• Epoch for src:fuse-ext2 to replace src:fuse-umfuse-ext2's fuseext2 bina

    From =?utf-8?B?0L3QsNCx?=@21:1/5 to All on Sun Oct 20 20:20:01 2024
    Hi!

    I'd like to use an epoch so I'm asking for consensus per policy 5.6.12.

    As part of the Salvage Team's trixie view-os removal plan ‒
    RM: umview -- RoQA; obsolete, low popcon #1085454
    RM: fuse-umfuse-ext2 -- RoQA; dead upstream, low popcon #1085457
    + replace with https://github.com/alperakcan/fuse-ext2
    RM: umview-mod-umfusefat [amd64 i386 ppc64] -- RoQA; view-os removed ITS #1085458 (2024-11-09); https://github.com/virtualsquare/fusefatfs/pull/2
    RM: fuse-umfuse-iso9660 -- RoQA; dead upstream, duplicates fuseiso #1085456
    + implement "fuseiso -o fuseopt -o fuseopt iso mtpt" in fuseiso #1083034
    (currently only accepts "fuseiso iso mtpt -o fuseopt -o fuseopt")
    have that provide a transitional package (sge@ contacted thus)
    ‒ fuseext2 is to be provided by https://github.com/alperakcan/fuse-ext2 instead of src:fuse-umfuse-ext2.

    The current version of src:fuse-umfuse-ext2 in sid is 0.4-1.5,
    and the current version of https://github.com/alperakcan/fuse-ext2 is 0.0.11, so src:fuse-ext2 would need to be version 1:0.0.11-1 to update right.

    Thoughts?
    наб

    Keep me in CC please.

    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCgAdFiEEfWlHToQCjFzAxEFjvP0LAY0mWPEFAmcVRgEACgkQvP0LAY0m WPGoVg/9FU/i9bH1PFw7n9i+dHQ+bSA2wEFmBqNmaVA7LbKDjxfhwiG9cny/UreZ fW24VX1IkgL9X50WS9HXWfiKrHy+1rnjW6pPHf5U7HJEDWu0MFwGkhQo6JvP/3p+ WlKYVKu7L2hPDXPz3R4CbrEv/e96DWIBne2o4MN6F5uNgjWDNCfJ4UE2oCqrETnc BTz3boJ87QdAKrvcMN50X/Q6gAqWHwcC2+150RrZjp4luc5ClRrJvpI4Ks+iW1WJ KwmoamQFEFLFkfpdiw3gzfGGVJlYQNWeTUDKjAcMyy0aa0ocrtjwrYcUy4v8sC3a I9k93XHFFQmTFwr59SkxBETcq1Dw+gcxsp3PB6+8va92F6vCT/RX+K4cHZ75+eCH 9cxXEpBKzoC2so2w7GFQcbxX4+4pHvU9H4io8DPICF8ikZUo/uQagJnrbbbAchSl PgoXItidsH51YmR14tmfOx4s/ynNA0dwW+U7T8MnodZ7qQj+zUY4rChcclAVLnSv 0SPL47tqVrF17XbmNQSikQ2idsNu/fRmwMaLpC0J3Iqiq22KpJcyQ0beSabbW8TG BgL73oBgljKBl/YuJjj2XAiHaGj6UJ3vLy9mS+AnDUm+oJIYotp9n7Mn29vwTDbW 9EOk5Y/N1qwh6nvJvUIjlfWKYkyGashlriAkUNUUdkRfPBdjqS8=
    =5Tkl
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Ben Hutchings@21:1/5 to All on Sun Oct 20 23:50:01 2024
    On Sun, 2024-10-20 at 20:03 +0200, наб wrote:
    Hi!

    I'd like to use an epoch so I'm asking for consensus per policy 5.6.12.

    As part of the Salvage Team's trixie view-os removal plan ‒
    RM: umview -- RoQA; obsolete, low popcon #1085454
    RM: fuse-umfuse-ext2 -- RoQA; dead upstream, low popcon #1085457
    + replace with https://github.com/alperakcan/fuse-ext2
    RM: umview-mod-umfusefat [amd64 i386 ppc64] -- RoQA; view-os removed ITS #1085458 (2024-11-09); https://github.com/virtualsquare/fusefatfs/pull/2
    RM: fuse-umfuse-iso9660 -- RoQA; dead upstream, duplicates fuseiso #1085456
    + implement "fuseiso -o fuseopt -o fuseopt iso mtpt" in fuseiso #1083034
    (currently only accepts "fuseiso iso mtpt -o fuseopt -o fuseopt")
    have that provide a transitional package (sge@ contacted thus)
    ‒ fuseext2 is to be provided by https://github.com/alperakcan/fuse-ext2 instead of src:fuse-umfuse-ext2.

    The current version of src:fuse-umfuse-ext2 in sid is 0.4-1.5,
    and the current version of https://github.com/alperakcan/fuse-ext2 is 0.0.11, so src:fuse-ext2 would need to be version 1:0.0.11-1 to update right.

    Thoughts?

    Given that fuse-ext2's README says "please do not mount your
    filesystems with write support unless you have nothing to lose", is it
    really suitable to replace the current implementation?

    Perhaps it would be better not to provide any replacement until fuse-
    ext2 is more mature - at which point its version may have increased
    such that an epoch is not necessary.

    Ben.

    --
    Ben Hutchings
    Usenet is essentially a HUGE group of people passing notes in class.
    - Rachel Kadel, `A Quick Guide to Newsgroup Etiquette'


    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCgAdFiEErCspvTSmr92z9o8157/I7JWGEQkFAmcVeJgACgkQ57/I7JWG EQmY4Q//Qfb5ub8GtSuzM3pmCBFEGYq42u5Ep42d4HFIuBzdni3y1LyzBlwPInxh UhltY6ZqK7TAcb35Uns/In2tcyUvm8Eveh1oD4viUQhT15GA5Ya08oCw8TQdEqrq hXo8kw44pn0eMhpxxXrLu5gwbaeW3mfj3r7l+xJ9JXNEq/J4Ci41+5w3/c/TOxGN xkydOgKoKDVwX3n3sFeEpIk2aMyYwPGU0k/K4Wp0exhV60cQQUbelf9+EvGjIeln Kudb091gkuKGOeFWwIYh7OAMpHX7+M1fM2/4KozKp5MQEXqW3kRBypwgg/wtjZNQ WYTwsMuv581U0eUm5lR7gxyYKIZX5j5D3pZD2G84ZWpPoclRHyCH0UohJH68vxc5 nJkzhf6c+8EbOKk1IzBYT/w1Kfklyh4MO7/KVD9xwmlNWVkhc6C6/66bh7GHSvuN C/zriMoQWLo+iHzB1XUlBTpPCpsjpjKms3fcTO+xNEaRc+nuE5PZh8u1Xr4uuq/Q EJ2VQP0mWaE9C3GDQ1OYON/DmVrGLh1Wv8hoPokJuEmi8yxTjYkARMkYTyU4eg0A nsziHMf4NB0aatLdugBWju5+4XiKAT2ywkl9cbvCx3A3cYjxYwu12yeRVOlbRh1t GvI9gBIJBxdAacBw0//bECZTklyia5xv4pmFbRIscJBWXMqs2VQ=
    =l+jk
    -----END PGP SIGNATURE-----

    --- So
  • From =?utf-8?B?0L3QsNCx?=@21:1/5 to Ben Hutchings on Mon Oct 21 01:00:01 2024
    On Sun, Oct 20, 2024 at 11:39:36PM +0200, Ben Hutchings wrote:
    On Sun, 2024-10-20 at 20:03 +0200, наб wrote:
    I'd like to use an epoch so I'm asking for consensus per policy 5.6.12.

    As part of the Salvage Team's trixie view-os removal plan ‒
    RM: umview -- RoQA; obsolete, low popcon #1085454
    RM: fuse-umfuse-ext2 -- RoQA; dead upstream, low popcon #1085457
    + replace with https://github.com/alperakcan/fuse-ext2
    RM: umview-mod-umfusefat [amd64 i386 ppc64] -- RoQA; view-os removed ITS #1085458 (2024-11-09); https://github.com/virtualsquare/fusefatfs/pull/2
    RM: fuse-umfuse-iso9660 -- RoQA; dead upstream, duplicates fuseiso #1085456
    + implement "fuseiso -o fuseopt -o fuseopt iso mtpt" in fuseiso #1083034
    (currently only accepts "fuseiso iso mtpt -o fuseopt -o fuseopt")
    have that provide a transitional package (sge@ contacted thus)
    ‒ fuseext2 is to be provided by https://github.com/alperakcan/fuse-ext2 instead of src:fuse-umfuse-ext2.

    The current version of src:fuse-umfuse-ext2 in sid is 0.4-1.5,
    and the current version of https://github.com/alperakcan/fuse-ext2 is 0.0.11,
    so src:fuse-ext2 would need to be version 1:0.0.11-1 to update right.

    Thoughts?

    Given that fuse-ext2's README says "please do not mount your
    filesystems with write support unless you have nothing to lose", is it
    really suitable to replace the current implementation?
    The current implementation's README also says this, so I'd say so, yeah
    (the manuals for both clearly indicate that R/W mounts are experimental).

    The similarity was too good to be accidental, and seemingly, per
    https://sourceforge.net/p/view-os/code/HEAD/tree/trunk/fuse-modules/fuse-umfuse-ext2/
    fuse-umfuse-ext2 is actually just a fork of fuse-ext2:
    ------------------------------------------------------------------------
    r1119 | rd235 | 2013-09-01 16:01:35 +0200 (Sun, 01 Sep 2013) | 2 lines

    Autotools bugfix (new versions require AM_PROG_CC_C_O and AM_PROG_AR, tnx phra)

    ------------------------------------------------------------------------
    r1077 | garden | 2012-06-24 16:30:45 +0200 (Sun, 24 Jun 2012) | 1 line

    Add dist-bzip2 to automake options.
    ------------------------------------------------------------------------
    r1076 | garden | 2012-06-24 16:19:35 +0200 (Sun, 24 Jun 2012) | 1 line

    Set version to 0.4 instead of 0.4.0.
    ------------------------------------------------------------------------
    r1069 | rd235 | 2012-06-24 14:40:01 +0200 (Sun, 24 Jun 2012) | 2 lines

    fuse-ext2: man page added. version updated.

    ------------------------------------------------------------------------
    r1067 | rd235 | 2012-05-13 11:54:35 +0200 (Sun, 13 May 2012) | 3 lines

    fuse-umfuse-ext2 is a fork of fuse-ext2 for linux only.

    r1067 has a changelog that matches
    https://github.com/alperakcan/fuse-ext2/commit/789d5ee3dd414ef5b832dc1218c9fe86e1bebb48
    (untagged, 22 Jun 2009, "0.0.6.0"),
    except view-os calls it 0.3.8 in configure.ac for an unstated reason.

    None of the later revisions meaningfully change much of anything,
    but r1067 itself carries quite a large diff against 789d5ee.
    A diff that to a large extent seems to correspond to
    https://github.com/alperakcan/fuse-ext2/commit/792239a4b5ddb6bd5206f444181ef415152fb6a2
    (September 2009, so the timeline matches? kinda?
    not sure what the 2012 is doing here given that fuse-ext2 imports
    a derivative of the manual from r1069 in another Sep 2009 commit).

    The next entry in the fuse-ext2 changelog is
    151781ff (Alper Akcan 2009-09-06 21:04:38 +0000 54) - view-os compatibility (see wiki.virtualsquare.org, umfuse)
    and fuse-ext2 still builds the view-os module,
    and view-os (or VUOS or whatever) no longer distributes this fork
    uses upstream fuse-ext2 directly?),
    so, the way I read it, src:fuse-umfuse-ext2 is fuse-ext2 0.0.6.0
    + a patchset that ended up upstream by the end of 2009?

    Perhaps it would be better not to provide any replacement until fuse-
    ext2 is more mature - at which point its version may have increased
    such that an epoch is not necessary.
    Given the above, this is looking less like a replacement
    and more like a version bump with upstream changing versioning schemes?
    Either way, I feel like this resolves the question of implementation maturity.

    (I also don't fore-see fuse-ext2 version ever growing past 0.4.0,
    seeing as in the past decade it grew by 0.0.5.)

    Thoughts?

    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCgAdFiEEfWlHToQCjFzAxEFjvP0LAY0mWPEFAmcViQsACgkQvP0LAY0m WPFjlQ/+OhPupeYY06H7xMtGQAXgRjRChkBFs97tuorVp0XbggnjVGd4VU5WfGGD SyIJ2AbIZnucJRZ6bm4cYNwYOB/6jCavFhTuRV7iPTCPKdNUGptpz1XBccMkAD+6 NzJpdgfNzwNHrwlAZSyBQ12i6ct20Bd1US6ZXpN7lbKHDIRy43fPBzzDlfOBmYmb 4F0QKJgTaTsfYTXFrLUZF7zbpVgrqLWDF/14yeSsbrK8Adp7Gxd2gfA0FxmTga93 Huip4pYEDTE4gjx48+e0hxJwApK4WcO8p4B98WLF9E6GIItPnsHhfwGFeJ+6Q4S7 6SKjRv7NAOi8wnSL02S/Vm4mQwzOlmx8RPgZGOV19V5hqu241iPAyKKDK8HYuhol FTim+CgL/ASxdQlt1/+3fqyiVNot01xgoFZIFjOG/K1QEzvtFDqTQ1LV2xgAmnLi IpJeOhdxzYIvmlJk1u31IIZU1CtocBE+XZ7y4xIkn/+FgEKiopy2MP4rlcUDGsQ0 66o4QaOTg0rFojI+cera9b4a22bAEf7xMi0MccOBUP964+J2S08I7OEruH4S9w/c jX6Pghv2tUjDn2W1T9M2GpUDYjVRTdnDvqTBicC7SQyEY6/x/4YIdKMrc3atU0gb Ufgd20LTZ9y3CJCjK8Vlp2ox21ZJG/PSyuJoVaE9yBxocCGfKlE=
    =B3um
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Ben Hutchings@21:1/5 to All on Tue Oct 22 00:10:01 2024
    On Mon, 2024-10-21 at 00:49 +0200, наб wrote:
    On Sun, Oct 20, 2024 at 11:39:36PM +0200, Ben Hutchings wrote:
    On Sun, 2024-10-20 at 20:03 +0200, наб wrote:
    I'd like to use an epoch so I'm asking for consensus per policy 5.6.12.

    As part of the Salvage Team's trixie view-os removal plan ‒
    RM: umview -- RoQA; obsolete, low popcon #1085454
    RM: fuse-umfuse-ext2 -- RoQA; dead upstream, low popcon #1085457
    + replace with https://github.com/alperakcan/fuse-ext2
    RM: umview-mod-umfusefat [amd64 i386 ppc64] -- RoQA; view-os removed ITS #1085458 (2024-11-09); https://github.com/virtualsquare/fusefatfs/pull/2
    RM: fuse-umfuse-iso9660 -- RoQA; dead upstream, duplicates fuseiso #1085456
    + implement "fuseiso -o fuseopt -o fuseopt iso mtpt" in fuseiso #1083034
    (currently only accepts "fuseiso iso mtpt -o fuseopt -o fuseopt")
    have that provide a transitional package (sge@ contacted thus)
    ‒ fuseext2 is to be provided by https://github.com/alperakcan/fuse-ext2 instead of src:fuse-umfuse-ext2.

    The current version of src:fuse-umfuse-ext2 in sid is 0.4-1.5,
    and the current version of https://github.com/alperakcan/fuse-ext2 is 0.0.11,
    so src:fuse-ext2 would need to be version 1:0.0.11-1 to update right.

    Thoughts?

    Given that fuse-ext2's README says "please do not mount your
    filesystems with write support unless you have nothing to lose", is it really suitable to replace the current implementation?
    The current implementation's README also says this, so I'd say so, yeah
    (the manuals for both clearly indicate that R/W mounts are experimental).

    The similarity was too good to be accidental, and seemingly, per
    https://sourceforge.net/p/view-os/code/HEAD/tree/trunk/fuse-modules/fuse-umfuse-ext2/
    fuse-umfuse-ext2 is actually just a fork of fuse-ext2:

    OK, so it sounds like this probably won't be a regression.

    [...]
    Perhaps it would be better not to provide any replacement until fuse-
    ext2 is more mature - at which point its version may have increased
    such that an epoch is not necessary.
    Given the above, this is looking less like a replacement
    and more like a version bump with upstream changing versioning schemes? Either way, I feel like this resolves the question of implementation maturity.

    (I also don't fore-see fuse-ext2 version ever growing past 0.4.0,
    seeing as in the past decade it grew by 0.0.5.)

    Thoughts?

    Given the relationship between the two projects, it might be worth
    asking upstream to bump the version number so it's more obviously newer
    than the forked versions. But if they won't do that, adding the epoch
    seems pretty reasonable.

    Ben.

    --
    Ben Hutchings
    It's easier to fight for one's principles than to live up to them.


    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCgAdFiEErCspvTSmr92z9o8157/I7JWGEQkFAmcWzvUACgkQ57/I7JWG EQksog//c8i1Qr9Sk9CC2p2vo/m/mHZqe3+ava8bxGegzthc+O3P8JTsgF0t2wIz EXuyH67WQmeROv8es/riORoFN9JaYHoN3InfAuS1NOPRR3NsXrT/WxDyrJ4r/toD TWwiexDDZgLktZzoaDPjNYSxDxKvHyfiXG0xHVRvyrV5wm7GnJE44Rt1WlKn7ZAk w6B6H1GURPgta0hXKlHjIu0RyO3Ge7Wh5wyyrjho2mGPlNKbOg21PALnsyDF7tn9 6V+mPZIu3I+sYIDGYDKbx5YUUw3u9h6TxxjvlVEc5GIrCjUKUMBxtJta+zhjNrqX dCYE83C+SlLD6Jl+/mqqleT0j5Q+YMN5l07K1Rr4Qy0ioBDxYG9Ly5FJV5opbaf8 j/GuhPvveVfI3exGN3IXfdUQdbu7x6caf3XgvKyK1dLzEGtfX/TbcutM2ucTrDvo 6/V0+0/rFrTjsqH7O1UIumAYJ8PxXTazMGjthtm+GCLAQaNYvOjzaTVPtMfAvHIl 7cPBrgBvmi7/mrLkBIoSsB5ePkLhN0YE4CROSlwZRbzrD4Daex4/ik1FXNp2Ixkv p6fHGPEUPzJmTzYgksuCA1X9NXI0plHt5QhzBSTDzlKD5qpPhB/q8zj08KzJdYN5 1uMXWwL0bqCa9qX9rhXVnV7VZ4NDFM78kX3djC0MSh/81GUvqVU=
    =enp+
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Guillem Jover@21:1/5 to Ben Hutchings on Tue Oct 22 14:10:01 2024
    Hi!

    On Tue, 2024-10-22 at 00:00:21 +0200, Ben Hutchings wrote:
    On Mon, 2024-10-21 at 00:49 +0200, наб wrote:
    On Sun, Oct 20, 2024 at 11:39:36PM +0200, Ben Hutchings wrote:
    On Sun, 2024-10-20 at 20:03 +0200, наб wrote:
    I'd like to use an epoch so I'm asking for consensus per policy 5.6.12.

    As part of the Salvage Team's trixie view-os removal plan ‒
    RM: umview -- RoQA; obsolete, low popcon #1085454
    RM: fuse-umfuse-ext2 -- RoQA; dead upstream, low popcon #1085457
    + replace with https://github.com/alperakcan/fuse-ext2
    RM: umview-mod-umfusefat [amd64 i386 ppc64] -- RoQA; view-os removed ITS #1085458 (2024-11-09); https://github.com/virtualsquare/fusefatfs/pull/2
    RM: fuse-umfuse-iso9660 -- RoQA; dead upstream, duplicates fuseiso #1085456
    + implement "fuseiso -o fuseopt -o fuseopt iso mtpt" in fuseiso #1083034
    (currently only accepts "fuseiso iso mtpt -o fuseopt -o fuseopt")
    have that provide a transitional package (sge@ contacted thus)
    ‒ fuseext2 is to be provided by https://github.com/alperakcan/fuse-ext2
    instead of src:fuse-umfuse-ext2.

    The current version of src:fuse-umfuse-ext2 in sid is 0.4-1.5,
    and the current version of https://github.com/alperakcan/fuse-ext2 is 0.0.11,
    so src:fuse-ext2 would need to be version 1:0.0.11-1 to update right.

    Thoughts?

    Perhaps it would be better not to provide any replacement until fuse- ext2 is more mature - at which point its version may have increased
    such that an epoch is not necessary.

    Given the above, this is looking less like a replacement
    and more like a version bump with upstream changing versioning schemes? Either way, I feel like this resolves the question of implementation maturity.

    (I also don't fore-see fuse-ext2 version ever growing past 0.4.0,
    seeing as in the past decade it grew by 0.0.5.)

    Given the relationship between the two projects, it might be worth
    asking upstream to bump the version number so it's more obviously newer
    than the forked versions. But if they won't do that, adding the epoch
    seems pretty reasonable.

    Alternatively you could instead package this as src:fuse-ext2
    bin:fuse-ext2 both without an epoch, and if you want to transition the
    old users off bin:fuseext2 then provide that as well for a transition
    period with the old version prefixed (say 0.4+0.0.11-1, which can be constructed dynamically at build time).

    Using fuse-ext2 would match the naming convention of many of the existing
    fuse package, would match the main program name (fuseext2 being a
    compat symlink), and would make the source and binary packages match name
    which seems like a bonus anyway. And epochs are forever, and reset any
    existing versioned dependencies, including for local/custom packages
    where we have no visibility.

    Thanks,
    Guillem

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?utf-8?B?0L3QsNCx?=@21:1/5 to Guillem Jover on Tue Oct 22 17:00:01 2024
    Hi!

    On Tue, Oct 22, 2024 at 02:08:47PM +0200, Guillem Jover wrote:
    On Tue, 2024-10-22 at 00:00:21 +0200, Ben Hutchings wrote:
    On Mon, 2024-10-21 at 00:49 +0200, наб wrote:
    On Sun, Oct 20, 2024 at 11:39:36PM +0200, Ben Hutchings wrote:
    On Sun, 2024-10-20 at 20:03 +0200, наб wrote:
    I'd like to use an epoch so I'm asking for consensus per policy 5.6.12.

    As part of the Salvage Team's trixie view-os removal plan ‒
    RM: umview -- RoQA; obsolete, low popcon #1085454
    RM: fuse-umfuse-ext2 -- RoQA; dead upstream, low popcon #1085457
    + replace with https://github.com/alperakcan/fuse-ext2
    RM: umview-mod-umfusefat [amd64 i386 ppc64] -- RoQA; view-os removed ITS #1085458 (2024-11-09); https://github.com/virtualsquare/fusefatfs/pull/2
    RM: fuse-umfuse-iso9660 -- RoQA; dead upstream, duplicates fuseiso #1085456
    + implement "fuseiso -o fuseopt -o fuseopt iso mtpt" in fuseiso #1083034
    (currently only accepts "fuseiso iso mtpt -o fuseopt -o fuseopt")
    have that provide a transitional package (sge@ contacted thus)
    ‒ fuseext2 is to be provided by https://github.com/alperakcan/fuse-ext2
    instead of src:fuse-umfuse-ext2.

    The current version of src:fuse-umfuse-ext2 in sid is 0.4-1.5,
    and the current version of https://github.com/alperakcan/fuse-ext2 is 0.0.11,
    so src:fuse-ext2 would need to be version 1:0.0.11-1 to update right.

    Thoughts?

    Perhaps it would be better not to provide any replacement until fuse- ext2 is more mature - at which point its version may have increased such that an epoch is not necessary.

    Given the above, this is looking less like a replacement
    and more like a version bump with upstream changing versioning schemes? Either way, I feel like this resolves the question of implementation maturity.

    (I also don't fore-see fuse-ext2 version ever growing past 0.4.0,
    seeing as in the past decade it grew by 0.0.5.)

    Given the relationship between the two projects, it might be worth
    asking upstream to bump the version number so it's more obviously newer than the forked versions. But if they won't do that, adding the epoch seems pretty reasonable.

    Alternatively you could instead package this as src:fuse-ext2
    bin:fuse-ext2 both without an epoch, and if you want to transition the
    old users off bin:fuseext2 then provide that as well for a transition
    period with the old version prefixed (say 0.4+0.0.11-1, which can be constructed dynamically at build time).
    I kinda wanted to do something like this,
    but didn't think having a different source/binary version was possible!
    It looks like I just need to call {dh_,dpkg-}gencontrol different, thanks.

    Using fuse-ext2 would match the naming convention of many of the existing fuse package,
    Honestly this kinda seems like a wash
    fuse2fs fuseext2 fusefat fusefile fuseiso fuseiso9660
    fuse-convmvfs fuse-overlayfs fuse-posixovl fuse-zip
    afuse ifuse squashfuse
    ceph-fuse exfat-fuse gnunet-fuse gvfs-fuse kio-fuse openafs-fuse owfs-fuse rbd-fuse unionfs-fuse xrootd-fuse zfs-fuse
    (the prevailing trend looks like "$homepage" ~ fuse || "$homepage-fuse" ~= s/-fuse-fuse/-fuse/).

    ...but now that I look at this there's fuse2fs,
    which is naturally better than some third-party implementation.

