Bug#1069181: sd: typo in description: defualts -> defaults

2024-04-17 Thread Tomas Pospisek
Package: sd
Version: 0.80.really.0.7.6-1+deb12u1
Severity: minor
Tags: patch

Please replace "defualts" in the package description with "defaults".

Thank you & greetings,
*

-- System Information:
Debian Release: 12.5
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.1.0-20-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages sd depends on:
ii  libc6  2.36-9+deb12u4
ii  libgcc-s1  12.2.0-14

sd recommends no packages.

sd suggests no packages.



Bug#1066029: secnet: please correct long description that says that hippotat is not packaged

2024-03-11 Thread Tomas Pospisek
Package: secnet
Version: 0.6.7
Severity: minor

The secnet long description reads:

> secnet works well with userv-ipif (allowing it to run without needing root 
> privilege) and hippotat (not currently in Debian)

However hippotat seems to be packaged: 
https://packages.debian.org/search?keywords=hippotat

Please correct the description.

Thanks a lot!
*t

-- System Information:
Debian Release: 12.5
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.1.0-18-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages secnet depends on:
ii  init-system-helpers1.65.2
pn  libadns1   
ii  libc6  2.36-9+deb12u4
ii  libgmp10   2:6.2.1+dfsg1-1.1
ii  lsb-base   11.6
ii  sysvinit-utils [lsb-base]  3.06-4

Versions of packages secnet recommends:
ii  python3  3.11.2-1+b1

secnet suggests no packages.



Bug#887035: cron: one "easy" way to get cron output

2024-02-29 Thread Tomas Pospisek

Nice, thanks a lot Georges!!!
*t

On Thu, 29 Feb 2024, Georges Khaznadar wrote:


Hello Tomas,

with the current version of cron in trixie,

- the build was done with debugging active
- man cron provides information about the `-x` flag.

So, I close the bug report. Please feel free to reopen it when
necessary, or send another bug report if something doe not fulfill your
needs.

Best regards,   Georges.

On Fri, 22 Jul 2022 15:59:17 +0200 Tomas Pospisek  wrote:

@Georges Khaznadar : what do you think about:

1. enabling debugging by default?
2. documenting `-x` ?

If Debian would enable the "debbugging feature" of its cron by default,
then this would add this overhead in a few places:

if ( (DebugFlags & (mask) )  ) printf message;

Since DebugFlags is 0 by default, this will ad an overhead of about two
machine instructions I guess to a few places, which is a neglible
waste/slowdown IMHO.

With the "debugging feature" enabled Debian's cron will gain the very
nice features:

a) for the sysadmin to be able to debug what cron is doing and why and
b) use the sysadmin being able to use Debian's cron in docker and kubernetes.

IMHO a huge gain that costs nothing.






Bug#1063759: tracker: Please update project homepage URL

2024-02-12 Thread Tomas Pospisek
Source: tracker
Version: 3.4.2-1
Severity: minor

Please update the project's homepage. The homepage that is declared in
the debian/control file, https://wiki.gnome.org/Projects/Tracker, leads
to a "This page does not exist yet" page. The project seems to have a
maintained and working homepage at https://tracker.gnome.org/.

Thanks a lot, greetings,
*t

-- System Information:
Debian Release: 12.5
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.1.0-17-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#1059464: notepadqq: fix description "designed by developers"

2023-12-26 Thread Tomas Pospisek
Source: notepadqq
Version: 2.0.0~beta1-4
Severity: minor
Tags: patch

The package's description should read gramatically ...

correctly:

Notepadqq is a text editor designed by developers, for developers.

instead of:

Notepadqq is a text editor designed from developers, for developers.

Thanks & have nice christmas holidays!
*t

-- System Information:
Debian Release: 12.4
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.1.0-15-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#1053310: Fixes for stable/oldstable?

2023-11-01 Thread Tomas Pospisek

On Tue, 31 Oct 2023, Andreas Metzler wrote:


On 2023-10-31 Tomas Pospisek  wrote:
[...]

PS: I'd prefer this bugreport to be open as long as the stable and
oldstable packages are still vulnerable...


Hello Thomas,
The Debian BTS does not use a simple open/close logic, it tracks which
specific versions a bug applies to. If you look at
https://bugs.debian.org/cgi-bin/1053310 there is both textual info
("Found in version exim4/4.94.2-7 Fixed in version exim4/4.97~RC2-2")
and a nice graph in red and green to display this and the overview pages
can also show bugs applying to specific distributions. (Menu items at
the bottom of the page.) e.g.
https://bugs.debian.org/cgi-bin/pkgreport.cgi?dist=stable;package=exim4-base
does not show this bug under "Resolved bugs".


Alright, thank you. Every time I see those "found in"/"fixed in" 
bugreport pages I'm at a loss to be 100% clear in what precise state those 
bugsreport are. Oh well. Many, many thanks for the explanations!

*t



Bug#1053310: Fixes for stable/oldstable?

2023-10-31 Thread Tomas Pospisek

Hi Salvatore,

thanks a lot for your reply (more below):

On Tue, 31 Oct 2023, Salvatore Bonaccorso wrote:


Hi Tomas,

On Tue, Oct 31, 2023 at 11:07:06AM +0100, Tomas Pospisek wrote:

Hello Exim maintainers,

this ticket, asking for packages with fixes for CVE-2023-42117 and other
security relavant issues is closed.

However only a package for unstable has been released:

https://security-tracker.debian.org/tracker/CVE-2023-42117

all other Debian releases (stable, oldstable) still seem to be carrying the
vulnerable Exim4 version.

What is the status of releasing fixed Exims for Debian stable, oldstable? Is
anybody working on it? Is help needed?


Fixes for CVE-2023-42117 and CVE-2023-42119 are right now considered
no-dsa (see comment on the security-tracker about it), and are going
to be fixed in the next point releases.


The notes say:

***
[bookworm] - exim4  (Only an issue if Exim4 run behind an
 untrusted proxy-protocol proxy)
[bullseye] - exim4  (Only an issue if Exim4 run behind an
 untrusted proxy-protocol proxy)
[buster] - exim4  (Only an issue if Exim4 run behind an untrusted
   proxy-protocol proxy)
https://www.zerodayinitiative.com/advisories/ZDI-23-1471/
https://bugs.exim.org/show_bug.cgi?id=3031
https://www.openwall.com/lists/oss-security/2023/09/29/5
https://www.openwall.com/lists/oss-security/2023/10/01/4
https://exim.org/static/doc/security/CVE-2023-zdi.txt
***

So I think I can parse from those that CVE-2023-42117 is only critical 
when exim is run behind a "untrusted proxy-protocol proxy".


Questions if you will:

* what does "no-dsa" mean? DSA seems to mean Debian Security Announce.
  Does it mean there is no DSA for that problem yet? What does it mean
  when a CVE is considered "no-dsa" then? That no DSA will be released for
  it?
* what is a "untrusted proxy-protocol proxy" in the context of a mail
  transport agent? So exim shouldn't be used behind an untrusted socks
  proxy? Well I have no real control who connects how to a public MTA...
  anybody can connect to it to try his luck sending me email. That
  includes untrusted socks proxies...

So to wrap I it /seems/ that I'm probably fine, however the details are so 
terse that my assessement seems to be rather shaky...



Does this help?


A bit. Thanks a lot

Best greetings!
*t



Bug#1053310: Fixes for stable/oldstable?

2023-10-31 Thread Tomas Pospisek

Hello Exim maintainers,

this ticket, asking for packages with fixes for CVE-2023-42117 and other 
security relavant issues is closed.


However only a package for unstable has been released:

https://security-tracker.debian.org/tracker/CVE-2023-42117

all other Debian releases (stable, oldstable) still seem to be carrying 
the vulnerable Exim4 version.


What is the status of releasing fixed Exims for Debian stable, oldstable? 
Is anybody working on it? Is help needed?

*t

PS: I'd prefer this bugreport to be open as long as the stable and
oldstable packages are still vulnerable...



Bug#1038946: please add a long description

2023-06-26 Thread Tomas Pospisek
Instead of solely having a short description that says "$FOO is a $BAZ for 
$BAR" where it's not immediately clear without particular knowledge what 
$FOO and $BAR are, please add a short text, that explains what $FOO and 
$BAR actually do. Something like:


"Xapp is an application that does . xdg-desktop-portal allows you
 to do this and that. This package adds infrastructure to support Xapp via
 xdg-desktop-portal on Cinnamon, MATE and Xfce."

Thanks,
*t



Bug#1038946: please add a long description

2023-06-26 Thread Tomas Pospisek

On Mon, 26 Jun 2023, Fabio Fantoni wrote:


Il 26/06/2023 12:30, Tomas Pospisek ha scritto:
Instead of solely having a short description that says "$FOO is a $BAZ for 
$BAR" where it's not immediately clear without particular knowledge what 
$FOO and $BAR are, please add a short text, that explains what $FOO and 
$BAR actually do. Something like:


"Xapp is an application that does . xdg-desktop-portal allows you
 to do this and that. This package adds infrastructure to support Xapp via
 xdg-desktop-portal on Cinnamon, MATE and Xfce."

Thanks,
*t


Thanks for reply, long description was already added to git of the package: 
https://salsa.debian.org/cinnamon-team/xdg-desktop-portal-xapp/-/blob/debian/latest/debian/control



Description: Xapp's Cinnamon, MATE and Xfce backends for xdg-desktop-portal
xdg-desktop-portal-xapp provides an implementation for the desktop-agnostic
xdg-desktop-portal service for Cinnamon, MATE and Xfce.
This allows sandboxed applications to request services and information from
outside the sandbox in the MATE, Xfce and Cinnamon environments.
I taken as base the upstream one (for mint packages) and tried to improve it 
but suggestions on further improvements are appreciated


I think the long description on Salsa is fine. Thanks a lot Fabio!
*t



Bug#1036077: please reassign to xserver

2023-05-22 Thread Tomas Pospisek
Since this seems to be a xserver problem, could you please reassign the 
ticket to the correct xserver package?

*t



Bug#941966: Hibernate bug still occuring?

2023-03-18 Thread Tomas Pospisek

Hi Thorsten,

does the bug you described in https://bugs.debian.org/941966 still occur? 
I.e.:


* do you still have that system?
* did you maybe upgrade it to a more recent bullseye kernel?

Greetings,
*t



Bug#970819: Hibernate bug still occuring?

2023-03-18 Thread Tomas Pospisek

Hi Cameron,

does the bug you described in https://bugs.debian.org/970819 still occur? 
I.e.:


* do you still have that system?
* did you maybe upgrade it from Debian buster to bullseye?

Greetings,
*t



Bug#929077: Hibernate bug still occuring?

2023-03-18 Thread Tomas Pospisek

Hi Chris,

does the bug you described in https://bugs.debian.org/929077 still occur? 
I.e.:


* do you still have that system?
* did you maybe upgrade it from Debian buster to bullseye?

Greetings,
*t



Bug#1027483: thank you!

2023-01-25 Thread Tomas Pospisek
and I guess #1027483 can be closed as it is still open along with #1027430 
?


On Wed, 25 Jan 2023, Tomas Pospisek wrote:

Woah guys, a new Debian stable kernel came my way and finally sound works 
again consistently. Many, many, many thanks to you for bisecting, patching 
and shipping the fix. Muito, muito obrigado!

*t





Bug#1027483: thank you!

2023-01-25 Thread Tomas Pospisek
Woah guys, a new Debian stable kernel came my way and finally sound works 
again consistently. Many, many, many thanks to you for bisecting, patching 
and shipping the fix. Muito, muito obrigado!

*t



Bug#989943: Problem still occuring in unattenden-upgrades from bullseye

2022-11-11 Thread Tomas Pospisek
Package: unattended-upgrades
Version: 2.8
Followup-For: Bug #989943
X-Debbugs-Cc: Michael Vogt 

Hi,

I'm still seeing this problem in unattended-upgrades from Debian bullseye.

Thanks a lot for unattended-upgrades and the maintainance!!!
*t

-- System Information:
Debian Release: 11.5
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-22-amd64 (SMP w/8 CPU threads)
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages unattended-upgrades depends on:
ii  debconf [debconf-2.0]  1.5.77
ii  lsb-base   11.1.0
ii  lsb-release11.1.0
ii  python33.9.2-3
ii  python3-apt2.2.1
ii  python3-dbus   1.2.16-5
ii  python3-distro-info1.0
ii  ucf3.0043
ii  xz-utils   5.2.5-2.1~deb11u1

Versions of packages unattended-upgrades recommends:
ii  cron [cron-daemon]  3.0pl1-137

Versions of packages unattended-upgrades suggests:
ii  bsd-mailx  8.1.2-0.20180807cvs-2
pn  needrestart
ii  nullmailer [mail-transport-agent]  1:2.2-3
pn  powermgmt-base 
ii  python3-gi 3.38.0-2

-- debconf information:
* unattended-upgrades/enable_auto_updates: true
  unattended-upgrades/origins_pattern: 
"origin=Debian,codename=${distro_codename},label=Debian-Security";



Bug#998950: mailsync: diff for NMU version 5.2.7-3.1

2022-11-10 Thread Tomas Pospisek

On Thu, 3 Nov 2022, Marcos Talau wrote:


Control: tags 998950 + patch
Control: tags 998950 + pending


Dear maintainer,

I've prepared an NMU for mailsync (versioned as 5.2.7-3.1) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer.


Many, many thanks Marcos!
*t



Bug#1003974: Screenshot of missing icons in Impress

2022-11-10 Thread Tomas Pospisek

see previous email in this bugreport for context

Bug#1003974: libreoffice-impress: Some icons do not get displayed in Impress

2022-11-10 Thread Tomas Pospisek

Hello Nicolas and Libre Office maintainers,

(Not sure what's going on, I'm submitting this bug report for the third 
time since for unknown reason it doesn't make it into the BTS)


My Libre Office Impress is not displaying some icons - see attached
screenshot that I will send in the next email.

I think this *might* be the same problem as Nicolas reported.

I also have XFCE as a desktop, like Nicolas does.

I have the libreoffice-gtk3 (1:7.4.1-1~bpo11+2) integration library
installed.

My libreoffice package is from bullseye-backports running on a
bullseye system.

I did not have the problems with the icons with the package from
the bullseye distro (that is with the 1:7.0.4-4+deb11u4 packages).

Thank you for the libreoffice packages dear maintainers!
*t

-- Package-specific info:

-- System Information:
Debian Release: 11.5
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-19-amd64 (SMP w/8 CPU threads)
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8),
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages libreoffice-impress depends on:
ii  libbox2d2.3.02.3.1+ds-7
ii  libc62.31-13+deb11u4
ii  libepoxy01.5.5-1
ii  libetonyek-0.1-1 0.1.9-4
ii  libgcc-s110.2.1-6
ii  libodfgen-0.1-1  0.1.8-2
ii  libreoffice-common   1:7.4.1-1~bpo11+2
ii  libreoffice-core 1:7.4.1-1~bpo11+2
ii  libreoffice-draw 1:7.4.1-1~bpo11+2
ii  librevenge-0.0-0 0.0.4-6+b1
ii  libstaroffice-0.0-0  0.0.7-1
ii  libstdc++6   10.2.1-6
ii  libuno-cppu3 1:7.0.4-4+deb11u4
ii  libuno-cppuhelpergcc3-3  1:7.4.1-1~bpo11+2
ii  libuno-sal3  1:7.4.1-1~bpo11+2
ii  libuno-salhelpergcc3-3   1:7.0.4-4+deb11u4
ii  ucf  3.0043
ii  uno-libs-private 1:7.4.1-1~bpo11+2

libreoffice-impress recommends no packages.

Versions of packages libreoffice-impress suggests:
ii  bluez  5.55-3.1

Versions of packages libreoffice-core depends on:
ii  fontconfig  2.13.1-4.2
ii  fonts-opensymbol2:102.12+LibO7.4.1-1~bpo11+2
ii  libabsl20200923 0~20200923.3-2
ii  libboost-filesystem1.74.0   1.74.0-9
ii  libboost-iostreams1.74.01.74.0-9
ii  libboost-locale1.74.0   1.74.0-9
ii  libc6   2.31-13+deb11u4
ii  libcairo2   1.16.0-5
ii  libclucene-contribs1v5  2.3.3.4+dfsg-1+b1
ii  libclucene-core1v5  2.3.3.4+dfsg-1+b1
ii  libcups22.3.3op2-3+deb11u2
ii  libcurl3-gnutls 7.74.0-1.3+deb11u3
ii  libdbus-1-3 1.12.24-0+deb11u1
ii  libdconf1   0.38.0-2
ii  libeot0 0.01-5+b1
ii  libepoxy0   1.5.5-1
ii  libexpat1   2.2.10-2+deb11u5
ii  libexttextcat-2.0-0 3.4.5-1
ii  libfontconfig1  2.13.1-4.2
ii  libfreetype62.10.4+dfsg-1+deb11u1
ii  libgcc-s1   10.2.1-6
ii  libglib2.0-02.66.8-1
ii  libgpgmepp6 1.14.0-1+b2
ii  libgraphite2-3  1.3.14-1
ii  libgstreamer-plugins-base1.0-0  1.18.4-dmo1
ii  libgstreamer1.0-0   1.18.4-2.1
ii  libharfbuzz-icu02.7.4-1
ii  libharfbuzz0b   2.7.4-1
ii  libhunspell-1.7-0   1.7.0-3
ii  libhyphen0  2.8.8-7
ii  libice6 2:1.0.10-1
ii  libicu6767.1-7
ii  libjpeg62-turbo 1:2.0.6-4
ii  liblcms2-2  2.12~rc1-2
ii  libldap-2.4-2   2.4.57+dfsg-3+deb11u1
ii  libmythes-1.2-0 2:1.2.4-3+b1
ii  libnspr42:4.29-1
ii  libnss3 2:3.61-1+deb11u2
ii  libopenjp2-72.4.0-3
ii  libpng16-16 1.6.37-3
ii  libpoppler102   20.09.0-3.1+deb11u1
ii  libraptor2-02.0.14-1.2
ii  librdf0 1.0.17-1.1+b1
ii  libreoffice-common  1:7.4.1-1~bpo11+2
ii  librevenge-0.0-00.0.4-6+b1
ii  libsm6  2:1.2.3-1
ii  libstdc++6  10.2.1-6
ii  libtiff54.2.0-1+deb11u1
ii  libuno-cppu31:7.0.4-4+deb11u4
ii  libuno-cppuhelpergcc3-3 1:7.4.1-1~bpo11+2
ii  libuno-sal3 1:7.4.1-1~bpo11+2
ii  libuno-salhelpergcc3-3  1:7.0.4-4+deb11u4
ii  libwebp60.6.1-2.1
ii  libx11-62:1.7.2-1
ii  libx11-xcb1 2:1.7.2-1
ii  libxext62:1.3.3-1.1
ii  libxinerama12:1.1.4-2
ii  libxml2 

Bug#1003974: similar bugs having to do with icons not appearing

2022-11-07 Thread Tomas Pospisek

Hi bug reporters and Libre Office maintainers,

there's a number of bugs related to Icon rendering that seem to be simlar 
or identical. Herewith I'm posting to them to crosslink them.


I have however *not* looked at them in depth. Here are the bug reports:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661818
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969977
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003974
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972280

The idea of posting to all of them/crosslinking them is the hope that 
maybe the reporters and or maintainers can verify that they are the same 
and/or find workarounds or root causes/fixes to all of them...


*t



Bug#1020279: hcloud-cli: please package a newer version (wish: --label suport)

2022-09-19 Thread Tomas Pospisek
Package: hcloud-cli
Version: 1.13.0-2+b6
Severity: wishlist
X-Debbugs-Cc: Thorsten Alteholz 

Hi,

thanks for packaging hcloud-cli. I'd be glad if a more recent hcloud-cli
version would be available in Debian, specifically one > 1.16, because
that version supports the `--label` flag on server commands, which I
need to do categorize Hetzner resources.

Thanks for the hcloud package!
*t

-- System Information:
Debian Release: 11.5
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-18-amd64 (SMP w/8 CPU threads)
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages hcloud-cli depends on:
ii  libc6  2.31-13+deb11u4

hcloud-cli recommends no packages.

hcloud-cli suggests no packages.

-- no debconf information



Bug#887035: cron: Patch by Greek adapted for cron 3.0pl1-137

2022-07-24 Thread Tomas Pospisek

Hi Georges,

first off: this patch is completely irrelevant IMHO. We should not be 
discussing it. What's relevant is [1].


On Sun, 24 Jul 2022, Georges Khaznadar wrote:


two remarks:

1) most of Greek's patches which you adapted is about making cron
  installable without the package syslog.


That is what it claims but not what it does AFAICS. What it does is
adapt the `log_it` function so that it takes a `priority` parameter. But 
again. This patch is irrelevant. [1] is relevant IMO.



  Were are the parts about
  "log-to-stdout-when-in-foreground"?


It's at [2]. But it's irrelevant. [1] is relevant.


  I see that one patch modifies debian/patches/series, mentioning the
  file log-to-stdout-when-in-foreground, but that file is provided
  nowhere by the set of patches.


Again see [2]. But it's irrelevant. [1] is relevant.


By the way, do you know who is "Greek"?


No


  She or he did not reply to questions which I submitted about
  Bug#887014 ...


It's been 4 years since this bug has been filed so "Greek" might have 
moved on since.



  Is "Greek" a pseudonyme of yours?


No


2) I shall not patch cron 3.0pl1-137. You can do it if you want,
  for your own usage, of course. If I modify debian's cron package, I
  must do it in the testing distribution, so please propose patches
  targetting at least cron 3.0pl1-147. Then, if the modification you
  are wishing is accepted in debian/testing, I can create a backport to
  use in debian/bullseye later, for example a release such as cron
  3.0pl1-149~bpo11+1, to be published in bullseye-backports.


Ack. However I do not want that patch to be included because as I said as 
far as I can see it does *not* activate output to STDOUT, contrary to what 
the origianl message by "Greek" claims. That patch is irrelevant, I have 
only posted it in case somebody is interested in using it. But I am 
*not* interested in it. I am interested in [1] only.


Thanks!
*t

[1] - enable debugging logs: 
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887035#15/
[2] - debian/patches: 
https://bugs.debian.org/cgi-bin/bugreport.cgi?att=2;bug=887035;filename=log-to-stdout-when-in-foreground;msg=25



Best regards,   Georges.
Tomas Pospisek a écrit :

Package: cron
Version: 3.0pl1-137
Followup-For: Bug #887035
X-Debbugs-Cc: Georges Khaznadar 

If anybody wants to use Greek's patch (see [1] and [2]) then I'm attaching my
version of it adapted to cron 3.0pl1-137 (the version in Debian bullseye).

It comes in two parts: one is the patch and one is
cron-3.0pl1/debian/patches/log-to-stdout-when-in-foreground to satisfy
the Debian build infrastructure.

Use the patch like this to build a new, patched cron package:

apt-get source cron
sudo apt-get build-dep cron
patch -p0 < 
cron-syslog-fix-and-foreground-stdout.for-new-cron.debianized.patch
cp log-to-stdout-when-in-foreground cron-3.0pl1/debian/patches
cd cron-3.0pl1 && dpkg-buildpackage -rfakeroot

*t

[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887035#5
[2] 
https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=887035;filename=cron-syslog-fix-and-foreground-stdout.patch;msg=5



-- Package-specific info:
--- EDITOR:


--- /usr/bin/editor:
/usr/bin/vim.gtk3

--- /usr/bin/crontab:
-rwxr-sr-x 1 root crontab 43568 Feb 22  2021 /usr/bin/crontab

--- /var/spool/cron:
drwxr-xr-x 3 root root 4096 Apr 10  2021 /var/spool/cron

--- /var/spool/cron/crontabs:
drwx-wx--T 2 root crontab 4096 Feb 22  2021 /var/spool/cron/crontabs

--- /etc/cron.d:
drwxr-xr-x 2 root root 4096 Jul 22 15:03 /etc/cron.d

--- /etc/cron.daily:
drwxr-xr-x 2 root root 4096 Jul 11 09:33 /etc/cron.daily

--- /etc/cron.hourly:
drwxr-xr-x 2 root root 4096 Apr 10  2021 /etc/cron.hourly

--- /etc/cron.monthly:
drwxr-xr-x 2 root root 4096 Apr 10  2021 /etc/cron.monthly

--- /etc/cron.weekly:
drwxr-xr-x 2 root root 4096 Apr 10  2021 /etc/cron.weekly


-- System Information:
Debian Release: 11.4
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-16-amd64 (SMP w/8 CPU threads)
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages cron depends on:
ii  adduser  3.118
ii  debianutils  4.11.2
ii  init-system-helpers  1.60
ii  libc62.31-13+deb11u3
ii  libpam-runtime   1.4.0-9+deb11u1
ii  libpam0g 1.4.0-9+deb11u1
ii  libselinux1  3.1-3
ii  lsb-base 11.1.0
ii  sensible-utils   0.0.14

Versions of packages cron recommends:
ii  msmtp-mta [mail-transport-agent]  1.8.11-2.1

Versions of packages cron suggests:
ii  anacron2.3-30
pn  checksecurity  
ii  logrotate  3.18.0-2+deb11u1

Versions of packages cron is related to:
pn  libnss-l

Bug#887035: cron: one "easy" way to get cron output

2022-07-23 Thread Tomas Pospisek

Hello Georges,

On Fri, 22 Jul 2022, Georges Khaznadar wrote:


Would it seem reasonable, for your needs, to find two separate binary
packages in Debian, "cron" and let us say, "cron-debug"? Both package
would be built from the same source, the first one with no special
build parameter, the second one with debugging activated (and output to
stdout activated by the switch -f)?


* yes, having a separate package would be fine

* in case you want to go with a separate package than I'd suggest
  `cron-log-to-stderr` as the name because that makes it explicit what
  that package is about.

* however why not keep it in one single package and just make the debug
  feature available?

* as is the `-f` switch will *not* activate output to STDOUT. The patch
  provided by `Greek` [1] does *not* make `-f` log to STDOUT (instead the
  main function of the patch is to add the `priority` parameter to the
  `log_it` function that does the logging to STDERR and to syslog).

* the command line option that switches on logging to STDERR is
  `-x what_to_log`.

Again, I'd argue to make the `-x` aka "debugging output" *feature* 
available by default (it will *not* make cron log to STDERR by default. 
That needs to be done explicitly by supplying the `-x` switch) and 
continue with a single package. It there any technical reason why the 
"debugging output" *feature* should not be available?


Thanks a lot for caring about this issue!
*t

[1] 
https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=887035;filename=cron-syslog-fix-and-foreground-stdout.patch;msg=5

(I've snipped off the rest of the toplevel posting.)



Bug#887035: cron: Patch by Greek adapted for cron 3.0pl1-137

2022-07-23 Thread Tomas Pospisek
Package: cron
Version: 3.0pl1-137
Followup-For: Bug #887035
X-Debbugs-Cc: Georges Khaznadar 

If anybody wants to use Greek's patch (see [1] and [2]) then I'm attaching my
version of it adapted to cron 3.0pl1-137 (the version in Debian bullseye).

It comes in two parts: one is the patch and one is
cron-3.0pl1/debian/patches/log-to-stdout-when-in-foreground to satisfy
the Debian build infrastructure.

Use the patch like this to build a new, patched cron package:

apt-get source cron
sudo apt-get build-dep cron
patch -p0 < 
cron-syslog-fix-and-foreground-stdout.for-new-cron.debianized.patch
cp log-to-stdout-when-in-foreground cron-3.0pl1/debian/patches
cd cron-3.0pl1 && dpkg-buildpackage -rfakeroot

*t

[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887035#5
[2] 
https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=887035;filename=cron-syslog-fix-and-foreground-stdout.patch;msg=5



-- Package-specific info:
--- EDITOR:


--- /usr/bin/editor:
/usr/bin/vim.gtk3

--- /usr/bin/crontab:
-rwxr-sr-x 1 root crontab 43568 Feb 22  2021 /usr/bin/crontab

--- /var/spool/cron:
drwxr-xr-x 3 root root 4096 Apr 10  2021 /var/spool/cron

--- /var/spool/cron/crontabs:
drwx-wx--T 2 root crontab 4096 Feb 22  2021 /var/spool/cron/crontabs

--- /etc/cron.d:
drwxr-xr-x 2 root root 4096 Jul 22 15:03 /etc/cron.d

--- /etc/cron.daily:
drwxr-xr-x 2 root root 4096 Jul 11 09:33 /etc/cron.daily

--- /etc/cron.hourly:
drwxr-xr-x 2 root root 4096 Apr 10  2021 /etc/cron.hourly

--- /etc/cron.monthly:
drwxr-xr-x 2 root root 4096 Apr 10  2021 /etc/cron.monthly

--- /etc/cron.weekly:
drwxr-xr-x 2 root root 4096 Apr 10  2021 /etc/cron.weekly


-- System Information:
Debian Release: 11.4
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-16-amd64 (SMP w/8 CPU threads)
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages cron depends on:
ii  adduser  3.118
ii  debianutils  4.11.2
ii  init-system-helpers  1.60
ii  libc62.31-13+deb11u3
ii  libpam-runtime   1.4.0-9+deb11u1
ii  libpam0g 1.4.0-9+deb11u1
ii  libselinux1  3.1-3
ii  lsb-base 11.1.0
ii  sensible-utils   0.0.14

Versions of packages cron recommends:
ii  msmtp-mta [mail-transport-agent]  1.8.11-2.1

Versions of packages cron suggests:
ii  anacron2.3-30
pn  checksecurity  
ii  logrotate  3.18.0-2+deb11u1

Versions of packages cron is related to:
pn  libnss-ldap   
pn  libnss-ldapd  
pn  libpam-ldap   
pn  libpam-mount  
pn  nis   
pn  nscd  

-- no debconf information
diff -u -r orig/cron-3.0pl1/cron.c cron-3.0pl1/cron.c
--- orig/cron-3.0pl1/cron.c 2022-07-19 12:18:36.0 +0200
+++ cron-3.0pl1/cron.c  2022-07-19 14:24:39.0 +0200
@@ -122,12 +122,12 @@
} else if (!stay_foreground) {
switch (fork()) {
case -1:
-   log_it("CRON",getpid(),"DEATH","can't fork");
+   log_it(LOG_ERR, "CRON",getpid(),"DEATH","can't fork");
exit(0);
break;
case 0:
/* child process */
-   log_it("CRON",getpid(),"STARTUP","fork ok");
+   log_it(LOG_INFO, "CRON",getpid(),"STARTUP","fork ok");
(void) setsid();
freopen("/dev/null", "r", stdin);
freopen("/dev/null", "w", stdout);
@@ -281,18 +281,18 @@
/* Run on actual reboot, rather than cron restart */
if (access(REBOOT_FILE, F_OK) == 0) {
/* File exists, return */
-   log_it("CRON", getpid(),"INFO",
+   log_it(LOG_INFO, "CRON", getpid(),"INFO",
"Skipping @reboot jobs -- not system startup");
return;
}
/* Create the file */
if ((rbfd = creat(REBOOT_FILE, S_IRUSR & S_IWUSR)) < 0) {
/* Bad news, bail out */
-   log_it("CRON",getpid(),"DEATH","Can't create reboot check 
file");
+   log_it(LOG_ERR, "CRON",getpid(),"DEATH","Can't create reboot 
check file");
exit(0);
} else {
close(rbfd);
-   log_it("CRON", getpid(),"INFO", "Running @reboot jobs");
+   log_it(LOG_INFO, "CRON", getpid(),"INFO", "Running @reboot 
jobs");
}
Debug(DMISC, ("[%d], running reboot jobs\n", getpid()));
for (u = db->head;  u != NULL;  u = u->next) {
diff -u -r orig/cron-3.0pl1/cron.h cron-3.0pl1/cron.h
--- orig/cron-3.0pl1/cron.h 2022-07-19 12:18:36.0 +0200
+++ cron-3.0pl1/cron.h  2022-07-19 14:24:39.0 +0200
@@ -144,6 +144,20 @@
 #define

Bug#887035: cron: one "easy" way to get cron output

2022-07-22 Thread Tomas Pospisek
Package: cron
Version: 3.0pl1-137
Followup-For: Bug #887035
X-Debbugs-Cc: Greek , Javier Fernández-Sanguino Peña 
, Georges Khaznadar 

Instead of patching cron, an easy way to get cron output to stdout is
to:

* rebuild it with debugging enabled:

  $ apt-get source cron
  $ apt-get build-dep cron
  $ cd cron-3.0pl1
  $ DEB_BUILD_OPTIONS=debug dpkg-buildpackage -rfakeroot

* use the undocumented `-x` option of Debian's cron to start it:

   # cron -f -L 15 -x misc

  (I found the `misc` debug log the most suiting)

* wrap the whole thing to redirect stderr to stdout:

  $ cat run-cron
  #!/bin/sh
  exec cron -f -L 15 -x misc 2>&1

@Georges Khaznadar : what do you think about:

1. enabling debugging by default?
2. documenting `-x` ?

If Debian would enable the "debbugging feature" of its cron by default,
then this would add this overhead in a few places:

if ( (DebugFlags & (mask) )  ) printf message;

Since DebugFlags is 0 by default, this will ad an overhead of about two
machine instructions I guess to a few places, which is a neglible
waste/slowdown IMHO.

With the "debugging feature" enabled Debian's cron will gain the very
nice features:

a) for the sysadmin to be able to debug what cron is doing and why and
b) use the sysadmin being able to use Debian's cron in docker and kubernetes.

IMHO a huge gain that costs nothing.

?
*t

-- Package-specific info:
--- EDITOR:


--- /usr/bin/editor:
/usr/bin/vim.gtk3

--- /usr/bin/crontab:
-rwxr-sr-x 1 root crontab 43568 Feb 22  2021 /usr/bin/crontab

--- /var/spool/cron:
drwxr-xr-x 3 root root 4096 Apr 10  2021 /var/spool/cron

--- /var/spool/cron/crontabs:
drwx-wx--T 2 root crontab 4096 Feb 22  2021 /var/spool/cron/crontabs

--- /etc/cron.d:
drwxr-xr-x 2 root root 4096 Jul 22 15:03 /etc/cron.d

--- /etc/cron.daily:
drwxr-xr-x 2 root root 4096 Jul 11 09:33 /etc/cron.daily

--- /etc/cron.hourly:
drwxr-xr-x 2 root root 4096 Apr 10  2021 /etc/cron.hourly

--- /etc/cron.monthly:
drwxr-xr-x 2 root root 4096 Apr 10  2021 /etc/cron.monthly

--- /etc/cron.weekly:
drwxr-xr-x 2 root root 4096 Apr 10  2021 /etc/cron.weekly


-- System Information:
Debian Release: 11.4
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-16-amd64 (SMP w/8 CPU threads)
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages cron depends on:
ii  adduser  3.118
ii  debianutils  4.11.2
ii  init-system-helpers  1.60
ii  libc62.31-13+deb11u3
ii  libpam-runtime   1.4.0-9+deb11u1
ii  libpam0g 1.4.0-9+deb11u1
ii  libselinux1  3.1-3
ii  lsb-base 11.1.0
ii  sensible-utils   0.0.14

Versions of packages cron recommends:
ii  msmtp-mta [mail-transport-agent]  1.8.11-2.1

Versions of packages cron suggests:
ii  anacron2.3-30
pn  checksecurity  
ii  logrotate  3.18.0-2+deb11u1

Versions of packages cron is related to:
pn  libnss-ldap   
pn  libnss-ldapd  
pn  libpam-ldap   
pn  libpam-mount  
pn  nis   
pn  nscd  

-- no debconf information


Bug#1008813: ITP: cargo-strip -- subcommand that reduces the size of Rust binaries

2022-04-04 Thread Tomas Pospisek

On 02.04.22 03:46, Josenilson Ferreira da Silva wrote:

Package: wnpp
Severity: wishlist
Owner: Josenilson Ferreira da Silva 
X-Debbugs-Cc: debian-de...@lists.debian.org, nilsonfsi...@hotmail.com

* Package name: cargo-strip
   Version : 0.2.2
   Upstream Author : Guillaume Valadon 
* URL : https://github.com/guedou/cargo-strip/issues
* License : MIT/X,
   Programming Lang: rust
   Description : subcommand that reduces the size of Rust binaries

subcommand that reduces the size of Rust binaries
  As of Rust 1.59, the charge command is now able to remove a binary.
  This can be activated in your Cargo.toml.


"the charge command is now able to remove a binary". You mean like `rm 
/usr/local/bin/foobar`? I /think/ that's not what you wanted to express?

*t



Bug#1008575: Wi-Fi works with loglevel=3 but not without

2022-03-29 Thread Tomas Pospisek

I wrote:

Wi-Fi stops working after upgrading from -12- to 
linux-image-5.10.0-13-amd64 (iwlwifi: probe of :00:14.3 failed with 
error -110))


So in order to get more debug info, I set `loglevel=3` in grub in the 
kernel command line.


That changed two things:

* now while booting I get to see the line on screen:
  iwlwifi :00:14.3: firmware: failed to load iwl-debug-yoyo.bin (-2)
  That wouldn't get displayed previously when booting without `loglevel=3`

* now Wi-Fi actually works!
  kernel logs say:
  Mar 29 09:03:29 enfi kernel: [4.631274] iwlwifi :00:14.3: firmware: 
direct-loading firmware iwlwifi-QuZ-a0-hr-b0-59.ucode
  Mar 29 09:03:29 enfi kernel: [4.631282] iwlwifi :00:14.3: api flags 
index 2 larger than supported by driver
  Mar 29 09:03:29 enfi kernel: [4.631290] iwlwifi :00:14.3: 
TLV_FW_FSEQ_VERSION: FSEQ Version: 65.3.35.22
  Mar 29 09:03:29 enfi kernel: [4.631539] iwlwifi :00:14.3: loaded 
firmware version 59.601f3a66.0 QuZ-a0-hr-b0-59.ucode op_mode iwlmvm
  Mar 29 09:03:29 enfi kernel: [4.631551] iwlwifi :00:14.3: firmware: 
failed to load iwl-debug-yoyo.bin (-2)
  [...]
  Mar 29 09:03:29 enfi kernel: [4.893787] iwlwifi :00:14.3: Detected 
Intel(R) Wi-Fi 6 AX201 160MHz, REV=0x354

Repeatedly switching back and forth between booting kernel ...-13 with or 
without `loglevel=3` will alternate between working and non-working Wi-Fi.

*t

On Mon, 28 Mar 2022, Debian Bug Tracking System wrote:


Thank you for filing a new Bug report with Debian.

You can follow progress on this Bug here: 1008575: 
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008575.

This is an automatically generated reply to let you know your message
has been received.

Your message is being forwarded to the package maintainers and other
interested parties for their attention; they will reply in due course.

Your message has been sent to the package maintainer(s):
Debian Kernel Team 

If you wish to submit further information on this problem, please
send it to 1008...@bugs.debian.org.

Please do not send mail to ow...@bugs.debian.org unless you wish
to report a problem with the Bug-tracking system.

--
1008575: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008575
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems





Bug#1008575: linux-image-5.10.0-13-amd64: Wi-Fi stops working after upgrading from -12- to linux-image-5.10.0-13-amd64 (iwlwifi: probe of 0000:00:14.3 failed with error -110)

2022-03-28 Thread Tomas Pospisek
Package: src:linux
Version: 5.10.106-1
Severity: important

Dear Kernel maintainers and other Debian users that maybe have the same problem,

After upgrading from linux-image-5.10.0-12-amd64 to linux-image-5.10.0-13-amd64
the iwlwifi is unable to initialise the Intel Corporation Wi-Fi 6 AX201 (rev 20)
Wi-Fi device.

Before:

  [4.549794] iwlwifi :00:14.3: firmware: direct-loading firmware 
iwlwifi-QuZ-a0-hr-b0-59.ucode
  [4.549800] iwlwifi :00:14.3: api flags index 2 larger than supported 
by driver
  [4.549808] iwlwifi :00:14.3: TLV_FW_FSEQ_VERSION: FSEQ Version: 
65.3.35.22
  [4.550084] iwlwifi :00:14.3: loaded firmware version 59.601f3a66.0 
QuZ-a0-hr-b0-59.ucode op_mode iwlmvm
  [4.550099] iwlwifi :00:14.3: firmware: failed to load 
iwl-debug-yoyo.bin (-2)

After:

  [4.481502] iwlwifi: probe of :00:14.3 failed with error -110  
 

The bug looks remotely similar to:

https://bugs.debian.org/976110
https://bugs.debian.org/1003026
https://bugs.debian.org/976110

I've given the bug the severity: important, because this laptop is
mostly used for being online and thus without that function is becomes
more or less useless.

I'll check whether I find something upstream. And report back.
*t

-- Package-specific info:
** Version:
Linux version 5.10.0-12-amd64 (debian-ker...@lists.debian.org) (gcc-10 (Debian 
10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2) #1 SMP 
Debian 5.10.103-1 (2022-03-07)

** Command line:
BOOT_IMAGE=/boot/vmlinuz-5.10.0-12-amd64 
root=UUID=2fd78bce-bb85-4405-82b5-2779947d695e ro quiet

** Not tainted

** Kernel log:

** Model information
sys_vendor: HP
product_name: HP ENVY Laptop 17-cg1xxx
product_version: Type1ProductConfigId
chassis_vendor: HP
chassis_version: Chassis Version
bios_vendor: Insyde
bios_version: F.12
board_vendor: HP
board_name: 8822
board_version: 49.36

** Loaded modules:
ctr
ccm
rfcomm
cmac
algif_hash
algif_skcipher
af_alg
bnep
binfmt_misc
dm_crypt
dm_mod
snd_soc_skl_hda_dsp
snd_soc_hdac_hdmi
snd_soc_dmic
mei_hdcp
intel_rapl_msr
x86_pkg_temp_thermal
intel_powerclamp
coretemp
snd_hda_codec_hdmi
snd_hda_codec_realtek
snd_hda_codec_generic
kvm_intel
kvm
snd_sof_pci
snd_sof_intel_byt
snd_sof_intel_ipc
snd_sof_intel_hda_common
snd_sof_xtensa_dsp
snd_sof
snd_sof_intel_hda
snd_soc_hdac_hda
snd_hda_ext_core
snd_soc_acpi_intel_match
snd_soc_acpi
irqbypass
ledtrig_audio
intel_cstate
intel_uncore
snd_hda_intel
joydev
snd_intel_dspcfg
soundwire_intel
soundwire_generic_allocation
btusb
iwlmvm
snd_soc_core
btrtl
btbcm
btintel
snd_compress
pcspkr
soundwire_cadence
bluetooth
mac80211
serio_raw
efi_pstore
hp_wmi
snd_hda_codec
libarc4
wmi_bmof
snd_hda_core
snd_hwdep
iwlwifi
soundwire_bus
uvcvideo
jitterentropy_rng
snd_pcm
videobuf2_vmalloc
videobuf2_memops
videobuf2_v4l2
videobuf2_common
drbg
snd_timer
videodev
snd
ansi_cprng
iTCO_wdt
intel_pmc_bxt
iTCO_vendor_support
cfg80211
ee1004
watchdog
soundcore
ecdh_generic
mmc_block
mc
ecc
mei_me
mei
rfkill
hid_multitouch
ucsi_acpi
processor_thermal_device
typec_ucsi
intel_rapl_common
intel_soc_dts_iosf
typec
tpm_crb
int3403_thermal
tpm_tis
int340x_thermal_zone
tpm_tis_core
ac
tpm
intel_hid
sparse_keymap
rng_core
soc_button_array
int3400_thermal
acpi_pad
evdev
acpi_thermal_rel
intel_pmc_core
msr
parport_pc
ppdev
lp
parport
fuse
configfs
efivarfs
ip_tables
x_tables
autofs4
ext4
crc16
mbcache
jbd2
raid10
raid456
async_raid6_recov
async_memcpy
async_pq
async_xor
async_tx
xor
raid6_pq
libcrc32c
crc32c_generic
raid1
raid0
multipath
linear
md_mod
i915
i2c_algo_bit
nvme
crc32_pclmul
spi_pxa2xx_platform
crc32c_intel
drm_kms_helper
nvme_core
hid_generic
dw_dmac
ahci
dw_dmac_core
libahci
t10_pi
rtsx_pci_sdmmc
ghash_clmulni_intel
crc_t10dif
libata
mmc_core
cec
crct10dif_generic
drm
aesni_intel
scsi_mod
xhci_pci
xhci_hcd
libaes
crct10dif_pclmul
crypto_simd
crct10dif_common
usbcore
cryptd
glue_helper
vmd
rtsx_pci
i2c_i801
intel_lpss_pci
i2c_smbus
intel_lpss
idma64
usb_common
i2c_hid
fan
wmi
hid
battery
video
button

** PCI devices:
:00:00.0 Host bridge [0600]: Intel Corporation 11th Gen Core Processor Host 
Bridge/DRAM Registers [8086:9a14] (rev 01)
Subsystem: Hewlett-Packard Company 11th Gen Core Processor Host 
Bridge/DRAM Registers [103c:8822]
Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- 

:00:02.0 VGA compatible controller [0300]: Intel Corporation TigerLake GT2 
[Iris Xe Graphics] [8086:9a49] (rev 01) (prog-if 00 [VGA controller])
Subsystem: Hewlett-Packard Company Iris Xe Graphics [103c:8822]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx+
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- 
Kernel driver in use: i915
Kernel modules: i915


Bug#1003887: terminology: outputs error on start: Could not fetch a node located at 0x40000004529e

2022-01-17 Thread Tomas Pospisek
Package: terminology
Version: 1.9.0-2
Severity: minor

When starting terminology I see:

```
ERR<148513>:elementary ../src/lib/elementary/efl_ui_focus_manager_calc.c:1529 
_efl_ui_focus_manager_calc_efl_ui_focus_manager_manager_focus_set() Could not 
fetch a node located at 0x4004529e
## Copy & Paste the below (until EOF) into a terminal, then hit Enter

eina_btlog << EOF
/lib/x86_64-linux-gnu/libeina.so.1   0x7f2e06086ebc 0x7f2e0605a000
/lib/x86_64-linux-gnu/libeina.so.1   0x7f2e060880c1 0x7f2e0605a000
/lib/x86_64-linux-gnu/libeina.so.1   0x7f2e060896f3 0x7f2e0605a000
/lib/x86_64-linux-gnu/libelementary.so.1 0x7f2e05ebe24e 0x7f2e05b61000
/lib/x86_64-linux-gnu/libelementary.so.1 0x7f2e05eb8552 0x7f2e05b61000
/lib/x86_64-linux-gnu/libelementary.so.1 0x7f2e05ebb925 0x7f2e05b61000
/lib/x86_64-linux-gnu/libelementary.so.1 0x7f2e05eb915a 0x7f2e05b61000
/usr/bin/terminology 0x55cc71f83d73 0x55cc71f2c000
/usr/bin/terminology 0x55cc71f878bd 0x55cc71f2c000
/lib/x86_64-linux-gnu/libeo.so.1 0x7f2e057b28e2 0x7f2e0579b000
/lib/x86_64-linux-gnu/libeo.so.1 0x7f2e057ad090 0x7f2e0579b000
/lib/x86_64-linux-gnu/libelementary.so.1 0x7f2e05e8cd45 0x7f2e05b61000
/lib/x86_64-linux-gnu/libecore_evas.so.1 0x7f2e05b405b9 0x7f2e05b2d000
/lib/x86_64-linux-gnu/ecore_evas/engines/x/v-1.25/module.so  0x7f2e00fb3429 
0x7f2e00fa7000
/lib/x86_64-linux-gnu/libecore.so.1  0x7f2e06120480 0x7f2e060fa000
/lib/x86_64-linux-gnu/libecore.so.1  0x7f2e06129642 0x7f2e060fa000
/lib/x86_64-linux-gnu/libecore.so.1  0x7f2e06122439 0x7f2e060fa000
/lib/x86_64-linux-gnu/libecore.so.1  0x7f2e0612130c 0x7f2e060fa000
/lib/x86_64-linux-gnu/libecore.so.1  0x7f2e0611bef6 0x7f2e060fa000
/lib/x86_64-linux-gnu/libecore.so.1  0x7f2e0611c6e5 0x7f2e060fa000
/lib/x86_64-linux-gnu/libecore.so.1  0x7f2e06122295 0x7f2e060fa000
/lib/x86_64-linux-gnu/libecore.so.1  0x7f2e061215cc 0x7f2e060fa000
/lib/x86_64-linux-gnu/libecore.so.1  0x7f2e0611c7d7 0x7f2e060fa000
/usr/bin/terminology 0x55cc71f4d16e 0x55cc71f2c000
/usr/bin/terminology 0x55cc71f4169d 0x55cc71f2c000
/lib/x86_64-linux-gnu/libc.so.6  0x7f2e057e9d0a 0x7f2e057c3000
/usr/bin/terminology 0x55cc71f416da 0x55cc71f2c000
EOF
```

This is not very nice, but terminology still works. Thus I'm assigning a
severitfy of "minor".

Piping that to eina_btlog gives:

```
/lib/x86_64-linux-gnu/libeina.so.1  |   
??/??  : 32655 @ _eina_semaphore_free()
/lib/x86_64-linux-gnu/libeina.so.1  |   
??/??  : 32655 @ eina_log_print_cb_stdout()
/lib/x86_64-linux-gnu/libeina.so.1  |   
??/??  : 32655 @ eina_log_print()
/lib/x86_64-linux-gnu/libelementary.so.1|   
??/??  : 32655 @ efl_ui_focus_manager_calc_update_order()
y/lib/x86_64-linux-gnu/libelementary.so.1|  
 ??/??  : 32655 @ efl_ui_focus_manager_focus_set()
/lib/x86_64-linux-gnu/libelementary.so.1|   
??/??  : 32655 @ efl_ui_focus_manager_calc_update_order()
/lib/x86_64-linux-gnu/libelementary.so.1|   
??/??  : 32655 @ efl_ui_focus_manager_pop_history_stack()
 /usr/bin/terminology   |   
??/??  : 32655 @ MD5Final()
 /usr/bin/terminology   |   
??/??  : 32655 @ MD5Final()
/lib/x86_64-linux-gnu/libeo.so.1|   
??/??  : 32655 @ efl_provider_unregister()
/lib/x86_64-linux-gnu/libeo.so.1|   
??/??  : 32655 @ efl_event_callback_legacy_call()
/lib/x86_64-linux-gnu/libelementary.so.1|   
??/??  : 32655 @ elm_win_rotation_with_resize_set()
/lib/x86_64-linux-gnu/libecore_evas.so.1|   
??/??  : 32655 @ _ecore_evas_focus_device_set()
/lib/x86_64-linux-gnu/ecore_evas/engines/x/v-1.25/module.so |   
  /: 0 @ ()
/lib/x86_64-linux-gnu/libecore.so.1 |   
??/??  : 0 @ ecore_main_fd_handler_active_set()
/lib/x86_64-linux-gnu/libecore.so.1 |   
??/??  : 0 @ efl_loop_message_handler_message_call()
/lib/x86_64-linux-gnu/libecore.so.1 |   
??/??  : 0 @ efl_loop_timeout()
/lib/x86_64-linux-gnu/libecore.so.1 |   
??/??  : 0 @ efl_loop_message_process()
/lib/x86_64-linux-gnu/libecore.so.1 |   
??/??  

Bug#978650: podman: Failing by default?

2021-12-28 Thread Tomas Pospisek
Package: podman
Followup-For: Bug #978650
X-Debbugs-Cc: Antonio Terceiro , Reinhard Tartler 
, Andrej Shadura 

Debian's podman isn't able to resolve short names out of the box.

It seems however that upstream is (I have not verified that - I'm
infering that from looking at an example [1]).

Behaving differently from vanilla upstream will mean that recipes
working out of the box with upstream will fail on Debian.

I respect and consider valid the argument about the security aspect of
using short-names brought forward by Reinhard in [2]. What I'd like to
question is the weighting of:

* convenience
* being compatible with upstream

versus

* security aspect

We gain securty by breaking convenience and compatibility with upstream.
That's the price we pay here for that bit of security.

Now let's consider the security part. It's a given that if you are using
a random container image then you *will* get a random container image.
Which is maybe not a very wise thing to do.

However *are* people using random images without a second thought? And
additionaly: do we want to protect people from using random images from
the internet? It is a given that Unix is giving you the gun and if you
point it at your foot and pull the trigger then the result will be bad.
Being a Unix system admin one *must* be traditionally careful.

How is this different with short-names? Why do we now have to protect
the admin or the user?

I think just like with everything else, recipes on the internet do *not*
include random short-names but instead standard ones, such as official
python or debian images. Also users are aware that installing a random
container will execute random code on one's system.

Therefore I'd like to argue that going with upstream behavior would be
the better setting.

Whichever way the argument goes: thanks a lot for maintaining podman!
*t

[1] 
https://github.com/ansible-community/ansible-bender/blob/master/simple-playbook.yaml
[2] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978650#90

-- System Information:
Debian Release: 11.2
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-10-amd64 (SMP w/8 CPU threads)
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages podman depends on:
ii  conmon   2.0.25+ds1-1.1
ii  containernetworking-plugins  0.9.0-1+b6
ii  golang-github-containers-common  0.33.4+ds1-1
ii  init-system-helpers  1.60
ii  iptables 1.8.7-1
ii  libc62.31-13+deb11u2
ii  libdevmapper1.02.1   2:1.02.175-2.1
ii  libgpgme11   1.14.0-1+b2
ii  libseccomp2  2.5.1-1+deb11u1
ii  runc 1.0.0~rc93+ds1-5+b2

Versions of packages podman recommends:
ii  buildah   1.19.6+dfsg1-1+b6
ii  fuse-overlayfs1.4.0-1
ii  golang-github-containernetworking-plugin-dnsname  1.1.1+ds1-4+b7
ii  slirp4netns   1.0.1-2
ii  tini  0.19.0-1
ii  uidmap1:4.8.1-1

Versions of packages podman suggests:
pn  containers-storage  
ii  docker-compose  1.25.0-1

-- Configuration Files:
/etc/cni/net.d/87-podman-ptp.conflist [Errno 13] Keine Berechtigung: 
'/etc/cni/net.d/87-podman-ptp.conflist'

-- no debconf information



Bug#922499: spamassassin: sa-update fails with error "Cannot open file ..."

2021-12-27 Thread Tomas Pospisek

Hi Noah and ticket participants,

I've been recently getting the

Cannot open file 
/var/lib/spamassassin/3.004002/updates_spamassassin_org/1896304.tar.gz: No such 
file or directory at /usr/bin/sa-update line 1600.

error from cron.

Since you wrote:


I believe that the fix from
https://svn.apache.org/viewvc/spamassassin/branches/3.4/sa-update.raw?r1=1842326=1842325=1842326
should be sufficient and easily backportable.


please allow me to ask: is there a particular reason why you don't publish 
a package with the patch applied? This is not meant as a critique or 
application of pressure but as a attempt to understand.


* is there a need to test the patch and report back on whether it works?
* is it that you do not want to do the work to release an updated package
  (which is completely legitimate to me). In which case would it be OK if
  somebody else pushed (NMU...) a patched version?

For context: I certainly can patch my local spamassassin version however I 
guess it'd be more helpful, if all users of spamassasin would get the fix.


That said, my system is still running oldstable, so maybe it's just not 
worth the effort and the better path forward is just to upgrade to the 
bullseye...


Thanks a lot!!! (And I wish everybody nice holiday and soon a happy and 
good new year!)

*t



Bug#1002573: follow-up 4

2021-12-27 Thread Tomas Pospisek

Hi Detlev,

On Mon, 27 Dec 2021, detlev schmidtke wrote:


and I do not agree that this is a sole kernel problem

fstrim --verbose

should report something, anything


* there still isn't a text only output (as opposed to an image) of what
  you are seeing in the bugreport. So people that get emails from this
  bugreport tendentially do not know what you are talking about. Again:
  please add a text-only output of what the problem is to the bug report

* Debian's bug tracking system is a bit weird in that by default (as far
  as I know) only the package maintainer gets an email. The ticket now
  being assigned to the kernel, the maintainer of linux-utils did not get
  any notice about what you wrote above. You have to include him
  explicitly (which I've done in this email).

*t



Bug#1002573: please include console output in text form

2021-12-26 Thread Tomas Pospisek

Hi nst0022,

I have reassigned your bugreport to the correct package, namely 
util-linux.


Please when filing a bug report, assign the bug to the correct package in 
the first place, otherwise:


* you'll be generating triage work for others
* your bug report won't be seen by the maintainers and therefore be
  possibly useles

Also please do *not* attach screenshots, when you can copy/paste text. 
Images are not searchable as oposed to text, which easily is. Also images 
are harder to manage (how do I cite text in your image?).


So could you please write a follow up to your report, that includes the 
*text* only (no screen shot).


Thanks,
*t



Bug#1001461: network-manager-openconnect: the problem is not having installed the network-manager-openconnect-gnome package

2021-12-10 Thread Tomas Pospisek
Package: network-manager-openconnect
Version: 1.2.6-1
Followup-For: Bug #1001461

When I try to a VPN connection by executing `nm-connection-editor`,
after pressing the button "Create..." I see in the console:

** (nm-connection-editor:27682): WARNING **: 15:31:07.165: Could not load 
editor VPN plugin for ?org.freedesktop.NetworkManager.openconnect? (missing 
plugin file 
"/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-vpn-plugin-openconnect-editor.so").
(nm-connection-editor:27682): Gtk-CRITICAL **: 15:31:07.165: 
gtk_widget_get_parent: assertion 'GTK_IS_WIDGET (widget)' failed
(nm-connection-editor:27682): GLib-GObject-CRITICAL **: 15:31:07.165: 
g_object_set_data: assertion 'G_IS_OBJECT (object)' failed
(nm-connection-editor:27682): Gtk-CRITICAL **: 15:31:07.165: 
gtk_notebook_insert_page: assertion 'GTK_IS_WIDGET (child)' failed
(nm-connection-editor:27682): Gtk-CRITICAL **: 15:31:07.166: 
gtk_widget_set_sensitive: assertion 'GTK_IS_WIDGET (widget)' failed
(nm-connection-editor:27682): Gtk-CRITICAL **: 15:31:07.167: 
gtk_widget_set_sensitive: assertion 'GTK_IS_WIDGET (widget)' failed
(nm-connection-editor:27682): libnm-CRITICAL **: 15:31:07.167: 
((libnm/nm-vpn-editor.c:49)): assertion '' failed
** Message: 15:31:07.167: Cannot save connection due to error: Invalid 
setting VPN: unspecified error
(nm-connection-editor:27682): Gtk-CRITICAL **: 15:31:07.167: 
gtk_widget_set_sensitive: assertion 'GTK_IS_WIDGET (widget)' failed
(nm-connection-editor:27682): libnm-CRITICAL **: 15:31:07.191: 
((libnm/nm-vpn-editor.c:49)): assertion '' failed
(nm-connection-editor:27682): Gtk-CRITICAL **: 15:31:07.191: 
gtk_widget_set_sensitive: assertion 'GTK_IS_WIDGET (widget)' failed
(nm-connection-editor:27682): libnm-CRITICAL **: 15:31:07.191: 
((libnm/nm-vpn-editor.c:49)): assertion '' failed
(nm-connection-editor:27682): Gtk-CRITICAL **: 15:31:07.191: 
gtk_widget_set_sensitive: assertion 'GTK_IS_WIDGET (widget)' failed
(nm-connection-editor:27682): libnm-CRITICAL **: 15:31:07.210: 
((libnm/nm-vpn-editor.c:49)): assertion '' failed
(nm-connection-editor:27682): Gtk-CRITICAL **: 15:31:07.210: 
gtk_widget_set_sensitive: assertion 'GTK_IS_WIDGET (widget)' failed

when I search for
`/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-vpn-plugin-openconnect-editor.so`
I see that it is in the package network-manager-openconnect-gnome. 

Since I am running Xfce it is not self-evident that I have
to install a package that says that it is for Gnome.

So I think that it'd be optimal to:

* add a note to the package description saying:
  "you'll probably need the network-manager-openconnect-gnome
  package as well, if you want to manage the connections from
  the GUI"
* maybe add a "Suggests: network-manager-openconnect-gnome"
  to the package?
* and the nm-applet should not fail silently if it doesn't
  find an editor component, but instead it should say so:
  "I could not find the VPN editor component. Did you install
  the network-manager-openconnect-gnome package?"

*t

-- System Information:
Debian Release: 11.1
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-9-amd64 (SMP w/8 CPU threads)
Kernel taint flags: TAINT_OOT_MODULE
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages network-manager-openconnect depends on:
ii  adduser  3.118
ii  libc62.31-13+deb11u2
ii  libglib2.0-0 2.66.8-1
ii  libnm0   1.30.0-2
ii  libopenconnect5  8.10-2+b1
ii  network-manager  1.30.0-2
ii  openconnect  8.10-2+b1

network-manager-openconnect recommends no packages.

network-manager-openconnect suggests no packages.

-- no debconf information



Bug#1001461: network-manager-openconnect: doesn't have a VPN tab to configure the VPN gateway

2021-12-10 Thread Tomas Pospisek
Package: network-manager-openconnect
Version: 1.2.6-1
Severity: important

Hi,

after installing network-manager-openconnect there's no VPN tab in the
configuration dialog and so I can't enter the VPN gateway address
anywhere to set up the VPN connection.

I did restart NM via

sudo systemctl restart NetworkManager

and I did also restart the nm-applet via

killall nm-applet; nohup nm-applet &

but no luck.

What I do:

* click on the applet
* click on "VPN Connections"
* click on "Add a VPN connection..."
* select "Cisco AnyConnect or openconnect (OpenConnect)" (I can also
  select Juniper, PaloAlto or Pulse - there won't be a VPN tab in either
  case)
* click on "Create..."
* the config dialog is shown
* only "General", "Proxy", "IPv4 Settings", "IPv6 Settings" tabs are shown
  * there's no place I found to enter the VPN gateway
* also whatever I do in that dialog, the "Save" button is always greyed
  out

-- System Information:
Debian Release: 11.1
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-9-amd64 (SMP w/8 CPU threads)
Kernel taint flags: TAINT_OOT_MODULE
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages network-manager-openconnect depends on:
ii  adduser  3.118
ii  libc62.31-13+deb11u2
ii  libglib2.0-0 2.66.8-1
ii  libnm0   1.30.0-2
ii  libopenconnect5  8.10-2+b1
ii  network-manager  1.30.0-2
ii  openconnect  8.10-2+b1

network-manager-openconnect recommends no packages.

network-manager-openconnect suggests no packages.

-- no debconf information



Bug#995212: ungoogled-chromium? [was: Re: Bug#995212: chromium: Update to version 94.0.4606.61 (security-fixes)]

2021-12-07 Thread Tomas Pospisek

On 06.12.21 20:43, Noah Meyerhans wrote:

On Sun, Dec 05, 2021 at 07:58:17PM +0300, Dmitry Alexandrov wrote:

So what's happening with chromium in both sid and stable? I saw on d-release 
that it was removed from testing (#998676 and #998732), with a  discussion 
about ending security support for it in stable.


The problem really is lack of maintenance. In my opinion, chromium deserves an active 
*team* to support it in Debian.  <...>  The security team doesn't have the 
bandwidth to do it themselves, they need a team to help them.


Sorry for a silly question, but whatʼs so wrong with the build done by 
linuxmint.com [1], so Debian needs a whole team to duplicate their effort?  
Itʼs for Debian 10 (i. e. oldstable) as of now, but works fine at Sid in my 
(limited) experience.



Well, you can start with the fact that the Mint chromium source packages
don't even include the chromium source, let alone the sources for all
the other things they build (NodeJS, and more).

The biggest difficulty, as far as I can tell from my look at Chromium
from several months ago, is that our patch set [1] needs a lot of
attention with every chromium release.  Mint doesn't apply any patches
at all to the source, at least none of any real complexity.

One lesson we may take from Mint, though, is that it's not worth trying
to patch Chromium as much as we'd like.  Anything that we can do to
simplify the Chromium packaging will help us keep the package
up-to-date, which in turn will help us keep our users safer.  In my
opinion, we should be pretty aggressive about dropping as many of the
Chromium patches as possible, even if that means we link against
bundled/vendored dependencies.

Legal/licensing considerations are still important and I don't know if
we actually *can* ship builds based on the bundled stuff.  But based on
the number of patches we have to disable various things [2] or build
against system dependencies [3], I can't help but think we'd have an
easier time keeping this package fresh if we could drop some of those.

noah

1. 
https://salsa.debian.org/chromium-team/chromium/-/blob/master/debian/patches/series
2. 
https://salsa.debian.org/chromium-team/chromium/-/tree/master/debian/patches/disable
3. 
https://salsa.debian.org/chromium-team/chromium/-/tree/master/debian/patches/system


I'd also like to point out, that the ungoogled-chromium project has some 
overlap in goals with Debian and it'd possibly be interessing to join 
forces:


https://github.com/ungoogled-software/ungoogled-chromium-debian

(I have been running an ungoogled-chromium for a while (ca. a year 
ago?), however at that time their chrome wasn't extremely stable so I 
gave up again. Does anybody have experience using it recently?)

*t



Bug#892664: dpkg: Please add support for zstd (Zstandard) compressed packages

2021-11-28 Thread Tomas Pospisek

Rustam wrote on 12 Oct 2021:


Hi Guillem,
Any news on the proposed patch?
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892664#49
Can it be merged already? ;)
Ubuntu packages are already using zstd compression. So tools like 
Mainline don't work on Debian any more, see e.g.

https://github.com/bkw777/mainline/issues/121


More than that: AFAIU Ubuntu has in fact switched its default compressor 
to zstd [1], so Debian's tools haven't been able to understand Ubuntu's 
freshly generated packages from 2021-06-14 on.


I have applied [2] Bálint's commit to *current* dpkg from git:

* there was a trivial merge conflict in man/deb.pod, which is easily fixed [3]
* in my dpkg git repo and zstd branch I have changed the patch author
  (including the merge conflict fix) back from me to Bálint [3], which
  might not be the right/clean way to do things, but that's a minor thing
  I can fix if Guillem would want that
* dpkg-buildpackage built the patched package fine
* I only did a smoketest with the resulting dpkg :
  `dpkg -x sbsigntool_0.9.4-2ubuntu1_amd64.deb foodir` [4]
  which successfully unpacked Ubuntu's zstd compressed sbsigntool package
  into the foodir directory

So I am reporting that Bálint's patch [4] applies cleanly (with a 
trivially to solve merge conflict (see above)) and works (again see above 
for the minimal testing I did), has been in production in Ubuntu since 
2021-04-14 and zstd is beeng used as default compressor in Ubtuntu since 
2021-06-14.


Of course I would welcome it very much if Debian's tools would be 
compatible and allow to work with Ubtuntu's packages. Concrete point 
in case: it would have made my life easier figuring out Ubuntu's mechanism 
to sign user-generated modules [5].


Thanks a lot to all involved! For Guillem's work on dpkg, Bálint for the 
patch and all others for their contributions here and in Ubuntu!!!


Greets,
*t

[1] 
http://changelogs.ubuntu.com/changelogs/pool/main/d/dpkg/dpkg_1.20.9ubuntu2/changelog
[2] https://salsa.debian.org/tpo/dpkg/-/tree/zstd
[3] 
https://salsa.debian.org/tpo/dpkg/-/commit/e7cb231bc289d356f563c1e2c761d94c85aa7055
[4] https://packages.ubuntu.com/impish/amd64/sbsigntool/download
[5] 
https://salsa.debian.org/rbalint/dpkg/-/commit/eb38de93eeb9524a54e80525c480df249828e84f
[6] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939392



Bug#989463: provide /var/lib/shim-signed/mok/MOK.(priv|pem|der)

2021-11-17 Thread Tomas Pospisek

On Thu, 18 Nov 2021, Thomas Goirand wrote:


On 11/17/21 11:01 AM, Tomas Pospisek wrote:

Our instructions on Secure Boot [1] are a bit scatterbrained and do not
specify precisely where the key should exist at.


I was the one who wrote them, after *A LOT* of research about it on the
internet. It was hard to find, really.

I just explained how to sign, with no intention to have this automated
(at the time), so no wonder there's no standard path...


I did not intend my characterisation of the instructions as a critique 
of your work. I am extremely happy that you actually *did* the work for 
all of us so we can stand on the shoulders of what you did. Very much +1 
and many thanks really!!!


(And thanks & cheers to the Debian EFI Team as well :-D )


I would edit those instruction so that they create the key at the same
location Ubuntu has its MOK keys. However I would prefer not to collide
with some tools or automation or scripts that do the same at the same
place.


Please go ahead, and explain that this is the Ubuntu path.


Done.


I think it'd be preferable if Debian created (or however Ubuntu does it)
it's key automatically at that same place as Ubuntu has them, which
would make most of the instructions in the wiki [1] unnecessary and
would make the user experience much easier and smoother since the
(upstream) virtualbox package could install and sign it's modules by
itself without any user interaction, just like it happens under Ubuntu (?).

?


Well, to begin with, I wonder why the upstream virtualbox package is
pushing its compiled modules at the wrong location, but yeah, sure!


I guess one can always talk to upstream...


Hopefully, we can have the automation to sign DKMS modules in a non-leaf
package. I would strongly suggest we get a package with a very explicit
name in it, like "dkms-automatic-mok-signing" so it would do the work. I
would absolutely *not* go the path of disabling secure boot when a DKMS
module gets installed...


Since I have not looked further I am *guessing* that Ubuntu does 
the automatic creation of the MOK key in the shim-signed package. So I 
think it should be possible to lift Ubuntu's work out of there and also 
put it into the shim-signed package, into postinst or so.


*t



Bug#989463: provide /var/lib/shim-signed/mok/MOK.(priv|pem|der)

2021-11-17 Thread Tomas Pospisek

On Wed, 17 Nov 2021, Tomas Pospisek wrote:

I would edit those [wiki] instruction so that they create the key at the 
same location Ubuntu has its MOK keys. However I would prefer not to 
collide with some tools or automation or scripts that do the same at the 
same place.


[...]

[1] https://wiki.debian.org/SecureBoot


I just updated the instructions accordingly with a pointer to this bug 
report in case Debian would generate the MOK key automatically 
in the future.

*t



Bug#989463: provide /var/lib/shim-signed/mok/MOK.(priv|pem|der)

2021-11-17 Thread Tomas Pospisek

(Thomas I hope you don't mind I put you in the Cc)

Leif Lindholm wrote:


Currently, if dkms is installed, shim-signed prompts to disable
kernel/module verification on next boot on some trigger events - to
ensure the system will successfully boot (something, not necessarily
untampered with) after a kernel upgrade.

According to Vorlon, in Ubuntu:
"that's since been superseded by code to instead generate and enroll a
MOK key and sign all dkms modules with it."

This sounds like a very useful feature that would be worth bringing into 
Debian.


I'd like to expand on this. When I install upstream (Oracle's) 
virtualbox-6.1 then the package tries to compile and sign the required 
virtualbox modules and fails due to not being able to sign them.


As far as I understand the code, the upstream virtualbox-6.1 package 
expects the MOK keys to be at:


# grep "^DEB_.*KEY=" /usr/lib/virtualbox/vboxdrv.sh
DEB_PUB_KEY=/var/lib/shim-signed/mok/MOK.der
DEB_PRIV_KEY=/var/lib/shim-signed/mok/MOK.priv

On a Ubuntu box (I checked on a focal) the keys are there:

-rw--- 1 root root 1704 Jul 13  2018 /var/lib/shim-signed/mok/MOK.priv

I do not know how they happen to appear there. I tried to find out, but 
failed due to not having direct access to that focal box.


Our instructions on Secure Boot [1] are a bit scatterbrained and do not 
specify precisely where the key should exist at.


I would edit those instruction so that they create the key at the same 
location Ubuntu has its MOK keys. However I would prefer not to collide 
with some tools or automation or scripts that do the same at the same 
place.


I think it'd be preferable if Debian created (or however Ubuntu does it) 
it's key automatically at that same place as Ubuntu has them, which would 
make most of the instructions in the wiki [1] unnecessary and would make 
the user experience much easier and smoother since the (upstream) 
virtualbox package could install and sign it's modules by itself without 
any user interaction, just like it happens under Ubuntu (?).


?
*t

[1] https://wiki.debian.org/SecureBoot



Bug#999604: firefox-esr: is Firefox 78 still supported/ESR upstream? mfsa2021-49 without v78 release candidate?

2021-11-13 Thread Tomas Pospisek
Thanks a lot for the info Salvatore! I'll raise the severity of the issue 
accordingly, so that it gets a more "prominent" place in the tickets 
and so that other users will notice more easily the state this 
problem's at.

*t

On Sat, 13 Nov 2021, Salvatore Bonaccorso wrote:


Hi Tomas,

On Sat, Nov 13, 2021 at 11:18:39AM +0100, Tomas Pospisek wrote:

Package: firefox-esr
Version: 78.15.0esr-1~deb11u1
Severity: normal
Tags: security
X-Debbugs-Cc: secur...@debian.org, Debian Security Team 


Dear Firefox maintainers,

I note that Mozillas Security Advisory mfsa2021-49 [1] has been
released on 2021-11-02 thus nearly two weeks ago and contains a big
stash of security fixes ... but only for Firefox 91 (ESR).

I have searched (but not for very long; I do not seem to have
enough permissions in Mozilla's Bugzilla to see the respective
tickets) if the CVE's mentioned in the MFSA also apply to FF 78
or if they are being fixed for FF 78 as well. But I couldn't find
any information about it. Thus I suppose that at least some of
those security problems also *do* apply to FF 78. This is the
 crucial question here.

In case those CVE would also apply to FF 78 then the follow up
question would naturally be: is there a release with fixes for FF 78
forthcoming? Is there an ETA for them?

If the answers to those questions above are not really clear, then
I'd like to suggest to consider the question to what degree FF 78 is
still supported upstream?

The motivation behind these questions is of course that I am a bit
uneasy browsing the internet with a browser that has a lot of known
open security problems. That's something that concerns a lot of
Debian users.

In case FF 78 would not be very much supported upstream then maybe
it'd be good if Debian officially dropped security support for
FF 78?

Finally: I am aware that this ticket is based on a *lot* of
unverified hypotheticals. Please pardon me that and please do not
get too upset about it. I just wanted to raise a flag about the
fact that there are *a lot* of CVEs fixed in a current FF 91 ESR
release but no corresponding FF 78 release.


Trying to keep the answer short: Firefox 78.15.0 ESR was the last one
in the 78 series, upstream support mvoed to ESR 91.

https://www.mozilla.org/en-US/firefox/78.15.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2021-44/

For Debian this means, the next DSA for firefox (which would be
actually in the works), will be based on the 91 series.

The update is delayed, because the toolchain is not yet ready, there
are updates needed for rustc, which in turns needs llvm update as
well.

As such the issues are currently tracked as:
https://security-tracker.debian.org/tracker/source-package/firefox-esr

And (usually Moritz) will release updates once they are ready.

Hope this helps,

Regards,
Salvatore





Bug#999604: firefox-esr: is Firefox 78 still supported/ESR upstream? mfsa2021-49 without v78 release candidate?

2021-11-13 Thread Tomas Pospisek
Package: firefox-esr
Version: 78.15.0esr-1~deb11u1
Severity: normal
Tags: security
X-Debbugs-Cc: secur...@debian.org, Debian Security Team 


Dear Firefox maintainers,

I note that Mozillas Security Advisory mfsa2021-49 [1] has been
released on 2021-11-02 thus nearly two weeks ago and contains a big
stash of security fixes ... but only for Firefox 91 (ESR).

I have searched (but not for very long; I do not seem to have
enough permissions in Mozilla's Bugzilla to see the respective
tickets) if the CVE's mentioned in the MFSA also apply to FF 78
or if they are being fixed for FF 78 as well. But I couldn't find
any information about it. Thus I suppose that at least some of
those security problems also *do* apply to FF 78. This is the
 crucial question here.

In case those CVE would also apply to FF 78 then the follow up
question would naturally be: is there a release with fixes for FF 78
forthcoming? Is there an ETA for them?

If the answers to those questions above are not really clear, then
I'd like to suggest to consider the question to what degree FF 78 is
still supported upstream?

The motivation behind these questions is of course that I am a bit
uneasy browsing the internet with a browser that has a lot of known
open security problems. That's something that concerns a lot of
Debian users.

In case FF 78 would not be very much supported upstream then maybe
it'd be good if Debian officially dropped security support for
FF 78?

Finally: I am aware that this ticket is based on a *lot* of
unverified hypotheticals. Please pardon me that and please do not
get too upset about it. I just wanted to raise a flag about the
fact that there are *a lot* of CVEs fixed in a current FF 91 ESR
release but no corresponding FF 78 release.

Thanks a lot for maintaining FF!
*t

[1] https://www.mozilla.org/en-US/security/advisories/mfsa2021-49/



-- Package-specific info:


-- Addons package information

-- System Information:
Debian Release: 11.1
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-9-amd64 (SMP w/8 CPU threads)
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages firefox-esr depends on:
ii  debianutils  4.11.2
ii  fontconfig   2.13.1-4.2
ii  libatk1.0-0  2.36.0-2
ii  libc62.31-13+deb11u2
ii  libcairo-gobject21.16.0-5
ii  libcairo21.16.0-5
ii  libdbus-1-3  1.12.20-2
ii  libdbus-glib-1-2 0.110-6
ii  libevent-2.1-7   2.1.12-stable-1
ii  libffi7  3.3-6
ii  libfontconfig1   2.13.1-4.2
ii  libfreetype6 2.10.4+dfsg-1
ii  libgcc-s110.2.1-6
ii  libgdk-pixbuf-2.0-0  2.42.2+dfsg-1
ii  libglib2.0-0 2.66.8-1
ii  libgtk-3-0   3.24.24-4
ii  libnspr4 2:4.29-1
ii  libnss3  2:3.61-1
ii  libpango-1.0-0   1.46.2-3
ii  libstdc++6   10.2.1-6
ii  libvpx6  1.9.0-1
ii  libx11-6 2:1.7.2-1
ii  libx11-xcb1  2:1.7.2-1
ii  libxcb-shm0  1.14-3
ii  libxcb1  1.14-3
ii  libxcomposite1   1:0.4.5-1
ii  libxdamage1  1:1.1.5-2
ii  libxext6 2:1.3.3-1.1
ii  libxfixes3   1:5.0.3-2
ii  libxrender1  1:0.9.10-1
ii  procps   2:3.3.17-5
ii  zlib1g   1:1.2.11.dfsg-2

Versions of packages firefox-esr recommends:
ii  libavcodec58  7:4.3.3-0+deb11u1

Versions of packages firefox-esr suggests:
ii  fonts-lmodern  2.004.5-6.1
pn  fonts-stix | otf-stix  
ii  libcanberra0   0.30-7
ii  libgssapi-krb5-2   1.18.3-6+deb11u1
ii  libgtk2.0-02.24.33-2
ii  pulseaudio 14.2-2

-- no debconf information



Bug#992258: packages.debian.org still not showing bullseye-security packages

2021-11-13 Thread Tomas Pospisek

Hi,

I'm running Debian bullseye and have firefox 78.15.0esr-1~deb11u1 from 
bullseye-security, but packages.debian.org is still showing 
78.14.0esr-1~deb11u1 as the firefox-esr version available in Debian 
bullseye [1].


So the patch of Rhonda D'Vine, did not have an effect on at least the info 
that's displayed about the firefox-esr package in Debian bullseye.


?

*t

[1] https://packages.debian.org/search?keywords=firefox-esr



Bug#989586: firefox-esr: Letras borradas no jornal digital da Folha de São Paulo.

2021-11-13 Thread Tomas Pospisek

Hi Flávio,

Is it this URL https://www.folha.uol.com.br/ you are referring to? It 
works for me (firefox 78.15.0esr-1~deb11u1), I have no blurred font.


Would you mind sending a screenshot (not to me but to the bugreport 
(989...@bugs.debian.org)?

*t



Bug#992155: alternative approach to automatically updating extrepo repo keys

2021-09-16 Thread Tomas Pospisek
An alternative approach could be that an `apt update` would trigger an 
`extrepo update`.


I don't know enough about apt hooks etc. to be able to say if that would 
be feasible or - in case such a mechanism isn't available today -  if 
apt's maintainers would be in favor of it?


Installing a cron job that periodically retrieves extrepo updates would be 
easier to implement. However the problem of offline systems should be 
considered then. What do you do with systems (laptops f.ex.) that sleep 
when a cron job would be triggered or that are not connected to the 
internet at that time? One could look into systemd's timer mechanisms if 
the support being deferred until the system wakes up and is connected to 
the internet.


*t



Bug#993488: maybe reason for wontfix?

2021-09-03 Thread Tomas Pospisek
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993488#16 contains a 
"wontfix + close" but no rationale. Which leaves the original reporter 
with a large "?" I guess.


I am guessing that the reason for the "wontfix" is "that's just how Unix 
works unfortunately" aka "that's a Unix design bug"? Is my guess correct?


One other question - any idea on a way forward here? I would guess that 
behaviour (changing group membership won't change group membership of 
running processes) is rooted somewhere quite low in the stack, maybe in 
the kernel itself (or in posix :-#)? So if the original reporter would 
want to go ahead and look to that problem beeing fixed would he need to go 
talk to the kernel mailing list or do you have idea where he could go 
to?

*t



Bug#907336: still relevant? revert?

2021-09-01 Thread Tomas Pospisek

Dear ImageMagick Packaging Team,

Short version: is it safe today to reenable PDF/PS conversion again these 
days?


Long version:

Today I was affected by the problem reported in [1], notably:

convert: attempt to perform an operation not allowed by the security
policy `PDF' @ error/constitute.c/IsCoderAuthorized/408.

When I check /etc/ImageMagick-6/policy.xml I see that plenty of 
conversions to/from (?) PDF/(E)PS* are apparently disabled by default as 
delivered by Debian. Which actually covers part of the requests in this 
(#907336) bugreport.


The mentioned stackoverflow Q however mentions that:


Make sure ghostscript is updated kb.cert.org/vuls/id/332928


Which refers to a fix in Ghostscript 9.24 which is ages ago when compared 
to the Ghostscript version 9.53 currently in Debian stable.


I have *zero* insight into the issues leading to PDF/PS conversion being 
disabled in Debian and if they still are relevant and still are of 
the same concern as they were at the times before Ghostscript 9.24.


Or posed differently: does it make sense to reevaluate these issues and - 
if it turns out they are of no concern any more today - could the 
respective converters be re-enabled by default again?


Thanks a lot for maintaining ImageMagick! Greetings,
*t

[1] 
https://stackoverflow.com/questions/52998331/imagemagick-security-policy-pdf-blocking-conversion



Bug#991972: More information

2021-08-20 Thread Tomas Pospisek

So I'm not sure what to do about this ticket.

The current situation is:

* we have backports.org - which does *not* belong to Debian
* when accessing it, some variations of the URL get forwarded to
  https://backports.debian.org/ and some break in various way

My opinion on this is: let's let the backports.org URL die or be broken 
like it is. If people notice then let them manually switch the URL they 
use to https://backports.debian.org/.


*t

On Sun, 15 Aug 2021, Xan Charbonnet wrote:


Sorry, I should have checked this on more than one browser before reporting.

For some reason my ancient Firefox profile, when I browse to "backports.org", 
redirects to https://www.backports.org/.  Perhaps this was a cached permanent 
redirect, or something to do with HSTS.


On a naive profile (with seemingly any browser), browsing to "backports.org" 
fails, because backports.org has no A record.  Not terribly friendly but not 
a problem.  It sounds like your browser has some memory that points 
backports.org to backports.debian.org.  A naive browser has no way to return 
anything for https://backports.org/ or http://backports.org/.


www.backports.org does have a CNAME record: it points to 
backports.debian.org, which seems to have the same IP address as debian.org. 
Browsing to http://www.backports.org/ is successful: the Debian webserver 
redirects the request to https://backports.debian.org/, and when accessed via 
that name, the Debian webserver correctly serves the backports page.


However, when you browse to https://www.backports.org/ (note the secure 
protocol), that's when it breaks.  The Debian webserver defaults to serving 
the Debian homepage, complete with the TLS certificate for debian.org.  This 
causes a nasty security error in the browser, and if bypassed, results in the 
Debian homepage loading at https://www.backports.org/ rather than the 
Backports page.


The only remaining mystery is why my Firefox profile is handling 
"backports.org" the way it is.  I'm trying to figure out how to diagnose 
that, but it doesn't seem like there's much visibility to that kind of thing. 
It could be something that affects everybody who visited backports.org during 
a particular timeframe.


--
To unsubscribe, send mail to 991972-unsubscr...@bugs.debian.org.





Bug#992348: mapserver: please re-enable build of ruby-mapscript package

2021-08-18 Thread Tomas Pospisek

Hi Bas,

frankly I find it very nice to hear you say no. Very refreshing and the 
argumentation is very sound - I completely concur. Nothing else to add to 
that other than thanks a lot to you for maintaining mapserver!


I will discuss with my peers here whether and how to put effort into 
packaging ruby-mapserver. In case we get something going I'll eventually 
send you an URL and you'll be able to re-evaluate your assessment if 
you'll deem worth it.


Again, thanks a lot for maintining mapserver, appreciate it a lot!!! Best 
greetings!

*t

On Tue, 17 Aug 2021, Sebastiaan Couwenberg wrote:


tags 992348 wontfix
thanks

On 8/17/21 5:35 PM, Tomas Pospisek wrote:

tldr: would it be possible to re-enable the ruby-mapscript package
build?


While possible, I'd rather not.


Extended explication: requiring a packaged version of ruby-mapscript
on Ubuntu 20.04 I today basically reverted commits [1] and [2] and
ruby-mapscript built just fine. A quick test showed ruby-mapscript
to work. Then I did the same thing on bullseye and again,
ruby-mapscript build fine.


Then you are one of the very few actual users of ruby-mapscript.


Questions:

* would it be possible to start building the ruby-mapscript package again?

* I see commit [1] that says "Build Ruby MapScript only for default version",
  but it doesn't say why builds for other ruby versions are being dropped.
  What was the reason for dropping the build of ruby-mapscript for the
  various existing Ruby versions?


Building for more than one ruby/php/python/etc version requires building
mapserver again, this makes the build time significantly longer for very
little gain during transitions to new interpreter versions.


* half an hour later there's a commit [2] that drops ruby-mapscript
  alltogether. I couldn't find a log of the respective FTBS. But
  maybe it doesn't matter any more since it does seem to build just
  fine now.


Because popcon showed no actual users of ruby-mapscript keeping the
package around just causes unnecessary busy work. I don't use Ruby nor
ruby-mapscript, but I do have to spend time maintaining those bits in
mapserver.


So would it be possible to revert [1] and [2]? Or should I fork the
project on Salsa and file a PR?


Don't bother with a PR, just maintain the fork of the packaging for your
personal repo.

If I could count on your long term commitment on maintaining the Ruby
support in the mapserver package, I might consider merging your changes.
But my experience with onboarding new contributors has been
disappointing, they tend to disappear not long after their work got in
the archive and don't stick around for long term maintenance.

I'm not keen on increasing the amount of packaging I have to maintain
but don't actually use.

Kind Regards,

Bas

--
GPG Key ID: 4096R/6750F10AE88D4AF1
Fingerprint: 8182 DE41 7056 408D 6146  50D1 6750 F10A E88D 4AF1





Bug#992348: mapserver: please re-enable build of ruby-mapscript package

2021-08-17 Thread Tomas Pospisek
Source: mapserver
Version: 7.6.4-1
Severity: wishlist

Hi Debian GIS maintainers, hi Bas!

tldr: would it be possible to re-enable the ruby-mapscript package
build?

Extended explication: requiring a packaged version of ruby-mapscript
on Ubuntu 20.04 I today basically reverted commits [1] and [2] and
ruby-mapscript built just fine. A quick test showed ruby-mapscript
to work. Then I did the same thing on bullseye and again,
ruby-mapscript build fine.

Questions:

* would it be possible to start building the ruby-mapscript package again?

* I see commit [1] that says "Build Ruby MapScript only for default version",
  but it doesn't say why builds for other ruby versions are being dropped.
  What was the reason for dropping the build of ruby-mapscript for the
  various existing Ruby versions?

* half an hour later there's a commit [2] that drops ruby-mapscript
  alltogether. I couldn't find a log of the respective FTBS. But
  maybe it doesn't matter any more since it does seem to build just
  fine now.

So would it be possible to revert [1] and [2]? Or should I fork the
project on Salsa and file a PR?

Either way: *thanks a lot for maintaining mapserver*!!!

Greetings,
*t

[1] 
https://salsa.debian.org/debian-gis-team/mapserver/-/commit/45f6f67e4272122d9d9fa0c49f247d68690c659a
[2] 
https://salsa.debian.org/debian-gis-team/mapserver/-/commit/8d14c0fe55e33ef1922ac529e23cbb04776afd9a


-- System Information:
Debian Release: 11.0
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-8-amd64 (SMP w/8 CPU threads)
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#991853: reassign to ftp.debian.org

2021-08-07 Thread Tomas Pospisek

reassign 991853 ftp.debian.org
thanks

the archive.debian.org certificate problem seems to rather concern the 
ftp.debian.org pseudo package & DDs, thus I'm reassigning to it.




Bug#990807: thunderbird incapable to run only with ~/.thunderbird that was migrated from icedove

2021-07-15 Thread Tomas Pospisek

Thanks a lot for the explanation Carsten!
*t

On Thu, 15 Jul 2021, Carsten Schoenert wrote:


Hello Tomas,

Am 12.07.21 um 11:07 schrieb Tomas Pospisek:


If I'd like to get rid of ~/.icedove and only have a standard
~/.thunderbird directory - which I am assuming is possible - then what
would the correct way to do that be?


the main mess is you will need to go to your profile and replace all
occurrences of ".icdeove" with ".thunderbird" within the files. Doing
this for .js|.json|.xml and so on files will be mostly easy, but it's
possible that there is also something in the encrypted files and also in
the .sqlite files.

It's all doable, and I wanted to start something that is doing that
trick, but it's in the end a more cleaner way to export the profile and
later re import it again. But exporting a profile by TB directly isn't
still full featured.

As long as nobody is digging into this we will need to live with the
symlinked folder.

--
Regards
Carsten





Bug#950941: see also #990807

2021-07-07 Thread Tomas Pospisek

see also #990807



Bug#990807: thunderbird incapable to run only with ~/.thunderbird that was migrated from icedove

2021-07-07 Thread Tomas Pospisek
Package: thunderbird
Version: 1:78.11.0-2
Severity: normal
X-Debbugs-Cc: Carsten Schoenert , Paul Menzel 


I'd like to describe my problem, which is related to #950941.

I have copyied over ~/thunderbird from my old laptop. Now when
I start thunderbird, it start's normally. However at next start it
will fail and complain and tell me that I should resolve the
situation.

Why?

Because on first start, the second layer of wrappers will
apparently make a **copy** of ~/.thunderbird to ~/.icedove.

And on the second start the first layer wrapper will see:

$ ls -l .thunderbird/ .icedove/ -d
drwx-- 3 me mi 4096  7. Jul 22:24 .icedove/
drwx-- 5 me mi 4096  2. Jul 21:57 .thunderbird/

and ... fail.

So I've tried to find out. Took me now over 1.5 hours and
I still haven't found out because... well it's complex.
And even with the whole complexity the wrapper is still
not able to handle (in the sense of behaving like
thunderbird itself would in the same situation) the
situation.

So I'd suggest something in the vein of:

$ cat /usr/bin/thunderbird
#!/bin/bash
if [ "$SKIP_THUNDERBIRD_WRAPPER" != "" ]; then 
/usr/lib/thunderbird/thunderbird "$@"; fi

But then again one could simply do:

alias thunderbird=/usr/lib/thunderbird/thunderbird

(the path /usr/lib/thunderbird/thunderbird not being
trivial to find...). Or maybe [also] document that...

Yet another alternative is to use upstream?

What do you think?

Greetings and thanks!
*t

-- System Information:
Debian Release: 11.0
  APT prefers testing-security
  APT policy: (500, 'testing-security'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-7-amd64 (SMP w/8 CPU threads)
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages thunderbird depends on:
ii  debianutils  4.11.2
ii  fontconfig   2.13.1-4.2
ii  libatk1.0-0  2.36.0-2
ii  libbotan-2-172.17.3+dfsg-2
ii  libbz2-1.0   1.0.8-4
ii  libc62.31-12
ii  libcairo-gobject21.16.0-5
ii  libcairo21.16.0-5
ii  libdbus-1-3  1.12.20-2
ii  libdbus-glib-1-2 0.110-6
ii  libevent-2.1-7   2.1.12-stable-1
ii  libffi7  3.3-6
ii  libfontconfig1   2.13.1-4.2
ii  libfreetype6 2.10.4+dfsg-1
ii  libgcc-s110.2.1-6
ii  libgdk-pixbuf-2.0-0  2.42.2+dfsg-1
ii  libglib2.0-0 2.66.8-1
ii  libgtk-3-0   3.24.24-4
ii  libicu67 67.1-6
ii  libjson-c5   0.15-2
ii  libnspr4 2:4.29-1
ii  libpango-1.0-0   1.46.2-3
ii  libstdc++6   10.2.1-6
ii  libvpx6  1.9.0-1
ii  libx11-6 2:1.7.1-1
ii  libx11-xcb1  2:1.7.1-1
ii  libxcb-shm0  1.14-3
ii  libxcb1  1.14-3
ii  libxext6 2:1.3.3-1.1
ii  libxrender1  1:0.9.10-1
ii  psmisc   23.4-2
ii  x11-utils7.7+5
ii  zlib1g   1:1.2.11.dfsg-2

Versions of packages thunderbird recommends:
ii  hunspell-de-de [hunspell-dictionary]  20161207-9
ii  hunspell-en-us [hunspell-dictionary]  1:2019.10.06-1

Versions of packages thunderbird suggests:
ii  apparmor  2.13.6-10
pn  fonts-lyx 
ii  libgssapi-krb5-2  1.18.3-5
ii  libgtk2.0-0   2.24.33-2

-- no debconf information



Bug#990411: systemd: set kernel.unprivileged_bpf_disabled = 1

2021-06-30 Thread Tomas Pospisek

reassign 990411 linux-image-5.10.0-7-amd64

-

Thanks Michael, reassigning as proposed. Though I'm wondering (and not 
finding) whether there would be a more general package to assign this 
ticket to (such as linux-image-5.x or something).


Any thoughts on this problem in the security or the kernel team?

Thanks and greets to all of you!
*t

On Mon, 28 Jun 2021, Michael Biebl wrote:


Am 28.06.21 um 14:52 schrieb Tomas Pospisek:

Package: systemd
Version: 247.3-5
Severity: wishlist
Tags: security
X-Debbugs-Cc: Debian Security Team 

Hi,

TLDR:

 $ sudo sysctl kernel.unprivileged_bpf_disabled
 kernel.unprivileged_bpf_disabled = 0

please disable unprivileged BPF by default, it seems that it
is not safe to be allowed by default in the general case.

I'm not sure if systemd is the right place to report this
security/wishlist ticket against. I've chosen systemd because it
ships `/etc/sysctl.d/99-sysctl.conf` which seems to me to be the
nearest fit to where `kernel.unprivileged_bpf_disabled` should
be set. Please reassign if there's a better package to stick
this report to.


/etc/sysctl.d/99-sysctl.conf is just a symlink pointing at
99-sysctl.conf -> ../sysctl.conf

$ dpkg -S /etc/sysctl.conf
procps: /etc/sysctl.conf

tbh, I'd prefer the security oder kernel team to make that judgement call.




Bug#990411: systemd: set kernel.unprivileged_bpf_disabled = 1

2021-06-28 Thread Tomas Pospisek
Package: systemd
Version: 247.3-5
Severity: wishlist
Tags: security
X-Debbugs-Cc: Debian Security Team 

Hi,

TLDR:

$ sudo sysctl kernel.unprivileged_bpf_disabled
kernel.unprivileged_bpf_disabled = 0

please disable unprivileged BPF by default, it seems that it
is not safe to be allowed by default in the general case.

I'm not sure if systemd is the right place to report this
security/wishlist ticket against. I've chosen systemd because it
ships `/etc/sysctl.d/99-sysctl.conf` which seems to me to be the
nearest fit to where `kernel.unprivileged_bpf_disabled` should
be set. Please reassign if there's a better package to stick
this report to.

After reading https://lwn.net/Articles/860597/ I'm under the
impression that allowing unprivileged BPF is too big of a
barn door to leave open at these times.

Currently

* I have no idea which packages that I install use or will use BPF
* I don't know how I could even find out
* even if I knew that a given program *does* use BPF, I estimate
  that it'd require me a non-trivial effort to analyze how security
  critical that fact is in my context
* considering myself quite a seasoned sysadmin I very much doubt
  that the general Debian consumer is even remotely capable of
  correctly assesing the preceeding points

Therefore I'd suggest to seriously consider to disable the
unprivileged BPF gun *by default* on freshly installed Debian
systems.

Thanks a lot for taking care of Debian!
*t


-- Package-specific info:

-- System Information:
Debian Release: 11.0
  APT prefers testing-security
  APT policy: (500, 'testing-security'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-7-amd64 (SMP w/8 CPU threads)
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_CH:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages systemd depends on:
ii  adduser  3.118
ii  libacl1  2.2.53-10
ii  libapparmor1 2.13.6-10
ii  libaudit11:3.0-2
ii  libblkid12.36.1-7
ii  libc62.31-12
ii  libcap2  1:2.44-1
ii  libcrypt11:4.4.18-4
ii  libcryptsetup12  2:2.3.5-1
ii  libgcrypt20  1.8.7-3
ii  libgnutls30  3.7.1-3
ii  libgpg-error01.38-2
ii  libip4tc21.8.7-1
ii  libkmod2 28-1
ii  liblz4-1 1.9.3-2
ii  liblzma5 5.2.5-2
ii  libmount12.36.1-7
ii  libpam0g 1.4.0-7
ii  libseccomp2  2.5.1-1
ii  libselinux1  3.1-3
ii  libsystemd0  247.3-5
ii  libzstd1 1.4.8+dfsg-2.1
ii  mount2.36.1-7
ii  systemd-timesyncd [time-daemon]  247.3-5
ii  util-linux   2.36.1-7

Versions of packages systemd recommends:
ii  dbus  1.12.20-2

Versions of packages systemd suggests:
ii  policykit-10.105-31
pn  systemd-container  

Versions of packages systemd is related to:
pn  dracut   
ii  initramfs-tools  0.140
ii  libnss-systemd   247.3-5
ii  libpam-systemd   247.3-5
ii  udev 247.3-5

-- no debconf information



Bug#989943: maybe use at instead of shutdown -r $TIME

2021-06-20 Thread Tomas Pospisek

Argh, that should of course be:

--- /usr/bin/unattended-upgrade.orig2021-06-18 09:46:37.434386824 +0200
+++ /usr/bin/unattended-upgrade 2021-06-18 09:47:03.958639111 +0200
@@ -1353,11 +1353,12 @@
when = apt_pkg.config.find(
"Unattended-Upgrade::Automatic-Reboot-Time", "now")
logging.warning("Found %s, rebooting" % REBOOT_REQUIRED_FILE)
-cmd = ["/sbin/shutdown", "-r", when]
+cmd = ["/usr/bin/at", when]
try:
-shutdown_msg = subprocess.check_output(cmd, stderr=subprocess.STDOUT)
-if shutdown_msg.strip():
-logging.warning("Shutdown msg: %s", shutdown_msg.strip())
+p = subprocess.Popen(cmd, stdin=subprocess.PIPE, 
stdout=subprocess.PIPE, stderr=subprocess.STDOUT)
+p_out = p.communicate(input=b'shutdown -r 
now\n')[0].decode('utf-8').strip()
+if p_out:
+logging.warning("Shutdown msg: %s", p_out)
except Exception as e:
logging.error("Failed to issue shutdown: %s", e)

(s/shutdown -h/shutdown -r/)

As always: feedback appreciated

Thanks & greetings,
*t



Bug#989943: maybe use at instead of shutdown -r $TIME

2021-06-18 Thread Tomas Pospisek

On Thu, 17 Jun 2021, Tomas Pospisek wrote:

With respect to "unattended-upgrades blocking other cron.daily scripts via 
shutdown -r" I reflected:



Now what would a "correct" or "better" behavior be?

I suggest to trigger an asynchronous shutdown, that is *not*
to wait for `shutdown -r $TIME` to come back so that whatever
daily menial taks are scheduled via /etc/cron.daily are able
to be executed.


What about the idea of using

   echo "shutdown -r now" | at $TIME

instead of directly calling

   shutdown -r now

Pro:

* async execution. unattended-update can finish it's stuff and
 the rest of cron.daily finishes correctly
* consoles won't be flooded with repeat "Systeme will be going
 doing in XX hours"

Con:

* does care have to be taken that unattended-upgrade won't re-run
 while it wants the system to reboot?
* behavior change (this should be triggering a major semver change...)
 * this could be worked around with yet another config option
   (UseAtInstead=True)
* users on the system won't be warned of the system going down in
 XX hours

What do you think?


The idea in code:

--- /usr/bin/unattended-upgrade.orig2021-06-18 09:46:37.434386824 
+0200

+++ /usr/bin/unattended-upgrade 2021-06-18 09:47:03.958639111 +0200
@@ -1353,11 +1353,12 @@
 when = apt_pkg.config.find(
 "Unattended-Upgrade::Automatic-Reboot-Time", "now")
 logging.warning("Found %s, rebooting" % REBOOT_REQUIRED_FILE)
-cmd = ["/sbin/shutdown", "-r", when]
+cmd = ["/usr/bin/at", when]
 try:
-shutdown_msg = subprocess.check_output(cmd, stderr=subprocess.STDOUT)
-if shutdown_msg.strip():
-logging.warning("Shutdown msg: %s", shutdown_msg.strip())
+p = subprocess.Popen(cmd, stdin=subprocess.PIPE, 
stdout=subprocess.PIPE, stderr=subprocess.STDOUT)
+p_out = p.communicate(input=b'shutdown -h 
now\n')[0].decode('utf-8').strip()
+if p_out:
+logging.warning("Shutdown msg: %s", p_out)
 except Exception as e:
 logging.error("Failed to issue shutdown: %s", e)

Feedback about whether this is a good idea is appreciated.

Thanks & greetings,
*t



Bug#989794: please pull improvement via Salsa

2021-06-17 Thread Tomas Pospisek

https://salsa.debian.org/debian/debianutils/-/merge_requests/8



Bug#243676: any reason not to add --debug flag?

2021-06-17 Thread Tomas Pospisek

Hi Clint,

here's the corresponding pull request:

https://salsa.debian.org/debian/debianutils/-/merge_requests/7

please pull :-) !

Thanks!
*t

On Mon, 14 Jun 2021, Tomas Pospisek wrote:


Hello Clint!

On Sun, 13 Jun 2021, Clint Adams wrote:


On Sun, Jun 13, 2021 at 11:46:31AM +0200, Tomas Pospisek wrote:

thanks for maintaining debianutils. Is there any reason Christoph Biedl's
patch to add a --debug flag doesn't get applied? It does look like being
useful?


I have no memory of ever seeing this before, but I have pushed it and
the newline fix to master.


Thanks a lot!


A man page update would be good; maybe I
will remember to do that when I have time.


Here's the manpage update:

$ git diff run-parts.8
diff --git run-parts.8 run-parts.8
index bb8c2a1..cadbe58 100644
--- run-parts.8
+++ run-parts.8
@@ -11,7 +11,7 @@ run\-parts \- run scripts or programs in a directory
.SH SYNOPSIS
.PP
.B run\-parts
-[\-\-test] [\-\-verbose] [\-\-report] [\-\-lsbsysinit] [\-\-regex=RE]
+[\-\-test] [\-\-verbose] [\-\-debug] [\-\-report] [\-\-lsbsysinit] 
[\-\-regex=RE]

[\-\-umask=umask] [\-\-arg=argument] [\-\-exit\-on\-error] [\-\-help]
[\-\-version] [\-\-list] [\-\-reverse] [\-\-] DIRECTORY
.PP
@@ -58,6 +58,9 @@ This option cannot be used with \-\-test.
.B \-v, \-\-verbose
print the name of each script to stderr before running.
.TP
+.B \-d, \-\-debug
+print to stderr which scripts get selected for running and which don't.
+.TP
.B \-\-report
similar to
.BR \-\-verbose ,






Bug#989943: maybe use at instead of shutdown -r $TIME

2021-06-17 Thread Tomas Pospisek
With respect to "unattended-upgrades blocking other cron.daily scripts via 
shutdown -r" I reflected:



Now what would a "correct" or "better" behavior be?

I suggest to trigger an asynchronous shutdown, that is *not*
to wait for `shutdown -r $TIME` to come back so that whatever
daily menial taks are scheduled via /etc/cron.daily are able
to be executed.


What about the idea of using

echo "shutdown -r now" | at $TIME

instead of directly calling

shutdown -r now

Pro:

* async execution. unattended-update can finish it's stuff and
  the rest of cron.daily finishes correctly
* consoles won't be flooded with repeat "Systeme will be going
  doing in XX hours"

Con:

* does care have to be taken that unattended-upgrade won't re-run
  while it wants the system to reboot?
* behavior change (this should be triggering a major semver change...)
  * this could be worked around with yet another config option
(UseAtInstead=True)
* users on the system won't be warned of the system going down in
  XX hours

What do you think?
*t



Bug#989943: unattended-upgrades blocking other cron.daily scripts or "'invoke-rc.d rsyslog rotate' called during shutdown sequence."

2021-06-16 Thread Tomas Pospisek
Package: unattended-upgrades
Version: 1.11.2
Severity: normal

Hi!

There are several systems where I get

Date: Tue, 15 Jun 2021 06:00:17 +0200
From: Cron Daemon
Subject: Cron  test -x /usr/sbin/anacron || ( cd / && run-parts 
--report /etc/cron.daily )

/etc/cron.daily/logrotate:
invoke-rc.d: -
invoke-rc.d: WARNING: 'invoke-rc.d rsyslog rotate' called
invoke-rc.d: during shutdown sequence.
invoke-rc.d: enabling safe mode: initscript policy layer disabled
invoke-rc.d: -

whenever unattended-upgrades needs to reboot. *Before* the
reboot the system looks like this:

root   835  0.0  0.0   8504  2336 ?Ss   Jun15   0:00 
/usr/sbin/cron
root 12595  0.0  0.0   9120  2316 ?S06:25   0:00  \_ 
/usr/sbin/CRON
root 12596  0.0  0.0   2388   700 ?Ss   06:25   0:00  \_ 
/bin/sh -c test -x /usr/sbin/anacron || ( cd / && run-parts --report 
/etc/cron.daily )
root 12597  0.0  0.0   2284   688 ?S06:25   0:00  
\_ run-parts --report /etc/cron.daily
root 12598  0.0  0.0   2388   764 ?S06:25   0:00
  \_ /bin/sh /usr/lib/apt/apt.systemd.daily
root 12733  0.0  0.0   2388  1488 ?S06:41   0:00
  \_ /bin/sh /usr/lib/apt/apt.systemd.daily lock_is_held
root 13047  0.0  0.2 123308 34548 ?Sl   06:41   0:00
  \_ /usr/bin/python3 /usr/bin/unattended-upgrade
root 13057  0.0  0.0   2372  1752 ?S06:41   0:00
  \_ /sbin/shutdown -r 06:00

In human language: this morning at 06:25 cron.daily ran,
which triggered unattended-upgrades, which triggered
`/sbin/shutdown -r 06:00`.

Now one problem here is that `/sbin/shutdown -r 06:00` is
actually blocking. It will *not* exit, but instead will
count waiting time to zero and reboot after.

We are on a system with `sysv-rc` and not `systemd`. I have
*not* verified whether `shutdown -r $TIME` behavior is
identical on a `systemd` system.

The system apparently shut down at:

# cat /var/log/messages
Jun 15 06:00:14 dom shutdown[13634]: shutting down for system reboot

also

# cat /var/log/daemon.log
Jun 15 06:00:15 dom init: Switching to runlevel: 6

also

# last -F
reboot   system boot  4.19.0-16-amd64  Tue Jun 15 06:00:28 2021 - Wed Jun 
16 10:34:57 2021 (1+04:34)

So my interpretation is this:

1. cron.daily runs
2. it executes unattended-upgrade
3. unattended-upgrade blocks when it calls shutdown -r 06:00
4. in our case that stops the other cron.daily tasks that are
   sorted after /etc/cron.daily/apt-compat (that is pretty
   much all others since apt-compat is first in the alphabet)
   from running
5. the clock hits 06:00:00 and shutdown exits (this is my
   guess - I think it's the same behavior as with
   `shutdown -r now` which also exits and so you sometimes
   see/get back to the prompt before the sytstem *actually*
   warm reboots)
6. after `shutdown -r 06:00` exits unattended-upgrade
   finishes whatever it was doing, exits and cron.daily continues
   with the execution with the other scripts in /etc/cron.daily/
   that alphabetically follow apt-compat, which makes a
   mess, because we're actually in runlevel 6/shutdown
   now. which triggers the warning we saw above from
   logrotate/cron.

Now what would a "correct" or "better" behavior be?

I suggest to trigger an asynchronous shutdown, that is *not*
to wait for `shutdown -r $TIME` to come back so that whatever
daily menial taks are scheduled via /etc/cron.daily are able
to be executed.

In other words: fork & exec shutdown...

?

Thanks a lot for maintaining unattended-upgrades Greetings,
*t


-- System Information:
Debian Release: 10.9
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-16-amd64 (SMP w/8 CPU cores)
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages unattended-upgrades depends on:
ii  debconf [debconf-2.0]  1.5.71
ii  lsb-base   10.2019051400
ii  lsb-release10.2019051400
ii  python33.7.3-1
ii  python3-apt1.8.4.3
ii  python3-dbus   1.2.8-3
ii  python3-distro-info0.21
ii  ucf3.0038+nmu1
ii  xz-utils   5.2.4-1

Versions of packages unattended-upgrades recommends:
ii  cron [cron-daemon]  3.0pl1-134+deb10u1

Versions of packages unattended-upgrades suggests:
ii  bsd-mailx  8.1.2-0.20180807cvs-1
pn  needrestart
ii  nullmailer [mail-transport-agent]  1:2.2-3
pn  powermgmt-base 
ii  python3-gi 3.30.4-1

-- debconf information:
* 

Bug#243676: any reason not to add --debug flag?

2021-06-13 Thread Tomas Pospisek

Hello Clint!

On Sun, 13 Jun 2021, Clint Adams wrote:


On Sun, Jun 13, 2021 at 11:46:31AM +0200, Tomas Pospisek wrote:

thanks for maintaining debianutils. Is there any reason Christoph Biedl's
patch to add a --debug flag doesn't get applied? It does look like being
useful?


I have no memory of ever seeing this before, but I have pushed it and
the newline fix to master.


Thanks a lot!


A man page update would be good; maybe I
will remember to do that when I have time.


Here's the manpage update:

$ git diff run-parts.8
diff --git run-parts.8 run-parts.8
index bb8c2a1..cadbe58 100644
--- run-parts.8
+++ run-parts.8
@@ -11,7 +11,7 @@ run\-parts \- run scripts or programs in a directory
 .SH SYNOPSIS
 .PP
 .B run\-parts
-[\-\-test] [\-\-verbose] [\-\-report] [\-\-lsbsysinit] [\-\-regex=RE]
+[\-\-test] [\-\-verbose] [\-\-debug] [\-\-report] [\-\-lsbsysinit] 
[\-\-regex=RE]
 [\-\-umask=umask] [\-\-arg=argument] [\-\-exit\-on\-error] [\-\-help]
 [\-\-version] [\-\-list] [\-\-reverse] [\-\-] DIRECTORY
 .PP
@@ -58,6 +58,9 @@ This option cannot be used with \-\-test.
 .B \-v, \-\-verbose
 print the name of each script to stderr before running.
 .TP
+.B \-d, \-\-debug
+print to stderr which scripts get selected for running and which don't.
+.TP
 .B \-\-report
 similar to
 .BR \-\-verbose ,



Bug#989794: please mention that run-parts executes files sequentially

2021-06-13 Thread Tomas Pospisek
Package: debianutils
Version: 4.11.2
Severity: wishlist
Tags: patch

See attached patch

Thanks for maintaining debuanutils!
*t

-- System Information:
Debian Release: 10.9
  APT prefers stable
  APT policy: (503, 'stable'), (501, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-14-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=de_CH.utf8, LC_CTYPE=de_CH.utf8 (charmap=UTF-8), LANGUAGE=de_CH:de 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages debianutils depends on:
ii  libc6  2.28-10

debianutils recommends no packages.

debianutils suggests no packages.

-- no debconf information
--- run-parts.8 2021-06-13 11:53:21.513440149 +0200
+++ run-parts.8 2020-08-19 15:11:17.0 +0200
@@ -39,10 +39,10 @@
 If the \-\-regex option is given, the names must match the custom
 extended regular expression specified as that option's argument.
 
-Files are run sequentially, one after the other, in the lexical sort
-order (according to the C/POSIX locale character collation rules) of
-their names unless the \-\-reverse option is given, in which case
-they are run in the opposite order.
+Files are run in the lexical sort order (according to the C/POSIX
+locale character collation rules) of their names unless the
+\-\-reverse option is given, in which case they are run in the
+opposite order.
 
 .SH OPTIONS
 .TP



Bug#989793: please mention that run-parts executes files sequentially

2021-06-13 Thread Tomas Pospisek
Package: debianutils
Version: 4.11.2
Severity: wishlist
Tags: patch



-- System Information:
Debian Release: 10.9
  APT prefers stable
  APT policy: (503, 'stable'), (501, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-14-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=de_CH.utf8, LC_CTYPE=de_CH.utf8 (charmap=UTF-8), LANGUAGE=de_CH:de 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages debianutils depends on:
ii  libc6  2.28-10

debianutils recommends no packages.

debianutils suggests no packages.

-- no debconf information
--- run-parts.8.new 2021-06-13 11:53:21.513440149 +0200
+++ run-parts.8 2020-08-19 15:11:17.0 +0200
@@ -39,10 +39,10 @@
 If the \-\-regex option is given, the names must match the custom
 extended regular expression specified as that option's argument.
 
-Files are run sequentially, one after the other, in the lexical sort
-order (according to the C/POSIX locale character collation rules) of
-their names unless the \-\-reverse option is given, in which case
-they are run in the opposite order.
+Files are run in the lexical sort order (according to the C/POSIX
+locale character collation rules) of their names unless the
+\-\-reverse option is given, in which case they are run in the
+opposite order.
 
 .SH OPTIONS
 .TP


Bug#243676: any reason not to add --debug flag?

2021-06-13 Thread Tomas Pospisek

Hi,

thanks for maintaining debianutils. Is there any reason Christoph Biedl's 
patch to add a --debug flag doesn't get applied? It does look like being 
useful?


?

Greetings & thanks,
*t



Bug#711054: closed by j...@debian.org (Closing this bug)

2021-04-25 Thread Tomas Pospisek

Danke für die Triage Moritz!
*t

On Sat, 24 Apr 2021, Debian Bug Tracking System wrote:


This is an automatic notification regarding your Bug report
which was filed against the src:linux package:

#711054: synaptics touchpad becomes unusable under load

It has been closed by j...@debian.org.

Their explanation is attached below along with your original report.
If this explanation is unsatisfactory and you have not received a
better one in a separate message then please contact j...@debian.org by
replying to this email.


--
711054: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711054
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems





Bug#987335: ITP: dpa-ext-gnomekeyring -- GNOME keyring extension for dde-polkit-agent

2021-04-23 Thread Tomas Pospisek

On 22.04.21 04:04, clay stan wrote:

Package: wnpp
Severity: wishlist
Owner: clay stan 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: dpa-ext-gnomekeyring
   Version : 5.0.4
   Upstream Author : linuxdeepin
* URL : https://github.com/linuxdeepin/dpa-ext-gnomekeyring
   License : GPL-3+


Same here, oh please add a description, such as (I'm guessing here): 
This extension makes it possible to access the GNOME keyring from Deepin 
applications.




Bug#987336: ITP: dtkcommon -- dtk common files

2021-04-23 Thread Tomas Pospisek

On 22.04.21 05:21, clay stan wrote:

Package: wnpp
Severity: wishlist
Owner: clay stan 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: dtkcommon
   Version : 5.5.2
   Upstream Author : linuxdeepin
* URL : https://github.com/linuxdeepin/dtkcommon
   License : GPL-3+


Please add a description what this package is good for/contains and/or 
respectively what "dtk" is.


Thanks & Greetings,
*t



Bug#986506: The released version of debian-installer still has the old kernel

2021-04-14 Thread Tomas Pospisek
I had checked that my installer had 5.10.0 and if your assessement is 
right then my installer must have been a daily build. Thanks a lot Roland 
for keeping the finger on this issue!

*t

On Wed, 14 Apr 2021, Roland Clobus wrote:


reopen 986506
thanks

On 14/04/2021 08:58, Tomas Pospisek wrote:

debian-installer now has 5.10.0-5 kernel
... thus I'm closing the bug report


Hello Tomas,

I think this bug report is closed a little too early.

I've seen in the git commit cb6b94900c27495ed58b698fb8a4d4e00d0962b1
that the kernel version even has been bumped to 5.10.0-6, but only for
the *daily builds*.

The *released version* of the debian-installer still is 20201202 [1].
This is the version that is used per default by the live-build tool,
which downloads from the regular location [2].

I known that the final deadline for releasing Debian 11 is getting real
close, so I'm not sure whether you should be burdened by creating
intermediate releases.

With kind regards,
Roland Clobus

[1] https://packages.debian.org/bullseye/debian-installer
[2] http://deb.debian.org/debian/dists/bullseye/main/installer-amd64/current







Bug#740499: why doesn't d-i include firmware-b43-installer and firmware-b43legacy-installer?

2021-04-14 Thread Tomas Pospisek

In #740499 Chris Bainbridge writes that:


[...] but firmware-7.4.0-amd64-netinst.iso does not contain
Broadcom firmware (at least not b43).


I can see that there are firmware packages for Broadcom b43 in contrib:

https://packages.debian.org/search?suite=bullseye=all=any=names=firmware-b

Could anybody in the known comment why those firmware packages are not 
included in the non-free installer images? Is there anything preventing 
their inclusion? Or asked in a different way: could they be included so 
the Debian installer supports the users with that hardware?


Thanks,
*t



Bug#934383: Package fails attempting to access [Panda PAU06 Wifi dongle, RT5372, USB WiFi rt2800us]

2021-04-13 Thread Tomas Pospisek

Hi William,

if you still have access to the hardware it would be nice if you could 
test whether the coming Debian bullseye installer still fails with it - I 
assume this should have been fixed in the meanwhile - so this bug report 
could be closed?


Thanks,
*t



Bug#985164: 403 Forbidden

2021-03-15 Thread Tomas Pospisek

> My IP address has changed and I have no record of the previous one (VPN).

So there's not much Debian can do I guess and thus I close this report.
*t

On 14.03.21 14:13, Scott C. MacCallum wrote:


My IP address has changed and I have no record of the previous one (VPN).


 Original Message 

On Mar 14, 2021, 8:02 AM, Tomas Pospisek < t...@sourcepole.ch> wrote:

Hi Scott,

On 13.03.21 22:28, Scott C. MacCallum wrote:

 > Package: www.debian.org <http://www.debian.org>

 > URL: https://wiki.debian.org/UnattendedUpgrades 
<https://wiki.debian.org/UnattendedUpgrades>


 >

 > Forbidden

 >

 > You are not allowed to access this!

On the other hand I *am* allowed to access it. So there must be

something that's different between me and you. I guess it's the IP

address. What's yours? Could you please add your IP address to the bug

report?

*t





Bug#985164: 403 Forbidden

2021-03-14 Thread Tomas Pospisek

Hi Scott,

On 13.03.21 22:28, Scott C. MacCallum wrote:

Package: www.debian.org
URL: https://wiki.debian.org/UnattendedUpgrades

Forbidden

You are not allowed to access this!


On the other hand I *am* allowed to access it. So there must be 
something that's different between me and you. I guess it's the IP 
address. What's yours? Could you please add your IP address to the bug 
report?

*t



Bug#898177: [related feature respect /etc/mailname] Re: please add MAILFROM to cron

2021-03-12 Thread Tomas Pospisek

On Fri, 26 Feb 2021, Javier Fernandez-Sanguino wrote:


El jue., 25 feb. 2021 12:52, Tomas Pospisek  escribió:
  Javier,

  seeing that you do not seem to have been working on cron for a few years
  would it be OK with you if I posted something along these lines to
  debian-devel:

I can send a message along the lines of your proposal below to d-d. Will 
schedule it to do it soon.


https://bugs.debian.org/984736

Thanks Javier!
*t



Bug#983842: please add more specific description

2021-03-02 Thread Tomas Pospisek

:+1 ! Thank you!
*t

On Tue, 2 Mar 2021, Aloïs Micard wrote:


Hello Tomas,



As far as I can see "manage" is about as specific as the word "do": srcode 
lets you do "something" with your codebase. Now what is it **exactly** that 
srcode is offering? Could you please describe that both in the long as well 
as in the short description?


Thanks for your constructive feedback!

I agree that the description lacks of clarity,
I'll take care of that in the package description &
will update that upstream too.

Thanks.

Cheers,

--
Aloïs Micard (creekorful) 

GPG: DA4A A436 9BFA E299 67CD E85B F733 E871 0859 FCD2





Bug#983842: please add more specific description

2021-03-02 Thread Tomas Pospisek

Hi Alois,

you write:


Package name: srcode

Description : Tool that help developers to manage their codebase in
  an effective & productive way.

srcode is a tool that help developers to manage their codebase in an 
effective & productive way.


this description however is arguably not productive. What does "manage" 
mean exactly?


* ext4 lets you manage your files in an effective & productive way
* dpkg lets you manage your files in an effictive & productive way
* vim lets you ...
* and so on

Based solely on that description, how do I, the user, browsing the 
Debian packages decide whether I want to install ext4, dpkg, vim or for 
the matter srcode?


As far as I can see "manage" is about as specific as the word "do": 
srcode lets you do "something" with your codebase. Now what is 
it **exactly** that srcode is offering? Could you please describe that 
both in the long as well as in the short description?


Thanks a lot!
*t



Bug#898177: [related feature respect /etc/mailname] Re: please add MAILFROM to cron

2021-02-28 Thread Tomas Pospisek

:+1 thanks Javier!

On Fri, 26 Feb 2021, Javier Fernandez-Sanguino wrote:


Dear Tomas,

El jue., 25 feb. 2021 12:52, Tomas Pospisek  escribió:
  Javier,

  seeing that you do not seem to have been working on cron for a few years
  would it be OK with you if I posted something along these lines to
  debian-devel:

I can send a message along the lines of your proposal below to d-d. Will 
schedule it to do it soon.




Bug#898177: [related feature respect /etc/mailname] Re: please add MAILFROM to cron

2021-02-25 Thread Tomas Pospisek

Javier,

seeing that you do not seem to have been working on cron for a few years 
would it be OK with you if I posted something along these lines to 
debian-devel:


Request for adoption/request for help: cron

cron's recently active maintainer has removed himself from its
uploaders. So there is currently no active maintainer of cron. It
would be good if cron was actively maintaned. Helping hands or
somebody taking the lead as a cron maintainer would be very welcome!

signed: tpo with Javier's OK

?

Thanks & greetings,
*t

On Tue, 23 Feb 2021, Christian Kastner wrote:


On 2021-02-23 09:03, Tomas Pospisek wrote:

On Mon, 22 Feb 2021, Christian Kastner wrote:
Oh, this is news indeed. I think Javier hasn't been working on for the
last 3 years [1]? So I'd say you Christian have been cron's defacto
maintainer?


While possibly so, I must note that effective with the last upload, I
have removed myself from the Uploaders field, and therefore no longer am
a cron maintainer.


So if the plan to migrate Debian's cron to cronie has been abandoned
(by you) and instead the plan is to drop cron and instead use systemd
timers as the default "cron" mechanism in Debian then I think this
defacto decision should be communicated clearly.


The default "cron" mechanism in Debian will continue to be, well, cron.
This is defined by the Debian Policy, and hence would need a Policy
change, which almost certainly won't happen fast, and without
discussion.

The switch to systemd timers is just something that I have observed in
practice. Packages shipping both timers and crontabs, with the latter
being no-ops when systemd is detected. I, personally, believe that this
is the right practice.

The switch to cronie as default "cron" is indeed something that I
possibly could have effected alone (as it doesn't require a Policy
change), but recently abandoned.


As you might have seen I have added some suggestions on how people
could help with the migration from cron to cronie on cron's Debian
wiki page [2]. If the plan to migrate to cronie has been abandoned
then such initiatives do not make sense any more...?


I think those suggestions are still spot on, and I believe migrating
from cron to cronie is still the right thing to do.

I'm just the wrong person for driving this :-) In the meantime, I have
become fully occupied with other projects within Debian, and simply
cannot drive this effort, or continue to be a maintainer at all.

However, if anyone else wants to take over the effort, and I can help as
a mentor and/or upload sponsor, feel free to do so. I have filed an RFA
for cronie a while ago (#974038) and have received pings from some
interested parties, but no results yet.

My plans for cronie were probably too big anyway: instead of carrying
over all of our features, perhaps it would be better to stick with
standard "upstream" cronie instead, and to focus on making the switching
process as easy as possible. If anyone wants to try this, feel free to
contact me any time.

Best,
Christian


[1] 
https://metadata.ftp-master.debian.org/changelogs//main/c/cron/cron_3.0pl1-137_changelog
[2] https://wiki.debian.org/cron?action=diff=9=10<






Bug#898177: [related feature respect /etc/mailname] Re: please add MAILFROM to cron

2021-02-23 Thread Tomas Pospisek

On Mon, 22 Feb 2021, Christian Kastner wrote:


On 21.02.21 15:46, Laurent Combe wrote:

near 3 years i report this issue
i joined a patch
and after all that time nothing, not even a "confirmed" tag.

very disappointing. What can I do to help this issue be accepted more quickly ?


I can't speak for Javier, but in the meantime, I myself have mostly
given up on cron, in the sense that I consider systemd timers a superior
solution.


Oh, this is news indeed. I think Javier hasn't been working on for the 
last 3 years [1]? So I'd say you Christian have been cron's defacto 
maintainer?


So if the plan to migrate Debian's cron to cronie has been abandoned (by 
you) and instead the plan is to drop cron and instead use systemd timers 
as the default "cron" mechanism in Debian then I think this defacto 
decision should be communicated clearly.


As you might have seen I have added some suggestions on how people could 
help with the migration from cron to cronie on cron's Debian wiki page 
[2]. If the plan to migrate to cronie has been abandoned then such 
initiatives do not make sense any more...?


It'd be very nice if you Christian and Javier could clarify the situation.

Greetings & thanks for your work on cron!
*t

[1] 
https://metadata.ftp-master.debian.org/changelogs//main/c/cron/cron_3.0pl1-137_changelog
[2] https://wiki.debian.org/cron?action=diff=9=10



Bug#898177: [related feature respect /etc/mailname] Re: please add MAILFROM to cron

2021-02-22 Thread Tomas Pospisek

Greets all.

I've added those suggestions to the cron wiki page 
(https://wiki.debian.org/cron) in the hope that people that would like to 
help to move cron in Debian move forward can jump in and do things that 
are possible and useful.


I hope that's fine with you guys!
*t

On Mon, 22 Feb 2021, Tomas Pospisek wrote:


Hi Laurent,

let me start by saying the gentlemen above are probably working on cron in 
their free time. They do not owe anybody anything. So I think you can be 
disapointed, but saying so will probably not have a positive impact. Maybe it 
will on the contrary drain them.


That said, thanks for your offer for help.

I want to explore a bit how you (or I?) could help. After I've seen your 
email I visited the package page:


   https://packages.debian.org/search?keywords=cron

and I've noticed, that the `cron` in experimental is in fact `cronie` (coming 
from RH/Fedora) which reminded that the plan was to replace cron in Debian 
with cronie, since cron is not maintained upstream any more. You can read 
about it here:


   https://wiki.debian.org/cron

So I think the following things would be helpful:

* port features that Debian's cron has, but cronie is missing from
 cron to cronie. Since both Debian's cron and cronie are forks of the
 original cron, the should be somewhat compatible. Also Debian cron has
 now split off its diff from the original cron into patches under
 debian/patches. So the theory would be that you can take one patch after
 the other, see what feature it implements and port it over to cronie.

 Once the port is done you could submit that patch upstream with the
 accompanying rationale that this feature is needed for Debian in order
 to be able to migrate to cronie.

 Also you could fork Debian's cronie repo and submin pull requests, so
 Debian can integrate the missing features into cronie.

* you could install cronie on your systems and see what's missing or if
 its working how it should and submit error or success reports to the
 Samba repo (I guess).

* you could go through cron's bugs page

 https://bugs.debian.org/cron

 and see which of those bugs is fixed in cronie and comment inside the
 bug. Maybe the maintainers would like to add a tag
 "implemented-in-cronie" or such, so that they can see at a glance, which
 bugs would be automatically closed by cronie.

What do you think?
*t

On Sun, 21 Feb 2021, Laurent Combe wrote:


near 3 years i report this issue
i joined a patch
and after all that time nothing, not even a "confirmed" tag.

very disappointing. What can I do to help this issue be accepted more 
quickly ?








Bug#898177: [related feature respect /etc/mailname] Re: please add MAILFROM to cron

2021-02-22 Thread Tomas Pospisek

Hi Laurent,

let me start by saying the gentlemen above are probably working on cron in 
their free time. They do not owe anybody anything. So I think you can be 
disapointed, but saying so will probably not have a positive impact. Maybe 
it will on the contrary drain them.


That said, thanks for your offer for help.

I want to explore a bit how you (or I?) could help. After I've seen 
your email I visited the package page:


https://packages.debian.org/search?keywords=cron

and I've noticed, that the `cron` in experimental is in fact `cronie` 
(coming from RH/Fedora) which reminded that the plan was to replace cron 
in Debian with cronie, since cron is not maintained upstream any more. You 
can read about it here:


https://wiki.debian.org/cron

So I think the following things would be helpful:

* port features that Debian's cron has, but cronie is missing from
  cron to cronie. Since both Debian's cron and cronie are forks of the
  original cron, the should be somewhat compatible. Also Debian cron has
  now split off its diff from the original cron into patches under
  debian/patches. So the theory would be that you can take one patch after
  the other, see what feature it implements and port it over to cronie.

  Once the port is done you could submit that patch upstream with the
  accompanying rationale that this feature is needed for Debian in order
  to be able to migrate to cronie.

  Also you could fork Debian's cronie repo and submin pull requests, so
  Debian can integrate the missing features into cronie.

* you could install cronie on your systems and see what's missing or if
  its working how it should and submit error or success reports to the
  Samba repo (I guess).

* you could go through cron's bugs page

  https://bugs.debian.org/cron

  and see which of those bugs is fixed in cronie and comment inside the
  bug. Maybe the maintainers would like to add a tag
  "implemented-in-cronie" or such, so that they can see at a glance, which
  bugs would be automatically closed by cronie.

What do you think?
*t

On Sun, 21 Feb 2021, Laurent Combe wrote:


near 3 years i report this issue
i joined a patch
and after all that time nothing, not even a "confirmed" tag.

very disappointing. What can I do to help this issue be accepted more quickly ?





Bug#983304: please document "Protected" field

2021-02-22 Thread Tomas Pospisek
Source: debian-policy
Version: 4.5.1.0
Severity: wishlist

In Julian Andres Klode's blog I've [1] glimpsed:

> New features
> [...]
> The Protected field is now supported. It replaces the previous Important
> field and is like Essential, but only for installed packages (some minor
> more differences maybe in terms of ordering the installs).

So I've tried to find out what the "Protected" field is for. The only
info about it that I could find is from `man 1 dpkg`:

> Protected packages contain mostly important system boot infrastructure.
> Removing them might cause the whole system to be unable to boot, so use
> with caution.

That seems a bit vague and sparse.

Is there maybe more rigid information for what *exactly* the "Protected"
field should and will be used?

Either way, if there's a new control field, then I think it should get
documented in the `debian-policy`?

Thanks,
*t

[1] https://blog.jak-linux.org/2021/02/18/apt-2.2/

-- System Information:
Debian Release: 10.8
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-13-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=de_CH.utf8, LC_CTYPE=de_CH.utf8 (charmap=UTF-8), LANGUAGE=de_CH:de 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#929959: cron: please support /etc/mailname

2021-02-16 Thread Tomas Pospisek
See also the related feature request/patch in bugs.debian.org/898177 i.e. 
allowing to set MAILFROM




Bug#898177: [related feature respect /etc/mailname] Re: please add MAILFROM to cron

2021-02-16 Thread Tomas Pospisek

Related feature request: 
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929959
aka "please support /etc/mailname".



Bug#898177: please add MAILFROM to cron

2021-02-16 Thread Tomas Pospisek

Hi all,

configuring a Debian system so that cron emails get correctly sent 
seems like *major rocket science*. There are innumerable postings on the 
internet wondering how to set up the system to receive cron's emails. I 
spent this whole morning trying to figure it out.


A major problem is that cron is sending email as "root (Cron Daemon)". Of 
course many a MTA will - IMO correctly - refuse an email with such a 
sender. One can try to set /etc/mailname as is suggested in many places on 
the internet, but Debian's cron will ignore that setting...


So the local sendmail needs to come to the rescue and start replacing and 
correcting the sender (and the recipient) that cron gives them with 
something that makes sense for the receiving end. Unless the local MTA 
is not feature richt enough to be able to do it, such as my local sendmail 
which is msmtp, but other small local sendmails have similar pains 
(nullmailer, dragonmailer, etc. - I did not check them all) and so 
still, mails from cron end up in /dev/null.


Unless it *would* be possible to correctly set the sender (MAILTO) and the 
receiver (MAILFROM) in cron itself. Which actually many cron daemons 
are capable of. And which is the advice in many a helpful HOWTOs and 
stackoverflow answers ... except that Debian's cron doesn't support 
MAILFROM.


Until now that is. Maybe. I hope.

So that was the long rant and rationale and the plea to please allow to 
set MAILFROM in Debian's cron.


I think Laurent Combe's patch fixes that nicely (it's missing the mailfrom 
variable declaration, but that's fixed below). So without more ado, 
please, please, pretty please add MAILFROM to cron. The attached patch 
should do. I am successfully running cron with that patch here.


You should only need to tweak the changelog entry Christian and that 
should be it.


Thanks a lot for keeping cron going Christian, and Javier in the past and 
Laurent for the patch and cronie for blasting the path. Greetings,

*tdiff -u -r --new-file cron_3.0pl1-136.debian/changelog cron_3.0pl1-136.1.debian/changelog
--- cron-3.0pl1/debian/changelog	2020-02-10 20:16:06.0 +0100
+++ cron-3.0pl1/debian/changelog	2021-02-16 11:28:04.0 +0100
@@ -1,3 +1,12 @@
+cron (3.0pl1-136.1) unstable; urgency=medium
+
+  * allow to set MAILFROM
+* patch from Laurent Combe , thank you!
+* inspired by cronie
+* Closes: #898177
+
+ -- Tomas Pospisek   Tue, 16 Feb 2021 11:28:04 +0100
+
 cron (3.0pl1-136) unstable; urgency=medium
 
   * Convert package to source format 3.0 (quilt). Finally.
diff -u -r --new-file cron_3.0pl1-136.debian/patches/features/Add-MAILFROM-environment-variable.patch cron_3.0pl1-136.1.debian/patches/features/Add-MAILFROM-environment-variable.patch
--- cron-3.0pl1/debian/patches/features/Add-MAILFROM-environment-variable.patch	1970-01-01 01:00:00.0 +0100
+++ cron-3.0pl1/debian/patches/features/Add-MAILFROM-environment-variable.patch	2021-02-16 11:28:04.0 +0100
@@ -0,0 +1,91 @@
+Description: use MAILFROM environment variable if set
+ This patch lets cron use the MAILFROM variable to set the sender
+ as which it will send emails. MAILFROM has the same semantics as
+ the same environment variabl in cronie.
+ .
+ The patch has been written by Laurent Combe 
+ and has been inspired by the same feature in cronie.
+
+Origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898177
+Bug: 
+Bug-Debian: https://bugs.debian.org/898177
+Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/cron/+bug/1750051
+Last-Update: 2021-02-16
+
+--- cron-3.0pl1.orig/cron.8
 cron-3.0pl1/cron.8
+@@ -123,7 +123,9 @@ then wakes up every minute, examining al
+ each command to see if it should be run in the current minute.  When
+ executing commands, any output is mailed to the owner of the crontab
+ (or to the user named in the MAILTO environment variable in the
+-crontab, if such exists).  The children copies of cron running these
++crontab, if such exists) as the owner of the crontab (or from the email
++address given in the MAILFROM environment variable in the crontab, if
++such exists).  The children copies of cron running these
+ processes have their name coerced to uppercase, as will be seen in the
+ syslog and ps output.
+ .PP
+--- cron-3.0pl1.orig/crontab.5
 cron-3.0pl1/crontab.5
+@@ -100,12 +100,16 @@ on these systems, USER will be set also.
+ .PP
+ In addition to LOGNAME, HOME, and SHELL,
+ .IR cron (8)
+-will look at MAILTO if it has any reason to send mail as a result of running
+-commands in ``this'' crontab.  If MAILTO is defined (and non-empty), mail is
+-sent to the user so named.  MAILTO may also be used to direct mail to multiple
+-recipients by separating recipient users with a comma.  If MAILTO is defined
+-but empty (MAILTO=""), no mail will be sent.  Otherwise mail is sent to the
+-owner of the crontab.
++will look at MAILTO and MAILFROM if it has any reason to send mail as a result
++of running commands in ``t

Bug#975695: please allow to use UUIDs for "paste numbers"

2021-02-09 Thread Tomas Pospisek

Cool, thanks (-: <3 !
*t

On Mon, 8 Feb 2021, Patrick Matthäi wrote:


Hi

Am 25.11.20 um 09:54 schrieb Tomas Pospisek:

Source: pnopaste
Version: 1.7.4
Severity: wishlist

Having "pastes" with monotonically increasing numbers allows an
"attacker" to discover all pastes by simply counting through
them from 0 on.

Assigning UUIDs to pastes would make that computationally
impossible.

Something like http://nopaste.linux-dev.org/?jA7vBQ8927 or such.

*t

first thanks for your other patch. I support this idea and I will implement 
it with the next release, which also gets backports then.


But first I have release and uploaded today version 1.8 with a small 
adjustment for pnopaste-cli, so that this client supports in the future also 
UUID paste numbers.







Bug#694101: closed by Bernhard Schmidt (Closing bugs opened for old Gtk client)

2021-01-15 Thread Tomas Pospisek

Thanks a lot Bernhard that makes sense!
*t

On Fri, 15 Jan 2021, Debian Bug Tracking System wrote:


This is an automatic notification regarding your Bug report
which was filed against the linphone package:

#694101: immediate segfault without config file

It has been closed by Bernhard Schmidt .

Their explanation is attached below along with your original report.
If this explanation is unsatisfactory and you have not received a
better one in a separate message then please contact Bernhard Schmidt 
 by
replying to this email.


--
694101: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694101
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems





Bug#979464: ITP: qbrz -- Qt frontend for breezy

2021-01-07 Thread Tomas Pospisek

On 06.01.21 23:42, Jelmer Vernooij wrote:

Package: wnpp
Severity: wishlist
Owner: Jelmer Vernooij 
X-Debbugs-Cc: debian-de...@lists.debian.org, breezy-c...@googlegroups.com

* Package name: qbrz
   Version : 0.1
   Upstream Author : RJL situp  and qbzr authors
* URL : https://launchpad.net/qbrz
* License : GPL
   Programming Lang: PYthon
   Description : Qt frontend for breezy

QBrz is a cross platform, Qt-based front-end for Breezy, providing GUI
applications for many core breezy commands. In addition, it provides several
special dialogs and helper commands. Equivalents for core breezy commands have
the same names as CLI commands but with a prefix of "q".


Could you please add some info to the description on what Breezy is? 
(The Debian breezy release? I have no idea)




Bug#973848: security update of chromium in Debian stable?

2020-12-28 Thread Tomas Pospisek

On Mon, 28 Dec 2020, Jan Luca Naumann wrote:


I have got a successful buster build half an hour ago :)


Yay!

As soon as [1] is fixed or at least worked around (so we do not release 
a version with a regression), I think we could do the update.


Do you have your build available anywhere? Because maybe I or passers by 
could then install your build and help testing whatever workaround comes 
out of [1]?



I will contact the security team now to discuss the update.


+1 !!!

Thanks a lot!
*t


[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977870

Am 28.12.20 um 12:37 schrieb Tomas Pospisek:

Hi Jan Luca,

are you working on or respectively are you planing to do the stable build?

(I am not sure if I would be able to get access to a powerful enough
 machine to do the build and get up to speed within reasonable time on how
 to build chromium and on how to do it efficiently so that I do not have
 to wait 24 hours for the build to proceed and fail again before I
 apply the next fix...?)

Greetings!
*t







Bug#973848: security update of chromium in Debian stable?

2020-12-28 Thread Tomas Pospisek

Hi Jan Luca,

are you working on or respectively are you planing to do the stable build?

(I am not sure if I would be able to get access to a powerful enough
 machine to do the build and get up to speed within reasonable time on how
 to build chromium and on how to do it efficiently so that I do not have
 to wait 24 hours for the build to proceed and fail again before I
 apply the next fix...?)

Greetings!
*t



Bug#973848: security update of chromium in Debian stable?

2020-12-25 Thread Tomas Pospisek

It seems like Linux Mint was able to build Chromium v87 for "debbie":

  
http://packages.linuxmint.com/search.php?release=any=any=chromium

which is as far as I understand based on Debian buster. So I am *assuming* 
they have somehow resolved the "SFINAE" problem?


All this is just slightly informed guessing since in truth I do not 
understand a thing about how Linux Mint is building stuff...


?
*t

On Wed, 23 Dec 2020, Jan Luca Naumann wrote:


Hey,

parallel to Michel's very nice work to get chromium into unstable
(thanks to him!), I tried to build the current version in a buster
chroot. At the moment I struggle that there seems a difference how
SFINAE[1] in a special case [2] is handled different between buster's
and unstable's clang version. Since I had not so much time I have not
found a fix to work around this.

If people are more experienced with C++ templates than me, I would be
happy to share the problem and the build log ;)

Best,
Jan

[1] https://en.wikipedia.org/wiki/Substitution_failure_is_not_an_error

[2]

In file included from
../../third_party/blink/common/privacy_budget/identifiability_metric_builder.cc:5:
In file included from
../../third_party/blink/public/common/privacy_budget/identifiability_metric_builder.h:9:
In file included from
/usr/bin/../lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/vector:60:
In file included from
/usr/bin/../lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_algobase.h:64:
In file included from
/usr/bin/../lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_pair.h:59:
In file included from
/usr/bin/../lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/move.h:55:
/usr/bin/../lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/type_traits:2046:15:
error: only enumeration types
have underlying types
 typedef __underlying_type(_Tp) type;
 ^
../../third_party/blink/public/common/privacy_budget/identifiable_token.h:121:40:
note: in instantiation of template
class 'std::underlying_type >' requested here
   typename U = typename std::underlying_type::type,

Am 23.12.20 um 12:13 schrieb Tomas Pospisek:

Hi all,

now that sid has seen an update of Chromium to v87 (hooray and thanks
everybody!) does anybody know it there's activity or plans towards
updating chromium in Debian stable?

Chromium from sid is not installable in Debian stable due to

    Depends: libc6 (>= 2.29)

whereas stable has 2.28.

I'm not sure what the correct procedure would be to kickstart the Debian
stable update?

*t







Bug#973848: security update of chromium in Debian stable?

2020-12-23 Thread Tomas Pospisek

Hi all,

now that sid has seen an update of Chromium to v87 (hooray and thanks 
everybody!) does anybody know it there's activity or plans towards 
updating chromium in Debian stable?


Chromium from sid is not installable in Debian stable due to

Depends: libc6 (>= 2.29)

whereas stable has 2.28.

I'm not sure what the correct procedure would be to kickstart the Debian 
stable update?


*t



Bug#977367: debsources: search results point to not existing sources?

2020-12-14 Thread Tomas Pospisek
Package: qa.debian.org
Severity: normal

Go to 
https://codesearch.debian.net/search?q=Client+sent+an+HTTP+request+to+an+HTTPS+server
select first link 
https://codesearch.debian.net/show?file=gcc-10_10.2.1-1%2Fgcc-10.2.0%2Flibgo%2Fgo%2Fnet%2Fhttp%2Fserver.go=1798
get a 404 with a list of 12 alternative source files of different
versions of gcc-XX/XX.Y.Z-W/gcc-XX.V.U/libgo/go/net/http/server.go
each returning a 404.

I have now clicked through quite a few links to source files, but
have yet to find one that won't return a 404...?

Maybe the search index would need to be purged of source files that
have disappeared (been updated) or something?

Anyway, thanks a lot for the service, very, very appreciated and useful,
*t

-- System Information:
Debian Release: 10.7
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-13-amd64 (SMP w/8 CPU cores)
Locale: LANG=de_CH.utf8, LC_CTYPE=de_CH.utf8 (charmap=UTF-8), LANGUAGE=de_CH:de 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#976162: closed by Sebastiaan Couwenberg (Re: Bug#976162: postgis v3.0.3 pdpg package for amd64 for Ubuntu focal missing)

2020-11-30 Thread Tomas Pospisek

Sebastiaan Couwenberg wrote on Mon, 30 Nov:


On 11/30/20 7:56 PM, Tomas Pospisek wrote:


There is no 3.0.3 package for postgis for focal on pdgd for amd64:


The Debian BTS is not appropriate for this issue, use the
pgsql-pkg-deb...@postgresql.org mailing list, or
https://redmine.postgresql.org/projects/pgapt/issues instead.


Ah, thanks. I was pointed to https://wiki.postgresql.org/wiki/Apt#Bugs and 
it reads there:



Bugs

Please report bugs:

* on the pgsql-pkg-deb...@postgresql.org mailing list, or
* open an issue in Redmine, or
* open a bug in the Debian BTS.


Which as you explained should probably read

* open a bug in the Debian BTS only if it's a bug in a package
  released through Debian's own package repository.

?

Thanks!
*t



Bug#976162: postgis v3.0.3 pdpg package for amd64 for Ubuntu focal missing

2020-11-30 Thread Tomas Pospisek
Source: postgis
Version: 3.0.3
Severity: normal

There is no 3.0.3 package for postgis for focal on pdgd for amd64:

http://apt.postgresql.org/pub/repos/apt/dists/focal-pgdg/main/binary-amd64/Packages

Weirdly enough it apparently *was* built for non-Intel/AMD
architectures but not for amd64:

https://www.postgresql.org/message-id/E1khVKm-0005cE-Kc%40atalia.postgresql.org

Note also that the line with focal and amd64 in it is apparently also missing 
the "source"?

Thanks *a lot* <3 <3 <3! for building these
*t

-- System Information:
Debian Release: 10.6
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-12-amd64 (SMP w/8 CPU cores)
Locale: LANG=de_CH.utf8, LC_CTYPE=de_CH.utf8 (charmap=UTF-8), LANGUAGE=de_CH:de 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#975695: please allow to use UUIDs for "paste numbers"

2020-11-25 Thread Tomas Pospisek
Source: pnopaste
Version: 1.7.4
Severity: wishlist

Having "pastes" with monotonically increasing numbers allows an
"attacker" to discover all pastes by simply counting through
them from 0 on.

Assigning UUIDs to pastes would make that computationally
impossible.

Something like http://nopaste.linux-dev.org/?jA7vBQ8927 or such.

*t


-- System Information:
Debian Release: 10.6
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-12-amd64 (SMP w/8 CPU cores)
Locale: LANG=de_CH.utf8, LC_CTYPE=de_CH.utf8 (charmap=UTF-8), LANGUAGE=de_CH:de 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#975632: please enable setting proxy via environment

2020-11-24 Thread Tomas Pospisek
Package: pnopaste-cli
Version: 1.7-4
Severity: wishlist
Tags: patch

Hi Patrick,

could you please enable proxy settings detection?

After the line:

my $Agent = LWP:UserAgent->new;

add the line:

$Agent->env_proxy;

that's it. Now pnopaste-cli will recognize:

http_proxy=...
https_proxy=...

Environment variables and use them correctly.

Thanks a lot for pnopaste!
*t

-- System Information:
Debian Release: 10.6
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-12-amd64 (SMP w/8 CPU cores)
Locale: LANG=de_CH.utf8, LC_CTYPE=de_CH.utf8 (charmap=UTF-8), LANGUAGE=de_CH:de 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages pnopaste-cli depends on:
ii  libwww-perl  6.36-2
ii  perl 5.28.1-6+deb10u1

pnopaste-cli recommends no packages.

Versions of packages pnopaste-cli suggests:
pn  pnopaste  



Bug#930543: workaround

2020-10-23 Thread Tomas Pospisek
The chromium-driver will apparently try to use /usr/bin/google-chrome 
*first*, no matter what. It even ignores the search $PATH.


So if one does not intend to delete /usr/bin/google-chrome, then one work 
around is to binary patch /usr/bin/chromedriver:


1. install a binary editor, such as bvi
2. edit /usr/bin/chromedriver
3. find google-chrome in the binary
4. replace it with google-chromE

*t



  1   2   3   4   5   6   7   8   >