Bug#916091: ITP: python3-stringcase -- Python library to Convert string cases between camel case, pascal case, snake case etc…

2018-12-09 Thread Jade McCormick
Package: wnpp
Severity: wishlist
Owner: Jade McCormick 

* Package name: python3-stringcase
  Version : 1.2.0
  Upstream Author : Taka Okunishi (https://github.com/okunishinishi)
* URL : https://pypi.org/project/stringcase/
* License : MIT
  Programming Lang: Python
  Description : Python library to Convert string cases between camel case, 
pascal case, snake case etc...

This python library provides many methods to convert between various
case forms (camel case, pascal case, etc) and is useful to provide
consistency in casing - fewer bugs, etc.

I use this package for casing system names (i_am_a_name) for web
applications (I am a name).

I need a sponsor for this package.



Bug#914514: atop: should use logrotate for log rotation

2018-11-24 Thread Jade McCormick
Package: atop
Version: 2.3.0-1+b1
Severity: normal

Dear Maintainer,

In managing my log directory and customize logrotate, I discovered
limitations in the way atop handles log files (which are different
from text files since they are process accounting files,, to my
understanding).

Can this package use logrotate like other debian packages? It's confusing, and 
then to discover that
/usr/share/atop/atop.daily is executed from a shell script in the background, 
made me think
that atop log handling could be greatly improved.

There are other bugs related to log file handling:

#877148 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877148

I had to directly modify the /usr/share/atop/atop.daily to achieve my
temporary goal (accumulate more logfiles)


-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.18.0-2-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: SELinux: enabled - Mode: Enforcing - Policy name: default

Versions of packages atop depends on:
ii  libc62.27-8
ii  libncurses6  6.1+20181013-1
ii  libtinfo66.1+20181013-1
ii  lsb-base 9.20170808
ii  zlib1g   1:1.2.11.dfsg-1

Versions of packages atop recommends:
ii  cron [cron-daemon]  3.0pl1-130

atop suggests no packages.

-- no debconf information



Bug#898184: still an issue

2018-11-22 Thread Jade McCormick


I experience this on an up-to-date buster and it causes problems because I run 
SELinux, and collectd
does not have permission to use the dac_override capability.

I can confirm that the latest master of rrdtool built against collectd fixes 
this problem.
or, vice versa, collectd against the lat

thanks



Bug#914057: python3-debianbts: debianbts.get_bugs does not support the use of HTTP and HTTPS proxy servers

2018-11-18 Thread Jade McCormick
Package: python3-debianbts
Version: 2.7.2
Severity: important

Dear Maintainer,

This bug is related to bug #717563 in reportbug package. Message #59
on that bug shows the following code
(https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717563#msg59):

>  bugs = debianbts.get_bugs(pkg_filter, package)

There is no opportunity to pass proxy information, which reportbug
supports via commandline option --proxy (aliased to --http_proxy) to
the SoapClient instantiated by debianbts.

get_bugs, and other methods, should support a dict similar to that
constructed by reportbug and used by urllib2 (underlying reportbug) or
some other method of setting proxy information.

I am happy to implement whatever changes are considered appropriate for this bug
and #717563.

-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.18.0-2-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: SELinux: enabled - Mode: Enforcing - Policy name: default

Versions of packages python3-debianbts depends on:
ii  python3   3.6.7-1
ii  python3-pysimplesoap  1.16-2.1

python3-debianbts recommends no packages.

python3-debianbts suggests no packages.

-- no debconf information



Bug#770128: (no subject)

2018-11-18 Thread Jade McCormick
Agreed, and further I am having trouble with reportbug and SElinux, which makes
reporting bugs impossible for me right now. However, I am not sure how this
would work - running ssh to collect information about packages instlled on
the remote system, etc? how might this be implemented?



Bug#717563: (no subject)

2018-11-18 Thread Jade McCormick
diff --git a/reportbug/checkversions.py b/reportbug/checkversions.py
index d94bf76..c37399d 100644
--- a/reportbug/checkversions.py
+++ b/reportbug/checkversions.py
@@ -84,7 +84,7 @@ def get_versions_available(package, timeout, dists=None, http_proxy=None, arch='
 # or to binary packages available on the current arch
 url += '=source,all,' + arch
 try:
-page = open_url(url)
+page = open_url(url, http_proxy, timeout)
 except NoNetwork:
 return {}
 except urllib.error.HTTPError as x:
diff --git a/reportbug/urlutils.py b/reportbug/urlutils.py
index c16e48c..a3f2e20 100644
--- a/reportbug/urlutils.py
+++ b/reportbug/urlutils.py
@@ -146,6 +146,7 @@ def open_url(url, http_proxy=None, timeout=60):
 proxies = urllib.request.getproxies()
 if http_proxy:
 proxies['http'] = http_proxy
+proxies['https'] = http_proxy
 
 try:
 page = urlopen(url, proxies, timeout)



Bug#717563: (no subject)

2018-11-18 Thread Jade McCormick
diff --git a/reportbug/checkversions.py b/reportbug/checkversions.py
index d94bf76..c37399d 100644
--- a/reportbug/checkversions.py
+++ b/reportbug/checkversions.py
@@ -84,7 +84,7 @@ def get_versions_available(package, timeout, dists=None, http_proxy=None, arch='
 # or to binary packages available on the current arch
 url += '=source,all,' + arch
 try:
-page = open_url(url)
+page = open_url(url, http_proxy, timeout)
 except NoNetwork:
 return {}
 except urllib.error.HTTPError as x:
diff --git a/reportbug/urlutils.py b/reportbug/urlutils.py
index c16e48c..a3f2e20 100644
--- a/reportbug/urlutils.py
+++ b/reportbug/urlutils.py
@@ -146,6 +146,7 @@ def open_url(url, http_proxy=None, timeout=60):
 proxies = urllib.request.getproxies()
 if http_proxy:
 proxies['http'] = http_proxy
+proxies['https'] = http_proxy
 
 try:
 page = urlopen(url, proxies, timeout)



Bug#913987: policycoreutils-python-utils: audit2allow -R cant open "interface info"

2018-11-17 Thread Jade McCormick
Package: policycoreutils-python-utils
Version: 2.8-2
Severity: normal

Dear Maintainer,

audit2allow -R is supposed to generate allow rules that incorporate M4
interface macros from the reference policy. However, this does not appear to 
work
on debian. When I run audit2allow -b -R, for instance:

could not open interface info [/var/lib/sepolgen/interface_info]

I had to run "sepolgen-ifgen" in order for this command to work.

Is it possible to ship this file in the package, or to run this command upon
package installation?


-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.18.0-2-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: SELinux: enabled - Mode: Enforcing - Policy name: default

Versions of packages policycoreutils-python-utils depends on:
ii  policycoreutils   2.8-1
ii  python3   3.6.7-1
ii  python3-audit 1:2.8.4-2
ii  python3-ipy   1:0.83-1
ii  python3-selinux   2.8-1+b1
ii  python3-semanage  2.8-1+b1
ii  python3-sepolgen  2.8-2
ii  python3-sepolicy  2.8-2
ii  selinux-utils 2.8-1+b1

policycoreutils-python-utils recommends no packages.

policycoreutils-python-utils suggests no packages.

-- no debconf information



Bug#719019: drraw.cgi: defined(%hash) is deprecated

2018-11-15 Thread Jade McCormick
Package: drraw
Version: 2.2b2-4
Followup-For: Bug #719019

Dear Maintainer,

I just ran into this problem but instead of just a warning, it
prevents the package from working. I applied the patch and that fixed
it. Can we get this integrated?



-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.18.0-2-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: SELinux: enabled - Mode: Enforcing - Policy name: default

Versions of packages drraw depends on:
ii  librrds-perl  1.7.0-1+b3

Versions of packages drraw recommends:
ii  apache2 [httpd]  2.4.37-1
ii  librcs-perl  1.05-5

Versions of packages drraw suggests:
ii  collectd  5.8.0-5.2

-- Configuration Files:
/etc/drraw/drraw.conf changed [not included]

-- no debconf information



Bug#913544: python3-openssl: in SELinux enforcing mode, python ssl wrapper results in denial

