[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#923176: marked as done (stretch-pu: package ca-certificates-java/20170929~deb9u1)



Your message dated Sat, 27 Apr 2019 11:14:32 +0100
with message-id <1556360072.2690.35.camel@adam-barratt.org.uk>
and subject line Closing bugs for updates included in 9.9
has caused the Debian Bug report #922996,
regarding stretch-pu: package ca-certificates-java/20170929~deb9u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
922996: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922996
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian.org@packages.debian.org
Usertags: pu

This update closes #922720 [1], which addresses a bashism that prevents
the package upgrade from completing successfully.  

The debdiff for the proposed update is attached.

Thank you,
tony

[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922720
diff -Nru ca-certificates-java-20170929~deb9u1/debian/changelog ca-certificates-java-20170929~deb9u2/debian/changelog
--- ca-certificates-java-20170929~deb9u1/debian/changelog	2019-02-11 04:14:23.000000000 -0800
+++ ca-certificates-java-20170929~deb9u2/debian/changelog	2019-02-24 09:55:04.000000000 -0800
@@ -1,3 +1,10 @@
+ca-certificates-java (20170929~deb9u2) stretch; urgency=medium
+
+  * Team upload.
+  * Address bashisms in postinst and jks-keystore (Closes: #922720)
+
+ -- tony mancill <tmancill@debian.org>  Sun, 24 Feb 2019 09:55:04 -0800
+
 ca-certificates-java (20170929~deb9u1) stretch; urgency=medium
 
   * Rebuild for stretch.
diff -Nru ca-certificates-java-20170929~deb9u1/debian/jks-keystore.hook.in ca-certificates-java-20170929~deb9u2/debian/jks-keystore.hook.in
--- ca-certificates-java-20170929~deb9u1/debian/jks-keystore.hook.in	2019-02-11 04:14:23.000000000 -0800
+++ ca-certificates-java-20170929~deb9u2/debian/jks-keystore.hook.in	2019-02-24 09:55:04.000000000 -0800
@@ -53,7 +53,7 @@
     # the jre is not yet configured, but jvm.cfg is needed to run it
     temp_jvm_cfg=/etc/${jvm%-$arch}/jvm-$arch.cfg
     mkdir -p /etc/${jvm%-$arch}
-    if [ "$arch" == "armhf" ]; then
+    if [ "$arch" = "armhf" ]; then
         printf -- "-client KNOWN\n-server ALIASED_TO -client\n" > $temp_jvm_cfg
     else
         printf -- "-server KNOWN\n" > $temp_jvm_cfg
diff -Nru ca-certificates-java-20170929~deb9u1/debian/postinst.in ca-certificates-java-20170929~deb9u2/debian/postinst.in
--- ca-certificates-java-20170929~deb9u1/debian/postinst.in	2019-02-11 04:14:23.000000000 -0800
+++ ca-certificates-java-20170929~deb9u2/debian/postinst.in	2019-02-24 09:55:04.000000000 -0800
@@ -52,7 +52,7 @@
 
     # Forcibly remove diginotar cert (LP: #920758)
     if [ -n "$FIXOLD" ]; then
-        echo -e "-diginotar_root_ca\n-diginotar_root_ca_pem" | \
+        printf "-diginotar_root_ca\n-diginotar_root_ca_pem\n" | \
         java -Xmx64m -jar $JAR -storepass "$storepass"
     fi
 
@@ -100,7 +100,7 @@
                 # the jre is not yet configured, but jvm.cfg is needed to run it
                 temp_jvm_cfg=/etc/${jvm%-$arch}/jvm-$arch.cfg
                 mkdir -p /etc/${jvm%-$arch}
-                if [ "$arch" == "armhf" ]; then
+                if [ "$arch" = "armhf" ]; then
 	                printf -- "-client KNOWN\n-server ALIASED_TO -client\n" > $temp_jvm_cfg
                 else
 	                printf -- "-server KNOWN\n" > $temp_jvm_cfg

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Version: 9.9

Hi,

The update referenced by each of these bugs was included in this
morning's stretch point release.

Regards,

Adam

--- End Message ---

Reply to: