Package: release.debian.org Severity: normal User: release.debian....@packages.debian.org Usertags: unblock
Please unblock package spf-engine (Please provide enough (but not too much) information to help the release team to judge the request efficiently. E.g. by filling in the sections below.) [ Reason ] The only change this revision includes is an update to the logcheck regex to account for logging changes in Bookworm. For users that use logcheck, not having this fix in would somewhat defeat the purpose of using it. [ Impact ] Logcheck doesn't work correctly for this package. [ Tests ] This was tested by the submitter. See #1034727 [1] for details. I don't use logcheck, so I didn't test it myself. This is how I've generally handled these submissions in the past and it's always worked out fine. [1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034727 [ Risks ] Change is trivial. The only potential risk is that logcheck will continue not to work correctly in some way. I don't think there's any real risk of making things worse. [ Checklist ] [X] all changes are documented in the d/changelog [X] I reviewed all changes and I approve them [X] attach debdiff against the package in testing [ Other info ] The updated package is uploaded to Experimental. If approved, the Unstable upload would have an additional d/changelog entry, but no other changes. unblock spf-engine/3.0.4-1
diff -Nru spf-engine-3.0.4/debian/changelog spf-engine-3.0.4/debian/changelog --- spf-engine-3.0.4/debian/changelog 2023-04-09 09:24:11.000000000 -0400 +++ spf-engine-3.0.4/debian/changelog 2023-04-23 15:49:01.000000000 -0400 @@ -1,3 +1,11 @@ +spf-engine (3.0.4-2~exp1) experimental; urgency=medium + + * Update logcheck rule for postfix-policyd-spf-python to account for logging + changes in Bookworm (Closes: #1034727) + - Thanks to Mathias Gibbens for the report and the fix + + -- Scott Kitterman <sc...@kitterman.com> Sun, 23 Apr 2023 15:49:01 -0400 + spf-engine (3.0.4-1) unstable; urgency=medium * New upstream release diff -Nru spf-engine-3.0.4/debian/logcheck/postfix-policyd-spf-python spf-engine-3.0.4/debian/logcheck/postfix-policyd-spf-python --- spf-engine-3.0.4/debian/logcheck/postfix-policyd-spf-python 2022-11-30 10:25:57.000000000 -0500 +++ spf-engine-3.0.4/debian/logcheck/postfix-policyd-spf-python 2023-04-23 15:48:48.000000000 -0400 @@ -1,2 +1 @@ -+^\w{3} [ :0-9]{11} [._[:alnum:]-]+ policyd-spf\[[0-9]+\]: (Pass|Neutral|None|Softfail|Fail|Temperror|Permerror); identity=(helo|mailfrom); client-ip=[0-9a-f.:]+; helo=.*; envelope-from=.*; receiver= - +^(\w{3} [ :[:digit:]]{11}|[0-9T:.+-]{32}) [._[:alnum:]-]+ policyd-spf\[[0-9]+\]:( :)? prepend Received-SPF: (Pass|Neutral|None|Softfail|Fail|Temperror|Permerror) \((helo|mailfrom)\) identity=(helo|mailfrom); client-ip=[0-9a-f.:]+; helo=.*; envelope-from=.*; receiver=