[gentoo-dev] bash-completion-2.1-r1

2013-09-09 Thread Michał Górny
Hello, all.

I'd like to ask finally: who feels himself responsible for deploying
bashcomp-2.1-r1? Does he have any kind of plan? Does anyone care at
all?

Do I have to say it's pretty far from professional to commit it
half-working, with no clear information how to proceed, neither for
users nor for developers? As far as I can see, there were mostly either
random patches or random bugs, with no clear generic guidelines.

I have enough projects on my back but I guess I'll end up carrying this
mess if nobody bothers to do so.


For future reference, I so far know the following:

1. bash supports two directories for completions: completionsdir
(/usr/.../completions) and compatdir (/etc). gentoo added a third
directory that i will call gentoodir (/usr/.../bash-completion).

2. bash sources all files in compatdir (at start?).

3. eselect used to symlink stuff from $gentoodir to $compatdir to
enable completions. therefore, all enabled stuff polluted
the environment all the time.

4. files in completionsdir are sourced when command matching filename
is typed in. that is 'foo ' -> "$completionsdir/foo" is sourced.

5. in order for completionsdir to work,
/usr/share/bash-completion/bash_completion must be sourced first.
(is this just me? is this something to be done in global bashrc?)


Aside to the above, what needs to be answered:

1. how to properly disable completions the 'new way'?

2. do we want to support adding stuff to $compatdir? what do we do with
completions that don't fit $completionsdir?

3. how do we handle completion 'dependencies'? the 'old way' just
relied on them being sourced from $compatdir early. do we source them
explicitly now? do we put them in $compatdir unconditionally?

4. do we want to maintain eselect for bash completions? do we want it
to handle disabling and 'enabling' completions the 'new way'?

-- 
Best regards,
Michał Górny


signature.asc
Description: PGP signature


Re: [gentoo-dev] bash-completion-2.1-r1

2013-09-09 Thread Samuli Suominen

On 09/09/13 12:24, Michał Górny wrote:

Hello, all.

I'd like to ask finally: who feels himself responsible for deploying
bashcomp-2.1-r1? Does he have any kind of plan? Does anyone care at
all?


2.1-r1 works great here and I don't see any other work left than maybe a 
wiki page for instructing people howto use `complete` like `complete -r` 
to remove unwanted completions that cause grief in the way people want 
to use the command
and you don't need to disable completions to get the filename instead, 
bash-completion supports... (from README, first entry in FAQ)


Q. The bash completion code inhibits some commands from completing on
   files with extensions that are legitimate in my environment. Do I
   have to disable completion for that command in order to complete on
   the files that I need to?

A. No. Use M-/ to (in the words of the man page) attempt file name
   completion on the text to the left of the cursor. This will
   circumvent any file type restrictions put in place by the bash
   completion code.


Do I have to say it's pretty far from professional to commit it
half-working, with no clear information how to proceed, neither for
users nor for developers? As far as I can see, there were mostly either
random patches or random bugs, with no clear generic guidelines.

I have enough projects on my back but I guess I'll end up carrying this
mess if nobody bothers to do so.


For future reference, I so far know the following:

1. bash supports two directories for completions: completionsdir
(/usr/.../completions) and compatdir (/etc). gentoo added a third
directory that i will call gentoodir (/usr/.../bash-completion).

2. bash sources all files in compatdir (at start?).

3. eselect used to symlink stuff from $gentoodir to $compatdir to
enable completions. therefore, all enabled stuff polluted
the environment all the time.

4. files in completionsdir are sourced when command matching filename
is typed in. that is 'foo ' -> "$completionsdir/foo" is sourced.

5. in order for completionsdir to work,
/usr/share/bash-completion/bash_completion must be sourced first.
(is this just me? is this something to be done in global bashrc?)


yes, that's the way to enable bash completion support per user just like 
documented in top of README



Aside to the above, what needs to be answered:

1. how to properly disable completions the 'new way'?


something like
http://blog.onetechnical.com/2012/06/19/disable-bash-autocompletion-on-ubunt/
should be replicated at wiki.gentoo.org



2. do we want to support adding stuff to $compatdir?


why not, does something need this?


what do we do with completions that don't fit $completionsdir?


like? some old format of bash completion files that don't work if not 
sourced directly?
should be treated like other bugs, ie. treat it as a bug, report 
upstream of the file, patch the file

if not possible, put them in the compatdir?

didn't tackle the compatdir issue yet because nothing obvious needed it, 
surely adding extra eclass code is on need-basis... :/



3. how do we handle completion 'dependencies'? the 'old way' just
relied on them being sourced from $compatdir early. do we source them
explicitly now? do we put them in $compatdir unconditionally?



4. do we want to maintain eselect for bash completions? do we want it
to handle disabling and 'enabling' completions the 'new way'?


eselect module seems unnecessary, when you can disable them using 
`complete` and the list of completions you get by `ls` :P
but like I said before, it's still doable if someone wants to add 
another layer, I just don't see any value in that...


so seems like people who claim 2.1-r1 is somehow broken or half-working 
didn't read README, and insist on ready wiki page also for ~arch users?




Re: [gentoo-dev] bash-completion-2.1-r1

2013-09-09 Thread Michał Górny
Dnia 2013-09-09, o godz. 12:50:03
Samuli Suominen  napisał(a):

> On 09/09/13 12:24, Michał Górny wrote:
> > Do I have to say it's pretty far from professional to commit it
> > half-working, with no clear information how to proceed, neither for
> > users nor for developers? As far as I can see, there were mostly either
> > random patches or random bugs, with no clear generic guidelines.
> >
> > I have enough projects on my back but I guess I'll end up carrying this
> > mess if nobody bothers to do so.
> >
> >
> > For future reference, I so far know the following:
> >
> > 1. bash supports two directories for completions: completionsdir
> > (/usr/.../completions) and compatdir (/etc). gentoo added a third
> > directory that i will call gentoodir (/usr/.../bash-completion).
> >
> > 2. bash sources all files in compatdir (at start?).
> >
> > 3. eselect used to symlink stuff from $gentoodir to $compatdir to
> > enable completions. therefore, all enabled stuff polluted
> > the environment all the time.
> >
> > 4. files in completionsdir are sourced when command matching filename
> > is typed in. that is 'foo ' -> "$completionsdir/foo" is sourced.
> >
> > 5. in order for completionsdir to work,
> > /usr/share/bash-completion/bash_completion must be sourced first.
> > (is this just me? is this something to be done in global bashrc?)
> 
> yes, that's the way to enable bash completion support per user just like 
> documented in top of README
> 
> > Aside to the above, what needs to be answered:
> >
> > 1. how to properly disable completions the 'new way'?
> 
> something like
> http://blog.onetechnical.com/2012/06/19/disable-bash-autocompletion-on-ubunt/
> should be replicated at wiki.gentoo.org

Did you actually try that?

Trying plain:

  complete -r git

it removes git completion indeed. But when I type 'git ', it is
loaded back :).

> > 2. do we want to support adding stuff to $compatdir?
> 
> why not, does something need this?

I don't know. Maybe. Like git-prompt, though I'd rather move that out
of topic of bash-completion, maybe instead some kind of bashrc.d.

> > what do we do with completions that don't fit $completionsdir?
> 
> like? some old format of bash completion files that don't work if not 
> sourced directly?
> should be treated like other bugs, ie. treat it as a bug, report 
> upstream of the file, patch the file
> if not possible, put them in the compatdir?
> 
> didn't tackle the compatdir issue yet because nothing obvious needed it, 
> surely adding extra eclass code is on need-basis... :/

Ok then, will report bugs.

-- 
Best regards,
Michał Górny


signature.asc
Description: PGP signature


[gentoo-dev] Re: Improve the security of the default profile

2013-09-09 Thread Martin Vaeth
Ryan Hill  wrote:
>
> You will be expected to fix them, and `append-flags
> -fno-stack-protector` is not an acceptable fix.

I guess there might be some projects with special
assembler code where this is the only possiblity.

For your information, I attach my list of packages
(of about 1400 installed ones) for which I had seen
a reason to exclude them from -fstack-protector
The reasons why they are in the list, I forgot long ago;
might be failure of some version with ARCH=x86 or
ARCH=amd64 or just carefulness like for grub:

app-emulation/wine
dev-libs/klibc
media-gfx/splashutils
sys-apps/texinfo
sys-apps/v86d
sys-boot/grub
sys-devel/llvm

In addition also:

sys-libs/glibc
sys-devel/gcc

(for the latter, I found an old note that
www-plugins/nspluginwrapper failed on amd64
if gcc itself was compiled with -fstack-protector;
I guessed some multilib issue but never examined).




Re: [gentoo-dev] Re: Improve the security of the default profile

2013-09-09 Thread Rich Freeman
On Sun, Sep 8, 2013 at 8:06 PM, Ryan Hill  wrote:
> You will be expected to fix them, and `append-flags
> -fno-stack-protector` is not an acceptable fix.  You can't champion for more
> secure defaults and then just disable them when they get in your way.

Why not?  Surely a system where 99.9% of the packages installed are
hardened is more secure than a system where 0% of the packages
installed are hardened.

> So does anyone have any objections to making -fstack-protector the default?
> Now is the time to speak up.

So, in this world of all-or-nothing we want people who realize that
100% protection might not be possible to raise an objection so that we
end up with 0% protection instead?

Why not just do the sensible thing (IMHO) and make it a default, and
then if it doesn't work for an individual package deal with it on an
individual basis?  We already encourage maintainers to try to get
custom CFLAGS to work when practical, but when not practical we filter
them.  I don't see stack protection as any different.  If there is a
fix, then fix it, and if not, then disable it.  I don't see a lack of
stack-protection as a reason to keep something out of the tree.

Rich



[gentoo-dev] Re: bash-completion-2.1-r1

2013-09-09 Thread Nikos Chantziaras

On 09/09/13 13:05, Michał Górny wrote:

Dnia 2013-09-09, o godz. 12:50:03
Samuli Suominen  napisał(a):


On 09/09/13 12:24, Michał Górny wrote:

1. how to properly disable completions the 'new way'?


something like
http://blog.onetechnical.com/2012/06/19/disable-bash-autocompletion-on-ubunt/
should be replicated at wiki.gentoo.org


Did you actually try that?

Trying plain:

   complete -r git

it removes git completion indeed. But when I type 'git ', it is
loaded back :).


You can disable the "bash-completion" USE flag of dev-vcs/git.  This 
isn't a real solution, of course, since you need to recompile the whole 
package every time you want to disable or enable bash completion.  But 
if you don't intend to actually ever use Git's completion, then this 
should work.





Re: [gentoo-dev] Re: bash-completion-2.1-r1

2013-09-09 Thread Michał Górny
Dnia 2013-09-09, o godz. 18:12:08
Nikos Chantziaras  napisał(a):

> On 09/09/13 13:05, Michał Górny wrote:
> > Dnia 2013-09-09, o godz. 12:50:03
> > Samuli Suominen  napisał(a):
> >
> >> On 09/09/13 12:24, Michał Górny wrote:
> >>> 1. how to properly disable completions the 'new way'?
> >>
> >> something like
> >> http://blog.onetechnical.com/2012/06/19/disable-bash-autocompletion-on-ubunt/
> >> should be replicated at wiki.gentoo.org
> >
> > Did you actually try that?
> >
> > Trying plain:
> >
> >complete -r git
> >
> > it removes git completion indeed. But when I type 'git ', it is
> > loaded back :).
> 
> You can disable the "bash-completion" USE flag of dev-vcs/git.  This 
> isn't a real solution, of course, since you need to recompile the whole 
> package every time you want to disable or enable bash completion.  But 
> if you don't intend to actually ever use Git's completion, then this 
> should work.

And it is a bug since completions are supposed to be installed indep of
USE flags.

But above all, I'm pointing out that we're pointing users towards
a solution that simply does not work.

-- 
Best regards,
Michał Górny


signature.asc
Description: PGP signature


[gentoo-dev] RFC: directory-based wrapping of Python scripts

2013-09-09 Thread Michał Górny
Hello, all.

I've been working on solving the issues we had with Python script
wrapping. I'd like to present the best solution I could think of, along
with a technical demo, and ask for your opinion.


Wrapping Python scripts currently involves renaming them through
appending ${EPYTHON} suffix. This change in filename sometimes results
in unexpected results, especially with packages that use sys.argv[0].
This breaks mis-designed packages such as gentoolkit or pkgcore,
and often results in unexpected help output.

It should be noted that kernel has special behavior wrt shebangs,
and modifies argv[0] when they are involved. Therefore 'simple' setting
of argv[0] for exec*() calls in the wrapper doesn't help here.

In the past, python.eclass used Gentoo-specific patches to Python to
work around those issues, and overriding sys.argv[0] on Python-side.
python-r1 no longer uses those patches, and we will hopefully drop them
after getting rid of python.eclass.


The new way would involve moving them into dedicated directory instead.
That is:

  old way: /usr/bin/foo-pythonX.Y

  new way: /usr/lib/python-bin/pythonX.Y/foo

While this still involves changing argv[0], it has a few advantages
over the current solution:

1. basename(sys.argv[0]) stays unchanged. this fixes gentoolkit,
pkgcore and makes 'foo --help' output 'foo'.

2. PATH is no longer polluted by a dozen of foo-* variants. While some
people may consider this a disadvantage, it makes bash completion
a little less irritating at least. It also avoids having sub-commands
like 'git bz-python2.7' :).

3. variant choice can be implemented purely using PATH adjustments.
That is, in a very optimistic case the wrapper scripts wouldn't need to
be called.


If you'd like to test it, I'm attaching a complete patch that should
work on top of current tree. It modifies the python eclasses and adds
a new slot to python-exec. The same changesets can be found on
python-script-location-r1 branch of my gx86-working-tree repo [1].

It should be noted that while the eclass changes on that branch can be
considered testing-ready, the C wrapper code is a quick, dirty hack
and will be rewritten in the future if we decide to go this way.

Currently known issues with the demo:

1. the few ebuilds that try to play with wrappers directly do not work
because they rely on old paths (dev-python/wxpython),

2. parallel 'doins' is broken in portage [2] which can break a few
more ebuilds (dev-python/docutils),

3. baselayout doesn't provide a way to prepend paths before
the standard set [3], so the wrapper are always used indep of PATH.

[1]:https://bitbucket.org/mgorny/gx86-working-tree/commits/branch/python-script-location-r1
[2]:https://bugs.gentoo.org/show_bug.cgi?id=484332
[3]:https://bugs.gentoo.org/show_bug.cgi?id=484268


Please let me know what you think of this solution. It could be
implemented mostly safely since the 'old' and 'new' wrappers can
co-exist on the system.

-- 
Best regards,
Michał Górny
diff --git a/gx86/dev-python/python-exec/Manifest b/gx86/dev-python/python-exec/Manifest
index 8cf6142..daa6d72 100644
--- a/gx86/dev-python/python-exec/Manifest
+++ b/gx86/dev-python/python-exec/Manifest
@@ -1,29 +1,11 @@
--BEGIN PGP SIGNED MESSAGE-
-Hash: SHA512
-
 DIST python-exec-0.2.tar.bz2 65466 SHA256 df61ec2968930016dd14d5d1c5f12b5e501bc572bfe07f07e294906070e144fc SHA512 5f66eadedc9acfb915f830d8d8d16c2645d5f22f65fa0bfc9eb0ae77061c51484e07b98edcceb0b0cf6143c246cd3fa8f95b03c89b14e1fb1f0a6951a301d806 WHIRLPOOL 33e797f0bd3a259e8850a054c94c6cb68a32836e02a7a142de11bf8c838e6dab230f368d53fb4928dd62869794ec4ee84ba6c4bbdd0c8a60dce9c83759d23cd0
 DIST python-exec-0.3.1.tar.bz2 74441 SHA256 460837775167108419b9497353a6f832fc8a249c341469dd235c70633ac37557 SHA512 764d1aaf3b4f9679be6ab1105b4b4d9222b245502114ee3d451b4507f86679ae05136eeae3337351c80b52ee03b9461a2f89c87e63cc4cbb76a1023fb243f84e WHIRLPOOL 6b34c2f44976a33a67269c766bd13401b6b1b39fad3d5df6bbef2bd06e15e09bd2ac13123718b8fa0bdb67f812c7407192b9c16860ab442d3c35259afeb3da82
 DIST python-exec-0.3.tar.bz2 73698 SHA256 3d593d3d06d2a05b90be014577c7d096e30dbe093176cc69c9c7a8deb00c0d7a SHA512 d52497dc81a72550da1c461d8e26fe9640ea02c2b8a8f2437ef4a714a007717d4eaf3508e22569b6693b38caea41934cfc057a398b9d5f5a3cff35c7ad52629a WHIRLPOOL 5b0aaeb20915b9190f648bf552f72842a329c10f1eafcdde3e118ef442a94d309b26462447f1ff42e561a86fb798e5de3478a7c06298f86ca66f5e4699dc1fde
 EBUILD python-exec-0.2.ebuild 1089 SHA256 ee151de72bc789ea1c4e74418fbdb0150b4ae02ed4f96118116fc8f530f4e82c SHA512 2c7c518fb34c0cfc131917571219ddd6f5c6c1b3efd3e78332eaa08f3a57770954f7090d66655c7c02d5a0edfefe90e4debbd615ed05d151aae0ca9d0cbe4143 WHIRLPOOL 70163f1fc2364db548dd7878ff13311911dc7ada81b1e705bcee7b808d963a8371870cb7f29f5cbc133756e4e0fe3a0b6673fa8428643dffa2c9ca7f9cdcd759
 EBUILD python-exec-0.3.1.ebuild 1088 SHA256 f76f577167aa049d36d99dfb8975938753c5d9b33c221768757359ebe95a0024 SHA512 97c8077874c8be68cdc619a55c707c69b686c2543cb3761023acfeea4968e38ee193b3634e04742fbb08e336208

Re: [gentoo-dev] [PATCH] gnome2-utils.eclass add support for gdk-pixbuf cache update

2013-09-09 Thread Gilles Dartiguelongue
As a follow up to this discussion, I came with the attached patch. It
appears to work ok for regular merges and binpkg merges with
FEATURES="collision-protect".

Per my reading of PMS it does not appear to violate anything so I guess
it is ok.

-- 
Gilles Dartiguelongue 
Gentoo
Index: gdk-pixbuf-2.28.2.ebuild
===
RCS file: /var/cvsroot/gentoo-x86/x11-libs/gdk-pixbuf/gdk-pixbuf-2.28.2.ebuild,v
retrieving revision 1.3
diff -u -B -r1.3 gdk-pixbuf-2.28.2.ebuild
--- gdk-pixbuf-2.28.2.ebuild	3 Sep 2013 21:59:11 -	1.3
+++ gdk-pixbuf-2.28.2.ebuild	9 Sep 2013 22:28:20 -
@@ -67,6 +67,15 @@
 
 pkg_preinst() {
 	gnome2_gdk_pixbuf_savelist
+
+	# Make sure loaders.cache belongs to gdk-pixbuf alone
+	local cache="usr/$(get_libdir)/${PN}-2.0/2.10.0/loaders.cache"
+
+	if [[ -e ${ROOT}${cache} ]]; then
+		cp "${ROOT}"${cache} "${D}"/${cache} || die
+	else
+		touch "${D}"/${cache} || die
+	fi
 }
 
 pkg_postinst() {


Re: [gentoo-dev] [PATCH] gnome2-utils.eclass add support for gdk-pixbuf cache update

2013-09-09 Thread hasufell
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 09/10/2013 02:29 AM, Gilles Dartiguelongue wrote:
> As a follow up to this discussion, I came with the attached patch.
> It appears to work ok for regular merges and binpkg merges with 
> FEATURES="collision-protect".
> 
> Per my reading of PMS it does not appear to violate anything so I
> guess it is ok.
> 

unreadable diff
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSLldDAAoJEFpvPKfnPDWzAlEIAKieKaMfao/xpimPOWShEZZW
AedAHki/r5b4IsZBYeE3m971SBWXMYvL4W7KAGPiLHeUzKXzN6wYLLx5Bru/uWnP
Gh7WYYnCq93Z9VnPXeeUd6Cau7cNSdcMEfjE4BRA06aNu2KSdXV3rC5PTTVM5KX0
VJ9BgjzvCs9YDzv2pmsBthoVAZv4zqrpDXLJJD6yzCyFQN/rHntnzij3aYUEAGVu
99axU7nWUrbBFOQ4C+J0ANSS1gkd+rmFudWnQ9pBpzPpPD4aQUwLTFc6+bf3Beho
jeD8TVAkUqr5OcuF278E0Rg0nqN/rvi8wglbO6855NTYi1SdNRJncujzOmc2gNI=
=DDxq
-END PGP SIGNATURE-



Re: [gentoo-dev] [PATCH] gnome2-utils.eclass add support for gdk-pixbuf cache update

2013-09-09 Thread Alex Xu
On 09/09/13 08:29 PM, Gilles Dartiguelongue wrote:
> 
> Index: gdk-pixbuf-2.28.2.ebuild
> ===
> RCS file: 
> /var/cvsroot/gentoo-x86/x11-libs/gdk-pixbuf/gdk-pixbuf-2.28.2.ebuild,v
> retrieving revision 1.3
> diff -u -B -r1.3 gdk-pixbuf-2.28.2.ebuild
> --- gdk-pixbuf-2.28.2.ebuild   3 Sep 2013 21:59:11 -   
> 1.3
> +++ gdk-pixbuf-2.28.2.ebuild   9 Sep 2013 22:28:20 -
> @@ -67,6 +67,15 @@
>  
>  pkg_preinst() {
> gnome2_gdk_pixbuf_savelist
> +
> +  # Make sure loaders.cache belongs to gdk-pixbuf alone
> +  local 
> cache="usr/$(get_libdir)/${PN}-2.0/2.10.0/loaders.cache"
> +
> +  if [[ -e ${ROOT}${cache} ]]; then
> +  cp "${ROOT}"${cache} "${D}"/${cache} || die
> +  else
> +  touch "${D}"/${cache} || die
> +  fi
>  }
>  
>  pkg_postinst() {

Index: gdk-pixbuf-2.28.2.ebuild
===
RCS file:
/var/cvsroot/gentoo-x86/x11-libs/gdk-pixbuf/gdk-pixbuf-2.28.2.ebuild,v
retrieving revision 1.3
diff -u -B -r1.3 gdk-pixbuf-2.28.2.ebuild
--- gdk-pixbuf-2.28.2.ebuild3 Sep 2013 21:59:11 -   1.3
+++ gdk-pixbuf-2.28.2.ebuild9 Sep 2013 22:28:20 -
@@ -67,6 +67,15 @@

 pkg_preinst() {
gnome2_gdk_pixbuf_savelist
+
+   # Make sure loaders.cache belongs to gdk-pixbuf alone
+   local cache="usr/$(get_libdir)/${PN}-2.0/2.10.0/loaders.cache"
+
+   if [[ -e ${ROOT}${cache} ]]; then
+   cp "${ROOT}"${cache} "${D}"/${cache} || die
+   else
+   touch "${D}"/${cache} || die
+   fi
 }

 pkg_postinst() {



signature.asc
Description: OpenPGP digital signature


[gentoo-dev] Re: bash-completion-2.1-r1

2013-09-09 Thread Duncan
Michał Górny posted on Mon, 09 Sep 2013 17:18:50 +0200 as excerpted:

> Dnia 2013-09-09, o godz. 18:12:08 Nikos Chantziaras 
> napisał(a):
> 
>> On 09/09/13 13:05, Michał Górny wrote:
>> >
>> > Trying plain:
>> >
>> >complete -r git
>> >
>> > it removes git completion indeed. But when I type 'git ', it is
>> > loaded back :).
>> 
>> You can disable the "bash-completion" USE flag of dev-vcs/git.  This
>> isn't a real solution, of course, since you need to recompile the whole
>> package every time you want to disable or enable bash completion.  But
>> if you don't intend to actually ever use Git's completion, then this
>> should work.
> 
> And it is a bug since completions are supposed to be installed indep of
> USE flags.

Indeed.  The general gentoo policy is that "trivial" files such as bash-
completions, systemd unit files, etc, aren't to be install-controlled via 
USE flags, for exactly the reason given -- the cost of rebuilding the 
entire package just to change one's mind is considered too high to pay 
for the "trivial" amount of space taken by such files, particularly so 
when people who /really/ care about it already have the install-mask 
solution available.

However, that totally skirts another problem as well.  If one user on a 
system wants completion and another doesn't, installation-control isn't 
going to cut it.  That's a problem that per-user eselect bash-completion 
USED to address, but doesn't with the new bash-completion.

-- 
Duncan - List replies preferred.   No HTML msgs.
"Every nonfree program has a lord, a master --
and if you use the program, he is your master."  Richard Stallman




[gentoo-dev] Re: Improve the security of the default profile

2013-09-09 Thread Ryan Hill
On Mon, 9 Sep 2013 08:21:35 -0400
Rich Freeman  wrote:

> On Sun, Sep 8, 2013 at 8:06 PM, Ryan Hill  wrote:
> > So does anyone have any objections to making -fstack-protector the default?
> > Now is the time to speak up.
> 
> So, in this world of all-or-nothing we want people who realize that
> 100% protection might not be possible to raise an objection so that we
> end up with 0% protection instead?

No, all I've heard so far is support and wanted to give anyone with an opposing
viewpoint a chance to speak up.  I support it, but if there are any problems we
might run into it's best we know about them beforehand, no?  I wasn't looking
for a reason to veto it.
 
> Why not just do the sensible thing (IMHO) and make it a default, and
> then if it doesn't work for an individual package deal with it on an
> individual basis?  We already encourage maintainers to try to get
> custom CFLAGS to work when practical, but when not practical we filter
> them.  I don't see stack protection as any different.  If there is a
> fix, then fix it, and if not, then disable it.  I don't see a lack of
> stack-protection as a reason to keep something out of the tree.

Rich, that's exactly what I'm saying.

We have to make an effort to fix things properly, like we do with any supported
feature.  That's something I see as one of the key strengths of this group we
have.  Obviously there are cases where a fix isn't possible (glibc and gcc
itself are prime examples) and we need to disable it.  That's fine.  But we
need to discourage people sweeping problems under the rug because they're
inconvenient, especially when those problems may indicate security issues.

I'm just trying to set proper expectations - that this change may break
people's packages, and they may have to do some work to find out why and how to
fix it.  I don't like creating more work for people, so I want to be sure there
is consensus on this first.  So far it sounds like there is.


-- 
Ryan Hillpsn: dirtyepic_sk
   gcc-porting/toolchain/wxwidgets @ gentoo.org

47C3 6D62 4864 0E49 8E9E  7F92 ED38 BD49 957A 8463


signature.asc
Description: PGP signature


Re: [gentoo-dev] Re: Improve the security of the default profile

2013-09-09 Thread Peter Stuge
Ryan Hill wrote:
> I don't like creating more work for people, so I want to be sure
> there is consensus on this first.  So far it sounds like there is.

I think there will come enough objections, but only down the road,
and only from people who don't want to care about quality.

Don't let that stop the improvements from happening.


Thanks

//Peter


pgpVL39G_2RCE.pgp
Description: PGP signature


Re: [gentoo-dev] git-r3: initial draft for review

2013-09-09 Thread Peter Stuge
Markos Chandras wrote:
> the whole eclass is inside the " if [[ ! ${_GIT_R3} ]] " block.

Rather than putting the whole eclass inside a block like that maybe
it's possible to test for that condition and "exit" early?


//Peter



Re: [gentoo-dev] Re: [gentoo-commits] gentoo-x86 commit in net-dialup/sendpage: sendpage-1.1.0-r2.ebuild ChangeLog sendpage-1.1.0-r1.ebuild

2013-09-09 Thread Sergey Popov
04.09.2013 18:01, Ian Stakenvicius пишет:
> On 04/09/13 01:28 AM, Sergey Popov wrote:
>> 02.09.2013 19:29, Ian Delaney (idella4) пишет:
>>> idella4 13/09/02 15:29:57
>>>
>>> Modified: ChangeLog Added:
>>> sendpage-1.1.0-r2.ebuild Removed:
>>> sendpage-1.1.0-r1.ebuild Log: revbump -> EAPI 5, remove old
>>>
>>> (Portage version: 2.2.0/cvs/Linux x86_64, signed Manifest commit
>>> with key 0xB8072B0D)
>>>
>>> Revision  ChangesPath 1.13
>>> net-dialup/sendpage/ChangeLog
>>>
>>> file :
>>> http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-dialup/sendpage/ChangeLog?rev=1.13&view=markup
>>>
>>>
> plain:
> http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-dialup/sendpage/ChangeLog?rev=1.13&content-type=text/plain
>>> diff :
>>> http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-dialup/sendpage/ChangeLog?r1=1.12&r2=1.13
>>>
>>>
>>>
> Index: ChangeLog
>>> ===
>>>
>>>
> RCS file: /var/cvsroot/gentoo-x86/net-dialup/sendpage/ChangeLog,v
>>> retrieving revision 1.12 retrieving revision 1.13 diff -u -r1.12
>>> -r1.13 --- ChangeLog14 Jun 2012 01:50:05 -  1.12 +++
>>> ChangeLog   2 Sep 2013 15:29:57 -   1.13 @@ -1,6 +1,12 @@ #
>>> ChangeLog for net-dialup/sendpage -# Copyright 2000-2012 Gentoo
>>> Foundation; Distributed under the GPL v2 -# $Header:
>>> /var/cvsroot/gentoo-x86/net-dialup/sendpage/ChangeLog,v 1.12
>>> 2012/06/14 01:50:05 zmedico Exp $ +# Copyright 2000-2013 Gentoo
>>> Foundation; Distributed under the GPL v2 +# $Header:
>>> /var/cvsroot/gentoo-x86/net-dialup/sendpage/ChangeLog,v 1.13
>>> 2013/09/02 15:29:57 idella4 Exp $ + +*sendpage-1.1.0-r2 (02 Sep
>>> 2013) + +  02 Sep 2013; Ian Delaney 
>>> +sendpage-1.1.0-r2.ebuild, +  -sendpage-1.1.0-r1.ebuild: +
>>> revbump -> EAPI 5, remove old
>>>
>>> 14 Jun 2012; Zac Medico 
>>> sendpage-1.1.0-r1.ebuild: inherit user for enewgroup and
>>> enewuser
>>>
>>>
>>>
>>> 1.1
>>> net-dialup/sendpage/sendpage-1.1.0-r2.ebuild
>>>
>>> file :
>>> http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-dialup/sendpage/sendpage-1.1.0-r2.ebuild?rev=1.1&view=markup
>>>
>>>
> plain:
> http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-dialup/sendpage/sendpage-1.1.0-r2.ebuild?rev=1.1&content-type=text/plain
>>>
>>> Index: sendpage-1.1.0-r2.ebuild 
>>> ===
>>>
>>>
> # Copyright 1999-2013 Gentoo Foundation
>>> # Distributed under the terms of the GNU General Public License
>>> v2 # $Header:
>>> /var/cvsroot/gentoo-x86/net-dialup/sendpage/sendpage-1.1.0-r2.ebuild,v
>>> 1.1 2013/09/02 15:29:57 idella4 Exp $
>>>
>>> EAPI=5
>>>
>>> inherit perl-module eutils user
>>>
>>> MY_P=${PN}-1.001 DESCRIPTION="Dialup alphapaging software." 
>>> HOMEPAGE="http://www.sendpage.org/"; 
>>> SRC_URI="http://www.sendpage.org/download/${MY_P}.tar.gz"; 
>>> S="${WORKDIR}/${MY_P}"
>>>
>>> LICENSE="GPL-2" SLOT="0" KEYWORDS="~amd64 ~ppc ~x86" # This
>>> package warrants IUSE doc IUSE=""
>>>
>>> DEPEND="!net-misc/hylafax >=dev-perl/Device-SerialPort-0.13 
 =dev-perl/MailTools-1.44 >=virtual/perl-libnet-1.11 
 =dev-perl/Net-SNPP-1.13 dev-perl/DBI"
>>>
>>> mydoc="FEATURES email2page.conf sendpage.cf snpp.conf"
>>>
>>> pkg_setup() { enewgroup sms enewuser sendpage -1 -1
>>> /var/spool/sendpage sms }
>>>
>>> PATCHES=( "${FILESDIR}"/${PV}-makefile.patch )
>>>
>>> src_install() { perl-module_src_install insinto /etc doins
>>> sendpage.cf newinitd "${FILESDIR}"/sendpage.initd sendpage 
>>> diropts -o sendpage -g sms -m0770 keepdir /var/spool/sendpage #
>>> Separate docs/ content from ${mydoc[@]} docompress -x
>>> /usr/share/doc/${PF}/text/ docinto text/ dodoc docs/* }
>>>
>>>
>>>
>>>
> 
>> EAPI=5 has no implicit RDEPEND="${DEPEND}". Does this package
>> really has no run-time dependendies?
> 
> 
> 
> Well, perl-module.eclass adds an RDEPEND of dev-lang/perl , so there's
> that.  If it's just perl scripts, though (and I haven't checked if it
> is or not), then that probably would be the only hard RDEPEND...
> 

Package contents are EXACTLY the perl scripts that needs specified
modules in runtime. Fixed that now.

-- 
Best regards, Sergey Popov
Gentoo developer
Gentoo Desktop Effects project lead
Gentoo Qt project lead
Gentoo Proxy maintainers project lead



signature.asc
Description: OpenPGP digital signature