Bug#986816: unblock: binoculars/0.0.5-1

2021-04-19 Thread Graham Inggs
Control: tags -1 + moreinfo

Hi Frédéric

You didn't include a source debdiff with your unblock request.  Also,
the Vcs-Browser URL [1] in debian/control returns 404.
I generated a diff and got the following:
 61 files changed, 19938 insertions(+), 2005 deletions(-)

This is unreviewable by us.  One option is to provide a filtered
debdiff, including the command used to generate it.
Another option is to revert switching to the new upstream version (by
uploading 0.0.5+really0.0.4-1 or similar) and including only targeted
fixes for the three important bugs.  Since binoculars is not a key
package, yet another option is to add a non-trivial autopkgtest, and
then an unblock will not be required.  Please review the freeze policy
[2] and ask questions if things are unclear.

Please close or remove the moreinfo tag from this bug as appropriate.

Regards
Graham


[1] https://salsa.debian.org/science-team/binoculars
[2] https://release.debian.org/bullseye/freeze_policy.html



Bug#986816: unblock: binoculars/0.0.5-1

2021-04-12 Thread Picca Frédéric-Emmanuel
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package binoculars

It solves 3 important bugs, the later one is very important since it let the 
package completly unusable without the proposed fixes.

923859, 924024 , 986785 

Since I am also the upstream of the software, I can affirm that it is better to 
have this version in Debian than the current 0.0.4 version.
the user of our facilities expect to have a working version of binoculars 
available, and the 0.0.4 is not.

there is very little risk to accept the 0.0.5 version, which was tested in our 
facility on buster and bullseye ewith real data's

this is a leaf package so very few issue are expected due to this new upstream 
version.

thanks for considering

unblock binoculars/0.0.5-1

-- System Information:
Debian Release: 10.9
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-14-amd64 (SMP w/24 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_WARN, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled