Re: [gentoo-dev] RFC: Pre-GLEP: Security Project

2017-03-12 Thread Alexis Ballier
On Sat, 11 Mar 2017 21:50:51 +0100
Kristian Fiskerstrand  wrote:

> A draft of a Pre-GLEP for the Security project is available for
> reading at https://wiki.gentoo.org/wiki/User:K_f/GLEP:Security
> 
> The GLEP follows a line of GLEPs for special projects that have
> tree-wide access in order to ensure proper accountability (c.f GLEP 48
> for QA and still non-produced GLEP for ComRel (I've started working on
> this and will be presenting this one later as current ComRel Lead))
> 
> Comments, patches, threats, etc welcome
> 

Most of it seems more appropriate for a project page to me and up to
the sec. team, so I'll comment on the global parts only.

The only global part I see is the "Security package version/revision
bumps and package masks". This one would benefit from a proper
definition of the rules here: If severity is X then inactive is defined
to be Y days. After that, sec. team can fix themselves. It should also
be the same for masking: If severity is X and no fix is known after Y
days/months then sec. team should mask it (but not last rite it, this
should still be maintainer/treecleaners).

I think the delay should be clearly stated in the bug with something
like: Please keep in mind that since this is a remote code execution
vulnerability, security team will take action if nothing happens within
one week. If you have tools filling the severity fields then a proper
definition allows to automate this too.

My point here is to avoid having all the responsibility falling under
the lead but focus more on getting things done and educating fellow
developers: Lower delays for more serious bugs will make people
understand and prioritize better the issues at hand and their
implications.


Also, it'd be nice to have something more formal for sec. cleanup:
"After 30 days a sec. issue has been fixed, sec. team is free to
cleanup old vulnerable versions.". I've seen too much pings by sec.
team members on old bugs for this and they could have spent the same
amount of time simply doing it instead.

Alexis.



Re: [gentoo-dev] RFC: Pre-GLEP: Security Project

2017-03-12 Thread Alexis Ballier
On Sun, 12 Mar 2017 09:14:09 +0100
Alexis Ballier  wrote:

> My point here is to avoid having all the responsibility falling under
> the lead

In other words: If you want to avoid having bugs inactive for too long,
don't introduce a bus factor of 1 through the project lead :)



[gentoo-dev] Retrieve get_libdir path on EAPI 6

2017-03-12 Thread Geaaru
Hi,

in EAPI 6 get_libdir function is not more available but I currently use
it on my eclass for initialize some metadata.
How can I retrieve environment $libdir path ? With LIBDIR_${cpu}
variable? 

On mgorny post I read that get_libdir function is part of EAPI, but I
don't understand how this means. I use portage-2.3.4.

Thanks in advance

G.



Re: [gentoo-dev] Retrieve get_libdir path on EAPI 6

2017-03-12 Thread Michał Górny
W dniu 12.03.2017, nie o godzinie 10∶36 +0100, użytkownik Geaaru
napisał:
> Hi,
> 
> in EAPI 6 get_libdir function is not more available but I currently use
> it on my eclass for initialize some metadata.
> How can I retrieve environment $libdir path ? With LIBDIR_${cpu}
> variable? 
> 
> On mgorny post I read that get_libdir function is part of EAPI, but I
> don't understand how this means. I use portage-2.3.4.
> 

This means that you can use it without inheriting any eclass. It's
provided by portage directly.

-- 
Best regards,
Michał Górny


signature.asc
Description: This is a digitally signed message part


[gentoo-dev] Developers and projects, please stop holding ransom over unmaintained packages!

2017-03-12 Thread Michał Górny
Hi,

TL;DR: if you don't maintain a package, drop it to maintainer-needed, so
others can step up.


Lately I have had to deal with a fair number of packages which haven't
seen any maintainer activity for a few years already. This includes
packages with multiple bug reports which haven't seen any response,
and is especially true of packages maintained by projects,
and especially the kind of projects that loosely couple lots of barely
related packages (i.e. categories) -- www-apps, forensics, benchmarks.

I can think of a few reasons why this happens:

a. creating meaningless projects that attempt to group things which
don't have much in common, and where each project member is interested
in a subset of the packages,

b. developers leaving projects without ensuring that there's anyone left
and either cleaning them up or announcing the need for new members,

c. developers abandoning their packages and dumping them on generic
projects (e.g. dumping random Python programs on python@g.o).


This causes two major issues:

1. Newly reported bugs are assigned directly to the maintainer.
If the maintainer ignores them, then the users end up waiting forever
for a reply. In this case, it is indeed better if the user clearly sees
that the package has no maintainer and if people subscribing to
maintainer-needed@ mail see the new bugs.

2. Other developers hesitate to fix the package, and file bugs instead.
If the maintainer doesn't reply to those bugs, that's just a wasted
developer effort + unnecessary delay in getting things fixed. If they
get fixed at all since the developer may forget that he filed a bug.


So, developers:

A. Please make sure you are only listed as a maintainer for the packages
that you really want to maintain. If you are no longer interested
in a package, send the usual 'up for grabs' mail to let others take care
of it [and lastrite or dump it to maintainer-needed if they don't want
to].

B. If your project is unable to maintain all the packages it has, then
either:

B1. announce the need for more project members,

B2. 'up for grabs' some of the packages to let them get a dedicated
maintainer,

B3. disband the project altogether and take over direct maintenance of
the packages you care about.

C. If you no longer wish to maintain a package, then don't dump it on
a generic project without asking first. Just because some project didn't
mind being backup/advisory maintainer for your package doesn't mean that
it wants to maintain it by itself.


Any comments?

-- 
Best regards,
Michał Górny


signature.asc
Description: This is a digitally signed message part


Re: [gentoo-dev] Retrieve get_libdir path on EAPI 6

2017-03-12 Thread Geaaru
Thanks for replay. But if I try to use it inside my eclass inside my
overlay isn't resolved correctly. I receive an empty string. Could be
related that in my eclass function is not already available? Or related to
a wrong version of some packages?

On Mar 12, 2017 10:55 AM, "Michał Górny"  wrote:

> W dniu 12.03.2017, nie o godzinie 10∶36 +0100, użytkownik Geaaru
> napisał:
> > Hi,
> >
> > in EAPI 6 get_libdir function is not more available but I currently use
> > it on my eclass for initialize some metadata.
> > How can I retrieve environment $libdir path ? With LIBDIR_${cpu}
> > variable?
> >
> > On mgorny post I read that get_libdir function is part of EAPI, but I
> > don't understand how this means. I use portage-2.3.4.
> >
>
> This means that you can use it without inheriting any eclass. It's
> provided by portage directly.
>
> --
> Best regards,
> Michał Górny
>


Re: [gentoo-dev] Retrieve get_libdir path on EAPI 6

2017-03-12 Thread Michał Górny
W dniu 12.03.2017, nie o godzinie 11∶02 +0100, użytkownik Geaaru
napisał:
> Thanks for replay. But if I try to use it inside my eclass inside my
> overlay isn't resolved correctly. I receive an empty string. Could be
> related that in my eclass function is not already available? Or related to
> a wrong version of some packages?

If you are attempting to use it in global scope (i.e. outside phase
functions), then it won't work. Such a use is forbidden since it would
mean that global variables differ depending on profile being used.

-- 
Best regards,
Michał Górny


signature.asc
Description: This is a digitally signed message part


[gentoo-dev] [PATCH v3] estack.eclass: Split estack* logic from eutils

2017-03-12 Thread Michał Górny
Split the estack_* and related functions from eutils into a dedicated
estack.eclass. Those functions have significant complexity and are not
used frequently, therefore they benefit from having a separate file
and an explicit dedicated maintainer.

The new eclass is implicitly inherited by eutils to preserve
compatibility. However, the inherit will be removed in EAPI 7,
and the ebuilds should switch to using estack directly.

Thanks to Ulrich Müller for doing the research on this.

// v3: also rename&update tests
---
 eclass/estack.eclass   | 217 +
 eclass/eutils.eclass   | 210 +---
 .../tests/{eutils_eshopts.sh => estack_eshopts.sh} |   4 +-
 .../tests/{eutils_estack.sh => estack_estack.sh}   |   4 +-
 eclass/tests/{eutils_evar.sh => estack_evar.sh}|   4 +-
 5 files changed, 230 insertions(+), 209 deletions(-)
 create mode 100644 eclass/estack.eclass
 rename eclass/tests/{eutils_eshopts.sh => estack_eshopts.sh} (93%)
 rename eclass/tests/{eutils_estack.sh => estack_estack.sh} (93%)
 rename eclass/tests/{eutils_evar.sh => estack_evar.sh} (96%)

diff --git a/eclass/estack.eclass b/eclass/estack.eclass
new file mode 100644
index ..19c388f3d8d2
--- /dev/null
+++ b/eclass/estack.eclass
@@ -0,0 +1,217 @@
+# Copyright 1999-2017 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+
+# @ECLASS: estack.eclass
+# @MAINTAINER:
+# base-sys...@gentoo.org
+# @BLURB: stack-like value storage support
+# @DESCRIPTION:
+# Support for storing values on stack-like variables.
+
+if [[ -z ${_ESTACK_ECLASS} ]]; then
+
+# @FUNCTION: estack_push
+# @USAGE:  [items to push]
+# @DESCRIPTION:
+# Push any number of items onto the specified stack.  Pick a name that
+# is a valid variable (i.e. stick to alphanumerics), and push as many
+# items as you like onto the stack at once.
+#
+# The following code snippet will echo 5, then 4, then 3, then ...
+# @CODE
+#  estack_push mystack 1 2 3 4 5
+#  while estack_pop mystack i ; do
+#  echo "${i}"
+#  done
+# @CODE
+estack_push() {
+   [[ $# -eq 0 ]] && die "estack_push: incorrect # of arguments"
+   local stack_name="_ESTACK_$1_" ; shift
+   eval ${stack_name}+=\( \"\$@\" \)
+}
+
+# @FUNCTION: estack_pop
+# @USAGE:  [variable]
+# @DESCRIPTION:
+# Pop a single item off the specified stack.  If a variable is specified,
+# the popped item is stored there.  If no more items are available, return
+# 1, else return 0.  See estack_push for more info.
+estack_pop() {
+   [[ $# -eq 0 || $# -gt 2 ]] && die "estack_pop: incorrect # of arguments"
+
+   # We use the fugly _estack_xxx var names to avoid collision with
+   # passing back the return value.  If we used "local i" and the
+   # caller ran `estack_pop ... i`, we'd end up setting the local
+   # copy of "i" rather than the caller's copy.  The _estack_xxx
+   # garbage is preferable to using $1/$2 everywhere as that is a
+   # bit harder to read.
+   local _estack_name="_ESTACK_$1_" ; shift
+   local _estack_retvar=$1 ; shift
+   eval local _estack_i=\${#${_estack_name}\[@\]}
+   # Don't warn -- let the caller interpret this as a failure
+   # or as normal behavior (akin to `shift`)
+   [[ $(( --_estack_i )) -eq -1 ]] && return 1
+
+   if [[ -n ${_estack_retvar} ]] ; then
+   eval ${_estack_retvar}=\"\${${_estack_name}\[${_estack_i}\]}\"
+   fi
+   eval unset \"${_estack_name}\[${_estack_i}\]\"
+}
+
+# @FUNCTION: evar_push
+# @USAGE:  [more vars to save]
+# @DESCRIPTION:
+# This let's you temporarily modify a variable and then restore it (including
+# set vs unset semantics).  Arrays are not supported at this time.
+#
+# This is meant for variables where using `local` does not work (such as
+# exported variables, or only temporarily changing things in a func).
+#
+# For example:
+# @CODE
+#  evar_push LC_ALL
+#  export LC_ALL=C
+#  ... do some stuff that needs LC_ALL=C set ...
+#  evar_pop
+#
+#  # You can also save/restore more than one var at a time
+#  evar_push BUTTERFLY IN THE SKY
+#  ... do stuff with the vars ...
+#  evar_pop # This restores just one var, SKY
+#  ... do more stuff ...
+#  evar_pop 3   # This pops the remaining 3 vars
+# @CODE
+evar_push() {
+   local var val
+   for var ; do
+   [[ ${!var+set} == "set" ]] \
+   && val=${!var} \
+   || val="unset_76fc3c462065bb4ca959f939e6793f94"
+   estack_push evar "${var}" "${val}"
+   done
+}
+
+# @FUNCTION: evar_push_set
+# @USAGE:  [new value to store]
+# @DESCRIPTION:
+# This is a handy shortcut to save and temporarily set a variable.  If a value
+# is not specified, the var will be unset.
+evar_push_set() 

Re: [gentoo-dev] Retrieve get_libdir path on EAPI 6

2017-03-12 Thread Andrew Savchenko
On Sun, 12 Mar 2017 10:36:33 +0100 Geaaru wrote:
> Hi,
> 
> in EAPI 6 get_libdir function is not more available

???
It _is_ available.

In EAPI 6 get_libdir was removed from multilib.eclass and put to
EAPI 6:
https://projects.gentoo.org/pms/6/pms.html#x1-143034r25

P.S. Questions about ebuild writing should go to gentoo-devhelp ML.

Best regards,
Andrew Savchenko


pgpFzLREG0wRj.pgp
Description: PGP signature


[gentoo-dev] [PATCH] ltprune.eclass: Split prune_libtool_files out of eutils

2017-03-12 Thread Michał Górny
Move the prune_libtool_files into a dedicated ltprune.eclass.
The function is quite complex and depends on toolchain-funcs. It has
a separate maintainer, is not useful to non-autotools ebuilds, and even
there it is frequently replaced by the simpler 'find ... -delete' call.

Kill the unnecessary Prefix logic. There is no functional difference
between starting the find in ${D} and ${ED}, and the latter implies
unnecessary hackery for old EAPIs.

The new eclass is implicitly inherited by eutils in EAPI 6 and older
in order to preserve compatibility with existing ebuilds. However, all
ebuilds should switch to inheriting it directly.

The split has been suggested by Ulrich Müller.
---
 eclass/eutils.eclass  | 150 +
 eclass/ltprune.eclass | 166 ++
 2 files changed, 167 insertions(+), 149 deletions(-)
 create mode 100644 eclass/ltprune.eclass

diff --git a/eclass/eutils.eclass b/eclass/eutils.eclass
index e036001dc5e1..c932d685c0e9 100644
--- a/eclass/eutils.eclass
+++ b/eclass/eutils.eclass
@@ -17,12 +17,10 @@
 if [[ -z ${_EUTILS_ECLASS} ]]; then
 _EUTILS_ECLASS=1
 
-inherit toolchain-funcs
-
 # implicitly inherited (now split) eclasses
 case ${EAPI:-0} in
 0|1|2|3|4|5|6)
-   inherit epatch estack multilib
+   inherit epatch estack ltprune multilib toolchain-funcs
;;
 esac
 
@@ -869,152 +867,6 @@ use_if_iuse() {
use $1
 }
 
-# @FUNCTION: prune_libtool_files
-# @USAGE: [--all|--modules]
-# @DESCRIPTION:
-# Locate unnecessary libtool files (.la) and libtool static archives
-# (.a) and remove them from installation image.
-#
-# By default, .la files are removed whenever the static linkage can
-# either be performed using pkg-config or doesn't introduce additional
-# flags.
-#
-# If '--modules' argument is passed, .la files for modules (plugins) are
-# removed as well. This is usually useful when the package installs
-# plugins and the plugin loader does not use .la files.
-#
-# If '--all' argument is passed, all .la files are removed without
-# performing any heuristic on them. You shouldn't ever use that,
-# and instead report a bug in the algorithm instead.
-#
-# The .a files are only removed whenever corresponding .la files state
-# that they should not be linked to, i.e. whenever these files
-# correspond to plugins.
-#
-# Note: if your package installs both static libraries and .pc files
-# which use variable substitution for -l flags, you need to add
-# pkg-config to your DEPEND.
-prune_libtool_files() {
-   debug-print-function ${FUNCNAME} "$@"
-
-   local removing_all removing_modules opt
-   _eutils_eprefix_init
-   for opt; do
-   case "${opt}" in
-   --all)
-   removing_all=1
-   removing_modules=1
-   ;;
-   --modules)
-   removing_modules=1
-   ;;
-   *)
-   die "Invalid argument to ${FUNCNAME}(): ${opt}"
-   esac
-   done
-
-   local f
-   local queue=()
-   while IFS= read -r -d '' f; do # for all .la files
-   local archivefile=${f/%.la/.a}
-
-   # The following check is done by libtool itself.
-   # It helps us avoid removing random files which match '*.la',
-   # see bug #468380.
-   if ! sed -n -e '/^# Generated by .*libtool/q0;4q1' "${f}"; then
-   continue
-   fi
-
-   [[ ${f} != ${archivefile} ]] || die 'regex sanity check failed'
-   local reason= pkgconfig_scanned=
-   local snotlink=$(sed -n -e 's:^shouldnotlink=::p' "${f}")
-
-   if [[ ${snotlink} == yes ]]; then
-
-   # Remove static libs we're not supposed to link against.
-   if [[ -f ${archivefile} ]]; then
-   einfo "Removing unnecessary 
${archivefile#${D%/}} (static plugin)"
-   queue+=( "${archivefile}" )
-   fi
-
-   # The .la file may be used by a module loader, so avoid 
removing it
-   # unless explicitly requested.
-   if [[ ${removing_modules} ]]; then
-   reason='module'
-   fi
-
-   else
-
-   # Remove .la files when:
-   # - user explicitly wants us to remove all .la files,
-   # - respective static archive doesn't exist,
-   # - they are covered by a .pc file already,
-   # - they don't provide any new information (no libs & 
no flags).
-
-   if [[ ${removing_all} ]]; then
-   reason='requested'
-  

[gentoo-dev] [PATCH v2] ltprune.eclass

2017-03-12 Thread Michał Górny
Changes in v2:
- now in split commits to ease review,
- removed eqawarn to avoid circ dep on eutils.




[gentoo-dev] [PATCH 1/3] eutils.eclass: prune_libtool_files, punt pointless Prefix logic

2017-03-12 Thread Michał Górny
Remove the unnecessary Prefix logic from prune_libtool_files(). There is
no functional difference between starting a find in ${D} and ${ED}
(since ${D} is not supposed to contain other directories on a Prefix
system), and using the latter implies unnecessary hackery for older
EAPIs.
---
 eclass/eutils.eclass | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/eclass/eutils.eclass b/eclass/eutils.eclass
index e036001dc5e1..ab226b236a37 100644
--- a/eclass/eutils.eclass
+++ b/eclass/eutils.eclass
@@ -898,7 +898,6 @@ prune_libtool_files() {
debug-print-function ${FUNCNAME} "$@"
 
local removing_all removing_modules opt
-   _eutils_eprefix_init
for opt; do
case "${opt}" in
--all)
@@ -1008,7 +1007,7 @@ prune_libtool_files() {
einfo "Removing unnecessary ${f#${D%/}} (${reason})"
queue+=( "${f}" )
fi
-   done < <(find "${ED}" -xtype f -name '*.la' -print0)
+   done < <(find "${D}" -xtype f -name '*.la' -print0)
 
if [[ ${queue[@]} ]]; then
rm -f "${queue[@]}"
-- 
2.12.0




[gentoo-dev] [PATCH 2/3] eutils.eclass: prune_libtool_files, make .pc subst errors fatal

2017-03-12 Thread Michał Górny
Make the substitution errors in prune_libtool_files logic fatal to avoid
the dependency of eqawarn. They're extremely unlikely to happen anyway.
---
 eclass/eutils.eclass | 7 ---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/eclass/eutils.eclass b/eclass/eutils.eclass
index ab226b236a37..cb472caee1d4 100644
--- a/eclass/eutils.eclass
+++ b/eclass/eutils.eclass
@@ -982,9 +982,10 @@ prune_libtool_files() {
for arg in ${libs}; do
if [[ ${arg} == 
-l* ]]; then
if [[ 
${arg} == '*$*' ]]; then
-   
eqawarn "${FUNCNAME}: variable substitution likely failed in ${pc}"
-   
eqawarn "(arg: ${arg})"
-   
eqawarn "Most likely, you need to add virtual/pkgconfig to DEPEND."
+   
eerror "${FUNCNAME}: variable substitution likely failed in ${pc}"
+   
eerror "(arg: ${arg})"
+   
eerror "Most likely, you need to add virtual/pkgconfig to DEPEND."
+   
die "${FUNCNAME}: unsubstituted variable found in .pc"
fi
 

pc_libs+=( lib${arg#-l}.la )
-- 
2.12.0




[gentoo-dev] [PATCH 3/3] ltprune.eclass: Split prune_libtool_files out of eutils

2017-03-12 Thread Michał Górny
Move the prune_libtool_files into a dedicated ltprune.eclass.
The function is quite complex and depends on toolchain-funcs. It has
a separate maintainer, is not useful to non-autotools ebuilds, and even
there it is frequently replaced by the simpler 'find ... -delete' call.

The new eclass is implicitly inherited by eutils in EAPI 6 and older
in order to preserve compatibility with existing ebuilds. However, all
ebuilds should switch to inheriting it directly.

The split has been suggested by Ulrich Müller.
---
 eclass/eutils.eclass  | 150 +
 eclass/ltprune.eclass | 167 ++
 2 files changed, 168 insertions(+), 149 deletions(-)
 create mode 100644 eclass/ltprune.eclass

diff --git a/eclass/eutils.eclass b/eclass/eutils.eclass
index cb472caee1d4..c932d685c0e9 100644
--- a/eclass/eutils.eclass
+++ b/eclass/eutils.eclass
@@ -17,12 +17,10 @@
 if [[ -z ${_EUTILS_ECLASS} ]]; then
 _EUTILS_ECLASS=1
 
-inherit toolchain-funcs
-
 # implicitly inherited (now split) eclasses
 case ${EAPI:-0} in
 0|1|2|3|4|5|6)
-   inherit epatch estack multilib
+   inherit epatch estack ltprune multilib toolchain-funcs
;;
 esac
 
@@ -869,152 +867,6 @@ use_if_iuse() {
use $1
 }
 
-# @FUNCTION: prune_libtool_files
-# @USAGE: [--all|--modules]
-# @DESCRIPTION:
-# Locate unnecessary libtool files (.la) and libtool static archives
-# (.a) and remove them from installation image.
-#
-# By default, .la files are removed whenever the static linkage can
-# either be performed using pkg-config or doesn't introduce additional
-# flags.
-#
-# If '--modules' argument is passed, .la files for modules (plugins) are
-# removed as well. This is usually useful when the package installs
-# plugins and the plugin loader does not use .la files.
-#
-# If '--all' argument is passed, all .la files are removed without
-# performing any heuristic on them. You shouldn't ever use that,
-# and instead report a bug in the algorithm instead.
-#
-# The .a files are only removed whenever corresponding .la files state
-# that they should not be linked to, i.e. whenever these files
-# correspond to plugins.
-#
-# Note: if your package installs both static libraries and .pc files
-# which use variable substitution for -l flags, you need to add
-# pkg-config to your DEPEND.
-prune_libtool_files() {
-   debug-print-function ${FUNCNAME} "$@"
-
-   local removing_all removing_modules opt
-   for opt; do
-   case "${opt}" in
-   --all)
-   removing_all=1
-   removing_modules=1
-   ;;
-   --modules)
-   removing_modules=1
-   ;;
-   *)
-   die "Invalid argument to ${FUNCNAME}(): ${opt}"
-   esac
-   done
-
-   local f
-   local queue=()
-   while IFS= read -r -d '' f; do # for all .la files
-   local archivefile=${f/%.la/.a}
-
-   # The following check is done by libtool itself.
-   # It helps us avoid removing random files which match '*.la',
-   # see bug #468380.
-   if ! sed -n -e '/^# Generated by .*libtool/q0;4q1' "${f}"; then
-   continue
-   fi
-
-   [[ ${f} != ${archivefile} ]] || die 'regex sanity check failed'
-   local reason= pkgconfig_scanned=
-   local snotlink=$(sed -n -e 's:^shouldnotlink=::p' "${f}")
-
-   if [[ ${snotlink} == yes ]]; then
-
-   # Remove static libs we're not supposed to link against.
-   if [[ -f ${archivefile} ]]; then
-   einfo "Removing unnecessary 
${archivefile#${D%/}} (static plugin)"
-   queue+=( "${archivefile}" )
-   fi
-
-   # The .la file may be used by a module loader, so avoid 
removing it
-   # unless explicitly requested.
-   if [[ ${removing_modules} ]]; then
-   reason='module'
-   fi
-
-   else
-
-   # Remove .la files when:
-   # - user explicitly wants us to remove all .la files,
-   # - respective static archive doesn't exist,
-   # - they are covered by a .pc file already,
-   # - they don't provide any new information (no libs & 
no flags).
-
-   if [[ ${removing_all} ]]; then
-   reason='requested'
-   elif [[ ! -f ${archivefile} ]]; then
-   reason='no static archive'
-   elif [[ ! $(sed -nre \
-   
"s/^(dependen

Re: [gentoo-dev] [PATCH 2/3] eutils.eclass: prune_libtool_files, make .pc subst errors fatal

2017-03-12 Thread Alexis Ballier
On Sun, 12 Mar 2017 12:00:08 +0100
Michał Górny  wrote:

> Make the substitution errors in prune_libtool_files logic fatal to
> avoid the dependency of eqawarn. They're extremely unlikely to happen
> anyway. ---
>  eclass/eutils.eclass | 7 ---
>  1 file changed, 4 insertions(+), 3 deletions(-)
> 
> diff --git a/eclass/eutils.eclass b/eclass/eutils.eclass
> index ab226b236a37..cb472caee1d4 100644
> --- a/eclass/eutils.eclass
> +++ b/eclass/eutils.eclass
> @@ -982,9 +982,10 @@ prune_libtool_files() {
>   for arg in
> ${libs}; do if [[ ${arg} == -l* ]]; then
>   if
> [[ ${arg} == '*$*' ]]; then
> -
> eqawarn "${FUNCNAME}: variable substitution likely failed in ${pc}"
> -
> eqawarn "(arg: ${arg})"
> -
> eqawarn "Most likely, you need to add virtual/pkgconfig to DEPEND."
> +
> eerror "${FUNCNAME}: variable substitution likely failed in ${pc}"
> +
> eerror "(arg: ${arg})"
> +
> eerror "Most likely, you need to add virtual/pkgconfig to DEPEND."
> +
> die "${FUNCNAME}: unsubstituted variable found in .pc" fi

If you go that way then it would be best if this function had a 
'has "virtual/pkgconfig" ${DEPEND} || die ...' kind of logic

the message is more intended towards package maintainer and i would
assume they have pkgconfig installed which means the failure will
be on user's throat



Re: [gentoo-dev] Retrieve get_libdir path on EAPI 6

2017-03-12 Thread Geaaru
Ok. Thank you very much for clarification.

And sorry, for next questions I will use gentoo-devhelp ml.

G.


On Mar 12, 2017 11:08 AM, "Michał Górny"  wrote:

W dniu 12.03.2017, nie o godzinie 11∶02 +0100, użytkownik Geaaru
napisał:
> Thanks for replay. But if I try to use it inside my eclass inside my
> overlay isn't resolved correctly. I receive an empty string. Could be
> related that in my eclass function is not already available? Or related to
> a wrong version of some packages?

If you are attempting to use it in global scope (i.e. outside phase
functions), then it won't work. Such a use is forbidden since it would
mean that global variables differ depending on profile being used.

--
Best regards,
Michał Górny


Re: [gentoo-dev] [PATCH 2/3] eutils.eclass: prune_libtool_files, make .pc subst errors fatal

2017-03-12 Thread Michał Górny
W dniu 12.03.2017, nie o godzinie 12∶35 +0100, użytkownik Alexis Ballier
napisał:
> On Sun, 12 Mar 2017 12:00:08 +0100
> Michał Górny  wrote:
> 
> > Make the substitution errors in prune_libtool_files logic fatal to
> > avoid the dependency of eqawarn. They're extremely unlikely to happen
> > anyway. ---
> >  eclass/eutils.eclass | 7 ---
> >  1 file changed, 4 insertions(+), 3 deletions(-)
> > 
> > diff --git a/eclass/eutils.eclass b/eclass/eutils.eclass
> > index ab226b236a37..cb472caee1d4 100644
> > --- a/eclass/eutils.eclass
> > +++ b/eclass/eutils.eclass
> > @@ -982,9 +982,10 @@ prune_libtool_files() {
> > for arg in
> > ${libs}; do if [[ ${arg} == -l* ]]; then
> > if
> > [[ ${arg} == '*$*' ]]; then
> > -
> > eqawarn "${FUNCNAME}: variable substitution likely failed in ${pc}"
> > -
> > eqawarn "(arg: ${arg})"
> > -
> > eqawarn "Most likely, you need to add virtual/pkgconfig to DEPEND."
> > +
> > eerror "${FUNCNAME}: variable substitution likely failed in ${pc}"
> > +
> > eerror "(arg: ${arg})"
> > +
> > eerror "Most likely, you need to add virtual/pkgconfig to DEPEND."
> > +
> > die "${FUNCNAME}: unsubstituted variable found in .pc" fi
> 
> If you go that way then it would be best if this function had a 
> 'has "virtual/pkgconfig" ${DEPEND} || die ...' kind of logic

You can't reliably query DEPEND in an ebuild.

> the message is more intended towards package maintainer and i would
> assume they have pkgconfig installed which means the failure will
> be on user's throat

...in the extremely unlikely case of not having pkg-config installed.

-- 
Best regards,
Michał Górny


signature.asc
Description: This is a digitally signed message part


Re: [gentoo-dev] [PATCH 2/3] eutils.eclass: prune_libtool_files, make .pc subst errors fatal

2017-03-12 Thread Alexis Ballier
On Sun, 12 Mar 2017 13:20:18 +0100
Michał Górny  wrote:

> > If you go that way then it would be best if this function had a 
> > 'has "virtual/pkgconfig" ${DEPEND} || die ...' kind of logic  
> 
> You can't reliably query DEPEND in an ebuild.

yeah i though so

> > the message is more intended towards package maintainer and i would
> > assume they have pkgconfig installed which means the failure will
> > be on user's throat  
> 
> ...in the extremely unlikely case of not having pkg-config installed.


... that has far greater chances to be hit by an user than a
developer :)



[gentoo-dev] Last rites: app-i18n/x-unikey

2017-03-12 Thread David Seifert
# David Seifert  (12 Mar 2017)
# Awful codebase, lots of widechars stored in chars,
# invokes undefined behaviour, last release in 2004.
# Masked for removal in 30 days. Bug #593976.
app-i18n/x-unikey



[gentoo-dev] Last rites: www-plugins/nspluginwrapper

2017-03-12 Thread David Seifert
# David Seifert  (12 Mar 2017)
# Bundles half of glibc, unmaintained upstream,
# not really necessary anymore with 64-bit flash
# Masked for removal in 30 days. Bug #609258.
www-plugins/nspluginwrapper



Re: [gentoo-dev] RFC: Pre-GLEP: Security Project

2017-03-12 Thread Roy Bamford
On 2017.03.11 20:50, Kristian Fiskerstrand wrote:
> A draft of a Pre-GLEP for the Security project is available for
> reading
> at https://wiki.gentoo.org/wiki/User:K_f/GLEP:Security
> 
> The GLEP follows a line of GLEPs for special projects that have
> tree-wide access in order to ensure proper accountability (c.f GLEP 48
> for QA and still non-produced GLEP for ComRel (I've started working on
> this and will be presenting this one later as current ComRel Lead))
> 
> Comments, patches, threats, etc welcome
> 
> -- 
> Kristian Fiskerstrand
> OpenPGP keyblock reachable at hkp://pool.sks-keyservers.net
> fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
> 
> 

Kristian,

First of all, thank you. We have needed something like this for several 
projects, for some time.

A few odds and ends.

Why do Security Project members need to be ebuild devs?
Non ebuild developers can contribute by producing GLSAs, 
for example. 

Who manages the Security Project (from outside).  It appears from
the draft GLEP, nobody.  That means that the project could become 
moribund and nobody would notice.  Its not like Gentoo enforces 
or even checks for leadership elections. That's an anual event 
anyway, so its not a measure of a projects continued well being. 

Compare the Security Project to council, that have a monthly 
showing of project health. 

Projects tend to be left alone. Gentoo has several projects that 
appear to be unmanaged but cannot be permitted to die out. 
This is one. Who takes the Security Projects pulse and how?

A periodic automated message to -dev that all Security Project
members "reply to list" is both public and mimnimally invasive.
Its no more than 'roll call'.

Now the hard one, who does what when there is no pulse from 
the Security Project?

This isn't really a Security Project issue. If its ever needed, the 
Security Project isn't active. It affects other projects too, like
comrel, QA and others. Perhaps there is a common solution
to taking a proqcts pulse and reacting when there is none.  

-- 
Regards,

Roy Bamford
(Neddyseagoon) a member of
elections
gentoo-ops
forum-mods


pgpQAiSAKWYXf.pgp
Description: PGP signature


[gentoo-dev] Last rites: app-text/uvconv

2017-03-12 Thread David Seifert
# David Seifert  (12 Mar 2017)
# Awful codebase, lots of widechars stored in chars,
# invokes undefined behaviour, last release in 2004.
# Masked for removal in 30 days. Bug #593942, #593976.
app-text/uvconv



Re: [gentoo-dev] RFC: Pre-GLEP: Security Project

2017-03-12 Thread Kristian Fiskerstrand
On 03/12/2017 07:11 PM, Roy Bamford wrote:


> 
> Why do Security Project members need to be ebuild devs?
> Non ebuild developers can contribute by producing GLSAs, 
> for example. 

Where is that requirement stated?

> 
> Who manages the Security Project (from outside).  It appears from
> the draft GLEP, nobody.  That means that the project could become 
> moribund and nobody would notice.  Its not like Gentoo enforces 
> or even checks for leadership elections. That's an anual event 
> anyway, so its not a measure of a projects continued well being. 
> 

Imposing too much bureaucracy and reporting might not be worthwhile, the
security project's work is relatively easy to monitor in bugzilla
activity and GLSA publication to begin with, less so for auditing, but
that has always been specific to available resources.

> 
> This isn't really a Security Project issue. If its ever needed, the 
> Security Project isn't active. It affects other projects too, like
> comrel, QA and others. Perhaps there is a common solution
> to taking a proqcts pulse and reacting when there is none.  
> 

Talking with the lead of respective projects should be a good start
without need for specific procedures. One could imagine participation
from various special projects in council meetings or just email
exchanges, but it'd likely just end up with a bunch of "nothing new from
the western front" that can more easily just be updated informally
anyways if anyone is concerned.

-- 
Kristian Fiskerstrand
OpenPGP keyblock reachable at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] RFC: Pre-GLEP: Security Project

2017-03-12 Thread Kristian Fiskerstrand
On 03/12/2017 03:55 AM, Rich Freeman wrote:
> On Sat, Mar 11, 2017 at 6:54 PM, Kristian Fiskerstrand  
> wrote:
>> On 03/11/2017 11:23 PM, Andrew Savchenko wrote:
>>>
>>> My point is that users must be informed about security problem, but
>>> they still should have a choice. So it should be either a rule
>>> "mask without removal" or clear guidelines when to remove a
>>> package and when to not.
>>
>> At some point, of a package does not belong in the main tree due to
>> security vulnerabilities, they can still be kept in an overlay by a
>> respective project without it impacting other users. I'm not convinced
>> that impacts the overall user experience of other Gentoo users.
>>
> 
> Is there any reason that this can't be left to maintainer discretion?
> The package is masked and clearly advertises its security issue.  The
> user can make an informed choice.  Do we really need to force the
> issue further?  What is the benefit to Gentoo in doing so?
> 

In most cases lack of maintainer participation is likely the issue to
begin with. The primary issue with a package mask of this nature is that
it is more permanent than temporary in nature. To what extent would
other package maintainers need to take it into consideration e.g wrt
depgraph breakages (say this is a lower slotted version or last version
that supports a specific arch).

Granted that isn't much of an issue from the security point of view, but
goes more over on QA - the primary reason it isn't explicit in the draft
GLEP is that specific rules are difficult to write to cover all
situations and as such needs either a lot of preparation to write or
will cause issues down the line. The accountability aspects of things is
therefore more important than the rules themselves.

Quite frankly I thought I left enough of maintainer discretion when
stating:
* The Security Project does not want to override the maintainer's
autonomy, but
  if inactive might be required to fix a security vulnerability by means of
  version bump or application of a patch in a revision bump.
* If a vulnerability is unlikely to be fixed by upstream or the
package's maintainer
  it might require a package mask. Such mask should never break the
stable dependency tree.

-- 
Kristian Fiskerstrand
OpenPGP keyblock reachable at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] RFC: Pre-GLEP: Security Project

2017-03-12 Thread Kristian Fiskerstrand
On 03/12/2017 07:19 AM, Walter Dnes wrote:
> - Typo...
> Additional Security Project bugzilla notes
> * The Security Project is except (should that read "exempt"?)

Thanks, fixed

> 
> 
> 
> - An intermediate level before masking might be issuing a warning if
>   some simple, specific remediation measure can protect against a
>   vulnerability.  E.g. forcing cups to only listen to 127.0.0.1 or :1

Mitigations like these are mentioned in the GLSA

> 
> - If you want to absolutely ensure that people are warned of a severe,
>   but remediable vulnerability, is it acceptable to "break the build"
>   by requiring a new local USE flag for the ebuild?  I'm thinking of
>   something like "glep_0001234", "glep_0001235", "glep_0001236", etc,
>   and have the ebuild die if the flag is not set, and print out a URL
>   for a security problem.  This could be abstracted to make.conf with
>   a new variable...
> 
>   GLEP="0001234 0001235 0001236 etc etc"

Sounds like a lot of complexity for limited value.

-- 
Kristian Fiskerstrand
OpenPGP keyblock reachable at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] RFC: Pre-GLEP: Security Project

2017-03-12 Thread Rich Freeman
On Sun, Mar 12, 2017 at 2:45 PM, Kristian Fiskerstrand  wrote:
>
> In most cases lack of maintainer participation is likely the issue to
> begin with. The primary issue with a package mask of this nature is that
> it is more permanent than temporary in nature. To what extent would
> other package maintainers need to take it into consideration e.g wrt
> depgraph breakages (say this is a lower slotted version or last version
> that supports a specific arch).
>
> Granted that isn't much of an issue from the security point of view, but
> goes more over on QA.

Sure, and if a package like this becomes a blocker then that would be
a reason to remove it.

The fact that it has a security issue is actually irrelevant to that decision.

-- 
Rich



Re: [gentoo-dev] RFC: Pre-GLEP: Security Project

2017-03-12 Thread Kristian Fiskerstrand
On 03/12/2017 09:14 AM, Alexis Ballier wrote:
> Most of it seems more appropriate for a project page to me and up to
> the sec. team, so I'll comment on the global parts only.
> 
> The only global part I see is the "Security package version/revision
> bumps and package masks". This one would benefit from a proper
> definition of the rules here: If severity is X then inactive is defined
> to be Y days. After that, sec. team can fix themselves. It should also
> be the same for masking: If severity is X and no fix is known after Y
> days/months then sec. team should mask it (but not last rite it, this
> should still be maintainer/treecleaners).

The severity levels and timelines are already defined in the referenced
vulnerability treatment policy. We might be able to incorporate this
suggestion by stronger reference to that for timeline, but in the end
that should be the internal policy anyways. In general I would prefer
the GLSA to be more higher level as we know things are going to need to
be updated from time to time on these matters.

> 
> I think the delay should be clearly stated in the bug with something
> like: Please keep in mind that since this is a remote code execution
> vulnerability, security team will take action if nothing happens within
> one week. If you have tools filling the severity fields then a proper
> definition allows to automate this too.
> 
> My point here is to avoid having all the responsibility falling under
> the lead but focus more on getting things done and educating fellow
> developers: Lower delays for more serious bugs will make people
> understand and prioritize better the issues at hand and their
> implications.

The lead sets policies and is responsible for keeping vulnerability
treatment policy and other documentation up to date c.f Documentation of
process

The Project shall have procedures in place to document its process and
regularly update the documentation including the Vulnerability Treatment
Policies[3].

^^ which was intended to cover some of these concerns

> 
> 
> Also, it'd be nice to have something more formal for sec. cleanup:
> "After 30 days a sec. issue has been fixed, sec. team is free to
> cleanup old vulnerable versions.". I've seen too much pings by sec.
> team members on old bugs for this and they could have spent the same
> amount of time simply doing it instead.

This presumes all security members are gentoo developers with tree
access and can do it themselves, but I'm not convinced cleanups are
vital enough for security to interact as it requires quite a bit of work
for an unfamiliar package to know which files to remove in files/ for
specific versions and/or other package-specific quirks. The package
maintainers really should be able to handle this or hand off the package
to someone else.

-- 
Kristian Fiskerstrand
OpenPGP keyblock reachable at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] RFC: Pre-GLEP: Security Project

2017-03-12 Thread Alexis Ballier
On Sun, 12 Mar 2017 19:59:11 +0100
Kristian Fiskerstrand  wrote:

> On 03/12/2017 09:14 AM, Alexis Ballier wrote:
> > Most of it seems more appropriate for a project page to me and up to
> > the sec. team, so I'll comment on the global parts only.
> > 
> > The only global part I see is the "Security package version/revision
> > bumps and package masks". This one would benefit from a proper
> > definition of the rules here: If severity is X then inactive is
> > defined to be Y days. After that, sec. team can fix themselves. It
> > should also be the same for masking: If severity is X and no fix is
> > known after Y days/months then sec. team should mask it (but not
> > last rite it, this should still be maintainer/treecleaners).  
> 
> The severity levels and timelines are already defined in the
> referenced vulnerability treatment policy. We might be able to
> incorporate this suggestion by stronger reference to that for
> timeline, but in the end that should be the internal policy anyways.


To me, this is the only thing that is *not* internal here.

You have a target delay X. What happens after X expires ? After 2X ?
10X ? When is it right for sec. team to intervene ? When is it right
for sec. team to intervene after maintainer has asked for a delay ? When
is it right for sec. team to intervene against maintainer wishes ?

I'm pretty sure you have a good idea of when sec. team should act, and
you're right in the sense that severity analysis does not belong to the
GLEP, but something referencing your treatment policy and explicitly
stating in the GLEP that (any member of) sec. team is allowed to take
action after some multiple (possibly one) of the target delay would be
more clear and avoid entirely having the lead to take a decision every
time.

I'm insisting here for various reasons:
- It is preferable to have a clear resolution procedure, known in
  advance, instead of something at someone's discretion that happens
  to be brought up every time some other one is not happy.
- Sometimes sec. masking will be controversial (nethack maybe?), having
  the lead take all the hate is not fair either.
- I would definitely prefer saying about Gentoo: "We do not ship
  anything that has had a CVE reported for more than a month" than "We
  do our best to keep your system safe".


Also, please keep in mind that for most people A4/A3/B3/B4/etc. are
paper sizes :) (so that restating the delay in sec bugs is not wasted
electrons)


[...]
> > Also, it'd be nice to have something more formal for sec. cleanup:
> > "After 30 days a sec. issue has been fixed, sec. team is free to
> > cleanup old vulnerable versions.". I've seen too much pings by sec.
> > team members on old bugs for this and they could have spent the same
> > amount of time simply doing it instead.  
> 
> This presumes all security members are gentoo developers with tree
> access and can do it themselves, but I'm not convinced cleanups are
> vital enough for security to interact as it requires quite a bit of
> work for an unfamiliar package to know which files to remove in
> files/ for specific versions and/or other package-specific quirks.
> The package maintainers really should be able to handle this or hand
> off the package to someone else.

Well, I'm not saying the maintainer should not nor that sec. team must
do it themselves, I'm just saying that sec. team can. There are
complex cases but the vast majority of security cleanups are no
brainers that anyone who has passed the quizzes can do.

Alexis.



Re: [gentoo-dev] RFC: Pre-GLEP: Security Project

2017-03-12 Thread Kristian Fiskerstrand
On 03/12/2017 11:05 PM, Alexis Ballier wrote:
>> The severity levels and timelines are already defined in the
>> referenced vulnerability treatment policy. We might be able to
>> incorporate this suggestion by stronger reference to that for
>> timeline, but in the end that should be the internal policy anyways.
> 
> To me, this is the only thing that is *not* internal here.
> 
> You have a target delay X. What happens after X expires ? After 2X ?
> 10X ? When is it right for sec. team to intervene ? When is it right
> for sec. team to intervene after maintainer has asked for a delay ? When
> is it right for sec. team to intervene against maintainer wishes ?
> 
> I'm pretty sure you have a good idea of when sec. team should act, and
> you're right in the sense that severity analysis does not belong to the
> GLEP, but something referencing your treatment policy and explicitly
> stating in the GLEP that (any member of) sec. team is allowed to take
> action after some multiple (possibly one) of the target delay would be
> more clear and avoid entirely having the lead to take a decision every
> time.

makes sense, will try to write up some more info on this in GLEP, while
still referencing the vulnerability treatment policy for the actual
information as that needs to be possible to update from time to time.

-- 
Kristian Fiskerstrand
OpenPGP keyblock reachable at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] RFC: Pre-GLEP: Security Project

2017-03-12 Thread Kristian Fiskerstrand
On 03/11/2017 11:23 PM, Andrew Savchenko wrote:
> While the Deputy may be assigned, this still gives all power to
> single hands. Maybe it will be better to establish something like
> the Security Project Council (SPC)? E.g. three project members may
> be elected to this SPC, so that all serious decisions will require
> some team agreement from at least 2 SPC members. This way the
> Deputy will not be needed as well.

Something like this has been discussed. I personally don't like the
approach too much given that it adds a certain degree of bureaucracy and
can remove responsibility. An important part of the GLEP is that the
project lead is responsible to the council for the changes that is made.
Having possibility to overrule that by members would mean that the lead
is not able to control the action, and as such, can't be responsible for
it. If the members disagree with the lead they can call for re-election
as per GLEP:39 already.

As discussed in another sub-thread, however, will try to incorporate
more of the procedure in the vulnerability treatment policy etc into the
GLEP such that procedures are more in focus.

-- 
Kristian Fiskerstrand
OpenPGP keyblock reachable at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3



signature.asc
Description: OpenPGP digital signature


[gentoo-dev] app-editors/ghostwriter: package up for grabs

2017-03-12 Thread Gokturk Yuksek
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi,

The following package is up for grabs:

  app-editors/ghostwriter

- --
gokturk
-BEGIN PGP SIGNATURE-

iQEcBAEBCgAGBQJYxdHOAAoJEIT4AuXAiM4zX7wIAKRpd6uqLQDqCX8vWoSWuto/
8AyGdLfYDZGxNts+nPZZtuG89ykNAx7W8+c+WwoaIuHvQgD1ZOyoIIq+ghp19xng
tQme9Ke6iE9DOcf6fUZSPP9GIQ6AzcdWwk9iY7MRGzyCG0oS5aZE9YZbqwD4IMHq
4gYZLVcpWXL6wJesoDFoevH+Nz47vFNMuUZL0zlaeXNVJXY3Hj9/QvhyUJfbUeN2
9uZvp5E0lfM+p25J0b7pZlyaOZwMKJcMBj7374iY2rruB6MP0RCpn2u7mEAlMm0f
8zmWYKvNFU9AJzxLrHHqNW1+uTo5I/6UrrBr7/o8mVyW6sMPN4sArxWUmjOnl+k=
=3rgz
-END PGP SIGNATURE-



[gentoo-dev] Automated Package Removal and Addition Tracker, for the week ending 2017-03-12 23:59 UTC

2017-03-12 Thread Robin H. Johnson
The attached list notes all of the packages that were added or removed
from the tree, for the week ending 2017-03-12 23:59 UTC.

Removals:
app-crypt/cryptkeeper  20170312-21:22 mgorny0625e74f644
dev-libs/safestr   20170312-21:22 mgorny28119e8e8a3
dev-libs/xxl   20170312-21:22 mgornyfaef6b48cd8
dev-perl/Archive-Rar   20170311-22:00 dilfridge 0c280fcd6de
dev-php/PEAR-PHP_Shell 20170308-13:12 mjo   e0acd95810e
dev-python/mwlib   20170312-21:21 mgornyf56a7b6e3bd
dev-python/mwlib-rl20170312-21:20 mgorny5aa63a7d6e0
games-rpg/mana 20170312-21:19 mgorny6a39941a49f
games-rpg/tmw  20170312-21:16 mgorny4b965518532

Additions:
app-misc/freeplane 20170310-11:39 xmw   0f0c11b467b
app-misc/timew 20170312-13:07 aidecoe   29f43aa2e5a
app-vim/ferret 20170310-21:12 monsieurp 0f3ea282cdc
app-vim/vimagit20170307-10:57 radhermit f1a7597c991
dev-lang/gnat-gpl  20170311-20:46 tupone0e7760adbc2
dev-libs/libfmt20170306-20:46 soap  a7bb963c619
dev-libs/libmspack 20170306-01:10 reavertm  53e1591b307
dev-ml/ocaml-cohttp20170311-10:31 aballier  218f1f16005
dev-php/doctrine-instantiator  20170309-15:33 grknight  7ef93269fd2
dev-php/myclabs-deepcopy   20170309-15:39 grknight  467b557c602
dev-php/phpdocumentor-reflection-common20170309-15:35 grknight  1bfae2f22a0
dev-php/phpdocumentor-reflection-docblock  20170309-15:37 grknight  294a6d9202e
dev-php/phpdocumentor-type-resolver20170309-15:36 grknight  72d99c23987
dev-php/phpspec-prophecy   20170309-15:41 grknight  a7100386fb4
dev-php/phpunit-mock-objects   20170309-16:18 grknight  76cc2114317
dev-php/sebastian-code-unit-reverse-lookup 20170309-15:29 grknight  c9cd38e7e21
dev-php/sebastian-comparator   20170309-15:27 grknight  f6bc67f1625
dev-php/sebastian-diff 20170309-15:26 grknight  a4344147b6d
dev-php/sebastian-environment  20170309-15:24 grknight  5054d7f897b
dev-php/sebastian-exporter 20170309-15:22 grknight  31967bac591
dev-php/sebastian-global-state 20170309-15:21 grknight  f055eeabd8f
dev-php/sebastian-object-enumerator20170309-15:19 grknight  c2eb2b6bf3e
dev-php/sebastian-recursion-context20170309-15:18 grknight  be3acfa0bb7
dev-php/sebastian-resource-operations  20170309-15:16 grknight  3361d878f1c
dev-php/sebastian-version  20170309-15:15 grknight  5a3b26f0fd6
dev-php/webmozart-assert   20170309-15:14 grknight  06c5bda11ec
dev-python/HeapDict20170306-23:24 bicatali  d975b18b5a8
dev-python/ipynb   20170307-15:27 soap  3ba2d44c994
dev-python/iso3166 20170208-19:39 monsieurp da0d5255d21
dev-python/iso_639 20170208-19:42 monsieurp 03814c53dbb
dev-python/matplotlib2tikz 20170308-13:02 soap  9bfccc11164
dev-python/pydotplus   20170213-23:52 gokturk   101f920c2b7
dev-python/sortedcollections   20170306-23:08 bicatali  f4e58189a64
dev-python/sortedcontainers20170306-22:30 bicatali  a06e6a36af1
dev-python/tblib   20170306-21:28 bicatali  d44f151ca14
dev-python/zstandard   20170308-15:56 mrueg 4bf9be6de7a
dev-util/edb-debugger  20170307-12:22 amynkafbe36fe818b
dev-util/lxqt-build-tools  20161123-15:40 monsieurp 322d8e2c43d
games-board/tablebase-syzygy   20170309-10:31 ulm   3e304757f36
gnustep-apps/ftp   20170312-17:08 voyageur  11de47aea1a
gnustep-apps/talksoup  20170312-16:59 voyageur  866c6241fc7
net-libs/ntirpc20170306-18:15 vapierf56569afdbb
x11-misc/xowl  20170311-09:11 jer   9aa74a41070
x11-plugins/enigmail   20170309-01:03 axs   4fb9b596f42
x11-wm/xoat20170311-08:53 jer   6c34a869337

--
Robin Hugh Johnson
Gentoo Linux Developer
E-Mail : robb...@gentoo.org
GnuPG FP   : 11AC BA4F 4778 E3F6 E4ED  F38E B27B 944E 3488 4E85
Removed Packages:
dev-libs/safestr,removed,mgorny,20170312-21:22,28119e8e8a3
dev-libs/xxl,removed,mgorny,20170312-21:22,faef6b48cd8
app-crypt/cryptkeeper,removed,mgorny,20170312-21:22,0625e74f644
dev-python/mwlib,removed,mgorny,20170312-21:21,f56a7b6e3bd
dev-python/mwlib-rl,removed,mgorny,20170312-21:20,5aa63a7d6e0
games-rpg/mana,removed,mgorny,20170312-21:19,6a39941a49f
games-rpg

Re: [gentoo-dev] RFC: Pre-GLEP: Security Project

2017-03-12 Thread William Hubbs
On Sun, Mar 12, 2017 at 02:54:22PM -0400, Rich Freeman wrote:
> On Sun, Mar 12, 2017 at 2:45 PM, Kristian Fiskerstrand  
> wrote:
> >
> > In most cases lack of maintainer participation is likely the issue to
> > begin with. The primary issue with a package mask of this nature is that
> > it is more permanent than temporary in nature. To what extent would
> > other package maintainers need to take it into consideration e.g wrt
> > depgraph breakages (say this is a lower slotted version or last version
> > that supports a specific arch).
> >
> > Granted that isn't much of an issue from the security point of view, but
> > goes more over on QA.
> 
> Sure, and if a package like this becomes a blocker then that would be
> a reason to remove it.
> 
> The fact that it has a security issue is actually irrelevant to that decision.

I disagree with this argument. A security issue *is* a problem,
especially if we are masking the package because of the security issue.

imo to increase the quality of the tree, packages with known, unfixable
security issues belong in overlays, not in the main tree.

William



signature.asc
Description: Digital signature