Your message dated Sat, 29 Dec 2012 14:48:15 -0400
with message-id <50df3aef.3020...@debian.org>
and subject line Re: Bug#696907: RFS: mosquitto/0.15-2 [RC]
has caused the Debian Bug report #696907,
regarding RFS: mosquitto/0.15-2 [RC]
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
696907: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696907
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: important
Dear mentors,
I am looking for a sponsor for my package "mosquitto"
* Package name : mosquitto
Version : 0.15-2
Upstream Author : Roger Light <ro...@atchoo.org>
* URL : http://mosquitto.org/
* License : 3 clause BSD
Section : net
It builds those binary packages:
libmosquitto0 - MQTT version 3.1 client library
libmosquitto0-dev - MQTT version 3.1 client library, development files
libmosquittopp0 - MQTT version 3.1 client C++ library
libmosquittopp0-dev - MQTT version 3.1 client C++ library, development files
mosquitto - MQTT version 3.1 compatible message broker
mosquitto-clients - Mosquitto command line MQTT clients
python-mosquitto - MQTT version 3.1 client library, python bindings
To access further information about this package, please visit the
following URL:
http://mentors.debian.net/package/mosquitto
Alternatively, one can download the package with dget using this command:
dget -x
http://mentors.debian.net/debian/pool/main/m/mosquitto/mosquitto_0.15-2.dsc
More information about mosquitto can be obtained from http://mosquitto.org/ .
Changes since the last upload:
* Fix broker crash when a client connects with a bad protocol version.
(Closes: #696889)
* Fix the possibility of topic access being granted when only acl_patterns
is in use. (Closes: #696895)
* Fix persistence option reloading. (Closes: #696891)
* Bumped standards release to 3.9.3. No changes needed.
* Bumped dh compat to 9 to fix hardening-no-fortify-functions.
* Fixed python-module-in-wrong-location.
Regards,
Roger Light
--- End Message ---
--- Begin Message ---
Hi Roger,
Le 29/12/2012 13:51, Roger Light a écrit :
> These are actually patches
> straight from upstream so it looks like "Origin: upstream, http://..."
> is the best option here. Is that correct?
I'm not a DEP-3 specialist, but it looks correct, and anyway an accurate
pointer on top of your already detailed bug reports. I felt confident
enough to upload it directly then, but the release team will also need
to review those changes. Feel free to open an unblock request if they
didn't already unblock your package in a week or so: waiting for the
package to build on every architecture, and that nobody filled a new
related bug against the package in the mean time, is a safe approach.
They may argue about the severity of the bugs, but they are probably
important enough to comply with the third point of the freeze policy
(“fixes for severity: important bugs in packages of priority: optional
or extra, only when this can be done via unstable”).
Thanks for your work and your reactivity.
Regards
David
signature.asc
Description: OpenPGP digital signature
--- End Message ---