Bug#904731: fakeupstream.cgi: fakeupstream.cgi?upstream=sf/* returns empty results

2018-07-29 Thread Kentaro Hayashi
On Fri, 27 Jul 2018 17:30:07 +0800
Paul Wise  wrote:

> On Fri, Jul 27, 2018 at 5:21 PM, Kentaro Hayashi wrote:
> 
> > It seems that fakeupstream.cgi returns empty response if upstream=sf/* is 
> > specified.
> 
> This does some terrible HTML parsing, I suggest using the official SF
> redirector documented in the uscan manual page, it does something that
> is much more reliable (read the per-project files RSS feeds). The code
> could be translated from PHP to Perl and included in fakeupstream.cgi
> but I think it would be better to use the official redirector.

Thanks.
I didn't know that sf.net, pypi.pyhton.org, pkg-ruby-extras redirectors well.

By the way, is these server side redirector implemented by what package or 
repository?

Regards,


pgpNTaYKvXe4y.pgp
Description: PGP signature


Bug#904731: fakeupstream.cgi: fakeupstream.cgi?upstream=sf/* returns empty results

2018-07-29 Thread Paul Wise
On Sun, Jul 29, 2018 at 8:37 PM, Kentaro Hayashi wrote:

> Thanks.

Please close the bug if you successfully switch to the other SF redirector.

> By the way, is these server side redirector implemented by what package or 
> repository?

https://salsa.debian.org/qa/qa/blob/master/cgi-bin/fakeupstream.cgi
https://salsa.debian.org/qa/qa/blob/master/wml/watch/sf.wml

-- 
bye,
pabs

https://wiki.debian.org/PaulWise



Bug#904932: qa.debian.org: sysv installed, on removing systemd networking&kde break

2018-07-29 Thread user
Package: qa.debian.org
Severity: important

Dear Maintainer,

Sorry this is going to qa, reportbug lists the ~40 different groups/address
I could only see ~22-40.  So, a couple bugs.  So, after installing sysvinit, 
rebooting, kde and networking work.  Then, if you apt-get remove systemd, then
 both kde and networking break,  KDE starts but you can't login, 
and networking is so broken you can't ping and name services are broken.
(That's in stable)

Another problem is, when installing testing, when you try to install sysvinit 
core, your libkf5 version is 5.47.0-1, but you get several errors
along the lines of unmet dependencies kio | depends | libkf5auth5 (>=
4.96.0) but is not going to be installed 

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
 ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***


-- System Information:
Debian Release: 9.5
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-7-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)



Processed: closing 904932

2018-07-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> close 904932
Bug #904932 [qa.debian.org] qa.debian.org: sysv installed, on removing systemd 
networking&kde break
Marked Bug as done
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
904932: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904932
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#904731: marked as done (fakeupstream.cgi: fakeupstream.cgi?upstream=sf/* returns empty results)

2018-07-29 Thread Debian Bug Tracking System
Your message dated Mon, 30 Jul 2018 11:21:02 +0900
with message-id 
and subject line Re: Bug#904731: fakeupstream.cgi: 
fakeupstream.cgi?upstream=sf/*
has caused the Debian Bug report #904731,
regarding fakeupstream.cgi: fakeupstream.cgi?upstream=sf/* returns empty results
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
904731: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904731
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: qa.debian.org
Severity: normal

Dear Maintainer,

* What led up to the situation?

It seems that fakeupstream.cgi returns empty response if upstream=sf/* is 
specified.

* What exactly did you do (or not do) that was effective (or
  ineffective)?

I've noticed that accessing the following url by browser.

  https://qa.debian.org/cgi-bin/fakeupstream.cgi?upstream=sf/apertium/giella-sme

Also checked via curl:

LANG=C curl -v 
https://qa.debian.org/cgi-bin/fakeupstream.cgi?upstream=sf/apertium/giella-sme
*   Trying 2001:41c8:1000:21::21:28...
* TCP_NODELAY set
* connect to 2001:41c8:1000:21::21:28 port 443 failed: Connection refused
*   Trying 5.153.231.28...
* TCP_NODELAY set
* Connected to qa.debian.org (5.153.231.28) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
*   CAfile: /etc/ssl/certs/ca-certificates.crt
  CApath: /etc/ssl/certs
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
*  subject: CN=qa.debian.org
*  start date: Jun  8 00:32:46 2018 GMT
*  expire date: Sep  6 00:32:46 2018 GMT
*  subjectAltName: host "qa.debian.org" matched cert's "qa.debian.org"
*  issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
*  SSL certificate verify ok.
> GET /cgi-bin/fakeupstream.cgi?upstream=sf/apertium/giella-sme HTTP/1.1
> Host: qa.debian.org
> User-Agent: curl/7.60.0
> Accept: */*
> 
< HTTP/1.1 200 OK
< Date: Fri, 27 Jul 2018 09:17:12 GMT
< Server: Apache
< X-Content-Type-Options: nosniff
< X-Frame-Options: sameorigin
< Referrer-Policy: no-referrer
< X-Xss-Protection: 1
< Strict-Transport-Security: max-age=15552000
< Public-Key-Pins: pin-sha256="FucbwYIiPXFJ5+ftcgqknth2/JalZeR6eAg+6eGlmvE="; 
pin-sha256="I2RM2I85Fmn1oaLG2PAmqJSzUTCyJRaom+T+8wX+jqA="; max-age=5184000
< Vary: Accept-Encoding
< X-Clacks-Overhead: GNU Terry Pratchett
< Transfer-Encoding: chunked
< Content-Type: text/html; charset=ISO-8859-1
< 
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd";>
http://www.w3.org/1999/xhtml"; lang="en-US" xml:lang="en-US">

Untitled Document





* Connection #0 to host qa.debian.org left intact


It returns empty list.

* What was the outcome of this action?

List of upstream versions

* What outcome did you expect instead?

No upstream versions

-- System Information:
Debian Release: buster/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.17.0-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=ja_JP.utf8, LC_CTYPE=ja_JP.utf8 (charmap=UTF-8), 
LANGUAGE=ja_JP.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled


pgpedCE8I1EkF.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
 returns empty results
Message-Id: <20180730112102.0cea7f214e86d3077d429...@clear-code.com>
In-Reply-To: 

X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.32; x86_64-unknown-linux-gnu)
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

On Sun, 29 Jul 2018 22:29:00 +0800 Paul Wise  wrote:
> On Sun, Jul 29, 2018 at 8:37 PM, Kentaro Hayashi wrote:
> 
> > Thanks.
> 
> Please close the bug if you successfully switch to the other SF redirector.

Done.

> > By the way, is these server side redirector implemented by what package or 
> > repository?
> 
> https://salsa.debian.org/qa/qa/blob/master/cgi-bin/fakeupstream.cgi
> https://salsa.debian.org/qa/qa/blob/master/wml/watch/sf.wml

Thanks!
I didn't know sf.wml at all. I'll check it later.

Regards,--- End Message ---