Processing of udpkg_1.13_amd64.changes

2011-11-23 Thread Debian FTP Masters
udpkg_1.13_amd64.changes uploaded successfully to localhost
along with the files:
  udpkg_1.13.dsc
  udpkg_1.13.tar.gz
  udpkg_1.13_amd64.udeb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)


-- 
To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1rteh5-0007gy...@franck.debian.org



udpkg_1.13_amd64.changes ACCEPTED into unstable

2011-11-23 Thread Debian FTP Masters



Accepted:
udpkg_1.13.dsc
  to main/u/udpkg/udpkg_1.13.dsc
udpkg_1.13.tar.gz
  to main/u/udpkg/udpkg_1.13.tar.gz
udpkg_1.13_amd64.udeb
  to main/u/udpkg/udpkg_1.13_amd64.udeb


Override entries for your package:
udpkg_1.13.dsc - source debian-installer
udpkg_1.13_amd64.udeb - standard debian-installer

Announcing to debian-devel-chan...@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1rtekv-0008kq...@franck.debian.org



Bug#649747: 127.0.1.1 hack is not supported by kFreeBSD

2011-11-23 Thread Robert Millan
Package: netcfg
Version: 1.70
Severity: normal
Tags: patch

127.0.1.1 hack introduced in commit 6762701e15829b1857fe252c1de642f8ec00f8a8
is based on the assumption that when loopback interface is set with
a 255.0.0.0 netmask, it will identify itself by any address belonging to
this subnet.  This is true on Linux, but not on kFreeBSD.

(it remains to be found whether it's true on Hurd pfinet, anyone can
find out by running "ping 127.0.1.1"?)

Attached patch partially reverts that to make it only effective on Linux.

[1] See:

+netcfg (1.13) unstable; urgency=low
+
+  [ Thomas Hood ]
+  * If there is no permanent IP address with which the UNIX hostname
+(i.e., that which is returned by the "hostname" command) can be
+associated in /etc/hosts then associate it with address 127.0.1.1
+rather than 127.0.0.1.  Associating the UNIX hostname with the
+latter had the unwanted effect of making 'localhost.localdomain'
+the canoncial hostname associated with the UNIX hostname.
+(Closes: #316099)

-- System Information:
Debian Release: 6.0.3
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: kfreebsd-amd64 (x86_64)

Kernel: kFreeBSD 8.1-1-amd64
Locale: LANG=ca_AD.UTF-8, LC_CTYPE=ca_AD.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff --git a/netcfg-common.c b/netcfg-common.c
index 4b2a8a0..6053a48 100644
--- a/netcfg-common.c
+++ b/netcfg-common.c
@@ -1042,19 +1042,23 @@ void netcfg_write_common(struct in_addr ipaddress, char *hostname, char *domain)
 if ((fp = file_open(HOSTS_FILE, "w"))) {
 char ptr1[INET_ADDRSTRLEN];
 
-fprintf(fp, "127.0.0.1\tlocalhost\n");
+fprintf(fp, "127.0.0.1\tlocalhost");
 
 if (ipaddress.s_addr) {
 inet_ntop (AF_INET, &ipaddress, ptr1, sizeof(ptr1));
 if (domain_nodot && !empty_str(domain_nodot))
-fprintf(fp, "%s\t%s.%s\t%s\n", ptr1, hostname, domain_nodot, hostname);
+fprintf(fp, "\n%s\t%s.%s\t%s\n", ptr1, hostname, domain_nodot, hostname);
 else
-fprintf(fp, "%s\t%s\n", ptr1, hostname);
+fprintf(fp, "\n%s\t%s\n", ptr1, hostname);
 } else {
+#ifdef __linux__
 if (domain_nodot && !empty_str(domain_nodot))
-fprintf(fp, "127.0.1.1\t%s.%s\t%s\n", hostname, domain_nodot, hostname);
+fprintf(fp, "\n127.0.1.1\t%s.%s\t%s\n", hostname, domain_nodot, hostname);
 else
-fprintf(fp, "127.0.1.1\t%s\n", hostname);
+fprintf(fp, "\n127.0.1.1\t%s\n", hostname);
+#else
+fprintf(fp, "\t%s\n", hostname);
+#endif
 }
 
 fprintf(fp, "\n" IPV6_HOSTS);


Processed: severity of 614768 is important

2011-11-23 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 614768 important
Bug #614768 [partman-zfs] should detect when embed area is too small for GRUB
Severity set to 'important' from 'grave'

> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
614768: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614768
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.13220723466610.transcr...@bugs.debian.org



Processed: tagging 637086

2011-11-23 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 637086 + pending
Bug #637086 [partman-zfs] sets up ZFS filesystems for automated mount
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
637086: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=637086
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.13220725627470.transcr...@bugs.debian.org



Bug#649747: 127.0.1.1 hack is not supported by kFreeBSD

2011-11-23 Thread Axel Beckert
Hi Robert,

Robert Millan wrote:
> (it remains to be found whether it's true on Hurd pfinet, anyone can
> find out by running "ping 127.0.1.1"?)

Seems as if it works:

strauss:~# ping 127.0.1.1
PING 127.0.1.1 (127.0.1.1): 56 data bytes
64 bytes from 127.0.1.1: icmp_seq=0 ttl=255 time=10.053 ms
64 bytes from 127.0.1.1: icmp_seq=1 ttl=255 time=0.000 ms
64 bytes from 127.0.1.1: icmp_seq=2 ttl=255 time=0.000 ms
^C--- 127.0.1.1 ping statistics ---
4 packets transmitted, 3 packets received, 25% packet loss
round-trip min/avg/max/stddev = 0.000/3.351/10.053/4.739 ms
strauss:~#

(Had to install inetutils-ping first as iputils-ping is not available
on Hurd.)

Regards, Axel
-- 
 ,''`.  |  Axel Beckert , http://people.debian.org/~abe/
: :' :  |  Debian Developer, ftp.ch.debian.org Admin
`. `'   |  1024D: F067 EA27 26B9 C3FC 1486  202E C09E 1D89 9593 0EDE
  `-|  4096R: 2517 B724 C5F6 CA99 5329  6E61 2FF9 CD59 6126 16B5



-- 
To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/2023184736.gf2...@sym.noone.org



Bug#649747: 127.0.1.1 hack is not supported by kFreeBSD

2011-11-23 Thread Robert Millan
2011/11/23 Axel Beckert :
> Seems as if it works:

Thanks for testing.  Patch updated.

-- 
Robert Millan
diff --git a/netcfg-common.c b/netcfg-common.c
index 4b2a8a0..6053a48 100644
--- a/netcfg-common.c
+++ b/netcfg-common.c
@@ -1042,19 +1042,23 @@ void netcfg_write_common(struct in_addr ipaddress, char *hostname, char *domain)
 if ((fp = file_open(HOSTS_FILE, "w"))) {
 char ptr1[INET_ADDRSTRLEN];
 
-fprintf(fp, "127.0.0.1\tlocalhost\n");
+fprintf(fp, "127.0.0.1\tlocalhost");
 
 if (ipaddress.s_addr) {
 inet_ntop (AF_INET, &ipaddress, ptr1, sizeof(ptr1));
 if (domain_nodot && !empty_str(domain_nodot))
-fprintf(fp, "%s\t%s.%s\t%s\n", ptr1, hostname, domain_nodot, hostname);
+fprintf(fp, "\n%s\t%s.%s\t%s\n", ptr1, hostname, domain_nodot, hostname);
 else
-fprintf(fp, "%s\t%s\n", ptr1, hostname);
+fprintf(fp, "\n%s\t%s\n", ptr1, hostname);
 } else {
+#ifndef __FreeBSD_kernel__
 if (domain_nodot && !empty_str(domain_nodot))
-fprintf(fp, "127.0.1.1\t%s.%s\t%s\n", hostname, domain_nodot, hostname);
+fprintf(fp, "\n127.0.1.1\t%s.%s\t%s\n", hostname, domain_nodot, hostname);
 else
-fprintf(fp, "127.0.1.1\t%s\n", hostname);
+fprintf(fp, "\n127.0.1.1\t%s\n", hostname);
+#else
+fprintf(fp, "\t%s\n", hostname);
+#endif
 }
 
 fprintf(fp, "\n" IPV6_HOSTS);


Bug#649747: 127.0.1.1 hack is not supported by kFreeBSD

2011-11-23 Thread Samuel Thibault
Robert Millan, le Wed 23 Nov 2011 19:17:16 +0100, a écrit :
> 127.0.1.1 hack introduced in commit 6762701e15829b1857fe252c1de642f8ec00f8a8
> is based on the assumption that when loopback interface is set with
> a 255.0.0.0 netmask, it will identify itself by any address belonging to
> this subnet.  This is true on Linux, but not on kFreeBSD.
> 
> (it remains to be found whether it's true on Hurd pfinet, anyone can
> find out by running "ping 127.0.1.1"?)

Hurd pfinet uses Linux' stack and indeed uses 255.0.0.0.

Samuel



--
To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/2023214516.GG4711@type