On 2013-03-21 02:15:18 +0800 (+0800), Thomas Goirand wrote:
> On 03/20/2013 11:54 PM, Pascal Giard wrote:
> > I would have much preferred to have this disabled by default.
>
> I would have preferred the picture thing to be hosted
> without gravatar support (libravatar is hosted by a DD,
> and you
On 2013-03-21 18:07:26 -0700 (-0700), Russ Allbery wrote:
> I will at least make a plea for ISO dates rather than the specific date
> format in the last two examples.
>
> I think my favorite is the last example, with an ISO date (2023-03-21).
[...]
Another alternative, not represented, is epoch s
On 2013-03-22 21:44:21 +0100 (+0100), Guido Günther wrote:
> Gerrit's Jenkins integration is awesome.
[...]
OpenStack CI has some additional tools which help avoid the need to
interact directly with Jenkins too much. There's Zuul (the
gatekeeper) which watches the Gerrit event stream and triggers
On 2013-03-22 21:08:18 + (+), Jeremy Stanley wrote:
[...]
> watches the Gerrit event stream and triggers jobs in Jenkins as a
> result of matching again patterns defined a YAML configuration
> file
[...]
Yeesh. I clearly shouldn't write E-mail when I'm rushing off to e
On 2013-04-04 16:00:34 +0200 (+0200), Andreas Tille wrote:
[...]
> I can not see how Joey[1] and Daniel[3] would solve these problem when
> they are not interested in upstream tarball releases any more.
It's worth pointing out, packagers should not assume just because an
upstream uses a VCS with p
On 2013-05-09 15:58:02 +0800 (+0800), Thomas Goirand wrote:
> On 05/07/2013 10:34 PM, Paul Wise wrote:
> > On Tue, May 7, 2013 at 10:12 PM, Thomas Goirand wrote:
[...]
> > > Also, the rules in backports is that packages should be
> > > already migrated to testing. The point is, if I had PPAs, I
> >
On 2013-05-09 22:55:33 +0800 (+0800), Thomas Goirand wrote:
[...]
> And I seriously wished it wasn't the case, and that upstream
> understood better what the distribution requirements are.
[...]
Actually, in this case (OpenStack) from what I've seen the upstream
community understands the distribut
On 2014-04-07 12:00:20 +0200 (+0200), Jonas Smedegaard wrote:
> Quoting Gergely Nagy (2014-04-07 11:10:27)
> > Can we have ratpoison + selected things as default DE for Debian Zurg?
> > Please? Pretty please? With sugar on top?
>
> First, create a metapackage, and maintain it.
>
> Then when gett
On 2014-04-27 20:50:38 -0700 (-0700), Russ Allbery wrote:
[...]
> Containers would be a better environment, but you have to make
> them very, very simple to set up.
[...]
An academic librarian friend of mine has been working with the
various departments at his institution to start producing and
ar
Package: wnpp
Severity: wishlist
Owner: Jeremy Salwen
* Package name: liblilv-1
Version : 0.4.0
Upstream Author : David Robillard
* URL : http://drobilla.net/software/lilv/
* License : ISC License
Programming Lang: C
Description : Lightweight LV2
Package: wnpp
Severity: wishlist
Owner: Jeremy Salwen
* Package name: sord-0
Version : 0.4.0
Upstream Author : David Robillard
* URL : http://drobilla.net/software/sord/
* License : ISC License
Programming Lang: C99
Description : A lightweight C
Okay, not _mine_ specifically, but
someone's...) Changing the established values in a keymap out from
under users is foolish when the gains are nearly nonexistent and the
workaround is relatively trivial for those who actually want to side
with hobgoblins.
--
Jeremy Stanley
--
To UNSUBSC
-I was paraphrasing Ralph Waldo Emerson's warning against
consistency for consistency's sake--it wasn't meant as a personal
slight in any way whatsoever.
--
Jeremy Stanley
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe".
vernments with control over jurisdictions where the DNS root keys
are managed not to MitM you by fabricating signed resolution chains
down to a TLSA record with the cert they want you to see. It all
depends on which tinfoil hat you find most comfortable.
--
Jeremy Stanley
--
To UNSUBSCRIBE,
e
a fairly strong degree of faith in the automatic archive signing
keys... we'd definitely be following similar measures to cross-sign,
secure and rotate our automatic tarball signing keys.
--
Jeremy Stanley
signature.asc
Description: Digital signature
one of its primary maintainers I don't
think I would be interested in patches which attempt to turn it into
a general client for various sorts of git servers (though I'm open
to being convinced otherwise).
--
Jeremy Stanley
signature.asc
Description: Digital signature
wn and
> packaging it for Debian seems to be difficult.
[...]
As someone who helps maintain a very high-traffic Gerrit server, I
can confirm it's at least as un-fun as any very complex Java-based
server application. And apparently packaging it is even less fun...
https://bugs.debian
use both tools--and also the cut-n-paste
git checkout/cherry-pick commands displayed by the Gerrit WebUI--to
retrieve changes; it mostly boils down to what context I'm in as to
which is more convenient at any particular point in time.
--
Jeremy Stanley
--
To UNSUBSCRIBE, email to debian-
Package: wnpp
Severity: wishlist
Owner: Jeremy Grosser
* Package name: tablesnap
Version : 0.7.1
Upstream Author : Jeremy Grosser
* URL : https://github.com/JeremyGrosser/tablesnap
* License : BSD
Programming Lang: Python
Description : Backup utility
(which in many cases may also mean investing in and
getting involved with assisting the OpenStack community's equivalent
of the DSA to keep the necessary test infrastructure to support
those older releases maintained and viable).
--
Jeremy Stanley
signature.asc
Description: PGP signature
27;t think it should have been a surprise that this upload was
coming.
Reference
--
https://mail.gnome.org/archives/desktop-devel-list/2017-December/msg00072.html
Thanks,
Jeremy Bicha
On Sun, Nov 4, 2018 at 11:33 AM Ben Hutchings wrote:
> I do like the proposal of adding a librsvg-c for just the architectures
> that don't have Rust (yet).
This sounds reasonable. Thanks Samuel for the suggestion. Any
volunteers to maintain this new old package?
Thanks,
Jeremy Bicha
On Sun, Nov 4, 2018 at 2:30 PM Jeremy Bicha wrote:
> On Sun, Nov 4, 2018 at 11:33 AM Ben Hutchings wrote:
> > I do like the proposal of adding a librsvg-c for just the architectures
> > that don't have Rust (yet).
>
> This sounds reasonable. Thanks Samuel for the sugge
id some minor
enablement work for mutter for hurd/kfreebsd recently but I'm
absolutely not a porter and I've never used those ports.
Thanks,
Jeremy Bicha
es against the spirit
of the Debian Code of Conduct.
You can say "no" to requests and still be nice.
You're also pulling someone else in (formorer) to demonstrate your
argument and I'm not sure he approves of your message here.
Thanks,
Jeremy Bicha
r NEW.
I don't have experience with archive management for non-release
architectures at all.
Thanks,
Jeremy Bicha
On Wed, Nov 14, 2018 at 5:22 PM John Paul Adrian Glaubitz
wrote:
>
> Hi Jeremy!
>
> On 11/14/18 10:52 PM, Jeremy Bicha wrote:
> > As requested, this is librsvg reintroduced for ports that don't
> > supported the rustified librsvg yet. The name is because this is
appily
upgrade my Debian install to Unstable.
Thanks,
Jeremy Bicha
to be complete in Buster before the
Transition Freeze which is scheduled for January 12. [1]
[1] https://release.debian.org/
Thanks,
Jeremy Bicha
meal package-based software distributions
in general are being abandoned (or at best becoming implementation
details in some image build automation). Pointing fingers at other
distros isn't productive behavior, and certainly isn't a way to keep
ours relevant. It's like fighting over the last slice of cake on a
sinking ship.
--
Jeremy Stanley
signature.asc
Description: PGP signature
ceview2
gtksourceview3
gtkspell3
libglade2
libglademm2.4
libgnomecanvas
libgnomecanvasmm2.6
libgtk2-perl
libunique
pygtk
python-gtkglext1 (xpra)
vte (cdebconf-terminal which is part of debian-installer)
Not removing at this time
--------
libart-lgpl
On behalf of the Debian GNOME Team,
Jeremy Bicha
d your email first.
Thanks,
Jeremy Bicha
m except by
killing much of the flexibility of traditional E-mail in the
process. Throwing out the baby with the bathwater.
--
Jeremy Stanley
signature.asc
Description: PGP signature
ered by this combination?
Compromise of the cryptographic keys or primitives in use,
compromise of the authorized MTAs, compromise of the sender's
SMTP submission account, compromise of the sender's MUA/system, and
biggest of all of course is recipients who don't validate SPF/DKIM.
--
Jer
records rejecting messages from people
using their debian.org addresses in other ways (for example, yours
seems to have been sent through an MTA in GPLHost for relaying to
the lists.d.o MX).
--
Jeremy Stanley
signature.asc
Description: PGP signature
depend on the
Freedesktop SDKs.
Thanks,
Jeremy Bicha
Firefox ESR and
Chromium.
Thanks,
Jeremy Bicha
ffler.
Thanks,
Jeremy Bicha
The packaging link should be
https://salsa.debian.org/python-team/applications/pdfarranger
If anyone wants more background to justify the fork, see
https://github.com/jeromerobert/pdfarranger/issues/9
Thanks,
Jeremy Bicha
lt GNOME desktop (and hopefully other desktop environments),
>
> Which raises a question: why does GNOME reinvent this system?
Because sensible-utils is not cross-distro.
(unless I misunderstood your question)
Thanks,
Jeremy Bicha
LXDE doesn't ship with any tool that allows customizing what
x-www-browser is, right? I don't see that LXDE .desktop as being very
useful in practice.
Thanks,
Jeremy Bicha
tream. Its ITP is https://bugs.debian.org/916668
I intend to maintain this with the Debian GNOME Team.
Initial packaging is at https://salsa.debian.org/gnome-team/bst-external
Thanks,
Jeremy Bicha
Package: wnpp
Severity: wishlist
Owner: Jeremy Oden
* Package name: libexadrums
Version : 0.3.0
Upstream Author : Jeremy Oden
* URL : https://github.com/SpintroniK/libeXaDrums
* License : MIT
Programming Lang: C++
Description : Software drum module
Package: wnpp
Severity: wishlist
Owner: Jeremy Oden
* Package name: exadrums
Version : 0.3.0
Upstream Author : Jeremy Oden
* URL : https://github.com/SpintroniK/eXaDrums
* License : MIT
Programming Lang: C++
Description : Software drum module
Software app.
Packaging is maintained by the Debian GNOME Team at
https://salsa.debian.org/gnome-team/gnome-books
Thanks,
Jeremy Bicha
nsider using a different name?
You don't need to bump the epoch since your package has a higher
version number than the old package.
Thanks,
Jeremy Bicha
d).
More than a dozen years have passed, and this choice really hasn't
presented a problem whatsoever.
--
Jeremy Stanley
signature.asc
Description: PGP signature
h default locale. As such, using
en_DK.UTF-8 for this is as good a default as any in my opinion.
--
Jeremy Stanley
signature.asc
Description: PGP signature
t; format for such an operation. Other formats (zip, 7z, ...) are more
> suited for them.
Are you talking about source packages or binary packages here? The
latter use ar, not tar.
--
Jeremy Stanley
signature.asc
Description: PGP signature
On 2019-05-09 06:27:36 +0900 (+0900), Mike Hommey wrote:
> On Wed, May 08, 2019 at 09:04:49PM +0000, Jeremy Stanley wrote:
[...]
> > Are you talking about source packages or binary packages here? The
> > latter use ar, not tar.
>
> Binary packages use both.
>
> $ a
ise between Debian and Conservancy,
rather than Debian making an informed choice based on advice from
Conservancy (and others). Your apparent disagreement with the result
comes across as though you're implying an adversarial relationship
between Debian and Conservancy which I sincerely hope does not
reflect the feelings of the community as a whole. As Harry Tuttle
once said, "we're all in it together."
--
Jeremy Stanley
signature.asc
Description: PGP signature
[No need to Cc an extra copy, I've been a d-d subscriber since...
the 1990s?]
On 2019-06-08 13:00:02 -0400 (-0400), Sam Hartman wrote:
> Jeremy Stanley writes:
> > Your earlier message also implied the motives behind
> > Conservancy's recommendations to be something o
ty's web of trust (and a number of our community release
managers transitively attest to those public keys as well for added
coverage).
There's probably more I'm forgetting, but that's at least a good
start at mitigating unattended use of unencrypted keys while
maintaining a rob
On 2019-06-10 13:09:52 -0400 (-0400), Kyle Edwards wrote:
> On Mon, 2019-06-10 at 16:56 +0000, Jeremy Stanley wrote:
[...]
> > 6. To allow for easier manual verification of key transitions,
> > always sign new keys with their predecessors when creating them.
>
> We haven
y increasing character.
[...]
And yet you *wouldn't* be confused when Debian 2019.7 is released in
2021?
--
Jeremy Stanley
signature.asc
Description: PGP signature
that note, I just do:
apt-ftparchive release . | gpg2 --clear-sign --output InRelease
Works great. Would simply adding that to the EXAMPLES section of
apt-ftparchive(1) suffice? It's right in line with the existing
example of a compressed Packages.gz file.
--
Jeremy Stanley
signature.asc
De
ke an odd choice for a CI
system, but I've seen far stranger misconfigurations over the years.
--
Jeremy Stanley
signature.asc
Description: PGP signature
if you want to be able to build consistent systems
across disparate providers. Even if they haven't unnecessarily
tampered with official distro images themselves, there's no
guarantee that the Debian images they offer are for the same point
releases/snapshot dates and so on.
--
Jeremy Stanley
signature.asc
Description: PGP signature
's because I've just
not found the time to work out how to configure systemd to serve
them instead (last I checked the packages for these didn't include a
service file), but I've also not felt particularly compelled to as
it's really convenient just to be able to put a line in
/etc/inetd.conf and HUP it.
Systemd having socket activation doesn't automatically make inetd
obsolete.
--
Jeremy Stanley
signature.asc
Description: PGP signature
em. I'm simply glad to see
increasing uptake of automated testing in Debian relying on
free/libre open source software, but have no interest in viewing
choice between these solutions as a competition. When any one free
software solution wins, we all win.
--
Jeremy Stanley
signature.asc
Description: PGP signature
uot;stone age" concept from which Debian
should relieve itself.
[*] https://bugs.debian.org/debbugs-source/mainline/COPYING
[**] https://gitlab.com/gitlab-org/gitlab-ee/blob/master/ee/LICENSE
--
Jeremy Stanley
signature.asc
Description: PGP signature
ng those projects directly from tagged Git repository states,
that does necessarily imply performing similar steps to generate or
extract this metadata for use in their packages. Others may simply
wish to consume the prepared tarballs where this step has already
been performed for them.
--
Jeremy Stan
one necessarily better than the other? My ISP
can spy on far fewer users than Cloudflare can, so on balance this
seems like a net loss for privacy.
--
Jeremy Stanley
signature.asc
Description: PGP signature
irefox
users. I think it comes down to whether you consider the biggest
privacy risk to come from focused/local attacks (in which case the
new default is a benefit) or from global dragnet trawling by "big
brother" (in which case nearly everyone in the World trusting the
same small numbe
that makes it hard to
> identify activists by having the software installed).
Note that by way of counterargument, Google and its services have
been blocked in mainland China by the Great Firewall for nearly a
decade now, so I question whether there is really such a thing as
"too big to block."
--
Jeremy Stanley
signature.asc
Description: PGP signature
), but I'm not the one running it. Instead I chose to
move on and spend my limited time furthering software freedom in
other venues where it can actually make a difference.
--
Jeremy Stanley
signature.asc
Description: PGP signature
static compilation,
but rather vendor in additional dynamically-linked libs which are
unlikely to be present on the target installations.
--
Jeremy Stanley
signature.asc
Description: PGP signature
way. There's also basic substitutions
support in the reStructuredText specification, which might be useful
to reduce the amount of actual content you need to swap at build
time:
https://docutils.sourceforge.io/docs/ref/rst/restructuredtext.html#substitution-definitions
--
Jeremy Stanley
signature.asc
Description: PGP signature
. Packaging is at
https://salsa.debian.org/gnome-team/d-spy
D-Spy is a maintained alternative to the D-Feet app. D-Spy uses GTK4
and libadwaita.
D-Spy also provides a library that is used to provide its features
integrated into the GNOME Builder app.
Thanks,
Jeremy Bícha
If and when GNU/kFreeBSD is dropped from debian-ports, is it ok to
drop packaging overrides for the architecture from packages in
Unstable?
Thank you,
Jeremy Bícha
/syndication-domination
It is a required dependency for newer versions of the GNOME Feeds app.
There are C++ header files but the upstream installer does not install
them. Since nothing in Debian is using them, I am only packaging the
Python3 library at this time.
Thanks,
Jeremy Bicha
ie predates
Ubuntu).
Thank you,
Jeremy Bícha
Debian:
https://mentors.debian.net/
Thank you,
Jeremy Bícha
& the
GNOME Settings app (gnome-control-center) for GNOME 45 later this
year. Tecla is a basic app written in GTK4 & libadwaita and would
replace gkbd-capplet (provided by libgnomekbd) for the GNOME desktop.
Thanks,
Jeremy Bícha
By the way, there is an existing old unrelated libtecla package in Debian.
Upstream for new Tecla does not believe there will be a name conflict.
https://gitlab.gnome.org/GNOME/tecla/-/issues/6
Thank you,
Jeremy Bícha
that already exist in Ubuntu 23.10 "Mantic"?
Thank you,
Jeremy Bícha
: just don't take inspiration from that particular pattern).
They aren't all flaky but skip-not-installable is used frequently.
Thank you,
Jeremy Bícha
ripheral for
some reason. I get that I'm probably an exception, but there are
definitely users who simply find automounting behavior annoying,
beyond any potential security concerns.
--
Jeremy Stanley
signature.asc
Description: PGP signature
On 2023-07-28, at 18:59:45 +0200, Timo Röhling wrote:
> * Arturo Borrero Gonzalez [2023-07-28 18:38]:
> > I would appreciate additional suggestions and hints. Patches welcome.
>
> If you have bad interactions between the Python and non-Python parts
> of your package, you can try and build them ind
ibpeas2 is GNOME Builder 45.
Thanks,
Jeremy Bícha
s with a *.egg-info/ line in d/clean should both
> work. (Personally, I'd use extend-diff-ignore if the egg-info is
> also shipped in the source tarball and d/clean if not)
Similarly, I got one for __pycache__/*.cpython-311.pyc file
overwrites... is that something dh_python should clean
On 2023-08-16 11:45:43 +0800 (+0800), Paul Wise wrote:
> On Sun, 2023-08-13 at 21:18 +0000, Jeremy Stanley wrote:
>
> > Similarly, I got one for __pycache__/*.cpython-311.pyc file
> > overwrites... is that something dh_python should clean?
>
> Probably just send upstrea
omment telling people where to
find our contributor workflow documentation.
--
Jeremy Stanley
signature.asc
Description: PGP signature
mment in GNU HURD sources, should we censor it out?
For that matter, if Debian was going to get into book burning over
racist, homophobic and misogynistic writing, all those packaged
versions of religious texts would presumably be the first things
tossed onto the pyre.
--
Jeremy Stanley
signatur
tually doing the work), is another matter of course. Like a
library choosing not to repurchase a particular damaged book due to
lack of popularity, rather than being pressed to remove it from the
shelves because someone disagrees with what's printed inside even
though they're never going
can be found at the project's website:
https://gitlab.freedesktop.org/libinput/libei
Thanks,
Jeremy Bícha
it seems like all too often it's in pursuit of signing on more
and more donors at the expense of distracting active free/libre open
source software communities from what they would normally focus on
achieving.
--
Jeremy Stanley
signature.asc
Description: PGP signature
On 2023-09-08 13:31:43 + (+), Jeremy Stanley wrote:
> On 2023-09-08 12:09:09 +0530 (+0530), Hideki Yamane wrote:
> [...]
> > SPDX is led by the Linux foundation project, OpenChain for license
> > compliance.
> [...]
>
> Unless I'm misreading, OpenChain
right files too, or is it really simply a hard-coded list of
matching patterns?
Regardless, this is great work, thanks for kicking off the
reevaluation!
--
Jeremy Stanley
signature.asc
Description: PGP signature
Thanks,
Jeremy Bícha
assert that their more recent addition of HTTPS and strong checksums
mostly serves the purpose of users being able to double-check that
what they downloaded is what PyPI meant to serve them (even if they
can't as easily double-check that what they downloaded is what the
author believes was originally uploaded).
--
Jeremy Stanley
signature.asc
Description: PGP signature
On 2023-11-16 00:20:40 +0100 (+0100), Salvo Tomaselli wrote:
> In data mercoledì 15 novembre 2023 15:58:15 CET, Jeremy Stanley ha scritto:
> > why do you need to put an OpenPGP key on the service
> > you're using to upload Python packages (not Debian packages) to
> > PyP
the "trusted publisher" authentication mechanism (which
only supports GitHub Actions for now), there will likely be more
options in the future that also avoid use of global API tokens.
--
Jeremy Stanley
signature.asc
Description: PGP signature
they have made things more complicated and more
inconvenient, which often ends up pressuring users into finding
less-secure workarounds, defeating the purpose of the additional
measures they enacted.
--
Jeremy Stanley
signature.asc
Description: PGP signature
. Packaging is at
https://salsa.debian.org/gnome-team/solanum
Thanks,
Jeremy Bícha
On Sat, Nov 25, 2023 at 5:51 PM David Bremner wrote:
>
> Jeremy Bícha writes:
> >
> > Package Name: solanum
> > Version: 5.0.0
> > Upstream Author: Christopher Davis
> > License: GPL-3+
> > Programming Lang: Rust
> >
> > Description: simple
.d.o/doc (and maybe also wiki.d.o) could be
cool.
--
Jeremy Stanley
signature.asc
Description: PGP signature
quire uninstalling the pipewire audio stack at least.
--
Jeremy Stanley
signature.asc
Description: PGP signature
https://salsa.debian.org/python-team/packages/langtable
langtable is a proposed build dependency for the gnome-desktop library
Thanks,
Jeremy Bícha
sing
popularity of the externally-developed cryptography library as a
good reason to strip any remnants of cryptographic modules and
bindings from the stdlib.
--
Jeremy Stanley
signature.asc
Description: PGP signature
101 - 200 of 537 matches
Mail list logo