X-Loop: [email protected] Subject: bug#474: avfs: Cannot access ftp and http(s) with avfs Reply-To: Jens Korte <[email protected]>, [email protected] Resent-From: Jens Korte <[email protected]> Resent-To: [email protected] Resent-CC: [email protected], [email protected] X-Loop: [email protected] Resent-Date: Fri, 22 May 2020 21:48:01 +0000 Resent-Message-ID: <[email protected]> Resent-Sender: [email protected] X-Devuan-PR-Message: report 474 X-Devuan-PR-Package: avfs X-Devuan-PR-Keywords: Received: via spool by [email protected] id=B.15901836034729 (code B); Fri, 22 May 2020 21:48:01 +0000 Received: (at submit) by bugs.devuan.org; 22 May 2020 21:40:03 +0000 Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Fri, 22 May 2020 21:40:03 +0000 (UTC) Received: from [127.0.1.1] (ip1f114a8b.dynamic.kabel-deutschland.de [31.17.74.139]) by vm6.ganeti.dyne.org (Postfix) with ESMTP id 353AEF60CEF for <[email protected]>; Fri, 22 May 2020 23:35:21 +0200 (CEST) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Jens Korte <[email protected]> To: Devuan Bug Tracking System <[email protected]> Message-ID: <159018332023.11751.912938601564482254.reportbug@devuan> X-Mailer: reportbug 7.5.3+devuan3 Date: Fri, 22 May 2020 23:35:20 +0200 X-Spam-Status: No, score=4.8 required=5.0 tests=HELO_MISC_IP,KHOP_DYNAMIC, RCVD_IN_PBL,RDNS_DYNAMIC,SPF_NEUTRAL autolearn=disabled version=3.4.2 X-Spam-Level: **** X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Package: avfs Version: 1.0.6-1 Severity: normal Dear Maintainer, * What led up to the situation? I wanted to access a remote ftp/http server and it doesn't work as documented in /usr/share/doc/avfs/README.gz * What exactly did you do (or not do) that was effective (or ineffective)? mountavfs # creates the ~/.avfs dir and I can access compressed files like cat ~/.avfs/usr/share/doc/avfs/README.gz# from README.gz: "/#ftp:ftp.funet.fi/pub/Linux - anonymous ftp" ls ~/.avfs/#ftp:ftp.fau.de # throws error file or dir not found * What outcome did you expect instead? If some extensions don't work any more then they should be remove from the documentation. -- System Information: Distributor ID: Debian Description: Devuan GNU/Linux 3 (beowulf) Release: 3 Codename: beowulf Architecture: x86_64 Kernel: Linux 4.19.0-8-amd64 (SMP w/4 CPU cores) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) LSM: AppArmor: enabled Versions of packages avfs depends on: ii fuse 2.9.9-1+deb10u1 ii libbz2-1.0 1.0.6-9.2~deb10u1 ii libc6 2.28-10 ii libfuse2 2.9.9-1+deb10u1 ii liblzma5 5.2.4-1 ii libzstd1 1.3.8+dfsg-3 ii zlib1g 1:1.2.11.dfsg-1 avfs recommends no packages. Versions of packages avfs suggests: pn arj <none> ii cdparanoia 3.10.2+debian-13 pn lha <none> ii p7zip 16.02+dfsg-6 ii p7zip-full 16.02+dfsg-6 ii rpm 4.14.2.1+dfsg1-1 ii unzip 6.0-23+deb10u1 ii wget 1.20.1-1.1 ii zip 3.0-11+b1 -- no debconf information
Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) Content-Type: text/plain; charset=utf-8 X-Loop: [email protected] From: "Devuan bug Tracking System" <[email protected]> To: Jens Korte <[email protected]> Subject: bug#474: Acknowledgement (avfs: Cannot access ftp and http(s) with avfs) Message-ID: <[email protected]> References: <159018332023.11751.912938601564482254.reportbug@devuan> X-Devuan-PR-Message: ack 474 X-Devuan-PR-Package: avfs Reply-To: [email protected] Date: Fri, 22 May 2020 21:48:04 +0000 Thank you for filing a new bug report with Devuan. You can follow progress on this bug here: 474: https://bugs.devuan.org/cgi/= bugreport.cgi?bug=3D474. This is an automatically generated reply to let you know your message has been received. Your message is being forwarded to the package maintainers and other interested parties for their attention; they will reply in due course. As you requested using X-Debbugs-CC, your message was also forwarded to [email protected] (after having been given a bug report number, if it did not have one). Your message has been sent to the package maintainer(s): [email protected] If you wish to submit further information on this problem, please send it to [email protected]. Please do not send mail to [email protected] unless you wish to report a problem with the Bug-tracking system. --=20 474: https://bugs.devuan.org/cgi/bugreport.cgi?bug=3D474 Devuan Bug Tracking System Contact [email protected] with problems
X-Loop: [email protected] Subject: bug#474: avfs: Cannot access ftp and http(s) with avfs Reply-To: Mark Hindley <[email protected]>, [email protected] Resent-From: Mark Hindley <[email protected]> Resent-To: [email protected] Resent-CC: [email protected] X-Loop: [email protected] Resent-Date: Sat, 23 May 2020 09:18:01 +0000 Resent-Message-ID: <[email protected]> Resent-Sender: [email protected] X-Devuan-PR-Message: followup 474 X-Devuan-PR-Package: avfs X-Devuan-PR-Keywords: References: <159018332023.11751.912938601564482254.reportbug@devuan> Received: via spool by [email protected] id=B474.159022500227577 (code B ref 474); Sat, 23 May 2020 09:18:01 +0000 Received: (at 474) by bugs.devuan.org; 23 May 2020 09:10:02 +0000 Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 23 May 2020 09:10:02 +0000 (UTC) Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 85ED7F60D05 for <[email protected]>; Sat, 23 May 2020 11:08:39 +0200 (CEST) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1jcQ8z-00068D-Uv; Sat, 23 May 2020 10:08:38 +0100 Received: (nullmailer pid 19657 invoked by uid 1000); Sat, 23 May 2020 09:08:37 -0000 Date: Sat, 23 May 2020 10:08:37 +0100 From: Mark Hindley <[email protected]> To: [email protected], Jens Korte <[email protected]> Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <159018332023.11751.912938601564482254.reportbug@devuan> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=0.0 required=5.0 tests=FAKE_REPLY_C,SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Control: tags -1 debian On Fri, 22 May 2020 23:35:20 +0200 Jens Korte <[email protected]> wrote: > Package: avfs > Version: 1.0.6-1 > Severity: normal > > Dear Maintainer, > > * What led up to the situation? > I wanted to access a remote ftp/http server and it doesn't work as > documented in /usr/share/doc/avfs/README.gz Jens, Thanks for this. However, avfs is not a forked package and Devuan uses Debian's packaging directly. Please would you report this to Debian BTS? Thanks Mark
Received: (at 474) by bugs.devuan.org; 23 May 2020 09:10:02 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 23 May 2020 09:10:02 +0000 (UTC) Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 85ED7F60D05 for <[email protected]>; Sat, 23 May 2020 11:08:39 +0200 (CEST) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1jcQ8z-00068D-Uv; Sat, 23 May 2020 10:08:38 +0100 Received: (nullmailer pid 19657 invoked by uid 1000); Sat, 23 May 2020 09:08:37 -0000 Date: Sat, 23 May 2020 10:08:37 +0100 From: Mark Hindley <[email protected]> To: [email protected], Jens Korte <[email protected]> Subject: Re: avfs: Cannot access ftp and http(s) with avfs Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <159018332023.11751.912938601564482254.reportbug@devuan> X-Debbugs-No-Ack: No Thanks User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=0.0 required=5.0 tests=FAKE_REPLY_C,SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Control: tags -1 debian On Fri, 22 May 2020 23:35:20 +0200 Jens Korte <[email protected]> wrote: > Package: avfs > Version: 1.0.6-1 > Severity: normal > > Dear Maintainer, > > * What led up to the situation? > I wanted to access a remote ftp/http server and it doesn't work as > documented in /usr/share/doc/avfs/README.gz Jens, Thanks for this. However, avfs is not a forked package and Devuan uses Debian's packaging directly. Please would you report this to Debian BTS? Thanks Mark
X-Loop: [email protected] Subject: bug#474: Upstream report Reply-To: Jens Korte <[email protected]>, [email protected] Resent-From: Jens Korte <[email protected]> Resent-To: [email protected] Resent-CC: [email protected] X-Loop: [email protected] Resent-Date: Sat, 23 May 2020 14:33:01 +0000 Resent-Message-ID: <[email protected]> Resent-Sender: [email protected] X-Devuan-PR-Message: followup 474 X-Devuan-PR-Package: avfs X-Devuan-PR-Keywords: debian References: <159018332023.11751.912938601564482254.reportbug@devuan> Received: via spool by [email protected] id=B474.159024360316188 (code B ref 474); Sat, 23 May 2020 14:33:01 +0000 Received: (at 474) by bugs.devuan.org; 23 May 2020 14:20:03 +0000 Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 23 May 2020 14:20:03 +0000 (UTC) Received: from mout-p-202.mailbox.org (mout-p-202.mailbox.org [80.241.56.172]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id C251BF60D3B for <[email protected]>; Sat, 23 May 2020 16:19:40 +0200 (CEST) Authentication-Results: vm6.ganeti.dyne.org; dkim=pass (2048-bit key; secure) header.d=mailbox.org [email protected] header.b="SA8UnwcR"; dkim=pass (2048-bit key) header.d=mailbox.org [email protected] header.b="swB9h3dQ"; dkim-atps=neutral Received: from smtp1.mailbox.org (smtp1.mailbox.org [IPv6:2001:67c:2050:105:465:1:1:0]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by mout-p-202.mailbox.org (Postfix) with ESMTPS id 49TlqH1wPZzQlHl for <[email protected]>; Sat, 23 May 2020 16:19:39 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mailbox.org; h= content-transfer-encoding:content-type:content-type:mime-version :message-id:subject:subject:from:from:date:date:received; s= mail20150812; t=1590243575; bh=WpberjbRpW8QEmFaQa333afnIdiJ4MnDl xqArwBmaf0=; b=SA8UnwcRQ7RjW1tAp7sBxVvdEUgre+mUwOEH1u94gSyXrg+O4 R+i8eW4VZ2YMWBsQXkgUbJEPQmKlIEzrVA+qxXRePBKUAJ4Ay7yoqaAL4BdiKCmz iHu4/Jia0V/uQmRsc/EG1sy1K+a0tvQFL9PNqDw57sUiDBCIRmmVDwcWmK1eddEb +BkFjBig4NqLDjvB4wqaSd5CidlL1ZNpFyvga/D/sBNpjfHKBcigzWHNlpV05ci0 SRSdNILLi56/qBo24dZz+rVoq3MSD6jvdjwHz8kt0er4qWN4gw7ZM0aJ7P619ziW 0drZykJgb5KmS8yICnOn1gz1dieLmdeDNhAJQ== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mailbox.org; s=mail20150812; t=1590243577; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=WpberjbRpW8QEmFaQa333afnIdiJ4MnDlxqArwBmaf0=; b=swB9h3dQ5F5RoXTkxPGk9/GBV/iKsuWIzWWamrazkxOXW7ZYmSap07JlkRbhPY2lYkP0VV teRZhqLvRYt1X5NG9Ji2B5+U4US5EIFcMTWQvdSbZDtyp56BiGTJLXbxgzyaKoYmHQcMXr pD2aqHRTh4DTT8or2az+m/a5IIwbYX0GG/9/g7te/PdYbbTkmO4PqO8nDF5YC39ZSwqyld skAeVOhpfPBv5ZW5L93/uth9Ls+78yiHuC4NgopoKoRG8RcecoQQvQ8O/WOS44nFBofFNS sXgBsY85sJGyaOJmgrA1E+CW1xsIuLjNMjLD3ncHgNSh9xBgI/V8vtH9J6Yk+w== X-Virus-Scanned: amavisd-new at heinlein-support.de Received: from smtp1.mailbox.org ([80.241.60.240]) by spamfilter03.heinlein-hosting.de (spamfilter03.heinlein-hosting.de [80.241.56.117]) (amavisd-new, port 10030) with ESMTP id rqSAxn7jffuh for <[email protected]>; Sat, 23 May 2020 16:19:35 +0200 (CEST) Date: Sat, 23 May 2020 16:19:34 +0200 From: Jens Korte <[email protected]> To: [email protected] Message-ID: <20200523161934.2fa3886a@devuan> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 126C81772 X-Rspamd-Score: -2.20 / 15.00 / 15.00 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_PASS,TVD_SPACE_RATIO autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org The bug report upstream at debian is at: <https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961343>
Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) Content-Type: text/plain; charset=utf-8 X-Loop: [email protected] From: "Devuan bug Tracking System" <[email protected]> To: Jens Korte <[email protected]> Subject: bug#474: Info received (Upstream report) Message-ID: <[email protected]> References: <20200523161934.2fa3886a@devuan> X-Devuan-PR-Message: ack-info 474 X-Devuan-PR-Package: avfs X-Devuan-PR-Keywords: debian Reply-To: [email protected] Date: Sat, 23 May 2020 14:33:04 +0000 Thank you for the additional information you have supplied regarding this bug report. This is an automatically generated reply to let you know your message has been received. Your message is being forwarded to the package maintainers and other interested parties for their attention; they will reply in due course. Your message has been sent to the package maintainer(s): [email protected] If you wish to submit further information on this problem, please send it to [email protected]. Please do not send mail to [email protected] unless you wish to report a problem with the Bug-tracking system. --=20 474: https://bugs.devuan.org/cgi/bugreport.cgi?bug=3D474 Devuan Bug Tracking System Contact [email protected] with problems
X-Loop: [email protected] Subject: bug#474: Upstream report Reply-To: Mark Hindley <[email protected]>, [email protected] Resent-From: Mark Hindley <[email protected]> Resent-To: [email protected] Resent-CC: [email protected] X-Loop: [email protected] Resent-Date: Sat, 23 May 2020 17:33:01 +0000 Resent-Message-ID: <[email protected]> Resent-Sender: [email protected] X-Devuan-PR-Message: followup 474 X-Devuan-PR-Package: avfs X-Devuan-PR-Keywords: debian References: <159018332023.11751.912938601564482254.reportbug@devuan> <20200523161934.2fa3886a@devuan> <159018332023.11751.912938601564482254.reportbug@devuan> Received: via spool by [email protected] id=B474.159025500430401 (code B ref 474); Sat, 23 May 2020 17:33:01 +0000 Received: (at 474) by bugs.devuan.org; 23 May 2020 17:30:04 +0000 Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 23 May 2020 17:30:04 +0000 (UTC) Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id BCD63F60D35 for <[email protected]>; Sat, 23 May 2020 19:29:21 +0200 (CEST) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1jcXxX-0000A3-G8; Sat, 23 May 2020 18:29:19 +0100 Received: (nullmailer pid 7131 invoked by uid 1000); Sat, 23 May 2020 17:29:18 -0000 Date: Sat, 23 May 2020 18:29:18 +0100 From: Mark Hindley <[email protected]> To: Jens Korte <[email protected]>, [email protected] Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200523161934.2fa3886a@devuan> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Control: forwarded -1 https://bugs.debian.org/961343 Jens, On Sat, May 23, 2020 at 04:19:34PM +0200, Jens Korte wrote: > The bug report upstream at debian is at: > <https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961343> Many thanks. Mark
Received: (at 474) by bugs.devuan.org; 23 May 2020 17:30:04 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 23 May 2020 17:30:04 +0000 (UTC) Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id BCD63F60D35 for <[email protected]>; Sat, 23 May 2020 19:29:21 +0200 (CEST) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1jcXxX-0000A3-G8; Sat, 23 May 2020 18:29:19 +0100 Received: (nullmailer pid 7131 invoked by uid 1000); Sat, 23 May 2020 17:29:18 -0000 Date: Sat, 23 May 2020 18:29:18 +0100 From: Mark Hindley <[email protected]> To: Jens Korte <[email protected]>, [email protected] Subject: Re: bug#474: Upstream report Message-ID: <[email protected]> References: <159018332023.11751.912938601564482254.reportbug@devuan> <20200523161934.2fa3886a@devuan> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200523161934.2fa3886a@devuan> X-Debbugs-No-Ack: No Thanks User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Control: forwarded -1 https://bugs.debian.org/961343 Jens, On Sat, May 23, 2020 at 04:19:34PM +0200, Jens Korte wrote: > The bug report upstream at debian is at: > <https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961343> Many thanks. Mark
Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd,
1994-97 Ian Jackson.
Devuan Bugs Owner <[email protected]>.
Last modified:
Sun, 1 Dec 2024 00:39:02 UTC