Your message dated Fri, 19 Dec 2025 21:19:40 +0000
with message-id <[email protected]>
and subject line Bug#1118293: fixed in yubikey-manager 5.8.0-4
has caused the Debian Bug report #1118293,
regarding python3-ykman: Newer python3-fido2 version required
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1118293: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118293
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: python3-ykman
Version: 5.8.0-3
Severity: normal
Dear maintainer,
some functionality of ykman is currently broken because of an outdated
dependency on python3-fido2.
The distribution from pypi.org has "Requires-Dist: fido2 (>=2.0,<3)"
and I think this should be reflected in the Debian package.
The missing "max_pin_length" attribute (see traceback below) was added
to fido2 version 2.0.0
$ ykman fido access change-pin
ERROR: An unexpected error has occurredTraceback (most recent call last):
File "/usr/lib/python3/dist-packages/ykman/_cli/__main__.py", line 644, in
main
cli(obj={}, windows_expand_args=False)
~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/click/core.py", line 1161, in __call__
return self.main(*args, **kwargs)
~~~~~~~~~^^^^^^^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/click/core.py", line 1082, in main
rv = self.invoke(ctx)
File "/usr/lib/python3/dist-packages/click/core.py", line 1697, in invoke
return _process_result(sub_ctx.command.invoke(sub_ctx))
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^
File "/usr/lib/python3/dist-packages/click/core.py", line 1697, in invoke
return _process_result(sub_ctx.command.invoke(sub_ctx))
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^
File "/usr/lib/python3/dist-packages/click/core.py", line 1697, in invoke
return _process_result(sub_ctx.command.invoke(sub_ctx))
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^
File "/usr/lib/python3/dist-packages/click/core.py", line 1443, in invoke
return ctx.invoke(self.callback, **ctx.params)
~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/click/core.py", line 788, in invoke
return __callback(*args, **kwargs)
File "/usr/lib/python3/dist-packages/click/decorators.py", line 33, in
new_func
return f(get_current_context(), *args, **kwargs)
File "/usr/lib/python3/dist-packages/ykman/_cli/fido.py", line 426, in
change_pin
max_len = ctap2.info.max_pin_length
^^^^^^^^^^^^^^^^^^^^^^^^^
AttributeError: 'Info' object has no attribute 'max_pin_length'. Did you mean:
'min_pin_length'?
Thanks,
Jörn
-- System Information:
Debian Release: forky/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 6.12.38+deb13-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages python3-ykman depends on:
ii python3 3.13.7-1
ii python3-click 8.2.0+0.really.8.1.8-1
ii python3-cryptography 44.0.2-2
ii python3-fido2 1.2.0-2
ii python3-keyring 25.6.0-3
ii python3-pyscard 2.3.0-1
Versions of packages python3-ykman recommends:
ii pcscd 2.3.3-1
python3-ykman suggests no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: yubikey-manager
Source-Version: 5.8.0-4
Done: Patrick Winnertz <[email protected]>
We believe that the bug you reported is fixed in the latest version of
yubikey-manager, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Patrick Winnertz <[email protected]> (supplier of updated yubikey-manager
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 19 Dec 2025 16:17:52 +0100
Source: yubikey-manager
Architecture: source
Version: 5.8.0-4
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Tools <[email protected]>
Changed-By: Patrick Winnertz <[email protected]>
Closes: 1118293
Changes:
yubikey-manager (5.8.0-4) unstable; urgency=medium
.
* Depend on python-fido2 >=2.0 (Closes: #1118293)
Checksums-Sha1:
580d7e8ea71c1929d5a3ec21867190547a5a1fa6 2750 yubikey-manager_5.8.0-4.dsc
2310662d61217c4cd90e64d054174eba739df5f6 73488
yubikey-manager_5.8.0-4.debian.tar.xz
a75b327ecb42b551f39fc64ce2f49d2e78548513 7852
yubikey-manager_5.8.0-4_amd64.buildinfo
Checksums-Sha256:
724f5228b0d10da4d30510c6627c1962703300c05fa34f11b38a40233522ac7a 2750
yubikey-manager_5.8.0-4.dsc
7a7409b715ce17c4cb614192b63b10e2bd70886234333a271d722c664379acec 73488
yubikey-manager_5.8.0-4.debian.tar.xz
5a87dbfbaebe89b693f323176f56b76273e26906ba21726fef26162788ea9f72 7852
yubikey-manager_5.8.0-4_amd64.buildinfo
Files:
64882d576245cf13308f1d1465f394fd 2750 utils optional
yubikey-manager_5.8.0-4.dsc
2f9f46b64ec4ee6a82281730950f2d74 73488 utils optional
yubikey-manager_5.8.0-4.debian.tar.xz
49b332f5a1b6d8ab961e9c5578890568 7852 utils optional
yubikey-manager_5.8.0-4_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=B+jT
-----END PGP SIGNATURE-----
pgpRafh7mf8v7.pgp
Description: PGP signature
--- End Message ---