Bug#794992: RM: neutron-vpnaas/2015.1.0-2

2015-08-08 Thread Scott Kitterman
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm

The python-sqlalchemy transition was all set to finish today when the
maintainer (zigo) uploaded neutron-vpnaas and so set the whole thing back
by five days (at least, who knows what else he uploads in the mean time).

If we can just remove this one package from testing, then sqlalchemy and the
rest of the rdepends will migrate.  That'll get rid of the risk of something
else getting uploaded and delaying it further.  In the meantime, this
shouldn't be gone from testing long unless it's otherwise buggy.

Scott K


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20150809051855.12117.85945.reportbug@kitterma-E6430



Bug#794989: nmu: xsdcxx_4.0.0-1

2015-08-08 Thread Diane Trout
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

nmu xsdcxx_4.0.0-1 . ALL . unstable . -m "Rebuild for new libstdc++6"

This is happening because of the libstdc++6 transition.

Technically this is only happening because libstdc++6 declared a breaks
xsdcxx-4.0.0-1 because of https://bugs.debian.org/cgi-
bin/bugreport.cgi?bug=793289

xsd has no library for the change in C++ API to cause trouble with so the g++
bug shouldn't be relevant. I was able to download version in 4.0.0-1, unpacked
it manually, and was still able to run the application. For further testing I
built my own test binNMU and used it to generate code for libkolabxml

Diane

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (955, 'unstable'), (950, 'testing'), (500, 'stable-updates'),
(500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.0.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20150809042212.13027.25746.report...@myrada.ghic.org



I: Bug#794466: Virtualbox might not be suitable for Stretch

2015-08-08 Thread Gianfranco Costamagna
Hi Frank and Release Team,


>Oracle at this moment maintains a 4.0.x 4.1.x 4.2.x 4.3.x 5.0.x
>branches where security fixes seems to be addressed all.
>
>(virtualbox-ose from o-o-s still needs some pinpoint fixes)


virtualbox-ose is at version 3.2.10, and the last release from [1]
is 3.2.28, and released two months ago.

Does this mean that CVE gets fixed on 3.2.x too?


[1] https://www.virtualbox.org/wiki/Changelog-3.2

thanks,

Gianfranco


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/1473982024.1394279.1439069293649.javamail.ya...@mail.yahoo.com



Re: Bug#794466: Virtualbox might not be suitable for Stretch

2015-08-08 Thread Jonathan Wiltshire
On Sat, Aug 08, 2015 at 09:23:31PM +, Gianfranco Costamagna wrote:
> Virtualbox suffers of  many security issues in Debian,
> specially because Upstream (Oracle) refuses to give
> patches for CVEs, and (you can see in the Debian bug
> 794466 an analysis of the Oracle policy and discussion)
> this makes difficult to handle security uploads in stable
> releases.
> 
> 
> The only patch they give for a CVE is "upgrade to the
> next version of the stable branch", and extracting patches
> from the code is not trivial, specially for such a huge package.

You should bring this up with the security team and see whether they are
satisfied that previous upstream releases have been of sufficient quality
for this to be feasible in the future.


-- 
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51



signature.asc
Description: Digital signature


Re: Bug#794466: Virtualbox might not be suitable for Stretch

2015-08-08 Thread Gianfranco Costamagna
Hi Debian Release Team,


TLTR:


Virtualbox suffers of  many security issues in Debian,
specially because Upstream (Oracle) refuses to give
patches for CVEs, and (you can see in the Debian bug
794466 an analysis of the Oracle policy and discussion)
this makes difficult to handle security uploads in stable
releases.


The only patch they give for a CVE is "upgrade to the
next version of the stable branch", and extracting patches
from the code is not trivial, specially for such a huge package.


My request, based on Markus mail quoted below

(something I pondered already, I was just waiting for somebody
to do the first move), would be to have a sort of permission
to do the updates to newer stable releases in s-p-u.

e.g.


On oldstable, version 4.1.18-dfsg-2+deb7u5 might become 4.1.30

on stable version 4.3.18 might become 4.3.30 and so on.

Oracle at this moment maintains a 4.0.x 4.1.x 4.2.x 4.3.x 5.0.x
branches where security fixes seems to be addressed all.

(virtualbox-ose from o-o-s still needs some pinpoint fixes)


So, even if the debdiff might look scary, we might want to
update at least to the correspondant stable branch
to fix bugs and security issues.

Honestly I *never* found a regression in Virtualbox maintainance
releases, neither in backports, and the huge popcon makes difficult
to just let the package disappear.

I maintain Virtualbox since ~2013 or so, and I can say that the
maintainance branches does not require new dependencies
(at least they never did, the only build-dependencies we added
in maintainance releases were due to packaging bugs that had to
be fixed, not something that upstream added)



Thanks for your attention,

(note: I did not find any reference on google about this sort
of exceptions, please feel free to point me on some documentation,
if adding -release to the bug is not enough, or feel free to reassing
to the best meta package bug)


Gianfranco

>Hi Gianfranco,
>thanks for your summary.
>
>Although I'm not involved in maintaining virtualbox, still a few
>thoughts:
>
>* What would that mean for Jessie updates?
>* Isn't that basically the same problem we have with MySQL,
>  or even Iceweasel?
>
>So I think the question is either drop, or work with upstream releases,
>from which I'd personally prefer.
>
>Even popcon isn't too bad: 
>https://qa.debian.org/popcon.php?package=virtualbox
>
>Leaving users with the possibility to use upstream packages is also not
>very attractive.
>
>Just me few cents :)
>Markus 


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/674443697.1373720.1439069011956.javamail.ya...@mail.yahoo.com



Bug#794962: wheezy-pu: package openafs/1.6.1-3+deb7u3

2015-08-08 Thread Benjamin Kaduk
Package: release.debian.org
Severity: normal
Tags: wheezy
User: release.debian@packages.debian.org
Usertags: pu

The security update to the linux kernel (3.2.65-1+deb7u2) changed the
KPI by moving d_alias into the d_u union, which causes subsequent
(re)build attempts of the openafs kernel module to fail.  (Existing
openafs kernel modules continued to work due to clever work by
the kernel maintainer.)  This situation was maintained without great
incident until the upload of openafs 1.6.1-3+deb7u3 to the security
repo, which cause most people to attempt to build a new openafs kernel
module and fail.  Two grave bugs (780865 and 794224) reflect that situation.

We had to deal with this problem for jessie back in February, but I
didn't have enough time to fix it for wheezy then.  The jessie updates
also included a fix for a bug causing potential data corruption in
mmapped files; I included the fix for that (778851) in this w-p-u as well.

A debdiff between deb7u3 (from the security repo) and my proposed deb7u4
is attached.

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
diff -Nru openafs-1.6.1/debian/changelog openafs-1.6.1/debian/changelog
--- openafs-1.6.1/debian/changelog	2015-07-30 06:27:51.0 -0400
+++ openafs-1.6.1/debian/changelog	2015-08-08 14:23:47.0 -0400
@@ -1,3 +1,12 @@
+openafs (1.6.1-3+deb7u4) wheezy-proposed-updates; urgency=medium
+
+  * Fix the kernel module build when d_alias is in the d_u union
+(Closes: #780865, Closes: #794224)
+to d_alias being a member of the d_u union.
+  * Fix potential file corruption of mmapped files (Closes: #778851)
+
+ -- Benjamin Kaduk   Sat, 08 Aug 2015 14:19:04 -0400
+
 openafs (1.6.1-3+deb7u3) wheezy-security; urgency=high
 
   * Apply upstream security patches from the 1.6.13 release (thanks to
diff -Nru openafs-1.6.1/debian/patches/debian-changes openafs-1.6.1/debian/patches/debian-changes
--- openafs-1.6.1/debian/patches/debian-changes	2015-07-30 06:34:05.0 -0400
+++ openafs-1.6.1/debian/patches/debian-changes	2015-08-08 14:27:33.0 -0400
@@ -8,6 +8,16 @@
 
 For full commit history and separated commits, see the packaging Git
 repository.
+--- openafs-1.6.1.orig/acinclude.m4
 openafs-1.6.1/acinclude.m4
+@@ -793,6 +793,7 @@ case $AFS_SYSNAME in *_linux* | *_umlinu
+ 		 AC_CHECK_LINUX_STRUCT([backing_dev_info], [name],
+    [backing-dev.h])
+ 		 AC_CHECK_LINUX_STRUCT([ctl_table], [ctl_name], [sysctl.h])
++		 AC_CHECK_LINUX_STRUCT([dentry], [d_u.d_alias], [dcache.h])
+ 		 AC_CHECK_LINUX_STRUCT([inode], [i_alloc_sem], [fs.h])
+ 		 AC_CHECK_LINUX_STRUCT([inode], [i_blkbits], [fs.h])
+ 		 AC_CHECK_LINUX_STRUCT([inode], [i_blksize], [fs.h])
 --- openafs-1.6.1.orig/configure.ac
 +++ openafs-1.6.1/configure.ac
 @@ -50,14 +50,20 @@ MAKE_KRB5="#"
@@ -47,6 +57,301 @@
   RRA_LIB_KRB5_RESTORE])
  AC_SUBST([BUILD_KRB5])
  AC_SUBST([MAKE_KRB5])
+--- openafs-1.6.1.orig/src/afs/LINUX/osi_compat.h
 openafs-1.6.1/src/afs/LINUX/osi_compat.h
+@@ -27,6 +27,10 @@
+ # endif
+ #endif
+ 
++#if defined(STRUCT_DENTRY_HAS_D_U_D_ALIAS)
++# define d_alias d_u.d_alias
++#endif
++
+ #ifndef HAVE_LINUX_DO_SYNC_READ
+ static inline int
+ do_sync_read(struct file *fp, char *buf, size_t count, loff_t *offp) {
+--- openafs-1.6.1.orig/src/afs/LINUX/osi_prototypes.h
 openafs-1.6.1/src/afs/LINUX/osi_prototypes.h
+@@ -79,6 +79,9 @@ extern void osi_VM_FlushPages(struct vca
+ extern void osi_VM_Truncate(struct vcache *avc, int alen,
+ 			afs_ucred_t *acred);
+ 
++/* osi_vcache.c */
++extern void osi_ResetRootVCache(afs_uint32 volid);
++
+ /* osi_vfsops.c */
+ extern void vattr2inode(struct inode *ip, struct vattr *vp);
+ extern int afs_init_inodecache(void);
+--- openafs-1.6.1.orig/src/afs/LINUX/osi_vcache.c
 openafs-1.6.1/src/afs/LINUX/osi_vcache.c
+@@ -13,6 +13,8 @@
+ #include "afs/sysincludes.h"/*Standard vendor system headers */
+ #include "afsincludes.h"/*AFS-based standard headers */
+ 
++#include "osi_compat.h"
++
+ int
+ osi_TryEvictVCache(struct vcache *avc, int *slept, int defersleep) {
+ int code;
+@@ -139,3 +141,64 @@ osi_PostPopulateVCache(struct vcache *av
+ vSetType(avc, VREG);
+ }
+ 
++/**
++ * osi_ResetRootVCache - Reset the root vcache
++ * Reset the dentry associated with the afs root.
++ * Called from afs_CheckRootVolume when we notice that
++ * the root volume ID has changed.
++ *
++ * @volid: volume ID for the afs root
++ */
++void
++osi_ResetRootVCache(afs_uint32 volid)
++{
++struct vrequest *treq = NULL;
++struct vattr vattr;
++cred_t *credp;
++struct dentry *dp;
++struct vcache *vcp;
++struct inode *root = AFSTOV(afs_globalVp);
++
++afs_rootFid.Fid.Volume = volid;
++afs_rootFid.Fid.Vn

Bug#794940: jessie-pu: package sparse/0.4.5~rc1-2~deb8u1

2015-08-08 Thread Andreas Beckmann
Package: release.debian.org
Severity: normal
Tags: jessie
User: release.debian@packages.debian.org
Usertags: pu

sparse FTBFS in jessie and sid since the llvm default version was updated
to 3.5. Unfortunately nobody rebuilt contrib and non-free before the
release so this was not noticed in time :-(


Andreas
diff -Nru sparse-0.4.5~rc1/debian/.gitignore sparse-0.4.5~rc1/debian/.gitignore
--- sparse-0.4.5~rc1/debian/.gitignore	1970-01-01 01:00:00.0 +0100
+++ sparse-0.4.5~rc1/debian/.gitignore	2015-08-08 13:34:52.0 +0200
@@ -0,0 +1 @@
+!patches
diff -Nru sparse-0.4.5~rc1/debian/changelog sparse-0.4.5~rc1/debian/changelog
--- sparse-0.4.5~rc1/debian/changelog	2013-06-15 01:10:11.0 +0200
+++ sparse-0.4.5~rc1/debian/changelog	2015-08-08 13:34:52.0 +0200
@@ -1,3 +1,25 @@
+sparse (0.4.5~rc1-2~deb8u1) jessie; urgency=medium
+
+  * QA upload.
+  * Rebuild for jessie.
+
+ -- Andreas Beckmann   Sat, 08 Aug 2015 13:33:23 +0200
+
+sparse (0.4.5~rc1-2) unstable; urgency=medium
+
+  [ Andreas Beckmann ]
+  * QA upload.
+  * Set maintainer to Debian QA Group.  (See #794643)
+  * Fix Homepage and Vcs-Browser URLs.
+  * Refresh patch to apply without fuzz.
+
+  [ Uwe Kleine-König ]
+  * Cherry-pick commit from upstream to fix build failure with llvm-3.5.
+  * Temporarily build-depend on libedit-dev because llvm-config claims to need
+that.  (Closes: #793197)
+
+ -- Andreas Beckmann   Sat, 08 Aug 2015 13:17:27 +0200
+
 sparse (0.4.5~rc1-1) unstable; urgency=low
 
   [ Uwe Kleine-König ]
diff -Nru sparse-0.4.5~rc1/debian/control sparse-0.4.5~rc1/debian/control
--- sparse-0.4.5~rc1/debian/control	2013-06-15 01:09:43.0 +0200
+++ sparse-0.4.5~rc1/debian/control	2015-08-08 13:34:52.0 +0200
@@ -1,21 +1,22 @@
 Source: sparse
-Maintainer: Pierre Habouzit 
+Maintainer: Debian QA Group 
 Uploaders: Loïc Minier 
 Section: non-free/devel
 Priority: optional
 Build-Depends: debhelper (>= 9),
libxml2-dev,
libgtk2.0-dev,
-   llvm-dev (>= 1:3.0~)
+   llvm-dev (>= 1:3.0~),
+   libedit-dev
 Standards-Version: 3.9.4
 Vcs-Git: git://anonscm.debian.org/collab-maint/sparse.git
-Vcs-Browser: http://anonscm.debian.org/gitweb/?p=collab-maint/sparse.git
+Vcs-Browser: https://anonscm.debian.org/cgit/collab-maint/sparse.git
 XS-autobuild: yes
+Homepage: https://sparse.wiki.kernel.org/
 
 Package: sparse
 Architecture: any
 Depends: ${misc:Depends}, ${shlibs:Depends}, ${perl:Depends}
-Homepage: http://sparse.wiki.kernel.org/index.php/Main_Page
 Description: semantic parser of source files
  Sparse, the semantic parser, provides a compiler frontend capable of
  parsing most of ANSI C as well as many GCC extensions, and a collection
diff -Nru sparse-0.4.5~rc1/debian/patches/ld-as-needed.patch sparse-0.4.5~rc1/debian/patches/ld-as-needed.patch
--- sparse-0.4.5~rc1/debian/patches/ld-as-needed.patch	2013-06-15 00:42:08.0 +0200
+++ sparse-0.4.5~rc1/debian/patches/ld-as-needed.patch	2015-08-08 13:34:52.0 +0200
@@ -37,4 +37,4 @@
 +LDFLAGS += -Wl,--no-as-needed $(shell llvm-config --ldflags) -Wl,--as-needed
  LLVM_CFLAGS := $(shell llvm-config --cflags | sed -e "s/-DNDEBUG//g")
  LLVM_LIBS := $(shell llvm-config --libs)
- PROGRAMS += $(LLVM_PROGS)
+ LLVM_LIBS += $(shell llvm-config --system-libs 2>/dev/null)
diff -Nru sparse-0.4.5~rc1/debian/patches/series sparse-0.4.5~rc1/debian/patches/series
--- sparse-0.4.5~rc1/debian/patches/series	2013-06-15 00:49:59.0 +0200
+++ sparse-0.4.5~rc1/debian/patches/series	2015-08-08 13:34:52.0 +0200
@@ -1,3 +1,4 @@
+sparse-llvm-Fix-LLVM-3.5-linker-errors.patch
 shut-down-upstream-version-detection.patch
 ld-as-needed.patch
 pass-down-cflags.patch
diff -Nru sparse-0.4.5~rc1/debian/patches/sparse-llvm-Fix-LLVM-3.5-linker-errors.patch sparse-0.4.5~rc1/debian/patches/sparse-llvm-Fix-LLVM-3.5-linker-errors.patch
--- sparse-0.4.5~rc1/debian/patches/sparse-llvm-Fix-LLVM-3.5-linker-errors.patch	1970-01-01 01:00:00.0 +0100
+++ sparse-0.4.5~rc1/debian/patches/sparse-llvm-Fix-LLVM-3.5-linker-errors.patch	2015-08-08 13:34:52.0 +0200
@@ -0,0 +1,25 @@
+From: Omar Sandoval 
+Date: Wed, 24 Sep 2014 14:01:01 -0700
+Subject: [PATCH] sparse-llvm: Fix LLVM 3.5 linker errors
+
+llvm-config 3.5 no longer lists the non-LLVM libraries needed for linkage when
+passed --libs. The --system-libs flag was added for this purpose. This adds
+these libraries while silently doing nothing for older versions of LLVM.
+
+Signed-off-by: Omar Sandoval 
+Signed-off-by: Christopher Li 
+Origin: commit:d92353b4eacbac54d693edd62fb565f071e3ba86
+---
+ Makefile | 1 +
+ 1 file changed, 1 insertion(+)
+
+--- a/Makefile
 b/Makefile
+@@ -87,6 +87,7 @@ $(LLVM_PROGS): LD := g++
+ LDFLAGS += $(shell llvm-config --ldflags)
+ LLVM_CFLAGS := $(shell llvm-config --cflags | sed -e "s/-DNDEBUG//g")
+ LLVM_LIBS := $(shell llvm-config --libs)
++LLVM_LIBS += $(shell llvm-config --system-libs 2>/dev/null)
+ PROGRAMS

Processed: severity of 791746 is normal, retitle 791746 to transition: libindi

2015-08-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 791746 normal
Bug #791746 [release.debian.org] FTBFS with GCC 5: changes to symbols file
Severity set to 'normal' from 'serious'
> retitle 791746 transition: libindi
Bug #791746 [release.debian.org] FTBFS with GCC 5: changes to symbols file
Changed Bug title to 'transition: libindi' from 'FTBFS with GCC 5: changes to 
symbols file'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
791746: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791746
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.c.143903198911024.transcr...@bugs.debian.org



Processed: tagging 791170, block 791170 with 777842 777977 778160

2015-08-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 791170 + pending
Bug #791170 [release.debian.org] libsigc++-2.0: library transition is needed 
when GCC 5 is
Added tag(s) pending.
> block 791170 with 777842 777977 778160
Bug #791170 [release.debian.org] libsigc++-2.0: library transition is needed 
when GCC 5 is
791170 was blocked by: 790756
791170 was not blocking any bugs.
Added blocking bug(s) of 791170: 777977, 778160, and 777842
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
791170: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791170
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.c.14390314048137.transcr...@bugs.debian.org



Re: Proposal for possible mail to the Qt/KDE team in order to try to help with the transition

2015-08-08 Thread Julien Cristau
On Thu, Aug  6, 2015 at 20:32:21 -0300, Lisandro Damián Nicanor Pérez Meyer 
wrote:

> Dear RT: I prepared:
> 
> https://titanpad.com/diCx29YOqT
> 
> (conveniently ending with "qt") as a possible message to the Qt/KDE team to 
> try to help with the ongoing transition. It would be just cool if some of you 
> can review the text and tell me whether it's ok or not.
> 
Seems fine to me.

Cheers,
Julien


signature.asc
Description: Digital signature


Processed: user release.debian....@packages.debian.org, usertagging 791746, block 791746 with 790756 ...

2015-08-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> user release.debian@packages.debian.org
Setting user to release.debian@packages.debian.org (was m...@debian.org).
> usertags 791746 + transition
There were no usertags set.
Usertags are now: transition.
> block 791746 with 790756
Bug #791746 [libindi] FTBFS with GCC 5: changes to symbols file
791746 was not blocked by any bugs.
791746 was not blocking any bugs.
Added blocking bug(s) of 791746: 790756
> reassign 791746 release.debian.org
Bug #791746 [libindi] FTBFS with GCC 5: changes to symbols file
Bug reassigned from package 'libindi' to 'release.debian.org'.
No longer marked as found in versions 0.9.7-1.
Ignoring request to alter fixed versions of bug #791746 to the same values 
previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
791746: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791746
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.c.14390301381185.transcr...@bugs.debian.org



Processed: Re: Bug#794925: RM: asciinema/0.9.8-1

2015-08-08 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 wontfix
Bug #794925 [release.debian.org] RM: asciinema/0.9.8-1
Added tag(s) wontfix.
> close -1
Bug #794925 [release.debian.org] RM: asciinema/0.9.8-1
Marked Bug as done

-- 
794925: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794925
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.b794925.143902685714677.transcr...@bugs.debian.org



Bug#794925: RM: asciinema/0.9.8-1

2015-08-08 Thread Jonathan Wiltshire
Control: tag -1 wontfix
Control: close -1

On Sat, Aug 08, 2015 at 04:28:49PM +0800, gustavo panizzo (gfa) wrote:
> please do not removal (bug #7942980) , as stated in the bug
> a workaround exist to use the package, besides the package
> is broken for a change on the public server,
> private servers continue to work fine.
> 
> I'm working on a new version of the package but it may take a while as
> it changed from python to go.

Then please follow up to that bug, don't go opening new ones. (I think you
made a mistake in the bug number.)

-- 
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51



signature.asc
Description: Digital signature


Bug#794925: RM: asciinema/0.9.8-1

2015-08-08 Thread gustavo panizzo (gfa)
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm

please do not removal (bug #7942980) , as stated in the bug
a workaround exist to use the package, besides the package
is broken for a change on the public server,
private servers continue to work fine.

I'm working on a new version of the package but it may take a while as
it changed from python to go.

-- System Information:
Debian Release: stretch/sid
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.0.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150808082849.6445.30818.reportbug@io



Bug#791170: libsigc++-2.0: library transition may be needed when GCC 5 is the default

2015-08-08 Thread Michael Biebl
Hi,


On Fri, 03 Jul 2015 13:12:16 + Matthias Klose  wrote:
> Package: src:libsigc++-2.0


libsigc++-2.0 has been uploaded in the mean time and built successfully
everywhere. The auto tracker at [1] looks ok to me.

Please schedule the binNMUs (excluding glibmm2.4, which will get a
sourceful upload as glibmm2.4_2.44.0-3.


Thanks,
Michael

[1] https://release.debian.org/transitions/html/auto-libsigc++-2.0.html

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature