MIR review information for new -dev dependencies
>> golang-github-bmizerany-assert <<
[Availability] In universe
[Rationale] Dependency for golang-github-bmizerany-pat
[Security] No security history
[Quality assurance] Package builds OK and unit tests are executed
[Dependencies] All in main apart from dh-golang
[Standards compliance] OK
[Maintenance] ubuntu-server
>> golang-github-bmizerany-pat <<
[Rationale] Dependency for juju-core
[Dependencies] All in main or covered by this MIR
>> golang-go-dbus <<
>> golang-juju-loggo <<
>> golang-check.v1 <<
[Rationale] Dependency for golang-juju-loggo
>> golang-go.crypto <<
[Availability] In universe.
[Rationale] Dependency of juju-core.
[Security] No history of issues.
This (CVE-2014-7189) crypto bug is on the standard library crypto, not the extension package: <https://code.google.com/p/go/source/detail?r=eae0457c101512f59296538f0162749eba325892&name=release-branch.go1.3>
[Quality assurance] Tests run as part of build process. Some are skipped due to lack of openssh as a build dependency.
[Dependencies] All in main or covered on this MIR
[Standards compliance] Ok.
>> golang-go.net-dev <<
[Quality assurance] Tests run as part of build process. A small number skipped due to lack of root perms or network requirements.
[Dependencies] None.
MIR review information for new -dev dependencies
>> golang- github- bmizerany- assert <<
[Availability]
In universe
[Rationale] github- bmizerany- pat
Dependency for golang-
[Security]
No security history
[Quality assurance]
Package builds OK and unit tests are executed
[Dependencies]
All in main apart from dh-golang
[Standards compliance]
OK
[Maintenance]
ubuntu-server
>> golang- github- bmizerany- pat <<
[Availability]
In universe
[Rationale]
Dependency for juju-core
[Security]
No security history
[Quality assurance]
Package builds OK and unit tests are executed
[Dependencies]
All in main or covered by this MIR
[Standards compliance]
OK
[Maintenance]
ubuntu-server
>> golang-go-dbus <<
[Availability]
In universe
[Rationale]
Dependency for juju-core
[Security]
No security history
[Quality assurance]
Package builds OK and unit tests are executed
[Dependencies]
All in main or covered by this MIR
[Standards compliance]
OK
[Maintenance]
ubuntu-server
>> golang-juju-loggo <<
[Availability]
In universe
[Rationale]
Dependency for juju-core
[Security]
No security history
[Quality assurance]
Package builds OK and unit tests are executed
[Dependencies]
All in main or covered by this MIR
[Standards compliance]
OK
[Maintenance]
ubuntu-server
>> golang-check.v1 <<
[Availability]
In universe
[Rationale]
Dependency for golang-juju-loggo
[Security]
No security history
[Quality assurance]
Package builds OK and unit tests are executed
[Dependencies]
All in main or covered by this MIR
[Standards compliance]
OK
[Maintenance]
ubuntu-server
>> golang-go.crypto <<
[Availability]
In universe.
[Rationale]
Dependency of juju-core.
[Security]
No history of issues.
This (CVE-2014-7189) crypto bug is on the standard library crypto, not the extension package: /code.google. com/p/go/ source/ detail? r=eae0457c10151 2f59296538f0162 749eba325892& name=release- branch. go1.3>
<https:/
[Quality assurance]
Tests run as part of build process. Some are skipped due to lack of openssh as a build dependency.
[Dependencies]
All in main or covered on this MIR
[Standards compliance]
Ok.
[Maintenance]
ubuntu-server
>> golang-go.net-dev <<
[Availability]
In universe.
[Rationale]
Dependency of juju-core.
[Security]
No history of issues.
[Quality assurance]
Tests run as part of build process. A small number skipped due to lack of root perms or network requirements.
[Dependencies]
None.
[Standards compliance]
Ok.
[Maintenance]
ubuntu-server