Your message dated Mon, 28 Jan 2019 03:05:51 +0100 with message-id <20190128020551.4vuxh33trtc72...@angband.pl> and subject line Re: Bug#919637: RFS: elinks/0.13~20190114-1 [ITA] has caused the Debian Bug report #919637, regarding RFS: elinks/0.13~20190125-1 [ITA] to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 919637: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919637 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: sponsorship-requests Severity: normal Hello, I am adopting elinks. I have worked on the fork that Moritz has mentioned: https://github.com/rkd77/felinks I have emailed previous upstream maintainers,asking them if they are still maintaining elinks. Two emails bounced back, and I still got no reply from the others. Anyways, this upload is targetting experimental, as I have enabled several features like Bittorrent and Javascript. This upload fixes the following bugs #740981 (normal): elinks: doesn't check if hostname matches certificate's CN/SAN (CWE-297) #757631 (normal): elinks: HTML5 source element display missing #797931 (normal): elinks: Does not support SSL rehandshakes #797934 (wishlist): elinks: Support for SSL authentication using client certs #797968 (wishlist): elinks: Please add support for TLS SNI #856852 (normal): cert_verify is disabled by default #866015 (important): elinks: SSL error with some websites #879539 (minor): elinks: contains code related to gnutls pgp supprt #891575 (important): elinks: CVE-2012-6709 #917406 (normal): ITA: elinks -- advanced text-mode WWW browser Last changelog entry is: elinks (0.13~20190114-1) experimental; urgency=medium * New upstream release (Closes: #891575, #797931, #797934, #757631, #866015, #797968, #740981, #865852) * Add git-buildpackage conf file * Refreshed patches & removed patches that were includes upstream. Removed patches: 08-drop-deprecated-gnutls-functions.diff (Closes: #879539) 08_524696_fix_imdb_urls.diff 09-Switch-to-use-lua-5.1.diff * Add libgcrypt20-dev to build deps * Re-added 14_debug_disable_Werror.diff to enable development versions debug support * Added 16_POST_BUFFER_SIZE.diff patch which to enable uploading large files over https:// connections. * Add ascii-replacement-utf8-console.diff patch to print ASCII replacement for characters not found in current codepage in utf8 mode * Enable LZMA support * Enable BitTorrent * Enable NNTP Support * Enable Unicode combining characters support * Enable EX mode support * Enable SpiderMonkey support * Enable terminfo support * Build documentation * Build with libev * Bumped to compat level 12. No need to have dh-autoreconf, autotools-dev from build deps Also no need to explicitly call the respective sequences in rules * Remove old upstream gpg key. * Remove whitespaces * Renamed elinks.config to elinks.conf, old name confused build scrips * debian/rules: Override dh_installexamples to exclude .gitignore * Add typos.diff patch to fix spelling mistakes * debian/control: + Replace Conflicts with Breaks+Replaces + Update standards version to 4.3.0 + New maintainer (Closes: #917406) + Add Vcs-* fields * Add upstream metadata * Switch to DEP-5 copyright format * Disable pristine-tar, since we are getting the release from upstream git There is one lintian warning: W: elinks-data: manpage-has-errors-from-man usr/share/man/man5/elinks.conf.5.gz 1166: warning [p 14, 7.0i]: can't break line The package is on: g...@salsa.debian.org:aelmahmoudy-guest/elinks.git , felinks branch To access further information about this package, please visit the following URL: https://mentors.debian.net/package/elinks Alternatively, one can download the package with dget using this command: dget -x https://mentors.debian.net/debian/pool/main/e/elinks/elinks_0.13~20190114-1.dsc -- أحمد المحمودي (Ahmed El-Mahmoudy) Digital design engineer GPG KeyIDs: 4096R/A7EF5671 2048R/EDDDA1B7 GPG Fingerprints: 6E2E E4BB 72E2 F417 D066 6ABF 7B30 B496 A7EF 5761 8206 A196 2084 7E6D 0DF8 B176 BC19 6A94 EDDD A1B7signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---On Sat, Jan 26, 2019 at 04:29:26AM +0100, أحمد المحمودي wrote: > On Mon, Jan 21, 2019 at 03:37:24PM +0100, Adam Borowski wrote: > > Alas, it still FTBFSes: > > /<<PKGBUILDDIR>>/doc/manual.xml:3993: element link: validity error : IDREF > > attribute linkend references an unknown ID "CONFIG-SCRIPTING-SPIDERMONKEY" > Fixed upstream. I have re-uploaded to mentors. ✓ -- ⢀⣴⠾⠻⢶⣦⠀ ⣾⠁⢠⠒⠀⣿⡁ Remember, the S in "IoT" stands for Security, while P stands ⢿⡄⠘⠷⠚⠋⠀ for Privacy. ⠈⠳⣄⠀⠀⠀⠀
--- End Message ---