Devuan bug report logs - #355
apt: Unexpected linkage dependency on libsystemd

Package: apt; Reported by: Andreas Messer <[email protected]>; Done: Andreas Messer <[email protected]>; Maintainer for apt is Andreas Messer <[email protected]>.

Message received at [email protected]:


Received: (at 355-done) by bugs.devuan.org; 7 Apr 2020 17:40:04 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Tue, 07 Apr 2020 17:40:04 +0000 (UTC)
Received: from dd10814.kasserver.com (dd10814.kasserver.com [85.13.133.115])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 5BE38F60868
	for <[email protected]>; Tue,  7 Apr 2020 19:33:44 +0200 (CEST)
Received: from zeus.ad.home.arpa (p5B0557A9.dip0.t-ipconnect.de [91.5.87.169])
	by dd10814.kasserver.com (Postfix) with ESMTPSA id 262EC1200583
	for <[email protected]>; Tue,  7 Apr 2020 19:33:43 +0200 (CEST)
Date: Tue, 7 Apr 2020 19:33:41 +0200
From: Andreas Messer <[email protected]>
To: [email protected]
Subject: Re apt: Unexpected linkage dependency on libsystemd
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="C7zPtVaVf+AK4Oqc"
Content-Disposition: inline
User-Agent: Mutt/1.10.1 (2018-07-13)
X-Spam-Status: No, score=-0.7 required=5.0 tests=RCVD_IN_DNSWL_LOW
	autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org


--C7zPtVaVf+AK4Oqc
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

Version: 2.0.1+devuan1

Finally prepared an own version of apt package with all systemd
dependencies removed.

cheers,
Andreas


--C7zPtVaVf+AK4Oqc
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iF0EABEIAB0WIQQo7oQ45ojZkjZhx1OQs7qqjCuvUQUCXoy5dQAKCRCQs7qqjCuv
UfyfAJwJCUO2aqxEdGmj2wK4meFH/tb77ACcCRDInkFIUT4r93Qr+a60n+FwaXU=
=y7zZ
-----END PGP SIGNATURE-----

--C7zPtVaVf+AK4Oqc--

Notification sent to Andreas Messer <[email protected]>:
bug acknowledged by developer. Full text available.
Reply sent to Andreas Messer <[email protected]>:
You have taken responsibility. Full text available.

Message received at [email protected]:


Received: (at 355) by bugs.devuan.org; 1 Apr 2020 21:00:02 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Wed, 01 Apr 2020 21:00:02 +0000 (UTC)
Received: from dd10814.kasserver.com (dd10814.kasserver.com [85.13.133.115])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 2578CF60C2E
	for <[email protected]>; Wed,  1 Apr 2020 22:49:07 +0200 (CEST)
Received: from zeus.ad.home.arpa (p5B0554C9.dip0.t-ipconnect.de [91.5.84.201])
	by dd10814.kasserver.com (Postfix) with ESMTPSA id 2ABD81206E03;
	Wed,  1 Apr 2020 22:49:06 +0200 (CEST)
Date: Wed, 1 Apr 2020 22:49:04 +0200
From: Andreas Messer <[email protected]>
To: Mark Hindley <[email protected]>
Cc: [email protected]
Subject: Re: apt: Unexpected linkage dependency on libsystemd
Message-ID: <[email protected]>
References: <157047021610.2626.4106834785083034806.reportbug@vm-devuan-beowulf>
 <[email protected]>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="OXfL5xGRrasGEqWY"
Content-Disposition: inline
In-Reply-To: <[email protected]>
User-Agent: Mutt/1.10.1 (2018-07-13)
X-Spam-Status: No, score=-0.7 required=5.0 tests=RCVD_IN_DNSWL_LOW
	autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org


--OXfL5xGRrasGEqWY
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Mark,

On Sat, Mar 28, 2020 at 12:02:20PM +0000, Mark Hindley wrote:
> On Mon, 7 Oct 2019 19:50:34 +0200 Andreas Messer <[email protected]> wrot=
e:
> > Package: apt
> > Version: 1.8.2
> > Severity: normal
> >=20
> > I observed a linkage dependency on libsystemd. This was unexpected for =
me
> > since I wouldn't expect a package manager depend on it. A package manag=
er should
> > be as lean as possible.
>=20
> Andreas,
>=20
> Thanks for this.
>=20
> You are quite right that this dependency would be much better avoided.
>=20
> I am interested in us fixing this in ceres/chimaera.
>=20
> I know you have patched version 1.8  to remove libsystemd0. Would you car=
e to
> update that for the current ceres/chimaera version 2.0.1? We can then loo=
k at
> including it in devuan-packages.

Sorry, missed that mail. Yes I can give it a try tomorrow.=20

cheers,
Andreas
--=20
gnuPG keyid: 8C2BAF51
fingerprint: 28EE 8438 E688 D992 3661 C753 90B3 BAAA 8C2B AF51

--OXfL5xGRrasGEqWY
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iF0EABEIAB0WIQQo7oQ45ojZkjZhx1OQs7qqjCuvUQUCXoT+PAAKCRCQs7qqjCuv
UWVEAKCgGaDx7UT9xfkw2YUAI6rgX5/isgCeOvG7Ff/pW6aG3072n7vKeXp/GqA=
=dRUm
-----END PGP SIGNATURE-----

--OXfL5xGRrasGEqWY--

Acknowledgement sent to Andreas Messer <[email protected]>:
Extra info received and forwarded to list. Copy sent to [email protected]. Full text available.
Information forwarded to [email protected], [email protected]:
bug#355; Package apt. Full text available.

Message received at [email protected]:


Received: (at 355) by bugs.devuan.org; 28 Mar 2020 12:10:02 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Sat, 28 Mar 2020 12:10:02 +0000 (UTC)
Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 95042F609A8
	for <[email protected]>; Sat, 28 Mar 2020 13:02:24 +0100 (CET)
Received: from apollo.hindleynet ([192.168.1.3] helo=apollo)
	by mx.hindley.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)
	(Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1jIAAP-0006rk-EB; Sat, 28 Mar 2020 12:02:21 +0000
Received: from mark by apollo with local (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1jIAAO-0001Ah-6l; Sat, 28 Mar 2020 12:02:20 +0000
Date: Sat, 28 Mar 2020 12:02:20 +0000
From: Mark Hindley <[email protected]>
To: [email protected]
Cc: Andreas Messer <[email protected]>
Subject: Re: apt: Unexpected linkage dependency on libsystemd
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <157047021610.2626.4106834785083034806.reportbug@vm-devuan-beowulf>
X-Debbugs-No-Ack: No Thanks
User-Agent: Mutt/1.5.23 (2014-03-12)
X-Spam-Status: No, score=0.0 required=5.0 tests=FAKE_REPLY_C,SPF_PASS
	autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org

On Mon, 7 Oct 2019 19:50:34 +0200 Andreas Messer <[email protected]> wrote:
> Package: apt
> Version: 1.8.2
> Severity: normal
> 
> I observed a linkage dependency on libsystemd. This was unexpected for me
> since I wouldn't expect a package manager depend on it. A package manager should
> be as lean as possible.

Andreas,

Thanks for this.

You are quite right that this dependency would be much better avoided.

I am interested in us fixing this in ceres/chimaera.

I know you have patched version 1.8  to remove libsystemd0. Would you care to
update that for the current ceres/chimaera version 2.0.1? We can then look at
including it in devuan-packages.

Thanks

Mark

Information forwarded to [email protected], [email protected]:
bug#355; Package apt. Full text available.

Message received at [email protected]:


Received: (at submit) by bugs.devuan.org; 7 Oct 2019 18:00:02 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by fulcanelli with IMAP (fetchmail-6.3.26)
	for <debbugs@localhost> (single-drop); Mon, 07 Oct 2019 20:00:02 +0200 (CEST)
Received: from dd10814.kasserver.com (dd10814.kasserver.com [85.13.133.115])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 19F07F60C36
	for <[email protected]>; Mon,  7 Oct 2019 19:50:36 +0200 (CEST)
Received: from zeus.m.rodgau.home (p5B05501F.dip0.t-ipconnect.de [91.5.80.31])
	by dd10814.kasserver.com (Postfix) with ESMTPSA id D10B61205D8D
	for <[email protected]>; Mon,  7 Oct 2019 19:50:35 +0200 (CEST)
Date: Mon, 7 Oct 2019 19:50:34 +0200
From: Andreas Messer <[email protected]>
To: Devuan Bug Tracking System <[email protected]>
Subject: apt: Unexpected linkage dependency on libsystemd
Message-ID: <157047021610.2626.4106834785083034806.reportbug@vm-devuan-beowulf>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Mailer: reportbug 7.5.1+devuan1
User-Agent: NeoMutt/20170113 (1.7.2)
X-Spam-Status: No, score=-0.7 required=5.0 tests=RCVD_IN_DNSWL_LOW
	autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org

Package: apt
Version: 1.8.2
Severity: normal

I observed a linkage dependency on libsystemd. This was unexpected for me
since I wouldn't expect a package manager depend on it. A package manager should
be as lean as possible.

Having reviewed the code, the only function using libsystemd is used to talk on dbus 
to inhibit system shutdown. Something which will work for systemd only.

Would it make sense to use dlopen() to dynamically load libsystemd when needed
and avoid the hard dependency on libsystemd? If systemd is installed, libsystemd
will be available anyways.

-- Package-specific info:

-- (no /etc/apt/preferences present) --
-- (/etc/apt/preferences.d/avoid-systemd present, but not submitted) --
-- (/etc/apt/sources.list present, but not submitted) --
-- (/etc/apt/sources.list.d/devuan.list present, but not submitted) --


-- System Information:
Debian Release: 10.0
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-6-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled

Versions of packages apt depends on:
ii  adduser                 3.118
ii  debian-archive-keyring  2019.1
ii  gpgv                    2.2.12-1+deb10u1
ii  libapt-pkg5.0           1.8.2
ii  libc6                   2.28-10
ii  libgcc1                 1:8.3.0-6
ii  libgnutls30             3.6.7-4
ii  libseccomp2             2.3.3-4
ii  libstdc++6              8.3.0-6

Versions of packages apt recommends:
ii  ca-certificates  20190110

Versions of packages apt suggests:
pn  apt-doc         <none>
ii  aptitude        0.8.11-7
ii  dpkg-dev        1.19.7
ii  gnupg           2.2.12-1+deb10u1
ii  powermgmt-base  1.34
ii  synaptic        0.84.6

-- no debconf information

-- 
gnuPG keyid: 8C2BAF51
fingerprint: 28EE 8438 E688 D992 3661 C753 90B3 BAAA 8C2B AF51


Acknowledgement sent to Andreas Messer <[email protected]>:
New bug report received and forwarded. Copy sent to [email protected]. Full text available.
Report forwarded to [email protected], [email protected]:
bug#355; Package apt. Full text available.

Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.

Devuan Bugs Owner <[email protected]>.
Last modified: Sat, 18 Jan 2025 04:39:02 UTC