    The interface is a little different
    (the default is -o rw instead of -s -o ro,allow_other,default_permissions)
    so this can be turned into somehing like
    src:e2fsprogs -> fuseext2 (transitional package) Depends: fuse2fs
    + adding the current fuseext2 interface with a wrapper to fuse2fs
    and dropping the transitional package in forky and the wrapper... never?
    in forky? forky+1?

    (Or just RM fuseext2 and let users figure this out on their own but
    that seems awfully anti-user.)

    The epoch is avoided because e2fsprogs is 1.47.1.

    would match the main program name (fuseext2 being a
    compat symlink), and would make the source and binary packages match name which seems like a bonus anyway.
    Agree on all fronts this would be better.

    And epochs are forever, and reset any
    existing versioned dependencies, including for local/custom packages
    where we have no visibility.
    I don't suspect there are that many but this is also fair
    (and explains the policy's anti-epoch stance better than policy did).

    Thoughts?
    наб

    -----BEGIN PGP SIGNATURE-----

    iQIyBAABCgAdFiEEfWlHToQCjFzAxEFjvP0LAY0mWPEFAmcXvP8ACgkQvP0LAY0m WPGktA/4jJtIgR8mqzKH8zJNN7aXO0aWhKZ8khsIGEAhGyysyitSYHIqQapJslFV E9Vc3MA1faeyi2gadizlMPGXRzsDbQRLXHrwSCgfvm1U/rZWDBeciiuKOTiRrCz4 pbcjZzDhCVGgXkNURb/TZ7Js1bZ3S6Q8Exj/CjMJGP5g008e+C7rLuwN7ijHaLT2 k8rgRU5wXfLK/HX5URJ10ZKFlwwUhQ4x2HlsXjw1Dav5vZQvE44JqmZ5wsn7FQwd FDTtEZFZB6MDr23NkIldZcLiHqxQD1swHMBqVufq2HgNo4DC15W01es3iSoTP0qO GvXnl7XDOfydrXakL73fgZE7iEt8GHddXG3WufY14YUDx8iPSbt16YTCZd1mFyof fda+0zGaj97xzF224M/VuUpPIkaEsldW+qehiTDU1tit29NuSX3kxRK712OqKIty MoMDcVAOMdzulyOoF5TrQ/Ecurd2kE+zuaYWHqK0SaAsMkCc0w73U4spoRofvmv0 5/Pp9puM7xnnXdwJBV5mMk1lPiU9Z6T1Ug0z8eL5Rjtj7JjrhuBIGXRSMNnc8aih /n4LS2jJZTNr6VCHLBuAgrNNb3JRbEeqNgVIp9H/CW79HOu6QlF/FfiS2feQmHDJ +74Zk0uwntKJU4Zivj0jYpVIobqf/sInL/pNU8TZwKN5fRGt+w==
    =8uy/
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Theodore Ts'o@21:1/5 to All on Thu Oct 24 05:10:01 2024
    On Tue, Oct 22, 2024 at 04:56:05PM +0200, наб wrote:

    ...but now that I look at this there's fuse2fs,
    which is naturally better than some third-party implementation.

    The interface is a little different
    (the default is -o rw instead of -s -o ro,allow_other,default_permissions)
    so this can be turned into somehing like
    src:e2fsprogs -> fuseext2 (transitional package) Depends: fuse2fs
    + adding the current fuseext2 interface with a wrapper to fuse2fs
    and dropping the transitional package in forky and the wrapper... never?
    in forky? forky+1?

    (Or just RM fuseext2 and let users figure this out on their own but
    that seems awfully anti-user.)

    The epoch is avoided because e2fsprogs is 1.47.1.

    I suppose another, simpler approach might be to have the fuse2fs
    package ship the fuse-ext2 wrapper script, and then we can just have
    the debian fuse2fs replace/conflits with fuseext2. I'm certainly OK
    with doing this if someone wants to send me a patch.

    I'll note that e2fsprogs's fuse2fs supports 64-bit filesystems, Posix
    ACL's, and has thread supports enabled, in contrast to fuse-ext2 which
    does not. Fuse2fs also will handle replaying the journal if the file
    system was mounted on Linux as ext3 or ext4, and then wasn't cleanly
    unmounted due to a system crash.

    BTW, if anyone is interested in working with improving fuse2fs,
    contact me. In particular, adding some regression testing facilities
    would be a great project for someone who is interested in furher
    improving fuse2fs on an upstream basis. :-)

    - Ted

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?utf-8?B?0L3QsNCx?=@21:1/5 to Theodore Ts'o on Thu Oct 24 14:20:02 2024
    On Wed, Oct 23, 2024 at 10:53:29PM -0400, Theodore Ts'o wrote:
    On Tue, Oct 22, 2024 at 04:56:05PM +0200, наб wrote:
    ...but now that I look at this there's fuse2fs,
    which is naturally better than some third-party implementation.

    The interface is a little different
    (the default is -o rw instead of -s -o ro,allow_other,default_permissions) so this can be turned into somehing like
    src:e2fsprogs -> fuseext2 (transitional package) Depends: fuse2fs
    + adding the current fuseext2 interface with a wrapper to fuse2fs
    and dropping the transitional package in forky and the wrapper... never?
    in forky? forky+1?

    (Or just RM fuseext2 and let users figure this out on their own but
    that seems awfully anti-user.)

    The epoch is avoided because e2fsprogs is 1.47.1.
    I suppose another, simpler approach might be to have the fuse2fs
    package ship the fuse-ext2 wrapper script, and then we can just have
    the debian fuse2fs replace/conflits with fuseext2. I'm certainly OK
    with doing this if someone wants to send me a patch.
    Thanks, this is most likely the best approach, then.

    I've implemented this but can't test it fully because
    https://git.kernel.org/pub/scm/fs/ext2/e2fsprogs.git
    is missing an up-to-date pristine-tar
    (it's at 1.47.0 so it looks like you just forgot to push?).

    Draft @ https://git.sr.ht/~nabijaczleweli/e2fsprogs,
    will post & file this in the usual manner once I manage to build and test.

    I'll note that e2fsprogs's fuse2fs supports 64-bit filesystems, Posix
    ACL's, and has thread supports enabled, in contrast to fuse-ext2 which
    does not.
    Yeah, I expected as much. My summary of the diff was from the perspective
    of the user-facing interface only
    (it'd certainly be nice to just solve this with d/fuse2fs.links,
    but the default changing from R/O to R/W is unacceptable IMO).

    Best,

    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCgAdFiEEfWlHToQCjFzAxEFjvP0LAY0mWPEFAmcaOdAACgkQvP0LAY0m WPG+rw/+LX9bek3/d6UoltdeAVCZesQX8Chg3h21IImTNLKja1NsQk9TLmgVAxej a7IhTxxDCFNe1fICdoOoW2c5zd4WMnkEX7B9OZQj8/sQ7L6QfAao32e0XssmXAzL R82SHVB7lrImZM5z0FmzTEuMVmnvlLe9/Ammkz6hpXhj440N2WHVHTUswepQUqQx 9hrylnFVU3C6cknfVGdzy7iYZgSLXNkRWOs31GouuFTire4szFVcRyKrj+PHFWJ7 tRJG5TZ582WYNu9UWMAHfKS/+FBcXw10kEmkicua9wXQ03rPHceB0DMpg229vEbs ivjt0+8Ll1Wx3Deb17kDdTAFQ/LiTU8jISKORawRVOVhPEj58FQfg36RimuJMyvq ctMlKivKBJlfqPcURAxwfSz5kz/Bg63LVcMKWVdu0p2r/iTxc74qnwFw6oksQ9c6 xyHSuGnt8ImkstDV1h20nu1bkaY18keh9uHvWOtLcGVuyGiZCpN1fZCv9mFmIgD7 N9oExwjo34zS+CZsSTzEpDSYeGkhhh2xeqitVrCmMTqmzEXtJBmAOFwK4jubCPEB EtDrZk0nVDwx35Sbbbs/hjNm0DlXTJ+m5jcWTqXBC+or6O7Hkji7vtOAO7du10IL aIblveq7mXPPzeXlQ+fpjEidaySI7qDXqzYRhuRMGcs97ZfnUds=
    =Sg8g
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Theodore Ts'o@21:1/5 to All on Thu Oct 24 16:50:02 2024
    On Thu, Oct 24, 2024 at 02:13:05PM +0200, наб wrote:

    I've implemented this but can't test it fully because
    https://git.kernel.org/pub/scm/fs/ext2/e2fsprogs.git
    is missing an up-to-date pristine-tar
    (it's at 1.47.0 so it looks like you just forgot to push?).

    Yes, that combined to some branch conflicts caused by my running
    pristine-tar in different trees. I had to fix things up by doing some
    rebases. Should be fixed now; thanks for pointing that out.

    - Ted

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?utf-8?B?0L3QsNCx?=@21:1/5 to Theodore Ts'o on Thu Oct 24 17:40:02 2024
    On Thu, Oct 24, 2024 at 10:44:46AM -0400, Theodore Ts'o wrote:
    On Thu, Oct 24, 2024 at 02:13:05PM +0200, наб wrote:
    I've implemented this but can't test it fully because
    https://git.kernel.org/pub/scm/fs/ext2/e2fsprogs.git
    is missing an up-to-date pristine-tar
    (it's at 1.47.0 so it looks like you just forgot to push?).
    Should be fixed now; thanks for pointing that out.
    Yeah, that worked now.

    idk if you got a notification (the confirmation mail would indicate otherwise?),
    but the patch is at #1085590. I've tested it to behave the same as the real fuseext2
    and it upgrades smoothly.

    Best,

    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCgAdFiEEfWlHToQCjFzAxEFjvP0LAY0mWPEFAmcaadYACgkQvP0LAY0m WPEqYQ/+I7sCjLYz6F/L69ksEPyLW+WUZT6MQLVqactwdsr1+FbYnXvIL1YrWLSH uPqCsOAFZv3Vu/5HPvG2wTKgwkVROaKjj8kx1nLn5fsozPNHQLfwv02oM9NU17ex zqj4CflMmeO1mVUKpJVifKNY/vYMb3sKy2+0TScaVmMuCxRnetCNuuOjs+2EaCNh 8yQ7lPF+ns1ZCMinRGvb+2XStazmhCKDPzTqBwmJkfmc7ll/h9hOruj7Zi9ZQS/Q HVh0he1QN6MM/2eXOYh/lIoRM944UsegCN/OatFqb3GOqyUoe12pWsUg0qRzvhVo IYwchkVRPxWxsWzIkNrH7qmia/i8A74+/Ha/Yh8Hs022xc/L+G9flTeWj/rKEDbR fn4oIGeIHymGejU2/gaqm78QYkesGhac4xad77wthIDlTTlM+/nEb5c1qXt4kYS0 5CCFI/Dr68xnX2rKUZM0O0evCmHwJkJKuB/g8GEQCz8HlD+5XVFHSbZAiByXttaY MT2z+DM67l4pGAkRaCnKy4CVqI0QoAoah7SvKyah4l8QIKoSf+sENrTLfhsaeBKN 8tbwEm4DlmRLSoLdo7mEmZKsDxxWcLWK9qclrNCnmtgP0cmLsu8NnEUw2sIrKz8x UoZ+mbZotLVbP3ttjh85sEj4dnPxTCxUjPseAfnXEUFrOm1KwSQ=
    =VS5d
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Theodore Ts'o@21:1/5 to All on Sat Nov 30 03:00:01 2024
    On Thu, Oct 24, 2024 at 05:37:59PM +0200, наб wrote:

    idk if you got a notification (the confirmation mail would indicate otherwise?), but the patch is at #1085590. I've tested it to behave
    the same as the real fuseext2 and it upgrades smoothly.

    I've uploaded e2fsprogs 1.47.2~rc1-1 to unsstable and it has your
    patch to replace the fuseext2 binary package.

    The fuseext2 bugs are now showing up in bugs.debian.org's
    src:e2fsprogs page, and I'm pretty sure they should all be closed out
    by the fuse2fs emulation of fuseext2.

    - Ted

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?utf-8?B?0L3QsNCx?=@21:1/5 to Theodore Ts'o on Sat Nov 30 03:30:01 2024
    On Fri, Nov 29, 2024 at 07:29:19AM -1000, Theodore Ts'o wrote:
    On Thu, Oct 24, 2024 at 05:37:59PM +0200, наб wrote:
    idk if you got a notification (the confirmation mail would indicate otherwise?), but the patch is at #1085590. I've tested it to behave
    the same as the real fuseext2 and it upgrades smoothly.
    I've uploaded e2fsprogs 1.47.2~rc1-1 to unsstable and it has your
    patch to replace the fuseext2 binary package.
    Thanks :)

    The fuseext2 bugs are now showing up in bugs.debian.org's
    src:e2fsprogs page, and I'm pretty sure they should all be closed out
    by the fuse2fs emulation of fuseext2.
    I was expecting src:fuse-umfuse-ext2 to clear the RM queue by the time
    this was uploaded, so I didn't think to enumerate them earlier.

    Tested all, all fixed, closed all.

    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCgAdFiEEfWlHToQCjFzAxEFjvP0LAY0mWPEFAmdKeFgACgkQvP0LAY0m WPFBJBAAsZWk8BqvVMqyJDwqS1/t+DEgQhyz3eRgvX6vv7t6Xi9U0JgqcCLPjtw7 eUan0rIPGclwGQG94t6pxyuFqKjeDr/e79DVv50fUij+eETe01MyVQkgc/R1xEH+ e0mwoaK8JRUF8xedYOsDTrHNGQ/nOGjTtEQ8G1dJJbTBQGY53KG5xUyuye0PaVMK jKEjGL76IN2t4a03BAFP7fW7EPLw6OkQHelBlbtR0fdMDkFqjogIeOlTGuKuJy4l dL9+OLklMsMbrKlElxbU9t/rUL8XwQ4+uMX2H6ObG6MtVZ7ETH0x3+6R3LWZHiPY ezQMT64fsVJCKX3K8MNmEn1NDJ5c+czRN+kHk8bbk2MOdKjWu6mSCFt8LsdIxABk +zuwyiy2ER6XnKVFaSVde+WXMYGCwuKET1iU9Ff9oSA5fEWEXA2DIOdQDGoTRHz1 xMUUsTV9QSjHFXVN7S8hHvMjNTEjFErrL6PQEdSmHhIvLHMgbd/RysQ0vIL17Pek tq+dMYDrdIRs1KGJ9mwdjfd32AN5HM41vCn+o/NZaH0MYmJV6JxClBImqo8CB3IR s7WAr/bDt+tjABwWuvs8AiWU6u4r6odfOhbgGwU1xYBa0Hm+cthwZ/7d1uasqTAb V76y2ULidq1KNOEEbELR7D6lz9Ajz8cfddAlZ9AOhlCmYGqqms0=
    =FoPv
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Theodore Ts'o@21:1/5 to All on Mon Dec 2 18:00:03 2024
    On Sat, Nov 30, 2024 at 03:28:40AM +0100, наб wrote:
    I was expecting src:fuse-umfuse-ext2 to clear the RM queue by the time
    this was uploaded, so I didn't think to enumerate them earlier.

    Tested all, all fixed, closed all.

    Many thanks for testing them and then closing them all. That was on
    my todo list, and it's great that you took care of that for me!

    - Ted

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)