Bug#925254: gitlab: Failed to upgrade (google-api-client not installed)

2019-03-21 Thread Matthijs Möhlmann
Package: gitlab
Version: 11.8.2-3
Severity: important

Dear Maintainer,

I was trying to upgrade gitlab from 11.5.10 to the current version
(11.8.2-3) in unstable. Most required packages are coming from buster
with a few dependencies coming from unstable.

The output from apt is as follows:

Setting up gitlab (11.8.2-3) ...
fatal: not a git repository (or any of the parent directories): .git
fatal: not a git repository (or any of the parent directories): .git
fatal: not a git repository (or any of the parent directories): .git
fatal: not a git repository (or any of the parent directories): .git
Bundler could not find compatible versions for gem "google-api-client":
  In Gemfile:
google-api-client (~> 0.23)

fog-google (~> 1.8) was resolved to 1.8.2, which depends on
  google-api-client (~> 0.23.0)

Could not find gem 'google-api-client (~> 0.23.0)', which is required by gem
'fog-google (~> 1.8)', in any of the sources.
dpkg: error processing package gitlab (--configure):
 installed gitlab package post-installation script subprocess returned error 
exit status 1
Errors were encountered while processing:
 gitlab
E: Sub-process /usr/bin/dpkg returned an error code (1)

I have no experience with ruby and how I can fix this. If you need more
information please tell me and I'll try to provide it.

One last thing, I am very grateful for providing gitlab in Debian. This
must be an huge job with all the dependencies in ruby. Thank you!

Regards, Matthijs

-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (900, 'testing'), (800, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages gitlab depends on:
ii  asciidoctor1.5.8-1
ii  bc 1.07.1-2+b1
ii  bundler1.17.3-3
ii  bzip2  1.0.6-9
ii  dbconfig-pgsql 2.0.11
ii  debconf [debconf-2.0]  1.5.71
ii  gitlab-common  11.8.2-3
ii  gitlab-workhorse   7.6.0+debian-1+b20
ii  libjs-uglify   2.8.29-6
ii  lsb-base   10.2019031300
ii  nginx  1.14.2-2
ii  nginx-full [nginx] 1.14.2-2
ii  nodejs 10.15.2~dfsg-1
ii  openssh-client 1:7.9p1-9
ii  postfix [mail-transport-agent] 3.4.1-1
ii  postgresql-client  11+200
ii  postgresql-client-11 [postgresql-client]   11.2-2
ii  postgresql-client-9.6 [postgresql-client]  9.6.10-0+deb9u1
ii  postgresql-contrib 11+200
ii  rake   12.3.1-3
ii  redis-server   5:5.0.3-4
ii  ruby   1:2.5.1
ii  ruby-ace-rails-ap  4.1.1-1
ii  ruby-acts-as-taggable-on   6.0.0-3
ii  ruby-addressable   2.5.2-1
ii  ruby-akismet   2.0.0-1
ii  ruby-asana 0.8.1-2
ii  ruby-asciidoctor-plantuml  0.0.8-1
ii  ruby-attr-encrypted3.1.0-2
ii  ruby-babosa1.0.2-2
ii  ruby-base320.3.2-3
ii  ruby-batch-loader  1.2.2-1
ii  ruby-bcrypt-pbkdf  1.0.0-2
ii  ruby-bootstrap-form2.7.0-1
ii  ruby-browser   2.5.3-1
ii  ruby-carrierwave   1.3.1-1
ii  ruby-charlock-holmes   0.7.6-1
ii  ruby-chronic   0.10.2-3
ii  ruby-chronic-duration  0.10.6-1
ii  ruby-commonmarker  0.17.9-1
ii  ruby-connection-pool   2.2.2-1
ii  ruby-creole0.5.0-2
ii  ruby-default-value-for 3.1.1-3
ii  ruby-device-detector   1.0.1-2
ii  ruby-devise4.5.0-2
ii  ruby-devise-two-factor 3.0.3-1
ii  ruby-diffy 3.2.1-1
ii  ruby-discordrb-webhooks3.3.0-1
ii  ruby-doorkeeper4.4.2-1
ii  ruby-doorkeeper-openid-connect 1.5.2-1
ii  ruby-ed25519   1.2.4-1
ii  ruby-email-reply-trimmer   0.1.6-1
ii  ruby-escape-utils  1.2.1-1+b1
ii  ruby-excon 0.60.0-1
ii  ruby-faraday   0.13.1-2
ii 

Bug#913635: php7.3-common: Repeatable segfault in php7.3 when running Cacti poller since upgrade to 7.3

2018-11-14 Thread Matthijs Möhlmann
Package: php7.3-common
Version: 7.3.0~rc5-1
Followup-For: Bug #913635

Dear Maintainer,

It is also reproducible when running php7.3-fpm (using nginx as
frontend). I cannot install php7.3-fpm-dbgsym as it is not available on
amd64 architecture.

[ 2989.258352] php-fpm7.3[8102]: segfault at  ip 
562cd78d0616 sp 7fffc9c5cad8 error 7 in php-fpm7.3[562cd78a9000+269000]
[ 2989.258357] Code: 49 03 4e 08 f7 c6 00 ff 00 00 74 20 48 8b 10 40 80 fe 0a 
75 15 48 8d 42 08 f7 42 10 00 ff 00 00 74 0a 48 8b 52 08 ff 02 eb 02  02 48 
8b 10 8b 40 08 49 83 c7 20 48 89 11 89 41 08 c3 53 49 63

-- Package-specific info:
 Additional PHP 7.3 information 

 PHP @PHP_VERSION SAPI (php7.3query -S): 

 PHP 7.3 Extensions (php7.3query -M -v): 

 Configuration files: 
 /etc/php/7.3/mods-available/calendar.ini 
extension=calendar.so

 /etc/php/7.3/mods-available/ctype.ini 
extension=ctype.so

 /etc/php/7.3/mods-available/exif.ini 
extension=exif.so

 /etc/php/7.3/mods-available/fileinfo.ini 
extension=fileinfo.so

 /etc/php/7.3/mods-available/ftp.ini 
extension=ftp.so

 /etc/php/7.3/mods-available/gettext.ini 
extension=gettext.so

 /etc/php/7.3/mods-available/iconv.ini 
extension=iconv.so

 /etc/php/7.3/mods-available/pdo.ini 
extension=pdo.so

 /etc/php/7.3/mods-available/phar.ini 
extension=phar.so

 /etc/php/7.3/mods-available/posix.ini 
extension=posix.so

 /etc/php/7.3/mods-available/shmop.ini 
extension=shmop.so

 /etc/php/7.3/mods-available/sockets.ini 
extension=sockets.so

 /etc/php/7.3/mods-available/sysvmsg.ini 
extension=sysvmsg.so

 /etc/php/7.3/mods-available/sysvsem.ini 
extension=sysvsem.so

 /etc/php/7.3/mods-available/sysvshm.ini 
extension=sysvshm.so

 /etc/php/7.3/mods-available/tokenizer.ini 
extension=tokenizer.so


-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.18.0-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages php7.3-common depends on:
ii  libc6   2.27-8
ii  libssl1.1   1.1.1-2
ii  php-common  2:68
ii  ucf 3.0038

php7.3-common recommends no packages.

php7.3-common suggests no packages.

Versions of packages php7.3-cli depends on:
ii  libargon2-1  0~20171227-0.1
ii  libc62.27-8
ii  libedit2 3.1-20180525-1
ii  libmagic11:5.34-2
ii  libpcre2-8-0 10.32-3
ii  libsodium23  1.0.16-2
ii  libssl1.11.1.1-2
ii  libxml2  2.9.4+dfsg1-7+b2
ii  mime-support 3.61
ii  php7.3-json  7.3.0~rc5-1
ii  php7.3-opcache   7.3.0~rc5-1
ii  php7.3-readline  7.3.0~rc5-1
ii  tzdata   2018g-1
ii  ucf  3.0038
ii  zlib1g   1:1.2.11.dfsg-1

Versions of packages php7.3-cli suggests:
pn  php-pear  

Versions of packages php7.3-fpm depends on:
ii  libapparmor12.13.1-3+b1
ii  libargon2-1 0~20171227-0.1
ii  libc6   2.27-8
ii  libmagic1   1:5.34-2
ii  libpcre2-8-010.32-3
ii  libsodium23 1.0.16-2
ii  libssl1.1   1.1.1-2
ii  libsystemd0 239-11
ii  libxml2 2.9.4+dfsg1-7+b2
ii  mime-support3.61
ii  php7.3-cli  7.3.0~rc5-1
ii  php7.3-json 7.3.0~rc5-1
ii  php7.3-opcache  7.3.0~rc5-1
ii  tzdata  2018g-1
ii  ucf 3.0038
ii  zlib1g  1:1.2.11.dfsg-1

Versions of packages php7.3-fpm suggests:
pn  php-pear  

-- no debconf information



Bug#907134: postgresql-10: Backport postgresql-10 to stretch?

2018-08-24 Thread Matthijs Möhlmann
Package: postgresql-10
Version: 10.5-1
Severity: wishlist

Dear Maintainer,

Do you have any plans to backport postgresql-10 to stretch-backports?

Regards, Matthijs

-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.17.0-3-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages postgresql-10 depends on:
ii  libc6 2.27-5
ii  libgssapi-krb5-2  1.16-2
ii  libicu60  60.2-6
ii  libldap-2.4-2 2.4.46+dfsg-5
ii  libpam0g  1.1.8-3.8
ii  libpq510.5-1
ii  libselinux1   2.8-1+b1
ii  libssl1.1 1.1.1~~pre9-1
ii  libsystemd0   239-7
ii  libuuid1  2.32.1-0.1
ii  libxml2   2.9.4+dfsg1-7+b1
ii  libxslt1.11.1.32-2
ii  locales   2.27-5
ii  postgresql-client-10  10.5-1
ii  postgresql-common 193
ii  ssl-cert  1.0.39
ii  tzdata2018e-1
ii  zlib1g1:1.2.11.dfsg-1

Versions of packages postgresql-10 recommends:
ii  sysstat  12.0.1-1

Versions of packages postgresql-10 suggests:
pn  locales-all  

-- no debconf information



Bug#900970: zabbix: New upstream version

2018-06-08 Thread Matthijs Möhlmann
On 07/06/2018 15:39, Dmitry Smirnov wrote:
> On Thursday, 7 June 2018 10:10:16 PM AEST Matthijs Möhlmann wrote:
>> There is a new upstream version available. Version 3.4.
> We ship LTS release, which is 3.0 at the moment.
>
> See
>
>   https://www.zabbix.com/life_cycle_and_release_policy
>
Thanks, so the next version will be 4.0. Fine with me.

Regards, Matthijs



signature.asc
Description: OpenPGP digital signature


Bug#901059: zabbix-agent: zabbix_sender does not bypass proxy

2018-06-08 Thread Matthijs Möhlmann
Package: zabbix-agent
Version: 1:3.0.17+dfsg-1
Severity: normal

Dear Maintainer,

We have currently the following situation:
 * hostA behind a firewall
 * proxy behind a firewall

 * server

hostA is configured to use a proxy, this proxy gets the configuration
from the server and hostA connects to the proxy. This is all working
fine.

We have a seperate server which handles the backups for hostA and when a
backup succeeds or fails we send a message to our monitoring server. We
do that with the command:
zabbix_sender -z server -s hostA -k backup.result[job] -o T

That command fails with:
info from server: "processed: 0; failed: 1; total: 1; seconds spent: 0.40"
sent: 1; skipped: 0; total: 1

I expect it to succeed and to see the value in zabbix.

It looks like when hostA is configured to use a proxy then 'server' wont
accept any connections for hostA but wants it from the proxy.

Regards, Matthijs

-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.16.0-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages zabbix-agent depends on:
ii  adduser  3.117
ii  libc62.27-3
ii  libcurl3-gnutls  7.60.0-2
ii  libgnutls30  3.5.18-1
ii  libldap-2.4-22.4.46+dfsg-5
ii  lsb-base 9.20170808
ii  pciutils 1:3.5.2-1
ii  ucf  3.0038

Versions of packages zabbix-agent recommends:
ii  usbutils  1:007-4+b1

Versions of packages zabbix-agent suggests:
ii  logrotate  3.11.0-0.1

-- no debconf information



Bug#900970: zabbix: New upstream version

2018-06-07 Thread Matthijs Möhlmann
Source: zabbix
Version: 1:3.0.17+dfsg-1
Severity: wishlist

Dear Maintainer,

There is a new upstream version available. Version 3.4.

I would like to see this new version in debian.

Regards, Matthijs

-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.16.0-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#895222: ITP: howardhinnant-date -- date and time library based on the C++11/14/17 header

2018-04-08 Thread Matthijs Möhlmann
Package: wnpp
Severity: wishlist
Owner: Matthijs Möhlmann <matth...@cacholong.nl>

* Package name: howardhinnant-date
  Version : 2.4.1
  Upstream Author : Howard Hinnant
* URL : https://howardhinnant.github.io/date/date.html
* License : MIT
  Programming Lang: C++
  Description : date and time library based on the C++11/14/17  
header

"date.h" is a header-only library which builds upon . It adds some new
duration types, and new time_point types. It also adds "field" types such as
year_month_day which is a struct {year, month, day}. And it provides convenient
means to convert between the "field" types and the time_point types.

tz.h" / "tz.cpp" are a timezone library built on top of the "date.h" library.
This timezone library is a complete parser of the IANA timezone database. It
provides for an easy way to access all of the data in this database, using the
types from "date.h" and . The IANA database also includes data on leap
seconds, and this library provides utilities to compute with that information
as well.

"iso_week.h" is a header-only library built on top of the "date.h" library
which implements the ISO week date calendar.

"julian.h" is a header-only library built on top of the "date.h" library which
implements a proleptic Julian calendar which is fully interoperable with
everything above.

"islamic.h" is a header-only library built on top of the "date.h" library which
implements a proleptic Islamic calendar which is fully interoperable with
everything above.

This is a C++ library which implements all relevant parts to date. Including the
timezone data and leap seconds. Further more I intend to package the library
sqlpp11 and the connector libraries.


Bug#730313: racoon and ipcomp not working for small packets

2013-11-26 Thread Matthijs Möhlmann
Ok, I installed two FreeBSD VM's so that I can test racoon with it.

There it works, so this could mean that the kernel is doing something
wrong here or
racoon, but I'm suspecting the kernel is wrong here.

Regards, Matthijs


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#730313: racoon and ipcomp not working for small packets

2013-11-24 Thread Matthijs Möhlmann
Hello,

Some more information, find attached the tcpdump on each machine, both
with the following commandline:
tcpdump -i eth0 -s 65535 -w filename proto 50 or proto 51 or proto 108

The information needed for the decryption is fetched using:
ip xfrm state

I have done this with both racoon and manual keying to be able to
investigate this issue a bit further.

Regards, Matthijs


ipsec1.racoon.pcap
Description: Binary data


ipsec1.setkey.pcap
Description: Binary data


ipsec2.racoon.pcap
Description: Binary data


ipsec2.setkey.pcap
Description: Binary data
src 192.168.5.94 dst 192.168.5.95
proto comp spi 0x4ec3 reqid 0 mode transport
replay-window 0
comp deflate (ERROR truncated)
sel src 0.0.0.0/0 dst 0.0.0.0/0
src 192.168.5.94 dst 192.168.5.95
proto esp spi 0x0486197e reqid 0 mode transport
replay-window 4
auth-trunc hmac(sha1) 0xbda5d966ec5b95d8bdf06c8485f418afe74f3bf6 96
enc cbc(aes) 
0x90d6ed708142f7b026a87429d9b1f97e1576fb4e5b5ad1c12de83f4cdf59c5c9
sel src 0.0.0.0/0 dst 0.0.0.0/0
src 192.168.5.94 dst 192.168.5.95
proto ah spi 0x0dc1d500 reqid 0 mode transport
replay-window 4
auth-trunc hmac(sha1) 0xa95ffc304a87aaf0adba46a324794205b6b0ecc6 96
sel src 0.0.0.0/0 dst 0.0.0.0/0
src 192.168.5.95 dst 192.168.5.94
proto comp spi 0xdbc4 reqid 0 mode transport
replay-window 0
comp deflate (ERROR truncated)
sel src 0.0.0.0/0 dst 0.0.0.0/0
src 192.168.5.95 dst 192.168.5.94
proto esp spi 0x0987761d reqid 0 mode transport
replay-window 4
auth-trunc hmac(sha1) 0x5033d0023081c9df0023dbad5e1052fe4a2db055 96
enc cbc(aes) 
0xaaacb89089097705e58b927f68e74b738d4ef475833e1b5b9e257befa69212e0
sel src 0.0.0.0/0 dst 0.0.0.0/0
src 192.168.5.95 dst 192.168.5.94
proto ah spi 0x0df15d1f reqid 0 mode transport
replay-window 4
auth-trunc hmac(sha1) 0xc65840e9de72e6dd82eede5c96779af22ebfd132 96
sel src 0.0.0.0/0 dst 0.0.0.0/0
src 192.168.5.95 dst 192.168.5.94
proto comp spi 0x0200 reqid 0 mode transport
replay-window 0
comp deflate 0x
sel src 0.0.0.0/0 dst 0.0.0.0/0
src 192.168.5.94 dst 192.168.5.95
proto comp spi 0x0100 reqid 0 mode transport
replay-window 0
comp deflate 0x
sel src 0.0.0.0/0 dst 0.0.0.0/0
src 192.168.5.95 dst 192.168.5.94
proto esp spi 0x5fb5 reqid 0 mode transport
replay-window 0
enc cbc(aes) 
0x3132333435363738393031323334353637383930313233343536373839303132
sel src 0.0.0.0/0 dst 0.0.0.0/0
src 192.168.5.94 dst 192.168.5.95
proto esp spi 0x3d55 reqid 0 mode transport
replay-window 0
enc cbc(aes) 
0x3132333435363738393031323334353637383930313233343536373839303132
sel src 0.0.0.0/0 dst 0.0.0.0/0
src 192.168.5.95 dst 192.168.5.94
proto ah spi 0x5fb4 reqid 0 mode transport
replay-window 0
auth-trunc hmac(sha1) 0x3132333435363738393031323334353637383930 96
sel src 0.0.0.0/0 dst 0.0.0.0/0
src 192.168.5.94 dst 192.168.5.95
proto ah spi 0x3d54 reqid 0 mode transport
replay-window 0
auth-trunc hmac(sha1) 0x3132333435363738393031323334353637383930 96
sel src 0.0.0.0/0 dst 0.0.0.0/0


Bug#730313: racoon and ipcomp not working for small packets

2013-11-23 Thread Matthijs Möhlmann
Package: racoon
Version: 1:0.8.0-14
Severity: important

When enabling ipcomp with the following configuration in
/etc/ipsec-tools.conf:
spdadd 192.168.5.95 192.168.5.94 any -P out ipsec
ipcomp/transport//use
esp/transport//require
ah/transport//require;
spdadd 192.168.5.95 192.168.5.94 any -P in ipsec
ipcomp/transport//use
esp/transport//require
ah/transport//require;

Now when executing the following line:
root@ipsec1:~# ping -c 4 192.168.5.95
PING 192.168.5.95 (192.168.5.95) 56(84) bytes of data.
^C
--- 192.168.5.95 ping statistics ---
4 packets transmitted, 0 received, 100% packet loss, time 3000ms

Now increasing the size of the ping packet:
root@ipsec1:~# ping -c 4 -s 300 192.168.5.95
PING 192.168.5.95 (192.168.5.95) 300(328) bytes of data.
308 bytes from 192.168.5.95: icmp_req=1 ttl=64 time=0.955 ms
308 bytes from 192.168.5.95: icmp_req=2 ttl=64 time=1.10 ms
308 bytes from 192.168.5.95: icmp_req=3 ttl=64 time=0.916 ms
308 bytes from 192.168.5.95: icmp_req=4 ttl=64 time=0.925 ms

--- 192.168.5.95 ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3007ms
rtt min/avg/max/mdev = 0.916/0.976/1.108/0.077 ms

I have also tested this without racoon, by putting the ah, esp and
ipcomp information in /etc/ipsec-tools.conf, then I am able to ping also
with small packets.

Looking at tcpdump, I see that for small packets no compression is
applied, that's ok according to bug #301466. I do not understand why the
traffic isn't sent back.

If you need more information, please ask.

racoon.conf
# Also read the Linux IPSEC Howto up at
# http://www.ipsec-howto.org/t1.html
log info;
path certificate /etc/racoon/certs;

remote 192.168.5.95 {

# Passive off, we will connect automatically
passive off;

# Allow only main mode
exchange_mode main;

# Verification (using x509 certificates)
my_identifier asn1dn;
peers_identifier asn1dn;
verify_identifier on;
verify_cert on;
ca_type x509 cacert.pem;
certificate_type x509 client.crt client.key;

# Settings
ike_frag on;
nat_traversal off;
generate_policy on;
dpd_delay 10; # dead peer detection

# Proposal
proposal {
encryption_algorithm aes 256;
hash_algorithm sha1;
authentication_method rsasig;
dh_group 5;
}
}

sainfo anonymous {
encryption_algorithm aes 256;
authentication_algorithm hmac_sha1;
compression_algorithm deflate;
}

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.11-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages racoon depends on:
ii  adduser3.113+nmu3
ii  debconf [debconf-2.0]  1.5.52
ii  ipsec-tools1:0.8.0-14
ii  libc6  2.17-96
ii  libcomerr2 1.42.8-1
ii  libgssapi-krb5-2   1.11.3+dfsg-3
ii  libk5crypto3   1.11.3+dfsg-3
ii  libkrb5-3  1.11.3+dfsg-3
ii  libldap-2.4-2  2.4.31-1+nmu2+b1
ii  libpam0g   1.1.3-10
ii  libssl1.0.01.0.1e-4
ii  perl   5.18.1-4

racoon recommends no packages.

racoon suggests no packages.

-- Configuration Files:
/etc/racoon/psk.txt [Errno 13] Permission denied: u'/etc/racoon/psk.txt'
/etc/racoon/racoon.conf changed [not included]

-- debconf information:
* racoon/config_mode: direct


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#700850: Please add resolvconf dpkg-event hook script

2013-08-08 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 08/07/2013 11:29 PM, Marc Haber wrote:
 On Wed, Aug 07, 2013 at 10:42:35PM +0200, Matthijs Möhlmann wrote:
 Is the event hook location still: 
 /usr/lib/resolvconf/dpkg-event.d/pdns-recursor?
 
 You might want to snarf some code from the bind9 package, which to
 my knowledge even asks via debconf whether one wants resolvconf 
 integration.
 
 Greetings Marc
 

That's correct, I've checked the bind9 package and also read the
README from resolvconf.

The script in a previous reply to this bug is correct so I go ahead
and install it.

According to the documentation it only gets called when resolvconf is
installed or removed.

Regards,
Matthijs

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with Icedove - http://www.enigmail.net/
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=Rs1R
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#700850: [Pkg-pdns-maintainers] Bug#700850: Please add resolvconf dpkg-event hook script

2013-08-08 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 08/08/2013 07:56 PM, Matthijs Möhlmann wrote:
 On 08/07/2013 11:29 PM, Marc Haber wrote:
 On Wed, Aug 07, 2013 at 10:42:35PM +0200, Matthijs Möhlmann
 wrote:
 Is the event hook location still: 
 /usr/lib/resolvconf/dpkg-event.d/pdns-recursor?
 
 You might want to snarf some code from the bind9 package, which
 to my knowledge even asks via debconf whether one wants
 resolvconf integration.
 
 Greetings Marc
 
 
 That's correct, I've checked the bind9 package and also read the 
 README from resolvconf.
 
 The script in a previous reply to this bug is correct so I go
 ahead and install it.
 
 According to the documentation it only gets called when resolvconf
 is installed or removed.
 
 Regards, Matthijs

Ok, after installing the package with the pdns-recursor script
installed in /usr/lib/resolvconf/dpkg-event.d:

Now I tried to purge the resolvconf package using the following command:
aptitude purge resolvconf

The command never returns, a zombie process was created and nothing
else happened then.

Thomas, if you need more information don't hesitate to ask.

I will tag this bug wontfix until above is fixed in resolvconf.

Regards,
Matthijs
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with Icedove - http://www.enigmail.net/
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=nLCX
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#700850: Please add resolvconf dpkg-event hook script

2013-08-07 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello Thomas,

I have a few questions here:

Is the event hook location still:
/usr/lib/resolvconf/dpkg-event.d/pdns-recursor?

If I install the resolvconf package I do not have the dpkg-event.d
directory.

root@monster # dpkg -l resolvconf
Desired=Unknown/Install/Remove/Purge/Hold
|
Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
|/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad)
||/ Name   Version  Architecture Description
+++-==---=
ii  resolvconf 1.74 all  name server information
handler

root@monster # ls /usr/lib/resolvconf/dpkg-event.d
ls: cannot access /usr/lib/resolvconf/dpkg-event.d: No such file or
directory

Last question:
I assume that the following is enough for pdns-recursor as the init
script does interact with pdns-recursor:

#!/bin/bash
#
# Update resolvconf

force_reload_pdns_recursor() {
if which invoke-rc.d /dev/null 21 ; then
invoke-rc.d pdns-recursor force-reload
elif [ -x /etc/init.d/pdns-recursor ] ; then
/etc/init.d/pdns-recursor force-reload
fi
}

case $1 in
install|remove) force_reload_pdns_recursor ;;
esac

# Indicate succes
exit 0

Regards,
Matthijs
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with Icedove - http://www.enigmail.net/
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=RM1J
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#686823: ganeti2: blktap driver does not work on newer xen (= 4.0)

2012-09-06 Thread Matthijs Möhlmann
Package: ganeti2
Version: 2.5.2-1
Severity: important

Dear Maintainer,

I installed ganeti2 and decided to use the blktap driver as backend.
After that I created a VM and tried to start it. It didn't startup and
after some investigation I found out it timed out on the block device.

Some more investigation and saw the new blktap2 driver options in Xen, I
applied them to the vm configuration and startup of the vm succeeded
now.

Please see the following:
http://serverfault.com/questions/390373/xen-4-1-host-dom0-with-blktap-disks-tapaio-not-connecting

And:
http://wiki.xen.org/wiki/Blktap2

I looked into the source code and found:
hypervisor/hv_xen.py:341constants.FD_BLKTAP: tap:aio,

Changing tap:aio to tap2:tapdisk fixed the situation.

I hope this is urgent enough for inclusion into wheezy as blktap is now
unusable.

Regards, Matthijs

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages ganeti2 depends on:
ii  bridge-utils   1.5-4
ii  iproute20120521-3
ii  iputils-arping 3:20101006-3
ii  libjs-jquery   1.7.2+debian-2.1
ii  lvm2   2.02.95-4
ii  openssh-client 1:6.0p1-3
ii  openssh-server 1:6.0p1-3
ii  openssl1.0.1c-4
ii  python 2.7.3-2
ii  python-openssl 0.13-2
ii  python-paramiko1.7.7.1-3
ii  python-pycurl  7.19.0-5
ii  python-pyinotify   0.9.3-1.1
ii  python-pyparsing   1.5.6+dfsg1-2
ii  python-simplejson  2.6.1-1
ii  python-support 1.0.15
ii  socat  1.7.1.3-1.4

Versions of packages ganeti2 recommends:
pn  drbd8-utils  none
ii  ganeti-instance-debootstrap  0.11-1
pn  ndisc6   none
pn  qemu-kvm | xen-linux-system-2.6.32-5-xen-amd64 | xen-linux-system-2  none

Versions of packages ganeti2 suggests:
pn  drbd8-module-source  none

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#672550: offer to co-maintain

2012-05-13 Thread Matthijs Möhlmann
On 12-mei-2012, at 00:36, Marc Haber wrote:

 Package: pdns
 Version: 3.1-1
 Severity: wishlist
 
 Hi Matthijs,
 
 I am currently working a lot with PowerDNS, and am in very close touch
 with Bert and Peter during my work hours. At my current work place, we
 have rolled Debian packages of PowerDNS 3.1 into production and I am
 currently working to get them compile on sid/wheezy (currently blocked
 by http://wiki.powerdns.com/trac/ticket/458).
 
 My github repository is at https://github.com/Zugschlus/debian-pdns.
 Feel free to pull from there, but the package is at the moment not in
 a compiling shape.
 
 I would like to offer co-maintenance of PowerDNS in Debian. We can
 work like:
 
 (1) You pull, compile, test and upload.
 (2) You give me write access to your github repository and I push
 there. You compile, test and upload.
 (3) You allow me to add myself to uploaders and let me upload to
 Debian directly. We both compile, test and upload whenever one
 finds the time.
 
 I would prefer a combination of (2) and (3) ;-)
 
 I also offer to do bug triaging if I am in a position to actually
 change things in the package.
 
 Please advise whether you want me to help.
 
 Greetings
 Marc

Hello Marc,

I was already planning for sending an RFH, as I have not that much time
available lately. But this is even better.

I agree with option 3.

Maybe it's a good idea to move the git repository to git.debian.org. As that
is the official? location for debian packages. That the package repository
is at github is due to some historical reasons.

And would you like to help with pdns and pdns-recursor? That would be
nice too.

Thank you very much for the updates on the bug reports!

Regards,

Matthijs Möhlmann




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#650802: RM: libpqxx -- NVIU; libpqxx3 is the successor of libpqxx, so this package can be removed from the archive.

2011-12-03 Thread Matthijs Möhlmann
Package: ftp.debian.org
Severity: normal

Please remove this package, no need to have that available in the
archive if there is a newer version.

This version is maintained by: Marcin Kulisz (kuLa) deb...@kulisz.net
I mentor his uploads to debian.

Matthijs Möhlmann



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#632426: [INTL:ko] Korean debconf template translation for pdns

2011-11-06 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Any progress on this bug?

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=w25z
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#632426: [INTL:ko] Korean debconf template translation for pdns

2011-08-08 Thread Matthijs Möhlmann
Can you attach the translation file ? It's not attached to this bug report.

Regards,

Matthijs Möhlmann




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#623036: pdns-backend-mysql: pdns fails to start: Unable to load module '/usr/lib/powerdns/libgmysqlbackend.so'

2011-05-09 Thread Matthijs Möhlmann
reopen 623036
stop

Hello,

I was under the impression that this was caused by an ABI change in the mysql
library.

Reopening and under investigation.

Regards,

Matthijs Möhlmann




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#207531: [Pkg-openldap-devel] Bug#207531: Default protocol version in libldap libraries

2011-04-16 Thread Matthijs Möhlmann
tag 207531 + wontfix
thanks

I agree with Russ Allbery, don't diverge from upstream on something this
fundemental.

Tagging won't fix for now.

Regards,

Matthijs Möhlmann




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#622727: libpqxx3-dev: Memleak in pqxx

2011-04-14 Thread Matthijs Möhlmann
Package: libpqxx3-dev
Version: 3.0.2-1
Severity: normal

The following piece of code gives me a memleak (valgrind report)

#include pqxx/pqxx

int main(int argc, char **argv) {

pqxx::connection t(host=127.0.0.1 username=changeme password=changeme 
dbname=changeme connect_timeout=10);
pqxx::work work(t, transaction);
work.abort();
}

Compile with:
g++ -o main main.cpp -lpqxx

Valgrind output:
==6329== Memcheck, a memory error detector
==6329== Copyright (C) 2002-2010, and GNU GPL'd, by Julian Seward et al.
==6329== Using Valgrind-3.6.0.SVN-Debian and LibVEX; rerun with -h for 
copyright info
==6329== Command: ./main
==6329== 
==6329== 
==6329== HEAP SUMMARY:
==6329== in use at exit: 121,024 bytes in 2,643 blocks
==6329==   total heap usage: 4,033 allocs, 1,390 frees, 924,195 bytes allocated
==6329== 
==6329== 300 (60 direct, 240 indirect) bytes in 1 blocks are definitely lost in 
loss record 228 of 277
==6329==at 0x4C244E8: malloc (vg_replace_malloc.c:236)
==6329==by 0x58FF3FC: nss_parse_service_list (nsswitch.c:622)
==6329==by 0x58FFBED: __nss_database_lookup (nsswitch.c:164)
==6329==by 0x8D0434F: ???
==6329==by 0x8D04FA4: ???
==6329==by 0x58BFADC: getpwuid_r@@GLIBC_2.2.5 (getXXbyYY_r.c:253)
==6329==by 0x5DBD648: ??? (in /usr/lib/libpq.so.5.3)
==6329==by 0x5DA9D47: ??? (in /usr/lib/libpq.so.5.3)
==6329==by 0x5DB8DEE: ??? (in /usr/lib/libpq.so.5.3)
==6329==by 0x5DBA391: ??? (in /usr/lib/libpq.so.5.3)
==6329==by 0x5DAACB5: PQconnectPoll (in /usr/lib/libpq.so.5.3)
==6329==by 0x5DABDAD: ??? (in /usr/lib/libpq.so.5.3)
==6329== 
==6329== LEAK SUMMARY:
==6329==definitely lost: 60 bytes in 1 blocks
==6329==indirectly lost: 240 bytes in 10 blocks
==6329==  possibly lost: 0 bytes in 0 blocks
==6329==still reachable: 120,724 bytes in 2,632 blocks
==6329== suppressed: 0 bytes in 0 blocks
==6329== Reachable blocks (those to which a pointer was found) are not shown.
==6329== To see them, rerun with: --leak-check=full --show-reachable=yes
==6329== 
==6329== For counts of detected and suppressed errors, rerun with: -v
==6329== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 8 from 6)

Additional information:
g++-4.5 (latest from debian installed)

Regards,

Matthijs Möhlmann

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.38-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages libpqxx3-dev depends on:
ii  libpq-dev 9.0.3-1+b1 header files for libpq5 (PostgreSQ
ii  libpqxx-3.0   3.0.2-1C++ library to connect to PostgreS
ii  pkg-config0.25-1.1   manage compile and link flags for 

libpqxx3-dev recommends no packages.

Versions of packages libpqxx3-dev suggests:
pn  libpqxx3-doc  none (no description available)

-- no debconf information



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#622728: libpqxx3-dev: New upstream version available (3.1)

2011-04-14 Thread Matthijs Möhlmann
Package: libpqxx3-dev
Version: 3.0.2-1
Severity: wishlist

A new upstream version is available. Please package.

Regards,

Matthijs Möhlmann

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.38-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages libpqxx3-dev depends on:
ii  libpq-dev 9.0.3-1+b1 header files for libpq5 (PostgreSQ
ii  libpqxx-3.0   3.0.2-1C++ library to connect to PostgreS
ii  pkg-config0.25-1.1   manage compile and link flags for 

libpqxx3-dev recommends no packages.

Versions of packages libpqxx3-dev suggests:
pn  libpqxx3-doc  none (no description available)

-- no debconf information



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#621743: libtool: Failed to build package openldap with base_compile+= error. (shell == dash)

2011-04-11 Thread Matthijs Möhlmann
On Apr 11, 2011, at 9:54 PM, Ralf Wildenhues wrote:

 Hello Matthijs,
 
 * Matthijs Möhlmann wrote on Mon, Apr 11, 2011 at 09:05:58AM CEST:
 On Apr 8, 2011, at 8:00 PM, Ralf Wildenhues wrote:
 * Matthijs Möhlmann wrote on Fri, Apr 08, 2011 at 04:00:32PM CEST:
 /bin/sh ../../libtool  --mode=compile cc -Wall -g -D_FILE_OFFSET_BITS=64 
 -D_GNU_SOURCE -O2 -I../../include 
 -I/home/matthijs/debpkg/openldap/t/openldap-2.4.25/include 
 -DLBER_LIBRARY -c 
 /home/matthijs/debpkg/openldap/t/openldap-2.4.25/libraries/liblber/assert.c
 eval: 1: base_compile+= cc: not found
 eval: 1: base_compile+= -Wall: not found
 
 This can be reproduced when setting the sh shell to dash, when I set it
 to /bin/bash everything is fine and the build goes well.
 
 I'm not sure if this is an error on my part and that I have to fix it.
 
 This usually happens if configure has chosen bash as $CONFIG_SHELL, but
 somehow /bin/sh is then later put as SHELL in the Makefile.
 
 I see in
 build/top.mk:
 SHELL = /bin/sh
 
 Well, try removing that.  If there's no SHELL initialization left in the
 Makefile or included files, add
  SHELL = @SHELL@
 
 to Makefile.in and rebuild.  I'm assuming that top.mk is somehow
 included (directly or indirectly) in Makefile or GNUmakefile?
 
 And the aclocal.m4 contains lines like:
 # Check that we are running under the correct shell.
 SHELL=${CONFIG_SHELL-/bin/sh}
 
 configure.in does not contain CONFIG_SHELL or SHELL variable.
 
 I've searched through the Makefile.in files, no explicit setting to /bin/bash
 or /bin/sh or any other shell. Maybe I'm overlooking something.
 
 Any idea how to debug this? (I now got also bug #621925)
 
 See above.  If that doesn't help, can you point us to a source tree of
 the exact project and version?
 
 Thanks,
 Ralf

Hello Ralf,

Gotcha! That fixed the problem.
Changed build/top.mk:
SHELL = @SHELL@ instead of /bin/sh and the compile went ok.

I'll contact upstream and try to get this fixed.

Regards,

Matthijs Möhlmann




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#621743: libtool: Failed to build package openldap with base_compile+= error. (shell == dash)

2011-04-11 Thread Matthijs Möhlmann
On Apr 8, 2011, at 8:00 PM, Ralf Wildenhues wrote:

 Hello Matthijs,
 
 * Matthijs Möhlmann wrote on Fri, Apr 08, 2011 at 04:00:32PM CEST:
 /bin/sh ../../libtool  --mode=compile cc -Wall -g -D_FILE_OFFSET_BITS=64 
 -D_GNU_SOURCE -O2 -I../../include 
 -I/home/matthijs/debpkg/openldap/t/openldap-2.4.25/include 
 -DLBER_LIBRARY -c 
 /home/matthijs/debpkg/openldap/t/openldap-2.4.25/libraries/liblber/assert.c
 eval: 1: base_compile+= cc: not found
 eval: 1: base_compile+= -Wall: not found
 
 This can be reproduced when setting the sh shell to dash, when I set it
 to /bin/bash everything is fine and the build goes well.
 
 I'm not sure if this is an error on my part and that I have to fix it.
 
 This usually happens if configure has chosen bash as $CONFIG_SHELL, but
 somehow /bin/sh is then later put as SHELL in the Makefile.
 
 Does your configure.ac or any included macro files contain explicit
 overrides of $SHELL or $CONFIG_SHELL?  Does any of your Makefile.am
 files (or Makefile.in if you don't use automake) explicitly set SHELL
 (rather than using @SHELL@ from configure)?
 
 If /bin/sh is used during configure's tests, then the generated libtool
 script will not use '+='.
 
 Hope that helps.
 
 Cheers,
 Ralf


Hello Ralf,

I see in
build/top.mk:
SHELL = /bin/sh

And the aclocal.m4 contains lines like:
# Check that we are running under the correct shell.
SHELL=${CONFIG_SHELL-/bin/sh}

configure.in does not contain CONFIG_SHELL or SHELL variable.

I've searched through the Makefile.in files, no explicit setting to /bin/bash
or /bin/sh or any other shell. Maybe I'm overlooking something.

Any idea how to debug this? (I now got also bug #621925)

Regards,

Matthijs Möhlmann




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#621743: libtool: Failed to build package openldap with base_compile+= error. (shell == dash)

2011-04-08 Thread Matthijs Möhlmann
Package: libtool
Version: 2.4-2
Severity: important

After I updated libtool this morning I couldn't compile openldap
anymore.

The code can easily be checked out from svn:
svn://svn.debian.org/pkg-openldap/openldap/trunk/

I got the following error:

  Entering subdirectory liblber
make[3]: Entering directory 
`/home/matthijs/debpkg/openldap/t/openldap-2.4.25/debian/build/libraries/liblber'
rm -f version.c
/home/matthijs/debpkg/openldap/t/openldap-2.4.25/build/mkversion -v 2.4.25 
liblber.la  version.c
/bin/sh ../../libtool  --mode=compile cc -Wall -g -D_FILE_OFFSET_BITS=64 
-D_GNU_SOURCE -O2 -I../../include 
-I/home/matthijs/debpkg/openldap/t/openldap-2.4.25/include -DLBER_LIBRARY 
-c /home/matthijs/debpkg/openldap/t/openldap-2.4.25/libraries/liblber/assert.c
eval: 1: base_compile+= cc: not found
eval: 1: base_compile+= -Wall: not found
eval: 1: base_compile+= -g: not found
eval: 1: base_compile+= -D_FILE_OFFSET_BITS=64: not found
eval: 1: base_compile+= -D_GNU_SOURCE: not found
eval: 1: base_compile+= -O2: not found
eval: 1: base_compile+= -I../../include: not found
eval: 1: base_compile+= 
-I/home/matthijs/debpkg/openldap/t/openldap-2.4.25/include: not found
eval: 1: base_compile+= -DLBER_LIBRARY: not found
eval: 1: base_compile+= -c: not found
libtool: compile: you must specify a compilation command
libtool: compile: Try `libtool --help --mode=compile' for more information.
make[3]: *** [assert.lo] Error 1
make[3]: Leaving directory 
`/home/matthijs/debpkg/openldap/t/openldap-2.4.25/debian/build/libraries/liblber'
make[2]: *** [all-common] Error 1
make[2]: Leaving directory 
`/home/matthijs/debpkg/openldap/t/openldap-2.4.25/debian/build/libraries'
make[1]: *** [all-common] Error 1
make[1]: Leaving directory 
`/home/matthijs/debpkg/openldap/t/openldap-2.4.25/debian/build'
make: *** [build-stamp] Error 2
dpkg-buildpackage: error: debian/rules build gave error exit status 2

This can be reproduced when setting the sh shell to dash, when I set it
to /bin/bash everything is fine and the build goes well.

I'm not sure if this is an error on my part and that I have to fix it.

Some additional information:
Before building openldap I run libtoolize:
/usr/bin/libtoolize --copy --force

If more information is needed, don't hesitate to ask.

Regards,

Matthijs Möhlmann

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.38-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libtool depends on:
ii  autotools-dev 20100122.1 Update infrastructure for config.{
ii  cpp   4:4.5.2-5  The GNU C preprocessor (cpp)
ii  file  5.04-5 Determines file type using magic
ii  gcc [c-compiler]  4:4.5.2-5  The GNU C compiler
ii  gcc-4.4 [c-compiler]  4.4.5-15   The GNU C compiler
ii  gcc-4.5 [c-compiler]  4.5.2-8The GNU C compiler
ii  libc6-dev [libc-dev]  2.11.2-13  Embedded GNU C Library: Developmen

Versions of packages libtool recommends:
ii  libltdl-dev   2.4-2  A system independent dlopen wrappe

Versions of packages libtool suggests:
ii  autoconf  2.67-2 automatic configure script builder
ii  automake [automaken]  1:1.11.1-1 A tool for generating GNU Standard
pn  gcj   none (no description available)
pn  gfortran | fortran95-compiler none (no description available)
pn  libtool-doc   none (no description available)

-- no debconf information



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#616164: Notify ubuntu

2011-03-29 Thread Matthijs Möhlmann
Hi Dave,

Thanks for the patch.
There is still another commit for this patch in the upstream cvs. Can you apply
that in Ubuntu ?

http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/main.c.diff?r1=1.278r2=1.279hideattic=1sortbydate=0

Our release team notified me about the extra addition.

Regards,

Matthijs Möhlmann




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#614569: slapd: Dist-Upgrade Lenny-Squeeze: syncreplication w/ incomplete objects fails

2011-03-28 Thread Matthijs Möhlmann
Hi all,

Cc'ing my fellow maintainers.

To fix this bug I can add simply -s to the slapadd in the function 
load_databases.

The -s option disables the schemachecking. But I'm not sure if this is a good 
solution
to fix the upgrade procedure.

Maybe it's better to look at the configuration and check if it's a slave and 
then add this
option.

Any comments?

Regards,

Matthijs Möhlmann


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#614569: [Pkg-openldap-devel] slapd: Dist-Upgrade Lenny-Squeeze: syncreplication w/ incomplete objects fails

2011-03-28 Thread Matthijs Möhlmann
On Mar 28, 2011, at 6:51 PM, Quanah Gibson-Mount wrote:

 --On Monday, March 28, 2011 3:47 PM +0200 Matthijs Möhlmann 
 matth...@cacholong.nl wrote:
 
 Hi all,
 
 Cc'ing my fellow maintainers.
 
 To fix this bug I can add simply -s to the slapadd in the function
 load_databases.
 
 The -s option disables the schemachecking. But I'm not sure if this is a
 good solution to fix the upgrade procedure.
 
 Maybe it's better to look at the configuration and check if it's a slave
 and then add this option.
 
 Any comments?
 
 It is never wise to disable schema checking.
 
 --Quanah

Well, the bugsubmitter has slaves with partial replication (not all attributes 
are
replicated) and the replication user is not allowed to read all attributes on 
the
master.

If you say it's never wise to disable schemachecking, why is there an option to
disable the schemachecking in the replication?

Regards,

Matthijs Möhlmann




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#614569: [Pkg-openldap-devel] slapd: Dist-Upgrade Lenny-Squeeze: syncreplication w/ incomplete objects fails

2011-03-28 Thread Matthijs Möhlmann
On Mar 28, 2011, at 7:31 PM, Quanah Gibson-Mount wrote:

 --On Monday, March 28, 2011 7:11 PM +0200 Matthijs Möhlmann 
 matth...@cacholong.nl wrote:
 
 If you say it's never wise to disable schemachecking, why is there an
 option to disable the schemachecking in the replication?
 
 For that very reason (partial replication). :/
 
 So the problem is that if you use -s, people who have invalid databases that 
 shouldn't get imported may then get imported.  But if you don't, you hit this 
 issue.  I guess you need to decide which is the lesser evil. ;)
 
 --Quanah
 

Than it's easy, I'll stay with the current behaviour, I won't disable 
schemachecking for now.

The default for schemachecking is off in olcSyncrepl, so the solution here is 
to check if
the directory is a slave and based on the schemachecking use the -s flag.

Well I'll move that one a bit down on my priority list.

Regards,

Matthijs Möhlmann




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#619755: lintian fails to check -dbg package

2011-03-26 Thread Matthijs Möhlmann
Package: lintian
Version: 2.4.3
Severity: normal

When I check the openldap package with lintian I get the following
error:
lintian
/home/matthijs/debpkg/openldap/build-area/openldap_2.4.24-1_amd64.changes
W: slapd: manpage-has-errors-from-man
usr/share/man/man5/slapo-retcode.5.gz 61: warning [p 1, 8.7i]: cannot
adjust line
W: libldap-2.4-2: unused-shlib-entry-in-control-file libldap-2.4 2
warning: collect info objdump-info about package slapd-dbg failed
warning: skipping check of binary package slapd-dbg
N: 2 tags overridden (2 warnings)
mkdir: cannot create directory `strings': No such file or directory
internal error: Failed to create directory
'strings/./usr/lib/debug/usr/lib/ldap'

Regards,

Matthijs Möhlmann

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.38-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages lintian depends on:
ii  binutils   2.21.0.20110322-1 The GNU assembler, linker and bina
ii  diffstat   1.54-1produces graph of changes introduc
ii  dpkg-dev   1.15.8.10 Debian package development tools
ii  file   5.04-5Determines file type using magic
ii  gettext0.18.1.1-3GNU Internationalization utilities
ii  intltool-debian0.35.0+20060710.1 Help i18n of RFC822 compliant conf
ii  libapt-pkg-perl0.1.24+b1 Perl interface to libapt-pkg
ii  libclass-accessor-perl 0.34-1Perl module that automatically gen
ii  libipc-run-perl0.89-1Perl module for running processes
ii  libparse-debianchangel 1.1.1-2.1 parse Debian changelogs and output
ii  libtimedate-perl   1.2000-1  collection of modules to manipulat
ii  liburi-perl1.58-1module to manipulate and access UR
ii  locales2.11.2-13 Embedded GNU C Library: National L
ii  man-db 2.5.9-4   on-line manual pager
ii  perl [libdigest-sha-pe 5.10.1-18 Larry Wall's Practical Extraction 

lintian recommends no packages.

Versions of packages lintian suggests:
pn  binutils-multiarchnone (no description available)
ii  libtext-template-perl 1.45-2 Text::Template perl module
ii  man-db2.5.9-4on-line manual pager

-- no debconf information



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#619755: lintian fails to check -dbg package

2011-03-26 Thread Matthijs Möhlmann
On Mar 26, 2011, at 7:59 PM, Niels Thykier wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA256
 
 Hey
 
 Could you please re-test with lintian 2.5.0~rc1 from experimental?  This
 looks very much like an issue we fixed in 2.5.0~rc1.
 
 ~Niels
 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.11 (GNU/Linux)
 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
 
 iQIcBAEBCAAGBQJNjjd6AAoJEAVLu599gGRCSP8P/R+Ju7zv60ILPVIGycdJ3kMl
 qt3ugJ6XDGJteZ2wC3seHx3vpOFJDEXXv1+fcBUPVTkQo8c9hapGEloakAmAfmSQ
 JgUkueAZsfPlNMkE5UqaO3GXThksJ8LZLWJNAFhBbhRZXrPNdVVcywUK2FB0KrDQ
 Q0gcYzEIR+L3h7WshOh9TUA28/3Xi/swjIHRPBNxZTMiZO10clM2XpVGmixLJXfT
 9rg2hQGWoEy9gETKrWG9uNFV1ixbEc6QmVn5sVHNThq5f0iSbiIvFMgrUbZwTUod
 s3Lyx1AHImLf0PEDi3+P9Dccc9iGAu2cShoultf7ejUxmZ8UGEhO9MHaLZd25UvG
 82kllagmGf7MKkco56vc6pBhVUkaJowNVC2tif1y4wJNmcrCPzwMuW5b0oQGF0H0
 UdDfQvm4Hif08imLE2yycuoXEAxayxF2Ikbyf54/6lHZ6S3JS3Z6L0g5fldU6uw5
 iGXPOest0qlxAywPQjdsUdcpUTAz+WaudIr6To321nhyu7a2Kl2x/rkWkFP6Nomu
 0pJ0KpoDvlfn7O90gh/hDBTgYjIRfrmd/0OCiWPyPVNisooL1VCh+nbe2dlug+nc
 8PH8lO5jL41KL60WiPcQma+8LW5VIYTB71OJR4+IpGk8LU7D6IJQbDZN4sW6sUoG
 WwxMhMXq1p1V5yOf+kIl
 =SLxo
 -END PGP SIGNATURE-

Hey Niels,

This is indeed fixed in lintian from experimental.
Thanks!

Bug can be closed.

Regards,

Matthijs Möhlmann




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#618904: [Pkg-openldap-devel] Bug#618904: Bug#618904: openldap 2.4.23 slapd server process frequently hangs during everyday use

2011-03-25 Thread Matthijs Möhlmann
On Mar 25, 2011, at 3:33 PM, Mark Cave-Ayland wrote:

 On 23/03/11 19:45, Quanah Gibson-Mount wrote:
 
 I would note that you are the only person using OpenLDAP 2.4.23 since it
 was released on 6/10/2010 to report this issue. So while I concur this
 is a serious issue for your use of OpenLDAP, it is also somehow related
 to your specific OpenLDAP configuration. You never provided your
 configuration in the upstream discussion that I can find, so it's
 difficult to know what you've done specifically in your environment that
 is causing the problem to show up.
 
 That's true, although no-one really showed any interest after I could verify 
 that 2.4.24 fixed the issue. If you're still interested, I'll see if I can 
 spend some time at the beginning of next week to come up with a reproducible 
 test case.
 
 
 ATB,
 
 Mark.
 
 -- 
 Mark Cave-Ayland - Senior Technical Architect
 PostgreSQL - PostGIS
 Sirius Corporation plc - control through freedom
 http://www.siriusit.co.uk
 t: +44 870 608 0063
 
 Sirius Labs: http://www.siriusit.co.uk/labs
 
 -- 
 This message has been scanned for viruses and
 dangerous content by MailScanner, and is
 believed to be clean.

Hello,

I have planned to work on OpenLDAP this weekend, so expect some movement on 
this list.

Regards,

Matthijs Möhlmann




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#611426: pdns-recursor uninstall problem

2011-03-05 Thread Matthijs Möhlmann
reassign 611426 bash-completion
retitle 611426 No completion on an installed package.
thx

Hello,

This is probably not a bug in the pdns-recursor package but a problem
in the completion code from bash. I therefore reassign this bug to
bash_completion.

Are you really sure that pdns-recursor is correctly installed on the system?

Regards,

Matthijs Möhlmann




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#603544: rc bug?

2011-01-07 Thread Matthijs Möhlmann
 Should not this be an RC bug? Breaking some people's slapd systems on
 upgrade to squeeze does not feel nice.

Correct,

I'm going to work on this one.

Regards,

Matthijs Möhlmann




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#594805: Bug#585966: installation of pdns-server 2.9.22-7 fails on squeeze

2010-09-30 Thread Matthijs Möhlmann

On 09/30/2010 06:51 PM, i...@dnsregistraties.be wrote:


Hello,

Any progress with this bug?
The last updates doesn't want to install because of this issue.
Please fix this issue ASAP.

Regards,
Sandy van der Borght




Hi,

I removed mysql and postgresql from the init.d script in pdns (not the 
recursor)


And that didn't fix the problem?

Regards,

Matthijs Mohlmann



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#594805: Bug#585966: installation of pdns-server 2.9.22-7 fails on squeeze

2010-09-30 Thread Matthijs Möhlmann

On 09/30/2010 07:17 PM, Juha Heinanen wrote:

i...@dnsregistraties.be writes:


Any progress with this bug?
The last updates doesn't want to install because of this issue.
Please fix this issue ASAP.


while waiting for the fix, i created this before installing
mysql-server-5.1 and pdns with mysql backend:

# more /etc/insserv/overrides/mysql
### BEGIN INIT INFO
# Provides:  mysql
# Required-Start:$remote_fs $syslog
# Required-Stop: $remote_fs $syslog
# Should-Start:  $network $time
# Should-Stop:   $network $time
# Default-Start: 2 3 4 5
# Default-Stop:  0 1 6
# Short-Description: Start and stop the mysql database server daemon
# Description:   Controls the main MySQL database server daemon mysqld
#and its wrapper script mysqld_safe.
### END INIT INFO

-- juha


Replying to all now.

I've just tested the installation of mysql-server, pdns-recursor and 
pdns-server and all of them are installing cleanly now. I've removed the 
mysql and postgresql from the startup requirements in the pdns init 
script, that seems to be enough to fix this problem.


I know that pdns automatically tries to connect to the database again if 
it can't at the very moment. It tries it again when queries come in.


So if this isn't fixed can you provide me with the init.d scripts of 
pdns, pdns-recursor and mysql so I can investigate the issue. And can 
you give the output of:

ls -l /etc/insserv.conf.d

Thanks in advance.

Regards,

Matthijs Mohlmann



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#598361: [Pkg-openldap-devel] Bug#598361: slapd: slapcat gives unclean shutdown detected; attempting recovery after squeeze upgrade

2010-09-28 Thread Matthijs Möhlmann

On 09/28/2010 04:45 PM, Walton, Bryan K wrote:

On Tue, 2010-09-28 at 15:58 +0200, Matthijs Mohlmann wrote:


Do you before you backup, shutdown the slapd process ?

/etc/init.d/slapd stop
slapcat ...
/etc/init.d/slapd start

If you don't, then this is probably the reason for this error.


Hi Matthijs,

Thanks for the reply.  You are correct.  If I shutdown slapd first, no
error is generated.  I can start doing this.  However, I didn't think
this was necessary.  From the slapcat man page:

For some backend types, your slapd(8) should not be running (at least,
not in read-write mode) when you do this to ensure consistency of the
database. It is always safe to run slapcat  with the slapd-bdb(5),
slapd-hdb(5), and slapd-null(5) backends.

Is this no longer accurate?

-Bryan



Bryan:
Asking one of the OpenLDAP developers.

Quanah, can you comment on this ?

Regards,

Matthijs Mohlmann



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#594712: [Pkg-openldap-devel] Bug#594712: 'upgrade_supported_from_backend' function: still useful?

2010-09-06 Thread Matthijs Möhlmann
On 09/06/2010 09:15 PM, Steve Langasek wrote:
 On Sun, Sep 05, 2010 at 03:22:38PM -0700, Steve Langasek wrote:
 
 Was just having a look over debian/slapd.scripts-common to see if there's
 any dead code in there that we could prune.  Revision 1291 seems to have
 taken care of most of it, though I see the function
 'upgrade_supported_from_backend' is still included.  Do you anticipate us
 using this function again in the future, or is this left in by oversight?
 
 Perhaps bug #594712 is the answer to this question.  I think Peter's patch
 is a good one, it lets us avoid hard-coding backend types by name in favor
 of automatically detecting those backends with filesystem drivers; and then
 we could drop the upgrade_supported_from_backend function altogether. 
 Matthijs, what do you think - should we go this route, or do we want to
 restore the use of upgrade_supported_from_backend?
 

This function is not useful anymore. I'll remove it. And apply the patch
from Peter. It is a left over r1291.

Regards,

Matthijs Mohlmann



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#594714: [Pkg-openldap-devel] Bug#594714: slapd upgrade may fail on unset SLAPD_CONF

2010-09-06 Thread Matthijs Möhlmann
On 09/06/2010 09:38 PM, Steve Langasek wrote:
 On Sat, Aug 28, 2010 at 05:54:43PM +0200, Peter Marschall wrote:
 upgrading slapd to 2.4.23-4 failed.
 
 Error message
 -
 (Reading database ... 244861 files and directories currently installed.)
 Preparing to replace slapd 2.4.23-3pm1 (using slapd_2.4.23-4_amd64.deb) ...
 Stopping OpenLDAP: slapd 
  [   OK   ]
   Dumping to /var/backups/slapd-2.4.23-3pm1: 
 grep: /cn=config/olcDatabase*: No such file or directory
 Unpacking replacement slapd ...
 Setting up slapd (2.4.23-4) ...
 Installing new version of config file /etc/init.d/slapd ...
   Moving old database directory to /var/backups:
   - directory unknown... done.
   Creating initial configuration... mkdir: missing operand
 Try `mkdir --help' for more information.
 dpkg: error processing slapd (--install):
  subprocess installed post-installation script returned error exit status 1
 Processing triggers for man-db ...
 Errors were encountered while processing:
  slapd
 
 This seems to be a regression introduced in svn revision 1305:
 
 Index: debian/slapd.scripts-common
 ===
 --- debian/slapd.scripts-common (revision 1304)
 +++ debian/slapd.scripts-common (revision 1305)
 @@ -755,14 +755,12 @@
  fi
  
  # Load the default location of the slapd config file
 -if [ -z $SLAPD_CONF ]; then
 +if [ ${MODE} = configure ] || [ -z $SLAPD_CONF ]; then
 if previous_version_older 2.4.23-3  \
 [ -f /etc/ldap/slapd.conf ]  \
 [ ! -e /etc/ldap/slapd.d ]; then
  
 SLAPD_CONF=/etc/ldap/slapd.conf
 -   else
 -   SLAPD_CONF=/etc/ldap/slapd.d
 fi
  fi
  
 The commit comment is:
 
  * Fix the upgrade procedure with the new slapd.defaults file.
 
 Matthijs, I can't understand your intention here.  I'm sure that the last
 bit of the diff is wrong - we should *always* have a default fallback value
 for SLAPD_CONF, not just in the file-based case - but I don't understand the
 purpose of the first part of the diff.  In what case is it necessary to
 override an already-set SLAPD_CONF variable on configure, and why does this
 not also apply to other conditions besides postinst configure?
 
 Without understanding that, I'm not sure what the right way is to clean this
 up.
 
 Thanks,

Before 2.4.23-3 an empty value of SLAPD_CONF causes /etc/ldap/slapd.conf
automatically be chosen by the slapd process. After 2.4.23-3 we have a
sed one liner that automatically sets the SLAPD_CONF in the defaults
file. By *not* setting the SLAPD_CONF at that point people were able to
use /etc/ldap/slapd.conf as configuration style after version 2.4.23-3.

I had a conversation in a bug report with Peter, but I can't find the
bug log at this moment. I'll search tomorrow for it.

For fixing this bug: are we going to support the *legacy* format in any
way? If the answer is no, then the last part of that commit should be
reverted.

Regards,

Matthijs Mohlmann

PS: I'm sorry for the delay in responding, I had some busy days at work.



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#594805: Bug#585966: installation of pdns-server 2.9.22-7 fails on squeeze

2010-08-29 Thread Matthijs Möhlmann
On 08/29/2010 05:46 PM, Juha Heinanen wrote:
 I tried to install pdns-server 2.9.22-7 with pdns-backend-mysql on
 Squeeze, but it still failed like shown below.
 
 -- Juha
 
 -
 
 # apt-get install pdns-server pdns-backend-mysql 
 Reading package lists... Done
 Building dependency tree   
 Reading state information... Done
 Suggested packages:
   pdns-backend pdns-recursor
 The following NEW packages will be installed:
   pdns-backend-mysql pdns-server
 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded.
 Need to get 0B/854kB of archives.
 After this operation, 2,191kB of additional disk space will be used.
 Preconfiguring packages ...
 Selecting previously deselected package pdns-server.
 (Reading database ... 27053 files and directories currently installed.)
 Unpacking pdns-server (from .../pdns-server_2.9.22-7_i386.deb) ...
 Selecting previously deselected package pdns-backend-mysql.
 Unpacking pdns-backend-mysql (from .../pdns-backend-mysql_2.9.22-7_i386.deb) 
 ...
 Processing triggers for man-db ...
 Setting up pdns-server (2.9.22-7) ...
 
 Creating config file /etc/powerdns/pdns.conf with new version
 
 Creating config file /etc/default/pdns with new version
 
 Creating config file /etc/powerdns/pdns.d/pdns.local with new version
 insserv: There is a loop between service mysql and pdns if started
 insserv:  loop involving service pdns at depth 10
 insserv:  loop involving service mysql at depth 9
 insserv:  loop involving service rsyslog at depth 8
 insserv:  loop involving service postfix at depth 13
 insserv: There is a loop between service pdns and mysql if stopped
 insserv:  loop involving service mysql at depth 3
 insserv:  loop involving service pdns at depth 2
 insserv:  loop involving service postfix at depth 1
 insserv:  loop involving service sendsigs at depth 5
 insserv: exiting now without changing boot order!
 update-rc.d: error: insserv rejected the script header
 Setting up pdns-backend-mysql (2.9.22-7) ...
 Processing triggers for pdns-server ...
 Restarting PowerDNS authoritative nameserver: stopping and waiting..done
 started

Hi,

Thanks for reporting.

Petter: Can you check what's going on with insserv ?
Same bug is filed on pdns-recursor.

Thanks in advance.

Regards,

Matthijs Mohlmann



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#593965: slapd upgrade logic may mail on existing/working slapd.d/ configurations

2010-08-24 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 08/22/2010 07:01 PM, Peter Marschall wrote:
 Package: slapd
 Version: 2.4.23-3pm1
 Severity: normal
 Tags: sid
 
 Hi Matthijs  the openldap maintainers,
 
 The logic for converting the configuration to a slapdd.d based one
 currently tests
   previous_version_older 2.4.23-3 || [ -f ${SLAPD_CONF} ]
 I.e. when upgrading from a version before 2.4.23-3 it will trigger.
 

Probably we need to change this to:
previous_version_older 2.4.23-3  [ -f ${SLAPD_CONF} ]

In this case only versions older then 2.4.23-3 and still have a
/etc/ldap/slapd.conf will trigger an upgrade to slapd.d

 This makes the following
   mkdir /etc/ldap/slapd.d
 fail if the local system already uses slapd.d/ configuration.
 
 I do not think it is a solution to change the mkdir to
   mkdir /etc/ldap/slapd.d  ||  true
 because I guess the slapd -f ... -F ... then fail.
 
Correct.

 Unfortunately I do not have a working patch for the situation,
 especially as I am trying to achieve ome - maybe contradicting - goals:
 - convert to slapd.d/ on upgrade

I've tested this with the current svn and it seems ok, I'll let it in
svn one more day and will then upload it.

 - do not overwrite existing slapd.d/ when newer than slapd.conf

Can you give an example on this case how to achieve this ?

 - allow to keep a slapd.conf based config even after 2.4.23-3 ;-)
 Especially the last one will be tricky (maybe it needs to be restricted)
 
As upstream moves away from a slapd.conf based config, why should we
hold on to it ?

 As soon as I have a more detailed idea I'll attach it to this bug.
 

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkx0J70ACgkQ2n1ROIkXqbCqmQCgjpI8pleSn9e/AdEtxcBUQZoB
dMMAoIG5cKcsm0/qkQVuKMrQjgpssyWW
=Dl4Z
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#593566: [Pkg-openldap-devel] Bug#593566: - Root access to cn=config not working after upgrade

2010-08-21 Thread Matthijs Möhlmann
On 08/21/2010 09:53 PM, Peter Marschall wrote:
 Package: slapd
 Severity: normal
 
 tag 593566 patch
 thanks
 
 Hi Matthijs  the other openldap maintainers,
 
 Please see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=593878
 for a patch that also fixes the issue in this bug.
 
 BTW I am pondering whether comment #15 to this bug here
 (http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=593566#15)
 may be a separate bug. IMHO it definitely has nothing to do with
 the question here.
 
 Best regards  thanks for maintaining openldap in Debian
 Peter
 

Hi Peter,

Thanks for the patch. I came up with a different approach to this patch.
On converting the slapd.conf to slapd.d there is an entry olcAccess
added to olcDatabase=cn=config database, namely:
olcAccess: {0}to *  by * none

Another olcAccess line wouldn't help as this was the first entry so
replacing this line was the correct way. But I think your approach is
better so I'll apply your patch and will test it.

About #15: That is already a pending upload.

Regards,

Matthijs Mohlmann



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#593573: [Pkg-openldap-devel] Bug#593573: Password expiration test failed (on kfreebsd-amd64)

2010-08-19 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 08/20/2010 12:10 AM, Petr Salinger wrote:
 severity 593573 normal
 -- 
 
 Hi,
 
 the requeued build passed fine, so it looks like timing dependent bug,
 may be just in testsuite.
 
 Petr

Confirmed, the build needs to be rescheduled on the buildd.

Cyril:
Can you reschedule the build on kfreebsd-amd64 buildd ? Thanks in advance.

Regards,

Matthijs Möhlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=GsL1
-END PGP SIGNATURE-



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#370337: Make /etc/default/slapd automatically configurable

2010-08-08 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

This bug is open for a long time now, what reasonable defaults are
needed for debian-edu ?

I've attached the default file currently shipped with OpenLDAP.

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkxex4MACgkQ2n1ROIkXqbCchgCcCDvyZAJyIWXYAHvZGwAhRvlg
s0QAoKe7HpxTDEXTD2n3AvW0j/y2DlNA
=OA1K
-END PGP SIGNATURE-
# Default location of the slapd.conf file. If empty, use the compiled-in
# default (/etc/ldap/slapd.conf). If using the cn=config backend to store
# configuration in LDIF, set this variable to the directory containing the
# cn=config data.
SLAPD_CONF=

# System account to run the slapd server under. If empty the server
# will run as root.
SLAPD_USER=openldap

# System group to run the slapd server under. If empty the server will
# run in the primary group of its user.
SLAPD_GROUP=openldap

# Path to the pid file of the slapd server. If not set the init.d script
# will try to figure it out from $SLAPD_CONF (/etc/ldap/slapd.conf by
# default)
SLAPD_PIDFILE=

# slapd normally serves ldap only on all TCP-ports 389. slapd can also
# service requests on TCP-port 636 (ldaps) and requests via unix
# sockets.
# Example usage:
# SLAPD_SERVICES=ldap://127.0.0.1:389/ ldaps:/// ldapi:///
SLAPD_SERVICES=ldap:/// ldapi:///

# If SLAPD_NO_START is set, the init script will not start or restart
# slapd (but stop will still work).  Uncomment this if you are
# starting slapd via some other means or if you don't want slapd normally
# started at boot.
#SLAPD_NO_START=1

# If SLAPD_SENTINEL_FILE is set to path to a file and that file exists,
# the init script will not start or restart slapd (but stop will still
# work).  Use this for temporarily disabling startup of slapd (when doing
# maintenance, for example, or through a configuration management system)
# when you don't want to edit a configuration file.
SLAPD_SENTINEL_FILE=/etc/ldap/noslapd

# For Kerberos authentication (via SASL), slapd by default uses the system
# keytab file (/etc/krb5.keytab).  To use a different keytab file,
# uncomment this line and change the path.
#export KRB5_KTNAME=/etc/krb5.keytab

# Additional options to pass to slapd
SLAPD_OPTIONS=


slapd.default.sig
Description: Binary data


Bug#375067: [Pkg-openldap-devel] Bug#375067: Running a second instance of slapd stops /etc/init.d/slapd stop from working

2010-08-08 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 08/08/2010 08:28 PM, Steve Langasek wrote:
 reopen 375067
 thanks
 
 On Sun, Aug 08, 2010 at 05:24:05PM +0200, Matthijs Möhlmann wrote:
 Closing bug, running a second instance is not supported.
 
 Supporting running a second instance is a separate question from allowing an
 attempt to start a second instance to steal the pid file of the
 already-running server.  This is a bug.
 

I don't think that's entirely true. If you want a second instance of the
LDAP server you need also a separate slapd.conf file. In the
configuration the pidfile is defined. So if someone wants to setup a new
instance then you need also a new configuration file.

And if the user then defines the same pidfile that would be an user
configuration error or am I wrong here?

So first of all, running a second instance is in my opinion no problem
at all.

Second: stealing a pidfile is not a failure on part of slapd but a
configuration error.

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkxfFFQACgkQ2n1ROIkXqbDHXQCdGE0vzfCd/pfDa/7xoRcrvDaw
VSAAn365PJ3tgZfBaQLQByJOj4PLetP0
=dVh5
-END PGP SIGNATURE-



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#591550: slapd: Please stop depending on /usr/lib/libsasl2.la in .la files

2010-08-08 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi all,

What is the correct way to empty the dependency_libs, or simply a shell
command that empty the dependency_libs line?

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkxfFXoACgkQ2n1ROIkXqbC/GgCfUxz4/lrlx3c584S+G2ktpSCU
S54An3mTypc5nlR09yC0rmbPKPXyaTj4
=i+Mg
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#591750: [Pkg-openldap-devel] Bug#591750: slapd: Upgrading to unstable I get Invalid syntax

2010-08-05 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 08/05/2010 10:19 AM, Brent Clark wrote:
 Package: slapd
 Version: 2.4.23-2
 Severity: normal
 Tags: d-i
 
 
 To whom it may concern
 
 I upgraded to Unstable, and I got the following message
 
 --
 Errors were encountered while processing:
  slapd
  E: Sub-process /usr/bin/dpkg returned an error code (1)
  A package failed to install.  Trying to recover:
  Setting up slapd (2.4.23-2) ...
Backing up /etc/ldap/slapd.conf in /var/backups/slapd-2.4.17-2.1... done.
Moving old database directories to /var/backups:
Loading from /var/backups/slapd-2.4.17-2.1: 
- restoring DB_CONFIG for directory dc=hidden,dc=africa,dc=...   - loading 
 DB for directory dc=hidden,dc=africa,dc=... failed.
 
  Loading the database from the LDIF dump failed with the following
error while running slapadd:
/etc/ldap/slapd.conf: line 56: suffix invalid DN 21 (Invalid syntax)
slapadd: bad configuration file!
dpkg: error processing slapd (--configure):
subprocess installed post-installation script returned error exit status 1
  Errors were encountered while processing:
   slapd
 --
 
 I would like to say, that debconf setup slap.conf for my
 
 Kind Regards
 Brent Clark
 

Thanks for trying to upgrade to the new OpenLDAP version. Can you please
sent the /etc/ldap/slapd.conf so we can check what's wrong in the
configuration ? Please remove any confidential information from the
slapd.conf like passwords etc.

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkxahx0ACgkQ2n1ROIkXqbA9EACglH9XAfOOUCNmwYHcQjQzBCe6
i7sAnjEHzXmgG58eAXGWyLsNwronuhUL
=c5Zl
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#591750: [Pkg-openldap-devel] Bug#591750: Bug#591750: Bug#591750: slapd: Upgrading to unstable I get Invalid syntax

2010-08-05 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 08/05/2010 03:55 PM, Steve Langasek wrote:
 On Thu, Aug 05, 2010 at 12:31:15PM +0200, Brent Clark wrote:
 On 05/08/2010 11:40, Matthijs Möhlmann wrote:
 
 Thanks for trying to upgrade to the new OpenLDAP version. Can you please
 sent the /etc/ldap/slapd.conf so we can check what's wrong in the
 configuration ? Please remove any confidential information from the
 slapd.conf like passwords etc.
 
 Regards,
 
 Matthijs Mohlmann
 
 Ill try and get it to you.
 
 I think the problem is that the parsing of the dc, as it is blank.
 
 dc=hidden,dc=africa,dc=
 
 Yes, this is an invalid DN.  What is the correct DN in your config?
 

- -- debconf information:
  slapd/tlsciphersuite:
  shared/organization: hidden.africa.
  slapd/upgrade_slapcat_failure:
  slapd/backend: HDB
  slapd/allow_ldap_v2: false
  slapd/no_configuration: false
  slapd/move_old_database: true
  slapd/suffix_change: false
  slapd/dump_database_destdir: /var/backups/slapd-VERSION
  slapd/domain: hidden.africa.
  slapd/password_mismatch:
  slapd/invalid_config: true
  slapd/slurpd_obsolete:
  slapd/dump_database: when needed
  slapd/purge_database: false

According to the debconf information your domain is: hidden.africa. (see
the dot at the end) this is information not correctly filled in.

Ok, I'll add a check in the scripts to prevent this from happening, I'm
not sure how you could possibly setup the database this way. As far as I
know OpenLDAP doesn't allow this.

I'm going to test this.

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkxayHwACgkQ2n1ROIkXqbAFVgCZAW1yBhRCOPzimW2uJl4fI6Hn
Aj8An3eI1STPTEiSPU0IRW4dI+3vOfVy
=Ykd/
-END PGP SIGNATURE-



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#589915: slapd: service is not operational when the init.d script exits during boot

2010-07-23 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

It can take 3 minutes or more to have the OpenLDAP server operational,
should we wait that long in the initscript? Are there objections to for
example, wait for 5 seconds and try if the server is up, if not do that
again forever?

I'm going to do some tests with pdns too, with the bind backend it is
possible that it can take up a few seconds before operational, but I
have to test that.

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkxJ5yEACgkQ2n1ROIkXqbDdfgCeI5ZopZ7/1eWx4Rbicb6MNQ6Y
lfYAoIIXAo5DhlGEHMxPTNP6/OvL9uUa
=2zW3
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#589915: [Pkg-openldap-devel] Bug#589915: slapd: service is not operational when the init.d script exits during boot

2010-07-23 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 07/23/2010 09:08 PM, Quanah Gibson-Mount wrote:
 --On Friday, July 23, 2010 9:01 PM +0200 Matthijs Möhlmann
 matth...@cacholong.nl wrote:
 
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 It can take 3 minutes or more to have the OpenLDAP server operational,
 should we wait that long in the initscript? Are there objections to for
 example, wait for 5 seconds and try if the server is up, if not do that
 again forever?

 I'm going to do some tests with pdns too, with the bind backend it is
 possible that it can take up a few seconds before operational, but I
 have to test that.
 
 The time slapd can take to start depends on if it is a first time
 startup. If it is, it has to initialize the BDB environment.  How long
 the BDB environment takes to initialize depends on its size.  There is
 no set amount of time it can take to start.  The largest environment
 I've dealt with was over 1TB in size.  It took a very very long time to
 start the first time. ;)
 
 --Quanah
 
 -- 
 
 Quanah Gibson-Mount
 Principal Software Engineer
 Zimbra, Inc
 
 Zimbra ::  the leader in open source messaging and collaboration

I'm not sure if I understand you correctly, you say 'The time slapd can
take to start depends on if it is a first time startup.' What do you
mean by 'first time startup' ?

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkxJ6dwACgkQ2n1ROIkXqbCN4ACfS4qtUpMYWQH7NIF0B/g6GuvD
xDcAn1+uba7c06yShgk4f8EvwJxgnvlP
=5G+0
-END PGP SIGNATURE-



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#589915: [Pkg-openldap-devel] Bug#589915: slapd: service is not operational when the init.d script exits during boot

2010-07-23 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 07/23/2010 09:55 PM, Steve Langasek wrote:
 On Fri, Jul 23, 2010 at 09:01:54PM +0200, Matthijs Möhlmann wrote:
 It can take 3 minutes or more to have the OpenLDAP server operational,
 should we wait that long in the initscript? Are there objections to for
 example, wait for 5 seconds and try if the server is up, if not do that
 again forever?
 
 I'm going to do some tests with pdns too, with the bind backend it is
 possible that it can take up a few seconds before operational, but I
 have to test that.
 
 Surely the correct fix is to not daemonize the process until it's listening
 (the service is available)?
 
 
 
 
 ___
 Pkg-openldap-devel mailing list
 pkg-openldap-de...@lists.alioth.debian.org
 http://lists.alioth.debian.org/mailman/listinfo/pkg-openldap-devel

Correct yes. This means that I have to fix pdns too.

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkxJ9dgACgkQ2n1ROIkXqbBcwQCfd01HkhnHOrxMrbGLJOMN+o2n
6jIAniDeUFsg6uI8ICqHgkkM1z9Yw5/d
=8g5N
-END PGP SIGNATURE-



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#327585: Adapted Freeradius lt_dlopenadvise fix

2010-07-18 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 07/17/2010 01:18 AM, Jan-Marek Glogowski wrote:
 Hi
 
 the attached patch is the adapted fix from freeradius (#416266).
 
 Is there a reason not to include it? This bug is open for almost 5 years
 now and the fix hleped me a lot, because I didn't had to recompile the
 whole perl stack to get a working perl backend.
 
 Jan-Marek GLogowski

Hi,

I've read the bugreport and as far as I understand this only applies to
i386 architecture. On amd64 it is working well according to the testing
of Russ.

Secondly this has to do with perl not linked to libperl on i386
architecture. Is there a reason why this isn't done on i386?

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkxCyMgACgkQ2n1ROIkXqbDhrACeJ3jQb8Gz/iFIIKL5cs/t3pzu
AFMAoKmPSLZ+SxWKgMV2Lm0hr/TaUWXO
=SmdC
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#585966: pdns-server: init.d script should provide the virtual facility $named

2010-07-18 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

What contents should the file /etc/insserv.conf.d/pdns-server have?

For the other bug reported, I'll check if the pdns-server is running or
not before letting the script proceed.

I'm planning to upload the package this afternoon.

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkxC3zIACgkQ2n1ROIkXqbB3pQCgo5zdTaC9z88kEgc913rJwMfl
vXwAoIT2VktQEiSCDXDNKrsTeBGpZBOL
=l4Gs
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#512360: RFH: openldap -- OpenLDAP server, libraries, and utilities

2010-07-15 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello all,

Anyone still interested in comaintaining OpenLDAP, please drop me a note.

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkw/eOIACgkQ2n1ROIkXqbBGOACffHhCoarES5nxbqj/RiDrrv7A
4rYAn1wizb/5qtiH7EXlFSA+3OFY9Hj7
=/8+o
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#586334: ldappasswd hangs while smbk5pwd enabled

2010-07-13 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Quanah,

According to the following url:
http://lists.arthurdejong.org/openldap-technical/2010/06/msg00308.html

This seems to be fixed ?

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkw8sR0ACgkQ2n1ROIkXqbBUmgCfQvTBzSCgKm5yh4wVuj4u0Bee
vJUAn2nO1mm/Wqtu5LV1v8zW3aOx5PIT
=RJes
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#512693: slapd - ldap proxy with tls enforces cert check even if disabled

2010-04-25 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

We have currently 2.4.21 in the archive, can you test this again ? There
are a lot of improvements to the gnutls code since 2.4.11-1.

Thanks in advance.

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkvUNHsACgkQ2n1ROIkXqbA2kQCfZ3CGXMVJgf545LlREAwCm1VJ
XSEAn1MEDNVSSjh2SY0idnwWH6iGtkz0
=gZqb
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#562715: ppolicy don't work

2010-04-25 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Markus,

Now that OpenLDAP 2.4.21 is in the archive, are you able to test this
again and confirm that you still have this bug ?

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkvUXQ0ACgkQ2n1ROIkXqbActQCggj0nvtQXeztQTMWgvlzrVuZf
+/sAn1+NgqjjUkqEtDSui67vsuRdbA2H
=5EQm
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#568522: Valid client certificates fail with GNUTLS slapd

2010-04-25 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Timothy,

Now that OpenLDAP 2.4.21 has entered unstable, can you confirm this bug
still exists ?

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkvUXgYACgkQ2n1ROIkXqbDmfwCfV0sG12y/RYNGiT5cntbGIbwE
LckAoIr6ZbjU2f6DxzuDl//w3rMzzO1X
=Ej7z
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#575900: Include autogroup contrib slapd module

2010-04-14 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

I'm willing to include the autogroup contrib module but with
openldap-2.4.21 it gives some errors.

Are you able to check what's going on here ? And maybe rework the
patches a bit ?

The current svn
(http://svn.debian.org/viewsvn/pkg-openldap/openldap/trunk/) has 2.4.21
in it.

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkvGMqkACgkQ2n1ROIkXqbCykwCfRtCfKqEDX/ErXTi6R+rlfF0g
RysAn13TFl3UTetNHziIt64Xh1oqJnzN
=7vZ7
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#543331: slapd doesn't include deref overlay

2010-04-10 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

Sorry for the delayed response.

As far as I see all overlays are included. We compile the overlays with:
- --enable-overlays=mod

You can load an overlay with (as example):
overlay deref

Hopefully this will help you.

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkvA6OQACgkQ2n1ROIkXqbDmGwCfbpkjCpEQynnhAFHs9mS9YENp
iXMAn3YOnZUp45hzlr5vz3gbB7EsoVLk
=W+ZZ
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#565415: pdns-recursor: fails to upgrade when not started by init.d script

2010-04-03 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Dmitry,

First of all, apologies that it took sometime to respond to this bugreport.

This situation only occurs if the daemon is running and the init script
couldn't stop the recursor.

It looks like that the recursor was started before you have set the
recursor disabled. In any case the init script should try to stop the
recursor even in case it is not running. When it is not running the init
script won't fail.

Can you try to reproduce this problem ? (Just try to stop the recursor
and see if the exit code is 2.) And if it occurs, can you check if the
recursor is running and in what status it is ?

Regards,

Matthijs Mohlmann

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAku3GnoACgkQ2n1ROIkXqbDyDgCfRKbAKzuTBgybmrzscwIsaGBJ
H8wAoK5nXM+7SoJWZNFd0DJ7TpHS+yez
=jgaM
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#504800: pdns-recursor: pdns_recursor hogs the CPU

2010-04-03 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

Can you try to reproduce this with the current version of pdns recursor
in unstable ? Version 3.2-1 ?

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAku3HhAACgkQ2n1ROIkXqbCRPwCdFvhxE2zw+wf6tQJGCXBS0gHh
LfkAnAm8t+cmHiHHElqxK3Z1RzO0IDOc
=aHNG
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#566877: pdns-recursor: init.d script should depend on $syslog and start before pdns

2010-01-26 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Petter Reinholdtsen wrote:
 BTW, I just noticed that pdns-recursor is started before slapd even
 when pdns is configured to fetch configuration from LDAP, and this
 made me wonder if pdns-recursor also need the LDAP to be operational
 when it starts or not.  If it does, it should list slapd in the
 should-start (and probably also should-stop) headers.  The same should
 probably be added to the pdns headers.
 
 Happy hacking,

Hi,

pdns and pdns-recursor are to independent pieces of software, they don't
need each other. pdns is the only one that can fetch data from LDAP if
it has the pdns-backend-ldap package installed. The pdns-recursor can't
fetch data from a LDAP server. pdns can make use of pdns-recursor but it
can also fetch data from different sources so no, I don't think there is
need for any condition between pdns and pdns-recursor.

What happens if I have slapd listed in should-start / should-stop if
slapd isn't installed ? (pdns can also read data from mysql /
postgresql, or should those two also be listed in should-start /
should-stop ?)

Regards,

Matthijs Mohlmann

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAktezCYACgkQ2n1ROIkXqbCEYgCfXw0jLCrA9indqqNWPoBkZoRI
vIAAmQH2VjLntPme1FkW6EGC3WbBvMAg
=hciY
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#533023: sqlite backend does not parse priority: MX field '.' gets stored as '0 '

2009-11-02 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hallo Martin,

Can you check this with version 2.9.22-1 ? If it is not fixed can you
send me the configuration you did for sqlite ?

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkru1EEACgkQ2n1ROIkXqbDkEgCfVs4ka87qdSAFwSzDfqvCJNuL
u6IAoINMmLI8RnaAdBJHYwvpfNc9+aBl
=Q9iL
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#533023: sqlite backend does not parse priority: MX field '.' gets stored as '0 '

2009-11-02 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

martin f krafft wrote:
 also sprach Matthijs Möhlmann matth...@cacholong.nl [2009.11.02.1344 +0100]:
 Can you check this with version 2.9.22-1 ? If it is not fixed can you
 send me the configuration you did for sqlite ?
 
 Nope, problem persists with sqlite3 and 2.9.22-1 from backports.org.
 

Thanks for testing, I'm investigating the issue.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkru21wACgkQ2n1ROIkXqbAorQCgsLFL1aZDdthWw7uMSuVSK9d8
S3gAnijUNYfllEoaQez077R7ws335P8h
=QUnb
-END PGP SIGNATURE-



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#508987: Announce of the upcoming NMU for the pdns package

2009-10-31 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



 Otherwise the following will happen (or already has):
 
  Wednesday, October 21, 2009   : send the first intent to NMU notice to
  the package maintainer.
  Wednesday, October 28, 2009   : send this notice
  Tuesday, November 03, 2009   : (midnight) deadline for receiving 
 translation updates
  Wednesday, November 04, 2009   : build the package and upload it to 
 DELAYED/7-day
  send the NMU patch to the BTS
  Wednesday, November 11, 2009   : NMU uploaded to incoming
 
 Thanks for your efforts and time.

Hello Christian,

I'm intending to do a new upload to fix several other bugs, so when I
upload the package on 4th of November that's ok with you ?

Regards,

Matthijs Mohlmann

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkrsdlYACgkQ2n1ROIkXqbASygCgjboU0Zq1b7BMxvajDSZ/a4KP
RCIAniwGRaIar/8/2LRZmQZBxIY6xt8B
=T2w+
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#551153: pdns-recursor: Please add sh4 into support architecture list

2009-10-16 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Nobuhiro Iwamatsu wrote:
 Package: pdns-recursor
 Version: 3.1.7.1-3
 Severity: wishlist
 User: debian-...@superh.org
 Usertags: sh4
 
 Hi,
 
 I am now trying to run Debian on Renesas SH(sh4) CPU.
 http://buildd.debian-ports.org/status/architecture.php?suite=unstablea=sh4priority=
 
 pdns-recursor package can build on sh4.
 Could you add sh4 into support architecture list?
 
 Best regards,
  Nobuhiro
 
 

Hello,

Did you try to run pdns-recursor on sh4 ? I don't know if it support
swapcontext calls. pdns-recursor relies on those methods in the C library.

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkrYGEsACgkQ2n1ROIkXqbDbRQCeMQImkp77C8W70RH702AIwjUn
CGUAnR4hGyLtv6S3GFxk4mOxPG0Lq9R9
=I81z
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#531135: unowned files after purge (policy 6.8)

2009-08-09 Thread Matthijs Möhlmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Holger,

Thanks for testing the package against policy 6.8 and finding this bug
but I'm not sure if this bug applies to us.

On postinstall a user is created (needed for pdns and pdns-recursor) to
run both daemons under. Here is that unowned file created.

This user won't be removed on post removal because of security, see the
scenario:

User created (by pdns package)
Pdns creates files under pdns user
User removed (by pdns package)

Now we have files which have an unknown uid on the system.

System admin creates a user (by accident with the same uid as pdns had
before)
Now this user is able to read / write those files.

That's not what we want to happen, I can't remember exactly the bug
where this is told, but that's why we don't remove the user and so we
have a unowned file on the system.

How to proceed on this one ?

Regards,

Matthijs Mohlmann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkp+5/IACgkQ2n1ROIkXqbBKjACeIGiJk9snmNm3uSFsd1E+l7Dq
Dp4AnjrZw/ymKa9SBDnUU+nz4WF+UIKK
=5Bon
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org