Your message dated Tue, 24 Dec 2019 18:04:52 +0000
with message-id <[email protected]>
and subject line Bug#947022: fixed in flatpak 1.6.0-1
has caused the Debian Bug report #947022,
regarding should flatpak -> xdg-desktop-portal be downgraded to Recommends?
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
947022: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947022
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: xdg-desktop-portal
Version: 1.4.2-3
Severity: normal
File: /usr/libexec/xdg-desktop-portal

Every minute, this service, which I don't want or need, and don't 
even know what it's about (flatpak pulls it in) spams my syslog:

  Dec 17 20:31:06 lotus xdg-desktop-por[31369]: Failed to get 
  application states: 
  GDBus.Error:org.freedesktop.portal.Error.Failed: Could not get 
  window list: Cannot invoke method; proxy is for the well-known 
  name org.gnome.Shell without an owner, and proxy was constructed 
  with the G_DBUS_PROXY_FLAGS_DO_NOT_AUTO_START flag

I tried masking the systemd user unit, but it still somehow gets 
started.

Please make it optional, and less verbose.

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.4.0-trunk-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_NZ, LC_CTYPE=en_NZ.UTF-8 (charmap=UTF-8), LANGUAGE=en_NZ:en 
(charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages xdg-desktop-portal depends on:
ii  bubblewrap                                    0.4.0-1
ii  dbus-user-session [default-dbus-session-bus]  1.12.16-2
ii  fuse                                          2.9.9-2
ii  libc6                                         2.29-5
ii  libfontconfig1                                2.13.1-2+b1
ii  libfuse2                                      2.9.9-2
ii  libgdk-pixbuf2.0-0                            2.40.0+dfsg-1
ii  libglib2.0-0                                  2.62.3-2
ii  libjson-glib-1.0-0                            1.4.4-2
ii  libpipewire-0.2-1                             0.2.7-1

xdg-desktop-portal recommends no packages.

xdg-desktop-portal suggests no packages.

-- debconf-show failed


-- 
 .''`.   martin f. krafft <[email protected]> @martinkrafft
: :'  :  proud Debian developer
`. `'`   http://people.debian.org/~madduck
  `-  Debian - when you have better things to do than fixing systems

Attachment: digital_signature_gpg.asc
Description: Digital GPG signature (see http://martin-krafft.net/gpg/sig-policy/999bbcc4/current)


--- End Message ---
--- Begin Message ---
Source: flatpak
Source-Version: 1.6.0-1

We believe that the bug you reported is fixed in the latest version of
flatpak, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Simon McVittie <[email protected]> (supplier of updated flatpak package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 24 Dec 2019 16:11:00 +0000
Source: flatpak
Architecture: source
Version: 1.6.0-1
Distribution: unstable
Urgency: medium
Maintainer: Utopia Maintenance Team 
<[email protected]>
Changed-By: Simon McVittie <[email protected]>
Closes: 947022
Changes:
 flatpak (1.6.0-1) unstable; urgency=medium
 .
   * New upstream stable release
     - d/p/testlibrary-Don-t-assert-that-progress-is-signalled.patch:
       Drop workaround, the leaks that broke this test have been fixed
     - Drop other patches, applied upstream
     - Bump xdg-desktop-portal dependency to 1.6.x.
       That version has new API which Flatpak apps might rely on, so the
       corresponding versions should be tested and backported together.
   * d/watch: Only watch for stable releases
   * Set upstream branch to upstream/1.6.x
   * Drop xdg-desktop-portal from Depends to Recommends.
     Installing xdg-desktop-portal 1.6.x is strongly recommended, but
     strictly speaking it is not required: some of the simpler Flatpak
     apps can work without it. (Closes: #947022)
   * tests: Depend on fuse and policykit-1
   * Revert Build-Conflicts on elogind to be nice to non-systemd derivatives.
     This was a workaround for the build-dependency resolver used in
     experimental, and is unnecessary now that I'm targeting unstable.
 .
 flatpak (1.5.2-1) experimental; urgency=medium
 .
   * New upstream development release
     - d/copyright: Update
     - d/control: Depend on bubblewrap 0.4.0
     - Update d/libflatpak0.symbols
   * d/tests/build: Use correct compiler for proposed autopkgtest
     cross-architecture testing support
   * Make autopkgtests shellcheck-clean
   * d/p/debian/Use-Python-3-for-test-web-server.patch:
     Drop patch, no longer needed.
     The tests now require Python 3 upstream, and no longer support
     Python 2.
   * Depend on xdg-desktop-portal 1.5.4.
     This is probably not strictly required, but they are likely to be
     released together and some features will need it.
   * d/tests/build: Use correct compiler for proposed autopkgtest
     cross-architecture testing support
   * Make autopkgtests shellcheck-clean
   * d/patches:
     Add proposed patches from upstream PR 3307 to fix memory and fd leaks
   * d/patches:
     Add proposed patches from upstream PR 3310, 3311, 3312 to fix some
     minor memory leaks
   * d/p/testlibrary-Don-t-assert-that-progress-is-signalled.patch:
     Remove problematic assertions while the failure is investigated
 .
 flatpak (1.5.0-1) experimental; urgency=medium
 .
   * New upstream development release
     - Update d/libflatpak0.symbols
   * Standards-Version: 4.4.1 (no changes required)
   * Set packaging branch to debian/experimental
   * tests: Depend on socat
   * d/control: Add spurious Build-Conflicts on elogind packages.
     This works around a build-dependency resolver failure when using
     the same aspcud resolution behaviour as official Debian experimental
     buildds, which for some reason tries to co-install systemd and elogind,
     causing failure to install build-dependencies.
     (This can safely be reverted in distributions that only have elogind,
     such as Devuan.)
Checksums-Sha1:
 bb36e2885d3ad85f65372f4ca27e4070b6476fa0 3550 flatpak_1.6.0-1.dsc
 75b85a8ece32ca7ddeb3284c566b4caf097aa0ad 1322912 flatpak_1.6.0.orig.tar.xz
 504b0a9c4632bb206c80694f738b54f903ccd0a9 26644 flatpak_1.6.0-1.debian.tar.xz
 5cadc34b4f86319880b288ef1fa669dbbda8a134 11690 flatpak_1.6.0-1_source.buildinfo
Checksums-Sha256:
 02d3f21349cef30a113352ff7f145d459847c09f9591d58aed34fbc478e04b6a 3550 
flatpak_1.6.0-1.dsc
 8a533fd1d6dfe9c36ce02715c22234f47b2de5fc2ae04a7844f478d144031d5c 1322912 
flatpak_1.6.0.orig.tar.xz
 763339aa1166fffa2cf9acbed5d6aa18d8e3a1f3d5ba47cd951720c32efd2a7d 26644 
flatpak_1.6.0-1.debian.tar.xz
 e2f4a3abacb61fe7cdbbf51e18da0233f5ebd3d8fa95112f0b6fb531b176f7dd 11690 
flatpak_1.6.0-1_source.buildinfo
Files:
 90d6f09b97be9f77c7f70ac20e5e7b73 3550 admin optional flatpak_1.6.0-1.dsc
 d1a44dc92156e5eda2c0236320124d4e 1322912 admin optional 
flatpak_1.6.0.orig.tar.xz
 2eb714cc3c7958027be48f970b15b4a4 26644 admin optional 
flatpak_1.6.0-1.debian.tar.xz
 1df61fe263b6fa179543535d3523ca10 11690 admin optional 
flatpak_1.6.0-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=mKAd
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to