Bug#885619: jessie-pu: package libextractor/1:1.3-2
Le 08/06/2018 à 22:24, Adam D. Barratt a écrit : Control: tags -1 + moreinfo On Thu, 2017-12-28 at 17:32 +0100, Bertrand Marc wrote: Would you allow an update of libextractor 1.3-2 in Jessie to fix several minor security issues? 7 issues skipped by the security teams: [...] * CVE-2017-15600 <https://security-tracker.debian.org/tracker/CVE- 2017-15600>: In GNU Libextractor 1.4, there is a NULL Pointer Dereference in the EXTRACTOR_nsf_extract_method function of plugins/nsf_extractor.c. I assume the same issue that Julien raised for the stretch package applies here. Regards, Adam Indeed. The attached patch would fix the issue. Regards, Bertrand diff -Nru libextractor-1.3/debian/changelog libextractor-1.3/debian/changelog --- libextractor-1.3/debian/changelog 2014-09-30 22:56:54.0 +0200 +++ libextractor-1.3/debian/changelog 2017-12-27 19:01:53.0 +0100 @@ -1,3 +1,14 @@ +libextractor (1:1.3-2+deb8u1) jessie; urgency=medium + + * Fix CVE-2017-15266, CVE-2017-15267, CVE-2017-15600, CVE-2017-15601, +CVE-2017-15602, CVE-2017-15922 and CVE-2017-17440. Leon Zhao discovered +several security vulnerabilities, NULL Pointer Dereferences, heap-based +buffer overflows, integer signedness errors and out-of-bounds read that +may lead to a denial-of-service (application crash) or have other +unspecified impact. + + -- Bertrand Marc Wed, 27 Dec 2017 19:01:53 +0100 + libextractor (1:1.3-2) unstable; urgency=medium * Build-depend on libmagic-dev and libavresample-dev to enable additional diff -Nru libextractor-1.3/debian/patches/CVE-2017-15266.patch libextractor-1.3/debian/patches/CVE-2017-15266.patch --- libextractor-1.3/debian/patches/CVE-2017-15266.patch 1970-01-01 01:00:00.0 +0100 +++ libextractor-1.3/debian/patches/CVE-2017-15266.patch 2017-12-27 19:01:53.0 +0100 @@ -0,0 +1,17 @@ +From: Bertrand Marc +Subject: CVE-2017-15266 + +Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg2.html +Bug-Debian: https://bugs.debian.org/878314 +Origin: https://gnunet.org/git/libextractor.git/commit/?id=b577d5452c5c4ee9d552da62a24b95f461551fe2 +--- a/src/plugins/wav_extractor.c b/src/plugins/wav_extractor.c +@@ -109,6 +109,8 @@ + return;/* invalid sample size found in wav file */ + if (0 == channels) + return;/* invalid channels value -- avoid division by 0! */ ++ if (0 == sample_rate) ++return;/* invalid sample_rate */ + samples = data_len / (channels * (sample_size >> 3)); + + snprintf (scratch, diff -Nru libextractor-1.3/debian/patches/CVE-2017-15267.patch libextractor-1.3/debian/patches/CVE-2017-15267.patch --- libextractor-1.3/debian/patches/CVE-2017-15267.patch 1970-01-01 01:00:00.0 +0100 +++ libextractor-1.3/debian/patches/CVE-2017-15267.patch 2017-12-27 19:01:53.0 +0100 @@ -0,0 +1,22 @@ +From: Markus Koschany +Date: Mon, 4 Dec 2017 00:00:15 +0100 +Subject: CVE-2017-15267 + +Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg3.html +Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314 +Origin: https://gnunet.org/git/libextractor.git/commit/?id=6095d7132b57fc7368fc7a40bab2a71b735724d2 +--- + src/plugins/flac_extractor.c | 2 ++ + 1 file changed, 2 insertions(+) + +--- a/src/plugins/flac_extractor.c b/src/plugins/flac_extractor.c +@@ -339,6 +339,8 @@ + { + entry = >comments[count]; + eq = (const char*) entry->entry; ++ if (NULL == eq) ++ break; + len = entry->length; + ilen = 0; + while ( ('=' != *eq) && ('\0' != *eq) && diff -Nru libextractor-1.3/debian/patches/CVE-2017-15600.patch libextractor-1.3/debian/patches/CVE-2017-15600.patch --- libextractor-1.3/debian/patches/CVE-2017-15600.patch 1970-01-01 01:00:00.0 +0100 +++ libextractor-1.3/debian/patches/CVE-2017-15600.patch 2017-12-27 19:01:53.00000 +0100 @@ -0,0 +1,29 @@ +From: Bertrand Marc , Markus Koschany +Subject: CVE-2017-15600 + +Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg4.html +Origin: https://gnunet.org/git/libextractor.git/commit/?id=38e8933539ee9d044057b18a971c2eae3c21aba7 +--- a/src/plugins/nsf_extractor.c b/src/plugins/nsf_extractor.c +@@ -152,13 +152,17 @@ + char nsfversion[32]; + const struct header *head; + void *data; ++ ssize_t ds; + +- if (sizeof (struct header) > +- ec->read (ec->cls, +- , +- sizeof (struct header))) ++ ds = ec->read (ec->cls, ++ , ++ sizeof (struct header)); ++ if ( (-1 == ds) || ++ (sizeof (struct header) > ds) ) + return; + head = data; ++ if (NULL == head) ++return; + + /* Check "magic" id bytes */ + if (memcmp (head->magicid, "NESM\x1a", 5)) diff -Nru libextractor-1.3/debian/patches/CVE-2017-15601.patch libextractor-1.3/debian/patches/CVE-2017-15601.p
Bug#885617: stretch-pu: package libextractor/1:1.3-4
Le 10/02/2018 à 11:13, Julien Cristau a écrit : > Control: tag -1 moreinfo > > On Thu, Dec 28, 2017 at 17:11:02 +0100, Bertrand Marc wrote: > >> diff -Nru libextractor-1.3/debian/patches/CVE-2017-15600.patch >> libextractor-1.3/debian/patches/CVE-2017-15600.patch >> --- libextractor-1.3/debian/patches/CVE-2017-15600.patch 1970-01-01 >> 01:00:00.0 +0100 >> +++ libextractor-1.3/debian/patches/CVE-2017-15600.patch 2017-12-28 >> 11:39:33.00000 +0100 >> @@ -0,0 +1,29 @@ >> +From: Bertrand Marc <bm...@debian.org>, Markus Koschany <a...@debian.org> >> +Subject: CVE-2017-15600 >> + >> +Bug-Upstream: >> http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg4.html >> +Origin: >> https://gnunet.org/git/libextractor.git/commit/?id=38e8933539ee9d044057b18a971c2eae3c21aba7 >> +--- a/src/plugins/nsf_extractor.c >> b/src/plugins/nsf_extractor.c >> +@@ -152,13 +152,17 @@ >> + char nsfversion[32]; >> + const struct header *head; >> + void *data; >> ++ ssize_t ds; >> + >> +- if (sizeof (struct header) > >> +- ec->read (ec->cls, >> +- , >> +- sizeof (struct header))) >> ++ ds = ec->read (ec->cls, >> ++ , >> ++ sizeof (struct header)); >> ++ if ( (-1 == ds) || >> ++ (sizeof (struct header) > ds) ) >> + return; >> + head = data; >> ++ if (NULL == head) >> ++return 0; >> + > Curious how that works. 3 lines above is plain "return", and here > "return 0". What's the type of that function and how did the compiler > not flag this? > > Cheers, > Julien Indeed, sorry. The type of the function was changed from void (in wheezy) to int (in jessie). I updated the patch attached accordingly. Cheers, Bertrand diff -Nru libextractor-1.3/debian/changelog libextractor-1.3/debian/changelog --- libextractor-1.3/debian/changelog 2016-04-26 22:58:56.0 +0200 +++ libextractor-1.3/debian/changelog 2017-12-28 11:39:33.0 +0100 @@ -1,3 +1,14 @@ +libextractor (1:1.3-4+deb9u1) stretch; urgency=medium + + * Fix CVE-2017-15266, CVE-2017-15267, CVE-2017-15600, CVE-2017-15601, +CVE-2017-15602, CVE-2017-15922 and CVE-2017-17440. Leon Zhao discovered +several security vulnerabilities, NULL Pointer Dereferences, heap-based +buffer overflows, integer signedness errors and out-of-bounds read that +may lead to a denial-of-service (application crash) or have other +unspecified impact. + + -- Bertrand Marc <bm...@debian.org> Thu, 28 Dec 2017 11:39:33 +0100 + libextractor (1:1.3-4) unstable; urgency=medium * Update debian/patches/ffmpeg2.9.patch with a new commit taken from upstream diff -Nru libextractor-1.3/debian/patches/CVE-2017-15266.patch libextractor-1.3/debian/patches/CVE-2017-15266.patch --- libextractor-1.3/debian/patches/CVE-2017-15266.patch 1970-01-01 01:00:00.0 +0100 +++ libextractor-1.3/debian/patches/CVE-2017-15266.patch 2017-12-28 11:39:33.0 +0100 @@ -0,0 +1,17 @@ +From: Bertrand Marc <bm...@debian.org> +Subject: CVE-2017-15266 + +Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg2.html +Bug-Debian: https://bugs.debian.org/878314 +Origin: https://gnunet.org/git/libextractor.git/commit/?id=b577d5452c5c4ee9d552da62a24b95f461551fe2 +--- a/src/plugins/wav_extractor.c b/src/plugins/wav_extractor.c +@@ -109,6 +109,8 @@ + return;/* invalid sample size found in wav file */ + if (0 == channels) + return;/* invalid channels value -- avoid division by 0! */ ++ if (0 == sample_rate) ++return;/* invalid sample_rate */ + samples = data_len / (channels * (sample_size >> 3)); + + snprintf (scratch, diff -Nru libextractor-1.3/debian/patches/CVE-2017-15267.patch libextractor-1.3/debian/patches/CVE-2017-15267.patch --- libextractor-1.3/debian/patches/CVE-2017-15267.patch 1970-01-01 01:00:00.0 +0100 +++ libextractor-1.3/debian/patches/CVE-2017-15267.patch 2017-12-28 11:39:33.0 +0100 @@ -0,0 +1,22 @@ +From: Markus Koschany <a...@debian.org> +Date: Mon, 4 Dec 2017 00:00:15 +0100 +Subject: CVE-2017-15267 + +Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg3.html +Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314 +Origin: https://gnunet.org/git/libextractor.git/commit/?id=6095d7132b57fc7368fc7a40bab2a71b735724d2 +--- + src/plugins/flac_extractor.c | 2 ++ + 1 file changed, 2 insertions(+) + +--- a/src/plugins/flac_extractor.c b/src/plugins/flac_extractor.c +@@ -339,6 +339,8 @@ + { + entry = >comments[count]; + eq = (const char*) entry->entry; ++ if (NULL == eq) ++ bre
Bug#885619: jessie-pu: package libextractor/1:1.3-2
Package: release.debian.org User: release.debian@packages.debian.org Usertags: pu Tags: jessie Severity: normal Dear release team, Would you allow an update of libextractor 1.3-2 in Jessie to fix several minor security issues? 7 issues skipped by the security teams: * CVE-2017-15266 <https://security-tracker.debian.org/tracker/CVE-2017-15266>: In GNU Libextractor 1.4, there is a Divide-By-Zero in EXTRACTOR_wav_extract_method in wav_extractor.c via a zero sample rate. * CVE-2017-15922 <https://security-tracker.debian.org/tracker/CVE-2017-15922>: In GNU Libextractor 1.4, there is an out-of-bounds read in the EXTRACTOR_dvi_extract_method function in plugins/dvi_extractor.c. * CVE-2017-15267 <https://security-tracker.debian.org/tracker/CVE-2017-15267>: In GNU Libextractor 1.4, there is a NULL Pointer Dereference in flac_metadata in flac_extractor.c. * CVE-2017-15602 <https://security-tracker.debian.org/tracker/CVE-2017-15602>: In GNU Libextractor 1.4, there is an integer signedness error for the chunk size in the EXTRACTOR_nsfe_extract_method function in plugins/nsfe_extractor.c, leading to an infinite loop for a crafted size. * CVE-2017-17440 <https://security-tracker.debian.org/tracker/CVE-2017-17440>: GNU Libextractor 1.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted GIF, IT (Impulse Tracker), NSFE, S3M (Scream Tracker 3), SID, or XM (eXtended Module) file, as demonstrated by the EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c. * CVE-2017-15600 <https://security-tracker.debian.org/tracker/CVE-2017-15600>: In GNU Libextractor 1.4, there is a NULL Pointer Dereference in the EXTRACTOR_nsf_extract_method function of plugins/nsf_extractor.c. * CVE-2017-15601 <https://security-tracker.debian.org/tracker/CVE-2017-15601>: In GNU Libextractor 1.4, there is a heap-based buffer overflow in the EXTRACTOR_png_extract_method function in plugins/png_extractor.c, related to processiTXt and stndup. You will find attached the full debdiff. Cheers, Bertrand PS These are the same changes as in #885617 diff -Nru libextractor-1.3/debian/changelog libextractor-1.3/debian/changelog --- libextractor-1.3/debian/changelog 2014-09-30 22:56:54.0 +0200 +++ libextractor-1.3/debian/changelog 2017-12-27 19:01:53.0 +0100 @@ -1,3 +1,14 @@ +libextractor (1:1.3-2+deb8u1) jessie; urgency=medium + + * Fix CVE-2017-15266, CVE-2017-15267, CVE-2017-15600, CVE-2017-15601, +CVE-2017-15602, CVE-2017-15922 and CVE-2017-17440. Leon Zhao discovered +several security vulnerabilities, NULL Pointer Dereferences, heap-based +buffer overflows, integer signedness errors and out-of-bounds read that +may lead to a denial-of-service (application crash) or have other + unspecified impact. + + -- Bertrand Marc <bm...@debian.org> Wed, 27 Dec 2017 19:01:53 +0100 + libextractor (1:1.3-2) unstable; urgency=medium * Build-depend on libmagic-dev and libavresample-dev to enable additional diff -Nru libextractor-1.3/debian/patches/CVE-2017-15266.patch libextractor-1.3/debian/patches/CVE-2017-15266.patch --- libextractor-1.3/debian/patches/CVE-2017-15266.patch 1970-01-01 01:00:00.0 +0100 +++ libextractor-1.3/debian/patches/CVE-2017-15266.patch 2017-12-27 19:01:53.0 +0100 @@ -0,0 +1,17 @@ +From: Bertrand Marc <bm...@debian.org> +Subject: CVE-2017-15266 + +Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg2.html +Bug-Debian: https://bugs.debian.org/878314 +Origin: https://gnunet.org/git/libextractor.git/commit/?id=b577d5452c5c4ee9d552da62a24b95f461551fe2 +--- a/src/plugins/wav_extractor.c b/src/plugins/wav_extractor.c +@@ -109,6 +109,8 @@ + return;/* invalid sample size found in wav file */ + if (0 == channels) + return;/* invalid channels value -- avoid division by 0! */ ++ if (0 == sample_rate) ++return;/* invalid sample_rate */ + samples = data_len / (channels * (sample_size >> 3)); + + snprintf (scratch, diff -Nru libextractor-1.3/debian/patches/CVE-2017-15267.patch libextractor-1.3/debian/patches/CVE-2017-15267.patch --- libextractor-1.3/debian/patches/CVE-2017-15267.patch 1970-01-01 01:00:00.0 +0100 +++ libextractor-1.3/debian/patches/CVE-2017-15267.patch 2017-12-27 19:01:53.0 +0100 @@ -0,0 +1,22 @@ +From: Markus Koschany <a...@debian.org> +Date: Mon, 4 Dec 2017 00:00:15 +0100 +Subject: CVE-2017-15267 + +Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg3.html +Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314 +Origin: https://gnunet.org/git/libextractor.git/commit/?id=6095d7132b57fc7368fc7a40bab2a71b735724d2 +--- + src/plugins/flac_extractor.c | 2 ++ + 1 file changed, 2 insertions(+) + +--- a/src/plugins/flac
Bug#885617: stretch-pu: package libextractor/1:1.3-4
Package: release.debian.org User: release.debian@packages.debian.org Usertags: pu Tags: stretch Severity: normal Dear release team, Would you allow an update of libextractor 1.3-4 in Stretch to fix several minor security issues? 7 issues skipped by the security teams: * CVE-2017-15266 <https://security-tracker.debian.org/tracker/CVE-2017-15266>: In GNU Libextractor 1.4, there is a Divide-By-Zero in EXTRACTOR_wav_extract_method in wav_extractor.c via a zero sample rate. * CVE-2017-15922 <https://security-tracker.debian.org/tracker/CVE-2017-15922>: In GNU Libextractor 1.4, there is an out-of-bounds read in the EXTRACTOR_dvi_extract_method function in plugins/dvi_extractor.c. * CVE-2017-15267 <https://security-tracker.debian.org/tracker/CVE-2017-15267>: In GNU Libextractor 1.4, there is a NULL Pointer Dereference in flac_metadata in flac_extractor.c. * CVE-2017-15602 <https://security-tracker.debian.org/tracker/CVE-2017-15602>: In GNU Libextractor 1.4, there is an integer signedness error for the chunk size in the EXTRACTOR_nsfe_extract_method function in plugins/nsfe_extractor.c, leading to an infinite loop for a crafted size. * CVE-2017-17440 <https://security-tracker.debian.org/tracker/CVE-2017-17440>: GNU Libextractor 1.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted GIF, IT (Impulse Tracker), NSFE, S3M (Scream Tracker 3), SID, or XM (eXtended Module) file, as demonstrated by the EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c. * CVE-2017-15600 <https://security-tracker.debian.org/tracker/CVE-2017-15600>: In GNU Libextractor 1.4, there is a NULL Pointer Dereference in the EXTRACTOR_nsf_extract_method function of plugins/nsf_extractor.c. * CVE-2017-15601 <https://security-tracker.debian.org/tracker/CVE-2017-15601>: In GNU Libextractor 1.4, there is a heap-based buffer overflow in the EXTRACTOR_png_extract_method function in plugins/png_extractor.c, related to processiTXt and stndup. You will find attached the full debdiff. Cheers, Bertrand diff -Nru libextractor-1.3/debian/changelog libextractor-1.3/debian/changelog --- libextractor-1.3/debian/changelog 2016-04-26 22:58:56.0 +0200 +++ libextractor-1.3/debian/changelog 2017-12-28 11:39:33.0 +0100 @@ -1,3 +1,14 @@ +libextractor (1:1.3-4+deb9u1) stretch; urgency=medium + + * Fix CVE-2017-15266, CVE-2017-15267, CVE-2017-15600, CVE-2017-15601, +CVE-2017-15602, CVE-2017-15922 and CVE-2017-17440. Leon Zhao discovered +several security vulnerabilities, NULL Pointer Dereferences, heap-based +buffer overflows, integer signedness errors and out-of-bounds read that +may lead to a denial-of-service (application crash) or have other + unspecified impact. + + -- Bertrand Marc <bm...@debian.org> Thu, 28 Dec 2017 11:39:33 +0100 + libextractor (1:1.3-4) unstable; urgency=medium * Update debian/patches/ffmpeg2.9.patch with a new commit taken from upstream diff -Nru libextractor-1.3/debian/patches/CVE-2017-15266.patch libextractor-1.3/debian/patches/CVE-2017-15266.patch --- libextractor-1.3/debian/patches/CVE-2017-15266.patch 1970-01-01 01:00:00.0 +0100 +++ libextractor-1.3/debian/patches/CVE-2017-15266.patch 2017-12-28 11:39:33.0 +0100 @@ -0,0 +1,17 @@ +From: Bertrand Marc <bm...@debian.org> +Subject: CVE-2017-15266 + +Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg2.html +Bug-Debian: https://bugs.debian.org/878314 +Origin: https://gnunet.org/git/libextractor.git/commit/?id=b577d5452c5c4ee9d552da62a24b95f461551fe2 +--- a/src/plugins/wav_extractor.c b/src/plugins/wav_extractor.c +@@ -109,6 +109,8 @@ + return;/* invalid sample size found in wav file */ + if (0 == channels) + return;/* invalid channels value -- avoid division by 0! */ ++ if (0 == sample_rate) ++return;/* invalid sample_rate */ + samples = data_len / (channels * (sample_size >> 3)); + + snprintf (scratch, diff -Nru libextractor-1.3/debian/patches/CVE-2017-15267.patch libextractor-1.3/debian/patches/CVE-2017-15267.patch --- libextractor-1.3/debian/patches/CVE-2017-15267.patch 1970-01-01 01:00:00.0 +0100 +++ libextractor-1.3/debian/patches/CVE-2017-15267.patch 2017-12-28 11:39:33.0 +0100 @@ -0,0 +1,22 @@ +From: Markus Koschany <a...@debian.org> +Date: Mon, 4 Dec 2017 00:00:15 +0100 +Subject: CVE-2017-15267 + +Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg3.html +Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314 +Origin: https://gnunet.org/git/libextractor.git/commit/?id=6095d7132b57fc7368fc7a40bab2a71b735724d2 +--- + src/plugins/flac_extractor.c | 2 ++ + 1 file changed, 2 insertions(+) + +--- a/src/plugins/flac_extractor.c b/src/plugins/flac_extr
Bug#856713: unblock: gnunet-gtk/0.10.1-5
Package: release.debian.org User: release.debian@packages.debian.org Usertags: unblock Severity: normal Dear realease team, Please unblock package gnunet-gtk. The version 0.10.1-5 currently in unstable fixes bug #855706 (of important severity), with the following changes: gnunet-gtk (0.10.1-5) unstable; urgency=medium * Move the plugins from gnunet-gtk-dev to gnunet-gtk and add breaks/replaces: gnunet-gtk-dev for gnunet-gtk (Closes: #855706). You will find attached a source debdiff between testing and the package in unstable. unblock gnunet-gtk/0.10.1-5 Best regards, Bertrand Marc diff -Nru gnunet-gtk-0.10.1/debian/changelog gnunet-gtk-0.10.1/debian/changelog --- gnunet-gtk-0.10.1/debian/changelog 2016-08-20 13:04:30.0 +0200 +++ gnunet-gtk-0.10.1/debian/changelog 2017-02-28 20:01:19.0 +0100 @@ -1,3 +1,10 @@ +gnunet-gtk (0.10.1-5) unstable; urgency=medium + + * Move the plugins from gnunet-gtk-dev to gnunet-gtk and add +breaks/replaces: gnunet-gtk-dev for gnunet-gtk (Closes: #855706). + + -- Bertrand Marc <bm...@debian.org> Tue, 28 Feb 2017 20:01:19 +0100 + gnunet-gtk (0.10.1-4) unstable; urgency=medium * Add a patch written by Chris Lamb to make the build reproducible diff -Nru gnunet-gtk-0.10.1/debian/control gnunet-gtk-0.10.1/debian/control --- gnunet-gtk-0.10.1/debian/control2016-08-20 12:46:06.0 +0200 +++ gnunet-gtk-0.10.1/debian/control2017-02-28 19:57:07.0 +0100 @@ -14,8 +14,8 @@ Architecture: any Depends: ${misc:Depends}, ${shlibs:Depends}, policykit-1 Recommends: gnunet -Breaks: gnunet-tools (<<0.9) -Replaces: gnunet-tools (<<0.9) +Breaks: gnunet-tools (<<0.9), gnunet-gtk-dev (<<0.10.1-5) +Replaces: gnunet-tools (<<0.9), gnunet-gtk-dev (<<0.10.1-5) Description: GNU's framework for secure peer-to-peer networking (GTK+ client) GNUnet is a framework for secure peer-to-peer networking that does not use any centralized or otherwise trusted services. Its high-level goal is to provide a diff -Nru gnunet-gtk-0.10.1/debian/gnunet-gtk-dev.install gnunet-gtk-0.10.1/debian/gnunet-gtk-dev.install --- gnunet-gtk-0.10.1/debian/gnunet-gtk-dev.install 2016-08-15 20:25:11.0 +0200 +++ gnunet-gtk-0.10.1/debian/gnunet-gtk-dev.install 2017-02-26 11:03:58.0 +0100 @@ -1,3 +1,2 @@ usr/include usr/lib/*/*.so -usr/lib/*/gnunet/*.so diff -Nru gnunet-gtk-0.10.1/debian/gnunet-gtk.install gnunet-gtk-0.10.1/debian/gnunet-gtk.install --- gnunet-gtk-0.10.1/debian/gnunet-gtk.install 2016-08-15 20:25:11.0 +0200 +++ gnunet-gtk-0.10.1/debian/gnunet-gtk.install 2017-02-26 11:04:02.0 +0100 @@ -1,5 +1,6 @@ usr/bin/ usr/lib/*/*.so.* +usr/lib/*/gnunet/*.so usr/share debian/contrib/gnunet-setup-pkexec /usr/bin debian/contrib/org.debian.pkexec.gnunet-setup.policy /usr/share/polkit-1/actions/
Bug#831810: transition: libmicrohttpd
Hi, Le 23/07/2016 à 11:56, Emilio Pozuelo Monfort a écrit : > On 23/07/16 11:35, Bertrand Marc wrote: >> Do you think we could allow the libmicrohttpd transition ? > > Yes. Go ahead. Thanks ! I uploaded a new revision targeting unstable to mentors [1] and I asked Holger Levsen (CC), my regular sponsor, to upload it to unstable. Cheers, Bertrand [1] https://mentors.debian.net/debian/pool/main/libm/libmicrohttpd/libmicrohttpd_0.9.50-2.dsc
Bug#831810: transition: libmicrohttpd
Hi, Le 21/07/2016 à 18:58, Emilio Pozuelo Monfort a écrit : > On 21/07/16 15:53, Jonathan Wiltshire wrote: >> On 2016-07-19 20:19, Emilio Pozuelo Monfort wrote: >> As a DM, Bertrand can request a guest account on a porterbox through >> https://nm.debian.org >> (log in and request a new status) > > Bertrand, can you do that and test the rest of the rdeps? Thanks for the advice. However I fear it would take as long as waiting for my DD account to be created (DAM already opened a RT ticket for the account creation). Anyway, with the end of the heatwave in France (my laptop has temperature issues), I was able to build three remaining r-deps: - systemd - ola - pcp For the last two, build fails with both libmicrohttpd10 and libmicrohttpd12: - kodi (due to #820416) - varnish-agent (due to #724479) As kodi is marked for autoremoval from testing and varnish-agent is only is Sid, it seems these are not blocking the libmicrohttpd transition. Do you think we could allow the libmicrohttpd transition ? Best regards, Bertrand
Bug#831810: transition: libmicrohttpd
Hi, Le 19/07/2016 à 21:19, Emilio Pozuelo Monfort a écrit : > In lack of that, do you know how much the ABI changed? Sorry I missed that bit in my first message. To my mind (but I am not sure), the soname bump comes from a new member in the middle of a union struct exposed in /usr/include/microhttpd.h: union MHD_ConnectionInfo { ... int /* enum gnutls_protocol */ protocol; /** + * The suspended status of a connection. + */ + int /* MHD_YES or MHD_NO */ suspended; + + /** * Connect socket */ ... } There are also new enum constants, but they seem backward compatible. And no symbols were removed. Best regards, Bertrand
Bug#831810: transition: libmicrohttpd
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: transition Dear release team, Please allow the transition from libmicrohttpd10 to libmicrohttpd12. libmicrohttpd12 (0.9.50-1) is currently in experimental. The auto tracker seems correct [1]. With this new version libmicrospdy goes away (dead upstream, no r-deps), so does the libssl-dev build-dependency. This could avoid some conflicts with the openssl transition. Among the reverse build-dependencies I was able to build: - gnunet - libjson-rpc-cpp - opensips - psensor - yubikey-server-c - bfgminer Since I use a quite old laptop, I had difficulties to build (both with libmicrohttpd10 and libmicrohttp12): - systemd - kodi - ola (sid only) - pcp - varnish-agent (sid only) Do you know if I could have access to a testing build infrastructure ? pcp has a RC bug, but it is marked for autoremoval from testing on 2016-08-03. kodi has also a RC bug, but it is marked for autoremoval from testing on 2016-08-13. Last things: please note that I do not have uploads rights yet, but it should only be a matter of time [2], and that I will not have internet access between July, 23 and August, 7. Best regards, Bertrand Marc [1] https://release.debian.org/transitions/html/auto-libmicrohttpd.html [2] https://nm.debian.org/public/process/bmarc Ben file: title = "libmicrohttpd"; is_affected = .depends ~ /(libmicrohttpd\-dbg|libmicrohttpd10|libmicrospdy\-dbg|libmicrospdy\-dev|libmicrospdy0)/ | .depends ~ /libmicrohttpd12/; is_good = .depends ~ /libmicrohttpd12/; is_bad = .depends ~ /(libmicrohttpd\-dbg|libmicrohttpd10|libmicrospdy\-dbg|libmicrospdy\-dev|libmicrospdy0)/; -- System Information: Debian Release: stretch/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.6.0-1-amd64 (SMP w/2 CPU cores) Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system)
Bug#798780: release.debian.org: Please let playonlinux migrate to testing
Hello Andreas, Le 10/04/2016 13:52, Andreas Beckmann a écrit : > On Sun, 21 Feb 2016 11:00:14 +0100 Bertrand Marc <beberk...@gmail.com> > wrote: >> Do you think we could find a solution to restore the dependency and let >> playonlinux migrate to testing ? > > What about > > * split a playonlinux-data package from playonlinux containing > /usr/share/playonlinux/* > /usr/share/locale/* > mark as Multi-Arch: foreign > document in the description that a foreign architecture may be needed > to install playonlinux on amd64 (dpkg --add-architecture i386) > > * make playonlinux arch:any > Depends: playonlinux-data (= ${source:Version}) > > * add Build-Depends: wine32 | wine32-development > (instead of enumerating the architectures in the playonlinux package) Thank you for this idea. It seems to me it should work fine. But making playonlinux arch:any would mean duplicate (dummy) packages. Does this solution would be ok for the release team and do you think it is the best one ? Best regards, Bertrand
Re: Processed: your mail
Hi Adam, Le 09/04/2016 17:54, Adam D. Barratt a écrit : > It's customary to provide an explanation when re-opening bugs, > particularly ones old enough to have been archived. > > Regards, > > Adam > Sorry, I didn't know that. In fact I thought I reopened this bug with my message the 21/02/2016. I still think this is not fixed and I was hoping the release team would help me find a way to make playonlinux depend on wine32|wine32-development. Regards, Bertrand
Bug#798780: release.debian.org: Please let playonlinux migrate to testing
Le 20/02/2016 22:53, Julien Cristau a écrit : > Seems to be in testing now, closing. > > Cheers, > Julien Hello Julien, Indeed playonlinux migrated to testing, thanks to Markus Koschany who "removed dependency on wine32|wine32-development again to ensure the package can migrate to testing." in 4.2.9-2. Ideally, this would only be temporary as playonlinux should really depend on wine32|wine32-development. Do you think we could find a solution to restore the dependency and let playonlinux migrate to testing ? Cheers, Bertrand signature.asc Description: OpenPGP digital signature
Bug#798780: release.debian.org: Please let playonlinux migrate to testing
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: britney Dear release developpers, Playonlinux is a arch:all package (it is written in python and bash) which depends on the 32 bits version of wine. Therefore I added a dependency on wine32|wine32-development, but it seems the package will not migrate to testing, because wine32 is not available on amd64. There does not seem to be a simple solution to let playonlinux migrate to testing, and Wookey [1] suggested that this migration would require some manual work. Could you please let playonlinux migrate to testing or point me into the right direction ? Regards, Bertrand [1] https://lists.debian.org/debian-release/2015/08/msg00526.html
Depend on a package from an other arch
Dear developpers, I am trying to fix Debian bug #783875 [1]: playonlinux (which is arch independant) should depend on the 32 bits version of wine. Therefore I added a dependency on wine32|wine32-development, but it seems the package will not migrate to testing [2], because wine32 is not available on amd64. Niels Thykier suggested on mentors that this could be an issue with the testing migration code [3], so I send this question to debian-release@ too. I thought I should instead add a dependency on wine32:any | wine32-development:any and ask the wine maintainer to move to multiarch:allowed. But the best source on this subject is an Ubuntu one [4]. I cannot find any reliable Debian source about this and it seems I was wrong [3]. Could you give me a pointer on this ? Or do you know any package with a dependency on a package from an other arch ? Thanks, Bertrand PS Please CC me as I am not subscribed to these lists. [1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783875 [2] https://packages.qa.debian.org/p/playonlinux.html [3] https://lists.debian.org/debian-mentors/2015/08/msg00153.html [4] https://wiki.ubuntu.com/MultiarchSpec signature.asc Description: OpenPGP digital signature
Bug#733158: pu: package libmicrohttpd/0.9.20-1
Package: release.debian.org User: release.debian@packages.debian.org Usertags: pu Severity: normal Dear release team, I would like to fix 2 security issues and another open issue in libmicrohttpd, as stated in Debian bug #731933. In this bug, Moritz Muehlenhoff suggests to go through stable proposed updates instead of a DSA. I prepared a new version and uploaded it to mentors [1] with the following changes: * Fix various security issues (closes: #731933): + out-of-bounds read in MHD_http_unescape(), patch picked upstream, CVE-2013-7038. + stack overflow in MHD_digest_auth_check(), patch picked upstream, CVE-2013-7039. + handle case that original allocation request was zero and fix theoretical overflow issue reported by Florian Weimer, patch picked upstream. You will find attached a full debdiff to the current wheezy package. Would you consider allowing it to go to wheezy ? Thanks, Bertrand [1] http://mentors.debian.net/debian/pool/main/libm/libmicrohttpd/libmicrohttpd_0.9.20-1+deb7u1.dsc diff -Nru libmicrohttpd-0.9.20/debian/changelog libmicrohttpd-0.9.20/debian/changelog --- libmicrohttpd-0.9.20/debian/changelog 2012-06-24 12:28:35.0 +0200 +++ libmicrohttpd-0.9.20/debian/changelog 2013-12-26 16:09:57.0 +0100 @@ -1,3 +1,15 @@ +libmicrohttpd (0.9.20-1+deb7u1) wheezy; urgency=medium + + * Fix various security issues (closes: #731933): ++ out-of-bounds read in MHD_http_unescape(), patch picked upstream, +CVE-2013-7038. ++ stack overflow in MHD_digest_auth_check(), patch picked upstream, +CVE-2013-7039. ++ handle case that original allocation request was zero and fix theoretical +overflow issue reported by Florian Weimer, patch picked upstream. + + -- Bertrand Marc beberk...@gmail.com Thu, 26 Dec 2013 15:41:39 +0100 + libmicrohttpd (0.9.20-1) unstable; urgency=low * debian/control: add Vcs-Git and Vcs-browser fields. diff -Nru libmicrohttpd-0.9.20/debian/patches/allocation_request_was_zero.diff libmicrohttpd-0.9.20/debian/patches/allocation_request_was_zero.diff --- libmicrohttpd-0.9.20/debian/patches/allocation_request_was_zero.diff 1970-01-01 01:00:00.0 +0100 +++ libmicrohttpd-0.9.20/debian/patches/allocation_request_was_zero.diff 2013-12-26 15:39:19.0 +0100 @@ -0,0 +1,82 @@ +Author: Christian Grothoff christ...@grothoff.org +Description: handle case that original allocation request was zero and fix + theoretical overflow issue reported by Florian Weimer. +Origin: upstream, commit: 30926,30927 +--- a/src/daemon/memorypool.c b/src/daemon/memorypool.c +@@ -135,19 +135,22 @@ + size_t size, int from_end) + { + void *ret; ++ size_t asize; + +- size = ROUND_TO_ALIGN (size); +- if ((pool-pos + size pool-end) || (pool-pos + size pool-pos)) ++ asize = ROUND_TO_ALIGN (size); ++ if ( (0 == asize) (0 != size) ) ++return NULL; /* size too close to SIZE_MAX */ ++ if ((pool-pos + asize pool-end) || (pool-pos + asize pool-pos)) + return NULL; + if (from_end == MHD_YES) + { +- ret = pool-memory[pool-end - size]; +- pool-end -= size; ++ ret = pool-memory[pool-end - asize]; ++ pool-end -= asize; + } + else + { + ret = pool-memory[pool-pos]; +- pool-pos += size; ++ pool-pos += asize; + } + return ret; + } +@@ -175,34 +178,37 @@ + size_t new_size) + { + void *ret; ++ size_t asize; + +- new_size = ROUND_TO_ALIGN (new_size); +- if ((pool-end old_size) || (pool-end new_size)) ++ asize = ROUND_TO_ALIGN (new_size); ++ if ( (0 == asize) (0 != new_size) ) ++return NULL; /* new_size too close to SIZE_MAX */ ++ if ((pool-end old_size) || (pool-end asize)) + return NULL;/* unsatisfiable or bogus request */ + + if ((pool-pos = old_size) (pool-memory[pool-pos - old_size] == old)) + { + /* was the previous allocation - optimize! */ +- if (pool-pos + new_size - old_size = pool-end) ++ if (pool-pos + asize - old_size = pool-end) + { + /* fits */ +- pool-pos += new_size - old_size; +- if (new_size old_size) /* shrinking - zero again! */ +-memset (pool-memory[pool-pos], 0, old_size - new_size); ++ pool-pos += asize - old_size; ++ if (asize old_size) /* shrinking - zero again! */ ++memset (pool-memory[pool-pos], 0, old_size - asize); + return old; + } + /* does not fit */ + return NULL; + } +- if (new_size = old_size) ++ if (asize = old_size) + return old; /* cannot shrink, no need to move */ +- if ((pool-pos + new_size = pool-pos) +- (pool-pos + new_size = pool-end)) ++ if ((pool-pos + asize = pool-pos) ++ (pool-pos + asize = pool-end)) + { + /* fits */ + ret = pool-memory[pool-pos]; + memcpy (ret, old, old_size); +- pool-pos += new_size; ++ pool-pos += asize; + return ret; + } + /* does
Bug#699153: unblock: gnunet/0.9.3-6
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Le 30/01/2013 20:54, Julien Cristau a écrit : On Mon, Jan 28, 2013 at 10:43:11 +0100, Bertrand Marc wrote: * Fix build on kfreebsd, thanks to Christoph Egger (Closes: #688486). Is the package tested to actually work on kfreebsd? Cheers, Julien I don't know anybody using kfreebsd, so no the package is not tested... Cheers, Bertrand -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCAAGBQJRDP5KAAoJEKBKs7rb4mPues0P/2m4No4NVLPubbUfsrkkANZt ap8OftzEvEnG+zvlQ8AjmLVuuBA+++CH5kAQFBrqFXIAVJosFClg/oONoTKs+y2X RyOIBRWCpmas8iSJX22y+Ac330eaurNutGU1VPoEODnHagr37PVGRkTa48I0Jkf+ 8Z+F5hJuHaP8eWiLU2VogilrfudvpCi5SARNHwRTZKK8B4dPutHdxWF+vr74BtUz XKwBab1dplJO2UdIWM+YWWO2cfrE64eQsMQB2qPErY8B8usV0wcsyk47O+5yR2l6 etbhCetvByFdvUyg2d/H7x7QtGd3VBywTrYj6kFrE0mt8tTyu1jFqy7AIui+db8N G7CwVlW/fzvC0a1Wceogz4GpuTdYQFpyHkOVOfb8m7y61sMdhMiSrMX+JRkGXEyn gVn+adfbtKURWu3RLmBI/aIInM/0XYlEn8NTAm9EiG1yx20H0b2gPiUn8WORYL28 RcyqcDih6K4JowPqdUDoHH53VyxCa0SHiDYMJuK/SQeONMv9URQ/dG+83SiuGpMc gnWFHjcZNMV4D6Thln6hOXKOEPS4F7mJoSnWLYgUxiSI0YdlgbVFArUaz7xZ6eiz ZvbHH5g5M210zRH4BqjQnCD55T8DwJl3ZR9LxXKLsDdm+J0g0jiI3ZyzRvO8+6f/ J34Z8JWTjQtUWRdQHakw =CVIQ -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/510cfe50.50...@gmail.com
Bug#689154: unblock: gnunet/0.9.3-5
Le 12/01/2013 12:46, Holger Levsen a écrit : Hi Bertrand, can you please prepare gnunet/0.9.3-5 with these changes?! thanks, Holger Hi, Sorry, I was a bit behind my work with the holidays, but I finally prepared gnunet/0.9.3-5. I uploaded it to mentors: http://mentors.debian.net/debian/pool/main/g/gnunet/gnunet_0.9.3-5.dsc You'll find attached the full debdiff to the version in Wheezy. Cheers, Bertrand diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog --- gnunet-0.9.3/debian/changelog 2012-12-09 11:35:52.0 +0100 +++ gnunet-0.9.3/debian/changelog 2013-01-13 18:00:32.0 +0100 @@ -1,3 +1,36 @@ +gnunet (0.9.3-5) unstable; urgency=low + + * Revert previous changes to target wheezy: ++ depend on gettext. ++ drop patch to fix build on kfreebsd. ++ drop patch to change default option UNIX_MATCH_UID. ++ drop patch about libgcrypt version check. + + -- Bertrand Marc beberk...@gmail.com Sun, 13 Jan 2013 18:00:29 +0100 + +gnunet (0.9.3-4) unstable; urgency=low + + [ Bertrand Marc ] + * Drop dependency on gettext for gnunet-client and gnunet-server as it is not +necessary, thanks to Ivan Shmakov (Closes: #690860). + * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881, +#687883). + * Fix build on kfreebsd, thanks to Christoph Egger (Closes: #688486). + * Allways install libnss to /lib and fix FTBFS on ia64 (Closes: #688590). + * Install libnss to /lib, really fix #688590, thanks to Christian Grothoff. + * Change default option UNIX_MATCH_UID for services datastore and namestore, +so users in the gnunet group may use these services (Closes: #686238, +#684317). + * Update libgcrypt version check to a less strict check, patch picked from +upstream, following Werner Koch's advice (Closes: #684997). + * gnunet-server.postinst: check the existence of a binary before changing its +permissions (Closes: #688484). + + [ David Prévot ] + * debian/po/fr.po: Fix charset, and use non-breaking spaces. + + -- Bertrand Marc beberk...@gmail.com Mon, 22 Oct 2012 22:52:43 +0200 + gnunet (0.9.3-3) unstable; urgency=low * debian/control: update Vcs-* to the new repository in collab-maint. diff -Nru gnunet-0.9.3/debian/gnunet-client.docs gnunet-0.9.3/debian/gnunet-client.docs --- gnunet-0.9.3/debian/gnunet-client.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-client.docs 2012-12-09 12:00:00.0 +0100 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet-dev.docs gnunet-0.9.3/debian/gnunet-dev.docs --- gnunet-0.9.3/debian/gnunet-dev.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-dev.docs 2012-12-09 12:00:00.0 +0100 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet.docs gnunet-0.9.3/debian/gnunet.docs --- gnunet-0.9.3/debian/gnunet.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet.docs 2012-12-09 12:00:00.0 +0100 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet-server.docs gnunet-0.9.3/debian/gnunet-server.docs --- gnunet-0.9.3/debian/gnunet-server.docs 2012-12-09 11:35:52.0 +0100 +++ gnunet-0.9.3/debian/gnunet-server.docs 2012-12-09 12:00:00.0 +0100 @@ -1,2 +1,4 @@ +AUTHORS +README doc/README.mysql doc/README.postgres diff -Nru gnunet-0.9.3/debian/gnunet-server.install gnunet-0.9.3/debian/gnunet-server.install --- gnunet-0.9.3/debian/gnunet-server.install 2012-12-09 11:35:52.0 +0100 +++ gnunet-0.9.3/debian/gnunet-server.install 2012-12-09 12:00:00.0 +0100 @@ -41,9 +41,9 @@ usr/lib/libgnunettransporttesting.so.* usr/lib/libgnunettun.so.* usr/lib/libgnunetvpn.so.* -usr/lib/libnss_gns.so.2 -usr/lib/libnss_gns4.so.2 -usr/lib/libnss_gns6.so.2 +lib/libnss_gns.so.2 +lib/libnss_gns4.so.2 +lib/libnss_gns6.so.2 usr/lib/gnunet/*.so usr/share/gnunet/config.d usr/share/gnunet/hellos/* diff -Nru gnunet-0.9.3/debian/patches/configure_libnss.diff gnunet-0.9.3/debian/patches/configure_libnss.diff --- gnunet-0.9.3/debian/patches/configure_libnss.diff 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/patches/configure_libnss.diff 2013-01-13 18:17:19.0 +0100 @@ -0,0 +1,14 @@ +--- a/src/gns/nss/Makefile.am b/src/gns/nss/Makefile.am +@@ -21,11 +21,7 @@ + + AM_LDFLAGS=-avoid-version -module -export-dynamic + +-if HAVE_SUDO + nssdir = /lib/ +-else +-nssdir = $(libdir) +-endif + + LIBTOOL = $(SUDO_BINARY) $(SHELL) $(top_builddir)/libtool + diff -Nru gnunet-0.9.3/debian/patches/series gnunet-0.9.3/debian/patches/series --- gnunet-0.9.3/debian/patches/series 2012-12-09 11:35:52.0 +0100 +++ gnunet-0.9.3/debian/patches/series 2013-01-13 18:04:46.0 +0100 @@ -1,2 +1,3 @@ +configure_libnss.diff support_GNU_hurd.patch sparc_alignment.patch diff -Nru gnunet-0.9.3/debian/po/fr.po gnunet-0.9.3/debian/po/fr.po --- gnunet-0.9.3/debian/po/fr.po 2012-12-09 11:35:52.0 +0100 +++ gnunet-0.9.3/debian/po/fr.po 2012
Re: Bug#689154: unblock: gnunet/0.9.3-3wheezy1
Dear release team, I prepared a new revision on gnunet and uploaded it to mentors. You'll find attached the full debdiff to the last unblocked revision (0.9.3-3). Here is the detail of the changes, with the answers to Julien: Le 25/11/2012 20:17, Julien Cristau a écrit : + * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881, +#687883). Are the AUTHORS/README changes in various debian/*.docs files related? Yes they are, I need them back since they are not symlinked any more. + * Allways install libnss to /lib and fix FTBFS on ia64 (Closes: #688590). + * Install libnss to /lib, really fix #688590, thanks to Christian Grothoff. That one's rather bigger than strictly necessary… I updated it to minimal changes. + [ David Prévot ] + * debian/po/fr.po: Fix charset, and use non-breaking spaces. I kept this one since I am not the author and it seems quite simple to review. + Cheers, Julien Since gnunet/0.9.3-4 was uploaded to unstable with too many changes for wheezy, I targeted wheezy directly in the changelog (not really sure it shouldn't be testing-proposed-updates) and the revision is now called gnunet/0.9.3-3wheezy1. How does it works now to get it to wheezy directly ? Cheers, Bertrand diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog --- gnunet-0.9.3/debian/changelog 2012-12-09 11:35:52.0 +0100 +++ gnunet-0.9.3/debian/changelog 2012-12-09 11:10:40.0 +0100 @@ -1,3 +1,15 @@ +gnunet (0.9.3-3wheezy1) wheezy; urgency=low + + [ Bertrand Marc ] + * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881, +#687883). + * Install libnss to /lib, really fix #688590, thanks to Christian Grothoff. + + [ David Prévot ] + * debian/po/fr.po: Fix charset, and use non-breaking spaces. + + -- Bertrand Marc beberk...@gmail.com Mon, 03 Dec 2012 09:12:51 +0100 + gnunet (0.9.3-3) unstable; urgency=low * debian/control: update Vcs-* to the new repository in collab-maint. diff -Nru gnunet-0.9.3/debian/gnunet-client.docs gnunet-0.9.3/debian/gnunet-client.docs --- gnunet-0.9.3/debian/gnunet-client.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-client.docs 2012-12-02 20:02:03.0 +0100 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet-dev.docs gnunet-0.9.3/debian/gnunet-dev.docs --- gnunet-0.9.3/debian/gnunet-dev.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-dev.docs 2012-12-02 20:02:03.0 +0100 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet.docs gnunet-0.9.3/debian/gnunet.docs --- gnunet-0.9.3/debian/gnunet.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet.docs 2012-12-02 20:02:03.0 +0100 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet-server.docs gnunet-0.9.3/debian/gnunet-server.docs --- gnunet-0.9.3/debian/gnunet-server.docs 2012-12-09 11:35:52.0 +0100 +++ gnunet-0.9.3/debian/gnunet-server.docs 2012-12-02 20:02:03.0 +0100 @@ -1,2 +1,4 @@ +AUTHORS +README doc/README.mysql doc/README.postgres diff -Nru gnunet-0.9.3/debian/gnunet-server.install gnunet-0.9.3/debian/gnunet-server.install --- gnunet-0.9.3/debian/gnunet-server.install 2012-12-09 11:35:52.0 +0100 +++ gnunet-0.9.3/debian/gnunet-server.install 2012-12-09 10:58:48.0 +0100 @@ -41,9 +41,9 @@ usr/lib/libgnunettransporttesting.so.* usr/lib/libgnunettun.so.* usr/lib/libgnunetvpn.so.* -usr/lib/libnss_gns.so.2 -usr/lib/libnss_gns4.so.2 -usr/lib/libnss_gns6.so.2 +lib/libnss_gns.so.2 +lib/libnss_gns4.so.2 +lib/libnss_gns6.so.2 usr/lib/gnunet/*.so usr/share/gnunet/config.d usr/share/gnunet/hellos/* diff -Nru gnunet-0.9.3/debian/patches/configure_libnss.diff gnunet-0.9.3/debian/patches/configure_libnss.diff --- gnunet-0.9.3/debian/patches/configure_libnss.diff 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/patches/configure_libnss.diff 2012-12-09 11:11:31.0 +0100 @@ -0,0 +1,14 @@ +--- a/src/gns/nss/Makefile.am b/src/gns/nss/Makefile.am +@@ -21,11 +21,7 @@ + + AM_LDFLAGS=-avoid-version -module -export-dynamic + +-if HAVE_SUDO + nssdir = /lib/ +-else +-nssdir = $(libdir) +-endif + + LIBTOOL = $(SUDO_BINARY) $(SHELL) $(top_builddir)/libtool + diff -Nru gnunet-0.9.3/debian/patches/series gnunet-0.9.3/debian/patches/series --- gnunet-0.9.3/debian/patches/series 2012-12-09 11:35:52.0 +0100 +++ gnunet-0.9.3/debian/patches/series 2012-12-09 11:06:53.0 +0100 @@ -1,2 +1,3 @@ +configure_libnss.diff support_GNU_hurd.patch sparc_alignment.patch diff -Nru gnunet-0.9.3/debian/po/fr.po gnunet-0.9.3/debian/po/fr.po --- gnunet-0.9.3/debian/po/fr.po 2012-12-09 11:35:52.0 +0100 +++ gnunet-0.9.3/debian/po/fr.po 2012-12-09 11:10:40.0 +0100 @@ -13,7 +13,7 @@ Language-Team: French debian-l10n-fre...@lists.debian.org\n Language: fr\n MIME-Version: 1.0\n -Content-Type: text/plain; charset=ISO-8859-1\n +Content-Type: text/plain; charset=UTF
Re: Bug#689154: unblock: gnunet/0.9.3-4
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello Julien, Thank you for your answer. Does it mean I should prepare a new version with the following changes : Le 25/11/2012 20:17, Julien Cristau a écrit : + * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881, +#687883). Are the AUTHORS/README changes in various debian/*.docs files related? (yes, they are needed since they are not symlinked anymore.) + * gnunet-server.postinst: check the existence of a binary before changing its +permissions (Closes: #688484). + + [ David Pr??vot ] + * debian/po/fr.po: Fix charset, and use non-breaking spaces. I realize #688486 [1] is not a RC bug but it seems harmless [2] and would fix the build of the package on kfreebsd. But I won't add it to the changes list if you don't confirm it is harmless. Last thing: gnunet-0.9.3-4 was uploaded to unstable with fixes for a lot of not-RC bugs. So I guess I need to prepare a new version targeting testing-proposed-updates ? Cheers, Bertrand [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688486 [2] http://anonscm.debian.org/gitweb/?p=collab-maint/gnunet.git;a=commitdiff;h=3146f13e0b136b2ca317940bc18deb932f3b339a -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCAAGBQJQu5YpAAoJEKBKs7rb4mPu32QQAJFbouzZGGs+jokj1kWCg1PK 0lvcPt6HQaNb23gTcU71ukmlwm4QHYY3UfEtAjkmbPUrbbgfjiHV1kIQzOlv0Oar vKpFUsmg/G7C139SM/mxDrj2pWA+CN6R3u+6PaQH20aBXjUoevqZKi7zJ+2/Xebh 1oVgotnhNlLuLnMJWlg5tCE+aEV7ZowVzjRhvv5PC9ryWVsormVNeDKuD1bcfhnE OO5FNc3l1+7OHwKfWsysnbuaXeDHx6PZ+4vaGbSsChpfRUeAFMlEPfNfswgzeUhk qPDmm0wnADbvmIR5XlQfiItaDEl+jThcJfITsi7QopRUymg7Weyw9mlrW+CJxKNe 30bazZzrpkwo8ewIOMmOZhh+pScVvIw8jGDDyEkeH6LW1Mx8P0REgZdvu0rlKPDl 391lZD+pnwPVEl7bq3HJD10GaUijBsH9quHO/+ofw4+1oy+9F2BdskQkrMU46VW5 ow7C7h/Kz4JS4gW95aWrWjC6kbKX68Eouoh86/F05R0EaGop+k1xlb3q493Ye1CY stUEBIlyROfe3u3dKeDGMkLgHuAFRHRZHdMw5XBrVMwW4Kh6LkpBJCkX1EyIC3zi PdKrg69ZSRz2/u8ajf8O60gLyrELaJN74cNYSy474RVYNFODOm0diaXYZlKeaZl5 sAAWV0vsf92N8PAWEHGj =E03x -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/50bb962c.7040...@gmail.com
Re: Bug#689154: unblock: gnunet/0.9.3-4
Dear release team, I uploaded a new version of gnunet to mentors, waiting for your review. My sponsor could then upload to unstable with your approval. It is the same as the last upload, including the change of David Prévot : [ David Prévot ] * debian/po/fr.po: Fix charset, and use non-breaking spaces. The full debdiff to the version currently in Wheezy is attached. This upload would fix 11 bugs, including RC ones. Cheers, Bertrand diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog --- gnunet-0.9.3/debian/changelog 2012-08-26 16:18:16.0 +0200 +++ gnunet-0.9.3/debian/changelog 2012-11-12 19:55:00.0 +0100 @@ -1,3 +1,27 @@ +gnunet (0.9.3-4) unstable; urgency=low + + [ Bertrand Marc ] + * Drop dependency on gettext for gnunet-client and gnunet-server as it is not +necessary, thanks to Ivan Shmakov (Closes: #690860). + * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881, +#687883). + * Fix build on kfreebsd, thanks to Christoph Egger (Closes: #688486). + * Allways install libnss to /lib and fix FTBFS on ia64 (Closes: #688590). + * Install libnss to /lib, really fix #688590, thanks to Christian Grothoff. + * Change default option UNIX_MATCH_UID for services datastore and namestore, +so users in the gnunet group may use these services (Closes: #686238, +#684317). + * Update libgcrypt version check to a less strict check, patch picked from +upstream, following Werner Koch's advice (Closes: #684997). + * gnunet-server.postinst: check the existence of a binary before changing its +permissions (Closes: #688484). + * Do not set-UID gnunet-helper-fs-publish (Closes: #691154). + + [ David Prévot ] + * debian/po/fr.po: Fix charset, and use non-breaking spaces. + + -- Bertrand Marc beberk...@gmail.com Mon, 22 Oct 2012 22:52:43 +0200 + gnunet (0.9.3-3) unstable; urgency=low * debian/control: update Vcs-* to the new repository in collab-maint. diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control --- gnunet-0.9.3/debian/control 2012-08-05 20:12:01.0 +0200 +++ gnunet-0.9.3/debian/control 2012-10-18 21:13:37.0 +0200 @@ -30,8 +30,7 @@ Architecture: any Pre-Depends: ${misc:Pre-Depends} Depends: - ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}), - gettext + ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}) Suggests: gnunet-server, libextractor-plugins Description: secure, trust-based peer-to-peer framework (client) GNUnet is a peer-to-peer framework which focuses on providing security. All @@ -75,7 +74,7 @@ Pre-Depends: ${misc:Pre-Depends} Depends: ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}), - adduser, gettext, netbase + adduser, netbase Suggests: miniupnpc Breaks: gnunet-fuse (0.9), gnunet-client (0.9) Replaces: gnunet-fuse (0.9), gnunet-client (0.9) diff -Nru gnunet-0.9.3/debian/gnunet-client.docs gnunet-0.9.3/debian/gnunet-client.docs --- gnunet-0.9.3/debian/gnunet-client.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-client.docs 2012-09-27 22:30:34.0 +0200 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet-dev.docs gnunet-0.9.3/debian/gnunet-dev.docs --- gnunet-0.9.3/debian/gnunet-dev.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-dev.docs 2012-09-27 22:30:34.0 +0200 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet.docs gnunet-0.9.3/debian/gnunet.docs --- gnunet-0.9.3/debian/gnunet.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet.docs 2012-09-27 22:30:34.0 +0200 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet-server.docs gnunet-0.9.3/debian/gnunet-server.docs --- gnunet-0.9.3/debian/gnunet-server.docs 2012-05-05 14:37:00.0 +0200 +++ gnunet-0.9.3/debian/gnunet-server.docs 2012-09-27 22:30:34.0 +0200 @@ -1,2 +1,4 @@ +AUTHORS +README doc/README.mysql doc/README.postgres diff -Nru gnunet-0.9.3/debian/gnunet-server.install gnunet-0.9.3/debian/gnunet-server.install --- gnunet-0.9.3/debian/gnunet-server.install 2012-06-17 12:04:20.0 +0200 +++ gnunet-0.9.3/debian/gnunet-server.install 2012-10-15 12:01:20.0 +0200 @@ -41,9 +41,9 @@ usr/lib/libgnunettransporttesting.so.* usr/lib/libgnunettun.so.* usr/lib/libgnunetvpn.so.* -usr/lib/libnss_gns.so.2 -usr/lib/libnss_gns4.so.2 -usr/lib/libnss_gns6.so.2 +lib/libnss_gns.so.2 +lib/libnss_gns4.so.2 +lib/libnss_gns6.so.2 usr/lib/gnunet/*.so usr/share/gnunet/config.d usr/share/gnunet/hellos/* diff -Nru gnunet-0.9.3/debian/gnunet-server.install.kfreebsd gnunet-0.9.3/debian/gnunet-server.install.kfreebsd --- gnunet-0.9.3/debian/gnunet-server.install.kfreebsd 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-server.install.kfreebsd 2012-09-29 08:13:17.0 +0200 @@ -0,0 +1,52 @@ +etc/gnunet.conf +usr/bin/gnunet-arm +usr/bin/gnunet-core +usr/bin/gnunet-daemon
Bug#689154: unblock: gnunet/0.9.3-4
Dear release team, I uploaded again a new revision of gnunet, with this new fix: * Do not set-UID gnunet-helper-fs-publish (Closes: #691154). The full debdiff against the current version in testing is attached. Do you think it would get a freeze exception ? Cheers, Bertrand diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog --- gnunet-0.9.3/debian/changelog 2012-08-26 16:18:16.0 +0200 +++ gnunet-0.9.3/debian/changelog 2012-10-22 22:55:16.0 +0200 @@ -1,3 +1,23 @@ +gnunet (0.9.3-4) unstable; urgency=low + + * Drop dependency on gettext for gnunet-client and gnunet-server as it is not +necessary, thanks to Ivan Shmakov (Closes: #690860). + * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881, +#687883). + * Fix build on kfreebsd, thanks to Christoph Egger (Closes: #688486). + * Allways install libnss to /lib and fix FTBFS on ia64 (Closes: #688590). + * Install libnss to /lib, really fix #688590, thanks to Christian Grothoff. + * Change default option UNIX_MATCH_UID for services datastore and namestore, +so users in the gnunet group may use these services (Closes: #686238, +#684317). + * Update libgcrypt version check to a less strict check, patch picked from +upstream, following Werner Koch's advice (Closes: #684997). + * gnunet-server.postinst: check the existence of a binary before changing its +permissions (Closes: #688484). + * Do not set-UID gnunet-helper-fs-publish (Closes: #691154). + + -- Bertrand Marc beberk...@gmail.com Mon, 22 Oct 2012 22:52:43 +0200 + gnunet (0.9.3-3) unstable; urgency=low * debian/control: update Vcs-* to the new repository in collab-maint. diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control --- gnunet-0.9.3/debian/control 2012-08-05 20:12:01.0 +0200 +++ gnunet-0.9.3/debian/control 2012-10-18 21:13:37.0 +0200 @@ -30,8 +30,7 @@ Architecture: any Pre-Depends: ${misc:Pre-Depends} Depends: - ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}), - gettext + ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}) Suggests: gnunet-server, libextractor-plugins Description: secure, trust-based peer-to-peer framework (client) GNUnet is a peer-to-peer framework which focuses on providing security. All @@ -75,7 +74,7 @@ Pre-Depends: ${misc:Pre-Depends} Depends: ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}), - adduser, gettext, netbase + adduser, netbase Suggests: miniupnpc Breaks: gnunet-fuse (0.9), gnunet-client (0.9) Replaces: gnunet-fuse (0.9), gnunet-client (0.9) diff -Nru gnunet-0.9.3/debian/gnunet-client.docs gnunet-0.9.3/debian/gnunet-client.docs --- gnunet-0.9.3/debian/gnunet-client.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-client.docs 2012-09-27 22:30:34.0 +0200 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet-dev.docs gnunet-0.9.3/debian/gnunet-dev.docs --- gnunet-0.9.3/debian/gnunet-dev.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-dev.docs 2012-09-27 22:30:34.0 +0200 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet.docs gnunet-0.9.3/debian/gnunet.docs --- gnunet-0.9.3/debian/gnunet.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet.docs 2012-09-27 22:30:34.0 +0200 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet-server.docs gnunet-0.9.3/debian/gnunet-server.docs --- gnunet-0.9.3/debian/gnunet-server.docs 2012-05-05 14:37:00.0 +0200 +++ gnunet-0.9.3/debian/gnunet-server.docs 2012-09-27 22:30:34.0 +0200 @@ -1,2 +1,4 @@ +AUTHORS +README doc/README.mysql doc/README.postgres diff -Nru gnunet-0.9.3/debian/gnunet-server.install gnunet-0.9.3/debian/gnunet-server.install --- gnunet-0.9.3/debian/gnunet-server.install 2012-06-17 12:04:20.0 +0200 +++ gnunet-0.9.3/debian/gnunet-server.install 2012-10-15 12:01:20.0 +0200 @@ -41,9 +41,9 @@ usr/lib/libgnunettransporttesting.so.* usr/lib/libgnunettun.so.* usr/lib/libgnunetvpn.so.* -usr/lib/libnss_gns.so.2 -usr/lib/libnss_gns4.so.2 -usr/lib/libnss_gns6.so.2 +lib/libnss_gns.so.2 +lib/libnss_gns4.so.2 +lib/libnss_gns6.so.2 usr/lib/gnunet/*.so usr/share/gnunet/config.d usr/share/gnunet/hellos/* diff -Nru gnunet-0.9.3/debian/gnunet-server.install.kfreebsd gnunet-0.9.3/debian/gnunet-server.install.kfreebsd --- gnunet-0.9.3/debian/gnunet-server.install.kfreebsd 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-server.install.kfreebsd 2012-09-29 08:13:17.0 +0200 @@ -0,0 +1,52 @@ +etc/gnunet.conf +usr/bin/gnunet-arm +usr/bin/gnunet-core +usr/bin/gnunet-daemon-* +usr/bin/gnunet-dht-* +usr/bin/gnunet-fs +usr/bin/gnunet-gns* +usr/bin/gnunet-helper-* +usr/bin/gnunet-namestore +usr/bin/gnunet-nat-server +usr/bin/gnunet-peerinfo +usr/bin/gnunet-resolver +usr/bin/gnunet-rsa +usr/bin/gnunet-service-* +usr/bin/gnunet-testing +usr/bin/gnunet
Bug#689154: unblock: gnunet/0.9.3-4
Hello Adam, Thank you for your answer. Le 13/10/2012 18:27, Adam D. Barratt a écrit : + * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881, + #687883). What happens if a user has the broken version installed already and then upgrades to -4? As far as I can tell, nothing in the new diff helps resolve the issues which have already occurred, as opposed to stopping them recurring. You're right, nothing helps resolve the issues which have already occurred. It can only happen on new installation of gnunet on testing during the last 6 months though, so upgrades from Squeeze will go smoothly. And the issue can be easily fixed by reinstalling gnunet. + * Change default option UNIX_MATCH_UID as suggested by Daniel Dehennin, + patch picked from upstream (Closes: #686238). What does the option actually do? :) This option was there to restrict services to the gnunet user only, instead of allowing any user from the gnunet group (GID match) to use the services mentioned. The second choice is now the default, with upstream approval. I just uploaded a new revision on mentors, clarifying this change and fixing 2 more bugs. You'll find attached the full debdiff to the version already in testing. Here is the new changelog: * Drop dependency on gettext for gnunet-client and gnunet-server as it is not necessary, thanks to Ivan Shmakov (Closes: #690860). * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881, #687883). * Fix build on kfreebsd, thanks to Christoph Egger (Closes: #688486). * Allways install libnss to /lib and fix FTBFS on ia64 (Closes: #688590). * Install libnss to /lib, really fix #688590, thanks to Christian Grothoff. * Change default option UNIX_MATCH_UID for services datastore and namestore, so users in the gnunet group may use these services (Closes: #686238, #684317). * Update libgcrypt version check to a less strict check, patch picked from upstream, following Werner Koch's advice (Closes: #684997). * gnunet-server.postinst: check the existence of a binary before changing its permissions (Closes: #688484). I hope this clarifies things a bit. Cheers, Bertrand diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog --- gnunet-0.9.3/debian/changelog 2012-08-26 16:18:16.0 +0200 +++ gnunet-0.9.3/debian/changelog 2012-10-18 22:00:00.0 +0200 @@ -1,3 +1,22 @@ +gnunet (0.9.3-4) unstable; urgency=low + + * Drop dependency on gettext for gnunet-client and gnunet-server as it is not +necessary, thanks to Ivan Shmakov (Closes: #690860). + * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881, +#687883). + * Fix build on kfreebsd, thanks to Christoph Egger (Closes: #688486). + * Allways install libnss to /lib and fix FTBFS on ia64 (Closes: #688590). + * Install libnss to /lib, really fix #688590, thanks to Christian Grothoff. + * Change default option UNIX_MATCH_UID for services datastore and namestore, +so users in the gnunet group may use these services (Closes: #686238, +#684317). + * Update libgcrypt version check to a less strict check, patch picked from +upstream, following Werner Koch's advice (Closes: #684997). + * gnunet-server.postinst: check the existence of a binary before changing its +permissions (Closes: #688484). + + -- Bertrand Marc beberk...@gmail.com Thu, 18 Oct 2012 21:59:44 +0200 + gnunet (0.9.3-3) unstable; urgency=low * debian/control: update Vcs-* to the new repository in collab-maint. diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control --- gnunet-0.9.3/debian/control 2012-08-05 20:12:01.0 +0200 +++ gnunet-0.9.3/debian/control 2012-10-18 21:13:37.0 +0200 @@ -30,8 +30,7 @@ Architecture: any Pre-Depends: ${misc:Pre-Depends} Depends: - ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}), - gettext + ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}) Suggests: gnunet-server, libextractor-plugins Description: secure, trust-based peer-to-peer framework (client) GNUnet is a peer-to-peer framework which focuses on providing security. All @@ -75,7 +74,7 @@ Pre-Depends: ${misc:Pre-Depends} Depends: ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}), - adduser, gettext, netbase + adduser, netbase Suggests: miniupnpc Breaks: gnunet-fuse (0.9), gnunet-client (0.9) Replaces: gnunet-fuse (0.9), gnunet-client (0.9) diff -Nru gnunet-0.9.3/debian/gnunet-client.docs gnunet-0.9.3/debian/gnunet-client.docs --- gnunet-0.9.3/debian/gnunet-client.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-client.docs 2012-09-27 22:30:34.0 +0200 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet-dev.docs gnunet-0.9.3/debian/gnunet-dev.docs --- gnunet-0.9.3/debian/gnunet-dev.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-dev.docs 2012-09-27 22:30:34.0 +0200 @@ -0,0 +1,2 @@ +AUTHORS
Bug#689154: unblock: gnunet/0.9.3-4
Package: release.debian.org User: release.debian@packages.debian.org Usertags: unblock Severity: normal Dear release team, I prepared a new revision of GNUnet fixing a few bugs (including 4 serious bugs) with the following changes (the diff is attached): * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881, #687883). * Fix build on kfreebsd, thanks to Christoph Egger (Closes: #688486). * Remove special nssdir and hopefully fix FTBFS on ia64 (Closes: #688590). * Change default option UNIX_MATCH_UID as suggested by Daniel Dehennin, patch picked from upstream (Closes: #686238). * Update libgcrypt version check to a less strict check, patch picked from upstream, following Werner Koch's advice (Closes: #684997). * gnunet-server.postinst: check the existence of a binary before changing its permissions (Closes: #688484). Would you consider to give gnunet 0.9.3-4 a freeze exception ? This version is not yet uploaded to unstable, my sponsor is waiting for your approval. Cheers, Bertrand unblock gnunet/0.9.3-4 diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog --- gnunet-0.9.3/debian/changelog 2012-08-26 16:18:16.0 +0200 +++ gnunet-0.9.3/debian/changelog 2012-09-29 15:48:23.0 +0200 @@ -1,3 +1,18 @@ +gnunet (0.9.3-4) unstable; urgency=low + + * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881, +#687883). + * Fix build on kfreebsd, thanks to Christoph Egger (Closes: #688486). + * Remove special nssdir and hopefully fix FTBFS on ia64 (Closes: #688590). + * Change default option UNIX_MATCH_UID as suggested by Daniel Dehennin, +patch picked from upstream (Closes: #686238). + * Update libgcrypt version check to a less strict check, patch picked from +upstream, following Werner Koch's advice (Closes: #684997). + * gnunet-server.postinst: check the existence of a binary before changing its +permissions (Closes: #688484). + + -- Bertrand Marc beberk...@gmail.com Sat, 29 Sep 2012 15:45:53 +0200 + gnunet (0.9.3-3) unstable; urgency=low * debian/control: update Vcs-* to the new repository in collab-maint. diff -Nru gnunet-0.9.3/debian/gnunet-client.docs gnunet-0.9.3/debian/gnunet-client.docs --- gnunet-0.9.3/debian/gnunet-client.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-client.docs 2012-09-27 22:30:34.0 +0200 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet-dev.docs gnunet-0.9.3/debian/gnunet-dev.docs --- gnunet-0.9.3/debian/gnunet-dev.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-dev.docs 2012-09-27 22:30:34.0 +0200 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet.docs gnunet-0.9.3/debian/gnunet.docs --- gnunet-0.9.3/debian/gnunet.docs 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet.docs 2012-09-27 22:30:34.0 +0200 @@ -0,0 +1,2 @@ +AUTHORS +README diff -Nru gnunet-0.9.3/debian/gnunet-server.docs gnunet-0.9.3/debian/gnunet-server.docs --- gnunet-0.9.3/debian/gnunet-server.docs 2012-05-05 14:37:00.0 +0200 +++ gnunet-0.9.3/debian/gnunet-server.docs 2012-09-27 22:30:34.0 +0200 @@ -1,2 +1,4 @@ +AUTHORS +README doc/README.mysql doc/README.postgres diff -Nru gnunet-0.9.3/debian/gnunet-server.install.kfreebsd gnunet-0.9.3/debian/gnunet-server.install.kfreebsd --- gnunet-0.9.3/debian/gnunet-server.install.kfreebsd 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-server.install.kfreebsd 2012-09-29 08:13:17.0 +0200 @@ -0,0 +1,52 @@ +etc/gnunet.conf +usr/bin/gnunet-arm +usr/bin/gnunet-core +usr/bin/gnunet-daemon-* +usr/bin/gnunet-dht-* +usr/bin/gnunet-fs +usr/bin/gnunet-gns* +usr/bin/gnunet-helper-* +usr/bin/gnunet-namestore +usr/bin/gnunet-nat-server +usr/bin/gnunet-peerinfo +usr/bin/gnunet-resolver +usr/bin/gnunet-rsa +usr/bin/gnunet-service-* +usr/bin/gnunet-testing +usr/bin/gnunet-transport +usr/bin/gnunet-transport-certificate-creation +usr/bin/mockup-service +usr/lib/libgnunetarm.so.* +usr/lib/libgnunetats.so.* +usr/lib/libgnunetblock.so.* +usr/lib/libgnunetcore.so.* +usr/lib/libgnunetdatacache.so.* +usr/lib/libgnunetdht.so.* +usr/lib/libgnunetfragmentation.so.* +usr/lib/libgnunethello.so.* +usr/lib/libgnunetlockmanager.so.0* +usr/lib/libgnunetmesh.so.* +usr/lib/libgnunetnamestore.so.* +usr/lib/libgnunetnat.so.* +usr/lib/libgnunetnse.so.* +usr/lib/libgnunetpeerinfo.so.* +usr/lib/libgnunettesting.so.* +usr/lib/libgnunettesting_new.so.0* +usr/lib/libgnunettestbed.so.0* +usr/lib/libgnunettransport.so.* +usr/lib/libgnunettransporttesting.so.* +usr/lib/libgnunettun.so.* +usr/lib/gnunet/*.so +usr/share/gnunet/config.d +usr/share/gnunet/hellos/* +usr/share/man/man1/gnunet-arm.1 +usr/share/man/man1/gnunet-core.1 +usr/share/man/man1/gnunet-fs.1 +usr/share/man/man1/gnunet-gns.1 +usr/share/man/man1/gnunet-namestore.1 +usr/share/man/man1/gnunet-nat-server.1 +usr/share/man/man1/gnunet-peerinfo.1 +usr/share/man/man1/gnunet-rsa.1
Bug#683073: unblock: gnunet/0.9.3-3
Dear release Team, I fixed a minor bug in gnunet and I think it would be harmless to unblock it too: * Fix the logfile name in gnunet-server.logrotate (Closes: #685856). You will find attached the full debdiff between the current version of gnunet in testing/unstable and the one I'd like to see in wheezy (fixing a grave bug). Do you think it would get a freeze-exception ? Regards, Bertrand diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog --- gnunet-0.9.3/debian/changelog 2012-06-20 23:55:23.0 +0200 +++ gnunet-0.9.3/debian/changelog 2012-08-26 16:18:16.0 +0200 @@ -1,3 +1,20 @@ +gnunet (0.9.3-3) unstable; urgency=low + + * debian/control: update Vcs-* to the new repository in collab-maint. + * Install only the generated binaries on Hurd, thanks to Cyril Roelandt +(Closes: #670794). + * Use chmod and chown instead of dpkg-statoverride to set special permissions +and upgrade properly depending on the previous version (Closes: #673301). + * Fix gcc-4.6: [sparc] compiler fails to align stack-allocated +struct, with array of uint32-values to 32-bit boundary: +new patch sparc_alignment.patch, taken from upstream: +https://lists.gnu.org/archive/html/gnunet-svn/2012-07/msg00548.html +Thanks to Jurij Smakov for the analysis. +(Closes: #670578) + * Fix the logfile name in gnunet-server.logrotate (Closes: #685856). + + -- Bertrand Marc beberk...@gmail.com Sun, 05 Aug 2012 20:13:49 +0200 + gnunet (0.9.3-2) unstable; urgency=low * Clean properly dpkg-statoverride in gnunet-server.postrm diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control --- gnunet-0.9.3/debian/control 2012-06-10 10:29:08.0 +0200 +++ gnunet-0.9.3/debian/control 2012-08-05 20:12:01.0 +0200 @@ -10,8 +10,8 @@ libsqlite3-dev (=3.0), libpq-dev (=8.3), guile-1.8-dev, libglpk-dev (=4.32) Build-Conflicts: autoconf2.13, automake1.4 Standards-Version: 3.9.3 -Vcs-Git: git://git.debian.org/git/users/bbk-guest/gnunet.git -Vcs-browser: http://git.debian.org/?p=users/bbk-guest/gnunet.git +Vcs-Git: git://git.debian.org/git/collab-maint/gnunet.git +Vcs-browser: http://git.debian.org/?p=collab-maint/gnunet.git Homepage: http://www.gnunet.org/ Package: gnunet diff -Nru gnunet-0.9.3/debian/gnunet-server.install.hurd gnunet-0.9.3/debian/gnunet-server.install.hurd --- gnunet-0.9.3/debian/gnunet-server.install.hurd 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-server.install.hurd 2012-07-01 16:59:50.0 +0200 @@ -0,0 +1,52 @@ +etc/gnunet.conf +usr/bin/gnunet-arm +usr/bin/gnunet-core +usr/bin/gnunet-daemon-* +usr/bin/gnunet-dht-* +usr/bin/gnunet-fs +usr/bin/gnunet-gns* +usr/bin/gnunet-helper-* +usr/bin/gnunet-namestore +usr/bin/gnunet-nat-server +usr/bin/gnunet-peerinfo +usr/bin/gnunet-resolver +usr/bin/gnunet-rsa +usr/bin/gnunet-service-* +usr/bin/gnunet-testing +usr/bin/gnunet-transport +usr/bin/gnunet-transport-certificate-creation +usr/bin/mockup-service +usr/lib/libgnunetarm.so.* +usr/lib/libgnunetats.so.* +usr/lib/libgnunetblock.so.* +usr/lib/libgnunetcore.so.* +usr/lib/libgnunetdatacache.so.* +usr/lib/libgnunetdht.so.* +usr/lib/libgnunetfragmentation.so.* +usr/lib/libgnunethello.so.* +usr/lib/libgnunetlockmanager.so.0* +usr/lib/libgnunetmesh.so.* +usr/lib/libgnunetnamestore.so.* +usr/lib/libgnunetnat.so.* +usr/lib/libgnunetnse.so.* +usr/lib/libgnunetpeerinfo.so.* +usr/lib/libgnunettesting.so.* +usr/lib/libgnunettesting_new.so.0* +usr/lib/libgnunettestbed.so.0* +usr/lib/libgnunettransport.so.* +usr/lib/libgnunettransporttesting.so.* +usr/lib/libgnunettun.so.* +usr/lib/gnunet/*.so +usr/share/gnunet/config.d +usr/share/gnunet/hellos/* +usr/share/man/man1/gnunet-arm.1 +usr/share/man/man1/gnunet-core.1 +usr/share/man/man1/gnunet-fs.1 +usr/share/man/man1/gnunet-gns.1 +usr/share/man/man1/gnunet-namestore.1 +usr/share/man/man1/gnunet-nat-server.1 +usr/share/man/man1/gnunet-peerinfo.1 +usr/share/man/man1/gnunet-rsa.1 +usr/share/man/man1/gnunet-transport.1 +usr/share/man/man1/gnunet-vpn.1 +debian/man/* usr/share/man/man1/ diff -Nru gnunet-0.9.3/debian/gnunet-server.logrotate gnunet-0.9.3/debian/gnunet-server.logrotate --- gnunet-0.9.3/debian/gnunet-server.logrotate 2012-05-05 17:39:22.0 +0200 +++ gnunet-0.9.3/debian/gnunet-server.logrotate 2012-08-26 16:16:45.0 +0200 @@ -1,4 +1,4 @@ -/var/log/gnunetd/gnunet.log { +/var/log/gnunetd/gnunetd.log { weekly size=100k rotate 7 diff -Nru gnunet-0.9.3/debian/gnunet-server.postinst gnunet-0.9.3/debian/gnunet-server.postinst --- gnunet-0.9.3/debian/gnunet-server.postinst 2012-06-07 23:13:17.0 +0200 +++ gnunet-0.9.3/debian/gnunet-server.postinst 2012-07-07 15:50:27.0 +0200 @@ -52,6 +52,24 @@ echo done. fi + # this can go away after wheezy + if dpkg --compare-versions $2 le 0.9.3-2 dpkg --compare-versions $2 ge 0.9.2-1; then + for file in /usr/bin/gnunet-helper-exit \ +/usr/bin/gnunet-helper-fs-publish \ +/usr/bin/gnunet-helper-nat
Bug#683073: unblock: gnunet/0.9.3-3
Hello, Le 02/08/2012 22:52, Julien Cristau a écrit : + * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make +gnunet-server depend on lsb-base to use LSB logging. This part makes me extremely nervous. I don't think now is the time for this kind of change. That's why it was not uploaded to unstable, and only to mentors. I guess we could select the changes we want to see in wheezy: Sorry, I meant the init script change. I prepared a new version without the init script change. The debdiff against the current version in unstable/wheezy is attached. Do you think it could get a freeze exception like this ? diff -Nru gnunet-0.9.3/debian/gnunet-server.postinst gnunet-0.9.3/debian/gnunet-server.postinst --- gnunet-0.9.3/debian/gnunet-server.postinst 2012-06-07 23:13:17.0 +0200 +++ gnunet-0.9.3/debian/gnunet-server.postinst 2012-07-07 15:50:27.0 +0200 @@ -52,6 +52,24 @@ echo done. fi + # this can go away after wheezy + if dpkg --compare-versions $2 le 0.9.3-2 dpkg --compare-versions $2 ge 0.9.2-1; then + for file in /usr/bin/gnunet-helper-exit \ + /usr/bin/gnunet-helper-fs-publish \ + /usr/bin/gnunet-helper-nat-client \ + /usr/bin/gnunet-helper-nat-server \ + /usr/bin/gnunet-helper-transport-wlan \ + /usr/bin/gnunet-helper-vpn \ + /usr/bin/gnunet-helper-dns \ + /usr/bin/gnunet-service-dns + do + if dpkg-statoverride --list $file/dev/null 21 + then + dpkg-statoverride --remove $file + fi + done + fi + How does this interact with statoverrides set by the local admin? It doesn't. The use of dpkg-statoverride was wrong in the first place, so there is no way to know whether the local admin set statoverrides or whether the gnunet package did. And since postrm removes the gnunet group and user, we need to be sure we remove every statoverrides before postrm. Again, it is like this only since April or May, and it has not reached Stable, yet. Why does postrm do that? Is there any harm in leaving the user and group around? See also http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621833 Thanks for pointing this to me, I was not aware of these issues. Do you want me to change this for wheezy or is it ok to wait the release ? Cheers, Bertrand diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog --- gnunet-0.9.3/debian/changelog 2012-06-20 23:55:23.0 +0200 +++ gnunet-0.9.3/debian/changelog 2012-08-05 20:13:55.0 +0200 @@ -1,3 +1,19 @@ +gnunet (0.9.3-3) unstable; urgency=low + + * debian/control: update Vcs-* to the new repository in collab-maint. + * Install only the generated binaries on Hurd, thanks to Cyril Roelandt +(Closes: #670794). + * Use chmod and chown instead of dpkg-statoverride to set special permissions +and upgrade properly depending on the previous version (Closes: #673301). + * Fix gcc-4.6: [sparc] compiler fails to align stack-allocated +struct, with array of uint32-values to 32-bit boundary: +new patch sparc_alignment.patch, taken from upstream: +https://lists.gnu.org/archive/html/gnunet-svn/2012-07/msg00548.html +Thanks to Jurij Smakov for the analysis. +(Closes: #670578) + + -- Bertrand Marc beberk...@gmail.com Sun, 05 Aug 2012 20:13:49 +0200 + gnunet (0.9.3-2) unstable; urgency=low * Clean properly dpkg-statoverride in gnunet-server.postrm diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control --- gnunet-0.9.3/debian/control 2012-06-10 10:29:08.0 +0200 +++ gnunet-0.9.3/debian/control 2012-08-05 20:12:01.0 +0200 @@ -10,8 +10,8 @@ libsqlite3-dev (=3.0), libpq-dev (=8.3), guile-1.8-dev, libglpk-dev (=4.32) Build-Conflicts: autoconf2.13, automake1.4 Standards-Version: 3.9.3 -Vcs-Git: git://git.debian.org/git/users/bbk-guest/gnunet.git -Vcs-browser: http://git.debian.org/?p=users/bbk-guest/gnunet.git +Vcs-Git: git://git.debian.org/git/collab-maint/gnunet.git +Vcs-browser: http://git.debian.org/?p=collab-maint/gnunet.git Homepage: http://www.gnunet.org/ Package: gnunet diff -Nru gnunet-0.9.3/debian/gnunet-server.install.hurd gnunet-0.9.3/debian/gnunet-server.install.hurd --- gnunet-0.9.3/debian/gnunet-server.install.hurd 1970-01-01 01:00:00.0 +0100 +++ gnunet-0.9.3/debian/gnunet-server.install.hurd 2012-07-01 16:59:50.0 +0200 @@ -0,0 +1,52 @@ +etc/gnunet.conf +usr/bin/gnunet-arm +usr/bin/gnunet-core +usr/bin/gnunet-daemon-* +usr/bin/gnunet-dht-* +usr/bin/gnunet-fs +usr/bin/gnunet-gns* +usr/bin/gnunet-helper-* +usr/bin/gnunet-namestore
Bug#683073: unblock: gnunet/0.9.3-3
Le 01/08/2012 23:17, Julien Cristau a écrit : It's much easier for us if we don't have to go chase patches in other places and stuff is all in the mail. Here is the full debdiff between gnunet 0.9.3-2 (in testing/unstable) and the new revision I prepared. Cheers, Bertrand diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog --- gnunet-0.9.3/debian/changelog 2012-06-20 23:55:23.0 +0200 +++ gnunet-0.9.3/debian/changelog 2012-08-01 22:10:06.0 +0200 @@ -1,3 +1,21 @@ +gnunet (0.9.3-3) unstable; urgency=low + + * debian/control: update Vcs-* to the new repository in collab-maint. + * Install only the generated binaries on Hurd, thanks to Cyril Roelandt +(Closes: #670794). + * Use chmod and chown instead of dpkg-statoverride to set special permissions +and upgrade properly depending on the previous version (Closes: #673301). + * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make +gnunet-server depend on lsb-base to use LSB logging. + * Fix gcc-4.6: [sparc] compiler fails to align stack-allocated +struct, with array of uint32-values to 32-bit boundary: +new patch sparc_alignment.patch, taken from upstream: +https://lists.gnu.org/archive/html/gnunet-svn/2012-07/msg00548.html +Thanks to Jurij Smakov for the analysis. +(Closes: #670578) + + -- Bertrand Marc beberk...@gmail.com Wed, 01 Aug 2012 22:09:49 +0200 + gnunet (0.9.3-2) unstable; urgency=low * Clean properly dpkg-statoverride in gnunet-server.postrm diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control --- gnunet-0.9.3/debian/control 2012-06-10 10:29:08.0 +0200 +++ gnunet-0.9.3/debian/control 2012-07-13 20:04:35.0 +0200 @@ -10,8 +10,8 @@ libsqlite3-dev (=3.0), libpq-dev (=8.3), guile-1.8-dev, libglpk-dev (=4.32) Build-Conflicts: autoconf2.13, automake1.4 Standards-Version: 3.9.3 -Vcs-Git: git://git.debian.org/git/users/bbk-guest/gnunet.git -Vcs-browser: http://git.debian.org/?p=users/bbk-guest/gnunet.git +Vcs-Git: git://git.debian.org/git/collab-maint/gnunet.git +Vcs-browser: http://git.debian.org/?p=collab-maint/gnunet.git Homepage: http://www.gnunet.org/ Package: gnunet @@ -75,7 +75,7 @@ Pre-Depends: ${misc:Pre-Depends} Depends: ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}), - adduser, gettext, netbase + adduser, gettext, netbase, lsb-base Suggests: miniupnpc Breaks: gnunet-fuse (0.9), gnunet-client (0.9) Replaces: gnunet-fuse (0.9), gnunet-client (0.9) diff -Nru gnunet-0.9.3/debian/gnunet-server.init gnunet-0.9.3/debian/gnunet-server.init --- gnunet-0.9.3/debian/gnunet-server.init 2012-05-02 21:43:40.0 +0200 +++ gnunet-0.9.3/debian/gnunet-server.init 2012-07-13 20:02:50.0 +0200 @@ -1,64 +1,109 @@ -#!/bin/sh - +#! /bin/sh ### BEGIN INIT INFO -# Provides: gnunet-server -# Required-Start: $syslog $network $local_fs $remote_fs -# Required-Stop: $syslog $network $local_fs $remote_fs -# Should-Start: -# Should-Stop: -# Default-Start: 2 3 4 5 -# Default-Stop: 0 1 6 -# Short-Description: Starts the GNUnet server at boot time. -# Description: GNUnet is a secure, trust-based peer-to-peer framework. +# Provides: gnunet-server +# Required-Start:$remote_fs $syslog $network +# Required-Stop: $remote_fs $syslog $network +# Default-Start: 2 3 4 5 +# Default-Stop: 0 1 6 +# Short-Description: Starts the GNUnet server at boot time. +# Description: GNUnet is a secure, trust-based peer-to-peer framework. ### END INIT INFO -PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin +PATH=/sbin:/usr/sbin:/bin:/usr/bin +DESC=GNUnet +NAME=gnunet-server DAEMON=/usr/bin/gnunet-service-arm -NAME=gnunet-service-arm -DESC=GNUnet LOGFILE=/var/log/gnunetd/gnunetd.log +DAEMON_ARGS=-c /etc/gnunet.conf -d -l $LOGFILE +SCRIPTNAME=/etc/init.d/$NAME -test -x ${DAEMON} || exit 0 - -set -e - -# Get configuration -if [ -f /etc/default/gnunet-server ] -then - . /etc/default/gnunet-server -fi - -if [ ${GNUNET_AUTOSTART} != true ] -then - exit 0 -fi - -case ${1} in - start) - echo -n Starting ${DESC}: - start-stop-daemon --start --chuid ${GNUNET_USER} \ - --oknodo --quiet --exec ${DAEMON} -- -c \ - /etc/gnunet.conf -d -l $LOGFILE - echo ${NAME}. - ;; +# Exit if the package is not installed +[ -x $DAEMON ] || exit 0 - stop) - echo -n Stopping ${DESC}: - start-stop-daemon --stop --retry 15 \ - --oknodo --quiet --exec ${DAEMON} - echo ${NAME}. - ;; +# Read configuration variable file if it is present +[ -r /etc/default/$NAME ] . /etc/default/$NAME - restart|force-reload) - ${0} stop - sleep 1 - ${0} start +[ ${GNUNET_AUTOSTART} != true ] exit 0 + +# Define LSB log_* functions. +. /lib/lsb/init-functions + +# +# Function that starts the daemon/service +# +do_start() +{ + # Return + # 0 if daemon has been started + # 1 if daemon was already running + # 2 if daemon could not be started + start-stop-daemon --start --quiet --exec $DAEMON --test
Bug#683073: unblock: gnunet/0.9.3-3
Le 02/08/2012 20:03, Julien Cristau a écrit : diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog --- gnunet-0.9.3/debian/changelog 2012-06-20 23:55:23.0 +0200 +++ gnunet-0.9.3/debian/changelog 2012-08-01 22:10:06.0 +0200 @@ -1,3 +1,21 @@ +gnunet (0.9.3-3) unstable; urgency=low + + * debian/control: update Vcs-* to the new repository in collab-maint. + * Install only the generated binaries on Hurd, thanks to Cyril Roelandt +(Closes: #670794). + * Use chmod and chown instead of dpkg-statoverride to set special permissions +and upgrade properly depending on the previous version (Closes: #673301). + * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make +gnunet-server depend on lsb-base to use LSB logging. This part makes me extremely nervous. I don't think now is the time for this kind of change. That's why it was not uploaded to unstable, and only to mentors. I guess we could select the changes we want to see in wheezy: - The fix to build on Hurd seems harmless to me. - Getting rid of dpkg-statoverride would be nice, since its use was quite wrong. In particular, in the current package, there is no way to know whether the administrator or the gnunet package set the dpkg-statoverrides. It is in Debian only for a few months, and it would be nice not to mess up with dpkg-statoverride on Debian/stable boxes. - The rewrite of gnunet-server.init is purely cosmetic: the current package doesn't use LSB logging, so gnunet is the only line with the old look at boot. I also added the status command, making lintian happy. Clearly it is the less urgent change. + * Fix gcc-4.6: [sparc] compiler fails to align stack-allocated +struct, with array of uint32-values to 32-bit boundary: +new patch sparc_alignment.patch, taken from upstream: +https://lists.gnu.org/archive/html/gnunet-svn/2012-07/msg00548.html +Thanks to Jurij Smakov for the analysis. +(Closes: #670578) + + -- Bertrand Marcbeberk...@gmail.com Wed, 01 Aug 2012 22:09:49 +0200 + gnunet (0.9.3-2) unstable; urgency=low * Clean properly dpkg-statoverride in gnunet-server.postrm [...] diff -Nru gnunet-0.9.3/debian/gnunet-server.postinst gnunet-0.9.3/debian/gnunet-server.postinst --- gnunet-0.9.3/debian/gnunet-server.postinst 2012-06-07 23:13:17.0 +0200 +++ gnunet-0.9.3/debian/gnunet-server.postinst 2012-07-07 15:50:27.0 +0200 @@ -52,6 +52,24 @@ echo done. fi + # this can go away after wheezy + if dpkg --compare-versions $2 le 0.9.3-2 dpkg --compare-versions $2 ge 0.9.2-1; then + for file in /usr/bin/gnunet-helper-exit \ + /usr/bin/gnunet-helper-fs-publish \ + /usr/bin/gnunet-helper-nat-client \ + /usr/bin/gnunet-helper-nat-server \ + /usr/bin/gnunet-helper-transport-wlan \ + /usr/bin/gnunet-helper-vpn \ + /usr/bin/gnunet-helper-dns \ + /usr/bin/gnunet-service-dns + do + if dpkg-statoverride --list $file/dev/null 21 + then + dpkg-statoverride --remove $file + fi + done + fi + How does this interact with statoverrides set by the local admin? It doesn't. The use of dpkg-statoverride was wrong in the first place, so there is no way to know whether the local admin set statoverrides or whether the gnunet package did. And since postrm removes the gnunet group and user, we need to be sure we remove every statoverrides before postrm. Again, it is like this only since April or May, and it has not reached Stable, yet. Cheers, Bertrand -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/501ae535.20...@gmail.com
Bug#683073: unblock: gnunet/0.9.3-3
Dear release team, I prepared a new revision of gnunet, fixing a grave bug (#670578), thanks to Gregor Herrmann. Here is the new changelog: * debian/control: update Vcs-* to the new repository in collab-maint. * Install only the generated binaries on Hurd, thanks to Cyril Roelandt (Closes: #670794). * Use chmod and chown instead of dpkg-statoverride to set special permissions and upgrade properly depending on the previous version (Closes: #673301). * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make gnunet-server depend on lsb-base to use LSB logging. * Fix gcc-4.6: [sparc] compiler fails to align stack-allocated struct, with array of uint32-values to 32-bit boundary: new patch sparc_alignment.patch, taken from upstream: https://lists.gnu.org/archive/html/gnunet-svn/2012-07/msg00548.html Thanks to Jurij Smakov for the analysis. (Closes: #670578) You'll find the diff of the last fix (for the grave bug) here: http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=74;filename=670578.diff;att=1;bug=670578 Again, I uploaded it to mentors, waiting for your approval. Cheers, Bertrand -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/501994fb.9060...@gmail.com
Bug#683073: unblock: gnunet/0.9.3-3
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: freeze-exception Dear release team, (this bug submission is following my message [1] on debian-release@, to make sure my mail will not get inadvertently overlooked in the surrounding sea of unblock requests) I prepared a new revision of GNUnet fixing a few bugs with the following changes (the diff is attached): * debian/control: update Vcs-* to the new repository in collab-maint. * Install only the generated binaries on Hurd, thanks to Cyril Roelandt (Closes: #670794). * Use chmod and chown instead of dpkg-statoverride to set special permissions and upgrade properly depending on the previous version (Closes: #673301). * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make gnunet-server depend on lsb-base to use LSB logging. Would you consider to give gnunet 0.9.3-3 a freeze exception ? This version is not yet uploaded to unstable, my sponsor is waiting for your approval. Cheers, Bertrand unblock gnunet/0.9.3-3 [1] http://lists.debian.org/debian-release/2012/07/msg01149.html -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog --- gnunet-0.9.3/debian/changelog 2012-06-20 23:55:23.0 +0200 +++ gnunet-0.9.3/debian/changelog 2012-07-13 22:14:28.0 +0200 @@ -1,3 +1,15 @@ +gnunet (0.9.3-3) unstable; urgency=low + + * debian/control: update Vcs-* to the new repository in collab-maint. + * Install only the generated binaries on Hurd, thanks to Cyril Roelandt +(Closes: #670794). + * Use chmod and chown instead of dpkg-statoverride to set special permissions +and upgrade properly depending on the previous version (Closes: #673301). + * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make +gnunet-server depend on lsb-base to use LSB logging. + + -- Bertrand Marc beberk...@gmail.com Fri, 13 Jul 2012 22:13:55 +0200 + gnunet (0.9.3-2) unstable; urgency=low * Clean properly dpkg-statoverride in gnunet-server.postrm diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control --- gnunet-0.9.3/debian/control 2012-06-10 10:29:08.0 +0200 +++ gnunet-0.9.3/debian/control 2012-07-13 20:04:35.0 +0200 @@ -10,8 +10,8 @@ libsqlite3-dev (=3.0), libpq-dev (=8.3), guile-1.8-dev, libglpk-dev (=4.32) Build-Conflicts: autoconf2.13, automake1.4 Standards-Version: 3.9.3 -Vcs-Git: git://git.debian.org/git/users/bbk-guest/gnunet.git -Vcs-browser: http://git.debian.org/?p=users/bbk-guest/gnunet.git +Vcs-Git: git://git.debian.org/git/collab-maint/gnunet.git +Vcs-browser: http://git.debian.org/?p=collab-maint/gnunet.git Homepage: http://www.gnunet.org/ Package: gnunet @@ -75,7 +75,7 @@ Pre-Depends: ${misc:Pre-Depends} Depends: ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}), - adduser, gettext, netbase + adduser, gettext, netbase, lsb-base Suggests: miniupnpc Breaks: gnunet-fuse (0.9), gnunet-client (0.9) Replaces: gnunet-fuse (0.9), gnunet-client (0.9) diff -Nru gnunet-0.9.3/debian/gnunet-server.init gnunet-0.9.3/debian/gnunet-server.init --- gnunet-0.9.3/debian/gnunet-server.init 2012-05-02 21:43:40.0 +0200 +++ gnunet-0.9.3/debian/gnunet-server.init 2012-07-13 20:02:50.0 +0200 @@ -1,64 +1,109 @@ -#!/bin/sh - +#! /bin/sh ### BEGIN INIT INFO -# Provides: gnunet-server -# Required-Start: $syslog $network $local_fs $remote_fs -# Required-Stop: $syslog $network $local_fs $remote_fs -# Should-Start: -# Should-Stop: -# Default-Start: 2 3 4 5 -# Default-Stop: 0 1 6 -# Short-Description: Starts the GNUnet server at boot time. -# Description: GNUnet is a secure, trust-based peer-to-peer framework. +# Provides: gnunet-server +# Required-Start:$remote_fs $syslog $network +# Required-Stop: $remote_fs $syslog $network +# Default-Start: 2 3 4 5 +# Default-Stop: 0 1 6 +# Short-Description: Starts the GNUnet server at boot time. +# Description: GNUnet is a secure, trust-based peer-to-peer framework. ### END INIT INFO -PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin +PATH=/sbin:/usr/sbin:/bin:/usr/bin +DESC=GNUnet +NAME=gnunet-server DAEMON=/usr/bin/gnunet-service-arm -NAME=gnunet-service-arm -DESC=GNUnet LOGFILE=/var/log/gnunetd/gnunetd.log +DAEMON_ARGS=-c /etc/gnunet.conf -d -l $LOGFILE +SCRIPTNAME=/etc/init.d/$NAME -test -x ${DAEMON} || exit 0 - -set -e - -# Get configuration -if [ -f /etc/default/gnunet-server ] -then - . /etc/default/gnunet-server -fi - -if [ ${GNUNET_AUTOSTART} != true ] -then - exit 0 -fi - -case ${1} in - start) - echo -n Starting ${DESC}: - start-stop-daemon --start --chuid
Freeze exception request: gnunet-0.9.3-3
Dear release team, I prepared a new revision of GNUnet fixing a few bugs with the following changes (the diff is attached): * debian/control: update Vcs-* to the new repository in collab-maint. * Install only the generated binaries on Hurd, thanks to Cyril Roelandt (Closes: #670794). * Use chmod and chown instead of dpkg-statoverride to set special permissions and upgrade properly depending on the previous version (Closes: #673301). * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make gnunet-server depend on lsb-base to use LSB logging. Would you consider to give gnunet 0.9.3-3 a freeze exception ? Cheers, Bertrand diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog --- gnunet-0.9.3/debian/changelog 2012-06-20 23:55:23.0 +0200 +++ gnunet-0.9.3/debian/changelog 2012-07-13 22:14:28.0 +0200 @@ -1,3 +1,15 @@ +gnunet (0.9.3-3) unstable; urgency=low + + * debian/control: update Vcs-* to the new repository in collab-maint. + * Install only the generated binaries on Hurd, thanks to Cyril Roelandt +(Closes: #670794). + * Use chmod and chown instead of dpkg-statoverride to set special permissions +and upgrade properly depending on the previous version (Closes: #673301). + * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make +gnunet-server depend on lsb-base to use LSB logging. + + -- Bertrand Marc beberk...@gmail.com Fri, 13 Jul 2012 22:13:55 +0200 + gnunet (0.9.3-2) unstable; urgency=low * Clean properly dpkg-statoverride in gnunet-server.postrm diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control --- gnunet-0.9.3/debian/control 2012-06-10 10:29:08.0 +0200 +++ gnunet-0.9.3/debian/control 2012-07-13 20:04:35.0 +0200 @@ -10,8 +10,8 @@ libsqlite3-dev (=3.0), libpq-dev (=8.3), guile-1.8-dev, libglpk-dev (=4.32) Build-Conflicts: autoconf2.13, automake1.4 Standards-Version: 3.9.3 -Vcs-Git: git://git.debian.org/git/users/bbk-guest/gnunet.git -Vcs-browser: http://git.debian.org/?p=users/bbk-guest/gnunet.git +Vcs-Git: git://git.debian.org/git/collab-maint/gnunet.git +Vcs-browser: http://git.debian.org/?p=collab-maint/gnunet.git Homepage: http://www.gnunet.org/ Package: gnunet @@ -75,7 +75,7 @@ Pre-Depends: ${misc:Pre-Depends} Depends: ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}), - adduser, gettext, netbase + adduser, gettext, netbase, lsb-base Suggests: miniupnpc Breaks: gnunet-fuse (0.9), gnunet-client (0.9) Replaces: gnunet-fuse (0.9), gnunet-client (0.9) diff -Nru gnunet-0.9.3/debian/gnunet-server.init gnunet-0.9.3/debian/gnunet-server.init --- gnunet-0.9.3/debian/gnunet-server.init 2012-05-02 21:43:40.0 +0200 +++ gnunet-0.9.3/debian/gnunet-server.init 2012-07-13 20:02:50.0 +0200 @@ -1,64 +1,109 @@ -#!/bin/sh - +#! /bin/sh ### BEGIN INIT INFO -# Provides: gnunet-server -# Required-Start: $syslog $network $local_fs $remote_fs -# Required-Stop: $syslog $network $local_fs $remote_fs -# Should-Start: -# Should-Stop: -# Default-Start: 2 3 4 5 -# Default-Stop: 0 1 6 -# Short-Description: Starts the GNUnet server at boot time. -# Description: GNUnet is a secure, trust-based peer-to-peer framework. +# Provides: gnunet-server +# Required-Start:$remote_fs $syslog $network +# Required-Stop: $remote_fs $syslog $network +# Default-Start: 2 3 4 5 +# Default-Stop: 0 1 6 +# Short-Description: Starts the GNUnet server at boot time. +# Description: GNUnet is a secure, trust-based peer-to-peer framework. ### END INIT INFO -PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin +PATH=/sbin:/usr/sbin:/bin:/usr/bin +DESC=GNUnet +NAME=gnunet-server DAEMON=/usr/bin/gnunet-service-arm -NAME=gnunet-service-arm -DESC=GNUnet LOGFILE=/var/log/gnunetd/gnunetd.log +DAEMON_ARGS=-c /etc/gnunet.conf -d -l $LOGFILE +SCRIPTNAME=/etc/init.d/$NAME -test -x ${DAEMON} || exit 0 - -set -e - -# Get configuration -if [ -f /etc/default/gnunet-server ] -then - . /etc/default/gnunet-server -fi - -if [ ${GNUNET_AUTOSTART} != true ] -then - exit 0 -fi - -case ${1} in - start) - echo -n Starting ${DESC}: - start-stop-daemon --start --chuid ${GNUNET_USER} \ - --oknodo --quiet --exec ${DAEMON} -- -c \ - /etc/gnunet.conf -d -l $LOGFILE - echo ${NAME}. - ;; +# Exit if the package is not installed +[ -x $DAEMON ] || exit 0 - stop) - echo -n Stopping ${DESC}: - start-stop-daemon --stop --retry 15 \ - --oknodo --quiet --exec ${DAEMON} - echo ${NAME}. - ;; +# Read configuration variable file if it is present +[ -r /etc/default/$NAME ] . /etc/default/$NAME - restart|force-reload) - ${0} stop - sleep 1 - ${0} start +[ ${GNUNET_AUTOSTART} != true ] exit 0 + +# Define LSB log_* functions. +. /lib/lsb/init-functions + +# +# Function that starts the daemon/service +# +do_start() +{ + # Return + # 0 if daemon has been started + # 1 if daemon was already running + # 2 if daemon could not be started
Re: Request removal for gnunet-fuse
Hello, Thank you Holger for cc:ing me. Le 02/06/2012 23:21, Holger Levsen a écrit : cc:ing the gnunet maintainer as he told me he was thinking of adoptiong these packages... (he's also aware of the upstream situation..) I can confirm I am also interested in adopting gnunet-*. On Samstag, 2. Juni 2012, Artur Rona wrote: I'm requesting removal for package gnunet-fuse. It's orphaned, outdated and doesn't work anymore with gnunet 0.9.2. Also, there is a FTBFS bug (http://bugs.debian.org/674342). It doesn't make sense to keep it in testing. I've got in touch with upstream. They are going to re-work gnunet-fuse, but no at this moment. The next question is, whether we want to keep it in unstable as well? I didn't file an ITA for gnunet-fuse (or gnunet-qt) yet, since they are both outdated and I cannot do anything about it. But IMHO they should not be testing. As soon as upstream will release a version compatible with GNUnet 0.9.2 I'll adopt these and update the version in unstable. It will probably be after the freeze though. Cheers, Bertrand PS please CC me (or gnu...@packages.debian.org) -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4fcb9ac6.7080...@gmail.com
Bug#672117: transition: libextractor
Hello, Despite the wontfix tag on the RFS, libextractor got uploaded to unstable with gnunet... Bertrand -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4fb569d3.2080...@gmail.com
Bug#672115: transition: libmicrohttpd
Le 11/05/2012 12:17, Cyril Brulebois a écrit : Cyril Bruleboisk...@debian.org (11/05/2012): Unless I hear objections, I'll probably schedule those âtomorrowâ. BinNMUs for libmicrohttpd scheduled. Mraw, KiBi. It's fine with me. GNUnet 0.8 is not very useful anyway since it is not compatible with 0.9 and there are not many users left on the 0.8 network. Bertrand -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4fad2683.5050...@gmail.com
Bug#672117: transition: libextractor
Hi Cyril, 2012/5/8 Cyril Brulebois k...@debian.org: Did you a rebuild test for the reverse dependencies? Thobias Grimm confirmed a few weeks ago that vdr-plugin-xineliboutput builds fine with libextractor3. And at this time it seemed to me the other reverse deps were from the GNUnet stack, so they are written by the same dev (Christian Grothoff), and are either orphaned or RFS by me. And I've just asked people not to sponsor it. Please wait until we say OK, meaning after the exiv2 transitions is over. Ok, I didn't want to mess up with an ongoing transition. But don't you think a 'wontfix' tag on the RFS is a bit final ? Wouldn't a simple 'blocked by' be enough ? Cheers, Bertrand -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CACz8X-HA=HDSU7DfzrKXr4fC8bPnS8c+yfOGU=hbr6bxbqh...@mail.gmail.com
Bug#672115: transition: libmicrohttpd
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: transition Dear Release Team, I am filing this bug for the transition of the libmicrohttpd package. Upstream released a new version, bumping the ABI version (SONAME) from 5 to 10. Among the reverse deps, it may not be necessary to binNMU gnunet, since a new version is waiting for a sponsor on mentors. A sponsor already uploaded the libmicrohttpd package to unstable. Best regards, Bertrand -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-2-amd64 (SMP w/2 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4fa93ace.3050...@gmail.com
Bug#672117: transition: libextractor
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: transition Dear Release Team, I am filing this bug for the transition of the libextractor package. Upstream released a new version, bumping the ABI version (SONAME) from 1c2a to 3. Among the reverse deps, it may not be necessary to binNMU gnunet, since a new version is waiting for a sponsor on mentors. The new package is already waiting for a sponsor on mentors, see RFS #669717. Best regards, Bertrand -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-2-amd64 (SMP w/2 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4fa93d84.2010...@gmail.com
Please binNMU gnome-phone-manager against new gnome-bluetooth
Hello, A new version of gnome-bluetooth is in unstable since 2009-10-11, and since then gnome-phone-manager is not installable (see [1]). Could you binNMU gnome-phone-manager to make it depend on the new version of gnome-bluetooth ? nmu gnome-phone-manager_0.65-1 . -m 'Rebuild against new gnome-bluetooth' Thanks. Bertrand [1] http://qa.debian.org/debcheck.php?dist=testingpackage=gnome-phone-manager http://qa.debian.org/debcheck.php?dist=unstablepackage=gnome-phone-manager -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Unblock Easytag
Hi, I just noticed that Easytag has an Unblock request by freeze-exception ignored due to version mismatch. It seems that there was an unblock request for version 2.1.4-1, but since the last NMU, there is a version mismatch and easytag can't make it to Lenny. Since there has been only an NMU closing a bug, I was wondering if you could consider updating the unblock request to 2.1.4-1.1. It would be a shame if Easytag was not in Lenny. Regards, Bertrand