Bug#1083225: v17 and pypdf2

2024-10-03 Thread Sébastien Delafond
I'm actively trying to sort out this situation with upstream, since v17
is, unfortunately and unexpectedly, still somewhat in limbo with regard
to this pypdf/pypdf2 issue.

Cheers,

-- 
Seb



Bug#1061261: odoo: Uses deprecated/to be removed PyPDF2

2024-09-03 Thread Sébastien Delafond
On Tue, Sep 03 2024, Colin Watson wrote:
> I had a brief look at this and noticed that this package was
> previously ported to pypdf, but that the port was reverted in
> https://salsa.debian.org/freexian-team/packages/odoo/-/commit/d68da30bd5746f41e33c19ba5c2b8bc0f100e4d6.
>
> CCing Sébastien - was there a problem with the port?  (Maybe
> https://bugs.debian.org/1032300?  But that was closed six months before
> the commit above ...)

Yeah, it unfortunately breaks PDF printing. odoo-17 is scheduled to
enter unstable soon'ish, and eventually make it into trixie, so odoo-16
is not meant to be included in that release.

Cheers,

-- 
Seb



Bug#1064843: odoo-16: minor upgrades available

2024-02-27 Thread Sébastien Delafond
Control: severity -1 normal
Control: tag -1 + pending

Hello,

odoo-16 is the official and latest version available in Debian ("saas"
are not meant to be deployed locally) right now; 17 and 18 will be
packaged soon.

Upgrading from one major version to the next is not directly supported
in Debian: it's a commercial service provided by the Odoo company.

Addons can be installed by referencing their path in the `addons_path`
variable, see for instance:

  https://github.com/odoo/odoo/blob/16.0/debian/odoo.conf

I'll add a line about this in the Debian documentation for the next
update.

Cheers,

-- 
Seb



Bug#1059326: Workaround

2023-12-22 Thread Sébastien Delafond
In case someone out there is stuck real bad with this bug in bookworm,
here's a very nasty workaround for which I of course decline all
responsibility:

  $ mkdir /usr/share/fonts/type1/gsfonts
  $ ln -sf /usr/share/fonts/X11/Type1/C059-Roman.pfb 
/usr/share/fonts/type1/gsfonts/n021003l.pfb

Cheers,

-- 
Seb



Bug#1059326: fixed in 4.0.8-1

2023-12-22 Thread Sébastien Delafond
Control: fixed 1059326 4.0.8-1

The earliest fixed version is most likely between 4.0.4-7 and 4.0.4-11.

Cheers,

-- 
Seb



Bug#1029736: Odoo-14 fails to start

2023-03-03 Thread Sébastien Delafond
On Thu, Mar 02 2023, Glenn wrote:
> I think this bug could be more serious than wishlist, as the server
> doesnt start, for me at least.
>
> When trying to start it with the same line from its init file, it
> concludes with the error; No module named 'PyPDF2.utils'

Hi Glenn,

the bug you're hitting is actually #1032300.

Cheers,

-- 
Seb



Bug#1022721: New aptly upstream version 1.5.0

2023-01-31 Thread Sébastien Delafond
On Mon, Jan 30 2023, Roland Mas wrote:
> golang-github-cavaliergopher-grab has been accepted into
> unstable. Shall I proceed with the aptly upload or would one of you
> guys prefer doing it?

You can go ahead.

Cheers,

-- 
Seb



Bug#1022721: New aptly upstream version 1.5.0

2023-01-04 Thread Sébastien Delafond
On 02/01 15:04, Roland Mas wrote:
> I took the liberty of packaging the cavaliergopher/grab library

Thanks for uploading that to NEW and closing the associated RFP.

> I also updated the packaging for aptly 1.5.0, which I committed and
> pushed to salsa, but I'd rather you had a look before uploading, as
> I'm not a Golang expert at all.

On a very general note I would have rather preferred a MR on a separate
branch, at least until cavaliergopher/grab gets accepted from NEW before
the freeze. This would have ketp the CI status green, and made for
easier fixes around freeze time if some problem arises in the current
version. But this is git anyway, so if it comes to that we'll have to
ignore debian/master and build something off of 4c7796ca instead.

I don't have much time right now, but after a cursory glance at the
current HEAD it looks fine to me. Thanks a lot for your work on aptly,
it's much appreciated and hopefully will allow us to get 1.5 into
bookworm.

Cheers,

-- 
Seb



Bug#1024641: Aptly does not support zstd compression

2022-11-22 Thread Sébastien Delafond
On 22/11 11:01, Kyle Edwards wrote:
> Package: aptly
> Version: 1.4.0+ds1-7
> 
> Aptly 1.4.0 does not support the zstd compression found in Ubuntu 22.04
> packages. Please upgrade Aptly to 1.5.0 to support the new zstd compression.

This was fixed in 1.4.0+ds1-7, as per #1010465[fn:1]. Are you actually
saying this version, currently in sid, doesn't properly support zstd for
you? If so, how does it fail?

As for packaging 1.5.x, please see #1022720[fn:2].

Cheers,

-- 
Seb

* Footnotes

[fn:1] https://bugs.debian.org/1010465

[fn:2] https://bugs.debian.org/1022720



Bug#1024166: blist: dead upstream, no maintainer upload since 2015

2022-11-16 Thread Sébastien Delafond
On 15/11 14:51, Louis-Philippe Véronneau wrote:
> I'm CC-ing Sebastien Delafond explicitly, as he seems to be the
> maintainer of all the packages in the archive that depend or
> build-depend on blist (python-raccoon, python-panwid, elastalert).
>
> In a perfect world, those packages should migrate away from blist in
> time for the freeze. If not possible, it would be nice if it could
> have an active maintainer again.

I've uploaded new versions of raccoon and panwid that don't depend on
blist anymore.

elastalert is maintained by Freexian, I'll see what can be done on that
side.

Cheers,

-- 
Seb



Bug#1012287: aptly: Please provide a bullseye-backports version

2022-06-02 Thread Sébastien Delafond
On 03/06 03:21, Bastian Germann wrote:
> Source: aptly
> Version: 1.4.0+ds1-7
> 
> Now that aptly can publish zstd packages can you please upload the
> current version to bullseye-backports?  That would be very helpful,
> e.g., to mirror Ubuntu jammy.
> 
> I can also upload it myself if you agree.

I can take care of it late next week, but if you want to make it happen
before that please feel free to do so.

Cheers,

-- 
Seb



Bug#1005290: 1005290

2022-02-25 Thread Sébastien Delafond
Hi Enrico,

see the comment from upstream here:

  https://github.com/aptly-dev/aptly/issues/1031#issuecomment-1046299497

I'm tempted to mark this as minor+wontfix, leaving it open to serve as a
reference for other users. What do you think?

Cheers,

-- 
Seb



Bug#824609: Reproducer for #824609?

2022-01-28 Thread Sébastien Delafond
Hi Sam,

upstream apparently cannot reproduce the issue anymore[0]. Do you still
this see on your end?

Cheers,

-- 
Seb

[0] https://github.com/aptly-dev/aptly/issues/403#issuecomment-1024176943



Bug#1003027: roundcube: XSS vulnerability via HTML messages with malicious CSS content

2022-01-06 Thread Sébastien Delafond
On 06/01 06:10, Salvatore Bonaccorso wrote:
> CVE-2021-46144 has been assigned for the roundcube issue.

Thanks for taking care of this Salvatore. I'll review the debdiffs once
Guilhem sends them, and will take care of the DSA afterwards.

Cheers,

-- 
Seb



Bug#924139: OVAL generation code migrated to python3

2021-12-05 Thread Sébastien Delafond
As far as OVAL is concerned, all the relevant MRs are merged in, and the
OVAL files are now being generated on www-master[0] using python3:

   [...]
   /usr/bin/python3 generate.py -q -d .. -j DebianSecTracker.json -r bullseye 
>oval-definitions-bullseye.xml

Cheers,

-- 
Seb

[0] https://www-master.debian.org/build-logs/webwml/wml_run.log



Bug#924139: OVAL python3

2021-11-15 Thread Sébastien Delafond
With https://salsa.debian.org/webmaster-team/webwml/-/merge_requests/737
now merged, python3 support is in
https://salsa.debian.org/webmaster-team/webwml/-/merge_requests/740. I'll
open an RT ticket to get
https://salsa.debian.org/seb/debian.org/-/commit/72fbf295abfd042835ce786344a13bcf8a81148b
included so python3-lxml is available on the server side.



Bug#998757: salsa MR

2021-11-10 Thread Sébastien Delafond
https://salsa.debian.org/webmaster-team/webwml/-/merge_requests/752



Bug#998757: security.debian.org: OVAL feed issues

2021-11-07 Thread Sébastien Delafond
On 07/11 10:22, Noah Meyerhans wrote:
> [...]  These two OVAL definitions list essentially identical criteria,
> yet their actual status in bullseye is quite different:
> 
> CVE-2020-28200 is still present in bullseye and is a legitimate
> finding by any scanner based on these definitions:
> https://security-tracker.debian.org/tracker/CVE-2020-28200
> 
> CVE-2012-0833 is not present in any bullseye and should not trigger a
> finding from a scanner:
> https://security-tracker.debian.org/tracker/CVE-2012-0833
> 
> If we look at the security-tracker's JSON feed [2], we see some
> details that should be reflected in the OVAL feed but aren't, in
> particular the "status" field:
> 
> "CVE-2012-0833": { ...
>   "releases": { ...
> "bullseye": { "status": "resolved", "repositories": {
>   "bullseye": "1.4.4.11-2" }, "fixed_version": "0", "urgency":
>   "unimportant"
> }, ...  } and
> 
> "CVE-2020-28200": {
>   "releases": { ...
> "bullseye": { "status": "open", "repositories": { "bullseye":
>   "1:2.3.13+dfsg1-2" }, "urgency": "not yet assigned"
> }, ...  },
> 
> I'm not super familiar with the semantic expectations of OVAL, but I
> think logically we want to represent CVE-2012-0833 somewhat
> differently in OVAL using logic similar to:
> 
> if status == resolved: if fixed_version == 0:
> # All versions of this package in this release's repos are fixed:
> OVAL_criterion = "package is earlier than
> min(values.repositories)"
>   else OVAL_criterion = "package is earlier than fixed_version"
> 
> In this case the criterion for CVE-2012-0833 would be:
> 
>  test_ref="oval:org.debian.oval:tst:4696"/>
> 
> Which I believe is correct.  If a system is running bullseye and has
> 1.4.4.11-2 or later installed, then a scanner should determine that
> this vulnerability is not present.

Thanks for the detailed report.

I agree the current "greater than 0" criterion in OVAL isn't right, and
ideally the JSON export would correctly list "min(version for version in
all_versions_ever_in(repository)" in fixed_version instead of the
current "0": the current OVAL code would then expose the correct result
automatically.

I'm not sure how feasible that is, as I'm not familiar with the JSON
export code, but what I would *most* like to avoid here, is having that
min() computation be performed on the OVAL side: it doesn't belong
there, IMO.

The other approach is for the OVAL code to simply skip a CVE entirely if
the target distribution was never affected: it would remove the current
false positives, and the only downside would be the lack of an alert is
someone was to accidentally downgrade or hang on to a vulnerable version
(from a previous stable suite for instance). I'm not sure if our OVAL
exports should really for such a scenario, so maybe that's the better
option here.

Cheers,

-- 
Seb



Bug#924139: OVAL generation code migrated to python3

2021-10-09 Thread Sébastien Delafond
See https://salsa.debian.org/webmaster-team/webwml/-/merge_requests/737.



Bug#988673: centreon-connectors: diff for NMU version 19.10.0-1.1

2021-09-08 Thread Sébastien Delafond
On 08/09 16:54, Adrian Bunk wrote:
> I've prepared an NMU for centreon-connectors (versioned as
> 19.10.0-1.1) and uploaded it to DELAYED/14. Please feel free to tell
> me if I should cancel it.

Hi Adrian,

thanks a lot for taking of this, it's really appreciated.

Cheers,

-- 
Seb



Bug#987084: unblock: wordpress/5.7.1+dfsg1-1

2021-04-19 Thread Sébastien Delafond
For the Security Team, unblocking 5.7.1 is the preferred option as it
will make supporting WP for the entire bullseye lifecycle much
easier. If the Release Team thinks it's too late at this point for such
an unblock, we'd favor going with 5.6.3 instead.

Cheers,

-- 
Seb



Bug#983104: RFS: mupdf/1.14.0+ds1-4+deb10u3 [NMU, CVE-2020-16600] -- lightweight PDF viewer

2021-02-22 Thread Sébastien Delafond
On 19/02 13:53, Bastian Germann wrote:
>  * Package name: mupdf
>Version : 1.14.0+ds1-4+deb10u3
> [...] 
> * Avoid a use-after-free in fz_drop_band_writer (CVE-2020-16600)

Hi Bastian,

thanks for your work on this. We think this update should go via
stable-proposed-updates:

  
https://www.debian.org/doc/manuals/developers-reference/pkgs.html#upload-stable

Cheers,

-- 
Seb



Bug#983090: python-django: CVE-2021-23336

2021-02-22 Thread Sébastien Delafond
On 19/02 09:25, Chris Lamb wrote:
> > Django is vulnerable because it embeds parse_qsl:
> > 
> >   https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
> 
> Security team, let me know if you would like an update for stable.

Hi Chris,

we think this should rather go via s-p-u.

Cheers,

-- 
Seb



Bug#982493: openvswitch: CVE-2020-35498

2021-02-15 Thread Sébastien Delafond
On 12/02 16:07, Thomas Goirand wrote:
> Please find the attached debdiff for the upload to security-master.

Hi Thomas,

this looks good, please upload to security-master.

Cheers,

-- 
Seb



Bug#980585: ruby-in-parallel: FTBFS: ERROR: Test "ruby2.7" failed: Failure/Error: expect(@result_3).to_not eq(true)

2021-01-20 Thread Sébastien Delafond
On 21/01 12:46, Utkarsh Gupta wrote:
> I can create an issue in the original fork. However, just know that
> this library is *not* being maintained at all. So there won't be much
> help from anywhere.

I'm not expecting upstream to fix it either, but it'd feel more
comfortable to close this bug on our side while still linking to an
existing upstream issue.

> Either way, I'd also like to mention that we did a build for
> ruby-in-parallel against ruby3.0 and everything seems to work,
> including those tests as well.

Ideally we'd only skip this test in 2.x, while keeping it in 3.0 to see
if same race eventually pops up on debci.

Cheers,

-- 
Seb



Bug#980585: ruby-in-parallel: FTBFS: ERROR: Test "ruby2.7" failed: Failure/Error: expect(@result_3).to_not eq(true)

2021-01-20 Thread Sébastien Delafond
On 21/01 12:31, Utkarsh Gupta wrote:
> Aah, okay. So I ran sbuild + autopkgtest 10 times, all passed for me.
> But when I ran these tests locally with rake, it failed for me exactly
> like the report just for the first time. And then passed all 9 times
> afterward.

I haven't been able to reproduce it here: local rake, autopkgtest+lxc,
autopkgtest+qemu.

> Then I tried to trace back the origin of this problem but couldn't
> find anything. I am not sure what's causing this (I haven't gone
> through the source thoroughly) but I am inclined towards skipping this
> test if that's OK with you?

It definitely looks like a race, so I agree we can skip it if we create
an upstream bug documenting the issue.

Cheers,

-- 
Seb



Bug#980585: ruby-in-parallel: FTBFS: ERROR: Test "ruby2.7" failed: Failure/Error: expect(@result_3).to_not eq(true)

2021-01-20 Thread Sébastien Delafond
Hi Utkarsh,

since you took care of the last upload, do you also plan to fix this
FTBFS? If not, please let me know and I'll look into it.

Cheers,

-- 
Seb



Bug#977537: odoo: Use JS libraries already packaged in Debian

2021-01-03 Thread Sébastien Delafond
Here's upstream's take on the problematic items in this list:

> use libjs-jquery-form

The version in Debian is too old right now, and won't work properly.

> libjs-underscore

The version in Debian is more recent, and needs to be validated.

> libjs-cropper

Different upstreams:

  Odoo: 1.5.5 from https://github.com/fengyuanchen/cropperjs
  Debian: 1.2.2 from 
http://www.defusion.org.uk/code/javascript-image-cropper-ui-using-prototype-scriptaculous/

The rest of the libjs warnings should be fine.



Bug#947431: xerces-c: CVE-2018-1311: use-after-free vulnerability processing external DTD

2020-12-12 Thread Sébastien Delafond
On 11/12 18:59, Sylvain Beucler wrote:
> I did more tests during the past few hours (checking that
> XERCES_DISABLE_DTD does address the memory leak and using a couple
> reverse dependencies) and just uploaded the buster update to security
> master.

I've just rejected this upload, so you can reuse deb10u1 once the test
suite is fixed on 32bit architectures.

Cheers,

-- 
Seb



Bug#947431: xerces-c: CVE-2018-1311: use-after-free vulnerability processing external DTD

2020-12-10 Thread Sébastien Delafond
On 09/12 17:46, Sylvain Beucler wrote:
> Here's a debdiff against buster.
> 
> The testsuite passes, provided we modify MemHandlerTest1 to take the
> leak into account.

Hi Sylvain,

thanks for the debdiff, it looks good and the trade-off makes sense. You
can upload to security-master and I'll take care of the DSA soon.

Cheers,

-- 
Seb


PS: please try to cc:secur...@debian.org when asking questions to the
team in the BTS, as this will help keeping them high up on our radar.



Bug#973562: wordpress: Wordpress 5.5.2 security release

2020-11-02 Thread Sébastien Delafond
On 02/11 08:01, Craig Small wrote:
> Wordpress versions less than 5.5.2 have the following security
> vulnerabilities:
> 
> CVE-2020-28039: Protected meta that could lead to arbitrary file deletion.
> CVE-2020-28035: XML-RPC privilege escalation.
> CVE-2020-28036: XML-RPC privilege escalation.
> CVE-2020-28032: Hardening deserialization requests.
> CVE-2020-28037: DoS attack could lead to RCE.
> CVE-2020-28038: Stored XSS in post slugs.
> CVE-2020-28033: Disable spam embeds from disabled sites on a multisite 
> network.
> CVE-2020-28034: Cross-Site Scripting (XSS) via global variables.
> CVE-2020-28040: CSRF attacks that change a theme's background image.

Hi Craig,

are you planning on backporting the fixes for those on top of buster's
5.0.10+dfsg1-0+deb10u1?

Cheers,

-- 
Seb



Bug#971591: Please update testinfra to 5.3.0

2020-10-29 Thread Sébastien Delafond
On 27/10 16:20, Baptiste Beauplat wrote:
> I've just been given out the access on salsa. Ready to welcome
> testinfra :)

Done:

  https://salsa.debian.org/python-team/packages/testinfra

Cheers,

-- 
Seb



Bug#971591: Please update testinfra to 5.3.0

2020-10-26 Thread Sébastien Delafond
On 23/10 17:11, Baptiste Beauplat wrote:
> Sure. I initially suggested debian because I'm not in the python
> team. I guess that will be the opportunity to join in :)

All right; can you let me know once you've joined, and then we can see
about transferring it there?

Cheers,

-- 
Seb



Bug#971591: Please update testinfra to 5.3.0

2020-10-23 Thread Sébastien Delafond
On 15/10 09:30, Baptiste Beauplat wrote:
> From what I can see on the package tracker, testinfra hasn't been very
> active packaging wise. No source upload have been done and the package
> hasn't migrated to testing, since 2019.
> 
> I do believe that having testinfra in a Debian stable release would be
> quite useful and so, if you are short in time to maintain that
> package, I'm offering to adopt and maintain it with your approbation.
> 
> If you are interested, would you consider moving the repository to the
> debian/ namespace on salsa and granting me the maintainer right (as
> lyknode, I'm not a DD yet). I'm CC'ing my usual sponsor for info.

We'll happily hand the package over to you, however python-modules is
probably a better namespace than debian. Do you agree?

Cheers,

-- 
Seb



Bug#947187: Unmaintained

2020-10-02 Thread Sébastien Delafond
tag 947187 + wontfix
close 947187
thanks

This is now unmaintained upstream:

  Note: As of June 2020 I do not have time to maintain this repository
  anymore and I've thus made it read-only.

FTR, here's where I was with the packaging (the package itself could be
built, but dh_test failed):

  https://github.com/sdelafond/cistern/tree/debian/master

Cheers,

-- 
Seb



Bug#968497: fixed in astra-toolbox 1.8.3-2

2020-09-02 Thread Sébastien Delafond
On 02/09 09:23, Gianfranco Costamagna wrote:
> source only uploads for non-free are a sad story...

Ah, forgot about that again.

> I'll try to upload the binary shortly!

Do you want me to do that today?

Cheers,

-- 
Seb



Bug#969371: hdf5plugin

2020-09-01 Thread Sébastien Delafond
Upstream uses hdf5plugin, but it can be patched out in 2 lines once
https://salsa.debian.org/alteholz/bitshuffle/-/merge_requests/1 is
merged.



Bug#959180: tornado6

2020-06-18 Thread Sébastien Delafond
I plan on testing whether relaxing the constraint plus including 902ef59
is enough to get the current version of mitmproxy running with tornado6.

If that doesn't work, I'll look into packaging 5.1.1.

Cheers,

-- 
Seb



Bug#962323: python-django: CVE-2020-13254 CVE-2020-13596

2020-06-16 Thread Sébastien Delafond
On 15/06 10:49, Chris Lamb wrote:
> > The full debdiffs are attached. Can you especially check the
> > versioning scheme and distribution fields for me? I often get this
> > wrong and end up confusing myself. Really appreciated.
> 
> They are now attached.

They look fine, please upload to security-master.

Cheers,

-- 
Seb



Bug#962323: python-django: CVE-2020-13254 CVE-2020-13596

2020-06-09 Thread Sébastien Delafond
On 06/06 10:15, Chris Lamb wrote:
> > python-django: CVE-2020-13254 CVE-2020-13596
> 
> Security team, would you like an update for stretch and/or buster to
> address these issues? It's fixed in sid, experimental as well as
> jessie LTS. Bullseye is just pending migration time AFAICT.

Hi Chris,

yes, that'd be fine. Is there any chance you could also piggyback the
fix for CVE-2020-9402 (marked "postponed") on top of the ones for
CVE-2020-13254 and CVE-2020-13596?

Cheers,

-- 
Seb



Bug#950198: ring

2020-06-04 Thread Sébastien Delafond
Hi Alexandre,

I noticed opendht 2.1 is now in sid. Is there anything I can do to help
with the next steps, however you see fit?

Cheers,

-- 
Seb



Bug#950198: restinio

2020-05-06 Thread Sébastien Delafond
On 04/05 10:31, Sébastien Delafond wrote:
> > I add a basic d/salsa-ci.yml, that should tell us what's going on.
> 
> All the unit tests are passing in salsa:
> 
>   https://salsa.debian.org/debian/restinio/-/jobs/717236#L1500

Hi Alexandre,

in the current state, do you think I should upload restinio to NEW?

Cheers,

-- 
Seb



Bug#950198: restinio

2020-05-04 Thread Sébastien Delafond
On 04/05 09:18, Sébastien Delafond wrote:
> I re-ran the build this morning from the repository you created, and it
> passes here in sbuild; TTBOMK it's only binding its test router to
> 127.0.0.1, and not trying to reach anything outside, but I may be
> missing something.
> 
> I add a basic d/salsa-ci.yml, that should tell us what's going on.

All the unit tests are passing in salsa:

  https://salsa.debian.org/debian/restinio/-/jobs/717236#L1500

Cheers,

-- 
Seb



Bug#950198: restinio

2020-05-04 Thread Sébastien Delafond
On 03/05 19:40, Alexandre Viau wrote:
> Also, I notice that the package's Changelog already has two entries,
> but was it even uploaded once? Should it say UNRELEASED instead, until
> it is uploaded, or should I understand that it was uploaded?

This was my mistake, it should have said UNRELEASED as I definitely did
not upload the package. I just changed that.

> Action item before we can upload:
>  - Agree where the package will be maintained (hopefully thats over -
> debian/restinio)

Agreed.

>  - If we run the tests, they should pass (or was it my machine?)

I re-ran the build this morning from the repository you created, and it
passes here in sbuild; TTBOMK it's only binding its test router to
127.0.0.1, and not trying to reach anything outside, but I may be
missing something.

I add a basic d/salsa-ci.yml, that should tell us what's going on.

Cheers,

-- 
Seb



Bug#957071: fixed-upstream

2020-04-27 Thread Sébastien Delafond
Control: tag -1 fixed-upstream

Fixed by https://github.com/CCExtractor/ccextractor/pull/1226, merged on
master.

Cheers,

-- 
Seb



Bug#950198: restinio

2020-04-27 Thread Sébastien Delafond
On 27/04 13:13, Felix Salfelder wrote:
> I hope it is more clear now, how I prefer to use the small tarball
> over running the tests, as a matter of principle

It was perfectly clear the first time, and this is where we can agree to
disagree. Starting on this project I had a couple of goals, and what's
in my salsa repository right now achieves the three of them:

 - copyright-clean
 - runs the upstream tests
 - should pass NEW

As I don't intend to maintain restinio in the long run, I don't feel the
need to argue this any further, and will happily defer to Alexandre's
opinion.

Cheers,

-- 
Seb



Bug#950198: restinio

2020-04-27 Thread Sébastien Delafond
On 27/04 11:02, Felix Salfelder wrote:
> >   - salsa-ci
> > 
> >   - open an issue upstream to integrate my two cmake patches for the
> > scenario "build a release without shipping binaries, yet
> > insist on running the tests during our build"
> 
> I will see what I can do about these.

Before you go ahead on any of this, please let's wait for Alexandre's
input.

> Something else that might need work.
> 
> The freshly imported tarball (0.6.6) contains an embedded dev/asio
> directory, which does not exist in the upstream repository, nor was it
> in the 0.6.4 tarball. I understand that this copy is unnecessary. But
> some test is compiled with -I${top_srcdir}/dev/asio/include.
> 
> The embedded asio does not coincide with libasio-dev in sid,
> 1:1.12.2-1.  Imo (and I am certainly clueless here) this may lead to
> questionable test results. Technically, We may need to depend on a
> specific libasio-dev.

Definitely not; instead we'd patch the corresponding CMakeLists to
compile against the system-wide asio. As for the 2 above points, let's
wait on Alexandre to see if he thinks this should delay the upload to
NEW.

> The source of this is, upstream is offering multiple tarballs, one
> with third party packages included. This also explains some of
> Sébastiens additions to the copyright file.

Some of them, yes. But there wasn't really any effort put into coming up
with a proper d/copyright with 0.6.4, as my initial "git grep -i
copyright upstream/0.6.4" led me to conclude.

> As of version 0.6.4, none of the additional headers were required for
> either for building opendht or jami.

But the whole point is, they are required to run the unit tests.

> I have imported the smaller tarball and rebased Sébastiens
> commits. It's in my master branch now [1]. I'm afraid the package does
> no longer build, and I am unsure how to proceed.

I'm not sure what to tell you here, except that this operation was
indeed bound to fail.

> My gut feeling is that the small tarball is the correct one, (although
> I can see the other one listed in d/watch), and that the tests should
> be compiled against installed packages, if at all.

I am unsure where your gut feeling comes from: the smaller package is OK
to simply use as an include in a development project. OTOH when building
the Debian package, we're definitely interested in running the
upstream-provided unit tests during a regular build.

Cheers,

-- 
Seb



Bug#950198: restinio

2020-04-27 Thread Sébastien Delafond
I've pushed my version of restinio's packaging to
https://salsa.debian.org/seb/restinio's master branch. I started from
Felix's initial effort, but a lot of things were missing:

  - d/copyright severely lacking

  - missing build-deps (most notably on cmake) initially prevented
building as-is in a clean chroot

  - reworked/removed patches to cmake: initial patch had a "CMakeLists
hacks; no idea what they are trying to do" comment associated to
various changes in upstream CMakeLists. I changed that hack, which
was aimed at "just building the package", so that we now run the
full suite of unit tests provided by upstream (needed to upgrade to
upstream version to 0.6.6 to fully implement that)

Let me know if you want me to upload what I've got now to NEW.

So we don't forget, here are a couple of items we'll want to fix later
on:

  - salsa-ci

  - open an issue upstream to integrate my two cmake patches for the
scenario "build a release without shipping binaries, yet
insist on running the tests during our build"

Cheers,

-- 
Seb



Bug#954050: RFS: persist-el/0.4+dfsg-1 [ITP] -- persist variables between Emacs Sessions

2020-04-21 Thread Sébastien Delafond
On 21/04 20:23, Thomas Koch wrote:
> I just uploaded persist-el. Thank you and sorry for the delay.

As I had announced in my previous email, I already did that; see msg=19
of #954050, and
https://ftp-master.debian.org/new/persist-el_0.4+dfsg-1.html.

I'll most definitely be out of your way for the next uploads of
persist-el.

Cheers,

-- 
Seb



Bug#950198: 950198

2020-04-12 Thread Sébastien Delafond
On 07/04 14:06, Alexandre Viau wrote:
> - https://bugs.debian.org/950198

Hi Alexandre,

I will look into Felix's packaging of restinio soon.

Cheers,

-- 
Seb



Bug#954050: RFS: persist-el/0.4+dfsg-1 [ITP] -- persist variables between Emacs Sessions

2020-04-12 Thread Sébastien Delafond
On 11/04 06:31, Nicholas D Steeves wrote:
> #947017 "ITP: org-drill" is blocked by this RFS (#954050) for a
> required dependency (persist-el).  Please sponsor at your earliest
> convenience to we can resume progress on getting org-drill back into
> Debian.

Hello,

I have very little bandwidth these days, so if Thomas has some to handle
this mentoring request, that would work out best. If not, I will try to
find some time next week-end to do a one-time review and upload of
persist-el. Thomas, can you let us know what you think?

Cheers,

-- 
Seb



Bug#954614: 954614

2020-03-30 Thread Sébastien Delafond
block 954614 by 954572
thanks

This is due to #954572: since ruby-method-source got bumped to 1.0.0,
the requirements for ruby-pry-byebug are not satisfiable anymore. Since
puppet-beaker depend on that, it also fails to run its tests. Ultimately
the solution is to fix #955340.

Cheers,

-- 
Seb



Bug#711554: pyhst2

2020-03-23 Thread Sébastien Delafond
retitle -1 ITP: pyhst2 -- Python High Speed Tomographic reconstruction
tag -1 + pending
owner -1 s...@debian.org
thanks



Bug#723017: xrayutilities: changing from RFP to ITP

2020-03-13 Thread Sébastien Delafond
retitle 723017 ITP: xrayutilities -- Python x-ray data reduction and analysis
owner 723017 s...@debian.org
tag 723017 + pending
thanks



Bug#951458: no-dsa

2020-02-21 Thread Sébastien Delafond
Hi Axel,

for the record, the Security Team doesn't think this warrants a DSA.

Cheers,

-- 
Seb



Bug#948491: centengine crashes regulary

2020-01-09 Thread Sébastien Delafond
On 09/01 14:24, Pascal Vibet - ADACIS wrote:
> I have an seg-fault in centengine process
> [...]

Hi Pascal,

thanks for opening this; could you report it upstream at
https://github.com/centreon/centreon-engine/issues/ ?

Cheers,

-- 
Seb



Bug#947017: [ATT seb] Re: Bug#947017: RFP: org-drill -- emacs self-learning mode with spaced repetition

2020-01-08 Thread Sébastien Delafond
On 08/01 09:56, tho...@koch.ro wrote:
> I intend to start using org-drill again once it is in Debian.
> I've never sponsored yet, but I'm a DD now and should learn how to do it.
> So I can upload.

Perfect: it's a much better solution than me uploading it.

Cheers,

-- 
Seb



Bug#947017: [ATT seb] Re: Bug#947017: RFP: org-drill -- emacs self-learning mode with spaced repetition

2020-01-07 Thread Sébastien Delafond
On 07/01 15:07, Nicholas D Steeves wrote:
> Since you're the elpa-org-mode maintainer Would you like to package
> org-drill, which was broken out into its own project for org-mode 9.3
> (possibly earlier)?
> 
> Failing that, could I add you as an uploader?  I'm happy to do the
> work to package it, but I don't want to be the only person responsible
> for something that I don't use ;-)

Hi Nicholas,

I'm OK to be listed as an uploader, but let me state right now that I
don't use org-drill either :)

Cheers,

-- 
Seb



Bug#947287: python3-certifi: ships useless cacert.pem file

2019-12-23 Thread Sébastien Delafond
On 24/12 00:19, Thorsten Glaser wrote:
> While the package is patched to return the system location,
> it still ships /usr/lib/python3/dist-packages/certifi/cacert.pem
> which causes the .deb to be larger than it must.
> 
> Furthermore it might lead people to believe using that bundle
> is acceptable by hardcoding a path to it.

That cacert.pm is 275KB, and I believe it's important that people have
it readily available should they choose to run comparisons or what not
with the upstream cert store. README.Debian describes this somewhat
accurately I believe (although it could probably be rephrased, patches
welcome) but at this point I don't think I want to remove upstream's
cert store.

Before tagging this wontfix, however, I'm of course open to hearing
further arguments.

Cheers,

-- 
Seb



Bug#944819: docker-based tests

2019-11-24 Thread Sébastien Delafond
Hi Antonio,

the solution currently implemented does indeed test the installed
package: it will install it using
/etc/apt/sources.list.d/autopkgtest.list, and run the entire upstream
test suite against that. You are right that all of this happens in a
docker container.

This is because that all the dependencies and requirements for that test
suite to run are a bit complex, and upstream's solution uses docker for
setting all that up: our initial implementation therefore chose that as
well.

There is however an ongoing effort to rewrite it shell, so as to
directly use the underlying host. Once that effort is complete, disk
usage shouldn't be a problem anymore on the debci workers.

Cheers,

-- 
Seb



Bug#941530: jackson-databind: CVE-2019-16942 CVE-2019-16943

2019-10-03 Thread Sébastien Delafond
On 02/10 09:43, Salvatore Bonaccorso wrote:
> Whilst I'm not yet sure if we should really release a futher DSA for
> jackson-databind (we will come back to you on that), a possible idea
> for bullseye (might be better cloned/filled as new bug, but want to
> mention it here already):

Let's do a DSA for this one. For future issues, we can choose to decide
on DSA vs. point release on a case-by-case basis, depending on severity.

Cheers,

-- 
Seb



Bug#933929: python-rtslib-fb < 2.1.69 prevents ceph-iscsi from being uploaded to unstable

2019-09-16 Thread Sébastien Delafond
Hello,

just a quick follow-up to let you know that this bug is still preventing
ceph-iscsi from being uploaded to sid. As such, I'm again offering my
help if you think the version bump itself is OK, but you don't have
enough time to take care of it.

Cheers,

-- 
Seb



Bug#939626: Upstream

2019-09-11 Thread Sébastien Delafond
Upstream indicates that:

  We are working actively on that subject. So the next release of
  centreon-broker won't need qt4 nor qt5. Qt will be completely removed
  from it. We hope this change to be finish for the next release of
  Centreon.

This is targetted for 19.10, to be released in October 2019.



Bug#934356: stretch-pu: package mitmproxy/0.18.2-6

2019-08-28 Thread Sébastien Delafond
I've tried a bunch of things, essentially reusing my older
pbuilder-based build setup (as opposed to the newer sbuild-based one),
to no avail: I keep getting those extra upper-bound versioned
dependencies in the resulting package.

At this point I see two options:

  - build a +deb9u2 that uses debian/pydist-overrides to prevent the
insertion of those extra versioned dependencies (see attached
patch); with that one, the resulting dsc debdiff is minimal:

$ debdiff mitmproxy_0.18.2-6_all.deb mitmproxy_0.18.2-6+deb9u2_all.deb  


 [seb hulk]
File lists identical (after any substitutions)

Control files: lines which differ (wdiff format)

Version: [-0.18.2-6-] {+0.18.2-6+deb9u2+}

  - give up on fixing #934356 in the upcoming point release

What do you think ?

Cheers,

-- 
Seb
diff --git a/debian/changelog b/debian/changelog
index 4fcb7218..a714bb37 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,9 @@
+mitmproxy (0.18.2-6+deb9u2) stretch; urgency=medium
+
+  * Prevent insertion of unwanted upper-bound versioned dependencies
+
+ -- Sebastien Delafond   Wed, 28 Aug 2019 13:04:01 +0200
+
 mitmproxy (0.18.2-6+deb9u1) stretch; urgency=medium
 
   * Blacklist tests that require internet access (Closes: #934033)
diff --git a/debian/pydist-overrides b/debian/pydist-overrides
index 144dfb3a..49405aa3 100644
--- a/debian/pydist-overrides
+++ b/debian/pydist-overrides
@@ -1 +1,5 @@
 brotlipy python-brotli
+cryptography python-cryptography (>= 1.3)
+flask python-flask (>= 0.10.1)
+pyasn1 python-pyasn1 (>= 0.1.9)
+six python-six (>= 1.10)


Bug#934356: stretch-pu: package mitmproxy/0.18.2-6

2019-08-26 Thread Sébastien Delafond
On 26/08 17:42, Adam D. Barratt wrote:
> Our tooling has highlighted a dependency issue. I've not had chance to
> check if it already existed in the earlier package, but:
> 
>   unsat-dependency: python-cryptography (< 1.6)
> 
> stretch has python-cryptography 1.7.1

This is a regression somewhere in the build process; 0.18.2-6 in stretch
currently has (sorted alphabetically for easier reading):

  Depends:
  python-backports.ssl-match-hostname,
  python-blinker (<< 1.5),
  python-brotli (>= 0.5.1),
  python-certifi,
  python-click,
  python-configargparse (>= 0.10),
  python-construct (>= 2.5.2),
  python-cryptography (>= 1.3),
  python-cssutils (<< 1.1),
  python-flask (>= 0.10.1),
  python-h2 (>= 2.4.1),
  python-hpack,
  python-html2text (>= 2016.1.8),
  python-hyperframe (<< 5),
  python-jsbeautifier (>= 1.6.3),
  python-lxml (>= 3.5.0),
  python-openssl (>= 16.0),
  python-passlib (>= 1.6.5),
  python-pil (>= 3.2),
  python-pyasn1 (>= 0.1.9),
  python-pyparsing (>= 2.1.3),
  python-pyperclip,
  python-requests (>= 2.9.1),
  python-six (>= 1.10),
  python-tornado (>= 4.3),
  python-typing
  python-urwid (>= 1.3.1),
  python-watchdog (>= 0.8.3),
  python:any (<< 2.8),
  python:any (>= 2.7.5-5~),

0.18.2-6+deb9u1 has:

  Depends:
  python-backports.ssl-match-hostname,
  python-blinker (<< 1.5),
  python-brotli (>= 0.5.1),
  python-certifi,
  python-click,
  python-configargparse (>= 0.10),
  python-construct (>= 2.5.2),
  python-cryptography (<< 1.6),
  python-cryptography (>= 1.3),
  python-cssutils (<< 1.1),
  python-flask (<< 0.12),
  python-flask (>= 0.10.1),
  python-h2 (>= 2.4.1),
  python-hpack,
  python-html2text (>= 2016.1.8),
  python-hyperframe (<< 5),
  python-jsbeautifier (>= 1.6.3),
  python-lxml (>= 3.5.0),
  python-openssl (>= 16.0),
  python-passlib (>= 1.6.5),
  python-pil (>= 3.2),
  python-pyasn1 (<< 0.2),
  python-pyasn1 (>= 0.1.9),
  python-pyparsing (>= 2.1.3),
  python-pyperclip,
  python-requests (>= 2.9.1),
  python-six (<< 1.11),
  python-six (>= 1.10),
  python-tornado (>= 4.3),
  python-typing
  python-urwid (>= 1.3.1),
  python-watchdog (>= 0.8.3),
  python:any (<< 2.8),
  python:any (>= 2.7.5-5~),

At this point I'm not sure what part of the build chain is adding back
all the "python foo (<< .n.m)" (obviously during the expansion of
${python:Depends}, and by looking at setup.py), even though python-foo
is already explicitly listed in debian/control's Depends field.

Even more confusing to me right now is that the whole point of 0.18.2-6
was indeed to *remove* all those upper-bound dependencies:

  - https://bugs.debian.org/848562
  - 
https://salsa.debian.org/debian/mitmproxy/commit/4c238cb3549b9bf5e7b01a9c287eb2428a7134d2

And obviously at the time it worked, because 0.18.6-2 is indeed
"correct".

Cheers,

-- 
Seb



Bug#934026: python-django: CVE-2019-14232 CVE-2019-14233 CVE-2019-14234 CVE-2019-14235

2019-08-10 Thread Sébastien Delafond
On 08/08 11:02, Chris Lamb wrote:
> +python-django (1:1.10.7-2+deb9u5) stretch-security; urgency=high
> [...]
> +python-django (1:1.11.23-1~deb10u1) buster-security; urgency=high

Thanks, these both look good; please upload to security-master.

Cheers,

-- 
Seb



Bug#934026: python-django: CVE-2019-14232 CVE-2019-14233 CVE-2019-14234 CVE-2019-14235

2019-08-07 Thread Sébastien Delafond
On 06/08 10:20, Chris Lamb wrote:
> Security team (added to CC), would you be interested in uploads for
> buster (currently 1:1.11.22-1~deb10u1) and stretch (currently
> 1:1.10.7-2+deb9u5)?

Hi Chris,

yes, thank you. Can you email us debdiffs ? I'll then take care of the
review and DSAs.

Cheers,

-- 
Seb



Bug#931383: Add man page

2019-07-03 Thread Sébastien Delafond
Hello,

upstream doesn't ship one, and I unfortunately do not have the time to
write it myself. If someone does, and also commits to keeping it
synchronized with upstream releases, I'll include it in the package.

Cheers,

-- 
Seb



Bug#927164: py3status: missing dependency

2019-04-15 Thread Sébastien Delafond
On 15/04 21:31, Alessandro -oggei- Ogier wrote:
> I'd like to point out that package in fact depends on file(1)
> and when that package isnt installed py3status fails with an error.
> 
> Since on a freshly installed Debian system file package is not an
> essential, this dependency should be explicitly listed.

Could you be kind enough to include the error/traceback you get ?

Cheers,

-- 
Seb



Bug#907495: please ship the x11idle binary

2019-03-27 Thread Sébastien Delafond
On 27/03 09:26, Michal Politowski wrote:
> Actually I think there is no need to compile x11idle.  As the footnote
> https://orgmode.org/manual/Resolving-idle-time.html#DOCF82 says,
> Debian already provides xprintidle, which seems to work for me.
> 
> Maybe elpa-org could just suggest that package and change the default
> for org-clock-x11idle-program-name?

Hi Michal,

that's a good point, and sounds like an elegant way to solve this in
Debian. I'm pretty busy these days, so I won't have time to work on that
right now, but I'd happily accept a patch in the meantime :)

Cheers,

-- 
Seb



Bug#921725: libu2f-host: CVE-2018-20340

2019-02-11 Thread Sébastien Delafond
On Feb/09, Nicolas Braud-Santoni wrote:
> Ah, I was bitten in the arse by #884428 again.
> The upload to security-master should now be fine  :)
> 
> Sorry for accidentally duplicating your work, I didn't realise you had
> prepared a backported fix for stable before the issue went public :)

Thanks for being responsive on that issue; the DSA just went out.

Cheers,

-- 
Seb


signature.asc
Description: PGP signature


Bug#921725: libu2f-host: CVE-2018-20340

2019-02-09 Thread Sébastien Delafond
On Feb/08, Nicolas Braud-Santoni wrote:
> I backported the fix and prepared an upload.
> The debdiff is attached, and the commands used to produced it are documented 
> below.
> 
> May I proceed with an upload to security-master?

It looks OK to me, so if it passes testing on your end please upload to
security-master (don't forget to use -sa as it will be new there).

Cheers,

-- 
Seb



Bug#921726: libu2f-host: CVE-2018-20340

2019-02-08 Thread Sébastien Delafond
Package: libu2f-host
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for libu2f-host.

CVE-2018-20340[0]:
Unchecked buffer in libu2f-host before 1.1.7 ...

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-20340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20340

Please adjust the affected versions in the BTS as needed.



Bug#888903: [Pkg-javascript-devel] Bug#888903: 888903

2019-01-31 Thread Sébastien Delafond
On Jan/31, Jonas Smedegaard wrote:
> The underlying issue is that the "js" in python-jsbeautifier stands
> for JavaScript, and python-jsbeautifier fail to properly expose the
> JavaScript part of the project as a shared library!
> 
> The straightforward solution is for python-jsbeautifier to also build
> libjs-beautify and node-beautify!

I unfortunately do not have the available bandwidth to work on that, and
I'm not also not particularly interested in maintaining any node-*
stuff.

I'm however totally fine with someone taking over python-jsbeautifier
and doing just that.

Cheers,

-- 
Seb



Bug#888903: 888903

2019-01-31 Thread Sébastien Delafond
To me the straightforward solution here is not dpkg-alternative, but
what Ivo recommended, since it only involves modifying *one* package.

Cheers,

-- 
Seb



Bug#917200: Fixed

2019-01-10 Thread Sébastien Delafond
https://salsa.debian.org/qt-kde-team/qt/pyside2/merge_requests/2



Bug#917001: MR

2019-01-02 Thread Sébastien Delafond
Here is the corresponding MR:

  https://salsa.debian.org/python-team/modules/python-twilio/merge_requests/1

Cheers,

-- 
Seb



Bug#915765: MR

2019-01-02 Thread Sébastien Delafond
Here is the corresponding MR:

  
https://salsa.debian.org/python-team/modules/pystaticconfiguration/merge_requests/1

Cheers,

-- 
Seb



Bug#915765: FTBFS with pytest 3.10

2018-12-14 Thread Sébastien Delafond
Control: forwarded -1 
Control: tag -1 + upstream

Let's wait a bit for upstream's take on this issue, that was triggered
when pytest 3.10 entered unstable last month. If need be, we could
disable TestConfigurationWatcher::* when building the python2 package.

Cheers,

-- 
Seb



Bug#893723: 1.9.10 closing 4 bugs

2018-12-12 Thread Sébastien Delafond
Hi fellows,

I've got a 1.9.10 nagvis package ready in salsa[0], that fixes four of
the currently open bugs including this one. I've also manually included
1:1.7.10+dfsg1-3.2, which wasn't present in the salsa repository.

Would you like an actual MR ? I'm also attaching a debdiff of debian/*
to this report, and pasting the corresponding changelog here:

  ,
  | Source: nagvis
  | Version: 1:1.9.10-1
  | Distribution: unstable
  | Urgency: medium
  | Maintainer: Sebastien Delafond 
  | Timestamp: 1544597179
  | Date: Wed, 12 Dec 2018 07:46:19 +0100
  | Closes: 858042 893723 903369 903706
  | Changes:
  |  nagvis (1:1.9.10-1) unstable; urgency=medium
  |  .
  |[ Bas Couwenberg ]
  |* Team upload.
  |* Update watch file for move to GitHub.
  |* Bump Standards-Version to 4.2.1, no changes.
  |  .
  |[ Sebastien Delafond ]
  |* NMU
  |* Imported Debian patch 1:1.7.10+dfsg1-3.2
  |* Update php-gettext link
  |* Add Files-Excluded to debian/copyright, even though those files are
  |  gone in 1.9.x: this will make further repacking more straightforward,
  |  should it be needed
  |* Add repacksuffix to debian/watch
  |* New upstream version 1.9.10 (Closes: #893723, #903706)
  |* Use db_stop at the end of postinst (Closes: #858042)
  |* Add pt_BR translation (Closes: #903369)
  |* Update Vcs-* URLs to point to salsa
  `

Unless you object, I plan on uploading this to delayed/10 later this
week: the RC bug is 9 months old, and the last uploads of nagvis are all
quite old and were all NMUs as well.

Cheers,

-- 
Seb

[0] https://salsa.debian.org/seb/pkg-nagvis
diff --git a/debian/changelog b/debian/changelog
index 3d2348a2..bcd3fec8 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,25 @@
+nagvis (1:1.9.10-1) unstable; urgency=medium
+
+  [ Bas Couwenberg ]
+  * Team upload.
+  * Update watch file for move to GitHub.
+  * Bump Standards-Version to 4.2.1, no changes.
+
+  [ Sebastien Delafond ]
+  * NMU
+  * Imported Debian patch 1:1.7.10+dfsg1-3.2
+  * Update php-gettext link
+  * Add Files-Excluded to debian/copyright, even though those files are
+gone in 1.9.x: this will make further repacking more straightforward,
+should it be needed
+  * Add repacksuffix to debian/watch
+  * New upstream version 1.9.10 (Closes: #893723, #903706)
+  * Use db_stop at the end of postinst (Closes: #858042)
+  * Add pt_BR translation (Closes: #903369)
+  * Update Vcs-* URLs to point to salsa
+  
+ -- Sebastien Delafond   Wed, 12 Dec 2018 07:46:19 +0100
+
 nagvis (1:1.7.10+dfsg1-3.2) UNRELEASED; urgency=medium
 
   * Non-maintainer upload.
diff --git a/debian/control b/debian/control
index ea96db7a..3f07e28f 100644
--- a/debian/control
+++ b/debian/control
@@ -8,10 +8,10 @@ Uploaders: Markus Frosch ,
 Build-Depends: debhelper (>= 7.0.50~),
quilt,
po-debconf
-Standards-Version: 3.9.5
+Standards-Version: 4.2.1
 Homepage: http://www.nagvis.org
-Vcs-Git: git://anonscm.debian.org/pkg-nagios/pkg-nagvis.git
-Vcs-Browser: 
http://anonscm.debian.org/gitweb/?p=pkg-nagios/pkg-nagvis.git;a=summary
+Vcs-Git: https://salsa.debian.org/nagios-team/pkg-nagvis.git
+Vcs-Browser: https://salsa.debian.org/nagios-team/pkg-nagvis
 
 Package: nagvis
 Architecture: all
diff --git a/debian/copyright b/debian/copyright
index 9a80d868..e5d43b49 100644
--- a/debian/copyright
+++ b/debian/copyright
@@ -1,6 +1,7 @@
 Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
 Upstream-Name: NagVis
 Source: http://sourceforge.net/projects/nagvis/files/
+Files-Excluded: uifx share/netmap/shell.html share/netmap/shell.swf 
share/netmap/modules/gmap
 
 Files: *
 Copyright: Copyright 2007-2013, Lars Michelsen 
diff --git a/debian/nagvis.links b/debian/nagvis.links
index 2a2622e0..f00b2429 100644
--- a/debian/nagvis.links
+++ b/debian/nagvis.links
@@ -3,7 +3,7 @@
 /usr/share/nagvis/docs /usr/share/nagvis/share/docs
 /etc/nagvis/usr/share/nagvis/etc
 /var/cache/nagvis /usr/share/nagvis/var
-/usr/share/php/php-php-gettext 
/usr/share/nagvis/share/server/core/ext/php-gettext-1.0.9
+/usr/share/php/php-php-gettext 
/usr/share/nagvis/share/server/core/ext/php-gettext-1.0.12
 /usr/share/nagvis/defaults/nagvis.ini.php-sample 
/usr/share/doc/nagvis/nagvis.ini.php-sample
 /usr/share/nagvis/defaults/apache2-nagvis.conf-sample 
/usr/share/doc/nagvis/apache2-nagvis.conf-sample
 etc/nagvis/apache2.conf etc/apache2/conf-available/nagvis.conf
diff --git a/debian/nagvis.postinst b/debian/nagvis.postinst
old mode 100644
new mode 100755
index 4220b70e..c5243614
--- a/debian/nagvis.postinst
+++ b/debian/nagvis.postinst
@@ -198,6 +198,8 @@ case "$1" in
 ;;
 esac
 
+db_stop
+
 # dh_installdeb will replace this with shell code automatically
 # generated by other debhelper scripts.
 
diff --git a/debian/patches/config.patch b/debian/patches/config.patch
index e056f9f6..27cb63af 100644
--- a/debian/patches/config.patch
+++ b/debian/patches/config.pat

Bug#893723: 893723

2018-12-11 Thread Sébastien Delafond
Control: tag -1 + upstream
Control: forwarded -1 https://github.com/NagVis/nagvis/issues/79

This has apparently been closed in "recent releases", although upstream
doesn't mention when that happened exactly. Scouring through git log, it
appears to be in this commit:

  commit da8746985d21b517a66ec8795a672192e4551b49
  Author: Lars Michelsen 
  Date:   Fri Apr 22 13:18:48 2016 +0200

FIX: Fixed some compatibility issues with PHP 7. NagVis should work with it.

This would make 1.9b7 the first release containing the fix.

Cheers,

-- 
Seb



Bug#910228: NMU

2018-12-05 Thread Sébastien Delafond
Hi,

I just uploaded ruby-gitlab 4.5.0-2 to DELAYED/10. Don't hesitate to
cancel or reschedule it if you need to.

Cheers,

--Seb



Bug#888011: #888011

2018-12-04 Thread Sébastien Delafond
Python3 package, plus upstream bump to 0.3.7, available at:

  https://github.com/sdelafond/python-jenkinsapi

Would you be willing to share or hand over maintenance of this package,
ideally on salsa ?

Cheers,

-- 
Seb



Bug#910228: Renaming to /usr/bin/ruby-gitlab

2018-11-27 Thread Sébastien Delafond
https://salsa.debian.org/ruby-team/ruby-gitlab/merge_requests/1



Bug#912106: test_auth_aws_region

2018-11-26 Thread Sébastien Delafond
The test_auth_aws_region test tries to make an actual HTTP request, it
should be disabled in debian/rules.

Cheers,

-- 
Seb



Bug#910228: /usr/bin/ruby-gitlab

2018-11-26 Thread Sébastien Delafond
I'm OK with ruby-gitlab shipping /usr/bin/ruby-gitlab and
/usr/share/man/man1/ruby-gitlab.1.gz, so unless someone disagrees I will
do that this week.

Cheers,

-- 
Seb



Bug#910088: python-pyperclip: please provide a backport of python-pyperclip

2018-10-02 Thread Sébastien Delafond
On Oct/02, Mattia Rizzolo wrote:
> Could you please provide a stretch-backports of python-pyperclip?
> 
> If you wish, I'm happy to build such backport myself.

Yes, that will be fine: please do !

Cheers,

--Seb



Bug#907495: 907495

2018-09-09 Thread Sébastien Delafond
Sure, shipping this as a separate binary package makes sense. A patch
would be most welcome.

Cheers,

--Seb



Bug#725408: org-mode-doc_9.1.14-1_amd64.changes ACCEPTED into unstable

2018-08-23 Thread Sébastien Delafond
On Aug/23, Nicholas D Steeves wrote:
> Is that wrong info page bug still valid?  It just occured to me that
> it should be possible to add a few lines to the elpa-org-mode that
> rebinds infopath to put org-mode-doc ahead of emacs' built-in when
> elpa-org-mode is loaded.
> 
> If the non emacs bin/info is the issue, then there might be some kind
> of dh hook that could be used.

That bug was still valid last time I checked, yes: re-reading the bug
history[0], the problem is indeed only with info(1), and emacs's own
info mode seem to always do the right thing. I unfortunately don't have
much time these days to try and investigate this some more...

Cheers,

--Seb

[0] https://bugs.debian.org/725408



Bug#906976: mitmproxy: FTBFS in buster/sid

2018-08-22 Thread Sébastien Delafond
Control: retitle -1 FTBFS in buster
Control: tags -1 - sid + buster
thanks

In sid it builds fine during the 1st run, as shown here:

  
https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/mitmproxy.html

The 2nd reproducible run fails because of the "date in the future"
thing: since the unit tests use a live example.mitmproxy.org host, there
are certificate issues when simulating a 09/2019 date.

However, your FTBFS in buster is not caused by that, as confirmed here:

  
https://tests.reproducible-builds.org/debian/rb-pkg/buster/amd64/mitmproxy.html

Something in the dependencies must be causing this error; I'll look into
it.

Cheers,

--Seb



Bug#906236: openssh: CVE-2018-15473: delay bailout for invalid authenticating user until after the packet

2018-08-21 Thread Sébastien Delafond
On Aug/21, Chris Lamb wrote:
>  a) You will take the lead on stable/DSA.
>  b) I'll carry on with LTS, etc.

Yes.

--Seb



Bug#906236: openssh: CVE-2018-15473: delay bailout for invalid authenticating user until after the packet

2018-08-21 Thread Sébastien Delafond
On Aug/19, Chris Lamb wrote:
> Would the security team be interested in one for stretch? If so, I can
> return with a proposed debdiff.

Sorry, missed your email about this. I'm actually done with the patch on
my end.

Cheers,

--Seb



Bug#865505: php-horde-image 2.3.6-1+deb9u1 (CVE-2017-9773, CVE-2017-9774 & CVE-2017-14650)

2018-08-16 Thread Sébastien Delafond
On Jun/23, Chris Lamb wrote:
> I've prepared an upload to fix the following:
> 
>  php-horde-image (2.3.6-1+deb9u1) stretch-security; urgency=high
>   
>   * CVE-2017-9773: [...]
> 
>   * CVE-2017-9774: [...]
> 
>   * CVE-2017-14650: [...]
>   
> The full debdiff is attached. Please let me know if it is okay to
> upload.

Hi Chris,

it looks OK to me, please upload to security-master.

Cheers,

--Seb



Bug#903325: delayed/10

2018-08-03 Thread Sébastien Delafond
Hi,

I have just uploaded blinker 1.4+dfsg1-0.2, fixing this FTBFS, to
DELAYED/10. Don't hesitate to cancel or reschedule it if you need to.

Cheers,

--Seb



Bug#887332: 887332

2018-07-19 Thread Sébastien Delafond
On Jul/19, Bastien wrote:
> > For reference, upstream change is:
> > https://code.orgmode.org/bzg/org-mode/commit/b186d1d7236c0dc397eadeb004c9a17eaffd3aab
> 
> I've received this email with no context -- can you tell me more about
> this issue at stake?

Hi Bastien,

this was Debian bug #887332 :

  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887332

Cheers,

--Seb



Bug#725408: org-mode 8 info does not show up in info index

2018-06-25 Thread Sébastien Delafond
On Jun/25, Nicholas D Steeves wrote:
> I looked up this bug as soon as I remembered that I'd been neglecting
> it for some time--thankfully I hadn't set myself as owner.

Hi Nicholas,

a quick test in unstable shows that:

  * with emacs25 installed but not emacs25-common-non-dfsg, both info(1)
and info-mode from emacs find the org-mode-doc's version of the
manual, as they should.

  * with emacs25-common-non-dfsg also installed, info(1) reverts back to
only finding the manual for 8.2.9.

> Does this bug still occur with unflavoured emacs from experimental?
> https://packages.debian.org/experimental/emacs 

  * with emacs-common-non-dfsg from experimental installed, and
emacs25-common-non-dfsg not install, info(1) still unfortunately
finds the manual for 8.2.9.

Cheers,

--Seb



Bug#894423: mlbviewer: No longer works starting in 2018

2018-06-24 Thread Sébastien Delafond
On Jun/25, Andreas Beckmann wrote:
> On Fri, 30 Mar 2018 08:41:38 +0200 Sebastien Delafond 
> wrote:
> > mlbviewer no longer works, starting in 2018[0]. A new implementation
> > is in the works[1], with corresponding instructions[2]. It will be
> > packaged later, but in the meantime I've filed #894422 to remove
> > mlbviewer from unstable.
> 
> Should the unusable package be removed from stable as well?

Yes, it might as well be.

Cheers,

--Seb



Bug#902032: aptly: please provide an aptly-api service

2018-06-22 Thread Sébastien Delafond
On Jun/21, Alexandre Viau wrote:
> I would like to add that I am willing to provide a patch that
> implements this.

That'd be most welcome !

> However, I would only start working on it after aptly is moved to
> dh-golang to avoid merging issues. See bug #902038 for that.

I've just merged your patch, and uploaded 1.3.0-2 with it. Thanks a lot
for that :)

Cheers,

--Seb



Bug#901036: no rm

2018-06-08 Thread Sébastien Delafond
Actually, that won't be possible: dam rm shows libspring-java among
other rdeps. We'll just stick with the EOL in debian-security-support.

Cheers,

--Seb



Bug#897613: RM: redmine/3.0~20140825-8~deb8u4

2018-05-04 Thread Sébastien Delafond
On May/03, Adam D. Barratt wrote:
> There's a few r-deps. Walking the tree gives us:
> 
> - redmine-plugin-pretend
> - redmine-plugin-recaptcha
> - redmine-recaptcha
> 
> I assume the intent is that those also be removed.

That is correct, sorry for not mentioning the r-deps initially.

Cheers,

--Seb



  1   2   3   >