Bug#1035522: debian-security-support 11+2023.05.04 flagged for acceptance

2023-05-24 Thread Adam D. Barratt
On Tue, 2023-05-23 at 19:34 +, Holger Levsen wrote: > On Tue, May 23, 2023 at 05:44:30PM +0100, Adam D. Barratt wrote: > > In the interests of not blocking on things other than SRM's free > > time, > > how does this sound as some blurb for an announcement mail? > >

Bug#1036557: marked as done (unblock: debian-med/3.8.1)

2023-05-24 Thread Debian Bug Tracking System
Your message dated Wed, 24 May 2023 20:07:58 + with message-id and subject line unblock debian-med has caused the Debian Bug report #1036557, regarding unblock: debian-med/3.8.1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case

Bug#1036474: unblock: debian-edu-fai/2023.05.16.1

2023-05-24 Thread Paul Gevers
control: tags -1 moreinfo Hi Mike, On 21-05-2023 21:38, Mike Gabriel wrote: In addition to the adduser changes, the diff to testing also includes a simple directory-exists test before writing to it. See below, I see more. Please elaborate. + * bin/debian-edu-faiinstall: Make sure

Processed: Re: Bug#1036474: unblock: debian-edu-fai/2023.05.16.1

2023-05-24 Thread Debian Bug Tracking System
Processing control commands: > tags -1 moreinfo Bug #1036474 [release.debian.org] unblock: debian-edu-fai/2023.05.16.1 Added tag(s) moreinfo. -- 1036474: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036474 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1035710: unblock: doc-debian/11.3

2023-05-23 Thread Joost van Baal-Ilić
Hi Luca, On Wed, May 24, 2023 at 12:04:57AM +0100, Luca Boccassi wrote: > Control: retitle -1 unblock: doc-debian/11.3+nmu1 > Control: tags -1 -moreinfo > > On Tue, 23 May 2023 23:37:23 +0100 Luca Boccassi > wrote: > > On Tue, 23 May 2023 06:46:19 +0200 Joost van =?utf-

Bug#1035710: unblock: doc-debian/11.3

2023-05-23 Thread Luca Boccassi
Control: retitle -1 unblock: doc-debian/11.3+nmu1 Control: tags -1 -moreinfo On Tue, 23 May 2023 23:37:23 +0100 Luca Boccassi wrote: > On Tue, 23 May 2023 06:46:19 +0200 Joost van =?utf-8?Q?Baal- Ili=C4=87?= > wrote: > > On Sat, May 20, 2023 at 04:21:47PM +0200, Sebastian Ra

Processed: Re: Bug#1035710: unblock: doc-debian/11.3

2023-05-23 Thread Debian Bug Tracking System
Processing control commands: > retitle -1 unblock: doc-debian/11.3+nmu1 Bug #1035710 [release.debian.org] unblock: doc-debian/11.3 Changed Bug title to 'unblock: doc-debian/11.3+nmu1' from 'unblock: doc-debian/11.3'. > tags -1 -moreinfo Bug #1035710 [release.debian.org] unblock: doc-debia

Bug#1035710: unblock: doc-debian/11.3

2023-05-23 Thread Luca Boccassi
On Tue, 23 May 2023 06:46:19 +0200 Joost van =?utf-8?Q?Baal-Ili=C4=87?= wrote: > On Sat, May 20, 2023 at 04:21:47PM +0200, Sebastian Ramacher wrote: > > > On 2023-05-14 06:47:18 +0200, Joost van Baal-Ilić wrote: > > > reopen 1035710 > > > retitle 1035710 unblock

Bug#1035522: debian-security-support 11+2023.05.04 flagged for acceptance

2023-05-23 Thread Holger Levsen
On Tue, May 23, 2023 at 05:44:30PM +0100, Adam D. Barratt wrote: > In the interests of not blocking on things other than SRM's free time, > how does this sound as some blurb for an announcement mail? > > ==== > The debian-security-support package tracks the level of s

Bug#1035522: debian-security-support 11+2023.05.04 flagged for acceptance

2023-05-23 Thread Adam D. Barratt
e into the proposed-updates queue for Debian bullseye. > > > > thanks! how/when will it moved/be moved to bullseye-updates? > [...] > I'm hoping to find time to look at it over the weekend, but that > depends a little on what life thinks of the idea. > Life has very much

Bug#1035522: bullseye-pu: package debian-security-support/1:11+2023.05.04

2023-05-23 Thread Adam D. Barratt
On Fri, 2023-05-19 at 13:57 +, Holger Levsen wrote: > On Thu, May 18, 2023 at 02:44:01PM +0100, Adam D. Barratt wrote: > > > ic. so I should have uploaded to bullseye-proposed-updates > > > instead? > > Any upload goes to p-u first, yeah. So the target should always be > > simply "bullseye",

Bug#1035710: unblock: doc-debian/11.3

2023-05-22 Thread Joost van Baal-Ilić
On Sat, May 20, 2023 at 04:21:47PM +0200, Sebastian Ramacher wrote: > On 2023-05-14 06:47:18 +0200, Joost van Baal-Ilić wrote: > > reopen 1035710 > > retitle 1035710 unblock: doc-debian/11.3 > > thanks > > > > Please unblock package doc-debian > > &g

Processed: unblock: debian-med/3.8.1

2023-05-22 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:debian-med Bug #1036557 [release.debian.org] unblock: debian-med/3.8.1 Added indication that 1036557 affects src:debian-med -- 1036557: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036557 Debian Bug Tracking System Contact

Bug#1036557: unblock: debian-med/3.8.1

2023-05-22 Thread Andreas Tille
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: debian-...@packages.debian.org, debian-...@lists.debian.org Control: affects -1 + src:debian-med Please unblock package debian-med [ Reason ] This is the final update

Bug#1036474: unblock: debian-edu-fai/2023.05.16.1

2023-05-21 Thread Mike Gabriel
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package debian-edu-fai [ Reason ] In the context of #1035654, a few source packages (including this one) still fail to purge remove without adduser installed. [ Impact

Processed: Re: Bug#1035710: unblock: doc-debian/11.3

2023-05-21 Thread Debian Bug Tracking System
Processing control commands: > tags -1 confirmed Bug #1035710 [release.debian.org] unblock: doc-debian/11.3 Added tag(s) confirmed. -- 1035710: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035710 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1035710: unblock: doc-debian/11.3

2023-05-21 Thread Luca Boccassi
Control: tags -1 confirmed On Sat, 20 May 2023 16:21:47 +0200 Sebastian Ramacher wrote: > Control: tags -1 moreinfo cofnirmed > > On 2023-05-14 06:47:18 +0200, Joost van Baal-Ilić wrote: > > reopen 1035710 > > retitle 1035710 unblock: doc-debian/11.3 > > thanks >

Processed (with 1 error): Re: Bug#1035710: unblock: doc-debian/11.3

2023-05-20 Thread Debian Bug Tracking System
ock: doc-debian/11.3 Added tag(s) moreinfo. -- 1035710: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035710 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1035710: unblock: doc-debian/11.3

2023-05-20 Thread Sebastian Ramacher
Control: tags -1 moreinfo cofnirmed On 2023-05-14 06:47:18 +0200, Joost van Baal-Ilić wrote: > reopen 1035710 > retitle 1035710 unblock: doc-debian/11.3 > thanks > > Please unblock package doc-debian > > [ Reason ] > The doc-debian package claims to ship the Constitutio

Bug#1035522: debian-security-support 11+2023.05.04 flagged for acceptance

2023-05-19 Thread Holger Levsen
also help with what's left to do, though now I'm not sure there's much I can help with. Thank you! -- cheers, Holger ⢀⣴⠾⠻⢶⣦⠀ ⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org ⢿⡄⠘⠷⠚⠋⠀ OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C ⠈⠳⣄ If a monkey hoarded more bananas th

Bug#1035522: bullseye-pu: package debian-security-support/1:11+2023.05.04

2023-05-19 Thread Holger Levsen
stable-updates`` should target their suite name in + the changelog as usual, e.g. ``bullseye``. -- cheers, Holger ⢀⣴⠾⠻⢶⣦⠀ ⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org ⢿⡄⠘⠷⠚⠋⠀ OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C ⠈⠳⣄ In a world where you can be anything, b

Bug#1035522: bullseye-pu: package debian-security-support/1:11+2023.05.04

2023-05-19 Thread Holger Levsen
n.org/doc/manuals/developers-reference/developers-reference.en.html#special-case-the-stable-updates-suite -- cheers, Holger ⢀⣴⠾⠻⢶⣦⠀ ⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org ⢿⡄⠘⠷⠚⠋⠀ OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C ⠈⠳⣄ If a monkey hoarded mor

Bug#1035522: debian-security-support 11+2023.05.04 flagged for acceptance

2023-05-19 Thread Adam D. Barratt
On Fri, 2023-05-19 at 13:11 +, Holger Levsen wrote: > On Thu, May 18, 2023 at 07:51:36PM +, Adam D Barratt wrote: > > The upload referenced by this bug report has been flagged for > > acceptance into the proposed-updates queue for Debian bullseye. > > thanks! h

Bug#1035522: debian-security-support 11+2023.05.04 flagged for acceptance

2023-05-19 Thread Holger Levsen
On Thu, May 18, 2023 at 07:51:36PM +, Adam D Barratt wrote: > The upload referenced by this bug report has been flagged for acceptance into > the proposed-updates queue for Debian bullseye. thanks! how/when will it moved/be moved to bullseye-updates? -- cheers,

Processed: debian-security-support 11+2023.05.04 flagged for acceptance

2023-05-18 Thread Debian Bug Tracking System
llseye-pu: package debian-security-support/1:11+2023.05.04 Added tag(s) pending; removed tag(s) confirmed. > thanks Stopping processing here. Please contact me if you need assistance. -- 1035522: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035522 Debian Bug Tracking System C

Bug#1035522: debian-security-support 11+2023.05.04 flagged for acceptance

2023-05-18 Thread Adam D Barratt
package release.debian.org tags 1035522 = bullseye pending thanks Hi, The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian bullseye. Thanks for your contribution! Upload details == Package: debian-security-support

Re: Fwd: Re: Debian 8.3 Jessie KEYEXPIRED 11645052400

2023-05-18 Thread Stephan Verbücheln
Set the clock on the affected system to a date before the key was expired. Example: # faketime 2019-05-01 apt update # faketime 2019-05-01 apt upgrade and so on ... Please note that 1024-bit DSA keys are no longer considered secure. Maybe better remove the MySQL stuff and add it back later.

Bug#1035522: bullseye-pu: package debian-security-support/1:11+2023.05.04

2023-05-18 Thread Adam D. Barratt
On Thu, 2023-05-18 at 09:22 +, Holger Levsen wrote: > On Thu, May 18, 2023 at 06:44:18AM +0100, Adam D. Barratt wrote: > > On Thu, 2023-05-18 at 00:44 +, Holger Levsen wrote: > > > debian-security-support (1:11+2023.05.04) bullseye-updates; > > > urgency=mediu

Bug#1035522: bullseye-pu: package debian-security-support/1:11+2023.05.04

2023-05-18 Thread Holger Levsen
On Thu, May 18, 2023 at 06:44:18AM +0100, Adam D. Barratt wrote: > On Thu, 2023-05-18 at 00:44 +, Holger Levsen wrote: > > debian-security-support (1:11+2023.05.04) bullseye-updates; > > urgency=medium > Hmmm. I didn't expect that would work, although apparently

Re: Fwd: Re: Debian 8.3 Jessie KEYEXPIRED 11645052400

2023-05-18 Thread Jonathan Wiltshire
not limited to: 1. Downloading it on another PC and transferring the file 2. Dropping the https (but you break the trust path) 3. Downloading the key manually using the fingerprint and apt-key (you take on the responsibility of verification) 4. Updating your sources to stretch anyway, and installing the

Bug#1035522: bullseye-pu: package debian-security-support/1:11+2023.05.04

2023-05-17 Thread Adam D. Barratt
On Thu, 2023-05-18 at 00:44 +, Holger Levsen wrote: > debian-security-support (1:11+2023.05.04) bullseye-updates; > urgency=medium > Hmmm. I didn't expect that would work, although apparently it did, at least for the package to get as far as stable-new. I'm hoping dak also dtrt fo

Bug#1035522: bullseye-pu: package debian-security-support/1:11+2023.05.04

2023-05-17 Thread Holger Levsen
ted > in stable. yes, that part I am and was familar with. Less clear was ${distro}-updates, which thankfully got resolved through this bug. I think. ;) > In any case, please go ahead. thanks, done so now with this changelog: debian-security-support (1:11+2023.05.04) bullseye-updates; ur

Re: Fwd: Re: Debian 8.3 Jessie KEYEXPIRED 11645052400

2023-05-17 Thread Alan Homobono
Why and what time? Em 17/05/2023 18:46, Stephan Verbücheln escreveu: On Wed, 2023-05-17 at 18:00 -0300, Alan Homobono wrote: Any other suggestions? Have you tried setting the clock to the past (or using faketime)? Regards Stephan -- Atte., ALAN HOMOBONO Analista de TI - Suporte a

Re: Fwd: Re: Debian 8.3 Jessie KEYEXPIRED 11645052400

2023-05-17 Thread Stephan Verbücheln
On Wed, 2023-05-17 at 18:00 -0300, Alan Homobono wrote: > Any other suggestions? Have you tried setting the clock to the past (or using faketime)? Regards Stephan signature.asc Description: This is a digitally signed message part

Fwd: Re: Debian 8.3 Jessie KEYEXPIRED 11645052400

2023-05-17 Thread Alan Homobono
Mensagem original Assunto: Re: Debian 8.3 Jessie KEYEXPIRED 11645052400 Data: 17/05/2023 17:46 De: Alan Homobono Para: Jonathan Wiltshire Hi Jonathan, Unsuccessful: # wget https://archive.debian.org/debian/pool/main/d/debian-archive-keyring/debian-archive-keyring_2017.5

Bug#1036146: RM: wfmath/bullseye -- ROM; unstable upstream, unsuitable for Debian

2023-05-15 Thread Olek Wojnar
cyphesis-cpp and the client ember, were never part of bullseye due to this instability and the age of the previous stable release. As the Debian maintainer for all of the WorldForge packages, I feel it is best to also remove the supporting libraries which are not used in any other projects

Bug#1036145: RM: varconf/bullseye -- ROM; unstable upstream, unsuitable for Debian

2023-05-15 Thread Olek Wojnar
cyphesis-cpp and the client ember, were never part of bullseye due to this instability and the age of the previous stable release. As the Debian maintainer for all of the WorldForge packages, I feel it is best to also remove the supporting libraries which are not used in any other projects

Bug#1036143: RM: mercator/bullseye -- ROM; unstable upstream, unsuitable for Debian

2023-05-15 Thread Olek Wojnar
cyphesis-cpp and the client ember, were never part of bullseye due to this instability and the age of the previous stable release. As the Debian maintainer for all of the WorldForge packages, I feel it is best to also remove the supporting libraries which are not used in any other projects

Bug#1036144: RM: skstream/bullseye -- ROM; unstable upstream, unsuitable for Debian

2023-05-15 Thread Olek Wojnar
cyphesis-cpp and the client ember, were never part of bullseye due to this instability and the age of the previous stable release. As the Debian maintainer for all of the WorldForge packages, I feel it is best to also remove the supporting libraries which are not used in any other projects

Bug#1036142: RM: libwfut/bullseye -- ROM; unstable upstream, unsuitable for Debian

2023-05-15 Thread Olek Wojnar
cyphesis-cpp and the client ember, were never part of bullseye due to this instability and the age of the previous stable release. As the Debian maintainer for all of the WorldForge packages, I feel it is best to also remove the supporting libraries which are not used in any other projects

Bug#1036141: RM: eris/bullseye -- ROM; unstable upstream, unsuitable for Debian

2023-05-15 Thread Olek Wojnar
cyphesis-cpp and the client ember, were never part of bullseye due to this instability and the age of the previous stable release. As the Debian maintainer for all of the WorldForge packages, I feel it is best to also remove the supporting libraries which are not used in any other projects

Bug#1036140: RM: ember-media/bullseye -- ROM; unstable upstream, unsuitable for Debian

2023-05-15 Thread Olek Wojnar
cyphesis-cpp and the client ember, were never part of bullseye due to this instability and the age of the previous stable release. As the Debian maintainer for all of the WorldForge packages, I feel it is best to also remove the supporting libraries which are not used in any other projects

Bug#1036139: RM: atlas-cpp/bullseye -- ROM; unstable upstream, unsuitable for Debian

2023-05-15 Thread Olek Wojnar
cyphesis-cpp and the client ember, were never part of bullseye due to this instability and the age of the previous stable release. As the Debian maintainer for all of the WorldForge packages, I feel it is best to also remove the supporting libraries which are not used in any other projects

Bug#1036039: marked as done (unblock: debian-games/5)

2023-05-14 Thread Debian Bug Tracking System
Your message dated Sun, 14 May 2023 18:34:41 + with message-id and subject line unblock debian-games has caused the Debian Bug report #1036039, regarding unblock: debian-games/5 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case

Re: Debian 8.3 Jessie KEYEXPIRED 11645052400

2023-05-14 Thread Jonathan Wiltshire
On Sat, May 13, 2023 at 12:56:45AM -0300, Alan Homobono wrote: > Trying to upgrade Debian 8.3 Jessie to Debian 10.13 Buster, I continue > getting "KEYEXPIRED" error message after run apt-get update, even > renewing expired keys: # wget https://archive.debian.org/debian/pool/ma

Bug#1036046: bullseye-pu: package debian-parl/1.9.27+deb11u1

2023-05-14 Thread Andreas Beckmann
Followup-For: Bug #1036046 diff --git a/debian/changelog b/debian/changelog index 3e541dc..632788c 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,11 @@ +debian-parl (1.9.27+deb11u1) bullseye; urgency=medium + + * rebuild using newer boxer-data ++ stop include lightning

Processed: bullseye-pu: package debian-parl/1.9.27+deb11u1

2023-05-14 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:debian-parl Bug #1036046 [release.debian.org] bullseye-pu: package debian-parl/1.9.27+deb11u1 Added indication that 1036046 affects src:debian-parl > block 1035344 with -1 Bug #1035344 [parl-desktop] parl-desktop: depends on no longer insta

Bug#1036046: bullseye-pu: package debian-parl/1.9.27+deb11u1

2023-05-14 Thread Andreas Beckmann
debian-parl needs to be rebuilt against newer boxer-data to drop dependencies on packages lo longer built by src:thunderbird, e.g. lightning. Currently design-parl* are uninstallable in bullseye. Effective binary debdiff caused by this rebuild: $ debdiff parl-desktop_1.9.27_all.deb parl

Bug#1036044: bullseye-pu: package debian-design/3.0.22+deb11u1

2023-05-14 Thread Andreas Beckmann
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu debian-design needs to be rebuilt against newer boxer-data to drop dependencies on packages lo longer built by src:thunderbird, e.g. lightning. Currently design-desktop

Bug#1036039: unblock: debian-games/5

2023-05-14 Thread Markus Koschany
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: a...@debian.org Please unblock package debian-games [ Reason ] debian-games is a Debian Blend and a collection of metapackages. debian-games' purpose is to recommend

Processed: unblock: doc-debian/11.3

2023-05-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reopen 1035710 Bug #1035710 {Done: Joost van Baal-Ilić } [release.debian.org] unblock: doc-debian/11.1 Bug reopened Ignoring request to alter fixed versions of bug #1035710 to the same values previously set > retitle 1035710 unblock: doc-

Debian 8.3 Jessie KEYEXPIRED 11645052400

2023-05-13 Thread Samuel Henrique
Hello, On Sat, May 13, 2023, 11:31 Pierre-Elliott Bécue wrote: > > The only way to avoid that would be to first add stretch to your > sources.list, update, install debian-archive-keyring, and then add > buster to your sources.list. > By the way, this is the recommended approac

Re: Debian 8.3 Jessie KEYEXPIRED 11645052400

2023-05-13 Thread Pierre-Elliott Bécue
Alan Homobono wrote on 13/05/2023 at 05:56:45+0200: > Trying to upgrade Debian 8.3 Jessie to Debian 10.13 Buster, I continue > getting "KEYEXPIRED" error message after run apt-get update, even renewing > expired keys: > > # apt-key list | grep -A 1 expired >

Debian 8.3 Jessie KEYEXPIRED 11645052400

2023-05-12 Thread Alan Homobono
Trying to upgrade Debian 8.3 Jessie to Debian 10.13 Buster, I continue getting "KEYEXPIRED" error message after run apt-get update, even renewing expired keys: # apt-key list | grep -A 1 expired pub 1024D/5072E1F5 2003-02-03 [expired: 2022-02-16] uid MyS

Bug#1035522: bullseye-pu: package debian-security-support/1:11+2023.05.04

2023-05-12 Thread Adam D. Barratt
On Thu, May 04, 2023 at 07:50:37PM +0200, Holger Levsen wrote: > > this is a pre-approval request, I have not uploaded this yet > > (except to > > unstable). > > the package has migrated to bookworm now. > > > [ Reason ] > > > > unfort

Processed: Re: Bug#1035522: bullseye-pu: package debian-security-support/1:11+2023.05.04

2023-05-12 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #1035522 [release.debian.org] bullseye-pu: package debian-security-support/1:11+2023.05.04 Added tag(s) confirmed. -- 1035522: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035522 Debian Bug Tracking System Contact

Bug#1035522: bullseye-pu: package debian-security-support/1:11+2023.05.04

2023-05-12 Thread Holger Levsen
hi, friendly ping on this. On Thu, May 04, 2023 at 07:50:37PM +0200, Holger Levsen wrote: > this is a pre-approval request, I have not uploaded this yet (except to > unstable). the package has migrated to bookworm now. > [ Reason ] > > unfortunatly debian-security-support i

Bug#1035977: marked as done (unblock: maven-debian-helper/2.6.3)

2023-05-12 Thread Debian Bug Tracking System
Your message dated Fri, 12 May 2023 08:10:33 + with message-id and subject line unblock maven-debian-helper has caused the Debian Bug report #1035977, regarding unblock: maven-debian-helper/2.6.3 to be marked as done. This means that you claim that the problem has been dealt

Processed: unblock: maven-debian-helper/2.6.3

2023-05-12 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:maven-debian-helper Bug #1035977 [release.debian.org] unblock: maven-debian-helper/2.6.3 Added indication that 1035977 affects src:maven-debian-helper -- 1035977: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035977 Debian Bug Tracking Sys

Bug#1035977: unblock: maven-debian-helper/2.6.3

2023-05-12 Thread Emmanuel Bourg
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: maven-debian-hel...@packages.debian.org Control: affects -1 + src:maven-debian-helper Please unblock package maven-debian-helper This update is required to fix the build

Bug#1035710: closing / Re: unblock: doc-debian/11.1

2023-05-11 Thread Joost van Baal-Ilić
. Sorry for the noise. Bye, Joost [11.2] https://tracker.debian.org/news/1430982/accepted-doc-debian-112-source-into-experimental/

Bug#1035710: Bug#1035913: doc-debian 11.0 changed /usr/share/doc-base/ paths

2023-05-11 Thread Joost van Baal-Ilić
tnx, i'm now preparing a new doc-debian targetted for bookworm with only minimal changes. will have a closer look at this issue soonish (likely today). sorry for this hassle. Bye, Joost On Thu, May 11, 2023 at 08:23:17AM +0200, Johannes Schauer Marin Rodrigues wrote: > Package: doc-deb

Bug#1035710: doc-debian 11.0 changed /usr/share/doc-base/ paths

2023-05-11 Thread Johannes Schauer Marin Rodrigues
Package: doc-debian Version: 11.0 Severity: normal Hi, On Mon, 8 May 2023 07:46:09 +0200 Joost van =?utf-8?Q?Baal-Ili=C4=87?= wrote: > [ Risks ] None. The doc-debian package is a key package due to Priority: > standard. It acts as a leaf package: Its only true reverse depends is the

Bug#1035524: marked as done (unblock: debian-security-support/1:12+2023.05.04)

2023-05-06 Thread Debian Bug Tracking System
Your message dated Sat, 06 May 2023 12:48:30 + with message-id and subject line unblock debian-security-support has caused the Debian Bug report #1035524, regarding unblock: debian-security-support/1:12+2023.05.04 to be marked as done. This means that you claim that the problem has been

Bug#1035560: marked as done (unblock: calamares-settings-debian/12.0.9-1)

2023-05-05 Thread Debian Bug Tracking System
Your message dated Fri, 5 May 2023 17:27:20 +0200 with message-id <20230505152720.3br25wftf5ihb...@mraw.org> and subject line Re: Bug#1035560: unblock: calamares-settings-debian/12.0.9-1 has caused the Debian Bug report #1035560, regarding unblock: calamares-settings-debian/12.0.9-1 to be

Bug#1035560: unblock: calamares-settings-debian/12.0.9-1

2023-05-05 Thread Jonathan Carter
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: calamares-settings-deb...@packages.debian.org, k...@debian.org Control: affects -1 + src:calamares-settings-debian Please unblock package calamares-settings-debian [ Reason

Processed: unblock: calamares-settings-debian/12.0.9-1

2023-05-05 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:calamares-settings-debian Bug #1035560 [release.debian.org] unblock: calamares-settings-debian/12.0.9-1 Added indication that 1035560 affects src:calamares-settings-debian -- 1035560: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035

Bug#1035522: bullseye-pu: package debian-security-support/1:11+2023.05.04

2023-05-04 Thread Holger Levsen
unstable (thus trixie) and those two bugs in To: are to get the fix into bullseye and bookworm.) -- cheers, Holger ⢀⣴⠾⠻⢶⣦⠀ ⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org ⢿⡄⠘⠷⠚⠋⠀ OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C ⠈⠳⣄ Das Leben ist schön. Von 'einfach' w

Bug#1035524: unblock: debian-security-support/1:12+2023.05.04

2023-05-04 Thread Holger Levsen
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package debian-security-support to fix #1034077 "debian-security-support: Lots of noise about DEBIAN_VERSION 12 being invalid when upgrading bullseye→bookworm" i

Bug#1035522: bullseye-pu: package debian-security-support/1:11+2023.05.04

2023-05-04 Thread Holger Levsen
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu hi, this is a pre-approval request, I have not uploaded this yet (except to unstable). [ Reason ] unfortunatly debian-security-support in both bullseye and bookworm

Bug#1035357: marked as done (unblock: calamares-settings-debian/12.0.5-2)

2023-05-03 Thread Debian Bug Tracking System
Your message dated Wed, 03 May 2023 20:52:54 + with message-id and subject line unblock calamares-settings-debian has caused the Debian Bug report #1035357, regarding unblock: calamares-settings-debian/12.0.5-2 to be marked as done. This means that you claim that the problem has been dealt

Bug#1035357: unblock: calamares-settings-debian/12.0.5-2

2023-05-03 Thread Sebastian Ramacher
On 2023-05-01 20:05:58 +0200, Jonathan Carter wrote: > Package: release.debian.org > Severity: normal > User: release.debian@packages.debian.org > Usertags: unblock > X-Debbugs-Cc: calamares-settings-deb...@packages.debian.org > Control: affects -1 + src:calamares-settings-

Re: Updated Debian 11: 11.7 released

2023-05-02 Thread Ghislaine Foltête
Hello, please unsuscribe me from this list. Thank you - Mail original - De: "Ana Guerrero Lopez" À: debian-annou...@lists.debian.org Envoyé: Lundi 1 Mai 2023 22:46:41 Objet: Updated Debian 11: 11.

Processed: unblock: calamares-settings-debian/12.0.5-2

2023-05-01 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:calamares-settings-debian Bug #1035357 [release.debian.org] unblock: calamares-settings-debian/12.0.5-2 Added indication that 1035357 affects src:calamares-settings-debian -- 1035357: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035

Bug#1035357: unblock: calamares-settings-debian/12.0.5-2

2023-05-01 Thread Jonathan Carter
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: calamares-settings-deb...@packages.debian.org Control: affects -1 + src:calamares-settings-debian Please unblock package calamares-settings-debian This change re-enables os

Bug#1035309: marked as done (unblock: debian-cd/3.2.1)

2023-05-01 Thread Debian Bug Tracking System
Your message dated Mon, 01 May 2023 09:12:44 + with message-id and subject line unblock debian-cd has caused the Debian Bug report #1035309, regarding unblock: debian-cd/3.2.1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case

Bug#1035309: unblock: debian-cd/3.2.1

2023-04-30 Thread Cyril Brulebois
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: debian...@lists.debian.org Hi, [ Reason ] [ Impact ] While not absolutely needed to have in bookworm, it looks like a good idea to ship the tooling that's making the release

Bug#1035087: marked as done (unblock: debian-archive-keyring/2023.3)

2023-04-30 Thread Debian Bug Tracking System
Your message dated Sun, 30 Apr 2023 08:23:52 +0200 with message-id and subject line Re: Bug#1035087: unblock: debian-archive-keyring/2023.3 has caused the Debian Bug report #1035087, regarding unblock: debian-archive-keyring/2023.3 to be marked as done. This means that you claim that the problem

Bug#1035087: unblock: debian-archive-keyring/2023.3

2023-04-29 Thread Jonathan Wiltshire
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: debian-archive-keyr...@packages.debian.org, j...@debian.org Control: affects -1 + src:debian-archive-keyring Please unblock package debian-archive-keyring [ Reason ] Users

Processed: unblock: debian-archive-keyring/2023.3

2023-04-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:debian-archive-keyring Bug #1035087 [release.debian.org] unblock: debian-archive-keyring/2023.3 Added indication that 1035087 affects src:debian-archive-keyring -- 1035087: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035087 Debian

Bug#1033157: marked as done (bullseye-pu: package debian-archive-keyring/2021.1.1+deb11u1)

2023-04-29 Thread Debian Bug Tracking System
Your message dated Sat, 29 Apr 2023 10:54:14 +0100 with message-id <502b8fb37ece620c9723446611a9287974ba5a0c.ca...@adam-barratt.org.uk> and subject line Closing p-u requests for fixes included in 11.7 has caused the Debian Bug report #1033157, regarding bullseye-pu: package debian-archive-k

Bug#1030732: marked as done (bullseye-pu: package debian-ports-archive-keyring/2023.02.01~deb11u1)

2023-04-29 Thread Debian Bug Tracking System
Your message dated Sat, 29 Apr 2023 10:54:14 +0100 with message-id <502b8fb37ece620c9723446611a9287974ba5a0c.ca...@adam-barratt.org.uk> and subject line Closing p-u requests for fixes included in 11.7 has caused the Debian Bug report #1030732, regarding bullseye-pu: package debian-ports-a

Re: Inquiry about Debian Rootfs Construction

2023-04-18 Thread Paul Wise
On Thu, 2023-03-30 at 08:41 +0200, Paul Gevers wrote: > That is not the responsibility of this team. I'm also not sure what you > mean with rootfs, but I think you mean how to bootstrap Debian. We have > several tools in Debian that do that. I *think* debootstrap [1] is the &

Re: Inquiry about Debian Rootfs Construction

2023-04-18 Thread z Spring
> On Mar 30, 2023, at 14:41, Paul Gevers wrote: > > Hi, > >> On 29-03-2023 04:06, z Spring wrote: >>I hope this message finds you well. I am writing to inquire about the >> construction of Debian Rootfs. I was wondering if you could kindly provide >&g

Bug#1034400: marked as done (unblock: debian-edu-config/2.12.32)

2023-04-15 Thread Debian Bug Tracking System
Your message dated Sat, 15 Apr 2023 08:36:13 + with message-id and subject line unblock debian-edu-config has caused the Debian Bug report #1034400, regarding unblock: debian-edu-config/2.12.32 to be marked as done. This means that you claim that the problem has been dealt

Bug#1034400: unblock: debian-edu-config/2.12.32

2023-04-14 Thread Holger Levsen
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package debian-edu-config, which is a key package and thus needs unblocking. All autopkgtests are successful and the package has been in unstable since 17 days. The update

Bug#1033932: marked as done (unblock: calamares-settings-debian/10.0.5-2)

2023-04-04 Thread Debian Bug Tracking System
Your message dated Tue, 04 Apr 2023 21:25:56 + with message-id and subject line unblock calamares-settings-debian has caused the Debian Bug report #1033932, regarding unblock: calamares-settings-debian/10.0.5-2 to be marked as done. This means that you claim that the problem has been dealt

Bug#1033932: unblock: calamares-settings-debian/10.0.5-2

2023-04-04 Thread Jonathan Carter
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: calamares-settings-deb...@packages.debian.org Control: affects -1 + src:calamares-settings-debian Please unblock package calamares-settings-debian This addresses serious bug

Processed: unblock: calamares-settings-debian/10.0.5-2

2023-04-04 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:calamares-settings-debian Bug #1033932 [release.debian.org] unblock: calamares-settings-debian/10.0.5-2 Added indication that 1033932 affects src:calamares-settings-debian -- 1033932: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033

Bug#1033687: marked as done (unblock: debian-pan/0.4)

2023-04-02 Thread Debian Bug Tracking System
Your message dated Sun, 02 Apr 2023 19:50:47 + with message-id and subject line unblock debian-pan has caused the Debian Bug report #1033687, regarding unblock: debian-pan/0.4 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case

Processed: debian-archive-keyring 2021.1.1+deb11u1 flagged for acceptance

2023-04-01 Thread Debian Bug Tracking System
llseye-pu: package debian-archive-keyring/2021.1.1+deb11u1 Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 1033157: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033157 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1033157: debian-archive-keyring 2021.1.1+deb11u1 flagged for acceptance

2023-04-01 Thread Adam D Barratt
package release.debian.org tags 1033157 = bullseye pending thanks Hi, The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian bullseye. Thanks for your contribution! Upload details == Package: debian-archive-keyring

Re: Inquiry about Debian Rootfs Construction

2023-03-30 Thread Paul Gevers
Hi, On 29-03-2023 04:06, z Spring wrote: I hope this message finds you well. I am writing to inquire about the construction of Debian Rootfs. I was wondering if you could kindly provide some information on how your team constructs this system, and whether the method of construction

Bug#1033687: unblock: debian-pan/0.4

2023-03-30 Thread Andreas Tille
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: debian-...@packages.debian.org, debian-pan-maintain...@alioth-lists.debian.net, pi...@debian.org Control: affects -1 + src:debian-pan Please unblock package debian-pan

Processed: unblock: debian-pan/0.4

2023-03-30 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:debian-pan Bug #1033687 [release.debian.org] unblock: debian-pan/0.4 Added indication that 1033687 affects src:debian-pan -- 1033687: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033687 Debian Bug Tracking System Contact

Inquiry about Debian Rootfs Construction

2023-03-28 Thread z Spring
Dear, I hope this message finds you well. I am writing to inquire about the construction of Debian Rootfs. I was wondering if you could kindly provide some information on how your team constructs this system, and whether the method of construction has been open-sourced

Bug#1033378: marked as done (unblock: debian-security-support/1:12+2023.03.23)

2023-03-24 Thread Debian Bug Tracking System
Your message dated Fri, 24 Mar 2023 08:22:35 + with message-id and subject line unblock debian-security-support has caused the Debian Bug report #1033378, regarding unblock: debian-security-support/1:12+2023.03.23 to be marked as done. This means that you claim that the problem has been

Bug#1033378: unblock: debian-security-support/1:12+2023.03.23

2023-03-23 Thread Holger Levsen
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package debian-security-support, for a trivial, yet adequate update. Sadly it has no autopkgtest, thus this unblock request. [ Reason ] debian-security-support in bookworm

Bug#1033157: bullseye-pu: package debian-archive-keyring/2021.1.1+deb11u1

2023-03-18 Thread Jonathan Wiltshire
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: debian-archive-keyr...@packages.debian.org, j...@debian.org Control: affects -1 + src:debian-archive-keyring [ Reason ] The bookworm archive keys need adding

Processed: bullseye-pu: package debian-archive-keyring/2021.1.1+deb11u1

2023-03-18 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:debian-archive-keyring Bug #1033157 [release.debian.org] bullseye-pu: package debian-archive-keyring/2021.1.1+deb11u1 Added indication that 1033157 affects src:debian-archive-keyring -- 1033157: https://bugs.debian.org/cgi-bin/bugreport.cgi?

<    1   2   3   4   5   6   7   8   9   10   >