Bug#689727: unblock: gcc-4.7-doc/4.7.2-1
Control: tag -1 - moreinfo Hi, On 10/26/2012 02:23 AM, Adam D. Barratt wrote: On Fri, 2012-10-05 at 23:55 +0800, Guo Yixuan wrote: Please unblock package gcc-4.7-doc I guess you know already, but 4.7.2-2 got rejected by dak because, similarly to the no NEW packages from DMs rule, you can't upload a package which builds a binary that's already built from another source package - i.e. gcc-doc-base. The initial upload adding that binary package will need to be sponsored. Regards, Adam Finally I uploaded gcc-4.4-doc-non-dfsg to remove gcc-doc-base, then uploaded gcc-4.7-doc. (diff attached) unblock gcc-4.7-doc/4.7.2-2 Regards, GUO Yixuan 4.7.2-1-and-4.7.2-2.diff.gz Description: GNU Zip compressed data
Processed: Re: Bug#689727: unblock: gcc-4.7-doc/4.7.2-1
Processing control commands: tag -1 - moreinfo Bug #689727 [release.debian.org] unblock: gcc-4.7-doc/4.7.2-2 Removed tag(s) moreinfo. -- 689727: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689727 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.b689727.13515783773.transcr...@bugs.debian.org
Re: Pre-upload approval for Rhythmbox-ampache RC #646642
On Mon, Oct 15, 2012 at 5:34 AM, Charlie Smotherman cj...@cableone.net wrote: Dear Release Team, With regard to bug #646642, the current state of the rhythmbox-ampache plugin is unusable. With the major changes to the rhythmbox API the rhythmbox-ampache plugin had to almost be totally rewritten. I have attached a debdiff of the changes. Would these changes be appropriate for inclusion into wheezy, or would it be more appropriate to remove rhythmbox-ampache from testing and upload the new version post-release? http://mentors.debian.net/debian/pool/main/r/rhythmbox-ampache/rhythmbox-ampache_0.11.1+svn34-1.dsc Dear Release Team, Has there been any movement on this? Best Regards Charlie Smotherman -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAL_XWdB8tXxFLNXAkG-1YWd=a2qrskhq3bw6hatb0ti5t6d...@mail.gmail.com
Re: Bug#669213: bind9: new upstream release: 9.9
On Mon, Oct 29, 2012 at 9:30 PM, LaMont Jones lam...@mmjgroup.com wrote: On Mon, Oct 29, 2012 at 05:22:10PM +, Adam D. Barratt wrote: Indeed. In any case, were the new version to be accepted in to the release then the appropriate route would be via unstable, not direct to t-p-u. Works for me. I'll toss 9.8.4 into sid. As for getting it into wheezy, it'll make the support life easier for the inevitable security fixes that will follow. There are probably other reasons. I can do a manual code review for debian-release team if they are interested. I concur with LaMont that we need latest 9.8.x branch to keep the sanity of the maintainer. Ondrej -- Ondřej Surý ond...@sury.org -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CALjhHG8gX7yfSYmK=8x+27hynhyvi-jmgz_on1ks_h9vox0...@mail.gmail.com
Re: Bug#669213: bind9: new upstream release: 9.9
* LaMont Jones lam...@mmjgroup.com [2012-10-29 21:38]: On Mon, Oct 29, 2012 at 05:22:10PM +, Adam D. Barratt wrote: Indeed. In any case, were the new version to be accepted in to the release then the appropriate route would be via unstable, not direct to t-p-u. Works for me. I'll toss 9.8.4 into sid. As for getting it into wheezy, it'll make the support life easier for the inevitable security fixes that will follow. There are probably other reasons. Hi, if the route goes via unstable, could we perhaps immediately go to 9.9.2? 9.9 has the most useful new features regarding DNSSEC. Regards Sebastian -- GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A 9D82 58A2 D94A 93A0 B9CE) 'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE. -- Terry Pratchett, The Fifth Elephant -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20121030085025.ga32...@danton.fire-world.de
Re: Pre-upload approval for Rhythmbox-ampache RC #646642
On 30.10.2012 08:51, Charlie Smotherman wrote: On Mon, Oct 15, 2012 at 5:34 AM, Charlie Smotherman cj...@cableone.net wrote: Dear Release Team, With regard to bug #646642, the current state of the rhythmbox-ampache plugin is unusable. With the major changes to the rhythmbox API the rhythmbox-ampache plugin had to almost be totally rewritten. I have attached a debdiff of the changes. Would these changes be appropriate for inclusion into wheezy, or would it be more appropriate to remove rhythmbox-ampache from testing and upload the new version post-release? http://mentors.debian.net/debian/pool/main/r/rhythmbox-ampache/rhythmbox-ampache_0.11.1+svn34-1.dsc Dear Release Team, Has there been any movement on this? That's unlikely, given that there's no sign of the mail you quote above ever having reached debian-release@ (it's not in the web archive either afaict). You mentioned that you attached a debdiff. The most common issue in these cases is that the mail ends up being over lists.d.o's size limits, which means it's not posted to the list; it's also often a sign that the debdiff is too big. :) Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/57ba48bd1a432145cc2252a347853...@mail.adsl.funky-badger.org
Re: Bug#669213: bind9: new upstream release: 9.9
* Ondřej Surý ond...@sury.org [2012-10-30 10:13]: I can do a manual code review for debian-release team if they are interested. I concur with LaMont that we need latest 9.8.x branch to keep the sanity of the maintainer. That is no problem for me but could we please get a 9.9 debian source package somewhere if there is one ready (or almost ready)? Because I would really like to switch to 9.9 as soon as possible. Regards Sebastian -- GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A 9D82 58A2 D94A 93A0 B9CE) 'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE. -- Terry Pratchett, The Fifth Elephant -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20121030093051.ga32...@danton.fire-world.de
Re: Bug#592539: (isc-dhcp-server: supply additional initscript for IPv6 daemon): Yet another idea how to solve this issue
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Andrew, On 10/28/2012 07:54 AM, Philipp Kern wrote: On Fri, Oct 26, 2012 at 01:11:41PM +0200, Jan Wagner wrote: Could you please state, if you would accept such fix via t-p-u, if this was also fixed in unstable. iff this fix has spent a while in unstable and was confirmed not to have some unpleasant side effects that affect IPv4 usage. There's no way this will be accepted just into t-p-u without unstable being fixed. do you think you could provide a debdiff with the changes? As stated also by Philipp, the fix needs to be uploaded to unstable first. After there are no problems, RM seems willing to accept the fix (depending on how invasive it is). Many thanks, Jan. - -- Never write mail to w...@spamfalle.info, you have been warned! - -BEGIN GEEK CODE BLOCK- Version: 3.12 GIT d-- s+: a C+++ UL P+ L+++ E--- W+++ N+++ o++ K++ w--- O M V- PS PE Y++ PGP++ t-- 5 X R tv- b+ DI D+ G++ e++ h r+++ y - --END GEEK CODE BLOCK-- -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) iD8DBQFQj6ua9u6Dud+QFyQRApuSAKCJZP4zxZrni0JjVI64XhE0Uh2/ngCgxUjE fht+RPMH5W8LWGW+b464PUc= =rAf7 -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/508fab9b.4040...@debian.org
Bug#691698: marked as done (unblock: dkimpy/0.5.2-1)
Your message dated Tue, 30 Oct 2012 12:16:08 +0100 with message-id 508fb6f8.4080...@thykier.net and subject line Re: Bug#691698: unblock: dkimpy/0.5.2-1 has caused the Debian Bug report #691698, regarding unblock: dkimpy/0.5.2-1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 691698: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691698 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package dkimpy This upload fixes two grave upstream issues (one of which has securtyy implicaitions). unblock dkimpy/0.5.2-1 diff -Nru dkimpy-0.5.2/ChangeLog dkimpy-0.5.3/ChangeLog --- dkimpy-0.5.2/ChangeLog 2012-06-13 06:27:37.0 +0200 +++ dkimpy-0.5.3/ChangeLog 2012-07-21 07:41:31.0 +0200 @@ -1,4 +1,8 @@ -2012-06-13 Verion 0.5.2 +UNRELEASED Version 0.5.3 +- Make key parsing error messages more specific to help troubleshooting + (Based on user feedback) + +2012-06-13 Version 0.5.2 - Change canonicalization defaults to work around issues with different verification implementations https://launchpad.net/bugs/939128 - Fully fold DKIM-Signature on sign, and ignore FWS in b= value on verify diff -Nru dkimpy-0.5.2/debian/changelog dkimpy-0.5.3/debian/changelog --- dkimpy-0.5.2/debian/changelog 2012-10-28 10:48:11.0 +0100 +++ dkimpy-0.5.3/debian/changelog 2012-10-28 10:48:12.0 +0100 @@ -1,3 +1,15 @@ +dkimpy (0.5.3-1) unstable; urgency=medium + + * Urgency medium for multiple RC bug fixes + * New upstream release: + * Fix header unfolding and body hash calculation errors that cause +correct DKIM signatures to fail to verify in many cases +(Closes: #691663) + * Add minimum key length requirement to prevent validation of signatures +generated with insecure keys (Closes: #691662) + + -- Scott Kitterman sc...@kitterman.com Sun, 28 Oct 2012 10:32:13 +0100 + dkimpy (0.5.2-1) unstable; urgency=low * New upstream release Binary files /tmp/vhfFWHbNtB/dkimpy-0.5.2/dkim/.asn1.py.swp and /tmp/4HMA0c1mG7/dkimpy-0.5.3/dkim/.asn1.py.swp differ diff -Nru dkimpy-0.5.2/dkim/crypto.py dkimpy-0.5.3/dkim/crypto.py --- dkimpy-0.5.2/dkim/crypto.py 2012-06-13 06:21:56.0 +0200 +++ dkimpy-0.5.3/dkim/crypto.py 2012-07-21 07:39:51.0 +0200 @@ -112,7 +112,7 @@ x = asn1_parse(ASN1_Object, data) pkd = asn1_parse(ASN1_RSAPublicKey, x[0][1][1:]) except ASN1FormatError as e: -raise UnparsableKeyError(str(e)) +raise UnparsableKeyError('Unparsable public key: ' + str(e)) pk = { 'modulus': pkd[0][0], 'publicExponent': pkd[0][1], @@ -129,7 +129,7 @@ try: pka = asn1_parse(ASN1_RSAPrivateKey, data) except ASN1FormatError as e: -raise UnparsableKeyError(str(e)) +raise UnparsableKeyError('Unparsable private key: ' + str(e)) pk = { 'version': pka[0][0], 'modulus': pka[0][1], diff -Nru dkimpy-0.5.2/dkim/__init__.py dkimpy-0.5.3/dkim/__init__.py --- dkimpy-0.5.2/dkim/__init__.py 2012-06-13 06:21:56.0 +0200 +++ dkimpy-0.5.3/dkim/__init__.py 2012-10-27 18:17:59.0 +0200 @@ -65,6 +65,10 @@ Relaxed = b'relaxed'# for clients passing dkim.Relaxed Simple = b'simple' # for clients passing dkim.Simple +def bitsize(x): +Return size of long in bits. +return len(bin(x)) - 2 + class DKIMException(Exception): Base class for DKIM errors. pass @@ -114,8 +118,8 @@ lastindex[h] = i return sign_headers -FWS = r'(?:\r\n\s+)?' -RE_BTAG = re.compile(r'([; ]b'+FWS+r'=)(?:'+FWS+r'[a-zA-Z0-9+/=])*(?:\r\n\Z)?') +FWS = r'(?:\r?\n\s+)?' +RE_BTAG = re.compile(r'([;\s]b'+FWS+r'=)(?:'+FWS+r'[a-zA-Z0-9+/=])*(?:\r?\n\Z)?') def hash_headers(hasher, canonicalize_headers, headers, include_headers, sigheader, sig): @@ -284,7 +288,8 @@ #: (with either \\n or \\r\\n line endings) #: @param logger: a logger to which debug info will be written (default None) #: @param signature_algorithm: the signing algorithm to use when signing - def __init__(self,message=None,logger=None,signature_algorithm=b'rsa-sha256'): + def __init__(self,message=None,logger=None,signature_algorithm=b'rsa-sha256', +minkey=1024): self.set_message(message) if logger is None: logger = get_default_logger() @@ -302,6 +307,9 @@ self.should_not_sign = set(DKIM.SHOULD_NOT) #: Header fields to sign an extra time to prevent additions. self.frozen_sign =
Bug#691395: unblock: opendkim/2.6.8-2
Control: tags -1 confirmed JFTR, Scott and I had a look at this today (at UDS). I asked him to upload it to unstable and ping us once it has been in sid for a couple of days. ~Niels -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/508fb8fa.3060...@thykier.net
Processed: Re: unblock: opendkim/2.6.8-2
Processing control commands: tags -1 confirmed Bug #691395 [release.debian.org] unblock: opendkim/2.6.8-2 Added tag(s) confirmed. -- 691395: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691395 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.b691395.135159634519453.transcr...@bugs.debian.org
Bug#690660: unblock: ifupdown/0.7.3
On Fri, Oct 19, 2012 at 10:44:19AM +0200, Andrew Shadura wrote: Hello, Anything on the bug? May we upload the package? The other change here looks like a reasonable, contained bugfix suitable for release. Yes, please upload. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. Ubuntu Developerhttp://www.debian.org/ slanga...@ubuntu.com vor...@debian.org -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20121030133236.gb30...@virgil.dodds.net
Re: Candidates for removal from testing (results)
On 2012-10-28 18:47, Stefano Zacchiroli wrote: On Fri, Oct 26, 2012 at 12:37:38PM +0200, Niels Thykier wrote: ax25-apps, fabric, firmware-crystalhd, icewm-themes, ilisp, inguma, lustre, mingw-ocaml, noflushd, openvas-plugins-dfsg, php-crypt-gpg, phpgacl, python-django-piston, smbind, sorl-thumbnail, spatialite-gui, sugar-chat-activity-0.86, sugar-log-activity-0.86, sugar-moon-activity, twidge, venkman The removed packages accounted for about 4.4% of all RC bugs left in testing[0]. Thanks a lot, Neil! Is that something that you plan to automate further (at least the warning mails, I understand you probably want to further inspect the individual removals), and/or run on a fixed cadence? I have just send another round (only 13-14 packages this time). I hope I can keep it at once per week for the rest of the freeze (or till we run out of RC buggy leaf packages). Though I am not sure whether to keep the rate this high outside freeze. Maybe keep the rate with higher deadline or slow down to (e.g.) bi-weekly mails... Anyway, we can look at that once development of Jessie starts. :) ~Niels -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/508fda1c.3090...@thykier.net
Re: Pre-upload approval for Rhythmbox-ampache RC #646642
On Tue, Oct 30, 2012 at 5:48 AM, Adam D. Barratt a...@adam-barratt.org.uk wrote: On 30.10.2012 10:13, Charlie Smotherman wrote: On Tue, Oct 30, 2012 at 4:27 AM, Adam D. Barratt a...@adam-barratt.org.uk wrote: That's unlikely, given that there's no sign of the mail you quote above ever having reached debian-release@ (it's not in the web archive either afaict). You mentioned that you attached a debdiff. The most common issue in these cases is that the mail ends up being over lists.d.o's size limits, which means it's not posted to the list; it's also often a sign that the debdiff is too big. :) Regards, Adam There is a debdiff attached to #646642. So how should we proceed? Keeping the discussion on-list would be a good start. :-p Whoops, sorry I just hit the reply button :) You could gzip the debdiff, which would probably get it under the list server limit. On the whole, opening bugs rather than just mailing debian-release is also useful. FWIW I am not a DD so RB-ampache has not been uploaded to unstable yet, so IMHO an unblock bug is not appropriate as described in Rule #7 at [1], hence that is why I am sending mails instead of a unblock bug. I am trying to follow Rule #2. The RB-ampache plugin has been almost totally rewritten so the changes are very intrusive. I was just wondering if the release team considers these intrusive changes appropriate or not. If not I was going to file a removal request, if yes then I will go through the process of finding a DD to upload it and then file an unblock bug Attached is the zipped debdiff, hopefully it will make it through this time. [1] http://release.debian.org/wheezy/freeze_policy.html Best regards -- Charlie Smotherman RB-ampache_debdiff.txt.tar.gz Description: GNU Zip compressed data
Bug#691871: unblock: dancer-ircd/1.0.36-8.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package dancer-ircd The upload in unstable fix the bug #689886 by creating /var/run/dancer-ircd at runtime instead of shipping the folder in the package. Debdiff attached unblock dancer-ircd/1.0.36-8.1 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'stable-updates'), (500, 'testing'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff -u dancer-ircd-1.0.36/debian/init.d dancer-ircd-1.0.36/debian/init.d --- dancer-ircd-1.0.36/debian/init.d +++ dancer-ircd-1.0.36/debian/init.d @@ -16,31 +16,38 @@ DAEMON=/usr/sbin/dancer-ircd NAME=dancer-ircd DESC=dancer-ircd +USER=dancer +RUNDIR=/var/run/dancer-ircd test -f $DAEMON || exit 0 set -e +if [ ! -d ${RUNDIR} ] ; then + mkdir -m 0755 ${RUNDIR} + chown ${USER}:${USER} ${RUNDIR} +fi + case $1 in start) echo -n Starting $DESC: - start-stop-daemon --start --quiet --chuid dancer \ - --pidfile /var/run/dancer-ircd/$NAME.pid \ + start-stop-daemon --start --quiet --chuid ${USER} \ + --pidfile ${RUNDIR}/$NAME.pid \ --exec $DAEMON -- -d / echo $NAME. ;; stop) echo -n Stopping $DESC: start-stop-daemon --stop --quiet --oknodo \ - --pidfile /var/run/dancer-ircd/$NAME.pid \ + --pidfile ${RUNDIR}/$NAME.pid \ --exec $DAEMON - rm -f /var/run/dancer-ircd/$NAME.pid + rm -f ${RUNDIR}/$NAME.pid echo $NAME. ;; reload|force-reload) echo Reloading $DESC configuration files. start-stop-daemon --stop --quiet --signal 1 --oknodo \ - --pidfile /var/run/dancer-ircd/$NAME.pid \ + --pidfile ${RUNDIR}/$NAME.pid \ --exec $DAEMON ;; restart) diff -u dancer-ircd-1.0.36/debian/dancer-ircd.dirs dancer-ircd-1.0.36/debian/dancer-ircd.dirs --- dancer-ircd-1.0.36/debian/dancer-ircd.dirs +++ dancer-ircd-1.0.36/debian/dancer-ircd.dirs @@ -7 +6,0 @@ -var/run/dancer-ircd diff -u dancer-ircd-1.0.36/debian/dancer-ircd.postinst dancer-ircd-1.0.36/debian/dancer-ircd.postinst --- dancer-ircd-1.0.36/debian/dancer-ircd.postinst +++ dancer-ircd-1.0.36/debian/dancer-ircd.postinst @@ -21,7 +21,6 @@ # limitation. Someday it will be fixed chown $USER:$USER /var/log/dancer-ircd - chown $USER:$USER /var/run/dancer-ircd chown $USER:$USER /var/lib/dancer-ircd chown $USER:$USER /var/lib/dancer-ircd/dline.conf chown $USER:$USER /var/lib/dancer-ircd/kline.conf diff -u dancer-ircd-1.0.36/debian/changelog dancer-ircd-1.0.36/debian/changelog --- dancer-ircd-1.0.36/debian/changelog +++ dancer-ircd-1.0.36/debian/changelog @@ -1,3 +1,11 @@ +dancer-ircd (1.0.36-8.1) unstable; urgency=low + + * Non-maintainer upload. + * Create /var/run/dancer-ircd at runtime (Closes: #689886, thanks to Thomas +Goirand). + + -- Thomas Preud'homme robo...@debian.org Tue, 30 Oct 2012 15:12:29 +0100 + dancer-ircd (1.0.36-8) unstable; urgency=medium * Bump Standards-Version to 3.7.3.
Bug#691872: tpu: package fgfs-base/2.4.0-1+deb7u1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: tpu Control: tags 689785 patch Dear release team, In order to fix an RC-bug (#689785) in fgfs-base, would you consider the following trivial upload (patch attached) via tpu (a new upstream version is already in Sid). Thanks in advance, regards. David -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (100, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.5-trunk-amd64 (SMP w/1 CPU core) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff -Nru fgfs-base-2.4.0/debian/changelog fgfs-base-2.4.0/debian/changelog --- fgfs-base-2.4.0/debian/changelog 2011-09-03 15:26:42.0 -0400 +++ fgfs-base-2.4.0/debian/changelog 2012-10-30 10:06:12.0 -0400 @@ -1,3 +1,11 @@ +fgfs-base (2.4.0-1+deb7u1) wheezy; urgency=low + + * Non-maintainer upload. + * debian/control: Breaks: fgfs-atlas (= 0.3.1-2+b999) for fgfs-atlas. +Closes: #689785. + + -- David Prévot taf...@debian.org Tue, 30 Oct 2012 10:04:10 -0400 + fgfs-base (2.4.0-1) unstable; urgency=low * New upstream release. diff -Nru fgfs-base-2.4.0/debian/control fgfs-base-2.4.0/debian/control --- fgfs-base-2.4.0/debian/control 2011-08-21 17:52:42.0 -0400 +++ fgfs-base-2.4.0/debian/control 2012-10-30 10:03:24.0 -0400 @@ -12,7 +12,7 @@ Package: fgfs-base Architecture: all Depends: tzdata -Breaks: flightgear ( 2.4.0) +Breaks: flightgear ( 2.4.0), fgfs-atlas (= 0.3.1-2+b999) Description: Flight Gear Flight Simulator -- base files Flight Gear is a free and highly sophisticated flight simulator. .
Bug#691872: tpu: package fgfs-base/2.4.0-1+deb7u1
On 2012-10-30 16:07, David Prévot wrote: Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: tpu Control: tags 689785 patch Dear release team, Hi, In order to fix an RC-bug (#689785) in fgfs-base, would you consider the following trivial upload (patch attached) via tpu (a new upstream version is already in Sid). Yes, but please fix the sid version before doing the tpu. Thanks in advance, regards. David [...] ~Niels -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/508fee5d.7090...@thykier.net
Bug#690196: Bug #690196: unblock: udj-desktop-client/0.6.1-1
Could we possibly get a decision on this one way or the other? I would love to get this issue resolved. Also, there was a bit of confusion between me and my sponsor. Currently, the version of udj-desktop-client in testing is the same as in unstable. Experimental contains the version that I would like to end up in testing (which is a new upstream release, 0.6.1-1~exp1). Per Rule #4 on [1], would it be allowed for the version in experimental to get pushed to unstable? Or would it be best to wait for an RT decision on this bug first? Thanks, Nathan Handler (nhandler) [1] http://release.debian.org/wheezy/freeze_policy.html signature.asc Description: Digital signature
Re: Bug#592539: (isc-dhcp-server: supply additional initscript for IPv6 daemon): Yet another idea how to solve this issue
On Tue, Oct 30, 2012 at 11:27:39AM +0100, Jan Wagner wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Andrew, On 10/28/2012 07:54 AM, Philipp Kern wrote: On Fri, Oct 26, 2012 at 01:11:41PM +0200, Jan Wagner wrote: Could you please state, if you would accept such fix via t-p-u, if this was also fixed in unstable. iff this fix has spent a while in unstable and was confirmed not to have some unpleasant side effects that affect IPv4 usage. There's no way this will be accepted just into t-p-u without unstable being fixed. do you think you could provide a debdiff with the changes? As stated also by Philipp, the fix needs to be uploaded to unstable first. After there are no problems, RM seems willing to accept the fix (depending on how invasive it is). I shall endeavour to work on this next Tuesday with a view to producing a debdiff then. I feel there's slightly more to it than just shipping an init script, the package should also attempt to ship a DHCPv6 configuration file, but I'll look into all of this at that time. signature.asc Description: Digital signature
Bug#691877: unblock: libbusiness-onlinepayment-ippay-perl/0.06-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Please unblock package libbusiness-onlinepayment-ippay-perl 0.06-2 This adds a backported patch to fix #691723. The patch changes the IPPay gateway's server name and path. (Note that the changes in the tests are not strictly necessary since they are skipped on Debian but I decided to keep them, in case someone wants to run them themselves.) Debdiff attached. unblock libbusiness-onlinepayment-ippay-perl/0.06-2 (Request concerning s-p-u following shortly.) Thanks in advance, gregor -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJQkAnXAAoJELs6aAGGSaoGsRMP/RKZVDFHOEV6Tv9YfRVwWE26 9JrU3CvLZw/RkE3obVIzwau4IuzsEUFZ03gYbld2Pik07VR9np6+NxBLyMrTxCWn VveTeNPUQxLmFQ8Cq6Ry0Cs23acspCJiiCNj97BK7xRy8f8tZAYVpCnhojk56bSA GLPIe1F84d/lmw9muTBw6j3BWD6SzJjBCK40DidOUqeGeZQ4shdnwzRoh7jKA5eX QE62aFebK9p9ollTdAedo4kj8W/i53p1oASDZCws7g8ZkENhD+KbYsryL8Bb1+EV wkNr2hs3EIhGMTuduuyzYKn+9EsWiBD0fc6wso6i76oMmtNJs8rdkudrUR2NS7kM te8G9RbedB600UePCOgjmrS6aQvldPB6Kn/IMgeiua2Q70XlZAhp63WPSA2g3U2K 7yQhTkG1UCpbq2yYANqvybUHZIdiDtgIKohcVbH2K+1mCdZfssyhsSkRpGfaWxAh dGj3eQ3gzJOyFSewU2FVvkW/WAZtRpmEE/ngg3WoY9lwlPnlDwG7EAPc949lLPh0 OvBGcAxNyVGNcQRvm+lxRvWhw5VB4R7eV6iWXaxGjE6RiTtqsNupZj0iM7W+/lgh AUxieSFPBhGVQJmNsO3P74zxj6C/3fBBgxbSZVWINowdrB9y0KiW+lIlIot7suIS TxldUpldj1cyAs1461jZ =p5ic -END PGP SIGNATURE- diff --git a/debian/changelog b/debian/changelog index 625531c..1bd6ae3 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,11 @@ +libbusiness-onlinepayment-ippay-perl (0.06-2) unstable; urgency=low + + * Team upload. + * New patch gateway.patch: change IPPay gateway server/path. Thanks to +Ivan Kohler for backporting the patch. (Closes: #691723) + + -- gregor herrmann gre...@debian.org Tue, 30 Oct 2012 17:59:17 +0100 + libbusiness-onlinepayment-ippay-perl (0.06-1) unstable; urgency=low [ Nicholas Bamber ] diff --git a/debian/patches/gateway.patch b/debian/patches/gateway.patch new file mode 100644 index 000..c47bd71 --- /dev/null +++ b/debian/patches/gateway.patch @@ -0,0 +1,89 @@ +Description: IPPay changed the gateway's server name and path, and will soon + turn off the old gateway +Origin: https://www.freeside.biz/gitweb/?p=Business-OnlinePayment-IPPay.git;a=commitdiff;h=1f19e67636476c7119cfb41920c5b176e617c697 +Bug-Debian: #691723 +Author: Ivan Kohler ivan-deb...@420.am +Reviewed-by: gregor herrmann gre...@debian.org +Last-Update: 2012-10-30 +Applied-Upstream: yes, 0.07 + +--- a/IPPay.pm b/IPPay.pm +@@ -45,9 +45,9 @@ + my %opts = @_; + + # standard B::OP methods/data +-$self-server('gateway17.jetpay.com') unless $self-server; ++$self-server('gtwy.ippay.com') unless $self-server; + $self-port('443') unless $self-port; +-$self-path('/jetpay') unless $self-path; ++$self-path('/ippay') unless $self-path; + + $self-build_subs(qw( order_number avs_code cvv2_response + response_page response_code response_headers +@@ -209,6 +209,9 @@ + foreach ( keys ( %{($self-{_defaults})} ) ) { + $content{$_} = $self-{_defaults}-{$_} unless exists($content{$_}); + } ++ if ($self-test_transaction()) { ++$content{'login'} = 'TESTTERMINAL'; ++ } + $self-content(%content); + + $self-required_fields(@required_fields); +@@ -221,12 +224,6 @@ + } + } + +- if ($self-test_transaction()) { +-$self-server('test1.jetpay.com'); +-$self-port('443'); +-$self-path('/jetpay'); +- } +- + my $transaction_id = $content{'order_number'}; + unless ($transaction_id) { + my ($page, $server_response, %headers) = $self-https_get('dummy' = 1); +@@ -391,7 +388,7 @@ + if ( exists($response-{ActionCode}) !exists($response-{ErrMsg})) { + $self-error_message($response-{ResponseText}); + }else{ +- $self-error_message($response-{Errmsg}); ++ $self-error_message($response-{ErrMsg}); + } + # }else{ + #$self-error_message(Server Failed); +@@ -588,6 +585,9 @@ + + =head1 COMPATIBILITY + ++Debian version 0.06-2 (upstream version 0.07) changes the server name and path ++for IPPay's late 2012 update. ++ + Business::OnlinePayment::IPPay uses IPPay XML Product Specifications version + 1.1.2. + +--- a/t/card.t b/t/card.t +@@ -61,8 +61,8 @@ + $tx, + desc = invalid card_number, + is_success= 0, +-result_code = '912', +-error_message = 'INVALID CARD NUMBER', ++result_code = '900', #'912' with old jetpay gw ++error_message = 'Invalid card number. ', #'INVALID CARD NUMBER' w/old gw + authorization = qr/^$/, + avs_code = '', # so rather pointless :\ + cvv2_response = '', # ... +--- a/t/lib/test_account.pl b/t/lib/test_account.pl +@@ -12,7 +12,7 @@ + sub test_account { + my $suffix = shift || 'card'; + +-my($login, $password) =
Bug#691881: unblock: icedove/10.0.10-1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock icedove 10.0.10-1. It fixes multiple security issues. unblock icedove/10.0.10-1 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20121030172057.5049.7060.reportbug@pisco.westfalen.local
Bug#691882: unblock: python-django/1.4.2-1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hi, please unblock python-django 1.4.2-1. It fixes CVE-2012-4520 Cheers, Moritz unblock python-django/1.4.2-1 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20121030172142.5945.99965.reportbug@pisco.westfalen.local
Bug#691872: tpu: package fgfs-base/2.4.0-1+deb7u1
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, Le 30/10/2012 11:12, Niels Thykier a écrit : On 2012-10-30 16:07, David Prévot wrote: In order to fix an RC-bug (#689785) in fgfs-base, would you consider the following trivial upload (patch attached) via tpu Yes, but please fix the sid version before doing the tpu. Thanks! Fixed Sid version uploaded to DELAYED/2, and tpu to DELAYED/12 (to mimic the “10 days in unstable”-rule). Will ping you back in about two weeks if everything goes smoothly. Regards David -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJQkBkrAAoJELgqIXr9/gny1bMP/jDb/GxLf7tXqCcVUnFFLmxm a3Dy6SPtRwHRYL0+g3/h+eBV7Cgx28gzXKh7SvrY8w0EwDCx5ZAj29s4tEiiVHMf qChazRUKCVv2aDQgEbOtl8FVhvHO5Cp0xYiFFgEcWlO5+K3F4uwv+M9A9P/MkY86 eVh+L5ORlMfTpE+fPXzgjNRHcjJSnypsNQTcaan3rMZIVM8bXcoZDG2/h6H4xRms hsvQBhFyWMh6D9G4PUFYLaK+1SDqMVN2fCKM+7IBu4X+a4RParh35bLM5Ihe163o wYUFXuBNYqDQDYyBvYlNY/dopxGYJ9QlSedpDiM38Oqop9c7XOj/SmZc7R4OyHxl pFQb5v9s7t2grS/hHhv4StwYVPIBaH0X1ucT61Rb0CnJqDa9HZ4D8ReRZhmWjZi7 vVDfYXSYcEtA0cfUljE+4hkgbwNFgvmfXgBDVI66suT5nUS9gaFDIesufFZtT+hH 4KEDrAvtH6m6oNFoHz6WEcQV0cvXkEs8nDddAmg9Zblosy1yESwbQQz2rzmCiSFo RZIVBFwMTEoLSDpk83QatKPTfDFboFJSW24ud7BZjHBWw0KWFbHmnZW5ep0V2H9t Wk4ae34J966e2+i4vfAu49S/wmPtrCTbrjqDlsINexDXaxFLgk9e4WEjcsw2A68X alt5f/nI+jBZWCIB79AD =fb95 -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/5090192c.5020...@debian.org
NEW changes in stable-new
Processing changes file: apt-show-versions_0.19~squeeze1_amd64.changes REJECT -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e1ttgbc-0001ev...@franck.debian.org
Bug#691888: release.debian.org: unblock: librdmacm-1.0.15-1+deb7u1
Subject: unblock: librdmacm/1.0.15-1+deb7u1 Package: release.debian.org User: release.debian@packages.debian.org Usertags: unblock Severity: normal Please unblock package librdmacm The attached debdiff includes the fix for CVE-2012-4516. unblock librdmacm/1.0.15-1+deb7u1 librdmacm_1.0.15-1+deb7u1.debdiff Description: Binary data
Re: Bug#669213: bind9: new upstream release: 9.9
On Tue, Oct 30, 2012 at 5:30 AM, Sebastian Wiesinger wrote: * Ondřej Surý ond...@sury.org [2012-10-30 10:13]: I can do a manual code review for debian-release team if they are interested. I concur with LaMont that we need latest 9.8.x branch to keep the sanity of the maintainer. That is no problem for me but could we please get a 9.9 debian source package somewhere if there is one ready (or almost ready)? Because I would really like to switch to 9.9 as soon as possible. That isn't really relevant to this discussion. Note that you (or anyone else) can prepare a 9.9 package and have a dialog with the maintainer about preparing it for upload to experimental. Best wishes, Mike -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CANTw=MMH6sQjYTk7-7_X=VABnsT6XFtJ-ciQM=jg7vhcqu3...@mail.gmail.com
Processed: Re: Bug#691888: release.debian.org: unblock: librdmacm-1.0.15-1+deb7u1
Processing control commands: tags -1 + confirmed Bug #691888 [release.debian.org] release.debian.org: unblock: librdmacm-1.0.15-1+deb7u1 Added tag(s) confirmed. -- 691888: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691888 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.b691888.13516247292394.transcr...@bugs.debian.org
Bug#691888: release.debian.org: unblock: librdmacm-1.0.15-1+deb7u1
Control: tags -1 + confirmed On Tue, 2012-10-30 at 11:50 -0700, Roland Dreier wrote: Please unblock package librdmacm For the record, the package hasn't been uploaded yet. The attached debdiff includes the fix for CVE-2012-4516. diff -Nru librdmacm-1.0.15/debian/.pc/.quilt_patches librdmacm-1.0.15/debian/.pc/.quilt_patches [...] diff -Nru librdmacm-1.0.15/debian/.pc/.quilt_series librdmacm-1.0.15/debian/.pc/.quilt_series [...] diff -Nru librdmacm-1.0.15/debian/.pc/.version librdmacm-1.0.15/debian/.pc/.version I'm assuming those are simply the result of the way you produced the diff, as .pc shouldn't be in the source package. Other than that, it looks fine; thanks. Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/1351624634.16094.6.ca...@jacala.jungle.funky-badger.org
Bug#691882: unblock: python-django/1.4.2-1
On Tue, 30 Oct 2012, Moritz Muehlenhoff wrote: please unblock python-django 1.4.2-1. It fixes CVE-2012-4520 Thanks Moritz for the request. I was indeed hoping for it to be auto-unblocked due do the associated RC bug. It's a new upstream release but a stable maintenance release that we definitely want in wheezy. IMO the upstream maintenance rules are sane enough (and there's a big test suite) that we should be able to handle such updates much like PostgreSQL even after the release. Cheers, -- Raphaël Hertzog ◈ Debian Developer Get the Debian Administrator's Handbook: → http://debian-handbook.info/get/ -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20121030193004.gb10...@x230-buxy.home.ouaza.com
Bug#691882: marked as done (unblock: python-django/1.4.2-1)
Your message dated Tue, 30 Oct 2012 19:28:28 + with message-id 1351625308.16094.10.ca...@jacala.jungle.funky-badger.org and subject line Re: Bug#691882: unblock: python-django/1.4.2-1 has caused the Debian Bug report #691882, regarding unblock: python-django/1.4.2-1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 691882: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691882 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hi, please unblock python-django 1.4.2-1. It fixes CVE-2012-4520 Cheers, Moritz unblock python-django/1.4.2-1 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash ---End Message--- ---BeginMessage--- On Tue, 2012-10-30 at 18:21 +0100, Moritz Muehlenhoff wrote: please unblock python-django 1.4.2-1. It fixes CVE-2012-4520 It would be nicer if it could have avoided dragging a Python3 compat class in at the same time; ah well. +if set(';/?@=+$,').intersection(host): +raise SuspiciousOperation('Invalid HTTP_HOST header: %s' % host) I do wonder if that shouldn't be a whitelist instead. Unblocked. Regards, Adam---End Message---
Bug#691881: marked as done (unblock: icedove/10.0.10-1)
Your message dated Tue, 30 Oct 2012 19:31:49 + with message-id 1351625509.16094.11.ca...@jacala.jungle.funky-badger.org and subject line Re: Bug#691881: unblock: icedove/10.0.10-1 has caused the Debian Bug report #691881, regarding unblock: icedove/10.0.10-1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 691881: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691881 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock icedove 10.0.10-1. It fixes multiple security issues. unblock icedove/10.0.10-1 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash ---End Message--- ---BeginMessage--- On Tue, 2012-10-30 at 18:20 +0100, Moritz Muehlenhoff wrote: Please unblock icedove 10.0.10-1. It fixes multiple security issues. Unblocked. Regards, Adam---End Message---
Bug#691877: marked as done (unblock: libbusiness-onlinepayment-ippay-perl/0.06-2)
Your message dated Tue, 30 Oct 2012 19:33:35 + with message-id 1351625615.16094.12.ca...@jacala.jungle.funky-badger.org and subject line Re: Bug#691877: unblock: libbusiness-onlinepayment-ippay-perl/0.06-2 has caused the Debian Bug report #691877, regarding unblock: libbusiness-onlinepayment-ippay-perl/0.06-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 691877: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691877 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Please unblock package libbusiness-onlinepayment-ippay-perl 0.06-2 This adds a backported patch to fix #691723. The patch changes the IPPay gateway's server name and path. (Note that the changes in the tests are not strictly necessary since they are skipped on Debian but I decided to keep them, in case someone wants to run them themselves.) Debdiff attached. unblock libbusiness-onlinepayment-ippay-perl/0.06-2 (Request concerning s-p-u following shortly.) Thanks in advance, gregor -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJQkAnXAAoJELs6aAGGSaoGsRMP/RKZVDFHOEV6Tv9YfRVwWE26 9JrU3CvLZw/RkE3obVIzwau4IuzsEUFZ03gYbld2Pik07VR9np6+NxBLyMrTxCWn VveTeNPUQxLmFQ8Cq6Ry0Cs23acspCJiiCNj97BK7xRy8f8tZAYVpCnhojk56bSA GLPIe1F84d/lmw9muTBw6j3BWD6SzJjBCK40DidOUqeGeZQ4shdnwzRoh7jKA5eX QE62aFebK9p9ollTdAedo4kj8W/i53p1oASDZCws7g8ZkENhD+KbYsryL8Bb1+EV wkNr2hs3EIhGMTuduuyzYKn+9EsWiBD0fc6wso6i76oMmtNJs8rdkudrUR2NS7kM te8G9RbedB600UePCOgjmrS6aQvldPB6Kn/IMgeiua2Q70XlZAhp63WPSA2g3U2K 7yQhTkG1UCpbq2yYANqvybUHZIdiDtgIKohcVbH2K+1mCdZfssyhsSkRpGfaWxAh dGj3eQ3gzJOyFSewU2FVvkW/WAZtRpmEE/ngg3WoY9lwlPnlDwG7EAPc949lLPh0 OvBGcAxNyVGNcQRvm+lxRvWhw5VB4R7eV6iWXaxGjE6RiTtqsNupZj0iM7W+/lgh AUxieSFPBhGVQJmNsO3P74zxj6C/3fBBgxbSZVWINowdrB9y0KiW+lIlIot7suIS TxldUpldj1cyAs1461jZ =p5ic -END PGP SIGNATURE- diff --git a/debian/changelog b/debian/changelog index 625531c..1bd6ae3 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,11 @@ +libbusiness-onlinepayment-ippay-perl (0.06-2) unstable; urgency=low + + * Team upload. + * New patch gateway.patch: change IPPay gateway server/path. Thanks to +Ivan Kohler for backporting the patch. (Closes: #691723) + + -- gregor herrmann gre...@debian.org Tue, 30 Oct 2012 17:59:17 +0100 + libbusiness-onlinepayment-ippay-perl (0.06-1) unstable; urgency=low [ Nicholas Bamber ] diff --git a/debian/patches/gateway.patch b/debian/patches/gateway.patch new file mode 100644 index 000..c47bd71 --- /dev/null +++ b/debian/patches/gateway.patch @@ -0,0 +1,89 @@ +Description: IPPay changed the gateway's server name and path, and will soon + turn off the old gateway +Origin: https://www.freeside.biz/gitweb/?p=Business-OnlinePayment-IPPay.git;a=commitdiff;h=1f19e67636476c7119cfb41920c5b176e617c697 +Bug-Debian: #691723 +Author: Ivan Kohler ivan-deb...@420.am +Reviewed-by: gregor herrmann gre...@debian.org +Last-Update: 2012-10-30 +Applied-Upstream: yes, 0.07 + +--- a/IPPay.pm b/IPPay.pm +@@ -45,9 +45,9 @@ + my %opts = @_; + + # standard B::OP methods/data +-$self-server('gateway17.jetpay.com') unless $self-server; ++$self-server('gtwy.ippay.com') unless $self-server; + $self-port('443') unless $self-port; +-$self-path('/jetpay') unless $self-path; ++$self-path('/ippay') unless $self-path; + + $self-build_subs(qw( order_number avs_code cvv2_response + response_page response_code response_headers +@@ -209,6 +209,9 @@ + foreach ( keys ( %{($self-{_defaults})} ) ) { + $content{$_} = $self-{_defaults}-{$_} unless exists($content{$_}); + } ++ if ($self-test_transaction()) { ++$content{'login'} = 'TESTTERMINAL'; ++ } + $self-content(%content); + + $self-required_fields(@required_fields); +@@ -221,12 +224,6 @@ + } + } + +- if ($self-test_transaction()) { +-$self-server('test1.jetpay.com'); +-$self-port('443'); +-$self-path('/jetpay'); +- } +- + my $transaction_id = $content{'order_number'}; + unless ($transaction_id) { + my ($page, $server_response, %headers) = $self-https_get('dummy' = 1); +@@ -391,7 +388,7 @@ + if ( exists($response-{ActionCode}) !exists($response-{ErrMsg})) { + $self-error_message($response-{ResponseText}); + }else{ +- $self-error_message($response-{Errmsg}); ++ $self-error_message($response-{ErrMsg}); + } + # }else{ + #$self-error_message(Server Failed); +@@
Re: Please, migrate libopenjpeg2 to testing due to a multi-arch important problem
On Mon, Oct 29, 2012 at 12:32 AM, Thiago Bellini Ribeiro wrote: There's a very important problem on alsa/pulseaudio on multi-arch. I did a little search, and it appears that this package (more especificaly, libopenjpeg2) is the last dependency missing in multi-arch for us to be able to install libasound2-plugins:i386. http://bugs.debian.org/681717 Best wishes, Mike -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CANTw=MM-vsYs+eKyxQP3hQcUCNFYcHesrzCNTVDMkUQVE=v...@mail.gmail.com
Bug#691885: pu: package libbusiness-onlinepayment-ippay-perl/0.05~02-2+squeeze1
Control: tags -1 + squeeze confirmed On Tue, 2012-10-30 at 18:42 +0100, gregor herrmann wrote: We'd like to update libbusiness-onlinepayment-ippay-perl in squeeze because of #691723: change gateway server name and path. I've prepared an update for 0.05~02-2 that includes the backported changes (kindly provided by Ivan Kohler). Debdiff attached. Please go ahead; thanks. Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/1351628049.16094.15.ca...@jacala.jungle.funky-badger.org
Processed: Re: Bug#691885: pu: package libbusiness-onlinepayment-ippay-perl/0.05~02-2+squeeze1
Processing control commands: tags -1 + squeeze confirmed Bug #691885 [release.debian.org] pu: package libbusiness-onlinepayment-ippay-perl/0.05~02-2+squeeze1 Added tag(s) squeeze and confirmed. -- 691885: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691885 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.b691885.135162814326019.transcr...@bugs.debian.org
Bug#691647: unblock: schroot/1.6.4-1
On Sun, Oct 28, 2012 at 12:53:08PM +, Roger Leigh wrote: On Sun, Oct 28, 2012 at 12:39:28AM +0100, Roger Leigh wrote: Please unblock package schroot I have uploaded schroot 1.6.4-1 to unstable. This contains some documentation for wheezy upgrade issues, plus some fixes for serious and important bugs in wheezy: I had to make an additional 3 line change to fix building on hurd and kfreebsd (attached) And an additional change to allow for symlinks in paths on the host. unblock schroot/1.6.4-3 -- .''`. Roger Leigh : :' : Debian GNU/Linuxhttp://people.debian.org/~rleigh/ `. `' schroot and sbuild http://alioth.debian.org/projects/buildd-tools `-GPG Public Key F33D 281D 470A B443 6756 147C 07B3 C8BC 4083 E800 diff -Nru schroot-1.6.4/debian/changelog schroot-1.6.4/debian/changelog --- schroot-1.6.4/debian/changelog 2012-10-28 11:53:31.0 + +++ schroot-1.6.4/debian/changelog 2012-10-29 20:06:47.0 + @@ -1,3 +1,10 @@ +schroot (1.6.4-3) unstable; urgency=low + + * schroot-mount canonicalises both the base path and full +path when sanity checking mountpoints (Closes: #691694). + + -- Roger Leigh rle...@debian.org Mon, 29 Oct 2012 19:25:30 + + schroot (1.6.4-2) unstable; urgency=low * sbuild::chroot_facet_session_clonable: Include diff -Nru schroot-1.6.4/debian/patches/1.6.4-3 schroot-1.6.4/debian/patches/1.6.4-3 --- schroot-1.6.4/debian/patches/1.6.4-31970-01-01 01:00:00.0 +0100 +++ schroot-1.6.4/debian/patches/1.6.4-32012-10-29 20:07:33.0 + @@ -0,0 +1,41 @@ +Description: 1.6.4-3 + schroot (1.6.4-3) unstable; urgency=low + . + * schroot-mount canonicalises both the base path and full + path when sanity checking mountpoints (Closes: #691694). +Author: Roger Leigh rle...@debian.org +Bug-Debian: http://bugs.debian.org/691694 + +--- +--- schroot-1.6.4.orig/bin/schroot-mount/schroot-mount-main.cc schroot-1.6.4/bin/schroot-mount/schroot-mount-main.cc +@@ -96,9 +96,15 @@ main::resolve_path (std::string const m + if (absmountpoint.empty() || absmountpoint[0] != '/') + absmountpoint = std::string(/) + absmountpoint; + ++ char *resolved_path = realpath(opts-mountpoint.c_str(), 0); ++ if (!resolved_path) ++throw error(opts-mountpoint, REALPATH, strerror(errno)); ++ std::string basepath(resolved_path); ++ std::free(resolved_path); ++ + std::string directory(opts-mountpoint + absmountpoint); + // Canonicalise path to remove any symlinks. +- char *resolved_path = realpath(directory.c_str(), 0); ++ resolved_path = realpath(directory.c_str(), 0); + if (resolved_path == 0) + { + // The path is either not present or is an invalid link. If +@@ -137,9 +143,9 @@ main::resolve_path (std::string const m + // If the link was absolute (i.e. points somewhere on the host, + // outside the chroot, make sure that this is modified to be + // inside. +- if (directory.size() opts-mountpoint.size() || +- directory.substr(0,opts-mountpoint.size()) != opts-mountpoint) +-directory = opts-mountpoint + directory; ++ if (directory.size() basepath.size() || ++ directory.substr(0,basepath.size()) != basepath) ++directory = basepath + directory; + + return directory; + } diff -Nru schroot-1.6.4/debian/patches/series schroot-1.6.4/debian/patches/series --- schroot-1.6.4/debian/patches/series 2012-10-28 11:53:59.0 + +++ schroot-1.6.4/debian/patches/series 2012-10-29 20:07:06.0 + @@ -1 +1,2 @@ 1.6.4-2 +1.6.4-3
Bug#691885: pu: package libbusiness-onlinepayment-ippay-perl/0.05~02-2+squeeze1
On Tue, 30 Oct 2012 20:14:09 +, Adam D. Barratt wrote: I've prepared an update for 0.05~02-2 that includes the backported changes (kindly provided by Ivan Kohler). Debdiff attached. Please go ahead; thanks. Thanks, uploaded. (Thanks for the unblock of the other version, too.) Cheers, gregor -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - http://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: Nick Drake: The Thoughts Of Mary Jane signature.asc Description: Digital signature
Processed: Re: Bug#691781: unblock: kfreebsd-9/9.0-7
Processing control commands: tags -1 - moreinfo Bug #691781 [release.debian.org] unblock: kfreebsd-9/9.0-7 Removed tag(s) moreinfo. tags -1 + confirmed d-i Bug #691781 [release.debian.org] unblock: kfreebsd-9/9.0-7 Added tag(s) d-i and confirmed. -- 691781: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691781 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.b691781.135163054811584.transcr...@bugs.debian.org
Bug#691781: unblock: kfreebsd-9/9.0-7
Control: tags -1 - moreinfo Control: tags -1 + confirmed d-i On Mon, 2012-10-29 at 18:57 +, Adam D. Barratt wrote: On Mon, 2012-10-29 at 17:53 +0100, Christoph Egger wrote: Please unblock package kfreebsd-9 debian/changelog * Pick SVN 239447 from FreeBSD 9-STABLE to fix a remote DoS vulnerability of SCTP (CVE-2012-3549) (Closes: #686962) It also appears to drop all of the udebs? -8 was uploaded fixing that. I'm happy to unblock it, but it'll need a d-i ack. Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/1351630456.16094.17.ca...@jacala.jungle.funky-badger.org
Bug#689727: marked as done (unblock: gcc-4.7-doc/4.7.2-2)
Your message dated Tue, 30 Oct 2012 21:32:34 + with message-id 1351632754.16094.18.ca...@jacala.jungle.funky-badger.org and subject line Re: Bug#689727: unblock: gcc-4.7-doc/4.7.2-1 has caused the Debian Bug report #689727, regarding unblock: gcc-4.7-doc/4.7.2-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 689727: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689727 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package gcc-4.7-doc GCC needs updated documents, but it can only be distributed in non-free, not in src:gcc-4.7. So I wish this package to go into wheezy. This package contains document for gcc-4.7, with all Debian patches in gcc-4.7: 4.7.2-2. Most of revelant reasons are in the unblock request for gcc-4.6-doc[1], so I'm not elaborating here. [1] http://bugs.debian.org/689726 unblock gcc-4.7-doc/4.7.2-1 Best regards, Guo Yixuan ---End Message--- ---BeginMessage--- On Tue, 2012-10-30 at 14:26 +0800, Guo Yixuan wrote: On 10/26/2012 02:23 AM, Adam D. Barratt wrote: On Fri, 2012-10-05 at 23:55 +0800, Guo Yixuan wrote: Please unblock package gcc-4.7-doc I guess you know already, but 4.7.2-2 got rejected by dak because, similarly to the no NEW packages from DMs rule, you can't upload a package which builds a binary that's already built from another source package - i.e. gcc-doc-base. Now unblocked; thanks. Regards, Adam---End Message---
Bug#689967: marked as done (unblock: gcc-doc-defaults/5:4)
Your message dated Tue, 30 Oct 2012 21:36:44 + with message-id 1351633004.16094.19.ca...@jacala.jungle.funky-badger.org and subject line Re: Bug#689967: unblock: gcc-doc-defaults/5:4 has caused the Debian Bug report #689967, regarding unblock: gcc-doc-defaults/5:4 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 689967: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689967 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Dear Release Team, Please unblock package gcc-doc-defaults GCC's documents need an update, as we have gcc-4.6/4.7 as default version (depends on arch). This upload update manpage/info symlinks from gcc-4.4 to gcc-4.6/4.7, and also fixed some lintian warnings. gcc-4.6-doc and gcc-4.7-doc need to be unblocked before this package.[1][2] [1] http://bugs.debian.org/689726 [2] http://bugs.debian.org/689727 debdiff between 5:3 and 5:4 attached at the end. unblock gcc-doc-defaults/5:4 Regards, Guo Yixuan diff -Nru gcc-doc-defaults-3/debian/changelog gcc-doc-defaults-4/debian/changelog --- gcc-doc-defaults-3/debian/changelog 2010-05-03 04:47:22.0 +0800 +++ gcc-doc-defaults-4/debian/changelog 2012-10-06 05:04:51.0 +0800 @@ -1,3 +1,30 @@ +gcc-doc-defaults (5:4) unstable; urgency=low + + * Updated defaults to 4.6 and 4.7 versions. (Closes: #618351, +#651290, #684082) + * debian/rules: +- choose default version based on symlinks provided by gcc-defaults. +- added targets: build-arch, build-dep. + * debian/control(.in): +- Bumped policy version to 3.9.4. +- Added myself to uploaders. +- Added git repo urls in Vcs-*. +- Build-dep on cpp, gfortran, gnat, gcj-jdk for getting default + versions at build-time. +- Use replaces and breaks to overwrite files in older packages, instead of + conflicts. +- Added Homepage field. + * Use set -e in *.preinst scripts. + * Added lintian override files: +- for arch-dependent document packages, +- for symlinks to files in other packages. + * Improved README. + + [ Sponsor Steffen Moeller ] + * Added DMUA flag for Guo Yixuan. + + -- Guo Yixuan culu@gmail.com Thu, 04 Oct 2012 11:19:36 +0800 + gcc-doc-defaults (5:3) unstable; urgency=low * Make all symlinks to point to 4.4 versions. diff -Nru gcc-doc-defaults-3/debian/control gcc-doc-defaults-4/debian/control --- gcc-doc-defaults-3/debian/control 2010-05-03 04:45:04.0 +0800 +++ gcc-doc-defaults-4/debian/control 2012-10-06 05:03:35.0 +0800 @@ -3,14 +3,21 @@ Priority: optional Maintainer: Debian GCC Maintainers debian-...@lists.debian.org Uploaders: - Nikita V. Youshchenko yo...@debian.org -Build-Depends: debhelper ( 5) -Standards-Version: 3.7.3 + Nikita V. Youshchenko yo...@debian.org, + Guo Yixuan culu@gmail.com +Build-Depends: debhelper ( 5), + cpp, gfortran, gnat, gcj-jdk +Standards-Version: 3.9.4 +DM-Upload-Allowed: yes +Homepage: http://gcc.gnu.org/ +Vcs-Browser: http://git.debian.org/?p=users/yixuan-guest/gcc-doc-defaults.git +Vcs-Git: git://git.debian.org/users/yixuan-guest/gcc-doc-defaults.git Package: gcc-doc Architecture: any -Depends: gcc-4.4-doc (= 4.4.4.nf1-1), ${misc:Depends} -Conflicts: gcc ( 4:4.1.1-7), g++ ( 4:4.1.1-7) +Depends: gcc-4.7-doc (= 4.7.2-1), ${misc:Depends} +Replaces: gcc ( 4:4.1.1-7), g++ ( 4:4.1.1-7) +Breaks: gcc ( 4:4.1.1-7), g++ ( 4:4.1.1-7) Description: documentation for the GNU compilers (gcc, gobjc, g++) This is the dependency package that should install manual pages and documentation for Debian default version of GNU compilers. @@ -19,8 +26,9 @@ Package: cpp-doc Architecture: any -Depends: cpp-4.4-doc (= 4.4.4.nf1-1), ${misc:Depends} -Conflicts: cpp ( 4:4.1.1-7) +Depends: cpp-4.7-doc (= 4.7.2-1), ${misc:Depends} +Replaces: cpp ( 4:4.1.1-7) +Breaks: cpp ( 4:4.1.1-7) Description: documentation for the GNU C preprocessor (cpp) This is the dependency package that should install manual page and documentation for Debian default version of GNU C preprocessor. @@ -29,8 +37,9 @@ Package: gfortran-doc Architecture: any -Depends: gfortran-4.4-doc (= 4.4.4.nf1-1), ${misc:Depends} -Conflicts: gfortran ( 4:4.1.1-7) +Depends: gfortran-4.7-doc (= 4.7.2-1), ${misc:Depends} +Replaces: gfortran ( 4:4.1.1-7) +Breaks: gfortran ( 4:4.1.1-7) Description: documentation for the GNU Fortran Compiler (gfortran) This is the dependency package that should install manual page and documentation for Debian default version of GNU Fortran
sorry
It looks like the debdiff is too large to send via normal means. You'll either have to review it yourself or give me specific instructions for delivering it. -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/50904b56.5070...@periapt.co.uk
Re: Request to update libconfig-model-perl for testing (take 2)
On Mon, 2012-10-29 at 20:20 +0100, Dominique Dumont wrote: Le Monday 29 October 2012 19:38:59, vous avez écrit : +libconfig-model-perl (2.021-4) wheezy; urgency=low 2.021-3+deb7u1 would be more conventional here, to indicate that the upload didn't follow the usual progression via unstable. ok. About 10 days after the new version hits unstable, assuming everything goes well, should I ping you back on this thread before releasing to tpu or just upload ? If the diff is the same as you previously posted (with the potential change of version number as discussed above) please feel free to go ahead with the tpu upload at the appropriate time. Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/1351634013.16094.22.ca...@jacala.jungle.funky-badger.org
procps 3.3.4 and 3.3.5
Hi, I'm trying to make sure procps 3.3.4-1 is not going to be progressed along any further. The API changed which means if procps is upgraded and libproc0 isn't, then some procps commands don't work well. I've reported a critical bug [1] on procps (it stops the boot process) but 3.3.5 is stuck because the package name has changed to libproc1. Ideally I'd like 3.3.4 gone but I think its too late for that, so some things depending on libproc0 may go strange. - Craig [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691847 -- Craig Small VK2XLZ http://enc.com.au/ csmall at : enc.com.au Debian GNU/Linux http://www.debian.org/ csmall at : debian.org GPG fingerprint: 5D2F B320 B825 D939 04D2 0519 3938 F96B DF50 FEA5 signature.asc Description: Digital signature
Bug#691888: release.debian.org: unblock: librdmacm-1.0.15-1+deb7u1
diff -Nru librdmacm-1.0.15/debian/.pc/.quilt_patches librdmacm-1.0.15/debian/.pc/.quilt_patches [...] diff -Nru librdmacm-1.0.15/debian/.pc/.quilt_series librdmacm-1.0.15/debian/.pc/.quilt_series [...] diff -Nru librdmacm-1.0.15/debian/.pc/.version librdmacm-1.0.15/debian/.pc/.version I'm assuming those are simply the result of the way you produced the diff, as .pc shouldn't be in the source package. Other than that, it looks fine; thanks. Sorry, yeah, my mistake. Verified that my local version doesn't contain them in the actual source package any more. I'll go ahead and upload. -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/87r4ofbniz@shaolin.home.digitalvampire.org
Freeze exception request for intel-microcode and amd64-microcode
References: bugs #690285 and #690286 The versions of both intel-microcode and amd64-microcode currently in Wheezy can trigger a nasty bug in initramfs-tools that renders the system unbootable. The packages in unstable work around this issue. The bug will only happen when $TMPDIR (usually /tmp) is mounted noexec at the time update-initramfs is run. While this is quite unusual, it did hit one user (bug #689301). In addition to the changes fixing that issue, the intel-microcode package also contains a new upstream release. Intel issued a microcode hotfix for all current i5/i7/Xeon processors in 2012-10-01. Due to the very unusual nature of this microcode update (it is labeled 20120606-v2 by Intel, a strong hint that it is fixing mishaps in the microcode release currently in Wheezy), and the inclusion of microcode updates even to very high-end Xeon E7 processors, it is likely fixing something very relevant. The packages have been 20 days in unstable already, without any issues reported. Please consider unblocking intel-microcode (#690286) and amd64-microcode (#690285). -- One disk to rule them all, One disk to find them. One disk to bring them all and in the darkness grind them. In the Land of Redmond where the shadows lie. -- The Silicon Valley Tarot Henrique Holschuh -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20121030231447.ga9...@khazad-dum.debian.net
Bug#691894: unblock: apache2/2.2.22-12
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package apache2. This upload mitigates impact of the so called CRIME attacks to SSL. That's primarily a browser issue and no vulnerability in Apache's code. Having that said, this patch disables SSL compression globally by default so that vulnerable browsers can't be exploited while talking to a web server with this patch. Please note, we are planning to upload the very same patch to s-p-u (same patch, just adapted to Squeeze's Apache version and in dpatch format). Do you agree with our plans with that? Alternatively we can discuss this in a separate bug if you prefer. This is the patch: diff --git a/debian/changelog b/debian/changelog index 665b678..3d4d908 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,13 @@ +apache2 (2.2.22-12) unstable; urgency=low + + * Backport mod_ssl SSLCompression on|off flag from upstream. The default is +off. This mitigates impact of CRIME attacks. Fixes: +- handling the CRIME attack (Closes: #689936) +- make it possible to disable ssl compression in apache2 mod_ssl + (Closes: #674142) + + -- Arno Töll a...@debian.org Wed, 31 Oct 2012 00:23:59 +0100 + apache2 (2.2.22-11) unstable; urgency=low * Be more careful regarding link attacks when purging the cache disk diff --git a/debian/patches/disable-ssl-compression.patch b/debian/patches/disable-ssl-compression.patch new file mode 100644 index 000..6878f68 --- /dev/null +++ b/debian/patches/disable-ssl-compression.patch @@ -0,0 +1,121 @@ +From: Bjoern Jacke debianb...@j3e.de +Subject: Allow mod_ssl to disable ssl compression + +Patch submitted upstream, merged into 2.2.24. This patch adds a Compression +on|off directive to mod_ssl. + +Origin: upstream, https://issues.apache.org/bugzilla/attachment.cgi?id=28804 +Bug: https://issues.apache.org/bugzilla/show_bug.cgi?id=53219 +Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=674142 + +--- a/modules/ssl/mod_ssl.c b/modules/ssl/mod_ssl.c +@@ -146,6 +146,9 @@ + ('[+-][SSLv3|TLSv1|TLSv1.1|TLSv1.2] ...' - see manual)) + SSL_CMD_SRV(HonorCipherOrder, FLAG, + Use the server's cipher ordering preference) ++SSL_CMD_SRV(Compression, FLAG, ++Enable SSL level compression ++(`on', `off')) + SSL_CMD_SRV(InsecureRenegotiation, FLAG, + Enable support for insecure renegotiation) + SSL_CMD_ALL(UserName, TAKE1, +--- a/modules/ssl/ssl_engine_config.c b/modules/ssl/ssl_engine_config.c +@@ -178,6 +178,9 @@ + #ifdef HAVE_FIPS + sc-fips = UNSET; + #endif ++#ifndef OPENSSL_NO_COMP ++sc-compression= UNSET; ++#endif + + modssl_ctx_init_proxy(sc, p); + +@@ -275,6 +278,9 @@ + #ifdef HAVE_FIPS + cfgMergeBool(fips); + #endif ++#ifndef OPENSSL_NO_COMP ++cfgMergeBool(compression); ++#endif + + modssl_ctx_cfg_merge_proxy(base-proxy, add-proxy, mrg-proxy); + +@@ -708,6 +714,23 @@ + + } + ++const char *ssl_cmd_SSLCompression(cmd_parms *cmd, void *dcfg, int flag) ++{ ++#if !defined(OPENSSL_NO_COMP) ++SSLSrvConfigRec *sc = mySrvConfig(cmd-server); ++#ifndef SSL_OP_NO_COMPRESSION ++const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); ++if (err) ++return This version of openssl does not support configuring ++ compression within VirtualHost sections.; ++#endif ++sc-compression = flag ? TRUE : FALSE; ++return NULL; ++#else ++return Setting Compression mode unsupported; not implemented by the SSL library; ++#endif ++} ++ + const char *ssl_cmd_SSLHonorCipherOrder(cmd_parms *cmd, void *dcfg, int flag) + { + #ifdef SSL_OP_CIPHER_SERVER_PREFERENCE +--- a/modules/ssl/ssl_engine_init.c b/modules/ssl/ssl_engine_init.c +@@ -532,6 +532,18 @@ + } + #endif + ++ ++#ifndef OPENSSL_NO_COMP diff --git a/debian/changelog b/debian/changelog index 665b678..3d4d908 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,13 @@ +apache2 (2.2.22-12) unstable; urgency=low + + * Backport mod_ssl SSLCompression on|off flag from upstream. The default is +off. This mitigates impact of CRIME attacks. Fixes: +- handling the CRIME attack (Closes: #689936) +- make it possible to disable ssl compression in apache2 mod_ssl + (Closes: #674142) + + -- Arno Töll a...@debian.org Wed, 31 Oct 2012 00:23:59 +0100 + apache2 (2.2.22-11) unstable; urgency=low * Be more careful regarding link attacks when purging the cache disk diff --git a/debian/patches/disable-ssl-compression.patch b/debian/patches/disable-ssl-compression.patch new file mode 100644 index 000..6878f68 --- /dev/null +++ b/debian/patches/disable-ssl-compression.patch @@ -0,0 +1,121 @@ +From: Bjoern Jacke debianb...@j3e.de +Subject: Allow mod_ssl to disable ssl compression + +Patch submitted upstream, merged into 2.2.24. This patch adds a Compression
Bug#691894: unblock: apache2/2.2.22-12
Err, the diff looks bad. This one is a better diff. -- with kind regards, Arno Töll IRC: daemonkeeper on Freenode/OFTC GnuPG Key-ID: 0x9D80F36D diff --git a/debian/changelog b/debian/changelog index 665b678..3d4d908 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,13 @@ +apache2 (2.2.22-12) unstable; urgency=low + + * Backport mod_ssl SSLCompression on|off flag from upstream. The default is +off. This mitigates impact of CRIME attacks. Fixes: +- handling the CRIME attack (Closes: #689936) +- make it possible to disable ssl compression in apache2 mod_ssl + (Closes: #674142) + + -- Arno Töll a...@debian.org Wed, 31 Oct 2012 00:23:59 +0100 + apache2 (2.2.22-11) unstable; urgency=low * Be more careful regarding link attacks when purging the cache disk diff --git a/debian/patches/disable-ssl-compression.patch b/debian/patches/disable-ssl-compression.patch new file mode 100644 index 000..6878f68 --- /dev/null +++ b/debian/patches/disable-ssl-compression.patch @@ -0,0 +1,121 @@ +From: Bjoern Jacke debianb...@j3e.de +Subject: Allow mod_ssl to disable ssl compression + +Patch submitted upstream, merged into 2.2.24. This patch adds a Compression +on|off directive to mod_ssl. + +Origin: upstream, https://issues.apache.org/bugzilla/attachment.cgi?id=28804 +Bug: https://issues.apache.org/bugzilla/show_bug.cgi?id=53219 +Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=674142 + +--- a/modules/ssl/mod_ssl.c b/modules/ssl/mod_ssl.c +@@ -146,6 +146,9 @@ + ('[+-][SSLv3|TLSv1|TLSv1.1|TLSv1.2] ...' - see manual)) + SSL_CMD_SRV(HonorCipherOrder, FLAG, + Use the server's cipher ordering preference) ++SSL_CMD_SRV(Compression, FLAG, ++Enable SSL level compression ++(`on', `off')) + SSL_CMD_SRV(InsecureRenegotiation, FLAG, + Enable support for insecure renegotiation) + SSL_CMD_ALL(UserName, TAKE1, +--- a/modules/ssl/ssl_engine_config.c b/modules/ssl/ssl_engine_config.c +@@ -178,6 +178,9 @@ + #ifdef HAVE_FIPS + sc-fips = UNSET; + #endif ++#ifndef OPENSSL_NO_COMP ++sc-compression= UNSET; ++#endif + + modssl_ctx_init_proxy(sc, p); + +@@ -275,6 +278,9 @@ + #ifdef HAVE_FIPS + cfgMergeBool(fips); + #endif ++#ifndef OPENSSL_NO_COMP ++cfgMergeBool(compression); ++#endif + + modssl_ctx_cfg_merge_proxy(base-proxy, add-proxy, mrg-proxy); + +@@ -708,6 +714,23 @@ + + } + ++const char *ssl_cmd_SSLCompression(cmd_parms *cmd, void *dcfg, int flag) ++{ ++#if !defined(OPENSSL_NO_COMP) ++SSLSrvConfigRec *sc = mySrvConfig(cmd-server); ++#ifndef SSL_OP_NO_COMPRESSION ++const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); ++if (err) ++return This version of openssl does not support configuring ++ compression within VirtualHost sections.; ++#endif ++sc-compression = flag ? TRUE : FALSE; ++return NULL; ++#else ++return Setting Compression mode unsupported; not implemented by the SSL library; ++#endif ++} ++ + const char *ssl_cmd_SSLHonorCipherOrder(cmd_parms *cmd, void *dcfg, int flag) + { + #ifdef SSL_OP_CIPHER_SERVER_PREFERENCE +--- a/modules/ssl/ssl_engine_init.c b/modules/ssl/ssl_engine_init.c +@@ -532,6 +532,18 @@ + } + #endif + ++ ++#ifndef OPENSSL_NO_COMP ++if (sc-compression != TRUE) { ++#ifdef SSL_OP_NO_COMPRESSION ++/* OpenSSL = 1.0 only */ ++SSL_CTX_set_options(ctx, SSL_OP_NO_COMPRESSION); ++#elif OPENSSL_VERSION_NUMBER = 0x00908000L ++sk_SSL_COMP_zero(SSL_COMP_get_compression_methods()); ++#endif ++} ++#endif ++ + #ifdef SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION + if (sc-insecure_reneg == TRUE) { + SSL_CTX_set_options(ctx, SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION); +--- a/modules/ssl/ssl_private.h b/modules/ssl/ssl_private.h +@@ -64,6 +64,11 @@ + #define HAVE_TLSV1_X + #endif + ++#if !defined(OPENSSL_NO_COMP) !defined(SSL_OP_NO_COMPRESSION) \ ++ OPENSSL_VERSION_NUMBER 0x00908000L ++#define OPENSSL_NO_COMP ++#endif ++ + #include ssl_util_ssl.h + + /** The #ifdef macros are only defined AFTER including the above +@@ -495,6 +500,9 @@ + #ifdef HAVE_FIPS + BOOL fips; + #endif ++#ifndef OPENSSL_NO_COMP ++BOOL compression; ++#endif + }; + + /** +@@ -551,6 +559,7 @@ + const char *ssl_cmd_SSLCARevocationPath(cmd_parms *, void *, const char *); + const char *ssl_cmd_SSLCARevocationFile(cmd_parms *, void *, const char *); + const char *ssl_cmd_SSLHonorCipherOrder(cmd_parms *cmd, void *dcfg, int flag); ++const char *ssl_cmd_SSLCompression(cmd_parms *, void *, int flag); + const char *ssl_cmd_SSLVerifyClient(cmd_parms *, void *, const char *); + const char *ssl_cmd_SSLVerifyDepth(cmd_parms *, void *, const char *); + const char *ssl_cmd_SSLSessionCache(cmd_parms *, void *, const char *); diff --git a/debian/patches/series b/debian/patches/series index 6113b65..e7b9b3f 100644
Bug#686993: marked as done (unblock: ledgersmb/1.3.21-2)
Your message dated Tue, 30 Oct 2012 21:52:11 -0400 with message-id 1351648331.2390.11.camel@svrpc and subject line Closing bug # 686993 has caused the Debian Bug report #686993, regarding unblock: ledgersmb/1.3.21-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 686993: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686993 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: freeze-exception Please unblock package ledgersmb/1.3.21-2. I feel (both as the package maintainer and as part of upstream) that the combination of the packaging and upstream changes represented by this package is the necessary next step in increasing the quality of the LedgerSMB package in wheezy without trying to do too much at one time: - The LedgerSMB Debian package is a leaf package; i.e., there are no other packages that depend on it. - This package includes a fix for an issue with a System/Defaults denial of service advisory (#678291); the recommendation is that all users upgrade from previous versions. - This package includes fixes for upstream es_AR.po fatal errors (#678281) as well as an update to the translation. More details of the related changes from the version currently in wheezy (1.3.18-2) to the version recently uploaded to sid (1.3.21-2) include the following: * Make indentation consistent in all maintainer scripts. * Changes to debian/patches/: - Add 20_Makefile-PL.patch for a version reference issue in Makefile.PL. - Update 10_httpdconf.patch templates path to /var/lib/ledgersmb/templates. * Changes for debian/ledgersmb.preinst: - Correct version being checked against for css/templates softlinks removal. - Update how the old_version variable is being used for the version checks. * Changes for debian/control: - Add accidently removed libtemplate-plugin-latex-perl back into Recommends. - Add accidently removed libimage-size-perl back into Suggests. * New upstream release. (Closes: #682274) - Fix for System/Defaults denial of service advisory. (Closes: #683357) - Fixes for es_AR translation, duplicate keys removed. (Closes: #678281) - Fixed discarded input/bad label on 1.2 upgrade screen. (Closes: #677098) * Changes to debian/patches/: - Updated 05_confdir.patch for the new fs_cssdir configuration item. * Changes for debian/control: - Update the URL in the Vcs-Browser entry. * Changes for debian/ledgersmb.preinst: - Add setting of an old_version variable for use in the script. - Move templates/* to /var/lib/ledgersmb if necessary during upgrade. - Remove old ledgersmb css and/or templates symbolic links as necessary. * Changes for debian/ledgersmb.postinst: - Update source path for when creating working css templates directories. * Remove setting symbolic link to /var/lib/ledgersmb/css in ledgersmb.links. * Move installation of css templates directories using ledgersmb.examples to using ledgersmb.install. * Update path for the distribution templates directory in debian/rules. unblock ledgersmb/1.3.21-2 Robert James Clay j...@rocasa.us ---End Message--- ---BeginMessage--- I expect that a new package version, v1.3.23-1, of LedgerSMB will be available soon in unstable and that version brings with it even more changes than the v1.3.21-1 version I originally requested this unblock for. As it appears it is unlikely to be approved of at this time due to changes, closing the request to have its migration to testing unblocked. Will work on back porting the then current version of LedgerSMB after wheezy is released. RJ Clay j...@rocasa.us---End Message---
Bug#689154: unblock: gnunet/0.9.3-4
Control: unblock 687875 by 689154 Control: unblock 687881 by 689154 Control: unblock 687883 by 689154 Control: unblock 688486 by 689154 Control: unblock 688590 by 689154 Control: unblock 686238 by 689154 Control: unblock 684997 by 689154 Control: unblock 688484 by 689154 Control: unblock 690860 by 689154 Control: unblock 684317 by 689154 The release team is not preventing you to fix those bugs in the archive (starting with sid or experimental), so removing those useless blocks. Hi, Le 18/10/2012 16:32, Bertrand Marc a écrit : Le 13/10/2012 18:27, Adam D. Barratt a écrit : + * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881, + #687883). What happens if a user has the broken version installed already and then upgrades to -4? As far as I can tell, nothing in the new diff helps resolve the issues which have already occurred, as opposed to stopping them recurring. You're right, nothing helps resolve the issues which have already occurred. It can only happen on new installation of gnunet on testing during the last 6 months though, so upgrades from Squeeze will go smoothly. And the issue can be easily fixed by reinstalling gnunet. Reinstalling won't work. One will need to remove the package, and install it again. Why don't you simply fix those new bugs with a bunch of .preinst script (or keep the symlinks, and fix the upgrade from Squeeze in a bunch of .postinst scripts)? For each PACKAGE in gnunet-dev gnunet-server gnunet-dbg gnunet-client gnunet, you could either add the following preinst (just replace PACKAGE): -- PACKAGE.preinst --- #! /bin/sh set -e # Delete symlink that will be replaced by a directory docdir=/usr/share/doc/PACKAGE if [ -L $docdir ]; then rm doc$dir 2/dev/null fi #DEBHELPER# exit 0 --- or rather keep the symlinks, and add the five following postinst (just replace PACKAGE): -- PACKAGE.postinst --- #!/bin/sh set -e # Replace documentation directory with symlink docdir=/usr/share/doc/PACKAGE if [ -d $docdir ] [ ! -L $docdir ]; then if rmdir $docdir 2/dev/null; then ln -sf gnunet-common $docdir fi fi #DEBHELPER# exit 0 --- I noticed a charset mess while testing your package in a French localized environment, and just pushed another tiny change in your Git repository. It complies with the forth point of the Wheezy Freeze Policy (“translation […] fixes”) [0]. 0: http://release.debian.org/wheezy/freeze_policy.html Regards David signature.asc Description: OpenPGP digital signature
Processed: Re: Bug#689154: unblock: gnunet/0.9.3-4
Processing control commands: unblock 687875 by 689154 Bug #687875 [gnunet-server] gnunet-server: copyright file missing after upgrade (policy 12.5) 687875 was blocked by: 689154 687875 was not blocking any bugs. Removed blocking bug(s) of 687875: 689154 unblock 687881 by 689154 Bug #687881 [gnunet-client] gnunet-client: copyright file missing after upgrade (policy 12.5) 687881 was blocked by: 689154 687881 was not blocking any bugs. Removed blocking bug(s) of 687881: 689154 unblock 687883 by 689154 Bug #687883 [gnunet-dbg] gnunet-dbg: copyright file missing after upgrade (policy 12.5) 687883 was blocked by: 689154 687883 was not blocking any bugs. Removed blocking bug(s) of 687883: 689154 unblock 688486 by 689154 Bug #688486 [src:gnunet] gnunet: Patch for kfreebsd 688486 was blocked by: 689154 688486 was not blocking any bugs. Removed blocking bug(s) of 688486: 689154 unblock 688590 by 689154 Bug #688590 [src:gnunet] src:gnunet: ftbfs on ia64 (/lib vs /usr/lib confusion) 688590 was blocked by: 689154 688590 was not blocking any bugs. Removed blocking bug(s) of 688590: 689154 unblock 686238 by 689154 Bug #686238 [gnunet-server] gnunet-server: Access from `unbound UNIX client' denied to service `namestore' 686238 was blocked by: 689154 686238 was not blocking any bugs. Removed blocking bug(s) of 686238: 689154 unblock 684997 by 689154 Bug #684997 [gnunet-common] Wrong libgcrypt11 dependency version 684997 was blocked by: 689154 684997 was not blocking any bugs. Removed blocking bug(s) of 684997: 689154 unblock 688484 by 689154 Bug #688484 [src:gnunet] gnunet: uninstallable on hurd-i386 688484 was blocked by: 689154 688484 was not blocking any bugs. Removed blocking bug(s) of 688484: 689154 unblock 690860 by 689154 Bug #690860 [src:gnunet] gnunet-server, gnunet-client: shouldn't depend on gettext 690860 was blocked by: 689154 690860 was not blocking any bugs. Removed blocking bug(s) of 690860: 689154 unblock 684317 by 689154 Bug #684317 [gnunet-server] gnunet-server: Unable to publish: Access from `unbound UNIX client' denied to service `datastore' 684317 was blocked by: 689154 684317 was not blocking any bugs. Removed blocking bug(s) of 684317: 689154 -- 684317: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684317 684997: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684997 686238: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686238 687875: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687875 687881: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687881 687883: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687883 688484: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688484 688486: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688486 688590: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688590 689154: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689154 690860: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690860 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.b689154.135165031317300.transcr...@bugs.debian.org
Processed: Re: Bug#687492: unblock: aptitude/0.6.8.2-1 (pre-approve)
Processing control commands: tags -1 - moreinfo Bug #687492 [release.debian.org] unblock: aptitude/0.6.8.2-1 (pre-approve) Removed tag(s) moreinfo. -- 687492: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687492 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.b687492.13516534505229.transcr...@bugs.debian.org
Bug#687492: unblock: aptitude/0.6.8.2-1 (pre-approve)
Control: tags -1 - moreinfo On 16 October 2012 17:37, Daniel Hartwig mand...@gmail.com wrote: On 24 September 2012 09:32, Daniel Hartwig mand...@gmail.com wrote: On 24 September 2012 05:10, Adam D. Barratt a...@adam-barratt.org.uk wrote: Assuming I'm reading the above correctly and there'll be another unblock request after this one, Correct. do you have an estimate as to how much longer it will be before that version will be ready? The work is mostly complete, just a matter of merging various wip branches and touch up: I estimate within one week of the pre-approval of the current request. […] I plan to upload .10 to experimental with .8.2 going to unstable. This will provide feedback which may be useful for when the time comes to review the rather large diff. Hello Two weeks since my last response. I believe it addressed Adam's query. Any updates regarding pre-approval for this course of action? Regards Following up one final time. Removing moreinfo tag as per my previous responses. I would like to avoid entering the same situation as 0.6.9, where a lot of effort is spent preparing a version which has not received approval [1]. I therefore wish to hold off the final preparation of .10 until the changes in .8.2 are approved. Please a short comment on whether my proposal (summarized below) is ok. The approval for 0.6.8.2 can follow later. Or say if you would prefer to review only the final version (0.6.10) and I will finish that off now. IMO it will be easier to review these changes as they are currently separated. * Summary of proposed actions 1) Pre-approve aptitude/0.6.8.2-1: + incremental improvements to multi-arch support and command line compatibility with APT (only what will be required for 0.6.10); + translations updated; + documentation update to cover recent changes in APT; + optional patch to use APT::Changelogs::server instead of hardcoded, Debian-specific value. 2) Upload 0.6.8.2-1 to unstable. 3) Finalize 0.6.10 (takes approximately one week). 4) Upload 0.6.10 to experimental: + based on 0.6.8.2, not 0.6.9 currently in experimental; + reverts many changes from 0.6.9 (this version has not been given the ok by the release team [1]); + restructure command line to use APT helper class which finally fixes the multi-arch syntax, compatibility with APT, and some smaller issues all at once (see [2] and [3]); + diff from 0.6.8.2 is at least 600 lines changed over many files. 5) Call for testing of 0.6.10-1. 6) Time. 7) Upload 0.6.10 to unstable and request unblock. [1] http://lists.debian.org/debian-release/2012/07/msg00044.html [2] http://bugs.debian.org/685731 [3] http://bugs.debian.org/687474 -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAN3veRdjSV8hYQi=_7umowj_3yyj1prsh5t7nx4xixltpcg...@mail.gmail.com
Bug#690196: Bug #690196: unblock: udj-desktop-client/0.6.1-1
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, Le 30/10/2012 11:41, Nathan Handler a écrit : Could we possibly get a decision on this one way or the other? Please note that your 130K filtered debdiff didn't made it to the list, that may explain why the release team didn't yet get to you (the diff size won't probably help either). Regards David -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJQkJ+VAAoJELgqIXr9/gnywTIQALzhZpDvysFeB7UVfSxHHq43 mZAvFlE7X2425ZgEGhyrZqIhRzfk6K4Y3AOQn2qn42Ubuziq1KF1CGm21NF+OfUO poi234dCKrGi3czVBHZIilG1hqptn/UndzwLwUY36X9l1DnHylbyDxtSd6tlSxOw Om7L3aL84ZLjUU7zBU2a5GKMR37CABq8QlC+9mKb22+IPn/h1WaSWixwaVr5xTK2 mbjf1rWwDGlmP8r9C7ci4WHRbho2bQs7wCsZ2XVzMqUCGB1X1yhGC3z/73J5EEJ2 c2XRD75dfXd2kDcYiQYDo/leVXsS5daxw4sJzohHHzVt+LeNI7bFWDpNE4x+zOQx 4+d0YwdhdjQNXC5XpemDxkKjI9Z8a7dRHHSQ5nn/artBN2GcV5N1WJb85fVkc8TA rFj7q0Vq0ehNnQXf77TjGMDXz0sIZ21pAIsSu92qCY/ZqNkSZlKzDit63MpUwmPV HqYVUzTb/RD1UogZBT0aEGeo2PEMlv/MjIsAGj1dAOxgAnN0GwPqwHF8NACmijXc kHku4DIkVYKQ7Tb4DTnEJt3A77/JKMBIqukEGEJ3bOLjIEh2yj5ghiEjFTY0Gw2K /h/SVfKp9oxoebqzNbB/hp/zeEod9Y4M4xB2UsiS+EzaSnANuEeyyS4H1xHpgvUo qhGR5DbsDSyRj6vEEZWu =HDip -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/50909f95.3040...@debian.org