Your message dated Mon, 28 Jan 2008 20:47:04 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#458628: fixed in dput 0.9.2.30
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: dput
Version: 0.9.2.29

Hi,

I see you added a security-master config snippet to dput, which is a good 
idea. However, it's there without any further comments or notes.

You may have seen that the section of the Developer's Reference is elaborate 
on the topic of security uploads and also advises not to upload anything 
without security team approval:
http://www.debian.org/doc/developers-reference/ch-pkgs#s-bug-security
That is of course based on past experience: the rules for security updates are 
strict so an inappropriate change is easily made, and having to reject 
uploads is cumbersome for the team.

I think it's important to repeat the same warning that precedes the location 
of the security queue in the devref also in dput's config file:

"Do NOT upload a package to the security upload queues without prior 
authorization from the security team.
See the following URL for instructions:
http://www.debian.org/doc/developers-reference/ch-pkgs#s-bug-security";

It would be very much appreciated if you would make a quick upload with this 
information added.

thanks,

Thijs

Attachment: pgpbuTVMdQiX0.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: dput
Source-Version: 0.9.2.30

We believe that the bug you reported is fixed in the latest version of
dput, which is due to be installed in the Debian FTP archive:

dput_0.9.2.30.dsc
  to pool/main/d/dput/dput_0.9.2.30.dsc
dput_0.9.2.30.tar.gz
  to pool/main/d/dput/dput_0.9.2.30.tar.gz
dput_0.9.2.30_all.deb
  to pool/main/d/dput/dput_0.9.2.30_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Viehmann <[EMAIL PROTECTED]> (supplier of updated dput package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 28 Jan 2008 19:38:38 +0100
Source: dput
Binary: dput
Architecture: source all
Version: 0.9.2.30
Distribution: unstable
Urgency: low
Maintainer: Thomas Viehmann <[EMAIL PROTECTED]>
Changed-By: Thomas Viehmann <[EMAIL PROTECTED]>
Description: 
 dput       - Debian package upload tool
Closes: 384702 458628
Changes: 
 dput (0.9.2.30) unstable; urgency=low
 .
   * Fail if pre_upload_command (or post_upload_command) exits with
     an error code.
   * Add warning to the configuration of the security upload queues.
     Closes: #458628
   * Add allowed_distributions field. The default configuration in
     dput.cf is to refuse UNRELEASED. Closes: #384702
Files: 
 bc778693b104bba3a06c859f24854bcf 495 devel optional dput_0.9.2.30.dsc
 aac9260b2e8f1cc0548fae38a4e97b10 44524 devel optional dput_0.9.2.30.tar.gz
 d3c8f0bf2840550357095738f21f2508 40630 devel optional dput_0.9.2.30_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD4DBQFHnjgZriZpaaIa1PkRAkHxAJQPmoAMwqJF3Hu/VFOzAf3W9h5VAKCHGbhV
rj3gxu181jOrtIxpvnZ9Xg==
=89pf
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to