--- gnome-mount-0.6.orig/debian/control +++ gnome-mount-0.6/debian/control @@ -0,0 +1,28 @@ +Source: gnome-mount +Section: gnome +Priority: optional +Maintainer: Martin Pitt +XSBC-Original-Maintainer: Michael Biebl +Build-Depends: cdbs, debhelper (>= 5.0.0), libgnome-keyring-dev (>= 0.4), libgnomeui-dev (>= 2.1.5), libdbus-1-dev (>= 0.60), libdbus-glib-1-dev (>= 0.60), libhal-storage-dev (>= 0.5.8.1), libgtk2.0-dev (>= 2.8.0), libglade2-dev, libxml-parser-perl, libnautilus-extension-dev (>= 2.5.0), libnotify-dev (>= 0.3.0), libeel2-dev (>= 2.5.0) +Standards-Version: 3.7.2 +XS-Vcs-Svn: svn://svn.debian.org/svn/pkg-utopia/packages/unstable/gnome-mount +XS-Vcs-Browser: http://svn.debian.org/wsvn/pkg-utopia/packages/unstable/gnome-mount + +Package: gnome-mount +Architecture: any +Depends: ${shlibs:Depends}, ${misc:Depends}, hal, eject +Suggests: cryptsetup +Enhances: nautilus +Description: wrapper for (un)mounting and ejecting storage devices + The gnome-mount package contains programs for mounting, unmounting and + ejecting storage devices. The goal for gnome-mount is to get the appropriate + Gnome software (such as gnome-volume-manager and Gnome-VFS) to use his method + instead of invoking mount/umount/eject or direct HAL invoking methods. + . + All the gnome-mount programs utilize the methods on HAL and as such run + unprivileged. The rationale for gnome-mount is to have a centralized place (in + GConf) where settings (e.g. mount options and mount locations) are maintained. + . + A nautilus extension allows to easily change the mount options which can be + user, drive or volume specific. + --- gnome-mount-0.6.orig/debian/links +++ gnome-mount-0.6/debian/links @@ -0,0 +1,2 @@ +/usr/share/man/man1/gnome-mount.1.gz usr/share/man/man1/gnome-umount.1.gz +/usr/share/man/man1/gnome-mount.1.gz usr/share/man/man1/gnome-eject.1.gz --- gnome-mount-0.6.orig/debian/rules +++ gnome-mount-0.6/debian/rules @@ -0,0 +1,16 @@ +#!/usr/bin/make -f + +include /usr/share/cdbs/1/rules/debhelper.mk +include /usr/share/cdbs/1/class/gnome.mk +include /usr/share/cdbs/1/rules/simple-patchsys.mk +include /usr/share/cdbs/1/rules/utils.mk + +DEB_CONFIGURE_EXTRA_FLAGS := --enable-nautilus-extension +DEB_CONFIGURE_SCRIPT_ENV += LDFLAGS="-Wl,--as-needed" +DEB_DH_MAKESHLIBS_ARGS := -Xlibgnome-mount +DEB_DH_SHLIBDEPS_ARGS := -Xlibgnome-mount +DEB_INSTALL_DOCS_ALL := AUTHORS NEWS README + +binary-install/gnome-mount:: + rm -f debian/gnome-mount/usr/lib/nautilus/extensions-1.0/libgnome-mount.la + rm -f debian/gnome-mount/usr/lib/nautilus/extensions-1.0/libgnome-mount.a --- gnome-mount-0.6.orig/debian/watch +++ gnome-mount-0.6/debian/watch @@ -0,0 +1,2 @@ +version=3 +http://people.freedesktop.org/~david/dist/gnome-mount-(.*)\.tar\.gz --- gnome-mount-0.6.orig/debian/changelog +++ gnome-mount-0.6/debian/changelog @@ -0,0 +1,189 @@ +gnome-mount (0.6-1ubuntu3) gutsy; urgency=low + + * Fixed grammar in debian/patches/03_root_mounting.patch (LP: #138477) + + -- dAniel hAhler Mon, 10 Sep 2007 01:10:13 +0200 + +gnome-mount (0.6-1ubuntu2) gutsy; urgency=low + + * debian/patches/ubuntu-default-mount-options.patch: Fix NTFS default mount + options. + + -- Martin Pitt Fri, 27 Apr 2007 09:14:59 +0200 + +gnome-mount (0.6-1ubuntu1) gutsy; urgency=low + + * Merge with Debian unstable; remaining changes: + - debian/rules: Ignore libgnome-mount for dh_shlibdeps, so that + gnome-mount does not end up depending on half of Gnome just for the + nautilus extension. This keeps it suitable for XFCE. + - debian/patches/02_sudo_session_dbus.patch: When being run through sudo, + temporarily drop real user id to the sudo user, so that notify_init() + connects to the actual user's session dbus instead of root's nonexisting + one. + - debian/patches/03_root_mounting.patch: If we get a + PermissionDeniedByPolicy on mounting, unmounting, or ejecting, and are + in the 'admin' group, call ourselves through gksu, so that + administrators can handle fixed partitions just like removable ones. + (https://wiki.ubuntu.com/MountAllLocalFilesystems) + - debian/patches/05_ignore_slash_label.patch: If the label is a single + '/', ignore it, so that it does not end up as /media/_. (LP #83323) + - debian/patches/06_dont_flood_log.patch: Don't flood ~/.xsession-errors + with messages about drive and volume. (LP #93238, forwarded to Gnome + #419928) + - debian/patches/08_crypto_setup_error_dialog.patch: If setup_crypto() + fails with Crypto.SetupError, display an error dialog instead of failing + silently. Special-case a missing /sbin/cryptsetup, suggest to install the + package. (LP #78358, forwarded to Gnome #426326) + - debian/patches/ubuntu-default-mount-options.patch: Change a few default + mount options for compatibility to UTF8 and previous Ubuntu versions. + * Drop debian/patches/04_ntfs_mount_options.patch, upstream now. + * Drop debian/patches/07_gnome_password_dialog.patch, upstream now. + * Drop debian/patches/99autoreconf.patch not necessary any more. + + -- Martin Pitt Mon, 23 Apr 2007 15:44:20 +0200 + +gnome-mount (0.6-1) unstable; urgency=low + + * New upstream release. + * debian/patches/01-missing_includes.patch + - Removed. Fixed upstream. + + -- Michael Biebl Wed, 11 Apr 2007 01:11:08 +0200 + +gnome-mount (0.5-3) unstable; urgency=low + + * debian/control + - Add an explicit build dependency on libeel2-dev (>= 2.5.0). + - Add XS-Vcs-* fields. + - Replace Recommends: cryptsetup with Suggests. + * debian/rules + - Pass "-Wl,--as-needed" to LDFLAGS. + + -- Michael Biebl Fri, 27 Oct 2006 14:02:16 +0200 + +gnome-mount (0.5-2ubuntu8) feisty; urgency=low + + * Add debian/patches/08_crypto_setup_error_dialog.patch: If setup_crypto() + fails with Crypto.SetupError, display an error dialog instead of failing + silently. Special-case a missing /sbin/cryptsetup, suggest to install the + package. (LP: #78358) + + -- Martin Pitt Wed, 4 Apr 2007 20:31:19 +0200 + +gnome-mount (0.5-2ubuntu7) feisty; urgency=low + + [ Jani Monoses ] + * debian/patches/07_gnome_password_dialog.patch: + Patch from upstream svn, import a local copy of GnomePasswordDialog + and drop the GNOME library dependencies (LP: #97642) + * debian/patches/99_autoreconf: + autotools rerun + * debian/rules: + make dh_shlibdeps ignore libgnome-mount so the package does not hard + depend on libgnome. + + [ Martin Pitt ] + * debian/patches/03_root_mounting.patch: Add #include to make + getenv() available again. + + -- Martin Pitt Wed, 4 Apr 2007 19:44:17 +0200 + +gnome-mount (0.5-2ubuntu6) feisty; urgency=low + + * debian/patches/06_dont_flood_log.patch: + - don't flood xsession-errors with messages about drive and volume + (Ubuntu: #93238) + + -- Sebastien Bacher Fri, 30 Mar 2007 18:09:02 +0200 + +gnome-mount (0.5-2ubuntu5) feisty; urgency=low + + * debian/control: Set Ubuntu maintainer (to me). + * debian/patches/ubuntu-default-mount-options.patch: Use shortname=mixed + mount option for VFAT to stay compatible with earlier Ubuntu releases. + (LP: #76200) + * debian/patches/ubuntu-default-mount-options.patch: Mount with 'exec' by + default to stay compatible with earlier Ubuntu releases. + (LP: #87627) + * debian/patches/ubuntu-default-mount-options.patch: Use 'uid' option by + default for HFS. (LP: #84044) + * Add debian/patches/05_ignore_slash_label.patch: If the label is a single + '/', ignore it, so that it does not end up as /media/_. (LP: #83323) + + -- Martin Pitt Fri, 9 Mar 2007 18:03:18 +0100 + +gnome-mount (0.5-2ubuntu4) feisty; urgency=low + + * debian/patches/03_root_mounting.patch: + - Pass mount policy that was figured out from the user's gconf setup to + the gksu'ed instance. Based on a patch from Florent Mertens, thank you! + - Move gksu calling into separate function gksu_myself() to keep the code + clean. + - Closes: LP#78314 + * Add debian/patches/04_ntfs_mount_options.patch: + - Supply sane default mount options for ntfs-3g and ntfs-fuse. + - Patch from Florent Mertens, thank you! + - Closes: LP#78375 + + -- Martin Pitt Wed, 10 Jan 2007 08:59:33 +0100 + +gnome-mount (0.5-2ubuntu3) feisty; urgency=low + + * Add debian/patches/02_sudo_session_dbus.patch: + - When being run through sudo, temporarily drop real user id to the sudo + user, so that notify_init() connects to the actual user's session dbus + instead of root's nonexisting one. + * Add debian/patches/03_root_mounting.patch: + - If we get a PermissionDeniedByPolicy on mounting, unmounting, or + ejecting, and are in the 'admin' group, call ourselves through gksu, so + that administrators can handle fixed partitions just like removable ones. + - See https://wiki.ubuntu.com/MountAllLocalFilesystems for details. + + -- Martin Pitt Tue, 12 Dec 2006 09:05:18 +0100 + +gnome-mount (0.5-2ubuntu2) feisty; urgency=low + + * Drop cryptsetup from Recommends: to Suggests. + + -- Martin Pitt Thu, 16 Nov 2006 16:15:42 -0800 + +gnome-mount (0.5-2ubuntu1) feisty; urgency=low + + * First Ubuntu version. + * debian/control: Add missing libeel2-dev build dependency. (Debian bug + #395478) + * debian/rules: Use -Wl,--as-needed to get rid of unnecessary library + dependencies. + * Add debian/patches/ubuntu-default-mount-options.patch: + - Use 'utf8' option for VFAT, ISO-9660, and NTFS. + - Mount VFAT with umask 077 to stay compatible to previous Ubuntu releases + and keep the possibility of using VFAT USB sticks for ssh/gpg keys. + + -- Martin Pitt Wed, 1 Nov 2006 11:29:11 +0100 + +gnome-mount (0.5-2) unstable; urgency=low + + * debian/control + - Add Depends on hal and eject. + - Add a Recommends on cryptsetup for luks encrypted partitions. + - Update maintainer email address to biebl@debian.org. + * debian/patches/01-missing_includes.patch + - Added, fixes implicit pointer conversions. Closes: #393553 + + -- Michael Biebl Wed, 18 Oct 2006 18:37:45 +0200 + +gnome-mount (0.5-1) unstable; urgency=low + + * New upstream release. + * Added build dependency on libnotify-dev (>= 0.3.0). + * Tightened build dependency on libhal-storage-dev (>= 0.5.8.1). + + -- Michael Biebl Wed, 20 Sep 2006 00:59:21 +0200 + +gnome-mount (0.4-1) unstable; urgency=low + + * Initial release. Closes: #387208 + + -- Michael Biebl Wed, 13 Sep 2006 01:43:19 +0200 + --- gnome-mount-0.6.orig/debian/compat +++ gnome-mount-0.6/debian/compat @@ -0,0 +1 @@ +5 --- gnome-mount-0.6.orig/debian/patches/05_ignore_slash_label.patch +++ gnome-mount-0.6/debian/patches/05_ignore_slash_label.patch @@ -0,0 +1,11 @@ +--- a/src/gnome-mount.c 2007-03-09 17:53:55.000000000 +0100 ++++ b/src/gnome-mount.c 2007-03-09 17:56:42.000000000 +0100 +@@ -1467,7 +1467,7 @@ + if (volume != NULL) { + const char *label; + label = libhal_volume_get_label (volume); +- if (label != NULL) { ++ if (label != NULL && strcmp(label, "/") != 0) { + int n; + + mount_point = g_strdup (label); --- gnome-mount-0.6.orig/debian/patches/08_crypto_setup_error_dialog.patch +++ gnome-mount-0.6/debian/patches/08_crypto_setup_error_dialog.patch @@ -0,0 +1,50 @@ +--- a/src/gnome-mount.c ++++ b/src/gnome-mount.c +@@ -454,6 +454,39 @@ + } + } + ++static void ++show_error_dialog_setup_crypto (const char *udi, LibHalVolume *volume, LibHalDrive *drive, ++ const char *error_name, const char *error_detail) ++{ ++ GtkWidget *w; ++ ++ if (!opt_noui) { ++ w = gtk_message_dialog_new (NULL, ++ GTK_DIALOG_MODAL, ++ GTK_MESSAGE_ERROR, ++ GTK_BUTTONS_CLOSE, ++ _("Unable to set up crypto device")); ++ ++ if (strcmp (error_name, "org.freedesktop.Hal.Device.Volume.Crypto.SetupError") == 0 && ++ strstr (error_detail, "cryptsetup not found")) { ++ gtk_message_dialog_format_secondary_text ( ++ GTK_MESSAGE_DIALOG (w), ++ _("You need to install the cryptsetup package.")); ++ } else { ++ ++ /* copout fallback; show exception name */ ++ ++ gtk_message_dialog_format_secondary_markup ( ++ GTK_MESSAGE_DIALOG (w), ++ _("Error %s\n\n%s"), ++ error_name, error_detail); ++ } ++ ++ gtk_dialog_run (GTK_DIALOG (w)); ++ gtk_widget_unref (w); ++ } ++} ++ + + /** Integrate a dbus mainloop. + * +@@ -2268,6 +2301,7 @@ + if (strcmp (error.name, "org.freedesktop.Hal.Device.Volume.Crypto.SetupPasswordError") == 0) { + *password_error = TRUE; + } ++ show_error_dialog_setup_crypto(udi, volume, drive, error.name, error.message); + dbus_error_free (&error); + goto out; + } --- gnome-mount-0.6.orig/debian/patches/02_sudo_session_dbus.patch +++ gnome-mount-0.6/debian/patches/02_sudo_session_dbus.patch @@ -0,0 +1,42 @@ +diff -Nur gnome-mount-0.5/src/gnome-mount.c gnome-mount-0.5.new/src/gnome-mount.c +--- gnome-mount-0.5/src/gnome-mount.c 2006-09-17 07:17:54.000000000 +0200 ++++ gnome-mount-0.5.new/src/gnome-mount.c 2006-12-08 17:35:12.000000000 +0100 +@@ -72,6 +72,8 @@ + static gboolean opt_block = FALSE; + static gboolean opt_nodisplay = FALSE; + ++static int sudo_uid = -1; ++ + #define DBUS_TIMEOUT G_MAXINT + + static void +@@ -2576,6 +2578,15 @@ + { NULL, 0, 0, 0, NULL, NULL, NULL } + }; + ++ /* figure out real user id when called through sudo so that we can ++ * connect to the right session bus. */ ++ if (geteuid() == 0) { ++ /* drop user temporarily */ ++ const char *s = getenv("SUDO_UID"); ++ if (s) ++ sudo_uid = atoi (s); ++ } ++ + rc = 1; + + bindtextdomain (PACKAGE, GNOMELOCALEDIR); +@@ -2668,7 +2679,13 @@ + argc, argv, + GNOME_PARAM_NONE); + #ifdef ENABLE_NOTIFY ++ /* temporarily drop real uid to sudo user so that we connect to the real ++ * user's session bus */ ++ if (sudo_uid > 0) ++ setreuid (sudo_uid, -1); + notify_init ("gnome-mount"); ++ if (sudo_uid > 0) ++ setreuid (0, -1); + #endif + } + --- gnome-mount-0.6.orig/debian/patches/03_root_mounting.patch +++ gnome-mount-0.6/debian/patches/03_root_mounting.patch @@ -0,0 +1,172 @@ +diff -Nur gnome-mount-0.6/src/gnome-mount.c gnome-mount-0.6.new/src/gnome-mount.c +--- gnome-mount-0.6/src/gnome-mount.c 2007-04-23 15:14:30.000000000 +0200 ++++ gnome-mount-0.6.new/src/gnome-mount.c 2007-04-23 15:14:48.000000000 +0200 +@@ -29,6 +29,8 @@ + #include + #include + #include ++#include ++#include + + #include + #include +@@ -78,6 +80,8 @@ + static gboolean opt_nodisplay = FALSE; + + static int sudo_uid = -1; ++static int orig_argc; ++static char** orig_argv; + + #define DBUS_TIMEOUT G_MAXINT + +@@ -641,6 +645,90 @@ + return (mount_point); + } + ++/* check if we are (probably) a sudoer, i. e. member of the 'admin' group */ ++static gboolean ++check_sudoer() ++{ ++ gchar *out; ++ gchar **groups, **i; ++ gboolean result; ++ gint exitcode; ++ gint len; ++ gchar* argv[] = { "/usr/bin/groups", NULL }; ++ ++ /* capture groups output, switch to unpriv'ed user id for that */ ++ result = g_spawn_sync (NULL, argv, NULL, 0, NULL, NULL, ++ &out, NULL, &exitcode, NULL); ++ ++ if (!result || exitcode != 0) { ++ g_free (out); ++ return FALSE; ++ } ++ ++ /* chop off CRLF at the end */ ++ for (len = strlen(out); len > 0; --len) { ++ if (isspace(out[len-1])) ++ out[len-1] = 0; ++ else ++ break; ++ } ++ ++ groups = g_strsplit (out, " ", 0); ++ g_free (out); ++ ++ result = FALSE; ++ for (i = groups; *i; ++i) { ++ if (!strcmp (*i, "admin")) { ++ result = TRUE; ++ break; ++ } ++ } ++ g_strfreev (groups); ++ return result; ++} ++ ++/* execute myself as root through gksu to get more privileges */ ++static gboolean ++gksu_myself(const char* mount_point, const char* fstype, GPtrArray *options) ++{ ++ g_debug("permission denied, but I'm an admin; gksu'ing myself to try again"); ++ ++ char **gksu_argv = g_new0 (char*, orig_argc+11); ++ int argc = 0, i; ++ gksu_argv[argc++] = "gksu"; ++ gksu_argv[argc++] = "--message"; ++ gksu_argv[argc++] = _("Access to this internal disk is restricted to system administrators for security reasons.\n\nPlease enter your password to proceed."); ++ gksu_argv[argc++] = "--"; ++ ++ /* preserve current policy, but do not overwrite user's ++ * CLI options, thus put them on the command line first ++ */ ++ gksu_argv[argc++] = orig_argv[0]; ++ ++ if (mount_point && *mount_point) { ++ gksu_argv[argc++] = "--mount-point"; ++ gksu_argv[argc++] = mount_point; ++ } ++ if (fstype && *fstype) { ++ gksu_argv[argc++] = "--fstype"; ++ gksu_argv[argc++] = fstype; ++ } ++ if (options && options->len != 0) { ++ GPtrArray *all_options; ++ all_options = options; ++ g_ptr_array_add (all_options, NULL); ++ gksu_argv[argc++] = "--mount-options"; ++ gksu_argv[argc++] = g_strjoinv(",", (char **) all_options->pdata); ++ } ++ ++ for (i = 1; i <= orig_argc; ++i) { ++ gksu_argv[argc++] = orig_argv[i]; ++ } ++ ++ return g_spawn_sync (NULL, gksu_argv, NULL, G_SPAWN_SEARCH_PATH, NULL, NULL, ++ NULL, NULL, NULL, NULL); ++} ++ + static gboolean + volume_mount_with_options (const char *udi, LibHalVolume *volume, LibHalDrive *drive, + const char *mount_point, const char *fstype, GPtrArray *options) +@@ -729,7 +817,12 @@ + dbus_error_free (&error); + + return ret; +- } ++ } else if (strcmp (error.name, "org.freedesktop.Hal.Device.PermissionDeniedByPolicy") == 0 && ++ !opt_noui && getuid() != 0 && check_sudoer()) { ++ /* try again as root if we cannot do it as user */ ++ ret = gksu_myself(mount_point, fstype, options); ++ goto out; ++ } + + notify_parent (FALSE); + +@@ -1727,6 +1820,15 @@ + if (!is_ro) { + unmount_cache_timeout_cancel (FALSE); + } ++ ++ /* try again as root if we cannot do it as user */ ++ if (strcmp (error.name, "org.freedesktop.Hal.Device.PermissionDeniedByPolicy") == 0 && ++ !opt_noui && getuid() != 0 && check_sudoer()) { ++ /* try again as root if we cannot do it as user */ ++ ret = gksu_myself(NULL, NULL, NULL); ++ goto out; ++ } ++ + g_warning ("Unmount failed for %s: %s : %s\n", udi, error.name, error.message); + show_error_dialog_unmount (udi, volume, drive, error.name, error.message); + dbus_error_free (&error); +@@ -1931,6 +2033,15 @@ + if (!is_ro) { + unmount_cache_timeout_cancel (FALSE); + } ++ ++ /* try again as root if we cannot do it as user */ ++ if (strcmp (error.name, "org.freedesktop.Hal.Device.PermissionDeniedByPolicy") == 0 && ++ !opt_noui && getuid() != 0 && check_sudoer()) { ++ /* try again as root if we cannot do it as user */ ++ ret = gksu_myself(NULL, NULL, NULL); ++ goto out; ++ } ++ + g_warning ("Eject failed for %s: %s : %s\n", udi, error.name, error.message); + show_error_dialog_eject (udi, volume, drive, error.name, error.message); + dbus_error_free (&error); +@@ -2619,6 +2730,13 @@ + { NULL, 0, 0, 0, NULL, NULL, NULL } + }; + ++ /* rescue our original argv */ ++ orig_argc = argc; ++ orig_argv = g_new (char*, argc+1); ++ int i; ++ for (i = 0; i <= argc; ++i) ++ orig_argv[i] = g_strdup (argv[i]); ++ + /* figure out real user id when called through sudo so that we can + * connect to the right session bus. */ + if (geteuid() == 0) { --- gnome-mount-0.6.orig/debian/patches/ubuntu-default-mount-options.patch +++ gnome-mount-0.6/debian/patches/ubuntu-default-mount-options.patch @@ -0,0 +1,65 @@ +diff -Nur gnome-mount-0.6/gnome-mount.schemas.in gnome-mount-0.6.new/gnome-mount.schemas.in +--- gnome-mount-0.6/gnome-mount.schemas.in 2007-04-11 00:50:12.000000000 +0200 ++++ gnome-mount-0.6.new/gnome-mount.schemas.in 2007-04-27 09:14:39.000000000 +0200 +@@ -6,7 +6,7 @@ + /system/storage/default_options/vfat/mount_options + list + string +- [shortname=lower,uid=] ++ [shortname=mixed,uid=,utf8,umask=077,exec] + + Default mount options for vfat fs + A list of default mount options for volumes formatted with the vfat file system. +@@ -18,7 +18,7 @@ + /system/storage/default_options/iso9660/mount_options + list + string +- [uid=] ++ [uid=,utf8,exec] + + Default mount options for iso9660 fs + A list of default mount options for volumes formatted with the iso9660 file system. +@@ -30,7 +30,7 @@ + /system/storage/default_options/udf/mount_options + list + string +- [uid=] ++ [uid=,exec] + + Default mount options for udf fs + A list of default mount options for volumes formatted with the udf file system. +@@ -42,7 +42,7 @@ + /system/storage/default_options/ntfs/mount_options + list + string +- [umask=222] ++ [umask=222,utf8,exec] + + Default mount options for ntfs fs + A list of default mount options for volumes formatted with the ntfs file system. +@@ -64,13 +64,23 @@ + /system/storage/default_options/ntfs-3g/mount_options + list + string +- [locale=] ++ [locale=,exec] + + Default mount options for ntfs-3g fs + A list of default mount options for volumes formatted with the ntfs file system using ntfs-3g. + + + +- ++ ++ /schemas/system/storage/default_options/hfs/mount_options ++ /system/storage/default_options/hfs/mount_options ++ list ++ string ++ [uid=,] ++ ++ Default mount options for hfs fs ++ A list of default mount options for volumes formatted with the hfs file system. ++ ++ + + --- gnome-mount-0.6.orig/debian/patches/06_dont_flood_log.patch +++ gnome-mount-0.6/debian/patches/06_dont_flood_log.patch @@ -0,0 +1,16 @@ +diff -Nur gnome-mount-0.5/src/gnome-mount-properties.c gnome-mount-0.5.new/src/gnome-mount-properties.c +--- gnome-mount-0.5/src/gnome-mount-properties.c 2007-03-30 18:26:58.000000000 +0200 ++++ gnome-mount-0.5.new/src/gnome-mount-properties.c 2007-03-30 18:27:49.000000000 +0200 +@@ -94,10 +94,10 @@ + + if (drive == NULL && volume != NULL) + drive = gnome_vfs_volume_get_drive (volume); +- ++#if 0 + g_message ("drive = %x", drive); + g_message ("volume = %x", volume); +- ++#endif + if (drive != NULL) + drive_hal_udi = gnome_vfs_drive_get_hal_udi (drive); + if (volume != NULL) --- gnome-mount-0.6.orig/debian/copyright +++ gnome-mount-0.6/debian/copyright @@ -0,0 +1,32 @@ +This package was debianized by Michael Biebl on +Tue, 15 Aug 2006 23:58:34 +0200. + +It was downloaded from http://people.freedesktop.org/~david/dist/ + +Upstream Author: + David Zeuthen + +Copyright: + Copyright (C) 2006 David Zeuthen, + +License: + + This package is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This package is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this package; if not, write to the Free Software + Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA + +On Debian systems, the complete text of the GNU General +Public License can be found in `/usr/share/common-licenses/GPL'. + +The Debian packaging is (C) 2006, Michael Biebl and +is licensed under the GPL, see above.