Bug#916091: ITP: python3-stringcase -- Python library to Convert string cases between camel case, pascal case, snake case etc…
Package: wnpp Severity: wishlist Owner: Jade McCormick * Package name: python3-stringcase Version : 1.2.0 Upstream Author : Taka Okunishi (https://github.com/okunishinishi) * URL : https://pypi.org/project/stringcase/ * License : MIT Programming Lang: Python Description : Python library to Convert string cases between camel case, pascal case, snake case etc... This python library provides many methods to convert between various case forms (camel case, pascal case, etc) and is useful to provide consistency in casing - fewer bugs, etc. I use this package for casing system names (i_am_a_name) for web applications (I am a name). I need a sponsor for this package.
Bug#914514: atop: should use logrotate for log rotation
Package: atop Version: 2.3.0-1+b1 Severity: normal Dear Maintainer, In managing my log directory and customize logrotate, I discovered limitations in the way atop handles log files (which are different from text files since they are process accounting files,, to my understanding). Can this package use logrotate like other debian packages? It's confusing, and then to discover that /usr/share/atop/atop.daily is executed from a shell script in the background, made me think that atop log handling could be greatly improved. There are other bugs related to log file handling: #877148 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877148 I had to directly modify the /usr/share/atop/atop.daily to achieve my temporary goal (accumulate more logfiles) -- System Information: Debian Release: buster/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 4.18.0-2-amd64 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: SELinux: enabled - Mode: Enforcing - Policy name: default Versions of packages atop depends on: ii libc62.27-8 ii libncurses6 6.1+20181013-1 ii libtinfo66.1+20181013-1 ii lsb-base 9.20170808 ii zlib1g 1:1.2.11.dfsg-1 Versions of packages atop recommends: ii cron [cron-daemon] 3.0pl1-130 atop suggests no packages. -- no debconf information
Bug#898184: still an issue
I experience this on an up-to-date buster and it causes problems because I run SELinux, and collectd does not have permission to use the dac_override capability. I can confirm that the latest master of rrdtool built against collectd fixes this problem. or, vice versa, collectd against the lat thanks
Bug#914057: python3-debianbts: debianbts.get_bugs does not support the use of HTTP and HTTPS proxy servers
Package: python3-debianbts Version: 2.7.2 Severity: important Dear Maintainer, This bug is related to bug #717563 in reportbug package. Message #59 on that bug shows the following code (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717563#msg59): > bugs = debianbts.get_bugs(pkg_filter, package) There is no opportunity to pass proxy information, which reportbug supports via commandline option --proxy (aliased to --http_proxy) to the SoapClient instantiated by debianbts. get_bugs, and other methods, should support a dict similar to that constructed by reportbug and used by urllib2 (underlying reportbug) or some other method of setting proxy information. I am happy to implement whatever changes are considered appropriate for this bug and #717563. -- System Information: Debian Release: buster/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 4.18.0-2-amd64 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: SELinux: enabled - Mode: Enforcing - Policy name: default Versions of packages python3-debianbts depends on: ii python3 3.6.7-1 ii python3-pysimplesoap 1.16-2.1 python3-debianbts recommends no packages. python3-debianbts suggests no packages. -- no debconf information
Bug#770128: (no subject)
Agreed, and further I am having trouble with reportbug and SElinux, which makes reporting bugs impossible for me right now. However, I am not sure how this would work - running ssh to collect information about packages instlled on the remote system, etc? how might this be implemented?
Bug#717563: (no subject)
diff --git a/reportbug/checkversions.py b/reportbug/checkversions.py index d94bf76..c37399d 100644 --- a/reportbug/checkversions.py +++ b/reportbug/checkversions.py @@ -84,7 +84,7 @@ def get_versions_available(package, timeout, dists=None, http_proxy=None, arch=' # or to binary packages available on the current arch url += '=source,all,' + arch try: -page = open_url(url) +page = open_url(url, http_proxy, timeout) except NoNetwork: return {} except urllib.error.HTTPError as x: diff --git a/reportbug/urlutils.py b/reportbug/urlutils.py index c16e48c..a3f2e20 100644 --- a/reportbug/urlutils.py +++ b/reportbug/urlutils.py @@ -146,6 +146,7 @@ def open_url(url, http_proxy=None, timeout=60): proxies = urllib.request.getproxies() if http_proxy: proxies['http'] = http_proxy +proxies['https'] = http_proxy try: page = urlopen(url, proxies, timeout)
Bug#717563: (no subject)
diff --git a/reportbug/checkversions.py b/reportbug/checkversions.py index d94bf76..c37399d 100644 --- a/reportbug/checkversions.py +++ b/reportbug/checkversions.py @@ -84,7 +84,7 @@ def get_versions_available(package, timeout, dists=None, http_proxy=None, arch=' # or to binary packages available on the current arch url += '=source,all,' + arch try: -page = open_url(url) +page = open_url(url, http_proxy, timeout) except NoNetwork: return {} except urllib.error.HTTPError as x: diff --git a/reportbug/urlutils.py b/reportbug/urlutils.py index c16e48c..a3f2e20 100644 --- a/reportbug/urlutils.py +++ b/reportbug/urlutils.py @@ -146,6 +146,7 @@ def open_url(url, http_proxy=None, timeout=60): proxies = urllib.request.getproxies() if http_proxy: proxies['http'] = http_proxy +proxies['https'] = http_proxy try: page = urlopen(url, proxies, timeout)
Bug#913987: policycoreutils-python-utils: audit2allow -R cant open "interface info"
Package: policycoreutils-python-utils Version: 2.8-2 Severity: normal Dear Maintainer, audit2allow -R is supposed to generate allow rules that incorporate M4 interface macros from the reference policy. However, this does not appear to work on debian. When I run audit2allow -b -R, for instance: could not open interface info [/var/lib/sepolgen/interface_info] I had to run "sepolgen-ifgen" in order for this command to work. Is it possible to ship this file in the package, or to run this command upon package installation? -- System Information: Debian Release: buster/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 4.18.0-2-amd64 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: SELinux: enabled - Mode: Enforcing - Policy name: default Versions of packages policycoreutils-python-utils depends on: ii policycoreutils 2.8-1 ii python3 3.6.7-1 ii python3-audit 1:2.8.4-2 ii python3-ipy 1:0.83-1 ii python3-selinux 2.8-1+b1 ii python3-semanage 2.8-1+b1 ii python3-sepolgen 2.8-2 ii python3-sepolicy 2.8-2 ii selinux-utils 2.8-1+b1 policycoreutils-python-utils recommends no packages. policycoreutils-python-utils suggests no packages. -- no debconf information
Bug#719019: drraw.cgi: defined(%hash) is deprecated
Package: drraw Version: 2.2b2-4 Followup-For: Bug #719019 Dear Maintainer, I just ran into this problem but instead of just a warning, it prevents the package from working. I applied the patch and that fixed it. Can we get this integrated? -- System Information: Debian Release: buster/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 4.18.0-2-amd64 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: SELinux: enabled - Mode: Enforcing - Policy name: default Versions of packages drraw depends on: ii librrds-perl 1.7.0-1+b3 Versions of packages drraw recommends: ii apache2 [httpd] 2.4.37-1 ii librcs-perl 1.05-5 Versions of packages drraw suggests: ii collectd 5.8.0-5.2 -- Configuration Files: /etc/drraw/drraw.conf changed [not included] -- no debconf information
Bug#913544: python3-openssl: in SELinux enforcing mode, python ssl wrapper results in denial
Re-reading the original redhat bug that linked me to the cffi bug referenced in the last message: https://bugzilla.redhat.com/show_bug.cgi?id=1277224 This makes me thnk that both bugs are unrelated to this specific thing since it relates specifically to python-cryptography and not python-openssl. its a similar symptom and I believe cause, but obviously is occuring through a different route
Bug#913544: python3-openssl: in SELinux enforcing mode, python ssl wrapper results in denial
A quick search yielded the following issue in cffi: https://bitbucket.org/cffi/cffi/issues/232/static-callbacks I'm still trying to do research on this. I guess for reportbug it would be great if there were an SElinux transition to reportbug_t that would allow required permissions. This would be in the selinux-policy-default package. I don't think that is a "correct" solution per se. The default selinux policy should not interfere with normal operation of reportbug even in enforcing mode - that to me is a bug, but of what package I don't know.
Bug#913544: python3-openssl: in SELinux enforcing mode, python ssl wrapper results in denial
Package: python3-openssl Severity: normal Dear Maintainer, I cannot run any python utility that uses the openssl wrapper due to AVC denial. time->Sun Nov 11 19:16:12 2018 type=PROCTITLE msg=audit(1541992572.485:6658): proctitle=2F7573722F62696E2F707974686F6E33002F7573722F62696E2F636C69676800636F6E666967757265 type=SYSCALL msg=audit(1541992572.485:6658): arch=c03e syscall=9 success=no exit=-13 a0=0 a1=1000 a2=7 a3=22 items=0 ppid=14505 pid=15696 auid=10008 uid=10008 gid=1 euid=10008 suid=10008 fsuid=10008 egid=1 sgid=1 fsgid=1 tty=pts6 ses=2 comm="cligh" exe="/usr/bin/python3.6" subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1541992572.485:6658): avc: denied { execmem } for pid=15696 comm="cligh" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process permissive=0 traceback running cligh (github client): Traceback (most recent call last): File "/usr/bin/cligh", line 45, in main() File "/usr/bin/cligh", line 37, in main config.do_configcmd() File "/usr/lib/python3/dist-packages/cligh/config.py", line 79, in do_configcmd note_url='https://github.com/CMB/cligh') File "/usr/lib/python3/dist-packages/github/AuthenticatedUser.py", line 456, in creat e_authorization headers=request_header, File "/usr/lib/python3/dist-packages/github/Requester.py", line 260, in requestJsonAn dCheck return self.__check(*self.requestJson(verb, url, parameters, headers, input, self._ _customConnection(url))) File "/usr/lib/python3/dist-packages/github/Requester.py", line 317, in requestJson return self.__requestEncode(cnx, verb, url, parameters, headers, input, encode) File "/usr/lib/python3/dist-packages/github/Requester.py", line 370, in __requestEnco de status, responseHeaders, output = self.__requestRaw(cnx, verb, url, requestHeaders, encoded_input) File "/usr/lib/python3/dist-packages/github/Requester.py", line 394, in __requestRaw response = cnx.getresponse() File "/usr/lib/python3/dist-packages/github/Requester.py", line 107, in getresponse r = verb(url, headers=self.headers, data=self.input, timeout=self.timeout, verify=self.verify) File "/usr/lib/python3/dist-packages/requests/sessions.py", line 572, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python3/dist-packages/requests/sessions.py", line 524, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python3/dist-packages/requests/sessions.py", line 637, in send r = adapter.send(request, **kwargs) File "/usr/lib/python3/dist-packages/requests/adapters.py", line 449, in send timeout=timeout File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 600, in urlopen chunked=chunked) File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 343, in _make_request self._validate_conn(conn) File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 841, in _validate_conn conn.connect() File "/usr/lib/python3/dist-packages/urllib3/connection.py", line 332, in connect cert_reqs=resolve_cert_reqs(self.cert_reqs), File "/usr/lib/python3/dist-packages/urllib3/util/ssl_.py", line 281, in create_urllib3_context context.verify_mode = cert_reqs File "/usr/lib/python3/dist-packages/urllib3/contrib/pyopenssl.py", line 412, in verify_mode _verify_callback File "/usr/lib/python3/dist-packages/OpenSSL/SSL.py", line 1108, in set_verify self._verify_helper = _VerifyHelper(callback) File "/usr/lib/python3/dist-packages/OpenSSL/SSL.py", line 333, in __init__ "int (*)(int, X509_STORE_CTX *)", wrapper) SystemError: returned NULL without setting an error -- System Information: Debian Release: 9.5 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-8-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages python3-openssl depends on: ii python3 3.5.3-1 pn python3-cryptography ii python3-six 1.10.0-3 python3-openssl recommends no packages. Versions of packages python3-openssl suggests: pn python-openssl-doc pn python3-openssl-dbg
Bug#912986: nodejs segfaults in selinux enforcing mode
Source: nodejs Severity: normal Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? try to use yarn init on a selinux system in enforcing mode * What exactly did you do (or not do) that was effective (or ineffective)? Nothing, so far. * What was the outcome of this action? any application using nodejs crashes, including yarn. * What outcome did you expect instead? The application either works as expected, or generates an intellible error or course of action instead of segfaulting. -- System Information: Debian Release: 9.5 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-8-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? * What exactly did you do (or not do) that was effective (or ineffective)? * What was the outcome of this action? * What outcome did you expect instead? *** End of the template - remove these template lines *** -- System Information: Debian Release: 9.5 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-8-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system)
Bug#912982: reportbug: ssl fails with selinux enforcing mode
Package: reportbug Version: 7.1.7+deb9u2 Severity: normal Dear Maintainer, I am trying to use reportbug on a selinux-enabled system in enforcing mode. It fails due to this AVC denial in the audit.log: type=AVC msg=audit(1541420721.386:9317): avc: denied { execmem } for pid=17668 comm="reportbug" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process permissive=0 Here is the output of the reportbug session: Please enter the name of the package in which you have found a problem, or type 'other' to report a more general problem. If you don't know what package the bug is in, please contact debian-u...@lists.debian.org for assistance. > nodejs *** Welcome to reportbug. Use ? for help at prompts. *** Note: bug reports are publicly archived (including the email address of the submitter). Detected character set: UTF-8 Please change your locale if this is incorrect. Using 'Jade McCormick ' as your from address. Getting status for nodejs... Checking for newer versions at madison... Traceback (most recent call last): File "/usr/bin/reportbug", line 2266, in main() File "/usr/bin/reportbug", line 1109, in main return iface.user_interface() File "/usr/bin/reportbug", line 1625, in user_interface http_proxy=self.options.http_proxy, arch=arch) File "/usr/lib/python3/dist-packages/reportbug/checkversions.py", line 177, in check_ available stuff = get_versions_available(package, timeout, dists, http_proxy, arch) File "/usr/lib/python3/dist-packages/reportbug/checkversions.py", line 87, in get_ver sions_available page = open_url(url) File "/usr/lib/python3/dist-packages/reportbug/urlutils.py", line 151, in open_url page = urlopen(url, proxies, timeout) File "/usr/lib/python3/dist-packages/reportbug/urlutils.py", line 115, in urlopen return requests.get(url, headers).text File "/usr/lib/python3/dist-packages/requests/api.py", line 75, in get Please enter the name of the package in which you have found a problem, or type 'other' to report a more general problem. If you don't know what package the bug is in, please contact debian-u...@lists.debian.org for assistance. > nodejs *** Welcome to reportbug. Use ? for help at prompts. *** Note: bug reports are publicly archived (including the email address of the submitter). Detected character set: UTF-8 Please change your locale if this is incorrect. Using 'Jade McCormick ' as your from address. Getting status for nodejs... Checking for newer versions at madison... Traceback (most recent call last): File "/usr/bin/reportbug", line 2266, in main() File "/usr/bin/reportbug", line 1109, in main return iface.user_interface() File "/usr/bin/reportbug", line 1625, in user_interface http_proxy=self.options.http_proxy, arch=arch) File "/usr/lib/python3/dist-packages/reportbug/checkversions.py", line 177, in check_ available stuff = get_versions_available(package, timeout, dists, http_proxy, arch) File "/usr/lib/python3/dist-packages/reportbug/checkversions.py", line 87, in get_ver sions_available page = open_url(url) File "/usr/lib/python3/dist-packages/reportbug/urlutils.py", line 151, in open_url page = urlopen(url, proxies, timeout) File "/usr/lib/python3/dist-packages/reportbug/urlutils.py", line 115, in urlopen return requests.get(url, headers).text File "/usr/lib/python3/dist-packages/requests/api.py", line 75, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python3/dist-packages/requests/api.py", line 60, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python3/dist-packages/requests/sessions.py", line 524, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python3/dist-packages/requests/sessions.py", line 637, in send r = adapter.send(request, **kwargs) File "/usr/lib/python3/dist-packages/requests/adapters.py", line 449, in send timeout=timeout File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 600, in urlopen chunked=chunked) return session.request(method=method, url=url, **kwargs) File "/usr/lib/python3/dist-packages/requests/sessions.py", line 524, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python3/dist-packages/requests/sessions.py", line 637, in send r = adapter.send(request, **kwargs) File "/usr/lib/python3/dist-packages/requests/adapters.py", line 449, in send timeout=timeout File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 600, in urlopen chunked=chunked) File "/usr/lib/python3/dist-p
Bug#912002: javascript-common: installs lighttpd config files when lighttpd is not installed
Package: javascript-common Version: 11 Severity: important Dear Maintainer, I discovered lighttpd config files in /etc when I did not haave the lighttpd application installed. This related to several other bugs filed with javascript-common package, including #474913 (javascript-common overrides /javascript globally), #818585 (javascript-common: nginx snippet). I don't expect lighttpd config files to be installed when I don't have lighttpd installed. It's unsightly and it clutters my machine. This reflects fundamental design flaws in this package. Debian should not be imposing a structure upon the URI namespace that may or may not exist on my machine. It may be completely inappropriate on the basis of the hosts application requirements. I suggest rethinking of this package, its design, intent, and ability to help the majority of debain users. On the other hand, I don't know the purpose this package fulfills. At the very least, the administrator should be asked if that is an appropriate system change to be made. Can't applications simply embed the CDN address for any javascript they want, and don't include themselves? I don't see the real advantage in having a javascript-common package. #581708 has an idea I don't fully understand. "javascript-common could provide an Apache alias javascript-common-bundles, javascript-common could set a trigger on files in /usr/share/javascript users and packages could define bundles in /etc/javascript-common/bundles/*.conf the trigger would then concatenate the files listed in the bundle and optionally compress them with whatever javascript compressor is defined in the configuration (yui-compressor should be the default)" That seems complex when CDN use would solve almost 100% of the problem at hand (whatever it is). -- System Information: Debian Release: buster/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 4.18.0-2-amd64 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled javascript-common depends on no packages. javascript-common recommends no packages. Versions of packages javascript-common suggests: ii apache2 [httpd] 2.4.34-1 -- no debconf information