• Re: Lottery NEW queue (Re: Are libraries with bumped SONAME subject of

    From Paul Gevers@21:1/5 to All on Fri Jan 21 19:10:02 2022
    This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------3gdpEOQQRzDJ2TBljvt6cZlJ
    Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64

    SGksDQoNCkknbSBub3QgaW52b2x2ZWQgaW4gZnRwLW1hc3RlciwgYnV0Li4uDQoNCk9uIDIx LTAxLTIwMjIgMTg6MTksIEFuZHJlYXMgVGlsbGUgd3JvdGU6DQo+IEFtIEZyaSwgSmFuIDIx LCAyMDIyIGF0IDA5OjUxOjEyQU0gLTA1MDAgc2NocmllYiBNLiBaaG91Og0KPj4gSSdkIHJh dGhlciBwcm9wb3NlIGNob2ljZSBDLiBCZWNhdXNlIEkgdG8gc29tZSBleHRlbnQgdW5kZXJz dGFuZA0KPj4gYm90aCBzaWRlcyB3aG8gc3VwcG9ydCBlaXRoZXIgQSBvciBCLiBJIG1haW50 YWluIGJ1bGt5IEMrKyBwYWNrYWdlcywNCj4+IGFuZCBJIGFsc28gaGFkIGEgbGl0dGxlIGV4 cGVyaWVuY2UgcmV2aWV3aW5nIHBhY2thZ2VzIG9uIGJlaGFsZiBvZg0KPj4gZnRwLXRlYW0u DQo+Pg0KPj4gQSAtLSBTb21lIChlLmcuIEMrKykgcGFja2FnZXMgbWF5IGZyZXF1ZW50bHkg ZW50ZXIgdGhlIE5FVyBxdWV1ZSwNCj4+IHdpdGggT0xEIHNyYyBhbmQgTkVXIGJpbnMgKGUu Zy4gU09WRVJTSU9OIGJ1bXApLiBBIHBvcnRpb24gb2YgZGV2cw0KPj4gZmVlbCBpdCBpcyBu b3QgbmVjZXNzYXJ5IGZvciBmcmVxdWVudGx5IGJlY2F1c2UgaXQgZHJhc3RpY2FsbHkNCj4+ IHNsb3dzIGRvd24gdGhlIG1haW50YWluZXIncyB3b3JrLiBJbiB0aGUgd29yc3QgY2FzZSwg d2hlbiB0aGUNCj4+IHBhY2thZ2UgZmluYWxseSBwYXNzZWQgdGhlIE5FVyBxdWV1ZSwgdGhl IG1haW50YWluZXIgbWF5IGhhdmUNCj4+IHRvIGdvIHRocm91Z2ggTkVXIHF1ZXVlIGFnYWlu IHVwb24gdGhlIG5leHQgdXBsb2FkLiAoVGhpcyBpcyB2ZXJ5DQo+PiBsaWtlbHkgdG8gaGFw cGVuIGZvciB0ZW5zb3JmbG93LCBldGMpLg0KPiANCj4gSSBoYXZlIGhlYXJkIHRoaXMgYXJn dW1lbnQgYW5kIG15IG1haWwgd2FzIHNpbXBseSB0byBmaW5kIG91dCB3aGF0DQo+IGZlbGxv dyBkZXZlbG9wZXJzIHRoaW5rIGFib3V0IHRoaXMuICBJTUhPIHRoZSBpc3N1ZSBpcyBzdWZm aWNpZW50bHkNCj4gaW1wb3J0YW50IHRvIGhhdmUgc29tZSBraW5kIG9mIGRvY3VtZW50ZWQg Y29uc2Vuc3VzIGFib3V0IHRoaXMuDQoNCkl0J3Mgbm90IG9ubHkgdGhlIGNvcHlyaWdodCB0 aGF0IHRoZSBmdHAtbWFzdGVyIGFyZSByZXNwb25zaWJsZSBmb3IuIE5ldyANCmJpbmFyaWVz IGZpbGwgYSBwbGFjZSBpbiB0aGUgRGViaWFuIG5hbWVzcGFjZSBhbmQgdGhleSAqYXJlKiB0 aGUga2VlcGVycyANCm9mIHRoYXQuDQoNCkFuZCBodHRwczovL2xpc3RzLmRlYmlhbi5vcmcv ZGViaWFuLWRldmVsLzIwMjEvMDcvbXNnMDAyMzEuaHRtbA0KDQpQYXVsDQo=

    --------------3gdpEOQQRzDJ2TBljvt6cZlJ--

    -----BEGIN PGP SIGNATURE-----

    wsB5BAABCAAjFiEEWLZtSHNr6TsFLeZynFyZ6wW9dQoFAmHq9bEFAwAAAAAACgkQnFyZ6wW9dQoU SwgA0oYoxjKxhYU2itiE8QB5Ubk4waqureHiHx0CXsfUYFBvLTa3hj0Ef05w3nYXHj4Nd4yc/49Z hqzX8zX3tTBMobQfb5/DeX/2UPlDYXA9zul9qoXUTkn3RHYcLEJsj2P2ebR4qwPVi/3OnkGN1fU6 wg7QYM8NC5f2hpX3XIo9/ofNQNF4QTPSXvL7I0sziJca1PmXPBHhtx6r+qk6Ylrd0GAEgytMZ8sc UjctxBqrY93QAnpTyYv9VmAaXU4aqT5Wap28DLV8YcI4jO9fNiioCTQtgChQnK41bNOQTbpyTLYI pKMcF/iOGoG9EFlT7W+7aT6hNkagaxcbnKIEi8H7yw==
    =yq22
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andreas Tille@21:1/5 to of the on Fri Jan 21 18:20:02 2022
    Hi Mo,

    Am Fri, Jan 21, 2022 at 09:51:12AM -0500 schrieb M. Zhou:
    I'd rather propose choice C. Because I to some extent understand
    both sides who support either A or B. I maintain bulky C++ packages,
    and I also had a little experience reviewing packages on behalf of
    ftp-team.

    A -- Some (e.g. C++) packages may frequently enter the NEW queue,
    with OLD src and NEW bins (e.g. SOVERSION bump). A portion of devs
    feel it is not necessary for frequently because it drastically
    slows down the maintainer's work. In the worst case, when the
    package finally passed the NEW queue, the maintainer may have
    to go through NEW queue again upon the next upload. (This is very
    likely to happen for tensorflow, etc).

    I have heard this argument and my mail was simply to find out what
    fellow developers think about this. IMHO the issue is sufficiently
    important to have some kind of documented consensus about this.

    B -- Uploads with OLD src and OLD bin are not required to go through
    NEW queue, even if a decade as passed as long as the src names and
    bin names are kept unchanged. One of the supports for B is that
    the d/copyright file may silently rot (get outdated), as uploads
    without updated d/copyright won't be rejected. Checking packages
    when they bump SOVERSION is to some extent a "periodical" check.
    This worked very well for packages with stable ABI. But for pacakges
    without stable ABI, especially bulky (C++) packages, this is
    painful for both uploaders and ftp checkers.

    I also heard that argument that passing the new queue is a good chance
    to review d/copyright. But as you said it will never catch code that
    never needs passing new queue again. So also here I would seek for
    opinions since this argument is in conflict with my interpretation
    of the said mail I was refering to[1].

    Given the understanding of both options, I propose choice C:

    C. Lottery NEW queue:

    if (src is new):
    # completely new package
    require manual-review
    elif (src is old) but (bin is new):
    if not-checked-since-last-stable-release:
    # approximate advantage of choice B.
    require manual-review
    elif src.version already exists in archive
    # choice A wants to avoid this case.
    auto-accept
    else:
    if (lottery := random()) < threshold
    require manual-review
    else:
    # I expect a faster pace of debian development.
    auto-accept

    In this way concerns for both people supporting A and B can be partly addressed. The old-src-new-bin case have a large chance to pass NEW
    as long as they have been reviewed once after the last stable release.
    The burden for ftp-team can be reduced. And pace of maitnainers can
    be faster with less chance of being blocked and unstable to do anything
    but wait.

    I agree that this solution possibly covers both sides. However my
    question was a bit simpler since I wanted to find out whether we really
    have supporters of both sides and how strong their arguments might be
    for the respective side. Than we can document the issue and possibly
    your suggestion might be an acceptable solution (if and only if we
    realise that there are those conflicting opinions).

    I would love to have this clearly documented since in case B. I would
    stop wasting my and ftpmaster time with nagging which is not
    rectified
    than.

    I personally clearly prefer A. and I wish we could clarify this
    situation.

    Me too. I perfer A personally as well. Debian might be the only major distribution which checks the license so thoroughly. Unconditionally
    allow an old-src-new-bin upload to pass is basically impossible, I
    speculate. Choice C might be more practical and feasible.

    "Speculate" is the term we need to get rid of first. ;-)
    This was my motivation to write the initial mail.

    It must be many outdated d/copyright in our archive. Letting eligible
    uploads automatically pass with a high probability is not likely
    causing problem even if yet another outdated d/copyright sneaked in.

    I perfectly agree that we have a high probablility for outdated
    d/copyright files in our archive. However, I would like to consider
    this problem as orthogonal to the binary name change issue. It puts
    an absolutely not rectified bias on those packages that are typically
    changing binary packages frequently - at least I do not see any good
    reason to prefer a package that by chance has a new binary name over
    any other package inside the archive.

    That's why I would rather consider to do a call for volunteers to
    verify d/copyright files of *completely* random packages. I do not
    see any point in putting this workload onto ftpmaster but may be as
    a first interesting step to join the ftpmaster team.

    Kind regards

    Andreas.

    [1] https://lists.debian.org/debian-devel/2021/07/msg00231.html
    [2] https://ftp-master.debian.org/new/onetbb_2021.4.0-1~exp1.html

    --
    http://fam-tille.de

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Adam Borowski@21:1/5 to Scott Kitterman on Fri Jan 21 19:40:03 2022
    On Fri, Jan 21, 2022 at 01:28:54PM -0500, Scott Kitterman wrote:
    2. New binary package "steals" binary from another source. This is sometimes
    OK. Sometimes it's accidental. It could also be malicious (I don't remember if I've every actually seen this done for an intentional "steal" or not, I might have).

    Stealing a binary does not go through NEW.


    Meow!
    --
    ⢀⣴⠾⠻⢶⣦⠀ Aryans: split from other Indo-Europeans ~2900-2000BC → Ural →
    ⣾⠁⢠⠒⠀⣿⡁ Bactria → settled 2000-1000BC in northwest India. ⢿⡄⠘⠷⠚⠋⠀ Gypsies: came ~1000AD from northern India; aryan. ⠈⠳⣄⠀⠀⠀⠀ Germans: IE people who came ~2800BC to Scandinavia; not aryan.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Scott Kitterman@21:1/5 to All on Fri Jan 21 19:50:01 2022
    On Friday, January 21, 2022 1:33:07 PM EST Adam Borowski wrote:
    On Fri, Jan 21, 2022 at 01:28:54PM -0500, Scott Kitterman wrote:
    2. New binary package "steals" binary from another source. This is sometimes OK. Sometimes it's accidental. It could also be malicious (I don't remember if I've every actually seen this done for an intentional "steal" or not, I might have).

    Stealing a binary does not go through NEW.

    It does. Binary is new to that source so there is no existing override.

    Scott K
    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCgAdFiEE53Kb/76FQA/u7iOxeNfe+5rVmvEFAmHq/kEACgkQeNfe+5rV mvG0RxAAqRWC/CGZeT4NiGmd0yJc+onqg2aDoGUQ0xB5S3xek04pwfJr7/xWj6HP 6RvHh2GoZV9Zb/Prl4gSgsu+FYCV9DguyQWQTHu7z46jCCAg23kWMxSWcdxzXaBo ILpcCShxX2xeAFlUlx+JZj2MbbXVNrsXhsByQcl8N8Mkz4nsyhzxk2kegyqHbs3Y 0bEdVHcf2349bIrW6Ewb2LqIGDrrtS6wcfrAI6O9h5AYe3ALzzdnbMxn2lmL9fTz cPoMDxdoZ8e71kBIzmfHe9XJH7XybqubwNfPxr9o2pncqq2smWt4VYWfWLystaVF MLU85l5+UjFRPR/Q593SKf3Y5b03+jJbEjl9vOUfGFUmrB27DZ5OLjEvdAD4+WTZ oWY3nHP+Le5TdBbQalIS4ndxFjv9r1AH49Ue+huRbsQcLs8vWCdQHfXGnJasLpAD V0f/QQQGtNqJU4TpKRdK4tc5NBU4jI9lQxhd5U7Ay2d8lOZi5CSrq9W9wku3jhEr vuv3TrNX5agVdOs9Fi3xauFEg46lg1RmciACJdr4d3HpzOgpOdMrcOWj+YSisRk7 R7iToJIBhbJRpV2Cmw0m2kgLgcwhpyYQ3Q5G+qIleOzzhaH4Dea3EY5dti+5j5IT tBS9NvY5FzH6T0zD1RlHRGMdrUp5YgGVCI758xUVRbSzZYJUkdo=
    =ODZa
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Theodore Ts'o@21:1/5 to Scott Kitterman on Fri Jan 21 20:00:01 2022
    On Fri, Jan 21, 2022 at 01:28:54PM -0500, Scott Kitterman wrote:

    1. When the SO name changes and the binary package name is adjusted accordingly, it is not super rare for the maintainer to mess something up in the renaming and end up with an empty binary package, which does no one any good. I note that for debhelper compat 15 there appears to be some related work in progress. Perhaps this is, or can be extended to be, sufficient to eventually make this kind of error a thing of the past.

    Can we have better automated tooling, either in Lintian, or in when
    source packages are rebuilt, that can take care of this?

    The other thing that's perhaps considering here is that unfortunately,
    there are some upstreams that are extremely irresponsible with library
    ABI backwards compatibility, where they bump the SONAME essentially at
    every release. I recall one extreme case a few years ago where there
    were over ten(!) SONAME bumps for a particular library over 12 months.

    The problem with this is that it makes for a massive headache when it
    comes to security updates. The claim for why we want to use shared
    libraries, despite the library dependency hell problem, is that when a
    security problem gets fixed, all we need to do is to upload a new
    shared library package, and all of the packages which depend on it automatically get updated. Well, if during the course of a testing
    release, we have binary packages depending on libshaky3, libshaky5,
    libshaky6, libshaky7 and libshaky8, now if there's a long-standing
    security bug that gets fixed, it's not necessarily the case that when
    the Debian maintainer which uploads an updated libshaky source
    package, which might result in binary packages libshaky-dev,
    libshaky-bin, and libshaky8, that there will be updates for
    libshaky{3,5,6,7}.

    Now that we are requiring source uploads for everything entering
    testing, there's easy answer to this --- which is to simply have an
    automated system which rebuilds all of the packages that have a
    build-depends on libshaky-dev, so all the packages will now have a
    dependency on libshaky8. Huzzah!

    But if we're going to do that, then we could also just support static libraries, and just rebuilt all of the pacakges that link statically
    with libshaky, thus solving the security argument for shared
    libraries. This also avoids the fairness problem where some packages
    are reguarly going through ftpmaster review, and others aren't...

    Just a thought....

    - Ted

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Scott Kitterman@21:1/5 to All on Fri Jan 21 19:30:02 2022
    On Friday, January 21, 2022 12:19:12 PM EST Andreas Tille wrote:
    Hi Mo,

    Am Fri, Jan 21, 2022 at 09:51:12AM -0500 schrieb M. Zhou:
    I'd rather propose choice C. Because I to some extent understand
    both sides who support either A or B. I maintain bulky C++ packages,
    and I also had a little experience reviewing packages on behalf of ftp-team.

    A -- Some (e.g. C++) packages may frequently enter the NEW queue,
    with OLD src and NEW bins (e.g. SOVERSION bump). A portion of devs
    feel it is not necessary for frequently because it drastically
    slows down the maintainer's work. In the worst case, when the
    package finally passed the NEW queue, the maintainer may have
    to go through NEW queue again upon the next upload. (This is very
    likely to happen for tensorflow, etc).

    I have heard this argument and my mail was simply to find out what
    fellow developers think about this. IMHO the issue is sufficiently
    important to have some kind of documented consensus about this.

    Speaking only for myself, not the FTP Team.

    There are other considerations. Here's a few I thought of without investing a lot of time in it (not necessarily comprehensive):

    1. When the SO name changes and the binary package name is adjusted accordingly, it is not super rare for the maintainer to mess something up in the renaming and end up with an empty binary package, which does no one any good. I note that for debhelper compat 15 there appears to be some related work in progress. Perhaps this is, or can be extended to be, sufficient to eventually make this kind of error a thing of the past.

    2. New binary package "steals" binary from another source. This is sometimes OK. Sometimes it's accidental. It could also be malicious (I don't remember if I've every actually seen this done for an intentional "steal" or not, I might have).

    3. New package added for reasons that make sense to the maintainer, but not for the archive as a whole. I've seen this come up multiple times, usually in the context of the binary being too trivial (which is a judgment call).

    It's not just let's do extra copyright/license checks.

    Scott K
    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCgAdFiEE53Kb/76FQA/u7iOxeNfe+5rVmvEFAmHq+2YACgkQeNfe+5rV mvHftxAAxJGMlolSsKyM7ep1XY/AdYjre+LzTZux1DQwEE0Ko6v7Ek8KAPZ9bIdU CwlJBiEEQWxPt/2iYygLkBTQXm7pGJyXnaiXQht+SRK2YP9z91hvdg0L4ZKRSVwN SQQjLk+dggNq4A9bhC1FzHBiTVj8R87pJL36KABPQFJR2RP0/24fJLiRFf4VIPft sPA7Lwre1Fmmw5Y80hwcBdkng8u5awvA9UfJwreEUhV4I3+3G7+LyAArgxiVr34b +LCCHHlqe8Ks62mXfFwmANe7mn1SlnwvIo48rCOYth+sehyZ0/eT+hd1Jt69MBBk koLLUasPGU6LmFmVeUjVjcjRDfZ9mxcYanuqmqv0lnjXVU7Oqxv6aHuZQ0/9KGcI u2MpUFbZysKhnqV1m1sYySTXNSoAOdO5PKEJTHw3NSywB5jKFKD9+kyMdnqvabft gEXqdlVEDzkLMuSvYhDu1FhHYWiLsq3qgXnAefnmwnI9nq5BOBrOrmWtNZojihrB 4ffXuugTBKlCk1jDyYRo/Vxb2JuvvhihK7HckuuG1qBrk6GfIV7zUXDYkhG7N4fr U9Y1WTfhkbAHXIIHMFDsgnrqKUXKQBoLvcT6omvTESsLZKq4EFH5wm7I3GZKbxAn pHA0DKK0e7DNRf6dgjZ5eKY+WYCziyC/w1gRTf9YxVSZBUKfEoY=
    =DOKz
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul Wise@21:1/5 to Theodore Ts'o on Sat Jan 22 02:00:02 2022
    On Fri, 2022-01-21 at 13:55 -0500, Theodore Ts'o wrote:

    Can we have better automated tooling, either in Lintian, or in when
    source packages are rebuilt, that can take care of this?

    The other thing that's perhaps considering here is that unfortunately,
    there are some upstreams that are extremely irresponsible with library
    ABI backwards compatibility, where they bump the SONAME essentially at
    every release. I recall one extreme case a few years ago where there
    were over ten(!) SONAME bumps for a particular library over 12 months.

    You could avoid NEW for these SONAME bumps by using a single binary
    package and ensuring that the symbols/shlibs depend on the right
    version ranges. Or add Provides libfoo-abi-N or libfoo-abi (= N)
    and have the symbols and or shlibs generate dependencies on that.

    But if we're going to do that, then we could also just support static libraries, and just rebuilt all of the pacakges that link statically
    with libshaky, thus solving the security argument for shared
    libraries.  This also avoids the fairness problem where some packages
    are reguarly going through ftpmaster review, and others aren't...

    In the past I've suggested a solution to static linking and binary
    packages containing source could be to have a service scanning every
    binary package for static/source files (.a, Rust, Golang etc), noting
    the relevant package/version tuples and then searching the buildinfo
    files for binary packages that built with those packages installed and automatically rebuilding affected packages, or having a service that
    would let you manually rebuild packages affected by security issues.

    https://wiki.debian.org/StaticLinking

    In addition there are toolchain changes coming in at least Golang and
    possibly GCC (pushed by Fedora IIRC) for adding source file/package
    information into generated binaries.

    The scanning/buildinfo/rebuilding idea would produce more builds than
    strictly necessary, but perhaps the coming toolchain changes could be
    helpful in filtering down the lists.

    Ultimately the best option would be for all build toolchains to have instrumentation that enables us to completely graph the flow of source
    data to -dev binary packages etc to final binary packages. Perhaps each
    build system, compiler etc would communicate with a daemon that would
    collect the file/etc paths/hashes/etc, map those back to package,
    version tuples and upload those to dak in buildgraph files.

    --
    bye,
    pabs

    https://wiki.debian.org/PaulWise

    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCgAdFiEEYQsotVz8/kXqG1Y7MRa6Xp/6aaMFAmHrVr0ACgkQMRa6Xp/6 aaNxdg//b4I6xPOtm6UpqMDOccTVOAyahuT+4Bi11aBRIfK8Iy8/d8nlegUocmMj DgU5OLj7wbcSV1JISL4mP5VhGlw+kgbfs2pEHaR3VyD5ncWv+VHAqeAIDyOVWKhP VXiWzogmBQC3C03Ks0DVWWMg9UL1jCH1ZxlonRqMGxGBkTQMtIhtnq0ROX6q3FR/ iQLjEbpBp+K9Uy/6fAy0aqbjW/VGeA+xdDbemtwZk/uhlPdLOyLaCoVUShj6r9nw sQsT1J8gGIVX02WGp5MpdO96z0jLx6hGNBakdtWYVFWcJibIKnPwnxbo1+26ZOAf Erj9q2cclvG5RLnWVyc9C8yEy55D8dgIlEvXGbQ+3oR+i/+nNQ1jCWY8ISOL3GLh ncNzkl0gF9r91ICYZf3FlhY5c8Fn4Ebe2jGOpUPDt7FKQhZdnaQCux6TV1ePwvpF QZnaFsklfgm0+xnLbI6SrmEGPblXsubCfEuw1l7mc6lMv5JEmnx3BS/qBXaXOTpY hWA9hZtdY6QmoXx7UKUvJXNUZ/qo3kyKyI1OU2L9/DYM9OyfeJzgA7I3MSB5zfbP dDwj/0+ITavjPLJkEm8D0Ys8gVFdHdRDikOyUyu2pRYSLN62nPgWX35hlPxrec/W NAaSaDP8VqF2TZxW+qmuAkA+Hg/EI3rPB4wr6G0ajMvSodtNZI8=
    =54OY
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon McVittie@21:1/5 to Paul Wise on Sat Jan 22 11:30:02 2022
    On Sat, 22 Jan 2022 at 08:58:37 +0800, Paul Wise wrote:
    On Fri, 2022-01-21 at 13:55 -0500, Theodore Ts'o wrote:
    The other thing that's perhaps considering here is that unfortunately, there are some upstreams that are extremely irresponsible with library
    ABI backwards compatibility, where they bump the SONAME essentially at every release.

    I don't think characterizing that as irresponsible is entirely fair,
    and it risks setting up incentives that harm us: if the upstream for
    a package I maintain is breaking backwards-compat, I'd prefer them to acknowledge it and bump the SONAME, rather than saying "well, it isn't
    *that* big a break" and ignoring it.

    You could avoid NEW for these SONAME bumps by using a single binary
    package and ensuring that the symbols/shlibs depend on the right
    version ranges. Or add Provides libfoo-abi-N or libfoo-abi (= N)
    and have the symbols and or shlibs generate dependencies on that.

    I used that method for early GTK 4 prereleases in experimental, when
    upstream were breaking ABI in each 3.9x prerelease. They specifically
    weren't guaranteeing API or ABI stability yet at that stage in
    development, but I wanted to start packaging early, before it was too
    late to incorporate feedback that could result in further incompatible
    changes. (At the time the source package was called src:gtk+4.0, but
    it's in the git history of src:gtk4 now.)

    I think this is fine for prereleases and experimental, but for packages
    with more than a trivial number of reverse-dependencies it is likely
    to cause issues for testing/unstable transitions, because it defeats
    the release team's "smooth upgrades" mechanism (in which they keep the
    old libfoo1 binaries and the old src:foo in testing until there are no
    more rdeps, even after they have been superseded by a new src:foo with
    libfoo2, so that migration doesn't have to all happen in one go). I
    would say that maintainers who are considering doing this in unstable
    should talk to the release team first.

    smcv

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andreas Tille@21:1/5 to All on Sat Jan 22 21:40:02 2022
    Hi,

    Am Fri, Jan 21, 2022 at 07:04:33PM +0100 schrieb Paul Gevers:
    I have heard this argument and my mail was simply to find out what
    fellow developers think about this. IMHO the issue is sufficiently important to have some kind of documented consensus about this.

    It's not only the copyright that the ftp-master are responsible for. New binaries fill a place in the Debian namespace and they *are* the keepers of that.

    I absolutely agree that a four eyes principle. On the other hand several maintainers consider uploading to experimental (as in said case of onetbb)
    and trust a team to verify the issues mentioned above.

    And https://lists.debian.org/debian-devel/2021/07/msg00231.html

    Yes, this mail was for sure my motivation to write my mail. IMHO it
    says that there is no need for manual inspection ... and I would love
    if this would be clarified and documented.

    Kind regards

    Andreas.

    --
    http://fam-tille.de

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stephan Lachnit@21:1/5 to elbrus@debian.org on Sun Jan 23 18:50:02 2022
    On Fri, Jan 21, 2022 at 7:04 PM Paul Gevers <elbrus@debian.org> wrote:

    It's not only the copyright that the ftp-master are responsible for. New binaries fill a place in the Debian namespace and they *are* the keepers
    of that.

    One could say that for new binaries packages whose src is already in
    Debian, the ftp-masters skip the d/copyright review and only do the
    other tasks. This should allow for way quicker transitions of simple
    SOVERSION bumps.

    In general I prefer a random d/copyright check more than one based on
    the introduction of a new binary, as I just don't see any connection
    between a new binary name and a change of copyright.

    Regards,
    Stephan

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Theodore Y. Ts'o@21:1/5 to Paul Wise on Mon Jan 24 01:30:01 2022
    On Sat, Jan 22, 2022 at 08:58:37AM +0800, Paul Wise wrote:
    The other thing that's perhaps considering here is that unfortunately, there are some upstreams that are extremely irresponsible with library
    ABI backwards compatibility, where they bump the SONAME essentially at every release. I recall one extreme case a few years ago where there
    were over ten(!) SONAME bumps for a particular library over 12 months.

    You could avoid NEW for these SONAME bumps by using a single binary
    package and ensuring that the symbols/shlibs depend on the right
    version ranges. Or add Provides libfoo-abi-N or libfoo-abi (= N)
    and have the symbols and or shlibs generate dependencies on that.

    That only works if there are no other packages depending on those
    shared libraries which are coming from other source packages. After
    all, if the only consumers of those shared libraries is source package
    for those libraries, there's a much simpler solution --- just
    compiling the d*mned package using static linking, and just moving on.

    But if there are other packages which are using those shared
    libraries, then the official party line is that just shipping static
    libraries in libshaky-dev is bad, Bad, BAD, since it means that when
    there are security bugs fixed in the sources for libshaky, they aren't automatically fixed for all of the users of libshaky until they
    relink.

    But my claim is that if the upstream can't manage to maintain a stable
    ABI, then maybe we shouldn't be trying to ship shared libraries. But officially, that's not allowed, since it's considered bad.
    Unfortunately, that's effectively punishing maintainers who are
    supporting sources which support shared library. For those languages
    like Rust, etc., which don't support shared libraries, life is *much*
    simpler.

    In the past I've suggested a solution to static linking and binary
    packages containing source could be to have a service scanning every
    binary package for static/source files (.a, Rust, Golang etc), noting
    the relevant package/version tuples and then searching the buildinfo
    files for binary packages that built with those packages installed and automatically rebuilding affected packages, or having a service that
    would let you manually rebuild packages affected by security issues.

    https://wiki.debian.org/StaticLinking

    If we have that solution for Rust and Golang, the maybe it can also
    make life easier for upstreams that can't maintain an ABI. (And yes,
    I don't have much patience with those folks given that e2fsprogs has
    had a stable library since 1997, which is the last time I've had to
    bump an SONAME for libext2fs. But that's because I'm careful, where
    as some other developers like for f2fs-tools, bump their SONAME every
    !@#@?! release. Sigh...)

    - Ted

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul Wise@21:1/5 to Theodore Y. Ts'o on Mon Jan 24 03:50:05 2022
    On Sun, 2022-01-23 at 17:43 -0500, Theodore Y. Ts'o wrote:

    That only works if there are no other packages depending on those
    shared libraries which are coming from other source packages.

    I don't think that is true, I believe you can put multiple things in
    the depends section of an shlibs file and dpkg-shlibdeps will propagate
    that to reverse dependencies just fine. From the manual pages it looks
    like the same applies to the symbols files. I found on my system that
    there are *already* packages that do something similar (see below).

    But my claim is that if the upstream can't manage to maintain a stable
    ABI, then maybe we shouldn't be trying to ship shared libraries.  But officially, that's not allowed, since it's considered bad.

    Personally, to detect such upstreams I think Debian needs a service
    tracking ABI using abipkgdiff (from abigail-tools) and pkg-abidiff.
    Once we have that it isn't too much more work for Debian to maintain
    the SONAME instead of upstream.

    If we have that solution for Rust and Golang, the maybe it can also
    make life easier for upstreams that can't maintain an ABI.

    I initially mainly wanted it for static linking detection, I expect
    there is some of that (at least in -static packages) in Debian and that
    we are not thinking to rebuild such packages after security issues.

    Packages that have complex dependencies in shlibs/symbols files:

    $ grep -h '^lib.*,' /var/lib/dpkg/info/*.shlibs
    libbfd 2.37.50-multiarch.20220106 binutils-multiarch (>= 2.37.50.20220106), binutils-multiarch (<< 2.37.50.20220107)
    libopcodes 2.37.50-multiarch.20220106 binutils-multiarch (>= 2.37.50.20220106), binutils-multiarch (<< 2.37.50.20220107)
    libbctoolbox 1 libbctoolbox1 (>= 4.4.0), libbctoolbox1 (<< 4.5.0)
    libbellesip 1 libbellesip1 (>= 4.4.0), libbellesip1 (<< 4.5.0)
    libbfd 2.37.50-system.20220106 libbinutils (>= 2.37.50.20220106), libbinutils (<< 2.37.50.20220107)
    libopcodes 2.37.50-system.20220106 libbinutils (>= 2.37.50.20220106), libbinutils (<< 2.37.50.20220107)
    libboost_python39 1.74.0 libboost-python1.74.0 (>= 1.74.0), libboost-python1.74.0-py39
    libeabutil 0 libevolution (>= 3.42.3), libevolution (<< 3.43)
    libeabwidgets 0 libevolution (>= 3.42.3), libevolution (<< 3.43) libecontacteditor 0 libevolution (>= 3.42.3), libevolution (<< 3.43) libecontactlisteditor 0 libevolution (>= 3.42.3), libevolution (<< 3.43) libecontactprint 0 libevolution (>= 3.42.3), libevolution (<< 3.43) libemail-engine 0 libevolution (>= 3.42.3), libevolution (<< 3.43)
    libessmime 0 libevolution (>= 3.42.3), libevolution (<< 3.43) libevolution-addressbook-importers 0 libevolution (>= 3.42.3), libevolution (<< 3.43)
    libevolution-calendar-importers 0 libevolution (>= 3.42.3), libevolution (<< 3.43)
    libevolution-calendar 0 libevolution (>= 3.42.3), libevolution (<< 3.43) libevolution-mail-composer 0 libevolution (>= 3.42.3), libevolution (<< 3.43) libevolution-mail-formatter 0 libevolution (>= 3.42.3), libevolution (<< 3.43) libevolution-mail-importers 0 libevolution (>= 3.42.3), libevolution (<< 3.43) libevolution-mail 0 libevolution (>= 3.42.3), libevolution (<< 3.43) libevolution-shell 0 libevolution (>= 3.42.3), libevolution (<< 3.43) libevolution-smime 0 libevolution (>= 3.42.3), libevolution (<< 3.43) libevolution-util 0 libevolution (>= 3.42.3), libevolution (<< 3.43) libgnomecanvas 0 libevolution (>= 3.42.3), libevolution (<< 3.43)
    libgconf-2 4 libgconf-2-4 (>= 2.31.1), gconf-service
    libgnustep-base 1.28 libgnustep-base1.28 (>= 1.28.0), gnustep-base-runtime (>= 1.28.0)
    libortp 15 libortp15 (>= 1:4.4.0), libortp15 (<< 1:4.5.0)
    libphonon4qt5 4 libphonon4qt5-4 (>= 4:4.11.1), phonon4qt5
    libtotem 0 libtotem0 (>= 3.38.2-1), libtotem0 (<< 3.39)

    $ grep -h ',.*<<' /var/lib/dpkg/info/*.symbols
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6 (>> 2.33), libc6 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-i386 (>> 2.33), libc6-i386 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libc6-x32 (>> 2.33), libc6-x32 (<< 2.34)
    | libncurses5 #MINVER#, libncurses5 (<< 6.4~)
    | libncurses5 #MINVER#, libncurses5 (<< 6.4~)
    | libncurses5 #MINVER#, libncurses5 (<< 6.4~)
    | libncurses5 #MINVER#, libncurses5 (<< 6.4~)
    | libncurses6 #MINVER#, libncurses6 (<< 6.4~)
    | libncurses6 #MINVER#, libncurses6 (<< 6.4~)
    | libncurses6 #MINVER#, libncurses6 (<< 6.4~)
    | libncurses6 #MINVER#, libncurses6 (<< 6.4~)
    | libncursesw5 #MINVER#, libncursesw5 (<< 6.4~)
    | libncursesw5 #MINVER#, libncursesw5 (<< 6.4~)
    | libncursesw5 #MINVER#, libncursesw5 (<< 6.4~)
    | libncursesw5 #MINVER#, libncursesw5 (<< 6.4~)
    | libncursesw6 #MINVER#, libncursesw6 (<< 6.4~)
    | libncursesw6 #MINVER#, libncursesw6 (<< 6.4~)
    | libncursesw6 #MINVER#, libncursesw6 (<< 6.4~)
    | libncursesw6 #MINVER#, libncursesw6 (<< 6.4~)
    | libnsl2 (>> 1.3.0), libnsl2 (<< 1.3.1)
    | libtinfo5 #MINVER#, libtinfo5 (<< 6.4~)
    | libtinfo5 #MINVER#, libtinfo5 (<< 6.4~)
    | libtinfo6 #MINVER#, libtinfo6 (<< 6.4~)
    | libtinfo6 #MINVER#, libtinfo6 (<< 6.4~)
    | libx265-199 (>= 3.5), libx265-199 (<< 3.6)

    --
    bye,
    pabs

    https://wiki.debian.org/PaulWise

    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCgAdFiEEYQsotVz8/kXqG1Y7MRa6Xp/6aaMFAmHuDPoACgkQMRa6Xp/6 aaMMqg//dC7E1KTRPkFLqMV/n7Ul2433XBIeb9eWUfeC9j0OGlgRHOi1/aQ5giEk YKZs3uSoybfmAalZ6atOBHQWUK5TDoGNiLZfWTcr0/UsdT95nNHxNUjYn+aa6k/J dA2asNX3z5up2E6O110K54G6M0jFDr/4wMP/qiUtVFqCXaeCTgtfVr8dquPG78Ud Cl5kuiBwsSTTca/KHMoxCR7ol/+8lnbpbqm2Mti2teTsOoqX8aC/drdzJZQwZ5qV xBUpIWFf0QsuP8MiOX0kX3o3FyXJPGcJy8sL/kCPusTXTg+U7QULpLb0mW9nKRSU SqHb12oYNKJCIuR1KXdWkJNRPWlA4DxPQJoKXYeOsEGs4MIcWanmalHl55jckJTn kmoFRO25/i8i1nBr/llRu811kJMYdjs2K5QftEn74PWB68MsAm5GWV0yVkf/LkDE s+1dlzatyUhkkRhMxeFUxCQbv0aLWacn6OCkfhmITzY11i60V3pN+Fpqg+ZParVB eJBVXAUPPlrcI0qBiCC/g7djKPgdsAFzucnCxe1J/zKa6vZZwRJsn3ulQC3qpTQp Q2RTPhpGfGV7k0xFdJQ4VdLfeMROkdeHxpYJTpnbtjhT71B5o7DIOmonKgC4fuXp 2QhDYbDRS6qaosDGfDbj/X5XxFpxWUYzFTaVxakuOMozniQEHx8=
    =DMI5
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Theodore Y. Ts'o@21:1/5 to Paul Wise on Mon Jan 24 19:50:01 2022
    On Mon, Jan 24, 2022 at 10:20:48AM +0800, Paul Wise wrote:
    On Sun, 2022-01-23 at 17:43 -0500, Theodore Y. Ts'o wrote:

    That only works if there are no other packages depending on those
    shared libraries which are coming from other source packages.

    I don't think that is true, I believe you can put multiple things in
    the depends section of an shlibs file and dpkg-shlibdeps will propagate
    that to reverse dependencies just fine. From the manual pages it looks
    like the same applies to the symbols files. I found on my system that
    there are *already* packages that do something similar (see below).

    No, dpkg-shlibsdeps doesn't save you. Again, consider the
    hypothetical package libshaky, which over the period of 9 months, has
    soname changes which generate (over time) packages libshaky3,
    libshaky4, libshaky6, libshaky7, and libshaky8.

    The latest version of libshaky sources will create the binary packages libshaky8, libshaky-bin, and libshaky-dev. Other various external
    packages such as say, shaky-cli uses libshaky4, shaky-gtk uses
    libshaky6, shaky-qt might use libshaky7, etc.

    Now suppose that there is a critical security bug fixed in the latest
    version of libshaky sources. So the security fix is might be fixed in libshaky8, but the same security bug that allows remote code execution
    as well as privileged escalation might apply to libshaky[3467] as
    well, but since the fix was only in the latest version of libshaky,
    you might as well have been using static libraries in libshaky.
    Except that is apparently not allowed by policy. Oops.

    - Ted

    P.S. Let's assume that the reason why SONAME needs to be bumped every
    single time is not because upstream is lazy, and just bumps the SONAME
    "just in case", but because they did a terrible job designing the
    library ABI, and there are complex structures that need to all the
    time because they are exposed in the public headers, yet the
    structures depend on internal implementation details, so they are
    constantly fluid. This is not a hypothetical situation; the openssl
    libraries are very much in the case, and when we were trying to get
    them to agree to create a stable ABI for the Linux Standard Base,
    usptream basically said, "no can do".

    So complex ABI analysis isn't going to help you; you basically have to
    rebuild all of the dependent packages whenever the SONAME gets bumped.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul Gevers@21:1/5 to All on Mon Jan 24 20:50:01 2022
    This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------aQf8L9DPvnR0ZMp0QNjqzF1T
    Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64

    SGkgVGVkLA0KDQpPbiAyNC0wMS0yMDIyIDE5OjQ0LCBUaGVvZG9yZSBZLiBUcydvIHdyb3Rl Og0KPiBObywgZHBrZy1zaGxpYnNkZXBzIGRvZXNuJ3Qgc2F2ZSB5b3UuICBBZ2FpbiwgY29u c2lkZXIgdGhlDQo+IGh5cG90aGV0aWNhbCBwYWNrYWdlIGxpYnNoYWt5LCB3aGljaCBvdmVy IHRoZSBwZXJpb2Qgb2YgOSBtb250aHMsIGhhcw0KPiBzb25hbWUgY2hhbmdlcyB3aGljaCBn ZW5lcmF0ZSAob3ZlciB0aW1lKSBwYWNrYWdlcyBsaWJzaGFreTMsDQo+IGxpYnNoYWt5NCwg bGlic2hha3k2LCBsaWJzaGFreTcsIGFuZCBsaWJzaGFreTguDQo+IA0KPiBUaGUgbGF0ZXN0 IHZlcnNpb24gb2YgbGlic2hha3kgc291cmNlcyB3aWxsIGNyZWF0ZSB0aGUgYmluYXJ5IHBh Y2thZ2VzDQo+IGxpYnNoYWt5OCwgbGlic2hha3ktYmluLCBhbmQgbGlic2hha3ktZGV2LiAg T3RoZXIgdmFyaW91cyBleHRlcm5hbA0KPiBwYWNrYWdlcyBzdWNoIGFzIHNheSwgc2hha3kt Y2xpIHVzZXMgbGlic2hha3k0LCBzaGFreS1ndGsgdXNlcw0KPiBsaWJzaGFreTYsIHNoYWt5 LXF0IG1pZ2h0IHVzZSBsaWJzaGFreTcsIGV0Yy4NCj4gDQo+IE5vdyBzdXBwb3NlIHRoYXQg dGhlcmUgaXMgYSBjcml0aWNhbCBzZWN1cml0eSBidWcgZml4ZWQgaW4gdGhlIGxhdGVzdA0K PiB2ZXJzaW9uIG9mIGxpYnNoYWt5IHNvdXJjZXMuICBTbyB0aGUgc2VjdXJpdHkgZml4IGlz IG1pZ2h0IGJlIGZpeGVkIGluDQo+IGxpYnNoYWt5OCwgYnV0IHRoZSBzYW1lIHNlY3VyaXR5 IGJ1ZyB0aGF0IGFsbG93cyByZW1vdGUgY29kZSBleGVjdXRpb24NCj4gYXMgd2VsbCBhcyBw cml2aWxlZ2VkIGVzY2FsYXRpb24gbWlnaHQgYXBwbHkgdG8gbGlic2hha3lbMzQ2N10gYXMN Cj4gd2VsbCwgYnV0IHNpbmNlIHRoZSBmaXggd2FzIG9ubHkgaW4gdGhlIGxhdGVzdCB2ZXJz aW9uIG9mIGxpYnNoYWt5LA0KPiB5b3UgbWlnaHQgYXMgd2VsbCBoYXZlIGJlZW4gdXNpbmcg c3RhdGljIGxpYnJhcmllcyBpbiBsaWJzaGFreS4NCj4gRXhjZXB0IHRoYXQgaXMgYXBwYXJl bnRseSBub3QgYWxsb3dlZCBieSBwb2xpY3kuICBPb3BzLg0KDQpJIHRoaW5rIHRoaXMgaXMg dGhlIHNlY29uZCB0aW1lIHlvdSB3cml0ZSBzb21ldGhpbmcgbGlrZSB0aGlzLCBidXQgZm9y IA0KZHluYW1pY2FsbHkgbGlua2VkIGxpYnJhcmllcywgdGhlIHJlYnVpbGQgaGFwcGVucyAo YnkgdGhlIFJlbGVhc2UgVGVhbSwgDQoocGxlYXNlIHVzZSB0cmFuc2l0aW9uIHRyYWNrZXJz IGZvciB0aGF0KSBiZWNhdXNlIHdlIGF1dG9tYXRpY2FsbHkgdHJhY2sgDQp0cmFuc2l0aW9u cyBbMV0pLiBVbmxlc3MgcGVvcGxlIGRvbid0IGZvbGxvdyB0aGUgY29udmVudGlvbiB0aGF0 IHlvdXIgDQpiaW5hcnkgbWF0Y2hlcyB0aGUgU09OQU1FLiBCdXQgbm93YWRheXMgd2UgZmlu ZCB0aG9zZSBtb3JlIGFuZCBtb3JlIGR1ZSANCnRvIGF1dG9wa2d0ZXN0IChyZXZlcnNlIGRl cGVuZGVuY2llcyB0aGF0IGZhaWwgYmVjYXVzZSB0aGV5IGNhbid0IGZpbmQgDQp0aGUgYXBw cm9wcmlhdGUgbGlicmFyeSkuIEl0IGJlY29tZXMgaW5jcmVhc2luZ2x5IG1vcmUgZGlmZmlj dWx0IHRvIGhpZGUgDQp0aGUgZmFjdCB0aGF0IHlvdXIgcGFja2FnZSBpcyBub3QgbmFtZWQg YXBwcm9wcmlhdGVseS4NCg0KUGF1bA0KDQpbMV0gaHR0cHM6Ly9yZWxlYXNlLmRlYmlhbi5v cmcvdHJhbnNpdGlvbnMvDQo=

    --------------aQf8L9DPvnR0ZMp0QNjqzF1T--

    -----BEGIN PGP SIGNATURE-----

    wsB5BAABCAAjFiEEWLZtSHNr6TsFLeZynFyZ6wW9dQoFAmHvAowFAwAAAAAACgkQnFyZ6wW9dQpD pQf+MC6MF0uXjGMiGkkUuUHPp4nbntlnhN6Tzfp+OYYePr4HDqmusYHzFUa/Knnd2z91JapgGTde Y6GLoW0N9Gn0oAscqALl2qZTwvvnrLBubL4NvpATxS8JFkVLJh6h9syBbWj0tC5CxE7EVffDT17k kz2v2UKSbcddqFz0aMANuGpecW+Xpax2ezCKQttFrYeBVS0dbbw15vPi3yx/sGifDyQHXBlZ2hiI VZlUVuVhj+NQ+hoymEKeB1vPndtABcWolef8b3m3wmRn+c/VG/JVT0yibbWxtTL2cSY/ugY0JF81 6BgEZjyEx87AefuTDd3rTxgs8gX7Hv/N77ZdUTsoMg==
    =1XlX
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Theodore Y. Ts'o@21:1/5 to Paul Gevers on Tue Jan 25 01:00:02 2022
    On Mon, Jan 24, 2022 at 08:48:28PM +0100, Paul Gevers wrote:
    Hi Ted,

    I think this is the second time you write something like this, but for dynamically linked libraries, the rebuild happens (by the Release Team, (please use transition trackers for that) because we automatically track transitions [1]). Unless people don't follow the convention that your binary matches the SONAME. But nowadays we find those more and more due to autopkgtest (reverse dependencies that fail because they can't find the appropriate library). It becomes increasingly more difficult to hide the
    fact that your package is not named appropriately.

    So could the Release Team figure out a way to automatically rebuild
    packages that have source dependencies on static libraries?

    This would solve the problem of new binary packages causing a full
    ftpmasters policy review of packages, at least for those who need to
    create new binary packages each time SONAME gets bumped.

    - Ted

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andreas Tille@21:1/5 to All on Tue Jan 25 11:00:02 2022
    Am Mon, Jan 24, 2022 at 06:50:17PM -0500 schrieb Theodore Y. Ts'o:

    So could the Release Team figure out a way to automatically rebuild
    packages that have source dependencies on static libraries?

    This would solve the problem of new binary packages causing a full
    ftpmasters policy review of packages, at least for those who need to
    create new binary packages each time SONAME gets bumped.

    If I were a member of the release team I would wait until this thread
    might uncover some statement by ftpmaster whether this full review
    is actually intended or the waiting time is rather caused by the lack
    of an appropriate automatic tool that needs to be written.

    Kind regards

    Andreas.

    --
    http://fam-tille.de

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jonas Smedegaard@21:1/5 to All on Tue Jan 25 22:00:01 2022
    Quoting Vincent Bernat (2022-01-25 21:38:01)
    I didn't comment at first because I thought someone else would raise
    the idea. But it seems people still like the idea of a NEW queue. Not
    me. The NEW queue is a hindrance.

    For the record, I don't "like" the NEW queue.

    I don't like current copyright laws, and I suspect a fair amount of
    people involved in Free Software doesn't.

    I just don't think the solution is to ignore copyright or licensing statements.


    - Jonas

    --
    * Jonas Smedegaard - idealist & Internet-arkitekt
    * Tlf.: +45 40843136 Website: http://dr.jones.dk/

    [x] quote me freely [ ] ask before reusing [ ] keep private --==============)12855289846598588=MIME-Version: 1.0
    Content-Transfer-Encoding: 7bit
    Content-Description: signature
    Content-Type: application/pgp-signature; name="signature.asc"; charset="us-ascii"

    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCgAdFiEEn+Ppw2aRpp/1PMaELHwxRsGgASEFAmHwYs8ACgkQLHwxRsGg ASGsbQ/+KRn01ZVK44Yp3EDrdt5SmO0t/FF7pu89w6EV+Dv5R5ToKRJKaPw91Two HbTfXM2LsvFCq07JDBQPtGeMs8MYhB9FPDWz+7JIgsD56JFrlYoJhoxEN22SBLiu drygZHcWDPN3YIBA4OvCmqAGIMrwE5oik3WcAVWjNZtX2qzAiyCs5FCj/E8SQM+i h/LQv2V8hxPHQVLDBGjPADZapnpYYv9+1KGI12aSeGqHwRj/VdzHqUP1H3Yo5G9L F4IYwn4VSQTn7aEO6/g5MHoEctQ81YwFtvLCljlj4NI+GgN2JY5yQMdRdcyrVCD/ aGLszV0qEnCbF6c8KUQyXVS2retPogyhkXnUMMTpWMXFWQ2FNjtfqaHTr0yGPhR3 VGzTJUXzTDliJmaoyv6/TFh7VRjsWzwrJnP4OfO1gNlkOz2Z08OoyYKuqljZ3xTe IqKnjeXfqvq9RZQujXRYqqiZmXBM5ES4qQ8NOgOlayB9Zl1L9M2zCkdPqiDM45Nv hlx3G+Il3dopEq+xB
  • From Vincent Bernat@21:1/5 to All on Tue Jan 25 21:50:03 2022
    ❦ 21 January 2022 09:51 -05, M. Zhou:

    I'd rather propose choice C. Because I to some extent understand
    both sides who support either A or B. I maintain bulky C++ packages,
    and I also had a little experience reviewing packages on behalf of
    ftp-team.

    I didn't comment at first because I thought someone else would raise the
    idea. But it seems people still like the idea of a NEW queue. Not me.
    The NEW queue is a hindrance. I have stopped contributing to Python
    stuff for this reason. Packaging something can take weeks because you
    need to upload one package, wait for it to be reviewed, then package the
    next one, etc. You could upload many packages at once, but it makes
    testing and building more difficult. New contributors may just give up
    by the time their first package is accepted. I think we have many
    unmaintained packages for this reason (no real stats on my side, but
    when a package is several versions late, it's usually a sponsored upload
    or one of my packages).

    I would propose that there should be a reputation system. You can get
    points by uploading stuff without issues and lose them if there are
    errors. If you have enough points, you can spend them to skip the check.
    But someone would have to implement it and the team being understaffed
    for whatever reason (and maybe not convinced by this system), I know
    this won't be done (we don't have PPA because FTP team wants to
    implement it but no time, we don't have autosigned packages because
    nobody has time to implement it, etc).

    For me, the copyright check is just a bad excuse. People upload non-distributable stuff everywhere and it seems the world continue to go
    round. What amount of non-distributable packages is stopped by the NEW
    queue?

    I think we should forego the NEW queue. If people want to check
    packages, they can do it once they are in unstable with regular bugs.
    Current checks are partly done by Lintian and I suppose people could
    watch new Lintian warnings and detect bad packages quickly. This could
    be done when src is not NEW as a test. People could loose their upload
    rights if they are caught abusing the system (and get DM rights for some selected packages instead). This could be opt-in if people find this
    idea offensive.
    --
    Avoid temporary variables.
    - The Elements of Programming Style (Kernighan & Plauger)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Russ Allbery@21:1/5 to Jonas Smedegaard on Tue Jan 25 22:50:01 2022
    Jonas Smedegaard <jonas@jones.dk> writes:

    I just don't think the solution is to ignore copyright or licensing statements.

    That's not the goal. The question, which keeps being raised in part
    because I don't think it's gotten a good answer, is what the basis is for treating copyright and licensing bugs differently than any other bug in
    Debian?

    The need for pre-screening was obvious when we had export control issues,
    but my understanding is that those have gone away. Are we working from
    legal advice telling us that this pre-screening is required for some legal purpose? If so, is it effective for the legal purpose at which it is
    aimed? Is this system left over from old advice? Have we checked our assumptions recently?

    NEW processing is a lot of friction for the project as a whole and a lot
    of work for the ftp team. If we were able to do less work at the cost of
    a minimal increase in bugs, or at the cost of handling bugs a bit
    differently, maybe that would be a good thing?

    In other words, it's unclear what requirements we're attempting to meet
    and what the basis of those requirements is, which makes it hard to have a conversation about whether the current design is the best design for the problem we're trying to solve.

    --
    Russ Allbery (rra@debian.org) <https://www.eyrie.org/~eagle/>

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Vincent Bernat@21:1/5 to just file regular bugs. I on Tue Jan 25 22:20:02 2022
    ❦ 25 January 2022 21:51 +01, Jonas Smedegaard:

    I didn't comment at first because I thought someone else would raise
    the idea. But it seems people still like the idea of a NEW queue. Not
    me. The NEW queue is a hindrance.

    For the record, I don't "like" the NEW queue.

    I don't like current copyright laws, and I suspect a fair amount of
    people involved in Free Software doesn't.

    I just don't think the solution is to ignore copyright or licensing statements.

    I mentioned it. No need to ignore, just file regular bugs. I said:

    For me, the copyright check is just a bad excuse. People upload non-distributable stuff everywhere and it seems the world continue to
    go round. What amount of non-distributable packages is stopped by the
    NEW queue?
    --
    Use the "telephone test" for readability.
    - The Elements of Programming Style (Kernighan & Plauger)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Erik Huelsmann@21:1/5 to All on Tue Jan 25 23:00:02 2022
    Hi Russ,

    I just don't think the solution is to ignore copyright or licensing statements.

    That's not the goal. The question, which keeps being raised in part
    because I don't think it's gotten a good answer, is what the basis is for treating copyright and licensing bugs differently than any other bug in Debian?

    Sorry to barge in (not being a Debian dev): Having seen this
    discussion go back and forth on the topic, I agree that this is the
    question. However, after all these mails - including yours - I'm left
    with: Posing the question is one thing, but getting it answered is
    another. Is there anybody specifically more likely to have an answer
    here than anybody else? And if so, is that person/group involved in
    this discussion now? If not, shouldn't they be made aware of it?

    The need for pre-screening was obvious when we had export control issues,
    but my understanding is that those have gone away. Are we working from
    legal advice telling us that this pre-screening is required for some legal purpose? If so, is it effective for the legal purpose at which it is
    aimed? Is this system left over from old advice? Have we checked our assumptions recently?

    NEW processing is a lot of friction for the project as a whole and a lot
    of work for the ftp team. If we were able to do less work at the cost of
    a minimal increase in bugs, or at the cost of handling bugs a bit differently, maybe that would be a good thing?

    In other words, it's unclear what requirements we're attempting to meet
    and what the basis of those requirements is, which makes it hard to have a conversation about whether the current design is the best design for the problem we're trying to solve.


    --
    Bye,

    Erik.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Gard Spreemann@21:1/5 to Jonas Smedegaard on Wed Jan 26 11:00:02 2022
    Jonas Smedegaard <jonas@jones.dk> writes:

    Quoting Vincent Bernat (2022-01-25 21:38:01)
    I didn't comment at first because I thought someone else would raise
    the idea. But it seems people still like the idea of a NEW queue. Not
    me. The NEW queue is a hindrance.

    For the record, I don't "like" the NEW queue.

    I don't like current copyright laws, and I suspect a fair amount of
    people involved in Free Software doesn't.

    I just don't think the solution is to ignore copyright or licensing statements.

    To me, the elephant in the room is this question: Does the way the NEW
    queue currently works provide good (good enough?) assurances to
    ourselves that we are *not* ignoring copyright or licensing?

    It feels like we are answering "yes" based on the amount of heroic work
    the FTP masters put in, and the amount of waiting developers have to
    suffer through. We're gauging our solution to a problem solely by the
    amount of effort, sweat and tears we put in, so to speak.


    Best,
    Gard


    --=-=-Content-Type: application/pgp-signature; name="signature.asc"

    -----BEGIN PGP SIGNATURE-----

    iQJGBAEBCgAwFiEEz8XvhRCFHnNVtV6AnRFYKv1UjPoFAmHxGS0SHGdzcHJAbm9u ZW1wdHkub3JnAAoJEJ0RWCr9VIz6mRUP/23mqIR5MLh3PC9HcV+4/pKwskBzgpxR JYsP0rd302hCmvUKJe9yv4Fmpvshide7MXfIB46KmREaV94micpewWp4F5Y9zrgA M5I9Q0i2gsrFtx5uY52Mlkc9Sg9BwTFi/y+JEhp3LiXO0GP2QANcWqa/2VUFkTK9 IyrHeK7ZKmErEzir8J5Jf9BJgJwBOeLHAobnE6LIEC+cL9SUxMOb3QJ4LnXZ7riI GiHoTu7Inhsgk6KyA5R5all6oO9IVHT0SbpekzGP1Vla8x2eZkjGp1K6eAvWkkm5 N+UP+wyJtoRAP6/b6ryKjib5q13SkY62VO0ZpAfBke9S3+VJ5D0ZNDzgS7NTxK7F ZvTxM/05ptOJUrvszrqxiMhT4I6QUdv5ISnlBoC0opmnr/m2pdeATsAXVDLZCz5s KZmswu9gq1ORyWEER5c+gll2GPGtobGjULzKuJuE3OlneqB/MNM7CSVNca0dfGtC gxaI0B/FnIVjBb9fmd9U813u4ZpTPmcDY/rwAC/NxrmnhH14sfnmq7hcP73etVaL 4MiNZMOqSB6AS+Ea1UFLVmy0lEMrg1/bbyZbbatdJdKk+QdctXRyfjLwq6ZWQZdm 5a/F4Gyk6+KXNgyd9qKsi72l84nlMOGkzt1M2Qz139yr7VIh+r6Np+rIP8jRGqPs
    pNezj0xk0eTG
    =PUCM
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Adam Borowski@21:1/5 to Vincent Bernat on Wed Jan 26 11:50:01 2022
    On Tue, Jan 25, 2022 at 09:38:01PM +0100, Vincent Bernat wrote:
    For me, the copyright check is just a bad excuse. People upload non-distributable stuff everywhere and it seems the world continue to go round. What amount of non-distributable packages is stopped by the NEW
    queue?

    I think we should forego the NEW queue. If people want to check
    packages, they can do it once they are in unstable with regular bugs.

    Without the NEW queue, there would be no point at which packaging receives
    any sort of review. I'd prefer Debian to deliver at least some level of quality.

    Otherwise, we'd fall to the level of NPM. And there's ample examples what
    that would mean.

    Current checks are partly done by Lintian and I suppose people could
    watch new Lintian warnings and detect bad packages quickly.

    Lintian is just a dumb machine that can ease human reviews but not replace them.

    This could be done when src is not NEW as a test.

    I've managed to trample upon someone else's package just yesterday -- and it escaped automated checks because a binary of that name already existed in
    the archive, just not on any arch which I test.


    Meow!
    --
    ⢀⣴⠾⠻⢶⣦⠀ Aryans: split from other Indo-Europeans ~2900-2000BC → Ural →
    ⣾⠁⢠⠒⠀⣿⡁ Bactria → settled 2000-1000BC in northwest India. ⢿⡄⠘⠷⠚⠋⠀ Gypsies: came ~1000AD from northern India; aryan. ⠈⠳⣄⠀⠀⠀⠀ Germans: IE people who came ~2800BC to Scandinavia; not aryan.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Adam Borowski@21:1/5 to Gard Spreemann on Wed Jan 26 11:50:02 2022
    On Wed, Jan 26, 2022 at 10:44:37AM +0100, Gard Spreemann wrote:
    Jonas Smedegaard <jonas@jones.dk> writes:
    Quoting Vincent Bernat (2022-01-25 21:38:01)
    I didn't comment at first because I thought someone else would raise
    the idea. But it seems people still like the idea of a NEW queue. Not
    me. The NEW queue is a hindrance.

    I don't like current copyright laws, and I suspect a fair amount of
    people involved in Free Software doesn't.

    I for one consider copyright theft, a crime against humanity[1], and a waste
    of time. Any second spent dealing with copyright is a second not spent adding features or fixing technical bugs.

    For practical reasons we have to obey the laws, no matter how oppressive
    they are. But I don't see why we should do more than eg. Fedora which
    has corporate backing with an actual legal team.

    For those of you without a Fedora box at hand, I made a tarball:
    https://angband.pl/tmp/fedora-licenses.tar.xz
    This is so less than we do!

    I just don't think the solution is to ignore copyright or licensing statements.

    On the other hand, "grep -r Copyright|uniq" plus a copy of non-standard licenses would be enough.

    To me, the elephant in the room is this question: Does the way the NEW
    queue currently works provide good (good enough?) assurances to
    ourselves that we are *not* ignoring copyright or licensing?

    I think the NEW review is much needed, and currently grossly inadequate
    -- and that's because 95% of the FTPmaster time being spent on copyright
    crap rather than technical matters.


    Meow!

    [1]. The needs of a human go into two groups: 1. those shared with
    non-human animals (food, air, freedom, shelter, reproduction, not being
    killed, not being hurt, etc), and 2. those dependant on transmission
    of ideas. And transmission of ideas is directly hindered by copyright.
    --
    ⢀⣴⠾⠻⢶⣦⠀ Ash nazg durbatulûk,
    ⣾⠁⢠⠒⠀⣿⡁ ash nazg gimbatul,
    ⢿⡄⠘⠷⠚⠋⠀ ash nazg thrakatulûk
    ⠈⠳⣄⠀⠀⠀⠀ agh burzum-ishi krimpatul.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stephan Lachnit@21:1/5 to kilobyte@angband.pl on Wed Jan 26 13:00:02 2022
    On Wed, Jan 26, 2022 at 11:43 AM Adam Borowski <kilobyte@angband.pl> wrote:

    On Tue, Jan 25, 2022 at 09:38:01PM +0100, Vincent Bernat wrote:

    I think we should forego the NEW queue. If people want to check
    packages, they can do it once they are in unstable with regular bugs.

    Without the NEW queue, there would be no point at which packaging receives any sort of review. I'd prefer Debian to deliver at least some level of quality.

    Otherwise, we'd fall to the level of NPM. And there's ample examples what that would mean.

    I disagree with the comparison to NPM. Simply because not everyone can
    upload - you have to be DD or DM to do that, which means you have to
    go through a non-trivial process where it is checked that you know
    what you do. As of right now, a malicious acting DD can already upload
    harmful packages without NEW stopping this at all.

    Regards,
    Stephan

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alec Leamas@21:1/5 to Adam Borowski on Wed Jan 26 13:10:01 2022
    Hi,

    Not a DD, still raising my voice. I'm *not* advocating that Fedora's
    processes are "better", just trying to add ideas.

    On 26/01/2022 11:43, Adam Borowski wrote:
    On Tue, Jan 25, 2022 at 09:38:01PM +0100, Vincent Bernat wrote:

    I think we should forego the NEW queue. If people want to check
    packages, they can do it once they are in unstable with regular bugs.

    Without the NEW queue, there would be no point at which packaging receives any sort of review. I'd prefer Debian to deliver at least some level of quality.

    Perhaps wrong to focus on the queue as such. The focus should be the
    need for a manual review -- this is IMHO the important point.

    The current ftpmaster review model is somehow modeled after a
    "supervisor" idea. Fedora uses peer reviews. The advantage is the
    incentive to make reviews: I can review your package if you review
    mine. One could of course imagine that this would lead to sloppy
    reviews. However, this is not my experience.

    It also means a more transparent process.


    Otherwise, we'd fall to the level of NPM. And there's ample examples what that would mean.

    Indeed.

    Current checks are partly done by Lintian and I suppose people could
    watch new Lintian warnings and detect bad packages quickly.

    Lintian is just a dumb machine that can ease human reviews but not replace them.


    Yes. It's interesting to compare to Fedora's tooling fedora-review which
    has another focus: It outputs list of things to check when reviewing a
    package. Some of those are automatically checked, others are just a
    checkbox which should be manually checked. Lintian is a good tool, but
    not IMHO a review support.


    This could be done when src is not NEW as a test.

    I've managed to trample upon someone else's package just yesterday -- and it escaped automated checks because a binary of that name already existed in
    the archive, just not on any arch which I test.


    Yes, one of those manual checks...

    On 26/01/2022 11:29, Adam Borowski wrote:

    For practical reasons we have to obey the laws, no matter how oppressive they are. But I don't see why we should do more than eg. Fedora which
    has corporate backing with an actual legal team.

    Also note that this legal team *not* is used to review all packages.
    Instead, they are a resource which are contacted by packagers when we
    need advice. The typical situation is in a (peer) review where things
    cannot be settled. The legal team also files bugs as required, and
    maintain the packaging manual's copyright part.

    Of course, this creates a very different social relation between the
    legal team and the rest.

    Just my 5 öre
    --alec

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Gard Spreemann@21:1/5 to Adam Borowski on Wed Jan 26 13:10:01 2022
    Adam Borowski <kilobyte@angband.pl> writes:

    On Tue, Jan 25, 2022 at 09:38:01PM +0100, Vincent Bernat wrote:
    For me, the copyright check is just a bad excuse. People upload
    non-distributable stuff everywhere and it seems the world continue to go
    round. What amount of non-distributable packages is stopped by the NEW
    queue?

    I think we should forego the NEW queue. If people want to check
    packages, they can do it once they are in unstable with regular bugs.

    Without the NEW queue, there would be no point at which packaging receives any sort of review. I'd prefer Debian to deliver at least some level of quality.

    Otherwise, we'd fall to the level of NPM. And there's ample examples what that would mean.

    Is this not the job of the Policy and of community self-policing by
    means of RC bugs?


    Best,
    Gard

    --=-=-Content-Type: application/pgp-signature; name="signature.asc"

    -----BEGIN PGP SIGNATURE-----

    iQJGBAEBCgAwFiEEz8XvhRCFHnNVtV6AnRFYKv1UjPoFAmHxN/8SHGdzcHJAbm9u ZW1wdHkub3JnAAoJEJ0RWCr9VIz6Hy0P/iMCrp6NiNCFyaZW+rDPEpnj3bLTpJeO ve/vW4otNYudfz1Qldb65XmtDC6WoZ7gztkPWGxMFGwahR1gee5rCBedDx902gv+ D8dwdQrZmE4OFs222UPEc175vQ0Ss4Lx9pm/gnuQxdVrVBM2YVNQWzJK5hEWRXod P9Zw+0xNpmrI7zq/kqUVTHbCOycBZAhCGpX0Awc3kopNHeD9aPFPXZ06Msy93J/w 59zNOPqqWdylO2wmFunmZnxhou6YtY1nfzdTl7kJntvjo5wfLDMwUr6XVQbtBqfk 5Y2souxr9d22o2OI4RnYNPAMXh5B4fYCn1CItDhm3wW3213jyxjm090CIS+dKrVX 9P2k2bEAiiilBusoK3v7aimbC9vcCdu7oOA6WrAn3ahkX04+GtDtZNew3m8c2hA9 LsnDsKvWLed5dnlsLK4zPOctRKDvYcnENpa9u45TyILx36BN4TfjDVD6FvwgPeEP i9uBrM68r9s8QcuDjKyEkIEtuLJPD/k3OnhSBUOfvIlGI241HoPHwPfDEmFGHAw9 u6WdPCowsIgWoj+W+UBFMqeNGWUumLga/oKL5RKQuQEd4pilIU7ofDWfDuYEZrRb ak6VU5JUIecYnEJr/t3sJO+7Iukd5GxZe4Y2SwfJNn0FJJy34+XvURP778Wuay/O
    TU3Z73LYX7LW
    =SYfS
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Felipe Sateler@21:1/5 to Vincent Bernat on Wed Feb 9 13:30:01 2022
    On Tue, 25 Jan 2022 21:38:01 +0100, Vincent Bernat wrote:


    I think we should forego the NEW queue. If people want to check
    packages, they can do it once they are in unstable with regular bugs.
    Current checks are partly done by Lintian and I suppose people could
    watch new Lintian warnings and detect bad packages quickly. This could
    be done when src is not NEW as a test. People could loose their upload
    rights if they are caught abusing the system (and get DM rights for some selected packages instead).

    +1. If we have a good remediation mechanism, this bottleneck is not
    necessary.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)