Bug#1034310: [digikam] [Bug 466170] Digikam 7.9.0 (and 7.8.0) crashes on startup

2023-04-25 Thread Steven Robbins
On Tuesday, April 25, 2023 12:50:39 P.M. CDT Rainer Dorsch wrote:
> Am Dienstag, 25. April 2023, 03:51:44 CEST schrieben Sie:
> > I'd be interested to know if the issue persists on your system after
> > upgrading.
> 
> Yes, it repros always.

OK.

> -- System Information:
> Debian Release: 12.0
>   APT prefers testing-security
>   APT policy: (500, 'testing-security'), (500, 'testing-debug'), (105,
> 'testing')
> Architecture: amd64 (x86_64)
> Foreign Architectures: i386
> 
> Kernel: Linux 6.1.0-7-amd64 (SMP w/6 CPU threads; PREEMPT)
> Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8),
> LANGUAGE=de:en_US

I'm still not able to reproduce the issue.  Today I was trying with the same 
locale as you (de_DE.UTF-8).   I have seen issues in the past with certain 
locales -- typically in software that isn't careful enough and gets into 
trouble when a locale switches the period and comma in number formats.  

Even though I wasn't able to reproduce the problem here, it would be 
interesting if you can try with locale set to en_US for example:

I have no idea where else to look.  Given that no-one else has reported this, 
I'm leaning towards downgrading the severity to keep digikam in the upcoming 
release.

-Steve


signature.asc
Description: This is a digitally signed message part.


Bug#1034854: [pkg-php-pear] Bug#1034854: symfony: autopkgtest regression: "error:10800075:PKCS7 routines::certificate verify error".

2023-04-25 Thread David Prévot


Hi Paul,

Thanks for the report.

Le 25/04/2023 à 21:43, Paul Gevers a écrit :

Source: symfony

[…]
Your package has an autopkgtest, great. However, it fails since April 
2023.


Meh, between 3 and 19 on Sid and between 11 and 21 on Bookworm.

[…]

Targeted fixes are still welcome.

[…]
7) 
Symfony\Component\Mime\Tests\Crypto\SMimeSignerTest::testSignedMessageExtraCerts
Verification of the message /tmp/phpe95PWJ failed. Internal error 
"error:10800075:PKCS7 routines::certificate verify error".

Failed asserting that false is true.

/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:160
/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:150


Thanks, hope to find time to look at it (this issue in the Symfony Mime 
Coponent testsuite) really soon.


Regards

taffit


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1034688: [Pkg-privacy-maintainers] Bug#1034688: onionshare: flaky autopkgtest

2023-04-25 Thread Hefee
Hey,

I have no real idea why we see only a problem in the chat_server test. It is a 
problem in the shutdown... I can mark it as superficial so the failing test 
does not block the CI. But is only a workaround. Can you enable the verbose 
flag by hand, so we can see what function triggers this segmentation fault? 

Test-Command: XDG_CONFIG_HOME="$AUTOPKGTEST_TMP" onionshare-cli -v --local-
only --chat --auto-stop-timer 2

Or can you give me the the back trace of the segmentation fault?
On my system, I don't see the segmentation fault, so hard to taggle down.

Properly it is
https://github.com/onionshare/onionshare/issues/1408#issuecomment-908150292
and it is harmless. But without verbose log I cannot be sure. 

> The autopkgtests from onionshare are flaky and have been failing roughly
> half the time over the last couple of weeks.

Does that mean, that it run successfully before?

Regards,

hefee


--

On Freitag, 21. April 2023 20:53:03 CEST Sebastian Ramacher wrote:
> Source: onionshare
> Version: 2.6-1
> Severity: serious
> 

> 
> https://ci.debian.net/data/autopkgtest/testing/amd64/o/onionshare/32901091/l
> og.gz
> 
> Give this address and private key to the recipient:
> http://127.0.0.1:17632
> Private key: E2GOT5LTUTP3OAMRCRXO4GSH6VKJEUOXZQUC336SRKAHTTT5OVSA
> 
> Press Ctrl+C to stop the server
> Stopped because auto-stop timer ran out
> Segmentation fault
> autopkgtest [22:20:10]: test chat_server: ---]
> autopkgtest [22:20:10]: test chat_server:  - - - - - - - - - - results - - -
> - - - - - - - chat_server  FAIL non-zero exit status 139




signature.asc
Description: This is a digitally signed message part.


Bug#965565: marked as done (gplcver: Removal of obsolete debhelper compat 5 and 6 in bookworm)

2023-04-25 Thread Debian Bug Tracking System
Your message dated Tue, 25 Apr 2023 21:18:54 +
with message-id 
and subject line Bug#965565: fixed in gplcver 2.12a-2
has caused the Debian Bug report #965565,
regarding gplcver: Removal of obsolete debhelper compat 5 and 6 in bookworm
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
965565: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965565
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gplcver
Version: 2.12a-1.1
Severity: normal
Usertags: compat-5-6-removal

Hi,

The package gplcver uses debhelper with a compat level of 5 or 6,
which is deprecated and scheduled for removal[1].

Please bump the debhelper compat at your earliest convenience
/outside the freeze/!

  * Compat 13 is recommended (supported in stable-backports)

  * Compat 7 is the bare minimum


PLEASE KEEP IN MIND THAT the release team *DOES NOT* accept uploads
with compat bumps during the freeze.

If there is any risk that the fix for this bug might not migrate to
testing before 2021-01-01[3] then please postpone the fix until after
the freeze.


At the time of filing this bug, compat 5 and 6 are expected to be
removed "some time during the development cycle of bookworm".


Thanks,
~Niels


[1] https://lists.debian.org/debian-devel/2020/07/msg00065.html

[2] https://release.debian.org/bullseye/FAQ.html

[3] The choice of 2021-01-01 as a "deadline" is set before the actual
freeze deadline to provide a safe cut off point for most people.

Mind you, it is still your responsibility to ensure that the upload
makes it into testing even if you upload before that date.
--- End Message ---
--- Begin Message ---
Source: gplcver
Source-Version: 2.12a-2
Done: أحمد المحمودي (Ahmed El-Mahmoudy) 

We believe that the bug you reported is fixed in the latest version of
gplcver, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 965...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
أحمد المحمودي (Ahmed El-Mahmoudy)  (supplier 
of updated gplcver package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 25 Apr 2023 20:47:35 +0200
Source: gplcver
Architecture: source
Version: 2.12a-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Electronics Team 

Changed-By: أحمد المحمودي (Ahmed El-Mahmoudy) 

Closes: 694118 965565
Changes:
 gplcver (2.12a-2) unstable; urgency=medium
 .
   * Adopt gplcver (Closes: #694118)
   * d/control:
 + Add ${misc:Depends} to Depends field
 + Remove Homepage URL, no longer valid
 + Change priority to optional
 + Add Rules-Requires-Root: no
 + Add Vcs-* fields
 + Change section to electronics
   * d/copyright:
 + Update copyright format & years
 + Add myself to Debian packaging copyright holders
 + Added PD license paragraph
   * Simplify rules file.
   * Added debian/manpages & debian/install
   * Switch to debhelper-compat 13 (Closes: #965565)
 + Remove autoconf files added by previous maintainer, autoreconf will
 autogenerate them.
   * Switch to 3.0 (quilt) source format.
 Move changes to patches: autoconf.diff, fix_sparc_ftbfs.diff
   * Add string_format_security.diff to fix string format security
   * Added typos.diff patch to fix some typos
   * d/copyright: add myself to Debian packaging copyright holders
   * Update changelog for 2.12a-1.2~4.gbp39f71b release
Checksums-Sha1:
 090527f08dd439ce92c284e5cf9817e0a9e73575 1779 gplcver_2.12a-2.dsc
 b9522b537e9162117612e78fe1a43813b9064926 12140 gplcver_2.12a-2.debian.tar.xz
 561868d7ffafb0a7266d863a67296669b995e996 5436 gplcver_2.12a-2_source.buildinfo
Checksums-Sha256:
 fae54dd7d319738e55943affd3c6244e97c9cd9201f1c0adb7c54058c955013e 1779 
gplcver_2.12a-2.dsc
 711326edc782fb3a4727f8e02f31650428d1d4e46f4dcd4f96e71ce13de942f5 12140 
gplcver_2.12a-2.debian.tar.xz
 95ef672dc7bf1cb44a15d370cede90cdfd8b9c7245c1c77e26391213921709b4 5436 
gplcver_2.12a-2_source.buildinfo
Files:
 13cc2f04d447b50bf0922e2de5a33762 1779 electronics optional gplcver_2.12a-2.dsc
 f27e6cbba88af73b5ffe13c007a36f77 12140 electronics optional 
gplcver_2.12a-2.debian.tar.xz
 56365775c105ab20e7419785df9afbfd 5436 electronics optional 

Bug#1004026: marked as done (covered: gplcver support should be dropped or gplcver adopted by the Electronics Team)

2023-04-25 Thread Debian Bug Tracking System
Your message dated Tue, 25 Apr 2023 22:57:54 +0200
with message-id <3c63b5f4-d9a4-8e25-c6f5-395e6d716...@debian.org>
and subject line Re: covered: gplcver support should be dropped or gplcver 
adopted by the Electronics Team
has caused the Debian Bug report #1004026,
regarding covered: gplcver support should be dropped or gplcver adopted by the 
Electronics Team
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1004026: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004026
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: covered
Version: 0.7.10-3.1
Severity: serious
Control: block 965565 by -1

If gplcver provides any functionality not available in iverilog,
it would be useful if this orphaned package could be adopted by
the Electronics Team.

Otherwise, please drop gplcver support from covered.
--- End Message ---
--- Begin Message ---

On Wed, 19 Jan 2022 16:49:01 +0200 Adrian Bunk  wrote:

If gplcver provides any functionality not available in iverilog,
it would be useful if this orphaned package could be adopted by
the Electronics Team.


Doing so.--- End Message ---


Bug#1034856: dstat: autopkgtest regression on multiple archs: TypeError: '<' not supported between instances of 'dict' and 'int'

2023-04-25 Thread Paul Gevers

Hi,

On Tue, 25 Apr 2023 22:03:43 +0200 Paul Gevers  wrote:
Your package has an autopkgtest, great. However, it fails since April 
2023 on arm64, i386, ppc64el and s390x.


Sorry, I forgot to spot what I should have spotted: those are the 
architectures that I upgraded on ci.debian.net to a bookworm kernel. 
Even the tests in stable started to fail. We run lxc, so the kernel is 
determined by the host.


Also, bug #1032615 has the same stack trace.

Paul


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1034856: dstat: autopkgtest regression on multiple archs: TypeError: '<' not supported between instances of 'dict' and 'int'

2023-04-25 Thread Paul Gevers

Source: dstat
Version: 0.7.4-6.1
Severity: serious
Control: tags -1 bookworm-ignore
User: debian...@lists.debian.org
Usertags: regression

Dear maintainer(s),

Your package has an autopkgtest, great. However, it fails since April 
2023 on arm64, i386, ppc64el and s390x. Can you please investigate the 
situation and fix it? I copied some of the output at the bottom of this 
report.


The release team has announced [1] that failing autopkgtest on amd64 and 
arm64 are considered RC in testing. [Release Team member hat on] Because 
we're currently in the hard freeze for bookworm, I have marked this bug 
as bookworm-ignore. Targeted fixes are still welcome.


More information about this bug and the reason for filing it can be 
found on 
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation


Paul

[1] https://lists.debian.org/debian-devel-announce/2019/07/msg2.html

https://ci.debian.net/data/autopkgtest/testing/arm64/d/dstat/33156935/log.gz

* Exception in plugin ['loop0', 'loop1', 'loop2', 'loop3', 'loop4', 
'loop5', 'loop6', 'loop7', 'vda']

'rq_ticks'
main()
  File "/usr/bin/dstat", line 2687, in main
scheduler.run()
  File "/usr/lib/python3.11/sched.py", line 151, in run
action(*argument, **kwargs)
  File "/usr/bin/dstat", line 2804, in perform
line = line + o.show() + o.showend(totlist, vislist)
  
  File "/usr/bin/dstat", line 526, in show
line = line + cprint(self.val[name], ctype, self.width, scale)
  
  File "/usr/bin/dstat", line 2105, in cprint
if ctype != 's' and var < 0:
^^^
TypeError: '<' not supported between instances of 'dict' and 'int'


OpenPGP_signature
Description: OpenPGP digital signature


Processed: dstat: autopkgtest regression on multiple archs: TypeError: '<' not supported between instances of 'dict' and 'int'

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 bookworm-ignore
Bug #1034856 [src:dstat] dstat: autopkgtest regression on multiple archs: 
TypeError: '<' not supported between instances of 'dict' and 'int'
Added tag(s) bookworm-ignore.

-- 
1034856: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034856
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: trapperkeeper-webserver-jetty9-clojure: autopkgtest regression: Cannot invoke "Object.toString()" because "s" is null

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 bookworm-ignore
Bug #1034855 [src:trapperkeeper-webserver-jetty9-clojure] 
trapperkeeper-webserver-jetty9-clojure: autopkgtest regression: Cannot invoke 
"Object.toString()" because "s" is null
Added tag(s) bookworm-ignore.

-- 
1034855: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034855
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1034855: trapperkeeper-webserver-jetty9-clojure: autopkgtest regression: Cannot invoke "Object.toString()" because "s" is null

2023-04-25 Thread Paul Gevers

Source: trapperkeeper-webserver-jetty9-clojure
Version: 4.4.1-5
Severity: serious
Control: tags -1 bookworm-ignore
User: debian...@lists.debian.org
Usertags: regression

Dear maintainer(s),

Your package has an autopkgtest, great. However, it fails since April 
2023. Can you please investigate the situation and fix it? I copied some 
of the output at the bottom of this report.


The release team has announced [1] that failing autopkgtest on amd64 and 
arm64 are considered RC in testing. [Release Team member hat on] Because 
we're currently in the hard freeze for bookworm, I have marked this bug 
as bookworm-ignore. Targeted fixes are still welcome.


More information about this bug and the reason for filing it can be 
found on 
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation


Paul

[1] https://lists.debian.org/debian-devel-announce/2019/07/msg2.html

https://ci.debian.net/data/autopkgtest/testing/amd64/t/trapperkeeper-webserver-jetty9-clojure/33156934/log.gz

ERROR in (request-logging-test) (Matcher.java:1769)
request logging occurs when :access-log-config is configured
expected: (re-find #"\"GET /hi_world/ HTTP/1.1\" 200 8" (first list))
  actual: java.lang.NullPointerException: Cannot invoke 
"java.lang.CharSequence.length()" because "this.text" is null

 at java.util.regex.Matcher.getTextLength (Matcher.java:1769)
java.util.regex.Matcher.reset (Matcher.java:415)
java.util.regex.Matcher. (Matcher.java:252)
java.util.regex.Pattern.matcher (Pattern.java:1134)
clojure.core$re_matcher.invokeStatic (core.clj:4881)
clojure.core$re_find.invokeStatic (core.clj:4923)
clojure.core$re_find.invoke (core.clj:4923)
clojure.lang.AFn.applyToHelper (AFn.java:156)
clojure.lang.AFn.applyTo (AFn.java:144)
clojure.core$apply.invokeStatic (core.clj:667)
clojure.core$apply.invoke (core.clj:662)

puppetlabs.trapperkeeper.services.webserver.jetty9_service_test$fn__29186$fn__29189$fn__29190.invoke 
(jetty9_service_test.clj:740)


puppetlabs.trapperkeeper.services.webserver.jetty9_service_test$fn__29186$fn__29189.invoke 
(jetty9_service_test.clj:733)

clojure.core$with_redefs_fn.invokeStatic (core.clj:7582)
clojure.core$with_redefs_fn.invoke (core.clj:7566)

puppetlabs.trapperkeeper.services.webserver.jetty9_service_test$fn__29186.invokeStatic 
(jetty9_service_test.clj:722)
puppetlabs.trapperkeeper.services.webserver.jetty9_service_test/fn 
(jetty9_service_test.clj:721)

clojure.test$test_var$fn__9856.invoke (test.clj:717)
clojure.test$test_var.invokeStatic (test.clj:717)
clojure.test$test_var.invoke (test.clj:708)
clojure.test$test_vars$fn__9882$fn__9887.invoke (test.clj:735)
clojure.test$default_fixture.invokeStatic (test.clj:687)
clojure.test$default_fixture.invoke (test.clj:683)
clojure.test$test_vars$fn__9882.invoke (test.clj:735)

puppetlabs.trapperkeeper.services.webserver.jetty9_service_test$eval28533$fn__28534.invoke 
(jetty9_service_test.clj:43)

clojure.test$compose_fixtures$fn__9850$fn__9851.invoke (test.clj:694)

puppetlabs.trapperkeeper.testutils.webserver$assert_clean_shutdown.invokeStatic 
(webserver.clj:75)


puppetlabs.trapperkeeper.testutils.webserver$assert_clean_shutdown.invoke 
(webserver.clj:71)

clojure.test$compose_fixtures$fn__9850$fn__9851.invoke (test.clj:694)
schema.test$validate_schemas$fn25482__25491$fn__25492.invoke 
(test.cljc:12)

schema.test$validate_schemas$fn25482__25491.invoke (test.cljc:12)
clojure.lang.AFn.applyToHelper (AFn.java:152)
clojure.lang.AFn.applyTo (AFn.java:144)
clojure.lang.AFunction$1.doInvoke (AFunction.java:31)
clojure.lang.RestFn.invoke (RestFn.java:397)
schema.test$validate_schemas.invokeStatic (test.cljc:12)
schema.test$validate_schemas.invoke (test.cljc:7)
clojure.test$compose_fixtures$fn__9850$fn__9851.invoke (test.clj:694)

puppetlabs.kitchensink.testutils.fixtures$with_no_jvm_shutdown_hooks$fn__28235.invoke 
(fixtures.clj:10)

clojure.core$with_redefs_fn.invokeStatic (core.clj:7582)
clojure.core$with_redefs_fn.invoke (core.clj:7566)

puppetlabs.kitchensink.testutils.fixtures$with_no_jvm_shutdown_hooks.invokeStatic 
(fixtures.clj:9)


puppetlabs.kitchensink.testutils.fixtures$with_no_jvm_shutdown_hooks.invoke 
(fixtures.clj:4)

clojure.test$compose_fixtures$fn__9850$fn__9851.invoke (test.clj:694)
clojure.test$default_fixture.invokeStatic (test.clj:687)
clojure.test$default_fixture.invoke (test.clj:683)
clojure.test$compose_fixtures$fn__9850.invoke (test.clj:694)
clojure.test$compose_fixtures$fn__9850.invoke (test.clj:694)
clojure.test$compose_fixtures$fn__9850.invoke (test.clj:694)
clojure.test$compose_fixtures$fn__9850.invoke (test.clj:694)
clojure.test$test_vars.invokeStatic (test.clj:731)
clojure.test$test_all_vars.invokeStatic (test.clj:737)
clojure.test$test_ns.invokeStatic (test.clj:758)
clojure.test$test_ns.invoke (test.clj:743)

Processed: symfony: autopkgtest regression: "error:10800075:PKCS7 routines::certificate verify error".

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 bookworm-ignore
Bug #1034854 [src:symfony] symfony: autopkgtest regression: 
"error:10800075:PKCS7 routines::certificate verify error".
Added tag(s) bookworm-ignore.

-- 
1034854: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034854
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1034854: symfony: autopkgtest regression: "error:10800075:PKCS7 routines::certificate verify error".

2023-04-25 Thread Paul Gevers

Source: symfony
Version: 5.4.22+dfsg-2
Severity: serious
Control: tags -1 bookworm-ignore
User: debian...@lists.debian.org
Usertags: regression

Dear maintainer(s),

Your package has an autopkgtest, great. However, it fails since April 
2023. Can you please investigate the situation and fix it? I copied some 
of the output at the bottom of this report.


The release team has announced [1] that failing autopkgtest on amd64 and 
arm64 are considered RC in testing. [Release Team member hat on] Because 
we're currently in the hard freeze for bookworm, I have marked this bug 
as bookworm-ignore. Targeted fixes are still welcome.


More information about this bug and the reason for filing it can be 
found on 
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation


Paul

[1] https://lists.debian.org/debian-devel-announce/2019/07/msg2.html

https://ci.debian.net/data/autopkgtest/testing/amd64/s/symfony/33122795/log.gz

There were 7 failures:

1) Symfony\Component\Mime\Tests\Crypto\SMimeSignerTest::testSignedMessage
Verification of the message /tmp/phpxnGzwx failed. Internal error 
"error:10800075:PKCS7 routines::certificate verify error".

Failed asserting that false is true.

/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:160
/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:38

2) 
Symfony\Component\Mime\Tests\Crypto\SMimeSignerTest::testSignEncryptedMessage
Verification of the message /tmp/phpz8oMy6 failed. Internal error 
"error:10800075:PKCS7 routines::certificate verify error".

Failed asserting that false is true.

/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:160
/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:58

3) 
Symfony\Component\Mime\Tests\Crypto\SMimeSignerTest::testSignedMessageWithPassphrase
Verification of the message /tmp/phpYakZOM failed. Internal error 
"error:10800075:PKCS7 routines::certificate verify error".

Failed asserting that false is true.

/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:160
/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:73

4) 
Symfony\Component\Mime\Tests\Crypto\SMimeSignerTest::testProperSerialiable
Verification of the message /tmp/phpTqakJJ failed. Internal error 
"error:10800075:PKCS7 routines::certificate verify error".

Failed asserting that false is true.

/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:160
/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:95

5) 
Symfony\Component\Mime\Tests\Crypto\SMimeSignerTest::testSignedMessageWithBcc
Verification of the message /tmp/phpKbIzRS failed. Internal error 
"error:10800075:PKCS7 routines::certificate verify error".

Failed asserting that false is true.

/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:160
/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:111

6) 
Symfony\Component\Mime\Tests\Crypto\SMimeSignerTest::testSignedMessageWithAttachments
Verification of the message /tmp/phpwYY6cG failed. Internal error 
"error:10800075:PKCS7 routines::certificate verify error".

Failed asserting that false is true.

/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:160
/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:129

7) 
Symfony\Component\Mime\Tests\Crypto\SMimeSignerTest::testSignedMessageExtraCerts
Verification of the message /tmp/phpe95PWJ failed. Internal error 
"error:10800075:PKCS7 routines::certificate verify error".

Failed asserting that false is true.

/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:160
/tmp/autopkgtest-lxc.oubjjog1/downtmp/build.dE0/src/src/Symfony/Component/Mime/Tests/Crypto/SMimeSignerTest.php:150



OpenPGP_signature
Description: OpenPGP digital signature


Processed: r-bioc-annotationhub: autopkgtest regression: download failed

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 bookworm-ignore
Bug #1034852 [src:r-bioc-annotationhub] r-bioc-annotationhub: autopkgtest 
regression: download failed
Added tag(s) bookworm-ignore.

-- 
1034852: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034852
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1034852: r-bioc-annotationhub: autopkgtest regression: download failed

2023-04-25 Thread Paul Gevers

Source: r-bioc-annotationhub
Version: 3.6.0+dfsg-1
Severity: serious
Control: tags -1 bookworm-ignore
User: debian...@lists.debian.org
Usertags: regression

Dear maintainer(s),

Your package has an autopkgtest, great. However, it fails since April 
2023. Can you please investigate the situation and fix it? I copied some 
of the output at the bottom of this report.


The release team has announced [1] that failing autopkgtest on amd64 and 
arm64 are considered RC in testing. [Release Team member hat on] Because 
we're currently in the hard freeze for bookworm, I have marked this bug 
as bookworm-ignore. Targeted fixes are still welcome.


More information about this bug and the reason for filing it can be 
found on 
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation


Paul

[1] https://lists.debian.org/debian-devel-announce/2019/07/msg2.html

https://ci.debian.net/data/autopkgtest/testing/amd64/r/r-bioc-annotationhub/33053151/log.gz

RUNIT TEST PROTOCOL -- Fri Apr 21 23:47:54 2023
***
Number of test functions: 19
Number of errors: 0
Number of failures: 2


1 Test Suite :
AnnotationHub RUnit Tests - 19 test functions, 0 errors, 2 failures
FAILURE in test_accessors_setters: Error in 
checkIdentical(dates[length(dates)], hubDate(ah)) : FALSE


FAILURE in test_db_connections: Error in checkIdentical(ids2, 
AnnotationHub:::.db_uid(hub)) : FALSE



Test files with failing tests

   test_AnnotationHub-class.R
 test_accessors_setters

   test_db_utils.R
 test_db_connections


Error in BiocGenerics:::testPackage("AnnotationHub") :
  unit tests failed for package AnnotationHub
In addition: Warning message:
download failed
  hub path: ‘bogus/url’
  cache resource: ‘AHInvalid : 5012’
  reason: all(rtype == "web" | file.exists(fpath)) is not TRUE
Execution halted


OpenPGP_signature
Description: OpenPGP digital signature


Processed: tagging 1034840, tagging 1034841, tagging 1034843 ..., tagging 1034844 ..., tagging 1034845 ...

2023-04-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 1034840 + upstream
Bug #1034840 [src:etcd] etcd: CVE-2021-28235
Added tag(s) upstream.
> tags 1034841 + upstream
Bug #1034841 [src:consul] consul: CVE-2021-41803
Added tag(s) upstream.
> tags 1034843 + upstream
Bug #1034843 [src:vtk6] vtk6: CVE-2021-42521
Added tag(s) upstream.
> forwarded 1034843 https://gitlab.kitware.com/vtk/vtk/-/issues/17818
Bug #1034843 [src:vtk6] vtk6: CVE-2021-42521
Set Bug forwarded-to-address to 
'https://gitlab.kitware.com/vtk/vtk/-/issues/17818'.
> tags 1034844 + upstream
Bug #1034844 [src:vtk7] vtk7: CVE-2021-42521
Added tag(s) upstream.
> forwarded 1034844 https://gitlab.kitware.com/vtk/vtk/-/issues/17818
Bug #1034844 [src:vtk7] vtk7: CVE-2021-42521
Set Bug forwarded-to-address to 
'https://gitlab.kitware.com/vtk/vtk/-/issues/17818'.
> tags 1034845 + upstream
Bug #1034845 [src:lua5.1] lua5.1: CVE-2021-43519
Added tag(s) upstream.
> tags 1034846 + upstream
Bug #1034846 [src:lua5.2] lua5.2: CVE-2021-43519
Added tag(s) upstream.
> tags 1034847 + upstream
Bug #1034847 [src:lua5.3] lua5.3: CVE-2021-43519
Added tag(s) upstream.
> tags 1034848 + upstream
Bug #1034848 [src:slic3r] slic3r: CVE-2022-36788
Added tag(s) upstream.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1034840: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034840
1034841: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034841
1034843: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034843
1034844: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034844
1034845: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034845
1034846: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034846
1034847: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034847
1034848: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034848
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1034851: node-nodemailer: autopkgtest regression: ipv4.single.dev.ethereal.email changed IP

2023-04-25 Thread Paul Gevers

Source: node-nodemailer
Version: 6.8.0+~6.4.6-1
Severity: serious
Control: tags -1 bookworm-ignore
User: debian...@lists.debian.org
Usertags: regression

Dear maintainer(s),

Your package has an autopkgtest, great. However, it recently started to 
fail. Can you please investigate the situation and fix it? I copied some 
of the output at the bottom of this report.


The release team has announced [1] that failing autopkgtest on amd64 and 
arm64 are considered RC in testing. [Release Team member hat on] Because 
we're currently in the hard freeze for bookworm, I have marked this bug 
as bookworm-ignore. Targeted fixes are still welcome.


More information about this bug and the reason for filing it can be 
found on 
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation


Paul

[1] https://lists.debian.org/debian-devel-announce/2019/07/msg2.html

https://ci.debian.net/data/autopkgtest/testing/amd64/n/node-nodemailer/32818471/log.gz

  3) Shared Funcs Tests
   #resolveHostname tests
 should succeed resolving a single internal IPv4 entry:

  Uncaught AssertionError: expected { …(3) } to deeply equal { …(3) }
  + expected - actual

   {
 "cached": false
  -  "host": "95.216.108.161"
  +  "host": "54.36.85.114"
 "servername": "ipv4.single.dev.ethereal.email"
   }

  at Proxy.assertEql 
(/usr/share/nodejs/chai/lib/chai/core/assertions.js:1096:10)
  at Proxy.methodWrapper 
(/usr/share/nodejs/chai/lib/chai/utils/addMethod.js:57:25)
  at Proxy.assertEqual 
(/usr/share/nodejs/chai/lib/chai/core/assertions.js:1035:12)
  at Proxy.methodWrapper 
(/usr/share/nodejs/chai/lib/chai/utils/addMethod.js:57:25)
  at 
/tmp/autopkgtest-lxc.x6us0vio/downtmp/build.qS9/src/test/shared/shared-test.js:589:44
  at 
/tmp/autopkgtest-lxc.x6us0vio/downtmp/build.qS9/src/lib/shared/index.js:152:20

  at QueryReqWrap.callback (lib/shared/index.js:66:16)
  at QueryReqWrap.onresolve [as oncomplete] 
(node:internal/dns/callback_resolver:49:10)


OpenPGP_signature
Description: OpenPGP digital signature


Processed: node-nodemailer: autopkgtest regression: ipv4.single.dev.ethereal.email changed IP

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 bookworm-ignore
Bug #1034851 [src:node-nodemailer] node-nodemailer: autopkgtest regression: 
ipv4.single.dev.ethereal.email changed IP
Added tag(s) bookworm-ignore.

-- 
1034851: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034851
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1034848: slic3r: CVE-2022-36788

2023-04-25 Thread Moritz Mühlenhoff
Source: slic3r
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for slic3r.

CVE-2022-36788[0]:
| A heap-based buffer overflow vulnerability exists in the TriangleMesh
| clone functionality of Slic3r libslic3r 1.3.0 and Master Commit
| b1a5500. A specially-crafted STL file can lead to a heap buffer
| overflow. An attacker can provide a malicious file to trigger this
| vulnerability.

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1593


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-36788
https://www.cve.org/CVERecord?id=CVE-2022-36788

Please adjust the affected versions in the BTS as needed.



Bug#1034842: xen: CVE-2022-42335 (XSA-430)

2023-04-25 Thread Salvatore Bonaccorso
Source: xen
Version: 4.17.0+74-g3eac216e6e-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for xen, affects only 4.17.

Filling as RC, to make it on the radar for the bookworm release (and
make IMHO sense to try to get it in before release).

CVE-2022-42335[0]:
| x86 shadow paging arbitrary pointer dereference In environments where
| host assisted address translation is necessary but Hardware Assisted
| Paging (HAP) is unavailable, Xen will run guests in so called shadow
| mode. Due to too lax a check in one of the hypervisor routines used
| for shadow page handling it is possible for a guest with a PCI device
| passed through to cause the hypervisor to access an arbitrary pointer
| partially under guest control.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-42335
https://www.cve.org/CVERecord?id=CVE-2022-42335
[1] https://www.openwall.com/lists/oss-security/2023/04/25/1
[2] https://xenbits.xen.org/xsa/advisory-430.html

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Bug#1034841: consul: CVE-2021-41803

2023-04-25 Thread Moritz Mühlenhoff
Source: consul
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for consul.

CVE-2021-41803[0]:
| HashiCorp Consul 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 do not
| properly validate the node or segment names prior to interpolation and
| usage in JWT claim assertions with the auto config RPC. Fixed in
| 1.11.9, 1.12.5, and 1.13.2."

https://discuss.hashicorp.com/t/hcsec-2022-19-consul-auto-config-jwt-authorization-missing-input-validation/44627

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-41803
https://www.cve.org/CVERecord?id=CVE-2021-41803

Please adjust the affected versions in the BTS as needed.



Bug#1034835: closing 1034835

2023-04-25 Thread Salvatore Bonaccorso
close 1034835 1:2.40.1-1
thanks



Processed: closing 1034835

2023-04-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> close 1034835 1:2.40.1-1
Bug #1034835 [src:git] git: CVE-2023-25652 CVE-2023-25815 CVE-2023-29007
Ignoring request to alter fixed versions of bug #1034835 to the same values 
previously set
Bug #1034835 [src:git] git: CVE-2023-25652 CVE-2023-25815 CVE-2023-29007
Marked Bug as done
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1034835: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: git: CVE-2023-25652 CVE-2023-25815 CVE-2023-29007

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> fixed -1 1:2.40.1-1
Bug #1034835 [src:git] git: CVE-2023-25652 CVE-2023-25815 CVE-2023-29007
Marked as fixed in versions git/1:2.40.1-1.

-- 
1034835: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1034835: git: CVE-2023-25652 CVE-2023-25815 CVE-2023-29007

2023-04-25 Thread Salvatore Bonaccorso
Source: git
Version: 1:2.40.0-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team 
Control: fixed -1 1:2.40.1-1

Hi,

The following vulnerabilities were published for git, while fixed in
unstable already (thus adding along as well the fixed version), it
will affect bookworm, and good if they are fixed before the bookworm
release.

CVE-2023-25652[0]:
| By feeding specially crafted input to `git apply --reject`, a
| path outside the working tree can be overwritten with partially
| controlled contents (corresponding to the rejected hunk(s) from
| the given patch).

CVE-2023-25815[1]:
| When Git is compiled with runtime prefix support and runs without
| translated messages, it still used the gettext machinery to
| display messages, which subsequently potentially looked for
| translated messages in unexpected places. This allowed for
| malicious placement of crafted messages.

CVE-2023-29007[2]:
| When renaming or deleting a section from a configuration file,
| certain malicious configuration values may be misinterpreted as
| the beginning of a new configuration section, leading to arbitrary
| configuration injection.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-25652
https://www.cve.org/CVERecord?id=CVE-2023-25652
[1] https://security-tracker.debian.org/tracker/CVE-2023-25815
https://www.cve.org/CVERecord?id=CVE-2023-25815
[2] https://security-tracker.debian.org/tracker/CVE-2023-29007
https://www.cve.org/CVERecord?id=CVE-2023-29007
[3] https://lore.kernel.org/lkml/xmqqa5yv3n93.fsf@gitster.g/

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Bug#1034214: tcmu-runner: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Cyril Brulebois
Control: tag -1 patch pending

Andreas Henriksson  (2023-04-12):
> A better solution would derive the path from systemd.pc, eg.
> pkg-config --variable=systemdsystemunitdir systemd
> 
> (Note: this needs pkg-config and systemd in build-deps)

Not during the hard freeze.

Minimal source debdiff attached, along with the resulting binary debdiff
for the tcmu-runner package.


Maintainer: I'm uploading to DELAYED/5, it can be either rescheduled to
DELAYED/0 if you're happy with the changes right now, or be superseded
by an upload of yours if that happens before the delay is over.


Cheers,
-- 
Cyril Brulebois (k...@debian.org)
D-I release manager -- Release team member -- Freelance Consultant
diff -Nru tcmu-1.5.4/debian/changelog tcmu-1.5.4/debian/changelog
--- tcmu-1.5.4/debian/changelog	2022-07-23 21:53:15.0 +
+++ tcmu-1.5.4/debian/changelog	2023-04-25 17:51:40.0 +
@@ -1,3 +1,11 @@
+tcmu (1.5.4-4.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Ship systemd unit under /lib/systemd/system so that it can get picked
+up by dh_installsystemd. Closes: #1034214
+
+ -- Cyril Brulebois   Tue, 25 Apr 2023 17:51:40 +
+
 tcmu (1.5.4-4) unstable; urgency=medium
 
   * QA upload.
diff -Nru tcmu-1.5.4/debian/tcmu-runner.install tcmu-1.5.4/debian/tcmu-runner.install
--- tcmu-1.5.4/debian/tcmu-runner.install	2022-07-23 21:53:15.0 +
+++ tcmu-1.5.4/debian/tcmu-runner.install	2023-04-25 17:51:39.0 +
@@ -1,5 +1,5 @@
 debian/tmp/etc
-debian/tmp/usr/lib/systemd/system/tcmu-runner.service
+debian/tmp/usr/lib/systemd/system/tcmu-runner.service /lib/systemd/system
 debian/tmp/usr/lib/*/tcmu-runner
 debian/tmp/usr/bin
 debian/tmp/usr/share
[The following lists of changes regard files as different if they have
different names, permissions or owners.]

Files in second .deb but not in first
-
-rw-r--r--  root/root   /usr/lib/systemd/system/tcmu-runner.service

Files in first .deb but not in second
-
-rw-r--r--  root/root   /lib/systemd/system/tcmu-runner.service

No differences were encountered between the conffiles files

Control files: lines which differ (wdiff format)

Installed-Size: [-326-] {+324+}
Version: [-1.5.4-4.1-] {+1.5.4-4+}

Postinst files: lines which differ (wdiff format)
-
[-# Automatically added by dh_installsystemd/13.11.4-]
[-if [ "$1" = "configure" ] || [ "$1" = "abort-upgrade" ] || [ "$1" = 
"abort-deconfigure" ] || [ "$1" = "abort-remove" ] ; then-]
[-  # The following line should be removed in trixie or trixie+1-]
[-  deb-systemd-helper unmask 'tcmu-runner.service' >/dev/null || true-]
[--]
[-  # was-enabled defaults to true, so new installations run enable.-]
[-  if deb-systemd-helper --quiet was-enabled 'tcmu-runner.service'; then-]
[-  # Enables the unit on first installation, creates new-]
[-  # symlinks on upgrades if the unit file has changed.-]
[-  deb-systemd-helper enable 'tcmu-runner.service' >/dev/null || 
true-]
[-  else-]
[-  # Update the statefile to add new symlinks (if any), which need 
to be-]
[-  # cleaned up on purge. Also remove old symlinks.-]
[-  deb-systemd-helper update-state 'tcmu-runner.service' 
>/dev/null || true-]
[-  fi-]
[-fi-]
[-# End automatically added section-]
[-# Automatically added by dh_installsystemd/13.11.4-]
[-if [ "$1" = "configure" ] || [ "$1" = "abort-upgrade" ] || [ "$1" = 
"abort-deconfigure" ] || [ "$1" = "abort-remove" ] ; then-]
[-  if [ -d /run/systemd/system ]; then-]
[-  systemctl --system daemon-reload >/dev/null || true-]
[-  if [ -n "$2" ]; then-]
[-  _dh_action=restart-]
[-  else-]
[-  _dh_action=start-]
[-  fi-]
[-  deb-systemd-invoke $_dh_action 'tcmu-runner.service' >/dev/null 
|| true-]
[-  fi-]
[-fi-]
[-# End automatically added section-]

Postrm files: lines which differ (wdiff format)
---
[-# Automatically added by dh_installsystemd/13.11.4-]
[-if [ "$1" = remove ] && [ -d /run/systemd/system ] ; then-]
[-  systemctl --system daemon-reload >/dev/null || true-]
[-fi-]
[-# End automatically added section-]
[-# Automatically added by dh_installsystemd/13.11.4-]
[-if [ "$1" = "purge" ]; then-]
[-  if [ -x "/usr/bin/deb-systemd-helper" ]; then-]
[-  deb-systemd-helper purge 'tcmu-runner.service' >/dev/null || 
true-]
[-  fi-]
[-fi-]
[-# End automatically added section-]

No differences were encountered between the preinst files

Prerm files: lines which differ (wdiff format)
--
# Automatically added by [-dh_installsystemd/13.11.4-]
[-if [ -z "${DPKG_ROOT:-}" ] && [ "$1" = 

Processed: Re: Bug#1034214: tcmu-runner: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 patch pending
Bug #1034214 [tcmu-runner] tcmu-runner: dh_installsystemd doesn't handle files 
in /usr/lib/systemd/system
Added tag(s) patch and pending.

-- 
1034214: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034214
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1034215: drkonqi: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Cyril Brulebois
Andreas Henriksson  (2023-04-12):
> I forgot to mention that since this is a template unit (@.service)
> maybe the severity should not be RC.
> As far as I know debhelper will not enable any instance of a template
> unit by default anyway, so the consequences that bigon warned about
> probably doesn't apply here?

Right, moving the file doesn't change anything in the binary package.

Verified with the attached patch.


Cheers,
-- 
Cyril Brulebois (k...@debian.org)
D-I release manager -- Release team member -- Freelance Consultant
diff -Nru drkonqi-5.27.2/debian/changelog drkonqi-5.27.2/debian/changelog
--- drkonqi-5.27.2/debian/changelog	2023-02-28 13:58:47.0 +
+++ drkonqi-5.27.2/debian/changelog	2023-04-25 17:43:05.0 +
@@ -1,3 +1,11 @@
+drkonqi (5.27.2-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Ship systemd unit under /lib/systemd/system so that it can get picked
+up by dh_installsystemd (Closes: #1034215).
+
+ -- Cyril Brulebois   Tue, 25 Apr 2023 17:43:05 +
+
 drkonqi (5.27.2-1) unstable; urgency=medium
 
   [ Aurélien COUDERC ]
diff -Nru drkonqi-5.27.2/debian/patches/0001-fix-systemd-unit-directory.patch drkonqi-5.27.2/debian/patches/0001-fix-systemd-unit-directory.patch
--- drkonqi-5.27.2/debian/patches/0001-fix-systemd-unit-directory.patch	1970-01-01 00:00:00.0 +
+++ drkonqi-5.27.2/debian/patches/0001-fix-systemd-unit-directory.patch	2023-04-25 17:42:41.0 +
@@ -0,0 +1,15 @@
+From: Cyril Brulebois 
+Date: Tue, 25 Apr 2023 17:38:42 +
+Subject: Adjust systemd unit location
+Bug-Debian: https://bugs.debian.org/1034215
+--- a/src/coredump/processor/CMakeLists.txt
 b/src/coredump/processor/CMakeLists.txt
+@@ -11,7 +11,7 @@ configure_file(
+ )
+ install(
+ FILES ${CMAKE_CURRENT_BINARY_DIR}/drkonqi-coredump-processor@.service
+-DESTINATION ${KDE_INSTALL_SYSTEMDUNITDIR}/system
++DESTINATION /lib/systemd/system
+ )
+ 
+ # https://github.com/systemd/systemd/issues/19437
diff -Nru drkonqi-5.27.2/debian/patches/series drkonqi-5.27.2/debian/patches/series
--- drkonqi-5.27.2/debian/patches/series	1970-01-01 00:00:00.0 +
+++ drkonqi-5.27.2/debian/patches/series	2023-04-25 17:42:41.0 +
@@ -0,0 +1 @@
+0001-fix-systemd-unit-directory.patch


signature.asc
Description: PGP signature


Bug#1034216: boinc-client: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Cyril Brulebois
Cyril Brulebois  (2023-04-25):
> Minimal source debdiff attached.
> 
> The resulting binary debdiff is attached as well (limited to boinc-client).

Hmmm. I forgot to check packages in bullseye; that one is weird.

Seen on 
https://packages.debian.org/search?lang=en=bullseye=any=path=contents=boinc-client.service

You have searched for paths that end with boinc-client.service in suite 
bullseye, all sections, and all architectures. Found 2 results.

FilePackages
/lib/systemd/system/boinc-client.serviceboinc-client [mips]
/usr/lib/systemd/system/boinc-client.serviceboinc-client [not mips] 

ISTR moving files is considered unsafe in this situation?

> Maintainer: I'm uploading to DELAYED/5, it can be either rescheduled to
> DELAYED/0 if you're happy with the changes right now, or be superseded
> by an upload of yours if that happens before the delay is over.

It's still there for the time being, but I'll need an answer to the
above question soon.


Cheers,
-- 
Cyril Brulebois (k...@debian.org)
D-I release manager -- Release team member -- Freelance Consultant


signature.asc
Description: PGP signature


Bug#1034216: boinc-client: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Cyril Brulebois
Control: tag -1 patch pending

Hi,

bi...@debian.org  (2023-04-11):
> This is not supported by the version of dh_installsystemd/debhelper currently
> in unstable and bookworm (See: #1031695). That means that currently your
> service might not be enabled at boot and/or started as expected.
> 
> With the freeze currently in effect, debhelper will not be fixed for bookworm.
> 
> As a result, could you please move these files to /lib/systemd/system instead
> so they are properly detected by debhelper?
> As soon as debhelper is supporting (not until bookworm+1 aka Trixie) you will
> be able to move them back to the newer location.

Minimal source debdiff attached.

The resulting binary debdiff is attached as well (limited to boinc-client).


Maintainer: I'm uploading to DELAYED/5, it can be either rescheduled to
DELAYED/0 if you're happy with the changes right now, or be superseded
by an upload of yours if that happens before the delay is over.


Cheers,
-- 
Cyril Brulebois (k...@debian.org)
D-I release manager -- Release team member -- Freelance Consultant
diff -Nru boinc-7.20.5+dfsg/debian/boinc-client.install boinc-7.20.5+dfsg/debian/boinc-client.install
--- boinc-7.20.5+dfsg/debian/boinc-client.install	2022-01-26 16:42:50.0 +0100
+++ boinc-7.20.5+dfsg/debian/boinc-client.install	2023-04-25 18:56:54.0 +0200
@@ -8,4 +8,4 @@
 usr/bin/boinccmd
 usr/bin/switcherusr/lib/boinc-client
 usr/share/locale/*/LC_MESSAGES/BOINC-Client.mo
-usr/lib/systemd/system
+usr/lib/systemd/system/*lib/systemd/system/
diff -Nru boinc-7.20.5+dfsg/debian/changelog boinc-7.20.5+dfsg/debian/changelog
--- boinc-7.20.5+dfsg/debian/changelog	2022-12-02 16:00:35.0 +0100
+++ boinc-7.20.5+dfsg/debian/changelog	2023-04-25 18:59:54.0 +0200
@@ -1,3 +1,11 @@
+boinc (7.20.5+dfsg-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Ship systemd unit under /lib/systemd/system so that it can get picked
+up by dh_installsystemd (Closes: #1034216)
+
+ -- Cyril Brulebois   Tue, 25 Apr 2023 16:59:54 +
+
 boinc (7.20.5+dfsg-1) unstable; urgency=medium
 
   * New upstream version 7.20.5+dfsg
[The following lists of changes regard files as different if they have
different names, permissions or owners.]

Files in second .deb but not in first
-
-rw-r--r--  root/root   /lib/systemd/system/boinc-client.service

Files in first .deb but not in second
-
-rw-r--r--  root/root   /usr/lib/systemd/system/boinc-client.service
-rw-r--r--  root/root   /usr/share/doc/boinc-client/changelog.Debian.amd64.gz

No differences were encountered between the conffiles files

Control files: lines which differ (wdiff format)

Depends: debconf (>= 0.5) | debconf-2.0, python3:any, libboinc7 (= 
[-7.20.5+dfsg-1+b2),-] {+7.20.5+dfsg-1.1),+} libc6 (>= 2.34), libcurl4 (>= 
7.16.2), libgcc-s1 (>= 3.3.1), libstdc++6 (>= 11), libx11-6, libxss1, zlib1g 
(>= 1:1.1.4), adduser, ca-certificates, lsb-base (>= 3.0-6)
Source: boinc [-(7.20.5+dfsg-1)-]
Version: [-7.20.5+dfsg-1+b2-] {+7.20.5+dfsg-1.1+}

Postinst files: lines which differ (wdiff format)
-
# Automatically added by [-dh_installinit/13.11.3-] {+dh_installinit/13.11.4+}
{+fi+}
{+fi+}
{+# End automatically added section+}
{+# Automatically added by dh_installsystemd/13.11.4+}
{+if [ "$1" = "configure" ] || [ "$1" = "abort-upgrade" ] || [ "$1" = 
"abort-deconfigure" ] || [ "$1" = "abort-remove" ] ; then+}
{+  # The following line should be removed in trixie or trixie+1+}
{+  deb-systemd-helper unmask 'boinc-client.service' >/dev/null || true+}
{++}
{+  # was-enabled defaults to true, so new installations run enable.+}
{+  if deb-systemd-helper --quiet was-enabled 'boinc-client.service'; then+}
{+  # Enables the unit on first installation, creates new+}
{+  # symlinks on upgrades if the unit file has changed.+}
{+  deb-systemd-helper enable 'boinc-client.service' >/dev/null || 
true+}
{+  else+}
{+  # Update the statefile to add new symlinks (if any), which need 
to be+}
{+  # cleaned up on purge. Also remove old symlinks.+}
{+  deb-systemd-helper update-state 'boinc-client.service' 
>/dev/null || true+}
{+  fi+}
{+fi+}
{+# End automatically added section+}
{+# Automatically added by dh_installsystemd/13.11.4+}
{+if [ "$1" = "configure" ] || [ "$1" = "abort-upgrade" ] || [ "$1" = 
"abort-deconfigure" ] || [ "$1" = "abort-remove" ] ; then+}
{+  if [ -d /run/systemd/system ]; then+}
{+  systemctl --system daemon-reload >/dev/null || true+}
{+  if [ -n "$2" ]; then+}
{+  _dh_action=restart+}
{+  else+}
{+  _dh_action=start+}
{+  fi+}
{+  deb-systemd-invoke 

Processed: Re: Bug#1034216: boinc-client: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 patch pending
Bug #1034216 [boinc-client] boinc-client: dh_installsystemd doesn't handle 
files in /usr/lib/systemd/system
Added tag(s) patch and pending.

-- 
1034216: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034216
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1034751: marked as done (python-xmlschema: accesses internet during build)

2023-04-25 Thread Debian Bug Tracking System
Your message dated Tue, 25 Apr 2023 17:03:52 +
with message-id 
and subject line Bug#1034751: fixed in python-xmlschema 1.10.0-6
has caused the Debian Bug report #1034751,
regarding python-xmlschema: accesses internet during build
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1034751: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034751
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: python-xmlschema
Version: 1.10.0-5
Severity: serious
Justification: Policy §4.9

Policy §4.9 states: For packages in the main archive, required targets
must not attempt network access, except, via the loopback interface, to
services on the build host that have been started by the build.

Running "wget http://example.com; to check if network access is
available violates this rule. Furthermore, our buildds have network
access and thus this check succeeds and the package downloads files
during the build.

Cheers
-- 
Sebastian Ramacher
--- End Message ---
--- Begin Message ---
Source: python-xmlschema
Source-Version: 1.10.0-6
Done: Georges Khaznadar 

We believe that the bug you reported is fixed in the latest version of
python-xmlschema, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1034...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Georges Khaznadar  (supplier of updated python-xmlschema 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 25 Apr 2023 17:29:03 +0200
Source: python-xmlschema
Architecture: source
Version: 1.10.0-6
Distribution: unstable
Urgency: medium
Maintainer: Debian Python Team 
Changed-By: Georges Khaznadar 
Closes: 1034751
Changes:
 python-xmlschema (1.10.0-6) unstable; urgency=medium
 .
   * disabled some tests, rather than executing them conditionnally after
 the success of "wget http://example.com;. Closes: #1034751
Checksums-Sha1:
 3eaadf70ef6bc2ba60b1dc050a12b3c3ef728ab8 2389 python-xmlschema_1.10.0-6.dsc
 c1d6720be629d5a4a375bccb4e2821ee84f917fb 7460 
python-xmlschema_1.10.0-6.debian.tar.xz
 7242753865287451aed65244691c8b5b739836f8 8246 
python-xmlschema_1.10.0-6_source.buildinfo
Checksums-Sha256:
 1566b0afaf838ee9ee719f1f1dea46b222bc94ff347461e2db95518adaa77930 2389 
python-xmlschema_1.10.0-6.dsc
 67358ff0649e464c17a911fee0380ecf4618b44cd2f057a57e371a845cb164f8 7460 
python-xmlschema_1.10.0-6.debian.tar.xz
 bae0d5f6e9f88631d758e684eb1ea5ead37d9f24b934a6c1e577b37d4c06658c 8246 
python-xmlschema_1.10.0-6_source.buildinfo
Files:
 68fe233d04236d1af423a25268eeea81 2389 python optional 
python-xmlschema_1.10.0-6.dsc
 11f7fd18b92f416700e05994920b3f2b 7460 python optional 
python-xmlschema_1.10.0-6.debian.tar.xz
 97a1993ffbeb16a283fb8ebc7c7f99a0 8246 python optional 
python-xmlschema_1.10.0-6_source.buildinfo

-BEGIN PGP SIGNATURE-
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=npOY
-END PGP SIGNATURE End Message ---


Bug#1034224: pvpgn: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Cyril Brulebois
Hi Laurent,

bi...@debian.org  (2023-04-11):
> This is not supported by the version of dh_installsystemd/debhelper currently
> in unstable and bookworm (See: #1031695). That means that currently your
> service might not be enabled at boot and/or started as expected.
> 
> With the freeze currently in effect, debhelper will not be fixed for bookworm.
> 
> As a result, could you please move these files to /lib/systemd/system instead
> so they are properly detected by debhelper?
> As soon as debhelper is supporting (not until bookworm+1 aka Trixie) you will
> be able to move them back to the newer location.

This package requires no changes to get the file moved into the right location,
and the relevant lines in maintainer scripts.

Will you request a binNMU for it?


Cheers,
-- 
Cyril Brulebois (k...@debian.org)
D-I release manager -- Release team member -- Freelance Consultant


signature.asc
Description: PGP signature


Bug#1034228: zcfan: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Cyril Brulebois
Cyril Brulebois  (2023-04-25):
> Maintainer: I'm uploading to DELAYED/5, it can be either rescheduled to
> DELAYED/0 if you're happy with the changes right now, or be superseded
> by an upload of yours if that happens before the delay is over.

Sorry, I've used `dch -i` instead of `dch -n` so it's not obvious this
is an NMU. Fixed source debdiff attached, and that's what I've just
uploaded to DELAYED/5.


Cheers,
-- 
Cyril Brulebois (k...@debian.org)
D-I release manager -- Release team member -- Freelance Consultant
diff -Nru zcfan-1.2.1/debian/changelog zcfan-1.2.1/debian/changelog
--- zcfan-1.2.1/debian/changelog	2022-08-12 21:27:28.0 +
+++ zcfan-1.2.1/debian/changelog	2023-04-25 16:01:08.0 +
@@ -1,3 +1,11 @@
+zcfan (1.2.1-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Ship systemd unit under /lib/systemd/system so that it can get picked
+up by dh_installsystemd. (Closes: #1034228)
+
+ -- Cyril Brulebois   Tue, 25 Apr 2023 16:01:08 +
+
 zcfan (1.2.1-1) unstable; urgency=low
 
   * Initial release. (Closes: #1016908)
diff -Nru zcfan-1.2.1/debian/patches/fix-systemd-unit-location.diff zcfan-1.2.1/debian/patches/fix-systemd-unit-location.diff
--- zcfan-1.2.1/debian/patches/fix-systemd-unit-location.diff	1970-01-01 00:00:00.0 +
+++ zcfan-1.2.1/debian/patches/fix-systemd-unit-location.diff	2023-04-25 15:59:48.0 +
@@ -0,0 +1,15 @@
+Description: Ship systemd unit where dh_installsystemd can find it.
+Author: Cyril Brulebois 
+Forwarded: not-needed
+Last-Update: 2023-04-24
+--- a/Makefile
 b/Makefile
+@@ -41,7 +41,7 @@ clang-tidy:
+ install: all
+ 	mkdir -p $(DESTDIR)$(bindir)/
+ 	$(INSTALL) -pt $(DESTDIR)$(bindir)/ $(EXECUTABLES)
+-	$(INSTALL) -Dp -m 644 zcfan.service $(DESTDIR)$(prefix)/lib/systemd/system/zcfan.service
++	$(INSTALL) -Dp -m 644 zcfan.service $(DESTDIR)/lib/systemd/system/zcfan.service
+ 	$(INSTALL) -Dp -m 644 zcfan.1 $(DESTDIR)$(mandir)/man1/zcfan.1
+ 
+ clean:
diff -Nru zcfan-1.2.1/debian/patches/series zcfan-1.2.1/debian/patches/series
--- zcfan-1.2.1/debian/patches/series	2022-08-12 21:15:44.0 +
+++ zcfan-1.2.1/debian/patches/series	2023-04-25 15:57:28.0 +
@@ -1 +1,2 @@
 add-cppflags.diff
+fix-systemd-unit-location.diff


signature.asc
Description: PGP signature


Processed: Re: Bug#1034228: zcfan: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 patch pending
Bug #1034228 [zcfan] zcfan: dh_installsystemd doesn't handle files in 
/usr/lib/systemd/system
Added tag(s) patch and pending.

-- 
1034228: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034228
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1034228: zcfan: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Cyril Brulebois
Control: tag -1 patch pending

Andreas Henriksson  (2023-04-11):
> The culprit seems to be the wrong path hardcoded at:
> https://sources.debian.org/src/zcfan/1.2.1-1/Makefile/#L44
> 
> Preferably you would find out this path by querying systemd.pc for it,
> ie. pkg-config --variable=systemdsystemunitdir systemd
> 
> (Note: You'll also need to build-dep on pkg-config and systemd, for
> systemd.pc)

Let's… not do that during the hard freeze.

With the attached patch, the resulting binary debdiff looks like this:

[The following lists of changes regard files as different if they have
different names, permissions or owners.]

Files in second .deb but not in first
-
-rw-r--r--  root/root   /lib/systemd/system/zcfan.service
-rwxr-xr-x  root/root   DEBIAN/postinst
-rwxr-xr-x  root/root   DEBIAN/postrm
-rwxr-xr-x  root/root   DEBIAN/prerm

Files in first .deb but not in second
-
-rw-r--r--  root/root   /usr/lib/systemd/system/zcfan.service
(*) -rw-r--r--  root/root   /usr/share/doc/zcfan/changelog.Debian.amd64.gz

Control files: lines which differ (wdiff format)

Installed-Size: [-36-] {+39+}
(*) [-Source: zcfan (1.2.1-1)-]
Version: [-1.2.1-1+b1-] {+1.2.1-2+}

There's a bit of extra noise in there, due to the fact we're comparing a
binNMU against a normal upload, I've prefixed relevant lines with an
asterisk.


Maintainer: I'm uploading to DELAYED/5, it can be either rescheduled to
DELAYED/0 if you're happy with the changes right now, or be superseded
by an upload of yours if that happens before the delay is over.


Cheers,
-- 
Cyril Brulebois (k...@debian.org)
D-I release manager -- Release team member -- Freelance Consultant
diff -Nru zcfan-1.2.1/debian/changelog zcfan-1.2.1/debian/changelog
--- zcfan-1.2.1/debian/changelog	2022-08-12 21:27:28.0 +
+++ zcfan-1.2.1/debian/changelog	2023-04-25 16:01:08.0 +
@@ -1,3 +1,10 @@
+zcfan (1.2.1-2) unstable; urgency=medium
+
+  * Ship systemd unit under /lib/systemd/system so that it can get picked
+up by dh_installsystemd. (Closes: #1034228)
+
+ -- Cyril Brulebois   Tue, 25 Apr 2023 16:01:08 +
+
 zcfan (1.2.1-1) unstable; urgency=low
 
   * Initial release. (Closes: #1016908)
diff -Nru zcfan-1.2.1/debian/patches/fix-systemd-unit-location.diff zcfan-1.2.1/debian/patches/fix-systemd-unit-location.diff
--- zcfan-1.2.1/debian/patches/fix-systemd-unit-location.diff	1970-01-01 00:00:00.0 +
+++ zcfan-1.2.1/debian/patches/fix-systemd-unit-location.diff	2023-04-25 15:59:48.0 +
@@ -0,0 +1,15 @@
+Description: Ship systemd unit where dh_installsystemd can find it.
+Author: Cyril Brulebois 
+Forwarded: not-needed
+Last-Update: 2023-04-24
+--- a/Makefile
 b/Makefile
+@@ -41,7 +41,7 @@ clang-tidy:
+ install: all
+ 	mkdir -p $(DESTDIR)$(bindir)/
+ 	$(INSTALL) -pt $(DESTDIR)$(bindir)/ $(EXECUTABLES)
+-	$(INSTALL) -Dp -m 644 zcfan.service $(DESTDIR)$(prefix)/lib/systemd/system/zcfan.service
++	$(INSTALL) -Dp -m 644 zcfan.service $(DESTDIR)/lib/systemd/system/zcfan.service
+ 	$(INSTALL) -Dp -m 644 zcfan.1 $(DESTDIR)$(mandir)/man1/zcfan.1
+ 
+ clean:
diff -Nru zcfan-1.2.1/debian/patches/series zcfan-1.2.1/debian/patches/series
--- zcfan-1.2.1/debian/patches/series	2022-08-12 21:15:44.0 +
+++ zcfan-1.2.1/debian/patches/series	2023-04-25 15:57:28.0 +
@@ -1 +1,2 @@
 add-cppflags.diff
+fix-systemd-unit-location.diff


signature.asc
Description: PGP signature


Bug#1034229: wsdd2: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Cyril Brulebois
Control: tag -1 patch pending

Hi,

Andreas Henriksson  (2023-04-11):
> The culprit seems to be the hard-coded path at:
> https://sources.debian.org/src/wsdd2/1.8.7%2Bdfsg-1/Makefile/#L31
> 
> As this path will change again in the future, please consider
> finding out the path from the proper source via:
> pkg-config --variable=systemdsystemunitdir systemd
> 
> (Note: you'll need to build-dep on pkg-config and systemd, for
> systemd.pc)

Or just patch it out now, and drop the patch later, as we're in hard
freeze.

Building with the attached patch leads to the following changes on the
binary side, as expected:

Files in second .deb but not in first
-
-rw-r--r--  root/root   /lib/systemd/system/wsdd2.service
-rwxr-xr-x  root/root   DEBIAN/postinst
-rwxr-xr-x  root/root   DEBIAN/postrm
-rwxr-xr-x  root/root   DEBIAN/prerm

Files in first .deb but not in second
-
-rw-r--r--  root/root   /usr/lib/systemd/system/wsdd2.service


Maintainer: I'm uploading to DELAYED/5, it can be either rescheduled to
DELAYED/0 if you're happy with the changes right now, or be superseded
by an upload of yours if that happens before the delay is over.


Cheers,
-- 
Cyril Brulebois (k...@debian.org)
D-I release manager -- Release team member -- Freelance Consultant
diff -Nru wsdd2-1.8.7+dfsg/debian/changelog wsdd2-1.8.7+dfsg/debian/changelog
--- wsdd2-1.8.7+dfsg/debian/changelog	2022-07-13 21:24:12.0 +
+++ wsdd2-1.8.7+dfsg/debian/changelog	2023-04-25 15:40:11.0 +
@@ -1,3 +1,11 @@
+wsdd2 (1.8.7+dfsg-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Ship systemd unit under /lib/systemd/system so that it can get picked
+up by dh_installsystemd (Closes: #1034229)
+
+ -- Cyril Brulebois   Tue, 25 Apr 2023 15:40:11 +
+
 wsdd2 (1.8.7+dfsg-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru wsdd2-1.8.7+dfsg/debian/patches/0002-Fix-systemd-unit-directory.patch wsdd2-1.8.7+dfsg/debian/patches/0002-Fix-systemd-unit-directory.patch
--- wsdd2-1.8.7+dfsg/debian/patches/0002-Fix-systemd-unit-directory.patch	1970-01-01 00:00:00.0 +
+++ wsdd2-1.8.7+dfsg/debian/patches/0002-Fix-systemd-unit-directory.patch	2023-04-25 15:39:54.0 +
@@ -0,0 +1,22 @@
+From: Cyril Brulebois 
+Date: Tue, 25 Apr 2023 15:37:40 +
+Subject: Fix systemd unit directory
+Forwarded: not-needed
+Bug-Debian: https://bugs.debian.org/1034229
+
+For Bookworm, dh_installsystemd only looks at /lib/systemd/system (and
+doesn't look at /usr/lib/systemd/system).
+
+--- a/Makefile
 b/Makefile
+@@ -28,8 +28,8 @@ install: wsdd2
+ 	install wsdd2 $(DESTDIR)$(SBINDIR)
+ 	install -d $(DESTDIR)$(MANDIR)/man8
+ 	install -m 0644 wsdd2.8 $(DESTDIR)$(MANDIR)/man8
+-	install -d $(DESTDIR)$(LIBDIR)/systemd/system
+-	install -m 0644 wsdd2.service $(DESTDIR)$(LIBDIR)/systemd/system
++	install -d $(DESTDIR)/lib/systemd/system
++	install -m 0644 wsdd2.service $(DESTDIR)/lib/systemd/system
+ 
+ clean:
+ 	rm -f wsdd2 nl_debug $(OBJFILES)
diff -Nru wsdd2-1.8.7+dfsg/debian/patches/series wsdd2-1.8.7+dfsg/debian/patches/series
--- wsdd2-1.8.7+dfsg/debian/patches/series	2021-10-23 18:58:25.0 +
+++ wsdd2-1.8.7+dfsg/debian/patches/series	2023-04-25 15:36:45.0 +
@@ -1 +1,2 @@
 0001-Additional_parameters_in_unit_file.patch
+0002-Fix-systemd-unit-directory.patch


signature.asc
Description: PGP signature


Processed: Re: Bug#1034229: wsdd2: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 patch pending
Bug #1034229 [wsdd2] wsdd2: dh_installsystemd doesn't handle files in 
/usr/lib/systemd/system
Added tag(s) patch and pending.

-- 
1034229: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034229
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1034235: marked as done (ceph-iscsi: dh_installsystemd doesn't handle files in /usr/lib/systemd/system)

2023-04-25 Thread Debian Bug Tracking System
Your message dated Tue, 25 Apr 2023 15:48:58 +
with message-id 
and subject line Bug#1034235: fixed in ceph-iscsi 3.5-3
has caused the Debian Bug report #1034235,
regarding ceph-iscsi: dh_installsystemd doesn't handle files in 
/usr/lib/systemd/system
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1034235: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034235
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ceph-iscsi
Version: 3.5-2 
Severity: serious
Tags: sid bookworm
User: debhel...@packages.debian.org
Usertags: systemd-files-in-usr-bookworm

Dear Maintainer,

It seems that your package ceph-iscsi is shipping files (.service, .socket or
.timer) in /usr/lib/systemd/system.

This is not supported by the version of dh_installsystemd/debhelper currently
in unstable and bookworm (See: #1031695). That means that currently your
service might not be enabled at boot and/or started as expected.

With the freeze currently in effect, debhelper will not be fixed for bookworm.

As a result, could you please move these files to /lib/systemd/system instead
so they are properly detected by debhelper?
As soon as debhelper is supporting (not until bookworm+1 aka Trixie) you will
be able to move them back to the newer location.

Note that bookworm is currently in hard freeze, please limit the changes you
are uploading to the ones fixing RC bugs.  Also note that you might have to
request a freeze exception to the release team.
See: https://release.debian.org/testing/freeze_policy.html

Feel free to contact me if you have any questions.

Kind regards,
Laurent Bigonville

The list of packages has been generated with the following command:
apt-file search -x '^/usr/lib/systemd/system/.*\.(service|timer|socket)$'|cut 
-d: -f1|sort -u
--- End Message ---
--- Begin Message ---
Source: ceph-iscsi
Source-Version: 3.5-3
Done: Cyril Brulebois 

We believe that the bug you reported is fixed in the latest version of
ceph-iscsi, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1034...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Cyril Brulebois  (supplier of updated ceph-iscsi package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 25 Apr 2023 15:26:14 +
Source: ceph-iscsi
Architecture: source
Version: 3.5-3
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Cyril Brulebois 
Closes: 1034235
Changes:
 ceph-iscsi (3.5-3) unstable; urgency=medium
 .
   * QA upload.
   * Ship systemd units under /lib/systemd/system so that they can get
 picked up by dh_installsystemd (Closes: #1034235).
Checksums-Sha1:
 3824f09dc942975b429fd577e5c052e927e630b4 2118 ceph-iscsi_3.5-3.dsc
 7c99430c578230eb4e73140d9ae42359c4d5bca4 3184 ceph-iscsi_3.5-3.debian.tar.xz
 8a252161c8ae1277eedf922914ac2b2a90cf9ffa 8185 ceph-iscsi_3.5-3_source.buildinfo
Checksums-Sha256:
 7f6ce52d265508ffac5ee506d117784e3ee9998238ed8d7f6d1a43a8b6c9dbbf 2118 
ceph-iscsi_3.5-3.dsc
 86d98650547cf9507abc9b939c217b1ac943d5af1410d08badcc339f7d3f1920 3184 
ceph-iscsi_3.5-3.debian.tar.xz
 652f854d2238d4757edc2acd15877152fba9c3b1ca728a38afcaf2003e6e6f92 8185 
ceph-iscsi_3.5-3_source.buildinfo
Files:
 983c4a8b7aa8fea64575febc6643d731 2118 python optional ceph-iscsi_3.5-3.dsc
 7ed3e640b1563a55ffb90acd86d85647 3184 python optional 
ceph-iscsi_3.5-3.debian.tar.xz
 c7f4e5dedc9c785bdeb446f5e0b558b7 8185 python optional 
ceph-iscsi_3.5-3_source.buildinfo

-BEGIN PGP SIGNATURE-
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Bug#1034751: python-xmlschema: accesses internet during build

2023-04-25 Thread Georges Khaznadar
Hi,

thank you for the bug report.

Instead of executing some python tests conditionnally, I shall patch
them to prevent their execution, independently from the network's
availability.

Best regards,   Georges.

-- 
Georges KHAZNADAR et Jocelyne FOURNIER
22 rue des mouettes, 59240 Dunkerque France.
Téléphone +33 (0)3 28 29 17 70



signature.asc
Description: PGP signature


Bug#1034235: ceph-iscsi: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Cyril Brulebois
Control: tag -1 patch pending

bi...@debian.org  (2023-04-11):
> It seems that your package ceph-iscsi is shipping files (.service, .socket or
> .timer) in /usr/lib/systemd/system.
> 
> This is not supported by the version of dh_installsystemd/debhelper currently
> in unstable and bookworm (See: #1031695). That means that currently your
> service might not be enabled at boot and/or started as expected.

Source and binary debdiffs attached. Since that's an orphaned package,
an upload will follow.


Cheers,
-- 
Cyril Brulebois (k...@debian.org)
D-I release manager -- Release team member -- Freelance Consultant
diff -Nru ceph-iscsi-3.5/debian/ceph-iscsi.install ceph-iscsi-3.5/debian/ceph-iscsi.install
--- ceph-iscsi-3.5/debian/ceph-iscsi.install	2021-09-24 12:45:45.0 +
+++ ceph-iscsi-3.5/debian/ceph-iscsi.install	2023-04-25 15:25:07.0 +
@@ -1 +1 @@
-usr/lib/systemd/system/*.service
+usr/lib/systemd/system/*.service /lib/systemd/system
diff -Nru ceph-iscsi-3.5/debian/changelog ceph-iscsi-3.5/debian/changelog
--- ceph-iscsi-3.5/debian/changelog	2021-09-24 12:45:45.0 +
+++ ceph-iscsi-3.5/debian/changelog	2023-04-25 15:26:14.0 +
@@ -1,3 +1,11 @@
+ceph-iscsi (3.5-3) unstable; urgency=medium
+
+  * QA upload.
+  * Ship systemd units under /lib/systemd/system so that they can get
+picked up by dh_installsystemd (Closes: #1034235).
+
+ -- Cyril Brulebois   Tue, 25 Apr 2023 15:26:14 +
+
 ceph-iscsi (3.5-2) unstable; urgency=medium
 
   * QA upload.
[The following lists of changes regard files as different if they have
different names, permissions or owners.]

Files in second .changes but not in first
-
-rw-r--r--  root/root   /lib/systemd/system/rbd-target-api.service
-rw-r--r--  root/root   /lib/systemd/system/rbd-target-gw.service

Files in first .changes but not in second
-
-rw-r--r--  root/root   /usr/lib/systemd/system/rbd-target-api.service
-rw-r--r--  root/root   /usr/lib/systemd/system/rbd-target-gw.service

No differences were encountered between the conffiles files

Control files: lines which differ (wdiff format)

Installed-Size: [-557-] {+562+}
Version: [-3.5-2-] {+3.5-2.1+}

Postinst files: lines which differ (wdiff format)
-
{+# Automatically added by dh_installsystemd/13.11.4+}
{+if [ "$1" = "configure" ] || [ "$1" = "abort-upgrade" ] || [ "$1" = 
"abort-deconfigure" ] || [ "$1" = "abort-remove" ] ; then+}
{+  # The following line should be removed in trixie or trixie+1+}
{+  deb-systemd-helper unmask 'rbd-target-api.service' >/dev/null || true+}
{++}
{+  # was-enabled defaults to true, so new installations run enable.+}
{+  if deb-systemd-helper --quiet was-enabled 'rbd-target-api.service'; 
then+}
{+  # Enables the unit on first installation, creates new+}
{+  # symlinks on upgrades if the unit file has changed.+}
{+  deb-systemd-helper enable 'rbd-target-api.service' >/dev/null 
|| true+}
{+  else+}
{+  # Update the statefile to add new symlinks (if any), which need 
to be+}
{+  # cleaned up on purge. Also remove old symlinks.+}
{+  deb-systemd-helper update-state 'rbd-target-api.service' 
>/dev/null || true+}
{+  fi+}
{+fi+}
{+# End automatically added section+}
{+# Automatically added by dh_installsystemd/13.11.4+}
{+if [ "$1" = "configure" ] || [ "$1" = "abort-upgrade" ] || [ "$1" = 
"abort-deconfigure" ] || [ "$1" = "abort-remove" ] ; then+}
{+  # The following line should be removed in trixie or trixie+1+}
{+  deb-systemd-helper unmask 'rbd-target-gw.service' >/dev/null || true+}
{++}
{+  # was-enabled defaults to true, so new installations run enable.+}
{+  if deb-systemd-helper --quiet was-enabled 'rbd-target-gw.service'; 
then+}
{+  # Enables the unit on first installation, creates new+}
{+  # symlinks on upgrades if the unit file has changed.+}
{+  deb-systemd-helper enable 'rbd-target-gw.service' >/dev/null || 
true+}
{+  else+}
{+  # Update the statefile to add new symlinks (if any), which need 
to be+}
{+  # cleaned up on purge. Also remove old symlinks.+}
{+  deb-systemd-helper update-state 'rbd-target-gw.service' 
>/dev/null || true+}
{+  fi+}
{+fi+}
{+# End automatically added section+}
{+# Automatically added by dh_installsystemd/13.11.4+}
{+if [ "$1" = "configure" ] || [ "$1" = "abort-upgrade" ] || [ "$1" = 
"abort-deconfigure" ] || [ "$1" = "abort-remove" ] ; then+}
{+  if [ -d /run/systemd/system ]; then+}
{+  systemctl --system daemon-reload >/dev/null || true+}
{+  if [ -n "$2" ]; then+}
{+  _dh_action=restart+}
{+  else+}
{+  _dh_action=start+}
{+

Processed: Re: Bug#1034235: ceph-iscsi: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 patch pending
Bug #1034235 [ceph-iscsi] ceph-iscsi: dh_installsystemd doesn't handle files in 
/usr/lib/systemd/system
Added tag(s) pending and patch.

-- 
1034235: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034235
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1034240: pass-extension-tomb: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Cyril Brulebois
Hi Laurent,

bi...@debian.org  (2023-04-11):
> It seems that your package pass-extension-tomb is shipping files
> (.service, .socket or .timer) in /usr/lib/systemd/system.

That's pass-close@.service

> As a result, could you please move these files to /lib/systemd/system
> instead so they are properly detected by debhelper?

Once the attached patch is applied, there are absolutely no changes in
the resulting binary package besides the moved package (no extra code
in maintainer scripts). To be on the safe side, I've tried overriding
dh_installsystemd to list the unit directly, and that doesn't change
anything.

What do you think should happen here? Close this as not-a-bug? Or upload
anyway, so that we have all packages aligned, shipping units under /lib
rather than /usr/lib? I don't have any opinion on this at the moment.


Cheers,
-- 
Cyril Brulebois (k...@debian.org)
D-I release manager -- Release team member -- Freelance Consultant
diff -Nru pass-tomb-1.3/debian/changelog pass-tomb-1.3/debian/changelog
--- pass-tomb-1.3/debian/changelog	2022-01-19 06:49:30.0 +
+++ pass-tomb-1.3/debian/changelog	2023-04-25 15:04:51.0 +
@@ -1,3 +1,11 @@
+pass-tomb (1.3-2.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Ship pass-close@.service under /lib/systemd/system so that it can
+be considered by dh_installsystemd (Closes: #1034240).
+
+ -- Cyril Brulebois   Tue, 25 Apr 2023 15:04:51 +
+
 pass-tomb (1.3-2) unstable; urgency=medium
 
   * Change path from /lib to /usr (Closes: #1003996).
diff -Nru pass-tomb-1.3/debian/rules pass-tomb-1.3/debian/rules
--- pass-tomb-1.3/debian/rules	2022-01-19 06:49:30.0 +
+++ pass-tomb-1.3/debian/rules	2023-04-25 15:04:51.0 +
@@ -5,3 +5,5 @@
 
 override_dh_auto_install:
 	dh_auto_install -- PREFIX=/usr BASHCOMPDIR=/usr/share/bash-completion/completions
+	mkdir -p debian/pass-extension-tomb/lib/systemd/system
+	mv debian/pass-extension-tomb/usr/lib/systemd/system/pass-close@.service debian/pass-extension-tomb/lib/systemd/system/pass-close@.service


signature.asc
Description: PGP signature


Bug#1033587: marked as done (debtree: autopkgtest fails: output on stderr)

2023-04-25 Thread Debian Bug Tracking System
Your message dated Tue, 25 Apr 2023 15:18:52 +
with message-id 
and subject line Bug#1033587: fixed in debtree 1.1.2
has caused the Debian Bug report #1033587,
regarding debtree: autopkgtest fails: output on stderr
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033587: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033587
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Source: debtree
Version: 1.1.1
Severity: serious
Tags: bookworm-ignore
User: debian...@lists.debian.org
Usertags: fails-always
Control: found -1 1.0.11

Dear maintainer(s),

Your package has an autopkgtest, great. However, it fails. Can you 
please investigate the situation and fix it? I copied some of the output 
at the bottom of this report. The test itself succeeds, but the 
autopkgtest fails because there is output to stderr and without the 
allow-stderr restriction that is considered a failure.


The release team has announced [1] that failing autopkgtest on amd64 and 
arm64 are considered RC in testing. Because of the timing in the hard 
freeze, I have marked this bug as bookworm-ignore.


More information about this bug and the reason for filing it can be 
found on 
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation


Paul

[1] https://lists.debian.org/debian-devel-announce/2019/07/msg2.html

https://ci.debian.net/data/autopkgtest/testing/amd64/d/debtree/32153485/log.gz

autopkgtest [17:19:33]: test command1: [---

Reading package lists... 0%

Reading package lists... 0%

Reading package lists... 52%

Reading package lists... Done

Building dependency tree... 0%

Building dependency tree... 0%

Building dependency tree... 50%

Building dependency tree... 50%

Building dependency tree... Done

Reading state information... 0%

Reading state information... 4%

Reading state information... Done
I: The following dependencies have been excluded from the graph (skipped):
I: libc6 libstdc++6 zlib1g
digraph "debtree" {
rankdir=LR;
node [shape=box];
"debtree" -> "perl:any" [color=blue];
"perl:any" -> "perl" [dir=back,arrowtail=inv,color=green];
"perl:any" [shape=octagon];
"debtree" -> "libapt-pkg-perl" [color=blue];
"libapt-pkg-perl" -> "perl" [color=blue,label="(>= 5.36.0-4)"];
"libapt-pkg-perl" -> "perlapi-5.36.0" [color=blue];
"perlapi-5.36.0" -> "perl-base" [dir=back,arrowtail=inv,color=green];
"perl-base" -> "libcrypt1" [color=purple,style=bold,label="(>= 
1:4.1.0)"];
"perl-base" -> "dpkg" [color=purple,style=bold,label="(>= 1.17.17)"];
"perlapi-5.36.0" [shape=octagon];
"libapt-pkg-perl" -> "libapt-pkg6.0" [color=blue,label="(>= 2.1.20)"];
"libapt-pkg6.0" -> "libbz2-1.0" [color=blue];
"libapt-pkg6.0" -> "libgcc-s1" [color=blue,label="(>= 3.0)"];
"libgcc-s1" -> "gcc-12-base" [color=blue,label="(= 12.2.0-14)"];
"libapt-pkg6.0" -> "libgcrypt20" [color=blue,label="(>= 1.10.0)"];
"libgcrypt20" -> "libgpg-error0" [color=blue,label="(>= 1.27)"];
"libgpg-error0" -> "libgpg-error-l10n";
"libapt-pkg6.0" -> "liblz4-1" [color=blue,label="(>= 0.0~r127)"];
	"libapt-pkg6.0" -> "liblzma5" [color=blue,label="(>= 
5.1.1alpha+20120614)"];

"libapt-pkg6.0" -> "libsystemd0" [color=blue,label="(>= 221)"];
"libsystemd0" -> "libcap2" [color=blue,label="(>= 1:2.10)"];
"libsystemd0" -> "libgcrypt20" [color=blue,label="(>= 1.10.0)"];
"libsystemd0" -> "liblz4-1" [color=blue,label="(>= 0.0~r122)"];
"libsystemd0" -> "liblzma5" [color=blue,label="(>= 
5.1.1alpha+20120614)"];
"libsystemd0" -> "libzstd1" [color=blue,label="(>= 1.5.2)"];
"libapt-pkg6.0" -> "libudev1" [color=blue,label="(>= 183)"];
"libapt-pkg6.0" -> "libxxhash0" [color=blue,label="(>= 0.7.1)"];
"libapt-pkg6.0" -> "libzstd1" [color=blue,label="(>= 1.5.2)"];
"libapt-pkg6.0" -> "apt" [label="(>= 2.5.6)"];
"libapt-pkg-perl" -> "libgcc-s1" [color=blue,label="(>= 3.0)"];
"debtree" -> "ucf" [color=blue];
"debtree" -> "dctrl-tools" [color=blue];
"dctrl-tools" -> "grep-dctrl" [color=red];
"debtree" -> "graphviz";
"debtree" [style="setlinewidth(2)"]
"grep-dctrl" -> "dctrl-tools" [dir=back,arrowtail=inv,color=green];
"grep-dctrl" [shape=octagon];
"apt" [shape=diamond];
"dpkg" [shape=diamond];
"graphviz" [shape=diamond];
"perl" [shape=diamond];
"ucf" [shape=diamond];
}
// Excluded dependencies:
// libc6 

Processed: Re: Bug#1034234: libpam-modules-bin: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> severity -1 normal
Bug #1034234 [libpam-modules-bin] libpam-modules-bin: dh_installsystemd doesn't 
handle files in /usr/lib/systemd/system
Severity set to 'normal' from 'serious'

-- 
1034234: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034234
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1034234: libpam-modules-bin: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Sam Hartman
control: severity -1 normal

> "Cyril" == Cyril Brulebois  writes:


Cyril> serious & wontfix make for a strange combination…

Yeah, my bad for dropping the ball.
My intent with wontfix was to create a pause and better understand the
issue.
As I understand it,

* On first install, pam_namespace will require an explicit daemon-reload
before it can be started.
However pam_namespace requires explicit administrator configuration

* We don't want pam_namespace to be started automatically, so it's great
that it isn't today

* it's possible that on upgrade or remove it might not be stopped.
That's not a bug today but will be next time the code for the namespace
helper service changes.

None of that sounds RC to me.
Not even important, although I can see an argument either way there and
would be happy to stand aside (or even do the work) if Steve thinks we
should fix this.

I'm very uncomfortable moving files between / and /usr especially in an
essential package.
Between the issues Simon has documented over the years with libraries
and the dpkg aliasing bugs, we've managed to hurt ourselves with this a
number of times.
I *think* this situation is safe.
But when I read the freeze policy, none of the issues mentioned above
justify a change this late in the release process.

I definitely do not think we could undo the  change if we make it until
dpkg fixes the aliasing bug.
The suggestion in Lauren't initial bug report that it would be
appropriate to undo this change after the bookworm release really
frustrated me.
It displayed a complete lack of understanding of the dpkg aliasing
issues,
and I didn't manage to overcome that frustration enough to look at this
issue again until your mail prompted me.
Thanks for that.

If I've mischaracterized the severity of the potential harm above, let
me know.
I don't want a broken pam, but I also consider this kind of move
moderate risk.

--Sam



Processed: Re: Bug#1034234: libpam-modules-bin: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 patch
Bug #1034234 [libpam-modules-bin] libpam-modules-bin: dh_installsystemd doesn't 
handle files in /usr/lib/systemd/system
Added tag(s) patch.

-- 
1034234: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034234
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1034234: libpam-modules-bin: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-04-25 Thread Cyril Brulebois
Control: tag -1 patch

Sam Hartman  (2023-04-11):
> control: tags -1 wontfix

serious & wontfix make for a strange combination…

> > "bigon" == bigon   writes:
> 
> bigon> It seems that your package libpam-modules-bin is shipping
> bigon> files (.service, .socket or .timer) in
> bigon> /usr/lib/systemd/system.
> 
> I think we're talking about pam_namespace.service.
> I don't think dh_installsystemd has anything to do for that file because
> it has no Install section.
> What harm is caused by pam_namespace.service being in /usr/lib/systemd?

To expand on Lauren't answer, you're currently lacking these:

- postinst:

#!/bin/sh
set -e
# Automatically added by dh_installsystemd/13.11.4
if [ "$1" = "configure" ] || [ "$1" = "abort-upgrade" ] || [ "$1" = 
"abort-deconfigure" ] || [ "$1" = "abort-remove" ] ; then  
if [ -d /run/systemd/system ]; then
systemctl --system daemon-reload >/dev/null || true
if [ -n "$2" ]; then
_dh_action=restart
else
_dh_action=start
fi
deb-systemd-invoke $_dh_action 'pam_namespace.service' 
>/dev/null || true
fi
fi
# End automatically added section


- postrm:

#!/bin/sh
set -e
# Automatically added by dh_installsystemd/13.11.4
if [ "$1" = remove ] && [ -d /run/systemd/system ] ; then
systemctl --system daemon-reload >/dev/null || true
fi  
# End automatically added section


- prerm:

#!/bin/sh
set -e
# Automatically added by dh_installsystemd/13.11.4
if [ -z "${DPKG_ROOT:-}" ] && [ "$1" = remove ] && [ -d /run/systemd/system 
] ; then
deb-systemd-invoke stop 'pam_namespace.service' >/dev/null || true
fi  
# End automatically added section


FWIW it's just a matter of changing the last line of
debian/libpam-modules-bin.install to:

usr/lib/systemd/system/pam_namespace.service /lib/systemd/system/

Patch attached.


Cheers,
-- 
Cyril Brulebois (k...@debian.org)
D-I release manager -- Release team member -- Freelance Consultant
--- pam-1.5.2/debian/changelog	2023-01-03 20:15:23.0 +
+++ pam-1.5.2/debian/changelog	2023-04-25 14:51:19.0 +
@@ -1,3 +1,10 @@
+pam (1.5.2-7) UNRELEASED; urgency=medium
+
+  * Fix install directory for pam_namespace.service so that it gets
+picked up by dh_installsystemd, Closes: #1034234
+
+ -- Cyril Brulebois   Tue, 25 Apr 2023 16:51:19 +0200
+
 pam (1.5.2-6) unstable; urgency=medium
 
   * Update debian/copyright, Thanks Bastian Germann, Closes: #460232
--- pam-1.5.2/debian/libpam-modules-bin.install	2023-01-03 20:15:23.0 +
+++ pam-1.5.2/debian/libpam-modules-bin.install	2023-04-25 14:41:36.0 +
@@ -6,4 +6,4 @@
 sbin/pam_timestamp_check	usr/sbin
 sbin/faillock usr/sbin
 modules/pam_faillock/faillock.8 usr/share/man/man8
-usr/lib/systemd/system/pam_namespace.service
+usr/lib/systemd/system/pam_namespace.service /lib/systemd/system/


signature.asc
Description: PGP signature


Bug#1034233: closing 1034233

2023-04-25 Thread Jochen Sprickerhof
close 1034233 1.5.0-2
thanks



Processed: closing 1034233

2023-04-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> close 1034233 1.5.0-2
Bug #1034233 [tlp] tlp: dh_installsystemd doesn't handle files in 
/usr/lib/systemd/system
Ignoring request to alter fixed versions of bug #1034233 to the same values 
previously set
Bug #1034233 [tlp] tlp: dh_installsystemd doesn't handle files in 
/usr/lib/systemd/system
Marked Bug as done
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1034233: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034233
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1034824: tomcat9 should not be released with Bookworm

2023-04-25 Thread Markus Koschany
Source: tomcat9
Version: 9.0.70-1
Severity: serious
X-Debbugs-Cc: a...@debian.org


We can only support one major Tomcat version per release. Tomcat9 has
been part of Buster and Bullseye already and is superseded by Tomcat
10 in Bookworm. I wanted to wait with the removal request until the
issues in [resteasy3.0] and [tomcatjss] have been resolved but to make
it more obvious I am filing this bug report now.



[resteasy3.0] https://bugs.debian.org/1033366
[tomcatjss] https://bugs.debian.org/1031816



Bug#1031816: [Pkg-freeipa-devel] Bug#1031816: Bug#1031816: Bug#1031816: tomcatjss: Migrate to Tomcat 10

2023-04-25 Thread Adrian Bunk
On Sun, Mar 26, 2023 at 03:23:58PM +0200, Markus Koschany wrote:
> Am Sonntag, dem 26.03.2023 um 12:15 +0300 schrieb Timo Aaltonen:
> > Markus Koschany kirjoitti 24.3.2023 klo 15.35:
> > > Am Freitag, dem 24.03.2023 um 09:21 +0200 schrieb Timo Aaltonen:
> > > > Markus Koschany kirjoitti 23.3.2023 klo 19.00:
> > > > > Control: severity -1 serious
> > > > > 
> > > > > On Fri, 24 Feb 2023 11:48:36 +0200 Timo Aaltonen 
> > > > > wrote:
> > > > >    
> > > > > > Upstream doesn't support tomcat10 yet, and tomcatjss fails to build
> > > > > > with
> > > > > > it.
> > > > > 
> > > > > Unfortunately we can only support one Tomcat version per release. We
> > > > > should
> > > > > either migrate to tomcat10 or maybe it is possible to embed some of 
> > > > > the
> > > > > required tomcat9 classes in your source package as a workaround
> > > > > provided
> > > > > the
> > > > > changes are rather small and the security impact is negligible.
> > > > 
> > > > Right, but that's for bookworm+1? By that time I'm sure
> > > > jss/tomcatjss/dogtag have gained upstream support for tomcat10.
> > > 
> > > We are targeting Bookworm. We had Tomcat 8 in Stretch and Tomcat 9 in
> > > Buster
> > > and Bullseye already. Tomcat 10 also targets Java 11 and later while 
> > > Tomcat
> > > 9
> > > was intended for Java 8 and later. We ship OpenJDK 17 in Bookworm.
> > > resteasy3.0
> > > and tomcatjss are the only packages apart from i2p that still depend on
> > > libtomcat9-java.
> > 
> > Nice, so you expect them to migrate after bookworm is already frozen?
> 
> Targeted fixes are still allowed. Including required tomcat9 classes in your
> package may be a solution too. If you can find an agreement with the security
> and release team, then even shipping libtomcat9-java might be possible. But
> then your packages will not receive any security support. 

I've added the release team to Cc, since trying to force a tomcat 9 -> 10 
transition after the start of the transition freeze and after the start of
the soft freeze sounds forbidden to me.

cu
Adrian



Bug#1034609: Fails to start under Python 3.11

2023-04-25 Thread Arto Jantunen
Michael Prokop  writes:

> * Arto Jantunen [Wed Apr 19, 2023 at 07:49:33PM +0300]:
>
>> The package fails to import under Python 3.11 with the following traceback:
>> Traceback (most recent call last):
> [...]
>>   File "/usr/lib/python3/dist-packages/sqlacodegen/main.py", line 10, in 
>> 
>> from sqlacodegen.codegen import CodeGenerator
>>   File "/usr/lib/python3/dist-packages/sqlacodegen/codegen.py", line 4, in 
>> 
>> from inspect import ArgSpec
>> ImportError: cannot import name 'ArgSpec' from 'inspect' 
>> (/usr/lib/python3.11/inspect.py)
>> 
>> The issue seems to have been fixed in the latest release candidate, but that
>> isn't really suitable for bookworm during the freeze, so the intent of this
>> bug is to cause the package to be dropped from the release.
>
> If you don't want to maintain this package or its 1.1.6 version
> within bookworm then nevermind my comment :) - but looking at
> https://github.com/agronholm/sqlacodegen/issues/239#issuecomment-1457728533
> the fix for this *might* be as simple as replacing:
>
>   from inspect import ArgSpec
>
> with:
>
>   from inspect import FullArgSpec
>
> Also see https://docs.python.org/3/whatsnew/changelog.html +
> https://docs.python.org/3/library/inspect.html#inspect.getfullargspec
>
> But given that v1.1.6 was released on 2015-05-15 and not updated
> within Debian since then, while upstream relased multiple stable
> versions like e.g. v2.3.0 on 2020-07-13, I'd understand your
> reasoning to drop this package at least for bookworm. :)

Even after patching those and a few smaller issues the upstream
testsuite still doesn't pass (seems like a difference in how it expects
sqlalchemy to behave, so probably related to the version bookworm has of
that). I could skip the test or patch it to pass, but..

I think it's simply too late now, and would just let the package get
autoremoved.

I plan to upload the latest upstream RC (which I think should work with
Python 3.11) to unstable after that has happened.

-- 
Arto Jantunen



Processed: Bug#1033864 marked as pending in golang-github-crewjam-saml

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 pending
Bug #1033864 [src:golang-github-crewjam-saml] Don't release with bookworm
Added tag(s) pending.

-- 
1033864: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033864
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033864: marked as pending in golang-github-crewjam-saml

2023-04-25 Thread Damian Szuberski
Control: tag -1 pending

Hello,

Bug #1033864 in golang-github-crewjam-saml reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/go-team/packages/golang-github-crewjam-saml/-/commit/8984900ca7e0fe74f2c73fe32b66ebbe9ae7ed8e


0.4.13-1 release

* New upstream version 0.4.13 (Closes: #1033753, #1033864)
* Lintian fixes


(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/1033864



Processed: Re: exaile has been removed from Debian

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> reopen -1
Bug #785897 {Done: Andreas Beckmann } [src:exaile] exaile: 
Please update to GStreamer 1.x
Warning: Unknown package 'src:exaile'
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
Warning: Unknown package 'src:exaile'
Warning: Unknown package 'src:exaile'
No longer marked as fixed in versions 3.4.5-1+rm.
Warning: Unknown package 'src:exaile'
> notfixed -1 3.4.5-1+rm
Bug #785897 [src:exaile] exaile: Please update to GStreamer 1.x
Warning: Unknown package 'src:exaile'
The source 'exaile' and version '3.4.5-1+rm' do not appear to match any binary 
packages
Ignoring request to alter fixed versions of bug #785897 to the same values 
previously set
Warning: Unknown package 'src:exaile'

-- 
785897: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785897
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#785897: exaile has been removed from Debian

2023-04-25 Thread Bastian Germann

Control: reopen -1
Control: notfixed -1 3.4.5-1+rm

On Tue, 18 Apr 2023 13:25:48 +0200 Andreas Beckmann  wrote:

exaile was last released with Debian 8 (jessie) in April 2015
and was removed from the Debian archive afterwards.
See https://bugs.debian.org/813255 for details on the removal.
I'm closing the remaining bug reports now.


That is true but the bug was reopend to follow the Debian rules for package 
reintroduction: #1012202.



Processed: Re: inkscape: canvas stops updating completely when trying to edit a text box

2023-04-25 Thread Debian Bug Tracking System
Processing control commands:

> severity -1 important
Bug #1034289 [libgtk-3-0] inkscape: canvas stops updating completely when 
trying to edit a text box
Severity set to 'important' from 'serious'

-- 
1034289: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034289
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1034289: inkscape: canvas stops updating completely when trying to edit a text box

2023-04-25 Thread James Addison
Package: libgtk-3-0
Version: 3.24.37-2
Followup-For: Bug #1034289
Control: severity -1 important

As mentioned previously: although this bug seemed RC-level in the context of
Inkscape, libgtk3 has a sizable set of dependent packages, so in that context,
and given that release-preparation time is finite, I think we should reduce the
severity.  (despite that, I intend to track this bug fairly closely because I'm
interested in the results)



Bug#1034769: singular: build-dependencies unsatifiable on architectures where sagemath is unavailable.

2023-04-25 Thread Jerome BENOIT

Hi Peter, thanks for your report.
I will have a look soon.
Best wishes,
Jerome
--
Jerome BENOIT | calculus+at-rezozer^dot*net
https://qa.debian.org/developer.php?login=calcu...@rezozer.net
AE28 AE15 710D FF1D 87E5  A762 3F92 19A6 7F36 C68B


OpenPGP_signature
Description: OpenPGP digital signature