Thanks Eric! Brooks Warner Sustaining Engineering Manager | Canonical Dir: +1 480-494-9618 IRC: brookswarner www.canonical.com | www.ubuntu.com
On Fri, Aug 4, 2017 at 6:22 AM, Eric Desrochers < [email protected]> wrote: > Dariusz has created some autopkgtest scripts doing invocation of some of > the cli pcp tools, ... > > After a few run from Dariusz and I, both test scripts successfully > passed. > > .. > adt-run [09:10:04]: @@@@@@@@@@@@@@@@@@@@ summary > check_daemons.py PASS > check_cli_tools.py PASS > .. > > Next step is to submit the autopkgtest proposal to Debian upstream. > > - Dariusz & Eric > > -- > You received this bug notification because you are subscribed to the bug > report. > https://bugs.launchpad.net/bugs/1700827 > > Title: > [MIR] pcp package > > Status in pcp package in Ubuntu: > New > > Bug description: > [Availability] > Available: > pcp | 3.11.10 | artful/universe | source, amd64, arm64, armhf, > i386, ppc64el, s390x > > [Rationale] > This is a valuable source of metrics for large deployments. There are > numerous users with large installations interested in having it in fully > supported state. > > [Security] > National Vulnerability Database: > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5530 > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3421 > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3420 > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3419 > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3418 > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0823 > > OSS security: > http://www.openwall.com/lists/oss-security/2012/08/16/1 > Ubuntu CVE tracker: none > > All CVEs handled by upstream. > > Executables which have the suid or sgid bit set: none > Executables in /sbin, /usr/sbin: none > Packages which install services / daemons (/etc/init.d/*, /etc/init/*, > /lib/systemd/system/*) > pcp-manager: /etc/init.d/pmmgr > pcp: /etc/init.d/{pcp, pmcd, pmie, pmlogger, pmproxy} > Above checks done with: http://paste.ubuntu.com/24916305/ > Packages which open privileged ports (ports < 1024): none > Add-ons and plugins to security-sensitive software (filters, scanners, > UI skins, etc): none > [Quality assurance] > Easy to make it work after install (no extra actions required) > Does not ask debconf questions. > No outstanding bugs affecting usability. > > There are some open bugs: > Ubuntu: > https://bugs.launchpad.net/ubuntu/+source/pcp/+bug/439572 > https://bugs.launchpad.net/ubuntu/+source/pcp/+bug/1272039 > Debian: > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771793 > > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=805955 > > There is a testsuite but it’s not designed to be run at build. It > requires installed and operational PCP. > > No debian/watch file - needs to be added. > > No debian/test/ - need autopkgtest (dep8) > > [Dependencies] > All dependencies met in main (including recommended) > > libpapi-dev is a universe build-time dependency introduced with zesty. > [Standards compliance] > Lintian report https://lintian.debian.org/full/[email protected]#pcp_3. > 11.10 > > I haven’t found any violations of FHS. > > [Maintenance] > Owning team? Server team? > > [Background information] > Package description: > System level performance monitoring and performance management > Performance Co-Pilot (PCP) is a framework and services to > support system-level performance monitoring and performance > management. > . > The Performance Co-Pilot provides a unifying abstraction for > all of the interesting performance data in a system, and allows > client applications to easily retrieve and process any subset of > that data. > > To manage notifications about this bug go to: > https://bugs.launchpad.net/ubuntu/+source/pcp/+bug/1700827/+subscriptions > -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1700827 Title: [MIR] pcp package To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pcp/+bug/1700827/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
