Your message dated Sat, 29 Apr 2023 08:25:10 +0000
with message-id <[email protected]>
and subject line unblock opensnitch
has caused the Debian Bug report #1035077,
regarding unblock: opensnitch/1.5.8.1-1+b2
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1035077: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035077
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: [email protected]
Usertags: unblock
X-Debbugs-Cc: [email protected], [email protected]
Control: affects -1 + src:opensnitch
Please unblock package opensnitch
[ Reason ]
This version failed to compile on i386, s390x and armel, because
bpfcc is not available on these archs.
It is marked as Not a regression:
https://tracker.debian.org/pkg/opensnitch
https://buildd.debian.org/status/package.php?p=bpfcc&suite=sid
https://buildd.debian.org/status/package.php?p=opensnitch&suite=sid
[ Impact ]
We fixed and improved several bugs reported by users, which were
causing some annoyances.
[ Tests ]
The already included tests cover the changes.
[ Risks ]
Changes are trivial, a default config value changed and metadata files.
[ Checklist ]
[x] all changes are documented in the d/changelog
It's a new upstream release.
[x] I reviewed and made all changes and I approve them
[x] attach debdiff against the package in testing
[ Other info ]
Regarding the architectures and bpfcc:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030657
unblock opensnitch/1.5.8.1-1+b2
--- End Message ---
--- Begin Message ---
Unblocked.
--- End Message ---