Bug#1073445:
The test failures with this symptom: ResourceWarning: Unclosed are related to the anyio bump to 4.4.0 - see: https://github.com/encode/starlette/discussions/2603 no fix committed upstream yet.
Bug#913909: [Ceph-maintainers] Bug#913909: Bug#913909: ceph: FTBFS on i386 and mipsel (regression)
Hi Gaudenz On Mon, 19 Nov 2018 at 07:51 Gaudenz Steinlin wrote: [...] > I did the same and the build hanged as well. Retrying the hanging > call with all the -O2 arguments removed succeeds. So this seems to > be a bug in GCC with optimizations. I'm unsure on how to proceeed > from here. It's quite clear this is not a bug in Ceph. Is there a > chance that GCC will get fixed in stable? Would it make sense to > open a bug on g++-6? To workaround this in Ceph I would need to > find a way to disable optimizations just for this file on i386. > Because I suspect that generally disabling -O2 would have some > performance implications. > > The failing call is: > /usr/lib/gcc/i686-linux-gnu/6/cc1plus -quiet -I . -I ./include > -imultiarch i386-linux-gnu -D_GNU_SOURCE -D ROCKSDB_PLATFORM_POSIX > -D ROCKSDB_LIB_IO_POSIX -D _LARGEFILE64_SOURCE -D OS_LINUX -D > ROCKSDB_FALLOCATE_PRESENT -D SNAPPY -D ZLIB -D BZIP2 -D > ROCKSDB_MALLOC_USABLE_SIZE -D ROCKSDB_PTHREAD_ADAPTIVE_MUTEX -D > ROCKSDB_BACKTRACE -D ROCKSDB_RANGESYNC_PRESENT -D NDEBUG -isystem > ./third-party/gtest-1.7.0/fused-src monitoring/statistics.cc > -quiet -dumpbase statistics.cc -momit-leaf-frame-pointer > -mtune=generic -march=i686 -auxbase-strip monitoring/statistics.o > -g -g1 -g -g -g1 -g -g1 -O2 -O2 -O2 -O2 -Wformat=1 > -Werror=format-security -Wextra -Wall -Wsign-compare -Wshadow > -Wno-unused-parameter -Wformat=1 -Werror=format-security > -Wformat=1 -Werror=format-security -Woverloaded-virtual > -Wnon-virtual-dtor -Wno-missing-field-initializers -std=c++11 > -fdebug-prefix-map=/home/gaudenz/ceph=. -fstack-protector-strong > -fPIC -fdebug-prefix-map=/home/gaudenz/ceph=. > -fstack-protector-strong -fdebug-prefix-map=/home/gaudenz/ceph=. > -fstack-protector-strong -fno-builtin-memcmp > -fno-omit-frame-pointer -o /tmp/ccWWcwWO.s > > Running in src/rocksdb. https://git.launchpad.net/~ubuntu-server-dev/ubuntu/+source/ceph/tree/debian/patches?h=ubuntu/xenial I think I hit the same issue in Ubuntu a while back for which I picked 3 rocksdb patches - see above URL - 000*.patch. HTH (and I really need to work towards re-sync between Ubuntu and Debian). James
Bug#791445: Downgrading severity
I'm going to downgrade the severity of this bug to wishlist for the following reasons: 1) upstream ceph test with specific jerasure versions, stepping outside of this will potentially cause issues and increase the maintenance burden on an under-resourced team. 2) ceph builds multiple versions of the embedded jerasure with different levels of CPU optimisation and loads these as plugins based on runtime CPU detection; switching to linking directly against libjerasure a) won't work without patching out of this in the codebase and b) means we would only have the minimal CPU baseline that libjerasure currently builds with, crippling performance on more modern CPU's.
Bug#839138: Ceph maintainership status
Hi Adrian On Mon, 17 Oct 2016 at 20:34 Adrian Bunk wrote: > Hi, > > first of all thanks for your past work on Ceph. > > The current status of the Ceph packages [1] does not look good. > > src:ceph has 3 RC bugs, from "maintainer address bounces" > to "crashes since the latest NMU". > I'll sort through those (see below). If you still intend to maintain Ceph, do the emails from the BTS > actually reach you? If not, a list at Alioth might be a better option. > It would also be OK if you would state that there is noone left active > among the Ceph Maintainers, and that I can orphan the package for > finding new maintainers. > I'd like to continue maintaining Ceph in Debian; my time can be a little sporadic as it is with a number of maintainers, so doing this by myself is not a sustainable option so maybe a request for help is more appropriate now than full orphaning. I fully intent to work on pushing the work I've done for Ubuntu on Ceph Jewel packaging back into Debian at the start of November, but I really do need help for testing of this. > > Regarding ceph-dkms, this is only in experimental and has an RC bug > that it doesn't work with the jessie kernel. > Is there anything left that is not in the upstream kernel? > Not really - I think we should just drop that package. Note that we really do have a problem with upgrades in Debian - going directly from firefly to jewel is an offline upgrade (at best). But maybe that is better than the currently upstream unsupported version we have in testing. Cheers James
Bug#837100: [PKG-Openstack-devel] Bug#837100: Bug#837100: Bug#837100: python-hacking dependency versions are pinned by upstream, package doesn't work with Debian ones
On Fri, 9 Sep 2016 at 14:33 Thomas Goirand wrote: > On 09/09/2016 12:38 AM, Víctor Cuadrado Juan wrote: > > On Thu, 8 Sep 2016 23:35:27 +0200 Thomas Goirand > wrote: > >> According to James Page, we should look into the Ubuntu package of > >> hacking and get patches there to fix the issues. > > > > Why specifically the Ubuntu package, and not the Debian one? > > The latest Ubuntu package has the correct fixes, not the Debian one. > To be clear, the Ubuntu package has enough workarounds and hacks to allow OpenStack packages for the Newton release to build - some of that enables skipping of hacking tests as they just won't work with the newer flake8/pycodestyle without some major refactoring, which I did not have time todo. Besides, if we're failing OpenStack builds on lint errors in Debian and Ubuntu, we're probably about two steps to late as these should have been caught in OpenStack gate already!
Bug#836509: [PKG-Openstack-devel] Bug#836509: glance: FTBFS in testing (failing tests)
On Tue, 6 Sep 2016 at 13:57 Santiago Vila wrote: > > FYI, according to James Page, this was due to #836179. > > That's a way to see it, but if you mean this package needs to be built > with pyopenssl >= 16.1.0 because otherwise the build fails, that's > precisely why we have versioned build-depends. > > This kind of bugs should never happen in testing. Neither glance nor barbican require pyopenssl 16.1.0; the problem was that python-crytography was updated to 1.5, which broke pyopenssl 16.0.0 which is not compatible with cryptography 1.5. So the break in is pyopenssl IMHO (as it was not functional) not in barbican or glance, resulting in this transient build failure while that got sorted out.
Bug#825863: percona-xtradb-cluster-galera-2.x: should it be removed from Debian?
On Mon, 30 May 2016 at 22:36 Mattia Rizzolo wrote: > I think RM of this package should be seriously considered: > > * NPOASR > * FTBFS > * RC-buggy with no answers in 6 months > * 2 NMUs > * should be superseded by -3.x > * very low popcon > > RM; percona-xtradb-cluster-galera-2.x -- RoQA; NPOASR; FTBFS; RC-buggy; > unmaintained; low popcon > +1 (to be honest I though I had already done this when we removed the main percona-xtradb-cluster-5.5 package from the archive) > >
Bug#791445: [Ceph-maintainers] Bug#791445: : Bug#791445: ceph: uses bundled "libjerasure" library again
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/07/15 22:27, Thomas Goirand wrote: >> One of the reasons why I like standalone library is that it can >> run its own >>> tests as well -- a something rarely seen in bundled (statically >>> linked) libraries. Unfortunately at the moment "libjerasure" >>> package do not run any tests... :( > There's no question asked here. Embedding a library which is at the > same time available standalone is a RC bug (severity: serious, > because of a strong policy violation) which shall be fixed asap (so > the severity of the bug is correct). Actually I don't think this is a RC bug - policy says 'should' not 'must '. I agree that having a single libjerasure etc... is preferably, but at the same time, the way the build works (multiple, cpu optimized plugins including jerasure and gf-complete) in Ceph and how it *does* do runtime detection of CPU features means that if we switch now to using libjerasure, we cripple Ceph performance on any reasonably specified server for users who want to use erasure coding. I'd actually feel compelled to raise an RC bug against Ceph being fundamentally broken in this area if this where the case. Switch to libjerasure/gf-complete? - yes - when? when its possible todo the correct runtime determination of CPU features in these codebases, and we're able to make Ceph build and use this effectively. So not yet... - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJVn7hlAAoJEL/srsug59jDMYYP/ivUsNw2RBPlvJkPDgvfcPke h2dE6xrETy4me2+9V2dVkSnQhxNpOJjNUezagfZJ1aD9D0c5DpW2qZqlDlhJI6Cp dk4VxMD3NCBMRaBO0TmhfO4t21L5FAyjRS5DZ8VHrUvXVMfxZFZ6DbD1uXhowega 1pE67bXWSsXEu1yOhZTqLbdx26mBtOSPyS4VXfHofY5xlDnneJBbD85nEKi37VT9 Sbbiy3CPWzGf6mIFlQbxDUSDoaQuXY8ZMkMX+RdkCloLmy1QSDJzU6Folhe8Aba7 2yjOHzHrgykm6x2YB/HaLgBctgcz21US2SuX4Y3IXHHXqnKL8dZpkWQLFawwpWTf npSmya/P/ThxAQ3Ra/9FwJMGhvzRjdftsmoIq0jwGV7Xl41CqgAlSIll5u+wWlr0 mVKY3tFanAH0WdXx9qOfO2eLCx9bOuhm9D6xrQufeFTipVeeARZwPCQdWpbCWN94 kHxrZz6MUb8+CW86CtKRhiVR4xCDK1NJzgAkrMMnRD+Z/BW5FqPQB7dJFoD4dX0s xiHlFTGXdweorsus7MHiw0Ylhp7/AFwshn0DjsXI0fXv9hMvWigSUCjIH1hK8GKD tyK0TlYu3JtGKL33NczN5mGQe5Hg76ejGpHGSqp8EthZCDeNZhHy1dq6wFUrYQ6M 3LKDAuwK4/PlpVVXkj6r =1/Bp -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#791693: [debian-mysql] Bug#791693: percona-xtradb-cluster-common-5.5: uninstallable in sid
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/07/15 17:22, Andreas Beckmann wrote: > 0m17.9s ERROR: Command failed (status=100): ['chroot', > '/tmp/piupartss/tmpx3lw54', 'apt-get', '-y', 'install', > 'percona-xtradb-cluster-common-5.5=5.5.39-25.11+dfsg-1'] Reading > package lists... Building dependency tree... Reading state > information... Some packages could not be installed. This may mean > that you have requested an impossible situation or if you are using > the unstable distribution that some required packages have not yet > been created or been moved out of Incoming. The following > information may help to resolve the situation: > > The following packages have unmet dependencies: > percona-xtradb-cluster-common-5.5 : Depends: mysql-common but it is > not going to be installed E: Unable to correct problems, you have > held broken packages. As pxc-5.5 has not been updated for the new mysql-common arrangements, and I don't think Percona are interested in maintaining this package in Debian, we should request removal of pxc-5.5 and its associated galera package from Debian. Any objections? - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJVnZqVAAoJEL/srsug59jDZt4P/0lkE2GTGhY2xPb3vO4hOqzW Uopajfswj8wKPUj/Fd9ZIpzXEaQP6BATXflyjq/uLBiiRRm64+cCsckTV/Ern834 HQ37EAeiMtkj+0zFs2CYIvLIVVZzWYW7XjxToGO0PreMXwaxuvkJ9YhBCnBjAdfK LBHi7xy+mAk2aN7eE8Rc2hio2iREmUuu8Ar4DKubc+ZXmmMXGPexFxpjzl7utgoE 1Aotuhjsv6/DAZ2gC99P8AyP6QUTPABBAfV8o4fHSCOgHOQL4B/FuJr1KAmWJ8Mo NwxaUehc1WyXr0A7PkS1dJUsOUbRAoC3dszsMNNKhUqFNCzyYcOBBVsT0wHnM3QP f1ss9yt9YkGGtBeQREfD3Gq5p7R1cLB166IssPrP/Iakmx73X9jQY56i/KeqGu9E aRyhp3qGglWoVWpr5rGy0DeZhiaMpjNPAjJvTAjcDmoVnH8Wy85FieMUluNbXZ53 zXt8vfeKN2sNW6LEjvE4jLVx0LXb4pxCbqjAtLBavWpUd3EdysPkrGR1jJzIvNZZ JD33JcknUBkpK4QFj26iwf9vSFzeNTbyI1tCe0f91ciI6JUCUB446clFuFp9H3/B x/6KqdQeaympNyJS5x3nJxNtDqxRkzS0L9AJocDA8kdAICMN1Xc2zOSX/AszKXzf uLI1qLg/fLv0CL8pUt1E =ZhxI -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#791445: [Ceph-maintainers] Bug#791445: Bug#791445: Bug#791445: ceph: uses bundled "libjerasure" library again
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/07/15 14:07, Dmitry Smirnov wrote: > On Wed, 8 Jul 2015 11:07:43 Loic Dachary wrote: >>> Without integration tests, linking Ceph against the wrong >>> jerasure version may lead to data loss. Prior to publishing a >>> Ceph version, various integration tests run to verify encoding >>> / decoding, > Those check are part of post-build tests, right? > > While I was maintaining Ceph I've made changes to run unit tests > but James reverted it as well. :( Not sure I can take credit for that - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJVnUcrAAoJEL/srsug59jDILAQAMf+um/R0guxNg3uOwnTFPtL fkrgHrDVP3xtm6NHr7uSM0RKEV0QW0kPmpRfz7SKbSWXaqE2ZpllA4isQgI5zJUL ry9Bv5peYVV2tJHIx9CXmLrPpAQXV3q5BbglcGdozSK0BCbv9ER1Cv2UmREEzEzA 6wbCg7+B82OHx9VNwu2fWXmUbkkpVe9bzyu4BTiZEfI5VR5EvYz/Oc/iYsebfWxB Goo0TIXbgxBgmtUgdZHgB3sHEAKJQh67hX4T7upikzuNO6eHpWXAOZI0jrPZCQhb syh+fXEFuS+XOp3LS0co9QkLOqfjzyjzt//l3JvPnYBl4iA0zXjqPvBfH7+PTu81 xFAJtj2fUvYJIMr4DxMv31A/5Yddu6omGda2cJKJ0bG6u4GyVK3vP7Y7ybkGMfw7 HbXOmXa1RvwXYVbCPI+Z6cOAm9YcxXUm8e25wZN8d55fR1AELXZX+WUdEdRzRrIa mxSQm1vfRrd3X6ZeH46kU1rfPm2VlLwVsZ2UJ/rjDXF0ggmv7Bna7HMZIKV4eKOl AToZL81xQGQxs0QLIKq+RhOS+y4ldJ6093QYNYtcC/uoFGasAN9naxc3RVlJYe9Y VgtzkwpVZKbF3pKUhn7c0tS23Ckiwopk31C+JP3AGlzLh+2jP1ovMARL0tl7QiJW IxzIfHAKwQodP9k0KuOt =koO2 -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#791445: [Ceph-maintainers] Bug#791445: Bug#791445: Bug#791445: Bug#791445: ceph: uses bundled "libjerasure" library again
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 06/07/15 18:23, James Page wrote: >> The ceph Debian package git repository only contains very little >>> reasoning about the change. James can you please expand on this >>> a bit? In general I would prefer to have changes like this in >>> their own commit and not mixed with unrelated changelog >>> updates. Did the Hammer release not build with the jerasure in >>> Debian or are you just afraid of unexpected results if the >>> Debian package is built with another version of jerasure than >>> what they ship in their source code? These would IMO be valid >>> reasons to (temporarily) remove the patch. > Re-basing the patch - which was turning out to be non-trivial - > pushed me over the time I had todo this update; as the upload was > to experimental only, I intended to revisit when time permitted. I dug into this in a bit more detail today; the Ceph package builds a number of difference loadable erasure coding plugins, enabling different cpu feature sets (generic, neon, sse3, sse4); each time Jerasure and gf-complete are statically linked into the module, built with the required flags to enable the right CPU instruction codes (build time, not runtime enablement). Unless I'm reading the packaging wrong, the jerasure and gf-complete packages current disable any CPU specific extensions in order to have a completely generic library that works on any CPU. So using the system libraries effectively cripples any CPU optimization that might be achievable at runtime in Ceph. - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJVm/0lAAoJEL/srsug59jD/EsP/iageGQ/sd+1jE5Suz+dhLoP +6w8xlHyBYKFM7mDqE39+CZN6OsBO/edjt9WuGdfyWMwSIa6cc9T1w/rwCtu+hU/ DAtBxXh9yQuq6SP7A1ER1v3Q0jJ/tCEkqO/wsGZ5XgjE4jB2jjiYRkl17CtNShSg oC2cf2khp5LcIa4V1RFoZQstVVXCWryY22F+u0HGm4wqRVwBU5Iihpb5GR0kwcxk 0zLEy9yar9EmicztMW4iWFfk5j8jcHWTQz0SejzrfFd1Nxm7xKyDKxhC7ybJPpXP iZ0wQKKnuPcr5Ix90IgmUqMjt8wGD9q3e5zhHtL4sajoF9nNSftWlWbd4MedDosU KTHz3SaLAkLeJ8694tOfUoYNfQ+YS73gd47DOz1fjixaUZaVXXsS/WY8DKS01g1r NZeQ+NNwfiPIkQxUTv40xLas2yzVwHmQEjYe9xvIny8fvsEJ7j2alS56zQn6qB44 KCfnrfQh0DLsD3RqcuAWOqGTCymiFlj741HZQEEvWF5ADsyEentSvpTT9Q4w1CBD F+boqsMKqR9nYwy6RfqqGtW1rRHF13tOUgMmaleiGY9BtMgfSb1Iiq9hWlSmp+rF 1BsUUumoeQKUto8GBW5yodHBJoHS+JRbF7uZl2ZKGvFG9RJAuGdsQCjL8iGhLfh5 URYktR/1Bp+5y6mO8wNe =r3uE -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#791445: [Ceph-maintainers] Bug#791445: Bug#791445: Bug#791445: ceph: uses bundled "libjerasure" library again
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 06/07/15 15:46, Gaudenz Steinlin wrote: [...] >> I'm co-maintainer of both jerasure and ceph. If the Debian >> jerasure package was orphaned, I would be happy to step in and >> maintain it as a standalone package. Jerasure was packaged >> without dialog with the jerasure upstream and I can understand >> that keeping it in sync with what ceph needs is significant >> work. > > Loic thanks for your offer to help with this. We definitively need > some upstream assistence on this. IMO while the current approach to > just use the bundled version is suboptimal, the previous approach > to just unilaterally use a different version of jerasure than > upstream is not good either. > > Currently ceph is AFAICS the only reverse dependency of jerasure. > I don't know why Thomas packaged it in the first place. But if we > want to keept the standalone package it might be the best for the > ceph maintainers group to take over maintenance of the jerasure > Debian package. I hope Thomas won't mind if we lower the burden for > him a bit. I can help there - OpenStack Swift has erasure coding support as of 2.3.0; Thomas packaged Jerasure for this purpose. > The ceph Debian package git repository only contains very little > reasoning about the change. James can you please expand on this a > bit? In general I would prefer to have changes like this in their > own commit and not mixed with unrelated changelog updates. Did the > Hammer release not build with the jerasure in Debian or are you > just afraid of unexpected results if the Debian package is built > with another version of jerasure than what they ship in their > source code? These would IMO be valid reasons to (temporarily) > remove the patch. Re-basing the patch - which was turning out to be non-trivial - pushed me over the time I had todo this update; as the upload was to experimental only, I intended to revisit when time permitted. I also need to catchup on getting the 'modules' patch upstreamed; that's also awkward with every Ceph release. > What's the ceph upstream position on splitting out jerasure and > building against the standalone version? Is this considered > supported? Are you willing to accept a patch which either uses a > standalone jerausre for all builds or which introduces a configure > flag to do so? I would prefer to see this approach taken; I hope upstream would be supportive. - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJVmrl2AAoJEL/srsug59jD3mQQALNGnqV+Z18zkmi8qf1di69d Y3rRmmE26/uPsKjpUPxFxLDSZjPTteT1HhrNeIukoWGdXWfTnMBLTgz18Vy7fgG+ kFPd20VYOpO2BHpgkStK8dvjKVu0TA5BNXfMGy/Hv7Ap6oad/vc8siQHm4zFOAyA +oqHKcCTulPBBSCiQfop2va270Nx0ynkiNq7aK2R80G3wl0REhG0+RIQOef4N1Zf QnL/ZvAcwVBMLRqBBUDPfr0AdL2h5Ddq+4o9ub3w5xmI7W4aGQlIrJCjLc4dqvaV sXeVo44mpJmtHIl3QYNxJQ80iPa6PXQCWq+OiGnFGIqCQRHNGgX04PR5mM8108El 429f8zDTAA/zBsEagnGNTkLPGYiaIglC8XtqONALEmVLe7J4fHA8qubYoZbM0imL 8FTg7wK5ysWge+pkwCzp/iWz5swoWiZikKQ+cuvm8R+nCdcWL+6E8Cba7XhVJSFG AYwnNtzseaOSbQjNLr0L6wGUR+eZJugCDvXAh7zi9UF0Qnot+CVmVHBP3SALJkrD 9jOE/lU5BiUVDnNdTahJeZ6qwO7GfL9vrUUy87E7VupmoD2dzbht3QSS11VKGTpM /Zh/bkt6vCp1HMyVBMfLPO9StHDY6KFCrm0/RmAhB1AbDawFM6lGeUprJggoBMSk sCGX4t3vrGgiXVCZ6WDI =Hz2B -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#775881: [debian-mysql] Bug#775881: mysql-5.5: Multiple security fixes from January 2015 CPU
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Salvatore On 06/02/15 15:08, Salvatore Bonaccorso wrote: >> On 21/01/15 19:14, Salvatore Bonaccorso wrote: >>> For wheezy-security I'm just building the package with imported >>> version 5.5.41 to resolve the issues. Can say more if build >>> suceeds. >> >> I've pushed commits to git.debian.org for unstable; should fine >> time to build and test in the next day or so. > > Did you had a chance to look at the upload to unstable so that it > can be included into jessie? I did but instantly got blocked by an expired certificate in the test suite; I think Akhil has pushed fixes + .42 point release to git but I've been away/travelling for the past week so have not had time to review/upload - I'll look when I get back on Mondau. Apologies for the lag - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBCAAGBQJU1OwrAAoJEL/srsug59jDz+gP/1kwgRytQaiBhb4BxjvNYdZB U7MUpaLV04SL9Awm2/J3WxCwrwoeyyY2o7huOTkt69+bUEiCxD8wTYhV3X8uSAjR v3vubpKDYnImnFK9e4FDlIDRXaZWmRJzQ+MzYT3Zs7ys2k1jQL1HVFgR3PEazzEI oBus0Yz+XbHFNOiurrIsuvN+iN7gLL0AbSg2Zz0rTE2iSzdOvVqygj15LTXOmtye ydIanhkJKKwMeiKkUYe/8ZEeP9Qn1DeCsFQ+LzU1KYT4L41HudTHG02NGLmOfNUm g3MUHTG6ZmoNgpmrX6IiOGj5fhaHlc9+DEdngG5NNQ81NgPG8qKNu381G9y/iVd1 G04Ht+47TmrJGmtvlxjUOK2O3HLTgxpn9r5Pco1L+64JX4gccmcmz9RK5Aq6VI+3 pU59ocggW+pFkPP5yWgP+S+TLeKzQZl8227weLDz3XJ1Yc52mNTi/fW1IlZhR7jj BCgG0vWJxikmMRuyD6auMt2QxLximRIYQr7rYuU9ccz4GgojMjVBAnOz0PKzNRe4 XNLA/cvAd8atdp++TtYgqLLa148qpdvqnURbjzwCfyfkb3yuiQYxo7FMs+qH/Ltj H7qUvdZFGTGn/axedO5+aS1iNRxKUb5fN8d3AzxhbD7fm7C7YFrSH5qZjMf6Nu9C ogq88X5HGmbK/pmknT3A =QHlS -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#775881: [debian-mysql] Bug#775881: mysql-5.5: Multiple security fixes from January 2015 CPU
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 21/01/15 19:14, Salvatore Bonaccorso wrote: > For wheezy-security I'm just building the package with imported > version 5.5.41 to resolve the issues. Can say more if build > suceeds. I've pushed commits to git.debian.org for unstable; should fine time to build and test in the next day or so. Thanks for doing the wheezy update. Cheers James - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBCAAGBQJUwP+6AAoJEL/srsug59jDhWgP/1bjnh28HsTDLH8GY5n3GWnw OaBRi9GPKLg+jRIVAt96oeiZZPhb5VMnu8RdwBWNUqWbvefpyFjc286S1UnBpm1D MNMRI9KF2+KJblHVyFaemvwv1UrjYUafhYY1mrKcHyQwncbulLHfWzHP1Mv0ib8h /fXU9qKOzyMR+9xmeapifXN6HAJTdxhofSCv0AD47FqzbKjMFDsQgUITciD0F6C0 IJFg2v2qhn8ISMGMIGzdQpplILvjqYBK5wgcUhP0SdbBm5pCtbaa6SotYnpe6MiQ 2DYifV1OtrkOfVWXo/QvvLAu1dTFC4Q/vZvbwWI8gwEZxaFEMzxzeO0lNOjs9qs+ dnacsYoIG6nXs7SYEMY6ilAbtdcMWqOtmdGWnnZiPuwXUlwng29RJh5Y/CNtfknS bvIpW3GkNpzxeO3/h6FvLGUCZr0yIm0BsAH8qDhHVpEpg/f5sWHsrgWLIFzLSFGX g5RDh1U0PI6cJLJ1r/mItNZLGfZ/Pw8Srz9qN1nC+u7W+o781+dq2GmjF1O8nbC5 fMJ/HO6NM/cCet82BEO3nwki0cLMv+3WQranRT8Ml8OiUShnOFF7LTREDcfn/Pwd enzpdZ+8b8TTEPkYLgAk9viEeT5cQBVU6xKmospZLk82kIF4pSqe1LdPFwWREHfd HXmmuWwXxfTVfUlWD5wH =8K/g -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#769337: [debian-mysql] Bug#769337: mysql-5.5: version in jessie/sid lower than in wheezy-security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/11/14 22:07, Aurelien Jarno wrote: > The mysql-5.5 version in jessie/sid is lower than in wheezy, > meaning that people upgrading from wheezy will still use the wheezy > version, while people installing jessie will get a version with > security bugs. > > Therefore, please upload mysql version 5.5.40 to unstable. Onto this for this week; apologies for the lag - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBCAAGBQJUc1v5AAoJEL/srsug59jDqowP+wR9pd9Q1grhbJyQi+pSthI9 w1odpWjvY7EQAa3jTgYusC0gPJaeboEcvDK8vQYv3SYtrTbqkwc5MwVOjq0xpCpw tA3ZXZwaIMKaTJ2Q6BsWGtUXaUaIPpgHFlR05iBaYgMFLbdZaBiCVdDzlt4qIsfu tRyH8A1w+B+nSnOZEsf7ZwvU3hnMUkUud54tc/K9bXM+Fpje+JDV6Jb6aeaIlgDW nWVmd7PFPUG4tIOq174sMk69gatIeYuJEWWwoH+5xUXEh/IQYXDNx1sLjSx4Rifp xvmM2i0TQa0WtJn4qIv12OKG4stWN2Aay5m6RcMgm0O4zZMSpZWE7Hs5YFa7oh8q N9A0xx3ps8VOpz6U7Nd5edjt13yydL/42UZ2Rg50XKmsqErLim2t9eIIWh1Jax0I yRK7f+6fc0pzk1AU9rTuz65TJWG+G5myotoayPez9cpAG9YjxlZVP8zvSvMEKRD9 Uw8jj37t4d2k392zcpfe5Ry42+hpw8YCe/tu8J+ULdhTcLoe6NdOklV4YCHd7Xsh KjRxadSSEBsaA8Uk00kmji/5Uj2Sy/Jlglje3opkogHK0bv+Y0SonF28o9xh7Fvi eTbCVz/KzCvWW1Xcckui575Zj55lWK7Tk6PFyZ/7hvh1wfIcWDMnEawefj06iXKY vsxpor7LoigfCSZlePTh =dpaE -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#757644: also impacts OpenStack
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 this change in the ip supported CLI syntax also impacts OpenStack neutron/nova which rely on veth devices for instance connectivity. Guido's patch looks correct and works for me (and I've uploaded it to Ubuntu to unblock our OpenStack Juno testing - thankyou!). - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBCAAGBQJUCZFqAAoJEL/srsug59jDrjwP/3kAwlpOtzZJQ5cv63hshvr8 Zzq21TeCuxYLZAPh0yh1sQpS8NdoY79IYtWY0T5jdmuvOAsKw4SBIP1UOwFnQrI3 Ct7xe+5jfpzjhjW/RE54ZRzSFW81lnnq4POfVw61n3Q24gtSQ9zoddTccItecx0A o7yH10VvH1u7ctf0PWnJU2JKLMTvVJ+86MNKMAXJzKGRP1oDfKZjZpxRMuk30tcz ztWN3XAYanyoVv3yiNRv1frX0MplZI9evjCIzrCLfV3UNjztBDdOYNA6PUvIBg+T 4xWr/PQOtj/dxko0x9SuzrFmOaDkn79AxcVghBefoE1Brk+BKiyHHJNBLxaDuI4i yaVk3NEq69Wr6SL1KDidq5CBlnwFNuD9JzdcBXILLH07J6bRQ9AVenLVQnvJnp3G cq6eDj5yEcCy4qCQbEV7gMfgghJjIR7c2zyQy2S6HC6yk/L5I2n9305Gg1rXirHs gRdjq3WY/NjVKjSbmn4jRbIA9ajddSMpecNtCzI7yu6RzbhN+eo6OIJ2oEKaZHLc Aj9/WSnV6hwqaCOGJ1398o72pD3g6vQd3r9syNSkugUitetl2chT6o7q9HEtx2nC iLs/i/+Bec5FTGd98GKu9oXLe84GlxPNN0Rxojfom3HHBM76gOPH5WzUMnEpNVTz O7L8ZPop0CjbrIoJHxBA =D6xR -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#734241: Ceph maintenance sloppy
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi Thomas On 08/03/14 06:37, Thomas Goirand wrote: > It is the view of the Qemu maintainers that the Ceph maintenance > in Debian has been sloppy, and therefore, they have removed RDB > support in Qemu in both the Sid and Debian backports. Apologies if this is the perception; I have been trying to rectify this - there have certainly been historic maintenance issues. > If I understand, the issue has been that you didn't receive the > bug mail, and this has been solved. However, I would like to check > with you that you have enough time to maintain Ceph correctly in > Sid, and in backports. If you don't, then would you care for some > help? Would you be interested in adding Ceph to the official Debian > backports? I do have the time to maintain ceph; as you point out we did have a problem with bug mail (which should now be resolved) which did mean I missed a load of bugs in the last month or so. Quite happy to have Ceph in Debian backports as well. > The Ceph support in Qemu is, as you may guess, important for us. Yup > As for #734241, are you planning on addressing it soon? What should > be the fix? It is looking like to me that the Upstart configuration > is very different from the one with sysv-rc. Should a standard > sysv-rc script be created for each upstart script? I have a fix locally in testing which I'd planned to land at the same time as the Firefly stable release which avoid having dummy scripts. I'm not 100% sure that update-rc.d is actually doing the right thing - but I can work around it easily enough with a guard in the maintainer scripts for upstart detection. > Also, have you been looking into adding support for systemd? I've not looked at systemd support just yet - I'll probably work directly with upsteam as this is where the init and upstart configuration come from. Cheers James - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v1 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQIcBAEBCAAGBQJTGtVtAAoJEL/srsug59jDiaQP/2ArT0n1v8h2GLlLfk/WbJNR OGpfOi+UEUpNiyMAfQi0xV7K8kSF5n+jQE/SLgUOklafOvgdlrOJ7/FiOIt5sCF5 fWXLK7RY3mXdjIP5p7ktSHQgs+uX22ZMjmDRJoRQYDcIntKWvOZFf2H18rVToTZV 8PEtNzfUL71gyV0WON6LfbcFWeyFN9bHjF6NgcQH/ktEPPWgwd1xwXEvASfFEoEj 6IzVVCLrM87bSelpMdlsFarlwm4BNw2zhTY8PVsintnZY3aCYmfCpnPXlW00Y3M4 ySKFJH55zu3O7/UjezVKo/XYLhuIUW6Ii945oJSCmGtztT9uQF0YWRRbEOVIK93f UitQImj2S2Mu0mzRyNBI49Bqx6izQUP0s8Z1wZcbFNIMbV2Va/U0zzwgmAwiH046 w+y0r+3K7pGWmQLbv55j9x6oV0svvFfVXQkUGCWDxHdXk9fPNMxYxDm3m1g8bipF I6zTybDOM0RiGZIjdsomKnlL3lLqj3pYxQlcd49xKoNQPgBfqAEstHg0on0sN+jc KjjxKm5ZDFfvp3xD3OHvcT8ECFhZ+XX5QxtKes5eXcgcNc45pyOyb1DRAibO9C7a mCeytnDXmDM1r7/PpeOWSQ4p4Dy/OFcPayg4yyAnGYsmz356FwkyPPpkrFkoXSdW jWEK2+QwDl0snImpuKg5 =dVho -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#734241: init/upstart script problems
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Apologies Looks like bug mail is just not getting through to the maintainer ML. I'll look to fix this for the next upload I do for the firefly release. Cheers James - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v1 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQIcBAEBCAAGBQJTFcS/AAoJEL/srsug59jDfxYP/0iaiVo4wCjLIOHU0+fNF5zb NGjundn/ePad/b84ftul/Dw833wc5aBNvHG6pBzQ+g9eF4YLIhHzbFlNRnf+SmXp de9LjsCNg10i/QpTywIocx2Iy8czRbHx8fRTjpOQFYARViazoeYNDiuyTOHo/oQh BGZdE8sCA2gWHuGBd8TcKdi+aZhbLxWqn/9eB4TtmTkzvwoggVEKHyhUr+isQfZm rt8DeaenhWLtmcI/sD/baVJbSIDGuKy4o/8V21p13rchQOVYpaBNM77zzOhFMQV2 fYvv0ZWt9QPjjpp/xgwmDUwBRhn8RfZOU3UzGi0MJPjodthhmb4gxA/qWNRpPFdr /hVyOp+l29jghJp7nwVo0qMOVXMnGGmeYPekQVi0BWo8OTHom1lU53I8T97GnXBb Ly6ITjRU9P3tZ5IO5DkIS+FyRWgccSi/CNJSm3JTpB+LWuH4D2zkaTGNsN8YcFXt XceuFuX7/+EZGjbD8wbkHGagb8oeL5pV52ANPf5lHXEz6+ybUe4AwzqTWFmv6pU/ 99AvDzklJy1iBRMWzu//Gau/MfgE/wEbQlZGZRxrTxAkZ5FoAdxbVXfIaw2eSkks IKbwzCRH9Neq062pa5TcBYASO26v7eUxvxIvvBb6KU427IZgzkpYdVPRW4OdqpIr obZKWeT6+yf/lksXyrYS =rJ4o -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#739841: [debian-mysql] Bug#739841: mariadb-*-5.5: file conflicts with mysql-*-5.6
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 23/02/14 02:39, Andreas Beckmann wrote: > Maybe myriadb and mysql should agree on a set of virtual packages > that can be used for Provides/Conflicts/Replaces to avoid > constantly updating package lists in multiple places whenever there > is a major upstream version bump. Yes - and this is something we have discussed quite a bit; but I think we need to expand the use of virtual-* package a bit more than we have already. - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v1 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQIcBAEBCAAGBQJTC08CAAoJEL/srsug59jDn/cP/3Xj7rN3236LHSCju7gKheG0 DHtGLp1VE4t4qlNs9LQW3QryI269TjWlfAHzzbZjx9fsjrhGc1b51b4YPX91GgMf tNKEZ+1y9cAm2DVVpF8sqJ+ZBpkUWKGfaghpsQFJZKm3R0f4KCc2aqBBo4S6U8WR UgqOnYMnmzRG1B9odxHknd/QKeHif19PWX+y/xZW/eetX5ivL1v8AQkL0iZFRBAN w1Nx3QRMYIdrt7UiZQy2tQSuV41CQiMH8txzjb3Ly/2uuvXErhvr+eG1yZbz5jFJ OIU73q6zYT1Mbs92JAllCMjQ2WuwNNtCZWNS4Q0kx7FcIeq88QbRd5gj62WaF7Qc b0wNAsXt3GViQxzXlzrQWLH8HqK7o3PVXI5lYWTdZGkDqv1MAqD0VhtZA+IhxEGZ fy6LIGAxKnA0bLGE/iwAk7VSWakcfQE8dgibu570HF/Uf/HzXkSihP/vo3tHVd5A BKBSHyFUNcUGkxyD2kTw+/jYPwwNZIe090ob//rKiM7E6BQImQa/ScEJqdnssxxt 6VcaENqMbJ4D32rgvE+3aGp5mz5aYoN/oIHNW51rAcLpHPXBJz/MZxOFpQ+q+STL iQ32Rcl24QJiRPLRhA8TdF+TaVlSh4MPA60fjamhZCCqy6rpUpDHNpd/zlVX/VH6 50xWAkh7yGYTeG8Iw2ae =NHDa -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#730457: Vulnerabilities don't impact jenkins core
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi Moritz Looking at the upstream security advisory, these issues impact plugins that are not packaged either in jenkins or separately in Debian. I think this bug can be closed out. Cheers James - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.15 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQIcBAEBCAAGBQJSocUxAAoJEL/srsug59jDJi8P/iWWU3KSZTn0IZ2Q9TGbzMA3 yJi8wErOArIrTrjpPTADF/LUNESydR/O1nsQxUowL5cXfZC7ZCV7IY4bm/5SLucO d1tnLEX8l8KNxMYFCo0I/Hb09YD4dOQl3zvtCI+x4YDjLkRhuMS/7t9TreEXDzUp jJW1nWsEI0LcmvElRe6MlKGEVjyRjbCuV4m7hMVi/T091fXihxhZ6GKBg0gJ7lA/ CsiOTkqygnpaAcfwG1qH1MNe8aH6NdJaZENE/2faFBRq2G3aWe7kxla5yC6YeAyV /KJMZFif288i/X50UR+uACAZ3sf/VfO3iVB9aPxIzqvWwMd7A1X2g7RTIIgnxsux P6chFrlTkxU1mmVC0mR29P1UFYVndKogqZ5zQ5rzVmbapGkcWkB+pHyOJ27piaus mSwUf6P+zz198Ae208NX93LyW9WsHAQtU1F3SH7RyxB8woti8t9uDFUy2YvFapOy 0hczNzdk/l56tpKUKhMqpwTjcIJC+xi55vGhcmfRYEv3sm2mvFe4N3Lu3kA0cukj ADusAvfYYzRC+lWxoq+LyBLXOPvme6mLGbnc3SGFzNIODNcuDww0/VDnCnN1yG3E /IacPpcX7jjOkOAt5dmlEkm+At80MpoeuaQIVIovm0jeOvkRM1bKHKwCAQeIY28D dSw5HkgRr/7fBh436Hx6 =GV5A -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#728425: python-babel: Patch to make tests deterministic
Package: python-babel Version: 1.3+dfsg.1-1 Followup-For: Bug #728425 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu trusty ubuntu-patch Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: * d/p/0001-Fixup-get_currency_name-test.patch: Make test for get_currency_name deterministic and add check for plurality. I submitted this upstream as well: https://github.com/mitsuhiko/babel/pull/73 Thanks for considering the patch. -- System Information: Debian Release: wheezy/sid APT prefers trusty-updates APT policy: (500, 'trusty-updates'), (500, 'trusty-security'), (500, 'trusty'), (100, 'trusty-backports') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.12.0-4-generic (SMP w/4 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash === added directory 'debian/patches' === added file 'debian/patches/0001-Fixup-get_currency_name-test.patch' --- debian/patches/0001-Fixup-get_currency_name-test.patch 1970-01-01 00:00:00 + +++ debian/patches/0001-Fixup-get_currency_name-test.patch 2013-12-06 11:53:11 + @@ -0,0 +1,26 @@ +From 50f727ac2c741877235c592ce4e1f50bba08162c Mon Sep 17 00:00:00 2001 +From: James Page +Date: Fri, 6 Dec 2013 11:49:26 + +Subject: [PATCH] Fixup get_currency_name test + +This test failed in environments where no default locale +can be determined; make the test deterministic and add +additional test for plurality. + +Signed-off-by: James Page +--- + tests/test_numbers.py | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +--- a/tests/test_numbers.py b/tests/test_numbers.py +@@ -173,7 +173,8 @@ class NumberParsingTestCase(unittest.Tes + + + def test_get_currency_name(): +-assert numbers.get_currency_name('USD', 'en_US') == u'US dollars' ++assert numbers.get_currency_name('USD', locale='en_US') == u'US Dollar' ++assert numbers.get_currency_name('USD', count=2, locale='en_US') == u'US dollars' + + + def test_get_currency_symbol(): === added file 'debian/patches/series' --- debian/patches/series 1970-01-01 00:00:00 + +++ debian/patches/series 2013-12-06 11:52:48 + @@ -0,0 +1 @@ +0001-Fixup-get_currency_name-test.patch
Bug#728293: libusb-java: Patch to resolved build issues where default-jdk is not openjdk-6
Package: libusb-java Version: 0.8+ztex20090101-6 Followup-For: Bug #728293 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu trusty ubuntu-patch Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: - d/p/jniInclude.patch: Restore original auto-detection of JAVAPREFIX so that package continues to build on targets with default-java != openjdk-6. Thanks for considering the patch. -- System Information: Debian Release: wheezy/sid APT prefers trusty-updates APT policy: (500, 'trusty-updates'), (500, 'trusty-security'), (500, 'trusty'), (100, 'trusty-backports') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.12.0-2-generic (SMP w/4 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff -Nru libusb-java-0.8+ztex20090101/debian/changelog libusb-java-0.8+ztex20090101/debian/changelog diff -Nru libusb-java-0.8+ztex20090101/debian/patches/jniInclude.patch libusb-java-0.8+ztex20090101/debian/patches/jniInclude.patch --- libusb-java-0.8+ztex20090101/debian/patches/jniInclude.patch 2012-09-16 20:37:40.0 +0100 +++ libusb-java-0.8+ztex20090101/debian/patches/jniInclude.patch 2013-10-08 23:13:04.0 +0100 @@ -1,14 +1,11 @@ -Index: libusb-java-0.8+ztex20090101/Makefile -=== libusb-java-0.8+ztex20090101.orig/Makefile 2011-02-02 13:13:45.0 +0100 -+++ libusb-java-0.8+ztex20090101/Makefile 2012-09-16 20:45:06.0 +0200 -@@ -13,7 +13,8 @@ +--- a/Makefile b/Makefile +@@ -13,7 +13,7 @@ # # $(JAVAPREFIX)/include should contain jni.h -JAVAPREFIX=/usr/local/java -+#JAVAPREFIX=$(shell find /usr/lib/jvm/ -name jni.h | sed -e 's/include.*//' | head -n 1) -+JAVAPREFIX=/usr/lib/jvm/java-6-openjdk-$(shell dpkg-architecture -qDEB_BUILD_ARCH|tr -d "\n") ++JAVAPREFIX=$(shell find /usr/lib/jvm/ -name jni.h | sed -e 's/include.*//' | head -n 1) ### # this should not be modified #
Bug#729025: python-json-patch: As applied in Ubuntu...
Package: python-json-patch Version: 1.3-1 Followup-For: Bug #729025 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu trusty ubuntu-patch Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: * d/rules: Install versioned binaries for python3 package (LP: #1250088). Thanks for considering the patch. -- System Information: Debian Release: wheezy/sid APT prefers trusty-updates APT policy: (500, 'trusty-updates'), (500, 'trusty-security'), (500, 'trusty'), (100, 'trusty-backports') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.12.0-2-generic (SMP w/4 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff -Nru python-json-patch-1.3/debian/changelog python-json-patch-1.3/debian/changelog diff -Nru python-json-patch-1.3/debian/rules python-json-patch-1.3/debian/rules --- python-json-patch-1.3/debian/rules 2013-11-07 08:28:15.0 + +++ python-json-patch-1.3/debian/rules 2013-11-11 16:53:14.0 + @@ -24,6 +24,10 @@ python$$pyvers setup.py install --install-layout=deb \ --root $(CURDIR)/debian/python3-json-patch; \ done + set -e && for file in jsonpatch jsondiff; do \ + mv $(CURDIR)/debian/python3-json-patch/usr/bin/$$file \ + $(CURDIR)/debian/python3-json-patch/usr/bin/$${file}3;\ + done override_dh_auto_clean: dh_auto_clean
Bug#705262: ceph
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 15/09/13 20:04, Bastian Blank wrote: > On Sun, Sep 15, 2013 at 06:23:23PM +0100, James Page wrote: >> On 15/09/13 12:03, Bastian Blank wrote: >>> There is a python script ceph-rest-api. Where is this used? >>> Why does it warrant a dependency on 20 other packages? >> Dumpling (0.67.x) is the first release with basic support for a >> REST api for administering a ceph cluster - this binary supports >> this feature - but more of a demo of how to use than anything >> really usable (dev mode only). However I do agree that it looks >> like it should be in ceph. > > How does the authentication work? The whole Python code in Ceph > looks pretty bad for me. Ceph itself uses a key based kerberos style authentication system called cephx; the ceph_rest_api library uses the keys/config in /etc/ceph but provides no additional auth for HTTP API access; neither does the wrapper ceph-rest-api which is why right now there is no init script or upstart configuration for this feature. I make no general observations about the python code in ceph other than it's worked well for me for the last 18 months. > >>> Because ceph-disk (another incompletely documented >>> indirection) uses it. The important parts (ceph-mon, ceph-osd) >>> works fine without it. >> ceph-disk is a key part of the deployment infrastructure for ceph >> so these are important dependencies for anyone deploying ceph at >> scale using upstream Chef recipes or ceph-deploy. > > Well. Then it would be one, not three diffrent implementations of > fdisk. Technically its just two - gdisk and parted; I don't have any strong objection to upstream using two different tools if it makes massaging block devices easier for them. >>> Not a concern for Debian. It was never in a stable release. >> I think it is a concern for Debian; the principle source of Ceph >> packages for Debian to-date has been from upstream, so ensuring >> smooth transitions to/from Debian/upstream is important IMHO. > > Nope. Other sources are no concern. I'd like to try and play nice with other methods of distribution especially if one of those has been used extensively by Debian users to-date; makes life easier for potential users of these packages. >>> At least the dependencies for librados2 and librdb1 needs to be >>> stricter. The dependency on libcephfs1 is missing. >> Agreed - python-ceph only just grew bindings for cephfs so that's >> just an oversight. Good spot. >= on equiv binary package version >> should do the job for the librbd/rados depends. > > Nope. They need to be ==. The (bad written) Python wrappers uses > ctypes, which does not implement a full ELF-loader. OK; I know they are just a simple wrap over the core libs so that makes sense. >> Laszlo - re -java/-jni split - this is in compliance with the >> Java packaging policy: >> http://www.debian.org/doc/packaging-manuals/java-policy/x114.html > >> > You forgot the "should". Plus this is not part of the Debian > policy. Meh - well it works for me; the -java is arch independent whereas the - -jni is not; saves duping the jar file in binary packages. If the -jni every gets multi-arched then this approach is required anyway. >> I really think we need to stick with the packaging structure and >> naming that is already in place as much as possible; All of the >> existing deployment tooling (chef, juju, ceph-deploy) is written >> based on this structure on Debian based systems; diverging is >> just going to create work in other areas and potentially alienate >> the Debian packaging as its different to the packaging that the >> Ceph community has been using for the last two years... at >> least! > > I'm talked to the ftp-masters. They usualy don't like if a package > is split too much for no apparent reason. It is nice if they are > compatible, but for Debian all problems have to be taken into > account. I don't think the ceph packages are split for no apparent reason; I believe that by adopting the current structure which works with the most popular deployment tooling for ceph we work with upstream, rather than going against the grain. - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.14 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/ iQIcBAEBCAAGBQJSNhlBAAoJEL/srsug59jDgQgQAM91nm57XBaWGQoxJ6mC7hy3 n0hsT9ehI+FJDL2nC9jr1vSBCMgQKgfkt4LHrBXUt4t/Dz6YVu1vwZbmrhfP36Bi O1WcZ+StIJZaBxHYq37XheoLqShR39VSPfGmp7dK5u0RBrcqj1PatVfF/oYrLSxL KSkqmccaOeAvbE0G4gGuceEuLnR6ZI1kgeJkFCE0daEt
Bug#705262: ceph
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Bastian & Lazlo On 15/09/13 12:03, Bastian Blank wrote: > On Sun, Sep 15, 2013 at 12:30:22PM +0200, László Böszörményi (GCS) > wrote: >> On Sun, Sep 15, 2013 at 12:00 PM, Bastian Blank >> wrote: >>> However there are several problems left: - ceph-common depends >>> on python-flask and python-ceph. >> Why this is a problem? What I see is that python-flask should be >> moved to python-ceph . > There is a python script ceph-rest-api. Where is this used? Why > does it warrant a dependency on 20 other packages? Dumpling (0.67.x) is the first release with basic support for a REST api for administering a ceph cluster - this binary supports this feature - but more of a demo of how to use than anything really usable (dev mode only). However I do agree that it looks like it should be in ceph. >>> - ceph-common is not _arch-all_, why does it exist? >> Tools that used by other packages that can be installed >> independently. Should it be named like ceph-base or ceph-tools? > > Not sure right now. It looks like a random dash of tools, stashed > together without much thinking. - ceph, rados, rbd: Tools to manage > different parts of ceph, remotely. - ceph-authtool: Works on > keyring files, so needs to run locally on the monitor. - > ceph-rest-api: Where does this belong to? - ceph-dencoder, > ceph-syn: This are test or debugging tools. > > I would - move ceph-authotool and maybe ceph-rest-api into ceph, - > move cephfs and mount.ceph into ceph-common - move ceph-dencoder > and ceph-syn into ceph-test, - move stuff from ceph-resource-agents > into ceph and - drop ceph-fs-common and ceph-resource-agents. > >>> - Why ceph-mds? >> Ceph has three independent blocks. Metadata servers (-mds) are >> one of them. Please see the overview[1]. > > Yeah. But why does it need a different package? What does this > extra package bring for the user? For context, the ceph-mds function was split out in the packaging as MDS is not as well tested/production grade as the RADOS and RBD features; In Ubuntu we use this to signal which parts receive full support from the Ubuntu Server and Security teams. I appreciate that this is not required for Debian but its also in the upstream packaging so it would be nice if these splits could stay (see notes below about why keeping packaging consistent across upstream, Debian and Ubuntu is a good idea). >>> - ceph depends on fdisk, parted and whole lot other crap it >>> does not need. >> Agree on this. Don't know how it made there. > > Because ceph-disk (another incompletely documented indirection) > uses it. The important parts (ceph-mon, ceph-osd) works fine > without it. ceph-disk is a key part of the deployment infrastructure for ceph so these are important dependencies for anyone deploying ceph at scale using upstream Chef recipes or ceph-deploy. >>> - A lot of Replaces. >> There were package renames, users may have packages from upstream >> or Ubuntu. That's make it complex. > > Not a concern for Debian. It was never in a stable release. I think it is a concern for Debian; the principle source of Ceph packages for Debian to-date has been from upstream, so ensuring smooth transitions to/from Debian/upstream is important IMHO. >>> - python-ceph needs stricter dependencies. >> Will check. > > At least the dependencies for librados2 and librdb1 needs to be > stricter. The dependency on libcephfs1 is missing. Agreed - python-ceph only just grew bindings for cephfs so that's just an oversight. Good spot. >= on equiv binary package version should do the job for the librbd/rados depends. Laszlo - re -java/-jni split - this is in compliance with the Java packaging policy: http://www.debian.org/doc/packaging-manuals/java-policy/x114.html I really think we need to stick with the packaging structure and naming that is already in place as much as possible; All of the existing deployment tooling (chef, juju, ceph-deploy) is written based on this structure on Debian based systems; diverging is just going to create work in other areas and potentially alienate the Debian packaging as its different to the packaging that the Ceph community has been using for the last two years... at least! FYI once ceph is up-to-date in Debian I'm intending on landing ceph-deploy as a way of deploying ceph on Debian - it makes testing much easier. - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.14 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/ iQIcBAEBCAAGBQJSNe0LAAoJEL/srsug59jDGLEP/3KDiq6fbzcNUeaw0JuCSK0F QNfMdAQWRa86UX8zOJvtlhjbRJlwPWY4kRj52fxsXZTOcs+9t+ooTZ0ACwYTy0K3 j
Bug#714596: Bootstrapping jenkins
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi Thomas I don't think its feasible to remove the circular dependency in Jenkins due to the complexity of dependencies and the age of the project upstream. I did give some thought how to work around this. Its probably possible to build jenkins without the modules that are causing the circular dependency; they would have to be patched out of war/pom.xml. Once you have this version, you can build the modules and then a second rebuild with the BD's back in place will fix things up. I appreciate this is less than ideal. Cheers James - -- James Page Ubuntu and Debian Developer james.p...@ubuntu.com jamesp...@debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.14 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/ iQIcBAEBCAAGBQJSCUolAAoJEL/srsug59jDXpIQAJyQS0vYVFrRNBzekhpJZrAA XhynuFcTJCbj+EJ80uLYAn+EHtbdXhiHhsW0TxZ8xFUF6Z2kBw6RpkPXIfQ/BEHp NB5YniZ3LX9aAbX0XBrCZvyjSEaut7PZwsh8/QGwIaYQApzxeZ0zHfEl7GhlbIZN oOB2ucNHGQbX9KIjGUsl6v+WI7uxWuvYw/xCor18yxfa5cHEHjzRF4DbiCvqNHMD 82MnPlY39XvTehtPVYng0aKTEmbuZYrW+n9sbV1b9n+GU7Wz4tgnuvIXFfIBgBeu j7JwRTB4kcg2yF2kffLUHVGzf3ckFfKQiI62h61gq7GKSZ5khtOf65Pz/I353HQP rktpMy6ukLj9W5ImRv2/7xTYQ+mHGOlz4x6HT+gutwbjBHJ9yXSzqSAlI56X946O +djhbU17EZA/ShwZxNnQ1s6Bo5VGBdDhnzTNFOCumfYHWi+/9uuTp5wLSRbN108m WiPPa3HtSvv0FGLvMdyR12EAMN6M4Ss6q+LRQlPhzFzhDNuI1xaFoltpvQxiQ2Rc MfWeNhSuMjaKRusw+v54vJt1zc193yJI3wvZZgx8C7UwJQXSuC8ilKqZ4YZGgNMA 4JXGErxTwPnvW80O/UOVZMvaDeDh2PSpyn+ptt5gFR2D/TynOCJvc/Zr2j9lQRun 98yXF9h0tDJy7dDIMv9l =Wd1v -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#701324: mongodb-server: Compiler flags for use with gcc-4.8
Package: mongodb-server Version: 1:2.4.3-1ubuntu1 Followup-For: Bug #701324 Dear Maintainer, In Ubuntu, we are using the attached patch to ensure compatability with gcc 4.8. Part of the patch came from upstream trunk (for mongodb itself); the other part I added for the switch-back to using the embedded version of libv8. Cheers James -- System Information: Debian Release: wheezy/sid APT prefers saucy-updates APT policy: (500, 'saucy-updates'), (500, 'saucy-security'), (500, 'saucy'), (100, 'saucy-backports') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.10.0-6-generic (SMP w/4 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mongodb-server depends on: ii adduser 3.113+nmu3ubuntu2 ii libboost-filesystem1.53.0 1.53.0-4ubuntu3 ii libboost-program-options1.53.0 1.53.0-4ubuntu3 ii libboost-system1.53.0 1.53.0-4ubuntu3 ii libboost-thread1.53.0 1.53.0-4ubuntu3 ii libc6 2.17-91ubuntu1 ii libgcc1 1:4.8.1-8ubuntu1 ii libgoogle-perftools42.1-1 ii libpcre31:8.31-2 ii libpcrecpp0 1:8.31-2 ii libsnappy1 1.1.0-1 ii libssl1.0.0 1.0.1e-3ubuntu1 ii libstdc++6 4.8.1-8ubuntu1 ii libv8-3.8.9.20 3.8.9.20-2 ii mongodb-clients 1:2.4.3-1ubuntu1 ii sysv-rc 2.88dsf-41ubuntu3 mongodb-server recommends no packages. mongodb-server suggests no packages. -- no debconf information Description: Disable unused-local-typedefs errors Disables new unused-local-typedefs as found in gcc 4.8 . Based on commit to trunk upstream. Author: James Page Origin: https://github.com/mongodb/mongo/commit/2d30f0b562c1925a52670e767c2c0222189fb8f0 --- a/SConstruct +++ b/SConstruct @@ -715,6 +715,7 @@ if nix: env.Append( CCFLAGS=["-Werror", "-pipe"] ) if not has_option('clang'): env.Append( CCFLAGS=["-fno-builtin-memcmp"] ) # glibc's memcmp is faster than gcc's +env.Append( CXXFLAGS=["-Wno-unused-local-typedefs"] ) # New in gcc 4.8 env.Append( CPPDEFINES=["_FILE_OFFSET_BITS=64"] ) env.Append( CXXFLAGS=["-Wnon-virtual-dtor", "-Woverloaded-virtual"] ) --- a/src/third_party/v8/SConscript +++ b/src/third_party/v8/SConscript @@ -51,7 +51,8 @@ LIBRARY_FLAGS = { '-W', '-Wno-unused-parameter', '-Woverloaded-virtual', - '-Wnon-virtual-dtor'] + '-Wnon-virtual-dtor', + '-Wno-unused-local-typedefs'] }, 'mode:debug': { 'CPPDEFINES': ['ENABLE_DISASSEMBLER', 'DEBUG'],
Bug#713381: FTBFS in jjenkins -> ant problem
This is actually a problem in the ant package; the artifacts versions are not being rewritten to 4.x for junit4 dependencies. -- James Page Ubuntu Core Developer Debian Maintainer james.p...@ubuntu.com -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#711582: closed by Chris Lamb (Bug#711582: fixed in jasmin-sable 2.4.0-3)
On 11/06/13 05:26, Jeremy Bicha wrote: On 10 June 2013 18:36, Debian Bug Tracking System wrote: * ``mkdir -p`` over ``mkdir``. (Closes: #711582) Why do you need to explicitly create a directory that already exists when built in a clean Debian or Ubuntu chroot? I suspect that Chris added the mkdir as the package source is on github and git does not like empty directories (and classes is in the upstream source). This is not a problem when building in a chroot, but probably is when building in tree: dpkg-source: info: building jasmin-sable using existing ./jasmin-sable_2.4.0.orig.tar.gz dpkg-source: warning: ignoring deletion of directory classes So having the -p option makes the build work in both cases. -- James Page Ubuntu Core Developer Debian Maintainer james.p...@ubuntu.com -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#711582: jasmin-sable: Patch to fix FTBFS
Package: jasmin-sable Version: 2.4.0-2 Followup-For: Bug #711582 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu saucy ubuntu-patch Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: * d/rules: Add '-p' option when creating classes dir to prevent FTBFS. Thanks for considering the patch. -- System Information: Debian Release: wheezy/sid APT prefers raring-updates APT policy: (500, 'raring-updates'), (500, 'raring-security'), (500, 'raring-proposed'), (500, 'raring'), (100, 'raring-backports') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.8.0-24-generic (SMP w/4 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff -Nru jasmin-sable-2.4.0/debian/changelog jasmin-sable-2.4.0/debian/changelog diff -Nru jasmin-sable-2.4.0/debian/rules jasmin-sable-2.4.0/debian/rules --- jasmin-sable-2.4.0/debian/rules 2013-05-22 23:46:56.0 +0100 +++ jasmin-sable-2.4.0/debian/rules 2013-06-10 09:14:41.0 +0100 @@ -10,7 +10,7 @@ dh $@ override_dh_auto_build: - mkdir classes + mkdir -p classes ant build_parser jasmin-jar override_dh_auto_clean:
Bug#683502: jedit: Refreshed patch
Package: jedit Version: 5.0.0+dfsg-1 Followup-For: Bug #683502 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu saucy ubuntu-patch Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: * Merge from Debian unstable. Remaining changes: - d/control: Switch to using default-jdk for build, don't use BDI's. Thanks for considering the patch. -- System Information: Debian Release: wheezy/sid APT prefers raring-updates APT policy: (500, 'raring-updates'), (500, 'raring-security'), (500, 'raring-proposed'), (500, 'raring'), (100, 'raring-backports') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.8.0-22-generic (SMP w/4 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff -Nru jedit-5.0.0+dfsg/debian/changelog jedit-5.0.0+dfsg/debian/changelog diff -Nru jedit-5.0.0+dfsg/debian/control jedit-5.0.0+dfsg/debian/control --- jedit-5.0.0+dfsg/debian/control 2013-03-24 20:34:07.0 + +++ jedit-5.0.0+dfsg/debian/control 2013-05-26 22:04:12.0 +0100 @@ -9,6 +9,7 @@ bsh, bsh-src (>= 2.0b4-11), debhelper (>= 7.0.50~), + default-jdk, docbook-xml, docbook-xsl, docbook-xsl-saxon, @@ -20,7 +21,6 @@ libjsr305-java, quilt (>= 0.46-7~), xsltproc -Build-Depends-Indep: openjdk-6-jdk | sun-java6-jdk Standards-Version: 3.9.3 DM-Upload-Allowed: yes Vcs-Git: git://git.debian.org/pkg-java/jedit.git
Bug#696816: jenkins: Security issues were found in Jenkins core
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi Steve On 25/01/13 15:18, Steven McDonald wrote: > The issue was raised on debian-devel[0] that this bug still > affects unstable and is causing jenkins to be a candidate for > removal from wheezy. I have backported the fixes for these issues > from upstream git; they are attached to this e-mail as separate > quilt patches for the sake of cleanliness. Thanks for the patches. > I have also uploaded a source NMU package[1] to > mentors.debian.net, which I intend to seek sponsorship for if I > don't get a reply to this bug report within 72 hours (as the > deadline given by the Release Team for removal from testing is 31st > January). I'll get a new version uploaded to unstable today; note that jenkins is also effected by another security vulnerability (see [0]) which I am currently waiting on upstream for a backported fix (its big). Thanks James [0] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697617 - -- James Page Ubuntu Core Developer Debian Maintainer james.p...@ubuntu.com -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/ iQIcBAEBCAAGBQJRB7wfAAoJEL/srsug59jDnX8P/1JftdCtKAeVDocwyoz9vzWZ TkPurLAds5tU1lfp3adn41BpVnvzkuzDkT09yfYZlupqT8I14DfY0jSyCdCx/IrB q2D9Rl7if3OQTq5cNgVAAzdg9LLyo9b2Pyj97N1B0zUTjDZTYwSlYE+alj7AuXcq ahdDxNXCE46ZWfqwD+jpBjo4LRcdk/wL8zodu4rvBNFT6bfYV61yWNcrHg8g0eRm abQHngL3C/yM6hUKSXWp/nurQmZLa/8gG4V1TV8Oal1JbhHakCyUDtxDMTjupmbU J4QpN6wAdGndkzx+r85FoM4NqvoWRCUB8RCN4JOWF9zsK2hAVPceCMaf20+zH71j +Ro42JytCbis9vlJfKkJqQnNaHcx7QL8xAykgSlIRdmDx9AdbGAWB7M5CMMtGJvW 3LXcFvcWHBKltqsvbG4/gwn/BR7bN0tZXQoquzYzjpT9qsiPf9oXt3KhPcFI0NO0 TtEltRdQ3NkT5cEBFVd0Cjz4qrsLIgRehJ0Tn+DK+TaCfXOarwExdqx1KrxwN0oO IR0OMcW+nsxBI6IBCQkxtJ+MS+KNlQQA79XnYEnu1QyG5uJF6ibiV3+NJ1O3Aa4G 6Cq9ghV1lNwzj12CAoOkIZ+em+U2BZ2aHkC5LNC7gD4cMG78mgB5oQiuX26Lu5nc 8GE5eDO4br+DTV6Qdz3g =jvHr -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#697617: jenkins: remote code execution vulnerability
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 10/01/13 15:46, Miguel Landaeta wrote: >>> We might want to consider whether updating unstable/testing to >>> 1.480.2 is actually the best way forward at this point in >>> time. > Hi James, > > I don't know if it is feasible at this point in the release cycle > to have a new upstream release of jenkins in sid even if it fixes > some security issues. Agreed; its a last resort. > I backported the fix for CVE-2013-0158 from stable branch and I > applied it to 1.447.2+dfsg-2. It applies cleanly but I'm getting a > FTBFS. I don't have time to review it right now but I'll go back to > it later. > > I'm attaching the debdiff I got and the FTBFS log error. I did much the same for the version in Ubuntu 12.04 (1.424.6); and hit similar issues. The key problem is the extent of the patch to fix this issue and the amount of code change in the TCP/Agent communication area between 1.480.2 and earlier versions we already have packaged. I'm trying to get some advice from upstream on this - hopefully I'll hear back in the next ~24hrs > BTW, recently the team of developers with I work with began to use > Jenkins so I have some interest in it. If you are OK with that I > can jump in as co-maintainer. Yes please! Cheers James - -- James Page Ubuntu Core Developer Debian Maintainer james.p...@ubuntu.com -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/ iQIcBAEBCAAGBQJQ7vRvAAoJEL/srsug59jDePQP/3ZNVyvgr6jsG66T1Q/6QEkt HdtZd01UkKZyjmRFwjVDTA73Iu4Y8DI7xArmt4CwzMLwBom5T77wqI80zcr2IjpM /QRJmi9rycztfPvjdGfHSZDR2s/9i+nrHIEBEi+I35zkFROj9QTN6cbmytEw2/LU p7oEsiysl6n/zvj5DqnsH5VjvqmQ1Y7ovR7MBT27ZRTXI39k3dzIM8eOpU/la4Mw t2kKbMJ/M+Xm6eb5G1XHpogQ2/v7WRXMNy0LZdg18shsVrduMf99c+ScacdEWPYf txNos0lmjV+dWfXgQFUNn390Im/u3SceounIKQ9ppiiA4osmptn2x8fwcQHHR+Bg Ph2Yn+Oln7mIASoZ9Ge9MK3ydIDt4UHaAltGoJJdQc4gs9Zc7h/AhD0dwaNodk3E BB3yZOKE46kAhlUx4u6PDxy2k6FmJY0eTY3J3Rp1s2V6quaNI1xvnXDkTHfDpgFr zdznY6D5KTvuSvqXCrufg4z5D/yWev5OYLis+QYS0mf7QuOsg2F8EFRywupqps1P qi+1+dKdiNg94Xwh+Gwt8OpT44yhWWIp2Wcg+ujisBeKf+XDrb/7V3BZk9hYSkuv dETJrGPlKqkLvQv8fIpOhpENDYiMNtMtHGSs/C7UETcNnAH4LmsLt05GihxgFPQH yfY6QFN5a2Gt7Km9ymag =XG02 -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#697617: jenkins: remote code execution vulnerability
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/01/13 00:54, Miguel Landaeta wrote: > Hi, > > I'm working in backporting a fix for this issue to this version of > Jenkins. It doesn't too hard to do it but I had not tested > properly the patch I got. > > If everything goes well I'll attach a debdiff to this bug report > very soon. Thanks Miguel; I'm also about to upload the latest version of Jenkins to experimental which includes a fix for this issue and http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696816 (which requires a new version of jenkins-winstone as well). We might want to consider whether updating unstable/testing to 1.480.2 is actually the best way forward at this point in time. - -- James Page Ubuntu Core Developer Debian Maintainer james.p...@ubuntu.com -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/ iQIcBAEBCAAGBQJQ7pX6AAoJEL/srsug59jDM9sP/3E07QJTYx8B+gltG2+Wc6Qh Lyn/qXV1GPrUs2pKwzyhUa6gOBdQ6CR+PsVa529aSw4j8sIrcLl5qGLexJE6xuC6 u2Fwl5SgFi7WZriS1pK8NEHVyVncjU39gVLCrIrS0U06V6PSDZ+9wfnWDQE/Jzuo WUgOh09YEhxJYdqWt+OsrvMirtCY1w5CzofS+TQ414GHj7mVZAVgRgZwxf3N+Vaz u2avaaqC1cQcb2ZTPfsN/bDlFRNFREJTpHtLhfCmhhAwsveL9LkOCX/NcJOQm/LP PF1WWrPzrDyLzqdNhp6awnndOFOvkq27Pkb0V4G8wom1chgPONEKSrzYFmzphKo9 zPOxiVkK8FOu4hb4J+KNS57KN/t3v/mUad7aoXMVlMUtMv2dbCIGhW2Nf89YbaWC YSbcdTVk0EM/0ar2P3gvcAZGlppMKjbbAYvAWWN/3BPdfYyRwVsw1Hq72tPvrr6a 7hBZ6uKzool8RZAf9qSfSWC/a17NELKXnrbtb8bglHGwOgltkQHoRWC2fyL4t+w+ QH1HdLeP/Yc/GCZK1jwtOVRW5XxIXqyzcD+/YncIUVNqtIFLmBZbLEw56JspxxKl Nix1M9OYKIDa1rBKjYER5ICZXdrv1hUerqLgGe4/+E8x/WT2XB6m1bTkt6YOsn5Y jiqHFGUNyH80R1k5EBKF =biqm -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#688298: jenkins: Multiple security issues
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Note that the jenkins package in Debian is not effected by: CVE-2012-4440 jenkins XSS in Violations plugin CVE-2012-4441 jenkins XSS in CI game plugin These are problems in plugins which are not built as part of the jenkins source package. I have a fix from upstream for 1.447.2 - testing now. - -- James Page Ubuntu Core Developer Debian Maintainer james.p...@ubuntu.com -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://www.enigmail.net/ iQIcBAEBCAAGBQJQYYMIAAoJEL/srsug59jDrBAQAMQC1TNbPRYxBb9kvzdMIZ1y R/l2AEbXO8iQPnU5/8Dk/QviMtYZ0RcVea5bY7pn4YD1zXueGpQk4YGorN2zaAfK OayVFsGySH1w9MioXxdtZnYeySA/Df2yV6cjeuLjxoSYmyDUotSDtaW9IFURMgwb Xv5nKZeyH0W2jcy4GLl5ZGwhpVMBTkLFUGmp9lQtYTx3Q3lFOSUt1G47h7WoplAp xXN1cHhKj6wU/IBu0fDwJ4bsb2e6X0GxW4Uhy64sZBUP4AB18+kk3e2iPeOVeCTJ ySpqqj+7N+hzu8DiYVMSFXcdsYFOUPVTCESn2FDG2XSy0Jpmrj88jlDb0U2jqM1Y yaz2v8TXzVGQjnuIwUx+l9XVzBQXl0VsuCVgqt/MGM1ijlt19aUE/1AZ6DpL/KWA cjqetPkSjbYOCnOFKmr6TzvFdpkBnunkYgYQt2XWtK59s1l60eiWSHvfV0vDknNi TvcSQl/OVDbaZQEEsJiFh5HRVTYkKEH339+76RZzwQI8l2FZpV4APnhl//fvGvBJ mKj1pWPqIoF7GM/sfkNrvSK5Kh3m8AJdNNSJPWNzgxtRcGgZ57uw6hvNhTGY/Aaw IAIEWCqEN+3kyanxqKH8KnKSLCGsPSf9eDUxSY0XIqgslwXv/rvRDgOXb/zKf90G W3txjiK0N8p51IRMY7hs =pxHM -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#688298: jenkins: Multiple security issues
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi Moritz On 21/09/12 09:16, Moritz Muehlenhoff wrote: > Please see > http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-09-17.cb > > CVE IDs have been assigned: > http://seclists.org/oss-sec/2012/q3/521 > > Remember Debian is frozen, so please upload only minimal fixes and > and ask for a freeze exception by filing a bug against > release.debian.org > > Cheers, Moritz I've contacted upstream for some co-operation on this and future security issues; I've been able to cherry pick security fixes before but this time its not obvious. I'll upload fixes as soon as I have them Cheers James - -- James Page Ubuntu Core Developer Debian Maintainer james.p...@ubuntu.com -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://www.enigmail.net/ iQIcBAEBCAAGBQJQYDBoAAoJEL/srsug59jD2LsQAL7CVixd0JRPyfRFUvqtVZ/Y Ewg0eOeZdedjSDfDo3hxvPutfOjQ/4vZaKN0QAPkqil4zbI60qni8MmjduhfZ+2G 8CSbSZlvpN1/WwVoJX0LJm4Ig+aYo1XEBRAt0qi6IFWOEctFbzjkKfzmIHdKhLt4 kXpT6UP3aP8+86rf4gWm/NKkKSvAgiJ1eQGBpcP2lMnLZz7RLNv+2eK3kbJ3xi6K LI/vISH6hGqF/kFCuyteR7N3UPObxnqBeCzu5QsvwULrM1ofN6VXA8Ww52412G2T MuOClqDURYpIaJY8R/HonUPSMkzPh+j/JGMxp2QCtjjzjCNFKE2UNNCA/YQ6mf1+ cE0XhGWQ+t2T+wZVPc1FrS0es2dGOcaYH5+v7Iy8If/+HSye2J/y90AnJ2mKrGCB iG3hTD/YurPRtKEgJnYpHbcykUWmKWUjaIWlOkHPsTSMRKWBc5BEYzXI7AQsZ+fD +9Goh4lHSf52443+kLuFtaQ0xltX+/zjzq5XZrBPU/fLZ7q0iWGI7fjAOqD7MNax RdTCuaDYDHryrO05sPmy1vIkrTyI0rykbJvJ3QL1aI6SqnBKJw07e8PfYNuafKcg UBa8BygMLHLBSYvms3ByyhqST4vkNuvtYh6sQ+rp/iF5Rr8TdKvqSZJmn2Py50IQ 7SpzJlYATbUZO1w2Zp54 =tw2r -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#678766: jetty8: FTBFS: 1 required artifact is missing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 24/06/12 10:29, Lucas Nussbaum wrote: >> Missing: -- 1) >> org.apache.tomcat:tomcat-servlet-api:jar:debian >> >> Try downloading the file manually from the project website. >> >> Then, install it using the command: mvn install:install-file >> -DgroupId=org.apache.tomcat -DartifactId=tomcat-servlet-api >> -Dversion=debian -Dpackaging=jar -Dfile=/path/to/file >> >> Alternatively, if you host your own repository you can deploy the >> file there: mvn deploy:deploy-file -DgroupId=org.apache.tomcat >> -DartifactId=tomcat-servlet-api -Dversion=debian -Dpackaging=jar >> -Dfile=/path/to/file -Durl=[url] -DrepositoryId=[id] >> >> Path to dependency: 1) >> org.eclipse.jetty:jetty-util:jar:8.1.3.v20120416 2) >> org.apache.tomcat:tomcat-servlet-api:jar:debian Last upload of Tomcat7 remapped the API artifacts to javax.servlet inline with tomcat6 conventions. I'll do a patch for this package. - -- James Page Ubuntu Core Developer Debian Maintainer james.p...@ubuntu.com -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCAAGBQJP6F3IAAoJEL/srsug59jDK2AP/RFUAwABH+WQV/9lJLBQ3Cb7 CrU0rk05flJaqGlBg7pNmexMsYtnQKJGjj9Q8/89M9RKQNoAiZs/i0CkHkJUPreo bR9UTnIvQLXZt43OdgHEIZKH4Edjk61Z7gKMeSJoM3kgJo5G0+rBz519XEcHJ207 huDMsEFbsjfxguza5u+WH/j82RLzcCa7BloZfmMhzxzZTaWDnns8EiyMJZQL2uyH 74pnT/NWPV61O2wHa7PNvnuzcyF1jJHAHXu172I0t1DRYuTAtUxP0iDmy/TUwMSk weUMXRmZqbss3+5rDe/mmEaAL3F+BT5+GgJcWSuIC/miY5I1UEiHZc5lcSRiZgFC QYdMEawGUJYfWKBJj20PLG+WGoOh1no5I4FWg05jwjr2na7y8blxQagvXZOCgL+s aZ8Fh3NMUueIovFbTB5j3TY9/u91ZRLAiRIcRIXTYOmxTInWDkYThbbB/0J+/Xxf eiJRQ7sH7iGufIqRrHvC3wwzM4RmZAC1kU6uSlXAX26OBnFyaXNDlRcRAt1icdyY S5Fn+D6/KERp06/2/em/ZYOlNEn5lEHRNXfRMIR8qu8YxIwRZvFxCkGiEc5/pqik LT+tJootHrdV4Nc1qlrcy0ekuQplJa8qnYXJV9aPkWa4eUE5/Had5NEILlSu1Vn9 5FbS6ALUzJre1bbLHmwt =gzTv -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#642747: wss4j: Patch to resolve FTBFS
Package: wss4j Version: 1.5.8+svntag-1 Followup-For: Bug #642747 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: * Fix FTBFS (LP: #935490): - d/rules: Switched xml-security -> xmlsec to pickup jar name change in libxml-security-java. Thanks for considering the patch. - -- System Information: Debian Release: wheezy/sid APT prefers precise-updates APT policy: (500, 'precise-updates'), (500, 'precise-security'), (500, 'precise') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-20-generic (SMP w/8 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBCAAGBQJPca/uAAoJEL/srsug59jDZ/0QAKdVEzYnmGWpTgRjMUSJYLUk d7O2RKJEz4co1Q8ru1MBCDMVu5WcPlbjJcy+PVTyHHpSEZnXm7IR4hsYCpcavKd+ St2ShWYTZxO0Xp6noFCLfOZn6w7UFLg/mlQz8eHwcSnyOCSCTALhLPud0T7X9fA4 8plFOiHQa3k1KdZu9KVPSdzkw+ltcotTeoRtJtMvIEm8OJxaLX8imIsAnrIQhXQE 6iPUYfwYWL49lnYvQlddxWLPn1bnndBJ7euCbQ6wbrTEL5eE0Igejz8+NzjP7qHW UI9rBOxYH9/ro+oFv7PKpherm2wQ6w/MQ3k0kbK0MBJ4HGdS+jfFnf21zax2zcX0 diqNIVAJKfDAqDSF2dTak23hoaIFeDtKneo/S5wPhm132i4mPAXoZIDqiwGaTveG XBKqRYZjEmosEjoMH+1AwiJPe8icS1+M8heaMzdXx3wqgvqaw8On8ordbLGuEfFM UD/stE0BZ3HLtua0iYpL/K1QqLdYtHLR7nIiKIHexy+IG65tymOCUSUs5jT9+qYJ WY9cRhc/nA6GSKuu2zgw3Bc37tyjSb39cd1JjoTLd1MlV/D+kwUX7F0hgpeadm6k qykOhACDXoLoVPtmYE5QYjnFkZugQ0Ucwv0EwyTcp1Grb9gh+WUSn5TAvota4Lgp myOj0TS26d+hTUIpYfey =NntR -END PGP SIGNATURE- === modified file 'debian/rules' --- debian/rules 2010-02-11 19:30:49 + +++ debian/rules 2012-03-27 12:14:26 + @@ -10,7 +10,7 @@ JAVA_HOME:= /usr/lib/jvm/default-java DEB_ANT_CLEAN_TARGET := debian-clean DEB_ANT_BUILDFILE:= debian/build.xml -DEB_JARS := axis commons-logging xalan2 bcprov jaxrpc xml-security +DEB_JARS := axis commons-logging xalan2 bcprov jaxrpc xmlsec DEB_INSTALL_CHANGELOGS_ALL = ChangeLog.txt
Bug#649900: CVE-2011-4344: XSS
This XSS issue was resolved/released in 0.9.10-jenkins-29 so the package in Debian already contains the fix for this security issue. Apologies - I should have detailed this in the changelog entry. Cheers James -- James Page Ubuntu Core Developer -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#642144: mmpong: Porting patch to support cegui-mk2-0.7.5
Package: mmpong Version: 0.9.1-1 Followup-For: Bug #642144 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: * d/patches/02_cegui-mk2-0.7.5.dpatch: - client_gl/gui.h: Update for new header file name and location. - client_gl/gui.cpp: Port API usage from 0.6.x -> 0.7.x Debian unstable now has cegui-mk2 0.7.5; this patch ports mmpong to use the new header locations and API changes in this library. Thanks for considering the patch. - -- System Information: Debian Release: wheezy/sid APT prefers precise-updates APT policy: (500, 'precise-updates'), (500, 'precise-security'), (500, 'precise') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-3-generic (SMP w/8 CPU cores) Locale: LANG=C, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBCAAGBQJO31ueAAoJEL/srsug59jDbiUP/izvFk28BuUS/N1HMSN0LK1T yahTeCrL3m48i3YtyEAq71Eb9EkLhNy42rQTruMtsJhC5GyEkmPqTrHQo+MX9CRs QRe3eu0m7FSbx37qeNLSZ58hKqXM0W8R2cythiuICwQ7yg7WEAd7aWVG94zzff6/ UDyvmdukl4vaDpsbgK3vcfgKNJZvVjQyZ2ZzAa98/X+yp6lU4IYKx1jhgKD/qzNm CxJC2JdgpEMAgX3matKCpq137Wz69exqfxpT4U6RHawg57VO4AP8IiQDulKjXWjh nkO2d/xZD7hndHQHxSbw2mY/tNBLyFJi6Vq5C2hXrYoe+b5jme+UVVDPr/jQ7uFV TQV9j39T2ywJhUlRFIPF5OKu48stK5jrh6Ab3UILhpeunAYCL8B4xUaxEEhV92Bl YAxJd036QBKgj59pWplMsv898qFSwguMUkNB3S45BApL06jaNT6qFUfRt7fh0CaD yl6JA9CEVnK0sx8XGs5j7lR0FGwPGa4SmnI+1R84i2kPmdrrP4kG2/nNWcrnvjHO 6MC845NVbsO3tURGc3FULt0VGNe2POzpt/6LG/m9twDjGf+3Qu5jCb1ROKuMttQM HabflSpHnlgk7ZvQs8YsV3ounC7ruQ4g/BhszZGgtWJASlmtEmhVZC/UvXIrOIU7 Kh2PSe15fRLQelxsfFaB =kfT7 -END PGP SIGNATURE- === modified file 'debian/patches/00list' --- debian/patches/00list 2009-01-09 16:39:01 + +++ debian/patches/00list 2011-12-07 09:54:29 + @@ -1 +1,2 @@ 01_share.dpatch +02_cegui-mk2-0.7.5.dpatch === added file 'debian/patches/02_cegui-mk2-0.7.5.dpatch' --- debian/patches/02_cegui-mk2-0.7.5.dpatch 1970-01-01 00:00:00 + +++ debian/patches/02_cegui-mk2-0.7.5.dpatch 2011-12-07 10:43:14 + @@ -0,0 +1,43 @@ +#! /bin/sh /usr/share/dpatch/dpatch-run +## 02_cegui-mk2-0.7.5.dpatch by James Page +## +## All lines beginning with `## DP:' are a description of the patch. +## DP: No description. + +@DPATCH@ +diff -urNad '--exclude=CVS' '--exclude=.svn' '--exclude=.git' '--exclude=.arch' '--exclude=.hg' '--exclude=_darcs' '--exclude=.bzr' mmpong~/client_gl/gui.cpp mmpong/client_gl/gui.cpp +--- mmpong~/client_gl/gui.cpp 2011-12-07 09:45:09.0 + mmpong/client_gl/gui.cpp 2011-12-07 10:43:13.727551992 + +@@ -148,9 +148,9 @@ + + + GUI::GUI(std::string resbase, int w, int h, bool _visible, ClientState *_state) { +- renderer = new OpenGLRenderer(0, w, h); ++ renderer = &OpenGLRenderer::create(Size(w,h)); + log = new dummyLogger(); +- sys = new System(renderer); ++ sys = &System::create(*renderer); + visible = _visible; + state = _state; + try { +@@ -176,7 +176,7 @@ + // ATTENTION (by andré): + //the next line segfaults with CEGUI 0.5.0-4.1 in Debian/Ubuntu + //this is fixed in 0.6 (sorry, found no workaround atm) +- SchemeManager::getSingleton().loadScheme( "TaharezLook.scheme" ); ++ SchemeManager::getSingleton().create( "TaharezLook.scheme" ); + sys->setDefaultMouseCursor( "TaharezLook", "MouseArrow" ); + sys->setDefaultTooltip("TaharezLook/Tooltip"); + +diff -urNad '--exclude=CVS' '--exclude=.svn' '--exclude=.git' '--exclude=.arch' '--exclude=.hg' '--exclude=_darcs' '--exclude=.bzr' mmpong~/client_gl/gui.h mmpong/client_gl/gui.h +--- mmpong~/client_gl/gui.h 2011-12-07 09:45:09.0 + mmpong/client_gl/gui.h 2011-12-07 10:30:03.0 + +@@ -22,7 +22,7 @@ + #define __GUI_H__ + + #include +-#include ++#include + #include + #include "clientstate.h" +
Bug#643501: jenkins-crypto-util: FTBFS: Test failures
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 The certificates that the test use have expired - and now the tests are failing. I will raise this upstream - -- James Page Ubuntu Server Developer -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCAAGBQJOgvmvAAoJEL/srsug59jD7IAP/3Xa4g79QnUWQOgVDrsvGKc1 83tM4tAv2GGIAbnHbZiRPAk9IIgz9ATeppkYTr7x68byBUei6vWlleUovwhMTvRH YnGz0/v0Mu91+QIefJpAOx6rpiHCQtVAxc2vOVEPLnxa8/ZocOoYPFf4Q/cf7agk 9MCsZ7eW18+JnxiYol/hdb7UnUfmQUSobbtZCpjntM1W00icTLghnHu89ghTLnp6 2wbF3aUkHIhoQDzG46J4tTRbmhf1BPtTPumrzQbTByIG/wpUfISrltI3ASEMfkRi RUwncpcvvhkXQ6PmHso1oV3VZfiy+ZBzr+b+UTCCRG9LMjBUZJfrr1arj9BfHisU qtZPukv8AyVfrhBHwzStPGrIqs5Lafd2ENuvKzJZd+DkUmg/QEejcuCL6VRIHNS6 Inotb/U5iXBUPekzagQYeE4TvcFkmQwwJwKqY/x//ufCZrnMrfZtnHRrlUqfu9Lw ZygryqjnxkVIwA/VJFu7jPJYs09umA2r5wMJy1emUWo+3p8OpyCrMGE+N+KQBJdt 26G57zvcdEayZc+cXSp2ING7mZGNv/sqH1zcgW7Lr+mjKdXdjh4t+P9S7taFEUvE QYpz83n1PFxUbff+YUJDncFkdr0T54Srlp75R38bQ1eATVyvaO8DywInlMisM0gf YigIIzRe8CfCQ138wW9s =euPN -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#626373: jing-trang: Proposed patch to resolve FTBFS
Package: jing-trang Version: 2009-3 Followup-For: Bug #626373 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu oneiric ubuntu-patch *** /tmp/tmpo_Cw1q In Ubuntu, the attached patch was applied to achieve the following: * Fix FTBFS (LP: #749219): - d/rules: use xml-resolver.jar instead of xml-commons-resolver-1.1.jar. - d/control: openoffice.org-java-common -> libreoffice-java-common. - d/rules: Pickup new location of saxon9.jar provided by libreoffice-java-common. Thanks for considering the patch. -- System Information: Debian Release: wheezy/sid APT prefers oneiric-updates APT policy: (500, 'oneiric-updates'), (500, 'oneiric-security'), (500, 'oneiric') Architecture: amd64 (x86_64) Kernel: Linux 3.0.0-11-generic (SMP w/8 CPU cores) Locale: LANG=C, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash === modified file 'debian/changelog' === modified file 'debian/control' --- debian/control 2010-08-24 21:23:21 + +++ debian/control 2011-09-15 11:33:08 + @@ -1,9 +1,10 @@ Source: jing-trang Priority: extra -Maintainer: Debian XML/SGML Group +Maintainer: Ubuntu Developers +XSBC-Original-Maintainer: Debian XML/SGML Group Uploaders: Samuel Thibault Build-Depends: debhelper (>= 7) -Build-Depends-Indep: default-jdk, ant, ant-optional, testng, javacc, libsaxon-java, libxerces2-java, libxalan2-java, libisorelax-java, openoffice.org-java-common, libxml-commons-resolver1.1-java, unicode-data +Build-Depends-Indep: default-jdk, ant, ant-optional, testng, javacc, libsaxon-java, libxerces2-java, libxalan2-java, libisorelax-java, libreoffice-java-common, libxml-commons-resolver1.1-java, unicode-data Standards-Version: 3.9.1 Section: java Homepage: http://code.google.com/p/jing-trang/ === modified file 'debian/rules' --- debian/rules2009-09-01 15:53:03 + +++ debian/rules2011-09-15 11:32:25 + @@ -5,7 +5,7 @@ JAR=jar JAVACLASSES=/usr/share/java -CLASSPATH=$(JAVACLASSES)/isorelax.jar:$(JAVACLASSES)/xml-apis-ext.jar:$(JAVACLASSES)/xercesImpl.jar:$(JAVACLASSES)/saxon.jar:$(JAVACLASSES)/openoffice/saxon9.jar:$(JAVACLASSES)/xalan2.jar:$(JAVACLASSES)/testng.jar:$(JAVACLASSES)/xml-commons-resolver-1.1.jar +CLASSPATH=$(JAVACLASSES)/isorelax.jar:$(JAVACLASSES)/xml-apis-ext.jar:$(JAVACLASSES)/xercesImpl.jar:$(JAVACLASSES)/saxon.jar:$(JAVACLASSES)/xalan2.jar:$(JAVACLASSES)/testng.jar:$(JAVACLASSES)/xml-resolver.jar:/usr/share/libreoffice/basis3.4/program/classes/saxon9.jar VERSION=20090818
Bug#640494: liblucene2-java: FTBFS with latest version of jtidy in unstable
Package: liblucene2-java Version: 2.9.4+ds1-2 Severity: serious Justification: fails to build from source Whilst testing reverse build-deps for a late sync of the latest version of jtidy into the latest Ubuntu development release I hit the following issue which I can reproduce in Debian unstable (albiet I had to fix the location of JAVA_HOME in debian/rules to point to a valid java home - see d-j@l.d.o 'openjdk-6 and openjdk-7 multiarch installable'): common.test: [mkdir] Created dir: /build/jamespage-lucene2_2.9.4+ds1-2-amd64-qB5aEF/lucene2-2.9.4+ds1/build/contrib/ant/test [junit] WARNING: multiple versions of ant detected in path for junit [junit] jar:file:/usr/share/java/ant-1.8.2.jar!/org/apache/tools/ant/Project.class [junit] and jar:file:/usr/share/ant/lib/ant.jar!/org/apache/tools/ant/Project.class [junit] Testsuite: org.apache.lucene.ant.HtmlDocumentTest [junit] Tests run: 1, Failures: 0, Errors: 1, Time elapsed: 0.059 sec [junit] [junit] Testcase: testDoc(org.apache.lucene.ant.HtmlDocumentTest): Caused an ERROR [junit] null [junit] java.lang.ExceptionInInitializerError [junit] at org.w3c.tidy.Tidy.(Tidy.java:135) [junit] at org.apache.lucene.ant.HtmlDocument.(HtmlDocument.java:60) [junit] at org.apache.lucene.ant.HtmlDocumentTest.setUp(HtmlDocumentTest.java:34) [junit] Caused by: java.lang.RuntimeException: Failed to load jtidy.properties [junit] at org.w3c.tidy.Report.readReleaseDate(Report.java:94) [junit] at org.w3c.tidy.Report.(Report.java:85) [junit] Caused by: java.lang.NullPointerException [junit] at java.util.Properties$LineReader.readLine(Properties.java:435) [junit] at java.util.Properties.load0(Properties.java:354) [junit] at java.util.Properties.load(Properties.java:342) [junit] at org.w3c.tidy.Report.readReleaseDate(Report.java:91) [junit] [junit] [junit] Test org.apache.lucene.ant.HtmlDocumentTest FAILED [junit] Testsuite: org.apache.lucene.ant.IndexTaskTest [junit] Tests run: 1, Failures: 0, Errors: 1, Time elapsed: 0.19 sec [junit] [junit] Testcase: testSearch(org.apache.lucene.ant.IndexTaskTest): Caused an ERROR [junit] null [junit] java.lang.ExceptionInInitializerError [junit] at org.w3c.tidy.Tidy.(Tidy.java:135) [junit] at org.apache.lucene.ant.HtmlDocument.(HtmlDocument.java:60) [junit] at org.apache.lucene.ant.HtmlDocument.Document(HtmlDocument.java:175) [junit] at org.apache.lucene.ant.FileExtensionDocumentHandler.getDocument(FileExtensionDocumentHandler.java:56) [junit] at org.apache.lucene.ant.IndexTask.indexDocs(IndexTask.java:340) [junit] at org.apache.lucene.ant.IndexTask.execute(IndexTask.java:236) [junit] at org.apache.lucene.ant.IndexTaskTest.setUp(IndexTaskTest.java:69) [junit] Caused by: java.lang.RuntimeException: Failed to load jtidy.properties [junit] at org.w3c.tidy.Report.readReleaseDate(Report.java:94) [junit] at org.w3c.tidy.Report.(Report.java:85) [junit] Caused by: java.lang.NullPointerException [junit] at java.util.Properties$LineReader.readLine(Properties.java:435) [junit] at java.util.Properties.load0(Properties.java:354) [junit] at java.util.Properties.load(Properties.java:342) [junit] at org.w3c.tidy.Report.readReleaseDate(Report.java:91) [junit] [junit] [junit] Test org.apache.lucene.ant.IndexTaskTest FAILED [junit] Testsuite: org.apache.lucene.ant.TextDocumentTest [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.039 sec [junit] [subant] Failure for target 'test' of: /build/jamespage-lucene2_2.9.4+ds1-2-amd64-qB5aEF/lucene2-2.9.4+ds1/contrib/ant/build.xml [subant] The following error occurred while executing this line: [subant] /build/jamespage-lucene2_2.9.4+ds1-2-amd64-qB5aEF/lucene2-2.9.4+ds1/contrib/contrib-build.xml:130: The following error occurred while executing this line: [subant] /build/jamespage-lucene2_2.9.4+ds1-2-amd64-qB5aEF/lucene2-2.9.4+ds1/common-build.xml:455: The following error occurred while executing this line: [subant] /build/jamespage-lucene2_2.9.4+ds1-2-amd64-qB5aEF/lucene2-2.9.4+ds1/common-build.xml:448: Tests failed! [echo] Building benchmark... This causes the build to fail. *** /tmp/reportbug-liblucene2-java-20110905-26613-bWHgDw Subject: liblucene2-java: FTBFS with latest version of jtidy in unstable Package: liblucene2-java Version: 2.9.4+ds1-2 Justification: fails to build from source Severity: serious -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.38-11-generic (SMP w/8 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Versions of packages liblucene2-java depends on: ii default-jre-headless [java5 1:1.6
Bug#628272: Release of this patch?
On Wed, 2011-06-08 at 16:39 +0200, Damien Raude-Morvan wrote: > I can release a 1.4.3 version w/ this simple change before tomorrow > morning. > (my initial plan was to work on some others reported - but minor - > issues > before doing an upload) I can wait for a bit; I have some other packages that I can work on in the meantime. Cheers James -- James Page Software Engineer, Ubuntu Server Team signature.asc Description: This is a digitally signed message part
Bug#628272: Release of this patch?
I've just hit this bug in one of my new packages; when do you think 1.4.3 of m-d-h will be released? Cheers James -- James Page Software Engineer, Ubuntu Server Team signature.asc Description: This is a digitally signed message part
Bug#605369: testng FTBFS against ant 1.8.1
Package: testng Version: 5.11+dfsg-2 Severity: serious Tags: patch Justification: fails to build from source User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu natty ubuntu-patch testng will FTBFS against ant 1.8.1. Appreciate that this is still in experimental but at some point in time this will break. This is due to the fact that TRaX is now part of the JDK so the optional tasks in Ant have moved from ant-trax.jar to ant-nodeps.jar. *** /tmp/tmpGZcxmT In Ubuntu, we've applied the attached patch to achieve the following: * debian/rules: updated to use ant-nodeps to fix FTBFS (LP: #674382) We thought you might be interested in doing the same. -- System Information: Debian Release: squeeze/sid APT prefers maverick-updates APT policy: (500, 'maverick-updates'), (500, 'maverick-security'), (500, 'maverick') Architecture: amd64 (x86_64) Kernel: Linux 2.6.35-23-generic (SMP w/8 CPU cores) Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash === modified file 'debian/rules' --- debian/rules2010-04-25 09:42:04 + +++ debian/rules2010-11-12 08:05:44 + @@ -11,7 +11,7 @@ JAVA_HOME := /usr/lib/jvm/java-6-openjdk endif -DEB_JARS := ant ant-launcher ant-junit ant-trax com-sun-javadoc +DEB_JARS := ant ant-launcher ant-junit ant-trax ant-nodeps com-sun-javadoc DEB_CLASSPATH = $(shell for jar in $(DEB_JARS:%=/usr/share/java/%.jar); do \ echo -n $${jar}:; done; \
Bug#605367: tomcat6 FTBFS against ant 1.8.1
Package: tomcat6 Version: 6.0.28-7 Severity: serious Tags: patch Justification: fails to build from source User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu natty ubuntu-patch tomcat6 will FTBFS against ant 1.8.1. Appreciate that this is still in experimental but at some point in time this will break. This is due to the fact that TRaX is now part of the JDK so the optional tasks in Ant have moved from ant-trax.jar to ant-nodeps.jar. *** /tmp/tmpIpNIFU In Ubuntu, we've applied the attached patch to achieve the following: * Amended debian/rules, fix xslt processing in ant 1.8.1 to fix FTBFS (LP: #662588) We thought you might be interested in doing the same. -- System Information: Debian Release: squeeze/sid APT prefers maverick-updates APT policy: (500, 'maverick-updates'), (500, 'maverick-security'), (500, 'maverick') Architecture: amd64 (x86_64) Kernel: Linux 2.6.35-23-generic (SMP w/8 CPU cores) Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash === modified file 'debian/rules' --- debian/rules2010-07-20 14:36:48 + +++ debian/rules2010-11-08 13:32:13 + @@ -5,7 +5,7 @@ BLDLIB := output/build/lib BLDBIN := output/build/bin DEB_JARS_BASE := /usr/share/java -DEB_JARS := ant ant-launcher ant-trax +DEB_JARS := ant ant-launcher ant-trax ant-nodeps DEB_CLASSPATH = $(shell for jar in $(DEB_JARS); do \ if [ -f "$$jar" ]; then echo -n "$${jar}:"; fi; \ if [ -f "$$jar".jar ]; then echo -n "$${jar}.jar:"; fi; \