Bug#1036787: unblock: jed/0.99.20~pre.178+dfsg-6

2023-05-25 Thread Rafael Laboissière
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: 1035...@bugs.debian.org, j...@packages.debian.org Control: affects -1 + src:jed Please unblock package jed. The version in unstable fixes the RC bug #1036096. This bug was int

Processed: unblock: jed/0.99.20~pre.178+dfsg-6

2023-05-25 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:jed Bug #1036787 [release.debian.org] unblock: jed/0.99.20~pre.178+dfsg-6 Added indication that 1036787 affects src:jed -- 1036787: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036787 Debian Bug Tracking System Contact ow...@bugs.debian.org w

Re: tomcat9 should not be released with Bookworm

2023-05-25 Thread Markus Koschany
First of all trapperkeeper-webserver-jetty9-clojure should add a build- dependency on logback to detect such regressions in advance. #1036250 is mainly a logback problem, not a tomcat problem. I still would like to hear Emmanuel's opinion. We still could revert to libtomcat9-java, if we don't find

Re: tomcat9 should not be released with Bookworm

2023-05-25 Thread Jérôme Charaoui
Le 2023-05-25 à 17 h 41, Martin Hostettler a écrit : Quoting from J�r�me Charaoui in (#1036250): I did further tests with puppetserver, which is a downstream dependency of trapperkeeper-webserver-jetty9-clojure and unfortunately, the web requests (access) logging remains broken. There are no wa

Re: tomcat9 should not be released with Bookworm

2023-05-25 Thread Martin Hostettler
I was asked to send a update to this bug from my notes/open tabs. >From what i can see this is still a problem and it is getting very late to fix all the fallout. There are still 2 packages that are not fixed for this. src:trapperkeeper-webserver-jetty9-clojure (#1036250) which is as far as I un

closure-compiler: #1036249

2023-05-25 Thread Markus Koschany
Sorry, that should have been #1036249. signature.asc Description: This is a digitally signed message part

closure-compiler: #1036159

2023-05-25 Thread Markus Koschany
Control: tags -1 patch Hello, I have been working on #1036159 and before I go ahead with my solution I would like to hear your opinion whether this is acceptable. Apparently closure-compiler embeds rhino classes and thus every time rhino is updated, closure-compiler must be rebuilt too. I did ju

Bug#1036766: marked as done (unblock: libreoffice/4:7.4.5-3)

2023-05-25 Thread Debian Bug Tracking System
Your message dated Thu, 25 May 2023 21:00:10 + with message-id and subject line unblock libreoffice has caused the Debian Bug report #1036766, regarding unblock: libreoffice/4:7.4.5-3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case

Bug#1035975: marked as done ([pre-approval] unblock: mmdebstrap/1.3.5-X)

2023-05-25 Thread Debian Bug Tracking System
Your message dated Thu, 25 May 2023 19:33:16 + with message-id and subject line unblock mmdebstrap has caused the Debian Bug report #1035975, regarding [pre-approval] unblock: mmdebstrap/1.3.5-X to be marked as done. This means that you claim that the problem has been dealt with. If this is n

Bug#1036720: marked as done (unblock: sxmo-utils/1.12.0-7)

2023-05-25 Thread Debian Bug Tracking System
Your message dated Thu, 25 May 2023 19:04:29 + with message-id and subject line unblock sxmo-utils has caused the Debian Bug report #1036720, regarding unblock: sxmo-utils/1.12.0-7 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it

Bug#1036675: marked as done (unblock: manaplus/2.1.3.17-5)

2023-05-25 Thread Debian Bug Tracking System
Your message dated Thu, 25 May 2023 19:03:44 + with message-id and subject line unblock manaplus has caused the Debian Bug report #1036675, regarding unblock: manaplus/2.1.3.17-5 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it i

Bug#1036772: marked as done (unblock: swtpm/0.7.1-1.3)

2023-05-25 Thread Debian Bug Tracking System
Your message dated Thu, 25 May 2023 19:03:29 + with message-id and subject line unblock swtpm has caused the Debian Bug report #1036772, regarding unblock: swtpm/0.7.1-1.3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now y

Bug#1036741: marked as done (unblock: samba/2:4.17.8+dfsg-2)

2023-05-25 Thread Debian Bug Tracking System
Your message dated Thu, 25 May 2023 19:00:26 + with message-id and subject line unblock samba has caused the Debian Bug report #1036741, regarding unblock: samba/2:4.17.8+dfsg-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is

Bug#1036721: marked as done (unblock: rnp/0.16.3-1)

2023-05-25 Thread Debian Bug Tracking System
Your message dated Thu, 25 May 2023 19:01:55 + with message-id and subject line unblock rnp has caused the Debian Bug report #1036721, regarding unblock: rnp/0.16.3-1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your r

Bug#1036710: marked as done (unblock: reserialize/20220929-2)

2023-05-25 Thread Debian Bug Tracking System
Your message dated Thu, 25 May 2023 19:01:29 + with message-id and subject line unblock reserialize has caused the Debian Bug report #1036710, regarding unblock: reserialize/20220929-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the cas

Bug#1036772: unblock: swtpm/0.7.1-1.3

2023-05-25 Thread Bastian Germann
Package: release.debian.org Control: affects -1 + src:swtpm X-Debbugs-Cc: sw...@packages.debian.org User: release.debian@packages.debian.org Usertags: unblock Severity: normal Please unblock package swtpm. [ Reason ] Fix for RC bugs #1035460 and #1036101. [ Impact ] FTBFS and missing depend

Processed: unblock: swtpm/0.7.1-1.3

2023-05-25 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:swtpm Bug #1036772 [release.debian.org] unblock: swtpm/0.7.1-1.3 Added indication that 1036772 affects src:swtpm -- 1036772: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036772 Debian Bug Tracking System Contact ow...@bugs.debian.org with pro

Bug#1036762: marked as done (unblock: apt/2.6.1)

2023-05-25 Thread Debian Bug Tracking System
Your message dated Thu, 25 May 2023 18:18:16 +0200 with message-id and subject line Re: Bug#1036762: unblock: apt/2.6.1 has caused the Debian Bug report #1036762, regarding unblock: apt/2.6.1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the

Bug#1036164: marked as done (nmu: fcitx5-zhuyin_5.0.11-1)

2023-05-25 Thread Debian Bug Tracking System
Your message dated Thu, 25 May 2023 18:16:26 +0200 with message-id and subject line Re: Bug#1036164: nmu: fcitx5-zhuyin_5.0.11-1 has caused the Debian Bug report #1036164, regarding nmu: fcitx5-zhuyin_5.0.11-1 to be marked as done. This means that you claim that the problem has been dealt with.

Bug#1036766: unblock: libreoffice/4:7.4.5-3

2023-05-25 Thread Rene Engelhard
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: libreoff...@packages.debian.org, t...@security.debian.org Control: affects -1 + src:libreoffice Please unblock package libreoffice [ Reason ] 1. Main reason is CVE-2023-2255 a

Processed: unblock: libreoffice/4:7.4.5-3

2023-05-25 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:libreoffice Bug #1036766 [release.debian.org] unblock: libreoffice/4:7.4.5-3 Added indication that 1036766 affects src:libreoffice -- 1036766: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036766 Debian Bug Tracking System Contact ow...@bugs.d

Bug#1036757: marked as done (unblock: debian-security-support/1:12+2023.05.12)

2023-05-25 Thread Debian Bug Tracking System
Your message dated Thu, 25 May 2023 17:06:20 +0200 with message-id and subject line Re: Bug#1036757: unblock: debian-security-support/1:12+2023.05.12 has caused the Debian Bug report #1036757, regarding unblock: debian-security-support/1:12+2023.05.12 to be marked as done. This means that you cl

Bug#1036762: unblock: apt/2.6.1

2023-05-25 Thread Julian Andres Klode
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: a...@packages.debian.org, juli...@ubuntu.com Control: affects -1 + src:apt Please unblock package apt As requested adding back adduser dep. + Changed the .gitlab-ci and debia

Processed: unblock: apt/2.6.1

2023-05-25 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:apt Bug #1036762 [release.debian.org] unblock: apt/2.6.1 Added indication that 1036762 affects src:apt -- 1036762: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036762 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1036761: unblock: kleborate/2.3.1-2

2023-05-25 Thread Étienne Mollier
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: klebor...@packages.debian.org Control: affects -1 + src:kleborate Please unblock package kleborate [ Reason ] kleborate is affected by the release critical upgrade bug #103674

Processed: unblock: kleborate/2.3.1-2

2023-05-25 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:kleborate Bug #1036761 [release.debian.org] unblock: kleborate/2.3.1-2 Added indication that 1036761 affects src:kleborate -- 1036761: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036761 Debian Bug Tracking System Contact ow...@bugs.debian.or

Processed: unblock: heat-cfntools/1.4.2-3

2023-05-25 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:heat-cfntools Bug #1036759 [release.debian.org] unblock: heat-cfntools/1.4.2-3 Added indication that 1036759 affects src:heat-cfntools -- 1036759: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036759 Debian Bug Tracking System Contact ow...@bu

Bug#1036759: unblock: heat-cfntools/1.4.2-3

2023-05-25 Thread Thomas Goirand
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: heat-cfnto...@packages.debian.org Control: affects -1 + src:heat-cfntools Please unblock package heat-cfntools [ Reason ] The fix packages the missing code of heat-cfntools.

Processed: unblock: cloud-initramfs-tools/0.18.debian13

2023-05-25 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:cloud-initramfs-tools Bug #1036758 [release.debian.org] unblock: cloud-initramfs-tools/0.18.debian13 Added indication that 1036758 affects src:cloud-initramfs-tools -- 1036758: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036758 Debian Bug Tr

Bug#1036758: unblock: cloud-initramfs-tools/0.18.debian13

2023-05-25 Thread Thomas Goirand
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: cloud-initramfs-to...@packages.debian.org Control: affects -1 + src:cloud-initramfs-tools Please unblock package cloud-initramfs-tools [ Reason ] This fixes the path to udevad

Bug#1036757: unblock: debian-security-support/1:12+2023.05.12

2023-05-25 Thread Holger Levsen
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package debian-security-support to update the status of security-support in bookworm. The debdiff is trivial: $ debdiff debian-security-support_12+2023.05.04.dsc debian-secu

Bug#1036753: unblock: debian-science/1.14.5

2023-05-25 Thread Andreas Tille
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: debian-scie...@packages.debian.org, debian-scie...@lists.debian.org Control: affects -1 + src:debian-science Please unblock package debian-science [ Reason ] This is the usua

Processed: unblock: debian-science/1.14.5

2023-05-25 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:debian-science Bug #1036753 [release.debian.org] unblock: debian-science/1.14.5 Added indication that 1036753 affects src:debian-science -- 1036753: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036753 Debian Bug Tracking System Contact ow...@

Bug#1035975: [pre-approval] unblock: mmdebstrap/1.3.5-X

2023-05-25 Thread Luca Boccassi
On Thu, 25 May 2023 at 11:04, Johannes Schauer Marin Rodrigues wrote: > > Hi, > > Quoting Luca Boccassi (2023-05-24 10:52:08) > > Regarding dash, would it be possible for the autopkgtest to support both the > > versions in unstable and experimental, so that it works and you can get it > > unblocke

Bug#1035975: [pre-approval] unblock: mmdebstrap/1.3.5-X

2023-05-25 Thread Johannes Schauer Marin Rodrigues
Hi, Quoting Luca Boccassi (2023-05-24 10:52:08) > Regarding dash, would it be possible for the autopkgtest to support both the > versions in unstable and experimental, so that it works and you can get it > unblocked? yes. The current version in unstable does exactly that. But as the dash unblock

Bug#1035522: debian-security-support 11+2023.05.04 flagged for acceptance

2023-05-25 Thread Holger Levsen
On Wed, May 24, 2023 at 10:05:19PM +0100, Adam D. Barratt wrote: > Great. That's now > https://lists.debian.org/debian-stable-announce/2023/05/msg0.html awesome, thank you! -- cheers, Holger ⢀⣴⠾⠻⢶⣦⠀ ⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org ⢿⡄⠘⠷⠚⠋⠀ OpenPGP:

Bug#1036749: unblock: udm/1.0.0.322-4

2023-05-25 Thread Thorsten Alteholz
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package udm [ Reason ] Due to a recent change in lazarus, the package could no longer be built. [ Impact ] The user would not be able to build the package. [ Tests ] As th

Bug#1036748: unblock: libricohcamerasdk/1.1.0-4

2023-05-25 Thread Thorsten Alteholz
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package libricohcamerasdk [ Reason ] Due to some magic in debhelper/ldconfig a link to nowhere remained on the computer. This link will be removed in postinst/postrm now.

Bug#1036747: unblock: osmo-iuh/1.3.0+dfsg1-5

2023-05-25 Thread Thorsten Alteholz
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package osmo-iuh [ Reason ] The current version has a superficial autopkgtest that failed. The new version still has a superficial autopkgtest but this no longer fails. [ I

Bug#1036745: unblock: qtbase-opensource-src-gles/5.15.8+dfsg-3

2023-05-25 Thread Dmitry Shachnev
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: qtbase-opensource-src-g...@packages.debian.org Control: affects -1 + src:qtbase-opensource-src-gles Please unblock package qtbase-opensource-src-gles. [ Reason ] * Fixes for t

Processed: unblock: qtbase-opensource-src-gles/5.15.8+dfsg-3

2023-05-25 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:qtbase-opensource-src-gles Bug #1036745 [release.debian.org] unblock: qtbase-opensource-src-gles/5.15.8+dfsg-3 Added indication that 1036745 affects src:qtbase-opensource-src-gles -- 1036745: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=10367