Your message dated Mon, 03 Apr 2023 04:05:13 +0000
with message-id <e1pjbrr-006bro...@fasolo.debian.org>
and subject line Bug#1033818: fixed in node-sinon 14.0.2+ds+~cs74.13.25-2
has caused the Debian Bug report #1033818,
regarding node-nock: autopkgtest regression: Accessing
Object.prototype.__proto__ has been disallowed
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1033818: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033818
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: node-nock
Version: 13.2.9-3
Control: found -1 13.2.9-2
Severity: serious
Control: tags -1 bookworm-ignore
User: debian...@lists.debian.org
Usertags: regression
Dear maintainer(s),
Your package has an autopkgtest, great. However, it started to fail
recently (October 2022). Can you please investigate the situation and
fix it? I copied some of the output at the bottom of this report.
The release team has announced [1] that failing autopkgtest on amd64 and
arm64 are considered RC in testing. [Release Team member hat on] Because
we're currently in the hard freeze for bookworm, I have marked this bug
as bookworm-ignore. Targeted fixes are still welcome.
More information about this bug and the reason for filing it can be
found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation
Paul
[1] https://lists.debian.org/debian-devel-announce/2019/07/msg00002.html
https://ci.debian.net/data/autopkgtest/testing/amd64/n/node-nock/32235317/log.gz
525 passing (9s)
2 pending
1 failing
1) `replyWithFile()`
reply with file with repeated:
Error: Accessing Object.prototype.__proto__ has been disallowed
with --disable-proto=throw
at /usr/share/nodejs/sinon/lib/sinon/util/core/walk.js:20:17
at Array.forEach (<anonymous>)
at walkInternal
(/usr/share/nodejs/sinon/lib/sinon/util/core/walk.js:19:5)
at walkInternal
(/usr/share/nodejs/sinon/lib/sinon/util/core/walk.js:33:9)
at walk (/usr/share/nodejs/sinon/lib/sinon/util/core/walk.js:48:12)
at walkObject
(/usr/share/nodejs/sinon/lib/sinon/util/core/walk-object.js:18:5)
at Function.spy (/usr/share/nodejs/sinon/lib/sinon/spy.js:170:16)
at Sandbox.spy (/usr/share/nodejs/sinon/lib/sinon/sandbox.js:383:35)
at Context.<anonymous> (tests/test_reply_with_file.js:45:11)
at callFn (/usr/share/nodejs/mocha/lib/runnable.js:366:21)
at Runnable.run (/usr/share/nodejs/mocha/lib/runnable.js:354:5)
at Runner.runTest (/usr/share/nodejs/mocha/lib/runner.js:666:10)
at /usr/share/nodejs/mocha/lib/runner.js:789:12
at next (/usr/share/nodejs/mocha/lib/runner.js:581:14)
at /usr/share/nodejs/mocha/lib/runner.js:591:7
at next (/usr/share/nodejs/mocha/lib/runner.js:474:14)
at Immediate.<anonymous>
(/usr/share/nodejs/mocha/lib/runner.js:559:5)
at process.processImmediate (node:internal/timers:471:21)
OpenPGP_signature
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
Source: node-sinon
Source-Version: 14.0.2+ds+~cs74.13.25-2
Done: Yadd <y...@debian.org>
We believe that the bug you reported is fixed in the latest version of
node-sinon, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1033...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Yadd <y...@debian.org> (supplier of updated node-sinon package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 03 Apr 2023 07:26:51 +0400
Source: node-sinon
Built-For-Profiles: nocheck
Architecture: source
Version: 14.0.2+ds+~cs74.13.25-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Javascript Maintainers
<pkg-javascript-de...@lists.alioth.debian.org>
Changed-By: Yadd <y...@debian.org>
Closes: 1033818
Changes:
node-sinon (14.0.2+ds+~cs74.13.25-2) unstable; urgency=medium
.
* Team upload
* Update lintian override info format in d/source/lintian-overrides
on line 2-3
* Set upstream metadata fields: Bug-Database, Bug-Submit, Repository-Browse
* Update standards version to 4.6.2, no changes needed
* Drop calls to __proto__ (Closes: #1033818)
Checksums-Sha1:
807160cae4623fd68bb2b8b040fa1b70246a11bd 6712
node-sinon_14.0.2+ds+~cs74.13.25-2.dsc
400f8237297134b0c43b798ee5cf6298f9cb942b 60396
node-sinon_14.0.2+ds+~cs74.13.25-2.debian.tar.xz
Checksums-Sha256:
a32b4d8fc76efaeec395473652191bf90ed7ceb91eea4d0c2b6f3698b652cd40 6712
node-sinon_14.0.2+ds+~cs74.13.25-2.dsc
956d4e4379c4545430d4e41c616e6df0dcc8384da960e626dce96d5144589513 60396
node-sinon_14.0.2+ds+~cs74.13.25-2.debian.tar.xz
Files:
7b740555bcc7de2faa53d4093be91a52 6712 javascript optional
node-sinon_14.0.2+ds+~cs74.13.25-2.dsc
80242faa5247c35dde68861a09a997fd 60396 javascript optional
node-sinon_14.0.2+ds+~cs74.13.25-2.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=RCTM
-----END PGP SIGNATURE-----
--- End Message ---