I wrote this problem up in some detail on my blog:
https://www.chiark.greenend.org.uk/~cjwatson/blog/activity-2025-07.html
Thanks again for the timely report!
--
Colin Watson (he/him) [cjwat...@debian.org]
On Sun, Aug 03, 2025 at 06:02:09PM +, Jelmer Vernooij wrote:
On Fri, Aug 01, 2025 at 12:38:09AM +0100, Colin Watson wrote:
I noticed that you tagged https://salsa.debian.org/python-team/packages/dulwich/-/tags/debian%2F0.22.7-2
nearly a month ago, but it doesn't seem to have made it t
users who upgrade in the coming days.
Thanks!
On Fri, Aug 01, 2025 at 12:06:50PM +0100, Colin Watson wrote:
I haven't tested this as yet, but do you think it would be better? It
seemed clearest to use the same condition in the preinst and postinst, but I
could be persuaded either way.
I&
On Wed, Jul 30, 2025 at 03:22:29PM +, Ivo De Decker wrote:
On Mon, Jul 28, 2025 at 12:54:40PM +0100, Colin Watson wrote:
The self-diversion approach is a bit alarming, but it limits the scope
of the workaround code to just the affected upgrade scenarios, and the
code is mechanically simple
hanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
otherwise.
--
Colin Watson (he/him) [cjwat...@debian.org]
otherwise this LGTM. Thanks!
--
Colin Watson (he/him) [cjwat...@debian.org]
ec openssh-upgrade -- adduser --disabled-password --comment 'Colin
Watson' cjwatson
$ incus file push -p --uid 1000 --gid 1000 --mode=600 .ssh/id_ed25519.pub
openssh-upgrade/home/cjwatson/.ssh/authorized_keys
$ dcmd incus file push openssh_9.2p1-2+deb12u7_amd64.changes
openssh-upgrade/
sh-upgrade -- adduser --disabled-password --comment 'Colin
Watson' cjwatson
$ incus file push -p --uid 1000 --gid 1000 --mode=600 .ssh/id_ed25519.pub
openssh-upgrade/home/cjwatson/.ssh/authorized_keys
Then run "while :; do date -Ins; ssh openssh-upgrade.incus true; sleep
0.1; done&q
de.service - Daily
apt upgrade and clean activities.
Jul 24 06:07:15 riva systemd[1]: apt-daily-upgrade.service: Consumed 3.379s
CPU time, 365.9M memory peak.
I couldn't immediately see which part of that service would be
responsible for this, but I'm guessing it's not beha
obviously have to agree with that suggestion).
But IMHO stable-updates would be a perfect candidate for this usecase,
correct?
I think I'd somehow managed to miss that SUAs were a thing. Yes, if the
release team is happy with that then it sounds fine to me.
Thanks,
--
Colin Watson (h
Control: affects -1 openssh-server
[TL;DR: I think it may not be possible to properly solve this without a
bookworm update as well as a change to trixie.]
On Thu, Jul 24, 2025 at 01:19:40PM +0100, Colin Watson wrote:
On Tue, Jul 22, 2025 at 07:42:07PM +0200, Manfred Stock wrote:
Further
is, but my best
idea for now is to have openssh-server.preinst take a copy of the old
sshd binary before dpkg unpacks the new files, and patch sshd to re-exec
that copy if it exists and it receives the -R option. The postinst can
then remove the copy after it's restarted the new ss
use Data::Dumper;
use Dpkg::Path qw(find_command);
use File::Basename;
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
On Mon, Jul 21, 2025 at 11:30:37PM +0200, Santiago Vila wrote:
On Mon, Jul 21, 2025 at 10:05:52PM +0100, Colin Watson wrote:
I think the python-icalendar change was correct: python-icalendar doesn't
really need pytz any more (it just has some affordances for the case where
pytz is inst
orrectly fall
back to the pre-7.8 logic, but that's what's already happening.
[ Checklist ]
[x] all changes are documented in the d/changelog
[x] I reviewed all changes and I approve them
[x] attach debdiff against the package in testing
unblock paramiko/3.
s and I approve them
[x] attach debdiff against the package in testing
unblock afew/3.0.1-8
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
diff -Nru afew-3.0.1/debian/changelog afew-3.0.1/debian/changelog
--- afew-3.0.1/debian/changelog 2025-03-15 20:35:00.
dpm
respectively, you can use both modes (with or without an additional
parent) with either tool.
I hope this is helpful. Let me know if you need any extra help getting
your heads around pristine-tar and the associated workflows; I'm not
really an implementation expert, but I'm a proficient user and can
probably help to bridge any remaining gaps.
--
Colin Watson (he/him) [cjwat...@debian.org]
angelog". I retried with "dgit -v0.11.1
push-source" and that worked fine, but git-debpush seems to have no
equivalent option. Perhaps one could be added?
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
--- Begin Message ---
job id: 312
url
d all changes and I approve them
[x] attach debdiff against the package in testing
unblock python-urllib3/2.3.0-3
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
diff -Nru python-urllib3-2.3.0/debian/changelog
python-urllib3-2.3.0/debian/changelog
--- p
e-kate-perl,
libgeo-ip-perl
(This matches the setting of dbc_dbtypes in debian/pnopaste.config.
There might be other possible fixes involving setting some more dbc_*
variables, but this seemed like the simplest approach.)
--
Colin Watson (he/him) [cjwat...@debian.org]
On Thu, Jul 17, 2025 at 02:03:37PM +0100, Colin Watson wrote:
On Thu, Jul 17, 2025 at 01:33:12PM +0200, Paul Gevers wrote:
Seeing this is a permission issue, is debusine's autopkgtest always
failing on debusine infrastructure? I assume so. As the release date
is getting close, can we hav
It's likely because of insufficient isolation of some kind, since those
test cases require either a privileged container or a VM, and Debusine
doesn't necessarily pick the right defaults for that sort of thing at
the moment. It should work on ci.debian.net, so please just ignore this
failure
:
journalmatch = _SYSTEMD_UNIT=ssh.service + _COMM=sshd
This is a duplicate of #1078208, already fixed in trixie but apparently
not yet in bookworm.
--
Colin Watson (he/him) [cjwat...@debian.org]
were a few changes to tests and documentation not mentioned in
debian/changelog, whose purpose was to fix failures in bits of our CI
that deliberately test against external resources. "git log" for those
follows:
commit 565e5cf043430da9f7ad910f10cce7e484750ac4
Author: Colin Watson
Date:
erfectly fine in that context,
but it's too specific for something like this as neither madison-lite
nor rmadison care whether the archive is managed by dak.
"debian-archive-ls" is cumbersome, and also too specific since e.g.
"rmadison -u ubuntu" is
Control: affects -1 sudo
On Mon, Jun 30, 2025 at 11:44:17PM +0100, Colin Watson wrote:
+sudo: a remote host may only be specified when listing privileges.
Well, it's definitely due to the new sudo, since it has this change in
the patch for CVE-2025-32462, backported from
https://githu
port REPROTEST_UMASK=$(umask) && \
+sudo -h localhost -E nsenter
--uts=/tmp/reprotest.A2zxWh/build-experiment-1-aux/ns-uts sudo -h localhost -E
-u salsa-ci -g users env -u SUDO_COMMAND -u SUDO_GID -u SUDO_UID -u SUDO_USER \
+sudo -h localhost -E -u salsa-ci env -u SUDO_COMMAND -u
stead. openssh-server's dependencies allow that (since it Provides:
systemd-sysusers).
--
Colin Watson (he/him) [cjwat...@debian.org]
that.
Colin, yes, that sounds like a very reasonable path. Please, let me
know if I can handle something.
python3-typing-extensions | 4.13.2-1~bpo12+1 | stable-backports| all
Can you make whatever dependency changes are needed in python3-tango?
Thanks,
--
Colin Watson (he/him
On Wed, Jun 18, 2025 at 03:23:45PM -0300, Santiago Ruano Rincón wrote:
El 18/06/25 a las 13:18, Colin Watson escribió:
I would be reasonably happy to organize a backport of
python-typing-extensions, though it would probably need some work to check
for regressions in reverse-dependencies
to depend on
mmdebstrap (>= 1.4.1) (since there's a newer mmdebstrap in
bookworm-backports).
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
-- System Information:
Debian Release: 13.0
APT prefers testing-security
APT policy: (500,
kage in testing
unblock putty/0.83-3
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
diff -Nru putty-0.83/debian/.git-dpm putty-0.83/debian/.git-dpm
--- putty-0.83/debian/.git-dpm 2025-02-13 13:00:34.0 +
+++ putty-0.83/debian/.git-dpm 2025-
deliberate user change), but you can override that using
--force-confmiss.
--
Colin Watson (he/him) [cjwat...@debian.org]
uot;", line 1, in
apt_pkg.open_maybe_clear_signed_file(release_path)
^^
SystemError: argument 1 (unspecified)
>>> apt_pkg.open_maybe_clear_signed_file(release_path.as_posix())
6
It would be nice if this work
n about this on Matrix, and he suggested that it
shouldn't be too hard to allow KeepCompressedAs to take a value of
"archive" to preserve the fetched compression format.
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
-- Package-specific info:
-- a
em
like a reasonable path to you?
--
Colin Watson (he/him) [cjwat...@debian.org]
goes wrong with them.
I'd support this unblock; it's certainly gross, but it seems better than
the alternative.
--
Colin Watson (he/him) [cjwat...@debian.org]
flaky (despite being async). Could you please check
to see whether you can still reproduce this?
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
out the intended purpose of a group, so it's easy for
a sysadmin or a piece of third-party software to start using a group
for an unintended purpose, and I think that's what has happened here.
... so I don't know exactly where.
--
Colin Watson (he/him) [cjwat...@debian.org]
cho ${NAME:-Debian} ) 2>/dev/null ||
echo Debian`
causes menuentry lines like
menuentry 'Debian GNU/Linux GNU/Linux'
The double "GNU/Linux" looks really bad.
This seems to be a duplicate of #1076723, which is fixed in unstable.
Thanks,
--
Colin Watson (he/him)
ibuteError: type object 'Plugins' has no attribute 'load_plugins'
Since this is a key package and so my fix won't migrate on its own, I
filed https://bugs.debian.org/1107612 to unblock it.
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
viewed all changes and I approve them
[x] attach debdiff against the package in testing
unblock python-covdefaults/2.3.0-3
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
diff -Nru python-covdefaults-2.3.0/debian/changelog
python-covdefaults-2.3.0/debian/ch
On Fri, Jun 06, 2025 at 02:22:30PM +0200, intrigeri wrote:
Colin Watson (2025-06-05):
Can you see if the attached patch works [...]?
It does work!
Thanks for the lightning fast turnaround.
Once this is fixed in sid, if you would like someone else to take care
of the unblock request, please
in testing
unblock pdfarranger/1.11.1-3
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
diff -Nru pdfarranger-1.11.1/debian/changelog
pdfarranger-1.11.1/debian/changelog
--- pdfarranger-1.11.1/debian/changelog 2025-02-13 18:51:09.0 +
+++ pdfarrang
t._name
So pdfarranger probably needs to call
multiprocessing.set_start_method('spawn') before it calls
multiprocessing.freeze_support()? Can you see if the attached patch
works (you can just apply it directly to
/usr/lib/python3/dist-packages/pdfarranger/pdfarranger.py for now - if
it works t
On Fri, May 30, 2025 at 12:32:25AM +0100, Colin Watson wrote:
On Tue, May 20, 2025 at 05:42:57PM +0100, Colin Watson wrote:
I'm just pinging this bug to avoid autoremoval kicking in before
follow-up versions have time to migrate to testing:
And again:
And one more bump.
own judgement!
[ Checklist ]
[x] all changes are documented in the d/changelog
[x] I reviewed all changes and I approve them
[x] attach debdiff against the package in testing
unblock groff/1.23.0-9
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
diff -Nru g
On Sun, Jun 01, 2025 at 01:11:24AM +0100, Colin Watson wrote:
https://savannah.gnu.org/bugs/index.php?67169 reported that the .UR man
macro drops URLs in PDF output; the upstream bug has a reproducer. This
turns out to be because a Debian patch
(https://salsa.debian.org/debian/groff/-/blob
ing to use hyperlinks for PDF output.
--
Colin Watson (he/him) [cjwat...@debian.org]
-- System Information:
Debian Release: 13.0
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 6.12.27-amd64 (SMP w/12 CPU thre
On Sat, May 31, 2025 at 09:53:13AM +0200, Pascal Hambourg wrote:
On 30/05/2025 at 13:01, Colin Watson wrote:
If it's a non-trivial bug, why did you file it as Severity: minor?
https://www.debian.org/Bugs/Developer#severities - "a problem which
doesn't affect the package'
On Fri, May 30, 2025 at 12:11:44PM +0200, Pascal Hambourg wrote:
On 17/04/2025 at 21:51, Colin Watson wrote:
libparted wrongly detects ext4 without journal as ext2 instead of ext4.
(...)
This bug affects the debian installer partitioning tool, partman, which
relies on libparted to detect
we need to be able to get at when we don't have much else available.
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
On Tue, May 20, 2025 at 05:42:57PM +0100, Colin Watson wrote:
I'm just pinging this bug to avoid autoremoval kicking in before
follow-up versions have time to migrate to testing:
And again:
austin (3.7.0-4) unstable; urgency=medium
* Disable austinp test on riscv64 for now.
--
ts to try getting this change into trixie?
I agree. Thanks for the analysis. I've uploaded this, and I think its
autopkgtest situation is such that it should be able to migrate to
trixie without needing a freeze exception (though I'll ask for one if
needed).
--
Colin
d cleanly now. Based on the errors, I suspect that it may have been
fixed by something like a change in eckit, rather than having been a
problem in magics++. Could you please check whether it still fails for
you?
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
tures (closes:
#1106149).
* autopkgtest: Disable austinp test for most architectures
-- Colin Watson Tue, 20 May 2025 17:40:41 +0100
austin (3.7.0-2) unstable; urgency=medium
* Switch back to Architecture: any.
-- Colin Watson Thu, 15 May 2025 18:08:53 +0100
--
Colin Watson (h
On Mon, May 19, 2025 at 11:45:40AM +0300, Martin-Éric Racine wrote:
su 11.5.2025 klo 18.33 Martin-Éric Racine (martin-eric.rac...@iki.fi) kirjoitti:
su 11.5.2025 klo 17.17 Colin Watson (cjwat...@debian.org) kirjoitti:
> On Sat, May 10, 2025 at 12:34:34PM +0300, Martin-Éric Racine wr
y has superficial autopkgtests (and I didn't really
want to change that in an NMU), this fix won't migrate to testing on its
own. However, the tests are at least run at build time.
unblock python-click-option-group/0.5.6-1.1
Thanks,
--
Colin Watson (he/him)
tivity on this bug that's been open since January, I'm
going to go ahead and NMU a backport of the upstream change; I'm
guessing the maintainer will probably prefer that over their package
being removed from trixie.
Thanks,
--
Colin Watson (he/him)
; and 'pattern-item' tags. These special
characters cause the failure of the following validation scripts
during installation: 'apertium-validate-lrx',
'apertium-validate-interchunk' and 'apertium-validate-transfer'"
unblock apertium-oci-fra/1.0.
eek for an unblock for this. I
obviously have a bias here, but IMO 1:10.0p1-5 is pretty clearly better
than 1:10.0p1-2 and there doesn't seem to be a particular reason to
wait.
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
were in fact the canary in the coalmine), but they
do provide decent assurance that openssh still works in general.
unblock openssh/1:10.0p1-5
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
diff -Nru openssh-10.0p1/debian/changelog openssh-10.0p1/debian/chang
d I'd much
rather wait until at least version 1:10.0p1-3 is in testing since the
current version in testing has an RC bug.
No promises about bullseye; it will depend on how the test suite looks
there, and the rationale you give only really seems to apply to
bookworm.
--
Colin
On Thu, May 08, 2025 at 11:02:01AM -0700, Chris Lamb wrote:
Hi Colin,
I noticed you apparently tried to upload 3:4.2.21-1 for this yesterday
(judging from git), but I don't see it on
https://tracker.debian.org/pkg/python-django nor in the ftp-master logs.
Could you check whether the uploa
efore= dependency on the service
units they activate.
But adding just Requires= on its own sounds reasonable. I'll wait for
confirmation from Antoine that that works, but if so then I'm willing to
try to get this into trixie.
--
Colin Watson (he/him) [cjwat...@debian.org]
ython-django nor in the ftp-master logs.
Could you check whether the upload got lost somewhere?
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
oduce
this bug, and tracked it down to the --with-linux-memlock-onfault
configure option. I forwarded this to
https://bugzilla.mindrot.org/show_bug.cgi?id=3822.
I'm going to disable this option again for now, as it's a recent
addition and isn't security-critical.
--
tever server logs you can find.
--
Colin Watson (he/him) [cjwat...@debian.org]
On Wed, Apr 30, 2025 at 09:52:18PM +0100, Colin Watson wrote:
I'm trying to get my test system closer to yours, but no luck so far.
The best I've been able to come up with is an overlap between source
and destination in a strlcpy call, which should probably be fixed,
I f
On Wed, Apr 30, 2025 at 05:23:19PM +0200, Michel Casabona wrote:
Le 30/04/2025 à 14:48, Colin Watson a écrit :
Could you drop --leak-check=full from the valgrind call, and instead add
--main-stacksize=67108864 (i.e. eight times the current value)? Then
provoke the bug again and send me the new
On Wed, Apr 30, 2025 at 02:08:47PM +0200, Michel Casabona wrote:
Le 30/04/2025 à 13:42, Colin Watson a écrit :
Is that the complete output from valgrind, or did you edit it down?
It's tantalizingly close to being useful, but it really feels like
there should be more of it. Could I have a
o idea why, I thought installing systemd-coredump pushed the limits
/etc/security/limits.d/20-coredump-debian.conf raises soft limits, but
there might be something else in play that's reducing them again. But
hopefully more complete valgrind output will be more useful anyway ...
Than
oned dependency on
python3-traitlets.
--
Colin Watson (he/him) [cjwat...@debian.org]
github.com/FriedrichFroebel/python-djvulibre/pull/25).
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
nd
also forwarding it as an upstream PR, since it seems a bit more sensible
for you to do that for your own patch? I expect you should be able to
mark it as fixing https://github.com/mverleg/pyjson_tricks/issues/88.
--
Colin Watson (he/him) [cjwat...@debian.org]
On Mon, Apr 21, 2025 at 06:02:55PM +0100, Colin Watson wrote:
On Mon, Apr 21, 2025 at 12:57:34AM +0200, erebion wrote:
Using:
- ssh-askpass (GNOME version)
- KeePassXC
- GNOME Keyring as the SSH Agent
- setting /run/user/1000/gcr/ssh as SSH_AUTH_SOCK in the KeepassXC settings
Askpass asks to
On Fri, Apr 25, 2025 at 02:01:29PM +0200, Andreas Kurth wrote:
Hello Liam, Colin,
You didn't CC Liam so he may not have seen your message. I've added the
CC here.
given that nobody confirmed this issue for more than a week and it seems
to be a rather particular case: does this r
thon-team/packages/ and set the Debian Python
Team as Maintainer? Of course I can give you commit access if you have
a salsa account and tell me its username - I'm not trying to take it
away from you, just to make sure that we can keep it up to date in
Debian cooperatively.
All the best,
--
Colin Watson (he/him) [cjwat...@debian.org]
] the issue is verified as fixed in unstable
[ Changes ]
fix-disable-forwarding.patch adds options.disable_forwarding checks to
the agent and X11 forwarding paths.
There's a bit of noise due to git deciding to serialize the existing
CVE-2023-48795.patch and gssapi.patch, but the actual code
On Tue, Apr 15, 2025 at 09:38:21PM +0200, Salvatore Bonaccorso wrote:
On Tue, Apr 15, 2025 at 02:36:09PM +0100, Colin Watson wrote:
On Thu, Apr 10, 2025 at 10:20:44PM +0200, Salvatore Bonaccorso wrote:
> The following vulnerability was published for openssh.
>
> CVE-2025-32728[0]:
&g
Package: wnpp
Severity: wishlist
Owner: Colin Watson
X-Debbugs-Cc: debian-de...@lists.debian.org
* Package name: python-django-hashids
Version : 0.7.0
Upstream Contact: Shen Li
* URL : https://github.com/ericls/django-hashids
* License : Expat
Programming
ion control. Please could you push a
suitable packaging repository to salsa.debian.org and point Vcs-* to
that instead?
(I think we would welcome having this package under the Debian Python
Team's namespace in salsa, if you'd be willing to have it be
team-maintained.)
Tha
equests/39
--
Colin Watson (he/him) [cjwat...@debian.org]
.
Anyway, I already sent a patch, which hopefully you can apply.
--
Colin Watson (he/him) [cjwat...@debian.org]
Package: wnpp
Severity: wishlist
Owner: Colin Watson
X-Debbugs-Cc: debian-de...@lists.debian.org
* Package name: python-django-pgbulk
Version : 3.2.2
Upstream Contact: Wes Kendall
* URL : https://github.com/AmbitionEng/django-pgbulk
* License : BSD-3-clause
tests, and
https://salsa.debian.org/openstack-team/third-party/python-momepy/-/merge_requests/1
to cherry-pick that patch into Debian and to skip the third test.
Thomas, could you have a look, please?
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
output by gdf_to_nx has (x: float, y:
float) node keys, so rounding issues can potentially break retrieving
individual nodes/edges) to remove this package on i386.
It can't really be removed on i386, since it's Architecture: all.
--
Colin Watson (he/him)
On Mon, Apr 21, 2025 at 07:16:46PM +0200, Chris Hofstaedtler wrote:
* Colin Watson [250421 19:09]:
I'd be happy to add additional advice about this to README.Debian if
somebody else writes it. But ideally it'd be more fine-grained than
just whacking in a dependency on network-onl
/openssh_agent
and sets SSH_AUTH_SOCK in the systemd environment. Daniel, could you
please have a look at this, since it was your change?
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
d be more fine-grained than
just whacking in a dependency on network-online.target; perhaps we can
advise people how to configure their system so that ssh.service waits
for a particular interface to come up.
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
authentication; but
perhaps some other authentication method is being used instead.
Hopefully the -vvv debugging output will make it clear.
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
On Sat, Apr 19, 2025 at 03:25:17AM -0600, Liam Stitt wrote:
On Fri, 18 Apr 2025, Colin Watson wrote:
valid. Therefore I think we must be dealing with action at a
distance from some previous memory corruption, which is going to be
a pain to track down. It might be in openssh-server, and the
run in this phase. My guess is that this probably won't help me, but
it's easy to capture and it stands some chance of letting me reproduce
this locally, which would be a big help.
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
s
release? If so, what was the last version that worked?
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
eview this without a fair bit of research that I don't
really have time for. Please send it upstream first.
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
crashed
* press "y" at the "Enable debuginfod for this session?" prompt
* type "bt" at the "(gdb)" prompt
* reply to this email with the output
There are other options if you aren't running systemd, but this is
probably the easiest to set up on a stock Debian system.
Thanks,
--
Colin Watson (he/him) [cjwat...@debian.org]
lient-only.
--
Colin Watson (he/him) [cjwat...@debian.org]
On Fri, Apr 11, 2025 at 11:05:00PM +0100, Andrew Bower wrote:
On Fri, Apr 11, 2025 at 01:06:00PM +0100, Colin Watson wrote:
I'd like to arrange for the less-informative "ssh" one to be skipped.
This can be done by adding "skip_if=sshd" to libpam_wtmpdb's options,
I forgot to mention that this was based on a report that I happened to
see on Reddit:
https://www.reddit.com/r/debian/comments/1jymdlr/failed_upgrade_from_stable_to_trixie/
--
Colin Watson (he/him) [cjwat...@debian.org]
1 - 100 of 3037 matches
Mail list logo