Your message dated Tue, 11 Sep 2018 20:39:33 +0000
with message-id <[email protected]>
and subject line Bug#905783: fixed in bdfproxy 0.3.9-3
has caused the Debian Bug report #905783,
regarding variety doesn't startup in mate and throws a bunch of python warnings
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
905783: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905783
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: variety
Version: 0.6.9-1
Severity: normal

Dear Maintainer,

First I checked why variety isn't startup applications because I had
put it in startup applications.

It used to work for quite sometime but recently didn't start. I saw
for some reason it
was now showing as variety only instead of /usr/bin/variety which I
fixed. I have shared
screenshots of both.

Then I tried triggering variety via command-line and got the following
messages -

$ variety
WARNING: 2018-08-09 18:09:04,714: create_menu() 'Variety Slideshow is
not installed. This is an optional extension adding pan-and-zoom
slideshows to Variety: see
https://github.com/peterlevi/variety-slideshow for details'
/home/shirish/.config/variety/scripts/set_wallpaper: line 121: [: ==:
unary operator expected

(variety:23253): Gdk-CRITICAL **: 18:09:05.488:
gdk_window_thaw_toplevel_updates: assertion
'window->update_and_descendants_freeze_count > 0' failed
/home/shirish/.config/variety/scripts/set_wallpaper: line 121: [: ==:
unary operator expected
/usr/lib/python2.7/dist-packages/urllib3/connectionpool.py:860:
InsecureRequestWarning: Unverified HTTPS request is being made. Adding
certificate verification is strongly advised. See:
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings
  InsecureRequestWarning)
/usr/lib/python2.7/dist-packages/urllib3/connectionpool.py:860:
InsecureRequestWarning: Unverified HTTPS request is being made. Adding
certificate verification is strongly advised. See:
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings
  InsecureRequestWarning)
/usr/lib/python2.7/dist-packages/urllib3/connectionpool.py:860:
InsecureRequestWarning: Unverified HTTPS request is being made. Adding
certificate verification is strongly advised. See:
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings
  InsecureRequestWarning)
/usr/lib/python2.7/dist-packages/urllib3/connectionpool.py:860:
InsecureRequestWarning: Unverified HTTPS request is being made. Adding
certificate verification is strongly advised. See:
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings
  InsecureRequestWarning)
/usr/lib/python2.7/dist-packages/urllib3/connectionpool.py:860:
InsecureRequestWarning: Unverified HTTPS request is being made. Adding
certificate verification is strongly advised. See:
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings
  InsecureRequestWarning)
/usr/lib/python2.7/dist-packages/urllib3/connectionpool.py:860:
InsecureRequestWarning: Unverified HTTPS request is being made. Adding
certificate verification is strongly advised. See:
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings
  InsecureRequestWarning)
/usr/lib/python2.7/dist-packages/urllib3/connectionpool.py:860:
InsecureRequestWarning: Unverified HTTPS request is being made. Adding
certificate verification is strongly advised. See:
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings
  InsecureRequestWarning)
/usr/lib/python2.7/dist-packages/urllib3/connectionpool.py:860:
InsecureRequestWarning: Unverified HTTPS request is being made. Adding
certificate verification is strongly advised. See:
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings
  InsecureRequestWarning)
/home/shirish/.config/variety/scripts/set_wallpaper: line 121: [: ==:
unary operator expected

I see a bunch of ssl warnings along with line 121, line 121 of the
script says -

if [ ${KDE_FULL_SESSION} == "true" ]; then

but this is mate-desktop. Also that gdk-critical error seems something
to look at.

I do not know whether it's a debian issue or something that upstream
needs to take a look at ?

Look forward to your response to know what to do .

Is there a possibility of having variety-slideshow as a binary too ?

-- System Information:
Debian Release: buster/sid
  APT prefers testing-debug
  APT policy: (500, 'testing-debug'), (500, 'testing'), (100,
'unstable-debug'), (100, 'experimental-debug'), (100, 'experimental'),
(100, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.17.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_IN, LC_CTYPE=en_IN (charmap=UTF-8), LANGUAGE=en_IN:en
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages variety depends on:
ii  gir1.2-gdkpixbuf-2.0             2.36.12-1
ii  gir1.2-gexiv2-0.10               0.10.8-1
ii  gir1.2-glib-2.0                  1.56.1-1
ii  gir1.2-gtk-3.0                   3.22.30-2
ii  gir1.2-notify-0.7                0.7.7-3
ii  gir1.2-pango-1.0                 1.42.1-2
ii  imagemagick                      8:6.9.10.8+dfsg-1
ii  imagemagick-6.q16 [imagemagick]  8:6.9.10.8+dfsg-1
ii  python                           2.7.15-3
ii  python-bs4                       4.6.0-1
ii  python-cairo                     1.16.2-1+b1
ii  python-configobj                 5.0.6-2
ii  python-dbus                      1.2.8-2+b1
ii  python-gi-cairo                  3.28.2-1+b1
ii  python-pil                       5.2.0-2
ii  python-pycurl                    7.43.0.1-0.2+b1
ii  python-requests                  2.18.4-2

Versions of packages variety recommends:
ii  gir1.2-appindicator3-0.1  0.4.92-6
ii  libglib2.0-bin            2.56.1-2
ii  python-httplib2           0.9.2+dfsg-1

Versions of packages variety suggests:
ii  feh                                                                  2.27-1
pn  gnome-shell-extension-appindicator | gnome-shell-extension-top-icon  <none>

-- no debconf information


-- 
          Regards,
          Shirish Agarwal  शिरीष अग्रवाल
  My quotes in this email licensed under CC 3.0
http://creativecommons.org/licenses/by-nc/3.0/
http://flossexperiences.wordpress.com
EB80 462B 08E1 A0DE A73A  2C2F 9F3D C7A4 E1C4 D2D8

--- End Message ---
--- Begin Message ---
Source: bdfproxy
Source-Version: 0.3.9-3

We believe that the bug you reported is fixed in the latest version of
bdfproxy, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Philippe Thierry <[email protected]> (supplier of updated bdfproxy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 09 Aug 2018 14:33:08 +0200
Source: bdfproxy
Binary: bdfproxy
Architecture: source
Version: 0.3.9-3
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Tools <[email protected]>
Changed-By: Philippe Thierry <[email protected]>
Description:
 bdfproxy   - Patch binaries during download ala MITM
Closes: 905783
Changes:
 bdfproxy (0.3.9-3) unstable; urgency=medium
 .
   * Add support for python3 and new mitmproxy version.
   * Closes: 905783 by updating to python3.
Checksums-Sha1:
 5efa00016da5585efe637f08cfe722dac2726ea9 2020 bdfproxy_0.3.9-3.dsc
 6918689ca12545449df78ef69dae8e9b9c5cc2e1 6784 bdfproxy_0.3.9-3.debian.tar.xz
 2d40d892a035ae695842faf82ad048f128b24e31 5496 bdfproxy_0.3.9-3_amd64.buildinfo
Checksums-Sha256:
 8800428b2daab6c4a174f7f0125c8d32962dd7a5cb02a936018e259ff32f793c 2020 
bdfproxy_0.3.9-3.dsc
 213dda1f4d8ddc48e6837515af74fa8152fb846ed34f2143644a51098499430c 6784 
bdfproxy_0.3.9-3.debian.tar.xz
 04234fbc61767ce767f6e162555627620668f18b6300d6bc64127ff7152e4cc5 5496 
bdfproxy_0.3.9-3_amd64.buildinfo
Files:
 327e5d341f71d11722e0890ad9cc9175 2020 utils optional bdfproxy_0.3.9-3.dsc
 39f4ec1cb1d95dae6fb53b751b26aa8a 6784 utils optional 
bdfproxy_0.3.9-3.debian.tar.xz
 95a96051c106cfb1fbe1ed0d4c4b1c43 5496 utils optional 
bdfproxy_0.3.9-3_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=neFG
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to