Your message dated Sun, 25 Jun 2023 01:20:14 +0000
with message-id <e1qdeqi-007t4m...@fasolo.debian.org>
and subject line Bug#1038926: fixed in cvs 2:1.12.13+real-29
has caused the Debian Bug report #1038926,
regarding cvs fails with "rsh: No host specified!"
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1038926: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038926
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: cvs
Version: 2:1.12.13+real-28
Severity: important
X-Debbugs-Cc: groth...@gmail.com

Dear Maintainer,

After the latest Debian update (the new stable release), 
CVS suddenly stopped to function completely for me. 

First, I got an error message about 'rsh' not found (and indeed
there was no 'rsh' in my path despite rsh-client being installed!?)
so I installed rsh-redone-client (rsh-client was already installed).  
Then I got "rsh: No host specified"; I figured rsh-redone-client has
an incompatible API (should then conflict with CVS, right?). 

Anyway, I then uninstalled both rsh implementations and re-installed 
only rsh-client. Unexpectedly, I now did have an 'rsh' binary in my
$PATH.

But, even with that, 'cvs up' now hangs and just outputs 'Connection
timed out'.  This is using the cvs.savannah.gnu.org server.  Note
that from another machine (non-Debian) on the same network, I can
at the same time run the 'cvs up' command against the same server
easily, so this is not actually a network or server situation, but
something about the rcs client (and/or how CVS calls it).

As a result, the package is unusable. (Yes, I also cannot commit.)

-- System Information:
Debian Release: 12.0
  APT prefers stable-security
  APT policy: (1000, 'stable-security'), (700, 'stable'), (650, 'testing'), 
(600, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-9-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages cvs depends on:
ii  adduser           3.134
ii  libbsd0           0.11.7-2
ii  libc6             2.36-9
ii  libcrypt1         1:4.4.33-2
ii  libgssapi-krb5-2  1.20.1-2
ii  libkrb5-3         1.20.1-2
ii  zlib1g            1:1.2.13.dfsg-1

Versions of packages cvs recommends:
ii  openssh-client  1:9.2p1-2

Versions of packages cvs suggests:
pn  mksh  <none>
pn  rcs   <none>

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: cvs
Source-Version: 2:1.12.13+real-29
Done: Thorsten Glaser <t...@mirbsd.de>

We believe that the bug you reported is fixed in the latest version of
cvs, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1038...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thorsten Glaser <t...@mirbsd.de> (supplier of updated cvs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA384

Format: 1.8
Date: Sun, 25 Jun 2023 00:09:30 +0200
Source: cvs
Architecture: source
Version: 2:1.12.13+real-29
Distribution: unstable
Urgency: high
Maintainer: Thorsten Glaser <t...@mirbsd.de>
Changed-By: Thorsten Glaser <t...@mirbsd.de>
Closes: 1038926
Changes:
 cvs (2:1.12.13+real-29) unstable; urgency=high
 .
   * configure-time hardcode full path for ssh(1) (Closes: #1038926)
   * Bump Policy
   * Opt out of GCC’s buggy LTO
   * Update lintian overrides
   * Acquire changes from MirBSD CVS HEAD:
     - Fix -Wmisleading-indentation
     - small getdate.y and test thereof cleanup
   * Switch to dh7-style rules
   * Run sanity.sh unless nocheck even though this takes over an hour
Checksums-Sha1:
 6411e89c75be530b64d234aab56f7e265053ec90 2281 cvs_1.12.13+real-29.dsc
 977c843cb66dfc474d9eb8e6dadc0bb4f99a49a0 154506 cvs_1.12.13+real-29.diff.gz
Checksums-Sha256:
 7db0aeabb7f4b7e745e9ebb7cee2a5da8219728ed39e0d8458d74a11f3594bac 2281 
cvs_1.12.13+real-29.dsc
 8652bcd7d98275daeb2c5d376fdb5bad792c62db865a680eef9cfeec762c093b 154506 
cvs_1.12.13+real-29.diff.gz
Files:
 e1bd0ebb47b1a806f488279ac973ef21 2281 vcs optional cvs_1.12.13+real-29.dsc
 e270b94fe9a20f1ea605846a2ce5dcf0 154506 vcs optional 
cvs_1.12.13+real-29.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (MirBSD)
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=zSiB
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to