Your message dated Fri, 24 Oct 2008 11:59:44 -0600 with message-id <E1KtQwq-0006Fb-Pw@merkel.debian.org> and subject line WNPP bug closing has caused the Debian Bug report #447263, regarding RFP: iceweasel-tamperdata -- extension to track and modify http/https requests for the Iceweasel web browser to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 447263: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447263 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: RFP: iceweasel-tamperdata -- extension to track and modify http/https requests for the Iceweasel web browser
- From: Pierre THIERRY <nowhere.man@levallois.eu.org>
- Date: Fri, 19 Oct 2007 16:06:16 +0200
- Message-id: <20071019140616.GA15383@(none)>
Package: wnpp Severity: wishlist * Package name : iceweasel-tamperdata Version : 9.8.1 Upstream Author : Adam Judson <adamsplugins@gmail.com> * URL : http://tamperdata.mozdev.org/ * License : GPL Programming Lang: XUL, JS Description : extension to track and modify http/https requests for the Iceweasel web browser Use tamperdata to view and modify HTTP/HTTPS headers and post parameters. Trace and time http response/requests. Security test web applications by modifying POST parameters. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (990, 'testing'), (502, 'stable'), (501, 'unstable'), (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.21-2-686 (SMP w/1 CPU core) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -- nowhere.man@levallois.eu.org OpenPGP 0xD9D50D8AAttachment: signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
- To: 447263-done@bugs.debian.org
- Subject: WNPP bug closing
- From: David Moreno Garza <damog@merkel.debian.org>
- Date: Fri, 24 Oct 2008 11:59:44 -0600
- Message-id: <E1KtQwq-0006Fb-Pw@merkel.debian.org>
Hello, This is an automatic mail sent to close the RFP you have reported or are involved with. Your RFP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the RFP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail control@bugs.debian.org with a body text like this: reopen 447263 stop Further comments on the work done in the bug sent to 447263@bugs.debian.org would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: <damog@debian.org>. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza <damog@debian.org>.
--- End Message ---