Your message dated Tue, 19 Jul 2005 12:02:11 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#314494: fixed in dpatch 2.0.14
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 16 Jun 2005 16:46:24 +0000
>From [EMAIL PROTECTED] Thu Jun 16 09:46:24 2005
Return-path: <[EMAIL PROTECTED]>
Received: from mail.gmx.net [213.165.64.20]
by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
id 1DixVY-0000nU-00; Thu, 16 Jun 2005 09:46:24 -0700
Received: (qmail invoked by alias); 16 Jun 2005 16:45:52 -0000
Received: from p54B3A3B0.dip0.t-ipconnect.de (EHLO test.wgdd.de)
[84.179.163.176]
by mail.gmx.net (mp033) with SMTP; 16 Jun 2005 18:45:52 +0200
X-Authenticated: #17381962
Received: from dl by test.wgdd.de with local (Exim 3.36 #1 (Debian))
id 1DixVE-0000wy-00; Thu, 16 Jun 2005 18:46:04 +0200
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Daniel Leidert <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: running dpatch-edit-patch in a patched source tree leads to errors
during
clean target
X-Mailer: reportbug 3.13
Date: Thu, 16 Jun 2005 18:46:04 +0200
Message-Id: <[EMAIL PROTECTED]>
Sender: Daniel Leidert <[EMAIL PROTECTED]>
X-Y-GMX-Trusted: 0
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
Package: dpatch
Version: 2.0.13
Severity: normal
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Ok, I try to explain the situation:
Let's say, we are working in the source tree of a Debian package and ran
build target, so the patch/patch-stamp target was called. The source is
now patched. Now you maybe see a mistake and you want to edit an
existing patch. Running dpatch-edit-patch, modifying and saving the
patch now leads to the following situation: The patch is modified in
debian/patches, but the old patch is still applied to the source, because
the clean target (unpatch target) is applied to the directoty in /tmp,
not to the real source. Trying to call the unpatch target (e.g. with the clean
target) now fails, because the patch cannot be reverted. The only chance to
run unpatch target is to apply manually the changes made during the last
patch-change to the source too, fix debian/patched and then try to call
unpatch target again. Maybe dpatch-edit-patch should check for the
existence of debian/patched inside the source and apply the unpatch
target to the source if debian/patched is found.
BTW: Maybe this bug is also related to bug #290820.
Regards, Daniel
- -- System Information:
Debian Release: testing/unstable
APT prefers unstable
APT policy: (850, 'unstable'), (700, 'testing'), (110, 'experimental')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.8.15050330
Locale: LANG=de_DE, LC_CTYPE=de_DE (charmap=ISO-8859-1)
dpatch depends on no packages.
Versions of packages dpatch recommends:
ii dpkg-dev 1.13.9 Package building tools for Debian
ii fakeroot 1.3 Gives a fake root environment
ii patchutils 0.2.30-1 Utilities to work with patches
Versions of packages dpatch is related to:
ii reportbug 3.13 reports bugs in the Debian distrib
pn totem-gstreamer <none> (no description available)
- -- no debconf information
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFCsazMdg0kG0+YFBERAmflAJ9VyMg9yC5dwFPZ1ljVSfFUuKn4wACgi/s7
vxFqcUhwEm1Oaiv3UMO5+qA=
=q6PH
-----END PGP SIGNATURE-----
---------------------------------------
Received: (at 314494-close) by bugs.debian.org; 19 Jul 2005 16:08:06 +0000
>From [EMAIL PROTECTED] Tue Jul 19 09:08:06 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1Duuda-0004YX-00; Tue, 19 Jul 2005 09:08:06 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1DuuXr-0003G3-00; Tue, 19 Jul 2005 12:02:11 -0400
From: Marc Haber <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#314494: fixed in dpatch 2.0.14
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 19 Jul 2005 12:02:11 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 3
Source: dpatch
Source-Version: 2.0.14
We believe that the bug you reported is fixed in the latest version of
dpatch, which is due to be installed in the Debian FTP archive:
dpatch_2.0.14.dsc
to pool/main/d/dpatch/dpatch_2.0.14.dsc
dpatch_2.0.14.tar.gz
to pool/main/d/dpatch/dpatch_2.0.14.tar.gz
dpatch_2.0.14_all.deb
to pool/main/d/dpatch/dpatch_2.0.14_all.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Marc Haber <[EMAIL PROTECTED]> (supplier of updated dpatch package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 19 Jul 2005 15:43:58 +0000
Source: dpatch
Binary: dpatch
Architecture: source all
Version: 2.0.14
Distribution: unstable
Urgency: low
Maintainer: Dpatch Maintainers <[EMAIL PROTECTED]>
Changed-By: Marc Haber <[EMAIL PROTECTED]>
Description:
dpatch - patch maintenance system for Debian source packages
Closes: 290820 312427 314494 315719 317757 317758
Changes:
dpatch (2.0.14) unstable; urgency=low
.
* Fix typo in dpatch.7 manpage. Thanks to A Costa. (mh) Closes: #312427
* Fix more typos. (mh)
* Fix dpatch-get-origtargz which had the apt-get source return code
reversed. (mh)
* add testsuite in tests/ directory. (dancerj)
* dpatch-edit-patch.functions (dpep_template_hardcoded): change to
accept patch description lines. (dancerj)
- -d option works now with hardcoded default, when 00template does not exist.
* dpatch-edit-patch.1, dpatch-edit-patch: new option --stampdir to specify
debian/patched directory. (dancerj)
* Bug fix: "running dpatch-edit-patch in a patched source tree leads to
errors during clean target" (Closes: #314494). (dancerj)
- This is also a response for request of OOo patch system.
Rather than taking that approach, we check more rigorously.
(Closes: #290820)
- dpep: Check for debian/patched/patch.dpatch,
and require --clean option to be specified in that case.
- tests/05_edit_with_patched now passes.
* dpatch-edit-patch does not give out an error message when --debianonly
flag is given a nonexisting file, patch from mh. (closes: #317758)
tests/10_dpep_debianonly.sh output is fixed.
* Feature implementation:
"dpatch-get-origtargz does not found upstream tarballs in
../upstream", thanks to Stefano Zacchiroli (Closes: #315719)
* Fix curl detection. (mh) (Closes: #317757)
* Standards-Version: 3.6.2 (no changes needed) (mh)
Files:
df4d990ab83edcd3697f6f07b9730b1d 663 devel optional dpatch_2.0.14.dsc
d228215bcd5d4d37036f887dd8d84f33 80152 devel optional dpatch_2.0.14.tar.gz
b9acf0111ae479cfa1c51a13fdd27b3f 81588 devel optional dpatch_2.0.14_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iEYEARECAAYFAkLdILYACgkQgZalRGu6PIRoywCfenObzW0qphB0q6ETo1Oo7rop
ouAAn1tem/DGd8ZGkWwxEgvoHyVaIpbz
=EIz2
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]