Bug#1002360: zope.exceptions: FTBFS: dh_auto_test: error: pybuild --test -i python{version} -p "3.10 3.9" returned exit code 13

2021-12-22 Thread Lucas Nussbaum
Source: zope.exceptions
Version: 4.4-1
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-20211220 ftbfs-bookworm

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
>  debian/rules build
> dh build --with python3 --buildsystem=pybuild
>dh_update_autotools_config -O--buildsystem=pybuild
>dh_autoreconf -O--buildsystem=pybuild
>dh_auto_configure -O--buildsystem=pybuild
> I: pybuild base:237: python3.10 setup.py config 
> running config
> I: pybuild base:237: python3.9 setup.py config 
> running config
>dh_auto_build -O--buildsystem=pybuild
> I: pybuild base:237: /usr/bin/python3.10 setup.py build 
> running build
> running build_py
> creating /<>/.pybuild/cpython3_3.10_zope.exceptions/build/zope
> copying src/zope/__init__.py -> 
> /<>/.pybuild/cpython3_3.10_zope.exceptions/build/zope
> creating 
> /<>/.pybuild/cpython3_3.10_zope.exceptions/build/zope/exceptions
> copying src/zope/exceptions/__init__.py -> 
> /<>/.pybuild/cpython3_3.10_zope.exceptions/build/zope/exceptions
> copying src/zope/exceptions/exceptionformatter.py -> 
> /<>/.pybuild/cpython3_3.10_zope.exceptions/build/zope/exceptions
> copying src/zope/exceptions/interfaces.py -> 
> /<>/.pybuild/cpython3_3.10_zope.exceptions/build/zope/exceptions
> copying src/zope/exceptions/log.py -> 
> /<>/.pybuild/cpython3_3.10_zope.exceptions/build/zope/exceptions
> creating 
> /<>/.pybuild/cpython3_3.10_zope.exceptions/build/zope/exceptions/tests
> copying src/zope/exceptions/tests/__init__.py -> 
> /<>/.pybuild/cpython3_3.10_zope.exceptions/build/zope/exceptions/tests
> copying src/zope/exceptions/tests/test_log.py -> 
> /<>/.pybuild/cpython3_3.10_zope.exceptions/build/zope/exceptions/tests
> copying src/zope/exceptions/tests/test_exceptionformatter.py -> 
> /<>/.pybuild/cpython3_3.10_zope.exceptions/build/zope/exceptions/tests
> running egg_info
> writing src/zope.exceptions.egg-info/PKG-INFO
> writing dependency_links to src/zope.exceptions.egg-info/dependency_links.txt
> writing namespace_packages to 
> src/zope.exceptions.egg-info/namespace_packages.txt
> writing requirements to src/zope.exceptions.egg-info/requires.txt
> writing top-level names to src/zope.exceptions.egg-info/top_level.txt
> reading manifest file 'src/zope.exceptions.egg-info/SOURCES.txt'
> reading manifest template 'MANIFEST.in'
> adding license file 'LICENSE.txt'
> writing manifest file 'src/zope.exceptions.egg-info/SOURCES.txt'
> I: pybuild base:237: /usr/bin/python3 setup.py build 
> running build
> running build_py
> creating /<>/.pybuild/cpython3_3.9_zope.exceptions/build/zope
> copying src/zope/__init__.py -> 
> /<>/.pybuild/cpython3_3.9_zope.exceptions/build/zope
> creating 
> /<>/.pybuild/cpython3_3.9_zope.exceptions/build/zope/exceptions
> copying src/zope/exceptions/__init__.py -> 
> /<>/.pybuild/cpython3_3.9_zope.exceptions/build/zope/exceptions
> copying src/zope/exceptions/exceptionformatter.py -> 
> /<>/.pybuild/cpython3_3.9_zope.exceptions/build/zope/exceptions
> copying src/zope/exceptions/interfaces.py -> 
> /<>/.pybuild/cpython3_3.9_zope.exceptions/build/zope/exceptions
> copying src/zope/exceptions/log.py -> 
> /<>/.pybuild/cpython3_3.9_zope.exceptions/build/zope/exceptions
> creating 
> /<>/.pybuild/cpython3_3.9_zope.exceptions/build/zope/exceptions/tests
> copying src/zope/exceptions/tests/__init__.py -> 
> /<>/.pybuild/cpython3_3.9_zope.exceptions/build/zope/exceptions/tests
> copying src/zope/exceptions/tests/test_log.py -> 
> /<>/.pybuild/cpython3_3.9_zope.exceptions/build/zope/exceptions/tests
> copying src/zope/exceptions/tests/test_exceptionformatter.py -> 
> /<>/.pybuild/cpython3_3.9_zope.exceptions/build/zope/exceptions/tests
> running egg_info
> writing src/zope.exceptions.egg-info/PKG-INFO
> writing dependency_links to src/zope.exceptions.egg-info/dependency_links.txt
> writing namespace_packages to 
> src/zope.exceptions.egg-info/namespace_packages.txt
> writing requirements to src/zope.exceptions.egg-info/requires.txt
> writing top-level names to src/zope.exceptions.egg-info/top_level.txt
> reading manifest file 'src/zope.exceptions.egg-info/SOURCES.txt'
> reading manifest template 'MANIFEST.in'
> adding license file 'LICENSE.txt'
> writing manifest file 'src/zope.exceptions.egg-info/SOURCES.txt'
>dh_auto_test -O--buildsystem=pybuild
> I: pybuild base:237: python3.10 setup.py test 
> running test
> WARNING: Testing via this command is deprecated and will be removed in a 
> future version. Users looking for a generic test entry point independent of 
> test runner are encouraged to use tox.
> running egg_info
> writing src/zope.exceptions.egg-info/PKG-INFO
> writing dependency_links to src/zope.exceptions.egg-info/dependency_links.txt
> writing namespace_packages to 
> src/zope.exceptions.egg-info/namespace_packages.txt
> writing requirements to src/zope.exceptions.egg-info/requires.txt
> writing top-level names to src/zop

Bug#568176: memtest86+: multiboot image is broken

2021-12-22 Thread Fabio Fantoni

Hi, I'm working on a new build for debian experimental with version 5.31b

work done for now about memtest86+ package is here: 
https://salsa.debian.org/debian/memtest86plus/-/commits/debian/experimental


for now multiboot patch is disabled, I don't have knowledge about 
assembly and the boot part except a little something done years ago that 
I hardly remember anything about, I don't have enough time recently to 
read up and study the parts.


For some tests I can try to adapt the patch from coreboot that is the 
most recent I found: 
https://review.coreboot.org/plugins/gitiles/memtest86plus/+/8cc1aeb540a02d9600491ca5fa799b7c8f25c363 
but I don't know if adapt and make it applicable and build working is 
enough to have multiboot correct and don't cause bugs (from an ubuntu 
issue on launchpad seems that ubuntu binaries have more issue that same 
upstream version and major of source changes is multiboot patch, so can 
be a cause of issue, I'm not sure)


Is there anyone with enough knowledge about it that want help me get the 
correct multiboot part for 5.31b for experimental please?




OpenPGP_signature
Description: OpenPGP digital signature


Wir bitten um Ihre aktive Zustimmung

2021-12-22 Thread Miles & More



  
  


Miles & More


Wir
bitten um Ihre aktive Zustimmung


Der
Bundesgerichtshof (BGH) hat am 27. April 2021 entschieden, dass eine
Klausel in Allgemeinen Geschäftsbedingungen unwirksam ist,
nach der
Schweigen auf ein Änderungsangebot als Zustimmung verstanden
wird (die
sogenannte Zustimmungsfiktion). Das Urteil wirkt sich auch auf Ihre von
der Deutschen Kreditbank AG ausgegebene Lufthansa Miles & More
Credit Card aus.


Wie
in unserer Nachricht in Ihrem Postfach angekündigt, bitten wir
Sie deshalb um Ihre Zustimmung

  zu
den aktuellen Preisen und Bedingungen Ihrer Lufthansa Miles &
More Credit Card und
  zu
der Änderung der Ziffer 25 der Allgemeinen
Geschäftsbedingungen für die Lufthansa Miles
& More Credit Card

Nur
so können wir Ihnen weiterhin Ihre vertraute und
leistungsstarke
Lufthansa Miles & More Credit Card anbieten sowie unsere
bestehende
Geschäftsbeziehung in bekannter Weise und auf einer rechtlich
gültigen
Grundlage fortführen.
Die
Vertragsbedingungen haben wir Ihnen hier verlinkt
und auch in Ihrem Online-Kartenkonto im Postfach unter
„Vertragsinformationen“ eingestellt. Ggf. geltende
Sonderkonditionen
für Mitarbeitende stehen ausschließlich im
Online-Kartenkonto bereit.


Was
müssen Sie jetzt tun?

Bitte
bestätigen Sie durch nur einen Klick auf den nachfolgenden
Button, dass
Sie unseren Vertragsbedingungen zustimmen. Diese sind dann ab 15.
Februar 2022 gültig.


Ja,
ich bin einverstanden

Wichtig
für Sie zu wissen:

  Unsere
Konditionen bleiben gleich. Die aktuellen Preise und Bedingungen
entsprechen unverändert dem Ihnen zuletzt mitgeteilten Stand.
In Folge des BGH-Urteils möchten wir nur die Art und Weise
ändern, wie wir mit Ihnen zukünftig
Vertragsanpassungen vereinbaren.
  Ihre
Zustimmung gilt für alle Ihre Lufthansa Miles &
More-Credit Cards.




You can also choose more
convenient or secure ways to sign in, like using your Google or GitHub
account or configuring two-factor authentication (2FA).
https://www.digitalocean.com/docs/accounts/profile/#sign-in-method






Bug#965855: marked as done (unadf: Removal of obsolete debhelper compat 5 and 6 in bookworm)

2021-12-22 Thread Debian Bug Tracking System
Your message dated Wed, 22 Dec 2021 17:25:17 +
with message-id 
and subject line Bug#965855: fixed in unadf 0.7.11a-5
has caused the Debian Bug report #965855,
regarding unadf: Removal of obsolete debhelper compat 5 and 6 in bookworm
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
965855: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965855
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: unadf
Version: 0.7.11a-4
Severity: normal
Usertags: compat-5-6-removal

Hi,

The package unadf uses debhelper with a compat level of 5 or 6,
which is deprecated and scheduled for removal[1].

Please bump the debhelper compat at your earliest convenience
/outside the freeze/!

  * Compat 13 is recommended (supported in stable-backports)

  * Compat 7 is the bare minimum


PLEASE KEEP IN MIND THAT the release team *DOES NOT* accept uploads
with compat bumps during the freeze.

If there is any risk that the fix for this bug might not migrate to
testing before 2021-01-01[3] then please postpone the fix until after
the freeze.


At the time of filing this bug, compat 5 and 6 are expected to be
removed "some time during the development cycle of bookworm".


Thanks,
~Niels


[1] https://lists.debian.org/debian-devel/2020/07/msg00065.html

[2] https://release.debian.org/bullseye/FAQ.html

[3] The choice of 2021-01-01 as a "deadline" is set before the actual
freeze deadline to provide a safe cut off point for most people.

Mind you, it is still your responsibility to ensure that the upload
makes it into testing even if you upload before that date.
--- End Message ---
--- Begin Message ---
Source: unadf
Source-Version: 0.7.11a-5
Done: Stephen Kitt 

We believe that the bug you reported is fixed in the latest version of
unadf, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 965...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Stephen Kitt  (supplier of updated unadf package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 22 Dec 2021 18:05:25 +0100
Source: unadf
Architecture: source
Version: 0.7.11a-5
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Stephen Kitt 
Closes: 965855
Changes:
 unadf (0.7.11a-5) unstable; urgency=medium
 .
   * QA upload.
   * Upgrade to debhelper compatibility level 13. Closes: #965855.
   * Remove remote monitoring from the FAQ.
   * Enable all hardening options.
   * Update debian/watch to point at the current repository.
   * Set “Rules-Requires-Root: no”.
   * Standards-Version 4.6.0, no further change required.
Checksums-Sha1:
 8b55c0e6866b5ffc7e6ddfe46cf501b54de3dc4b 1741 unadf_0.7.11a-5.dsc
 31a316e4e200dcbdc947c6f626b618bdaf946789 18464 unadf_0.7.11a-5.debian.tar.xz
 b6d7f5e3f9462764f72c71a2fb84a503b418f33a 6380 unadf_0.7.11a-5_source.buildinfo
Checksums-Sha256:
 97f3ab43bd33214bd512994c7e7436a48c5588208968d723c475a8558e4c85a0 1741 
unadf_0.7.11a-5.dsc
 4c117cc82cd12d6449ecb78fe9860371b18525013040e5fd40a6e6fd58e50422 18464 
unadf_0.7.11a-5.debian.tar.xz
 c15456e7e002292ab03f12a611a7a5ed340d5cbd96c12a1b3b31ba0cd5e00540 6380 
unadf_0.7.11a-5_source.buildinfo
Files:
 289ae512e3f2794ce2f4b65d2f3f69cb 1741 utils optional unadf_0.7.11a-5.dsc
 086b30767c0bd2af51121e58fb19605c 18464 utils optional 
unadf_0.7.11a-5.debian.tar.xz
 174d564d5016b92eea4dc65a95288dc9 6380 utils optional 
unadf_0.7.11a-5_source.buildinfo

-BEGIN PGP SIGNATURE-
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Processed: closing 915167

2021-12-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> close 915167
Bug #915167 [src:unadf] unadf FTCBFS: does not pass cross tools to make
Marked Bug as done
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
915167: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915167
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: fixed 915167 in unadf/0.7.11a-5

2021-12-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> fixed 915167 unadf/0.7.11a-5
Bug #915167 [src:unadf] unadf FTCBFS: does not pass cross tools to make
The source unadf and version 0.7.11a-5 do not appear to match any binary 
packages
Marked as fixed in versions unadf/0.7.11a-5.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
915167: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915167
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processing of unadf_0.7.11a-5_source.changes

2021-12-22 Thread Debian FTP Masters
unadf_0.7.11a-5_source.changes uploaded successfully to localhost
along with the files:
  unadf_0.7.11a-5.dsc
  unadf_0.7.11a-5.debian.tar.xz
  unadf_0.7.11a-5_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



unadf_0.7.11a-5_source.changes ACCEPTED into unstable

2021-12-22 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 22 Dec 2021 18:05:25 +0100
Source: unadf
Architecture: source
Version: 0.7.11a-5
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Stephen Kitt 
Closes: 965855
Changes:
 unadf (0.7.11a-5) unstable; urgency=medium
 .
   * QA upload.
   * Upgrade to debhelper compatibility level 13. Closes: #965855.
   * Remove remote monitoring from the FAQ.
   * Enable all hardening options.
   * Update debian/watch to point at the current repository.
   * Set “Rules-Requires-Root: no”.
   * Standards-Version 4.6.0, no further change required.
Checksums-Sha1:
 8b55c0e6866b5ffc7e6ddfe46cf501b54de3dc4b 1741 unadf_0.7.11a-5.dsc
 31a316e4e200dcbdc947c6f626b618bdaf946789 18464 unadf_0.7.11a-5.debian.tar.xz
 b6d7f5e3f9462764f72c71a2fb84a503b418f33a 6380 unadf_0.7.11a-5_source.buildinfo
Checksums-Sha256:
 97f3ab43bd33214bd512994c7e7436a48c5588208968d723c475a8558e4c85a0 1741 
unadf_0.7.11a-5.dsc
 4c117cc82cd12d6449ecb78fe9860371b18525013040e5fd40a6e6fd58e50422 18464 
unadf_0.7.11a-5.debian.tar.xz
 c15456e7e002292ab03f12a611a7a5ed340d5cbd96c12a1b3b31ba0cd5e00540 6380 
unadf_0.7.11a-5_source.buildinfo
Files:
 289ae512e3f2794ce2f4b65d2f3f69cb 1741 utils optional unadf_0.7.11a-5.dsc
 086b30767c0bd2af51121e58fb19605c 18464 utils optional 
unadf_0.7.11a-5.debian.tar.xz
 174d564d5016b92eea4dc65a95288dc9 6380 utils optional 
unadf_0.7.11a-5_source.buildinfo

-BEGIN PGP SIGNATURE-
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=cdOy
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processing of brandy_1.20.1-2_source.changes

2021-12-22 Thread Debian FTP Masters
brandy_1.20.1-2_source.changes uploaded successfully to localhost
along with the files:
  brandy_1.20.1-2.dsc
  brandy_1.20.1-2.debian.tar.xz
  brandy_1.20.1-2_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



brandy_1.20.1-2_source.changes ACCEPTED into unstable

2021-12-22 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 22 Dec 2021 19:05:50 +0100
Source: brandy
Architecture: source
Version: 1.20.1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Stephen Kitt 
Closes: 965442
Changes:
 brandy (1.20.1-2) unstable; urgency=medium
 .
   * QA upload.
   * Orphan the package (see #990610).
   * Upgrade to debhelper compatibility level 13. Closes: #965442.
   * Enable all hardening options.
   * Set “Rules-Requires-Root: no”.
   * Switch to a machine-readable debian/copyright.
   * Drop the obsolete dpkg-dev build-dependency.
   * Standards-Version 4.6.0, no further change required.
Checksums-Sha1:
 98d9b5e0bb9fe74d24d6d8caae01517227607b0b 1761 brandy_1.20.1-2.dsc
 0ecfbe2d3acce4a7959201e7b1416dc6a8566b67 5380 brandy_1.20.1-2.debian.tar.xz
 1ec9f62b7a6ded6c902ef47b523a3b1f2b3b7e4b 9853 brandy_1.20.1-2_source.buildinfo
Checksums-Sha256:
 92b0fec856a6352ce6c45e30226bdbbcae5b64503889b2b2320a74002022890f 1761 
brandy_1.20.1-2.dsc
 32ddb19e1a95cb5ca33aa0cd16b6f77c429860b03274e9f076e5a479ba4c7861 5380 
brandy_1.20.1-2.debian.tar.xz
 f82da6cccbe885c17e714ed81b6b9ec84e3976b0d3b9238046d7e7e4466db5ad 9853 
brandy_1.20.1-2_source.buildinfo
Files:
 514f7470e12c2877d62f0c632ce2d8df 1761 interpreters optional brandy_1.20.1-2.dsc
 fec71d2719a291be894f926805771af8 5380 interpreters optional 
brandy_1.20.1-2.debian.tar.xz
 bd645a08bd1cc61533f3ba1da3847882 9853 interpreters optional 
brandy_1.20.1-2_source.buildinfo

-BEGIN PGP SIGNATURE-
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=u+b7
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



toxic is marked for autoremoval from testing

2021-12-22 Thread Debian testing autoremoval watch
toxic 0.11.1-3 is marked for autoremoval from testing on 2022-01-27

It (build-)depends on packages with these RC bugs:
1001711: libtoxcore2: Stack-based buffer overflow vulnerability in UDP packet 
handling in Toxcore (CVE-2021-44847)
 https://bugs.debian.org/1001711



This mail is generated by:
https://salsa.debian.org/release-team/release-tools/-/blob/master/mailer/mail_autoremovals.pl

Autoremoval data is generated by:
https://salsa.debian.org/qa/udd/-/blob/master/udd/testing_autoremovals_gatherer.pl