Bug#1035654: non-essential adduser poses problems to purging packages

2023-05-24 Thread Sebastian Ramacher
Hi Julian, On 2023-05-16 22:15:33 +0200, Sebastian Ramacher wrote: > On 2023-05-07 20:30:03 +0200, Helmut Grohne wrote: > > On Sun, May 07, 2023 at 08:16:14PM +0200, Julian Andres Klode wrote: > > > I don't have a problem pushing a 2.6.1 out with this

Bug#1036678: unblock: ffmpeg/7:5.1.3-1

2023-05-24 Thread Sebastian Ramacher
] I reviewed all changes and I approve them [x] attach debdiff against the package in testing [ Other info ] The debdiff only includes the changes to debian/. unblock ffmpeg/7:5.1.3-1 Cheers -- Sebastian Ramacher diff --git a/debian/changelog b/debian/changelog index 2d2ec524..f4ed9fc6 100

Bug#1035975: [pre-approval] unblock: mmdebstrap/1.3.5-X

2023-05-24 Thread Sebastian Ramacher
On 2023-05-24 09:12:14 +0200, Johannes Schauer Marin Rodrigues wrote: > Hi, > > Quoting Sebastian Ramacher (2023-05-24 08:31:36) > > Please check the autopkgtests. They are failing with errors that seem > > unrelated to doc-debian. > > yes. As I said in my original em

Bug#1035975: [pre-approval] unblock: mmdebstrap/1.3.5-X

2023-05-24 Thread Sebastian Ramacher
On 2023-05-20 13:54:14 +0200, Johannes Schauer Marin Rodrigues wrote: > Hi, > > Quoting Sebastian Ramacher (2023-05-20 13:38:20) > > > some of the packages uploaded to unstable or experimental are breaking the > > > mmdebstrap autopkgtest: > > > > &

Bug#1036354: unblock: iptables-persistent/1.0.20

2023-05-21 Thread Sebastian Ramacher
t;to unstable though? > >> > >> I'd prefer to wait for an ack from the release team > > > >Ok, in that case I think it should be explicitly mentioned that this > >is a 'preapproval' request. > > > How to do that? I hope is done now Please go ahead and remove the moreinfo tag once the package is available in unstable. Cheers -- Sebastian Ramacher

Bug#1035710: unblock: doc-debian/11.3

2023-05-20 Thread Sebastian Ramacher
ailable from experimental. I've kept the > diff minimal. Earlier planned and implemented non-related fixes will, via > experimental and unstable, end up in 13/trixie. > > unblock doc-debian/11.3 Please go ahead with the upload to unstable. Remove the moreinfo tag once the package is available. Cheers -- Sebastian Ramacher

Bug#1035975: [pre-approval] unblock: mmdebstrap/1.3.5-X

2023-05-20 Thread Sebastian Ramacher
ckage and thus, this unblock > cannot break anything (other than autopkgtest results). Could you please provide a debdiff of the proposed changes? Cheers -- Sebastian Ramacher

Bug#1036246: unblock: iptables-netflow/2.6-4

2023-05-18 Thread Sebastian Ramacher
an unblock or if there are other issues preventing them from migrating to testing. So everything's fine. You don't need to write the unblock requests earlier. If the debdiff contains more than a targeted fix, we'll wait for the unblock bug anyway. Cheers [1] UDD has various views (e.g., "Release Team view") to find those. -- Sebastian Ramacher

Bug#1035911: [pre-approval] unblock: dpkg/1.21.22

2023-05-16 Thread Sebastian Ramacher
t; > Hi! > > Please pre-approve the dpkg 1.21.22 upload. Please go ahead and remove the moreinfo tag once the upload is available in unstable. Cheers -- Sebastian Ramacher

Bug#1036016: unblock: amavisd-new/1:2.13.0-3

2023-05-16 Thread Sebastian Ramacher
Control: tags -1 confirmed On 2023-05-16 23:01:00 +0200, Johannes Schauer Marin Rodrigues wrote: > Hi, > > Quoting Sebastian Ramacher (2023-05-16 22:11:58) > > > [ Risks ] > > > > > > Low risk as the diff simply is: > > > > > >

Bug#1036026: unblock: libssh/0.10.5-1

2023-05-16 Thread Sebastian Ramacher
n't exist any more. > +Spotted by lintian's "superfluous-file-pattern" warnings. > + > + [ Debian Janitor ] > + * Bump debhelper from old 12 to 13. It's too late for debhelper compat bumps. See https://release.debian.org/bookworm/FAQ.html Please re-upload without that change and remove the moreinfo tag once that happened. Cheers -- Sebastian Ramacher

Bug#1036016: unblock: amavisd-new/1:2.13.0-3

2023-05-16 Thread Sebastian Ramacher
userdel amavis > + userdel amavis || true userdel is from passwd and not from adduser. Am I missing something? Cheers -- Sebastian Ramacher

Bug#1036157: RM: cpl-plugin-fors/5.5.7+dfsg-2 -- ROM; outdated; required upstream file no longer available

2023-05-16 Thread Sebastian Ramacher
downloadable > https://bugs.debian.org/1035696 > > > > This mail is generated by: > https://salsa.debian.org/release-team/release-tools/-/blob/master/mailer/mail_autoremovals.pl > > Autoremoval data is generated by: > https://salsa.debian.org/qa/udd/-/blob/master/udd/testing_autoremovals_gatherer.pl > -- Sebastian Ramacher

Bug#1036123: [pre-approval] unblock: libcap2/1:2.66-4

2023-05-15 Thread Sebastian Ramacher
loser for #1036114 in your upload? > > Thanks for catching this, Salvatore. > > Updated debdiff attached. Please go ahead and remove the moreinfo tag once the package is available in unstable. Cheers -- Sebastian Ramacher

Bug#1035966: unblock: google-android-installers/1675172738

2023-05-12 Thread Sebastian Ramacher
riting this, I'm waiting for my sponsor to upload the latest > version to unstable. Please remove the moreinfo tag once the package is available in unstable. Cheers -- Sebastian Ramacher

Bug#1035927: unblock: samba/2:4.17.8+dfsg-1

2023-05-12 Thread Sebastian Ramacher
bian.org > Control: affects -1 + src:samba > > Please unblock package samba This uploaded caused the autpkgtests of libsoup2.4 and libsoup3 to regress on s390x. Could you please check (with the libsoup maintainers) if that is an issue in libsoup or samba? Thanks Best Sebastian -- Sebastian Ramacher

Bug#1035916: unblock: node-source-map/0.7.0++dfsg2+really.0.6.1-14

2023-05-11 Thread Sebastian Ramacher
On 2023-05-11 19:22:36 +0200, Paul Gevers wrote: > Hi Sebastian, > > On 11-05-2023 19:06, Sebastian Ramacher wrote: > > So you're going back to a directory. That would require a symlink_to_dir > > in the maintscript. Do you want to have symlinks or not? > > See http

Bug#1035916: unblock: node-source-map/0.7.0++dfsg2+really.0.6.1-14

2023-05-11 Thread Sebastian Ramacher
> - dh_installdocs --link-doc=libjs-source-map So you're going back to a directory. That would require a symlink_to_dir in the maintscript. Do you want to have symlinks or not? Cheers -- Sebastian Ramacher

Bug#1034367: marked as pending in golang-v2ray-core

2023-05-08 Thread Sebastian Ramacher
lock request and feel free to ping me so that I can unblock the package. Cheers -- Sebastian Ramacher

Bug#1035654: non-essential adduser poses problems to purging packages

2023-05-07 Thread Sebastian Ramacher
e release? How many are there, that would actually fail and not just leave cruft behind? Cheers -- Sebastian Ramacher

Bug#1034367: marked as pending in golang-v2ray-core

2023-05-07 Thread Sebastian Ramacher
a and test code due to license > > Closes: #1034367 I'm afraid this fix is incomplete. The source package still contains the data files with a non-free license and hence Debian is redistrbuting them. golang-v2ray-core needs to be repacked to completly get rid of the files. Cheers -- Sebastian Ramacher

Bug#1035654: non-essential adduser poses problems to purging packages

2023-05-07 Thread Sebastian Ramacher
On 2023-05-07 10:49:40 +0200, Sebastian Ramacher wrote: > > Even if we fix these bugs in the packages, people may still upgrade > > their systems and remove them rather than upgrading. Then, once the > > upgrade is finished (and adduser is removed), they may consider purging

Bug#1035654: non-essential adduser poses problems to purging packages

2023-05-07 Thread Sebastian Ramacher
really like small essential and want it gone, but we need > to balance that with possible breakage. > > I think this primarily is a decision that belongs to the release > managers with the default choice being "do nothing about it". > > Helmut > -- Sebastian Ramacher

Bug#1035573: unblock: telegram-desktop/4.6.5+ds-2, libtgowt/0~git20230105.5098730+dfsg-2

2023-05-07 Thread Sebastian Ramacher
,12 @@ > + > + #include > + > +-#include "third_party/libsrtp/crypto/include/crypto_types.h" > +-#include "third_party/libsrtp/include/srtp.h" > +-#include "third_party/libsrtp/include/srtp_priv.h" > ++#ifdef HAVE_LIBSRTP > ++# include > ++# include > ++#else > ++# include "srtp_priv.h" > ++#endif > + > + #define EXTERNAL_HMAC_SHA1 SRTP_HMAC_SHA1 + 1 > + #define HMAC_KEY_LENGTH 20 > +--- a/src/pc/srtp_session.cc > b/src/pc/srtp_session.cc > +@@ -30,8 +30,12 @@ > + #include "rtc_base/thread_annotations.h" > + #include "rtc_base/time_utils.h" > + #include "system_wrappers/include/metrics.h" > +-#include "third_party/libsrtp/include/srtp.h" > +-#include "third_party/libsrtp/include/srtp_priv.h" > ++ > ++#ifdef HAVE_LIBSRTP > ++# include > ++#else > ++# include "srtp_priv.h" > ++#endif > + > + namespace cricket { > + > +@@ -290,6 +294,7 @@ bool SrtpSession::UnprotectRtcp(void* p, > + bool SrtpSession::GetRtpAuthParams(uint8_t** key, int* key_len, int* > tag_len) { > + RTC_DCHECK(thread_checker_.IsCurrent()); > + RTC_DCHECK(IsExternalAuthActive()); > ++#ifndef HAVE_LIBSRTP > + if (!IsExternalAuthActive()) { > + return false; > + } > +@@ -313,6 +318,10 @@ bool SrtpSession::GetRtpAuthParams(uint8 > + *key_len = external_hmac->key_length; > + *tag_len = rtp_auth_tag_len_; > + return true; > ++#else > ++ RTC_LOG_F(LS_WARNING) << "unavailable"; > ++ return false; > ++#endif > + } > + > + int SrtpSession::GetSrtpOverhead() const { > +@@ -336,6 +345,7 @@ bool SrtpSession::GetSendStreamPacketInd > +int in_len, > +int64_t* index) { > + RTC_DCHECK(thread_checker_.IsCurrent()); > ++#ifndef HAVE_LIBSRTP > + srtp_hdr_t* hdr = reinterpret_cast(p); > + srtp_stream_ctx_t* stream = srtp_get_stream(session_, hdr->ssrc); > + if (!stream) { > +@@ -346,6 +356,10 @@ bool SrtpSession::GetSendStreamPacketInd > + *index = static_cast(rtc::NetworkToHost64( > + srtp_rdbx_get_packet_index(>rtp_rdbx) << 16)); > + return true; > ++#else > ++ RTC_LOG_F(LS_WARNING) << "unavailable"; > ++ return false; > ++#endif > + } > + > + bool SrtpSession::DoSetKey(int type, -- Sebastian Ramacher

Bug#1035351: [pre-approval] unblock: ncurses/6.4-3

2023-05-06 Thread Sebastian Ramacher
ebian/patches/series 2023-05-01 11:31:44.0 +0200 > @@ -3,3 +3,5 @@ > 02-debian-xterm.diff > 03-debian-ncursesconfig-omit-L.diff > fix_crash_on_very_long_tc-use_clause.diff > +fix-configure-root-args-option.diff > +debian-env-access.diff > diff -Nru ncurses-6.4/debian/rules ncurses-6.4/debian/rules > --- ncurses-6.4/debian/rules 2023-01-22 19:46:39.0 +0100 > +++ ncurses-6.4/debian/rules 2023-05-01 11:36:38.0 +0200 > @@ -148,6 +148,7 @@ > --without-progs \ > $(with_mouse) \ > --enable-symlinks \ > + --disable-root-environ \ > --disable-termcap \ > --with-default-terminfo-dir=/etc/terminfo \ > > --with-terminfo-dirs="/etc/terminfo:/lib/terminfo:/usr/share/terminfo" \ -- Sebastian Ramacher

Bug#1035509: [pre-approval] unblock: vim/2:9.0.1378-2

2023-05-04 Thread Sebastian Ramacher
l(buf) > ++endfunc > ++ > + " vim: shiftwidth=2 sts=2 expandtab > +diff --git a/src/version.c b/src/version.c > +index c93499c..0e83a6f 100644 > +--- a/src/version.c > b/src/version.c > +@@ -695,6 +695,8 @@ static char *(features[]) = > + > + static int included_patches[] = > + { /* Add new patch number below this line */ > ++/**/ > ++1499, > + /**/ > + 1378, > + /**/ > diff -Nru vim-9.0.1378/debian/patches/series > vim-9.0.1378/debian/patches/series > --- vim-9.0.1378/debian/patches/series2023-03-04 14:41:33.0 > -0500 > +++ vim-9.0.1378/debian/patches/series2023-05-04 06:24:44.0 > -0400 > @@ -2,3 +2,5 @@ > debian/Detect-the-rst-filetype-using-the-contents-of-the-file.patch > debian/Add-recognition-of-more-LaTeX-commands-for-tex-filetype-d.patch > debian/Document-Debian-s-decision-to-disable-modelines-by-defaul.patch > +patch-9.0.1499-using-uninitialized-memory-with-fuzzy-matc.patch > +Fix-GH-267-where-indent-after-a-sub-would-not-work.patch -- Sebastian Ramacher

Bug#1035039: unblock: node-core-js/3.26.1-3

2023-05-04 Thread Sebastian Ramacher
8760023 100755 > --- a/debian/rules > +++ b/debian/rules > @@ -8,7 +8,7 @@ override_dh_auto_build: > zx scripts/build-indexes.mjs > zx scripts/clean-and-copy.mjs > zx scripts/build-compat/index.mjs > - ln -s ../packages/core-js node_modules/core-js || true > + [ -e node_modules/core-js ] || ln -s ../packages/core-js node_modules/ > || true > zx scripts/bundle-package/bundle-package.mjs > rm -f node_modules/core-js core-js > terser -o packages/core-js-bundle/index.min.js > packages/core-js-bundle/index.js -- Sebastian Ramacher

Bug#1035297: unblock: qemu/1:7.2+dfsg-6

2023-05-03 Thread Sebastian Ramacher
Control: tags -1 moreinfo On 2023-04-30 11:07:51 +0300, Michael Tokarev wrote: > Package: release.debian.org > Severity: normal > User: release.debian@packages.debian.org > Usertags: unblock > X-Debbugs-Cc: pkg-qemu-de...@lists.alioth.debian.org > > Please unblock package qemu > > This

Bug#1035357: unblock: calamares-settings-debian/12.0.5-2

2023-05-03 Thread Sebastian Ramacher
t; echo " * install grub... (bios)" > DEBIAN_FRONTEND=noninteractive chroot $CHROOT apt-get -y install grub-pc > cryptsetup keyutils > fi > + > +# Re-enable os-prober: > +sed -i "s/#GRUB_DISABLE_OS_PROBER=false/# OS_PROBER re-enabled by Debian > Calamares installation:\nGRUB_DISABLE_OS_PROBER=false/g" > $CHROOT/etc/default/grub > +chroot $CHROOT /usr/sbin/update-grub > """ > > -Jonathan > > unblock calamares-settings-debian/12.0.8-1 > -- Sebastian Ramacher

Bug#1035398: [pre-approval] unblock: dwarves/1.24-4.1

2023-05-03 Thread Sebastian Ramacher
f (cu != NULL) { > + uint32_t void_id; > +-- > +2.40.1 > + > diff -Nru dwarves-1.24/debian/patches/series > dwarves-1.24/debian/patches/series > --- dwarves-1.24/debian/patches/series2022-12-10 10:11:28.0 > +0100 > +++ dwarves-1.24/debian/patches/series2023-05-02 20:37:16.0 > +0200 > @@ -1,3 +1,4 @@ > 00-store-the-CU-being-processed-to-avoid-changing-many-functions.patch > 01-record-if-a-CU-has-a-DW_TAG_unspecified_type.patch > 02-encode-DW_TAG_unspecified_type-returning-routines-as-void.patch > +03-dwarves-Zero-initialize-struct-cu-in-cu__new-to-prev.patch -- Sebastian Ramacher

Bug#1035345: unblock: libbssolv-perl/0.17-4

2023-05-02 Thread Sebastian Ramacher
On 2023-05-02 08:08:22 +0200, Andrej Shadura wrote: > Hi, > > On Tue, 2 May 2023, at 07:51, Sebastian Ramacher wrote: > >> + [ Debian Janitor ] > >> + * Bump debhelper from old 12 to 13. > > > This change is no longer appropriate at this sta

Bug#1035017: unblock: pdl/1:2.081-2

2023-05-01 Thread Sebastian Ramacher
Control: tags -1 moreinfo On 2023-04-29 13:13:03 +0200, Sebastiaan Couwenberg wrote: > Control: tags -1 - moreinfo > > On 4/29/23 10:51, Sebastian Ramacher wrote: > > On 2023-04-27 16:52:36 +0200, Bas Couwenberg wrote: > > > Package: release.debian.org > >

Bug#1035345: unblock: libbssolv-perl/0.17-4

2023-05-01 Thread Sebastian Ramacher
tools actually has > a zero epoch (0:2009.10.04-2). > > Signed-off-by: Sjoerd Simons > --- > BSSolv.xs | 2 -- > 1 file changed, 2 deletions(-) > > diff --git a/BSSolv.xs b/BSSolv.xs > index ced6823..31c7a7a 100644 > --- a/BSSolv.xs > +++ b/BSSolv.xs > @@ -207,8 +207,6 @@ makeevr(Pool *pool, char *e, char *v, char *r) > >if (!v) > return 0; > - if (e && !strcmp(e, "0")) > -e = 0; >if (e) > s = pool_tmpjoin(pool, e, ":", v); >else -- Sebastian Ramacher

Bug#1035017: unblock: pdl/1:2.081-2

2023-04-29 Thread Sebastian Ramacher
hare/doc/pdl/html is symlinked to /var/lib/pdl/html > doc-base-file-references-wrong-path * > > # Not a problem > -national-encoding * > +national-encoding [*] > > diff -Nru pdl-2.081/debian/source/lintian-overrides > pdl-2.081/debian/source/lintian-overrides > --- pdl-2.081/debian/source/lintian-overrides 2022-06-21 08:16:23.0 > +0200 > +++ pdl-2.081/debian/source/lintian-overrides 2023-04-27 15:41:56.0 > +0200 > @@ -1,3 +1,3 @@ > # Not a problem > -national-encoding *debian/fix_man_encoding.sed* > +national-encoding [*debian/fix_man_encoding.sed*] > -- Sebastian Ramacher

Bug#1034336: unblock: openvpn/2.6.3-1 and openvpn-dco-dkms/0.0+git20230324-1 (pre-approval)

2023-04-29 Thread Sebastian Ramacher
.2...v2.6.3 > > in order to reduce the deviation from an upstream tag I'd like to skip > 2.6.2 and go for 2.6.3. Updated debdiff attached. Please go ahead and remove the moreinfo tag once the packages are available in unstable. Cheers -- Sebastian Ramacher

Bug#1035047: unblock: [pre-approval] xdg-desktop-portal-wlr/0.7.0-1

2023-04-29 Thread Sebastian Ramacher
Control: tags -1 moreinfo confirmed On 2023-04-28 11:26:00 +0200, Jochen Sprickerhof wrote: > Package: release.debian.org > Severity: normal > User: release.debian@packages.debian.org > Usertags: unblock > X-Debbugs-Cc: xdg-desktop-portal-...@packages.debian.org, Birger Schacht > > Control:

Bug#1035028: unblock: iso-codes/4.15.0-1

2023-04-28 Thread Sebastian Ramacher
xes, only touching .po files. > > However, the debdiff is huge, so I'm waiting for your approval before > uploading to unstable. Please provide the debdiff with the translation updates stripped. Cheers -- Sebastian Ramacher

Bug#1035034: unblock: libmodulemd/2.14.0-3

2023-04-28 Thread Sebastian Ramacher
+0300 > @@ -70,6 +70,8 @@ > Section: introspection > Architecture: any > Multi-Arch: same > +Breaks: libmodulemd-dev (<< 2.13.0-1~) > +Replaces: libmodulemd-dev (<< 2.13.0-1~) > Depends: > ${gir:Depends}, > ${misc:Depends}, -- Sebastian Ramacher

Bug#1034688: [Pkg-privacy-maintainers] Bug#1034688: onionshare: flaky autopkgtest

2023-04-28 Thread Sebastian Ramacher
Yes, see the history at https://ci.debian.net/packages/o/onionshare/testing/amd64/. Cheers > > Regards, > > hefee > > > -- > > On Freitag, 21. April 2023 20:53:03 CEST Sebastian Ramacher wrote: > > Source: onionshare > > Version: 2.6-1 > > Severity

Bug#1034751: python-xmlschema: accesses internet during build

2023-04-23 Thread Sebastian Ramacher
. Running "wget http://example.com; to check if network access is available violates this rule. Furthermore, our buildds have network access and thus this check succeeds and the package downloads files during the build. Cheers -- Sebastian Ramacher

Bug#1034691: nmu: why3_1.5.1-1+b1 frama-c_20220511-manganese-3-10

2023-04-23 Thread Sebastian Ramacher
Hi Stéphane On 2023-04-22 20:28:34 +0200, Jochen Sprickerhof wrote: > * Sebastian Ramacher [2023-04-22 16:06]: > > Both why3 and frama-c have been rebuilt after the last ocaml ABI change. > > From a quick between a build now and from the last why3, the following > > packages

Bug#1034691: nmu: why3_1.5.1-1+b1 frama-c_20220511-manganese-3-10

2023-04-22 Thread Sebastian Ramacher
On 2023-04-22 11:30:48 +0200, Jochen Sprickerhof wrote: > Control: tag -1 - moreinfo > > Hi Sebastian, > > * Sebastian Ramacher [2023-04-22 11:10]: > > On 2023-04-21 21:35:21 +0200, Jochen Sprickerhof wrote: > > > Package: release.debian.org > > > Seve

Bug#1034621: [pre-approval] unblock: arno-iptables-firewall/2.1.1-8

2023-04-22 Thread Sebastian Ramacher
ity-team/arno-iptables- > firewall/-/commit/b64ca3208881095b88f61729f4f2dbea4d2621bf > > unblock arno-iptables-firewall/2.1.1-8 > -- Sebastian Ramacher

Bug#1034664: unblock: node-xml2js/0.4.23+~cs15.4.0+dfsg-5

2023-04-22 Thread Sebastian Ramacher
r.hasOwnProperty('SAMP'), true > +- equ r.SAMP.hasOwnProperty('TAGN'), true) > ++equ {}.hasOwnProperty.call(r, 'SAMP'), true > ++equ {}.hasOwnProperty.call(r.SAMP, 'TAGN'), true) > + > + 'test attrValueProcessors key param': skeleton(attrValueProcessors: > [replaceValueByName], (r)-> > + console.log 'Result object: ' + util.inspect r, false, 10 > diff --git a/debian/patches/series b/debian/patches/series > index 2840ff2..c9bf5bb 100644 > --- a/debian/patches/series > +++ b/debian/patches/series > @@ -1,2 +1,3 @@ > fix-for-coffeescript-2.patch > drop-test-not-compatible-with-coffe-2.patch > +CVE-2023-0842.patch -- Sebastian Ramacher

Bug#1034691: nmu: why3_1.5.1-1+b1 frama-c_20220511-manganese-3-10

2023-04-22 Thread Sebastian Ramacher
511-manganese-3-10 . ANY . unstable . -m "Rebuild with new > OCaml ABI (Closes: #1033701)" why3 installs perfectly fine in both bookworm and unstable. Why is this needed? We are past the point of doing transitions (especially uncoordinated ones). Cheers -- Sebastian Ramacher

Bug#1034688: onionshare: flaky autopkgtest

2023-04-21 Thread Sebastian Ramacher
: - - - - - - - - - - results - - - - - - - - - - chat_server FAIL non-zero exit status 139 Cheers -- Sebastian Ramacher

Bug#1034653: unblock: x264/2:0.164.3095+gitbaee400-3

2023-04-20 Thread Sebastian Ramacher
ll changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in testing unblock x264/2:0.164.3095+gitbaee400-2+b1 -- Sebastian Ramacher diff -Nru x264-0.164.3095+gitbaee400/debian/changelog x264-0.164.3095+gitbaee400/debian

Bug#1034449: ffmpeg: converting from any image codec to jxl fails

2023-04-15 Thread Sebastian Ramacher
libavutil57 7:5.1.2-3 > ii libc6 2.36-8 > ii libpostproc56 7:5.1.2-3 > ii libsdl2-2.0-0 2.26.4+dfsg-1 > ii libswresample4 7:5.1.2-3 > ii libswscale6 7:5.1.2-3 > > ffmpeg recommends no packages. > > Versions of packages ffmpeg suggests: > pn ffmpeg-doc > > -- no debconf information > -- Sebastian Ramacher

Bug#1034242: unblock: tirex/0.7.0-3

2023-04-15 Thread Sebastian Ramacher
/libexec/tirex-backend-test > diff -Nru tirex-0.7.0/debian/tirex.lintian-overrides > tirex-0.7.0/debian/tirex.lintian-overrides > --- tirex-0.7.0/debian/tirex.lintian-overrides 2021-10-08 > 09:39:26.0 +0200 > +++ tirex-0.7.0/debian/tirex.lintian-overrides2022-11-29 > 19:18:57.0 +0100 > @@ -1,2 +1,6 @@ > # This package only provides systemd unit files: > package-supports-alternative-init-but-no-init.d-script > + > +# False positive, lat/lon > +typo-in-manual-page lon long * > + -- Sebastian Ramacher

Bug#1034368: unblock: amazon-ec2-net-utils/2.3.0-3

2023-04-15 Thread Sebastian Ramacher
wrong, is that certain non-default > network configuration in Amazon EC2 won't be applied. This includes > configuration of secondary network interfaces and secondary IPv4 addresses on > any interfaces. > > [ Checklist ] > [x] all changes are documented in the d/changelog > [x] I reviewed all changes and I approve them > [x] attach debdiff against the package in testing > > [ Other info ] > (Anything else the release team should know.) > > unblock amazon-ec2-net-utils/2.3.0-3 > -- Sebastian Ramacher

Bug#1034394: unblock: zabbix/1:6.0.14+dfsg-1

2023-04-15 Thread Sebastian Ramacher
eak and hear as it would be to rob him of his money... > -- Frederick Douglass -- Sebastian Ramacher

Bug#1034299: unblock: geocode-glib/3.26.3-6

2023-04-15 Thread Sebastian Ramacher
kage in testing The debdiff is missing. Cheers > > unblock geocode-glib/3.26.3-6 > > Thank you, > Jeremy Bicha > -- Sebastian Ramacher

Bug#1034408: ITP: python-argparse-addons -- Additional Python argparse types and actions

2023-04-14 Thread Sebastian Ramacher
Package: wnpp Severity: wishlist Owner: Sebastian Ramacher X-Debbugs-Cc: debian-de...@lists.debian.org * Package name: python-argparse-addons Version : 0.12.0 Upstream Author : Erik Moqvist * URL : https://github.com/eerimoq/argparse_addons * License : MIT

Bug#1034407: ITP: python-bincopy -- Mangling of various file formats that conveys binary information (Motorola S-Record, Intel HEX and binary files)

2023-04-14 Thread Sebastian Ramacher
Package: wnpp Severity: wishlist Owner: Sebastian Ramacher X-Debbugs-Cc: debian-de...@lists.debian.org * Package name: python-bincopy Version : 17.14.5 Upstream Author : Erik Moqvist * URL : http://www.example.org/ * License : MIT Programming Lang: Python

Bug#1034405: ITP: python-easy-enum -- User friendly implementation of documented Enum type for Python language

2023-04-14 Thread Sebastian Ramacher
Package: wnpp Severity: wishlist Owner: Sebastian Ramacher X-Debbugs-Cc: debian-de...@lists.debian.org * Package name: python-easy-enum Version : 0.3.0 Upstream Author : Martin Olejar * URL : https://pypi.org/project/easy-enum/ * License : BSD-3-clause

Bug#1034402: ITP: python-mboot -- Python based library for communication with NXP MCU Bootloader

2023-04-14 Thread Sebastian Ramacher
Package: wnpp Severity: wishlist Owner: Sebastian Ramacher X-Debbugs-Cc: debian-de...@lists.debian.org * Package name: python-mboot Version : 0.3.0 Upstream Author : Martin Olejar * URL : https://pypi.org/project/mboot/ * License : BSD-3-clause Programming

Bug#1034245: pre-approval: unblock: openvswitch/3.1.1 (CVE-2023-1668)

2023-04-13 Thread Sebastian Ramacher
, > packets:3, bytes:378, used:0.0s, actions:tnl_pop(gre_sys) > + > tunnel(src=20.0.0.2,dst=20.0.0.1,flags(-df-csum)),recirc_id(0),in_port(gre_sys),packet_type(ns=1,id=0x8847),eth_type(0x8847),mpls(label=999/0x0,tc=0/0,ttl=64/0x0,bos=1/1), > packets:3, bytes:264, used:0.0s, > actions:push_eth(src=00:00:00:00:00:00,dst=00:00:00:00:00:00),pop_mpls(eth_type=0x800),recirc(0x1) > +-tunnel(src=20.0.0.2,dst=20.0.0.1,flags(-df-csum)),recirc_id(0x1),in_port(gre_sys),packet_type(ns=0,id=0),eth_type(0x0800),ipv4(ttl=64,frag=no), > packets:3, bytes:294, used:0.0s, actions:set(ipv4(ttl=63)),int-br > ++tunnel(src=20.0.0.2,dst=20.0.0.1,flags(-df-csum)),recirc_id(0x1),in_port(gre_sys),packet_type(ns=0,id=0),eth_type(0x0800),ipv4(proto=1,ttl=64,frag=no), > packets:3, bytes:294, used:0.0s, actions:set(ipv4(ttl=63)),int-br > + ]) > + > + ovs-appctl time/warp 1000 > diff -Nru openvswitch-3.1.0/debian/patches/ovs-ctl-ipsec.patch > openvswitch-3.1.0/debian/patches/ovs-ctl-ipsec.patch > --- openvswitch-3.1.0/debian/patches/ovs-ctl-ipsec.patch 2023-02-21 > 23:01:11.0 +0100 > +++ openvswitch-3.1.0/debian/patches/ovs-ctl-ipsec.patch 2023-04-11 > 11:54:40.0 +0200 > @@ -6,9 +6,11 @@ > Author: James Page > Forwarded: not-needed > > a/utilities/ovs-ctl.in > -+++ b/utilities/ovs-ctl.in > -@@ -245,7 +245,7 @@ start_ovs_ipsec () { > +Index: openvswitch/utilities/ovs-ctl.in > +=== > +--- openvswitch.orig/utilities/ovs-ctl.in > openvswitch/utilities/ovs-ctl.in > +@@ -250,7 +250,7 @@ start_ovs_ipsec () { > --pidfile=${rundir}/ovs-monitor-ipsec.pid \ > --ike-daemon=$IKE_DAEMON \ > $no_restart \ > @@ -16,3 +18,4 @@ > +--log-file --detach unix:${rundir}/db.sock || return 1 > return 0 > } > + > diff -Nru openvswitch-3.1.0/debian/patches/series > openvswitch-3.1.0/debian/patches/series > --- openvswitch-3.1.0/debian/patches/series 2023-02-21 23:01:11.0 > +0100 > +++ openvswitch-3.1.0/debian/patches/series 2023-04-11 11:54:40.0 > +0200 > @@ -1 +1,2 @@ > ovs-ctl-ipsec.patch > +CVE-2023-1668_ofproto-dpif-xlate_Always_mask_ip_proto_field.patch -- Sebastian Ramacher

Bug#1034354: unblock: liblrdf/0.6.1-4

2023-04-13 Thread Sebastian Ramacher
changes and I approve them [x] attach debdiff against the package in testing unblock liblrdf/0.6.1-4 Cheers -- Sebastian Ramacher --- liblrdf-0.6.1/debian/changelog 2022-10-23 17:57:01.0 + +++ liblrdf-0.6.1/debian/changelog 2023-03-17 21:17:37.0 + @@ -1,3

Bug#1033900: closed by Sebastian Ramacher (unblock dkms)

2023-04-12 Thread Sebastian Ramacher
Control: reopen -1 On 2023-04-12 13:59:17 +0200, Andreas Beckmann wrote: > Did you mean to unblock -8 #1034287 instead? Yes, that mail went to the wrong bug. Cheers > > Andreas > -- Sebastian Ramacher

Bug#1033900: pre-approval: dkms/3.0.10-10

2023-04-12 Thread Sebastian Ramacher
t, > + breaks-testbed, > + > +# install linux-image after some-dkms w/o linux-headers > +Test-Command: apt-get install -yf linux-image-generic > +Features: test-name=install_linux-image_after_some-dkms_without_linux-headers > +Architecture: amd64 > +Depends: > + dkms-test-dkms, > +Restrictions: > + allow-stderr, > + needs-root, > + breaks-testbed, With these restrictions, I don't think the tests would run on debci (Paul, please correct me if I am wrong). I hardly see the benefit of granting an exception here for tests that won't be triggered. Cheers -- Sebastian Ramacher

Bug#889313: O: directfb -- direct frame buffer graphics library

2023-04-12 Thread Sebastian Ramacher
On 2023-04-12 15:38:26 +0700, Bagas Sanjaya wrote: > On Sun, Jan 29, 2023 at 01:13:43PM +0100, Diederik de Haas wrote: > > On 3 Feb 2018 15:42:21 +0100 Sebastian Ramacher > > wrote: > > > Package: wnpp > > > > > > Note that upstream appears to

Bug#1034244: unblock (pre-approval): lua-readline/3.2-2

2023-04-11 Thread Sebastian Ramacher
+ lua_pushinteger(L, rc); > + return 1; > + } > ++*/ > + > + static int c_history_truncate_file(lua_State *L) { /* filename,num in rc > out */ > + size_t len; > diff --git a/debian/patches/series b/debian/patches/series > new file mode 100644 > index 000..84626e5 > --- /dev/null > +++ b/debian/patches/series > @@ -0,0 +1 @@ > +eof.patch -- Sebastian Ramacher

Bug#1034167: unblock (pre-approval): mutter/43.4-1

2023-04-10 Thread Sebastian Ramacher
.height; >damage[i * 4 + 2] = rect.width; >damage[i * 4 + 3] = rect.height; > } > diff -Nru mutter-43.3/src/wayland/meta-wayland-subsurface.c > mutter-43.4/src/wayland/meta-wayland-subsurface.c > --- mutter-43.3/src/wayland/meta-wayland-subsurface.c 2023-02-13 > 18:12:26.0 + > +++ mutter-43.4/src/wayland/meta-wayland-subsurface.c 2023-04-10 > 14:26:01.0 +0100 > @@ -462,13 +462,15 @@ >struct wl_resource *resource) > { >MetaWaylandSurface *surface = wl_resource_get_user_data (resource); > + MetaWaylandSurface *parent; >gboolean is_parent_effectively_synchronized; > > - if (!surface->sub.synchronous) > + parent = surface->sub.parent; > + if (!parent || !surface->sub.synchronous) > return; > >is_parent_effectively_synchronized = > -is_surface_effectively_synchronized (surface->sub.parent); > +is_surface_effectively_synchronized (parent); > >if (!is_parent_effectively_synchronized) > meta_wayland_surface_apply_cached_state (surface); -- Sebastian Ramacher

Bug#1034166: unblock (pre-approval): gnome-shell/43.4-1

2023-04-10 Thread Sebastian Ramacher
_version: '>= 0.58.0', >license: 'LGPLv2+', > ) > diff -Nru gnome-shell-43.3/subprojects/extensions-tool/meson.build > gnome-shell-43.4/subprojects/extensions-tool/meson.build > --- gnome-shell-43.3/subprojects/extensions-tool/meson.build 2023-02-14 > 00:11:32.0 + > +++ gnome-shell-43.4/subprojects/extensions-tool/meson.build 2023-03-19 > 20:25:01.0 + > @@ -1,5 +1,5 @@ > project('gnome-extensions-tool', 'c', > - version: '43.3', > + version: '43.4', >meson_version: '>= 0.58.0', >license: 'GPLv2+' > ) > diff -Nru gnome-shell-43.3/subprojects/shew/meson.build > gnome-shell-43.4/subprojects/shew/meson.build > --- gnome-shell-43.3/subprojects/shew/meson.build 2023-02-14 > 00:11:32.0 + > +++ gnome-shell-43.4/subprojects/shew/meson.build 2023-03-19 > 20:25:01.0 + > @@ -1,5 +1,5 @@ > project('shew', 'c', > - version: '43.3', > + version: '43.4', >meson_version: '>= 0.58.0', >license: 'LGPLv2+', > ) -- Sebastian Ramacher

Bug#1034134: [pre-approval] unblock: glibc/2.36-9

2023-04-10 Thread Sebastian Ramacher
Control: tags -1 moreinfo confirmed On 2023-04-10 11:02:23 +0200, Aurelien Jarno wrote: > Package: release.debian.org > Severity: normal > User: release.debian@packages.debian.org > Usertags: unblock > X-Debbugs-Cc: gl...@packages.debian.org, debian-gl...@lists.debian.org > Control: affects

Bug#1034149: unblock: (pre-approval): glib2.0/2.74.6-2

2023-04-10 Thread Sebastian Ramacher
unt)) > -g_slice_free (DispatchData, data); > +{ > + g_clear_object (>invocation); > + g_slice_free (DispatchData, data); > +} > } > > static DispatchData * > @@ -502,16 +504,17 @@ > GCancellable *cancellable) > { >DispatchData *data = task_data; > + GDBusInterfaceSkeleton *interface = g_task_get_source_object (task); >GDBusInterfaceSkeletonFlags flags; >GDBusObject *object; >gboolean authorized; > > - g_mutex_lock (>interface->priv->lock); > - flags = data->interface->priv->flags; > - object = data->interface->priv->object; > + g_mutex_lock (>priv->lock); > + flags = interface->priv->flags; > + object = interface->priv->object; >if (object != NULL) > g_object_ref (object); > - g_mutex_unlock (>interface->priv->lock); > + g_mutex_unlock (>priv->lock); > >/* first check on the enclosing object (if any), then the interface */ >authorized = TRUE; > @@ -519,13 +522,13 @@ > { >g_signal_emit_by_name (object, > "authorize-method", > - data->interface, > + interface, > data->invocation, > ); > } >if (authorized) > { > - g_signal_emit (data->interface, > + g_signal_emit (interface, > signals[G_AUTHORIZE_METHOD_SIGNAL], > 0, > data->invocation, > @@ -627,9 +630,8 @@ >DispatchData *data; > >data = g_slice_new0 (DispatchData); > - data->interface = interface; >data->method_call_func = method_call_func; > - data->invocation = invocation; > + data->invocation = g_object_ref (invocation); >data->ref_count = 1; > >task = g_task_new (interface, NULL, NULL, NULL); > diff -Nru glib2.0-2.74.6/glib/tests/assert-msg-test.py > glib2.0-2.74.6/glib/tests/assert-msg-test.py > --- glib2.0-2.74.6/glib/tests/assert-msg-test.py 2023-02-23 > 13:54:27.0 + > +++ glib2.0-2.74.6/glib/tests/assert-msg-test.py 2023-04-10 > 13:09:07.0 +0100 > @@ -157,9 +157,9 @@ > > # Some CI environments disable ptrace (as they’re running in a > # container). If so, skip the test as there’s nothing we can do. > -if ( > -result.info.returncode != 0 > -and "ptrace: Operation not permitted" in result.err > +if result.info.returncode != 0 and ( > +"ptrace: Operation not permitted" in result.err > +or "warning: opening /proc/PID/mem file for lwp" in > result.err > ): > self.skipTest("GDB is not functional due to ptrace being > disabled") > -- Sebastian Ramacher

Bug#1034100: Acknowledgement (unblock: texlive-base/2022.20230122-3)

2023-04-09 Thread Sebastian Ramacher
t;" > +"The following command can show the list of known paper sizes for ${binary}:" > +msgstr "" > +"Următoarea comandă poate afișa lista cu dimensiunile de hârtie cunoscute > pentru " > +"${binary}:" > + > +#. Type: multiselect > +#. Description > +#: ../texlive-base.templates:3001 > +msgid "TeX binaries that should use the system paper size:" > +msgstr "Binarele TeX care ar trebui să utilizeze dimensiunea hârtiei de > sistem:" > + > +#. Type: multiselect > +#. Description > +#: ../texlive-base.templates:3001 > +msgid "" > +"This system's TeX binaries currently use different default paper sizes. > Please " > +"choose which of them should get the system paper size (${libpaperPaper}) as > " > +"their default." > +msgstr "" > +"Binarele TeX ale acestui sistem folosesc în prezent diferite dimensiuni de " > +"hârtie implicite. Vă rugăm să alegeți care dintre ele ar trebui să > primească " > +"dimensiunea hârtiei de sistem (${libpaperPaper}) ca implicită." -- Sebastian Ramacher

Bug#1034076: unblock: spf-engine/3.0.4-1

2023-04-09 Thread Sebastian Ramacher
+try: > + data['recipient'] = data.get('recipient').split('@')[1] > +except IndexError: > +pass # local recipients may not be fully qualified, so > no "@". > if debugLevel >= 3: syslog.syslog('Config: %s' % str(configData)) > # run the checkers {{{3 > checkerValue = None -- Sebastian Ramacher

Bug#1033976: [pre-approve] unblock: golang-1.19/1.19.8-2

2023-04-07 Thread Sebastian Ramacher
On 2023-04-05 19:10:42 +0800, Shengjing Zhu wrote: > Package: release.debian.org > Severity: normal > User: release.debian@packages.debian.org > Usertags: unblock > X-Debbugs-Cc: golang-1...@packages.debian.org, z...@debian.org > Control: affects -1 + src:golang-1.19 > > Please unblock

Bug#1033691: unblock: znuny/6.5.1-1

2023-04-07 Thread Sebastian Ramacher
of elements with attribute 'xsi:type' now > will be returned as a hash or array instead of an arbitrary object that Znuny > cannot handle. > 2022-09-20 Added config level check to SysConfig admin dialog. Thanks for > hints to Tim Püttmanns, maxence. > 2022-09-16 Auto responses now will not be sent if the recipient would be > a system address. > > > > unblock znuny/6.5.1-1 -- Sebastian Ramacher

Bug#1034016: unblock (pre-approval): debos/1.1.1-2.1

2023-04-06 Thread Sebastian Ramacher
stopher Obbard > +(cherry picked from commit c8c5075853aab9e1ac6ae07a3a7c2b070aa38a62) > +--- > + doc/examples/setup-user.sh | 2 +- > + 1 file changed, 1 insertion(+), 1 deletion(-) > + > +diff --git a/doc/examples/setup-user.sh b/doc/examples/setup-user.sh > +index da155d1..07b2

Bug#1033975: unblock: webp-pixbuf-loader/0.2.1-1

2023-04-06 Thread Sebastian Ramacher
ize, ); > + if (error) > +g_error ("%s", error->message); > + > + test_webp_icc_output ((guchar *) buffer, buf_size, "MQo="); > + g_remove (path); > + g_clear_pointer (, g_free); > + g_clear_pointer (, g_free); > + > + /* Test on memory contents */ > + gdk_pixbuf_save_to_buffer (pixbuf, , _size, "webp", , > + "icc-profile", "MQo=", NULL); > + if (error) > +g_error ("%s", error->message); > + > + test_webp_icc_output ((guchar *) buffer, buf_size, "MQo="); > + > + g_free (buffer); > + g_object_unref (pixbuf); > + return 0; > +} > diff -Nru webp-pixbuf-loader-0.2.0/tests/t_null_error.c > webp-pixbuf-loader-0.2.1/tests/t_null_error.c > --- webp-pixbuf-loader-0.2.0/tests/t_null_error.c 1970-01-01 > 01:00:00.0 +0100 > +++ webp-pixbuf-loader-0.2.1/tests/t_null_error.c 2023-03-04 > 00:36:54.0 +0100 > @@ -0,0 +1,50 @@ > +#include > +#include > + > +static gchar * > +create_filename () > +{ > + GString *pathbuild = g_string_new (g_get_tmp_dir ()); > + gchar *id= g_uuid_string_random (); > + g_string_append_printf (pathbuild, "%s%s.webp", G_DIR_SEPARATOR_S, id); > + g_free (id); > + return g_string_free (pathbuild, FALSE); > +} > + > +gboolean > +save_func (const gchar *buffer, gsize count, GError **error, gpointer data) > +{ > + return TRUE; > +} > + > +void > +test_pixbufv (GdkPixbuf *pixbuf, gchar **keys, gchar **values) > +{ > + GStatBuf tmpstat = { 0 }; > + gchar *path= create_filename (); > + g_assert (gdk_pixbuf_savev (pixbuf, path, "webp", keys, values, NULL)); > + g_stat (path, ); > + g_remove (path); > + g_free (path); > + > + g_assert (gdk_pixbuf_save_to_callbackv (pixbuf, save_func, NULL, "webp", > keys, values, NULL)); > +} > + > +int > +main () > +{ > + gchar **env = g_get_environ (); > + > + GdkPixbuf *pixbuf > + = gdk_pixbuf_new_from_file (g_environ_getenv (env, "TEST_FILE"), NULL); > + g_assert (pixbuf != NULL); > + g_clear_pointer (, g_strfreev); > + > + gchar *keys[2] = { "icc-profile", NULL }; > + gchar *values[2] = { "MQo=", NULL }; > + > + test_pixbufv (pixbuf, NULL, NULL); > + test_pixbufv (pixbuf, keys, values); > + > + g_object_unref (pixbuf); > +} > \ No newline at end of file > > ``` > > unblock webp-pixbuf-loader/0.2.1-1 > -- Sebastian Ramacher

Bug#1033856: unblock: mpv/0.35.1-2

2023-04-06 Thread Sebastian Ramacher
On 2023-04-05 21:57:55 +0200, Sebastian Ramacher wrote: > On 2023-04-05 19:11:25 +0200, Paul Gevers wrote: > > Control: tags -1 moreinfo > > > > Hi Sebastian, > > > > On 02-04-2023 22:06, Sebastian Ramacher wrote: > > >[x] attach debdiff against t

Bug#1033998: protobof: FTBFS on 32 bit arches: error: static assertion failed

2023-04-06 Thread Sebastian Ramacher
failed ./google/protobuf/repeated_field.h:81:27: note: the comparison reduces to ‘(8 <= 4)’ make[4]: *** [Makefile:6691: google/protobuf/protobuf_test-extension_set_unittest.o] Error 1 While I can understand the motivation behind #103398, please test such changes during the freeze in experimental

Bug#1033856: unblock: mpv/0.35.1-2

2023-04-05 Thread Sebastian Ramacher
On 2023-04-05 19:11:25 +0200, Paul Gevers wrote: > Control: tags -1 moreinfo > > Hi Sebastian, > > On 02-04-2023 22:06, Sebastian Ramacher wrote: > >[x] attach debdiff against the package in testing > > The debdiff that I get with $(d) contains two new patches

Bug#1033885: unblock: pydevd/2.9.5+ds-4

2023-04-05 Thread Sebastian Ramacher
On 2023-04-05 11:08:31 +0100, Julian Gilbey wrote: > On Tue, Apr 04, 2023 at 11:34:22PM +0200, Sebastian Ramacher wrote: > > > +# failing tests on 64-bit big-endian targets > > > +if [ $arch = s390x -o $arch = s390x -o $arch = sparc64 ] > > > > That's s39

Bug#1033682: unblock tomboy-ng: 0.36a

2023-04-05 Thread Sebastian Ramacher
On 2023-04-05 08:52:56 +1000, David Bannon wrote: > > On 5/4/23 07:50, Sebastian Ramacher wrote: > > On 2023-04-03 12:23:44 +1000, David Bannon wrote: > > > On 3/4/23 05:57, Sebastian Ramacher wrote: > > > > On 2023-04-01 10:54:33 +1100, David Bannon wrote: >

Bug#1033945: unblock: pdns-recursor/4.8.4-1 [pre-approval]

2023-04-04 Thread Sebastian Ramacher
On 2023-04-04 15:33:01 +0200, Chris Hofstaedtler wrote: > Package: release.debian.org > Severity: normal > User: release.debian@packages.debian.org > Usertags: unblock > X-Debbugs-Cc: Debian Security Team > > Please unblock package pdns-recursor > > [ Reason ] > > I would like to update

Bug#1033885: unblock: pydevd/2.9.5+ds-4

2023-04-04 Thread Sebastian Ramacher
_show_paused_greenlets > -tests_python/test_debugger_json.py::test_gevent_subprocess_not_python > -tests_python/test_debugger_json.py::test_gevent_subprocess_python > - tests_python/test_debugger_json.py::test_notify_gevent > -tests_python/test_debugger_json.py::test_attach_to_pid[False] > -tests_python/test_utilities.py::test_gevent_notify > -) > -fi > - > if [ $arch = ppc64el ] > then > EXCLUDES+=( > - tests_python/test_debugger_json.py::test_code_reload > +tests_python/test_debugger_json.py::test_code_reload > ) > fi > -- Sebastian Ramacher

Bug#1033858: ITS: pupnp-1.8

2023-04-02 Thread Sebastian Ramacher
Source: pupnp-1.8 Version: 1:1.8.4-2 Severity: important X-Debbugs-Cc: sramac...@debian.org With no progress on any of the 4 security bugs, I intend to salvage the pupnp-1.8 package and bring it back into shape for trixie. Cheers -- Sebastian Ramacher

Bug#1033856: unblock: mpv/0.35.1-2

2023-04-02 Thread Sebastian Ramacher
On 2023-04-02 22:06:33 +0200, Sebastian Ramacher wrote: > Package: release.debian.org > Severity: normal > User: release.debian@packages.debian.org > Usertags: unblock > X-Debbugs-Cc: m...@packages.debian.org, sramac...@debian.org > Control: affects -1 + src:mpv > > Pl

Bug#1033856: unblock: mpv/0.35.1-2

2023-04-02 Thread Sebastian Ramacher
and is confirmed to work. In case other changes are required, I can backport those too. [ Checklist ] [x] all changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in testing unblock mpv/0.35.1-2 Cheers -- Sebastian Ramacher

Bug#1033682: unblock tomboy-ng: 0.36a

2023-04-02 Thread Sebastian Ramacher
On 2023-04-01 10:54:33 +1100, David Bannon wrote: > > On 1/4/23 04:34, Sebastian Ramacher wrote: > > Control: tags -1 moreinfo > > > > On 2023-03-30 13:31:28 +1100, David Bannon wrote: > > > Package: release.debian.org > > > Severity: normal > &g

Bug#1033676: unblock: xen/4.17.0+74-g3eac216e6e-1 (pre-approval)

2023-04-02 Thread Sebastian Ramacher
On 2023-03-29 23:27:11 +0200, Maximilian Engelhardt wrote: > Package: release.debian.org > Severity: normal > User: release.debian@packages.debian.org > Usertags: unblock > X-Debbugs-Cc: x...@packages.debian.org, m...@daemonizer.de, > t...@security.debian.org > Control: affects -1 + src:xen >

Bug#1033844: unblock: emacs/1:28.2+1-13

2023-04-02 Thread Sebastian Ramacher
+ (rename-file img-out out-file t > + ((string-suffix-p ".tikz" out-file) > + (when (file-exists-p out-file) (delete-file out-file)) > + (with-temp-file out-file > diff -Nru emacs-28.2+1/debian/patches/series > emacs-28.2+1/debian/patches/series > --- emacs-28.2+1/debian/patches/series2023-03-14 15:30:28.0 > -0500 > +++ emacs-28.2+1/debian/patches/series2023-03-31 13:22:32.0 > -0500 > @@ -23,3 +23,6 @@ > 0023-Fix-memory-leak-in-etags.c.patch > 0024-Fix-quoted-argument-in-emacsclient-mail.desktop-CVE-.patch > 0025-Fix-code-injection-vulnerability-CVE-2023-27986.patch > +0026-Gnus-nnml-should-avoid-crashing-on-some-invalid-head.patch > +0027-Org-Mode-vulnerability-CVE-2023-28617-is-fixed-1-2.patch > +0028-Org-Mode-vulnerability-CVE-2023-28617-is-fixed-2-2.patch > > Thanks > -- > Rob Browning > rlb @defaultvalue.org and @debian.org > GPG as of 2011-07-10 E6A9 DA3C C9FD 1FF8 C676 D2C4 C0F0 39E9 ED1B 597A > GPG as of 2002-11-03 14DD 432F AE39 534D B592 F9A0 25C8 D377 8C7E 73A4 -- Sebastian Ramacher

Bug#1032614: ddcutil: pre-approval request ddcutil-1.4.2-1 fixes bug #1031259

2023-04-01 Thread Sebastian Ramacher
On 2023-03-13 19:00:22 +0100, Sebastian Ramacher wrote: > On 2023-03-13 13:28:47 -0400, Sanford Rockowitz wrote: > > On 3/13/23 07:42, Sebastian Ramacher wrote: > > > On 2023-03-13 07:25:41 -0400, Sanford Rockowitz wrote: > > > > On 3/13/23 05:33, Sebastian Ramacher

Bug#1033517: yt-dlp: mpv fails to work with yt-dlp, after yt-dlp upgrade (uncoordinated API change?)

2023-03-31 Thread Sebastian Ramacher
uest that the patches > > you cited are applied to mpv. > > > > [#1033595]: <https://bugs.debian.org/1033595> > > > > I hope this can be the way to go. > > Considering that a bug was filed against mpv, shouldn't this one be > downgraded? I don't quite see why yt-dlp should be kicked out of > bookworm because mpv didn't catchup... grave seems to be an exaggeration for this issue. Both packages still work. Cheers -- Sebastian Ramacher

Bug#1033682: unblock tomboy-ng: 0.36a

2023-03-31 Thread Sebastian Ramacher
Control: tags -1 moreinfo On 2023-03-30 13:31:28 +1100, David Bannon wrote: > Package: release.debian.org > Severity: normal > User: release.debian@packages.debian.org > Usertags: unblock > > > Please unblock package tomboy-ng v0.36a > > [ Reason ] > Poor testing on my part lead to the use

Bug#1033607: sogo: /usr/bin/sogo linked against wrong version of libgnustep-base

2023-03-31 Thread Sebastian Ramacher
1.0.7 > ii mariadb-server-10.5 [virtual-mysql-server] 1:10.5.18-0+deb11u1 > > -- Configuration Files: > /etc/sogo/sogo.conf [Errno 13] Permission denied: '/etc/sogo/sogo.conf' > > -- no debconf information -- Sebastian Ramacher

Bug#1033439: pre-unblock: monitoring-plugins/2.3.3-5

2023-03-29 Thread Sebastian Ramacher
oring-plugins/actions/runs/4531646296/jobs/7982048943?pr=1850 > has a successfull upstream CI test run. Please go aheah and remove the moreinfo tag once the package is available in unstable. Cheers -- Sebastian Ramacher

Bug#1033439: pre-unblock: monitoring-plugins/2.3.3-5

2023-03-26 Thread Sebastian Ramacher
Hi Jan On 2023-03-25 16:58:12 +0100, Jan Wagner wrote: > Hi Sebastian, > > Am 25.03.23 um 10:31 schrieb Sebastian Ramacher: > > What's the rationale to include these patches? Do they fix bugs reported > > in the BTS or upstream? > > upstream I was hoping to get so

Bug#1033006: unblock: openvpn/2.6.1-1 (preapproval)

2023-03-25 Thread Sebastian Ramacher
module to unstable right away > - upload 2.6.1 from experimental to unstable, then stage 2.6.2 and the > new DCO in experimental for the second review round > > I would prefer the last option. Let's go ahead with the last option. Please let us know once openvpn 2.6.1 is in unstable. Cheers -- Sebastian Ramacher

Bug#1033480: gitlab-ci-multi-runner: FTBFS on 32 bit archs: src/gitlab.com/gitlab-org/gitlab-runner/common/buildtest/masking.go:48:32: cannot use math.MaxInt64 (untyped int constant 922337203685477580

2023-03-25 Thread Sebastian Ramacher
tlab-runner/shells/shellstest returned exit code 2 make[1]: *** [debian/rules:47: override_dh_auto_build] Error 25 Cheers -- Sebastian Ramacher

Bug#1033470: unblock: libopenmpt/0.6.9-1

2023-03-25 Thread Sebastian Ramacher
them [x] attach debdiff against the package in testing unblock libopenmpt/0.6.9-1 Cheers -- Sebastian Ramacher diff -Nru libopenmpt-0.6.8/common/versionNumber.h libopenmpt-0.6.9/common/versionNumber.h --- libopenmpt-0.6.8/common/versionNumber.h 2023-01-29 12:59:32.0 +0100

Bug#1033439: pre-unblock: monitoring-plugins/2.3.3-5

2023-03-25 Thread Sebastian Ramacher
: [PATCH 4/4] check_curl: removed a superflous variable > + > +--- > + plugins/check_curl.c | 1 - > + 1 file changed, 1 deletion(-) > + > +diff --git a/plugins/check_curl.c b/plugins/check_curl.c > +index cc17ef58a..e5be1ad56 100644 > +--- a/plugins/check_curl.c > b/plugins/check_curl.c > +@@ -388,7 +388,6 @@ lookup_host (const char *host, char *buf, size_t buflen) > + size_t addrstr_len; > + int errcode; > + void *ptr; > +- int s; > + size_t buflen_remaining = buflen - 1; > + > + memset (, 0, sizeof (hints)); > diff --git a/debian/patches/15_check_swap_remove_includes > b/debian/patches/15_check_swap_remove_includes > new file mode 100644 > index 000..fb65026 > --- /dev/null > +++ b/debian/patches/15_check_swap_remove_includes > @@ -0,0 +1,23 @@ > +From 8a8ee58e8925019b7532e7d14ebe488bb21fb3e6 Mon Sep 17 00:00:00 2001 > +From: RincewindsHat <12514511+rincewinds...@users.noreply.github.com> > +Date: Thu, 16 Mar 2023 15:26:52 +0100 > +Subject: [PATCH] check_swap: Remove unnecessary and problematic includes > + > +--- > + plugins/check_swap.c | 3 --- > + 1 file changed, 3 deletions(-) > + > +diff --git a/plugins/check_swap.c b/plugins/check_swap.c > +index a607da1e9..25d5f21d0 100644 > +--- a/plugins/check_swap.c > b/plugins/check_swap.c > +@@ -34,9 +34,6 @@ const char *email = "de...@monitoring-plugins.org"; > + #include "common.h" > + #include "popen.h" > + #include "utils.h" > +-#include > +-#include > +-#include > + > + #ifdef HAVE_DECL_SWAPCTL > + # ifdef HAVE_SYS_PARAM_H > diff --git a/debian/patches/series b/debian/patches/series > index 7791bb8..3e14114 100644 > --- a/debian/patches/series > +++ b/debian/patches/series > @@ -4,3 +4,6 @@ > 10_check_http_chunked_wo_actual_content > 11_fallback_for_gnutls > 12_check_curl_improvements > +13_check_icmp_improvements > +14_check_curl_fix_SSL_with_multiple_IPs > +15_check_swap_remove_includes -- Sebastian Ramacher

Bug#1033285: unblock: libpaper/1.1.29

2023-03-25 Thread Sebastian Ramacher
On 2023-03-23 09:16:49 +0100, Giuseppe Sacco wrote: > Hello Sebastian, > > Il giorno mer, 22/03/2023 alle 21.18 +0100, Sebastian Ramacher ha scritto: > > Control: tags -1 moreinfo > > > > On 2023-03-21 12:03:30 +0100, Giuseppe Sacco wrote: > > > Package: relea

Bug#1033401: unblock: src:dino-im/0.4.2-1

2023-03-24 Thread Sebastian Ramacher
t;Received MAM message from %s with unknown query id > %s, ignoring", message.from.to_string(), query_id ?? ""); > +return true; > +} > + Jid? inner_from = null; > +try { > +inner_from = new Jid(message_node.get_attribute("from")); > +} catch (InvalidJidError e) { > +warning("Received MAM message with invalid from attribute in > forwarded message from %s, ignoring", message.from.to_string()); > +return true; > +} > +if > (!message.from.equals(stream.get_flag(Bind.Flag.IDENTITY).my_jid.bare_jid) && > !message.from.equals_bare(inner_from)) { > +warning("Received MAM message from %s illegally > impersonating %s, ignoring", message.from.to_string(), > inner_from.to_string()); > +return true; > +} > + > message.add_flag(new MessageFlag(message.from, datetime, mam_id, > query_id)); > > message.stanza = message_node; > @@ -124,6 +153,7 @@ > public class Flag : XmppStreamFlag { > public static FlagIdentity IDENTITY = new > FlagIdentity(NS_URI, "message_archive_management"); > public bool cought_up { get; set; default=false; } > +public Gee.Set active_query_ids { get; set; default = new > HashSet(); } > public string ns_ver; > > public Flag(string ns_ver) { > diff -Nru dino-im-0.4.1/xmpp-vala/src/module/xep/0402_bookmarks2.vala > dino-im-0.4.2/xmpp-vala/src/module/xep/0402_bookmarks2.vala > --- dino-im-0.4.1/xmpp-vala/src/module/xep/0402_bookmarks2.vala > 2023-03-01 23:30:00.0 + > +++ dino-im-0.4.2/xmpp-vala/src/module/xep/0402_bookmarks2.vala > 2023-03-23 18:00:00.0 + > @@ -68,6 +68,11 @@ > } > > private void on_pupsub_item(XmppStream stream, Jid jid, string id, > StanzaNode? node) { > +if > (!jid.equals(stream.get_flag(Bind.Flag.IDENTITY).my_jid.bare_jid)) { > +warning("Received alleged bookmarks:1 item from %s, ignoring", > jid.to_string()); > +return; > +} > + > Conference conference = parse_item_node(node, id); > Flag? flag = stream.get_flag(Flag.IDENTITY); > if (flag != null) { > @@ -77,6 +82,11 @@ > } > > private void on_pupsub_retract(XmppStream stream, Jid jid, string id) { > +if > (!jid.equals(stream.get_flag(Bind.Flag.IDENTITY).my_jid.bare_jid)) { > +warning("Received alleged bookmarks:1 retract from %s, > ignoring", jid.to_string()); > +return; > +} > + > try { > Jid jid_parsed = new Jid(id); > Flag? flag = stream.get_flag(Flag.IDENTITY); -- Sebastian Ramacher

Bug#1033399: pre-approve unblock: tryton-server/6.0.29-2

2023-03-24 Thread Sebastian Ramacher
t; > > -- > > Mathias Behrle > PGP/GnuPG key availabable from any keyserver, ID: 0xD6D09BE48405BBF6 > AC29 7E5C 46B9 D0B6 1C71 7681 D6D0 9BE4 8405 BBF6 -- Sebastian Ramacher

Bug#1033203: unblock: fuse3/3.14.0-3

2023-03-24 Thread Sebastian Ramacher
-17 20:51:05.00000 +0100 > @@ -54,7 +54,7 @@ > > override_dh_auto_test: > ifeq (,$(findstring nocheck,$(DEB_BUILD_OPTIONS))) > -ifeq (,$(findstring $(DEB_BUILD_ARCH),powerpc ppc64 sparc64 s390x)) > +ifeq (,$(findstring $(DEB_BUILD_ARCH),powerpc ppc64 sparc64 s390x hppa)) > (cd obj-${DEB_HOST_GNU_TYPE}; python3 -m pytest test/) \ > || true > endif -- Sebastian Ramacher

Bug#1033374: pre-unblock: ruby-rack/2.2.6.4-1

2023-03-24 Thread Sebastian Ramacher
re_cookie.domain.must_equal "test.com" > secure_cookie.path.must_equal "/" > secure_cookie.secure.must_equal true > secure_cookie.expires.must_be_nil > diff -Nru ruby-rack-2.2.4/test/spec_multipart.rb > ruby-rack-2.2.6.4/test/spec_multipart.rb > --- ruby-rack-2.2.4/test/spec_multipart.rb2022-07-01 03:48:29.0 > +0530 > +++ ruby-rack-2.2.6.4/test/spec_multipart.rb 2023-03-13 23:37:51.0 > +0530 > @@ -632,6 +632,18 @@ > end >end > > + it "reach a multipart total limit" do > +begin > + previous_limit = Rack::Utils.multipart_total_part_limit > + Rack::Utils.multipart_total_part_limit = 5 > + > + env = Rack::MockRequest.env_for '/', > multipart_fixture(:three_files_three_fields) > + lambda { Rack::Multipart.parse_multipart(env) }.must_raise > Rack::Multipart::MultipartTotalPartLimitError > +ensure > + Rack::Utils.multipart_total_part_limit = previous_limit > +end > + end > + >it "return nil if no UploadedFiles were used" do > data = Rack::Multipart.build_multipart("people" => [{ "submit-name" => > "Larry", "files" => "contents" }]) > data.must_be_nil > diff -Nru ruby-rack-2.2.4/test/spec_request.rb > ruby-rack-2.2.6.4/test/spec_request.rb > --- ruby-rack-2.2.4/test/spec_request.rb 2022-07-01 03:48:29.0 > +0530 > +++ ruby-rack-2.2.6.4/test/spec_request.rb2023-03-13 23:37:51.0 > +0530 > @@ -1000,7 +1000,7 @@ > f[:tempfile].size.must_equal 76 >end > > - it "MultipartPartLimitError when request has too many multipart parts if > limit set" do > + it "MultipartPartLimitError when request has too many multipart file parts > if limit set" do > begin >data = 1.times.map { "--AaB03x\r\nContent-Type: > text/plain\r\nContent-Disposition: attachment; name=#{SecureRandom.hex(10)}; > filename=#{SecureRandom.hex(10)}\r\n\r\ncontents\r\n" }.join("\r\n") >data += "--AaB03x--\r" > @@ -1016,6 +1016,22 @@ > end >end > > + it "MultipartPartLimitError when request has too many multipart total > parts if limit set" do > +begin > + data = 1.times.map { "--AaB03x\r\ncontent-type: > text/plain\r\ncontent-disposition: attachment; > name=#{SecureRandom.hex(10)}\r\n\r\ncontents\r\n" }.join("\r\n") > + data += "--AaB03x--\r" > + > + options = { > +"CONTENT_TYPE" => "multipart/form-data; boundary=AaB03x", > +"CONTENT_LENGTH" => data.length.to_s, > +:input => StringIO.new(data) > + } > + > + request = make_request Rack::MockRequest.env_for("/", options) > + lambda { request.POST }.must_raise > Rack::Multipart::MultipartTotalPartLimitError > +end > + end > + >it 'closes tempfiles it created in the case of too many created' do > begin >data = 1.times.map { "--AaB03x\r\nContent-Type: > text/plain\r\nContent-Disposition: attachment; name=#{SecureRandom.hex(10)}; > filename=#{SecureRandom.hex(10)}\r\n\r\ncontents\r\n" }.join("\r\n") -- Sebastian Ramacher

<    4   5   6   7   8   9   10   11   12   13   >