2018-11-11 Thread Jade McCormick


Re-reading the original redhat bug that linked me to the cffi bug referenced in 
the last message:

https://bugzilla.redhat.com/show_bug.cgi?id=1277224

This makes me thnk that both bugs are unrelated to this specific thing since it
relates specifically to python-cryptography and not python-openssl. its a 
similar
symptom and I believe cause, but obviously is occuring through a different route



Bug#913544: python3-openssl: in SELinux enforcing mode, python ssl wrapper results in denial

2018-11-11 Thread Jade McCormick
A quick search yielded the following issue in cffi:

https://bitbucket.org/cffi/cffi/issues/232/static-callbacks

I'm still trying to do research on this. I guess for reportbug it would
be great if there were an SElinux transition to reportbug_t that would
allow required permissions. This would be in the selinux-policy-default
package. I don't think that is a "correct" solution per se.

The default selinux policy should not interfere with normal operation of
reportbug even in enforcing mode - that to me is a bug, but of what
package I don't know.



Bug#913544: python3-openssl: in SELinux enforcing mode, python ssl wrapper results in denial

2018-11-11 Thread Jade McCormick
Package: python3-openssl
Severity: normal

Dear Maintainer,

I cannot run any python utility that uses the openssl wrapper due to AVC denial.


time->Sun Nov 11 19:16:12 2018
type=PROCTITLE msg=audit(1541992572.485:6658): 
proctitle=2F7573722F62696E2F707974686F6E33002F7573722F62696E2F636C69676800636F6E666967757265
type=SYSCALL msg=audit(1541992572.485:6658): arch=c03e syscall=9 success=no 
exit=-13 a0=0 a1=1000 a2=7 a3=22 items=0 ppid=14505 pid=15696 auid=10008 
uid=10008 gid=1 euid=10008 suid=10008 fsuid=10008 egid=1 sgid=1 
fsgid=1 tty=pts6 ses=2 comm="cligh" exe="/usr/bin/python3.6" 
subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1541992572.485:6658): avc:  denied  { execmem } for  
pid=15696 comm="cligh" 
scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 
tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process 
permissive=0


traceback running cligh (github client):

Traceback (most recent call last):
  File "/usr/bin/cligh", line 45, in 
main()
  File "/usr/bin/cligh", line 37, in main
config.do_configcmd()
  File "/usr/lib/python3/dist-packages/cligh/config.py", line 79, in 
do_configcmd
note_url='https://github.com/CMB/cligh')
 File "/usr/lib/python3/dist-packages/github/AuthenticatedUser.py", 
line 456, in creat
e_authorization
headers=request_header, 
 File "/usr/lib/python3/dist-packages/github/Requester.py", line 260, 
in requestJsonAn
dCheck
return self.__check(*self.requestJson(verb, url, parameters, headers, 
input, self._
_customConnection(url)))
  File "/usr/lib/python3/dist-packages/github/Requester.py", line 317, in 
requestJson  return self.__requestEncode(cnx, verb, url, parameters, 
headers, input, encode)
  File "/usr/lib/python3/dist-packages/github/Requester.py", line 370, in 
__requestEnco
de  
   status, responseHeaders, output = self.__requestRaw(cnx, verb, url, 
requestHeaders,
 encoded_input)
  File "/usr/lib/python3/dist-packages/github/Requester.py", line 394, in 
__requestRaw
response = cnx.getresponse()
  File "/usr/lib/python3/dist-packages/github/Requester.py", line 107, in 
getresponse
r = verb(url, headers=self.headers, data=self.input, timeout=self.timeout, 
verify=self.verify) 
   
  File "/usr/lib/python3/dist-packages/requests/sessions.py", line 572, in post
return self.request('POST', url, data=data, json=json, **kwargs)
  File "/usr/lib/python3/dist-packages/requests/sessions.py", line 524, in 
request
resp = self.send(prep, **send_kwargs)
  File "/usr/lib/python3/dist-packages/requests/sessions.py", line 637, in send
r = adapter.send(request, **kwargs)
  File "/usr/lib/python3/dist-packages/requests/adapters.py", line 449, in send
timeout=timeout
  File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 600, in 
urlopen
chunked=chunked)
  File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 343, in 
_make_request
self._validate_conn(conn)
  File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 841, in 
_validate_conn
conn.connect()
  File "/usr/lib/python3/dist-packages/urllib3/connection.py", line 332, in 
connect
cert_reqs=resolve_cert_reqs(self.cert_reqs),
  File "/usr/lib/python3/dist-packages/urllib3/util/ssl_.py", line 281, in 
create_urllib3_context
context.verify_mode = cert_reqs
  File "/usr/lib/python3/dist-packages/urllib3/contrib/pyopenssl.py", line 412, 
in verify_mode
_verify_callback
  File "/usr/lib/python3/dist-packages/OpenSSL/SSL.py", line 1108, in set_verify
self._verify_helper = _VerifyHelper(callback)
  File "/usr/lib/python3/dist-packages/OpenSSL/SSL.py", line 333, in __init__
"int (*)(int, X509_STORE_CTX *)", wrapper)
SystemError:  
returned NULL without setting an error


-- System Information:
Debian Release: 9.5
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-8-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages python3-openssl depends on:
ii  python3   3.5.3-1
pn  python3-cryptography  
ii  python3-six   1.10.0-3

python3-openssl recommends no packages.

Versions of packages python3-openssl suggests:
pn  python-openssl-doc   
pn  python3-openssl-dbg  



Bug#912986: nodejs segfaults in selinux enforcing mode

2018-11-05 Thread Jade McCormick
Source: nodejs
Severity: normal

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?

try to use yarn init on a selinux system in enforcing mode

   * What exactly did you do (or not do) that was effective (or
 ineffective)?

Nothing, so far.

   * What was the outcome of this action?

any application using nodejs crashes, including yarn.

   * What outcome did you expect instead?

The application either works as expected, or generates an intellible error or 
course
of action instead of segfaulting.


-- System Information:
Debian Release: 9.5
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-8-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
 ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***


-- System Information:
Debian Release: 9.5
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-8-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)



Bug#912982: reportbug: ssl fails with selinux enforcing mode

2018-11-05 Thread Jade McCormick
Package: reportbug
Version: 7.1.7+deb9u2
Severity: normal

Dear Maintainer,

I am trying to use reportbug on a selinux-enabled system in enforcing mode.
It fails due to this AVC denial in the audit.log:

type=AVC msg=audit(1541420721.386:9317): avc:  denied  { execmem } for  
pid=17668 comm="reportbug" 
scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 
tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process 
permissive=0

Here is the output of the reportbug session:

Please enter the name of the package in which you have found a problem, or type
'other' to report a more general problem. If you don't know what package the 
bug is
in, please contact debian-u...@lists.debian.org for assistance.
> nodejs
*** Welcome to reportbug.  Use ? for help at prompts. ***
Note: bug reports are publicly archived (including the email address of the 
submitter).
Detected character set: UTF-8
Please change your locale if this is incorrect.

Using 'Jade McCormick ' as your from address.
Getting status for nodejs...
Checking for newer versions at madison...
Traceback (most recent call last):
  File "/usr/bin/reportbug", line 2266, in 
main()
  File "/usr/bin/reportbug", line 1109, in main
return iface.user_interface()
  File "/usr/bin/reportbug", line 1625, in user_interface
http_proxy=self.options.http_proxy, arch=arch)
  File "/usr/lib/python3/dist-packages/reportbug/checkversions.py", line 177, 
in check_
available
stuff = get_versions_available(package, timeout, dists, http_proxy, arch)
  File "/usr/lib/python3/dist-packages/reportbug/checkversions.py", line 87, in 
get_ver
sions_available
page = open_url(url)
  File "/usr/lib/python3/dist-packages/reportbug/urlutils.py", line 151, in 
open_url
page = urlopen(url, proxies, timeout)
  File "/usr/lib/python3/dist-packages/reportbug/urlutils.py", line 115, in 
urlopen
return requests.get(url, headers).text
  File "/usr/lib/python3/dist-packages/requests/api.py", line 75, in get
Please enter the name of the package in which you have found a problem, or type
'other' to report a more general problem. If you don't know what package the 
bug is
in, please contact debian-u...@lists.debian.org for assistance.
> nodejs
*** Welcome to reportbug.  Use ? for help at prompts. ***
Note: bug reports are publicly archived (including the email address of the 
submitter).
Detected character set: UTF-8
Please change your locale if this is incorrect.

Using 'Jade McCormick ' as your from address.
Getting status for nodejs...
Checking for newer versions at madison...
Traceback (most recent call last):
  File "/usr/bin/reportbug", line 2266, in 
main()
  File "/usr/bin/reportbug", line 1109, in main
return iface.user_interface()
  File "/usr/bin/reportbug", line 1625, in user_interface
http_proxy=self.options.http_proxy, arch=arch)
  File "/usr/lib/python3/dist-packages/reportbug/checkversions.py", line 177, 
in check_
available
stuff = get_versions_available(package, timeout, dists, http_proxy, arch)
  File "/usr/lib/python3/dist-packages/reportbug/checkversions.py", line 87, in 
get_ver
sions_available
page = open_url(url)
  File "/usr/lib/python3/dist-packages/reportbug/urlutils.py", line 151, in 
open_url
page = urlopen(url, proxies, timeout)
  File "/usr/lib/python3/dist-packages/reportbug/urlutils.py", line 115, in 
urlopen
return requests.get(url, headers).text
  File "/usr/lib/python3/dist-packages/requests/api.py", line 75, in get
return request('get', url, params=params, **kwargs)
  File "/usr/lib/python3/dist-packages/requests/api.py", line 60, in request
return session.request(method=method, url=url, **kwargs)
  File "/usr/lib/python3/dist-packages/requests/sessions.py", line 524, in 
request
resp = self.send(prep, **send_kwargs)
  File "/usr/lib/python3/dist-packages/requests/sessions.py", line 637, in send
r = adapter.send(request, **kwargs)
  File "/usr/lib/python3/dist-packages/requests/adapters.py", line 449, in send
timeout=timeout
  File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 600, in 
urlopen
chunked=chunked)
return session.request(method=method, url=url, **kwargs)   
  File "/usr/lib/python3/dist-packages/requests/sessions.py", line 524, in 
request
resp = self.send(prep, **send_kwargs)
  File "/usr/lib/python3/dist-packages/requests/sessions.py", line 637, in send
r = adapter.send(request, **kwargs)
  File "/usr/lib/python3/dist-packages/requests/adapters.py", line 449, in send
timeout=timeout
  File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 600, in 
urlopen
chunked=chunked)
  File "/usr/lib/python3/dist-p

Bug#912002: javascript-common: installs lighttpd config files when lighttpd is not installed

2018-10-27 Thread Jade McCormick
Package: javascript-common
Version: 11
Severity: important

Dear Maintainer,

I discovered lighttpd config files in /etc when I did not haave the
lighttpd application installed. This related to several other bugs
filed with javascript-common package, including #474913
(javascript-common overrides /javascript globally), #818585
(javascript-common: nginx snippet).

I don't expect lighttpd config files to be installed when I don't have
lighttpd installed. It's unsightly and it clutters my machine.

This reflects fundamental design flaws in this package. Debian should
not be imposing a structure upon the URI namespace that may or may not
exist on my machine. It may be completely inappropriate on the basis of
the hosts application requirements.

I suggest rethinking of this package, its design, intent, and ability
to help the majority of debain users. On the other hand, I don't know the 
purpose
this package fulfills. At the very least, the administrator should be asked
if that is an appropriate system change to be made.

Can't applications simply embed the CDN address for any javascript
they want, and don't include themselves? I don't see the real
advantage in having a javascript-common package.

#581708 has an idea I don't fully understand.

"javascript-common could provide an Apache alias
javascript-common-bundles, javascript-common could set a
trigger on files in /usr/share/javascript users and packages
could define bundles in /etc/javascript-common/bundles/*.conf
the trigger would then concatenate the files listed in the
bundle and optionally compress them with whatever javascript
compressor is defined in the configuration (yui-compressor
should be the default)"

That seems complex when CDN use would solve almost 100% of the problem
at hand (whatever it is).



-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.18.0-2-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

javascript-common depends on no packages.

javascript-common recommends no packages.

Versions of packages javascript-common suggests:
ii  apache2 [httpd]  2.4.34-1

-- no debconf information