Mark Hindley <[email protected]>
to [email protected]
.
Full text available.Received: (at 474) by bugs.devuan.org; 23 May 2020 17:30:04 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 23 May 2020 17:30:04 +0000 (UTC) Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id BCD63F60D35 for <[email protected]>; Sat, 23 May 2020 19:29:21 +0200 (CEST) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1jcXxX-0000A3-G8; Sat, 23 May 2020 18:29:19 +0100 Received: (nullmailer pid 7131 invoked by uid 1000); Sat, 23 May 2020 17:29:18 -0000 Date: Sat, 23 May 2020 18:29:18 +0100 From: Mark Hindley <[email protected]> To: Jens Korte <[email protected]>, [email protected] Subject: Re: bug#474: Upstream report Message-ID: <[email protected]> References: <159018332023.11751.912938601564482254.reportbug@devuan> <20200523161934.2fa3886a@devuan> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200523161934.2fa3886a@devuan> X-Debbugs-No-Ack: No Thanks User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Control: forwarded -1 https://bugs.debian.org/961343 Jens, On Sat, May 23, 2020 at 04:19:34PM +0200, Jens Korte wrote: > The bug report upstream at debian is at: > <https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961343> Many thanks. Mark
[email protected], [email protected]
:bug#474
; Package avfs
.
Full text available.Received: (at 474) by bugs.devuan.org; 23 May 2020 14:20:03 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 23 May 2020 14:20:03 +0000 (UTC) Received: from mout-p-202.mailbox.org (mout-p-202.mailbox.org [80.241.56.172]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id C251BF60D3B for <[email protected]>; Sat, 23 May 2020 16:19:40 +0200 (CEST) Authentication-Results: vm6.ganeti.dyne.org; dkim=pass (2048-bit key; secure) header.d=mailbox.org [email protected] header.b="SA8UnwcR"; dkim=pass (2048-bit key) header.d=mailbox.org [email protected] header.b="swB9h3dQ"; dkim-atps=neutral Received: from smtp1.mailbox.org (smtp1.mailbox.org [IPv6:2001:67c:2050:105:465:1:1:0]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by mout-p-202.mailbox.org (Postfix) with ESMTPS id 49TlqH1wPZzQlHl for <[email protected]>; Sat, 23 May 2020 16:19:39 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mailbox.org; h= content-transfer-encoding:content-type:content-type:mime-version :message-id:subject:subject:from:from:date:date:received; s= mail20150812; t=1590243575; bh=WpberjbRpW8QEmFaQa333afnIdiJ4MnDl xqArwBmaf0=; b=SA8UnwcRQ7RjW1tAp7sBxVvdEUgre+mUwOEH1u94gSyXrg+O4 R+i8eW4VZ2YMWBsQXkgUbJEPQmKlIEzrVA+qxXRePBKUAJ4Ay7yoqaAL4BdiKCmz iHu4/Jia0V/uQmRsc/EG1sy1K+a0tvQFL9PNqDw57sUiDBCIRmmVDwcWmK1eddEb +BkFjBig4NqLDjvB4wqaSd5CidlL1ZNpFyvga/D/sBNpjfHKBcigzWHNlpV05ci0 SRSdNILLi56/qBo24dZz+rVoq3MSD6jvdjwHz8kt0er4qWN4gw7ZM0aJ7P619ziW 0drZykJgb5KmS8yICnOn1gz1dieLmdeDNhAJQ== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mailbox.org; s=mail20150812; t=1590243577; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=WpberjbRpW8QEmFaQa333afnIdiJ4MnDlxqArwBmaf0=; b=swB9h3dQ5F5RoXTkxPGk9/GBV/iKsuWIzWWamrazkxOXW7ZYmSap07JlkRbhPY2lYkP0VV teRZhqLvRYt1X5NG9Ji2B5+U4US5EIFcMTWQvdSbZDtyp56BiGTJLXbxgzyaKoYmHQcMXr pD2aqHRTh4DTT8or2az+m/a5IIwbYX0GG/9/g7te/PdYbbTkmO4PqO8nDF5YC39ZSwqyld skAeVOhpfPBv5ZW5L93/uth9Ls+78yiHuC4NgopoKoRG8RcecoQQvQ8O/WOS44nFBofFNS sXgBsY85sJGyaOJmgrA1E+CW1xsIuLjNMjLD3ncHgNSh9xBgI/V8vtH9J6Yk+w== X-Virus-Scanned: amavisd-new at heinlein-support.de Received: from smtp1.mailbox.org ([80.241.60.240]) by spamfilter03.heinlein-hosting.de (spamfilter03.heinlein-hosting.de [80.241.56.117]) (amavisd-new, port 10030) with ESMTP id rqSAxn7jffuh for <[email protected]>; Sat, 23 May 2020 16:19:35 +0200 (CEST) Date: Sat, 23 May 2020 16:19:34 +0200 From: Jens Korte <[email protected]> To: [email protected] Subject: Upstream report Message-ID: <20200523161934.2fa3886a@devuan> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 126C81772 X-Rspamd-Score: -2.20 / 15.00 / 15.00 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_PASS,TVD_SPACE_RATIO autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org The bug report upstream at debian is at: <https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961343>
Jens Korte <[email protected]>
:[email protected]
.
Full text available.[email protected], [email protected]
:bug#474
; Package avfs
.
Full text available.Mark Hindley <[email protected]>
to [email protected]
.
Full text available.Received: (at 474) by bugs.devuan.org; 23 May 2020 09:10:02 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 23 May 2020 09:10:02 +0000 (UTC) Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 85ED7F60D05 for <[email protected]>; Sat, 23 May 2020 11:08:39 +0200 (CEST) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1jcQ8z-00068D-Uv; Sat, 23 May 2020 10:08:38 +0100 Received: (nullmailer pid 19657 invoked by uid 1000); Sat, 23 May 2020 09:08:37 -0000 Date: Sat, 23 May 2020 10:08:37 +0100 From: Mark Hindley <[email protected]> To: [email protected], Jens Korte <[email protected]> Subject: Re: avfs: Cannot access ftp and http(s) with avfs Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <159018332023.11751.912938601564482254.reportbug@devuan> X-Debbugs-No-Ack: No Thanks User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=0.0 required=5.0 tests=FAKE_REPLY_C,SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Control: tags -1 debian On Fri, 22 May 2020 23:35:20 +0200 Jens Korte <[email protected]> wrote: > Package: avfs > Version: 1.0.6-1 > Severity: normal > > Dear Maintainer, > > * What led up to the situation? > I wanted to access a remote ftp/http server and it doesn't work as > documented in /usr/share/doc/avfs/README.gz Jens, Thanks for this. However, avfs is not a forked package and Devuan uses Debian's packaging directly. Please would you report this to Debian BTS? Thanks Mark
[email protected], [email protected]
:bug#474
; Package avfs
.
Full text available.Received: (at submit) by bugs.devuan.org; 22 May 2020 21:40:03 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Fri, 22 May 2020 21:40:03 +0000 (UTC) Received: from [127.0.1.1] (ip1f114a8b.dynamic.kabel-deutschland.de [31.17.74.139]) by vm6.ganeti.dyne.org (Postfix) with ESMTP id 353AEF60CEF for <[email protected]>; Fri, 22 May 2020 23:35:21 +0200 (CEST) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Jens Korte <[email protected]> To: Devuan Bug Tracking System <[email protected]> Subject: avfs: Cannot access ftp and http(s) with avfs Message-ID: <159018332023.11751.912938601564482254.reportbug@devuan> X-Mailer: reportbug 7.5.3+devuan3 Date: Fri, 22 May 2020 23:35:20 +0200 X-Debbugs-Cc: [email protected] X-Spam-Status: No, score=4.8 required=5.0 tests=HELO_MISC_IP,KHOP_DYNAMIC, RCVD_IN_PBL,RDNS_DYNAMIC,SPF_NEUTRAL autolearn=disabled version=3.4.2 X-Spam-Level: **** X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Package: avfs Version: 1.0.6-1 Severity: normal Dear Maintainer, * What led up to the situation? I wanted to access a remote ftp/http server and it doesn't work as documented in /usr/share/doc/avfs/README.gz * What exactly did you do (or not do) that was effective (or ineffective)? mountavfs # creates the ~/.avfs dir and I can access compressed files like cat ~/.avfs/usr/share/doc/avfs/README.gz# from README.gz: "/#ftp:ftp.funet.fi/pub/Linux - anonymous ftp" ls ~/.avfs/#ftp:ftp.fau.de # throws error file or dir not found * What outcome did you expect instead? If some extensions don't work any more then they should be remove from the documentation. -- System Information: Distributor ID: Debian Description: Devuan GNU/Linux 3 (beowulf) Release: 3 Codename: beowulf Architecture: x86_64 Kernel: Linux 4.19.0-8-amd64 (SMP w/4 CPU cores) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) LSM: AppArmor: enabled Versions of packages avfs depends on: ii fuse 2.9.9-1+deb10u1 ii libbz2-1.0 1.0.6-9.2~deb10u1 ii libc6 2.28-10 ii libfuse2 2.9.9-1+deb10u1 ii liblzma5 5.2.4-1 ii libzstd1 1.3.8+dfsg-3 ii zlib1g 1:1.2.11.dfsg-1 avfs recommends no packages. Versions of packages avfs suggests: pn arj <none> ii cdparanoia 3.10.2+debian-13 pn lha <none> ii p7zip 16.02+dfsg-6 ii p7zip-full 16.02+dfsg-6 ii rpm 4.14.2.1+dfsg1-1 ii unzip 6.0-23+deb10u1 ii wget 1.20.1-1.1 ii zip 3.0-11+b1 -- no debconf information
Jens Korte <[email protected]>
:[email protected], [email protected]
.
Full text available.[email protected], [email protected], [email protected]
:bug#474
; Package avfs
.
Full text available.Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd,
1994-97 Ian Jackson.
Devuan Bugs Owner <[email protected]>.
Last modified:
Sat, 30 Nov 2024 22:39:01 UTC