Your message dated Sat, 23 Apr 2005 12:17:19 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#305782: fixed in randomize-lines 0.2.4 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 22 Apr 2005 07:29:54 +0000 >From [EMAIL PROTECTED] Fri Apr 22 00:29:54 2005 Return-path: <[EMAIL PROTECTED]> Received: from zblaxell.ott.istop.com (ashura.furryterror.org) [66.11.173.28] (meow) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DOsbp-00046H-00; Fri, 22 Apr 2005 00:29:54 -0700 Received: from zblaxell by ashura.furryterror.org with local (Exim 3.36 #1 (Debian)) id 1DOsbm-0003Gj-00 for <[EMAIL PROTECTED]>; Fri, 22 Apr 2005 03:29:50 -0400 Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Zygo Blaxell <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: /usr/bin/rl: rl does no output error checking X-Mailer: reportbug 3.8 Date: Fri, 22 Apr 2005 03:29:50 -0400 Message-Id: <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: randomize-lines Version: 0.2.3 Severity: normal File: /usr/bin/rl I would expect the following to generate an error message and exit with status 1 (shell convention for an error): rl .newsrc > /dev/full; echo $? Instead, rl blithely ignores all the write errors on stdout and exits with status 0: $ rl .newsrc > /dev/full; echo $? 0 Of course this makes it difficult to reliably use rl in a shell script where write errors (e.g. disk full) might occur. A workaround is to use the 'cat' program in a pipe: $ rl .newsrc | cat > /dev/full; echo $? cat: write error: No space left on device 1 however this workaround doesn't cope with read failures on .newsrc, and the shell code which does cope with that case isn't trivial. The real fix is to simply check for (and report) errors on read and write system calls within rl itself. -- System Information: Debian Release: 3.0 APT prefers testing APT policy: (102, 'testing'), (101, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.4.28-zb5s Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages randomize-lines depends on: ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an -- no debconf information --------------------------------------- Received: (at 305782-close) by bugs.debian.org; 23 Apr 2005 16:23:29 +0000 >From [EMAIL PROTECTED] Sat Apr 23 09:23:29 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DPNPl-0004IM-00; Sat, 23 Apr 2005 09:23:29 -0700 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DPNJn-0002NU-00; Sat, 23 Apr 2005 12:17:19 -0400 From: Arthur de Jong <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#305782: fixed in randomize-lines 0.2.4 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Sat, 23 Apr 2005 12:17:19 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: randomize-lines Source-Version: 0.2.4 We believe that the bug you reported is fixed in the latest version of randomize-lines, which is due to be installed in the Debian FTP archive: randomize-lines_0.2.4.dsc to pool/main/r/randomize-lines/randomize-lines_0.2.4.dsc randomize-lines_0.2.4.tar.gz to pool/main/r/randomize-lines/randomize-lines_0.2.4.tar.gz randomize-lines_0.2.4_i386.deb to pool/main/r/randomize-lines/randomize-lines_0.2.4_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Arthur de Jong <[EMAIL PROTECTED]> (supplier of updated randomize-lines package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sat, 23 Apr 2005 17:00:00 +0200 Source: randomize-lines Binary: randomize-lines Architecture: source i386 Version: 0.2.4 Distribution: unstable Urgency: low Maintainer: Arthur de Jong <[EMAIL PROTECTED]> Changed-By: Arthur de Jong <[EMAIL PROTECTED]> Description: randomize-lines - randomize lines of input text Closes: 305782 Changes: randomize-lines (0.2.4) unstable; urgency=low . * add checks for correct reading and writing of lines (closes: #305782) Files: 1c0dc51a1f86c8f2771252fc391f5f95 517 utils optional randomize-lines_0.2.4.dsc 0a6ab3bd06db0232324a02d602bf7142 119006 utils optional randomize-lines_0.2.4.tar.gz e023d487031f23baf3d71fe319bcb28b 13754 utils optional randomize-lines_0.2.4_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCanHiVYan35+NCKcRApiqAJ9ZJES674asqol82IFuC7I/b5kyZQCdELn4 CVvrYkDyonePlDEJ7cGidzI= =STzo -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]