alist: reintroduce package#29459
Conversation
|
Are the reasons for removal addressed? New contributors are expected to use a real name and not an alias as per the contributing guidelines. |
5ea3c3b to
5273c1a
Compare
|
|
Seems to me that the package description itself should reference the reason that the |
I understand the concern, and I agree that the previous change was related to trust and governance concerns around the upstream project at that time. However, I would prefer not to describe AList itself in the package description as having “telemetry issues,” unless there is a concrete and current reference to a specific release, issue, commit, or code path. A general warning may unintentionally damage the reputation of the project, especially now that AList and OpenList are maintained separately and the auth/API component has been open-sourced as AlistGo/auth. I think it is better to keep the package description neutral and focused on what the package does. If there are still specific privacy or telemetry concerns, I am happy to address them separately with factual references. |
|
I would like to add one more clarification regarding the “telemetry” concern. As far as I understand, AList itself did not have telemetry code merged into the main tree. Even the previous removal PR stated that the AList code up to v3.45.0 had been reviewed as “clean”, and that the attempted runtime-information collection code was not merged: The main concern mentioned there was the private API used for connecting to some cloud drives. My understanding is that this was not general telemetry in the AList package itself, but an API/token helper required by some storage providers where developer credentials or OAuth/token exchange are needed. AList currently provides such token tools here: The related auth/API implementation has also been open-sourced: OpenList has a similar token/API helper as well: The OpenList API pages are described as a token generator / API pages for obtaining cloud-drive API access for OpenList, and they also support using OpenList-provided parameters. So if the package description for AList needs to include a warning about this kind of token/auth API helper, I think the same standard should also apply to OpenList. Otherwise it would be unfair to describe only AList in that way, especially when both projects now have open-sourced their corresponding API/token helper implementations. I do not want to hide any real privacy or security concern. If there is a concrete, current telemetry/privacy issue in a specific AList release, I am happy to address it with a factual reference to the relevant upstream issue, commit, or code path. But without such a current reference, I think adding a general “telemetry issues” warning only to the AList package description would be misleading and may unfairly damage the reputation of the project. |
|
|
@SheltonZhu Thanks for raising this in detail. I agree that privacy and trust concerns are especially important for OpenWrt users, because this type of package may run continuously on routers or NAS devices and may handle local files or cloud-drive credentials. However, I think we need to separate three different things here:
AlistGo/alist#9142 is clearly relevant background, and it does mention possible hardware information collection for the community edition. But from what I can see, that is a planning/discussion issue, not by itself evidence that the current OpenWrt package contains telemetry code or sends hardware information by default. I do not object to documenting the history or adding a neutral note for users. What I object to is putting a strong “privacy risk warning” in the package description unless it is tied to a concrete current code path, commit, release, or default runtime behavior in the packaged version. For example, I would be open to adding neutral wording such as: “Users should be aware that the upstream AList project has had prior privacy/trust discussions, including discussion of possible hardware information collection. Please review upstream privacy and security discussions before deploying in sensitive environments.” That would inform users without making an unsupported claim that the current package itself contains active telemetry. If there is current telemetry or hardware-information collection code in the release packaged by this PR, please point me to the specific commit, source file, or runtime behavior. I will either patch it, disable it, or add a stronger warning based on that factual reference. |
|
Thanks for the clarification. I agree that planning/discussion documents are different from proven active telemetry code in a specific release. My concern is broader than only “does the current binary send telemetry by default”. For OpenWrt users, especially router/NAS users, trust and governance posture are themselves highly relevant risk factors. I appreciate that you are open to adding neutral wording. Personally, I think that is the minimum necessary compromise here. What I want to avoid is a situation where inclusion in official OpenWrt feeds is interpreted by users as a full implicit trust endorsement, while the project has:
A neutral but explicit note in the package description would allow users to make informed decisions without asserting unsupported claims about the current release. Given that packages in the official OpenWrt feeds carry an implicit level of downstream trust, I think OpenWrt should require this disclosure before accepting the package. |
|
@SheltonZhu Thanks for the clarification. I understand that your concern is broader than whether the currently packaged release sends telemetry by default. It also includes the broader trust, governance, moderation, and transparency context around deploying this kind of software on routers, NAS devices, and other sensitive environments. I have added a user-facing disclosure to the package description to make these concerns visible before inclusion. The added text asks users to review upstream privacy, security, and governance discussions, including prior discussion of possible hardware information collection, centralized governance or moderation concerns, and ongoing transparency debates. It also clarifies that inclusion in the OpenWrt package feeds should not be interpreted as a full endorsement of the upstream project's trust or governance posture. At the same time, the wording intentionally avoids asserting that the currently packaged AList release contains active telemetry or performs hardware-information collection by default, since no specific current code path, commit, source file, or runtime behavior has been identified in this PR. I hope this addresses the disclosure concern while keeping the package description factual and fair to the current packaged release. |
|
That sounds good to me. Probably should all be squashed into a single commit. |
Signed-off-by: YUXIAO FAN <CN_QianShi@hotmail.com>
0752986 to
fa0d7b6
Compare
AList was previously available in OpenWrt packages and was later replaced by
OpenList. However, AList is still actively maintained upstream.
AList and OpenList are now separately maintained projects. They have different
feature sets, release lines, and upstream maintainers. Therefore OpenList
should not be treated as a direct replacement for AList.
This PR restores AList as an independent package in OpenWrt packages.
I am the current maintainer of AList and am willing to help maintain this
package.
Tested: