> here is the full explanation : > http://www.madism.org/~madcoder/295306.txt
does anybody has any advice ?
I explain it here again : the #295306 is a bug agains uw-imapd-ssl, but
in fact affects uw-imapd and ipopd/-ssl as well :
in the postrm of those packages, update-inetd --remove is called, even
if postrm was caled with 'upgrade'.
so, each time you upgrade uw-imapd, the postrm strips all imap2/3/s
entries of your /etc/inetd.conf, and then the configure (or postinst, I
can't remember) script enables them again ... but enables the defaults.
So I've fixed (and sent the fixed postrm) on the BTS, but that won't
close the bug, since it won't avoid e.g. the woody -> sarge upgrade to
trigger the bug.
The only way is to do some hackish things in the <new-preinst> since
it's the only script that will be called before the buggy <old-postrm>
until here, it's OK. but I readlly dunno which hack I have to implement
int the preinst. I have (at least) two choices, but I don't like any of
them :
(1) rm -f /var/lib/dpkg/info/uw-imapd.postrm (with the appropriate
version check)
- : this is truely horrible, moreover, postrm files may live elsewhere
- : this removes a dpkg file during it runs ... dpkg cannot be blamed
if he fails after such a thing
+ : this is small, and easy to understand
(2) parse /etc/inetd.conf and put the entries I don't want to loose
somewhere in /var/cache for a moment
and then use it in the postinst to feed inetd.conf
+ : this is really cleaner than the previous
- : this is really not trivial : inetd.conf is sorted by categories,
and it will be really difficult to put the entries at the right
place in the postinst
- : this fix will use quite a big amount of code, touch to many
scripts, and thereof may lead to new bugs, really more easily than
the previous "solution"
I can't see any (3) that isn't a new instance of (1) or (2), so any
advice is welcome.
--
�O� Pierre Habouzit
��O
OOO http://www.madism.org
pgphAN01H2Sdn.pgp
Description: PGP signature

