On Tue, 2023-05-23 at 19:34 +, Holger Levsen wrote:
> On Tue, May 23, 2023 at 05:44:30PM +0100, Adam D. Barratt wrote:
> > In the interests of not blocking on things other than SRM's free
> > time,
> > how does this sound as some blurb for an announcement mail?
> >
Your message dated Wed, 24 May 2023 20:07:58 +
with message-id
and subject line unblock debian-med
has caused the Debian Bug report #1036557,
regarding unblock: debian-med/3.8.1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case
control: tags -1 moreinfo
Hi Mike,
On 21-05-2023 21:38, Mike Gabriel wrote:
In addition to the adduser changes, the diff to testing also includes a simple
directory-exists test before writing to it.
See below, I see more. Please elaborate.
+ * bin/debian-edu-faiinstall: Make sure
Processing control commands:
> tags -1 moreinfo
Bug #1036474 [release.debian.org] unblock: debian-edu-fai/2023.05.16.1
Added tag(s) moreinfo.
--
1036474: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036474
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Hi Luca,
On Wed, May 24, 2023 at 12:04:57AM +0100, Luca Boccassi wrote:
> Control: retitle -1 unblock: doc-debian/11.3+nmu1
> Control: tags -1 -moreinfo
>
> On Tue, 23 May 2023 23:37:23 +0100 Luca Boccassi
> wrote:
> > On Tue, 23 May 2023 06:46:19 +0200 Joost van =?utf-
Control: retitle -1 unblock: doc-debian/11.3+nmu1
Control: tags -1 -moreinfo
On Tue, 23 May 2023 23:37:23 +0100 Luca Boccassi
wrote:
> On Tue, 23 May 2023 06:46:19 +0200 Joost van =?utf-8?Q?Baal-
Ili=C4=87?=
> wrote:
> > On Sat, May 20, 2023 at 04:21:47PM +0200, Sebastian Ra
Processing control commands:
> retitle -1 unblock: doc-debian/11.3+nmu1
Bug #1035710 [release.debian.org] unblock: doc-debian/11.3
Changed Bug title to 'unblock: doc-debian/11.3+nmu1' from 'unblock:
doc-debian/11.3'.
> tags -1 -moreinfo
Bug #1035710 [release.debian.org] unblock: doc-debia
On Tue, 23 May 2023 06:46:19 +0200 Joost van =?utf-8?Q?Baal-Ili=C4=87?=
wrote:
> On Sat, May 20, 2023 at 04:21:47PM +0200, Sebastian Ramacher wrote:
>
> > On 2023-05-14 06:47:18 +0200, Joost van Baal-Ilić wrote:
> > > reopen 1035710
> > > retitle 1035710 unblock
On Tue, May 23, 2023 at 05:44:30PM +0100, Adam D. Barratt wrote:
> In the interests of not blocking on things other than SRM's free time,
> how does this sound as some blurb for an announcement mail?
>
> ====
> The debian-security-support package tracks the level of s
e into the proposed-updates queue for Debian bullseye.
> >
> > thanks! how/when will it moved/be moved to bullseye-updates?
>
[...]
> I'm hoping to find time to look at it over the weekend, but that
> depends a little on what life thinks of the idea.
>
Life has very much
On Fri, 2023-05-19 at 13:57 +, Holger Levsen wrote:
> On Thu, May 18, 2023 at 02:44:01PM +0100, Adam D. Barratt wrote:
> > > ic. so I should have uploaded to bullseye-proposed-updates
> > > instead?
> > Any upload goes to p-u first, yeah. So the target should always be
> > simply "bullseye",
On Sat, May 20, 2023 at 04:21:47PM +0200, Sebastian Ramacher wrote:
> On 2023-05-14 06:47:18 +0200, Joost van Baal-Ilić wrote:
> > reopen 1035710
> > retitle 1035710 unblock: doc-debian/11.3
> > thanks
> >
> > Please unblock package doc-debian
> >
&g
Processing control commands:
> affects -1 + src:debian-med
Bug #1036557 [release.debian.org] unblock: debian-med/3.8.1
Added indication that 1036557 affects src:debian-med
--
1036557: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036557
Debian Bug Tracking System
Contact
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: debian-...@packages.debian.org, debian-...@lists.debian.org
Control: affects -1 + src:debian-med
Please unblock package debian-med
[ Reason ]
This is the final update
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package debian-edu-fai
[ Reason ]
In the context of #1035654, a few source packages (including this one)
still fail to purge remove without adduser installed.
[ Impact
Processing control commands:
> tags -1 confirmed
Bug #1035710 [release.debian.org] unblock: doc-debian/11.3
Added tag(s) confirmed.
--
1035710: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035710
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 confirmed
On Sat, 20 May 2023 16:21:47 +0200 Sebastian Ramacher
wrote:
> Control: tags -1 moreinfo cofnirmed
>
> On 2023-05-14 06:47:18 +0200, Joost van Baal-Ilić wrote:
> > reopen 1035710
> > retitle 1035710 unblock: doc-debian/11.3
> > thanks
>
ock: doc-debian/11.3
Added tag(s) moreinfo.
--
1035710: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035710
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 moreinfo cofnirmed
On 2023-05-14 06:47:18 +0200, Joost van Baal-Ilić wrote:
> reopen 1035710
> retitle 1035710 unblock: doc-debian/11.3
> thanks
>
> Please unblock package doc-debian
>
> [ Reason ]
> The doc-debian package claims to ship the Constitutio
also help with what's left to do, though now I'm not sure there's much I can
help
with.
Thank you!
--
cheers,
Holger
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org
⢿⡄⠘⠷⠚⠋⠀ OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C
⠈⠳⣄
If a monkey hoarded more bananas th
stable-updates`` should target their suite name in
+ the changelog as usual, e.g. ``bullseye``.
--
cheers,
Holger
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org
⢿⡄⠘⠷⠚⠋⠀ OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C
⠈⠳⣄
In a world where you can be anything, b
n.org/doc/manuals/developers-reference/developers-reference.en.html#special-case-the-stable-updates-suite
--
cheers,
Holger
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org
⢿⡄⠘⠷⠚⠋⠀ OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C
⠈⠳⣄
If a monkey hoarded mor
On Fri, 2023-05-19 at 13:11 +, Holger Levsen wrote:
> On Thu, May 18, 2023 at 07:51:36PM +, Adam D Barratt wrote:
> > The upload referenced by this bug report has been flagged for
> > acceptance into the proposed-updates queue for Debian bullseye.
>
> thanks! h
On Thu, May 18, 2023 at 07:51:36PM +, Adam D Barratt wrote:
> The upload referenced by this bug report has been flagged for acceptance into
> the proposed-updates queue for Debian bullseye.
thanks! how/when will it moved/be moved to bullseye-updates?
--
cheers,
llseye-pu: package
debian-security-support/1:11+2023.05.04
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
1035522: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035522
Debian Bug Tracking System
C
package release.debian.org
tags 1035522 = bullseye pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian bullseye.
Thanks for your contribution!
Upload details
==
Package: debian-security-support
Set the clock on the affected system to a date before the key was
expired.
Example:
# faketime 2019-05-01 apt update
# faketime 2019-05-01 apt upgrade
and so on ...
Please note that 1024-bit DSA keys are no longer considered secure.
Maybe better remove the MySQL stuff and add it back later.
On Thu, 2023-05-18 at 09:22 +, Holger Levsen wrote:
> On Thu, May 18, 2023 at 06:44:18AM +0100, Adam D. Barratt wrote:
> > On Thu, 2023-05-18 at 00:44 +, Holger Levsen wrote:
> > > debian-security-support (1:11+2023.05.04) bullseye-updates;
> > > urgency=mediu
On Thu, May 18, 2023 at 06:44:18AM +0100, Adam D. Barratt wrote:
> On Thu, 2023-05-18 at 00:44 +, Holger Levsen wrote:
> > debian-security-support (1:11+2023.05.04) bullseye-updates;
> > urgency=medium
> Hmmm. I didn't expect that would work, although apparently
not limited to:
1. Downloading it on another PC and transferring the file
2. Dropping the https (but you break the trust path)
3. Downloading the key manually using the fingerprint and apt-key
(you take on the responsibility of verification)
4. Updating your sources to stretch anyway, and installing the
On Thu, 2023-05-18 at 00:44 +, Holger Levsen wrote:
> debian-security-support (1:11+2023.05.04) bullseye-updates;
> urgency=medium
>
Hmmm. I didn't expect that would work, although apparently it did, at
least for the package to get as far as stable-new. I'm hoping dak also
dtrt fo
ted
> in stable.
yes, that part I am and was familar with. Less clear was ${distro}-updates,
which thankfully got resolved through this bug. I think. ;)
> In any case, please go ahead.
thanks, done so now with this changelog:
debian-security-support (1:11+2023.05.04) bullseye-updates; ur
Why and what time?
Em 17/05/2023 18:46, Stephan Verbücheln escreveu:
On Wed, 2023-05-17 at 18:00 -0300, Alan Homobono wrote:
Any other suggestions?
Have you tried setting the clock to the past (or using faketime)?
Regards
Stephan
--
Atte.,
ALAN HOMOBONO
Analista de TI - Suporte a
On Wed, 2023-05-17 at 18:00 -0300, Alan Homobono wrote:
> Any other suggestions?
Have you tried setting the clock to the past (or using faketime)?
Regards
Stephan
signature.asc
Description: This is a digitally signed message part
Mensagem original
Assunto: Re: Debian 8.3 Jessie KEYEXPIRED 11645052400
Data: 17/05/2023 17:46
De: Alan Homobono
Para: Jonathan Wiltshire
Hi Jonathan,
Unsuccessful:
# wget
https://archive.debian.org/debian/pool/main/d/debian-archive-keyring/debian-archive-keyring_2017.5
cyphesis-cpp
and the client ember, were never part of bullseye due to this
instability and the age of the previous stable release.
As the Debian maintainer for all of the WorldForge packages, I feel it
is best to also remove the supporting libraries which are not used in
any other projects
cyphesis-cpp
and the client ember, were never part of bullseye due to this
instability and the age of the previous stable release.
As the Debian maintainer for all of the WorldForge packages, I feel it
is best to also remove the supporting libraries which are not used in
any other projects
cyphesis-cpp
and the client ember, were never part of bullseye due to this
instability and the age of the previous stable release.
As the Debian maintainer for all of the WorldForge packages, I feel it
is best to also remove the supporting libraries which are not used in
any other projects
cyphesis-cpp
and the client ember, were never part of bullseye due to this
instability and the age of the previous stable release.
As the Debian maintainer for all of the WorldForge packages, I feel it
is best to also remove the supporting libraries which are not used in
any other projects
cyphesis-cpp
and the client ember, were never part of bullseye due to this
instability and the age of the previous stable release.
As the Debian maintainer for all of the WorldForge packages, I feel it
is best to also remove the supporting libraries which are not used in
any other projects
cyphesis-cpp
and the client ember, were never part of bullseye due to this
instability and the age of the previous stable release.
As the Debian maintainer for all of the WorldForge packages, I feel it
is best to also remove the supporting libraries which are not used in
any other projects
cyphesis-cpp
and the client ember, were never part of bullseye due to this
instability and the age of the previous stable release.
As the Debian maintainer for all of the WorldForge packages, I feel it
is best to also remove the supporting libraries which are not used in
any other projects
cyphesis-cpp
and the client ember, were never part of bullseye due to this
instability and the age of the previous stable release.
As the Debian maintainer for all of the WorldForge packages, I feel it
is best to also remove the supporting libraries which are not used in
any other projects
Your message dated Sun, 14 May 2023 18:34:41 +
with message-id
and subject line unblock debian-games
has caused the Debian Bug report #1036039,
regarding unblock: debian-games/5
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case
On Sat, May 13, 2023 at 12:56:45AM -0300, Alan Homobono wrote:
> Trying to upgrade Debian 8.3 Jessie to Debian 10.13 Buster, I continue
> getting "KEYEXPIRED" error message after run apt-get update, even
> renewing expired keys:
# wget
https://archive.debian.org/debian/pool/ma
Followup-For: Bug #1036046
diff --git a/debian/changelog b/debian/changelog
index 3e541dc..632788c 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+debian-parl (1.9.27+deb11u1) bullseye; urgency=medium
+
+ * rebuild using newer boxer-data
++ stop include lightning
Processing control commands:
> affects -1 + src:debian-parl
Bug #1036046 [release.debian.org] bullseye-pu: package
debian-parl/1.9.27+deb11u1
Added indication that 1036046 affects src:debian-parl
> block 1035344 with -1
Bug #1035344 [parl-desktop] parl-desktop: depends on no longer insta
debian-parl needs to be rebuilt against newer boxer-data to drop
dependencies on packages lo longer built by src:thunderbird, e.g.
lightning. Currently design-parl* are uninstallable in bullseye.
Effective binary debdiff caused by this rebuild:
$ debdiff parl-desktop_1.9.27_all.deb parl
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
debian-design needs to be rebuilt against newer boxer-data to drop
dependencies on packages lo longer built by src:thunderbird, e.g.
lightning. Currently design-desktop
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: a...@debian.org
Please unblock package debian-games
[ Reason ]
debian-games is a Debian Blend and a collection of metapackages.
debian-games' purpose is to recommend
Processing commands for cont...@bugs.debian.org:
> reopen 1035710
Bug #1035710 {Done: Joost van Baal-Ilić }
[release.debian.org] unblock: doc-debian/11.1
Bug reopened
Ignoring request to alter fixed versions of bug #1035710 to the same values
previously set
> retitle 1035710 unblock: doc-
Hello,
On Sat, May 13, 2023, 11:31 Pierre-Elliott Bécue wrote:
>
> The only way to avoid that would be to first add stretch to your
> sources.list, update, install debian-archive-keyring, and then add
> buster to your sources.list.
>
By the way, this is the recommended approac
Alan Homobono wrote on 13/05/2023 at
05:56:45+0200:
> Trying to upgrade Debian 8.3 Jessie to Debian 10.13 Buster, I continue
> getting "KEYEXPIRED" error message after run apt-get update, even renewing
> expired keys:
>
> # apt-key list | grep -A 1 expired
>
Trying to upgrade Debian 8.3 Jessie to Debian 10.13 Buster, I continue
getting "KEYEXPIRED" error message after run apt-get update, even
renewing expired keys:
# apt-key list | grep -A 1 expired
pub 1024D/5072E1F5 2003-02-03 [expired: 2022-02-16]
uid MyS
On Thu, May 04, 2023 at 07:50:37PM +0200, Holger Levsen wrote:
> > this is a pre-approval request, I have not uploaded this yet
> > (except to
> > unstable).
>
> the package has migrated to bookworm now.
>
> > [ Reason ]
> >
> > unfort
Processing control commands:
> tags -1 + confirmed
Bug #1035522 [release.debian.org] bullseye-pu: package
debian-security-support/1:11+2023.05.04
Added tag(s) confirmed.
--
1035522: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035522
Debian Bug Tracking System
Contact
hi,
friendly ping on this.
On Thu, May 04, 2023 at 07:50:37PM +0200, Holger Levsen wrote:
> this is a pre-approval request, I have not uploaded this yet (except to
> unstable).
the package has migrated to bookworm now.
> [ Reason ]
>
> unfortunatly debian-security-support i
Your message dated Fri, 12 May 2023 08:10:33 +
with message-id
and subject line unblock maven-debian-helper
has caused the Debian Bug report #1035977,
regarding unblock: maven-debian-helper/2.6.3
to be marked as done.
This means that you claim that the problem has been dealt
Processing control commands:
> affects -1 + src:maven-debian-helper
Bug #1035977 [release.debian.org] unblock: maven-debian-helper/2.6.3
Added indication that 1035977 affects src:maven-debian-helper
--
1035977: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035977
Debian Bug Tracking Sys
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: maven-debian-hel...@packages.debian.org
Control: affects -1 + src:maven-debian-helper
Please unblock package maven-debian-helper
This update is required to fix the build
. Sorry for the
noise.
Bye,
Joost
[11.2]
https://tracker.debian.org/news/1430982/accepted-doc-debian-112-source-into-experimental/
tnx, i'm now preparing a new doc-debian targetted for bookworm with only
minimal changes. will have a closer look at this issue soonish (likely today).
sorry for this hassle.
Bye,
Joost
On Thu, May 11, 2023 at 08:23:17AM +0200, Johannes Schauer Marin Rodrigues
wrote:
> Package: doc-deb
Package: doc-debian
Version: 11.0
Severity: normal
Hi,
On Mon, 8 May 2023 07:46:09 +0200 Joost van =?utf-8?Q?Baal-Ili=C4=87?=
wrote:
> [ Risks ] None. The doc-debian package is a key package due to Priority:
> standard. It acts as a leaf package: Its only true reverse depends is the
Your message dated Sat, 06 May 2023 12:48:30 +
with message-id
and subject line unblock debian-security-support
has caused the Debian Bug report #1035524,
regarding unblock: debian-security-support/1:12+2023.05.04
to be marked as done.
This means that you claim that the problem has been
Your message dated Fri, 5 May 2023 17:27:20 +0200
with message-id <20230505152720.3br25wftf5ihb...@mraw.org>
and subject line Re: Bug#1035560: unblock: calamares-settings-debian/12.0.9-1
has caused the Debian Bug report #1035560,
regarding unblock: calamares-settings-debian/12.0.9-1
to be
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: calamares-settings-deb...@packages.debian.org, k...@debian.org
Control: affects -1 + src:calamares-settings-debian
Please unblock package calamares-settings-debian
[ Reason
Processing control commands:
> affects -1 + src:calamares-settings-debian
Bug #1035560 [release.debian.org] unblock: calamares-settings-debian/12.0.9-1
Added indication that 1035560 affects src:calamares-settings-debian
--
1035560: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035
unstable (thus trixie) and those two bugs in To: are
to get the fix into bullseye and bookworm.)
--
cheers,
Holger
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org
⢿⡄⠘⠷⠚⠋⠀ OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C
⠈⠳⣄
Das Leben ist schön. Von 'einfach' w
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package debian-security-support to fix #1034077
"debian-security-support: Lots of noise about DEBIAN_VERSION 12 being invalid
when upgrading bullseye→bookworm" i
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
hi,
this is a pre-approval request, I have not uploaded this yet (except to
unstable).
[ Reason ]
unfortunatly debian-security-support in both bullseye and bookworm
Your message dated Wed, 03 May 2023 20:52:54 +
with message-id
and subject line unblock calamares-settings-debian
has caused the Debian Bug report #1035357,
regarding unblock: calamares-settings-debian/12.0.5-2
to be marked as done.
This means that you claim that the problem has been dealt
On 2023-05-01 20:05:58 +0200, Jonathan Carter wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: calamares-settings-deb...@packages.debian.org
> Control: affects -1 + src:calamares-settings-
Hello,
please unsuscribe me from this list.
Thank you
- Mail original -
De: "Ana Guerrero Lopez"
À: debian-annou...@lists.debian.org
Envoyé: Lundi 1 Mai 2023 22:46:41
Objet: Updated Debian 11: 11.
Processing control commands:
> affects -1 + src:calamares-settings-debian
Bug #1035357 [release.debian.org] unblock: calamares-settings-debian/12.0.5-2
Added indication that 1035357 affects src:calamares-settings-debian
--
1035357: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: calamares-settings-deb...@packages.debian.org
Control: affects -1 + src:calamares-settings-debian
Please unblock package calamares-settings-debian
This change re-enables os
Your message dated Mon, 01 May 2023 09:12:44 +
with message-id
and subject line unblock debian-cd
has caused the Debian Bug report #1035309,
regarding unblock: debian-cd/3.2.1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: debian...@lists.debian.org
Hi,
[ Reason ]
[ Impact ]
While not absolutely needed to have in bookworm, it looks like a good
idea to ship the tooling that's making the release
Your message dated Sun, 30 Apr 2023 08:23:52 +0200
with message-id
and subject line Re: Bug#1035087: unblock: debian-archive-keyring/2023.3
has caused the Debian Bug report #1035087,
regarding unblock: debian-archive-keyring/2023.3
to be marked as done.
This means that you claim that the problem
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: debian-archive-keyr...@packages.debian.org, j...@debian.org
Control: affects -1 + src:debian-archive-keyring
Please unblock package debian-archive-keyring
[ Reason ]
Users
Processing control commands:
> affects -1 + src:debian-archive-keyring
Bug #1035087 [release.debian.org] unblock: debian-archive-keyring/2023.3
Added indication that 1035087 affects src:debian-archive-keyring
--
1035087: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035087
Debian
Your message dated Sat, 29 Apr 2023 10:54:14 +0100
with message-id
<502b8fb37ece620c9723446611a9287974ba5a0c.ca...@adam-barratt.org.uk>
and subject line Closing p-u requests for fixes included in 11.7
has caused the Debian Bug report #1033157,
regarding bullseye-pu: package debian-archive-k
Your message dated Sat, 29 Apr 2023 10:54:14 +0100
with message-id
<502b8fb37ece620c9723446611a9287974ba5a0c.ca...@adam-barratt.org.uk>
and subject line Closing p-u requests for fixes included in 11.7
has caused the Debian Bug report #1030732,
regarding bullseye-pu: package debian-ports-a
On Thu, 2023-03-30 at 08:41 +0200, Paul Gevers wrote:
> That is not the responsibility of this team. I'm also not sure what you
> mean with rootfs, but I think you mean how to bootstrap Debian. We have
> several tools in Debian that do that. I *think* debootstrap [1] is the
&
> On Mar 30, 2023, at 14:41, Paul Gevers wrote:
>
> Hi,
>
>> On 29-03-2023 04:06, z Spring wrote:
>>I hope this message finds you well. I am writing to inquire about the
>> construction of Debian Rootfs. I was wondering if you could kindly provide
>&g
Your message dated Sat, 15 Apr 2023 08:36:13 +
with message-id
and subject line unblock debian-edu-config
has caused the Debian Bug report #1034400,
regarding unblock: debian-edu-config/2.12.32
to be marked as done.
This means that you claim that the problem has been dealt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package debian-edu-config, which is a key package and thus
needs unblocking. All autopkgtests are successful and the package has been
in unstable since 17 days.
The update
Your message dated Tue, 04 Apr 2023 21:25:56 +
with message-id
and subject line unblock calamares-settings-debian
has caused the Debian Bug report #1033932,
regarding unblock: calamares-settings-debian/10.0.5-2
to be marked as done.
This means that you claim that the problem has been dealt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: calamares-settings-deb...@packages.debian.org
Control: affects -1 + src:calamares-settings-debian
Please unblock package calamares-settings-debian
This addresses serious bug
Processing control commands:
> affects -1 + src:calamares-settings-debian
Bug #1033932 [release.debian.org] unblock: calamares-settings-debian/10.0.5-2
Added indication that 1033932 affects src:calamares-settings-debian
--
1033932: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033
Your message dated Sun, 02 Apr 2023 19:50:47 +
with message-id
and subject line unblock debian-pan
has caused the Debian Bug report #1033687,
regarding unblock: debian-pan/0.4
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case
llseye-pu: package
debian-archive-keyring/2021.1.1+deb11u1
Added tag(s) pending.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
1033157: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033157
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
package release.debian.org
tags 1033157 = bullseye pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian bullseye.
Thanks for your contribution!
Upload details
==
Package: debian-archive-keyring
Hi,
On 29-03-2023 04:06, z Spring wrote:
I hope this message finds you well. I am writing to inquire about the
construction of Debian Rootfs. I was wondering if you could kindly provide some
information on how your team constructs this system, and whether the method of
construction
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: debian-...@packages.debian.org,
debian-pan-maintain...@alioth-lists.debian.net, pi...@debian.org
Control: affects -1 + src:debian-pan
Please unblock package debian-pan
Processing control commands:
> affects -1 + src:debian-pan
Bug #1033687 [release.debian.org] unblock: debian-pan/0.4
Added indication that 1033687 affects src:debian-pan
--
1033687: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033687
Debian Bug Tracking System
Contact
Dear,
I hope this message finds you well. I am writing to inquire about the
construction of Debian Rootfs. I was wondering if you could kindly provide some
information on how your team constructs this system, and whether the method of
construction has been open-sourced
Your message dated Fri, 24 Mar 2023 08:22:35 +
with message-id
and subject line unblock debian-security-support
has caused the Debian Bug report #1033378,
regarding unblock: debian-security-support/1:12+2023.03.23
to be marked as done.
This means that you claim that the problem has been
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package debian-security-support, for a trivial, yet adequate
update. Sadly it has no autopkgtest, thus this unblock request.
[ Reason ]
debian-security-support in bookworm
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: debian-archive-keyr...@packages.debian.org, j...@debian.org
Control: affects -1 + src:debian-archive-keyring
[ Reason ]
The bookworm archive keys need adding
Processing control commands:
> affects -1 + src:debian-archive-keyring
Bug #1033157 [release.debian.org] bullseye-pu: package
debian-archive-keyring/2021.1.1+deb11u1
Added indication that 1033157 affects src:debian-archive-keyring
--
1033157: https://bugs.debian.org/cgi-bin/bugreport.cgi?
201 - 300 of 3483 matches
Mail list logo