Bug#1000841: marked as done (xfwm4: Maximized Chromium-based browser windows are too large.)
Your message dated Fri, 04 Nov 2022 08:38:26 +0000
with message-id <E1oqsDa-005K7W-IA@fasolo.debian.org>
and subject line Bug#1000841: fixed in xfwm4 4.17.1-1
has caused the Debian Bug report #1000841,
regarding xfwm4: Maximized Chromium-based browser windows are too large.
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)
--
1000841: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1000841
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: xfwm4: Maximized Chromium-based browser windows are too large.
- From: test <iamloci@protonmail.com>
- Date: Mon, 29 Nov 2021 22:59:10 -0500
- Message-id: <163824475047.214049.3816440422288549203.reportbug@venasaur>
Package: xfwm4
Version: 4.16.1-1
Severity: normal
Tags: upstream
X-Debbugs-Cc: iamloci@protonmail.com
When I maximize Chromium-based browsers (e.g. Chromium, Brave), the relevant
window renders to an area larger than that of the screen.
Relevant browser Github issue: https://github.com/brave/brave-
browser/issues/19038
It appears to only affect Xfce, and thus likely isn't a bug in the browsers
themselves.
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 5.15.0-1-amd64 (SMP w/12 CPU threads)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages xfwm4 depends on:
ii libc6 2.32-4
ii libcairo2 1.16.0-5
ii libepoxy0 1.5.9-2
ii libgdk-pixbuf-2.0-0 2.42.6+dfsg-2
ii libglib2.0-0 2.70.1-1
ii libgtk-3-0 3.24.30-3
ii libpango-1.0-0 1.48.10+ds1-1
ii libpangocairo-1.0-0 1.48.10+ds1-1
ii libstartup-notification0 0.12-6+b1
ii libwnck-3-0 40.0-2
ii libx11-6 2:1.7.2-2+b1
ii libxcomposite1 1:0.4.5-1
ii libxdamage1 1:1.1.5-2
ii libxext6 2:1.3.4-1
ii libxfce4ui-2-0 4.16.1-1
ii libxfce4util7 4.16.0-1
ii libxfconf-0-3 4.16.0-2
ii libxfixes3 1:5.0.3-2
ii libxinerama1 2:1.1.4-2
ii libxpresent1 1.0.0-2+b10
ii libxrandr2 2:1.5.2-1
ii libxrender1 1:0.9.10-1
ii libxres1 2:1.2.0-4
Versions of packages xfwm4 recommends:
ii librsvg2-common 2.50.7+dfsg-2
Versions of packages xfwm4 suggests:
ii xfce4 4.16
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: xfwm4
Source-Version: 4.17.1-1
Done: Unit 193 <unit193@debian.org>
We believe that the bug you reported is fixed in the latest version of
xfwm4, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1000841@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Unit 193 <unit193@debian.org> (supplier of updated xfwm4 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA384
Format: 1.8
Date: Fri, 04 Nov 2022 03:33:26 -0400
Source: xfwm4
Architecture: source
Version: 4.17.1-1
Distribution: experimental
Urgency: medium
Maintainer: Debian Xfce Maintainers <debian-xfce@lists.debian.org>
Changed-By: Unit 193 <unit193@debian.org>
Closes: 1000841
Changes:
xfwm4 (4.17.1-1) experimental; urgency=medium
.
* Team upload.
.
[ Mateusz Łukasik ]
* d/control: update standards version to 4.6.0.
.
[ Unit 193 ]
* New upstream version 4.17.1.
- client: Handle removal of GTK_FRAME_EXTENTS (Closes: #1000841)
* d/control: Bump DH compat to 13.
* d/rules: Drop --as-needed from LDFLAGS, default in stable.
* Update Standards-Version to 4.6.1.
Checksums-Sha1:
eac134db8ed1a7e5cc886704089af1f58b062657 2253 xfwm4_4.17.1-1.dsc
3ce00c26206f2e4f5be79ffbb12933ac8666b8c5 1216851 xfwm4_4.17.1.orig.tar.bz2
c3bddd11c0ffaa789eaf95eb38b1e259fabfcbd8 10512 xfwm4_4.17.1-1.debian.tar.xz
5b194a4044f07a5045d7a60392e911051a532430 15317 xfwm4_4.17.1-1_amd64.buildinfo
Checksums-Sha256:
f3d4293397206ca8005ec9b004650e07b762e53878248e2e0e3a6bd75c334832 2253 xfwm4_4.17.1-1.dsc
e1ace7ef000687dd93b393f493bc61771215da5b2752813b8a3b3a18d2725909 1216851 xfwm4_4.17.1.orig.tar.bz2
2a9dd8749096f111eb652aed220c1aa566f1ba1b823f3edf6c5927f874f1b0d1 10512 xfwm4_4.17.1-1.debian.tar.xz
485821cf2633b3e73c61e537def1a9fe7f0d965c6e66b01f0020e7d8dae7fdb9 15317 xfwm4_4.17.1-1_amd64.buildinfo
Files:
4abc5057298f51834dfc19e6ad3a6fad 2253 xfce optional xfwm4_4.17.1-1.dsc
5f61425263a4c1d52d1611cf09a52403 1216851 xfce optional xfwm4_4.17.1.orig.tar.bz2
077a65743216dcda9c93c28e18e0bf64 10512 xfce optional xfwm4_4.17.1-1.debian.tar.xz
41d0794e454774e1d6c0fdc2a0167515 15317 xfce optional xfwm4_4.17.1-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCQAdFiEEjbPlhoZdK0orGFpcUAHhsJqjdEsFAmNkw1sACgkQUAHhsJqj
dEtxjQ//X+2j0r+0W1XP6IlxAxR2y9PRD9m1P+01NQ/ivywa8BgZxQS4IiF2a+ab
54SoTyWWH0q5YVT1v4CQohnvNW6F3oyx4QEU9iIx8pNT46JI9yShQDMc3/DRyhNm
GrN9YmOo9ifPKoiY+raIKuLLLk6tsKqBrstLb5u3vUzbwQk26HEpCTRxhpoUX5Ui
E+3N/i7FuA2iX2l6dwS8/IOCZeM4Uhr1KOQ8aoxHUoF9MnFOU5kAo1cwUaxlJWhQ
UxNkDRH/6RjeFvXehiYAA31LILhgBUY4J/DL9yyP57l+vJL6TnY7byI8gxtf//Eu
dqGFrgXv6gFn4GMFX/RGkJ/83qO7WU8SIJD8oAevcriGWSZZOqFKkcRSND1cexS9
WOR/l897RwfPmjAFoZ58a0vqeQEXFhm8LuM+QYs7uN2qX9ndwpK2bGmB3SQJk2IK
my6CcYNP9n3OyB33Yw2rfkfrehy+gxCJmtJ1+vVC/LW3a/OaCDFKz3xqqtdHJC/P
q4rih28njrT/fnE5m66GY3KK9WlEAVSO8wGOQaLuxX79xTfD9MtIaxtv3E9T75y5
H5rGgCpFhZNhnwoVU6D5mtqDt/qodBQXvcXGRztOR8OHFDJ11OHdvKapiUrguveY
x+SpVddrLzKeu23f4NFLDRzqkMiTbnjgVk2sxcZMZFpoPBABtnw=
=qR12
-----END PGP SIGNATURE-----
--- End Message ---
Reply to: