a different GRUB image:
https://openqa.debian.net/tests/340567/video?filename=video.ogv

With kind regards,
Roland Clobus


OpenPGP_signature.asc
Description: OpenPGP digital signature


Building live images without non-free-firmware (Was: Re: Reconsidering Debian’s Inclusion of Non-Free Firmware - A Call for Discussion)

2025-03-12 Thread Roland Clobus

Hello Simon,

On 10/03/2025 10:57, Simon Josefsson wrote:

Philip Hands  writes:

Simon Josefsson  writes:


While this may be fine to you it is not fine to me, and it is fine to
disagree on that.


If there were a method of building images that did not touch the
non-free components, I presume that would satisfy you.


That sounds good!

...

Thanks Phil for adding this suggestion to the discussion.

I'm one of the active developers of the tool 'live-build', which is used 
to generate the live images.


I can help you that get started.

There is a single script in the repository that is used to build all 9 
ISO images for amd64 [1]


If you remove the access to 'non-free-firmware' (lines 237-244), you 
will generate ISO files where the non-free firmware has not been 
included at all. I guess that this will fulfil your requirement of 
having a live image that hasn't seen any non-free firmware.


As noted elsewhere in this long thread on debian-devel (I was offline 
during the weekend IRL), the generation of the live images themselves is 
not a lot of effort. The generation is be fully automated and additional 
images require just a few minutes to set it up.
However, it is the quality assurance and the user support part that is 
most of the work. We have nearly reached the level of quality assurance, 
that it would be possible to reverse the order the images are handled.
At this moment the images are 1) generated, 2) published, 3) tested. In 
some (nearish) future, the order would be 1) generated, 2) tested, 3) 
published.
Even though openQA [2] helps in automating some tests, there is a lot of 
test coverage missing (and computing power as well). Before the coverage 
has been extended, I would really be hesitant to generate another set of 
images for download, as they would have no guarantee of correct 
functionality.
But then, as noted in the blog post by Thomas Lange from 2025-02-19 [3], 
Debian currently releases an enormous amount of ISO images for download, 
and that is rather confusing for many users.

To improve the user experience, work is also under way [4].

As noted in the thread before, the largest bottleneck in providing the 
non-free-firmware-less images is manpower.


Volunteers are welcome, but please use the 'debian-live' mailing list 
for that.


With kind regards,
Roland Clobus

[1] 
https://salsa.debian.org/live-team/live-build/-/blob/master/test/rebuild.sh?ref_type=heads

[2] https://openqa.debian.net
[3] https://blog.fai-project.org/posts/cdimages-maze/
[4] https://dev.to/0xfaker/re-styling-debians-download-page-3lmm



OpenPGP_signature.asc
Description: OpenPGP digital signature