Bug#1033953: unblock: gimp-help/2.10.34-1

2023-05-10 Thread Jordi Mallach
Hi!

El dl. 08 de 05 de 2023 a les 22:12 +0200, en/na Paul Gevers va
escriure:
> Control: tags -1 confirmed moreinfo
> s this is a documentation only source package, you can go ahead.
> Please 
> remove the moreinfo tag once it happens and don't wait too long
> please.

Paul, I checked the excuses today and I see it's still not setup.

Just in case this is it: have in mind that the unblock request must be
against 2.10.34-2, instead of -1, as -1 went through NEW via
experimental.

Thanks,
Jordi
-- 
Jordi Mallach 
Debian Project



Bug#1035868: unblock: kernelshark/2.2.0-2

2023-05-10 Thread Sudip Mukherjee
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: sudipm.mukher...@gmail.com

Hi,

Please unblock package kernelshark

Its a simple change to rename the links which fixes the RC bug.

[ Reason ]
It fixes the RC bug.

[ Impact ]
User will not be able to use libkshark.

[ Tests ]
manual tests to confirm symlinks are pointing to the correct file.

[ Risks ]
No risk in unblocking it. :)

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock kernelshark/2.2.0-2


-- 
Regards
Sudip
diff -Nru kernelshark-2.2.0/debian/changelog kernelshark-2.2.0/debian/changelog
--- kernelshark-2.2.0/debian/changelog  2023-02-05 00:47:33.0 +
+++ kernelshark-2.2.0/debian/changelog  2023-05-05 20:37:24.0 +0100
@@ -1,3 +1,9 @@
+kernelshark (2.2.0-2) unstable; urgency=medium
+
+  * Fix symlink names. (Closes: #1035449)
+
+ -- Sudip Mukherjee   Fri, 05 May 2023 20:37:24 
+0100
+
 kernelshark (2.2.0-1) unstable; urgency=medium
 
   * New upstream version 2.2.0
diff -Nru kernelshark-2.2.0/debian/libkshark2.links 
kernelshark-2.2.0/debian/libkshark2.links
--- kernelshark-2.2.0/debian/libkshark2.links   2022-04-26 20:16:02.0 
+0100
+++ kernelshark-2.2.0/debian/libkshark2.links   2023-05-05 20:05:16.0 
+0100
@@ -1,2 +1,2 @@
-usr/lib/${DEB_HOST_MULTIARCH}/libkshark-gui.so.2.0.0 
usr/lib/${DEB_HOST_MULTIARCH}/libkshark-gui.so.2
-usr/lib/${DEB_HOST_MULTIARCH}/libkshark-plot.so.2.0.0 
usr/lib/${DEB_HOST_MULTIARCH}/libkshark-plot.so.2
+usr/lib/${DEB_HOST_MULTIARCH}/libkshark-gui.so.2.2.0 
usr/lib/${DEB_HOST_MULTIARCH}/libkshark-gui.so.2
+usr/lib/${DEB_HOST_MULTIARCH}/libkshark-plot.so.2.2.0 
usr/lib/${DEB_HOST_MULTIARCH}/libkshark-plot.so.2


Bug#1031410: Closing p-u requests for fixes included in 11.7

2023-05-10 Thread Stephan Großberndt

Hi,

at our company we were quite surprised by this seemingly minor update 
3.1.1+dfsg-1+deb11u1, because it completely broke an application: Due to 
the change the x and y axis are now inverted when converting coordinates 
to EPSG 31466:


Before (this output is from 11.19, but was like this on 13 before as well):

SELECT geometry,ST_AsGeoJSON(ST_Transform(ST_SetSRID(geometry, 3857), 
31466)) FROM osm_car_sharing_node LIMIT 1;
  geometry  | 
 st_asgeojson

+
 010120110F04F0844A1349264120ED527FE9DD5841 | 
{"type":"Point","coordinates":[2539841.86185744,5586869.51937972]}

(1 row)


Now:

SELECT geometry, ST_AsGeoJSON(ST_Transform(ST_SetSRID(geometry, 3857), 
31466)) FROM osm_car_sharing_node LIMIT 1;
-[ RECORD 1 
]+--

geometry | 010120110F04F0844A1349264120ED527FE9DD5841
st_asgeojson | 
{"type":"Point","crs":{"type":"name","properties":{"name":"EPSG:31466"}},"coordinates":[5586869.519378289,2539841.861857439]}


I understand the rationale for the change in general, but in my opinion 
such a major change really should not be part of such a minor update.


Is there an option to fix this apart from changing all queries?

Regards,
Stephan Großberndt



Bug#1035879: unblock: mozjs102/102.10.0-1

2023-05-10 Thread Jeremy Bícha
Package: release.debian.org
Control: affects -1 + src:mozjs102
X-Debbugs-Cc: mozjs...@packages.debian.org
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package mozjs102 and reduce the days required to reach Testing.

[ Reason ]
The new mozjs102 stable point release includes multiple security fixes.

- CVE-2023-32211: Content process crash due to invalid wasm code
- CVE-2023-32215: Memory safety bugs

I included more in debian/changelog but those affected Firefox ESR,
not mozjs specifically. Sorry.

[ Impact ]
mozjs102 is only used by gjs which in turn is used by GNOME Shell and
several GNOME apps written in JavaScript.

[ Tests ]
The build tests have passed successfully and the gjs autopkgtests
triggered by this upload have passed too. (mozjs102 itself
does not have autopkgtests yet).

I also completed the manual test cases from
https://wiki.ubuntu.com/DesktopTeam/TestPlans/gjs
on Debian Testing.

[ Risks ]

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

[ Other info ]
mozjs102 is the SpiderMonkey JavaScript engine from the current
Firefox ESR stable branch. There are monthly releases until the end of August.

https://whattrainisitnow.com/calendar/

I am unaware of anyone using Firefox vulnerabilities to attack GNOME
Shell, but I think it's good to be prudent and apply available
security updates. I don't think the Debian Security Team has done
security uploads for mozjs*, in part because Mozilla's lifecycle is so
short that it's difficult for an upstream supported mozjs to be in a
Debian stable release.

For more info about the commits, see the Github mirror:
https://github.com/mozilla/gecko-dev/commits/esr102/js

unblock mozjs102/102.11.0-1

Thank you,
Jeremy Bicha


mozjs-102.11.debdiff
Description: Binary data


Processed: unblock: mozjs102/102.10.0-1

2023-05-10 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:mozjs102
Bug #1035879 [release.debian.org] unblock: mozjs102/102.10.0-1
Added indication that 1035879 affects src:mozjs102

-- 
1035879: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035879
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1035882: nmu: pvpgn_1.8.5-3

2023-05-10 Thread Adrian Bunk
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
Control: block 1034224 by -1

nmu pvpgn_1.8.5-3 . ANY . unstable . -m "Rebuild with fixed debhelper 
installing pvpgn.service to the correct place"


Files in second .deb but not in first
-
-rw-r--r--  root/root   /lib/systemd/system/pvpgn.service
-rwxr-xr-x  root/root   DEBIAN/preinst

Files in first .deb but not in second
-
-rw-r--r--  root/root   /usr/lib/systemd/system/pvpgn.service


See #1034224 for background.



Processed: nmu: pvpgn_1.8.5-3

2023-05-10 Thread Debian Bug Tracking System
Processing control commands:

> block 1034224 by -1
Bug #1034224 [pvpgn] pvpgn: dh_installsystemd doesn't handle files in 
/usr/lib/systemd/system
1034224 was not blocked by any bugs.
1034224 was not blocking any bugs.
Added blocking bug(s) of 1034224: 1035882

-- 
1034224: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034224
1035882: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035882
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#1035757: unblock: org-mode/9.5.2+dfsh-5

2023-05-10 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 - moreinfo
Bug #1035757 [release.debian.org] unblock: org-mode/9.5.2+dfsh-5
Removed tag(s) moreinfo.

-- 
1035757: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035757
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1035757: unblock: org-mode/9.5.2+dfsh-5

2023-05-10 Thread Sean Whitton
control: tag -1 - moreinfo

Hello,

Thanks for looking.

On Mon 08 May 2023 at 09:33PM +02, Paul Gevers wrote:

> What's the plan for the future? Is this a one-off exercise or do you
> intent to pull this trick more often?

We don't have a real plan for the future, aside from trying to keep
these packages up-to-date.  It would be good to have a script that we
could run right after uploading new versions of Emacs, that would find
addons that are now behind.
So, we'd like it to be one-off, but due to limited manpower on the team,
I can't pretend that it couldn't happen again.

Ultimately I think that the correct fix is for Emacs to learn to load
the version of the package that has the highest version number.
So, I think this is, at bottom, an upstream limitation.  But I might be
wrong about that.

> IIRC other ecosystems (like ruby) have the main package also
> (versioned) Provides these add-ons, such that when packages Depend on
> it, the main package can provide it without needing the add-on. That
> way, you could prevent shipping the package in a stable release when
> it's behind and have a newer version if it's available. Has such a
> scheme been considered? If yes, what's the drawback?

We haven't considered it.  It would be a case of writing a script to
generate the required Provides values from the Emacs source.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Bug#1031410: Closing p-u requests for fixes included in 11.7

2023-05-10 Thread Stephan Großberndt

Hi,

after further investigation this looks more like a bug in the backport.

At first I thought the change was about flipping x and y for all 
coordinate systems except those containing "lat/lon", which did not make 
much sense to me, but I would have been willing to accept this.


But apparently this flip is only in this PostGIS 3.1.1+dfsg-1+deb11u1 
version, earlier and later PostGIS versions correctly return x as x and 
y as y.


For this query:

SELECT 
ST_AsGeoJSON(ST_Transform(ST_SetSRID('010120110F04F0844A1349264120ED527FE9DD5841'::geometry, 
3857), 31466));


the following versions correctly return x=2539841,y=5586869:

- PostgresQL 11 with PostGIS 2.5.1+dfsg-1 from Debian Sources
- PostgresQL 11 with PostGIS 2.5.5+dfsg-1.pgdg100+2 from PostgreSQL Sources
- PostgresQL 13 with PostGIS 3.1.1+dfsg-1 from Debian Sources
- PostgresQL 13 with PostGIS 3.3.2+dfsg-1.pgdg110+1 from Debian Sources


Only

- PostgresQL 13 with PostGIS 3.1.1+dfsg-1+deb11u1 from Debian Sources

incorrectly returns x=5586869,y=2539841

Should I file another bug report for this?

Regards,
Stephan Großberndt



Bug#1035894: unblock: desktop-base/12.0.6

2023-05-10 Thread Aurélien COUDERC
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: desktop-b...@packages.debian.org, debian-desk...@lists.debian.org
Control: affects -1 + src:desktop-base

Dear Release Team,

please unblock package desktop-base.

[ Reason ]
It fixes a bug where Pymouth messages and prompts don’t get displayed
for some screen size and ratio combinations.

[ Impact ]
- Users won’t see the password prompt for LUKS encrypted volumes on boot
  in certain screen configurations. (#1032412)
- The « remove media press enter to reboot » message isn’t shown after
  initial installation.

[ Tests ]
I tested that there are no regression on single screen use cases and
both the original reporter and a second person confirmed the fix on
their multi-screen / multi-ratio configurations.

[ Risks ]
No risk identified, the patch is small and localised the new code
underwent more tests in more configurations that the one currently in
testing.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]
Thanks for your work on the release !

unblock desktop-base/12.0.6
diff -Nru desktop-base-12.0.5/debian/changelog 
desktop-base-12.0.6/debian/changelog
--- desktop-base-12.0.5/debian/changelog2023-03-01 23:22:32.0 
+0100
+++ desktop-base-12.0.6/debian/changelog2023-04-13 21:58:23.0 
+0200
@@ -1,3 +1,10 @@
+desktop-base (12.0.6) unstable; urgency=medium
+
+  * Fix LUKS password not being shown in multi-screen setup with mixed aspect
+ratios.
+
+ -- Aurélien COUDERC   Thu, 13 Apr 2023 21:58:23 +0200
+
 desktop-base (12.0.5) unstable; urgency=medium
 
   * Make the GDM Debian footer slightly smaller.
diff -Nru desktop-base-12.0.5/emerald-theme/plymouth/emerald.script 
desktop-base-12.0.6/emerald-theme/plymouth/emerald.script
--- desktop-base-12.0.5/emerald-theme/plymouth/emerald.script   2023-03-01 
23:01:49.0 +0100
+++ desktop-base-12.0.6/emerald-theme/plymouth/emerald.script   2023-04-13 
21:58:23.0 +0200
@@ -119,7 +119,8 @@
 #Debug("y = " + y);
 
 text_height = first_line_height * 7.5;
-min_height = window_max.height - 2 * first_line_height;
+# subtract Window.GetY() to show info also at smallest of dual srceens
+min_height = window_max.height - 2 * first_line_height - Window.GetY();
 #Debug("text_height=" + text_height + "; min_height=" + min_height);
 
 if (y + text_height > min_height)
@@ -131,8 +132,8 @@
 
 #- Screen/window setup ---
 # Compute screen/image ratio and scale the background accordingly
-window_max.width = Window.GetX() * 2 + Window.GetWidth();
-window_max.height = Window.GetY() * 2 + Window.GetHeight();
+window_max.width = Window.GetWidth();
+window_max.height = Window.GetHeight();
 screen_ratio = window_max.width / window_max.height;
 small_dimension = Math.Min(window_max.width, window_max.height);
 #Debug("Window.GetX():" + Window.GetX() + ", Window.GetY():" + Window.GetY());


Processed: unblock: desktop-base/12.0.6

2023-05-10 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:desktop-base
Bug #1035894 [release.debian.org] unblock: desktop-base/12.0.6
Added indication that 1035894 affects src:desktop-base

-- 
1035894: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035894
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1035898: unblock: chrony/4.3-2+deb12u1

2023-05-10 Thread Vincent Blut
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: chr...@packages.debian.org
Control: affects -1 + src:chrony

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi,

Please unblock package chrony

[ Reason ]
This softens a rule in the AppArmor profile. Currently, the profile is way too
strict about allowed gpsd socket names.

[ Impact ]
Users may need to override the AppArmor profile (or put the profile in complain 
mode) so that chronyd can consume time information from gpsd using sockets.
Overriding an AppArmor profile is acceptable when dealing with some exotic
configurations, but here even trying to feed chronyd with something as common
as PPS samples would be denied by the profile.

[ Tests ]
I checked that chronyd was able to receive PPS samples from gpsd through a
Unix socket driver using the '/run/chrony.pps0.sock' path. This is no longer
denied with chrony 4.3-2+deb12u1.

[ Risks ]
None that I know of.

[ Checklist ]
  [✓] all changes are documented in the d/changelog
  [✓] I reviewed all changes and I approve them
  [✓] attach debdiff against the package in testing

[ Other info ]
I must admit that the version number is atypical for an upload to unstable but
chrony 4.3-3 is already in experimental.

unblock chrony/4.3-2+deb12u1


-BEGIN PGP SIGNATURE-

iHUEARYKAB0WIQSRJQjHKbAUfuoc+DAQn1qAt/bgAQUCZFv+fQAKCRAQn1qAt/bg
ATptAQDKB1vG2CXDXkwW1dGb9l3GFwua+oeoc1qOm3LNhqNfSgD/ZBld8s8e1XSD
QXFm/ZXjxKXIkU+1m8TaS5JL5oRWDwk=
=uMJh
-END PGP SIGNATURE-
diff -Nru chrony-4.3/debian/changelog chrony-4.3/debian/changelog
--- chrony-4.3/debian/changelog 2023-01-27 22:51:17.0 +0100
+++ chrony-4.3/debian/changelog 2023-05-08 22:05:00.0 +0200
@@ -1,3 +1,13 @@
+chrony (4.3-2+deb12u1) unstable; urgency=medium
+
+  * debian/usr.sbin.chronyd:
+- Modify the AppArmor profile to allow more gpsd socket names. This will
+avoid the need for users to override the profile to let chronyd consume PPS
+samples or serial time supplied by gpsd over a Unix-domain socket.
+Thanks to Ryan Govostes for the report. (Closes: #1034519)
+
+ -- Vincent Blut   Mon, 08 May 2023 22:05:00 +0200
+
 chrony (4.3-2) unstable; urgency=medium
 
   * debian/control:
diff -Nru chrony-4.3/debian/usr.sbin.chronyd chrony-4.3/debian/usr.sbin.chronyd
--- chrony-4.3/debian/usr.sbin.chronyd  2023-01-27 22:51:17.0 +0100
+++ chrony-4.3/debian/usr.sbin.chronyd  2023-05-08 22:05:00.0 +0200
@@ -59,7 +59,7 @@
   # Configs using a 'chrony.' prefix like the tempcomp config file example
   /etc/chrony.* r,
   # Example gpsd socket is outside @{run}/chrony/
-  @{run}/chrony.tty{,*}.sock rw,
+  @{run}/chrony.*.sock rw,
   # To sign replies to MS-SNTP clients by the smbd daemon
   /var/lib/samba/ntp_signd/socket rw,
 


Processed: unblock: chrony/4.3-2+deb12u1

2023-05-10 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:chrony
Bug #1035898 [release.debian.org] unblock: chrony/4.3-2+deb12u1
Added indication that 1035898 affects src:chrony

-- 
1035898: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035898
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1035911: [pre-approval] unblock: dpkg/1.21.22

2023-05-10 Thread Guillem Jover
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: d...@packages.debian.org
Control: affects -1 + src:dpkg

Hi!

Please pre-approve the dpkg 1.21.22 upload.

[ Reason ]

I got a report for a segfault privately (as the reporter was unsure
whether this constituted a security issue, which IMO it does not),
which is rather easy to trigger for packages that are known to dpkg,
but are not installed, such as virtual packages or references from
Recommends or Suggests.

I've also cherry picked a translation addition that was already in git
HEAD (targeting 1.22.x).

[ Impact ]

An easy to trigger segfault, which also affects dpkg 1.20.x (for which
I'll be preparing a stable release request).

[ Tests ]

The test suite has been updated to cover this case. And it's also easy
to reproduce with dpkg-query, for example on a minimal chroot, with:

  $ dpkg-query -f '${source:Upstream-Version}\n' -W firefox-esr
  Segmentation fault (core dumped)

[ Risks ]

The fix is trivial, so the risk seems low to me.

[ Checklist ]

  [√] all changes are documented in the d/changelog
  [√] I reviewed all changes and I approve them
  [√] attach debdiff against the package in testing

[ Other info ]

(I had in mind also including an addition for the riscv32 port, but
given that there's no consensus among the porters about its ABI or
even its mere existence, and time is running out, I'll postpone that,
and might include it instead in a future stable release if necessary.)

Attached the unfiltered debdiff, you might want to filterdiff with:

  xzcat dpkg-1.21.21-1.21.22.debdiff.xz |
filterdiff --exclude '*.po' --exclude '*.pot' \
   --exclude '*/man/*/*.pod' \
   --exclude '*/testsuite' --exclude '*/at/*.m4' \
   --exclude '*/configure'

unblock dpkg/1.21.22

Thanks,
Guillem


dpkg-1.21.21-1.21.22.debdiff.xz
Description: application/xz


Processed: [pre-approval] unblock: dpkg/1.21.22

2023-05-10 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:dpkg
Bug #1035911 [release.debian.org] [pre-approval] unblock: dpkg/1.21.22
Added indication that 1035911 affects src:dpkg

-- 
1035911: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035911
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1031410: Closing p-u requests for fixes included in 11.7

2023-05-10 Thread Sebastiaan Couwenberg

> Should I file another bug report for this?

Yes.

On unstable:

gis=# SELECT 
ST_AsGeoJSON(ST_Transform(ST_SetSRID('010120110F04F0844A1349264120ED527FE9DD5841'::geometry, 
3857), 31466));
 st_asgeojson 


---

{"type":"Point","crs":{"type":"name","properties":{"name":"EPSG:31466"}},"coordinates":[2539841.861857439,5586869.519378289]}
(1 row)

On bullseye:

bagv2=# SELECT 
ST_AsGeoJSON(ST_Transform(ST_SetSRID('010120110F04F0844A1349264120ED527FE9DD5841'::geometry, 
3857), 31466));

 st_asgeojson
---

{"type":"Point","crs":{"type":"name","properties":{"name":"EPSG:31466"}},"coordinates":[5586869.519378289,2539841.861857439]}
(1 row)

Kind Regards,

Bas

--
 GPG Key ID: 4096R/6750F10AE88D4AF1
Fingerprint: 8182 DE41 7056 408D 6146  50D1 6750 F10A E88D 4AF1



Bug#1035710: doc-debian 11.0 changed /usr/share/doc-base/ paths

2023-05-10 Thread Johannes Schauer Marin Rodrigues
Package: doc-debian
Version: 11.0
Severity: normal

Hi,

On Mon, 8 May 2023 07:46:09 +0200 Joost van =?utf-8?Q?Baal-Ili=C4=87?= 
 wrote:
> [ Risks ] None.  The doc-debian package is a key package due to Priority:
> standard.  It acts as a leaf package: Its only true reverse depends is the
> live-task-standard package.[reverse-depends]

you are forgetting packages using doc-debian in their autopkgtests.

> [ Other info ] I made a mistake uploading doc-debian 11.0 to unstable; that
> got accepted.  The version 11.1 is now available from
> http://mdcc.cx/tmp/doc-debian/ .  I've incorporated some small cosmetic
> changes next to the much needed document updates.  Attached is a 161 kB
> doc-debian_6.5-11.1.dsc-debdiff , as well as a summarizing 13kB
> doc-debian_6.5-11.1.dsc-debdiff-tldr .

Before your upload of 11.0, doc-debian contained:

/usr/share/doc-base/debian-constitution-text
/usr/share/doc-base/debian-mailing-lists
/usr/share/doc-base/debian-manifesto
/usr/share/doc-base/debian-reporting-bugs
/usr/share/doc-base/debian-social-contract

Then with 11.0 this became:

/usr/share/doc-base/doc-debian.debian-constitution-text
/usr/share/doc-base/doc-debian.debian-mailing-lists
/usr/share/doc-base/doc-debian.debian-manifesto
/usr/share/doc-base/doc-debian.debian-reporting-bugs
/usr/share/doc-base/doc-debian.debian-social-contract

This broke the autopkgtest of mmdebstrap which you can also see on the excuses
page for doc-debian: https://qa.debian.org/excuses.php?package=doc-debian

Since I noticed this breakage, I uploaded a new version of mmdebstrap that
works around this problem, assuming that this change was intentional. In
hindsight, I probably should've contacted you instead because when
investigating http://mdcc.cx/tmp/doc-debian/doc-debian_11.1_all.deb and
comparing it to the version from unstable I see:

diff -u <(curl --silent 
http://ftp.de.debian.org/debian/pool/main/d/doc-debian/doc-debian_11.0_all.deb 
| dpkg-deb -c - | awk '{print $6}' | sort) <(curl --silent 
http://mdcc.cx/tmp/doc-debian/doc-debian_11.1_all.deb | dpkg-deb -c - | awk 
'{print $6}' | sort)
--- /dev/fd/63  2023-05-11 08:18:34.782823397 +0200
+++ /dev/fd/62  2023-05-11 08:18:34.782823397 +0200
@@ -3,11 +3,11 @@
 ./usr/share/
 ./usr/share/doc/
 ./usr/share/doc-base/
-./usr/share/doc-base/doc-debian.debian-constitution-text
-./usr/share/doc-base/doc-debian.debian-mailing-lists
-./usr/share/doc-base/doc-debian.debian-manifesto
-./usr/share/doc-base/doc-debian.debian-reporting-bugs
-./usr/share/doc-base/doc-debian.debian-social-contract
+./usr/share/doc-base/debian-constitution-text
+./usr/share/doc-base/debian-mailing-lists
+./usr/share/doc-base/debian-manifesto
+./usr/share/doc-base/debian-reporting-bugs
+./usr/share/doc-base/debian-social-contract
 ./usr/share/doc/debian/
 ./usr/share/doc/debian/bug-log-access.txt
 ./usr/share/doc/debian/bug-log-mailserver.txt.gz

What are the intended paths. Should I revert my changes to mmdebstrap or not?

Also, these changes of paths in /usr/share/doc-base/ forth and back are not
recorded in debian/changelog. If the change was intended, please document it.

Thanks!

cheers, josch

signature.asc
Description: signature


Processed: unblock: node-asn1.js/5.4.1-4

2023-05-10 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:node-asn1.js
Bug #1035915 [release.debian.org] unblock: node-asn1.js/5.4.1-4
Added indication that 1035915 affects src:node-asn1.js

-- 
1035915: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035915
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems