Your message dated Wed, 04 Oct 2023 23:19:36 +0000 with message-id <[email protected]> and subject line Bug#829008: fixed in java-common 0.75 has caused the Debian Bug report #829008, regarding update-java-alternatives always switches back to default to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 829008: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829008 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: java-common Severity: minor Tags: patch Version: 0.51 update-java-alternatives briefly switches back to the default Java version. This can cause programs to fail during this period of time. This should be an idempotent operation, as it is for update-alternatives. See the patch below. I presume that do_auto was at one time important for something, though I have no idea what it was. Index: scripts/update-java-alternatives =================================================================== --- scripts/update-java-alternatives (revision 19096) +++ scripts/update-java-alternatives (working copy) @@ -109,16 +109,6 @@ jinfo_files= -do_auto() -{ - vecho "resetting java alternatives" - awk "/$which/ {print \$2}" $top/*.jinfo | sort -u \ - | \ - while read name; do - update-alternatives $uaopts --auto $name - done -} - do_list() { vecho "listing java alternatives:"
--- End Message ---
--- Begin Message ---Source: java-common Source-Version: 0.75 Done: Emmanuel Bourg <[email protected]> We believe that the bug you reported is fixed in the latest version of java-common, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Emmanuel Bourg <[email protected]> (supplier of updated java-common package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 05 Oct 2023 00:56:32 +0200 Source: java-common Architecture: source Version: 0.75 Distribution: unstable Urgency: medium Maintainer: Debian Java Maintainers <[email protected]> Changed-By: Emmanuel Bourg <[email protected]> Closes: 829008 1017922 1051305 Changes: java-common (0.75) unstable; urgency=medium . * Team upload. . [ tony mancill ] * Correct update-java-alternatives return code (Closes: #1017922) * No longer call do_auto during do_set (Closes: #829008) * Freshen years in debian/copyright . [ Emmanuel Bourg ] * Added loong64 to the list of Java 17 architectures (Closes: #1051305) * New macro java_compat_level giving the minimum source/target compatibility level supported by the default JDK Checksums-Sha1: cd588623d3441989f4c0ff4a94b515e1eaf22c4e 1991 java-common_0.75.dsc 6549a89820953127950c6e45826e7d74b1353b3f 13480 java-common_0.75.tar.xz 082fc8890ce7ba88366d1cfb85f6aa777fc40acd 5788 java-common_0.75_source.buildinfo Checksums-Sha256: eead78e4de4e627051765ecca372f6ee350ff94913c88ba7b2981a0a2474a54d 1991 java-common_0.75.dsc 3f78b0caea852744d2762472578a92ecac8bd04346f72e987cba70f0e9424d03 13480 java-common_0.75.tar.xz 0ac7c474c75426c93fde3827fec57761aba951bdeb0e98953d2609d864b70ca1 5788 java-common_0.75_source.buildinfo Files: 72e83c9eab9614b89be0d660b14a0890 1991 java optional java-common_0.75.dsc 0278c552cb2d9fef5ede14c33876bd68 13480 java optional java-common_0.75.tar.xz b613cde9cabb5e7bf4a3e9d6443d8d40 5788 java optional java-common_0.75_source.buildinfo -----BEGIN PGP SIGNATURE----- iQJGBAEBCgAwFiEEuM5N4hCA3PkD4WxA9RPEGeS50KwFAmUd7dkSHGVib3VyZ0Bh cGFjaGUub3JnAAoJEPUTxBnkudCsio0P/2V6J1mnK0YSQXTyUSCGjuJdDv22GW46 igKyvYGLpiHH2H9vc+4mReXvdJ+96WbAMTNXlFLARkxS3/yZQZpjhc5rUyaN3FdZ zrEmTar/Ng8MvXLEj/sYca3vdSlYcRqDGwy09B15s9q/GHQxEYVzo8hpwKKYgN2b 6CwMrQVNJsKZ1pAaLwVKTba6EysH4rG4HhlW2FtJYEBL8QKHaBLJcmZZ88gMPezI NKZhDdgGAf8e7okbWGl9m6U18ByqnzzHAIG4vEStje3rWCHL9OjR2+k/jtQgDVRq 3Adx6KnxpA3ZJWfbhB/0DtPqaGvB6h/QW5O+PqUpgtHQGDrkgaFdMfhBIYsEV+D+ MzDhfCRj3o0/yeNWiNUEcUFCMOSkJMpJ32OxxcibeZXU0bhpfaM9rtXEsVfR1nU2 d9dgrV6JfQsVWJ8Z7k4Dw4mknoXDFIKiDlEdjmbzRdRxykisMpZPhFnJnEISwR3B ZjtH/Nu9lALPDZsEECJ7pE2c+cpS7l2Y8qw/3Gp9sOXFIL0wwNP82rgCUew+KWWA Yi+npKMhfRSX+GyEJgI1qP4nvzKO5xIiIByqeDYXUCafj9kzEsgg5pDpOrTNHgUC 0+PYOLVh4efrjouCMZltop2T65ufnoFqCt7uU+dTV5l1NDRf95lDBHK0zUuUgfxi mAaJ13w1CBem =yGVx -----END PGP SIGNATURE-----
--- End Message ---

