Package: spread
Followup-For: Bug #391466

This is the patch for NMU.

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing'), (30, 'unstable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17.11-grsec
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)
diff -puriN spread-3.17.3.orig/debian/changelog spread-3.17.3/debian/changelog
--- spread-3.17.3.orig/debian/changelog 2006-10-07 21:30:32.000000000 +0000
+++ spread-3.17.3/debian/changelog      2006-10-07 21:30:21.000000000 +0000
@@ -1,3 +1,11 @@
+spread (3.17.3-4.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * spread.postrm no longer calls deluser/delgroup if not present when purging.
+  (Closes: #391466)
+
+ -- Arnaud Hocevar <[EMAIL PROTECTED]>  Sat,  7 Oct 2006 20:54:34 +0000
+
 spread (3.17.3-4) unstable; urgency=high
 
   * CVE-2006-3118: insecure temporary file handling (Closes: #375617)
diff -puriN spread-3.17.3.orig/debian/spread.postrm 
spread-3.17.3/debian/spread.postrm
--- spread-3.17.3.orig/debian/spread.postrm     2006-10-07 21:30:32.000000000 
+0000
+++ spread-3.17.3/debian/spread.postrm  2006-10-07 21:30:21.000000000 +0000
@@ -1,12 +1,19 @@
-#!/bin/sh -e
+#!/bin/sh
 
-if [ "$1" = "purge" ]; then
-    getent passwd spread >/dev/null && deluser spread
-    getent group spread >/dev/null && delgroup spread
-    
-    dpkg-statoverride --remove /etc/spread/spread.conf || true
-    dpkg-statoverride --remove /etc/spread || true
-    dpkg-statoverride --remove /var/run/spread || true
-fi
+set -e
+
+case "$1" in
+    purge)
+        if deluser --version>/dev/null 2>&1; then
+           getent passwd spread >/dev/null && deluser spread
+            getent group spread >/dev/null && delgroup spread
+       fi
+        dpkg-statoverride --remove /etc/spread/spread.conf || true
+        dpkg-statoverride --remove /etc/spread || true
+        dpkg-statoverride --remove /var/run/spread || true
+    ;;
+    *)
+    ;;
+esac
 
 #DEBHELPER#

Reply via email to