Bug#840142: RFP: minify-maven-plugin -- Combine and minimize JavaScript and CSS files for faster page loading

2016-10-08 Thread Dominik George
Package: wnpp
Severity: wishlist

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

* Package name: minify-maven-plugin
  Version : 1.7.4
  Upstream Author : Samuel Santos
* URL : https://github.com/samaxes/minify-maven-plugin
* License : Apache
  Programming Lang: Java
  Description : Combine and minimize JavaScript and CSS files for faster 
page loading

Minify Maven Plugin combines and minimizes your CSS and JavaScript files
for faster page loading. It produces a merged and a minified version of
your CSS and JavaScript resources which can be re-used across your
project.

Under the hood, it uses the YUI Compressor and Google Closure Compiler
but has a layer of abstraction around these tools which allows for other
tools to be added in the future.


This package is needed to package guacamole-client 0.9.9.

-BEGIN PGP SIGNATURE-
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=r+Dk
-END PGP SIGNATURE-

__
This is the maintainer address of Debian's Java team
. 
Please use
debian-j...@lists.debian.org for discussions and questions.


libjackson-json-java 1.9.2-8 MIGRATED to testing

2016-10-08 Thread Debian testing watch
FYI: The status of the libjackson-json-java source package
in Debian's testing distribution has changed.

  Previous version: 1.9.2-7
  Current version:  1.9.2-8

-- 
This email is automatically generated once a day.  As the installation of
new packages into testing happens multiple times a day you will receive
later changes on the next day.
See https://release.debian.org/testing-watch/ for more information.

__
This is the maintainer address of Debian's Java team
. 
Please use
debian-j...@lists.debian.org for discussions and questions.


libapache-mod-jk_1.2.42-1_source.changes ACCEPTED into unstable

2016-10-08 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 08 Oct 2016 16:00:51 +0200
Source: libapache-mod-jk
Binary: libapache2-mod-jk libapache-mod-jk-doc
Architecture: source
Version: 1:1.2.42-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers 

Changed-By: Markus Koschany 
Description:
 libapache-mod-jk-doc - Documentation of libapache2-mod-jk package
 libapache2-mod-jk - Apache 2 connector for the Tomcat Java servlet engine
Changes:
 libapache-mod-jk (1:1.2.42-1) unstable; urgency=medium
 .
   * Team upload.
   * New upstream version 1.2.42.
   * Switch to compat level 10.
   * Remvove virtual package dh-apache2 from Build-Depends.
   * Declare compliance with Debian Policy 3.9.8.
   * Remove autotools-dev because we use compat 10 now.
   * Move the package to Git.
Checksums-Sha1:
 ca938ab302f415d525b77e916a99afae647f3a25 2276 libapache-mod-jk_1.2.42-1.dsc
 a1a6b284b0bd5577f76b497687af01771faff902 3143693 
libapache-mod-jk_1.2.42.orig.tar.gz
 1d8b2f19142f3e1d00f33978e5b9c80c8bdec75e 11272 
libapache-mod-jk_1.2.42-1.debian.tar.xz
Checksums-Sha256:
 f54f8576f45d876658fd85f0afbc9f997e5bfc8ac43fbd9d99fed1aef71a4d17 2276 
libapache-mod-jk_1.2.42-1.dsc
 ea119f234c716649d4e7d4abd428852185b6b23a9205655e45554b88f01f3e31 3143693 
libapache-mod-jk_1.2.42.orig.tar.gz
 fd5a62cc7eb455932f79a7f9be0f7451257cfce6c5ee64d365e9078b2702c9d9 11272 
libapache-mod-jk_1.2.42-1.debian.tar.xz
Files:
 3cbcb5a55a9c7215c6eeeb6a575619ab 2276 httpd optional 
libapache-mod-jk_1.2.42-1.dsc
 22645ddc9953f1be3718776d9138560b 3143693 httpd optional 
libapache-mod-jk_1.2.42.orig.tar.gz
 b9566507df8985fad65479bf20f0fbf9 11272 httpd optional 
libapache-mod-jk_1.2.42-1.debian.tar.xz

-BEGIN PGP SIGNATURE-

iQKMBAEBCgB2BQJX+P6wXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRBQ0YzRDA4OEVGMzJFREVGNkExQTgzNUZE
OUFEMTRCOTUxM0I1MUU0DxxhcG9AZGViaWFuLm9yZwAKCRDZrRS5UTtR5G/+D/9y
qNai3p85b6vhXUj9diyySPLIHFZ4E8kmOmfe7PH8whMmstmtKX9uOUiUAtwm6tgU
948zlhEI6bntijVc6PI+0tROLhqObCLfL53/eLJbPUASF15sjuXLbheoRc62KoWu
mkx7DOtGdHCyVx4BAHlzSsuyX8JmfQOzWP8wf+Wp+8NghOrNn4WGUp1x4mrt4tg3
M8qsvs+nHFvXpyK2z29PjbB6qTcocS2hyfFdAJYy0C6AlXp/ieHInDmeqFr4VqIw
IsbAsqJfocXhvi7iMJekVL+HVbZcURsOLFrTGBkhc4/0jMQ/r3Mluy5EA7NxQBSz
rPmnlKxu+gm+d+M0S6QCpUsKBAzrPFkG/fPLFp/VNXcc3yFIGoRg94253Ul7AsQO
cFysd1AD10t2bMYt6GBbxZQ21WFEv2Z0Zs8bD87FdGwoVxQ2EF+QYI7xK3BF+D/1
H+SzJlt0IzqqvIuXRX7orFFrKFqQWoJIfwUbIKH8vW1cZ47L5zBpbN8lvC5jFNzN
GB1AXTU6hsXPDDrx7Av7Gmi4OpeALhkH7pcGAerRSllYI1gLnWrB5NaE1aCct61f
1igFrf//z+NSqsT7jJ0XxK1NLRAPi3vx4wHP2B+g9xhJLqTtVqHLz88o32W77fS6
8BRw3G97MaQmUuYgKX/2Jmt5qA/EzsNowA3e/F1XVA==
=a7Fz
-END PGP SIGNATURE-


Thank you for your contribution to Debian.

__
This is the maintainer address of Debian's Java team
. 
Please use
debian-j...@lists.debian.org for discussions and questions.


Bug#840130: libknopflerfish-osgi-framework-java: knopflerfish update breaks freeplane

2016-10-08 Thread Felix Natter

Package: libknopflerfish-osgi-framework-java
Version: 5.2.0-1
Severity: grave
Justification: renders package unusable

Dear Maintainer,

knopflerfish-osgi 5.2.0-1 breaks freeplane (see my post to debian-java:
[1]):

felix@debianunstable:~$ freeplane
org.knopflerfish.framework.readonly=true
org.knopflerfish.gosg.jars=reference:file:/usr/share/freeplane/core/
org.freeplane.basedirectory=/usr/share/freeplane
java.security.policy=/usr/share/freeplane/freeplane.policy
org.osgi.framework.storage=/usr/share/freeplane/fwdir
Knopflerfish OSGi framework launcher, version 
Copyright 2003-2016 Knopflerfish. All Rights Reserved.
See http://www.knopflerfish.org for more information.

java.lang.IllegalArgumentException: Failed to read exports: 
java.io.FileNotFoundException: /home/felix/exports (No such file or directory)
at 
org.knopflerfish.framework.SystemBundle.addSysPackagesFromFile(SystemBundle.java:699)
at 
org.knopflerfish.framework.SystemBundle.initSystemBundle(SystemBundle.java:557)
at 
org.knopflerfish.framework.FrameworkContext.init(FrameworkContext.java:402)
at org.knopflerfish.framework.SystemBundle.doInit(SystemBundle.java:622)
at org.knopflerfish.framework.SystemBundle.init(SystemBundle.java:152)
at org.knopflerfish.framework.Main.assertFramework(Main.java:446)
at org.knopflerfish.framework.Main.handleArgs(Main.java:546)
at org.knopflerfish.framework.Main.start(Main.java:224)
at org.knopflerfish.framework.Main.main(Main.java:156)
at org.freeplane.launcher.Launcher.run(Launcher.java:115)
at org.freeplane.launcher.Launcher.launch(Launcher.java:80)
at org.freeplane.launcher.Launcher.main(Launcher.java:67)
Error: Command "-istart org.freeplane.core" failed, Failed to read exports: 
java.io.FileNotFoundException: /home/felix/exports (No such file or directory)

I am creating this bug report in order to avoid that knopflerfish-osgi
5.2.0-1 migrates to testing.

[1] https://lists.debian.org/debian-java/2016/10/msg00016.html

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.7.0-1-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

libknopflerfish-osgi-framework-java depends on no packages.

libknopflerfish-osgi-framework-java recommends no packages.

Versions of packages libknopflerfish-osgi-framework-java suggests:
ii  libknopflerfish-osgi-java-doc  5.2.0-1

-- no debconf information


-- 
Felix Natter

__
This is the maintainer address of Debian's Java team
. 
Please use
debian-j...@lists.debian.org for discussions and questions.


Processing of libapache-mod-jk_1.2.42-1_source.changes

2016-10-08 Thread Debian FTP Masters
libapache-mod-jk_1.2.42-1_source.changes uploaded successfully to localhost
along with the files:
  libapache-mod-jk_1.2.42-1.dsc
  libapache-mod-jk_1.2.42.orig.tar.gz
  libapache-mod-jk_1.2.42-1.debian.tar.xz

Greetings,

Your Debian queue daemon (running on host franck.debian.org)

__
This is the maintainer address of Debian's Java team
. 
Please use
debian-j...@lists.debian.org for discussions and questions.


Processing of libapache-mod-jk_1.2.42-1_source.changes

2016-10-08 Thread Debian FTP Masters
libapache-mod-jk_1.2.42-1_source.changes uploaded successfully to 
ftp-master.debian.org
along with the files:
  libapache-mod-jk_1.2.42-1.dsc
  libapache-mod-jk_1.2.42.orig.tar.gz
  libapache-mod-jk_1.2.42-1.debian.tar.xz

Greetings,

Your Debian queue daemon (running on host coccia.debian.org)

__
This is the maintainer address of Debian's Java team
. 
Please use
debian-j...@lists.debian.org for discussions and questions.


Bug#840000: marked as done (libapache-mod-jk: CVE-2016-6808)

2016-10-08 Thread Debian Bug Tracking System
Your message dated Sat, 8 Oct 2016 12:56:22 +0200
with message-id <20161008105622.lcm5gxim6cpicz5o@eldamar.local>
and subject line Re: Bug#84: libapache-mod-jk: CVE-2016-6808
has caused the Debian Bug report #84,
regarding libapache-mod-jk: CVE-2016-6808
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
84: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=84
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libapache-mod-jk
Version: 1:1.2.41-1
Severity: important
Tags: security upstream patch

Hi,

the following vulnerability was published for libapache-mod-jk.

CVE-2016-6808[0]:
buffer overflow

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-6808

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Hi Markus,

On Fri, Oct 07, 2016 at 05:45:15PM +0200, Markus Koschany wrote:
> Looks like Apache is not affected. [1] I guess  would be
> justified here.

Thanks for clarifying with upstream. After off-list disucssion with
Moritz, since then it only affects Software under non-Debian we can
even do a  (Windows/IIS specific).

I'm updating the tracker right now, and closing this bug accordingly.

Regards,
Salvatore--- End Message ---
__
This is the maintainer address of Debian's Java team
. 
Please use
debian-j...@lists.debian.org for discussions and questions.

Bug#840090: projectreactor: FTBFS: Could not generate a proxy class for class org.gradle.api.internal.project.DefaultProject

2016-10-08 Thread Chris Lamb
Source: projectreactor
Version: 2.0.8-1
Severity: serious
Justification: fails to build from source
User: reproducible-bui...@lists.alioth.debian.org
Usertags: ftbfs
X-Debbugs-Cc: reproducible-bui...@lists.alioth.debian.org

Dear Maintainer,

projectreactor fails to build from source in unstable/amd64:

  [..]

  Adding debian:Buypass_Class_2_Root_CA.pem
  Adding debian:Buypass_Class_3_Root_CA.pem
  Adding debian:CA_Disig.pem
  Adding debian:CA_Disig_Root_R1.pem
  Adding debian:CA_Disig_Root_R2.pem
  Adding debian:CA_WoSign_ECC_Root.pem
  Adding debian:CFCA_EV_ROOT.pem
  Adding debian:CNNIC_ROOT.pem
  Adding debian:COMODO_Certification_Authority.pem
  Adding debian:COMODO_ECC_Certification_Authority.pem
  Adding debian:COMODO_RSA_Certification_Authority.pem
  Adding debian:Camerfirma_Chambers_of_Commerce_Root.pem
  Adding debian:Camerfirma_Global_Chambersign_Root.pem
  Adding debian:Certification_Authority_of_WoSign_G2.pem
  Adding debian:Certigna.pem
  Adding debian:Certinomis_-_Autorité_Racine.pem
  Adding debian:Certinomis_-_Root_CA.pem
  Adding debian:Certplus_Class_2_Primary_CA.pem
  Adding debian:Certum_Root_CA.pem
  Adding debian:Certum_Trusted_Network_CA.pem
  Adding debian:Chambers_of_Commerce_Root_-_2008.pem
  Adding 
debian:China_Internet_Network_Information_Center_EV_Certificates_Root.pem
  Adding debian:ComSign_CA.pem
  Adding debian:Comodo_AAA_Services_root.pem
  Adding debian:Comodo_Secure_Services_root.pem
  Adding debian:Comodo_Trusted_Services_root.pem
  Adding debian:Cybertrust_Global_Root.pem
  Adding debian:D-TRUST_Root_Class_3_CA_2_2009.pem
  Adding debian:D-TRUST_Root_Class_3_CA_2_EV_2009.pem
  Adding debian:DST_ACES_CA_X6.pem
  Adding debian:DST_Root_CA_X3.pem
  Adding debian:Deutsche_Telekom_Root_CA_2.pem
  Adding debian:DigiCert_Assured_ID_Root_CA.pem
  Adding debian:DigiCert_Assured_ID_Root_G2.pem
  Adding debian:DigiCert_Assured_ID_Root_G3.pem
  Adding debian:DigiCert_Global_Root_CA.pem
  Adding debian:DigiCert_Global_Root_G2.pem
  Adding debian:DigiCert_Global_Root_G3.pem
  Adding debian:DigiCert_High_Assurance_EV_Root_CA.pem
  Adding debian:DigiCert_Trusted_Root_G4.pem
  Adding debian:E-Tugra_Certification_Authority.pem
  Adding debian:EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı.pem
  Adding debian:EC-ACC.pem
  Adding debian:EE_Certification_Centre_Root_CA.pem
  Adding debian:Entrust.net_Premium_2048_Secure_Server_CA.pem
  Adding debian:Entrust_Root_Certification_Authority.pem
  Adding debian:Entrust_Root_Certification_Authority_-_EC1.pem
  Adding debian:Entrust_Root_Certification_Authority_-_G2.pem
  Adding debian:Equifax_Secure_CA.pem
  Adding debian:Equifax_Secure_Global_eBusiness_CA.pem
  Adding debian:Equifax_Secure_eBusiness_CA_1.pem
  Adding debian:GeoTrust_Global_CA.pem
  Adding debian:GeoTrust_Global_CA_2.pem
  Adding debian:GeoTrust_Primary_Certification_Authority.pem
  Adding debian:GeoTrust_Primary_Certification_Authority_-_G2.pem
  Adding debian:GeoTrust_Primary_Certification_Authority_-_G3.pem
  Adding debian:GeoTrust_Universal_CA.pem
  Adding debian:GeoTrust_Universal_CA_2.pem
  Adding debian:GlobalSign_ECC_Root_CA_-_R4.pem
  Adding debian:GlobalSign_ECC_Root_CA_-_R5.pem
  Adding debian:GlobalSign_Root_CA.pem
  Adding debian:GlobalSign_Root_CA_-_R2.pem
  Adding debian:GlobalSign_Root_CA_-_R3.pem
  Adding debian:Global_Chambersign_Root_-_2008.pem
  Adding debian:Go_Daddy_Class_2_CA.pem
  Adding debian:Go_Daddy_Root_Certificate_Authority_-_G2.pem
  Adding debian:Hellenic_Academic_and_Research_Institutions_RootCA_2011.pem
  Adding debian:Hongkong_Post_Root_CA_1.pem
  Adding debian:IGC_A.pem
  Adding debian:IdenTrust_Commercial_Root_CA_1.pem
  Adding debian:IdenTrust_Public_Sector_Root_CA_1.pem
  Adding debian:Izenpe.com.pem
  Adding debian:Juur-SK.pem
  Adding debian:Microsec_e-Szigno_Root_CA.pem
  Adding debian:Microsec_e-Szigno_Root_CA_2009.pem
  Adding debian:NetLock_Arany_=Class_Gold=_Főtanúsítvány.pem
  Adding debian:NetLock_Business_=Class_B=_Root.pem
  Adding debian:NetLock_Express_=Class_C=_Root.pem
  Adding debian:NetLock_Notary_=Class_A=_Root.pem
  Adding debian:NetLock_Qualified_=Class_QA=_Root.pem
  Adding debian:Network_Solutions_Certificate_Authority.pem
  Adding debian:OISTE_WISeKey_Global_Root_GA_CA.pem
  Adding debian:OISTE_WISeKey_Global_Root_GB_CA.pem
  Adding debian:PSCProcert.pem
  Adding debian:QuoVadis_Root_CA.pem
  Adding debian:QuoVadis_Root_CA_1_G3.pem
  Adding debian:QuoVadis_Root_CA_2.pem
  Adding debian:QuoVadis_Root_CA_2_G3.pem
  Adding debian:QuoVadis_Root_CA_3.pem
  Adding debian:QuoVadis_Root_CA_3_G3.pem
  Adding debian:RSA_Security_2048_v3.pem
  Adding debian:Root_CA_Generalitat_Valenciana.pem
  Adding debian:S-TRUST_Authentication_and_Encryption_Root_CA_2005_PN.pem
  Adding debian:S-TRUST_Universal_Root_CA.pem
  Adding debian:SecureSign_RootCA11.pem
  Adding debian:SecureTrust_CA.pem
  Adding debian:Secure_Global_CA.pem
  Adding debian:Security_Communication_EV_RootCA1.pem
  Adding debian:Security_Communication_RootCA2.pem