Your message dated Tue, 06 Sep 2005 14:02:03 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#326946: fixed in apt-zip 0.13.4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 6 Sep 2005 19:56:48 +0000
>From [EMAIL PROTECTED] Tue Sep 06 12:56:48 2005
Return-path: <[EMAIL PROTECTED]>
Received: from pop.gmx.de (mail.gmx.net) [213.165.64.20] 
        by spohr.debian.org with smtp (Exim 3.36 1 (Debian))
        id 1ECjYl-0003hj-00; Tue, 06 Sep 2005 12:56:48 -0700
Received: (qmail invoked by alias); 06 Sep 2005 19:56:14 -0000
Received: from dialin-145-254-079-229.arcor-ip.net (EHLO localhost) 
[145.254.79.229]
  by mail.gmx.net (mp008) with SMTP; 06 Sep 2005 21:56:14 +0200
X-Authenticated: #16353863
Received: from es by localhost with local (Exim 3.36 #1 (Debian))
        id 1ECjDd-00051E-00
        for <[EMAIL PROTECTED]>; Tue, 06 Sep 2005 21:34:57 +0200
From: Erik Schanze <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: generates broken fetch script
Date: Tue, 6 Sep 2005 21:34:56 +0200
User-Agent: KMail/1.7.2
MIME-Version: 1.0
Content-Type: Multipart/Mixed;
  boundary="Boundary-00=_g9eHD/WnDD5dnOb"
Message-Id: <[EMAIL PROTECTED]>
Sender: Erik Schanze <[EMAIL PROTECTED]>
X-Y-GMX-Trusted: 0
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

--Boundary-00=_g9eHD/WnDD5dnOb
Content-Type: text/plain;
  charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Package: apt-zip
Severity: important
Version: 0.13.3

Hi!

It seems, that the remove of MD5 check has broken the fetch script generation.
And it is not nicely indented as changelog says.

I usually generate it with:
apt-zip-list -f --medium=`pwd` --skip-mount

and since upgrading to apt-zip_0.13.3 the script will fail:
----------8<---------------------------------------
[EMAIL PROTECTED]:/tmp$ ./fetch-script-wget-neo
Download will be of size: 264000
ar: ../: File format not recognized

gzip: stdin: unexpected end of file
Fetching ../ failed (wrong contents)
wget: option requires an argument -- O
Usage: wget [OPTION]... [URL]...

Try `wget --help' for more options.
ar: ../: File format not recognized

gzip: stdin: unexpected end of file
Fetching ../ failed (wrong contents)
wget: option requires an argument -- O
Usage: wget [OPTION]... [URL]...

Try `wget --help' for more options.
ar: ../: File format not recognized

gzip: stdin: unexpected end of file
Fetching ../ failed (wrong contents)
wget: option requires an argument -- O
Usage: wget [OPTION]... [URL]...

Try `wget --help' for more options.
----------8<-------------------------------------------

Generated example script is attached.


Kindly regards,
Erik


-- 
 www.ErikSchanze.de *********************************************
 Bitte keine HTML-E-Mails! No HTML mails, please! Limit: 100 kB *
      * Linux-Info-Tag in Dresden, am 29. Oktober 2005          *
             Info: http://www.linux-info-tag.de                 *

--Boundary-00=_g9eHD/WnDD5dnOb
Content-Type: text/plain;
  charset="iso-8859-1";
  name="fetch-script-wget-neo"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
        filename="fetch-script-wget-neo"

    #!/bin/sh
    # This file was auto-generated by apt-zip-list 0.13.3
    # Method: wget - Options: 
 
    err(){
echo >&2 "Fetching $1 failed ($2)"
    }
    check(){
        [ ! -r "$1" ] && return 1
[ "`which gzip`" ] &&
if ar p $1 data.tar.gz | gzip -t
then return 0
else err $1 "wrong contents"; return 1
fi
return $3
    }
do_wget() {
    wget -t3 -nv -O $2 $1
    check $2 $4 $?
    return $?
}
getfile(){
    (check ../  0 && echo  matches MD5.) ||
    (do_wget     && mv  ../)
}

mkdir -p partial && cd partial || echo >&2  "Cannot change to directory 
./partial"
       echo Download will be of size: 264000
       while read URL FILE SIZE MD5
       do getfile $URL $FILE $SIZE $MD5 || true
       done <<EOP
http://ftp.de.debian.org/debian/pool/main/k/kdepim/libkmime2_3.4.2-1_i386.deb 
libkmime2_4%3a3.4.2-1_i386.deb 111926 bee30e36c6dc795edcb3b7afaa6140d2
http://ftp.de.debian.org/debian/pool/main/k/kdepim/libkpimexchange1_3.4.2-1_i386.deb
 libkpimexchange1_4%3a3.4.2-1_i386.deb 104266 301471b39d6c949c5a42ab8b37ff20e6
http://ftp.de.debian.org/debian/pool/main/k/kdepim/libktnef1_3.4.2-1_i386.deb 
libktnef1_4%3a3.4.2-1_i386.deb 47808 0a20156f656ddc0a27ade60a19a81065
EOP

--Boundary-00=_g9eHD/WnDD5dnOb--

---------------------------------------
Received: (at 326946-close) by bugs.debian.org; 6 Sep 2005 21:09:38 +0000
>From [EMAIL PROTECTED] Tue Sep 06 14:09:38 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1ECkZv-0001PE-00; Tue, 06 Sep 2005 14:02:03 -0700
From: Giacomo Catenazzi <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#326946: fixed in apt-zip 0.13.4
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 06 Sep 2005 14:02:03 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: apt-zip
Source-Version: 0.13.4

We believe that the bug you reported is fixed in the latest version of
apt-zip, which is due to be installed in the Debian FTP archive:

apt-zip_0.13.4.dsc
  to pool/main/a/apt-zip/apt-zip_0.13.4.dsc
apt-zip_0.13.4.tar.gz
  to pool/main/a/apt-zip/apt-zip_0.13.4.tar.gz
apt-zip_0.13.4_all.deb
  to pool/main/a/apt-zip/apt-zip_0.13.4_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Giacomo Catenazzi <[EMAIL PROTECTED]> (supplier of updated apt-zip package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue,  6 Sep 2005 22:41:15 +0200
Source: apt-zip
Binary: apt-zip
Architecture: source all
Version: 0.13.4
Distribution: unstable
Urgency: low
Maintainer: Giacomo Catenazzi <[EMAIL PROTECTED]>
Changed-By: Giacomo Catenazzi <[EMAIL PROTECTED]>
Description: 
 apt-zip    - Update a non-networked computer using apt and removable media
Closes: 326946
Changes: 
 apt-zip (0.13.4) unstable; urgency=low
 .
   * Really remove download test (closes: #326946)
Files: 
 8d6879afaf8cd3e1ecd6758d8962b270 513 admin extra apt-zip_0.13.4.dsc
 695f0e5ac9f5d10caf8827308a9b9550 14052 admin extra apt-zip_0.13.4.tar.gz
 bf80f1a10d418782d0756844200bbb67 14966 admin extra apt-zip_0.13.4_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDHgBg+ZNUJLHfmlcRAhlnAJoDOCzXPivS9j6T7vMpDzXQk5HafQCfcTx2
K2mOGDdC7vBvoQvT3P/Ey04=
=SSVC
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to