Bug#796240: nginx: jessie-backports package should be based on stable branch

2015-08-26 Thread Jonh Wendell
2015-08-25 13:02 GMT-03:00 Christos Trochalakis :

> Hello John,
>
> On Thu, Aug 20, 2015 at 01:42:49PM -0300, Jonh Wendell wrote:
>
>> Source: nginx
>> Severity: normal
>>
>> I think we should offer as part of backport the stable version of
>> upstream package.
>>
>> In nginx case, stable branch is 1.8.
>>
>> 1.9 is the development version (called by upstream 'mainline') which
>> will eventually become stable at 1.10 branch/series.
>>
>> So, 1.9 series should go to unstable/testing and 1.8 to jessie-backports.
>>
>> What do you think?
>>
>>
>
> Unfortunately this is not possible, backports include recompiled
> packages only from testing (and rarely from sid). So, since testing has
> 1.9.x that's the **only** version we can upload.
>
> https://wiki.debian.org/Backports
>
>
Do you think we could change this behavior for debian 9?

I mean, having two packages -stable and -mainline?

-- 
Jonh Wendell
http://www.bani.com.br


Bug#796240: nginx: jessie-backports package should be based on stable branch

2015-08-20 Thread Jonh Wendell
Source: nginx
Severity: normal

I think we should offer as part of backport the stable version of
upstream package.

In nginx case, stable branch is 1.8.

1.9 is the development version (called by upstream 'mainline') which
will eventually become stable at 1.10 branch/series.

So, 1.9 series should go to unstable/testing and 1.8 to jessie-backports.

What do you think?

-- System Information:
Debian Release: 8.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: systemd (via /run/systemd/system)



Bug#758458: status

2015-07-17 Thread Jonh Wendell
Why is it taking so long to get accepted? Any hint?


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#792584: ITP: spdylay -- Implementation of Google's SPDY protocol in C

2015-07-16 Thread Jonh Wendell
Package: wnpp
Severity: wishlist
Owner: Jonh Wendell 

* Package name: spdylay
  Version : 1.3.2
  Upstream Author : Tatsuhiro Tsujikawa 
* URL : http://tatsuhiro-t.github.io/spdylay/
* License : MIT
  Programming Lang: C++
  Description : Implementation of Google's SPDY protocol in C

This library provides SPDY version 2, 3 and 3.1 framing layer implementation.
It does not perform any I/O operations. When the library needs them, it calls
the callback functions provided by the application. It also does not include
any event polling mechanism, so the application can freely choose the way of
handling events. This library code does not depend on any particular SSL
library (except for example programs which depend on OpenSSL 1.0.1 or later).

Apache Traffic Server needs this library in order to support SPDY protocol.

I'm already packaging it (it's hosted on mentors.debian.net)


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#783003: apache2: Fix the error message when accessing a SSL port via HTTP

2015-04-20 Thread Jonh Wendell
Package: apache2.2-common
Version: 2.2.22-13+deb7u4
Severity: normal
Tags: patch

When accessing a SSL-enabled site using plain HTTP, apache
2.2 shows an error message that's not rendered correctly in
the browser, because it does not send proper headers.

The issue is already fixed in upstream 2.4 series:
https://bz.apache.org/bugzilla/show_bug.cgi?id=50823

This is a backport of the fix for stable (wheezy) package in
Debian. It applies in the branch wheezy of apache2 git module.

-- Package-specific info:
List of enabled modules from 'apache2 -M':
  alias auth_basic authn_file authz_default authz_groupfile
  authz_host authz_user autoindex cgi deflate dir env mime
  negotiation php5 reqtimeout setenvif ssl status
List of enabled php5 extensions:
  pdo

-- System Information:
Debian Release: 7.8
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages apache2 depends on:
ii  apache2-mpm-prefork  2.2.22-13+deb7u4
ii  apache2.2-common 2.2.22-13+deb7u4

apache2 recommends no packages.

apache2 suggests no packages.

Versions of packages apache2.2-common depends on:
ii  apache2-utils  2.2.22-13+deb7u4
ii  apache2.2-bin  2.2.22-13+deb7u4
ii  lsb-base   4.1+Debian8+deb7u1
ii  mime-support   3.52-1+deb7u1
ii  perl   5.14.2-21+deb7u2
ii  procps 1:3.3.3-3

Versions of packages apache2.2-common recommends:
ii  ssl-cert  1.0.32

Versions of packages apache2.2-common suggests:
pn  apache2-doc 
pn  apache2-suexec | apache2-suexec-custom  
ii  lynx-cur [www-browser]  2.8.8dev.12-2

-- no debconf information
>From 36b9bf3fc85feb936bce888499aec3c7f7124352 Mon Sep 17 00:00:00 2001
From: Jonh Wendell 
Date: Mon, 20 Apr 2015 10:51:22 -0300
Subject: [PATCH] Fix the error message when accessing a SSL port via HTTP

This is the backported (from 2.4) fix for the upstream bug:
https://bz.apache.org/bugzilla/show_bug.cgi?id=50823
---
 debian/patches/http_on_https_port.patch |  135 +++
 debian/patches/series   |1 +
 2 files changed, 136 insertions(+)
 create mode 100644 debian/patches/http_on_https_port.patch

diff --git a/debian/patches/http_on_https_port.patch b/debian/patches/http_on_https_port.patch
new file mode 100644
index 000..bf583ba
--- /dev/null
+++ b/debian/patches/http_on_https_port.patch
@@ -0,0 +1,135 @@
+Index: apache2-2.2.22/modules/ssl/ssl_engine_io.c
+===
+--- apache2-2.2.22.orig/modules/ssl/ssl_engine_io.c	2011-02-11 10:30:21.0 -0200
 apache2-2.2.22/modules/ssl/ssl_engine_io.c	2015-04-20 10:12:20.365864180 -0300
+@@ -853,12 +853,12 @@
+ /* Just use a simple request.  Any request will work for this, because
+  * we use a flag in the conn_rec->conn_vector now.  The fake request just
+  * gets the request back to the Apache core so that a response can be sent.
+- *
+- * To avoid calling back for more data from the socket, use an HTTP/0.9
+- * request, and tack on an EOS bucket.
++ * Since we use an HTTP/1.x request, we also have to inject the empty line
++ * that terminates the headers, or the core will read more data from the
++ * socket.
+  */
+ #define HTTP_ON_HTTPS_PORT \
+-"GET /" CRLF
++"GET / HTTP/1.0" CRLF
+ 
+ #define HTTP_ON_HTTPS_PORT_BUCKET(alloc) \
+ apr_bucket_immortal_create(HTTP_ON_HTTPS_PORT, \
+@@ -880,6 +880,7 @@
+ {
+ SSLConnRec *sslconn = myConnConfig(f->c);
+ apr_bucket *bucket;
++int send_eos = 1;
+ 
+ switch (status) {
+   case HTTP_BAD_REQUEST:
+@@ -889,11 +890,12 @@
+  "trying to send HTML error page");
+ ssl_log_ssl_error(APLOG_MARK, APLOG_INFO, sslconn->server);
+ 
+-sslconn->non_ssl_request = 1;
++sslconn->non_ssl_request = NON_SSL_SEND_HDR_SEP;
+ ssl_io_filter_disable(sslconn, f);
+ 
+ /* fake the request line */
+ bucket = HTTP_ON_HTTPS_PORT_BUCKET(f->c->bucket_alloc);
++send_eos = 0;
+ break;
+ 
+   default:
+@@ -901,9 +903,10 @@
+ }
+ 
+ APR_BRIGADE_INSERT_TAIL(bb, bucket);
+-bucket = apr_bucket_eos_create(f->c->bucket_alloc);
+-APR_BRIGADE_INSERT_TAIL(bb, bucket);
+-
++if (send_eos) {
++bucket = apr_bucket_eos_create(f->c->bucket_alloc);
++APR_BRIGADE_INSERT_TAIL(bb, bucket);
++}
+ return APR_SUCCESS;
+ }
+ 
+@@ -1345,6 +1348,13 @@
+ }
+ 
+ if (!inctx->ssl) {
++SSLConnRec *sslconn = myConnConfig(f->c);
++if (sslconn->non_ssl_request == NON_SSL_SEND_HDR_SEP) {
++apr_bucket *bucket = apr_bucket_immortal_create(CRLF, 2, 

Bug#692451: buildbot: New upstream version available: 0.8.7

2012-11-06 Thread Jonh Wendell
Package: buildbot
Version: 0.8.6p1-1
Severity: normal

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores)
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages buildbot depends on:
ii  adduser   3.113+nmu3
ii  dpkg  1.16.9
ii  libjs-sphinxdoc   1.1.3+dfsg-4
ii  python2.7.3~rc2-1
ii  python-jinja2 2.6-1
ii  python-migrate0.7.2-3
ii  python-sqlalchemy 0.7.8-1
ii  python-twisted-core   12.0.0-1
ii  python-twisted-web12.0.0-1
ii  python-twisted-words  12.0.0-1
ii  python2.6 2.6.8-0.2
ii  python2.7 2.7.3~rc2-2.1

Versions of packages buildbot recommends:
ii  buildbot-slave   0.8.6p1-1
ii  python-twisted-mail  12.0.0-1

Versions of packages buildbot suggests:
ii  git [git-core]  1:1.7.10.4-1
ii  subversion  1.6.17dfsg-4

-- Configuration Files:
/etc/default/buildmaster changed [not included]

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#417573: sbuild depends on grep-dctrl, which is a transition package

2007-04-03 Thread Jonh Wendell
Package: sbuild
Version: 0.53
Severity: minor

Bug reported on Ubuntu (http://launchpad.net/bugs/84183):

sbuild depends on grep-dctrl, which is a transition package, it should depends 
on dctrl-tools


-- System Information:
Debian Release: 4.0
  APT prefers feisty
  APT policy: (500, 'feisty')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.20-13-generic
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]