Package: flatpak Version: 1.14.4-1 Severity: important X-Debbugs-Cc: iwillnogiveyo...@email.com
Dear Maintainer, At least when upgrading, if connecion is lost, even if it comes back, flatpak stays in a "forever waiting" state, rendering it unusable in a batch file or 'anded' (&&) command line. You do not have to wait until a micro disconnection comes to you, shutting down the connection and bringing it back when upgrading should do the work. -- Package-specific info: Permissions of /usr/bin/bwrap: -rwxr-xr-x 1 root root 72080 Feb 28 10:38 /usr/bin/bwrap /etc/sysctl.d/*-bubblewrap.conf: cat: '/etc/sysctl.d/*-bubblewrap.conf': No such file or directory /usr/lib/sysctl.d/50-bubblewrap.conf: # Enable unprivileged creation of new user namespaces in older Debian # kernels. # # If this is not desired, copy this file to # /etc/sysctl.d/50-bubblewrap.conf and change the value of this parameter # to 0, then use dpkg-statoverride to make /usr/bin/bwrap setuid root. # # For more details see https://deb.li/bubblewrap or # /usr/share/doc/bubblewrap/README.Debian kernel.unprivileged_userns_clone=1 /proc/sys/kernel/unprivileged_userns_clone: 1 /proc/sys/user/max_cgroup_namespaces: 63318 /proc/sys/user/max_ipc_namespaces: 63318 /proc/sys/user/max_mnt_namespaces: 63318 /proc/sys/user/max_net_namespaces: 63318 /proc/sys/user/max_pid_namespaces: 63318 /proc/sys/user/max_time_namespaces: 63318 /proc/sys/user/max_user_namespaces: 63318 /proc/sys/user/max_uts_namespaces: 63318 -- System Information: Debian Release: 12.0 APT prefers testing-security APT policy: (500, 'testing-security'), (500, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 6.1.0-9-amd64 (SMP w/16 CPU threads; PREEMPT) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages flatpak depends on: ii adduser 3.132 ii bubblewrap 0.8.0-2 ii dbus [default-dbus-system-bus] 1.14.6-1 ii fuse3 3.14.0-4 ii libappstream4 0.16.1-1 ii libarchive13 3.6.2-1 ii libc6 2.36-9 ii libcurl3-gnutls 7.88.1-9 ii libdconf1 0.40.0-4 ii libfuse3-3 3.14.0-4 ii libgdk-pixbuf-2.0-0 2.42.10+dfsg-1+b1 ii libglib2.0-0 2.74.6-2 ii libgpgme11 1.18.0-3+b1 ii libjson-glib-1.0-0 1.6.6-1 ii libmalcontent-0-0 0.11.0-4 ii libostree-1-1 2022.7-2 ii libpolkit-agent-1-0 122-3 ii libpolkit-gobject-1-0 122-3 ii libseccomp2 2.5.4-1+b3 ii libsystemd0 252.6-1 ii libxau6 1:1.0.9-1 ii libxml2 2.9.14+dfsg-1.2 ii libzstd1 1.5.4+dfsg2-5 ii xdg-dbus-proxy 0.1.4-3 Versions of packages flatpak recommends: ii ca-certificates 20230311 ii desktop-file-utils 0.26-1 ii gtk-update-icon-cache 3.24.37-2 ii hicolor-icon-theme 0.17-2 ii libpam-systemd 252.6-1 ii p11-kit 0.24.1-2 ii policykit-1 122-3 ii polkitd 122-3 ii shared-mime-info 2.2-1 ii xdg-desktop-portal 1.16.0-2 ii xdg-desktop-portal-gtk [xdg-desktop-portal-backend] 1.14.1-1 ii xdg-user-dirs 0.18-1 Versions of packages flatpak suggests: ii avahi-daemon 0.8-10 pn malcontent-gui <none> Versions of packages bubblewrap depends on: ii libc6 2.36-9 ii libcap2 1:2.66-3 ii libselinux1 3.4-1+b5 Versions of packages bubblewrap recommends: ii procps 2:4.0.2-3 -- no debconf information