[Aptitude-devel] Bug#1042897: aptitude: viewing a package's changelog from the TUI outputs a warning that is immediately erased
Vincent Lefevre
vincent at vinc17.net
Wed Aug 2 14:51:28 BST 2023
Package: aptitude
Version: 0.8.13-5
Severity: normal
When I use "C" (View a package's changelog) on clang-15 from the
aptitude TUI, I get a warning that is immediately erased, so that
it is impossible to read it.
I suppose that aptitude should redirect stderr from
aptitude-changelog-parser so that it can display its contents
(when non empty) in a clear way.
Enabling the terminal's logs allows me to get the text of this
warning:
aptitude-changelog-parser: warning: /tmp/aptitude-root.7707:EXkCUB/aptitude-download-4-bORTciGPJi,..uo2EeQnZD7WBcD+L6_aptitude-download-cbF3RCIRNjR7d%D7+V.DiRimX__YaCHL(l105): found start of entry where expected more change data or trailer
This text seems to come from /usr/share/perl5/Dpkg/Changelog/Debian.pm:
unless ($expect eq FIRST_HEADING || $expect eq NEXT_OR_EOF) {
$self->parse_error($file, $.,
sprintf(g_('found start of entry where expected %s'),
$expect), "$_");
}
About this unexpected warning, there may be some other bug.
But note that "apt changelog clang-15" is fine.
-- Package-specific info:
Terminal: xterm-256color
$DISPLAY is set.
which aptitude: /usr/bin/aptitude
aptitude version information:
aptitude 0.8.13
Compiler: g++ 12.1.0
Compiled against:
apt version 6.0.0
NCurses version 6.3
libsigc++ version: 2.10.8
Gtk+ support disabled.
Qt support disabled.
Current library versions:
NCurses version: ncurses 6.4.20230625
cwidget version: 0.5.18
Apt version: 6.0.0
aptitude linkage:
linux-vdso.so.1 (0x00007fff953a4000)
libgtk3-nocsd.so.0 => /usr/lib/x86_64-linux-gnu/libgtk3-nocsd.so.0 (0x00007f4eb8d16000)
libapt-pkg.so.6.0 => /usr/lib/x86_64-linux-gnu/libapt-pkg.so.6.0 (0x00007f4eb8400000)
libncursesw.so.6 => /lib/x86_64-linux-gnu/libncursesw.so.6 (0x00007f4eb8cdd000)
libtinfo.so.6 => /lib/x86_64-linux-gnu/libtinfo.so.6 (0x00007f4eb8ca8000)
libsigc-2.0.so.0 => /usr/lib/x86_64-linux-gnu/libsigc-2.0.so.0 (0x00007f4eb8c9f000)
libcwidget.so.4 => /usr/lib/x86_64-linux-gnu/libcwidget.so.4 (0x00007f4eb870e000)
libsqlite3.so.0 => /usr/lib/x86_64-linux-gnu/libsqlite3.so.0 (0x00007f4eb8299000)
libboost_iostreams.so.1.74.0 => /usr/lib/x86_64-linux-gnu/libboost_iostreams.so.1.74.0 (0x00007f4eb8c85000)
libxapian.so.30 => /usr/lib/x86_64-linux-gnu/libxapian.so.30 (0x00007f4eb8000000)
libpthread.so.0 => /lib/x86_64-linux-gnu/libpthread.so.0 (0x00007f4eb8c80000)
libstdc++.so.6 => /usr/lib/x86_64-linux-gnu/libstdc++.so.6 (0x00007f4eb7c00000)
libm.so.6 => /lib/x86_64-linux-gnu/libm.so.6 (0x00007f4eb862f000)
libgcc_s.so.1 => /lib/x86_64-linux-gnu/libgcc_s.so.1 (0x00007f4eb8c5a000)
libc.so.6 => /lib/x86_64-linux-gnu/libc.so.6 (0x00007f4eb7a1e000)
libdl.so.2 => /lib/x86_64-linux-gnu/libdl.so.2 (0x00007f4eb8c55000)
libz.so.1 => /lib/x86_64-linux-gnu/libz.so.1 (0x00007f4eb8c36000)
libbz2.so.1.0 => /lib/x86_64-linux-gnu/libbz2.so.1.0 (0x00007f4eb8c23000)
liblzma.so.5 => /lib/x86_64-linux-gnu/liblzma.so.5 (0x00007f4eb826a000)
liblz4.so.1 => /usr/lib/x86_64-linux-gnu/liblz4.so.1 (0x00007f4eb8244000)
libzstd.so.1 => /usr/lib/x86_64-linux-gnu/libzstd.so.1 (0x00007f4eb7f40000)
libudev.so.1 => /usr/lib/x86_64-linux-gnu/libudev.so.1 (0x00007f4eb7f0e000)
libsystemd.so.0 => /usr/lib/x86_64-linux-gnu/libsystemd.so.0 (0x00007f4eb793f000)
libgcrypt.so.20 => /usr/lib/x86_64-linux-gnu/libgcrypt.so.20 (0x00007f4eb77f9000)
libxxhash.so.0 => /usr/lib/x86_64-linux-gnu/libxxhash.so.0 (0x00007f4eb861a000)
/lib64/ld-linux-x86-64.so.2 (0x00007f4eb8d43000)
libuuid.so.1 => /usr/lib/x86_64-linux-gnu/libuuid.so.1 (0x00007f4eb8610000)
libcap.so.2 => /lib/x86_64-linux-gnu/libcap.so.2 (0x00007f4eb8238000)
libgpg-error.so.0 => /lib/x86_64-linux-gnu/libgpg-error.so.0 (0x00007f4eb7ee6000)
-- System Information:
Debian Release: trixie/sid
APT prefers unstable-debug
APT policy: (500, 'unstable-debug'), (500, 'stable-updates'), (500, 'stable-security'), (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental')
merged-usr: no
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 6.3.0-2-amd64 (SMP w/12 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=POSIX, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages aptitude depends on:
ii aptitude-common 0.8.13-5
ii libapt-pkg6.0 2.7.2
ii libboost-iostreams1.74.0 1.74.0+ds1-22
ii libc6 2.37-6
ii libcwidget4 0.5.18-6
ii libgcc-s1 13.2.0-1
ii libncursesw6 6.4+20230625-2
ii libsigc++-2.0-0v5 2.12.0-1
ii libsqlite3-0 3.42.0-1
ii libstdc++6 13.2.0-1
ii libtinfo6 6.4+20230625-2
ii libxapian30 1.4.22-1
Versions of packages aptitude recommends:
ii libdpkg-perl 1.21.22
ii sensible-utils 0.0.20
Versions of packages aptitude suggests:
pn apt-xapian-index <none>
ii aptitude-doc-en [aptitude-doc] 0.8.13-5
pn debtags <none>
ii tasksel 3.73
-- no debconf information
--
Vincent Lefèvre <vincent at vinc17.net> - Web: <https://www.vinc17.net/>
100% accessible validated (X)HTML - Blog: <https://www.vinc17.net/blog/>
Work: CR INRIA - computer arithmetic / AriC project (LIP, ENS-Lyon)
More information about the Aptitude-devel
mailing list