Your message dated Sat, 29 Dec 2012 14:48:15 -0400 with message-id <50DF3AEF.3020709@debian.org> and subject line Re: Bug#696907: RFS: mosquitto/0.15-2 [RC] has caused the Debian Bug report #696907, regarding RFS: mosquitto/0.15-2 [RC] to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 696907: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696907 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: RFS: mosquitto/0.15-2 [RC]
- From: Roger Light <roger@atchoo.org>
- Date: Sat, 29 Dec 2012 01:45:12 +0000
- Message-id: <[🔎] CAH7zdyemiHqo-CEyY-BVTn4U7qHh6MPtnGUk6eZ3P6FxVsbbPw@mail.gmail.com>
Package: sponsorship-requests Severity: important Dear mentors, I am looking for a sponsor for my package "mosquitto" * Package name : mosquitto Version : 0.15-2 Upstream Author : Roger Light <roger@atchoo.org> * URL : http://mosquitto.org/ * License : 3 clause BSD Section : net It builds those binary packages: libmosquitto0 - MQTT version 3.1 client library libmosquitto0-dev - MQTT version 3.1 client library, development files libmosquittopp0 - MQTT version 3.1 client C++ library libmosquittopp0-dev - MQTT version 3.1 client C++ library, development files mosquitto - MQTT version 3.1 compatible message broker mosquitto-clients - Mosquitto command line MQTT clients python-mosquitto - MQTT version 3.1 client library, python bindings To access further information about this package, please visit the following URL: http://mentors.debian.net/package/mosquitto Alternatively, one can download the package with dget using this command: dget -x http://mentors.debian.net/debian/pool/main/m/mosquitto/mosquitto_0.15-2.dsc More information about mosquitto can be obtained from http://mosquitto.org/ . Changes since the last upload: * Fix broker crash when a client connects with a bad protocol version. (Closes: #696889) * Fix the possibility of topic access being granted when only acl_patterns is in use. (Closes: #696895) * Fix persistence option reloading. (Closes: #696891) * Bumped standards release to 3.9.3. No changes needed. * Bumped dh compat to 9 to fix hardening-no-fortify-functions. * Fixed python-module-in-wrong-location. Regards, Roger Light
--- End Message ---
--- Begin Message ---
- To: Roger Light <roger@atchoo.org>, 696907-done@bugs.debian.org
- Subject: Re: Bug#696907: RFS: mosquitto/0.15-2 [RC]
- From: David Prévot <taffit@debian.org>
- Date: Sat, 29 Dec 2012 14:48:15 -0400
- Message-id: <50DF3AEF.3020709@debian.org>
- In-reply-to: <CAH7zdyfmyu2mctGy2ETCrtpcVFPHpM1QU7V3OR9M-s=65AvC_A__12299.2918281399$1356803681$gmane$org@mail.gmail.com>
- References: <CAH7zdyemiHqo-CEyY-BVTn4U7qHh6MPtnGUk6eZ3P6FxVsbbPw__39210.1585669026$1356745715$gmane$org@mail.gmail.com> <[🔎] 50DE6A9F.60507@debian.org> <CAH7zdyeyySzcaJA5M1=iJixQWrwwngxa5k2Ye638ef-cVUpPeg__6053.65238520807$1356794678$gmane$org@mail.gmail.com> <[🔎] 50DF118C.9070707@debian.org> <CAH7zdyfmyu2mctGy2ETCrtpcVFPHpM1QU7V3OR9M-s=65AvC_A__12299.2918281399$1356803681$gmane$org@mail.gmail.com>
Hi Roger, Le 29/12/2012 13:51, Roger Light a écrit : > These are actually patches > straight from upstream so it looks like "Origin: upstream, http://..." > is the best option here. Is that correct? I'm not a DEP-3 specialist, but it looks correct, and anyway an accurate pointer on top of your already detailed bug reports. I felt confident enough to upload it directly then, but the release team will also need to review those changes. Feel free to open an unblock request if they didn't already unblock your package in a week or so: waiting for the package to build on every architecture, and that nobody filled a new related bug against the package in the mean time, is a safe approach. They may argue about the severity of the bugs, but they are probably important enough to comply with the third point of the freeze policy (“fixes for severity: important bugs in packages of priority: optional or extra, only when this can be done via unstable”). Thanks for your work and your reactivity. Regards DavidAttachment: signature.asc
Description: OpenPGP digital signature
--- End Message ---