Source: runit
Version: 2.1.2-35
Severity: critical
An installation attempt on a default system (with recommends enabled) of
runit wants to replace the installed init:
| $ sudo apt install runit
| Reading package lists... Done
| Building dependency tree
| Reading state information... Done
| The
On Sat, Mar 07, 2020 at 01:40:53AM +0100, Marco d'Itri wrote:
> Nowadays (since Debian 10) systemd can automatically grow file systems
> and swap partitions just by adding the x-systemd.growfs flag to fstab.
Thanks for letting us know.
I added the flag and as announced it works fine:
ne about Xen.
Also there are no plans to support Xen for a possible Jessie ELTS.
Regards,
Bastian Blank
--
Oh, that sound of male ego. You travel halfway across the galaxy and
it's still the same song.
-- Eve McHuron, "Mudd's Women", stardate 1330.1
Hi Robert
On Sat, Feb 22, 2020 at 09:14:10AM -0500, Roberto C. Sánchez wrote:
> Is it then Credativ's intent to continue maintenance of Xen 4.4? If so,
> could you provide some information on when we might expect the next
> update? If not, I would like to request that you begin the process of
>
Hi folks
Next step in our quest to have usable AWS accounts is user handling.
I looked into the available options. Those are local account or
federation via SAML or OpenID Connect. Federation needs both an
external user source and some glue, due to the internal handling in AWS.
Local users
Control: severity -1 important
On Tue, Jan 28, 2020 at 09:25:28PM +0100, Andreas Beckmann wrote:
> during a test with piuparts I noticed your package failed the piuparts
> upgrade test because dpkg detected a conffile as being modified and then
> prompted the user for an action. As there is no
Control: severity -1 important
On Tue, Jan 28, 2020 at 09:25:28PM +0100, Andreas Beckmann wrote:
> during a test with piuparts I noticed your package failed the piuparts
> upgrade test because dpkg detected a conffile as being modified and then
> prompted the user for an action. As there is no
Control: severity -1 important
On Tue, Jan 28, 2020 at 09:25:28PM +0100, Andreas Beckmann wrote:
> during a test with piuparts I noticed your package failed the piuparts
> upgrade test because dpkg detected a conffile as being modified and then
> prompted the user for an action. As there is no
Hi Harald
On Sat, Feb 15, 2020 at 02:16:27PM +0100, Harald Dunkel wrote:
> I am maintainer for mg, currently on salsa. Problem is, upstream
> doesn't release tar balls anymore, but moved the code to github.
This is nothing uncommon.
> No tags.
So this upstream doesn't make releases but only
Package: libemail-address-list-perl
Version: 0.05-1+deb8u1
CVE ID : CVE-2018-18898
An denial of service via an algorithmic complexity attack on email address
parsing have been identified in libemail-address-list-perl.
For Debian 8 "Jessie", this problem has been fixed
Bastian Blank pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
e37a8577 by Bastian Blank at 2020-02-12T15:20:22+01:00
Reserve DLA-2101-1 for libemail-address-list-perl
- - - - -
2 changed files:
- data/CVE/list
- data/DLA/list
Changes
On Sun, Feb 09, 2020 at 01:45:21PM +0300, wes...@199903.xyz wrote:
> How to guess the message body’s language encoding if message didn’t have MIME
> charset set? The message may be encoded with utf8, gb2312, gbk or something
> others, but it didn’t have an charset header.
Well, text/*, with
Hi
On Thu, Feb 06, 2020 at 08:10:52PM +0100, Andreas Tille wrote:
> [Sorry for the delay. I'm not reading the list and just found it now in the
> archive.]
I sent the original to andr...@an3as.eu too. It was properly received
by mail.an3as.eu[88.198.124.37]:25, replying with
"250 OK
Hi Scott
On Wed, Feb 05, 2020 at 07:44:25AM +, Scott Kitterman wrote:
> >> Of course the fact that I can't use all the tools available to
> >manipulate text
> >> files to follow or analyze logs is problematic. If I'm using
> >journalctl, how
> >> do I replicate 'tail -f
On Wed, Feb 05, 2020 at 09:39:19AM +1100, Dmitry Smirnov wrote:
> For example, if a certain daemon manifested a condition when a message is
> logged too often, then with Rsyslog I could suppress noise by something like
> the following
This is a workaround for another problem. Fix the real
On Fri, Jan 31, 2020 at 08:59:36PM +0100, Andreas Tille wrote:
> I admit I'm not educated about those technical details. All I know is
> that time for blends.debian.net is running out today. A simple answer
> like: "We can not provide any VM to replace blends.debian.net" or "We
> could provide
Hi
It seems like I found a workaround: hard disable TLS 1.3 in OpenSSL:
/etc/ssl/openssl.conf:
| [system_default_sect]
| MinProtocol = TLSv1.2
| MaxProtocol = TLSv1.2
| CipherString = DEFAULT@SECLEVEL=2
Bastian
--
Military secrets are the most fleeting of all.
-- Spock, "The
Package: icinga2-bin
Version: 2.10.3-2
Severity: important
Hi
I upgraded the master and one satelite of a larger Icinga2 setup to
Buster. After the upgrade those two instances where unable to establish
a working API connection. Connections between the new master and the
Stretch instances still
On Wed, Jan 29, 2020 at 05:06:31PM +0100, Svante Signell wrote:
> * E) systemd is not available on non-Linux
- You don't need an alternative for something that does not exist.
- Have you ever tried to build those parts of the systemd package on
your favorite glibc non-Linux?
Bastian
--
Moin
On Sat, Jan 25, 2020 at 05:50:40AM +0100, Helmut Grohne wrote:
> s390-dasd fails to cross build from source, because it strips using the
> build architecture strip during build. Beyond breaking cross
> compilation, this also breaks DEB_BUILD_OPTIONS=nostrip as well as
> generation of -dbgsym
Moin
On Sat, Jan 25, 2020 at 05:50:40AM +0100, Helmut Grohne wrote:
> s390-dasd fails to cross build from source, because it strips using the
> build architecture strip during build. Beyond breaking cross
> compilation, this also breaks DEB_BUILD_OPTIONS=nostrip as well as
> generation of -dbgsym
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 20 Jan 2020 16:34:23 +0100
Source: waagent
Architecture: source
Version: 2.2.45-2
Distribution: unstable
Urgency: medium
Maintainer: Bastian Blank
Changed-By: Bastian Blank
Changes:
waagent (2.2.45-2) unstable; urgency
On Wed, Jan 15, 2020 at 12:50:16PM +, Sudip Mukherjee wrote:
> On Wed, Jan 15, 2020 at 06:12:05AM +, Jonathan Nieder wrote:
> > I agree --- if upstream development were happening in
> > https://github.com/libbpf/libbpf then this would be a no-brainer. It
> > appears to instead be a mirror
On Wed, Jan 15, 2020 at 12:50:16PM +, Sudip Mukherjee wrote:
> On Wed, Jan 15, 2020 at 06:12:05AM +, Jonathan Nieder wrote:
> > I agree --- if upstream development were happening in
> > https://github.com/libbpf/libbpf then this would be a no-brainer. It
> > appears to instead be a mirror
Hi Sudip
On Sun, Jan 12, 2020 at 12:28:20AM +, Sudip Mukherjee wrote:
> On Fri, Jan 03, 2020 at 08:23:58PM +, Sudip Mukherjee wrote:
> > > What are the benefits of doing so?
> > The only benefit will be that we will be able to update the libraries
> > irrespective of kernel update. libbpf
Hi Sudip
On Sun, Jan 12, 2020 at 12:28:20AM +, Sudip Mukherjee wrote:
> On Fri, Jan 03, 2020 at 08:23:58PM +, Sudip Mukherjee wrote:
> > > What are the benefits of doing so?
> > The only benefit will be that we will be able to update the libraries
> > irrespective of kernel update. libbpf
Control: reassign -1 thin-provisioning-tools
Control: forcemerge 931514 -1
Moin
On Mon, Dec 23, 2019 at 03:05:15AM +, Stefanos Harhalakis wrote:
> Justification: breaks the whole system
No, it does not.
However, this is fixed in thin-provisioning-tools.
Bastian
--
Peace was the way.
Control: reassign -1 thin-provisioning-tools
Control: forcemerge 931514 -1
Moin
On Mon, Dec 23, 2019 at 03:05:15AM +, Stefanos Harhalakis wrote:
> Justification: breaks the whole system
No, it does not.
However, this is fixed in thin-provisioning-tools.
Bastian
--
Peace was the way.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 07 Jan 2020 14:44:41 +0100
Source: lvm2
Architecture: source
Version: 2.03.07-1
Distribution: unstable
Urgency: medium
Maintainer: Debian LVM Team
Changed-By: Bastian Blank
Changes:
lvm2 (2.03.07-1) unstable; urgency=medium
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 07 Jan 2020 11:21:13 +0100
Source: thin-provisioning-tools
Architecture: source
Version: 0.8.5-4
Distribution: unstable
Urgency: medium
Maintainer: Debian LVM Team
Changed-By: Bastian Blank
Changes:
thin-provisioning-tools
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 06 Jan 2020 17:53:00 +0100
Source: lvm2
Architecture: source
Version: 2.03.02-4
Distribution: unstable
Urgency: medium
Maintainer: Debian LVM Team
Changed-By: Bastian Blank
Changes:
lvm2 (2.03.02-4) unstable; urgency=medium
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 06 Jan 2020 17:50:40 +0100
Source: dpkg-source-gitarchive
Architecture: source
Version: 0.1.2
Distribution: unstable
Urgency: medium
Maintainer: Bastian Blank
Changed-By: Bastian Blank
Changes:
dpkg-source-gitarchive (0.1.2
On Fri, Jan 03, 2020 at 02:29:37PM -0500, The Wanderer wrote:
> The accepting of init scripts seemed to me like an essential piece of
> making sure those scripts would be present wherever they would be
> needed. Your suggestion above seems to provide a way to make it less
> essential, and thus
Hi Marco
On Fri, Jan 03, 2020 at 06:59:36PM +0100, Marco d'Itri wrote:
> On Jan 03, Sudip Mukherjee wrote:
> > Do we package libbpf from their github repo independent of the kernel
> > update? Then we will need to remove the libbpf building bits from the
> > Debian kernel source and create a
Hi Marco
On Fri, Jan 03, 2020 at 06:59:36PM +0100, Marco d'Itri wrote:
> On Jan 03, Sudip Mukherjee wrote:
> > Do we package libbpf from their github repo independent of the kernel
> > update? Then we will need to remove the libbpf building bits from the
> > Debian kernel source and create a
On Fri, Jan 03, 2020 at 10:31:53AM -0800, Russ Allbery wrote:
> Support for kFreeBSD and Hurd is obviously a valid argument in favor of
> some level of support for non-systemd implementations.
But then there is the question on how much work it would be to port the
**systemd** implementations to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 03 Jan 2020 14:37:26 +0100
Source: thin-provisioning-tools
Architecture: source
Version: 0.8.5-3
Distribution: unstable
Urgency: medium
Maintainer: Debian LVM Team
Changed-By: Bastian Blank
Closes: 931514
Changes:
thin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 03 Jan 2020 13:23:12 +0100
Source: dpkg-source-gitarchive
Architecture: source
Version: 0.1.1
Distribution: unstable
Urgency: medium
Maintainer: Bastian Blank
Changed-By: Bastian Blank
Changes:
dpkg-source-gitarchive (0.1.1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 02 Jan 2020 21:36:39 +0100
Source: ipxe
Architecture: source
Version: 1.0.0+git-20190125.36a4c85-4
Distribution: unstable
Urgency: medium
Maintainer: Bastian Blank
Changed-By: Bastian Blank
Closes: 947267
Changes:
ipxe
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 02 Jan 2020 17:28:13 +0100
Source: dpkg-source-gitarchive
Binary: dpkg-source-gitarchive
Architecture: source all
Version: 0.1.0
Distribution: unstable
Urgency: medium
Maintainer: Bastian Blank
Changed-By: Bastian Blank
On Thu, Jan 02, 2020 at 12:16:33PM -0500, James B. Byrne wrote:
> We recently were forced by our PCI compliance audit to change our
> permissible ciphers. I speculate that this is the source of our
> problem. Our revised cipher list is:
Don't, as long as you don't enforce encryption as well.
Dear maintainer
This package produces a lot of lintian warnings:
W: node-clipboard: nodejs-module-installed-in-usr-lib
usr/lib/nodejs/clipboard/dist/clipboard.js
W: node-clipboard: nodejs-module-installed-in-usr-lib
usr/lib/nodejs/clipboard/lib/clipboard-action.js
Also, node-clipboard
Hi Scott
On Sun, Dec 29, 2019 at 10:04:39AM -0500, Scott Kitterman wrote:
> For the policy server in question, the 100s default should be more than 2x
> the
> maximum time the policy request can take, even if DNS is very slow,
The policy service is supposed to do proper timeouts for everything
Hi Matthew
On Sun, Dec 29, 2019 at 04:59:27AM +, Matthew Garrett wrote:
> Just in case anyone's wondering - I checked with Mary-Anne Wolf (who I
> met at Libreplanet some years ago) and she didn't send this mail.
> Someone faked her identity.
This mail was sent via the same way as the
Hi
Salsa is a pretty complex beast. As such it got errors. And especially
user visible errors. To manage and correlate information about such
errors it supports Sentry, which is the de-facto standard to do that
work. Sure, the same information can be read from the log, but this is
not really
Hi Manoj
Do you oppose that we finally shoot kernel-package dead, aka remove it
from the archive?
Regards,
Bastian
--
Youth doesn't excuse everything.
-- Dr. Janice Lester (in Kirk's body), "Turnabout Intruder",
stardate 5928.5.
Hi Manoj
Do you oppose that we finally shoot kernel-package dead, aka remove it
from the archive?
Regards,
Bastian
--
Youth doesn't excuse everything.
-- Dr. Janice Lester (in Kirk's body), "Turnabout Intruder",
stardate 5928.5.
Hi Christoph
On Wed, Dec 25, 2019 at 03:06:19AM +0100, Christoph Anton Mitterer wrote:
> Since last April, the package can't be upgraded as it conflicts with
> the current version of kernel-common.
kernel-common was neither released in Stretch, nor in Buster.
> but then this should be reflected
Hi Christoph
On Wed, Dec 25, 2019 at 03:06:19AM +0100, Christoph Anton Mitterer wrote:
> Since last April, the package can't be upgraded as it conflicts with
> the current version of kernel-common.
kernel-common was neither released in Stretch, nor in Buster.
> but then this should be reflected
Hi Christoph
On Wed, Dec 25, 2019 at 03:06:19AM +0100, Christoph Anton Mitterer wrote:
> Since last April, the package can't be upgraded as it conflicts with
> the current version of kernel-common.
kernel-common was neither released in Stretch, nor in Buster.
> but then this should be reflected
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 19 Dec 2019 19:32:59 +0100
Source: ipxe
Architecture: source
Version: 1.0.0+git-20190125.36a4c85-3
Distribution: unstable
Urgency: medium
Maintainer: Bastian Blank
Changed-By: Bastian Blank
Closes: 947024
Changes:
ipxe
Control: tags -1 pending
Hi Colin
On Thu, Dec 19, 2019 at 05:14:11PM +, Colin Watson wrote:
> OK, I bisected this to this commit:
>
> https://salsa.debian.org/waldi/ipxe/commit/56212b3037321d709184c5aed48b91b0a1bbd06e
> Happy to try further tests if you have any suggestions.
I feared it
Control: tags -1 pending
Hi Colin
On Thu, Dec 19, 2019 at 05:14:11PM +, Colin Watson wrote:
> OK, I bisected this to this commit:
>
> https://salsa.debian.org/waldi/ipxe/commit/56212b3037321d709184c5aed48b91b0a1bbd06e
> Happy to try further tests if you have any suggestions.
I feared it
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 14 Dec 2019 21:43:28 +0100
Source: ipxe
Architecture: source
Version: 1.0.0+git-20190125.36a4c85-2
Distribution: unstable
Urgency: medium
Maintainer: Bastian Blank
Changed-By: Bastian Blank
Closes: 944321
Changes:
ipxe
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 14 Dec 2019 18:24:35 +0100
Source: thin-provisioning-tools
Architecture: source
Version: 0.8.5-2
Distribution: unstable
Urgency: medium
Maintainer: Debian LVM Team
Changed-By: Bastian Blank
Closes: 930685
Changes:
thin
On Fri, Dec 13, 2019 at 10:55:34AM +0100, Thomas Koch wrote:
> I'm packaging nix: https://nixos.org/releases/nix/latest
> It releases 3 files:
> nix-2.3.1.tar.xz.asc - which signs the .sha256
Why does this not contain a signature of the file itself? The correct
filename for this schema would be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 12 Dec 2019 22:17:43 +0100
Source: thin-provisioning-tools
Architecture: source
Version: 0.8.5-1
Distribution: unstable
Urgency: medium
Maintainer: Debian LVM Team
Changed-By: Bastian Blank
Changes:
thin-provisioning-tools
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 08 Dec 2019 13:35:18 +0100
Source: grub-cloud
Architecture: source
Version: 0.0.5
Distribution: unstable
Urgency: medium
Maintainer: Debian Cloud Team
Changed-By: Bastian Blank
Changes:
grub-cloud (0.0.5) unstable; urgency
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 06 Dec 2019 14:00:41 +0100
Source: waagent
Architecture: source
Version: 2.2.45-1
Distribution: unstable
Urgency: medium
Maintainer: Bastian Blank
Changed-By: Bastian Blank
Closes: 911701
Changes:
waagent (2.2.45-1
Hi Russ
On Fri, Nov 29, 2019 at 10:35:04AM -0800, Russ Allbery wrote:
> Procedurally in Debian neither of these are justifications for setting the
> severity to serious. This is not a Policy requirement that has reached
> consensus, and the release team is the team in Debian that has the
>
On Fri, Nov 29, 2019 at 02:49:21PM +0100, Sylvestre Ledru wrote:
> Le 29/11/2019 à 14:07, Bastian Blank a écrit :
> > The output of debcargo breaks the Debian archive by increasing the
> > Package file much more then it needs to do.
> Breaks seems a strong word, no?
It adds blo
Hi Ximin
On Fri, Nov 29, 2019 at 12:24:38PM +, Ximin Luo wrote:
> > On Tue, Nov 26, 2019 at 10:25:51PM +, Ximin Luo wrote:
> > Please stop fiddling with severities.
> The maintainer of a package decides the severities and whether things are
> bugs or not. Neither have you provided a
Hi Ximin
On Tue, Nov 26, 2019 at 10:25:51PM +, Ximin Luo wrote:
> Control: severity -1 normal
Please stop fiddling with severities.
> The more precise reason, as I have explained many times already, is because
> the cargo package manager supports crates having optional dependencies. It is
Hi Ximin
On Tue, Nov 26, 2019 at 10:25:51PM +, Ximin Luo wrote:
> Control: severity -1 normal
Please stop fiddling with severities.
> The more precise reason, as I have explained many times already, is because
> the cargo package manager supports crates having optional dependencies. It is
Control: severity -1 serious
On Tue, Nov 26, 2019 at 10:25:51PM +, Ximin Luo wrote:
> The more precise reason, as I have explained many times already, is because
> the cargo package manager supports crates having optional dependencies. It is
> not feasible to automatically merge
Hi Sylvestre
On Tue, Nov 26, 2019 at 07:31:05PM +0100, Sylvestre Ledru wrote:
> > I'm filling this as bug now. Please discuss this issue there.
> First, this isn't random. This is generated from the features of the crate.
> I am not sure to understand what is wrong with that? It isn't uncommon
Hi Sylvestre
On Tue, Nov 26, 2019 at 07:31:05PM +0100, Sylvestre Ledru wrote:
> > I'm filling this as bug now. Please discuss this issue there.
> First, this isn't random. This is generated from the features of the crate.
> I am not sure to understand what is wrong with that? It isn't uncommon
Package: debcargo
Severity: serious
Hi Sylvestre
I'm filling this as bug now. Please discuss this issue there.
I'm setting it to serious as several ftp team members told you not to do
that.
On Thu, Oct 17, 2019 at 06:57:33PM +0200, Sylvestre Ledru wrote:
> Le 17/10/2019 à 18:52, Ansgar a
Package: debcargo
Severity: serious
Hi Sylvestre
I'm filling this as bug now. Please discuss this issue there.
I'm setting it to serious as several ftp team members told you not to do
that.
On Thu, Oct 17, 2019 at 06:57:33PM +0200, Sylvestre Ledru wrote:
> Le 17/10/2019 à 18:52, Ansgar a
On Sun, Nov 17, 2019 at 10:10:11AM -0800, Russ Allbery wrote:
> +The Release Team may, at their discretion, downgrade a Policy requirement
> +to a Policy recommendation for a given release of the Debian distribution.
> +This may be done for only a specific package or for the archive as a
> +whole.
On Sun, Nov 17, 2019 at 10:10:11AM -0800, Russ Allbery wrote:
> +The Release Team may, at their discretion, downgrade a Policy requirement
> +to a Policy recommendation for a given release of the Debian distribution.
> +This may be done for only a specific package or for the archive as a
> +whole.
Hi Brian
On Fri, Nov 15, 2019 at 01:10:58AM -0500, Brian Gupta wrote:
> Do you think it's ok in any case to remove init scripts. Let's say an
> upstream stops maintaining init scripts,
I would like to know if this is a real world problem. Please provide an
example of a package where the init
On Fri, Nov 15, 2019 at 11:23:09PM -0500, westlake wrote:
> When this kernel is used, the latest version of chrome crashes saying it
> can't launch because it is not able to create its own sandbox.
> (chrome "Version 78.0.3904.97 (Official Build) (64-bit)")
Please try:
| sysctl -w
On Fri, Nov 15, 2019 at 11:23:09PM -0500, westlake wrote:
> When this kernel is used, the latest version of chrome crashes saying it
> can't launch because it is not able to create its own sandbox.
> (chrome "Version 78.0.3904.97 (Official Build) (64-bit)")
Please try:
| sysctl -w
On Wed, Nov 06, 2019 at 08:54:17AM -0600, Bryan K. Walton wrote:
> Apple, Google, Microsoft, and Mozilla have all announced that they will
> be deprecating TLS 1.0 and 1.1 in March 2020, in their web browsers.
Mail is not a web browser.
> Similarly, SSL Labs has announced that they will be
Hi Dmitry
On Sun, Nov 03, 2019 at 07:33:59PM +1100, Dmitry Smirnov wrote:
>Package name: docker-systemctl-replacement
"docker" only shows up in the name of the package. What is this about?
Also "docker" is the trademark of the software called "moby".
> Description: daemonless
Hi Dmitry
On Sun, Nov 03, 2019 at 07:33:59PM +1100, Dmitry Smirnov wrote:
>Package name: docker-systemctl-replacement
"docker" only shows up in the name of the package. What is this about?
Also "docker" is the trademark of the software called "moby".
> Description: daemonless
On Thu, Oct 31, 2019 at 06:53:39PM +0100, Carsten Schoenert wrote:
> We typically use the BTS (Bug Tracker System) for dealing with issues.
> https://www.debian.org/Bugs/
You could try to setup a custom issue tracker via:
On Thu, Oct 31, 2019 at 03:58:03PM +0100, Ferdinand Goldmann wrote:
> I need a Postfix (3.3) installation to only accept mails sent after STARTTLS,
> so I've set smtpd_tls_security_level = encrypt in main.cf. However, Postfix
> still allows sending mails withouth encryption.
accept != send.
Hi Holger
On Wed, Oct 30, 2019 at 12:42:54PM +, Holger Levsen wrote:
> On Tue, Oct 29, 2019 at 09:00:15PM +0200, Niko Tyni wrote:
> > On Mon, Oct 28, 2019 at 12:28:32PM +0100, Guillem Jover wrote:
> > > Just noticed this change from the changelog. :) UTC is not really a
> > > proper timezone
Hi Russ
On Tue, Oct 29, 2019 at 12:19:03PM -0700, Russ Allbery wrote:
> Could you help me understand what this would look like? Is it something
> like this workflow?
>
> 1. tag2upload determines the local Git tree that should be uploaded as a
>new source package.
>
> 2. tag2upload locally
On Tue, Oct 22, 2019 at 07:33:47AM -0400, Sam Hartman wrote:
> My initial reaction is that this is additional complexity in a direction
> that we don't need.
It is not a question of complexity. It is a question of trust and who
we want and need to trust.
If we abolish the principle that we want
On Tue, Oct 22, 2019 at 07:33:47AM -0400, Sam Hartman wrote:
> My initial reaction is that this is additional complexity in a direction
> that we don't need.
It is not a question of complexity. It is a question of trust and who
we want and need to trust.
If we abolish the principle that we want
Hi Didier
On Mon, Oct 28, 2019 at 10:05:11AM +0100, Didier 'OdyX' Raboud wrote:
> Of course, all of this can only work if we can have, or make the ".git to
> .dsc" conversion reproducible; hence my query.
Now, please read the first mail of this thread again. Yes, maybe parts
of it are unclear,
On Fri, Oct 25, 2019 at 02:37:33PM -0700, Felix Lechner wrote:
> Based on information from #debian-ftp, which is recorded in part below, the
> profile is no longer being used. It will be removed in the near future.
How will this command line option work afterwards?
| -F, --ftp-master-rejects
|
On Fri, Oct 25, 2019 at 02:37:33PM -0700, Felix Lechner wrote:
> Based on information from #debian-ftp, which is recorded in part below, the
> profile is no longer being used. It will be removed in the near future.
How will this command line option work afterwards?
| -F, --ftp-master-rejects
|
On Fri, Oct 25, 2019 at 11:37:04AM +0200, Lars Liedtke wrote:
> Right and not :-(
Sadly, our crystal ball is in revision. So please do as you are told
and read http://www.postfix.org/DEBUG_README.html#mail.
Bastian
--
The heart is not a logical organ.
-- Dr. Janet Wallace,
Hi Ansgar
On Tue, Oct 22, 2019 at 11:51:56PM +0200, Ansgar wrote:
> We could look into either
> - writing MD5sum in a separate file only used by debian-cd (if present,
>otherwise debian-cd should fall back to using Packages), or
We still do that, see /indices/md5sum.gz.
Bastian
--
Hi Ansgar
On Tue, Oct 22, 2019 at 11:51:56PM +0200, Ansgar wrote:
> We could look into either
> - writing MD5sum in a separate file only used by debian-cd (if present,
>otherwise debian-cd should fall back to using Packages), or
We still do that, see /indices/md5sum.gz.
Bastian
--
Hi Ansgar
Thanks for filling in the gaps I left in my explanation.
On Wed, Oct 23, 2019 at 10:15:16AM +0200, Ansgar wrote:
> kernel.org uses a similar scheme: there are signatures for the
> uncompressed tarballs by the maintainer (linux-*.tar.sign). In addition
> there is a sha256sums.asc which
Hi Russ
On Mon, Oct 21, 2019 at 09:29:05PM -0700, Russ Allbery wrote:
> If we're going to go to the trouble of defining a new source format, I'd
> prefer we embrace a VCS-based one rather than once again rolling our own
> idiosyncratic representation of a tree of files
I'm not completely sure
On Mon, Oct 21, 2019 at 08:09:35PM -0700, Christian Calderon wrote:
> I've installed go-1.13 on my G5 (Quad 2.5) but I get an Illegal Instruction
> error. Is there any hope of getting this to run on my architecture or do I
> need to try to make things work with gnu-go? My ultimate goal is to get
>
Hi
Debian in form of dpkg have a rather strict view on how our source
packages should look like.
- Files need to be compressed and are recorded as such, which is a hard
problem and give rise to tools like pristine-tar and such.
- Different formats require different version formats. The native
Hi
Debian in form of dpkg have a rather strict view on how our source
packages should look like.
- Files need to be compressed and are recorded as such, which is a hard
problem and give rise to tools like pristine-tar and such.
- Different formats require different version formats. The native
Moin
In Debian most people prefer to have changelog entries with all changes,
so changes always contain a modification to debian/changelog.
If we also start to use merge requests on Salsa, all those changes will
contain modifications to debian/changelog, which will usualy conflict
with each
Moin
In Debian most people prefer to have changelog entries with all changes,
so changes always contain a modification to debian/changelog.
If we also start to use merge requests on Salsa, all those changes will
contain modifications to debian/changelog, which will usualy conflict
with each
On Mon, Oct 21, 2019 at 11:28:33AM +0530, Ritesh Raj Sarraf wrote:
> I recently refreshed User Mode Linux to version 5.2 in Debian Unstable.
> The package built fine for amd64 but for i386, I have run into the
> following build failure.
What did you find about it yourself?
> ld -r -dp -o
Control: reassign -1 src:icinga2
Control: retitle -1 icinga2 - FTBFS on release architectures
Control: severity -1 serious
Hi Bas
On Fri, Oct 18, 2019 at 02:22:17PM +0200, Sebastiaan Couwenberg wrote:
> On 10/18/19 2:11 PM, Bastian Blank wrote:
> > On Fri, Oct 18, 2019 at 01:53:22PM +
Control: reassign -1 src:icinga2
Control: retitle -1 icinga2 - FTBFS on release architectures
Control: severity -1 serious
Hi Bas
On Fri, Oct 18, 2019 at 01:53:22PM +0200, Bas Couwenberg wrote:
> Please remove icinga2 from armel, mips64el, mipsel & s390x to unblock testing
> migration due to
Source: python-flask-marshmallow
Version: 0.10.1-1
Severity: serious
Justication: Policy §12.5
X-Debbugs-CC: ftpmas...@debian.org, guptautkarsh2...@gmail.com,
python-modules-t...@lists.alioth.debian.org
I just accepted python-flask-marshmallow from NEW.
docs/_themes/flask/static/flasky.css_t
1201 - 1300 of 14587 matches
Mail list logo