I'm not sure it's clear that we should apply that patch in advance of upstream. At any rate I'm not sure that *applying* a patch should be a condition of an MIR - reviewing it, maybe?
This MIR is currently blocking curl from building, which blocks a chunk of the OpenSSL 1.0.0 transition. I'm not all that bothered about whether we unblock it by promoting rtmpdump or by disabling rtmp in curl, but didn't want to do the latter without consultation (as some other packages might now be relying on that facility in curl). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/777062 Title: [MIR] rtmpdump -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs