Your message dated Thu, 17 Sep 2020 15:46:19 +0200
with message-id <[email protected]>
and subject line Re: Bug#970391: /bin/systemctl: Changes in [Install] not 
valued by "systemctl enable" if service already enabled.
has caused the Debian Bug report #970391,
regarding /bin/systemctl: Changes in [Install] not valued by "systemctl enable" 
if service already enabled.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
970391: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970391
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: systemd
Version: 241-7~deb10u4
Severity: wishlist
File: /bin/systemctl

Dear Maintainer,

   * What led up to the situation?

        Added a "RequiredBy=B.service" in existing A.service 
([Install]-section) to target dependencies.

   * What exactly did you do (or not do) that was effective (or
     ineffective)?

        Used "systemctl enable A.service" as well as "systemctl daemon-reload" 
to activate "RequiredBy"-dependency.
        Instead B.service had to be disabled and re-enabled to properly create 
"Requires"-dependency.

   * What was the outcome of this action?
        
        Dependency was not generated.

   * What outcome did you expect instead?

        Expected "B.service.requires/A.service" to be created directly if 
"systemctl enable B.service" is executed, even when B.service is already 
enabled.


BR & TY,
        Felix

-- Package-specific info:

-- System Information:
Debian Release: 10.5
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-6-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages systemd depends on:
ii  adduser          3.118
ii  libacl1          2.2.53-4
ii  libapparmor1     2.13.2-10
ii  libaudit1        1:2.8.4-3
ii  libblkid1        2.33.1-0.1
ii  libc6            2.28-10
ii  libcap2          1:2.25-2
ii  libcryptsetup12  2:2.1.0-5+deb10u2
ii  libgcrypt20      1.8.4-5
ii  libgnutls30      3.6.7-4+deb10u5
ii  libgpg-error0    1.35-1
ii  libidn11         1.33-2.2
ii  libip4tc0        1.8.2-4
ii  libkmod2         26-1
ii  liblz4-1         1.8.3-1
ii  liblzma5         5.2.4-1
ii  libmount1        2.33.1-0.1
ii  libpam0g         1.3.1-5
ii  libseccomp2      2.3.3-4
ii  libselinux1      2.8-1+b1
ii  libsystemd0      241-7~deb10u4
ii  mount            2.33.1-0.1
ii  util-linux       2.33.1-0.1

Versions of packages systemd recommends:
ii  dbus            1.12.20-0+deb10u1
ii  libpam-systemd  241-7~deb10u4

Versions of packages systemd suggests:
ii  policykit-1        0.105-25
pn  systemd-container  <none>

Versions of packages systemd is related to:
pn  dracut           <none>
ii  initramfs-tools  0.133+deb10u1
ii  udev             241-7~deb10u4

-- Configuration Files:
/etc/systemd/journald.conf changed [not included]

-- no debconf information

--- End Message ---
--- Begin Message ---
On Thu, 2020-09-17 at 13:12 +0000, Felix Neuper wrote:
> Kindly close and mark as wrongly reported.

Doing so.

Ansgar

--- End Message ---

Reply via email to