Re: concerns about the state of buildds for jessie

2015-02-12 Thread Luca Falavigna
Hi,

2015-02-11 20:46 GMT+01:00 Peter Palfrader wea...@debian.org:
 It seems the buildd team is severely understaffed and needs help.

If this rumor turns to be a reality, are there some prerequisites
potential volunteers could have a look to in the event they want to
apply for the role?

Cheers,
Luca


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/cadk7b0o_ehd36evqf08j1sjocg7e1u8mrnuw4p9f9z0xwet...@mail.gmail.com



Bug#770501: unblock: libvncserver/0.9.9+dfsg-7 (pre-approval)

2014-11-21 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

I prepared an upload to fix grave bug #762745, cherry-picking patches from
upstream to fix multiple vulnerabilities. I also took the chance to include
fixes for #766257 and #758754. Please tell me whether I should drop these
instead.

The problem with this (tentative) upload is related to this commit, needed to
fix CVE-2014-6055:
https://github.com/newsoft/libvncserver/commit/06ccdf016154fde8eccb5355613ba04c59127b2e

It seems there's an API/ABI break, also reported in RedHat, as per
https://bugzilla.redhat.com/show_bug.cgi?id=1144293#c2, which could be
problematic at this point. What would be the recommended way to proceed from
here?



-- System Information:
Debian Release: jessie/sid
  APT prefers testing-updates
  APT policy: (500, 'testing-updates'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16-3-amd64 (SMP w/8 CPU cores)
diff --git a/debian/changelog b/debian/changelog
index 4cb521d..77de074 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,19 @@
+libvncserver (0.9.9+dfsg-7) UNRELEASED; urgency=medium
+
+  * debian/patches/CVE-2014.patch:
+- Fix multiple vulnerabilities (Closes: #762745).
+  - CVE-2014-6051 Integer overflow in MallocFrameBuffer() on client side.
+  - CVE-2014-6052 Lack of malloc() return value checking on client side.
+  - CVE-2014-6053 Server crash on a very large ClientCutText message.
+  - CVE-2014-6054 Server crash when scaling factor is set to zero.
+  - CVE-2014-6055 Multiple stack overflows in File Transfer feature.
+  * debian/patches/novnc.patch:
+- Set opcode correctly for binary frames (Closes: #766257).
+  * debian/control:
+- Use uppercase VNC in short descriptions (Closes: #758754).
+
+ -- Luca Falavigna dktrkr...@debian.org  Fri, 21 Nov 2014 20:51:50 +0100
+
 libvncserver (0.9.9+dfsg-6) unstable; urgency=medium
 
   [ Luca Falavigna ]
diff --git a/debian/control b/debian/control
index 9e188be..17ebbe6 100644
--- a/debian/control
+++ b/debian/control
@@ -22,7 +22,7 @@ Depends: ${shlibs:Depends},
 Breaks: libvncserver0 ( 0.9.9+dfsg-3)
 Replaces: libvncserver0 ( 0.9.9+dfsg-3)
 Multi-Arch: same
-Description: API to write one's own vnc server - client library
+Description: API to write one's own VNC server - client library
  LibVNCServer makes writing a VNC server (or more correctly, a program
  exporting a framebuffer via the Remote Frame Buffer protocol) easy. It hides
  the programmer from the tedious task of managing clients and compression.
@@ -35,7 +35,7 @@ Pre-Depends: ${misc:Pre-Depends}
 Depends: ${shlibs:Depends},
  ${misc:Depends}
 Multi-Arch: same
-Description: API to write one's own vnc server
+Description: API to write one's own VNC server
  LibVNCServer makes writing a VNC server (or more correctly, a program
  exporting a framebuffer via the Remote Frame Buffer protocol) easy. It hides
  the programmer from the tedious task of managing clients and compression.
@@ -53,7 +53,7 @@ Depends: ${misc:Depends},
  zlib1g-dev,
  libvncserver-config
 Multi-Arch: same
-Description: API to write one's own vnc server - development files
+Description: API to write one's own VNC server - development files
  LibVNCServer makes writing a VNC server (or more correctly, a program
  exporting a framebuffer via the Remote Frame Buffer protocol) easy. It hides
  the programmer from the tedious task of managing clients and compression.
@@ -68,7 +68,7 @@ Depends: ${misc:Depends},
  libvncclient0 (= ${binary:Version}),
  libvncserver0 (= ${binary:Version})
 Multi-Arch: foreign
-Description: API to write one's own vnc server - library utility
+Description: API to write one's own VNC server - library utility
  LibVNCServer makes writing a VNC server (or more correctly, a program
  exporting a framebuffer via the Remote Frame Buffer protocol) easy. It hides
  the programmer from the tedious task of managing clients and compression.
diff --git a/debian/patches/CVE-2014.patch b/debian/patches/CVE-2014.patch
new file mode 100644
index 000..3931854
--- /dev/null
+++ b/debian/patches/CVE-2014.patch
@@ -0,0 +1,293 @@
+Description: Fix CVE-2014-6051 CVE-2014-6052 CVE-2014-6053
+ CVE-2014-6054 CVE-2014-6055
+Author: Nicolas Ruff nr...@google.com
+
+Index: libvncserver/libvncclient/rfbproto.c
+===
+--- libvncserver.orig/libvncclient/rfbproto.c	2014-11-21 20:35:19.488146693 +0100
 libvncserver/libvncclient/rfbproto.c	2014-11-21 20:45:30.973828663 +0100
+@@ -1807,7 +1807,8 @@
+ 	client-updateRect.x = client-updateRect.y = 0;
+ 	client-updateRect.w = client-width;
+ 	client-updateRect.h = client-height;
+-	client-MallocFrameBuffer(client);
++  if (!client-MallocFrameBuffer(client))
++return FALSE;
+ 	SendFramebufferUpdateRequest(client, 0, 0, rect.r.w, rect.r.h, FALSE);
+ 	rfbClientLog(Got new framebuffer size

Bug#770381: unblock: remmina/1.1.1-2 (pre-approval)

2014-11-20 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hi,

Please consider unblocking a tentative remmina 1.1.1-2 upload, debdiff
attached.
This upload cherry-picks patches from upstream Git to fix #766671. I reproduced
the crash (it's very trivial to test it), and the patch actually solves the
problem.

unblock remmina/1.1.1-2

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores)
diff --git a/debian/changelog b/debian/changelog
index 42e466f..f69d17c 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+remmina (1.1.1-2) unstable; urgency=medium
+
+  * debian/patches/RDP_certificate_crash.patch:
+- Cherry-pick patches from upstream to fix a crash when not
+  accepting certificate for RDP server (Closes: #766671).
+
+ -- Luca Falavigna dktrkr...@debian.org  Thu, 20 Nov 2014 21:08:11 +0100
+
 remmina (1.1.1-1) unstable; urgency=medium
 
   * New upstream release.
diff --git a/debian/patches/RDP_certificate_crash.patch b/debian/patches/RDP_certificate_crash.patch
new file mode 100644
index 000..40c7bf3
--- /dev/null
+++ b/debian/patches/RDP_certificate_crash.patch
@@ -0,0 +1,154 @@
+Description: Fix crash when not accepting certificate for RDP server
+Author: Giovanni Panozzo giova...@panozzo.it
+
+Index: remmina/remmina-plugins/rdp/rdp_event.c
+===
+--- remmina.orig/remmina-plugins/rdp/rdp_event.c
 remmina/remmina-plugins/rdp/rdp_event.c
+@@ -54,6 +54,9 @@ static void remmina_rdp_event_on_focus_i
+ #endif
+ 
+ 	rfi = GET_DATA(gp);
++	if ( !rfi )
++		return;
++
+ 	input = rfi-instance-input;
+ 	UINT32 toggle_keys_state = 0;
+ 
+@@ -88,6 +91,8 @@ static void remmina_rdp_event_event_push
+ 	RemminaPluginRdpEvent* event;
+ 
+ 	rfi = GET_DATA(gp);
++	if ( !rfi )
++		return;
+ 
+ 	if (rfi-event_queue)
+ 	{
+@@ -454,6 +459,8 @@ static gboolean remmina_rdp_event_on_key
+ 	DWORD scancode;
+ 
+ 	rfi = GET_DATA(gp);
++	if ( !rfi ) return TRUE;
++
+ 	rdp_event.type = REMMINA_RDP_EVENT_TYPE_SCANCODE;
+ 	rdp_event.key_event.up = (event-type == GDK_KEY_PRESS ? False : True);
+ 	rdp_event.key_event.extended = False;
+@@ -535,6 +542,8 @@ void remmina_rdp_event_init(RemminaProto
+ 	GtkClipboard* clipboard;
+ 
+ 	rfi = GET_DATA(gp);
++	if ( !rfi ) return;
++
+ 	rfi-drawing_area = gtk_drawing_area_new();
+ 	gtk_widget_show(rfi-drawing_area);
+ 	gtk_container_add(GTK_CONTAINER(gp), rfi-drawing_area);
+@@ -608,7 +617,7 @@ void remmina_rdp_event_uninit(RemminaPro
+ 	RemminaPluginRdpUiObject* ui;
+ 
+ 	rfi = GET_DATA(gp);
+-
++	if ( !rfi ) return;
+ 
+ 	/* unregister the clipboard monitor */
+ 	if (rfi-clipboard_handler)
+Index: remmina/remmina-plugins/rdp/rdp_plugin.c
+===
+--- remmina.orig/remmina-plugins/rdp/rdp_plugin.c
 remmina/remmina-plugins/rdp/rdp_plugin.c
+@@ -338,6 +338,7 @@ static BOOL remmina_rdp_post_connect(fre
+ 	instance-update-DesktopResize = rf_desktop_resize;
+ 
+ 	freerdp_channels_post_connect(instance-context-channels, instance);
++	rfi-connected = True;
+ 
+ 	remmina_plugin_service-protocol_plugin_emit_signal(gp, connect);
+ 
+@@ -664,7 +665,7 @@ static gboolean remmina_rdp_main(Remmina
+ 		dest_server = remmina_plugin_service-file_get_string(remminafile, server);
+ 		if ( dest_server ) {
+ 			remmina_plugin_service-get_server_port(dest_server, 0, dest_host, dest_port);
+-			rfi-settings-CertificateName = _strdup( dest_host );
++			rfi-settings-CertificateName = strdup( dest_host );
+ 			g_free(dest_host);
+ 		}
+ 	}
+@@ -701,12 +702,17 @@ static gboolean remmina_rdp_main(Remmina
+ 
+ 	if (remmina_plugin_service-file_get_string(remminafile, clientname))
+ 	{
+-		strncpy(rfi-settings-ClientHostname, remmina_plugin_service-file_get_string(remminafile, clientname),
+-			sizeof(rfi-settings-ClientHostname) - 1);
++		s = remmina_plugin_service-file_get_string(remminafile, clientname);
++		if ( s ) {
++			free( rfi-settings-ClientHostname );
++			rfi-settings-ClientHostname = strdup(s);
++			g_free(s);
++		}
+ 	}
+ 	else
+ 	{
+-		strncpy(rfi-settings-ClientHostname, g_get_host_name(), sizeof(rfi-settings-ClientHostname) - 1);
++		free( rfi-settings-ClientHostname );
++		rfi-settings-ClientHostname = strdup( g_get_host_name() );
+ 	}
+ 
+ 	if (remmina_plugin_service-file_get_string(remminafile, exec))
+@@ -938,6 +944,7 @@ static void remmina_rdp_init(RemminaProt
+ 	rfi-instance = instance;
+ 	rfi-settings = instance-settings;
+ 	rfi-instance-context-channels = freerdp_channels_new();
++	rfi-connected = False;
+ 
+ 	pthread_mutex_init(rfi-mutex, NULL);
+ 
+@@ -995,13 +1002,12 @@ static gboolean remmina_rdp_close_connec
+ 
+ 	if (instance)
+ 	{
+-		if (instance-context-channels)
+-		{
+-			//freerdp_channels_close(rfi-channels, instance);
+-			freerdp_channels_free

Bug#770381: unblock: remmina/1.1.1-2 (pre-approval)

2014-11-20 Thread Luca Falavigna
2014-11-20 22:17 GMT+01:00 Jonathan Wiltshire j...@debian.org:
 Please go ahead.

Thanks a lot for the quick reply!
Package uploaded and built everywhere but sparc (but, oh well...)

Awesome job, as always! Keep up with the good work! :-)

Cheers,
Luca


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/cadk7b0pzjqow13mulfgbnrq9vj4lcn3p5wecdnus7na0ql5...@mail.gmail.com



Bug#739415: transition: libraw

2014-02-27 Thread Luca Falavigna
2014-02-26 11:58 GMT+01:00 Julien Cristau jcris...@debian.org:
 Looks like you took the spot.  But the new version FTBFS all over the
 place.

My fault, I erroneously set unstable as distribution target.
By the way, I uploaded -2, which fixed the FTBFS.

Cheers,
Luca


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/CADk7b0MUMVW=c4arkvvefqughzkcxpfqhoy5_d3aqrrw0ak...@mail.gmail.com



Bug#739415: transition: libraw

2014-02-18 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition


I'd like to request a slot for taking care of the libraw transition.
I rebuilt all the reverse dependencies, and they all built correctly.

Reverse dependencies

* entangle
* evas-loaders
* freeimage
* luminance-hdr
* shotwell

Ben file:
title = libraw;
is_affected = .build-depends ~ /libraw-dev/;
is_good = .depends ~ libraw10;
is_bad = .depends ~ libraw9;

Cheers,
Luca


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CADk7b0PkvGiHgOe=KmLiHqSfd3CW=qq43tgvujjqhr7aazf...@mail.gmail.com



Bug#734860: nmu: libvncserver0 - libvncclient0 split

2014-01-10 Thread Luca Falavigna
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: binnmu
Severity: normal

Please schedule binNMUs for libvncserver reverse dependencies.
libvncclient0 is now a separate binary package, no longer provided by 
libvncserver0.

nmu aqemu_0.8.2-2 . amd64 armel armhf i386 ia64 mips mipsel powerpc sparc . -m 
Rebuild for libvncserver split
nmu guacamole-server_0.8.3-1 . ALL . -m Rebuild for libvncserver split
dw guacamole-server_0.8.3-1 . hurd-i386 . -m libvncserver-dev (= 
0.9.9+dfsg-3)
nmu kcemu_0.5.1+dfsg-6 . ALL . -m Rebuild for libvncserver split
dw kcemu_0.5.1+dfsg-6 . hurd-i386 . -m libvncserver-dev (= 0.9.9+dfsg-3)
nmu kdenetwork_4:4.10.5-3 . ALL -hurd-i386 . -m Rebuild for libvncserver split
nmu krdc_4:4.11.3-1 . ALL -hurd-i386 . -m Rebuild for libvncserver split
nmu lcd4linux_0.11.0~svn1200-1 . ALL . -m Rebuild for libvncserver split
dw lcd4linux_0.11.0~svn1200-1 . hurd-i386 . -m libvncserver-dev (= 
0.9.9+dfsg-3)
nmu netsurf_2.9-2 . ALL -hurd-i386 . -m Rebuild for libvncserver split
nmu remmina_1.0.0-6 . ALL . -m Rebuild for libvncserver split
dw remmina_1.0.0-6 . hurd-i386 . -m libvncserver-dev (= 0.9.9+dfsg-3)
nmu virtualbox_4.3.2-dfsg-1 . amd64 i386 . -m Rebuild for libvncserver split
nmu x11vnc_0.9.13-1.1 . ALL . -m Rebuild for libvncserver split
dw x11vnc_0.9.13-1.1 . hurd-i386 . -m libvncserver-dev (= 0.9.9+dfsg-3)

Cheers,
Luca


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20140110123943.GA1777@winterfell



Bug#725477: pu: shotwell/0.12.3-2+deb7u1

2013-10-06 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: pu


I'd like to upload a fix for #722909, submitter confirmed the patch
solves the issue, and is already part of 0.14, which is in Jessie
already.

Debdiff of the change is attached.

Cheers,
Luca


0.12.3-2+deb7u1.debdiff
Description: Binary data


Bug#725477: pu: shotwell/0.12.3-2+deb7u1

2013-10-06 Thread Luca Falavigna
2013/10/6 Adam D. Barratt a...@adam-barratt.org.uk:
 Please go ahead (bearing in mind that the window for 7.2 closes today);
 thanks.

Uploaded, thanks (also thanks for the very fast reply for this late fix).

Cheers,
Luca


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cadk7b0pa_6t0cpzk1+ja+ngzk+g7sngdx-qwdsmvc0y+2uq...@mail.gmail.com



Bug#718782: RM: llvm-toolchain-snapshot/3.4~svn183914-1

2013-08-05 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm


Please remove llvm-toolchain-snapshot from Jessie, it is not meant to
be part of a stable release, as described in #714686.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CADk7b0OYVR81GqeYDt5_wQSvo=xCqEsSW5Y3km=arkfmeqa...@mail.gmail.com



Bug#718663: RM: subunit/0.0.8+bzr176-1

2013-08-03 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm

Please consider removing subunit in Jessie. It has unresolved RC bugs (#708077
and #712203), and is the last blocker for python2.6 removal.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130803223116.3643.54453.reportbug@utumno



Bug#710143: transition: libraw

2013-07-11 Thread Luca Falavigna
2013/7/10 Julien Cristau jcris...@debian.org:
 Assuming you're prepared to nmu the rdeps feel free to move this to sid.

Thanks!

libraw 0.15.3-1 built everywhere, and I just uploaded fixed packages
for shotwell and freeimage. Could you please schedule binNMUs for the
other two packages?

nmu entangle_0.5.1-1 . ALL . -m 'Rebuild against libraw9'
nmu luminance-hdr_2.3.0-3 . ALL . -m 'Rebuild against libraw9'

Cheers,
Luca


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cadk7b0pwkwtmuklke737fofgkn7mbrxyxryaagxopufdvse...@mail.gmail.com



Bug#714266: RM: zope-maildrophost_2.3-1, zope-mysqlda_3.1.1-1, zope-quotafolder_1:0.1.1-1, zope-replacesupport_1.0.3-6

2013-06-27 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm


Please remove these packages from Jessie:
* zope-maildrophost 2.3-1
* zope-mysqlda 3.1.1-1
* zope-quotafolder  1:0.1.1-1
* zope-replacesupport  1.0.3-6

They depend on zope2.12, which has been removed from unstable, and
will block python2.6 removal from testing when it will be removed from
unstable (#714116).

They will be probably become installable in unstable again when
zope2.13 will enter unstable; if that will not happen, packages will
be removed from unstable as well.

Cheers,
Luca


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CADk7b0M=oraav65ocggtwqtgdya8tftvx4j+2wtu84e5p38...@mail.gmail.com



Bug#710143: transition: libraw

2013-06-24 Thread Luca Falavigna
2013/5/28 Luca Falavigna dktrkr...@debian.org:
 freeimage FTBFS (#710133), but upstream already has a patch to fix it.
 Also shotwell FTBFS (#710141), issue has been forwarded upstream.

Blockers have patches to allow build against newer libraw, so this
transition should proceed smoothly.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cadk7b0oeafwvh2oahufz851r+wz1tpnoggwk9b0jdr_kjdx...@mail.gmail.com



Bug#710143: transition: libraw

2013-05-28 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
Control: block -1 by 710133 710141


I'd like to request a slot for taking care of the libraw transition.
The new upstream release (in experimental) has bumped soname.


Reverse dependencies

* entangle
* freeimage
* luminance-hdr
* shotwell

freeimage FTBFS (#710133), but upstream already has a patch to fix it.
Also shotwell FTBFS (#710141), issue has been forwarded upstream.


Ben file:
title = libraw;
is_affected = .build-depends ~ /libraw-dev/;
is_good = .depends ~ libraw9;
is_bad = .depends ~ libraw5;


Cheers,
Luca


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cadk7b0nbfq-x35-hj3hgts62emvybglkdksjaqoeqbzq7pc...@mail.gmail.com



Bug#709629: nmu: libavg/1.7.1-3

2013-05-24 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu


Please schedule binNMUs for libavg to drop python2.6 dependencies.

#701304 shouldn't be a problem anymore, I was able to reproduce the
build failure some days ago, but it seems the cause of the problem has
been somehow fixed (it was related to boost1.53, IIRC), as I'm
currently able to rebuild libavg now.

nmu libavg_1.7.1-3 . ALL . -m 'Drop python2.6'


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CADk7b0N+J=jBfkqNKjvMnx4ZYUqi7Hw4B5wf24YYNvrodY5B=g...@mail.gmail.com



Bug#707954: A binNMU should be enough

2013-05-14 Thread Luca Falavigna
retitle 707954 nmu: more python2.6 removal binNMUs
thanks


pykcs11 needs a binNMU too, here's the updated list:

nmu pykcs11_1.2.4-1 . ALL . -m 'Drop python2.6'
nmu shogun_1.1.0-6 . ALL . -m 'Drop python2.6'


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CADk7b0MqfQ6fTb1LEg2C1rqG7xR=wozdrj7knybdr-omz9q...@mail.gmail.com



Bug#707677: nmu: python2.6 removal

2013-05-11 Thread Luca Falavigna
Right! I've rebuilt every package listed, here's the list of the verified ones.

nmu aster_11.3.0-2-2 . amd64 kfreebsd-i386 . -m 'Drop python2.6'
nmu cheetah_2.4.4-3 . armel armhf hurd-i386 i386 ia64 kfreebsd-amd64
kfreebsd-i386 mips mipsel powerpc sparc . -m 'Drop python2.6'
nmu dff_1.2.0+dfsg.1-1 . ALL . -m 'Drop python2.6'
nmu dolfin_1.0.0-7 . ALL . -m 'Drop python2.6'
nmu fife_0.3.3+r3-3 . ALL . -m 'Drop python2.6'
nmu ldns_1.6.13-4 . ALL . -m 'Drop python2.6'
nmu libcap-ng_0.7.3-1 . amd64 . -m 'Drop python2.6'
nmu libgetdata_0.7.3-6 . ALL . -m 'Drop python2.6'
nmu libmimic_1.0.4-2.1 . ALL . -m 'Drop python2.6'
nmu libvigraimpex_1.7.1+dfsg1-3 . hurd-i386 . -m 'Drop python2.6'
nmu mitmproxy_0.8-2 . amd64 armel armhf i386 kfreebsd-i386 powerpc
s390 s390x sparc . -m 'Drop python2.6'
nmu mlpy_2.2.0~dfsg1-2 . ALL . -m 'Drop python2.6'
nmu nflog-bindings_0.2-3 . ALL . -m 'Drop python2.6'
nmu nfqueue-bindings_0.4-3 . ALL . -m 'Drop python2.6'
nmu plplot_5.9.9-5 . ALL . -m 'Drop python2.6'
nmu snimpy_0.6.3-1 . amd64 . -m 'Drop python2.6'
nmu syfi_1.0.0.dfsg-1 . ALL . -m 'Drop python2.6'
nmu ufc_2.0.5-3 . ALL . -m 'Drop python2.6'
nmu uwsgi_1.2.3+dfsg-5 . ALL . -m 'Drop python2.6'
nmu xdelta3_3.0.0.dfsg-1 . ALL . -m 'Drop python2.6'

2013/5/10 Adam D. Barratt a...@adam-barratt.org.uk:
 Control: tags -1 + moreinfo

 On Fri, 2013-05-10 at 08:53 +, Luca Falavigna wrote:
 python2.6 has been removed from the list of supported versions,
 these packages need to be binNMUed to get rid of python2.6 dependencies:

 At least some of them have FTBFS bugs filed against them for exactly
 that reason - e.g. #707711 against python-initgroups. :-( At the very
 least, the list needs cross-referencing against the list of bugs before
 we look at binNMUs.

 Regards,

 Adam



-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CADk7b0M9xx=a0jji30hb-we3ci_x9w3mmn98zjwgrdmbfir...@mail.gmail.com



Bug#707677: nmu: python2.6 removal

2013-05-10 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu


python2.6 has been removed from the list of supported versions,
these packages need to be binNMUed to get rid of python2.6 dependencies:

nmu aster_11.3.0-2-2 . amd64 kfreebsd-i386 . -m 'Drop python2.6'
nmu cheetah_2.4.4-3 . armel armhf hurd-i386 i386 ia64 kfreebsd-amd64 
kfreebsd-i386 mips mipsel powerpc sparc . -m 'Drop python2.6'
nmu crystalspace_1.4.0+dfsg-4 . ALL . -m 'Drop python2.6'
nmu dff_1.2.0+dfsg.1-1 . ALL . -m 'Drop python2.6'
nmu dolfin_1.0.0-7 . ALL . -m 'Drop python2.6'
nmu fife_0.3.3+r3-3 . ALL . -m 'Drop python2.6'
nmu ldns_1.6.13-4 . ALL . -m 'Drop python2.6'
nmu libavg_1.7.1-3 . ALL . -m 'Drop python2.6'
nmu libcap-ng_0.7.3-1 . amd64 . -m 'Drop python2.6'
nmu libgetdata_0.7.3-6 . ALL . -m 'Drop python2.6'
nmu libmimic_1.0.4-2.1 . ALL . -m 'Drop python2.6'
nmu libvigraimpex_1.7.1+dfsg1-3 . hurd-i386 . -m 'Drop python2.6'
nmu mitmproxy_0.8-2 . amd64 armel armhf i386 kfreebsd-i386 powerpc s390 s390x 
sparc . -m 'Drop python2.6'
nmu mlpy_2.2.0~dfsg1-2 . ALL . -m 'Drop python2.6'
nmu mod-wsgi_3.3-4 . ALL . -m 'Drop python2.6'
nmu nflog-bindings_0.2-3 . ALL . -m 'Drop python2.6'
nmu nfqueue-bindings_0.4-3 . ALL . -m 'Drop python2.6'
nmu plplot_5.9.9-5 . ALL . -m 'Drop python2.6'
nmu pyside_1.1.1-3 . ALL . -m 'Drop python2.6'
nmu python-initgroups_2.13.0-1 . ALL . -m 'Drop python2.6'
nmu shiboken_1.1.1-1 . ALL . -m 'Drop python2.6'
nmu snimpy_0.6.3-1 . amd64 . -m 'Drop python2.6'
nmu syfi_1.0.0.dfsg-1 . ALL . -m 'Drop python2.6'
nmu ufc_2.0.5-3 . ALL . -m 'Drop python2.6'
nmu uwsgi_1.2.3+dfsg-5 . ALL . -m 'Drop python2.6'
nmu xdelta3_3.0.0.dfsg-1 . ALL . -m 'Drop python2.6'

Cheers,
Luca


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130510085311.ga2...@franck.debian.org



Bug#703238: unblock: remmina/1.0.0-4+deb7u1 (pre-approval)

2013-03-17 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

I'd like to receive a pre-approval to upload into unstable a fix for bug
#668020 (and its merged ones), which could result very annoying.

One of the submitters confirmed the proposed patch fixes the bug for him
(thanks to Bernhard Schmidt for his efforts!), so it received a first testing
in advance.

I chose 1.0.0-4+deb7u1 as version because I already uploaded 1.0.0-5 to
experimental.

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores)
diff -Nru remmina-1.0.0/debian/changelog remmina-1.0.0/debian/changelog
--- remmina-1.0.0/debian/changelog	2012-05-24 22:37:17.0 +0200
+++ remmina-1.0.0/debian/changelog	2013-03-17 14:39:39.0 +0100
@@ -1,3 +1,11 @@
+remmina (1.0.0-4+deb7u1) unstable; urgency=low
+
+  [ Bernhard Schmidt ]
+  * Cherry-pick commit 9243d35 from upstream Git repository to fix a
+crash when resizing window to fit remote resolution (Closes: #668020).
+
+ -- Luca Falavigna dktrkr...@debian.org  Sun, 17 Mar 2013 14:37:39 +0100
+
 remmina (1.0.0-4) unstable; urgency=low
 
   [ Martijn van Brummelen ]
diff -Nru remmina-1.0.0/debian/patches/fix-crash-on-resize.patch remmina-1.0.0/debian/patches/fix-crash-on-resize.patch
--- remmina-1.0.0/debian/patches/fix-crash-on-resize.patch	1970-01-01 01:00:00.0 +0100
+++ remmina-1.0.0/debian/patches/fix-crash-on-resize.patch	2013-03-07 15:13:50.0 +0100
@@ -0,0 +1,25 @@
+From 1901a1e9e5282c1deca2f5f98476e2c7e9243d35 Mon Sep 17 00:00:00 2001
+From: Jean-Louis Dupond jean-lo...@dupond.be
+Date: Mon, 10 Sep 2012 14:12:11 +0200
+Subject: [PATCH] Closes #63: fix typo when fitting window
+
+---
+ remmina/src/remmina_connection_window.c |2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/remmina/src/remmina_connection_window.c b/remmina/src/remmina_connection_window.c
+index 7ff1246..2ba8193 100644
+--- a/remmina/src/remmina_connection_window.c
 b/remmina/src/remmina_connection_window.c
+@@ -436,7 +436,7 @@ static gboolean remmina_connection_holder_toolbar_autofit_restore(RemminaConnect
+ 		remmina_connection_holder_get_desktop_size(cnnhld, width, height, TRUE);
+ 		gtk_widget_get_allocation(priv-notebook, na);
+ 		gtk_widget_get_allocation(cnnobj-scrolled_container, ca);
+-		gtk_widget_get_allocation(priv-toolbar, ca);
++		gtk_widget_get_allocation(priv-toolbar, ta);
+ 		gtk_window_resize(GTK_WINDOW(cnnhld-cnnwin), MAX(1, width + na.width - ca.width),
+ MAX(1, height + ta.height + na.height - ca.height));
+ 		gtk_container_check_resize(GTK_CONTAINER(cnnhld-cnnwin));
+-- 
+1.7.10
+
diff -Nru remmina-1.0.0/debian/patches/series remmina-1.0.0/debian/patches/series
--- remmina-1.0.0/debian/patches/series	2012-05-24 22:37:17.0 +0200
+++ remmina-1.0.0/debian/patches/series	2013-03-07 15:13:50.0 +0100
@@ -7,3 +7,4 @@
 fullname.patch
 systray.patch
 scroll.patch
+fix-crash-on-resize.patch


Bug#703238: unblock: remmina/1.0.0-4+deb7u1 (pre-approval)

2013-03-17 Thread Luca Falavigna
Uploaded, thanks!


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CADk7b0NbTiCb9ow5R5Xy4acSryEKRBx+2AFOBj-JJk5J0i=e...@mail.gmail.com



Bug#697101: tpu: freerdp/1.0.1-1.1+deb7u1 (pre-approval)

2013-01-28 Thread Luca Falavigna
Oops, I somehow missed the previous mail.
I just uploaded a fixed revision to t-p-u with wrapper functions
marked as static and symbols file change reverted.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cadk7b0ojltque81uttbjkoe0z5qn6pysvl8uf2qzkhheqls...@mail.gmail.com



Bug#697101: tpu: freerdp/1.0.1-1.1+deb7u1 (pre-approval)

2013-01-08 Thread Luca Falavigna
2013/1/7 Julien Cristau jcris...@debian.org:
 So yes I think I'd prefer an upload reverting the .symbols change.

Unfortunately, simply reverting the .symbols change is not enough, as
dpkg-gensymbols is passed -c4 option which makes freerdp FTBFS due to
newly added symbols.

What do you suggest? Lowering -c4 to -c3 to ignore the symbols change?
Adjusting the patch to flag the recently added functions as static?


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CADk7b0Mco-KqBdGS=i6urtp8yftprth4-7qrr9anevjorjp...@mail.gmail.com



Bug#697101: tpu: freerdp/1.0.1-1.1+deb7u1 (pre-approval)

2013-01-07 Thread Luca Falavigna
2013/1/6 Julien Cristau jcris...@debian.org:
 If the symbols are added in this 1.0.1-1.1+deb7u1 version, why did you
 make the symbols file claim they're in 1.0.1?

I blindly picked those suggested by dh_makeshlibs.
Should I prepare a new upload fixing this?


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cadk7b0nloiau15lcqvh9tvevjeffn0aymxnxltgvgdtx60k...@mail.gmail.com



Bug#697411: unblock: zendframework/1.11.13-1.1

2013-01-04 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package zendframework

It contains a fix for CVE-2012-5657 (as seen in bug #696483), taken from
upstream SVN repository.

unblock zendframework/1.11.13-1.1

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores)
diff -u zendframework-1.11.13/debian/changelog zendframework-1.11.13/debian/changelog
--- zendframework-1.11.13/debian/changelog
+++ zendframework-1.11.13/debian/changelog
@@ -1,3 +1,14 @@
+zendframework (1.11.13-1.1) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * debian/patches/02-ZF2012-05:
+- Fix for CVE-2012-5657: remove the XXE vector by calling
+  libxml_disable_entity_loader() before attempting to parse the
+  feed via DOMDocument::loadXML(). Patch taken from upstream SVN
+  repository, revision 25159 (Closes: #696483).
+
+ -- Luca Falavigna dktrkr...@debian.org  Tue, 25 Dec 2012 17:32:10 +0100
+
 zendframework (1.11.13-1) unstable; urgency=high
 
   * new upstream release
diff -u zendframework-1.11.13/debian/patches/series zendframework-1.11.13/debian/patches/series
--- zendframework-1.11.13/debian/patches/series
+++ zendframework-1.11.13/debian/patches/series
@@ -1,0 +2 @@
+02-ZF2012-05
only in patch2:
unchanged:
--- zendframework-1.11.13.orig/debian/patches/02-ZF2012-05
+++ zendframework-1.11.13/debian/patches/02-ZF2012-05
@@ -0,0 +1,446 @@
+Index: zendframework-1.11.13/library/Zend/Feed.php
+===
+--- zendframework-1.11.13.orig/library/Zend/Feed.php	2012-01-05 22:27:01.0 +0100
 zendframework-1.11.13/library/Zend/Feed.php	2012-12-25 17:31:38.238088865 +0100
+@@ -191,7 +191,8 @@
+ public static function importString($string)
+ {
+ // Load the feed as an XML DOMDocument object
+-$libxml_errflag = libxml_use_internal_errors(true);
++$libxml_errflag   = libxml_use_internal_errors(true);
++$libxml_entity_loader = libxml_disable_entity_loader(true);
+ $doc = new DOMDocument;
+ if (trim($string) == '') {
+ require_once 'Zend/Feed/Exception.php';
+@@ -199,9 +200,9 @@
+ . ' is an Empty string or comes from an empty HTTP response');
+ }
+ $status = $doc-loadXML($string);
++libxml_disable_entity_loader($libxml_entity_loader);
+ libxml_use_internal_errors($libxml_errflag);
+ 
+-
+ if (!$status) {
+ // prevent the class to generate an undefined variable notice (ZF-2590)
+ // Build error message
+Index: zendframework-1.11.13/library/Zend/Feed/Abstract.php
+===
+--- zendframework-1.11.13.orig/library/Zend/Feed/Abstract.php	2012-01-05 22:27:01.0 +0100
 zendframework-1.11.13/library/Zend/Feed/Abstract.php	2012-12-25 17:31:38.234088865 +0100
+@@ -81,9 +81,9 @@
+  * @see Zend_Feed_Exception
+  */
+ require_once 'Zend/Feed/Exception.php';
+-throw new Zend_Feed_Exception('Feed failed to load, got response code ' . $response-getStatus());
++throw new Zend_Feed_Exception('Feed failed to load, got response code ' . $response-getStatus() . '; request: ' . $client-getLastRequest() . \nresponse:  . $response-asString());
+ }
+-$this-_element = $response-getBody();
++$this-_element = $this-_importFeedFromString($response-getBody());
+ $this-__wakeup();
+ } elseif ($string !== null) {
+ // Retrieve the feed from $string
+@@ -256,4 +256,49 @@
+  * @return void
+  */
+ abstract public function send();
++
++/**
++ * Import a feed from a string
++ *
++ * Protects against XXE attack vectors.
++ * 
++ * @param  string $feed 
++ * @return string
++ * @throws Zend_Feed_Exception on detection of an XXE vector
++ */
++protected function _importFeedFromString($feed)
++{
++// Load the feed as an XML DOMDocument object
++$libxml_errflag   = libxml_use_internal_errors(true);
++$libxml_entity_loader = libxml_disable_entity_loader(true);
++$doc = new DOMDocument;
++if (trim($feed) == '') {
++require_once 'Zend/Feed/Exception.php';
++throw new Zend_Feed_Exception('Remote feed being imported'
++. ' is an Empty string or comes from an empty HTTP response');
++}
++$status = $doc-loadXML($feed);
++libxml_disable_entity_loader($libxml_entity_loader);
++libxml_use_internal_errors($libxml_errflag);
++
++if (!$status) {
++// prevent the class to generate an undefined variable notice (ZF-2590)
++// Build error message

Bug#697414: tpu: owncloud/4.0.4debian2-3.2 (pre-approval)

2013-01-04 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

I'd like to see if it's feasible to upload a targeted fix to testing-proposed-
updates to address #696574.

This bug has been fixed in unstable already, but given it has a newer upstream
version, it's unlikely it will migrate, hence this request.

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores)
diff -Nru owncloud-4.0.4debian2/debian/changelog owncloud-4.0.4debian2/debian/changelog
--- owncloud-4.0.4debian2/debian/changelog	2012-12-05 22:12:11.0 +0100
+++ owncloud-4.0.4debian2/debian/changelog	2013-01-04 23:31:11.0 +0100
@@ -1,3 +1,14 @@
+owncloud (4.0.4debian2-3.2) testing-proposed-updates; urgency=high
+
+  * Non-maintainer upload.
+  * Multiple security fixes (Closes: #696574):
++ debian/patches/10_oc-sa-2012-006.patch:
+  - CVE-2012-5665: Auth bypass in user_webdavauth and user_ldap
++ debian/patches/11_oc-sa-2012-007.patch:
+  - CVE-2012-5666: XSS vulnerability in bookmarks
+
+ -- Luca Falavigna dktrkr...@debian.org  Fri, 04 Jan 2013 23:30:46 +0100
+
 owncloud (4.0.4debian2-3.1) testing-proposed-updates; urgency=high
 
   * Non-maintainer upload, fixes several security issues (Closes: #693990).
diff -Nru owncloud-4.0.4debian2/debian/patches/10_oc-sa-2012-006.patch owncloud-4.0.4debian2/debian/patches/10_oc-sa-2012-006.patch
--- owncloud-4.0.4debian2/debian/patches/10_oc-sa-2012-006.patch	1970-01-01 01:00:00.0 +0100
+++ owncloud-4.0.4debian2/debian/patches/10_oc-sa-2012-006.patch	2013-01-04 23:28:29.0 +0100
@@ -0,0 +1,48 @@
+Index: owncloud-4.0.8debian/apps/files_encryption/settings.php
+===
+--- owncloud-4.0.8debian.orig/apps/files_encryption/settings.php	2012-10-09 17:09:46.0 +0200
 owncloud-4.0.8debian/apps/files_encryption/settings.php	2012-12-25 16:29:57.110214044 +0100
+@@ -6,6 +6,8 @@
+  * See the COPYING-README file.
+  */
+ 
++OC_Util::checkAdminUser();
++
+ $tmpl = new OCP\Template( 'files_encryption', 'settings');
+ $blackList=explode(',',OCP\Config::getAppValue('files_encryption','type_blacklist','jpg,png,jpeg,avi,mpg,mpeg,mkv,mp3,oga,ogv,ogg'));
+ $enabled=(OCP\Config::getAppValue('files_encryption','enable_encryption','true')=='true');
+Index: owncloud-4.0.8debian/apps/user_ldap/settings.php
+===
+--- owncloud-4.0.8debian.orig/apps/user_ldap/settings.php	2012-10-09 17:10:37.0 +0200
 owncloud-4.0.8debian/apps/user_ldap/settings.php	2012-12-25 16:29:57.114214045 +0100
+@@ -20,6 +20,9 @@
+  * License along with this library.  If not, see http://www.gnu.org/licenses/.
+  *
+  */
++
++OC_Util::checkAdminUser();
++
+ $params = array('ldap_host', 'ldap_port', 'ldap_dn', 'ldap_agent_password', 'ldap_base', 'ldap_base_users', 'ldap_base_groups', 'ldap_userlist_filter', 'ldap_login_filter', 'ldap_group_filter', 'ldap_display_name', 'ldap_group_display_name', 'ldap_tls', 'ldap_nocase', 'ldap_quota_def', 'ldap_quota_attr', 'ldap_email_attr', 'ldap_group_member_assoc_attribute');
+ 
+ OCP\Util::addscript('user_ldap', 'settings');
+Index: owncloud-4.0.8debian/apps/user_migrate/settings.php
+===
+--- owncloud-4.0.8debian.orig/apps/user_migrate/settings.php	2012-10-09 17:10:37.0 +0200
 owncloud-4.0.8debian/apps/user_migrate/settings.php	2012-12-25 16:29:57.114214045 +0100
+@@ -22,6 +22,9 @@
+  * License along with this library.  If not, see http://www.gnu.org/licenses/.
+  *
+  */
++
++OC_Util::checkLoggedIn();
++
+ OCP\App::checkAppEnabled('user_migrate');
+ if (isset($_POST['user_import'])) {
+ 	$root = OC::$SERVERROOT . /;
+@@ -86,4 +89,4 @@
+ 	// fill template
+ 	$tmpl = new OCP\Template('user_migrate', 'settings');
+ 	return $tmpl-fetchPage();
+-}
+\ No newline at end of file
++}
diff -Nru owncloud-4.0.4debian2/debian/patches/11_oc-sa-2012-007.patch owncloud-4.0.4debian2/debian/patches/11_oc-sa-2012-007.patch
--- owncloud-4.0.4debian2/debian/patches/11_oc-sa-2012-007.patch	1970-01-01 01:00:00.0 +0100
+++ owncloud-4.0.4debian2/debian/patches/11_oc-sa-2012-007.patch	2013-01-04 23:28:29.0 +0100
@@ -0,0 +1,13 @@
+Index: owncloud-4.0.8debian/apps/bookmarks/js/bookmarks.js
+===
+--- owncloud-4.0.8debian.orig/apps/bookmarks/js/bookmarks.js	2012-10-09 17:10:37.0 +0200
 owncloud-4.0.8debian/apps/bookmarks/js/bookmarks.js	2012-12-25 16:25:21.050223382 +0100
+@@ -141,7 +141,7 @@
+ 	var taglist = '';
+ 	for ( var i=0, len=tags.length; ilen; ++i ){
+ 		if(tags[i] != '')
+-			taglist = taglist + 'a class=bookmark_tag href='+replaceQueryString( String(window.location), 'tag', encodeURIComponent(tags

Remove packages in t-p-u which migrated already?

2013-01-04 Thread Luca Falavigna
Hi,

I ran a patched version of dak cruft-report [0] to consider as cruft
packages with an higher or equal version of those available in an
enhanced suite (unstable vs. experimental and testing vs.
testing-proposed-updates). Currently, cruft-reports checks for higher
versions only.

As of today, cruft-report marked bind9 as the only candidate for
removal (1:9.8.4.dfsg.P1-1  1:9.8.1.dfsg.P1-4.4), while my patched
version revealed a much longer list [1].

I wonder whether it could be possible to safely decruft those packages
(by eventually deploying my patch in dak), or whether it is better to
leave them in place.

[0] http://ftp-master.debian.org/users/dktrkranz/cruft-report.patch
[1] http://ftp-master.debian.org/users/dktrkranz/t-p-u.cruft

Cheers,
Luca


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CADk7b0PCh2vkZUsh_rj3Qj5y7E5XJF6hRf+uSn71R8SgUA=9...@mail.gmail.com



Bug#697101: tpu: freerdp/1.0.1-1.1+deb7u1 (pre-approval)

2013-01-01 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

I'd like to see if it's feasible to upload a targeted fix to testing-proposed-
updates to address #662854.

This bug has been fixed in unstable already, also introducing changes [0] which
should not fit release policy anymore, so I'd like to prepare an upload which
provided the upstream fix only [1], plus a proper changelog entry.

If that's OK for you, I'll coordinate with Otavio to have this bug finally
solved in Wheezy.

Thanks.

[0] http://anonscm.debian.org/gitweb/?p=collab-
maint/freerdp.git;a=commitdiff;h=debian/1.0.1-2;hp=debian/1.0.1-1
[1]
https://github.com/FreeRDP/FreeRDP/commit/5617af901a4269d7fe9688793135b79ed43aecd4


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130101135432.7238.26081.reportbug@utumno



Bug#697101: tpu: freerdp/1.0.1-1.1+deb7u1 (pre-approval)

2013-01-01 Thread Luca Falavigna
I hadn't realized the patch added new symbols (altough they're quite
harmless), and I had to refresh debian/libfreerdp1.symbols
accordingly. Full debdiff of the changes is attached.

Otavio, as freerdp is listed as LowNMU, I uploaded it to DELAYED/5.


1.0.1-1.1+deb7u1.debdiff
Description: Binary data


Bug#696670: unblock: mahara/1.5.1-3.1

2012-12-25 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package mahara

It provides a fix, cherry-picked from upstream repository, for a XSS
vulnerability as described in bug #695789

unblock mahara/1.5.1-3.1

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores)
diff -Nru mahara-1.5.1/debian/changelog mahara-1.5.1/debian/changelog
--- mahara-1.5.1/debian/changelog	2012-11-16 09:33:12.0 +0100
+++ mahara-1.5.1/debian/changelog	2012-12-23 15:02:25.0 +0100
@@ -1,3 +1,14 @@
+mahara (1.5.1-3.1) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * SECURITY UPDATE: Fix a cross-site scripting (XSS) vulnerability
+which allowed remote attackers to inject arbitrary web script or
+HTML via the query parameter.
+- debian/patches/CVE-2012-2253.patch
+- Closes: #695789
+
+ -- Luca Falavigna dktrkr...@debian.org  Sun, 23 Dec 2012 14:53:41 +0100
+
 mahara (1.5.1-3) unstable; urgency=high
 
   * SECURITY UPDATE: Disable XML entity parsing to prevent XEE
diff -Nru mahara-1.5.1/debian/patches/CVE-2012-2253.patch mahara-1.5.1/debian/patches/CVE-2012-2253.patch
--- mahara-1.5.1/debian/patches/CVE-2012-2253.patch	1970-01-01 01:00:00.0 +0100
+++ mahara-1.5.1/debian/patches/CVE-2012-2253.patch	2012-12-23 15:02:25.0 +0100
@@ -0,0 +1,24 @@
+Author: Hugh Davenport h...@catalyst.net.nz
+Subject: Cross-site scripting (XSS) vulnerability
+Origin: upstream
+Bug: https://bugs.launchpad.net/mahara/+bug/1079498
+
+CVE-2012-2253
+
+Cross-site scripting (XSS) vulnerability which allowed remote
+attackers to inject arbitrary web script or HTML via the query
+parameter.
+
+Index: mahara/htdocs/lib/web.php
+===
+--- mahara.orig/htdocs/lib/web.php	2012-12-23 14:44:57.009756577 +0100
 mahara/htdocs/lib/web.php	2012-12-23 14:47:02.405760418 +0100
+@@ -3273,7 +3273,7 @@
+ }
+ else {
+ $return .= ''
+-. 'a href=' . $url . ' title=' . $title
++. 'a href=' . hsc($url) . ' title=' . $title
+ . '' . $text . '/a/span';
+ }
+ 
diff -Nru mahara-1.5.1/debian/patches/series mahara-1.5.1/debian/patches/series
--- mahara-1.5.1/debian/patches/series	2012-11-16 09:32:59.0 +0100
+++ mahara-1.5.1/debian/patches/series	2012-12-23 15:02:25.0 +0100
@@ -10,3 +10,4 @@
 CVE-2012-2244-0003.patch
 CVE-2012-2246.patch
 CVE-2012-2247.patch
+CVE-2012-2253.patch


Bug#694305: unblock: canna/3.7p3-11

2012-11-25 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package canna

This upload fixes RC bug #694266 (file conflict between two packages).

unblock canna/3.7p3-11

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores)
diff -Nru canna-3.7p3/debian/changelog canna-3.7p3/debian/changelog
--- canna-3.7p3/debian/changelog	2012-07-28 06:44:49.0 +0200
+++ canna-3.7p3/debian/changelog	2012-11-25 10:14:36.0 +0100
@@ -1,3 +1,12 @@
+canna (3.7p3-11) unstable; urgency=medium
+
+  * QA upload.
+  * debian/control:
+- Add Breaks/Replaces ( 3.7p3-10) to canna-utils, which now owns
+  /usr/bin/chmoddic (Closes: #694266).
+
+ -- Luca Falavigna dktrkr...@debian.org  Sun, 25 Nov 2012 10:13:32 +0100
+
 canna (3.7p3-10) unstable; urgency=low
 
   * QA upload.
diff -Nru canna-3.7p3/debian/control canna-3.7p3/debian/control
--- canna-3.7p3/debian/control	2012-03-30 16:49:13.0 +0200
+++ canna-3.7p3/debian/control	2012-11-25 10:13:28.0 +0100
@@ -26,6 +26,8 @@
 Package: canna-utils
 Architecture: any
 Depends: ${misc:Depends}, ${shlibs:Depends}
+Breaks: canna ( 3.7p3-10)
+Replaces: canna ( 3.7p3-10)
 Description: input system for Japanese - utilities
  Canna provides a unified user interface for Japanese input. It is based
  on a client-server model and supports automatic kana-to-kanji conversion.


Bug#692183: unblock: gdebi/0.8.7

2012-11-02 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package gdebi

This upload fixes RC bug #691998, plus some crashes bugs reported in Launchpad:
* Do not set a busy cursor if there is no X11 window
   https://launchpad.net/bugs/1055181
* Define apt.Cache in class initialization
   https://launchpad.net/bugs/1072799
* Add file to gdebi-core dependencies
   https://launchpad.net/bugs/1067306

I'm attaching a debdiff of the changes introduced.

unblock gdebi/0.8.7

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores)
=== modified file 'GDebi/GDebi.py'
--- GDebi/GDebi.py	2012-10-11 19:21:07 +
+++ GDebi/GDebi.py	2012-10-11 20:09:07 +
@@ -145,13 +145,19 @@
 self.synaptic_config = apt_pkg.Configuration()
 
 if file !=  and os.path.exists(file):
-self.window_main.get_window().set_cursor(Gdk.Cursor.new(Gdk.CursorType.WATCH))
+self.open(file)
+self.window_main.set_sensitive(True)
+
+def _show_busy_cursor(self, show_busy_cursor):
+win = self.window_main.get_window()
+if not win:
+return
+if show_busy_cursor:
+win.set_cursor(Gdk.Cursor.new(Gdk.CursorType.WATCH))
 while Gtk.events_pending(): 
 Gtk.main_iteration()
-self.open(file)
-self.window_main.get_window().set_cursor(None)
-
-self.window_main.set_sensitive(True)
+else:
+win.set_cursor(None)
 
 def gio_progress_callback(self, bytes_read, bytes_total, data):
 self.progressbar_download.set_fraction(bytes_read/float(bytes_total))
@@ -224,14 +230,12 @@
 path = self._get_file_path_from_dnd_dropped_uri(uri)
 #print 'path to open', path
 if path.endswith(.deb):
-self.window_main.get_window().set_cursor(Gdk.Cursor.new(Gdk.CursorType.WATCH))
-while Gtk.events_pending(): 
-Gtk.main_iteration()
 self.open(path)
-self.window_main.get_window().set_cursor(None)
 
 def open(self, file, downloaded=False):
+self._show_busy_cursor(True)
 res = GDebiCommon.open(self, file, downloaded)
+self._show_busy_cursor(False)
 if res == False:
 self.show_alert(Gtk.MessageType.ERROR, self.error_header, self.error_body)
 return False

=== modified file 'GDebi/GDebiCli.py'
--- GDebi/GDebiCli.py	2012-10-11 19:23:54 +
+++ GDebi/GDebiCli.py	2012-11-02 13:29:24 +
@@ -122,10 +122,7 @@
 iprogress = apt.progress.base.InstallProgress()
 try:
 res = self._cache.commit(fprogress,iprogress)
-except apt.cache.FetchFailedException, e:
-sys.stderr.write(_(Error during install: '%s') % e)
-return 1
-except SystemError, e:
+except (apt.cache.FetchFailedException, SystemError), e:
 sys.stderr.write(_(Error during install: '%s') % e)
 return 1
 

=== modified file 'GDebi/GDebiCommon.py'
--- GDebi/GDebiCommon.py	2012-09-12 21:28:17 +
+++ GDebi/GDebiCommon.py	2012-11-02 13:29:24 +
@@ -52,6 +52,7 @@
 # cprogress may be different in child classes
 def __init__(self, datadir, options, file=):
 self.cprogress = None
+self._cache = None
 self.deps = 
 self.version_info_title = 
 self.version_info_msg = 

=== modified file 'debian/changelog'
--- debian/changelog	2012-10-11 20:07:12 +
+++ debian/changelog	2012-11-02 16:36:21 +
@@ -1,3 +1,23 @@
+gdebi (0.8.7) unstable; urgency=low
+
+  [ Michael Vogt ]
+  * GDebi/GDebi.py:
+- do not set a busy cursor if there is no X11 window (LP: #1055181).
+
+  [ Jason Conti ]
+  * GDebi/GDebiCommon.py:
+- Define apt.Cache in class initialization (LP: #1072799).
+
+  [ Luca Falavigna ]
+  * gdebi-kde:
+- Do not use unicode in help options (Closes: #691998, LP: #1063114).
+  * GDebi/GDebiCli.py:
+- Improve exception handling.
+  * debian/control:
+- Add file to gdebi-core dependencies (LP: #1067306).
+
+ -- Luca Falavigna dktrkr...@debian.org  Fri, 02 Nov 2012 17:36:06 +0100
+
 gdebi (0.8.6) unstable; urgency=low
 
   * gdebi, GDebi/GDebiCli.py:

=== modified file 'debian/control'
--- debian/control	2012-09-12 21:17:04 +
+++ debian/control	2012-11-02 12:30:07 +
@@ -16,7 +16,8 @@
 Depends: ${python:Depends},
  ${misc:Depends},
  python-apt (= 0.7.97),
-	 python-debian (= 0.1.15)
+ python-debian (= 0.1.15),
+ file
 Suggests: xz-utils | xz-lzma
 Description: simple tool to install deb files
  gdebi lets you install local deb packages resolving and installing 

=== modified file 'gdebi-kde'
--- gdebi-kde	2012

Bug#691541: unblock: fife/0.3.3+r3-1.1

2012-10-26 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package fife

This upload fixes RC bug #690370 (copyright issue), plus a fix for embedded-
library lintian autoreject, which prevents fife from being accepted.

unblock fife/0.3.3+r3-1.1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores)
diff -Nru fife-0.3.3+r3/debian/changelog fife-0.3.3+r3/debian/changelog
--- fife-0.3.3+r3/debian/changelog	2012-04-22 19:52:01.0 +0200
+++ fife-0.3.3+r3/debian/changelog	2012-10-26 20:55:12.0 +0200
@@ -1,3 +1,12 @@
+fife (0.3.3+r3-1.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Add engine/core/util/utf8/utf8* to copyright file (Closes: #690370)
+  * Use packaged version of Glee-library to fix lintian embedded-library
+autoreject tag.
+
+ -- Anton Gladky gladky.an...@gmail.com  Wed, 24 Oct 2012 21:15:06 +0200
+
 fife (0.3.3+r3-1) unstable; urgency=low
 
   * New upstream release
diff -Nru fife-0.3.3+r3/debian/control fife-0.3.3+r3/debian/control
--- fife-0.3.3+r3/debian/control	2012-04-22 20:17:37.0 +0200
+++ fife-0.3.3+r3/debian/control	2012-10-26 20:49:50.0 +0200
@@ -24,7 +24,8 @@
  libguichan-dev,
  libtinyxml-dev,
  libpng-dev,
- libunittest++-dev
+ libunittest++-dev,
+ glee-dev
 X-Python-Version: = 2.6
 Vcs-Git: git://git.debian.org/git/pkg-games/fife.git
 Vcs-Browser: http://git.debian.org/?p=pkg-games/fife.git
diff -Nru fife-0.3.3+r3/debian/copyright fife-0.3.3+r3/debian/copyright
--- fife-0.3.3+r3/debian/copyright	2012-03-27 19:27:15.0 +0200
+++ fife-0.3.3+r3/debian/copyright	2012-10-26 20:53:35.0 +0200
@@ -13,6 +13,10 @@
 Copyright: 2009  Ben Woodhouse
 License: BSD-2-clause
 
+Files: engine/core/util/utf8/utf8.h engine/core/util/utf8/* 
+Copyright: 2006 Nemanja Trifunovic
+License: Boost-Software-License
+
 Files: engine/core/ext/tinyxml
 Copyright: 2000-2006 Lee Thomason,
  Yves Berquin,
@@ -110,3 +114,27 @@
   
   3. This notice may not be removed or altered from any source
  distribution.
+
+License: Boost-Software-License
+  Permission is hereby granted, free of charge, to any person or organization
+  obtaining a copy of the software and accompanying documentation covered by
+  this license (the Software) to use, reproduce, display, distribute,
+  execute, and transmit the Software, and to prepare derivative works of the
+  Software, and to permit third-parties to whom the Software is furnished to
+  do so, all subject to the following:
+  .
+  The copyright notices in the Software and this entire statement, including
+  the above license grant, this restriction and the following disclaimer,
+  must be included in all copies of the Software, in whole or in part, and
+  all derivative works of the Software, unless such copies or derivative
+  works are solely in the form of machine-executable object code generated by
+  a source language processor.
+  .
+  THE SOFTWARE IS PROVIDED AS IS, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+  IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+  FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT
+  SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE
+  FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE,
+  ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
+  DEALINGS IN THE SOFTWARE.
+  
diff -Nru fife-0.3.3+r3/debian/patches/remove_glee.patch fife-0.3.3+r3/debian/patches/remove_glee.patch
--- fife-0.3.3+r3/debian/patches/remove_glee.patch	1970-01-01 01:00:00.0 +0100
+++ fife-0.3.3+r3/debian/patches/remove_glee.patch	2012-10-26 20:49:50.0 +0200
@@ -0,0 +1,64 @@
+Description: use packaged version of glee
+Author: Anton Gladky gladky.an...@gmail.com
+Last-Update: 2012-10-24
+
+--- a/engine/core/video/opengl/fife_opengl.h
 b/engine/core/video/opengl/fife_opengl.h
+@@ -25,7 +25,7 @@
+ // Standard C++ library includes
+ 
+ // 3rd party library includes
+-#include ext/glee/GLee.h
++#include GLee.h
+ 
+ // GLee.h includes windows.h when on a windows platform
+ // In winnt.h (which is included from windows.h) DELETE
+--- a/doc/dependencies/filedeps.dot
 b/doc/dependencies/filedeps.dot
+@@ -111,7 +111,6 @@
+ engine/core/eventchannel/key/ec_keyevent.h - eventchannel/source/ec_ieventsource.h
+ engine/core/eventchannel/mouse/ec_mouseevent.h - eventchannel/base/ec_inputevent.h
+ engine/core/eventchannel/source/ec_ieventsource.h - ec_eventsourcetypes.h
+-engine/core/ext/glee/GLee.cpp - GLee.h
+ engine/core/ext/tinyxml/fife_tinyxml.h - tinyxml.h
+ engine/core/ext/tinyxml/tinystr.cpp - tinystr.h
+ engine/core/ext/tinyxml/tinyxml.cpp - tinyxml.h
+@@ -633,7 +632,6 @@
+ engine/core/video/imagemanager.h - 

Bug#691267: unblock: vfu/4.10-1.1

2012-10-23 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception


Please unblock vfu/4.10-1.1.
It contains a fix for #685662 (adding missing copyright information).
Debdiff attached.


vfu-4.10-1.1-nmu.diff
Description: Binary data


Bug#691268: unblock: libvoikko/3.5-1.1

2012-10-23 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception


Please unblock libvoikko/3.5-1.1.
It contains a fix for # 690392 (adding missing copyright information).
Debdiff attached.


libvoikko-3.5-1.1-nmu.diff
Description: Binary data


Bug#691269: unblock: megaglest/3.6.0.3-1.2

2012-10-23 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception


Please unblock megaglest/3.6.0.3-1.2.
It contains a fix for #690371 (adding missing copyright information).
Debdiff attached.


megaglest-3.6.0.3-1.2-nmu.diff
Description: Binary data


Bug#687614: unblock: gdebi/0.8.6 (pre-approval)

2012-10-20 Thread Luca Falavigna
gDebi has been uploaded some time ago, and nobody played Vodoo on me,
so it seems it's behaving good ;)
Please consider unblocking it. Other than the changes listed in the
debdiff, I refreshed translations as anticipated in my first message.
Thanks in advance!


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cadk7b0osjg1spt8bhbdvss43jsy59a6fmey7rxbtkxnuhen...@mail.gmail.com




Bug#687614: unblock: gdebi/0.8.6 (pre-approval)

2012-10-11 Thread Luca Falavigna
tags 687614 - moreinfo
thanks


2012/10/6 Niels Thykier ni...@thykier.net:
 In the 0.8.5 code, there are a couple of places where GDebiCli.install
 returns False on error[1], which I believe python translates to 0
 leading to exit 0 with errors (and I suspect that is not what you wanted).

Good catch!
I'm attaching a new debdiff implementing a fix for the return value.


0.8.6.debdiff
Description: Binary data


Bug#687614: unblock: gdebi/0.8.6 (pre-approval)

2012-09-14 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock


Dear Release Team,
I'd like to upload a new gdebi version in unstable fixing some bugs I
recently triaged. They were reported on Launchpad, but most of them
affect Debian too. Here's a description of the changes introduced
since 0.8.5:

* Add xz-utils to gdebi Suggests field (fixing #685193)
  http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/421

* Handle ValueError exception to fix a crash with malformed packages
  http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/422

* Convert help options with unicode, fix crash displaying help in some locales
  http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/423

* Return dpkg error code instead of always return 0
  http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/424

* Fix translation string which caused a crash due to unmatched format string
  http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/425

* Port to new GIO API to fix a crash when accessing packages on GVFS mounts
  http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/426

* Fall-back on kdesu if kdesudo is not avaliable, this is a no-op for Debian,
  but makes gdebi-kde almost useless in Ubuntu, and I'd like to sync
package there
  http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/427

* Mark menu and labels as sensitive at startup, this causes a visual glitch
  http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/428

Other than those, I plan to include new translations in the package,
I'm currently waiting for Launchpad to finalize them.
I'm attaching a full debdiff (not including translations, at the
moment) of the changes I'd like to introduce.

Cheers,
Luca


0.8.6.debdiff
Description: Binary data


Re: Comments regarding libcitadel_8.14-1_amd64.changes

2012-08-18 Thread Luca Falavigna
2012/8/18 Adam D. Barratt a...@adam-barratt.org.uk:
 Given my RM hat, I realise that. ;p  In any case, whatever the fate of
 the packages currently in unstable, the libcitadel in NEW is an
 improvement over what's currently in unstable so there's no objections
 to accepting it from NEW from the release team side.

I've marked package for acceptance, it will enter unstable during next
processing run.

Cheers,
Luca


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cadk7b0mmho7w7un4ob78970qzmdlgy9stmkxplett-gxmjr...@mail.gmail.com



Bug#684557: unblock: conduit/0.3.17-1.1

2012-08-11 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package conduit
it FTBFS when network is not available in the buildds, as reported in #680814).
I'm attaching a debdiff of the changes.

unblock conduit/0.3.17-1.1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores)
diff -u conduit-0.3.17/debian/control conduit-0.3.17/debian/control
--- conduit-0.3.17/debian/control
+++ conduit-0.3.17/debian/control
@@ -12,6 +12,7 @@
python-gtk2-dev, 
intltool, 
gnome-doc-utils, 
+   docbook-xml,
python-dbus (= 0.80.0), 
python-webkit-dev, 
python-dateutil
diff -u conduit-0.3.17/debian/changelog conduit-0.3.17/debian/changelog
--- conduit-0.3.17/debian/changelog
+++ conduit-0.3.17/debian/changelog
@@ -1,3 +1,12 @@
+conduit (0.3.17-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * debian/control:
+- Add docbook-xml to Build-Depends to allow document parsing on
+  systems with no or disabled network access (Closes: #680814).
+
+ -- Luca Falavigna dktrkr...@debian.org  Wed, 08 Aug 2012 21:07:13 +0200
+
 conduit (0.3.17-1) unstable; urgency=low
 
   * New upstream release.


Bug#684495: unblock: lustre/1.8.5+dfsg-3.1

2012-08-10 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception


lustre has been recently adjusted to build with more recent automake
versions than automake1.7, scheduled for removal from the archive
(#648591). The other remaining rdep was isdnutils (unblocked in
#684320), automake1.7 can hopefully go away soon.
I'm attaching a debdiff of the changes introduced.

Thanks for considering a freeze exception for lustre.


lustre.diff
Description: Binary data


Getting rid of automake1.7 for Wheezy?

2012-08-09 Thread Luca Falavigna
Hi,

bug #648591 asks for removal of automake1,7, superseded by newer versions.
It wasn't processed in time for the freeze because of two rdeps,
isdnutils and lustre.

Both packages have been recently adjusted to migrate to a newer
automake (debdiffs attached), so I wonder whether you are inclined to
grant a freeze exception for these packages to eventually let
automake1.7 to be removed from Wheezy after its removal from unstable.
If that's unsuitable for Wheezy, would you like FTP Team to wait to
remove automake1.7 from unstable too?


isdnutils.diff
Description: Binary data


lustre.diff
Description: Binary data


Bug#684292: unblock pylucene/3.5.0-1.1

2012-08-08 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package pylucene
It contains a fix for FTBFS bug #684084, builds are fine now.
Debdiff of changes attached.

unblock pylucene/3.5.0-1.1


pylucene-3.5.0-1.1-debdiff
Description: Binary data


Bug#684292: unblock pylucene/3.5.0-1.1

2012-08-08 Thread Luca Falavigna
2012/8/8 Luca Falavigna dktrkr...@debian.org:
 It contains a fix for FTBFS bug #684084, builds are fine now.

Err... correct bug is #679368.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CADk7b0MtZOEEf4UaX6en1bH36NQUkh=axqxz+262zjlyj1j...@mail.gmail.com



Re: Fix for bug #680814

2012-08-08 Thread Luca Falavigna
Thanks for the suggestions.
I changed the patch following your advices and uploaded a NMU to
DELAYED/2, patch attached.


680814.patch
Description: Binary data


Bug#684221: unblock: hexer/0.1.7-1.1

2012-08-07 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package hexer
It contains a fix for bug #684084; debdiff is attached to that bug.

unblock hexer/0.1.7-1.1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores)


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120807222932.3955.3292.reportbug@utumno



Re: Fix for bug #680814

2012-08-06 Thread Luca Falavigna
2012/8/6 David Prévot taf...@debian.org:
 Ouch, wouldn't that break the validity of the XML files? Maybe using the
 --nonet option of xsltproc would be proper.

I just tried using --nonet, using different positions, but I always get
failed to load external entity
http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd;


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cadk7b0nx3dbd5e-doiduyc+uv2xalykaf9xretem23dmnu0...@mail.gmail.com



Bug#684084: unblock: xfonts-naga10/1.1-13.1

2012-08-06 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package xfonts-naga10
It contains a fix for FTBFS as reported in #682058; debdiff is attached to that
bug.

unblock xfonts-naga10/1.1-13.1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores)


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120806195150.3927.72435.reportbug@utumno



Bug#683924: unblock: shotwell/0.12.3-2

2012-08-05 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package shotwell
It provides a fix for #665498, which has been tested and applied upstream.

unblock shotwell/0.12.3-2

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores)
diff -Nru shotwell-0.12.3/debian/changelog shotwell-0.12.3/debian/changelog
--- shotwell-0.12.3/debian/changelog	2012-06-03 15:18:23.0 +0200
+++ shotwell-0.12.3/debian/changelog	2012-08-05 14:54:36.0 +0200
@@ -1,3 +1,12 @@
+shotwell (0.12.3-2) unstable; urgency=low
+
+  * Team upload.
+  * debian/patches/metadata.patch:
+- Cherry-pick patches from upstream repository to fix crashes while
+  managing metadata (Closes: #665498).
+
+ -- Luca Falavigna dktrkr...@debian.org  Sun, 22 Jul 2012 11:56:51 +0200
+
 shotwell (0.12.3-1) unstable; urgency=low
 
   * Team upload.
diff -Nru shotwell-0.12.3/debian/patches/metadata.patch shotwell-0.12.3/debian/patches/metadata.patch
--- shotwell-0.12.3/debian/patches/metadata.patch	1970-01-01 01:00:00.0 +0100
+++ shotwell-0.12.3/debian/patches/metadata.patch	2012-07-22 11:56:42.0 +0200
@@ -0,0 +1,33 @@
+Description: Writing metadata ends up in a neverending cycle
+Author: Clinton Rogers
+
+Index: shotwell-0.12.3/src/MetadataWriter.vala
+===
+--- shotwell-0.12.3.orig/src/MetadataWriter.vala	2012-05-08 23:46:35.0 +0200
 shotwell-0.12.3/src/MetadataWriter.vala	2012-07-22 11:55:09.212907651 +0200
+@@ -103,7 +103,24 @@
+ }
+ 
+ // tags (keywords) ... replace (or clear) entirely rather than union or intersection
+-if (!equal_sets(current_keywords, metadata.get_keywords())) {
++
++Gee.Setstring safe_keywords = new Gee.HashSetstring();
++
++// Since the tags are stored in an image file's `keywords' field in
++// non-hierarchical format, before checking whether the tags that
++// should be associated with this image have been written, we'll need
++// to produce non-hierarchical versions of the tags to be tested.
++// get_user_visible_name() does this by returning the most deeply-nested
++// portion of a given hierarchical tag; that is, for a tag /a/b/c,
++// it'll return c, which is exactly the form we want here.
++if (current_keywords != null) {
++foreach(string tmp in current_keywords) {
++Tag tag = Tag.for_path(tmp);
++safe_keywords.add(tag.get_user_visible_name());
++}
++}
++
++if (!equal_sets(safe_keywords, metadata.get_keywords())) {
+ metadata.set_keywords(current_keywords);
+ changed = true;
+ }
diff -Nru shotwell-0.12.3/debian/patches/series shotwell-0.12.3/debian/patches/series
--- shotwell-0.12.3/debian/patches/series	2012-06-03 12:23:14.0 +0200
+++ shotwell-0.12.3/debian/patches/series	2012-07-22 11:35:17.0 +0200
@@ -1,3 +1,4 @@
 gettext.patch
 format_string.patch
 openmp.patch
+metadata.patch


Fix for bug #680814

2012-08-05 Thread Luca Falavigna
tags 680814 + patch
thanks


This bug is reproducible only on systems without networking access.
I'm attaching a patch which fixes the issue.

Hi Release Team,
would you consider this patch acceptable for an unblock request?


680814.patch
Description: Binary data


Bug#683977: unblock: gnome-games/3.4.2-3

2012-08-05 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package gnome-games
It provides a fix for #675003, which has been prepared and applied upstream,
and I confirm it works as expected.

unblock gnome-games/3.4.2-3

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores)
diff -ruN gnome-games/debian/changelog gnome-games-3.4.2/debian/changelog
--- gnome-games/debian/changelog	2012-08-05 23:35:37.890618139 +0200
+++ gnome-games-3.4.2/debian/changelog	2012-08-05 23:16:13.0 +0200
@@ -1,3 +1,12 @@
+gnome-games (1:3.4.2-3) unstable; urgency=medium
+
+  * Team upload.
+  * debian/patches/91_glchess_engine.patch:
+- Cherry-pick patch from upstream Git to kill gnuchess engine
+  processes on new game/exit (Closes: #675003).
+
+ -- Luca Falavigna dktrkr...@debian.org  Sun, 05 Aug 2012 23:14:54 +0200
+
 gnome-games (1:3.4.2-2) unstable; urgency=low
 
   * debian/patches/02_swell-foop-datadir.patch: Install data files into
diff -ruN gnome-games/debian/control gnome-games-3.4.2/debian/control
--- gnome-games/debian/control	2012-08-05 23:35:37.890618139 +0200
+++ gnome-games-3.4.2/debian/control	2012-08-05 23:20:22.0 +0200
@@ -7,7 +7,7 @@
 Section: gnome
 Priority: optional
 Maintainer: Josselin Mouette j...@debian.org
-Uploaders: Debian GNOME Maintainers pkg-gnome-maintain...@lists.alioth.debian.org, Emilio Pozuelo Monfort po...@debian.org, Jordi Mallach jo...@debian.org, Michael Biebl bi...@debian.org
+Uploaders: Debian GNOME Maintainers pkg-gnome-maintain...@lists.alioth.debian.org, Jordi Mallach jo...@debian.org, Michael Biebl bi...@debian.org
 Build-Depends: cdbs (= 0.4.90~),
debhelper (= 8),
dh-autoreconf,
diff -ruN gnome-games/debian/patches/91_glchess_engine.patch gnome-games-3.4.2/debian/patches/91_glchess_engine.patch
--- gnome-games/debian/patches/91_glchess_engine.patch	1970-01-01 01:00:00.0 +0100
+++ gnome-games-3.4.2/debian/patches/91_glchess_engine.patch	2012-08-05 23:14:39.0 +0200
@@ -0,0 +1,110 @@
+From 1eb18e95bad9135b516fbf6f77f516fa1ab8b402 Mon Sep 17 00:00:00 2001
+From: Robert Ancell robert.anc...@canonical.com
+Date: Sat, 14 Jul 2012 05:13:12 +
+Subject: glchess: Kill engine processes on new game/exit
+
+Index: gnome-games-3.4.2/glchess/src/chess-engine.vala
+===
+--- gnome-games-3.4.2.orig/glchess/src/chess-engine.vala	2012-05-15 06:37:48.0 +0200
 gnome-games-3.4.2/glchess/src/chess-engine.vala	2012-08-05 23:13:21.586577206 +0200
+@@ -35,9 +35,9 @@
+ try
+ {
+ Process.spawn_async_with_pipes (null, argv, null,
+- SpawnFlags.SEARCH_PATH,
+- null,
+- out pid, out stdin_fd, out stdout_fd, out stderr_fd);
++SpawnFlags.SEARCH_PATH | SpawnFlags.DO_NOT_REAP_CHILD,
++null,
++out pid, out stdin_fd, out stdout_fd, out stderr_fd);
+ }
+ catch (SpawnError e)
+ {
+@@ -45,6 +45,8 @@
+ return false;
+ }
+ 
++ChildWatch.add (pid, engine_stopped_cb);
++
+ stdout_channel = new IOChannel.unix_new (stdout_fd);
+ try
+ {
+@@ -60,7 +62,12 @@
+ 
+ return true;
+ }
+-
++
++private void engine_stopped_cb (Pid pid, int status)
++{
++stopped ();
++}
++
+ public virtual void start_game ()
+ {
+ }
+@@ -79,8 +86,8 @@
+ 
+ public void stop ()
+ {
+-// FIXME
+-stopped ();
++if (pid != 0)
++Posix.kill (pid, Posix.SIGTERM);
+ }
+ 
+ private bool read_cb (IOChannel source, IOCondition condition)
+Index: gnome-games-3.4.2/glchess/src/glchess.vala
+===
+--- gnome-games-3.4.2.orig/glchess/src/glchess.vala	2012-05-15 06:37:48.0 +0200
 gnome-games-3.4.2/glchess/src/glchess.vala	2012-08-05 23:13:21.586577206 +0200
+@@ -124,6 +124,13 @@
+ settings_changed_cb (settings, show-3d);
+ }
+ 
++protected override void shutdown ()
++{
++base.shutdown ();
++if (opponent_engine != null)
++opponent_engine.stop ();
++}
++
+ public void quit_game ()
+ {
+ if (save_duration_timeout != 0)
+@@ -298,7 +305,14 @@
+ black_level = normal;
+ 
+ opponent = null;
+-opponent_engine = null;
++if (opponent_engine != null)
++{
++opponent_engine.stop ();
++opponent_engine.ready_changed.disconnect (engine_ready_cb

Bug#682267: unblock: r-base/2.15.1-4

2012-07-20 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package r-base.
It contains a workaround to let packages build on armel and armhf
architectures. Give-backs were all successful, so the fix is proven good by
itself :)

unblock r-base/2.15.1-4

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores)
diff -u r-base-2.15.1/debian/changelog r-base-2.15.1/debian/changelog
--- r-base-2.15.1/debian/changelog
+++ r-base-2.15.1/debian/changelog
@@ -1,3 +1,27 @@
+r-base (2.15.1-4) unstable; urgency=low
+
+  * src/library/tools/R/install.R: Pass perl = TRUE parameter to sub()
+really passing it to sub and not to grep		(Closes: #679180)
+
+ -- Dirk Eddelbuettel e...@debian.org  Sun, 15 Jul 2012 17:56:35 -0500
+
+r-base (2.15.1-3) unstable; urgency=low
+
+  * src/library/tools/R/install.R: Pass perl = TRUE parameter to sub()
+and correcting error in logic of patch used in -2.	(Closes: #679180)
+  
+ -- Dirk Eddelbuettel e...@debian.org  Sun, 15 Jul 2012 16:17:25 -0500
+
+r-base (2.15.1-2) unstable; urgency=low
+
+  * src/library/tools/R/install.R: Pass perl = TRUE parameter to sub()
+function when defining SHLIB_* macros to work-around an erroneus
+string replacement which causes build failures on arm* architectures
+but make the change conditonal on actually being on arm*. 
+With big thanks to Luca Falavigna for finding this fix. (Closes: #679180)
+
+ -- Dirk Eddelbuettel e...@debian.org  Sat, 14 Jul 2012 09:44:24 -0500
+
 r-base (2.15.1-1) unstable; urgency=low
 
   * New upstream version released this morning
only in patch2:
unchanged:
--- r-base-2.15.1.orig/src/library/tools/R/install.R
+++ r-base-2.15.1/src/library/tools/R/install.R
@@ -52,7 +52,11 @@
 SHLIB_EXT - if (WINDOWS) .dll else {
 ## can we do better?
 mconf - file.path(R.home(), paste0(etc, rarch), Makeconf)
-sub(.*= , , grep(^SHLIB_EXT, readLines(mconf), value = TRUE))
+if (substr( Sys.info()[machine], 1, 3) == arm) { 	# arm has broken regexps in libc
+sub(.*= , , grep(^SHLIB_EXT, readLines(mconf), value = TRUE), perl = TRUE)
+} else {
+sub(.*= , , grep(^SHLIB_EXT, readLines(mconf), value = TRUE))
+}
 }
 
 options(warn = 1)
@@ -1597,8 +1601,13 @@
 mconf - readLines(file.path(R.home(),
  paste0(etc, Sys.getenv(R_ARCH)),
  Makeconf))
-SHLIB_EXT - sub(.*= , , grep(^SHLIB_EXT, mconf, value = TRUE))
-SHLIB_LIBADD - sub(.*= , , grep(^SHLIB_LIBADD, mconf, value = TRUE))
+if (substr( Sys.info()[machine], 1, 3) == arm) { 	# arm has broken regexps in libc
+SHLIB_EXT - sub(.*= , , grep(^SHLIB_EXT, mconf, value = TRUE), perl = TRUE)
+SHLIB_LIBADD - sub(.*= , , grep(^SHLIB_LIBADD, mconf, value = TRUE), perl = TRUE)
+} else {
+SHLIB_EXT - sub(.*= , , grep(^SHLIB_EXT, mconf, value = TRUE))
+SHLIB_LIBADD - sub(.*= , , grep(^SHLIB_LIBADD, mconf, value = TRUE))
+}
 MAKE - Sys.getenv(MAKE)
 rarch - Sys.getenv(R_ARCH)
 } else {


Bug#680725: unblock: aolserver4-nsxml/1.5-2.1

2012-07-08 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package aolserver4-nsxml

It fixes RC bug #680033. Changelog entry follows:

 aolserver4-nsxml (1.5-2.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * debian/dirs:
 - Create /usr/lib/aolserver4/lib directory.
   * debian/rules:
 - Install libnsxml.so under /usr/lib/aolserver4/lib to allow nsmxl
   module to be loaded by aolserver4 (Closes: #680033).

unblock aolserver4-nsxml/1.5-2.1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores)



-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120708093632.4187.26071.reportbug@utumno



Re: Bug#620322: libvncserver package split

2012-05-26 Thread Luca Falavigna
2012/5/25 Julien Cristau jcris...@debian.org:
 Probably 2.

OK, I'll prepare the changes and do some tests to verify everything is fine.
Once I'm confident, I'll get in touch again to see whether I'm still
in time to target Wheezy.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CADk7b0OX4sx=z61D5C7ZQHzy=8uzv_4eu2p8oj2ee8g9fkk...@mail.gmail.com



Re: Comments regarding automake1.12_1.12-1_amd64.changes

2012-05-26 Thread Luca Falavigna
2012/5/23 Eric Dorland e...@debian.org:
 I'll still be able to upload new versions of automake 1.11 if this
 upload is rejected right?

Yes, a rejected upload won't interfere at all with other packages.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CADk7b0ONqg7cRrysw0rEvs8UuKpoejuin4TXwOC2Fn=hx7p...@mail.gmail.com



libvncserver package split

2012-05-25 Thread Luca Falavigna
Hi,

In #620322 it is proposed to ship libvncclient library in a separate
binary package.
In order to do this, the following steps have to be performed:
* put libvncclient library into a new libvncclient0 binary package
* libvncclient0 binary must break and replace older libvncserver0
binary packages
* libvncserver0 binary should depend on the exact version of
libvncclient0 binary at least until every rdep has been rebuilt with
the new structure
* rdeps have to be rebuilt to pick the new dependencies

As long as libvncserver0 depends on the new libvncclient0, this
shouldn't be a problem, but I'd like to coordinate this transition
with you to avoid problems. Which option would you like the most
between the following?
1) leave libvncserver untouched until Wheezy is released
2) perform the switch, keep the libvncserver0 - libvncclient0
dependency, remove it when every rdep is rebuilt to pick the new
structure
3) perform the switch, schedule binNMUs immediately, and drop the
libvncserver0 - libvncclient0 dependency ASAP

Cheers,
Luca


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CADk7b0NEvsNUJPCJBhmFM2cOeym=spwekwv3ptpfogwwygy...@mail.gmail.com



Re: Comments regarding automake1.12_1.12-1_amd64.changes

2012-05-22 Thread Luca Falavigna
Also adding debian-release mailing list in the loop.

2012/5/22 Luca Falavigna ftpmas...@debian.org:
 Hi,

 I fear your automake 1.12 upload won't end up in unstable so soon.
 As you know, Release Team is planning to freeze Wheezy within June,
 and uploading a new major version of automake now could lead to
 more RC bugs, forcing the delay of  the freeze or the release date.

 I blocked the upload for now pending a OK from the Release Team first,
 you should get in touch with them to see whether it's OK to have the
 new automake in unstable.

 Cheers,
 Luca


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cadk7b0oo4shw1x6raxzumbngso8fqhreaygv0pjk7nl-qog...@mail.gmail.com



Re: Bug#653823: transition: boost-defaults

2012-03-03 Thread Luca Falavigna
Il 03/03/2012 19:21, Steve M. Robbins ha scritto:
 Last Sunday I uploaded another new version (1.49).  It's still in NEW,
 but I'd like to transition boost-defaults to 1.49 ASAP.

FYI, I just accepted it.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4f526b3a.9010...@debian.org



Bug#656829: transition: exiv2 - libexiv2-9 - libexiv2-11

2012-02-09 Thread Luca Falavigna
Il 22/01/2012 02:18, Mark Purcell ha scritto:
   libgexiv2-0 requires newer gexiv2 0.3.1 #656749

gexiv2 0.3.1 just uploaded to experimental.



-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4f34509f.2070...@debian.org



Bug#651940: nmu: koffice_1:2.3.3-2

2011-12-13 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

nmu koffice_1:2.3.3-2 . ALL . -m Rebuild for libpqxx3 transition

Please schedule binNMUs for koffice 1:2.3.3-2 to be rebuilt against
new libpqxx3 to get rid of libpqxx-3.0 and libpqxx-3.0-dbg binaries,
no longer built from source.



-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CADk7b0P+ygsqd3xperOwfo7Y+2+Fkm806RKFTnjVjv=_96u...@mail.gmail.com



Removal of kcollectd from testing

2011-11-13 Thread Luca Falavigna

Hi,
would it be possible to remove kcollectd from wheezy?
It requires collectd to properly work [0], but collectd is not going to 
migrate soon [1]. This should allow boost1.42 removal from wheezy [2].


[0] http://bugs.debian.org/620023
[1] http://qa.debian.org/excuses.php?package=collectd
[2] http://release.debian.org/migration/testing.pl?package=boost1.42


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4ebfa4f0.20...@debian.org



Bug#645296: Rationale

2011-10-24 Thread Luca Falavigna
Rationale for the binNMU request:
with libvncserver 0.9.8 release, upstream broke ABI by adding new
members in the middle of a struct. This issue has been reported
upstream [0] and fixed with 0.9.8.1 release. remmina-plugins was built
with 0.9.8, and needs a rebuild to make remmina-plugin-vnc able to
connect to VNC servers again.

[0] 
http://sourceforge.net/tracker/?func=detailaid=3419816group_id=32584atid=405858



-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CADk7b0N1OS9NeF3B0C0A+4arxdzmG+AZzZEj=x=lpbbrf9d...@mail.gmail.com



Bug#646340: nmu: yiff_2.14.5-7

2011-10-23 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu


nmu yiff_2.14.5-7 . ALL . -m Restore liby-dev binary package

Rationale:
a recent bison upload [0] incorrectly overwrote yiff's liby-dev, which
has been dominated later on. A subsequent bison upload fixed previous
mistake [1], yiff's liby-dev has to be restored, though.

Hopefully, binNMUing yiff would be enough to solve the issue, otherwise
I will convert this bug in a request to upload a fixed yiff with proper
epoch to restore missing binaries.

[0] http://packages.qa.debian.org/b/bison/news/20111003T063216Z.html
[1] http://packages.qa.debian.org/b/bison/news/20111011T161715Z.html



-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4ea40be6.20...@debian.org



Bug#637653: pu: gdebi/0.6.4+squeeze1

2011-09-21 Thread Luca Falavigna
Il 21/09/2011 21:29, Adam D. Barratt ha scritto:
 Thanks.  Please feel free to go ahead with the stable upload.

Uploaded, thanks!

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Bug#637653: pu: gdebi/0.6.4+squeeze1

2011-09-17 Thread Luca Falavigna
Il 17/09/2011 16:38, Adam D. Barratt ha scritto:
 Thanks.  Is there an (even vague) ETA for the other fix being in a
 suitable condition to be uploaded?

Not soon enough to rush an early commit. I could finalize other little
changes (mostly translations), and upload a new revision to unstable
including the regex change. That could happen within today.

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Bug#637653: pu: gdebi/0.6.4+squeeze1

2011-09-17 Thread Luca Falavigna
gdebi 0.8.2 just landed in unstable.

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Bug#637653: pu: gdebi/0.6.4+squeeze1

2011-08-29 Thread Luca Falavigna
Il 29/08/2011 17:47, Adam D. Barratt ha scritto:
 As I understand the intent, the following appears to match more closely:
 
 msg = a|b|c[y/n]hello
 print findall([[(](\S+)/\S+[])], msg)
 ['y']

Looking more closely, your regex is simpler, and even more robust.
Thanks for the hint!

Would it be OK to upload with the suggested regex? That would require
fixing in unstable too, I could commit change in trunk, so next unstable
upload would address that as well.

 Are there actually any translations using parentheses rather than
 brackets as delimiters?

Not that I'm aware of, at the moment. I also looked at more recent
translations, and everything uses brackets.

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Bug#637731: binNMUs for some cruft-report packages

2011-08-13 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu


Hi,

These are some binNMU requests for some packages in cruft-report:


nmu diagnostics_0.3.3-1.1 . ALL . -m 'Rebuild for ace transition.'
nmu ivtools_1.2.8a1-5 . amd64 i386 ia64 mips mipsel powerpc s390 sparc . -m 
'Rebuild for ace transition'
dw ivtools_1.2.8a1-5 . armel . -m 'libace-dev (= 6.0.3)'

nmu engine-pkcs11_1.2.8a1-5 . ALL . -m 'Rebuild for libp11 transition.'
nmu pam-p11_0.1.8-2 . amd64 armel i386 ia64 kfreebsd-amd64 kfreebsd-i386 mips 
mipsel powerpc s390 sparc . -m 'Rebuild for libp11 transition.'

nmu starpu-contrib_0.9.1-2 . i386 amd64 . -m 'Rebuild for nvidia-cuda-toolkit 
transition.'


Cheers,

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Re: [SRM] kupfer_0+v201-2+squeeze1

2011-07-09 Thread Luca Falavigna
Il 09/07/2011 19:19, Adam D. Barratt ha scritto:
 Please go ahead; thanks.

Uploaded, thanks!

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


[SRM] kupfer_0+v201-2+squeeze1

2011-07-08 Thread Luca Falavigna
Hi SRMs,

I'd like to get your permission to upload to stable a fix for bug
#632933, which has been addressed upstream some time ago.

I attach a debdiff of the proposed changes.

Thanks in advance,

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-
diff -Nru kupfer-0+v201/debian/changelog kupfer-0+v201/debian/changelog
--- kupfer-0+v201/debian/changelog  2011-04-30 12:48:21.0 +0200
+++ kupfer-0+v201/debian/changelog  2011-07-08 19:40:23.0 +0200
@@ -1,3 +1,10 @@
+kupfer (0+v201-2+squeeze2) stable; urgency=low
+
+  * debian/patches/evolution_contacts.patch:
+- Do not crash if Evolution address book is missing (Closes: #632933).
+
+ -- Luca Falavigna dktrkr...@debian.org  Fri, 08 Jul 2011 19:39:20 +0200
+
 kupfer (0+v201-2+squeeze1) stable; urgency=low
 
   * debian/patches/TYPE_UINT.patch:
diff -Nru kupfer-0+v201/debian/patches/evolution_contacts.patch 
kupfer-0+v201/debian/patches/evolution_contacts.patch
--- kupfer-0+v201/debian/patches/evolution_contacts.patch   1970-01-01 
01:00:00.0 +0100
+++ kupfer-0+v201/debian/patches/evolution_contacts.patch   2011-07-08 
19:38:41.0 +0200
@@ -0,0 +1,17 @@
+Description: Do not crash if Evolution address book is missing
+Author: Luca Falavigna dktrkr...@debian.org
+Forwarded: https://bugs.launchpad.net/kupfer/+bug/691305
+
+Index: kupfer-v203/kupfer/plugin/evolution.py
+===
+--- kupfer-v203.orig/kupfer/plugin/evolution.py2010-12-16 
22:56:12.860901147 +0100
 kupfer-v203/kupfer/plugin/evolution.py 2010-12-16 22:56:23.076394741 
+0100
+@@ -101,6 +101,8 @@
+ 
+   def get_items(self):
+   ebook_ = evolution.ebook.open_addressbook(default)
++  if not ebook_:
++  return
+   for contact in ebook_.get_all_contacts():
+   name = contact.get_property(full-name)
+   email = contact.get_property(email-1)
diff -Nru kupfer-0+v201/debian/patches/series 
kupfer-0+v201/debian/patches/series
--- kupfer-0+v201/debian/patches/series 2011-04-30 12:50:59.0 +0200
+++ kupfer-0+v201/debian/patches/series 2011-07-08 19:40:17.0 +0200
@@ -1,2 +1,3 @@
 debian_path.patch
 TYPE_UINT.patch
+evolution_contacts.patch


signature.asc
Description: OpenPGP digital signature


Removal hints

2011-05-29 Thread Luca Falavigna
Hi,
would you consider adding removal hints for the following packages?

* libfreenect (needs removed glut, #616525)
* bitlbee-skype (needs removed skype4py, #622739)

Thanks

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Bug#626690: nmu: ldb transition

2011-05-14 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

nmu openchange_1:0.10~bzr1804-1 . armel . -m 'Rebuild against ldb'
nmu samba4_4.0.0~alpha14~bzr13684.dfsg1-1 . armel . -m 'Rebuild against ldb'
nmu sssd_1.2.1-4.1 . armel . -m 'Rebuild against ldb'

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Bug#626691: nmu: rasmol/2.7.5-3

2011-05-14 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

nmu rasmol_2.7.5-3 . ALL . -m 'Rebuild against neartree'

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Bug#626692: nmu: lbdb/0.37

2011-05-14 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

nmu lbdb_0.37 . ALL . -m 'Rebuild against libvformat'

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Bug#626197: RM: nagios-statd/3.12-1.1

2011-05-09 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm


As python2.5 is going to be removed soon [0], and given that support for
newer python releases is unlikely to happen [1], nagios-statd should be
better removed from wheezy until a proper solution is found.

[0] http://bugs.debian.org/623820
[1] http://penguinpackets.com/~kelly/kblog/blog/01207948699

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Re: [SRU] kupfer_0+v201-2+squeeze1

2011-05-01 Thread Luca Falavigna
Il 01/05/2011 01:30, Philipp Kern ha scritto:
 Yep, please go ahead.

Uploaded, thanks!

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Re: [SRU] kupfer_0+v201-2+squeeze1

2011-04-30 Thread Luca Falavigna
Il 15/04/2011 20:06, Luca Falavigna ha scritto:
 Il 14/04/2011 23:29, Philipp Kern ha scritto:
 After staring at the code a little longer: what keybinder returns from that
 function is a guint32, so shouldn't it be TYPE_UINT?  And why does it
 overflow?  I guess the reason it overflows comes from the X server (where
 it's a CARD32 so uint32, too).  It's not entirely clear to me why, though.
 
 After talking with Ulrik (upstream developer), he made me notice current
 upstream code has TYPE_UINT, so using it should be a better choice. He
 told me this bug could be caused by X server being active for a lot of
 time, making its timestamp bigger than the variable defined by Kupfer.

Attaching debdiff this time.

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-
diff -Nru kupfer-0+v201/debian/changelog kupfer-0+v201/debian/changelog
--- kupfer-0+v201/debian/changelog	2010-07-17 14:29:47.0 +0200
+++ kupfer-0+v201/debian/changelog	2011-04-30 12:48:21.0 +0200
@@ -1,3 +1,11 @@
+kupfer (0+v201-2+squeeze1) stable; urgency=low
+
+  * debian/patches/TYPE_UINT.patch:
+- Backport a fix from upstream git repository, use UINT signal
+  parameter type to fix an issue with ui.keybindings (Closes: #615060).
+
+ -- Luca Falavigna dktrkr...@debian.org  Sat, 30 Apr 2011 12:52:09 +0200
+
 kupfer (0+v201-2) unstable; urgency=low
 
   * debian/control:
diff -Nru kupfer-0+v201/debian/patches/series kupfer-0+v201/debian/patches/series
--- kupfer-0+v201/debian/patches/series	2009-11-01 22:35:57.0 +0100
+++ kupfer-0+v201/debian/patches/series	2011-04-30 12:50:59.0 +0200
@@ -1 +1,2 @@
 debian_path.patch
+TYPE_UINT.patch
diff -Nru kupfer-0+v201/debian/patches/TYPE_UINT.patch kupfer-0+v201/debian/patches/TYPE_UINT.patch
--- kupfer-0+v201/debian/patches/TYPE_UINT.patch	1970-01-01 01:00:00.0 +0100
+++ kupfer-0+v201/debian/patches/TYPE_UINT.patch	2011-04-30 12:47:59.0 +0200
@@ -0,0 +1,16 @@
+Description: Use UINT signal parameter type
+Origin: http://git.gnome.org/browse/kupfer/commit/?id=4b72c5317ba35462d8974efc5d35c0906febcdf7
+
+Index: kupfer-0+v201/kupfer/ui/keybindings.py
+===
+--- kupfer-0+v201.orig/kupfer/ui/keybindings.py	2011-04-14 22:24:52.954179649 +0200
 kupfer-0+v201/kupfer/ui/keybindings.py	2011-04-14 22:25:11.642179656 +0200
+@@ -34,7 +34,7 @@
+ 		self.emit(keybinding, target, time)
+ 
+ gobject.signal_new(keybinding, KeyboundObject, gobject.SIGNAL_RUN_LAST,
+-		gobject.TYPE_BOOLEAN, (gobject.TYPE_INT, gobject.TYPE_INT))
++		gobject.TYPE_BOOLEAN, (gobject.TYPE_INT, gobject.TYPE_UINT))
+ 
+ _currently_bound = {}
+ 


signature.asc
Description: OpenPGP digital signature


Re: [SRU] kupfer_0+v201-2+squeeze1

2011-04-15 Thread Luca Falavigna
Il 14/04/2011 23:29, Philipp Kern ha scritto:
 After staring at the code a little longer: what keybinder returns from that
 function is a guint32, so shouldn't it be TYPE_UINT?  And why does it
 overflow?  I guess the reason it overflows comes from the X server (where
 it's a CARD32 so uint32, too).  It's not entirely clear to me why, though.

After talking with Ulrik (upstream developer), he made me notice current
upstream code has TYPE_UINT, so using it should be a better choice. He
told me this bug could be caused by X server being active for a lot of
time, making its timestamp bigger than the variable defined by Kupfer.

Would the same upload, using TYPE_UINT instead, be acceptable?

Regards,

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


[SRU] kupfer_0+v201-2+squeeze1

2011-04-14 Thread Luca Falavigna
Hi SRMs,

I'd like to get your permission to upload to stable a fix for bug
#615060, which has been addressed by a patch provided by upstream, and
confirmed to work by bug submitter.

I attach a debdiff of the proposed changes.

Thanks in advance,

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-
diff -Nru kupfer-0+v201/debian/changelog kupfer-0+v201/debian/changelog
--- kupfer-0+v201/debian/changelog	2010-07-17 14:29:47.0 +0200
+++ kupfer-0+v201/debian/changelog	2011-04-14 22:30:48.0 +0200
@@ -1,3 +1,11 @@
+kupfer (0+v201-2+squeeze1) stable; urgency=low
+
+  * debian/patches/TYPE_INT64.patch:
+- Backport a fix from upstream git repository, use INT64 signal
+  parameter type to fix an issue with ui.keybindings (Closes: #615060).
+
+ -- Luca Falavigna dktrkr...@debian.org  Thu, 14 Apr 2011 22:26:38 +0200
+
 kupfer (0+v201-2) unstable; urgency=low
 
   * debian/control:
diff -Nru kupfer-0+v201/debian/patches/series kupfer-0+v201/debian/patches/series
--- kupfer-0+v201/debian/patches/series	2009-11-01 22:35:57.0 +0100
+++ kupfer-0+v201/debian/patches/series	2011-04-14 22:24:37.0 +0200
@@ -1 +1,2 @@
 debian_path.patch
+TYPE_INT64.patch
diff -Nru kupfer-0+v201/debian/patches/TYPE_INT64.patch kupfer-0+v201/debian/patches/TYPE_INT64.patch
--- kupfer-0+v201/debian/patches/TYPE_INT64.patch	1970-01-01 01:00:00.0 +0100
+++ kupfer-0+v201/debian/patches/TYPE_INT64.patch	2011-04-14 22:26:18.0 +0200
@@ -0,0 +1,16 @@
+Description: Use INT64 signal parameter type
+Origin: http://git.gnome.org/browse/kupfer/commit/?id=4b72c5317ba35462d8974efc5d35c0906febcdf7
+
+Index: kupfer-0+v201/kupfer/ui/keybindings.py
+===
+--- kupfer-0+v201.orig/kupfer/ui/keybindings.py	2011-04-14 22:24:52.954179649 +0200
 kupfer-0+v201/kupfer/ui/keybindings.py	2011-04-14 22:25:11.642179656 +0200
+@@ -34,7 +34,7 @@
+ 		self.emit(keybinding, target, time)
+ 
+ gobject.signal_new(keybinding, KeyboundObject, gobject.SIGNAL_RUN_LAST,
+-		gobject.TYPE_BOOLEAN, (gobject.TYPE_INT, gobject.TYPE_INT))
++		gobject.TYPE_BOOLEAN, (gobject.TYPE_INT, gobject.TYPE_INT64))
+ 
+ _currently_bound = {}
+ 


signature.asc
Description: OpenPGP digital signature


Re: Permission to upload vanessa-logger_0.0.10-1.1 (NMU)

2010-11-14 Thread Luca Falavigna
Il 14/11/2010 14:06, Julien Cristau ha scritto:
 The Breaks field seems unnecessary, as you already have Depends on the
 exact version.  If you agree please drop the Breaks and go ahead.

Correct, thanks for spotting.
Simon ACKed the first NMU proposal, so I'm going to upload the revised
version (as per attached debdiff) without delay.

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-
only in patch2:
unchanged:
--- vanessa-logger-0.0.10.orig/debian/changelog
+++ vanessa-logger-0.0.10/debian/changelog
@@ -1,3 +1,12 @@
+vanessa-logger (0.0.10-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Add Replaces field on libvanessa-logger0 ( 0.0.8-1) for
+libvanessa-logger-dev package to fix overwrite issues with
+/usr/share/doc/libvanessa-logger-dev/README file (Closes: #601989).
+
+ -- Luca Falavigna dktrkr...@debian.org  Sun, 14 Nov 2010 16:06:16 +0100
+
 vanessa-logger (0.0.10-1) unstable; urgency=low
 
   * New upstream
only in patch2:
unchanged:
--- vanessa-logger-0.0.10.orig/debian/control
+++ vanessa-logger-0.0.10/debian/control
@@ -20,6 +20,7 @@
 Architecture: any
 Section: libdevel
 Depends: libvanessa-logger0 (= ${binary:Version}), ${misc:Depends}
+Replaces: libvanessa-logger0 ( 0.0.8-1)
 Description: Headers and static libraries for libvanessa-logger
  Headers and static libraries required to develop against vanessa-logger.
  Vanessa logger is a generic logging layer that may be used to log to


signature.asc
Description: OpenPGP digital signature


Bug#603362: nmu: remmina-plugins_0.8.4-1

2010-11-13 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu


I'm asking a binNMU for remmina-plugins to catch correct dependency
against freerdp package (see #602218).

nmu remmina-plugins_0.8.4-1 . ALL . -m Rebuild with versioned freerdp
dw remmina-plugins_0.8.4-1 . hppa . -m 'libfreerdp-dev (= 0.8.1-2)'

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Permission to upload vanessa-logger_0.0.10-1.1 (NMU)

2010-11-13 Thread Luca Falavigna
Hi,

I'm attaching a debdiff of a proposed NMU I plan to upload to DELAYED/2
to fix bug #601989.

Release Team, would you consider an unblock request for this upload?

Thanks,

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-
only in patch2:
unchanged:
--- vanessa-logger-0.0.10.orig/debian/changelog
+++ vanessa-logger-0.0.10/debian/changelog
@@ -1,3 +1,12 @@
+vanessa-logger (0.0.10-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Add Breaks/Replaces fields on libvanessa-logger0 ( 0.0.8-1)
+for libvanessa-logger-dev package to fix overwrite issues with
+/usr/share/doc/libvanessa-logger-dev/README (Closes: #601989).
+
+ -- Luca Falavigna dktrkr...@debian.org  Sun, 14 Nov 2010 01:35:07 +0100
+
 vanessa-logger (0.0.10-1) unstable; urgency=low
 
   * New upstream
only in patch2:
unchanged:
--- vanessa-logger-0.0.10.orig/debian/control
+++ vanessa-logger-0.0.10/debian/control
@@ -20,6 +20,8 @@
 Architecture: any
 Section: libdevel
 Depends: libvanessa-logger0 (= ${binary:Version}), ${misc:Depends}
+Breaks: libvanessa-logger0 ( 0.0.8-1)
+Replaces: libvanessa-logger0 ( 0.0.8-1)
 Description: Headers and static libraries for libvanessa-logger
  Headers and static libraries required to develop against vanessa-logger.
  Vanessa logger is a generic logging layer that may be used to log to


signature.asc
Description: OpenPGP digital signature


Re: [MBF proposal] Empty packages in the archive

2010-10-24 Thread Luca Falavigna
I've just submitted relevant bugs, list can be found here:
http://bugs.debian.org/cgi-bin/pkgreport.cgi?users=debian...@lists.debian.org;tag=empty-package

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


[MBF proposal] Empty packages in the archive

2010-10-17 Thread Luca Falavigna
Hi,

I've conducted an analysis looking for empty binary packages.



Here is a dd-list of binary packages packages which would get a bug with
severity serious:

Jesus Climent mo...@debian.org
   libdspam7-drv-db4 (U)

Julien Danjou a...@debian.org
   libpthread-stubs0 (U)

Debian DSPAM Maintainers pkg-dspam-m...@lists.alioth.debian.org
   libdspam7-drv-db4

Debian Mono Group pkg-mono-gr...@lists.alioth.debian.org
   libmono-windowsbase-cil-dev
   mono-winforms-a11y

Debian Pkg-e Team pkg-e-de...@lists.alioth.debian.org
   efl-dev

Debian Science Team debian-science-maintain...@lists.alioth.debian.org
   fenics

XCB Developers x...@lists.freedesktop.org
   libpthread-stubs0

Christoph Haas h...@debian.org
   libdspam7-drv-db4 (U)

Kurt B. Kaiser k...@shore.net
   libdspam7-drv-db4 (U)

Aurelien Labrosse aurelien.labro...@free.fr
   libdspam7-drv-db4 (U)

Jan Lübbe jlue...@debian.org
   efl-dev (U)

Matthijs Mohlmann matth...@cacholong.nl
   libdspam7-drv-db4 (U)

Christophe Prud'homme prudh...@debian.org
   fenics (U)

Johannes Ring joha...@simula.no
   fenics (U)

Jamey Sharp sharp...@debian.org
   libpthread-stubs0 (U)

Albin Tonnerre lu...@debian.org
   efl-dev (U)

Josh Triplett j...@freedesktop.org
   libpthread-stubs0 (U)

Ray Wang raw...@novell.com
   libmono-windowsbase-cil-dev (U)
   mono-winforms-a11y (U)

Rudolf Weber rud...@faveve.uni-stuttgart.de
   libdspam7-drv-db4 (U)



These packages would receive severity important:

Wolfgang Baer wb...@gmx.de
   libjmock-java-doc (U)

Debian Java Maintainers pkg-java-maintain...@lists.alioth.debian.org
   libjmock-java-doc
   liblayout-java-doc
   librepository-java-doc

Debian Octave Group pkg-octave-de...@lists.alioth.debian.org
   octave3.2-dbg   [mips, mipsel]

Debian Ruby Extras Maintainers
pkg-ruby-extras-maintain...@lists.alioth.debian.org
   libimage-science-ruby-doc (U)
   libkrb5-ruby-doc (U)

Rene Engelhard r...@debian.org
   liblayout-java-doc (U)
   librepository-java-doc (U)

Michael Koch konque...@gmx.de
   librepository-java-doc (U)

Trygve Laugstøl tryg...@inamo.n
   libjmock-java-doc (U)

Ryan Niebur ryanrya...@gmail.com
   libkrb5-ruby-doc

Ryan Niebur r...@debian.org
   midori-dbg   [hppa]

Thomas Weber twe...@debian.org
   octave3.2-dbg (U)   [mips, mipsel]

Torsten Werner twer...@debian.org
   librepository-java-doc (U)

Gunnar Wolf gw...@debian.org
   libimage-science-ruby-doc



Other bugs have been already filed:
libatlas-test_3.8.3-27  588418
libqthreads-12_1.6.8-10 397238
libslepc3.0.0_3.0.0-p7.dfsg-7   595396
google-perftools-dbg_1.5-1  595184
inventor-doc_2.1.5-10-14595405
mono-uia-dbg_1.0-2  595399



Please note test results have been gathered using a semi-automated
process, so there could be some false positives. Feel free to correct me
in case a package is empty on purpose.

Regards,

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Processing binary-NEW packages? (Was: List of binary-NEW packages)

2010-09-30 Thread Luca Falavigna
Il 10/08/2010 12.10, Luca Falavigna ha scritto:
 For your convenience, I've set up a slightly modified NEW page which
 only displays binary-NEW packages, you can find it at [1].
 If that turns useful, I'll have a look how to properly differentiate
 these information in the default NEW.html page [2].

binary-NEW packages can now be displayed from
http://ftp-master.debian.org/NEW.html

Backlog is getting quite big, could we process binary-NEW packages
targeted to experimental and those targeted unstable which do not
trigger new transitions (i.e. NEW -doc package)?

Cheers,

-- 

  .''`.
 : :' :   Luca Falavigna dktrkr...@debian.org
 `. `'
   `-



signature.asc
Description: OpenPGP digital signature


Re: Permission to upload gdebi_0.6.4

2010-09-26 Thread Luca Falavigna
Il 25/09/2010 17:52, Adam D. Barratt ha scritto:
 On Sat, 2010-09-25 at 11:42 +0200, Luca Falavigna wrote:
 I'm asking permission to upload (and to be granted subsequent unblock)
 for gdebi_0.6.4
 
 Please go ahead with the upload.

Uploaded, thanks!

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Permission to upload gdebi_0.6.4

2010-09-25 Thread Luca Falavigna
[ Sending again, as it seems it hasn't been correctly delivered due to
my recent MTA problems, sorry in case you receive this multiple times ]



Hi,

I'm asking permission to upload (and to be granted subsequent unblock)
for gdebi_0.6.4, which fixes an important bug during installation of a
package (#597139), together with a couple of bugs reported in Ubuntu
which affects Debian as well, and some translation updates.

Diff of changes can be seen online at [0], and downloaded at [1].

[0]
http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/346?compare_revid=334
[1] http://bazaar.launchpad.net/%7Egdebi-developers/gdebi/trunk/diff/346/334

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-





signature.asc
Description: OpenPGP digital signature


Bug#597251: nmu: libppl-swi_0.10.2-8

2010-09-21 Thread Luca Falavigna
Il 18/09/2010 10:36, Adam D. Barratt ha scritto:
 Before I schedule a 22-hour build to get one binary package back :) I'm
 assuming dak can't easily be persuaded to re-introduce the old version
 of the package? (I'm guessing not given the time since removal, but it's
 always worth asking...)

Unluckily, it seems the best solution is scheduling a binNMU, sorry :(

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Bug#597251: nmu: libppl-swi_0.10.2-8

2010-09-18 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

I erroneously removed libppl-swi_0.10.2-8 from hppa instead of mips
(see #596501), so I ask a binNMU on hppa to restore removed binary.

nmu libppl-swi_0.10.2-8 . hppa . -m Rebuild for erroneous removal


signature.asc
Description: PGP signature


Bug#597251: nmu: libppl-swi_0.10.2-8

2010-09-18 Thread Luca Falavigna
Il giorno Sat, 18 Sep 2010 09:36:57 +0100
Adam D. Barratt a...@adam-barratt.org.uk ha scritto:

 That should be ppl, i.e. the source package.

Ups, sorry.

 Before I schedule a 22-hour build to get one binary package back :) I'm
 assuming dak can't easily be persuaded to re-introduce the old version
 of the package? (I'm guessing not given the time since removal, but it's
 always worth asking...)

I'll check if it can be done The Fast Way :)

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-


signature.asc
Description: PGP signature


Bug#597268: nmu: libppl-swi_0.10.2-8

2010-09-18 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

I erroneously removed libppl-swi_0.10.2-8 from hppa instead of mips
(see #596501), so I ask a binNMU on hppa to restore removed binary.

nmu libppl-swi_0.10.2-8 . hppa . -m Rebuild for erroneous removal

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/8 CPU cores)



-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100917235446.12225.18928.report...@utumno



Re: samba_3.4.9~dfsg-1_i386.changes REJECTED

2010-09-16 Thread Luca Falavigna
Il 16/09/2010 7.52, Christian PERRIER ha scritto:
 $ dak ls -s unstable samba samba-doc
  samba | 2:3.4.8~dfsg-2 |  unstable | source, hurd-i386
  samba | 2:3.5.4~dfsg-2 |  unstable | source, hppa, mips, mipsel, 
 sparc
  samba | 2:3.5.5~dfsg-1 |  unstable | source, alpha, amd64, armel, 
 hppa, i386, ia64, kfreebsd-amd64, kfreebsd-i386, powerpc, s390
  samba-doc | 2:3.4.8~dfsg-2 |  unstable | all
  samba-doc | 2:3.5.4~dfsg-2 |  unstable | all
  samba-doc | 2:3.5.5~dfsg-1 |  unstable | all
 $
 
 Hmmm, so indeed this check prevents us to fix samba in testing through
 t-p-u.
 
 Ftpmasters, is there something that can be done on your side?

This is #584909.
I'll try to see if I can provide a fix.

-- 

  .''`.
 : :' :   Luca Falavigna dktrkr...@debian.org
 `. `'
   `-



signature.asc
Description: OpenPGP digital signature


Permission to upload gtg_0.2.4-4 (fixes RC bug and locale issues)

2010-09-05 Thread Luca Falavigna
Hi,

I ask permission to upload to unstable (and to be granted subsequent
unblock) for gtg_0.2.4-4. It fixes a RC bug (#595430) and a couple of
locale issues (#595436 and #595440).

Debdiff of proposed changes attached.

Regards,

-- 
Luca


gtg_0.2.4-4.debdiff
Description: Binary data


signature.asc
Description: PGP signature


Re: Permission to upload bugfix/translation updates for remmina stack

2010-09-05 Thread Luca Falavigna
Il giorno Sat, 4 Sep 2010 20:16:44 +0200
Julien Cristau jcris...@debian.org ha scritto:

 -if (client-thread) pthread_join (client-thread, NULL);
 +while (client-thread)
 +{
 +gdk_threads_leave ();
 +sleep (1);
 +gdk_threads_enter ();
 +}
 
 what's the reasoning for this one?

This is to fix a window hang when transfering files with SFTP:
http://remmina.svn.sourceforge.net/viewvc/remmina?view=revisionrevision=221

 Also it seems src/remminaftpclient.c (and a few other files) doesn't include
 config.h, that's a recipe for impossible debugging later on.

I'll report this upstream.

  * remmina-plugins_0.8.3-1
 
 Not quite sure what this is fixing either, and there's no changelog to
 explain.

New upstream version ships fix for this bug reported upstream:
http://sourceforge.net/tracker/?func=detailaid=3049236group_id=278330atid=1181674


signature.asc
Description: PGP signature


Re: Permission to upload gtg_0.2.4-4 (fixes RC bug and locale issues)

2010-09-05 Thread Luca Falavigna
Il giorno Sun, 5 Sep 2010 14:23:18 +0200
Julien Cristau jcris...@debian.org ha scritto:

  I ask permission to upload to unstable (and to be granted subsequent
  unblock) for gtg_0.2.4-4. It fixes a RC bug (#595430) and a couple of
  locale issues (#595436 and #595440).
  
 Ack, let us know when the package is accepted.

Uploaded, thanks!


signature.asc
Description: PGP signature


Re: Permission to upload bugfix/translation updates for remmina stack

2010-09-05 Thread Luca Falavigna
Il giorno Sun, 5 Sep 2010 14:07:55 +0200
Julien Cristau jcris...@debian.org ha scritto:

 Thanks for the explanations, I've unblocked the last two packages.

Thanks!

Regarding #595581, I've ready 0.8.3-2 upload fixing it (it's just B-D
change, and related changelog entry). Could I proceed with the upload?




signature.asc
Description: PGP signature


Bug#594681: unblock: gdebi/0.6.3

2010-08-28 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package gdebi

It fixes two important bugs (#591306 and #593647), the only feature
added is a check to remember auto-close status when installation is over.
The rest of the changes are translation updates.

unblock gdebi/0.6.3

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores)



-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100828102721.3939.69137.report...@valar



Re: Permission to upload gtg_0.2.4-3 [UPLOADED]

2010-08-17 Thread Luca Falavigna
Il 11/08/2010 0.38, Philipp Kern ha scritto:
 You can go ahead with the upload.  Please ping us when it got accepted.

Uploaded, and accepted.
Thanks!

-- 

  .''`.
 : :' :   Luca Falavigna dktrkr...@debian.org
 `. `'
   `-





signature.asc
Description: OpenPGP digital signature


Re: Permission to upload gtg_0.2.4-3 (fixes Important bug)

2010-08-10 Thread Luca Falavigna
Il 07/08/2010 15.50, Luca Falavigna ha scritto:
 Is there any particular reason why this does not use the defined 
 standard Python library class TemporaryFile (or NamedTemporaryFile)?
 
 gtg uses a fixed temp file to be able to see if a previous write
 attempt was successful, and to use it in case of data corruption.

Any news on this?

Regards,

-- 

  .''`.
 : :' :   Luca Falavigna dktrkr...@debian.org
 `. `'
   `-



signature.asc
Description: OpenPGP digital signature


  1   2   >