Bug#1033442: unblock: golang-go.opencensus/0.24.0-1

2023-03-24 Thread Anthony Fok
On Fri, Mar 24, 2023 at 3:33 PM Anthony Fok  wrote:

> ratt finds 89 packages with direct or indirect dependency on
> golang-go.opencensus and is able to build all of them with
> with golang-go.opencensus/0.24.0-1 smoothly with no hiccup.

Clarification: Out of the 89 packages, 4 failed but not due to
golang-go.opencensus:

  FAILED: cadvisor (see buildlogs/cadvisor_0.38.7+ds1-2)
  FAILED: golang-github-prometheus-common
(see buildlogs/golang-github-prometheus-common_0.15.0-2)
  FAILED: nomad (see buildlogs/nomad_0.12.10+dfsg1-3)
  FAILED: nomad-driver-podman (see buildlogs/nomad-driver-podman_0.1.0-2)

3 of them, cadvisor, nomad and nomad-driver-podman are currently FTBFS
in the archive and are not in "testing".

As for golang-github-prometheus-common_0.15.0-2, ratt picked the wrong
version in stable (bullseye) instead of 0.39.0-2 in sid.
Apparently, ratt's dependency dose-ceve does not handle the multiple
"same Package, different Version" entries in the source list
and simply picks the first one:

  $ grep -A2 '^Package: golang-github-prometheus-common' \
/var/lib/apt/lists/deb.debian.org_debian_dists_sid_main_source_Sources
  Package: golang-github-prometheus-common
  Binary: golang-github-prometheus-common-dev
  Version: 0.15.0-2
  --
  Package: golang-github-prometheus-common
  Binary: golang-github-prometheus-common-dev
  Version: 0.39.0-2

So, while this erroneous sbuild command fails:
  sbuild --arch-all --dist=unstable --nolog \
  golang-github-prometheus-common_0.15.0-2 \
  --extra-package=../golang-go.opencensus-dev_0.24.0-1_all.deb

the correct sbuild command pointing to the correct version in sid passes:
  sbuild --arch-all --dist=unstable --nolog \
  golang-github-prometheus-common_0.39.0-2 \
  --extra-package=../golang-go.opencensus-dev_0.24.0-1_all.deb

So, yes, it is perfectly safe to upgrade golang-go.opencensus 0.23.0-4
to 0.24.0-1.

Many thanks!

Cheers,
Anthony Fok



Bug#1033006: unblock: openvpn/2.6.1-1 (preapproval)

2023-03-24 Thread Bernhard Schmidt
On 15/03/23 04:57 PM, Bernhard Schmidt wrote:

Hi,

> The upcoming DCO change will involve a new version of src:openvpn and a new 
> version
> of src:openvpn-dco-dkms. The list of changes on the kernel side is already 
> visible
> on https://github.com/OpenVPN/ovpn-dco/commits/master .
> 
> In the past we managed to break DCO on above mentioned really heavily loaded
> OpenVPN server within a few hours. The new version is a major overhaul and 
> more
> in-line with code upstreamable in Linux, and did survive torture tests.
> 
> I know this is kind of late, but I think it would be better to include it as 
> well
> as soon as it is released because
> 
> - we cannot support the old deprecated module
> - openvpn uses DCO (of the right version) automatically and will transparently
>   fall-back to non-DCO mode if the module is not found (or the wrong version)
> - it has not been in Bullseye previously, so if we see that DCO is too 
> unstable
>   with the new version we can just drop it before the release

So, the release of 2.6.2 with the new DCO module has been done
yesterday, fixing a number of bugs already present in 2.6.0.

https://github.com/OpenVPN/openvpn/blob/release/2.6/Changes.rst

---
New control packets flow for data channel offloading on Linux. 2.6.2+
changes the way OpenVPN control packets are handled on Linux when DCO is
active, fixing the lockups observed with 2.6.0/2.6.1 under high client
connect/disconnect activity. This is an INCOMPATIBLE change and
therefore an ovpn-dco kernel module older than v0.2.20230323 (commit ID
726fdfe0fa21) will not work anymore and must be upgraded. The kernel
module was renamed to "ovpn-dco-v2.ko" in order to highlight this change
and ensure that users and userspace software could easily understand
which version is loaded. Attempting to use the old ovpn-dco with 2.6.2+
will lead to disabling DCO at runtime.
---

So I need some guidance from the release team how to proceed. I can
think of

- abandoning all of this, leading to a bookworm release using a buggy
  OpenVPN version with a DCO kernel interface that noone else uses
- update experimental to 2.6.2 and the new DCO module, then ask for a
  approval for upload to unstable (2.6.1+2.6.2) in one go
- upload 2.6.2 and the new DCO module to unstable right away
- upload 2.6.1 from experimental to unstable, then stage 2.6.2 and the
  new DCO in experimental for the second review round

I would prefer the last option.

Bernhard



Bug#1033442: unblock: golang-go.opencensus/0.24.0-1

2023-03-24 Thread Anthony Fok
On Fri, Mar 24, 2023 at 3:33 PM Anthony Fok  wrote:
> [ Checklist ]
>   [x] all changes are documented in the d/changelog
>   [x] I reviewed all changes and I approve them
>   [x] attach debdiff against the package in testing

Sorry, I forgot to actually attach the debdiff file.  Attached in this
follow-up message.  :-)

Cheers,
Anthony Fok
diff -Nru golang-go.opencensus-0.23.0/debian/changelog golang-go.opencensus-0.24.0/debian/changelog
--- golang-go.opencensus-0.23.0/debian/changelog	2023-01-04 15:26:48.0 -0700
+++ golang-go.opencensus-0.24.0/debian/changelog	2023-03-09 02:33:15.0 -0700
@@ -1,3 +1,14 @@
+golang-go.opencensus (0.24.0-1) unstable; urgency=medium
+
+  * New upstream version 0.24.0
+  * Reorder fields in debian/control and debian/copyright
+  * Bump versioned dependencies as per go.mod:
+- golang-github-google-go-cmp-dev (>= 0.5.3)
+- golang-github-stretchr-testify-dev (>= 1.8.1)
+- golang-google-grpc-dev (>= 1.33.2)
+
+ -- Anthony Fok   Thu, 09 Mar 2023 02:33:15 -0700
+
 golang-go.opencensus (0.23.0-4) unstable; urgency=medium
 
   * Team upload
diff -Nru golang-go.opencensus-0.23.0/debian/control golang-go.opencensus-0.24.0/debian/control
--- golang-go.opencensus-0.23.0/debian/control	2023-01-02 09:30:05.0 -0700
+++ golang-go.opencensus-0.24.0/debian/control	2023-03-09 02:32:16.0 -0700
@@ -1,36 +1,36 @@
 Source: golang-go.opencensus
+Section: golang
+Priority: optional
 Maintainer: Debian Go Packaging Team 
 Uploaders: Stephen Gelman ,
Anthony Fok 
-Section: golang
-Testsuite: autopkgtest-pkg-go
-Priority: optional
+Rules-Requires-Root: no
 Build-Depends: debhelper-compat (= 13),
dh-golang,
golang-any,
-   golang-github-google-go-cmp-dev (>= 0.3.0),
+   golang-github-google-go-cmp-dev (>= 0.5.3),
golang-github-golang-groupcache-dev,
-   golang-github-stretchr-testify-dev (>= 1.4.1),
+   golang-github-stretchr-testify-dev (>= 1.8.1),
golang-golang-x-net-dev,
-   golang-google-grpc-dev (>= 1.20.1),
+   golang-google-grpc-dev (>= 1.33.2),
golang-github-golang-protobuf-1-3-dev
+Testsuite: autopkgtest-pkg-go
 Standards-Version: 4.6.2
 Vcs-Browser: https://salsa.debian.org/go-team/packages/golang-go.opencensus
 Vcs-Git: https://salsa.debian.org/go-team/packages/golang-go.opencensus.git
 Homepage: https://github.com/census-instrumentation/opencensus-go
-Rules-Requires-Root: no
 XS-Go-Import-Path: go.opencensus.io
 
 Package: golang-go.opencensus-dev
 Architecture: all
 Multi-Arch: foreign
-Depends: ${misc:Depends},
- golang-github-google-go-cmp-dev (>= 0.3.0),
+Depends: golang-github-google-go-cmp-dev (>= 0.5.3),
  golang-github-golang-groupcache-dev,
- golang-github-stretchr-testify-dev (>= 1.4.1),
+ golang-github-stretchr-testify-dev (>= 1.8.1),
  golang-golang-x-net-dev,
- golang-google-grpc-dev (>= 1.20.1),
- golang-github-golang-protobuf-1-3-dev | golang-github-golang-protobuf-1-5-dev
+ golang-google-grpc-dev (>= 1.33.2),
+ golang-github-golang-protobuf-1-3-dev | golang-github-golang-protobuf-1-5-dev,
+ ${misc:Depends}
 Description: Stats collection and distributed tracing framework
  OpenCensus Go is a Go implementation of OpenCensus, a toolkit for
  collecting application performance and behavior monitoring data.
diff -Nru golang-go.opencensus-0.23.0/debian/copyright golang-go.opencensus-0.24.0/debian/copyright
--- golang-go.opencensus-0.23.0/debian/copyright	2022-12-31 17:30:47.0 -0700
+++ golang-go.opencensus-0.24.0/debian/copyright	2023-03-09 02:30:39.0 -0700
@@ -1,9 +1,9 @@
 Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
-Upstream-Name: go.opencensus.io
 Source: https://github.com/census-instrumentation/opencensus-go
+Upstream-Name: go.opencensus.io
 
 Files: *
-Copyright: 2017-2019 OpenCensus
+Copyright: 2017-2022 OpenCensus
 License: Apache-2.0
 
 Files: debian/*
@@ -23,6 +23,6 @@
  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  See the License for the specific language governing permissions and
  limitations under the License.
- .
+Comment:
  On Debian systems, the complete text of the Apache version 2.0 license
  can be found in "/usr/share/common-licenses/Apache-2.0".
diff -Nru golang-go.opencensus-0.23.0/examples/derived_gauges/derived_gauge.go golang-go.opencensus-0.24.0/examples/derived_gauges/derived_gauge.go
--- golang-go.opencensus-0.23.0/examples/derived_gauges/derived_gauge.go	2021-02-12 09:50:36.0 -0700
+++ golang-go.opencensus-0.24.0/examples/derived_gauges/derived_gauge.go	2022-11-03 14:13:50.0 -0600
@@ -20,7 +20,7 @@
 // items. Consumer randomly consumes 1-5 items in each attempt. It then sleeps randomly
 // between 1-10 seconds before the next attempt. Two metrics collected to monitor the queue.
 

Bug#1033411: marked as done (unblock: libdatetime-timezone-perl/1:2.59-1+2023b)

2023-03-24 Thread Debian Bug Tracking System
Your message dated Fri, 24 Mar 2023 21:30:30 +
with message-id 
and subject line unblock libdatetime-timezone-perl
has caused the Debian Bug report #1033411,
regarding unblock: libdatetime-timezone-perl/1:2.59-1+2023b
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033411: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033411
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: libdatetime-timezone-p...@packages.debian.org, 
debian-p...@lists.debian.org
Control: affects -1 + src:libdatetime-timezone-perl

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Please unblock package libdatetime-timezone-perl:

I've uploaded libdatetime-timezone-perl/1:2.59-1+2023b to unstable.
This is the new upstream release which contains the contents of the
Olson DB version 2023b.

tzdata changes:

2023a
Egypt now uses DST again, from April through October.
This year Morocco springs forward April 23, not April 30.
Palestine delays the start of DST this year.
Much of Greenland still uses DST from 2024 on.

2023b
Lebanon delays the start of DST this year.


The upload does not contain any other relevant changes (neither
upstream nor in packaging).

Tests during build and autopkgtest pass, no other observations …

I'm attaching a manually stripped down debdiff against 1:2.56-1+2022g
in testing.

unblock libdatetime-timezone-perl/1:2.59-1+2023b


Thanks in advance,
gregor

-BEGIN PGP SIGNATURE-
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=rndO
-END PGP SIGNATURE-
diff -Nru libdatetime-timezone-perl-2.56/Changes 
libdatetime-timezone-perl-2.59/Changes
--- libdatetime-timezone-perl-2.56/Changes  2022-10-29 05:14:21.0 
+0200
+++ libdatetime-timezone-perl-2.59/Changes  2023-03-24 05:36:13.0 
+0100
@@ -1,3 +1,21 @@
+2.592023-03-23
+
+- This release is based on version 2023b of the Olson database. This release
+  includes contemporary changes for Lebanon.
+
+
+2.582023-03-22
+
+- This release is based on version 2023a of the Olson database. This release
+  includes contemporary changes for Egypt, Greenland, Morocco, and Palestine.
+
+
+2.572022-12-13
+
+- This release is based on version 2022g of the Olson database. This release
+  includes contemporary changes for Greenland and Mexico.
+
+
 2.562022-10-28
 
 - This release is based on version 2022f of the Olson database. This release
diff -Nru libdatetime-timezone-perl-2.56/LICENSE 
libdatetime-timezone-perl-2.59/LICENSE
--- libdatetime-timezone-perl-2.56/LICENSE  2022-10-29 05:14:21.0 
+0200
+++ libdatetime-timezone-perl-2.59/LICENSE  2023-03-24 05:36:13.0 
+0100
@@ -1,4 +1,4 @@
-This software is copyright (c) 2022 by Dave Rolsky.
+This software is copyright (c) 2023 by Dave Rolsky.
 
 This is free software; you can redistribute it and/or modify it under
 the same terms as the Perl 5 programming language system itself.
@@ -12,7 +12,7 @@
 
 --- The GNU General Public License, Version 1, February 1989 ---
 
-This software is Copyright (c) 2022 by Dave Rolsky.
+This software is Copyright (c) 2023 by Dave Rolsky.
 
 This is free software, licensed under:
 
@@ -272,7 +272,7 @@
 
 --- The Artistic License 1.0 ---
 
-This software is Copyright (c) 2022 by Dave Rolsky.
+This software is Copyright (c) 2023 by Dave Rolsky.
 
 This is free software, licensed under:
 
diff -Nru libdatetime-timezone-perl-2.56/MANIFEST 
libdatetime-timezone-perl-2.59/MANIFEST
diff -Nru libdatetime-timezone-perl-2.56/debian/changelog 
libdatetime-timezone-perl-2.59/debian/changelog
--- libdatetime-timezone-perl-2.56/debian/changelog   

Processed: unblock: golang-go.opencensus/0.24.0-1

2023-03-24 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:golang-go.opencensus
Bug #1033442 [release.debian.org] unblock: golang-go.opencensus/0.24.0-1
Added indication that 1033442 affects src:golang-go.opencensus

-- 
1033442: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033442
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033442: unblock: golang-go.opencensus/0.24.0-1

2023-03-24 Thread Anthony Fok
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: golang-go.opencen...@packages.debian.org, 
debian...@lists.debian.org, f...@debian.org
Control: affects -1 + src:golang-go.opencensus

Please unblock package golang-go.opencensus/0.24.0-1

packer/1.6.6+ds1-7 in testing has an RC bug (#1032525) and is scheduled
for autoremoval on 2023-04-06.  The fix was uploaded by its maintainer
Shengjing Zhu in packer/1.6.6+ds2-1 on 2023-03-13, but it is currently
prevented from migrating to testing to due to being blocked by its
indirect dependency on golang-go.opencensus.

My apologies for my untimely upload of golang-go.opencensus/0.24.0-1
on 2023-03-09, assuming that it would enter testing automatically
after 20 days, not knowing that it is a key package that would require
a manual unblock.

Risks of upgrading from 0.23.0 to 0.24.0 is minimal, as the changes
consist of minor bug fixes with a small addition to the API.
ratt finds 89 packages with direct or indirect dependency on
golang-go.opencensus and is able to build all of them with
with golang-go.opencensus/0.24.0-1 smoothly with no hiccup.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock golang-go.opencensus/0.24.0-1

Thanks for your help!

Cheers,

Anthony Fok



Bug#1033439: pre-unblock: monitoring-plugins/2.3.3-5

2023-03-24 Thread Jan Wagner

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: pkg-nagios-de...@lists.alioth.debian.org
Control: affects -1 + src:monitoring-plugins

Please see these changes for monitoring-plugins. 2.3.3-4 is already 
uploaded into unstable (containing one fix from upstream) but is blocked 
due missing autopkgtests. I prepared another upload containing two fixes 
from upstream, which is not uploaded yet.


[ Reason ]
This release targets several fixes that should go into bookworm:

* [953ee52] Adding d/p/13_check_icmp_improvements from upstream
* [6fb8e25] Adding d/p/14_check_curl_fix_SSL_with_multiple_IPs from upstream
* [eab1e1d] Adding d/p/15_check_swap_remove_includes from upstream

[ Impact ]
Included patches fixes regressions from latest upstream release.

[ Tests ]
Upstream testsuite passes as well as Salsa CI 
(https://salsa.debian.org/nagios-team/monitoring-plugins/-/pipelines/514242) 
tests (ignoring the blhc).


[ Risks ]
The code changes are trivial enough to not expect regressions.

[ Checklist ]
 [x] all changes are documented in the d/changelog
 [x] I reviewed all changes and I approve them
 [x] attach debdiff against the package in testing

[ Other info ]

unblock monitoring-plugins/2.3.3-5diff --git a/debian/changelog b/debian/changelog
index caf2e31..c738c88 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,16 @@
+monitoring-plugins (2.3.3-5) unstable; urgency=medium
+
+  * [6fb8e25] Adding d/p/14_check_curl_fix_SSL_with_multiple_IPs from upstream
+  * [eab1e1d] Adding d/p/15_check_swap_remove_includes from upstream
+
+ -- Jan Wagner   Fri, 24 Mar 2023 19:16:16 +
+
+monitoring-plugins (2.3.3-4) unstable; urgency=medium
+
+  * [953ee52] Adding d/p/13_check_icmp_improvements from upstream
+
+ -- Jan Wagner   Tue, 07 Mar 2023 13:29:35 +
+
 monitoring-plugins (2.3.3-3) unstable; urgency=medium
 
   * [15d0c56] Adding d/p/12_check_curl_improvements from upstream
diff --git a/debian/patches/13_check_icmp_improvements b/debian/patches/13_check_icmp_improvements
new file mode 100644
index 000..0eb2748
--- /dev/null
+++ b/debian/patches/13_check_icmp_improvements
@@ -0,0 +1,200 @@
+From 413af1955538b06803458c628099f1ba9da1966b Mon Sep 17 00:00:00 2001
+From: RincewindsHat <12514511+rincewinds...@users.noreply.github.com>
+Date: Fri, 4 Nov 2022 16:51:32 +0100
+Subject: [PATCH 1/5] Remove trailing whitespaces
+
+---
+ plugins-root/check_icmp.c | 24 
+ 1 file changed, 12 insertions(+), 12 deletions(-)
+
+diff --git a/plugins-root/check_icmp.c b/plugins-root/check_icmp.c
+index f8f153512..abd88c4e7 100644
+--- a/plugins-root/check_icmp.c
 b/plugins-root/check_icmp.c
+@@ -1,39 +1,39 @@
+ /*
+-* 
++*
+ * Monitoring check_icmp plugin
+-* 
++*
+ * License: GPL
+ * Copyright (c) 2005-2008 Monitoring Plugins Development Team
+ * Original Author : Andreas Ericsson 
+-* 
++*
+ * Description:
+-* 
++*
+ * This file contains the check_icmp plugin
+-* 
++*
+ * Relevant RFC's: 792 (ICMP), 791 (IP)
+-* 
++*
+ * This program was modeled somewhat after the check_icmp program,
+ * which was in turn a hack of fping (www.fping.org) but has been
+ * completely rewritten since to generate higher precision rta values,
+ * and support several different modes as well as setting ttl to control.
+ * redundant routes. The only remainders of fping is currently a few
+ * function names.
+-* 
+-* 
++*
++*
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+-* 
++*
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+-* 
++*
+ * You should have received a copy of the GNU General Public License
+ * along with this program.  If not, see .
+-* 
+-* 
++*
++*
+ */
+ 
+ /* progname may change */
+
+From 7d074091dba8c1d4081971bf62e694d0b1a03d41 Mon Sep 17 00:00:00 2001
+From: RincewindsHat <12514511+rincewinds...@users.noreply.github.com>
+Date: Fri, 4 Nov 2022 16:53:57 +0100
+Subject: [PATCH 2/5] Remove hardcoded DBL_MAX definition
+
+---
+ plugins-root/check_icmp.c | 4 
+ 1 file changed, 4 deletions(-)
+
+diff --git a/plugins-root/check_icmp.c b/plugins-root/check_icmp.c
+index abd88c4e7..0d10d22db 100644
+--- a/plugins-root/check_icmp.c
 b/plugins-root/check_icmp.c
+@@ -95,10 +95,6 @@ const char *email = "de...@monitoring-plugins.org";
+ # define ICMP_UNREACH_PRECEDENCE_CUTOFF 15
+ #endif
+ 
+-#ifndef DBL_MAX
+-# define DBL_MAX 

Processed: pre-unblock: monitoring-plugins/2.3.3-5

2023-03-24 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:monitoring-plugins
Bug #1033439 [release.debian.org] pre-unblock: monitoring-plugins/2.3.3-5
Added indication that 1033439 affects src:monitoring-plugins

-- 
1033439: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033439
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033416: marked as done (unblock: fakeroot/1.31-1.2)

2023-03-24 Thread Debian Bug Tracking System
Your message dated Fri, 24 Mar 2023 17:59:28 +
with message-id 
and subject line unblock fakeroot
has caused the Debian Bug report #1033416,
regarding unblock: fakeroot/1.31-1.2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033416: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033416
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: faker...@packages.debian.org
Control: affects -1 + src:fakeroot

Please unblock package fakeroot

(Please provide enough (but not too much) information to help
the release team to judge the request efficiently. E.g. by
filling in the sections below.)

[ Reason ]
Updated Portuguese and German man page translations.

There is no code change at all. All autopkgtest keep on passing.

[ Impact ]
German and Portuguese users will have a partial english man page.

[ Tests ]
Fakeroot uses autopkgtest. However, the man page generation is not
under test. I looked at the German man pages. Also lintian performs 
some checks on man pages.

[ Risks ]
I don't know any. The exact same code is already in Testing/bookworm.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]
The man page translations were outdated. Initially I added them in
early January with the maintainer approval, however, in subsequent
uploads the update somehow got lost. So they were already in Sid for ~
1 month without any problem.


unblock fakeroot/1.31-1.2

-- 
  Dr. Helge Kreutzmann deb...@helgefjell.de
   Dipl.-Phys.   http://www.helgefjell.de/debian.php
64bit GNU powered gpg signed mail preferred
   Help keep free software "libre": http://www.ffii.de/
diff -Nru fakeroot-1.31/debian/changelog fakeroot-1.31/debian/changelog
--- fakeroot-1.31/debian/changelog  2023-03-02 07:44:38.0 +0100
+++ fakeroot-1.31/debian/changelog  2023-03-18 10:22:00.0 +0100
@@ -1,3 +1,14 @@
+fakeroot (1.31-1.2) unstable; urgency=medium
+
+  * Non-maintainer upload with maintainer approval.
+  * Update manpage translation
+- German translation.
+  Thanks Erik Pfannenstein (Closes: #977854)
+- Portuguese translation.
+  Thanks Américo Monteiro (Closes: #1000794)
+
+ -- Helge Kreutzmann   Sat, 18 Mar 2023 10:22:00 +0100
+
 fakeroot (1.31-1.1) unstable; urgency=medium
 
   * Non-maintainer upload
diff -Nru fakeroot-1.31/debian/patches/man_de.patch 
fakeroot-1.31/debian/patches/man_de.patch
--- fakeroot-1.31/debian/patches/man_de.patch   1970-01-01 01:00:00.0 
+0100
+++ fakeroot-1.31/debian/patches/man_de.patch   2023-03-18 10:22:00.0 
+0100
@@ -0,0 +1,419 @@
+Subject: German translation for the manpage (po4a)
+Author: Pfannenstein Erik 
+Date: 2020-12-21
+Bug-Debian: https://bugs.debian.org/977854
+Forwarded: No
+
+I have updated the German translation of fakeroot's manpage.
+Please include it into the package as you see fit.
+
+--- a/doc/po4a/po/de.po
 b/doc/po4a/po/de.po
+@@ -3,20 +3,22 @@
+ #   2009 Regis Duchesne.
+ # This file is distributed under the same license as the fakeroot package.
+ # Copyright (C) of this file 2011 Chris Leick.
++# Copyright (C) of this file 2020 Erik Pfannenstein.
+ #
+ msgid ""
+ msgstr ""
+ "Project-Id-Version: fakeroot 1.18.1-1\n"
+ "Report-Msgid-Bugs-To: faker...@packages.debian.org\n"
+ "POT-Creation-Date: 2020-09-22 16:23-0400\n"
+-"PO-Revision-Date: 2011-10-18 23:27+0200\n"
+-"Last-Translator: Chris Leick \n"
++"PO-Revision-Date: 2020-10-06 01:14+0200\n"
++"Last-Translator: Erik Pfannnenstein \n"
+ "Language-Team: German \n"
+ "Language: de\n"
+ "MIME-Version: 1.0\n"
+ "Content-Type: text/plain; charset=UTF-8\n"
+ "Content-Transfer-Encoding: 8bit\n"
+ "Plural-Forms: nplurals=2; plural=(n != 1);\n"
++"X-Generator: Poedit 2.4.1\n"
+ 
+ # type: TH
+ #. type: TH
+@@ -29,7 +31,7 @@
+ #: ../doc/fakeroot.1:16
+ #, no-wrap
+ msgid "5 October 2014"
+-msgstr ""
++msgstr "5. Oktober 2014"
+ 
+ # type: TH
+ #. type: TH
+@@ -46,8 +48,8 @@
+ msgstr "Debian-Handbuch"
+ 
+ # type: SH
+-#.  Manpage by J.H.M. Dassen 
+-#.  and Clint Adams
++#. Manpage by J.H.M. Dassen 
++#. and Clint Adams
+ #. type: SH
+ #: ../doc/fakeroot.1:19 ../doc/faked.1:19
+ #, no-wrap
+@@ -62,7 +64,7 @@
+ "manipulation"
+ msgstr ""
+ "fakeroot - einen Befehl zur Dateimanipulation in einer Umgebung mit "

Bug#1033401: unblock: src:dino-im/0.4.2-1

2023-03-24 Thread Sebastian Ramacher
Control: tags -1 moreinfo

On 2023-03-24 12:45:41 +, Martin wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> 
> Dear release team,
> 
> I like to get clearance for uploading dino-im 0.4.2 to unstable, to get
> it into bookworm.

Please go ahead and let us know once the package is available in
unstable.

Cheers

> 
> Upstream release text:
> 
> > Maintenance release with fix for CVE-2023-28686 and bug fixes.
> 
> There are eight commits, from which five should definitively go into
> bookworm (1, 2, 6, 7, 8). Two commits are not related to a bug report,
> but solve relevant problems (3, 4). Only one is not relevant at all, but
> it does not touch file we care about anyway (5).
> 
> There are no new features nor unnecessary changes, so I would very much
> prefer to get the new version in instead of adding five to seven
> patches.
> 
> Here is a description of the commits between 0.4.1 (now in testing) and
> 0.4.2 (to be uploaded):
> 
> 1. acf9c694 * Fix C binding for gst_video_frame_get_data
> Fix for: GTK4 - crash when answering video call #1267
> > Fix C binding for gst_video_frame_get_data
> https://github.com/dino/dino/issues/1267
> 
> 2. 89b9110f * Improve history sync
> Fix for: MUC MAM (0313) doesn't work #1386
> > - Ensure we fully fetch desired history if possible (previously, duplicates
> >   from offline message queue could hinder MAM sync)
> > - Early drop illegal MAM messages so they don't pile up in the pending queue
> >   waiting for their query to end (which it never will if they were not
> >   requested in first place).
> https://github.com/dino/dino/issues/1386
> 
> 3. 481a68fd * Improve database performance while reconnecting and syncing
> > Improve database performance while reconnecting and syncing
> > Also move some tasks to low priority idle queue so they won't block UI 
> > updates
> No bug report, but solves startup time issues some users reported.
> 
> 4. 1738bf8d * data: Set StartupNotify to true in .desktop file
> > data: Set StartupNotify to true in .desktop file
> > GTK handles startup notifications, so advertise it in desktop
> > file. This allows splash screens and other startup indications
> > in DEs to work.
> No bug report, but sounds like an issue worth solving.
> 
> 5. b6f9b54d * Remove gspell
> (not relevant to Debian: unused cmake/FindGspell.cmake removed, change
> in github ci file)
> 
> 6. 00482404 * Fix a crash if a message subnode is not found in a carbon
> Fix for: A carbon crashes Dino #1392
> > Fix a crash if a message subnode is not found in a carbon
> https://github.com/dino/dino/issues/1392
> 
> 7. 179c766d * Bind soup session lifetime to File provider/sender lifetime
> Fix for: Dino crashes when sending or receiving files #1395 
> > Bind soup session lifetime to File provider/sender lifetime
> > Required since libsoup 3.4. Fixes #1395
> https://github.com/dino/dino/issues/1395
> 
> 8. baf96d9d * @ v0.4.2 origin/v0.4 Check sender of bookmark:1 updates
> Fix for: dino-im: Insufficient message sender validation in Dino 
> CVE-2023-28686
> > Check sender of bookmark:1 updates
> https://bugs.debian.org/1033370
> 
> Thanks in advance for your comments and decision!
> 
> Cheers
> 
> unblock src:dino-im/0.4.2-1
> 

> diff -Nru dino-im-0.4.1/.github/workflows/build.yml 
> dino-im-0.4.2/.github/workflows/build.yml
> --- dino-im-0.4.1/.github/workflows/build.yml 2023-03-01 23:30:00.0 
> +
> +++ dino-im-0.4.2/.github/workflows/build.yml 2023-03-23 18:00:00.0 
> +
> @@ -7,7 +7,7 @@
>- uses: actions/checkout@v2
>- run: sudo apt-get update
>- run: sudo apt-get remove libunwind-14-dev
> -  - run: sudo apt-get install -y build-essential gettext cmake valac 
> libgee-0.8-dev libsqlite3-dev libgtk-4-dev libnotify-dev libgpgme-dev 
> libsoup2.4-dev libgcrypt20-dev libqrencode-dev libgspell-1-dev libnice-dev 
> libgstreamer1.0-dev libgstreamer-plugins-base1.0-dev libsrtp2-dev 
> libwebrtc-audio-processing-dev libadwaita-1-dev
> +  - run: sudo apt-get install -y build-essential gettext cmake valac 
> libgee-0.8-dev libsqlite3-dev libgtk-4-dev libnotify-dev libgpgme-dev 
> libsoup2.4-dev libgcrypt20-dev libqrencode-dev libnice-dev 
> libgstreamer1.0-dev libgstreamer-plugins-base1.0-dev libsrtp2-dev 
> libwebrtc-audio-processing-dev libadwaita-1-dev
>- run: ./configure --with-tests --with-libsignal-in-tree
>- run: make
>- run: build/xmpp-vala-test
> diff -Nru dino-im-0.4.1/VERSION dino-im-0.4.2/VERSION
> --- dino-im-0.4.1/VERSION 2023-03-01 23:30:00.0 +
> +++ dino-im-0.4.2/VERSION 2023-03-23 18:00:00.0 +
> @@ -1 +1 @@
> -RELEASE 0.4.1
> +RELEASE 0.4.2
> diff -Nru dino-im-0.4.1/cmake/FindGspell.cmake 
> dino-im-0.4.2/cmake/FindGspell.cmake
> --- dino-im-0.4.1/cmake/FindGspell.cmake  2023-03-01 23:30:00.0 
> +
> +++ dino-im-0.4.2/cmake/FindGspell.cmake  1970-01-01 

Processed: Re: Bug#1033401: unblock: src:dino-im/0.4.2-1

2023-03-24 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 moreinfo
Bug #1033401 [release.debian.org] unblock: src:dino-im/0.4.2-1
Added tag(s) moreinfo.

-- 
1033401: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033401
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#1033399: pre-approve unblock: tryton-server/6.0.29-2

2023-03-24 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 moreinfo
Bug #1033399 [release.debian.org] pre-approve unblock: tryton-server/6.0.29-2
Added tag(s) moreinfo.

-- 
1033399: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033399
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033399: pre-approve unblock: tryton-server/6.0.29-2

2023-03-24 Thread Sebastian Ramacher
Control: tags -1 moreinfo

Hi Mathias

On 2023-03-24 13:07:57 +0100, Mathias Behrle wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: tryton-ser...@packages.debian.org
> Control: affects -1 + src:tryton-server
> 
> Please pre-approve the unblock of package tryton-server

Please go ahead and let us know once the package is available in
unstable.

Cheers

> 
> [ Reason ]
> This release targets several fixes that should go into bookworm:
> 
>   * Add missing quotes in maintainer scripts (Closes: #1033055).
>   * Make conf file parsing section aware (Closes: #1033055).
>   * Correct a variable typo (Closes: #1033055).
>   * Remove lsb-base from Depends.
> 
> 
> [ Impact ]
> There can be errors when using spaces or something alike in the debconf 
> related
> questions.
> 
> [ Tests ]
> Salsa CI tests are passing
> https://salsa.debian.org/tryton-team/tryton-server/-/pipelines/513249
> as well as all build tests.
> 
> I did a full manual test over all packages.
> 
> 
> [ Risks ]
> 
> The code changes are trivial enough to not expect regressions.
> 
> [ Checklist ]
>   [x] all changes are documented in the d/changelog
>   [x] I reviewed all changes and I approve them
>   [x] attach debdiff against the package in testing
> 
> 
> unblock tryton-server/6.0.29-2
> 
> 
> 
> -- 
> 
> Mathias Behrle
> PGP/GnuPG key availabable from any keyserver, ID: 0xD6D09BE48405BBF6
> AC29 7E5C 46B9 D0B6 1C71  7681 D6D0 9BE4 8405 BBF6



-- 
Sebastian Ramacher



Bug#1033203: marked as done (unblock: fuse3/3.14.0-3)

2023-03-24 Thread Debian Bug Tracking System
Your message dated Fri, 24 Mar 2023 17:55:07 +
with message-id 
and subject line unblock fuse3
has caused the Debian Bug report #1033203,
regarding unblock: fuse3/3.14.0-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033203: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033203
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: Cyril Brulebois 
Control: affects -1 + src:fuse3

Hi RMs,

[ Reason ]
The self-testing of fuse3 only works on little-endian machines. I've
already disabled it on big-endian release architectures. Missed hppa
which is not added to the list.
Compiling examples didn't work due to outdated Makefile and using an
outdated header name in one of the files.

[ Impact ]
With the changes fuse3 is compiled on hppa now. As the installer needs
its udeb it can be created on that architecture as well from now on.
One of the example files was patched to use the current header file
name and now compiles with all of the other example files.

[ Tests ]
I've tested the examples compilation and those are OK now. Compilation
on hppa is now working as can be seen in the buildd logs [1].

[ Risks ]
None of the changes affect the working of the package itself.
As fuse3 has an udeb I put kibi to the loop if extra ACK is needed.

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

unblock fuse3/3.14.0-3

Thanks for considering,
Laszlo/GCS
[1] https://buildd.debian.org/status/logs.php?pkg=fuse3=hppa
diff -Nru fuse3-3.14.0/debian/changelog fuse3-3.14.0/debian/changelog
--- fuse3-3.14.0/debian/changelog	2023-02-18 07:22:30.0 +0100
+++ fuse3-3.14.0/debian/changelog	2023-03-17 20:51:05.0 +0100
@@ -1,3 +1,15 @@
+fuse3 (3.14.0-3) unstable; urgency=medium
+
+  [ Helge Deller  ]
+  * Add the big-endian hppa platform to the disabled self-testing list
+(closes: #1032187).
+
+  [ Laszlo Boszormenyi (GCS) ]
+  * Update fuse header name in examples.
+  * Fix Makefile for examples (closes: #1031544).
+
+ -- Laszlo Boszormenyi (GCS)   Fri, 17 Mar 2023 20:51:05 +0100
+
 fuse3 (3.14.0-2) unstable; urgency=medium
 
   * Revert upgrade of fuse_kernel.h for not being upstreamed yet
diff -Nru fuse3-3.14.0/debian/examples/Makefile fuse3-3.14.0/debian/examples/Makefile
--- fuse3-3.14.0/debian/examples/Makefile	2014-06-20 08:23:50.0 +0200
+++ fuse3-3.14.0/debian/examples/Makefile	2023-03-17 20:51:05.0 +0100
@@ -1,12 +1,16 @@
-CFLAGS := -Wall $(shell pkg-config fuse --cflags)
-LDFLAGS := $(shell pkg-config fuse --libs)
+CFLAGS := -Wall $(shell pkg-config fuse3 --cflags)
+LDFLAGS := $(shell pkg-config fuse3 --libs)
 
-targets = fusexmp fusexmp_fh hello hello_ll null
+targets = cuse cuse_client hello hello_ll \
+  invalidate_path ioctl ioctl_client \
+  notify_inval_entry notify_inval_inode notify_store_retrieve \
+  null passthrough passthrough_fh passthrough_ll \
+  poll poll_client printcap
 
-all: $(targets)
+%: %.c
+	$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
 
-fusexmp_fh: fusexmp_fh.c
-	$(CC) $(CFLAGS) $(LDFLAGS) -lulockmgr $< -o $@
+all: $(targets)
 
 clean:
 	rm -f *.o
diff -Nru fuse3-3.14.0/debian/patches/series fuse3-3.14.0/debian/patches/series
--- fuse3-3.14.0/debian/patches/series	2023-02-18 07:22:30.0 +0100
+++ fuse3-3.14.0/debian/patches/series	2023-03-17 20:51:05.0 +0100
@@ -1 +1,2 @@
 revert_upgrade_of_fuse_kernel.h.patch
+update_header_name.patch
diff -Nru fuse3-3.14.0/debian/patches/update_header_name.patch fuse3-3.14.0/debian/patches/update_header_name.patch
--- fuse3-3.14.0/debian/patches/update_header_name.patch	1970-01-01 01:00:00.0 +0100
+++ fuse3-3.14.0/debian/patches/update_header_name.patch	2023-03-17 20:51:05.0 +0100
@@ -0,0 +1,21 @@
+Description: use new header name of fuse
+ Just rename fuse_config.h to libfuse_config.h
+Author: Laszlo Boszormenyi (GCS) 
+Bug-Debian: https://bugs.debian.org/1031544
+Forwarded: no
+Last-Update: 2023-03-17
+
+---
+
+
+--- fuse3-3.14.0.orig/example/poll_client.c
 fuse3-3.14.0/example/poll_client.c
+@@ -19,7 +19,7 @@
+  * \include poll_client.c
+  */
+ 
+-#include 
++#include 
+ 
+ #include 
+ #include 
diff -Nru fuse3-3.14.0/debian/rules fuse3-3.14.0/debian/rules
--- fuse3-3.14.0/debian/rules	2023-01-22 08:17:08.0 +0100
+++ fuse3-3.14.0/debian/rules	2023-03-17 20:51:05.0 +0100
@@ -54,7 +54,7 @@
 
 

Bug#1033203: unblock: fuse3/3.14.0-3

2023-03-24 Thread Sebastian Ramacher
On 2023-03-19 17:22:21 +0100, László Böszörményi wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: Cyril Brulebois 
> Control: affects -1 + src:fuse3
> 
> Hi RMs,
> 
> [ Reason ]
> The self-testing of fuse3 only works on little-endian machines. I've
> already disabled it on big-endian release architectures. Missed hppa
> which is not added to the list.
> Compiling examples didn't work due to outdated Makefile and using an
> outdated header name in one of the files.
> 
> [ Impact ]
> With the changes fuse3 is compiled on hppa now. As the installer needs
> its udeb it can be created on that architecture as well from now on.
> One of the example files was patched to use the current header file
> name and now compiles with all of the other example files.

hppa is not a release architecture, so that wouldn't count as a
targetted fix. But since it comes with a documentation fix, I'll unblock
it.

Cheers

> 
> [ Tests ]
> I've tested the examples compilation and those are OK now. Compilation
> on hppa is now working as can be seen in the buildd logs [1].
> 
> [ Risks ]
> None of the changes affect the working of the package itself.
> As fuse3 has an udeb I put kibi to the loop if extra ACK is needed.
> 
> [ Checklist ]
>   [X] all changes are documented in the d/changelog
>   [X] I reviewed all changes and I approve them
>   [X] attach debdiff against the package in testing
> 
> unblock fuse3/3.14.0-3
> 
> Thanks for considering,
> Laszlo/GCS
> [1] https://buildd.debian.org/status/logs.php?pkg=fuse3=hppa

> diff -Nru fuse3-3.14.0/debian/changelog fuse3-3.14.0/debian/changelog
> --- fuse3-3.14.0/debian/changelog 2023-02-18 07:22:30.0 +0100
> +++ fuse3-3.14.0/debian/changelog 2023-03-17 20:51:05.0 +0100
> @@ -1,3 +1,15 @@
> +fuse3 (3.14.0-3) unstable; urgency=medium
> +
> +  [ Helge Deller  ]
> +  * Add the big-endian hppa platform to the disabled self-testing list
> +(closes: #1032187).
> +
> +  [ Laszlo Boszormenyi (GCS) ]
> +  * Update fuse header name in examples.
> +  * Fix Makefile for examples (closes: #1031544).
> +
> + -- Laszlo Boszormenyi (GCS)   Fri, 17 Mar 2023 20:51:05 
> +0100
> +
>  fuse3 (3.14.0-2) unstable; urgency=medium
>  
>* Revert upgrade of fuse_kernel.h for not being upstreamed yet
> diff -Nru fuse3-3.14.0/debian/examples/Makefile 
> fuse3-3.14.0/debian/examples/Makefile
> --- fuse3-3.14.0/debian/examples/Makefile 2014-06-20 08:23:50.0 
> +0200
> +++ fuse3-3.14.0/debian/examples/Makefile 2023-03-17 20:51:05.0 
> +0100
> @@ -1,12 +1,16 @@
> -CFLAGS := -Wall $(shell pkg-config fuse --cflags)
> -LDFLAGS := $(shell pkg-config fuse --libs)
> +CFLAGS := -Wall $(shell pkg-config fuse3 --cflags)
> +LDFLAGS := $(shell pkg-config fuse3 --libs)
>  
> -targets = fusexmp fusexmp_fh hello hello_ll null
> +targets = cuse cuse_client hello hello_ll \
> +  invalidate_path ioctl ioctl_client \
> +  notify_inval_entry notify_inval_inode notify_store_retrieve \
> +  null passthrough passthrough_fh passthrough_ll \
> +  poll poll_client printcap
>  
> -all: $(targets)
> +%: %.c
> + $(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
>  
> -fusexmp_fh: fusexmp_fh.c
> - $(CC) $(CFLAGS) $(LDFLAGS) -lulockmgr $< -o $@
> +all: $(targets)
>  
>  clean:
>   rm -f *.o
> diff -Nru fuse3-3.14.0/debian/patches/series 
> fuse3-3.14.0/debian/patches/series
> --- fuse3-3.14.0/debian/patches/series2023-02-18 07:22:30.0 
> +0100
> +++ fuse3-3.14.0/debian/patches/series2023-03-17 20:51:05.0 
> +0100
> @@ -1 +1,2 @@
>  revert_upgrade_of_fuse_kernel.h.patch
> +update_header_name.patch
> diff -Nru fuse3-3.14.0/debian/patches/update_header_name.patch 
> fuse3-3.14.0/debian/patches/update_header_name.patch
> --- fuse3-3.14.0/debian/patches/update_header_name.patch  1970-01-01 
> 01:00:00.0 +0100
> +++ fuse3-3.14.0/debian/patches/update_header_name.patch  2023-03-17 
> 20:51:05.0 +0100
> @@ -0,0 +1,21 @@
> +Description: use new header name of fuse
> + Just rename fuse_config.h to libfuse_config.h
> +Author: Laszlo Boszormenyi (GCS) 
> +Bug-Debian: https://bugs.debian.org/1031544
> +Forwarded: no
> +Last-Update: 2023-03-17
> +
> +---
> +
> +
> +--- fuse3-3.14.0.orig/example/poll_client.c
>  fuse3-3.14.0/example/poll_client.c
> +@@ -19,7 +19,7 @@
> +  * \include poll_client.c
> +  */
> + 
> +-#include 
> ++#include 
> + 
> + #include 
> + #include 
> diff -Nru fuse3-3.14.0/debian/rules fuse3-3.14.0/debian/rules
> --- fuse3-3.14.0/debian/rules 2023-01-22 08:17:08.0 +0100
> +++ fuse3-3.14.0/debian/rules 2023-03-17 20:51:05.0 +0100
> @@ -54,7 +54,7 @@
>  
>  override_dh_auto_test:
>  ifeq (,$(findstring nocheck,$(DEB_BUILD_OPTIONS)))
> -ifeq (,$(findstring $(DEB_BUILD_ARCH),powerpc ppc64 sparc64 s390x))
> +ifeq (,$(findstring $(DEB_BUILD_ARCH),powerpc ppc64 sparc64 s390x hppa))
>   

Bug#1033374: pre-unblock: ruby-rack/2.2.6.4-1

2023-03-24 Thread Sebastian Ramacher
Control: tags -1 moreinfo

On 2023-03-24 01:50:25 +0530, Pirate Praveen wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: ruby-r...@packages.debian.org
> Control: affects -1 + src:ruby-rack
> 
> Please see these changes for ruby-rack (I have not uploaded yet) is ok.

Please go ahead and let us know once the package is available in
unstable.

Cheers

> 
> [ Reason ]
> It fixes two CVEs (though it includes some other bug fixes too)
> 
> [ Impact ]
> Some of the changes included in this release are already included in the
> debian package as patches, this just reduces maintenance effort.
> 
> [ Tests ]
> Upstream testsuite passes, gitlab is already using the 2.2.6.4 version.
> 
> [ Risks ]
> If this is not unblocked, two CVEs would have to be backported to 2.2.4
> 
> 
> [ Checklist ]
>  [x] all changes are documented in the d/changelog
>  [x] I reviewed all changes and I approve them
>  [x] attach debdiff against the package in testing
> 
> [ Other info ]
> 
> unblock ruby-rack/2.2.6.4-1
> 
> 
> diff -Nru ruby-rack-2.2.4/CHANGELOG.md ruby-rack-2.2.6.4/CHANGELOG.md
> --- ruby-rack-2.2.4/CHANGELOG.md  2022-07-01 03:48:29.0 +0530
> +++ ruby-rack-2.2.6.4/CHANGELOG.md2023-03-13 23:37:51.0 +0530
> @@ -2,6 +2,33 @@
>  
>  All notable changes to this project will be documented in this file. For 
> info on how to format all future additions to this file please reference 
> [Keep A Changelog](https://keepachangelog.com/en/1.0.0/).
>  
> +## [2.2.6.4] - 2023-03-13
> +
> +- [CVE-2023-27539] Avoid ReDoS in header parsing
> +
> +## [2.2.6.3] - 2023-03-02
> +
> +- [CVE-2023-27530] Introduce multipart_total_part_limit to limit total parts
> +
> +## [2.2.6.2] - 2022-01-17
> +
> +- [CVE-2022-44570] Fix ReDoS in Rack::Utils.get_byte_ranges
> +
> +## [2.2.6.1] - 2022-01-17
> +
> +- [CVE-2022-44571] Fix ReDoS vulnerability in multipart parser
> +- [CVE-2022-44572] Forbid control characters in attributes (also ReDoS)
> +
> +## [2.2.6] - 2022-01-17
> +
> +- Extend `Rack::MethodOverride` to handle `QueryParser::ParamsTooDeepError` 
> error. ([#2011](https://github.com/rack/rack/pull/2011), 
> [@byroot](https://github.com/byroot))
> +
> +## [2.2.5] - 2022-12-27
> +
> +### Fixed
> +
> +- `Rack::URLMap` uses non-deprecated form of `Regexp.new`. 
> ([#1998](https://github.com/rack/rack/pull/1998), 
> [@weizheheng](https://github.com/weizheheng))
> +
>  ## [2.2.4] - 2022-06-30
>  
>  - Better support for lower case headers in `Rack::ETag` middleware. 
> ([#1919](https://github.com/rack/rack/pull/1919), 
> [@ioquatix](https://github.com/ioquatix))
> diff -Nru ruby-rack-2.2.4/debian/changelog ruby-rack-2.2.6.4/debian/changelog
> --- ruby-rack-2.2.4/debian/changelog  2023-02-09 16:17:17.0 +0530
> +++ ruby-rack-2.2.6.4/debian/changelog2023-03-24 01:32:43.0 
> +0530
> @@ -1,3 +1,10 @@
> +ruby-rack (2.2.6.4-1) unstable; urgency=medium
> +
> +  * Team Upload
> +  * New upstream version 2.2.6.4 (Fixes: CVE-2023-27530, CVE-2023-27539)
> +
> + -- Pirate Praveen   Fri, 24 Mar 2023 01:32:43 +0530
> +
>  ruby-rack (2.2.4-3) unstable; urgency=high
>  
>* Team upload
> diff -Nru 
> ruby-rack-2.2.4/debian/patches/Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch 
> ruby-rack-2.2.6.4/debian/patches/Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch
> --- 
> ruby-rack-2.2.4/debian/patches/Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch  
> 2023-02-09 16:17:17.0 +0530
> +++ 
> ruby-rack-2.2.6.4/debian/patches/Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch
> 1970-01-01 05:30:00.0 +0530
> @@ -1,26 +0,0 @@
>  a/lib/rack/utils.rb
> -+++ b/lib/rack/utils.rb
> -@@ -348,17 +348,18 @@
> -   return nil unless http_range && http_range =~ /bytes=([^;]+)/
> -   ranges = []
> -   $1.split(/,\s*/).each do |range_spec|
> --return nil  unless range_spec =~ /(\d*)-(\d*)/
> --r0, r1 = $1, $2
> --if r0.empty?
> --  return nil  if r1.empty?
> -+return nil unless range_spec.include?('-')
> -+range = range_spec.split('-')
> -+r0, r1 = range[0], range[1]
> -+if r0.nil? || r0.empty?
> -+  return nil if r1.nil?
> -   # suffix-byte-range-spec, represents trailing suffix of file
> -   r0 = size - r1.to_i
> -   r0 = 0  if r0 < 0
> -   r1 = size - 1
> - else
> -   r0 = r0.to_i
> --  if r1.empty?
> -+  if r1.nil?
> - r1 = size - 1
> -   else
> - r1 = r1.to_i
> diff -Nru 
> ruby-rack-2.2.4/debian/patches/Fix-ReDoS-vulnerability-in-multipart-parser.patch
>  
> ruby-rack-2.2.6.4/debian/patches/Fix-ReDoS-vulnerability-in-multipart-parser.patch
> --- 
> ruby-rack-2.2.4/debian/patches/Fix-ReDoS-vulnerability-in-multipart-parser.patch
>   2023-02-09 16:17:17.0 +0530
> +++ 
> 

Processed: Re: Bug#1033374: pre-unblock: ruby-rack/2.2.6.4-1

2023-03-24 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 moreinfo
Bug #1033374 [release.debian.org] pre-unblock: ruby-rack/2.2.6.4-1
Added tag(s) moreinfo.

-- 
1033374: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033374
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033416: unblock: fakeroot/1.31-1.2

2023-03-24 Thread Helge Kreutzmann
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: faker...@packages.debian.org
Control: affects -1 + src:fakeroot

Please unblock package fakeroot

(Please provide enough (but not too much) information to help
the release team to judge the request efficiently. E.g. by
filling in the sections below.)

[ Reason ]
Updated Portuguese and German man page translations.

There is no code change at all. All autopkgtest keep on passing.

[ Impact ]
German and Portuguese users will have a partial english man page.

[ Tests ]
Fakeroot uses autopkgtest. However, the man page generation is not
under test. I looked at the German man pages. Also lintian performs 
some checks on man pages.

[ Risks ]
I don't know any. The exact same code is already in Testing/bookworm.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]
The man page translations were outdated. Initially I added them in
early January with the maintainer approval, however, in subsequent
uploads the update somehow got lost. So they were already in Sid for ~
1 month without any problem.


unblock fakeroot/1.31-1.2

-- 
  Dr. Helge Kreutzmann deb...@helgefjell.de
   Dipl.-Phys.   http://www.helgefjell.de/debian.php
64bit GNU powered gpg signed mail preferred
   Help keep free software "libre": http://www.ffii.de/
diff -Nru fakeroot-1.31/debian/changelog fakeroot-1.31/debian/changelog
--- fakeroot-1.31/debian/changelog  2023-03-02 07:44:38.0 +0100
+++ fakeroot-1.31/debian/changelog  2023-03-18 10:22:00.0 +0100
@@ -1,3 +1,14 @@
+fakeroot (1.31-1.2) unstable; urgency=medium
+
+  * Non-maintainer upload with maintainer approval.
+  * Update manpage translation
+- German translation.
+  Thanks Erik Pfannenstein (Closes: #977854)
+- Portuguese translation.
+  Thanks Américo Monteiro (Closes: #1000794)
+
+ -- Helge Kreutzmann   Sat, 18 Mar 2023 10:22:00 +0100
+
 fakeroot (1.31-1.1) unstable; urgency=medium
 
   * Non-maintainer upload
diff -Nru fakeroot-1.31/debian/patches/man_de.patch 
fakeroot-1.31/debian/patches/man_de.patch
--- fakeroot-1.31/debian/patches/man_de.patch   1970-01-01 01:00:00.0 
+0100
+++ fakeroot-1.31/debian/patches/man_de.patch   2023-03-18 10:22:00.0 
+0100
@@ -0,0 +1,419 @@
+Subject: German translation for the manpage (po4a)
+Author: Pfannenstein Erik 
+Date: 2020-12-21
+Bug-Debian: https://bugs.debian.org/977854
+Forwarded: No
+
+I have updated the German translation of fakeroot's manpage.
+Please include it into the package as you see fit.
+
+--- a/doc/po4a/po/de.po
 b/doc/po4a/po/de.po
+@@ -3,20 +3,22 @@
+ #   2009 Regis Duchesne.
+ # This file is distributed under the same license as the fakeroot package.
+ # Copyright (C) of this file 2011 Chris Leick.
++# Copyright (C) of this file 2020 Erik Pfannenstein.
+ #
+ msgid ""
+ msgstr ""
+ "Project-Id-Version: fakeroot 1.18.1-1\n"
+ "Report-Msgid-Bugs-To: faker...@packages.debian.org\n"
+ "POT-Creation-Date: 2020-09-22 16:23-0400\n"
+-"PO-Revision-Date: 2011-10-18 23:27+0200\n"
+-"Last-Translator: Chris Leick \n"
++"PO-Revision-Date: 2020-10-06 01:14+0200\n"
++"Last-Translator: Erik Pfannnenstein \n"
+ "Language-Team: German \n"
+ "Language: de\n"
+ "MIME-Version: 1.0\n"
+ "Content-Type: text/plain; charset=UTF-8\n"
+ "Content-Transfer-Encoding: 8bit\n"
+ "Plural-Forms: nplurals=2; plural=(n != 1);\n"
++"X-Generator: Poedit 2.4.1\n"
+ 
+ # type: TH
+ #. type: TH
+@@ -29,7 +31,7 @@
+ #: ../doc/fakeroot.1:16
+ #, no-wrap
+ msgid "5 October 2014"
+-msgstr ""
++msgstr "5. Oktober 2014"
+ 
+ # type: TH
+ #. type: TH
+@@ -46,8 +48,8 @@
+ msgstr "Debian-Handbuch"
+ 
+ # type: SH
+-#.  Manpage by J.H.M. Dassen 
+-#.  and Clint Adams
++#. Manpage by J.H.M. Dassen 
++#. and Clint Adams
+ #. type: SH
+ #: ../doc/fakeroot.1:19 ../doc/faked.1:19
+ #, no-wrap
+@@ -62,7 +64,7 @@
+ "manipulation"
+ msgstr ""
+ "fakeroot - einen Befehl zur Dateimanipulation in einer Umgebung mit "
+-"gefälschten Root-Rechten ausführen"
++"fingierten Root-Rechten ausführen"
+ 
+ # type: SH
+ #. type: SH
+@@ -80,7 +82,7 @@
+ "fd-base ]> B<[-h|--help ]> B<[-v|--version ]> B<[--]> B<[command]>"
+ msgstr ""
+ "B B<[-l|--lib> I B<[--faked> "
+-"IB<]> B<[-i> IB<]> B<[-s> "
++"IB<]> B<[-i> IB<]> B<[-s> "
+ "IB<]> B<[-u|--unknown-is-real ]> B<[-b|--fd-base ]> "
+ "B<[-h|--help ]> B<[-v|--version ]> B<[--]> B<[Befehl]>"
+ 
+@@ -104,24 +106,17 @@
+ "construct the archives directly, without using the archiver."
+ msgstr ""
+ "B führt einen Befehl in einer Umgebung aus, in der es scheint, als 
"
+-"habe er Root-Rechte zur Dateimanipulation. Dies ist nützlich, um Benutzern "
+-"zu erlauben Archive (tar, ar, .deb etc.) mit Dateien darin zu erstellen, die 
"
+-"Root-Rechte 

Processed: unblock: fakeroot/1.31-1.2

2023-03-24 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:fakeroot
Bug #1033416 [release.debian.org] unblock: fakeroot/1.31-1.2
Added indication that 1033416 affects src:fakeroot

-- 
1033416: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033416
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033412: bullseye-pu: package libdatetime-timezone-perl/1:2.47-1+2023b

2023-03-24 Thread gregor herrmann
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: libdatetime-timezone-p...@packages.debian.org, 
debian-p...@lists.debian.org
Control: affects -1 + src:libdatetime-timezone-perl

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

I've uploaded libdatetime-timezone-perl/1:2.47-1+2023b to bullseye,
with the changes from the Olson db 2023b release included as a new
quilt patch.


tzdata changes:

2023a:
Egypt now uses DST again, from April through October.
This year Morocco springs forward April 23, not April 30.
Palestine delays the start of DST this year.
Much of Greenland still uses DST from 2024 on.

2023b:
Lebanon delays the start of DST this year.


Manually stripped down debdiff attached.


Thanks in advacne,
gregor

-BEGIN PGP SIGNATURE-

iQKTBAEBCgB9FiEE0eExbpOnYKgQTYX6uzpoAYZJqgYFAmQdzJxfFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEQx
RTEzMTZFOTNBNzYwQTgxMDREODVGQUJCM0E2ODAxODY0OUFBMDYACgkQuzpoAYZJ
qgbX8xAAwcp/vWGgjoaZg/Z8nvkRaaGcheJh5ZjQAz5bV7Qdq0NIINPzFVI+qQ3f
bXPUfTxjYRuYln7defgYxpeFkze30temxzLmhZxFq65BlR3ELqnrNTo95FSfA+lR
S5loojeFgTO3ZSMU/1KcjawF4G6jLXqPef4cO/7IC66OY32Z3JbWpK86KyJImO3D
/dohaZ3NFhvTZPWbkQGePFTCQEk0yOtvs7PwIcH3chXhVbeIWxxF9H96QuOQZk/z
5kcQBljccNSh0b5B0yuXhcUTn6o/MR/lmr8luJgTZNbe+p79cnwyzssNJLrAX6OK
rUNBIkfZypZ1kanuR+ZqbWjO3sv/hcHLXrad5A1Ldd1l7QnX7wFHXiyaBjvBmhtB
XFd/1ZzRC1S6P8Co0+3fOaylziGFL4vkZ89JO4//MZfr76iPxodSisQlP9aW4cPI
r9rn7BuQKbTzcdoZW8Oeui2nwgv/gXfBxIaLeAtQE1vsrgTi8wa2/cBb+IlNyeSR
XCwIMx6FReZ1qp2Q+C8iMmeKRv+w2judEOmXglyt538J4l7juIhjv2mVCZRah7rQ
5ZI/nZws8PhGxR622Q/P7VwC/wfkjeCVNXWoGICoqByZ0OHtFhF2FX1/Dc+s+XqN
AYo2er4wwv2rmbf5zygNY/CigSgWI4fp9ydfmqV2mFW9HmzOmDA=
=hp+9
-END PGP SIGNATURE-
diff -Nru libdatetime-timezone-perl-2.47/debian/changelog 
libdatetime-timezone-perl-2.47/debian/changelog
--- libdatetime-timezone-perl-2.47/debian/changelog 2022-11-30 
18:14:07.0 +0100
+++ libdatetime-timezone-perl-2.47/debian/changelog 2023-03-24 
16:58:22.0 +0100
@@ -1,3 +1,11 @@
+libdatetime-timezone-perl (1:2.47-1+2023b) bullseye; urgency=medium
+
+  * Update data to Olson database version 2023b.
+This update contains contemporary changes for Egypt, Greenland, Morocco,
+and Palestine (2023a), and for Lebanon (2023b).
+
+ -- gregor herrmann   Fri, 24 Mar 2023 16:58:22 +0100
+
 libdatetime-timezone-perl (1:2.47-1+2022g) bullseye; urgency=medium
 
   * Update data to Olson database version 2022g.
diff -Nru libdatetime-timezone-perl-2.47/debian/patches/olson-2023b 
libdatetime-timezone-perl-2.47/debian/patches/olson-2023b
--- libdatetime-timezone-perl-2.47/debian/patches/olson-2023b   1970-01-01 
01:00:00.0 +0100
+++ libdatetime-timezone-perl-2.47/debian/patches/olson-2023b   2023-03-24 
16:58:22.0 +0100
@@ -0,0 +1,16906 @@
+Description: Update to Olson DB 2023b
+Origin: vendor
+Author: gregor herrmann 
+Last-Update: 2023-03-24
+
+--- a/lib/DateTime/TimeZone/Africa/Abidjan.pm
 b/lib/DateTime/TimeZone/Africa/Abidjan.pm
+@@ -3,7 +3,7 @@
+ # DateTime::TimeZone module distribution in the tools/ directory
+ 
+ #
+-# Generated from debian/tzdata/africa.  Olson data version 2022g
++# Generated from debian/tzdata/africa.  Olson data version 2023b
+ #
+ # Do not edit this file directly.
+ #
+@@ -43,11 +43,11 @@
+ ],
+ ];
+ 
+-sub olson_version {'2022g'}
++sub olson_version {'2023b'}
+ 
+ sub has_dst_changes {0}
+ 
+-sub _max_year {2032}
++sub _max_year {2033}
+ 
+ sub _new_instance {
+ return shift->_init( @_, spans => $spans );
+--- a/lib/DateTime/TimeZone/Asia/Beirut.pm
 b/lib/DateTime/TimeZone/Asia/Beirut.pm
+@@ -3,7 +3,7 @@
+ # DateTime::TimeZone module distribution in the tools/ directory
+ 
+ #
+-# Generated from debian/tzdata/asia.  Olson data version 2022g
++# Generated from debian/tzdata/asia.  Olson data version 2023b
+ #
+ # Do not edit this file directly.
+ #
+@@ -1024,17 +1024,17 @@
+ ],
+ [
+ 63802760400, #utc_start 2022-10-29 21:00:00 (Sat)
+-63815464800, #  utc_end 2023-03-25 22:00:00 (Sat)
++63817711200, #  utc_end 2023-04-20 22:00:00 (Thu)
+ 63802767600, #  local_start 2022-10-29 23:00:00 (Sat)
+-63815472000, #local_end 2023-03-26 00:00:00 (Sun)
++63817718400, #local_end 2023-04-21 00:00:00 (Fri)
+ 7200,
+ 0,
+ 'EET',
+ ],
+ [
+-63815464800, #utc_start 2023-03-25 22:00:00 (Sat)
++63817711200, #utc_start 2023-04-20 22:00:00 (Thu)
+ 6383421, #  utc_end 2023-10-28 21:00:00 (Sat)
+-63815475600, #  local_start 2023-03-26 01:00:00 (Sun)
++63817722000, #  local_start 2023-04-21 01:00:00 (Fri)
+ 63834220800, #local_end 2023-10-29 00:00:00 (Sun)
+ 10800,
+ 1,
+@@ -1220,13 +1220,31 @@
+ 1,
+ 'EEST',
+ ],
++[
++64149915600, #utc_start 2033-10-29 21:00:00 (Sat)
++6416262, #  utc_end 2034-03-25 22:00:00 (Sat)
++64149922800, #  local_start 2033-10-29 23:00:00 (Sat)
++64162627200, #local_end 2034-03-26 

Processed: bullseye-pu: package libdatetime-timezone-perl/1:2.47-1+2023b

2023-03-24 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:libdatetime-timezone-perl
Bug #1033412 [release.debian.org] bullseye-pu: package 
libdatetime-timezone-perl/1:2.47-1+2023b
Added indication that 1033412 affects src:libdatetime-timezone-perl

-- 
1033412: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033412
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033411: unblock: libdatetime-timezone-perl/1:2.59-1+2023b

2023-03-24 Thread gregor herrmann
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: libdatetime-timezone-p...@packages.debian.org, 
debian-p...@lists.debian.org
Control: affects -1 + src:libdatetime-timezone-perl

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Please unblock package libdatetime-timezone-perl:

I've uploaded libdatetime-timezone-perl/1:2.59-1+2023b to unstable.
This is the new upstream release which contains the contents of the
Olson DB version 2023b.

tzdata changes:

2023a
Egypt now uses DST again, from April through October.
This year Morocco springs forward April 23, not April 30.
Palestine delays the start of DST this year.
Much of Greenland still uses DST from 2024 on.

2023b
Lebanon delays the start of DST this year.


The upload does not contain any other relevant changes (neither
upstream nor in packaging).

Tests during build and autopkgtest pass, no other observations …

I'm attaching a manually stripped down debdiff against 1:2.56-1+2022g
in testing.

unblock libdatetime-timezone-perl/1:2.59-1+2023b


Thanks in advance,
gregor

-BEGIN PGP SIGNATURE-
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=rndO
-END PGP SIGNATURE-
diff -Nru libdatetime-timezone-perl-2.56/Changes 
libdatetime-timezone-perl-2.59/Changes
--- libdatetime-timezone-perl-2.56/Changes  2022-10-29 05:14:21.0 
+0200
+++ libdatetime-timezone-perl-2.59/Changes  2023-03-24 05:36:13.0 
+0100
@@ -1,3 +1,21 @@
+2.592023-03-23
+
+- This release is based on version 2023b of the Olson database. This release
+  includes contemporary changes for Lebanon.
+
+
+2.582023-03-22
+
+- This release is based on version 2023a of the Olson database. This release
+  includes contemporary changes for Egypt, Greenland, Morocco, and Palestine.
+
+
+2.572022-12-13
+
+- This release is based on version 2022g of the Olson database. This release
+  includes contemporary changes for Greenland and Mexico.
+
+
 2.562022-10-28
 
 - This release is based on version 2022f of the Olson database. This release
diff -Nru libdatetime-timezone-perl-2.56/LICENSE 
libdatetime-timezone-perl-2.59/LICENSE
--- libdatetime-timezone-perl-2.56/LICENSE  2022-10-29 05:14:21.0 
+0200
+++ libdatetime-timezone-perl-2.59/LICENSE  2023-03-24 05:36:13.0 
+0100
@@ -1,4 +1,4 @@
-This software is copyright (c) 2022 by Dave Rolsky.
+This software is copyright (c) 2023 by Dave Rolsky.
 
 This is free software; you can redistribute it and/or modify it under
 the same terms as the Perl 5 programming language system itself.
@@ -12,7 +12,7 @@
 
 --- The GNU General Public License, Version 1, February 1989 ---
 
-This software is Copyright (c) 2022 by Dave Rolsky.
+This software is Copyright (c) 2023 by Dave Rolsky.
 
 This is free software, licensed under:
 
@@ -272,7 +272,7 @@
 
 --- The Artistic License 1.0 ---
 
-This software is Copyright (c) 2022 by Dave Rolsky.
+This software is Copyright (c) 2023 by Dave Rolsky.
 
 This is free software, licensed under:
 
diff -Nru libdatetime-timezone-perl-2.56/MANIFEST 
libdatetime-timezone-perl-2.59/MANIFEST
diff -Nru libdatetime-timezone-perl-2.56/debian/changelog 
libdatetime-timezone-perl-2.59/debian/changelog
--- libdatetime-timezone-perl-2.56/debian/changelog 2022-11-30 
18:03:44.0 +0100
+++ libdatetime-timezone-perl-2.59/debian/changelog 2023-03-24 
16:38:06.0 +0100
@@ -1,3 +1,20 @@
+libdatetime-timezone-perl (1:2.59-1+2023b) unstable; urgency=medium
+
+  * Import upstream version 2.59.
+The 2.57 release was based on version 2022g of the Olson database.
+It includes contemporary changes for Greenland and Mexico (already
+present in 1:2.56-1+2022g).
+The 2.58 release was based on version 2023a of the Olson database.
+It includes contemporary changes for Egypt, Greenland, Morocco, and
+Palestine.
+This release (2.59) is based on version 2023b of the Olson database.
+It includes contemporary changes for Lebanon.
+  * Drop debian/patches/olson-2022g. Version 2022g was included in 2.57.
+  * Update years of 

Processed: unblock: libdatetime-timezone-perl/1:2.59-1+2023b

2023-03-24 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:libdatetime-timezone-perl
Bug #1033411 [release.debian.org] unblock: 
libdatetime-timezone-perl/1:2.59-1+2023b
Added indication that 1033411 affects src:libdatetime-timezone-perl

-- 
1033411: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033411
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Re: Bug#1031695: dh_installsystemd doesn't handle files in /usr/lib/systemd/system

2023-03-24 Thread Niels Thykier

Sebastian Ramacher:

[...]

Any progress here? If this issue should be fixed for bookworm, time is
running short.

Cheers


I find that anytime I look at this bug my motivation to work on Debian 
instantly vanishes. In fact, I cannot even motivate myself to read the 
bug log to figure out what the consensus is. Accordingly, I will play 
the constitution 2.1.1 and step out of the way.


If there are any recent debhelper contributors that want to claim this, 
then I will give preference to them and how they want to handle it.


Otherwise, if no debhelper contributor steps up, then I will waive the 
NMU process on this side of the release on the debhelper package to 
anyone, who ones to pick this up. Please keep the following in mind:


 1) Be adviced that you need to look at multiple helpers that interact
with the systemd services.  Notably, dh_installsystemd,
dh_installsystemduser and dh_installinit - all of which assumes
there is one and only one directly for these services.  Good luck

 2) I would that you push the changes to the salsa repo (it is
DD-writable by default, others will have to do a PR) but a nmudiff
CC'ed to this bug on top of the main branch in salsa will do.
- Please use the main branch, there are some translation changes
  since last upload, which should be a non-issue.
- If you are a DD, just push the changes to main and move on. Do not
  expect me to review a PR before you upload.

 3) I expect that you upload and handle any fall out. Fall out here
includes judging consensus, fix FTBFS, RC bugs or deal with
discussions including the tech-ctte or the release team about the
proposed solution, managing the unblock request (etc.).
- Assume I will not be involved in any of these steps.

 3) If you do change any translatable strings, please consider to notify
the translators.  At least pt and de translators recently updated
and I feel it would be a shame if they were not 100%. But not enough
that I expect I will invest in a follow up upload.

My apologies to the release team. Having been on the release team, I 
know this is probably not the message you wanted this close to the 
release. Sadly, it is the "best" I can do.


With that said and done, as far as bug is concerned, I am out!

Best regards,
Niels




Bug#1033409: marked as done (nmu: dbgsym packages affected by fakeroot bug)

2023-03-24 Thread Debian Bug Tracking System
Your message dated Fri, 24 Mar 2023 16:26:12 +0100
with message-id 
and subject line Re: Bug#1033409: nmu: dbgsym packages affected by fakeroot bug
has caused the Debian Bug report #1033409,
regarding nmu: dbgsym packages affected by fakeroot bug
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033409: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033409
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
X-Debbugs-Cc: debhel...@packages.debian.org, hel...@subdivi.de

Hi,

I propose the following series of NMUs to close #1024261.  The list is 
based on the set of packages that Helmut found with this script with the 
following modifications:


 * binNMU version have been removed
 * architecture has been removed. I assume we will do ANY binNMUs for
   them to avoid M-A:same issues and it is easier to overshoot than
   clean out the packages that are not M-A:same

This would solve the dbgsym problems caused by fakeroot.  For the 
changelog entry, allegedly fakeroot fixed the problem by now and we can 
reference that. Alternatively, debhelper has worked around the fakeroot 
problem as well in 13.11.


This does not solve the non-dbgsym packages but at least we get the ball 
rolling on the part of the problem we have clearly identified and would 
enable us to close #1024261.


Best regards,
Nielsacm-dbgsym_6.0+20200416-1.1
alure-utils-dbgsym_1.2-9
ann-tools-dbgsym_1.1.2+doc-9
aprsdigi-dbgsym_3.10.0-5
argus-client-dbgsym_1:3.0.8.2-6.1
audacious-plugins-dbgsym_4.2-1
ax25mail-utils-dbgsym_0.15-1
colobot-dbgsym_0.2.0-2
connman-dbgsym_1.41-2
connman-vpn-dbgsym_1.41-2
conntrackd-dbgsym_1:1.4.7-1
conserver-server-dbgsym_8.2.7-2
courier-authdaemon-dbgsym_0.71.4-1
courier-authlib-dbgsym_0.71.4-1
courier-authlib-userdb-dbgsym_0.71.4-1
courier-base-dbgsym_1.0.16-3
courier-imap-dbgsym_5.0.13+1.0.16-3
courier-mlm-dbgsym_1.0.16-3
courier-mta-dbgsym_1.0.16-3
courier-pop-dbgsym_1.0.16-3
cutils-dbgsym_1.6-6
dablin-dbgsym_1.14.0-2
dolphin-owncloud-dbgsym_2.11.0.8354+dfsg-1
dvb-tools-dbgsym_1.22.1-5
fastforward-dbgsym_1:0.51-8
fido2-tools-dbgsym_1.12.0-2
freeipmi-ipmidetect-dbgsym_1.6.10-1
freeipmi-tools-dbgsym_1.6.10-1
fuse-dbgsym_2.9.9-6
geomview-dbgsym_1.9.5-4
giggle-dbgsym_0.7-5
globus-gatekeeper-dbgsym_11.4-2
gnome-applets-dbgsym_3.46.0-1
gnome-keyring-dbgsym_42.1-1
gnome-panel-dbgsym_3.46.0-1
gpsshogi-dbgsym_0.7.0-3.1
gspell-1-tests-dbgsym_1.12.0-1
gtklp-dbgsym_1.3.4-3
harp-dbgsym_1.16-1
hashcat-dbgsym_6.2.6+ds1-1
herbstluftwm-dbgsym_0.9.5-3
ibus-kkc-dbgsym_1.5.22-3
ibus-skk-dbgsym_1.4.3-2
ifcico-dbgsym_2.14tx8.10-27
ifgate-dbgsym_2.14tx8.10-27
invada-studio-plugins-ladspa-dbgsym_0.3.1-6
ipe-dbgsym_7.2.26+dfsg1-3
kbd-dbgsym_2.5.1-1
knockd-dbgsym_0.8-2
krb5-admin-server-dbgsym_1.20.1-1
krb5-auth-dialog-dbgsym_43.0-1
krb5-gss-samples-dbgsym_1.20.1-1
krb5-kdc-dbgsym_1.20.1-1
krb5-kdc-ldap-dbgsym_1.20.1-1
krb5-user-dbgsym_1.20.1-1
kup-backup-dbgsym_0.9.1-1
kyotocabinet-utils-dbgsym_1.2.79-2
lcdproc-dbgsym_0.5.9-6
lcdproc-extra-drivers-dbgsym_0.5.9-6
libbabl-0.1-0-dbgsym_1:0.1.98-1
libcoarrays-mpich-dev-dbgsym_2.10.1-1
libcoarrays-openmpi-dev-dbgsym_2.10.1-1
libdb1-compat-dbgsym_2.1.3-22
libdrm-tests-dbgsym_2.4.114-1
libfuse2-dbgsym_2.9.9-6
libiec61883-dev-dbgsym_1.2.0-6
libipe7.2.26-dbgsym_7.2.26+dfsg1-3
libkim-api2-dbgsym_2.3.0-1
libkim-api-dev-dbgsym_2.3.0-1
libleatherman1.12.1-dbgsym_1.12.1+dfsg-1.2
libopenmesh1-dbgsym_9.0-4
libopenmesh-apps-dbgsym_9.0-4
libopenmpi3-dbgsym_4.1.4-3
libopenms2.6.0-dbgsym_2.6.0+cleaned1-3
libowncloudsync0-dbgsym_2.11.0.8354+dfsg-1
libpdl-linearalgebra-perl-dbgsym_0.35-1
libplib1-dbgsym_1.8.5-14
libpmix2-dbgsym_4.2.2-1
libpmix-bin-dbgsym_4.2.2-1
libruli-bin-dbgsym_0.36-3
libsuperlu-dist8-dbgsym_8.1.2+dfsg1-1
libsuperlu-dist-dev-dbgsym_8.1.2+dfsg1-1
libtheora0-dbgsym_1.1.1+dfsg.1-16.1
libtheora-bin-dbgsym_1.1.1+dfsg.1-16.1
libv4l-0-dbgsym_1.22.1-5
libv4lconvert0-dbgsym_1.22.1-5
libxtrxll0-dbgsym_0.0.1+git20201202.1b6eddf-1
linuxptp-dbgsym_3.1.1-4
lldpd-dbgsym_1.0.16-1
login-dbgsym_1:4.13+dfsg1-1
lua-readline-dbgsym_3.2-1
lua-socket-dbgsym_3.1.0-1
miredo-dbgsym_1.2.6-7.1
mutt-dbgsym_2.2.9-1
myproxy-admin-dbgsym_6.2.14-2
myproxy-dbgsym_6.2.14-2
ndisc6-dbgsym_1.0.5-1
nethack-common-dbgsym_3.6.6-3
ntfs-3g-dbgsym_1:2022.10.3-1
ntfs-3g-dev-dbgsym_1:2022.10.3-1
oddjob-dbgsym_0.34.7-1
oddjob-mkhomedir-dbgsym_0.34.7-1
odr-dabmux-dbgsym_4.2.1-1
openmpi-bin-dbgsym_4.1.4-3
opensmtpd-dbgsym_6.8.0p2-4
orthanc-postgresql-dbgsym_4.0-7
osdsh-dbgsym_0.7.0-11

Bug#1033409: nmu: dbgsym packages affected by fakeroot bug

2023-03-24 Thread Niels Thykier

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
X-Debbugs-Cc: debhel...@packages.debian.org, hel...@subdivi.de

Hi,

I propose the following series of NMUs to close #1024261.  The list is 
based on the set of packages that Helmut found with this script with the 
following modifications:


 * binNMU version have been removed
 * architecture has been removed. I assume we will do ANY binNMUs for
   them to avoid M-A:same issues and it is easier to overshoot than
   clean out the packages that are not M-A:same

This would solve the dbgsym problems caused by fakeroot.  For the 
changelog entry, allegedly fakeroot fixed the problem by now and we can 
reference that. Alternatively, debhelper has worked around the fakeroot 
problem as well in 13.11.


This does not solve the non-dbgsym packages but at least we get the ball 
rolling on the part of the problem we have clearly identified and would 
enable us to close #1024261.


Best regards,
Nielsacm-dbgsym_6.0+20200416-1.1
alure-utils-dbgsym_1.2-9
ann-tools-dbgsym_1.1.2+doc-9
aprsdigi-dbgsym_3.10.0-5
argus-client-dbgsym_1:3.0.8.2-6.1
audacious-plugins-dbgsym_4.2-1
ax25mail-utils-dbgsym_0.15-1
colobot-dbgsym_0.2.0-2
connman-dbgsym_1.41-2
connman-vpn-dbgsym_1.41-2
conntrackd-dbgsym_1:1.4.7-1
conserver-server-dbgsym_8.2.7-2
courier-authdaemon-dbgsym_0.71.4-1
courier-authlib-dbgsym_0.71.4-1
courier-authlib-userdb-dbgsym_0.71.4-1
courier-base-dbgsym_1.0.16-3
courier-imap-dbgsym_5.0.13+1.0.16-3
courier-mlm-dbgsym_1.0.16-3
courier-mta-dbgsym_1.0.16-3
courier-pop-dbgsym_1.0.16-3
cutils-dbgsym_1.6-6
dablin-dbgsym_1.14.0-2
dolphin-owncloud-dbgsym_2.11.0.8354+dfsg-1
dvb-tools-dbgsym_1.22.1-5
fastforward-dbgsym_1:0.51-8
fido2-tools-dbgsym_1.12.0-2
freeipmi-ipmidetect-dbgsym_1.6.10-1
freeipmi-tools-dbgsym_1.6.10-1
fuse-dbgsym_2.9.9-6
geomview-dbgsym_1.9.5-4
giggle-dbgsym_0.7-5
globus-gatekeeper-dbgsym_11.4-2
gnome-applets-dbgsym_3.46.0-1
gnome-keyring-dbgsym_42.1-1
gnome-panel-dbgsym_3.46.0-1
gpsshogi-dbgsym_0.7.0-3.1
gspell-1-tests-dbgsym_1.12.0-1
gtklp-dbgsym_1.3.4-3
harp-dbgsym_1.16-1
hashcat-dbgsym_6.2.6+ds1-1
herbstluftwm-dbgsym_0.9.5-3
ibus-kkc-dbgsym_1.5.22-3
ibus-skk-dbgsym_1.4.3-2
ifcico-dbgsym_2.14tx8.10-27
ifgate-dbgsym_2.14tx8.10-27
invada-studio-plugins-ladspa-dbgsym_0.3.1-6
ipe-dbgsym_7.2.26+dfsg1-3
kbd-dbgsym_2.5.1-1
knockd-dbgsym_0.8-2
krb5-admin-server-dbgsym_1.20.1-1
krb5-auth-dialog-dbgsym_43.0-1
krb5-gss-samples-dbgsym_1.20.1-1
krb5-kdc-dbgsym_1.20.1-1
krb5-kdc-ldap-dbgsym_1.20.1-1
krb5-user-dbgsym_1.20.1-1
kup-backup-dbgsym_0.9.1-1
kyotocabinet-utils-dbgsym_1.2.79-2
lcdproc-dbgsym_0.5.9-6
lcdproc-extra-drivers-dbgsym_0.5.9-6
libbabl-0.1-0-dbgsym_1:0.1.98-1
libcoarrays-mpich-dev-dbgsym_2.10.1-1
libcoarrays-openmpi-dev-dbgsym_2.10.1-1
libdb1-compat-dbgsym_2.1.3-22
libdrm-tests-dbgsym_2.4.114-1
libfuse2-dbgsym_2.9.9-6
libiec61883-dev-dbgsym_1.2.0-6
libipe7.2.26-dbgsym_7.2.26+dfsg1-3
libkim-api2-dbgsym_2.3.0-1
libkim-api-dev-dbgsym_2.3.0-1
libleatherman1.12.1-dbgsym_1.12.1+dfsg-1.2
libopenmesh1-dbgsym_9.0-4
libopenmesh-apps-dbgsym_9.0-4
libopenmpi3-dbgsym_4.1.4-3
libopenms2.6.0-dbgsym_2.6.0+cleaned1-3
libowncloudsync0-dbgsym_2.11.0.8354+dfsg-1
libpdl-linearalgebra-perl-dbgsym_0.35-1
libplib1-dbgsym_1.8.5-14
libpmix2-dbgsym_4.2.2-1
libpmix-bin-dbgsym_4.2.2-1
libruli-bin-dbgsym_0.36-3
libsuperlu-dist8-dbgsym_8.1.2+dfsg1-1
libsuperlu-dist-dev-dbgsym_8.1.2+dfsg1-1
libtheora0-dbgsym_1.1.1+dfsg.1-16.1
libtheora-bin-dbgsym_1.1.1+dfsg.1-16.1
libv4l-0-dbgsym_1.22.1-5
libv4lconvert0-dbgsym_1.22.1-5
libxtrxll0-dbgsym_0.0.1+git20201202.1b6eddf-1
linuxptp-dbgsym_3.1.1-4
lldpd-dbgsym_1.0.16-1
login-dbgsym_1:4.13+dfsg1-1
lua-readline-dbgsym_3.2-1
lua-socket-dbgsym_3.1.0-1
miredo-dbgsym_1.2.6-7.1
mutt-dbgsym_2.2.9-1
myproxy-admin-dbgsym_6.2.14-2
myproxy-dbgsym_6.2.14-2
ndisc6-dbgsym_1.0.5-1
nethack-common-dbgsym_3.6.6-3
ntfs-3g-dbgsym_1:2022.10.3-1
ntfs-3g-dev-dbgsym_1:2022.10.3-1
oddjob-dbgsym_0.34.7-1
oddjob-mkhomedir-dbgsym_0.34.7-1
odr-dabmux-dbgsym_4.2.1-1
openmpi-bin-dbgsym_4.1.4-3
opensmtpd-dbgsym_6.8.0p2-4
orthanc-postgresql-dbgsym_4.0-7
osdsh-dbgsym_0.7.0-11
osmo-bsc-bs11-utils-dbgsym_1.9.0-3
osmo-bsc-ipaccess-utils-dbgsym_1.9.0-3
osmo-bsc-meas-utils-dbgsym_1.9.0-3
osmo-bts-dbgsym_1.5.0+dfsg1-2
osmo-ggsn-dbgsym_1.9.0-3
osmo-hlr-dbgsym_1.5.0+dfsg1-3
passwd-dbgsym_1:4.13+dfsg1-1
pdl-dbgsym_1:2.081-1
perl-tk-dbgsym_1:804.036-1
ploop-dbgsym_1.15-12
pmacct-dbgsym_1.7.7-1
postgresql-15-ogr-fdw-dbgsym_1.1.3-1
qflow-dbgsym_1.3.17+dfsg.1-3
r-cran-zip-dbgsym_2.2.2-1
roger-router-dbgsym_2.4.2-3
rxvt-unicode-dbgsym_9.30-2
scalapack-mpi-test-dbgsym_2.2.1-2
schroot-dbgsym_1.6.13-3
scitokens-cpp-dbgsym_0.7.3-1
shapelib-dbgsym_1.5.0-3
shotwell-dbgsym_0.30.17-1
sndio-tools-dbgsym_1.9.0-0.3
source-highlight-dbgsym_3.1.9-4.2
spice-vdagent-dbgsym_0.22.1-3
squid-dbgsym_5.7-1
squid-openssl-dbgsym_5.7-1
sqwebmail-dbgsym_6.0.5+1.0.16-3
sslh-dbgsym_1.20-1
sysrepo-dbgsym_2.0.53-6
topp-dbgsym_2.6.0+cleaned1-3
torcs-dbgsym_1.3.7+dfsg-5

Re: Bug#1024261: debhelper: dbgsym packages contain directoryr writable by build user

2023-03-24 Thread Niels Thykier

Helmut Grohne:

Hi,



Hi Helmut

Thanks for your work - both on this specific problem and in general!


On Mon, Nov 21, 2022 at 06:08:22PM +0100, Niels Thykier wrote:

Axel Beckert:

Could this be https://bugs.debian.org/1023286 in fakeroot as well as
Niels pointed out in
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024520#37 ?


It is.


So the underlying fakeroot bug has been fixed since. I don't think this
actually is a debhelper bug anymore and suggest to just close it once
the pratical effects have been mitigated.



Indeed, will do with this email.



Helmut and I discussed this on IRC and Helmut's findings is based on that
IRC discussion between him and I in relation to #1023286.  (Which people not
IRC had no chance of knowing, so putting the context here for good measure)


Given that the fakeroot bug has been fixed, I have rerun the dbgsym
importer (now that no new problems can be added). Quite a number of
packages have fixed themselves since the last run. Very few were added.
I'm attaching a list of affected packages in format
"binarypackage_version_architecture". Can I ask the release team to just
binNMU all of them?




For reference, it was not clear to me that the binNMUs proposed have 
been run, so I submitted a formal request to release.debian.org for the 
dbgsym packages you already identified (you should get a bug report 
about that soon).


I chose to use architecture-less binNMU and recommend an "ANY" binNMU to 
avoid M-A:same problems. Feel free to follow up on that bug when you get 
the CC from the BTS if you have any concerns in that regard.



What is a bit unclear to me is whether this is sufficient. We know
-dbgsym packages to be affected (and which), but how about regular
packages? Can they be affected as well?



In theory, yes.  Though I doubt there will be many left that did not 
also build a dbgsym.  My guess is that we are in the 0-5 range now with 
these binNMUs out the door.



If yes, we could download all .debs and record owner/group/mode for each
file after normalizing s,/${DEB_HOST_MULTIARCH}/,/, and highlight all
packages where these aspects vary accross architectures (with the
intuition that 64bit achitectures should generally be right). Does this
make sense? Does this likely encounter issues? Is this approach
exhaustive?



I think it is much more reliable and easier to check the owner / group 
against the /usr/share/base-passwd/{group,passwd}.master files.  For me 
this:


 1) Avoids having to compare a "correct" vs. a "possible faulty"
version, which reduces the amount of packages needed to be scanned.
We can limit ourselves to the 32bit architectures.

 2) Avoids having to do path normalization to detect the problem.

But as mentioned above, I doubt there will many left once the dbgsym 
binNMU run is complete.  So any analysis done now in this space should 
remove duplicates from your previous list.



In any case, binNMUing the packages from the attached list is something
actionable right now. It's just 500 packages on four architectures left.

Helmut


Once again, thanks for your work here.  I passed it on to the release 
managers.


Best regards,
Niels



Re: Clearance for dino-im 0.4.2

2023-03-24 Thread Martin
On 2023-03-24 10:18, Sebastian Ramacher wrote:
> Please file a pre-approval unblock bug report against release.debian.org with 
> a
> proposed debdiff.

Thanks! #1033401

Cheers



Bug#1033404: unblock: debvm/0.2.10

2023-03-24 Thread Helmut Grohne
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: de...@packages.debian.org
Control: affects -1 + src:debvm

Please unblock package debvm

[ Reason ]

debvm is fairly new and was stabilizing right into the freeze. Thus
there are a few late changes that I hope to get into bookworm.

[ Impact ]

There are some notable changes indeed:
 * The biggest chunk of difference is documentation updates in various
   places. In particular, this includes adding examples for usage.
 * The biggest user facing change is the deprecation of the
   --architecture option for debvm-create. I paid attention to not just
   delete it (to avoid breaking things that already use it), but it no
   longer is documented and getting rid of it in bookworm already would
   make phasing it out later easier.
 * The --graphical option to debvm-run is fixed and improved.
 * Support for using 64bit kernels on mipsel.
 * An autopkgtest workaround for kernel bug #1029270 is being deleted.

[ Tests ]

autopkgtests succeed. The reason for the need on an unblock is that I
had to disable 32bit arm, because qemu tcg emulation is too slow to boot
Linux there. Other than that, it would migrate as a non-key package with
autopkgtests. On salsa, more tests are run. I've used the updated
version for quite some time now and not encountered more issues.

[ Risks ]

The affected functionality is not central to debvm or (in case of
--architecture) explicitly kept backwards-compatible. Thus I see little
risk for breakage.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]

There is one possible change missing. Due to the archival of jessie,
using it with debvm now requires passing a mirror. If there is a need
for another update of debvm in bookworm, I intend to piggy-back an
example to the documentation about how to use jessie with
archive.debian.org.

unblock debvm/0.2.10

Thanks in advance

Helmut
diff --git a/README.md b/README.md
index 6fdda9e..1ccda36 100644
--- a/README.md
+++ b/README.md
@@ -77,9 +77,11 @@ The debvm tools are licensed under the MIT license.
 Contributors
 
 
+ * Arnd Bergmann
+ * Gioele Barabucci
  * Helmut Grohne (main author)
- * Johannes Schauer Marin Rodrigues (main author of `mmdebstrap`)
  * Jochen Sprickerhof
+ * Johannes Schauer Marin Rodrigues (main author of `mmdebstrap`)
 
 [^1] This technically is a lie. It employs user namespaces and thus requires
  the setuid binary `newuidmap` as well as a suitable subuid allocation.
diff --git a/bin/debvm-create b/bin/debvm-create
index 89256eb..1c7c29d 100755
--- a/bin/debvm-create
+++ b/bin/debvm-create
@@ -11,7 +11,7 @@ debvm-create - Create a VM image for various Debian releases and architectures
 
 =head1 SYNOPSIS
 
-B [B<-a> I] [B<-h> I] [B<-k> F] [B<-o> F] [B<-r> I] [B<-s> ] [B<-z> I] [B<--> I]
+B [B<-h> I] [B<-k> F] [B<-o> F] [B<-r> I] [B<-s> ] [B<-z> I] [B<--> I]
 
 =head1 DESCRIPTION
 
@@ -26,12 +26,6 @@ No user account is created and root can login without specifying a password.
 
 =over 8
 
-=item B<-a> I, B<--architecture>=I
-
-Specify a Debian architecture name.
-By default, the native architecture is being used.
-A suitable kernel image is automatically selected and installed into the image.
-
 =item B<-h> I, B<--hostname>=I
 
 Set the hostname of the virtual machine.
@@ -131,15 +125,43 @@ All options beyond a double dash are passed to B after the suite and
 This can be used to provide additional hooks for image customization.
 You can also request additional packages to be installed into the image using B's B<--include> option.
 Any positional arguments passed here will be treated as mirror specifications by B.
+In particular, you can also change the architecture of the resulting image using the B<--architecture> option.
 
 =back
 
 =head1 EXAMPLES
 
-In order to create images for Debian ports architectures, you can pass two options to mmdebstrap:
+When creating an image with multiple architectures, the kernel selection will prefer the sibling 64bit architecture.
+
+debvm-create ... -- --architecture=armhf,arm64
+
+In order to create images for Debian ports architectures, you can pass two options to mmdebstrap.
 
 debvm-create ... -- http://deb.debian.org/debian-ports --keyring=/usr/share/keyrings/debian-ports-archive-keyring.gpg
 
+You can also install a graphical desktop environment.
+
+debvm-create ... -- --hook-dir=/usr/share/mmdebstrap/hooks/useradd --aptopt='Apt::Install-Recommends "true"' --include=linux-image-generic,task-gnome-desktop
+
+Here the hook creates a password-less user C.
+In order for C to work reasonably well, C should be enabled.
+By default a C<-cloud> kernel that lacks graphics drivers is installed.
+
+Installing Ubuntu is also supported somewhat.
+
+debvm-create --release kinetic -- 

Processed: unblock: debvm/0.2.10

2023-03-24 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:debvm
Bug #1033404 [release.debian.org] unblock: debvm/0.2.10
Added indication that 1033404 affects src:debvm

-- 
1033404: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033404
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033401: unblock: src:dino-im/0.4.2-1

2023-03-24 Thread Martin
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Dear release team,

I like to get clearance for uploading dino-im 0.4.2 to unstable, to get
it into bookworm.

Upstream release text:

> Maintenance release with fix for CVE-2023-28686 and bug fixes.

There are eight commits, from which five should definitively go into
bookworm (1, 2, 6, 7, 8). Two commits are not related to a bug report,
but solve relevant problems (3, 4). Only one is not relevant at all, but
it does not touch file we care about anyway (5).

There are no new features nor unnecessary changes, so I would very much
prefer to get the new version in instead of adding five to seven
patches.

Here is a description of the commits between 0.4.1 (now in testing) and
0.4.2 (to be uploaded):

1. acf9c694 * Fix C binding for gst_video_frame_get_data
Fix for: GTK4 - crash when answering video call #1267
> Fix C binding for gst_video_frame_get_data
https://github.com/dino/dino/issues/1267

2. 89b9110f * Improve history sync
Fix for: MUC MAM (0313) doesn't work #1386
> - Ensure we fully fetch desired history if possible (previously, duplicates
>   from offline message queue could hinder MAM sync)
> - Early drop illegal MAM messages so they don't pile up in the pending queue
>   waiting for their query to end (which it never will if they were not
>   requested in first place).
https://github.com/dino/dino/issues/1386

3. 481a68fd * Improve database performance while reconnecting and syncing
> Improve database performance while reconnecting and syncing
> Also move some tasks to low priority idle queue so they won't block UI updates
No bug report, but solves startup time issues some users reported.

4. 1738bf8d * data: Set StartupNotify to true in .desktop file
> data: Set StartupNotify to true in .desktop file
> GTK handles startup notifications, so advertise it in desktop
> file. This allows splash screens and other startup indications
> in DEs to work.
No bug report, but sounds like an issue worth solving.

5. b6f9b54d * Remove gspell
(not relevant to Debian: unused cmake/FindGspell.cmake removed, change
in github ci file)

6. 00482404 * Fix a crash if a message subnode is not found in a carbon
Fix for: A carbon crashes Dino #1392
> Fix a crash if a message subnode is not found in a carbon
https://github.com/dino/dino/issues/1392

7. 179c766d * Bind soup session lifetime to File provider/sender lifetime
Fix for: Dino crashes when sending or receiving files #1395 
> Bind soup session lifetime to File provider/sender lifetime
> Required since libsoup 3.4. Fixes #1395
https://github.com/dino/dino/issues/1395

8. baf96d9d * @ v0.4.2 origin/v0.4 Check sender of bookmark:1 updates
Fix for: dino-im: Insufficient message sender validation in Dino CVE-2023-28686
> Check sender of bookmark:1 updates
https://bugs.debian.org/1033370

Thanks in advance for your comments and decision!

Cheers

unblock src:dino-im/0.4.2-1

diff -Nru dino-im-0.4.1/.github/workflows/build.yml dino-im-0.4.2/.github/workflows/build.yml
--- dino-im-0.4.1/.github/workflows/build.yml	2023-03-01 23:30:00.0 +
+++ dino-im-0.4.2/.github/workflows/build.yml	2023-03-23 18:00:00.0 +
@@ -7,7 +7,7 @@
   - uses: actions/checkout@v2
   - run: sudo apt-get update
   - run: sudo apt-get remove libunwind-14-dev
-  - run: sudo apt-get install -y build-essential gettext cmake valac libgee-0.8-dev libsqlite3-dev libgtk-4-dev libnotify-dev libgpgme-dev libsoup2.4-dev libgcrypt20-dev libqrencode-dev libgspell-1-dev libnice-dev libgstreamer1.0-dev libgstreamer-plugins-base1.0-dev libsrtp2-dev libwebrtc-audio-processing-dev libadwaita-1-dev
+  - run: sudo apt-get install -y build-essential gettext cmake valac libgee-0.8-dev libsqlite3-dev libgtk-4-dev libnotify-dev libgpgme-dev libsoup2.4-dev libgcrypt20-dev libqrencode-dev libnice-dev libgstreamer1.0-dev libgstreamer-plugins-base1.0-dev libsrtp2-dev libwebrtc-audio-processing-dev libadwaita-1-dev
   - run: ./configure --with-tests --with-libsignal-in-tree
   - run: make
   - run: build/xmpp-vala-test
diff -Nru dino-im-0.4.1/VERSION dino-im-0.4.2/VERSION
--- dino-im-0.4.1/VERSION	2023-03-01 23:30:00.0 +
+++ dino-im-0.4.2/VERSION	2023-03-23 18:00:00.0 +
@@ -1 +1 @@
-RELEASE 0.4.1
+RELEASE 0.4.2
diff -Nru dino-im-0.4.1/cmake/FindGspell.cmake dino-im-0.4.2/cmake/FindGspell.cmake
--- dino-im-0.4.1/cmake/FindGspell.cmake	2023-03-01 23:30:00.0 +
+++ dino-im-0.4.2/cmake/FindGspell.cmake	1970-01-01 00:00:00.0 +
@@ -1,14 +0,0 @@
-include(PkgConfigWithFallback)
-find_pkg_config_with_fallback(Gspell
-PKG_CONFIG_NAME gspell-1
-LIB_NAMES gspell-1
-INCLUDE_NAMES gspell.h
-INCLUDE_DIR_SUFFIXES gspell-1 gspell-1/gspell
-DEPENDS GTK3
-)
-
-include(FindPackageHandleStandardArgs)
-find_package_handle_standard_args(Gspell
-REQUIRED_VARS Gspell_LIBRARY
-VERSION_VAR Gspell_VERSION)
-
diff -Nru 

Processed: pre-approve unblock: tryton-server/6.0.29-2

2023-03-24 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:tryton-server
Bug #1033399 [release.debian.org] pre-approve unblock: tryton-server/6.0.29-2
Added indication that 1033399 affects src:tryton-server

-- 
1033399: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033399
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033399: pre-approve unblock: tryton-server/6.0.29-2

2023-03-24 Thread Mathias Behrle
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: tryton-ser...@packages.debian.org
Control: affects -1 + src:tryton-server

Please pre-approve the unblock of package tryton-server

[ Reason ]
This release targets several fixes that should go into bookworm:

  * Add missing quotes in maintainer scripts (Closes: #1033055).
  * Make conf file parsing section aware (Closes: #1033055).
  * Correct a variable typo (Closes: #1033055).
  * Remove lsb-base from Depends.


[ Impact ]
There can be errors when using spaces or something alike in the debconf related
questions.

[ Tests ]
Salsa CI tests are passing
https://salsa.debian.org/tryton-team/tryton-server/-/pipelines/513249
as well as all build tests.

I did a full manual test over all packages.


[ Risks ]

The code changes are trivial enough to not expect regressions.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing


unblock tryton-server/6.0.29-2



-- 

Mathias Behrle
PGP/GnuPG key availabable from any keyserver, ID: 0xD6D09BE48405BBF6
AC29 7E5C 46B9 D0B6 1C71  7681 D6D0 9BE4 8405 BBF6


tryton-server_6.0.29_-1_tryton-server_6.0.29-2.debdiff
Description: Binary data


Bug#1033344: unblock: src:texlive-extra/2022.20230122-3

2023-03-24 Thread Preuße

Control: tags -1 - moreinfo

On 24.03.2023 09:26, Sebastian Ramacher wrote:

On 2023-03-22 23:33:28 +0100, Hilmar Preusse wrote:


Hi,


Package: release.debian.org Severity: normal User:
release.debian@packages.debian.org Usertags: unblock

Please unblock package src:texlive-extra. I did not upload the
package to unstable, I'd like to hear your decision beforehand.


The diff looks reasonable. Please let us know once the version is
available in unstable.


Uploaded right now.

Hilmar
--
sigfault



Processed: Re: Bug#1033344: unblock: src:texlive-extra/2022.20230122-3

2023-03-24 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 - moreinfo
Bug #1033344 [release.debian.org] unblock: src:texlive-extra/2022.20230122-3
Removed tag(s) moreinfo.

-- 
1033344: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033344
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Resellers to cooperate

2023-03-24 Thread Oliver Brown
Hi,

I will be happy to talk to the person dealing with sales activities in your 
company.
For entrepreneurs focused on specific profits, we offer to supplement the offer 
with an application that allows you to automate the auditing process and reduce 
the costs of managing individual tasks.

Offering a solution that responds to modern auditing needs will allow you to 
increase your competitive advantage and gain additional funds for trading.

A solution that enables real-time inspections, generates alerts about 
non-compliances and critical violations, and provides extensive reports. It is 
perfect for security, production, service, transport companies or retail chains.

Reducing the costs of creating reports by 100%, as well as finding and 
transferring data ensures high market interest.

May I present what our cooperation could look like?


Regards
Oliver Brown



Re: Clearance for dino-im 0.4.2

2023-03-24 Thread Sebastian Ramacher
Hi Martin

On 2023-03-23 23:19:46 +, Martin wrote:
> Dear release team,
> 
> I like to get clearance for uploading dino-im 0.4.2 to unstable, to get
> it into bookworm.

Please file a pre-approval unblock bug report against release.debian.org with a
proposed debdiff.

Cheers

> 
> Upstream release text:
> 
> > Maintenance release with fix for CVE-2023-28686 and bug fixes.
> 
> There are eight commits, from which five should definitively go into
> bookworm (1, 2, 6, 7, 8). Two commits are not related to a bug report,
> but solve relevant problems (3, 4). Only one is not relevant at all, but
> it does not touch file we care about anyway (5).
> 
> There are no new features nor unnecessary changes, so I would very much
> prefer to get the new version in instead of adding five to seven
> patches.
> 
> Here is a description of the commits between 0.4.1 (now in testing) and
> 0.4.2 (to be uploaded):
> 
> 1. acf9c694 * Fix C binding for gst_video_frame_get_data
> Fix for: GTK4 - crash when answering video call #1267
> > Fix C binding for gst_video_frame_get_data
> https://github.com/dino/dino/issues/1267
> 
> 2. 89b9110f * Improve history sync
> Fix for: MUC MAM (0313) doesn't work #1386
> > - Ensure we fully fetch desired history if possible (previously, duplicates
> >   from offline message queue could hinder MAM sync)
> > - Early drop illegal MAM messages so they don't pile up in the pending queue
> >   waiting for their query to end (which it never will if they were not
> >   requested in first place).
> https://github.com/dino/dino/issues/1386
> 
> 3. 481a68fd * Improve database performance while reconnecting and syncing
> > Improve database performance while reconnecting and syncing
> > Also move some tasks to low priority idle queue so they won't block UI 
> > updates
> No bug report, but solves startup time issues some users reported.
> 
> 4. 1738bf8d * data: Set StartupNotify to true in .desktop file
> > data: Set StartupNotify to true in .desktop file
> > GTK handles startup notifications, so advertise it in desktop
> > file. This allows splash screens and other startup indications
> > in DEs to work.
> No bug report, but sounds like an issue worth solving.
> 
> 5. b6f9b54d * Remove gspell
> (not relevant to Debian: unused cmake/FindGspell.cmake removed, change
> in github ci file)
> 
> 6. 00482404 * Fix a crash if a message subnode is not found in a carbon
> Fix for: A carbon crashes Dino #1392
> > Fix a crash if a message subnode is not found in a carbon
> https://github.com/dino/dino/issues/1392
> 
> 7. 179c766d * Bind soup session lifetime to File provider/sender lifetime
> Fix for: Dino crashes when sending or receiving files #1395 
> > Bind soup session lifetime to File provider/sender lifetime
> > Required since libsoup 3.4. Fixes #1395
> https://github.com/dino/dino/issues/1395
> 
> 8. baf96d9d * @ v0.4.2 origin/v0.4 Check sender of bookmark:1 updates
> Fix for: dino-im: Insufficient message sender validation in Dino 
> CVE-2023-28686
> > Check sender of bookmark:1 updates
> https://bugs.debian.org/1033370
> 
> Thanks in advance for your comments and decision!
> 
> Cheers
> 

-- 
Sebastian Ramacher



Bug#1033364: marked as done (unblock: logback/1:1.2.11-2)

2023-03-24 Thread Debian Bug Tracking System
Your message dated Fri, 24 Mar 2023 08:28:41 +
with message-id 
and subject line unblock logback
has caused the Debian Bug report #1033364,
regarding unblock: logback/1:1.2.11-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033364: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033364
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: a...@debian.org

Please unblock package logback

[ Reason ]

We can only support one Tomcat web server per release. Hence we have to
replace libtomcat9-java with libtomcat10-java.

[ Impact ]

There would be two versions of Tomcat in Debian 12 which would need
security support.

[ Tests ]

I have rebuilt all reverse-dependencies successfully. Tomcat support
is only optional ( thus the dependency is only suggested) The change
was merely replacing the import of javax.servlet.* with
jakarta.servlet.*

[ Risks ]

logback is a key package and the benefits outweigh the risks by far.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing


unblock logback/1:1.2.11-2
diff -Nru logback-1.2.11/debian/changelog logback-1.2.11/debian/changelog
--- logback-1.2.11/debian/changelog 2022-03-23 04:36:14.0 +0100
+++ logback-1.2.11/debian/changelog 2023-03-05 01:43:23.0 +0100
@@ -1,3 +1,11 @@
+logback (1:1.2.11-2) unstable; urgency=medium
+
+  * Team upload.
+  * Migrate to Tomcat 10. Depend on libtomcat10-java instead of tomcat9-java.
+Add tomcat10-migration.patch.
+
+ -- Markus Koschany   Sun, 05 Mar 2023 01:43:23 +0100
+
 logback (1:1.2.11-1) unstable; urgency=medium
 
   * New upstream version 1.2.11
diff -Nru logback-1.2.11/debian/control logback-1.2.11/debian/control
--- logback-1.2.11/debian/control   2022-03-23 04:36:14.0 +0100
+++ logback-1.2.11/debian/control   2023-03-05 01:43:23.0 +0100
@@ -17,7 +17,7 @@
  libmaven-javadoc-plugin-java,
  libservlet-api-java,
  libslf4j-java (>= 1.7.18),
- libtomcat9-java,
+ libtomcat10-java,
  maven-debian-helper
 Standards-Version: 4.6.0
 Vcs-Git: https://salsa.debian.org/java-team/logback.git
diff -Nru logback-1.2.11/debian/maven.properties 
logback-1.2.11/debian/maven.properties
--- logback-1.2.11/debian/maven.properties  2022-03-23 04:36:14.0 
+0100
+++ logback-1.2.11/debian/maven.properties  2023-03-05 01:43:23.0 
+0100
@@ -3,3 +3,5 @@
 # maven.test.skip=true
 
 maven.test.skip=true
+maven.compiler.source=1.8
+maven.compiler.target=1.8
diff -Nru logback-1.2.11/debian/maven.rules logback-1.2.11/debian/maven.rules
--- logback-1.2.11/debian/maven.rules   2022-03-23 04:36:14.0 +0100
+++ logback-1.2.11/debian/maven.rules   2023-03-05 01:43:23.0 +0100
@@ -1,5 +1,5 @@
 junit junit jar s/4\..*/4.x/
 javax.mail s/mail/javax.mail-api * s/.*/debian/ * *
-org.apache.tomcat tomcat-catalina * s/.*/9.x/
-org.apache.tomcat tomcat-coyote * s/.*/9.x/
+org.apache.tomcat tomcat-catalina * s/.*/10.x/
+org.apache.tomcat tomcat-coyote * s/.*/10.x/
 org.eclipse.jetty jetty-server * s/.*/9.x/
diff -Nru logback-1.2.11/debian/patches/series 
logback-1.2.11/debian/patches/series
--- logback-1.2.11/debian/patches/series2022-03-23 04:36:14.0 
+0100
+++ logback-1.2.11/debian/patches/series2023-03-05 01:43:23.0 
+0100
@@ -2,3 +2,4 @@
 04-privacy-breach.patch
 05-java11-compatibility.patch
 06-jetty-compatibility.patch
+tomcat10-migration.patch
diff -Nru logback-1.2.11/debian/patches/tomcat10-migration.patch 
logback-1.2.11/debian/patches/tomcat10-migration.patch
--- logback-1.2.11/debian/patches/tomcat10-migration.patch  1970-01-01 
01:00:00.0 +0100
+++ logback-1.2.11/debian/patches/tomcat10-migration.patch  2023-03-05 
01:43:23.0 +0100
@@ -0,0 +1,593 @@
+From: Markus Koschany 
+Date: Sat, 4 Mar 2023 19:43:08 +0100
+Subject: tomcat10 migration
+
+Forwarded: not-needed
+---
+ logback-access/pom.xml   |  3 +--
+ .../ch/qos/logback/access/ViewStatusMessagesServlet.java |  6 +++---
+ .../java/ch/qos/logback/access/jetty/RequestLogImpl.java |  3 ++-
+ .../java/ch/qos/logback/access/servlet/TeeFilter.java| 16 
+ .../logback/access/servlet/TeeHttpServletRequest.java|  6 +++---
+ .../logback/access/servlet/TeeHttpServletResponse.java   |  6 +++---
+ .../logback/access/servlet/TeeServletInputStream.java|  6 +++---
+ 

Bug#1033344: unblock: src:texlive-extra/2022.20230122-3

2023-03-24 Thread Sebastian Ramacher
Control: tags -1 moreinfo

Hi

On 2023-03-22 23:33:28 +0100, Hilmar Preusse wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> 
> Please unblock package src:texlive-extra. I did not upload the
> package to unstable, I'd like to hear your decision beforehand.

The diff looks reasonable. Please let us know once the version is
available in unstable.

Cheers

> 
> Recently we were informed (#1033008), that the LaTeX -> OOffice
> conversion engine of make4ht is severily broken and does not
> work at all. The upstream author released a fix a while ago,
> which was tested and was proven to solve the issue.
> 
> [ Reason ]
> We would like release the make4ht engine with a working LaTeX ->
> OOffice conversion engine for next stable release.
> 
> [ Impact ]
> Conversion of LaTeX to OOffice documents would not be possible
> using make4ht.
> 
> [ Tests ]
> There were no automated tests. We only apply the patch for the issue
> described here [1]. The submitter confirmed that the patch solved
> the specific issue.
> 
> [ Risks ]
> Code change is rather trivial and should not affect source packages.
> The human end users already confirmed that the change is useful.
> 
> [ Checklist ]
>   [X] all changes are documented in the d/changelog
>   [X] I reviewed all changes and I approve them
>   [X] attach debdiff against the package in testing
> 
> Thanks,
>   Hilmar
> 
> unblock src:texlive-extra/2022.20230122-3
> 
> [1] https://github.com/michal-h21/make4ht/issues/107
> 
> -- 
> sigmentation fault

> diff -Nru texlive-extra-2022.20230122/debian/changelog 
> texlive-extra-2022.20230122/debian/changelog
> --- texlive-extra-2022.20230122/debian/changelog  2023-02-15 
> 13:55:21.0 +0100
> +++ texlive-extra-2022.20230122/debian/changelog  2023-02-15 
> 13:55:21.0 +0100
> @@ -1,3 +1,10 @@
> +texlive-extra (2022.20230122-3) unstable; urgency=medium
> +
> +  * Apply patch for ooffice.4ht to fix conversion LaTeX ->
> +OOffice documents (Closes: #1033008).
> +
> + -- Hilmar Preusse   Wed, 15 Feb 2023 13:55:21 +0100
> +
>  texlive-extra (2022.20230122-2) unstable; urgency=medium
>  
>[ Jelmer Vernooij ]
> diff -Nru texlive-extra-2022.20230122/debian/patches/series 
> texlive-extra-2022.20230122/debian/patches/series
> --- texlive-extra-2022.20230122/debian/patches/series 2022-09-23 
> 23:01:08.0 +0200
> +++ texlive-extra-2022.20230122/debian/patches/series 2023-02-15 
> 13:55:21.0 +0100
> @@ -13,3 +13,4 @@
>  #replace_SELFAUTOPARENT
>  # fix-jadetex-new-latex
>  #tex4ht-babel
> +update_ooffice.4ht
> diff -Nru texlive-extra-2022.20230122/debian/patches/update_ooffice.4ht 
> texlive-extra-2022.20230122/debian/patches/update_ooffice.4ht
> --- texlive-extra-2022.20230122/debian/patches/update_ooffice.4ht 
> 1970-01-01 01:00:00.0 +0100
> +++ texlive-extra-2022.20230122/debian/patches/update_ooffice.4ht 
> 2023-02-15 13:55:21.0 +0100
> @@ -0,0 +1,1082 @@
> +Description:  Error in odt conversion: Format error in the file, in the 
> styles.xml #107
> +Origin: Michal Hoftich 
> +Forwarded: No. Patch comes from upstream.
> +Author: Michal Hoftich 
> +Last-Update: 20230125
> +
> +--- 
> texlive-base-2022.20230122.orig/texmf-dist/tex/generic/tex4ht/ooffice.4ht 
>2023-01-19 22:32:03.0 +0100
>  texlive-base-2022.20230122/texmf-dist/tex/generic/tex4ht/ooffice.4ht 
> 2023-01-25 23:49:22.0 +0100
> +@@ -1,4 +1,4 @@
> +-% ooffice.4ht (2023-01-19-13:31), generated from tex4ht-ooffice.tex
> ++% ooffice.4ht (2023-01-24-13:16), generated from tex4ht-ooffice.tex
> + % Copyright 2009-2023 TeX Users Group
> + % Copyright 2001-2009 Maarten Wisse, James Naughton, Eitan M. Gurari
> + %
> +@@ -17,7 +17,7 @@
> + %
> + % If you modify this program, changing the
> + % version identification would be appreciated.
> +-\immediate\write-1{version 2023-01-19-13:31}
> ++\immediate\write-1{version 2023-01-24-13:16}
> + 
> +   \exit:ifnot{Preamble,% 
> + algorithmicx,% 
> +@@ -3716,9 +3716,9 @@
> +   style:class="text">\Hnewline
> +  +   fo:font-weight="bold"
> +-  style:font-size-asian="115\prcnt:ch%"
> ++  style:font-size-asian="115\prcnt:ch"
> +   style:font-weight-asian="bold"
> +-  style:font-size-complex="115\prcnt:ch%"
> ++  style:font-size-complex="115\prcnt:ch"
> +   style:font-weight-complex="bold"
> +   fo:margin-top="40pt"
> +   fo:margin-bottom="25pt"
> +@@ -3821,7 +3821,7 @@
> +   fo:font-weight="bold"
> +   fo:margin-top="0.42cm"
> +   fo:margin-bottom="0cm"
> +-  style:font-size-complex="85\prcnt:ch%"
> ++  style:font-size-complex="85\prcnt:ch"
> +   style:font-style-complex="italic"
> +   

Bug#1033363: marked as done (unblock: xarchiver/1:0.5.4.20-2)

2023-03-24 Thread Debian Bug Tracking System
Your message dated Fri, 24 Mar 2023 08:27:42 +
with message-id 
and subject line unblock xarchiver
has caused the Debian Bug report #1033363,
regarding unblock: xarchiver/1:0.5.4.20-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033363: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033363
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: a...@debian.org

Please unblock package xarchiver

[ Reason ]

Fix detection of zstd version 1.5.4 and later (#1032591)

[ Impact ]

Xarchiver won't be able to detect and decompress zstd archives.

[ Tests ]

Manual decompression of zstd archives with xarchiver works as expected
now.


[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing


unblock xarchiver/1:0.5.4.20-2
diff -Nru xarchiver-0.5.4.20/debian/changelog 
xarchiver-0.5.4.20/debian/changelog
--- xarchiver-0.5.4.20/debian/changelog 2022-11-12 14:36:12.0 +0100
+++ xarchiver-0.5.4.20/debian/changelog 2023-03-12 12:48:14.0 +0100
@@ -1,3 +1,9 @@
+xarchiver (1:0.5.4.20-2) unstable; urgency=medium
+
+  * Fix detection of zstd version 1.5.4 and later. (Closes: #1032591)
+
+ -- Markus Koschany   Sun, 12 Mar 2023 12:48:14 +0100
+
 xarchiver (1:0.5.4.20-1) unstable; urgency=medium
 
   * New upstream version 0.5.4.20.
diff -Nru xarchiver-0.5.4.20/debian/patches/fix-detection-of-zstd.patch 
xarchiver-0.5.4.20/debian/patches/fix-detection-of-zstd.patch
--- xarchiver-0.5.4.20/debian/patches/fix-detection-of-zstd.patch   
1970-01-01 01:00:00.0 +0100
+++ xarchiver-0.5.4.20/debian/patches/fix-detection-of-zstd.patch   
2023-03-12 12:48:14.0 +0100
@@ -0,0 +1,79 @@
+From: Markus Koschany 
+Date: Sun, 12 Mar 2023 12:40:42 +0100
+Subject: fix detection of zstd
+
+Bug-Debian: https://bugs.debian.org/1032591
+Origin: 
https://github.com/ib/xarchiver/commit/a298cf82391e4b447e702d7e51078554253b1b8d
+---
+ src/gzip_et_al.c | 44 +++-
+ 1 file changed, 39 insertions(+), 5 deletions(-)
+
+diff --git a/src/gzip_et_al.c b/src/gzip_et_al.c
+index 650d24a..c862b60 100644
+--- a/src/gzip_et_al.c
 b/src/gzip_et_al.c
+@@ -67,6 +67,40 @@ void xa_gzip_et_al_check_lrzip (const gchar *path)
+   g_free(output);
+ }
+ 
++static gboolean xa_gzip_et_al_zstd_option (const gchar *output, const gchar 
*option)
++{
++  const gchar *nl, *delim;
++  size_t op;
++
++  if (!output)
++  return FALSE;
++
++  nl = output;
++  op = strlen(option);
++
++  while ((nl = strchr(nl, '\n')))
++  {
++  nl++;
++
++  /* skip multiple leading spaces added since v1.5.4 */
++  while (*nl && (*nl == ' '))
++  nl++;
++
++  if (!*nl)
++  break;
++
++  if (strncmp(nl, option, op) == 0)
++  {
++  delim = nl + op;
++
++  if (*delim && (*delim == ' ' || (*delim == ',' && 
*++delim == ' ')))
++  return TRUE;
++  }
++  }
++
++  return FALSE;
++}
++
+ gchar *xa_gzip_et_al_check_zstd (const gchar *compressor, const gchar 
*decompressor, gboolean *is_compressor)
+ {
+   gchar *path, *command, *output = NULL;
+@@ -82,18 +116,18 @@ gchar *xa_gzip_et_al_check_zstd (const gchar *compressor, 
const gchar *decompres
+   if (!path)
+   return NULL;
+ 
+-  command = g_strconcat(path, " -h", NULL);
++  command = g_strconcat(path, " -H", NULL);
+   g_spawn_command_line_sync(command, , NULL, NULL, NULL);
+   g_free(command);
+ 
+   /* check whether decompression is available */
+-  if (output && strstr(output, "\n -d "))
++  if (xa_gzip_et_al_zstd_option(output, "-d"))
+   {
+   if (found_compressor)
+-  *is_compressor = (strstr(output, "\n -# ") != NULL);
++  *is_compressor = xa_gzip_et_al_zstd_option(output, 
"-#");
+ 
+-  zstd_can_list = (strstr(output, "\n -l ") || strstr(output, 
"\n--list "));
+-  zstd_can_test = (strstr(output, "\n -t ") || strstr(output, 
"\n--test "));
++  zstd_can_list = xa_gzip_et_al_zstd_option(output, "-l");
++  zstd_can_test = (xa_gzip_et_al_zstd_option(output, "--test") || 
/* check short test option just in case */ 

Processed: Re: Bug#1033344: unblock: src:texlive-extra/2022.20230122-3

2023-03-24 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 moreinfo
Bug #1033344 [release.debian.org] unblock: src:texlive-extra/2022.20230122-3
Added tag(s) moreinfo.

-- 
1033344: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033344
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033383: marked as done (unblock: itinerary/22.12.3-1)

2023-03-24 Thread Debian Bug Tracking System
Your message dated Fri, 24 Mar 2023 08:23:52 +
with message-id 
and subject line unblock itinerary
has caused the Debian Bug report #1033383,
regarding unblock: itinerary/22.12.3-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033383: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033383
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: itiner...@packages.debian.org, debian-qt-...@lists.debian.org, 
he...@debian.org
Control: affects -1 + src:itinerary

Please unblock package itinerary

[ Reason ]
The new version is only a small bugfix of itinerary and several updates
of supported translations. So the only relevant change in code are two
lines in src/app/localizer.cpp to show timezone information, if we are
currently not in UTC.

and one line in
src/app/JourneySectionStopDelegate.qml to shorten long stop names in
journey section view.

Additionally I updated the list of all runtime QML depedencies to fix #1032889,
that is the most relevant change to request the unblock request.

[ Tests ]
as the code fixes are only cosmetic, there are no special autotests and
nothing big can break. I use itinerary myself so I can tell the app is
still running.

[ Risks ]
trival changes / only a leaf package.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock itinerary/22.12.3-1
--- End Message ---
--- Begin Message ---
Unblocked.--- End Message ---


Bug#1033378: marked as done (unblock: debian-security-support/1:12+2023.03.23)

2023-03-24 Thread Debian Bug Tracking System
Your message dated Fri, 24 Mar 2023 08:22:35 +
with message-id 
and subject line unblock debian-security-support
has caused the Debian Bug report #1033378,
regarding unblock: debian-security-support/1:12+2023.03.23
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033378: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033378
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package debian-security-support, for a trivial, yet adequate
update. Sadly it has no autopkgtest, thus this unblock request.

[ Reason ]
debian-security-support in bookworm lacks a file
security-support-ended.deb12, and thus adequate complains,
though not debian-security-support. still it feels wrong
and it would need to be added in later updates anyway.
thus adding it now and adding a checklist what to do
at the beginning of each release cycle.

[ Impact ]
hardly any, but it's cleaner.

[ Tests ]
https://piuparts.debian.org/sid/broken_symlinks_issue.html
listed debian-security-support/1:12+2023.03.17 yesterdaybut
it does not list debian-security-support/1:12+2023.03.22 anymore today.
\o/

[ Risks ]
I cannot imagine any but I've seen horses puking, so.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]
(Anything else the release team should know.)

You are doing an awesome job. Release processes are better documented and
automated than ever, and you still keep improving them while still keeping
"a human touch", "despite also enforcing them". Seriously kudos & thank you.

unblock debian-security-support/1:12+2023.03.23

$ debdiff debian-security-support_12+2023.03.17.dsc 
debian-security-support_12+2023.03.23.dsc|diffstat
 debian/README.source |   16 +++-
 debian/changelog |   13 +
 security-support-ended.deb12 |   13 +
 3 files changed, 41 insertions(+), 1 deletion(-)

$ debdiff debian-security-support_12+2023.03.17.dsc 
debian-security-support_12+2023.03.23.dsc
diff -Nru debian-security-support-12+2023.03.17/debian/changelog 
debian-security-support-12+2023.03.23/debian/changelog
--- debian-security-support-12+2023.03.17/debian/changelog  2023-03-17 
12:27:15.0 +0100
+++ debian-security-support-12+2023.03.23/debian/changelog  2023-03-23 
22:38:23.0 +0100
@@ -1,3 +1,16 @@
+debian-security-support (1:12+2023.03.23) unstable; urgency=medium
+
+  * d/README.source: list steps to be done at the beginning of each release
+cycle to avoid bugs like #1033312.
+
+ -- Holger Levsen   Thu, 23 Mar 2023 22:38:23 +0100
+
+debian-security-support (1:12+2023.03.22) unstable; urgency=medium
+
+  * Add currently empty security-support-ended.deb12 file. Closes: #1033312.
+
+ -- Holger Levsen   Wed, 22 Mar 2023 11:24:28 +0100
+
 debian-security-support (1:12+2023.03.17) unstable; urgency=medium
 
   [ Moritz Muehlenhoff ]
diff -Nru debian-security-support-12+2023.03.17/debian/README.source 
debian-security-support-12+2023.03.23/debian/README.source
--- debian-security-support-12+2023.03.17/debian/README.source  2023-03-05 
20:33:23.0 +0100
+++ debian-security-support-12+2023.03.23/debian/README.source  2023-03-22 
17:00:24.0 +0100
@@ -7,9 +7,23 @@
 All changes should be introduced in unstable first, and then migrate to 
testing.
 To support stable and older releases there are GIT branches.
 
-Usually only support status updates are applied to stable and older branches.
+Only support status updates are applied to stable and older branches.
 
 If in doubt whether something should be committed for unstable,
 please open a MR on salsa.debian.org so the change can be discussed there.
 
 Further improvements to this README are very welcome too.
+
+# ToDo list for a new Debian release
+
+At the beginning of each new Debian release cycle, these steps need to be done:
+
+- create a new git branch for the old release
+- increase the epoch in debian/changelog
+- create security-support-ended.debX based on the previous release
+- debian/rules: increase NEXT_VERSION_ID
+- check-support-status.in:
+  - increase DEB_NEXT_VER_ID
+  - increase DEB_LOWEST_VER_ID and drop security-support-ended.debY
+- update links with release codenames in security-support-limited
+
diff -Nru debian-security-support-12+2023.03.17/security-support-ended.deb12 

Processed: unblock: adduser/3.132

2023-03-24 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:adduser
Bug #1033393 [release.debian.org] unblock: adduser/3.132
Added indication that 1033393 affects src:adduser

-- 
1033393: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033393
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems