Bug#1058083: Before I try to tackle this bug - can we move the package to DPT

2023-12-24 Thread Andreas Tille
Hi Agustin and Ulises,

I noticed there were several NMUs not commited to the Git repository of
this package.  I'd volunteer to bring the repository in sync with latest
uploads and move it to Debian Python Team before I try to tacke bug
#1058083.

Kind regards
Andreas.

-- 
http://fam-tille.de



Bug#1052838: [debian-mysql] Bug#1052838: mariadb: FTBFS: make[1]: *** [debian/rules:161: override_dh_auto_test] Error 1

2023-12-24 Thread Paul Gevers

Hi,

On Thu, 26 Oct 2023 10:59:50 +0200 Lucas Nussbaum  wrote:

Hi,

On 02/10/23 at 21:59 -0700, Otto Kekäläinen wrote:
> Hi!
> 
> The relevant lines from log seems to be:
> 
> > main.bind_address_resolution w4 [ fail ]

> ...
> > 2023-09-26  6:31:03 0 [ERROR] Can't start server: Bind on TCP/IP port. Got 
error: 98: Address already in use
> > 2023-09-26  6:31:03 0 [ERROR] Do you already have another server running on 
port: 16020 ?
> > 2023-09-26  6:31:03 0 [ERROR] Aborting
> 
> What might have been holding port 16020 during the test run?


I could reproduce the issue again, and I was not running anything else
on the node.


The ci.debian.net results for mariadb seem to be very flaky lately (on 
amd64 they fail roughly 9/10) since version 1:10.11.6-1. Might be 
related (although the failure is different). i386 and arm64 seem to be 
exceptions.


https://ci.debian.net/packages/m/mariadb/testing/amd64/

Paul


OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1055192: RFS: golang-github-apenella-go-ansible

2023-12-24 Thread Nilesh Patra
On Sun, Dec 24, 2023 at 01:41:39PM +0530, Ananthu C V wrote:
> It looks that this has been a clear oversight from my side. *I do find this a 
> very useful library*
> but as you mentioned, since go team convention does not include packaging 
> libaries that are not
> needed by any binaries, there is probably no real value in getting this in.

It is not a go-team convention as such. In principle library packages can be 
packaged as well. However
there is no utility in doing so. At the end of the day, a user only wants the 
necessary tools.

The situation is quite different from python or javascript (where you work). In 
those teams, once you
install python lib or a js lib, you can use it for your development w/o any 
extra hurdles. All imports/functionalities
would work just fine. However, in go packages, you need to change the 
GOPATH/GOROOT to actually import and
use those packages. This makes close to no sense for anyone to do, and simply 
using a go get is the most simple way.

Adding in lib packages that effectively won't be used also calls for extra 
maintenance burden on the team so
at least I find it sensible to add lib packages only when there's a use for 
them.

> As such, please prune the corresponding repositories for the following:
> - golang-github-apenella-go-ansible
> - golang-github-apenella-go-common-utils
> - golang-github-sosedoff-ansible-vault-go

Pruned!

> I feel sincerely sorry that an oversight from my side has ended up taking 
> some of your busy schedule
> and I apologize for making you spend your time needlessly. I'll try my best 
> to make sure such mishapas
> does not occur in the future, since it is not beneficial to anyone. And 
> regardless of the outcome of
> this, thanks a lot for taking a look at the RFS.

Don't worry about it, thanks for working on these regardless!

Best,
Nilesh


signature.asc
Description: PGP signature


Bug#1059421: Say " (which is also called dhclient)"

2023-12-24 Thread Dan Jacobson
Package: isc-dhcp-client
Version: 4.4.3-P1-4
Severity: minor
File: /usr/share/doc/isc-dhcp-client/NEWS.Debian.gz

We read
> isc-dhcp-client (4.4.3-1) unstable; urgency=medium
>
>   ISC has decided to stop maintaining the client and relay parts of isc-dhcp,
>   and they will be removed after the 4.4.3 release, keeping only the server
>   component. Please, consider using an alternative for isc-dhcp-client
>   (dhclient).

Say instead:
>   ... component. Please, consider using an alternative for isc-dhcp-client
>   (which is also called dhclient).

Otherwise we think the alternative we want is called dhclient.



Bug#1059418: nemo stops attempting to mount SMB servers or shares if an incorrect password is "remembered"

2023-12-24 Thread Eric Park
Package: nemo
Version: 5.6.4-1
Severity: important
X-Debbugs-Cc: debian-b...@ericswpark.com

Dear Maintainer,

nemo (or some underlying system that nemo uses) has a bug where SMB
share/server
mounting will lock up, if an incorrect password was entered previously and the
password was set to be remembered (for a session or forever).

It is possible that the password remember option is not necessary to lock up
nemo,
however I have not tested this.

During this "lock up" state, nemo will appear to be mounting the server/share,
with
the dialog "Opening  (File Sharing)" and the message "You can stop
this
operation by clicking cancel". However, this dialog will never go away and the
server
or share will never mount.

Steps to reproduce:
1. Click on a server/share entry in the "Network" tab
2. Input incorrect credentials
3. Click on one of the remember credentials options (although this may not be
   necessary for bug repro)
4. Retry connecting to the server/share again

In this bugged state, the incorrect credentials cannot be removed from memory,
as it does not show up under seahorse. I am assuming that the previous
operation
with the incorrect credentials did not succeed, so it didn't save to the
keystore
yet, but nemo is still waiting on that previous operation to finish, creating
some
sort of deadlock.


Eric


-- System Information:
Debian Release: 12.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-16-amd64 (SMP w/2 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages nemo depends on:
ii  cinnamon-desktop-data  5.6.1-1
ii  desktop-file-utils 0.26-1
ii  gsettings-desktop-schemas  43.0-1
ii  gvfs   1.50.3-1
ii  libatk1.0-02.46.0-5
ii  libc6  2.36-9+deb12u3
ii  libcairo-gobject2  1.16.0-7
ii  libcairo2  1.16.0-7
ii  libcinnamon-desktop4   5.6.1-1
ii  libexempi8 2.6.3-1
ii  libexif12  0.6.24-1+b1
ii  libgail-3-03.24.38-2~deb12u1
ii  libgdk-pixbuf-2.0-02.42.10+dfsg-1+b1
ii  libglib2.0-0   2.74.6-2
ii  libglib2.0-data2.74.6-2
ii  libgsf-1-114   1.14.50-1
ii  libgtk-3-0 3.24.38-2~deb12u1
ii  libnemo-extension1 5.6.4-1
ii  libpango-1.0-0 1.50.12+ds-1
ii  libpangocairo-1.0-01.50.12+ds-1
ii  libselinux13.4-1+b6
ii  libx11-6   2:1.8.4-2+deb12u2
ii  libxapp1   2.4.2-3
ii  libxml22.9.14+dfsg-1.3~deb12u1
ii  nemo-data  5.6.4-1
ii  shared-mime-info   2.2-1

Versions of packages nemo recommends:
ii  catdoc  1:0.95-5
ii  cinnamon-l10n   5.6.1-2
ii  exif0.6.22-3
ii  gnome-disk-utility  43.0-1
ii  gvfs-backends   1.50.3-1
ii  gvfs-fuse   1.50.3-1
ii  html2text   1.3.2a-28
ii  id3 1.1.2-3
ii  librsvg2-common 2.54.7+dfsg-1~deb12u1
ii  nemo-fileroller 5.6.1-1
ii  odt2txt 0.5-7
ii  poppler-utils   22.12.0-2+b1
ii  python3 3.11.2-1+b1
ii  python3-xlrd1.2.0-3
ii  untex   1:1.2-7

Versions of packages nemo suggests:
ii  eog  43.2-1
ii  evince [pdf-viewer]  43.1-2+b1
ii  totem43.0-2
ii  xdg-user-dirs0.18-1

-- no debconf information



Bug#1058932: RFP: forgejo -- a self-hosted lightweight software forge

2023-12-24 Thread Maytham Alsudany
Hi,

On Mon, 18 Dec 2023 14:24:35 + Wim Bertels  wrote:
> It would be nice to have it in Debian,
> as apart from Redmine there no "easy" to setup project management
> software available.

There's already an RFP for gitea (#935834), which forgejo is based on. 

> Some work has already been done?
> https://codeberg.org/forgejo-contrib/forgejo-deb

Unfortunately, their work isn't compliant with Debian Policy at all.

I'll look into the missing dependencies needed for packaging this.

Kind regards,
Maytham


signature.asc
Description: This is a digitally signed message part


Bug#1059350: debian-keyring: missing update since 2023.09.24

2023-12-24 Thread Kentaro HAYASHI
On Sat, 23 Dec 2023 07:23:12 + Jonathan McDowell 
wrote:
> The debian-keyring package is a convenience package and we only make
> efforts to ensure it is up to date around release time. The actual
> keyring used by the Debian infrastructure is served via rsync and
> matches the version that is currently available via salsa. For further
> details on the workflow you might find
> https://keyring.debian.org/keyring-workflow.html useful.
> 
> J.

I hadn't understood the actual workflow.
It's useful information.

Thanks! 



Bug#1043131: Solution for kernel 6.5 with openafs 1.8.10-1 in debian

2023-12-24 Thread Benjamin Kaduk
Hi Gergely,

On Wed, Dec 20, 2023 at 04:26:55PM +0100, Gergely Riskó wrote:
> Hey all,
> 
> Yes, OpenAFS is always a pain to work with both on the server and the
> client side. :(
> 
> This time I think the client installation is harder than usual, we
> have to apply 5 patches.

Yes, there's a lot this time.
Thanks for putting together your stack -- I would have missed DirEntryFlex in
my first pass and thus panic'd my machine during testing.

-Ben



Bug#1019751: openafs-client: Instructions to setup a new cell is out of date on Debian 9 and possibly on newer versions

2023-12-24 Thread Benjamin Kaduk
On Wed, Sep 14, 2022 at 05:36:00PM +0100, Jose M Calhariz wrote:
> Hi
> 
> I am creating a new OpenAFS cell for testing purposes and found the
> the file README.server.gz with some instructions a bit out of date.
> This makes the new cell setup dificult to a inexperienced OpenAFS 
> sysadmin.
> 
> As I found a similar problem with OpenAFS in Debian 11.  I think this 
> bug is still relevant.

Yes, it is still relevant, thank you for reporting it.

> To setup the new cell I used this commands:
> 
> On krb server:
> 
> kadmin.local
> addprinc -randkey -e aes256-cts-hmac-sha1-96 afs
> ktadd -k /root/rxkad.keytab afs
> getprinc afs
> quit
> 
> On afs server:
> 
> mv rxkad.keytab /etc/openafs/server/rxkad.keytab
> touch /etc/openafs/server/KeyFile
> 
> 
> The touch KeyFile is to workaround a small bug in afs-newcell command,
> that still search for a old KeyFile with DES material.

I'm preparing an upload that attempts to update the documentation to use
afs/cell.name and the Kerberos interactions for rxkad-k5.
The documentation will include using `akeyconvert` (or `asetkey`) after
creating /etc/openafs/server/rxkad.keytab -- the postinst currently runs
akeyconvert but I had intended that to only be an aid for the rxkad-k5
transition rather than a permanent feature.

-Ben



Bug#1059417: ed: install (r)ed into /usr/bin

2023-12-24 Thread Ian Jackson
Chris Hofstaedtler writes ("Bug#1059417: ed: install (r)ed into /usr/bin"):
> Your package installs ed and red into /bin. For the ongoing Debian
> UsrMerge effort [1] these should move to /usr/bin in the trixie
> cycle.

Hi.  FTR, I am not the maintainer.

> I'm attaching a trivial patch to implement such a move.
> As explained in debian/changelog, the update-alternatives calls are
> intentionally kept unchanged, to preserve existing user
> configuration.

I assume that you are following a plan developed by Helmut et al, as
part of the overall Debian usrmerge mitigation plan.

I don't think I agree with this change, as provided, because it will
cause ed to move to /usr/bin on downstreams that don't do usrmerge.
And then, without changing the diversion, the package is actually
broken.

I think there could be an affordance in dh_auto_configure that allows
this all to work properly.

I assume there is some reason why we aren't, in Debian, changing
dh_auto_configure to interpret --bindir=/bin as --bindir=/usr/bin.

> If during the trixie cycle your package will undergo structural
> changes or any other file moves, please also see the wiki and upload
> to experimental first when these changes are done.

I don't believe this is planned, but, once again, I am not the
maintainer.

Thanks,
Ian.

-- 
Ian JacksonThese opinions are my own.  

Pronouns: they/he.  If I emailed you from @fyvzl.net or @evade.org.uk,
that is a private address which bypasses my fierce spamfilter.



Bug#1059296: hamster-time-tracker: CVE-2023-36250

2023-12-24 Thread Matthijs Kooijman
forwarded 1059296 https://github.com/projecthamster/hamster/issues/750
thanks

Hi Moritz,

Thanks for bringing this to attention, this was not reported upstream
yet.

> https://github.com/BrunoTeixeira1996/CVE-2023-36250/blob/main/README.md
> sounds a little bogus, I don't see how this crosses any security boundary?

AFAICS it does not cross any boundary, but if it allows arbitrary
commands to be executed when just importing a CSV file, that would still
be unexpected and a security issue.

I haven't looked at the code yet, but hope to do so in the common days.
Let's keep further discussion about this upstream for now.

Gr.

Matthijs


signature.asc
Description: PGP signature


Bug#1058451: ntpsec: FTBFS [Hurd] change Build-Depends: systemd to [linux-any]

2023-12-24 Thread Richard Laager

On 2023-12-12 04:52, Martin-Éric Racine wrote:

Build-Depends: systemd must be changed to systemd [linux-any], since systemd 
has not been powerted to non-Linux platforms.


I suspect that change would be necessary, but not sufficient.

In commit 7f969a0ecab4ef3ab50defd4fe9d7e7a47817dbe, I wrote:
  Build-Depend on systemd

  This is required for the pkg-config file, so that waf will detect
  systemd and install the systemd units.

If past me was correct, without systemd at build-time, waf will not 
install the systemd units. Then we will end up with other failures in 
debian/rules or from the .install files.


HURD is the only non-Linux platform that Debian supports these days, 
right? kFreeBSD is gone, IIRC.


The ntpsec package (like ntp before it, IIRC) does not build on HURD 
anyway. From debian/rules:


ifeq (hurd, $(DEB_HOST_ARCH_OS))
# hurd does not provided the system calls needed for ntpd to work.
exit 1
endif

I see a couple of ways forward here:

A) I properly indicate this package does not support HURD.

   I think I would just replace the "Architecture: any" with
   "Architecture: linux-any" on binary packages in debian/control, but
   I would love confirmation on that.

B) Someone who cares about HURD figures out how much of this package can
   reasonably be expected to work and submits a patch.

--
Richard


OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1057228: dolphin-emu: Installs file into /lib/udev/rules.d

2023-12-24 Thread Chris Hofstaedtler
Control: tags -1 + patch

On Fri, Dec 01, 2023 at 10:48:23PM +0100, Chris Hofstaedtler wrote:
> For the ongoing UsrMerge effort [1], /lib needs to become "empty", IOW no
> package should install a file there. Instead, files should be installed
> into /usr/lib.

Here is a trivial patch.

Chris

diff -Nru dolphin-emu-5.0-19870+dfsg/debian/changelog dolphin-emu-5.0-19870+dfsg/debian/changelog
--- dolphin-emu-5.0-19870+dfsg/debian/changelog	2023-09-06 19:42:46.0 +0200
+++ dolphin-emu-5.0-19870+dfsg/debian/changelog	2023-12-24 22:40:43.0 +0100
@@ -1,3 +1,10 @@
+dolphin-emu (5.0-19870+dfsg-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Install udev rules file into /usr/lib. (Closes: #1057228)
+
+ -- Chris Hofstaedtler   Sun, 24 Dec 2023 22:40:43 +0100
+
 dolphin-emu (5.0-19870+dfsg-1) unstable; urgency=medium
 
   * New upstream beta release.
diff -Nru dolphin-emu-5.0-19870+dfsg/debian/dolphin-emu.install dolphin-emu-5.0-19870+dfsg/debian/dolphin-emu.install
--- dolphin-emu-5.0-19870+dfsg/debian/dolphin-emu.install	2023-09-06 14:13:20.0 +0200
+++ dolphin-emu-5.0-19870+dfsg/debian/dolphin-emu.install	2023-12-24 22:40:39.0 +0100
@@ -1,4 +1,4 @@
-Data/51-usb-device.rules /lib/udev/rules.d
+Data/51-usb-device.rules /usr/lib/udev/rules.d
 usr/games/dolphin-emu
 usr/games/dolphin-emu-nogui
 usr/games/dolphin-tool


Bug#1058511: ntpsec: FTBFS: mv: cannot stat 'debian/tmp/lib/systemd/system/ntpd.service': No such file or directory

2023-12-24 Thread Richard Laager

Control: fixed 1.2.2+dfsg1-3

This looks to be the same as #1052664.

--
Richard



OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1059076: duplicity: --version returns $version, instead of an actual version

2023-12-24 Thread Eli Schwartz
On Thu, 21 Dec 2023 08:18:38 +1000 Alexander Zangerl 
wrote:
> On Wed, 20 Dec 2023 15:57:54 -0600, Kenneth Loafman writes:
> >Duplicity has been this way for a long time.  Where do you get your sources
> >from?
> 
> launchpad, as long as duplicity lived there.
> not duplicity.gitlab.io, as that send you nowhere.
> gitlab, since.
> 
> anyway, code modified, case closed.


I find this logic hard to accept. If you are actually using gitlab, then
surely you should see the clear statement of intent on gitlab: upstream
uses sourceforge as a source tarball hosting site and clearly expects
this to be used.

The sourceforge tarball contains a replaced $version.


-- 
Eli Schwartz



Bug#1059417: ed: install (r)ed into /usr/bin

2023-12-24 Thread Chris Hofstaedtler
Source: ed
Version: 1.19-1
Severity: normal
Tags: patch
User: helm...@debian.org
Usertags: dep17m2

Hi!

Your package installs ed and red into /bin. For the ongoing Debian
UsrMerge effort [1] these should move to /usr/bin in the trixie
cycle.

I'm attaching a trivial patch to implement such a move.
As explained in debian/changelog, the update-alternatives calls are
intentionally kept unchanged, to preserve existing user
configuration.

However, please still read the wiki page on moving files, especially
if you intend to backport to bookworm or earlier. The patch has
already been checked by a local dumat copy.

If during the trixie cycle your package will undergo structural
changes or any other file moves, please also see the wiki and upload
to experimental first when these changes are done.

Chris

[1] https://wiki.debian.org/UsrMerge
diff -Nru ed-1.19/debian/changelog ed-1.19/debian/changelog
--- ed-1.19/debian/changelog	2023-01-16 08:11:57.0 +0100
+++ ed-1.19/debian/changelog	2023-12-24 22:45:06.0 +0100
@@ -1,3 +1,12 @@
+ed (1.19-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Install ed, red into /usr/bin. (Closes: #-1)
+Keep update-alternatives calls unchanged, to preserve existing
+user configuration.
+
+ -- Chris Hofstaedtler   Sun, 24 Dec 2023 22:45:06 +0100
+
 ed (1.19-1) unstable; urgency=medium
 
   * New upstream version 1.19
diff -Nru ed-1.19/debian/rules ed-1.19/debian/rules
--- ed-1.19/debian/rules	2023-01-16 08:11:57.0 +0100
+++ ed-1.19/debian/rules	2023-12-24 22:44:57.0 +0100
@@ -13,5 +13,5 @@
 
 .PHONY: override_dh_auto_configure
 override_dh_auto_configure:
-	dh_auto_configure -- --bindir=/bin $(CROSS) \
+	dh_auto_configure -- $(CROSS) \
 	  $(foreach v,CPPFLAGS CFLAGS LDFLAGS,'$(v)=$($(v))')


Bug#1058961: ntpsec: postinst should check for user:group before adding them

2023-12-24 Thread Bob Proulx
Richard Laager wrote:
> Bob Proulx wrote:
> >  if ! getent passwd ntpsec > /dev/null; then
> > addgroup --system --quiet ntpsec
> >  fi
> >  if ! getent group ntpsec > /dev/null; then
> > adduser --system --quiet --ingroup ntpsec \
> > --no-create-home --home /nonexistent ntpsec
> >  fi
>
> Those getent checks have passwd & group swapped,

Oop!  Drat!  I hate it when I do that!  And of course it works by
accident if one either has neither or both.  My bad!

> but otherwise, yes, that's what we want. I'll upload a fix
> shortly. Thanks!

Awesome! :-)
Bob



Bug#1056467: python-djangosaml2's autopkg tests fail with Python 3.12

2023-12-24 Thread s3v
Dear Maintainer,

This issue was fixed in the new upload of python3-xmlschema and autopkg tests
pass now.

Please see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1058194

Kind Regards



Bug#1059416: osspd: install files into /usr (instead of /)

2023-12-24 Thread Chris Hofstaedtler
Source: osspd
Version: 1.3.2-13.1
Severity: normal
Tags: patch
User: helm...@debian.org
Usertags: dep17m2

Hi!

Your package installs files into /lib/{udev,modules-load.d}.
For the ongoing Debian UsrMerge effort [1] these files should move
to /usr in the trixie cycle.

I'm attaching a patch to implement such a move.

However, please still read the wiki page on moving files, especially
if you intend to backport to bookworm or earlier. The patch has
already been checked by a local dumat copy.

If during the trixie cycle your package will undergo structural
changes or any other file moves, please also see the wiki and upload
to experimental first when these changes are done.

Chris

[1] https://wiki.debian.org/UsrMerge
diff -Nru osspd-1.3.2/debian/changelog osspd-1.3.2/debian/changelog
--- osspd-1.3.2/debian/changelog	2023-02-04 19:49:50.0 +0100
+++ osspd-1.3.2/debian/changelog	2023-12-24 22:18:57.0 +0100
@@ -1,3 +1,12 @@
+osspd (1.3.2-13.2) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Install all files below /usr. (Closes: #-1)
+For udev rules, use udev.pc to find correct install location.
+For the rest, just hardcode /usr.
+
+ -- Chris Hofstaedtler   Sun, 24 Dec 2023 22:18:57 +0100
+
 osspd (1.3.2-13.1) unstable; urgency=medium
 
   * Non-maintainer upload.
diff -Nru osspd-1.3.2/debian/control osspd-1.3.2/debian/control
--- osspd-1.3.2/debian/control	2023-02-04 19:49:50.0 +0100
+++ osspd-1.3.2/debian/control	2023-12-24 22:18:57.0 +0100
@@ -6,7 +6,9 @@
 Build-Depends: debhelper-compat (= 13),
libasound2-dev,
libfuse-dev,
-   libpulse-dev
+   libpulse-dev,
+   pkgconf,
+   systemd-dev
 Standards-Version: 4.3.0
 Homepage: https://sourceforge.net/projects/osspd/
 Vcs-Browser: https://salsa.debian.org/debian/osspd
diff -Nru osspd-1.3.2/debian/osspd.install osspd-1.3.2/debian/osspd.install
--- osspd-1.3.2/debian/osspd.install	2023-02-04 19:49:50.0 +0100
+++ osspd-1.3.2/debian/osspd.install	2023-12-24 22:17:44.0 +0100
@@ -1,2 +1,2 @@
-lib/udev/rules.d/98-osscuse.rules
+${env:deb_udevdir}/rules.d/98-osscuse.rules
 usr/sbin/osspd
diff -Nru osspd-1.3.2/debian/rules osspd-1.3.2/debian/rules
--- osspd-1.3.2/debian/rules	2023-02-04 19:49:50.0 +0100
+++ osspd-1.3.2/debian/rules	2023-12-24 22:18:10.0 +0100
@@ -1,7 +1,8 @@
 #!/usr/bin/make -f
+export deb_udevdir = $(shell pkg-config --variable=udevdir udev | sed s,^/,,)
 
 SLAVESDIR=/usr/lib/osspd
-UDEVDIR=/lib/udev/rules.d
+UDEVDIR=/${deb_udevdir}/rules.d
 
 %:
 	dh $@
@@ -18,7 +19,7 @@
 override_dh_install:
 	dh_install
 	# adding kmod integration
-	install -D -m 0644 debian/osspd.kmod debian/osspd/lib/modules-load.d/osspd.conf
+	install -D -m 0644 debian/osspd.kmod debian/osspd/usr/lib/modules-load.d/osspd.conf
 
 # Disable tests, they require running the osspd
 override_dh_auto_test:


Bug#1058194: python-djangosaml2: FTBFS: AttributeError: type object '_PurePosixPath' has no attribute '_from_parts'. Did you mean: '_load_parts'?

2023-12-24 Thread s3v
Dear Maintainer,

>   File "/usr/lib/python3/dist-packages/xmlschema/__init__.py", line 20, in 
>
> from .dataobjects import DataElement, DataElementConverter, 
>DataBindingConverter
>   File "/usr/lib/python3/dist-packages/xmlschema/dataobjects.py", line 27, in 
>
> from . import validators
>   File "/usr/lib/python3/dist-packages/xmlschema/validators/__init__.py", 
>line 38, in 
> from .schemas import XMLSchemaMeta, XMLSchemaBase, XMLSchema, 
>XMLSchema10, XMLSchema11
>   File "/usr/lib/python3/dist-packages/xmlschema/validators/schemas.py", line 
>2137, in 
> class XMLSchema10(XMLSchemaBase):
>   File "/usr/lib/python3/dist-packages/xmlschema/validators/schemas.py", line 
>148, in __new__
> meta_schema = meta_schema_class.create_meta_schema(meta_schema_file)
>   ^^
>   File "/usr/lib/python3/dist-packages/xmlschema/validators/schemas.py", line 
>763, in create_meta_schema
> meta_schema = meta_schema_class(source, XSD_NAMESPACE, 
>global_maps=global_maps,
>   
>^
>   File "/usr/lib/python3/dist-packages/xmlschema/validators/schemas.py", line 
>357, in __init__
> self.source = XMLResource(source, base_url, allow, defuse, timeout)
>   ^
>   File "/usr/lib/python3/dist-packages/xmlschema/resources.py", line 511, in 
>__init__
> self.parse(source, lazy)
>   File "/usr/lib/python3/dist-packages/xmlschema/resources.py", line 746, in 
>parse
> url = normalize_url(source, self._base_url)
>   ^
>   File "/usr/lib/python3/dist-packages/xmlschema/resources.py", line 188, in 
>normalize_url
> path = _PurePath.from_uri(url)
>    ^^^
>   File "/usr/lib/python3/dist-packages/xmlschema/resources.py", line 109, in 
>from_uri
> return cls(uri)
>    
>   File "/usr/lib/python3/dist-packages/xmlschema/resources.py", line 98, in 
>__new__
> return cast('_PurePath', cls._from_parts(args))

This issue has been fixed in python3-xmlschema/1.10.0-7 [1] and your package 
does build
fine now.

Kind Regards


[1] 
https://tracker.debian.org/news/1485130/accepted-python-xmlschema-1100-7-source-into-unstable/



Bug#1058961: ntpsec: postinst should check for user:group before adding them

2023-12-24 Thread Richard Laager

On 2023-12-18 16:15, Bob Proulx wrote:

Package: ntpsec
Version: 1.2.2+dfsg1-3
Severity: normal
Tags: patch

Every time the ntpsec package upgrades it attempts to unconditionally
add the ntpsec user and group as per the following postinst snippet.

addgroup --system --quiet ntpsec
adduser --system --quiet --ingroup ntpsec \
--no-create-home --home /nonexistent ntpsec

This logs errors because the user and group already exists.


For the record, the "logs" here is critical. These errors show up in the 
logs, not on stdout. This is why I have never noticed this behavior 
until now (whether in ntpsec or just generally, having used adduser for 
years).



Please test for the existence of those groups before creating them as
other packages such as apt and others do.  Adding the following "if"
and "getent" checking fixes this using the same method the apt package
and others do.

 if ! getent passwd ntpsec > /dev/null; then
addgroup --system --quiet ntpsec
 fi
 if ! getent group ntpsec > /dev/null; then
adduser --system --quiet --ingroup ntpsec \
--no-create-home --home /nonexistent ntpsec
 fi


Those getent checks have passwd & group swapped, but otherwise, yes, 
that's what we want. I'll upload a fix shortly. Thanks!


--
Richard



OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1059415: ntfs-3g: install files into /usr (instead of /)

2023-12-24 Thread Chris Hofstaedtler
Source: ntfs-3g
Version: 1:2022.10.3-1
Severity: normal
Tags: patch
User: helm...@debian.org
Usertags: dep17m2

Hi!

Your package installs files into /. For the ongoing Debian UsrMerge
effort [1] these files should move to /usr in the trixie cycle.

I'm attaching a patch to implement such a move. It is quite
involved, but mostly undoes the move /usr -> /. The upstream
Makefiles ignore --exec-prefix/rootsbindir for the mount.* symlinks,
so I've chosen to re-create them using dh_link instead.

However, please still read the wiki page on moving files, especially
if you intend to backport to bookworm or earlier. The patch has
already been checked by a local dumat copy.

If during the trixie cycle your package will undergo structural
changes or any other file moves, please also see the wiki and upload
to experimental first when these changes are done.

Chris

[1] https://wiki.debian.org/UsrMerge
diff -Nru ntfs-3g-2022.10.3/debian/changelog ntfs-3g-2022.10.3/debian/changelog
--- ntfs-3g-2022.10.3/debian/changelog	2022-10-31 15:14:06.0 +0100
+++ ntfs-3g-2022.10.3/debian/changelog	2023-12-24 21:16:13.0 +0100
@@ -1,3 +1,10 @@
+ntfs-3g (1:2022.10.3-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Install files into /usr instead of /. (Closes: #-1)
+
+ -- Chris Hofstaedtler   Sun, 24 Dec 2023 21:16:13 +0100
+
 ntfs-3g (1:2022.10.3-1) unstable; urgency=high
 
   * New upstream release:
diff -Nru ntfs-3g-2022.10.3/debian/libntfs-3g89.install ntfs-3g-2022.10.3/debian/libntfs-3g89.install
--- ntfs-3g-2022.10.3/debian/libntfs-3g89.install	2015-10-24 09:41:03.0 +0200
+++ ntfs-3g-2022.10.3/debian/libntfs-3g89.install	2023-12-24 21:16:13.0 +0100
@@ -1 +1 @@
-lib/*/*.so.*
+usr/lib/*/*.so.*
diff -Nru ntfs-3g-2022.10.3/debian/local/ntfs-3g.hook ntfs-3g-2022.10.3/debian/local/ntfs-3g.hook
--- ntfs-3g-2022.10.3/debian/local/ntfs-3g.hook	2014-04-25 20:44:28.0 +0200
+++ ntfs-3g-2022.10.3/debian/local/ntfs-3g.hook	2023-12-24 21:16:13.0 +0100
@@ -17,9 +17,9 @@
 
 . /usr/share/initramfs-tools/hook-functions
 
-copy_exec /bin/ntfs-3g /bin
+copy_exec /usr/bin/ntfs-3g /usr/bin
 
-ln -s /bin/ntfs-3g "${DESTDIR}/sbin/mount.ntfs-3g"
-ln -s /bin/ntfs-3g "${DESTDIR}/sbin/mount.ntfs"
+ln -s /usr/bin/ntfs-3g "${DESTDIR}/usr/sbin/mount.ntfs-3g"
+ln -s /usr/bin/ntfs-3g "${DESTDIR}/usr/sbin/mount.ntfs"
 
 exit 0
diff -Nru ntfs-3g-2022.10.3/debian/ntfs-3g.install ntfs-3g-2022.10.3/debian/ntfs-3g.install
--- ntfs-3g-2022.10.3/debian/ntfs-3g.install	2015-10-24 09:40:42.0 +0200
+++ ntfs-3g-2022.10.3/debian/ntfs-3g.install	2023-12-24 21:16:13.0 +0100
@@ -1,4 +1,3 @@
-bin
-sbin
 usr/bin
+usr/sbin
 usr/share
diff -Nru ntfs-3g-2022.10.3/debian/ntfs-3g.links ntfs-3g-2022.10.3/debian/ntfs-3g.links
--- ntfs-3g-2022.10.3/debian/ntfs-3g.links	2014-04-25 20:44:28.0 +0200
+++ ntfs-3g-2022.10.3/debian/ntfs-3g.links	2023-12-24 21:16:13.0 +0100
@@ -1,4 +1,6 @@
-/sbin/mount.ntfs-3g			/sbin/mount.ntfs
+/usr/sbin/mount.ntfs-3g			/usr/sbin/mount.ntfs
+/usr/bin/ntfs-3g	/usr/sbin/mount.ntfs-3g
+/usr/bin/lowntfs-3g	/usr/sbin/mount.lowntfs-3g
 
 /usr/share/man/man8/ntfs-3g.8.gz	/usr/share/man/man8/mount.ntfs.8.gz
 /usr/share/man/man8/ntfs-3g.8.gz	/usr/share/man/man8/lowntfs-3g.8.gz
diff -Nru ntfs-3g-2022.10.3/debian/ntfs-3g-udeb.install ntfs-3g-2022.10.3/debian/ntfs-3g-udeb.install
--- ntfs-3g-2022.10.3/debian/ntfs-3g-udeb.install	2015-10-24 09:42:19.0 +0200
+++ ntfs-3g-2022.10.3/debian/ntfs-3g-udeb.install	2023-12-24 21:16:13.0 +0100
@@ -1,4 +1,3 @@
-bin/ntfs-3g
-lib/*/*.so.*
-sbin/mount.*
-sbin/ntfsresize
+usr/bin/ntfs-3g
+usr/lib/*/*.so.*
+usr/sbin/ntfsresize
diff -Nru ntfs-3g-2022.10.3/debian/ntfs-3g-udeb.links ntfs-3g-2022.10.3/debian/ntfs-3g-udeb.links
--- ntfs-3g-2022.10.3/debian/ntfs-3g-udeb.links	2014-04-25 20:44:28.0 +0200
+++ ntfs-3g-2022.10.3/debian/ntfs-3g-udeb.links	2023-12-24 21:16:13.0 +0100
@@ -1 +1,2 @@
-/sbin/mount.ntfs-3g	/sbin/mount.ntfs
+/usr/sbin/mount.ntfs-3g	/usr/sbin/mount.ntfs
+/usr/bin/ntfs-3g	/usr/sbin/mount.ntfs-3g
diff -Nru ntfs-3g-2022.10.3/debian/rules ntfs-3g-2022.10.3/debian/rules
--- ntfs-3g-2022.10.3/debian/rules	2022-10-31 15:14:06.0 +0100
+++ ntfs-3g-2022.10.3/debian/rules	2023-12-24 21:16:13.0 +0100
@@ -11,7 +11,7 @@
 
 export DEB_BUILD_MAINT_OPTIONS = hardening=+all
 
-SONAME = $(shell objdump -p debian/tmp/lib/*/libntfs-3g.so.*.* | awk -Fso. '/SONAME/ { print $$2 }')
+SONAME = $(shell objdump -p debian/tmp/usr/lib/*/libntfs-3g.so.*.* | awk -Fso. '/SONAME/ { print $$2 }')
 
 ifeq ($(DEB_HOST_ARCH_OS), linux)
 CONFIGURE_FLAGS = --enable-posix-acls
@@ -24,7 +24,7 @@
 	dh ${@}
 
 override_dh_auto_configure:
-	dh_auto_configure -- --exec-prefix=/ --enable-crypto \
+	dh_auto_configure -- --exec-prefix=/usr --enable-crypto \
 		--enable-extras --enable-xattr-mappings \
 		--enable-quarantined --disable-ldconfig \
 		--enable-mount-helper --with-fuse=internal \
@@ -33,13 +33,10 @@
 

Bug#1059273: missing path /var/lib/ntp/drift-tmp in apparmor.d/usr.sbin.ntpd

2023-12-24 Thread Richard Laager

On 2023-12-22 05:32, Stefan Bauer wrote:

Apparmor denies creation of /var/lib/ntp/drift-tmp.


Where are you getting /var/lib/ntp/drift from?

The ntpsec package in Debian has (from when both ntp and ntpsec existed 
in Debian) everything namespaced under "ntpsec". It uses 
/var/lib/ntpsec/ntp.drift in the default config file.


Maybe you have something different set. What does "grep driftfile 
/etc/ntpsec/ntp.conf" say?


--
Richard



Bug#1057570: libgnt: FTBFS: error: invalid use of incomplete typedef ‘PANEL’ {aka ‘struct panel’}

2023-12-24 Thread Richard Laager

On 2023-12-20 09:57, Sven Joachim wrote:

I have not tested it myself, but these errors should be fixed in libgnt
2.14.4 which has been released upstream the other day.  See
https://keep.imfreedom.org/libgnt/libgnt/rev/2da723f790d6, which
explicitly mentions this bug.


Thanks for letting me know!

--
Richard



Bug#1059414: open-ath9k-htc-firmware: install files into /usr (instead of /)

2023-12-24 Thread Chris Hofstaedtler
Source: open-ath9k-htc-firmware
Version: 1.4.0-108-gd856466+dfsg1-1.4
Severity: normal
Tags: patch
User: helm...@debian.org
Usertags: dep17m2

Hi!

Your package installs firmware files into /lib/firmware. For the
ongoing Debian UsrMerge effort [1] these files should move to
/usr/lib/firmware in the trixie cycle.

I'm attaching a very trivial patch to implement such a move.

However, please still read the wiki page on moving files, especially
if you intend to backport to bookworm or earlier. The patch has
already been checked by a local dumat copy.

If during the trixie cycle your package will undergo structural
changes or any other file moves, please also see the wiki and upload
to experimental first when these changes are done.

Chris

[1] https://wiki.debian.org/UsrMerge
diff -Nru open-ath9k-htc-firmware-1.4.0-108-gd856466+dfsg1/debian/changelog open-ath9k-htc-firmware-1.4.0-108-gd856466+dfsg1/debian/changelog
--- open-ath9k-htc-firmware-1.4.0-108-gd856466+dfsg1/debian/changelog	2023-07-26 21:09:48.0 +0200
+++ open-ath9k-htc-firmware-1.4.0-108-gd856466+dfsg1/debian/changelog	2023-12-24 21:24:56.0 +0100
@@ -1,3 +1,10 @@
+open-ath9k-htc-firmware (1.4.0-108-gd856466+dfsg1-1.5) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Install all files below /usr. (Closes: #-1)
+
+ -- Chris Hofstaedtler   Sun, 24 Dec 2023 21:24:56 +0100
+
 open-ath9k-htc-firmware (1.4.0-108-gd856466+dfsg1-1.4) unstable; urgency=medium
 
   * Non-maintainer upload.
diff -Nru open-ath9k-htc-firmware-1.4.0-108-gd856466+dfsg1/debian/firmware-ath9k-htc.install open-ath9k-htc-firmware-1.4.0-108-gd856466+dfsg1/debian/firmware-ath9k-htc.install
--- open-ath9k-htc-firmware-1.4.0-108-gd856466+dfsg1/debian/firmware-ath9k-htc.install	2023-07-26 21:09:18.0 +0200
+++ open-ath9k-htc-firmware-1.4.0-108-gd856466+dfsg1/debian/firmware-ath9k-htc.install	2023-12-24 21:24:52.0 +0100
@@ -1,2 +1,2 @@
-target_firmware/htc_*.fw lib/firmware/ath9k_htc/
+target_firmware/htc_*.fw usr/lib/firmware/ath9k_htc/
 debian/firmware-ath9k-htc.metainfo.xml usr/share/metainfo


Bug#1059413: h2o: CVE-2023-41337

2023-12-24 Thread Salvatore Bonaccorso
Source: h2o
Version: 2.2.5+dfsg2-8
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for h2o.

CVE-2023-41337[0]:
| h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3.
| In version 2.3.0-beta2 and prior, when h2o is configured to listen
| to multiple addresses or ports with each of them using different
| backend servers managed by multiple entities, a malicious backend
| entity that also has the opportunity to observe or inject packets
| exchanged between the client and h2o may misdirect HTTPS requests
| going to other backends and observe the contents of that HTTPS
| request being sent.  The attack involves a victim client trying to
| resume a TLS connection and an attacker redirecting the packets to a
| different address or port than that intended by the client. The
| attacker must already have been configured by the administrator of
| h2o to act as a backend to one of the addresses or ports that the
| h2o instance listens to. Session IDs and tickets generated by h2o
| are not bound to information specific to the server address, port,
| or the X.509 certificate, and therefore it is possible for an
| attacker to force the victim connection to wrongfully resume against
| a different server address or port on which the same h2o instance is
| listening.  Once a TLS session is misdirected to resume to a server
| address / port that is configured to use an attacker-controlled
| server as the backend, depending on the configuration, HTTPS
| requests from the victim client may be forwarded to the attacker's
| server.  An H2O instance is vulnerable to this attack only if the
| instance is configured to listen to different addresses or ports
| using the listen directive at the host level and the instance is
| configured to connect to backend servers managed by multiple
| entities.  A patch is available at commit
| 35760540337a47e5150da0f4a66a609fad2ef0ab. As a workaround, one may
| stop using using host-level listen directives in favor of global-
| level ones.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-41337
https://www.cve.org/CVERecord?id=CVE-2023-41337
[1] https://github.com/h2o/h2o/security/advisories/GHSA-5v5r-rghf-rm6q
[2] https://github.com/h2o/h2o/commit/35760540337a47e5150da0f4a66a609fad2ef0ab

Please adjust the affected versions in the BTS as needed.  If I
followed the code correctly then this one is as well present in the
older versions ad present in unstable and older, but please double
check.

Regards,
Salvatore



Bug#1058828: thunderbolt-tools: diff for NMU version 0.9.3-6.1

2023-12-24 Thread Chris Hofstaedtler
Control: tags 1058828 + pending


Dear maintainer,

I've prepared an NMU for thunderbolt-tools (versioned as 0.9.3-6.1) and
uploaded it to DELAYED/7. Please feel free to upload yourself in the
meantime.

Chris
diff -Nru thunderbolt-tools-0.9.3/debian/changelog thunderbolt-tools-0.9.3/debian/changelog
--- thunderbolt-tools-0.9.3/debian/changelog	2022-12-14 13:42:55.0 +0100
+++ thunderbolt-tools-0.9.3/debian/changelog	2023-12-24 14:13:22.0 +0100
@@ -1,3 +1,10 @@
+thunderbolt-tools (0.9.3-6.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Skip duplicate installation of tbtacl-write. (Closes: #1058828)
+
+ -- Chris Hofstaedtler   Sun, 24 Dec 2023 14:13:22 +0100
+
 thunderbolt-tools (0.9.3-6) unstable; urgency=medium
 
   * Roll in all fixes since 0.9.3, project is now in maintainence
diff -Nru thunderbolt-tools-0.9.3/debian/install thunderbolt-tools-0.9.3/debian/install
--- thunderbolt-tools-0.9.3/debian/install	2018-04-08 16:43:12.0 +0200
+++ thunderbolt-tools-0.9.3/debian/install	2023-12-24 14:13:14.0 +0100
@@ -1,2 +1 @@
-build_userspace/tbtacl/tbtacl-write lib/udev/
 build_userspace/tbtadm/tbtadm usr/bin


Bug#1059344: bookworm-pu: package libdatetime-timezone-perl/1:2.60-1+2023d

2023-12-24 Thread Jonathan Wiltshire
On Sun, Dec 24, 2023 at 08:57:22PM +0100, gregor herrmann wrote:
> On Sun, 24 Dec 2023 16:19:07 +, Jonathan Wiltshire wrote:
> 
> > On Sat, Dec 23, 2023 at 01:36:11AM +0100, gregor herrmann wrote:
> > > I've uploaded libdatetime-timezone-perl/1:2.60-1+2023d to bookworm.
> > > As usual, it contains the tzdata data 2023d as a quilt patch.
> > Thanks. Should it and the bullseye one be released to stable-updates as
> > usual? Text along the lines of the previous SUA?
> 
> Thanks for asking!
> I didn't include this request this time, as the changes probably
> don't affect too many people and I thought that you might be busy with
> other things at this time of the year :)
> 
> But if it's not too much hassle (and without any time pressure
> whatsoever), having them in *-updates before the next point releases
> would be nice. And basing the wording of the announcements on the
> previous examples would be perfect.

Ok; the window for today has just closed so I'll sort it out in the next
couple of days and by then hopefully tzdata will also be ready.

Thanks,

-- 
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51
ed25519/0x196418AAEB74C8A1: CA619D65A72A7BADFC96D280196418AAEB74C8A1



Bug#1059412: netcat-openbsd: install into /usr/bin

2023-12-24 Thread Chris Hofstaedtler
Source: netcat-openbsd
Version: 1.226-1
Severity: normal
Tags: patch
User: helm...@debian.org
Usertags: dep17m2

Hi!

Your package installs nc.openbsd into /bin. For the ongoing Debian
UsrMerge effort [1] it should move to /usr/bin in the trixie cycle.

I'm attaching a patch to implement such a move.
As noted in debian/changelog, the update-alternatives calls are
intentionally kept unchanged, to preserve existing user
configuration.

However, please still read the wiki page on moving files, especially
if you intend to backport to bookworm or earlier. The patch has
already been checked by a local dumat copy.

If during the trixie cycle your package will undergo structural
changes or any other file moves, please also see the wiki and upload
to experimental first when these changes are done.

Chris

[1] https://wiki.debian.org/UsrMerge
diff -Nru netcat-openbsd-1.226/debian/changelog netcat-openbsd-1.226/debian/changelog
--- netcat-openbsd-1.226/debian/changelog	2023-10-16 19:31:08.0 +0200
+++ netcat-openbsd-1.226/debian/changelog	2023-12-24 20:41:47.0 +0100
@@ -1,3 +1,12 @@
+netcat-openbsd (1.226-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Install nc.openbsd into /usr/bin. (Closes: #-1)
+Keep update-alternatives calls unchanged to preserve user
+configuration.
+
+ -- Chris Hofstaedtler   Sun, 24 Dec 2023 20:41:47 +0100
+
 netcat-openbsd (1.226-1) unstable; urgency=medium
 
   [ Guilhem Moulin ]
diff -Nru netcat-openbsd-1.226/debian/netcat-openbsd.install netcat-openbsd-1.226/debian/netcat-openbsd.install
--- netcat-openbsd-1.226/debian/netcat-openbsd.install	2023-10-16 19:31:08.0 +0200
+++ netcat-openbsd-1.226/debian/netcat-openbsd.install	2023-12-24 20:41:19.0 +0100
@@ -1 +1 @@
-nc bin/
+nc usr/bin/
diff -Nru netcat-openbsd-1.226/debian/rules netcat-openbsd-1.226/debian/rules
--- netcat-openbsd-1.226/debian/rules	2023-10-16 19:31:08.0 +0200
+++ netcat-openbsd-1.226/debian/rules	2023-12-24 20:41:33.0 +0100
@@ -39,7 +39,7 @@
 endif
 
 execute_after_dh_install:
-	mv -T $(prefix)/bin/nc $(prefix)/bin/nc.openbsd
+	mv -T $(prefix)/usr/bin/nc $(prefix)/usr/bin/nc.openbsd
 
 execute_after_dh_installman:
 	mv -T $(man1dir)/nc.1 $(man1dir)/nc_openbsd.1


Bug#1059410: sddm: DisplayServer=wayland caused a complete lockout

2023-12-24 Thread Federico Ceratto
Package: sddm
Version: 0.20.0-2
Severity: important

Dear Maintainer,
Thank you for packaging SDDM. After creating a file named 
/etc/sddm.conf.d/use_wayland.conf
with the following content:

[General]
DisplayServer=wayland


SDDM showed a black screen and captured keyboard inputs preventing me
from switching to the tty consoles, locking me out of the system.
Rebooting multiple times did not help.
(I had to resort to booting with systemd.unit=emergency.target)

-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: arm64

Kernel: Linux 6.5.0-5-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_IE:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages sddm depends on:
ii  adduser 3.137
ii  debconf [debconf-2.0]   1.5.82
ii  libc6   2.37-13
ii  libgcc-s1   13.2.0-8
ii  libpam0g1.5.2-9.1
ii  libqt5core5a5.15.10+dfsg-5
ii  libqt5dbus5 5.15.10+dfsg-5
ii  libqt5gui5  5.15.10+dfsg-5
ii  libqt5network5  5.15.10+dfsg-5
ii  libqt5qml5  5.15.10+dfsg-2
ii  libqt5quick55.15.10+dfsg-2
ii  libstdc++6  13.2.0-8
ii  libsystemd0 255-1
ii  libxau6 1:1.0.9-1
ii  libxcb-xkb1 1.15-1
ii  libxcb1 1.15-1
ii  qml-module-qtquick2 5.15.10+dfsg-2
ii  x11-common  1:7.7+23
ii  xauth   1:1.1.2-1
ii  xkb-data2.38-2
ii  xserver-xorg [xserver]  1:7.7+23

Versions of packages sddm recommends:
ii  libpam-systemd 255-1
ii  sddm-theme-debian-elarun [sddm-theme]  0.20.0-2
ii  sddm-theme-maldives [sddm-theme]   0.20.0-2
ii  sddm-theme-maui [sddm-theme]   0.20.0-2
ii  sddm-theme-maya [sddm-theme]   0.20.0-2

Versions of packages sddm suggests:
ii  libpam-kwallet5   5.27.9-1
pn  qtvirtualkeyboard-plugin  

-- debconf information:
* shared/default-x-display-manager: sddm
  sddm/daemon_name: /usr/bin/sddm



Bug#1059411: nano: install files into /usr/bin

2023-12-24 Thread Chris Hofstaedtler
Source: nano
Version: 7.2-1
Severity: normal
Tags: patch
User: helm...@debian.org
Usertags: dep17m2

Hi!

Your package installs files directly into /bin. For the ongoing
Debian UsrMerge effort [1] these files should move to /usr/bin in
the trixie cycle.

I'm attaching a patch to implement such a move.
As noted in d/changelog, the update-alternatives calls are
intentionally kept unchanged to preserve existing user
configuration.

However, please still read the wiki page on moving files, especially
if you intend to backport to bookworm or earlier. The patch has
already been checked by a local dumat copy.

If during the trixie cycle your package will undergo structural
changes or any other file moves, please also see the wiki and upload
to experimental first when these changes are done.

Chris

[1] https://wiki.debian.org/UsrMerge
diff -Nru nano-7.2/debian/changelog nano-7.2/debian/changelog
--- nano-7.2/debian/changelog	2023-01-18 16:31:52.0 +0100
+++ nano-7.2/debian/changelog	2023-12-24 20:22:21.0 +0100
@@ -1,3 +1,12 @@
+nano (7.2-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Install all files below /usr. (Closes: #-1)
+Keep update-alternatives calls unchanged to preserve user
+configuration.
+
+ -- Chris Hofstaedtler   Sun, 24 Dec 2023 20:22:21 +0100
+
 nano (7.2-1) unstable; urgency=medium
 
   * The "Blue checkmark" release.
diff -Nru nano-7.2/debian/rules nano-7.2/debian/rules
--- nano-7.2/debian/rules	2022-12-07 23:10:44.0 +0100
+++ nano-7.2/debian/rules	2023-12-24 20:22:21.0 +0100
@@ -13,8 +13,7 @@
 tinybuild=$(CURDIR)/build-tiny
 udebbuild=$(CURDIR)/build-udeb
 
-CONFFLAGS = \
-	--bindir=/bin
+CONFFLAGS =
 
 CONFFLAGS_nano =
 
@@ -54,18 +53,18 @@
 
 	dh_auto_install --builddirectory=$(tinybuild) \
 		--destdir=$(CURDIR)/debian/nano-tiny
-	mv debian/nano-tiny/bin/nano debian/nano-tiny/bin/nano-tiny
+	mv debian/nano-tiny/usr/bin/nano debian/nano-tiny/usr/bin/nano-tiny
 	rm -rf $(CURDIR)/debian/nano-tiny/usr/share/man
 	rm -rf $(CURDIR)/debian/nano-tiny/usr/share/info
 	rm -rf $(CURDIR)/debian/nano-tiny/usr/share/nano
 	rm -rf $(CURDIR)/debian/nano-tiny/usr/share/doc/nano
-	rm -f $(CURDIR)/debian/nano-tiny/bin/rnano
+	rm -f $(CURDIR)/debian/nano-tiny/usr/bin/rnano
 
 ifeq (,$(filter noudeb,$(DEB_BUILD_PROFILES)))
 	dh_auto_install --builddirectory=$(udebbuild) \
 		--destdir=$(CURDIR)/debian/nano-udeb
-	rm -rf $(CURDIR)/debian/nano-udeb/usr
-	rm -f $(CURDIR)/debian/nano-udeb/bin/rnano
+	rm -rf $(CURDIR)/debian/nano-udeb/usr/share
+	rm -f $(CURDIR)/debian/nano-udeb/usr/bin/rnano
 endif
 
 override_dh_auto_clean:


Bug#1059344: bookworm-pu: package libdatetime-timezone-perl/1:2.60-1+2023d

2023-12-24 Thread gregor herrmann
On Sun, 24 Dec 2023 16:19:07 +, Jonathan Wiltshire wrote:

> On Sat, Dec 23, 2023 at 01:36:11AM +0100, gregor herrmann wrote:
> > I've uploaded libdatetime-timezone-perl/1:2.60-1+2023d to bookworm.
> > As usual, it contains the tzdata data 2023d as a quilt patch.
> Thanks. Should it and the bullseye one be released to stable-updates as
> usual? Text along the lines of the previous SUA?

Thanks for asking!
I didn't include this request this time, as the changes probably
don't affect too many people and I thought that you might be busy with
other things at this time of the year :)

But if it's not too much hassle (and without any time pressure
whatsoever), having them in *-updates before the next point releases
would be nice. And basing the wording of the announcements on the
previous examples would be perfect.


Cheers,
gregor

-- 
 .''`.  https://info.comodo.priv.at -- Debian Developer https://www.debian.org
 : :' : OpenPGP fingerprint D1E1 316E 93A7 60A8 104D  85FA BB3A 6801 8649 AA06
 `. `'  Member VIBE!AT & SPI Inc. -- Supporter Free Software Foundation Europe
   `-   


signature.asc
Description: Digital Signature


Bug#1058938: bookworm-pu: package onionprobe/1.0.0+ds-2.1+deb12u1

2023-12-24 Thread Jonathan Wiltshire
On Sun, Dec 24, 2023 at 05:20:54PM +, Georg Faerber wrote:
> On 23-12-24 16:31:37, Jonathan Wiltshire wrote:
> > Something has gone wrong with your upload (a rebase maybe?):
> 
> The missing part of the changelog, as per the diff you sent, is
> currently not part of the git history, which is problematic, I guess.
> 
> So if my above assumption is correct, I'll ensure that's recorded in git
> accordingly, rebuild and upload again.
> 
> Jonathan, does the above make sense?

Yes. Just make sure you have the rejection email before you upload again
with the same version.

Thanks,

-- 
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51
ed25519/0x196418AAEB74C8A1: CA619D65A72A7BADFC96D280196418AAEB74C8A1



Bug#1059409: net-tools: please apply usr-merged layout in unstable

2023-12-24 Thread Chris Hofstaedtler
Source: net-tools
Version: 2.10-0.1
User: helm...@debian.org
Usertags: dep17m2
Control: tags -1 + fixed-in-experimental

Hi!

net-tools in experimental already applied the usr-merged layout.
Please make sure this reaches unstable.

(This bug is also helpful for keeping track of the in-progress
work.)

Thanks,
Chris



Bug#1059333: mirage: Please disable LTO

2023-12-24 Thread Sudip Mukherjee
Control: close -1
--

Real issue has been found. There is no need to disable LTO.

https://gitlab.com/thomasross/mirage/-/merge_requests/7

-- 
Regards
Sudip



Bug#1059408: mt-st: install files into /usr (instead of /)

2023-12-24 Thread Chris Hofstaedtler
Source: mt-st
Version: 1.7-1
Severity: normal
Tags: patch
User: helm...@debian.org
Usertags: dep17m2

Hi!

Your package installs files into /. For the ongoing Debian UsrMerge
effort [1] these files should move to /usr in the trixie cycle.

I'm attaching a patch to implement such a move.

However, please still read the wiki page on moving files, especially
if you intend to backport to bookworm or earlier. The patch has
already been checked by a local dumat copy.

If during the trixie cycle your package will undergo structural
changes or any other file moves, please also see the wiki and upload
to experimental first when these changes are done.

Chris

[1] https://wiki.debian.org/UsrMerge
diff -Nru mt-st-1.7/debian/changelog mt-st-1.7/debian/changelog
--- mt-st-1.7/debian/changelog	2023-04-20 23:30:00.0 +0200
+++ mt-st-1.7/debian/changelog	2023-12-24 20:14:47.0 +0100
@@ -1,3 +1,11 @@
+mt-st (1.7-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Install all files below /usr, and update references to these files.
+(Closes: #-1)
+
+ -- Chris Hofstaedtler   Sun, 24 Dec 2023 20:14:47 +0100
+
 mt-st (1.7-1) unstable; urgency=medium
 
   * New upstream release fixing a bug triggered by the test suite on
diff -Nru mt-st-1.7/debian/mt-st.dirs mt-st-1.7/debian/mt-st.dirs
--- mt-st-1.7/debian/mt-st.dirs	2023-04-20 23:30:00.0 +0200
+++ mt-st-1.7/debian/mt-st.dirs	1970-01-01 01:00:00.0 +0100
@@ -1,3 +0,0 @@
-sbin
-bin
-etc
diff -Nru mt-st-1.7/debian/mt-st.files mt-st-1.7/debian/mt-st.files
--- mt-st-1.7/debian/mt-st.files	2023-04-20 23:30:00.0 +0200
+++ mt-st-1.7/debian/mt-st.files	1970-01-01 01:00:00.0 +0100
@@ -1,4 +0,0 @@
-sbin/stinit
-bin/mt-st
-usr/share/man/man?/*
-etc/stinit.def
diff -Nru mt-st-1.7/debian/mt-st.udev mt-st-1.7/debian/mt-st.udev
--- mt-st-1.7/debian/mt-st.udev	2023-04-20 23:30:00.0 +0200
+++ mt-st-1.7/debian/mt-st.udev	2023-12-24 20:13:53.0 +0100
@@ -1,3 +1,3 @@
 # Use stinit to set default parameters on st device creation
-KERNEL=="st[0-9]",   RUN+="/sbin/stinit %n"
-KERNEL=="st[0-9]*[0-9]", RUN+="/sbin/stinit %n"
+KERNEL=="st[0-9]",   RUN+="/usr/sbin/stinit %n"
+KERNEL=="st[0-9]*[0-9]", RUN+="/usr/sbin/stinit %n"
diff -Nru mt-st-1.7/debian/rules mt-st-1.7/debian/rules
--- mt-st-1.7/debian/rules	2023-04-20 23:30:00.0 +0200
+++ mt-st-1.7/debian/rules	2023-12-24 20:14:47.0 +0100
@@ -9,9 +9,9 @@
 	dh $@ --with bash-completion
 
 override_dh_auto_install:
-	install -m 644 debian/stinit.def $(DESTDIR)/etc/
-	install mt $(DESTDIR)/bin/mt-st
-	install stinit $(DESTDIR)/sbin/
+	install -D -m 644 debian/stinit.def $(DESTDIR)/etc/stinit.def
+	install -D mt $(DESTDIR)/usr/bin/mt-st
+	install -D stinit $(DESTDIR)/usr/sbin/stinit
 
 override_dh_installman:
 	cp mt.1 debian/mt-st.1
diff -Nru mt-st-1.7/debian/tests/simple mt-st-1.7/debian/tests/simple
--- mt-st-1.7/debian/tests/simple	2023-04-20 23:30:00.0 +0200
+++ mt-st-1.7/debian/tests/simple	2023-12-24 20:14:07.0 +0100
@@ -11,8 +11,8 @@
 
 # Symlink the installed binaries
 echo Symlinking the package binaries
-ln -s /bin/mt-st "$AUTOPKGTEST_TMP/mt"
-ln -s /sbin/stinit "$AUTOPKGTEST_TMP/stinit"
+ln -s /usr/bin/mt-st "$AUTOPKGTEST_TMP/mt"
+ln -s /usr/sbin/stinit "$AUTOPKGTEST_TMP/stinit"
 
 # And then run tests
 echo Running tests


Bug#1059407: mobile-tweaks: install udev, systemd files below /usr

2023-12-24 Thread Chris Hofstaedtler
Source: mobile-tweaks
Version: 5
Severity: normal
Tags: patch
User: helm...@debian.org
Usertags: dep17m2

Hi!

Your package installs files into /lib. For the ongoing Debian
UsrMerge effort [1] these files should move to /usr/lib in the
trixie cycle.

I'm attaching a patch to implement such a move.

However, please still read the wiki page on moving files, especially
if you intend to backport to bookworm or earlier. The patch has
already been checked by a local dumat copy.

If during the trixie cycle your package will undergo structural
changes or any other file moves, please also see the wiki and upload
to experimental first when these changes are done.

Chris

[1] https://wiki.debian.org/UsrMerge
diff -Nru mobile-tweaks-5/debian/changelog mobile-tweaks-5+nmu1/debian/changelog
--- mobile-tweaks-5/debian/changelog	2023-07-18 14:59:15.0 +0200
+++ mobile-tweaks-5+nmu1/debian/changelog	2023-12-24 20:07:52.0 +0100
@@ -1,3 +1,10 @@
+mobile-tweaks (5+nmu1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Install udev, systemd files below /usr. (Closes: #-1)
+
+ -- Chris Hofstaedtler   Sun, 24 Dec 2023 20:07:52 +0100
+
 mobile-tweaks (5) unstable; urgency=medium
 
   [ undef ]
diff -Nru mobile-tweaks-5/debian/control mobile-tweaks-5+nmu1/debian/control
--- mobile-tweaks-5/debian/control	2022-02-03 07:43:11.0 +0100
+++ mobile-tweaks-5+nmu1/debian/control	2023-12-24 20:07:52.0 +0100
@@ -6,7 +6,8 @@
  Arnaud Ferraris ,
  Guido Günther ,
  Henry-Nicolas Tourneur ,
-Build-Depends: debhelper-compat (= 13),
+Build-Depends: debhelper (>= 13.11.6),
+ debhelper-compat (= 13),
  dh-exec
 Standards-Version: 4.5.0
 Rules-Requires-Root: no
diff -Nru mobile-tweaks-5/debian/librem5-tweaks.install mobile-tweaks-5+nmu1/debian/librem5-tweaks.install
--- mobile-tweaks-5/debian/librem5-tweaks.install	2023-07-18 14:59:15.0 +0200
+++ mobile-tweaks-5+nmu1/debian/librem5-tweaks.install	2023-12-24 20:07:30.0 +0100
@@ -1,6 +1,6 @@
 # GPSD
-librem5/gpsd/99-gnss.rules lib/udev/rules.d/
-librem5/gpsd/gpsd.service.d lib/systemd/system/
+librem5/gpsd/99-gnss.rules usr/lib/udev/rules.d/
+librem5/gpsd/gpsd.service.d usr/lib/systemd/system/
 librem5/gpsd/librem5-gpsd etc/default
 
 # Device specific gsettings for power management


Bug#1059406: ITP: invidtui -- TUI based Invidious client

2023-12-24 Thread Gürkan Myczko

Package: wnpp
Severity: wishlist
Owner: Gürkan Myczko 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: invidtui
  Version : 0.3.7
  Upstream Authors: darkhz
  URL : https://github.com/darkhz/invidtui
* License : MIT
  Description : TUI based Invidious client
 This is an invidious client, which fetches data from invidious 
instances and
 displays a user interface in the terminal(TUI), and allows for 
selecting and

 playing Youtube audio and video.
 .
 Features
 - Play audio or video
 - Control the video resolution
 - Ability to open, view, edit and save m3u8 playlists
 - Automatically queries the invidious API and selects the best instance
 - Search for and browse videos, playlists and channels, with history 
support
 = Authentication with invidious and management of user feed, playlists 
and

subscriptions
 - Download video and/or audio



Bug#1059405: lm-sensors: install fancontrol-systemd-sleep into /usr

2023-12-24 Thread Chris Hofstaedtler
Source: lm-sensors
Version: 1:3.6.0-8
Severity: normal
Tags: patch
User: helm...@debian.org
Usertags: dep17m2

Hi!

Your package installs fancontrol-systemd-sleep into
/lib/systemd/system-sleep. For the ongoing Debian UsrMerge effort
[1] this should move below /usr during the trixie cycle.

I'm attaching a patch to implement such a move, using systemd.pc to
determine the correct location.

However, please still read the wiki page on moving files, especially
if you intend to backport to bookworm or earlier. The patch has
already been checked by a local dumat copy.

If during the trixie cycle your package will undergo structural
changes or any other file moves, please also see the wiki and upload
to experimental first when these changes are done.

Chris

[1] https://wiki.debian.org/UsrMerge
diff -Nru lm-sensors-3.6.0/debian/changelog lm-sensors-3.6.0/debian/changelog
--- lm-sensors-3.6.0/debian/changelog	2023-08-25 21:39:18.0 +0200
+++ lm-sensors-3.6.0/debian/changelog	2023-12-24 19:39:49.0 +0100
@@ -1,3 +1,10 @@
+lm-sensors (1:3.6.0-8.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Use systemd.pc to place systemd sleep files. (Closes: #-1)
+
+ -- Chris Hofstaedtler   Sun, 24 Dec 2023 19:39:49 +0100
+
 lm-sensors (1:3.6.0-8) unstable; urgency=medium
 
   * Drop versioned depends on obsolete lsb-base package.
diff -Nru lm-sensors-3.6.0/debian/control lm-sensors-3.6.0/debian/control
--- lm-sensors-3.6.0/debian/control	2023-08-22 13:30:06.0 +0200
+++ lm-sensors-3.6.0/debian/control	2023-12-24 19:39:49.0 +0100
@@ -1,7 +1,7 @@
 Source: lm-sensors
 Section: utils
 Priority: optional
-Build-Depends: debhelper-compat (= 13), bison, flex
+Build-Depends: debhelper-compat (= 13), bison, flex, pkgconf, systemd-dev
 Rules-Requires-Root: no
 Standards-Version: 4.6.2
 Maintainer: Aurelien Jarno 
diff -Nru lm-sensors-3.6.0/debian/rules lm-sensors-3.6.0/debian/rules
--- lm-sensors-3.6.0/debian/rules	2021-01-25 01:02:46.0 +0100
+++ lm-sensors-3.6.0/debian/rules	2023-12-24 19:39:49.0 +0100
@@ -1,5 +1,7 @@
 #!/usr/bin/make -f
 
+export deb_systemdsleepdir = $(shell pkg-config --variable=systemdsleepdir systemd)
+
 %:
 	dh $@
 
@@ -31,8 +33,7 @@
 
 override_dh_auto_install-indep:
 	$(MAKE) install-etc install-prog-pwm $(MAKEARGS_INDP)
-	mkdir -p $(CURDIR)/debian/fancontrol/lib/systemd/system-sleep/
-	install -m 755 $(CURDIR)/debian/fancontrol-systemd-sleep $(CURDIR)/debian/fancontrol/lib/systemd/system-sleep/fancontrol
+	install -m 755 -D $(CURDIR)/debian/fancontrol-systemd-sleep $(CURDIR)/debian/fancontrol$(deb_systemdsleepdir)/fancontrol
 
 	# Make sure /etc/sensors.d/ is not removed
 	touch $(CURDIR)/debian/tmp/etc/sensors.d/.placeholder


Bug#981185: nheko: Similar problem with nheko 0.11.3-2 on bookworm

2023-12-24 Thread Nathan Marshak
Package: nheko
Version: 0.11.3-2
Followup-For: Bug #981185
X-Debbugs-Cc: n...@protonmail.com

Dear Maintainer,

I appear to be running into the same/similar problem.

When using nheko with: 
  * i3 window manager on X
  * pipewire with wireplumber session manager 

As soon as I attempt to place a video call, I get a segfault. However,
text chat and voice chat work perfectly. I have attached a stack trace
to this report.

Sincerely,

Nathan
-- System Information:
Debian Release: 12.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 6.1.0-16-686-pae (SMP w/2 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages nheko depends on:
ii  gstreamer1.0-nice   0.1.21-1
ii  gstreamer1.0-qt51.22.0-5+deb12u1
ii  libc6   2.36-9+deb12u3
ii  libcmark0.30.2  0.30.2-6
ii  libcpp-httplib0.11  0.11.4+ds-1+deb12u1
ii  libcurl47.88.1-10+deb12u5
ii  libevent-core-2.1-7 2.1.12-stable-8
ii  libevent-pthreads-2.1-7 2.1.12-stable-8
ii  libfmt9 9.1.0+ds1-2
ii  libgcc-s1   12.2.0-14
ii  libglib2.0-02.74.6-2
ii  libgstreamer-plugins-bad1.0-0   1.22.0-4+deb12u4
ii  libgstreamer-plugins-base1.0-0  1.22.0-3+deb12u1
ii  libgstreamer1.0-0   1.22.0-2
ii  liblmdb00.9.24-1
ii  libolm3 3.2.13~dfsg-1
ii  libqt5core5a5.15.8+dfsg-11
ii  libqt5dbus5 5.15.8+dfsg-11
ii  libqt5gui5  5.15.8+dfsg-11
ii  libqt5keychain1 0.13.2-5
ii  libqt5multimedia5   5.15.8-2
ii  libqt5multimedia5-plugins   5.15.8-2
ii  libqt5network5  5.15.8+dfsg-11
ii  libqt5qml5  5.15.8+dfsg-3
ii  libqt5quick55.15.8+dfsg-3
ii  libqt5svg5  5.15.8-3
ii  libqt5widgets5  5.15.8+dfsg-11
ii  libre2-920220601+dfsg-1+b1
ii  libspdlog1.10 [libspdlog1.10-fmt9]  1:1.10.0+ds-0.4
ii  libssl3 3.0.11-1~deb12u2
ii  libstdc++6  12.2.0-14
ii  libxcb-ewmh20.4.1-1.1
ii  libxcb1 1.15-1
ii  qml-module-qt-labs-animation5.15.8+dfsg-3
ii  qml-module-qt-labs-platform 5.15.8+dfsg-2
ii  qml-module-qt-labs-settings 5.15.8+dfsg-3
ii  qml-module-qtgraphicaleffects   5.15.8-2
ii  qml-module-qtmultimedia 5.15.8-2
ii  qml-module-qtquick-controls25.15.8+dfsg-2
ii  qml-module-qtquick-layouts  5.15.8+dfsg-3
ii  qml-module-qtquick-particles2   5.15.8+dfsg-3
ii  qml-module-qtquick-window2  5.15.8+dfsg-3
ii  qml-module-qtquick2 5.15.8+dfsg-3

Versions of packages nheko recommends:
ii  ca-certificates20230311
ii  fonts-noto-color-emoji 2.042-0+deb12u1
ii  kimageformat-plugins   5.103.0-2
ii  qt5-image-formats-plugins  5.15.8-2

Versions of packages nheko suggests:
ii  gstreamer1.0-vaapi  1.22.0-2

-- no debconf information
Error: signal 11:
nheko(_Z17stacktraceHandleri+0x41)[0xffa411]
linux-gate.so.1(__kernel_sigreturn+0x0)[0xb7fc6564]
/lib/i386-linux-gnu/libgobject-2.0.so.0(+0x1c63b)[0xb6f0c63b]
/lib/i386-linux-gnu/libglib-2.0.so.0(g_hash_table_lookup+0x28)[0xb4f6eb08]
/lib/i386-linux-gnu/libgobject-2.0.so.0(g_param_spec_pool_lookup+0x99)[0xb6f0e3c9]
/lib/i386-linux-gnu/libgobject-2.0.so.0(g_object_set_valist+0x2ee)[0xb6f0984e]
/lib/i386-linux-gnu/libgobject-2.0.so.0(g_object_set+0x62)[0xb6f0a0d2]
nheko(_ZN13WebRTCSession16addVideoPipelineEi+0x14b)[0xe58d1b]
nheko(_ZN13WebRTCSession14createPipelineEii+0x224)[0xe59f84]
nheko(_ZN13WebRTCSession13startPipelineEii+0x6c)[0xe5a05c]
nheko(_ZN13WebRTCSession11createOfferEN6webrtc8CallTypeEj+0x39)[0xe5a589]
nheko(_ZN11CallManager10sendInviteERK7QStringN6webrtc8CallTypeEj+0x6bd)[0xe4c6ed]
nheko(+0x7b3ee8)[0xc61ee8]
nheko(_ZN11CallManager11qt_metacallEN11QMetaObject4CallEiPPv+0x9e)[0xc7258e]
/lib/i386-linux-gnu/libQt5Qml.so.5(+0x29b2a3)[0xb6c9b2a3]
/lib/i386-linux-gnu/libQt5Qml.so.5(+0x178cf2)[0xb6b78cf2]
/lib/i386-linux-gnu/libQt5Qml.so.5(_ZNK3QV413QObjectMethod12callInternalEPKNS_5ValueES3_i+0x663)[0xb6b7af13]
/lib/i386-linux-gnu/libQt5Qml.so.5(_ZN3QV413QObjectMethod11virtualCallEPKNS_14FunctionObjectEPKNS_5ValueES6_i+0x24)[0xb6b7b664]
/lib/i386-linux-gnu/libQt5Qml.so.5(+0x19a733)[0xb6b9a733]
/lib/i386-linux-gnu/libQt5Qml.so.5(+0x19ddf5)[0xb6b9ddf5]

Bug#1059404: lldpad: install systemd service into /usr

2023-12-24 Thread Chris Hofstaedtler
Source: lldpad
Version: 1.1+git20221028.aa18720-1
Severity: normal
Tags: patch
User: helm...@debian.org
Usertags: dep17m2

Hi!

Your package installs systemd service files into /lib. For the
ongoing Debian UsrMerge effort [1] these files should move to
/usr/lib in the trixie cycle.

I'm attaching a trivial patch to implement this move, mostly undoing
the previous move to /lib.

However, please still read the wiki page on moving files, especially
if you intend to backport to bookworm or earlier. The patch has
already been checked by a local dumat copy.

If during the trixie cycle your package will undergo structural
changes or any other file moves, please also see the wiki and upload
to experimental first when these changes are done.

Chris

[1] https://wiki.debian.org/UsrMerge
diff -Nru lldpad-1.1+git20221028.aa18720/debian/changelog lldpad-1.1+git20221028.aa18720/debian/changelog
--- lldpad-1.1+git20221028.aa18720/debian/changelog	2023-02-19 22:47:00.0 +0100
+++ lldpad-1.1+git20221028.aa18720/debian/changelog	2023-12-24 19:32:18.0 +0100
@@ -1,3 +1,10 @@
+lldpad (1.1+git20221028.aa18720-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Install systemd units into /usr (Closes: #-1)
+
+ -- Chris Hofstaedtler   Sun, 24 Dec 2023 19:32:18 +0100
+
 lldpad (1.1+git20221028.aa18720-1) unstable; urgency=medium
 
   * New upstream version 1.1+git20221028.aa18720
diff -Nru lldpad-1.1+git20221028.aa18720/debian/control lldpad-1.1+git20221028.aa18720/debian/control
--- lldpad-1.1+git20221028.aa18720/debian/control	2023-02-19 22:28:23.0 +0100
+++ lldpad-1.1+git20221028.aa18720/debian/control	2023-12-24 19:31:45.0 +0100
@@ -7,6 +7,7 @@
  Valentin Vidic ,
  tony mancill 
 Build-Depends:
+ debhelper (>= 13.11.6),
  debhelper-compat (= 13),
  pkg-config,
  libconfig-dev (>= 1.3.2~),
diff -Nru lldpad-1.1+git20221028.aa18720/debian/lldpad.install lldpad-1.1+git20221028.aa18720/debian/lldpad.install
--- lldpad-1.1+git20221028.aa18720/debian/lldpad.install	2020-02-17 19:37:25.0 +0100
+++ lldpad-1.1+git20221028.aa18720/debian/lldpad.install	2023-12-24 19:28:46.0 +0100
@@ -2,5 +2,5 @@
 usr/sbin/*
 usr/lib/*/liblldp_clif.so.*
 etc/init.d/lldpad
-lib/systemd/system/*
+usr/lib/systemd/system/*
 usr/share/bash-completion/completions/*
diff -Nru lldpad-1.1+git20221028.aa18720/debian/rules lldpad-1.1+git20221028.aa18720/debian/rules
--- lldpad-1.1+git20221028.aa18720/debian/rules	2020-05-09 19:56:10.0 +0200
+++ lldpad-1.1+git20221028.aa18720/debian/rules	2023-12-24 19:28:39.0 +0100
@@ -17,8 +17,6 @@
 override_dh_auto_install:
 	dh_auto_install
 	install -D lldpad.init debian/tmp/etc/init.d/lldpad
-	mkdir -p debian/tmp/lib/systemd
-	mv debian/tmp/usr/lib/systemd/system debian/tmp/lib/systemd
 
 override_dh_installinit:
 	dh_installinit -plldpad --only-scripts


Bug#1059344: libdatetime-timezone-perl 2.60-1+2023d flagged for acceptance

2023-12-24 Thread Jonathan Wiltshire
package release.debian.org
tags 1059344 = bookworm pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bookworm.

Thanks for your contribution!

Upload details
==

Package: libdatetime-timezone-perl
Version: 2.60-1+2023d

Explanation: update data to Olson database version 2023d (changes for 
Antarctica and Greenland)



Bug#1059235: fish 3.6.0-3.1+deb12u1 flagged for acceptance

2023-12-24 Thread Jonathan Wiltshire
package release.debian.org
tags 1059235 = bookworm pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bookworm.

Thanks for your contribution!

Upload details
==

Package: fish
Version: 3.6.0-3.1+deb12u1

Explanation: handle Unicode non-printing characters safely when given as 
command substitution [CVE-2023-49284]



Bug#1056969: swupdate 2022.12+dfsg-4+deb12u1 flagged for acceptance

2023-12-24 Thread Jonathan Wiltshire
package release.debian.org
tags 1056969 = bookworm pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bookworm.

Thanks for your contribution!

Upload details
==

Package: swupdate
Version: 2022.12+dfsg-4+deb12u1

Explanation: prevent acquiring root privileges through inappropriate socket mode



Bug#1054466: localslackirc 1.17-1.1+deb12u1 flagged for acceptance

2023-12-24 Thread Jonathan Wiltshire
package release.debian.org
tags 1054466 = bookworm pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bookworm.

Thanks for your contribution!

Upload details
==

Package: localslackirc
Version: 1.17-1.1+deb12u1

Explanation: send authorization and cookie headers to the websocket



Bug#1059403: collectd hugepages plugin reports spurious warnings trying to open demote

2023-12-24 Thread Joseph Nahmias
Package: collectd
Version: 5.12.0-14
Severity: normal
Tags: upstream patch

Dear Maintainer,

Thanks for packaging collectd!

After upgrading one of my servers to bookworm, I noticed that collectd
started emitting warnings about being unable to read demote files.
It seems this was reported upstream at 
https://github.com/collectd/collectd/issues/3993
and a commit was merged into main:
https://github.com/collectd/collectd/commit/4cebbfc1ed4b44644d981df996a8ca941e38e8a1

It would be great if this patch could be incorporated into the next
stable point release for bookworm.

If you agree but are short on time, I'm happy (and motivated) to do the
work.

Thanks,
--Joe

-- System Information:
Debian Release: 12.4
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'stable-security'), (500, 'stable-debug')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-15-amd64 (SMP w/1 CPU thread; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages collectd depends on:
ii  collectd-core  5.12.0-14
ii  libc6  2.36-9+deb12u3
ii  librrd81.7.2-4+b8



Bug#1059402: bookworm-pu: package postfix/3.7.6-0+deb12u2

2023-12-24 Thread Scott Kitterman
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu

(Please provide enough information to help the release team
to judge the request efficiently. E.g. by filling in the
sections below.)

[ Reason ]
This is another of the regular postfix maintenance updates.  It
encompasses three upstream updates (3.7.7, 3.7.8, and 3.7.9) because
life intervened and I got behind.  This one is of particular importance/
urgency since it includes a new setting to address CVE-2023-51764.

[ Impact ]
Bugs remain unfixed, CVE-2023-51764 can be partially mitigated, but not
fully resolved.

[ Tests ]
There is a high level autopkgtest.

[ Risks ]
Risks are low.  These have all been released as part of upstream
maintenance and no regressions have been reported.  There are no changes
in Debian packaging.

[ Checklist ]
  [X] *all* changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in (old)stable
  [X] the issue is verified as fixed in unstable

[ Changes ]
  * 3.7.7
- Bugfix (bug introduced: 20140218): when opportunistic TLS fails
  during or after the handshake, don't require that a probe
  message spent a minimum time-in-queue before falling back to
  plaintext. Problem reported by Serg. File: smtp/smtp.h.
- Bugfix (defect introduced: 19980207): the valid_hostname()
  check in the Postfix DNS client library was blocking unusual
  but legitimate wildcard names (*.name) in some DNS lookup
  results and lookup requests. Examples:
  name  class/type value
*.one.example   IN CNAME *.other.example
*.other.example IN A 10.0.0.1
*.other.example IN TLSA  ..certificate info...
  Such syntax is blesed in RFC 1034 section 4.3.3.
  This problem was reported first in the context of TLSA
  record lookups. Files: util/valid_hostname.[hc],
  * 3.7.8
- Bugfix (defect introduced Postfix 2.5, 20080104): the Postfix
  SMTP server was waiting for a client command instead of
  replying immediately, after a client certificate verification
  error in TLS wrappermode. Reported by Andreas Kinzler. File:
  smtpd/smtpd.c.
- Usability: the Postfix SMTP server now attempts to log the
  SASL username after authentication failure. In Postfix
  logging, this appends ", sasl_username=xxx" after the reason
  for SASL authentication failure. The logging replaces an
  unavailable reason with "(reason unavailable)", and replaces
  an unavailable sasl_username with "(unavailable)". Based
  on code by Jozsef Kadlecsik. Files: xsasl/xsasl_server.c,
  xsasl/xsasl_cyrus_server.c, smtpd/smtpd_sasl_glue.c.
- Bugfix (defect introduced: Postfix 2.11): in forward_path,
  the expression ${recipient_delimiter} would expand to an
  empty string when a recipient address had no recipient
  delimiter. Fixed by restoring Postfix 2.10 behavior to use
  a configured recipient delimiter value. Reported by Tod
  A. Sandman. Files: proto/postconf.proto, local/local_expand.c.
  * 3.7.9 (Closes: #1059230)
- Addresses CVE-2023-51764, requires configuration change
- Security: with "smtpd_forbid_bare_newline = yes" (default
  "no" for Postfix < 3.9), reply with "Error: bare 
  received" and disconnect when an SMTP client sends a line
  ending in , violating the RFC 5321 requirement that
  lines must end in . This prevents SMTP smuggling
  attacks that target a recipient at a Postfix server. For
  backwards compatibility, local clients are excluded by
  default with "smtpd_forbid_bare_newline_exclusions =
  $mynetworks". Files: mantools/postlink, proto/postconf.proto,
  global/mail_params.h, global/smtp_stream.c, global/smtp_stream.h

[ Other info ]
The CVE fix requires a configuration change, which is not set be default
as it would likely break some configuratins.  We should be sure to
mention that in the SUA.

Scott K
diff -Nru postfix-3.7.6/debian/changelog postfix-3.7.9/debian/changelog
--- postfix-3.7.6/debian/changelog  2023-07-05 17:18:24.0 -0400
+++ postfix-3.7.9/debian/changelog  2023-12-24 12:33:24.0 -0500
@@ -1,3 +1,58 @@
+postfix (3.7.9-0+deb12u1) bookworm; urgency=medium
+
+  [Wietse Venema]
+
+  * 3.7.7
+- Bugfix (bug introduced: 20140218): when opportunistic TLS fails
+  during or after the handshake, don't require that a probe
+  message spent a minimum time-in-queue before falling back to
+  plaintext. Problem reported by Serg. File: smtp/smtp.h.
+- Bugfix (defect introduced: 19980207): the valid_hostname()
+  check in the Postfix DNS client library was blocking unusual
+  but legitimate wildcard names (*.name) in some DNS lookup
+  results and lookup requests. Examples:
+  name  class/type value
+*.one.example   IN CNAME *.other.example
+

Bug#1059401: [INTL:ro] Romanian debconf templates translation of "x2gobroker"

2023-12-24 Thread Remus-Gabriel Chelu

Package: x2gobroker
Version: 0.0.4.3-4
Severity: wishlist
Tags: l10n, patch

Dear Maintainer,

Please find attached the Romanian translation of the 
«x2gobroker_debconf» file.


A draft has been posted to the debian-l10n-romanian mailing list 
allowing for

review.
Please add it to your next package revision.

-
Thanks,
Remus-Gabriel# Mesajele în limba română pentru pachetul x2gobroker (debconf).
# Romanian translation of x2gobroker (debconf).
# Copyright © 2023 THE PACKAGE'S COPYRIGHT HOLDER
# This file is distributed under the same license as the x2gobroker package.
#
# Remus-Gabriel Chelu , 2023
#
msgid ""
msgstr ""
"Project-Id-Version: x2gobroker\n"
"Report-Msgid-Bugs-To: x2gobro...@packages.debian.org\n"
"POT-Creation-Date: 2019-02-03 11:44+0100\n"
"PO-Revision-Date: 2023-12-17 00:13+0100\n"
"Last-Translator: Remus-Gabriel Chelu \n"
"Language-Team: Romanian \n"
"Language: ro\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Plural-Forms: nplurals=3; plural=(n==1 ? 0 : n==0 || (n!=1 && n%100>=1 && "
"n%100<=19) ? 1 : 2);\n"
"X-Generator: Poedit 3.2.2\n"

#. Type: boolean
#. Description
#: ../x2gobroker-ssh.templates:2001
msgid "Create group for X2Go Broker SSH access now?"
msgstr ""
"Doriți să creați acum un grup pentru accesul SSH la brokerul de sesiune X2Go?"

#. Type: boolean
#. Description
#: ../x2gobroker-ssh.templates:2001
msgid ""
"In X2Go Session Broker, SSH-based broker access is controlled via the broker "
"users' membership in a dedicated group (default: x2gobroker-users)."
msgstr ""
"În brokerul de sesiune X2Go, accesul la brokerul bazat pe SSH este controlat "
"prin apartenența utilizatorilor brokerului la un grup dedicat (implicit: "
"x2gobroker-users)."

#. Type: boolean
#. Description
#: ../x2gobroker-ssh.templates:2001
msgid ""
"If this group is not created now, you will be asked to assign this privilege "
"to an existing group instead."
msgstr ""
"Dacă acest grup nu este creat acum, vi se va cere să atribuiți acest "
"privilegiu unui grup existent."

#. Type: boolean
#. Description
#: ../x2gobroker-ssh.templates:3001
msgid "Use an already existing group for X2Go Session Broker SSH access?"
msgstr ""
"Utilizați un grup deja existent pentru accesul SSH la brokerul de sesiune "
"X2Go?"

#. Type: boolean
#. Description
#: ../x2gobroker-ssh.templates:3001
msgid ""
"If there already exists a group (e.g. in an LDAP database) that you would "
"like to use for controlling X2Go Session Broker SSH access with, then you "
"can specify this group name with the next step."
msgstr ""
"Dacă există deja un grup (de exemplu, într-o bază de date LDAP) pe care "
"doriți să îl utilizați pentru a controla accesul SSH la brokerul de sesiune "
"X2Go, atunci puteți specifica acest nume de grup în pasul următor."

#. Type: boolean
#. Description
#: ../x2gobroker-ssh.templates:4001
msgid "Set up X2Go Session Broker SSH access later?"
msgstr "Configurați mai târziu accesul SSH la brokerul de sesiune X2Go?"

#. Type: boolean
#. Description
#: ../x2gobroker-ssh.templates:4001
msgid ""
"Without an existing group for X2Go Session Broker SSH access, the SSH broker "
"will not be usable by users. You have to set up things later, either "
"manually or via this configuration helper."
msgstr ""
"Fără un grup existent pentru accesul SSH la brokerul de sesiune X2Go, "
"brokerul SSH nu va putea fi utilizat de către utilizatori. Trebuie să "
"configurați lucrurile mai târziu, fie manual, fie prin intermediul acestui "
"ajutor de configurare."

#. Type: boolean
#. Description
#: ../x2gobroker-ssh.templates:4001
msgid ""
"A manual setup is only recommended, if you really know what have to do for "
"this."
msgstr ""
"O configurare manuală este recomandată doar dacă știți cu adevărat ce "
"trebuie să faceți pentru aceasta."

#. Type: boolean
#. Description
#: ../x2gobroker-ssh.templates:4001
msgid "Alternatively, the setup questions can be asked once more..."
msgstr "Alternativ, întrebările de configurare pot fi puse încă o dată..."

#. Type: string
#. Description
#: ../x2gobroker-ssh.templates:5001
msgid "X2Go Session Broker SSH access group:"
msgstr "Grupul de acces SSH la brokerul de sesiune X2Go:"

#. Type: string
#. Description
#: ../x2gobroker-ssh.templates:5001
msgid ""
"Please specify the group name for users with full X2Go Session Broker access "
"via SSH now."
msgstr ""
"Vă rugăm să specificați acum numele grupului pentru utilizatorii cu acces "
"complet la brokerul de sesiune X2Go prin SSH."

#. Type: boolean
#. Description
#: ../x2gobroker-ssh.templates:6001
msgid ""
"Delete the group that was formerly used for X2Go Session Broker SSH access?"
msgstr ""
"Ștergeți grupul care a fost utilizat anterior pentru accesul SSH la brokerul "
"de sesiune X2Go?"

#. Type: boolean
#. Description
#: ../x2gobroker-ssh.templates:6001
msgid "The group for X2Go Session Broker SSH access has been modified."
msgstr ""
"Grupul 

Bug#1059400: kubetail: Broken on Debian Bookworm ("syntax error near unexpected token") due to Bash 5.2 incompatibility

2023-12-24 Thread Joan Bruguera Micó
Package: kubetail
Version: 1.6.5-2
Severity: important
Tags: upstream

Dear Maintainer,

Unfortunately, attempting to use kubetail fails on Debian Bookworm.
In particular, any trivial use reports a "syntax error", as follows:

```
$ kubetail nginx
Will tail 2 logs...
nginx-deployment-7c79c4bf97-jdmkg
nginx-deployment-7c79c4bf97-p7bxr
/usr/bin/kubetail: eval: line 326: syntax error near unexpected token `kubectl'
/usr/bin/kubetail: eval: line 326: `kubectl  logs 
nginx-deployment-7c79c4bf97-jdmkg nginx -f=true --since=10s --tail=-1| 
while read -r; do echo "[nginx-deployment-7c79c4bf97-jdmkg] $REPLY " | tail -n 
+1; done  kubectl  logs nginx-deployment-7c79c4bf97-p7bxr nginx -f=true 
--since=10s --tail=-1| while read -r; do echo 
"[nginx-deployment-7c79c4bf97-p7bxr] $REPLY " | tail -n +1; done'
```

This error has been reported and fixed upstream, with the root cause
being a breaking change in Bash 5.2, the version used in Bookworm.
Upstream issue: https://github.com/johanhaleby/kubetail/issues/133

A fix for this issue has been merged in Kubetail 1.6.17:
https://github.com/johanhaleby/kubetail/pull/134

I'd be grateful if the version in Debian Bookworm can be updated or
include the fix above, as otherwise the package can not be used unless
one resolts to any of the workarounds published in the upstream issue.

Regards.

-- System Information:
Debian Release: 12.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.7.0-rc6-1001-mainline-git-00303-g3f82f1c3a036 (SMP w/16 CPU 
threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: unable to detect

-- no debconf information



Bug#1059395: libacl1, debhelper: changelog handling with --no-trim seems to be not binNMU-safe

2023-12-24 Thread Guillem Jover
Control: reassign -1 debhelper
Control: found -1 debhelper/13.11.4

On Sun, 2023-12-24 at 14:27:22 +, Simon McVittie wrote:
> Package: libacl1,debhelper
> Control: found -1 libacl1/2.3.1-3
> Control: found -1 debhelper/13.11.9
> Severity: important
> X-Debbugs-Cc: debian-rele...@lists.debian.org

> I notice that libacl1 uses dh_installchangelogs --no-trim in its
> debian/rules to suppress the default exclusion of older changelog
> entries. It appears that using that option also suppresses the separation
> of binNMU changelog entries into a separate file? I think it probably
> should not, because the trimming of old changelog entries is merely
> a nice-to-have to save some disk space, but the separation of binNMU
> changelog entries is functionally necessary if we want packages to remain
> multiarch co-installable across binNMUs.

Yes, I don't see why the old behavior, when requested explicitly,
would no longer behave as previously. This would seem like a regression
in debhelper due to the trimming handling.

> A sourceful upload of libacl1 would temporarily address this (until the
> next binNMU) by not being a binNMU, but would not be a long-term solution,
> unless we stop using binNMUs entirely and replace them with "no-changes"
> machine-assisted sourceful uploads like Ubuntu has done.

I've uploaded acl now with some minor pending changes I had queued as
a temporary workaround. But the obvious and correct way forward to me
is to fix debhelper (instead of having to change all affected packages,
or having to stop using binNMUs due to this…).

And I've just tested this and it also affects the current debhelper
version in Debian (stable) bookworm. :/

Thanks,
Guillem



Bug#1058938: bookworm-pu: package onionprobe/1.0.0+ds-2.1+deb12u1

2023-12-24 Thread Georg Faerber
Hi,

Sorry for the additional work:

On 23-12-24 16:31:37, Jonathan Wiltshire wrote:
> Something has gone wrong with your upload (a rebase maybe?):

The missing part of the changelog, as per the diff you sent, is
currently not part of the git history, which is problematic, I guess.

So if my above assumption is correct, I'll ensure that's recorded in git
accordingly, rebuild and upload again.

Jonathan, does the above make sense?

Thanks,
Georg



Bug#1059158: libreoffice-core-nogui: Can't open a spreadsheet from python uno because libforuilo.so is missing.

2023-12-24 Thread Rene Engelhard
retitle 1059158 libreoffice-core-nogui: Can't open a spreadsheet from 
python uno on 32bits because libforuilo.so is missing.


thanks


Hi,

Am 20.12.23 um 18:42 schrieb Gerard Henri Pille:

* What exactly did you do (or not do) that was effective (or
  ineffective)?


So this is even 32bit specific since on 64bit libforuilo.so is subsumed 
by libvmergedlo.so. (Which cannot be done on 32bit since libmergedlo.so 
is probably too big for 32bit to actually link it). Using arm64 (yes, 
even on rpi) would have rules this exact bug out ;)



But given libforuilo.so is inside libmergedlo.so in 64bit archs anyway 
we can just include it here since as said i's included in 64bits 
packages nevertheless.



Already in git (you got the mails).

No idea when this actually will end up in stable, though :)


Regards,


Rene



Bug#1059388: git-debrebase: found two-parent merge, how to cope?

2023-12-24 Thread Ian Jackson
Hi.

I'm going to reply off the cuff in the hope of getting you unstuck.
If this email doesn't nsuffice I'll take a look at your git
branch.  So please let me know how you get on.

Philipp Kern writes ("Bug#1059388: git-debrebase: found two-parent merge, how 
to cope?"):
> In the absence of a better venue of asking this question (there seems to
> be no mailing list): I have an upstream repository that contains a
> two-parent merge for some reason (https://github.com/twosigma/nsncd, of
> all the things merging a CLA into the repository). dgit bails out with
> this:

In git-debrebase, the upstream branches are supposed to be able to
contain any arbitrary stuff.

gdr is supposed to stop looking in detail at the commit structure as
soon as it finds the anchor, ie the last merge from into Debian.
These must all be done with gdr new-upstream.

> | Format `3.0 (quilt)', need to check/update patch stack
> | examining quilt state (multiple patches, linear mode)
..
> | git-debrebase: error: found unprocessable commit, cannot cope: general 
> two-parent merge (e3de17c274315bab561664ac57e46472670545cf)

I suspect that the upstream branch has been merged directly into your
packaging branch, rather than using git-debrebase --new-upstream ?

> I have so far forced an --anchor manually upon git-debrebase, which
> worked, but is also very tedious to pass everywhere. Is this something
> that will auto-fix itself on the next upstream release because dgit will
> properly discard the history pre the current upstream release? I was at
> least hoping that it would disappear with the first regular upload - but
> this did not happen.
..
> Is there something I can do for dgit to accept the current state of the
> repository as canonical up to the point where the Debian packaging was
> modified/forked off. The snags are upstream's prior packaging as found
> in the upstream repository, which does not seem to be uncommon to me
> either.

I'm not sure using --anchor is wise.  Certainly not routinely.

new-upstream would generate a new anchor, so you could use --anchor
once, assuming you're sure about which commit it is.

But if you merged from upstream *on top* of commits represending the
delta, that won't do the right thing.  It will abolish the delta and
start to try to treat them as part of the upstream, and then your next
attempt to make a source package will fail.

One thing you could try would be an invocation of
  git-debrebase --experimental-merge-resolution new-upstream

Or indeed
  git-debrebase --status


I think if my hypothesis about what has happened to your branch is
correct, my suggested remedy would be to make a new branch starting
just before the mistake, redo all subsequent work "properly" - without
introduce any merges other than via git-debrebase new-upstream.

Then when you have done that the result should be tressame to your
"messed up" branch, but have correct gdr history.

Then "git merge -s ours broken-branch" will make your fixed version ff
from the broken one and from then I hope everything will be fine?
(Maybe I should look up which branch of a completely tree-identical
merge gdr looks at, but I'm hoping that it's the one that is implied
by following the non-contributing parent of git merge -s ours.)


Don't spend too long on wrestling with this.  I can probably fix it up
in an hour or so.

Regards,
Ian.

-- 
Ian JacksonThese opinions are my own.  

Pronouns: they/he.  If I emailed you from @fyvzl.net or @evade.org.uk,
that is a private address which bypasses my fierce spamfilter.



Bug#1059345: libdatetime-timezone-perl 2.47-1+2023d flagged for acceptance

2023-12-24 Thread Jonathan Wiltshire
package release.debian.org
tags 1059345 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: libdatetime-timezone-perl
Version: 2.47-1+2023d

Explanation: update data to Olson database version 2023d (changes for 
Antarctica and Greenland)



Bug#1027779: ITP: receptor -- Link controllers with executors across a mesh of nodes

2023-12-24 Thread Jérémy Lal
Package: wnpp
Followup-For: Bug #1027779

ITP for golang-github-songgao-water: #1059399



Bug#1059399: ITP: golang-github-songgao-water -- A simple TUN/TAP library written in native Go.

2023-12-24 Thread Jérémy Lal
Package: wnpp
Severity: wishlist
Owner: Jérémy Lal 

* Package name: golang-github-songgao-water
  Version : 0.0~git20200317.2b4b6d7-1
  Upstream Author : Song Gao
* URL : https://github.com/songgao/water
* License : BSD-3-clause
  Programming Lang: Go
  Description : Simple TUN/TAP library for Go language

 This library is designed to be simple and efficient. It
 .
  * wraps almost only syscalls and uses only Go standard types;
  * exposes standard interfaces; plays well with standard packages like
io, bufio, etc..
  * does not handle memory management (allocating/destructing slice).
It's up to user to decide whether/how to reuse buffers.
  * has partial support for MacOS or Windows

This package will be go-team maintained, and seems to be pretty popular.
This is a build-dependency for receptor, a meshed network daemon needed by awx.


Bug#1058938: bookworm-pu: package onionprobe/1.0.0+ds-2.1+deb12u1

2023-12-24 Thread Jonathan Wiltshire
On Fri, Dec 22, 2023 at 12:08:41PM +, Georg Faerber wrote:
> On 23-12-21 21:52:08, Jonathan Wiltshire wrote:
> > Please go ahead.
> 
> Thanks, uploaded.

Something has gone wrong with your upload (a rebase maybe?):

| 1.0.0+ds/debian/changelog onionprobe-1.0.0+ds/debian/changelog
| --- onionprobe-1.0.0+ds/debian/changelog  2022-10-15 10:32:07.0 
+
| +++ onionprobe-1.0.0+ds/debian/changelog  2023-12-18 14:30:56.0 
+
| @@ -1,9 +1,10 @@
| -onionprobe (1.0.0+ds-2.1) unstable; urgency=medium
| +onionprobe (1.0.0+ds-2.1+deb12u1) bookworm; urgency=medium
|  
| -  * Non-maintainer upload.
| -  * No source change upload to rebuild with debhelper 13.10.
| +  * debian/patches:
| +- Pull in upstream fix to silence Tor if generating hashed passwords.
| +  (Closes: #1053204)
|  
| - -- Michael Biebl   Sat, 15 Oct 2022 12:32:07 +0200
| + -- Georg Faerber   Mon, 18 Dec 2023 14:30:56 +
|  
|  onionprobe (1.0.0+ds-2) unstable; urgency=medium

I will reject so that you can upload again with the same version.


-- 
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51
ed25519/0x196418AAEB74C8A1: CA619D65A72A7BADFC96D280196418AAEB74C8A1



Bug#1027779: ITP: receptor -- Link controllers with executors across a mesh of nodes

2023-12-24 Thread Jérémy Lal
Package: wnpp
Followup-For: Bug #1027779

Missing dependencies that I might bundle in a multiple upstream tarball,
because they look so specific:

- golang-github-prep-socketpair-dev
- golang-github-jupp0r-go-priority-queue-dev

Missing, needs to be packaged, some are already being worked on:

- golang-github-songgao-water (#inprocess)
- golang-github-k8s-io-api-dev
- golang-github-k8s-io-apimachinery-dev (#1012720)
- golang-github-k8s-io-client-go-dev

The k8s ones are missing golang-github-google-gnostic-models-dev,
which is in NEW, #1053000.



Bug#1059344: bookworm-pu: package libdatetime-timezone-perl/1:2.60-1+2023d

2023-12-24 Thread Jonathan Wiltshire
On Sat, Dec 23, 2023 at 01:36:11AM +0100, gregor herrmann wrote:
> 
> I've uploaded libdatetime-timezone-perl/1:2.60-1+2023d to bookworm.
> As usual, it contains the tzdata data 2023d as a quilt patch.

Thanks. Should it and the bullseye one be released to stable-updates as
usual? Text along the lines of the previous SUA?

Thanks,

-- 
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51
ed25519/0x196418AAEB74C8A1: CA619D65A72A7BADFC96D280196418AAEB74C8A1



Bug#983584: paraview: reproducible builds: Embeds running kernel in header files and binaries

2023-12-24 Thread James Addison
Source: paraview
Followup-For: Bug #983584
X-Debbugs-Cc: vagr...@reproducible-builds.org, 
reproducible-b...@lists.alioth.debian.org
Control: fixed -1 paraview/5.11.0~rc1+dfsg-1
Control: close -1

The patch provided has been included into the Debian package; however note
also that the third party library (catalyst) that it patched has been removed
from the upstream codebase, so the patch is commented-out in the patch series
file.



Bug#1026381: python-django-health-check: please make the build reproducible

2023-12-24 Thread James Addison
Source: python-django-health-check
Followup-For: Bug #1026381
X-Debbugs-Cc: la...@debian.org, reproducible-b...@lists.alioth.debian.org

I believe that this bug should disappear on build hosts that are using
dh-python version 6.20231204 or greater, where a fix for bug #1057432 means
that files with a dot ('.') prefix are excluded from binary packages.



Bug#1010279: python-iso8601: please make the build reproducible

2023-12-24 Thread James Addison
Source: python-iso8601
Followup-For: Bug #1010279
X-Debbugs-Cc: la...@debian.org, reproducible-b...@lists.alioth.debian.org

>From some recent build results, it seems there is a '.hypothesis' directory
that is also created within the project's directory at build-time, so it would
also be worth filtering that directory in addition to the '.pytest_cache' dir.

After searching around on sources.debian.org to find out how other packages
handle extraneous files like these, I learned of the 'debian/clean' file; that
might be a slightly neater (fewer scripted statements) exclusion approach.

Either way: I think that when building with dh-python/6.20231204 onwards, these
directories are automatically excluded from the binary package thanks to the
fix for #1056291 (an obscure filesystem os.walk bug in dh-python).



Bug#1059398: httping: New Upstream Version

2023-12-24 Thread Abhijith PA
Hello Olaf.

On 24/12/23 03:39 PM, Olaf van der Spek wrote:

> Hi,
> 
> A new version has been released upstream: 
> https://github.com/folkertvanheusden/HTTPing/releases

Yes, I started looking to it. I am in contact with the upstream 
developer as well.

Thank you



Bug#1059398: httping: New Upstream Version

2023-12-24 Thread Olaf van der Spek
Package: httping
Version: 2.5-5.2+b1
Severity: wishlist
X-Debbugs-Cc: olafvds...@gmail.com

Hi,

A new version has been released upstream: 
https://github.com/folkertvanheusden/HTTPing/releases

Olaf


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.6.8-amd64 (SMP w/2 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages httping depends on:
ii  libc6 2.37-13
ii  libfftw3-double3  3.3.10-1
ii  libncursesw6  6.4+20231209-1
ii  libssl3   3.1.4-2
ii  libtinfo6 6.4+20231209-1
ii  openssl   3.1.4-2

httping recommends no packages.

httping suggests no packages.

-- no debconf information



Bug#1059397: extrepo: please consider fish and zsh autocompletion for subcommands like "search" and "enable"

2023-12-24 Thread Carl Johnson
Package: extrepo
Version: 0.12
Severity: wishlist
X-Debbugs-Cc: kni9p...@anonaddy.me

Dear Maintainer,

please consider adding fish and zsh autocompletion for subcommands like
"search" and "enable" as this would greatly improve user experience.

Thanks


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.5.0-5-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages extrepo depends on:
ii  gpgv  2.2.40-1.1
ii  libcryptx-perl0.080-2
ii  libdpkg-perl  1.22.2
ii  libwww-perl   6.72-1
ii  libyaml-libyaml-perl  0.86+ds-1
ii  perl  5.36.0-10

Versions of packages extrepo recommends:
ii  extrepo-offline-data  1.0.3

extrepo suggests no packages.

-- Configuration Files:
/etc/extrepo/config.yaml changed:
---
url: https://extrepo-team.pages.debian.net/extrepo-data
dist: debian
version: sid
enabled_policies:
- main
- contrib
- non-free


-- no debconf information



Bug#1059382: kitty: Text rendering change

2023-12-24 Thread Wesley Schwengle



Hi Nilesh

On 12/24/23 03:19, Nilesh Patra wrote:


Thanks for reporting it and taking the time to bisect it as well!


The issue is that on a dark background with light text everything is made bold,
whereas previously this was not bold. I think it is wise to inform users that
`text_composition_strategy legacy` restores the old defaults (similar to the
version in stable) and/or refer to the manual page:

https://sw.kovidgoyal.net/kitty/conf/#opt-kitty.text_composition_strategy

If kitty can read a system-wide config it might be set there.


It can, but honestly I don't want to diverge from upstream here. Everyone may 
not like the said change and enforcing a system wide config for a composition 
change isn't something that I'm willing to do.

If you could, please consider opening up an upstream issue to see if we can 
reach a common ground. If not, I'll just add a d/NEWS entry informing 
users/sysadmin about this change.


I'm fine with adding a d/NEWS entry, that is mainly the reason why I 
reported the bug. I think it's worth a mention because it confused me 
quite a bit :)


Cheers,
Wesley


--
Wesley Schwengle
E: wes...@schwengle.net



Bug#1059396: PGP/GPG handling wrong

2023-12-24 Thread Jörg Frings-Fürst
Package: evolution
Version: 3.50.2-1
Severity: critical


I send all my e-mails with a PGP signature.

If the recipient replies including my signature, the email is 
displayed as "partially signed with GPG" and the reply is hidden.

This is incorrect, as it suggests that the reply is partially 
signed correctly, but this is fundamentally wrong, as the signature
does not originate from the sender. 

In addition, despite the incorrect signature, only the incorrectly
signed text is displayed and not the reply.

CU
Jörg

-- System Information:
Debian Release: trixie/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'testing'), (300, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.4.0-2-amd64 (SMP w/20 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages evolution depends on:
ii  dbus [default-dbus-system-bus]  1.14.10-3
ii  evolution-common3.50.2-1
ii  evolution-data-server   3.50.2-1
ii  libc6   2.37-12
ii  libcamel-1.2-64 3.50.2-1
ii  libclutter-gtk-1.0-01.8.4-4+b1
ii  libecal-2.0-2   3.50.2-1
ii  libedataserver-1.2-27   3.50.2-1
ii  libevolution3.50.2-1
ii  libglib2.0-02.78.3-1
ii  libgtk-3-0  3.24.38-6
ii  libical33.0.17-1
ii  libnotify4  0.8.3-1
ii  libwebkit2gtk-4.1-0 2.42.4-1
ii  libxml2 2.9.14+dfsg-1.3+b1
ii  psmisc  23.6-1

Versions of packages evolution recommends:
ii  evolution-plugin-bogofilter  3.50.2-1
ii  evolution-plugin-pstimport   3.50.2-1
ii  evolution-plugins3.50.2-1
ii  yelp 42.2-1

Versions of packages evolution suggests:
pn  evolution-ews   
ii  evolution-plugins-experimental  3.50.2-1
ii  gnupg   2.2.40-1.1
ii  network-manager 1.44.2-6

-- no debconf information


Bug#1059395: libacl1, debhelper: changelog handling with --no-trim seems to be not binNMU-safe

2023-12-24 Thread Simon McVittie
Package: libacl1,debhelper
Control: found -1 libacl1/2.3.1-3
Control: found -1 debhelper/13.11.9
Severity: important
X-Debbugs-Cc: debian-rele...@lists.debian.org

libacl1 was recently binNMU'd on all architectures to address version skew.
Unfortunately, the binNMU'd version is no longer multiarch co-installable
because its changelog differs between architectures:

│ │ ├── ./usr/share/doc/libacl1/changelog.Debian.gz
│ │ │ ├── changelog.Debian
│ │ │ │ @@ -1,13 +1,13 @@
│ │ │ │  acl (2.3.1-3+b1) sid; urgency=low, binary-only=yes
│ │ │ │
│ │ │ │ -  * Binary-only non-maintainer upload for amd64; no source changes.
│ │ │ │ +  * Binary-only non-maintainer upload for i386; no source changes.
│ │ │ │* Rebuild to sync binNMU versions
│ │ │ │
│ │ │ │ - -- all / amd64 / i386 Build Daemon (x86-conova-01) ...
│ │ │ │ + -- i386 Build Daemon (x86-grnet-01) ...

This binNMU changelog entry would normally be separated into
changelog.Debian.${DEB_HOST_ARCH}.gz, as can be seen in
/usr/share/doc/libxext6/ at the time of writing. However, that mechanism
doesn't seem to have been effective for libacl1.

I notice that libacl1 uses dh_installchangelogs --no-trim in its
debian/rules to suppress the default exclusion of older changelog
entries. It appears that using that option also suppresses the separation
of binNMU changelog entries into a separate file? I think it probably
should not, because the trimming of old changelog entries is merely
a nice-to-have to save some disk space, but the separation of binNMU
changelog entries is functionally necessary if we want packages to remain
multiarch co-installable across binNMUs.

A sourceful upload of libacl1 would temporarily address this (until the
next binNMU) by not being a binNMU, but would not be a long-term solution,
unless we stop using binNMUs entirely and replace them with "no-changes"
machine-assisted sourceful uploads like Ubuntu has done.

Not using --no-trim could address this from the libacl1 side, but
presumably the libacl1 maintainer has used that option intentionally and
for a reason. (Is that reason more important than having co-installable
binNMUs?)

Making --no-trim only disable the trimming of old changelog entries, but
retain the separation of binNMU changelog entries (and then binNMU'ing
libacl1 again) could address this from the debhelper side.

I don't know which of these ways forward is the right one. Please reassign
or clone as appropriate, and in the meantime please consider doing a
sourceful upload of libacl1 to unblock multi-arch co-installability.

Thanks,
smcv



Bug#896016: strace: please make the build reproducible

2023-12-24 Thread James Addison
Source: strace
Followup-For: Bug #896016
X-Debbugs-Cc: la...@debian.org, reproducible-b...@lists.alioth.debian.org
Control: fixed -1 strace/4.26-0.1
Control: close -1 



Bug#1021207: lintian: Please reconsider the type and size of field-too-long

2023-12-24 Thread Faidon Liambotis
On Mon, Oct 03, 2022 at 07:57:36PM +0200, Mathias Behrle wrote:
> E: tryton-modules-all: field-too-long Depends (5604 chars > 5000)
>
> 
>
> Looking at #942943 and #942487 it looks as if the issue with reprepro
> should be mitigated with 
> https://salsa.debian.org/debian/reprepro/-/commit/7cb8fcf53c077467c4f38b5a48f706e7b5f75f4c
> 
> So I am asking for re-evaluation and/or advice
> 
> - if this limitation still stands?
> - if the former is true this shouldn't be rather a warning than an
>   error?
> - if the former is true the only way out is to split the Depends into
>   sub-packages?

For what it's worth, we're seeing this error trigger in podman, for the
Built-Using field (it's golang)

Lintian already has exceptions for "package-list" and "description" (per
#942493), and while we could also add "Built-Using" to the list, I kinda
wonder if this is a game of a whack-a-mole and this heuristic should be
revisited, especially in the light of the reprepro fix mentioned by
Mathias above.

Thanks,
Faidon



Bug#1058887: issue persists with kernel 6.6.8

2023-12-24 Thread Jean-Marc

After today's upgrade bringing linux-image-6.6.8 to sid, issue persists.

Switching off my iwlwifi device makes nmcli unusable.

It also blocks firefox.

And "sudo any-command" hangs, impossible to break it.

Powering off/rebooting the system is also impossible.

--
Jean-Marc



Bug#1059394: bridge-utils: install files into /usr (instead of /)

2023-12-24 Thread Chris Hofstaedtler
Source: bridge-utils
Version: 1.7.1-1
Severity: normal
Tags: patch
User: helm...@debian.org
Usertags: dep17m2

Hi!

Your package installs files directly into /. For the ongoing Debian
UsrMerge effort [1] these files should move to /usr in the trixie
cycle.

I'm attaching a patch to implement such a move.

However, please still read the wiki page on moving files, especially
if you intend to backport to bookworm or earlier. The patch has
already been checked by a local dumat copy.

If during the trixie cycle your package will undergo structural
changes or any other file moves, please also see the wiki and upload
to experimental first when these changes are done.

Chris

[1] https://wiki.debian.org/UsrMerge
diff -Nru bridge-utils-1.7.1/debian/bridge-network-interface.sh bridge-utils-1.7.1/debian/bridge-network-interface.sh
--- bridge-utils-1.7.1/debian/bridge-network-interface.sh	2023-01-25 22:11:52.0 +0100
+++ bridge-utils-1.7.1/debian/bridge-network-interface.sh	2023-12-23 21:31:44.0 +0100
@@ -19,7 +19,7 @@
 
 [ "$BRIDGE_HOTPLUG" = "no" ] && exit 0
 
-. /lib/bridge-utils/bridge-utils.sh
+. /usr/lib/bridge-utils/bridge-utils.sh
 
 if [ -d /run/network ]; then
for i in $(ifquery --list --allow auto); do
diff -Nru bridge-utils-1.7.1/debian/changelog bridge-utils-1.7.1/debian/changelog
--- bridge-utils-1.7.1/debian/changelog	2023-01-25 22:11:52.0 +0100
+++ bridge-utils-1.7.1/debian/changelog	2023-12-23 21:31:44.0 +0100
@@ -1,3 +1,10 @@
+bridge-utils (1.7.1-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Install files into /usr instead of /. (Closes: #-1)
+
+ -- Chris Hofstaedtler   Sat, 23 Dec 2023 21:31:44 +0100
+
 bridge-utils (1.7.1-1) unstable; urgency=low
 
   * New upstream version.
diff -Nru bridge-utils-1.7.1/debian/dirs bridge-utils-1.7.1/debian/dirs
--- bridge-utils-1.7.1/debian/dirs	2023-01-25 22:11:52.0 +0100
+++ bridge-utils-1.7.1/debian/dirs	2023-12-23 21:31:44.0 +0100
@@ -1,6 +1,6 @@
 etc/network/if-pre-up.d
 etc/network/if-down.d
 etc/network/if-post-down.d
-sbin
-lib/bridge-utils
-lib/udev
+usr/sbin
+usr/lib/bridge-utils
+usr/lib/udev
diff -Nru bridge-utils-1.7.1/debian/examples/hibernate bridge-utils-1.7.1/debian/examples/hibernate
--- bridge-utils-1.7.1/debian/examples/hibernate	2023-01-25 22:11:52.0 +0100
+++ bridge-utils-1.7.1/debian/examples/hibernate	2023-12-23 21:31:44.0 +0100
@@ -6,7 +6,7 @@
 AddConfigHandler BridgeOptions
 
 BridgeSuspend() {
-for i in `/sbin/brctl show|sed -n "s/^[^ ]*\t\([^\t]*\)/\1/p"`
+for i in `/usr/sbin/brctl show|sed -n "s/^[^ ]*\t\([^\t]*\)/\1/p"`
 do
   ip link set dev $i down
 done
@@ -14,7 +14,7 @@
 }
 
 BridgeResume() {
-for i in `/sbin/brctl show|sed -n "s/^[^ ]*\t\([^\t]*\)/\1/p"`
+for i in `/usr/sbin/brctl show|sed -n "s/^[^ ]*\t\([^\t]*\)/\1/p"`
 do
   ip link set dev $i up
 done
diff -Nru bridge-utils-1.7.1/debian/examples/pm-utils bridge-utils-1.7.1/debian/examples/pm-utils
--- bridge-utils-1.7.1/debian/examples/pm-utils	2023-01-25 22:11:52.0 +0100
+++ bridge-utils-1.7.1/debian/examples/pm-utils	2023-12-23 21:31:44.0 +0100
@@ -4,7 +4,7 @@
 # as /etc/pm/sleep.d/bridge
 
 BridgeSuspend() {
-for i in `/sbin/brctl show|sed -n "s/^[^ ]*\t\([^\t]*\)/\1/p"`
+for i in `/usr/sbin/brctl show|sed -n "s/^[^ ]*\t\([^\t]*\)/\1/p"`
 do
   ip link set dev $i down
 done
@@ -12,7 +12,7 @@
 }
 
 BridgeResume() {
-for i in `/sbin/brctl show|sed -n "s/^[^ ]*\t\([^\t]*\)/\1/p"`
+for i in `/usr/sbin/brctl show|sed -n "s/^[^ ]*\t\([^\t]*\)/\1/p"`
 do
   ip link set dev $i up
 done
diff -Nru bridge-utils-1.7.1/debian/ifupdown.sh bridge-utils-1.7.1/debian/ifupdown.sh
--- bridge-utils-1.7.1/debian/ifupdown.sh	2023-01-25 22:11:52.0 +0100
+++ bridge-utils-1.7.1/debian/ifupdown.sh	2023-12-23 21:31:44.0 +0100
@@ -6,7 +6,7 @@
 # Have a look at /usr/share/doc/bridge-utils/README.Debian if you want
 # more info about the way on wich a bridge is set up on Debian.
 
-if [ ! -x /sbin/brctl ]
+if [ ! -x /usr/sbin/brctl ]
 then
   exit 0
 fi
@@ -14,7 +14,7 @@
 #default configuration
 [ -f /etc/default/bridge-utils ] && . /etc/default/bridge-utils
 
-. /lib/bridge-utils/bridge-utils.sh
+. /usr/lib/bridge-utils/bridge-utils.sh
 
 case "$IF_BRIDGE_PORTS" in
 "")
diff -Nru bridge-utils-1.7.1/debian/rules bridge-utils-1.7.1/debian/rules
--- bridge-utils-1.7.1/debian/rules	2023-01-25 22:11:52.0 +0100
+++ bridge-utils-1.7.1/debian/rules	2023-12-23 21:31:44.0 +0100
@@ -64,13 +64,13 @@
 
 	# Add here commands to install the package into debian/tmp.
 	#$(MAKE) install prefix=$(CURDIR)/debian/bridge-utils/usr
-	$(INSTALL_PROGRAM) -m 755 brctl/brctl $(IDIR)/sbin
-	$(INSTALL_SCRIPT) -m 755 debian/ifupdown.sh $(IDIR)/lib/bridge-utils/
-	ln -s /lib/bridge-utils/ifupdown.sh $(IDIR)/etc/network/if-pre-up.d/bridge
-	ln -s /lib/bridge-utils/ifupdown.sh $(IDIR)/etc/network/if-down.d/bridge
-	

Bug#1000044: ccze: depends on obsolete pcre3 library

2023-12-24 Thread Yavor Doganov
Axel Beckert wrote:
> sorry for the late reply, but I only managed to continue on this now
> as I'm on holidays now.

No problem at all, we are all busy.  And it's not late according to my
standards.  :)

> I though got another crash on this line:
> 
> Dec 24 06:43:16 c6 kernel: net_ratelimit: 1 callbacks suppressed

Good catch!  This is a case when process is allocated by
pcre2_substring_get_bynumber but since there are no square brackets
around, the strdup call at line 68 doesn't happen.

> I think I managed to fix it and will also upload, but I'd be happy for
> a short review of yours:

Removing the free call avoids the abort but leads to a memory leak.
Attached is a better fix, I think (tested with your line above and my
syslog, and of course with valgrind).
diff --git a/debian/patches/pcre2.patch b/debian/patches/pcre2.patch
index a5ee6b3..334d4e3 100644
--- a/debian/patches/pcre2.patch
+++ b/debian/patches/pcre2.patch
@@ -2473,7 +2473,7 @@ Last-Update: 2023-12-24
  {
char *date = NULL, *host = NULL, *send = NULL, *process = NULL;
char *msg = NULL, *pid = NULL, *tmp = NULL, *toret;
-+  int use_free = 0;
++  int msg_use_free = 0, process_use_free = 0;
 +  size_t l;

 -  pcre_get_substring (str, offsets, match, 1, (const char **));
@@ -2488,7 +2488,7 @@ Last-Update: 2023-12-24
 -msg = strdup (send);
 +{
 +  msg = strdup (send);
-+  use_free = 1;
++  msg_use_free = 1;
 +}
else
  {
@@ -2499,7 +2499,7 @@ Last-Update: 2023-12-24
  }

if (process)
-@@ -60,8 +64,8 @@
+@@ -60,8 +64,9 @@
  
  pid = strndup ([1], (size_t)(t2 - t - 1));
  tmp = strndup (process, (size_t)(t - process));
@@ -2507,10 +2507,11 @@ Last-Update: 2023-12-24
 -process = tmp;
 +pcre2_substring_free (process);
 +process = strdup (tmp);
++process_use_free = 1;
}
  }
  
-@@ -87,12 +91,17 @@
+@@ -87,12 +92,20 @@
else
  toret = strdup (send);
  
@@ -2522,18 +2523,21 @@ Last-Update: 2023-12-24
 +  pcre2_substring_free (date);
 +  pcre2_substring_free (host);
 +  pcre2_substring_free (send);
-+  /* free (process); */
free (pid);
 +  free (tmp);
 +
-+  if (use_free)
++  if (process_use_free)
++free (process);
++  else
++pcre2_substring_free (process);
++  if (msg_use_free)
 +free (msg);
 +  else
 +pcre2_substring_free (msg);
  
return toret;
  }
-@@ -100,33 +109,34 @@
+@@ -100,33 +113,34 @@
  static void
  ccze_syslog_setup (void)
  {


Bug#1059393: openssh: CVE-2023-51767

2023-12-24 Thread Salvatore Bonaccorso
Source: openssh
Version: 1:9.6p1-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi Colin,

The following vulnerability was published for openssh. This is for now
just to track the issue as pointed out by a current paper. Apparently
openssh and sudo got CVEs assigned for their respective issues.

CVE-2023-51767[0]:
| OpenSSH through 9.6, when common types of DRAM are used, might allow
| row hammer attacks (for authentication bypass) because the integer
| value of authenticated in mm_answer_authpassword does not resist
| flips of a single bit. NOTE: this is applicable to a certain threat
| model of attacker-victim co-location in which the attacker has user
| privileges.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-51767
https://www.cve.org/CVERecord?id=CVE-2023-51767
[1] https://arxiv.org/abs/2309.02545

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Bug#1057240: alsa-utils: diff for NMU version 1.2.10-1.1

2023-12-24 Thread Chris Hofstaedtler
Control: tags 1057240 + patch
Control: tags 1057240 + pending


Dear maintainer,

I've prepared an NMU for alsa-utils (versioned as 1.2.10-1.1) and
uploaded it to DELAYED/7.
The NMU/patch also fixes the install path for systemd units and
moves the d-i script.

Chris

diff -Nru alsa-utils-1.2.10/debian/alsa-utils-udeb.install alsa-utils-1.2.10/debian/alsa-utils-udeb.install
--- alsa-utils-1.2.10/debian/alsa-utils-udeb.install	2019-10-30 11:35:09.0 +0100
+++ alsa-utils-1.2.10/debian/alsa-utils-udeb.install	2023-12-24 12:42:40.0 +0100
@@ -1,4 +1,4 @@
-debian/S37alsa-utils-udeb lib/debian-installer-startup.d
+debian/S37alsa-utils-udeb usr/lib/debian-installer-startup.d
 debian/utils.sh /usr/share/alsa
 usr/bin/amixer
 usr/sbin/alsactl
diff -Nru alsa-utils-1.2.10/debian/changelog alsa-utils-1.2.10/debian/changelog
--- alsa-utils-1.2.10/debian/changelog	2023-09-13 15:45:59.0 +0200
+++ alsa-utils-1.2.10/debian/changelog	2023-12-24 12:42:40.0 +0100
@@ -1,3 +1,14 @@
+alsa-utils (1.2.10-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Use udevdir from udev.pc to determine udev rules install path.
+(Closes: #1057240)
+  * Use systemdsystemunitdir from systemd.pc to determine systemd unit install
+path.
+  * udeb: move debian-installer-startup.d/S37alsa-utils-udeb into /usr/lib.
+
+ -- Chris Hofstaedtler   Sun, 24 Dec 2023 12:42:40 +0100
+
 alsa-utils (1.2.10-1) unstable; urgency=medium
 
   * New upstream release.
diff -Nru alsa-utils-1.2.10/debian/control alsa-utils-1.2.10/debian/control
--- alsa-utils-1.2.10/debian/control	2023-06-13 13:42:46.0 +0200
+++ alsa-utils-1.2.10/debian/control	2023-12-24 12:40:58.0 +0100
@@ -14,6 +14,7 @@
pkg-config,
python3-docutils,
systemd,
+   systemd-dev,
xmlto
 Standards-Version: 4.6.2
 Homepage: https://www.alsa-project.org/
diff -Nru alsa-utils-1.2.10/debian/install alsa-utils-1.2.10/debian/install
--- alsa-utils-1.2.10/debian/install	2022-07-06 03:17:35.0 +0200
+++ alsa-utils-1.2.10/debian/install	2023-12-24 12:42:40.0 +0100
@@ -1,6 +1,6 @@
 debian/utils.sh /usr/share/alsa
-lib/systemd
-lib/udev
+${env:deb_systemdsystemunitdir}
+${env:deb_udevdir}/rules.d
 usr/bin
 usr/lib/*/alsa-topology/*.so
 usr/sbin
diff -Nru alsa-utils-1.2.10/debian/links alsa-utils-1.2.10/debian/links
--- alsa-utils-1.2.10/debian/links	2019-10-30 11:35:09.0 +0100
+++ alsa-utils-1.2.10/debian/links	2023-12-24 12:42:40.0 +0100
@@ -1,3 +1,3 @@
-dev/null			lib/systemd/system/alsa-utils.service
+dev/null			${env:deb_systemdsystemunitdir}/alsa-utils.service
 usr/bin/aplay			usr/bin/arecord
 usr/share/man/man1/aplay.1.gz	usr/share/man/man1/arecord.1.gz
diff -Nru alsa-utils-1.2.10/debian/rules alsa-utils-1.2.10/debian/rules
--- alsa-utils-1.2.10/debian/rules	2023-09-13 15:45:07.0 +0200
+++ alsa-utils-1.2.10/debian/rules	2023-12-24 12:41:31.0 +0100
@@ -1,6 +1,8 @@
 #!/usr/bin/make -f
 DEB_HOST_MULTIARCH ?= $(shell dpkg-architecture -qDEB_HOST_MULTIARCH)
 export DEB_BUILD_MAINT_OPTIONS = hardening=+all
+export deb_udevdir = $(shell pkg-config --variable=udevdir udev | sed s,^/,,)
+export deb_systemdsystemunitdir = $(shell pkg-config --variable=systemdsystemunitdir systemd | sed s,^/,,)
 
 %:
 	dh $@
@@ -10,7 +12,7 @@
 			--with-asound-state-dir=/var/lib/alsa \
 			--with-alsactl-home-dir=/run/alsa \
 			--with-alsactl-runtime-dir=/run/alsa/runtime \
-			--with-systemdsystemunitdir=/lib/systemd/system \
+			--with-systemdsystemunitdir=/$(deb_systemdsystemunitdir) \
 			--disable-alsaconf
 
 override_dh_auto_test:


Bug#1059187: samba: installs files into /lib/...

2023-12-24 Thread Chris Hofstaedtler
On Sun, Dec 24, 2023 at 12:54:09PM +0300, Michael Tokarev wrote:
> Control: tag -1 + confirmed moreinfo
> 
> 21.12.2023 03:09, Chris Hofstaedtler :
> > For the correct place of the systemd system units, you can ask:
> > pkg-config --variable=systemdsystemunitdir systemd
> > Provided you add systemd-dev to Build-Depends.
> 
> /lib/systemd is currently hard-coded in samba's d/rules (and repeated
> in multiple places).  It's easy to fix, but.
> 
> The same samba package is being built on multiple distributions and
> releases, including ubuntu focal and jammy, debian bullseye and buster, -
> I provide sort of backports for these releases and this service has
> become quite popular.  The suggested
> 
>   pkg-config --variable=systemdsystemunitdir systemd
> 
> does not work on bullseye already.

This should work on bullseye, provided you Build-Depend: systemd.

> What's an alternative way to determine if we should use /lib or /usr/lib
> which works in older releases too - for systemd and for system libs like
> libnss*?

For systemd, please use systemd.pc.

For everything else, it is harder:

One option is to use dh_movetousr if available in debhelper, and
otherwise skip it (= on old suites).

For PAM, I'm guessing you can query libdir from pam.pc. 
Note that there is no coordinated plan for PAM yet, so while I hope
pam.pc will, in the future, have a /usr/lib/... libdir, you cannot
exactly rely on it. However, because the paths are aliased, if you
move today it will still work.

For nsswitch, I have no useful answer. Maybe piggyback on something
else (pam?) even if that is technically wrong, or hardcode old suite
names?

Chris



Bug#1058034: webkit2gtk: 2.43 fails to build on riscv64

2023-12-24 Thread Jeremy Bícha
On Thu, Dec 21, 2023 at 8:26 AM Alberto Garcia  wrote:
> Ok, I wanted to upload 2.43.3 to experimental today and I decided to
> include that patch.

Debian's riscv64 build succeeded.

https://buildd.debian.org/status/package.php?p=webkit2gtk=experimental

Thank you,
Jeremy Bícha



Bug#1058767: netplug: unmaintained

2023-12-24 Thread Pali Rohár
On Wednesday 20 December 2023 22:32:38 Chris Hofstaedtler wrote:
> Hi,
> 
> * Pali Rohár  [231216 11:35]:
> > On Friday 15 December 2023 21:56:01 Chris Hofstaedtler wrote:
> > Hello, I talked with the author of the netplug (Bryan O'Sullivan) and I
> > got permission to continue working on this project. I can continue
> > maintaining this package on Debian, so please let me know what is needed
> > to fix for preventing its removal. Thanks.
> 
> Well, the immediate thing to do is: close this bug.

Ok, I have closed it.

> But the more important thing: actually maintain the package,
> including ongoing quality work in the packaging, responding
> to/fixing bugs, etc.
> 
> If I were in your shoes, I'd make sure to know if/where the users of
> this package are. If all users are using vyos, then maybe its better
> maintained as part of vyos, and removed from Debian.
> Debian has a number of other things that can react to network
> events, some of those have active upstreams ...
> 
> Best,
> Chris

I'm going to ask vyos what they think about it and decide next steps
then. Thanks.



Bug#1059266: error: cannot verify inline signature

2023-12-24 Thread Aurelien Jarno
Hi

On 2023-12-22 23:30, Guillem Jover wrote:
> I'll prepare an upload right away and force the code to use gpg for
> now (as it was used before the recent upload, instead of trying gpgv,
> sqop, pgpainless-cli, or sq), until I've devised a better migration
> plan, or implemented enough configuration options for people to switch
> or use other OpenPGP backends when desired.

Thanks, I confirm it fixes the issue.

Cheers
Aurelien

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://aurel32.net



Bug#1000044: ccze: depends on obsolete pcre3 library

2023-12-24 Thread Axel Beckert
Control: tag -1 + pending

Hi Yavor,

sorry for the late reply, but I only managed to continue on this now
as I'm on holidays now.

Yavor Doganov wrote:
> Here it is -- no memory leaks and I could not obtain crash or abort
> with the logs I've tested.  Note that while my original patch
> introduced some leaks, it also fixes some in the original code.

Thanks again for these patches! They indeed work much better than
before this set of patches. I though got another crash on this line:

Dec 24 06:43:16 c6 kernel: net_ratelimit: 1 callbacks suppressed

I think I managed to fix it and will also upload, but I'd be happy for
a short review of yours:

Backtrace is as follows:

Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `ccze -A'.
Program terminated with signal SIGABRT, Aborted.
#0  __pthread_kill_implementation (threadid=, 
signo=signo@entry=6, no_tid=no_tid@entry=0) at ./nptl/pthread_kill.c:44
44  ./nptl/pthread_kill.c: No such file or directory.
(gdb) bt
#0  __pthread_kill_implementation (threadid=, 
signo=signo@entry=6, no_tid=no_tid@entry=0) at ./nptl/pthread_kill.c:44
#1  0x7fe6a065715f in __pthread_kill_internal (signo=6, threadid=) at ./nptl/pthread_kill.c:78
#2  0x7fe6a0609472 in __GI_raise (sig=sig@entry=6) at 
../sysdeps/posix/raise.c:26
#3  0x7fe6a05f34b2 in __GI_abort () at ./stdlib/abort.c:79
#4  0x7fe6a05f41ed in __libc_message (fmt=fmt@entry=0x7fe6a076678c "%s\n") 
at ../sysdeps/posix/libc_fatal.c:150
#5  0x7fe6a0660a75 in malloc_printerr (str=str@entry=0x7fe6a076422c 
"free(): invalid pointer") at ./malloc/malloc.c:5658
#6  0x7fe6a06627f4 in _int_free (av=, p=, 
have_lock=have_lock@entry=0) at ./malloc/malloc.c:4432
#7  0x7fe6a066516f in __GI___libc_free (mem=) at 
./malloc/malloc.c:3367
#8  0x7fe6a05b6467 in ccze_syslog_process (offsets=0x558834ff3170) at 
./src/mod_syslog.c:97
#9  ccze_syslog_handle (str=, length=, 
rest=0x7fffc99b28c8) at ./src/mod_syslog.c:134
#10 0x558833642a2f in ccze_plugin_run 
(pluginset=pluginset@entry=0x558834fefd30, 
subject=subject@entry=0x558834fe59c0 "Dec 24 06:43:16 c6 kernel: 
net_ratelimit: 1 callbacks suppressed", subjlen=64, 
rest=rest@entry=0x7fffc99b28c8, 
type=type@entry=CCZE_PLUGIN_TYPE_FULL, 
handled=handled@entry=0x7fffc99b28a4, status=0x7fffc99b28a8) at 
./src/ccze-plugin.c:327
#11 0x558833640616 in ccze_main () at ./src/ccze.c:706
#12 main (argc=, argv=) at ./src/ccze.c:756

Commenting out the "free (process);" in line 97 of src/mod_syslog.c
via the pcre2.patch seems to have fixed that:
https://salsa.debian.org/debian/ccze/-/commit/11b90155a6559e2121836483c2acacf35d8fca3b

Do you think that change would have any other impact? At least no more
crashes, so I'll upload anyway. But if you find some drawbacks, please
tell me.

Regards, Axel
-- 
 ,''`.  |  Axel Beckert , https://people.debian.org/~abe/
: :' :  |  Debian Developer, ftp.ch.debian.org Admin
`. `'   |  4096R: 2517 B724 C5F6 CA99 5329  6E61 2FF9 CD59 6126 16B5
  `-|  1024D: F067 EA27 26B9 C3FC 1486  202E C09E 1D89 9593 0EDE



Bug#896016: strace: please make the build reproducible

2023-12-24 Thread Chris Lamb
James Addison wrote:

> Unfortunately there are plenty of FTBFS failures -- mostly test timeouts on
> some architectures, alongside libfaketime errors that seem to affect i386 --
> but those seem like separate problems.  Perhaps we could close this bug?

Sure thing: as in, I agree that the FTBFS's are a separate problem
and also that this bug can be closed. Can you go ahead and do so,
presumably with the correct versioning? Many thanks.


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org  chris-lamb.co.uk
   `-



Bug#1059376: [Pkg-pascal-devel] Bug#1059376: lcl is wrongly marked Multi-Arch: foreign

2023-12-24 Thread Helmut Grohne
Hi,

On Sun, Dec 24, 2023 at 08:51:54AM +0100, Abou Al Montacir wrote:
> Just like lcl, lcl-2.2 is also a virtual package.

This is technically wrong. The term "virtual package" refers to a binary
package name that is provided by some package but doesn't exist as a
.deb. Both lcl and lcl-2.2 exist as .deb files and thus are called
"concrete packages".

> If I look to all other virtual packages, they are Arch: all, and I tend to 
> agree
> with that.

Since virtual packages do not exist as concrete packages, they do not
have an Architecture field and inherit their architecture from the
providing concrete packages. I sense that your use of "virtual packages"
does not match the definitions in Debian policy section 7.5.

I guess that what you mean here is more commonly called "meta package"
or "dependency package".  Does that make sense to you?

> However, I'm not very familiar with multi-arch subtleties.

I am, but I am very much unfamiliar with Pascal, so we will only make a
dent on this if we manage to combine our knowledge.

> So if you want to fix this, please provide a proposal for then entire set of
> packages.
> 
> I would glad then to fix it.

I fear that my knowledge of Pascal is too limited here, but let me try
anway:

lazarus-2.2 and lazarus look like a metapackages. They presently are
A:all and implicitly M-A:no. That much seems fine to me. Due to
depending on lcl-2.2, they must not become M-A:foreign.

lazarus-src-2.2 and lazarus-src are A:all M-A:foreign and binary
packages containing source code only are commonly that way.

lazarus-ide-2.2, lazarus-ide-gtk2-2.2, lazarus-ide-qt5-2.2,
lcl-utils-2.2, lcl-units-2.2, lcl-nogui-2.2, lcl-gtk2-2.2 and
lcl-qt5-2.2 are A:any and implicitly M-A:no. I'd leave it that way
unless there is a need for change.

lcl-2.2 is A:any M-A:same. This is a metapackage for libraries and A:any
M-A:same is commonly correct for libraries.

lazarus-doc-2.2 and lazarus-doc are A:all M-A:foreign and binary
packages containing documentation only are commonly that way.

lazarus-ide, lazarus-ide-gtk2, lazarus-ide-qt5, lcl-utils, lcl-units,
lcl-nogui, lcl-gtk2 and lcl-qt5 are A:all and implicitly M-A:no. These
are metapackages and those typically have their Architecture field match
the one they forward to, but this is not the case here. It's not clear
whether this needs to change. As long as we only need it for the native
architecture, this can be fine. They must not become M-A:foreign though.

lcl is much like lazarus-ide and friends except that it is M-A:foreign
and this is what this bug report is about.

When I say "need to change" I mean an actual unresolvable dependency
that happens in some practical setting such as cross building (which is
what motivated this bug report). It seems very likely that we'll have to
work on #845498 before there is any need for lazarus, so keeping these
A:all metapackages for now makes sense to me. Just try to remember that
when someone comes a long and says "lcl-units should be M-A:foreign,
because this dependency is not resolvable" that it must not be
M-A:foreign and instead that'd be the time to convert it from A:all to
A:any. Until that happens, I think you're fine.

On the flip side, lcl presently being M-A:foreign is promising that
interfacing with lcl is independent of the architecture and this is a
lie. We should not be making this promise and thus remove M-A:foreign
there as it misleads a dependency resolver in finding a solution that
totally does not work at all in practice and causes me to file annoying
bug reports about your package. :)

So this really is only about removing that one M-A:foreign line from
d/control. And then once we moved forward on #845498, then revisit the
other metapackages in a distant future.

Helmut



Bug#1059392: eboard FTCBFS: builds for the build architecture

2023-12-24 Thread Helmut Grohne
Source: eboard
Version: 1.1.3-2
Tags: patch
User: debian-cr...@lists.debian.org
Usertags: ftcbfs

eboard fails to cross build from source, because it uses the build
architecture compiler as a make default. Consider applying the attached
patch to let dpkg's buildtools.mk initialize CC correctly for cross
compilation.

Helmut
diff --minimal -Nru eboard-1.1.3/debian/changelog eboard-1.1.3/debian/changelog
--- eboard-1.1.3/debian/changelog   2023-09-04 20:21:10.0 +0200
+++ eboard-1.1.3/debian/changelog   2023-12-22 11:19:12.0 +0100
@@ -1,3 +1,9 @@
+eboard (1.1.3-3) UNRELEASED; urgency=medium
+
+  * Fix FTCBFS: Let dpkg's buildtools.mk initialize CC. (Closes: #-1)
+
+ -- Helmut Grohne   Fri, 22 Dec 2023 11:19:12 +0100
+
 eboard (1.1.3-2) unstable; urgency=medium
 
   * QA upload.
diff --minimal -Nru eboard-1.1.3/debian/rules eboard-1.1.3/debian/rules
--- eboard-1.1.3/debian/rules   2023-09-04 20:21:10.0 +0200
+++ eboard-1.1.3/debian/rules   2023-12-22 11:19:12.0 +0100
@@ -2,6 +2,7 @@
 
 export DEB_BUILD_MAINT_OPTIONS = hardening=+all
 
+-include /usr/share/dpkg/buildtools.mk
 include /usr/share/dpkg/buildflags.mk
 
 %:


Bug#1059391: tgt FTCBFS: debian/rules hard codes the build architecture pkg-config

2023-12-24 Thread Helmut Grohne
Source: tgt
Version: 1:1.0.85-1.1
Tags: patch
User: debian-cr...@lists.debian.org
Usertags: ftcbfs

tgt fails to cross build from source, because debian/rules hard codes
the build architecture pkg-config causing a misdetection and subsequent
failure in dh_install. I'm attaching a patch for your convenience.

Helmut
diff --minimal -Nru tgt-1.0.85/debian/changelog tgt-1.0.85/debian/changelog
--- tgt-1.0.85/debian/changelog 2023-11-17 22:35:38.0 +0100
+++ tgt-1.0.85/debian/changelog 2023-12-24 10:35:35.0 +0100
@@ -1,3 +1,10 @@
+tgt (1:1.0.85-1.2) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix FTCBFS: Use the host architecture pkg-config. (Closes: #-1)
+
+ -- Helmut Grohne   Sun, 24 Dec 2023 10:35:35 +0100
+
 tgt (1:1.0.85-1.1) unstable; urgency=medium
 
   * Non-maintainer upload.
diff --minimal -Nru tgt-1.0.85/debian/rules tgt-1.0.85/debian/rules
--- tgt-1.0.85/debian/rules 2023-11-17 22:35:38.0 +0100
+++ tgt-1.0.85/debian/rules 2023-12-24 10:35:34.0 +0100
@@ -1,9 +1,11 @@
 #!/usr/bin/make -f
 #export DH_VERBOSE=1
 
+include /usr/share/dpkg/buildtools.mk
+
 FEATURES = ISCSI_RDMA=1 CEPH_RBD=1 SD_NOTIFY=1
 
-glfs_libs = $(shell pkg-config --libs glusterfs-api 2>/dev/null)
+glfs_libs = $(shell $(PKG_CONFIG) --libs glusterfs-api 2>/dev/null)
 ifneq ($(glfs_libs),)
 FEATURES += GLFS_BD=1
 endif


Bug#1058876: libopenmpi-dev: paths missing /usr/include...(for fortran mpi.mod)

2023-12-24 Thread Drew Parsons

reopen 1058876
block 1058944 by 1058876
thanks

Alas, the fix in openmpi 4.1.6-3 for the include path to the openmpi 
fortran modules has hardcoded x86_64-linux-gnu


This is preventing builds and tests on other architectures, e.g. 
rebuilding sundials for the petsc transition.


I think openmpi's debian/tests will also need Depends: pkg-config for 
the new compile_run_cc_pkgconfig test.




Bug#1057755: Qt WebEngine Security Support In Stable

2023-12-24 Thread Adrian Bunk
On Sat, Dec 23, 2023 at 03:55:15PM -0700, Soren Stoutner wrote:
>...
> In a hypothetical world where Qt 6.2 LTS had shipped with bookworm, we could
> build any Qt WebEngine from 6.2, 6.3, or 6.4 against it without problem.
> Initially it might seem best to build the highest possible, but because 6.4
> updates end a full year before 6.2 LTS updates, it would be best for stable
> support if we stuck with 6.2 as long as possible.
>...

When Qt WebEngine from 6.5 is officially backportable to 6.2,
then backporting it to versions between 6.2 and 6.5 is unlikely
to be a problem.

Backporting even more recent versions to 6.4 would be expected to be 
easier than backporting to 6.2, since 6.4 is closer to what gets 
backported and backporting problems tend to increase when the 
backporting distance increases since the code differences increase.

>...
> If it ends up not being feasible to backport the entire Qt WebEngine from
> the next LTS release, then we could look at cherry-picking all of the
> security commits. This would be, by far, the most time-intensive solution.
> But, as your point out, the security fixes on the Chromium side are well
> marked. And, generally, they are small commits that only modify a few lines.
> For example:
>...

Your "generally" is not true, it misses the biggest problem.
 
Out of 20 CVEs there might be 19 easy ones, plus one that is a quite 
invasive patch requiring a lot of backporting work.

Who has both the required skills and a reliable commitment today for 
doing in the year 2027 an urgent backport of a complex fix for a 
zero-day vulnerability that is already being exploited in the wild?

> Soren Stoutner

cu
Adrian



Bug#1059390: linux-image-6.5.0-5-amd64: Large number of missed packets reported by "e1000e" driver

2023-12-24 Thread Matthias Scheler
Package: src:linux
Version: 6.5.13-1
Severity: normal
Tags: upstream

Dear Maintainer,

I'm using a Shuttle DS20UV2 as my broadband router and firewall. After
updating it from Debian 12.4 to Trixie yesterday one of its network
interfaces started reporting a large and ever increasing number of
missed packets:

> ip -s link show eno1
3: eno1:  mtu 1508 qdisc fq_codel state UP 
mode DEFAULT group default qlen 1000
link/ether 80:ee:73:XX:XX:XX brd ff:ff:ff:ff:ff:ff
RX:  bytes packets errors dropped  missed   mcast
 991043595  846955  0   03691   0
TX:  bytes packets errors dropped carrier collsns
 890811461  793387  0   0   0   0
altname enp0s31f6

The number was much larger before I rebooted the machine to
test out some kernel parameter changes.

I originally had similar problems with Debian 12.x. But increasing
the RX ring size from 256 to 1024 fixed the problem. Under Trixie
neither this nor increasing the RX ring size to the maximum of 4096
helps. I also tried to restrict the maximum C-state to 3 (down
from 9) which again didn't help.

The interface in question is using an MTU of 1508 bytes to allow
an MTU of 1500 bytes on PPPoE session running over it. The broadband
link's maximum speed is 1 Gbit/sec. As such the incoming packet rate
can be high at times.

There is another ehternet interface in this machine which is driven
by the "igc" driver. It reports zero missed packets but it also not
using mini jumbo frames.

-- Package-specific info:
** Version:
Linux version 6.5.0-5-amd64 (debian-ker...@lists.debian.org) (gcc-13 (Debian 
13.2.0-7) 13.2.0, GNU ld (GNU Binutils for Debian) 2.41) #1 SMP PREEMPT_DYNAMIC 
Debian 6.5.13-1 (2023-11-29)

** Command line:
BOOT_IMAGE=/boot/vmlinuz-6.5.0-5-amd64 
root=UUID=3f51e9a7-af14-4c6d-a6f3-da33d730389d ro pcie_aspm=off 
intel_idle.max_cstate=3 quiet

** Not tainted

** Kernel log:
2023-12-24T09:34:02.980398+00:00 [REDACTED] kernel: Linux version 6.5.0-5-amd64 
(debian-ker...@lists.debian.org) (gcc-13 (Debian 13.2.0-7) 13.2.0, GNU ld (GNU 
Binutils for Debian) 2.41) #1 SMP PREEMPT_DYNAMIC Debian 6.5.13-1 (2023-11-29)
2023-12-24T09:34:02.980403+00:00 [REDACTED] kernel: Command line: 
BOOT_IMAGE=/boot/vmlinuz-6.5.0-5-amd64 
root=UUID=3f51e9a7-af14-4c6d-a6f3-da33d730389d ro pcie_aspm=off 
intel_idle.max_cstate=3 quiet
2023-12-24T09:34:02.980404+00:00 [REDACTED] kernel: BIOS-provided physical RAM 
map:
2023-12-24T09:34:02.980405+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0x-0x0005dfff] usable
2023-12-24T09:34:02.980406+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0x0005e000-0x0005efff] reserved
2023-12-24T09:34:02.980407+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0x0005f000-0x0009] usable
2023-12-24T09:34:02.980407+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0x000a-0x000f] reserved
2023-12-24T09:34:02.980410+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0x0010-0x8dbcafff] usable
2023-12-24T09:34:02.980411+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0x8dbcb000-0x8eefafff] reserved
2023-12-24T09:34:02.980411+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0x8eefb000-0x8f02afff] ACPI data
2023-12-24T09:34:02.980412+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0x8f02b000-0x8f460fff] ACPI NVS
2023-12-24T09:34:02.980413+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0x8f461000-0x8f993fff] reserved
2023-12-24T09:34:02.980413+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0x8f994000-0x8fc4dfff] type 20
2023-12-24T09:34:02.980414+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0x8fc4e000-0x8fc4efff] usable
2023-12-24T09:34:02.980416+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0x8fc4f000-0x9b7f] reserved
2023-12-24T09:34:02.980417+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0xe000-0xefff] reserved
2023-12-24T09:34:02.980418+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0xfe00-0xfe010fff] reserved
2023-12-24T09:34:02.980418+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0xfec0-0xfec00fff] reserved
2023-12-24T09:34:02.980419+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0xfed0-0xfed03fff] reserved
2023-12-24T09:34:02.980420+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0xfee0-0xfee00fff] reserved
2023-12-24T09:34:02.980422+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0xff00-0x] reserved
2023-12-24T09:34:02.980422+00:00 [REDACTED] kernel: BIOS-e820: [mem 
0x0001-0x0004627f] usable
2023-12-24T09:34:02.980423+00:00 [REDACTED] kernel: NX (Execute Disable) 
protection: active
2023-12-24T09:34:02.980424+00:00 [REDACTED] kernel: efi: EFI v2.7 by American 
Megatrends
2023-12-24T09:34:02.980424+00:00 [REDACTED] kernel: efi: ACPI=0x8f419000 ACPI 
2.0=0x8f419014 TPMFinalLog=0x8f41f000 SMBIOS=0x8f802000 SMBIOS 3.0=0x8f801000 

Bug#1052740: graphite2: FTBFS: graph_legend.dot:1: error: Problems running dot: exit code=1, command='dot', arguments='"/<>/build/doc/doxygen/html/graph_legend.dot" -Tpng -o "/<

2023-12-24 Thread Rene Engelhard

Hi,

Am 23.12.23 um 11:43 schrieb Rene Engelhard:

Hi,
Am 23.12.23 um 02:40 schrieb Bastian Germann:

graph_legend.dot should have quotes around the font name references.

Ah, thanks. Unfortunately this is a generated file...


And yes, I also noticed that the FreeSans.ttf is at fault. Indeed I 
actually played around with it but that didn't give anything.



Thinking abit it this value set already is default anyway, so we can 
just remove it and it still works (and passes the problem), now running 
into the (unrelated) LaTeX issue.



Regards,


Rene



Bug#1059389: r-cran-ggeffects: autopkgtest regression

2023-12-24 Thread Graham Inggs
Source: r-cran-ggeffects
Version: 1.3.2+dfsg-1
Severity: serious
User: debian...@lists.debian.org
Usertags: regression

Hi Maintainer

Since the upload of r-cran-emmeans 1.9.0+dfsg-1, the autopkgtest of
r-cran-ggeffects is failing [1].  I've copied what I hope is the
relevant part of the log below.

Regards
Graham


[1] https://ci.debian.net/packages/r/r-cran-ggeffects/testing/amd64/


199s ══ Failed tests

199s ── Failure ('test-rq.R:23:5'): ggemmeans, rq
───
199s ggemmeans(m1, "Air.Flow", verbose = FALSE) is not NULL
199s
199s `actual` is an S3 object of class , a list
199s `expected` is NULL
199s
199s [ FAIL 1 | WARN 0 | SKIP 19 | PASS 385 ]
199s Error: Test failures
199s Execution halted
199s autopkgtest [21:26:42]: test run-unit-test: ---]


Bug#1059388: git-debrebase: found two-parent merge, how to cope?

2023-12-24 Thread Philipp Kern
Package: dgit
Version: 11.5
Severity: wishlist
X-Debbugs-Cc: pk...@debian.org

Hey,

In the absence of a better venue of asking this question (there seems to
be no mailing list): I have an upstream repository that contains a
two-parent merge for some reason (https://github.com/twosigma/nsncd, of
all the things merging a CLA into the repository). dgit bails out with
this:

| Format `3.0 (quilt)', need to check/update patch stack
| examining quilt state (multiple patches, linear mode)
| git-debrebase: snag ignored (-funclean-ordering): packaging change 
(6228b52f9f4e1c847907651dcfa27a4003280538) follows upstream change (eg 
2a5ff9d32c70a818044d26b007ec407a875d2374)
| git-debrebase: snag ignored (-funclean-ordering): packaging change 
(b977d9b16db9bd6dcfc7f9f1e1831ea254d2df1d) follows upstream change (eg 
44c81340420d2e993e7506f3144720862c56d77a)
| git-debrebase: snag ignored (-funclean-mixed): found mixed upstream/packaging 
commit (ef3e287879586088e795a518977de87e65c6c2fd)
|
| git-debrebase: error: found unprocessable commit, cannot cope: general 
two-parent merge (e3de17c274315bab561664ac57e46472670545cf)
| git-debrebase: Branch does not seem to be meant to be a git-debrebase branch?
| git-debrebase: Wrong branch, or maybe you needed git-debrebase convert-from-*.
| git-debrebase: 
| dgit: failed command: git-debrebase --noop-ok -funclean-mixed 
-funclean-ordering make-patches --quiet-would-amend
|
| dgit: error: subprocess failed with error exit status 255

I have so far forced an --anchor manually upon git-debrebase, which
worked, but is also very tedious to pass everywhere. Is this something
that will auto-fix itself on the next upstream release because dgit will
properly discard the history pre the current upstream release? I was at
least hoping that it would disappear with the first regular upload - but
this did not happen.

Is there something I can do for dgit to accept the current state of the
repository as canonical up to the point where the Debian packaging was
modified/forked off. The snags are upstream's prior packaging as found
in the upstream repository, which does not seem to be uncommon to me
either.

The repo can be found on dgit as well as on [1].

Kind regards and thanks
Philipp Kern

[1] https://salsa.debian.org/Debian/nsncd



Bug#1059187: samba: installs files into /lib/...

2023-12-24 Thread Michael Tokarev

Control: tag -1 + confirmed moreinfo

21.12.2023 03:09, Chris Hofstaedtler :

Source: samba
Version: 2:4.19.3+dfsg-2
User: helm...@debian.org
Usertags: dep17m2

Hi!

The samba binary packages installs a number of files below /lib. For
the ongoing Debian UsrMerge effort [1], these should be moved below
/usr/lib.

Currently the files installed are:

 - lib/systemd/system/ctdb.service
 - lib/systemd/system/nmb.service -> nmbd.service
 - lib/systemd/system/nmbd.service
 - lib/systemd/system/samba-ad-dc.service
 - lib/systemd/system/samba.service -> samba-ad-dc.service
 - lib/systemd/system/smb.service -> smbd.service
 - lib/systemd/system/smbd.service
 - lib/systemd/system/winbind.service
 - lib/x86_64-linux-gnu/libnss_winbind.so.2
 - lib/x86_64-linux-gnu/libnss_wins.so.2
 - lib/x86_64-linux-gnu/security/pam_winbind.so

Please investigate moving these below /usr/lib. When doing so, make
sure your packages do not install empty directories inside /lib (or
/lib itself).

For the correct place of the systemd system units, you can ask:
pkg-config --variable=systemdsystemunitdir systemd
Provided you add systemd-dev to Build-Depends.


/lib/systemd is currently hard-coded in samba's d/rules (and repeated
in multiple places).  It's easy to fix, but.

The same samba package is being built on multiple distributions and
releases, including ubuntu focal and jammy, debian bullseye and buster, -
I provide sort of backports for these releases and this service has
become quite popular.  The suggested

  pkg-config --variable=systemdsystemunitdir systemd

does not work on bullseye already.

What's an alternative way to determine if we should use /lib or /usr/lib
which works in older releases too - for systemd and for system libs like
libnss*?

Thanks,

/mjt



Bug#1059387: exim4: CVE-2023-51766

2023-12-24 Thread Salvatore Bonaccorso
Source: exim4
Version: 4.97-2
Severity: important
Tags: security upstream
Forwarded: https://bugs.exim.org/show_bug.cgi?id=3063
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for exim4.

CVE-2023-51766[0]:
| Exim through 4.97 allows SMTP smuggling in certain configurations.
| Remote attackers can use a published exploitation technique to
| inject e-mail messages that appear to originate from the Exim
| server, allowing bypass of an SPF protection mechanism. This occurs
| because Exim supports . but some other popular e-mail
| servers do not.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-51766
https://www.cve.org/CVERecord?id=CVE-2023-51766
[1] https://bugs.exim.org/show_bug.cgi?id=3063

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Bug#1059386: sendmail: CVE-2023-51765

2023-12-24 Thread Salvatore Bonaccorso
Source: sendmail
Version: 8.17.2-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for sendmail.

CVE-2023-51765[0]:
| sendmail through at least 8.14.7 allows SMTP smuggling in certain
| configurations. Remote attackers can use a published exploitation
| technique to inject e-mail messages that appear to originate from
| the sendmail server, allowing bypass of an SPF protection mechanism.
| This occurs because sendmail supports . but some other
| popular e-mail servers do not.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-51765
https://www.cve.org/CVERecord?id=CVE-2023-51765

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Bug#1059230: postfix: SMTP Smuggling attack

2023-12-24 Thread Salvatore Bonaccorso
Control: retitle -1 postfix: CVE-2023-51764: SMTP Smuggling attack

Hi

On Thu, Dec 21, 2023 at 01:03:20PM -0500, Scott Kitterman wrote:
> On Thursday, December 21, 2023 11:57:21 AM EST Salvatore Bonaccorso wrote:
> > Source: postfix
> > Version: 3.8.2-1
> > Severity: important
> > Tags: security upstream
> > Forwarded:
> > https://www.mail-archive.com/postfix-users@postfix.org/msg100901.html
> > X-Debbugs-Cc: car...@debian.org, Debian Security Team
> >  Control: found -1 3.7.6-0+deb12u2
> > Control: found -1 3.5.18-0+deb11u1
> > Control: found -1 3.4.23-0+deb10u1
> > 
> > Hi
> > 
> > There was a SMTP smuggling vulerability reported, for which in some
> > Postfix versions at least already exists short term mitiations in form
> > of "smtpd_forbid_unauth_pipelining = yes".
> > 
> > Details via:
> > 
> > https://www.mail-archive.com/postfix-users@postfix.org/msg100901.html
> > https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwid
> > e/
> 
> See https://www.postfix.org/smtp-smuggling.html for the most recent 
> information.
> 
> The mitigation is available for stable, but not yet oldstable.

Right, that was the better reference to following the status.

A CVE has been assigned in meanwhile for the issue in postfix:
CVE-2023-51764.

Regards,
Salvatore



Bug#1055192: RFS: golang-github-apenella-go-ansible

2023-12-24 Thread Ananthu C V
On Sat, Dec 23, 2023 at 10:35:08PM +0530, Nilesh Patra wrote:
> I finally got some time to look at this. From what I see, this is just a 
> library
> package (and no binary) and this seems to be the final package you want to 
> get uploaded.
> 
> Generally, all go library packages 'are'/'should be' present in Debian 
> because they are needed
> for a target (binary) package which a user is interested in using. No-one 
> would be keen
> on apt installing golang libraries and fiddling with GOPATH/GOROOT
> rather than a simpler `go get -u` if they want to use them to write code.
> 
> Hence, unless you have any target packages for which these libs are needed, I 
> do not see
> a lot of use of getting this in. Let me know what you'd think. I *do* expect 
> your reponse on this.

It looks that this has been a clear oversight from my side. *I do find this a 
very useful library*
but as you mentioned, since go team convention does not include packaging 
libaries that are not
needed by any binaries, there is probably no real value in getting this in.

As such, please prune the corresponding repositories for the following:
- golang-github-apenella-go-ansible
- golang-github-apenella-go-common-utils
- golang-github-sosedoff-ansible-vault-go

> Thanks!
> 
> Best,
> Nilesh

I feel sincerely sorry that an oversight from my side has ended up taking some 
of your busy schedule
and I apologize for making you spend your time needlessly. I'll try my best to 
make sure such mishapas
does not occur in the future, since it is not beneficial to anyone. And 
regardless of the outcome of
this, thanks a lot for taking a look at the RFS.

Best,
Ananthu



Bug#1059376: [Pkg-pascal-devel] Bug#1059376: lcl is wrongly marked Multi-Arch: foreign

2023-12-24 Thread Abou Al Montacir
Hi Helmut,

Just like lcl, lcl-2.2 is also a virtual package.
If I look to all other virtual packages, they are Arch: all, and I tend to agree
with that.
However, I'm not very familiar with multi-arch subtleties.

So if you want to fix this, please provide a proposal for then entire set of
packages.

I would glad then to fix it.
-- 
Cheers,
Abou Al Montacir


signature.asc
Description: This is a digitally signed message part