From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1N6wXz-0002np-3S for garchives@archives.gentoo.org; Sun, 08 Nov 2009 01:26:27 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id E5BA2E0943; Sun, 8 Nov 2009 01:26:25 +0000 (UTC) Received: from mail-iw0-f187.google.com (mail-iw0-f187.google.com [209.85.223.187]) by pigeon.gentoo.org (Postfix) with ESMTP id CA2E7E0943 for ; Sun, 8 Nov 2009 01:26:25 +0000 (UTC) Received: by iwn17 with SMTP id 17so1602690iwn.10 for ; Sat, 07 Nov 2009 17:26:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:content-type; bh=agXpiHnaGNnuPBbSfTd9sSqJA021cPNCjjJ+3ZOGtV8=; b=IjnHk3eDl4xtUFTve/79lQdLuSHhk5AdmMbUikbO3n+9VnOdjM0hyzkXPr2b2uPjJD a1FpJYE1LR/7wq9W7k+gb5LJweDQPTQmfoytUTJZmjeUE7o9HYQuLyACliu2Y1hSL5cA JlED7wd837eajzKi7xTAYGNCxskRdjQUHz3UA= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; b=UhasDZCN7YCDShKJ6tbGOkskCcLfmuS9lq9krzCVsNdYntUN9U50QqoQ310y7oHW9y s9jdd28sl4d3c+9bNfOsH5NaaoY7GfEyIK8pZn4H3zx50VJM9hlH0gg8TO5z7HjOdNtJ tr2RuhnI6VxEfQ71VYC0iXfMkyGBdLO1MSWH8= Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-dev@lists.gentoo.org Reply-to: gentoo-dev@lists.gentoo.org MIME-Version: 1.0 Received: by 10.231.29.149 with SMTP id q21mr442971ibc.35.1257643585574; Sat, 07 Nov 2009 17:26:25 -0800 (PST) In-Reply-To: <8b4c83ad0911071608n7ebc31dcy6e7eb1d9470b3067@mail.gmail.com> References: <200911071824.16651.scarabeus@gentoo.org> <20091107180322.GA23301@linux1> <20091107193312.5df04226@gentoo.org> <8b4c83ad0911071608n7ebc31dcy6e7eb1d9470b3067@mail.gmail.com> Date: Sun, 8 Nov 2009 14:26:25 +1300 Message-ID: <8cd1ed20911071726k7d2817fcn66b2db3851b7d37d@mail.gmail.com> Subject: Re: [gentoo-dev] Re: QA: package.mask policies From: Kent Fredric To: gentoo-dev@lists.gentoo.org Content-Type: multipart/alternative; boundary=00151774051c2c17030477d1f7c0 X-Archives-Salt: 933c282c-f34a-47ab-a83a-20fa38388475 X-Archives-Hash: fae7ac1b2639e9ab783f1726e90ef932 --00151774051c2c17030477d1f7c0 Content-Type: text/plain; charset=ISO-8859-1 On Sun, Nov 8, 2009 at 1:08 PM, Nirbheek Chauhan wrote: > On Sun, Nov 8, 2009 at 12:33 AM, Duncan <1i5t5.duncan@cox.net> wrote: > > 2) That won't necessarily stop the bugs from rolling in. Some devs may > > get tired of live pkg bugs and package.mask it, thus putting up a double- > > barrier to the live ebuild. If users jump BOTH barriers and fall over > > the ledge, well... maybe they /need/ that Darwin Award! =:^] > > > > We had something interesting happen with policykit. It was masked for > a very long time, and so all users of policykit had > "sys-auth/policykit" in p.unmask. Then it was unmasked, but of course > who bothers cleaning up their local configuration as long as it works? > > Months later, policykit-0.92 was added (masked) which was ABI, API, > UI, everything incompatible. Naturally portage on said users' boxes > was very happy to see such an update on the system and it very > promptly upgraded policykit. > > And of course it completely hosed everything on top of X. > > We received bug reports for this a *long* time after adding it. After > getting sick of duping, and since the new ebuild was broken in a few > ways too (and we had decided to rename policykit-0.92 it to > sys-auth/polkit), we finally decided to remove it. > > Lesson to be learnt: users are morons with short attention spans[1]. > But we cannot ignore that fact. > > > In such cases users should be using version specific/version ranges for p.keywords/p.unmask. I don't recall seeing much literature on this practice though with regards to standard recommendations of users and how they should use their own p.keywords and p.unmask. Maybe a good standard practice would be to *not* use ranged p.masks and have explicit =version p.masks, so that users who use the commonly available scripts that just copy from p.mask to p.unmask don't get silently bitten as a consequence. -- Kent perl -e "print substr( \"edrgmaM SPA NOcomil.ic\\@tfrken\", \$_ * 3, 3 ) for ( 9,8,0,7,1,6,5,4,3,2 );" http://kent-fredric.fox.geek.nz --00151774051c2c17030477d1f7c0 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable On Sun, Nov 8, 2009 at 1:08 PM, Nirbheek Chauhan <nirbheek@gentoo.org> wrote= :
On Sun, Nov 8, 2009 at 12:33 AM, Duncan <1i5t5.duncan@cox.net> wrote:
> 2) That won't necessarily stop the bugs from rolling in. =A0Some d= evs may
> get tired of live pkg bugs and package.mask it, thus putting up a doub= le-
> barrier to the live ebuild. =A0If users jump BOTH barriers and fall ov= er
> the ledge, well... maybe they /need/ that Darwin Award! =3D:^]
>

We had something interesting happen with policykit. It was masked for=
a very long time, and so all users of policykit had
"sys-auth/policykit" in p.unmask. Then it was unmasked, but of co= urse
who bothers cleaning up their local configuration as long as it works?

Months later, policykit-0.92 was added (masked) which was ABI, API,
UI, everything incompatible. Naturally portage on said users' boxes
was very happy to see such an update on the system and it very
promptly upgraded policykit.

And of course it completely hosed everything on top of X.

We received bug reports for this a *long* time after adding it. After
getting sick of duping, and since the new ebuild was broken in a few
ways too (and we had decided to rename policykit-0.92 it to
sys-auth/polkit), we finally decided to remove it.

Lesson to be learnt: users are morons with short attention spans[1].
But we cannot ignore that fact.



In such cases users should be using version s= pecific/version ranges for p.keywords/p.unmask.

I don't recall s= eeing much literature on this practice though with regards to standard reco= mmendations of users and how they should use their own p.keywords and p.unm= ask.

Maybe a good standard practice would be to *not* use ranged p.masks and= have explicit =3Dversion p.masks, so that users who use the commonly avail= able scripts that just copy from p.mask=A0 to p.unmask don't get silent= ly bitten as a consequence.
=A0
--
Kent

perl -e =A0"print substr( \&quo= t;edrgmaM =A0SPA NOcomil.ic\\@tfrken\", \$_ * 3, 3 ) for ( 9,8,0,7,1,6= ,5,4,3,2 );"

http:/= /kent-fredric.fox.geek.nz
--00151774051c2c17030477d1f7c0--