Bug#1021196: marked as done (sweethome3d: Fail to export plans as svg)

2022-12-04 Thread Debian Bug Tracking System
Your message dated Sun, 04 Dec 2022 23:40:29 +
with message-id 
and subject line Bug#1021196: fixed in sweethome3d 7.0.2+dfsg-2
has caused the Debian Bug report #1021196,
regarding sweethome3d: Fail to export plans as svg
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1021196: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021196
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: sweethome3d
Version: 7.0.2+dfsg-1
Severity: normal

Dear Maintainer,

I can't save a plan to SVG:

In top menu "Plan" go to the bottom and select "Export To SVG Format"
The file size is 0 (zero) byte.
And sweethome3d when launched from a terminal return these errors :

,
| Java 3D: implicit antialiasing enabled
| java.lang.NoClassDefFoundError: org/freehep/util/io/WriterOutputStream
|   at 
com.eteks.sweethome3d.swing.PlanComponent$SVGSupport.exportToSVG(Unknown Source)
|   at com.eteks.sweethome3d.swing.PlanComponent.exportToSVG(Unknown Source)
|   at com.eteks.sweethome3d.swing.PlanComponent.exportData(Unknown Source)
|   at 
com.eteks.sweethome3d.swing.MultipleLevelsPlanPanel.exportData(Unknown Source)
|   at com.eteks.sweethome3d.swing.HomePane.exportToSVG(Unknown Source)
|   at com.eteks.sweethome3d.viewcontroller.HomeController$38.call(Unknown 
Source)
|   at com.eteks.sweethome3d.viewcontroller.HomeController$38.call(Unknown 
Source)
|   at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
|   at 
com.eteks.sweethome3d.viewcontroller.ThreadedTaskController$1.run(Unknown 
Source)
|   at 
java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
|   at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
|   at 
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
|   at 
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
|   at java.base/java.lang.Thread.run(Thread.java:829)
| Caused by: java.lang.ClassNotFoundException: 
org.freehep.util.io.WriterOutputStream
|   at 
java.base/jdk.internal.loader.BuiltinClassLoader.loadClass(BuiltinClassLoader.java:581)
|   at 
java.base/jdk.internal.loader.ClassLoaders$AppClassLoader.loadClass(ClassLoaders.java:178)
|   at java.base/java.lang.ClassLoader.loadClass(ClassLoader.java:522)
|   ... 14 more
`

Christian


-- System Information:
Debian Release: bookworm/sid
  APT prefers buildd-unstable
  APT policy: (500, 'buildd-unstable'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.19.12 (SMP w/24 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages sweethome3d depends on:
ii  default-jre [java8-runtime] 2:1.11-72
ii  icedtea-netx1.8.8-1
ii  java-wrappers   0.3
ii  libbatik-java   1.15+dfsg-1
ii  libfreehep-graphics2d-java  2.4+dfsg-3
ii  libfreehep-graphicsbase-java2.4+dfsg-3
ii  libfreehep-graphicsio-java  2.4+dfsg-3
ii  libfreehep-graphicsio-svg-java  2.4+dfsg-3
ii  libitext-java   2.1.7-13
ii  libjava3d-java  1.5.2+dfsg-17
ii  libsunflow-java 0.07.2.svn396+dfsg-18
ii  openjdk-11-jre [java8-runtime]  11.0.16+8-1

Versions of packages sweethome3d recommends:
pn  sweethome3d-furniture  

sweethome3d suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: sweethome3d
Source-Version: 7.0.2+dfsg-2
Done: Pierre Gruet 

We believe that the bug you reported is fixed in the latest version of
sweethome3d, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1021...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Pierre Gruet  (supplier of updated sweethome3d package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 04 Dec 2022 23:42:47 +0100
Source: 

sweethome3d_7.0.2+dfsg-2_source.changes ACCEPTED into unstable

2022-12-04 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 04 Dec 2022 23:42:47 +0100
Source: sweethome3d
Architecture: source
Version: 7.0.2+dfsg-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers 

Changed-By: Pierre Gruet 
Closes: 1021196
Changes:
 sweethome3d (7.0.2+dfsg-2) unstable; urgency=medium
 .
   * Team upload.
   * Adding the freehep-io jar to the runtime classpath (Closes: #1021196)
   * Raising the d/watch version to 4
Checksums-Sha1:
 81e4b0223049e8da8f0040336a744bc6ca891f3e 2233 sweethome3d_7.0.2+dfsg-2.dsc
 8ce346bf25483f9282c6b65c69c8752656a2ff05 20044 
sweethome3d_7.0.2+dfsg-2.debian.tar.xz
 fbc9eafd867ff8b6b57a9240010b820f9470f2d9 11035 
sweethome3d_7.0.2+dfsg-2_amd64.buildinfo
Checksums-Sha256:
 bf211d4ae9dd5c036f6c1f4f6de650959820024a71c0a968dd124e98f5673190 2233 
sweethome3d_7.0.2+dfsg-2.dsc
 a0aec360666e452c1601c2b4c5e710b262b92891054ad1f4546694adcf3a7384 20044 
sweethome3d_7.0.2+dfsg-2.debian.tar.xz
 2edbcb6204a85f3bfcdd8ba3f19c6e65fd1a42fb2831b417cf02c22e79d900ab 11035 
sweethome3d_7.0.2+dfsg-2_amd64.buildinfo
Files:
 65149146a21d4ce293e6258acfce492d 2233 java optional 
sweethome3d_7.0.2+dfsg-2.dsc
 dc0aefcf0fdf609517c1f1319beb2fc5 20044 java optional 
sweethome3d_7.0.2+dfsg-2.debian.tar.xz
 d1e80e540bc74314c6f425b0227979d4 11035 java optional 
sweethome3d_7.0.2+dfsg-2_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=VvvY
-END PGP SIGNATURE-


__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


Processing of sweethome3d_7.0.2+dfsg-2_source.changes

2022-12-04 Thread Debian FTP Masters
sweethome3d_7.0.2+dfsg-2_source.changes uploaded successfully to localhost
along with the files:
  sweethome3d_7.0.2+dfsg-2.dsc
  sweethome3d_7.0.2+dfsg-2.debian.tar.xz
  sweethome3d_7.0.2+dfsg-2_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)

__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


Bug#1023573: marked as done (hsqldb: CVE-2022-41853)

2022-12-04 Thread Debian Bug Tracking System
Your message dated Sun, 04 Dec 2022 21:07:58 +
with message-id 
and subject line Bug#1023573: fixed in hsqldb 2.7.1-1
has caused the Debian Bug report #1023573,
regarding hsqldb: CVE-2022-41853
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1023573: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023573
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: hsqldb
Version: 2.7.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for hsqldb.

CVE-2022-41853[0]:
| Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb
| (HyperSQL DataBase) to process untrusted input may be vulnerable to a
| remote code execution attack. By default it is allowed to call any
| static method of any Java class in the classpath resulting in code
| execution. The issue can be prevented by updating to 2.7.1 or by
| setting the system property "hsqldb.method_class_names" to classes
| which are allowed to be called. For example,
| System.setProperty("hsqldb.method_class_names", "abc") or Java
| argument -Dhsqldb.method_class_names="abc" can be used. From version
| 2.7.1 all classes by default are not accessible except those in
| java.lang.Math and need to be manually enabled.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-41853
https://www.cve.org/CVERecord?id=CVE-2022-41853
[1] https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50212#c7
[2] 
http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control
[3] https://sourceforge.net/p/hsqldb/svn/6614/

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: hsqldb
Source-Version: 2.7.1-1
Done: Markus Koschany 

We believe that the bug you reported is fixed in the latest version of
hsqldb, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1023...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Markus Koschany  (supplier of updated hsqldb package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 04 Dec 2022 21:32:57 +0100
Source: hsqldb
Architecture: source
Version: 2.7.1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers 

Changed-By: Markus Koschany 
Closes: 1023573
Changes:
 hsqldb (2.7.1-1) unstable; urgency=medium
 .
   * New upstream version 2.7.1.
 - Fix CVE-2022-41853:
   Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb
   (HyperSQL DataBase) to process untrusted input may be vulnerable to a
   remote code execution attack. By default it is allowed to call any static
   method of any Java class in the classpath resulting in code execution.
   The issue can be prevented by updating to 2.7.1 or by setting the system
   property "hsqldb.method_class_names" to classes which are allowed to be
   called. For example, System.setProperty("hsqldb.method_class_names",
   "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used.
   From version 2.7.1 all classes by default are not accessible except those
   in java.lang.Math and need to be manually enabled.
   (Closes: #1023573)
Checksums-Sha1:
 6cb9a2688562741a81eb3da5f4aba832615769a3 2239 hsqldb_2.7.1-1.dsc
 5b5cb87b48614f82576faec871e81f2cb308955f 3563928 hsqldb_2.7.1.orig.tar.xz
 af0012ae4c3796efdbc75aa9e117e5f17d0996f8 11768 hsqldb_2.7.1-1.debian.tar.xz
 5cfbb84418b8f43d5fcad11b2165038d5c819bbf 12702 hsqldb_2.7.1-1_amd64.buildinfo
Checksums-Sha256:
 6ea736372faf5af6715ff357193e6156766717e2037b2401d9d05a82cf2a71be 2239 
hsqldb_2.7.1-1.dsc
 3605a8b3223d98fc0b50aa405ae1b4074be55fc9aaefeb56a441ffb11767e071 3563928 
hsqldb_2.7.1.orig.tar.xz
 7858f29ce0a472eb03f5e62c8ec4d9e8e0b37373d19c21b2a525233666cd9b0f 11768 
hsqldb_2.7.1-1.debian.tar.xz
 a3d070c788efd5d5f92361193f0b246fc12e7c1583148088ef2467a1b001a9db 12702 

hsqldb_2.7.1-1_source.changes ACCEPTED into unstable

2022-12-04 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 04 Dec 2022 21:32:57 +0100
Source: hsqldb
Architecture: source
Version: 2.7.1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers 

Changed-By: Markus Koschany 
Closes: 1023573
Changes:
 hsqldb (2.7.1-1) unstable; urgency=medium
 .
   * New upstream version 2.7.1.
 - Fix CVE-2022-41853:
   Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb
   (HyperSQL DataBase) to process untrusted input may be vulnerable to a
   remote code execution attack. By default it is allowed to call any static
   method of any Java class in the classpath resulting in code execution.
   The issue can be prevented by updating to 2.7.1 or by setting the system
   property "hsqldb.method_class_names" to classes which are allowed to be
   called. For example, System.setProperty("hsqldb.method_class_names",
   "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used.
   From version 2.7.1 all classes by default are not accessible except those
   in java.lang.Math and need to be manually enabled.
   (Closes: #1023573)
Checksums-Sha1:
 6cb9a2688562741a81eb3da5f4aba832615769a3 2239 hsqldb_2.7.1-1.dsc
 5b5cb87b48614f82576faec871e81f2cb308955f 3563928 hsqldb_2.7.1.orig.tar.xz
 af0012ae4c3796efdbc75aa9e117e5f17d0996f8 11768 hsqldb_2.7.1-1.debian.tar.xz
 5cfbb84418b8f43d5fcad11b2165038d5c819bbf 12702 hsqldb_2.7.1-1_amd64.buildinfo
Checksums-Sha256:
 6ea736372faf5af6715ff357193e6156766717e2037b2401d9d05a82cf2a71be 2239 
hsqldb_2.7.1-1.dsc
 3605a8b3223d98fc0b50aa405ae1b4074be55fc9aaefeb56a441ffb11767e071 3563928 
hsqldb_2.7.1.orig.tar.xz
 7858f29ce0a472eb03f5e62c8ec4d9e8e0b37373d19c21b2a525233666cd9b0f 11768 
hsqldb_2.7.1-1.debian.tar.xz
 a3d070c788efd5d5f92361193f0b246fc12e7c1583148088ef2467a1b001a9db 12702 
hsqldb_2.7.1-1_amd64.buildinfo
Files:
 eb6d2da20a1d3f39add460125f87e374 2239 libs optional hsqldb_2.7.1-1.dsc
 695a1f0dbbbcf7e0d700be8cc5b5a4b6 3563928 libs optional hsqldb_2.7.1.orig.tar.xz
 4d97fae8b0d5de593d5b68b4370470f5 11768 libs optional 
hsqldb_2.7.1-1.debian.tar.xz
 20e9a0db6ee559dd9d4359a3f11ff2c6 12702 libs optional 
hsqldb_2.7.1-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=MDn8
-END PGP SIGNATURE-


__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


Processing of hsqldb_2.7.1-1_source.changes

2022-12-04 Thread Debian FTP Masters
hsqldb_2.7.1-1_source.changes uploaded successfully to localhost
along with the files:
  hsqldb_2.7.1-1.dsc
  hsqldb_2.7.1.orig.tar.xz
  hsqldb_2.7.1-1.debian.tar.xz
  hsqldb_2.7.1-1_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)

__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


Processed: unarchive for bullseye

2022-12-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> unarchive 997580
Bug #997580 {Done: Markus Koschany } 
[src:libpicocontainer1-java] libpicocontainer1-java: FTBFS: dh_auto_test: 
error: /usr/lib/jvm/default-java/bin/java -noverify -cp 
/usr/share/maven/boot/plexus-classworlds-2.x.jar -Dmaven.home=/usr/share/maven 
-Dmaven.multiModuleProjectDirectory=/<> 
-Dclassworlds.conf=/etc/maven/m2-debian.conf 
org.codehaus.plexus.classworlds.launcher.Launcher 
-s/etc/maven/settings-debian.xml -Ddebian.dir=/<>/debian 
-Dmaven.repo.local=/<>/debian/maven-repo --batch-mode test 
returned exit code 1
Unarchived Bug 997580
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
997580: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=997580
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


Bug#1025442: jruby, jruby-openssl: both ship /usr/share/jruby/lib/ruby/stdlib/*openssl*

2022-12-04 Thread Andreas Beckmann
Package: jruby,jruby-openssl
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts
Control: found -1 9.3.9.0+ds-1
Control: found -1 0.9.21-4

Hi,

during a test with piuparts I noticed your package failed to install
because it tries to overwrite other packages files without declaring a
Breaks+Replaces relation.

See policy 7.6 at
https://www.debian.org/doc/debian-policy/ch-relationships.html#overwriting-files-and-replacing-packages-replaces

>From the attached log (scroll to the bottom...):

  Preparing to unpack .../jruby-openssl_0.9.21-4_all.deb ...
  Unpacking jruby-openssl (0.9.21-4) ...
  dpkg: error processing archive 
/var/cache/apt/archives/jruby-openssl_0.9.21-4_all.deb (--unpack):
   trying to overwrite '/usr/share/jruby/lib/ruby/stdlib/jopenssl/load.rb', 
which is also in package jruby 9.3.9.0+ds-1
  dpkg-deb: error: paste subprocess was killed by signal (Broken pipe)
  Errors were encountered while processing:
   /var/cache/apt/archives/jruby-openssl_0.9.21-4_all.deb


If jruby-openssl is obsolete, please RM it and add to jruby
  Breaks+Replaces: jruby-openssl
and probably also a (versioned) Provides: jruby-openssl


cheers,

Andreas


jruby=9.3.9.0+ds-1_jruby-openssl=0.9.21-4.log.gz
Description: application/gzip
__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


Processed: jruby, jruby-openssl: both ship /usr/share/jruby/lib/ruby/stdlib/*openssl*

2022-12-04 Thread Debian Bug Tracking System
Processing control commands:

> found -1 9.3.9.0+ds-1
Bug #1025442 [jruby,jruby-openssl] jruby,jruby-openssl: both ship 
/usr/share/jruby/lib/ruby/stdlib/*openssl*
There is no source info for the package 'jruby-openssl' at version 
'9.3.9.0+ds-1' with architecture ''
Marked as found in versions jruby/9.3.9.0+ds-1.
> found -1 0.9.21-4
Bug #1025442 [jruby,jruby-openssl] jruby,jruby-openssl: both ship 
/usr/share/jruby/lib/ruby/stdlib/*openssl*
There is no source info for the package 'jruby' at version '0.9.21-4' with 
architecture ''
Marked as found in versions jruby-openssl/0.9.21-4.

-- 
1025442: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025442
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


Bug#1024987: marked as done (sweethome3d: Fail to start)

2022-12-04 Thread Debian Bug Tracking System
Your message dated Sun, 4 Dec 2022 20:46:42 +0100
with message-id 
and subject line Re: Bug#1024453: mediathek: fails to start with openjdk 17
has caused the Debian Bug report #1024453,
regarding sweethome3d: Fail to start
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1024453: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024453
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: sweethome3d
Version: 7.0.2+dfsg-1
Severity: grave

Dear Maintainer,

sweethome3d fail to start. Maybe related to java 17 as sweethome3d
was working with java 11

,
| $ sweethome3d 
| [warning] /usr/bin/sweethome3d: No java runtime was found
| [warning] /usr/bin/sweethome3d: No JAVA_CMD set for run_java, falling back to 
JAVA_CMD = java
| Java 3D: implicit antialiasing enabled
| Exception in thread "J3D-Renderer-1" java.lang.IllegalAccessError: class 
javax.media.j3d.X11NativeConfigTemplate3D (in unnamed module @0x614635c2) 
cannot access class sun.awt.X11GraphicsConfig (in module java.desktop) because 
module java.desktop does not export sun.awt to unnamed module @0x614635c2
|   at 
javax.media.j3d.X11NativeConfigTemplate3D.isGraphicsConfigSupported(X11NativeConfigTemplate3D.java:180)
|   at 
javax.media.j3d.NativePipeline.isGraphicsConfigSupported(NativePipeline.java:3341)
|   at javax.media.j3d.Renderer.doWork(Renderer.java:533)
|   at javax.media.j3d.J3dThread.run(J3dThread.java:275)
`

Christian


-- System Information:
Debian Release: bookworm/sid
  APT prefers buildd-unstable
  APT policy: (500, 'buildd-unstable'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.0.10 (SMP w/24 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages sweethome3d depends on:
ii  default-jre [java8-runtime] 2:1.17-73
ii  icedtea-netx1.8.8-2
ii  java-wrappers   0.3
ii  libbatik-java   1.16+dfsg-1
ii  libfreehep-graphics2d-java  2.4+dfsg-3
ii  libfreehep-graphicsbase-java2.4+dfsg-3
ii  libfreehep-graphicsio-java  2.4+dfsg-3
ii  libfreehep-graphicsio-svg-java  2.4+dfsg-3
ii  libitext-java   2.1.7-13
ii  libjava3d-java  1.5.2+dfsg-17
ii  libsunflow-java 0.07.2.svn396+dfsg-18
ii  openjdk-17-jre [java8-runtime]  17.0.5+8-2

Versions of packages sweethome3d recommends:
pn  sweethome3d-furniture  

sweethome3d suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Version: 0.4

On 2022-11-19 19:31:05 +0100, Sebastian Ramacher wrote:
> Control: reassign -1 java-wrappers 0.3
> Control: affects -1 mediathekview
> 
> On 2022-11-19 19:18:14 +0100, Sebastian Ramacher wrote:
> > Package: mediathekview
> > Version: 13.2.1+ds-1
> > Severity: grave
> > X-Debbugs-Cc: sramac...@debian.org
> > 
> > Since the switch to openjre-17 as default, mediathekview nolonger
> > starts:
> > 
> > $ mediathekview 
> > [warning] /usr/bin/mediathekview: No java runtime was found
> 
> This is an issue in java-wrappers. It does not know about version 17.

 java-wrappers (0.4) unstable; urgency=medium
 .
   * Team upload.
   * Add JDK17-20 (Closes: #1011165)
   * Switch to debhelper-compat 13
   * Add R³
   * Add Multi-Arch according to MA hinter
   * Update Vcs fields
   * Make d/copyright machine readable
   * Bump policy version (no changes)

Cheers
-- 
Sebastian Ramacher--- End Message ---
__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


Bug#1024453: marked as done (mediathek: fails to start with openjdk 17)

2022-12-04 Thread Debian Bug Tracking System
Your message dated Sun, 4 Dec 2022 20:46:42 +0100
with message-id 
and subject line Re: Bug#1024453: mediathek: fails to start with openjdk 17
has caused the Debian Bug report #1024453,
regarding mediathek: fails to start with openjdk 17
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1024453: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024453
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: mediathekview
Version: 13.2.1+ds-1
Severity: grave
X-Debbugs-Cc: sramac...@debian.org

Since the switch to openjre-17 as default, mediathekview nolonger
starts:

$ mediathekview 
[warning] /usr/bin/mediathekview: No java runtime was found


Cheers

-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable-debug
  APT policy: (650, 'unstable-debug'), (650, 'unstable'), (601, 'testing'), 
(600, 'experimental-debug'), (600, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.0.0-4-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages mediathekview depends on:
ii  default-jre [java9-runtime] 2:1.17-73
ii  java-wrappers   0.3
ii  libcommons-compress-java1.21-1
ii  libcommons-configuration2-java  2.8.0-1
ii  libcommons-dbcp2-java   2.9.0-1
ii  libcommons-lang3-java   3.12.0-2
ii  libcommons-pool2-java   2.11.1-1
ii  libcontrolsfx-java  11.0.0-1
ii  libguava-java   29.0-6
ii  libjackson2-core-java   2.14.0-2
ii  libjchart2d-java3.2.2+dfsg2-3
ii  libjiconfont-font-awesome-java  4.7.0.1-1
ii  libjiconfont-java   1.0.0-2
ii  libjiconfont-swing-java 1.0.1-2
ii  libjide-oss-java3.7.6+dfsg-2
ii  liblog4j2-java  2.17.2-1
ii  libmbassador-java   1.3.1-2
ii  libmiglayout-java   5.1-3
ii  libokhttp-java  3.13.1-3
ii  libopenjfx-java 11.0.11+1-1.1
ii  libslf4j-java   1.7.32-1
ii  libswingx-java  1:1.6.2-4
ii  libxz-java  1.9-1
ii  openjdk-17-jre [java9-runtime]  17.0.5+8-2

Versions of packages mediathekview recommends:
pn  flvstreamer  
ii  mpv  0.35.0-2
ii  vlc  3.0.18~rc2-1+b1

Versions of packages mediathekview suggests:
ii  ffmpeg  7:5.1.2-1

-- no debconf information

-- 
Sebastian Ramacher
--- End Message ---
--- Begin Message ---
Version: 0.4

On 2022-11-19 19:31:05 +0100, Sebastian Ramacher wrote:
> Control: reassign -1 java-wrappers 0.3
> Control: affects -1 mediathekview
> 
> On 2022-11-19 19:18:14 +0100, Sebastian Ramacher wrote:
> > Package: mediathekview
> > Version: 13.2.1+ds-1
> > Severity: grave
> > X-Debbugs-Cc: sramac...@debian.org
> > 
> > Since the switch to openjre-17 as default, mediathekview nolonger
> > starts:
> > 
> > $ mediathekview 
> > [warning] /usr/bin/mediathekview: No java runtime was found
> 
> This is an issue in java-wrappers. It does not know about version 17.

 java-wrappers (0.4) unstable; urgency=medium
 .
   * Team upload.
   * Add JDK17-20 (Closes: #1011165)
   * Switch to debhelper-compat 13
   * Add R³
   * Add Multi-Arch according to MA hinter
   * Update Vcs fields
   * Make d/copyright machine readable
   * Bump policy version (no changes)

Cheers
-- 
Sebastian Ramacher--- End Message ---
__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


Bug#1025418: marked as done (jffi: Please add support for "riscv64" arch)

2022-12-04 Thread Debian Bug Tracking System
Your message dated Sun, 04 Dec 2022 18:19:13 +
with message-id 
and subject line Bug#1025418: fixed in jffi 1.3.9+ds-5
has caused the Debian Bug report #1025418,
regarding jffi: Please add support for "riscv64" arch
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1025418: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025418
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: jffi
Version: 1.2.7-11
Severity: wishlist
Tags: ftbfs patch
User: debian-ri...@lists.debian.org
Usertags: riscv64
X-Debbugs-Cc: m...@debian.org, debian-ri...@lists.debian.org

Hi,

Please add support this architecture, with the patch attached or an equivalent.

This package built well in the past on riscv64 but it seems that in recent
versions it needs some extra support.

I built the package locally on hardware, it built fine with the patch
0013-Add-support-for-riscv64.patch.  Also attached the whole debdiff.


Thanks and cheers.
--
Manuel A. Fernandez Montecelo 
diff -Nru jffi-1.3.9+ds/debian/changelog jffi-1.3.9+ds/debian/changelog
--- jffi-1.3.9+ds/debian/changelog  2022-12-04 05:45:16.0 +
+++ jffi-1.3.9+ds/debian/changelog  2022-12-04 10:22:42.0 +
@@ -1,3 +1,10 @@
+jffi (1.3.9+ds-4+0.riscv64.1) unreleased; urgency=medium
+
+  * Non-maintainer upload.
+  * riscv64: add support for architecture
+
+ -- Manuel A. Fernandez Montecelo   Sun, 04 Dec 2022 10:22:42 
+
+
 jffi (1.3.9+ds-4) unstable; urgency=medium
 
   * Team upload.
diff -Nru jffi-1.3.9+ds/debian/patches/0013-Add-support-for-riscv64.patch 
jffi-1.3.9+ds/debian/patches/0013-Add-support-for-riscv64.patch
--- jffi-1.3.9+ds/debian/patches/0013-Add-support-for-riscv64.patch 
1970-01-01 00:00:00.0 +
+++ jffi-1.3.9+ds/debian/patches/0013-Add-support-for-riscv64.patch 
2022-12-04 10:22:32.0 +
@@ -0,0 +1,44 @@
+Index: jffi-1.3.9+ds/src/main/java/com/kenai/jffi/Platform.java
+===
+--- jffi-1.3.9+ds.orig/src/main/java/com/kenai/jffi/Platform.java
 jffi-1.3.9+ds/src/main/java/com/kenai/jffi/Platform.java
+@@ -108,6 +108,8 @@ public abstract class Platform {
+ MIPS(32),
+/** MIPS64EL */
+ MIPS64EL(64),
++   /** RISCV64 */
++RISCV64(64),
+ /** Unknown CPU */
+ UNKNOWN(64);
+ 
+@@ -250,6 +252,8 @@ public abstract class Platform {
+ 
+ } else if (Util.equalsIgnoreCase("mips64", archString, LOCALE) || 
Util.equalsIgnoreCase("mips64el", archString, LOCALE)) {
+ return CPU.MIPS64EL;
++} else if (Util.equalsIgnoreCase("riscv64", archString, LOCALE)) {
++return CPU.RISCV64;
+ }
+ 
+ 
+Index: jffi-1.3.9+ds/src/main/java/com/kenai/jffi/internal/StubLoader.java
+===
+--- jffi-1.3.9+ds.orig/src/main/java/com/kenai/jffi/internal/StubLoader.java
 jffi-1.3.9+ds/src/main/java/com/kenai/jffi/internal/StubLoader.java
+@@ -163,6 +163,8 @@ public class StubLoader {
+ MIPS,
+ /** MIPS 64-bit little endian */
+ MIPS64EL,
++/** RISC-V 64-bit little endian */
++RISCV64,
+ /** Unknown CPU */
+ UNKNOWN;
+ 
+@@ -233,6 +235,8 @@ public class StubLoader {
+ return CPU.MIPS;
+ } else if (Util.equalsIgnoreCase("mips64", archString, LOCALE) || 
Util.equalsIgnoreCase("mips64el", archString, LOCALE)) {
+ return CPU.MIPS64EL;
++} else if (Util.equalsIgnoreCase("riscv64", archString, LOCALE)) {
++return CPU.RISCV64;
+ 
+ }
+ 
diff -Nru jffi-1.3.9+ds/debian/patches/series 
jffi-1.3.9+ds/debian/patches/series
--- jffi-1.3.9+ds/debian/patches/series 2022-12-04 05:45:16.0 +
+++ jffi-1.3.9+ds/debian/patches/series 2022-12-04 10:06:03.0 +
@@ -10,3 +10,4 @@
 0010-output-test-results-to-console-instead-of-file.patch
 0011-Fix-tests-for-32-bit-ARM-armel-and-armhf.patch
 0012-Add-support-for-mips.patch
+0013-Add-support-for-riscv64.patch
Index: jffi-1.3.9+ds/src/main/java/com/kenai/jffi/Platform.java
===
--- jffi-1.3.9+ds.orig/src/main/java/com/kenai/jffi/Platform.java
+++ jffi-1.3.9+ds/src/main/java/com/kenai/jffi/Platform.java
@@ -108,6 +108,8 @@ public abstract class Platform {
 MIPS(32),
/** MIPS64EL */
 MIPS64EL(64),
+   /** RISCV64 */
+RISCV64(64),
 /** Unknown CPU */
 UNKNOWN(64);
 
@@ -250,6 +252,8 @@ public 

jffi_1.3.9+ds-5_source.changes ACCEPTED into unstable

2022-12-04 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 04 Dec 2022 12:48:47 -0500
Source: jffi
Architecture: source
Version: 1.3.9+ds-5
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers 

Changed-By: Jérôme Charaoui 
Closes: 1025418
Changes:
 jffi (1.3.9+ds-5) unstable; urgency=medium
 .
   * Team upload.
   * d/patches: fix mipsel patch
   * d/patches: add support for riscv64 architecture (Closes: #1025418)
Checksums-Sha1:
 abe11a3c210d3ca85bdb8602cd41b81726d9b889 1643 jffi_1.3.9+ds-5.dsc
 b9d0bef8e92d051ec12b084353ca50300329974c 11752 jffi_1.3.9+ds-5.debian.tar.xz
 6812216c96799dc681ca6249f3e90164cfb77d44 17180 jffi_1.3.9+ds-5_amd64.buildinfo
Checksums-Sha256:
 18d9eb4b03dc228dbdf04f6cc14cc573860f5c6eb45e78ef737df11959ecbf51 1643 
jffi_1.3.9+ds-5.dsc
 a59aa39d1b72cf2a4136681eae15a89a7af3f35ef5cbc6a770ae9916558bbcc5 11752 
jffi_1.3.9+ds-5.debian.tar.xz
 130275982199cd305aec4e8d6bf009a41bd59e78aa78365e4b907181a74b0c7b 17180 
jffi_1.3.9+ds-5_amd64.buildinfo
Files:
 6f59bc7426cb4959b27170e7e646d624 1643 java optional jffi_1.3.9+ds-5.dsc
 9788fe2a0b2de87314e89f8927206bcf 11752 java optional 
jffi_1.3.9+ds-5.debian.tar.xz
 3a9384cd3932440b0de55ea784f1becf 17180 java optional 
jffi_1.3.9+ds-5_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iHUEARYIAB0WIQTAq04Rv2xblqv/eu5pxS9ljpiFQgUCY4zeFAAKCRBpxS9ljpiF
QnhEAP4uh7lStfo6THjnfKFCOfZjs3Um9XbViCnYxyjUCw75gwD/bNW5hqjipFUh
uQrEbIOK12Wi7YUPf34DtL4Zu2OydQ8=
=f2dm
-END PGP SIGNATURE-


__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


Processing of jffi_1.3.9+ds-5_source.changes

2022-12-04 Thread Debian FTP Masters
jffi_1.3.9+ds-5_source.changes uploaded successfully to localhost
along with the files:
  jffi_1.3.9+ds-5.dsc
  jffi_1.3.9+ds-5.debian.tar.xz
  jffi_1.3.9+ds-5_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)

__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


java-wrappers_0.4_source.changes ACCEPTED into unstable

2022-12-04 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 04 Dec 2022 18:55:07 +0100
Source: java-wrappers
Architecture: source
Version: 0.4
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers 

Changed-By: Jochen Sprickerhof 
Closes: 1011165
Changes:
 java-wrappers (0.4) unstable; urgency=medium
 .
   * Team upload.
   * Add JDK17-20 (Closes: #1011165)
   * Switch to debhelper-compat 13
   * Add R³
   * Add Multi-Arch according to MA hinter
   * Update Vcs fields
   * Make d/copyright machine readable
   * Bump policy version (no changes)
Checksums-Sha1:
 0d83bc737b31a0877c3612cf18fe3d1979d4d767 1629 java-wrappers_0.4.dsc
 a7755fe3dd67142b06dcf9b6abbe3e6db78e1b53 9284 java-wrappers_0.4.tar.xz
 c07b4f9afb7e75e0e5c13a02a0216460e9b793ed 6143 
java-wrappers_0.4_source.buildinfo
Checksums-Sha256:
 31c3f038d519ecf5237d61a94a3469e45297359aa64da1f5c966b2ad0b5db510 1629 
java-wrappers_0.4.dsc
 403a50ab4b11fb27a7b7fd8a9e688aa1076e35cb27696042407a55d9a5f56374 9284 
java-wrappers_0.4.tar.xz
 23015fdc0c70be9e5ce4e15c3d5ff520f1f6c3778a9fc84602bcc5f7738af752 6143 
java-wrappers_0.4_source.buildinfo
Files:
 3f83cf4191384252808183df10de5162 1629 java optional java-wrappers_0.4.dsc
 43f47eaa72bfa9daa784d56c3069428a 9284 java optional java-wrappers_0.4.tar.xz
 3ba900b855609a3ed05cc562018dc249 6143 java optional 
java-wrappers_0.4_source.buildinfo

-BEGIN PGP SIGNATURE-
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=X8+j
-END PGP SIGNATURE-


__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


Processing of java-wrappers_0.4_source.changes

2022-12-04 Thread Debian FTP Masters
java-wrappers_0.4_source.changes uploaded successfully to localhost
along with the files:
  java-wrappers_0.4.dsc
  java-wrappers_0.4.tar.xz
  java-wrappers_0.4_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)

__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


numericalchameleon_3.0.0+ds-2_source.changes ACCEPTED into unstable

2022-12-04 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 04 Dec 2022 14:38:31 +0100
Source: numericalchameleon
Architecture: source
Version: 3.0.0+ds-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers 

Changed-By: Mechtilde Stehmann 
Changes:
 numericalchameleon (3.0.0+ds-2) unstable; urgency=medium
 .
   [ Mechtilde ]
   * [132a229] Bumped year in d/copyright
   * [893b4c0] Bumped standard version -no changes needed
   * [3c00e19] Fixed d/watch
   * [f28feae] Fixed d/u/metadata
Checksums-Sha1:
 f915fca55896d95d008d9b09d5aeac85f84959b9 2130 numericalchameleon_3.0.0+ds-2.dsc
 dea7ad91aee1b3a895be73c22a4232b2ef08a52f 2752 
numericalchameleon_3.0.0+ds-2.debian.tar.xz
 13c1b7c3f18f4ac48dae430648eb28ca37b6ad7e 11932 
numericalchameleon_3.0.0+ds-2_amd64.buildinfo
Checksums-Sha256:
 762849066ce74306ce885b4baaa2d286cfb879e861afa56ab9be3c49d512b62e 2130 
numericalchameleon_3.0.0+ds-2.dsc
 25d94b8f8f728354b6f0ec4131129f5ffe8c971616b0fcf7018db77e5186d385 2752 
numericalchameleon_3.0.0+ds-2.debian.tar.xz
 e9e1591d6898b495bb7ec6fbabadc49b23659c33398d5261d433a6874b42fee9 11932 
numericalchameleon_3.0.0+ds-2_amd64.buildinfo
Files:
 07d6970032d4638e942bd55d733daa96 2130 java optional 
numericalchameleon_3.0.0+ds-2.dsc
 df434486e5243708adf6f8f74320a13e 2752 java optional 
numericalchameleon_3.0.0+ds-2.debian.tar.xz
 e3e26a0a02e9df8e22684ea0351dd7ad 11932 java optional 
numericalchameleon_3.0.0+ds-2_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=UFMC
-END PGP SIGNATURE-


__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


Processed: reassign 1024987 to java-wrappers, forcibly merging 1024453 1024987, affects 1024453

2022-12-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 1024987 java-wrappers 0.3
Bug #1024987 [sweethome3d] sweethome3d: Fail to start
Bug reassigned from package 'sweethome3d' to 'java-wrappers'.
No longer marked as found in versions sweethome3d/7.0.2+dfsg-1.
Ignoring request to alter fixed versions of bug #1024987 to the same values 
previously set
Bug #1024987 [java-wrappers] sweethome3d: Fail to start
Marked as found in versions java-wrappers/0.3.
> forcemerge 1024453 1024987
Bug #1024453 [java-wrappers] mediathek: fails to start with openjdk 17
Bug #1024987 [java-wrappers] sweethome3d: Fail to start
Added indication that 1024987 affects mediathekview
Added tag(s) bookworm and sid.
Merged 1024453 1024987
> affects 1024453 sweethome3d
Bug #1024453 [java-wrappers] mediathek: fails to start with openjdk 17
Bug #1024987 [java-wrappers] sweethome3d: Fail to start
Added indication that 1024453 affects sweethome3d
Added indication that 1024987 affects sweethome3d
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1024453: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024453
1024987: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024987
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


Processed: tagging 1024453

2022-12-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 1024453 - bullseye
Bug #1024453 [java-wrappers] mediathek: fails to start with openjdk 17
Removed tag(s) bullseye.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1024453: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024453
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


Processing of numericalchameleon_3.0.0+ds-2_source.changes

2022-12-04 Thread Debian FTP Masters
numericalchameleon_3.0.0+ds-2_source.changes uploaded successfully to localhost
along with the files:
  numericalchameleon_3.0.0+ds-2.dsc
  numericalchameleon_3.0.0+ds-2.debian.tar.xz
  numericalchameleon_3.0.0+ds-2_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)

__
This is the maintainer address of Debian's Java team
.
 Please use
debian-j...@lists.debian.org for discussions and questions.


Bug#1025418: jffi: Please add support for "riscv64" arch

2022-12-04 Thread Manuel A. Fernandez Montecelo
Source: jffi
Version: 1.2.7-11
Severity: wishlist
Tags: ftbfs patch
User: debian-ri...@lists.debian.org
Usertags: riscv64
X-Debbugs-Cc: m...@debian.org, debian-ri...@lists.debian.org

Hi,

Please add support this architecture, with the patch attached or an equivalent.

This package built well in the past on riscv64 but it seems that in recent
versions it needs some extra support.

I built the package locally on hardware, it built fine with the patch
0013-Add-support-for-riscv64.patch.  Also attached the whole debdiff.


Thanks and cheers.
--
Manuel A. Fernandez Montecelo 
diff -Nru jffi-1.3.9+ds/debian/changelog jffi-1.3.9+ds/debian/changelog
--- jffi-1.3.9+ds/debian/changelog  2022-12-04 05:45:16.0 +
+++ jffi-1.3.9+ds/debian/changelog  2022-12-04 10:22:42.0 +
@@ -1,3 +1,10 @@
+jffi (1.3.9+ds-4+0.riscv64.1) unreleased; urgency=medium
+
+  * Non-maintainer upload.
+  * riscv64: add support for architecture
+
+ -- Manuel A. Fernandez Montecelo   Sun, 04 Dec 2022 10:22:42 
+
+
 jffi (1.3.9+ds-4) unstable; urgency=medium
 
   * Team upload.
diff -Nru jffi-1.3.9+ds/debian/patches/0013-Add-support-for-riscv64.patch 
jffi-1.3.9+ds/debian/patches/0013-Add-support-for-riscv64.patch
--- jffi-1.3.9+ds/debian/patches/0013-Add-support-for-riscv64.patch 
1970-01-01 00:00:00.0 +
+++ jffi-1.3.9+ds/debian/patches/0013-Add-support-for-riscv64.patch 
2022-12-04 10:22:32.0 +
@@ -0,0 +1,44 @@
+Index: jffi-1.3.9+ds/src/main/java/com/kenai/jffi/Platform.java
+===
+--- jffi-1.3.9+ds.orig/src/main/java/com/kenai/jffi/Platform.java
 jffi-1.3.9+ds/src/main/java/com/kenai/jffi/Platform.java
+@@ -108,6 +108,8 @@ public abstract class Platform {
+ MIPS(32),
+/** MIPS64EL */
+ MIPS64EL(64),
++   /** RISCV64 */
++RISCV64(64),
+ /** Unknown CPU */
+ UNKNOWN(64);
+ 
+@@ -250,6 +252,8 @@ public abstract class Platform {
+ 
+ } else if (Util.equalsIgnoreCase("mips64", archString, LOCALE) || 
Util.equalsIgnoreCase("mips64el", archString, LOCALE)) {
+ return CPU.MIPS64EL;
++} else if (Util.equalsIgnoreCase("riscv64", archString, LOCALE)) {
++return CPU.RISCV64;
+ }
+ 
+ 
+Index: jffi-1.3.9+ds/src/main/java/com/kenai/jffi/internal/StubLoader.java
+===
+--- jffi-1.3.9+ds.orig/src/main/java/com/kenai/jffi/internal/StubLoader.java
 jffi-1.3.9+ds/src/main/java/com/kenai/jffi/internal/StubLoader.java
+@@ -163,6 +163,8 @@ public class StubLoader {
+ MIPS,
+ /** MIPS 64-bit little endian */
+ MIPS64EL,
++/** RISC-V 64-bit little endian */
++RISCV64,
+ /** Unknown CPU */
+ UNKNOWN;
+ 
+@@ -233,6 +235,8 @@ public class StubLoader {
+ return CPU.MIPS;
+ } else if (Util.equalsIgnoreCase("mips64", archString, LOCALE) || 
Util.equalsIgnoreCase("mips64el", archString, LOCALE)) {
+ return CPU.MIPS64EL;
++} else if (Util.equalsIgnoreCase("riscv64", archString, LOCALE)) {
++return CPU.RISCV64;
+ 
+ }
+ 
diff -Nru jffi-1.3.9+ds/debian/patches/series 
jffi-1.3.9+ds/debian/patches/series
--- jffi-1.3.9+ds/debian/patches/series 2022-12-04 05:45:16.0 +
+++ jffi-1.3.9+ds/debian/patches/series 2022-12-04 10:06:03.0 +
@@ -10,3 +10,4 @@
 0010-output-test-results-to-console-instead-of-file.patch
 0011-Fix-tests-for-32-bit-ARM-armel-and-armhf.patch
 0012-Add-support-for-mips.patch
+0013-Add-support-for-riscv64.patch
Index: jffi-1.3.9+ds/src/main/java/com/kenai/jffi/Platform.java
===
--- jffi-1.3.9+ds.orig/src/main/java/com/kenai/jffi/Platform.java
+++ jffi-1.3.9+ds/src/main/java/com/kenai/jffi/Platform.java
@@ -108,6 +108,8 @@ public abstract class Platform {
 MIPS(32),
/** MIPS64EL */
 MIPS64EL(64),
+   /** RISCV64 */
+RISCV64(64),
 /** Unknown CPU */
 UNKNOWN(64);
 
@@ -250,6 +252,8 @@ public abstract class Platform {
 
 } else if (Util.equalsIgnoreCase("mips64", archString, LOCALE) || 
Util.equalsIgnoreCase("mips64el", archString, LOCALE)) {
 return CPU.MIPS64EL;
+} else if (Util.equalsIgnoreCase("riscv64", archString, LOCALE)) {
+return CPU.RISCV64;
 }
 
 
Index: jffi-1.3.9+ds/src/main/java/com/kenai/jffi/internal/StubLoader.java
===
--- jffi-1.3.9+ds.orig/src/main/java/com/kenai/jffi/internal/StubLoader.java
+++ jffi-1.3.9+ds/src/main/java/com/kenai/jffi/internal/StubLoader.java
@@ -163,6 +163,8 @@ public class StubLoader {
 MIPS,
 /** MIPS 64-bit little endian */
 MIPS64EL,
+/** RISC-V 64-bit little endian */
+