Bug#935552: marked as pending in nomad

2019-10-19 Thread Dmitry Smirnov
Control: tag -1 pending

Hello,

Bug #935552 in nomad reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/go-team/packages/nomad/commit/977675c3e209c75e1008bc4bc75382353c26e304


Fixed FTBFS (Closes: #935552).


(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/935552



Processed: Bug#935552 marked as pending in nomad

2019-10-19 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 pending
Bug #935552 [src:nomad] nomad: FTBFS
Added tag(s) pending.

-- 
935552: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935552
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#942237: fiat: autopkgtest needs update for new version of pytest

2019-10-19 Thread Drew Parsons
Package: python3-fiat
Version: 2019.1.0-2
Followup-For: Bug #942237

Upstream does have a patch, but it requires a new package pytest_cases.

There was some debate upstream about whether it would be better to
prepare the tests without needing to depend on the new package. I'm
waiting for that debate to resolve.

Drew



Bug#942674: Acknowledgement (git: FTBFS on big-endian targets - testsuite failure)

2019-10-19 Thread John Paul Adrian Glaubitz
Control: tags -1 +patch

The attached patch fixes the problem for me. It comes from [1].

Thanks,
Adrian

> [1] https://www.spinics.net/lists/git/msg368292.html

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer - glaub...@debian.org
`. `'   Freie Universitaet Berlin - glaub...@physik.fu-berlin.de
  `-GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913
From: SZEDER =?utf-8?B?R8OhYm9y?= 
To: John Paul Adrian Glaubitz ,
	Junio C Hamano 
Cc: Todd Zullinger , g...@vger.kernel.org
Subject: [PATCH] test-progress: fix test failures on big-endian systems

On Sat, Oct 19, 2019 at 11:38:40PM +0200, John Paul Adrian Glaubitz wrote:
> The testsuite is failing again on s390x and all other big-endian targets in
> Debian. For a full build log on s390x see [1].

Gah, my progress display fixes strike again...

I think the patch below should fix it, but I could only test it on
little-endian systems.  Could you please confirm that it indeed works
on big-endian as well?


  --- >8 ---

Subject: [PATCH] test-progress: fix test failures on big-endian systems

In 't0500-progress-display.sh' all tests running 'test-tool progress
--total=' fail on big-endian systems, e.g. like this:

  + test-tool progress --total=3 Working hard
  [...]
  + test_i18ncmp expect out
  --- expect	2019-10-18 23:07:54.765523916 +
  +++ out	2019-10-18 23:07:54.773523916 +
  @@ -1,4 +1,2 @@
  -Working hard:  33% (1/3)
  -Working hard:  66% (2/3)
  -Working hard: 100% (3/3)
  -Working hard: 100% (3/3), done.
  +Working hard:   0% (1/12884901888)
  +Working hard:   0% (3/12884901888), done.

The reason for that bogus value is that '--total's parameter is parsed
via parse-options's OPT_INTEGER into a uint64_t variable [1], so the
two bits of 3 end up in the "wrong" bytes on big-endian systems
(12884901888 = 0x3).

Change the type of that variable from uint64_t to int, to match what
parse-options expects; in the tests of the progress output we won't
use values that don't fit into an int anyway.

[1] start_progress() expects the total number as an uint64_t, that's
why I chose the same type when declaring the variable holding the
value given on the command line.

Signed-off-by: SZEDER Gábor 
---
 t/helper/test-progress.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/t/helper/test-progress.c b/t/helper/test-progress.c
index 4e9f7fafdf..42b96cb103 100644
--- a/t/helper/test-progress.c
+++ b/t/helper/test-progress.c
@@ -29,7 +29,7 @@ void progress_test_force_update(void);
 
 int cmd__progress(int argc, const char **argv)
 {
-	uint64_t total = 0;
+	int total = 0;
 	const char *title;
 	struct strbuf line = STRBUF_INIT;
 	struct progress *progress;
-- 
2.24.0.rc0.472.ga6f06c86b4


Processed: Re: Bug#942674: Acknowledgement (git: FTBFS on big-endian targets - testsuite failure)

2019-10-19 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 +patch
Bug #942674 [src:git] git: FTBFS on big-endian targets - testsuite failure
Added tag(s) patch.

-- 
942674: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942674
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#942119: marked as done (libproxy: depends on mono for build-arch; mono not universally present)

2019-10-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Oct 2019 23:49:28 +
with message-id 
and subject line Bug#942119: fixed in libproxy 0.4.15-8
has caused the Debian Bug report #942119,
regarding libproxy: depends on mono for build-arch; mono not universally present
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
942119: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942119
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libproxy
Version: 0.4.15-7
Severity: serious
Justification: FTBFS on release architecture

src:libproxy recently gained a B-D-Arch on dh-sequence-cli which
depends on mono-utils, which isn’t available for the architectures
mips64el (release), alpha, hppa, hurd-i386, ia64, kfreebsd-amd64,
kfreebsd-i386, m68k, riscv64, sh4, sparc64, x32, and any new ones.

Please use mono only in B-D-Indep.

Thanks,
//mirabilos
-- 
tarent solutions GmbH
Rochusstraße 2-4, D-53123 Bonn • http://www.tarent.de/
Tel: +49 228 54881-393 • Fax: +49 228 54881-235
HRB 5168 (AG Bonn) • USt-ID (VAT): DE122264941
Geschäftsführer: Dr. Stefan Barth, Kai Ebenrett, Boris Esser, Alexander Steeg

**

Mit der tarent Academy bieten wir auch Trainings und Schulungen in den
Bereichen Softwareentwicklung, Agiles Arbeiten und Zukunftstechnologien an.

Besuchen Sie uns auf www.tarent.de/academy. Wir freuen uns auf Ihren Kontakt.

**
--- End Message ---
--- Begin Message ---
Source: libproxy
Source-Version: 0.4.15-8

We believe that the bug you reported is fixed in the latest version of
libproxy, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 942...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jeremy Bicha  (supplier of updated libproxy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 19 Oct 2019 19:37:24 -0400
Source: libproxy
Architecture: source
Version: 0.4.15-8
Distribution: unstable
Urgency: medium
Maintainer: Debian GNOME Maintainers 

Changed-By: Jeremy Bicha 
Closes: 942119
Changes:
 libproxy (0.4.15-8) unstable; urgency=medium
 .
   * Drop Build-Depends on dh-sequence-cli.
 Thanks to Simon McVittie (Closes: #942119)
Checksums-Sha1:
 92db0d3bc1f3fddee454622a199b86367b2965be 3454 libproxy_0.4.15-8.dsc
 4b64bfa8a0ee043bc3eb37e81e16be5f639dde59 11652 libproxy_0.4.15-8.debian.tar.xz
 2f423597a5d12155c6a0347f5ee2128c8c9f8091 19932 
libproxy_0.4.15-8_source.buildinfo
Checksums-Sha256:
 d2f715439f7a45b8678d945c6497de57fba6854273177ffa49fe1e9696ee64c8 3454 
libproxy_0.4.15-8.dsc
 19a161ec6e0ccfdd697bf8413418c4dc26208715e22bc85f0918a76094ec 11652 
libproxy_0.4.15-8.debian.tar.xz
 d21915fa13f91da885bbaa32519f1387f2e8deb1df8c145ce8bba7087adf107b 19932 
libproxy_0.4.15-8_source.buildinfo
Files:
 4cd35761239ab8b4c72c9b739d08c006 3454 libs optional libproxy_0.4.15-8.dsc
 1010006b88ee7c01c855561feb755679 11652 libs optional 
libproxy_0.4.15-8.debian.tar.xz
 a9fd13ab279eacd4176458c5d4ec7a57 19932 libs optional 
libproxy_0.4.15-8_source.buildinfo

-BEGIN PGP SIGNATURE-
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=SHal
-END PGP SIGNATURE End Message ---


Processed: Bug#942119 marked as pending in libproxy

2019-10-19 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 pending
Bug #942119 [src:libproxy] libproxy: depends on mono for build-arch; mono not 
universally present
Added tag(s) pending.

-- 
942119: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942119
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#942688: elixir-lang: tests fail randomly during build

2019-10-19 Thread Antonio Terceiro
Source: elixir-lang
Version: 1.9.1.dfsg-1.1
Severity: serious
Tags: ftbfs
Justification: fails to build from source

Hi,

The latest upload failed to build on a few architectures:

https://buildd.debian.org/status/package.php?p=elixir-lang&suite=sid

I tried building it locally and it worked. I then tried 10 builds in a
row, and 1 of them failed. So I suspect that builds will fail ~ 10% of
the time. Maybe if I tried more times I could have a better estimate, but
this seems relevant enough since it already failed on the buildd.

I have failures like this in past be caused by:

- implicit dependency on the order in which tests are run (does the
  elixir test suite randomizes the execution order?)
- timing issues and race conditions

The full build log for the failed build is attached. Note that the
failure I found does not match the ones that happened on the amd64 and
arm64 buildds. So not only the tests fail randomly, but the failure is
on different tests each time.

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'testing-debug'), (500, 
'unstable'), (500, 'testing'), (1, 'experimental-debug'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.2.0-3-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_CRAP
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8), 
LANGUAGE=pt_BR:pt:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled


elixir-lang_amd64-2019-10-19T23:09:13Z.build.gz
Description: application/gzip


signature.asc
Description: PGP signature


Bug#942119: marked as pending in libproxy

2019-10-19 Thread Jeremy Bicha
Control: tag -1 pending

Hello,

Bug #942119 in libproxy reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/gnome-team/libproxy/commit/54783bbd78a96c7c2fdb850be804a5f6c59c46dd


Drop Build-Depends on dh-sequence-cli

Closes: #942119
Thanks: Simon McVittie


(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/942119



Bug#941414: certificates about to expire

2019-10-19 Thread Florian Zumbiehl
Hi,

> In fact, the proposed "fix" I'm working on is to actually get the
> version that is currently in backports directly in the oldstable
> distribution, but I need to tweak it a bit as to do that I need to
> reintroduce the 'letsencrypt.sh' compatibility packages/scripts.

unfortunately, that version (0.6.2-2+deb10u1~bpo9+1) is not backwards
compatible with the current stretch version (0.3.1-3+deb9u2), in that it
deploys all challenges for a certificate at once, and only then submits the
verification requests for the individual host names. If you happen to
deploy challenges for multiple host names to the same location, that fails
because the last deployed challenge overwrites all other challenges in that
location, and the verification request for the first host name then causes
dehydrated to abort (also, without any useful error message).

For anyone facing the same problem: A (temporary) workaround I found was to
set HOOK_CHAIN=yes, which causes all challenges for a given domain to be
deployed in a single call to the hook script. If your hook script simply
ignores the additional parameters, that then causes only the first
challenge to actually be deployed, and thus the verification for the first
host name to succeed. Then you just have to re-run dehydrated until all the
host names have been verified.

Regards, Florian



Bug#938530: sphinxcontrib-actdiag: diff for NMU version 0.8.5-1.1

2019-10-19 Thread Sandro Tosi
Control: tags 938530 + patch


Dear maintainer,

I've prepared an NMU for sphinxcontrib-actdiag (versioned as 0.8.5-1.1). The 
diff
is attached to this message.

i've uploaded directly to unstable becaues it fixes a RC bug

Regards.

diff -Nru sphinxcontrib-actdiag-0.8.5/debian/changelog sphinxcontrib-actdiag-0.8.5/debian/changelog
--- sphinxcontrib-actdiag-0.8.5/debian/changelog	2016-10-31 19:58:04.0 -0400
+++ sphinxcontrib-actdiag-0.8.5/debian/changelog	2019-10-19 18:07:40.0 -0400
@@ -1,3 +1,10 @@
+sphinxcontrib-actdiag (0.8.5-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Drop python2 support; Closes: #938530
+
+ -- Sandro Tosi   Sat, 19 Oct 2019 18:07:40 -0400
+
 sphinxcontrib-actdiag (0.8.5-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru sphinxcontrib-actdiag-0.8.5/debian/control sphinxcontrib-actdiag-0.8.5/debian/control
--- sphinxcontrib-actdiag-0.8.5/debian/control	2016-10-31 19:58:02.0 -0400
+++ sphinxcontrib-actdiag-0.8.5/debian/control	2019-10-19 18:07:22.0 -0400
@@ -4,12 +4,6 @@
 Maintainer: Kouhei Maeda 
 Build-Depends: debhelper (>= 9.0.0),
dh-python,
-   python-all,
-   python-setuptools,
-   python-sphinx (>= 0.6),
-   python-blockdiag (>= 1.5.0),
-   python-actdiag (>= 0.5.3),
-   python-mock,
python3-all,
python3-setuptools,
python3-sphinx (>= 0.6),
@@ -17,21 +11,8 @@
python3-actdiag (>= 0.5.3),
python3-mock
 Standards-Version: 3.9.8
-X-Python-Version: 2.7
 Homepage: http://github.com/blockdiag/sphinxcontrib-actdiag
 
-Package: python-sphinxcontrib.actdiag
-Architecture: all
-Provides: ${python:Provides}
-Depends: ${misc:Depends}, ${python:Depends},
- python-blockdiag (>= 1.5.0),
- python-actdiag (>= 0.5.3),
- python-sphinx (>= 0.6)
-Description: Sphinx "actdiag" extension
- This package contains the actdiag Sphinx extension. This extension enable you
- to insert activity diagrams in your Sphinx document. This is a sphinx
- extension which render block diagrams by using python-actdiag.
-
 Package: python3-sphinxcontrib.actdiag
 Architecture: all
 Depends: ${misc:Depends}, ${python3:Depends},
diff -Nru sphinxcontrib-actdiag-0.8.5/debian/rules sphinxcontrib-actdiag-0.8.5/debian/rules
--- sphinxcontrib-actdiag-0.8.5/debian/rules	2014-11-22 12:00:08.0 -0500
+++ sphinxcontrib-actdiag-0.8.5/debian/rules	2019-10-19 18:07:36.0 -0400
@@ -8,12 +8,8 @@
 export PYBUILD_DISABLE=test
 
 %:
-	dh $@ --with python2,python3 --buildsystem=pybuild
+	dh $@ --with python3 --buildsystem=pybuild
 
 override_dh_python3:
 	dh_python3
 	find $(CURDIR)/debian/python3-sphinxcontrib.actdiag -name tests -a -type d | xargs rm -rf
-
-override_dh_python2:
-	dh_python2
-	find $(CURDIR)/debian/python-sphinxcontrib.actdiag -name tests -a -type d | xargs rm -rf


Processed: sphinxcontrib-actdiag: diff for NMU version 0.8.5-1.1

2019-10-19 Thread Debian Bug Tracking System
Processing control commands:

> tags 938530 + patch
Bug #938530 [src:sphinxcontrib-actdiag] sphinxcontrib-actdiag: Python2 removal 
in sid/bullseye
Added tag(s) patch.

-- 
938530: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=938530
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#942674: git: FTBFS on big-endian targets - testsuite failure

2019-10-19 Thread John Paul Adrian Glaubitz
Source: git
Version: 1:2.24.0~rc0-1
Severity: serious
Tags: ftbfs
Justification: fails to build from source
User: debian-s...@lists.debian.org
Usertags: s390x

Hi!

git currently fails to build from source on all big-endian targets due
to test suite failures. This includes powerpc, ppc64, sparc64 and s390x
which is why this bug has severity serious [1].

There have been testsuite failures on big-endian in the past before,
see [2]. I will also notify upstream.

Thanks,
Adrian

> [1] 
> https://buildd.debian.org/status/fetch.php?pkg=git&arch=s390x&ver=1%3A2.24.0%7Erc0-1&stamp=1571440098&raw=0
> [2] https://www.spinics.net/lists/git/msg363527.html

--
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer - glaub...@debian.org
`. `'   Freie Universitaet Berlin - glaub...@physik.fu-berlin.de
  `-GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913



Bug#941414: certificates about to expire

2019-10-19 Thread Mattia Rizzolo
On Sat, Oct 19, 2019 at 08:14:33PM +0200, Florian Zumbiehl wrote:
> Is there any plan to fix this bug before then, or will users have to work
> around this individually to avoid running into expired certificates? And if
> the latter, what is the recommended workaround? Is the current backports
> version usable?

The current version in stretch-backports is perfectly usable.  It also
moves to the v2 version of the ACME API, which is the only one that
Let's Encrypt now supports.

In fact, the proposed "fix" I'm working on is to actually get the
version that is currently in backports directly in the oldstable
distribution, but I need to tweak it a bit as to do that I need to
reintroduce the 'letsencrypt.sh' compatibility packages/scripts.

So, yes, if you are affected by this bug I recommended to just use the
version in stretch-backports.

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
More about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature


Bug#942667: cracklib2 ignores build failures

2019-10-19 Thread Matthias Klose

Package: src:cracklib
Version: 2.9.6-2
Severity: serious
Tags: sid bullseye

cracklib2 ignores build failures, not setting -e for all the loops iterating 
over python versions.  Seen with 3.8 as a supported python version.




Bug#942403: golang-github-hashicorp-raft breaks golang-github-canonicalltd-raft-membership autopkgtest

2019-10-19 Thread Pierre-Elliott Bécue
Le mardi 15 octobre 2019 à 21:08:17+0200, Paul Gevers a écrit :
> Hi,
> 
> On 15-10-2019 21:00, Paul Gevers wrote:
> > github.com/CanonicalLtd/raft-membership
> >dh_auto_test -O--buildsystem=golang
> > cd obj-x86_64-linux-gnu && go test -vet=off -v -p 2 
> > github.com/CanonicalLtd/raft-membership
> > # github.com/CanonicalLtd/raft-test/internal/network
> > src/github.com/CanonicalLtd/raft-test/internal/network/network.go:53:2: 
> > cannot use transport (type *eventTransport) as type raft.Transport in 
> > return argument:
> > *eventTransport does not implement raft.Transport (missing TimeoutNow 
> > method)
> > FAILgithub.com/CanonicalLtd/raft-membership [build failed]
> > dh_auto_test: cd obj-x86_64-linux-gnu && go test -vet=off -v -p 2 
> > github.com/CanonicalLtd/raft-membership returned exit code 2
> > make: *** [debian/rules:4: build] Error 255
> 
> By the way, this also looks very much like the error message in
> golang-github-canonicalltd-raft-test
> 
> Paul
> 
> https://ci.debian.net/data/autopkgtest/testing/amd64/g/golang-github-canonicalltd-raft-test/3142465/log.gz
> 
> github.com/CanonicalLtd/raft-test/internal/network
> # github.com/CanonicalLtd/raft-test/internal/network
> src/github.com/CanonicalLtd/raft-test/internal/network/network.go:53:2:
> cannot use transport (type *eventTransport) as type raft.Transport in
> return argument:
>   *eventTransport does not implement raft.Transport (missing TimeoutNow
> method)
> dh_auto_build: cd obj-x86_64-linux-gnu && go install
> -gcflags=all=\"-trimpath=/tmp/autopkgtest-lxc.bqaeo2pm/downtmp/autopkgtest_tmp/obj-x86_64-linux-gnu/src\"
> -asmflags=all=\"-trimpath=/tmp/autopkgtest-lxc.bqaeo2pm/downtmp/autopkgtest_tmp/obj-x86_64-linux-gnu/src\"
> -v -p 2 github.com/CanonicalLtd/raft-test
> github.com/CanonicalLtd/raft-test/internal/election
> github.com/CanonicalLtd/raft-test/internal/event
> github.com/CanonicalLtd/raft-test/internal/fsms
> github.com/CanonicalLtd/raft-test/internal/logging
> github.com/CanonicalLtd/raft-test/internal/network returned exit code 2

Dear Paul,

Thanks for the bug report.

It seems to me that this bug is caused by the current version of
golang-github-canonicalltd-raft-test in the archive.

I'll upload the latest version ASAP.

I'm not sure if I should reassign the bug to
golang-github-canonicalltd-raft-test , feel free to do so.

Cheers!

-- 
Pierre-Elliott Bécue
GPG: 9AE0 4D98 6400 E3B6 7528  F493 0D44 2664 1949 74E2
It's far easier to fight for one's principles than to live up to them.


signature.asc
Description: PGP signature


Processed: tagging 922566, tagging 922573, tagging 922578, tagging 922582, tagging 922579, tagging 922583 ...

2019-10-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 922566 + sid bullseye
Bug #922566 [src:actiona] FTBFS against opencv 4.0.1 (exp)
Added tag(s) sid and bullseye.
> tags 922573 + sid bullseye
Bug #922573 [src:darknet] FTBFS against opencv 4.0.1 (exp)
Added tag(s) bullseye and sid.
> tags 922578 + sid bullseye
Bug #922578 [src:eviacam] FTBFS against opencv 4.0.1 (exp)
Added tag(s) sid and bullseye.
> tags 922582 + sid bullseye
Bug #922582 [src:gmic] FTBFS against opencv 4.0.1 (exp)
Added tag(s) bullseye and sid.
> tags 922579 + sid bullseye
Bug #922579 [src:freeture] FTBFS against opencv 4.0.1 (exp)
Added tag(s) bullseye and sid.
> tags 922583 + sid bullseye
Bug #922583 [src:gst-plugins-bad1.0] FTBFS against opencv 4.0.1 (exp)
Added tag(s) bullseye and sid.
> tags 922584 + sid bullseye
Bug #922584 [src:limereg] FTBFS against opencv 4.0.1 (exp)
Added tag(s) bullseye and sid.
> tags 922585 + sid bullseye
Bug #922585 [src:mldemos] FTBFS against opencv 4.0.1 (exp)
Added tag(s) bullseye and sid.
> tags 922587 + sid bullseye
Bug #922587 [src:node-opencv] FTBFS against opencv 4.0.1 (exp)
Added tag(s) sid and bullseye.
> tags 922588 + sid bullseye
Bug #922588 [src:openalpr] FTBFS against opencv 4.0.1 (exp)
Added tag(s) sid and bullseye.
> tags 922590 + sid bullseye
Bug #922590 [src:php-facedetect] FTBFS against opencv 4.0.1 (exp)
Added tag(s) sid and bullseye.
> tags 922589 + sid bullseye
Bug #922589 [src:opencfu] FTBFS against opencv 4.0.1 (exp)
Added tag(s) sid and bullseye.
> tags 922591 + sid bullseye
Bug #922591 [src:ros-opencv-apps] FTBFS against opencv 4.0.1 (exp)
Added tag(s) bullseye and sid.
> tags 922592 + sid bullseye
Bug #922592 [src:ros-vision-opencv] FTBFS against opencv 4.0.1 (exp)
Added tag(s) sid and bullseye.
> tags 922593 + sid bullseye
Bug #922593 {Done: Bas Couwenberg } [src:saga] FTBFS 
against opencv 4.0.1 (exp)
Added tag(s) bullseye and sid.
> tags 922595 + sid bullseye
Bug #922595 [src:sdaps] FTBFS due to PDF compilation failure (against Opencv 
4.0.1)
Added tag(s) sid and bullseye.
> tags 922596 + sid bullseye
Bug #922596 [src:siril] FTBFS against opencv 4.0.1 (exp)
Added tag(s) bullseye and sid.
> tags 922600 + sid bullseye
Bug #922600 [src:visp] FTBFS against opencv 4.0.1 (exp)
Added tag(s) bullseye and sid.
> tags 915708 + sid bullseye
Bug #915708 [src:eviacam] eviacam FTBFS against opencv 3.4.4 in experimental
Added tag(s) sid and bullseye.
> tags 915712 + sid bullseye
Bug #915712 [src:php-facedetect] php-facedetect FTBFS against opencv 3.4.4 in 
experimental
Added tag(s) sid and bullseye.
> tags 915711 + sid bullseye
Bug #915711 [src:mldemos] mldemos FTBFS against opencv 3.4.4 in experimental
Added tag(s) bullseye and sid.
> tags 922569 + sid bullseye
Bug #922569 {Done: Mo Zhou } [src:caffe] FTBFS against 
opencv 4.0.1 (exp)
Added tag(s) sid and bullseye.
> tags 934868 + sid bullseye
Bug #934868 {Done: Yaroslav Halchenko } [pynwb] pynwb: 
Please drop python2 support
Added tag(s) sid and bullseye.
> tags 922570 + sid bullseye
Bug #922570 {Done: Debian FTP Masters } 
[src:caffe-contrib] FTBFS against opencv 4.0.1 (exp)
Added tag(s) sid and bullseye.
> tags 922574 + sid bullseye
Bug #922574 [src:digikam] FTBFS against opencv 4.0.1 (exp)
Added tag(s) sid and bullseye.
> tags 922586 + sid bullseye
Bug #922586 [src:mrpt] FTBFS against opencv 4.0.1 (exp)
Added tag(s) sid and bullseye.
> tags 922597 + sid bullseye
Bug #922597 {Done: Debian FTP Masters } 
[src:sitplus] FTBFS against opencv 4.0.1 (exp)
Added tag(s) sid and bullseye.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
915708: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915708
915711: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915711
915712: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915712
922566: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922566
922569: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922569
922570: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922570
922573: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922573
922574: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922574
922578: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922578
922579: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922579
922582: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922582
922583: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922583
922584: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922584
922585: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922585
922586: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922586
922587: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922587
922588: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922588
922589: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922589
922590: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922590
922591: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922591
922592: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922592
922593: https://bugs.debian.org/cgi-

Bug#941414: certificates about to expire

2019-10-19 Thread Florian Zumbiehl
Hi,

as the recommended strategy by LetsEncrypt is to renew certificates 30 days
before their expiry, and we are approaching 30 days since the change that
exposed this bug that thus is preventing certificate renewal since then,
certificates generated using dehydrated are going to start expiring in
about a week.

Is there any plan to fix this bug before then, or will users have to work
around this individually to avoid running into expired certificates? And if
the latter, what is the recommended workaround? Is the current backports
version usable?

Regards, Florian



Processed: seqdiag: diff for NMU version 0.9.5+dfsg-1.2

2019-10-19 Thread Debian Bug Tracking System
Processing control commands:

> tags 938466 + patch
Bug #938466 [src:seqdiag] seqdiag: Python2 removal in sid/bullseye
Added tag(s) patch.

-- 
938466: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=938466
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#938466: seqdiag: diff for NMU version 0.9.5+dfsg-1.2

2019-10-19 Thread Sandro Tosi
Control: tags 938466 + patch


Dear maintainer,

I've prepared an NMU for seqdiag (versioned as 0.9.5+dfsg-1.2). The diff
is attached to this message.

I've uploaded directly to unstable as it fixes an RC bug, and it's an NMU of
an NMU

Regards.

diff -Nru seqdiag-0.9.5+dfsg/debian/changelog seqdiag-0.9.5+dfsg/debian/changelog
--- seqdiag-0.9.5+dfsg/debian/changelog	2018-07-16 04:57:18.0 -0400
+++ seqdiag-0.9.5+dfsg/debian/changelog	2019-10-19 14:10:26.0 -0400
@@ -1,3 +1,10 @@
+seqdiag (0.9.5+dfsg-1.2) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Drop python2 support; Closes: #938466
+
+ -- Sandro Tosi   Sat, 19 Oct 2019 14:10:26 -0400
+
 seqdiag (0.9.5+dfsg-1.1) unstable; urgency=medium
 
   * Non-maintainer upload.
diff -Nru seqdiag-0.9.5+dfsg/debian/control seqdiag-0.9.5+dfsg/debian/control
--- seqdiag-0.9.5+dfsg/debian/control	2016-10-11 00:33:57.0 -0400
+++ seqdiag-0.9.5+dfsg/debian/control	2019-10-19 14:09:52.0 -0400
@@ -4,13 +4,7 @@
 Maintainer: Kouhei Maeda 
 Build-Depends: debhelper (>= 8.0.0),
dh-python,
-   python-all,
-   python-setuptools,
pep8 (>= 1.3),
-   python-nose,
-   python-unittest2,
-   python-reportlab,
-   python-blockdiag (>= 1.5.0),
python3-all,
python3-setuptools,
python3-pep8 (>= 1.3),
@@ -19,19 +13,8 @@
python3-blockdiag (>= 1.5.0),
fonts-vlgothic | fonts-japanese-gothic
 Standards-Version: 3.9.8
-X-Python-Version: 2.7
 Homepage: http://blockdiag.com/
 
-Package: python-seqdiag
-Architecture: all
-Provides: ${python:Provides}
-Depends: ${misc:Depends}, ${python:Depends},
- python-blockdiag (>= 1.5.0)
-Description: seqdiag generate sequence-diagram image file from spec-text file
- Generate sequence-diagram from dot like text with multilingualization for
- node-label. But this supports utf-8 only. And get some examples and generated
- images.
-
 Package: python3-seqdiag
 Architecture: all
 Depends: ${misc:Depends}, ${python3:Depends},
diff -Nru seqdiag-0.9.5+dfsg/debian/python-seqdiag.manpages seqdiag-0.9.5+dfsg/debian/python-seqdiag.manpages
--- seqdiag-0.9.5+dfsg/debian/python-seqdiag.manpages	2011-11-03 13:02:27.0 -0400
+++ seqdiag-0.9.5+dfsg/debian/python-seqdiag.manpages	1969-12-31 19:00:00.0 -0500
@@ -1 +0,0 @@
-seqdiag.1
diff -Nru seqdiag-0.9.5+dfsg/debian/rules seqdiag-0.9.5+dfsg/debian/rules
--- seqdiag-0.9.5+dfsg/debian/rules	2014-08-31 22:31:04.0 -0400
+++ seqdiag-0.9.5+dfsg/debian/rules	2019-10-19 14:10:11.0 -0400
@@ -7,7 +7,7 @@
 export PYBUILD_NAME=seqdiag
 
 %:
-	dh $@ --with python2,python3 --buildsystem=pybuild
+	dh $@ --with python3 --buildsystem=pybuild
 
 override_dh_python3:
 	dh_python3


Bug#942315: tcpdump: Version in oldoldstable is higher than oldstable and stable

2019-10-19 Thread Romain Francoise
On Thu, Oct 17, 2019 at 10:02 AM Moritz Muehlenhoff  wrote:
> IMHO for stretch-security/buster-security we should rather rebase the old
> 4.9.2ish packages to 4.9.3, given that it creates new system users etc.
> it seems not really suitable for a security update.

Ok, that is what I did. Review welcome:

https://people.debian.org/~rfrancoise/tcpdump/tcpdump_4.9.3-1~deb10u1_source.changes
https://people.debian.org/~rfrancoise/tcpdump/tcpdump_4.9.3-1~deb9u1_source.changes

Thanks.



Bug#942647: celery-batches: Incomplete debian/copyright, etc.

2019-10-19 Thread Chris Lamb
Source: celery-batches
Version: 0.2-1
Severity: serious
Justication: Policy §12.5
X-Debbugs-CC: ftpmas...@debian.org, deba...@debian.org, rodrilopez@gmail.com

Hi,

I just ACCEPTed celery-batches from NEW but the FTP team noticed docs/
has a different license not mentioned in debian/copyright.

This is in no way exhaustive so please check over the entire package
carefully and address these on your next upload.


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-



Processed: tagging 933642

2019-10-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 933642 + pending
Bug #933642 [devscripts] devscripts: leaves multiple test/uscan/server.py 
processes running after build
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
933642: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=933642
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: found 933642 in 2.19.4

2019-10-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> found 933642 2.19.4
Bug #933642 [devscripts] devscripts: leaves multiple test/uscan/server.py 
processes running after build
Marked as found in versions devscripts/2.19.4.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
933642: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=933642
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#942629: marked as done (golang-1.12: CVE-2019-17596: invalid public key causes panic in dsa.Verify)

2019-10-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Oct 2019 12:20:23 +
with message-id 
and subject line Bug#942629: fixed in golang-1.12 1.12.12-1
has caused the Debian Bug report #942629,
regarding golang-1.12: CVE-2019-17596: invalid public key causes panic in 
dsa.Verify
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
942629: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942629
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: golang-1.13
Version: 1.13.1-1
Severity: grave
Tags: security upstream
Control: clone -1 -2
Control: reassign -2 src:golang-1.12 1.12.10-1
Control: retitle -2 golang-1.13: CVE-2019-17596: invalid public key causes 
panic in dsa.Verify
Control: forwarded -1 https://github.com/golang/go/issues/34962
Control: forwarded -2 https://github.com/golang/go/issues/34961

Hi,

The following vulnerability was published for golang-1.13.

CVE-2019-17596[0]:
crypto/dsa: invalid public key causes panic in dsa.Verify

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-17596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17596
[1] https://github.com/golang/go/issues/34962
[2] https://github.com/golang/go/issues/34961
[3] https://github.com/golang/go/issues/34960

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: golang-1.12
Source-Version: 1.12.12-1

We believe that the bug you reported is fixed in the latest version of
golang-1.12, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 942...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dr. Tobias Quathamer  (supplier of updated golang-1.12 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 19 Oct 2019 13:51:14 +0200
Source: golang-1.12
Architecture: source
Version: 1.12.12-1
Distribution: unstable
Urgency: medium
Maintainer: Go Compiler Team 
Changed-By: Dr. Tobias Quathamer 
Closes: 942629
Changes:
 golang-1.12 (1.12.12-1) unstable; urgency=medium
 .
   * New upstream version 1.12.12
 - Remove patch 0003-arm64-arm64asm-recognise-ssbb-pssbb-mnemonics.patch,
   has been applied upstream.
 - crypto/dsa: invalid public key causes panic in dsa.Verify.
   Fixes CVE-2019-17596. Closes: #942629
   * Update Standards-Version to 4.4.1, no changes needed
Checksums-Sha1:
 5c4db0783e2f3ddf9f3bbb1a15b4a50282b45c00 2858 golang-1.12_1.12.12-1.dsc
 92172e71bbf60c1855b6ecbc747270ec0d89fd69 21980254 
golang-1.12_1.12.12.orig.tar.gz
 70cef2d325fc57c7adc84b2eab3965469727fe72 819 
golang-1.12_1.12.12.orig.tar.gz.asc
 6385dfce61a0982e8676835c465122871ba9e9ff 35816 
golang-1.12_1.12.12-1.debian.tar.xz
 ce629a856d9d3b9fc20b38036f68faa06b1ea30f 6559 
golang-1.12_1.12.12-1_amd64.buildinfo
Checksums-Sha256:
 3dcb95c42e9783a34d88aa85b859173d5b0d279a432922ce7db4906fdd477218 2858 
golang-1.12_1.12.12-1.dsc
 fcb33b5290fa9bcc52be3211501540df7483d7276b031fc77528672a3c705b99 21980254 
golang-1.12_1.12.12.orig.tar.gz
 430ae60dfd6757054a7db1ea3e39d362499b96e7d9b2490beb07706a305dddea 819 
golang-1.12_1.12.12.orig.tar.gz.asc
 d66b57069bea31fa60d75993bd2e166d155e70e373b3707b217db466b3939e60 35816 
golang-1.12_1.12.12-1.debian.tar.xz
 3a0f12464cf5c3f160068f1dffb323c8a6c29d3bc329578d4d0fb914453080b2 6559 
golang-1.12_1.12.12-1_amd64.buildinfo
Files:
 cc1a1ffe10b3afe291a8d7b694d83e66 2858 devel optional golang-1.12_1.12.12-1.dsc
 7524b954f00d8eaf34c5c08772c7944b 21980254 devel optional 
golang-1.12_1.12.12.orig.tar.gz
 dde5ef690f1be2c523e1476fe8788937 819 devel optional 
golang-1.12_1.12.12.orig.tar.gz.asc
 79bb772a5b22ecd2b25ad7b54712d761 35816 devel optional 
golang-1.12_1.12.12-1.debian.tar.xz
 76156b839fa63429c8d8c8ba529ade2e 6559 devel optional 
golang-1.12_1.12.12-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEE0cuPObxd7STF0seMEwLx8Dbr6xkFAl2q+t4ACgkQEwLx8Dbr
6xlY7w//WUpeB83qpLOFPIgm5jbycxxq+GoW3/VYSySIM+JED8E/txg4cjJQy3wQ
kog3VJ0oIJQvSlswWSV5m6WP0k5Tr0k6YjW4CKR09ztVQeWU8RIk2rehA2vRwnVN

Bug#942628: marked as done (golang-1.13: CVE-2019-17596: invalid public key causes panic in dsa.Verify)

2019-10-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Oct 2019 12:04:43 +
with message-id 
and subject line Bug#942628: fixed in golang-1.13 1.13.3-1
has caused the Debian Bug report #942628,
regarding golang-1.13: CVE-2019-17596: invalid public key causes panic in 
dsa.Verify
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
942628: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942628
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: golang-1.13
Version: 1.13.1-1
Severity: grave
Tags: security upstream
Control: clone -1 -2
Control: reassign -2 src:golang-1.12 1.12.10-1
Control: retitle -2 golang-1.13: CVE-2019-17596: invalid public key causes 
panic in dsa.Verify
Control: forwarded -1 https://github.com/golang/go/issues/34962
Control: forwarded -2 https://github.com/golang/go/issues/34961

Hi,

The following vulnerability was published for golang-1.13.

CVE-2019-17596[0]:
crypto/dsa: invalid public key causes panic in dsa.Verify

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-17596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17596
[1] https://github.com/golang/go/issues/34962
[2] https://github.com/golang/go/issues/34961
[3] https://github.com/golang/go/issues/34960

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: golang-1.13
Source-Version: 1.13.3-1

We believe that the bug you reported is fixed in the latest version of
golang-1.13, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 942...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dr. Tobias Quathamer  (supplier of updated golang-1.13 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 19 Oct 2019 13:30:36 +0200
Source: golang-1.13
Architecture: source
Version: 1.13.3-1
Distribution: unstable
Urgency: medium
Maintainer: Go Compiler Team 
Changed-By: Dr. Tobias Quathamer 
Closes: 942628
Changes:
 golang-1.13 (1.13.3-1) unstable; urgency=medium
 .
   * New upstream version 1.13.3
 - Refresh patch
 - crypto/dsa: invalid public key causes panic in dsa.Verify.
   Fixes CVE-2019-17596. Closes: #942628
   * Update Standards-Version to 4.4.1, no changes needed
Checksums-Sha1:
 ffd4f399be0b601b6d19f367423bb334408d00de 2848 golang-1.13_1.13.3-1.dsc
 1fdfd1586888d4d24f5dadee6016092f89e6049e 21618379 
golang-1.13_1.13.3.orig.tar.gz
 71354e37d6380fca61ee10a0922661fe8fe5c7b7 819 golang-1.13_1.13.3.orig.tar.gz.asc
 9282a793d3a750967c8825978dcd3c01ea7ccc59 34168 
golang-1.13_1.13.3-1.debian.tar.xz
 27ddba6e9c0e2edd4c5e2f76061aabd589de9a18 6542 
golang-1.13_1.13.3-1_amd64.buildinfo
Checksums-Sha256:
 1af77d2830097e986e50d8952a3d6c6bad60b1adec27d237d91c305d8b8e7d66 2848 
golang-1.13_1.13.3-1.dsc
 4f7123044375d5c404280737fbd2d0b17064b66182a65919ffe20ffe8620e3df 21618379 
golang-1.13_1.13.3.orig.tar.gz
 2a7c3786a48ec76790f780d35def629e8b773362ea1b85f4ebebd8538c55df91 819 
golang-1.13_1.13.3.orig.tar.gz.asc
 7c7cf2ffce8028eb1669748d60e5918b039940b0b093b29f9a297f854780a38c 34168 
golang-1.13_1.13.3-1.debian.tar.xz
 f2370a67c474fb3e5445ba84194bbfd98096c9d8bc9a157e2094169256354bd2 6542 
golang-1.13_1.13.3-1_amd64.buildinfo
Files:
 c322cf6fbc7352036701e050aef23bf8 2848 devel optional golang-1.13_1.13.3-1.dsc
 94ae8bf6a4fe623e34cb8b0db2a71ec0 21618379 devel optional 
golang-1.13_1.13.3.orig.tar.gz
 35a89bc604faed9bc3a2caba6d897b53 819 devel optional 
golang-1.13_1.13.3.orig.tar.gz.asc
 655497421e2ee72c9279614ea78b3b60 34168 devel optional 
golang-1.13_1.13.3-1.debian.tar.xz
 80911b1ba1224f109e26695d17fa14d2 6542 devel optional 
golang-1.13_1.13.3-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEE0cuPObxd7STF0seMEwLx8Dbr6xkFAl2q9uoACgkQEwLx8Dbr
6xmU6A/+O6L7UcbJqKjCDQ8EQRjGvKZIQlTDuqf0WWgp6JrYfKIgZB50MzNloVfH
2g08XH9N6uzJWdZs2DoR0P4XN9pG5jMJm8fgC5LMFrwQ7SmNV85OU4gu44Lh9yJm
+neon+D9GtD4MNy1VtKD+yVKZ+fmfeN5aF4wSTHaBxwGO78v05so+7EV7lJSorpi
QW2oNSCj6kTmZogOWuQgoCnDQCunTHVVKE8DE7Pxfvo4YKX

Bug#937745: marked as done (python-fabio: Python2 removal in sid/bullseye)

2019-10-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Oct 2019 11:49:24 +
with message-id 
and subject line Bug#937745: fixed in python-fabio 0.9.0+dfsg-2
has caused the Debian Bug report #937745,
regarding python-fabio: Python2 removal in sid/bullseye
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
937745: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=937745
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:python-fabio
Version: 0.9.0+dfsg-1
Severity: normal
Tags: sid bullseye
User: debian-pyt...@lists.debian.org
Usertags: py2removal

Python2 becomes end-of-live upstream, and Debian aims to remove
Python2 from the distribution, as discussed in
https://lists.debian.org/debian-python/2019/07/msg00080.html

Your package either build-depends, depends on Python2, or uses Python2
in the autopkg tests.  Please stop using Python2, and fix this issue
by one of the following actions.

- Convert your Package to Python3. This is the preferred option.  In
  case you are providing a Python module foo, please consider dropping
  the python-foo package, and only build a python3-foo package.  Please
  don't drop Python2 modules, which still have reverse dependencies,
  just document them.
  
  This is the preferred option.

- If the package is dead upstream, cannot be converted or maintained
  in Debian, it should be removed from the distribution.  If the
  package still has reverse dependencies, raise the severity to
  "serious" and document the reverse dependencies with the BTS affects
  command.  If the package has no reverse dependencies, confirm that
  the package can be removed, reassign this issue to ftp.debian.org,
  make sure that the bug priority is set to normal and retitle the
  issue to "RM: PKG -- removal triggered by the Python2 removal".

- If the package has still many users (popcon >= 300), or is needed to
  build another package which cannot be removed, document that by
  adding the "py2keep" user tag (not replacing the py2remove tag),
  using the debian-pyt...@lists.debian.org user.  Also any
  dependencies on an unversioned python package (python, python-dev)
  must not be used, same with the python shebang.  These have to be
  replaced by python2/python2.7 dependencies and shebang.

  This is the least preferred option.

If the conversion or removal needs action on another package first,
please document the blocking by using the BTS affects command, like

  affects  + src:python-fabio

If there is no py2removal bug for that reverse-dependency, please file
a bug on this package (similar to this bug report).

If there are questions, please refer to the wiki page for the removal:
https://wiki.debian.org/Python/2Removal, or ask for help on IRC
#debian-python, or the debian-pyt...@lists.debian.org mailing list.
--- End Message ---
--- Begin Message ---
Source: python-fabio
Source-Version: 0.9.0+dfsg-2

We believe that the bug you reported is fixed in the latest version of
python-fabio, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 937...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Picca Frédéric-Emmanuel  (supplier of updated python-fabio 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 19 Oct 2019 13:25:00 +0200
Source: python-fabio
Architecture: source
Version: 0.9.0+dfsg-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Science Maintainers 

Changed-By: Picca Frédéric-Emmanuel 
Closes: 937745
Changes:
 python-fabio (0.9.0+dfsg-2) unstable; urgency=medium
 .
   * d/tests: Use AUTOPKGTEST_TMP instead of ADTTMP.
   * Use debhelper-compat instead of debian/compat.
   * Removed Python2 module (Closes: #937745).
   * d/control: switched to compat level 12.
 - d/rules: Use --doc-main-package python3-fabio
   * Bump Standards-Version 4.4.1.
Checksums-Sha1:
 3c93f7741b84aa2dab889953512d7ea2c1a2afd1 2922 python-fabio_0.9.0+dfsg-2.dsc
 28275067969cec71621034de31f38fbb56f4b79b 8192 
python-fabio_0.9.0+dfsg-2.debian.tar.xz
Checksums-Sha256:
 c8db755d288f289517cf9d0af828e2039fc40d221c777bdbed03a62d4a736f06 2922 
python-fabio_0.9.0+dfsg-2.dsc
 f2032a2ba7beb67e8820d144a6ff0f04cf3d2b44a2e

Processed: Bug housekeeping

2019-10-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 942629 golang-1.12: CVE-2019-17596: invalid public key causes panic 
> in dsa.Verify
Bug #942629 [src:golang-1.12] golang-1.13: CVE-2019-17596: invalid public key 
causes panic in dsa.Verify
Changed Bug title to 'golang-1.12: CVE-2019-17596: invalid public key causes 
panic in dsa.Verify' from 'golang-1.13: CVE-2019-17596: invalid public key 
causes panic in dsa.Verify'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
942629: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942629
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#938481: marked as done (silx: Python2 removal in sid/bullseye)

2019-10-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Oct 2019 11:35:23 +
with message-id 
and subject line Bug#938481: fixed in silx 0.11.0+dfsg-2
has caused the Debian Bug report #938481,
regarding silx: Python2 removal in sid/bullseye
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
938481: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=938481
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:silx
Version: 0.11.0+dfsg-1
Severity: normal
Tags: sid bullseye
User: debian-pyt...@lists.debian.org
Usertags: py2removal

Python2 becomes end-of-live upstream, and Debian aims to remove
Python2 from the distribution, as discussed in
https://lists.debian.org/debian-python/2019/07/msg00080.html

Your package either build-depends, depends on Python2, or uses Python2
in the autopkg tests.  Please stop using Python2, and fix this issue
by one of the following actions.

- Convert your Package to Python3. This is the preferred option.  In
  case you are providing a Python module foo, please consider dropping
  the python-foo package, and only build a python3-foo package.  Please
  don't drop Python2 modules, which still have reverse dependencies,
  just document them.
  
  This is the preferred option.

- If the package is dead upstream, cannot be converted or maintained
  in Debian, it should be removed from the distribution.  If the
  package still has reverse dependencies, raise the severity to
  "serious" and document the reverse dependencies with the BTS affects
  command.  If the package has no reverse dependencies, confirm that
  the package can be removed, reassign this issue to ftp.debian.org,
  make sure that the bug priority is set to normal and retitle the
  issue to "RM: PKG -- removal triggered by the Python2 removal".

- If the package has still many users (popcon >= 300), or is needed to
  build another package which cannot be removed, document that by
  adding the "py2keep" user tag (not replacing the py2remove tag),
  using the debian-pyt...@lists.debian.org user.  Also any
  dependencies on an unversioned python package (python, python-dev)
  must not be used, same with the python shebang.  These have to be
  replaced by python2/python2.7 dependencies and shebang.

  This is the least preferred option.

If the conversion or removal needs action on another package first,
please document the blocking by using the BTS affects command, like

  affects  + src:silx

If there is no py2removal bug for that reverse-dependency, please file
a bug on this package (similar to this bug report).

If there are questions, please refer to the wiki page for the removal:
https://wiki.debian.org/Python/2Removal, or ask for help on IRC
#debian-python, or the debian-pyt...@lists.debian.org mailing list.
--- End Message ---
--- Begin Message ---
Source: silx
Source-Version: 0.11.0+dfsg-2

We believe that the bug you reported is fixed in the latest version of
silx, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 938...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Picca Frédéric-Emmanuel  (supplier of updated silx package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 19 Oct 2019 13:19:44 +0200
Source: silx
Architecture: source
Version: 0.11.0+dfsg-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Science Maintainers 

Changed-By: Picca Frédéric-Emmanuel 
Closes: 938481
Changes:
 silx (0.11.0+dfsg-2) unstable; urgency=medium
 .
   * Use debhelper-compat instead of debian/compat.
   * remove Python2 modules (Closes: #938481).
   * Switched to compat level 12
 - d/rules: Used --doc-main-package python3-silx.
Checksums-Sha1:
 dbd26daf522d3217bbdece371a9c9ea98b35ed89 3108 silx_0.11.0+dfsg-2.dsc
 c9ca59dede63b6bcbc6287a5636db878d8346019 20448 silx_0.11.0+dfsg-2.debian.tar.xz
Checksums-Sha256:
 b35ff4816c551882b6bc2138ec3bc89f419609f261acec5421d5e1d9cf987420 3108 
silx_0.11.0+dfsg-2.dsc
 010dbd09f6bfa22912625a24fba3ad574fcb57d3ceee3a6aac19cc1cef6ea8b4 20448 
silx_0.11.0+dfsg-2.debian.tar.xz
Files:
 38d988d218b98e47b599b04360b6f173 3108 science optional silx_0.11.0+dfsg-2.dsc
 00ef8ce0e2191116f108dcc9eb093683 20448 

Bug#942634: apt-cacher-ng: fails to work on debian/sid suite (too small BUFSIZEMAX)

2019-10-19 Thread Aurelien Jarno
Package: apt-cacher-ng
Version: 3.2-2
Severity: grave
Justification: renders package unusable

Dear maintainer,

apt-cacher-ng stopped working recently when used to cache the debian/sid
suite. It reports the following error:

| An error occurred while reading this file, some contents may have been 
ignored. Tag
| Parsing metadata in deb/dists/sid/main/binary-arm64/Packages.xz

I have tracked down this issue to a too small value of BUFSIZEMAX. The
Packages file in sid now contains lines that are way longer than before
and thus this variable needs to get adjusted:

| $ wget -q -O - 
http://ftp.debian.org/debian/dists/stable/main/binary-amd64/Packages.xz | xzcat 
| wc -L
| 59936
| $ wget -q -O - 
http://ftp.debian.org/debian/dists/sid/main/binary-amd64/Packages.xz | xzcat | 
wc -L
| 149619

I have found that doubling the value to 32*4096 is enough, but it might
be safer to double it to 64*4096 to be able to cope with further
increase.

Regards,
Aurelien

-- System Information:
Debian Release: 10.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-5-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled


Bug#939974: bug has been resolved

2019-10-19 Thread Harald Welte
I can conform that the recent introduction of uhd 3.14.1.1-1 has fixed
the FTBFS and the package is building fine again.

-- 
- Harald Welte http://laforge.gnumonks.org/

"Privacy in residential applications is a desirable marketing option."
  (ETSI EN 300 175-7 Ch. A6)



Processed: tagging 941999, tagging 939751, tagging 941610

2019-10-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 941999 + pending
Bug #941999 [src:kopanocore] kopanocore: autopkgtest tries to install packages 
itself but doesn't exit appropriately if that fails
Added tag(s) pending.
> tags 939751 + pending
Bug #939751 [kopano-server] Kopano-Server in Stable not compatible with MariaDB 
10.3
Added tag(s) pending.
> tags 941610 + pending
Bug #941610 [kopano-server] kopano-server crashes
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
939751: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939751
941610: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941610
941999: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941999
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems