Bug#898175: dwarf-fortress: The shortcut of Dwarf Fortress does not work

2018-05-11 Thread Serge Le Tyrant
Package: dwarf-fortress
Version: 0.44.10-1
Followup-For: Bug #898175

I imagine I'm not alone in using the i386 architecture (even though we are
fewer and fewer).

Thank you for your time and your work.

Greetings
Serge.



-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Foreign Architectures: 64, x32, 32

Kernel: Linux 4.16.0-1-686-pae (SMP w/8 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages dwarf-fortress depends on:
ii  dwarf-fortress-data 0.44.10-1
ii  libc6   2.27-3
ii  libgcc1 1:8.1.0-1
ii  libglib2.0-02.56.1-2
ii  libglu1-mesa [libglu1]  9.0.0-2.1
ii  libgtk2.0-0 2.24.32-1
ii  libsdl-image1.2 1.2.12-8
ii  libsdl-ttf2.0-0 2.0.11-4
ii  libsdl1.2debian 1.2.15+dfsg2-0.1
ii  libstdc++6  8.1.0-1
ii  python3 3.6.5-3
ii  python3-xdg 0.25-4
ii  unionfs-fuse1.0-1+b1

dwarf-fortress recommends no packages.

dwarf-fortress suggests no packages.

-- no debconf information



Bug#898175: dwarf-fortress: The shortcut of Dwarf Fortress does not work

2018-05-08 Thread Serge Le Tyrant
Package: dwarf-fortress
Version: 0.44.10-1
Severity: important
Tags: patch

To make it functional, please add this line in the shortcut :
LD_PRELOAD=/usr/lib/i386-linux-gnu/libz.so /usr/games/dwarf-fortress

(Dwarf Fortress does not work without libz.so)

Thanks



-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Foreign Architectures: 64, x32, 32

Kernel: Linux 4.16.0-1-686-pae (SMP w/8 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages dwarf-fortress depends on:
ii  dwarf-fortress-data 0.44.10-1
ii  libc6   2.27-3
ii  libgcc1 1:8.1.0-1
ii  libglib2.0-02.56.1-2
ii  libglu1-mesa [libglu1]  9.0.0-2.1
ii  libgtk2.0-0 2.24.32-1
ii  libsdl-image1.2 1.2.12-8
ii  libsdl-ttf2.0-0 2.0.11-4
ii  libsdl1.2debian 1.2.15+dfsg2-0.1
ii  libstdc++6  8.1.0-1
ii  python3 3.6.5-3
ii  python3-xdg 0.25-4
ii  unionfs-fuse1.0-1+b1

dwarf-fortress recommends no packages.

dwarf-fortress suggests no packages.

-- no debconf information



Bug#276655: synaptic: 'lock version' harmful; another suggestion : replace with apt-mark hold

2018-02-22 Thread Serge Le Tyrant
Package: synaptic
Version: 0.84.2
Followup-For: Bug #276655

I have reported the bug #890668 about unattended-upgrades package
In it's recent version (0.99), this package upgrade all Debian packages (not
only security packages) even if they are blocked on Synaptic.

The maintainer of this package tells me to use :
apt-mark hold 
to hold a package.

I suggest to use this function on Synaptic



-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Foreign Architectures: 64, x32, 32

Kernel: Linux 4.15.0-1-686-pae (SMP w/8 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages synaptic depends on:
ii  hicolor-icon-theme   0.17-1
ii  libapt-inst2.0   1.6~alpha7
ii  libapt-pkg5.01.6~alpha7
ii  libatk1.0-0  2.26.1-3
ii  libc62.26-6
ii  libcairo-gobject21.15.10-1
ii  libcairo21.15.10-1
ii  libept1.5.0  1.1+nmu3+b1
ii  libgcc1  1:8-20180218-1
ii  libgdk-pixbuf2.0-0   2.36.11-1
ii  libglib2.0-0 2.54.3-2
ii  libgnutls30  3.5.18-1
ii  libgtk-3-0   3.22.28-1
ii  libpango-1.0-0   1.40.14-1
ii  libpangocairo-1.0-0  1.40.14-1
ii  libpcre2-8-0 10.22-6
ii  libstdc++6   8-20180218-1
ii  libvte-2.91-00.50.2-4
ii  libx11-6 2:1.6.4-3
ii  libxapian30  1.4.5-1
ii  policykit-1  0.105-18
ii  zlib1g   1:1.2.8.dfsg-5

Versions of packages synaptic recommends:
ii  libgtk2-perl   2:1.24992-1+b1
ii  rarian-compat  0.8.1-6+b1
ii  xdg-utils  1.1.2-1

Versions of packages synaptic suggests:
ii  apt-xapian-index 0.49
ii  deborphan1.7.28.8-0.3+b1
pn  dwww 
ii  menu 2.1.47+b1
ii  software-properties-gtk  0.96.20.2-1
ii  tasksel  3.43

-- no debconf information



Bug#890668: unattended-upgrades: All Debian packages are updated (not only Debian-Security) including blocked packages

2018-02-17 Thread Serge Le Tyrant
Package: unattended-upgrades
Version: 0.99
Severity: important
Tags: d-i

With unattended-upgrades 0.99: All Debian packages are updated (not only
Debian-Security) including blocked packages

I don't wan't to upgrade Tellico 3.1-0.3, because the last version (3.1.1-0.1)
has an annoying bug (sorry i don't report it). So i have blocked this 3.1-0.3
version on Synaptic.

I hadn't this probleme before this 0.99 version (upgraded on the 02.10.2018)

/etc/apt/apt.conf.d/10periodic (i never edited it) :
APT::Periodic::Update-Package-Lists "0";
APT::Periodic::Unattended-Upgrade "1";
APT::Periodic::Download-Upgradeable-Packages "1";
APT::Periodic::AutocleanInterval "0";

If i understand Debian Wiki correctly :
APT::Periodic::Download-Upgradeable-Packages "1" mean Do "apt-get upgrade
--download-only" so unattended-upgrades must only download upgradable packages,
and not to update all the system, and let alone update blocked packets.

This can cause a severe malfunction of my system if I dont want to update a
kernel or a library whose top version does not work

In /var/log/unattended-upgrades :
(...)
2018-02-17 08:21:24,977 INFO Paquets initialement sur la liste noire:
2018-02-17 08:21:24,997 INFO Paquets initialement sur la liste blanche:
2018-02-17 08:21:24,997 INFO Démarrage du script de mise à niveau automatique
2018-02-17 08:21:24,997 INFO Les origines permises sont:
[‘origin=Debian,codename=sid,label=Debian’,
‘origin=Debian,codename=sid,label=Debian-Security’]
2018-02-17 08:21:46,799 INFO Paquets initialement sur la liste noire:
2018-02-17 08:21:46,800 INFO Paquets initialement sur la liste blanche:
2018-02-17 08:21:46,800 INFO Démarrage du script de mise à niveau automatique
2018-02-17 08:21:46,801 INFO Les origines permises sont:
[‘origin=Debian,codename=sid,label=Debian’,
‘origin=Debian,codename=sid,label=Debian-Security’]
2018-02-17 08:21:57,915 INFO Paquets mis à niveau: tellico tellico-data
tellico-doc tellico-scripts
2018-02-17 08:21:57,915 INFO Écriture du journal de dpkg dans «
/var/log/unattended-upgrades/unattended-upgrades-dpkg.log »
2018-02-17 08:25:11,516 INFO Toutes les mises à niveau ont été installées
(...)
2018-02-12 17:30:45,179 INFO Paquets mis à niveau: corebird tellico tellico-
data tellico-doc tellico-scripts
(…)
2018-02-14 17:56:53,341 INFO Paquets mis à niveau: tellico tellico-data
tellico-doc tellico-scripts

I can reproduce this bug on my system easily.



-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Foreign Architectures: 64, x32, 32

Kernel: Linux 4.14.0-3-686-pae (SMP w/8 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages unattended-upgrades depends on:
ii  debconf [debconf-2.0]  1.5.65
ii  lsb-base   9.20170808
ii  lsb-release9.20170808
ii  python33.6.4-1
ii  python3-apt1.4.0~beta3+b1
ii  ucf3.0037
ii  xz-utils   5.2.2-1.3

Versions of packages unattended-upgrades recommends:
ii  anacron 2.3-24
ii  cron [cron-daemon]  3.0pl1-128.1

Versions of packages unattended-upgrades suggests:
pn  bsd-mailx 
pn  mail-transport-agent  
pn  needrestart   

-- Configuration Files:
/etc/apt/apt.conf.d/50unattended-upgrades changed:
// Unattended-Upgrade::Origins-Pattern controls which packages are
// upgraded.
//
// Lines below have the format format is "keyword=value,...".  A
// package will be upgraded only if the values in its metadata match
// all the supplied keywords in a line.  (In other words, omitted
// keywords are wild cards.) The keywords originate from the Release
// file, but several aliases are accepted.  The accepted keywords are:
//   a,archive,suite (eg, "stable")
//   c,component (eg, "main", "contrib", "non-free")
//   l,label (eg, "Debian", "Debian-Security")
//   o,origin(eg, "Debian", "Unofficial Multimedia Packages")
//   n,codename  (eg, "jessie", "jessie-updates")
// site  (eg, "http.debian.net")
// The available values on the system are printed by the command
// "apt-cache policy", and can be debugged by running
// "unattended-upgrades -d" and looking at the log file.
//
// Within lines unattended-upgrades allows 2 macros whose values are
// derived from /etc/debian_version:
//   ${distro_id}Installed origin.
//   ${distro_codename}  Installed codename (eg, "buster")
Unattended-Upgrade::Origins-Pattern {
// Codename based matching:
// This will follow the migration of a release through different
// archives (e.g. from testing to stable and later oldstable).
// Software will be the latest available for the named release,
// but the Debian release itself will not be automatically upgraded.
//