Hi Julian,
On 2023-05-16 22:15:33 +0200, Sebastian Ramacher wrote:
> On 2023-05-07 20:30:03 +0200, Helmut Grohne wrote:
> > On Sun, May 07, 2023 at 08:16:14PM +0200, Julian Andres Klode wrote:
> > > I don't have a problem pushing a 2.6.1 out with this
] I reviewed all changes and I approve them
[x] attach debdiff against the package in testing
[ Other info ]
The debdiff only includes the changes to debian/.
unblock ffmpeg/7:5.1.3-1
Cheers
--
Sebastian Ramacher
diff --git a/debian/changelog b/debian/changelog
index 2d2ec524..f4ed9fc6 100
On 2023-05-24 09:12:14 +0200, Johannes Schauer Marin Rodrigues wrote:
> Hi,
>
> Quoting Sebastian Ramacher (2023-05-24 08:31:36)
> > Please check the autopkgtests. They are failing with errors that seem
> > unrelated to doc-debian.
>
> yes. As I said in my original em
On 2023-05-20 13:54:14 +0200, Johannes Schauer Marin Rodrigues wrote:
> Hi,
>
> Quoting Sebastian Ramacher (2023-05-20 13:38:20)
> > > some of the packages uploaded to unstable or experimental are breaking the
> > > mmdebstrap autopkgtest:
> > >
> &
t;to unstable though?
> >>
> >> I'd prefer to wait for an ack from the release team
> >
> >Ok, in that case I think it should be explicitly mentioned that this
> >is a 'preapproval' request.
>
>
> How to do that? I hope is done now
Please go ahead and remove the moreinfo tag once the package is
available in unstable.
Cheers
--
Sebastian Ramacher
ailable from experimental. I've kept the
> diff minimal. Earlier planned and implemented non-related fixes will, via
> experimental and unstable, end up in 13/trixie.
>
> unblock doc-debian/11.3
Please go ahead with the upload to unstable. Remove the moreinfo tag
once the package is available.
Cheers
--
Sebastian Ramacher
ckage and thus, this unblock
> cannot break anything (other than autopkgtest results).
Could you please provide a debdiff of the proposed changes?
Cheers
--
Sebastian Ramacher
an unblock or if there are other issues preventing
them from migrating to testing.
So everything's fine. You don't need to write the unblock requests
earlier. If the debdiff contains more than a targeted fix, we'll wait
for the unblock bug anyway.
Cheers
[1] UDD has various views (e.g., "Release Team view") to find those.
--
Sebastian Ramacher
t;
> Hi!
>
> Please pre-approve the dpkg 1.21.22 upload.
Please go ahead and remove the moreinfo tag once the upload is available
in unstable.
Cheers
--
Sebastian Ramacher
Control: tags -1 confirmed
On 2023-05-16 23:01:00 +0200, Johannes Schauer Marin Rodrigues wrote:
> Hi,
>
> Quoting Sebastian Ramacher (2023-05-16 22:11:58)
> > > [ Risks ]
> > >
> > > Low risk as the diff simply is:
> > >
> > >
n't exist any more.
> +Spotted by lintian's "superfluous-file-pattern" warnings.
> +
> + [ Debian Janitor ]
> + * Bump debhelper from old 12 to 13.
It's too late for debhelper compat bumps. See
https://release.debian.org/bookworm/FAQ.html
Please re-upload without that change and remove the moreinfo tag once
that happened.
Cheers
--
Sebastian Ramacher
userdel amavis
> + userdel amavis || true
userdel is from passwd and not from adduser. Am I missing something?
Cheers
--
Sebastian Ramacher
downloadable
> https://bugs.debian.org/1035696
>
>
>
> This mail is generated by:
> https://salsa.debian.org/release-team/release-tools/-/blob/master/mailer/mail_autoremovals.pl
>
> Autoremoval data is generated by:
> https://salsa.debian.org/qa/udd/-/blob/master/udd/testing_autoremovals_gatherer.pl
>
--
Sebastian Ramacher
loser for #1036114 in your upload?
>
> Thanks for catching this, Salvatore.
>
> Updated debdiff attached.
Please go ahead and remove the moreinfo tag once the package is
available in unstable.
Cheers
--
Sebastian Ramacher
riting this, I'm waiting for my sponsor to upload the latest
> version to unstable.
Please remove the moreinfo tag once the package is available in
unstable.
Cheers
--
Sebastian Ramacher
bian.org
> Control: affects -1 + src:samba
>
> Please unblock package samba
This uploaded caused the autpkgtests of libsoup2.4 and libsoup3 to
regress on s390x. Could you please check (with the libsoup maintainers)
if that is an issue in libsoup or samba? Thanks
Best
Sebastian
--
Sebastian Ramacher
On 2023-05-11 19:22:36 +0200, Paul Gevers wrote:
> Hi Sebastian,
>
> On 11-05-2023 19:06, Sebastian Ramacher wrote:
> > So you're going back to a directory. That would require a symlink_to_dir
> > in the maintscript. Do you want to have symlinks or not?
>
> See http
> - dh_installdocs --link-doc=libjs-source-map
So you're going back to a directory. That would require a symlink_to_dir
in the maintscript. Do you want to have symlinks or not?
Cheers
--
Sebastian Ramacher
lock request and feel free to ping
me so that I can unblock the package.
Cheers
--
Sebastian Ramacher
e release? How many are there, that
would actually fail and not just leave cruft behind?
Cheers
--
Sebastian Ramacher
a and test code due to license
>
> Closes: #1034367
I'm afraid this fix is incomplete. The source package still contains the
data files with a non-free license and hence Debian is redistrbuting
them. golang-v2ray-core needs to be repacked to completly get rid of the
files.
Cheers
--
Sebastian Ramacher
On 2023-05-07 10:49:40 +0200, Sebastian Ramacher wrote:
> > Even if we fix these bugs in the packages, people may still upgrade
> > their systems and remove them rather than upgrading. Then, once the
> > upgrade is finished (and adduser is removed), they may consider purging
really like small essential and want it gone, but we need
> to balance that with possible breakage.
>
> I think this primarily is a decision that belongs to the release
> managers with the default choice being "do nothing about it".
>
> Helmut
>
--
Sebastian Ramacher
,12 @@
> +
> + #include
> +
> +-#include "third_party/libsrtp/crypto/include/crypto_types.h"
> +-#include "third_party/libsrtp/include/srtp.h"
> +-#include "third_party/libsrtp/include/srtp_priv.h"
> ++#ifdef HAVE_LIBSRTP
> ++# include
> ++# include
> ++#else
> ++# include "srtp_priv.h"
> ++#endif
> +
> + #define EXTERNAL_HMAC_SHA1 SRTP_HMAC_SHA1 + 1
> + #define HMAC_KEY_LENGTH 20
> +--- a/src/pc/srtp_session.cc
> b/src/pc/srtp_session.cc
> +@@ -30,8 +30,12 @@
> + #include "rtc_base/thread_annotations.h"
> + #include "rtc_base/time_utils.h"
> + #include "system_wrappers/include/metrics.h"
> +-#include "third_party/libsrtp/include/srtp.h"
> +-#include "third_party/libsrtp/include/srtp_priv.h"
> ++
> ++#ifdef HAVE_LIBSRTP
> ++# include
> ++#else
> ++# include "srtp_priv.h"
> ++#endif
> +
> + namespace cricket {
> +
> +@@ -290,6 +294,7 @@ bool SrtpSession::UnprotectRtcp(void* p,
> + bool SrtpSession::GetRtpAuthParams(uint8_t** key, int* key_len, int*
> tag_len) {
> + RTC_DCHECK(thread_checker_.IsCurrent());
> + RTC_DCHECK(IsExternalAuthActive());
> ++#ifndef HAVE_LIBSRTP
> + if (!IsExternalAuthActive()) {
> + return false;
> + }
> +@@ -313,6 +318,10 @@ bool SrtpSession::GetRtpAuthParams(uint8
> + *key_len = external_hmac->key_length;
> + *tag_len = rtp_auth_tag_len_;
> + return true;
> ++#else
> ++ RTC_LOG_F(LS_WARNING) << "unavailable";
> ++ return false;
> ++#endif
> + }
> +
> + int SrtpSession::GetSrtpOverhead() const {
> +@@ -336,6 +345,7 @@ bool SrtpSession::GetSendStreamPacketInd
> +int in_len,
> +int64_t* index) {
> + RTC_DCHECK(thread_checker_.IsCurrent());
> ++#ifndef HAVE_LIBSRTP
> + srtp_hdr_t* hdr = reinterpret_cast(p);
> + srtp_stream_ctx_t* stream = srtp_get_stream(session_, hdr->ssrc);
> + if (!stream) {
> +@@ -346,6 +356,10 @@ bool SrtpSession::GetSendStreamPacketInd
> + *index = static_cast(rtc::NetworkToHost64(
> + srtp_rdbx_get_packet_index(>rtp_rdbx) << 16));
> + return true;
> ++#else
> ++ RTC_LOG_F(LS_WARNING) << "unavailable";
> ++ return false;
> ++#endif
> + }
> +
> + bool SrtpSession::DoSetKey(int type,
--
Sebastian Ramacher
ebian/patches/series 2023-05-01 11:31:44.0 +0200
> @@ -3,3 +3,5 @@
> 02-debian-xterm.diff
> 03-debian-ncursesconfig-omit-L.diff
> fix_crash_on_very_long_tc-use_clause.diff
> +fix-configure-root-args-option.diff
> +debian-env-access.diff
> diff -Nru ncurses-6.4/debian/rules ncurses-6.4/debian/rules
> --- ncurses-6.4/debian/rules 2023-01-22 19:46:39.0 +0100
> +++ ncurses-6.4/debian/rules 2023-05-01 11:36:38.0 +0200
> @@ -148,6 +148,7 @@
> --without-progs \
> $(with_mouse) \
> --enable-symlinks \
> + --disable-root-environ \
> --disable-termcap \
> --with-default-terminfo-dir=/etc/terminfo \
>
> --with-terminfo-dirs="/etc/terminfo:/lib/terminfo:/usr/share/terminfo" \
--
Sebastian Ramacher
l(buf)
> ++endfunc
> ++
> + " vim: shiftwidth=2 sts=2 expandtab
> +diff --git a/src/version.c b/src/version.c
> +index c93499c..0e83a6f 100644
> +--- a/src/version.c
> b/src/version.c
> +@@ -695,6 +695,8 @@ static char *(features[]) =
> +
> + static int included_patches[] =
> + { /* Add new patch number below this line */
> ++/**/
> ++1499,
> + /**/
> + 1378,
> + /**/
> diff -Nru vim-9.0.1378/debian/patches/series
> vim-9.0.1378/debian/patches/series
> --- vim-9.0.1378/debian/patches/series2023-03-04 14:41:33.0
> -0500
> +++ vim-9.0.1378/debian/patches/series2023-05-04 06:24:44.0
> -0400
> @@ -2,3 +2,5 @@
> debian/Detect-the-rst-filetype-using-the-contents-of-the-file.patch
> debian/Add-recognition-of-more-LaTeX-commands-for-tex-filetype-d.patch
> debian/Document-Debian-s-decision-to-disable-modelines-by-defaul.patch
> +patch-9.0.1499-using-uninitialized-memory-with-fuzzy-matc.patch
> +Fix-GH-267-where-indent-after-a-sub-would-not-work.patch
--
Sebastian Ramacher
8760023 100755
> --- a/debian/rules
> +++ b/debian/rules
> @@ -8,7 +8,7 @@ override_dh_auto_build:
> zx scripts/build-indexes.mjs
> zx scripts/clean-and-copy.mjs
> zx scripts/build-compat/index.mjs
> - ln -s ../packages/core-js node_modules/core-js || true
> + [ -e node_modules/core-js ] || ln -s ../packages/core-js node_modules/
> || true
> zx scripts/bundle-package/bundle-package.mjs
> rm -f node_modules/core-js core-js
> terser -o packages/core-js-bundle/index.min.js
> packages/core-js-bundle/index.js
--
Sebastian Ramacher
Control: tags -1 moreinfo
On 2023-04-30 11:07:51 +0300, Michael Tokarev wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: pkg-qemu-de...@lists.alioth.debian.org
>
> Please unblock package qemu
>
> This
t; echo " * install grub... (bios)"
> DEBIAN_FRONTEND=noninteractive chroot $CHROOT apt-get -y install grub-pc
> cryptsetup keyutils
> fi
> +
> +# Re-enable os-prober:
> +sed -i "s/#GRUB_DISABLE_OS_PROBER=false/# OS_PROBER re-enabled by Debian
> Calamares installation:\nGRUB_DISABLE_OS_PROBER=false/g"
> $CHROOT/etc/default/grub
> +chroot $CHROOT /usr/sbin/update-grub
> """
>
> -Jonathan
>
> unblock calamares-settings-debian/12.0.8-1
>
--
Sebastian Ramacher
f (cu != NULL) {
> + uint32_t void_id;
> +--
> +2.40.1
> +
> diff -Nru dwarves-1.24/debian/patches/series
> dwarves-1.24/debian/patches/series
> --- dwarves-1.24/debian/patches/series2022-12-10 10:11:28.0
> +0100
> +++ dwarves-1.24/debian/patches/series2023-05-02 20:37:16.0
> +0200
> @@ -1,3 +1,4 @@
> 00-store-the-CU-being-processed-to-avoid-changing-many-functions.patch
> 01-record-if-a-CU-has-a-DW_TAG_unspecified_type.patch
> 02-encode-DW_TAG_unspecified_type-returning-routines-as-void.patch
> +03-dwarves-Zero-initialize-struct-cu-in-cu__new-to-prev.patch
--
Sebastian Ramacher
On 2023-05-02 08:08:22 +0200, Andrej Shadura wrote:
> Hi,
>
> On Tue, 2 May 2023, at 07:51, Sebastian Ramacher wrote:
> >> + [ Debian Janitor ]
> >> + * Bump debhelper from old 12 to 13.
>
> > This change is no longer appropriate at this sta
Control: tags -1 moreinfo
On 2023-04-29 13:13:03 +0200, Sebastiaan Couwenberg wrote:
> Control: tags -1 - moreinfo
>
> On 4/29/23 10:51, Sebastian Ramacher wrote:
> > On 2023-04-27 16:52:36 +0200, Bas Couwenberg wrote:
> > > Package: release.debian.org
> >
tools actually has
> a zero epoch (0:2009.10.04-2).
>
> Signed-off-by: Sjoerd Simons
> ---
> BSSolv.xs | 2 --
> 1 file changed, 2 deletions(-)
>
> diff --git a/BSSolv.xs b/BSSolv.xs
> index ced6823..31c7a7a 100644
> --- a/BSSolv.xs
> +++ b/BSSolv.xs
> @@ -207,8 +207,6 @@ makeevr(Pool *pool, char *e, char *v, char *r)
>
>if (!v)
> return 0;
> - if (e && !strcmp(e, "0"))
> -e = 0;
>if (e)
> s = pool_tmpjoin(pool, e, ":", v);
>else
--
Sebastian Ramacher
hare/doc/pdl/html is symlinked to /var/lib/pdl/html
> doc-base-file-references-wrong-path *
>
> # Not a problem
> -national-encoding *
> +national-encoding [*]
>
> diff -Nru pdl-2.081/debian/source/lintian-overrides
> pdl-2.081/debian/source/lintian-overrides
> --- pdl-2.081/debian/source/lintian-overrides 2022-06-21 08:16:23.0
> +0200
> +++ pdl-2.081/debian/source/lintian-overrides 2023-04-27 15:41:56.0
> +0200
> @@ -1,3 +1,3 @@
> # Not a problem
> -national-encoding *debian/fix_man_encoding.sed*
> +national-encoding [*debian/fix_man_encoding.sed*]
>
--
Sebastian Ramacher
.2...v2.6.3
>
> in order to reduce the deviation from an upstream tag I'd like to skip
> 2.6.2 and go for 2.6.3. Updated debdiff attached.
Please go ahead and remove the moreinfo tag once the packages are
available in unstable.
Cheers
--
Sebastian Ramacher
Control: tags -1 moreinfo confirmed
On 2023-04-28 11:26:00 +0200, Jochen Sprickerhof wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: xdg-desktop-portal-...@packages.debian.org, Birger Schacht
>
> Control:
xes, only touching .po files.
>
> However, the debdiff is huge, so I'm waiting for your approval before
> uploading to unstable.
Please provide the debdiff with the translation updates stripped.
Cheers
--
Sebastian Ramacher
+0300
> @@ -70,6 +70,8 @@
> Section: introspection
> Architecture: any
> Multi-Arch: same
> +Breaks: libmodulemd-dev (<< 2.13.0-1~)
> +Replaces: libmodulemd-dev (<< 2.13.0-1~)
> Depends:
> ${gir:Depends},
> ${misc:Depends},
--
Sebastian Ramacher
Yes, see the history at
https://ci.debian.net/packages/o/onionshare/testing/amd64/.
Cheers
>
> Regards,
>
> hefee
>
>
> --
>
> On Freitag, 21. April 2023 20:53:03 CEST Sebastian Ramacher wrote:
> > Source: onionshare
> > Version: 2.6-1
> > Severity
.
Running "wget http://example.com; to check if network access is
available violates this rule. Furthermore, our buildds have network
access and thus this check succeeds and the package downloads files
during the build.
Cheers
--
Sebastian Ramacher
Hi Stéphane
On 2023-04-22 20:28:34 +0200, Jochen Sprickerhof wrote:
> * Sebastian Ramacher [2023-04-22 16:06]:
> > Both why3 and frama-c have been rebuilt after the last ocaml ABI change.
> > From a quick between a build now and from the last why3, the following
> > packages
On 2023-04-22 11:30:48 +0200, Jochen Sprickerhof wrote:
> Control: tag -1 - moreinfo
>
> Hi Sebastian,
>
> * Sebastian Ramacher [2023-04-22 11:10]:
> > On 2023-04-21 21:35:21 +0200, Jochen Sprickerhof wrote:
> > > Package: release.debian.org
> > > Seve
ity-team/arno-iptables-
> firewall/-/commit/b64ca3208881095b88f61729f4f2dbea4d2621bf
>
> unblock arno-iptables-firewall/2.1.1-8
>
--
Sebastian Ramacher
r.hasOwnProperty('SAMP'), true
> +- equ r.SAMP.hasOwnProperty('TAGN'), true)
> ++equ {}.hasOwnProperty.call(r, 'SAMP'), true
> ++equ {}.hasOwnProperty.call(r.SAMP, 'TAGN'), true)
> +
> + 'test attrValueProcessors key param': skeleton(attrValueProcessors:
> [replaceValueByName], (r)->
> + console.log 'Result object: ' + util.inspect r, false, 10
> diff --git a/debian/patches/series b/debian/patches/series
> index 2840ff2..c9bf5bb 100644
> --- a/debian/patches/series
> +++ b/debian/patches/series
> @@ -1,2 +1,3 @@
> fix-for-coffeescript-2.patch
> drop-test-not-compatible-with-coffe-2.patch
> +CVE-2023-0842.patch
--
Sebastian Ramacher
511-manganese-3-10 . ANY . unstable . -m "Rebuild with new
> OCaml ABI (Closes: #1033701)"
why3 installs perfectly fine in both bookworm and unstable. Why is this
needed? We are past the point of doing transitions (especially
uncoordinated ones).
Cheers
--
Sebastian Ramacher
: - - - - - - - - - - results - - - -
- - - - - -
chat_server FAIL non-zero exit status 139
Cheers
--
Sebastian Ramacher
ll changes are documented in the d/changelog
[x] I reviewed all changes and I approve them
[x] attach debdiff against the package in testing
unblock x264/2:0.164.3095+gitbaee400-2+b1
--
Sebastian Ramacher
diff -Nru x264-0.164.3095+gitbaee400/debian/changelog
x264-0.164.3095+gitbaee400/debian
libavutil57 7:5.1.2-3
> ii libc6 2.36-8
> ii libpostproc56 7:5.1.2-3
> ii libsdl2-2.0-0 2.26.4+dfsg-1
> ii libswresample4 7:5.1.2-3
> ii libswscale6 7:5.1.2-3
>
> ffmpeg recommends no packages.
>
> Versions of packages ffmpeg suggests:
> pn ffmpeg-doc
>
> -- no debconf information
>
--
Sebastian Ramacher
/libexec/tirex-backend-test
> diff -Nru tirex-0.7.0/debian/tirex.lintian-overrides
> tirex-0.7.0/debian/tirex.lintian-overrides
> --- tirex-0.7.0/debian/tirex.lintian-overrides 2021-10-08
> 09:39:26.0 +0200
> +++ tirex-0.7.0/debian/tirex.lintian-overrides2022-11-29
> 19:18:57.0 +0100
> @@ -1,2 +1,6 @@
> # This package only provides systemd unit files:
> package-supports-alternative-init-but-no-init.d-script
> +
> +# False positive, lat/lon
> +typo-in-manual-page lon long *
> +
--
Sebastian Ramacher
wrong, is that certain non-default
> network configuration in Amazon EC2 won't be applied. This includes
> configuration of secondary network interfaces and secondary IPv4 addresses on
> any interfaces.
>
> [ Checklist ]
> [x] all changes are documented in the d/changelog
> [x] I reviewed all changes and I approve them
> [x] attach debdiff against the package in testing
>
> [ Other info ]
> (Anything else the release team should know.)
>
> unblock amazon-ec2-net-utils/2.3.0-3
>
--
Sebastian Ramacher
eak and hear as it would be to rob him of his money...
> -- Frederick Douglass
--
Sebastian Ramacher
kage in testing
The debdiff is missing.
Cheers
>
> unblock geocode-glib/3.26.3-6
>
> Thank you,
> Jeremy Bicha
>
--
Sebastian Ramacher
Package: wnpp
Severity: wishlist
Owner: Sebastian Ramacher
X-Debbugs-Cc: debian-de...@lists.debian.org
* Package name: python-argparse-addons
Version : 0.12.0
Upstream Author : Erik Moqvist
* URL : https://github.com/eerimoq/argparse_addons
* License : MIT
Package: wnpp
Severity: wishlist
Owner: Sebastian Ramacher
X-Debbugs-Cc: debian-de...@lists.debian.org
* Package name: python-bincopy
Version : 17.14.5
Upstream Author : Erik Moqvist
* URL : http://www.example.org/
* License : MIT
Programming Lang: Python
Package: wnpp
Severity: wishlist
Owner: Sebastian Ramacher
X-Debbugs-Cc: debian-de...@lists.debian.org
* Package name: python-easy-enum
Version : 0.3.0
Upstream Author : Martin Olejar
* URL : https://pypi.org/project/easy-enum/
* License : BSD-3-clause
Package: wnpp
Severity: wishlist
Owner: Sebastian Ramacher
X-Debbugs-Cc: debian-de...@lists.debian.org
* Package name: python-mboot
Version : 0.3.0
Upstream Author : Martin Olejar
* URL : https://pypi.org/project/mboot/
* License : BSD-3-clause
Programming
,
> packets:3, bytes:378, used:0.0s, actions:tnl_pop(gre_sys)
> +
> tunnel(src=20.0.0.2,dst=20.0.0.1,flags(-df-csum)),recirc_id(0),in_port(gre_sys),packet_type(ns=1,id=0x8847),eth_type(0x8847),mpls(label=999/0x0,tc=0/0,ttl=64/0x0,bos=1/1),
> packets:3, bytes:264, used:0.0s,
> actions:push_eth(src=00:00:00:00:00:00,dst=00:00:00:00:00:00),pop_mpls(eth_type=0x800),recirc(0x1)
> +-tunnel(src=20.0.0.2,dst=20.0.0.1,flags(-df-csum)),recirc_id(0x1),in_port(gre_sys),packet_type(ns=0,id=0),eth_type(0x0800),ipv4(ttl=64,frag=no),
> packets:3, bytes:294, used:0.0s, actions:set(ipv4(ttl=63)),int-br
> ++tunnel(src=20.0.0.2,dst=20.0.0.1,flags(-df-csum)),recirc_id(0x1),in_port(gre_sys),packet_type(ns=0,id=0),eth_type(0x0800),ipv4(proto=1,ttl=64,frag=no),
> packets:3, bytes:294, used:0.0s, actions:set(ipv4(ttl=63)),int-br
> + ])
> +
> + ovs-appctl time/warp 1000
> diff -Nru openvswitch-3.1.0/debian/patches/ovs-ctl-ipsec.patch
> openvswitch-3.1.0/debian/patches/ovs-ctl-ipsec.patch
> --- openvswitch-3.1.0/debian/patches/ovs-ctl-ipsec.patch 2023-02-21
> 23:01:11.0 +0100
> +++ openvswitch-3.1.0/debian/patches/ovs-ctl-ipsec.patch 2023-04-11
> 11:54:40.0 +0200
> @@ -6,9 +6,11 @@
> Author: James Page
> Forwarded: not-needed
>
> a/utilities/ovs-ctl.in
> -+++ b/utilities/ovs-ctl.in
> -@@ -245,7 +245,7 @@ start_ovs_ipsec () {
> +Index: openvswitch/utilities/ovs-ctl.in
> +===
> +--- openvswitch.orig/utilities/ovs-ctl.in
> openvswitch/utilities/ovs-ctl.in
> +@@ -250,7 +250,7 @@ start_ovs_ipsec () {
> --pidfile=${rundir}/ovs-monitor-ipsec.pid \
> --ike-daemon=$IKE_DAEMON \
> $no_restart \
> @@ -16,3 +18,4 @@
> +--log-file --detach unix:${rundir}/db.sock || return 1
> return 0
> }
> +
> diff -Nru openvswitch-3.1.0/debian/patches/series
> openvswitch-3.1.0/debian/patches/series
> --- openvswitch-3.1.0/debian/patches/series 2023-02-21 23:01:11.0
> +0100
> +++ openvswitch-3.1.0/debian/patches/series 2023-04-11 11:54:40.0
> +0200
> @@ -1 +1,2 @@
> ovs-ctl-ipsec.patch
> +CVE-2023-1668_ofproto-dpif-xlate_Always_mask_ip_proto_field.patch
--
Sebastian Ramacher
changes and I approve them
[x] attach debdiff against the package in testing
unblock liblrdf/0.6.1-4
Cheers
--
Sebastian Ramacher
--- liblrdf-0.6.1/debian/changelog 2022-10-23 17:57:01.0 +
+++ liblrdf-0.6.1/debian/changelog 2023-03-17 21:17:37.0 +
@@ -1,3
Control: reopen -1
On 2023-04-12 13:59:17 +0200, Andreas Beckmann wrote:
> Did you mean to unblock -8 #1034287 instead?
Yes, that mail went to the wrong bug.
Cheers
>
> Andreas
>
--
Sebastian Ramacher
t,
> + breaks-testbed,
> +
> +# install linux-image after some-dkms w/o linux-headers
> +Test-Command: apt-get install -yf linux-image-generic
> +Features: test-name=install_linux-image_after_some-dkms_without_linux-headers
> +Architecture: amd64
> +Depends:
> + dkms-test-dkms,
> +Restrictions:
> + allow-stderr,
> + needs-root,
> + breaks-testbed,
With these restrictions, I don't think the tests would run on debci
(Paul, please correct me if I am wrong). I hardly see the benefit of
granting an exception here for tests that won't be triggered.
Cheers
--
Sebastian Ramacher
On 2023-04-12 15:38:26 +0700, Bagas Sanjaya wrote:
> On Sun, Jan 29, 2023 at 01:13:43PM +0100, Diederik de Haas wrote:
> > On 3 Feb 2018 15:42:21 +0100 Sebastian Ramacher
> > wrote:
> > > Package: wnpp
> > >
> > > Note that upstream appears to
+ lua_pushinteger(L, rc);
> + return 1;
> + }
> ++*/
> +
> + static int c_history_truncate_file(lua_State *L) { /* filename,num in rc
> out */
> + size_t len;
> diff --git a/debian/patches/series b/debian/patches/series
> new file mode 100644
> index 000..84626e5
> --- /dev/null
> +++ b/debian/patches/series
> @@ -0,0 +1 @@
> +eof.patch
--
Sebastian Ramacher
.height;
>damage[i * 4 + 2] = rect.width;
>damage[i * 4 + 3] = rect.height;
> }
> diff -Nru mutter-43.3/src/wayland/meta-wayland-subsurface.c
> mutter-43.4/src/wayland/meta-wayland-subsurface.c
> --- mutter-43.3/src/wayland/meta-wayland-subsurface.c 2023-02-13
> 18:12:26.0 +
> +++ mutter-43.4/src/wayland/meta-wayland-subsurface.c 2023-04-10
> 14:26:01.0 +0100
> @@ -462,13 +462,15 @@
>struct wl_resource *resource)
> {
>MetaWaylandSurface *surface = wl_resource_get_user_data (resource);
> + MetaWaylandSurface *parent;
>gboolean is_parent_effectively_synchronized;
>
> - if (!surface->sub.synchronous)
> + parent = surface->sub.parent;
> + if (!parent || !surface->sub.synchronous)
> return;
>
>is_parent_effectively_synchronized =
> -is_surface_effectively_synchronized (surface->sub.parent);
> +is_surface_effectively_synchronized (parent);
>
>if (!is_parent_effectively_synchronized)
> meta_wayland_surface_apply_cached_state (surface);
--
Sebastian Ramacher
_version: '>= 0.58.0',
>license: 'LGPLv2+',
> )
> diff -Nru gnome-shell-43.3/subprojects/extensions-tool/meson.build
> gnome-shell-43.4/subprojects/extensions-tool/meson.build
> --- gnome-shell-43.3/subprojects/extensions-tool/meson.build 2023-02-14
> 00:11:32.0 +
> +++ gnome-shell-43.4/subprojects/extensions-tool/meson.build 2023-03-19
> 20:25:01.0 +
> @@ -1,5 +1,5 @@
> project('gnome-extensions-tool', 'c',
> - version: '43.3',
> + version: '43.4',
>meson_version: '>= 0.58.0',
>license: 'GPLv2+'
> )
> diff -Nru gnome-shell-43.3/subprojects/shew/meson.build
> gnome-shell-43.4/subprojects/shew/meson.build
> --- gnome-shell-43.3/subprojects/shew/meson.build 2023-02-14
> 00:11:32.0 +
> +++ gnome-shell-43.4/subprojects/shew/meson.build 2023-03-19
> 20:25:01.0 +
> @@ -1,5 +1,5 @@
> project('shew', 'c',
> - version: '43.3',
> + version: '43.4',
>meson_version: '>= 0.58.0',
>license: 'LGPLv2+',
> )
--
Sebastian Ramacher
Control: tags -1 moreinfo confirmed
On 2023-04-10 11:02:23 +0200, Aurelien Jarno wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: gl...@packages.debian.org, debian-gl...@lists.debian.org
> Control: affects
unt))
> -g_slice_free (DispatchData, data);
> +{
> + g_clear_object (>invocation);
> + g_slice_free (DispatchData, data);
> +}
> }
>
> static DispatchData *
> @@ -502,16 +504,17 @@
> GCancellable *cancellable)
> {
>DispatchData *data = task_data;
> + GDBusInterfaceSkeleton *interface = g_task_get_source_object (task);
>GDBusInterfaceSkeletonFlags flags;
>GDBusObject *object;
>gboolean authorized;
>
> - g_mutex_lock (>interface->priv->lock);
> - flags = data->interface->priv->flags;
> - object = data->interface->priv->object;
> + g_mutex_lock (>priv->lock);
> + flags = interface->priv->flags;
> + object = interface->priv->object;
>if (object != NULL)
> g_object_ref (object);
> - g_mutex_unlock (>interface->priv->lock);
> + g_mutex_unlock (>priv->lock);
>
>/* first check on the enclosing object (if any), then the interface */
>authorized = TRUE;
> @@ -519,13 +522,13 @@
> {
>g_signal_emit_by_name (object,
> "authorize-method",
> - data->interface,
> + interface,
> data->invocation,
> );
> }
>if (authorized)
> {
> - g_signal_emit (data->interface,
> + g_signal_emit (interface,
> signals[G_AUTHORIZE_METHOD_SIGNAL],
> 0,
> data->invocation,
> @@ -627,9 +630,8 @@
>DispatchData *data;
>
>data = g_slice_new0 (DispatchData);
> - data->interface = interface;
>data->method_call_func = method_call_func;
> - data->invocation = invocation;
> + data->invocation = g_object_ref (invocation);
>data->ref_count = 1;
>
>task = g_task_new (interface, NULL, NULL, NULL);
> diff -Nru glib2.0-2.74.6/glib/tests/assert-msg-test.py
> glib2.0-2.74.6/glib/tests/assert-msg-test.py
> --- glib2.0-2.74.6/glib/tests/assert-msg-test.py 2023-02-23
> 13:54:27.0 +
> +++ glib2.0-2.74.6/glib/tests/assert-msg-test.py 2023-04-10
> 13:09:07.0 +0100
> @@ -157,9 +157,9 @@
>
> # Some CI environments disable ptrace (as they’re running in a
> # container). If so, skip the test as there’s nothing we can do.
> -if (
> -result.info.returncode != 0
> -and "ptrace: Operation not permitted" in result.err
> +if result.info.returncode != 0 and (
> +"ptrace: Operation not permitted" in result.err
> +or "warning: opening /proc/PID/mem file for lwp" in
> result.err
> ):
> self.skipTest("GDB is not functional due to ptrace being
> disabled")
>
--
Sebastian Ramacher
t;"
> +"The following command can show the list of known paper sizes for ${binary}:"
> +msgstr ""
> +"Următoarea comandă poate afișa lista cu dimensiunile de hârtie cunoscute
> pentru "
> +"${binary}:"
> +
> +#. Type: multiselect
> +#. Description
> +#: ../texlive-base.templates:3001
> +msgid "TeX binaries that should use the system paper size:"
> +msgstr "Binarele TeX care ar trebui să utilizeze dimensiunea hârtiei de
> sistem:"
> +
> +#. Type: multiselect
> +#. Description
> +#: ../texlive-base.templates:3001
> +msgid ""
> +"This system's TeX binaries currently use different default paper sizes.
> Please "
> +"choose which of them should get the system paper size (${libpaperPaper}) as
> "
> +"their default."
> +msgstr ""
> +"Binarele TeX ale acestui sistem folosesc în prezent diferite dimensiuni de "
> +"hârtie implicite. Vă rugăm să alegeți care dintre ele ar trebui să
> primească "
> +"dimensiunea hârtiei de sistem (${libpaperPaper}) ca implicită."
--
Sebastian Ramacher
+try:
> + data['recipient'] = data.get('recipient').split('@')[1]
> +except IndexError:
> +pass # local recipients may not be fully qualified, so
> no "@".
> if debugLevel >= 3: syslog.syslog('Config: %s' % str(configData))
> # run the checkers {{{3
> checkerValue = None
--
Sebastian Ramacher
On 2023-04-05 19:10:42 +0800, Shengjing Zhu wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: golang-1...@packages.debian.org, z...@debian.org
> Control: affects -1 + src:golang-1.19
>
> Please unblock
of elements with attribute 'xsi:type' now
> will be returned as a hash or array instead of an arbitrary object that Znuny
> cannot handle.
> 2022-09-20 Added config level check to SysConfig admin dialog. Thanks for
> hints to Tim Püttmanns, maxence.
> 2022-09-16 Auto responses now will not be sent if the recipient would be
> a system address.
>
>
>
> unblock znuny/6.5.1-1
--
Sebastian Ramacher
stopher Obbard
> +(cherry picked from commit c8c5075853aab9e1ac6ae07a3a7c2b070aa38a62)
> +---
> + doc/examples/setup-user.sh | 2 +-
> + 1 file changed, 1 insertion(+), 1 deletion(-)
> +
> +diff --git a/doc/examples/setup-user.sh b/doc/examples/setup-user.sh
> +index da155d1..07b2
ize, );
> + if (error)
> +g_error ("%s", error->message);
> +
> + test_webp_icc_output ((guchar *) buffer, buf_size, "MQo=");
> + g_remove (path);
> + g_clear_pointer (, g_free);
> + g_clear_pointer (, g_free);
> +
> + /* Test on memory contents */
> + gdk_pixbuf_save_to_buffer (pixbuf, , _size, "webp", ,
> + "icc-profile", "MQo=", NULL);
> + if (error)
> +g_error ("%s", error->message);
> +
> + test_webp_icc_output ((guchar *) buffer, buf_size, "MQo=");
> +
> + g_free (buffer);
> + g_object_unref (pixbuf);
> + return 0;
> +}
> diff -Nru webp-pixbuf-loader-0.2.0/tests/t_null_error.c
> webp-pixbuf-loader-0.2.1/tests/t_null_error.c
> --- webp-pixbuf-loader-0.2.0/tests/t_null_error.c 1970-01-01
> 01:00:00.0 +0100
> +++ webp-pixbuf-loader-0.2.1/tests/t_null_error.c 2023-03-04
> 00:36:54.0 +0100
> @@ -0,0 +1,50 @@
> +#include
> +#include
> +
> +static gchar *
> +create_filename ()
> +{
> + GString *pathbuild = g_string_new (g_get_tmp_dir ());
> + gchar *id= g_uuid_string_random ();
> + g_string_append_printf (pathbuild, "%s%s.webp", G_DIR_SEPARATOR_S, id);
> + g_free (id);
> + return g_string_free (pathbuild, FALSE);
> +}
> +
> +gboolean
> +save_func (const gchar *buffer, gsize count, GError **error, gpointer data)
> +{
> + return TRUE;
> +}
> +
> +void
> +test_pixbufv (GdkPixbuf *pixbuf, gchar **keys, gchar **values)
> +{
> + GStatBuf tmpstat = { 0 };
> + gchar *path= create_filename ();
> + g_assert (gdk_pixbuf_savev (pixbuf, path, "webp", keys, values, NULL));
> + g_stat (path, );
> + g_remove (path);
> + g_free (path);
> +
> + g_assert (gdk_pixbuf_save_to_callbackv (pixbuf, save_func, NULL, "webp",
> keys, values, NULL));
> +}
> +
> +int
> +main ()
> +{
> + gchar **env = g_get_environ ();
> +
> + GdkPixbuf *pixbuf
> + = gdk_pixbuf_new_from_file (g_environ_getenv (env, "TEST_FILE"), NULL);
> + g_assert (pixbuf != NULL);
> + g_clear_pointer (, g_strfreev);
> +
> + gchar *keys[2] = { "icc-profile", NULL };
> + gchar *values[2] = { "MQo=", NULL };
> +
> + test_pixbufv (pixbuf, NULL, NULL);
> + test_pixbufv (pixbuf, keys, values);
> +
> + g_object_unref (pixbuf);
> +}
> \ No newline at end of file
>
> ```
>
> unblock webp-pixbuf-loader/0.2.1-1
>
--
Sebastian Ramacher
On 2023-04-05 21:57:55 +0200, Sebastian Ramacher wrote:
> On 2023-04-05 19:11:25 +0200, Paul Gevers wrote:
> > Control: tags -1 moreinfo
> >
> > Hi Sebastian,
> >
> > On 02-04-2023 22:06, Sebastian Ramacher wrote:
> > >[x] attach debdiff against t
failed
./google/protobuf/repeated_field.h:81:27: note: the comparison reduces to ‘(8
<= 4)’
make[4]: *** [Makefile:6691:
google/protobuf/protobuf_test-extension_set_unittest.o] Error 1
While I can understand the motivation behind #103398, please test such
changes during the freeze in experimental
On 2023-04-05 19:11:25 +0200, Paul Gevers wrote:
> Control: tags -1 moreinfo
>
> Hi Sebastian,
>
> On 02-04-2023 22:06, Sebastian Ramacher wrote:
> >[x] attach debdiff against the package in testing
>
> The debdiff that I get with $(d) contains two new patches
On 2023-04-05 11:08:31 +0100, Julian Gilbey wrote:
> On Tue, Apr 04, 2023 at 11:34:22PM +0200, Sebastian Ramacher wrote:
> > > +# failing tests on 64-bit big-endian targets
> > > +if [ $arch = s390x -o $arch = s390x -o $arch = sparc64 ]
> >
> > That's s39
On 2023-04-05 08:52:56 +1000, David Bannon wrote:
>
> On 5/4/23 07:50, Sebastian Ramacher wrote:
> > On 2023-04-03 12:23:44 +1000, David Bannon wrote:
> > > On 3/4/23 05:57, Sebastian Ramacher wrote:
> > > > On 2023-04-01 10:54:33 +1100, David Bannon wrote:
>
On 2023-04-04 15:33:01 +0200, Chris Hofstaedtler wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: Debian Security Team
>
> Please unblock package pdns-recursor
>
> [ Reason ]
>
> I would like to update
_show_paused_greenlets
> -tests_python/test_debugger_json.py::test_gevent_subprocess_not_python
> -tests_python/test_debugger_json.py::test_gevent_subprocess_python
> - tests_python/test_debugger_json.py::test_notify_gevent
> -tests_python/test_debugger_json.py::test_attach_to_pid[False]
> -tests_python/test_utilities.py::test_gevent_notify
> -)
> -fi
> -
> if [ $arch = ppc64el ]
> then
> EXCLUDES+=(
> - tests_python/test_debugger_json.py::test_code_reload
> +tests_python/test_debugger_json.py::test_code_reload
> )
> fi
>
--
Sebastian Ramacher
Source: pupnp-1.8
Version: 1:1.8.4-2
Severity: important
X-Debbugs-Cc: sramac...@debian.org
With no progress on any of the 4 security bugs, I intend to salvage the
pupnp-1.8 package and bring it back into shape for trixie.
Cheers
--
Sebastian Ramacher
On 2023-04-02 22:06:33 +0200, Sebastian Ramacher wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: m...@packages.debian.org, sramac...@debian.org
> Control: affects -1 + src:mpv
>
> Pl
and is confirmed to
work. In case other changes are required, I can backport those too.
[ Checklist ]
[x] all changes are documented in the d/changelog
[x] I reviewed all changes and I approve them
[x] attach debdiff against the package in testing
unblock mpv/0.35.1-2
Cheers
--
Sebastian Ramacher
On 2023-04-01 10:54:33 +1100, David Bannon wrote:
>
> On 1/4/23 04:34, Sebastian Ramacher wrote:
> > Control: tags -1 moreinfo
> >
> > On 2023-03-30 13:31:28 +1100, David Bannon wrote:
> > > Package: release.debian.org
> > > Severity: normal
> &g
On 2023-03-29 23:27:11 +0200, Maximilian Engelhardt wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: x...@packages.debian.org, m...@daemonizer.de,
> t...@security.debian.org
> Control: affects -1 + src:xen
>
+ (rename-file img-out out-file t
> + ((string-suffix-p ".tikz" out-file)
> + (when (file-exists-p out-file) (delete-file out-file))
> + (with-temp-file out-file
> diff -Nru emacs-28.2+1/debian/patches/series
> emacs-28.2+1/debian/patches/series
> --- emacs-28.2+1/debian/patches/series2023-03-14 15:30:28.0
> -0500
> +++ emacs-28.2+1/debian/patches/series2023-03-31 13:22:32.0
> -0500
> @@ -23,3 +23,6 @@
> 0023-Fix-memory-leak-in-etags.c.patch
> 0024-Fix-quoted-argument-in-emacsclient-mail.desktop-CVE-.patch
> 0025-Fix-code-injection-vulnerability-CVE-2023-27986.patch
> +0026-Gnus-nnml-should-avoid-crashing-on-some-invalid-head.patch
> +0027-Org-Mode-vulnerability-CVE-2023-28617-is-fixed-1-2.patch
> +0028-Org-Mode-vulnerability-CVE-2023-28617-is-fixed-2-2.patch
>
> Thanks
> --
> Rob Browning
> rlb @defaultvalue.org and @debian.org
> GPG as of 2011-07-10 E6A9 DA3C C9FD 1FF8 C676 D2C4 C0F0 39E9 ED1B 597A
> GPG as of 2002-11-03 14DD 432F AE39 534D B592 F9A0 25C8 D377 8C7E 73A4
--
Sebastian Ramacher
On 2023-03-13 19:00:22 +0100, Sebastian Ramacher wrote:
> On 2023-03-13 13:28:47 -0400, Sanford Rockowitz wrote:
> > On 3/13/23 07:42, Sebastian Ramacher wrote:
> > > On 2023-03-13 07:25:41 -0400, Sanford Rockowitz wrote:
> > > > On 3/13/23 05:33, Sebastian Ramacher
uest that the patches
> > you cited are applied to mpv.
> >
> > [#1033595]: <https://bugs.debian.org/1033595>
> >
> > I hope this can be the way to go.
>
> Considering that a bug was filed against mpv, shouldn't this one be
> downgraded? I don't quite see why yt-dlp should be kicked out of
> bookworm because mpv didn't catchup...
grave seems to be an exaggeration for this issue. Both packages still
work.
Cheers
--
Sebastian Ramacher
Control: tags -1 moreinfo
On 2023-03-30 13:31:28 +1100, David Bannon wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
>
>
> Please unblock package tomboy-ng v0.36a
>
> [ Reason ]
> Poor testing on my part lead to the use
1.0.7
> ii mariadb-server-10.5 [virtual-mysql-server] 1:10.5.18-0+deb11u1
>
> -- Configuration Files:
> /etc/sogo/sogo.conf [Errno 13] Permission denied: '/etc/sogo/sogo.conf'
>
> -- no debconf information
--
Sebastian Ramacher
oring-plugins/actions/runs/4531646296/jobs/7982048943?pr=1850
> has a successfull upstream CI test run.
Please go aheah and remove the moreinfo tag once the package is
available in unstable.
Cheers
--
Sebastian Ramacher
Hi Jan
On 2023-03-25 16:58:12 +0100, Jan Wagner wrote:
> Hi Sebastian,
>
> Am 25.03.23 um 10:31 schrieb Sebastian Ramacher:
> > What's the rationale to include these patches? Do they fix bugs reported
> > in the BTS or upstream?
>
> upstream
I was hoping to get so
module to unstable right away
> - upload 2.6.1 from experimental to unstable, then stage 2.6.2 and the
> new DCO in experimental for the second review round
>
> I would prefer the last option.
Let's go ahead with the last option. Please let us know once openvpn
2.6.1 is in unstable.
Cheers
--
Sebastian Ramacher
tlab-runner/shells/shellstest returned exit code 2
make[1]: *** [debian/rules:47: override_dh_auto_build] Error 25
Cheers
--
Sebastian Ramacher
them
[x] attach debdiff against the package in testing
unblock libopenmpt/0.6.9-1
Cheers
--
Sebastian Ramacher
diff -Nru libopenmpt-0.6.8/common/versionNumber.h
libopenmpt-0.6.9/common/versionNumber.h
--- libopenmpt-0.6.8/common/versionNumber.h 2023-01-29 12:59:32.0
+0100
: [PATCH 4/4] check_curl: removed a superflous variable
> +
> +---
> + plugins/check_curl.c | 1 -
> + 1 file changed, 1 deletion(-)
> +
> +diff --git a/plugins/check_curl.c b/plugins/check_curl.c
> +index cc17ef58a..e5be1ad56 100644
> +--- a/plugins/check_curl.c
> b/plugins/check_curl.c
> +@@ -388,7 +388,6 @@ lookup_host (const char *host, char *buf, size_t buflen)
> + size_t addrstr_len;
> + int errcode;
> + void *ptr;
> +- int s;
> + size_t buflen_remaining = buflen - 1;
> +
> + memset (, 0, sizeof (hints));
> diff --git a/debian/patches/15_check_swap_remove_includes
> b/debian/patches/15_check_swap_remove_includes
> new file mode 100644
> index 000..fb65026
> --- /dev/null
> +++ b/debian/patches/15_check_swap_remove_includes
> @@ -0,0 +1,23 @@
> +From 8a8ee58e8925019b7532e7d14ebe488bb21fb3e6 Mon Sep 17 00:00:00 2001
> +From: RincewindsHat <12514511+rincewinds...@users.noreply.github.com>
> +Date: Thu, 16 Mar 2023 15:26:52 +0100
> +Subject: [PATCH] check_swap: Remove unnecessary and problematic includes
> +
> +---
> + plugins/check_swap.c | 3 ---
> + 1 file changed, 3 deletions(-)
> +
> +diff --git a/plugins/check_swap.c b/plugins/check_swap.c
> +index a607da1e9..25d5f21d0 100644
> +--- a/plugins/check_swap.c
> b/plugins/check_swap.c
> +@@ -34,9 +34,6 @@ const char *email = "de...@monitoring-plugins.org";
> + #include "common.h"
> + #include "popen.h"
> + #include "utils.h"
> +-#include
> +-#include
> +-#include
> +
> + #ifdef HAVE_DECL_SWAPCTL
> + # ifdef HAVE_SYS_PARAM_H
> diff --git a/debian/patches/series b/debian/patches/series
> index 7791bb8..3e14114 100644
> --- a/debian/patches/series
> +++ b/debian/patches/series
> @@ -4,3 +4,6 @@
> 10_check_http_chunked_wo_actual_content
> 11_fallback_for_gnutls
> 12_check_curl_improvements
> +13_check_icmp_improvements
> +14_check_curl_fix_SSL_with_multiple_IPs
> +15_check_swap_remove_includes
--
Sebastian Ramacher
On 2023-03-23 09:16:49 +0100, Giuseppe Sacco wrote:
> Hello Sebastian,
>
> Il giorno mer, 22/03/2023 alle 21.18 +0100, Sebastian Ramacher ha scritto:
> > Control: tags -1 moreinfo
> >
> > On 2023-03-21 12:03:30 +0100, Giuseppe Sacco wrote:
> > > Package: relea
t;Received MAM message from %s with unknown query id
> %s, ignoring", message.from.to_string(), query_id ?? "");
> +return true;
> +}
> + Jid? inner_from = null;
> +try {
> +inner_from = new Jid(message_node.get_attribute("from"));
> +} catch (InvalidJidError e) {
> +warning("Received MAM message with invalid from attribute in
> forwarded message from %s, ignoring", message.from.to_string());
> +return true;
> +}
> +if
> (!message.from.equals(stream.get_flag(Bind.Flag.IDENTITY).my_jid.bare_jid) &&
> !message.from.equals_bare(inner_from)) {
> +warning("Received MAM message from %s illegally
> impersonating %s, ignoring", message.from.to_string(),
> inner_from.to_string());
> +return true;
> +}
> +
> message.add_flag(new MessageFlag(message.from, datetime, mam_id,
> query_id));
>
> message.stanza = message_node;
> @@ -124,6 +153,7 @@
> public class Flag : XmppStreamFlag {
> public static FlagIdentity IDENTITY = new
> FlagIdentity(NS_URI, "message_archive_management");
> public bool cought_up { get; set; default=false; }
> +public Gee.Set active_query_ids { get; set; default = new
> HashSet(); }
> public string ns_ver;
>
> public Flag(string ns_ver) {
> diff -Nru dino-im-0.4.1/xmpp-vala/src/module/xep/0402_bookmarks2.vala
> dino-im-0.4.2/xmpp-vala/src/module/xep/0402_bookmarks2.vala
> --- dino-im-0.4.1/xmpp-vala/src/module/xep/0402_bookmarks2.vala
> 2023-03-01 23:30:00.0 +
> +++ dino-im-0.4.2/xmpp-vala/src/module/xep/0402_bookmarks2.vala
> 2023-03-23 18:00:00.0 +
> @@ -68,6 +68,11 @@
> }
>
> private void on_pupsub_item(XmppStream stream, Jid jid, string id,
> StanzaNode? node) {
> +if
> (!jid.equals(stream.get_flag(Bind.Flag.IDENTITY).my_jid.bare_jid)) {
> +warning("Received alleged bookmarks:1 item from %s, ignoring",
> jid.to_string());
> +return;
> +}
> +
> Conference conference = parse_item_node(node, id);
> Flag? flag = stream.get_flag(Flag.IDENTITY);
> if (flag != null) {
> @@ -77,6 +82,11 @@
> }
>
> private void on_pupsub_retract(XmppStream stream, Jid jid, string id) {
> +if
> (!jid.equals(stream.get_flag(Bind.Flag.IDENTITY).my_jid.bare_jid)) {
> +warning("Received alleged bookmarks:1 retract from %s,
> ignoring", jid.to_string());
> +return;
> +}
> +
> try {
> Jid jid_parsed = new Jid(id);
> Flag? flag = stream.get_flag(Flag.IDENTITY);
--
Sebastian Ramacher
t;
>
> --
>
> Mathias Behrle
> PGP/GnuPG key availabable from any keyserver, ID: 0xD6D09BE48405BBF6
> AC29 7E5C 46B9 D0B6 1C71 7681 D6D0 9BE4 8405 BBF6
--
Sebastian Ramacher
-17 20:51:05.00000 +0100
> @@ -54,7 +54,7 @@
>
> override_dh_auto_test:
> ifeq (,$(findstring nocheck,$(DEB_BUILD_OPTIONS)))
> -ifeq (,$(findstring $(DEB_BUILD_ARCH),powerpc ppc64 sparc64 s390x))
> +ifeq (,$(findstring $(DEB_BUILD_ARCH),powerpc ppc64 sparc64 s390x hppa))
> (cd obj-${DEB_HOST_GNU_TYPE}; python3 -m pytest test/) \
> || true
> endif
--
Sebastian Ramacher
re_cookie.domain.must_equal "test.com"
> secure_cookie.path.must_equal "/"
> secure_cookie.secure.must_equal true
> secure_cookie.expires.must_be_nil
> diff -Nru ruby-rack-2.2.4/test/spec_multipart.rb
> ruby-rack-2.2.6.4/test/spec_multipart.rb
> --- ruby-rack-2.2.4/test/spec_multipart.rb2022-07-01 03:48:29.0
> +0530
> +++ ruby-rack-2.2.6.4/test/spec_multipart.rb 2023-03-13 23:37:51.0
> +0530
> @@ -632,6 +632,18 @@
> end
>end
>
> + it "reach a multipart total limit" do
> +begin
> + previous_limit = Rack::Utils.multipart_total_part_limit
> + Rack::Utils.multipart_total_part_limit = 5
> +
> + env = Rack::MockRequest.env_for '/',
> multipart_fixture(:three_files_three_fields)
> + lambda { Rack::Multipart.parse_multipart(env) }.must_raise
> Rack::Multipart::MultipartTotalPartLimitError
> +ensure
> + Rack::Utils.multipart_total_part_limit = previous_limit
> +end
> + end
> +
>it "return nil if no UploadedFiles were used" do
> data = Rack::Multipart.build_multipart("people" => [{ "submit-name" =>
> "Larry", "files" => "contents" }])
> data.must_be_nil
> diff -Nru ruby-rack-2.2.4/test/spec_request.rb
> ruby-rack-2.2.6.4/test/spec_request.rb
> --- ruby-rack-2.2.4/test/spec_request.rb 2022-07-01 03:48:29.0
> +0530
> +++ ruby-rack-2.2.6.4/test/spec_request.rb2023-03-13 23:37:51.0
> +0530
> @@ -1000,7 +1000,7 @@
> f[:tempfile].size.must_equal 76
>end
>
> - it "MultipartPartLimitError when request has too many multipart parts if
> limit set" do
> + it "MultipartPartLimitError when request has too many multipart file parts
> if limit set" do
> begin
>data = 1.times.map { "--AaB03x\r\nContent-Type:
> text/plain\r\nContent-Disposition: attachment; name=#{SecureRandom.hex(10)};
> filename=#{SecureRandom.hex(10)}\r\n\r\ncontents\r\n" }.join("\r\n")
>data += "--AaB03x--\r"
> @@ -1016,6 +1016,22 @@
> end
>end
>
> + it "MultipartPartLimitError when request has too many multipart total
> parts if limit set" do
> +begin
> + data = 1.times.map { "--AaB03x\r\ncontent-type:
> text/plain\r\ncontent-disposition: attachment;
> name=#{SecureRandom.hex(10)}\r\n\r\ncontents\r\n" }.join("\r\n")
> + data += "--AaB03x--\r"
> +
> + options = {
> +"CONTENT_TYPE" => "multipart/form-data; boundary=AaB03x",
> +"CONTENT_LENGTH" => data.length.to_s,
> +:input => StringIO.new(data)
> + }
> +
> + request = make_request Rack::MockRequest.env_for("/", options)
> + lambda { request.POST }.must_raise
> Rack::Multipart::MultipartTotalPartLimitError
> +end
> + end
> +
>it 'closes tempfiles it created in the case of too many created' do
> begin
>data = 1.times.map { "--AaB03x\r\nContent-Type:
> text/plain\r\nContent-Disposition: attachment; name=#{SecureRandom.hex(10)};
> filename=#{SecureRandom.hex(10)}\r\n\r\ncontents\r\n" }.join("\r\n")
--
Sebastian Ramacher
801 - 900 of 5432 matches
Mail list logo