Bug#1004383: Please backport v590 to bullseye

2022-05-13 Thread Boyuan Yang
notfound 1004383 590-1
close 1004383
thanks

I believe a backport version of less v590 is now present in bullseye-
backports.

Cheers,
Boyuan

On Wed, 26 Jan 2022 14:34:44 +0100 Michael Biebl  wrote:
> Source: less
> Version: 590-1
> Severity: wishlist
> 
> Hi Milan,
> 
> thanks for the update of less to v590 in unstable.
> 
> I'd like to revert [1] and build systemd with -Durlify=true now that we
> have a new enough less in unstable/testing.
> 
> Since we typically ship backports of systemd for the current stable
> release (and I plan to do that for bullseye as well), it would be great
> to have a backport of less so we don't have to revert that change
> (again).
>  
> Regards,
> Michael
>  
> [1]
https://salsa.debian.org/systemd-team/systemd/-/commit/e34e3b5b8a23b2dfc7fff057286184139465ecb2


signature.asc
Description: This is a digitally signed message part


Bug#1004383: Please backport v590 to bullseye

2022-01-26 Thread Michael Biebl
Source: less
Version: 590-1
Severity: wishlist

Hi Milan,

thanks for the update of less to v590 in unstable.

I'd like to revert [1] and build systemd with -Durlify=true now that we
have a new enough less in unstable/testing.

Since we typically ship backports of systemd for the current stable
release (and I plan to do that for bullseye as well), it would be great
to have a backport of less so we don't have to revert that change
(again).




Regards,
Michael



[1] 
https://salsa.debian.org/systemd-team/systemd/-/commit/e34e3b5b8a23b2dfc7fff057286184139465ecb2



-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.15.0-3-amd64 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled