Oct 28 2021
Oct 27 2021
Ah, I see it now: the older version mentioned by Carsten is the one currently in PureOS Byzantium.
which version of nuitka has such tight dependency on base-files, and why?
Seems your are right. That will require a update of base-files for byzantium.
Oct 25 2021
This seems to have been resolved in the intervening period - due to updates I guess.
Oct 21 2021
Oct 19 2021
I am running a Librem14 (5.10.0-9-amd64) and was experiencing this same issue. Instead of purging gufw I needed to purge ufw. Before purging I noticed the ufw service was in a masked state after removing the package with apt. I also cleaned up /etc/ufw after the purge. I used the iptables rules in this bug report as a workaround and saved those to /etc/iptables/rule.v4 and .v6 so iptables-persistent would see them and rebooted. This fixed my issue, the networking was restored and the machine no longer would hang after decrypting the drive.
Oct 17 2021
Oct 15 2021
A user found out possible cause:
Oct 13 2021
@mladen Feel free to direct people to enter more details of their issue here, I get notification quickly.
Reopened to collect other issues and hopefully other solutions.
@jeremiah.foster some people still report the issue, even though they have the latest ca-certificates (both on amber and byzantium). Any way to troubleshoot this further?
Oct 11 2021
On my amber instance here, running an upgrade just of ca-certificates would work but I've already done it and get an expected result;
$ apt upgrade ca-certificates Reading package lists... Done Building dependency tree Reading state information... Done ca-certificates is already the newest version (20200601~deb10u2). Calculating upgrade... Done 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
Updating ca-certificates is the same as updating any other package, simply do
@jeremiah.foster could you please explain how to update ca-certificates?
@guido updated the tag on screenshot
We consider byzantium to be stable now. Awesome list btw!
Screenshot works for me (it's not adaptive and only capturing the full screen works) but I use it all the time.
Oct 9 2021
This is resolved now - please test the images available on https://downloads.pureos.net/byzantium/ (preferably the latest ones built ^^) as I could only test this on a few systems and configurations that I had available. The images should support UEFI, as long as secure boot is not enforced, as the necessary pieces are not signed.
Oct 8 2021
@lo0 You may be right. My original URL was tested and now fails. I'm having trouble connecting to the new URL however so cannot confirm.
Oct 7 2021
Updating ca-certificates on Byzantium solves this issue.
Amber works now but Byzantium still fails.
...or in this case, package repos (plural) as this issue affects both Amber and Byzantium.
thanks, @evangelos.tzaras - but you guessed correct: please only close when done from a user perspective, i.e. when fix has reached target repo.
With https://source.puri.sm/Librem5/debs/pkg-phosh/-/merge_requests/21 merged this can be closed (unless it's preferred to wait for a new release incorporating those changes reaches the archive)
Oct 5 2021
My understanding was that in Debian they updated the buildd chroots. In any case, Stelios writes; "very likely an issue client side. a few days ago intermediate lets-encrypt certificates expired ,workaround on older debian systems was to drop the line DST from /etc/ca-certificates.conf and run update-ca-certificates its not a server side issue its a client side issue".
We certainly can't update the system's certificates store, as that would mean people couldn't get the update that lets them get updates again :-P
It looks like updating the certs for repo.puri.sm is the workaround. Asked systeam to do this and then we can test again.
On Debian 11 this works;
Same thing occurs in Byzantium and GnuTLS
Oct 4 2021
Ahh, right! Thanks for pointing. I happily agree an that.
Please (for future sake, if not this one) note that this issue tracker should be tracking user-visible targets, not staging targets like "landing".
I.e. not option e) but option g) at https://tracker.pureos.net/T553#18719
With the help by Guido we managed to get this addition into landing. So closing this issue.
The packaging effort for seahorse has now reached landing so this issue can be closed.
Oct 3 2021
Since I just saw this issue on the byzantium board I've opened https://source.puri.sm/Librem5/debs/pkg-phosh/-/merge_requests/21
This should be resolved in byzantium already :-)
Does this issue still exist? I changed the image build process quite a bit, so the current images are not comparable to the old ones.
This should be fixed in landing/byzantium for a while now :-)
I would rather add a search function to this, as this page can get extremely large (to the point of hanging up a browser tab).
Currently, the database has indices (no dedicated fulltext searches), but with that one could already implement a simple search. Added to the todo list, but as usual, patches welcome :-)
Oct 2 2021
I guess this is changing. I found: 0001-general-Remove-option-to-bypass-delete-confirmation.patch. I guess I will look for a new File Manager that lets me work the way I wish. Thanks.
Sep 30 2021
Actually, this bug doesn't just affect alt-menu symlink creation - anything done with a nautilus alt-menu is affected and kills nautilus (even simply clicking outside of the alt-menu)
Please help me to understand. Why would an upstream change be reflected in Purism's version, but not Debian 11 (bullseye) at the same level?
Sep 29 2021
It may have been upstream that made these changes, if so, the bug ought to go there.
We need more information. Perhaps the version of Plasma they're using and a screenshot if possible?
dpkg is now at version 1.20.9pureos2 thanks to uploads by Sebastian this July.
Sep 27 2021
nice, I have no criticism :D
Sep 26 2021
Feedback in the Debian derivatives list agrees with Carstens proposal, so I withdraw my alternative proposal.
This issue is now raised in Debian Derivatives team: https://lists.debian.org/debian-derivatives/2021/09/msg00006.html
I think it is
wrong needless busywork to rename original Uploaders field: During the lifetime of a forked package it is sensible to know who maintains the non-forked package (the Maintainer field) but not really relevant to know who was responsible of uploading within the upstream distribution (the Uploader field).
Sep 25 2021
Issue description updated to not mention experimental.
Just FTR, we can't binary-sync anything from experimental, ever. Packages there are built with other binaries from experimental, which would break any suite we sync them into. Source syncs can work though, but will need support implemented in Synchrontron in Laniakea.
To me, this Lintian check actually makes little sense. The one for Maintainer is important, so the maintenance status is reflected in the modified package, but Changed-by could be any address. When Zlatan and I created the project, the initial goal was explicitly to get the community involved and have people outside of Purism contribute. That didn't really work out, but by limiting change authors to people with an @puri.sm address we make this even less likely and also make the project look a lot more like a Purism inside job than is good for it ;-)
This was a bit tricky, as byzantium is still an in-development release and all changes should go through landing. Fortunately though, the synchrotron Laniakea module is flexible enough nowadays to accommodate for that.
I've implemented a solution which will fill up the -updates and -security suites directly for byzantium from the respective bullseye suites, while not allowing manual uploads from us which should still go through landing. That workflow should work well for byzantiums current odd in-between state between "released" and "in-development".
I've prepared a setup on https://source.puri.sm/carsten.schoenert/seahorse
Sep 24 2021
@carsten.schoenert happy to help here, first good step would be a MR against the above repo with the necessary changes. I usually do
Sep 23 2021
Oh I see. This means that d/control email address can be arbitrary but the uploading key must be in the keychain. Thanks for the clarification. In such case we ought to mark it as pedantic (or just info) in Lintian.
Let's call it a first challenge. ;)
The linitan check is about the fields in d/control. I doesn't care who signs/uploads the package later on.
The name "Hephaestus" is going to be deprecated and removed in favor of just the version number, e.g. PureOS 9 Amber, Pureos 10 Byzantium, etc.