"I can't say whether/when GNOME devs will accept this patch upstream, as this bug report (issues/52) was closed"
Yes, they did not seem to understand the issue in that report, which is now closed. But https://gitlab.gnome.org/GNOME/cheese/-/issues/62 is still open, so there's at least some hope that they'll fix it.
"Daniel, the reason I asked you to make a separate PPA is that, your PPA says "Random experiments. Use at own risk."
Yes, that's more of a "disclaimer" than anything. I only put the cheese package in my PPA for testing (and thank you for testing in several environments). I did not envision a lot of people using it. I probably should separate unrelated packages in different PPA's. Maybe when I have some more caffeine.. :)
"I don't know how to submit patches to official packages in Ubuntu/Debian"
See: https://wiki.ubuntu.com/StableReleaseUpdates
I think this qualifies as: Bugs which do not fit under above categories, but (1) have an obviously safe patch and (2) affect an application rather than critical infrastructure packages (like X.org or the kernel).
"I can't say whether/when GNOME devs will accept this patch upstream, as this bug report (issues/52) was closed" /gitlab. gnome.org/ GNOME/cheese/ -/issues/ 62 is still open, so there's at least some hope that they'll fix it.
Yes, they did not seem to understand the issue in that report, which is now closed. But https:/
"Daniel, the reason I asked you to make a separate PPA is that, your PPA says "Random experiments. Use at own risk."
Yes, that's more of a "disclaimer" than anything. I only put the cheese package in my PPA for testing (and thank you for testing in several environments). I did not envision a lot of people using it. I probably should separate unrelated packages in different PPA's. Maybe when I have some more caffeine.. :)
"I don't know how to submit patches to official packages in Ubuntu/Debian" /wiki.ubuntu. com/StableRelea seUpdates
See: https:/
I think this qualifies as: Bugs which do not fit under above categories, but (1) have an obviously safe patch and (2) affect an application rather than critical infrastructure packages (like X.org or the kernel).