From unknown Sat Apr 04 11:51:57 2026
X-Loop: owner@bugs.x2go.org
Subject: Bug#1065: X2Go issue (in src:x2goserver) has been marked as pending for release
Reply-To: Mihai Moldovan <ionic@ionic.de>, 1065@bugs.x2go.org
Resent-From: Mihai Moldovan <ionic@ionic.de>
Resent-To: x2go-dev@lists.x2go.org
Resent-CC: X2Go Developers <x2go-dev@lists.x2go.org>
X-Loop: owner@bugs.x2go.org
Resent-Date: Sun, 07 Aug 2016 18:30:02 +0000
Resent-Message-ID: <handler.1065.B1065.147059440330057@bugs.x2go.org>
Resent-Sender: owner@bugs.x2go.org
X-X2Go-PR-Message: followup 1065
X-X2Go-PR-Package: x2goserver
X-X2Go-PR-Keywords: 
Received: via spool by 1065-submit@bugs.x2go.org id=B1065.147059440330057
          (code B ref 1065); Sun, 07 Aug 2016 18:30:02 +0000
Received: (at 1065) by bugs.x2go.org; 7 Aug 2016 18:26:43 +0000
X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on
	ymir.das-netzwerkteam.de
X-Spam-Level: 
X-Spam-Status: No, score=-2.9 required=3.0 tests=ALL_TRUSTED,BAYES_00,
	URIBL_BLOCKED autolearn=unavailable version=3.3.2
Received: from localhost (localhost [127.0.0.1])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTP id 25A685DE09;
	Sun,  7 Aug 2016 20:26:34 +0200 (CEST)
X-Virus-Scanned: Debian amavisd-new at ymir.das-netzwerkteam.de
Received: from ymir.das-netzwerkteam.de ([127.0.0.1])
	by localhost (ymir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id NVqVbTPpwjIZ; Sun,  7 Aug 2016 20:26:27 +0200 (CEST)
Received: by ymir.das-netzwerkteam.de (Postfix, from userid 1005)
	id CEA855DDCB; Sun,  7 Aug 2016 20:26:26 +0200 (CEST)
From: Mihai Moldovan <ionic@ionic.de>
To: 1065-submitter@bugs.x2go.org
Cc: control@bugs.x2go.org, 1065@bugs.x2go.org
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
X-Mailer: http://snipr.com/post-receive-tag-pending
Message-Id: <20160807182626.CEA855DDCB@ymir.das-netzwerkteam.de>
Date: Sun,  7 Aug 2016 20:26:26 +0200 (CEST)

tag #1065 pending
fixed #1065 4.0.1.20
thanks

Hello,

X2Go issue #1065 (src:x2goserver) reported by you has been
fixed in X2Go Git. You can see the changelog below, and you can
check the diff of the fix at:

    http://code.x2go.org/gitweb?p=x2goserver.git;a=commitdiff;h=39e369d

The issue will most likely be fixed in src:x2goserver (4.0.1.20).

light+love
X2Go Git Admin (on behalf of the sender of this mail)

---
commit 39e369dd08ba3e25263a51fdb230e7e88a13520b
Author: Mihai Moldovan <ionic@ionic.de>
Date:   Sun Aug 7 20:06:53 2016 +0200

    x2goserver/sbin/x2gocleansessions: add Perl documentation and --help, -h, -? and --man options. Fixes: #1065.
    
    Also print a usage message on unknown options.

diff --git a/debian/changelog b/debian/changelog
index c0635e1..a477aaa 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -82,6 +82,9 @@ x2goserver (4.0.1.20-0x2go1) UNRELEASED; urgency=low
       OpenSSH server versions seem to disable the Blowfish cipher by default,
       leading to errors like "Connection reset by peer."
     - x2goserver/bin/x2goruncommand: whitespace only.
+    - x2goserver/sbin/x2gocleansessions: add Perl documentation and --help,
+      -h, -? and --man options. Fixes: #1065. Also print a usage message on
+      unknown options.
   * x2goserver.spec:
     - Add sudo and logcheck as BuildRequires and Requires. Don't own
       directories that are owned by sudo and logcheck. Logcheck is not
