Bug#652599: [php-maint] Bug#652599: Bug#652599: Bug#652599: php5: use_embedded_timezonedb.patch causes ext/date/lib/parse_tz.c to fail to compile

2012-04-16 Thread Joe Orton
The -v8 patch in Fedora has what I hope is the correct fix for this (no other changes in there): http://pkgs.fedoraproject.org/gitweb/?p=php.git;a=blob;f=php-5.3.1-systzdata-v8.patch;h=6caf9e0b0a64815360c6d9b532cc40e205380ef7;hb=b90996e56d0ee96d5db0ee2600defd7bf40c37d7 Let me know if that

Bug#652599: [php-maint] Bug#652599: Bug#652599: Bug#652599: php5: use_embedded_timezonedb.patch causes ext/date/lib/parse_tz.c to fail to compile

2012-02-02 Thread Joe Orton
On Wed, Feb 01, 2012 at 05:24:38PM +0100, sean finney wrote: On Wed, Feb 01, 2012 at 01:36:31AM +0100, Ondřej Surý wrote: But if you provide a clean patch to fix the issue, I'll apply it in the git and it will be part of some next release. We should make sure to bring the system tzdata

Bug#535770: [php-maint] Bug#535770: PHP system timezone patch for 5.3?

2009-07-17 Thread Joe Orton
Hi Sean, sorry I didn't see your comments earlier. On Wed, Jul 15, 2009 at 01:14:46AM +0200, sean finney wrote: in your comments you say: /* Parse an ISO-6709 date as used in zone.tab. Returns end of the s/date/coordinate/ ? :) Hah! I've fixed this in patch v7. but more seriously:

Bug#535770: [php-maint] Bug#535770: PHP system timezone patch for 5.3?

2009-07-15 Thread Joe Orton
v6 attached, which now passes all the tests in the ext/date testsuite and fixes some significant bugs in v5 and earlier. Regards, Joe Add support for use of the system timezone database, rather than embedding a copy. Discussed upstream but was not desired. History: r6: fix fd leak in r5, fix

Bug#535770: [php-maint] Bug#535770: PHP system timezone patch for 5.3?

2009-07-14 Thread Joe Orton
Hi folks, I've attached v5 of the system timezone patch, which is updated for 5.3.0. This contains the changes to parse zone.tab which I proposed in my previous mail, and should fix the crash reported in the Debian bug 535770. It seems to work fine though I have not tested it exhaustively.

Bug#535770: [php-maint] Bug#535770: PHP system timezone patch for 5.3?

2009-07-07 Thread Joe Orton
Hi Sean - adding the Fedora PHP devel list to CC. Thanks for getting in touch. For Fedora folks, Sean has referenced this Debian bug report: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535770 Quoting in full: On Tue, Jul 07, 2009 at 12:05:31AM +0200, sean finney wrote: ...and hi again

Bug#529929: subversion: SOCK_CLOEXEC problem (EINVAL)

2009-05-26 Thread Joe Orton
On Sun, May 24, 2009 at 12:45:12PM +0200, Laszlo Boszormenyi wrote: Hi all, On Sat, 2009-05-23 at 09:55 -0500, Peter Samuelson wrote: On Fri, May 22, 2009 at 01:26:58PM +0200, Johann Glaser wrote: $ uname -a Linux glaser 2.6.26 #1 PREEMPT Thu Dec 25 21:38:28 CET 2008 i686

Bug#480041: confirmation that debian #480041 is a gnutls problem, and steps to reproduce

2008-11-22 Thread Joe Orton
On Sat, Nov 22, 2008 at 12:51:05AM -0500, Daniel Kahn Gillmor wrote: On Fri 2008-11-21 08:20:40 -0500, Joe Orton wrote: neon already has a callback which does that, yeah. Daniel, can you try this neon patch? OK, after figuring out how to build neon27 (don't try it in a path

Bug#480041: confirmation that debian #480041 is a gnutls problem, and steps to reproduce

2008-11-22 Thread Joe Orton
On Sat, Nov 22, 2008 at 01:54:43PM -0500, Daniel Kahn Gillmor wrote: On Sat 2008-11-22 03:05:03 -0500, Joe Orton wrote: [0 [EMAIL PROTECTED] cdtemp.oNUHIC]$ svn co https://foo.example.org/svn/monkey/trunk/gorilla svn: OPTIONS of 'https://foo.example.org/svn/monkey/trunk/gorilla: Could

Bug#480041: confirmation that debian #480041 is a gnutls problem, and steps to reproduce

2008-11-21 Thread Joe Orton
On Fri, Nov 21, 2008 at 09:24:02AM +0200, Nikos Mavrogiannopoulos wrote: For neon to solve this, it has to perform a handshake after the rehandshake request has been required. Ah, I didn't realise that - OpenSSL will automatically rehandshake whenever requested by the server. So to provide

Bug#480041: confirmation that debian #480041 is a gnutls problem, and steps to reproduce

2008-11-21 Thread Joe Orton
On Fri, Nov 21, 2008 at 03:03:49PM +0200, Nikos Mavrogiannopoulos wrote: Actually you only need to do this test on record_recv(). OK. Note that usually servers request upgrade in order to receive a client certificate, thus it might be a good idea to notify or prompt the user about that.

Bug#480041: confirmation that debian #480041 is a gnutls problem, and steps to reproduce

2008-11-21 Thread Joe Orton
On Fri, Nov 21, 2008 at 12:31:14PM -0500, Daniel Kahn Gillmor wrote: On Fri 2008-11-21 08:20:40 -0500, Joe Orton wrote: neon already has a callback which does that, yeah. Daniel, can you try this neon patch? neon27 FTBFS for me right now (i opened http://bugs.debian.org/506464 to try

Bug#480041: confirmation that debian #480041 is a gnutls problem, and steps to reproduce

2008-11-21 Thread Joe Orton
On Fri, Nov 21, 2008 at 11:58:36AM -0500, Daniel Kahn Gillmor wrote: On Fri 2008-11-21 02:24:02 -0500, Nikos Mavrogiannopoulos wrote: Hello, this does not seem to be a gnutls error. The server merely asks for renegotiation, gnutls-cli ignores it (legal behavior) and server does not like

Bug#498340: rejected Digest challenge

2008-11-03 Thread Joe Orton
The AuthDigestDomain parameter is incorrectly configured on this server: [hdr] WWW-Authenticate: Digest realm=project, nonce=5R5MeXFWBAA=673bce354e24a5c28c6c348e07a13e5278f7534e, algorithm=MD5, domain=project, qop=auth remove the AuthDigestDomain parameter or set it to a path or URI prefix.

Bug#480041: PKCS#12 certs with embedded CA certs and GnuTLS

2008-10-30 Thread Joe Orton
This issue (Debian bug 480041) is almost certainly a neon bug. I can reproduce the error with a PKCS#12 cert with an embedded CA cert; if anybody else seeing this problem can confirm it's fixed with the patch below, that would be great. Regards, Joe Index: src/ne_gnutls.c

Bug#480041: PKCS#12 certs with embedded CA certs and GnuTLS

2008-10-30 Thread Joe Orton
On Thu, Oct 30, 2008 at 07:08:41PM +, Joe Orton wrote: This issue (Debian bug 480041) is almost certainly a neon bug. I can reproduce the error with a PKCS#12 cert with an embedded CA cert; if anybody else seeing this problem can confirm it's fixed with the patch below, that would

Bug#498351: libneon27-gnutls: latest upgrades broke svn https auth

2008-10-17 Thread Joe Orton
On Thu, Oct 16, 2008 at 04:10:29PM +0200, Yves-Alexis Perez wrote: ... [status-line] HTTP/1.1 401 Authorization Required [hdr] Date: Thu, 16 Oct 2008 13:56:07 GMT Header Name: [date], Value: [Thu, 16 Oct 2008 13:56:07 GMT] [hdr] Server: Apache Header Name: [server], Value: [Apache] [hdr]

Bug#481636: support for WWW-Authenticate: Negotiate

2008-10-17 Thread Joe Orton
On Sat, May 17, 2008 at 03:00:03AM +0200, Jelmer Vernooij wrote: It would be nice if cadaver supported WWW-Authenticate: Negotiate for DAV servers that require authentication using Kerberos. This should work out of the box. Note that neon does not (by default) support Negotiate for non-SSL

Bug#498351: libneon27-gnutls: latest upgrades broke svn https auth

2008-10-16 Thread Joe Orton
On Tue, Sep 09, 2008 at 01:25:56PM +0200, Yves-Alexis wrote: It was working perfectly fine with -3, now with -5 svn keeps asking username/password. Adding --verbose to svn doesn't help. I'll try to see if I can debug with neon directly, but I'm not sure how to do that. Can you add:

Bug#474139: libneon27-gnutls: Same problem again

2008-07-25 Thread Joe Orton
On Fri, May 30, 2008 at 02:42:45PM +0200, Benjamin Gufler wrote: Package: libneon27-gnutls Version: 0.28.2-2 Followup-For: Bug #474139 Hi, same problem on my box - when using svn, I get: [EMAIL PROTECTED]:~/am$ svn up svn: PROPFIND request failed on '/repo/hb/src/am/trunk' svn:

Bug#459453: cadaver does not honor /etc/ssl/certs/ca-certificates.crt

2008-04-19 Thread Joe Orton
For the four possible build configurations: neon built with (GnuTLS, OpenSSL) x (configure --with-ca-bundle, or not) the behaviour of ne_ssl_trust_default_ca() is as follows: 1) GnuTLS, no --with-ca-bundle: no CAs trusted 2) GnuTLS, --with-ca-bundle: trust the set of CAs in given file 3)

Bug#473939: sitecopy: FTBFS: configure: incompatible neon library version 0.28.1: wanted 0.24 25 26 27

2008-04-02 Thread Joe Orton
On Wed, Apr 02, 2008 at 05:13:33PM +0530, Kartik Mistry wrote: On Wed, 2 Apr 2008 13:08:49 +0200 Lucas Nussbaum [EMAIL PROTECTED] wrote: ... | checking linking against neon... yes | configure: incompatible neon library version 0.28.1: wanted 0.24 25 26 27 | configure: error: could not use

Bug#192402: Should not fail, when directory to be created already there

2008-02-06 Thread Joe Orton
This is expected behaviour. If the remote site state differs from what sitecopy thinks is there, you need to use --fetch. joe -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#169145: sitecopy: Permissions are not set on directories

2008-02-06 Thread Joe Orton
This has been supported since 0.14.0, using permissions dir in the rcfile; this bug can be closed. joe -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#71078: LOcation of .sitecopy directory cannot be configured

2008-02-06 Thread Joe Orton
This has been configurable forever, use sitecopy --storepath /path/to/.sitecopy joe -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#449768: sitecopy: debian/watch fails to report upstream's version

2008-01-30 Thread Joe Orton
=== --- configure.in(revision 1299) +++ configure.in(working copy) @@ -14,7 +14,7 @@ dnl Boston, MA 02111-1307, USA. dnl This configure script is: -dnl Copyright (C) 2000-2006 Joe Orton ([EMAIL PROTECTED]) +dnl Copyright (C) 2000-2007 Joe Orton ([EMAIL PROTECTED]) dnl Portions

Bug#400140: neon026 and .la files

2006-12-06 Thread Joe Orton
Hi Peter, On Tue, Dec 05, 2006 at 03:27:04PM -0600, Peter Samuelson wrote: [Joe Orton] `neon-config --la-file` is part of the defined and documented neon interface: removing the .la file breaks that interface, and hence will break applications designed to build against neon. So, I

Bug#400140: neon026 and .la files

2006-12-04 Thread Joe Orton
`neon-config --la-file` is part of the defined and documented neon interface: removing the .la file breaks that interface, and hence will break applications designed to build against neon. It is desirable to reference .la files directly when implementing simple portable build systems around

Bug#392005: [neon] Bug#392005: neon26: typing mistake in src/ne_auth.c: logical and used where bitwise expected

2006-10-10 Thread Joe Orton
On Mon, Oct 09, 2006 at 09:49:26PM +0200, Helmut Grohne wrote: Debian: src/ne_auth.c:1358 Upstream tarball from http://www.webdav.org/neon/: src/ne_auth.c:1204: else if (sess-protocol sess-protocol-flags AUTH_FLAG_VERIFY_NON40x (status-klass == 2 ||

Bug#298860: libapr0-dev: apr_unix_perms2mode not available in headers

2005-04-13 Thread Joe Orton
That's not a bug; it's a private function to APR, it's not intended for use by applications and so is not declared in the public headers. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#285591: (no subject)

2005-03-23 Thread Joe Orton
That's an application bug, hacking neon will work around it poorly. tla is failing to call ne_sock_init() before using SSL; see ne_session_create(3), neon(3), etc. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]