[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#962245: marked as done (RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates)

Your message dated Fri, 5 Jun 2020 23:33:22 +0300
with message-id <20200605203322.GA5590@localhost>
and subject line Re: Bug#962245: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates
has caused the Debian Bug report #962245,
regarding RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org

962245: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962245
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: important

Dear mentors,

** stretch-pu approval and debdiff can be found on:

I am looking for a sponsor for my package "ca-certificates"

 * Package name    : ca-certificates
   Version         : 20200601~deb9u1
 * License         : Mozilla Public License Version 2.0
* Vcs : https://salsa.debian.org/debian/ca-certificates (debian-stretch branch)
   Section         : misc

It builds those binary packages:

  ca-certificates - Common CA certificates
  ca-certificates-udeb - Common CA certificates - udeb

To access further information about this package, please visit the following URL:


Alternatively, one can download the package with dget using this command:

dget -x https://mentors.debian.net/debian/pool/main/c/ca-certificates/ca-certificates_20200601~deb9u1.dsc

Changes since the last upload:

   * Rebuild for stretch.
   * Merge changes from 20200601
     - d/control
   * This release updates the Mozilla CA bundle to 2.40, blacklists
     distrusted Symantec roots, and blacklists expired "AddTrust External
     Root". Closes: #956411, #955038, #911289, #961907
* Fix permissions on /usr/local/share/ca-certificates when using symlinks.
     Closes: #916833

Thank you sponsor!

Kind regards,
Michael Shuler

--- End Message ---
--- Begin Message ---
On Fri, Jun 05, 2020 at 01:39:25PM -0500, Michael Shuler wrote:
> Stretch has an openssl version without `openssl rehash`, but that is not a
> large diff. Both stretch & buster will have python->python3 difference from
> unstable on the next release, but that's also not a large diff. I hadn't
> thought about leaving older compat and standards in unstable, I generally
> try to keep lintian pleased.. not a bad idea, if no one minds much.

Standards-Version does not really matter, it only says that you
have checked the package against some policy version.

c_rehash was deprecated but is still in unstable today, delaying the 
#895075 change would have avoided that diff.

stretch has python3 3.5 and buster has python3 3.7.
Avoid adding usage of very recent python features and test that it
works on buster - python 3.7 compatibility is easier than python 2.7 

Packages that might be updated this way in stable are special,
and it can really help you later when you try to avoid making changes
that make it harder to build and run your package on stable.

Some people are very eager to request stopping to use some deprecated 
features or use the latest dh compat, if necessary explain why using
something older is important for this package.

> Thanks again - I'll update this RFS when #962155 comes back from the 
> release team.

I saw the approval, uploaded.

> Michael


--- End Message ---

Reply to: