Hi

Salvatore Bonaccorso <car...@debian.org> writes:

Hi Gaudenz, and hi James, On Mon, Nov 19, 2018 at 03:48:14PM +0100, Gaudenz Steinlin wrote:
James Page <james.p...@canonical.com> writes: > https://git.launchpad.net/~ubuntu-server-dev/ubuntu/+source/ceph/tree/debian/patches?h=ubuntu/xenial > I think I hit the same issue in Ubuntu a while back for which > I picked 3 rocksdb patches - see above URL - 000*.patch. Thanks James. It looks like these patches actually fix the build issue. I already had these patches applied to the build in unstable, but I did not make the connection to the infinite loop. Salvatore, do you agree to an upload of 10.2.11-2 with these patches to stretch-security? Or how should we proceed?

Yes we should release a regression update for ceph via stretch-security.
Can you ping us when you have it ready?

I'm currently building a new fixed version (10.2.11-2). Should I just upload to stretch-security or do you want to have a look at it first?

I attached the debdiff to the previous stretch-security upload.

Gaudenz

Attachment: ceph_10.2.11-1to2.debdiff
Description: Binary data

>
> Regards,
> Salvatore
>
-- 
PGP: 836E 4F81 EFBB ADA7 0852 79BF A97A 7702 BAF9 1EF5

Reply via email to