Your message dated Mon, 03 Apr 2023 04:05:13 +0000 with message-id <e1pjbrr-006bro...@fasolo.debian.org> and subject line Bug#1033818: fixed in node-sinon 14.0.2+ds+~cs74.13.25-2 has caused the Debian Bug report #1033818, regarding node-nock: autopkgtest regression: Accessing Object.prototype.__proto__ has been disallowed to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1033818: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033818 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: node-nock Version: 13.2.9-3 Control: found -1 13.2.9-2 Severity: serious Control: tags -1 bookworm-ignore User: debian...@lists.debian.org Usertags: regression Dear maintainer(s),Your package has an autopkgtest, great. However, it started to fail recently (October 2022). Can you please investigate the situation and fix it? I copied some of the output at the bottom of this report.The release team has announced [1] that failing autopkgtest on amd64 and arm64 are considered RC in testing. [Release Team member hat on] Because we're currently in the hard freeze for bookworm, I have marked this bug as bookworm-ignore. Targeted fixes are still welcome.More information about this bug and the reason for filing it can be found on https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformationPaul [1] https://lists.debian.org/debian-devel-announce/2019/07/msg00002.html https://ci.debian.net/data/autopkgtest/testing/amd64/n/node-nock/32235317/log.gz 525 passing (9s) 2 pending 1 failing 1) `replyWithFile()` reply with file with repeated:Error: Accessing Object.prototype.__proto__ has been disallowed with --disable-proto=throwat /usr/share/nodejs/sinon/lib/sinon/util/core/walk.js:20:17 at Array.forEach (<anonymous>)at walkInternal (/usr/share/nodejs/sinon/lib/sinon/util/core/walk.js:19:5) at walkInternal (/usr/share/nodejs/sinon/lib/sinon/util/core/walk.js:33:9)at walk (/usr/share/nodejs/sinon/lib/sinon/util/core/walk.js:48:12)at walkObject (/usr/share/nodejs/sinon/lib/sinon/util/core/walk-object.js:18:5)at Function.spy (/usr/share/nodejs/sinon/lib/sinon/spy.js:170:16) at Sandbox.spy (/usr/share/nodejs/sinon/lib/sinon/sandbox.js:383:35) at Context.<anonymous> (tests/test_reply_with_file.js:45:11) at callFn (/usr/share/nodejs/mocha/lib/runnable.js:366:21) at Runnable.run (/usr/share/nodejs/mocha/lib/runnable.js:354:5) at Runner.runTest (/usr/share/nodejs/mocha/lib/runner.js:666:10) at /usr/share/nodejs/mocha/lib/runner.js:789:12 at next (/usr/share/nodejs/mocha/lib/runner.js:581:14) at /usr/share/nodejs/mocha/lib/runner.js:591:7 at next (/usr/share/nodejs/mocha/lib/runner.js:474:14)at Immediate.<anonymous> (/usr/share/nodejs/mocha/lib/runner.js:559:5)at process.processImmediate (node:internal/timers:471:21)OpenPGP_signature
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---Source: node-sinon Source-Version: 14.0.2+ds+~cs74.13.25-2 Done: Yadd <y...@debian.org> We believe that the bug you reported is fixed in the latest version of node-sinon, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1033...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Yadd <y...@debian.org> (supplier of updated node-sinon package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Mon, 03 Apr 2023 07:26:51 +0400 Source: node-sinon Built-For-Profiles: nocheck Architecture: source Version: 14.0.2+ds+~cs74.13.25-2 Distribution: unstable Urgency: medium Maintainer: Debian Javascript Maintainers <pkg-javascript-de...@lists.alioth.debian.org> Changed-By: Yadd <y...@debian.org> Closes: 1033818 Changes: node-sinon (14.0.2+ds+~cs74.13.25-2) unstable; urgency=medium . * Team upload * Update lintian override info format in d/source/lintian-overrides on line 2-3 * Set upstream metadata fields: Bug-Database, Bug-Submit, Repository-Browse * Update standards version to 4.6.2, no changes needed * Drop calls to __proto__ (Closes: #1033818) Checksums-Sha1: 807160cae4623fd68bb2b8b040fa1b70246a11bd 6712 node-sinon_14.0.2+ds+~cs74.13.25-2.dsc 400f8237297134b0c43b798ee5cf6298f9cb942b 60396 node-sinon_14.0.2+ds+~cs74.13.25-2.debian.tar.xz Checksums-Sha256: a32b4d8fc76efaeec395473652191bf90ed7ceb91eea4d0c2b6f3698b652cd40 6712 node-sinon_14.0.2+ds+~cs74.13.25-2.dsc 956d4e4379c4545430d4e41c616e6df0dcc8384da960e626dce96d5144589513 60396 node-sinon_14.0.2+ds+~cs74.13.25-2.debian.tar.xz Files: 7b740555bcc7de2faa53d4093be91a52 6712 javascript optional node-sinon_14.0.2+ds+~cs74.13.25-2.dsc 80242faa5247c35dde68861a09a997fd 60396 javascript optional node-sinon_14.0.2+ds+~cs74.13.25-2.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEAN/li4tVV3nRAF7J9tdMp8mZ7ukFAmQqTWgACgkQ9tdMp8mZ 7ulo1g//RxKGhaL8FBYsrF2okOMRLalNH8WnR6ivNWs5MTl0lR+4EcQaKnjTyAND QfYRQ9Vm3ct2Se8nGqn2YmYdHARZqcc/uA+BtveC2O2WLCcGXtenrNSTaadNakew x/I+0cdSdvdJTPD22Rj/E9SLrFF+NLzma0hQ8BC2hknp22aOKWs8OYNdjrBkbj+A tkE1qtZi7lZq3oZeDPuPNzbLBXw5n+FiiVI3MaIZJw8ltSAuaOrthVpaj6HhGqfs XyHXgwiYxLi+nTj2lKOyGpfDL4GYhJ02D8F70qd9ilpjMvV57Tz1wx+jE5KxxhRM bDzZ7ScmJ+ZvXWDqUfbbZgznRjEtQmoHb7AATOwT+LkkojTz2C5cAxv5JIaYABN+ Pwnly/6el6AWMMnPtrRnlA21SwcKspBH4k2W4zt/kZl0/QxmZmRqnH8Wb0YmCbgF IGl5erVScxtfUTtcyTEaaS9WTwvZxOPQoYuyApYAO+6RcaneI01hB4cCT8HeOHKh M406ZZ289C8gu44fAC9RtEboxxdaqv73jGX5ktvACVApqIe3H95dppFwT9UnBwY+ o5oXXX2pDVcjSkW4WETtIswxQHPEPTPwMbmnHvSHKNiZWCH4MC/Vi1Pl7gs/WIc/ 8RV1R2JSpgXZ3tEQWa5KDoU2bGShVEG/otBvCum+Rp0jyAPKdao= =RCTM -----END PGP SIGNATURE-----
--- End Message ---