> The gcc-msp430 package is obviously not maintained anymore.
> I hereby orphan it. Please only consider adopting it if you can
> afford the time and have the skills to maintain it.
Apologies for not seeing/reacting to this bug earlier.
This package is effectively an early experimental/forked
> The gdb-msp430 package is obviously not maintained anymore.
> I hereby orphan it. Please only consider adopting it if you can
> afford the time and have the skills to maintain it.
Apologies for not seeing/reacting to this bug earlier.
This package is effectively an early experimental/forked
On Tue, 7 Mar 2023 12:05:39 +0100
Bastian Germann wrote:
> Source: gtk-gnutella
> Version: 1.1.15-1
>
> I am filing this ITS in order to remove the package after three weeks.
> The last maintainer upload was in 2015, two NMUs since then.
Ack. I think nowadays the userbase for this package is
On Tue, 7 Mar 2023 12:11:14 +0100
Bastian Germann wrote:
> Source: argon2
> Version: 0~20190702-0.1
>
> There have been 4 NMUs since the last maintainer upload.
> I am filing this ITS in order to orphan the package after three weeks.
Ack, I'm still around but I haven't had much time for Debian
eremy Bicha wrote:
> I intend to file a removal bug for nemiver soon. It has failed to
> build for more than a year. It wasn't autoremoved sooner because it
> was included in one of the metapackages in meta-gnome3.
I agree, it's time to let it go.
If you are already in the process of asking for
On Wednesday, 4 July 2018 07:31:30 UTC you wrote:
> The libargon2-0 package is pulling the libargon2-1 package and contains
> a symlink pointing to libargon2.so.1.
>
> This is not a good idea and a proper transition should be done.
Is there a specific issue this is causing?
While odd, the
Hi,
I experienced the same today after a grub update to '2.02+dfsg1-1' on testing.
Looking back at logs, grub-install reported an error but the upgrade process
as a whole didn't fail, so I missed it at first:
```
Could not prepare Boot variable: No space left on device
grub-install: error:
On Monday, January 8, 2018 3:26:07 PM UTC Sylvestre Ledru wrote:
> Trying to build https://github.com/marco-c/grcov/ using cargo
> $ cargo build
>
> It is failing on:
>
>Compiling rust-crypto v0.2.36
> error: failed to run custom build command for `grcov v0.1.31
>
Package: ftp.debian.org
Severity: normal
On Thursday, April 20, 2017 8:16:00 AM UTC Ximin Luo wrote:
> - cargo still embeds libgit2-sys source code, and I can see that in the
> deps-tarball-filter.txt Luca was explicitly leaving it in. Is that because
> they patch the source code?
>
> Can we just get rid of it, and link to libgit2
severity 842634 minor
thanks
On Sunday, 30 October 2016 23:09:35 UTC Santiago Vila wrote:
> I wonder what exactly this test "no_lookup_host_duplicates" does.
> My autobuilder do not have a FQDN, it has just this in /etc/hosts:
>
> public-ip skywalker1
>
> Is this a bug in my autobuilder?
sponsor to upload an updated openldap package. The
>
> > package can be found on alioth:
> Hi,
>
> ping me if Luca Bruno is not sponsoring this upload and I will sponsor
> myself.
Please go ahead. I'm quite short on time at the moment and I don't have
anymore access
On Thursday, 13 October 2016 13:59:27 UTC Andreas Henriksson wrote:
> Fwiw, there's a chain of {build-,}dependencies that would need to be
> removed on ppc64el
Ah, when I wrote my previous answer I didn't realize that.
Upon further inspection, it looks like it may be just enough to cherry-pick
On Thursday, 13 October 2016 21:18:07 UTC Dmitry Smirnov wrote:
> Rkt 1.16.0 FTBFS on ppc64el and s390x:
>
> https://buildd.debian.org/status/package.php?p=rkt
>
> Any ideas what we can do about it?
s390(x) is not supported upstream for the moment, but this shouldn't be a
blocker as it has
1.13.0+dfsg-1 has been built without issues on i386:
https://buildd.debian.org/status/fetch.php?pkg=rkt=i386=1.13.0%2Bdfsg-1=1472188080
ppc64 and s390x are in progress upstream and should hopefully
be back in the next releases.
Ciao, Luca
--
«Доверяй, но проверяй»
signature.asc
Description:
severity 828931 important
thanks
Hi,
are you also pulling something else from experimental (eg. gdb) or building in
some slow/virtual environment?
It looks like you are just hitting a timeout while pexpect-ing, so I fear that
it is more easily related to your specific environment than the newer
tag 828779 + confirmed
thanks
On Saturday 06 August 2016 15:44:42 Joey Hess wrote:
> Package: libargon2-0
> Version: 0~20160406-2
> Severity: normal
>
> Both the command line program argon2 and the library fail with SIGILL on
> my laptop.
It seems to SIGILL on an XOP opcode:
```
Thread 2
On Thursday 16 June 2016 00:26:59 Dmitry Smirnov wrote:
> Dear Michael,
>
> On Monday, 6 June 2016 1:53:02 PM AEST Michael Biebl wrote:
> > Now, regarding my concerns: The size increase is one (which will affect
> > everyone if we ship it s part of the systemd package).
>
> Michael, I don't know
On Sun, 5 Jun 2016 21:58:54 +0200 Michael Biebl wrote:
> Am 05.06.2016 um 17:59 schrieb Dmitry Smirnov:
> > Could we introduce raw "systemd-sysusers" binary ASAP to fix "rkt" please?
>
> The size is a concern, and we mentioned this before.
> This really is a wishlist bug, so
On Tuesday, May 17, 2016 08:00:43 PM Chris Lamb wrote:
> Hi,
>
> > gtk-gnutella: please make the build reproducible
>
> Apologies but my initial patch was incomplete. I have attached an updated
> version.
>
> (Thanks to Reiner Herrmann for spotting this.)
Thanks both for working on this! I'd
On Sun, 15 May 2016 14:01:20 +0200 Michael Biebl wrote:
> Can you clarify a bit more, why exactly rkt needs systemd-sysusers?
rkt (aka stage0) supports several stage1 flavors (the component responsible
for running the containerized-app/stage2). Debian package currently
forwarded 820501 https://github.com/seccomp/libseccomp/issues/28
tags 820501 + upstream
thanks
On Sat, 9 Apr 2016 10:03:31 +0200 Helge Deller wrote:
> Nevertheless, until the patch gets applied upstream, can you please
> apply it to the next upload of libseccomp?
For reference:
forwarded 822325 https://github.com/rust-lang/rust/pull/33640
thanks
On Saturday, May 14, 2016 02:52:55 PM Santiago Vila wrote:
>
> In both cases the problem went away by setting
> DefaultTasksMax=infinity in /etc/systemd/system.conf.
Good catch! I was aware of it, but didn't come to my mind in
severity 822325 minor
tags 822325 + moreinfo
thanks
On Sat, 23 Apr 2016 14:33:48 +0200 (CEST) Santiago Vila
wrote:
> This package currently fails to build from source in stretch.
>
> --
> executing
r (CCed).
>
> The package has been uploaded now. Thanks, Luca!
This was sitting in my pending queue for some time, sorry for the delay :(
Ciao, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'`
tags 821128 + patch
thanks
On Fri, 15 Apr 2016 15:52:19 -0400 "Aaron M. Ucko" wrote:
> Please either add an appropriate sys_linux_*.go file supplying this
> definition or restrict the Architecture: field to reflect reality.
Patch with the additional constant definition sent
nt/nemiver.git
Vcs-Browser: https://anonscm.debian.org/git/collab-maint/nemiver.git
Ciao, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG: 0xBB1A3A854F3BBEBF
`- http://www.debian.
oper section. Just for the sake of a clarity: is there a preferred order of
actions or both are fine (upload-then-bug-ftp or viceversa)?
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'`
ve see all your commits, thanks for it (and for sticking to CC0).
I'll forward the manpage and a couple of other bits to upstream.
A new upload will follow soon, I've just have another small change to land
before that.
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' :
Package: libuv1
Version: 1.9.0-1
Severity: normal
We still need to clear up whether nodejs LTS are locked to spcific libuv1
minor versions or not.
For the moment, we block 1.9.0 here and wait for clarification before letting
it in testing.
Discussion is up at
On Monday, April 04, 2016 11:14:00 PM Luca BRUNO wrote:
> I think we may align cargo on that and just build with libcurl4-gnutls-dev
> instead. Upstream prefers building with libcurl+openssl,
> but I guess switching to gnutls shouldn't cause any issue here.
I've just uploade
lding with libcurl+openssl,
but I guess switching to gnutls shouldn't cause any issue here.
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG: 0xBB1A3A854F3BBEBF
`- http://www.de
.
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG: 0xBB1A3A854F3BBEBF
`- http://www.debian.org | Debian GNU/Linux Developer
signature.asc
Description: This is a digitally signed message part.
some time in the environment above to check if it still deadlocks (however
I can't exclude false negatives if the bug doesn't trigger).
Ciao, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'`
Package: rsyslog-gnutls
Version: 8.4.2-1+deb8u2
Severity: grave
Tags: patch upstream
Justification: causes non-serious data loss
I have a log-aggregating server using rsyslog to receive multiple
streams (both UDP and TCP), including some remote logs via TLS.
I'm experiencing a lock of the TLS
e).
I'm re-titling an raising the severity here, hoping it will help other people
noticing the regression in the meanwhile.
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG: 0x
//git.shibboleth.net/view/?p=cpp-opensaml.git;a=commitdiff;h=390147dc17687e900bf6a50f3577ccc611a0a7cd;hp=ec145bf31d59d23bbf63cdc39ffeb172ed29d67d
As such, I think we can just proceed with a NMU introducing libsaml8v5.
This will also remove the last blocker for libshibsp.
Cheers, Luca
--
.''`.
On Monday, January 11, 2016 08:57:23 AM Paul Wise wrote:
> On Sun, Jan 10, 2016 at 8:03 PM, Luca Bruno wrote:
> > Argon2 is a password-hashing function that can be used to hash passwords
> > for credential storage, key derivation, or other applications.
>
> It might be bet
Package: wnpp
Severity: wishlist
Owner: Luca Bruno <lu...@debian.org>
* Package name: argon2
Version : 0~20151206-1
Upstream Author : D. Dinu, D. Khovratovich et al.
* URL : https://github.com/P-H-C/phc-winner-argon2
* License : CC0
Programming L
d prepending one time too much.
Ciao, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG: 0xBB1A3A854F3BBEBF
`- http://www.debian.org | Debian GNU/Linux Developer
signature.asc
Description: This is a digitally signed message part.
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG: 0xBB1A3A854F3BBEBF
`- http://www.debian.org | Debian GNU/Linux Developer
signature.asc
Description: This is a digitally signed message part.
toolchain is ld 2.25.90.20151209 and gcc
5.3.1-4.
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG: 0xBB1A3A854F3BBEBF
`- http://www.debian.org | Debian GNU/Linux Developer
On Monday 21 December 2015 12:27:47 Luca Bruno wrote:
> For reference, current working sid toolchain is ld 2.25.90.20151209 and gcc
> 5.3.1-4.
Similarly, I tried in a fresh stretch environment and it works fine.
The toolchain there is ld 2.25.90.20151209 and gcc 5.3.1-3.
I think we are
ckaging.
I'll take care of closing this bug in a few days, assuming rustc+cargo are
fine.
Ciao, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG: 0xBB1A3A854F3BBEBF
`- http://ww
Package: libtoml-parser-perl
Version: 0.05-1
Severity: wishlist
Tags: upstream
A new upstream version (0.06) has been recently released, which
introduces support for TOML 0.4.0.
Given that the new 0.4.0 spec are now widely adopted (and that we
will probably need this feature in a custom
Package: ftp.debian.org
Severity: normal
world. Gnome now should also come with integrated screen recording, but
I never tried it.
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG: 0xBB1A3A854F3BBEBF
`- http://www.debi
aft.
As such, I will proceed asking for the removal of ksplice.
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG: 0xBB1A3A854F3BBEBF
`- http://www.debian.org | Debian GNU/Linux Develo
today:
https://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=594
This changes only touch libunbound (and the testcases) to build with nettle,
while the rest of unbound still needs openssl or NSS (mostly for TLS).
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' :
On 29/10/2015 14:05, Martin Pitt wrote:
> Control: tag -1 moreinfo unreproducible
>
> Hello Luca,
>
> Luca Bruno [2015-10-29 12:29 +0100]:
>> I've put a simple service in /lib/systemd/system. Doing systemctl
>> start/stop on this service works correctly, however ena
On 29/10/2015 14:05, Martin Pitt wrote:
> Control: tag -1 moreinfo unreproducible
>
> Hello Luca,
>
> Luca Bruno [2015-10-29 12:29 +0100]:
>> I've put a simple service in /lib/systemd/system. Doing systemctl
>> start/stop on this service works correctly, however ena
Package: systemd
Version: 215-17+deb8u2
Hello, using systemd 215-17+deb8u2 on jessie.
I've put a simple service in /lib/systemd/system. Doing systemctl
start/stop on this service works correctly, however enable/disable
doesn't work: "Failed to execute operation: No such file or directory".
The
time-bomb mechanism it may/will become useless at some point in
future.
Raising severity won't help here (maybe removing from further sub-releases
will).
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'`
ecific initial issue (gated libc), doc explicitly tells to use
the external "libc" crate instead. Even with nightly channel, the other
project would still need to be patched.
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Univ
On Tue, 25 Aug 2015 19:10:50 +0200 Michael Biebl <bi...@debian.org> wrote:
> Am 25.08.2015 um 18:41 schrieb Luca Bruno:
>
> > I've tried this patch and looks like adding another bug to me. Please
> > confirm what I'm experiencing. It's true, it does not remove cgroup
On Tue, 25 Aug 2015 18:41:59 +0200 Luca Bruno lethalma...@gmail.com wrote:
I've tried this patch and looks like adding another bug to me. Please
confirm what I'm experiencing. It's true, it does not remove cgroups
created by systemd, but then it doesn't cleanup cgroups that systemd
created
Control: unarchive -1
On Thu, 12 Feb 2015 15:43:30 +0100 Martin Pitt mp...@debian.org wrote:
Hello again,
so the patch that got proposed at
http://lists.freedesktop.org/archives/systemd-devel/2014-September/023276.html
actually makes a lot of sense: This makes systemd only clean up
Package: wnpp
Severity: wishlist
* Package name: libtoml-perl
Version : 0.96
Upstream Author : Darren Chamberlain dar...@cpan.org et al.
* URL : https://metacpan.org/pod/TOML
* License : GPLv2
Programming Lang: Perl
Description : Perl module for reading
Source: http-parser
Severity: wishlist
Hi,
since the last upload of http-parser package, upstream had several
intermediate releases and soname bumps.
The current one is 2.5 and it is the current target for the next
nodejs/iojs release cycle.
Can you please update the package to latest version
Source: xmltooling
Version: 1.3.3-2
Severity: serious
Tags: security patch upstream
Shibboleth Service Provider software contains a code path with an uncaught
exception that can be triggered by an unauthenticated attacker by
supplying well-formed but schema-invalid XML in the form of SAML
On Monday 27 July 2015 11:06:39 Jonas Smedegaard wrote:
Quoting Luca Bruno (2015-07-27 10:17:50)
* Package name: pytoml
This project aims at being a specs-conforming and strict
parser and writer for TOML files.
.
The library currently supports version 0.4.0 of the specs
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG: 0xBB1A3A854F3BBEBF
`- http://www.debian.org | Debian GNU/Linux Developer
signature.asc
Description: This is a digitally signed message
Package: wnpp
Severity: wishlist
Owner: Luca Bruno lu...@debian.org
* Package name: pytoml
Version : 0.1.2
Upstream Author : Martin Vejnár
* URL : https://github.com/avakar/pytoml
* License : MIT
Programming Lang: Python
Description : A TOML parser
Source: netty-3.9
Version: 3.9.0.Final-1
Severity: important
Tags: security upstream patch
LinkedIn Security Team discovered a Cookie header parsing bug in Netty
that could lead to universal bypass of the HttpOnly flag on cookies.
If the HttpOnly flag is included in the HTTP Set-Cookie response
Source: libuser
Version: 1:0.56.9.dfsg.1-1.2
Severity: grave
Tags: security upstream patch
During a code audit by Qualys, multiple libuser-related vulnerabilities
were discovered that can allow local users to perform denial-of-service and
privilege-escalation attacks:
- Race condition in
Package: wnpp
Severity: wishlist
* Package name: rocksdb
Version : 3.11.2
Upstream Author : Facebook, Inc.
* URL : http://rocksdb.org/
* License : BSD-3
Programming Lang: C++
Description : A persistent key-value store for fast storage environments
Package: groovy
Version: 1.8.6-1
Severity: grave
Tags: security upstream
cpnrodzc7, working with HP's Zero Day Initiative, discovered that
Java applications using standard Java serialization mechanisms to
decode untrusted data, and that have Groovy on their classpath, can
be passed a serialized
Package: groovy2
Version: 2.2.2+dfsg-3
Severity: grave
Tags: security upstream
cpnrodzc7, working with HP's Zero Day Initiative, discovered that
Java applications using standard Java serialization mechanisms to
decode untrusted data, and that have Groovy on their classpath, can
be passed a
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG: 0xBB1A3A854F3BBEBF
`- http://www.debian.org | Debian GNU/Linux Developer
signature.asc
Description: This is a digitally signed message part.
.
If you have CAP_DAC_OVERRIDE (e.g. you're running the build as root),
Isn't this an incredibly bad practice?
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG: 0xBB1A3A854F3BBEBF
nice, it happened once already (but on a different builder) and
just giving back the package solved it. I suspect the same will apply here.
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
. mipsel
Ciao, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG: 0xBB1A3A854F3BBEBF
`- http://www.debian.org | Debian GNU/Linux Developer
signature.asc
Description
/libuv/pull/351
[2] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787751
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG Key ID: 0x4F3BBEBF
`- http://www.debian.org
retitle 787751 uv_loop_configure testsuite failure on mips/mipsel
tags 787751 + pending upstream sid
forwarded 787751 https://github.com/libuv/libuv/issues/335
severity 787751 important
thanks
On Friday 05 June 2015 10:53:51 Luca Bruno wrote:
Just to summarize, all build failures are known
On Friday 05 June 2015 10:43:19 Luca Bruno wrote:
For some reason, pipe_set_non_blocking failed everywhere:
`pipe_set_non_blocking` failed: exit code 6
Output from process `pipe_set_non_blocking`:
Assertion failed in test/test-pipe-set-non-blocking.c on line 51: n == 0
in the meanwhile.
I'll try to dig a bit in the history and see if 1.5.0/1.6.0 fail too.
Regards, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG Key ID: 0x4F3BBEBF
`- http://www.debian.org
Source: rustc
Version: 1.0.0+dfsg1-1
Severity: serious
Even though Rust recently reached the 1.0 milestone,
compiler and ecosystem packaging still has to reach a
ready for the masses status.
As some bits are still missing (cargo, external libs) and
other still under discussion (dynlibs,
the maintainer (Dariusz CCed here) to upload 2.0.09-4 into
jessie-backports.
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG Key ID: 0x4F3BBEBF
`- http://www.debian.org
the archive:
https://ftp-master.debian.org/new/libuv1_1.4.2-1.html
If you want to start building/testing your neovim package, you can build
yourself current libuv1 (1.4.2-1) from git:
http://anonscm.debian.org/cgit/pkg-javascript/libuv1.git
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca
On 05/03/2015 14:51, Vincent Bernat wrote:
Unfortunately, to be backported to Wheezy, the patch should be in
Jessie. And to be in Jessie, we need a freeze exception which is
granted only for serious bugs (since January 5th). I think that such a
patch is quite unlikely to satisfy the current
Package: haproxy
Version: 1.5.8
I'd like to request this upstream commit [0] to be included in debian
haproxy and hopefully be backported to wheezy. The rand() function in
the config is otherwise completely broken.
The rand(range) function [1] is supposed to give random numbers
between 0 and
; urgency=high
+
+ * Backported: call setgroups before calling setuid/setgid
+(Closes: #779173 - CVE-2015-0278)
+
+ -- Luca Bruno lu...@debian.org Wed, 25 Feb 2015 10:50:58 +0100
+
libuv (0.10.28-5) unstable; urgency=medium
* Too early for versioned provides, reverted
diff -Nru libuv
--
.''`. | ~[ Luca BRUNO ~ (kaeso) ]~
: :' : | Email: lucab (AT) debian.org ~ Debian Developer
`. `'` | GPG Key ID: 0x3BFB9FB3 ~ Free Software supporter
`-| HAM-radio callsign: IZ1WGT ~ Networking sorcerer
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
Architectures: i386
Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
commit 57212a99e9363e95e420542c4bd2e7645189d30e
Author: Luca Bruno lu...@debian.org
Date
Package: gnupg2
Version: 2.0.26-4
Severity: important
With the latest gnupg2 package targeted for the Jessie, defaulting hashing
algorithm has been changed to SHA256. This broke my smartcard setup using a
cryptostick/nitrokey (storage version, latest 0.18 firmware) as signing now
fails with:
$
patch.
As it is directly touching original Makefile and as upstream is usually quite
fast in reviewing/merging patches, can you please submit it directly as a PR
against the v0.10 branch there? https://github.com/libuv/libuv
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso
.
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG Key ID: 0x4F3BBEBF
`- http://www.debian.org | Debian GNU/Linux Developer
signature.asc
Description: This is a digitally signed
Package: librarian-puppet
Severity: wishlist
Hi,
it looks like upstream is steadily releasing new version, both minors and
majors.
While I understand that it is difficult to keep up with this flow,
I'd really like to use some of the new features (--puppetfile and --path).
Can you please proceed
package from jessie seems to be better in that regard.
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG Key ID: 0x4F3BBEBF
`- http://www.debian.org | Debian GNU/Linux Developer
, I'm exploring a nginx+shibboleth path, which I expect to be
supported by the split-packaging setup currently in backport.
Just my 2c, though, as I'm still new to the shibboleth world.
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S
/dRVoF4H5yr44oXacwqEsg8/download/dRVoF4H5yr44oXacwqEsg8
Thanks, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S.| lucab (AT) debian.org
`. `'` | GPG Key ID: 0x4F3BBEBF
`- http://www.debian.org | Debian GNU/Linux Developer
signature.asc
Hi all,
as a sidenote, pw-pbkdf2 currently uses openssl EVP module to perform hashing
and verification (via PKCS5_PBKDF2_HMAC_SHA1).
We are currently building against gnutls, so this requires an appropriate
amount of #ifdef and gnutls support before it could be shipped.
Cheers, Luca
On Mon, 20 Oct 2014 07:26:20 +0400 Paul Fertser fercer...@gmail.com wrote:
On Sun, Oct 19, 2014 at 10:45:17PM +0100, Steven Chamberlain wrote:
If you want something equivalent to Linux libusb 1.0 API, I think you
need to Build-Depend on libusb2-dev [kfreebsd-any] rather than libusb-dev.
On Monday 20 October 2014 17:31:48 Paul Fertser wrote:
https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=22;filename=openocd.log.
gz;att=1;bug=754678
| Altera USB-Blaster II Compatibleyes (auto)
I see the source of the confusion now. There're two versions of USB
Blaster, the
--
.''`. | ~[ Luca BRUNO ~ (kaeso) ]~
: :' : | Email: lucab (AT) debian.org ~ Debian Developer
`. `'` | GPG Key ID: 0x3BFB9FB3 ~ Free Software supporter
`-| HAM-radio callsign: IZ1WGT ~ Networking sorcerer
signature.asc
Description: PGP signature
tags 759673 + upstream
forwarded 759673 https://github.com/joyent/libuv/issues/1442
thanks
Patch forwarded upstream, thanks.
If you are a github user, you may even consider to submit a PR there to
speed-up the review and merging process.
Cheers, Luca
--
.''`. | ~[ Luca BRUNO
Hi,
I’m currently dealing with an OpenLDAP password checker,
which builds as an external module.
It currently needs two include files, portable.h and slap.h,
which are not shipped by any package.
It is my understanding that those file were once provided by
a libslapd2.3-dev package, which
Source: libusb2-dev
Severity: normal
Hi,
the current version of this package as reported by pkg-config is too
old for some packages depending on it (eg. openocd[0])
$ pkg-config --modversion libusb-1.0
1.0.6
Upstream is currently shipping with 1.0.13[1], and openocd requires at least
1.0.9. Can
Package: openocd
Version: 0.8-1
Followup-For: Bug #754678
This is because openocd needs libusb-1.0 = 1.0.9, while the one
provided by libusb2-dev on kfreebsd-* reports itself as 1.0.6 in
pkg-config.
I've filled a bug asking kfreebsd porters to sync lib version
with upstream.
Cheers, Luca
--
Package: openocd
Followup-For: Bug #756889
Product:Vendor 0403:6001 is incorrectly assigned to plugdev by openocd udev
rules.
This is in fact a generic FTDI serial convert product:vendor and as such
should be
assigned to 'dialout' as with all other ttyUSB devices.
I'm sorry but it has in
1 - 100 of 558 matches
Mail list logo