Your message dated Sat, 17 Oct 2020 01:03:12 +0300
with message-id <20201016220312.GA2144@localhost>
and subject line Re: Bug#753404: zope.security: Port
python-zope.security-untrustedpython from Ubuntu
has caused the Debian Bug report #753404,
regarding zope.security: Port python-zope.security-untrustedpython from Ubuntu
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
753404: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753404
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: zope.security
Severity: wishlist
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Dear Maintainer,
In Ubuntu, the zope.security package has the following delta.
zope.security (3.8.3-2ubuntu1) precise; urgency=low
* Merge from Debian. Remaining changes:
- Add metapackage for untrustedpython extra
-- Gediminas Paulauskas <mene...@pov.lt> Mon, 14 Nov 2011 22:29:48 +0200
However, the package is quite old in Ubuntu and I am going to sync it
up with the latest Debian version, which will add Python 3 support.
I'm not entirely sure what the untrustedpython metapackage is for, but
I'm filing this bug to keep track of this, since Gediminas must have
had a good reason for adding it.
However, I do not want to hold up syncing and promotion of the new
version for adding this new binary package and having it be held up in
the NEW queue, at least not right now.
Here's the debian/control bits:
Package: python-zope.security-untrustedpython
Architecture: all
Depends: python-zope.security (>= ${binary:Version}),
${pydeb:Depends}, ${misc:Depends}
Description: Zope Security Framework - Untrusted interpreter support
Provides support for compiling untrusted code
- -- System Information:
Debian Release: jessie/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 3.14-1-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=PWFq
-----END PGP SIGNATURE-----
--- End Message ---
--- Begin Message ---
On Tue, Jul 01, 2014 at 07:49:46PM +0300, Gediminas Paulauskas wrote:
>...
> Newer zope.pagetemplate lists this as an optional dependency and only on
> python 2.
>...
Python 2 support has now been dropped in Debian and Ubuntu,
closing this bug as obsolete.
> Gediminas
cu
Adrian
--- End Message ---