Bug#980211: libextractor: FTBFS against librpm9 (test failure)

2021-02-24 Thread Bertrand Marc

The original issue about librpm9 is fixed, so I am closing this bug.

Feel free to open a new bug if you are concerned about the flaky tests.

Cheers,
Bertrand



Bug#980211: libextractor: FTBFS (flaky tests)

2021-02-10 Thread Bertrand Marc

Le 10/02/2021 à 15:29, John Scott a écrit :

According to upstream, the fix for this should've been included in the 1.11-1
upload. Can this issue be closed?

Indeed, the original issue reported in this bug was fixed in 1.11-1. However, the general issue of flaky tests is still there: 
https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/libextractor.html


Would you consider this bug as fixed?

Cheers,
Bertrand



Bug#975615: gnunet: Help needed to maintain GNUnet

2020-11-23 Thread Bertrand Marc
Package: gnunet
Severity: serious
X-Debbugs-Cc: bm...@debian.org

I would like to pass over the maintainance of the GNUnet package (see #964314).

In the meantime, it wouldn't make sense to have the outdated 0.13.1 version in 
Stable,
so this bug is severity serious to prevent it from migrating to Testing.

If you would like to take over and package GNUnet 0.14, please be my guest.

Cheers,
Bertrand

-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.9.0-1-amd64 (SMP w/2 CPU threads)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages gnunet depends on:
ii  adduser3.118
ii  debconf [debconf-2.0]  1.5.74
ii  libc6  2.31-4
ii  libcurl3-gnutls7.72.0-1
pn  libextractor3  
ii  libgcrypt201.8.7-2
ii  libgnutls-dane03.6.15-4
ii  libgnutls303.6.15-4
ii  libidn2-0  2.3.0-4
ii  libjansson42.13.1-1
ii  libltdl7   2.4.6-14
ii  libmariadb31:10.3.24-2
pn  libmicrohttpd12
ii  libogg01.3.2-1+b1
ii  libopus0   1.3.1-0.1
pn  libpq5 
ii  libpulse0  13.0-5
ii  libsodium231.0.18-1
ii  libsqlite3-0   3.33.0-1
ii  libunistring2  0.9.10-4
ii  libzbar0   0.23.1-2+b1
ii  lsb-base   11.1.0
ii  netbase6.2
ii  zlib1g 1:1.2.11.dfsg-2

Versions of packages gnunet recommends:
pn  libnss3-tools  
ii  openssl1.1.1h-1

Versions of packages gnunet suggests:
pn  miniupnpc  
pn  texlive



Bug#974995: Raising severity and offering to NMU package

2020-11-23 Thread Bertrand Marc
Dear Simon,

If you can find the time, please do. Otherwise, I'll probably remove GNUnet 
from testing myself (it is currently RFA).

Cheers,
Bertrand

Le 23/11/2020 à 20:15, Simon Josefsson a écrit :
> severity 975030 serious
> severity 974997 serious
> severity 974996 serious
> severity 974995 serious
> severity 974994 serious
> severity 974993 serious
> thanks
>
> It was suggested to me on IRC that the severity of this could be
> serious because the build-dependency libidn2-0-dev is going to be
> removed from Debian.  I'm volunteering to do NMU these packages to fix
> the bug, and could look into that in a couple of weeks -- if you give
> me permission to do it before, I'd start directly.  If I'm mistaken
> that this is not a valid justification for a serious bug, downgrade the
> bug and let me know, as I'm not sure what the best way to get an
> obsolete deprecated transition package removed from Debian when build-
> deps remain.
>
> /Simon
>



Bug#971026: RFP: amnesia-thedarkdescent -- A survival horror adventure video game

2020-09-26 Thread Bertrand Marc
Package: wnpp
Severity: wishlist
User: pkg-games-de...@lists.alioth.debian.org
Usertags: wnpp
X-Debbugs-Cc: debian-devel-ga...@lists.debian.org

* Package name : amnesia-thedarkdescent
Upstream Author : Frictional Games
* URL : https://github.com/FrictionalGames/AmnesiaTheDarkDescent
* License : GPLv3
Programming Lang: C++
Description : A survival horror adventure video game

Amnesia: The Dark Descent is a first-person adventure game with survival
horror elements. The player takes control of Daniel, who must navigate
Brennenburg Castle while avoiding various dangers and solving puzzles.
The gameplay retains the physical object interaction used in the Penumbra
series, allowing for physics-based puzzles and interactions such as
opening doors and fixing machinery.



Bug#971025: RFP: amnesia-amachineforpigs -- A survival horror adventure video game

2020-09-26 Thread Bertrand Marc
Package: wnpp
Severity: wishlist
User: pkg-games-de...@lists.alioth.debian.org
Usertags: wnpp
X-Debbugs-Cc: debian-devel-ga...@lists.debian.org

* Package name : amnesia-amachineforpigs
Upstream Author : Frictional Games
* URL : https://github.com/FrictionalGames/AmnesiaAMachineForPigs
* License : GPLv3
Programming Lang: C++
Description : A survival horror adventure video game

Amnesia: A Machine for Pigs is a first-person adventure game with survival
horror elements. Players explore the environments using a lantern, with diary
entries and notes providing information on the lost memory of the title 
character.



Bug#964790: libmicrohttpd: please make autopkgtests cross-friendly

2020-07-15 Thread Bertrand Marc
severity 964790 wishlist
thanks

Hi Gianfranco,

This looks fine to me, please go ahead.

Cheers,
Bertrand



Bug#964324: RFA: gnunet-fuse -- secure, trust-based peer-to-peer framework (fuse filesystem client)

2020-07-05 Thread Bertrand Marc
Package: wnpp
Severity: normal

I request an adopter for the gnunet-fuse package.

The package description is:
 GNUnet is a peer-to-peer framework which focuses on providing security. All
 link-to-link messages in the network are confidential and authenticated. The
 framework provides a transport abstraction layer and can currently encapsulate
 the peer-to-peer traffic in UDP, TCP, or SMTP messages.
 .
 This package contains the fuse filesystem client. In order use GNUnet, you also
 need gnunet-server either on your server or on your local machine.



Bug#964323: RFA: gnunet-gtk -- GNU's framework for secure peer-to-peer networking (GTK+ client)

2020-07-05 Thread Bertrand Marc
Package: wnpp
Severity: normal

I request an adopter for the gnunet-gtk package.

The package description is:
 GNUnet is a framework for secure peer-to-peer networking that does not use any
 centralized or otherwise trusted services. Its high-level goal is to provide a
 strong free software foundation for a global network that provides security
 and in particular respects privacy.
 .
 GNUnet started with an idea for anonymous censorship-resistant file-sharing,
 but has grown to incorporate other applications as well as many generic
 building blocks for secure networking applications. In particular, GNUnet now
 includes the GNU Name System, a privacy-preserving, decentralized public key
 infrastructure.
 .
 This package contains the graphical client, using the GTK+ toolkit. In order
 use GNUnet, you also need gnunet either on your server or on your local
 machine.



signature.asc
Description: OpenPGP digital signature


Bug#964314: RFA: gnunet -- GNU's framework for secure peer-to-peer networking

2020-07-05 Thread Bertrand Marc
Package: wnpp
Severity: normal

I request an adopter for the gnunet package.

The package description is:
 GNUnet is a framework for secure peer-to-peer networking that does not use any
 centralized or otherwise trusted services. Its high-level goal is to provide a
 strong free software foundation for a global network that provides security
 and in particular respects privacy.
 .
 GNUnet started with an idea for anonymous censorship-resistant file-sharing,
 but has grown to incorporate other applications as well as many generic
 building blocks for secure networking applications. In particular, GNUnet now
 includes the GNU Name System, a privacy-preserving, decentralized public key
 infrastructure.




signature.asc
Description: OpenPGP digital signature


Bug#963839: dpkg-dev: gpg tries to write in $HOME when verifying signatures

2020-06-28 Thread Bertrand Marc
Package: dpkg-dev
Version: 1.20.2
Severity: normal

Dear Maintainer,

Since dpkg-dev 1.2O.1, dpkg-buildpackage tries to verify tarball signatures from
debian/upstream/signing-key.asc with gpg. When called, gpg tries to write a file
in $HOME/.gnupg. This is not allowed by default when building with sbuild and
pbuilder, and therefore building a package with tarball signatures fails.

For instance with gpb buildpackage (calling cowbuilder):
 dpkg-source -b .
 dpkg-source: info: using source format '3.0 (quilt)'
 dpkg-source: info: building libextractor using existing 
./libextractor_1.9.orig.tar.gz
 dpkg-source: info: building libextractor using existing 
./libextractor_1.9.orig.tar.gz.asc
 gpg: Fatal: /nonexistent/.gnupg: directory does not exist!
 dpkg-source: error: failed to import key in 
libextractor-1.9/debian/upstream/signing-key.asc
 dpkg-buildpackage: error: dpkg-source -b . subprocess returned exit status 2

According to the gpg manpage, using the gpg option --no-options would prevent 
gpg
from creating ~/.gnupg.

Cheers,
Bertrand




signature.asc
Description: OpenPGP digital signature


Bug#956085: libmicrohttpd: new upstream version available

2020-04-19 Thread Bertrand Marc
Dear Daniel,

Thank you for your work on MHD packaging, it is much appreciated. I am 
currently having a look at your merge request, please do not upload an NMU in 
the meantime.

As a general rule concerning your changes, I would prefer not mixing packaging 
style and trailing whitespaces changes with bug fixes. But if you'd like to 
co-maintain the
package, we could also implement your wrap-and-sort choices of course.

Concerning the new version, I am aware of the issue with parallel building. 
Actually, I was the one signalling the issue [1].

However, I am still puzzled by another testing issue: on my box, 
test_upgrade_tls and test_upgrade_large_tls fail randomly when built with 
git-buildpackage and cowbuilder,
but not with debuild and dpkg-buildpackage. Therefore I suspect the use of 
chroots, but I did not manage to locate properly the issue. I also submit the 
problem upstream,
without success yet [2]. Your help would be much welcome on this one.

Best regards,
Bertrand

[1] https://bugs.gnunet.org/view.php?id=6117
[2] https://bugs.gnunet.org/view.php?id=6116

Le 07/04/2020 à 05:25, Daniel Kahn Gillmor a écrit :
> Package: src:libmicrohttpd
> Version: 0.9.66-1
>
> For libmicrohttpd, upstream version 0.9.70 is available.  It is also
> packaged in the salsa git repo, but it doesn't build properly due to
> some tests not working in parallel mode because the tests reuse certain
> local ports (and dh compat level 12 switches to parallel make by
> default).  Upstream fixed this bug by forcing those tests to run
> serially, and i've proposed backporting this fix from upstream over in
> this MR:
>
> https://salsa.debian.org/debian/libmicrohttpd/-/merge_requests/2
>
> (the MR also addresses #955448).
>
> I'm happy to upload this fixed series as an NMU if that would be
> helpful.  If i haven't heard any objections on this report in a few
> days, i'll go ahead with an NMU to DELAYED/10 (following the usual NMU
> procedures reporting the nmudiff on both bug reports).
>
> Thanks for maintaining libmicrohttpd in debian!  I hope that these
> reports and the MR are both helpful to you in this work.
>
> Regards,
>
>--dkg



Bug#937302: playonlinux: Python2 removal in sid/bullseye

2020-02-29 Thread Bertrand Marc
Hi Scott,

> On Thu, 30 Jan 2020, Scott Talbert wrote:
>>
>> What is the games team plan for Python 3 support in playonlinux?  Do you 
>> plan to port it to Python 3?  Or remove? 

I don't plan to port playonlinux to Python 3. However, a new version of 
playonlinux is currently developped under Java [1]. There is no release date 
for now, but I will
package it when a stable version is available.

Best,
Bertrand

[1] https://github.com/PhoenicisOrg/phoenicis



Bug#944317: pcabackend: fails with "can only concatenate str (not "bytes") to str"

2019-11-07 Thread Bertrand Marc
Package: duplicity
Version: 0.8.05-2
Severity: normal
Tags: patch upstream

Dear Maintainer,

The PCA (OVH public cloud archive) backend fails with Python 3, with "can only 
concatenate str (not "bytes") to str".

The attached patch, based on the most recent SWIFT backend, appears to work. 
However, I am not familiar with Python 3 so I would recommend checking it 
properly.

Cheers,
Bertrand

-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.2.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages duplicity depends on:
ii  gnupg  2.2.17-3
ii  libc6  2.29-2
ii  librsync2  2.0.2-1
ii  python3    3.7.5-1
ii  python3-fasteners  0.14.1-2
ii  python3-future 0.16.0-1
ii  python3-lockfile   1:0.12.2-2

Versions of packages duplicity recommends:
ii  python3-oauthlib  2.1.0-2
ii  python3-paramiko  2.6.0-1
ii  python3-pexpect   4.6.0-1
ii  python3-urllib3   1.24.1-1
ii  rsync 3.1.3-8

Versions of packages duplicity suggests:
pn  lftp 
pn  ncftp    
pn  par2 
pn  python3-boto 
pn  python3-pip  
ii  python3-swiftclient  1:3.8.1-2
pn  tahoe-lafs   

-- no debconf information


--- /usr/lib/python3/dist-packages/duplicity/backends/pcabackend.py	2019-07-16 22:44:19.0 +0200
+++ /home/bbk/Temp/pcabackend.py	2019-11-07 18:02:17.513258254 +0100
@@ -150,8 +150,8 @@
 return log.ErrorCode.backend_not_found
 
 def _put(self, source_path, remote_filename):
-self.conn.put_object(self.container, self.prefix + remote_filename,
- file(source_path.name))
+self.conn.put_object(self.container, self.prefix + util.fsdecode(remote_filename),
+ open(util.fsdecode(source_path.name), u'rb'))
 
 def _get(self, remote_filename, local_path):
 body = self.preprocess_download(remote_filename, 60)
@@ -166,10 +166,10 @@
 return [o[u'name'][len(self.prefix):] for o in objs]
 
 def _delete(self, filename):
-self.conn.delete_object(self.container, self.prefix + filename)
+self.conn.delete_object(self.container, self.prefix + util.fsdecode(filename))
 
 def _query(self, filename):
-sobject = self.conn.head_object(self.container, self.prefix + filename)
+sobject = self.conn.head_object(self.container, self.prefix + util.fsdecode(filename))
 return {u'size': int(sobject[u'content-length'])}
 
 def preprocess_download(self, remote_filename, retry_period, wait=True):
@@ -188,7 +188,7 @@
 
 def unseal(self, remote_filename):
 try:
-_, body = self.conn.get_object(self.container, self.prefix + remote_filename,
+_, body = self.conn.get_object(self.container, self.prefix + util.fsdecode(remote_filename),
resp_chunk_size=1024)
 log.Info(u"File %s was successfully unsealed." % remote_filename)
 return body


Bug#527510: trigger-rally should work w.o. sound as well

2019-01-06 Thread Bertrand Marc

Hi,

I am not sure this is still an issue, after 9 years. Would you be kind enough 
to confirm this is still bothering you?

And does this problem occur even if you disable the sound from the 
trigger.config file, by setting enablesound to "no"?

Best regards,
Bertrand



Bug#917822: "ValueError: Namespace Gtk not available" error in terminal while starting

2019-01-01 Thread Bertrand Marc
Hi,

Does the installation of either of the following packages solves the issue?
|python3-gi python3-gi-cairo gir1.2-gtk-3.0|

And by the way, do you get any GUI issues with GNUcash? Does it starts properly?

Best,
Bertrand



Bug#775320: gnucash: Cannot switch tabs with keyboard

2018-12-29 Thread Bertrand Marc
Hi,

For your information, Ctrl+Alt+PgUp/PgDown always works. So I am downgrading 
this bug's severity to minor.

But indeed, the announced shortcut does not work consistently. There are 
several bugs opened upstream, see below.

https://bugs.gnucash.org/show_bug.cgi?id=411910
https://bugs.gnucash.org/show_bug.cgi?id=372387
https://bugs.gnucash.org/show_bug.cgi?id=450717

Best,
Bertrand



Bug#893560: Gnucash does not update currency EUR/USD

2018-12-28 Thread Bertrand Marc
Hi Olivier,

Le 10/12/2018 à 22:21, Olivier Allard-Jacquin a écrit :
>   Perfect, this is work fine !
Good !
>   One upstream improvement should be that GnuCash detect the needs of
> Alphavantage API key, and suggest to user to request a key ?
For now, upstream is going to fix the issue 2 from your original message 
(disable the choice for currencies, see the upstream bug [1]).

But I agree, it would be nice to have at least a warning. I am going to rename 
this bug accordingly, and set it to a minor priority.

Best,
Bertrand

[1] https://bugs.gnucash.org/show_bug.cgi?id=796970



Bug#851783: GNUCash crashes when asking for a report, if talkplugin for chrome is installed

2018-12-09 Thread Bertrand Marc
Hi Sergio,

Do you still face this issue? I cannot reproduce neither on stable (version 
2.15) nor unstable (version 3.3).

Cheers,
Bertrand



Bug#773243: gnucash: hangs, completely unresponsive

2018-11-25 Thread Bertrand Marc
Hi,

Do you still face this bug? And can you confirm it only happens with your 
datafile and no other (or a new one)?

Best,
Bertrand



Bug#808083: gnucash: Exporting transactions as CSV, not working

2018-11-25 Thread Bertrand Marc
Hi,

Is this bug still annoying you? I cannot reproduce it with gnucash 2.6.19.

And for your information, I also get the same message about the python module, 
I don't think it is related.

Best,
Bertrand



Bug#505857: debian-watch-file-should-mangle-version doesn't detect dversionmangle=auto

2018-11-25 Thread Bertrand Marc
Hi Chris,

Le 25/11/2018 à 09:42, Chris Lamb a écrit :
> Hi Bertrand,
>
>> Lintian also doesn't detect dversionmangle=auto in debian/watch and 
>> reports a warning for this (see [2]).
> Hm, can you quickly confirm you are using the latest Lintian? This should
> have been fixed via #913761 in:
>
>   
> https://salsa.debian.org/lintian/lintian/commit/b1308b369b98985c46d050fb7604f4272abd066b
>
> … which should probably be merged into this bug too (unless I'm
> missing something).
>
>
> Best wishes,
>
Indeed, this is fixed with lintian 2.5.113.

Cheers,
Bertrand



Bug#505857: debian-watch-file-should-mangle-version doesn't detect dversionmangle=auto

2018-11-23 Thread Bertrand Marc
Version: 2.5.113

Hi,

Lintian also doesn't detect dversionmangle=auto in debian/watch and reports a 
warning for this (see [2]).

Thanks,
Bertrand

[2] https://salsa.debian.org/games-team/7kaa/blob/master/debian/watch



Bug#906075: gnunet: diff for NMU version 0.10.1-5.1

2018-09-23 Thread Bertrand Marc
Hi Adrian,

Le 22/09/2018 à 09:49, Adrian Bunk a écrit :
> Control: tags 906075 + patch
> Control: tags 906075 + pending
>
> Dear maintainer,
>
> I've prepared an NMU for gnunet (versioned as 0.10.1-5.1) and uploaded 
> it to DELAYED/15. Please feel free to tell me if I should cancel it.
>
> cu
> Adrian
>
Be my guest.

Thanks,
Bertrand



Bug#888373: libextractor: FTBFS with FFmpeg 4.0

2018-06-11 Thread Bertrand Marc

|forwarded 888373 https://gnunet.org/bugs/view.php?id=5343
thanks

Thanks for the patch. I fowarded it upstream, so that they would make it 
backward compatible.

Best regards,
Bertrand
|



Bug#885619: jessie-pu: package libextractor/1:1.3-2

2018-06-11 Thread Bertrand Marc

Le 08/06/2018 à 22:24, Adam D. Barratt a écrit :

Control: tags -1 + moreinfo

On Thu, 2017-12-28 at 17:32 +0100, Bertrand Marc wrote:

Would you allow an update of libextractor 1.3-2 in Jessie to fix
several minor security issues?
7 issues skipped by the security teams:


[...]

   * CVE-2017-15600 <https://security-tracker.debian.org/tracker/CVE-
2017-15600>: In GNU Libextractor 1.4, there is a NULL Pointer
Dereference in the
 EXTRACTOR_nsf_extract_method function of plugins/nsf_extractor.c.


I assume the same issue that Julien raised for the stretch package
applies here.

Regards,

Adam

Indeed. The attached patch would fix the issue.

Regards,
Bertrand
diff -Nru libextractor-1.3/debian/changelog libextractor-1.3/debian/changelog
--- libextractor-1.3/debian/changelog	2014-09-30 22:56:54.0 +0200
+++ libextractor-1.3/debian/changelog	2017-12-27 19:01:53.0 +0100
@@ -1,3 +1,14 @@
+libextractor (1:1.3-2+deb8u1) jessie; urgency=medium
+
+  * Fix CVE-2017-15266, CVE-2017-15267, CVE-2017-15600, CVE-2017-15601,
+CVE-2017-15602, CVE-2017-15922 and CVE-2017-17440. Leon Zhao discovered
+several security vulnerabilities, NULL Pointer Dereferences, heap-based
+buffer overflows, integer signedness errors and out-of-bounds read that
+may lead to a denial-of-service (application crash) or have other
+unspecified impact.
+
+ -- Bertrand Marc   Wed, 27 Dec 2017 19:01:53 +0100
+
 libextractor (1:1.3-2) unstable; urgency=medium
 
   * Build-depend on libmagic-dev and libavresample-dev to enable additional
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15266.patch libextractor-1.3/debian/patches/CVE-2017-15266.patch
--- libextractor-1.3/debian/patches/CVE-2017-15266.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15266.patch	2017-12-27 19:01:53.0 +0100
@@ -0,0 +1,17 @@
+From: Bertrand Marc 
+Subject: CVE-2017-15266
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg2.html
+Bug-Debian: https://bugs.debian.org/878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=b577d5452c5c4ee9d552da62a24b95f461551fe2
+--- a/src/plugins/wav_extractor.c
 b/src/plugins/wav_extractor.c
+@@ -109,6 +109,8 @@
+ return;/* invalid sample size found in wav file */
+   if (0 == channels)
+ return;/* invalid channels value -- avoid division by 0! */
++  if (0 == sample_rate)
++return;/* invalid sample_rate */
+   samples = data_len / (channels * (sample_size >> 3));
+ 
+   snprintf (scratch,
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15267.patch libextractor-1.3/debian/patches/CVE-2017-15267.patch
--- libextractor-1.3/debian/patches/CVE-2017-15267.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15267.patch	2017-12-27 19:01:53.0 +0100
@@ -0,0 +1,22 @@
+From: Markus Koschany 
+Date: Mon, 4 Dec 2017 00:00:15 +0100
+Subject: CVE-2017-15267
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg3.html
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=6095d7132b57fc7368fc7a40bab2a71b735724d2
+---
+ src/plugins/flac_extractor.c | 2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/src/plugins/flac_extractor.c
 b/src/plugins/flac_extractor.c
+@@ -339,6 +339,8 @@
+ 	  {
+ 	entry = >comments[count];
+ 	eq = (const char*) entry->entry;
++	if (NULL == eq)
++			break;
+ 	len = entry->length;
+ 	ilen = 0;
+ 	while ( ('=' != *eq) && ('\0' != *eq) &&
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15600.patch libextractor-1.3/debian/patches/CVE-2017-15600.patch
--- libextractor-1.3/debian/patches/CVE-2017-15600.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15600.patch	2017-12-27 19:01:53.00000 +0100
@@ -0,0 +1,29 @@
+From: Bertrand Marc , Markus Koschany 
+Subject: CVE-2017-15600
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg4.html
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=38e8933539ee9d044057b18a971c2eae3c21aba7
+--- a/src/plugins/nsf_extractor.c
 b/src/plugins/nsf_extractor.c
+@@ -152,13 +152,17 @@
+   char nsfversion[32];
+   const struct header *head;
+   void *data;
++  ssize_t ds;
+ 
+-  if (sizeof (struct header) >
+-  ec->read (ec->cls,
+-		,
+-		sizeof (struct header)))
++  ds = ec->read (ec->cls,
++ ,
++ sizeof (struct header));
++  if ( (-1 == ds) ||
++   (sizeof (struct header) > ds) )
+ return;
+   head = data; 
++  if (NULL == head)
++return;
+ 
+   /* Check "magic" id bytes */
+   if (memcmp (head->magicid, "NESM\x1a", 5))
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15601.patch libextractor-1.3/debian/patches/CVE-2017-15601.p

Bug#888311: Locale not found message

2018-03-30 Thread Bertrand Marc
reassign 888311 systemsettings
thanks

Hi,

Sorry for the delay. From your description, it seems to be a bug in KDE 
systemsettings, so I am reassigning. Feel free to revert if you disagree.

Cheers,
Bertrand



Bug#885617: stretch-pu: package libextractor/1:1.3-4

2018-02-25 Thread Bertrand Marc
Le 10/02/2018 à 11:13, Julien Cristau a écrit :
> Control: tag -1 moreinfo
>
> On Thu, Dec 28, 2017 at 17:11:02 +0100, Bertrand Marc wrote:
>
>> diff -Nru libextractor-1.3/debian/patches/CVE-2017-15600.patch 
>> libextractor-1.3/debian/patches/CVE-2017-15600.patch
>> --- libextractor-1.3/debian/patches/CVE-2017-15600.patch 1970-01-01 
>> 01:00:00.0 +0100
>> +++ libextractor-1.3/debian/patches/CVE-2017-15600.patch 2017-12-28 
>> 11:39:33.00000 +0100
>> @@ -0,0 +1,29 @@
>> +From: Bertrand Marc <bm...@debian.org>, Markus Koschany <a...@debian.org>
>> +Subject: CVE-2017-15600
>> +
>> +Bug-Upstream: 
>> http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg4.html
>> +Origin: 
>> https://gnunet.org/git/libextractor.git/commit/?id=38e8933539ee9d044057b18a971c2eae3c21aba7
>> +--- a/src/plugins/nsf_extractor.c
>>  b/src/plugins/nsf_extractor.c
>> +@@ -152,13 +152,17 @@
>> +   char nsfversion[32];
>> +   const struct header *head;
>> +   void *data;
>> ++  ssize_t ds;
>> + 
>> +-  if (sizeof (struct header) >
>> +-  ec->read (ec->cls,
>> +-   ,
>> +-   sizeof (struct header)))
>> ++  ds = ec->read (ec->cls,
>> ++ ,
>> ++ sizeof (struct header));
>> ++  if ( (-1 == ds) ||
>> ++   (sizeof (struct header) > ds) )
>> + return;
>> +   head = data; 
>> ++  if (NULL == head)
>> ++return 0; 
>> + 
> Curious how that works.  3 lines above is plain "return", and here
> "return 0".  What's the type of that function and how did the compiler
> not flag this?
>
> Cheers,
> Julien

Indeed, sorry. The type of the function was changed from void (in wheezy) to 
int (in jessie). I updated the patch attached accordingly.


Cheers,

Bertrand

diff -Nru libextractor-1.3/debian/changelog libextractor-1.3/debian/changelog
--- libextractor-1.3/debian/changelog	2016-04-26 22:58:56.0 +0200
+++ libextractor-1.3/debian/changelog	2017-12-28 11:39:33.0 +0100
@@ -1,3 +1,14 @@
+libextractor (1:1.3-4+deb9u1) stretch; urgency=medium
+
+  * Fix CVE-2017-15266, CVE-2017-15267, CVE-2017-15600, CVE-2017-15601,
+CVE-2017-15602, CVE-2017-15922 and CVE-2017-17440. Leon Zhao discovered
+several security vulnerabilities, NULL Pointer Dereferences, heap-based
+buffer overflows, integer signedness errors and out-of-bounds read that
+may lead to a denial-of-service (application crash) or have other
+unspecified impact.
+
+ -- Bertrand Marc <bm...@debian.org>  Thu, 28 Dec 2017 11:39:33 +0100
+
 libextractor (1:1.3-4) unstable; urgency=medium
 
   * Update debian/patches/ffmpeg2.9.patch with a new commit taken from upstream
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15266.patch libextractor-1.3/debian/patches/CVE-2017-15266.patch
--- libextractor-1.3/debian/patches/CVE-2017-15266.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15266.patch	2017-12-28 11:39:33.0 +0100
@@ -0,0 +1,17 @@
+From: Bertrand Marc <bm...@debian.org>
+Subject: CVE-2017-15266
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg2.html
+Bug-Debian: https://bugs.debian.org/878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=b577d5452c5c4ee9d552da62a24b95f461551fe2
+--- a/src/plugins/wav_extractor.c
 b/src/plugins/wav_extractor.c
+@@ -109,6 +109,8 @@
+ return;/* invalid sample size found in wav file */
+   if (0 == channels)
+ return;/* invalid channels value -- avoid division by 0! */
++  if (0 == sample_rate)
++return;/* invalid sample_rate */
+   samples = data_len / (channels * (sample_size >> 3));
+ 
+   snprintf (scratch,
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15267.patch libextractor-1.3/debian/patches/CVE-2017-15267.patch
--- libextractor-1.3/debian/patches/CVE-2017-15267.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15267.patch	2017-12-28 11:39:33.0 +0100
@@ -0,0 +1,22 @@
+From: Markus Koschany <a...@debian.org>
+Date: Mon, 4 Dec 2017 00:00:15 +0100
+Subject: CVE-2017-15267
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg3.html
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=6095d7132b57fc7368fc7a40bab2a71b735724d2
+---
+ src/plugins/flac_extractor.c | 2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/src/plugins/flac_extractor.c
 b/src/plugins/flac_extractor.c
+@@ -339,6 +339,8 @@
+ 	  {
+ 	entry = >comments[count];
+ 	eq = (const char*) entry->entry;
++	if (NULL == eq)
++			bre

Bug#885619: jessie-pu: package libextractor/1:1.3-2

2017-12-28 Thread Bertrand Marc
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: jessie
Severity: normal

Dear release team,

Would you allow an update of libextractor 1.3-2 in Jessie to fix several minor 
security issues?
7 issues skipped by the security teams:

  * CVE-2017-15266 
<https://security-tracker.debian.org/tracker/CVE-2017-15266>: In GNU 
Libextractor 1.4, there is a Divide-By-Zero in EXTRACTOR_wav_extract_method in
wav_extractor.c via a zero sample rate.
  * CVE-2017-15922 
<https://security-tracker.debian.org/tracker/CVE-2017-15922>: In GNU 
Libextractor 1.4, there is an out-of-bounds read in the 
EXTRACTOR_dvi_extract_method
function in plugins/dvi_extractor.c.
  * CVE-2017-15267 
<https://security-tracker.debian.org/tracker/CVE-2017-15267>: In GNU 
Libextractor 1.4, there is a NULL Pointer Dereference in flac_metadata in
flac_extractor.c.
  * CVE-2017-15602 
<https://security-tracker.debian.org/tracker/CVE-2017-15602>: In GNU 
Libextractor 1.4, there is an integer signedness error for the chunk size in the
EXTRACTOR_nsfe_extract_method function in plugins/nsfe_extractor.c, leading 
to an infinite loop for a crafted size.
  * CVE-2017-17440 
<https://security-tracker.debian.org/tracker/CVE-2017-17440>: GNU Libextractor 
1.6 allows remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via a crafted GIF, IT (Impulse Tracker), 
NSFE, S3M (Scream Tracker 3), SID, or XM (eXtended Module) file, as 
demonstrated by the
EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c.
  * CVE-2017-15600 
<https://security-tracker.debian.org/tracker/CVE-2017-15600>: In GNU 
Libextractor 1.4, there is a NULL Pointer Dereference in the
EXTRACTOR_nsf_extract_method function of plugins/nsf_extractor.c.
  * CVE-2017-15601 
<https://security-tracker.debian.org/tracker/CVE-2017-15601>: In GNU 
Libextractor 1.4, there is a heap-based buffer overflow in the
EXTRACTOR_png_extract_method function in plugins/png_extractor.c, related 
to processiTXt and stndup.

You will find attached the full debdiff.


Cheers,
Bertrand

PS These are the same changes as in #885617

diff -Nru libextractor-1.3/debian/changelog libextractor-1.3/debian/changelog
--- libextractor-1.3/debian/changelog	2014-09-30 22:56:54.0 +0200
+++ libextractor-1.3/debian/changelog	2017-12-27 19:01:53.0 +0100
@@ -1,3 +1,14 @@
+libextractor (1:1.3-2+deb8u1) jessie; urgency=medium
+
+  * Fix CVE-2017-15266, CVE-2017-15267, CVE-2017-15600, CVE-2017-15601,
+CVE-2017-15602, CVE-2017-15922 and CVE-2017-17440. Leon Zhao discovered
+several security vulnerabilities, NULL Pointer Dereferences, heap-based
+buffer overflows, integer signedness errors and out-of-bounds read that
+may lead to a denial-of-service (application crash) or have other
+    unspecified impact.
+
+ -- Bertrand Marc <bm...@debian.org>  Wed, 27 Dec 2017 19:01:53 +0100
+
 libextractor (1:1.3-2) unstable; urgency=medium
 
   * Build-depend on libmagic-dev and libavresample-dev to enable additional
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15266.patch libextractor-1.3/debian/patches/CVE-2017-15266.patch
--- libextractor-1.3/debian/patches/CVE-2017-15266.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15266.patch	2017-12-27 19:01:53.0 +0100
@@ -0,0 +1,17 @@
+From: Bertrand Marc <bm...@debian.org>
+Subject: CVE-2017-15266
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg2.html
+Bug-Debian: https://bugs.debian.org/878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=b577d5452c5c4ee9d552da62a24b95f461551fe2
+--- a/src/plugins/wav_extractor.c
 b/src/plugins/wav_extractor.c
+@@ -109,6 +109,8 @@
+ return;/* invalid sample size found in wav file */
+   if (0 == channels)
+ return;/* invalid channels value -- avoid division by 0! */
++  if (0 == sample_rate)
++return;/* invalid sample_rate */
+   samples = data_len / (channels * (sample_size >> 3));
+ 
+   snprintf (scratch,
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15267.patch libextractor-1.3/debian/patches/CVE-2017-15267.patch
--- libextractor-1.3/debian/patches/CVE-2017-15267.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15267.patch	2017-12-27 19:01:53.0 +0100
@@ -0,0 +1,22 @@
+From: Markus Koschany <a...@debian.org>
+Date: Mon, 4 Dec 2017 00:00:15 +0100
+Subject: CVE-2017-15267
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg3.html
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=6095d7132b57fc7368fc7a40bab2a71b735724d2
+---
+ src/plugins/flac_extractor.c | 2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/src/plugins/flac

Bug#885617: stretch-pu: package libextractor/1:1.3-4

2017-12-28 Thread Bertrand Marc
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: stretch
Severity: normal

Dear release team,

Would you allow an update of libextractor 1.3-4 in Stretch to fix several minor 
security issues?
7 issues skipped by the security teams:

  * CVE-2017-15266 
<https://security-tracker.debian.org/tracker/CVE-2017-15266>: In GNU 
Libextractor 1.4, there is a Divide-By-Zero in EXTRACTOR_wav_extract_method in
wav_extractor.c via a zero sample rate.
  * CVE-2017-15922 
<https://security-tracker.debian.org/tracker/CVE-2017-15922>: In GNU 
Libextractor 1.4, there is an out-of-bounds read in the 
EXTRACTOR_dvi_extract_method
function in plugins/dvi_extractor.c.
  * CVE-2017-15267 
<https://security-tracker.debian.org/tracker/CVE-2017-15267>: In GNU 
Libextractor 1.4, there is a NULL Pointer Dereference in flac_metadata in
flac_extractor.c.
  * CVE-2017-15602 
<https://security-tracker.debian.org/tracker/CVE-2017-15602>: In GNU 
Libextractor 1.4, there is an integer signedness error for the chunk size in the
EXTRACTOR_nsfe_extract_method function in plugins/nsfe_extractor.c, leading 
to an infinite loop for a crafted size.
  * CVE-2017-17440 
<https://security-tracker.debian.org/tracker/CVE-2017-17440>: GNU Libextractor 
1.6 allows remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via a crafted GIF, IT (Impulse Tracker), 
NSFE, S3M (Scream Tracker 3), SID, or XM (eXtended Module) file, as 
demonstrated by the
EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c.
  * CVE-2017-15600 
<https://security-tracker.debian.org/tracker/CVE-2017-15600>: In GNU 
Libextractor 1.4, there is a NULL Pointer Dereference in the
EXTRACTOR_nsf_extract_method function of plugins/nsf_extractor.c.
  * CVE-2017-15601 
<https://security-tracker.debian.org/tracker/CVE-2017-15601>: In GNU 
Libextractor 1.4, there is a heap-based buffer overflow in the
EXTRACTOR_png_extract_method function in plugins/png_extractor.c, related 
to processiTXt and stndup.

You will find attached the full debdiff.


Cheers,

Bertrand

diff -Nru libextractor-1.3/debian/changelog libextractor-1.3/debian/changelog
--- libextractor-1.3/debian/changelog	2016-04-26 22:58:56.0 +0200
+++ libextractor-1.3/debian/changelog	2017-12-28 11:39:33.0 +0100
@@ -1,3 +1,14 @@
+libextractor (1:1.3-4+deb9u1) stretch; urgency=medium
+
+  * Fix CVE-2017-15266, CVE-2017-15267, CVE-2017-15600, CVE-2017-15601,
+CVE-2017-15602, CVE-2017-15922 and CVE-2017-17440. Leon Zhao discovered
+several security vulnerabilities, NULL Pointer Dereferences, heap-based
+buffer overflows, integer signedness errors and out-of-bounds read that
+may lead to a denial-of-service (application crash) or have other
+    unspecified impact.
+
+ -- Bertrand Marc <bm...@debian.org>  Thu, 28 Dec 2017 11:39:33 +0100
+
 libextractor (1:1.3-4) unstable; urgency=medium
 
   * Update debian/patches/ffmpeg2.9.patch with a new commit taken from upstream
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15266.patch libextractor-1.3/debian/patches/CVE-2017-15266.patch
--- libextractor-1.3/debian/patches/CVE-2017-15266.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15266.patch	2017-12-28 11:39:33.0 +0100
@@ -0,0 +1,17 @@
+From: Bertrand Marc <bm...@debian.org>
+Subject: CVE-2017-15266
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg2.html
+Bug-Debian: https://bugs.debian.org/878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=b577d5452c5c4ee9d552da62a24b95f461551fe2
+--- a/src/plugins/wav_extractor.c
 b/src/plugins/wav_extractor.c
+@@ -109,6 +109,8 @@
+ return;/* invalid sample size found in wav file */
+   if (0 == channels)
+ return;/* invalid channels value -- avoid division by 0! */
++  if (0 == sample_rate)
++return;/* invalid sample_rate */
+   samples = data_len / (channels * (sample_size >> 3));
+ 
+   snprintf (scratch,
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15267.patch libextractor-1.3/debian/patches/CVE-2017-15267.patch
--- libextractor-1.3/debian/patches/CVE-2017-15267.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15267.patch	2017-12-28 11:39:33.0 +0100
@@ -0,0 +1,22 @@
+From: Markus Koschany <a...@debian.org>
+Date: Mon, 4 Dec 2017 00:00:15 +0100
+Subject: CVE-2017-15267
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg3.html
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=6095d7132b57fc7368fc7a40bab2a71b735724d2
+---
+ src/plugins/flac_extractor.c | 2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/src/plugins/flac_extractor.c
 b/src/plugins/flac_extr

Bug#867904: gnucash: Package for 2.6.15-1 stable does not include menu definition

2017-10-08 Thread Bertrand Marc
Hi Dario,

gnucash.menu was dropped on purpose [1]. In fact, according to Debian policy 
9.6 "If a package installs a FreeDesktop desktop entry, it must not also 
install a Debian menu
entry."

So I am closing this bug.

Best regards,
Bertrand

[1] 
https://anonscm.debian.org/cgit/pkg-gnucash/gnucash.git/commit/?id=b94f91f10129d31ead0e1df400e19c0703771c12



Bug#876554: wrong pkgconfig files

2017-09-23 Thread Bertrand Marc
Package: src:libextractor
Version: 1:1.3-2
Severity: serious

configure.ac messes up with user variables CFLAGS, CPPFLAGS, LIBS and LDFLAGS. 
Since these are used to generate pkgconfig files, the user flags are wrongly 
passed to
libextractor.pc (see on Debian -D_FORTIFY_SOURCE=2).

This generates the following lintian errors and therefore prevent any new 
upload to unstable:
libextractor-dev (1:1.3-4+b2; main)
    E pkg-config-bad-directive
    usr/lib/i386-linux-gnu/pkgconfig/libextractor.pc -D_FORTIFY_SOURCE=2
    usr/lib/i386-linux-gnu/pkgconfig/libextractor.pc -Wdate-time
    usr/lib/x86_64-linux-gnu/pkgconfig/libextractor.pc -D_FORTIFY_SOURCE=2
    usr/lib/x86_64-linux-gnu/pkgconfig/libextractor.pc -Wdate-time


This bug was reported upstream in November 2015, without success. Any help 
solving this would be greatly appreciated.



Bug#867785: libmicrohttpd-dev: Missing performance_data.png

2017-07-30 Thread Bertrand Marc
Hi Jeremy,

Sorry for the delay, I had no internet access during my holidays (and I will 
not have any access during the coming week).

Le 09/07/2017 à 20:27, Jeremy Bicha a écrit :
> Ok, here's a new version of the patch. I guess .info files are binary
> or something?

Thanks for the new version. You are right, .info files are binary generated 
from a .texi file. Of course I cannot apply a binary patch to the source, the 
patch should be
applied on the .texi file, and then debian/rules should make sure the .info 
file is regenerated from the patched .texi file.

Cheers,
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#849119: playonlinux: Buttons fail to appear in most or all pop up dialog boxes

2017-07-26 Thread Bertrand Marc
Hi,

As a workaround, upstream allowed the window to be resized in POL v4.2.11 [1]. 
So I will close this bug by uploading version 4.2.12 to unstable.

Feel free to reopen if you don't think this is fixed.

Best regards,
Bertrand

[1] https://www.playonlinux.com/fr/issue-5438.html



signature.asc
Description: OpenPGP digital signature


Bug#863711: playonlinux: The current PlayOnLinux package version is outdated

2017-07-25 Thread Bertrand Marc
Sorry, I had no internet access in the past week.

I am currently working on packaging POL 4.2.12, and I will probably upload it 
in the coming days.

Best regards,
Bertrand





signature.asc
Description: OpenPGP digital signature


Bug#867785: libmicrohttpd-dev: Missing performance_data.png

2017-07-09 Thread Bertrand Marc
Dear Jeremy,

Thanks for your patch, it is much appreciated. Unfortunately, putting an image 
with a generic name in /usr/share/info is not recommanded (see [1]). And this 
is why I never
took the trouble to fix this properly. Would you mind fix your patch to address 
this issue?

Best regards,
Bertrand

[1] https://lintian.debian.org/tags/info-document-missing-image-file.html





signature.asc
Description: OpenPGP digital signature


Bug#856713: unblock: gnunet-gtk/0.10.1-5

2017-03-04 Thread Bertrand Marc
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal

Dear realease team,

Please unblock package gnunet-gtk. The version 0.10.1-5 currently in unstable 
fixes bug #855706 (of important severity), with the following changes:
 gnunet-gtk (0.10.1-5) unstable; urgency=medium
   * Move the plugins from gnunet-gtk-dev to gnunet-gtk and add
 breaks/replaces: gnunet-gtk-dev for gnunet-gtk (Closes: #855706).

You will find attached a source debdiff between testing and the package in 
unstable.
unblock gnunet-gtk/0.10.1-5

Best regards,
Bertrand Marc
diff -Nru gnunet-gtk-0.10.1/debian/changelog gnunet-gtk-0.10.1/debian/changelog
--- gnunet-gtk-0.10.1/debian/changelog  2016-08-20 13:04:30.0 +0200
+++ gnunet-gtk-0.10.1/debian/changelog  2017-02-28 20:01:19.0 +0100
@@ -1,3 +1,10 @@
+gnunet-gtk (0.10.1-5) unstable; urgency=medium
+
+  * Move the plugins from gnunet-gtk-dev to gnunet-gtk and add
+breaks/replaces: gnunet-gtk-dev for gnunet-gtk (Closes: #855706).
+
+ -- Bertrand Marc <bm...@debian.org>  Tue, 28 Feb 2017 20:01:19 +0100
+
 gnunet-gtk (0.10.1-4) unstable; urgency=medium
 
   * Add a patch written by Chris Lamb to make the build reproducible
diff -Nru gnunet-gtk-0.10.1/debian/control gnunet-gtk-0.10.1/debian/control
--- gnunet-gtk-0.10.1/debian/control2016-08-20 12:46:06.0 +0200
+++ gnunet-gtk-0.10.1/debian/control2017-02-28 19:57:07.0 +0100
@@ -14,8 +14,8 @@
 Architecture: any
 Depends: ${misc:Depends}, ${shlibs:Depends}, policykit-1
 Recommends: gnunet
-Breaks: gnunet-tools (<<0.9)
-Replaces: gnunet-tools (<<0.9)
+Breaks: gnunet-tools (<<0.9), gnunet-gtk-dev (<<0.10.1-5)
+Replaces: gnunet-tools (<<0.9), gnunet-gtk-dev (<<0.10.1-5)
 Description: GNU's framework for secure peer-to-peer networking (GTK+ client)
  GNUnet is a framework for secure peer-to-peer networking that does not use any
  centralized or otherwise trusted services. Its high-level goal is to provide a
diff -Nru gnunet-gtk-0.10.1/debian/gnunet-gtk-dev.install 
gnunet-gtk-0.10.1/debian/gnunet-gtk-dev.install
--- gnunet-gtk-0.10.1/debian/gnunet-gtk-dev.install 2016-08-15 
20:25:11.0 +0200
+++ gnunet-gtk-0.10.1/debian/gnunet-gtk-dev.install 2017-02-26 
11:03:58.0 +0100
@@ -1,3 +1,2 @@
 usr/include
 usr/lib/*/*.so
-usr/lib/*/gnunet/*.so
diff -Nru gnunet-gtk-0.10.1/debian/gnunet-gtk.install 
gnunet-gtk-0.10.1/debian/gnunet-gtk.install
--- gnunet-gtk-0.10.1/debian/gnunet-gtk.install 2016-08-15 20:25:11.0 
+0200
+++ gnunet-gtk-0.10.1/debian/gnunet-gtk.install 2017-02-26 11:04:02.0 
+0100
@@ -1,5 +1,6 @@
 usr/bin/
 usr/lib/*/*.so.*
+usr/lib/*/gnunet/*.so
 usr/share
 debian/contrib/gnunet-setup-pkexec /usr/bin
 debian/contrib/org.debian.pkexec.gnunet-setup.policy 
/usr/share/polkit-1/actions/


Bug#855706: gnunet-gtk: Namestore plugins are in the -dev package

2017-02-28 Thread Bertrand Marc
Hi,

Since this bug has a major effect on the use of gnunet-gtk (all the plugins 
don't work without gnunet-gtk-dev), I am updating the severity to important, 
and I will try to
fix this for stretch.

Cheers,
Bertrand





signature.asc
Description: OpenPGP digital signature


Bug#855706: gnunet-gtk: Namestore plugins are in the -dev package

2017-02-28 Thread Bertrand Marc
Hi,

Since this bug has a major effect on the use of gnunet-gtk (all the plugins 
don't work without gnunet-gtk-dev), I am updating the severity to important, 
and I will try to
fix this for stretch.

Cheers,
Bertrand



Bug#855706: gnunet-gtk: Namestore plugins are in the -dev package

2017-02-26 Thread Bertrand Marc
Hi,

Thanks for pointing this out. Indeed the plugins should go in gnunet-gtk (but 
not libgnunetgtk.so, which is the standard symlink).

It will be fixed in the next upload (after the Stable release).

Cheers,
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#849119: playonlinux: Buttons fail to appear in most or all pop up dialog boxes

2017-01-04 Thread Bertrand Marc
Dear Ray,

Thank you for taking the time to investigate. I forwarded the issue upstream, 
and hopefully they will come up with a solution soon enough.

In the meantime, I will downgrade the severity of this bug, as playonlinux is 
still usable by most people.

Best regards,
Bertrand

PS Could you please put the bug email address in copy?


Le 30/12/2016 à 19:45, Raymond F. Anthracite a écrit :
> Dear Bertrand,
> 
> Upon further investigation, I think I have a better idea where the problem 
> lies.
> 
> It appears to be an issue with the size of the window decoration at the top 
> in 
> pixels not being compensated for by the program.  It happens in all window 
> managers.  My computer is running through a 4k 55" television, and I run at 
> font sizes around 22 or so.  Bigger fonts make the window decoration title 
> bar 
> bigger, which displace the buttons at the bottom, and the window isn't 
> expandable so it doesn't make room for it.
> 
> I suspect you could reproduce the problem on a system with normal specs (not 
> a 
> 4k 55 inch TV) by using a really big titlebar font size, and restarting your 
> window manager (the window managers sometimes seem to pick a titlebar size on 
> startup and then not change much it even if you change the font size), and 
> then you will notice the buttons on the bottom start to get cut off.
> 
> The problem happens in a brand new gnome session for me with a new user, with 
> a new home directory, with the default font sizes, but instead of being 
> entirely cut off the buttons are only partially cut off, so the program is 
> still usable to a degree.  I believe that this is because the gnome titlebars 
> are smaller by default, not for any other reason.
> 
> It also seems to work somewhat in kde if i start up with normal font sizes 
> and 
> then make them bigger, as that makes the title bar less big than it does if I 
> start up with them big for some reason.  The buttons are still mostly cut off 
> but I can click them, barely.
> 
> I included a pic where they aren't entirely cut off, but just mostly cut off 
> so that you can see what is happening.   It's from a time when I started up 
> kde with small fonts, then increased the font size of the titlebar to make 
> the 
> problem more noticable.  Normally all my fonts are about as big as the one in 
> the titlebar.  It seems to depend only on the size of the titlebar.  I don't 
> think the font size matters except in so far as that causes the title bar 
> size 
> to change, which it often does.
> 
> Best wishes,
> 
> Ray
> 
> $ xrandr -q
> Screen 0: minimum 8 x 8, current 3840 x 2160, maximum 32767 x 32767
> DVI-D-0 disconnected (normal left inverted right x axis y axis)
> HDMI-0 disconnected (normal left inverted right x axis y axis)
> HDMI-1 connected primary 3840x2160+0+0 (normal left inverted right x axis y 
> axis) 1210mm x 680mm
>3840x2160 30.00 +  59.94*   50.0029.9725.0023.98  
>4096x2160 59.9450.0029.9725.0024.0023.98  
>1920x1080 60.0059.9450.0029.9725.0023.9760.00  
>   
> 50.04  
>1680x1050 59.95  
>1600x900  60.00  
>1440x900  59.89  
>1366x768  59.79  
>1280x1024 75.0260.02  
>1280x800  59.81  
>1280x720  60.0059.9450.00  
>1152x864  75.00  
>1024x768  75.0370.0760.00  
>800x600   75.0072.1960.32  
>720x576   50.00  
>720x480   59.94  
>640x480   75.0072.8159.94  
> DP-0 disconnected (normal left inverted right x axis y axis)
> DP-1 disconnected (normal left inverted right x axis y axis)
> DP-2 disconnected (normal left inverted right x axis y axis)
> DP-3 disconnected (normal left inverted right x axis y axis)
> 
> 
> 




signature.asc
Description: OpenPGP digital signature


Bug#849119: playonlinux: Buttons fail to appear in most or all pop up dialog boxes

2016-12-28 Thread Bertrand Marc
Hi,

Thanks for your bug report. Unfortunately, I can't reproduce this bug.

Could you please attach a screenshot of the issue ? And maybe try with 
Gnome/XFCE instead of KDE ?

Best regards,
Bertrand




signature.asc
Description: OpenPGP digital signature


Bug#849236: GNUnet stable-backport

2016-12-27 Thread Bertrand Marc
Hi,

I am always happy to know that there are other packagers for GNUnet.

Le 24/12/2016 à 00:05, ban...@openmailbox.org a écrit :
> I'm a Whonix OS dev (an anonymity OS based on Debian stable) and we are 
> looking at shipping GNUnet to our users. From my experiments the version in 
> stable is not current
> enough to connect to the network. I confirmed this with the upstream devs - 
> their release cycle is too rapid for stable freezes and they end up making 
> non-backwards
> compatible changes regularly. Can you please consider maintaining a 
> stable-backports version of the latest release?

No, I do not have enough time. But you are welcome to prepare such a backport, 
and I would be happy to sponsor/upload it.

Cheers,
Bertrand





signature.asc
Description: OpenPGP digital signature


Bug#800835: firmware-linux-free: Possible missing firmware

2016-10-16 Thread Bertrand Marc
Hi,

Same here after upgrading to linux-4.7 in testing:

W: Possible missing firmware /lib/firmware/i915/skl_guc_ver6.bin for module i915
W: Possible missing firmware /lib/firmware/i915/kbl_dmc_ver1.bin for module i915


Cheers,
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#839223: RFP: python-googleplayapi -- Google Play Unofficial Python API

2016-09-30 Thread Bertrand Marc
Package: wnpp
Severity: whishlist
X-Debbugs-CC: gplay...@tracker.debian.org

* Package name: python-googleplayapi
* URL : https://github.com/egirault/googleplay-api/
* License : BSD
* Programming Lang: Python
* Description : A Google Play Unofficial Python API

This python code is already present (embedded) in the Debian package
gplaycli and is necessary to package googleplaydownloader (see RFP: #774863).

Unfortunately, upstream is dead and there are many forks out there on github.
For instance the googleplaydownloader upstream author embedded a version from
https://github.com/opengapps/apkcrawler

Best regards,
Bertrand Marc



Bug#772588: ITP: x13as -- X13-ARIMA-SEATS seasonal adjustment library

2016-09-30 Thread Bertrand Marc
Hello |Rytis,

Have you made any progress toward packaging X13 ? I am willing to sponsor an 
upload if you need.

However, I am not familiar with this kind of license, so it should be checked 
with debian-legal.

Best regards,
Bertrand
|



Bug#774863: New URL

2016-09-20 Thread Bertrand Marc
Upstream changed the URL:
https://framagit.org/tuxicoman/googleplaydownloader/



Bug#641974: 7kaa: Not translated

2016-09-19 Thread Bertrand Marc
Hi,

Translation support was added back in 2013, but for some reason upstream 
deactivated the translations in 2015. See 
https://github.com/the3dfxdude/7kaa/commits/master/po.

Cheers,
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#626760: 7kaa: pressing the window manager close button does not work on the title screen

2016-09-19 Thread Bertrand Marc
Hi,

It seems this was fixed in (at least) 2.14.5-1 version. Could you please check 
and hopefully close this old bug ?

Cheers,
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#831810: transition: libmicrohttpd

2016-07-23 Thread Bertrand Marc
Hi,

Le 23/07/2016 à 11:56, Emilio Pozuelo Monfort a écrit :
> On 23/07/16 11:35, Bertrand Marc wrote:
>> Do you think we could allow the libmicrohttpd transition ?
> 
> Yes. Go ahead.

Thanks ! I uploaded a new revision targeting unstable to
mentors [1] and I asked Holger Levsen (CC), my regular sponsor, to
upload it to unstable.

Cheers,
Bertrand

[1]
https://mentors.debian.net/debian/pool/main/libm/libmicrohttpd/libmicrohttpd_0.9.50-2.dsc



Bug#831810: transition: libmicrohttpd

2016-07-23 Thread Bertrand Marc
Hi,

Le 21/07/2016 à 18:58, Emilio Pozuelo Monfort a écrit :
> On 21/07/16 15:53, Jonathan Wiltshire wrote:
>> On 2016-07-19 20:19, Emilio Pozuelo Monfort wrote:
>> As a DM, Bertrand can request a guest account on a porterbox through
>> https://nm.debian.org
>> (log in and request a new status)
> 
> Bertrand, can you do that and test the rest of the rdeps?

Thanks for the advice. However I fear it would take as long as waiting
for my DD account to be created (DAM already opened a RT ticket for the
account creation).

Anyway, with the end of the heatwave in France (my laptop has
temperature issues), I was able to build three remaining r-deps:
- systemd
- ola
- pcp
For the last two, build fails with both libmicrohttpd10 and libmicrohttpd12:
- kodi (due to #820416)
- varnish-agent (due to #724479)
As kodi is marked for autoremoval from testing and varnish-agent is only
is Sid, it seems these are not blocking the libmicrohttpd transition.

Do you think we could allow the libmicrohttpd transition ?

Best regards,
Bertrand



Bug#831810: transition: libmicrohttpd

2016-07-21 Thread Bertrand Marc
Hi,

Le 19/07/2016 à 21:19, Emilio Pozuelo Monfort a écrit :
> In lack of that, do you know how much the ABI changed?

Sorry I missed that bit in my first message. To my mind (but I am not
sure), the soname bump comes from a new member in the middle of a union
struct exposed in /usr/include/microhttpd.h:

union MHD_ConnectionInfo
{
...
   int /* enum gnutls_protocol */ protocol;

   /**
+   * The suspended status of a connection.
+   */
+  int /* MHD_YES or MHD_NO */ suspended;
+
+  /**
* Connect socket
*/
...
}

There are also new enum constants, but they seem backward compatible.

And no symbols were removed.

Best regards,
Bertrand



Bug#831810: transition: libmicrohttpd

2016-07-19 Thread Bertrand Marc
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

Dear release team,

Please allow the transition from libmicrohttpd10 to libmicrohttpd12. 
libmicrohttpd12 (0.9.50-1) is currently in experimental. The auto tracker 
seems correct [1].
With this new version libmicrospdy goes away (dead upstream, no r-deps), so 
does the libssl-dev build-dependency. This could avoid some conflicts with the 
openssl transition.

Among the reverse build-dependencies I was able to build:
- gnunet
- libjson-rpc-cpp
- opensips
- psensor
- yubikey-server-c
- bfgminer

Since I use a quite old laptop, I had difficulties to build (both with 
libmicrohttpd10 and libmicrohttp12):
- systemd
- kodi
- ola (sid only)
- pcp
- varnish-agent (sid only)
Do you know if I could have access to a testing build infrastructure ?

pcp has a RC bug, but it is marked for autoremoval from testing on 2016-08-03.
kodi has also a RC bug, but it is marked for autoremoval from testing on 
2016-08-13.

Last things: please note that I do not have uploads rights yet, but it should 
only be a matter of time [2], and that I will not have internet access between 
July, 23 and August, 7.

Best regards,
Bertrand Marc

[1] https://release.debian.org/transitions/html/auto-libmicrohttpd.html
[2] https://nm.debian.org/public/process/bmarc

Ben file:

title = "libmicrohttpd";
is_affected = .depends ~ 
/(libmicrohttpd\-dbg|libmicrohttpd10|libmicrospdy\-dbg|libmicrospdy\-dev|libmicrospdy0)/
 | .depends ~ /libmicrohttpd12/;
is_good = .depends ~ /libmicrohttpd12/;
is_bad = .depends ~ 
/(libmicrohttpd\-dbg|libmicrohttpd10|libmicrospdy\-dbg|libmicrospdy\-dev|libmicrospdy0)/;


-- System Information:
Debian Release: stretch/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.6.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)



Bug#831589: r-cran-rcmdr: should recommend the CRAN packages listed at startup

2016-07-17 Thread Bertrand Marc
Le 17/07/2016 à 17:58, Dirk Eddelbuettel a écrit :
> 
> On 17 July 2016 at 16:09, Bertrand Marc wrote:
> | Some of these are packaged in Debian, and should therefore be recommended by
> | the r-cran-rcmdr Debian package. As far as I know:
> | r-cran-markdown, r-cran-knitr, r-cran-rglwidget.
> 
> Fair.  But a Suggests: may be better, no?

Suggests is of course fine by me.

> Added that in my sources now.

Thanks !

Bertrand



Bug#831589: r-cran-rcmdr: should recommend the CRAN packages listed at startup

2016-07-17 Thread Bertrand Marc
Package: r-cran-rcmdr
Version: 2.2-5-1
Severity: normal

Dear Maintainer,

If you launch Rcmdr with a minimal R installation, it will ask you to install
the following CRAN packages:
XLConnect sem rmarkdown rglwidget markdown leaps knitr aplpack

Some of these are packaged in Debian, and should therefore be recommended by
the r-cran-rcmdr Debian package. As far as I know:
r-cran-markdown, r-cran-knitr, r-cran-rglwidget.

Best regards,
Bertrand Marc

-- System Information:
Debian Release: stretch/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.6.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages r-cran-rcmdr depends on:
ii  r-base-core [r-api-3]  3.3.1-1
ii  r-cran-abind   1.4-3-2
ii  r-cran-car 2.1-2-1
ii  r-cran-effects 3.1.1-1
ii  r-cran-foreign 0.8.66-2
ii  r-cran-hmisc   3.17-4-2
ii  r-cran-lmtest  0.9.34-2
ii  r-cran-mgcv1.8-12-2
ii  r-cran-multcomp1.4-5-2
ii  r-cran-mvtnorm 1.0-5-2
ii  r-cran-rcmdrmisc   1.0-4-2
ii  r-cran-relimp  1.0-5-2
ii  r-cran-rgl 0.95.1441-2
ii  r-cran-sm  2.2-5.4-1
ii  r-cran-strucchange 1.5-1-2
ii  r-cran-tcltk2  1.2-11-1

r-cran-rcmdr recommends no packages.

Versions of packages r-cran-rcmdr suggests:
pn  r-cran-rodbc  

-- no debconf information



Bug#825495: gnunet: FTBFS: mv: cannot stat 't-vi.gmo': No such file or directory

2016-05-27 Thread Bertrand Marc
Hi,

Thanks for the report. It is not that clear from the log, but the build
failure is caused by an error of msgfmt, which comes from the
libunistring lack of transition (#825471 and friends).

This should be fixed in a few hours when libunistring is reverted to 0.9.3.

Best regards,
Bertrand



Bug#798780: release.debian.org: Please let playonlinux migrate to testing

2016-05-08 Thread Bertrand Marc
Hello Andreas,

Le 10/04/2016 13:52, Andreas Beckmann a écrit :
> On Sun, 21 Feb 2016 11:00:14 +0100 Bertrand Marc <beberk...@gmail.com>
> wrote:
>> Do you think we could find a solution to restore the dependency and let
>> playonlinux migrate to testing ?
> 
> What about
> 
> * split a playonlinux-data package from playonlinux containing
>   /usr/share/playonlinux/*
>   /usr/share/locale/*
>   mark as Multi-Arch: foreign
>   document in the description that a foreign architecture may be needed
>   to install playonlinux on amd64 (dpkg --add-architecture i386)
> 
> * make playonlinux arch:any
>   Depends: playonlinux-data (= ${source:Version})
> 
> * add Build-Depends: wine32 | wine32-development
>   (instead of enumerating the architectures in the playonlinux package)

Thank you for this idea. It seems to me it should work fine. But making
playonlinux arch:any would mean duplicate (dummy) packages.

Does this solution would be ok for the release team and do you think it
is the best one ?

Best regards,
Bertrand



Bug#803835: libextractor: diff for NMU version 1:1.3-3.1

2016-04-26 Thread Bertrand Marc
Hi Sebastian,

Le 25/04/2016 22:54, Sebastian Ramacher a écrit :
> Hi Bertrand
> 
> On 2016-04-25 22:40:47, Bertrand Marc wrote:
>> Hello,
>>
>> Thank you for your work. I also prepared a new version, with a patch
>> taken from upstream (attached). I should be able to prepare the package
>> tomorrow, but I will only upload it to mentors since I don't have
>> uploading rights.
>>
>> Please consider sponsoring my forthcoming upload.
> 
> Feel free to send me a link to the dsc once the package is ready.

I prepared a new revision of libextrator and uploaded it to mentors [1].
Could you please have a look ?

Thanks,
Bertrand

[1]
http://mentors.debian.net/debian/pool/main/libe/libextractor/libextractor_1.3-4.dsc




signature.asc
Description: OpenPGP digital signature


Bug#803835: libextractor: diff for NMU version 1:1.3-3.1

2016-04-25 Thread Bertrand Marc
Hello,

Thank you for your work. I also prepared a new version, with a patch
taken from upstream (attached). I should be able to prepare the package
tomorrow, but I will only upload it to mentors since I don't have
uploading rights.

Please consider sponsoring my forthcoming upload.

Regards,
Bertrand

Le 25/04/2016 19:40, Sebastian Ramacher a écrit :
> Control: tags 803835 + pending
> 
> Dear maintainer,
> 
> I've prepared an NMU for libextractor (versioned as 1:1.3-3.1) and
> uploaded it to DELAYED/2. Please feel free to tell me if I
> should delay it longer.
> 
> Regards.
> 

Description: update to new API in FFmpeg 2.9, fix FTBS
Origin: upstream
Applied-Upstream: commit: r35548:r35549 and r36975
--- a/src/plugins/thumbnailffmpeg_extractor.c
+++ b/src/plugins/thumbnailffmpeg_extractor.c
@@ -59,6 +59,20 @@
 #include 
 #endif
 
+#if USE_JPEG
+#ifdef PIX_FMT_YUVJ420P
+#define PIX_OUTPUT_FORMAT PIX_FMT_YUVJ420P
+#else
+#define PIX_OUTPUT_FORMAT AV_PIX_FMT_YUVJ420P
+#endif
+#else
+#ifdef PIX_FMT_RGB24
+#define PIX_OUTPUT_FORMAT PIX_FMT_RGB24
+#else
+#define PIX_OUTPUT_FORMAT AV_PIX_FMT_RGB24
+#endif
+#endif
+
 /**
  * Set to 1 to enable debug output.
  */ 
@@ -153,7 +167,7 @@
 static size_t 
 create_thumbnail (int src_width, int src_height, 
 		  int src_stride[],
-		  enum PixelFormat src_pixfmt, 
+		  enum AVPixelFormat src_pixfmt, 
 		  const uint8_t * const src_data[],
 		  int dst_width, int dst_height,
 		  uint8_t **output_data, 
@@ -189,7 +203,8 @@
   if (NULL == 
   (scaler_ctx =
sws_getContext (src_width, src_height, src_pixfmt,
-		   dst_width, dst_height, PIX_FMT_RGB24, 
+		   dst_width, dst_height,
+		   PIX_OUTPUT_FORMAT, 
 		   SWS_BILINEAR, NULL, NULL, NULL)))
 {
 #if DEBUG
@@ -199,7 +214,12 @@
   return 0;
 }
 
-  if (NULL == (dst_frame = avcodec_alloc_frame ()))
+#if LIBAVCODEC_VERSION_INT >= AV_VERSION_INT(55,28,1)
+  dst_frame = av_frame_alloc ();
+#else
+  dst_frame = avcodec_alloc_frame();
+#endif
+  if (NULL == dst_frame)
 {
 #if DEBUG
   fprintf (stderr,
@@ -209,18 +229,24 @@
   return 0;
 }
   if (NULL == (dst_buffer =
-	   av_malloc (avpicture_get_size (PIX_FMT_RGB24, dst_width, dst_height
+	   av_malloc (avpicture_get_size (PIX_OUTPUT_FORMAT,
+  dst_width, dst_height
 {
 #if DEBUG
   fprintf (stderr,
"Failed to allocate the destination image buffer\n");
 #endif
-  av_free (dst_frame);
+#if LIBAVCODEC_VERSION_INT >= AV_VERSION_INT(55,28,1)
+  av_frame_free (_frame);
+#else
+  avcodec_free_frame (_frame);
+#endif
   sws_freeContext (scaler_ctx);
   return 0;
 }
   avpicture_fill ((AVPicture *) dst_frame, dst_buffer,
-  PIX_FMT_RGB24, dst_width, dst_height);
+  PIX_OUTPUT_FORMAT,
+  dst_width, dst_height);
   sws_scale (scaler_ctx,
  src_data, 
  src_stride,
@@ -236,7 +262,11 @@
"Failed to allocate the encoder output buffer\n");
 #endif
   av_free (dst_buffer);
-  av_free (dst_frame);
+#if LIBAVCODEC_VERSION_INT >= AV_VERSION_INT(55,28,1)
+  av_frame_free (_frame);
+#else
+  avcodec_free_frame (_frame);
+#endif
   sws_freeContext (scaler_ctx);
   return 0;
 }
@@ -249,13 +279,17 @@
 #endif
   av_free (encoder_output_buffer);
   av_free (dst_buffer);
-  av_free (dst_frame);
+#if LIBAVCODEC_VERSION_INT >= AV_VERSION_INT(55,28,1)
+  av_frame_free (_frame);
+#else
+  avcodec_free_frame (_frame);
+#endif
   sws_freeContext (scaler_ctx);
   return 0;
 }
   encoder_codec_ctx->width = dst_width;
   encoder_codec_ctx->height = dst_height;
-  encoder_codec_ctx->pix_fmt = PIX_FMT_RGB24;
+  encoder_codec_ctx->pix_fmt = PIX_OUTPUT_FORMAT;
   opts = NULL;
   if (avcodec_open2 (encoder_codec_ctx, encoder_codec, ) < 0)
 {
@@ -263,10 +297,14 @@
   fprintf (stderr,
"Failed to open the encoder\n");
 #endif
-  av_free (encoder_codec_ctx);
+  avcodec_free_context (_codec_ctx);
   av_free (encoder_output_buffer);
   av_free (dst_buffer);
-  av_free (dst_frame);
+#if LIBAVCODEC_VERSION_INT >= AV_VERSION_INT(55,28,1)
+  av_frame_free (_frame);
+#else
+  avcodec_free_frame (_frame);
+#endif
   sws_freeContext  (scaler_ctx);
   return 0;
 }
@@ -295,9 +333,13 @@
 cleanup:
   av_dict_free ();
   avcodec_close (encoder_codec_ctx);
-  av_free (encoder_codec_ctx);
+  avcodec_free_context (_codec_ctx);
   av_free (dst_buffer);
-  av_free (dst_frame);
+#if LIBAVCODEC_VERSION_INT >= AV_VERSION_INT(55,28,1)
+  av_frame_free (_frame);
+#else
+  avcodec_free_frame (_frame);
+#endif
   sws_freeContext (scaler_ctx);
   *output_data = encoder_output_buffer;
 
@@ -406,18 +448,23 @@
   fprintf (stderr,
 	   "Failed to open image codec\n");
 #endif
-  av_free (codec_ctx);
+  avcodec_free_context (_ctx);
   return;
 }
   av_dict_free 

Bug#820548: Annual ping for Bertrand Marc

2016-04-09 Thread Bertrand Marc
Package: debian-maintainers
Severity: normal

This is my annual ping for 2016. Thank you for keeping my key in the
keyring !

Cheers,
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#798780: Processed: your mail

2016-04-09 Thread Bertrand Marc
Hi Adam,

Le 09/04/2016 17:54, Adam D. Barratt a écrit :
> It's customary to provide an explanation when re-opening bugs,
> particularly ones old enough to have been archived.
> 
> Regards,
> 
> Adam
> 

Sorry, I didn't know that.

In fact I thought I reopened this bug with my message the 21/02/2016. I
still think this is not fixed and I was hoping the release team would
help me find a way to make playonlinux depend on wine32|wine32-development.

Regards,
Bertrand



Bug#820329: playonlinux: FTBFS in sid: dh_install: Cannot find (any matches for) "plugins/TransgamingCedega*" and "plugins/Wine*"

2016-04-09 Thread Bertrand Marc
Le 09/04/2016 06:50, Denis Briand a écrit :
> tags 820329 patch
> thanks
> 
> Hello,
> Upstream did removed these two plugin and add another one.
> You should try this trivial patch.
> 
> Best regards
> 
> Denis Briand  

Thank you Denis. It was indeed quite simple. It is now uploaded to unstable.

Best regards,
Bertrand



Bug#807900: please elaborate

2016-04-09 Thread Bertrand Marc
Hi Shawn,

As Christian (libmicrohttpd upstream developper) wrote, there is no plan
to remove these symbols particularly soon, and not without a bump in
soname version.

Do you still consider this as a bug ? If yes, could you please elaborate
what you would like from libmicrohttpd ?

Cheers,
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#817186: Boobank reveals hidden password

2016-03-08 Thread Bertrand Marc
Package: weboob
version: 1.1-1
Severity: serious

Dear developper,

In the case you configure two backends with boobank, storing the login
but asking for the password (see attached configuration), boobank
reveals the second password.

when you call list, the display is messed up as both backends require a
password on the same line. To login with success, you need to enter the
first password (hidden), then validate, and enter the second password
(not hidden anymore).

Best regards,
Bertrand
[boursorama]
_module = boursorama
device = Boobank
pin_code = 
login = 
password = 
enable_twofactors = True

[banquepopulaire]
_module = banquepopulaire
website = www.ibps.loirelyonnais.banquepopulaire.fr
login = XX
password = 



signature.asc
Description: OpenPGP digital signature


Bug#798780: release.debian.org: Please let playonlinux migrate to testing

2016-02-21 Thread Bertrand Marc
Le 20/02/2016 22:53, Julien Cristau a écrit :
> Seems to be in testing now, closing.
> 
> Cheers,
> Julien

Hello Julien,

Indeed playonlinux migrated to testing, thanks to Markus Koschany who
"removed dependency on wine32|wine32-development again to ensure the
package can migrate to testing." in 4.2.9-2.

Ideally, this would only be temporary as playonlinux should really
depend on wine32|wine32-development.

Do you think we could find a solution to restore the dependency and let
playonlinux migrate to testing ?

Cheers,
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#811251: Crash when importing qif file

2016-01-17 Thread Bertrand Marc
Package: gnucash
Version: 1:2.6.10-1

Dear GNUcash maintainer,

GNUcash crashes when importing the qif file attached, with the following
in the console:

Found Finance::Quote version 1.38
Vector smash protection is enabled.
java version "1.7.0_91"
OpenJDK Runtime Environment (IcedTea 2.6.3) (7u91-2.6.3-1)
OpenJDK 64-Bit Server VM (build 24.91-b01, mixed mode)

;;; WARNING (gnc:make-report-anchor: e9cf815f79db44bcb637d0295093ae3d
No such option:  Display Use Stacked Lines)

;;; WARNING (gnc:make-report-anchor: faf410e8f8da481fbc09e4763da40bcc
No such option:  Display Use Stacked Lines)
Backtrace:
In ice-9/boot-9.scm:
 157: 8 [catch #t # ...]
In unknown file:
   ?: 7 [apply-smob/1 #]
In qif-dialog-utils.scm:
 553: 6 [qif-dialog:make-memo-display (#) # ...]
In srfi/srfi-1.scm:
 619: 5 [for-each # #]
 619: 4 [for-each # #]
 619: 3 [for-each # ...]
In qif-dialog-utils.scm:
 592: 2 [# #]
In unknown file:
   ?: 1 [gnc-numeric-positive-p "-1,174.21"]
In ice-9/boot-9.scm:
1381: 0 [#
"-1,174.21"]

ice-9/boot-9.scm:1381:15: In procedure #:
ice-9/boot-9.scm:1381:15: In procedure struct_vtable: Wrong type
argument in position 1 (expecting struct): "-1,174.21"


Best regards,
Bertrand


account.qif
Description: application/qw


Bug#811251: Crash when importing qif file

2016-01-17 Thread Bertrand Marc
Hi Dmitry,

Le 17/01/2016 10:14, Dmitry Smirnov a écrit :
> Hi Bertrand,
> 
> On Sun, 17 Jan 2016 09:52:58 AM Bertrand Marc wrote:
>> GNUcash crashes when importing the qif file attached
> 
> I believe this problem was fixed in GnuCash 1:2.6.11-1.
> Would you be able to confirm that please?
> 

It is indeed fixed with GnuCash 1:2.6.11-1.

Thanks !
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#783875: No multi-arch

2015-12-27 Thread Bertrand Marc
Le 24/12/2015 03:16, Jack Underwood a écrit :
> I don't believe that the fix here closes this bug...

Indeed. You are welcome to provide a patch fixing this.

Regards,
Bertrand



Bug#805013: gnunet: FTBFS on hurd-i386

2015-11-15 Thread Bertrand Marc
Hello,

Thank you for your work. I forwarded your patch upstream.

Regards,
Bertrand



Bug#803282: prepare for giflib5

2015-11-07 Thread Bertrand Marc
Hello,

Thank you for your work. This will be fixed in the next upload.

Regards,
Bertrand



Bug#803835: libextractor: FTBFS with FFmpeg 2.9

2015-11-07 Thread Bertrand Marc
Hello,

Thank you for your work. This will be fixed in the next upload.

Regards,
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#192008: dependencies from libtool and pkg-config files

2015-10-23 Thread Bertrand Marc
reassign 192008 lintian
thanks

Dear lintian developpers,

I think the script written by Michel Dänzer in 2004 (!) would make a
pretty good lintian check for -dev packages.

Would you consider integrate this into lintian ?

Regards,
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#744797: gnunet-gtk: gnunet-setup says to use "port 0" for inbound udp packets if behind NAT, does not allow this

2015-10-22 Thread Bertrand Marc
Hi,

The wording seems fixed in gnunet-gtk 0.10.1-1.

Regards,
Bertrand



Bug#768042: We still have transitional package "gnunet-server" as dependency.

2015-10-22 Thread Bertrand Marc
Le 21/10/2015 09:35, Oleksandr Gavenko a écrit :
> We still have transitional package "gnunet-server" as dependency.

Indeed. As indicated by the "pending" tag, this is fixed in the git
repository. But I didn't want to bother my sponsor for this.

Would you be willing to sponsor my upload ?





signature.asc
Description: OpenPGP digital signature


Bug#802133: There is no way to change the person page for DMs

2015-10-17 Thread Bertrand Marc
package: nm.debian.org

Dear developers,

I am a Debian Maintainer, and I'd like to enter the new member process.
Unfortunately, there is no way for me to add a short bio and an account
name on my nm.debian.org page [1], which was created when I became a DM.

I cannot register to the nm process [2] since my email address is
already registered ("person with this email address already exists").

I am able to login on nm.debian.org with my Alioth account, but this
does not allow me to change my informations since the alioth account is
not "merged" with my DM account.

Please provide a way to change this information so I can join the NM
process properly and start looking for advocates.

Regards,
Bertrand

[1] https://nm.debian.org/public/person/beberking%40gmail.com
[2] https://nm.debian.org/public/newnm



Bug#192008: dependencies from libtool and pkg-config files

2015-10-08 Thread Bertrand Marc
Hello,

I have to say I was a bit surprised not to find a way to generate
dependencies from pkg-config files.

Is this still (11 years later) unfit for debhelper ? If not, I think it
would make a very good lintian check. What do you think ? Should we
reassign this bug to lintian ?

Cheers,
Bertrand





signature.asc
Description: OpenPGP digital signature


Bug#617296: Please provide a way to exclude all third party code from build process

2015-09-27 Thread Bertrand Marc
Dear Rstudio developpers,

First of all, thank you for your great work on Rstudio.

I am trying to package rstudio for Debian (so it would be accessible for
all Debian/user easily). But to achieve this, I need to exclude every
third party from the build process, and force Rstudio to use system
libraries, jars and other external dependencies [1]. So far, I tweaked
src/cpp/session/CMakeLists.txt [2], but this is only the beginning. I
would need a way to keep your code and exclude third party code from
/home/bbk/linux/rstudio/src/cpp/session/resources or in src/gwt for
instance. And then I need to make sure Rstudio uses system dependencies.
I think the best way to achieve this would be (an) option(s) to pass at
configure time.

Would you be kind enough to help me and point me to right direction ? It
would be a great help !

Regards,
Bertrand

PS What is the preferred way to contact you ? Do you have some kind of
bug tracker ? I could not find one on github.

[1] https://wiki.debian.org/UpstreamGuide#No_inclusion_of_third_party_code
[2]
http://anonscm.debian.org/cgit/debian-science/packages/rstudio.git/commit/?id=adf3296b9c05757c56ac0f39b093a68a346b3afe



signature.asc
Description: OpenPGP digital signature


Bug#799215: libjs-reveal

2015-09-24 Thread Bertrand Marc
Hello,

Le 24/09/2015 08:18, Abhijith PA a écrit :
> I just want to know some more about the libjs-reveal. Why we want that
> to be packaged ? Its just download and use kind of thing.(download it in
> any directory and good to go).

I don't know about js libs, but usually this is very bad practice,
leading to security nightmare and a lot of headaches.

Upstream should not ship third party code and Debian packagers should
not use it in anyway. See [1].

> Do you maintain any packages. Are you a contributor/DM ?

Yes, why ? Do you know qa.debian.org ? See [2]

Bertrand

[1] https://wiki.debian.org/UpstreamGuide#No_inclusion_of_third_party_code
[2] https://qa.debian.org/developer.php?login=beberking%40gmail.com



signature.asc
Description: OpenPGP digital signature


Bug#617296: RFP: rstudio -- IDE for GNU R

2015-09-20 Thread Bertrand Marc
Hello Chen,

Thanks ! I just found out there was an other git repository [1]. We
should have a look and make sure there is no duplicate effort.

Regards,
Bertrand


[1] http://anonscm.debian.org/cgit/debian-science/packages/rstudio.git/



signature.asc
Description: OpenPGP digital signature


Bug#617296: RFP: rstudio -- IDE for GNU R

2015-09-19 Thread Bertrand Marc
Hi Chen,

I did not build a complete debian package. I only built rstudio from
source, using only debian packages as build-dependencies (listed in the
control file attached to my previous message).

I needed to tweak a file (see patch attached) to build it without
downloading external dependencies.

We still need to check the resources directory and find a way to make
rstudio use system librairies instead of downloading everything. This
should probably be asked upstream.

Good luck !
Bertrand

Le 19/09/2015 05:45, ChangZhuo Chen a écrit :
> Hi Bertrand,
> 
> Could you provide the full buildable source for rstudio? It will be very
> useful to make rstudio into Debian. You can upload it to mentor [0] or
> other source repository.
> 
> [0] https://mentors.debian.net/
> 

--- CMakeLists.txt	2015-09-12 00:51:17.0 +0200
+++ rstudio-0.99.682/src/cpp/session/CMakeLists.txt	2015-09-16 22:01:49.925022916 +0200
@@ -19,18 +19,6 @@
 
 # verify that install-dictionaries, install-mathjax, install-pandoc,
 # and install-rmarkdown have been run
-if(NOT EXISTS "${RSTUDIO_DEPENDENCIES_DIR}/common/dictionaries")
-  message(FATAL_ERROR "Dictionaries not found (re-run install-dependencies script to install)")
-endif()
-if(NOT EXISTS "${RSTUDIO_DEPENDENCIES_DIR}/common/mathjax-23")
-  message(FATAL_ERROR "Mathjax 2.3 not found (re-run install-dependencies script to install)")
-endif()
-if(NOT EXISTS "${RSTUDIO_DEPENDENCIES_DIR}/common/pandoc")
-  message(FATAL_ERROR "pandoc not found (re-run install-dependencies script to install)")
-endif()
-if(NOT EXISTS "${RSTUDIO_DEPENDENCIES_DIR}/common/rsconnect")
-  message(FATAL_ERROR "rsconnect package not found (re-run install-dependencies script to install)")
-endif()
 
 
 # verify libclang is installed
@@ -39,11 +27,11 @@
 else()
set(LIBCLANG_VERSION "3.5")
 endif()
-set(LIBCLANG_DIR "${RSTUDIO_DEPENDENCIES_DIR}/common/libclang/${LIBCLANG_VERSION}")
+set(LIBCLANG_DIR "/usr/lib/llvm-3.5/include/clang/")
 if(NOT EXISTS "${LIBCLANG_DIR}")
   message(FATAL_ERROR "libclang ${LIBCLANG_VERSION} not found  (re-run install-dependencies script to install)")
 endif()
-set(LIBCLANG_HEADERS_DIR "${RSTUDIO_DEPENDENCIES_DIR}/common/libclang/builtin-headers")
+set(LIBCLANG_HEADERS_DIR "/usr/lib/llvm-3.5/include/clang/")
 if(NOT EXISTS "${LIBCLANG_HEADERS_DIR}")
   message(FATAL_ERROR "libclang builtin-headers not found  (re-run install-dependencies script to install)")
 endif()
@@ -390,14 +378,6 @@
install(FILES ${R_MODULE_SRC_FILES}
DESTINATION ${RSTUDIO_INSTALL_SUPPORTING}/R/modules)
 
-   # install hunspell dictionaries
-   install(DIRECTORY "${RSTUDIO_DEPENDENCIES_DIR}/common/dictionaries"
-   DESTINATION "${RSTUDIO_INSTALL_SUPPORTING}/resources")
-
-   # install mathjax for local html preview
-   install(DIRECTORY "${RSTUDIO_DEPENDENCIES_DIR}/common/mathjax-23"
-   DESTINATION "${RSTUDIO_INSTALL_SUPPORTING}/resources")
-
# install pandoc
if(RSTUDIO_PACKAGE_BUILD_SLES)
   # when producing a SUSE Linux Enterpise build, we want to install the 
@@ -415,10 +395,6 @@
install(FILES ${RSCONNECT_PACKAGE}
DESTINATION ${RSTUDIO_INSTALL_SUPPORTING}/R/packages)
 
-   # install PDF.js
-   install(DIRECTORY "resources/pdfjs"
-   DESTINATION ${RSTUDIO_INSTALL_SUPPORTING}/resources)
-
# install DataTables
install(DIRECTORY "resources/grid"
DESTINATION ${RSTUDIO_INSTALL_SUPPORTING}/resources)
@@ -427,24 +403,6 @@
install(DIRECTORY "resources/help_resources"
DESTINATION ${RSTUDIO_INSTALL_SUPPORTING}/resources)
 
-   # install libclang
-   if(WIN32)
-  file(GLOB LIBCLANG_32_FILES "${LIBCLANG_DIR}/x86/libclang.*")
-  install(PROGRAMS ${LIBCLANG_32_FILES}
-  DESTINATION  ${RSTUDIO_INSTALL_BIN}/rsclang/x86)
-  file(GLOB LIBCLANG_64_FILES "${LIBCLANG_DIR}/x86_64/libclang.*")
-  install(PROGRAMS ${LIBCLANG_64_FILES}
-  DESTINATION  ${RSTUDIO_INSTALL_BIN}/rsclang/x86_64)
-   else()
-  file(GLOB_RECURSE LIBCLANG_FILES "${LIBCLANG_DIR}/libclang.*")
-  install(PROGRAMS ${LIBCLANG_FILES}
-  DESTINATION  ${RSTUDIO_INSTALL_BIN}/rsclang)
-   endif()
-
-   # install libclang builtin-headers
-   install(DIRECTORY "${RSTUDIO_DEPENDENCIES_DIR}/common/libclang/builtin-headers"
-   DESTINATION "${RSTUDIO_INSTALL_SUPPORTING}/resources/libclang")
-
# install 64 bit binaries if we are on win64
if(WIN32)
   if(NOT ("$ENV{PROGRAMW6432}" STREQUAL ""))


signature.asc
Description: OpenPGP digital signature


Bug#799213: RFP: libjs-jquery-datatables - Table plug-in for jQuery

2015-09-16 Thread Bertrand Marc
Package: wnpp
Severity: wishlist
X-Debbugs-CC: debian-j...@lists.debian.org

* Package name : libjs-jquery-datatables
Version : 1.10.9
Upstream Author : SpryMedia Ltd
* URL : http://datatables.net/
* License : MIT
Description : DataTables is a plug-in for the jQuery Javascript library.
It is a highly flexible tool, based upon the foundations of progressive
enhancement, and will add advanced interaction controls to any HTML table.

There is at least one package waiting for libjs-jquery-datatables to
enter Debian: rstudio.



Bug#799215: RFP: libjs-reveal - HTML Presentation Framework

2015-09-16 Thread Bertrand Marc
Package: wnpp
Severity: wishlist
X-Debbugs-CC: debian-j...@lists.debian.org

* Package name : libjs-reveal
Version : 3.1.0
Upstream Author : Hakim El Hattab
* URL : http://lab.hakim.se/reveal-js/
* License : MIT
A framework for easily creating beautiful presentations using HTML.

reveal.js comes with a broad range of features including nested slides,
Markdown contents, PDF export, speaker notes and a JavaScript API. It's
best viewed in a modern browser but fallbacks are available to make sure
your presentation can still be viewed elsewhere.

There is at least one package waiting for libjs-reveal to
enter Debian: rstudio.



Bug#798856: RFP: gwt - Google Web Toolkit

2015-09-13 Thread Bertrand Marc
Package: wnpp
Severity: wishlist
X-Debbugs-CC: g...@packages.debian.org, debian-j...@lists.debian.org

* Package name : gwt
Version : 2.7.0
Upstream Author : GWT Open Source Project
* URL : www.gwtproject.org/
* License : Apache 2.0
Description : GWT is a development toolkit for building and optimizing
complex browser-based applications. Its goal is to enable productive
development of high-performance web applications without the developer
having to be an expert in browser quirks, XMLHttpRequest, and JavaScript.

GWT used to be part of Debian but got removed from the archive because
of security issues, see [1]. New versions were released since then, and
should have fixed these issues.

There are at least two packages waiting for GWT to enter Debian: rstudio
and guerrit.

[1] https://bugs.debian.org/718911



Bug#617296: RFP: rstudio -- IDE for GNU R

2015-09-13 Thread Bertrand Marc
Hi,

I tried to start from scratch, and was able to build rstudio without
downloading any additional resources. It still needs GWT to run though,
and a way to configure every path to system libraries, dictionaries...

You'll find attached a minimal control file to list the debian
build-deps (and use mk-build-deps). You could configure it with
cmake .. -DCMAKE_BUILD_TYPE=Release -DQT_QMAKE_EXECUTABLE=qmake
-DCMAKE_INSTALL_PREFIX=/usr/lib/

And you need to tweak src/cpp/session/CMakeLists.txt to remove
dependency checking and install.

Regards,
Bertrand

Source: rstudio
Section: gnu-r
Priority: optional
Maintainer: Bertrand Marc <beberk...@gmail.com>
Build-Depends: debhelper (>= 9), build-essential, pkg-config, fakeroot, cmake,
 uuid-dev, libssl-dev, libbz2-dev, zlib1g-dev, libpam-dev, libxslt1-dev,
 libapparmor1, apparmor-utils, libboost-all-dev (>=1.50), libpango1.0-dev,
 unzip, qt-sdk, qtbase5-dev, libqt5webkit5-dev, qtpositioning5-dev,
 libqt5sensors5-dev, libqt5svg5-dev, libqt5xmlpatterns5-dev,
 libjs-mathjax, libclang-dev, pandoc, hunspell-dictionnaries
Standards-Version: 3.9.6



Bug#798780: release.debian.org: Please let playonlinux migrate to testing

2015-09-12 Thread Bertrand Marc
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: britney

Dear release developpers,

Playonlinux is a arch:all package (it is written in python and bash)
which depends on the 32 bits version of wine. Therefore I
added a dependency on wine32|wine32-development, but it seems the
package will not migrate to testing, because wine32 is not available
on amd64.

There does not seem to be a simple solution to let playonlinux migrate
to testing, and Wookey [1] suggested that this migration would require
some manual work.

Could you please let playonlinux migrate to testing or point me into the
right direction ?

Regards,
Bertrand

[1] https://lists.debian.org/debian-release/2015/08/msg00526.html



Bug#797154: libmicrohttpd: Please run tests during package build

2015-09-05 Thread Bertrand Marc
Hello,

Thank you for this patch, it will be included in the next release of
libmicrohttpd.

Regards,
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#797157: libmicrohttpd: Add autopkgtest

2015-09-05 Thread Bertrand Marc
Hello,

Thank you for this patch, it will be included in the next release of
libmicrohttpd.

Regards,
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#779259: Fwd: Re: Bug#779259: gnunet: Bug in gnunet.postinst causes gnunet to remain unconfigured by dpkg

2015-08-14 Thread Bertrand Marc
Transferring the last message from the reporter.

 Message transféré 
Sujet : Re: Bug#779259: gnunet: Bug in gnunet.postinst causes gnunet to
remain unconfigured by dpkg
Date : Mon, 30 Mar 2015 15:07:32 +0100
De : Guy Heatley g...@member.fsf.org
Pour : Bertrand Marc beberk...@gmail.com

On 29/03/2015 12:16, Bertrand Marc wrote:
Hi Bertrand,

 Could you send me your version of /etc/gnunet.conf (at the bottom of
 your message, it is written if was changed)

This may have changed since installation. I have certainly added the
Postgres section.

[dhtcache]
QUOTA = 128000

[ats]
WAN_QUOTA_IN = 12000
WAN_QUOTA_OUT = 12000

[hostlist]
OPTIONS = -b -e
SERVERS = http://v10.gnunet.org/hostlist [^]

[PATHS]
DEFAULTCONFIG = /etc/gnunet.conf

[arm]
SYSTEM_ONLY = YES
USER_ONLY = NO

[nat]
BEHIND_NAT = YES
PUNCHED_NAT = YES
EXTERNAL_ADDRESS = XX.YY.ZZ.AA

[datastore]
DATABASE = postgres

[datastore-mysql]
CONFIG = /root/~/.my.cnf

[path]
GNUNET_HOME = /var/lib/gnunet/
GNUNET_DATA_HOME = /var/lib/gnunet/data/
GNUNET_RUNTIME_DIR = /var/run/gnunet/

 and the output of:
 grep GNUNET_HOME /etc/gnunet.conf | tr -d [:blank:]


This worked fine in bash and sh, but it's worth noting I needed to add
single quotes for zsh to accept this:

% grep GNUNET_HOME /etc/gnunet.conf | tr -d [:blank:]
zsh: no matches found: [:blank:]
zsh: done   grep GNUNET_HOME /etc/gnunet.conf |
zsh: exit 1 tr -d [:blank:]


% grep GNUNET_HOME /etc/gnunet.conf | tr -d '[:blank:]'
GNUNET_HOME=/var/lib/gnunet/

Cheers!



Bug#781957: Please add Bertrand Marc as a Debian Maintainer

2015-04-05 Thread Bertrand Marc
Package: debian-maintainers
Severity: normal

Dear Maintainer,

Please add Bertrand Marc to the keyring.
The jetring changeset is attached.

Best regards,
Bertrand Marc
Comment: Add Bertrand Marc beberk...@gmail.com as a Debian Maintainer
Date: Sun, 05 Apr 2015 17:00:59 +0200
Action: import
Recommended-By: 
  Holger Levsen hol...@layer-acht.org
Agreement: 
  http://lists.debian.org/debian-newmaint/2015/03/msg00017.html
Advocates: 
  http://lists.debian.org/debian-newmaint/2015/03/msg00019.html
Data: 
  -BEGIN PGP PUBLIC KEY BLOCK-
  Version: GnuPG v1
  
  mQINBFCr9n8BEACyc5/QHWPIVwscqsn5BW0l8y4OwMV1IJEa6IdTlGFb0WHvP5wF
  M0w+e/PyEfbREXCNqJdOoAsdoY5WtjgWF8QuKsD03LIQ28mhrU1e7PJf3D9aGAnP
  CL/cMyvEjnVVYO1pONuBLxzv46KpwV21u/QIh9oJhuUdYizdFbdPN62wBfiy77eP
  3x342kmNynM+xOlWtnKdFbWuNVNGKoRFO4TtaqN2ElpFwKwjzbwx60hJLtUcqHEK
  MSKQIaKunSBQZJSCX0MD/XoKd1lcfGHprIFYBCW6sES3oiaPr6U5tc0QnKyTXMwa
  X1XBd5Osq02VIlT5Mwi1RpKRtNsStGUS4Q7b8TaxGeakHZacoD/4ZZO5bk1qS6PT
  Aq6b7ivJJCde5A9zVgHqRmW+82xpq6OYoopGST3h8sxNlCaCFzJ0/Q++dHM9HAue
  EqXYGoIVydzKXAMT3h2UiRdJYrtheBremT9mAUcEhIMToZ/bQ80DFxNqg7S1jovc
  L6deEB62mVXq31SWhTD1U1fY4rfSEL3ThT9h6kBZZ6NV1SGB4jbOUlevB6rYVI0b
  ozG9axr+u+R6HVPVSDpRlCp57p2xkXPIfnvDr9IM92SpMU1K5KuJCPP4phX1A7lV
  serbU3nyjupRv3KkWN3EDVOy+f+fWHASiTpjPRJnf/IuawVTKLlt6Qli6QARAQAB
  tCNCZXJ0cmFuZCBNYXJjIDxiZWJlcmtpbmdAZ21haWwuY29tPokCNwQTAQgAIQUC
  UKv2fwIbAwULCQgHAwUVCgkICwUWAgMBAAIeAQIXgAAKCRCgSrO62+Jj7iPwD/9u
  vtQq0rPQh9stYKZPKpdH3OV0vw8H3JGNIs/ZhZKl4qd1Has4n3DW57BUd+8964wZ
  azg2hNLiVoLWjpijmo4lZwxdvbH+dy+prEIveUOEADoQYoVROSk4h9Sp+4yHPGI1
  zR4ehu+zeDsWOAY2T3gi6pa4RfWSXXKvUjOkwRNQ64xPuOhvbqCSHzz1NY84bHon
  AtGVeiPP0AduYpm+MqgE0REYyW6Fecnwf6E+jx6e6fayiJcrlbFKWiaRHT13v3jd
  m7qovy6ZTQf/cFiRDBtqQbmhMnigfslsmjWxrh1X5ozD21fqtzv4MGpdssqlVkmy
  P5fZok7XFApvhr2SxltnDrw+CZ8LIeE24X/de78KEuCMQuyvLBC3K1oTrw0w3ALU
  M0YY5O3L4EbcL9ksU8o5NfTYqWWZYRgXVIFIhNtskzpKpHIhPbfI01pM5Yjp8r8d
  YBxWnFY8qK5hNlw1YSGORJGPc2LKJ7/tr0GiwnCdf4mpNeb53nIain7MwjWBz3SV
  2cNBr6WqiMROVxBNA17GXuw42wlUyhUq5CF17S9pZubgnYTjvYBYMzTiemglZ5o+
  coSlziB1HdwDp6r6Q9CtkexIoH93u75Fing74KTSkm7kUv4gYHdw1o9xgeib2ZMB
  ubdT4Jo2mSCboAQ3bGggVVwfG8QOBRdAMYn8vR6AcokBHAQQAQIABgUCULIzAgAK
  CRADeeXW8b8B9FnbB/9pYEfuxIjTROc5PZ8BWpph6+/JCmSwTm2zo/yJbI69PJHD
  QwfFkHm3edTMOBwu2clrzJJpn0OS0iZDDiOob2Uj4rkfaBE2XbFmIL+0ytrY6t3P
  YQ5jylPzOioIlD2O3Ljb5a4v63zhAs2HxPr1+Pa6xtj2jS3xjcGPPxONuzH91que
  vGbExkdwAZCYi3gbLoLhLOavNAwO6CA0ano1tOrUh/7M5j5xPYsx4dr+l2T3h7W0
  PO8K7T0zEmOaMWgndPHI/2jlELdkh/3ZrGMtcFgP7FlQBcQgUP6CjLf3s9T3aiTH
  y9ds36Dv/qkhG3m7GbFZUn/3UFIO80Xk65J0YF+LiQIcBBABAgAGBQJQsjIaAAoJ
  EAVcSzX+arIQAIWZzJ3KKvNbs5EXmr9IvyoTJIXh5cr2uKdz0jeOAo3R1Y1X
  91YIKKfbuwM7V8ufFUch9rXXZAo074LzVFoHCHptoIYXls+fEZqrB5Agp4pG3CWg
  iGsAwoNz+cZNPH6DFHI2DktAugDMQAHF9DSjRfGf7MP/tH3e1WOxb4WY+SSI7T9a
  aI2UNvN/ty/fNmu0s5AGTilldR95a+SQZFauI24wsqO4Iyb5X4Osylv5gHraQpGL
  yUFGjhSkKLs/3z4Q6GhtPGCM4Doo7iHj90KWSq1UnHihtSgabsumW23n2TRZY4dd
  p4S30qvSY2pgZWxTU1Xq4739iXEiC8NCx537a6QuH4vtLhsbVraYeuGZF+SmHFLC
  +SNo3WWkiRU+mPfH3fzMEnJxLjVQdvhjM/R1YAByt1HCyyUHgIdcYhuHQCZHDL1Z
  TLsDKE2kYx70PkEhBQFmy4in8RbVRyP5IFOPE/RTiZp7PUs8VMPycvVf+QMZGOkd
  m7cu7BWbA7h5Ma8fT0x/0cxv18wvnND7CkWnVzhuTMos53XDIFamyq9SJDpN3UEC
  ZAgD9D3R18Ny+PpkrtLoUu3SLTXRpHv9n9ybGIfl1v4YZRNl5c9d9B7vfwdrXaPs
  b4idNGEk/D7s8PM18mPPQhGjeq9uD8t+JY3PRwCwJsYQiSN+/AJPyfTCf0hxiQIc
  BBABAgAGBQJQsjakAAoJEJWkL+g1NSX53+wP/jpEdvEsPKhhsTRtUxGEi/lm57uv
  lmZ3sn36ST6roxb71vqaJ/l+wvg5hsSi5IWjBuCsPqoRgvds7Mygb6/m9r7y4a4z
  zn2XcHUIefzl4blcikutQijnxJF55fpDERulLrZRCZrZXelFnXqLZhPG6EAmU+63
  ObHwRM7WMN4AR5iCtZdlbvw90sLfWHYf2veNks/mADcsT2+IOUSyICzG6ct/eGGh
  jf5cC3lPq/N+CAMLgQPq2DUX4vQyWvBx+vCSKevbfTf9/yFHzd+6VlxnkP9Ape6M
  jgisI1lIzU4v1oq326CO/rQOQ9xTwMbu7jhEO3LVjuJ54G4LGcHiq/k4Tl0kmjtm
  wu13WeSSPlSeYbwwI7b7eeOAPRArN9XRnoBakldhxD+M3TXs8NdpgU480pEwZxRr
  XPnebqgCBHwj707s3snyIPiEbbRUkooDd6BAqfxiBChP3UVNapvjGfGyzbRUYxMF
  8BdAw6c8m0+lfO8g5zhKMUXnOKXwOyMXyU+EyaPK/CRQP6aWzHztmKvPS9ZkXzIs
  FMlIuNO0NZtIU24H/Zzb3iee1nTNsOaRzvnmAaj8ETlgJh3dBPEcJxKu+gcPxr+D
  98x+de5qVKU0MFYq14OnGLK+7j75veQbfBfyi9eb1rNd2LIYhEuESoRYJJqerW6L
  sDt9nhScfGVEeIvaiEYEEBECAAYFAlCyNrwACgkQKFvXofIqeU4CGACfdbtD2T4T
  AU14VPJboah/07g5yWYAoI2TXQVJE0HN7Y1d6PH76hlmlDbIiEYEEBECAAYFAlCy
  WCwACgkQ0yQ2guvROZ0oTgCeLeYnk7Iif7txcDqL53iO9EICO+QAoIbqp625PgPb
  4rMGMA6ZeHd9OpvgiQIcBBABAgAGBQJQsmlnAAoJEOY0VNOn/l3W6YUP/AmUBYYu
  CjcxB+iLT8dFtgCoLLyWZIeSPcz1J0a+cXCNCbVWbqImUOAcdeCwWAwwDjfURzmM
  /e6y9ftrdj0ImwG97KsvAYAsmzxPqCmm3ZqNvrzouX75pS3UVSiqCg2Viy2TF7MW
  vbbiEjzra8F0ktfhXh897FDkFQY9edvJDUMF8ZyhwsQHqPeWTiTW+j5ADPc797JN
  5+3lzsXCxwxFxx4+5CVKy/1fjVUevlI8i/TMzLcf1NMsZHtzYZx8n73uQGXCLtV6
  alAxYCuRscibO+01x4ZdvdWaH0XhO2p1YQfta6XLF8PH94o3iJq5RhF7fe3sLQm4
  igWMm8UHmFS/tgaT/Cc3hXvpcNWkUE4NNVg+CQWiY6infPXQGjyzLcGrnqbNw5MF
  63YTmLoOzMMHi5E6Iqm51WAyZpQJigD4g0w+z2izFCZeWZughmooyCv0Yv2EhZFL
  DFgJPwDYWIxZ4iOA7dZGrPN1ofQSAIWSFlONu2MtNHyKg+GEdMsfVS6cYKKCfUHI
  eatbIr8CrqVv9Ivxp1ofFZK1a6aj9y5uWHQBm3PDOjDlhoGkjGZ5TI86ZQoUVda7
  EezMXRKv1Yblj5VVbQe4z068G2PEifmgRHaSUPmsTTpjCymQSqADPJkfoB0tt6Ux

Bug#779259: gnunet: Bug in gnunet.postinst causes gnunet to remain unconfigured by dpkg

2015-03-29 Thread Bertrand Marc
Dear user,

Thank you for submitting this bug. I will need more info to understand
the issue.

The line 26 is indeed about setting the value of GNUNET_HOME based on
the conf file settings, in case you changed it.

Could you send me your version of /etc/gnunet.conf (at the bottom of
your message, it is written if was changed) and the output of:

grep GNUNET_HOME /etc/gnunet.conf | tr -d [:blank:]

Thank you for your help,
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#780538: extract: PDF extracting gives no data

2015-03-29 Thread Bertrand Marc
Dear user,

PDF support was removed from libextractor a few years ago, when the
licence changed to GPLv3:
https://gnunet.org/svn/Extractor/NEWS

Cheers,
Bertrand


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#772233: bashism in /bin/sh script

2014-12-29 Thread Bertrand Marc
Hi Balint,

Le 20/12/2014 10:49, Bálint Réczey a écrit :
 2014-12-20 10:30 GMT+01:00 Bálint Réczey bal...@balintreczey.hu:
 I made a typo in the bug number, please see the fixed patch attached.
 I also reuploaded the package to DELAYED/2.
Thanks a lot for uploading this fix, I was unable to take care of this
in the last month.

Cheers,
Bertrand


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#767105: gnunet: user unable to access

2014-11-01 Thread Bertrand Marc
Hello,

Please provide more information about the tons of errors.

You only to install, and as stated on
https://gnunet.org/content/generic-installation-instructions, you need
to add the lines below to ~/.config/gnunet.conf and launch as user

$gnunet-arm -c ~/.config/gnunet.conf -s

[arm]
SYSTEM_ONLY = NO
USER_ONLY = YES
DEFAULTSERVICES = gns


Le 28/10/2014 15:11, kfreebsd a écrit :
 Package: gnunet
 Version: 0.10.1-2
 Severity: normal
 
 Dear Maintainer,
 *** Please consider answering these questions, where appropriate ***
 the service is running but a user can not access anything. I added my user 
 account  to gnunet but, gunnet-gtk connects to to nothing, as a user, it 
 connects as root. I have a user config file setup the way the gnunet web site 
 says, but when I run gnunet-arm -c ~/.config/gnunet.conf -s
 it spits out a ton of errors about permissions, the debian read me file give 
 zero help 
 https://gnunet.org/content/generic-installation-instructions
 I used the config part here, I assume I didnt need to install anything.
 
  
 
 *** End of the template - remove these lines ***
 
 
 -- System Information:
 Debian Release: 7.7
   APT prefers stable-updates
   APT policy: (500, 'stable-updates'), (500, 'unstable'), (500, 'testing'), 
 (500, 'stable')
 Architecture: amd64 (x86_64)
 
 Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
 Shell: /bin/sh linked to /bin/dash
 
 Versions of packages gnunet depends on:
 ii  adduser3.113+nmu3
 ii  debconf [debconf-2.0]  1.5.49
 ii  libc6  2.19-12
 ii  libcurl3-gnutls7.26.0-1+wheezy10
 ii  libextractor3  1:1.3-2+b1
 ii  libgcrypt201.6.2-4
 ii  libglpk36  4.55-1
 ii  libgnutls-deb0-28  3.3.8-3
 ii  libidn11   1.25-2
 ii  libltdl7   2.4.2-1.1
 ii  libmicrohttpd100.9.37+dfsg-1+b1
 ii  libmysqlclient18   5.5.40-0+wheezy1
 ii  libogg01.3.0-4
 ii  libopus0   1.1-2
 ii  libpq5 9.4~beta3-3
 ii  libpulse0  2.0-6.1
 ii  libsqlite3-0   3.7.13-1+deb7u1
 ii  libunistring0  0.9.3-5.2
 ii  lsb-base   4.1+Debian8+deb7u1
 ii  multiarch-support  2.13-38+deb7u6
 ii  netbase5.0
 ii  zlib1g 1:1.2.7.dfsg-13
 
 Versions of packages gnunet recommends:
 ii  libnss3-tools  2:3.17.2-1
 ii  openssl1.0.1e-2+deb7u13
 
 Versions of packages gnunet suggests:
 ii  miniupnpc1.9.20140610-2
 ii  python   2.7.3-4+deb7u1
 ii  python-zbar  0.10+doc-10
 ii  texlive  2014.20141024-1
 
 -- Configuration Files:
 /etc/gnunet.conf changed:
 [arm]
 SYSTEM_ONLY = YES
 USER_ONLY = NO
 [PATHS]
 DEFAULTCONFIG = /etc/gnunet.conf
 [datastore-mysql]
 CONFIG = /home/tester/~/.my.cnf
 [nat]
 BEHIND_NAT = YES
 ENABLE_UPNP = YES
 USE_LOCALADDR = NO
 DISABLEV6 = YES
 EXTERNAL_ADDRESS = 24.15.20.227
 INTERNAL_ADDRESS = 192.168.1.137
 [hostlist]
 OPTIONS = -b -e
 [path]
 GNUNET_HOME = /var/lib/gnunet/
 GNUNET_DATA_HOME = /var/lib/gnunet/data/
 GNUNET_RUNTIME_DIR = /var/run/gnunet/
 
 
 -- debconf information:
   gnunet-server/groupname: gnunet
   gnunet-server/autostart: true
   gnunet-server/username: gnunet
 


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#766807: gnunet-gtk: @wheezy:~$ gnunet-gtk

2014-10-26 Thread Bertrand Marc
Please don't open new bugs.

Please start providing information, I cannot reproduce this issue. Could
you confirm the bug on a fresh installation of jessie or sid ?

Thanks


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#758183: Autologin no longer works

2014-10-18 Thread Bertrand Marc
I can confirm this bug too. It would be a shame if the autologin feature
(which is available upstream) was missing in the next stable release.

Could you please fix this bug before the release of jessie ?

Regards,
Bertrand


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#765293: gnunet: FTBFS on kfreebsd-*: error: malloc_np.h: No such file or directory

2014-10-15 Thread Bertrand Marc
Le 14/10/2014 23:17, Steven Chamberlain a écrit :
 Yes it does build fine with those lines removed.  (build log attached)

Thanks a lot ! I have just uploaded a new revision to mentors, this
should be fixed in a couple of days.

Regards,
Bertrand




signature.asc
Description: OpenPGP digital signature


Bug#765293: gnunet: FTBFS on kfreebsd-*: error: malloc_np.h: No such file or directory

2014-10-14 Thread Bertrand Marc
Hi,

Thanks for the report. I prepared a patch (attached) but I have no way
to test it. Could somebody with access to a kfreebsd box test it to make
sure there are no other issues ?

Thanks,
Bertrand

Description: fix FTBS on kfreebsd by checking properly the existence of malloc_np.h
Author: Bertrand Marc beberk...@gmail.com
--- a/configure.ac
+++ b/configure.ac
@@ -635,7 +635,7 @@
 
 
 # Checks for headers that are only required on some systems or opional (and where we do NOT abort if they are not there)
-AC_CHECK_HEADERS([malloc.h malloc/malloc.h langinfo.h sys/param.h sys/mount.h sys/statvfs.h sys/select.h sockLib.h sys/mman.h sys/msg.h sys/vfs.h arpa/inet.h fcntl.h libintl.h netdb.h netinet/in.h netinet/in_systm.h netinet/ip.h sys/ioctl.h sys/socket.h sys/time.h unistd.h kstat.h sys/sysinfo.h kvm.h sys/file.h sys/resource.h ifaddrs.h mach/mach.h stddef.h sys/timeb.h terminos.h argz.h ucred.h sys/ucred.h endian.h sys/endian.h execinfo.h])
+AC_CHECK_HEADERS([malloc.h malloc/malloc.h malloc_np.h langinfo.h sys/param.h sys/mount.h sys/statvfs.h sys/select.h sockLib.h sys/mman.h sys/msg.h sys/vfs.h arpa/inet.h fcntl.h libintl.h netdb.h netinet/in.h netinet/in_systm.h netinet/ip.h sys/ioctl.h sys/socket.h sys/time.h unistd.h kstat.h sys/sysinfo.h kvm.h sys/file.h sys/resource.h ifaddrs.h mach/mach.h stddef.h sys/timeb.h terminos.h argz.h ucred.h sys/ucred.h endian.h sys/endian.h execinfo.h])
 
 SAVE_LDFLAGS=$LDFLAGS
 SAVE_CPPFLAGS=$CPPFLAGS
--- a/src/util/common_allocation.c
+++ b/src/util/common_allocation.c
@@ -197,7 +197,7 @@
 #if WINDOWS
 #define M_SIZE(p) _msize (p)
 #endif
-#ifdef FREEBSD
+#if HAVE_MALLOC_NP_H
 #include malloc_np.h
 #endif
 #if HAVE_MALLOC_USABLE_SIZE


signature.asc
Description: OpenPGP digital signature


Bug#765293: gnunet: FTBFS on kfreebsd-*: error: malloc_np.h: No such file or directory

2014-10-14 Thread Bertrand Marc
Hi Steven,

Thanks for testing the patch on kfreebsd, it is a great help.

Le 14/10/2014 22:22, Steven Chamberlain a écrit :
 Does that mean new libraries/functionality are being built now that
 wasn't working before?

You are right: these functionalities were not built before on kfreebsd.

Do you think you could try to build gnunet without the lines in
debian/rules ? It would be great if I could make sure the next upload
will build fine.

Regards,
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#765002: gnunet-service-arm is rapidly filling /var/log/gnunetd/gnunetd.log

2014-10-13 Thread Bertrand Marc
You have to define properly GNUNET_HOME in /etc/gnunet.conf. By default
when you install the gnunet package, it should be /var/lib/gnunet/.

Please confirm that a clean installation of gnunet 0.10.1-1 defines
properly GNUNET_HOME and fixes the issue.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#765038: gnunet-gtk: error while loading shared libraries: libgladeui-2.so.4: cannot open shared object file: No such file or directory

2014-10-13 Thread Bertrand Marc
What version of gnunet-gtk do you use ? What command did you launch to
get this error ?

gnunet-gtk uses libgladeui 2.6 since version 0.9.5.

Thanks


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



  1   2   3   >