<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<style type="text/css" style="display:none;"> P {margin-top:0;margin-bottom:0;} </style>
</head>
<body dir="ltr">
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
Your updated version here fails too. When you look at the verbose data, it catches a million quotes and still fails.</div>
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
I rewrote the debian/watch file and fixed it in Salsa using a variation of <a href="https://wiki.debian.org/debian/watch#GitLab" id="LPlnk646449">
https://wiki.debian.org/debian/watch#GitLab</a> and its updated April 2024 patterns, specifically to catch the tar.gz. Evaluating the verbose output with the download option indicates it works AND properly detects the single URL.</div>
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
Note that your uscan is also throwing warnings about "pgp" items being available but that isn't actually a present key in the environment.</div>
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
Running the download as you did seems to work. However that PGP warning is false. Too bad we can't suppress that.</div>
<div id="appendonsend"></div>
<hr style="display:inline-block;width:98%" tabindex="-1">
<div id="divRplyFwdMsg" dir="ltr"><font face="Calibri, sans-serif" style="font-size:11pt" color="#000000"><b>From:</b> Pkg-privacy-maintainers <pkg-privacy-maintainers-bounces+teward=ubuntu.com@alioth-lists.debian.net> on behalf of Patrice Duroux <patrice.duroux@gmail.com><br>
<b>Sent:</b> Wednesday, August 28, 2024 12:05 PM<br>
<b>To:</b> 1079918@bugs.debian.org <1079918@bugs.debian.org><br>
<b>Subject:</b> [Pkg-privacy-maintainers] Bug#1079918: Patch does not work!</font>
<div> </div>
</div>
<div class="BodyFragment"><font size="2"><span style="font-size:11pt;">
<div class="PlainText">Strange, because in general I test everything in a git clone before submitting.<br>
I think that your recent change is wrong also:<br>
<br>
$ more debian/watch <br>
version=4<br>
opts="searchmode=plain" \<br>
<a href="https://gitlab.torproject.org/tpo/applications/torbrowser-launcher/tags?sort=updated_desc">https://gitlab.torproject.org/tpo/applications/torbrowser-launcher/tags?sort=updated_desc</a> .*/v?\d[\d.]+/@PACKAGE@-v?(\d\S*)\.tar\.gz<br>
<br>
$ uscan --download-current-version<br>
Newest version of torbrowser-launcher on remote site is 0.3.7, specified download version is 0.3.7<br>
uscan warn: Possible OpenPGP signature found at:<br>
<a href="https://gitlab.torproject.org/tpo/applications/torbrowser-launcher/<div">
https://gitlab.torproject.org/tpo/applications/torbrowser-launcher/<div</a> class="js-source-code-dropdown" data-css-class="" data-download-artifacts="[]" data-download-links="[{"text":"zip","path":"/tpo/applications/torbrowser-launcher/-/archive/v0.3.7/torbrowser-launcher-v0.3.7.zip"},{"text":"tar.gz","path":"/tpo/applications/torbrowser-launcher/-/archive/v0.3.7/torbrowser-launcher-v0.3.7.tar.gz.asc<br>
* Add opts=pgpsigurlmangle=s/$/.asc/ or opts=pgpmode=auto to debian/watch<br>
* Add debian/upstream/signing-key.asc.<br>
See uscan(1) for more details<br>
uscan error: Unknown compression used in ../torbrowser-launcher-v0.3.7.tar.gz<br>
<br>
<br>
because the match .*/ is too wide and that is why I tried to restrict it.<br>
<br>
Regards,<br>
Patrice<br>
<br>
_______________________________________________<br>
Pkg-privacy-maintainers mailing list<br>
Pkg-privacy-maintainers@alioth-lists.debian.net<br>
<a href="https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-privacy-maintainers">https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-privacy-maintainers</a><br>
</div>
</span></font></div>
</body>
</html>