Your message dated Sun, 08 Mar 2026 21:04:25 +0000
with message-id <[email protected]>
and subject line Bug#950386: fixed in zookeeper 3.9.4-2
has caused the Debian Bug report #950386,
regarding zookeeperd: missing-systemd-service-for-init.d-script
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
950386: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950386
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: zookeeperd
Version: 3.4.13-3
Severity: normal
Dear Maintainer,
Please consider adding a native systemd service masking the shipped init
script (fixes lintian tag[1] in subject).
I'm attaching a completely untested attempt at writing a service file to
be shipped in the zookeeperd package (e.g. by placing it in
debian/zookeeperd.zookeeper.service should make debhelper DTRT). Please
feel free to ask for additional help, as I'm happy to help if you
provide testing and review (as I don't personally use zookeeper).
For extra bonus points please look into security hardening[2] the service
by restricting what it can access from the system.
Regards,
Andreas Henriksson
PS. You might want to create a /usr/sbin/zookeeper-server symlink
and use that in the service file instead (similar to the other symlinks
you create). And IMHO the /usr/share/zookeeper/bin/* files would feel
more naturally placed in /usr/libexec/zookeeper/*.
[1]:
https://lintian.debian.org/tags/missing-systemd-service-for-init.d-script.html
[2]:
https://lintian.debian.org/tags/systemd-service-file-missing-hardening-features.html
[Unit]
Description=Coordination service for distributed applications
After=network.target syslog.target
[Service]
Type=simple
ExecStart=/usr/share/zookeeper/bin/zkServer.sh start-foreground
# Alternatively:
#Type=forking
#ExecStart=/usr/share/zookeeper/bin/zkServer.sh start
#ExecStop=/usr/share/zookeeper/bin/zkServer.sh stop
#PIDFile=/run/zookeeper/zookeeper.pid
#Environment=ZOOPIDFILE=/run/zookeeper/zookeeper.pid
#RuntimeDirectory=zookeeper
EnvironmentFile=-/etc/default/zookeeper
User=zookeeper
Group=zookeeper
SyslogIdentifier=zookeeper
Restart=on-failure
# TODO: security hardening settings
[Install]
WantedBy=multi-user.target
--- End Message ---
--- Begin Message ---
Source: zookeeper
Source-Version: 3.9.4-2
Done: tony mancill <[email protected]>
We believe that the bug you reported is fixed in the latest version of
zookeeper, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
tony mancill <[email protected]> (supplier of updated zookeeper package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 08 Mar 2026 13:21:26 -0700
Source: zookeeper
Architecture: source
Version: 3.9.4-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers
<[email protected]>
Changed-By: tony mancill <[email protected]>
Closes: 950386 1039434 1128762
Changes:
zookeeper (3.9.4-2) unstable; urgency=medium
.
* Patch for glibc 2.43 ISO C23 const return types (Closes: #1128762)
* Install systemd unit file (Closes: #950386, #1039434)
* Add Pre-Depends on init-system-helpers:any to zookeeperd
* Add Documentation link to systemd unit
* Configure zookeeperd logging via logback
* Add Recommends on logback-java
* Install example logback.xml in zookeeper.conf
* Enable jline support for zkCli.sh
* Bump Standards-Version to 4.7.3
* Update debian/NEWS
* Add instructions for starting the admin server
Checksums-Sha1:
70571fefedb81c6efe09e71f332191ef8f97c6c4 3793 zookeeper_3.9.4-2.dsc
b543b462f409790cec7c46fb848500fdda9fd01b 92236 zookeeper_3.9.4-2.debian.tar.xz
85628e86c6f739298ef99517a14ffeb9dcc853cd 24688
zookeeper_3.9.4-2_amd64.buildinfo
Checksums-Sha256:
56f54fe25c7be74b5db39f9cc59164269501e6d19743469f8f231668ec3c6948 3793
zookeeper_3.9.4-2.dsc
089df69ca86bfada21d6eb50d9f10511df97e3ea90730b6b35650c560e7652f2 92236
zookeeper_3.9.4-2.debian.tar.xz
7a6dc74234f1763764a59e6deeadfef26674472f620fcd493184f9b174198e9c 24688
zookeeper_3.9.4-2_amd64.buildinfo
Files:
7b4416e703f691d2a04ba259931eaa71 3793 java optional zookeeper_3.9.4-2.dsc
359faabd780f4005c1df038c39443f06 92236 java optional
zookeeper_3.9.4-2.debian.tar.xz
5aa14369081c49e94b55017aab3f148d 24688 java optional
zookeeper_3.9.4-2_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=N81x
-----END PGP SIGNATURE-----
pgpcglfpbFvvH.pgp
Description: PGP signature
--- End Message ---
__
This is the maintainer address of Debian's Java team
<https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-java-maintainers>.
Please use
[email protected] for discussions and questions.