Bug#912002: javascript-common: installs lighttpd config files when lighttpd is not installed

2018-10-27 Thread Jade McCormick
Package: javascript-common Version: 11 Severity: important Dear Maintainer, I discovered lighttpd config files in /etc when I did not haave the lighttpd application installed. This related to several other bugs filed with javascript-common package, including #474913 (javascript-common overrides

Bug#912986: nodejs segfaults in selinux enforcing mode

2018-11-05 Thread Jade McCormick
Source: nodejs Severity: normal Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? try to use yarn init on a selinux system in enforcing mode * What exactly did you do (or not do) that was effective (or

Bug#912982: reportbug: ssl fails with selinux enforcing mode

2018-11-05 Thread Jade McCormick
he submitter). Detected character set: UTF-8 Please change your locale if this is incorrect. Using 'Jade McCormick ' as your from address. Getting status for nodejs... Checking for newer versions at madison... Traceback (most recent call last): File "/usr/bin/reportbug", line 2266, in

Bug#913544: python3-openssl: in SELinux enforcing mode, python ssl wrapper results in denial

2018-11-11 Thread Jade McCormick
A quick search yielded the following issue in cffi: https://bitbucket.org/cffi/cffi/issues/232/static-callbacks I'm still trying to do research on this. I guess for reportbug it would be great if there were an SElinux transition to reportbug_t that would allow required permissions. This would be

Bug#913544: python3-openssl: in SELinux enforcing mode, python ssl wrapper results in denial

2018-11-11 Thread Jade McCormick
Package: python3-openssl Severity: normal Dear Maintainer, I cannot run any python utility that uses the openssl wrapper due to AVC denial. time->Sun Nov 11 19:16:12 2018 type=PROCTITLE msg=audit(1541992572.485:6658):

Bug#913544: python3-openssl: in SELinux enforcing mode, python ssl wrapper results in denial

2018-11-11 Thread Jade McCormick
Re-reading the original redhat bug that linked me to the cffi bug referenced in the last message: https://bugzilla.redhat.com/show_bug.cgi?id=1277224 This makes me thnk that both bugs are unrelated to this specific thing since it relates specifically to python-cryptography and not

Bug#719019: drraw.cgi: defined(%hash) is deprecated

2018-11-15 Thread Jade McCormick
Package: drraw Version: 2.2b2-4 Followup-For: Bug #719019 Dear Maintainer, I just ran into this problem but instead of just a warning, it prevents the package from working. I applied the patch and that fixed it. Can we get this integrated? -- System Information: Debian Release: buster/sid

Bug#717563: (no subject)

2018-11-18 Thread Jade McCormick
diff --git a/reportbug/checkversions.py b/reportbug/checkversions.py index d94bf76..c37399d 100644 --- a/reportbug/checkversions.py +++ b/reportbug/checkversions.py @@ -84,7 +84,7 @@ def get_versions_available(package, timeout, dists=None, http_proxy=None, arch=' # or to binary packages

Bug#717563: (no subject)

2018-11-18 Thread Jade McCormick
diff --git a/reportbug/checkversions.py b/reportbug/checkversions.py index d94bf76..c37399d 100644 --- a/reportbug/checkversions.py +++ b/reportbug/checkversions.py @@ -84,7 +84,7 @@ def get_versions_available(package, timeout, dists=None, http_proxy=None, arch=' # or to binary packages

Bug#770128: (no subject)

2018-11-18 Thread Jade McCormick
Agreed, and further I am having trouble with reportbug and SElinux, which makes reporting bugs impossible for me right now. However, I am not sure how this would work - running ssh to collect information about packages instlled on the remote system, etc? how might this be implemented?

Bug#914057: python3-debianbts: debianbts.get_bugs does not support the use of HTTP and HTTPS proxy servers

2018-11-18 Thread Jade McCormick
Package: python3-debianbts Version: 2.7.2 Severity: important Dear Maintainer, This bug is related to bug #717563 in reportbug package. Message #59 on that bug shows the following code (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717563#msg59): > bugs = debianbts.get_bugs(pkg_filter,

Bug#916091: ITP: python3-stringcase -- Python library to Convert string cases between camel case, pascal case, snake case etc…

2018-12-09 Thread Jade McCormick
Package: wnpp Severity: wishlist Owner: Jade McCormick * Package name: python3-stringcase Version : 1.2.0 Upstream Author : Taka Okunishi (https://github.com/okunishinishi) * URL : https://pypi.org/project/stringcase/ * License : MIT Programming Lang: Python

Bug#914514: atop: should use logrotate for log rotation

2018-11-24 Thread Jade McCormick
Package: atop Version: 2.3.0-1+b1 Severity: normal Dear Maintainer, In managing my log directory and customize logrotate, I discovered limitations in the way atop handles log files (which are different from text files since they are process accounting files,, to my understanding). Can this

Bug#898184: still an issue

2018-11-22 Thread Jade McCormick
I experience this on an up-to-date buster and it causes problems because I run SELinux, and collectd does not have permission to use the dac_override capability. I can confirm that the latest master of rrdtool built against collectd fixes this problem. or, vice versa, collectd against the lat

Bug#913987: policycoreutils-python-utils: audit2allow -R cant open "interface info"

2018-11-17 Thread Jade McCormick
Package: policycoreutils-python-utils Version: 2.8-2 Severity: normal Dear Maintainer, audit2allow -R is supposed to generate allow rules that incorporate M4 interface macros from the reference policy. However, this does not appear to work on debian. When I run audit2allow -b -R, for instance: