Bug#1056300: ITP: gaphas -- a diagramming widget library for python

2023-11-19 Thread Alexandre Esse
Package: wnpp
Severity: wishlist
Owner: Alexandre Esse 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: gaphas
  Version : 3.11.2
  Upstream Contact: Arjan Molenaar 
* URL : https://github.com/gaphor/gaphas
* License : Apache-2.0
  Programming Lang: Python
  Description : a diagramming widget library for python

Gaphas is a diagramming widget library for Python. Gaphas is a library that 
provides the user interface component (widget) for drawing diagrams. Diagrams 
can be drawn to screen and then easily exported to a variety of formats, 
including SVG and PDF.

Gaphas is for example used by gaphor for UML drawing, RAFCON for state-machine 
based robot control, and ASCEND for solving mathematical models.

The package should probably be maintained as part of the Debian Python Team:
https://wiki.debian.org/Teams/PythonTeam



Bug#1056299: ITP: gaphor -- a simple UML/SysML modeling tool

2023-11-19 Thread Alexandre Esse
Package: wnpp
Severity: wishlist
Owner: Alexandre Esse 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: gaphor
  Version : 2.21.0
  Upstream Contact: Arjan Molenaar 
* URL : https://github.com/gaphor/gaphor
* License : Apache-2.0
  Programming Lang: Python
  Description : a simple UML/SysML modeling tool

Gaphor is a UML and SysML modeling application written in Python. It is 
designed to be easy to use, while still being powerful. Gaphor implements a 
fully-compliant UML 2 data model, so it is much more than a picture drawing 
tool.

The package should probably be maintained as part of the Debian Python Team:
https://wiki.debian.org/Teams/PythonTeam



Bug#1051939: ubpm_1.9.0+20230923-1_amd64.changes REJECTED

2023-11-19 Thread Steven Robbins
Hi,

Re-uploaded to NEW with requested changes.

On Thursday, October 26, 2023 12:37:25 P.M. CST Thorsten Alteholz wrote:
> Hi Steve,
> 
> On 26.10.23 05:23, Steven Robbins wrote:
> > On Monday, October 23, 2023 1:00:09 P.M. CDT Thorsten Alteholz wrote:
> >> Hi,
> >> 
> >> please ask upstream to add all licenses of embedded stuff like
> >> ./sources/plugins/shared/hidapi
> > 
> > Could you expand on this request?  Each file notes "At the discretion of
> > the user of this library,  this software may be licensed under the terms
> > of the GNU General Public License v3, a BSD-Style license, ..."
> 
> yes, but the sentence goes on: "..., or the original HIDAPI license as
> outlined in the LICENSE.txt,
> LICENSE-gpl3.txt, LICENSE-bsd.txt, and LICENSE-orig.txt"
> 
> The GPL is ok, but the BSD-Style license is not at all unambiguous and
> what is the contents of LICENSE.txt and LICENSE-orig.txt?
> They should be "located at the root of the source distribution.", but
> they are not, hence my request.

Added the four licenses files in sources/plugins/shared/hidapi:
LICENSE-bsd.txt  LICENSE-gpl3.txt  LICENSE-orig.txt  LICENSE.txt


Regarding the PDF files:
> > Sorry, that is a clear miss on my part.  I will clarify the license or
> > remove these before re-uploading.

PDF files have been removed.

-Steve


signature.asc
Description: This is a digitally signed message part.


Bug#1056191: usrmerge: provide more documentation for Debian Developers and system administrators

2023-11-19 Thread Otto Kekäläinen
Hi!

Thanks for the reponse - I am impressed by your ability to respond
almost immediately! However, should the bug report be left open for a
while and not immediately closed? Are you willing to review/merge if
somebody else submits an improvement to the README at
https://salsa.debian.org/md/usrmerge?

I can read some frustration from your reply with references that the
information is already easily available somewhere ("This has already
been discussed at lenght among the people attending the related Debian
infrastructure.") and that Ubuntu's switch to usrmerge is common
knowledge (apparently happened in Ubuntu 20.04 based on
https://packages.ubuntu.com/search?suite=all=names=usrmerge)
and confidence in that the fork that Ubuntu maintains has not relevant
changes.

If you leave this bug report / request open and tag it as 'help
needed', maybe other people who can more easily relate to the
user/sysadmin perspective can step up and contribute documentation
improvements?



Bug#983831: Dead link at https://www.debian.org/consultants/

2023-11-19 Thread Giuseppe Sacco
Hello Scott,
we are checking this bug report very late, I am sorry for that.

Il giorno mar, 02/03/2021 alle 02.32 +, Scott C. MacCallum ha scritto:
> Package: www.debian.org
> Name: www.callpaul.eu
> URL: www.callpaul.eu
> Location: Line 1733, Col 23
[...]

As of today, the link is working. It has a self signed certificate, but it is
working.

May I just close this bug report?

Thank you,
Giuseppe



Bug#1056298: riseup-vpn dns configuration don't work with systemd-resolved

2023-11-19 Thread Pirate Praveen

package: riseup-vpn
severity: grave
version: 0.21.11+ds1-5+b4

It misses a dependency on openvpn-systemd-resolved and on boomworm it 
was working after installing it. But on mobian trixie, which has 
systemd-resolved installed by default (through mobian-base), dns 
resolution fails when riseup vpn is connected.


error log attached



;; communications error to 127.0.0.53#53: timed out
;; communications error to 127.0.0.53#53: timed out
;; no servers could be reached



Bug#1042428: lintian.debian.org off ?

2023-11-19 Thread Otto Kekäläinen
> > This issue still exists. I would now have the need to send the url
> > https://lintian.debian.org/tags/service-file-is-not-a-file to upstream
> > developers to learn about this Lintian issue, but the URL does not
> > serve any contents nor does it redirect to a new location.
> >
> > I am still willing to contribute the Apache/Nginx rewrite rules if
> > somebody can point me to a code repository where I can read/contribute
> > at like I announced on September 27th in this thread.
>
> I finally fixed this. Sorry for the delay.
>
> https://udd.debian.org/lintian?packages=entr has a link for each lintian
> tag, that points to (e.g.) 
> https://udd.debian.org/lintian-tag.cgi?tag=superfluous-file-pattern
> That page includes a description of the tag as well as all packages
> affected by the tag.

Thanks!

Could you consider setting up also redirects from old url, as it seems
that search engines had it indexed pretty well and tend to offer links
to lintian.debian.org as the primary result on on searches for various
Lintian errors?

https://lintian.debian.org/tags/([a-z-]*)/?$
->
https://udd.debian.org/lintian-tag.cgi?tag=$1



Bug#1053476: [debian-mysql] Bug#1053476: galera-3: CVE-2023-5157

2023-11-19 Thread Salvatore Bonaccorso
Hi Adrian,

On Sun, Nov 19, 2023 at 11:10:04PM +0200, Adrian Bunk wrote:
> On Thu, Oct 05, 2023 at 09:38:00PM +0200, Salvatore Bonaccorso wrote:
> > Hi Otto,
> > 
> > Thanks for the quick followup.
> > 
> > On Wed, Oct 04, 2023 at 08:59:31PM -0700, Otto Kekäläinen wrote:
> > > Thanks for reporting this Salvatore!
> > > 
> > > Are you aware of what plans upstream has?
> > 
> > We are not, basically we require your help for this report for
> > assessing the issue.
> > 
> > > The Jira MDEV-25068 was fixed in Galera 26.4.12
> > > (https://releases.galeracluster.com/galera-4.12/release-notes-galera-26.4.12.txt)
> > > in 2022. i don't see any commits on
> > > https://github.com/codership/galera/commits/3.x since 2022. i will
> > > keep an eye for new upstream releases.
> > > 
> > > I can also review/merge for all Debian and Ubuntu releases still in
> > > maintenance a patch if somebody wants to submit a Debian-specific fix
> > > at https://salsa.debian.org/mariadb-team/galera-3/-/merge_requests. On
> > > a quick look I did not find the 26.4.12 fix
> > > (https://github.com/search?q=repo%3Acodership%2Fgalera+MDEV-25068=commits)
> > > so I am not aware of any specific commit nor if it can be backported
> > > to 25.3.37
> > 
> > Do you have a good upstream contact which you could reach out to ask
> > on more details, references to fixes, etc on the issue?
> 
> I looked at it for LTS and galera-3 is not affected:
> 
> The upstream fix for MDEV-25068 is
> https://github.com/codership/galera/commit/930c016108d7086b472ad7a8b9d0f6989202b48a
> (26.4.12)
> 
> This is in code that was introduced in
> https://github.com/codership/galera/commit/c27596d06a221f6c14d36759c681149964008749
> (26.4.8) which was not backported to galera-3.
> 
> The introducing commit merged assign_local_addr() and assign_remote_addr()
> into assign_addresses().
> 
> The fix is to catch the error when assign_addresses() throws 
> asio::system_error.
> 
> The two callsites of assign_local_addr/assign_remote_addr in the old code
> in gcomm/src/asio_tcp.cpp are already (in 26.4.7 and 25.3.37):
>   try
>   {
> ...
> assign_local_addr()
> assign_remote_addr()
> ...
>   }
>   catch (asio::system_error& e)
>   {
> ...
>   }

Thanks for the analysis of the issue.

Regards,
Salvatore



Bug#810018: New Essential package procps-base

2023-11-19 Thread Craig Small
On Wed, 15 Nov 2023 at 23:03, Guillem Jover  wrote:

> I'm all in for shrinking the essential-set. If there is consensus to
> switch pidof implementations that also seems fine to me in the abstract.
> But this shuffling around of essential-ness and new tiny packages and
> stuff seems a bit unnecessary to me, more so when this increases the
> bootstrapping-set. I'd also rather see instead a _proper_ transition to
> get sysvinit-utils out of the essential-set, and then at some later
> point procps can take over pidof.
>
There really is two options then:

1) Switch pidof to new Essential package procps-base THEN update/fix the
dependent packages
2) Update/fix the dependent packages THEN move pidof to standard procps.
Independent? of either: re-work init scripts to use start-stop-daemon

For people that want the standard pidof #1 is preferred, for people
concerned about Essential's size #2 is preferred.

Most of the pidof usage can be broken down into a few sets:
* Used in comments/documentation - can be ignored for "pidof is Essential"
purposes
* Used in init or pre/post scripts - should probably be using pidofproc
* Within their programs use something like system("pidof myprog")
and then there are a few other odd ones that don't fit into those three.

Then there's the following, which I guess complicates things:
>
>   $ dpkg -S bin/pidof | cut -d: -f2
>/bin/pidof
>
 I'm not sure what the complication is here.

Also why is killall5 not a candidate too?

There's no other implementation of killall5 though it is probably something
that could be done with one of the other /.*kill.*/ programs.
Significantly, I don't think there is any real dependency of this program
in other programs, codesearch seems to be only for documentation.



> I think the status_of_proc function could be switched to use
> start-stop-daemon (s-s-d) --status instead of pidofproc. To replace
> pidof inside pidofproc I guess s-s-d could grow some option to print
> the pid, I'd be happy to implement that. After doing a quick scan over
> codesearch.debian.org, I notice that it looks like many current uses
> of pidofproc should instead probably be using status_of_proc, and others
> seem to just be fetching the pid to then perform some action that could
> instead all be done directly with s-s-d.
>
I agree that this is a good idea. It will be more about removing the
Essential flag on any package.

 - Craig


Bug#1043257: auctex: New upstream release 13.2

2023-11-19 Thread Xiyue Deng
Hi Davide,

"Davide G. M. Salvetti"  writes:

> tags 1043257 +confirmed +pending
> thanks
>
>>  XD == Xiyue Deng [2023-8-7]
>
> [...]
>
> XD> Dear maintainers,
>
> XD> A new upstream release of auctex has been available for a while, and
> XD> I've prepared a (somewhat crude) merge request[1] with refreshed
> XD> patches which maybe useful as a base to work on.
>
> Dear Xiyue,
>
> I reviewed your work: the patches have to be refreshed the way you did,
> thanks.  I'm working on 13.2 packaging right now and will upload soon.
>
> XD> There are still several lintian warnings that I haven't figured out
> XD> how to fix
>
> I've worked on and fixed them.

Glad to see you started working on this!

BTW, would you consider maintaining auctex with the Emacsen team?  I'm also
considering elpify auctex so that it's compatible with use-package.
Would be great if you are open to collaboration.

-- 
Xiyue Deng



Bug#1056296: dash: redirecting stdout for current shell via 'exec' command didn't work correctly

2023-11-19 Thread WHR
Package: dash
Version: 0.5.12-6
Severity: normal
X-Debbugs-Cc: msl023...@gmail.com


Please see the following test case:


# cat redir-stdout-test.sh 
#!/bin/sh
set -e
rm -f /tmp/empty
true > /tmp/empty
exec 1<> /tmp/empty
ls -l /proc/$$/fd/ 1>&2
# bash redir-stdout-test.sh 
total 0
lrwx-- 1 root root 64 Nov 20 05:08 0 -> /dev/pts/0
lrwx-- 1 root root 64 Nov 20 05:08 1 -> /tmp/empty
lrwx-- 1 root root 64 Nov 20 05:08 2 -> /dev/pts/0
lr-x-- 1 root root 64 Nov 20 05:08 255 -> /root/src/redir-stdout-test.sh
# dash redir-stdout-test.sh 
total 0
lrwx-- 1 root root 64 Nov 20 05:07 0 -> /dev/pts/0
lrwx-- 1 root root 64 Nov 20 05:07 1 -> /dev/pts/0
lr-x-- 1 root root 64 Nov 20 05:07 10 -> /root/src/redir-stdout-test.sh
lrwx-- 1 root root 64 Nov 20 05:07 11 -> /tmp/empty
lrwx-- 1 root root 64 Nov 20 05:07 2 -> /dev/pts/0


As the test case shows, I need to redirect stdout (file descriptor 1), but
this failed in dash(1) without any warning. The same program works in bash(1)
as expected.


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: ppc64

Kernel: Linux 4.19.271-rivoreo-powerpc64-largepage (SMP w/176 CPU threads)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: unable to detect

Versions of packages dash depends on:
ii  debianutils  5.14
ii  dpkg 1.22.0
ii  libc62.37-12

dash recommends no packages.

dash suggests no packages.

-- no debconf information



Bug#1053021: Additional information

2023-11-19 Thread tony mancill
On Mon, Nov 20, 2023 at 05:06:22PM +1300, Vladimir Petko wrote:
> Dear Maintainers,
> 
>   Would it be possible to consider a merge request[1] that addresses this
> issue?
> 
> Best Regards,
>  Vladimir.
> 
>  [1] https://salsa.debian.org/java-team/dbus-java/-/merge_requests/1

Yes, and thank you for the update.  I will upload with this patch soon.

Cheers,
tony


signature.asc
Description: PGP signature


Bug#1053021: Additional information

2023-11-19 Thread Vladimir Petko
Dear Maintainers,

  Would it be possible to consider a merge request[1] that addresses this
issue?

Best Regards,
 Vladimir.

 [1] https://salsa.debian.org/java-team/dbus-java/-/merge_requests/1


Bug#1053018: Additional information

2023-11-19 Thread Vladimir Petko
Dear Maintainers,

  Would it be possible to consider a merge request[1] that addresses this
issue?

Best Regards,
 Vladimir.

 [1] https://salsa.debian.org/java-team/closure-compiler/-/merge_requests/2


Bug#1056295: geeqie: webp images no longer viewable

2023-11-19 Thread Dean Hamstead
Package: geeqie
Version: 1:2.1-1
Severity: important

Dear Maintainer,

Upon recent update, webp images are no longer viewable


Here is a file that is webp and previously viewable, but now gives an
erro and doesnt view


dean@wheeljack:~/pics$ file 271366_20211213110900.webp
271366_20211213110900.webp: RIFF (little-endian) data, Web/P image, VP8 
encoding, 1333x1999, Scaling: [none]x[none], YUV color, decoders should clamp
dean@wheeljack:~/pics$ geeqie 271366_20211213110900.webp
Error reading GIF file: Unrecognized image file format


This may be a library rather than geeqie itself, if so then please point
me in the right direction


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 6.5.11-x64v3-xanmod1 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages geeqie depends on:
ii  geeqie-common1:2.1-1
ii  libarchive13 3.7.2-1
ii  libc62.37-12
ii  libcairo21.18.0-1
ii  libdjvulibre21   3.5.28-2+b1
ii  libexiv2-27  0.27.6-1
ii  libffmpegthumbnailer4v5  2.2.2+git20220218+dfsg-2
ii  libgcc-s113.2.0-6
ii  libgdk-pixbuf-2.0-0  2.42.10+dfsg-3
ii  libglib2.0-0 2.78.1-4
ii  libgspell-1-21.12.2-1
ii  libgtk-3-0   3.24.38-6
ii  libheif1 1.17.1-1+b1
ii  libjpeg62-turbo  1:2.1.5-2
ii  libjxl0.70.7.0-10.2
ii  liblcms2-2   2.14-2
ii  liblua5.3-0  5.3.6-2
ii  libopenjp2-7 2.5.0-2
ii  libpango-1.0-0   1.51.0+ds-3
ii  libpangocairo-1.0-0  1.51.0+ds-3
ii  libpoppler-glib8 22.12.0-2+b1
ii  libraw23 0.21.1-7
ii  libstdc++6   13.2.0-6
ii  libtiff6 4.5.1+git230720-1
ii  sensible-utils   0.0.20

Versions of packages geeqie recommends:
ii  cups-bsd [lpr]   2.4.7-1
ii  exiftran 2.10-5
ii  exiv20.27.6-1
ii  imagemagick  8:6.9.12.98+dfsg1-4
ii  imagemagick-6.q16 [imagemagick]  8:6.9.12.98+dfsg1-4
ii  librsvg2-common  2.54.7+dfsg-2
ii  zenity   3.44.2-1

Versions of packages geeqie suggests:
ii  gimp   2.10.36-1
pn  libjpeg-progs  
pn  xpaint 

-- no debconf information



Bug#1055067: isc-dhcp-client: network-manager 1.44.2-3 changed path to nm-dhcp-helper, apparmor need update

2023-11-19 Thread Jan Larres
Package: isc-dhcp-client
Version: 4.4.3-P1-4
Followup-For: Bug #1055067

I can confirm this, after a recent upgrade I lost network connectivity
and it took some digging to determine the cause. Using dhclient with
NetworkManager is probably not uncommon (especially since it's
NetworkManager's default behaviour if dhclient is installed), so this
should probably be fixed soon so that other people don't suddenly lose
their network as well.

Cheers,

Jan



-- System Information:
Debian Release: trixie/sid
APT prefers unstable-debug
APT policy: (500, 'unstable-debug'), (500, 'unstable'), (102,
'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.5.0-1-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_NZ.UTF-8, LC_CTYPE=en_NZ.UTF-8 (charmap=UTF-8),
LANGUAGE=en_NZ:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages isc-dhcp-client depends on:
ii debianutils 5.14
ii iproute2 6.6.0-1
ii libc6 2.37-12

Versions of packages isc-dhcp-client recommends:
ii isc-dhcp-common 4.4.3-P1-4

Versions of packages isc-dhcp-client suggests:
ii avahi-autoipd 0.8-13
pn isc-dhcp-client-ddns
ii systemd-resolved [resolvconf] 255~rc2-2

-- Configuration Files:
/etc/apparmor.d/sbin.dhclient changed [not included]

-- no debconf information


Bug#1056294: RFS: xsnow/1:3.7.6-1 -- brings Christmas to your desktop

2023-11-19 Thread Willem Vermin

Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "xsnow":

 * Package name : xsnow
   Version  : 1:3.7.6-1
   Upstream contact : Willem Vermin 
 * URL  : https://sourceforge.net/projects/xsnow/
 * License  : GPL-3+
 * Vcs  : [fill in URL of packaging vcs]
   Section  : games

The source builds the following binary packages:

  xsnow - brings Christmas to your desktop

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/xsnow/

Alternatively, you can download the package with 'dget' using this command:

  dget -x https://mentors.debian.net/debian/pool/main/x/xsnow/xsnow_3.7.6-1.dsc

Changes since the last upload:

 xsnow (1:3.7.6-1) unstable; urgency=low
 .
   * New upstream release
   * Changed Standards Version to 4.6.2

The current sponsor is Adam Borowski, but he is not able to take care of it in 
the near future.

Regards,

Willem Vermin



Bug#1056293: gettext: msgfmt --java2 does not support Java 21

2023-11-19 Thread Vladimir Petko
Package: gettext
Version: 0.21-13
Severity: important
Tags: ftbfs sid trixie
User: debian-j...@lists.debian.org
Usertags: default-java21
X-Debbugs-Cc: vladimir.pe...@canonical.com

Dear Maintainer,

When building 'ssl-utils-clojure' package with Java 21 as default, the build
fails with the following trace:
--
Applying task i18n to [make]
Running 'make i18n'
make[1]: *** [debian/rules:19: override_dh_auto_build] Error 1
make[1]: Leaving directory '/<>'
make: *** [debian/rules:12: binary] Error 2
dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2
--

Running make in the build chroot produces the following error:
---
msgfmt --java2 -d resources -r puppetlabs.ssl_utils.Messages -l eo
locales/eo.po
msgfmt: Java compiler not found, try installing gcj or set $JAVAC
msgfmt: compilation of Java class failed, please try --verbose or set $JAVAC
make: *** [dev-resources/Makefile.i18n:94:
resources/puppetlabs/ssl_utils/Messages_eo.class] Error 1
---

It appears that gettext package does not support Java 21.

Best Regards,
 Vladimir.


-- System Information:
Debian Release: trixie/sid
  APT prefers mantic-updates
  APT policy: (500, 'mantic-updates'), (500, 'mantic-security'), (500, 'mantic')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.5.0-10-generic (SMP w/32 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages gettext depends on:
ii  gettext-base   0.21-13
ii  libc6  2.38-1ubuntu6
ii  libgomp1   13.2.0-4ubuntu3
ii  libunistring2  1.0-2
ii  libxml22.9.14+dfsg-1.3

Versions of packages gettext recommends:
ii  curl  8.2.1-1ubuntu3.1
ii  wget  1.21.3-1ubuntu1

Versions of packages gettext suggests:
ii  autopoint 0.21-13
pn  gettext-doc   
pn  libasprintf-dev   
pn  libgettextpo-dev  



Bug#1052574: geotranz: FTBFS with OpenJDK 21 due to unsupported javac source/target level 7

2023-11-19 Thread Vladimir Petko
Dear Maintainers,

Would it be possible to consider the attached debdiff as a fix for this
issue?

Testing done:
 - build in sid chroot
 - build in sid chroot with default Java 21

Thank you for considering this patch!!!

Best Regards,
 Vladimir.


geotranz_1052574.debdiff
Description: Binary data


Bug#1054125: dh-builtusing: Please backport dh-builtusing to bookworm

2023-11-19 Thread Daniel Gröber
Hi Nicolas,

On Sat, Nov 18, 2023 at 06:27:42PM +0100, Nicolas Boulenguez wrote:
> Have you seen this?
> https://lists.debian.org/debian-devel/2023/08/

What exactly are you referring to? That's the whole month's archive :)
Yes I do read d-devel so I've likely seen whatever you're pointing to :p

> > I've been toying with the idea of setting up a Debian-wide system to nag
> > maintainers about out-of-date, inconsistent or plain broken packaging git
> > repos. This logic to diff the dsc against one built from unstable could be
> > part of that effort.
> 
> Some will probably argue that you are trying to influence their
> priorities, that non-git .dsc formats are obsolete, and so on.

And that's a bad thing because ... ? There's a huge difference between
nudging and forcing :)

> Moreover, even if you guess the git tag and whether patches are
> applied, there is probably no deterministic way to tell if .gitignore
> matches the workflow of upstream, Debian or both.

Sounds like a job for a new config option in debian/source/ or similar,
this is conceptually no different than lintian false-positives. As long as
there's a way to override I don't see a problem.

> For the avoidance of doubt, I would appreciate such alerts, a Debian
> policy about tags and patches, and that .gitignore is only allowed for
> self defense...

I for sure don't have all this thought yet, I'm happy to collaborate on
designing this system if you're interested.

BTW: are you at ccc congress?

> > Even with git what may be missing is a hook in dpkg-buildpackage to abort
> > the (source) build when the worktree is unclean,
> 
> I often build with manual changes in debian/ that I want tested before
> committed.

Right yeah same. So that wouldn't really help. gbp's --git-ignore-new is
already annoying me enough :)

> The script I am using is too lazy for public exposure.

You can always send me those shameful scripts directly, I don't judge.sh.

> Here are the parts unrelated with pbuilder.
> 
> # After a successful build, clean and compare the source directory
> # with the contents extracted by dpkg-source.
> # The diff must match debian/clean.diff if it exists, else be empty.
> # Example:
> # Only in ../dsc: Makefile.in
> # Only in ../dsc: config.h
> # Only in ../dsc: configure
> # If lots of files are removed, repackaging with Files-Excluded is
> # probably a better option, see uscan(1).
> 
> #!/bin/sh
> set -Ceux
> 
> source=$(dpkg-parsechangelog -SSource)
> version=$(dpkg-parsechangelog -SVersion)
> dsc_dir=../dsc
> 
> debian/rules clean
> dpkg-source -x ../$source_$version.dsc $dsc_dir
> if ! (diff -qr $dsc_dir . || true) | diff -N debian/clean.diff -; then
>   # Display a full diagnostic while $dsc_dir is available.
>   diff -ru $dsc_dir . || true
>   # When -ru is empty, -N above already reported the obsolete clean.diff.
> fi
> rm -fr $dsc_dir

I see, this is actually really clever. I don't see why we couldn't do this
diff on the buildds to get reporting for this Debian wide. I've been
meaning to give sbuild some love anyhow.

--Daniel


signature.asc
Description: PGP signature


Bug#1056145: e2fsprogs: FTBFS on hurd-i386

2023-11-19 Thread Theodore Ts'o
tag 1056145 pending
thanks

On Fri, Nov 17, 2023 at 07:09:27PM +0100, Svante Signell wrote:
> Source: e2fsprogs
> Version: 1.47.0-2
> Severity: important
> Tags: patch
> User: debian-h...@lists.debian.org
> Usertags: hurd
> X-Debbugs-CC: debian-h...@lists.debian.org
> 
> I chose to submit this patch to Debian instead of upstream as recommended. The
> upstream reports seemed to be a little dated:
> https://sourceforge.net/projects/e2fsprogs/ However, that page has the latest
> version available for download.

The upstream git repo is at
https://git.kernel.org/pub/scm/fs/ext2/e2fsprogs.git and most
discussions happen on the linux-ext4 kernel mailing list on
vger.kernel.org.  I don't really use sourceforge for much besides
uploading the release tarballs mostly for old time's sake.

But that's fine, becuase in addition to being the Debian maintainer
for e2fsprogs, I'malso the upstream maintainer.  :-)

> Regarding the patch it is a very simple ifdef solution to that specific file. 
> As
> can be found in other parts of the code similar definitions are made. Maybe a
> common header file defining PATH_MAX would be a better solution. (or 
> dynamically
> allocating space for strings as is recommended for GNU/Hurd)

We don't have a common header file which includes limit.h, which is
what brings in PATH_MAX.  And the library interfaces are set up much
like gethostname, where the caller allocates the buffer and passes in
a length.

So we'll just do what we've done in other places, and what most other
programs do that seem to deal with Hurd's lack of PATH_MAX.  Unlike
your patch, though, we'll put the #ifndef PATH_MAX at the beginning of
file, after the header files are included.

- Ted

commit 795dcc264f48098ca5b214bba7d1b94189b2e491
Author: Theodore Ts'o 
Date:   Sun Nov 19 21:06:12 2023 -0500

tune2fs.c: define PATH_MAX if it is not defined by the system headers

This is needed to compile on GNU/Hurd.

Addresses-Debian-Bug: #1056145
Signed-off-by: Theodore Ts'o 

diff --git a/misc/tune2fs.c b/misc/tune2fs.c
index 458f7cf6a..9ffe0d199 100644
--- a/misc/tune2fs.c
+++ b/misc/tune2fs.c
@@ -51,11 +51,15 @@ extern int optind;
 #include 
 #include 
 #include 
-#include 
+#include /* for PATH_MAX */
 #ifdef HAVE_SYS_IOCTL_H
 #include 
 #endif
 
+#ifndef PATH_MAX
+#define PATH_MAX 4096
+#endif
+
 #include "ext2fs/ext2_fs.h"
 #include "ext2fs/ext2fs.h"
 #include "ext2fs/kernel-jbd.h"



Bug#1052589: Additional information

2023-11-19 Thread Vladimir Petko
Dear Maintainers,

  Would it be possible to consider a merge request[1] that addresses this
issue?

Best Regards,
 Vladimir.

 [1]
https://salsa.debian.org/java-team/xml-commons-external/-/merge_requests/1


Bug#1052589: Additional information

2023-11-19 Thread Vladimir Petko
Dear Maintainers,

  Would it be possible to consider a merge request[1] that addresses this
issue?
Note: alternatively a new upstream release (M27) does not have this problem.

Best Regards,
 Vladimir.

 [1]
https://salsa.debian.org/java-team/apache-directory-server/-/merge_requests/1


Bug#1056204: nmu: texlive-bin_2023.20230311.66589-7

2023-11-19 Thread Adrian Bunk
On Mon, Nov 20, 2023 at 12:05:46AM +0100, Hilmar Preuße wrote:
> On 11/19/23 00:40, Adrian Bunk wrote:
> 
> Hi Adrian,

Hi Hilmar,

> > A proper fix would be either to:
> > 1. patch the version check out of texlive-bin (preferred), or
> > 
> Did so, see [1]. I did not remove the check completely, I just un-tightened
> the version. I can confirm that a texlive package linked on testing (zlib
> 1.2.x) is installable on unstable (zlib 1.3.x). I hope this solves the issue
> for the next 20 years. I intend to upload new packages tomorrow, this NMU
> bug can be closed, once this has been done.
> 
> I just noticed that we had this issue already 13 years ago. [2]

And from then zlib1g still has the
  Breaks: texlive-binaries (<< 2009-12)
that will also require updating again.

Is there any reason why the check exists at all?

If the only effect is breakage every 10-20 years,
then it's wrong to keep it.

This check would make sense if zlib would make buggy changes where the 
ABI changes without chaning the library soname, but that is not supposed 
to happen and if it would happen with a library as widely used as zlib 
then so much would break in unstable that the revert would be instant.

> Hilmar
>...

cu
Adrian



Bug#1039271: mumble: ships sysv-init script without systemd unit

2023-11-19 Thread Chris Knadle

Greetings.

I'll to try to incorporate the upstream .service file if possible.b

The issue I keep running into with .service files with mumble-server is
that I'm not able to get the daemon to start with systemd with most of
the .service files I've seen and tried for it so far. Had worked out a 
working

.service file for mumble-server many moons ago as part of another bug
report, but I haven't been able to find that work I did again in order to
incorporate that.

Lack of being able to work out a working .service file is also what has
led to delay in releasing Mumble 1.5.517 which I've had a package mostly
ready for release since February. :-(

Thanks for finding the upstream mumble 1.3.4 service file, I hope that
will work in the test VM I have for it.

  -- Chris

On 11/12/23 07:59, Chris Hofstaedtler wrote:

Control: reassign -1 mumble-server

Hi,

* bl...@debian.org :

Package: mumble
Severity: important
Usertags: missing-systemd-service


[..]

mumble has been flagged by Lintian as shipping a sysv-init script
without a corresponding systemd unit file. The default init system in
Debian is systemd, and so far this worked because a transitional
sysv-init-to-unit generator was shipped by systemd. This is in the
process of being deprecated and will be removed by the time Trixie
ships, so the remaining packages that ship init scripts without
systemd units will stop working.

Upstream actually includes a .service file in the source tree, as
can be seen here:
https://sources.debian.org/src/mumble/1.3.4-4/scripts/murmur.service/

It seems like installing it with a small patch for the Debian path
derivation should hopefully do the job.

Best,
Chris




Bug#1056279: Looks like the systemctl links are gone but not the pm-utils ones

2023-11-19 Thread Helmut Grohne
Control: tags -1 + confirmed
Control: clone -1 -2
Control: reassign -2 systemd-sysv
Control: found -2 255-rc2-1
Control: retitle -2 duplicated diversions are still broken by moved files

On Sun, Nov 19, 2023 at 02:08:35PM -0800, Francois Marier wrote:
> I'm also a little confused by the diverts. Perhaps something changed in
> systemd (which owns the ultimate underlying symlinks)?

I was sure I had this properly tested and yet it doesn't work as
expected. I'm sorry for having gotten this wrong.

Reproducer:

mmdebstrap bookworm /dev/null http://deb.debian.org/debian 
--include=systemd-sysv,molly-guard --customize-hook='sed -i -e s/bookworm/sid/ 
$1/etc/apt/sources.list' --chrooted-customize-hook='apt-get update' 
--chrooted-customize-hook='apt-get -y install systemd-sysv' 
--customize-hook='ls -l $1/lib/molly-guard/'

Different reproducer:

mmdebstrap trixie /dev/null http://deb.debian.org/debian 
--include=systemd-sysv,molly-guard --customize-hook='sed -i -e s/trixie/sid/ 
$1/etc/apt/sources.list' --chrooted-customize-hook='apt-get update' 
--customize-hook='test -e $1/lib/molly-guard/reboot' 
--chrooted-customize-hook='apt-get -y install systemd-sysv' 
--customize-hook='ls -l $1/lib/molly-guard/'

Specifically, the files vanish on upgrading systemd-sysv such that
/sbin/reboot moves to /usr/sbin/reboot. I should have seen this failure
in earlier tests.

I've dug into dpkg and usually when it moves a file from / to /usr,
it'll first unpack the new file (unknowingly replacing the existing old
one) and then removes the old one (via pkg_remove_old_files). During
that removal, it has a check to see whether the file to be removed
happens to match one of the files it just installed and skips the
removal in that case. For some reason, this safety check does not work
when the file is diverted.

So I have a vague understanding of what is wrong here, but no solution
yet. For the time being, I duplicate this into a blocker bug for
systemd-sysv to prevent it from migrating to testing until we figure out
a solution.

Sorry for the inconvenience.

Helmut



Bug#1055919: python-ansible-pygments: please make the build reproducible

2023-11-19 Thread Stuart Prescott

Control: clone 1055919 -1

Control: reassign -1 dh-python 5.20230130+deb12u1


Making a clone of this bug for dh-python to track it getting fixed 
there; MR to come.



Context:

On Thu, 16 Nov 2023 17:33:58 +1100 Stuart Prescott  
wrote:


> tldr: smells like a dh-python bug - I'll look at it more and reassign
> etc later.
>
>
> Staring at some build logs some more:
>
> * the dirs are generated always
> * they get copied from .../.pybuild to ../debian/$package/ always
> * they are supposed to get removed by dh_python3
> * that removal is not always working
>
> A common theme of the failures is that there are _two_
> /usr/lib/python3.11/dist-packages/.foo directories to remove and only
> one of them is being removed. For python-ansible-pygments, .pytest_cache
> was being removed by dh-python3 but .test-results was not.
>
> Adding in PYBUILD_VERBOSE=1 and some breakpoints into dh-python
> (specifically /usr/share/dh-python/dhpython/fs.py), I think there's a
> subtle bug about altering `dirs` while inside a loop from `os.walk`:
>
> for name in dirs:
> if name in ('test', 'tests') or name.startswith('.'):
> log.debug('removing dist-packages/%s', name)
> rmtree(join(root, name))
> dirs.remove(name)
>
> Removing `name` from `dirs` means that the next item is accidentally
> skipped. A classic "don't change the object you're iterating through
> while you are iterating through it" issue:
>
> In [1]: L = list(range(0, 10))
>
> In [2]: for i in L:
> ...: print(i)
> ...: L.remove(i)
> ...:
> 0
> 2
> 4
> 6
> 8
>
> Which item is not processed in the next iteration by dh_python3 now
> depends on the order in which `os.walk` lists the directories. That is
> presumably dependent on all manner of things (filesystem? collation?
> luck?). On the r-b setup and building by hand I get different results to
> within sbuild (and on the buildd).
>
> In sbuild on ext4, `find -type d` (I have memory that this reflects disk
> order?) has an order in
> ./debian/python3-ansible-pygments/usr/lib/python3.11/dist-packages of:
>
> .test-results ansible_pygments .pytest_cache
>
> while building by hand on tmpfs, I get
>
> ansible_pygments .test-results .pytest_cache
>
> For the former, accidentally skipping the directory after the one that
> gets removed isn't an issue, but for the latter it is.

--
Stuart Prescott   http://www.nanonanonano.net/ stu...@nanonanonano.net
Debian Developer  http://www.debian.org/   stu...@debian.org
GPG fingerprint   90E2 D2C1 AD14 6A1B 7EBB 891D BBC1 7EBB 1396 F2F7



Bug#1056204: nmu: texlive-bin_2023.20230311.66589-7

2023-11-19 Thread Hilmar Preuße

On 11/19/23 00:40, Adrian Bunk wrote:

Hi Adrian,


A proper fix would be either to:
1. patch the version check out of texlive-bin (preferred), or

Did so, see [1]. I did not remove the check completely, I just 
un-tightened the version. I can confirm that a texlive package linked on 
testing (zlib 1.2.x) is installable on unstable (zlib 1.3.x). I hope 
this solves the issue for the next 20 years. I intend to upload new 
packages tomorrow, this NMU bug can be closed, once this has been done.


I just noticed that we had this issue already 13 years ago. [2]

Hilmar

[1] 
https://github.com/debian-tex/texlive-bin/blob/master/debian/patches/untighten_version_check_zlib.diff

[2] https://lists.debian.org/debian-tex-maint/2010/06/msg00071.html
--
Testmail



OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1056290: systemd-homed should require libnss-systemd

2023-11-19 Thread Alexander Bochmann
Package: systemd-homed
Version: 254.5-1~bpo12+2
Severity: normal

Hello,

I recently tried to manage a local user account through systemd-homed,
and noticed that it isn't operable without libnss-systemd and the 
associated changes to /etc/nsswitch.conf, as mentioned in the 
nss-systemd(8) man page.

I would probably be useful to always have libnss-systemd installed 
together with systemd-homed.

Alex.


-- System Information:
Debian Release: 12.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: arm64 (aarch64)
Foreign Architectures: armhf

Kernel: Linux 6.1.0-rpi6-rpi-v8 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_CRAP
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages systemd-homed depends on:
ii  init-system-helpers  1.65.2
ii  libblkid12.38.1-5+b1
ii  libc62.36-9+rpt2+deb12u3
ii  libcap2  1:2.66-4
ii  libfdisk12.38.1-5+b1
ii  libp11-kit0  0.24.1-2
ii  libpam-runtime   1.5.2-6+rpt2+deb12u1
ii  libpam0g 1.5.2-6+rpt2+deb12u1
ii  libssl3  3.0.11-1~deb12u2+rpt1
ii  libsystemd-shared254.5-1~bpo12+2
ii  systemd  254.5-1~bpo12+2
ii  systemd-userdbd  254.5-1~bpo12+2

systemd-homed recommends no packages.

systemd-homed suggests no packages.

-- no debconf information



Bug#1056289: Clarification of error message in u-boot-install-sunxi

2023-11-19 Thread harry88
Package: u-boot-sunxi
Version: 2023.07+dfsg-1
Severity: normal
Tags: patch

Hi Vagrant,

When u-boot-install-sunxi does not recognise the system model name, it
prints the following error message:

  ERROR: Unknown system: (...)
  Specify target: TARGET=/usr/lib/u-boot/UBOOT

I think it might not be clear to everyone what "UBOOT" means here, so
I suggest "/" instead. The patch is below.

(This is the last of the minor changes suggested in bug#979688 that I
meant to file separate bug reports for.)

Thanks very much,
Harold.


diff --git a/debian/bin/u-boot-install-sunxi b/debian/bin/u-boot-install-sunxi
index b3af2c0b80..f3732ce326 100755
--- a/debian/bin/u-boot-install-sunxi
+++ b/debian/bin/u-boot-install-sunxi
@@ -50,7 +50,7 @@ if [ -z "$TARGET" ] && [ -f "${dtmodel}" ]; then
"Xunlong Orange Pi Zero") 
TARGET="/usr/lib/u-boot/orangepi_zero" ;;
*)
echo >&2 "ERROR: Unknown system: ${dtmodelname}"
-   echo >&2 "Specify target: TARGET=/usr/lib/u-boot/UBOOT"
+   echo >&2 "Specify target: 
TARGET=/usr/lib/u-boot//"
exit 1
;;
esac



Bug#1056166: systemd-homed: `passwd` fails

2023-11-19 Thread Alexander Bochmann
Package: systemd-homed
Version: 254.5-1~bpo12+2
Followup-For: Bug #1056166

Hello,

I can confirm this problem still exists in bookworm and 
bookworm-backports:

As soon as the Debian systemd-homed PAM configuration is activated 
by pam-auth-update, it's not possible to change passwords of 
users that come from /etc/passwd anymore.

This seems to be due to a PAM misconfiguration. I don't understand
enough of the Debian PAM setup to say why it doesn't work, but 
I tried replacing the rules with alternatives that I copied from 
an openSUSE Tumbleweed install, and using those it's possible to 
change details on users both from /etc/passwd and systemd-homed.

Alex.


-- System Information:
Debian Release: 12.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: arm64 (aarch64)
Foreign Architectures: armhf

Kernel: Linux 6.1.0-rpi6-rpi-v8 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_CRAP
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages systemd-homed depends on:
ii  init-system-helpers  1.65.2
ii  libblkid12.38.1-5+b1
ii  libc62.36-9+rpt2+deb12u3
ii  libcap2  1:2.66-4
ii  libfdisk12.38.1-5+b1
ii  libp11-kit0  0.24.1-2
ii  libpam-runtime   1.5.2-6+rpt2+deb12u1
ii  libpam0g 1.5.2-6+rpt2+deb12u1
ii  libssl3  3.0.11-1~deb12u2+rpt1
ii  libsystemd-shared254.5-1~bpo12+2
ii  systemd  254.5-1~bpo12+2
ii  systemd-userdbd  254.5-1~bpo12+2

systemd-homed recommends no packages.

systemd-homed suggests no packages.

-- no debconf information



Bug#1056288: django-assets FTBFS: TypeError: 'TextNode' object is not iterable

2023-11-19 Thread Adrian Bunk
Source: django-assets
Version: 2.0-3
Severity: serious
Tags: ftbfs

https://buildd.debian.org/status/fetch.php?pkg=django-assets=all=2.0-3=1700432008=0

...
   dh_auto_test -i -O--buildsystem=pybuild
I: pybuild base:310: cd 
/<>/.pybuild/cpython3_3.11_django-assets/build; python3.11 -m nose 
-v tests
tests.test_django.TestConfig.test_custom_options ... ok
The builtin options have different names within the Django ... ok
tests.test_django.TestFilter.test_template ... ok
tests.test_django.TestLoader.test ... ERROR
tests.test_django.TestLoader.test_cached_loader ... ERROR
Finders are used to find source files. ... ok
If debug is disabled, the finders are not used. ... ok
Test that the cssrewrite filter can deal with staticfiles. ... ok
Globs can be used across staticdirs. ... ok
Recursive globs. ... ok
An error is raised if a source file is missing. ... ok
The files we write to STATIC_ROOT are served in debug mode ... ok
tests.test_django.TestTemplateTag.test_debug_option ... ok
Ensure the tag correcly spits out the urls the bundle returns. ... ok
tests.test_django.TestTemplateTag.test_reference_bundles ... ok
tests.test_django.TestTemplateTag.test_reference_files ... ok
tests.test_django.TestTemplateTag.test_reference_mixed ... ok
Using commas is optional. ... ok
tests.test_django.TestTemplateTag.test_with_vars ... ok

==
ERROR: tests.test_django.TestLoader.test
--
Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/nose/case.py", line 197, in runTest
self.test(*self.arg)
  File 
"/<>/.pybuild/cpython3_3.11_django-assets/build/tests/test_django.py",
 line 193, in test
bundles = self.loader.load_bundles()
  ^^
  File 
"/<>/.pybuild/cpython3_3.11_django-assets/build/django_assets/loaders.py",
 line 79, in load_bundles
bundles.extend(self.with_file(filename, self._parse) or [])
   ^
  File "/usr/lib/python3/dist-packages/webassets/loaders.py", line 333, in 
with_file
return then_run(filename, contents)
   
  File 
"/<>/.pybuild/cpython3_3.11_django-assets/build/django_assets/loaders.py",
 line 110, in _parse
for node in t:  # don't move into _recurse_node, ``Template`` has a 
.nodelist attribute
  File "/usr/lib/python3/dist-packages/django/template/base.py", line 158, in 
__iter__
yield from node
TypeError: 'TextNode' object is not iterable

==
ERROR: tests.test_django.TestLoader.test_cached_loader
--
Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/nose/case.py", line 197, in runTest
self.test(*self.arg)
  File 
"/<>/.pybuild/cpython3_3.11_django-assets/build/tests/test_django.py",
 line 203, in test_cached_loader
bundles = self.loader.load_bundles()
  ^^
  File 
"/<>/.pybuild/cpython3_3.11_django-assets/build/django_assets/loaders.py",
 line 79, in load_bundles
bundles.extend(self.with_file(filename, self._parse) or [])
   ^
  File "/usr/lib/python3/dist-packages/webassets/loaders.py", line 333, in 
with_file
return then_run(filename, contents)
   
  File 
"/<>/.pybuild/cpython3_3.11_django-assets/build/django_assets/loaders.py",
 line 110, in _parse
for node in t:  # don't move into _recurse_node, ``Template`` has a 
.nodelist attribute
  File "/usr/lib/python3/dist-packages/django/template/base.py", line 158, in 
__iter__
yield from node
TypeError: 'TextNode' object is not iterable

--
Ran 19 tests in 0.113s

FAILED (errors=2)



Bug#1053700: xarray test failure on s390x

2023-11-19 Thread Rebecca N. Palmer

Control: tags -1 patch

These all come from xarray/tests/test_coding_times.py, and are probably 
fixable by replacing both instances of ("M8[ns]" if 
sys.byteorder=='big' else "haven't actually tried that.




Bug#1056279: Looks like the systemctl links are gone but not the pm-utils ones

2023-11-19 Thread Francois Marier
CCing Helmut who wrote the initial patch for systemd 255+ support (see
Bug#1055510).

I also see the same thing:

$ ls -lh /usr/lib/molly-guard/
Permissions Size User Group Date Modified Name
.rwxr-xr-x  3,4k root root  11 nov 14:02  molly-guard*
lrwxrwxrwx31 root root  14 nov  2019  pm-hibernate -> 
/usr/lib/pm-utils/bin/pm-action*
lrwxrwxrwx31 root root  14 nov  2019  pm-suspend -> 
/usr/lib/pm-utils/bin/pm-action*
lrwxrwxrwx31 root root  14 nov  2019  pm-suspend-hybrid -> 
/usr/lib/pm-utils/bin/pm-action*

$ sudo reboot --help
E: not a regular file: /usr/lib/molly-guard/reboot

I'm also a little confused by the diverts. Perhaps something changed in
systemd (which owns the ultimate underlying symlinks)?

Francois

-- 
https://fmarier.org/



Bug#1050854: xarray test failure on amd64

2023-11-19 Thread Rebecca N. Palmer

This bug is now a crash (not the original error message):
https://ci.debian.net/data/autopkgtest/testing/amd64/p/python-xarray/39962554/log.gz
I don't know whether the same patch still works.

The Salsa repository now appears to be up to date.

You probably also want to include the fixes for the other two RC bugs 
(see there).




Bug#1056287: adios2: binary-all FTBFS

2023-11-19 Thread Adrian Bunk
Source: adios2
Version: 2.8.2+dfsg1-2
Severity: serious
Tags: ftbfs
X-Debbugs-Cc: Drew Parsons 

https://buildd.debian.org/status/fetch.php?pkg=adios2=all=2.8.2%2Bdfsg1-2=1700402832=0

...
   debian/rules override_dh_missing
make[1]: Entering directory '/<>'
dh_missing --sourcedir=install-serial
dh_missing: warning: usr/bin/adios2-config.serial exists in install-serial but 
is not installed to anywhere 
dh_missing: error: missing files, aborting
The following debhelper tools have reported what they installed (with 
files per package)
 * dh_cmake_install: adios2-data (13), adios2-mpi-bin (7), 
adios2-scripts (14), adios2-serial-bin (4), libadios2-mpi-c++11-2 (4), 
libadios2-mpi-c++11-dev (16), libadios2-mpi-c-2 (4), libadios2-mpi-c-dev (12), 
libadios2-mpi-core-2 (5), libadios2-mpi-core-dev (184), libadios2-mpi-fortran-2 
(4), libadios2-mpi-fortran-dev (33), libadios2-serial-c++11-2 (2), 
libadios2-serial-c++11-dev (15), libadios2-serial-c-2 (2), 
libadios2-serial-c-dev (11), libadios2-serial-core-2 (3), 
libadios2-serial-core-dev (183), libadios2-serial-fortran-2 (2), 
libadios2-serial-fortran-dev (30), python3-adios2-mpi (1), 
python3-adios2-serial (1)
 * dh_install: adios2-data (0), adios2-mpi-bin (0), adios2-scripts (0), 
adios2-serial-bin (0), libadios2-common-c++11-dev (0), libadios2-common-c-dev 
(0), libadios2-common-core-dev (0), libadios2-mpi-auxiliary-2 (10), 
libadios2-mpi-auxiliary-dev (6), libadios2-mpi-c++11-2 (0), 
libadios2-mpi-c++11-dev (0), libadios2-mpi-c-2 (0), libadios2-mpi-c-dev (0), 
libadios2-mpi-core-2 (0), libadios2-mpi-core-dev (0), libadios2-mpi-fortran-2 
(0), libadios2-mpi-fortran-dev (0), libadios2-serial-auxiliary-2 (10), 
libadios2-serial-auxiliary-dev (6), libadios2-serial-c++11-2 (0), 
libadios2-serial-c++11-dev (0), libadios2-serial-c-2 (0), 
libadios2-serial-c-dev (0), libadios2-serial-core-2 (0), 
libadios2-serial-core-dev (0), libadios2-serial-fortran-2 (0), 
libadios2-serial-fortran-dev (0), python3-adios2 (1), python3-adios2-mpi (0), 
python3-adios2-serial (0)
 * dh_installdocs: adios2-data (0), adios2-mpi-bin (0), adios2-scripts 
(0), adios2-serial-bin (0), libadios2-common-c++11-dev (0), 
libadios2-common-c-dev (0), libadios2-common-core-dev (0), 
libadios2-mpi-auxiliary-2 (0), libadios2-mpi-auxiliary-dev (0), 
libadios2-mpi-c++11-2 (0), libadios2-mpi-c++11-dev (0), libadios2-mpi-c-2 (0), 
libadios2-mpi-c-dev (0), libadios2-mpi-core-2 (0), libadios2-mpi-core-dev (0), 
libadios2-mpi-fortran-2 (0), libadios2-mpi-fortran-dev (0), 
libadios2-serial-auxiliary-2 (0), libadios2-serial-auxiliary-dev (0), 
libadios2-serial-c++11-2 (0), libadios2-serial-c++11-dev (0), 
libadios2-serial-c-2 (0), libadios2-serial-c-dev (0), libadios2-serial-core-2 
(0), libadios2-serial-core-dev (0), libadios2-serial-fortran-2 (0), 
libadios2-serial-fortran-dev (0), python3-adios2 (1), python3-adios2-mpi (0), 
python3-adios2-serial (0)
If the missing files are installed by another tool, please file a bug 
against it.
When filing the report, if the tool is not part of debhelper itself, 
please reference the
"Logging helpers and dh_missing" section from the "PROGRAMMING" guide 
for debhelper (10.6.3+).
  (in the debhelper package: /usr/share/doc/debhelper/PROGRAMMING.md.gz)
Be sure to test with dpkg-buildpackage -A/-B as the results may vary 
when only a subset is built
If the omission is intentional or no other helper can take care of this 
consider adding the
paths to debian/not-installed.
make[1]: *** [debian/rules:172: override_dh_missing] Error 25



Bug#1044869: xarray test failure on i386

2023-11-19 Thread Rebecca N. Palmer

Control: tags -1 patch

This patch has been probably-by-accident dropped again, and hence this 
bug has reappeared again:

https://ci.debian.net/data/autopkgtest/testing/i386/p/python-xarray/39962705/log.gz

Re-adding it would probably work, but I haven't actually tried that.



Bug#1056286: node-get-stream: FTBFS in sid with internet access disabled

2023-11-19 Thread Gianfranco Costamagna

Package: node-get-stream
Version: 8.0.1-8
Severity: serious
Tags: patch

Hello,

looks like the package is using internet during tests, and so FTBFS without 
internet access.

The log is:

  ✔ string › handles truncated UTF-8 sequences over maxBuffer
  ✔ string › get stream with invalid UTF-8 sequences
  ─

  integration › works with fetch()

  Rejected promise returned by test. Reason:

  TypeError {
cause: Error {
  code: 'ENOTFOUND',
  errno: -3008,
  hostname: 'nodejs.org',
  syscall: 'getaddrinfo',
  message: 'getaddrinfo ENOTFOUND nodejs.org',
},
message: 'fetch failed',
  }

  › async file://test/integration.js:66:18

  ─

  1 test failed
dh_auto_test: error: /bin/sh -ex debian/tests/pkg-js/test returned exit code 1


Can you please have a look?

thanks

G.



Bug#1052586: Additional information

2023-11-19 Thread Vladimir Petko
Dear Maintainers,

  Would it be possible to consider a merge request[1] that addresses this
issue?

Best Regards,
 Vladimir.

 [1] https://salsa.debian.org/debian-astro-team/aladin/-/merge_requests/1


Bug#1052551: gnome-calculator: Does not start from GUI (gnome), incurs error: "Calculator is not responding force quit wait"

2023-11-19 Thread little_red_n
This is caused by this issue:
https://gitlab.gnome.org/GNOME/gnome-calculator/-/issues/359

Basically, if the calculator can't get the new exchange rate data (possibly 
because of a VPN) it won't run.

The workaround is to turn off Wi-Fi, run gnome-calculator, click on the 
hamburger menu in the upper right corner, click "Preferences", and then change 
the "Exchange rate refresh interval" to "Never".
Then the calculator will run, even with Wi-Fi turned back on. It just won't 
update the exchange rate.

--

ethical_haquer

Sent with [Proton Mail](https://proton.me/) secure email.

Bug#1056160: ITS: auctex

2023-11-19 Thread Davide G. M. Salvetti
>  PH == Preuße, Hilmar [2023-11-19]

[...]

PH> Actually it is #1056210 and friends.

Hi Hilmar, I see, thanks.  I should wait for a solution to #1056204
before uploading.

-- 
Thanks,
Davide



Bug#1052583: com-hypirion-io-clojure: FTBFS with OpenJDK 21 due to unsupported javac source/target level 7

2023-11-19 Thread Vladimir Petko
Dear Maintainers,

  Would it be possible to consider a merge request[1] that addresses this
issue?

Best Regards,
 Vladimir.

 [1]
https://salsa.debian.org/clojure-team/com-hypirion-io-clojure/-/merge_requests/2


Bug#1052582: nescc: FTBFS with OpenJDK 21 due to unsupported javac source/target level 7

2023-11-19 Thread Vladimir Petko
Dear Maintainers,

 Would it be possible to consider a merge request[1] that addresses this
issue?

Best Regards,
 Vladimir.

[1]
https://salsa.debian.org/debian/nescc/-/merge_requests/1#9c96da0e9f91d7d8937b69b524702c106258f0d1


Bug#1039533: Offer a way to just print the numbers, not also the units

2023-11-19 Thread Adrian Mariano
I added an example to the --terse entry in the manual.  Debian should
close this bug. 

On Thu, Jun 29, 2023 at 07:55:59AM -0500, Dan Jacobson wrote:
> Ah ha!
> You see the batch job user scours the man page, and only finds:
> 
> 
>-1, --one-line
>   Give  only  one  line of output (the forward conversion); do not
>   print the reverse conversion.  If  a  reciprocal  conversion  is
>   performed,  then  units will still print the “reciprocal conver‐
>   sion” line.
> 
>-t, --terse
>   Print only a single conversion factor.  This option can be  used
>   when  calling  units  from another program so that the output is
>   easy to parse.  This option has the combined effect of these op‐
>   tions:   ‘--strict’  ‘--quiet’  ‘--one-line’  ‘--compact’.  When
>   combined with ‘--version’ it produces a display showing only the
>   program name and version number.
> 
>--compact
>   Give  compact  output  featuring only the conversion factor; the
>   multiplication and division signs are not shown, and there is no
>   leading  whitespace.   If  you  convert to a unit list, then the
>   output is a semicolon separated list of factors.  This turns off
>   the ‘--verbose’ option.
> 
> But in fact, --terse should say:
> 
>-t, --terse
>   Print only a single conversion factor.  This option can be  used
>   when  calling  units  from another program so that the output is
>   easy to parse.  This option has the combined effect of these op‐
>   tions:   ‘--strict’  ‘--quiet’  ‘--one-line’  ‘--compact’.  When
>   combined with ‘--version’ it produces a display showing only the
>   program name and version number. And here we even strip
>   the units off:
> 
>   $ units --terse mile meters
>   1609.344
> 
> I am saying that people who are looking to strip things down... their
> eyes will focus on that part of the man page, so be sure to repeat that
> feature there.
> 
> So indeed, there is no need for things like,
> 
> $ dlocate --help
>   -f, --filename-only Strip 'package: ' prefix from search output
>   -p, --package-only  Output package names only when searching
> 
> because units already has what it needs. It just needs to mention it on
> the right spot on the man page again.  Thanks.



Bug#1056280: audacity: Welcome dialog show/hide text is not visible when Desktop Environment (DE) is in dark mode.

2023-11-19 Thread Phil Wyett
Control: forwarded 1056280 https://github.com/audacity/audacity/issues/2024

Upstream bug.

Seems like upstream are reluctant to fix.

Regards

Phil

-- 
Playing the game for the games sake.

* Debian Maintainer

Web:

* Debian Wiki: https://wiki.debian.org/PhilWyett
* Website: https://kathenas.org

Social:

* Instagram: kathenasorg
* Threads: @kathenasorg





signature.asc
Description: This is a digitally signed message part


Bug#1056285: RFS: opendkim/2.11.0~beta2-9 -- DomainKeys Identified Mail (DKIM) signing and verifying milter

2023-11-19 Thread David Bürgin
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "opendkim":

 * Package name : opendkim
   Version  : 2.11.0~beta2-9
   Upstream contact : The Trusted Domain Project
 * URL  : http://www.opendkim.org/
 * License  : BSD-3-clause and SOSL, ISC, GPL-3+ with AutoConf exception
 * Vcs  : https://salsa.debian.org/debian/opendkim
   Section  : mail

The source builds the following binary packages:

  opendkim - DomainKeys Identified Mail (DKIM) signing and verifying milter
  opendkim-tools - utilities for administering the OpenDKIM milter
  libopendkim11 - DomainKeys Identified Mail (DKIM) library
  libopendkim-dev - DomainKeys Identified Mail (DKIM) library (development 
files)
  libvbr2 - Vouch By Reference (VBR) library
  libvbr-dev - Vouch By Reference (VBR) library (development files)
  librbl1 - Real-time Blacklist (RBL) query library
  librbl-dev - Real-time Blacklist (RBL) query library (development files)
  miltertest - utility for testing milter applications

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/opendkim/

Alternatively, you can download the package with 'dget' using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/o/opendkim/opendkim_2.11.0~beta2-9.dsc

Changes since the last upload:

 opendkim (2.11.0~beta2-9) unstable; urgency=medium
 .
   [ David Bürgin ]
   * debian/patches: Add missing upstream bug metadata, add new patches:
 - rev-ares-deletion.patch: Delete Authentication-Results headers in
   reverse, addresses CVE-2022-48521 (Closes: #1041107).
 - ares-missing-space.patch: Add missing space in Auth-Results header.
   * Replace transitional libldap2-dev with libldap-dev in Build-Depends.
   * Remove obsolete lsb-base dependency in opendkim package.
   * Delete obsolete entries in debian/opendkim.NEWS.
 .
   [ Samuel Thibault ]
   * d/rules: Generalize hurd-i386 into hurd.

Thank you.


-- 
David



Bug#1052581: libmatthew-java: FTBFS with OpenJDK 21 due to unsupported javac source/target level 7

2023-11-19 Thread Vladimir Petko
Dear Maintainers,

Would it be possible to consider a merge request[1] that addresses this
issue?

Best Regards,
 Vladimir.

[1]
https://salsa.debian.org/debian-iot-team/libmatthew-java/-/merge_requests/4


Bug#1052580: swi-prolog: FTBFS with OpenJDK 21 due to unsupported javac source/target level 7

2023-11-19 Thread Vladimir Petko
Dear Maintainers,

 Would it be possible to consider a merge request[1] that addresses this
issue?

Best Regards,
 Vladimir.

[1] https://salsa.debian.org/debian/swi-prolog/-/merge_requests/3


Bug#1056153: 6.1.0-0.deb11.9-amd64: Linux version 6.1.0-0.deb11.9-amd64 booting to black screen, but 6.1.0-0.deb11.7-amd64 works

2023-11-19 Thread Salvatore Bonaccorso
Source: linux
Source-Version: 1056153

Hi,

On Sun, Nov 19, 2023 at 07:48:42PM +0100, Debian bugs wrote:
> Hi Salvatore,
> 
> Great!
> I installed linux-image-6.1.0-0.deb11.13-amd64-unsigned
> With kernel 6.1.55 it is booting again.

Thanks for confirming!

Regards,
Salvatore



Bug#1055907: nmu: libalien-wxwidgets-perl_0.69+dfsg-6+b3

2023-11-19 Thread Scott Talbert

On Sat, 18 Nov 2023, Cyril Brulebois wrote:


Scott Talbert  (2023-11-16):

Scott Talbert  (2023-11-13):

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
X-Debbugs-Cc: libalien-wxwidgets-p...@packages.debian.org
Control: affects -1 + src:libalien-wxwidgets-perl

nmu libalien-wxwidgets-perl_0.69+dfsg-6+b3 . ANY . unstable . -m "Rebuild for 
wxwidgets3.2 (3.2.4+dfsg-1)"


This looks like a redux of #1054146, with libwx-perl also needing a
binNMU (after the libalien-wxwidgets-perl one)?


Yeah, I did at least file both at the same time this round though :)
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055908


I was trying to suggest filing both in the same request, to have them
scheduled in one go.


I tried to figure out how to do that with reportbug, but I did not see an 
obvious way to do it.  For the future, how do I do that?  Hand-written bug 
report?


Scott



Bug#1056284: nss: CVE-2023-5388

2023-11-19 Thread Moritz Mühlenhoff
Source: nss
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for nss.

CVE-2023-5388[0]:
https://people.redhat.com/~hkario/marvin/ mentions that things
were improved in 3.6.1 via CVE-2023-4421, but CVE-2023-5388
was assigned for the remaining issue.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-5388
https://www.cve.org/CVERecord?id=CVE-2023-5388

Please adjust the affected versions in the BTS as needed.



Bug#1056283: postgresql-15: CVE-2023-5868 CVE-2023-5869 CVE-2023-5870

2023-11-19 Thread Moritz Mühlenhoff
Source: postgresql-15
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for postgresql-15.

CVE-2023-5868[0]:
https://www.postgresql.org/support/security/CVE-2023-5868/
https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/

CVE-2023-5869[1]:
https://www.postgresql.org/support/security/CVE-2023-5869/
https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/

CVE-2023-5870[2]:
https://www.postgresql.org/support/security/CVE-2023-5870/
https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-5868
https://www.cve.org/CVERecord?id=CVE-2023-5868
[1] https://security-tracker.debian.org/tracker/CVE-2023-5869
https://www.cve.org/CVERecord?id=CVE-2023-5869
[2] https://security-tracker.debian.org/tracker/CVE-2023-5870
https://www.cve.org/CVERecord?id=CVE-2023-5870

Please adjust the affected versions in the BTS as needed.



Bug#1056282: gpac: CVE-2023-47384 CVE-2023-4785 CVE-2023-48011 CVE-2023-48013 CVE-2023-48014 CVE-2023-5998 CVE-2023-46001

2023-11-19 Thread Moritz Mühlenhoff
Source: gpac
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for gpac.

CVE-2023-47384[0]:
| MP4Box GPAC v2.3-DEV-rev617-g671976fcc-master was discovered to
| contain a memory leak in the function gf_isom_add_chapter at
| /isomedia/isom_write.c. This vulnerability allows attackers to cause
| a Denial of Service (DoS) via a crafted MP4 file.

https://github.com/gpac/gpac/issues/2672

CVE-2023-4785[1]:
| Lack of error handling in the TCP server in Google's gRPC starting
| version 1.23 on posix-compatible platforms (ex. Linux) allows an
| attacker to cause a denial of service by initiating a significant
| number of connections with the server. Note that gRPC C++ Python,
| and Ruby are affected, but gRPC Java, and Go are NOT affected.

https://github.com/grpc/grpc/pull/33656
https://github.com/grpc/grpc/pull/33667
https://github.com/grpc/grpc/pull/33669
https://github.com/grpc/grpc/pull/33670
https://github.com/grpc/grpc/pull/33672

CVE-2023-48011[2]:
| GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a
| heap-use-after-free via the flush_ref_samples function at
| /gpac/src/isomedia/movie_fragments.c.

https://github.com/gpac/gpac/issues/2611
https://github.com/gpac/gpac/commit/c70f49dda4946d6db6aa55588f6a756b76bd84ea

CVE-2023-48013[3]:
| GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a
| double free via the gf_filterpacket_del function at
| /gpac/src/filter_core/filter.c.

https://github.com/gpac/gpac/issues/2612
https://github.com/gpac/gpac/commit/cd8a95c1efb8f5bfc950b86c2ef77b4c76f6b893

CVE-2023-48014[4]:
| GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a
| stack overflow via the hevc_parse_vps_extension function at
| /media_tools/av_parsers.c.

https://github.com/gpac/gpac/issues/2613
https://github.com/gpac/gpac/commit/66abf0887c89c29a484d9e65e70882794e9e3a1b

CVE-2023-5998[5]:
| Out-of-bounds Read in GitHub repository gpac/gpac prior to
| 2.3.0-DEV.

https://huntr.com/bounties/ea02a231-b688-422b-a881-ef415bcf6113
https://github.com/gpac/gpac/commit/db74835944548fc3bdf03121b0e012373bdebb3e

CVE-2023-46001[6]:
| Buffer Overflow vulnerability in gpac MP4Box v.2.3-DEV-
| rev573-g201320819-master allows a local attacker to cause a denial
| of service via the gpac/src/isomedia/isom_read.c:2807:51 function in
| gf_isom_get_user_data.

https://github.com/gpac/gpac/issues/2629
https://github.com/gpac/gpac/commit/e79b0cf7e72404750630bc01340e999f3940dbc4

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-47384
https://www.cve.org/CVERecord?id=CVE-2023-47384
[1] https://security-tracker.debian.org/tracker/CVE-2023-4785
https://www.cve.org/CVERecord?id=CVE-2023-4785
[2] https://security-tracker.debian.org/tracker/CVE-2023-48011
https://www.cve.org/CVERecord?id=CVE-2023-48011
[3] https://security-tracker.debian.org/tracker/CVE-2023-48013
https://www.cve.org/CVERecord?id=CVE-2023-48013
[4] https://security-tracker.debian.org/tracker/CVE-2023-48014
https://www.cve.org/CVERecord?id=CVE-2023-48014
[5] https://security-tracker.debian.org/tracker/CVE-2023-5998
https://www.cve.org/CVERecord?id=CVE-2023-5998
[6] https://security-tracker.debian.org/tracker/CVE-2023-46001
https://www.cve.org/CVERecord?id=CVE-2023-46001

Please adjust the affected versions in the BTS as needed.



Bug#1056281: snort: CVE-2023-20246 CVE-2023-20031

2023-11-19 Thread Moritz Mühlenhoff
Source: snort
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for snort.

CVE-2023-20246[0]:
| Multiple Cisco products are affected by a vulnerability in Snort
| access control policies that could allow an unauthenticated, remote
| attacker to bypass the configured policies on an affected system.
| This vulnerability is due to a logic error that occurs when the
| access control policies are being populated. An attacker could
| exploit this vulnerability by establishing a connection to an
| affected device. A successful exploit could allow the attacker to
| bypass configured access control rules on the affected system.

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-snort3acp-bypass-3bdR2BEh

CVE-2023-20031[1]:
| A vulnerability in the SSL/TLS certificate handling of Snort 3
| Detection Engine integration with Cisco Firepower Threat Defense
| (FTD) Software could allow an unauthenticated, remote attacker to
| cause the Snort 3 detection engine to restart. This vulnerability is
| due to a logic error that occurs when an SSL/TLS certificate that is
| under load is accessed when it is initiating an SSL connection.
| Under specific, time-based constraints, an attacker could exploit
| this vulnerability by sending a high rate of SSL/TLS connection
| requests to be inspected by the Snort 3 detection engine on an
| affected device. A successful exploit could allow the attacker to
| cause the Snort 3 detection engine to reload, resulting in either a
| bypass or a denial of service (DoS) condition, depending on device
| configuration. The Snort detection engine will restart
| automatically. No manual intervention is required.

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-snort3-8U4HHxH8

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-20246
https://www.cve.org/CVERecord?id=CVE-2023-20246
[1] https://security-tracker.debian.org/tracker/CVE-2023-20031
https://www.cve.org/CVERecord?id=CVE-2023-20031

Please adjust the affected versions in the BTS as needed.



Bug#1052576: clj-yaml-clojure: FTBFS with OpenJDK 21 due to unsupported javac source/target level 7

2023-11-19 Thread Vladimir Petko
Dear Maintainers,

 Would it be possible to consider a merge request[1] that adds a patch
fixing this bug?

Best Regards,
 Vladimir.

[1]
https://salsa.debian.org/clojure-team/clj-yaml-clojure/-/merge_requests/1


Bug#1056280: audacity: Welcome dialog show/hide text is not visible when Desktop Environment (DE) is in dark mode.

2023-11-19 Thread Phil Wyett
Package: audacity
Version: 3.4.0+dfsg-1
Severity: minor
X-Debbugs-Cc: philip.wy...@kathenas.org

Dear Maintainer,

* Install 'audacity'.
* Run 'audacity'.
* 'OK' the welcome dialog.
* Edit theme to dark on a dark mode Desktop Environment (DE) such as GNOME.
* Close 'audacity'.
* Restart audacity.

The welcome dialog show/hide text will be a very light grey and hardly
visible to the user.

Regards

Phil

-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.5.0-4-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages audacity depends on:
ii  audacity-data3.4.0+dfsg-1
ii  libasound2   1.2.10-1
ii  libc62.37-12
ii  libexpat12.5.0-2
ii  libflac++10  1.4.3+ds-2
ii  libflac121.4.3+ds-2
ii  libgcc-s113.2.0-6
ii  libgdk-pixbuf-2.0-0  2.42.10+dfsg-3
ii  libglib2.0-0 2.78.1-4
ii  libgtk-3-0   3.24.38-6
ii  libid3tag0   0.15.1b-14
ii  liblilv-0-0  0.24.22-1
ii  libmpg123-0  1.32.3-1
ii  libogg0  1.3.5-3
ii  libopus0 1.4-1
ii  libportaudio219.6.0-1.2
ii  libportmidi0 1:217-6.1
ii  libportsmf0  0.1~svn20101010-6
ii  libsbsms10   2.3.0-1
ii  libsndfile1  1.2.2-1
ii  libsoundtouch1   2.3.2+ds1-1
ii  libsoxr0 0.1.3-4
ii  libsqlite3-0 3.44.0-1
ii  libstdc++6   13.2.0-6
ii  libsuil-0-0  0.10.20-1
ii  libtwolame0  0.4.0-2
ii  libuuid1 2.39.2-6
ii  libvamp-hostsdk3v5   2.10.0-4
ii  libvorbis0a  1.3.7-1
ii  libvorbisenc21.3.7-1
ii  libvorbisfile3   1.3.7-1
ii  libwavpack1  5.6.0-1
ii  libwxbase3.2-1   3.2.4+dfsg-1
ii  libwxgtk3.2-13.2.4+dfsg-1

audacity recommends no packages.

Versions of packages audacity suggests:
pn  ladspa-plugin  

-- no debconf information



Bug#1056160: ITS: auctex

2023-11-19 Thread Preuße

On 19.11.2023 18:09, Davide G. M. Salvetti wrote:

Hi Davide,


I have not yet digged into it, but it looks similar to #1051243.

What do you think?



Actually it is #1056210 and friends. The root cause of #1051243 has been 
fixed long ago, just the phenomenon looks similar to #1056210, hence 
people reopen the bug.


H.
--
sigfault



OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1056279: Symlinks in /usr/lib/molly-guard/ are gone after upgrade

2023-11-19 Thread Christoph Biedl
Christoph Biedl wrote...

> after upgrading from 0.7.2 to 0.8.1, the symlinks in /usr/lib/molly-guard/
> are gone.

It was suggested in IRC this might be the effect of another package's
upgrade. I find that unlikely since no other package should touch
/usr/lib/molly-guard/ - still, here's the upgrade list after that I
found the change:

2023-11-19 18:50:51 upgrade bsdutils:ppc64 1:2.39.2-5 1:2.39.2-6
2023-11-19 18:50:53 upgrade coreutils:ppc64 9.1-1 9.4-2
2023-11-19 18:50:55 upgrade libsmartcols1:ppc64 2.39.2-5 2.39.2-6
2023-11-19 18:50:56 upgrade util-linux-extra:ppc64 2.39.2-5 2.39.2-6
2023-11-19 18:50:57 upgrade util-linux:ppc64 2.39.2-5 2.39.2-6
2023-11-19 18:51:04 upgrade mount:ppc64 2.39.2-5 2.39.2-6
2023-11-19 18:51:05 upgrade systemd-dev:all 254.5-1 255~rc2-2
2023-11-19 18:51:06 upgrade libblkid1:ppc64 2.39.2-5 2.39.2-6
2023-11-19 18:51:07 upgrade libuuid1:ppc64 2.39.2-5 2.39.2-6
2023-11-19 18:51:08 upgrade libfdisk1:ppc64 2.39.2-5 2.39.2-6
2023-11-19 18:51:09 upgrade libmount1:ppc64 2.39.2-5 2.39.2-6
2023-11-19 18:51:10 upgrade systemd:ppc64 254.5-1 255~rc2-2
2023-11-19 18:51:13 upgrade libsystemd-shared:ppc64 254.5-1 255~rc2-2
2023-11-19 18:51:14 upgrade libsystemd0:ppc64 254.5-1 255~rc2-2
2023-11-19 18:51:15 upgrade molly-guard:all 0.7.2 0.8.1

Note: The timestamp of /usr/lib/molly-guard/ fits here:
drwxr-xr-x 2 root root 4096 2023-11-19 18:52:08.994207913 +0100 
/usr/lib/molly-guard/

2023-11-19 18:52:08 upgrade systemd-sysv:ppc64 254.5-1 255~rc2-2
2023-11-19 18:52:09 upgrade libdb5.3:ppc64 5.3.28+dfsg2-3 5.3.28+dfsg2-4
2023-11-19 18:52:10 upgrade zlib1g:ppc64 1:1.2.13.dfsg-3 1:1.3.dfsg-2
2023-11-19 18:52:12 upgrade libelf1:ppc64 0.189-4 0.190-1
2023-11-19 18:52:13 upgrade libtirpc-common:all 1.3.3+ds-1 1.3.4+ds-1
2023-11-19 18:52:14 upgrade libtirpc3:ppc64 1.3.3+ds-1 1.3.4+ds-1
2023-11-19 18:52:16 upgrade iproute2:ppc64 6.5.0-5 6.6.0-1
2023-11-19 18:52:19 upgrade libgpg-error0:ppc64 1.47-2 1.47-3
2023-11-19 18:52:20 upgrade udev:ppc64 254.5-1 255~rc2-2
2023-11-19 18:52:21 upgrade libudev1:ppc64 254.5-1 255~rc2-2
2023-11-19 18:52:23 upgrade mawk:ppc64 1.3.4.20230808-1 1.3.4.20231102-1
2023-11-19 18:52:23 upgrade fdisk:ppc64 2.39.2-5 2.39.2-6
2023-11-19 18:52:24 upgrade vim-nox:ppc64 2:9.0.2087-1 2:9.0.2103-1
2023-11-19 18:52:25 upgrade vim:ppc64 2:9.0.2087-1 2:9.0.2103-1
2023-11-19 18:52:26 upgrade vim-common:all 2:9.0.2087-1 2:9.0.2103-1
2023-11-19 18:52:28 upgrade vim-runtime:all 2:9.0.2087-1 2:9.0.2103-1
2023-11-19 18:52:32 upgrade autopkgtest:all 5.31 5.31.1
2023-11-19 18:52:33 upgrade bsdextrautils:ppc64 2.39.2-5 2.39.2-6
2023-11-19 18:52:35 upgrade libglib2.0-0:ppc64 2.78.1-3 2.78.1-4
2023-11-19 18:52:36 upgrade libio-socket-ssl-perl:all 2.083-1 2.084-1
2023-11-19 18:52:37 upgrade libmaxminddb0:ppc64 1.7.1-1 1.8.0-1
2023-11-19 18:52:38 upgrade libsasl2-modules-db:ppc64 2.1.28+dfsg1-3 
2.1.28+dfsg1-4
2023-11-19 18:52:38 upgrade libsasl2-2:ppc64 2.1.28+dfsg1-3 2.1.28+dfsg1-4
2023-11-19 18:52:39 upgrade pci.ids:all 0.0~2023.08.10-1 0.0~2023.09.22-1

Hope this is helpful,

Christoph



signature.asc
Description: PGP signature


Bug#1055922: rmatrix: ABI change in Matrix 1.6-2

2023-11-19 Thread Dirk Eddelbuettel


On 19 November 2023 at 09:59, Dirk Eddelbuettel wrote:
| On 19 November 2023 at 13:49, Graham Inggs wrote:
| | We don't believe only touching debian/changelog, or a binNMU, is
| | sufficient.  We were surprised that your r-cran-lme4 upload did not at
| | least include:
| | Depends: r-cran-matrix (>= 1.6-2-1)
| | Without that relationship, r-cran-lme4 could migrate to testing and be
| | installed on users' systems without the corresponding version of
| | r-cran-matrix.  It is no surprise that the excuses page for lme4 [4]
| | is all red, because that is exactly what is being tested.  More on
| | this to come in my next email.
| 
| I can add that, and probably should have.  And I agree with the sentiment in
| your other mail that a transition is overkill here.

Done in lme4 1.1-35.1-3.

Dirk

-- 
dirk.eddelbuettel.com | @eddelbuettel | e...@debian.org



Bug#1056279: Symlinks in /usr/lib/molly-guard/ are gone after upgrade

2023-11-19 Thread Christoph Biedl
Package: molly-guard
Version: 0.8.1
Severity: grave
X-Debbugs-Cc: debian.a...@manchmal.in-ulm.de

Greetings,

after upgrading from 0.7.2 to 0.8.1, the symlinks in /usr/lib/molly-guard/
are gone. As this happened on a second machine today, I reckon it's not
a coincidence.


Current state:

# ls -l /usr/lib/molly-guard/
total 8
-rwxr-xr-x 1 root root   99  5. Okt 00:17 coldreboot
-rwxr-xr-x 1 root root 3365 11. Nov 23:02 molly-guard


Old state:

# ls -l /usr/lib/molly-guard/
total 7
-rwxr-xr-x 1 root root   99  5. Okt 00:17 coldreboot
lrwxrwxrwx 1 root root   14 30. Sep 12:34 halt -> /bin/systemctl
-rwxr-xr-x 1 root root 2847  9. Jul 2019  molly-guard
lrwxrwxrwx 1 root root   14 30. Sep 12:34 poweroff -> /bin/systemctl
lrwxrwxrwx 1 root root   14 30. Sep 12:34 reboot -> /bin/systemctl
lrwxrwxrwx 1 root root   14 30. Sep 12:34 shutdown -> /bin/systemctl


This is the upgrade log:

Preparing to unpack .../molly-guard_0.8.1_all.deb ...
No diversion 'diversion of /sbin/pm-hibernate by molly-guard', none removed.
No diversion 'diversion of /sbin/pm-suspend by molly-guard', none removed.
No diversion 'diversion of /sbin/pm-suspend-hybrid by molly-guard', none 
removed.
Adding 'diversion of /usr/sbin/halt to /usr/lib/molly-guard/halt by molly-guard'
Leaving 'diversion of /sbin/halt to /lib/molly-guard/halt by molly-guard'
Adding 'diversion of /usr/sbin/poweroff to /usr/lib/molly-guard/poweroff by 
molly-guard'
Leaving 'diversion of /sbin/poweroff to /lib/molly-guard/poweroff by 
molly-guard'
Adding 'diversion of /usr/sbin/reboot to /usr/lib/molly-guard/reboot by 
molly-guard'
Leaving 'diversion of /sbin/reboot to /lib/molly-guard/reboot by molly-guard'
Adding 'diversion of /usr/sbin/shutdown to /usr/lib/molly-guard/shutdown by 
molly-guard'
Leaving 'diversion of /sbin/shutdown to /lib/molly-guard/shutdown by 
molly-guard'
Adding 'diversion of /usr/sbin/coldreboot to /usr/lib/molly-guard/coldreboot by 
molly-guard'
Leaving 'diversion of /sbin/coldreboot to /lib/molly-guard/coldreboot by 
molly-guard'
Removing 'diversion of /usr/sbin/pm-hibernate to /lib/molly-guard/pm-hibernate 
by molly-guard'
Adding 'diversion of /usr/sbin/pm-hibernate to 
/usr/lib/molly-guard/pm-hibernate by molly-guard'
Removing 'diversion of /usr/sbin/pm-suspend to /lib/molly-guard/pm-suspend by 
molly-guard'
Adding 'diversion of /usr/sbin/pm-suspend to /usr/lib/molly-guard/pm-suspend by 
molly-guard'
Removing 'diversion of /usr/sbin/pm-suspend-hybrid to 
/lib/molly-guard/pm-suspend-hybrid by molly-guard'
Adding 'diversion of /usr/sbin/pm-suspend-hybrid to 
/usr/lib/molly-guard/pm-suspend-hybrid by molly-guard'
Unpacking molly-guard (0.8.1) over (0.7.2) ...
dpkg: warning: unable to delete old directory '/lib/molly-guard': Directory not 
empty
Setting up molly-guard (0.8.1) ...


The resultat is a major problem, hence the severity: Trying to shut down
or reboot just triggers an error:

# shutdown -P
E: not a regular file: /usr/lib/molly-guard/shutdown

(Workaround: Manually restore the links.)

Looking into the maintainer scripts, I see some changes were done. Can
you please re-check they to the right thing?

Regards,

Chri- "diversions are a nightmare" stoph


signature.asc
Description: PGP signature


Bug#1056278: safe-vdash - upcoming rust-crossterm and rust-ratatui updates.

2023-11-19 Thread Peter Michael Green

Package: safe-vdash

I'm currently in the process of preparing updates for crossterm
to 0.27 and ratatui to 0.23.

save-vdash's cargo dependencies already allow the new
versions (indeed the new versions will allow patches to be
dropped) but the Debian dependencies currently do not.
After bumping the Debian dependecies I was able to build
the package successfully.

If you want to do further testing the new versions of crossterm
and ratatui are available in experimental.

If no problems come to light I intend to upload them to
unstable in a week or so.



Bug#1055882: libncurses6: waddnstr() reads n+1 bytes, ought to end at n bytes

2023-11-19 Thread Thomas Dickey
On Tue, Nov 14, 2023 at 03:50:31PM +0100, наб wrote:
> On Mon, Nov 13, 2023 at 08:13:02PM -0500, Thomas Dickey wrote:
> > The null terminator should be checked only for the special case where
> > the passed-in length is negative.
> I agree in principle but the manual says
> > The four functions with n as the last argument write at most n bytes, or
> > until a terminating null is reached.  If n is -1, then the entire string
> > will be added.
> Which reads to me like it ought to behave like printf(%.*s),
> terminating at the first specified condition ‒
> a C string with a limit, not a range ‒
> so if it's supposed to be a range then maybe something to the effect of

no - as I understand the history of this feature, if the length is specified,
it's possible to send a null character in the middle of the string.
 
> Also I just noticed the comma in mvwaddnstr is italic,

thanks - I have a to-do item to extend the script which I've been
developing to check manpages, to flag these (from seeing Branden's
reports, etc).

-- 
Thomas E. Dickey 
https://invisible-island.net


signature.asc
Description: PGP signature


Bug#1055454: spamassassin: Spamassassin in Bookworm dropped SysVinit script

2023-11-19 Thread Patrik Schindler
Hello,

Am 19.11.2023 um 17:52 schrieb Noah Meyerhans :

> Hi Patrik. I apologize; I was getting ahead of myself when indicating that 
> the spamassassin init script is gone by design. It's not, actually.  It's 
> just moved to the spamd package, which was broken out from the base 
> spamassassin package. /etc/init.d/spamd is what you're looking for.

Thanks.

I have noticed that spamassassin has undergone a package split to spamassassin 
and spamd. Unfortunately, spamassassin did not pull in spamd, as I'd have 
expected on upgrade-time. This package-split is also not mentioned in the 
Debian package specific upgrade notes, where I'd have expected to find such an 
information:

https://www.debian.org/releases/stable/amd64/release-notes/ch-information.en.html

Shortly after my report I've restored Deb11 from backup due to too many 
unexpected things happening, leaving me with a half-broken system. SA being 
only part of the party.

Something which is novel for me. I'm currently testing upgrades on less complex 
installs. Upgrades on earlier releases were mostly hands on at conffiles, but 
Deb12 upgrades have shown some… quirks for SysVinit users, mainly due to the 
lack of (IMHO) proper dependencies, and documentation.

:wq! PoC



Bug#1056160: ITS: auctex

2023-11-19 Thread Davide G. M. Salvetti
>  PH == Preuße, Hilmar [2023-11-18]

PH> On 18.11.2023 11:51, Davide G. M. Salvetti wrote:
PH> Hello Davide,

>> please, let me have some more time.  I plan to release a new version
>> within a fortnight.

PH> Many thanks for fast response! I'll leave the ITS bug open, but I
PH> won't drive the salve process forward. In case I can help somehow,
PH> let me know.

Hello Hilmar,

I have a working 13.2 which sbuilds fine for stable.  However, when I
try to sbuild for unstable I get

--8<---cut here---start->8---
Processing triggers for tex-common (6.18) ...
Running updmap-sys. This may take some time... done.
Running mktexlsr /var/lib/texmf ... done.
Building format(s) --all.
This may take some time... 
fmtutil failed. Output has been stored in
/tmp/fmtutil.mQdiuvt8
Please include this file if you report a bug.

dpkg: error processing package tex-common (--configure):
 installed tex-common package post-installation script subprocess returned 
error exit status 1
Errors were encountered while processing:
 tex-common
--8<---cut here---end--->8---

I have not yet digged into it, but it looks similar to #1051243.

What do you think?

-- 
Thanks,
Davide



Bug#1056275: btm - upcoming rust-ratatui update.

2023-11-19 Thread Jonas Smedegaard
Quoting Peter Michael Green (2023-11-19 17:12:56)
> Package: btm
> 
> I'm currently in the process of preparing updates for crossterm
> to 0.27 and ratatui to 0.23.
> 
> Btm's dependencies (both cargo and Debian) already allow the
> new version of crossterm, but they don't allow the new version
> of ratatui. I don't see anything too scary in the upstream
> changelog and I've bumped the dependency and was able
> to succesfully build the package.
> 
> If you want to do further testing the new versions of crossterm
> and ratatui are available in experimental.
> 
> If no problems come to light I intend to upload them to
> unstable in a week or so.

Feel free to go ahead, and also to NMU btm if needed.

 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/
 * Sponsorship: https://ko-fi.com/drjones

 [x] quote me freely  [ ] ask before reusing  [ ] keep private

signature.asc
Description: signature


Bug#1056235: Fwd: Bug#1056235: openfortivpn: not working anymore after upgrading from 1.20.5-1

2023-11-19 Thread Patrice Duroux
Sorry, I should have tried using its command line tool before opening
this issue.
It works. So it is breaking something  used by network-manager-fortisslvpn or
network-manager-fortisslvpn-gnome.


Le dim. 19 nov. 2023 à 15:53, Daniel Echeverri  a écrit :
>
> tags 1056235 + moreinfo
> thanks
>
> Hello!
>
> Thanks for your report, but unfortunately I can't reproduce this. I upgraded 
> openfortivpn to 1.21.0-1 in a sid box and it works fine. Could you make a try 
> with -v and share with me the output?
>
> El dom, 19 nov 2023 a la(s) 05:18, Patrice Duroux (patrice.dur...@gmail.com) 
> escribió:
>>
>> Package: openfortivpn
>> Version: 1.21.0-1
>> Severity: normal
>>
>> Dear Maintainer,
>>
>> On a Debian Sid system, after upgrading from 1.20.5-1 and activating a
>> previously working VPN config,
>> I am not able to connect (ssh) any host by IP or name.
>> And downgrading to 1.20.5-1 solves this.
>> I do not see any message in the journal log that may be different from the
>> working version.
>> Unless that systemd-resolved is then not able to connect the VPN DNS.
>> Looking at the upstream issues, may be this is something new?!
>>
>> Regards,
>> Patrice
>>
>>
>> -- System Information:
>> Debian Release: trixie/sid
>>   APT prefers unstable-debug
>>   APT policy: (500, 'unstable-debug'), (500, 'oldstable-updates'), (500, 
>> 'oldstable-security'), (500, 'unstable'), (500, 'oldstable'), (1, 
>> 'experimental-debug'), (1, 'experimental')
>> Architecture: amd64 (x86_64)
>> Foreign Architectures: i386
>>
>> Kernel: Linux 6.5.0-4-amd64 (SMP w/12 CPU threads; PREEMPT)
>> Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not 
>> set
>> Shell: /bin/sh linked to /usr/bin/dash
>> Init: systemd (via /run/systemd/system)
>> LSM: AppArmor: enabled
>>
>> Versions of packages openfortivpn depends on:
>> ii  libc62.37-12
>> ii  libssl3  3.0.12-2
>> ii  libsystemd0  255~rc2-2
>> ii  ppp  2.4.9-1+1.1+b1
>>
>> openfortivpn recommends no packages.
>>
>> Versions of packages openfortivpn suggests:
>> ii  systemd-resolved [resolvconf]  255~rc2-2
>>
>
> Also, Are you using a config file? Could you check if this file has the 
> correct permissions??
>
>>
>> -- Configuration Files:
>> /etc/openfortivpn/config [Errno 13] Permission non accordée: 
>> '/etc/openfortivpn/config'
>>
>> -- no debconf information
>
>
> Regards!
>
>
> --
> Daniel Echeverri
> Debian Developer
> Linux user: #477840
> GPG Fingerprint:
> D0D0 85B1 69C3 BFD9 4048 58FA 21FC 2950 4B52 30DB



Bug#1055454: spamassassin: Spamassassin in Bookworm dropped SysVinit script

2023-11-19 Thread Noah Meyerhans



On 11/6/2023 2:53 PM, Patrik Schindler wrote:
The removal of the sysvinit script was intentional. Per Debian policy 
section 9.3.1, "Packages including a service unit may optionally 
include an init script to support other init systems". Spamd provides 
a service unit. There is no requirement to support any other startup 
mechanisms or init systems, and I have no interest in supporting the 
old init script anymore.

Thank you for your clear words.


Hi Patrik. I apologize; I was getting ahead of myself when indicating 
that the spamassassin init script is gone by design. It's not, 
actually.  It's just moved to the spamd package, which was broken out 
from the base spamassassin package. /etc/init.d/spamd is what you're 
looking for.


noah



Bug#1056277: python3-pysrt: Opening files fails due to outdated 'U' mode

2023-11-19 Thread Fiona Klute

Package: python3-pysrt
Version: 1.0.1-3
Severity: normal

SubRipFile.open() and any use of the included srt command line tool fail
because the pysrt code uses the outdated 'U' mode which has since been
removed (traceback below). This has been fixed upstream for a while [1],
so updating the package should be enough to fix this bug.

For library use, loading the file outside pysrt and having pysrt parse
the string is a workaround.

[1]
https://github.com/byroot/pysrt/commit/17e1f58dab58b941abcbd035d9c6e2fcacba5600


Traceback (most recent call last):
  File "/usr/bin/srt", line 33, in 
sys.exit(load_entry_point('pysrt==1.0.1', 'console_scripts', 'srt')())
 
  File "/usr/lib/python3/dist-packages/pysrt/commands.py", line 215, in
main
SubRipShifter().run(sys.argv[1:])
  File "/usr/lib/python3/dist-packages/pysrt/commands.py", line 136, in run
self.arguments.action()
  File "/usr/lib/python3/dist-packages/pysrt/commands.py", line 159, in
rate
self.input_file.shift(ratio=ratio)
^^^
  File "/usr/lib/python3/dist-packages/pysrt/commands.py", line 197, in
input_file
self._source_file = SubRipFile.open(self.arguments.file,

  File "/usr/lib/python3/dist-packages/pysrt/srtfile.py", line 152, in open
source_file = cls._open_unicode_file(path, claimed_encoding=encoding)
  ^^^
  File "/usr/lib/python3/dist-packages/pysrt/srtfile.py", line 293, in
_open_unicode_file
source_file = codecs.open(path, 'rU', encoding=encoding)
  ^^
  File "", line 918, in open
ValueError: invalid mode: 'rUb'



-- System Information:
Debian Release: trixie/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.5.0-4-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE
not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages python3-pysrt depends on:
ii  python33.11.4-5+b1
ii  python3-chardet5.2.0+dfsg-1
ii  python3-pkg-resources  68.1.2-2

python3-pysrt recommends no packages.

python3-pysrt suggests no packages.

-- debconf-show failed



Bug#1043257: auctex: New upstream release 13.2

2023-11-19 Thread Davide G. M. Salvetti
tags 1043257 +confirmed +pending
thanks

>  XD == Xiyue Deng [2023-8-7]

[...]

XD> Dear maintainers,

XD> A new upstream release of auctex has been available for a while, and
XD> I've prepared a (somewhat crude) merge request[1] with refreshed
XD> patches which maybe useful as a base to work on.

Dear Xiyue,

I reviewed your work: the patches have to be refreshed the way you did,
thanks.  I'm working on 13.2 packaging right now and will upload soon.

XD> There are still several lintian warnings that I haven't figured out
XD> how to fix

I've worked on and fixed them.

-- 
Thanks,
Davide



Bug#1056276: E: The repository 'http://ftp.us.debian.org/debian bookworm-security Release' does not have a Release file.

2023-11-19 Thread John Watjen
Source: bookworm
Version: 1.1.2+git20210715-2
Severity: important
X-Debbugs-Cc: q53...@aol.com

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
 ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***
This situation has existed since I upgraded to version 12 (bookworm)
I have not found any work-around.
This situation prevents me from updating or upgrading my computer system.
Another issue is that 'grep' does not work.
'libreoffice Calc' does not work.
synaptic package manager cannot fix broken packages!
E: Unable to correct problems, you have held broken packages.
E: Unable to correct dependencies
Err:1 http://ftp.us.debian.org/debian bookworm/main amd64 libbatik-java all 
1.16+dfsg-1
  404  Not Found [IP: 2620:0:861:2:208:80:154:139 80]
Err:2 http://ftp.us.debian.org/debian bookworm/main amd64 mariadb-common all 
1:10.11.3-1
  404  Not Found [IP: 2620:0:861:2:208:80:154:139 80]
Err:3 http://ftp.us.debian.org/debian bookworm/main amd64 libmariadb3 amd64 
1:10.11.3-1
  404  Not Found [IP: 2620:0:861:2:208:80:154:139 80]
E: Failed to fetch 
http://ftp.us.debian.org/debian/pool/main/b/batik/libbatik-java_1.16%2bdfsg-1_all.deb
  404  Not Found [IP: 2620:0:861:2:208:80:154:139 80]
E: Failed to fetch 
http://ftp.us.debian.org/debian/pool/main/m/mariadb/mariadb-common_10.11.3-1_all.deb
  404  Not Found [IP: 2620:0:861:2:208:80:154:139 80]
E: Failed to fetch 
http://ftp.us.debian.org/debian/pool/main/m/mariadb/libmariadb3_10.11.3-1_amd64.deb
  404  Not Found [IP: 2620:0:861:2:208:80:154:139 80]

-- System Information:
Debian Release: 12.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'proposed-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-12-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#1055567: Error: gscan2pdf fails to compile

2023-11-19 Thread Soumyanath Chatterjee

On 19/11/23 21:35, Jeff wrote:
It looks like the version of libusb libsane was built against is not 
the same as the one you are running with.


There are some similarities here: 
https://askubuntu.com/questions/1264001/error-installing-xsane-sane-hplip-etc-with-undefined-symbol-libusb-set-optio


What does the following return?

apt-cache policy libsane1 libsane-common libimage-sane-perl libusb-1.0



soumyanath@ganak-desktop:~$ apt-cache policy libsane1 libsane-common 
libimage-sane-perl libusb-1.0

libsane1:
 Installed: 1.0.29-0ubuntu5.2
 Candidate: 1.0.29-0ubuntu5.2
 Version table:
*** 1.0.29-0ubuntu5.2 500
   500 http://in.archive.ubuntu.com/ubuntu focal-updates/universe 
amd64 Packages

   100 /var/lib/dpkg/status
1.0.29-0ubuntu5.1 500
   500 http://security.ubuntu.com/ubuntu focal-security/universe 
amd64 Packages

1.0.29-0ubuntu5 500
   500 http://in.archive.ubuntu.com/ubuntu focal/universe amd64 
Packages

libsane-common:
 Installed: 1.0.29-0ubuntu5.2
 Candidate: 1.0.29-0ubuntu5.2
 Version table:
*** 1.0.29-0ubuntu5.2 500
   500 http://in.archive.ubuntu.com/ubuntu focal-updates/main amd64 
Packages
   500 http://in.archive.ubuntu.com/ubuntu focal-updates/main i386 
Packages

   100 /var/lib/dpkg/status
1.0.29-0ubuntu5.1 500
   500 http://security.ubuntu.com/ubuntu focal-security/main amd64 
Packages
   500 http://security.ubuntu.com/ubuntu focal-security/main i386 
Packages

1.0.29-0ubuntu5 500
   500 http://in.archive.ubuntu.com/ubuntu focal/main amd64 Packages
   500 http://in.archive.ubuntu.com/ubuntu focal/main i386 Packages
libimage-sane-perl:
 Installed: 5-1
 Candidate: 5-1
 Version table:
*** 5-1 500
   500 http://in.archive.ubuntu.com/ubuntu focal/universe amd64 
Packages

   100 /var/lib/dpkg/status
libusb-1.0-0:
 Installed: 2:1.0.23-2build1
 Candidate: 2:1.0.23-2build1
 Version table:
*** 2:1.0.23-2build1 500
   500 http://in.archive.ubuntu.com/ubuntu focal/main amd64 Packages
   100 /var/lib/dpkg/status
libusb-1.0-0-dev:
 Installed: (none)
 Candidate: 2:1.0.23-2build1
 Version table:
2:1.0.23-2build1 500
   500 http://in.archive.ubuntu.com/ubuntu focal/main amd64 Packages
libusb-1.0-doc:
 Installed: (none)
 Candidate: 2:1.0.23-2build1
 Version table:
2:1.0.23-2build1 500
   500 http://in.archive.ubuntu.com/ubuntu focal/main amd64 Packages
   500 http://in.archive.ubuntu.com/ubuntu focal/main i386 Packages



Bug#1056275: btm - upcoming rust-ratatui update.

2023-11-19 Thread Peter Michael Green

Package: btm

I'm currently in the process of preparing updates for crossterm
to 0.27 and ratatui to 0.23.

Btm's dependencies (both cargo and Debian) already allow the
new version of crossterm, but they don't allow the new version
of ratatui. I don't see anything too scary in the upstream
changelog and I've bumped the dependency and was able
to succesfully build the package.

If you want to do further testing the new versions of crossterm
and ratatui are available in experimental.

If no problems come to light I intend to upload them to
unstable in a week or so.



Bug#1037192: sd: version is lower than in squeeze

2023-11-19 Thread Blair Noctis
On Mon, 23 Oct 2023 17:28:50 +0200 Orión González  wrote:
> A contributor suggested that 1.0 release should be on hold until some new
> features get stabilized
> https://github.com/chmln/sd/issues/203#issuecomment-1775390770
> 
> This might mean that the 1.0 release might take many more months.

1.0 has been released: https://github.com/chmln/sd/releases/tag/v1.0.0

I'm now preparing the update.

-- 
Sdrager,
Blair Noctis


OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1055567: Error: gscan2pdf fails to compile

2023-11-19 Thread Jeff
It looks like the version of libusb libsane was built against is not the 
same as the one you are running with.


There are some similarities here: 
https://askubuntu.com/questions/1264001/error-installing-xsane-sane-hplip-etc-with-undefined-symbol-libusb-set-optio


What does the following return?

apt-cache policy libsane1 libsane-common libimage-sane-perl libusb-1.0


OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1028238: Please update auctex to 13.1

2023-11-19 Thread Davide G. M. Salvetti
tags 1028238 +confirmed +pending
thanks

I'm working on AUCTeX 13.2 and will upload soon.

-- 
Thanks,
Davide



Bug#1054730: trac: FTBFS: ValueError: ("Missing 'Version:' header and/or PKG-INFO file at path: /<>/Trac.egg-info/PKG-INFO", Trac [unknown version] (/<>))

2023-11-19 Thread Martin
Control: severity -1 normal
Control: tag -1 + moreinfo

Hi, I can't reproduce this FTBFS.
Could you try again, please?
I'll upload a new version, but it shouldn't make a difference.



Bug#1055922: rmatrix: ABI change in Matrix 1.6-2

2023-11-19 Thread Dirk Eddelbuettel


Hi Graham,

On 19 November 2023 at 13:49, Graham Inggs wrote:
| On Tue, 14 Nov 2023 at 12:42, Dirk Eddelbuettel  wrote:
| > Doesn't 'normal' do that?
| 
| No, only serious and above are considered RC [1] and also for migration.
| 
| This week, Paul Gevers and I spent some time discussing ways to move
| this transition forward.
| 
| Referring back to some of your previous emails below.
| 
| On Tue, 14 Nov 2023 at 12:01, Dirk Eddelbuettel  wrote:
| > We need to address the packages needing a rebuild. Mine (r-cran-lme4,
| > r-cran-rcppeigen).  have been taken care of.
| 
| We see the upload of lme4 1.1-35.1-2 on 2023-11-14 [2], and the
| changelog mentions a rebuild, but the upload of r-cran-rcppeigen
| 0.3.3.9.4-1 on 2023-11-03 [3] happened before the upload of matrix
| 1.6-2-1.  Does r-cran-rcppeigen still require a rebuild?

I am upstream for RcppEigen.

And the upstream NEWS has

\item The interface to package \pkg{Matrix} has been updated and
simplified thanks to an excllent patch by Mikael Jagan.
\item The new upload is coordinated with packages \pkg{lme4} and 
\pkg{OpenMx}.

So it contains a patch by Mikael which had been applied _permitting Matrix
1.6-2_ to get to CRAN. So for this particular pair it was the other way around.

And I acted accordingly as Debian maintainer for a package for which I am 
upstream.

| On Mon, 13 Nov 2023 at 12:23, Dirk Eddelbuettel  wrote:
| > I would appreciate it if someone could tickle rebuilds. To me a quick
| > informal touch of debian/changelog would do; if someone thinks this needs a
| > formal transition go for it.
| 
| We don't believe only touching debian/changelog, or a binNMU, is
| sufficient.  We were surprised that your r-cran-lme4 upload did not at
| least include:
| Depends: r-cran-matrix (>= 1.6-2-1)
| Without that relationship, r-cran-lme4 could migrate to testing and be
| installed on users' systems without the corresponding version of
| r-cran-matrix.  It is no surprise that the excuses page for lme4 [4]
| is all red, because that is exactly what is being tested.  More on
| this to come in my next email.

I can add that, and probably should have.  And I agree with the sentiment in
your other mail that a transition is overkill here.

Matrix has 1304 reverse dependencies at CRAN [1], Mikael (in the two emails
he wrote at my urging) identified 14 packages that needed a rebuild because
they use Matrix header files (R packages can build against headers in another
package, this is more specialised use), and another 3 that had cached S4 (the
more complicated OO model in R) function signature.

So 17 out of 1304 is not exactly a general breakage. I think I found 6 out of
the 17 as being in Debian. I had dealt with three myself and then sent email to 
initiate
simple rebuilds. But that went nowhere. 

So I leave this in your hands. If you think that after all this needs a
transtion, I may shrug but will of course help. 

And please dDon't get wrong: I am considering this to be an open problem
upstream. The R Core team, the CRAN team, and others are discussing, but the
CRAN system does not quite have our mechanisms even to push binary
rebuilds. So this is an ongoing and open issue.

Dirk


[1] See the R snippet:

> db <- tools::CRAN_package_db()
> length(tools::package_dependencies("Matrix", reverse=TRUE, db=db)$Matrix)
[1] 1304
> 

so 1304 are found right now at CRAN, and 17/1304 is about 1.3%. We seem
to have 6 identified out of about 138 (per apt-cache rdepends ...)
which is a little higher at 4.3% which is normal as 'heavier' packages
are more likely to be packaged.  But net-net it is still only one out
over twenty packages around Matrix.

| 
| Regards
| Graham
| 
| 
| [1] https://www.debian.org/Bugs/Developer#severities
| [2] 
https://tracker.debian.org/news/1478501/accepted-lme4-11-351-2-source-into-unstable/
| [3] 
https://tracker.debian.org/news/1475888/accepted-r-cran-rcppeigen-03394-1-source-into-unstable/
| [4] https://qa.debian.org/excuses.php?package=lme4

-- 
dirk.eddelbuettel.com | @eddelbuettel | e...@debian.org



Bug#1054657: transition: r-bioc-biocgenerics

2023-11-19 Thread Graham Inggs
Control: tags -1 + moreinfo

Hi Andreas

On Mon, 13 Nov 2023 at 09:10, Andreas Tille  wrote:
> Thanks to the hint from Charles I found that SparseArray is not new in
> Bioconductor and we can build the previous version with the current
> packages in unstable which I did and uploaded to new.

Thanks.

Since I count about 30 r-bioc-* packages with direct dependencies on
r-cran-matrix, we'd rather not entangle the r-bioc* transition with
rmatrix (#1055922), so please  remove the 'moreinfo' tag once
SparseArray has cleared NEW, and rmatrix has migrated.

Regards
Graham



Bug#1055567: Error: gscan2pdf fails to compile

2023-11-19 Thread Soumyanath Chatterjee


On 19/11/23 16:15, Jeff wrote:

Please reinstall the packages:

sudo apt reinstall libsane1 libimage-sane-perl

and try to start gscan2pdf again.



This is what I get

soumyanath@ganak-desktop:~$ gscan2pdf
Can't load 
'/usr/lib/x86_64-linux-gnu/perl5/5.30/auto/Image/Sane/Sane.so' for 
module Image::Sane: /usr/lib/x86_64-linux-gnu/libsane.so.1: undefined 
symbol: l

ibusb_set_option at /usr/share/perl/5.30/XSLoader.pm line 93.
at /usr/lib/x86_64-linux-gnu/perl5/5.30/Image/Sane.pm line 144.
Compilation failed in require at 
/usr/share/perl5/Gscan2pdf/Scanner/Options.pm line 8.
BEGIN failed--compilation aborted at 
/usr/share/perl5/Gscan2pdf/Scanner/Options.pm line 8.
Compilation failed in require at /usr/share/perl5/Gscan2pdf/Document.pm 
line 12.
BEGIN failed--compilation aborted at 
/usr/share/perl5/Gscan2pdf/Document.pm line 12.
Compilation failed in require at 
/usr/share/perl5/Gscan2pdf/Dialog/Renumber.pm line 7.
BEGIN failed--compilation aborted at 
/usr/share/perl5/Gscan2pdf/Dialog/Renumber.pm line 7.

Compilation failed in require at /usr/bin/gscan2pdf line 61.
BEGIN failed--compilation aborted at /usr/bin/gscan2pdf line 61.
Undefined subroutine ::Sane::_exit called at 
/usr/lib/x86_64-linux-gnu/perl5/5.30/Image/Sane.pm line 190.

END failed--call queue aborted at /usr/bin/gscan2pdf line 61.

---


Bug#1055155: bookworm-pu: package exim4/4.96-15+deb12u3 (2nd try for new bug)

2023-11-19 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Sun, 2023-11-19 at 11:26 +0100, Andreas Metzler wrote:
> On 2023-11-04 Andreas Metzler  wrote:
> [...]
> > Thank you, updated.
> 
> Another iteration, adding 
>  + 76-14-Lookups-Fix-dnsdb-lookup-of-multi-chunk-TXT.-Bug-
> 305.patch Fix
>    regression in dnsdb in CVE-2023-42119 fix. (Upstream bug 3054)

Please go ahead.

Regards,

Adam



Bug#1056235: openfortivpn: not working anymore after upgrading from 1.20.5-1

2023-11-19 Thread Daniel Echeverri
tags 1056235 + moreinfo
thanks

Hello!

Thanks for your report, but unfortunately I can't reproduce this. I
upgraded openfortivpn to 1.21.0-1 in a sid box and it works fine. Could you
make a try with -v and share with me the output?

El dom, 19 nov 2023 a la(s) 05:18, Patrice Duroux (patrice.dur...@gmail.com)
escribió:

> Package: openfortivpn
> Version: 1.21.0-1
> Severity: normal
>
> Dear Maintainer,
>
> On a Debian Sid system, after upgrading from 1.20.5-1 and activating a
> previously working VPN config,
> I am not able to connect (ssh) any host by IP or name.
> And downgrading to 1.20.5-1 solves this.
> I do not see any message in the journal log that may be different from the
> working version.
> Unless that systemd-resolved is then not able to connect the VPN DNS.
> Looking at the upstream issues, may be this is something new?!
>
> Regards,
> Patrice
>
>
> -- System Information:
> Debian Release: trixie/sid
>   APT prefers unstable-debug
>   APT policy: (500, 'unstable-debug'), (500, 'oldstable-updates'), (500,
> 'oldstable-security'), (500, 'unstable'), (500, 'oldstable'), (1,
> 'experimental-debug'), (1, 'experimental')
> Architecture: amd64 (x86_64)
> Foreign Architectures: i386
>
> Kernel: Linux 6.5.0-4-amd64 (SMP w/12 CPU threads; PREEMPT)
> Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE
> not set
> Shell: /bin/sh linked to /usr/bin/dash
> Init: systemd (via /run/systemd/system)
> LSM: AppArmor: enabled
>
> Versions of packages openfortivpn depends on:
> ii  libc62.37-12
> ii  libssl3  3.0.12-2
> ii  libsystemd0  255~rc2-2
> ii  ppp  2.4.9-1+1.1+b1
>
> openfortivpn recommends no packages.
>
> Versions of packages openfortivpn suggests:
> ii  systemd-resolved [resolvconf]  255~rc2-2
>
>
Also, Are you using a config file? Could you check if this file has the
correct permissions??


> -- Configuration Files:
> /etc/openfortivpn/config [Errno 13] Permission non accordée:
> '/etc/openfortivpn/config'
>
> -- no debconf information
>

Regards!


-- 
Daniel Echeverri
Debian Developer
Linux user: #477840
GPG Fingerprint:
D0D0 85B1 69C3 BFD9 4048 58FA 21FC 2950 4B52 30DB


Bug#1055922: rmatrix: ABI change in Matrix 1.6-2

2023-11-19 Thread Graham Inggs
Hi Andreas

On Sat, 18 Nov 2023 at 19:18, Andreas Tille  wrote:
> We need some means to follow ABI changes.  In Debian we could use
> something like r-matrix-abi-VERSION.

Indeed, this is one solution.  As you saw in [1], upstream now provide
an ABI version and a way to extract it:
> Matrix will commence ABI versioning in 1.6-2.  The ABI version will be 
> available
> in R as Matrix.Version()[["abi"]] and in C as R_MATRIX_ABI_VERSION (from 
> header
> Matrix/Matrix.h).  It is numeric_version("1") in Matrix 1.6-2 and _implicitly_
> numeric_version("0") in Matrix < 1.6-2.

However, since rmatrix has over 100 reverse-dependencies, and only a
very small number of these are broken by the ABI change, we feel this
may be overkill, but wouldn't dissuade anyone from proposing patches
to implement this.

Another option is simply to add a versioned dependency on
r-cran-matrix to the affected packages, e.g.:
Depends: r-cran-matrix (>= 1.6-2-1)
...but this requires a source change and an upload, is error-prone,
and a binNMU would not be sufficient.

We liked the change you made to r-cran-tmb [2], as this allows the
affected packages to be binNMU'd and gain a versioned dependency on
r-cran-matrix.  Would you please apply this to the other affected
packages (only r-cran-irlba and r-cran-openmx, if I understand
correctly)?

Unfortunately, it seems the two-sided dependency introduced
subsequently [3], which produces:
r-cran-matrix (>= 1.6-2-1), r-cran-matrix (<= 1.6-2-199)
...is too strict, and r-cran-tmb already needs another rebuild due to
the upload of rmatrix 1.6-3-1.  Would you please revert that change
and upload?

Regards
Graham


[1] https://stat.ethz.ch/pipermail/r-sig-mac/2023-October/014890.html
[2] 
https://salsa.debian.org/r-pkg-team/r-cran-tmb/-/commit/92579f72c2db4d51a45cf317f580d790da158f4f
[3] 
https://salsa.debian.org/r-pkg-team/r-cran-tmb/-/commit/0a4d35d10f9c875863fa0238287cee8ab25aecdd



Bug#1056274: reportbug: dropbear-initramfs makes initramfs non-reproducible due to randomly generated /root-XXXXXXX directory

2023-11-19 Thread Yannik Sembritzki
Package: dropbear-initramfs
Version: 2022.83-2
Severity: normal
Tags: patch

Dear Maintainer,

I am building reproducible initramfs using SOURCE_DATE_EPOCH.

This works great, but unfortunately, dropbear-initramfs breaks reproducibility,
because it creates a randomly named /root-XXX directory to store the
authorized_keys file. This is done in debian/hooks/dropbear.

It would be great if this could be fixed.
One solution would be to simply always use /root-dropbear-initramfs.
I have attached such a patch.


-- System Information:
Debian Release: 12.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-13-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages dropbear-initramfs depends on:
ii  busybox  1:1.35.0-4+b3
ii  dropbear-bin 2022.83-2
ii  initramfs-tools  0.142
ii  udev 252.17-1~deb12u1

Versions of packages dropbear-initramfs recommends:
ii  cryptsetup-initramfs  2:2.6.1-4~deb12u1

dropbear-initramfs suggests no packages.

-- no debconf information
--- a/debian/hooks/dropbear
+++ b/debian/hooks/dropbear
@@ -24,7 +24,8 @@ for so in $(ldconfig -p | sed -nr 
's/^\s*libnss_files\.so\.[0-9]+\s.*=>\s*//p');
 copy_exec "$so"
 done

-home="$(mktemp --directory -- "$DESTDIR/root-XX")" # avoid collisions 
with $rootmnt
+home="$DESTDIR/root-dropbear-initramfs"
+mkdir "$home"



Bug#1055922: rmatrix: ABI change in Matrix 1.6-2

2023-11-19 Thread Graham Inggs
Hi Dirk

On Tue, 14 Nov 2023 at 12:42, Dirk Eddelbuettel  wrote:
> Doesn't 'normal' do that?

No, only serious and above are considered RC [1] and also for migration.

This week, Paul Gevers and I spent some time discussing ways to move
this transition forward.

Referring back to some of your previous emails below.

On Tue, 14 Nov 2023 at 12:01, Dirk Eddelbuettel  wrote:
> We need to address the packages needing a rebuild. Mine (r-cran-lme4,
> r-cran-rcppeigen).  have been taken care of.

We see the upload of lme4 1.1-35.1-2 on 2023-11-14 [2], and the
changelog mentions a rebuild, but the upload of r-cran-rcppeigen
0.3.3.9.4-1 on 2023-11-03 [3] happened before the upload of matrix
1.6-2-1.  Does r-cran-rcppeigen still require a rebuild?

On Mon, 13 Nov 2023 at 12:23, Dirk Eddelbuettel  wrote:
> I would appreciate it if someone could tickle rebuilds. To me a quick
> informal touch of debian/changelog would do; if someone thinks this needs a
> formal transition go for it.

We don't believe only touching debian/changelog, or a binNMU, is
sufficient.  We were surprised that your r-cran-lme4 upload did not at
least include:
Depends: r-cran-matrix (>= 1.6-2-1)
Without that relationship, r-cran-lme4 could migrate to testing and be
installed on users' systems without the corresponding version of
r-cran-matrix.  It is no surprise that the excuses page for lme4 [4]
is all red, because that is exactly what is being tested.  More on
this to come in my next email.

Regards
Graham


[1] https://www.debian.org/Bugs/Developer#severities
[2] 
https://tracker.debian.org/news/1478501/accepted-lme4-11-351-2-source-into-unstable/
[3] 
https://tracker.debian.org/news/1475888/accepted-r-cran-rcppeigen-03394-1-source-into-unstable/
[4] https://qa.debian.org/excuses.php?package=lme4



Bug#1056273: RFS: c-evo-dh/1.10-1 -- Empire Building Game (data files), C-evo: Distant Horizon

2023-11-19 Thread Peter B

Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "c-evo-dh":

 * Package name : c-evo-dh
   Version  : 1.10-1
   Upstream contact : Peter 
 * URL  : https://sourceforge.net/projects/c-evo-eh/
 * License  : GPL-2+, CC-BY-SA-3.0-US, CC0-1.0, CC-BY-3.0
 * Vcs  : https://salsa.debian.org/PeterB/c-evo-dh
   Section  : games

The source builds the following binary packages:

  c-evo-dh-gtk2 - Empire Building Game (GTK2), C-evo: Distant Horizon
  c-evo-dh-stdai - Empire Building Game (AI module), C-evo: Distant Horizon
  c-evo-dh-data - Empire Building Game (data files), C-evo: Distant Horizon

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/c-evo-dh/

Alternatively, you can download the package with 'dget' using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/c/c-evo-dh/c-evo-dh_1.10-1.dsc

Changes since the last upload:

 c-evo-dh (1.10-1) unstable; urgency=medium
 .
   * New Upstream Release, (Closes: #1055837)
   * Add NEWS file

Regards,
--
  Peter Blackman



Bug#1056204: nmu: texlive-bin_2023.20230311.66589-7

2023-11-19 Thread Adrian Bunk
On Sun, Nov 19, 2023 at 01:54:02PM +0100, Hilmar Preuße wrote:
>...
> I can patch out that version check as found by Samuel, but I don't see how
> that would solve the core dump or the SIGABRT, which was reported. I hope
> lua_error(L) is not the equivalent of "exit with SIGABRT". ;-)
>...

It is.

https://www.lua.org/manual/5.3/manual.html#lua_error
  int lua_error (lua_State *L);
  Generates a Lua error, using the value at the top of the stack as the 
  error object. This function does a long jump, and therefore never 
  returns (see luaL_error).

The SIGABRT is generated by calling abort():
https://sources.debian.org/src/lua5.3/5.3.6-2/src/lapi.c/#L1117
https://sources.debian.org/src/lua5.3/5.3.6-2/src/ldebug.c/#L649
https://sources.debian.org/src/lua5.3/5.3.6-2/src/ldo.c/#L130

> Hilmar

cu
Adrian



Bug#1056269: New feature supports : PoW

2023-11-19 Thread Cevin
Package: tor
Version: 0.4.7.13-1

Tor has a mechanism to prevent DoS attacks as much as possible, but it
requires adding the `--enable-gpl` parameter to the build. Use `tor
--list-modules` to verify the inclusion of `PoW: yes`.

I sent this to Fedora EPEL is supported, details
here:https://bugzilla.redhat.com/show_bug.cgi?id=2247828

Ref:

https://community.torproject.org/onion-services/advanced/dos/



Bug#1056268: rust-thiserror: please update to v1.0.50

2023-11-19 Thread Jonas Smedegaard
Source: rust-thiserror
Version: 1.0.49-1
Severity: normal
Tags: upstream

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Please update to (at least) v1.0.50.
-BEGIN PGP SIGNATURE-
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=KmsK
-END PGP SIGNATURE-



Bug#1056267: rust-cpufeatures: please update to v0.2.6

2023-11-19 Thread Jonas Smedegaard
Source: rust-cpufeatures
Version: 0.2.4-1
Severity: normal
Tags: upstream

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Please update to (at least) v0.2.6.
-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEn+Ppw2aRpp/1PMaELHwxRsGgASEFAmVaCjwACgkQLHwxRsGg
ASElyQ//epbOMg7KrdbK5EqgtJKONTsYukrrxHmdE0Y5MtUGuvdQuoL8cnEWJKSO
m2mX5GQQ2gwiu41I7+qkMUfaljokrLQKeeSnNKineG/hip0ENnHcQWF09YsqJOxZ
3PI5oBHjCKYHNkvFBC9voJM8rI+Vwb/D5MaQXsnq1AnxgYirfm49QZjaoAH+w2Ge
Qcos8jaPaAbFITbdPyCGMlUTeriwetYCp5Oj+XHS+zz67Wic3q8X+PJ4BwYLQrT4
Lt+gqz2I4v8mihw3B660k71btm8sJNquUnswJKl2YnJC1dYbA5ZmvBrsSRZ3EwIG
ui37T+JbQlEXYP5JiJjfa5Mlzvtm5rskFRr6KNLEboW76fQPRzNkzmHg0KibBooI
/b6sbf0T40gVq1KPekfVWHW4wagn8rGlGnkcNJlxc72QQw2El3RdajZq7YV1ZnZr
t6SzF13LkgWqLzWZ5UY83g/75O5VINJJ7N2WkenXjHvNdBqOfLWD/XdpB03GMo5X
PdYZImF0Hef2VVR1oSGO68XB8b5cxprNF9P0FzzOMtUnz8vWbBQ8y9n1ZzDtWKv4
tf1AN0P4Lu/1aQlqSNySWhT99Sa6n27ifKI8ckrr9p5LfSE78Pazbo29FYHaT3q4
3g0TP8vSRXiWN/kKaOhICQpmBdnmtNnw4h/aPdUUm8G0IXgkztI=
=fYF/
-END PGP SIGNATURE-



Bug#1056204: nmu: texlive-bin_2023.20230311.66589-7

2023-11-19 Thread Sebastian Ramacher
On 2023-11-19 13:54:02 +0100, Hilmar Preuße wrote:
> On 11/19/23 00:40, Adrian Bunk wrote:
> > On Sat, Nov 18, 2023 at 11:51:15PM +0100, Hilmar Preuße wrote:
> > > On 11/18/23 20:18, Samuel Thibault wrote:
> 
> Hi all,
> 
> > > > nmu texlive-bin_2023.20230311.66589-7 . ANY . unstable . -m "Rebuild 
> > > > against new zlib"
> > > > 
> > > Thanks for filing the NMU bug.
> > > 
> > > > So a binnmu of the texlive-bin source package seems needed on all archs
> > > > to fix installing texlive-binaries.
> > > > 
> > > 
> > > I tested if recompiling solves the issue and it does. Hence I bump 
> > > severity
> > > of the NMU bug the get a solution ASAP.
> > 
> > I don't see how a binNMU would solve the problem.
> > 
> > A proper fix would be either to:
> > 1. patch the version check out of texlive-bin (preferred), or
> > 
> I can patch out that version check as found by Samuel, but I don't see how
> that would solve the core dump or the SIGABRT, which was reported. I hope
> lua_error(L) is not the equivalent of "exit with SIGABRT". ;-)
> 
> I still suspect that something broke in the API of zlib, the zlib people are
> not aware of.

That crash is the fault of lua_error(L). Removing the version check
including the call to lua_error is the proper fix for this. If any of
the binaries of texlive-bin require a minimum version of the zlib, this
needs to be reflected in Depends and not with a deliberate crash.

> > 2. ensure texlive-bin has package dependencies that match this runtime
> > check
> > The zlib people, did not change the API version or created a version
> statement in the depends line like "Depends: ... zlib1g (>= 1:1.3)", hence
> I'd add an artificial "Breaks: ... zlib1g (<= 1:1.2.3)" to my
> texlive-binaries package to make sure 1.3 is in place, when the new
> texlive-binaries comes in. Correct?

No, that's certainly the incorrect fix. Especially if that is
hard-coded.

Cheers
-- 
Sebastian Ramacher



Bug#1056266: rust-futures-util: please update to v0.3.29

2023-11-19 Thread Jonas Smedegaard
Source: rust-futures-util
Version: 0.3.28-1
Severity: normal
Tags: upstream

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Please update to (at least) v0.3.29.
-BEGIN PGP SIGNATURE-
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=oEIt
-END PGP SIGNATURE-



Bug#1056265: rust-futures: please update to v0.3.29

2023-11-19 Thread Jonas Smedegaard
Source: rust-futures
Version: 0.3.28-1
Severity: normal
Tags: upstream

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Please update to (at least) v0.3.29.
-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEn+Ppw2aRpp/1PMaELHwxRsGgASEFAmVaCWsACgkQLHwxRsGg
ASGi5Q//VbvDpjNCjD5Q+I29aoH9eg/SorqHnhM7Sv1eBpVOpv6A4u2MESwXBBkw
n4iTWG7s72omdxhxmU4y9H464b1euCIqOkz2jCqLuKKjqnrX0g5v5xne89Ajup4V
x2XoN6d+Khl+nwJZYV3FxFlxdpm5V+kWghL1SlgsTglZ20jn04N+ewTraeLCz96g
AESftAnfcrlnF61dZ4MT3MRDyZmHWEDsv8pG0kerPfx8r1dw6bU1c2VgevLvcoBV
7MSni0B0XHBlSyNym2HLs5zQGqRmKKe8RlB/b1FASCURtB3cb/Zh/ke3HM+pAU01
61Wupc+c3ix37zpODrXL3ZDXMBzoLZU/RywrK+jfhNVP4IgrV8d4TOO0vhWsPCSJ
8uF/ShYzF+BwemgEeajlJlioykFtOqVTf0AAkPaLow3PyqIAckjb/DL5/XiojKyi
MT3QCN23YDGDsT1idsmu/feEHl1lHuTV0+gbgULBbStlLHBJwtbSzX56i4hQckSK
+SiabyQt6R/56gJa93+O+nublOuHBheduPOkLZaGOM7qzjEz4WrV+XrKOAjtFkQf
OgnMu0XlqLA7Sk/T7dloH3CTQxkbhaRhR3NR2fSPWQHLrtXGEcM5/aRmXDkiGVtn
Ub1g7DmleZSU3s4BomDF8Xpdn5OhcifUgzR78sEh1CTouyeqT5k=
=tbEw
-END PGP SIGNATURE-



Bug#1056264: rust-bytes: please update to v1.5.0

2023-11-19 Thread Jonas Smedegaard
Source: rust-bytes
Version: 1.4.0-1
Severity: normal
Tags: upstream

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Please update to (at least) v1.5.0.
-BEGIN PGP SIGNATURE-
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=54wM
-END PGP SIGNATURE-



Bug#1056263: rust-byteorder: please update to v1.5.0

2023-11-19 Thread Jonas Smedegaard
Source: rust-byteorder
Version: 1.4.3-2
Severity: normal
Tags: upstream

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Please update to (at least) v1.5.0.
-BEGIN PGP SIGNATURE-
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=xLgm
-END PGP SIGNATURE-



Bug#1056262: rust-base64: please update to v0.21.5

2023-11-19 Thread Jonas Smedegaard
Source: rust-base64
Version: 0.21.2-1
Severity: normal
Tags: upstream

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Please update to (at least) v0.21.5.
-BEGIN PGP SIGNATURE-
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=Apm7
-END PGP SIGNATURE-



Bug#1056261: rust-asynchronous-codec: please upgrade to v0.7

2023-11-19 Thread Jonas Smedegaard
Source: rust-asynchronous-codec
Version: 0.6.2-1
Severity: normal
Tags: upstream

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Please upgrade to (or separately provide) newer branch v0.7.
-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEn+Ppw2aRpp/1PMaELHwxRsGgASEFAmVaB+oACgkQLHwxRsGg
ASE0lg//X6tbskEimSWk8tkObR6HEhpcWhAZB6UaVSWKKrJHWmDx5xFkYJrwH70m
yTL/tD9Upe9kUmFAnxygKFszVPPH0xwWcgjHJ6cKxts0hfa1g73H5UJyNDbv6KMn
OlYbuSr+s9VlGi0hu+JlOhCuQhfJXfUo/0ZMQaRfiQf7pl04tz7tsCnE0/IvcRUP
gUXQGmOrL5XnKMot2+4g7lJ1tS4oHd+W68+C3+2nS0GVs8hpTJx7iZBT6MWUVUWJ
4hbmJRyQglhCWz7zyOUOdSzmnWthjKtSCYhtyGMzPWnOzqCHgvtmItq++PeVzO9o
htA86PvR4R7taQ30DQmwLdv1+i5oiBs2PExOzxyi1kRG2E1FXIHHtaC41n1X5suA
kRRBl6vWFOMRtu/WrW/Uysm5Xn6bCSs66Az1mmZ1kq3vrUnoIt0u07UtTAQJjM3t
FLGpfVB6Uce0k9CFyQnfMyPUeylrjLr10KWLzthR88OV/7czzx/OOBdheypuM5Jh
p7yWz8CnAn8ObJUCBRpYh362FClvzapn7ESkY6XB/AJkybAw10rK52cyIKvLMoD/
qp7pcw6+VQDj/LAwzIlvaC879Ya8BMGCy0CSg2xfMf7LkNwLeG8+j7nWuOLZGZqO
c/Ga0TUszCdCgaUiFMKLKJiSWNus8yP0UGlwTtsCSOlSkSDCTnY=
=vGzO
-END PGP SIGNATURE-



Bug#1042646: dh-virtualenv: FTBFS with Sphinx 7.1, docutils 0.20: error: invalid command 'build_sphinx'

2023-11-19 Thread Uwe Kleine-König
Hello,

to make the package build in a buildd chroot some more adaptions are
needed:

 - Depend on python3-docutils (which was pulled in before by
   python3-sphinx)
 - Drop debian/dh-virtualenv.doc-base as the documentation is missing
   now
 - Don't call dh with --with sphinxdoc

The complete deb diff now is:

dpkg-source: warning: extracting unsigned source package 
(/home/uwe/debsrc/dh-virtualenv_1.2.2-1.4.dsc)
diff -Nru dh-virtualenv-1.2.2/debian/changelog 
dh-virtualenv-1.2.2/debian/changelog
--- dh-virtualenv-1.2.2/debian/changelog2023-02-02 20:10:21.0 
+0100
+++ dh-virtualenv-1.2.2/debian/changelog2023-11-17 19:40:18.0 
+0100
@@ -1,3 +1,10 @@
+dh-virtualenv (1.2.2-1.4) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Drop Sphinx docs (Closes: #1042646)
+
+ -- Uwe Kleine-König   Fri, 17 Nov 2023 19:40:18 +0100
+
 dh-virtualenv (1.2.2-1.3) unstable; urgency=medium
 
   * Non-maintainer upload.
diff -Nru dh-virtualenv-1.2.2/debian/control dh-virtualenv-1.2.2/debian/control
--- dh-virtualenv-1.2.2/debian/control  2022-08-25 21:00:57.0 +0200
+++ dh-virtualenv-1.2.2/debian/control  2023-11-17 19:40:18.0 +0100
@@ -2,26 +2,24 @@
 Section: python
 Priority: optional
 Maintainer: Jyrki Pulliainen 
-Build-Depends: debhelper-compat (= 12), python3,
- python3-setuptools, python3-sphinx, python3-mock, dh-exec,
- dh-python, libjs-jquery, libjs-underscore,
-# python-sphinx-rtd-theme doesn't exist in distributions
-# predating Debian Jessie and Ubuntu Xenial. On these legacy
-# systems:
-# 1. Comment the dependency below.
-# 2. pip install sphinx_rtd_theme.
-# 3. Proceed with your build process (typically dpkg-build).
-# See https://github.com/spotify/dh-virtualenv/issues/230
- python3-sphinx-rtd-theme
+Build-Depends:
+ debhelper-compat (= 12),
+ python3,
+ python3-docutils,
+ python3-setuptools,
+ python3-mock,
+ dh-exec,
+ dh-python,
+ libjs-jquery,
+ libjs-underscore,
 Standards-Version: 4.5.0
 Homepage: https://www.github.com/spotify/dh-virtualenv
 Rules-Requires-Root: no
 
 Package: dh-virtualenv
 Architecture: all
-Depends: ${python3:Depends}, ${perl:Depends}, ${misc:Depends}, 
${sphinxdoc:Depends},
+Depends: ${python3:Depends}, ${perl:Depends}, ${misc:Depends},
  virtualenv | python3-virtualenv (>= 1.7) | python${pyversion}-venv
-Built-Using: ${sphinxdoc:Built-Using}
 Description: wrap and build Python packages using virtualenv
  This package provides a dh sequencer that helps you to deploy your
  virtualenv wrapped installation inside a Debian package.
diff -Nru dh-virtualenv-1.2.2/debian/dh-virtualenv.doc-base 
dh-virtualenv-1.2.2/debian/dh-virtualenv.doc-base
--- dh-virtualenv-1.2.2/debian/dh-virtualenv.doc-base   2022-08-25 
21:00:57.0 +0200
+++ dh-virtualenv-1.2.2/debian/dh-virtualenv.doc-base   1970-01-01 
01:00:00.0 +0100
@@ -1,9 +0,0 @@
-Document: dh-virtualenv
-Title: dh-virtualenv documentation
-Author: Spotify
-Abstract: This manual describes dh-virtualenv and how to use it.
-Section: Programming
-
-Format: HTML
-Index: /usr/share/doc/dh-virtualenv/html/index.html
-Files: /usr/share/doc/dh-virtualenv/html/*.html
diff -Nru dh-virtualenv-1.2.2/debian/rules dh-virtualenv-1.2.2/debian/rules
--- dh-virtualenv-1.2.2/debian/rules2022-08-25 21:00:57.0 +0200
+++ dh-virtualenv-1.2.2/debian/rules2023-11-17 19:40:18.0 +0100
@@ -1,9 +1,6 @@
 #!/usr/bin/make -f
 
 DH_ARGS ?=
-ifeq (,$(findstring nodoc, $(DEB_BUILD_OPTIONS)))
-   DH_ARGS += --with sphinxdoc
-endif
 
 PYTHON_VERSION := $(shell python3 -c 'import sys; print("%s.%s" % 
sys.version_info[:2])')
 
@@ -22,9 +19,3 @@
 
 override_dh_gencontrol:
dh_gencontrol -- -Vpyversion=$(PYTHON_VERSION)
-
-ifeq (,$(findstring nodoc, $(DEB_BUILD_OPTIONS)))
-override_dh_installdocs:
-   python3 setup.py build_sphinx
-   dh_installdocs doc/_build/html
-endif

I'll upload that to DELAYED/7 after sending this mail.

Best regards
Uwe


signature.asc
Description: PGP signature


Bug#1056260: RFS: ifstat/1.1.1-1 [ITA] -- InterFace STATistics Monitoring

2023-11-19 Thread Peter Blackman

Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "ifstat":

 * Package name : ifstat
   Version  : 1.1.1-1
   Upstream contact : Matthieu Baerts 
 * URL  : http://gael.roualland.free.fr/ifstat/
 * License  : GPL-2+
 * Vcs  : https://salsa.debian.org/debian/ifstat
   Section  : net

The source builds the following binary packages:

  ifstat - InterFace STATistics Monitoring
  libifstat-dev - Ifstat Development Files

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/ifstat/

Alternatively, you can download the package with 'dget' using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/i/ifstat/ifstat_1.1.1-1.dsc

Changes since the last upload:

 ifstat (1.1.1-1) unstable; urgency=medium
 .
   * New Upstream version (GitHub)
   * Drop patch adopted upstream
   * Adopt package (Closes: #1050469)
   * Fix man page spelling (Closes: #617336)
   * Convert to debhelper 13
   * Add watch file
   * Change ISO-8859 encodings to UTF-8

Regards,
--
  Peter Blackman



Bug#1056259: rust-arrayvec: please update to v0.7.4

2023-11-19 Thread Jonas Smedegaard
Source: rust-arrayvec
Version: 0.7.2-2
Severity: normal
Tags: upstream

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Please update to (at least) v0.7.4.
-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEn+Ppw2aRpp/1PMaELHwxRsGgASEFAmVaB2YACgkQLHwxRsGg
ASEQWA/+I0kYqObhBXK2l2LNcHU+JVL21woubzhqzJhKp2z1pjR92tVYuPPMRHn4
jmNiXdsHqUoVdofm13MYLakJYeBwqIeZxI9hOvyx161PaTAeXqA7sKQn0gNoNvou
gz1iHMHl0ogkzud9RAY9JpbWulho3fIVkd/cu8Od2tWtfKIcIZ6qa1Zs29PTy2+V
h+C+51fn8jlOKIfWgTRtwzoPhnnUSKpWPrrXrwfsbiQ6mbJHP94qOEGe8j0mtHM9
uzT2eD9DqhPWNE7jxkOgDNiV0ZvA3epc75Zf5lWq21CtaqZ8TkXFsWoazm2SRPKk
Yf+iQsU4zHCD/mKqFHcyj8wEbwhgQ8L/20rUFRjbYKNo6gXUc3bFMiu4GI5A0Hk9
JAmm5Z5ipm/5oyG+ibTUQLmX+h2YZwC99grvEiDA9R1xQT0l5Bb9ns1nqXL06q6V
FGY2mU/TEHyqayUz5eXMTJ4LvIOfBUATJ9C5yNy5SZKsSRFbiT1bU3xydzsk6mY8
XsYfvDcfM5VeGrExII1TZTWkuKUe+m2AqmDFlD0FXwEZMfVrHmFwCcLQmgFvfJEr
sej3WVNeYlswhQ9Norn2wSciAmVIUfVlvFT0b/GSz8TSTD5vja8sbek7s4xej3MP
gy1lh7k4OQRozdE4Kl3PrKdc0KaGrxjKJytMVD42FFTLbA95LAY=
=C9eF
-END PGP SIGNATURE-



Bug#1056253: rust-ripasso-cursive - FTBFS with rust-ripasso 0.6.4

2023-11-19 Thread Peter Michael Green


On 19/11/2023 12:14, Peter Michael Green wrote:


Package: rust-ripasso-cursive
Version: 0.6.1-1
Severity: serious
Tags: trixie, sid

It appears, that despite the version number indicating a compatible 
release, that the new

version of ripasso broke the build of ripasso-cursive.

https://tests.reproducible-builds.org/debian/rb-pkg/trixie/amd64/rust-ripasso-cursive.html


error[E0425]: cannot find function `push` in module `pass`
--> src/main.rs:941:29
 |
941 | let push_result = pass::push(().unwrap().lock().unwrap());
 |  not found in `pass`
 |
help: consider importing this function
 |
18  + use ripasso::git::push;
 |
help: if you import `push`, refer to it directly
 |
941 - let push_result = pass::push(().unwrap().lock().unwrap());
941 + let push_result = push(().unwrap().lock().unwrap());
 |

error[E0425]: cannot find function `pull` in module `pass`
--> src/main.rs:953:19
 |
953 | let _ = pass::pull(().unwrap().lock().unwrap())
 |    not found in `pass`
 |
help: consider importing this function
 |
18  + use ripasso::git::pull;
 |
help: if you import `pull`, refer to it directly
 |
953 - let _ = pass::pull(().unwrap().lock().unwrap())
953 + let _ = pull(().unwrap().lock().unwrap())
 |

error[E0603]: function `init_git_repo` is private
   --> src/wizard.rs:32:26
|
32 | let init_res = 
pass::init_git_repo(::password_dir(password_store_dir, home).unwrap());
|  ^ private function
|
note: the function `init_git_repo` is defined here
   --> /usr/share/cargo/registry/ripasso-0.6.4/src/pass.rs:34:60
|
34 | add_and_commit_internal, commit, find_last_commit, init_git_repo, 
match_with_parent,
|^


I tried to update ripasso-cursive to 0.6.4 to match ripasso but I got.

Applying patch unbreak-new-user-wizard.patch
patching file src/main.rs
Hunk #1 succeeded at  with fuzz 1 (offset -58 lines).
Hunk #2 FAILED at 1189.
Hunk #3 succeeded at 1324 with fuzz 1 (offset 109 lines).
Hunk #4 FAILED at 1773.
Hunk #5 FAILED at 1789.
Hunk #6 FAILED at 1798.
Hunk #7 succeeded at 1849 with fuzz 2 (offset 43 lines).
4 out of 7 hunks FAILED -- rejects in file src/main.rs
Patch unbreak-new-user-wizard.patch does not apply (enforce with -f)


Can someone confirm whether this patch is still needed, and if-so
update it for the new upstream version?


For what it's worth I was able to get a succesful build by.

1. Upgrading ripasso-cursive to 0.6.3 (0.6.4 has a new dependency that 
is not in Debian)

2. Disabling unbreak-new-user-wizard.patch and translation-locations.patch

I would still like feedback from Alexander on whether those patches are 
still

relavent.


  1   2   >