xtail_2.1-6_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 19 Jul 2017 15:32:38 +0100 Source: xtail Binary: xtail Architecture: source Version: 2.1-6 Distribution: unstable Urgency: medium Maintainer: Debian QA GroupChanged-By: David William Richmond Davies-Jones Description: xtail - like "tail -f", but works on truncated files, directories, more Closes: 562903 Changes: xtail (2.1-6) unstable; urgency=medium . * QA upload. * Source format 3.0 (quilt) * Bumped compat level to 10 * Converted d/rules to dh format * Add ISO Date patch from Jari Aalto (Closes: #562903) * Set maintainer to QA Group * Added homepage to d/control * Converted d/copyright to machine-readable format * Made URLs use HTTPS where possible * Standards version 4.0.0 Checksums-Sha1: d34fcfb01f1df836f9c27353c9a5739f6d96912f 1323 xtail_2.1-6.dsc ea1b0a952ae883fb767025b5b68be61083026cae 5988 xtail_2.1-6.debian.tar.xz cdfb5e06a5e7a05357eab4ed52333d4282050109 4960 xtail_2.1-6_source.buildinfo Checksums-Sha256: e0e25e2ef2a09cd45c2a9d0ffa136016b1f546fcc56fa12f693fa4a00d0fce9f 1323 xtail_2.1-6.dsc d032d2395312343b1183ae51194726bf13f8dc38ef04d1a878700ad68f4e5824 5988 xtail_2.1-6.debian.tar.xz 2fd221f8da9111cf97b3340ab25fa5f67a984612da5f932950e523b87d550152 4960 xtail_2.1-6_source.buildinfo Files: fe21d21d569c88eea952146ba80a0261 1323 utils optional xtail_2.1-6.dsc 5f668eaa5c872bf491aa3bc422dea1fc 5988 utils optional xtail_2.1-6.debian.tar.xz 21758f1517fe4da1e6116fe4897ce617 4960 utils optional xtail_2.1-6_source.buildinfo -BEGIN PGP SIGNATURE- iQEzBAEBCgAdFiEE/Zzi2Nd1S3irJ5u9LDtDb+rGgQEFAlmHq7EACgkQLDtDb+rG gQEJLAf+PgknlfWSr0z1pusCZYOh/IDHy2fmDPDnRP/GNJ17QSJ1FM8GO9x4iXrm qKDw86/fA+GJFGlYRpQgSQvK1n+qZ2GLqGIEFsOJDSa/Fu9FjC0l1OAVWk0F9DIP yhhKZV92JcO5VT4x2XgnwQZw0aLUluOj4pisMwQ1eIz83WkVEW2E7Xtw1TY7HYB0 JV3b0qa3PY43XbRfoQ0c7lAZ9d9dqadsgEHptAuMkTMbCBKSvWel9NFa9TmfExqv xYSExmS7kWPWeEurY/nR4tJ25h4e6ZJn/wJ6AfnmsIvjYkmZzTzs8j+zCuSmt7Em GJ5NrR4v9dxZxYo2+9fAN0NAVpLjgQ== =F0r4 -END PGP SIGNATURE- Thank you for your contribution to Debian.
fspy_0.1.1-2_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 01 Aug 2017 20:53:52 +0100 Source: fspy Binary: fspy Architecture: source Version: 0.1.1-2 Distribution: unstable Urgency: medium Maintainer: Debian QA GroupChanged-By: David William Richmond Davies-Jones Description: fspy - filesystem activity monitoring tool Closes: 831354 Changes: fspy (0.1.1-2) unstable; urgency=medium . * QA upload. * Applied reproducible build patch from Chris Lamb (Closes: #831354) * Bumped compat level to 10 * Set maintainer to Debian QA Group * Dropped build-dep on quilt * Removed obsolete fields from d/control * Converted to source format 3.0 (quilt) * Converted d/rules to dh_ format * Removed useless watch file * Converted d/copyright to machine-readable format * Standards version 4.0.0 * Renamed d/fspy.8 to d/fspy.1 Checksums-Sha1: 425bf990f3af66d8ec82de3e2a70cb0d62bff44e 1317 fspy_0.1.1-2.dsc ad97c4bd923e037611a6d285f8a362e0c68369e3 3688 fspy_0.1.1-2.debian.tar.xz 58a9cc0e9268e7ca2a649039d2896cebc4d5907c 4963 fspy_0.1.1-2_source.buildinfo Checksums-Sha256: d44cfc33d8e5b7b805292992aa6c91c054784e40bd970ea927d0f460f634d5f5 1317 fspy_0.1.1-2.dsc 71058b18e31e8dd84097afc3eda4dadef428bf3a9823a7959266aa33c3725bff 3688 fspy_0.1.1-2.debian.tar.xz 21c03be159a1cc12011dba0360e851436771376dbcb5f8c087147ae1e0c649e3 4963 fspy_0.1.1-2_source.buildinfo Files: 69192e8526b9a9064ec7d179092b7ef6 1317 misc optional fspy_0.1.1-2.dsc 30e1509308f666cf3a616f95b876ffd0 3688 misc optional fspy_0.1.1-2.debian.tar.xz 407b9be6b43da0ccc8e87b602577cfd9 4963 misc optional fspy_0.1.1-2_source.buildinfo -BEGIN PGP SIGNATURE- iQEzBAEBCgAdFiEE/Zzi2Nd1S3irJ5u9LDtDb+rGgQEFAlmHrC4ACgkQLDtDb+rG gQHW4gf/bfrzN8L7OonvlsuF8KOxmrEzG9lphoiJEJSTmFEbw5o/0qWbGeJzN1rs uVanIN/hHXsSTmISSIwzknG9sBRtbd72lHKY08iDPmnWEXLIkCOEOBNaRswsDb17 Uj8yErIDPzmUCasntTLuk/LgIgsmnh/9ggiwSMBIITexxKmqS1jkQyfQnJcd5GbN j7yJ/iAeABEBSJgTnxmFGiLOnuEMvGo8oRHls7nLou0DyE6pwLbxFUE0U4m946lY C5DyKsjSOUxep5o4+SHN+IET8dpSh9nJq7blMAEZJdU1f82h+6KDDu8r1OaikQRb stwAecfnRd6MqtVAvUs/Z76pM5zW9A== =gRf6 -END PGP SIGNATURE- Thank you for your contribution to Debian.
Processing of fspy_0.1.1-2_source.changes
fspy_0.1.1-2_source.changes uploaded successfully to localhost along with the files: fspy_0.1.1-2.dsc fspy_0.1.1-2.debian.tar.xz fspy_0.1.1-2_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
Processing of xtail_2.1-6_source.changes
xtail_2.1-6_source.changes uploaded successfully to localhost along with the files: xtail_2.1-6.dsc xtail_2.1-6.debian.tar.xz xtail_2.1-6_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
Bug#871166: dadadodo: FTBFS: cc1: error: -Wformat-security ignored without -Wformat [-Werror=format-security]
Source: dadadodo Version: 1.04-6 Severity: serious Tags: buster sid User: debian...@lists.debian.org Usertags: qa-ftbfs-20170805 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part (hopefully): > gcc -c -I. -DGETTIMEOFDAY_TWO_ARGS -DHAVE_UNISTD_H -g -O2 > -fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat > -Werror=format-security -Wall -Wstrict-prototypes -Wnested-externs > -Wno-format -Wdate-time -D_FORTIFY_SOURCE=2 dadadodo.c > cc1: error: -Wformat-security ignored without -Wformat > [-Werror=format-security] > In file included from /usr/include/string.h:630:0, > from dadadodo.c:16: > dadadodo.c: In function 'get_entity': > dadadodo.c:165:11: warning: pointer targets in passing argument 1 of 'strlen' > differ in signedness [-Wpointer-sign] > !strncmp(string, entities[i].string, length)) >^ > In file included from dadadodo.c:16:0: > /usr/include/string.h:394:15: note: expected 'const char *' but argument is > of type 'const unsigned char *' > extern size_t strlen (const char *__s) >^~ > In file included from /usr/include/string.h:630:0, > from dadadodo.c:16: > dadadodo.c:165:11: warning: pointer targets in passing argument 1 of > '__builtin_strlen' differ in signedness [-Wpointer-sign] > !strncmp(string, entities[i].string, length)) >^ > dadadodo.c:165:11: note: expected 'const char *' but argument is of type > 'const unsigned char *' > dadadodo.c:165:11: warning: pointer targets in passing argument 1 of > '__builtin_strcmp' differ in signedness [-Wpointer-sign] > !strncmp(string, entities[i].string, length)) >^ > dadadodo.c:165:11: note: expected 'const char *' but argument is of type > 'const unsigned char *' > dadadodo.c:165:11: warning: pointer targets in passing argument 1 of > '__builtin_strlen' differ in signedness [-Wpointer-sign] > !strncmp(string, entities[i].string, length)) >^ > dadadodo.c:165:11: note: expected 'const char *' but argument is of type > 'const unsigned char *' > dadadodo.c:165:11: warning: pointer targets in passing argument 1 of > '__builtin_strcmp' differ in signedness [-Wpointer-sign] > !strncmp(string, entities[i].string, length)) >^ > dadadodo.c:165:11: note: expected 'const char *' but argument is of type > 'const unsigned char *' > dadadodo.c:165:11: warning: pointer targets in passing argument 1 of > '__builtin_strcmp' differ in signedness [-Wpointer-sign] > !strncmp(string, entities[i].string, length)) >^ > dadadodo.c:165:11: note: expected 'const char *' but argument is of type > 'const unsigned char *' > dadadodo.c:165:11: warning: pointer targets in passing argument 1 of > '__builtin_strcmp' differ in signedness [-Wpointer-sign] > !strncmp(string, entities[i].string, length)) >^ > dadadodo.c:165:11: note: expected 'const char *' but argument is of type > 'const unsigned char *' > dadadodo.c:165:11: warning: pointer targets in passing argument 1 of > 'strncmp' differ in signedness [-Wpointer-sign] > !strncmp(string, entities[i].string, length)) >^ > In file included from dadadodo.c:16:0: > /usr/include/string.h:143:12: note: expected 'const char *' but argument is > of type 'const unsigned char *' > extern int strncmp (const char *__s1, const char *__s2, size_t __n) > ^~~ > dadadodo.c: In function 'scan': > dadadodo.c:201:7: warning: pointer targets in assignment differ in signedness > [-Wpointer-sign] > s = first_line; >^ > dadadodo.c:204:18: warning: pointer targets in passing argument 1 of 'fgets' > differ in signedness [-Wpointer-sign] >s = fgets (buf, sizeof(buf)-1, file); > ^~~ > In file included from /usr/include/stdio.h:938:0, > from dadadodo.c:18: > /usr/include/x86_64-linux-gnu/bits/stdio2.h:253:1: note: expected 'char * > restrict' but argument is of type 'unsigned char *' > fgets (char *__restrict __s, int __n, FILE *__restrict __stream) > ^ > dadadodo.c:204:9: warning: pointer targets in assignment differ in signedness > [-Wpointer-sign] >s = fgets (buf, sizeof(buf)-1, file); > ^ > In file included from /usr/include/string.h:630:0, > from dadadodo.c:16: > dadadodo.c:208:38: warning: pointer targets in passing argument 1 of 'strlen' > differ in signedness [-Wpointer-sign] >mailbox_p = (*s == 'F' && !strncmp(s, "From ", 5)); > ^ > In file included from dadadodo.c:16:0: > /usr/include/string.h:394:15: note: expected 'const char *' but argument is > of type 'unsigned char *' > extern size_t strlen (const char *__s) >^~ > In file included from /usr/include/string.h:630:0, > from dadadodo.c:16: > dadadodo.c:208:38: warning: pointer targets in passing argument 1 of >
Bug#871104: gnats: FTBFS: cc1: error: -Wformat-security ignored without -Wformat [-Werror=format-security]
Source: gnats Version: 4.1.0-4 Severity: serious Tags: buster sid User: debian...@lists.debian.org Usertags: qa-ftbfs-20170805 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part (hopefully): > gcc -c -I. -I. -g -O2 -fdebug-prefix-map=/<>=. > -fstack-protector-strong -Wformat -Werror=format-security -W -Wall -ansi > -pedantic -Wstrict-prototypes -Wmissing-prototypes -Wwrite-strings > -Wno-format -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H > -DGNATSD_USER_ACCESS_FILE=\"/etc/gnats/gnatsd.user_access\" > -DGNATSD_HOST_ACCESS_FILE=\"/etc/gnats/gnatsd.host_access\" > -DDEFAULT_GNATS_SERVICE=\"gnats\" > -DGLOBAL_DB_LIST_FILE=\"/etc/gnats/databases\" -DGNATS_USER=\"gnats\" edit.c > cc1: error: -Wformat-security ignored without -Wformat > [-Werror=format-security] > edit.c: In function 'rewrite_pr': > edit.c:440:7: warning: ignoring return value of 'asprintf', declared with > attribute warn_unused_result [-Wunused-result] >asprintf (, "%s/%s", databaseDir (database), >^~~~ >field_value (new_pr, CATEGORY (database))); >~~ > edit.c:473:3: warning: ignoring return value of 'asprintf', declared with > attribute warn_unused_result [-Wunused-result] >asprintf (_path, "%s.old", old_path); >^ > edit.c: In function 'lock_pr': > edit.c:927:7: warning: ignoring return value of 'fgets', declared with > attribute warn_unused_result [-Wunused-result] >fgets (buf, sizeof (buf) - 1, fp); >^ > cc1: some warnings being treated as errors > Makefile:174: recipe for target 'edit.o' failed > make[2]: *** [edit.o] Error 1 The full build log is available from: http://aws-logs.debian.net/2017/08/05/gnats_4.1.0-4_unstable.log A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on EC2 VM instances from Amazon Web Services, using a clean, minimal and up-to-date chroot. Every failed build was retried once to eliminate random failures.
Bug#871021: jadetex: transitional package since stretch and containing stuff
Package: jadetex Version: 3.13-17 Severity: normal Hi, jadetex package description says it's a transitional package (in stretch and upwards), yet it still contains stuff and not mere meta data. I guess the proper cause of action would be to remove the package from sid. -- cheers, Holger signature.asc Description: Digital signature
Bug#854200: marked as done (udd: useless tag before backports version numbers)
Your message dated Sun, 6 Aug 2017 13:10:54 -0400 with message-id <20170806171054.wytoaewtyczqs...@xanadu.blop.info> and subject line Re: Bug#854200: udd: useless tag before backports version numbers has caused the Debian Bug report #854200, regarding udd: useless tag before backports version numbers to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 854200: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854200 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: qa.debian.org Severity: minor User: qa.debian@packages.debian.org Usertags: udd Hi, The lines which display version numbers for backports have twice the height of other lines. Looking at the source code for the HTML page, I could see that those version numbers have a tag just before them. You can see that on my dashboard for example: https://udd.debian.org/dmd/?raphael.halimi%40gmail.com#todo Regards, -- Raphaël Halimi signature.asc Description: OpenPGP digital signature --- End Message --- --- Begin Message --- really closing now--- End Message ---
Bug#854200: udd: useless tag before backports version numbers
Hi, On 05/02/17 at 01:13 +0100, Raphaël Halimi wrote: > Package: qa.debian.org > Severity: minor > User: qa.debian@packages.debian.org > Usertags: udd > > Hi, > > The lines which display version numbers for backports have twice the > height of other lines. Looking at the source code for the HTML page, I > could see that those version numbers have a tag just before them. > > You can see that on my dashboard for example: > > https://udd.debian.org/dmd/?raphael.halimi%40gmail.com#todo Fixed in 68c6615e562dbdfb567d45e8b9c213915b08290c Thanks for reporting! Lucas
Bug#863592: marked as done (UDD should use https for links)
Your message dated Sun, 6 Aug 2017 12:26:27 -0400 with message-id <20170806162627.kqpgphmtzobc6...@xanadu.blop.info> and subject line Re: Bug#863592: UDD should use https for links has caused the Debian Bug report #863592, regarding UDD should use https for links to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 863592: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863592 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: qa.debian.org Severity: minor User: qa.debian@packages.debian.org Usertags: udd I noticed that the links to the bugs from UDD bugs searches are http and not https. >From a quick grep through the sources there seem to be more places where https could be used instead of http. --- End Message --- --- Begin Message --- Hi, On 29/05/17 at 01:20 +0300, Adrian Bunk wrote: > Package: qa.debian.org > Severity: minor > User: qa.debian@packages.debian.org > Usertags: udd > > I noticed that the links to the bugs from UDD bugs searches are > http and not https. > > From a quick grep through the sources there seem to be more > places where https could be used instead of http. Fixed in ded1cb32ac524295312d54406386693227f6e397 Lucas--- End Message ---
Bug#842829: marked as done (UDD/uscan: devscripts needs to be upgraded to avoid some failures)
Your message dated Sun, 6 Aug 2017 10:56:37 -0400 with message-id <20170806145637.ep6c76c3hbvvg...@xanadu.blop.info> and subject line Re: Bug#842829: UDD/uscan: devscripts needs to be upgraded to avoid some failures has caused the Debian Bug report #842829, regarding UDD/uscan: devscripts needs to be upgraded to avoid some failures to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 842829: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842829 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: qa.debian.org Severity: normal User: qa.debian@packages.debian.org Usertags: udd Hi, (filing as a bug) On 01/10/16 at 13:21 +0900, Hideki Yamane wrote: > Hi (I'm not on this list, so CC to me please), > > Those 3 packages got uscan error in Maintainer Dashboard page > > > > fonts-kanjistrokeorders debian/watch: uscan returned an error: In > > debian/watch no matching files for watch line http://www.nihilist.org.uk/ > > http://www.nihilist.org.uk/KanjiStrokeOrders_v[-_](\d[\-+\.:\~\da-zA-Z]*)(?i)\.(?:tar\.xz|tar\.bz2|tar\.gz|zip)\?attredirects=0 > > debian uupdate > > > > fonts-ricty-diminished debian/watch: uscan returned an error: In > > debian/watch no matching files for watch line > > http://www.rs.tus.ac.jp/yyusa/ricty_diminished.html > > ricty_diminished/ricty_diminished-[-_](\d[\-+\.:\~\da-zA-Z]*)(?i)\.(?:tar\.xz|tar\.bz2|tar\.gz|zip) > > > > gawk-docdebian/watch: uscan returned an error: > > > However, it works fine on my box. I guess it may be caused by use version 4 > syntax for debian/watch file. > > > $ uscan --verbose > > (snip) > > uscan info: Matching target for downloadurlmangle: > > https://ftp.gnu.org/gnu/gawk/gawk-4.1.4.tar.xz > > uscan info: Upstream URL (downloadurlmangled): > >https://ftp.gnu.org/gnu/gawk/gawk-4.1.4.tar.xz > > uscan info: Newest upstream tarball version selected for download > > (uversionmangled): 4.1.4 > > uscan info: Download filename (filenamemangled): gawk-4.1.4.tar.xz > > uscan info: Newest version of gawk-doc on remote site is 4.1.4, local > > version is 4.1.4 > > uscan info:=> Package is up to date for from > > https://ftp.gnu.org/gnu/gawk/gawk-4.1.4.tar.xz > > uscan info: Scan finished > > Can anyone can look into it, please? I tried with the first package listed. It works fine with devscripts 2.16.8 (in testing), but not with 2.16.4~bpo8+1 (in stable-bpo, and installed on ullmann.debian.org). To fix that, an update of that backport is needed. Lucas --- End Message --- --- Begin Message --- On 29/05/17 at 08:12 -0400, James McCoy wrote: > On Tue, Nov 01, 2016 at 03:09:55PM -0400, James McCoy wrote: > > On Nov 1, 2016 11:33, "Lucas Nussbaum"wrote: > > > I tried with the first package listed. It works fine with devscripts > > > 2.16.8 (in testing), but not with 2.16.4~bpo8+1 (in stable-bpo, and > > > installed on ullmann.debian.org). > > > > > > To fix that, an update of that backport is needed. > > > > I've yet to do that because it would require a backport of the licensecheck > > package, too, since that was split out of devscripts. > > Thanks to fsfs backporting licensecheck, I've updated devscripts' > backport to 2.17.5~bpo8+1. Thanks! As a result, the uscan output is now fine for the packages that had issues previously, so I'm closing this bug. https://udd.debian.org/dmd/?email1fonts-kanjistrokeorders+fonts-ricty-diminished+gawk-doc==html#todo Lucas--- End Message ---
Bug#844106: qa.debian.org: Says uscan failed, however, it works (for linuxinfo)
Hi Helge, On 12/11/16 at 15:48 +0100, Helge Kreutzmann wrote: > Package: qa.debian.org > Severity: normal > > https://packages.qa.debian.org/l/linuxinfo.html I'm not sure where the old PTS gets its uscan information, but: - it's OK on tracker.debian.org - it's also OK on UDD's DMD: https://udd.debian.org/dmd/?linuxinfo I've updated the usertags to reflect that it's a PTS bug, not a UDD bug. Lucas
Re: Bug#842829: UDD/uscan: devscripts needs to be upgraded to avoid some failures
On 29/05/17 at 08:12 -0400, James McCoy wrote: > On Tue, Nov 01, 2016 at 03:09:55PM -0400, James McCoy wrote: > > On Nov 1, 2016 11:33, "Lucas Nussbaum"wrote: > > > I tried with the first package listed. It works fine with devscripts > > > 2.16.8 (in testing), but not with 2.16.4~bpo8+1 (in stable-bpo, and > > > installed on ullmann.debian.org). > > > > > > To fix that, an update of that backport is needed. > > > > I've yet to do that because it would require a backport of the licensecheck > > package, too, since that was split out of devscripts. > > Thanks to fsfs backporting licensecheck, I've updated devscripts' > backport to 2.17.5~bpo8+1. Thanks! As a result, the uscan output is now fine for the packages that had issues previously, so I'm closing this bug. https://udd.debian.org/dmd/?email1fonts-kanjistrokeorders+fonts-ricty-diminished+gawk-doc==html#todo Lucas
cadabra_1.46-4_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 06 Aug 2017 16:26:15 +0300 Source: cadabra Binary: cadabra Architecture: source Version: 1.46-4 Distribution: unstable Urgency: low Maintainer: Debian QA GroupChanged-By: Adrian Bunk Description: cadabra- field-theory motivated computer algebra system Closes: 853340 Changes: cadabra (1.46-4) unstable; urgency=low . * QA upload. * Fix FTBFS with gcc 7. (Closes: #853340) Checksums-Sha1: 0a6992461ce6a9ea1afe8a62b7c9b90b7cd3a132 1993 cadabra_1.46-4.dsc 2281da756486c1dc70833788b2ada993dfc4b113 11864 cadabra_1.46-4.debian.tar.xz Checksums-Sha256: b3b2db90748b8b9dd9ea75247dde3595554fba7a904f1d00661cb696c7839aef 1993 cadabra_1.46-4.dsc ffc73cc3db88051604d85847f7eec9eb03b9240b671affb65786efc5c8dd7813 11864 cadabra_1.46-4.debian.tar.xz Files: 41d65178a00ae7a9aaf88e290f285d79 1993 math optional cadabra_1.46-4.dsc 3f3940ca0c95a3f7a8c0591d31026850 11864 math optional cadabra_1.46-4.debian.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAlmHGcMACgkQiNJCh6LY mLFpyw//ZeSGMcTJU2Ul1R+DBscVofdHgsclOrOqDwPmttEH8hefnUuMvg7kIvdC fydYPQo/r/48S5dViidbAqeeAEZjG0VrUf85lxRGXimtC4i1l8rr/p0m8e2GD4El CBMfWheX/0jphxfr5srrJX/NhizS0IERM6xAXg9zJ5G0t09YFblXGowpwDSkMr4N univRfk/6/YRC44H7AopTgsZNOcHm/BsFHAEh2fntQbt/Dr0GWY9jAYnZXJF5TBV yTLH2Bhm4x18nSLDvhgR0CHp9i0ekfS5FM43CBnbJD5w8pyV8gA/5sX+pel9Y0eE MtOSTy8rLCAVdLtqtVab4hNelb3TGlDkThp912y9FrFEOg5XMIRHWtenpD82HYxZ GBwBefrPDAoUxSHB+TqSJrr0cCbZrYfppWIC8pIQ8JRWo2wYTXpWayDgEvMRXgDi NJCwKmVFznIUC0IiqYiVvOk8+z+4cyEx/6sFNuTkgML3DKn8dvcU5Sxj2p2V7LVo dGzod0+X4IIvkp0w5datFK9TvqZLuEwVezidol8tr9oBXjb93cOFXWPYW3+3VvFp 9Tt/Cf7wjpsjIofWAXZXOtIB/erMUYJeVheRHlVhHnH6eqIcYRvxrGLYVevNlTsH 2eiq0Xjp6QQfjhzrBhjA/OM51JP8Su9VEyzcJ0l72Cy/U26Ikag= =vRzz -END PGP SIGNATURE- Thank you for your contribution to Debian.
Re: mass-removing packages that missed both jessie and stretch?
Hi, On 19/07/17 at 23:29 +0200, Lucas Nussbaum wrote: > So, I propose that we remove from the archive all packages that: > were in unstable at the time of the jessie freeze > AND > were not in jessie at the time of the release > AND > where in unstable at the time of the stretch freeze > AND > where not in stretch at the time of the release > AND > are still not in testing > AND > were not uploaded over the last 6 months FTR, I've just filed bugs on 90 packages following that process. See https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=qa-removals-post-stretch;users=debian-qa@lists.debian.org Lucas
Bug#870988: moodle-debian-edu-theme: should moodle-debian-edu-theme be removed from unstable?
Source: moodle-debian-edu-theme User: debian...@lists.debian.org Usertags: qa-removals-post-stretch Hi, Following a discussion[1] on the debian-qa@ mailing list on packages that missed both jessie and stretch, I am proposing the removal of this package from unstable, because: it was in unstable at the time of the stretch freeze but wasn't part of stretch AND it was in unstable at the time of the jessie freeze but it wasn't part of jessie AND it is still not in testing AND it was not uploaded since the beginning of 2017. If you disagree and think that this package should remain in unstable, feel free to just close this bug. If this bug is still open one month from now (on 2017-09-06), it will be turned into a removal request, using: reassign -1 ftp.debian.org retitle -1 RM: moodle-debian-edu-theme -- RoQA; missed both jessie and stretch thanks - Lucas, for the QA team. [1] https://lists.debian.org/debian-qa/2017/07/msg00021.html
Processing of cadabra_1.46-4_source.changes
cadabra_1.46-4_source.changes uploaded successfully to localhost along with the files: cadabra_1.46-4.dsc cadabra_1.46-4.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)
Bug#870928: openclipart2: should openclipart2 be removed from unstable?
Source: openclipart2 User: debian...@lists.debian.org Usertags: qa-removals-post-stretch Hi, Following a discussion[1] on the debian-qa@ mailing list on packages that missed both jessie and stretch, I am proposing the removal of this package from unstable, because: it was in unstable at the time of the stretch freeze but wasn't part of stretch AND it was in unstable at the time of the jessie freeze but it wasn't part of jessie AND it is still not in testing AND it was not uploaded since the beginning of 2017. If you disagree and think that this package should remain in unstable, feel free to just close this bug. If this bug is still open one month from now (on 2017-09-06), it will be turned into a removal request, using: reassign -1 ftp.debian.org retitle -1 RM: openclipart2 -- RoQA; missed both jessie and stretch thanks - Lucas, for the QA team. [1] https://lists.debian.org/debian-qa/2017/07/msg00021.html
Bug#853340: marked as done (cadabra: ftbfs with GCC-7)
Your message dated Sun, 06 Aug 2017 13:48:51 + with message-idand subject line Bug#853340: fixed in cadabra 1.46-4 has caused the Debian Bug report #853340, regarding cadabra: ftbfs with GCC-7 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 853340: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=853340 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: src:cadabra Version: 1.46-2 Severity: normal Tags: sid buster User: debian-...@lists.debian.org Usertags: ftbfs-gcc-7 Please keep this issue open in the bug tracker for the package it was filed for. If a fix in another package is required, please file a bug for the other package (or clone), and add a block in this package. Please keep the issue open until the package can be built in a follow-up test rebuild. The package fails to build in a test rebuild on at least amd64 with gcc-7/g++-7, but succeeds to build with gcc-6/g++-6. The severity of this report may be raised before the buster release. There is no need to fix this issue in time for the stretch release. The full build log can be found at: http://people.debian.org/~doko/logs/gcc7-20170126/cadabra_1.46-2_unstable_gcc7.log The last lines of the build log are at the end of this report. To build with GCC 7, either set CC=gcc-7 CXX=g++-7 explicitly, or install the gcc, g++, gfortran, ... packages from experimental. apt-get -t=experimental install g++ Common build failures are new warnings resulting in build failures with -Werror turned on, or new/dropped symbols in Debian symbols files. For other C/C++ related build failures see the porting guide at http://gcc.gnu.org/gcc-7/porting_to.html [...] ~^~~ g++ -o test_gmp test_gmp.o -Wl,-z,relro -Wl,-z,now -lgmpxx -lgmp g++ -o tree_example tree_example.o modules/xperm_new.cc: In function 'void schreier_sims_step(int*, int, int*, int, int, int, int*, int, int*, int*, int**, int*, int*)': modules/xperm_new.cc:1176:7: warning: 'j' may be used uninitialized in this function [-Wmaybe-uninitialized] if (j == *nbl+1) { ^~ exchange.cc: In static member function 'static int exchange::collect_identical_tensors(exptree&, tree::iterator, std::vector&)': exchange.cc:113:18: error: ISO C++ forbids comparison between pointer and integer [-fpermissive] if(ngr.spino==false || ngr.spino->majorana==true) ^ Makefile:30: recipe for target 'exchange.o' failed make[2]: *** [exchange.o] Error 1 make[2]: *** Waiting for unfinished jobs manipulator.cc: In member function 'tree::iterator manipulator::handle_active_nodes_(tree::iterator)': manipulator.cc:863:7: warning: variable 'once_modified' set but not used [-Wunused-but-set-variable] bool once_modified=false; // if nothing happens, do a check_consistency at the end ^ g++ -Wall -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat -Werror=format-security -Wall -D"DESTDIR=\"/usr\"" -D"RELEASE=\"1.46\"" -D"DATETIME=\"`date | sed -e 's/ / /'`\"" -DHOSTNAME=\"`hostname`\" -O2 -I. -I../include `pkg-config modglue --cflags` `pkg-config --cflags gtkmm-2.4` `pkg-config --cflags pango` -Wdate-time -D_FORTIFY_SOURCE=2 -Wdate-time -D_FORTIFY_SOURCE=2 -c -o main.o main.cc In file included from /usr/include/glibmm-2.4/glibmm/containerhandle_shared.h:24:0, from /usr/include/glibmm-2.4/glibmm/arrayhandle.h:23, from /usr/include/gdkmm-2.4/gdkmm/types.h:30, from /usr/include/gtkmm-2.4/gtkmm/main.h:33, from window.hh:24, from main.cc:36: /usr/include/glibmm-2.4/glibmm/variant.h:596:55: warning: dynamic exception specifications are deprecated in C++11; use 'noexcept' instead [-Wdeprecated] static V_CastTo cast_dynamic(const VariantBase& v) throw(std::bad_cast); ^ /usr/include/glibmm-2.4/glibmm/variant.h:643:1: warning: dynamic exception specifications are deprecated in C++11; use 'noexcept' instead [-Wdeprecated] throw(std::bad_cast) ^ /usr/include/glibmm-2.4/glibmm/variant.h:899:1: warning: dynamic exception specifications are deprecated in C++11; use 'noexcept' instead [-Wdeprecated] throw(std::bad_cast); ^ /usr/include/glibmm-2.4/glibmm/variant.h:1082:1: warning: dynamic exception specifications are deprecated in C++11; use 'noexcept' instead [-Wdeprecated] throw(std::bad_cast); ^ /usr/include/glibmm-2.4/glibmm/variant.h:1139:1: warning: dynamic exception specifications are deprecated in
Re: we have just received your CV
I'm Sent from my iPhone