Processing of udpkg_1.13_amd64.changes
udpkg_1.13_amd64.changes uploaded successfully to localhost along with the files: udpkg_1.13.dsc udpkg_1.13.tar.gz udpkg_1.13_amd64.udeb Greetings, Your Debian queue daemon (running on host franck.debian.org) -- To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e1rteh5-0007gy...@franck.debian.org
udpkg_1.13_amd64.changes ACCEPTED into unstable
Accepted: udpkg_1.13.dsc to main/u/udpkg/udpkg_1.13.dsc udpkg_1.13.tar.gz to main/u/udpkg/udpkg_1.13.tar.gz udpkg_1.13_amd64.udeb to main/u/udpkg/udpkg_1.13_amd64.udeb Override entries for your package: udpkg_1.13.dsc - source debian-installer udpkg_1.13_amd64.udeb - standard debian-installer Announcing to debian-devel-chan...@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e1rtekv-0008kq...@franck.debian.org
Bug#649747: 127.0.1.1 hack is not supported by kFreeBSD
Package: netcfg Version: 1.70 Severity: normal Tags: patch 127.0.1.1 hack introduced in commit 6762701e15829b1857fe252c1de642f8ec00f8a8 is based on the assumption that when loopback interface is set with a 255.0.0.0 netmask, it will identify itself by any address belonging to this subnet. This is true on Linux, but not on kFreeBSD. (it remains to be found whether it's true on Hurd pfinet, anyone can find out by running "ping 127.0.1.1"?) Attached patch partially reverts that to make it only effective on Linux. [1] See: +netcfg (1.13) unstable; urgency=low + + [ Thomas Hood ] + * If there is no permanent IP address with which the UNIX hostname +(i.e., that which is returned by the "hostname" command) can be +associated in /etc/hosts then associate it with address 127.0.1.1 +rather than 127.0.0.1. Associating the UNIX hostname with the +latter had the unwanted effect of making 'localhost.localdomain' +the canoncial hostname associated with the UNIX hostname. +(Closes: #316099) -- System Information: Debian Release: 6.0.3 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: kfreebsd-amd64 (x86_64) Kernel: kFreeBSD 8.1-1-amd64 Locale: LANG=ca_AD.UTF-8, LC_CTYPE=ca_AD.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff --git a/netcfg-common.c b/netcfg-common.c index 4b2a8a0..6053a48 100644 --- a/netcfg-common.c +++ b/netcfg-common.c @@ -1042,19 +1042,23 @@ void netcfg_write_common(struct in_addr ipaddress, char *hostname, char *domain) if ((fp = file_open(HOSTS_FILE, "w"))) { char ptr1[INET_ADDRSTRLEN]; -fprintf(fp, "127.0.0.1\tlocalhost\n"); +fprintf(fp, "127.0.0.1\tlocalhost"); if (ipaddress.s_addr) { inet_ntop (AF_INET, &ipaddress, ptr1, sizeof(ptr1)); if (domain_nodot && !empty_str(domain_nodot)) -fprintf(fp, "%s\t%s.%s\t%s\n", ptr1, hostname, domain_nodot, hostname); +fprintf(fp, "\n%s\t%s.%s\t%s\n", ptr1, hostname, domain_nodot, hostname); else -fprintf(fp, "%s\t%s\n", ptr1, hostname); +fprintf(fp, "\n%s\t%s\n", ptr1, hostname); } else { +#ifdef __linux__ if (domain_nodot && !empty_str(domain_nodot)) -fprintf(fp, "127.0.1.1\t%s.%s\t%s\n", hostname, domain_nodot, hostname); +fprintf(fp, "\n127.0.1.1\t%s.%s\t%s\n", hostname, domain_nodot, hostname); else -fprintf(fp, "127.0.1.1\t%s\n", hostname); +fprintf(fp, "\n127.0.1.1\t%s\n", hostname); +#else +fprintf(fp, "\t%s\n", hostname); +#endif } fprintf(fp, "\n" IPV6_HOSTS);
Processed: severity of 614768 is important
Processing commands for cont...@bugs.debian.org: > severity 614768 important Bug #614768 [partman-zfs] should detect when embed area is too small for GRUB Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 614768: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614768 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.c.13220723466610.transcr...@bugs.debian.org
Processed: tagging 637086
Processing commands for cont...@bugs.debian.org: > tags 637086 + pending Bug #637086 [partman-zfs] sets up ZFS filesystems for automated mount Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 637086: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=637086 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.c.13220725627470.transcr...@bugs.debian.org
Bug#649747: 127.0.1.1 hack is not supported by kFreeBSD
Hi Robert, Robert Millan wrote: > (it remains to be found whether it's true on Hurd pfinet, anyone can > find out by running "ping 127.0.1.1"?) Seems as if it works: strauss:~# ping 127.0.1.1 PING 127.0.1.1 (127.0.1.1): 56 data bytes 64 bytes from 127.0.1.1: icmp_seq=0 ttl=255 time=10.053 ms 64 bytes from 127.0.1.1: icmp_seq=1 ttl=255 time=0.000 ms 64 bytes from 127.0.1.1: icmp_seq=2 ttl=255 time=0.000 ms ^C--- 127.0.1.1 ping statistics --- 4 packets transmitted, 3 packets received, 25% packet loss round-trip min/avg/max/stddev = 0.000/3.351/10.053/4.739 ms strauss:~# (Had to install inetutils-ping first as iputils-ping is not available on Hurd.) Regards, Axel -- ,''`. | Axel Beckert , http://people.debian.org/~abe/ : :' : | Debian Developer, ftp.ch.debian.org Admin `. `' | 1024D: F067 EA27 26B9 C3FC 1486 202E C09E 1D89 9593 0EDE `-| 4096R: 2517 B724 C5F6 CA99 5329 6E61 2FF9 CD59 6126 16B5 -- To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/2023184736.gf2...@sym.noone.org
Bug#649747: 127.0.1.1 hack is not supported by kFreeBSD
2011/11/23 Axel Beckert : > Seems as if it works: Thanks for testing. Patch updated. -- Robert Millan diff --git a/netcfg-common.c b/netcfg-common.c index 4b2a8a0..6053a48 100644 --- a/netcfg-common.c +++ b/netcfg-common.c @@ -1042,19 +1042,23 @@ void netcfg_write_common(struct in_addr ipaddress, char *hostname, char *domain) if ((fp = file_open(HOSTS_FILE, "w"))) { char ptr1[INET_ADDRSTRLEN]; -fprintf(fp, "127.0.0.1\tlocalhost\n"); +fprintf(fp, "127.0.0.1\tlocalhost"); if (ipaddress.s_addr) { inet_ntop (AF_INET, &ipaddress, ptr1, sizeof(ptr1)); if (domain_nodot && !empty_str(domain_nodot)) -fprintf(fp, "%s\t%s.%s\t%s\n", ptr1, hostname, domain_nodot, hostname); +fprintf(fp, "\n%s\t%s.%s\t%s\n", ptr1, hostname, domain_nodot, hostname); else -fprintf(fp, "%s\t%s\n", ptr1, hostname); +fprintf(fp, "\n%s\t%s\n", ptr1, hostname); } else { +#ifndef __FreeBSD_kernel__ if (domain_nodot && !empty_str(domain_nodot)) -fprintf(fp, "127.0.1.1\t%s.%s\t%s\n", hostname, domain_nodot, hostname); +fprintf(fp, "\n127.0.1.1\t%s.%s\t%s\n", hostname, domain_nodot, hostname); else -fprintf(fp, "127.0.1.1\t%s\n", hostname); +fprintf(fp, "\n127.0.1.1\t%s\n", hostname); +#else +fprintf(fp, "\t%s\n", hostname); +#endif } fprintf(fp, "\n" IPV6_HOSTS);
Bug#649747: 127.0.1.1 hack is not supported by kFreeBSD
Robert Millan, le Wed 23 Nov 2011 19:17:16 +0100, a écrit : > 127.0.1.1 hack introduced in commit 6762701e15829b1857fe252c1de642f8ec00f8a8 > is based on the assumption that when loopback interface is set with > a 255.0.0.0 netmask, it will identify itself by any address belonging to > this subnet. This is true on Linux, but not on kFreeBSD. > > (it remains to be found whether it's true on Hurd pfinet, anyone can > find out by running "ping 127.0.1.1"?) Hurd pfinet uses Linux' stack and indeed uses 255.0.0.0. Samuel -- To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/2023214516.GG4711@type