Bug#689727: unblock: gcc-4.7-doc/4.7.2-1

2012-10-30 Thread Guo Yixuan
Control: tag -1 - moreinfo

Hi,

On 10/26/2012 02:23 AM, Adam D. Barratt wrote:
 On Fri, 2012-10-05 at 23:55 +0800, Guo Yixuan wrote:
 Please unblock package gcc-4.7-doc
 
 I guess you know already, but 4.7.2-2 got rejected by dak because,
 similarly to the no NEW packages from DMs rule, you can't upload a
 package which builds a binary that's already built from another source
 package - i.e. gcc-doc-base.
 
 The initial upload adding that binary package will need to be sponsored.
 
 Regards,
 
 Adam

Finally I uploaded gcc-4.4-doc-non-dfsg to remove gcc-doc-base, then
uploaded gcc-4.7-doc.

(diff attached)

unblock gcc-4.7-doc/4.7.2-2

Regards,

GUO Yixuan


4.7.2-1-and-4.7.2-2.diff.gz
Description: GNU Zip compressed data


Processed: Re: Bug#689727: unblock: gcc-4.7-doc/4.7.2-1

2012-10-30 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 - moreinfo
Bug #689727 [release.debian.org] unblock: gcc-4.7-doc/4.7.2-2
Removed tag(s) moreinfo.

-- 
689727: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689727
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b689727.13515783773.transcr...@bugs.debian.org



Re: Pre-upload approval for Rhythmbox-ampache RC #646642

2012-10-30 Thread Charlie Smotherman
On Mon, Oct 15, 2012 at 5:34 AM, Charlie Smotherman cj...@cableone.net wrote:
 Dear Release Team,

 With regard to bug #646642, the current state of the rhythmbox-ampache
 plugin is unusable.  With the major changes to the rhythmbox API the
 rhythmbox-ampache plugin had to almost be totally rewritten.

 I have attached a debdiff of the changes.  Would these changes be
 appropriate for inclusion into wheezy, or would it be more appropriate
 to remove rhythmbox-ampache from testing and upload the new version
 post-release?

 http://mentors.debian.net/debian/pool/main/r/rhythmbox-ampache/rhythmbox-ampache_0.11.1+svn34-1.dsc


Dear Release Team,

Has there been any movement on this?

Best Regards
Charlie Smotherman


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CAL_XWdB8tXxFLNXAkG-1YWd=a2qrskhq3bw6hatb0ti5t6d...@mail.gmail.com



Re: Bug#669213: bind9: new upstream release: 9.9

2012-10-30 Thread Ondřej Surý
On Mon, Oct 29, 2012 at 9:30 PM, LaMont Jones lam...@mmjgroup.com wrote:
 On Mon, Oct 29, 2012 at 05:22:10PM +, Adam D. Barratt wrote:
 Indeed. In any case, were the new version to be accepted in to the
 release then the appropriate route would be via unstable, not direct
 to t-p-u.

 Works for me.  I'll toss 9.8.4 into sid.  As for getting it into wheezy,
 it'll make the support life easier for the inevitable security fixes that
 will follow.  There are probably other reasons.

I can do a manual code review for debian-release team if they are interested.

I concur with LaMont that we need latest 9.8.x branch to keep the
sanity of the maintainer.

Ondrej
-- 
Ondřej Surý ond...@sury.org


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CALjhHG8gX7yfSYmK=8x+27hynhyvi-jmgz_on1ks_h9vox0...@mail.gmail.com



Re: Bug#669213: bind9: new upstream release: 9.9

2012-10-30 Thread Sebastian Wiesinger
* LaMont Jones lam...@mmjgroup.com [2012-10-29 21:38]:
 On Mon, Oct 29, 2012 at 05:22:10PM +, Adam D. Barratt wrote:
  Indeed. In any case, were the new version to be accepted in to the
  release then the appropriate route would be via unstable, not direct
  to t-p-u.
 
 Works for me.  I'll toss 9.8.4 into sid.  As for getting it into wheezy,
 it'll make the support life easier for the inevitable security fixes that
 will follow.  There are probably other reasons.

Hi,

if the route goes via unstable, could we perhaps immediately go to
9.9.2? 9.9 has the most useful new features regarding DNSSEC.

Regards

Sebastian

-- 
GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A  9D82 58A2 D94A 93A0 B9CE)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
-- Terry Pratchett, The Fifth Elephant


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121030085025.ga32...@danton.fire-world.de



Re: Pre-upload approval for Rhythmbox-ampache RC #646642

2012-10-30 Thread Adam D. Barratt

On 30.10.2012 08:51, Charlie Smotherman wrote:

On Mon, Oct 15, 2012 at 5:34 AM, Charlie Smotherman
cj...@cableone.net wrote:

Dear Release Team,

With regard to bug #646642, the current state of the 
rhythmbox-ampache

plugin is unusable.  With the major changes to the rhythmbox API the
rhythmbox-ampache plugin had to almost be totally rewritten.

I have attached a debdiff of the changes.  Would these changes be
appropriate for inclusion into wheezy, or would it be more 
appropriate

to remove rhythmbox-ampache from testing and upload the new version
post-release?


http://mentors.debian.net/debian/pool/main/r/rhythmbox-ampache/rhythmbox-ampache_0.11.1+svn34-1.dsc



Dear Release Team,

Has there been any movement on this?


That's unlikely, given that there's no sign of the mail you quote above 
ever having reached debian-release@ (it's not in the web archive either 
afaict).


You mentioned that you attached a debdiff. The most common issue in 
these cases is that the mail ends up being over lists.d.o's size limits, 
which means it's not posted to the list; it's also often a sign that the 
debdiff is too big. :)


Regards,

Adam


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/57ba48bd1a432145cc2252a347853...@mail.adsl.funky-badger.org



Re: Bug#669213: bind9: new upstream release: 9.9

2012-10-30 Thread Sebastian Wiesinger
* Ondřej Surý ond...@sury.org [2012-10-30 10:13]:
 I can do a manual code review for debian-release team if they are interested.
 
 I concur with LaMont that we need latest 9.8.x branch to keep the
 sanity of the maintainer.

That is no problem for me but could we please get a 9.9 debian source
package somewhere if there is one ready (or almost ready)? Because I
would really like to switch to 9.9 as soon as possible.

Regards

Sebastian

-- 
GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A  9D82 58A2 D94A 93A0 B9CE)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
-- Terry Pratchett, The Fifth Elephant


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121030093051.ga32...@danton.fire-world.de



Re: Bug#592539: (isc-dhcp-server: supply additional initscript for IPv6 daemon): Yet another idea how to solve this issue

2012-10-30 Thread Jan Wagner
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Andrew,

On 10/28/2012 07:54 AM, Philipp Kern wrote:
 On Fri, Oct 26, 2012 at 01:11:41PM +0200, Jan Wagner wrote:
 Could you please state, if you would accept such fix via t-p-u,
 if this was also fixed in unstable.
 
 iff this fix has spent a while in unstable and was confirmed not to
 have some unpleasant side effects that affect IPv4 usage. There's
 no way this will be accepted just into t-p-u without unstable being
 fixed.

do you think you could provide a debdiff with the changes? As stated
also by Philipp, the fix needs to be uploaded to unstable first. After
there are no problems, RM seems willing to accept the fix (depending
on how invasive it is).

Many thanks, Jan.
- -- 
Never write mail to w...@spamfalle.info, you have been warned!
- -BEGIN GEEK CODE BLOCK-
Version: 3.12
GIT d-- s+: a C+++ UL P+ L+++ E--- W+++ N+++ o++ K++ w--- O M V-
PS PE Y++
PGP++ t-- 5 X R tv- b+ DI D+ G++ e++ h r+++ y
- --END GEEK CODE BLOCK--
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQj6ua9u6Dud+QFyQRApuSAKCJZP4zxZrni0JjVI64XhE0Uh2/ngCgxUjE
fht+RPMH5W8LWGW+b464PUc=
=rAf7
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/508fab9b.4040...@debian.org



Bug#691698: marked as done (unblock: dkimpy/0.5.2-1)

2012-10-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Oct 2012 12:16:08 +0100
with message-id 508fb6f8.4080...@thykier.net
and subject line Re: Bug#691698: unblock: dkimpy/0.5.2-1
has caused the Debian Bug report #691698,
regarding unblock: dkimpy/0.5.2-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
691698: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691698
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package dkimpy

This upload fixes two grave upstream issues (one of which has
securtyy implicaitions).

unblock dkimpy/0.5.2-1
diff -Nru dkimpy-0.5.2/ChangeLog dkimpy-0.5.3/ChangeLog
--- dkimpy-0.5.2/ChangeLog	2012-06-13 06:27:37.0 +0200
+++ dkimpy-0.5.3/ChangeLog	2012-07-21 07:41:31.0 +0200
@@ -1,4 +1,8 @@
-2012-06-13 Verion 0.5.2
+UNRELEASED Version 0.5.3
+- Make key parsing error messages more specific to help troubleshooting
+  (Based on user feedback)
+
+2012-06-13 Version 0.5.2
 - Change canonicalization defaults to work around issues with different
   verification implementations https://launchpad.net/bugs/939128
 - Fully fold DKIM-Signature on sign, and ignore FWS in b= value on verify
diff -Nru dkimpy-0.5.2/debian/changelog dkimpy-0.5.3/debian/changelog
--- dkimpy-0.5.2/debian/changelog	2012-10-28 10:48:11.0 +0100
+++ dkimpy-0.5.3/debian/changelog	2012-10-28 10:48:12.0 +0100
@@ -1,3 +1,15 @@
+dkimpy (0.5.3-1) unstable; urgency=medium
+
+  * Urgency medium for multiple RC bug fixes
+  * New upstream release:
+  * Fix header unfolding and body hash calculation errors that cause
+correct DKIM signatures to fail to verify in many cases
+(Closes: #691663)
+  * Add minimum key length requirement to prevent validation of signatures
+generated with insecure keys (Closes: #691662)
+
+ -- Scott Kitterman sc...@kitterman.com  Sun, 28 Oct 2012 10:32:13 +0100
+
 dkimpy (0.5.2-1) unstable; urgency=low
 
   * New upstream release
Binary files /tmp/vhfFWHbNtB/dkimpy-0.5.2/dkim/.asn1.py.swp and /tmp/4HMA0c1mG7/dkimpy-0.5.3/dkim/.asn1.py.swp differ
diff -Nru dkimpy-0.5.2/dkim/crypto.py dkimpy-0.5.3/dkim/crypto.py
--- dkimpy-0.5.2/dkim/crypto.py	2012-06-13 06:21:56.0 +0200
+++ dkimpy-0.5.3/dkim/crypto.py	2012-07-21 07:39:51.0 +0200
@@ -112,7 +112,7 @@
 x = asn1_parse(ASN1_Object, data)
 pkd = asn1_parse(ASN1_RSAPublicKey, x[0][1][1:])
 except ASN1FormatError as e:
-raise UnparsableKeyError(str(e))
+raise UnparsableKeyError('Unparsable public key: ' + str(e))
 pk = {
 'modulus': pkd[0][0],
 'publicExponent': pkd[0][1],
@@ -129,7 +129,7 @@
 try:
 pka = asn1_parse(ASN1_RSAPrivateKey, data)
 except ASN1FormatError as e:
-raise UnparsableKeyError(str(e))
+raise UnparsableKeyError('Unparsable private key: ' + str(e))
 pk = {
 'version': pka[0][0],
 'modulus': pka[0][1],
diff -Nru dkimpy-0.5.2/dkim/__init__.py dkimpy-0.5.3/dkim/__init__.py
--- dkimpy-0.5.2/dkim/__init__.py	2012-06-13 06:21:56.0 +0200
+++ dkimpy-0.5.3/dkim/__init__.py	2012-10-27 18:17:59.0 +0200
@@ -65,6 +65,10 @@
 Relaxed = b'relaxed'# for clients passing dkim.Relaxed
 Simple = b'simple'  # for clients passing dkim.Simple
 
+def bitsize(x):
+Return size of long in bits.
+return len(bin(x)) - 2
+
 class DKIMException(Exception):
 Base class for DKIM errors.
 pass
@@ -114,8 +118,8 @@
 lastindex[h] = i
 return sign_headers
 
-FWS = r'(?:\r\n\s+)?'
-RE_BTAG = re.compile(r'([; ]b'+FWS+r'=)(?:'+FWS+r'[a-zA-Z0-9+/=])*(?:\r\n\Z)?')
+FWS = r'(?:\r?\n\s+)?'
+RE_BTAG = re.compile(r'([;\s]b'+FWS+r'=)(?:'+FWS+r'[a-zA-Z0-9+/=])*(?:\r?\n\Z)?')
 
 def hash_headers(hasher, canonicalize_headers, headers, include_headers,
  sigheader, sig):
@@ -284,7 +288,8 @@
   #: (with either \\n or \\r\\n line endings)
   #: @param logger: a logger to which debug info will be written (default None)
   #: @param signature_algorithm: the signing algorithm to use when signing
-  def __init__(self,message=None,logger=None,signature_algorithm=b'rsa-sha256'):
+  def __init__(self,message=None,logger=None,signature_algorithm=b'rsa-sha256',
+minkey=1024):
 self.set_message(message)
 if logger is None:
 logger = get_default_logger()
@@ -302,6 +307,9 @@
 self.should_not_sign = set(DKIM.SHOULD_NOT)
 #: Header fields to sign an extra time to prevent additions.
 self.frozen_sign = 

Bug#691395: unblock: opendkim/2.6.8-2

2012-10-30 Thread Niels Thykier
Control: tags -1 confirmed

JFTR, Scott and I had a look at this today (at UDS).  I asked him to
upload it to unstable and ping us once it has been in sid for a couple
of days.

~Niels


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/508fb8fa.3060...@thykier.net



Processed: Re: unblock: opendkim/2.6.8-2

2012-10-30 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 confirmed
Bug #691395 [release.debian.org] unblock: opendkim/2.6.8-2
Added tag(s) confirmed.

-- 
691395: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691395
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b691395.135159634519453.transcr...@bugs.debian.org



Bug#690660: unblock: ifupdown/0.7.3

2012-10-30 Thread Steve Langasek
On Fri, Oct 19, 2012 at 10:44:19AM +0200, Andrew Shadura wrote:
 Hello,

 Anything on the bug? May we upload the package?

The other change here looks like a reasonable, contained bugfix suitable for
release.  Yes, please upload.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
Ubuntu Developerhttp://www.debian.org/
slanga...@ubuntu.com vor...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121030133236.gb30...@virgil.dodds.net



Re: Candidates for removal from testing (results)

2012-10-30 Thread Niels Thykier
On 2012-10-28 18:47, Stefano Zacchiroli wrote:
 On Fri, Oct 26, 2012 at 12:37:38PM +0200, Niels Thykier wrote:
 ax25-apps, fabric, firmware-crystalhd, icewm-themes, ilisp, inguma,
 lustre, mingw-ocaml, noflushd, openvas-plugins-dfsg, php-crypt-gpg,
 phpgacl, python-django-piston, smbind, sorl-thumbnail, spatialite-gui,
 sugar-chat-activity-0.86, sugar-log-activity-0.86, sugar-moon-activity,
 twidge, venkman

 The removed packages accounted for about 4.4% of all RC bugs left in
 testing[0].
 
 Thanks a lot, Neil! Is that something that you plan to automate further
 (at least the warning mails, I understand you probably want to further
 inspect the individual removals), and/or run on a fixed cadence?
 

I have just send another round (only 13-14 packages this time).  I hope
I can keep it at once per week for the rest of the freeze (or till we
run out of RC buggy leaf packages).

Though I am not sure whether to keep the rate this high outside freeze.
 Maybe keep the rate with higher deadline or slow down to (e.g.)
bi-weekly mails...  Anyway, we can look at that once development of
Jessie starts. :)

~Niels


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/508fda1c.3090...@thykier.net



Re: Pre-upload approval for Rhythmbox-ampache RC #646642

2012-10-30 Thread Charlie Smotherman
On Tue, Oct 30, 2012 at 5:48 AM, Adam D. Barratt
a...@adam-barratt.org.uk wrote:
 On 30.10.2012 10:13, Charlie Smotherman wrote:

 On Tue, Oct 30, 2012 at 4:27 AM, Adam D. Barratt
 a...@adam-barratt.org.uk wrote:

 That's unlikely, given that there's no sign of the mail you quote above
 ever
 having reached debian-release@ (it's not in the web archive either
 afaict).

 You mentioned that you attached a debdiff. The most common issue in these
 cases is that the mail ends up being over lists.d.o's size limits, which
 means it's not posted to the list; it's also often a sign that the
 debdiff
 is too big. :)

 Regards,

 Adam


 There is a debdiff attached to #646642.  So how should we proceed?


 Keeping the discussion on-list would be a good start. :-p

Whoops, sorry I just hit the reply button :)


 You could gzip the debdiff, which would probably get it under the list
 server limit. On the whole, opening bugs rather than just mailing
 debian-release is also useful.


FWIW I am not a DD so RB-ampache has not been uploaded to unstable
yet, so IMHO an unblock bug is not appropriate as described in Rule
#7 at [1], hence that is why I am sending mails instead of a unblock
bug.  I am trying to follow Rule #2.

The RB-ampache plugin has been almost totally rewritten so the changes
are very intrusive.  I was just wondering if the release team
considers these intrusive changes appropriate or not.  If not I was
going to file a removal request, if yes then I will go through the
process of finding a DD to upload it and then file an unblock bug

Attached is the zipped debdiff, hopefully it will make it through this time.

[1] http://release.debian.org/wheezy/freeze_policy.html

Best regards
-- 
Charlie Smotherman


RB-ampache_debdiff.txt.tar.gz
Description: GNU Zip compressed data


Bug#691871: unblock: dancer-ircd/1.0.36-8.1

2012-10-30 Thread Thomas Preud'homme
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package dancer-ircd

The upload in unstable fix the bug #689886 by creating
/var/run/dancer-ircd at runtime instead of shipping the folder in the
package. Debdiff attached

unblock dancer-ircd/1.0.36-8.1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'stable-updates'), (500, 'testing'), 
(500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -u dancer-ircd-1.0.36/debian/init.d dancer-ircd-1.0.36/debian/init.d
--- dancer-ircd-1.0.36/debian/init.d
+++ dancer-ircd-1.0.36/debian/init.d
@@ -16,31 +16,38 @@
 DAEMON=/usr/sbin/dancer-ircd
 NAME=dancer-ircd
 DESC=dancer-ircd
+USER=dancer
+RUNDIR=/var/run/dancer-ircd
 
 test -f $DAEMON || exit 0
 
 set -e
 
+if [ ! -d ${RUNDIR} ] ; then
+	mkdir -m 0755 ${RUNDIR}
+	chown ${USER}:${USER} ${RUNDIR}
+fi
+
 case $1 in
   start)
 	echo -n Starting $DESC: 
-	start-stop-daemon --start --quiet --chuid dancer \
-		--pidfile /var/run/dancer-ircd/$NAME.pid \
+	start-stop-daemon --start --quiet --chuid ${USER} \
+		--pidfile ${RUNDIR}/$NAME.pid \
 		--exec $DAEMON -- -d /
 	echo $NAME.
 	;;
   stop)
 	echo -n Stopping $DESC: 
 	start-stop-daemon --stop --quiet --oknodo \
-		--pidfile /var/run/dancer-ircd/$NAME.pid \
+		--pidfile ${RUNDIR}/$NAME.pid \
 		--exec $DAEMON
-	rm -f /var/run/dancer-ircd/$NAME.pid
+	rm -f ${RUNDIR}/$NAME.pid
 	echo $NAME.
 	;;
   reload|force-reload)
 	echo Reloading $DESC configuration files.
 	start-stop-daemon --stop --quiet --signal 1 --oknodo \
-		--pidfile /var/run/dancer-ircd/$NAME.pid \
+		--pidfile ${RUNDIR}/$NAME.pid \
 		--exec $DAEMON
   ;;
   restart)
diff -u dancer-ircd-1.0.36/debian/dancer-ircd.dirs dancer-ircd-1.0.36/debian/dancer-ircd.dirs
--- dancer-ircd-1.0.36/debian/dancer-ircd.dirs
+++ dancer-ircd-1.0.36/debian/dancer-ircd.dirs
@@ -7 +6,0 @@
-var/run/dancer-ircd
diff -u dancer-ircd-1.0.36/debian/dancer-ircd.postinst dancer-ircd-1.0.36/debian/dancer-ircd.postinst
--- dancer-ircd-1.0.36/debian/dancer-ircd.postinst
+++ dancer-ircd-1.0.36/debian/dancer-ircd.postinst
@@ -21,7 +21,6 @@
 # limitation. Someday it will be fixed
 
 	chown $USER:$USER /var/log/dancer-ircd
-	chown $USER:$USER /var/run/dancer-ircd
 	chown $USER:$USER /var/lib/dancer-ircd
 	chown $USER:$USER /var/lib/dancer-ircd/dline.conf
 	chown $USER:$USER /var/lib/dancer-ircd/kline.conf
diff -u dancer-ircd-1.0.36/debian/changelog dancer-ircd-1.0.36/debian/changelog
--- dancer-ircd-1.0.36/debian/changelog
+++ dancer-ircd-1.0.36/debian/changelog
@@ -1,3 +1,11 @@
+dancer-ircd (1.0.36-8.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Create /var/run/dancer-ircd at runtime (Closes: #689886, thanks to Thomas
+Goirand).
+
+ -- Thomas Preud'homme robo...@debian.org  Tue, 30 Oct 2012 15:12:29 +0100
+
 dancer-ircd (1.0.36-8) unstable; urgency=medium
 
   * Bump Standards-Version to 3.7.3.


Bug#691872: tpu: package fgfs-base/2.4.0-1+deb7u1

2012-10-30 Thread David Prévot
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: tpu
Control: tags 689785 patch

Dear release team,

In order to fix an RC-bug (#689785) in fgfs-base, would you consider the
following trivial upload (patch attached) via tpu (a new upstream version
is already in Sid).

Thanks in advance, regards.

David

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (100, 
'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.5-trunk-amd64 (SMP w/1 CPU core)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru fgfs-base-2.4.0/debian/changelog fgfs-base-2.4.0/debian/changelog
--- fgfs-base-2.4.0/debian/changelog	2011-09-03 15:26:42.0 -0400
+++ fgfs-base-2.4.0/debian/changelog	2012-10-30 10:06:12.0 -0400
@@ -1,3 +1,11 @@
+fgfs-base (2.4.0-1+deb7u1) wheezy; urgency=low
+
+  * Non-maintainer upload.
+  * debian/control: Breaks: fgfs-atlas (= 0.3.1-2+b999) for fgfs-atlas.
+Closes: #689785.
+
+ -- David Prévot taf...@debian.org  Tue, 30 Oct 2012 10:04:10 -0400
+
 fgfs-base (2.4.0-1) unstable; urgency=low
 
   * New upstream release.
diff -Nru fgfs-base-2.4.0/debian/control fgfs-base-2.4.0/debian/control
--- fgfs-base-2.4.0/debian/control	2011-08-21 17:52:42.0 -0400
+++ fgfs-base-2.4.0/debian/control	2012-10-30 10:03:24.0 -0400
@@ -12,7 +12,7 @@
 Package: fgfs-base
 Architecture: all
 Depends: tzdata
-Breaks: flightgear ( 2.4.0)
+Breaks: flightgear ( 2.4.0), fgfs-atlas (= 0.3.1-2+b999)
 Description: Flight Gear Flight Simulator -- base files
  Flight Gear is a free and highly sophisticated flight simulator.
  .


Bug#691872: tpu: package fgfs-base/2.4.0-1+deb7u1

2012-10-30 Thread Niels Thykier
On 2012-10-30 16:07, David Prévot wrote:
 Package: release.debian.org
 Severity: normal
 User: release.debian@packages.debian.org
 Usertags: tpu
 Control: tags 689785 patch
 
 Dear release team,
 

Hi,

 In order to fix an RC-bug (#689785) in fgfs-base, would you consider the
 following trivial upload (patch attached) via tpu (a new upstream version
 is already in Sid).
 

Yes, but please fix the sid version before doing the tpu.

 Thanks in advance, regards.
 
 David
 
 [...]

~Niels


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/508fee5d.7090...@thykier.net



Bug#690196: Bug #690196: unblock: udj-desktop-client/0.6.1-1

2012-10-30 Thread Nathan Handler
Could we possibly get a decision on this one way or the other? I would love to 
get this issue resolved. Also, there was a bit of confusion between me and my 
sponsor. Currently, the version of udj-desktop-client in testing is the same as 
in unstable. Experimental contains the version that I would like to end up in 
testing (which is a new upstream release, 0.6.1-1~exp1). Per Rule #4 on [1], 
would it be allowed for the version in experimental to get pushed to unstable? 
Or would it be best to wait for an RT decision on this bug first?

Thanks,
Nathan Handler (nhandler)

[1] http://release.debian.org/wheezy/freeze_policy.html


signature.asc
Description: Digital signature


Re: Bug#592539: (isc-dhcp-server: supply additional initscript for IPv6 daemon): Yet another idea how to solve this issue

2012-10-30 Thread Andrew Pollock
On Tue, Oct 30, 2012 at 11:27:39AM +0100, Jan Wagner wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Hi Andrew,
 
 On 10/28/2012 07:54 AM, Philipp Kern wrote:
  On Fri, Oct 26, 2012 at 01:11:41PM +0200, Jan Wagner wrote:
  Could you please state, if you would accept such fix via t-p-u,
  if this was also fixed in unstable.
  
  iff this fix has spent a while in unstable and was confirmed not to
  have some unpleasant side effects that affect IPv4 usage. There's
  no way this will be accepted just into t-p-u without unstable being
  fixed.
 
 do you think you could provide a debdiff with the changes? As stated
 also by Philipp, the fix needs to be uploaded to unstable first. After
 there are no problems, RM seems willing to accept the fix (depending
 on how invasive it is).

I shall endeavour to work on this next Tuesday with a view to producing a
debdiff then.

I feel there's slightly more to it than just shipping an init script, the
package should also attempt to ship a DHCPv6 configuration file, but I'll
look into all of this at that time.


signature.asc
Description: Digital signature


Bug#691877: unblock: libbusiness-onlinepayment-ippay-perl/0.06-2

2012-10-30 Thread gregor herrmann
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Please unblock package libbusiness-onlinepayment-ippay-perl 0.06-2

This adds a backported patch to fix #691723.

The patch changes the IPPay gateway's server name and path.

(Note that the changes in the tests are not strictly necessary since
they are skipped on Debian but I decided to keep them, in case
someone wants to run them themselves.)

Debdiff attached.

unblock libbusiness-onlinepayment-ippay-perl/0.06-2

(Request concerning s-p-u following shortly.)

Thanks in advance,
gregor

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBCAAGBQJQkAnXAAoJELs6aAGGSaoGsRMP/RKZVDFHOEV6Tv9YfRVwWE26
9JrU3CvLZw/RkE3obVIzwau4IuzsEUFZ03gYbld2Pik07VR9np6+NxBLyMrTxCWn
VveTeNPUQxLmFQ8Cq6Ry0Cs23acspCJiiCNj97BK7xRy8f8tZAYVpCnhojk56bSA
GLPIe1F84d/lmw9muTBw6j3BWD6SzJjBCK40DidOUqeGeZQ4shdnwzRoh7jKA5eX
QE62aFebK9p9ollTdAedo4kj8W/i53p1oASDZCws7g8ZkENhD+KbYsryL8Bb1+EV
wkNr2hs3EIhGMTuduuyzYKn+9EsWiBD0fc6wso6i76oMmtNJs8rdkudrUR2NS7kM
te8G9RbedB600UePCOgjmrS6aQvldPB6Kn/IMgeiua2Q70XlZAhp63WPSA2g3U2K
7yQhTkG1UCpbq2yYANqvybUHZIdiDtgIKohcVbH2K+1mCdZfssyhsSkRpGfaWxAh
dGj3eQ3gzJOyFSewU2FVvkW/WAZtRpmEE/ngg3WoY9lwlPnlDwG7EAPc949lLPh0
OvBGcAxNyVGNcQRvm+lxRvWhw5VB4R7eV6iWXaxGjE6RiTtqsNupZj0iM7W+/lgh
AUxieSFPBhGVQJmNsO3P74zxj6C/3fBBgxbSZVWINowdrB9y0KiW+lIlIot7suIS
TxldUpldj1cyAs1461jZ
=p5ic
-END PGP SIGNATURE-
diff --git a/debian/changelog b/debian/changelog
index 625531c..1bd6ae3 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+libbusiness-onlinepayment-ippay-perl (0.06-2) unstable; urgency=low
+
+  * Team upload.
+  * New patch gateway.patch: change IPPay gateway server/path. Thanks to
+Ivan Kohler for backporting the patch. (Closes: #691723)
+
+ -- gregor herrmann gre...@debian.org  Tue, 30 Oct 2012 17:59:17 +0100
+
 libbusiness-onlinepayment-ippay-perl (0.06-1) unstable; urgency=low
 
   [ Nicholas Bamber ]
diff --git a/debian/patches/gateway.patch b/debian/patches/gateway.patch
new file mode 100644
index 000..c47bd71
--- /dev/null
+++ b/debian/patches/gateway.patch
@@ -0,0 +1,89 @@
+Description: IPPay changed the gateway's server name and path, and will soon
+ turn off the old gateway
+Origin: https://www.freeside.biz/gitweb/?p=Business-OnlinePayment-IPPay.git;a=commitdiff;h=1f19e67636476c7119cfb41920c5b176e617c697
+Bug-Debian: #691723
+Author: Ivan Kohler ivan-deb...@420.am
+Reviewed-by: gregor herrmann gre...@debian.org
+Last-Update: 2012-10-30
+Applied-Upstream: yes, 0.07
+
+--- a/IPPay.pm
 b/IPPay.pm
+@@ -45,9 +45,9 @@
+ my %opts = @_;
+ 
+ # standard B::OP methods/data
+-$self-server('gateway17.jetpay.com') unless $self-server;
++$self-server('gtwy.ippay.com') unless $self-server;
+ $self-port('443') unless $self-port;
+-$self-path('/jetpay') unless $self-path;
++$self-path('/ippay') unless $self-path;
+ 
+ $self-build_subs(qw( order_number avs_code cvv2_response
+   response_page response_code response_headers
+@@ -209,6 +209,9 @@
+   foreach ( keys ( %{($self-{_defaults})} ) ) {
+ $content{$_} = $self-{_defaults}-{$_} unless exists($content{$_});
+   }
++  if ($self-test_transaction()) {
++$content{'login'} = 'TESTTERMINAL';
++  }
+   $self-content(%content);
+ 
+   $self-required_fields(@required_fields);
+@@ -221,12 +224,6 @@
+ }
+   }
+ 
+-  if ($self-test_transaction()) {
+-$self-server('test1.jetpay.com');
+-$self-port('443');
+-$self-path('/jetpay');
+-  }
+-
+   my $transaction_id = $content{'order_number'};
+   unless ($transaction_id) {
+ my ($page, $server_response, %headers) = $self-https_get('dummy' = 1);
+@@ -391,7 +388,7 @@
+ if (  exists($response-{ActionCode})  !exists($response-{ErrMsg})) {
+   $self-error_message($response-{ResponseText});
+ }else{
+-  $self-error_message($response-{Errmsg});
++  $self-error_message($response-{ErrMsg});
+ }
+ #  }else{
+ #$self-error_message(Server Failed);
+@@ -588,6 +585,9 @@
+ 
+ =head1 COMPATIBILITY
+ 
++Debian version 0.06-2 (upstream version 0.07) changes the server name and path
++for IPPay's late 2012 update.
++
+ Business::OnlinePayment::IPPay uses IPPay XML Product Specifications version
+ 1.1.2.
+ 
+--- a/t/card.t
 b/t/card.t
+@@ -61,8 +61,8 @@
+ $tx,
+ desc  = invalid card_number,
+ is_success= 0,
+-result_code   = '912',
+-error_message = 'INVALID CARD NUMBER',
++result_code   = '900', #'912' with old jetpay gw
++error_message = 'Invalid card number.  ', #'INVALID CARD NUMBER' w/old gw
+ authorization = qr/^$/,
+ avs_code  = '',   # so rather pointless :\
+ cvv2_response = '',   # ...
+--- a/t/lib/test_account.pl
 b/t/lib/test_account.pl
+@@ -12,7 +12,7 @@
+ sub test_account {
+ my $suffix = shift || 'card';
+ 
+-my($login, $password) = 

Bug#691881: unblock: icedove/10.0.10-1

2012-10-30 Thread Moritz Muehlenhoff
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock icedove 10.0.10-1. It fixes multiple security issues.

unblock icedove/10.0.10-1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20121030172057.5049.7060.reportbug@pisco.westfalen.local



Bug#691882: unblock: python-django/1.4.2-1

2012-10-30 Thread Moritz Muehlenhoff
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hi,
please unblock python-django 1.4.2-1. It fixes
CVE-2012-4520

Cheers,
Moritz

unblock python-django/1.4.2-1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20121030172142.5945.99965.reportbug@pisco.westfalen.local



Bug#691872: tpu: package fgfs-base/2.4.0-1+deb7u1

2012-10-30 Thread David Prévot
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi,

Le 30/10/2012 11:12, Niels Thykier a écrit :
 On 2012-10-30 16:07, David Prévot wrote:

 In order to fix an RC-bug (#689785) in fgfs-base, would you consider the
 following trivial upload (patch attached) via tpu

 Yes, but please fix the sid version before doing the tpu.

Thanks! Fixed Sid version uploaded to DELAYED/2, and tpu to DELAYED/12
(to mimic the “10 days in unstable”-rule). Will ping you back in about
two weeks if everything goes smoothly.

Regards

David

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=fb95
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/5090192c.5020...@debian.org



NEW changes in stable-new

2012-10-30 Thread Debian FTP Masters
Processing changes file: apt-show-versions_0.19~squeeze1_amd64.changes
  REJECT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1ttgbc-0001ev...@franck.debian.org



Bug#691888: release.debian.org: unblock: librdmacm-1.0.15-1+deb7u1

2012-10-30 Thread Roland Dreier
Subject: unblock: librdmacm/1.0.15-1+deb7u1
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal

Please unblock package librdmacm

The attached debdiff includes the fix for CVE-2012-4516.

unblock librdmacm/1.0.15-1+deb7u1



librdmacm_1.0.15-1+deb7u1.debdiff
Description: Binary data


Re: Bug#669213: bind9: new upstream release: 9.9

2012-10-30 Thread Michael Gilbert
On Tue, Oct 30, 2012 at 5:30 AM, Sebastian Wiesinger wrote:
 * Ondřej Surý ond...@sury.org [2012-10-30 10:13]:
 I can do a manual code review for debian-release team if they are interested.

 I concur with LaMont that we need latest 9.8.x branch to keep the
 sanity of the maintainer.

 That is no problem for me but could we please get a 9.9 debian source
 package somewhere if there is one ready (or almost ready)? Because I
 would really like to switch to 9.9 as soon as possible.

That isn't really relevant to this discussion.  Note that you (or
anyone else) can prepare a 9.9 package and have a dialog with the
maintainer about preparing it for upload to experimental.

Best wishes,
Mike


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CANTw=MMH6sQjYTk7-7_X=VABnsT6XFtJ-ciQM=jg7vhcqu3...@mail.gmail.com



Processed: Re: Bug#691888: release.debian.org: unblock: librdmacm-1.0.15-1+deb7u1

2012-10-30 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + confirmed
Bug #691888 [release.debian.org] release.debian.org: unblock: 
librdmacm-1.0.15-1+deb7u1
Added tag(s) confirmed.

-- 
691888: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691888
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b691888.13516247292394.transcr...@bugs.debian.org



Bug#691888: release.debian.org: unblock: librdmacm-1.0.15-1+deb7u1

2012-10-30 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Tue, 2012-10-30 at 11:50 -0700, Roland Dreier wrote:
 Please unblock package librdmacm

For the record, the package hasn't been uploaded yet.

 The attached debdiff includes the fix for CVE-2012-4516.

diff -Nru librdmacm-1.0.15/debian/.pc/.quilt_patches 
librdmacm-1.0.15/debian/.pc/.quilt_patches
[...]
diff -Nru librdmacm-1.0.15/debian/.pc/.quilt_series 
librdmacm-1.0.15/debian/.pc/.quilt_series
[...]
diff -Nru librdmacm-1.0.15/debian/.pc/.version 
librdmacm-1.0.15/debian/.pc/.version

I'm assuming those are simply the result of the way you produced the
diff, as .pc shouldn't be in the source package. Other than that, it
looks fine; thanks.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1351624634.16094.6.ca...@jacala.jungle.funky-badger.org



Bug#691882: unblock: python-django/1.4.2-1

2012-10-30 Thread Raphael Hertzog
On Tue, 30 Oct 2012, Moritz Muehlenhoff wrote:
 please unblock python-django 1.4.2-1. It fixes
 CVE-2012-4520

Thanks Moritz for the request. I was indeed hoping for it to be
auto-unblocked due do the associated RC bug.

It's a new upstream release but a stable maintenance release
that we definitely want in wheezy. IMO the upstream maintenance rules
are sane enough (and there's a big test suite) that we should be able to
handle such updates much like PostgreSQL even after the release.

Cheers,
-- 
Raphaël Hertzog ◈ Debian Developer

Get the Debian Administrator's Handbook:
→ http://debian-handbook.info/get/


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121030193004.gb10...@x230-buxy.home.ouaza.com



Bug#691882: marked as done (unblock: python-django/1.4.2-1)

2012-10-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Oct 2012 19:28:28 +
with message-id 1351625308.16094.10.ca...@jacala.jungle.funky-badger.org
and subject line Re: Bug#691882: unblock: python-django/1.4.2-1
has caused the Debian Bug report #691882,
regarding unblock: python-django/1.4.2-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
691882: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691882
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hi,
please unblock python-django 1.4.2-1. It fixes
CVE-2012-4520

Cheers,
Moritz

unblock python-django/1.4.2-1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
---End Message---
---BeginMessage---
On Tue, 2012-10-30 at 18:21 +0100, Moritz Muehlenhoff wrote:
 please unblock python-django 1.4.2-1. It fixes
 CVE-2012-4520

It would be nicer if it could have avoided dragging a Python3 compat
class in at the same time; ah well.

+if set(';/?@=+$,').intersection(host):
+raise SuspiciousOperation('Invalid HTTP_HOST header: %s' % host)

I do wonder if that shouldn't be a whitelist instead.

Unblocked.

Regards,

Adam---End Message---


Bug#691881: marked as done (unblock: icedove/10.0.10-1)

2012-10-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Oct 2012 19:31:49 +
with message-id 1351625509.16094.11.ca...@jacala.jungle.funky-badger.org
and subject line Re: Bug#691881: unblock: icedove/10.0.10-1
has caused the Debian Bug report #691881,
regarding unblock: icedove/10.0.10-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
691881: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691881
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock icedove 10.0.10-1. It fixes multiple security issues.

unblock icedove/10.0.10-1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
---End Message---
---BeginMessage---
On Tue, 2012-10-30 at 18:20 +0100, Moritz Muehlenhoff wrote:
 Please unblock icedove 10.0.10-1. It fixes multiple security issues.

Unblocked.

Regards,

Adam---End Message---


Bug#691877: marked as done (unblock: libbusiness-onlinepayment-ippay-perl/0.06-2)

2012-10-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Oct 2012 19:33:35 +
with message-id 1351625615.16094.12.ca...@jacala.jungle.funky-badger.org
and subject line Re: Bug#691877: unblock: 
libbusiness-onlinepayment-ippay-perl/0.06-2
has caused the Debian Bug report #691877,
regarding unblock: libbusiness-onlinepayment-ippay-perl/0.06-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
691877: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691877
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Please unblock package libbusiness-onlinepayment-ippay-perl 0.06-2

This adds a backported patch to fix #691723.

The patch changes the IPPay gateway's server name and path.

(Note that the changes in the tests are not strictly necessary since
they are skipped on Debian but I decided to keep them, in case
someone wants to run them themselves.)

Debdiff attached.

unblock libbusiness-onlinepayment-ippay-perl/0.06-2

(Request concerning s-p-u following shortly.)

Thanks in advance,
gregor

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=p5ic
-END PGP SIGNATURE-
diff --git a/debian/changelog b/debian/changelog
index 625531c..1bd6ae3 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+libbusiness-onlinepayment-ippay-perl (0.06-2) unstable; urgency=low
+
+  * Team upload.
+  * New patch gateway.patch: change IPPay gateway server/path. Thanks to
+Ivan Kohler for backporting the patch. (Closes: #691723)
+
+ -- gregor herrmann gre...@debian.org  Tue, 30 Oct 2012 17:59:17 +0100
+
 libbusiness-onlinepayment-ippay-perl (0.06-1) unstable; urgency=low
 
   [ Nicholas Bamber ]
diff --git a/debian/patches/gateway.patch b/debian/patches/gateway.patch
new file mode 100644
index 000..c47bd71
--- /dev/null
+++ b/debian/patches/gateway.patch
@@ -0,0 +1,89 @@
+Description: IPPay changed the gateway's server name and path, and will soon
+ turn off the old gateway
+Origin: https://www.freeside.biz/gitweb/?p=Business-OnlinePayment-IPPay.git;a=commitdiff;h=1f19e67636476c7119cfb41920c5b176e617c697
+Bug-Debian: #691723
+Author: Ivan Kohler ivan-deb...@420.am
+Reviewed-by: gregor herrmann gre...@debian.org
+Last-Update: 2012-10-30
+Applied-Upstream: yes, 0.07
+
+--- a/IPPay.pm
 b/IPPay.pm
+@@ -45,9 +45,9 @@
+ my %opts = @_;
+ 
+ # standard B::OP methods/data
+-$self-server('gateway17.jetpay.com') unless $self-server;
++$self-server('gtwy.ippay.com') unless $self-server;
+ $self-port('443') unless $self-port;
+-$self-path('/jetpay') unless $self-path;
++$self-path('/ippay') unless $self-path;
+ 
+ $self-build_subs(qw( order_number avs_code cvv2_response
+   response_page response_code response_headers
+@@ -209,6 +209,9 @@
+   foreach ( keys ( %{($self-{_defaults})} ) ) {
+ $content{$_} = $self-{_defaults}-{$_} unless exists($content{$_});
+   }
++  if ($self-test_transaction()) {
++$content{'login'} = 'TESTTERMINAL';
++  }
+   $self-content(%content);
+ 
+   $self-required_fields(@required_fields);
+@@ -221,12 +224,6 @@
+ }
+   }
+ 
+-  if ($self-test_transaction()) {
+-$self-server('test1.jetpay.com');
+-$self-port('443');
+-$self-path('/jetpay');
+-  }
+-
+   my $transaction_id = $content{'order_number'};
+   unless ($transaction_id) {
+ my ($page, $server_response, %headers) = $self-https_get('dummy' = 1);
+@@ -391,7 +388,7 @@
+ if (  exists($response-{ActionCode})  !exists($response-{ErrMsg})) {
+   $self-error_message($response-{ResponseText});
+ }else{
+-  $self-error_message($response-{Errmsg});
++  $self-error_message($response-{ErrMsg});
+ }
+ #  }else{
+ #$self-error_message(Server Failed);
+@@ 

Re: Please, migrate libopenjpeg2 to testing due to a multi-arch important problem

2012-10-30 Thread Michael Gilbert
On Mon, Oct 29, 2012 at 12:32 AM, Thiago Bellini Ribeiro wrote:
 There's a very important problem on alsa/pulseaudio on multi-arch.
 I did a little search, and it appears that this package (more
 especificaly, libopenjpeg2) is the last dependency missing in
 multi-arch for us to be able to install libasound2-plugins:i386.

http://bugs.debian.org/681717

Best wishes,
Mike


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CANTw=MM-vsYs+eKyxQP3hQcUCNFYcHesrzCNTVDMkUQVE=v...@mail.gmail.com



Bug#691885: pu: package libbusiness-onlinepayment-ippay-perl/0.05~02-2+squeeze1

2012-10-30 Thread Adam D. Barratt
Control: tags -1 + squeeze confirmed

On Tue, 2012-10-30 at 18:42 +0100, gregor herrmann wrote:
 We'd like to update libbusiness-onlinepayment-ippay-perl in squeeze
 because of #691723: change gateway server name and path.
 
 I've prepared an update for 0.05~02-2 that includes the backported
 changes (kindly provided by Ivan Kohler). Debdiff attached.

Please go ahead; thanks.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1351628049.16094.15.ca...@jacala.jungle.funky-badger.org



Processed: Re: Bug#691885: pu: package libbusiness-onlinepayment-ippay-perl/0.05~02-2+squeeze1

2012-10-30 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + squeeze confirmed
Bug #691885 [release.debian.org] pu: package 
libbusiness-onlinepayment-ippay-perl/0.05~02-2+squeeze1
Added tag(s) squeeze and confirmed.

-- 
691885: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691885
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b691885.135162814326019.transcr...@bugs.debian.org



Bug#691647: unblock: schroot/1.6.4-1

2012-10-30 Thread Roger Leigh
On Sun, Oct 28, 2012 at 12:53:08PM +, Roger Leigh wrote:
 On Sun, Oct 28, 2012 at 12:39:28AM +0100, Roger Leigh wrote:
  Please unblock package schroot
  
  I have uploaded schroot 1.6.4-1 to unstable.  This contains some
  documentation for wheezy upgrade issues, plus some fixes for
  serious and important bugs in wheezy:
 
 I had to make an additional 3 line change to fix building on
 hurd and kfreebsd (attached)

And an additional change to allow for symlinks in paths on the
host.

unblock schroot/1.6.4-3

-- 
  .''`.  Roger Leigh
 : :' :  Debian GNU/Linuxhttp://people.debian.org/~rleigh/
 `. `'   schroot and sbuild  http://alioth.debian.org/projects/buildd-tools
   `-GPG Public Key  F33D 281D 470A B443 6756 147C 07B3 C8BC 4083 E800
diff -Nru schroot-1.6.4/debian/changelog schroot-1.6.4/debian/changelog
--- schroot-1.6.4/debian/changelog  2012-10-28 11:53:31.0 +
+++ schroot-1.6.4/debian/changelog  2012-10-29 20:06:47.0 +
@@ -1,3 +1,10 @@
+schroot (1.6.4-3) unstable; urgency=low
+
+  * schroot-mount canonicalises both the base path and full
+path when sanity checking mountpoints (Closes: #691694).
+
+ -- Roger Leigh rle...@debian.org  Mon, 29 Oct 2012 19:25:30 +
+
 schroot (1.6.4-2) unstable; urgency=low
 
   * sbuild::chroot_facet_session_clonable: Include
diff -Nru schroot-1.6.4/debian/patches/1.6.4-3 
schroot-1.6.4/debian/patches/1.6.4-3
--- schroot-1.6.4/debian/patches/1.6.4-31970-01-01 01:00:00.0 
+0100
+++ schroot-1.6.4/debian/patches/1.6.4-32012-10-29 20:07:33.0 
+
@@ -0,0 +1,41 @@
+Description: 1.6.4-3
+ schroot (1.6.4-3) unstable; urgency=low
+ .
+   * schroot-mount canonicalises both the base path and full
+ path when sanity checking mountpoints (Closes: #691694).
+Author: Roger Leigh rle...@debian.org
+Bug-Debian: http://bugs.debian.org/691694
+
+---
+--- schroot-1.6.4.orig/bin/schroot-mount/schroot-mount-main.cc
 schroot-1.6.4/bin/schroot-mount/schroot-mount-main.cc
+@@ -96,9 +96,15 @@ main::resolve_path (std::string const m
+   if (absmountpoint.empty() || absmountpoint[0] != '/')
+ absmountpoint = std::string(/) + absmountpoint;
+ 
++  char *resolved_path = realpath(opts-mountpoint.c_str(), 0);
++  if (!resolved_path)
++throw error(opts-mountpoint, REALPATH, strerror(errno));
++  std::string basepath(resolved_path);
++  std::free(resolved_path);
++
+   std::string directory(opts-mountpoint + absmountpoint);
+   // Canonicalise path to remove any symlinks.
+-  char *resolved_path = realpath(directory.c_str(), 0);
++  resolved_path = realpath(directory.c_str(), 0);
+   if (resolved_path == 0)
+ {
+   // The path is either not present or is an invalid link.  If
+@@ -137,9 +143,9 @@ main::resolve_path (std::string const m
+   // If the link was absolute (i.e. points somewhere on the host,
+   // outside the chroot, make sure that this is modified to be
+   // inside.
+-  if (directory.size()  opts-mountpoint.size() ||
+-  directory.substr(0,opts-mountpoint.size()) != opts-mountpoint)
+-directory = opts-mountpoint + directory;
++  if (directory.size()  basepath.size() ||
++  directory.substr(0,basepath.size()) != basepath)
++directory = basepath + directory;
+ 
+   return directory;
+ }
diff -Nru schroot-1.6.4/debian/patches/series 
schroot-1.6.4/debian/patches/series
--- schroot-1.6.4/debian/patches/series 2012-10-28 11:53:59.0 +
+++ schroot-1.6.4/debian/patches/series 2012-10-29 20:07:06.0 +
@@ -1 +1,2 @@
 1.6.4-2
+1.6.4-3


Bug#691885: pu: package libbusiness-onlinepayment-ippay-perl/0.05~02-2+squeeze1

2012-10-30 Thread gregor herrmann
On Tue, 30 Oct 2012 20:14:09 +, Adam D. Barratt wrote:

  I've prepared an update for 0.05~02-2 that includes the backported
  changes (kindly provided by Ivan Kohler). Debdiff attached.
 Please go ahead; thanks.

Thanks, uploaded.

(Thanks for the unblock of the other version, too.)


Cheers,
gregor

-- 
 .''`.  Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06
 : :' : Debian GNU/Linux user, admin, and developer  -  http://www.debian.org/
 `. `'  Member of VIBE!AT  SPI, fellow of the Free Software Foundation Europe
   `-   NP: Nick Drake: The Thoughts Of Mary Jane


signature.asc
Description: Digital signature


Processed: Re: Bug#691781: unblock: kfreebsd-9/9.0-7

2012-10-30 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 - moreinfo
Bug #691781 [release.debian.org] unblock: kfreebsd-9/9.0-7
Removed tag(s) moreinfo.
 tags -1 + confirmed d-i
Bug #691781 [release.debian.org] unblock: kfreebsd-9/9.0-7
Added tag(s) d-i and confirmed.

-- 
691781: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691781
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b691781.135163054811584.transcr...@bugs.debian.org



Bug#691781: unblock: kfreebsd-9/9.0-7

2012-10-30 Thread Adam D. Barratt
Control: tags -1 - moreinfo
Control: tags -1 + confirmed d-i

On Mon, 2012-10-29 at 18:57 +, Adam D. Barratt wrote:
 On Mon, 2012-10-29 at 17:53 +0100, Christoph Egger wrote:
  Please unblock package kfreebsd-9
  
   debian/changelog
 * Pick SVN 239447 from FreeBSD 9-STABLE to fix a remote DoS
   vulnerability of SCTP (CVE-2012-3549) (Closes: #686962)
 
 It also appears to drop all of the udebs?

-8 was uploaded fixing that. I'm happy to unblock it, but it'll need a
d-i ack.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1351630456.16094.17.ca...@jacala.jungle.funky-badger.org



Bug#689727: marked as done (unblock: gcc-4.7-doc/4.7.2-2)

2012-10-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Oct 2012 21:32:34 +
with message-id 1351632754.16094.18.ca...@jacala.jungle.funky-badger.org
and subject line Re: Bug#689727: unblock: gcc-4.7-doc/4.7.2-1
has caused the Debian Bug report #689727,
regarding unblock: gcc-4.7-doc/4.7.2-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
689727: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689727
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package gcc-4.7-doc

GCC needs updated documents, but it can only be distributed in non-free,
not in src:gcc-4.7. So I wish this package to go into wheezy. This
package contains document for gcc-4.7, with all Debian patches in
gcc-4.7: 4.7.2-2.

Most of revelant reasons are in the unblock request for gcc-4.6-doc[1],
so I'm not elaborating here.

[1] http://bugs.debian.org/689726

unblock gcc-4.7-doc/4.7.2-1

Best regards,

Guo Yixuan
---End Message---
---BeginMessage---
On Tue, 2012-10-30 at 14:26 +0800, Guo Yixuan wrote:
 On 10/26/2012 02:23 AM, Adam D. Barratt wrote:
  On Fri, 2012-10-05 at 23:55 +0800, Guo Yixuan wrote:
  Please unblock package gcc-4.7-doc
  
  I guess you know already, but 4.7.2-2 got rejected by dak because,
  similarly to the no NEW packages from DMs rule, you can't upload a
  package which builds a binary that's already built from another source
  package - i.e. gcc-doc-base.

Now unblocked; thanks.

Regards,

Adam---End Message---


Bug#689967: marked as done (unblock: gcc-doc-defaults/5:4)

2012-10-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Oct 2012 21:36:44 +
with message-id 1351633004.16094.19.ca...@jacala.jungle.funky-badger.org
and subject line Re: Bug#689967: unblock: gcc-doc-defaults/5:4
has caused the Debian Bug report #689967,
regarding unblock: gcc-doc-defaults/5:4
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
689967: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689967
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Dear Release Team,

Please unblock package gcc-doc-defaults

GCC's documents need an update, as we have gcc-4.6/4.7 as default
version (depends on arch). This upload update manpage/info symlinks from
gcc-4.4 to gcc-4.6/4.7, and also fixed some lintian warnings.

gcc-4.6-doc and gcc-4.7-doc need to be unblocked before this
package.[1][2]

[1] http://bugs.debian.org/689726
[2] http://bugs.debian.org/689727

debdiff between 5:3 and 5:4 attached at the end.

unblock gcc-doc-defaults/5:4

Regards,

Guo Yixuan


diff -Nru gcc-doc-defaults-3/debian/changelog
gcc-doc-defaults-4/debian/changelog
--- gcc-doc-defaults-3/debian/changelog 2010-05-03 04:47:22.0 +0800
+++ gcc-doc-defaults-4/debian/changelog 2012-10-06 05:04:51.0 +0800
@@ -1,3 +1,30 @@
+gcc-doc-defaults (5:4) unstable; urgency=low
+
+  * Updated defaults to 4.6 and 4.7 versions. (Closes: #618351,
+#651290, #684082)
+  * debian/rules:
+- choose default version based on symlinks provided by gcc-defaults.
+- added targets: build-arch, build-dep.
+  * debian/control(.in):
+- Bumped policy version to 3.9.4.
+- Added myself to uploaders.
+- Added git repo urls in Vcs-*.
+- Build-dep on cpp, gfortran, gnat, gcj-jdk for getting default
+  versions at build-time.
+- Use replaces and breaks to overwrite files in older packages,
instead of
+  conflicts.
+- Added Homepage field.
+  * Use set -e in *.preinst scripts.
+  * Added lintian override files:
+- for arch-dependent document packages,
+- for symlinks to files in other packages.
+  * Improved README.
+
+  [ Sponsor Steffen Moeller ]
+  * Added DMUA flag for Guo Yixuan.
+
+ -- Guo Yixuan culu@gmail.com  Thu, 04 Oct 2012 11:19:36 +0800
+
 gcc-doc-defaults (5:3) unstable; urgency=low

   * Make all symlinks to point to 4.4 versions.
diff -Nru gcc-doc-defaults-3/debian/control
gcc-doc-defaults-4/debian/control
--- gcc-doc-defaults-3/debian/control   2010-05-03 04:45:04.0 +0800
+++ gcc-doc-defaults-4/debian/control   2012-10-06 05:03:35.0 +0800
@@ -3,14 +3,21 @@
 Priority: optional
 Maintainer: Debian GCC Maintainers debian-...@lists.debian.org
 Uploaders:
- Nikita V. Youshchenko yo...@debian.org
-Build-Depends: debhelper ( 5)
-Standards-Version: 3.7.3
+ Nikita V. Youshchenko yo...@debian.org,
+ Guo Yixuan culu@gmail.com
+Build-Depends: debhelper ( 5),
+ cpp, gfortran, gnat, gcj-jdk
+Standards-Version: 3.9.4
+DM-Upload-Allowed: yes
+Homepage: http://gcc.gnu.org/
+Vcs-Browser:
http://git.debian.org/?p=users/yixuan-guest/gcc-doc-defaults.git
+Vcs-Git: git://git.debian.org/users/yixuan-guest/gcc-doc-defaults.git

 Package: gcc-doc
 Architecture: any
-Depends: gcc-4.4-doc (= 4.4.4.nf1-1), ${misc:Depends}
-Conflicts: gcc ( 4:4.1.1-7), g++ ( 4:4.1.1-7)
+Depends: gcc-4.7-doc (= 4.7.2-1), ${misc:Depends}
+Replaces: gcc ( 4:4.1.1-7), g++ ( 4:4.1.1-7)
+Breaks: gcc ( 4:4.1.1-7), g++ ( 4:4.1.1-7)
 Description: documentation for the GNU compilers (gcc, gobjc, g++)
  This is the dependency package that should install manual pages
  and documentation for Debian default version of GNU compilers.
@@ -19,8 +26,9 @@

 Package: cpp-doc
 Architecture: any
-Depends: cpp-4.4-doc (= 4.4.4.nf1-1), ${misc:Depends}
-Conflicts: cpp ( 4:4.1.1-7)
+Depends: cpp-4.7-doc (= 4.7.2-1), ${misc:Depends}
+Replaces: cpp ( 4:4.1.1-7)
+Breaks: cpp ( 4:4.1.1-7)
 Description: documentation for the GNU C preprocessor (cpp)
  This is the dependency package that should install manual page
  and documentation for Debian default version of GNU C preprocessor.
@@ -29,8 +37,9 @@

 Package: gfortran-doc
 Architecture: any
-Depends: gfortran-4.4-doc (= 4.4.4.nf1-1), ${misc:Depends}
-Conflicts: gfortran ( 4:4.1.1-7)
+Depends: gfortran-4.7-doc (= 4.7.2-1), ${misc:Depends}
+Replaces: gfortran ( 4:4.1.1-7)
+Breaks: gfortran ( 4:4.1.1-7)
 Description: documentation for the GNU Fortran Compiler (gfortran)
  This is the dependency package that should install manual page
  and documentation for Debian default version of GNU Fortran 

sorry

2012-10-30 Thread Nicholas Bamber
It looks like the debdiff is too large to send via normal means. You'll
either have to review it yourself or give me specific instructions for
delivering it.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/50904b56.5070...@periapt.co.uk



Re: Request to update libconfig-model-perl for testing (take 2)

2012-10-30 Thread Adam D. Barratt
On Mon, 2012-10-29 at 20:20 +0100, Dominique Dumont wrote:
 Le Monday 29 October 2012 19:38:59, vous avez écrit :
   +libconfig-model-perl (2.021-4) wheezy; urgency=low
  
  2.021-3+deb7u1 would be more conventional here, to indicate that the
  upload didn't follow the usual progression via unstable.
 
 ok.
 
 About 10 days after the new version hits unstable, assuming everything goes 
 well, should I ping you back on this thread before releasing to tpu or just 
 upload ?

If the diff is the same as you previously posted (with the potential
change of version number as discussed above) please feel free to go
ahead with the tpu upload at the appropriate time.

Regards,

Adam


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1351634013.16094.22.ca...@jacala.jungle.funky-badger.org



procps 3.3.4 and 3.3.5

2012-10-30 Thread Craig Small
Hi,
  I'm trying to make sure procps 3.3.4-1 is not going to be
progressed along any further.  The API changed which means if procps is
upgraded and libproc0 isn't, then some procps commands don't work well.

I've reported a critical bug [1] on procps (it stops the boot process)
but 3.3.5 is stuck because the package name has changed to libproc1.

Ideally I'd like 3.3.4 gone but I think its too late for that, so some
things depending on libproc0 may go strange.

 - Craig
[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691847
-- 
Craig Small VK2XLZ   http://enc.com.au/  csmall at : enc.com.au
Debian GNU/Linux http://www.debian.org/  csmall at : debian.org
GPG fingerprint: 5D2F B320 B825 D939 04D2  0519 3938 F96B DF50 FEA5


signature.asc
Description: Digital signature


Bug#691888: release.debian.org: unblock: librdmacm-1.0.15-1+deb7u1

2012-10-30 Thread Roland Dreier
  diff -Nru librdmacm-1.0.15/debian/.pc/.quilt_patches 
  librdmacm-1.0.15/debian/.pc/.quilt_patches
  [...]
  diff -Nru librdmacm-1.0.15/debian/.pc/.quilt_series 
  librdmacm-1.0.15/debian/.pc/.quilt_series
  [...]
  diff -Nru librdmacm-1.0.15/debian/.pc/.version 
  librdmacm-1.0.15/debian/.pc/.version
  
  I'm assuming those are simply the result of the way you produced the
  diff, as .pc shouldn't be in the source package. Other than that, it
  looks fine; thanks.

Sorry, yeah, my mistake.  Verified that my local version doesn't contain
them in the actual source package any more.

I'll go ahead and upload.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/87r4ofbniz@shaolin.home.digitalvampire.org



Freeze exception request for intel-microcode and amd64-microcode

2012-10-30 Thread Henrique de Moraes Holschuh
References: bugs #690285 and #690286

The versions of both intel-microcode and amd64-microcode currently in Wheezy
can trigger a nasty bug in initramfs-tools that renders the system
unbootable.  The packages in unstable work around this issue.

The bug will only happen when $TMPDIR (usually /tmp) is mounted noexec at
the time update-initramfs is run.  While this is quite unusual, it did hit
one user (bug #689301).

In addition to the changes fixing that issue, the intel-microcode package
also contains a new upstream release.  Intel issued a microcode hotfix for
all current i5/i7/Xeon processors in 2012-10-01.  Due to the very unusual
nature of this microcode update (it is labeled 20120606-v2 by Intel, a
strong hint that it is fixing mishaps in the microcode release currently in
Wheezy), and the inclusion of microcode updates even to very high-end Xeon
E7 processors, it is likely fixing something very relevant.

The packages have been 20 days in unstable already, without any issues
reported.

Please consider unblocking intel-microcode (#690286) and amd64-microcode
(#690285).

-- 
  One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie. -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121030231447.ga9...@khazad-dum.debian.net



Bug#691894: unblock: apache2/2.2.22-12

2012-10-30 Thread Arno Töll
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package apache2.

This upload mitigates impact of the so called CRIME attacks to SSL. That's
primarily a browser issue and no vulnerability in Apache's code. Having that 
said,
this patch disables SSL compression globally by default so that vulnerable
browsers can't be exploited while talking to a web server with this patch.

Please note, we are planning to upload the very same patch to s-p-u (same patch,
just adapted to Squeeze's Apache version and in dpatch format). Do you agree 
with
our plans with that? Alternatively we can discuss this in a separate bug if you 
prefer.

This is the patch:

diff --git a/debian/changelog b/debian/changelog
index 665b678..3d4d908 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,13 @@
+apache2 (2.2.22-12) unstable; urgency=low
+
+  * Backport mod_ssl SSLCompression on|off flag from upstream. The default is
+off. This mitigates impact of CRIME attacks. Fixes:
+- handling the CRIME attack (Closes: #689936)
+- make it possible to disable ssl compression in apache2 mod_ssl
+  (Closes: #674142)
+
+ -- Arno Töll a...@debian.org  Wed, 31 Oct 2012 00:23:59 +0100
+
 apache2 (2.2.22-11) unstable; urgency=low
 
   * Be more careful regarding link attacks when purging the cache disk
diff --git a/debian/patches/disable-ssl-compression.patch 
b/debian/patches/disable-ssl-compression.patch
new file mode 100644
index 000..6878f68
--- /dev/null
+++ b/debian/patches/disable-ssl-compression.patch
@@ -0,0 +1,121 @@
+From: Bjoern Jacke debianb...@j3e.de
+Subject: Allow mod_ssl to disable ssl compression
+
+Patch submitted upstream, merged into 2.2.24. This patch adds a Compression
+on|off directive to mod_ssl.
+
+Origin: upstream, https://issues.apache.org/bugzilla/attachment.cgi?id=28804
+Bug: https://issues.apache.org/bugzilla/show_bug.cgi?id=53219
+Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=674142
+
+--- a/modules/ssl/mod_ssl.c
 b/modules/ssl/mod_ssl.c
+@@ -146,6 +146,9 @@
+ ('[+-][SSLv3|TLSv1|TLSv1.1|TLSv1.2] ...' - see manual))
+ SSL_CMD_SRV(HonorCipherOrder, FLAG,
+ Use the server's cipher ordering preference)
++SSL_CMD_SRV(Compression, FLAG,
++Enable SSL level compression
++(`on', `off'))
+ SSL_CMD_SRV(InsecureRenegotiation, FLAG,
+ Enable support for insecure renegotiation)
+ SSL_CMD_ALL(UserName, TAKE1,
+--- a/modules/ssl/ssl_engine_config.c
 b/modules/ssl/ssl_engine_config.c
+@@ -178,6 +178,9 @@
+ #ifdef HAVE_FIPS
+ sc-fips   = UNSET;
+ #endif
++#ifndef OPENSSL_NO_COMP
++sc-compression= UNSET;
++#endif
+ 
+ modssl_ctx_init_proxy(sc, p);
+ 
+@@ -275,6 +278,9 @@
+ #ifdef HAVE_FIPS
+ cfgMergeBool(fips);
+ #endif
++#ifndef OPENSSL_NO_COMP
++cfgMergeBool(compression);
++#endif
+ 
+ modssl_ctx_cfg_merge_proxy(base-proxy, add-proxy, mrg-proxy);
+ 
+@@ -708,6 +714,23 @@
+ 
+ }
+ 
++const char *ssl_cmd_SSLCompression(cmd_parms *cmd, void *dcfg, int flag)
++{
++#if !defined(OPENSSL_NO_COMP)
++SSLSrvConfigRec *sc = mySrvConfig(cmd-server);
++#ifndef SSL_OP_NO_COMPRESSION
++const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY);
++if (err)
++return This version of openssl does not support configuring 
++   compression within VirtualHost sections.;
++#endif
++sc-compression = flag ? TRUE : FALSE;
++return NULL;
++#else
++return Setting Compression mode unsupported; not implemented by the SSL 
library;
++#endif
++}
++
+ const char *ssl_cmd_SSLHonorCipherOrder(cmd_parms *cmd, void *dcfg, int flag)
+ {
+ #ifdef SSL_OP_CIPHER_SERVER_PREFERENCE
+--- a/modules/ssl/ssl_engine_init.c
 b/modules/ssl/ssl_engine_init.c
+@@ -532,6 +532,18 @@
+ }
+ #endif
+ 
++
++#ifndef OPENSSL_NO_COMP
diff --git a/debian/changelog b/debian/changelog
index 665b678..3d4d908 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,13 @@
+apache2 (2.2.22-12) unstable; urgency=low
+
+  * Backport mod_ssl SSLCompression on|off flag from upstream. The default is
+off. This mitigates impact of CRIME attacks. Fixes:
+- handling the CRIME attack (Closes: #689936)
+- make it possible to disable ssl compression in apache2 mod_ssl
+  (Closes: #674142)
+
+ -- Arno Töll a...@debian.org  Wed, 31 Oct 2012 00:23:59 +0100
+
 apache2 (2.2.22-11) unstable; urgency=low
 
   * Be more careful regarding link attacks when purging the cache disk
diff --git a/debian/patches/disable-ssl-compression.patch 
b/debian/patches/disable-ssl-compression.patch
new file mode 100644
index 000..6878f68
--- /dev/null
+++ b/debian/patches/disable-ssl-compression.patch
@@ -0,0 +1,121 @@
+From: Bjoern Jacke debianb...@j3e.de
+Subject: Allow mod_ssl to disable ssl compression
+
+Patch submitted upstream, merged into 2.2.24. This patch adds a Compression

Bug#691894: unblock: apache2/2.2.22-12

2012-10-30 Thread Arno Töll
Err, the diff looks bad. This one is a better diff.



-- 
with kind regards,
Arno Töll
IRC: daemonkeeper on Freenode/OFTC
GnuPG Key-ID: 0x9D80F36D
diff --git a/debian/changelog b/debian/changelog
index 665b678..3d4d908 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,13 @@
+apache2 (2.2.22-12) unstable; urgency=low
+
+  * Backport mod_ssl SSLCompression on|off flag from upstream. The default is
+off. This mitigates impact of CRIME attacks. Fixes:
+- handling the CRIME attack (Closes: #689936)
+- make it possible to disable ssl compression in apache2 mod_ssl
+  (Closes: #674142)
+
+ -- Arno Töll a...@debian.org  Wed, 31 Oct 2012 00:23:59 +0100
+
 apache2 (2.2.22-11) unstable; urgency=low
 
   * Be more careful regarding link attacks when purging the cache disk
diff --git a/debian/patches/disable-ssl-compression.patch b/debian/patches/disable-ssl-compression.patch
new file mode 100644
index 000..6878f68
--- /dev/null
+++ b/debian/patches/disable-ssl-compression.patch
@@ -0,0 +1,121 @@
+From: Bjoern Jacke debianb...@j3e.de
+Subject: Allow mod_ssl to disable ssl compression
+
+Patch submitted upstream, merged into 2.2.24. This patch adds a Compression
+on|off directive to mod_ssl.
+
+Origin: upstream, https://issues.apache.org/bugzilla/attachment.cgi?id=28804
+Bug: https://issues.apache.org/bugzilla/show_bug.cgi?id=53219
+Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=674142
+
+--- a/modules/ssl/mod_ssl.c
 b/modules/ssl/mod_ssl.c
+@@ -146,6 +146,9 @@
+ ('[+-][SSLv3|TLSv1|TLSv1.1|TLSv1.2] ...' - see manual))
+ SSL_CMD_SRV(HonorCipherOrder, FLAG,
+ Use the server's cipher ordering preference)
++SSL_CMD_SRV(Compression, FLAG,
++Enable SSL level compression
++(`on', `off'))
+ SSL_CMD_SRV(InsecureRenegotiation, FLAG,
+ Enable support for insecure renegotiation)
+ SSL_CMD_ALL(UserName, TAKE1,
+--- a/modules/ssl/ssl_engine_config.c
 b/modules/ssl/ssl_engine_config.c
+@@ -178,6 +178,9 @@
+ #ifdef HAVE_FIPS
+ sc-fips   = UNSET;
+ #endif
++#ifndef OPENSSL_NO_COMP
++sc-compression= UNSET;
++#endif
+ 
+ modssl_ctx_init_proxy(sc, p);
+ 
+@@ -275,6 +278,9 @@
+ #ifdef HAVE_FIPS
+ cfgMergeBool(fips);
+ #endif
++#ifndef OPENSSL_NO_COMP
++cfgMergeBool(compression);
++#endif
+ 
+ modssl_ctx_cfg_merge_proxy(base-proxy, add-proxy, mrg-proxy);
+ 
+@@ -708,6 +714,23 @@
+ 
+ }
+ 
++const char *ssl_cmd_SSLCompression(cmd_parms *cmd, void *dcfg, int flag)
++{
++#if !defined(OPENSSL_NO_COMP)
++SSLSrvConfigRec *sc = mySrvConfig(cmd-server);
++#ifndef SSL_OP_NO_COMPRESSION
++const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY);
++if (err)
++return This version of openssl does not support configuring 
++   compression within VirtualHost sections.;
++#endif
++sc-compression = flag ? TRUE : FALSE;
++return NULL;
++#else
++return Setting Compression mode unsupported; not implemented by the SSL library;
++#endif
++}
++
+ const char *ssl_cmd_SSLHonorCipherOrder(cmd_parms *cmd, void *dcfg, int flag)
+ {
+ #ifdef SSL_OP_CIPHER_SERVER_PREFERENCE
+--- a/modules/ssl/ssl_engine_init.c
 b/modules/ssl/ssl_engine_init.c
+@@ -532,6 +532,18 @@
+ }
+ #endif
+ 
++
++#ifndef OPENSSL_NO_COMP
++if (sc-compression != TRUE) {
++#ifdef SSL_OP_NO_COMPRESSION
++/* OpenSSL = 1.0 only */
++SSL_CTX_set_options(ctx, SSL_OP_NO_COMPRESSION);
++#elif OPENSSL_VERSION_NUMBER = 0x00908000L
++sk_SSL_COMP_zero(SSL_COMP_get_compression_methods());
++#endif
++}
++#endif
++
+ #ifdef SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION
+ if (sc-insecure_reneg == TRUE) {
+ SSL_CTX_set_options(ctx, SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION);
+--- a/modules/ssl/ssl_private.h
 b/modules/ssl/ssl_private.h
+@@ -64,6 +64,11 @@
+ #define HAVE_TLSV1_X
+ #endif
+ 
++#if !defined(OPENSSL_NO_COMP)  !defined(SSL_OP_NO_COMPRESSION) \
++ OPENSSL_VERSION_NUMBER  0x00908000L
++#define OPENSSL_NO_COMP
++#endif
++
+ #include ssl_util_ssl.h
+ 
+ /** The #ifdef macros are only defined AFTER including the above
+@@ -495,6 +500,9 @@
+ #ifdef HAVE_FIPS
+ BOOL fips;
+ #endif
++#ifndef OPENSSL_NO_COMP
++BOOL compression;
++#endif
+ };
+ 
+ /**
+@@ -551,6 +559,7 @@
+ const char  *ssl_cmd_SSLCARevocationPath(cmd_parms *, void *, const char *);
+ const char  *ssl_cmd_SSLCARevocationFile(cmd_parms *, void *, const char *);
+ const char  *ssl_cmd_SSLHonorCipherOrder(cmd_parms *cmd, void *dcfg, int flag);
++const char  *ssl_cmd_SSLCompression(cmd_parms *, void *, int flag);
+ const char  *ssl_cmd_SSLVerifyClient(cmd_parms *, void *, const char *);
+ const char  *ssl_cmd_SSLVerifyDepth(cmd_parms *, void *, const char *);
+ const char  *ssl_cmd_SSLSessionCache(cmd_parms *, void *, const char *);
diff --git a/debian/patches/series b/debian/patches/series
index 6113b65..e7b9b3f 100644

Bug#686993: marked as done (unblock: ledgersmb/1.3.21-2)

2012-10-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Oct 2012 21:52:11 -0400
with message-id 1351648331.2390.11.camel@svrpc
and subject line Closing bug # 686993
has caused the Debian Bug report #686993,
regarding unblock: ledgersmb/1.3.21-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
686993: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686993
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org 
Severity: normal 
User: release.debian@packages.debian.org 
Usertags: freeze-exception

Please unblock package ledgersmb/1.3.21-2.

 I feel (both as the package maintainer and as part of upstream) that
the combination of the packaging and upstream changes represented by
this package is the necessary next step in increasing the quality of the
LedgerSMB package in wheezy without trying to do too much at one time:

- The LedgerSMB Debian package is a leaf package; i.e., there are no
other packages that depend on it.
- This package includes a fix for an issue with a System/Defaults denial
of service advisory (#678291); the recommendation is that all users
upgrade from previous versions.
- This package includes fixes for upstream es_AR.po fatal errors
(#678281) as well as an update to the translation. 

More details of the related changes from the version currently in wheezy
(1.3.18-2) to the version recently uploaded to sid (1.3.21-2) include
the following:

* Make indentation consistent in all maintainer scripts.
* Changes to debian/patches/:
 - Add 20_Makefile-PL.patch for a version reference issue in
   Makefile.PL.
 - Update 10_httpdconf.patch templates path
to /var/lib/ledgersmb/templates.

* Changes for debian/ledgersmb.preinst:
 - Correct version being checked against for css/templates softlinks
   removal.
 - Update how the old_version variable is being used for the version
   checks.
* Changes for debian/control:
 - Add accidently removed libtemplate-plugin-latex-perl back into
   Recommends.
 - Add accidently removed libimage-size-perl back into Suggests.

* New upstream release. (Closes: #682274)
 - Fix for System/Defaults denial of service advisory. (Closes:
   #683357)
 - Fixes for es_AR translation, duplicate keys removed. (Closes:
   #678281)
 - Fixed discarded input/bad label on 1.2 upgrade screen. (Closes:
   #677098)
* Changes to debian/patches/:
 - Updated 05_confdir.patch for the new fs_cssdir configuration item.
* Changes for debian/control:
 - Update the URL in the Vcs-Browser entry.
* Changes for debian/ledgersmb.preinst:
 - Add setting of an old_version variable for use in the script.
 - Move templates/* to /var/lib/ledgersmb if necessary during upgrade.
 - Remove old ledgersmb css and/or templates symbolic links as
   necessary.
* Changes for debian/ledgersmb.postinst:
 - Update source path for when creating working css  templates
   directories.
* Remove setting symbolic link to /var/lib/ledgersmb/css in
  ledgersmb.links.
* Move installation of css  templates directories using
  ledgersmb.examples to using ledgersmb.install.
* Update path for the distribution templates directory in debian/rules.

unblock ledgersmb/1.3.21-2



Robert James Clay
j...@rocasa.us
---End Message---
---BeginMessage---
   I expect that a new package version, v1.3.23-1, of LedgerSMB will be
available soon in unstable and that version brings with it even more
changes than the v1.3.21-1 version I originally requested this unblock
for.  As it appears it is unlikely to be approved of at this time due
to changes, closing the request to have its migration to testing
unblocked.  Will work on back porting the then current version of
LedgerSMB after wheezy is released.


RJ Clay
j...@rocasa.us---End Message---


Bug#689154: unblock: gnunet/0.9.3-4

2012-10-30 Thread David Prévot
Control: unblock 687875 by 689154
Control: unblock 687881 by 689154
Control: unblock 687883 by 689154
Control: unblock 688486 by 689154
Control: unblock 688590 by 689154
Control: unblock 686238 by 689154
Control: unblock 684997 by 689154
Control: unblock 688484 by 689154
Control: unblock 690860 by 689154
Control: unblock 684317 by 689154
The release team is not preventing you to fix those bugs in the archive
(starting with sid or experimental), so removing those useless blocks.

Hi,

Le 18/10/2012 16:32, Bertrand Marc a écrit :
 Le 13/10/2012 18:27, Adam D. Barratt a écrit :
 + * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881,
 + #687883).

 What happens if a user has the broken version installed already and then
 upgrades to -4? As far as I can tell, nothing in the new diff helps
 resolve the issues which have already occurred, as opposed to stopping
 them recurring.
 
 You're right, nothing helps resolve the issues which have already occurred.
 It can only happen on new installation of gnunet on testing during the last
 6 months though, so upgrades from Squeeze will go smoothly. And the issue
 can be easily fixed by reinstalling gnunet.

Reinstalling won't work. One will need to remove the package, and
install it again. Why don't you simply fix those new bugs with a bunch
of .preinst script (or keep the symlinks, and fix the upgrade from
Squeeze in a bunch of .postinst scripts)?


For each PACKAGE in gnunet-dev gnunet-server gnunet-dbg gnunet-client
gnunet, you could either add the following preinst (just replace PACKAGE):

-- PACKAGE.preinst ---

#! /bin/sh
set -e

# Delete symlink that will be replaced by a directory
docdir=/usr/share/doc/PACKAGE
if [ -L $docdir ]; then
rm doc$dir 2/dev/null
fi

#DEBHELPER#

exit 0

---


or rather keep the symlinks, and add the five following postinst (just
replace PACKAGE):

-- PACKAGE.postinst ---

#!/bin/sh
set -e

# Replace documentation directory with symlink
docdir=/usr/share/doc/PACKAGE
if [ -d $docdir ]  [ ! -L $docdir ]; then
if rmdir $docdir 2/dev/null; then
ln -sf gnunet-common $docdir
fi
fi

#DEBHELPER#

exit 0

---


I noticed a charset mess while testing your package in a French
localized environment, and just pushed another tiny change in your Git
repository. It complies with the forth point of the Wheezy Freeze Policy
(“translation […] fixes”) [0].

0: http://release.debian.org/wheezy/freeze_policy.html

Regards

David



signature.asc
Description: OpenPGP digital signature


Processed: Re: Bug#689154: unblock: gnunet/0.9.3-4

2012-10-30 Thread Debian Bug Tracking System
Processing control commands:

 unblock 687875 by 689154
Bug #687875 [gnunet-server] gnunet-server: copyright file missing after upgrade 
(policy 12.5)
687875 was blocked by: 689154
687875 was not blocking any bugs.
Removed blocking bug(s) of 687875: 689154
 unblock 687881 by 689154
Bug #687881 [gnunet-client] gnunet-client: copyright file missing after upgrade 
(policy 12.5)
687881 was blocked by: 689154
687881 was not blocking any bugs.
Removed blocking bug(s) of 687881: 689154
 unblock 687883 by 689154
Bug #687883 [gnunet-dbg] gnunet-dbg: copyright file missing after upgrade 
(policy 12.5)
687883 was blocked by: 689154
687883 was not blocking any bugs.
Removed blocking bug(s) of 687883: 689154
 unblock 688486 by 689154
Bug #688486 [src:gnunet] gnunet: Patch for kfreebsd
688486 was blocked by: 689154
688486 was not blocking any bugs.
Removed blocking bug(s) of 688486: 689154
 unblock 688590 by 689154
Bug #688590 [src:gnunet] src:gnunet: ftbfs on ia64 (/lib vs /usr/lib confusion)
688590 was blocked by: 689154
688590 was not blocking any bugs.
Removed blocking bug(s) of 688590: 689154
 unblock 686238 by 689154
Bug #686238 [gnunet-server] gnunet-server: Access from `unbound UNIX client' 
denied to service `namestore'
686238 was blocked by: 689154
686238 was not blocking any bugs.
Removed blocking bug(s) of 686238: 689154
 unblock 684997 by 689154
Bug #684997 [gnunet-common] Wrong libgcrypt11 dependency version
684997 was blocked by: 689154
684997 was not blocking any bugs.
Removed blocking bug(s) of 684997: 689154
 unblock 688484 by 689154
Bug #688484 [src:gnunet] gnunet: uninstallable on hurd-i386
688484 was blocked by: 689154
688484 was not blocking any bugs.
Removed blocking bug(s) of 688484: 689154
 unblock 690860 by 689154
Bug #690860 [src:gnunet] gnunet-server, gnunet-client: shouldn't depend on 
gettext 
690860 was blocked by: 689154
690860 was not blocking any bugs.
Removed blocking bug(s) of 690860: 689154
 unblock 684317 by 689154
Bug #684317 [gnunet-server] gnunet-server: Unable to publish: Access from 
`unbound UNIX client' denied to service `datastore'
684317 was blocked by: 689154
684317 was not blocking any bugs.
Removed blocking bug(s) of 684317: 689154

-- 
684317: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684317
684997: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684997
686238: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686238
687875: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687875
687881: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687881
687883: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687883
688484: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688484
688486: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688486
688590: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688590
689154: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689154
690860: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690860
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b689154.135165031317300.transcr...@bugs.debian.org



Processed: Re: Bug#687492: unblock: aptitude/0.6.8.2-1 (pre-approve)

2012-10-30 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 - moreinfo
Bug #687492 [release.debian.org] unblock: aptitude/0.6.8.2-1 (pre-approve)
Removed tag(s) moreinfo.

-- 
687492: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687492
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b687492.13516534505229.transcr...@bugs.debian.org



Bug#687492: unblock: aptitude/0.6.8.2-1 (pre-approve)

2012-10-30 Thread Daniel Hartwig
Control: tags -1 - moreinfo

On 16 October 2012 17:37, Daniel Hartwig mand...@gmail.com wrote:
 On 24 September 2012 09:32, Daniel Hartwig mand...@gmail.com wrote:
 On 24 September 2012 05:10, Adam D. Barratt a...@adam-barratt.org.uk wrote:
 Assuming I'm reading the above correctly and there'll be another unblock
 request after this one,

 Correct.

 do you have an estimate as to how much longer it
 will be before that version will be ready?

 The work is mostly complete, just a matter of merging various wip
 branches and touch up: I estimate within one week of the pre-approval
 of the current request.
 […]
 I plan to upload .10 to experimental with .8.2 going to unstable.
 This will provide feedback which may be useful for when the time comes
 to review the rather large diff.

 Hello

 Two weeks since my last response.  I believe it addressed Adam's
 query.  Any updates regarding pre-approval for this course of action?

 Regards

Following up one final time.  Removing moreinfo tag as per my previous
responses.

I would like to avoid entering the same situation as 0.6.9, where a
lot of effort is spent preparing a version which has not received
approval [1].  I therefore wish to hold off the final preparation of
.10 until the changes in .8.2 are approved.

Please a short comment on whether my proposal (summarized below) is
ok.  The approval for 0.6.8.2 can follow later.  Or say if you would
prefer to review only the final version (0.6.10) and I will finish
that off now.  IMO it will be easier to review these changes as they
are currently separated.

* Summary of proposed actions

1) Pre-approve aptitude/0.6.8.2-1:
 + incremental improvements to multi-arch support and command line
   compatibility with APT (only what will be required for 0.6.10);
 + translations updated;
 + documentation update to cover recent changes in APT;
 + optional patch to use APT::Changelogs::server instead of hardcoded,
   Debian-specific value.
2) Upload 0.6.8.2-1 to unstable.
3) Finalize 0.6.10 (takes approximately one week).
4) Upload 0.6.10 to experimental:
 + based on 0.6.8.2, not 0.6.9 currently in experimental;
 + reverts many changes from 0.6.9 (this version has not been given
   the ok by the release team [1]);
 + restructure command line to use APT helper class which finally
   fixes the multi-arch syntax, compatibility with APT, and some
   smaller issues all at once (see [2] and [3]);
 + diff from 0.6.8.2 is at least 600 lines changed over many files.
5) Call for testing of 0.6.10-1.
6) Time.
7) Upload 0.6.10 to unstable and request unblock.

[1] http://lists.debian.org/debian-release/2012/07/msg00044.html
[2] http://bugs.debian.org/685731
[3] http://bugs.debian.org/687474


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CAN3veRdjSV8hYQi=_7umowj_3yyj1prsh5t7nx4xixltpcg...@mail.gmail.com



Bug#690196: Bug #690196: unblock: udj-desktop-client/0.6.1-1

2012-10-30 Thread David Prévot
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi,

Le 30/10/2012 11:41, Nathan Handler a écrit :
 Could we possibly get a decision on this one way or the other?

Please note that your 130K filtered debdiff didn't made it to the list,
that may explain why the release team didn't yet get to you (the diff
size won't probably help either).

Regards

David

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=HDip
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/50909f95.3040...@debian.org