Devuan bug report logs - #474
avfs: Cannot access ftp and http(s) with avfs

Package: avfs; Reported by: Jens Korte <[email protected]>; Keywords: debian; Forwarded to https://bugs.debian.org/961343; Maintainer for avfs is (unknown).
Set bug forwarded-to-address to 'https://bugs.debian.org/961343'. Request was from Mark Hindley <[email protected]> to [email protected]. Full text available.

Message received at [email protected]:


Received: (at 474) by bugs.devuan.org; 23 May 2020 17:30:04 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Sat, 23 May 2020 17:30:04 +0000 (UTC)
Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id BCD63F60D35
	for <[email protected]>; Sat, 23 May 2020 19:29:21 +0200 (CEST)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1jcXxX-0000A3-G8; Sat, 23 May 2020 18:29:19 +0100
Received: (nullmailer pid 7131 invoked by uid 1000);
	Sat, 23 May 2020 17:29:18 -0000
Date: Sat, 23 May 2020 18:29:18 +0100
From: Mark Hindley <[email protected]>
To: Jens Korte <[email protected]>, [email protected]
Subject: Re: bug#474: Upstream report
Message-ID: <[email protected]>
References: <159018332023.11751.912938601564482254.reportbug@devuan>
 <20200523161934.2fa3886a@devuan>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20200523161934.2fa3886a@devuan>
X-Debbugs-No-Ack: No Thanks
User-Agent: Mutt/1.10.1 (2018-07-13)
X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled
	version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org

Control: forwarded -1 https://bugs.debian.org/961343

Jens,

On Sat, May 23, 2020 at 04:19:34PM +0200, Jens Korte wrote:
> The bug report upstream at debian is at:
> <https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961343>

Many thanks.

Mark

Information forwarded to [email protected], [email protected]:
bug#474; Package avfs. Full text available.

Message received at [email protected]:


Received: (at 474) by bugs.devuan.org; 23 May 2020 14:20:03 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Sat, 23 May 2020 14:20:03 +0000 (UTC)
Received: from mout-p-202.mailbox.org (mout-p-202.mailbox.org [80.241.56.172])
	(using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id C251BF60D3B
	for <[email protected]>; Sat, 23 May 2020 16:19:40 +0200 (CEST)
Authentication-Results: vm6.ganeti.dyne.org;
	dkim=pass (2048-bit key; secure) header.d=mailbox.org [email protected] header.b="SA8UnwcR";
	dkim=pass (2048-bit key) header.d=mailbox.org [email protected] header.b="swB9h3dQ";
	dkim-atps=neutral
Received: from smtp1.mailbox.org (smtp1.mailbox.org [IPv6:2001:67c:2050:105:465:1:1:0])
	(using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits))
	(No client certificate requested)
	by mout-p-202.mailbox.org (Postfix) with ESMTPS id 49TlqH1wPZzQlHl
	for <[email protected]>; Sat, 23 May 2020 16:19:39 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mailbox.org; h=
	content-transfer-encoding:content-type:content-type:mime-version
	:message-id:subject:subject:from:from:date:date:received; s=
	mail20150812; t=1590243575; bh=WpberjbRpW8QEmFaQa333afnIdiJ4MnDl
	xqArwBmaf0=; b=SA8UnwcRQ7RjW1tAp7sBxVvdEUgre+mUwOEH1u94gSyXrg+O4
	R+i8eW4VZ2YMWBsQXkgUbJEPQmKlIEzrVA+qxXRePBKUAJ4Ay7yoqaAL4BdiKCmz
	iHu4/Jia0V/uQmRsc/EG1sy1K+a0tvQFL9PNqDw57sUiDBCIRmmVDwcWmK1eddEb
	+BkFjBig4NqLDjvB4wqaSd5CidlL1ZNpFyvga/D/sBNpjfHKBcigzWHNlpV05ci0
	SRSdNILLi56/qBo24dZz+rVoq3MSD6jvdjwHz8kt0er4qWN4gw7ZM0aJ7P619ziW
	0drZykJgb5KmS8yICnOn1gz1dieLmdeDNhAJQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mailbox.org; s=mail20150812;
	t=1590243577;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=WpberjbRpW8QEmFaQa333afnIdiJ4MnDlxqArwBmaf0=;
	b=swB9h3dQ5F5RoXTkxPGk9/GBV/iKsuWIzWWamrazkxOXW7ZYmSap07JlkRbhPY2lYkP0VV
	teRZhqLvRYt1X5NG9Ji2B5+U4US5EIFcMTWQvdSbZDtyp56BiGTJLXbxgzyaKoYmHQcMXr
	pD2aqHRTh4DTT8or2az+m/a5IIwbYX0GG/9/g7te/PdYbbTkmO4PqO8nDF5YC39ZSwqyld
	skAeVOhpfPBv5ZW5L93/uth9Ls+78yiHuC4NgopoKoRG8RcecoQQvQ8O/WOS44nFBofFNS
	sXgBsY85sJGyaOJmgrA1E+CW1xsIuLjNMjLD3ncHgNSh9xBgI/V8vtH9J6Yk+w==
X-Virus-Scanned: amavisd-new at heinlein-support.de
Received: from smtp1.mailbox.org ([80.241.60.240])
	by spamfilter03.heinlein-hosting.de (spamfilter03.heinlein-hosting.de [80.241.56.117]) (amavisd-new, port 10030)
	with ESMTP id rqSAxn7jffuh for <[email protected]>;
	Sat, 23 May 2020 16:19:35 +0200 (CEST)
Date: Sat, 23 May 2020 16:19:34 +0200
From: Jens Korte <[email protected]>
To: [email protected]
Subject: Upstream report
Message-ID: <20200523161934.2fa3886a@devuan>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Rspamd-Queue-Id: 126C81772
X-Rspamd-Score: -2.20 / 15.00 / 15.00
X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
	DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_PASS,TVD_SPACE_RATIO
	autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org

The bug report upstream at debian is at:
<https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961343>

Acknowledgement sent to Jens Korte <[email protected]>:
Extra info received and forwarded to list. Copy sent to [email protected]. Full text available.
Information forwarded to [email protected], [email protected]:
bug#474; Package avfs. Full text available.
Added tag(s) debian. Request was from Mark Hindley <[email protected]> to [email protected]. Full text available.

Message received at [email protected]:


Received: (at 474) by bugs.devuan.org; 23 May 2020 09:10:02 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Sat, 23 May 2020 09:10:02 +0000 (UTC)
Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 85ED7F60D05
	for <[email protected]>; Sat, 23 May 2020 11:08:39 +0200 (CEST)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1jcQ8z-00068D-Uv; Sat, 23 May 2020 10:08:38 +0100
Received: (nullmailer pid 19657 invoked by uid 1000);
	Sat, 23 May 2020 09:08:37 -0000
Date: Sat, 23 May 2020 10:08:37 +0100
From: Mark Hindley <[email protected]>
To: [email protected], Jens Korte <[email protected]>
Subject: Re: avfs: Cannot access ftp and http(s) with avfs
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <159018332023.11751.912938601564482254.reportbug@devuan>
X-Debbugs-No-Ack: No Thanks
User-Agent: Mutt/1.10.1 (2018-07-13)
X-Spam-Status: No, score=0.0 required=5.0 tests=FAKE_REPLY_C,SPF_PASS
	autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org

Control: tags -1 debian

On Fri, 22 May 2020 23:35:20 +0200 Jens Korte <[email protected]> wrote:
> Package: avfs
> Version: 1.0.6-1
> Severity: normal
> 
> Dear Maintainer,
> 
>    * What led up to the situation?
> I wanted to access a remote ftp/http server and it doesn't work as
> documented in /usr/share/doc/avfs/README.gz

Jens,

Thanks for this.

However, avfs is not a forked package and Devuan uses Debian's packaging
directly. Please would you report this to Debian BTS?

Thanks

Mark

Information forwarded to [email protected], [email protected]:
bug#474; Package avfs. Full text available.

Message received at [email protected]:


Received: (at submit) by bugs.devuan.org; 22 May 2020 21:40:03 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Fri, 22 May 2020 21:40:03 +0000 (UTC)
Received: from [127.0.1.1] (ip1f114a8b.dynamic.kabel-deutschland.de [31.17.74.139])
	by vm6.ganeti.dyne.org (Postfix) with ESMTP id 353AEF60CEF
	for <[email protected]>; Fri, 22 May 2020 23:35:21 +0200 (CEST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Jens Korte <[email protected]>
To: Devuan Bug Tracking System <[email protected]>
Subject: avfs: Cannot access ftp and http(s) with avfs
Message-ID: <159018332023.11751.912938601564482254.reportbug@devuan>
X-Mailer: reportbug 7.5.3+devuan3
Date: Fri, 22 May 2020 23:35:20 +0200
X-Debbugs-Cc: [email protected]
X-Spam-Status: No, score=4.8 required=5.0 tests=HELO_MISC_IP,KHOP_DYNAMIC,
	RCVD_IN_PBL,RDNS_DYNAMIC,SPF_NEUTRAL autolearn=disabled version=3.4.2
X-Spam-Level: ****
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org

Package: avfs
Version: 1.0.6-1
Severity: normal

Dear Maintainer,

   * What led up to the situation?
I wanted to access a remote ftp/http server and it doesn't work as
documented in /usr/share/doc/avfs/README.gz

   * What exactly did you do (or not do) that was effective (or
     ineffective)?
mountavfs # creates the ~/.avfs dir and I can access compressed files
like cat ~/.avfs/usr/share/doc/avfs/README.gz#
from README.gz: "/#ftp:ftp.funet.fi/pub/Linux               - anonymous ftp"
ls ~/.avfs/#ftp:ftp.fau.de # throws error file or dir not found

   * What outcome did you expect instead?
If some extensions don't work any more then they should be remove from
the documentation.



-- System Information:
Distributor ID:	Debian
Description:	Devuan GNU/Linux 3 (beowulf)
Release:	3
Codename:	beowulf
Architecture: x86_64

Kernel: Linux 4.19.0-8-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled

Versions of packages avfs depends on:
ii  fuse        2.9.9-1+deb10u1
ii  libbz2-1.0  1.0.6-9.2~deb10u1
ii  libc6       2.28-10
ii  libfuse2    2.9.9-1+deb10u1
ii  liblzma5    5.2.4-1
ii  libzstd1    1.3.8+dfsg-3
ii  zlib1g      1:1.2.11.dfsg-1

avfs recommends no packages.

Versions of packages avfs suggests:
pn  arj         <none>
ii  cdparanoia  3.10.2+debian-13
pn  lha         <none>
ii  p7zip       16.02+dfsg-6
ii  p7zip-full  16.02+dfsg-6
ii  rpm         4.14.2.1+dfsg1-1
ii  unzip       6.0-23+deb10u1
ii  wget        1.20.1-1.1
ii  zip         3.0-11+b1

-- no debconf information

Acknowledgement sent to Jens Korte <[email protected]>:
New bug report received and forwarded. Copy sent to [email protected], [email protected]. Full text available.
Report forwarded to [email protected], [email protected], [email protected]:
bug#474; Package avfs. Full text available.

Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.

Devuan Bugs Owner <[email protected]>.
Last modified: Sat, 30 Nov 2024 22:39:01 UTC