[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#518081: marked as done (ITP: ssl-cert-check -- proactively handling X.509 certificate expiration)



Your message dated Thu, 31 Mar 2011 11:17:27 +0000
with message-id <E1Q5FsV-0005VA-3i@franck.debian.org>
and subject line Bug#518081: fixed in ssl-cert-check 3.21-1
has caused the Debian Bug report #518081,
regarding ITP: ssl-cert-check -- proactively handling X.509 certificate expiration
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
518081: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518081
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist

*** Please type your report below this line ***

* Package name    : ssl-cert-check
  Version         : 3.15
  Upstream Author : Ryan Matteson <matty91@gmail.com>
* URL             : http://prefetch.net/articles/checkcertificate.html
* License         : GPLv2
  Programming Lang: bash-script
  Description     : proactively handling X.509 certificate expiration

Watches given X.509 certificates for expiration and warns you via eMail.
It can also be used with nagios.

Would be nice to see this in debian.

Chris.


-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)


----------------------------------------------------------------
This message was sent using IMP, the Internet Messaging Program.




--- End Message ---
--- Begin Message ---
Source: ssl-cert-check
Source-Version: 3.21-1

We believe that the bug you reported is fixed in the latest version of
ssl-cert-check, which is due to be installed in the Debian FTP archive:

ssl-cert-check_3.21-1.debian.tar.gz
  to main/s/ssl-cert-check/ssl-cert-check_3.21-1.debian.tar.gz
ssl-cert-check_3.21-1.dsc
  to main/s/ssl-cert-check/ssl-cert-check_3.21-1.dsc
ssl-cert-check_3.21-1_all.deb
  to main/s/ssl-cert-check/ssl-cert-check_3.21-1_all.deb
ssl-cert-check_3.21.orig.tar.gz
  to main/s/ssl-cert-check/ssl-cert-check_3.21.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 518081@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
TANIGUCHI Takaki <takaki@debian.org> (supplier of updated ssl-cert-check package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Fri, 21 Jan 2011 16:45:58 +0900
Source: ssl-cert-check
Binary: ssl-cert-check
Architecture: source all
Version: 3.21-1
Distribution: unstable
Urgency: low
Maintainer: TANIGUCHI Takaki <takaki@debian.org>
Changed-By: TANIGUCHI Takaki <takaki@debian.org>
Description: 
 ssl-cert-check - proactively handling X.509 certificate expiration
Closes: 518081
Changes: 
 ssl-cert-check (3.21-1) unstable; urgency=low
 .
   * Initial release (Closes: #518081)
Checksums-Sha1: 
 86c66e3343899d8b25a649db4a6fe89439ec2707 1721 ssl-cert-check_3.21-1.dsc
 1ce9a369d14566148e6a17972ee6f79bdd8a9072 7108 ssl-cert-check_3.21.orig.tar.gz
 e914423cc7f907bb9019464c145cea012ae6f009 1798 ssl-cert-check_3.21-1.debian.tar.gz
 f227706604383c2260a85dd1c0bfbe947e92130c 8534 ssl-cert-check_3.21-1_all.deb
Checksums-Sha256: 
 84f7af4542fb0959f719ba97ca4a7e7db468289501ff735100f953257c493904 1721 ssl-cert-check_3.21-1.dsc
 b08d81927fd4f48fbc2f654fa7c4345009282a013ca27987bb896113d2a9e4ff 7108 ssl-cert-check_3.21.orig.tar.gz
 00a9d66aba043774505abd2076bb6071ed3d7f5ac53902911d9f40d7d05d4791 1798 ssl-cert-check_3.21-1.debian.tar.gz
 ad025738215cdf4f0a906a4d6b3e4f7666d7094bb1e8e541a680976f0de78ead 8534 ssl-cert-check_3.21-1_all.deb
Files: 
 64cb8bce3291cb8c8a43e5242c48bd3c 1721 net extra ssl-cert-check_3.21-1.dsc
 853253794ac2605867cb062d13306f0d 7108 net extra ssl-cert-check_3.21.orig.tar.gz
 3581e1de7b632f36213e4596385c517c 1798 net extra ssl-cert-check_3.21-1.debian.tar.gz
 3d4a1eb211948de9e59e83db09d663c6 8534 net extra ssl-cert-check_3.21-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=dFtx
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: