[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#697711: marked as done (unblock: apt-dater/0.9.0-3+wheezy1)



Your message dated Tue, 08 Jan 2013 19:39:07 +0000
with message-id <1357673947.4189.10.camel@jacala.jungle.funky-badger.org>
and subject line Re: Bug#697711: unblock: apt-dater/0.9.0-3+wheezy1
has caused the Debian Bug report #697711,
regarding unblock: apt-dater/0.9.0-3+wheezy1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
697711: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697711
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock

Please unblock package apt-dater

It fixes bug #697330 which should be included into Wheezy, so that..
a) Wheezy kernels are not displayed as selfbuilt ones
b) so on also the restart detection works (if the kernel needs a restart after
   an security update)


diff -Naur '--exclude=.svn' 0.9.0-3/debian/changelog 0.9.0-3+wheezy1/debian/changelog
--- 0.9.0-3/debian/changelog    2012-07-18 20:15:49.000000000 +0200
+++ 0.9.0-3+wheezy1/debian/changelog    2013-01-08 19:57:50.712596633 +0100
@@ -1,3 +1,11 @@
+apt-dater (0.9.0-3+wheezy1) unstable; urgency=low
+
+  * Add patch 03-wheezy-kernel, which fixes an missdetection of the Wheezy 3.2
+    Linux Kernel as selfbuilt variant.
+    Closes: #697330
+
+ -- Patrick Matthäi <pmatthaei@debian.org>  Tue, 08 Jan 2013 19:39:23 +0100
+
 apt-dater (0.9.0-3) unstable; urgency=low

   * Add upstream patch 02-refresh-ssh-flags which adds OptionalCmdFlags on
diff -Naur '--exclude=.svn' 0.9.0-3/debian/patches/03-wheezy-kernel.diff 0.9.0-3+wheezy1/debian/patches/03-wheezy-kernel.diff
--- 0.9.0-3/debian/patches/03-wheezy-kernel.diff        1970-01-01 01:00:00.000000000 +0100
+++ 0.9.0-3+wheezy1/debian/patches/03-wheezy-kernel.diff        2013-01-08 19:57:50.716596648 +0100
@@ -0,0 +1,18 @@
+# Upstream patch to fix detection of the Wheezy 3.2 Linux Kernel. It was
+# missdetected as selfbuilt variant.
+# Closes: #697330
+
+diff -Naur apt-dater-0.9.0.orig/clients/debian/apt-dater-host apt-dater-0.9.0/clients/debian/apt-dater-host
+--- apt-dater-0.9.0.orig/clients/debian/apt-dater-host 2012-05-29 14:18:43.000000000 +0200
++++ apt-dater-0.9.0/clients/debian/apt-dater-host      2013-01-08 19:32:09.520617548 +0100
+@@ -337,7 +337,9 @@
+       return;
+     }
+
+-    unless(`cat /proc/version` =~ /^\S+ \S+ \S+ \(Debian ([^\)]+)\)/) {
++      my $vstr = `cat $verfile`;
++      unless($vstr =~ /^\S+ \S+ \S+ \(Debian ([^\)]+)\)/ ||
++      $vstr =~ /^\S+ \S+ \S+ \(debian-kernel\@lists\.debian\.org\) .+ Debian (\S+)$/) {
+       print "$infostr 2 $version\n";
+       return;
+     }
diff -Naur '--exclude=.svn' 0.9.0-3/debian/patches/series 0.9.0-3+wheezy1/debian/patches/series
--- 0.9.0-3/debian/patches/series       2012-07-18 20:15:49.000000000 +0200
+++ 0.9.0-3+wheezy1/debian/patches/series       2013-01-08 19:57:50.716596648 +0100
@@ -1,2 +1,3 @@
 01-ld-flags-non-linux.diff
 02-refresh-ssh-flags.diff
+03-wheezy-kernel.diff




unblock apt-dater/0.9.0-3+wheezy1

-- System Information:
Debian Release: 7.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

--- End Message ---
--- Begin Message ---
On Tue, 2013-01-08 at 20:32 +0100, Patrick Matthäi wrote:
> Please unblock package apt-dater
> 
> It fixes bug #697330 which should be included into Wheezy, so that..
> a) Wheezy kernels are not displayed as selfbuilt ones
> b) so on also the restart detection works (if the kernel needs a restart after
>    an security update)

Unblocked; thanks.

Regards,

Adam

--- End Message ---

Reply to: