Your message dated Mon, 28 Oct 2019 16:26:39 +0000
with message-id <[email protected]>
and subject line Bug#942126: fixed in gvfs 1.42.1-2
has caused the Debian Bug report #942126,
regarding gvfs-fuse: /run/user/ID/gvfs/ empty after upgrade
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
942126: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942126
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: gvfs-fuse
Version: 1.42.1-1
Severity: normal

Every time MATE desktop starts, it mounts several SMB share with a
command like that:
gio mount "smb://host/folder"

After upgrading gvfs from 1.42.0+really1.38.1-1 to 1.42.1-1 gvfs those
commands still works ok, except that /run/user/ID/gvfs/ is now empty and
so I cannot access the mount points with application not gvfs-aware.

Downgrading the following gvfs packages back to 1.42.0+really1.38.1-1
and logging out/in, solves the problem for me:
gvfs
gvfs-backend
gvfs-common
gvfs-daemons
gvfs-fuse
gvfs-libs

Cesare.


-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.2.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8), 
LANGUAGE=it_IT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages gvfs-fuse depends on:
ii  fuse          2.9.9-2
ii  gvfs          1.42.1-1
ii  libc6         2.29-2
ii  libfuse3-3    3.7.0-1
ii  libglib2.0-0  2.62.1-1

gvfs-fuse recommends no packages.

gvfs-fuse suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: gvfs
Source-Version: 1.42.1-2

We believe that the bug you reported is fixed in the latest version of
gvfs, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andreas Henriksson <[email protected]> (supplier of updated gvfs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 28 Oct 2019 16:58:57 +0100
Source: gvfs
Architecture: source
Version: 1.42.1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian GNOME Maintainers 
<[email protected]>
Changed-By: Andreas Henriksson <[email protected]>
Closes: 942126
Changes:
 gvfs (1.42.1-2) unstable; urgency=medium
 .
   * Team upload.
   * Switch gvfs-fuse dependency from fuse to fuse3 (Closes: #942126)
Checksums-Sha1:
 9f60bc824c9ec97de3fe876e89e2bf17683de7f5 3421 gvfs_1.42.1-2.dsc
 e21f16809c671731f1bdd40c708ade868b9d4b78 24548 gvfs_1.42.1-2.debian.tar.xz
 21ccbdf9de99520afac33775297426c2ad52243c 22546 gvfs_1.42.1-2_amd64.buildinfo
Checksums-Sha256:
 3d0592f9d7b86d9a5bb6239122984acaadf740e1e96d56ddb7429364b753f8fe 3421 
gvfs_1.42.1-2.dsc
 f0ff6fb9f50ded2fdd4e3115981f9a0f18d3b3e1f247655ae56c2eed1b3dee42 24548 
gvfs_1.42.1-2.debian.tar.xz
 904765a63a87ad79cc0226deeb5ef82b8e61bdf00268f5910b0b0200aaaeba4d 22546 
gvfs_1.42.1-2_amd64.buildinfo
Files:
 9baed75be429bc3002ccee5b92a228af 3421 gnome optional gvfs_1.42.1-2.dsc
 3d282b03fc78a7b67e481459529e3a36 24548 gnome optional 
gvfs_1.42.1-2.debian.tar.xz
 848b8485df3f2fafe7ef68bdaa4829df 22546 gnome optional 
gvfs_1.42.1-2_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=FO55
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to