Bug#913909: [Ceph-maintainers] Bug#913909: Bug#913909: ceph: FTBFS on i386 and mipsel (regression)

2018-11-19 Thread James Page
Hi Gaudenz

On Mon, 19 Nov 2018 at 07:51 Gaudenz Steinlin  wrote:
[...]

> I did the same and the build hanged as well. Retrying the hanging
> call with all the -O2 arguments removed succeeds. So this seems to
> be a bug in GCC with optimizations. I'm unsure on how to proceeed
> from here. It's quite clear this is not a bug in Ceph. Is there a
> chance that GCC will get fixed in stable? Would it make sense to
> open a bug on g++-6? To workaround this in Ceph I would need to
> find a way to disable optimizations just for this file on i386.
> Because I suspect that generally disabling -O2 would have some
> performance implications.
>
> The failing call is:
> /usr/lib/gcc/i686-linux-gnu/6/cc1plus -quiet -I . -I ./include
> -imultiarch i386-linux-gnu -D_GNU_SOURCE -D ROCKSDB_PLATFORM_POSIX
> -D ROCKSDB_LIB_IO_POSIX -D _LARGEFILE64_SOURCE -D OS_LINUX -D
> ROCKSDB_FALLOCATE_PRESENT -D SNAPPY -D ZLIB -D BZIP2 -D
> ROCKSDB_MALLOC_USABLE_SIZE -D ROCKSDB_PTHREAD_ADAPTIVE_MUTEX -D
> ROCKSDB_BACKTRACE -D ROCKSDB_RANGESYNC_PRESENT -D NDEBUG -isystem
> ./third-party/gtest-1.7.0/fused-src monitoring/statistics.cc
> -quiet -dumpbase statistics.cc -momit-leaf-frame-pointer
> -mtune=generic -march=i686 -auxbase-strip monitoring/statistics.o
> -g -g1 -g -g -g1 -g -g1 -O2 -O2 -O2 -O2 -Wformat=1
> -Werror=format-security -Wextra -Wall -Wsign-compare -Wshadow
> -Wno-unused-parameter -Wformat=1 -Werror=format-security
> -Wformat=1 -Werror=format-security -Woverloaded-virtual
> -Wnon-virtual-dtor -Wno-missing-field-initializers -std=c++11
> -fdebug-prefix-map=/home/gaudenz/ceph=. -fstack-protector-strong
> -fPIC -fdebug-prefix-map=/home/gaudenz/ceph=.
> -fstack-protector-strong -fdebug-prefix-map=/home/gaudenz/ceph=.
> -fstack-protector-strong -fno-builtin-memcmp
> -fno-omit-frame-pointer -o /tmp/ccWWcwWO.s
>
> Running in src/rocksdb.


https://git.launchpad.net/~ubuntu-server-dev/ubuntu/+source/ceph/tree/debian/patches?h=ubuntu/xenial

I think I hit the same issue in Ubuntu a while back for which I picked 3
rocksdb patches - see above URL - 000*.patch.

HTH (and I really need to work towards re-sync between Ubuntu and Debian).

James


Bug#791445: Downgrading severity

2016-10-28 Thread James Page
I'm going to downgrade the severity of this bug to wishlist for the
following reasons:

1) upstream ceph test with specific jerasure versions, stepping outside of
this will potentially cause issues and increase the maintenance burden on
an under-resourced team.

2) ceph builds multiple versions of the embedded jerasure with different
levels of CPU optimisation and loads these as plugins based on runtime CPU
detection; switching to linking directly against libjerasure a) won't work
without patching out of this in the codebase and b) means we would only
have the minimal CPU baseline that libjerasure currently builds with,
crippling performance on more modern CPU's.


Bug#839138: Ceph maintainership status

2016-10-28 Thread James Page
Hi Adrian

On Mon, 17 Oct 2016 at 20:34 Adrian Bunk  wrote:

> Hi,
>
> first of all thanks for your past work on Ceph.
>
> The current status of the Ceph packages [1] does not look good.
>
> src:ceph has 3 RC bugs, from "maintainer address bounces"
> to "crashes since the latest NMU".
>

I'll sort through those (see below).

If you still intend to maintain Ceph, do the emails from the BTS
> actually reach you? If not, a list at Alioth might be a better option.


> It would also be OK if you would state that there is noone left active
> among the Ceph Maintainers, and that I can orphan the package for
> finding new maintainers.
>

I'd like to continue maintaining Ceph in Debian; my time can be a little
sporadic as it is with a number of maintainers, so doing this by myself is
not a sustainable option so maybe a request for help is more appropriate
now than full orphaning.

I fully intent to work on pushing the work I've done for Ubuntu on Ceph
Jewel packaging back into Debian at the start of November, but I really do
need help for testing of this.


>
> Regarding ceph-dkms, this is only in experimental and has an RC bug
> that it doesn't work with the jessie kernel.
> Is there anything left that is not in the upstream kernel?
>

Not really - I think we should just drop that package.

Note that we really do have a problem with upgrades in Debian - going
directly from firefly to jewel is an offline upgrade (at best).  But maybe
that is better than the currently upstream unsupported version we have in
testing.

Cheers

James


Bug#837100: [PKG-Openstack-devel] Bug#837100: Bug#837100: Bug#837100: python-hacking dependency versions are pinned by upstream, package doesn't work with Debian ones

2016-09-09 Thread James Page
On Fri, 9 Sep 2016 at 14:33 Thomas Goirand <z...@debian.org> wrote:

> On 09/09/2016 12:38 AM, Víctor Cuadrado Juan wrote:
> > On Thu, 8 Sep 2016 23:35:27 +0200 Thomas Goirand <z...@debian.org>
> wrote:
> >> According to James Page, we should look into the Ubuntu package of
> >> hacking and get patches there to fix the issues.
> >
> > Why specifically the Ubuntu package, and not the Debian one?
>
> The latest Ubuntu package has the correct fixes, not the Debian one.
>

To be clear, the Ubuntu package has enough workarounds and hacks to allow
OpenStack packages for the Newton release to build - some of that enables
skipping of hacking tests as they just won't work with the newer
flake8/pycodestyle without some major refactoring, which I did not have
time todo.

Besides, if we're failing OpenStack builds on lint errors in Debian and
Ubuntu, we're probably about two steps to late as these should have been
caught in OpenStack gate already!


Bug#836509: [PKG-Openstack-devel] Bug#836509: glance: FTBFS in testing (failing tests)

2016-09-06 Thread James Page
On Tue, 6 Sep 2016 at 13:57 Santiago Vila <sanv...@unex.es> wrote:

> > FYI, according to James Page, this was due to #836179.
>
> That's a way to see it, but if you mean this package needs to be built
> with pyopenssl >= 16.1.0 because otherwise the build fails, that's
> precisely why we have versioned build-depends.
>
> This kind of bugs should never happen in testing.


Neither glance nor barbican require pyopenssl 16.1.0; the problem was that
python-crytography was updated to 1.5, which broke pyopenssl 16.0.0 which
is not compatible with cryptography 1.5.  So the break in is pyopenssl IMHO
(as it was not functional) not in barbican or glance, resulting in this
transient build failure while that got sorted out.


Bug#825863: percona-xtradb-cluster-galera-2.x: should it be removed from Debian?

2016-05-31 Thread James Page
On Mon, 30 May 2016 at 22:36 Mattia Rizzolo  wrote:

> I think RM of this package should be seriously considered:
>
> * NPOASR
> * FTBFS
> * RC-buggy with no answers in 6 months
> * 2 NMUs
> * should be superseded by -3.x
> * very low popcon
>
> RM; percona-xtradb-cluster-galera-2.x -- RoQA; NPOASR; FTBFS; RC-buggy;
> unmaintained; low popcon
>

+1 (to be honest I though I had already done this when we removed the main
percona-xtradb-cluster-5.5 package from the archive)

>
>


Bug#791445: [Ceph-maintainers] Bug#791445: : Bug#791445: ceph: uses bundled libjerasure library again

2015-07-10 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 09/07/15 22:27, Thomas Goirand wrote:
 One of the reasons why I like standalone library is that it can
 run its own
 tests as well -- a something rarely seen in bundled (statically
 linked) libraries. Unfortunately at the moment libjerasure
 package do not run any tests... :(
 There's no question asked here. Embedding a library which is at the
 same time available standalone is a RC bug (severity: serious,
 because of a strong policy violation) which shall be fixed asap (so
 the severity of the bug is correct).

Actually I don't think this is a RC bug - policy says 'should' not 'must
'.

I agree that having a single libjerasure etc... is preferably, but at
the same time, the way the build works (multiple, cpu optimized
plugins including jerasure and gf-complete) in Ceph and how it *does*
do runtime detection of CPU features means that if we switch now to
using libjerasure, we cripple Ceph performance on any reasonably
specified server for users who want to use erasure coding.

I'd actually feel compelled to raise an RC bug against Ceph being
fundamentally broken in this area if this where the case.

Switch to libjerasure/gf-complete? - yes - when? when its possible
todo the correct runtime determination of CPU features in these
codebases, and we're able to make Ceph build and use this effectively.

So not yet...

- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJVn7hlAAoJEL/srsug59jDMYYP/ivUsNw2RBPlvJkPDgvfcPke
h2dE6xrETy4me2+9V2dVkSnQhxNpOJjNUezagfZJ1aD9D0c5DpW2qZqlDlhJI6Cp
dk4VxMD3NCBMRaBO0TmhfO4t21L5FAyjRS5DZ8VHrUvXVMfxZFZ6DbD1uXhowega
1pE67bXWSsXEu1yOhZTqLbdx26mBtOSPyS4VXfHofY5xlDnneJBbD85nEKi37VT9
Sbbiy3CPWzGf6mIFlQbxDUSDoaQuXY8ZMkMX+RdkCloLmy1QSDJzU6Folhe8Aba7
2yjOHzHrgykm6x2YB/HaLgBctgcz21US2SuX4Y3IXHHXqnKL8dZpkWQLFawwpWTf
npSmya/P/ThxAQ3Ra/9FwJMGhvzRjdftsmoIq0jwGV7Xl41CqgAlSIll5u+wWlr0
mVKY3tFanAH0WdXx9qOfO2eLCx9bOuhm9D6xrQufeFTipVeeARZwPCQdWpbCWN94
kHxrZz6MUb8+CW86CtKRhiVR4xCDK1NJzgAkrMMnRD+Z/BW5FqPQB7dJFoD4dX0s
xiHlFTGXdweorsus7MHiw0Ylhp7/AFwshn0DjsXI0fXv9hMvWigSUCjIH1hK8GKD
tyK0TlYu3JtGKL33NczN5mGQe5Hg76ejGpHGSqp8EthZCDeNZhHy1dq6wFUrYQ6M
3LKDAuwK4/PlpVVXkj6r
=1/Bp
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#791445: [Ceph-maintainers] Bug#791445: Bug#791445: Bug#791445: ceph: uses bundled libjerasure library again

2015-07-08 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 08/07/15 14:07, Dmitry Smirnov wrote:
 On Wed, 8 Jul 2015 11:07:43 Loic Dachary wrote:
 Without integration tests, linking Ceph against the wrong
 jerasure version may lead to data loss. Prior to publishing a
 Ceph version, various integration tests run to verify encoding
 / decoding,
 Those check are part of post-build tests, right?
 
 While I was maintaining Ceph I've made changes to run unit tests
 but James reverted it as well. :(

Not sure I can take credit for that


- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=koO2
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#791693: [debian-mysql] Bug#791693: percona-xtradb-cluster-common-5.5: uninstallable in sid

2015-07-08 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 07/07/15 17:22, Andreas Beckmann wrote:
 0m17.9s ERROR: Command failed (status=100): ['chroot',
 '/tmp/piupartss/tmpx3lw54', 'apt-get', '-y', 'install',
 'percona-xtradb-cluster-common-5.5=5.5.39-25.11+dfsg-1'] Reading
 package lists... Building dependency tree... Reading state
 information... Some packages could not be installed. This may mean
 that you have requested an impossible situation or if you are using
 the unstable distribution that some required packages have not yet
 been created or been moved out of Incoming. The following
 information may help to resolve the situation:
 
 The following packages have unmet dependencies: 
 percona-xtradb-cluster-common-5.5 : Depends: mysql-common but it is
 not going to be installed E: Unable to correct problems, you have
 held broken packages.

As pxc-5.5 has not been updated for the new mysql-common arrangements,
and I don't think Percona are interested in maintaining this package
in Debian, we should request removal of pxc-5.5 and its associated
galera package from Debian.

Any objections?


- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=ZhxI
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#791445: [Ceph-maintainers] Bug#791445: Bug#791445: Bug#791445: Bug#791445: ceph: uses bundled libjerasure library again

2015-07-07 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 06/07/15 18:23, James Page wrote:
 The ceph Debian package git repository only contains very little
 reasoning about the change. James can you please expand on this
 a bit? In general I would prefer to have changes like this in
 their own commit and not mixed with unrelated changelog
 updates. Did the Hammer release not build with the jerasure in
 Debian or are you just afraid of unexpected results if the
 Debian package is built with another version of jerasure than
 what they ship in their source code? These would IMO be valid
 reasons to (temporarily) remove the patch.
 Re-basing the patch - which was turning out to be non-trivial -
 pushed me over the time I had todo this update; as the upload was
 to experimental only, I intended to revisit when time permitted.

I dug into this in a bit more detail today; the Ceph package builds a
number of difference loadable erasure coding plugins, enabling
different cpu feature sets (generic, neon, sse3, sse4); each time
Jerasure and gf-complete are statically linked into the module, built
with the required flags to enable the right CPU instruction codes
(build time, not runtime enablement).

Unless I'm reading the packaging wrong, the jerasure and gf-complete
packages current disable any CPU specific extensions in order to have
a completely generic library that works on any CPU.  So using the
system libraries effectively cripples any CPU optimization that might
be achievable at runtime in Ceph.


- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=r3uE
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#791445: [Ceph-maintainers] Bug#791445: Bug#791445: Bug#791445: ceph: uses bundled libjerasure library again

2015-07-06 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 06/07/15 15:46, Gaudenz Steinlin wrote:
[...]
 I'm co-maintainer of both jerasure and ceph. If the Debian
 jerasure package was orphaned, I would be happy to step in and
 maintain it as a standalone package. Jerasure was packaged
 without dialog with the jerasure upstream and I can understand
 that keeping it in sync with what ceph needs is significant
 work.
 
 Loic thanks for your offer to help with this. We definitively need
 some upstream assistence on this. IMO while the current approach to
 just use the bundled version is suboptimal, the previous approach
 to just unilaterally use a different version of jerasure than
 upstream is not good either.
 
 Currently ceph is AFAICS the only reverse dependency of jerasure.
 I don't know why Thomas packaged it in the first place. But if we
 want to keept the standalone package it might be the best for the
 ceph maintainers group to take over maintenance of the jerasure
 Debian package. I hope Thomas won't mind if we lower the burden for
 him a bit.

I can help there - OpenStack Swift has erasure coding support as of
2.3.0; Thomas packaged Jerasure for this purpose.

 The ceph Debian package git repository only contains very little 
 reasoning about the change. James can you please expand on this a
 bit? In general I would prefer to have changes like this in their
 own commit and not mixed with unrelated changelog updates. Did the
 Hammer release not build with the jerasure in Debian or are you
 just afraid of unexpected results if the Debian package is built
 with another version of jerasure than what they ship in their
 source code? These would IMO be valid reasons to (temporarily)
 remove the patch.

Re-basing the patch - which was turning out to be non-trivial - pushed
me over the time I had todo this update; as the upload was to
experimental only, I intended to revisit when time permitted.

I also need to catchup on getting the 'modules' patch upstreamed;
that's also awkward with every Ceph release.

 What's the ceph upstream position on splitting out jerasure and
 building against the standalone version? Is this considered
 supported? Are you willing to accept a patch which either uses a
 standalone jerausre for all builds or which introduces a configure
 flag to do so?

I would prefer to see this approach taken; I hope upstream would be
supportive.


- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=Hz2B
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775881: [debian-mysql] Bug#775881: mysql-5.5: Multiple security fixes from January 2015 CPU

2015-02-06 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Salvatore

On 06/02/15 15:08, Salvatore Bonaccorso wrote:
 On 21/01/15 19:14, Salvatore Bonaccorso wrote:
 For wheezy-security I'm just building the package with imported
  version 5.5.41 to resolve the issues. Can say more if build 
 suceeds.
 
 I've pushed commits to git.debian.org for unstable; should fine
 time to build and test in the next day or so.
 
 Did you had a chance to look at the upload to unstable so that it
 can be included into jessie?

I did but instantly got blocked by an expired certificate in the test
suite; I think Akhil has pushed fixes + .42 point release to git but
I've been away/travelling for the past week so have not had time to
review/upload - I'll look when I get back on Mondau.

Apologies for the lag

- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=QHlS
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775881: [debian-mysql] Bug#775881: mysql-5.5: Multiple security fixes from January 2015 CPU

2015-01-22 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 21/01/15 19:14, Salvatore Bonaccorso wrote:
 For wheezy-security I'm just building the package with imported 
 version 5.5.41 to resolve the issues. Can say more if build
 suceeds.

I've pushed commits to git.debian.org for unstable; should fine time
to build and test in the next day or so.

Thanks for doing the wheezy update.

Cheers

James


- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBCAAGBQJUwP+6AAoJEL/srsug59jDhWgP/1bjnh28HsTDLH8GY5n3GWnw
OaBRi9GPKLg+jRIVAt96oeiZZPhb5VMnu8RdwBWNUqWbvefpyFjc286S1UnBpm1D
MNMRI9KF2+KJblHVyFaemvwv1UrjYUafhYY1mrKcHyQwncbulLHfWzHP1Mv0ib8h
/fXU9qKOzyMR+9xmeapifXN6HAJTdxhofSCv0AD47FqzbKjMFDsQgUITciD0F6C0
IJFg2v2qhn8ISMGMIGzdQpplILvjqYBK5wgcUhP0SdbBm5pCtbaa6SotYnpe6MiQ
2DYifV1OtrkOfVWXo/QvvLAu1dTFC4Q/vZvbwWI8gwEZxaFEMzxzeO0lNOjs9qs+
dnacsYoIG6nXs7SYEMY6ilAbtdcMWqOtmdGWnnZiPuwXUlwng29RJh5Y/CNtfknS
bvIpW3GkNpzxeO3/h6FvLGUCZr0yIm0BsAH8qDhHVpEpg/f5sWHsrgWLIFzLSFGX
g5RDh1U0PI6cJLJ1r/mItNZLGfZ/Pw8Srz9qN1nC+u7W+o781+dq2GmjF1O8nbC5
fMJ/HO6NM/cCet82BEO3nwki0cLMv+3WQranRT8Ml8OiUShnOFF7LTREDcfn/Pwd
enzpdZ+8b8TTEPkYLgAk9viEeT5cQBVU6xKmospZLk82kIF4pSqe1LdPFwWREHfd
HXmmuWwXxfTVfUlWD5wH
=8K/g
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#769337: [debian-mysql] Bug#769337: mysql-5.5: version in jessie/sid lower than in wheezy-security

2014-11-24 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 12/11/14 22:07, Aurelien Jarno wrote:
 The mysql-5.5 version in jessie/sid is lower than in wheezy,
 meaning that people upgrading from wheezy will still use the wheezy
 version, while people installing jessie will get a version with
 security bugs.
 
 Therefore, please upload mysql version 5.5.40 to unstable.

Onto this for this week; apologies for the lag

- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=dpaE
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#757644: also impacts OpenStack

2014-09-05 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

this change in the ip supported CLI syntax also impacts OpenStack
neutron/nova which rely on veth devices for instance connectivity.

Guido's patch looks correct and works for me (and I've uploaded it to
Ubuntu to unblock our OpenStack Juno testing - thankyou!).

- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=D6xR
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#734241: Ceph maintenance sloppy

2014-03-08 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi Thomas

On 08/03/14 06:37, Thomas Goirand wrote:
 It is the view of the Qemu maintainers that the Ceph maintenance
 in Debian has been sloppy, and therefore, they have removed RDB
 support in Qemu in both the Sid and Debian backports.

Apologies if this is the perception; I have been trying to rectify
this - there have certainly been historic maintenance issues.

 If I understand, the issue has been that you didn't receive the
 bug mail, and this has been solved. However, I would like to check
 with you that you have enough time to maintain Ceph correctly in
 Sid, and in backports. If you don't, then would you care for some
 help? Would you be interested in adding Ceph to the official Debian
 backports?

I do have the time to maintain ceph; as you point out we did have a
problem with bug mail (which should now be resolved) which did mean I
missed a load of bugs in the last month or so.  Quite happy to have
Ceph in Debian backports as well.

 The Ceph support in Qemu is, as you may guess, important for us.

Yup

 As for #734241, are you planning on addressing it soon? What should
 be the fix? It is looking like to me that the Upstart configuration
 is very different from the one with sysv-rc. Should a standard
 sysv-rc script be created for each upstart script?

I have a fix locally in testing which I'd planned to land at the same
time as the Firefly stable release which avoid having dummy scripts.
I'm not 100% sure that update-rc.d is actually doing the right thing -
but I can work around it easily enough with a guard in the maintainer
scripts for upstart detection.

 Also, have you been looking into adding support for systemd?

I've not looked at systemd support just yet - I'll probably work
directly with upsteam as this is where the init and upstart
configuration come from.

Cheers

James

- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=dVho
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#734241: init/upstart script problems

2014-03-04 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Apologies

Looks like bug mail is just not getting through to the maintainer ML.

I'll look to fix this for the next upload I do for the firefly release.

Cheers

James

- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=rJ4o
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#739841: [debian-mysql] Bug#739841: mariadb-*-5.5: file conflicts with mysql-*-5.6

2014-02-24 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 23/02/14 02:39, Andreas Beckmann wrote:
 Maybe myriadb and mysql should agree on a set of virtual packages
 that can be used for Provides/Conflicts/Replaces to avoid
 constantly updating package lists in multiple places whenever there
 is a major upstream version bump.

Yes - and this is something we have discussed quite a bit; but I think
we need to expand the use of virtual-* package a bit more than we have
already.

- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=NHDa
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#728425: python-babel: Patch to make tests deterministic

2013-12-06 Thread James Page
Package: python-babel
Version: 1.3+dfsg.1-1
Followup-For: Bug #728425
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu trusty ubuntu-patch

Dear Maintainer,

In Ubuntu, the attached patch was applied to achieve the following:

  * d/p/0001-Fixup-get_currency_name-test.patch: Make test for
get_currency_name deterministic and add check for plurality.

I submitted this upstream as well:

  https://github.com/mitsuhiko/babel/pull/73

Thanks for considering the patch.


-- System Information:
Debian Release: wheezy/sid
  APT prefers trusty-updates
  APT policy: (500, 'trusty-updates'), (500, 'trusty-security'), (500, 
'trusty'), (100, 'trusty-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.12.0-4-generic (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
=== added directory 'debian/patches'
=== added file 'debian/patches/0001-Fixup-get_currency_name-test.patch'
--- debian/patches/0001-Fixup-get_currency_name-test.patch	1970-01-01 00:00:00 +
+++ debian/patches/0001-Fixup-get_currency_name-test.patch	2013-12-06 11:53:11 +
@@ -0,0 +1,26 @@
+From 50f727ac2c741877235c592ce4e1f50bba08162c Mon Sep 17 00:00:00 2001
+From: James Page james.p...@ubuntu.com
+Date: Fri, 6 Dec 2013 11:49:26 +
+Subject: [PATCH] Fixup get_currency_name test
+
+This test failed in environments where no default locale
+can be determined; make the test deterministic and add
+additional test for plurality.
+
+Signed-off-by: James Page james.p...@ubuntu.com
+---
+ tests/test_numbers.py | 3 ++-
+ 1 file changed, 2 insertions(+), 1 deletion(-)
+
+--- a/tests/test_numbers.py
 b/tests/test_numbers.py
+@@ -173,7 +173,8 @@ class NumberParsingTestCase(unittest.Tes
+ 
+ 
+ def test_get_currency_name():
+-assert numbers.get_currency_name('USD', 'en_US') == u'US dollars'
++assert numbers.get_currency_name('USD', locale='en_US') == u'US Dollar'
++assert numbers.get_currency_name('USD', count=2, locale='en_US') == u'US dollars'
+ 
+ 
+ def test_get_currency_symbol():

=== added file 'debian/patches/series'
--- debian/patches/series	1970-01-01 00:00:00 +
+++ debian/patches/series	2013-12-06 11:52:48 +
@@ -0,0 +1 @@
+0001-Fixup-get_currency_name-test.patch


Bug#730457: Vulnerabilities don't impact jenkins core

2013-12-06 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi Moritz

Looking at the upstream security advisory, these issues impact plugins
that are not packaged either in jenkins or separately in Debian.

I think this bug can be closed out.

Cheers

James

- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.15 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=GV5A
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#728293: libusb-java: Patch to resolved build issues where default-jdk is not openjdk-6

2013-11-12 Thread James Page
Package: libusb-java
Version: 0.8+ztex20090101-6
Followup-For: Bug #728293
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu trusty ubuntu-patch

Dear Maintainer,

In Ubuntu, the attached patch was applied to achieve the following:

- d/p/jniInclude.patch: Restore original auto-detection of JAVAPREFIX so
  that package continues to build on targets with default-java != openjdk-6.

Thanks for considering the patch.


-- System Information:
Debian Release: wheezy/sid
  APT prefers trusty-updates
  APT policy: (500, 'trusty-updates'), (500, 'trusty-security'), (500, 
'trusty'), (100, 'trusty-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.12.0-2-generic (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru libusb-java-0.8+ztex20090101/debian/changelog libusb-java-0.8+ztex20090101/debian/changelog
diff -Nru libusb-java-0.8+ztex20090101/debian/patches/jniInclude.patch libusb-java-0.8+ztex20090101/debian/patches/jniInclude.patch
--- libusb-java-0.8+ztex20090101/debian/patches/jniInclude.patch	2012-09-16 20:37:40.0 +0100
+++ libusb-java-0.8+ztex20090101/debian/patches/jniInclude.patch	2013-10-08 23:13:04.0 +0100
@@ -1,14 +1,11 @@
-Index: libusb-java-0.8+ztex20090101/Makefile
-===
 libusb-java-0.8+ztex20090101.orig/Makefile	2011-02-02 13:13:45.0 +0100
-+++ libusb-java-0.8+ztex20090101/Makefile	2012-09-16 20:45:06.0 +0200
-@@ -13,7 +13,8 @@
+--- a/Makefile
 b/Makefile
+@@ -13,7 +13,7 @@
  #
  
  # $(JAVAPREFIX)/include should contain jni.h
 -JAVAPREFIX=/usr/local/java
-+#JAVAPREFIX=$(shell find /usr/lib/jvm/ -name jni.h | sed -e 's/include.*//' | head -n 1)
-+JAVAPREFIX=/usr/lib/jvm/java-6-openjdk-$(shell dpkg-architecture -qDEB_BUILD_ARCH|tr -d \n)
++JAVAPREFIX=$(shell find /usr/lib/jvm/ -name jni.h | sed -e 's/include.*//' | head -n 1)
  
  ###
  # this should not be modified #


Bug#729025: python-json-patch: As applied in Ubuntu...

2013-11-11 Thread James Page
Package: python-json-patch
Version: 1.3-1
Followup-For: Bug #729025
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu trusty ubuntu-patch

Dear Maintainer,

In Ubuntu, the attached patch was applied to achieve the following:

  * d/rules: Install versioned binaries for python3 package (LP: #1250088).

Thanks for considering the patch.


-- System Information:
Debian Release: wheezy/sid
  APT prefers trusty-updates
  APT policy: (500, 'trusty-updates'), (500, 'trusty-security'), (500, 
'trusty'), (100, 'trusty-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.12.0-2-generic (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru python-json-patch-1.3/debian/changelog python-json-patch-1.3/debian/changelog
diff -Nru python-json-patch-1.3/debian/rules python-json-patch-1.3/debian/rules
--- python-json-patch-1.3/debian/rules	2013-11-07 08:28:15.0 +
+++ python-json-patch-1.3/debian/rules	2013-11-11 16:53:14.0 +
@@ -24,6 +24,10 @@
 		python$$pyvers setup.py install --install-layout=deb \
 			--root $(CURDIR)/debian/python3-json-patch; \
 	done
+	set -e  for file in jsonpatch jsondiff; do \
+		mv $(CURDIR)/debian/python3-json-patch/usr/bin/$$file \
+			$(CURDIR)/debian/python3-json-patch/usr/bin/$${file}3;\
+	done
 
 override_dh_auto_clean:
 	dh_auto_clean


Bug#705262: ceph

2013-09-15 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Bastian  Lazlo

On 15/09/13 12:03, Bastian Blank wrote:
 On Sun, Sep 15, 2013 at 12:30:22PM +0200, László Böszörményi (GCS)
 wrote:
 On Sun, Sep 15, 2013 at 12:00 PM, Bastian Blank
 wa...@debian.org wrote:
 However there are several problems left: - ceph-common depends
 on python-flask and python-ceph.
 Why this is a problem? What I see is that python-flask should be 
 moved to python-ceph .
 There is a python script ceph-rest-api.  Where is this used?  Why
 does it warrant a dependency on 20 other packages?

Dumpling (0.67.x) is the first release with basic support for a REST
api for administering a ceph cluster - this binary supports this
feature - but more of a demo of how to use than anything really usable
(dev mode only).  However I do agree that it looks like it should be
in ceph.

 - ceph-common is not _arch-all_, why does it exist?
 Tools that used by other packages that can be installed 
 independently. Should it be named like ceph-base or ceph-tools?
 
 Not sure right now.  It looks like a random dash of tools, stashed 
 together without much thinking. - ceph, rados, rbd: Tools to manage
 different parts of ceph, remotely. - ceph-authtool: Works on
 keyring files, so needs to run locally on the monitor. -
 ceph-rest-api: Where does this belong to? - ceph-dencoder,
 ceph-syn: This are test or debugging tools.
 
 I would - move ceph-authotool and maybe ceph-rest-api into ceph, -
 move cephfs and mount.ceph into ceph-common - move ceph-dencoder
 and ceph-syn into ceph-test, - move stuff from ceph-resource-agents
 into ceph and - drop ceph-fs-common and ceph-resource-agents.
 
 - Why ceph-mds?
 Ceph has three independent blocks. Metadata servers (-mds) are
 one of them. Please see the overview[1].
 
 Yeah.  But why does it need a different package?  What does this
 extra package bring for the user?

For context, the ceph-mds function was split out in the packaging as
MDS is not as well tested/production grade as the RADOS and RBD
features;  In Ubuntu we use this to signal which parts receive full
support from the Ubuntu Server and Security teams. I appreciate that
this is not required for Debian but its also in the upstream packaging
so it would be nice if these splits could stay (see notes below about
why keeping packaging consistent across upstream, Debian and Ubuntu is
a good idea).

 - ceph depends on fdisk, parted and whole lot other crap it
 does not need.
 Agree on this. Don't know how it made there.
 
 Because ceph-disk (another incompletely documented indirection)
 uses it. The important parts (ceph-mon, ceph-osd) works fine
 without it.

ceph-disk is a key part of the deployment infrastructure for ceph so
these are important dependencies for anyone deploying ceph at scale
using upstream Chef recipes or ceph-deploy.

 - A lot of Replaces.
 There were package renames, users may have packages from upstream
 or Ubuntu. That's make it complex.
 
 Not a concern for Debian.  It was never in a stable release.

I think it is a concern for Debian; the principle source of Ceph
packages for Debian to-date has been from upstream, so ensuring smooth
transitions to/from Debian/upstream is important IMHO.

 - python-ceph needs stricter dependencies.
 Will check.
 
 At least the dependencies for librados2 and librdb1 needs to be 
 stricter.  The dependency on libcephfs1 is missing.

Agreed - python-ceph only just grew bindings for cephfs so that's just
an oversight. Good spot.  = on equiv binary package version should do
the job for the librbd/rados depends.

Laszlo - re -java/-jni split - this is in compliance with the Java
packaging policy:

http://www.debian.org/doc/packaging-manuals/java-policy/x114.html

I really think we need to stick with the packaging structure and
naming that is already in place as much as possible; All of the
existing deployment tooling (chef, juju, ceph-deploy) is written based
on this structure on Debian based systems; diverging is just going to
create work in other areas and potentially alienate the Debian
packaging as its different to the packaging that the Ceph community
has been using for the last two years... at least!

FYI once ceph is up-to-date in Debian I'm intending on landing
ceph-deploy as a way of deploying ceph on Debian - it makes testing
much easier.

- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/

iQIcBAEBCAAGBQJSNe0LAAoJEL/srsug59jDGLEP/3KDiq6fbzcNUeaw0JuCSK0F
QNfMdAQWRa86UX8zOJvtlhjbRJlwPWY4kRj52fxsXZTOcs+9t+ooTZ0ACwYTy0K3
jPscTwoev1rBvbYD1kJXCrd8OVg9I1WC0cK30OiPQ7y6SrTf+84fpHWHAZhcoQa7
TD5j+stSk0Nfko8Wj6K3xEy1J7PgoY16gcAbozEW/35zAz7tFUjhRgwJSJ9tBCdR
2H7rn2Dmxdk5RPNutKM1pKFiOdCTYOz87+ptYYdeKbvRuxU9b+dl2wb5U9D5IfTH
mBJm4dcQQr0IDxMdhG7VJxb/wSA8Nog5fxIxelloPg7wI65D4Lf/m0QvYXEpRc56
N5xCWaLKw5aTmh4Cviz7k6SvnXNfWoemF7LueETJFo1IUFS2jBB2tbYOcXFpzvhX

Bug#705262: ceph

2013-09-15 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 15/09/13 20:04, Bastian Blank wrote:
 On Sun, Sep 15, 2013 at 06:23:23PM +0100, James Page wrote:
 On 15/09/13 12:03, Bastian Blank wrote:
 There is a python script ceph-rest-api.  Where is this used?
 Why does it warrant a dependency on 20 other packages?
 Dumpling (0.67.x) is the first release with basic support for a
 REST api for administering a ceph cluster - this binary supports
 this feature - but more of a demo of how to use than anything
 really usable (dev mode only).  However I do agree that it looks
 like it should be in ceph.
 
 How does the authentication work?  The whole Python code in Ceph
 looks pretty bad for me.

Ceph itself uses a key based kerberos style authentication system
called cephx; the ceph_rest_api library uses the keys/config in
/etc/ceph but provides no additional auth for HTTP API access; neither
does the wrapper ceph-rest-api which is why right now there is no init
script or upstart configuration for this feature.

I make no general observations about the python code in ceph other
than it's worked well for me for the last 18 months.

 
 Because ceph-disk (another incompletely documented
 indirection) uses it. The important parts (ceph-mon, ceph-osd)
 works fine without it.
 ceph-disk is a key part of the deployment infrastructure for ceph
 so these are important dependencies for anyone deploying ceph at
 scale using upstream Chef recipes or ceph-deploy.
 
 Well.  Then it would be one, not three diffrent implementations of 
 fdisk.

Technically its just two - gdisk and parted; I don't have any strong
objection to upstream using two different tools if it makes massaging
block devices easier for them.

 Not a concern for Debian.  It was never in a stable release.
 I think it is a concern for Debian; the principle source of Ceph 
 packages for Debian to-date has been from upstream, so ensuring
 smooth transitions to/from Debian/upstream is important IMHO.
 
 Nope.  Other sources are no concern.

I'd like to try and play nice with other methods of distribution
especially if one of those has been used extensively by Debian users
to-date; makes life easier for potential users of these packages.

 At least the dependencies for librados2 and librdb1 needs to be
  stricter.  The dependency on libcephfs1 is missing.
 Agreed - python-ceph only just grew bindings for cephfs so that's
 just an oversight. Good spot.  = on equiv binary package version
 should do the job for the librbd/rados depends.
 
 Nope.  They need to be ==.  The (bad written) Python wrappers uses 
 ctypes, which does not implement a full ELF-loader.

OK; I know they are just a simple wrap over the core libs so that
makes sense.

 Laszlo - re -java/-jni split - this is in compliance with the
 Java packaging policy: 
 http://www.debian.org/doc/packaging-manuals/java-policy/x114.html

 
 You forgot the should.  Plus this is not part of the Debian
 policy.

Meh - well it works for me; the -java is arch independent whereas the
- -jni is not; saves duping the jar file in binary packages. If the -jni
every gets multi-arched then this approach is required anyway.

 I really think we need to stick with the packaging structure and 
 naming that is already in place as much as possible; All of the 
 existing deployment tooling (chef, juju, ceph-deploy) is written
 based on this structure on Debian based systems; diverging is
 just going to create work in other areas and potentially alienate
 the Debian packaging as its different to the packaging that the
 Ceph community has been using for the last two years... at
 least!
 
 I'm talked to the ftp-masters.  They usualy don't like if a package
 is split too much for no apparent reason.  It is nice if they are 
 compatible, but for Debian all problems have to be taken into
 account.

I don't think the ceph packages are split for no apparent reason;  I
believe that by adopting the current structure which works with the
most popular deployment tooling for ceph we work with upstream, rather
than going against the grain.

- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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Bug#714596: Bootstrapping jenkins

2013-08-12 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi Thomas

I don't think its feasible to remove the circular dependency in
Jenkins due to the complexity of dependencies and the age of the
project upstream.

I did give some thought how to work around this.  Its probably
possible to build jenkins without the modules that are causing the
circular dependency; they would have to be patched out of war/pom.xml.
Once you have this version, you can build the modules and then a
second rebuild with the BD's back in place will fix things up.

I appreciate this is less than ideal.

Cheers

James

- -- 
James Page
Ubuntu and Debian Developer
james.p...@ubuntu.com
jamesp...@debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=Wd1v
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#701324: mongodb-server: Compiler flags for use with gcc-4.8

2013-08-07 Thread James Page
Package: mongodb-server
Version: 1:2.4.3-1ubuntu1
Followup-For: Bug #701324

Dear Maintainer,

In Ubuntu, we are using the attached patch to ensure compatability with gcc 4.8.

Part of the patch came from upstream trunk (for mongodb itself); the other part 
I
added for the switch-back to using the embedded version of libv8.

Cheers

James


-- System Information:
Debian Release: wheezy/sid
  APT prefers saucy-updates
  APT policy: (500, 'saucy-updates'), (500, 'saucy-security'), (500, 'saucy'), 
(100, 'saucy-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.10.0-6-generic (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages mongodb-server depends on:
ii  adduser 3.113+nmu3ubuntu2
ii  libboost-filesystem1.53.0   1.53.0-4ubuntu3
ii  libboost-program-options1.53.0  1.53.0-4ubuntu3
ii  libboost-system1.53.0   1.53.0-4ubuntu3
ii  libboost-thread1.53.0   1.53.0-4ubuntu3
ii  libc6   2.17-91ubuntu1
ii  libgcc1 1:4.8.1-8ubuntu1
ii  libgoogle-perftools42.1-1
ii  libpcre31:8.31-2
ii  libpcrecpp0 1:8.31-2
ii  libsnappy1  1.1.0-1
ii  libssl1.0.0 1.0.1e-3ubuntu1
ii  libstdc++6  4.8.1-8ubuntu1
ii  libv8-3.8.9.20  3.8.9.20-2
ii  mongodb-clients 1:2.4.3-1ubuntu1
ii  sysv-rc 2.88dsf-41ubuntu3

mongodb-server recommends no packages.

mongodb-server suggests no packages.

-- no debconf information
Description: Disable unused-local-typedefs errors
 Disables new unused-local-typedefs as found in gcc 4.8
 .
 Based on commit to trunk upstream.
Author: James Page james.p...@ubuntu.com
Origin: https://github.com/mongodb/mongo/commit/2d30f0b562c1925a52670e767c2c0222189fb8f0

--- a/SConstruct
+++ b/SConstruct
@@ -715,6 +715,7 @@ if nix:
 env.Append( CCFLAGS=[-Werror, -pipe] )
 if not has_option('clang'):
 env.Append( CCFLAGS=[-fno-builtin-memcmp] ) # glibc's memcmp is faster than gcc's
+env.Append( CXXFLAGS=[-Wno-unused-local-typedefs] ) # New in gcc 4.8
 
 env.Append( CPPDEFINES=[_FILE_OFFSET_BITS=64] )
 env.Append( CXXFLAGS=[-Wnon-virtual-dtor, -Woverloaded-virtual] )
--- a/src/third_party/v8/SConscript
+++ b/src/third_party/v8/SConscript
@@ -51,7 +51,8 @@ LIBRARY_FLAGS = {
'-W',
'-Wno-unused-parameter',
'-Woverloaded-virtual',
-   '-Wnon-virtual-dtor']
+   '-Wnon-virtual-dtor',
+   '-Wno-unused-local-typedefs']
 },
 'mode:debug': {
   'CPPDEFINES':   ['ENABLE_DISASSEMBLER', 'DEBUG'],


Bug#713381: FTBFS in jjenkins - ant problem

2013-07-02 Thread James Page
This is actually a problem in the ant package; the artifacts versions 
are not being rewritten to 4.x for junit4 dependencies.


--
James Page
Ubuntu Core Developer
Debian Maintainer
james.p...@ubuntu.com


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#711582: closed by Chris Lamb la...@debian.org (Bug#711582: fixed in jasmin-sable 2.4.0-3)

2013-06-11 Thread James Page

On 11/06/13 05:26, Jeremy Bicha wrote:

On 10 June 2013 18:36, Debian Bug Tracking System ow...@bugs.debian.org wrote:

* ``mkdir -p`` over ``mkdir``. (Closes: #711582)


Why do you need to explicitly create a directory that already exists
when built in a clean Debian or Ubuntu chroot?


I suspect that Chris added the mkdir as the package source is on github 
and git does not like empty directories (and classes is in the upstream 
source).


This is not a problem when building in a chroot, but probably is when 
building in tree:


dpkg-source: info: building jasmin-sable using existing 
./jasmin-sable_2.4.0.orig.tar.gz

dpkg-source: warning: ignoring deletion of directory classes

So having the -p option makes the build work in both cases.

--
James Page
Ubuntu Core Developer
Debian Maintainer
james.p...@ubuntu.com


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#711582: jasmin-sable: Patch to fix FTBFS

2013-06-10 Thread James Page
Package: jasmin-sable
Version: 2.4.0-2
Followup-For: Bug #711582
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu saucy ubuntu-patch

Dear Maintainer,

In Ubuntu, the attached patch was applied to achieve the following:

  * d/rules: Add '-p' option when creating classes dir to prevent FTBFS.

Thanks for considering the patch.


-- System Information:
Debian Release: wheezy/sid
  APT prefers raring-updates
  APT policy: (500, 'raring-updates'), (500, 'raring-security'), (500, 
'raring-proposed'), (500, 'raring'), (100, 'raring-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.8.0-24-generic (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru jasmin-sable-2.4.0/debian/changelog jasmin-sable-2.4.0/debian/changelog
diff -Nru jasmin-sable-2.4.0/debian/rules jasmin-sable-2.4.0/debian/rules
--- jasmin-sable-2.4.0/debian/rules	2013-05-22 23:46:56.0 +0100
+++ jasmin-sable-2.4.0/debian/rules	2013-06-10 09:14:41.0 +0100
@@ -10,7 +10,7 @@
 	dh $@
 
 override_dh_auto_build:
-	mkdir classes
+	mkdir -p classes
 	ant build_parser jasmin-jar
 
 override_dh_auto_clean:


Bug#683502: jedit: Refreshed patch

2013-05-26 Thread James Page
Package: jedit
Version: 5.0.0+dfsg-1
Followup-For: Bug #683502
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu saucy ubuntu-patch

Dear Maintainer,

In Ubuntu, the attached patch was applied to achieve the following:

  * Merge from Debian unstable.  Remaining changes:
- d/control: Switch to using default-jdk for build, don't use BDI's.

Thanks for considering the patch.


-- System Information:
Debian Release: wheezy/sid
  APT prefers raring-updates
  APT policy: (500, 'raring-updates'), (500, 'raring-security'), (500, 
'raring-proposed'), (500, 'raring'), (100, 'raring-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.8.0-22-generic (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru jedit-5.0.0+dfsg/debian/changelog jedit-5.0.0+dfsg/debian/changelog
diff -Nru jedit-5.0.0+dfsg/debian/control jedit-5.0.0+dfsg/debian/control
--- jedit-5.0.0+dfsg/debian/control	2013-03-24 20:34:07.0 +
+++ jedit-5.0.0+dfsg/debian/control	2013-05-26 22:04:12.0 +0100
@@ -9,6 +9,7 @@
bsh,
bsh-src (= 2.0b4-11),
debhelper (= 7.0.50~),
+   default-jdk,
docbook-xml,
docbook-xsl,
docbook-xsl-saxon,
@@ -20,7 +21,6 @@
libjsr305-java,
quilt (= 0.46-7~),
xsltproc
-Build-Depends-Indep: openjdk-6-jdk | sun-java6-jdk
 Standards-Version: 3.9.3
 DM-Upload-Allowed: yes
 Vcs-Git: git://git.debian.org/pkg-java/jedit.git


Bug#696816: jenkins: Security issues were found in Jenkins core

2013-01-29 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi Steve

On 25/01/13 15:18, Steven McDonald wrote:
 The issue was raised on debian-devel[0] that this bug still
 affects unstable and is causing jenkins to be a candidate for
 removal from wheezy. I have backported the fixes for these issues
 from upstream git; they are attached to this e-mail as separate
 quilt patches for the sake of cleanliness.

Thanks for the patches.

 I have also uploaded a source NMU package[1] to
 mentors.debian.net, which I intend to seek sponsorship for if I
 don't get a reply to this bug report within 72 hours (as the
 deadline given by the Release Team for removal from testing is 31st
 January).

I'll get a new version uploaded to unstable today; note that jenkins
is also effected by another security vulnerability (see [0]) which I
am currently waiting on upstream for a backported fix (its big).

Thanks

James

[0] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697617

- -- 
James Page
Ubuntu Core Developer
Debian Maintainer
james.p...@ubuntu.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=jvHr
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#697617: jenkins: remote code execution vulnerability

2013-01-10 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 09/01/13 00:54, Miguel Landaeta wrote:
 Hi,
 
 I'm working in backporting a fix for this issue to this version of 
 Jenkins. It doesn't too hard to do it but I had not tested
 properly the patch I got.
 
 If everything goes well I'll attach a debdiff to this bug report
 very soon.

Thanks Miguel;  I'm also about to upload the latest version of Jenkins
to experimental which includes a fix for this issue and
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696816 (which
requires a new version of jenkins-winstone as well).

We might want to consider whether updating unstable/testing to 1.480.2
is actually the best way forward at this point in time.


- -- 
James Page
Ubuntu Core Developer
Debian Maintainer
james.p...@ubuntu.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=biqm
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#697617: jenkins: remote code execution vulnerability

2013-01-10 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 10/01/13 15:46, Miguel Landaeta wrote:
 We might want to consider whether updating unstable/testing to
 1.480.2 is actually the best way forward at this point in
 time.
 Hi James,
 
 I don't know if it is feasible at this point in the release cycle
 to have a new upstream release of jenkins in sid even if it fixes
 some security issues.

Agreed; its a last resort.

 I backported the fix for CVE-2013-0158 from stable branch and I 
 applied it to 1.447.2+dfsg-2. It applies cleanly but I'm getting a 
 FTBFS. I don't have time to review it right now but I'll go back to
 it later.
 
 I'm attaching the debdiff I got and the FTBFS log error.

I did much the same for the version in Ubuntu 12.04 (1.424.6); and hit
similar issues. The key problem is the extent of the patch to fix this
issue and the amount of code change in the TCP/Agent communication
area between 1.480.2 and earlier versions we already have packaged.

I'm trying to get some advice from upstream on this - hopefully I'll
hear back in the next ~24hrs

 BTW, recently the team of developers with I work with began to use 
 Jenkins so I have some interest in it. If you are OK with that I
 can jump in as co-maintainer.

Yes please!

Cheers

James

- -- 
James Page
Ubuntu Core Developer
Debian Maintainer
james.p...@ubuntu.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=XG02
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#688298: jenkins: Multiple security issues

2012-09-25 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Note that the jenkins package in Debian is not effected by:

CVE-2012-4440   jenkins XSS in Violations plugin
CVE-2012-4441   jenkins XSS in CI game plugin

These are problems in plugins which are not built as part of the
jenkins source package.

I have a fix from upstream for 1.447.2 - testing now.

- -- 
James Page
Ubuntu Core Developer
Debian Maintainer
james.p...@ubuntu.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=pxHM
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#688298: jenkins: Multiple security issues

2012-09-24 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi Moritz

On 21/09/12 09:16, Moritz Muehlenhoff wrote:
 Please see
 http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-09-17.cb

  CVE IDs have been assigned: 
 http://seclists.org/oss-sec/2012/q3/521
 
 Remember Debian is frozen, so please upload only minimal fixes and
 and ask for a freeze exception by filing a bug against
 release.debian.org
 
 Cheers, Moritz

I've contacted upstream for some co-operation on this and future
security issues; I've been able to cherry pick security fixes before
but this time its not obvious.

I'll upload fixes as soon as I have them

Cheers

James

- -- 
James Page
Ubuntu Core Developer
Debian Maintainer
james.p...@ubuntu.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=tw2r
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#678766: jetty8: FTBFS: 1 required artifact is missing

2012-06-25 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 24/06/12 10:29, Lucas Nussbaum wrote:
 Missing: -- 1)
 org.apache.tomcat:tomcat-servlet-api:jar:debian
 
 Try downloading the file manually from the project website.
 
 Then, install it using the command: mvn install:install-file
 -DgroupId=org.apache.tomcat -DartifactId=tomcat-servlet-api
 -Dversion=debian -Dpackaging=jar -Dfile=/path/to/file
 
 Alternatively, if you host your own repository you can deploy the
 file there: mvn deploy:deploy-file -DgroupId=org.apache.tomcat
 -DartifactId=tomcat-servlet-api -Dversion=debian -Dpackaging=jar
 -Dfile=/path/to/file -Durl=[url] -DrepositoryId=[id]
 
 Path to dependency: 1)
 org.eclipse.jetty:jetty-util:jar:8.1.3.v20120416 2)
 org.apache.tomcat:tomcat-servlet-api:jar:debian

Last upload of Tomcat7 remapped the API artifacts to javax.servlet
inline with tomcat6 conventions.

I'll do a patch for this package.


- -- 
James Page
Ubuntu Core Developer
Debian Maintainer
james.p...@ubuntu.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=gzTv
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#642747: wss4j: Patch to resolve FTBFS

2012-03-27 Thread James Page
Package: wss4j
Version: 1.5.8+svntag-1
Followup-For: Bug #642747
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu precise ubuntu-patch

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Dear Maintainer,

In Ubuntu, the attached patch was applied to achieve the following:

  * Fix FTBFS (LP: #935490):
- d/rules: Switched xml-security - xmlsec to pickup jar name change
  in libxml-security-java.

Thanks for considering the patch.

- -- System Information:
Debian Release: wheezy/sid
  APT prefers precise-updates
  APT policy: (500, 'precise-updates'), (500, 'precise-security'), (500, 
'precise')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-20-generic (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iQIcBAEBCAAGBQJPca/uAAoJEL/srsug59jDZ/0QAKdVEzYnmGWpTgRjMUSJYLUk
d7O2RKJEz4co1Q8ru1MBCDMVu5WcPlbjJcy+PVTyHHpSEZnXm7IR4hsYCpcavKd+
St2ShWYTZxO0Xp6noFCLfOZn6w7UFLg/mlQz8eHwcSnyOCSCTALhLPud0T7X9fA4
8plFOiHQa3k1KdZu9KVPSdzkw+ltcotTeoRtJtMvIEm8OJxaLX8imIsAnrIQhXQE
6iPUYfwYWL49lnYvQlddxWLPn1bnndBJ7euCbQ6wbrTEL5eE0Igejz8+NzjP7qHW
UI9rBOxYH9/ro+oFv7PKpherm2wQ6w/MQ3k0kbK0MBJ4HGdS+jfFnf21zax2zcX0
diqNIVAJKfDAqDSF2dTak23hoaIFeDtKneo/S5wPhm132i4mPAXoZIDqiwGaTveG
XBKqRYZjEmosEjoMH+1AwiJPe8icS1+M8heaMzdXx3wqgvqaw8On8ordbLGuEfFM
UD/stE0BZ3HLtua0iYpL/K1QqLdYtHLR7nIiKIHexy+IG65tymOCUSUs5jT9+qYJ
WY9cRhc/nA6GSKuu2zgw3Bc37tyjSb39cd1JjoTLd1MlV/D+kwUX7F0hgpeadm6k
qykOhACDXoLoVPtmYE5QYjnFkZugQ0Ucwv0EwyTcp1Grb9gh+WUSn5TAvota4Lgp
myOj0TS26d+hTUIpYfey
=NntR
-END PGP SIGNATURE-
=== modified file 'debian/rules'
--- debian/rules	2010-02-11 19:30:49 +
+++ debian/rules	2012-03-27 12:14:26 +
@@ -10,7 +10,7 @@
 JAVA_HOME:= /usr/lib/jvm/default-java
 DEB_ANT_CLEAN_TARGET := debian-clean
 DEB_ANT_BUILDFILE:= debian/build.xml
-DEB_JARS := axis commons-logging xalan2 bcprov jaxrpc xml-security
+DEB_JARS := axis commons-logging xalan2 bcprov jaxrpc xmlsec
 
 DEB_INSTALL_CHANGELOGS_ALL = ChangeLog.txt
 



Bug#649900: CVE-2011-4344: XSS

2012-01-03 Thread James Page
This XSS issue was resolved/released in 0.9.10-jenkins-29 so the package
in Debian already contains the fix for this security issue.

Apologies - I should have detailed this in the changelog entry.

Cheers

James

-- 
James Page
Ubuntu Core Developer



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#642144: mmpong: Porting patch to support cegui-mk2-0.7.5

2011-12-07 Thread James Page
Package: mmpong
Version: 0.9.1-1
Followup-For: Bug #642144
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu precise ubuntu-patch

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Dear Maintainer,

In Ubuntu, the attached patch was applied to achieve the following:

  * d/patches/02_cegui-mk2-0.7.5.dpatch:
- client_gl/gui.h: Update for new header file name and location.
- client_gl/gui.cpp: Port API usage from 0.6.x - 0.7.x

Debian unstable now has cegui-mk2 0.7.5; this patch ports mmpong to use
the new header locations and API changes in this library.

Thanks for considering the patch.


- -- System Information:
Debian Release: wheezy/sid
  APT prefers precise-updates
  APT policy: (500, 'precise-updates'), (500, 'precise-security'), (500, 
'precise')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-generic (SMP w/8 CPU cores)
Locale: LANG=C, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iQIcBAEBCAAGBQJO31ueAAoJEL/srsug59jDbiUP/izvFk28BuUS/N1HMSN0LK1T
yahTeCrL3m48i3YtyEAq71Eb9EkLhNy42rQTruMtsJhC5GyEkmPqTrHQo+MX9CRs
QRe3eu0m7FSbx37qeNLSZ58hKqXM0W8R2cythiuICwQ7yg7WEAd7aWVG94zzff6/
UDyvmdukl4vaDpsbgK3vcfgKNJZvVjQyZ2ZzAa98/X+yp6lU4IYKx1jhgKD/qzNm
CxJC2JdgpEMAgX3matKCpq137Wz69exqfxpT4U6RHawg57VO4AP8IiQDulKjXWjh
nkO2d/xZD7hndHQHxSbw2mY/tNBLyFJi6Vq5C2hXrYoe+b5jme+UVVDPr/jQ7uFV
TQV9j39T2ywJhUlRFIPF5OKu48stK5jrh6Ab3UILhpeunAYCL8B4xUaxEEhV92Bl
YAxJd036QBKgj59pWplMsv898qFSwguMUkNB3S45BApL06jaNT6qFUfRt7fh0CaD
yl6JA9CEVnK0sx8XGs5j7lR0FGwPGa4SmnI+1R84i2kPmdrrP4kG2/nNWcrnvjHO
6MC845NVbsO3tURGc3FULt0VGNe2POzpt/6LG/m9twDjGf+3Qu5jCb1ROKuMttQM
HabflSpHnlgk7ZvQs8YsV3ounC7ruQ4g/BhszZGgtWJASlmtEmhVZC/UvXIrOIU7
Kh2PSe15fRLQelxsfFaB
=kfT7
-END PGP SIGNATURE-
=== modified file 'debian/patches/00list'
--- debian/patches/00list	2009-01-09 16:39:01 +
+++ debian/patches/00list	2011-12-07 09:54:29 +
@@ -1 +1,2 @@
 01_share.dpatch
+02_cegui-mk2-0.7.5.dpatch

=== added file 'debian/patches/02_cegui-mk2-0.7.5.dpatch'
--- debian/patches/02_cegui-mk2-0.7.5.dpatch	1970-01-01 00:00:00 +
+++ debian/patches/02_cegui-mk2-0.7.5.dpatch	2011-12-07 10:43:14 +
@@ -0,0 +1,43 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## 02_cegui-mk2-0.7.5.dpatch by James Page james.p...@ubuntu.com
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: No description.
+
+@DPATCH@
+diff -urNad '--exclude=CVS' '--exclude=.svn' '--exclude=.git' '--exclude=.arch' '--exclude=.hg' '--exclude=_darcs' '--exclude=.bzr' mmpong~/client_gl/gui.cpp mmpong/client_gl/gui.cpp
+--- mmpong~/client_gl/gui.cpp	2011-12-07 09:45:09.0 +
 mmpong/client_gl/gui.cpp	2011-12-07 10:43:13.727551992 +
+@@ -148,9 +148,9 @@
+ 
+ 
+ GUI::GUI(std::string resbase, int w, int h, bool _visible, ClientState *_state) {
+-	renderer = new OpenGLRenderer(0, w, h);
++	renderer = OpenGLRenderer::create(Size(w,h));
+ 	log =  new dummyLogger();
+-	sys = new System(renderer);
++	sys = System::create(*renderer);
+ 	visible = _visible;
+ 	state = _state;
+ 	try {
+@@ -176,7 +176,7 @@
+ 		// ATTENTION (by andré): 
+ 		//the next line segfaults with CEGUI 0.5.0-4.1 in Debian/Ubuntu
+ 		//this is fixed in 0.6 (sorry, found no workaround atm)
+-		SchemeManager::getSingleton().loadScheme( TaharezLook.scheme );
++		SchemeManager::getSingleton().create( TaharezLook.scheme );
+ 		sys-setDefaultMouseCursor( TaharezLook, MouseArrow );
+ 		sys-setDefaultTooltip(TaharezLook/Tooltip);
+ 
+diff -urNad '--exclude=CVS' '--exclude=.svn' '--exclude=.git' '--exclude=.arch' '--exclude=.hg' '--exclude=_darcs' '--exclude=.bzr' mmpong~/client_gl/gui.h mmpong/client_gl/gui.h
+--- mmpong~/client_gl/gui.h	2011-12-07 09:45:09.0 +
 mmpong/client_gl/gui.h	2011-12-07 10:30:03.0 +
+@@ -22,7 +22,7 @@
+ #define __GUI_H__
+ 
+ #include CEGUI.h
+-#include RendererModules/OpenGLGUIRenderer/openglrenderer.h
++#include RendererModules/OpenGL/CEGUIOpenGLRenderer.h
+ #include CEGUILogger.h
+ #include clientstate.h
+ 



Bug#643501: jenkins-crypto-util: FTBFS: Test failures

2011-09-28 Thread James Page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

The certificates that the test use have expired - and now the tests
are failing.

I will raise this upstream

- -- 
James Page
Ubuntu Server Developer
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=euPN
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#626373: jing-trang: Proposed patch to resolve FTBFS

2011-09-15 Thread James Page
Package: jing-trang
Version: 2009-3
Followup-For: Bug #626373
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu oneiric ubuntu-patch



*** /tmp/tmpo_Cw1q
In Ubuntu, the attached patch was applied to achieve the following:

  * Fix FTBFS (LP: #749219):
- d/rules: use xml-resolver.jar instead of xml-commons-resolver-1.1.jar.
- d/control: openoffice.org-java-common - libreoffice-java-common.
- d/rules: Pickup new location of saxon9.jar provided by 
  libreoffice-java-common.

Thanks for considering the patch.


-- System Information:
Debian Release: wheezy/sid
  APT prefers oneiric-updates
  APT policy: (500, 'oneiric-updates'), (500, 'oneiric-security'), (500, 
'oneiric')
Architecture: amd64 (x86_64)

Kernel: Linux 3.0.0-11-generic (SMP w/8 CPU cores)
Locale: LANG=C, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
=== modified file 'debian/changelog'

=== modified file 'debian/control'
--- debian/control  2010-08-24 21:23:21 +
+++ debian/control  2011-09-15 11:33:08 +
@@ -1,9 +1,10 @@
 Source: jing-trang
 Priority: extra
-Maintainer: Debian XML/SGML Group 
debian-xml-sgml-p...@lists.alioth.debian.org
+Maintainer: Ubuntu Developers ubuntu-devel-disc...@lists.ubuntu.com
+XSBC-Original-Maintainer: Debian XML/SGML Group 
debian-xml-sgml-p...@lists.alioth.debian.org
 Uploaders: Samuel Thibault sthiba...@debian.org
 Build-Depends: debhelper (= 7)
-Build-Depends-Indep: default-jdk, ant, ant-optional, testng, javacc, 
libsaxon-java, libxerces2-java, libxalan2-java, libisorelax-java, 
openoffice.org-java-common, libxml-commons-resolver1.1-java, unicode-data
+Build-Depends-Indep: default-jdk, ant, ant-optional, testng, javacc, 
libsaxon-java, libxerces2-java, libxalan2-java, libisorelax-java, 
libreoffice-java-common, libxml-commons-resolver1.1-java, unicode-data
 Standards-Version: 3.9.1
 Section: java
 Homepage: http://code.google.com/p/jing-trang/

=== modified file 'debian/rules'
--- debian/rules2009-09-01 15:53:03 +
+++ debian/rules2011-09-15 11:32:25 +
@@ -5,7 +5,7 @@
 JAR=jar
 
 JAVACLASSES=/usr/share/java
-CLASSPATH=$(JAVACLASSES)/isorelax.jar:$(JAVACLASSES)/xml-apis-ext.jar:$(JAVACLASSES)/xercesImpl.jar:$(JAVACLASSES)/saxon.jar:$(JAVACLASSES)/openoffice/saxon9.jar:$(JAVACLASSES)/xalan2.jar:$(JAVACLASSES)/testng.jar:$(JAVACLASSES)/xml-commons-resolver-1.1.jar
+CLASSPATH=$(JAVACLASSES)/isorelax.jar:$(JAVACLASSES)/xml-apis-ext.jar:$(JAVACLASSES)/xercesImpl.jar:$(JAVACLASSES)/saxon.jar:$(JAVACLASSES)/xalan2.jar:$(JAVACLASSES)/testng.jar:$(JAVACLASSES)/xml-resolver.jar:/usr/share/libreoffice/basis3.4/program/classes/saxon9.jar
 
 VERSION=20090818
 



Bug#640494: liblucene2-java: FTBFS with latest version of jtidy in unstable

2011-09-05 Thread James Page
Package: liblucene2-java
Version: 2.9.4+ds1-2
Severity: serious
Justification: fails to build from source


Whilst testing reverse build-deps for a late sync of the latest version
of jtidy into the latest Ubuntu development release I hit the following 
issue which I can reproduce in Debian unstable (albiet I had to fix the
location of JAVA_HOME in debian/rules to point to a valid java home -
see d-j@l.d.o 'openjdk-6 and openjdk-7 multiarch installable'):

common.test:
[mkdir] Created dir: 
/build/jamespage-lucene2_2.9.4+ds1-2-amd64-qB5aEF/lucene2-2.9.4+ds1/build/contrib/ant/test
[junit] WARNING: multiple versions of ant detected in path for junit
[junit]  
jar:file:/usr/share/java/ant-1.8.2.jar!/org/apache/tools/ant/Project.class
[junit]  and 
jar:file:/usr/share/ant/lib/ant.jar!/org/apache/tools/ant/Project.class
[junit] Testsuite: org.apache.lucene.ant.HtmlDocumentTest
[junit] Tests run: 1, Failures: 0, Errors: 1, Time elapsed: 0.059 sec
[junit]
[junit] Testcase: testDoc(org.apache.lucene.ant.HtmlDocumentTest):  Caused 
an ERROR
[junit] null
[junit] java.lang.ExceptionInInitializerError
[junit] at org.w3c.tidy.Tidy.init(Tidy.java:135)
[junit] at 
org.apache.lucene.ant.HtmlDocument.init(HtmlDocument.java:60)
[junit] at 
org.apache.lucene.ant.HtmlDocumentTest.setUp(HtmlDocumentTest.java:34)
[junit] Caused by: java.lang.RuntimeException: Failed to load 
jtidy.properties
[junit] at org.w3c.tidy.Report.readReleaseDate(Report.java:94)
[junit] at org.w3c.tidy.Report.clinit(Report.java:85)
[junit] Caused by: java.lang.NullPointerException
[junit] at java.util.Properties$LineReader.readLine(Properties.java:435)
[junit] at java.util.Properties.load0(Properties.java:354)
[junit] at java.util.Properties.load(Properties.java:342)
[junit] at org.w3c.tidy.Report.readReleaseDate(Report.java:91)
[junit]
[junit]
[junit] Test org.apache.lucene.ant.HtmlDocumentTest FAILED
[junit] Testsuite: org.apache.lucene.ant.IndexTaskTest
[junit] Tests run: 1, Failures: 0, Errors: 1, Time elapsed: 0.19 sec
[junit]
[junit] Testcase: testSearch(org.apache.lucene.ant.IndexTaskTest):  Caused 
an ERROR
[junit] null
[junit] java.lang.ExceptionInInitializerError
[junit] at org.w3c.tidy.Tidy.init(Tidy.java:135)
[junit] at 
org.apache.lucene.ant.HtmlDocument.init(HtmlDocument.java:60)
[junit] at 
org.apache.lucene.ant.HtmlDocument.Document(HtmlDocument.java:175)
[junit] at 
org.apache.lucene.ant.FileExtensionDocumentHandler.getDocument(FileExtensionDocumentHandler.java:56)
[junit] at org.apache.lucene.ant.IndexTask.indexDocs(IndexTask.java:340)
[junit] at org.apache.lucene.ant.IndexTask.execute(IndexTask.java:236)
[junit] at 
org.apache.lucene.ant.IndexTaskTest.setUp(IndexTaskTest.java:69)
[junit] Caused by: java.lang.RuntimeException: Failed to load 
jtidy.properties
[junit] at org.w3c.tidy.Report.readReleaseDate(Report.java:94)
[junit] at org.w3c.tidy.Report.clinit(Report.java:85)
[junit] Caused by: java.lang.NullPointerException
[junit] at java.util.Properties$LineReader.readLine(Properties.java:435)
[junit] at java.util.Properties.load0(Properties.java:354)
[junit] at java.util.Properties.load(Properties.java:342)
[junit] at org.w3c.tidy.Report.readReleaseDate(Report.java:91)
[junit]
[junit]
[junit] Test org.apache.lucene.ant.IndexTaskTest FAILED
[junit] Testsuite: org.apache.lucene.ant.TextDocumentTest
[junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.039 sec
[junit]
   [subant] Failure for target 'test' of: 
/build/jamespage-lucene2_2.9.4+ds1-2-amd64-qB5aEF/lucene2-2.9.4+ds1/contrib/ant/build.xml
   [subant] The following error occurred while executing this line:
   [subant] 
/build/jamespage-lucene2_2.9.4+ds1-2-amd64-qB5aEF/lucene2-2.9.4+ds1/contrib/contrib-build.xml:130:
 The following error occurred while executing this line:
   [subant] 
/build/jamespage-lucene2_2.9.4+ds1-2-amd64-qB5aEF/lucene2-2.9.4+ds1/common-build.xml:455:
 The following error occurred while executing this line:
   [subant] 
/build/jamespage-lucene2_2.9.4+ds1-2-amd64-qB5aEF/lucene2-2.9.4+ds1/common-build.xml:448:
 Tests failed!
 [echo] Building benchmark...

This causes the build to fail.


*** /tmp/reportbug-liblucene2-java-20110905-26613-bWHgDw
Subject: liblucene2-java: FTBFS with latest version of jtidy in unstable
Package: liblucene2-java
Version: 2.9.4+ds1-2
Justification: fails to build from source
Severity: serious



-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.38-11-generic (SMP w/8 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash

Versions of packages liblucene2-java depends on:
ii  

Bug#628272: Release of this patch?

2011-06-08 Thread James Page
I've just hit this bug in one of my new packages; when do you think
1.4.3 of m-d-h will be released?

Cheers

James

-- 
James Page
Software Engineer, Ubuntu Server Team


signature.asc
Description: This is a digitally signed message part


Bug#628272: Release of this patch?

2011-06-08 Thread James Page
On Wed, 2011-06-08 at 16:39 +0200, Damien Raude-Morvan wrote:
 I can release a 1.4.3 version w/ this simple change before tomorrow
 morning.
 (my initial plan was to work on some others reported - but minor -
 issues
 before doing an upload) 

I can wait for a bit; I have some other packages that I can work on in
the meantime.

Cheers

James

-- 
James Page
Software Engineer, Ubuntu Server Team


signature.asc
Description: This is a digitally signed message part


Bug#605367: tomcat6 FTBFS against ant 1.8.1

2010-11-29 Thread James Page
Package: tomcat6
Version: 6.0.28-7
Severity: serious
Tags: patch
Justification: fails to build from source
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu natty ubuntu-patch


tomcat6 will FTBFS against ant 1.8.1.  Appreciate that this is still in 
experimental 
but at some point in time this will break.  This is due to the fact that TRaX 
is now
part of the JDK so the optional tasks in Ant have moved from ant-trax.jar to 
ant-nodeps.jar.

*** /tmp/tmpIpNIFU
In Ubuntu, we've applied the attached patch to achieve the following:

  * Amended debian/rules, fix xslt processing in ant 1.8.1 to 
fix FTBFS (LP: #662588)

We thought you might be interested in doing the same. 


-- System Information:
Debian Release: squeeze/sid
  APT prefers maverick-updates
  APT policy: (500, 'maverick-updates'), (500, 'maverick-security'), (500, 
'maverick')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.35-23-generic (SMP w/8 CPU cores)
Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
=== modified file 'debian/rules'
--- debian/rules2010-07-20 14:36:48 +
+++ debian/rules2010-11-08 13:32:13 +
@@ -5,7 +5,7 @@
 BLDLIB := output/build/lib
 BLDBIN := output/build/bin
 DEB_JARS_BASE := /usr/share/java
-DEB_JARS := ant ant-launcher ant-trax
+DEB_JARS := ant ant-launcher ant-trax ant-nodeps
 DEB_CLASSPATH = $(shell for jar in $(DEB_JARS); do \
if [ -f $$jar ]; then echo -n $${jar}:; fi; \
if [ -f $$jar.jar ]; then echo -n $${jar}.jar:; fi; \



Bug#605369: testng FTBFS against ant 1.8.1

2010-11-29 Thread James Page
Package: testng
Version: 5.11+dfsg-2
Severity: serious
Tags: patch
Justification: fails to build from source
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu natty ubuntu-patch


testng will FTBFS against ant 1.8.1.  Appreciate that this is still in 
experimental 
but at some point in time this will break.  This is due to the fact that TRaX 
is now
part of the JDK so the optional tasks in Ant have moved from ant-trax.jar to 
ant-nodeps.jar.

*** /tmp/tmpGZcxmT
In Ubuntu, we've applied the attached patch to achieve the following:

  * debian/rules: updated to use ant-nodeps to fix FTBFS (LP: #674382)

We thought you might be interested in doing the same. 


-- System Information:
Debian Release: squeeze/sid
  APT prefers maverick-updates
  APT policy: (500, 'maverick-updates'), (500, 'maverick-security'), (500, 
'maverick')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.35-23-generic (SMP w/8 CPU cores)
Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
=== modified file 'debian/rules'
--- debian/rules2010-04-25 09:42:04 +
+++ debian/rules2010-11-12 08:05:44 +
@@ -11,7 +11,7 @@
JAVA_HOME := /usr/lib/jvm/java-6-openjdk
 endif
 
-DEB_JARS   := ant ant-launcher ant-junit ant-trax com-sun-javadoc
+DEB_JARS   := ant ant-launcher ant-junit ant-trax ant-nodeps 
com-sun-javadoc
 
 DEB_CLASSPATH = $(shell for jar in $(DEB_JARS:%=/usr/share/java/%.jar); do \
echo -n $${jar}:; done; \