Hey Russell, I've done a sponsored upload of the 'debian/0.25.1-1' tag, you should get an email about it soon.
I agree the ACL is not great, and you are right that it will be triggered on the next version bump of libgit2. I'll file a bug to the FTP masters to see if they will relax this constraint. If they don't agree with this, do feel free to ping me in the future again for uploads like these. Thanks for your packaging! Ximin Russell Sim: > Hey Ximin, > > Actually, if you have any advice on what I should do to change the ACL it > would be appreciated. I have a feeling that every time a new version is > released, this ACL will prevent upload. > > Thanks, > Russell > > On 1 May 2017 21:11, "Russell Sim" <russell....@gmail.com> wrote: > >> Hey Ximin, >> >> It was rejected because I didn't have enough permissions. I can't upload >> new packages due to an ACL, if you want to do a non-maintainer uploaded to >> push it along feel free. Otherwise I'll start sorting that out tomorrow. >> >> Regards, >> Russell >> >> On 1 May 2017 21:05, "Ximin Luo" <infini...@debian.org> wrote: >> >>> Hey Russell, how's it going with this? >>> >>> I notice you've already tagged an upload in the git repo: >>> >>> https://anonscm.debian.org/cgit/collab-maint/libgit2.git/tag >>> /?h=debian/0.25.1-1 >>> >>> Is there anything else that needs to be done before the upload? I'm here >>> to help, if you need. >>> >>> I've actually already built this tag locally, and have been using it to >>> build cargo with. It works well from that perspective at least. >>> >>> Ximin >>> >>> Russell Sim: >>>> Hi, >>>> >>>> Sure thing, I'll take a look tonight. Yeah, I agree it's been a bit too >>>> long, and I apologise for that. >>>> >>>> On 20 April 2017 at 10:37, Ximin Luo <infini...@debian.org> wrote: >>>> >>>>> Source: libgit2 >>>>> Version: 0.24.5-1 >>>>> Followup-For: Bug #857068 >>>>> >>>>> Hey, this would be useful for the cargo package. (see #860116) >>>>> >>>>> At the moment we have to embed libgit2 0.25.1 in the cargo source >>> package, >>>>> this >>>>> is not ideal for Debian especially given that there was already a CVE >>> and >>>>> it's >>>>> not obvious to the security team that they would also need to patch >>> cargo. >>>>> >>>>> X >>>>> >>>>> -- System Information: >>>>> Debian Release: 9.0 >>>>> APT prefers testing >>>>> APT policy: (990, 'testing'), (500, 'unstable-debug'), (500, >>>>> 'testing-debug'), (500, 'buildd-unstable'), (300, 'unstable'), (100, >>>>> 'experimental'), (1, 'experimental-debug') >>>>> Architecture: amd64 (x86_64) >>>>> Foreign Architectures: i386 >>>>> >>>>> Kernel: Linux 4.9.0-1-amd64 (SMP w/4 CPU cores) >>>>> Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8) >>>>> Shell: /bin/sh linked to /bin/dash >>>>> Init: systemd (via /run/systemd/system) >>>>> >>>> >>>> >>>> >>> >>> >>> -- >>> GPG: ed25519/56034877E1F87C35 >>> GPG: rsa4096/1318EFAC5FBBDBCE >>> https://github.com/infinity0/pubkeys.git >>> >> > -- GPG: ed25519/56034877E1F87C35 GPG: rsa4096/1318EFAC5FBBDBCE https://github.com/infinity0/pubkeys.git