[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#693792: marked as done (ITP: ocproxy -- lwip based proxy for openconnect)



Your message dated Wed, 17 Sep 2014 04:00:41 +0000
with message-id <E1XU6Q5-0004Da-BA@franck.debian.org>
and subject line Bug#693792: fixed in ocproxy 1.50-1
has caused the Debian Bug report #693792,
regarding ITP: ocproxy -- lwip based proxy for openconnect
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
693792: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693792
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: David Edmondson <dme@dme.org>

* Package name    : ocproxy
  Version         : 0.9
  Upstream Author : David Edmondson <dme@dme.org>
* URL             : http://dme.org/ocproxy
* License         : BSD
  Programming Lang: C
  Description     : lwip based proxy for openconnect

ocproxy is a user-level SOCKS and port-forwarding proxy for use with
openconnect. It allows openconnect to be used by a non-system
administrator and does not require the use of tunnel devices.

--- End Message ---
--- Begin Message ---
Source: ocproxy
Source-Version: 1.50-1

We believe that the bug you reported is fixed in the latest version of
ocproxy, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 693792@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kevin Cernekee <cernekee@gmail.com> (supplier of updated ocproxy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 06 Jul 2014 12:39:40 -0700
Source: ocproxy
Binary: ocproxy
Architecture: source amd64
Version: 1.50-1
Distribution: unstable
Urgency: low
Maintainer: Kevin Cernekee <cernekee@gmail.com>
Changed-By: Kevin Cernekee <cernekee@gmail.com>
Description:
 ocproxy    - SOCKS proxy for openconnect
Closes: 693792
Changes:
 ocproxy (1.50-1) unstable; urgency=low
 .
   * Initial release. (Closes: #693792)
Checksums-Sha1:
 34a61cb799b6b20f0367332d6f7a7447f64a4122 1869 ocproxy_1.50-1.dsc
 269b1256d4cfc3cd9dc52dad37a2e4f265261656 967273 ocproxy_1.50.orig.tar.gz
 f2797336f26b4102ef35e5cb1b0b3599eaf98983 2216 ocproxy_1.50-1.debian.tar.xz
 1fe84e613c6caf981dda010e24fcd456df298ee7 45118 ocproxy_1.50-1_amd64.deb
Checksums-Sha256:
 07c80bee6cd3ab82286c4f894ec9dcf715ff7a2f88882b935b26ae50976ccee6 1869 ocproxy_1.50-1.dsc
 b061d59e0b5729d7a8950d8d4e0004a9739c092a4d5daf58a3bc61b177b24e4f 967273 ocproxy_1.50.orig.tar.gz
 7207610fb5cf26a3fed41e64e0c3be5ec790956f65bc7d844f8a9c53a3966dd7 2216 ocproxy_1.50-1.debian.tar.xz
 a88ca36255fa2815d3e49430493f140acb19232d23e4bec9793a907949ffb597 45118 ocproxy_1.50-1_amd64.deb
Files:
 929a6bd4038ae96bb3517f3554e769d9 45118 net optional ocproxy_1.50-1_amd64.deb
 b693078752d9d4c395c0eaa939f1c00e 1869 net optional ocproxy_1.50-1.dsc
 273ed39982b5e4b54789849d6e0e7713 967273 net optional ocproxy_1.50.orig.tar.gz
 a408d1ad1e1718606f1d670f37c6fd0c 2216 net optional ocproxy_1.50-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=kr4v
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: