Your message dated Sat, 08 Feb 2020 14:21:36 +0000 with message-id <cf1cb2f35981916a86b98b83609df15c95aa378b.camel@adam-barratt.org.uk> and subject line Closing requests included in 10.3 point release has caused the Debian Bug report #946175, regarding buster-pu: package uif/1.1.9-1+deb10u1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 946175: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946175 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: buster-pu: package uif/1.1.9-1+deb10u1
- From: Mike Gabriel <sunweaver@debian.org>
- Date: Wed, 04 Dec 2019 21:12:20 +0100
- Message-id: <157549034095.12640.3387699762275534927.reportbug@minobo.das-netzwerkteam.de>
Package: release.debian.org Severity: normal Tags: buster User: release.debian.org@packages.debian.org Usertags: pu Hi, only after the buster release I became aware of the nftables shift. I totally missed that. + * debian/patches: + + Add 1001_use-iptables-legacy.patch. Work-around iptables->nftables switch + in Debian. Full nftables support is being worked on on the upstream side. + (Closes: #932265). For Debian buster, I added a patch to uif so that it uses the iptables-legacy commands directly. For Debian bullseye, I (with upstream hat on) work on proper nftables integration. Please ACK the already uploaded uif 1.1.9-1+deb10u1, so that people can still use uif in Debian buster. Thanks, Mike -- System Information: Debian Release: 10.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.19.0-6-amd64 (SMP w/4 CPU cores) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enableddiff -Nru uif-1.1.9/debian/changelog uif-1.1.9/debian/changelog --- uif-1.1.9/debian/changelog 2018-08-19 02:15:35.000000000 +0200 +++ uif-1.1.9/debian/changelog 2019-12-04 21:06:28.000000000 +0100 @@ -1,3 +1,12 @@ +uif (1.1.9-1+deb10u1) buster; urgency=medium + + * debian/patches: + + Add 1001_use-iptables-legacy.patch. Work-around iptables->nftables switch + in Debian. Full nftables support is being worked on on the upstream side. + (Closes: #932265). + + -- Mike Gabriel <sunweaver@debian.org> Wed, 04 Dec 2019 21:06:28 +0100 + uif (1.1.9-1) unstable; urgency=medium * New upstream release. diff -Nru uif-1.1.9/debian/patches/1001_use-iptables-legacy.patch uif-1.1.9/debian/patches/1001_use-iptables-legacy.patch --- uif-1.1.9/debian/patches/1001_use-iptables-legacy.patch 1970-01-01 01:00:00.000000000 +0100 +++ uif-1.1.9/debian/patches/1001_use-iptables-legacy.patch 2019-12-04 21:06:13.000000000 +0100 @@ -0,0 +1,38 @@ +--- a/uif.pl ++++ b/uif.pl +@@ -1475,9 +1475,9 @@ + + @$Listing=map { $_."\n" } @$Listing; + if ($ipv6) { +- open (IPT, '/sbin/ip6tables-save|'); ++ open (IPT, '/usr/sbin/ip6tables-legacy-save|'); + } else { +- open (IPT, '/sbin/iptables-save|'); ++ open (IPT, '/usr/sbin/iptables-legacy-save|'); + } + @oldrules = <IPT>; + close (IPT); +@@ -1488,9 +1488,9 @@ + $SIG{'TERM'} = 'signalCatcher'; + + if ($ipv6) { +- open (IPT, '|/sbin/ip6tables-restore'); ++ open (IPT, '|/usr/sbin/ip6tables-legacy-restore'); + } else { +- open (IPT, '|/sbin/iptables-restore'); ++ open (IPT, '|/usr/sbin/iptables-legacy-restore'); + } + print IPT @$Listing; + close (IPT); +@@ -1501,9 +1501,9 @@ + } + if ($timeout || $SignalCatched || $error) { + if ($ipv6) { +- open (IPT, '|/sbin/ip6tables-restore'); ++ open (IPT, '|/usr/sbin/ip6tables-legacy-restore'); + } else { +- open (IPT, '|/sbin/iptables-restore'); ++ open (IPT, '|/usr/sbin/iptables-legacy-restore'); + } + print IPT @oldrules; + close (IPT); diff -Nru uif-1.1.9/debian/patches/series uif-1.1.9/debian/patches/series --- uif-1.1.9/debian/patches/series 1970-01-01 01:00:00.000000000 +0100 +++ uif-1.1.9/debian/patches/series 2019-12-04 21:06:13.000000000 +0100 @@ -0,0 +1 @@ +1001_use-iptables-legacy.patch
--- End Message ---
--- Begin Message ---
- To: 939036-done@bugs.debian.org, 939802-done@bugs.debian.org, 940647-done@bugs.debian.org, 941365-done@bugs.debian.org, 941713-done@bugs.debian.org, 942575-done@bugs.debian.org, 944294-done@bugs.debian.org, 944348-done@bugs.debian.org, 944856-done@bugs.debian.org, 944865-done@bugs.debian.org, 945518-done@bugs.debian.org, 945845-done@bugs.debian.org, 945896-done@bugs.debian.org, 945925-done@bugs.debian.org, 945965-done@bugs.debian.org, 946032-done@bugs.debian.org, 946033-done@bugs.debian.org, 946083-done@bugs.debian.org, 946175-done@bugs.debian.org, 946184-done@bugs.debian.org, 946402-done@bugs.debian.org, 946557-done@bugs.debian.org, 946559-done@bugs.debian.org, 946651-done@bugs.debian.org, 946705-done@bugs.debian.org, 946819-done@bugs.debian.org, 946822-done@bugs.debian.org, 946831-done@bugs.debian.org, 946841-done@bugs.debian.org, 946864-done@bugs.debian.org, 946901-done@bugs.debian.org, 946960-done@bugs.debian.org, 947038-done@bugs.debian.org, 947125-done@bugs.debian.org, 947201-done@bugs.debian.org, 947254-done@bugs.debian.org, 947321-done@bugs.debian.org, 947331-done@bugs.debian.org, 947832-done@bugs.debian.org, 948104-done@bugs.debian.org, 948203-done@bugs.debian.org, 948205-done@bugs.debian.org, 948290-done@bugs.debian.org, 948363-done@bugs.debian.org, 948390-done@bugs.debian.org, 948400-done@bugs.debian.org, 948464-done@bugs.debian.org, 948472-done@bugs.debian.org, 948485-done@bugs.debian.org, 948544-done@bugs.debian.org, 948545-done@bugs.debian.org, 948550-done@bugs.debian.org, 948601-done@bugs.debian.org, 948609-done@bugs.debian.org, 948695-done@bugs.debian.org, 948796-done@bugs.debian.org, 948826-done@bugs.debian.org, 948850-done@bugs.debian.org, 948854-done@bugs.debian.org, 948857-done@bugs.debian.org, 948899-done@bugs.debian.org, 948904-done@bugs.debian.org, 948910-done@bugs.debian.org, 948979-done@bugs.debian.org, 948988-done@bugs.debian.org, 948991-done@bugs.debian.org, 949120-done@bugs.debian.org, 949121-done@bugs.debian.org, 949310-done@bugs.debian.org, 949541-done@bugs.debian.org, 949704-done@bugs.debian.org, 949728-done@bugs.debian.org, 949842-done@bugs.debian.org, 949852-done@bugs.debian.org, 949895-done@bugs.debian.org, 949898-done@bugs.debian.org, 949899-done@bugs.debian.org, 949904-done@bugs.debian.org, 949906-done@bugs.debian.org, 949908-done@bugs.debian.org, 949957-done@bugs.debian.org, 950018-done@bugs.debian.org, 950139-done@bugs.debian.org, 950166-done@bugs.debian.org, 950257-done@bugs.debian.org, 950272-done@bugs.debian.org, 950280-done@bugs.debian.org, 950369-done@bugs.debian.org, 950466-done@bugs.debian.org
- Subject: Closing requests included in 10.3 point release
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 08 Feb 2020 14:21:36 +0000
- Message-id: <cf1cb2f35981916a86b98b83609df15c95aa378b.camel@adam-barratt.org.uk>
Package: release.debian.org Version: 10.3 Hi, Each of the uploads referred to by these bugs was included in today's stable point release. Regards, Adam
--- End Message ---