Your message dated Sat, 23 Apr 2005 12:17:19 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#305782: fixed in randomize-lines 0.2.4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 22 Apr 2005 07:29:54 +0000
>From [EMAIL PROTECTED] Fri Apr 22 00:29:54 2005
Return-path: <[EMAIL PROTECTED]>
Received: from zblaxell.ott.istop.com (ashura.furryterror.org) [66.11.173.28] 
(meow)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DOsbp-00046H-00; Fri, 22 Apr 2005 00:29:54 -0700
Received: from zblaxell by ashura.furryterror.org with local (Exim 3.36 #1 
(Debian))
        id 1DOsbm-0003Gj-00
        for <[EMAIL PROTECTED]>; Fri, 22 Apr 2005 03:29:50 -0400
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Zygo Blaxell <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: /usr/bin/rl: rl does no output error checking
X-Mailer: reportbug 3.8
Date: Fri, 22 Apr 2005 03:29:50 -0400
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: randomize-lines
Version: 0.2.3
Severity: normal
File: /usr/bin/rl

I would expect the following to generate an error message and exit with 
status 1 (shell convention for an error):

        rl .newsrc > /dev/full; echo $?

Instead, rl blithely ignores all the write errors on stdout and exits with
status 0:

        $ rl .newsrc > /dev/full; echo $?
        0

Of course this makes it difficult to reliably use rl in a shell script where
write errors (e.g. disk full) might occur.

A workaround is to use the 'cat' program in a pipe:

        $ rl .newsrc | cat > /dev/full; echo $?
        cat: write error: No space left on device
        1

however this workaround doesn't cope with read failures on .newsrc, and the
shell code which does cope with that case isn't trivial.

The real fix is to simply check for (and report) errors on read and write
system calls within rl itself.

-- System Information:
Debian Release: 3.0
  APT prefers testing
  APT policy: (102, 'testing'), (101, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.4.28-zb5s
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages randomize-lines depends on:
ii  libc6                       2.3.2.ds1-20 GNU C Library: Shared libraries an

-- no debconf information

---------------------------------------
Received: (at 305782-close) by bugs.debian.org; 23 Apr 2005 16:23:29 +0000
>From [EMAIL PROTECTED] Sat Apr 23 09:23:29 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DPNPl-0004IM-00; Sat, 23 Apr 2005 09:23:29 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DPNJn-0002NU-00; Sat, 23 Apr 2005 12:17:19 -0400
From: Arthur de Jong <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#305782: fixed in randomize-lines 0.2.4
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sat, 23 Apr 2005 12:17:19 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: randomize-lines
Source-Version: 0.2.4

We believe that the bug you reported is fixed in the latest version of
randomize-lines, which is due to be installed in the Debian FTP archive:

randomize-lines_0.2.4.dsc
  to pool/main/r/randomize-lines/randomize-lines_0.2.4.dsc
randomize-lines_0.2.4.tar.gz
  to pool/main/r/randomize-lines/randomize-lines_0.2.4.tar.gz
randomize-lines_0.2.4_i386.deb
  to pool/main/r/randomize-lines/randomize-lines_0.2.4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Arthur de Jong <[EMAIL PROTECTED]> (supplier of updated randomize-lines package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat, 23 Apr 2005 17:00:00 +0200
Source: randomize-lines
Binary: randomize-lines
Architecture: source i386
Version: 0.2.4
Distribution: unstable
Urgency: low
Maintainer: Arthur de Jong <[EMAIL PROTECTED]>
Changed-By: Arthur de Jong <[EMAIL PROTECTED]>
Description: 
 randomize-lines - randomize lines of input text
Closes: 305782
Changes: 
 randomize-lines (0.2.4) unstable; urgency=low
 .
   * add checks for correct reading and writing of lines (closes: #305782)
Files: 
 1c0dc51a1f86c8f2771252fc391f5f95 517 utils optional randomize-lines_0.2.4.dsc
 0a6ab3bd06db0232324a02d602bf7142 119006 utils optional 
randomize-lines_0.2.4.tar.gz
 e023d487031f23baf3d71fe319bcb28b 13754 utils optional 
randomize-lines_0.2.4_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCanHiVYan35+NCKcRApiqAJ9ZJES674asqol82IFuC7I/b5kyZQCdELn4
CVvrYkDyonePlDEJ7cGidzI=
=STzo
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to