It's now through NEW. The next step would be an upload to sid, with urgency=high, and an unblock request to the release.debian.org pseudopackage.
Thanks, Julien On 06/06/2017 02:26 AM, Eric Dorland wrote: > OK, apologies for the delay (and I know we're getting down to the > wire). I just uploaded libp11-openssl1.1 to experimental and of course > it's in NEW. If this looks ok let me know what the next steps are if > we want to try to get it into stretch. > > * Julien Cristau (jcris...@debian.org) wrote: >> On 05/30/2017 07:16 AM, Eric Dorland wrote: >>> * Julien Cristau (jcris...@debian.org) wrote: >>>> On 05/29/2017 03:15 AM, Eric Dorland wrote: >>>>> * Julien Cristau (jcris...@debian.org) wrote: >>>>>> On Mon, May 22, 2017 at 03:42:57 +0000, Eric Dorland wrote: >>>>>> >>>>>>> tag 846548 pending >>>>>>> thanks >>>>>>> >>>>>>> Hello, >>>>>>> >>>>>>> Bug #846548 reported by you has been fixed in the Git repository. You >>>>>>> can >>>>>>> see the changelog below, and you can check the diff of the fix at: >>>>>>> >>>>>>> >>>>>>> https://anonscm.debian.org/cgit/pkg-opensc/libp11.git/commit/?id=e8d6da0 >>>>>>> >>>>>> So, erm. This seems like it would break using libengine-pkcs11-openssl >>>>>> in an application using libssl1.0.2. As a SONAME bump it also seems >>>>>> rather inappropriate during the freeze. >>>>> >>>>> That's a good point. I was trying to provide an alternative to the >>>>> broken NMU that was going to be uploaded, but yes this will break >>>>> applications built against libssl1.0.2. It does fix using this with >>>>> the openssl tool however. >>>>> >>>> Right. >>>> >>>>>> I'm very interested in having this fixed in stretch so I can get the >>>>>> secure-boot stuff working on ftp-master, but this doesn't look like the >>>>>> way to go. Not to mention that you'd have to justify the bump from >>>>>> 0.4.3 to 0.4.4. >>>>>> >>>>>> Can you explain your plans here? >>>>> >>>>> As you suggested in your followup, the way forward would appear to be >>>>> to upload a new libp11 source package that builds against >>>>> libssl1.0.2. I can also backport all of the changes to 0.4.3 and >>>>> upload to testing-proposed-updates. Does that sound reasonable? >>>>> >>>> Having read through the 0.4.4 changes I think I'd be ok with getting >>>> that in if you're confident. I guess the other question is should >>>> libp11-dev come from the openssl1.1-using package or the >>>> openssl1.0.2-using one. At this late stage I guess it's safer to stay >>>> with 1.0.2, and have the libp11-openssl1.1 package (or however it's >>>> called) only provide a libengine-pkcs11-openssl1.1 binary? >>> >>> OK, I like this plan. We should get the naming right going forward >>> though for the libengine-pkcs11-openssl1.1 package. Is that how other >>> packages are handling naming when they depend on a particular version >>> of openssl? >>> >> I'm not sure, to be honest. I don't know if there are any other similar >> cases right now. This package name wouldn't survive stretch in any >> case, I guess? >> >>> I should be able to get fixed uploads to unstable in a couple of days. >>> >> Nice. Thanks. >> >> Cheers, >> Julien >