Bug#964077: one more patch on top for container execution

2020-07-13 Thread Christian Ehrhardt
Testing across more test environments showed that the link tests will fail
in containers.
To not throw away the other tests in those environments via e.g. a
restriction to only run in VMs I decided to just skip the link tests in
this case. Here is the patch that would go on top of the others I already
reported.

-- 
Christian Ehrhardt
Staff Engineer, Ubuntu Server
Canonical Ltd
From a7166325c8c34a8ae45480e93513a900f0c474ee Mon Sep 17 00:00:00 2001
From: Christian Ehrhardt 
Date: Tue, 14 Jul 2020 07:52:10 +0200
Subject: [PATCH] d/t/test-build: link tests fail in containers

Signed-off-by: Christian Ehrhardt 
---
 debian/tests/test-build | 12 
 1 file changed, 8 insertions(+), 4 deletions(-)

diff --git a/debian/tests/test-build b/debian/tests/test-build
index 20b4115..0360b5f 100644
--- a/debian/tests/test-build
+++ b/debian/tests/test-build
@@ -44,10 +44,14 @@ cmpio_uring-cpio_uring-cp.copy
 ./io_uring-cp-static   io_uring-cp-static io_uring-cp-static.copy
 cmpio_uring-cp-static io_uring-cp-static.copy
 
-./link-cp  link-cplink-cp.link
-cmplink-cplink-cp.link
-./link-cp-static   link-cp-static link-cp-static.link
-cmplink-cp-static link-cp-static.link
+# known to fail in containers
+if ! systemd-detect-virt --container -q; then
+./link-cp  link-cplink-cp.link
+cmplink-cplink-cp.link
+
+./link-cp-static   link-cp-static link-cp-static.link
+cmplink-cp-static link-cp-static.link
+fi
 
 ./ucontext-cp  ucontext-cpucontext-cp.copy
 cmpucontext-cpucontext-cp.copy
-- 
2.27.0



Bug#964910: RM: jigl -- ROM; dead upstream, low popcon, alternatives exist

2020-07-13 Thread Nicholas Breen
On Mon, Jul 13, 2020 at 04:55:36PM -0700, Sean Whitton wrote:
> control: tag -1 + moreinfo
> 
> Hello Nicholas,
[...]
> Is there any reason to think the software no longer works?
> 
> Otherwise, perhaps it would be better if you were simply to orphan it.

Hi Sean,

It does still work (modulo #936008, which requires rewriting one script
-- though the package is basically just two scripts).  However, there's
nothing it does that other packages don't do equally well or better; it
could be orphaned and remain for another release or two, but I'm not
convinced it's helping anyone trying to decide between all the results
of "apt-cache search galler(y|ies)".



Nicholas



Bug#964997: simgear FTCBFS: does not pass cross flags for cmake

2020-07-13 Thread Helmut Grohne
Source: simgear
Version: 1:2020.1.3+dfsg-1
Tags: patch
User: debian-cr...@lists.debian.org
Usertags: ftcbfs

simgear fails to cross build from source, because it does not pass cross
flags to cmake. The easiest way of doing so - using dh_auto_configure -
makes simgear cross buildable. Please consider applying the attached
patch.

Helmut
diff --minimal -Nru simgear-2020.1.3+dfsg/debian/changelog 
simgear-2020.1.3+dfsg/debian/changelog
--- simgear-2020.1.3+dfsg/debian/changelog  2020-07-12 16:44:06.0 
+0200
+++ simgear-2020.1.3+dfsg/debian/changelog  2020-07-13 17:57:08.0 
+0200
@@ -1,3 +1,10 @@
+simgear (1:2020.1.3+dfsg-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix FTCBFS: Let dh_auto_configure pass cross flags to cmake. (Closes: #-1)
+
+ -- Helmut Grohne   Mon, 13 Jul 2020 17:57:08 +0200
+
 simgear (1:2020.1.3+dfsg-1) unstable; urgency=medium
 
   * New upstream version 2020.1.3+dfsg
diff --minimal -Nru simgear-2020.1.3+dfsg/debian/rules 
simgear-2020.1.3+dfsg/debian/rules
--- simgear-2020.1.3+dfsg/debian/rules  2020-07-12 16:41:48.0 +0200
+++ simgear-2020.1.3+dfsg/debian/rules  2020-07-13 17:57:08.0 +0200
@@ -32,7 +32,6 @@
-DCMAKE_CXX_FLAGS="$(CXXFLAGS)" \
-DCMAKE_CXX_FLAGS_RELWITHDEBINFO="-g -DNDEBUG" \
-DCMAKE_SHARED_LINKER_FLAGS="$(LDFLAGS)" \
-   -DCMAKE_VERBOSE_MAKEFILE=ON \
-DCMAKE_INSTALL_PREFIX:PATH=/usr \
-DSIMGEAR_SHARED=OFF \
-DSYSTEM_EXPAT=ON \
@@ -43,8 +42,7 @@
dh $@ --buildsystem=cmake --builddirectory=build
 
 override_dh_auto_configure:
-   mkdir build
-   cd build && cmake .. $(CMAKE_FLAGS)
+   dh_auto_configure -- $(CMAKE_FLAGS)
 
 override_dh_clean:
dh_clean


Bug#959828: systemctl: `Provides: systemd`, but doesn't provide what systemd does

2020-07-13 Thread Ross Vandegrift
On Wed, May 20, 2020 at 12:48:18PM -0700, Ross Vandegrift wrote:
> On Thu, May 07, 2020 at 07:52:31PM +0200, Julien Cristau wrote:
> > On Thu, May 07, 2020 at 09:48:34PM +1000, Dmitry Smirnov wrote:
> > > On Thursday, 7 May 2020 7:04:17 PM AEST Julien Cristau wrote:
> > > > This use of Provides is not acceptable.  The systemctl package does not
> > > > in any way provide the same functionality / interfaces as the systemd
> > > > package, and as such it does not get to pretend that it does and cause
> > > > problems to other packages.
> > > 
> > > I have to challenge that. "systemctl" provides enough functionality to 
> > > replace "systemd" inside application containers. Therefore there are 
> > > situations where "Provides: systemd" is justified.
> > > 
> > That's not what "Provides" means though.  What you're saying is
> > "systemctl provides a subset of the systemd package's functionality".
> > That's not good enough.  Provides is much stronger than "there are cases
> > where this might be enough", and there's more to systemd than systemctl.
> 
> Indeed- packages that Build-Depend on systemd need a way to express that
> fact.  experimental builds use apt-cudf, which now sees systemctl as a
> more attractive solution:
> https://buildd.debian.org/status/package.php?p=e17=experimental

Hi Dmitry - systemctl is still breaking builds in experimental, any updates?

Ross



Bug#964927: ibus-avro: Remove deps on ibus IM module packages

2020-07-13 Thread Gunnar Hjalmarsson

On 2020-07-14 04:17, Changwoo Ryu wrote:

That is not set as default. Add the "tagpending' webhook URL below
in the project settings.

https://salsa.debian.org/salsa/salsa-webhook


Ah, thanks! (Would have been a sensible default IMO.)

--
Gunnar Hjalmarsson
https://launchpad.net/~gunnarhj



Bug#964996: ibus-unikey: Remove deps on ibus IM module packages

2020-07-13 Thread Changwoo Ryu
Package: ibus-unikey
Version: 0.7.0~beta1-0.1
Severity: normal

Currently ibus-unikey depends on ibus-gtk and ibus-gtk3.

These IM module package are for supporting UIs and they should not be in 
Depends of ibus language engine packages.



Bug#964995: RFS: kcollectd/0.11.99.0-1 -- simple collectd graphing front-end for KDE

2020-07-13 Thread Antonio Russo
Package: sponsorship-requests
Severity: normal
X-Debbugs-CC: pkg-kde-t...@alioth-lists.debian.net

Dear mentors,

I am looking for a sponsor for my package "kcollectd":

 * Package name: kcollectd
   Version : 0.11.99.0-1
   Upstream Author : Antonio Russo (myself)
 * URL : www.antonioerusso.com/projects/kcollectd
 * License : GPLv3
 * Vcs : https://salsa.debian.org/qt-kde-team/extras/kcollectd.git
   Section : utils

It builds these binary packages:

  kcollectd

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/kcollectd

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/k/kcollectd/kcollectd_0.11.99.0-1.dsc

Changes since the last upload:

  * New upstream release 0.11.99.0.
- Includes --basedir CLI option to select directory containing RRDs.
  * Do not depend on collectd at build or runtime.
  * Bump debhelper-compat to 13 (no changes).


Most critically of the above is that it avoids a build dependency on collectd, 
which is
currently due to be autoremoved in 4 days.

Though this program may be most useful on a machine that has collectd installed,
it is still useful for viewing RRD files that are remote (via, say, sshfs).  
This
is actually a recent, specific feature request [1].

Best,
Antonio Russo

[1] https://gitlab.com/aerusso/kcollectd/-/issues/4



Bug#964994: RFS: pybj/0.2.5-1 [ITP] -- Binary JData (BJData) encoder/decoder for Python 2

2020-07-13 Thread Qianqian Fang

Package: sponsorship-requests
Severity: wishlist

Dear mentors,

I am looking for a sponsor for my package "pybj"

* Package name : pybj
Version : 0.2.5-1
Upstream Author : [fill in name and email of upstream]
* URL : https://github.com/fangq/pybj
* License : Apache-2.0
* Vcs : https://salsa.debian.org/science-team/pybj
Section : python

It builds those binary packages:

python-bjdata - Binary JData (BJData) encoder/decoder for Python 2
python3-bjdata - Binary JData (BJData) encoder/decoder for Python 3

To access further information about this package, please visit the 
following URL:


https://mentors.debian.net/package/pybj

Alternatively, one can download the package with dget using this command:

dget -x https://mentors.debian.net/debian/pool/main/p/pybj/pybj_0.2.5-1.dsc

Changes since the last upload:

* Initial release. (Closes: #964984)

Regards,



Bug#964986: buster-pu: package ksh/93u+20120801-3.4

2020-07-13 Thread Salvatore Bonaccorso
Hi Anuradha,

[disclaimer: not a member of the release team, so not an authoritative
reply]

On Mon, Jul 13, 2020 at 06:56:27PM -0400, Anuradha Weeraman wrote:
> Package: release.debian.org
> Severity: normal
> Tags: buster
> User: release.debian@packages.debian.org
> Usertags: pu
> X-Debbugs-Cc: anura...@debian.org, car...@debian.org
> 
> [ Reason ]
> Summary of the issue: In ksh version 20120801, a flaw was found in the
> way it evaluates certain environment variables. An attacker could use
> this flaw to override or bypass environment restrictions to execute
> shell commands.
> 
> [ Impact ]
> Services and applications that allow remote unauthenticated
> attackers to provide one of those environment variables could allow them
> to exploit this issue remotely, although the risk is deemed low.
> 
> [ Tests ]
> There is a test included in the diff that was used to validate the
> fix. Also, the regression test suite was run to make sure there were
> no regressions.
> 
> [ Risks ]
> The regression test suite has been run before and after the patch to
> confirm no new regressions. Also, the fix is applied in unstable with no
> new issues reported.
> 
> [ Checklist ]
> [X] *all* changes are documented in the d/changelog
> [X] I reviewed all changes and I approve them
> [X] attach debdiff against the package in (old)stable
> [X] the issue is verified as fixed in unstable
> 
> [ Changes ]
> * Patch to arith.c that fixes the CVE
> * Test case for the fix
> 
> [ Other info ]
> This was brought up to the security team first, and it was deemed that a
> DSA is not required by Salvatore Bonaccorso.

Small change is needed in the debdiff:

> diff -Nru ksh-93u+20120801/debian/changelog ksh-93u+20120801/debian/changelog
> --- ksh-93u+20120801/debian/changelog 2018-12-14 02:26:58.0 -0500
> +++ ksh-93u+20120801/debian/changelog 2020-07-12 11:26:07.0 -0400
> @@ -1,3 +1,15 @@
> +ksh (93u+20120801-4+deb10u1) buster-security; urgency=high
 
The target distribution would need to be 'buster' in this case of the
upload for the point release.

Thanks for your work on this update,

Regards,
Salvatore



Bug#964993: RFS: pyjdata/0.3.5-1 [ITP] -- JData format encoder/decoder for Python 2

2020-07-13 Thread Qianqian Fang

Package: sponsorship-requests
Severity: wishlist

Dear mentors,

I am looking for a sponsor for my package "pyjdata"

* Package name : pyjdata
Version : 0.3.5-1
Upstream Author : [fill in name and email of upstream]
* URL : https://github.com/fangq/pyjdata
* License : Apache-2.0
* Vcs : https://salsa.debian.org/science-team/pyjdata
Section : python

It builds those binary packages:

python-jdata - JData encoder/decoder for Python 2
python3-jdata - JData encoder/decoder for Python 3

To access further information about this package, please visit the 
following URL:


https://mentors.debian.net/package/pyjdata

Alternatively, one can download the package with dget using this command:

dget -x 
https://mentors.debian.net/debian/pool/main/p/pyjdata/pyjdata_0.3.5-1.dsc


Changes since the last upload:

* Initial release. (Closes: #964984)

Regards,



Bug#944738: jlink: Hash of module differs to expected hash recorded in java.base

2020-07-13 Thread tmancill
On Tue, Apr 07, 2020 at 09:40:52AM +0200, masar wrote:
> 
> Hi,
> 
> the bug is still present in
> 
>openjdk-11-jdk 11.0.7+9-1

Hi Maurizio,

In your initial bug report you said that you have a reproducible test
case with docker.  Would you mind sharing that with me?

FWIW, I happened to notice a similar bug reported against AdoptOpenJDK
builds (https://github.com/AdoptOpenJDK/openjdk-build/issues/1214) that
makes we wonder if there a common root cause, perhaps in the toolchains
used by both projects to build OpenJDK.

Thank you,
tony


signature.asc
Description: PGP signature


Bug#870641: light-locker: screen stays black after closing and opening laptop lid

2020-07-13 Thread Aaron Lu
On Mon, Jul 13, 2020 at 08:26:14PM +0200, Yves-Alexis Perez wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Mon, 2020-07-13 at 10:33 +0800, Aaron Lu wrote:
> > On Tue, May 12, 2020 at 11:13:52AM +0200, Yves-Alexis Perez wrote:
> > > I've also re-pinged upstream Linux and the patch should be included in the
> > > next Linux point release (hopefully 4.19.123), and which will then be
> > > included
> > > in Debian buster for the next Debian point release (hopefully 10.5). It's
> > > not
> > > tomorrow but still it should help at one point.
> > 
> > Just want to report that I have installed 5.6.0-0.bpo.2-amd64 from
> > buster-backport and now the display can be powered back on when I
> > pressed my keyboard or moved my mouse.
> 
> Could you try linux-image-4.19.0-10-amd64 from testing-proposed-updates and
> report back? It should include the fix.

It doesn't seem easy to install packages from testing-proposed-updates.
https://wiki.debian.org/TestingProposedUpdates doesn't tell me how to do
that and after adding:
deb http://some_debian_mirror/debian/ testing-proposed-updates main
'apt-cache search linux-image' doesn't show me linux-image-4.19.0-10-amd64..

Anyway, I downloaded this package directly from the mirror's pool:
linux-image-4.19.0-10-amd64-unsigned_4.19.131-2_amd64.deb
Is the above package correct?

And the good news is, this kernel also works fine :-)

> > I do not see any other problems right now, everything seems to work
> > fine, except one error message in dmesg everytime the display goes the
> > off-on cycle:
> > broken atomic modeset userspace detected, disabling atomic
> > But I guess it's a different problem and it doesn't seem to cause any
> > problem.
> 
> Actually the problem lies in the way Xorg uses atomic, and that's why the fix
> is to disable them. So if you see the message that means the fix is correctly
> applied.

I see, thanks for the explanation.



Bug#964992: ITP: pyjdata -- JData format encoder/decoder for Python

2020-07-13 Thread Qianqian Fang

Package: wnpp
Severity: wishlist

Name:   pybjdata
Version:    0.3.5
Summary:    JData format encoder/decoder for Python
License:    Apache 2.0
URL:    https://github.com/fangq/pybjdata

Description:
The JData Specification (https://github.com/fangq/jdata/) defines a
lightweight language-independent data annotation interface targeted at
storing and sharing complex data structures across different programming
languages such as MATLAB, JavaScript, Python etc. Using JData formats, a
complex Python data structure can be encoded as a `dict` object that is
easily serialized as a JSON/binary JSON file and share such data between
programs of different languages.

Comment:
I am the upstream author and maintainer of this python module.



Bug#964927: ibus-avro: Remove deps on ibus IM module packages

2020-07-13 Thread Changwoo Ryu
2020년 7월 14일 (화) 오전 12:39, Gunnar Hjalmarsson 님이 작성:
>
> Control: tags -1 + pending
>
> Fix pushed to repo:
> https://salsa.debian.org/input-method-team/ibus-avro/-/commit/06990e57
>
> (Don't know why salsa didn't do this automatically.)

That is not set as default. Add the "tagpending' webhook URL below in
the project settings.

https://salsa.debian.org/salsa/salsa-webhook



Bug#963750: RM: chef -- ROM; trademark issues

2020-07-13 Thread Jason Self
On Mon, 13 Jul 2020 16:49:25 -0700
Sean Whitton  wrote:
> DFSG#4 probably covers this case.

...if it were moved into non-free, since "Chef" currently fails DFSG
#1, but even that's not an option if Debian can't distribute "Chef" in
the first place, lest the project run afoul of the trademark policy.

Adopting Cinc as a rebranded version of Chef would sidestep the entire
matter: https://cinc.sh/


pgpYPkPdWTnJb.pgp
Description: OpenPGP digital signature


Bug#821341: debian-installer: unbootable, no gpt partition for uefi install

2020-07-13 Thread Валерий Заподовников
What is the status of this bug? Also can somebody delete one spam message
above. We should support 0xEF MBR. Also look at the note here about "UEFI
to the MBR handle". What the hell is that?
https://books.google.ru/books?id=ePNODQAAQBAJ=PT524=PT524=mbr+0xef+UEFI=bl=QAyIhjP_gS=ACfU3U2dHce5h6O7So55jIuS7pLBi4EP6w=ru=X=2ahUKEwjDrpyGtsvqAhV1w8QBHc0qBoEQ6AEwBHoECAMQAQ#v=onepage=mbr%200xef%20UEFI=false


Bug#885195: [Pkg-electronics-devel] Bug#885195: Bug#885195: geda-gaf: please migrate to guile-2.2

2020-07-13 Thread Rob Browning
Bdale Garbee  writes:

> So... while I'm sure gEDA could be "saved" in Debian with enough effort,
> I just don't see the point, and won't put any time or attention on it
> myself.   

I'd suggest we should do something "soonish".  This is the last package
holding guile-2.0 in testing, and I'd *really* like to be able to finish
the guile-2.0 removal.

For what it's worth, I thought I'd see how hard it might be to update to
guile-3.0, and the attached (very primitive/incomplete) diff does get
the current package to build and pass all but one of the tests here
(assuming that wasn't a short-circuit and there are more tests after
that).

However, unless someone's interested in maintaining the package,
pursuing guile-3.0 support, upgrading to 1.10, etc.  Perhaps it's best
to file for removal now.  We can always reintroduce it later, if the
situation improves.

diff --git a/configure.ac b/configure.ac
index 30328f5..2b42fd6 100644
--- a/configure.ac
+++ b/configure.ac
@@ -70,7 +70,9 @@ AX_DESKTOP_I18N
 
 PKG_PROG_PKG_CONFIG
 
-AX_CHECK_GUILE([1.8.0])
+GUILE_PKG([3.0])
+GUILE_PROGS
+GUILE_FLAGS
 
 PKG_CHECK_MODULES(GLIB, [glib-2.0 >= 2.20.0], ,
   AC_MSG_ERROR([GLib 2.20.0 or later is required.]))
diff --git a/debian/control b/debian/control
index fc66e52..a7a8e0a 100644
--- a/debian/control
+++ b/debian/control
@@ -4,7 +4,7 @@ Priority: optional
 Maintainer: Debian Electronics Team 
 Uploaders: Peter Clifton , أحمد المحمودي (Ahmed El-Mahmoudy) , Bdale Garbee 
 Standards-Version: 4.2.0
-Build-Depends: debhelper (>= 11), libgtk2.0-dev (>= 2.16.0), guile-2.0-dev, libgd-dev, libxml-parser-perl, ghostscript, transfig, libstroke0-dev, groff, libglib2.0-dev, flex, intltool, texinfo
+Build-Depends: debhelper (>= 11), libgtk2.0-dev (>= 2.16.0), guile-3.0-dev, libgd-dev, libxml-parser-perl, ghostscript, transfig, libstroke0-dev, groff, libglib2.0-dev, flex, intltool, texinfo
 Homepage: http://www.geda-project.org/
 Vcs-Git: https://salsa.debian.org/electronics-team/geda-gaf.git
 Vcs-Browser: https://salsa.debian.org/electronics-team/geda-gaf
@@ -48,7 +48,7 @@ Description: GPL EDA -- Electronics design software (library files)
 Package: libgeda-dev
 Architecture: any
 Section: libdevel
-Depends: ${misc:Depends}, ${shlibs:Depends}, libgeda42 (= ${binary:Version}), libgtk2.0-dev, guile-2.0-dev [!ia64], guile-1.8-dev [ia64], libgd-dev
+Depends: ${misc:Depends}, ${shlibs:Depends}, libgeda42 (= ${binary:Version}), libgtk2.0-dev, guile-3.0-dev, libgd-dev
 Pre-Depends: ${misc:Pre-Depends}
 Description: GPL EDA -- Electronics design software (development files)
  The gEDA project has produced and continues working on a full GPL'd suite and
diff --git a/gnetlist/src/parsecmd.c b/gnetlist/src/parsecmd.c
index aa31e86..9f15f6d 100644
--- a/gnetlist/src/parsecmd.c
+++ b/gnetlist/src/parsecmd.c
@@ -206,13 +206,13 @@ parse_commandline (int argc, char *argv[])
   backend_params = g_slist_append(backend_params, optarg);
   break;
 
-case 'c':
-  scm_internal_stack_catch (SCM_BOOL_T,
-(scm_t_catch_body) scm_c_eval_string,
-(void *) optarg,
-(scm_t_catch_handler) catch_handler,
-(void *) optarg);
-  break;
+/* case 'c': */
+/*   scm_internal_stack_catch (SCM_BOOL_T, */
+/* (scm_t_catch_body) scm_c_eval_string, */
+/* (void *) optarg, */
+/* (scm_t_catch_handler) catch_handler, */
+/* (void *) optarg); */
+/*   break; */
 
 case 'h':
   usage(argv[0]);
diff --git a/gschem/src/Makefile.am b/gschem/src/Makefile.am
index 12d22d6..b4cfd24 100644
--- a/gschem/src/Makefile.am
+++ b/gschem/src/Makefile.am
@@ -98,7 +98,7 @@ SUFFIXES = .x
 snarf_cpp_opts = $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) \
 	$(gschem_CPPFLAGS) $(AM_CFLAGS) $(gschem_CFLAGS)
 .c.x:
-	CPP="$(CPP)" $(GUILE_SNARF) -o $@ $< $(snarf_cpp_opts)
+	CPP="$(CPP)" guile-snarf-$(GUILE_EFFECTIVE_VERSION) -o $@ $< $(snarf_cpp_opts)
 
 localedir = @datadir@/locale
 DEFS = -DLOCALEDIR=\"$(localedir)\" @DEFS@
diff --git a/libgeda/shell/Makefile.am b/libgeda/shell/Makefile.am
index d339bb5..87c0645 100644
--- a/libgeda/shell/Makefile.am
+++ b/libgeda/shell/Makefile.am
@@ -23,6 +23,6 @@ SUFFIXES = .x
 snarf_cpp_opts = $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) \
 	$(geda_shell_CPPFLAGS) $(AM_CFLAGS) $(geda_shell_CFLAGS)
 .c.x:
-	CPP="$(CPP)" $(GUILE_SNARF) -o $@ $< $(snarf_cpp_opts)
+	CPP="$(CPP)" guile-snarf-$(GUILE_EFFECTIVE_VERSION) -o $@ $< $(snarf_cpp_opts)
 
 CLEANFILES = $(BUILT_SOURCES)
diff --git a/libgeda/src/Makefile.am b/libgeda/src/Makefile.am
index c65c979..a866a37 100644
--- a/libgeda/src/Makefile.am
+++ b/libgeda/src/Makefile.am
@@ -98,7 +98,7 @@ SUFFIXES = .x
 snarf_cpp_opts = $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) \
 	$(libgeda_la_CPPFLAGS) 

Bug#959845: librsvg: FTBFS on mips*el: transform::tests::parses_transform_list, transform::tests::parses_valid_transform: assertion failed: t1.y0.approx_eq(t2.y0, (epsilon, 1))

2020-07-13 Thread YunQiang Su
YunQiang Su  于2020年7月14日周二 上午7:24写道:
>
> Yunqiang Su  于2020年7月10日周五 上午8:14写道:
> >
> > On Mon, 11 May 2020 13:15:23 +0100 Simon McVittie  wrote:
> > > Control: retitle -1 librsvg: FTBFS on Loongson-3A: assertion failed: 
> > > t1.y0.approx_eq(t2.y0, (epsilon, 1))
> > > Control: severity -1 wishlist
> > > Control: tags -1 + confirmed wontfix
> > > Control: notforwarded -1
> > >
> > > On Mon, 11 May 2020 at 11:50:43 +0200, Aurelien Jarno wrote:
> > > > On 2020-05-06 11:19, Simon McVittie wrote:
> > > > > There seems to be a strong correlation where this test passes on a 
> > > > > Rhino
> > > > > Labs UTM8 but fails on a Loongson 3A. Are there known issues with
> > > > > Loongson 3A hardware, or is there different FPU behaviour, or 
> > > > > something?
> > > >
> > > > Thanks for the analysis. Yep the Loongson 3A is known for having an FPU
> > > > bug that could explain that behaviour. Basically it treats the madd,
> > > > msub, nmadd and nmsub instructions as fused while they should not.
> > >
> > > It seems strange to me that a release architecture is using
> > > known-to-be-faulty hardware for buildds. Is there any possibility of
> > > replacing those machines, or taking them out of the buildd rotation
> > > entirely?
> > >
> > > In particular, we treated this as a RC bug, and prioritized reporting
> > > it upstream; but we should not be wasting upstreams' time with issues
> > > that are a result of faulty hardware. I don't think we can expect every
> > > package maintainer, or every upstream maintainer, to know that Debian's
> > > mips*el buildds have this bug and that failing build-time tests that
> > > touch floating-point are likely to be not a real bug in the software.
> > >
> > > At the same time, I don't want to disable build-time tests or ignore
> > > their results, because for most architectures they are the only evidence
> > > we have that a package works at all.
> > >
> > > > I am going to blacklist librsvg from the Loongson 3A based buildds so
> > > > that it doesn't happen again.
>
> Your code about block Loongson has some problem,
> The cpuinfo of my Loongson 3A 2000 machine is like:
>  cpu model   : ICT Loongson-3 V0.8  FPU V0.1
>
> 3B1500, it is
>  cpu model: ICT Loongson-3 V0.7  FPU V0.1
>
> feel free about it. I have figure out a patch to disable madd.fmt insns.
> Wish it can just fix this problem.
>
> > >
> > > Thanks. I'll add a check to d/rules to make the build fail sooner if a
> > > Loongson-3A CPU is detected (when not building with nocheck), to make
> > > sure this blacklisting mechanism doesn't regress.
> >
> > For gcc, we patched it to not use madd.fmt. We should so the same thing to 
> > llvm.
> > Let’s do it.
> >
> > >
> > > smcv
> > >
> > >
>
>
>
> --
> YunQiang Su

With this patch to llvm-toolchain-9, this problem has been gone.
we don't need to rebuild rust for this librsvg.

-- 
YunQiang Su


mips-force-nomadd4.diff
Description: Binary data


Bug#964937: RM: dictdlib dict-bouvier dict-moby-thesaurus -- RoQA; dead upstrea (10+ years); python2-only; no extrenal deps outside of this set; extremely low popcon

2020-07-13 Thread Sean Whitton
Hello Sandro,

I'm sorry for the inconvenience but we need three separate bugs for our
scripts to generate the appropriate dak commands.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Bug#964921: RM: golang-x-text -- RoQA; Source package was renamed to golang-golang-x-text

2020-07-13 Thread Sean Whitton
control: tag -1 + moreinfo

Hello,

On Sun 12 Jul 2020 at 07:31PM +08, Shengjing Zhu wrote:

> I will amend this RM bug, after cleaning up the above packages.
> But I'm not sure if the dependency problem is blocker for RM.

It is.

Please remove tag when fixed.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Bug#964910: RM: jigl -- ROM; dead upstream, low popcon, alternatives exist

2020-07-13 Thread Sean Whitton
control: tag -1 + moreinfo

Hello Nicholas,

On Sat 11 Jul 2020 at 05:26PM -07, Nicholas Breen wrote:

> Package: ftp.debian.org
> Severity: normal
>
> Please remove jigl from the archive.  It has not had any upstream
> activity since 2006, and has the lowest popcon count of all remaining
> similar tools:
>
> https://qa.debian.org/popcon-graph.php?packages=jigl%2C+llgal%2C+fgallery%2C+lazygal%2C+igal2%2C+imageindex_installed=on_legend=on_date=2010-01-01_date=_date=_fmt=%25Y=1

Is there any reason to think the software no longer works?

Otherwise, perhaps it would be better if you were simply to orphan it.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Bug#963750: RM: chef -- ROM; trademark issues

2020-07-13 Thread Sean Whitton
Hello Jason,

On Sat 11 Jul 2020 at 09:29PM -07, Jason Self wrote:

> Sean Whitton asked:
>> On the other hand you say you think that we should remove the Chef
>> package because there are not going to be future upstream releases
>> which are free software.  Could you provide me a reference, please?
>
> The problematic pieces appear to be contained within [0]. These two
> points appear to eliminate freedom #2 [1] by making exact copies
> impossible.

DFSG#4 probably covers this case.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Bug#964983: New Upstream Version

2020-07-13 Thread Sean Whitton
Hello,

On Mon 13 Jul 2020 at 10:58PM +01, Barak A. Pearlmutter wrote:

> Sometimes I wonder if Debian needs some serious process analysis and
> restructuring. Should a new library version that happens to cross a major
> version boundary really good though the same extra vetting queue that a new
> browser goes through?

I think in this case Clint meant that haskell-binary-instances would
need to go through NEW, not the new github library.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Bug#964980: RFS: ncdu/1.15.1-0.1 [NMU] -- ncurses disk usage viewer

2020-07-13 Thread Christian Göttsche
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "ncdu"

 * Package name: ncdu
   Version : 1.15.1-0.1
   Upstream Author : Yoran Heling 
 * URL : https://dev.yorhel.nl/ncdu/
 * License : expat
 * Vcs : None
   Section : admin

It builds those binary packages:

  ncdu - ncurses disk usage viewer

To access further information about this package, please visit the
following URL:

  https://mentors.debian.net/package/ncdu

Alternatively, one can download the package with dget using this command:

  dget -x https://mentors.debian.net/debian/pool/main/n/ncdu/ncdu_1.15.1-0.1.dsc

Changes since the last upload:

   * Non-maintainer upload.
   * New upstream version 1.15.1 (Closes: #953731, #957580, #961876)
   * d/control:
 - bump to debhelper compat level 13 and standard version 4.5.0
 - use https homepage
 - add pkg-config to build-dependencies
 - set Rules-Requires-Root: no
   * d/rules: enable hardening options
   * d/patches: drop upstream applied patch
   * d/upstream: add signing-key.asc
   * d/watch: use https and check pgp signature

Regards,

--
  Christian Göttsche



Bug#959845: librsvg: FTBFS on mips*el: transform::tests::parses_transform_list, transform::tests::parses_valid_transform: assertion failed: t1.y0.approx_eq(t2.y0, (epsilon, 1))

2020-07-13 Thread YunQiang Su
Yunqiang Su  于2020年7月10日周五 上午8:14写道:
>
> On Mon, 11 May 2020 13:15:23 +0100 Simon McVittie  wrote:
> > Control: retitle -1 librsvg: FTBFS on Loongson-3A: assertion failed: 
> > t1.y0.approx_eq(t2.y0, (epsilon, 1))
> > Control: severity -1 wishlist
> > Control: tags -1 + confirmed wontfix
> > Control: notforwarded -1
> >
> > On Mon, 11 May 2020 at 11:50:43 +0200, Aurelien Jarno wrote:
> > > On 2020-05-06 11:19, Simon McVittie wrote:
> > > > There seems to be a strong correlation where this test passes on a Rhino
> > > > Labs UTM8 but fails on a Loongson 3A. Are there known issues with
> > > > Loongson 3A hardware, or is there different FPU behaviour, or something?
> > >
> > > Thanks for the analysis. Yep the Loongson 3A is known for having an FPU
> > > bug that could explain that behaviour. Basically it treats the madd,
> > > msub, nmadd and nmsub instructions as fused while they should not.
> >
> > It seems strange to me that a release architecture is using
> > known-to-be-faulty hardware for buildds. Is there any possibility of
> > replacing those machines, or taking them out of the buildd rotation
> > entirely?
> >
> > In particular, we treated this as a RC bug, and prioritized reporting
> > it upstream; but we should not be wasting upstreams' time with issues
> > that are a result of faulty hardware. I don't think we can expect every
> > package maintainer, or every upstream maintainer, to know that Debian's
> > mips*el buildds have this bug and that failing build-time tests that
> > touch floating-point are likely to be not a real bug in the software.
> >
> > At the same time, I don't want to disable build-time tests or ignore
> > their results, because for most architectures they are the only evidence
> > we have that a package works at all.
> >
> > > I am going to blacklist librsvg from the Loongson 3A based buildds so
> > > that it doesn't happen again.

Your code about block Loongson has some problem,
The cpuinfo of my Loongson 3A 2000 machine is like:
 cpu model   : ICT Loongson-3 V0.8  FPU V0.1

3B1500, it is
 cpu model: ICT Loongson-3 V0.7  FPU V0.1

feel free about it. I have figure out a patch to disable madd.fmt insns.
Wish it can just fix this problem.

> >
> > Thanks. I'll add a check to d/rules to make the build fail sooner if a
> > Loongson-3A CPU is detected (when not building with nocheck), to make
> > sure this blacklisting mechanism doesn't regress.
>
> For gcc, we patched it to not use madd.fmt. We should so the same thing to 
> llvm.
> Let’s do it.
>
> >
> > smcv
> >
> >



-- 
YunQiang Su



Bug#964987: reportbug: Error when filing a report with release.debian.org for buster-pu

2020-07-13 Thread Anuradha Weeraman
Package: reportbug
Version: 7.7.0
Severity: normal
Tags: patch
X-Debbugs-Cc: anura...@debian.org

I was attempting to file a report with release.debian.org for a
buster-pu and got an error, transcript below:

Choose the request type: 3
Please enter the name of the package: ksh
Checking status database...
Latest version seems to be 93u+20120801-3.4, is this the proper one ?
[Y|n|?]? y
Traceback (most recent call last):
  File "/usr/bin/reportbug", line 2302, in 
main()
  File "/usr/bin/reportbug", line 1107, in main
return iface.user_interface()
  File "/usr/bin/reportbug", line 1709, in user_interface
res = special_prompts(package, bts, ui, fromaddr,
  File "/usr/bin/reportbug", line 531, in special_prompts
return pkgprompts(package, bts, ui, fromaddr, timeout, online, http_proxy)
  File "/usr/lib/python3/dist-packages/reportbug/debbugs.py", line 613, in 
handle_debian_release
body = textwrap.dedent("""\
TypeError: not all arguments converted during string formatting

I've attached a patch to /usr/lib/python3/dist-packages/reportbug/debbugs.py
that I used to work around.

-- Package-specific info:
** Environment settings:
EDITOR="vi"
PAGER="less"
VISUAL="vi"
DEBEMAIL="anura...@debian.org"
DEBFULLNAME="Anuradha Weeraman"
INTERFACE="text"

** /home/anuradha/.reportbugrc:
reportbug_version "7.7.0"
mode advanced
ui text
no-cc
list-cc-me
smtphost reportbug.debian.org

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.7.8 (SMP w/12 CPU threads)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/bash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages reportbug depends on:
ii  apt2.1.7
ii  python33.8.2-3
ii  python3-reportbug  7.7.0
ii  sensible-utils 0.0.12+nmu1

reportbug recommends no packages.

Versions of packages reportbug suggests:
pn  claws-mail
pn  debconf-utils 
ii  debsums   3.0.0
pn  default-mta | postfix | exim4 | mail-transport-agent  
pn  dlocate   
pn  emacs-bin-common  
ii  file  1:5.38-5
ii  gnupg 2.2.20-1
ii  python3-urwid 2.1.0-4
pn  reportbug-gtk 
ii  xdg-utils 1.1.3-2

Versions of packages python3-reportbug depends on:
ii  apt2.1.7
ii  file   1:5.38-5
ii  python33.8.2-3
ii  python3-apt2.1.3
ii  python3-debian 0.1.37
ii  python3-debianbts  3.0.2
ii  python3-requests   2.23.0+dfsg-2
ii  sensible-utils 0.0.12+nmu1

python3-reportbug suggests no packages.

-- no debconf information
--- debbugs.py.old  2020-07-13 18:59:58.431958248 -0400
+++ debbugs.py.new  2020-07-13 19:00:12.999697479 -0400
@@ -641,7 +641,7 @@

 [ Other info ]
 (Anything else the release team should know.)
-""" % (package, package, version))
+""")
 elif tag == 'rm':
 subject = 'RM: %s/%s' % (package, version)
 body = '(explain the reason for the removal here)\n'



Bug#890475: Status for Vulkan development tools?

2020-07-13 Thread John Zupin

On Mon, 13 Jul 2020 16:53:42 -0600 John Zupin  wrote:
> The current status for the shaderc package is that it has been out for

Sorry I meant to say the lunarg-vktrace package



Bug#964986: buster-pu: package ksh/93u+20120801-3.4

2020-07-13 Thread Anuradha Weeraman
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: anura...@debian.org, car...@debian.org

[ Reason ]
Summary of the issue: In ksh version 20120801, a flaw was found in the
way it evaluates certain environment variables. An attacker could use
this flaw to override or bypass environment restrictions to execute
shell commands.

[ Impact ]
Services and applications that allow remote unauthenticated
attackers to provide one of those environment variables could allow them
to exploit this issue remotely, although the risk is deemed low.

[ Tests ]
There is a test included in the diff that was used to validate the
fix. Also, the regression test suite was run to make sure there were
no regressions.

[ Risks ]
The regression test suite has been run before and after the patch to
confirm no new regressions. Also, the fix is applied in unstable with no
new issues reported.

[ Checklist ]
[X] *all* changes are documented in the d/changelog
[X] I reviewed all changes and I approve them
[X] attach debdiff against the package in (old)stable
[X] the issue is verified as fixed in unstable

[ Changes ]
* Patch to arith.c that fixes the CVE
* Test case for the fix

[ Other info ]
This was brought up to the security team first, and it was deemed that a
DSA is not required by Salvatore Bonaccorso.

Anuradha

-- System Information:
Debian Release: bullseye/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
diff -Nru ksh-93u+20120801/debian/changelog ksh-93u+20120801/debian/changelog
--- ksh-93u+20120801/debian/changelog   2018-12-14 02:26:58.0 -0500
+++ ksh-93u+20120801/debian/changelog   2020-07-12 11:26:07.0 -0400
@@ -1,3 +1,15 @@
+ksh (93u+20120801-4+deb10u1) buster-security; urgency=high
+
+  * Fix for CVE-2019-14868: in ksh version 20120801, a flaw was found
+in the way it evaluates certain environment variables. An attacker
+could use this flaw to override or bypass environment restrictions
+to execute shell commands. Services and applications that allow
+remote unauthenticated attackers to provide one of those
+environment variables could allow them to exploit this issue
+remotely. (Closes: #948989)
+
+ -- Anuradha Weeraman   Sun, 12 Jul 2020 11:26:07 -0400
+
 ksh (93u+20120801-3.4) unstable; urgency=medium
 
   [ Boyuan Yang ]
diff -Nru ksh-93u+20120801/debian/patches/cve-2019-14868.patch 
ksh-93u+20120801/debian/patches/cve-2019-14868.patch
--- ksh-93u+20120801/debian/patches/cve-2019-14868.patch1969-12-31 
19:00:00.0 -0500
+++ ksh-93u+20120801/debian/patches/cve-2019-14868.patch2020-07-12 
11:26:07.0 -0400
@@ -0,0 +1,97 @@
+Description: CVE-2019-14868
+ Certain environment variables were interpreted as arithmetic
+ expressions on startup, leading to code injection.
+Bug-Debian: https://bugs.debian.org/948989
+Bug-RedHat: https://bugzilla.redhat.com/show_bug.cgi?id=1757324
+Author: Kurtis Rader 
+Origin: 
https://github.com/ksh93/ksh/commit/593a5a8b7f272c2488c8a800820ae990942946e7
+Date: 2020-05-21
+
+diff --git a/src/cmd/ksh93/sh/arith.c b/src/cmd/ksh93/sh/arith.c
+index b1059421..6361431b 100644
+--- a/src/cmd/ksh93/sh/arith.c
 b/src/cmd/ksh93/sh/arith.c
+@@ -513,21 +513,36 @@ Sfdouble_t sh_strnum(register const char *str, char** 
ptr, int mode)
+   char base=(shp->inarith?0:10), *last;
+   if(*str==0)
+   {
+-  if(ptr)
+-  *ptr = (char*)str;
+-  return(0);
+-  }
+-  errno = 0;
+-  d = strtonll(str,,,-1);
+-  if(*last || errno)
+-  {
+-  if(!last || *last!='.' || last[1]!='.')
+-  d = strval(shp,str,,arith,mode);
+-  if(!ptr && *last && mode>0)
+-  errormsg(SH_DICT,ERROR_exit(1),e_lexbadchar,*last,str);
++  d = 0.0;
++  last = (char*)str;
++  } else {
++  errno = 0;
++  d = strtonll(str,,,-1);
++  if (*last && !shp->inarith && sh_isstate(SH_INIT)) {
++  /* This call is to handle "base#value" literals if 
we're importing untrusted env vars. */
++  errno = 0;
++  d = strtonll(str, , NULL, -1);
++  }
++
++  if(*last || errno)
++  {
++  if (sh_isstate(SH_INIT)) {
++  /*
++   * Initializing means importing untrusted env 
vars. The string does not appear to be
++   * a recognized numeric literal, so give up. We 
can't safely call strval(), because
++   * that allows arbitrary expressions, causing 
security vulnerability CVE-2019-14868.
++   */
++  d = 0.0;
++  } else {
++  if(!last || *last!='.' || last[1]!='.')

Bug#890474: Status for Vulkan development tools?

2020-07-13 Thread John Zupin

Hello,

Brett is no longer with LunarG and I'll be making updates to his ITP bug
submissions about the status of these packages.

The current status for the lunarg-vulkan-layers package is that it has been out 
for
1+ years now and is hosted by LunarG.

I am LunarG's curator for these packages, please check
https://vulkan.lunarg.com/sdk/home  under the "ubuntu packages" tab for
more information about our repository.



Bug#890475: Status for Vulkan development tools?

2020-07-13 Thread John Zupin

Hello,

Brett is no longer with LunarG and I'll be making updates to his ITP bug
submissions about the status of these packages.

The current status for the shaderc package is that it has been out for
1+ years now and is hosted by LunarG.

I am LunarG's curator for these packages, please check
https://vulkan.lunarg.com/sdk/home  under the "ubuntu packages" tab for
more information about our repository.



Bug#890476: Status for Vulkan development tools?

2020-07-13 Thread John Zupin

Hello,

Brett is no longer with LunarG and I'll be making updates to his ITP bug
submissions about the status of these packages.

The current status for the lunarg-via package is that it has been out for
1+ years now and is hosted by LunarG.

I am LunarG's curator for these packages, please check
https://vulkan.lunarg.com/sdk/home  under the "ubuntu packages" tab for
more information about our repository.



Bug#961497: #961497 Please install registries.conf from samples directory

2020-07-13 Thread Dmitry Smirnov
There is no "ideological fight". This is just unnecessary if you build
your own containers, like I do. Yes, with "bud" and Dockerfiles but
without external Docker registry.

Since all Buildah functionality is available anyways, availability
of Docker images in external registry warrants to "Suggests" or
"Recommends" severity equivalent at best.

Admin control over which Docker image libraries are allowed by default
is more important. And since users have full control anyway through
their personal configs (for rootless mode), the system-wide config
allowing everything is completely unnecessary.

-- 
Cheers,
 Dmitry Smirnov.

---

If the truth offends, it's our job to offend.
-- Satoshi Kanazawa

---

Ignoring the Covid evidence: Far from following the science, the
government turned its back on all available data.
-- Alistair Haimes
   
https://thecritic.co.uk/issues/july-august-2020/ignoring-the-covid-evidence/


signature.asc
Description: This is a digitally signed message part.


Bug#890471: Status for Vulkan development tools?

2020-07-13 Thread John Zupin

Hello,

Brett is no longer with LunarG and I'll be making updates to his ITP bug
submissions about the status of these packages.

The current status for the spirv-cross package is that it has been out for
1+ years now and is hosted by LunarG.

I am LunarG's curator for these packages, please check
https://vulkan.lunarg.com/sdk/home  under the "ubuntu packages" tab for
more information about our repository.



Bug#964977: ITS: check -- unit test framework for C

2020-07-13 Thread Christian Göttsche
Source: check
Severity: important
X-Debbugs-CC: Robert Lemmen , Paul Gevers


Hi,

I intend to salvage the check source package.

src:check was last uploaded by its maintainer in 2013 and the last two
uploads are NMUs.
Due to #918572 check was several months not available in testing,
fixed by Paul last month.

My interest in Check is based on it being a build dependency of vnstat
and selint[1].

The package lacks latest upstream releases (0.12.0 vs 0.15.0).
I created a NMU upload[2] but due to some changes were out of scope
for an NMU, salvaging was suggested.

Best regards,
 Christian Göttsche

[1]: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963085
[2]: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956731



Bug#964793: odd qemu/xen crashes + toolchain rings a bell

2020-07-13 Thread Hans van Kranenburg
However,

On 7/13/20 4:19 PM, Hans van Kranenburg wrote:
> (Adding more To:; Note that mailing the bug number does not make it end
> up at the submitter automatically, only the package maintainer).
> 
> Hi Christian,
> 
> thanks for the hints!
> 
> On Mon, 13 Jul 2020 09:01:18 +0200 Christian Ehrhardt
>  wrote:
>> Hi,
>> I was seeing the bug updates flying by and just wanted to mention that we
>> have seen something similar in Ubuntu - but back then things weren't
>> replicable on Debian so we couldn't contribute things back.
>> It seemed to be due to the newer and different-defaults toolchain that we
>> had in Ubuntu at the time.
>>
>> But here qemu/xen crashes + new toolchain come together again which
>> reminded me.
>>
>> So without any promises that it really is related I wanted to FYI you to
>> these two fixes we needed for Xen:
>> https://git.launchpad.net/ubuntu/+source/xen/tree/debian/patches/1001-strip-note-gnu-property.patch?h=ubuntu/groovy-devel
> 
> I guess this first one would be one needed? "Force fcf-protection off
> when using -mindirect-branch".
> 
> In that case want this one, it's not backported to 4.11-stable:
> 
> "x86/build: Unilaterally disable -fcf-protection"
> 
> https://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=3a218961b16f1f4feb1147f56338faf1ac8f5703

However, this is a workaround for a gcc bug that is fixed in:

https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=a03efb266f

This fix is included in gcc-9 in Debian since 9.3.0-12:

https://salsa.debian.org/toolchain-team/gcc/-/blob/gcc-9-debian/debian/changelog#L55
(it's the PR target/93654 (x86))

Reporter says the 4.11.4-1 package is used, which is built using gcc
9.3.0-13:

https://buildd.debian.org/status/fetch.php?pkg=xen=all=4.11.4-1=1590602099=0

>> https://git.launchpad.net/ubuntu/+source/xen/tree/debian/patches/1000-flags-fcs-protect-none.patch?h=ubuntu/groovy-devel
> 
> This one is about the build failing.
> 
>> This would seem more applicable if the new toolchain would have recently
>> rebuilt xen and not qemu as in this case. But as an FYI it is still worth a
>> ping.
> 
> 小太, can you do...
> 
>   xl create -vvv 
> 
> ...which should show how qemu is invoked. Can you show that command?
> 
> I can provide you with some test packages with the mentioned upstream
> patch applied (on top of 4.11.4+24-gddaaccbbab-1), so you can test if
> your domU starts with them.
> 
> If so, we can request the backport upstream and/or maybe pick it for
> Debian 4.11 into the patch queue, whatever happens earlier.

So, the above info tells us that this probably is not the issue that
we're looking at. (I'm fine with still making some test packages for
reporter to test with to 100% check this.)

Then, let's see what shows up in the xl -vvv output and if there's
anything that can be debugged when starting the qemu process with those
args?

> Thanks,
> Hans (Debian Xen Team)
> 



Bug#734353: libexo-1-0: does not handle email body for mutt

2020-07-13 Thread Nis Martensen
On Mon, 6 Jan 2014 "Alexandra N. Kossovsky" wrote:
> 
> I use mutt as e-mail client.  mutt itself perfectly handles mailto:
> URLs, including the mail body.  When using it via xfce, the mail body is gone.

Please find below a patch that fixes this.

It also moves the "-s subject" option to the front. As documented in the
man page, the "-a attachments" must be the last option, and it can take
multiple arguments. The '--' delimiter is used to mark the end of the
options; the remaining arguments are the recipients. Passing the message
body is possible by adding a mailto uri there, too.


--- exo-compose-mail-1.orig 2020-07-12 10:46:48.390415327 +0200
+++ exo-compose-mail-1  2020-07-13 23:56:48.089760063 +0200
@@ -221,16 +221,20 @@
 }
 elsif ($style eq 'mutt') {
# generate the parameters for mutt
+   $subject and push (@argv, '-s', $subject);
for my $cc (@cc) {
push (@argv, '-c', $cc);
}
for my $bcc (@bcc) {
push (@argv, '-b', $bcc);
}
-   for my $uri (@attachments) {
-   push (@argv, '-a', $uri->path ());
+   if (@attachments > 0) {
+   push (@argv, '-a');
+   for my $uri (@attachments) {
+   push (@argv, $uri->path ());
+   }
}
-   $subject and push (@argv, '-s', $subject);
+   push (@argv, '--');
for my $to (@to) {
push (@argv, $to);
}
@@ -239,6 +243,8 @@
# any, just append an empty string and mutt
# will prompt for the To: address
(not @to) and push (@argv, '');
+
+   $body and push(@argv, 'mailto:?body=' . uri_escape($body));
 }
 else {
print STDERR "$0: Unsupported style '$style'.\n";



Bug#964983: New Upstream Version

2020-07-13 Thread Barak A. Pearlmutter
Sometimes I wonder if Debian needs some serious process analysis and
restructuring. Should a new library version that happens to cross a major
version boundary really good though the same extra vetting queue that a new
browser goes through?

tldr: What have we wrought???


Bug#964223: linuxtv-dvb-apps: FTBFS with glibc 2.31 (uses removed stime function)

2020-07-13 Thread Aurelien Jarno
control: severity -1 serious

On 2020-07-03 22:27, Aurelien Jarno wrote:
> Source: linuxtv-dvb-apps
> Version: 1.1.1+rev1500-1.2
> Severity: important
> Tags: patch upstream
> 
> linuxtv-dvb-apps fails to build from source with glibc 2.31:
> 
> | CC dvbdate
> | dvbdate.c: In function ‘set_time’:
> | dvbdate.c:312:6: warning: implicit declaration of function ‘stime’; did you 
> mean ‘ctime’? [-Wimplicit-function-declaration]
> |   312 |  if (stime(new_time)) {
> |   |  ^
> |   |  ctime
> | /usr/bin/ld: /tmp/cchQDddv.o: in function `set_time':
> | ./util/dvbdate/dvbdate.c:312: undefined reference to `stime'
> | /usr/bin/ld: ./util/dvbdate/dvbdate.c:312: undefined reference to `stime'
> | collect2: error: ld returned 1 exit status
> | make[3]: *** [../../Make.rules:82: dvbdate] Error 1
> | make[3]: Leaving directory '/<>/util/dvbdate'
> | make[2]: *** [Makefile:10: all] Error 2
> | make[2]: Leaving directory '/<>/util'
> | make[1]: *** [Makefile:14: all] Error 2
> | make[1]: Leaving directory '/<>'
> | dh_auto_build: error: make -j1 returned exit code 2
> | make: *** [debian/rules:4: build] Error 25
> | dpkg-buildpackage: error: debian/rules build subprocess returned exit 
> status 2
> 
> The full build log is available there:
> http://qa-logs.debian.net/2020/06/24/linuxtv-dvb-apps_1.1.1+rev1500-1.2_unstable_glibc-exp.log
> 
> The stime function has been marked as obsolete for some time, and since
> glibc 2.31 it is no longer available to newly linked binaries. The
> clock_settime function should be used instead.
> 
> You will find attached a patch fixing that. It would be nice if it can
> be fixed relatively soon so that we can start the transition.
> 

Note that glibc 2.31 is now in unstable. I am therefore increasing the
severity to serious.

Regards,
Aurelien

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net



Bug#964220: vdr: FTBFS with glibc 2.31 (uses removed stime function)

2020-07-13 Thread Aurelien Jarno
control: severity -1 serious

On 2020-07-03 22:12, Aurelien Jarno wrote:
> Source: vdr
> Version: 2.4.1-4
> Severity: important
> Tags: patch upstream
> 
> Dear maintainer,
> 
> vdr fail to build from source with glibc 2.31:
> 
> | g++ -Wdate-time -D_FORTIFY_SOURCE=2 -g -O2 
> -fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat 
> -Werror=format-security -fPIC -c -D_GNU_SOURCE -D_FILE_OFFSET_BITS=64 
> -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE -DREMOTE_KBD -DSDNOTIFY 
> -DLIRC_DEVICE=\"/var/run/lirc/lircd\" -DVIDEODIR=\"/var/lib/video\" 
> -DCONFDIR=\"/var/lib/vdr\" -DARGSDIR=\"/etc/vdr/conf.d\" 
> -DCACHEDIR=\"/var/cache/vdr\" -DRESDIR=\"/usr/share/vdr\" 
> -DPLUGINDIR=\"/usr/lib/vdr/plugins\" -DLOCDIR=\"/usr/share/locale\" 
> -I/usr/include/uuid -I/usr/include/freetype2 -I/usr/include/libpng16   -o 
> eitscan.o eitscan.c
> | eit.c: In constructor ‘cTDT::cTDT(const u_char*)’:
> | eit.c:394:13: error: ‘stime’ was not declared in this scope; did you mean 
> ‘ctime’?
> |   394 | if (stime() == 0)
> |   | ^
> |   | ctime
> | make[2]: *** [Makefile:135: eit.o] Error 1
> | make[2]: *** Waiting for unfinished jobs
> | make[2]: Leaving directory '/<>'
> | dh_auto_build: error: make -j4 "INSTALL=install --strip-program=true" 
> PREFIX=/usr VIDEODIR=/var/lib/video LIBDIR=/usr/lib/vdr/plugins SDNOTIFY=1 
> VERBOSE=1 returned exit code 2
> | make[1]: *** [debian/rules:17: override_dh_auto_build] Error 25
> | make[1]: Leaving directory '/<>'
> | make: *** [debian/rules:14: build] Error 2
> | dpkg-buildpackage: error: debian/rules build subprocess returned exit 
> status 2
> 
> The full build log is available there:
> http://qa-logs.debian.net/2020/06/24/vdr_2.4.1-4_unstable_glibc-exp.log
> 
> The stime function has been marked as obsolete for some time, and since
> glibc 2.31 it is no longer available to newly linked binaries. The
> clock_settime function should be used instead.
> 
> You will find attached a patch fixing that. It would be nice if it can
> be fixed relatively soon so that we can start the transition.

Note that glibc 2.31 is now in unstable. I am therefore increasing the
severity to serious.

Regards,
Aurelien

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net



Bug#964231: faketime: FTBFS with glibc 2.31 due to ftime deprecation

2020-07-13 Thread Aurelien Jarno
control: severity -1 serious

On 2020-07-03 23:47, Aurelien Jarno wrote:
> Package: faketime
> Version: 0.9.7-3
> Severity: important
> Tags: patch upstream
> 
> faketime fails to build from source with glibc 2.31:
> 
> | gcc -c -std=gnu99 -Wall -DFAKE_STAT -Werror -Wextra timetest.c
> | ./testframe.sh functests
> | # Begin Test Suites in functests
> | 
> | # Begin functests/test_exclude_mono.sh
> | # PLATFORM=linuxlike
> | timetest.c: In function ‘main’:
> | timetest.c:143:5: error: ‘ftime’ is deprecated 
> [-Werror=deprecated-declarations]
> |   143 | ftime();
> |   | ^
> | In file included from timetest.c:25:
> | /usr/include/x86_64-linux-gnu/sys/timeb.h:39:12: note: declared here
> |39 | extern int ftime (struct timeb *__timebuf)
> |   |^
> | cc1: all warnings being treated as errors
> | make[2]: *** [Makefile:12: timetest.o] Error 1
> | make[2]: *** Waiting for unfinished jobs
> 
> 
> The full build log is available there:
>  http://qa-logs.debian.net/2020/06/24/faketime_0.9.7-3_unstable_glibc-exp.log
> 
> In glibc 2.31, the ftime function has been marked as deprecated, though
> it's still usable. however the tests are run with -Wall -Wextra -Werror,
> turning causing this deprecation into an error.
> 
> Upstream already has a fix for this issue, although the issue is wrongly
> attributed to gcc 9 instead of glibc 2.31:
> 
> https://github.com/wolfcw/libfaketime/commit/f19d68ea3231f1af7a6e3913dc6d3c46f73947b2
> 
> This patch applies cleanly to the version in debian and correctly fixes
> the issue. It would be nice if you can apply it relatively soon so that
> we can start the transition.

Note that glibc 2.31 is now in unstable. I am therefore increasing the
severity to serious.

Regards,
Aurelien

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net



Bug#964983: New Upstream Version

2020-07-13 Thread Clint Adams
On Mon, Jul 13, 2020 at 09:05:28PM +0100, Barak A. Pearlmutter wrote:
> There's a new upstream version available, and I cannot update the
> github-backup package until libghc-github-dev (>= 0.23) is available.
> So I hope to see the new version packaged.

Someone would need to package binary-instances first, and then wait
however many months until it gets through NEW.



Bug#964227: datefudge: FTBFS with glibc 2.31 (conflicting gettimeofday prototype)

2020-07-13 Thread Aurelien Jarno
control: severity -1 serious

On 2020-07-03 23:01, Aurelien Jarno wrote:
> Package: datefudge
> Version: 1.23
> Severity: important
> Tags: patch upstream
> 
> datefudge fails to build from source with glibc 2.31
> 
> | gcc -Wdate-time -D_FORTIFY_SOURCE=2 -g -O2 
> -fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat 
> -Werror=format-security -Wall -Wextra -D_REENTRANT -fpic -c -o datefudge.o 
> datefudge.c
> | sed -e 's,@VERSION@,1.23,g; s,@MULTIARCH_PATTERN@,/*-*,g; 
> s,@LIBDIR@,/usr/lib,g;' \
> | < datefudge.man > datefudge.1
> | datefudge.c:81:5: error: conflicting types for ‘gettimeofday’
> |81 | int gettimeofday(struct timeval *x, struct timezone *y) {
> |   | ^~~~
> | In file included from datefudge.c:21:
> | /usr/include/x86_64-linux-gnu/sys/time.h:66:12: note: previous declaration 
> of ‘gettimeofday’ was here
> |66 | extern int gettimeofday (struct timeval *__restrict __tv,
> |   |^~~~
> | make[1]: *** [Makefile:40: datefudge.o] Error 1
> | make[1]: Leaving directory '/<>'
> | dh_auto_build: error: make -j4 "INSTALL=install --strip-program=true" 
> returned exit code 2
> | make: *** [debian/rules:16: binary] Error 25
> | dpkg-buildpackage: error: debian/rules binary subprocess returned exit 
> status 2
> 
> The full build log is available there:
> http://qa-logs.debian.net/2020/06/24/datefudge_1.23_unstable_glibc-exp.log
> 
> The support for timezones in gettimeofday has been removed in glibc
> 2.31. As a result the second argument of the gettimeofday prototype has
> been changed from struct timezone * to void *. The same change needs to
> be done in datefudge.
> 
> You will find attached a patch fixing that. It would be nice if it can
> be fixed relatively soon so that we can start the transition.

Note that glibc 2.31 is now in unstable. I am therefore increasing the
severity to serious.

Regards,
Aurelien

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net



Bug#964438: apt-listbugs: dns error when running from cron job

2020-07-13 Thread Francesco Poli
On Tue, 7 Jul 2020 23:08:03 +0200 Oswald Buddenhagen wrote:

> On Tue, Jul 07, 2020 at 10:53:59PM +0200, Francesco Poli wrote:
> >On Tue, 7 Jul 2020 20:17:15 +0200 Oswald Buddenhagen wrote:
> >> there is a report every hour despite it claiming to be a daily job.  
> >> that's weird at least.
> >
> >It works this way by design. [...]
> >The rationale is: the job must be attempted at various times, since the
> >network could be down sometimes.
> >
> i see. you actually want anacron-like functionality with network 
> awareness. i guess systemd should be doing something like that ...

I researched this a lot, studying the systemd documentation, but I
haven't found a satisfying strategy to get what I wanted.
Hence, I implemented it by myself.

> 
> >Was your system offline 5 min after waking up from sleep?
> >
> no, my point was that this is happening *right* after waking up. there 
> is no delay.

Mmmh, I am not sure what happens with systemd timers, if the machine is
put to sleep.
Could it be that the timer was just about to be triggered, when the
machine woke up?

> 
> >Please reply to the other questions in my previous message.
> >
> the only one which seems relevant would be the one about recent changes, 
> to which i can speculate that this possibly started with the recent-ish 
> systemd v245.6 upgrade.

Well, I am using systemd/245.6-2 right now, and I do not experience
your DNS issues. So I cannot reproduce the bug.

I would love to help you, but, please help me to help you!   :-)

If you do not reply to my questions, I will not be able to investigate
and I will have no other choice than closing this bug report as
unreproducible...


-- 
 http://www.inventati.org/frx/
 There's not a second to spare! To the laboratory!
. Francesco Poli .
 GnuPG key fpr == CA01 1147 9CD2 EFDF FB82  3925 3E1C 27E1 1F69 BFFE


pgpi4qpBmJKjE.pgp
Description: PGP signature


Bug#964200: apt-listbugs: transient frozen string error

2020-07-13 Thread Francesco Poli
Control: tags -1 + unreproducible

Apparently "Control" commands are ignored when sent to bug_n-close
addresses...
Resending to the bug address.

-- 
 http://www.inventati.org/frx/
 There's not a second to spare! To the laboratory!
. Francesco Poli .
 GnuPG key fpr == CA01 1147 9CD2 EFDF FB82  3925 3E1C 27E1 1F69 BFFE


pgpPy8gM1L10a.pgp
Description: PGP signature


Bug#964985: libpcap0.8: build with rpcap support (--enable-remote)

2020-07-13 Thread Lukas Tribus
Package: libpcap0.8
Version: 1.9.1-4
Severity: wishlist

Dear Maintainer,


since libpcap 1.9, rpcap (remote-pcap) is supported [1] and can
be enabled at build by specifying --enable-remote or in cmake
-DENABLE_REMOTE=YES [2].

Please consider enabling this for libpcap 1.9.



[1] 
https://github.com/the-tcpdump-group/libpcap/issues/266#issuecomment-617655700
[2] 
https://github.com/the-tcpdump-group/libpcap/issues/795#issuecomment-455824284



-- System Information:
Debian Release: 10.1
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-6-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_CRAP
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages libpcap0.8 depends on:
ii  libc62.28-10
ii  libdbus-1-3  1.12.16-1

libpcap0.8 recommends no packages.

libpcap0.8 suggests no packages.

-- no debconf information



Bug#963121: Additional analysis and suggested bugfix

2020-07-13 Thread Michael Biebl
Am 13.07.20 um 21:27 schrieb Gert van de Kraats:
> Problem also occurs at systemd version 245.6-2 .
> Indeed I am using GNOME where the login session is managed
> by systemd --user.
> The problem is not concerning an ordinary user service, which is killed
> by SIGKILL after 90 seconds. There is no SIGKILL-message!!
> As described at the initial bug-text a restart of the user dbus may
> cause a hang at state
> AUTHENTICATING during shutdown. At the log you can see
> AUTHENTICATING starts at 18:10:02 and ends at 18:11:32, 90 seconds
> later. State RUNNING is never reached.
> 
> Jun 15 18:10:02 debian systemd[1360]: Bus bus-api-user: changing state
> OPENING → AUTHENTICATING
> Jun 15 18:11:32 debian systemd[1360]: Bus bus-api-user: changing state
> AUTHENTICATING → CLOSED
> 
> In that hanging situation, as soon as the user systemd gets a SIGTERM
> from pid 1 (systemd) it will
> call sd_bus_flush at libsystemd/sd-bus/sd-bus.c.
> This will call bus_ensure_running, that repeats calling sd_bus_process,
> that finally repeatingly calls bus_socket_process_authenticating.
> This routine will cause a timeout after 90 seconds, the timeout-value is
> hard coded by DEFAULT_TIMEOUT_USEC at basic/def.h .
> 
> A simple and tested patch at sd_bus_flush at libsystemd/sd-bus/sd-bus.c is
> next code just before the call to bus_ensure_running:
> 
>     if ((bus->state == BUS_AUTHENTICATING) && (bus->is_user))
>     return -ETIMEDOUT;
> 
> It assumes state BUS_AUTHENTICATING is not normal for an user dbus at a
> call to sd_flush.
> 
> I think this is an upstream bug!

In that case, please raise this upstream at
https://github.com/systemd/systemd/issues




signature.asc
Description: OpenPGP digital signature


Bug#964973: mesa-opencl-icd: Applications using OpenCL crash with ": CommandLine Error: Option 'polly' registered more than once!".

2020-07-13 Thread Roman Ondráček
Package: mesa-opencl-icd
Version: 20.1.2-1
Severity: important

Dear Maintainer,

After upgrading from version 19.1.6, applications using OpenCL are
crashing with error message:
": CommandLine Error: Option 'polly' registered more than once!
LLVM ERROR: inconsistency in registered CommandLine options".

For example:
# clinfo
: CommandLine Error: Option 'polly' registered more than once!
LLVM ERROR: inconsistency in registered CommandLine options

-- Package-specific info:
glxinfo:

DISPLAY is not set.

/etc/X11/X does not exist.
/etc/X11/X is not a symlink.
/etc/X11/X is not executable.

VGA-compatible devices on PCI bus:
--
05:00.0 VGA compatible controller [0300]: Advanced Micro Devices, Inc.
[AMD/ATI] Picasso [1002:15d8] (rev c1)

/etc/X11/xorg.conf does not exist.

Contents of /etc/X11/xorg.conf.d:
-
total 0

/etc/modprobe.d contains no KMS configuration files.

Kernel version (/proc/version):
---
Linux version 5.7.0-1-amd64 (debian-ker...@lists.debian.org) (gcc
version 9.3.0 (Debian 9.3.0-14), GNU ld (GNU Binutils for Debian) 2.34)
#1 SMP Debian 5.7.6-1 (2020-06-24)

Xorg X server log files on system:
--
-rw-r--r--. 1 root  root  51966 Mar 27  2019 /var/log/Xorg.0.log
-rw-r--r--. 1 roman roman 23062 Apr 29  2019
/home/roman/.local/share/xorg/Xorg.2.log
-rw-r--r--. 1 root  root  22875 Apr 29  2019 /var/log/Xorg.3.log
-rw-r--r--. 1 roman roman 41083 Jul 13 17:46
/home/roman/.local/share/xorg/Xorg.0.log

Contents of most recent Xorg X server log file
(/home/roman/.local/share/xorg/Xorg.0.log):
--
[   105.769] (--) Log file renamed from
"/home/roman/.local/share/xorg/Xorg.pid-2221.log" to
"/home/roman/.local/share/xorg/Xorg.0.log"
[   105.770]
X.Org X Server 1.20.8
X Protocol Version 11, Revision 0
[   105.770] Build Operating System: Linux 4.19.0-8-amd64 x86_64 Debian
[   105.770] Current Operating System: Linux Lenovo-B51-80 5.7.0-1-amd64
#1 SMP Debian 5.7.6-1 (2020-06-24) x86_64
[   105.770] Kernel command line: BOOT_IMAGE=/boot/vmlinuz-5.7.0-1-amd64
root=UUID=a5e403c0-734b-406d-b2a7-3a9d5aff0c7e ro security=selinux quiet
apparmor=0
[   105.771] Build Date: 31 March 2020  10:14:40AM
[   105.771] xorg-server 2:1.20.8-2 (https://www.debian.org/support)
[   105.771] Current version of pixman: 0.36.0
[   105.771]Before reporting problems, check http://wiki.x.org
to make sure that you have the latest version.
[   105.771] Markers: (--) probed, (**) from config file, (==) default
setting,
(++) from command line, (!!) notice, (II) informational,
(WW) warning, (EE) error, (NI) not implemented, (??) unknown.
[   105.771] (==) Log file: "/home/roman/.local/share/xorg/Xorg.0.log",
Time: Mon Jul 13 17:11:29 2020
[   105.772] (==) Using system config directory "/usr/share/X11/xorg.conf.d"
[   105.773] (==) No Layout section.  Using the first Screen section.
[   105.773] (==) No screen section available. Using defaults.
[   105.773] (**) |-->Screen "Default Screen Section" (0)
[   105.773] (**) |   |-->Monitor ""
[   105.773] (==) No monitor specified for screen "Default Screen Section".
Using a default monitor configuration.
[   105.773] (==) Automatically adding devices
[   105.773] (==) Automatically enabling devices
[   105.773] (==) Automatically adding GPU devices
[   105.773] (==) Max clients allowed: 256, resource mask: 0x1f
[   105.774] (WW) The directory "/usr/share/fonts/X11/cyrillic" does not
exist.
[   105.774]Entry deleted from font path.
[   105.774] (==) FontPath set to:
/usr/share/fonts/X11/misc,
/usr/share/fonts/X11/100dpi/:unscaled,
/usr/share/fonts/X11/75dpi/:unscaled,
/usr/share/fonts/X11/Type1,
/usr/share/fonts/X11/100dpi,
/usr/share/fonts/X11/75dpi,
built-ins
[   105.774] (==) ModulePath set to "/usr/lib/xorg/modules"
[   105.774] (II) The server relies on udev to provide the list of input
devices.
If no devices become available, reconfigure udev or disable 
AutoAddDevices.
[   105.774] (II) Loader magic: 0x564cb3e45e20
[   105.774] (II) Module ABI versions:
[   105.774]X.Org ANSI C Emulation: 0.4
[   105.774]X.Org Video Driver: 24.1
[   105.774]X.Org XInput driver : 24.1
[   105.774]X.Org Server Extension : 10.0
[   105.776] (++) using VT number 2

[   105.780] (II) systemd-logind: took control of session
/org/freedesktop/login1/session/_35
[   105.781] (II) xfree86: Adding drm device (/dev/dri/card0)
[   105.782] (II) systemd-logind: got fd for /dev/dri/card0 226:0 fd 12
paused 0
[   105.784] (--) PCI:*(5@0:0:0) 1002:15d8:17aa:5124 rev 193, Mem @
0xc000/268435456, 0xd000/2097152, 0xd060/524288, I/O @
0x1000/256
[   105.784] (II) LoadModule: "glx"
[   105.786] (II) Loading /usr/lib/xorg/modules/extensions/libglx.so
[   105.789] (II) 

Bug#964334:

2020-07-13 Thread steve simmons
After running "sudo apt update && sudo apt upgrade && sudo apt dist-upgrade"
There was an update to chromium and the issue seems to be resolved.



Bug#962384: Support for systemd-sysusers

2020-07-13 Thread Moritz Mühlenhoff
Hi,

On Sun, Jul 05, 2020 at 02:52:17PM +0200, Niels Thykier wrote:
> Just to confirm, what debhelper should do with this is:
> 
> On postinst configure:
> 
> systemd-sysusers .conf

Yes, that's all.

> And that is it?  I.e. there is no action to be done for any of the other
> maintscripts?

There might be cornercases where the system user needs to be created in
the preinst.

There's 668 binary packages with a Depends on adduser in sid and per "apt-cache 
rdepends  --no-depends --no-recommends --no-suggests --no-conflicts --no-breaks 
--no-replaces --no-enhances adduser" 34 with a Pre-Depends.

I checked a few of those and found some cases where a Pre-Depends
in declared, but adduser only used in postinst (miredo, transmission) and
a few where adduser is called in preinst (quagga, wims), but it's not really
clear whether that's actually strictly needed.

I'm inclined to suggest to only use it in postinst. In corner cases where
it's needed in preinst it can still be added manually. Or we make it selectable
via an option, not sure.

post* scripts should not be needed due to lack of system user removals
mentioned earlier.

Cheers,
Moritz



Bug#964984: ITP: pybj -- A Python encoder/decoder for Binary JData (BJData) format

2020-07-13 Thread Qianqian Fang
Package: wnpp
Severity: wishlist

Name:   pybj
Version:    0.2.5
Summary:    A Python encoder/decoder for Binary JData (BJData) format
License:    GPLv3+
URL:    https://github.com/fangq/pybj

Description:
The Binary JData (BJData) Specification defines an efficient
serialization protocol for unambiguously storing complex and strongly-typed
binary data found in numerous application domains. The BJData specification
is the binary counterpart to the JSON format, derived and extended from the
Universal Binary JSON (UBJSON, http://ubjson.org) specification. This python
module implements BJData Spec V1 Draft 1.

Comment:
I am the upstream maintainer of this python module. The code was derived
from the py-ubjson project, which is currently packaged in Debian:
https://packages.debian.org/sid/python-ubjson
My packaging files were adapted from the python-ubjson files.



Bug#928692: #928692 - lxde: Wicd no longer maintained upstream - should not be default any longer

2020-07-13 Thread debian-testing
I struggled with the same problem and tried all the various options for Debian 
11 Bullseye lxde-core.

I now use package cmst and connman with lxde-core on Debian 11 Bullseye and it 
has been working great, even more stable with certain wifi chipsets than using 
wicd on Debian 10 Buster.

The following brings everything required for Debian 11 Bullseye lxde-core:
apt install cmst -y

Bug#964971: lintian: please consider new check: expired keys in debian/upstream/signing-key.asc

2020-07-13 Thread Axel Beckert
Hi,

Daniel Shahaf wrote:
> After extending the key I re-pushed it to keyservers, but did not
> regenerate the d/u/signing-key.asc export. (I'd like to automate
> that regeneration, since my key appears in multiple packages'
> signing-key.asc files, but that's a question for another thread.)

That might be something for lintian-brush once a lintian check is
there. Cc'ing Jelmer, the author of lintian-brush.

Regards, Axel
-- 
 ,''`.  |  Axel Beckert , https://people.debian.org/~abe/
: :' :  |  Debian Developer, ftp.ch.debian.org Admin
`. `'   |  4096R: 2517 B724 C5F6 CA99 5329  6E61 2FF9 CD59 6126 16B5
  `-|  1024D: F067 EA27 26B9 C3FC 1486  202E C09E 1D89 9593 0EDE



Bug#963808: ruby-sanitize: CVE-2020-4054: HTML sanitization bypass in Sanitize

2020-07-13 Thread Salvatore Bonaccorso
Hi Antonio,

On Mon, Jul 13, 2020 at 11:19:38AM -0300, terce...@debian.org wrote:
> On Sun, Jul 12, 2020 at 03:11:30PM +0200, Salvatore Bonaccorso wrote:
> > On Sat, Jun 27, 2020 at 09:10:01PM +0200, Salvatore Bonaccorso wrote:
> > > Source: ruby-sanitize
> > > Version: 4.6.6-2
> > > Severity: grave
> > > Tags: security upstream
> > > Justification: user security hole
> > > 
> > > Hi,
> > > 
> > > The following vulnerability was published for ruby-sanitize.
> > > 
> > > CVE-2020-4054[0]:
> > > | In Sanitize (RubyGem sanitize) greater than or equal to 3.0.0 and less
> > > | than 5.2.1, there is a cross-site scripting vulnerability. When HTML
> > > | is sanitized using Sanitize's "relaxed" config, or a custom config
> > > | that allows certain elements, some content in a math or svg element
> > > | may not be sanitized correctly even if math and svg are not in the
> > > | allowlist. You are likely to be vulnerable to this issue if you use
> > > | Sanitize's relaxed config or a custom config that allows one or more
> > > | of the following HTML elements: iframe, math, noembed, noframes,
> > > | noscript, plaintext, script, style, svg, xmp. Using carefully crafted
> > > | input, an attacker may be able to sneak arbitrary HTML through
> > > | Sanitize, potentially resulting in XSS (cross-site scripting) or other
> > > | undesired behavior when that HTML is rendered in a browser. This has
> > > | been fixed in 5.2.1.o
> > 
> > Attached ist a preliminary debdiff with the fix, but two prerequisites
> > before "fix: Don't treat :remove_contents as `true` when it's an
> > Array" and "feat: Remove useless filtered element content by default".
> > 
> > Antonio, would it be possible to let it go trough your second pair of
> > eyes, with the pre-knolege that I'm not familiar with the package but
> > trying to address the CVE-2020-4054.
> > 
> > If those look correct, the plan would be to do 4.6.6-2.1~deb10u1 based
> > on that for buster-security.
> 
> Yes, those patches look OK.
> 
> Thanks for your work.

Thanks for your review! So propsing to upload the NMU first, and then
later handle the DSA for it based on that version if no negative
reports come in.

Regards,
Salvatore



Bug#964983: New Upstream Version

2020-07-13 Thread Barak A. Pearlmutter
Package: libghc-github-dev
Version: 0.20-2
Severity: wishlist

There's a new upstream version available, and I cannot update the
github-backup package until libghc-github-dev (>= 0.23) is available.
So I hope to see the new version packaged.

Cheers,

--Barak.



Bug#963808: ruby-sanitize: diff for NMU version 4.6.6-2.1

2020-07-13 Thread Salvatore Bonaccorso
Control: tags 963808 + patch
Control: tags 963808 + pending


Dear maintainer,

I've prepared an NMU for ruby-sanitize (versioned as 4.6.6-2.1) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer.

Regards,
Salvatore
diff -Nru ruby-sanitize-4.6.6/debian/changelog ruby-sanitize-4.6.6/debian/changelog
--- ruby-sanitize-4.6.6/debian/changelog	2019-02-07 21:15:34.0 +0100
+++ ruby-sanitize-4.6.6/debian/changelog	2020-07-12 15:02:54.0 +0200
@@ -1,3 +1,13 @@
+ruby-sanitize (4.6.6-2.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * fix: Don't treat :remove_contents as `true` when it's an Array
+  * feat: Remove useless filtered element content by default
+  * Fix sanitization bypass in HTML foreign content (CVE-2020-4054)
+(Closes: #963808)
+
+ -- Salvatore Bonaccorso   Sun, 12 Jul 2020 15:02:54 +0200
+
 ruby-sanitize (4.6.6-2) unstable; urgency=medium
 
   * Team upload.
diff -Nru ruby-sanitize-4.6.6/debian/patches/Fix-sanitization-bypass-in-HTML-foreign-content.patch ruby-sanitize-4.6.6/debian/patches/Fix-sanitization-bypass-in-HTML-foreign-content.patch
--- ruby-sanitize-4.6.6/debian/patches/Fix-sanitization-bypass-in-HTML-foreign-content.patch	1970-01-01 01:00:00.0 +0100
+++ ruby-sanitize-4.6.6/debian/patches/Fix-sanitization-bypass-in-HTML-foreign-content.patch	2020-07-12 15:02:31.0 +0200
@@ -0,0 +1,134 @@
+From: Ryan Grove 
+Date: Mon, 15 Jun 2020 14:27:07 -0700
+Subject: Fix sanitization bypass in HTML foreign content
+Origin: https://github.com/rgrove/sanitize/commit/a11498de9e283cd457b35ee252983662f7452aa9
+Bug: https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m
+Bug-Debian: https://bugs.debian.org/963808
+Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2020-4054
+
+https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m
+
+[Salvatore Bonaccorso: Backport to 4.6.6 for context changes]
+---
+ README.md  | 11 +++
+ lib/sanitize/config/default.rb |  2 +-
+ test/test_clean_element.rb | 30 --
+ test/test_malicious_html.rb| 13 +
+ 4 files changed, 45 insertions(+), 11 deletions(-)
+
+--- a/README.md
 b/README.md
+@@ -73,6 +73,11 @@ Sanitize can sanitize the following type
+ * Standalone CSS stylesheets
+ * Standalone CSS properties
+ 
++However, please note that Sanitize _cannot_ fully sanitize the contents of
++`` or `` elements, since these elements don't follow the same parsing
++rules as the rest of HTML. If this is something you need, you may want to look
++for another solution.
++
+ ### HTML Fragments
+ 
+ A fragment is a snippet of HTML that doesn't contain a root-level ``
+@@ -417,6 +422,12 @@ elements not in this array will be remov
+ ]
+ ```
+ 
++**Warning:** Sanitize cannot fully sanitize the contents of `` or ``
++elements, since these elements don't follow the same parsing rules as the rest
++of HTML. If you add `math` or `svg` to the allowlist, you must assume that any
++content inside them will be allowed, even if that content would otherwise be
++removed by Sanitize.
++
+  :protocols (Hash)
+ 
+ URL protocols to allow in specific attributes. If an attribute is listed here
+--- a/lib/sanitize/config/default.rb
 b/lib/sanitize/config/default.rb
+@@ -70,7 +70,7 @@ class Sanitize
+   # the specified elements (when filtered) will be removed, and the contents
+   # of all other filtered elements will be left behind.
+   :remove_contents => %w[
+-iframe noembed noframes noscript script style
++iframe math noembed noframes noscript plaintext script style svg xmp
+   ],
+ 
+   # Transformers allow you to filter or alter nodes using custom logic. See
+--- a/test/test_clean_element.rb
 b/test/test_clean_element.rb
+@@ -192,21 +192,16 @@ describe 'Sanitize::Transformers::CleanE
+ .must_equal ''
+ end
+ 
+-it 'should escape the content of removed `plaintext` elements' do
+-  Sanitize.fragment('hello! alert(0)')
+-.must_equal 'hello! scriptalert(0)/script'
+-end
+-
+-it 'should escape the content of removed `xmp` elements' do
+-  Sanitize.fragment('hello! alert(0)')
+-.must_equal 'hello! scriptalert(0)/script'
+-end
+-
+ it 'should not preserve the content of removed `iframe` elements' do
+   Sanitize.fragment('hello! alert(0)')
+ .must_equal ''
+ end
+ 
++it 'should not preserve the content of removed `math` elements' do
++  Sanitize.fragment('hello! alert(0)')
++.must_equal ''
++end
++
+ it 'should not preserve the content of removed `noembed` elements' do
+   Sanitize.fragment('hello! alert(0)')
+ .must_equal ''
+@@ -222,6 +217,11 @@ describe 'Sanitize::Transformers::CleanE
+ .must_equal ''
+ end
+ 
++it 'should not preserve the content of removed `plaintext` elements' do
++  Sanitize.fragment('hello! 

Bug#964821: New Upstream Version

2020-07-13 Thread Barak A. Pearlmutter
There's a new upstream version available, and I cannot update the
github-backup package until libghc-github-dev (>= 0.23) is available.
So I hope to see the new version packaged.

Cheers,

--Barak.



Bug#777403: leave: please make the build reproducible

2020-07-13 Thread Josip Rodin
On Sat, Jul 11, 2020 at 07:32:22AM -0400, Boyuan Yang wrote:
> It has been another 3 years since last reply; is there any possibility
> to push this forward?

Oh, sure, I just forgot about it.

-- 
Josip Rodin



Bug#963121: Additional analysis and suggested bugfix

2020-07-13 Thread Gert van de Kraats

Problem also occurs at systemd version 245.6-2 .
Indeed I am using GNOME where the login session is managed
by systemd --user.
The problem is not concerning an ordinary user service, which is killed
by SIGKILL after 90 seconds. There is no SIGKILL-message!!
As described at the initial bug-text a restart of the user dbus may 
cause a hang at state

AUTHENTICATING during shutdown. At the log you can see
AUTHENTICATING starts at 18:10:02 and ends at 18:11:32, 90 seconds
later. State RUNNING is never reached.

Jun 15 18:10:02 debian systemd[1360]: Bus bus-api-user: changing state 
OPENING → AUTHENTICATING

Jun 15 18:11:32 debian systemd[1360]: Bus bus-api-user: changing state
AUTHENTICATING → CLOSED

In that hanging situation, as soon as the user systemd gets a SIGTERM 
from pid 1 (systemd) it will

call sd_bus_flush at libsystemd/sd-bus/sd-bus.c.
This will call bus_ensure_running, that repeats calling sd_bus_process,
that finally repeatingly calls bus_socket_process_authenticating.
This routine will cause a timeout after 90 seconds, the timeout-value is
hard coded by DEFAULT_TIMEOUT_USEC at basic/def.h .

A simple and tested patch at sd_bus_flush at libsystemd/sd-bus/sd-bus.c is
next code just before the call to bus_ensure_running:

    if ((bus->state == BUS_AUTHENTICATING) && (bus->is_user))
    return -ETIMEDOUT;

It assumes state BUS_AUTHENTICATING is not normal for an user dbus at a 
call to sd_flush.


I think this is an upstream bug!



Bug#961195: transition: glibc

2020-07-13 Thread Aurelien Jarno
On 2020-07-13 20:43, Emilio Pozuelo Monfort wrote:
> Control: tags -1 confirmed
> 
> Hi Aurelien,
> 
> On 13/07/2020 19:54, Aurelien Jarno wrote:
> > On 2020-07-11 18:09, Emilio Pozuelo Monfort wrote:
> >> block 961195 with 955368 964223 964225 964226 964220 964227 964229 964231
> >> thanks
> > 
> > Does it mean that we need to have those bugs fixed before starting the
> > transition?
> 
> No, I just wanted to get them in the BTS, as that would tell me at any given
> time how many are still open.

Ok, thanks for the explanation. I'll upload fixes to the delayed queue
to fix them.

> > Or can we start the transition and fix them at the same
> > time?
> 
> Yeah, let's go ahead and do that.

Ok, thanks. I have just uploaded the package to unstable.

Thanks,
Aurelien

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net



Bug#964982: src:biojava4-live: fails to migrate to testing for too long: maintainer built arch:all binary

2020-07-13 Thread Paul Gevers
Source: biojava4-live
Version: 4.2.12+dfsg-2
Severity: serious
Control: close -1 4.2.12+dfsg-3
Tags: sid bullseye pending
User: release.debian@packages.debian.org
Usertags: out-of-sync

Dear maintainer(s),

As recently announced [1], the Release Team now considers packages that
are out-of-sync between testing and unstable for more than 60 days as
having a Release Critical bug in testing. Your package src:biojava4-live
in its current version in unstable has been trying to migrate for 60
days [2]. Hence, I am filing this bug.

If a package is out of sync between unstable and testing for a longer
period, this usually means that bugs in the package in testing cannot be
fixed via unstable. Additionally, blocked packages can have impact on
other packages, which makes preparing for the release more difficult.
Finally, it often exposes issues with the package and/or
its (reverse-)dependencies. We expect maintainers to fix issues that
hamper the migration of their package in a timely manner.

This bug will trigger auto-removal when appropriate. As with all new
bugs, there will be at least 30 days before the package is auto-removed.

I have immediately closed this bug with the version in unstable, so if
that version or a later version migrates, this bug will no longer affect
testing. I have also tagged this bug to only affect sid and bullseye, so
it doesn't affect (old-)stable.

Your package is only blocked because the arch:all binary package(s)
aren't built on a buildd. Unfortunately the Debian infrastructure
doesn't allow arch:all packages to be properly binNMU'ed. Hence, I will
shortly do a no-changes source-only upload to DELAYED/15, closing this
bug. Please let me know if I should delay or cancel that upload.

Paul

[1] https://lists.debian.org/debian-devel-announce/2020/02/msg5.html
[2] https://qa.debian.org/excuses.php?package=biojava4-live




signature.asc
Description: OpenPGP digital signature


Bug#964979: src:neutron-vpnaas: fails to migrate to testing for too long: piuparts regression

2020-07-13 Thread Paul Gevers
Source: neutron-vpnaas
Version: 2:15.0.0-2
Severity: serious
Control: close -1 2:16.0.0-1
Tags: sid bullseye
User: release.debian@packages.debian.org
Usertags: out-of-sync

Dear maintainer(s),

As recently announced [1], the Release Team now considers packages that
are out-of-sync between testing and unstable for more than 60 days as
having a Release Critical bug in testing. Your package
src:neutron-vpnaas in its current version in unstable has been trying to
migrate for 61 days [2]. Hence, I am filing this bug.

If a package is out of sync between unstable and testing for a longer
period, this usually means that bugs in the package in testing cannot be
fixed via unstable. Additionally, blocked packages can have impact on
other packages, which makes preparing for the release more difficult.
Finally, it often exposes issues with the package and/or
its (reverse-)dependencies. We expect maintainers to fix issues that
hamper the migration of their package in a timely manner.

This bug will trigger auto-removal when appropriate. As with all new
bugs, there will be at least 30 days before the package is auto-removed.

I have immediately closed this bug with the version in unstable, so if
that version or a later version migrates, this bug will no longer affect
testing. I have also tagged this bug to only affect sid and bullseye, so
it doesn't affect (old-)stable.

If you believe your package is unable to migrate to testing due to
issues beyond your control, don't hesitate to contact the Release Team.

Paul

[1] https://lists.debian.org/debian-devel-announce/2020/02/msg5.html
[2] https://qa.debian.org/excuses.php?package=neutron-vpnaas




signature.asc
Description: OpenPGP digital signature


Bug#964981: src:neutron-dynamic-routing: fails to migrate to testing for too long: piuparts regression

2020-07-13 Thread Paul Gevers
Source: neutron-dynamic-routing
Version: 2:15.0.0-3
Severity: serious
Control: close -1 2:16.0.0-1
Tags: sid bullseye
User: release.debian@packages.debian.org
Usertags: out-of-sync

Dear maintainer(s),

As recently announced [1], the Release Team now considers packages that
are out-of-sync between testing and unstable for more than 60 days as
having a Release Critical bug in testing. Your package
src:neutron-dynamic-routing in its current version in unstable has been
trying to migrate for 61 days [2]. Hence, I am filing this bug.

If a package is out of sync between unstable and testing for a longer
period, this usually means that bugs in the package in testing cannot be
fixed via unstable. Additionally, blocked packages can have impact on
other packages, which makes preparing for the release more difficult.
Finally, it often exposes issues with the package and/or
its (reverse-)dependencies. We expect maintainers to fix issues that
hamper the migration of their package in a timely manner.

This bug will trigger auto-removal when appropriate. As with all new
bugs, there will be at least 30 days before the package is auto-removed.

I have immediately closed this bug with the version in unstable, so if
that version or a later version migrates, this bug will no longer affect
testing. I have also tagged this bug to only affect sid and bullseye, so
it doesn't affect (old-)stable.

If you believe your package is unable to migrate to testing due to
issues beyond your control, don't hesitate to contact the Release Team.

Paul

[1] https://lists.debian.org/debian-devel-announce/2020/02/msg5.html
[2] https://qa.debian.org/excuses.php?package=neutron-dynamic-routing




signature.asc
Description: OpenPGP digital signature


Bug#964978: src:ruby-pgplot: fails to migrate to testing for too long: B-D on non-free package

2020-07-13 Thread Paul Gevers
Source: ruby-pgplot
Version: 0.1.9-3
Severity: serious
Control: close -1 0.2.0-1
Tags: sid bullseye
User: release.debian@packages.debian.org
Usertags: out-of-sync

Dear maintainer(s),

As recently announced [1], the Release Team now considers packages that
are out-of-sync between testing and unstable for more than 60 days as
having a Release Critical bug in testing. Your package src:ruby-pgplot
in its current version in unstable has been trying to migrate for 62
days [2]. Hence, I am filing this bug.

If a package is out of sync between unstable and testing for a longer
period, this usually means that bugs in the package in testing cannot be
fixed via unstable. Additionally, blocked packages can have impact on
other packages, which makes preparing for the release more difficult.
Finally, it often exposes issues with the package and/or
its (reverse-)dependencies. We expect maintainers to fix issues that
hamper the migration of their package in a timely manner.

This bug will trigger auto-removal when appropriate. As with all new
bugs, there will be at least 30 days before the package is auto-removed.

I have immediately closed this bug with the version in unstable, so if
that version or a later version migrates, this bug will no longer affect
testing. I have also tagged this bug to only affect sid and bullseye, so
it doesn't affect (old-)stable.

If you believe your package is unable to migrate to testing due to
issues beyond your control, don't hesitate to contact the Release Team.

Paul

[1] https://lists.debian.org/debian-devel-announce/2020/02/msg5.html
[2] https://qa.debian.org/excuses.php?package=ruby-pgplot




signature.asc
Description: OpenPGP digital signature


Bug#964044: mrpt: FTBFS: test failure

2020-07-13 Thread Sebastian Ramacher
On 2020-06-30 22:37:57 +0200, Sebastian Ramacher wrote:
> Source: mrpt
> Version: 1:2.0.4-1
> Severity: serious
> Tags: ftbfs
> Justification: fails to build from source (but built successfully in the past)
> 
> binNMUs of mrpt failed to build:
> | [--] 1 test from RawlogGrabberApp
> | [ RUN  ] RawlogGrabberApp.CGenericCamera_AVI
> | [CCameraSensor::initialize] Opening camera...
> | [CCameraSensor::initialize] FFmpeg stream: 
> /<>/share/mrpt/datasets/dummy_video.avi...
> | [CCameraSensor::initialize] Done!
> | Rawlog grabbed objects: 1
> | /<>/libs/apps/src/RawlogGrabberApp_unittest.cpp:94: Failure
> | Expected: (app.rawlog_saved_objects) >= (REQUIRED_GRAB_OBS), actual: 1 vs 3
> | [  FAILED  ] RawlogGrabberApp.CGenericCamera_AVI (1511 ms)
> | [--] 1 test from RawlogGrabberApp (1511 ms total)
> 
> See
> https://buildd.debian.org/status/fetch.php?pkg=mrpt=amd64=1%3A2.0.4-1%2Bb1=1593549279=0
> for example

This issue has been fixed upstream:
https://github.com/MRPT/mrpt/commit/15234dc335c2413e3fd41021f7511f1d36fe915b.
Could you please apply the fix to the Debian package so that
ros-geometry2 transition can be completed? Thanks

Cheers
-- 
Sebastian Ramacher


signature.asc
Description: PGP signature


Bug#964955: [Tts-project] Bug#964955: Please move the executables to /usr/libexec/

2020-07-13 Thread Paul Gevers
Hi Laurent,

On 13-07-2020 13:00, Laurent Bigonville wrote:
> Debian now officially support the FHS 3.0 which allows executables to be
> installed in (a subfolder of) /usr/libexec

Apart from being allowed, can you elaborate why that would be desirable?
(I honestly don't know).

Paul



signature.asc
Description: OpenPGP digital signature


Bug#923860: rsync crashes sporadically when remote host closes connection

2020-07-13 Thread Samuel Henrique
Hello,

This is not addressing the issue directly, but I think it's worth pointing out,

> That is definitely weird.  rsync is one of the few Debian packages without
> debug symbols of any type available, so it had to be rebuilt, but it was
> rebuilt from the same source archive (apt-get source rsync) and version as
> the original crashing binary.  The line numbers /should/ match up.

Starting with 3.1.3-7, rsync has now dbgsym packages, unfortunately
stable has 3.1.3-6 and we can't perform a stable update for this
change.

We recently uploaded rsync to buster-backports, this means that rsync
on backports does ship dbgsym.
And starting with the next stable release (Debian 11/bullseye), rsync
will provide dbgsym packages.

Regards,

-- 
Samuel Henrique 



Bug#961195: transition: glibc

2020-07-13 Thread Emilio Pozuelo Monfort
Control: tags -1 confirmed

Hi Aurelien,

On 13/07/2020 19:54, Aurelien Jarno wrote:
> On 2020-07-11 18:09, Emilio Pozuelo Monfort wrote:
>> block 961195 with 955368 964223 964225 964226 964220 964227 964229 964231
>> thanks
> 
> Does it mean that we need to have those bugs fixed before starting the
> transition?

No, I just wanted to get them in the BTS, as that would tell me at any given
time how many are still open.

> Or can we start the transition and fix them at the same
> time?

Yeah, let's go ahead and do that.

Cheers,
Emilio



Bug#870641: light-locker: screen stays black after closing and opening laptop lid

2020-07-13 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, 2020-07-13 at 10:33 +0800, Aaron Lu wrote:
> On Tue, May 12, 2020 at 11:13:52AM +0200, Yves-Alexis Perez wrote:
> > I've also re-pinged upstream Linux and the patch should be included in the
> > next Linux point release (hopefully 4.19.123), and which will then be
> > included
> > in Debian buster for the next Debian point release (hopefully 10.5). It's
> > not
> > tomorrow but still it should help at one point.
> 
> Just want to report that I have installed 5.6.0-0.bpo.2-amd64 from
> buster-backport and now the display can be powered back on when I
> pressed my keyboard or moved my mouse.

Could you try linux-image-4.19.0-10-amd64 from testing-proposed-updates and
report back? It should include the fix.

> I do not see any other problems right now, everything seems to work
> fine, except one error message in dmesg everytime the display goes the
> off-on cycle:
> broken atomic modeset userspace detected, disabling atomic
> But I guess it's a different problem and it doesn't seem to cause any
> problem.

Actually the problem lies in the way Xorg uses atomic, and that's why the fix
is to disable them. So if you see the message that means the fix is correctly
applied.

Regards,
- -- 
Yves-Alexis
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAl8Mp0YACgkQ3rYcyPpX
RFs+kQgA6vO+abjPhh198KJPDVy/970Y7sEW1qgx7pHsrWy2/McdNWfWydSlld0x
29BKlYY/ZlwHP9AX5yLjR6gnuxHum4AncJu982w/+zlG3cB/VisSjBsCxOeM8nMW
8CsCidxq56YUiOIjA5GaKwroK6jb84SfmMva3BkURYB/teSs7URJ9nnunyWtITDv
HJYKrYND99/vc1KaSOTBE6T6FK5jPaH8HPOARMSMXOinVkba/QGLdYl6YC/mtMif
WD6QC6DkcLqK7z95Q33hOHIMyL418tqfoUIz+twv3FGel067EnSj6jbU4zGgXrz3
LyPx2UMh8pqBEtrvvFXWUge1I9JY2w==
=j2FJ
-END PGP SIGNATURE-



Bug#964102: gle-graphics should build depend on libqt5opengl5-desktop-dev instead of libqt5opengl5-dev

2020-07-13 Thread Christian T. Steigies
Adrian,
On Wed, Jul 01, 2020 at 10:26:33PM +0300, Adrian Bunk wrote:
> Source: gle-graphics
> Version: 4.2.5-8
> Severity: important
> Tags: ftbfs
> 
> gle-graphics FTBFS on armel and armhf:
> 
> https://buildd.debian.org/status/package.php?p=gle-graphics=sid
> 
> ...
> 3dviewer.cpp: In destructor ‘virtual QGLE3DWidget::~QGLE3DWidget()’:
> 3dviewer.cpp:56:6: error: ‘glDeleteLists’ was not declared in this scope
>56 |  glDeleteLists(object, 1);
>   |  ^
> ...
> 
> The root cause is that on armel/armhf
> Qt5 is compiled with OpenGL ES instead of OpenGL.
> 
> Ideally it should be fixed to build and work with OpenGL ES,
> changing the build dependency from libqt5opengl5-dev to
> libqt5opengl5-desktop-dev would at least stop trying to
> build on armel/armhf.

Thanks for the hint! I am not sure if I am in the position to fix the OpenGL
issues, but maybe somebody from the glx list is. However, I will make use of
your workaround until this can be sorted out.

thanks,
Christian



Bug#964441: geeqie: No image is rendered, only white rectangle visible

2020-07-13 Thread Andreas Ronnquist
On Wed, 08 Jul 2020 09:22:47 +0800 Paul Wise  wrote:
> Control: forwarded -1
> https://github.com/BestImageViewer/geeqie/issues/539 Control: retitle
> -1 geeqie: No image is rendered, only white rectangle visible under
> GNOME Wayland Control: tags -1 + patch Control: usertags -1 + wayland
> 
> On Tue, 07 Jul 2020 12:19:13 +0200 Florian wrote:
> 
> > No image is shown, instead only a white rectangle is visible.
> 
> I'm getting this too. 
> 
> > I am on gnome/wayland.
> 
> I've tested GNOME Xorg and it does not have this issue, retitling.
> 
> > Might be this one: 
> https://github.com/BestImageViewer/geeqie/issues/539
> 
> Marking as forwarded.
> 
> It seems there is a patch that makes it work for GPU acceleration mode
> but unfortunately not for software rendering mode.
> 

Thanks guys - have I understood correctly that upstream current Git
fixes it properly? I have tested some with latest upstream git, and to
me it seems it does, but I would like confirmation that it fixes it for
you too - I am a bit hesitant in packaging a Git snapshot, but if that
is what it takes to fix the bug, then so be it. Upstream unfortunately
makes new releases very rarely.

/Andreas Rönnquist
gus...@debian.org



Bug#955368: busybox FTBFS with glibc 2.31 (references to obsolete 'stime')

2020-07-13 Thread Aurelien Jarno
Hi,

On 2020-03-30 09:17, Steve Langasek wrote:
> Package: busybox
> Version: 1:1.30.1-4
> Severity: important
> Tags: patch
> User: ubuntu-de...@lists.ubuntu.com
> Usertags: origin-ubuntu focal ubuntu-patch
> 
> Dear maintainers,
> 
> In Ubuntu, the busybox package has begun to FTBFS because Ubuntu has moved
> to glibc 2.31, which has obsoleted the stime() function and busybox still
> calls this function.
> 
> The attached patch has been uploaded to Ubuntu, replacing the calls to
> stime() with clock_settime(), per the glibc upstream documentation.
> 
> This is not a serious bug today in Debian because glibc 2.31 is only in
> experimental, but at some point it will become a serious FTBFS.

It would be nice if this bug could be fixed as it is currently blocking
the glibc 2.31 transition.

Thanks,
Aurelien

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net



Bug#959363: jenkins.debian.org: broken links in index_suite_${ARCH}_stats.html

2020-07-13 Thread Holger Levsen
Hi Patrice,

fixed now. & thanks for your bug report and patience in the first place!


-- 
cheers,
Holger

---
   holger@(debian|reproducible-builds|layer-acht).org
   PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C

There are no jobs on a dead planet.


signature.asc
Description: PGP signature


Bug#961195: transition: glibc

2020-07-13 Thread Aurelien Jarno
On 2020-07-11 18:09, Emilio Pozuelo Monfort wrote:
> block 961195 with 955368 964223 964225 964226 964220 964227 964229 964231
> thanks

Does it mean that we need to have those bugs fixed before starting the
transition? Or can we start the transition and fix them at the same
time?

Beside busybox, they are all leaf packages or almost.

Thanks,
Aurelien

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net



Bug#964729: vim-gitgutter doesn't respect the Debian vim policy

2020-07-13 Thread Louis-Philippe Véronneau
On 2020-07-11 09 h 37, James McCoy wrote:
> On Thu, Jul 09, 2020 at 01:00:24PM -0400, Louis-Philippe Véronneau wrote:
>> On 2020-07-09 12 h 37, Raphael Medaer wrote:
>>> Dear Louis-Philippe,
>>>
>>> The first packaging I did (not published) was using `vim-addon-manager`. 
>>> Although I switch to dh-vim_addon (and friends) which is not using 
>>> `vim-addon-manager` anymore.
>>> This move has been recommended by James McCoy  (who 
>>> sponsored the package).
>>>
>>> I guess you spotted a lack of documentation/policy for this new helper: 
>>> `dh-vim_addon`.
>>> I add James in CC. Maybe should we discuss/write a new Policy and/or some 
>>> guidelines.
>>>
>>> I already started a TODO list of checks for new/next vim addon packages. I 
>>> would appreciate some feedback on it, but first let me a few days to make 
>>> it clean.
>>>
>>> Here are some additional notes about your comments:
>>>
>>>  > It appears this package doesn't follow the Debian vim policy [1]. It's 
>>>  > clearly not easy to find (I had to search quite a bit to find it), but I 
>>>  > think it's important vim packages try to respect it :) 
>>>
>>> Is this policy still relevant ? Already mentionned above. 
>>
>> No idea, I'm only a vim user and I haven't done any vim work in Debian :)
> 
> The policy basically codifies the behavior that we implemented in vam.
> That's problematic in its own right, but also an issue because vam is
> very flawed (see #438482).
> 
> 
>>>  > * the addon is enabled after the installation; it shouldn't
>>>
>>> If I well understood James' advices: with `dh-vim_addon` help, vim addon 
>>> packages should always be enabled if you can disable them through your 
>>> vimrc with `let g:loaded_gitgutter = 1`.
>> This is quite a big change and I guess it breaks my current setup :s
> 
> I'm curious about how this breaks your setup.  Could you explain this
> more?

Nothing important really. I use configuration management on hosts I use
(servers and clients) to get a consistent vim profile, and I used vam to
enable or disable addons.

Addons being enabled by default will simply mean everything will be done
via vimrc files.

-- 
  ⢀⣴⠾⠻⢶⣦⠀
  ⣾⠁⢠⠒⠀⣿⡁  Louis-Philippe Véronneau
  ⢿⡄⠘⠷⠚⠋   po...@debian.org / veronneau.org
  ⠈⠳⣄



signature.asc
Description: OpenPGP digital signature


Bug#964976: ITP: tao-config -- C++ header-only library that reads config files and produces a JSON value

2020-07-13 Thread Shayan Doust
Package: wnpp
Severity: wishlist

Subject: ITP: tao-config -- C++ header-only library that reads config files and 
produces a JSON value
Package: wnpp
Owner: Shayan Doust 
Severity: wishlist

* Package name: tao-config
  Version : 0.0+git20200604.84a7383
  Upstream Author : Dr. Colin Hirsch
* URL : https://github.com/taocpp/config
* License : Expat
  Programming Lang: C
  Description : C++ header-only library that reads config files and 
produces a JSON value
 C++ header-only library that reads config files based on JSON and JAXN
 formats and in turn, produces a single JSON valur as a result.
 .
 Its features are as follows:
  1. JAXN syntax with extensions (backwards compatible with JSON).
  2. JAXN data model (JSON extended with binary data and non-finites).
  3. Meta data, all sub-values are annotated with filename and position.
  4. Copy, reference, replace and delete anything in the JSON structure.
  5. Multiple ways to read and parse other config and data files.
  6. Uses environmental variables and the output of arbitrary
 shell commands.

Remark: This package is maintained by Debian Med Packaging Team at
   https://salsa.debian.org/med-team/tao-config



Bug#949394: libsmbclient rename failure: related samba bugs

2020-07-13 Thread Johannes Simon
These samba bugs are probably related:

https://bugzilla.samba.org/show_bug.cgi?id=13599
https://bugzilla.samba.org/show_bug.cgi?id=14169



Bug#819460: lintian: duplicate-updaterc.d-calls-in-postinst false positive

2020-07-13 Thread Chris Lamb
Hi Richard,

> FYI, I also had to silence a duplicate-updaterc.d-calls-in-postinst 
> false positive in ddclient. The two calls to update-rc.d are in the two 
> branches of an 'if' statement, so it is not actually called twice.
>
> See lines 139 and 149 of:
> https://salsa.debian.org/debian/ddclient/-/blob/debian/3.9.1-2/debian/postinst#L139
> 
> Commit that disabled the lintian check:
> https://salsa.debian.org/debian/ddclient/-/commit/b65a60e072334f0cee52b41ed4b254bce0d02bad

Glancing at this quickly, we now have:

update-rc.d ddclient defaults >/dev/null
invoke-rc.d ddclient start || exit 1

… yet we should be skipping the first due to:

next unless /^(?:.+;|^\s*system[\s\(\']+)?\s*update-rc\.d\s+

So maybe we can fix this one. Can't immediately see why this is
not working.


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org  chris-lamb.co.uk
   `-



Bug#964975: ugrep: Wrong synopsis line

2020-07-13 Thread Joao Eriberto Mota Filho
Package: ugrep
Version: 2.1.1+dfsg-1
Severity: normal
X-Debbugs-Cc: eribe...@debian.org

Dear Maintainer,

The synopsis in your package is not compliant with Debian Policy §3.4.1. Using
'apt search ugrep' I can see:

 ugrep/unstable 2.1.1+dfsg-1 amd64
   Universal grep: ultra fast searcher of file systems, text and

Please, use an informative line to describe your package.

Regards,

Eriberto

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)


Bug#964141: libc6: "cannot allocate memory in static TLS block" with some library combinations on arm64

2020-07-13 Thread Dmitry Shachnev
Control: tags -1 + fixed-upstream

On Fri, Jul 03, 2020 at 03:57:36PM +0200, Gianfranco Costamagna wrote:
> control: tags -1 patch
>
> Hello, the patch (v5) applied on top of 2.31 (build-tested in Ubuntu)
> seems to solve the issue

Thanks for testing it!

Dear glibc maintainers: the patchset was updated to v6 and then committed
upstream a few days ago:

Cover mail: https://sourceware.org/pipermail/libc-alpha/2020-July/115968.html
PATCH 1/3: https://sourceware.org/git/?p=glibc.git;a=commit;h=0c7b002fac12dcb2
PATCH 2/3: https://sourceware.org/git/?p=glibc.git;a=commit;h=17796419b5fd6943
PATCH 3/3: https://sourceware.org/git/?p=glibc.git;a=commit;h=ffb17e7ba3a5ba96

Fix for this bug is in the third patch, but I guess it needs the first two
as well if you will be backporting it.

--
Dmitry Shachnev


signature.asc
Description: PGP signature


Bug#960073: Package:python-pyqt5 Run the example code with Trace and crash (SIGABRT)

2020-07-13 Thread Dmitry Shachnev
Hi, sorry for the late reply too.

On Mon, Jul 06, 2020 at 02:56:04PM +0800, pengzon...@uniontech.com wrote:
> Hi!
>
> Sorry for my late reply. I preload libGLX_mesa.so.0 , and then run  the code
> on the arm machine is ok.
> I tried to debug it, and then I found something different. The parameter of
> __glXLookupVendorByName is NVIDIA instead of mesa, it will dlopen
> libGLX_nvidia.so.0, but my Graphics Card is AMD, only IibGLX_mesa.so.0 can
> be found locally, so __glXLookupVendorByName failed.

It looks like for some reason your X server returns "nvidia" in response
to glXQueryServerString request.

I would suggest you to try writing a minimal test case that would call
glXQueryServerString (e.g. via libxcb and xcb_glx_query_server_string),
and check what happens. If the value is wrong then maybe open a bug against
the X server.

Exporting __GLX_VENDOR_LIBRARY_NAME=mesa (or whatever) env variable should
override it.

P.S. The glibc patch was accepted upstream, so it will land in Debian packages
sooner or later.

--
Dmitry Shachnev


signature.asc
Description: PGP signature


Bug#964974: berusky-data: Please add Multi-Arch: foreign

2020-07-13 Thread Elrond
Package: berusky-data
Version: 1.7-2
Severity: wishlist
User: multiarch-de...@lists.alioth.debian.org
Usertags: multiarch

Hi,

It looks like berusky-data offers an architecture
independent (data level) interface to its users.
Would you mind setting it to Multi-Arch: foreign?
It's usually a matter of adding one line to debian/control.

This would hopefully improve install options for different
architectures. Like running the x32 variant on an amd64
system.

Note: Architecture=all packages are not Multi-Arch=foreign
automatically for various reasons, so they need to be set
manually.


Cheers

Elrond



Bug#964967: systemd: ExecStartPost executed even if ExecStart fails immediately

2020-07-13 Thread Michael Biebl
Am 13.07.20 um 17:49 schrieb Michael Biebl:
> Am 13.07.20 um 17:04 schrieb Drexl Johannes:
>> Package: systemd
>> Version: 241-7~deb10u4
>> Severity: normal
>>
>> Dear Maintainer,
>>
>> tests on systemd environment variables under certain conditions got me 
>> puzzled,
>> and I guess this would be considered a bug.
>>
>> A systemd service will execute all ExecStartPost statements, even if the 
>> corresponding service configured with ExecStart has bailed out with error 
>> code.
>> One can test it with a [Service] section like that:
>>
>> Type=exec
> 
> If you want this behaviour, use Type=oneshot, not Type=exec

I.e. with Type=exec, systemd will not wait until the program specified
in ExecStart= has terminated (and evaluates its exit code) before it
proceeds executing the next command.




signature.asc
Description: OpenPGP digital signature


Bug#964972: xfsm-shutdown: general protection fault for xfsm-shutdown-h

2020-07-13 Thread alain
Package: xfce4-session
Version: 4.12.1-6
Severity: normal
File: xfsm-shutdown-helper

Dear Maintainer,

While I required the hibernate state, this command does not work and 
logs are : 
traps: xfsm-shutdown-h[8091] general protection fault ip:7fd18613e9bd 
sp:7ffe359f9370 error:0 in libc-2.28.so[7fd1860dc000+148000]

Note that the swap memory was deactivated some seconds or minutes before by me.
It was perhaps the cause but it should not get a general protection fault.

-- System Information:
Debian Release: 10.4
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.7.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8), 
LANGUAGE=fr_FR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages xfce4-session depends on:
ii  libatk1.0-02.36.0-2~bpo10+1
ii  libc6  2.28-10
ii  libcairo2  1.16.0-4
ii  libdbus-1-31.12.16-1
ii  libdbus-glib-1-2   0.110-4
ii  libfontconfig1 2.13.1-2
ii  libfreetype6   2.9.1-3+deb10u1
ii  libgdk-pixbuf2.0-0 2.38.1+dfsg-1
ii  libglib2.0-0   2.58.3-2+deb10u2
ii  libgtk2.0-02.24.32-3
ii  libice62:1.0.9-2
ii  libpango-1.0-0 1.42.4-8~deb10u1
ii  libpangocairo-1.0-01.42.4-8~deb10u1
ii  libpangoft2-1.0-0  1.42.4-8~deb10u1
ii  libpolkit-gobject-1-0  0.105-25
ii  libsm6 2:1.2.3-1
ii  libwnck22  2.30.7-6
ii  libx11-6   2:1.6.7-1
ii  libxfce4ui-1-0 4.12.1-3
ii  libxfce4util7  4.12.1-3
ii  libxfconf-0-2  4.12.1-1
ii  xfce4-settings 4.12.4-1
ii  xfconf 4.12.1-1

Versions of packages xfce4-session recommends:
ii  dbus-x11   1.12.16-1
ii  libpam-systemd 245.6-1~bpo10+1
ii  light-locker   1.8.0-3
ii  systemd-sysv   245.6-1~bpo10+1
ii  upower 0.99.10-1
ii  x11-xserver-utils  7.7+8
ii  xfdesktop4 4.12.4-2
ii  xfwm4  4.12.5-1

Versions of packages xfce4-session suggests:
pn  fortunes-mod  
ii  sudo  1.8.27-1+deb10u2

-- no debconf information



Bug#890472: Status for Vulkan development tools?

2020-07-13 Thread John Zupin

Hello,

Brett is no longer with LunarG and I'll be making updates to his ITP bug 
submissions about the status of these packages.


The current status for the shaderc package is that it has been out for 
1+ years now and is hosted by LunarG.


I am LunarG's curator for these packages, please check 
https://vulkan.lunarg.com/sdk/home under the "ubuntu packages" tab for 
more information about our repository.




Bug#964967: systemd: ExecStartPost executed even if ExecStart fails immediately

2020-07-13 Thread Michael Biebl
Am 13.07.20 um 17:04 schrieb Drexl Johannes:
> Package: systemd
> Version: 241-7~deb10u4
> Severity: normal
> 
> Dear Maintainer,
> 
> tests on systemd environment variables under certain conditions got me 
> puzzled,
> and I guess this would be considered a bug.
> 
> A systemd service will execute all ExecStartPost statements, even if the 
> corresponding service configured with ExecStart has bailed out with error 
> code.
> One can test it with a [Service] section like that:
> 
> Type=exec

If you want this behaviour, use Type=oneshot, not Type=exec
See man systemd.service
>•   The exec type is similar to simple, but the service manager 
> will consider the unit started immediately after the main service binary has 
> been executed. The service manager will delay starting of follow-up units 
> until that point. (Or in other
>words: simple proceeds with further jobs right after fork() 
> returns, while exec will not proceed before both fork() and execve() in the 
> service process succeeded.) Note that this means systemctl start command 
> lines for exec services will report
>failure when the service's binary cannot be invoked 
> successfully (for example because the selected User= doesn't exist, or the 
> service binary is missing).

Afaics, everything is working as documented



signature.asc
Description: OpenPGP digital signature


Bug#964959: mpack: Non-standard headers risk mail being marked as spam

2020-07-13 Thread Sam Kemp
Package: mpack
Version: 1.6-15
Severity: normal

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Dear Maintainer,

When sending a file which does not require splitting across emails, mpack
creates the header "Mime-Version" rather than "MIME-Version" as used in RFC
2045.

Although the RFC does not specify case-sensitivity, this behaviour does cause
spam scoring for some recipients (e.g., those using rspamd) so the behaviour
should be amended. This will also make behaviour consistent within the package,
as when splitting files across emails the header "MIME-Version" is already
used.

The necessary change is at encode.c.124 -- apologies but I am not sure on what
the most helpful patch format to supply here would be.

Sam



- -- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 5.7.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8), LANGUAGE=en_GB:en 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages mpack depends on:
ii  libc6  2.30-8

mpack recommends no packages.

Versions of packages mpack suggests:
pn  inews   
ii  postfix [mail-transport-agent]  3.5.4-1

- -- no debconf information

-BEGIN PGP SIGNATURE-

iQFIBAEBCAAyFiEEpNktSs6Yz6ACYTv0nBYn1jXHAa4FAl8MR/0UHGRlYmlhbkBz
ZGtlbXAuY28udWsACgkQnBYn1jXHAa4leAf/aNZbG8McFuNLlnLh3MiTvCzSpBpA
osLDTx/DyfLFyQqNuWx8EQZqAfF4tR9oyOHcXV1OCxM7ZofsizalOrgd5ZVNUK1L
OO1Jd4oDeJp7BjjxwEtELFkAdC10elyojRMl91LurnkWE31+zkOpdF3yJyesgrWq
X6damLp4n+N661+kpJvgkLTwSrpMCMMxQ6hfHNyWzmXOjGPHEb5bCWvF7Wvyn5yX
TY9OxKekqjLTOBE/+AHBntaQohbp7tVQag1IWaRANqsiiKsSu148E4g3kHl5sUlM
cLwCCSxilGwUQkrJDVCQB6qEcrNWq1MugAM9x4Q9rKU+ZPEx5HEQF1NjsA==
=5BTS
-END PGP SIGNATURE-



Bug#964318: gosa login broken with PHP 7.4

2020-07-13 Thread Mike Gabriel

Control: forwarded -1 https://github.com/gosa-project/gosa-core/pull/33

Hi,

On  Do 09 Jul 2020 21:54:34 CEST, Wolfgang Schweer wrote:


On Mon, Jul 06, 2020 at 12:05:44PM +0200, Wolfgang Schweer wrote:

In both encrypt and decrypt cases, the chosen cipher method seems to
return 0.


This is the case because the chosen method (aes-256-ecb) doesn't use an
initialization vector ($iv) at all, causing its length ($ivlen) to be 0,
see e.g. https://usr.ed48.com/php/ssl/?xf=7

So the encrypt/decrypt implementation seems to have been sort of wrong
before (and only now with PHP 7.4 an error is thrown).

Please check and test the attached changes to
/usr/share/gosa/include/functions.inc and
/usr/sbin/gosa-encrypt-passwords; works for me, but then my skills are
low level and this is a quite sensitive issue.

Wolfgang


patch submitted upstream.

https://github.com/gosa-project/gosa-core/pull/33

Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpO_IaXRLe8T.pgp
Description: Digitale PGP-Signatur


Bug#962239: RFP: jc -- converts command output to JSON

2020-07-13 Thread Sudip Mukherjee
Control: tags -1 pending

This has now been uploaded and will appear in the NEW queue at
https://ftp-master.debian.org/new.html. ftp-masters will review it
next.
I will add the man page on the next upload (if ftp-masters accepts
this from NEW).


-- 
Regards
Sudip



Bug#964927: ibus-avro: Remove deps on ibus IM module packages

2020-07-13 Thread Gunnar Hjalmarsson

Control: tags -1 + pending

Fix pushed to repo:
https://salsa.debian.org/input-method-team/ibus-avro/-/commit/06990e57

(Don't know why salsa didn't do this automatically.)

--
Gunnar Hjalmarsson
https://launchpad.net/~gunnarhj



Bug#963706: kdenlive with ffmpeg version 7:4.3-2 can't Render Project to MP4

2020-07-13 Thread Stephen Hwang
Ah, thanks for the clarification. I misread your earlier message.

There do not appear to be any bugs currently filed against libmlt6, so I
assume the correct next
step would be to file one there?


On Sat, 11 Jul 2020 05:25:16 +0100 Rik Mills  wrote:
> On 11/07/2020 04:14, Stephen Hwang wrote:
> > I encountered bug #963706 last week, and was happy to see that it had
been addressed
> > in version 20.04.3-1 uploaded today, July 10. Unfortunately, the new
version does
> > not appear to fix the bug for me.
>
> As previously mentioned, the issue is with MLT, and it is that which
> requires a rebuild against the new ffmpeg. That is why this bug was not
> fixed via the new kdenlive upload.
>
>
>


Bug#964971: lintian: please consider new check: expired keys in debian/upstream/signing-key.asc

2020-07-13 Thread Daniel Shahaf
Package: lintian
Version: 2.83.0
Severity: wishlist
Tags: upstream

Dear Maintainer,

I noticed yesterday that the current source package of
zsh-syntax-highlighting contains a debian/upstream/signing-key.asc file
which contains an expired snapshot of upstream's signing key: the
snapshot gives the key's expiration date as 2018-06-28.¹

I then generated and built that package on a then-current sid chroot and
observed that no lintian warnings were logged about the expired key.
I invoked lintian as «lintian --display-info --display-experimental
--pedantic --color=always --no-tag-display-limit /build/*.changes
/build/*.dsc /build/*.deb».

I was wondering whether it would be a good idea for Lintian to add
a check for expired keys in debian/upstream/signing-key.asc.

Despite the name being in singular, signing-key.asc may contain multiple
keys, just like upstream tar.gz.asc files may contain multiple people's
signatures.

I am not sure what the semantics of the check should be when that file
contains multiple keys, only some of which are expired.  When upstream's
release manager (RM)'s identity changes, it can be useful to keep
carrying the outgoing RM's public key, in order to make it easier to
verify past and potential future upstream releases signed with that key.
However, someone who had stepped down from being RM might let their key
expire and not renew it until and unless they resume being the RM.

An alternative point of view is that signing-key.asc should contain only
keys that are currently in use, and older keys should be removed
(they'll still be available in archived sourced packages).  Under this
point of view, there might be room for an additional check that the keys
in signing-key.asc are indeed those keys used to sign the upstream
tarball.

Cheers,

Daniel

¹ In this particular case, upstream's key is my key, and that key has
been regularly extended (to 2020-07-01 and to 2021-12-31).  After
extending the key I re-pushed it to keyservers, but did not regenerate
the d/u/signing-key.asc export.  (I'd like to automate that regeneration,
since my key appears in multiple packages' signing-key.asc files, but
that's a question for another thread.)


Bug#964970: RFP: dotpagemod -- Firefox add-on to load local CSS and JavaScript from your dotfiles into websites

2020-07-13 Thread Jakub Wilk

Package: wnpp
Severity: wishlist

* Package name: dotpagemod
  Version : 0.4.1
  Upstream Author : David Kalnischkies 
* URL : https://github.com/DonKult/dotPageMod
* License : Expat
  Programming Lang: JavaScript

--
Jakub Wilk



Bug#964969: RFP: open-in-browser -- Firefox add-on to open files directly in the browser

2020-07-13 Thread Jakub Wilk

Package: wnpp
Severity: wishlist

* Package name: open-in-browser
  Version : 2.11
  Upstream Author : Rob Wu 
* URL : https://github.com/Rob--W/open-in-browser
* License : MPL-2.0
  Programming Lang: JavaScript

Firefox extension that offers the ability to open files directly in the 
browser instead of downloading them. You can also change the MIME-type 
if you wish, and choose to remember the preferred action per file-type.


--
Jakub Wilk



Bug#964968: RFP: webext-urls-list -- Firefox add-on to list URLs

2020-07-13 Thread Jakub Wilk

Package: wnpp
Severity: wishlist

* Package name: webext-urls-list
  Version : 0.5.0
  Upstream Author : Moritz H 
* URL : https://github.com/moritz-h/urls-list
* License : Expat
  Programming Lang: JavaScript

Firefox extension to list the URLs of all tabs from the current window 
as copyable plain text.


This extension can also load a plain text list of URLs to individual 
tabs.


--
Jakub Wilk



Bug#964967: systemd: ExecStartPost executed even if ExecStart fails immediately

2020-07-13 Thread Drexl Johannes
Package: systemd
Version: 241-7~deb10u4
Severity: normal

Dear Maintainer,

tests on systemd environment variables under certain conditions got me puzzled,
and I guess this would be considered a bug.

A systemd service will execute all ExecStartPost statements, even if the 
corresponding service configured with ExecStart has bailed out with error code.
One can test it with a [Service] section like that:

Type=exec
User=debian
Group=debian
# Test
ExecStartPre=/bin/true
ExecStart=/bin/false
ExecStartPost=/bin/echo "StartPost Beginn"
ExecStartPost=/bin/sleep 5
ExecStartPost=/bin/printenv
ExecStartPost=/bin/true
ExecStop=/bin/echo "Stop Beginn"
ExecStop=/bin/printenv
ExecStop=/bin/true
ExecStopPost=/bin/echo "StopPost Beginn"
ExecStopPost=/bin/printenv

This will result in a situation captured in journal:

Jul 13 16:57:29 primus systemd[1]: test.service: Main process exited, code=exite
-- Subject: Unit process exited
-- Defined-By: systemd
-- Support: https://www.debian.org/support
--
-- An ExecStart= process belonging to unit test.service has exited.
--
-- The process' exit code is 'exited' and its exit status is 1.
Jul 13 16:57:29 primus echo[24742]: StartPost Beginn
Jul 13 16:57:34 primus printenv[24744]: LANG=en_US.UTF-8
Jul 13 16:57:34 primus printenv[24744]: PATH=/usr/local/sbin:/usr/local/bin:/usr
Jul 13 16:57:34 primus printenv[24744]: HOME=/home/debian
Jul 13 16:57:34 primus printenv[24744]: LOGNAME=debian
Jul 13 16:57:34 primus printenv[24744]: USER=debian
Jul 13 16:57:34 primus printenv[24744]: SHELL=/bin/bash
Jul 13 16:57:34 primus printenv[24744]: INVOCATION_ID=e9c25c8c677743b19cf95abe7c
Jul 13 16:57:34 primus printenv[24744]: JOURNAL_STREAM=9:2458318
Jul 13 16:57:34 primus echo[24746]: StopPost Beginn

As is clearly visible, Systemd knows the main process bailed out prior
to Systemd beginning to execute even the first ExecStartPost statement.

Although I might miss out some really important thoughts on why it was
decided as such, I find it a little confusing, because all ExecStop
statements are skipped as can be read in the documentation.


-- Package-specific info:

-- System Information:
Debian Release: 10.4
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-9-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_WARN
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages systemd depends on:
ii  adduser  3.118
ii  libacl1  2.2.53-4
ii  libapparmor1 2.13.2-10
ii  libaudit11:2.8.4-3
ii  libblkid12.33.1-0.1
ii  libc62.28-10
ii  libcap2  1:2.25-2
ii  libcryptsetup12  2:2.1.0-5+deb10u2
ii  libgcrypt20  1.8.4-5
ii  libgnutls30  3.6.7-4+deb10u4
ii  libgpg-error01.35-1
ii  libidn11 1.33-2.2
ii  libip4tc01.8.2-4
ii  libkmod2 26-1
ii  liblz4-1 1.8.3-1
ii  liblzma5 5.2.4-1
ii  libmount12.33.1-0.1
ii  libpam0g 1.3.1-5
ii  libseccomp2  2.3.3-4
ii  libselinux1  2.8-1+b1
ii  libsystemd0  241-7~deb10u4
ii  mount2.33.1-0.1
ii  util-linux   2.33.1-0.1

Versions of packages systemd recommends:
ii  dbus1.12.16-1
ii  libpam-systemd  241-7~deb10u4

Versions of packages systemd suggests:
ii  policykit-10.105-25
pn  systemd-container  

Versions of packages systemd is related to:
pn  dracut   
ii  initramfs-tools  0.133+deb10u1
ii  udev 241-7~deb10u4

-- Configuration Files:
/etc/systemd/timesyncd.conf changed [not included]

-- no debconf information



Bug#964950: nginx: CVE-2020-11724

2020-07-13 Thread Sylvain Beucler
In case this helps, here's some documentation to test the issue with the
new upstream test cases:
https://wiki.debian.org/LTS/TestSuites/nginx

and my planned stretch package:
https://www.beuc.net/tmp/debian-lts/nginx/

Cheers!
Sylvain Beucler
Debian LTS Team

diff -Nru nginx-1.10.3/debian/changelog nginx-1.10.3/debian/changelog
--- nginx-1.10.3/debian/changelog   2020-01-11 08:28:05.0 +0100
+++ nginx-1.10.3/debian/changelog   2020-07-13 11:40:49.0 +0200
@@ -1,3 +1,11 @@
+nginx (1.10.3-1+deb9u5) stretch-security; urgency=high
+
+  * Non-maintainer upload by the LTS Security Team.
+  * CVE-2020-11724: ngx_http_lua_subrequest.c allows HTTP request
+smuggling, as demonstrated by the ngx.location.capture API.
+
+ -- Sylvain Beucler   Mon, 13 Jul 2020 11:40:49 +0200
+
 nginx (1.10.3-1+deb9u4) stretch; urgency=medium
 
   * Handle CVE-2019-20372, error page request smuggling
diff -Nru nginx-1.10.3/debian/modules/patches/nginx-lua/CVE-2020-11724.patch 
nginx-1.10.3/debian/modules/patches/nginx-lua/CVE-2020-11724.patch
--- nginx-1.10.3/debian/modules/patches/nginx-lua/CVE-2020-11724.patch  
1970-01-01 01:00:00.0 +0100
+++ nginx-1.10.3/debian/modules/patches/nginx-lua/CVE-2020-11724.patch  
2020-07-13 11:40:49.0 +0200
@@ -0,0 +1,863 @@
+Origin: 
https://github.com/openresty/openresty/commit/4e8b4c395f842a078e429c80dd063b232357
+Origin: 
https://github.com/openresty/lua-nginx-module/commit/9ab38e8ee35fc08a57636b1b6190dca70b0076fa
+Last-Update: 2020-07-13
+Reviewed-by: Sylvain Beucler 
+
+commit 96c330c3cb2a5abc95d293854801c7ba2896d1da
+Author: Thibault Charbonnier 
+Date:   Mon Mar 23 19:40:47 2020 -0700
+
+bugfix: prevented request smuggling in the ngx.location.capture API.
+
+From 9ab38e8ee35fc08a57636b1b6190dca70b0076fa Mon Sep 17 00:00:00 2001
+From: Thibault Charbonnier 
+Date: Mon, 23 Mar 2020 19:40:47 -0700
+Subject: [PATCH] bugfix: prevented request smuggling in the
+ ngx.location.capture API.
+
+Signed-off-by: Yichun Zhang (agentzh) 
+(tests)
+
+Index: nginx-lua/src/ngx_http_lua_subrequest.c
+===
+--- nginx-lua.orig/src/ngx_http_lua_subrequest.c
 nginx-lua/src/ngx_http_lua_subrequest.c
+@@ -56,8 +56,6 @@ static ngx_str_t  ngx_http_lua_content_l
+ ngx_string("Content-Length");
+ 
+ 
+-static ngx_int_t ngx_http_lua_set_content_length_header(ngx_http_request_t *r,
+-off_t len);
+ static ngx_int_t ngx_http_lua_adjust_subrequest(ngx_http_request_t *sr,
+ ngx_uint_t method, int forward_body,
+ ngx_http_request_body_t *body, unsigned vars_action,
+@@ -78,7 +76,7 @@ static void ngx_http_lua_cancel_subreq(n
+ static ngx_int_t ngx_http_post_request_to_head(ngx_http_request_t *r);
+ static ngx_int_t ngx_http_lua_copy_in_file_request_body(ngx_http_request_t 
*r);
+ static ngx_int_t ngx_http_lua_copy_request_headers(ngx_http_request_t *sr,
+-ngx_http_request_t *r);
++ngx_http_request_t *pr, ngx_uint_t prcl);
+ 
+ 
+ /* ngx.location.capture is just a thin wrapper around
+@@ -622,8 +620,8 @@ ngx_http_lua_adjust_subrequest(ngx_http_
+ unsigned vars_action, ngx_array_t *extra_vars)
+ {
+ ngx_http_request_t  *r;
+-ngx_int_trc;
+ ngx_http_core_main_conf_t   *cmcf;
++ngx_uint_t   prcl = 0;
+ size_t   size;
+ 
+ r = sr->parent;
+@@ -633,46 +631,32 @@ ngx_http_lua_adjust_subrequest(ngx_http_
+ if (body) {
+ sr->request_body = body;
+ 
+-rc = ngx_http_lua_set_content_length_header(sr,
+-body->buf
+-? ngx_buf_size(body->buf)
+-: 0);
+-
+-if (rc != NGX_OK) {
+-return NGX_ERROR;
+-}
+-
+ } else if (!always_forward_body
+&& method != NGX_HTTP_PUT
+&& method != NGX_HTTP_POST
+&& r->headers_in.content_length_n > 0)
+ {
+-rc = ngx_http_lua_set_content_length_header(sr, 0);
+-if (rc != NGX_OK) {
+-return NGX_ERROR;
+-}
+-
+-#if 1
+ sr->request_body = NULL;
+-#endif
+ 
+ } else {
+-if (ngx_http_lua_copy_request_headers(sr, r) != NGX_OK) {
+-return NGX_ERROR;
++if (!r->headers_in.chunked) {
++prcl = 1;
+ }
+ 
+-if (sr->request_body) {
++if (sr->request_body && sr->request_body->temp_file) {
+ 
+ /* deep-copy the request body */
+ 
+-if (sr->request_body->temp_file) {
+-if (ngx_http_lua_copy_in_file_request_body(sr) != NGX_OK) {
+-return NGX_ERROR;
+-}
++if (ngx_http_lua_copy_in_file_request_body(sr) != NGX_OK) {
++return NGX_ERROR;
+ }
+ }
+ }
+ 
++if (ngx_http_lua_copy_request_headers(sr, r, prcl) != NGX_OK) {

Bug#964966: RFP: dont-track-me-google -- browser extension to prevent Google from making links ugly

2020-07-13 Thread Jakub Wilk

Package: wnpp
Severity: wishlist

* Package name: dont-track-me-google
  Version : 4.22
  Upstream Author : Rob Wu 
* URL : https://github.com/Rob--W/dont-track-me-google
* License : Expat
  Programming Lang: JavaScript

At the Google Search engine, search results are converted to an ugly 
link upon click. This link enables tracking for Google.


For example, the search entry

   http://www.google.com/ (when searching for "Google") will be replaced with:
   
https://encrypted.google.com/url?sa=t=j=Google=web=8=2=0CFgQFjAH=http%3A%2F%2Fwww.google.com%2F=Ej__TrCkJo2bOrSs2aIE=AFQjCNG5-9Jej-ukVeakTgwonqt2narbYg=f9f1dWcZoj6ZUC2Zxy9y2g

This script removes Google's link-conversion/tracking feature. This 
speeds up loading search results and allows you to right-click or tap to 
copy the link URL.


--
Jakub Wilk



Bug#964965: cron job should not call a potentially undefined shell function

2020-07-13 Thread Marc Haber
Package: aide
Version: 0.16.2-0.1~zg100+1
Severity: minor

Hi,

when the cron job fails early, we already have the trap handler
established but onexit is not yet defined. This should be checked in the
trap handler, so that we don't produce a double fault when an error
happening (such as update-aide.conf failing) and calling the undefined
function onexit in the handler.

Greetings
Marc

-- System Information:
Debian Release: 10.4
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.7.7-zgsrv20080 (SMP w/4 CPU cores; PREEMPT)
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8), LANGUAGE=en 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

aide depends on no packages.

Versions of packages aide recommends:
ii  aide-common  0.16.2-0.1~zg100+1

Versions of packages aide suggests:
ii  figlet  2.2.5-3

-- no debconf information



Bug#529962: mpack doesn't allow to specify a sender address

2020-07-13 Thread Sam Kemp
Package: mpack
Version: 1.6-15
Followup-For: Bug #529962

Dear Maintainer,

I believe that this bug (529962) is a duplicate of 211657 and should be merged
into the latter.

Thanks

Sam



-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 5.7.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8), LANGUAGE=en_GB:en 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages mpack depends on:
ii  libc6  2.30-8

mpack recommends no packages.

Versions of packages mpack suggests:
pn  inews   
ii  postfix [mail-transport-agent]  3.5.4-1

-- no debconf information



Bug#964964: ruby-codemirror-rails: ftbfs with rails 6 in experimental and unmainatained.

2020-07-13 Thread Pirate Praveen

Package: ruby-codemirror-rails
Version: 5.16.0-1
Severity: important
Control: forwarded -1 
https://github.com/fixlr/codemirror-rails/issues/61


User: pkg-ruby-extras-maintain...@lists.alioth.debian.org
Usertags: rails6-transition

Hi,

This package's autopkgtest failed with rails 6 currently in
experimental. rails 6 will be uploaded to unstable in 2 weeks, so
please make sure this package is ready for rails 6. The severity of
this bug will be raised to serious after rails 6 is uploaded to
unstable.

Relevant error

GEM_PATH= ruby2.7 -e gem\ \"codemirror-rails\"
/usr/lib/ruby/2.7.0/rubygems/dependency.rb:313:in `to_specs': Could not 
find 'railties' (< 6.0, >= 3.0) - did find: [railties-6.0.3.1] 
(Gem::MissingSpecVersionError)
Checked in 
'GEM_PATH=/home/debci/.gem/ruby/2.7.0:/var/lib/gems/2.7.0:/usr/lib/ruby/gems/2.7.0:/usr/share/rubygems-integration/2.7.0:/usr/share/rubygems-integration/all:/usr/lib/x86_64-linux-gnu/rubygems-integration/2.7.0', 
execute `gem env` for more information
from /usr/lib/ruby/2.7.0/rubygems/specification.rb:1402:in `block in 
activate_dependencies'

from /usr/lib/ruby/2.7.0/rubygems/specification.rb:1391:in `each'
from /usr/lib/ruby/2.7.0/rubygems/specification.rb:1391:in 
`activate_dependencies'

from /usr/lib/ruby/2.7.0/rubygems/specification.rb:1373:in `activate'
from /usr/lib/ruby/2.7.0/rubygems/core_ext/kernel_gem.rb:68:in `block 
in gem'
from /usr/lib/ruby/2.7.0/rubygems/core_ext/kernel_gem.rb:68:in 
`synchronize'

from /usr/lib/ruby/2.7.0/rubygems/core_ext/kernel_gem.rb:68:in `gem'
from -e:1:in `'

But it seems to be unmaintained upstream 
https://github.com/fixlr/codemirror-rails/issues/61 so it is better to 
remove this package and use libjs-codemirror directly. Another option 
may be rails-assets.org, but that service seems unmaintained as well.


Full error log 
https://people.debian.org/~praveen/rails6-meta-build/autopkgtest/ruby-codemirror-rails.log




  1   2   >