Your message dated Tue, 16 Feb 2016 11:00:29 +0000
with message-id <[email protected]>
and subject line Bug#814027: fixed in gnupg 1.4.20-4
has caused the Debian Bug report #814027,
regarding Provide gpgv-udeb from gnupg 1.4 on armel for stretch?
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
814027: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=814027
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: gnupg2
Version: 2.1.11-5
Severity: important

I'm trying to support a device in debian-installer which only has 4MB
space in flash to hold the installer ramdisk.  This just broke due to:

gnupg2 (2.1.11-5) unstable; urgency=medium

  * taking over gpgv-udeb from gnupg 1.4 packaging

The new gpgv-udeb pulls in libgcrypt20-udeb and libgpg-error0-udeb.
The former in particular is huge.

I assume libgcrypt20 is not optional for gnugpg v2.

I'm wondering... is there any way to continue providing gpgv-udeb from
gnupg 1.4 on armel for stretch?  I don't mind dropping support for
this device after stretch but it would be nice to support it in
stretch.  Unfortunately, I cannot think of anything else to drop from
the ramdisk.  Let me know what you think.  If providing support from
gnupg 1.4 for stretch on armel is too much of a hassle, I guess I'll
have to drop support now.

-- 
Martin Michlmayr
http://www.cyrius.com/

--- End Message ---
--- Begin Message ---
Source: gnupg
Source-Version: 1.4.20-4

We believe that the bug you reported is fixed in the latest version of
gnupg, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Daniel Kahn Gillmor <[email protected]> (supplier of updated gnupg package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 16 Feb 2016 01:38:15 -0500
Source: gnupg
Binary: gnupg gnupg-curl gpgv gpgv1.4-udeb gpgv-win32
Architecture: source amd64 all
Version: 1.4.20-4
Distribution: unstable
Urgency: medium
Maintainer: Debian GnuPG-Maintainers <[email protected]>
Changed-By: Daniel Kahn Gillmor <[email protected]>
Description:
 gnupg      - GNU privacy guard - a free PGP replacement
 gnupg-curl - GNU privacy guard - a free PGP replacement (cURL)
 gpgv       - GNU privacy guard - signature verification tool
 gpgv-win32 - GNU privacy guard - signature verification tool (win32 build)
 gpgv1.4-udeb - minimal signature verification tool (udeb)
Closes: 814027
Changes:
 gnupg (1.4.20-4) unstable; urgency=medium
 .
   [ Martin Michlmayr ]
   * add a gpgv1.4-udeb package for armel (Closes: #814027)
Checksums-Sha1:
 d26f01f89a9e13e66e1085e728b8d5e839754940 2469 gnupg_1.4.20-4.dsc
 1c750c2cee1fd1b530e342e35b8d30af300715c3 31020 gnupg_1.4.20-4.debian.tar.xz
 a9160a2e8f8ccd99104707e46104a3c64dac792c 60048 
gnupg-curl-dbgsym_1.4.20-4_amd64.deb
 d4f88dba86cf91cd7a7e3f8650b32890c562a0ec 64662 gnupg-curl_1.4.20-4_amd64.deb
 cb70a194c9e3417d6413598a2e86b2225882693e 1443184 
gnupg-dbgsym_1.4.20-4_amd64.deb
 42c589485b466c61bc94f8a3c29ce6e2a5462975 1168716 gnupg_1.4.20-4_amd64.deb
 9eea6f6e1736fb9772c0dd95c77b7a8090aaa069 457830 gpgv-dbgsym_1.4.20-4_amd64.deb
 2dc318bba57d531d253afc96de4f71ef2b8634ea 519196 gpgv-win32_1.4.20-4_all.deb
 aa22f6292090e5a796efae5051d57e89a375bd62 210780 gpgv_1.4.20-4_amd64.deb
Checksums-Sha256:
 71b06e4620486820b6b9497699cbb2fe3651eb4a7607c2e00f84684ed0266c25 2469 
gnupg_1.4.20-4.dsc
 d10a994759640ceb5173121d54be87d4b46c2c48386684460acd7432159c3531 31020 
gnupg_1.4.20-4.debian.tar.xz
 3e9749640253e3e11d3f2426554e94ca5d6134512f5eb5e368034906ff40d898 60048 
gnupg-curl-dbgsym_1.4.20-4_amd64.deb
 7f7d1f46b22e33aa805eefaedd50d254fc6dafeff773dcdd3a1772ad3388f201 64662 
gnupg-curl_1.4.20-4_amd64.deb
 ee1e7cfe79c87e66ea7977499d274f6360257795492cf854258c925f4df3408e 1443184 
gnupg-dbgsym_1.4.20-4_amd64.deb
 ace175b0e2e709cefc48fe5eec3600e6a2049e67ffb57186e7e17126becd66d2 1168716 
gnupg_1.4.20-4_amd64.deb
 7105fb4e36dd7555fe3cd30a5a021c80d9e87396d391738b8c6a7dfcb3a6ce88 457830 
gpgv-dbgsym_1.4.20-4_amd64.deb
 a16ec17bed5722699d5e6134b14d78754d18aab1e4caf3b9a77707b27e9c99fc 519196 
gpgv-win32_1.4.20-4_all.deb
 660c19961675acb58b65c53bbaccf92a94f6bfe5937156355a9b6f83dad4c4a5 210780 
gpgv_1.4.20-4_amd64.deb
Files:
 85c00e2529e6b5cd706e4c48138ac42a 2469 utils important gnupg_1.4.20-4.dsc
 3e2a0bb7d31cc2d9c9bbcf8261fe2fe8 31020 utils important 
gnupg_1.4.20-4.debian.tar.xz
 d84744b57ab1765452199ed4ae1a95b9 60048 debug extra 
gnupg-curl-dbgsym_1.4.20-4_amd64.deb
 fecf366733ecac2961814979fbeba89d 64662 utils optional 
gnupg-curl_1.4.20-4_amd64.deb
 ff33dc09bef67e0b9ff52c5dafe3a924 1443184 debug extra 
gnupg-dbgsym_1.4.20-4_amd64.deb
 1c54e6cb095ad3d477db60ec6c3ac8d4 1168716 utils important 
gnupg_1.4.20-4_amd64.deb
 19e931d77ba102a3b8ccb09417ccc5b2 457830 debug extra 
gpgv-dbgsym_1.4.20-4_amd64.deb
 4a1f9136f0cdec67dbf2df59202ded16 519196 utils extra gpgv-win32_1.4.20-4_all.deb
 e77aad4d09655c4eaac197ddb98a0149 210780 utils important gpgv_1.4.20-4_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=wszz
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to