Bug#734657: marked as done (apvlv: APT Virtual Package pdf-viewer does not include apvlv)

2022-07-23 Thread Debian Bug Tracking System
Your message dated Sat, 23 Jul 2022 20:49:53 +
with message-id 
and subject line Bug#734657: fixed in apvlv 0.4.0+repack-1
has caused the Debian Bug report #734657,
regarding apvlv: APT Virtual Package pdf-viewer does not include apvlv
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
734657: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734657
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: apvlv
Version: 0.1.1-1.2+b1
Severity: wishlist

Dear Maintainer,

Please consider adding apvlv in Debian APT as a pdf-viewer virtual package.

Thank you,

Ricardo Peliquero

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (x86_64)

Kernel: Linux 3.13-rc6-amd64 (SMP w/2 CPU cores)
Locale: LANG=es_AR.UTF-8, LC_CTYPE=es_AR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages apvlv depends on:
ii  libatk1.0-0 2.10.0-2
ii  libc6   2.17-97
ii  libcairo2   1.12.16-2
ii  libdjvulibre21  3.5.25.4-2
ii  libfontconfig1  2.11.0-2
ii  libfreetype62.5.2-1
ii  libgcc1 1:4.8.2-12
ii  libgdk-pixbuf2.0-0  2.28.2-1+b1
ii  libglib2.0-02.36.4-1
ii  libgtk2.0-0 2.24.22-1
ii  libpango1.0-0   1.36.0-1+b1
ii  libpoppler-glib80.18.4-10
ii  libstdc++6  4.8.2-12

apvlv recommends no packages.

Versions of packages apvlv suggests:
ii  poppler-data  0.4.6-4

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: apvlv
Source-Version: 0.4.0+repack-1
Done: xiao sheng wen 

We believe that the bug you reported is fixed in the latest version of
apvlv, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 734...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
xiao sheng wen  (supplier of updated apvlv package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 19 Jul 2022 15:17:38 +0800
Source: apvlv
Architecture: source
Version: 0.4.0+repack-1
Distribution: unstable
Urgency: medium
Maintainer: xiao sheng wen 
Changed-By: xiao sheng wen 
Closes: 734657 798945
Changes:
 apvlv (0.4.0+repack-1) unstable; urgency=medium
 .
   [ Debian Janitor ]
   * Remove constraints unnecessary since buster:
 + Build-Depends: Drop versioned constraint on cmake and 
libpoppler-glib-dev.
 + apvlv: Drop versioned constraint on poppler-data in Suggests.
 .
   [ xiao sheng wen ]
   * New maintainer (Closes: #798945)
   * Use secure URI in Homepage field.
   * Fix day-of-week for changelog entry 0.0.7.3-1.
   * d/control:
   - add Provides: pdf-viewer(Closes: #734657)
   - use mandoc to get Startup.pdf, pass the reprotest
   - add Rules-Requires-Root: no
   * d/copyright:
   - add 2022 xiao sheng wen 
   - update the upstream year info to 2021
   * d/upstream/metadata: add Repository: and Repository-Browse: fields
   * Bump Standards-Version: 4.6.1.0
   * d/watch: add repacksuffix=+repack
   * import upstream repack suffix version 0.4.0+repack
   * d/mime: fix typo, add one space before word "priority"
   * d/rules: remove -DAPVLV_WITH_UMD=OFF,useless in the current upstream 
version
Checksums-Sha1:
 288ecf47814160d885062a0a1c4dc9fe6393d7b5 1847 apvlv_0.4.0+repack-1.dsc
 ce900318cabbb64a4511c164c11d4562b9ef27a6 409704 apvlv_0.4.0+repack.orig.tar.xz
 74b43b80cf8ac0a32cb9b63cc636a2c42e07af5a 14176 
apvlv_0.4.0+repack-1.debian.tar.xz
 d972d3f3fcafe0cf0988a5d069e382dbfa2d469c 17360 
apvlv_0.4.0+repack-1_source.buildinfo
Checksums-Sha256:
 229baad529fa690071bd694bc73c57377cfe1970fd68a9bc3942757116260ec1 1847 
apvlv_0.4.0+repack-1.dsc
 3ccee6f34b38f5214107b8d161ecf4230b8801d7bf2eb5c1aa244726fcc37199 409704 
apvlv_0.4.0+repack.orig.tar.xz
 b220d2c20dc7925a79a1134ea6a98129ffe9ff1d9687cd527f2bbcb693e8ffef 14176 
apvlv_0.4.0+repack-1.debian.tar.xz
 ce18e38c582c50ca5af33bc3850bec89fd3a5bb47e8d02886977410ed3090bb5 17360 
apvlv_0.4.0+repack-1_source.buildinfo
Files:
 217dff7468c3c9b6977b6f10d16c6bba 1847 text optional apvlv_0.4.0+repack-1.dsc
 9e7e6b1bb5c97afef984943afeee104d 409704 text optional 
apvlv_0.4.0+repack.ori

Processing of tcmu_1.5.4-4_source.changes

2022-07-23 Thread Debian FTP Masters
tcmu_1.5.4-4_source.changes uploaded successfully to localhost
along with the files:
  tcmu_1.5.4-4.dsc
  tcmu_1.5.4-4.debian.tar.xz
  tcmu_1.5.4-4_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#1013050: marked as done (tcmu: ftbfs with GCC-12)

2022-07-23 Thread Debian Bug Tracking System
Your message dated Sat, 23 Jul 2022 22:52:50 +
with message-id 
and subject line Bug#1013050: fixed in tcmu 1.5.4-4
has caused the Debian Bug report #1013050,
regarding tcmu: ftbfs with GCC-12
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1013050: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013050
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:tcmu
Version: 1.5.4-2
Severity: normal
Tags: sid bookworm
User: debian-...@lists.debian.org
Usertags: ftbfs-gcc-12

[This bug is targeted to the upcoming bookworm release]

Please keep this issue open in the bug tracker for the package it
was filed for.  If a fix in another package is required, please
file a bug for the other package (or clone), and add a block in this
package. Please keep the issue open until the package can be built in
a follow-up test rebuild.

The package fails to build in a test rebuild on at least amd64 with
gcc-12/g++-12, but succeeds to build with gcc-11/g++-11. The
severity of this report will be raised before the bookworm release.

The full build log can be found at:
http://qa-logs.debian.net/2022/06/09/gcc12/tcmu_1.5.4-2_unstable_gcc12.log
The last lines of the build log are at the end of this report.

To build with GCC 11, either set CC=gcc-11 CXX=g++-11 explicitly,
or install the gcc, g++, gfortran, ... packages from experimental.

  apt-get -t=experimental install g++ 

Common build failures are new warnings resulting in build failures with
-Werror turned on, or new/dropped symbols in Debian symbols files.
For other C/C++ related build failures see the porting guide at
http://gcc.gnu.org/gcc-11/porting_to.html

GCC 11 defaults to the GNU++17 standard.  If your package installs
header files in /usr/include, please don't work around C++17 issues
by choosing a lower C++ standard for the package build, but fix these
issues to build with the C++17 standard.

[...]
  |  
^~
/<>/rbd.c:321:25: note: in expansion of macro ‘tcmu_dev_err’
  321 | tcmu_dev_err(dev, "Could not rm blacklist entry 
'%s'. (Err %d)\n",
  | ^~~~
/<>/rbd.c:311:17: note: call to ‘free’ here
  311 | free(addr);
  | ^~
[ 33%] Building C object CMakeFiles/tcmu.dir/libtcmu-register.c.o
/usr/bin/cc -Dtcmu_EXPORTS -I/usr/include/libnl3 -I/usr/include/gio-unix-2.0 
-I/usr/include/libmount -I/usr/include/blkid -I/usr/include/glib-2.0 
-I/usr/lib/x86_64-linux-gnu/glib-2.0/include -I/<>/ccan -g -O2 
-ffile-prefix-map=/<>=. -fstack-protector-strong -Wformat 
-Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -Werror -Wall 
-Wdeclaration-after-statement -std=c99 -fPIC -MD -MT 
CMakeFiles/tcmu.dir/libtcmu-register.c.o -MF 
CMakeFiles/tcmu.dir/libtcmu-register.c.o.d -o 
CMakeFiles/tcmu.dir/libtcmu-register.c.o -c /<>/libtcmu-register.c
[ 35%] Building C object CMakeFiles/tcmu_static.dir/api.c.o
/usr/bin/cc  -I/usr/include/libnl3 -I/usr/include/gio-unix-2.0 
-I/usr/include/libmount -I/usr/include/blkid -I/usr/include/glib-2.0 
-I/usr/lib/x86_64-linux-gnu/glib-2.0/include -I/<>/ccan -g -O2 
-ffile-prefix-map=/<>=. -fstack-protector-strong -Wformat 
-Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -Werror -Wall 
-Wdeclaration-after-statement -std=c99 -MD -MT 
CMakeFiles/tcmu_static.dir/api.c.o -MF CMakeFiles/tcmu_static.dir/api.c.o.d -o 
CMakeFiles/tcmu_static.dir/api.c.o -c /<>/api.c
cc1: all warnings being treated as errors
make[3]: *** [CMakeFiles/handler_rbd.dir/build.make:79: 
CMakeFiles/handler_rbd.dir/rbd.c.o] Error 1
make[3]: Leaving directory '/<>/obj-x86_64-linux-gnu'
make[2]: *** [CMakeFiles/Makefile2:339: CMakeFiles/handler_rbd.dir/all] Error 2
make[2]: *** Waiting for unfinished jobs
[ 37%] Building C object CMakeFiles/tcmu_static.dir/libtcmu.c.o
/usr/bin/cc  -I/usr/include/libnl3 -I/usr/include/gio-unix-2.0 
-I/usr/include/libmount -I/usr/include/blkid -I/usr/include/glib-2.0 
-I/usr/lib/x86_64-linux-gnu/glib-2.0/include -I/<>/ccan -g -O2 
-ffile-prefix-map=/<>=. -fstack-protector-strong -Wformat 
-Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -Werror -Wall 
-Wdeclaration-after-statement -std=c99 -MD -MT 
CMakeFiles/tcmu_static.dir/libtcmu.c.o -MF 
CMakeFiles/tcmu_static.dir/libtcmu.c.o.d -o 
CMakeFiles/tcmu_static.dir/libtcmu.c.o -c /<>/libtcmu.c
[ 39%] Linking C shared library handler_file_optical.so
/usr/bin/cmake -E cmake_link_script 
CMakeFiles/handler_file_optical.dir/link.txt --verbose=1
/usr/bin/cc -fPIC

tcmu_1.5.4-4_source.changes ACCEPTED into unstable

2022-07-23 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 23 Jul 2022 23:53:15 +0200
Source: tcmu
Architecture: source
Version: 1.5.4-4
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Håvard F. Aasen 
Closes: 1013050
Changes:
 tcmu (1.5.4-4) unstable; urgency=medium
 .
   * QA upload.
   * Add fix-use-after-free.patch. Closes: #1013050
   * d/p/series: Remove mention of non-existing patches.
Checksums-Sha1:
 4170131d5b65651c816e6328fb9e5095a302152b 1963 tcmu_1.5.4-4.dsc
 c2f3044710a2f94e463ea4ecab907b51805aaab8 6588 tcmu_1.5.4-4.debian.tar.xz
 e41e5386a201caba4732a2c614ab496b538989c2 8392 tcmu_1.5.4-4_source.buildinfo
Checksums-Sha256:
 def660c7eb130313e0275481fb22c19b40350c60f51adab774b4172db3b678b3 1963 
tcmu_1.5.4-4.dsc
 6e61b0b571fa46a157f912055c76bfaa9c1dbe51e4de77fcc47fa508a7e85429 6588 
tcmu_1.5.4-4.debian.tar.xz
 8b17ed8285c833aa31e4eb1683580b2808d9d4ede7446c9490f186bc2458d6c2 8392 
tcmu_1.5.4-4_source.buildinfo
Files:
 4784987c6fc15eeb520ed69a1eefc805 1963 admin optional tcmu_1.5.4-4.dsc
 4dd9d44e83eb76fc232fce55950a8fa6 6588 admin optional tcmu_1.5.4-4.debian.tar.xz
 3b8755df0e15ab9e0a23c52bbcfc3374 8392 admin optional 
tcmu_1.5.4-4_source.buildinfo

-BEGIN PGP SIGNATURE-
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=UThJ
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processing of mailcheck_1.91.2-5_source.changes

2022-07-23 Thread Debian FTP Masters
mailcheck_1.91.2-5_source.changes uploaded successfully to localhost
along with the files:
  mailcheck_1.91.2-5.dsc
  mailcheck_1.91.2-5.debian.tar.xz
  mailcheck_1.91.2-5_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#1012995: marked as done (mailcheck: ftbfs with GCC-12)

2022-07-23 Thread Debian Bug Tracking System
Your message dated Sun, 24 Jul 2022 01:50:47 +
with message-id 
and subject line Bug#1012995: fixed in mailcheck 1.91.2-5
has caused the Debian Bug report #1012995,
regarding mailcheck: ftbfs with GCC-12
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1012995: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012995
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:mailcheck
Version: 1.91.2-4
Severity: normal
Tags: sid bookworm
User: debian-...@lists.debian.org
Usertags: ftbfs-gcc-12

[This bug is targeted to the upcoming bookworm release]

Please keep this issue open in the bug tracker for the package it
was filed for.  If a fix in another package is required, please
file a bug for the other package (or clone), and add a block in this
package. Please keep the issue open until the package can be built in
a follow-up test rebuild.

The package fails to build in a test rebuild on at least amd64 with
gcc-12/g++-12, but succeeds to build with gcc-11/g++-11. The
severity of this report will be raised before the bookworm release.

The full build log can be found at:
http://qa-logs.debian.net/2022/06/09/gcc12/mailcheck_1.91.2-4_unstable_gcc12.log
The last lines of the build log are at the end of this report.

To build with GCC 11, either set CC=gcc-11 CXX=g++-11 explicitly,
or install the gcc, g++, gfortran, ... packages from experimental.

  apt-get -t=experimental install g++ 

Common build failures are new warnings resulting in build failures with
-Werror turned on, or new/dropped symbols in Debian symbols files.
For other C/C++ related build failures see the porting guide at
http://gcc.gnu.org/gcc-11/porting_to.html

GCC 11 defaults to the GNU++17 standard.  If your package installs
header files in /usr/include, please don't work around C++17 issues
by choosing a lower C++ standard for the package build, but fix these
issues to build with the C++17 standard.

[...]
 fakeroot debian/rules clean
dh clean
   dh_auto_clean
make -j8 distclean
make[1]: Entering directory '/<>'
rm -f mailcheck *~
make[1]: Leaving directory '/<>'
   dh_clean
 debian/rules build
dh build
   dh_update_autotools_config
   dh_autoreconf
   dh_auto_configure
   dh_auto_build
make -j8 "INSTALL=install --strip-program=true"
make[1]: Entering directory '/<>'
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,-z,relro 
-Wl,-z,now -Wall -O2 mailcheck.c netrc.c socket.c -o mailcheck
mailcheck.c: In function ‘check_pop3’:
mailcheck.c:461:3: warning: ignoring return value of ‘fgets’ declared with 
attribute ‘warn_unused_result’ [-Wunused-result]
  461 |   fgets (buf, BUF_SIZE, fp);
  |   ^
mailcheck.c:465:3: warning: ignoring return value of ‘fgets’ declared with 
attribute ‘warn_unused_result’ [-Wunused-result]
  465 |   fgets (buf, BUF_SIZE, fp);
  |   ^
mailcheck.c:481:3: warning: ignoring return value of ‘fgets’ declared with 
attribute ‘warn_unused_result’ [-Wunused-result]
  481 |   fgets (buf, BUF_SIZE, fp);
  |   ^
mailcheck.c:495:3: warning: ignoring return value of ‘fgets’ declared with 
attribute ‘warn_unused_result’ [-Wunused-result]
  495 |   fgets (buf, BUF_SIZE, fp);
  |   ^
mailcheck.c:510:3: warning: ignoring return value of ‘fgets’ declared with 
attribute ‘warn_unused_result’ [-Wunused-result]
  510 |   fgets (buf, BUF_SIZE, fp);
  |   ^
mailcheck.c: In function ‘check_imap’:
mailcheck.c:559:3: warning: ignoring return value of ‘fgets’ declared with 
attribute ‘warn_unused_result’ [-Wunused-result]
  559 |   fgets (buf, BUF_SIZE, fp);
  |   ^
mailcheck.c:569:7: warning: ignoring return value of ‘fgets’ declared with 
attribute ‘warn_unused_result’ [-Wunused-result]
  569 |   fgets (buf, BUF_SIZE, fp);
  |   ^
mailcheck.c:586:3: warning: ignoring return value of ‘fgets’ declared with 
attribute ‘warn_unused_result’ [-Wunused-result]
  586 |   fgets (buf, BUF_SIZE, fp);
  |   ^
mailcheck.c:600:7: warning: ignoring return value of ‘fgets’ declared with 
attribute ‘warn_unused_result’ [-Wunused-result]
  600 |   fgets (buf, BUF_SIZE, fp);
  |   ^
mailcheck.c: In function ‘check_maildir’:
mailcheck.c:162:40: warning: ‘%s’ directive output may be truncated writing up 
to 255 bytes into a region of size between 0 and 2047 [-Wformat-truncation=

mailcheck_1.91.2-5_source.changes ACCEPTED into unstable

2022-07-23 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 24 Jul 2022 00:36:37 +0200
Source: mailcheck
Architecture: source
Version: 1.91.2-5
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Håvard F. Aasen 
Closes: 1012995
Changes:
 mailcheck (1.91.2-5) unstable; urgency=medium
 .
   * QA upload.
   * Update d/p/002_advanced_counting.patch, declare ignore_maildir_entry()
 static. Another option is to not inline function. Closes: #1012995
   * d/control:
 - Document Rules-requires-Root.
 - Update Standards-Version to 4.6.1
   * Update to secure URI, where available.
Checksums-Sha1:
 26096365155b78c86a413ddb88f6f572fe10a368 1757 mailcheck_1.91.2-5.dsc
 7316fa7d35b4edb272a7a115e9e3cb3c8688f1d4 11012 mailcheck_1.91.2-5.debian.tar.xz
 0ec8c1939fe5f1d2f96ca597cbc42970ae777104 5721 
mailcheck_1.91.2-5_source.buildinfo
Checksums-Sha256:
 70c6a37049314172dafc316690ff9f1bfb17736e5ba6a2545777019a03faf34e 1757 
mailcheck_1.91.2-5.dsc
 b4313cb176360857fd9be5c7ce59dc5de6b41d40f6c0aba6bc50767a8b627197 11012 
mailcheck_1.91.2-5.debian.tar.xz
 1627e851188bcf753a66f6a334da1d033b105912db5dac16d76732475c5b13d9 5721 
mailcheck_1.91.2-5_source.buildinfo
Files:
 02555faf4856aac7740e815f080947b6 1757 mail optional mailcheck_1.91.2-5.dsc
 04591675f576b91217f4139161d16d3b 11012 mail optional 
mailcheck_1.91.2-5.debian.tar.xz
 8c64cf6ddec64ad69f09553006b8ad2f 5721 mail optional 
mailcheck_1.91.2-5_source.buildinfo

-BEGIN PGP SIGNATURE-
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=v9y3
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



python-sshoot is marked for autoremoval from testing

2022-07-23 Thread Debian testing autoremoval watch
python-sshoot 1.4.2-2 is marked for autoremoval from testing on 2022-07-23

It is affected by these RC bugs:
1013601: python-sshoot: FTBFS: /bin/sh: 1: register-python-argcomplete3: not 
found
 https://bugs.debian.org/1013601



This mail is generated by:
https://salsa.debian.org/release-team/release-tools/-/blob/master/mailer/mail_autoremovals.pl

Autoremoval data is generated by:
https://salsa.debian.org/qa/udd/-/blob/master/udd/testing_autoremovals_gatherer.pl



centreon-clib is marked for autoremoval from testing

2022-07-23 Thread Debian testing autoremoval watch
centreon-clib 21.04.2-1 is marked for autoremoval from testing on 2022-08-06

It is affected by these RC bugs:
1012902: centreon-clib: ftbfs with GCC-12
 https://bugs.debian.org/1012902



This mail is generated by:
https://salsa.debian.org/release-team/release-tools/-/blob/master/mailer/mail_autoremovals.pl

Autoremoval data is generated by:
https://salsa.debian.org/qa/udd/-/blob/master/udd/testing_autoremovals_gatherer.pl



codelite is marked for autoremoval from testing

2022-07-23 Thread Debian testing autoremoval watch
codelite 16.0.0+dfsg2-1 is marked for autoremoval from testing on 2022-08-21

It (build-)depends on packages with these RC bugs:
1013495: asio: FTBFS: dh_auto_test: error: make -j8 check "TESTSUITEFLAGS=-j8 
--verbose" VERBOSE=1 returned exit code 2
 https://bugs.debian.org/1013495



This mail is generated by:
https://salsa.debian.org/release-team/release-tools/-/blob/master/mailer/mail_autoremovals.pl

Autoremoval data is generated by:
https://salsa.debian.org/qa/udd/-/blob/master/udd/testing_autoremovals_gatherer.pl



mini-httpd is marked for autoremoval from testing

2022-07-23 Thread Debian testing autoremoval watch
mini-httpd 1.30-2 is marked for autoremoval from testing on 2022-08-21

It is affected by these RC bugs:
1013614: mini-httpd: FTBFS: dh_installman: error: copy(./mini_httpd.8, 
debian/mini-httpd/usr/share/man/man8/mini_httpd.8): Permission denied
 https://bugs.debian.org/1013614



This mail is generated by:
https://salsa.debian.org/release-team/release-tools/-/blob/master/mailer/mail_autoremovals.pl

Autoremoval data is generated by:
https://salsa.debian.org/qa/udd/-/blob/master/udd/testing_autoremovals_gatherer.pl



ceph-iscsi is marked for autoremoval from testing

2022-07-23 Thread Debian testing autoremoval watch
ceph-iscsi 3.5-2 is marked for autoremoval from testing on 2022-08-22

It (build-)depends on packages with these RC bugs:
1013050: tcmu: ftbfs with GCC-12
 https://bugs.debian.org/1013050



This mail is generated by:
https://salsa.debian.org/release-team/release-tools/-/blob/master/mailer/mail_autoremovals.pl

Autoremoval data is generated by:
https://salsa.debian.org/qa/udd/-/blob/master/udd/testing_autoremovals_gatherer.pl



tcmu is marked for autoremoval from testing

2022-07-23 Thread Debian testing autoremoval watch
tcmu 1.5.4-3 is marked for autoremoval from testing on 2022-08-22

It is affected by these RC bugs:
1013050: tcmu: ftbfs with GCC-12
 https://bugs.debian.org/1013050



This mail is generated by:
https://salsa.debian.org/release-team/release-tools/-/blob/master/mailer/mail_autoremovals.pl

Autoremoval data is generated by:
https://salsa.debian.org/qa/udd/-/blob/master/udd/testing_autoremovals_gatherer.pl



mailcheck is marked for autoremoval from testing

2022-07-23 Thread Debian testing autoremoval watch
mailcheck 1.91.2-4 is marked for autoremoval from testing on 2022-08-08

It is affected by these RC bugs:
1012995: mailcheck: ftbfs with GCC-12
 https://bugs.debian.org/1012995



This mail is generated by:
https://salsa.debian.org/release-team/release-tools/-/blob/master/mailer/mail_autoremovals.pl

Autoremoval data is generated by:
https://salsa.debian.org/qa/udd/-/blob/master/udd/testing_autoremovals_gatherer.pl



Bug#1015924: pvm: ftbfs on riscv64("Unknown architecture!")

2022-07-23 Thread Bo YU
Source: pvm
Version: 3.4.6-3.2
Severity: minor
Tags: ftbfs, patch
User: debian-ri...@lists.debian.org
Usertags: riscv64
X-Debbugs-Cc: debian-ri...@lists.debian.org

Dear pvm Maintainer,

The pvm package has a ftbfs issue on riscv64:
```
...
dh clean
   debian/rules override_dh_auto_clean
make[1]: Entering directory '/<>'
Unknown architecture!
Unknown architecture!
echo "#!/bin/sh" > lib/pvmgetarch
echo "echo " > lib/pvmgetarch
chmod +x lib/pvmgetarch
chmod +x debian/getpvmarch
make PVM_ROOT=`pwd` clean
...
```

The full buildd log is here:

https://buildd.debian.org/status/fetch.php?pkg=pvm&arch=riscv64&ver=3.4.6-3.2&stamp=1636477315&raw=0


The patch attached is to fix the issue and I can build it on 
riscv64 arch with it, so please consider to apply it to fix the 
issue, thanks.

-- 
Regards,
--
  Bo YU

diff -Nru pvm-3.4.6/debian/getpvmarch pvm-3.4.6/debian/getpvmarch
--- pvm-3.4.6/debian/getpvmarch	2018-07-24 22:31:14.0 +0800
+++ pvm-3.4.6/debian/getpvmarch	2021-11-10 00:16:02.0 +0800
@@ -48,6 +48,9 @@
 	sh4)
 		echo LINUXSH
 		;;
+	riscv64)
+		echo LINUXRISCV
+		;;
 	*)
 		echo 'Unknown architecture!' 1>&2
 		exit 1;
diff -Nru pvm-3.4.6/debian/patches/27-add-riscv64-support.patch pvm-3.4.6/debian/patches/27-add-riscv64-support.patch
--- pvm-3.4.6/debian/patches/27-add-riscv64-support.patch	1970-01-01 07:30:00.0 +0730
+++ pvm-3.4.6/debian/patches/27-add-riscv64-support.patch	2021-11-10 00:16:02.0 +0800
@@ -0,0 +1,36 @@
+--- /dev/null
 b/conf/LINUXRISCV.def
+@@ -0,0 +1,10 @@
++ARCHCFLAGS =   -DSYSVSIGNAL -DNOWAIT3 -DRSHCOMMAND=\"/usr/bin/rsh\" \
++   -DNEEDENDIAN -DFDSETNOTSTRUCT -DHASERRORVARS \
++   -DCTIMEISTIMET -DSYSERRISCONST -DHASREADLINE
++ARCHDLIB   =
++ARCHDOBJ   =
++ARCHLIB=   -lreadline
++HASRANLIB  =   t
++AR =   ar
++PVM_ARCH   =   LINUXRISCV
++MAKE   =   make
+--- /dev/null
 b/conf/LINUXRISCV.m4
+@@ -0,0 +1,20 @@
++divert(-1)
++undefine(`len')
++#
++# append an underscore to FORTRAN function names
++#
++define(`FUNCTION',`$1_')
++#
++# FORTRAN character strings are passed as follows:
++# a pointer to the base of the string is passed in the normal
++# argument list, and the length is passed by value as an extra
++# argument, after all of the other arguments.
++#
++define(`ARGS',`($1`'undivert(1))')
++define(`SAVE',`divert(1)$1`'divert(0)')
++define(`STRING_ARG',`$1_ptr`'SAVE(`, $1_len')')
++define(`STRING_ARG_DECL',`char * $1_ptr; int $1_len')
++define(`STRING_LEN',`$1_len')
++define(`STRING_PTR',`$1_ptr')
++divert(0)
++
diff -Nru pvm-3.4.6/debian/patches/series pvm-3.4.6/debian/patches/series
--- pvm-3.4.6/debian/patches/series	2020-08-19 22:48:23.0 +0800
+++ pvm-3.4.6/debian/patches/series	2021-11-10 00:16:02.0 +0800
@@ -27,3 +27,4 @@
 26-groff-quote.patch
 -fallow-argument-mismatch-in-examples-Makefile.aimk
 -fallow-argument-mismatch-in-gexamples-Makefile.aimk
+27-add-riscv64-support.patch


signature.asc
Description: PGP signature