I'm not sure it's clear that we should apply that patch in advance of
upstream.  At any rate I'm not sure that *applying* a patch should be a
condition of an MIR - reviewing it, maybe?

This MIR is currently blocking curl from building, which blocks a chunk
of the OpenSSL 1.0.0 transition.  I'm not all that bothered about
whether we unblock it by promoting rtmpdump or by disabling rtmp in
curl, but didn't want to do the latter without consultation (as some
other packages might now be relying on that facility in curl).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/777062

Title:
  [MIR] rtmpdump

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to