[Bug 1724896] Re: [MRE] Please update to latest upstream release 7.0.25
Filed: https://bugs.launchpad.net/debian/+source/php-sabre- vobject-3/+bug/1744166 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php7.0 in Ubuntu. https://bugs.launchpad.net/bugs/1724896 Title: [MRE] Please update to latest upstream release 7.0.25 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1724896/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1724896] Re: [MRE] Please update to latest upstream release 7.0.25
The only legitimate bug is php-sabre-vobject-3, which is unrelated to this upload. I will fix it independently. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880337 ** Bug watch added: Debian Bug tracker #880337 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880337 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php7.0 in Ubuntu. https://bugs.launchpad.net/bugs/1724896 Title: [MRE] Please update to latest upstream release 7.0.25 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1724896/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1724896] Re: [MRE] Please update to latest upstream release 7.0.25
I should say, retrigger the lot, once we are allowed to again :) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php7.0 in Ubuntu. https://bugs.launchpad.net/bugs/1724896 Title: [MRE] Please update to latest upstream release 7.0.25 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1724896/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1724896] Re: [MRE] Please update to latest upstream release 7.0.25
So far everyting I've seen is false negatives due to infra issues. I'm retriggering the lot. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php7.0 in Ubuntu. https://bugs.launchpad.net/bugs/1724896 Title: [MRE] Please update to latest upstream release 7.0.25 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1724896/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1724896] Re: [MRE] Please update to latest upstream release 7.0.25
Brian, was there any problem with the 16.04 upload, or were you letting 17.04 shake out any issues first? ** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php7.0 in Ubuntu. https://bugs.launchpad.net/bugs/1724896 Title: [MRE] Please update to latest upstream release 7.0.25 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1724896/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1724896] Re: [MRE] Please update to latest upstream release 7.0.25
Performed my normal LXD verification for an upgrade in 17.04 from 7.0.22-0ubuntu0.17.04.1 to 7.0.25-0ubuntu0.17.04.1. root@fluent-grouse:~# apt policy php7.0 php7.0: Installed: 7.0.25-0ubuntu0.17.04.1 Candidate: 7.0.25-0ubuntu0.17.04.1 Version table: *** 7.0.25-0ubuntu0.17.04.1 500 500 http://archive.ubuntu.com/ubuntu zesty-proposed/main amd64 Packages 100 /var/lib/dpkg/status 7.0.22-0ubuntu0.17.04.1 500 500 http://archive.ubuntu.com/ubuntu zesty-updates/main amd64 Packages 500 http://security.ubuntu.com/ubuntu zesty-security/main amd64 Packages 7.0.15-1ubuntu4 500 500 http://archive.ubuntu.com/ubuntu zesty/main amd64 Packages ** Tags removed: verification-needed-zesty ** Tags added: verification-done-zesty -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php7.0 in Ubuntu. https://bugs.launchpad.net/bugs/1724896 Title: [MRE] Please update to latest upstream release 7.0.25 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1724896/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1724896] Re: [MRE] Please update to latest upstream release 7.0.25
** Description changed: There have been a number of microreleases of PHP 7.0 upstream since the last update to Xenial (which corresponded to the last update in Zesty). As it has been a few months, it feels appropriate to provide another MRE update to php7.0. A number of critical security and bug-fixes are present in each 7.0.x. Rather than backporting individual patches (e.g., Bug # 1569509), I believe it makes significantly more sense to follow the upstream 7.0.x. Upstream PHP is demonstrating an improved approach of bugfixes only in 7.0.x: - - 7.0.24: http://php.net/ChangeLog-7.php + - 7.0.25: http://php.net/ChangeLog-7.php The upstream CI is at: https://travis-ci.org/php/php-src and is run regularly. Our php7.0 source package has autopkgtests for the 4 SAPIs, mod-php, cgi, fpm and cli. We have also updated the packing to run the source tests during the build itself. I do not believe there is a firm statement from upstream on API/ABI stability, but the general approach seems to be a BC-break would result in 7.1.0 (which is present in Artful, and is why the Artful task is invalid). -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php7.0 in Ubuntu. https://bugs.launchpad.net/bugs/1724896 Title: [MRE] Please update to latest upstream release 7.0.25 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1724896/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1724896] Re: [MRE] Please update to latest upstream release 7.0.25
** Also affects: php7.0 (Ubuntu Zesty) Importance: Undecided Status: New ** Changed in: php7.0 (Ubuntu Zesty) Assignee: (unassigned) => Nish Aravamudan (nacc) ** Changed in: php7.0 (Ubuntu Zesty) Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php7.0 in Ubuntu. https://bugs.launchpad.net/bugs/1724896 Title: [MRE] Please update to latest upstream release 7.0.25 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1724896/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1724896] Re: [MRE] Please update to latest upstream release 7.0.25
** Summary changed: - [MRE] Please update to latest upstream release 7.0.24 + [MRE] Please update to latest upstream release 7.0.25 ** No longer affects: php7.0 (Ubuntu Trusty) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php7.0 in Ubuntu. https://bugs.launchpad.net/bugs/1724896 Title: [MRE] Please update to latest upstream release 7.0.25 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1724896/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs