Your message dated Sat, 08 Dec 2007 07:40:02 -0200 with message-id <878x45plsd.fsf@lab.ossystems.com.br> and subject line Already implemented has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: HTTPS support (Progeny)
- From: Jeff Licquia <licquia@progeny.com>
- Date: 30 Sep 2003 11:07:34 -0500
- Message-id: <1064938052.1005.3.camel@laptop2.internal.licquia.org>
Package: apt Version: 0.5.9 Severity: wishlist Tags: patch (Patch sent separately; a previous version of this message, with the patch, was bounced by the bug mail server.) Here is the Progeny version of the patch to add SSL support to apt. This patch is derived from the work of Tomas Pospisek <tpo@sourcepole.ch>. Our main innovation is to merge the http and https methods into one binary, with https as a symlink to http. This was done so that redirects could be made from http to https and vice versa. (See our other patches for the redirect/auth patch.) One important consideration: there may be some confusion on our part regarding the license. Tomas seemed to have received permission to link OpenSSL with apt, but the only documentation of this is in Tomas's patch itself, and there's some question as to whether the license grant was legit. If there is a problem, we will implement GNU TLS right away, as we are distributing binaries of this patch now. Another concern that I've heard: binding SSL support so tightly to apt, and thus adding another dependency to the base system. I'm open to ideas regarding this problem if it's considered important. This patch is against vanilla apt 0.5.9. We can also produce patches against our redirect/auth and cookie version of 0.5.9, or can migrate to newer apt versions, as needed.
--- End Message ---
--- Begin Message ---
- To: 213465-done@bugs.debian.org
- Subject: Already implemented
- From: Otavio Salvador <otavio@debian.org>
- Date: Sat, 08 Dec 2007 07:40:02 -0200
- Message-id: <878x45plsd.fsf@lab.ossystems.com.br>
Version: 0.7.0 This has been implemented in a previous version of APT and we forgot to close this bug. I'm doing it right now. Thank you -- O T A V I O S A L V A D O R --------------------------------------------- E-mail: otavio@debian.org UIN: 5906116 GNU/Linux User: 239058 GPG ID: 49A5F855 Home Page: http://otavio.ossystems.com.br --------------------------------------------- "Microsoft sells you Windows ... Linux gives you the whole house."
--- End Message ---