Bug#601859: wesnoth-1.9: Bad error handling in postinst script

2010-11-22 Thread PJ Weisberg
ut my save files.) -- -PJ -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#601859: wesnoth-1.9: Bad error handling in postinst script

2010-11-20 Thread PJ Weisberg
>From 1:1.9.1-1 to 1:1.9.2-1.

Bug#601859: wesnoth-1.9: Bad error handling in postinst script

2010-11-20 Thread PJ Weisberg
Actually, drop #3 from that workaround. Upgrading wesnoth-1.9-core *also* requires wesnoth-1.8-core to be installed. :-/

Bug#601859: wesnoth-1.9: Bad error handling in postinst script

2010-11-03 Thread PJ Weisberg
As a temporary workaround, until the postinst script gets fixed, you can: 1. Install wesnoth-1.8-core 2. Install wesnoth-1.9-core 3. Uninstall wesnoth-1.8-core The Wesnoth1.9 postinst configuration script is set up to abort if Wesnoth isn't already configured, so installing a version that does s

Bug#601859: wesnoth-1.9: Bad error handling in postinst script

2010-11-03 Thread PJ Weisberg
Package: wesnoth-1.9 Version: 1:1.9.1-1 Severity: normal Yes, I was very suspicious when I opened up the postinst script to try to figure out why it failed. It says "if [ $? != 0 ]; then" in a couple of places, but $? can NEVER be != to 0, because the 'set -e' at the top would cause the script to

Bug#410248: Thanks and Further info incase it helps.

2007-02-10 Thread pj
Thanks to Christian for the advice I will give it a try. I usually try to stick to .debs to allow security and other updates to keep me uptodate. In Reply to Stephen's suggestion I include his request below, incase it proves useful. Thanks all. Paul ([EMAIL PROTECTED]) ~$ gtk-gnutella 07-0

Bug#410248: more info

2007-02-09 Thread pj
I have attempted to send a private reply to Steve Langasek but , given other replies and incase he doesn't receive private replies here is the content; === Re: Bug#410248: tk-gnutella-0.96.1svn12109-1: Will not start as user, , , executable is set as root, root ... security th