Re: Handling Japanese new era "令和 (Reiwa)"

2019-04-13 Thread Hideki Yamane
On Fri, 12 Apr 2019 10:32:54 +0100
Alastair McKinstry  wrote:
> unicode-data in Buster is currently at 11.0.0; there being a major  
> release upstream 12.0.0 just after Buster freeze.
> 
> I've uploaded 12.0.0 to unstable; 12.1 is not officially released yet.  
> unicode-data itself is small and easy to validate, but the following  
> packages will need to be rebuilt as they build-depend on unicode-data  
> (and typically hard-code the tables internally):
> 
>   * ibus
>   * node-unicode-tr51
>   * julia
>   * node-unicode-property-aliases
>   * node-unicode-property-value-aliases
>   * cyrus-imapd
>   * libxmlada
>   * courier-unicode
>   * node-unicode-property-aliases-ecmascript
>   * *wine*
>   * *slang2*
>   * re2
>   * fntsample
>   * console-data
>   * wine-development
>   * utf8proc
>   * node-unicode-property-value-aliases-ecmascript
>   * gucharmap
>   * node-unicode-data
>   * fonttools
>   * wcwidth
>   * jing-trang

 Thanks Alastair, it's not good way to rebuild all the packages you've
 mentioned, IMO. How about just adding "令和 (Reiwa)" data diff between
 12.0 and 12.1 and push it later?
 

-- 
Hideki Yamane 



Bug#927042: unblock: gpac/gpac 0.5.2-426-gc5ad4e4+dfsg5-5

2019-04-13 Thread Reinhard Tartler
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package gpac

Moritz has kindly pointed out and backported the relevant patches from upstream
that fixes this issue. Here is the relevant part of debian/changelog:

  * Bug fix: "CVE-2019-11222: Buffer-overflow in gf_bin128_parse", thanks
to Salvatore Bonaccorso (Closes: #926961).
  * Bug fix: "CVE-2019-11221: buffer-overflow issue in gf_import_message()
in media_import.c", thanks to Salvatore Bonaccorso (Closes: #926963).

unblock gpac/gpac 0.5.2-426-gc5ad4e4+dfsg5-5

Thanks for considering.
-rt

diff -Nru gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/changelog 
gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/changelog
--- gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/changelog  2019-04-01 
17:07:02.0 -0400
+++ gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/changelog  2019-04-13 
16:41:15.0 -0400
@@ -1,3 +1,13 @@
+gpac (0.5.2-426-gc5ad4e4+dfsg5-5) unstable; urgency=medium
+
+  [ Moritz Muehlenhoff ]
+  * Bug fix: "CVE-2019-11222: Buffer-overflow in gf_bin128_parse", thanks
+to Salvatore Bonaccorso (Closes: #926961).
+  * Bug fix: "CVE-2019-11221: buffer-overflow issue in gf_import_message()
+in media_import.c", thanks to Salvatore Bonaccorso (Closes: #926963).
+
+ -- Reinhard Tartler   Sat, 13 Apr 2019 16:41:15 -0400
+
 gpac (0.5.2-426-gc5ad4e4+dfsg5-4.1) unstable; urgency=medium

   * CVE-2018-7752 (Closes: #892526)
diff -Nru gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/patches/CVE-2019-11221.patch 
gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/patches/CVE-2019-11221.patch
--- gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/patches/CVE-2019-11221.patch   
1969-12-31 19:00:00.0 -0500
+++ gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/patches/CVE-2019-11221.patch   
2019-04-13 16:41:15.0 -0400
@@ -0,0 +1,180 @@
+From f4616202e5578e65746cf7e7ceeba63bee1b094b Mon Sep 17 00:00:00 2001
+From: Aurelien David 
+Date: Thu, 11 Apr 2019 14:18:58 +0200
+Subject: [PATCH] fix a bunch of vsprintf -> vsnprintf
+
+closes #1203
+---
+ applications/mp4client/main.c |  2 +-
+ applications/osmo4_sym/osmo4_view.cpp |  2 +-
+ src/media_tools/media_export.c|  2 +-
+ src/media_tools/media_import.c|  2 +-
+ src/scene_manager/loader_bt.c |  4 ++--
+ src/scene_manager/loader_isom.c   |  2 +-
+ src/scene_manager/loader_qt.c |  2 +-
+ src/scene_manager/loader_svg.c|  8 
+ src/scene_manager/loader_xmt.c| 14 +++---
+ src/scene_manager/swf_parse.c |  6 +++---
+ src/scene_manager/swf_svg.c   |  2 +-
+ src/scenegraph/xbl_process.c  |  2 +-
+ src/utils/alloc.c |  2 +-
+ src/utils/xml_parser.c| 24 +---
+ 15 files changed, 49 insertions(+), 47 deletions(-)
+
+--- a/applications/mp4client/main.c
 b/applications/mp4client/main.c
+@@ -1023,7 +1023,7 @@ static void on_gpac_log(void *cbk, u32 l
+
+   if (rti_logs && (lm & GF_LOG_RTI)) {
+   char szMsg[2048];
+-  vsprintf(szMsg, fmt, list);
++  vsnprintf(szMsg, 2048, fmt, list);
+   UpdateRTInfo(szMsg + 6 /*"[RTI] "*/);
+   } else {
+   if (log_time_start) {
+--- a/src/media_tools/media_export.c
 b/src/media_tools/media_export.c
+@@ -57,7 +57,7 @@ static GF_Err gf_export_message(GF_Media
+   va_list args;
+   char szMsg[1024];
+   va_start(args, format);
+-  vsprintf(szMsg, format, args);
++  vsnprintf(szMsg, 1024, format, args);
+   va_end(args);
+   GF_LOG((u32) (e ? GF_LOG_ERROR : GF_LOG_WARNING), 
GF_LOG_AUTHOR, ("%s\n", szMsg) );
+   }
+--- a/src/media_tools/media_import.c
 b/src/media_tools/media_import.c
+@@ -50,7 +50,7 @@ GF_Err gf_import_message(GF_MediaImporte
+   va_list args;
+   char szMsg[1024];
+   va_start(args, format);
+-  vsprintf(szMsg, format, args);
++  vsnprintf(szMsg, 1024, format, args);
+   va_end(args);
+   GF_LOG((u32) (e ? GF_LOG_WARNING : GF_LOG_INFO), GF_LOG_AUTHOR, 
("%s\n", szMsg) );
+   }
+--- a/src/scene_manager/loader_bt.c
 b/src/scene_manager/loader_bt.c
+@@ -121,7 +121,7 @@ static GF_Err gf_bt_report(GF_BTParser *
+   char szMsg[2048];
+   va_list args;
+   va_start(args, format);
+-  vsprintf(szMsg, format, args);
++  vsnprintf(szMsg, 2048, format, args);
+   va_end(args);
+   GF_LOG((u32) (e ? GF_LOG_ERROR : GF_LOG_WARNING), 
GF_LOG_PARSER, ("[BT/WRL Parsing] %s (line %d)\n", szMsg, parser->line));
+   }
+--- a/src/scene_manager/loader_isom.c
 b/src/scene_manager/loader_isom.c
+@@ -144,7 +144,7 @@ static void mp4_report(GF_SceneLoader *l
+   char szMsg[1024];
+   va_list args;
+   va_start(args, format);
+-  

Bug#926397: stretch-pu: package debian-security-support/2019.02.02~deb9u1

2019-04-13 Thread Holger Levsen
On Sat, Apr 13, 2019 at 09:57:09PM +0100, Adam D. Barratt wrote:
> Please go ahead.

thanks, done.


-- 
tschau,
Holger

---
   holger@(debian|reproducible-builds|layer-acht).org
   PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C

In Europe there are people prosecuted by courts because they saved other people
from drowning in the  Mediterranean Sea.  That is almost as absurd  as if there
were people being prosecuted because they save humans from drowning in the sea.


signature.asc
Description: PGP signature


Bug#927035: unblock: mozc/2.23.2815.102+dfsg-4

2019-04-13 Thread Nobuhiro Iwamatsu
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package mozc to fix the important bug #927030.
See also the attached debdiff.

changelog:

mozc (2.23.2815.102+dfsg-4) unstable; urgency=medium

  * Add d/patches/add_support_new_japanese_era.patch.
This adds Japan's new era 令和 (Reiwa) support. (Closes: #927030)

 -- Nobuhiro Iwamatsu   Sun, 14 Apr 2019 06:25:53 +0900

unblock mozc/2.23.2815.102+dfsg-4

-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, riscv64, armhf

Kernel: Linux 4.19.0-2-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=ja_JP.utf8, LC_CTYPE=ja_JP.utf8 (charmap=UTF-8), 
LANGUAGE=ja_JP.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
diff -Nru mozc-2.23.2815.102+dfsg/debian/changelog 
mozc-2.23.2815.102+dfsg/debian/changelog
--- mozc-2.23.2815.102+dfsg/debian/changelog2018-12-01 07:40:07.0 
+0900
+++ mozc-2.23.2815.102+dfsg/debian/changelog2019-04-14 06:25:53.0 
+0900
@@ -1,3 +1,10 @@
+mozc (2.23.2815.102+dfsg-4) unstable; urgency=medium
+
+  * Add d/patches/add_support_new_japanese_era.patch.
+This adds Japan's new era 令和 (Reiwa) support. (Closes: #927030)
+
+ -- Nobuhiro Iwamatsu   Sun, 14 Apr 2019 06:25:53 +0900
+
 mozc (2.23.2815.102+dfsg-3) unstable; urgency=medium
 
   * Update .desktop file.
diff -Nru 
mozc-2.23.2815.102+dfsg/debian/patches/add_support_new_japanese_era.patch 
mozc-2.23.2815.102+dfsg/debian/patches/add_support_new_japanese_era.patch
--- mozc-2.23.2815.102+dfsg/debian/patches/add_support_new_japanese_era.patch   
1970-01-01 09:00:00.0 +0900
+++ mozc-2.23.2815.102+dfsg/debian/patches/add_support_new_japanese_era.patch   
2019-04-14 06:25:53.0 +0900
@@ -0,0 +1,83 @@
+Description: Add support new Japanese era
+Bug-Ubuntu: https://bugs.launchpad.net/mozc/+bug/1823444
+Author: Mitsuya Shibata 
+
+Index: mozc-2.23.2815.102+dfsg/src/data/dictionary_oss/dictionary08.txt
+===
+--- mozc-2.23.2815.102+dfsg.orig/src/data/dictionary_oss/dictionary08.txt
 mozc-2.23.2815.102+dfsg/src/data/dictionary_oss/dictionary08.txt
+@@ -8591,6 +8591,8 @@
+ れいれいと 12  12  7349れいれいと
+ れいろう  184718477276玲瓏
+ れいわ   184718478251例話
++れいわ   189518951690令和
++れいわ   189818984000令和
+ れいんこーと184718475568レインコート
+ れいんじゃー184718477459レインジャー
+ れいんず  191719173548レインズ
+Index: mozc-2.23.2815.102+dfsg/src/data/symbol/symbol.tsv
+===
+--- mozc-2.23.2815.102+dfsg.orig/src/data/symbol/symbol.tsv
 mozc-2.23.2815.102+dfsg/src/data/symbol/symbol.tsv
+@@ -528,6 +528,7 @@ POSCHARReading (space separated)   descr
+ 記号㊦   した げ丸下
+ 記号㊧   ひだり 丸左
+ 記号㊨   みぎ  丸右
++記号㋿   れいわ ねんごう年号  OTHER
+ 記号㍻   へいせい ねんごう   年号  OTHER
+ 記号㍼   しょうわ  ねんごう  年号  OTHER
+ 記号㍽   たいしょう  ねんごう 年号  OTHER
+Index: mozc-2.23.2815.102+dfsg/src/data/unicode/UnicodeData.txt
+===
+--- mozc-2.23.2815.102+dfsg.orig/src/data/unicode/UnicodeData.txt
 mozc-2.23.2815.102+dfsg/src/data/unicode/UnicodeData.txt
+@@ -11314,6 +11314,7 @@
+ 32FC;CIRCLED KATAKANA WI;So;0;L; 30F0N;
+ 32FD;CIRCLED KATAKANA WE;So;0;L; 30F1N;
+ 32FE;CIRCLED KATAKANA WO;So;0;L; 30F2N;
++32FF;SQUARE ERA NAME REIWA;So;0;L; 4EE4 548CN;SQUARED TWO 
IDEOGRAPHS ERA NAME REIWA
+ 3300;SQUARE APAATO;So;0;L; 30A2 30D1 30FC 30C8N;SQUARED APAATO
+ 3301;SQUARE ARUHUA;So;0;L; 30A2 30EB 30D5 30A1N;SQUARED ARUHUA
+ 3302;SQUARE ANPEA;So;0;L; 30A2 30F3 30DA 30A2N;SQUARED ANPEA
+Index: mozc-2.23.2815.102+dfsg/src/rewriter/date_rewriter.cc
+===
+--- mozc-2.23.2815.102+dfsg.orig/src/rewriter/date_rewriter.cc
 mozc-2.23.2815.102+dfsg/src/rewriter/date_rewriter.cc
+@@ -1239,6 +1239,10 @@ const YearData kEraData[] = {
+ 1989,
+ "平成",
+ "へいせい",
++  }, {
++2019,
++"令和",
++"れいわ",
+   }
+ };
+ 
+Index: mozc-2.23.2815.102+dfsg/src/rewriter/date_rewriter_test.cc
+===
+--- mozc-2.23.2815.102+dfsg.orig/src/rewriter/date_rewriter_test.cc
 mozc-2.23.2815.102+dfsg/src/rewriter/date_rewriter_test.cc
+@@ -469,6 +469,22 @@ TEST_F(DateRewriterTest, ADToERA) {
+  "平成10",
+  "平成十");
+ 
++  // AD.2019 is "平成31(年)" or "平成三十一(年)" or "令和元(年)"
++  results.clear();
++  rewriter.AdToEra(2019, );
++  

Bug#926190: stretch-pu: package postfix/3.1.12-0+deb9u1

2019-04-13 Thread Scott Kitterman
On Saturday, April 13, 2019 09:58:15 PM Adam D. Barratt wrote:
> Control: tags -1 + confirmed
> 
> On Mon, 2019-04-01 at 14:30 -0400, Scott Kitterman wrote:
> > This is the next in a series.  It contains upstream bug fix releases
> > 3.1.10,
> > 3.1.11, and 3.1.12.  I held off after 3.1.10 since it contains
> > somewhat more
> > new/changed code than these usually do.  Both 3.1.11 and 3.1.12 have
> > since
> > been released with no corrections needed to the refactored code.
> 
> Please go ahead.

Thanks,

postfix_3.1.12-0+deb9u1_amd64.changes ACCEPTED into proposed-updates->stable-
new

Scott K



Bug#927028: unblock: soundscaperenderer/0.5.0~dfsg-4

2019-04-13 Thread IOhannes m zmoelnig
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package soundscaperenderer

Due to a typo in the installation-paths, soundscaperenderer-nox currently fails
to (un)install its "alternatives" properly.
this makes the upgrade from stretch a suboptimal experience, and has been
reported as RC-critical #926311.
The attached debdiff fixes the typo and thus the issue.
(the debdiff also bumps the standards version, as no further changes were
required to do so).
thanks for considering,

vfmdsaf
IOhannes

unblock soundscaperenderer/0.5.0~dfsg-4

-- System Information:
Debian Release: buster/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'stable-updates'), (500, 
'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-4-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru soundscaperenderer-0.5.0~dfsg/debian/changelog 
soundscaperenderer-0.5.0~dfsg/debian/changelog
--- soundscaperenderer-0.5.0~dfsg/debian/changelog  2018-11-20 
11:07:41.0 +0100
+++ soundscaperenderer-0.5.0~dfsg/debian/changelog  2019-04-13 
20:06:32.0 +0200
@@ -1,3 +1,11 @@
+soundscaperenderer (0.5.0~dfsg-4) unstable; urgency=medium
+
+  * Fix typo in ssr-nox install paths (Closes: #926311)
+  * Bump standards version to 4.3.0
+- no changes required
+
+ -- IOhannes m zmölnig (Debian/GNU)   Sat, 13 Apr 2019 
20:06:32 +0200
+
 soundscaperenderer (0.5.0~dfsg-3) unstable; urgency=medium
 
   * Don't build Qt-packages on armel/armhf (Closes: #914143)
diff -Nru soundscaperenderer-0.5.0~dfsg/debian/control 
soundscaperenderer-0.5.0~dfsg/debian/control
--- soundscaperenderer-0.5.0~dfsg/debian/control2018-11-20 
11:07:41.0 +0100
+++ soundscaperenderer-0.5.0~dfsg/debian/control2019-04-13 
20:06:32.0 +0200
@@ -20,7 +20,7 @@
  texlive-latex-recommended,
  texlive-latex-extra,
  texlive-fonts-recommended,
-Standards-Version: 4.2.1
+Standards-Version: 4.3.0
 Rules-Requires-Root: no
 Homepage: http://spatialaudio.net/ssr/
 Vcs-Git: https://salsa.debian.org/multimedia-team/soundscaperenderer.git
diff -Nru soundscaperenderer-0.5.0~dfsg/debian/soundscaperenderer-nox.install 
soundscaperenderer-0.5.0~dfsg/debian/soundscaperenderer-nox.install
--- soundscaperenderer-0.5.0~dfsg/debian/soundscaperenderer-nox.install 
2018-11-20 11:07:41.0 +0100
+++ soundscaperenderer-0.5.0~dfsg/debian/soundscaperenderer-nox.install 
2019-04-13 20:06:32.0 +0200
@@ -1,2 +1,2 @@
 debian/tmp/nox/usr/bin/ssr-* /usr/bin/
-build/nox.deb/alternatives   /usr/share/soundscaperendere-nox/
+build/nox.deb/alternatives   /usr/share/soundscaperenderer-nox/


Bug#919043: nmu: ckermit_302-5.3 (stretch)

2019-04-13 Thread Adam D. Barratt
On Fri, 2019-02-15 at 00:04 +0100, Sebastian Andrzej Siewior wrote:
> On 2019-02-02 14:46:54 [+0100], Andreas Beckmann wrote:
> > I'm not going to touch that package, please go ahead with preparing
> > a
> > NMU (or probably rather QA upload if it is gone from sid) to
> > stretch,
> > since you seem to know how to properly fix this bug once and for
> > all :-)
> 
> I'm proposing this attached debdiff.
> For testing I compiled it against libssl1.0-dev 1.0.2j-5 and then
> upgraded to the version provided by the security repository. No error
> message. I expect it work - it would be awesome if the reporter could
> confirm this (I can provided the binary packages if required).

Did anything happen there?

Regards,

Adam



Processed: Bug#924463: stretch-pu: package waagent/2.2.34-3~deb9u1

2019-04-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #924463 [release.debian.org] stretch-pu: package waagent/2.2.34-3~deb9u1
Added tag(s) confirmed.

-- 
924463: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924463
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#924463: stretch-pu: package waagent/2.2.34-3~deb9u1

2019-04-13 Thread Adam D. Barratt
Control: tags -1 + confirmed

[Note that the size of the original e-mail meant that it never reached
debian-release]

On Wed, 2019-03-1]3 at 10:08 +0100, Bastian Blank wrote:
> The Azure agent provides the provisioning part of the Microsoft Azure
> platform.  It is necessary to tell the platform about the state of
> the
> systems.  Therefor it is part of the "hardware" support for the Azure
> platform.
> 
> This updates includes a lot of upstream fixes, primarily necessary
> for
> Azure Stack handling.
> 
Please go ahead.

Regards,

Adam



Processed: Re: Bug#924493: stretch-pu: package publicsuffix/20190221.0923-0+deb9u1

2019-04-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #924493 [release.debian.org] stretch-pu: package 
publicsuffix/20190221.0923-0+deb9u1
Added tag(s) confirmed.

-- 
924493: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924493
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#924493: stretch-pu: package publicsuffix/20190221.0923-0+deb9u1

2019-04-13 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Wed, 2019-03-13 at 11:12 -0400, Daniel Kahn Gillmor wrote:
> Please consider an update to publicsuffix in debian stretch.
> 
> This package reflects the state of the network, and keeping it
> current
> is useful for all the packages that depend on it.
> 

Please go ahead.

Regards,

Adam



Bug#925569: stretch-pu: package flatpak/0.8.9-0+deb9u3

2019-04-13 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Tue, 2019-03-26 at 22:04 +, Simon McVittie wrote:
> I've prepared a flatpak update for stable to fix CVE-2019-10063 in
> the next point release. The security team told me they don't intend
> to
> release a DSA for this.
> 

Please go ahead.

Regards,

Adam



Processed: Re: Bug#925569: stretch-pu: package flatpak/0.8.9-0+deb9u3

2019-04-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #925569 [release.debian.org] stretch-pu: package flatpak/0.8.9-0+deb9u3
Added tag(s) confirmed.

-- 
925569: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925569
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#926050: stretch-pu: package python-pip/9.0.1-2+deb9u1

2019-04-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #926050 [release.debian.org] stretch-pu: package python-pip/9.0.1-2+deb9u1
Added tag(s) confirmed.

-- 
926050: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926050
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#926050: stretch-pu: package python-pip/9.0.1-2+deb9u1

2019-04-13 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Sun, 2019-03-31 at 00:11 +0100, Thomas Goirand wrote:
> I would like to upload a fix to python-pip to Stretch, fixing pip
> download
> when using --extra-index-url. Pip is indeed broken because of the way
> pip
> handles exceptions from the vendored requests module, and the way
> Debian
> de-embbed requests. The patch is pretty short (2 lines are changed).
> 

Please go ahead.

Regards,

Adam



Processed: Re: Bug#924939: stretch-pu: package runc/0.1.1+dfsg1-2+deb9u1

2019-04-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #924939 [release.debian.org] stretch-pu: package runc/0.1.1+dfsg1-2+deb9u1
Added tag(s) confirmed.

-- 
924939: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924939
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#924939: stretch-pu: package runc/0.1.1+dfsg1-2+deb9u1

2019-04-13 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Tue, 2019-03-19 at 01:11 +0800, Shengjing Zhu wrote:
> This includes patch for CVE-2019-5736.
> 
> As discussed with security-team, there's no urgency to go through
> scurity-upload. So let's fix it through stable-proposed-updates.
> 

Please go ahead.

Regards,

Adam



Bug#926190: stretch-pu: package postfix/3.1.12-0+deb9u1

2019-04-13 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Mon, 2019-04-01 at 14:30 -0400, Scott Kitterman wrote:
> This is the next in a series.  It contains upstream bug fix releases
> 3.1.10,
> 3.1.11, and 3.1.12.  I held off after 3.1.10 since it contains
> somewhat more
> new/changed code than these usually do.  Both 3.1.11 and 3.1.12 have
> since
> been released with no corrections needed to the refactored code.
> 

Please go ahead.

Regards,

Adam



Processed: Re: Bug#926190: stretch-pu: package postfix/3.1.12-0+deb9u1

2019-04-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #926190 [release.debian.org] stretch-pu: package postfix/3.1.12-0+deb9u1
Added tag(s) confirmed.

-- 
926190: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926190
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#926397: stretch-pu: package debian-security-support/2019.02.02~deb9u1

2019-04-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #926397 [release.debian.org] stretch-pu: package 
debian-security-support/2019.02.02~deb9u1
Added tag(s) confirmed.

-- 
926397: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926397
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#926397: stretch-pu: package debian-security-support/2019.02.02~deb9u1

2019-04-13 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Thu, 2019-04-04 at 14:44 +0200, Holger Levsen wrote:
> Please accept debian-security-support/2019.02.02~deb9u1 into stretch
> to
> bring it in line with the version in unstable (and soon buster).
> 

Please go ahead.

Regards,

Adam



Bug#926506: stretch-pu: package bwa/0.7.15-2+deb9u1

2019-04-13 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Sat, 2019-04-06 at 10:26 +0200, Dylan Aïssi wrote:
> Upstream has fixed CVE-2019-10269 which is non-dsa.
> I have already backported a patch to unstable/testing and now I would
> like to fix the Stretch version.
> Please find attached a corresponding debdiff.
> 

Please go ahead.

Regards,

Adam



Bug#926481: stretch-pu: package open-vm-tools/2:10.1.5-5055683-4+deb9u2

2019-04-13 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Fri, 2019-04-05 at 23:15 +0200, Bernd Zeimetz wrote:
> as discuassed with the security team, I'd like to fix #925959
> with the next stable pointrelease. The proposed debdiff is attached.
> 

Please go ahead.

Regards,

Adam



Processed: Re: Bug#926481: stretch-pu: package open-vm-tools/2:10.1.5-5055683-4+deb9u2

2019-04-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #926481 [release.debian.org] stretch-pu: package 
open-vm-tools/2:10.1.5-5055683-4+deb9u2
Added tag(s) confirmed.

-- 
926481: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926481
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#926506: stretch-pu: package bwa/0.7.15-2+deb9u1

2019-04-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #926506 [release.debian.org] stretch-pu: package bwa/0.7.15-2+deb9u1
Added tag(s) confirmed.

-- 
926506: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926506
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#926870: stretch-pu: package ca-certificates-java/20170929~deb9u2

2019-04-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #926870 [release.debian.org] stretch-pu: package 
ca-certificates-java/20170929~deb9u2
Added tag(s) confirmed.

-- 
926870: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926870
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#926894: stretch-pu: package igraph/0.7.1-2.1+deb9u1

2019-04-13 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Thu, 2019-04-11 at 22:43 +0200, Dylan Aïssi wrote:
> Upstream has fixed CVE-2018-20349 which is non-dsa.
> The patch is already backported to unstable/testing and now I would
> like to fix the Stretch version.
> 

Please go ahead.

Regards,

Adam



Bug#926870: stretch-pu: package ca-certificates-java/20170929~deb9u2

2019-04-13 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Thu, 2019-04-11 at 07:20 -0700, tony mancill wrote:
> My upload of ca-certificates-java_20170929~deb9u2 (currently in
> stable-pu) [1] introduced a printf syntax problem in the postinst.  
> More discussion can be found in #923176 starting at message 38:
> 
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923176#38
> 
> Thank you to Andreas Beckmann for catching the issue.
> 

Please go ahead.

Regards,

Adam



Processed: Re: Bug#926894: stretch-pu: package igraph/0.7.1-2.1+deb9u1

2019-04-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #926894 [release.debian.org] stretch-pu: package igraph/0.7.1-2.1+deb9u1
Added tag(s) confirmed.

-- 
926894: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926894
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#924459: transition: libdmtx

2019-04-13 Thread Simon McVittie
On Wed, 13 Mar 2019 at 08:55:29 +, Simon McVittie wrote:
> As discussed with jmw at the Cambridge BSP, libdmtx0a has broken ABI
> without changing its SONAME (#908815).
...
> Only a few packages are affected:
> 
> dmtx-utils: dmtx-utils
> openrpt: libopenrpt1v5
>  openrpt
> postbooks: postbooks
> prison-kf5: libkf5prison5
> visp: libvisp-detection3.1

I've uploaded libdmtx/0.7.5-2.2; please unblock it (debdiff attached)
and schedule binNMUs as appropriate. I think this might be the right
incantation:

unblock libdmtx/0.7.5-2.2

and

nmu dmtx-utils_0.7.6-1.1 openrpt_3.3.14-2 prison-kf5_5.54.0-1 visp_3.1.0-2 . 
ANY . -m 'Rebuild against libdmtx0b'
dw dmtx-utils_0.7.6-1.1 openrpt_3.3.14-2 prison-kf5_5.54.0-1 visp_3.1.0-2 . ANY 
. -m 'libdmtx-dev (>= 0.7.5-2.2)'
nmu postbooks_4.11.3-2 . ANY . -m 'Rebuild against libdmtx0b'
dw postbooks_4.11.3-2 . ANY . -m 'libopenrpt-dev (>= 3.3.14-2+b1)'

libdmtx does still have a RC bug regarding an inconsistent d/copyright,
opened after its excursion through the NEW queue (#926646); but only the
maintainer can fix that one, and IMO a buster-ignore might be appropriate.

Thanks,
smcv
diffstat for libdmtx-0.7.5 libdmtx-0.7.5

 changelog   |   19 +++
 control |7 ++--
 libdmtx-dev.maintscript |2 -
 libdmtx0a.docs  |6 ---
 libdmtx0a.install   |1 
 libdmtx0a.symbols   |   81 
 libdmtx0b.docs  |6 +++
 libdmtx0b.install   |1 
 libdmtx0b.symbols   |   81 
 rules   |2 -
 10 files changed, 113 insertions(+), 93 deletions(-)

diff -Nru libdmtx-0.7.5/debian/changelog libdmtx-0.7.5/debian/changelog
--- libdmtx-0.7.5/debian/changelog  2018-11-21 07:29:23.0 +
+++ libdmtx-0.7.5/debian/changelog  2019-04-12 20:26:32.0 +0100
@@ -1,3 +1,22 @@
+libdmtx (0.7.5-2.2) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Upload libdmtx0b to unstable
+
+ -- Simon McVittie   Fri, 12 Apr 2019 20:26:32 +0100
+
+libdmtx (0.7.5-2.1) experimental; urgency=medium
+
+  * Non-maintainer upload.
+  * Rename shared library package to libdmtx0b, due to another ABI
+break without a corresponding SONAME update (in 0.7.5-1).
+Add Conflicts/Replaces on libdmtx0a, and add missing Replaces on
+libdmtx0 while I'm there. (Closes: #908815)
+  * Release to experimental for now, to wait for NEW processing and stage
+the transition.
+
+ -- Simon McVittie   Sun, 10 Mar 2019 17:13:33 +
+
 libdmtx (0.7.5-2) unstable; urgency=low
 
   * Proper fix for simple_test compiler warnings.
diff -Nru libdmtx-0.7.5/debian/control libdmtx-0.7.5/debian/control
--- libdmtx-0.7.5/debian/control2018-11-21 07:29:23.0 +
+++ libdmtx-0.7.5/debian/control2019-04-12 20:26:32.0 +0100
@@ -6,12 +6,13 @@
 Standards-Version: 4.2.1
 Homepage: http://libdmtx.sourceforge.net
 
-Package: libdmtx0a
+Package: libdmtx0b
 Architecture: any
 Multi-Arch: same
 Pre-Depends: ${misc:Pre-Depends}
 Depends: ${shlibs:Depends}, ${misc:Depends}
-Conflicts: libdmtx0
+Conflicts: libdmtx0, libdmtx0a
+Replaces: libdmtx0, libdmtx0a
 Description: Data Matrix barcodes (runtime library)
  Libdmtx is a library for reading and writing Data Matrix 2D barcodes,
  two-dimensional symbols that hold a dense pattern of data with built-in error
@@ -24,7 +25,7 @@
 Architecture: any
 Multi-Arch: same
 Pre-Depends: ${misc:Pre-Depends}
-Depends: ${shlibs:Depends}, ${misc:Depends}, libdmtx0a (= ${binary:Version})
+Depends: ${shlibs:Depends}, ${misc:Depends}, libdmtx0b (= ${binary:Version})
 Description: Data Matrix barcodes (development files and static libraries)
  Libdmtx is a library for reading and writing Data Matrix 2D barcodes,
  two-dimensional symbols that hold a dense pattern of data with built-in error
diff -Nru libdmtx-0.7.5/debian/libdmtx0a.docs 
libdmtx-0.7.5/debian/libdmtx0a.docs
--- libdmtx-0.7.5/debian/libdmtx0a.docs 2018-08-08 21:03:35.0 +0100
+++ libdmtx-0.7.5/debian/libdmtx0a.docs 1970-01-01 01:00:00.0 +0100
@@ -1,6 +0,0 @@
-AUTHORS
-KNOWNBUG
-NEWS
-README
-README.linux
-TODO
diff -Nru libdmtx-0.7.5/debian/libdmtx0a.install 
libdmtx-0.7.5/debian/libdmtx0a.install
--- libdmtx-0.7.5/debian/libdmtx0a.install  2012-03-06 01:55:08.0 
+
+++ libdmtx-0.7.5/debian/libdmtx0a.install  1970-01-01 01:00:00.0 
+0100
@@ -1 +0,0 @@
-usr/lib/*/libdmtx.so.*
diff -Nru libdmtx-0.7.5/debian/libdmtx0a.symbols 
libdmtx-0.7.5/debian/libdmtx0a.symbols
--- libdmtx-0.7.5/debian/libdmtx0a.symbols  2018-11-21 07:29:23.0 
+
+++ libdmtx-0.7.5/debian/libdmtx0a.symbols  1970-01-01 01:00:00.0 
+0100
@@ -1,81 +0,0 @@
-libdmtx.so.0 libdmtx0a #MINVER#
-*Build-Depends-Package: libdmtx-dev
- dmtxByteListBuild@Base 0.7.4
- dmtxByteListClear@Base 0.7.4
- dmtxByteListCopy@Base 0.7.4
- dmtxByteListHasCapacity@Base 0.7.4
- 

Bug#926994: unblock: gcc-mingw-w64/21.2 (pre-upload approval request)

2019-04-13 Thread Ivo De Decker
Control: tags -1 confirmed moreinfo


Hi Stephen,

On Sat, Apr 13, 2019 at 04:18:44PM +0200, Stephen Kitt wrote:
> On Sat, 13 Apr 2019 13:22:01 +0200, Ivo De Decker  wrote:
> > On Sat, Apr 13, 2019 at 10:26:04AM +0200, Stephen Kitt wrote:
> > > I have a couple of fixes pending upload for gcc-mingw-w64, and I’m
> > > wondering if they’d pass muster for Buster. The attached patches fix,
> > > in order:
> > > 
> > > * #923214 — an ICE hit with external static data members
> > > * #925172 — std::filesystem support is broken in the current Buster
> > >   package
> > > 
> > > I’m requesting approval for these fixes before uploading them to
> > > unstable. The candidate source package would contain only those fixes
> > > plus the result of running "dch -r". Note that because of the way
> > > gcc-mingw-w64 works, this would involve pulling gcc-8 8.3.0-6 (or
> > > whatever version is in unstable when the package is built) in too.  
> > 
> > I haven't looked at the details of these patches yet, but I notice that this
> > doesn't address #923698 (which you set to serious). What's your plan with
> > that one?
> 
> I’m still working on it, it’s taking longer than I hoped to figure out what’s
> broken. I thought it would be worth getting the fixes I do have into the
> archive sooner rather than later, especially since #923214 prevents
> meaningful testing in a number of cases!

OK. That sounds reasonable.

I had a look at the patches, and they seem like something that would be
acceptable for buster. Please go ahead with the upload to unstable and remove
the moreinfo tag from this bug once the builds are done.

Thanks,

Ivo



Processed: Re: unblock: gcc-mingw-w64/21.2 (pre-upload approval request)

2019-04-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 confirmed moreinfo
Bug #926994 [release.debian.org] unblock: gcc-mingw-w64/21.2 (pre-upload 
approval request)
Added tag(s) moreinfo and confirmed.

-- 
926994: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926994
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#926994: unblock: gcc-mingw-w64/21.2 (pre-upload approval request)

2019-04-13 Thread Stephen Kitt
Hi Ivo,

On Sat, 13 Apr 2019 13:22:01 +0200, Ivo De Decker  wrote:
> On Sat, Apr 13, 2019 at 10:26:04AM +0200, Stephen Kitt wrote:
> > I have a couple of fixes pending upload for gcc-mingw-w64, and I’m
> > wondering if they’d pass muster for Buster. The attached patches fix,
> > in order:
> > 
> > * #923214 — an ICE hit with external static data members
> > * #925172 — std::filesystem support is broken in the current Buster
> >   package
> > 
> > I’m requesting approval for these fixes before uploading them to
> > unstable. The candidate source package would contain only those fixes
> > plus the result of running "dch -r". Note that because of the way
> > gcc-mingw-w64 works, this would involve pulling gcc-8 8.3.0-6 (or
> > whatever version is in unstable when the package is built) in too.  
> 
> I haven't looked at the details of these patches yet, but I notice that this
> doesn't address #923698 (which you set to serious). What's your plan with
> that one?

I’m still working on it, it’s taking longer than I hoped to figure out what’s
broken. I thought it would be worth getting the fixes I do have into the
archive sooner rather than later, especially since #923214 prevents
meaningful testing in a number of cases!

Regards,

Stephen


pgp9_pWREFjbI.pgp
Description: OpenPGP digital signature


Bug#926931: marked as done (unblock: golang-github-go-debos-fakemachine/0.0~git20181105.9316584-2)

2019-04-13 Thread Debian Bug Tracking System
Your message dated Sat, 13 Apr 2019 13:55:14 +
with message-id 
and subject line unblock golang-github-go-debos-fakemachine
has caused the Debian Bug report #926931,
regarding unblock: golang-github-go-debos-fakemachine/0.0~git20181105.9316584-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
926931: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926931
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package golang-github-go-debos-fakemachine

Fixes release critical bug which causes package to be unusable


diff -Nru 
golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/changelog 
golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/changelog
--- golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/changelog 
2018-11-09 10:15:18.0 +0100
+++ golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/changelog 
2019-04-12 11:53:04.0 +0200
@@ -1,3 +1,10 @@
+golang-github-go-debos-fakemachine (0.0~git20181105.9316584-2) unstable; 
urgency=medium
+
+  * fakemachine: execution fails due to missing shared lib
+(Closes: #924392)
+
+ -- Héctor Orón Martínez   Fri, 12 Apr 2019 11:53:04 +0200
+
 golang-github-go-debos-fakemachine (0.0~git20181105.9316584-1) unstable; 
urgency=medium
 
   * New upstream version 0.0~git20181105.9316584
diff -Nru 
golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/0001-Add-libresolve.so.2-in-the-initramfs.patch
 
golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/0001-Add-libresolve.so.2-in-the-initramfs.patch
--- 
golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/0001-Add-libresolve.so.2-in-the-initramfs.patch
   1970-01-01 01:00:00.0 +0100
+++ 
golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/0001-Add-libresolve.so.2-in-the-initramfs.patch
   2019-04-12 11:47:40.0 +0200
@@ -0,0 +1,25 @@
+From: Sjoerd Simons 
+Date: Tue, 5 Mar 2019 10:17:57 +0100
+Subject: Add libresolve.so.2 in the initramfs
+
+busybox in buster depends on libresolve.so.2 so copy it to the
+initramfs; Potentially in future fakemachine should move to
+busybox-static
+
+Signed-off-by: Sjoerd Simons 
+---
+ machine.go | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/machine.go b/machine.go
+index 4a9bd83..021ee67 100644
+--- a/machine.go
 b/machine.go
+@@ -457,6 +457,7 @@ func (m *Machine) startup(command string, extracontent 
[][2]string) (int, error)
+   if mergedUsrSystem() {
+   prefix = "/usr"
+   }
++  w.CopyFile(prefix + "/lib/x86_64-linux-gnu/libresolv.so.2")
+   w.CopyFile(prefix + "/lib/x86_64-linux-gnu/libc.so.6")
+   w.CopyFile(prefix + "/bin/busybox")
+ 
diff -Nru 
golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/series
 
golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/series
--- 
golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/series
1970-01-01 01:00:00.0 +0100
+++ 
golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/series
2019-04-12 11:47:40.0 +0200
@@ -0,0 +1 @@
+0001-Add-libresolve.so.2-in-the-initramfs.patch



unblock golang-github-go-debos-fakemachine/0.0~git20181105.9316584-2

-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: armhf

Kernel: Linux 4.19.0-4-amd64 (SMP w/16 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=ca_AD.UTF-8, LC_CTYPE=ca_AD.UTF-8 (charmap=UTF-8), 
LANGUAGE=ca_AD.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---
Unblocked golang-github-go-debos-fakemachine.--- End Message ---


Bug#926199: stretch-pu: package libreoffice/1:5.2.7-1+deb9u7 (was: Re: Bug#926199: stretch-pu: package libreoffice/1:5.2.7-1+deb9u6)

2019-04-13 Thread Rene Engelhard
On Thu, Apr 11, 2019 at 10:32:31PM +0200, Rene Engelhard wrote:
> this is now 1:5.2.7-1+deb9u7 given the Reiwa fix...
> 
> New diff will follow.

Here it is:

diff -Nru libreoffice-5.2.7/debian/changelog libreoffice-5.2.7/debian/changelog
--- libreoffice-5.2.7/debian/changelog  2019-04-11 21:48:53.0 +0200
+++ libreoffice-5.2.7/debian/changelog  2019-01-23 18:51:09.0 +0100
@@ -1,3 +1,15 @@
+libreoffice (1:5.2.7-1+deb9u7) stretch; urgency=medium
+
+  * debian/patches/mention-java-common-package.diff: update message to
+reflect current config dir...
+  * debian/patches/disableClassPathURLCheck.diff: revert openjdk is fixed
+
+  * debian/control.in:
+- make -core conflict against openjdk-8-jre-headless (= 8u181-b13-2~deb9u1)
+  (closes: 913641#) and build-conflict against it
+
+ -- Rene Engelhard   Wed, 23 Jan 2019 18:51:09 +0100
+
 libreoffice (1:5.2.7-1+deb9u6) stable; urgency=medium
 
* debian/patches/jp-JP-Reiwa.diff: Introduce next Japanese gengou
diff -Nru libreoffice-5.2.7/debian/control libreoffice-5.2.7/debian/control
--- libreoffice-5.2.7/debian/control2019-04-11 21:48:53.0 +0200
+++ libreoffice-5.2.7/debian/control2019-01-23 18:51:09.0 +0100
@@ -183,6 +183,7 @@
  nvidia-glx-dev,
  nvidia-glx-legacy-dev,
  nvidia-libopencl1,
+ openjdk-8-jre-headless (= 8u181-b13-2~deb9u1),
  qt3-dev-tools
 Standards-Version: 3.9.4
 Vcs-Git: https://anonscm.debian.org/git/pkg-openoffice/libreoffice.git
@@ -430,7 +431,10 @@
 myspell-sw (<< 1:3.1.0-3),
 myspell-th (<< 1:3.1.0-3),
 myspell-tl (<< 0.4-0-5)
-Conflicts: cacao-oj6-jre, libreoffice-filter-binfilter, libreoffice-unbundled
+Conflicts: cacao-oj6-jre,
+   libreoffice-filter-binfilter,
+   libreoffice-unbundled,
+   openjdk-8-jre-headless (= 8u181-b13-2~deb9u1)
 Provides: libreoffice-bundled
 Replaces: libreoffice-calc (<< 1:3.3.2-5),
   libreoffice-common (<< 1:4.4.0~rc3-1),
diff -Nru libreoffice-5.2.7/debian/control.in 
libreoffice-5.2.7/debian/control.in
--- libreoffice-5.2.7/debian/control.in 2019-04-11 21:48:53.0 +0200
+++ libreoffice-5.2.7/debian/control.in 2019-01-23 18:51:09.0 +0100
@@ -20,6 +20,7 @@
  libc6-dev (= 2.6.1-4) [i386 amd64],
  libcairo2 (= 1.4.8-1),
  libxul-dev (= 1.8.0.13~pre070720-0etch1),
+ openjdk-8-jre-headless (= 8u181-b13-2~deb9u1),
  nvidia-glx-dev,
  nvidia-glx-legacy-dev,
  qt3-dev-tools,
@@ -269,7 +270,7 @@
 myspell-th (<< 1:3.1.0-3),
 myspell-tl (<< 0.4-0-5),
 browser-plugin-libreoffice
-Conflicts: cacao-oj6-jre, libreoffice-filter-binfilter, libreoffice-unbundled
+Conflicts: cacao-oj6-jre, libreoffice-filter-binfilter, libreoffice-unbundled, 
openjdk-8-jre-headless (= 8u181-b13-2~deb9u1)
 Provides: libreoffice-bundled
 Replaces: libreoffice-calc (<< 1:3.3.2-5),
   libreoffice-common (<< 1:4.4.0~rc3-1),
diff -Nru libreoffice-5.2.7/debian/patches/disableClassPathURLCheck.diff 
libreoffice-5.2.7/debian/patches/disableClassPathURLCheck.diff
--- libreoffice-5.2.7/debian/patches/disableClassPathURLCheck.diff  
2019-04-11 21:48:53.0 +0200
+++ libreoffice-5.2.7/debian/patches/disableClassPathURLCheck.diff  
1970-01-01 01:00:00.0 +0100
@@ -1,10 +0,0 @@
 a/configure.ac-old 2018-12-28 11:10:35.953066686 +0100
-+++ b/configure.ac 2018-12-28 11:11:06.049403639 +0100
-@@ -6976,6 +6976,7 @@
- 
- # set to limit VM usage for JunitTests
- JAVAIFLAGS=-Xmx64M
-+JAVAIFLAGS="$JAVAIFLAGS 
-Djdk.net.URLClassPath.disableClassPathURLCheck=true"
- # set to limit VM usage for javac
- JAVAFLAGS=-J-Xmx128M
- fi
diff -Nru libreoffice-5.2.7/debian/patches/mention-java-common-package.diff 
libreoffice-5.2.7/debian/patches/mention-java-common-package.diff
--- libreoffice-5.2.7/debian/patches/mention-java-common-package.diff   
2019-04-11 21:48:53.0 +0200
+++ libreoffice-5.2.7/debian/patches/mention-java-common-package.diff   
2019-01-23 18:51:09.0 +0100
@@ -8,7 +8,7 @@
  fprintf(stderr,"javaldx: Could not find a Java Runtime Environment! 
\n");
 +fprintf(stderr,"Please ensure that a JVM and the package 
libreoffice-java-common\n");
 +fprintf(stderr,"is installed.\n");
-+fprintf(stderr,"If it is already installed then try removing 
~/.libreoffice/3/user/config/javasettings_Linux_*.xml\n");
++fprintf(stderr,"If it is already installed then try removing 
~/.config/libreoffice/4/user/config/javasettings_Linux_*.xml\n");
  return false;
  }
  else if (errcode != JFW_E_NONE && errcode != JFW_E_DIRECT_MODE)
diff -Nru libreoffice-5.2.7/debian/patches/series 
libreoffice-5.2.7/debian/patches/series
--- libreoffice-5.2.7/debian/patches/series 2019-04-11 

Bug#926994: unblock: gcc-mingw-w64/21.2 (pre-upload approval request)

2019-04-13 Thread Ivo De Decker
Hi,

On Sat, Apr 13, 2019 at 10:26:04AM +0200, Stephen Kitt wrote:
> I have a couple of fixes pending upload for gcc-mingw-w64, and I’m
> wondering if they’d pass muster for Buster. The attached patches fix,
> in order:
> 
> * #923214 — an ICE hit with external static data members
> * #925172 — std::filesystem support is broken in the current Buster
>   package
> 
> I’m requesting approval for these fixes before uploading them to
> unstable. The candidate source package would contain only those fixes
> plus the result of running "dch -r". Note that because of the way
> gcc-mingw-w64 works, this would involve pulling gcc-8 8.3.0-6 (or
> whatever version is in unstable when the package is built) in too.

I haven't looked at the details of these patches yet, but I notice that this
doesn't address #923698 (which you set to serious). What's your plan with that
one?

Thanks,

Ivo



Bug#927004: unblock: nvidia-cuda-toolkit/9.2.148-7

2019-04-13 Thread Andreas Beckmann
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package nvidia-cuda-toolkit

Hi,

while preparing the CUDA 10.1 packaging for experimental/NEW I noticed
some issues that have already been fixed in sid and I'd like to see in
buster (if we won't get 10.1 into buster).

* The examples were installed in an old location compared to the
documentation that moved with debhelper compat 11 some time ago.

* We were using several (outdated) copies of upstream configuration
files and wrapper scripts that contained our modifications. Turn these
into modifications into a patch and drop the copies instead.

* Finally use libjs-jquery and friends instead of shipping the .js
files.

* Simplify the packaging by using more substvars, avoiding the need to
change the same setting in several locations (and usually forgetting
one).

unblock nvidia-cuda-toolkit/9.2.148-7


Thanks for considering,

Andreas


nvidia-cuda-toolkit_9.2.148-7.dsc.diff.gz
Description: application/gzip


Bug#925214: adding logrotate 'missingok' for stretch

2019-04-13 Thread Andreas Beckmann
Hi,

I've now uploaded these two packages in the hope that they can make it
into the next point release.

Andreas



Bug#919395: Heads up to release team about MariadB 10.3

2019-04-13 Thread Andreas Beckmann
Hi,

I think with the removal of the transitional libmariadbclient18 from
testing we can consider this transition as finished. The corresponding
manual tracker should be archived as well, there are only a few sid-only
packages left depending on cruft.


Andreas



Bug#926994: unblock: gcc-mingw-w64/21.2 (pre-upload approval request)

2019-04-13 Thread Stephen Kitt
It’s always better *with* the patches...

Stephen
From 4b854c788af23f01c01afbd35a3befb060536297 Mon Sep 17 00:00:00 2001
From: Stephen Kitt 
Date: Tue, 9 Apr 2019 09:01:55 +0200
Subject: [PATCH 1/2] Apply upstream dllimport fix for static data members

Closes: #923214
---
 debian/changelog|  7 +++
 debian/patches/gcc9-pr88568-2.patch | 40 +
 debian/patches/series2  |  3 +--
 3 files changed, 48 insertions(+), 2 deletions(-)
 create mode 100644 debian/patches/gcc9-pr88568-2.patch

diff --git a/debian/changelog b/debian/changelog
index d9b3631..e540504 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,10 @@
+gcc-mingw-w64 (21.2) UNRELEASED; urgency=medium
+
+  * Apply upstream dllimport fix for static data members.
+Closes: #923214.
+
+ -- Stephen Kitt   Thu, 21 Mar 2019 10:45:08 +0100
+
 gcc-mingw-w64 (21.1) unstable; urgency=medium
 
   * Avoid attempting to strip plugins using the target strip; should fix
diff --git a/debian/patches/gcc9-pr88568-2.patch b/debian/patches/gcc9-pr88568-2.patch
new file mode 100644
index 000..3ad3568
--- /dev/null
+++ b/debian/patches/gcc9-pr88568-2.patch
@@ -0,0 +1,40 @@
+2019-03-05  Jakub Jelinek  
+
+	PR c/88568
+	* attribs.c (handle_dll_attribute): Don't clear TREE_STATIC for
+	dllimport on VAR_DECLs with RECORD_TYPE or UNION_TYPE DECL_CONTEXT.
+
+	* g++.dg/other/pr88568.C: New test.
+
+--- a/src/gcc/attribs.c	2019-01-10 11:44:07.122511397 +0100
 b/src/gcc/attribs.c	2019-03-05 13:59:51.745924578 +0100
+@@ -1691,8 +1691,11 @@ handle_dll_attribute (tree * pnode, tree
+ 	 a function global scope, unless declared static.  */
+ 	  if (current_function_decl != NULL_TREE && !TREE_STATIC (node))
+ 	TREE_PUBLIC (node) = 1;
+-	  /* Clear TREE_STATIC because DECL_EXTERNAL is set.  */
+-	  TREE_STATIC (node) = 0;
++	  /* Clear TREE_STATIC because DECL_EXTERNAL is set, unless
++	 it is a C++ static data member.  */
++	  if (DECL_CONTEXT (node) == NULL_TREE
++	  || !RECORD_OR_UNION_TYPE_P (DECL_CONTEXT (node)))
++	TREE_STATIC (node) = 0;
+ 	}
+ 
+   if (*no_add_attrs == false)
+--- a/src/gcc/testsuite/g++.dg/other/pr88568.C	2019-03-05 14:03:20.132509560 +0100
 b/src/gcc/testsuite/g++.dg/other/pr88568.C	2019-03-05 14:01:39.674155860 +0100
+@@ -0,0 +1,13 @@
++// PR c/88568
++// { dg-do compile }
++// { dg-require-dll "" }
++
++struct S {
++  __attribute__((dllimport)) static const char foo[];
++};
++
++int
++foo (int x)
++{
++  return S::foo[x];
++}
diff --git a/debian/patches/series2 b/debian/patches/series2
index 6f5002f..4f7963a 100644
--- a/debian/patches/series2
+++ b/debian/patches/series2
@@ -6,5 +6,4 @@ win-std-filesystem.patch
 hide-path-iostream-operators.patch
 filesystem_error-no-throw-copyable.patch
 overload-distance-and-advance.patch
-#update-path-compare-logic.patch
-#fix-filesystem-path-lexically_normal.patch
+gcc9-pr88568-2.patch
-- 
2.11.0

From e2b9e4ff772453fb81634b9715a83c83deb07d4a Mon Sep 17 00:00:00 2001
From: Stephen Kitt 
Date: Wed, 10 Apr 2019 18:01:26 +0200
Subject: [PATCH 2/2] Explicitly enable std::filesystem

... with the appropriate upstream patch.

Closes: #925172
---
 debian/changelog   |   2 +
 debian/g++-mingw-w64-i686.install.in   |   2 +-
 debian/g++-mingw-w64-x86-64.install.in |   2 +-
 debian/patches/series2 |   1 +
 .../set-shared_ptr-lock-policy-at-build-time.patch | 336 +
 debian/rules   |   8 +-
 6 files changed, 346 insertions(+), 5 deletions(-)
 create mode 100644 debian/patches/set-shared_ptr-lock-policy-at-build-time.patch

diff --git a/debian/changelog b/debian/changelog
index e540504..baee837 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -2,6 +2,8 @@ gcc-mingw-w64 (21.2) UNRELEASED; urgency=medium
 
   * Apply upstream dllimport fix for static data members.
 Closes: #923214.
+  * Explicitly enable std::filesystem, with the appropriate upstream
+patch. Closes: #925172.
 
  -- Stephen Kitt   Thu, 21 Mar 2019 10:45:08 +0100
 
diff --git a/debian/g++-mingw-w64-i686.install.in b/debian/g++-mingw-w64-i686.install.in
index e2aea2e..f79b2aa 100644
--- a/debian/g++-mingw-w64-i686.install.in
+++ b/debian/g++-mingw-w64-i686.install.in
@@ -7,5 +7,5 @@ usr/lib/gcc/i686-w64-mingw32/@@VERSION@@*/libstdc++-6.dll
 usr/lib/gcc/i686-w64-mingw32/@@VERSION@@*/libstdc++.a
 usr/lib/gcc/i686-w64-mingw32/@@VERSION@@*/libstdc++.dll.a
 usr/lib/gcc/i686-w64-mingw32/@@VERSION@@*/libstdc++.dll.a-gdb.py
-#usr/lib/gcc/i686-w64-mingw32/@@VERSION@@*/libstdc++fs.a
+usr/lib/gcc/i686-w64-mingw32/@@VERSION@@*/libstdc++fs.a
 usr/lib/gcc/i686-w64-mingw32/@@VERSION@@*/libsupc++.a
diff --git a/debian/g++-mingw-w64-x86-64.install.in b/debian/g++-mingw-w64-x86-64.install.in
index 76b0ea4..544290e 100644
--- a/debian/g++-mingw-w64-x86-64.install.in
+++ b/debian/g++-mingw-w64-x86-64.install.in
@@ -7,5 

Bug#926994: unblock: gcc-mingw-w64/21.2 (pre-upload approval request)

2019-04-13 Thread Stephen Kitt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hi,

I have a couple of fixes pending upload for gcc-mingw-w64, and I’m
wondering if they’d pass muster for Buster. The attached patches fix,
in order:

* #923214 — an ICE hit with external static data members
* #925172 — std::filesystem support is broken in the current Buster
  package

I’m requesting approval for these fixes before uploading them to
unstable. The candidate source package would contain only those fixes
plus the result of running "dch -r". Note that because of the way
gcc-mingw-w64 works, this would involve pulling gcc-8 8.3.0-6 (or
whatever version is in unstable when the package is built) in too.

Regards,

Stephen

unblock gcc-mingw-w64/21.2

-- System Information:
Debian Release: 9.8
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable'), (100, 
'unstable-debug'), (100, 'testing-debug'), (100, 'unstable'), (100, 'testing'), 
(1, 'experimental-debug'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.9.0-8-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)


Processed: unblock: sia/1.3.0-1.1

2019-04-13 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 moreinfo
Bug #926992 [release.debian.org] unblock: sia/1.3.0-1.1
Added tag(s) moreinfo.

-- 
926992: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926992
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#926992: unblock: sia/1.3.0-1.1

2019-04-13 Thread Andreas Beckmann
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Control: tag -1 moreinfo

Please unblock package sia

This NMU adds 'missingok' to the logrotate config, fixing piuparts
failures in sid, buster and upgrades to buster, where logrotate
configuration is now being checked by piuparts.

I missed this package in my previous round of NMUs and therefore it only
enetred DELAYED/5 a few minutes ago.

unblock sia/1.3.0-1.1


Thanks for considering,

Andreas
diff -Nru sia-1.3.0/debian/changelog sia-1.3.0/debian/changelog
--- sia-1.3.0/debian/changelog  2017-11-01 00:54:54.0 +0100
+++ sia-1.3.0/debian/changelog  2019-04-13 09:42:04.0 +0200
@@ -1,3 +1,10 @@
+sia (1.3.0-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Add 'missingok' to logrotate config.  (Closes: #910439)
+
+ -- Andreas Beckmann   Sat, 13 Apr 2019 09:42:04 +0200
+
 sia (1.3.0-1) unstable; urgency=medium
 
   [ Bjorn Dolk ]
diff -Nru sia-1.3.0/debian/sia.logrotate sia-1.3.0/debian/sia.logrotate
--- sia-1.3.0/debian/sia.logrotate  2017-11-01 00:54:54.0 +0100
+++ sia-1.3.0/debian/sia.logrotate  2019-04-13 09:32:11.0 +0200
@@ -3,4 +3,5 @@
 copytruncate
 rotate 14
 compress
+missingok
 }


Bug#926991: unblock: rinetd/0.62.1sam-1.1

2019-04-13 Thread Andreas Beckmann
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package rinetd

This NMU adds 'missingok' to the logrotate config, fixing piuparts
failures in sid, buster and upgrades to buster, where logrotate
configuration is now being checked by piuparts.

unblock rinetd/0.62.1sam-1.1


Thanks for considering,

Andreas



Bug#926990: unblock: net-acct/0.71-9.1

2019-04-13 Thread Andreas Beckmann
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package net-acct

This NMU adds 'missingok' to the logrotate config, fixing piuparts
failures in sid, buster and upgrades to buster, where logrotate
configuration is now being checked by piuparts.

unblock net-acct/0.71-9.1


Thanks for considering,

Andreas
diff -Nru net-acct-0.71/debian/changelog net-acct-0.71/debian/changelog
--- net-acct-0.71/debian/changelog  2009-11-01 12:37:29.0 +0100
+++ net-acct-0.71/debian/changelog  2019-04-02 19:59:09.0 +0200
@@ -1,3 +1,10 @@
+net-acct (0.71-9.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Add 'missingok' to logrotate config.  (Closes: #916647)
+
+ -- Andreas Beckmann   Tue, 02 Apr 2019 19:59:09 +0200
+
 net-acct (0.71-9) unstable; urgency=low
 
   * Move patches to upstream to quilt series
diff -Nru net-acct-0.71/debian/net-acct.logrotate 
net-acct-0.71/debian/net-acct.logrotate
--- net-acct-0.71/debian/net-acct.logrotate 2009-10-29 23:23:21.0 
+0100
+++ net-acct-0.71/debian/net-acct.logrotate 2019-03-21 11:02:10.0 
+0100
@@ -2,6 +2,7 @@
   rotate 14
   daily
   compress
+  missingok
   prerotate
 if test -r /var/run/nacctd.pid; then
   # Stop writing out entries
@@ -20,6 +21,7 @@
   rotate 2
   daily
   compress
+  missingok
   prerotate
 if test -r /var/run/nacctd.pid; then
   # Stop writing out entries


Bug#926989: unblock: nagzilla/2.0-1.1

2019-04-13 Thread Andreas Beckmann
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package nagzilla

This NMU fixes a logrotate problem after package removal discovered by
piuparts.
No longer delete the user and group after package removal since it is
still referenced in the config file. Also keep the user/group after
purge which is the nowadays generally recommended way of handling system
users. I verified that the package reinstalls without problems after it
has been purged, but the user/group remained.

unblock nagzilla/2.0-1.1


Thanks for considering,

Andreas
diff -Nru nagzilla-2.0/debian/changelog nagzilla-2.0/debian/changelog
--- nagzilla-2.0/debian/changelog   2016-01-20 00:14:45.0 +0100
+++ nagzilla-2.0/debian/changelog   2019-04-02 20:16:12.0 +0200
@@ -1,3 +1,11 @@
+nagzilla (2.0-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Do not delete the nagzilla user and group after package removal.
+(Closes: #915662)
+
+ -- Andreas Beckmann   Tue, 02 Apr 2019 20:16:12 +0200
+
 nagzilla (2.0-1) unstable; urgency=medium
 
   * New upstream release, obsoleting patch 05_fix-logrotate-file and
diff -Nru nagzilla-2.0/debian/postrm nagzilla-2.0/debian/postrm
--- nagzilla-2.0/debian/postrm  2016-01-18 21:35:54.0 +0100
+++ nagzilla-2.0/debian/postrm  1970-01-01 01:00:00.0 +0100
@@ -1,39 +0,0 @@
-#!/bin/sh
-# postrm script for nagzilla
-#
-# see: dh_installdeb(1)
-
-set -e
-
-# summary of how this script can be called:
-#*  `remove'
-#*  `purge'
-#*  `upgrade' 
-#*  `failed-upgrade' 
-#*  `abort-install'
-#*  `abort-install' 
-#*  `abort-upgrade' 
-#*  `disappear' 
-#  
-# for details, see http://www.debian.org/doc/debian-policy/ or
-# the debian-policy package
-
-
-case "$1" in
-purge|remove|upgrade|failed-upgrade|abort-install|abort-upgrade|disappear)
-deluser --quiet --system nagzilla > /dev/null || true
-delgroup --quiet --system nagzilla > /dev/null || true
-;;
-
-*)
-echo "postrm called with unknown argument \`$1'" >&2
-exit 1
-;;
-esac
-
-# dh_installdeb will replace this with shell code automatically
-# generated by other debhelper scripts.
-
-#DEBHELPER#
-
-exit 0


Bug#926987: marked as done (unblock: homer-api/5.0.6+dfsg2-3.1)

2019-04-13 Thread Debian Bug Tracking System
Your message dated Sat, 13 Apr 2019 08:04:00 +
with message-id <7acb3d5f-09e1-00e2-3daf-bbaf8c046...@thykier.net>
and subject line Re: Bug#926987: unblock: homer-api/5.0.6+dfsg2-3.1
has caused the Debian Bug report #926987,
regarding unblock: homer-api/5.0.6+dfsg2-3.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
926987: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926987
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package homer-api

This update adds 'missingok' to the logrotate config, fixing piuparts
failures in sid, buster and upgrades to buster, where logrotate
configuration is now being checked by piuparts.

unblock homer-api/5.0.6+dfsg2-3.1


Thanks for considering,

Andreas
diff -Nru homer-api-5.0.6+dfsg2/debian/changelog 
homer-api-5.0.6+dfsg2/debian/changelog
--- homer-api-5.0.6+dfsg2/debian/changelog  2016-09-25 10:35:57.0 
+0200
+++ homer-api-5.0.6+dfsg2/debian/changelog  2019-04-02 20:06:08.0 
+0200
@@ -1,3 +1,10 @@
+homer-api (5.0.6+dfsg2-3.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Add 'missingok' to logrotate config.  (Closes: #911294)
+
+ -- Andreas Beckmann   Tue, 02 Apr 2019 20:06:08 +0200
+
 homer-api (5.0.6+dfsg2-3) unstable; urgency=medium
 
   * More lintian fixes.
diff -Nru homer-api-5.0.6+dfsg2/debian/homer-api.logrotate 
homer-api-5.0.6+dfsg2/debian/homer-api.logrotate
--- homer-api-5.0.6+dfsg2/debian/homer-api.logrotate2016-09-24 
14:22:38.0 +0200
+++ homer-api-5.0.6+dfsg2/debian/homer-api.logrotate2019-03-21 
11:22:45.0 +0100
@@ -1,6 +1,7 @@
 /var/log/homer.log
 {
 sharedscripts
+missingok
 postrotate
invoke-rc.d rsyslog rotate > /dev/null
 endscript
--- End Message ---
--- Begin Message ---
Andreas Beckmann:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> 
> Please unblock package homer-api
> 
> This update adds 'missingok' to the logrotate config, fixing piuparts
> failures in sid, buster and upgrades to buster, where logrotate
> configuration is now being checked by piuparts.
> 
> unblock homer-api/5.0.6+dfsg2-3.1
> 
> 
> Thanks for considering,
> 
> Andreas
> 

Unblocked, thanks.
~Niels--- End Message ---


Bug#926987: unblock: homer-api/5.0.6+dfsg2-3.1

2019-04-13 Thread Andreas Beckmann
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package homer-api

This update adds 'missingok' to the logrotate config, fixing piuparts
failures in sid, buster and upgrades to buster, where logrotate
configuration is now being checked by piuparts.

unblock homer-api/5.0.6+dfsg2-3.1


Thanks for considering,

Andreas
diff -Nru homer-api-5.0.6+dfsg2/debian/changelog 
homer-api-5.0.6+dfsg2/debian/changelog
--- homer-api-5.0.6+dfsg2/debian/changelog  2016-09-25 10:35:57.0 
+0200
+++ homer-api-5.0.6+dfsg2/debian/changelog  2019-04-02 20:06:08.0 
+0200
@@ -1,3 +1,10 @@
+homer-api (5.0.6+dfsg2-3.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Add 'missingok' to logrotate config.  (Closes: #911294)
+
+ -- Andreas Beckmann   Tue, 02 Apr 2019 20:06:08 +0200
+
 homer-api (5.0.6+dfsg2-3) unstable; urgency=medium
 
   * More lintian fixes.
diff -Nru homer-api-5.0.6+dfsg2/debian/homer-api.logrotate 
homer-api-5.0.6+dfsg2/debian/homer-api.logrotate
--- homer-api-5.0.6+dfsg2/debian/homer-api.logrotate2016-09-24 
14:22:38.0 +0200
+++ homer-api-5.0.6+dfsg2/debian/homer-api.logrotate2019-03-21 
11:22:45.0 +0100
@@ -1,6 +1,7 @@
 /var/log/homer.log
 {
 sharedscripts
+missingok
 postrotate
invoke-rc.d rsyslog rotate > /dev/null
 endscript


Bug#926982: marked as done (unblock: ocserv/0.12.2-3)

2019-04-13 Thread Debian Bug Tracking System
Your message dated Sat, 13 Apr 2019 07:54:00 +
with message-id <847f09c0-8e16-3984-8193-717f30e95...@thykier.net>
and subject line Re: Bug#926982: unblock: ocserv/0.12.2-3
has caused the Debian Bug report #926982,
regarding unblock: ocserv/0.12.2-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
926982: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926982
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hi,

Please unblock package ocserv

It fixes a segfault problem in the worker binary as described in
upstream bug tracker:
https://gitlab.com/openconnect/ocserv/issues/197

Attached is the debdiff between 0.12.2-2 and 0.12.2-3.

unblock ocserv/0.12.2-3

Regards,
Aron


ocserv_0.12.2-3.debdiff
Description: Binary data
--- End Message ---
--- Begin Message ---
Aron Xu:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> 
> Hi,
> 
> Please unblock package ocserv
> 
> It fixes a segfault problem in the worker binary as described in
> upstream bug tracker:
> https://gitlab.com/openconnect/ocserv/issues/197
> 
> Attached is the debdiff between 0.12.2-2 and 0.12.2-3.
> 
> unblock ocserv/0.12.2-3
> 
> Regards,
> Aron
> 

Unblocked, thanks.
~Niels--- End Message ---


Bug#926982: unblock: ocserv/0.12.2-3

2019-04-13 Thread Aron Xu
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hi,

Please unblock package ocserv

It fixes a segfault problem in the worker binary as described in
upstream bug tracker:
https://gitlab.com/openconnect/ocserv/issues/197

Attached is the debdiff between 0.12.2-2 and 0.12.2-3.

unblock ocserv/0.12.2-3

Regards,
Aron


ocserv_0.12.2-3.debdiff
Description: Binary data