[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#288050: marked as done (needs to binary depend on openssl)



Your message dated Fri, 07 Jan 2005 11:34:13 -0500
with message-id <E1Cmx41-0002F9-00@newraff.debian.org>
and subject line Bug#288050: fixed in ssl-cert 1.0-11
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 31 Dec 2004 23:19:32 +0000
>From mh+debian-bugs@zugschlus.de Fri Dec 31 15:19:31 2004
Return-path: <mh+debian-bugs@zugschlus.de>
Received: from d997531.tnib-dsl.net (torres.int.l21.ma.zugschlus.de) [217.151.83.1] (Debian-exim)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CkW3P-0003M6-00; Fri, 31 Dec 2004 15:19:31 -0800
Received: from vash.int.l21.ma.zugschlus.de ([192.168.130.41]:33400 helo=vash.zugschlus.de)
	by torres.int.l21.ma.zugschlus.de with esmtps (TLS-1.0:RSA_AES_128_CBC_SHA:16)
	(Exim 4.43)
	id 1CkW3N-0007LD-3W; Sat, 01 Jan 2005 00:19:29 +0100
Received: from mh by vash.zugschlus.de with local (Exim 4.43)
	id 1CkW3B-0007Im-QU; Sat, 01 Jan 2005 00:19:17 +0100
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Marc Haber <mh+debian-bugs@zugschlus.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: needs to binary depend on openssl
X-Mailer: reportbug 3.5
Date: Sat, 01 Jan 2005 00:19:17 +0100
Message-Id: <E1CkW3B-0007Im-QU@vash.zugschlus.de>
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: ssl-cert
Version: 1.0-10
Severity: serious

the package is missing a binary dependency on openssl, which makes
calls to make-ssl-cert fail on system that do not have openssl
installed.

Greetings
Marc

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-vash
Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1)

Versions of packages ssl-cert depends on:
ii  debconf [debconf-2.0]         1.4.41     Debian configuration management sy

-- debconf information excluded

---------------------------------------
Received: (at 288050-close) by bugs.debian.org; 7 Jan 2005 16:38:04 +0000
>From katie@ftp-master.debian.org Fri Jan 07 08:38:04 2005
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1Cmx7k-0002U5-00; Fri, 07 Jan 2005 08:38:04 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1Cmx41-0002F9-00; Fri, 07 Jan 2005 11:34:13 -0500
From: Thom May <thom@debian.org>
To: 288050-close@bugs.debian.org
X-Katie: $Revision: 1.54 $
Subject: Bug#288050: fixed in ssl-cert 1.0-11
Message-Id: <E1Cmx41-0002F9-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Fri, 07 Jan 2005 11:34:13 -0500
Delivered-To: 288050-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 5

Source: ssl-cert
Source-Version: 1.0-11

We believe that the bug you reported is fixed in the latest version of
ssl-cert, which is due to be installed in the Debian FTP archive:

ssl-cert_1.0-11.dsc
  to pool/main/s/ssl-cert/ssl-cert_1.0-11.dsc
ssl-cert_1.0-11.tar.gz
  to pool/main/s/ssl-cert/ssl-cert_1.0-11.tar.gz
ssl-cert_1.0-11_all.deb
  to pool/main/s/ssl-cert/ssl-cert_1.0-11_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 288050@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thom May <thom@debian.org> (supplier of updated ssl-cert package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri,  7 Jan 2005 16:03:23 +0000
Source: ssl-cert
Binary: ssl-cert
Architecture: source all
Version: 1.0-11
Distribution: unstable
Urgency: low
Maintainer: Debian Apache Maintainers <debian-apache@lists.debian.org>
Changed-By: Thom May <thom@debian.org>
Description: 
 ssl-cert   - Simple debconf wrapper for openssl
Closes: 253810 264655 267188 287307 288050
Changes: 
 ssl-cert (1.0-11) unstable; urgency=low
 .
   * Depend on openssl (Closes: #288050)
   * Update english string to correct grammar (Closes: #253810)
   * Translation updates:
     - German (Closes: #264655)
     - Brazilian (Closes: #267188)
     - Czech (Closes: #287307)
Files: 
 b26079ef9856db79cb9af9ce9e5cf2d6 1283 utils optional ssl-cert_1.0-11.dsc
 089510db7a675577d633ed71f9dff7f2 19762 utils optional ssl-cert_1.0-11.tar.gz
 4b7fdbce90186242d8b02710e7d8b4a5 6904 utils optional ssl-cert_1.0-11_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iQIVAwUBQd62SLVnlGdHP376AQLJEw//WNGQax0t/ld9/fWixgV7AyZztgZfWwDJ
Hogeyk+/FfQQEcFuLdllDmpHva4auwewYzTeb9hYXUCgKpk3IdWjZNhnqeSJ/zOT
Rf7qhvra9LnvRBA9W6yIskosTpfMLDZvhRH70xK6f9K9Ap542HCXFsRNz3bN4sIZ
ox19FrFVjtoHDKMQP+t/FO8US4IKek+iFIyjiW8qkfWCHFXGQDRgtOEf8QlN/uhR
GNKSHgmTnr/G9Ly/aYO4E8htIcxpv7hFriJSrHcKaaJRqgsqrmKGrA0deuB1Xx5C
pwqZAg9LmXs3KkT9Hugw1rwn0YVnVhTB1nzJ5eiME9fFjAu0cylKNWnI0Rgxdkwg
K571H5GgKuodVnC6xgEWbIzGopkSCTXoyXJCEQ2wOAhQWMNG9KNg1HXMwbZuKqDw
KSrKpssWBqDQGvVYJKuq0Ly5fLrKU40Ap3uNHdc3q8AypaSDCf3DagVMuJmz6TdY
7EJy3Jo0jUPgwzXTJmWGkrsSMsA+uk43BxoW1c7Vq+eNZod6iNgnhiTOT/ldQgHj
upNNQLhuD/olhx7wtuBzpnCJlQjMiD3KujQ6zpqNaD2Q2WWxtUuUvaEjlHObDNC4
aMntJFSZmhrGQtvGab4HDr5GKcKCYlpHgf+AYNGWCJe01bVOqphYp7gwAX/FQdx1
ZNzrM1qsfQo=
=kWxM
-----END PGP SIGNATURE-----



Reply to: