Bug#885619: jessie-pu: package libextractor/1:1.3-2

2018-06-11 Thread Bertrand Marc

Le 08/06/2018 à 22:24, Adam D. Barratt a écrit :

Control: tags -1 + moreinfo

On Thu, 2017-12-28 at 17:32 +0100, Bertrand Marc wrote:

Would you allow an update of libextractor 1.3-2 in Jessie to fix
several minor security issues?
7 issues skipped by the security teams:


[...]

   * CVE-2017-15600 <https://security-tracker.debian.org/tracker/CVE-
2017-15600>: In GNU Libextractor 1.4, there is a NULL Pointer
Dereference in the
 EXTRACTOR_nsf_extract_method function of plugins/nsf_extractor.c.


I assume the same issue that Julien raised for the stretch package
applies here.

Regards,

Adam

Indeed. The attached patch would fix the issue.

Regards,
Bertrand
diff -Nru libextractor-1.3/debian/changelog libextractor-1.3/debian/changelog
--- libextractor-1.3/debian/changelog	2014-09-30 22:56:54.0 +0200
+++ libextractor-1.3/debian/changelog	2017-12-27 19:01:53.0 +0100
@@ -1,3 +1,14 @@
+libextractor (1:1.3-2+deb8u1) jessie; urgency=medium
+
+  * Fix CVE-2017-15266, CVE-2017-15267, CVE-2017-15600, CVE-2017-15601,
+CVE-2017-15602, CVE-2017-15922 and CVE-2017-17440. Leon Zhao discovered
+several security vulnerabilities, NULL Pointer Dereferences, heap-based
+buffer overflows, integer signedness errors and out-of-bounds read that
+may lead to a denial-of-service (application crash) or have other
+unspecified impact.
+
+ -- Bertrand Marc   Wed, 27 Dec 2017 19:01:53 +0100
+
 libextractor (1:1.3-2) unstable; urgency=medium
 
   * Build-depend on libmagic-dev and libavresample-dev to enable additional
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15266.patch libextractor-1.3/debian/patches/CVE-2017-15266.patch
--- libextractor-1.3/debian/patches/CVE-2017-15266.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15266.patch	2017-12-27 19:01:53.0 +0100
@@ -0,0 +1,17 @@
+From: Bertrand Marc 
+Subject: CVE-2017-15266
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg2.html
+Bug-Debian: https://bugs.debian.org/878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=b577d5452c5c4ee9d552da62a24b95f461551fe2
+--- a/src/plugins/wav_extractor.c
 b/src/plugins/wav_extractor.c
+@@ -109,6 +109,8 @@
+ return;/* invalid sample size found in wav file */
+   if (0 == channels)
+ return;/* invalid channels value -- avoid division by 0! */
++  if (0 == sample_rate)
++return;/* invalid sample_rate */
+   samples = data_len / (channels * (sample_size >> 3));
+ 
+   snprintf (scratch,
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15267.patch libextractor-1.3/debian/patches/CVE-2017-15267.patch
--- libextractor-1.3/debian/patches/CVE-2017-15267.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15267.patch	2017-12-27 19:01:53.0 +0100
@@ -0,0 +1,22 @@
+From: Markus Koschany 
+Date: Mon, 4 Dec 2017 00:00:15 +0100
+Subject: CVE-2017-15267
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg3.html
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=6095d7132b57fc7368fc7a40bab2a71b735724d2
+---
+ src/plugins/flac_extractor.c | 2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/src/plugins/flac_extractor.c
 b/src/plugins/flac_extractor.c
+@@ -339,6 +339,8 @@
+ 	  {
+ 	entry = >comments[count];
+ 	eq = (const char*) entry->entry;
++	if (NULL == eq)
++			break;
+ 	len = entry->length;
+ 	ilen = 0;
+ 	while ( ('=' != *eq) && ('\0' != *eq) &&
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15600.patch libextractor-1.3/debian/patches/CVE-2017-15600.patch
--- libextractor-1.3/debian/patches/CVE-2017-15600.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15600.patch	2017-12-27 19:01:53.00000 +0100
@@ -0,0 +1,29 @@
+From: Bertrand Marc , Markus Koschany 
+Subject: CVE-2017-15600
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg4.html
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=38e8933539ee9d044057b18a971c2eae3c21aba7
+--- a/src/plugins/nsf_extractor.c
 b/src/plugins/nsf_extractor.c
+@@ -152,13 +152,17 @@
+   char nsfversion[32];
+   const struct header *head;
+   void *data;
++  ssize_t ds;
+ 
+-  if (sizeof (struct header) >
+-  ec->read (ec->cls,
+-		,
+-		sizeof (struct header)))
++  ds = ec->read (ec->cls,
++ ,
++ sizeof (struct header));
++  if ( (-1 == ds) ||
++   (sizeof (struct header) > ds) )
+ return;
+   head = data; 
++  if (NULL == head)
++return;
+ 
+   /* Check "magic" id bytes */
+   if (memcmp (head->magicid, "NESM\x1a", 5))
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15601.patch libextractor-1.3/debian/patches/CVE-2017-15601.p

Bug#885617: stretch-pu: package libextractor/1:1.3-4

2018-02-25 Thread Bertrand Marc
Le 10/02/2018 à 11:13, Julien Cristau a écrit :
> Control: tag -1 moreinfo
>
> On Thu, Dec 28, 2017 at 17:11:02 +0100, Bertrand Marc wrote:
>
>> diff -Nru libextractor-1.3/debian/patches/CVE-2017-15600.patch 
>> libextractor-1.3/debian/patches/CVE-2017-15600.patch
>> --- libextractor-1.3/debian/patches/CVE-2017-15600.patch 1970-01-01 
>> 01:00:00.0 +0100
>> +++ libextractor-1.3/debian/patches/CVE-2017-15600.patch 2017-12-28 
>> 11:39:33.00000 +0100
>> @@ -0,0 +1,29 @@
>> +From: Bertrand Marc <bm...@debian.org>, Markus Koschany <a...@debian.org>
>> +Subject: CVE-2017-15600
>> +
>> +Bug-Upstream: 
>> http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg4.html
>> +Origin: 
>> https://gnunet.org/git/libextractor.git/commit/?id=38e8933539ee9d044057b18a971c2eae3c21aba7
>> +--- a/src/plugins/nsf_extractor.c
>>  b/src/plugins/nsf_extractor.c
>> +@@ -152,13 +152,17 @@
>> +   char nsfversion[32];
>> +   const struct header *head;
>> +   void *data;
>> ++  ssize_t ds;
>> + 
>> +-  if (sizeof (struct header) >
>> +-  ec->read (ec->cls,
>> +-   ,
>> +-   sizeof (struct header)))
>> ++  ds = ec->read (ec->cls,
>> ++ ,
>> ++ sizeof (struct header));
>> ++  if ( (-1 == ds) ||
>> ++   (sizeof (struct header) > ds) )
>> + return;
>> +   head = data; 
>> ++  if (NULL == head)
>> ++return 0; 
>> + 
> Curious how that works.  3 lines above is plain "return", and here
> "return 0".  What's the type of that function and how did the compiler
> not flag this?
>
> Cheers,
> Julien

Indeed, sorry. The type of the function was changed from void (in wheezy) to 
int (in jessie). I updated the patch attached accordingly.


Cheers,

Bertrand

diff -Nru libextractor-1.3/debian/changelog libextractor-1.3/debian/changelog
--- libextractor-1.3/debian/changelog	2016-04-26 22:58:56.0 +0200
+++ libextractor-1.3/debian/changelog	2017-12-28 11:39:33.0 +0100
@@ -1,3 +1,14 @@
+libextractor (1:1.3-4+deb9u1) stretch; urgency=medium
+
+  * Fix CVE-2017-15266, CVE-2017-15267, CVE-2017-15600, CVE-2017-15601,
+CVE-2017-15602, CVE-2017-15922 and CVE-2017-17440. Leon Zhao discovered
+several security vulnerabilities, NULL Pointer Dereferences, heap-based
+buffer overflows, integer signedness errors and out-of-bounds read that
+may lead to a denial-of-service (application crash) or have other
+unspecified impact.
+
+ -- Bertrand Marc <bm...@debian.org>  Thu, 28 Dec 2017 11:39:33 +0100
+
 libextractor (1:1.3-4) unstable; urgency=medium
 
   * Update debian/patches/ffmpeg2.9.patch with a new commit taken from upstream
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15266.patch libextractor-1.3/debian/patches/CVE-2017-15266.patch
--- libextractor-1.3/debian/patches/CVE-2017-15266.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15266.patch	2017-12-28 11:39:33.0 +0100
@@ -0,0 +1,17 @@
+From: Bertrand Marc <bm...@debian.org>
+Subject: CVE-2017-15266
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg2.html
+Bug-Debian: https://bugs.debian.org/878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=b577d5452c5c4ee9d552da62a24b95f461551fe2
+--- a/src/plugins/wav_extractor.c
 b/src/plugins/wav_extractor.c
+@@ -109,6 +109,8 @@
+ return;/* invalid sample size found in wav file */
+   if (0 == channels)
+ return;/* invalid channels value -- avoid division by 0! */
++  if (0 == sample_rate)
++return;/* invalid sample_rate */
+   samples = data_len / (channels * (sample_size >> 3));
+ 
+   snprintf (scratch,
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15267.patch libextractor-1.3/debian/patches/CVE-2017-15267.patch
--- libextractor-1.3/debian/patches/CVE-2017-15267.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15267.patch	2017-12-28 11:39:33.0 +0100
@@ -0,0 +1,22 @@
+From: Markus Koschany <a...@debian.org>
+Date: Mon, 4 Dec 2017 00:00:15 +0100
+Subject: CVE-2017-15267
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg3.html
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=6095d7132b57fc7368fc7a40bab2a71b735724d2
+---
+ src/plugins/flac_extractor.c | 2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/src/plugins/flac_extractor.c
 b/src/plugins/flac_extractor.c
+@@ -339,6 +339,8 @@
+ 	  {
+ 	entry = >comments[count];
+ 	eq = (const char*) entry->entry;
++	if (NULL == eq)
++			bre

Bug#885619: jessie-pu: package libextractor/1:1.3-2

2017-12-28 Thread Bertrand Marc
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: jessie
Severity: normal

Dear release team,

Would you allow an update of libextractor 1.3-2 in Jessie to fix several minor 
security issues?
7 issues skipped by the security teams:

  * CVE-2017-15266 
<https://security-tracker.debian.org/tracker/CVE-2017-15266>: In GNU 
Libextractor 1.4, there is a Divide-By-Zero in EXTRACTOR_wav_extract_method in
wav_extractor.c via a zero sample rate.
  * CVE-2017-15922 
<https://security-tracker.debian.org/tracker/CVE-2017-15922>: In GNU 
Libextractor 1.4, there is an out-of-bounds read in the 
EXTRACTOR_dvi_extract_method
function in plugins/dvi_extractor.c.
  * CVE-2017-15267 
<https://security-tracker.debian.org/tracker/CVE-2017-15267>: In GNU 
Libextractor 1.4, there is a NULL Pointer Dereference in flac_metadata in
flac_extractor.c.
  * CVE-2017-15602 
<https://security-tracker.debian.org/tracker/CVE-2017-15602>: In GNU 
Libextractor 1.4, there is an integer signedness error for the chunk size in the
EXTRACTOR_nsfe_extract_method function in plugins/nsfe_extractor.c, leading 
to an infinite loop for a crafted size.
  * CVE-2017-17440 
<https://security-tracker.debian.org/tracker/CVE-2017-17440>: GNU Libextractor 
1.6 allows remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via a crafted GIF, IT (Impulse Tracker), 
NSFE, S3M (Scream Tracker 3), SID, or XM (eXtended Module) file, as 
demonstrated by the
EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c.
  * CVE-2017-15600 
<https://security-tracker.debian.org/tracker/CVE-2017-15600>: In GNU 
Libextractor 1.4, there is a NULL Pointer Dereference in the
EXTRACTOR_nsf_extract_method function of plugins/nsf_extractor.c.
  * CVE-2017-15601 
<https://security-tracker.debian.org/tracker/CVE-2017-15601>: In GNU 
Libextractor 1.4, there is a heap-based buffer overflow in the
EXTRACTOR_png_extract_method function in plugins/png_extractor.c, related 
to processiTXt and stndup.

You will find attached the full debdiff.


Cheers,
Bertrand

PS These are the same changes as in #885617

diff -Nru libextractor-1.3/debian/changelog libextractor-1.3/debian/changelog
--- libextractor-1.3/debian/changelog	2014-09-30 22:56:54.0 +0200
+++ libextractor-1.3/debian/changelog	2017-12-27 19:01:53.0 +0100
@@ -1,3 +1,14 @@
+libextractor (1:1.3-2+deb8u1) jessie; urgency=medium
+
+  * Fix CVE-2017-15266, CVE-2017-15267, CVE-2017-15600, CVE-2017-15601,
+CVE-2017-15602, CVE-2017-15922 and CVE-2017-17440. Leon Zhao discovered
+several security vulnerabilities, NULL Pointer Dereferences, heap-based
+buffer overflows, integer signedness errors and out-of-bounds read that
+may lead to a denial-of-service (application crash) or have other
+    unspecified impact.
+
+ -- Bertrand Marc <bm...@debian.org>  Wed, 27 Dec 2017 19:01:53 +0100
+
 libextractor (1:1.3-2) unstable; urgency=medium
 
   * Build-depend on libmagic-dev and libavresample-dev to enable additional
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15266.patch libextractor-1.3/debian/patches/CVE-2017-15266.patch
--- libextractor-1.3/debian/patches/CVE-2017-15266.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15266.patch	2017-12-27 19:01:53.0 +0100
@@ -0,0 +1,17 @@
+From: Bertrand Marc <bm...@debian.org>
+Subject: CVE-2017-15266
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg2.html
+Bug-Debian: https://bugs.debian.org/878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=b577d5452c5c4ee9d552da62a24b95f461551fe2
+--- a/src/plugins/wav_extractor.c
 b/src/plugins/wav_extractor.c
+@@ -109,6 +109,8 @@
+ return;/* invalid sample size found in wav file */
+   if (0 == channels)
+ return;/* invalid channels value -- avoid division by 0! */
++  if (0 == sample_rate)
++return;/* invalid sample_rate */
+   samples = data_len / (channels * (sample_size >> 3));
+ 
+   snprintf (scratch,
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15267.patch libextractor-1.3/debian/patches/CVE-2017-15267.patch
--- libextractor-1.3/debian/patches/CVE-2017-15267.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15267.patch	2017-12-27 19:01:53.0 +0100
@@ -0,0 +1,22 @@
+From: Markus Koschany <a...@debian.org>
+Date: Mon, 4 Dec 2017 00:00:15 +0100
+Subject: CVE-2017-15267
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg3.html
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=6095d7132b57fc7368fc7a40bab2a71b735724d2
+---
+ src/plugins/flac_extractor.c | 2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/src/plugins/flac

Bug#885617: stretch-pu: package libextractor/1:1.3-4

2017-12-28 Thread Bertrand Marc
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: stretch
Severity: normal

Dear release team,

Would you allow an update of libextractor 1.3-4 in Stretch to fix several minor 
security issues?
7 issues skipped by the security teams:

  * CVE-2017-15266 
<https://security-tracker.debian.org/tracker/CVE-2017-15266>: In GNU 
Libextractor 1.4, there is a Divide-By-Zero in EXTRACTOR_wav_extract_method in
wav_extractor.c via a zero sample rate.
  * CVE-2017-15922 
<https://security-tracker.debian.org/tracker/CVE-2017-15922>: In GNU 
Libextractor 1.4, there is an out-of-bounds read in the 
EXTRACTOR_dvi_extract_method
function in plugins/dvi_extractor.c.
  * CVE-2017-15267 
<https://security-tracker.debian.org/tracker/CVE-2017-15267>: In GNU 
Libextractor 1.4, there is a NULL Pointer Dereference in flac_metadata in
flac_extractor.c.
  * CVE-2017-15602 
<https://security-tracker.debian.org/tracker/CVE-2017-15602>: In GNU 
Libextractor 1.4, there is an integer signedness error for the chunk size in the
EXTRACTOR_nsfe_extract_method function in plugins/nsfe_extractor.c, leading 
to an infinite loop for a crafted size.
  * CVE-2017-17440 
<https://security-tracker.debian.org/tracker/CVE-2017-17440>: GNU Libextractor 
1.6 allows remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via a crafted GIF, IT (Impulse Tracker), 
NSFE, S3M (Scream Tracker 3), SID, or XM (eXtended Module) file, as 
demonstrated by the
EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c.
  * CVE-2017-15600 
<https://security-tracker.debian.org/tracker/CVE-2017-15600>: In GNU 
Libextractor 1.4, there is a NULL Pointer Dereference in the
EXTRACTOR_nsf_extract_method function of plugins/nsf_extractor.c.
  * CVE-2017-15601 
<https://security-tracker.debian.org/tracker/CVE-2017-15601>: In GNU 
Libextractor 1.4, there is a heap-based buffer overflow in the
EXTRACTOR_png_extract_method function in plugins/png_extractor.c, related 
to processiTXt and stndup.

You will find attached the full debdiff.


Cheers,

Bertrand

diff -Nru libextractor-1.3/debian/changelog libextractor-1.3/debian/changelog
--- libextractor-1.3/debian/changelog	2016-04-26 22:58:56.0 +0200
+++ libextractor-1.3/debian/changelog	2017-12-28 11:39:33.0 +0100
@@ -1,3 +1,14 @@
+libextractor (1:1.3-4+deb9u1) stretch; urgency=medium
+
+  * Fix CVE-2017-15266, CVE-2017-15267, CVE-2017-15600, CVE-2017-15601,
+CVE-2017-15602, CVE-2017-15922 and CVE-2017-17440. Leon Zhao discovered
+several security vulnerabilities, NULL Pointer Dereferences, heap-based
+buffer overflows, integer signedness errors and out-of-bounds read that
+may lead to a denial-of-service (application crash) or have other
+    unspecified impact.
+
+ -- Bertrand Marc <bm...@debian.org>  Thu, 28 Dec 2017 11:39:33 +0100
+
 libextractor (1:1.3-4) unstable; urgency=medium
 
   * Update debian/patches/ffmpeg2.9.patch with a new commit taken from upstream
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15266.patch libextractor-1.3/debian/patches/CVE-2017-15266.patch
--- libextractor-1.3/debian/patches/CVE-2017-15266.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15266.patch	2017-12-28 11:39:33.0 +0100
@@ -0,0 +1,17 @@
+From: Bertrand Marc <bm...@debian.org>
+Subject: CVE-2017-15266
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg2.html
+Bug-Debian: https://bugs.debian.org/878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=b577d5452c5c4ee9d552da62a24b95f461551fe2
+--- a/src/plugins/wav_extractor.c
 b/src/plugins/wav_extractor.c
+@@ -109,6 +109,8 @@
+ return;/* invalid sample size found in wav file */
+   if (0 == channels)
+ return;/* invalid channels value -- avoid division by 0! */
++  if (0 == sample_rate)
++return;/* invalid sample_rate */
+   samples = data_len / (channels * (sample_size >> 3));
+ 
+   snprintf (scratch,
diff -Nru libextractor-1.3/debian/patches/CVE-2017-15267.patch libextractor-1.3/debian/patches/CVE-2017-15267.patch
--- libextractor-1.3/debian/patches/CVE-2017-15267.patch	1970-01-01 01:00:00.0 +0100
+++ libextractor-1.3/debian/patches/CVE-2017-15267.patch	2017-12-28 11:39:33.0 +0100
@@ -0,0 +1,22 @@
+From: Markus Koschany <a...@debian.org>
+Date: Mon, 4 Dec 2017 00:00:15 +0100
+Subject: CVE-2017-15267
+
+Bug-Upstream: http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg3.html
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
+Origin: https://gnunet.org/git/libextractor.git/commit/?id=6095d7132b57fc7368fc7a40bab2a71b735724d2
+---
+ src/plugins/flac_extractor.c | 2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/src/plugins/flac_extractor.c
 b/src/plugins/flac_extr

Bug#856713: unblock: gnunet-gtk/0.10.1-5

2017-03-04 Thread Bertrand Marc
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal

Dear realease team,

Please unblock package gnunet-gtk. The version 0.10.1-5 currently in unstable 
fixes bug #855706 (of important severity), with the following changes:
 gnunet-gtk (0.10.1-5) unstable; urgency=medium
   * Move the plugins from gnunet-gtk-dev to gnunet-gtk and add
 breaks/replaces: gnunet-gtk-dev for gnunet-gtk (Closes: #855706).

You will find attached a source debdiff between testing and the package in 
unstable.
unblock gnunet-gtk/0.10.1-5

Best regards,
Bertrand Marc
diff -Nru gnunet-gtk-0.10.1/debian/changelog gnunet-gtk-0.10.1/debian/changelog
--- gnunet-gtk-0.10.1/debian/changelog  2016-08-20 13:04:30.0 +0200
+++ gnunet-gtk-0.10.1/debian/changelog  2017-02-28 20:01:19.0 +0100
@@ -1,3 +1,10 @@
+gnunet-gtk (0.10.1-5) unstable; urgency=medium
+
+  * Move the plugins from gnunet-gtk-dev to gnunet-gtk and add
+breaks/replaces: gnunet-gtk-dev for gnunet-gtk (Closes: #855706).
+
+ -- Bertrand Marc <bm...@debian.org>  Tue, 28 Feb 2017 20:01:19 +0100
+
 gnunet-gtk (0.10.1-4) unstable; urgency=medium
 
   * Add a patch written by Chris Lamb to make the build reproducible
diff -Nru gnunet-gtk-0.10.1/debian/control gnunet-gtk-0.10.1/debian/control
--- gnunet-gtk-0.10.1/debian/control2016-08-20 12:46:06.0 +0200
+++ gnunet-gtk-0.10.1/debian/control2017-02-28 19:57:07.0 +0100
@@ -14,8 +14,8 @@
 Architecture: any
 Depends: ${misc:Depends}, ${shlibs:Depends}, policykit-1
 Recommends: gnunet
-Breaks: gnunet-tools (<<0.9)
-Replaces: gnunet-tools (<<0.9)
+Breaks: gnunet-tools (<<0.9), gnunet-gtk-dev (<<0.10.1-5)
+Replaces: gnunet-tools (<<0.9), gnunet-gtk-dev (<<0.10.1-5)
 Description: GNU's framework for secure peer-to-peer networking (GTK+ client)
  GNUnet is a framework for secure peer-to-peer networking that does not use any
  centralized or otherwise trusted services. Its high-level goal is to provide a
diff -Nru gnunet-gtk-0.10.1/debian/gnunet-gtk-dev.install 
gnunet-gtk-0.10.1/debian/gnunet-gtk-dev.install
--- gnunet-gtk-0.10.1/debian/gnunet-gtk-dev.install 2016-08-15 
20:25:11.0 +0200
+++ gnunet-gtk-0.10.1/debian/gnunet-gtk-dev.install 2017-02-26 
11:03:58.0 +0100
@@ -1,3 +1,2 @@
 usr/include
 usr/lib/*/*.so
-usr/lib/*/gnunet/*.so
diff -Nru gnunet-gtk-0.10.1/debian/gnunet-gtk.install 
gnunet-gtk-0.10.1/debian/gnunet-gtk.install
--- gnunet-gtk-0.10.1/debian/gnunet-gtk.install 2016-08-15 20:25:11.0 
+0200
+++ gnunet-gtk-0.10.1/debian/gnunet-gtk.install 2017-02-26 11:04:02.0 
+0100
@@ -1,5 +1,6 @@
 usr/bin/
 usr/lib/*/*.so.*
+usr/lib/*/gnunet/*.so
 usr/share
 debian/contrib/gnunet-setup-pkexec /usr/bin
 debian/contrib/org.debian.pkexec.gnunet-setup.policy 
/usr/share/polkit-1/actions/


Bug#831810: transition: libmicrohttpd

2016-07-23 Thread Bertrand Marc
Hi,

Le 23/07/2016 à 11:56, Emilio Pozuelo Monfort a écrit :
> On 23/07/16 11:35, Bertrand Marc wrote:
>> Do you think we could allow the libmicrohttpd transition ?
> 
> Yes. Go ahead.

Thanks ! I uploaded a new revision targeting unstable to
mentors [1] and I asked Holger Levsen (CC), my regular sponsor, to
upload it to unstable.

Cheers,
Bertrand

[1]
https://mentors.debian.net/debian/pool/main/libm/libmicrohttpd/libmicrohttpd_0.9.50-2.dsc



Bug#831810: transition: libmicrohttpd

2016-07-23 Thread Bertrand Marc
Hi,

Le 21/07/2016 à 18:58, Emilio Pozuelo Monfort a écrit :
> On 21/07/16 15:53, Jonathan Wiltshire wrote:
>> On 2016-07-19 20:19, Emilio Pozuelo Monfort wrote:
>> As a DM, Bertrand can request a guest account on a porterbox through
>> https://nm.debian.org
>> (log in and request a new status)
> 
> Bertrand, can you do that and test the rest of the rdeps?

Thanks for the advice. However I fear it would take as long as waiting
for my DD account to be created (DAM already opened a RT ticket for the
account creation).

Anyway, with the end of the heatwave in France (my laptop has
temperature issues), I was able to build three remaining r-deps:
- systemd
- ola
- pcp
For the last two, build fails with both libmicrohttpd10 and libmicrohttpd12:
- kodi (due to #820416)
- varnish-agent (due to #724479)
As kodi is marked for autoremoval from testing and varnish-agent is only
is Sid, it seems these are not blocking the libmicrohttpd transition.

Do you think we could allow the libmicrohttpd transition ?

Best regards,
Bertrand



Bug#831810: transition: libmicrohttpd

2016-07-21 Thread Bertrand Marc
Hi,

Le 19/07/2016 à 21:19, Emilio Pozuelo Monfort a écrit :
> In lack of that, do you know how much the ABI changed?

Sorry I missed that bit in my first message. To my mind (but I am not
sure), the soname bump comes from a new member in the middle of a union
struct exposed in /usr/include/microhttpd.h:

union MHD_ConnectionInfo
{
...
   int /* enum gnutls_protocol */ protocol;

   /**
+   * The suspended status of a connection.
+   */
+  int /* MHD_YES or MHD_NO */ suspended;
+
+  /**
* Connect socket
*/
...
}

There are also new enum constants, but they seem backward compatible.

And no symbols were removed.

Best regards,
Bertrand



Bug#831810: transition: libmicrohttpd

2016-07-19 Thread Bertrand Marc
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

Dear release team,

Please allow the transition from libmicrohttpd10 to libmicrohttpd12. 
libmicrohttpd12 (0.9.50-1) is currently in experimental. The auto tracker 
seems correct [1].
With this new version libmicrospdy goes away (dead upstream, no r-deps), so 
does the libssl-dev build-dependency. This could avoid some conflicts with the 
openssl transition.

Among the reverse build-dependencies I was able to build:
- gnunet
- libjson-rpc-cpp
- opensips
- psensor
- yubikey-server-c
- bfgminer

Since I use a quite old laptop, I had difficulties to build (both with 
libmicrohttpd10 and libmicrohttp12):
- systemd
- kodi
- ola (sid only)
- pcp
- varnish-agent (sid only)
Do you know if I could have access to a testing build infrastructure ?

pcp has a RC bug, but it is marked for autoremoval from testing on 2016-08-03.
kodi has also a RC bug, but it is marked for autoremoval from testing on 
2016-08-13.

Last things: please note that I do not have uploads rights yet, but it should 
only be a matter of time [2], and that I will not have internet access between 
July, 23 and August, 7.

Best regards,
Bertrand Marc

[1] https://release.debian.org/transitions/html/auto-libmicrohttpd.html
[2] https://nm.debian.org/public/process/bmarc

Ben file:

title = "libmicrohttpd";
is_affected = .depends ~ 
/(libmicrohttpd\-dbg|libmicrohttpd10|libmicrospdy\-dbg|libmicrospdy\-dev|libmicrospdy0)/
 | .depends ~ /libmicrohttpd12/;
is_good = .depends ~ /libmicrohttpd12/;
is_bad = .depends ~ 
/(libmicrohttpd\-dbg|libmicrohttpd10|libmicrospdy\-dbg|libmicrospdy\-dev|libmicrospdy0)/;


-- System Information:
Debian Release: stretch/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.6.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)



Bug#798780: release.debian.org: Please let playonlinux migrate to testing

2016-05-08 Thread Bertrand Marc
Hello Andreas,

Le 10/04/2016 13:52, Andreas Beckmann a écrit :
> On Sun, 21 Feb 2016 11:00:14 +0100 Bertrand Marc <beberk...@gmail.com>
> wrote:
>> Do you think we could find a solution to restore the dependency and let
>> playonlinux migrate to testing ?
> 
> What about
> 
> * split a playonlinux-data package from playonlinux containing
>   /usr/share/playonlinux/*
>   /usr/share/locale/*
>   mark as Multi-Arch: foreign
>   document in the description that a foreign architecture may be needed
>   to install playonlinux on amd64 (dpkg --add-architecture i386)
> 
> * make playonlinux arch:any
>   Depends: playonlinux-data (= ${source:Version})
> 
> * add Build-Depends: wine32 | wine32-development
>   (instead of enumerating the architectures in the playonlinux package)

Thank you for this idea. It seems to me it should work fine. But making
playonlinux arch:any would mean duplicate (dummy) packages.

Does this solution would be ok for the release team and do you think it
is the best one ?

Best regards,
Bertrand



Re: Processed: your mail

2016-04-09 Thread Bertrand Marc
Hi Adam,

Le 09/04/2016 17:54, Adam D. Barratt a écrit :
> It's customary to provide an explanation when re-opening bugs,
> particularly ones old enough to have been archived.
> 
> Regards,
> 
> Adam
> 

Sorry, I didn't know that.

In fact I thought I reopened this bug with my message the 21/02/2016. I
still think this is not fixed and I was hoping the release team would
help me find a way to make playonlinux depend on wine32|wine32-development.

Regards,
Bertrand



Bug#798780: release.debian.org: Please let playonlinux migrate to testing

2016-02-21 Thread Bertrand Marc
Le 20/02/2016 22:53, Julien Cristau a écrit :
> Seems to be in testing now, closing.
> 
> Cheers,
> Julien

Hello Julien,

Indeed playonlinux migrated to testing, thanks to Markus Koschany who
"removed dependency on wine32|wine32-development again to ensure the
package can migrate to testing." in 4.2.9-2.

Ideally, this would only be temporary as playonlinux should really
depend on wine32|wine32-development.

Do you think we could find a solution to restore the dependency and let
playonlinux migrate to testing ?

Cheers,
Bertrand



signature.asc
Description: OpenPGP digital signature


Bug#798780: release.debian.org: Please let playonlinux migrate to testing

2015-09-12 Thread Bertrand Marc
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: britney

Dear release developpers,

Playonlinux is a arch:all package (it is written in python and bash)
which depends on the 32 bits version of wine. Therefore I
added a dependency on wine32|wine32-development, but it seems the
package will not migrate to testing, because wine32 is not available
on amd64.

There does not seem to be a simple solution to let playonlinux migrate
to testing, and Wookey [1] suggested that this migration would require
some manual work.

Could you please let playonlinux migrate to testing or point me into the
right direction ?

Regards,
Bertrand

[1] https://lists.debian.org/debian-release/2015/08/msg00526.html



Depend on a package from an other arch

2015-08-13 Thread Bertrand Marc
Dear developpers,

I am trying to fix Debian bug #783875 [1]: playonlinux (which is arch
independant) should depend on the 32 bits version of wine. Therefore I
added a dependency on wine32|wine32-development, but it seems the
package will not migrate to testing [2], because wine32 is not available
on amd64.

Niels Thykier suggested on mentors that this could be an issue with the
testing migration code [3], so I send this question to debian-release@ too.

I thought I should instead add a dependency on wine32:any |
wine32-development:any and ask the wine maintainer to move to
multiarch:allowed. But the best source on this subject is an Ubuntu
one [4]. I cannot find any reliable Debian source about this and it
seems I was wrong [3].

Could you give me a pointer on this ? Or do you know any
package with a dependency on a package from an other arch ?

Thanks,
Bertrand

PS Please CC me as I am not subscribed to these lists.

[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783875
[2] https://packages.qa.debian.org/p/playonlinux.html
[3] https://lists.debian.org/debian-mentors/2015/08/msg00153.html
[4] https://wiki.ubuntu.com/MultiarchSpec



signature.asc
Description: OpenPGP digital signature


Bug#733158: pu: package libmicrohttpd/0.9.20-1

2013-12-26 Thread Bertrand Marc
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Severity: normal

Dear release team,

I would like to fix 2 security issues and another open issue in
libmicrohttpd, as stated in Debian bug #731933. In this bug, Moritz
Muehlenhoff suggests to go through stable proposed updates instead of a DSA.

I prepared a new version and uploaded it to mentors [1] with the
following changes:
  * Fix various security issues (closes: #731933):
+ out-of-bounds read in MHD_http_unescape(), patch picked upstream,
CVE-2013-7038.
+ stack overflow in MHD_digest_auth_check(), patch picked upstream,
CVE-2013-7039.
+ handle case that original allocation request was zero and fix
theoretical
overflow issue reported by Florian Weimer, patch picked upstream.

You will find attached a full debdiff to the current wheezy package.

Would you consider allowing it to go to wheezy ?

Thanks,
Bertrand

[1]
http://mentors.debian.net/debian/pool/main/libm/libmicrohttpd/libmicrohttpd_0.9.20-1+deb7u1.dsc

diff -Nru libmicrohttpd-0.9.20/debian/changelog libmicrohttpd-0.9.20/debian/changelog
--- libmicrohttpd-0.9.20/debian/changelog	2012-06-24 12:28:35.0 +0200
+++ libmicrohttpd-0.9.20/debian/changelog	2013-12-26 16:09:57.0 +0100
@@ -1,3 +1,15 @@
+libmicrohttpd (0.9.20-1+deb7u1) wheezy; urgency=medium
+
+  * Fix various security issues (closes: #731933):
++ out-of-bounds read in MHD_http_unescape(), patch picked upstream,
+CVE-2013-7038.
++ stack overflow in MHD_digest_auth_check(), patch picked upstream,
+CVE-2013-7039.
++ handle case that original allocation request was zero and fix theoretical
+overflow issue reported by Florian Weimer, patch picked upstream.
+
+ -- Bertrand Marc beberk...@gmail.com  Thu, 26 Dec 2013 15:41:39 +0100
+
 libmicrohttpd (0.9.20-1) unstable; urgency=low
 
   * debian/control: add Vcs-Git and Vcs-browser fields.
diff -Nru libmicrohttpd-0.9.20/debian/patches/allocation_request_was_zero.diff libmicrohttpd-0.9.20/debian/patches/allocation_request_was_zero.diff
--- libmicrohttpd-0.9.20/debian/patches/allocation_request_was_zero.diff	1970-01-01 01:00:00.0 +0100
+++ libmicrohttpd-0.9.20/debian/patches/allocation_request_was_zero.diff	2013-12-26 15:39:19.0 +0100
@@ -0,0 +1,82 @@
+Author: Christian Grothoff christ...@grothoff.org
+Description: handle case that original allocation request was zero and fix
+ theoretical overflow issue reported by Florian Weimer.
+Origin: upstream, commit: 30926,30927
+--- a/src/daemon/memorypool.c
 b/src/daemon/memorypool.c
+@@ -135,19 +135,22 @@
+ 		   size_t size, int from_end)
+ {
+   void *ret;
++  size_t asize;
+ 
+-  size = ROUND_TO_ALIGN (size);
+-  if ((pool-pos + size  pool-end) || (pool-pos + size  pool-pos))
++  asize = ROUND_TO_ALIGN (size);
++  if ( (0 == asize)  (0 != size) )
++return NULL; /* size too close to SIZE_MAX */
++  if ((pool-pos + asize  pool-end) || (pool-pos + asize  pool-pos))
+ return NULL;
+   if (from_end == MHD_YES)
+ {
+-  ret = pool-memory[pool-end - size];
+-  pool-end -= size;
++  ret = pool-memory[pool-end - asize];
++  pool-end -= asize;
+ }
+   else
+ {
+   ret = pool-memory[pool-pos];
+-  pool-pos += size;
++  pool-pos += asize;
+ }
+   return ret;
+ }
+@@ -175,34 +178,37 @@
+ 		 size_t new_size)
+ {
+   void *ret;
++  size_t asize;
+ 
+-  new_size = ROUND_TO_ALIGN (new_size);
+-  if ((pool-end  old_size) || (pool-end  new_size))
++  asize = ROUND_TO_ALIGN (new_size);
++  if ( (0 == asize)  (0 != new_size) )
++return NULL; /* new_size too close to SIZE_MAX */
++  if ((pool-end  old_size) || (pool-end  asize))
+ return NULL;/* unsatisfiable or bogus request */
+ 
+   if ((pool-pos = old_size)  (pool-memory[pool-pos - old_size] == old))
+ {
+   /* was the previous allocation - optimize! */
+-  if (pool-pos + new_size - old_size = pool-end)
++  if (pool-pos + asize - old_size = pool-end)
+ {
+   /* fits */
+-  pool-pos += new_size - old_size;
+-  if (new_size  old_size)  /* shrinking - zero again! */
+-memset (pool-memory[pool-pos], 0, old_size - new_size);
++  pool-pos += asize - old_size;
++  if (asize  old_size)  /* shrinking - zero again! */
++memset (pool-memory[pool-pos], 0, old_size - asize);
+   return old;
+ }
+   /* does not fit */
+   return NULL;
+ }
+-  if (new_size = old_size)
++  if (asize = old_size)
+ return old; /* cannot shrink, no need to move */
+-  if ((pool-pos + new_size = pool-pos) 
+-  (pool-pos + new_size = pool-end))
++  if ((pool-pos + asize = pool-pos) 
++  (pool-pos + asize = pool-end))
+ {
+   /* fits */
+   ret = pool-memory[pool-pos];
+   memcpy (ret, old, old_size);
+-  pool-pos += new_size;
++  pool-pos += asize;
+   return ret;
+ }
+   /* does

Bug#699153: unblock: gnunet/0.9.3-6

2013-02-02 Thread Bertrand Marc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Le 30/01/2013 20:54, Julien Cristau a écrit :
 On Mon, Jan 28, 2013 at 10:43:11 +0100, Bertrand Marc wrote:
 
 * Fix build on kfreebsd, thanks to Christoph Egger (Closes:
 #688486).
 
 Is the package tested to actually work on kfreebsd?
 
 Cheers, Julien

I don't know anybody using kfreebsd, so no the package is not tested...

Cheers,
Bertrand
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQIcBAEBCAAGBQJRDP5KAAoJEKBKs7rb4mPues0P/2m4No4NVLPubbUfsrkkANZt
ap8OftzEvEnG+zvlQ8AjmLVuuBA+++CH5kAQFBrqFXIAVJosFClg/oONoTKs+y2X
RyOIBRWCpmas8iSJX22y+Ac330eaurNutGU1VPoEODnHagr37PVGRkTa48I0Jkf+
8Z+F5hJuHaP8eWiLU2VogilrfudvpCi5SARNHwRTZKK8B4dPutHdxWF+vr74BtUz
XKwBab1dplJO2UdIWM+YWWO2cfrE64eQsMQB2qPErY8B8usV0wcsyk47O+5yR2l6
etbhCetvByFdvUyg2d/H7x7QtGd3VBywTrYj6kFrE0mt8tTyu1jFqy7AIui+db8N
G7CwVlW/fzvC0a1Wceogz4GpuTdYQFpyHkOVOfb8m7y61sMdhMiSrMX+JRkGXEyn
gVn+adfbtKURWu3RLmBI/aIInM/0XYlEn8NTAm9EiG1yx20H0b2gPiUn8WORYL28
RcyqcDih6K4JowPqdUDoHH53VyxCa0SHiDYMJuK/SQeONMv9URQ/dG+83SiuGpMc
gnWFHjcZNMV4D6Thln6hOXKOEPS4F7mJoSnWLYgUxiSI0YdlgbVFArUaz7xZ6eiz
ZvbHH5g5M210zRH4BqjQnCD55T8DwJl3ZR9LxXKLsDdm+J0g0jiI3ZyzRvO8+6f/
J34Z8JWTjQtUWRdQHakw
=CVIQ
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/510cfe50.50...@gmail.com



Bug#689154: unblock: gnunet/0.9.3-5

2013-01-13 Thread Bertrand Marc
Le 12/01/2013 12:46, Holger Levsen a écrit :
 Hi Bertrand,
 
 can you please prepare gnunet/0.9.3-5 with these changes?!
 
 
 thanks,
   Holger

Hi,

Sorry, I was a bit behind my work with the holidays, but I finally
prepared gnunet/0.9.3-5. I uploaded it to mentors:
http://mentors.debian.net/debian/pool/main/g/gnunet/gnunet_0.9.3-5.dsc

You'll find attached the full debdiff to the version in Wheezy.

Cheers,
Bertrand
diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog
--- gnunet-0.9.3/debian/changelog	2012-12-09 11:35:52.0 +0100
+++ gnunet-0.9.3/debian/changelog	2013-01-13 18:00:32.0 +0100
@@ -1,3 +1,36 @@
+gnunet (0.9.3-5) unstable; urgency=low
+
+  * Revert previous changes to target wheezy:
++ depend on gettext.
++ drop patch to fix build on kfreebsd.
++ drop patch to change default option UNIX_MATCH_UID.
++ drop patch about libgcrypt version check.
+
+ -- Bertrand Marc beberk...@gmail.com  Sun, 13 Jan 2013 18:00:29 +0100
+
+gnunet (0.9.3-4) unstable; urgency=low
+
+  [ Bertrand Marc ]
+  * Drop dependency on gettext for gnunet-client and gnunet-server as it is not
+necessary, thanks to Ivan Shmakov (Closes: #690860).
+  * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881,
+#687883).
+  * Fix build on kfreebsd, thanks to Christoph Egger (Closes: #688486).
+  * Allways install libnss to /lib and fix FTBFS on ia64 (Closes: #688590).
+  * Install libnss to /lib, really fix #688590, thanks to Christian Grothoff.
+  * Change default option UNIX_MATCH_UID for services datastore and namestore,
+so users in the gnunet group may use these services (Closes: #686238,
+#684317).
+  * Update libgcrypt version check to a less strict check, patch picked from
+upstream, following Werner Koch's advice (Closes: #684997).
+  * gnunet-server.postinst: check the existence of a binary before changing its
+permissions (Closes: #688484).
+
+  [ David Prévot ]
+  * debian/po/fr.po: Fix charset, and use non-breaking spaces.
+
+ -- Bertrand Marc beberk...@gmail.com  Mon, 22 Oct 2012 22:52:43 +0200
+
 gnunet (0.9.3-3) unstable; urgency=low
 
   * debian/control: update Vcs-* to the new repository in collab-maint.
diff -Nru gnunet-0.9.3/debian/gnunet-client.docs gnunet-0.9.3/debian/gnunet-client.docs
--- gnunet-0.9.3/debian/gnunet-client.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-client.docs	2012-12-09 12:00:00.0 +0100
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet-dev.docs gnunet-0.9.3/debian/gnunet-dev.docs
--- gnunet-0.9.3/debian/gnunet-dev.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-dev.docs	2012-12-09 12:00:00.0 +0100
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet.docs gnunet-0.9.3/debian/gnunet.docs
--- gnunet-0.9.3/debian/gnunet.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet.docs	2012-12-09 12:00:00.0 +0100
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet-server.docs gnunet-0.9.3/debian/gnunet-server.docs
--- gnunet-0.9.3/debian/gnunet-server.docs	2012-12-09 11:35:52.0 +0100
+++ gnunet-0.9.3/debian/gnunet-server.docs	2012-12-09 12:00:00.0 +0100
@@ -1,2 +1,4 @@
+AUTHORS
+README
 doc/README.mysql
 doc/README.postgres
diff -Nru gnunet-0.9.3/debian/gnunet-server.install gnunet-0.9.3/debian/gnunet-server.install
--- gnunet-0.9.3/debian/gnunet-server.install	2012-12-09 11:35:52.0 +0100
+++ gnunet-0.9.3/debian/gnunet-server.install	2012-12-09 12:00:00.0 +0100
@@ -41,9 +41,9 @@
 usr/lib/libgnunettransporttesting.so.*
 usr/lib/libgnunettun.so.*
 usr/lib/libgnunetvpn.so.*
-usr/lib/libnss_gns.so.2
-usr/lib/libnss_gns4.so.2
-usr/lib/libnss_gns6.so.2
+lib/libnss_gns.so.2
+lib/libnss_gns4.so.2
+lib/libnss_gns6.so.2
 usr/lib/gnunet/*.so
 usr/share/gnunet/config.d
 usr/share/gnunet/hellos/*
diff -Nru gnunet-0.9.3/debian/patches/configure_libnss.diff gnunet-0.9.3/debian/patches/configure_libnss.diff
--- gnunet-0.9.3/debian/patches/configure_libnss.diff	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/patches/configure_libnss.diff	2013-01-13 18:17:19.0 +0100
@@ -0,0 +1,14 @@
+--- a/src/gns/nss/Makefile.am
 b/src/gns/nss/Makefile.am
+@@ -21,11 +21,7 @@
+ 
+ AM_LDFLAGS=-avoid-version -module -export-dynamic
+ 
+-if HAVE_SUDO
+ nssdir = /lib/
+-else
+-nssdir = $(libdir)
+-endif
+ 
+ LIBTOOL = $(SUDO_BINARY) $(SHELL) $(top_builddir)/libtool
+ 
diff -Nru gnunet-0.9.3/debian/patches/series gnunet-0.9.3/debian/patches/series
--- gnunet-0.9.3/debian/patches/series	2012-12-09 11:35:52.0 +0100
+++ gnunet-0.9.3/debian/patches/series	2013-01-13 18:04:46.0 +0100
@@ -1,2 +1,3 @@
+configure_libnss.diff
 support_GNU_hurd.patch
 sparc_alignment.patch
diff -Nru gnunet-0.9.3/debian/po/fr.po gnunet-0.9.3/debian/po/fr.po
--- gnunet-0.9.3/debian/po/fr.po	2012-12-09 11:35:52.0 +0100
+++ gnunet-0.9.3/debian/po/fr.po	2012

Re: Bug#689154: unblock: gnunet/0.9.3-3wheezy1

2012-12-09 Thread Bertrand Marc
Dear release team,

I prepared a new revision on gnunet and uploaded it to mentors.

You'll find attached the full debdiff to the last unblocked revision
(0.9.3-3). Here is the detail of the changes, with the answers to Julien:

Le 25/11/2012 20:17, Julien Cristau a écrit :
 +  * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881,
 +#687883).
 
 Are the AUTHORS/README changes in various debian/*.docs files related?
Yes they are, I need them back since they are not symlinked any more.
 +  * Allways install libnss to /lib and fix FTBFS on ia64 (Closes: #688590).
 +  * Install libnss to /lib, really fix #688590, thanks to Christian 
 Grothoff.
 
 That one's rather bigger than strictly necessary…
I updated it to minimal changes.
 +  [ David Prévot ]
 +  * debian/po/fr.po: Fix charset, and use non-breaking spaces.
I kept this one since I am not the author and it seems quite simple to
review.
 +
 Cheers,
 Julien

Since gnunet/0.9.3-4 was uploaded to unstable with too many changes for
wheezy, I targeted wheezy directly in the changelog (not really sure it
shouldn't be testing-proposed-updates) and the revision is now called
gnunet/0.9.3-3wheezy1.

How does it works now to get it to wheezy directly ?

Cheers,
Bertrand
diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog
--- gnunet-0.9.3/debian/changelog	2012-12-09 11:35:52.0 +0100
+++ gnunet-0.9.3/debian/changelog	2012-12-09 11:10:40.0 +0100
@@ -1,3 +1,15 @@
+gnunet (0.9.3-3wheezy1) wheezy; urgency=low
+
+  [ Bertrand Marc ]
+  * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881,
+#687883).
+  * Install libnss to /lib, really fix #688590, thanks to Christian Grothoff.
+
+  [ David Prévot ]
+  * debian/po/fr.po: Fix charset, and use non-breaking spaces.
+
+ -- Bertrand Marc beberk...@gmail.com  Mon, 03 Dec 2012 09:12:51 +0100
+
 gnunet (0.9.3-3) unstable; urgency=low
 
   * debian/control: update Vcs-* to the new repository in collab-maint.
diff -Nru gnunet-0.9.3/debian/gnunet-client.docs gnunet-0.9.3/debian/gnunet-client.docs
--- gnunet-0.9.3/debian/gnunet-client.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-client.docs	2012-12-02 20:02:03.0 +0100
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet-dev.docs gnunet-0.9.3/debian/gnunet-dev.docs
--- gnunet-0.9.3/debian/gnunet-dev.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-dev.docs	2012-12-02 20:02:03.0 +0100
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet.docs gnunet-0.9.3/debian/gnunet.docs
--- gnunet-0.9.3/debian/gnunet.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet.docs	2012-12-02 20:02:03.0 +0100
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet-server.docs gnunet-0.9.3/debian/gnunet-server.docs
--- gnunet-0.9.3/debian/gnunet-server.docs	2012-12-09 11:35:52.0 +0100
+++ gnunet-0.9.3/debian/gnunet-server.docs	2012-12-02 20:02:03.0 +0100
@@ -1,2 +1,4 @@
+AUTHORS
+README
 doc/README.mysql
 doc/README.postgres
diff -Nru gnunet-0.9.3/debian/gnunet-server.install gnunet-0.9.3/debian/gnunet-server.install
--- gnunet-0.9.3/debian/gnunet-server.install	2012-12-09 11:35:52.0 +0100
+++ gnunet-0.9.3/debian/gnunet-server.install	2012-12-09 10:58:48.0 +0100
@@ -41,9 +41,9 @@
 usr/lib/libgnunettransporttesting.so.*
 usr/lib/libgnunettun.so.*
 usr/lib/libgnunetvpn.so.*
-usr/lib/libnss_gns.so.2
-usr/lib/libnss_gns4.so.2
-usr/lib/libnss_gns6.so.2
+lib/libnss_gns.so.2
+lib/libnss_gns4.so.2
+lib/libnss_gns6.so.2
 usr/lib/gnunet/*.so
 usr/share/gnunet/config.d
 usr/share/gnunet/hellos/*
diff -Nru gnunet-0.9.3/debian/patches/configure_libnss.diff gnunet-0.9.3/debian/patches/configure_libnss.diff
--- gnunet-0.9.3/debian/patches/configure_libnss.diff	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/patches/configure_libnss.diff	2012-12-09 11:11:31.0 +0100
@@ -0,0 +1,14 @@
+--- a/src/gns/nss/Makefile.am
 b/src/gns/nss/Makefile.am
+@@ -21,11 +21,7 @@
+ 
+ AM_LDFLAGS=-avoid-version -module -export-dynamic
+ 
+-if HAVE_SUDO
+ nssdir = /lib/
+-else
+-nssdir = $(libdir)
+-endif
+ 
+ LIBTOOL = $(SUDO_BINARY) $(SHELL) $(top_builddir)/libtool
+ 
diff -Nru gnunet-0.9.3/debian/patches/series gnunet-0.9.3/debian/patches/series
--- gnunet-0.9.3/debian/patches/series	2012-12-09 11:35:52.0 +0100
+++ gnunet-0.9.3/debian/patches/series	2012-12-09 11:06:53.0 +0100
@@ -1,2 +1,3 @@
+configure_libnss.diff
 support_GNU_hurd.patch
 sparc_alignment.patch
diff -Nru gnunet-0.9.3/debian/po/fr.po gnunet-0.9.3/debian/po/fr.po
--- gnunet-0.9.3/debian/po/fr.po	2012-12-09 11:35:52.0 +0100
+++ gnunet-0.9.3/debian/po/fr.po	2012-12-09 11:10:40.0 +0100
@@ -13,7 +13,7 @@
 Language-Team: French debian-l10n-fre...@lists.debian.org\n
 Language: fr\n
 MIME-Version: 1.0\n
-Content-Type: text/plain; charset=ISO-8859-1\n
+Content-Type: text/plain; charset=UTF

Re: Bug#689154: unblock: gnunet/0.9.3-4

2012-12-02 Thread Bertrand Marc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hello Julien,

Thank you for your answer. Does it mean I should prepare a new version
with the following changes :

Le 25/11/2012 20:17, Julien Cristau a écrit :
 +  * Revert the use dh_installdocs --link-doc (Closes: #687875,
 #687881, +#687883).
 
 Are the AUTHORS/README changes in various debian/*.docs files
 related?
(yes, they are needed since they are not symlinked anymore.)
 +  * gnunet-server.postinst: check the existence of a binary
 before changing its +permissions (Closes: #688484). + +  [
 David Pr??vot ] +  * debian/po/fr.po: Fix charset, and use
 non-breaking spaces.

I realize #688486 [1] is not a RC bug but it seems harmless [2] and
would fix the build of the package on kfreebsd. But I won't add it to
the changes list if you don't confirm it is harmless.

Last thing: gnunet-0.9.3-4 was uploaded to unstable with fixes for a
lot of not-RC bugs. So I guess I need to prepare a new version
targeting testing-proposed-updates ?

Cheers,
Bertrand

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688486
[2]
http://anonscm.debian.org/gitweb/?p=collab-maint/gnunet.git;a=commitdiff;h=3146f13e0b136b2ca317940bc18deb932f3b339a

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=E03x
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/50bb962c.7040...@gmail.com



Re: Bug#689154: unblock: gnunet/0.9.3-4

2012-11-12 Thread Bertrand Marc

Dear release team,

I uploaded a new version of gnunet to mentors, waiting for your review. 
My sponsor could then upload to unstable with your approval. It is the 
same as the last upload, including the change of David Prévot :

[ David Prévot ]
  * debian/po/fr.po: Fix charset, and use non-breaking spaces.

The full debdiff to the version currently in Wheezy is attached. This 
upload would fix 11 bugs, including RC ones.


Cheers,
Bertrand
diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog
--- gnunet-0.9.3/debian/changelog	2012-08-26 16:18:16.0 +0200
+++ gnunet-0.9.3/debian/changelog	2012-11-12 19:55:00.0 +0100
@@ -1,3 +1,27 @@
+gnunet (0.9.3-4) unstable; urgency=low
+
+  [ Bertrand Marc ]
+  * Drop dependency on gettext for gnunet-client and gnunet-server as it is not
+necessary, thanks to Ivan Shmakov (Closes: #690860).
+  * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881,
+#687883).
+  * Fix build on kfreebsd, thanks to Christoph Egger (Closes: #688486).
+  * Allways install libnss to /lib and fix FTBFS on ia64 (Closes: #688590).
+  * Install libnss to /lib, really fix #688590, thanks to Christian Grothoff.
+  * Change default option UNIX_MATCH_UID for services datastore and namestore,
+so users in the gnunet group may use these services (Closes: #686238,
+#684317).
+  * Update libgcrypt version check to a less strict check, patch picked from
+upstream, following Werner Koch's advice (Closes: #684997).
+  * gnunet-server.postinst: check the existence of a binary before changing its
+permissions (Closes: #688484).
+  * Do not set-UID gnunet-helper-fs-publish (Closes: #691154).
+
+  [ David Prévot ]
+  * debian/po/fr.po: Fix charset, and use non-breaking spaces.
+
+ -- Bertrand Marc beberk...@gmail.com  Mon, 22 Oct 2012 22:52:43 +0200
+
 gnunet (0.9.3-3) unstable; urgency=low
 
   * debian/control: update Vcs-* to the new repository in collab-maint.
diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control
--- gnunet-0.9.3/debian/control	2012-08-05 20:12:01.0 +0200
+++ gnunet-0.9.3/debian/control	2012-10-18 21:13:37.0 +0200
@@ -30,8 +30,7 @@
 Architecture: any
 Pre-Depends: ${misc:Pre-Depends}
 Depends:
- ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}),
- gettext
+ ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version})
 Suggests: gnunet-server, libextractor-plugins
 Description: secure, trust-based peer-to-peer framework (client)
  GNUnet is a peer-to-peer framework which focuses on providing security. All
@@ -75,7 +74,7 @@
 Pre-Depends: ${misc:Pre-Depends}
 Depends:
  ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}),
- adduser, gettext, netbase
+ adduser, netbase
 Suggests: miniupnpc
 Breaks: gnunet-fuse (0.9), gnunet-client (0.9)
 Replaces: gnunet-fuse (0.9), gnunet-client (0.9)
diff -Nru gnunet-0.9.3/debian/gnunet-client.docs gnunet-0.9.3/debian/gnunet-client.docs
--- gnunet-0.9.3/debian/gnunet-client.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-client.docs	2012-09-27 22:30:34.0 +0200
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet-dev.docs gnunet-0.9.3/debian/gnunet-dev.docs
--- gnunet-0.9.3/debian/gnunet-dev.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-dev.docs	2012-09-27 22:30:34.0 +0200
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet.docs gnunet-0.9.3/debian/gnunet.docs
--- gnunet-0.9.3/debian/gnunet.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet.docs	2012-09-27 22:30:34.0 +0200
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet-server.docs gnunet-0.9.3/debian/gnunet-server.docs
--- gnunet-0.9.3/debian/gnunet-server.docs	2012-05-05 14:37:00.0 +0200
+++ gnunet-0.9.3/debian/gnunet-server.docs	2012-09-27 22:30:34.0 +0200
@@ -1,2 +1,4 @@
+AUTHORS
+README
 doc/README.mysql
 doc/README.postgres
diff -Nru gnunet-0.9.3/debian/gnunet-server.install gnunet-0.9.3/debian/gnunet-server.install
--- gnunet-0.9.3/debian/gnunet-server.install	2012-06-17 12:04:20.0 +0200
+++ gnunet-0.9.3/debian/gnunet-server.install	2012-10-15 12:01:20.0 +0200
@@ -41,9 +41,9 @@
 usr/lib/libgnunettransporttesting.so.*
 usr/lib/libgnunettun.so.*
 usr/lib/libgnunetvpn.so.*
-usr/lib/libnss_gns.so.2
-usr/lib/libnss_gns4.so.2
-usr/lib/libnss_gns6.so.2
+lib/libnss_gns.so.2
+lib/libnss_gns4.so.2
+lib/libnss_gns6.so.2
 usr/lib/gnunet/*.so
 usr/share/gnunet/config.d
 usr/share/gnunet/hellos/*
diff -Nru gnunet-0.9.3/debian/gnunet-server.install.kfreebsd gnunet-0.9.3/debian/gnunet-server.install.kfreebsd
--- gnunet-0.9.3/debian/gnunet-server.install.kfreebsd	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-server.install.kfreebsd	2012-09-29 08:13:17.0 +0200
@@ -0,0 +1,52 @@
+etc/gnunet.conf
+usr/bin/gnunet-arm
+usr/bin/gnunet-core
+usr/bin/gnunet-daemon

Bug#689154: unblock: gnunet/0.9.3-4

2012-10-23 Thread Bertrand Marc

Dear release team,

I uploaded again a new revision of gnunet, with this new fix:
* Do not set-UID gnunet-helper-fs-publish (Closes: #691154).

The full debdiff against the current version in testing is attached.

Do you think it would get a freeze exception ?

Cheers,
Bertrand

diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog
--- gnunet-0.9.3/debian/changelog	2012-08-26 16:18:16.0 +0200
+++ gnunet-0.9.3/debian/changelog	2012-10-22 22:55:16.0 +0200
@@ -1,3 +1,23 @@
+gnunet (0.9.3-4) unstable; urgency=low
+
+  * Drop dependency on gettext for gnunet-client and gnunet-server as it is not
+necessary, thanks to Ivan Shmakov (Closes: #690860).
+  * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881,
+#687883).
+  * Fix build on kfreebsd, thanks to Christoph Egger (Closes: #688486).
+  * Allways install libnss to /lib and fix FTBFS on ia64 (Closes: #688590).
+  * Install libnss to /lib, really fix #688590, thanks to Christian Grothoff.
+  * Change default option UNIX_MATCH_UID for services datastore and namestore,
+so users in the gnunet group may use these services (Closes: #686238,
+#684317).
+  * Update libgcrypt version check to a less strict check, patch picked from
+upstream, following Werner Koch's advice (Closes: #684997).
+  * gnunet-server.postinst: check the existence of a binary before changing its
+permissions (Closes: #688484).
+  * Do not set-UID gnunet-helper-fs-publish (Closes: #691154).
+
+ -- Bertrand Marc beberk...@gmail.com  Mon, 22 Oct 2012 22:52:43 +0200
+
 gnunet (0.9.3-3) unstable; urgency=low
 
   * debian/control: update Vcs-* to the new repository in collab-maint.
diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control
--- gnunet-0.9.3/debian/control	2012-08-05 20:12:01.0 +0200
+++ gnunet-0.9.3/debian/control	2012-10-18 21:13:37.0 +0200
@@ -30,8 +30,7 @@
 Architecture: any
 Pre-Depends: ${misc:Pre-Depends}
 Depends:
- ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}),
- gettext
+ ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version})
 Suggests: gnunet-server, libextractor-plugins
 Description: secure, trust-based peer-to-peer framework (client)
  GNUnet is a peer-to-peer framework which focuses on providing security. All
@@ -75,7 +74,7 @@
 Pre-Depends: ${misc:Pre-Depends}
 Depends:
  ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}),
- adduser, gettext, netbase
+ adduser, netbase
 Suggests: miniupnpc
 Breaks: gnunet-fuse (0.9), gnunet-client (0.9)
 Replaces: gnunet-fuse (0.9), gnunet-client (0.9)
diff -Nru gnunet-0.9.3/debian/gnunet-client.docs gnunet-0.9.3/debian/gnunet-client.docs
--- gnunet-0.9.3/debian/gnunet-client.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-client.docs	2012-09-27 22:30:34.0 +0200
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet-dev.docs gnunet-0.9.3/debian/gnunet-dev.docs
--- gnunet-0.9.3/debian/gnunet-dev.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-dev.docs	2012-09-27 22:30:34.0 +0200
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet.docs gnunet-0.9.3/debian/gnunet.docs
--- gnunet-0.9.3/debian/gnunet.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet.docs	2012-09-27 22:30:34.0 +0200
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet-server.docs gnunet-0.9.3/debian/gnunet-server.docs
--- gnunet-0.9.3/debian/gnunet-server.docs	2012-05-05 14:37:00.0 +0200
+++ gnunet-0.9.3/debian/gnunet-server.docs	2012-09-27 22:30:34.0 +0200
@@ -1,2 +1,4 @@
+AUTHORS
+README
 doc/README.mysql
 doc/README.postgres
diff -Nru gnunet-0.9.3/debian/gnunet-server.install gnunet-0.9.3/debian/gnunet-server.install
--- gnunet-0.9.3/debian/gnunet-server.install	2012-06-17 12:04:20.0 +0200
+++ gnunet-0.9.3/debian/gnunet-server.install	2012-10-15 12:01:20.0 +0200
@@ -41,9 +41,9 @@
 usr/lib/libgnunettransporttesting.so.*
 usr/lib/libgnunettun.so.*
 usr/lib/libgnunetvpn.so.*
-usr/lib/libnss_gns.so.2
-usr/lib/libnss_gns4.so.2
-usr/lib/libnss_gns6.so.2
+lib/libnss_gns.so.2
+lib/libnss_gns4.so.2
+lib/libnss_gns6.so.2
 usr/lib/gnunet/*.so
 usr/share/gnunet/config.d
 usr/share/gnunet/hellos/*
diff -Nru gnunet-0.9.3/debian/gnunet-server.install.kfreebsd gnunet-0.9.3/debian/gnunet-server.install.kfreebsd
--- gnunet-0.9.3/debian/gnunet-server.install.kfreebsd	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-server.install.kfreebsd	2012-09-29 08:13:17.0 +0200
@@ -0,0 +1,52 @@
+etc/gnunet.conf
+usr/bin/gnunet-arm
+usr/bin/gnunet-core
+usr/bin/gnunet-daemon-*
+usr/bin/gnunet-dht-*
+usr/bin/gnunet-fs
+usr/bin/gnunet-gns*
+usr/bin/gnunet-helper-*
+usr/bin/gnunet-namestore
+usr/bin/gnunet-nat-server
+usr/bin/gnunet-peerinfo
+usr/bin/gnunet-resolver
+usr/bin/gnunet-rsa
+usr/bin/gnunet-service-*
+usr/bin/gnunet-testing
+usr/bin/gnunet

Bug#689154: unblock: gnunet/0.9.3-4

2012-10-18 Thread Bertrand Marc

Hello Adam,

Thank you for your answer.

Le 13/10/2012 18:27, Adam D. Barratt a écrit :

+ * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881,
+ #687883).

What happens if a user has the broken version installed already and then
upgrades to -4? As far as I can tell, nothing in the new diff helps
resolve the issues which have already occurred, as opposed to stopping
them recurring.


You're right, nothing helps resolve the issues which have already occurred.
It can only happen on new installation of gnunet on testing during the last
6 months though, so upgrades from Squeeze will go smoothly. And the issue
can be easily fixed by reinstalling gnunet.


+ * Change default option UNIX_MATCH_UID as suggested by Daniel Dehennin,
+ patch picked from upstream (Closes: #686238).

What does the option actually do? :)


This option was there to restrict services to the gnunet user only, 
instead of allowing any user from the gnunet group (GID match) to use 
the services mentioned. The second choice is now the default, with 
upstream approval.


I just uploaded a new revision on mentors, clarifying this change and 
fixing 2 more bugs. You'll find attached the full debdiff to the version 
already in testing. Here is the new changelog:
  * Drop dependency on gettext for gnunet-client and gnunet-server as 
it is not necessary, thanks to Ivan Shmakov (Closes: #690860).

  * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881,
#687883).
  * Fix build on kfreebsd, thanks to Christoph Egger (Closes: #688486).
  * Allways install libnss to /lib and fix FTBFS on ia64 (Closes: #688590).
  * Install libnss to /lib, really fix #688590, thanks to Christian 
Grothoff.
  * Change default option UNIX_MATCH_UID for services datastore and 
namestore, so users in the gnunet group may use these services (Closes: 
#686238, #684317).
  * Update libgcrypt version check to a less strict check, patch picked 
from upstream, following Werner Koch's advice (Closes: #684997).
  * gnunet-server.postinst: check the existence of a binary before 
changing its permissions (Closes: #688484).


I hope this clarifies things a bit.
Cheers,
Bertrand
diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog
--- gnunet-0.9.3/debian/changelog	2012-08-26 16:18:16.0 +0200
+++ gnunet-0.9.3/debian/changelog	2012-10-18 22:00:00.0 +0200
@@ -1,3 +1,22 @@
+gnunet (0.9.3-4) unstable; urgency=low
+
+  * Drop dependency on gettext for gnunet-client and gnunet-server as it is not
+necessary, thanks to Ivan Shmakov (Closes: #690860).
+  * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881,
+#687883).
+  * Fix build on kfreebsd, thanks to Christoph Egger (Closes: #688486).
+  * Allways install libnss to /lib and fix FTBFS on ia64 (Closes: #688590).
+  * Install libnss to /lib, really fix #688590, thanks to Christian Grothoff.
+  * Change default option UNIX_MATCH_UID for services datastore and namestore,
+so users in the gnunet group may use these services (Closes: #686238,
+#684317).
+  * Update libgcrypt version check to a less strict check, patch picked from
+upstream, following Werner Koch's advice (Closes: #684997).
+  * gnunet-server.postinst: check the existence of a binary before changing its
+permissions (Closes: #688484).
+
+ -- Bertrand Marc beberk...@gmail.com  Thu, 18 Oct 2012 21:59:44 +0200
+
 gnunet (0.9.3-3) unstable; urgency=low
 
   * debian/control: update Vcs-* to the new repository in collab-maint.
diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control
--- gnunet-0.9.3/debian/control	2012-08-05 20:12:01.0 +0200
+++ gnunet-0.9.3/debian/control	2012-10-18 21:13:37.0 +0200
@@ -30,8 +30,7 @@
 Architecture: any
 Pre-Depends: ${misc:Pre-Depends}
 Depends:
- ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}),
- gettext
+ ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version})
 Suggests: gnunet-server, libextractor-plugins
 Description: secure, trust-based peer-to-peer framework (client)
  GNUnet is a peer-to-peer framework which focuses on providing security. All
@@ -75,7 +74,7 @@
 Pre-Depends: ${misc:Pre-Depends}
 Depends:
  ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}),
- adduser, gettext, netbase
+ adduser, netbase
 Suggests: miniupnpc
 Breaks: gnunet-fuse (0.9), gnunet-client (0.9)
 Replaces: gnunet-fuse (0.9), gnunet-client (0.9)
diff -Nru gnunet-0.9.3/debian/gnunet-client.docs gnunet-0.9.3/debian/gnunet-client.docs
--- gnunet-0.9.3/debian/gnunet-client.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-client.docs	2012-09-27 22:30:34.0 +0200
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet-dev.docs gnunet-0.9.3/debian/gnunet-dev.docs
--- gnunet-0.9.3/debian/gnunet-dev.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-dev.docs	2012-09-27 22:30:34.0 +0200
@@ -0,0 +1,2 @@
+AUTHORS

Bug#689154: unblock: gnunet/0.9.3-4

2012-09-29 Thread Bertrand Marc

Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal

Dear release team,

I prepared a new revision of GNUnet fixing a few bugs (including 4 
serious bugs) with the following changes (the diff is attached):


  * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881,
#687883).
  * Fix build on kfreebsd, thanks to Christoph Egger (Closes: #688486).
  * Remove special nssdir and hopefully fix FTBFS on ia64 (Closes: 
#688590).
  * Change default option UNIX_MATCH_UID as suggested by Daniel 
Dehennin, patch picked from upstream (Closes: #686238).
  * Update libgcrypt version check to a less strict check, patch picked 
from upstream, following Werner Koch's advice (Closes: #684997).
  * gnunet-server.postinst: check the existence of a binary before 
changing its permissions (Closes: #688484).


Would you consider to give gnunet 0.9.3-4 a freeze exception ?

This version is not yet uploaded to unstable, my sponsor is waiting for
your approval.

Cheers,
Bertrand

unblock gnunet/0.9.3-4

diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog
--- gnunet-0.9.3/debian/changelog	2012-08-26 16:18:16.0 +0200
+++ gnunet-0.9.3/debian/changelog	2012-09-29 15:48:23.0 +0200
@@ -1,3 +1,18 @@
+gnunet (0.9.3-4) unstable; urgency=low
+
+  * Revert the use dh_installdocs --link-doc (Closes: #687875, #687881,
+#687883).
+  * Fix build on kfreebsd, thanks to Christoph Egger (Closes: #688486).
+  * Remove special nssdir and hopefully fix FTBFS on ia64 (Closes: #688590).
+  * Change default option UNIX_MATCH_UID as suggested by Daniel Dehennin,
+patch picked from upstream (Closes: #686238).
+  * Update libgcrypt version check to a less strict check, patch picked from
+upstream, following Werner Koch's advice (Closes: #684997).
+  * gnunet-server.postinst: check the existence of a binary before changing its
+permissions (Closes: #688484).
+
+ -- Bertrand Marc beberk...@gmail.com  Sat, 29 Sep 2012 15:45:53 +0200
+
 gnunet (0.9.3-3) unstable; urgency=low
 
   * debian/control: update Vcs-* to the new repository in collab-maint.
diff -Nru gnunet-0.9.3/debian/gnunet-client.docs gnunet-0.9.3/debian/gnunet-client.docs
--- gnunet-0.9.3/debian/gnunet-client.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-client.docs	2012-09-27 22:30:34.0 +0200
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet-dev.docs gnunet-0.9.3/debian/gnunet-dev.docs
--- gnunet-0.9.3/debian/gnunet-dev.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-dev.docs	2012-09-27 22:30:34.0 +0200
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet.docs gnunet-0.9.3/debian/gnunet.docs
--- gnunet-0.9.3/debian/gnunet.docs	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet.docs	2012-09-27 22:30:34.0 +0200
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff -Nru gnunet-0.9.3/debian/gnunet-server.docs gnunet-0.9.3/debian/gnunet-server.docs
--- gnunet-0.9.3/debian/gnunet-server.docs	2012-05-05 14:37:00.0 +0200
+++ gnunet-0.9.3/debian/gnunet-server.docs	2012-09-27 22:30:34.0 +0200
@@ -1,2 +1,4 @@
+AUTHORS
+README
 doc/README.mysql
 doc/README.postgres
diff -Nru gnunet-0.9.3/debian/gnunet-server.install.kfreebsd gnunet-0.9.3/debian/gnunet-server.install.kfreebsd
--- gnunet-0.9.3/debian/gnunet-server.install.kfreebsd	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-server.install.kfreebsd	2012-09-29 08:13:17.0 +0200
@@ -0,0 +1,52 @@
+etc/gnunet.conf
+usr/bin/gnunet-arm
+usr/bin/gnunet-core
+usr/bin/gnunet-daemon-*
+usr/bin/gnunet-dht-*
+usr/bin/gnunet-fs
+usr/bin/gnunet-gns*
+usr/bin/gnunet-helper-*
+usr/bin/gnunet-namestore
+usr/bin/gnunet-nat-server
+usr/bin/gnunet-peerinfo
+usr/bin/gnunet-resolver
+usr/bin/gnunet-rsa
+usr/bin/gnunet-service-*
+usr/bin/gnunet-testing
+usr/bin/gnunet-transport
+usr/bin/gnunet-transport-certificate-creation
+usr/bin/mockup-service
+usr/lib/libgnunetarm.so.*
+usr/lib/libgnunetats.so.*
+usr/lib/libgnunetblock.so.*
+usr/lib/libgnunetcore.so.*
+usr/lib/libgnunetdatacache.so.*
+usr/lib/libgnunetdht.so.*
+usr/lib/libgnunetfragmentation.so.*
+usr/lib/libgnunethello.so.*
+usr/lib/libgnunetlockmanager.so.0*
+usr/lib/libgnunetmesh.so.*
+usr/lib/libgnunetnamestore.so.*
+usr/lib/libgnunetnat.so.*
+usr/lib/libgnunetnse.so.*
+usr/lib/libgnunetpeerinfo.so.*
+usr/lib/libgnunettesting.so.*
+usr/lib/libgnunettesting_new.so.0*
+usr/lib/libgnunettestbed.so.0*
+usr/lib/libgnunettransport.so.*
+usr/lib/libgnunettransporttesting.so.*
+usr/lib/libgnunettun.so.*
+usr/lib/gnunet/*.so
+usr/share/gnunet/config.d
+usr/share/gnunet/hellos/*
+usr/share/man/man1/gnunet-arm.1
+usr/share/man/man1/gnunet-core.1
+usr/share/man/man1/gnunet-fs.1
+usr/share/man/man1/gnunet-gns.1
+usr/share/man/man1/gnunet-namestore.1
+usr/share/man/man1/gnunet-nat-server.1
+usr/share/man/man1/gnunet-peerinfo.1
+usr/share/man/man1/gnunet-rsa.1

Bug#683073: unblock: gnunet/0.9.3-3

2012-08-30 Thread Bertrand Marc

Dear release Team,

I fixed a minor bug in gnunet and I think it would be harmless to 
unblock it too:

* Fix the logfile name in gnunet-server.logrotate (Closes: #685856).

You will find attached the full debdiff between the current version of 
gnunet in testing/unstable and the one I'd like to see in wheezy (fixing 
a grave bug).


Do you think it would get a freeze-exception ?

Regards,
Bertrand
diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog
--- gnunet-0.9.3/debian/changelog	2012-06-20 23:55:23.0 +0200
+++ gnunet-0.9.3/debian/changelog	2012-08-26 16:18:16.0 +0200
@@ -1,3 +1,20 @@
+gnunet (0.9.3-3) unstable; urgency=low
+
+  * debian/control: update Vcs-* to the new repository in collab-maint.
+  * Install only the generated binaries on Hurd, thanks to Cyril Roelandt
+(Closes: #670794).
+  * Use chmod and chown instead of dpkg-statoverride to set special permissions
+and upgrade properly depending on the previous version (Closes: #673301).
+  * Fix gcc-4.6: [sparc] compiler fails to align stack-allocated
+struct, with array of uint32-values to 32-bit boundary:
+new patch sparc_alignment.patch, taken from upstream:
+https://lists.gnu.org/archive/html/gnunet-svn/2012-07/msg00548.html
+Thanks to Jurij Smakov for the analysis.
+(Closes: #670578)
+  * Fix the logfile name in gnunet-server.logrotate (Closes: #685856).
+
+ -- Bertrand Marc beberk...@gmail.com  Sun, 05 Aug 2012 20:13:49 +0200
+
 gnunet (0.9.3-2) unstable; urgency=low
 
   * Clean properly dpkg-statoverride in gnunet-server.postrm
diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control
--- gnunet-0.9.3/debian/control	2012-06-10 10:29:08.0 +0200
+++ gnunet-0.9.3/debian/control	2012-08-05 20:12:01.0 +0200
@@ -10,8 +10,8 @@
  libsqlite3-dev (=3.0), libpq-dev (=8.3), guile-1.8-dev, libglpk-dev (=4.32)
 Build-Conflicts: autoconf2.13, automake1.4
 Standards-Version: 3.9.3
-Vcs-Git: git://git.debian.org/git/users/bbk-guest/gnunet.git
-Vcs-browser: http://git.debian.org/?p=users/bbk-guest/gnunet.git
+Vcs-Git: git://git.debian.org/git/collab-maint/gnunet.git
+Vcs-browser: http://git.debian.org/?p=collab-maint/gnunet.git
 Homepage: http://www.gnunet.org/
 
 Package: gnunet
diff -Nru gnunet-0.9.3/debian/gnunet-server.install.hurd gnunet-0.9.3/debian/gnunet-server.install.hurd
--- gnunet-0.9.3/debian/gnunet-server.install.hurd	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-server.install.hurd	2012-07-01 16:59:50.0 +0200
@@ -0,0 +1,52 @@
+etc/gnunet.conf
+usr/bin/gnunet-arm
+usr/bin/gnunet-core
+usr/bin/gnunet-daemon-*
+usr/bin/gnunet-dht-*
+usr/bin/gnunet-fs
+usr/bin/gnunet-gns*
+usr/bin/gnunet-helper-*
+usr/bin/gnunet-namestore
+usr/bin/gnunet-nat-server
+usr/bin/gnunet-peerinfo
+usr/bin/gnunet-resolver
+usr/bin/gnunet-rsa
+usr/bin/gnunet-service-*
+usr/bin/gnunet-testing
+usr/bin/gnunet-transport
+usr/bin/gnunet-transport-certificate-creation
+usr/bin/mockup-service
+usr/lib/libgnunetarm.so.*
+usr/lib/libgnunetats.so.*
+usr/lib/libgnunetblock.so.*
+usr/lib/libgnunetcore.so.*
+usr/lib/libgnunetdatacache.so.*
+usr/lib/libgnunetdht.so.*
+usr/lib/libgnunetfragmentation.so.*
+usr/lib/libgnunethello.so.*
+usr/lib/libgnunetlockmanager.so.0*
+usr/lib/libgnunetmesh.so.*
+usr/lib/libgnunetnamestore.so.*
+usr/lib/libgnunetnat.so.*
+usr/lib/libgnunetnse.so.*
+usr/lib/libgnunetpeerinfo.so.*
+usr/lib/libgnunettesting.so.*
+usr/lib/libgnunettesting_new.so.0*
+usr/lib/libgnunettestbed.so.0*
+usr/lib/libgnunettransport.so.*
+usr/lib/libgnunettransporttesting.so.*
+usr/lib/libgnunettun.so.*
+usr/lib/gnunet/*.so
+usr/share/gnunet/config.d
+usr/share/gnunet/hellos/*
+usr/share/man/man1/gnunet-arm.1
+usr/share/man/man1/gnunet-core.1
+usr/share/man/man1/gnunet-fs.1
+usr/share/man/man1/gnunet-gns.1
+usr/share/man/man1/gnunet-namestore.1
+usr/share/man/man1/gnunet-nat-server.1
+usr/share/man/man1/gnunet-peerinfo.1
+usr/share/man/man1/gnunet-rsa.1
+usr/share/man/man1/gnunet-transport.1
+usr/share/man/man1/gnunet-vpn.1
+debian/man/* usr/share/man/man1/
diff -Nru gnunet-0.9.3/debian/gnunet-server.logrotate gnunet-0.9.3/debian/gnunet-server.logrotate
--- gnunet-0.9.3/debian/gnunet-server.logrotate	2012-05-05 17:39:22.0 +0200
+++ gnunet-0.9.3/debian/gnunet-server.logrotate	2012-08-26 16:16:45.0 +0200
@@ -1,4 +1,4 @@
-/var/log/gnunetd/gnunet.log {
+/var/log/gnunetd/gnunetd.log {
 	weekly
 	size=100k
 	rotate 7
diff -Nru gnunet-0.9.3/debian/gnunet-server.postinst gnunet-0.9.3/debian/gnunet-server.postinst
--- gnunet-0.9.3/debian/gnunet-server.postinst	2012-06-07 23:13:17.0 +0200
+++ gnunet-0.9.3/debian/gnunet-server.postinst	2012-07-07 15:50:27.0 +0200
@@ -52,6 +52,24 @@
 			echo  done.
 		fi
 
+		# this can go away after wheezy
+		if dpkg --compare-versions $2 le 0.9.3-2  dpkg --compare-versions $2 ge 0.9.2-1; then
+			for file in /usr/bin/gnunet-helper-exit \
+/usr/bin/gnunet-helper-fs-publish \
+/usr/bin/gnunet-helper-nat

Bug#683073: unblock: gnunet/0.9.3-3

2012-08-05 Thread Bertrand Marc

Hello,

Le 02/08/2012 22:52, Julien Cristau a écrit :

+  * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make
+gnunet-server depend on lsb-base to use LSB logging.


This part makes me extremely nervous.  I don't think now is the time for
this kind of change.


That's why it was not uploaded to unstable, and only to mentors. I
guess we could select the changes we want to see in wheezy:


Sorry, I meant the init script change.
I prepared a new version without the init script change. The debdiff 
against the current version in unstable/wheezy is attached.


Do you think it could get a freeze exception like this ?


diff -Nru gnunet-0.9.3/debian/gnunet-server.postinst 
gnunet-0.9.3/debian/gnunet-server.postinst
--- gnunet-0.9.3/debian/gnunet-server.postinst  2012-06-07 23:13:17.0 
+0200
+++ gnunet-0.9.3/debian/gnunet-server.postinst  2012-07-07 15:50:27.0 
+0200
@@ -52,6 +52,24 @@
echo  done.
fi

+   # this can go away after wheezy
+   if dpkg --compare-versions $2 le 0.9.3-2   dpkg --compare-versions 
$2 ge 0.9.2-1; then
+   for file in /usr/bin/gnunet-helper-exit \
+   /usr/bin/gnunet-helper-fs-publish \
+   /usr/bin/gnunet-helper-nat-client \
+   /usr/bin/gnunet-helper-nat-server \
+   /usr/bin/gnunet-helper-transport-wlan \
+   /usr/bin/gnunet-helper-vpn \
+   /usr/bin/gnunet-helper-dns \
+   /usr/bin/gnunet-service-dns
+   do
+   if dpkg-statoverride --list $file/dev/null 21
+   then
+   dpkg-statoverride --remove $file
+   fi
+   done
+   fi
+   


How does this interact with statoverrides set by the local admin?

It doesn't. The use of dpkg-statoverride was wrong in the first
place, so there is no way to know whether the local admin set
statoverrides or whether the gnunet package did. And since postrm
removes the gnunet group and user, we need to be sure we remove
every statoverrides before postrm. Again, it is like this only since
April or May, and it has not reached Stable, yet.


Why does postrm do that?  Is there any harm in leaving the user and
group around?
See also http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621833
Thanks for pointing this to me, I was not aware of these issues. Do you 
want me to change this for wheezy or is it ok to wait the release ?


Cheers,
Bertrand
diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog
--- gnunet-0.9.3/debian/changelog	2012-06-20 23:55:23.0 +0200
+++ gnunet-0.9.3/debian/changelog	2012-08-05 20:13:55.0 +0200
@@ -1,3 +1,19 @@
+gnunet (0.9.3-3) unstable; urgency=low
+
+  * debian/control: update Vcs-* to the new repository in collab-maint.
+  * Install only the generated binaries on Hurd, thanks to Cyril Roelandt
+(Closes: #670794).
+  * Use chmod and chown instead of dpkg-statoverride to set special permissions
+and upgrade properly depending on the previous version (Closes: #673301).
+  * Fix gcc-4.6: [sparc] compiler fails to align stack-allocated
+struct, with array of uint32-values to 32-bit boundary:
+new patch sparc_alignment.patch, taken from upstream:
+https://lists.gnu.org/archive/html/gnunet-svn/2012-07/msg00548.html
+Thanks to Jurij Smakov for the analysis.
+(Closes: #670578)
+
+ -- Bertrand Marc beberk...@gmail.com  Sun, 05 Aug 2012 20:13:49 +0200
+
 gnunet (0.9.3-2) unstable; urgency=low
 
   * Clean properly dpkg-statoverride in gnunet-server.postrm
diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control
--- gnunet-0.9.3/debian/control	2012-06-10 10:29:08.0 +0200
+++ gnunet-0.9.3/debian/control	2012-08-05 20:12:01.0 +0200
@@ -10,8 +10,8 @@
  libsqlite3-dev (=3.0), libpq-dev (=8.3), guile-1.8-dev, libglpk-dev (=4.32)
 Build-Conflicts: autoconf2.13, automake1.4
 Standards-Version: 3.9.3
-Vcs-Git: git://git.debian.org/git/users/bbk-guest/gnunet.git
-Vcs-browser: http://git.debian.org/?p=users/bbk-guest/gnunet.git
+Vcs-Git: git://git.debian.org/git/collab-maint/gnunet.git
+Vcs-browser: http://git.debian.org/?p=collab-maint/gnunet.git
 Homepage: http://www.gnunet.org/
 
 Package: gnunet
diff -Nru gnunet-0.9.3/debian/gnunet-server.install.hurd gnunet-0.9.3/debian/gnunet-server.install.hurd
--- gnunet-0.9.3/debian/gnunet-server.install.hurd	1970-01-01 01:00:00.0 +0100
+++ gnunet-0.9.3/debian/gnunet-server.install.hurd	2012-07-01 16:59:50.0 +0200
@@ -0,0 +1,52 @@
+etc/gnunet.conf
+usr/bin/gnunet-arm
+usr/bin/gnunet-core
+usr/bin/gnunet-daemon-*
+usr/bin/gnunet-dht-*
+usr/bin/gnunet-fs
+usr/bin/gnunet-gns*
+usr/bin/gnunet-helper-*
+usr/bin/gnunet-namestore

Bug#683073: unblock: gnunet/0.9.3-3

2012-08-02 Thread Bertrand Marc

Le 01/08/2012 23:17, Julien Cristau a écrit :

It's much easier for us if we don't have to go chase patches in other
places and stuff is all in the mail.


Here is the full debdiff between gnunet 0.9.3-2 (in testing/unstable) 
and the new revision I prepared.


Cheers,
Bertrand

diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog
--- gnunet-0.9.3/debian/changelog	2012-06-20 23:55:23.0 +0200
+++ gnunet-0.9.3/debian/changelog	2012-08-01 22:10:06.0 +0200
@@ -1,3 +1,21 @@
+gnunet (0.9.3-3) unstable; urgency=low
+
+  * debian/control: update Vcs-* to the new repository in collab-maint.
+  * Install only the generated binaries on Hurd, thanks to Cyril Roelandt
+(Closes: #670794).
+  * Use chmod and chown instead of dpkg-statoverride to set special permissions
+and upgrade properly depending on the previous version (Closes: #673301).
+  * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make
+gnunet-server depend on lsb-base to use LSB logging.
+  * Fix gcc-4.6: [sparc] compiler fails to align stack-allocated
+struct, with array of uint32-values to 32-bit boundary:
+new patch sparc_alignment.patch, taken from upstream:
+https://lists.gnu.org/archive/html/gnunet-svn/2012-07/msg00548.html
+Thanks to Jurij Smakov for the analysis.
+(Closes: #670578)
+
+ -- Bertrand Marc beberk...@gmail.com  Wed, 01 Aug 2012 22:09:49 +0200
+
 gnunet (0.9.3-2) unstable; urgency=low
 
   * Clean properly dpkg-statoverride in gnunet-server.postrm
diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control
--- gnunet-0.9.3/debian/control	2012-06-10 10:29:08.0 +0200
+++ gnunet-0.9.3/debian/control	2012-07-13 20:04:35.0 +0200
@@ -10,8 +10,8 @@
  libsqlite3-dev (=3.0), libpq-dev (=8.3), guile-1.8-dev, libglpk-dev (=4.32)
 Build-Conflicts: autoconf2.13, automake1.4
 Standards-Version: 3.9.3
-Vcs-Git: git://git.debian.org/git/users/bbk-guest/gnunet.git
-Vcs-browser: http://git.debian.org/?p=users/bbk-guest/gnunet.git
+Vcs-Git: git://git.debian.org/git/collab-maint/gnunet.git
+Vcs-browser: http://git.debian.org/?p=collab-maint/gnunet.git
 Homepage: http://www.gnunet.org/
 
 Package: gnunet
@@ -75,7 +75,7 @@
 Pre-Depends: ${misc:Pre-Depends}
 Depends:
  ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}),
- adduser, gettext, netbase
+ adduser, gettext, netbase, lsb-base
 Suggests: miniupnpc
 Breaks: gnunet-fuse (0.9), gnunet-client (0.9)
 Replaces: gnunet-fuse (0.9), gnunet-client (0.9)
diff -Nru gnunet-0.9.3/debian/gnunet-server.init gnunet-0.9.3/debian/gnunet-server.init
--- gnunet-0.9.3/debian/gnunet-server.init	2012-05-02 21:43:40.0 +0200
+++ gnunet-0.9.3/debian/gnunet-server.init	2012-07-13 20:02:50.0 +0200
@@ -1,64 +1,109 @@
-#!/bin/sh
-
+#! /bin/sh
 ### BEGIN INIT INFO
-# Provides:		gnunet-server
-# Required-Start:	$syslog $network $local_fs $remote_fs
-# Required-Stop:	$syslog $network $local_fs $remote_fs
-# Should-Start:
-# Should-Stop:
-# Default-Start:	2 3 4 5
-# Default-Stop:		0 1 6
-# Short-Description:	Starts the GNUnet server at boot time.
-# Description:		GNUnet is a secure, trust-based peer-to-peer framework.
+# Provides:  gnunet-server
+# Required-Start:$remote_fs $syslog $network
+# Required-Stop: $remote_fs $syslog $network
+# Default-Start: 2 3 4 5
+# Default-Stop:  0 1 6
+# Short-Description: Starts the GNUnet server at boot time.
+# Description:   GNUnet is a secure, trust-based peer-to-peer framework.
 ### END INIT INFO
 
-PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
+PATH=/sbin:/usr/sbin:/bin:/usr/bin
+DESC=GNUnet
+NAME=gnunet-server
 DAEMON=/usr/bin/gnunet-service-arm
-NAME=gnunet-service-arm
-DESC=GNUnet
 LOGFILE=/var/log/gnunetd/gnunetd.log
+DAEMON_ARGS=-c /etc/gnunet.conf -d -l $LOGFILE
+SCRIPTNAME=/etc/init.d/$NAME
 
-test -x ${DAEMON} || exit 0
-
-set -e
-
-# Get configuration
-if [ -f /etc/default/gnunet-server ]
-then
-	. /etc/default/gnunet-server
-fi
-
-if [ ${GNUNET_AUTOSTART} != true ]
-then
-	exit 0
-fi
-
-case ${1} in
-	start)
-		echo -n Starting ${DESC}: 
-		start-stop-daemon --start --chuid ${GNUNET_USER} \
-			--oknodo --quiet --exec ${DAEMON} -- -c \
-			/etc/gnunet.conf -d -l $LOGFILE
-		echo ${NAME}.
-		;;
+# Exit if the package is not installed
+[ -x $DAEMON ] || exit 0
 
-	stop)
-		echo -n Stopping ${DESC}: 
-		start-stop-daemon --stop  --retry 15 \
-			--oknodo --quiet --exec ${DAEMON}
-		echo ${NAME}.
-		;;
+# Read configuration variable file if it is present
+[ -r /etc/default/$NAME ]  . /etc/default/$NAME
 
-	restart|force-reload)
-		${0} stop
-		sleep 1
-		${0} start
+[ ${GNUNET_AUTOSTART} != true ]  exit 0
+
+# Define LSB log_* functions.
+. /lib/lsb/init-functions
+
+#
+# Function that starts the daemon/service
+#
+do_start()
+{
+	# Return
+	#   0 if daemon has been started
+	#   1 if daemon was already running
+	#   2 if daemon could not be started
+	start-stop-daemon --start --quiet --exec $DAEMON --test

Bug#683073: unblock: gnunet/0.9.3-3

2012-08-02 Thread Bertrand Marc

Le 02/08/2012 20:03, Julien Cristau a écrit :

diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog
--- gnunet-0.9.3/debian/changelog   2012-06-20 23:55:23.0 +0200
+++ gnunet-0.9.3/debian/changelog   2012-08-01 22:10:06.0 +0200
@@ -1,3 +1,21 @@
+gnunet (0.9.3-3) unstable; urgency=low
+
+  * debian/control: update Vcs-* to the new repository in collab-maint.
+  * Install only the generated binaries on Hurd, thanks to Cyril Roelandt
+(Closes: #670794).
+  * Use chmod and chown instead of dpkg-statoverride to set special permissions
+and upgrade properly depending on the previous version (Closes: #673301).
+  * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make
+gnunet-server depend on lsb-base to use LSB logging.


This part makes me extremely nervous.  I don't think now is the time for
this kind of change.


That's why it was not uploaded to unstable, and only to mentors. I guess 
we could select the changes we want to see in wheezy:

- The fix to build on Hurd seems harmless to me.
- Getting rid of dpkg-statoverride would be nice, since its use was 
quite wrong. In particular, in the current package, there is no way to 
know whether the administrator or the gnunet package set the 
dpkg-statoverrides. It is in Debian only for a few months, and it would 
be nice not to mess up with dpkg-statoverride on Debian/stable boxes.
- The rewrite of gnunet-server.init is purely cosmetic: the current 
package doesn't use LSB logging, so gnunet is the only line with the old 
look at boot. I also added the status command, making lintian happy. 
Clearly it is the less urgent change.



+  * Fix gcc-4.6: [sparc] compiler fails to align stack-allocated
+struct, with array of uint32-values to 32-bit boundary:
+new patch sparc_alignment.patch, taken from upstream:
+https://lists.gnu.org/archive/html/gnunet-svn/2012-07/msg00548.html
+Thanks to Jurij Smakov for the analysis.
+(Closes: #670578)
+
+ -- Bertrand Marcbeberk...@gmail.com   Wed, 01 Aug 2012 22:09:49 +0200
+
  gnunet (0.9.3-2) unstable; urgency=low

* Clean properly dpkg-statoverride in gnunet-server.postrm

[...]

diff -Nru gnunet-0.9.3/debian/gnunet-server.postinst 
gnunet-0.9.3/debian/gnunet-server.postinst
--- gnunet-0.9.3/debian/gnunet-server.postinst  2012-06-07 23:13:17.0 
+0200
+++ gnunet-0.9.3/debian/gnunet-server.postinst  2012-07-07 15:50:27.0 
+0200
@@ -52,6 +52,24 @@
echo  done.
fi

+   # this can go away after wheezy
+   if dpkg --compare-versions $2 le 0.9.3-2  dpkg --compare-versions 
$2 ge 0.9.2-1; then
+   for file in /usr/bin/gnunet-helper-exit \
+   /usr/bin/gnunet-helper-fs-publish \
+   /usr/bin/gnunet-helper-nat-client \
+   /usr/bin/gnunet-helper-nat-server \
+   /usr/bin/gnunet-helper-transport-wlan \
+   /usr/bin/gnunet-helper-vpn \
+   /usr/bin/gnunet-helper-dns \
+   /usr/bin/gnunet-service-dns
+   do
+   if dpkg-statoverride --list $file/dev/null 21
+   then
+   dpkg-statoverride --remove $file
+   fi
+   done
+   fi
+   


How does this interact with statoverrides set by the local admin?
It doesn't. The use of dpkg-statoverride was wrong in the first place, 
so there is no way to know whether the local admin set statoverrides or 
whether the gnunet package did. And since postrm removes the gnunet 
group and user, we need to be sure we remove every statoverrides before 
postrm. Again, it is like this only since April or May, and it has not 
reached Stable, yet.


Cheers,
Bertrand


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/501ae535.20...@gmail.com



Bug#683073: unblock: gnunet/0.9.3-3

2012-08-01 Thread Bertrand Marc

Dear release team,

I prepared a new revision of gnunet, fixing a grave bug (#670578), 
thanks to Gregor Herrmann. Here is the new changelog:

  * debian/control: update Vcs-* to the new repository in collab-maint.
  * Install only the generated binaries on Hurd, thanks to Cyril Roelandt
(Closes: #670794).
  * Use chmod and chown instead of dpkg-statoverride to set special 
permissions
and upgrade properly depending on the previous version (Closes: 
#673301).

  * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make
gnunet-server depend on lsb-base to use LSB logging.
  * Fix gcc-4.6: [sparc] compiler fails to align stack-allocated
struct, with array of uint32-values to 32-bit boundary:
new patch sparc_alignment.patch, taken from upstream:
https://lists.gnu.org/archive/html/gnunet-svn/2012-07/msg00548.html
Thanks to Jurij Smakov for the analysis.
(Closes: #670578)

You'll find the diff of the last fix (for the grave bug) here:
http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=74;filename=670578.diff;att=1;bug=670578

Again, I uploaded it to mentors, waiting for your approval.

Cheers,
Bertrand


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/501994fb.9060...@gmail.com



Bug#683073: unblock: gnunet/0.9.3-3

2012-07-28 Thread Bertrand Marc

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception

Dear release team,

(this bug submission is following my message [1] on debian-release@, to 
make sure my mail will not get inadvertently overlooked in the

surrounding sea of unblock requests)

I prepared a new revision of GNUnet fixing a few bugs with the following 
changes (the diff is attached):


  * debian/control: update Vcs-* to the new repository in collab-maint.
  * Install only the generated binaries on Hurd, thanks to Cyril 
Roelandt (Closes: #670794).
  * Use chmod and chown instead of dpkg-statoverride to set special 
permissions and upgrade properly depending on the previous version 
(Closes: #673301).

  * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make
gnunet-server depend on lsb-base to use LSB logging.

Would you consider to give gnunet 0.9.3-3 a freeze exception ?

This version is not yet uploaded to unstable, my sponsor is waiting for 
your approval.


Cheers,
Bertrand

unblock gnunet/0.9.3-3

[1] http://lists.debian.org/debian-release/2012/07/msg01149.html

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog
--- gnunet-0.9.3/debian/changelog	2012-06-20 23:55:23.0 +0200
+++ gnunet-0.9.3/debian/changelog	2012-07-13 22:14:28.0 +0200
@@ -1,3 +1,15 @@
+gnunet (0.9.3-3) unstable; urgency=low
+
+  * debian/control: update Vcs-* to the new repository in collab-maint.
+  * Install only the generated binaries on Hurd, thanks to Cyril Roelandt
+(Closes: #670794).
+  * Use chmod and chown instead of dpkg-statoverride to set special permissions
+and upgrade properly depending on the previous version (Closes: #673301).
+  * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make
+gnunet-server depend on lsb-base to use LSB logging.
+
+ -- Bertrand Marc beberk...@gmail.com  Fri, 13 Jul 2012 22:13:55 +0200
+
 gnunet (0.9.3-2) unstable; urgency=low
 
   * Clean properly dpkg-statoverride in gnunet-server.postrm
diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control
--- gnunet-0.9.3/debian/control	2012-06-10 10:29:08.0 +0200
+++ gnunet-0.9.3/debian/control	2012-07-13 20:04:35.0 +0200
@@ -10,8 +10,8 @@
  libsqlite3-dev (=3.0), libpq-dev (=8.3), guile-1.8-dev, libglpk-dev (=4.32)
 Build-Conflicts: autoconf2.13, automake1.4
 Standards-Version: 3.9.3
-Vcs-Git: git://git.debian.org/git/users/bbk-guest/gnunet.git
-Vcs-browser: http://git.debian.org/?p=users/bbk-guest/gnunet.git
+Vcs-Git: git://git.debian.org/git/collab-maint/gnunet.git
+Vcs-browser: http://git.debian.org/?p=collab-maint/gnunet.git
 Homepage: http://www.gnunet.org/
 
 Package: gnunet
@@ -75,7 +75,7 @@
 Pre-Depends: ${misc:Pre-Depends}
 Depends:
  ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}),
- adduser, gettext, netbase
+ adduser, gettext, netbase, lsb-base
 Suggests: miniupnpc
 Breaks: gnunet-fuse (0.9), gnunet-client (0.9)
 Replaces: gnunet-fuse (0.9), gnunet-client (0.9)
diff -Nru gnunet-0.9.3/debian/gnunet-server.init gnunet-0.9.3/debian/gnunet-server.init
--- gnunet-0.9.3/debian/gnunet-server.init	2012-05-02 21:43:40.0 +0200
+++ gnunet-0.9.3/debian/gnunet-server.init	2012-07-13 20:02:50.0 +0200
@@ -1,64 +1,109 @@
-#!/bin/sh
-
+#! /bin/sh
 ### BEGIN INIT INFO
-# Provides:		gnunet-server
-# Required-Start:	$syslog $network $local_fs $remote_fs
-# Required-Stop:	$syslog $network $local_fs $remote_fs
-# Should-Start:
-# Should-Stop:
-# Default-Start:	2 3 4 5
-# Default-Stop:		0 1 6
-# Short-Description:	Starts the GNUnet server at boot time.
-# Description:		GNUnet is a secure, trust-based peer-to-peer framework.
+# Provides:  gnunet-server
+# Required-Start:$remote_fs $syslog $network
+# Required-Stop: $remote_fs $syslog $network
+# Default-Start: 2 3 4 5
+# Default-Stop:  0 1 6
+# Short-Description: Starts the GNUnet server at boot time.
+# Description:   GNUnet is a secure, trust-based peer-to-peer framework.
 ### END INIT INFO
 
-PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
+PATH=/sbin:/usr/sbin:/bin:/usr/bin
+DESC=GNUnet
+NAME=gnunet-server
 DAEMON=/usr/bin/gnunet-service-arm
-NAME=gnunet-service-arm
-DESC=GNUnet
 LOGFILE=/var/log/gnunetd/gnunetd.log
+DAEMON_ARGS=-c /etc/gnunet.conf -d -l $LOGFILE
+SCRIPTNAME=/etc/init.d/$NAME
 
-test -x ${DAEMON} || exit 0
-
-set -e
-
-# Get configuration
-if [ -f /etc/default/gnunet-server ]
-then
-	. /etc/default/gnunet-server
-fi
-
-if [ ${GNUNET_AUTOSTART} != true ]
-then
-	exit 0
-fi
-
-case ${1} in
-	start)
-		echo -n Starting ${DESC}: 
-		start-stop-daemon --start --chuid

Freeze exception request: gnunet-0.9.3-3

2012-07-18 Thread Bertrand Marc

Dear release team,

I prepared a new revision of GNUnet fixing a few bugs with the following 
changes (the diff is attached):

  * debian/control: update Vcs-* to the new repository in collab-maint.
  * Install only the generated binaries on Hurd, thanks to Cyril Roelandt
(Closes: #670794).
  * Use chmod and chown instead of dpkg-statoverride to set special 
permissions
and upgrade properly depending on the previous version (Closes: 
#673301).

  * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make
gnunet-server depend on lsb-base to use LSB logging.

Would you consider to give gnunet 0.9.3-3 a freeze exception ?

Cheers,
Bertrand
diff -Nru gnunet-0.9.3/debian/changelog gnunet-0.9.3/debian/changelog
--- gnunet-0.9.3/debian/changelog	2012-06-20 23:55:23.0 +0200
+++ gnunet-0.9.3/debian/changelog	2012-07-13 22:14:28.0 +0200
@@ -1,3 +1,15 @@
+gnunet (0.9.3-3) unstable; urgency=low
+
+  * debian/control: update Vcs-* to the new repository in collab-maint.
+  * Install only the generated binaries on Hurd, thanks to Cyril Roelandt
+(Closes: #670794).
+  * Use chmod and chown instead of dpkg-statoverride to set special permissions
+and upgrade properly depending on the previous version (Closes: #673301).
+  * Rewrite gnunet-server.init based on /etc/init.d/skeleton and make
+gnunet-server depend on lsb-base to use LSB logging.
+
+ -- Bertrand Marc beberk...@gmail.com  Fri, 13 Jul 2012 22:13:55 +0200
+
 gnunet (0.9.3-2) unstable; urgency=low
 
   * Clean properly dpkg-statoverride in gnunet-server.postrm
diff -Nru gnunet-0.9.3/debian/control gnunet-0.9.3/debian/control
--- gnunet-0.9.3/debian/control	2012-06-10 10:29:08.0 +0200
+++ gnunet-0.9.3/debian/control	2012-07-13 20:04:35.0 +0200
@@ -10,8 +10,8 @@
  libsqlite3-dev (=3.0), libpq-dev (=8.3), guile-1.8-dev, libglpk-dev (=4.32)
 Build-Conflicts: autoconf2.13, automake1.4
 Standards-Version: 3.9.3
-Vcs-Git: git://git.debian.org/git/users/bbk-guest/gnunet.git
-Vcs-browser: http://git.debian.org/?p=users/bbk-guest/gnunet.git
+Vcs-Git: git://git.debian.org/git/collab-maint/gnunet.git
+Vcs-browser: http://git.debian.org/?p=collab-maint/gnunet.git
 Homepage: http://www.gnunet.org/
 
 Package: gnunet
@@ -75,7 +75,7 @@
 Pre-Depends: ${misc:Pre-Depends}
 Depends:
  ${misc:Depends}, ${shlibs:Depends}, gnunet-common (= ${binary:Version}),
- adduser, gettext, netbase
+ adduser, gettext, netbase, lsb-base
 Suggests: miniupnpc
 Breaks: gnunet-fuse (0.9), gnunet-client (0.9)
 Replaces: gnunet-fuse (0.9), gnunet-client (0.9)
diff -Nru gnunet-0.9.3/debian/gnunet-server.init gnunet-0.9.3/debian/gnunet-server.init
--- gnunet-0.9.3/debian/gnunet-server.init	2012-05-02 21:43:40.0 +0200
+++ gnunet-0.9.3/debian/gnunet-server.init	2012-07-13 20:02:50.0 +0200
@@ -1,64 +1,109 @@
-#!/bin/sh
-
+#! /bin/sh
 ### BEGIN INIT INFO
-# Provides:		gnunet-server
-# Required-Start:	$syslog $network $local_fs $remote_fs
-# Required-Stop:	$syslog $network $local_fs $remote_fs
-# Should-Start:
-# Should-Stop:
-# Default-Start:	2 3 4 5
-# Default-Stop:		0 1 6
-# Short-Description:	Starts the GNUnet server at boot time.
-# Description:		GNUnet is a secure, trust-based peer-to-peer framework.
+# Provides:  gnunet-server
+# Required-Start:$remote_fs $syslog $network
+# Required-Stop: $remote_fs $syslog $network
+# Default-Start: 2 3 4 5
+# Default-Stop:  0 1 6
+# Short-Description: Starts the GNUnet server at boot time.
+# Description:   GNUnet is a secure, trust-based peer-to-peer framework.
 ### END INIT INFO
 
-PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
+PATH=/sbin:/usr/sbin:/bin:/usr/bin
+DESC=GNUnet
+NAME=gnunet-server
 DAEMON=/usr/bin/gnunet-service-arm
-NAME=gnunet-service-arm
-DESC=GNUnet
 LOGFILE=/var/log/gnunetd/gnunetd.log
+DAEMON_ARGS=-c /etc/gnunet.conf -d -l $LOGFILE
+SCRIPTNAME=/etc/init.d/$NAME
 
-test -x ${DAEMON} || exit 0
-
-set -e
-
-# Get configuration
-if [ -f /etc/default/gnunet-server ]
-then
-	. /etc/default/gnunet-server
-fi
-
-if [ ${GNUNET_AUTOSTART} != true ]
-then
-	exit 0
-fi
-
-case ${1} in
-	start)
-		echo -n Starting ${DESC}: 
-		start-stop-daemon --start --chuid ${GNUNET_USER} \
-			--oknodo --quiet --exec ${DAEMON} -- -c \
-			/etc/gnunet.conf -d -l $LOGFILE
-		echo ${NAME}.
-		;;
+# Exit if the package is not installed
+[ -x $DAEMON ] || exit 0
 
-	stop)
-		echo -n Stopping ${DESC}: 
-		start-stop-daemon --stop  --retry 15 \
-			--oknodo --quiet --exec ${DAEMON}
-		echo ${NAME}.
-		;;
+# Read configuration variable file if it is present
+[ -r /etc/default/$NAME ]  . /etc/default/$NAME
 
-	restart|force-reload)
-		${0} stop
-		sleep 1
-		${0} start
+[ ${GNUNET_AUTOSTART} != true ]  exit 0
+
+# Define LSB log_* functions.
+. /lib/lsb/init-functions
+
+#
+# Function that starts the daemon/service
+#
+do_start()
+{
+	# Return
+	#   0 if daemon has been started
+	#   1 if daemon was already running
+	#   2 if daemon could not be started

Re: Request removal for gnunet-fuse

2012-06-03 Thread Bertrand Marc

Hello,

Thank you Holger for cc:ing me.

Le 02/06/2012 23:21, Holger Levsen a écrit :

cc:ing the gnunet maintainer as he told me he was thinking of adoptiong these
packages... (he's also aware of the upstream situation..)


I can confirm I am also interested in adopting gnunet-*.


On Samstag, 2. Juni 2012, Artur Rona wrote:

I'm requesting removal for package gnunet-fuse. It's orphaned, outdated
and doesn't work anymore with gnunet 0.9.2. Also, there is a FTBFS bug
(http://bugs.debian.org/674342). It doesn't make sense to keep it in
testing. I've got in touch with upstream. They are going to re-work
gnunet-fuse, but no at this moment. The next question is, whether we
want to keep it in unstable as well?


I didn't file an ITA for gnunet-fuse (or gnunet-qt) yet, since they are 
both outdated and I cannot do anything about it. But IMHO they should 
not be testing. As soon as upstream will release a version compatible 
with GNUnet 0.9.2 I'll adopt these and update the version in unstable. 
It will probably be after the freeze though.


Cheers,
Bertrand

PS please CC me (or gnu...@packages.debian.org)


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4fcb9ac6.7080...@gmail.com



Bug#672117: transition: libextractor

2012-05-17 Thread Bertrand Marc

Hello,

Despite the wontfix tag on the RFS, libextractor got uploaded to 
unstable with gnunet...


Bertrand



--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4fb569d3.2080...@gmail.com



Bug#672115: transition: libmicrohttpd

2012-05-11 Thread Bertrand Marc

Le 11/05/2012 12:17, Cyril Brulebois a écrit :

Cyril Bruleboisk...@debian.org  (11/05/2012):

Unless I hear objections, I'll probably schedule those “tomorrow”.


BinNMUs for libmicrohttpd scheduled.

Mraw,
KiBi.


It's fine with me. GNUnet 0.8 is not very useful anyway since it is not 
compatible with 0.9 and there are not many users left on the 0.8 network.


Bertrand



--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4fad2683.5050...@gmail.com



Bug#672117: transition: libextractor

2012-05-09 Thread Bertrand Marc
Hi Cyril,

2012/5/8 Cyril Brulebois k...@debian.org:
 Did you a rebuild test for the reverse dependencies?

Thobias Grimm confirmed a few weeks ago that vdr-plugin-xineliboutput
builds fine with libextractor3. And at this time it seemed to me the
other reverse deps were from the GNUnet stack, so they are written by
the same dev (Christian Grothoff), and are either orphaned or RFS by
me.

 And I've just asked people not to sponsor it. Please wait
 until we say OK, meaning after the exiv2 transitions is over.

Ok, I didn't want to mess up with an ongoing transition. But don't you
think a 'wontfix' tag on the RFS is a bit final ? Wouldn't a simple
'blocked by' be enough ?

Cheers,
Bertrand



-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CACz8X-HA=HDSU7DfzrKXr4fC8bPnS8c+yfOGU=hbr6bxbqh...@mail.gmail.com



Bug#672115: transition: libmicrohttpd

2012-05-08 Thread Bertrand Marc

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

Dear Release Team,

I am filing this bug for the transition of the libmicrohttpd package.

Upstream released a new version, bumping the ABI version (SONAME) from 5 
to 10.


Among the reverse deps, it may not be necessary to binNMU gnunet, since 
a new version is waiting for a sponsor on mentors.


A sponsor already uploaded the libmicrohttpd package to unstable.

Best regards,
Bertrand

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4fa93ace.3050...@gmail.com



Bug#672117: transition: libextractor

2012-05-08 Thread Bertrand Marc

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

Dear Release Team,

I am filing this bug for the transition of the libextractor package.

Upstream released a new version, bumping the ABI version (SONAME) from 
1c2a to 3.


Among the reverse deps, it may not be necessary to binNMU gnunet, since 
a new version is waiting for a sponsor on mentors.


The new package is already waiting for a sponsor on mentors, see RFS 
#669717.


Best regards,
Bertrand

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4fa93d84.2010...@gmail.com



Please binNMU gnome-phone-manager against new gnome-bluetooth

2010-01-20 Thread Bertrand Marc

Hello,

A new version of gnome-bluetooth is in unstable since 2009-10-11, and since 
then gnome-phone-manager is not installable (see [1]).
Could you binNMU gnome-phone-manager to make it depend on the new version of 
gnome-bluetooth ?

nmu gnome-phone-manager_0.65-1 . -m 'Rebuild against new gnome-bluetooth'

Thanks.
Bertrand

[1] http://qa.debian.org/debcheck.php?dist=testingpackage=gnome-phone-manager
http://qa.debian.org/debcheck.php?dist=unstablepackage=gnome-phone-manager


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Unblock Easytag

2009-01-12 Thread Bertrand Marc
Hi,

I just noticed that Easytag has an Unblock request by freeze-exception
ignored due to version mismatch. It seems that there was an unblock request
for version 2.1.4-1, but since the last NMU, there is a version mismatch and
easytag can't make it to Lenny.

Since there has been only an NMU closing a bug, I was wondering if you could
consider updating the unblock request to 2.1.4-1.1. It would be a shame if
Easytag was not in Lenny.

Regards,
Bertrand