Bug#962307: RFS: anymeal/1.0-1 ITA -- Cookbook database for storing recipes

2020-06-05 Thread Jan Wedekind

Package: sponsorship-requests
Severity: wishlist

Dear mentors,

Hope you are all up and well.
I am looking for a sponsor for my package "anymeal". It was part of Debian until
10 years ago and I finally got around to doing a full overhaul.

 * Package name: anymeal
   Version : 1.0-1
   Upstream Author : Jan Wedekind 
 * URL : https://wedesoft.github.io/anymeal/
 * License : GPL-3+
 * Vcs : https://github.com/wedesoft/anymeal
   Section : kde

It builds those binary packages:

  anymeal - Cookbook database for storing recipes

To access further information about this package, please visit the following
URL:

  https://mentors.debian.net/package/anymeal

Alternatively, one can download the package with dget using this command:

  dget -x
https://mentors.debian.net/debian/pool/main/a/anymeal/anymeal_1.0-1.dsc

Changes since the last upload:

  * new upstream release
  * dependencies have changed (e.g. using SQLite instead of MySQL)

--
Jan Wedekind
http://www.wedesoft.de/



Bug#962245: marked as done (RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates)

2020-06-05 Thread Debian Bug Tracking System
Your message dated Fri, 5 Jun 2020 23:33:22 +0300
with message-id <20200605203322.GA5590@localhost>
and subject line Re: Bug#962245: RFS: ca-certificates/20200601~deb9u1 [RC] -- 
Common CA certificates
has caused the Debian Bug report #962245,
regarding RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
962245: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962245
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: sponsorship-requests
Severity: important

Dear mentors,

** stretch-pu approval and debdiff can be found on:
   https://bugs.debian.org/962155

I am looking for a sponsor for my package "ca-certificates"

 * Package name: ca-certificates
   Version : 20200601~deb9u1
 * License : Mozilla Public License Version 2.0
 * Vcs : https://salsa.debian.org/debian/ca-certificates 
(debian-stretch branch)

   Section : misc

It builds those binary packages:

  ca-certificates - Common CA certificates
  ca-certificates-udeb - Common CA certificates - udeb

To access further information about this package, please visit the 
following URL:


  https://mentors.debian.net/package/ca-certificates

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/c/ca-certificates/ca-certificates_20200601~deb9u1.dsc


Changes since the last upload:

   * Rebuild for stretch.
   * Merge changes from 20200601
 - d/control
   * This release updates the Mozilla CA bundle to 2.40, blacklists
 distrusted Symantec roots, and blacklists expired "AddTrust External
 Root". Closes: #956411, #955038, #911289, #961907
   * Fix permissions on /usr/local/share/ca-certificates when using 
symlinks.

 Closes: #916833

Thank you sponsor!

--
Kind regards,
Michael Shuler
--- End Message ---
--- Begin Message ---
On Fri, Jun 05, 2020 at 01:39:25PM -0500, Michael Shuler wrote:
>...
> Stretch has an openssl version without `openssl rehash`, but that is not a
> large diff. Both stretch & buster will have python->python3 difference from
> unstable on the next release, but that's also not a large diff. I hadn't
> thought about leaving older compat and standards in unstable, I generally
> try to keep lintian pleased.. not a bad idea, if no one minds much.

Standards-Version does not really matter, it only says that you
have checked the package against some policy version.

c_rehash was deprecated but is still in unstable today, delaying the 
#895075 change would have avoided that diff.

stretch has python3 3.5 and buster has python3 3.7.
Avoid adding usage of very recent python features and test that it
works on buster - python 3.7 compatibility is easier than python 2.7 
compatibility.

Packages that might be updated this way in stable are special,
and it can really help you later when you try to avoid making changes
that make it harder to build and run your package on stable.

Some people are very eager to request stopping to use some deprecated 
features or use the latest dh compat, if necessary explain why using
something older is important for this package.

> Thanks again - I'll update this RFS when #962155 comes back from the 
> release team.

I saw the approval, uploaded.

> Michael

Thanks
Adrian--- End Message ---


Bug#962245: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates

2020-06-05 Thread Michael Shuler

On 6/5/20 10:35 AM, Adrian Bunk wrote:

Except for keeping debian/NEWS you were actually backporting everything
that was possible, this was not a 20161130+nmu1+deb9u2 release that
cherry-picked only one or few changes.

Given the nature of ca-certificates it was IMHO the correct decision
to backport as much as possible, it is just not "backporting as little
as possible".

Since similar updates to stable releases might happen in the future,
I would recommend that you try to get build and runtime dependencies in
unstable to a level that allows rebuilding the package in all supported
Debian releases. For compatibility with buster this would include
staying at dh compat <= 12.

"Backporting everything possible" changes are often safest when the only
change in the ~deb10u1 source package is the entry in debian/changelog.


I uploaded an updated package for 20200601~deb9u1 to mentors and updated 
#962155 for approval.


Backporting the latest changes to stable and oldstable was the essence 
of a conversation on making that simpler with this package. These 
uploads get us a lot closer. The branch diffs are not far off now.


Stretch has an openssl version without `openssl rehash`, but that is not 
a large diff. Both stretch & buster will have python->python3 difference 
from unstable on the next release, but that's also not a large diff. I 
hadn't thought about leaving older compat and standards in unstable, I 
generally try to keep lintian pleased.. not a bad idea, if no one minds 
much.


Thanks again - I'll update this RFS when #962155 comes back from the 
release team.


Michael



Bug#962281: RFS: sysbench/1.0.20+ds-1 -- multi-threaded benchmark tool for database systems

2020-06-05 Thread JCF Ploemen
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "sysbench"

 * Package name: sysbench
   Version : 1.0.20+ds-1
   Upstream Author : Alexey Kopytov 
 * URL : https://github.com/akopytov/sysbench
 * License : GPL-2+
 * Vcs : https://salsa.debian.org/jcfp-guest/sysbench
   Section : misc

It builds those binary packages:

  sysbench - multi-threaded benchmark tool for database systems

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/sysbench

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/s/sysbench/sysbench_1.0.20+ds-1.dsc

Changes since the last upload:

   * New upstream release.
   * Bump Standards-Version to 4.5.0 (from 4.4.1; no further changes).
   * Bump compat level to 13 (from 12).
   * Rules: use execute_before instead of overriding dh_auto_build.
   * Copyright: bump years for upstream and packaging.
   * Patches: add 06 to prevent git commit hash from becoming part of the
 program's version string.
   * Control: restore support for building on armhf, tests no longer hang
 on that platform.


Thanks!


pgpqjhrmxhomM.pgp
Description: OpenPGP digital signature


Bug#962294: RFS: btrfs-progs/5.6-1~bpo10+1 -- Checksumming Copy on Write Filesystem utilities

2020-06-05 Thread Nicholas D Steeves
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "btrfs-progs"

 * Package name: btrfs-progs
   Version : 5.6-1~bpo10+1
   Upstream Author : linux-bt...@vger.kernel.org
 * URL : http://btrfs.wiki.kernel.org/
 * License : GPL-2
 * Vcs : https://salsa.debian.org/debian/btrfs-progs/tree/debian
   Section : admin

It builds these binary packages:

  btrfs-progs - Checksumming Copy on Write Filesystem utilities
  libbtrfs0 - Checksumming Copy on Write Filesystem utilities (runtime library)
  libbtrfs-dev - Checksumming Copy on Write Filesystem utilities (development 
headers)
  libbtrfsutil1 - Checksumming Copy on Write Filesystem utilities (runtime util 
library)
  libbtrfsutil-dev - Checksumming Copy on Write Filesystem utilities (util 
development headers)
  python3-btrfsutil - Checksumming Copy on Write Filesystem utilities (python3 
bindings)
  btrfs-progs-udeb - Checksumming Copy on Write Filesystem utilities (udeb)

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/btrfs-progs

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/b/btrfs-progs/btrfs-progs_5.6-1~bpo10+1.dsc

Changes since the last upload:

   * Rebuild for buster-backports.
 .
 btrfs-progs (5.6-1) unstable; urgency=medium
 .
   * New upstream release.
   * Versioned symbols.
   * Slightly improve long descs.
   * Drop old -dbgsym migration.
   * Don't skip scan if modprobe fails (eg. due to built-in).
 Closes: #956174.
 .
 btrfs-progs (5.4.1-2) unstable; urgency=medium
 .
   * Declare Breaks: on versions of libgcc-s1 that produce bad initramfs.
 Closes: #950556.
 .
 btrfs-progs (5.4.1-1) unstable; urgency=medium
 .
   * New upstream release.
 .
 btrfs-progs (5.4-1) unstable; urgency=medium
 .
   * New upstream release.
 .
 btrfs-progs (5.3.1-1) unstable; urgency=medium
 .
   * New upstream point release.
   * Update symbols -- they're versioned upstream now.
 .
 btrfs-progs (5.3-1) unstable; urgency=medium
 .
   * New upstream release.
   * Fix FTBFS with new asciidoctor.
   * Update symbols.


Regards,
Nicholas



Bug#962245: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates

2020-06-05 Thread Adrian Bunk
On Fri, Jun 05, 2020 at 08:06:28AM -0500, Michael Shuler wrote:
> On 6/5/20 4:15 AM, Adrian Bunk wrote:
> > Compared to 20200601 and 20200601~deb10u1 this contains the following
> > additional files:
> > 
> > /usr/share/ca-certificates/mozilla/AddTrust_Low-Value_Services_Root.crt
> > /usr/share/ca-certificates/mozilla/Camerfirma_Chambers_of_Commerce_Root.crt
> > /usr/share/ca-certificates/mozilla/Camerfirma_Global_Chambersign_Root.crt
> > /usr/share/ca-certificates/mozilla/Certum_Root_CA.crt
> > /usr/share/ca-certificates/mozilla/D-TRUST_Root_CA_3_2013.crt
> > /usr/share/ca-certificates/mozilla/SwissSign_Platinum_CA_-_G2.crt
> > /usr/share/ca-certificates/mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.crt
> > /usr/share/ca-certificates/mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.crt
> > /usr/share/doc/ca-certificates/NEWS.Debian.gz
> > 
> > The additional NEWS.Debian.gz is either correct or harmless,
> > the additional certificates are not.
> > 
> > This is due to the backport missing the "Remove email-only roots from
> > mozilla trust store" (#721976) change that is in 20200601.
> 
> Great catch, thanks, result of using currentver~debXuY as discussed with
> some people for better update recognition, while backporting as little as
> possible.

Except for keeping debian/NEWS you were actually backporting everything
that was possible, this was not a 20161130+nmu1+deb9u2 release that
cherry-picked only one or few changes.

Given the nature of ca-certificates it was IMHO the correct decision 
to backport as much as possible, it is just not "backporting as little 
as possible".

Since similar updates to stable releases might happen in the future,
I would recommend that you try to get build and runtime dependencies in 
unstable to a level that allows rebuilding the package in all supported 
Debian releases. For compatibility with buster this would include 
staying at dh compat <= 12.

"Backporting everything possible" changes are often safest when the only 
change in the ~deb10u1 source package is the entry in debian/changelog.

>...
> > Please update the stretch-pu request with that fixed and let me know
> > when the corrected debdiff is approved.
> 
> Will do, thank you for the feedback.

Thanks for your work on ca-certificates.

> Kind regards,
> Michael

cu
Adrian



Bug#961899: RFS: wifi-qr/0.1-1 -- WiFi Share and Connect with QR

2020-06-05 Thread Ko Ko Ye`
thanks Boyuan

noted.

I am changing Architecture:all and uploaded.

with regards.


On Fri, Jun 5, 2020 at 8:25 PM Boyuan Yang  wrote:

> On Fri, 5 Jun 2020 09:35:07 +0630 "Ko Ko Ye`" 
> wrote:
> > -- Forwarded message -
> > From: Ko Ko Ye` 
> > Date: Fri, Jun 5, 2020 at 9:32 AM
> > Subject: Re: Bug#961899: RFS: wifi-qr/0.1-1 -- WiFi Share and Connect
>
>
>
> Have you seen that bartm bot closed your RFS report again?
>
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961899;msg=19
>
> It is due to that you removed your package from mentors.debian.net (
> https://mentors.debian.net/package/wifi-qr) and re-add it. When it gets
> removed, the bot will detect it and close the bug report automatically.
> You are expected to reopen the wrongly-closed bug report.
>
> Please *DO* *NOT* unnecessarily remove and readd your package on
> mentors.debian.net. You can always make a re-upload onto
> mentors.debian.net with the same package name and same version name.
> The mentors.debian.net site supports such behavior.
> (This does not apply to Debian's official archive, though.)
>
> --
> Regards,
> Boyuan Yang
>


-- 

with regards *Ko Ko Ye`*

+95 97989 22022
+95 94500 22022
+95 9731 47907
kokoye2...@gmail.com
kokoye2...@ubuntu.com

skype: kokoye2007
jitsi: kokoye2007

http://ubuntu-mm.net
http://wiki.ubuntu.com/kokoye2007
http://wiki.ubuntu.com/MyanmarTeam http://loco.ubuntu.com/teams/ubuntu-mm


Bug#961899: Fwd: Bug#961899: RFS: wifi-qr/0.1-1 -- WiFi Share and Connect with QR

2020-06-05 Thread Boyuan Yang
Now I believe their's only one issue left: You marked the package to be
Architecture:any. However, I do not see any differences for your
package across difference hardware architecture. Could you explain the
reason of using Architecture:any?

If the built package would be exactly the same across all
architectures, maybe Architecture:all should be used.

After solving this problem, I believe your package should be ready for
upload.

-- 
Best,
Boyuan Yang

在 2020-06-05星期五的 09:35 +0630,Ko Ko Ye`写道:
> 
> 
> -- Forwarded message -
> From: Ko Ko Ye` 
> Date: Fri, Jun 5, 2020 at 9:32 AM
> Subject: Re: Bug#961899: RFS: wifi-qr/0.1-1 -- WiFi Share and Connect
> with QR
> To: Boyuan Yang <073p...@gmail.com>
> now its available at 
> 
> https://mentors.debian.net/package/wifi-qr
> 
> https://mentors.debian.net/debian/pool/main/w/wifi-qr/wifi-qr_0.1-1.dsc 


signature.asc
Description: This is a digitally signed message part


Bug#961899: RFS: wifi-qr/0.1-1 -- WiFi Share and Connect with QR

2020-06-05 Thread Boyuan Yang
On Fri, 5 Jun 2020 09:35:07 +0630 "Ko Ko Ye`" 
wrote:
> -- Forwarded message -
> From: Ko Ko Ye` 
> Date: Fri, Jun 5, 2020 at 9:32 AM
> Subject: Re: Bug#961899: RFS: wifi-qr/0.1-1 -- WiFi Share and Connect



Have you seen that bartm bot closed your RFS report again?

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961899;msg=19

It is due to that you removed your package from mentors.debian.net (
https://mentors.debian.net/package/wifi-qr) and re-add it. When it gets
removed, the bot will detect it and close the bug report automatically.
You are expected to reopen the wrongly-closed bug report.

Please *DO* *NOT* unnecessarily remove and readd your package on
mentors.debian.net. You can always make a re-upload onto
mentors.debian.net with the same package name and same version name.
The mentors.debian.net site supports such behavior.
(This does not apply to Debian's official archive, though.)

-- 
Regards,
Boyuan Yang


signature.asc
Description: This is a digitally signed message part


Bug#962245: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates

2020-06-05 Thread Michael Shuler

On 6/5/20 4:15 AM, Adrian Bunk wrote:

Compared to 20200601 and 20200601~deb10u1 this contains the following
additional files:

/usr/share/ca-certificates/mozilla/AddTrust_Low-Value_Services_Root.crt
/usr/share/ca-certificates/mozilla/Camerfirma_Chambers_of_Commerce_Root.crt
/usr/share/ca-certificates/mozilla/Camerfirma_Global_Chambersign_Root.crt
/usr/share/ca-certificates/mozilla/Certum_Root_CA.crt
/usr/share/ca-certificates/mozilla/D-TRUST_Root_CA_3_2013.crt
/usr/share/ca-certificates/mozilla/SwissSign_Platinum_CA_-_G2.crt
/usr/share/ca-certificates/mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.crt
/usr/share/ca-certificates/mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.crt
/usr/share/doc/ca-certificates/NEWS.Debian.gz

The additional NEWS.Debian.gz is either correct or harmless,
the additional certificates are not.

This is due to the backport missing the "Remove email-only roots from
mozilla trust store" (#721976) change that is in 20200601.


Great catch, thanks, result of using currentver~debXuY as discussed with 
some people for better update recognition, while backporting as little 
as possible. I was diffing 20161130+nmu1+deb9u1 to 
ca-certificates-20200601~deb9u1, so this is also a good check the other 
direction.


I hadn't removed d/NEWS, which was dropped in later versions.

I also had not modified certdata2pem.py from the latest. I will take a 
look at the changes for #721976 and see if it seems ok, I think the 
email root removal backport is reasonable.



Please update the stretch-pu request with that fixed and let me know
when the corrected debdiff is approved.


Will do, thank you for the feedback.

--
Kind regards,
Michael



Bug#962245: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates

2020-06-05 Thread Adrian Bunk
Control: tags -1 moreinfo

On Thu, Jun 04, 2020 at 08:37:24PM -0500, Michael Shuler wrote:
>...
> Changes since the last upload:
> 
>* Rebuild for stretch.
>* Merge changes from 20200601
>  - d/control
>* This release updates the Mozilla CA bundle to 2.40, blacklists
>  distrusted Symantec roots, and blacklists expired "AddTrust External
>  Root". Closes: #956411, #955038, #911289, #961907
>* Fix permissions on /usr/local/share/ca-certificates when using
> symlinks.
>  Closes: #916833
>...

Compared to 20200601 and 20200601~deb10u1 this contains the following
additional files:

/usr/share/ca-certificates/mozilla/AddTrust_Low-Value_Services_Root.crt
/usr/share/ca-certificates/mozilla/Camerfirma_Chambers_of_Commerce_Root.crt
/usr/share/ca-certificates/mozilla/Camerfirma_Global_Chambersign_Root.crt
/usr/share/ca-certificates/mozilla/Certum_Root_CA.crt
/usr/share/ca-certificates/mozilla/D-TRUST_Root_CA_3_2013.crt
/usr/share/ca-certificates/mozilla/SwissSign_Platinum_CA_-_G2.crt
/usr/share/ca-certificates/mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.crt
/usr/share/ca-certificates/mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.crt
/usr/share/doc/ca-certificates/NEWS.Debian.gz

The additional NEWS.Debian.gz is either correct or harmless,
the additional certificates are not.

This is due to the backport missing the "Remove email-only roots from 
mozilla trust store" (#721976) change that is in 20200601.

Please update the stretch-pu request with that fixed and let me know
when the corrected debdiff is approved.

> Kind regards,
> Michael Shuler

cu
Adrian



Bug#962244: marked as done (RFS: ca-certificates/20200601~deb10u1 [RC] -- Common CA certificates)

2020-06-05 Thread Debian Bug Tracking System
Your message dated Fri, 5 Jun 2020 11:55:06 +0300
with message-id <20200605085506.GA24026@localhost>
and subject line Re: Bug#962244: RFS: ca-certificates/20200601~deb10u1 [RC] -- 
Common CA certificates
has caused the Debian Bug report #962244,
regarding RFS: ca-certificates/20200601~deb10u1 [RC] -- Common CA certificates
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
962244: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962244
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: sponsorship-requests
Severity: important

Dear mentors,

** buster-pu approval and debdiff can be found on:
   https://bugs.debian.org/962152

I am looking for a sponsor for my package "ca-certificates"

 * Package name: ca-certificates
   Version : 20200601~deb10u1
 * License : Mozilla Public License Version 2.0
 * Vcs : https://salsa.debian.org/debian/ca-certificates 
(debian-buster branch)

   Section : misc

It builds those binary packages:

  ca-certificates - Common CA certificates
  ca-certificates-udeb - Common CA certificates - udeb

To access further information about this package, please visit the 
following URL:


  https://mentors.debian.net/package/ca-certificates

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/c/ca-certificates/ca-certificates_20200601~deb10u1.dsc


Changes since the last upload:

   * Rebuild for buster.
   * Merge changes from 20200601
 - d/control; set d/gbp.conf branch to debian-buster
   * This release updates the Mozilla CA bundle to 2.40, blacklists
 distrusted Symantec roots, and blacklists expired "AddTrust External
 Root". Closes: #956411, #955038, #911289, #961907

Thank you sponsor!

--
Kind regards,
Michael Shuler
--- End Message ---
--- Begin Message ---
On Thu, Jun 04, 2020 at 08:33:00PM -0500, Michael Shuler wrote:
>...
> ** buster-pu approval and debdiff can be found on:
>https://bugs.debian.org/962152
>...
> Changes since the last upload:
> 
>* Rebuild for buster.
>* Merge changes from 20200601
>  - d/control; set d/gbp.conf branch to debian-buster
>* This release updates the Mozilla CA bundle to 2.40, blacklists
>  distrusted Symantec roots, and blacklists expired "AddTrust External
>  Root". Closes: #956411, #955038, #911289, #961907
>...

Thanks, uploaded.

> Kind regards,
> Michael Shuler

cu
Adrian--- End Message ---