Bug#982944: rename.ul was arbitrarily removed from util-linux citing non-existent polic

2022-01-24 Thread Dirk Kostrewa
Meanwhile, I have asked the technical committee for a revision of the 
removal of rename.ul from the util-linux package in Debian bug report 
#1003653 (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003653).


Dirk.



Bug#1004292: debian-installer:s390x: installer fails to format dasd disc on s390x systems

2022-01-24 Thread Dipak Zope
Source: debian-installer
Version: 20210731+deb11u2
Severity: important
Tags: d-i s390-dasd upstream
X-Debbugs-Cc: dipak.zo...@ibm.com



On s390x machines with dasd disc, the installer fails to format the dasd 
disc. 

Logs: 
Jan 24 12:25:13 main-menu[341]: INFO: Menu item 's390-dasd' selected
Jan 24 12:25:19 s390-dasd[3224]: dasdfmt:
Jan 24 12:25:19 main-menu[341]: WARNING **: Configuring 's390-dasd' failed with 
error code 1
Jan 24 12:25:19 main-menu[341]: WARNING **: Menu item 's390-dasd' failed.


Root cause: 
The s390-dasd package calls dasdfmt with '-f' option which is obselete
 long ago. 

Proposed Fix: 
s390-dasd / dasd-config.c: line 393:
Existing line: snprintf (buf, sizeof (buf), "dasdfmt -l LX%04x -b 4096 -m 1 -f 
%s -y", channel_device (channel_current->name), dev);
Proposed line: snprintf (buf, sizeof (buf), "dasdfmt -l LX%04x -b 4096 -m 1 %s 
-y", channel_device (channel_current->name), dev);


This fix is verified. Logs for reference after changes (with additional
debug statement): 

Jan 23 05:21:16 main-menu[347]: INFO: Menu item 'clock-setup' selected
Jan 23 05:21:16 main-menu[347]: INFO: Menu item 's390-dasd' selected
Jan 23 05:21:16 main-menu[347]: INFO: Falling back to the package description 
for dasd-modules-5.10.0-10-s390x-di
Jan 23 05:21:16 main-menu[347]: INFO: Falling back to the package description 
for dasd-modules-5.10.0-10-s390x-di
Jan 23 05:21:21 kernel: [  302.451325] dasd-eckd 0.0.2c7c: A channel path to 
the device has become operational
Jan 23 05:21:21 kernel: [  302.461801] dasd-eckd 0.0.2c7c: New DASD 3390/0C (CU 
3990/01) with 30051 cylinders, 15 heads, 224 sectors
Jan 23 05:21:21 kernel: [  302.485675] dasd-eckd 0.0.2c7c: DASD with 4 
KB/block, 21636720 KB total size, 48 KB/track, compatible disk layout
Jan 23 05:21:21 kernel: [  302.486712]  dasda:VOL1/  LX2C7C:
Jan 23 05:21:24 s390-dasd[3591]: INFO: DZDEBUG:01 executing: dasdfmt -l LX2c7c 
-b 4096 -m 1 /dev/disk/by-path/ccw-0.0.2c7c -y
Jan 23 05:21:24 s390-dasd[3591]: Printing hashmark every 10 cylinders.
Jan 23 05:23:45 kernel: [  446.669429] dasd-eckd 0.0.2c7c: DASD with 4 
KB/block, 21636720 KB total size, 48 KB/track, compatible disk layout
Jan 23 05:23:45 kernel: [  446.669445] dasda: detected capacity change from 0 
to 22156001280
Jan 23 05:23:45 kernel: [  446.669876]  dasda:
Jan 23 05:23:45 kernel: [  446.673221]  dasda:VOL1/  LX2C7C:
Jan 23 05:23:45 s390-dasd[3591]:
Jan 23 05:23:45 s390-dasd[3591]: Finished formatting the device.
Jan 23 05:23:45 s390-dasd[3591]: Rereading the partition table... ok
Jan 23 05:23:45 kernel: [  446.675799]  dasda:VOL1/  LX2C7C:
Jan 23 05:24:21 main-menu[347]: INFO: Menu item 's390-zfcp' selected



-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: s390x



Bug#1004291: ITP: php-dapphp-radius -- pure PHP RADIUS client based on the SysCo/al implementation

2022-01-24 Thread Thomas Goirand
Package: wnpp
Severity: wishlist
Owner: Thomas Goirand 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: php-dapphp-radius
  Version : 2.5.6
  Upstream Author : Drew Phillips 
* URL : https://github.com/dapphp/radius/
* License : LGPL-3
  Programming Lang: PHP
  Description : pure PHP RADIUS client based on the SysCo/al implementation

 Dapphp\Radius is a pure PHP RADIUS client for authenticating users against a
 RADIUS server in PHP. It currently supports basic RADIUS auth using PAP, CHAP
 (MD5), MSCHAP v1, and EAP-MSCHAP v2. The current 2.5.x branch is tested to
 work with Microsoft Windows Server 2012 to 2019 Network Policy Server and
 FreeRADIUS 2 and above.
 .
 PAP authentication has been tested on:
  * Microsoft Radius server IAS
  * Mideye RADIUS Server
  * Radl
  * RSA SecurID
  * VASCO Middleware 3.0 server
  * WinRadius
  * ZyXEL ZyWALL OTP
 .
 The PHP openssl extension is required if using MSCHAP v1 or v2. For older PHP
 versions that have mcrypt without openssl support, then mcrypt is used.

Note: This package is to replace the gap left with php-radius removal. I intend
to use that in OCI (OpenStack cluster installer) if php-radius PECL extension
is not available, which hopefully makes it possible to keep Radius auth in OCI.



Bug#1004290: ca-certificates: GeoTrust RSA CA 2018 intermediate certificate is missing in package

2022-01-24 Thread Max Dmitrichenko
Package: ca-certificates
Version: 20210119
Severity: important
X-Debbugs-Cc: dmitr...@gmail.com

According to Mozilla's list of included intermediate certificates 
https://ccadb-public.secure.force.com/mozilla/PublicAllIntermediateCerts
GeoTrust RSA CA 2018 should be present in certificate store, but it is absent 
in ca-certificates package resulting curl to fail on many sites
which are using GeoTrust certificates. 


-- System Information:
Debian Release: 11.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'stable-debug'), (500, 'proposed-updates-debug'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-11-amd64 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages ca-certificates depends on:
ii  debconf [debconf-2.0]  1.5.77
ii  openssl1.1.1k-1+deb11u1

ca-certificates recommends no packages.

ca-certificates suggests no packages.

-- debconf information:
  ca-certificates/new_crts:
  ca-certificates/enable_crts: mozilla/ACCVRAIZ1.crt, 
mozilla/AC_RAIZ_FNMT-RCM.crt, mozilla/Actalis_Authentication_Root_CA.crt, 
mozilla/AffirmTrust_Commercial.crt, mozilla/AffirmTrust_Networking.crt, 
mozilla/AffirmTrust_Premium.crt, mozilla/AffirmTrust_Premium_ECC.crt, 
mozilla/Amazon_Root_CA_1.crt, mozilla/Amazon_Root_CA_2.crt, 
mozilla/Amazon_Root_CA_3.crt, mozilla/Amazon_Root_CA_4.crt, 
mozilla/Atos_TrustedRoot_2011.crt, 
mozilla/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.crt, 
mozilla/Baltimore_CyberTrust_Root.crt, mozilla/Buypass_Class_2_Root_CA.crt, 
mozilla/Buypass_Class_3_Root_CA.crt, mozilla/CA_Disig_Root_R2.crt, 
mozilla/Certigna.crt, mozilla/Certigna_Root_CA.crt, 
mozilla/certSIGN_ROOT_CA.crt, mozilla/certSIGN_Root_CA_G2.crt, 
mozilla/Certum_Trusted_Network_CA_2.crt, mozilla/Certum_Trusted_Network_CA.crt, 
mozilla/CFCA_EV_ROOT.crt, mozilla/Chambers_of_Commerce_Root_-_2008.crt, 
mozilla/Comodo_AAA_Services_root.crt, 
mozilla/COMODO_Certification_Authority.crt, 
mozilla/COMODO_ECC_Certification_Authority.crt, 
mozilla/COMODO_RSA_Certification_Authority.crt, 
mozilla/Cybertrust_Global_Root.crt, mozilla/DigiCert_Assured_ID_Root_CA.crt, 
mozilla/DigiCert_Assured_ID_Root_G2.crt, 
mozilla/DigiCert_Assured_ID_Root_G3.crt, mozilla/DigiCert_Global_Root_CA.crt, 
mozilla/DigiCert_Global_Root_G2.crt, mozilla/DigiCert_Global_Root_G3.crt, 
mozilla/DigiCert_High_Assurance_EV_Root_CA.crt, 
mozilla/DigiCert_Trusted_Root_G4.crt, mozilla/DST_Root_CA_X3.crt, 
mozilla/D-TRUST_Root_Class_3_CA_2_2009.crt, 
mozilla/D-TRUST_Root_Class_3_CA_2_EV_2009.crt, mozilla/EC-ACC.crt, 
mozilla/emSign_ECC_Root_CA_-_C3.crt, mozilla/emSign_ECC_Root_CA_-_G3.crt, 
mozilla/emSign_Root_CA_-_C1.crt, mozilla/emSign_Root_CA_-_G1.crt, 
mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt, 
mozilla/Entrust_Root_Certification_Authority.crt, 
mozilla/Entrust_Root_Certification_Authority_-_EC1.crt, 
mozilla/Entrust_Root_Certification_Authority_-_G2.crt, 
mozilla/Entrust_Root_Certification_Authority_-_G4.crt, 
mozilla/ePKI_Root_Certification_Authority.crt, 
mozilla/e-Szigno_Root_CA_2017.crt, mozilla/E-Tugra_Certification_Authority.crt, 
mozilla/GDCA_TrustAUTH_R5_ROOT.crt, 
mozilla/GeoTrust_Primary_Certification_Authority_-_G2.crt, 
mozilla/Global_Chambersign_Root_-_2008.crt, 
mozilla/GlobalSign_ECC_Root_CA_-_R4.crt, 
mozilla/GlobalSign_ECC_Root_CA_-_R5.crt, mozilla/GlobalSign_Root_CA.crt, 
mozilla/GlobalSign_Root_CA_-_R2.crt, mozilla/GlobalSign_Root_CA_-_R3.crt, 
mozilla/GlobalSign_Root_CA_-_R6.crt, mozilla/Go_Daddy_Class_2_CA.crt, 
mozilla/Go_Daddy_Root_Certificate_Authority_-_G2.crt, mozilla/GTS_Root_R1.crt, 
mozilla/GTS_Root_R2.crt, mozilla/GTS_Root_R3.crt, mozilla/GTS_Root_R4.crt, 
mozilla/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.crt, 
mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2011.crt, 
mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2015.crt, 
mozilla/Hongkong_Post_Root_CA_1.crt, mozilla/Hongkong_Post_Root_CA_3.crt, 
mozilla/IdenTrust_Commercial_Root_CA_1.crt, 
mozilla/IdenTrust_Public_Sector_Root_CA_1.crt, mozilla/ISRG_Root_X1.crt, 
mozilla/Izenpe.com.crt, mozilla/Microsec_e-Szigno_Root_CA_2009.crt, 
mozilla/Microsoft_ECC_Root_Certificate_Authority_2017.crt, 
mozilla/Microsoft_RSA_Root_Certificate_Authority_2017.crt, 
mozilla/NAVER_Global_Root_Certification_Authority.crt, 
mozilla/NetLock_Arany_=Class_Gold=_Főtanúsítvány.crt, 
mozilla/Network_Solutions_Certificate_Authority.crt, 
mozilla/OISTE_WISeKey_Global_Root_GB_CA.crt, 
mozilla/OISTE_WISeKey_Global_Root_GC_CA.crt, mozilla/QuoVadis_Root_CA_1_G3.crt, 
mozilla/QuoVadis_Root_CA_2.crt, mozilla/QuoVadis_Root_CA_2_G3.crt, 
mozilla/QuoVadis_Root_CA_3.crt, mozilla/QuoVadis_Root_CA_3_G3.crt, 

Bug#999824: ima-evm-utils: missing evm portable signature verification in tooling

2022-01-24 Thread Bastian Germann

Control: retitle -1 ima-evm-utils: FTBFS because of the signature verification 
unit tests
Control: severity -1 serious

On Wed, 17 Nov 2021 10:35:05 +0100 Steffen Kothe wrote:
EVM signatures can be created with the option '--portable | -o ' to get 
rid of a hashing of i_version and fsuuid.


When files should be verified after a signing with '--portable' on the 
host, the tooling returns with "Verification failed" unless

the signing itself is correct.

The cause for this issue is a missing implementation for the probing
and verification of portable signatures.

A patch for this issue is already available in the official git source
of the ima-evm-utils tooling:

https://git.code.sf.net/p/linux-ima/ima-evm-utils
f4b901d081ec ("Add support for verifying portable EVM signatures")

The wrong checking of the signature format results in a false-positive 
error.


Note, that this bug also affects version 1.3.2-2.1 provided
by Debian/SID https://packages.debian.org/sid/ima-evm-utils.

The official release 1.4 of the ima-evm-utils contains this fixes.


Version 1.4 was imported but still fails to build from scratch on buildd 
because the unit tests for
that new feature do not run without gnutls-bin and softhsm2 installed as build 
dependencies.
I did not catch that building my NMU in a clean sid chroot. I do not know why, 
it still
builds in that chroot and claims two of the three test to succeed with those 
packages uninstalled.



Bug#1001625: python3-script-but-no-python3-dep unoverridable

2022-01-24 Thread Felix Lechner
Hi,

On Mon, Jan 24, 2022 at 4:03 AM Marc Haber  wrote:
>
> Starting which lintian version are Deb822 overrides allowed?

The Deb822 override format has not been released.

It will be very soon, however. The implementation of file
pointers—which appear inside square brackets on terminals and as live
links on our website—has made the old override format cumbersome for
many users.

> Does all
> Debian infrastructure run appropriately recent versions of lintian so
> that a package can safely migrate to Deb822 overrides?

I cannot speak for users of Lintian, but they are generally provided
with timely backports.

Kind regards
Felix Lechner



Bug#1004289: libpod package stops buld at override_dh_auto_build

2022-01-24 Thread Elimar Riesebieter
Source: libpod
Version: 3.4.4=ds1
Severity: important
X-Debbugs-Cc: hostmast...@hostsharing.net

Dear Maintainers,

I tried to backport libpod in bullseye. The build-dep's are installed
in two steps: apt build-dep libpod && apt build-dep -t unstable
libpod. The build stops at:

dh_auto_build: error: cd _output && go install -trimpath -v -p 20 -tags 
apparmor,ostree,seccomp,selinux,systemd -ldflags "-X 
main.buildInfo=3.4.4+ds1-1" github.com

make[1]: *** [debian/rules:29: override_dh_auto_build] Error 25
make[1]: Leaving directory '/source/podman/libpod-3.4.4+ds1'
make: *** [debian/rules:25: build] Error 2
dpkg-buildpackage: error: debian/rules build subprocess returned exit status 2
debuild: fatal error at line 1182:
dpkg-buildpackage -us -uc -ui failed

The very same error is triggered by building version 3.0.1+dfsg1.

Did that in a bullseye environment and in a pbuilder chroot.

Thanks
Elimar

-- System Information:
Debian Release: 11.2
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'stable-updates'), (500, 
'stable-security'), (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.15.0-0.bpo.2-amd64 (SMP w/20 CPU threads)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#1004180: [External] : Bug#1004180: mysql-8.0: should mysql-8.0 be removed from unstable?

2022-01-24 Thread Salvatore Bonaccorso
Hi Lars,

On Mon, Jan 24, 2022 at 11:00:16AM +0100, Lars Tangvald wrote:
> Hi,
> 
> This is on me. I've been working on getting updates ready, but let myself
> get bogged down with more long-running updates to the packaging (which is
> pretty outdated with regards to things like the standards version).
> 
> I'd like to make a better effort to keep it up-to-date (just focusing on
> keeping MySQL itself updated for now, I think).

Alright, thank you! In this case please feel free to close this
bugreport.

Regards,
Salvatore



Bug#1004180: [External] : Bug#1004180: mysql-8.0: should mysql-8.0 be removed from unstable?

2022-01-24 Thread Lars Tangvald

Hi,

This is on me. I've been working on getting updates ready, but let 
myself get bogged down with more long-running updates to the packaging 
(which is pretty outdated with regards to things like the standards 
version).


I'd like to make a better effort to keep it up-to-date (just focusing on 
keeping MySQL itself updated for now, I think).


--
Lars

On 22/01/2022 10:53, Salvatore Bonaccorso wrote:

Source: mysql-8.0
Version: 8.0.23-3
Severity: normal
X-Debbugs-Cc: car...@debian.org, 
t...@security.debian.org,locutusofb...@debian.org, lars.tangv...@oracle.com

Hi

While mysql-8.0 itself won't enter testing, the version in unstable is
as well only from february 2021, lacking behind several updates for
fixes in the Oracle CPUs.

Should mysql-8.0 be removed as well from unstable?

Regards,
Salvatore




Bug#1004288: iotjs: CVE-2021-46349 CVE-2021-46348 CVE-2021-46346 CVE-2021-46340 CVE-2021-46338

2022-01-24 Thread Neil Williams
Source: iotjs
Version: 1.0+715-1
Severity: important
Tags: security
X-Debbugs-Cc: codeh...@debian.org, Debian Security Team 


Hi,

The following vulnerabilities were published for iotjs.

CVE-2021-46349[0]:
| There is an Assertion 'type == ECMA_OBJECT_TYPE_GENERAL || type ==
| ECMA_OBJECT_TYPE_PROXY' failed at /jerry-core/ecma/operations/ecma-
| objects.c in JerryScript 3.0.0.


CVE-2021-46348[1]:
| There is an Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)'
| failed at /jerry-core/ecma/base/ecma-literal-storage.c in JerryScript
| 3.0.0.


CVE-2021-46346[2]:
| There is an Assertion 'local_tza ==
| ecma_date_local_time_zone_adjustment (date_value)' failed at /jerry-
| core/ecma/builtin-objects/ecma-builtin-date-
| prototype.c(ecma_builtin_date_prototype_dispatch_set):421 in
| JerryScript 3.0.0.


CVE-2021-46340[3]:
| There is an Assertion 'context_p-stack_top_uint8 ==
| SCAN_STACK_TRY_STATEMENT || context_p-stack_top_uint8 ==
| SCAN_STACK_CATCH_STATEMENT' failed at /parser/js/js-
| scanner.c(scanner_scan_statement_end) in JerryScript 3.0.0.


CVE-2021-46338[4]:
| There is an Assertion 'ecma_is_lexical_environment (object_p)' failed
| at /base/ecma-helpers.c(ecma_get_lex_env_type) in JerryScript 3.0.0.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-46349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46349
[1] https://security-tracker.debian.org/tracker/CVE-2021-46348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46348
[2] https://security-tracker.debian.org/tracker/CVE-2021-46346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46346
[3] https://security-tracker.debian.org/tracker/CVE-2021-46340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46340
[4] https://security-tracker.debian.org/tracker/CVE-2021-46338
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46338

Please adjust the affected versions in the BTS as needed.



-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.15.0-2-amd64 (SMP w/16 CPU threads)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#904572: move x11-utils to Suggests

2022-01-24 Thread Thomas Dickey
On Mon, Jan 24, 2022 at 10:06:46AM +0100, Harald Dunkel wrote:
> Maybe the Recommends could be replaced by a Suggests: x11-utils.
> By now I didn't even know that there is a tool "luit".

It's used (when available and if the locale encoding is not UTF-8) by xterm
for quite a while.  But it doesn't use the X display (unlike the other
programs in x11-utils).

Moving it to a separate package would only affect xterm and a (probably)
small number of direct command-line users.  Changing the "recommends" to
a "suggests" would have an impact on xterm, since some users would not
see luit automatically.  As I understand it, the best route would be to
get luit available separately and then change the xterm package to recommend
luit rather than x11-utils.

By the way - the existing version of luit uses libfontenc, which _is_ used
by several applications.  Take a look at

apt-rdepends --reverse libfontenc1

However, in my upgrade, I dispensed with that dependency, so the resulting
luit depends only on glibc and libz.  That makes it easily portable - unlike
most of x11-utils :-)

So... decoupling luit (and libfontenc1) from x11-utils will improve the
dependencies of both xterm and x11-utils.

-- 
Thomas E. Dickey 
https://invisible-island.net
ftp://ftp.invisible-island.net


signature.asc
Description: PGP signature


Bug#996980: [Pkg-opencl-devel] Bug#996980: khronos-opencl-clhpp: build-dependency loop between khronos-opencl-clhpp, khronos-opencl-headers, ocl-icd

2022-01-24 Thread Andreas Beckmann

On 21/10/2021 22.42, Steve Langasek wrote:

I have applied the attached patch in Ubuntu to break the bootstrap loop.
While I could drop the patch once the bootstrap is finished, I think this,
combined with adding the examples as an autopkgtest (which I have not
implemented here - sorry) would be an overall improvement in robustness, so
I'm submitting this bug for consideration.


I've implemented support for the  build profile, I hope that 
solves the dependency loop for bootstrapping.
The components missing for running the upstream testsuite (and not only 
compiling the trivial examples and out own header compile test) are 
there, too, so we run them at build time and as autopkgtest.


If I've missed something, i.e. there is still a bootstrap dependency 
loop, please let me know.


Andreas



Bug#997415: build depends on tex-gyre

2022-01-24 Thread Andrius Merkys
Control: tags -1 + patch

Hello,

This issue should be fixed by build-depending on tex-gyre which provides
the missing tgtermes.sty. I have successfully built
gprbuild-2021.0.0.0778b109 in clean chroot with tex-gyre additionally
installed.

Andrius



Bug#1002726: webext-quicktext: Please upgrade to 4.1

2022-01-24 Thread Alberto Luaces
Package: webext-quicktext
Followup-For: Bug #1002726
X-Debbugs-Cc: alua...@udc.es

Dear Maintainer,

This is not a "wishlist", the package is genuinely broken and doesn't work with 
current thunderbird from debian.

If help is needed, I can maintain it.  Otherwise it's best to keep it out of 
the archive.



Bug#1004285: davical: problems after upgrade to php 8, calendar clients reports "500"

2022-01-24 Thread Benno Overeinder

Some additional information.

On 24/01/2022 11:58, Benno Overeinder wrote:

* What exactly did you do (or not do) that was effective (or
  ineffective)?

I have looked at the apache2 log files and checked the /etc/php and
/etc/davical directories if there were any references to php7 instead
of php/php8.  The apache2 log file reported

[Mon Jan 24 11:29:29.678647 2022] [php:notice] [pid 684] [client /IPv6 address/] 
davical: LOG: response:-->DAViCal Fatal Error



The macOS Calendar application warned with the error message:
“500” to operation CalDAVAccountRefreshQueueableOperation



Bug#1004213: uscan: multiple mode=git source reuses same tmpdir and fails

2022-01-24 Thread Jonas Smedegaard
Control: tag -1 +patch

Quoting Jonas Smedegaard (2022-01-22 21:27:37)
> I want the package asterisk to embed 2 sources both from git without any
> tags, and added these:
> 
> opts=\
> component=Xamr,\
> mode=git,pgpmode=none,pretty=4.0.%cd,\
> dversionmangle=auto \
> https://github.com/traud/asterisk-amr \
> HEAD checksum
> 
> opts=\
> component=Xcodec2,\
> mode=git,pgpmode=none,pretty=0.0.%cd,\
> dversionmangle=auto \
> https://github.com/traud/asterisk-codec2 \
> HEAD checksum
> 
> But that fails like this:
> 
> fatal: destination path '../asterisk-temporary.2927923.git' already exists 
> and is not an empty directory.

This patch fixes this issue for me:

--- /usr/share/perl5/Devscripts/Uscan/Downloader.pm.orig2022-01-16 
10:45:20.0 +0100
+++ /usr/share/perl5/Devscripts/Uscan/Downloader.pm 2022-01-24 
12:19:01.720442693 +0100
@@ -87,7 +87,7 @@
 default => sub { {} });

 sub download () {
-my ($self, $url, $fname, $optref, $base, $pkg_dir, $pkg, $mode) = @_;
+my ($self, $url, $fname, $optref, $base, $pkg_dir, $pkg, $mode, 
$gitrepo_dir) = @_;
 my ($request, $response);
 $mode ||= $optref->mode;
 if ($mode eq 'http') {
@@ -145,8 +145,7 @@
 my $abs_dst = abs_path($dst);
 my $ver = $2;
 my $suffix  = $3;
-my $gitrepo_dir
-  = "$pkg-temporary.$$.git";# same as outside of downloader
+
 my ($gitrepo, $gitref) = split /[[:space:]]+/, $url, 2;
 my $clean = sub {
 uscan_exec_no_fail('rm', '-fr', $gitrepo_dir);
--- /usr/share/perl5/Devscripts/Uscan/WatchLine.pm.orig 2022-01-11 
14:35:47.0 +0100
+++ /usr/share/perl5/Devscripts/Uscan/WatchLine.pm  2022-01-24 
11:51:45.331351053 +0100
@@ -193,8 +193,10 @@
 has gitrepo_dir => (# Working repository used only within uscan.
 is  => 'ro',
 lazy=> 1,
-default => sub {
-$_[0]->{pkg} . "-temporary.$$.git";
+builder => sub {
+$_[0]->{component}
+? $_[0]->{pkg} . "-temporary.$$." . $_[0]->{component} . '.git'
+: $_[0]->{pkg} . "-temporary.$$.git";
 });
 has headers => (
 is  => 'ro',
@@ -1277,6 +1279,7 @@
 $self->pkg_dir,
 $self->pkg,
 $self->mode,
+$self->gitrepo_dir,
 );
 if ($download_available) {
 dehs_verbose



 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private

signature.asc
Description: signature


Bug#1003947: New crash with stack trace

2022-01-24 Thread Mikhail Zhukov
Maybe it will usefull

1642916816.083939 jupiter kernel: BUG: unable to handle page fault for
address: a1dbd4d8
1642916816.101311 jupiter kernel: #PF: supervisor write access in kernel
mode
1642916816.105396 jupiter kernel: #PF: error_code(0x0003) - permissions
violation
1642916816.109831 jupiter kernel: PGD 21d40e067 P4D 21d40e067 PUD 21d40f063
PMD 80021ce000e1
1642916816.113732 jupiter kernel: Oops: 0003 [#1] SMP PTI
1642916816.113889 jupiter kernel: CPU: 4 PID: 988 Comm: pulseaudio Not
tainted 5.10.0-11-amd64 #1 Debian 5.10.92-1
1642916816.113926 jupiter kernel: Hardware name: Intel(R) Client Systems
NUC8i7BEH/NUC8BEB, BIOS BECFL357.86A.0089.2021.0621.1343 06/21/2021
1642916816.113943 jupiter kernel: RIP:
0010:native_queued_spin_lock_slowpath+0x193/0x1d0
1642916816.114093 jupiter kernel: Code: ff ff ff c6 47 01 00 e9 21 ff ff ff
c1 ee 12 83 e0 03 83 ee 01 48 c1 e0 05 48 63 f6 48 05 40 09 03 00 48 03 04
f5 00 b9 d7 a1 <48> 89 10 8b 42 08 85 c0 75 09 f3 90 8b 42 08 85 c0 74 f7
48 8b 32
1642916816.114130 jupiter kernel: RSP: 0018:9f5780f23a50 EFLAGS:
00010086
1642916816.114146 jupiter kernel: RAX: a1dbd4d8 RBX:
8a4ae4aa36a0 RCX: 0014
1642916816.114161 jupiter kernel: RDX: 8a511dd30940 RSI:
21be RDI: 8a4986fea500
1642916816.114309 jupiter kernel: RBP: 8a4986fea500 R08:
0014 R09: 
1642916816.114342 jupiter kernel: R10: 8a49c0f51a00 R11:
 R12: 0286
1642916816.114359 jupiter kernel: R13: 9f5780f23c50 R14:
0009 R15: 8a49825c7500
1642916816.114374 jupiter kernel: FS:  7f8fab821000()
GS:8a511dd0() knlGS:
1642916816.114540 jupiter kernel: CS:  0010 DS:  ES:  CR0:
80050033
1642916816.114714 jupiter kernel: CR2: a1dbd4d8 CR3:
00010a5ee001 CR4: 003706e0
1642916816.114752 jupiter kernel: Call Trace:
1642916816.114769 jupiter kernel:  _raw_spin_lock_irqsave+0x32/0x40
1642916816.114786 jupiter kernel:  remove_wait_queue+0x14/0x60
1642916816.114934 jupiter kernel:  poll_freewait+0x6b/0xa0
1642916816.114968 jupiter kernel:  do_sys_poll+0x49d/0x5a0
1642916816.114984 jupiter kernel:  ? get_order+0x20/0x20
1642916816.115129 jupiter kernel:  ? get_order+0x20/0x20
1642916816.115165 jupiter kernel:  ? get_order+0x20/0x20
1642916816.115185 jupiter kernel:  ? get_order+0x20/0x20
1642916816.115201 jupiter kernel:  ? get_order+0x20/0x20
1642916816.115342 jupiter kernel:  ? get_order+0x20/0x20
1642916816.115363 jupiter kernel:  ? get_order+0x20/0x20
1642916816.115379 jupiter kernel:  ? get_order+0x20/0x20
1642916816.115393 jupiter kernel:  ? get_order+0x20/0x20
1642916816.115507 jupiter kernel:  __x64_sys_ppoll+0xbc/0x150
1642916816.115530 jupiter kernel:  do_syscall_64+0x33/0x80
1642916816.115548 jupiter kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
1642916816.115673 jupiter kernel: RIP: 0033:0x7f8fac4844f6
1642916816.115695 jupiter kernel: Code: 7c 24 08 e8 ac 18 f9 ff 4c 8b 54 24
18 48 8b 74 24 10 41 b8 08 00 00 00 41 89 c1 48 8b 7c 24 08 4c 89 e2 b8 0f
01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 2a 44 89 cf 89 44 24 08 e8 d6 18 f9
ff 8b 44
1642916816.115728 jupiter kernel: RSP: 002b:7ffc39024b60 EFLAGS:
0293 ORIG_RAX: 010f
1642916816.115856 jupiter kernel: RAX: ffda RBX:
55fe71e0d2c0 RCX: 7f8fac4844f6
1642916816.115876 jupiter kernel: RDX:  RSI:
0027 RDI: 55fe71fad660
1642916816.115895 jupiter kernel: RBP:  R08:
0008 R09: 
1642916816.115915 jupiter kernel: R10:  R11:
0293 R12: 
1642916816.116055 jupiter kernel: R13: 55fe71e0d2c0 R14:
0001 R15: 55fe71eba830
1642916816.116076 jupiter kernel: Modules linked in: xt_nat xt_tcpudp veth
xt_conntrack nft_chain_nat xt_MASQUERADE nf_nat nf_conntrack_netlink
nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xfrm_user xfrm_algo nft_counter
xt_addrtype nft_compat nf_tables br_netfilter bridge stp llc ctr ccm rfcomm
cmac algif_hash algif_skcipher af_alg bnep btusb btrtl btbcm btintel
bluetooth uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2
videobuf2_common jitterentropy_rng snd_usb_audio drbg videodev ansi_cprng
snd_usbmidi_lib snd_rawmidi ecdh_generic snd_seq_device ecc crc16 joydev mc
nfnetlink intel_rapl_msr intel_rapl_common overlay snd_sof_pci
snd_sof_intel_byt snd_sof_intel_ipc x86_pkg_temp_thermal intel_powerclamp
coretemp iwlmvm snd_hda_codec_hdmi snd_sof_intel_hda_common
snd_sof_xtensa_dsp kvm_intel nls_ascii snd_sof mei_hdcp nls_cp437
snd_sof_intel_hda mac80211 kvm snd_soc_skl snd_soc_hdac_hda
snd_hda_codec_realtek vfat snd_hda_ext_core snd_hda_codec_generic fat
libarc4 snd_soc_sst_ipc irqbypass ledtrig_audio
1642916816.116227 jupiter kernel:  snd_soc_sst_dsp snd_soc_acpi_intel_match
ghash_clmulni_intel iwlwifi snd_soc_acpi snd_hda_intel snd_intel_dspcfg
soundwire_intel 

Bug#1003796: ITP: ifupdown-ng -- network device manager compatible with ifupdown

2022-01-24 Thread Thomas Goirand

On 1/23/22 21:03, d...@darkboxed.org wrote:

Hi Thomas,

I've been working on the ifupdown-ng packaging today. I had a look at your
existing git repo and did incorporate most of the debian/ files from that
but decided to start the repo from scratch. The main reason being that I
don't feel the gbp-import-ref workflow is quite ready yet so while I would
prefer basing Debian packaging on the upstream git repo as you've done it
just causes more friction right now in my experience.


Hi,

I'm not using gbp-import-ref, but my own tooling from 
openstack-pkg-tools. To import a new tag, I just do:


./debian/rules fetch-upstream-remote
git merge -X theirs 
dch -i # edit changelog to match the new tag name
./debian/rules gen-orig-xz

Maybe gbp-import-ref does the same thing? I've used this workflow for 
all of the OpenStack packages [1] without any issue for YEARS.


I'm also not sure what kind of "friction" you're referring to...


Could you add me to the debian/ifupdown-ng repo so I can push my work
there? In the meantime the repo is here:

 https://salsa.debian.org/dxld-guest/ifupdown-ng/

One significant thing I noticed is that you seem to have Depends
specifically for kfreebsd and hurd which I haven't dealt with yet. Did you
test this stuff on those systems?


I am not sure why I wrote these dependencies, probably because it was 
like that upstream already. I haven't tested on these arch, however, it 
should be easy to do so with Virtualbox or Qemu. FYI, when I first 
uploaded openrc to Debian, I used Virtualbox with the help of an OpenRC 
upstream author, so we could check and fix the port. These aren't 
official arch these days, so it maters less.



Ordinarily I would think we could just go and get access porterbox for
these arches but since I need to play with networking stuff for testing the
porterboxes are likely not going to be much help.


Right, porterbox wont be of any help here.
Anyway, I have merged all of your changes to the main Salsa repository, 
and gave you access to it.


Since you've audited my work and the package looks like in good enough 
shape, I have uploaded the final result. It's now up for review on the 
FTP master NEW queue. Let's hope it clears the NEW queue quickly... :)


When it does, I very much welcome you to take care of this package as 
much as possible yourself, as I'm a fairly busy DD maintaining many 
packages. I will happily sponsor any change you want to include.


Cheers,

Thomas Goirand (zigo)

[1] 
https://qa.debian.org/developer.php?login=team%2Bopenstack%40tracker.debian.org




Bug#1004287: ITP: rapidcheck -- C++ framework for property based testing

2022-01-24 Thread Adam Borowski
Package: wnpp
Severity: wishlist
Owner: Adam Borowski 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: rapidcheck
* URL : https://github.com/emil-e/rapidcheck
* License : BSD-2
  Programming Lang: C++
  Description : C++ framework for property based testing
 RapidCheck is a C++ framework for property based testing inspired by
 QuickCheck and other similar frameworks.  In property based testing,
 you state facts about your code that given certain precondition should
 always be true.  RapidCheck then generates random test data to try and
 find a case for which the property doesn't hold.  If such a case is
 found, RapidCheck tries to find the smallest case (for some definition
 of smallest) for which the property is still false and then displays
 this as a counterexample.  For example, if the input is an integer,
 RapidCheck tries to find the smallest integer for which the property is
 false.

I don't really care about this package, but it's a Build-Dependency.



Bug#1004286: lintian: Consider switching from libio-prompt-tiny-perl to libio-prompter-perl

2022-01-24 Thread Simon Chopin
Source: lintian
Severity: wishlist
X-Debbugs-Cc: simon.cho...@canonical.com

Hello,

In 2.105, Lintian introduced a new dependency libio-prompt-tiny-perl.
In Ubuntu, lintian is part of the main pocket, whereas
libio-prompt-tiny-perl is part of universe, so syncing lintian means
that we have to include this new dependency in main.

However, we already have libio-prompter-perl in main via another
dependency chain, and looking at the APIs, I believe it would be
possible to simply change "use IO::Prompt::Tiny qw(prompt);" to "use
IO::Prompter qw(prompt);" without any significant impact. Would you be
willing to consider such a change?

Thanks,
--
Simon Chopin
Foundations Team Ubuntu MOTU
simon.cho...@canonical.comscho...@ubuntu.com



Bug#1004285: davical: problems after upgrade to php 8, calendar clients reports "500"

2022-01-24 Thread Benno Overeinder
Package: davical
Version: 1.1.10-1
Severity: grave
Justification: renders package unusable
X-Debbugs-Cc: be...@overeinder.net

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?

I am using debian testing.  After upgrade to php8 (with all dependencies),
my calendar applications/clients on laptop and mobile were unable to
contact the davical server.  I have also logged into the davical (apache2)
server via web browser, and there the user administration web pages seem
to work as before.

   * What exactly did you do (or not do) that was effective (or
 ineffective)?

I have looked at the apache2 log files and checked the /etc/php and
/etc/davical directories if there were any references to php7 instead
of php/php8.  The apache2 log file reported

[Mon Jan 24 11:29:29.678647 2022] [php:notice] [pid 684] [client /IPv6 
address/] davical: LOG: response:-->DAViCal Fatal Error

   * What was the outcome of this action?

There were no hints or clues for me to further investigate what might
be going on.

   * What outcome did you expect instead?

*** End of the template - remove these template lines ***


-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 5.15.0-3-amd64 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages davical depends on:
ii  libawl-php0.62-1
ii  libdbd-pg-perl3.15.0-2
ii  libyaml-perl  1.30-1
ii  perl  5.32.1-6
ii  php   2:8.1+92
ii  php-pgsql 2:8.1+92
ii  php-xml   2:8.1+92
ii  php8.1 [php]  8.1.1-4
ii  php8.1-cli [php-cli]  8.1.1-4
ii  php8.1-pgsql [php-pgsql]  8.1.1-4
ii  php8.1-xml [php-xml]  8.1.1-4
ii  postgresql-client-14 [postgresql-client]  14.1-5

Versions of packages davical recommends:
ii  php-curl2:8.1+92
ii  php8.1-curl [php-curl]  8.1.1-4
ii  postgresql  14+237

Versions of packages davical suggests:
pn  php-ldap | php5-ldap  

-- no debconf information



Bug#692072: README.Debian is misleading about no script to update options when ppp comes up

2022-01-24 Thread Ondřej Surý
Package: bind9
Version: 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
Followup-For: Bug #692072
Control: close -1 1:9.12.2.P1+dfsg-1

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi,

the README.Debian files has been greatly simplified as of bind9
1:9.12.2.P1+dfsg-1, for the oldstable distribution, we are not going to touch
it, so I am closing the issue.

Ondrej

- -- System Information:
Debian Release: 11.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads)
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_IE:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages bind9 depends on:
ii  adduser3.118
ii  bind9-libs 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
ii  bind9-utils1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
ii  debconf [debconf-2.0]  1.5.77
ii  dns-root-data  2021011101
ii  iproute2   5.10.0-4
ii  libc6  2.31-13+deb11u2
ii  libcap21:2.44-1
ii  libfstrm0  0.6.0-1+b1
ii  libjson-c5 0.15-2
ii  liblmdb0   0.9.24-1+0~20200325.6+debian10~1.gbpfd112d
ii  libmaxminddb0  1.5.2-1
ii  libnghttp2-14  1.43.0-1
ii  libprotobuf-c1 1.3.3-1+b2
ii  libssl1.1  1.1.1k-1+deb11u1
ii  libuv1 1.40.0-2
ii  libxml22.9.12+dfsg-0+0~20210621.9+debian11~1.gbp43e861
ii  lsb-base   11.1.0
ii  netbase6.3
ii  zlib1g 1:1.2.11.dfsg-2

bind9 recommends no packages.

Versions of packages bind9 suggests:
pn  bind-doc   
ii  bind9-dnsutils [dnsutils]  1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
pn  resolvconf 
pn  ufw

- -- no debconf information

-BEGIN PGP SIGNATURE-
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=FEAo
-END PGP SIGNATURE-



Bug#905019: bind9: Red Black Tree sanity check triggered - Fatal error in rbtdb.c, RUNTIME_CHECK failed

2022-01-24 Thread Ondřej Surý
Package: bind9
Version: 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
Followup-For: Bug #905019
Control: close -1

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi,

this has been reported against a version of BIND 9 no longer in oldstable or
stable distribution.  Closing the issue.

Ondrej

- -- System Information:
Debian Release: 11.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads)
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_IE:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages bind9 depends on:
ii  adduser3.118
ii  bind9-libs 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
ii  bind9-utils1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
ii  debconf [debconf-2.0]  1.5.77
ii  dns-root-data  2021011101
ii  iproute2   5.10.0-4
ii  libc6  2.31-13+deb11u2
ii  libcap21:2.44-1
ii  libfstrm0  0.6.0-1+b1
ii  libjson-c5 0.15-2
ii  liblmdb0   0.9.24-1+0~20200325.6+debian10~1.gbpfd112d
ii  libmaxminddb0  1.5.2-1
ii  libnghttp2-14  1.43.0-1
ii  libprotobuf-c1 1.3.3-1+b2
ii  libssl1.1  1.1.1k-1+deb11u1
ii  libuv1 1.40.0-2
ii  libxml22.9.12+dfsg-0+0~20210621.9+debian11~1.gbp43e861
ii  lsb-base   11.1.0
ii  netbase6.3
ii  zlib1g 1:1.2.11.dfsg-2

bind9 recommends no packages.

Versions of packages bind9 suggests:
pn  bind-doc   
ii  bind9-dnsutils [dnsutils]  1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
pn  resolvconf 
pn  ufw

- -- no debconf information

-BEGIN PGP SIGNATURE-
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=0m7e
-END PGP SIGNATURE-



Bug#1003567: Please make a separate package for mistune 2.x

2022-01-24 Thread Michael R. Crusoe

On Tue, 11 Jan 2022 22:38:44 +0100 p...@debian.org wrote:
> Package: python3-schema-salad
> Severity: wishlist
>
> Dear maintainer,
>
> Your package python3-schema-salad depends on python3-mistune 0.8.4
> which is no longer maintained and deprecated in favour of version
> 2.0.0.
>
> As python3-mistune 2.0.0 is not backward compatible, I reverted the
> upload of it that I did in unstable and python3-mistune 0.8.4 will
> stay around a bit longer.
>
> In the meantime, please try to see if upstream of
> python3-schema-salad either released a version that is compatible
> with python3-mistune 2.0.0 or if python3-schema-salad can easily be
> fixed to support such a version. As soon as you're ready to upload
> your package please update this bug report and we'll try to
> coordinate so that I release python3-mistune at a time that is fit
> for you to also release python3-schema-salad.

Dear Pierre-Elliott Bécue,

Thank you for trying to find a way forward in this mess. I am also the 
upstream maintainer for schema-salad. We have yet to find a way to 
support mistune 2.x


Here is our attempt so far:

https://github.com/common-workflow-language/schema_salad/pull/496/files?short_path=5c6a130#diff-5c6a1301c6b59b30a040d747d065e861d3dd98bde0e5a4356d92d594e9835986

And an issue I opened with mistune directly about a regression in 
multi-line list handling that goes against multiple markdown specs: 
https://github.com/lepture/mistune/issues/296


We have not decided if we will switch to another library, wait for a 
fixed mistune 2.x release, or keep with the older version.


> I intend to upload src:mistune 2.0.0 to unstable between March the

> 15th and April the 15th (depending on the progress of its
> reverse-dependencies). I'll raise the severity of this bug
> approximately a month before making such an upload.

Since Mistune 2.0.0 regresses its support for standard markdown, I ask 
that a separate package be made for mistune 2.x to give more time for 
mistune 0.8.x users to migrate to mistune 2.x or another library entirely.


Cheers,


--
Michael R. Crusoe



OpenPGP_signature
Description: OpenPGP digital signature


Bug#1003653: Revision of removal of rename.ul from package util-linux

2022-01-24 Thread Chris Hofstaedtler
* Sean Whitton  [220124 05:56]:
> On Sun 23 Jan 2022 at 10:27PM +01, Christoph Berg wrote:
> > Re: Sean Whitton
> >> On Sun 23 Jan 2022 at 10:04PM +01, Chris Hofstaedtler wrote:
> >> > I guess the best thing would be to introduce a new binary package,
> >> > but I am out of ideas on naming it. Open for ideas here.
> >>
> >> util-linux-extra?
> >
> > If it's about rename only, "rename-ul" or even "rename.ul"?
> >
> > I guess it should also contain the historical name as a symlink.
> >
> > Christoph
> 
> Well, Chris mentioned wanting to transition some other things out of the
> essential package in addition to this one.  Also, the ftp team would not
> love the idea of a single-script package.

I think this will mostly depend on what src:rename will/should do
(+CC: Debian Perl Group, Dominic Hargreaves).

For context, the idea is that /usr/bin/rename should become
src:util-linux' rename implementation. As was found in the past,
this is not possible using alternatives. As the util-linux
maintainer, I would also prefer to not having alternatives.

If the rename binary package drops /usr/bin/rename, rename.ul(*) can
start installing that, and conflict on old versions of rename.
Or, to make this transition more clear to users:
 - src:rename could drop /usr/bin/rename AND rename its binary package to
   file-rename (?) or prename (?)
 - rename.ul could Conflict: rename indefinitely

Chris

(*) "working title"



Bug#1004284: tomcat9: postinst creates wrong userhome via systemd-sysusers

2022-01-24 Thread Karsten Schöke
Package: tomcat9
Version: 9.0.43-2~deb11u3
Severity: important

Dear Maintainer,

Debian creates in the postinst script via systemd-sysusers
a system user named tomcat whose home directory is /var/lib/tomcat. 
This directory does not exist, but /var/lib/tomcat9

-- System Information:
Debian Release: 11.2
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-11-amd64 (SMP w/4 CPU threads)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages tomcat9 depends on:
ii  lsb-base11.1.0
ii  systemd 247.3-6
ii  tomcat9-common  9.0.43-2~deb11u3
ii  ucf 3.0043

Versions of packages tomcat9 recommends:
ii  libtcnative-1  1.2.26-1

Versions of packages tomcat9 suggests:
ii  tomcat9-admin 9.0.43-2~deb11u3
pn  tomcat9-docs  
pn  tomcat9-examples  
pn  tomcat9-user  

-- no debconf information



Bug#948612: Unintelligble error message

2022-01-24 Thread Ondřej Surý
Package: bind9-dnsutils
Version: 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
Followup-For: Bug #948612
Control: close -1

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi,

the bug report is against a version of BIND 9 no longer in stable or oldstable
release.  Closing the bug report.

Ondrej

- -- System Information:
Debian Release: 11.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads)
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_IE:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages bind9-dnsutils depends on:
ii  bind9-host [host]  1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
ii  bind9-libs 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
ii  libc6  2.31-13+deb11u2
ii  libedit2   3.1-20191231-2+b1
ii  libidn2-0  2.3.0-5
ii  libkrb5-3  1.18.3-6+deb11u1
ii  libprotobuf-c1 1.3.3-1+b2

bind9-dnsutils recommends no packages.

bind9-dnsutils suggests no packages.

- -- no debconf information

-BEGIN PGP SIGNATURE-
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=32cr
-END PGP SIGNATURE-



Bug#1000162: ima-evm-utils: FTBFS with no internet connection

2022-01-24 Thread Dmitry Baryshkov
пн, 24 янв. 2022 г. в 13:00, Bastian Germann :
>
> On Thu, 18 Nov 2021 21:59:12 +0100 Bastian Germann  wrote:
> > Your package fails to build from scratch in an environment with no 
> > internect connection.
> > Please check the buildd logs for this.
>
> I am going to fix this via a NMU as it was not resolved with the latest 
> upload.

Ack for the NMU.

-- 
With best wishes
Dmitry



Bug#901394: bind9utils missing manuals, bind9 extra manuals

2022-01-24 Thread Ondřej Surý
Package: bind9
Version: 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
Followup-For: Bug #901394
Control: close -1

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi,

the PKCS#11 build has been dropped from the package, closing the bug.

Ondrej

- -- System Information:
Debian Release: 11.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads)
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_IE:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages bind9 depends on:
ii  adduser3.118
ii  bind9-libs 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
ii  bind9-utils1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
ii  debconf [debconf-2.0]  1.5.77
ii  dns-root-data  2021011101
ii  iproute2   5.10.0-4
ii  libc6  2.31-13+deb11u2
ii  libcap21:2.44-1
ii  libfstrm0  0.6.0-1+b1
ii  libjson-c5 0.15-2
ii  liblmdb0   0.9.24-1+0~20200325.6+debian10~1.gbpfd112d
ii  libmaxminddb0  1.5.2-1
ii  libnghttp2-14  1.43.0-1
ii  libprotobuf-c1 1.3.3-1+b2
ii  libssl1.1  1.1.1k-1+deb11u1
ii  libuv1 1.40.0-2
ii  libxml22.9.12+dfsg-0+0~20210621.9+debian11~1.gbp43e861
ii  lsb-base   11.1.0
ii  netbase6.3
ii  zlib1g 1:1.2.11.dfsg-2

bind9 recommends no packages.

Versions of packages bind9 suggests:
pn  bind-doc   
ii  bind9-dnsutils [dnsutils]  1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
pn  resolvconf 
pn  ufw

- -- no debconf information

-BEGIN PGP SIGNATURE-
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=Z4k1
-END PGP SIGNATURE-



Bug#901078: Bind9 port binding problem

2022-01-24 Thread Ondřej Surý
Package: bind9
Version: 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
Followup-For: Bug #901078
Control: close -1

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi,

this has been filled against version of BIND 9 that's not in Debian anymore.

Closing the bug.

Ondrej

- -- System Information:
Debian Release: 11.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads)
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_IE:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages bind9 depends on:
ii  adduser3.118
ii  bind9-libs 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
ii  bind9-utils1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
ii  debconf [debconf-2.0]  1.5.77
ii  dns-root-data  2021011101
ii  iproute2   5.10.0-4
ii  libc6  2.31-13+deb11u2
ii  libcap21:2.44-1
ii  libfstrm0  0.6.0-1+b1
ii  libjson-c5 0.15-2
ii  liblmdb0   0.9.24-1+0~20200325.6+debian10~1.gbpfd112d
ii  libmaxminddb0  1.5.2-1
ii  libnghttp2-14  1.43.0-1
ii  libprotobuf-c1 1.3.3-1+b2
ii  libssl1.1  1.1.1k-1+deb11u1
ii  libuv1 1.40.0-2
ii  libxml22.9.12+dfsg-0+0~20210621.9+debian11~1.gbp43e861
ii  lsb-base   11.1.0
ii  netbase6.3
ii  zlib1g 1:1.2.11.dfsg-2

bind9 recommends no packages.

Versions of packages bind9 suggests:
pn  bind-doc   
ii  bind9-dnsutils [dnsutils]  1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
pn  resolvconf 
pn  ufw

- -- no debconf information

-BEGIN PGP SIGNATURE-
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=yH/w
-END PGP SIGNATURE-



Bug#840714: bind9 FTCBFS: python3 dependency, missing --host flags, bad configure checks, etc

2022-01-24 Thread Ondřej Surý
Source: bind9
Followup-For: Bug #840714
Control: fixed -1 1:9.17.0-1

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi,

the python3 ply dependency has been dropped, marking it as fixed in 9.17.0+.

Ondrej

- -- System Information:
Debian Release: 11.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads)
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_IE:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

- -- no debconf information

-BEGIN PGP SIGNATURE-

iQKTBAEBCgB9FiEEw2Gx4wKVQ+vGJel9g3Kkd++uWcIFAmHufllfFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEMz
NjFCMUUzMDI5NTQzRUJDNjI1RTk3RDgzNzJBNDc3RUZBRTU5QzIACgkQg3Kkd++u
WcIYHA/7BLafWM2NYt6ZxkVF413R+2vkSID1o7SJ4ySLz+22oiGKixPDYdzv1+RS
yqppxvrzV6sFgYsBNSH0MiQxAxXzbSQ/kCr/UD8LjPkFbxu4iTdDwNd6Y4OL7sL8
wlRvNiii642YrTql6pOYKsHMGv+fiRTTvKEASoBOio1TV5OJy70YiWA/D05mzq/u
Kfu5O0DEDW1mITK5vYz5vQCc2ETiv3oBFRh/3lfBswYPZRtP7OhiGWZGLNAQWNEJ
f2QhkE33ssCSJeWAJayBcVV0K9FuXdJzjVtNk0ORR4RhpOTNm67wj4g+6sTgNpcO
W/AaDcuxny/lacjw9o6TmmvF7uCYBGITPUKR0SMTikubAbXysDmxUXMz8B0FJMmD
8B0ZAwccXu81PD306d21hgpGxLh7GBpA4OqZZ3bpidD4jIxmTl32/qmpZ1EAK1rL
f6g0j4tzb/8k3Nq9Q0sg04u0UgO1g3GgmL1NDVbK6JLw+P/KslkTNLlGSIOYaHj/
/DOSwjXFWCEfE+wUSDw1aC/LMiDUAzV3YRlm3ot1AFKcSpDzu5denn19nfnrhgIe
iidxVpLzp+abmLkDKS5Wr2JZ8i73NIrZ5yFf3ABN+QxWnlOc4g3xf0AEh+Oy5vcm
szJG5WXwZeCqLcohJ0vrqhXdi80i2t2KbqsfJSwLaOOPzSJ/Pmc=
=X2Vk
-END PGP SIGNATURE-



Bug#979276: xserver-xorg-video-intel: Server fails to start: "Illegal instruction"

2022-01-24 Thread Julien Cristau
On Sat, Jan 22, 2022 at 12:56:25AM -0500, Stefan Monnier wrote:
> Julien Cristau [2021-08-23 10:07:30] wrote:
> > On Sun, Aug 22, 2021 at 03:12:58PM -0400, Stefan Monnier wrote:
> >> > I just tried to upgrade my `testing` installation but the problem is
> >> > still present.  Did you install the patch there?
> >> I just upgraded to the new `bullseye` release and the problem is
> >> still there.
> > Well yes.  I've been waiting for someone affected to test the patch.
> 
> Hmm... I just tried to figure out how to build a patched package, but
> that failed.
> 
> The instructions I found on debian.org seemed quite long (aimed at
> Debian developers, it seems), so I ended up following probably obsolete
> random help off the net.
> 
I've got a package up at
https://people.debian.org/~jcristau/xserver-xorg-video-intel_2.99.917+git20200714-1+sse2_i386.deb

Having now had confirmation it's working from a couple of users, I'll
try to get the fix into unstable and a stable update soon.

Cheers,
Julien



Bug#894000: bind9rndc: connect failed: 127.0.0.1#953: connection refused

2022-01-24 Thread Ondřej Surý
Package: bind9
Version: 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
Followup-For: Bug #894000
Control: close -1

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi,

the bug report doesn't contain enough information to practically go on.  The
permissions on {/var}/run/bind is managed by systemd-tmpfiles, so perhaps
something happened there?

I am closing the bug report as it makes little sense to keep it open.

Ondrej

- -- System Information:
Debian Release: 11.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads)
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_IE:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages bind9 depends on:
ii  adduser3.118
ii  bind9-libs 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
ii  bind9-utils1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
ii  debconf [debconf-2.0]  1.5.77
ii  dns-root-data  2021011101
ii  iproute2   5.10.0-4
ii  libc6  2.31-13+deb11u2
ii  libcap21:2.44-1
ii  libfstrm0  0.6.0-1+b1
ii  libjson-c5 0.15-2
ii  liblmdb0   0.9.24-1+0~20200325.6+debian10~1.gbpfd112d
ii  libmaxminddb0  1.5.2-1
ii  libnghttp2-14  1.43.0-1
ii  libprotobuf-c1 1.3.3-1+b2
ii  libssl1.1  1.1.1k-1+deb11u1
ii  libuv1 1.40.0-2
ii  libxml22.9.12+dfsg-0+0~20210621.9+debian11~1.gbp43e861
ii  lsb-base   11.1.0
ii  netbase6.3
ii  zlib1g 1:1.2.11.dfsg-2

bind9 recommends no packages.

Versions of packages bind9 suggests:
pn  bind-doc   
ii  bind9-dnsutils [dnsutils]  1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec
pn  resolvconf 
pn  ufw

- -- no debconf information

-BEGIN PGP SIGNATURE-

iQKTBAEBCgB9FiEEw2Gx4wKVQ+vGJel9g3Kkd++uWcIFAmHuedFfFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEMz
NjFCMUUzMDI5NTQzRUJDNjI1RTk3RDgzNzJBNDc3RUZBRTU5QzIACgkQg3Kkd++u
WcLkyRAAkXXbvSI5HVILUkMKntSF7XzK5QWhGlcyFoqAZoH2kvWekytAoiFEJAfU
ae6UClqQvJ7ndWV1KqN7ymMtRMOzU6mVqifKp5AX1a5hMNIZppBMhUBtXs/qIX0i
1A4nbbkiUB2hfa2qDZMod5xa+c+bbEtqNk4swV7cA1G3+TNiEtLEJyALQ5TE10hN
fvTz3SACP5IfZjv4AwS8SJ3oX3wdVFAFYs/yQcwS+bn5JrCPOuK5Vcv2St3Y5TyR
u8vEA0lD3KeC9CgbqYsfLHP4QUD66hscaELjm+EsKnL7DSSm6j0fOvJARUt7t3vQ
VaviN+ftSlHBLelKzjQ0m8qzCn4Z0ZuHlqWZnylGm6uNnsuYE2OLzgaAmCzdw1/0
+TtGX/i5+xZjhN0YOS1ezDeqh3/6J7TUlWPduiXSK6DUhRoAgefU8YfodfJvUhds
5mOcPolbk6hySs+WVGPgMs+uUXtdEi13JxrN4Tgq27oceiIIzKLIJTZW80gELWmK
eDwgQXra3g7PhcbJf/DRsbImU8HPT5BX6KAYN6hjtOmWFG/tldf/dd8K+oWT2RMr
gMLEsqc1im5Gwf6cWrs+mflnUjsDhysSSSIVEEH0kxsThHBTX3iDXZXtHW/gp31w
kKk3UGCsP9Q0hflRARPP1pi5Ks70WKtMWnw5kUWPhPHHbrlGLH0=
=SKkt
-END PGP SIGNATURE-



Bug#1000162: ima-evm-utils: FTBFS with no internet connection

2022-01-24 Thread Bastian Germann

On Thu, 18 Nov 2021 21:59:12 +0100 Bastian Germann  wrote:

Your package fails to build from scratch in an environment with no internect 
connection.
Please check the buildd logs for this.


I am going to fix this via a NMU as it was not resolved with the latest upload.diff -Nru ima-evm-utils-1.4/debian/changelog ima-evm-utils-1.4/debian/changelog
--- ima-evm-utils-1.4/debian/changelog  2022-01-22 04:21:14.0 +0100
+++ ima-evm-utils-1.4/debian/changelog  2022-01-24 10:49:06.0 +0100
@@ -1,3 +1,11 @@
+ima-evm-utils (1.4-1.1) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * d/libimaevm2.symbols: Correct SO version
+  * d/control: Add docbook-xml build dependency (Closes: #1000162)
+
+ -- Bastian Germann   Mon, 24 Jan 2022 10:49:06 +0100
+
 ima-evm-utils (1.4-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru ima-evm-utils-1.4/debian/control ima-evm-utils-1.4/debian/control
--- ima-evm-utils-1.4/debian/control2021-09-24 11:39:11.0 +0200
+++ ima-evm-utils-1.4/debian/control2022-01-24 10:49:06.0 +0100
@@ -5,6 +5,7 @@
 Standards-Version: 4.6.0
 Build-Depends: asciidoc,
  debhelper (>= 11),
+ docbook-xml,
  docbook-xsl,
  attr,
  libattr1-dev,
diff -Nru ima-evm-utils-1.4/debian/libimaevm2.symbols 
ima-evm-utils-1.4/debian/libimaevm2.symbols
--- ima-evm-utils-1.4/debian/libimaevm2.symbols 2021-09-24 11:39:11.0 
+0200
+++ ima-evm-utils-1.4/debian/libimaevm2.symbols 2022-01-24 10:49:06.0 
+0100
@@ -1,4 +1,4 @@
-libimaevm.so.2 libimaevm2 #MINVER#
+libimaevm.so.3 libimaevm2 #MINVER#
 * Build-Depends-Package: libimaevm-dev
  calc_keyid_v1@Base 1.3.1
  calc_keyid_v2@Base 1.3.1


Bug#942502: src:isc-dhcp: please switch to bundled BIND 9 libraries

2022-01-24 Thread Ondřej Surý
Source: isc-dhcp
Followup-For: Bug #942502
Control: severity -1 serious

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Maintainer,

BIND 9.11 will go EOL with the next release and ISC DHCP team is making switch
to maintain the bundled libraries in ISC DHCP on their own.  This means there
will be only option now - use the bundled libraries as they will be maintained
inside the ISC DHCP project.

Ondrej

- -- System Information:
Debian Release: 11.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads)
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_IE:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

-BEGIN PGP SIGNATURE-
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=bIsk
-END PGP SIGNATURE-



Bug#998884: ITP: golang-github-go-git-go-git -- highly extensible Git implementation in pure Go

2022-01-24 Thread Arnaud Rebillout
It seems like this package is already in Debian and therefore this ITP 
can be closed?


$ rmadison golang-github-go-git-go-git
debian:
golang-github-go-git-go-git | 5.4.2-3   | testing    | source
golang-github-go-git-go-git | 5.4.2-3   | unstable   | source

Cheers,

Arnaud.



Bug#998876: ITP: golang-github-go-git-go-billy -- The missing interface filesystem abstraction for Go

2022-01-24 Thread Arnaud Rebillout
It seems like this package is already in Debian and therefore this ITP 
can be closed?


$ rmadison golang-github-go-git-go-billy
debian:
golang-github-go-git-go-billy | 5.3.1-3   | testing    | source
golang-github-go-git-go-billy | 5.3.1-3   | unstable   | source

Cheers,

Arnaud.



Bug#995171: need newer release

2022-01-24 Thread Andreas Tille
Hi Yaroslav,

$ apt showsrc singularity-container | grep Uploaders
Uploaders: Dave Love , Mehdi Dogguy , Yaroslav 
Halchenko , Afif Elghraoui , Dmitry 
Smirnov , Benda Xu 

shows you as Uploader of singularity-container.  Is there any reason you
file this bug report instead of simply uploading a new version of this
package?

When doing so I'd recommend the following patch:


diff --git a/debian/watch b/debian/watch
index 140951c..e4f994d 100644
--- a/debian/watch
+++ b/debian/watch
@@ -6,4 +6,4 @@ repacksuffix=+ds1,\
 repack,compression=xz,\
 dversionmangle=s{[+~](dfsg|ds)\d*}{},\
 " https://github.com/sylabs/singularity/releases \
-  (?:.*/)?singularity-(\d[\d\.]*)\.tar\.gz
+  (?:.*/)?singularity-ce-(\d[\d\.]*)\.tar\.gz


I admit I've never used singularity before but this might change in the
near future.  Thus I'm wondering why we have 4 open bugs with CVE
numbers and are lagging several versions behind upstream.  May be there
is a good reason to stick to the outdated security problematic version
which I simply do not understand?

Kind regards

  Andreas.

-- 
http://fam-tille.de



Bug#1000362: newsboat: new usptream version available (2.25)

2022-01-24 Thread Nikos Tsipinakis
Hi,

Newsboat now requires the rust-cxx crate , which is currently in NEW. (or 
components of it)
It will probably take a while to get it updated.

Regards,
Nikos

On Mon, 22 Nov 2021, at 06:23, Salvatore Bonaccorso wrote:
> Source: newsboat
> Version: 2.21-1
> Severity: wishlist
> X-Debbugs-Cc: car...@debian.org
>
> Hi
>
> there is a new upstream version available for newsboat (2.25 at time
> of writing).
>
> https://github.com/newsboat/newsboat/blob/master/CHANGELOG.md#225---2021-09-20
>
> Possible to package the new version for unstable?
>
> Regards,
> Salvatore

-- 
Best Regards,
  Nikos Tsipinakis



Bug#904572: move x11-utils to Suggests

2022-01-24 Thread Harald Dunkel

Maybe the Recommends could be replaced by a Suggests: x11-utils.
By now I didn't even know that there is a tool "luit".



Bug#1004166: strongswan-nm: Creates VPN configs that disable using system CA certificate directories

2022-01-24 Thread Tobias Brunner

Hi Daniel,


Removing the blank "certificate=" line from the VPN connection config in
/etc/NetworkManager/system-connections/ restores the original behavior.
However, modifying the connection config in NetworkManager will again add
the blank "certficiate=" line, once again breaking the connection config.


I can't reproduce this.  What does the "Certificate" file chooser 
display when you open the editor?  "(None)"?


Regards,
Tobias



Bug#1004121: nmu: libgsf_1.14.47-1+b1

2022-01-24 Thread Laurent Bigonville

Le 24/01/22 à 09:51, Laurent Bigonville a écrit :

Le 23/01/22 à 18:54, Sebastian Ramacher a écrit :

Control: tags -1 moreinfo

On 2022-01-21 10:33:22 +0100, Laurent Bigonville wrote:

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

Hello,

Apparently libgsf-1-dev in the archive is not co-installable due to the
documentation (see #814502)

Are you sue that this bug is still present? The binaries from the last
binNMU (1.14.47-1+) only differ in /usr/lib/${DEB_HOST_MULTIARCH} which
is to be expected.


I indeed didn't check myself if the existing packages were having a 
conflict, but I trusted the error/warning displayed on 
https://tracker.debian.org/pkg/libgsf


So the issue is maybe not present on all the architectures actually, mhh

Just tried and actually there are still differences between amd64 and 
arm64 (-dev) packages, but it's not the .html file, it's the .png that 
contains a different timestamp.


And this is caused by the binNMU debian/changelog file that has a 
different timestamp




Bug#1004121: nmu: libgsf_1.14.47-1+b1

2022-01-24 Thread Laurent Bigonville

Le 23/01/22 à 18:54, Sebastian Ramacher a écrit :

Control: tags -1 moreinfo

On 2022-01-21 10:33:22 +0100, Laurent Bigonville wrote:

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

Hello,

Apparently libgsf-1-dev in the archive is not co-installable due to the
documentation (see #814502)

Are you sue that this bug is still present? The binaries from the last
binNMU (1.14.47-1+) only differ in /usr/lib/${DEB_HOST_MULTIARCH} which
is to be expected.


I indeed didn't check myself if the existing packages were having a 
conflict, but I trusted the error/warning displayed on 
https://tracker.debian.org/pkg/libgsf


So the issue is maybe not present on all the architectures actually, mhh



Bug#1004283: RM: sdl-ttf2.0/experimental -- ROM; wrong upload, the sdl2 library is already in archive and called libsdl2-ttf

2022-01-24 Thread Gianfranco Costamagna
Package: ftp.debian.org
Severity: normal


As said, I did upload to experimental for an sdl1 to sdl2 transition, but a 
package was already in the archive with a different soname
(this sad naming convention is finally fixed in sdl2, but in sdl1 is tricky to 
define the real package name)

thanks for kicking it out,

Gianfranco



Bug#1004282: ITP: golang-github-andybalholm-crlf -- handling CR/LF line endings for Go language

2022-01-24 Thread Nobuhiro Iwamatsu
Package: wnpp
Severity: wishlist
Owner: Nobuhiro Iwamatsu 

* Package name: golang-github-andybalholm-crlf
  Version : 0.0~git20171020.670099a-1
  Upstream Author : Andy Balholm
* URL : https://github.com/andybalholm/crlf
* License : BSD-2-clause
  Programming Lang: Go
  Description : handling CR/LF line endings for Go language

  The crlf library is a Go language package for helps in dealing with files that
  have DOS-style CR/LF line endings. 



<    1   2