[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#919637: marked as done (RFS: elinks/0.13~20190125-1 [ITA])



Your message dated Mon, 28 Jan 2019 03:05:51 +0100
with message-id <20190128020551.4vuxh33trtc72xqg@angband.pl>
and subject line Re: Bug#919637: RFS: elinks/0.13~20190114-1 [ITA]
has caused the Debian Bug report #919637,
regarding RFS: elinks/0.13~20190125-1 [ITA]
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
919637: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919637
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: normal

Hello,

 I am adopting elinks. I have worked on the fork that Moritz has 
 mentioned: https://github.com/rkd77/felinks
 I have emailed previous upstream maintainers,asking them if they are 
 still maintaining elinks. Two emails bounced back, and I still got no 
 reply from the others.
 Anyways, this upload is targetting experimental, as I have enabled 
 several features like Bittorrent and Javascript.

This upload fixes the following bugs
#740981 (normal): elinks: doesn't check if hostname matches certificate's CN/SAN (CWE-297)
#757631 (normal): elinks: HTML5 source element display missing
#797931 (normal): elinks: Does not support SSL rehandshakes
#797934 (wishlist): elinks: Support for SSL authentication using client certs
#797968 (wishlist): elinks: Please add support for TLS SNI
#856852 (normal): cert_verify is disabled by default
#866015 (important): elinks: SSL error with some websites
#879539 (minor): elinks: contains code related to gnutls pgp supprt
#891575 (important): elinks: CVE-2012-6709
#917406 (normal): ITA: elinks -- advanced text-mode WWW browser

Last changelog entry is:
elinks (0.13~20190114-1) experimental; urgency=medium

  * New upstream release (Closes: #891575, #797931, #797934, #757631,
    #866015, #797968, #740981, #865852)
  * Add git-buildpackage conf file
  * Refreshed patches & removed patches that were includes upstream.
    Removed patches:
    08-drop-deprecated-gnutls-functions.diff (Closes: #879539)
    08_524696_fix_imdb_urls.diff
    09-Switch-to-use-lua-5.1.diff
  * Add libgcrypt20-dev to build deps
  * Re-added 14_debug_disable_Werror.diff to enable development versions debug
    support
  * Added 16_POST_BUFFER_SIZE.diff patch which to enable  uploading large files
    over https:// connections.
  * Add ascii-replacement-utf8-console.diff patch to print ASCII replacement
    for characters not found in current codepage in utf8 mode
  * Enable LZMA support
  * Enable BitTorrent
  * Enable NNTP Support
  * Enable Unicode combining characters support
  * Enable EX mode support
  * Enable SpiderMonkey support
  * Enable terminfo support
  * Build documentation
  * Build with libev
  * Bumped to compat level 12.
    No need to have dh-autoreconf, autotools-dev from build deps
    Also no need to explicitly call the respective sequences in rules
  * Remove old upstream gpg key.
  * Remove whitespaces
  * Renamed elinks.config to elinks.conf, old name confused build scrips
  * debian/rules: Override dh_installexamples to exclude .gitignore
  * Add typos.diff patch to fix spelling mistakes
  * debian/control:
    + Replace Conflicts with Breaks+Replaces
    + Update standards version to 4.3.0
    + New maintainer (Closes: #917406)
    + Add Vcs-* fields
  * Add upstream metadata
  * Switch to DEP-5 copyright format
  * Disable pristine-tar, since we are getting the release from upstream git


There is one lintian warning:
W: elinks-data: manpage-has-errors-from-man usr/share/man/man5/elinks.conf.5.gz 1166: warning [p 14, 7.0i]: can't break line

The package is on: git@salsa.debian.org:aelmahmoudy-guest/elinks.git , 
felinks branch

To access further information about this package, please visit the following URL:
https://mentors.debian.net/package/elinks

Alternatively, one can download the package with dget using this command:
  dget -x https://mentors.debian.net/debian/pool/main/e/elinks/elinks_0.13~20190114-1.dsc

-- 
‎أحمد المحمودي (Ahmed El-Mahmoudy)
 Digital design engineer
GPG KeyIDs: 4096R/A7EF5671 2048R/EDDDA1B7
GPG Fingerprints:
 6E2E E4BB 72E2 F417 D066  6ABF 7B30 B496 A7EF 5761
 8206 A196 2084 7E6D 0DF8  B176 BC19 6A94 EDDD A1B7

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
On Sat, Jan 26, 2019 at 04:29:26AM +0100, أحمد المحمودي wrote:
> On Mon, Jan 21, 2019 at 03:37:24PM +0100, Adam Borowski wrote:
> > Alas, it still FTBFSes:
> > /<<PKGBUILDDIR>>/doc/manual.xml:3993: element link: validity error : IDREF attribute linkend references an unknown ID "CONFIG-SCRIPTING-SPIDERMONKEY"

> Fixed upstream. I have re-uploaded to mentors.

✓

-- 
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ Remember, the S in "IoT" stands for Security, while P stands
⢿⡄⠘⠷⠚⠋⠀ for Privacy.
⠈⠳⣄⠀⠀⠀⠀

--- End Message ---

Reply to: