Your message dated Mon, 19 May 2008 19:02:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#479569: fixed in devscripts 2.10.28
has caused the Debian Bug report #479569,
regarding [debsign] Runs mv without -f so asks for confirmation
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
479569: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=479569
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: devscripts
Version: 2.10.27
Severity: normal
Tags: patch

        Hi,

 Recently, debsign started poking me about overwriting changes files.
 This is probably due to the fact that the ownership is weird when I
 pbuild packages, as I don't get it in normal builds, but it's clearly a
 regression which can easily be fixed in debsign: instead of calling "mv
 -f" and "mv", it should always "mv -f".  The prompts I now get are:
mv: try to overwrite 
`/home/lool/.pbuilder/result/sid/libgtksourceviewmm_2.2.0-2_i386.changes', 
overriding mode 0644 (rw-r--r--)? y
 signfile 
/home/lool/.pbuilder/result/sid/libgtksourceviewmm_2.2.0-2_i386.changes 2B0920C0

 I fixed these by replacing the mv without -f with -f (and I added "--"
 too for compleness, like the other mv call I saw in debsign).  Please
 merge my attached changed debsign which fixes the issue for me.

 NB: you need to rever the ##VERSION stanza.

   Thanks,

-- Package-specific info:

--- /etc/devscripts.conf ---

--- ~/.devscripts ---
DEBUILD_PRESERVE_ENVVARS=PATH
DEBUILD_DPKG_BUILDPACKAGE_OPTS="-I -i"
DEBCHANGE_RELEASE_HEURISTIC=changelog
DEBDIFF_DIRS=yes
DEBDIFF_CONTROLFILES=ALL
DEBDIFF_SHOW_MOVED=yes
DEBSIGN_KEYID=2B0920C0
DEBSIGN_ALWAYS_RESIGN=yes

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.25-trunk-686 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages devscripts depends on:
ii  dpkg-dev                      1.14.18    package building tools for Debian
ii  libc6                         2.7-10     GNU C Library: Shared libraries
ii  perl                          5.10.0-9   Larry Wall's Practical Extraction 

Versions of packages devscripts recommends:
ii  at                 3.1.10.1              Delayed job execution and batch pr
ii  bsd-mailx [mailx]  8.1.2-0.20071201cvs-3 A simple mail user agent
ii  bzr                1.3.1-1               easy to use distributed version co
ii  curl               7.18.1-1              Get a file from an HTTP, HTTPS or 
ii  cvs                1:1.12.13-10          Concurrent Versions System
ii  dctrl-tools        2.12                  Command-line tools to process Debi
ii  debian-keyring     2007.12.04            GnuPG (and obsolete PGP) keys of D
ii  debian-maintainers 1.30                  GPG keys of Debian maintainers
ii  dput               0.9.2.32              Debian package upload tool
ii  dupload            2.6.4                 utility to upload Debian packages
ii  epiphany-gecko [ww 2.22.1.1-1            Intuitive GNOME web browser - Geck
ii  equivs             2.0.7-0.1             Circumvent Debian package dependen
ii  fakeroot           1.9.5                 Gives a fake root environment
ii  galeon [www-browse 2.0.4-1               GNOME web browser for advanced use
ii  git-core           1:1.5.5.1-1           fast, scalable, distributed revisi
ii  gnupg              1.4.6-2.2             GNU privacy guard - a free PGP rep
ii  iceweasel [www-bro 3.0~b5-1              lightweight web browser based on M
ii  libauthen-sasl-per 2.11-1                Authen::SASL - SASL Authentication
ii  libcrypt-ssleay-pe 0.57-1+b1             Support for https protocol in LWP
ii  libparse-debcontro 2.005-2               Easy OO parsing of Debian control-
ii  libsoap-lite-perl  0.71-2                Client and server side SOAP implem
ii  libterm-size-perl  0.2-4+b1              Perl extension for retrieving term
ii  libtimedate-perl   1.1600-9              Time and date functions for Perl
ii  liburi-perl        1.35.dfsg.1-1         Manipulates and accesses URI strin
ii  libwww-perl        5.812-1               WWW client/server library for Perl
pn  libyaml-syck-perl  <none>                (no description available)
ii  lintian            1.23.48               Debian package checker
ii  lsb-release        3.2-12                Linux Standard Base version report
ii  lynx [www-browser] 2.8.6-2               Text-mode WWW Browser
ii  mailx              1:20071201-3          Transitional package for mailx ren
ii  man-db             2.5.1-4               on-line manual pager
ii  openssh-client [ss 1:4.7p1-8             secure shell client, an rlogin/rsh
ii  patch              2.5.9-5               Apply a diff file to an original
ii  patchutils         0.2.31-4              Utilities to work with patches
ii  strace             4.5.15-1.2            A system call tracer
ii  subversion         1.4.6dfsg1-4          Advanced version control system
ii  unzip              5.52-11               De-archiver for .zip files
ii  w3m [www-browser]  0.5.1-5.1+b1          WWW browsable pager with excellent
ii  wdiff              0.5-17                Compares two files word by word
ii  wget               1.11.2-1              retrieves files from the web

-- no debconf information

-- 
Loïc Minier
#! /bin/bash

# This program is designed to PGP sign a .dsc and .changes file pair
# in the form needed for a legal Debian upload.  It is based in part
# on dpkg-buildpackage.  It takes one argument: the name of the
# .changes file.  It also takes some options:
#  -e<maintainer>  Sign using key of <maintainer> (takes precedence over -m)
#  -m<maintainer>  Sign using key of <maintainer>
#  -k<key>     The PGP/GPG key ID to use; overrides -m
#  -p<type>    <type> is either pgp or gpg to specify which to use
#  -spgp,-sgpg The program takes arguments like pgp or gpg respectively
#  -S          Source-only .changes file
#  -a<arch>    Debian architecture
#  -t<type>    GNU machine type
#  --multi     Search for multiarch .changes files
#  -r [EMAIL PROTECTED]  The changes (and dsc) files live on remotehost
#  --no-conf, --noconf  Don't read configuration files
#  --help, --version

# Debian GNU/Linux debsign.  Copyright (C) 1999 Julian Gilbey.
# Modifications to work with GPG by Joseph Carter and Julian Gilbey
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA

# Abort if anything goes wrong
set -e

PRECIOUS_FILES=0
PROGNAME=`basename $0`
MODIFIED_CONF_MSG='Default settings modified by devscripts configuration files:'

# --- Functions

usage () {
    echo \
"Usage: debsign [options] [changes, dsc or commands file]
  Options:
    -r [EMAIL PROTECTED]
                    The machine on which the changes/dsc files live.
                    A changes file with full pathname (or relative
                    to the remote home directory) must be given in
                    such a case
    -k<keyid>       The key to use for signing
    -p<sign-command>  The command to use for signing
    -sgpg           The sign-command is called like GPG
    -spgp           The sign-command is called like PGP
    -e<maintainer>  Sign using key of <maintainer> (takes precedence over -m)
    -m<maintainer>  The same as -e
    -S              Use changes file made for source-only upload
    -a<arch>        Use changes file made for Debian target architecture <arch>
    -t<target>      Use changes file made for GNU target architecture <target>
    --multi         Use most recent multiarch .changes file found
    --no-conf, --noconf
                    Don't read devscripts config files;
                    must be the first option given
    --help          Show this message
    --version       Show version and copyright information
  If a commands or dsc or changes file is specified, it and any .dsc files in
  the changes file are signed, otherwise debian/changelog is parsed to find
  the changes file.

$MODIFIED_CONF_MSG"
}

version () {
    echo \
"This is debsign, from the Debian devscripts package, version 2.10.27
This code is copyright 1999 by Julian Gilbey, all rights reserved.
This program comes with ABSOLUTELY NO WARRANTY.
You are free to redistribute this code under the terms of the
GNU General Public License, version 2 or later."
}

cleanup_tmpdir () {
    if [ "$PRECIOUS_FILES" -gt 0 ]; then
        echo "$PROGNAME: aborting with $PRECIOUS_FILES signed files in `pwd`" 
>&2
    else
        cd ..; rm -rf debsign.$$
    fi
}

mustsetvar () {
    if [ "x$2" = x ]
    then
        echo >&2 "$PROGNAME: unable to determine $3"
        exit 1
    else
        # echo "$PROGNAME: $3 is $2"
        eval "$1=\"\$2\""
    fi
}

# This takes two arguments: the name of the file to sign and the
# key or maintainer name to use.  NOTE: this usage differs from that
# of dpkg-buildpackage, because we do not know all of the necessary
# information when this function is read first.
signfile () {
    local savestty=$(stty -g 2>/dev/null) || true
    if [ $signinterface = gpg ]
    then
        gpgversion=`gpg --version | head -n 1 | cut -d' ' -f3`
        gpgmajorversion=`echo $gpgversion | cut -d. -f1`
        gpgminorversion=`echo $gpgversion | cut -d. -f2`
        if [ $gpgmajorversion -gt 1 -o $gpgminorversion -ge 4 ]
        then
                (cat "$1" ; echo "") | \
                    $signcommand --local-user "$2" --clearsign \
                    --list-options no-show-policy-urls \
                    --armor --textmode --output - - > "$1.asc" || \
                { SAVESTAT=$?
                  echo "$PROGNAME: gpg error occurred!  Aborting...." >&2
                  stty $savestty 2>/dev/null || true
                  exit $SAVESTAT
                }
        else
                (cat "$1" ; echo "") | \
                    $signcommand --local-user "$2" --clearsign \
                        --no-show-policy-url \
                        --armor --textmode --output - - > "$1.asc" || \
                { SAVESTAT=$?
                  echo "$PROGNAME: gpg error occurred!  Aborting...." >&2
                  stty $savestty 2>/dev/null || true
                  exit $SAVESTAT
                }
        fi
    else
        $signcommand -u "$2" +clearsig=on -fast < "$1" > "$1.asc"
    fi
    stty $savestty 2>/dev/null || true
    echo
    PRECIOUS_FILES=$(($PRECIOUS_FILES + 1))
    mv -f -- "$1.asc" "$1"
}

withecho () {
    echo " $@"
    "$@"
}

# Has the dsc file already been signed, perhaps from a previous, partially
# successful invocation of debsign?  We give the user the option of
# resigning the file or accepting it as is.  Returns success if already
# and failure if the file needs signing.  Parameters: $1=filename,
# $2=file description for message (dsc or changes)
check_already_signed () {
    if [ "`head -n 1 \"$1\"`" != "-----BEGIN PGP SIGNED MESSAGE-----" ]
    then
        return 1
    else
        printf "The .$2 file is already signed.\nWould you like to use the 
current signature? [Yn]"
        read response
        case $response in
        [Nn]*)
            sed -e '1,/^$/d; /^$/,$d' "$1" > "$1.unsigned"
            mv -f -- "$1.unsigned" "$1"
            return 1
            ;;
        *) return 0;;
        esac
    fi
}

# --- main script

# Boilerplate: set config variables
DEFAULT_DEBSIGN_PROGRAM=
DEFAULT_DEBSIGN_SIGNLIKE=
DEFAULT_DEBSIGN_MAINT=
DEFAULT_DEBSIGN_KEYID=
VARS="DEBSIGN_PROGRAM DEBSIGN_SIGNLIKE DEBSIGN_MAINT DEBSIGN_KEYID"

if [ "$1" = "--no-conf" -o "$1" = "--noconf" ]; then
    shift
    MODIFIED_CONF_MSG="$MODIFIED_CONF_MSG
  (no configuration files read)"

    # set defaults
    for var in $VARS; do
        eval "$var=\$DEFAULT_$var"
    done
else
    # Run in a subshell for protection against accidental errors
    # in the config files
    eval $(
        set +e
        for var in $VARS; do
            eval "$var=\$DEFAULT_$var"
        done

        for file in /etc/devscripts.conf ~/.devscripts
          do
          [ -r $file ] && . $file
        done

        set | egrep '^(DEBSIGN|DEVSCRIPTS)_')

    # check sanity
    case "$DEBSIGN_SIGNLIKE" in
        gpg|pgp) ;;
        *) DEBSIGN_SIGNLIKE= ;;
    esac

    # set config message
    MODIFIED_CONF=''
    for var in $VARS; do
        eval "if [ \"\$$var\" != \"\$DEFAULT_$var\" ]; then
            MODIFIED_CONF_MSG=\"\$MODIFIED_CONF_MSG
  $var=\$$var\";
        MODIFIED_CONF=yes;
        fi"
    done

    if [ -z "$MODIFIED_CONF" ]; then
        MODIFIED_CONF_MSG="$MODIFIED_CONF_MSG
  (none)"
    fi
fi

maint="$DEBSIGN_MAINT"
signkey="$DEBSIGN_KEYID"

signcommand=''
if [ -n "$DEBSIGN_PROGRAM" ]; then
    signcommand="$DEBSIGN_PROGRAM"
else
    if [ \( -n "$GNUPGHOME" -a -e "$GNUPGHOME" \) -o -e $HOME/.gnupg ] && \
        command -v gpg > /dev/null 2>&1; then
        signcommand=gpg
    elif command -v pgp > /dev/null 2>&1; then
        signcommand=pgp
    fi
fi

if [ -n "$DEBSIGN_SIGNLIKE" ]; then
    forcesigninterface="$DEBSIGN_SIGNLIKE"
fi

while [ $# != 0 ]
do
    value="`echo x\"$1\" | sed -e 's/^x-.//'`"
    case "$1" in
        -spgp)  forcesigninterface=pgp ;;
        -sgpg)  forcesigninterface=gpg ;;
        -p*)    signcommand="$value" ;;
        -m*)    maint="$value" ;;
        -e*)    maint="$value" ;;     # Order matters: -m before -e!
        -k*)    signkey="$value" ;;
        -S)     sourceonly="true" ;;
        -a*)    targetarch="$value" ;;
        -t*)    targetgnusystem="$value" ;;
        --multi) multiarch="true" ;;
        -r*)    if [ -n "$value" ]; then remotehost=$value;
                elif [ $# -lt 1 ]; then
                    echo "$PROGNAME: -r option missing argument!" >&2
                    usage >&2; exit 1;
                else shift; remotehost=$1;
                fi
                # Allow for the [EMAIL PROTECTED]:filename format
                hostpart="`echo $remotehost | sed -e 's/:.*//'`"
                filepart="`echo $remotehost | sed -e 's/[^:]*:\?//'`"
                if [ -n "$filepart" ]; then
                    remotehost="$hostpart"
                    set -- "$@" "$filepart"
                fi
                ;;
        --no-conf|--noconf)
                echo "$PROGNAME: $1 is only acceptable as the first 
command-line option!" >&2
                exit 1 ;;
        -h|--help)
                usage; exit 0 ;;
        --version)
                version; exit 0 ;;
        -*)     echo "$PROGNAME: Unrecognised option: $1" >&2
                usage >&2; exit 1 ;;
        *)      break ;;
    esac
    shift
done

if [ -z "$signcommand" ]; then
    echo "Could not find a signing program (pgp or gpg)!" >&2
    exit 1
fi

if test -n "$forcesigninterface" ; then
    signinterface=$forcesigninterface
else
    signinterface=$signcommand
fi

if [ "$signinterface" != gpg -a "$signinterface" != pgp ]; then
    echo "Unknown signing interface $signinterface; please specify -spgp or 
-sgpg" >&2
    exit 1
fi

dosigning() {
    # Do we have to download the changes file?
    if [ -n "$remotehost" ]
    then
        cd ${TMPDIR:-/tmp}
        mkdir debsign.$$ || { echo "$PROGNAME: Can't mkdir!" >&2; exit 1; }
        trap "cleanup_tmpdir" 0 1 2 3 7 10 13 15
        cd debsign.$$

        remotechanges=$changes
        remotedsc=$dsc
        remotecommands=$commands
        remotedir="`perl -e 'chomp($_="'"$dsc"'"); m%/% && s%/[^/]*$%% && 
print'`"
        changes=`basename "$changes"`
        dsc=`basename "$dsc"`
        commands=`basename "$commands"`

        if [ -n "$changes" ]
        then withecho scp "$remotehost:$remotechanges" "$changes"
        elif [ -n "$dsc" ]
        then withecho scp "$remotehost:$remotedsc" "$dsc"
        else withecho scp "$remotehost:$remotecommands" "$commands"
        fi
    fi

    if [ -n "$changes" ]
    then
        if [ ! -f "$changes" -o ! -r "$changes" ]
        then
            echo "$PROGNAME: Can't find or can't read changes file $changes!" 
>&2
            exit 1
        fi

        check_already_signed "$changes" "changes" && {
           echo "Leaving current signature unchanged." >&2
            exit 0
        }
        if [ -n "$maint" ]
        then maintainer="$maint"
        # Try the "Changed-By:" field first
        else maintainer=`sed -n 's/^Changed-By: //p' $changes`
        fi
        if [ -z "$maintainer" ]
        then maintainer=`sed -n 's/^Maintainer: //p' $changes`
        fi

        signas="${signkey:-$maintainer}"

        # Is there a dsc file listed in the changes file?
        if grep -q `basename "$dsc"` "$changes"
        then
            if [ -n "$remotehost" ]
            then
                withecho scp "$remotehost:$remotedsc" "$dsc"
            fi

            if [ ! -f "$dsc" -o ! -r "$dsc" ]
            then
                echo "$PROGNAME: Can't find or can't read dsc file $dsc!" >&2
                exit 1
            fi
            check_already_signed "$dsc" "dsc" || withecho signfile "$dsc" 
"$signas"
            dsc_md5=`md5sum $dsc | cut -d' ' -f1`
            dsc_sha1=`sha1sum $dsc | cut -d' ' -f1`
            dsc_sha256=`sha256sum $dsc | cut -d' ' -f1`

            temp_changes=`mktemp` || {
                echo "$PROGNAME: Unable to create temporary changes file; 
aborting" >&2
                exit 1
            }
            cp "$changes" "$temp_changes"
            if perl -i -pe 'BEGIN {
                '" \$dsc_file=\"$dsc\"; \$dsc_md5=\"$dsc_md5\"; "'
                '" \$dsc_sha1=\"$dsc_sha1\"; \$dsc_sha256=\"$dsc_sha256\"; "'
                $dsc_size=(-s $dsc_file); ($dsc_base=$dsc_file) =~ s|.*/||;
                $infiles=0; $insha1=0; $insha256=0; $format="";
                }
                if(/^Format:\s+(.*)/) {
                    $format=$1;
                    die "Unrecognised .changes format: $format\n"
                        unless $format =~ /^\d+(\.\d+)*$/;
                    ($major, $minor) = split(/\./, $format);
                    $major+=0;$minor+=0;
                    die "Unsupported .changes format: $format\n"
                        if($major!=1 or $minor > 8 or $minor < 7);
                }
                /^Files:/i && ($infiles=1,$insha1=0,$insha256=0);
                if(/^Checksums-Sha1:/i) {$insha1=1;$infiles=0;$insha256=0;}
                elsif(/^Checksums-Sha256:/i) {
                    $insha256=1;$infiles=0;$insha1=0;
                } elsif(/^Checksums-.*?:/i) {
                    die "Unknown checksum format: $_\n";
                }
                /^\s*$/ && ($infiles=0,$insha1=0,$insha256=0);
                if ($infiles &&
                    /^ (\S+) (\d+) (\S+) (\S+) \Q$dsc_base\E\s*$/) {
                    $_ = " $dsc_md5 $dsc_size $3 $4 $dsc_base\n";
                    $infiles=0;
                }
                if ($insha1 &&
                    /^ (\S+) (\d+) \Q$dsc_base\E\s*$/) {
                    $_ = " $dsc_sha1 $dsc_size $dsc_base\n";
                    $insha1=0;
                }
                if ($insha256 &&
                    /^ (\S+) (\d+) \Q$dsc_base\E\s*$/) {
                    $_ = " $dsc_sha256 $dsc_size $dsc_base\n";
                    $insha256=0;
                }' "$temp_changes"
            then
                mv -f -- "$temp_changes" "$changes"
            else
                rm "$temp_changes"
                echo "$PROGNAME: Error processing .changes file (see above)" >&2
                exit 1
            fi
            
            withecho signfile "$changes" "$signas"
        
            if [ -n "$remotehost" ]
            then
                withecho scp "$changes" "$dsc" "$remotehost:$remotedir"
                PRECIOUS_FILES=$(($PRECIOUS_FILES - 2))
            fi

            echo "Successfully signed dsc and changes files"
        else
            withecho signfile "$changes" "$signas"

            if [ -n "$remotehost" ]
            then
                withecho scp "$changes" "$remotehost:$remotechanges"
                PRECIOUS_FILES=$(($PRECIOUS_FILES - 1))
            fi

            echo "Successfully signed changes file"
        fi
    elif [ -n "$commands" ] # sign .commands file
    then
        if [ ! -f "$commands" -o ! -r "$commands" ]
        then
            echo "$PROGNAME: Can't find or can't read commands file $commands!" 
>&2
            exit 1
        fi

        check_already_signed "$commands" commands && {
            echo "Leaving current signature unchanged." >&2
            exit 0
        }
    
    
        # simple validator for .commands files, see
        # ftp://ftp-master.debian.org/pub/UploadQueue/README
        perl -ne 'BEGIN { $uploader = 0; $incommands = 0; }
              END { exit $? if $?;
                    if ($uploader && $incommands) { exit 0; }
                    else { die ".commands file missing Uploader or Commands 
field\n"; }
                  }
              sub checkcommands {
                  chomp($line=$_[0]);
                  if ($line =~ m%^\s*mv(\s+[^\s/]+){2}\s*$%) { return 0; }
                  if ($line =~ m%^\s*rm(\s+[^\s/]+)+\s*$%) { return 0; }
                  if ($line eq "") { return 0; }
                  die ".commands file has invalid Commands line: $line\n";
              }
              if (/^Uploader:/) {
                  if ($uploader) { die ".commands file has too many Uploader 
fields!\n"; }
                  $uploader++;
              } elsif (! $incommands && s/^Commands:\s*//) {
                  $incommands=1; checkcommands($_);
              } elsif ($incommands == 1) {
                 if (s/^\s+//) { checkcommands($_); }
                 elsif (/./) { die ".commands file: extra stuff after Commands 
field!\n"; }
                 else { $incommands = 2; }
              } else {
                 next if /^\s*$/;
                 if (/./) { die ".commands file: extra stuff after Commands 
field!\n"; }
              }' $commands || {
        echo "$PROGNAME: .commands file appears to be invalid. see:
ftp://ftp-master.debian.org/pub/UploadQueue/README
for valid format" >&2;
        exit 1; }

        if [ -n "$maint" ]
        then maintainer="$maint"
        else 
            maintainer=`sed -n 's/^Uploader: //p' $commands`
            if [ -z "$maintainer" ]
            then
                echo "Unable to parse Uploader, .commands file invalid."
                exit 1
            fi
        fi
    
        signas="${signkey:-$maintainer}"

        withecho signfile "$commands" "$signas"

        if [ -n "$remotehost" ]
        then
            withecho scp "$commands" "$remotehost:$remotecommands"
            PRECIOUS_FILES=$(($PRECIOUS_FILES - 1))
        fi

        echo "Successfully signed commands file"
    else # only a dsc file to sign; much easier
        if [ ! -f "$dsc" -o ! -r "$dsc" ]
        then
            echo "$PROGNAME: Can't find or can't read dsc file $dsc!" >&2
            exit 1
        fi

        check_already_signed "$dsc" dsc && {
            echo "Leaving current signature unchanged." >&2
            exit 0
        }
        if [ -n "$maint" ]
        then maintainer="$maint"
        # Try the new "Changed-By:" field first
        else maintainer=`sed -n 's/^Changed-By: //p' $dsc`
        fi
        if [ -z "$maint" ]
        then maintainer=`sed -n 's/^Maintainer: //p' $dsc`
         fi

        signas="${signkey:-$maintainer}"

        withecho signfile "$dsc" "$signas"

        if [ -n "$remotehost" ]
        then
            withecho scp "$dsc" "$remotehost:$remotedsc"
            PRECIOUS_FILES=$(($PRECIOUS_FILES - 1))
        fi

        echo "Successfully signed dsc file"
    fi
}

# If there is a command-line parameter, it is the name of a .changes file
# If not, we must be at the top level of a source tree and will figure
# out its name from debian/changelog
case $# in
    0)  # We have to parse debian/changelog to find the current version
        if [ -n "$remotehost" ]; then
            echo "$PROGNAME: Need to specify a .changes, .dsc or .commands file 
location with -r!" >&2
            exit 1
        fi
        if [ ! -r debian/changelog ]; then
            echo "$PROGNAME: Must be run from top of source dir or a .changes 
file given as arg" >&2
            exit 1
        fi

        mustsetvar package "`dpkg-parsechangelog | sed -n 's/^Source: //p'`" \
            "source package"
        mustsetvar version "`dpkg-parsechangelog | sed -n 's/^Version: //p'`" \
            "source version"

        if [ "x$sourceonly" = x ]
        then
            mustsetvar arch "`dpkg-architecture -a${targetarch} 
-t${targetgnusystem} -qDEB_HOST_ARCH`" "build architecture"
        else
            arch=source
        fi

        sversion=`echo "$version" | perl -pe 's/^\d+://'`
        pv="${package}_${sversion}"
        pva="${package}_${sversion}_${arch}"
        dsc="../$pv.dsc"
        changes="../$pva.changes"
        if [ -n "$multiarch" -o ! -r $changes ]; then
            changes=$(ls "../${package}_${sversion}_*+*.changes" 
"../${package}_${sversion}_multi.changes" 2>/dev/null | head -1)
            if [ -z "$multiarch" ]; then
                if [ -n "$changes" ]; then
                    echo "$PROGNAME: could not find normal .changes file but 
found multiarch file:" >&2
                    echo "  $changes" >&2
                    echo "Using this changes file instead." >&2
                else 
                    echo "$PROGNAME: Can't find or can't read changes file 
$changes!" >&2
                    exit 1
                fi
            elif [ -n "$multiarch" -a -z "$changes" ]; then
                echo "$PROGNAME: could not find any multiarch .changes file 
with name" >&2
                echo "../${package}_${sversion}_*.changes" >&2
                exit 1
            fi
        fi
        dosigning;
        ;;

    *)  while [ $# -gt 0 ]; do
            case "$1" in
                *.dsc)
                    changes=
                    dsc=$1
                    commands=
                    ;;
                *.changes)
                    changes=$1
                    dsc=`echo $changes | \
                        perl -pe 's/\.changes$/.dsc/; 
s/(.*)_(.*)_(.*)\.dsc/\1_\2.dsc/'`
                    commands=
                    ;;
                *.commands)
                    changes=
                    dsc=
                    commands=$1
                    ;;
                *)
                    echo "$PROGNAME: Only a .changes, .dsc or .commands file is 
allowed as argument!" >&2
                    exit 1 ;;
            esac
            dosigning
            shift
        done
        ;;
esac

exit 0

--- End Message ---
--- Begin Message ---
Source: devscripts
Source-Version: 2.10.28

We believe that the bug you reported is fixed in the latest version of
devscripts, which is due to be installed in the Debian FTP archive:

devscripts_2.10.28.dsc
  to pool/main/d/devscripts/devscripts_2.10.28.dsc
devscripts_2.10.28.tar.gz
  to pool/main/d/devscripts/devscripts_2.10.28.tar.gz
devscripts_2.10.28_amd64.deb
  to pool/main/d/devscripts/devscripts_2.10.28_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adam D. Barratt <[EMAIL PROTECTED]> (supplier of updated devscripts package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 19 May 2008 19:38:35 +0100
Source: devscripts
Binary: devscripts
Architecture: source amd64
Version: 2.10.28
Distribution: unstable
Urgency: low
Maintainer: Devscripts Devel Team <[email protected]>
Changed-By: Adam D. Barratt <[EMAIL PROTECTED]>
Description: 
 devscripts - scripts to make the life of a Debian Package maintainer easier
Closes: 479274 479569 479609 480461 481583 481691
Changes: 
 devscripts (2.10.28) unstable; urgency=low
 .
   [ Adam D. Barratt ]
   * bts, build-rdeps, chdist, debcommit, dget, mass-bug: Fix POD errors in
     the manpages. Thanks Riccardo Stagni (Closes: #479609)
   * bts: Improve the message produced when unknown options are passed to
     a command to include the command name
   * checkbashisms:
     + Also match use of "SHELL=/bin/bash -e" when checking whether a makefile
       explicitly uses bash
     + Update the check for "function" to more closely match lintian's (and
       therefore be less prone to false positives)
     + Update the check for "echo -e" to only match -n as an extra option
       rather than all theoretically possible options, thus reducing false
       positives
     + Further improve the heredoc detection (to allow the space in "<< 'foo'")
     + Make the check for "process substitution" ignore quoted strings
     + Fix false positives in the tests for "time" and "test with unary -a"
     + Apply various improvements to "quoted block" detection
     + Correctly match 'echo "$(< $0)"'
     + Add checks for "$[" (a deprecated form of arithmetic expansion) and
       the use of the -a or -f arguments to the "readonly" builtin
   * cowpoke: New script to upload a Debian source package to a cowbuilder host
     and build it, optionally also signing and uploading the result to an
     incoming queue (Closes: #479274)
   * dcmd: Correctly handle the "debian-installer" section in a .changes
     file (Closes: #481691)
   * debsign: Use "mv -f" instead of plain "mv" when stripping an existing GPG
     signature or updating the file sizes within the changes file before
     signing it, as is already done for moving the resulting signed files
     (Closes: #479569)
   * dget: Mention in the manpage that dget supports udebs so long as an
     appropriate packages file is available to apt (Closes: #480461)
   * mergechanges: Send error output to stderr rather than stdout
     (Closes: #481583)
   * scripts/Makefile: Run podchecker(1) before building pod-generated
     manpages to avoid the generated file containing a "POD errors" section
 .
   [ James Vega ]
   * mk-build-deps:
     + Fix Depends generation when both Build-Depends and Build-Depends-Indep
       exist so that the last package of the former and the first package of
       the latter are not listed as one concatenated string.
     + Use the Source package name instead of the first listed Binary package
       when parsing a control file.
Checksums-Sha1: 
 5f34941549f4b89877e8de1c2a171f966dc53a0e 1385 devscripts_2.10.28.dsc
 875e401b0d72eda5ce19d8809bae956e3aff2b3f 571325 devscripts_2.10.28.tar.gz
 1f357db4479bc430a8086d756a2ff8c18481db22 490160 devscripts_2.10.28_amd64.deb
Checksums-Sha256: 
 fc67005bfbf4d38d064be8361b9919a6b882708c6a35affee18f790cf05e6e48 1385 
devscripts_2.10.28.dsc
 4a9cf1096024102de2e53dc863603ed9179385900da3276aea656d7f0cb13dcc 571325 
devscripts_2.10.28.tar.gz
 20bf0cf274dd2a20e9524223de68614ed8d64ea1371f211e8095c38dbbbfcac6 490160 
devscripts_2.10.28_amd64.deb
Files: 
 185e6e403a920e0e76fa72050a6c327b 1385 devel optional devscripts_2.10.28.dsc
 c34f8dad65fc4414e3ff35c9678c7b41 571325 devel optional 
devscripts_2.10.28.tar.gz
 d0c3f68a328e9b7701c31732f932f0fa 490160 devel optional 
devscripts_2.10.28_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIMcw7okcE1TReOoURAhuAAJ9X0Ypq+TwKyRNFZ2VzfPD2kAEVuQCeK1cj
PH2rnIVv57VBtg1lTZibyn8=
=x02t
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to