[From nobody Mon Apr 27 18:55:08 2026
Received: (at submit) by bugs.debian.org; 13 Mar 2026 16:18:26 +0000
X-Spam-Checker-Version: SpamAssassin 4.0.1-bugs.debian.org_2005_01_02
 (2024-03-25) on buxtehude.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-120.1 required=4.0 tests=BAYES_00,
 BODY_INCLUDES_PACKAGE,DKIMWL_WL_HIGH,DKIM_SIGNED,DKIM_VALID,
 DKIM_VALID_AU,DKIM_VALID_EF,FOURLA,FROMDEVELOPER,GMAIL,HAS_PACKAGE,
 SPF_HELO_NONE,SPF_NONE,USER_IN_DKIM_WELCOMELIST,XMAILER_REPORTBUG
 autolearn=ham autolearn_force=no
 version=4.0.1-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 11; hammy, 150; neutral, 69; spammy,
 0. spammytokens: hammytokens:0.000-+--XDebbugsCc,
 0.000-+--X-Debbugs-Cc, 0.000-+--HTo:N*Debian, 0.000-+--H*Ad:N*Bug,
 0.000-+--H*Ad:N*Tracking
Return-path: &lt;anarcat@debian.org&gt;
Received: from marcos.anarc.at ([45.72.186.94]:36502)
 by buxtehude.debian.org with esmtps
 (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256)
 (Exim 4.96) (envelope-from &lt;anarcat@debian.org&gt;) id 1w15DW-002Aur-2P
 for submit@bugs.debian.org; Fri, 13 Mar 2026 16:18:26 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=debian.org;
 s=marcos-debian.anarcat.user; t=1773418705;
 bh=s5x3YZDtymtVIeqf7kUJiF0XWFwYrQAmCR0icveS0gg=;
 h=From:To:Subject:Date:From;
 b=Y0ASTO4atgOUXYTCOs6g7CB7lFWzHu+0ED9xqAQosf/tSKHpM/F8n9oCw9PPKI8CX
 zxlTU5fkPGxb1LFZj+nxdqtwQ9vqyqVsP9R9FdH2GsC0RyZff8pZ40sJrLxdc9GxqM
 VNVYzyDfWH5IO9oO3wgr91HDXvFetnEmT1YsFQh8F0FHYWKdjnNd+f6L1vdf2qRU1T
 WZZg9MVFEQkBPvhiEU8AfZIXdGUGZlV8/xjAY0mrKHXdpYdJDIb7Fx83UTpCEiH1Gu
 v4puQTRFVoVWJDo2x8/Zqt2P8JCO6QoCs1B05Kg44A2gDb9oPV6gj0zKEzTvvx7c/w
 UI7tJSXWDBKmg==
Received: from angela.anarc.at (unknown [45.72.186.94])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange x25519 server-signature ECDSA (prime256v1) server-digest SHA256)
 (No client certificate requested)
 by marcos.anarc.at (Postfix) with ESMTPSA id DB01410E0C6;
 Fri, 13 Mar 2026 12:18:25 -0400 (EDT)
Received: by angela.anarc.at (Postfix, from userid 1000)
 id A7E10DFAF0; Fri, 13 Mar 2026 12:18:25 -0400 (EDT)
Content-Type: text/plain; charset=&quot;us-ascii&quot;
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Antoine Beaupre &lt;anarcat@debian.org&gt;
To: Debian Bug Tracking System &lt;submit@bugs.debian.org&gt;
Subject: new upstream release (1.15), blocking rofi-rbw packaging
Message-ID: &lt;177341870567.2875164.839968127487124598.reportbug@angela.anarc.at&gt;
X-Mailer: reportbug 13.2.0
Date: Fri, 13 Mar 2026 12:18:25 -0400
Delivered-To: submit@bugs.debian.org

Package: rbw
Version: 1.13.2-3
Severity: normal
X-Debbugs-Cc: nadzya.info@gmail.com

There are two new minor releases upstream. I'm particularly interested
in the 1.15.0 release which introduces a --raw option to rbw list.

That is necessary for the rofi-rbw package to work, so this is
blocking #1130602.

Thanks!


-- System Information:
Debian Release: 13.3
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable-debug'), (500, 'stable'), (1, 'experimental'), (1, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.12.73+deb13-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages rbw depends on:
ii  libc6            2.41-12+deb13u1
ii  libgcc-s1        14.2.0-19
ii  pinentry-curses  1.3.1-2

rbw recommends no packages.

rbw suggests no packages.

-- no debconf information
]