Package: reportbug
Version: 7.10.3+deb11u1
Version: 11.5.1
Severity: normal
Dear Maintainer,
I very often use reportbug like this:
* write report on machine A (sid)
* "send" it to `outfile "~/reportbug.report"`
* copy the report to machine B (bullseye)
* reportbug -r, as instructed, on B;
this opens it in neomutt via the `mutt` config option
* review, send
Often, as one may expect, I want to attach a log, or a diff, or whatever;
these appear to be lost.
This doesn't appear to be reportbug-version-dependent;
when recalling on both machine A and machine B
(7.10.3+deb11u1 and 11.5.1)
the attachment is forgotten, here's a session from the latter:
-- >8 --
$ reportbug -r machine-b/saved-reportbug.report
*** Welcome to reportbug. Use ? for help at prompts. ***
Note: bug reports are publicly archived (including the email address of the submitter).
Detected character set: UTF-8
Please change your locale if this is incorrect.
Using 'наб <nabijaczleweli@nabijaczleweli.xyz>' as your from address.
Will send report to Debian (per lsb_release).
Spawning sensible-editor...
Report will be saved as ~/reportbug.report
Submit this report on reportbug (e to edit) [Y|n|a|c|e|i|l|m|p|q|d|t|?]?
Bug report written to a temporary file.
You can resume the unsent report using:
reportbug -r /home/nabijaczleweli/reportbug.report
Thank you for using reportbug
-- >8 --
The attachment /is/ present in the original saved file ‒
I'm attaching saved-reportbug.report and the new one.
Best,
наб
-- Package-specific info:
** Environment settings:
INTERFACE="text"
** /home/nabijaczleweli/.reportbugrc:
reportbug_version "7.5.3~deb10u1"
mode standard
ui text
email "nabijaczleweli@nabijaczleweli.xyz"
outfile "~/reportbug.report"
For machine B, the diff is
-outfile ...
+mutt
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Architectures: amd64, i386
Kernel: Linux 5.19.0-1-amd64 (SMP w/2 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages reportbug depends on:
ii apt 2.5.3+b1
ii python3 3.10.6-1
ii python3-reportbug 11.5.1
ii sensible-utils 0.0.17
reportbug recommends no packages.
Versions of packages reportbug suggests:
pn claws-mail <none>
ii debconf 1.5.79
pn debsums <none>
pn dlocate <none>
pn emacs-bin-common <none>
ii file 1:5.41-4
iu gnupg 2.2.40-1
ii nullmailer [mail-transport-agent] 1:2.2-3+b1
pn python3-urwid <none>
pn reportbug-gtk <none>
pn xdg-utils <none>
Versions of packages python3-reportbug depends on:
ii apt 2.5.3+b1
ii file 1:5.41-4
ii python3 3.10.6-1
ii python3-apt 2.3.0+nmu1
ii python3-debian 0.1.48
ii python3-debianbts 3.2.3
ii python3-requests 2.27.1+dfsg-1
ii sensible-utils 0.0.17
python3-reportbug suggests no packages.
-- no debconf information
Content-Type: multipart/mixed; boundary="===============0930356783=="
MIME-Version: 1.0
From: =?utf-8?b?0L3QsNCx?= <nabijaczleweli@nabijaczleweli.xyz>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: dnsmasq: Voluminous bogus whitespace errors introduced into UCF /etc/dnsmasq.conf
Bcc: =?utf-8?b?0L3QsNCx?= <nabijaczleweli@nabijaczleweli.xyz>
Message-ID: <166661075594.3170.7846439592074691634.reportbug@szarotka.nabijaczleweli.xyz>
X-Mailer: reportbug 11.5.1
Date: Mon, 24 Oct 2022 13:25:55 +0200
This is a multi-part MIME message sent by reportbug.
--===============0930356783==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline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--===============0930356783==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="dndiff"
diff --git a/etc/dnsmasq.conf b/etc/dnsmasq.conf.dpkg-new$
index bb4c8ed..2047630 100644$
--- a/etc/dnsmasq.conf$
+++ b/etc/dnsmasq.conf.dpkg-new$
@@ -27,8 +27,8 @@ bogus-priv$
$
# Replies which are not DNSSEC signed may be legitimate, because the domain$
# is unsigned, or may be forgeries. Setting this option tells dnsmasq to$
-# check that an unsigned reply is OK, by finding a secure proof that a DS$
-# record somewhere between the root and the domain does not exist.$
+# check that an unsigned reply is OK, by finding a secure proof that a DS $
+# record somewhere between the root and the domain does not exist. $
# The cost of setting this is that even queries in unsigned domains will need$
# one or more extra DNS queries to verify.$
#dnssec-check-unsigned$
@@ -86,6 +85,16 @@ server=8.8.8.8$
# subdomains to the vpn and search ipsets:$
#ipset=/yahoo.com/google.com/vpn,search$
$
+# Add the IPs of all queries to yahoo.com, google.com, and their$
+# subdomains to netfilters sets, which is equivalent to$
+# 'nft add element ip test vpn { ... }; nft add element ip test search { ... }'$
+#nftset=/yahoo.com/google.com/ip#test#vpn,ip#test#search$
+$
+# Use netfilters sets for both IPv4 and IPv6:$
+# This adds all addresses in *.yahoo.com to vpn4 and vpn6 for IPv4 and IPv6 addresses.$
+#nftset=/yahoo.com/4#ip#test#vpn4$
+#nftset=/yahoo.com/6#ip#test#vpn6$
+$
# You can control how dnsmasq talks to a server: this forces$
# queries to 10.1.2.3 to be routed via eth1$
# server=10.1.2.3@eth1$
@@ -155,7 +164,7 @@ domain=nabijaczleweli.xyz$
# a lease time. If you have more than one network, you will need to$
# repeat this for each network on which you want to supply DHCP$
# service.$
-#dhcp-range=192.168.1.2,192.168.1.254,24h$
+#dhcp-range=192.168.0.50,192.168.0.150,12h$
$
# This is an example of a DHCP range where the netmask is given. This$
# is needed for networks we reach the dnsmasq DHCP server via a relay$
@@ -184,11 +193,11 @@ domain=nabijaczleweli.xyz$
#dhcp-range=1234::2, 1234::500, 64, 12h$
$
# Do Router Advertisements, BUT NOT DHCP for this subnet.$
-#dhcp-range=1234::, ra-only$
+#dhcp-range=1234::, ra-only $
$
# Do Router Advertisements, BUT NOT DHCP for this subnet, also try and$
-# add names to the DNS for the IPv6 address of SLAAC-configured dual-stack$
-# hosts. Use the DHCPv4 lease to derive the name, network segment and$
+# add names to the DNS for the IPv6 address of SLAAC-configured dual-stack $
+# hosts. Use the DHCPv4 lease to derive the name, network segment and $
# MAC address and assume that the host will also have an$
# IPv6 address calculated using the SLAAC algorithm.$
#dhcp-range=1234::, ra-names$
@@ -211,9 +220,9 @@ domain=nabijaczleweli.xyz$
#dhcp-range=1234::, ra-stateless, ra-names$
$
# Do router advertisements for all subnets where we're doing DHCPv6$
-# Unless overridden by ra-stateless, ra-names, et al, the router$
+# Unless overridden by ra-stateless, ra-names, et al, the router $
# advertisements will have the M and O bits set, so that the clients$
-# get addresses and configuration from DHCPv6, and the A bit reset, so the$
+# get addresses and configuration from DHCPv6, and the A bit reset, so the $
# clients don't use SLAAC addresses.$
#enable-ra$
$
@@ -290,11 +295,11 @@ domain=nabijaczleweli.xyz$
# any machine with Ethernet address starting 11:22:33:$
#dhcp-host=11:22:33:*:*:*,set:red$
$
-# Give a fixed IPv6 address and name to client with$
+# Give a fixed IPv6 address and name to client with $
# DUID 00:01:00:01:16:d2:83:fc:92:d4:19:e2:d8:b2$
# Note the MAC addresses CANNOT be used to identify DHCPv6 clients.$
# Note also that the [] around the IPv6 address are obligatory.$
-#dhcp-host=id:00:01:00:01:16:d2:83:fc:92:d4:19:e2:d8:b2, fred, [1234::5]$
+#dhcp-host=id:00:01:00:01:16:d2:83:fc:92:d4:19:e2:d8:b2, fred, [1234::5] $
$
# Ignore any clients which are not specified in dhcp-host lines$
# or /etc/ethers. Equivalent to ISC "deny unknown-clients".$
@@ -350,7 +355,7 @@ dhcp-option=option:router,192.168.1.1$
# Send DHCPv6 option. Note [] around IPv6 addresses.$
#dhcp-option=option6:dns-server,[1234::77],[1234::88]$
$
-# Send DHCPv6 option for namservers as the machine running$
+# Send DHCPv6 option for namservers as the machine running $
# dnsmasq and another.$
#dhcp-option=option6:dns-server,[::],[1234::88]$
$
@@ -555,7 +560,7 @@ dhcp-option=option:router,192.168.1.1$
# Set the DHCP server to enable DHCPv4 Rapid Commit Option per RFC 4039.$
# In this mode it will respond to a DHCPDISCOVER message including a Rapid Commit$
# option with a DHCPACK including a Rapid Commit option and fully committed address$
-# and configuration information. This must only be enabled if either the server is$
+# and configuration information. This must only be enabled if either the server is $
# the only server for the subnet, or multiple servers are present and they each$
# commit a binding for all clients.$
#dhcp-rapid-commit$
--===============0930356783==--
Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 From: =?utf-8?b?0L3QsNCx?= <nabijaczleweli@nabijaczleweli.xyz> To: Debian Bug Tracking System <submit@bugs.debian.org> Subject: dnsmasq: Voluminous bogus whitespace errors introduced into UCF /etc/dnsmasq.conf Bcc: =?utf-8?b?0L3QsNCx?= <nabijaczleweli@nabijaczleweli.xyz> Message-ID: <166661148757.2060.14738526665742911708.reportbug@szarotka.nabijaczleweli.xyz> X-Mailer: reportbug 11.5.1 Date: Mon, 24 Oct 2022 13:38:07 +0200 UGFja2FnZTogZG5zbWFzcQpWZXJzaW9uOiAyLjg3LTEuMQpTZXZlcml0eTogbWlub3IKCkRlYXIg TWFpbnRhaW5lciwKCkkgdXBkYXRlZCBkbnNtYXNxLCBhbmQgZXhwZWN0ZWRseSB0aGVyZSBhcmUg bmV3CmNvbW1lbnRlZC1vdXQgZGVmYXVsdCBvcHRpb25zIGluIGRuc21hc3EuY29uZi4KVGhpcyBp cyBncmVhdCwgSSdtIGhhcHB5IHRvIG1lcmdlIHRoZXNlIGludG8gbXkgY29uZmlnLgoKV2hhdCdz IG11Y2ggbGVzcyBncmVhdCBpcyB0aGUgd2hpdGVzcGFjZSBlcnJvcnMsIG5ldyBpbiB0aGlzIHJl bGVhc2UuCk5hdHVyYWxseSwgdGhlIGRlZmF1bHQgYXB0L3VjZiAiRCIgdXBkYXRlIGFjdGlvbiBk b2Vzbid0IHNob3cKdGhhdCB0aGV5J3JlIHdoaXRlc3BhY2UgZXJyb3JzLCBzbyB0aGVyZSBhcmUg anVzdCBhIGxvdApvZiBpZGVudGljYWwgbGluZXMgaW4gdGhlIGRpZmYuIE1vc3Qgb2YgdGhlbSBh cmUgaW4gdGhlIGNvbW1lbnRzLApzb21lIGFyZW4ndCwgYW5kIHRoYXQncyBtb3JlIHdvcnJ5aW5n LgoKSSd2ZSBhdHRhY2hlZCBhICJjbGVhbiIgKGkuZS4gcmVtb3ZlZCBhbGwgbXkgY3VzdG9taXNh dGlvbikgZGlmZgpwaXBlZCB0aHJvdWdoIGNhdCAtQSB0aGF0IHNob3dzIHRoZSBkaWZmZXJlbmNl cyB1c2VycyB3aWxsIHNlZQoob3IsIHJhdGhlciwgbm90IHNlZSkgYW5kIGhhdmUgdG8gZGVjaWRl IHVwb24uCgpQbGVhc2UgY29uc2lkZXIgZW5mb3JjaW5nIHNvbWUgc29ydCBvZiB0cmltIHJlZ2lt ZW4gaWYgdGhlIHVwc3RyZWFtCmRuc21hc3EuY29uZnMgYXJlIGFsc28gZGFtYWdlZCBsaWtlIHRo aXMuCgp0ZXN0CgpCZXN0LArQvdCw0LEKCi0tIFN5c3RlbSBJbmZvcm1hdGlvbjoKRGViaWFuIFJl bGVhc2U6IGJvb2t3b3JtL3NpZAogIEFQVCBwcmVmZXJzIHVuc3RhYmxlCiAgQVBUIHBvbGljeTog KDUwMCwgJ3Vuc3RhYmxlJykKQXJjaGl0ZWN0dXJlOiB4MzIgKHg4Nl82NCkKRm9yZWlnbiBBcmNo aXRlY3R1cmVzOiBhbWQ2NCwgaTM4NgoKS2VybmVsOiBMaW51eCA1LjE5LjAtMS1hbWQ2NCAoU01Q IHcvMiBDUFUgdGhyZWFkczsgUFJFRU1QVCkKS2VybmVsIHRhaW50IGZsYWdzOiBUQUlOVF9QUk9Q UklFVEFSWV9NT0RVTEUsIFRBSU5UX09PVF9NT0RVTEUsIFRBSU5UX1VOU0lHTkVEX01PRFVMRQpM b2NhbGU6IExBTkc9ZW5fR0IuVVRGLTgsIExDX0NUWVBFPWVuX0dCLlVURi04IChjaGFybWFwPVVU Ri04KSwgTEFOR1VBR0Ugbm90IHNldApTaGVsbDogL2Jpbi9zaCBsaW5rZWQgdG8gL3Vzci9iaW4v ZGFzaApJbml0OiBzeXN0ZW1kICh2aWEgL3J1bi9zeXN0ZW1kL3N5c3RlbSkKTFNNOiBBcHBBcm1v cjogZW5hYmxlZAoKVmVyc2lvbnMgb2YgcGFja2FnZXMgZG5zbWFzcSBkZXBlbmRzIG9uOgppaSAg ZG5zbWFzcS1iYXNlIFtkbnNtYXNxLWJhc2VdICAyLjg3LTEuMQppaSAgaW5pdC1zeXN0ZW0taGVs cGVycyAgICAgICAgICAxLjY1LjIKaWkgIGxzYi1iYXNlICAgICAgICAgICAgICAgICAgICAgMTEu NAppaSAgbmV0YmFzZSAgICAgICAgICAgICAgICAgICAgICA2LjQKaWkgIHJ1bml0LWhlbHBlciAg ICAgICAgICAgICAgICAgMi4xNS4wCmlpICBzeXN2aW5pdC11dGlscyBbbHNiLWJhc2VdICAgIDMu MDUtNgoKZG5zbWFzcSByZWNvbW1lbmRzIG5vIHBhY2thZ2VzLgoKVmVyc2lvbnMgb2YgcGFja2Fn ZXMgZG5zbWFzcSBzdWdnZXN0czoKcG4gIHJlc29sdmNvbmYgIDxub25lPgoKLS0gQ29uZmlndXJh dGlvbiBGaWxlczoKL2V0Yy9kZWZhdWx0L2Ruc21hc3EgY2hhbmdlZCBbbm90IGluY2x1ZGVkXQov ZXRjL2Ruc21hc3EuY29uZiBjaGFuZ2VkIFtub3QgaW5jbHVkZWRdCgotLSBubyBkZWJjb25mIGlu Zm9ybWF0aW9uCg==
Attachment:
signature.asc
Description: PGP signature