[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1030820: marked as done (tightvncserver: Manages alternatives symlinks related to tightvncpasswd)



Your message dated Thu, 09 Feb 2023 19:35:41 +0000
with message-id <E1pQChp-00Gqrd-UZ@fasolo.debian.org>
and subject line Bug#1030820: fixed in tightvnc 1:1.3.10-7
has caused the Debian Bug report #1030820,
regarding tightvncserver: Manages alternatives symlinks related to tightvncpasswd
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1030820: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030820
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: tightvncserver
Version: 1:1.3.10-6
Severity: normal

Dear Maintainer,

the tightvncserver package manages alternatives symlinks per
d/tightvncserver.postinst

    update-alternatives --install \
        $BIN/vncpasswd      vncpasswd            $BIN/tightvncpasswd 70 \
        --slave \
        $MAN/vncpasswd.1.gz vncpasswd.1.gz       $MAN/tightvncpasswd.1.gz

and per d/tightvncserver.prerm

    update-alternatives --remove \
        vncpasswd $BIN/tightvncpasswd
    update-alternatives --remove \
        vncpasswd $BIN/tightvncpasswd


This should be moved to respective scripts of the tightvncpasswd package
instead.


-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-2-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages tightvncserver depends on:
ii  libc6            2.36-8
ii  libjpeg62-turbo  1:2.1.2-1+b1
ii  libx11-6         2:1.8.3-3
ii  perl             5.36.0-7
ii  tightvncpasswd   1:1.3.10-6
ii  x11-common       1:7.7+23
ii  x11-utils        7.7+5
ii  xauth            1:1.1.2-1
ii  xserver-common   2:21.1.6-1
ii  zlib1g           1:1.2.13.dfsg-1

Versions of packages tightvncserver recommends:
ii  x11-xserver-utils  7.7+9+b1
ii  xfonts-base        1:1.0.5+nmu1

Versions of packages tightvncserver suggests:
ii  tightvnc-java  1.3.10-4

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: tightvnc
Source-Version: 1:1.3.10-7
Done: Sven Geuer <debmaint@g-e-u-e-r.de>

We believe that the bug you reported is fixed in the latest version of
tightvnc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1030820@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sven Geuer <debmaint@g-e-u-e-r.de> (supplier of updated tightvnc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 09 Feb 2023 20:17:44 +0100
Source: tightvnc
Architecture: source
Version: 1:1.3.10-7
Distribution: unstable
Urgency: medium
Maintainer: Debian Remote Maintainers <debian-remote@lists.debian.org>
Changed-By: Sven Geuer <debmaint@g-e-u-e-r.de>
Closes: 1030681 1030820
Changes:
 tightvnc (1:1.3.10-7) unstable; urgency=medium
 .
   * Fix source name of link to Xvnc's man page alternative (Closes: #1030681).
     - Update d/tightvncserver.postinst.
   * Manage alternatives symlinks related to tightvncpasswd from the respective
     package (Closes: #1030820).
     - Update d/tightvncserver.postinst.
     - Update d/tightvncserver.prerm.
     - Introduce d/tightvncpasswd.postinst.
     - Introduce d/tightvncpasswd.prerm.
     - Update d/control.
   * Bump years in d/copyright to 2023 where required.
   * Bump Standards-Version to 4.6.2; no more changes necessary.
Checksums-Sha1:
 c0d8e41dafa4414ec7372532090ebf3a5fd6a1da 2358 tightvnc_1.3.10-7.dsc
 a7ca7117603fd9322903131036cbc64def6b35bc 244404 tightvnc_1.3.10-7.debian.tar.xz
 3e0ece296e7f728666d64952e80037539a990c7b 9181 tightvnc_1.3.10-7_amd64.buildinfo
Checksums-Sha256:
 755caa9b70c5e24c2e88a22cd171ef16e26f64e270bf3d1c6bdc5e21fd53d649 2358 tightvnc_1.3.10-7.dsc
 f7569554f99a8a3427d852f2499863d3d5cc7e91a90c627c27c56b6b02b497dd 244404 tightvnc_1.3.10-7.debian.tar.xz
 122ceb4009246db1ead47d80a32defbae04b15cba9becff87af3b4e432977530 9181 tightvnc_1.3.10-7_amd64.buildinfo
Files:
 8e44057a6f3ef01f540b794bdf169cb9 2358 x11 optional tightvnc_1.3.10-7.dsc
 bbb9523c803eb84aebe67e78a45367cb 244404 x11 optional tightvnc_1.3.10-7.debian.tar.xz
 bfb86db897a4b7a66996cf988503f27e 9181 x11 optional tightvnc_1.3.10-7_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQJKBAEBCgA0FiEEPfXoqkP8n9/QhvGVrfUO2vit1YUFAmPlR9cWHGRlYm1haW50
QGctZS11LWUtci5kZQAKCRCt9Q7a+K3VhbN1D/0dquUGUWVAAbHJAaZS6H8Nfrdm
yy2AEIKZULy9Z9jYedVIediZzvsAQyQmhm1u+7xIFnH/0hc120VO+uqb5VooehSM
oL558Jfcn3Z0fwo+QcLxrniC56/Jh37L0U3pH3V6zOxGUbgFKqboEd41Nght0/Ra
pS6hKy3IyQ2ZXW1nbfpzAsJHKpAm3yam7hhH2Xqx1YmCmmQ3CAWPaLs/6VhPgIhu
q8DfwgMDZtYSPG/csWoM7FRW4Xvg3QucdFqxlcE6cTRxJFJWCJD7DqBx0Jo+RPif
AQ47RK/5ewKPUHwEiDCe7204eUtgwAkZ7O6ojo+jnVQf5++z3ULo8RyaHw4TEno/
fVPiwY9PYwCWXAwbC2marSVb37qnWPql5/DJP8SnQoFVGb8COxpim+55kku6H2L2
SwEh90GNgPNCv5Uw4oW2XtWo2xPsJ1bFcnVVTMyKuoAKV0zjRkG2fL7LBp1Y3tAl
+En63KF04fbNpnO71NkMMky7FmbSLo+zy6VhWl/Eqreki09ZrFr+5Lu3SJNMoi17
iIFoXyEPGy65VUZ1mpoNHkB85i/6cY9yHaT86DXUvKO7oBElliyQduONX/7CoByf
n7gFXOttsUDh2ZZXgg0rPfcUwX8Ocmwuu3iqPprENwoMsBZbJsAEY5BnyFUorSUN
qzP5PFp30nw+jo0ouQ==
=PnOh
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: