[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#245825: marked as done (ITP: newpki-server -- PKI based on the OpenSSL low-level API (server package))

Your message dated Fri, 05 Aug 2005 14:58:48 -0700
with message-id <E1E1ADI-0003n6-00@spohr.debian.org>
and subject line Bug#245825: fixed in newpki-server 2.0.0+beta4-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

Received: (at submit) by bugs.debian.org; 25 Apr 2004 16:11:25 +0000
>From moz@gmx.fr Sun Apr 25 09:11:25 2004
Return-path: <moz@gmx.fr>
Received: from l01v-48-183.d1.club-internet.fr (moz-laptop) [] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1BHmE0-0004Mq-00; Sun, 25 Apr 2004 09:11:25 -0700
Received: from moz by moz-laptop with local (Exim 3.36 #1 (Debian))
	id 1BHm4S-0007hf-00; Sun, 25 Apr 2004 18:01:32 +0200
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Thomas <moz@gmx.fr>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: ITP: newpki-server -- PKI based on the OpenSSL low-level API (server package)
X-Mailer: reportbug 2.58
Date: Sun, 25 Apr 2004 18:01:31 +0200
X-Debbugs-Cc: debian-devel@lists.debian.org
Message-Id: <E1BHm4S-0007hf-00@moz-laptop>
Sender: Thomas <moz@moz-laptop>
X-BadReturnPath: moz@moz-laptop rewritten as moz@gmx.fr
  using "From" header
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-10.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
	X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2004_03_25
X-CrossAssassin-Score: 1

Package: wnpp
Severity: wishlist

* Package name    : newpki-server
  Version         : 2.0.0-beta3
  Upstream Author : Frederic Giudicelli
* URL             : http://www.newpki.org/
* License         : GPL
  Description     : PKI based on the OpenSSL low-level API (server package)

Public Key Infrastructure (PKI) are designed to manage certificates
 on a long term. All the data are handled through a MySQL database, 
 which provides a much more flexible PKI than with OpenSSL, such as 
 seeking a certificate with a search engine.
 The actual version is able to handle multiple Certificate Authorities
 in one server, to publish a certificate request from a Certificate
 Signing Request, to certify a request, to revoke a certificate and to 
 manage one or more Certificate Revocation Lists. It also able to search
 for the waiting requests or certificates, to respond to OCSP requests
 and to seek in and publish to LDAP Directory.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.4.24
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8

Received: (at 245825-close) by bugs.debian.org; 5 Aug 2005 22:00:34 +0000
>From joerg@spohr.debian.org Fri Aug 05 15:00:33 2005
Return-path: <joerg@spohr.debian.org>
Received: from joerg by spohr.debian.org with local (Exim 3.36 1 (Debian))
	id 1E1ADI-0003n6-00; Fri, 05 Aug 2005 14:58:48 -0700
From: Pierre Chifflier <chifflier@cpe.fr>
To: 245825-close@bugs.debian.org
X-Katie: lisa $Revision: 1.30 $
Subject: Bug#245825: fixed in newpki-server 2.0.0+beta4-1
Message-Id: <E1E1ADI-0003n6-00@spohr.debian.org>
Sender: Joerg Jaspert <joerg@spohr.debian.org>
Date: Fri, 05 Aug 2005 14:58:48 -0700
Delivered-To: 245825-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: newpki-server
Source-Version: 2.0.0+beta4-1

We believe that the bug you reported is fixed in the latest version of
newpki-server, which is due to be installed in the Debian FTP archive:

  to pool/main/n/newpki-server/newpki-server_2.0.0+beta4-1.diff.gz
  to pool/main/n/newpki-server/newpki-server_2.0.0+beta4-1.dsc
  to pool/main/n/newpki-server/newpki-server_2.0.0+beta4-1_i386.deb
  to pool/main/n/newpki-server/newpki-server_2.0.0+beta4.orig.tar.gz

A summary of the changes between this version and the previous one is

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 245825@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
Pierre Chifflier <chifflier@cpe.fr> (supplier of updated newpki-server package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)

Hash: SHA1

Format: 1.7
Date: Thu,  9 Jun 2005 11:23:43 +0200
Source: newpki-server
Binary: newpki-server
Architecture: source i386
Version: 2.0.0+beta4-1
Distribution: unstable
Urgency: low
Maintainer: Pierre Chifflier <chifflier@cpe.fr>
Changed-By: Pierre Chifflier <chifflier@cpe.fr>
 newpki-server - PKI based on the OpenSSL low-level API (server package)
Closes: 245825
 newpki-server (2.0.0+beta4-1) unstable; urgency=low
   * Initial Release (Closes: #245825)
 d820a6f21abd8fb42090631e9dc1c72d 669 net optional newpki-server_2.0.0+beta4-1.dsc
 dd4d1f3602261bc86ba72b78648ec647 686378 net optional newpki-server_2.0.0+beta4.orig.tar.gz
 5a1d8bd19995d815d4534e7b3146b5dd 14250 net optional newpki-server_2.0.0+beta4-1.diff.gz
 f1ba20192f52dbcb34ccdb618c99a61e 346022 net optional newpki-server_2.0.0+beta4-1_i386.deb

Version: GnuPG v1.4.1 (GNU/Linux)


Reply to: