Your message dated Mon, 12 Feb 2024 03:10:15 +0000
with message-id <e1rzmhz-009v2l...@fasolo.debian.org>
and subject line Bug#1061583: fixed in libapache2-mod-sts 3.4.0-1
has caused the Debian Bug report #1061583,
regarding ITP: libapache2-mod-sts -- security token exchange module for Apache 2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1061583: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061583
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Robin Gustafsson <rg...@debian.org>
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name    : libapache2-mod-sts
  Version         : 3.4.0
  Upstream Contact: Hans Zandbelt <hans.zandb...@openidc.com>
* URL             : https://github.com/OpenIDC/mod_sts
* License         : AGPL-3+
  Programming Lang: C
  Description     : security token exchange module for Apache 2

A security token exchange module for Apache HTTP Server 2.x which allows for
exchanging arbitrary security tokens by calling into a remote Security Token
Service (STS).

This Apache module allows for exchanging a security token (aka. "source
token") that is presented on an incoming HTTP request for another security
token (aka. "target token") by calling into a Security Token Service (STS) and
then include that target token on the propagated HTTP request to the content
or origin server.


I use this program and I have not found another that can replace it.

I intend to maintain it myself but am open to co-maintainers, team maintenance
and low threshold NMUs.

--- End Message ---
--- Begin Message ---
Source: libapache2-mod-sts
Source-Version: 3.4.0-1
Done: Robin Gustafsson <rg...@debian.org>

We believe that the bug you reported is fixed in the latest version of
libapache2-mod-sts, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1061...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Robin Gustafsson <rg...@debian.org> (supplier of updated libapache2-mod-sts 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 26 Jan 2024 23:27:25 +0100
Source: libapache2-mod-sts
Binary: libapache2-mod-sts libapache2-mod-sts-dbgsym
Architecture: source amd64
Version: 3.4.0-1
Distribution: unstable
Urgency: medium
Maintainer: Robin Gustafsson <rg...@debian.org>
Changed-By: Robin Gustafsson <rg...@debian.org>
Description:
 libapache2-mod-sts - security token exchange module for Apache 2
Closes: 1061583
Changes:
 libapache2-mod-sts (3.4.0-1) unstable; urgency=medium
 .
   * Initial release (Closes: #1061583)
Checksums-Sha1:
 71aa6369611d91d237b514d3fd280e8ba3e0d5c9 2062 libapache2-mod-sts_3.4.0-1.dsc
 c000ece3e08d05445c6a84cdb3a15b6006dd8bce 371638 
libapache2-mod-sts_3.4.0.orig.tar.gz
 bb1b5f70c25d3035eded362e4440f0ffa0b9fb36 13868 
libapache2-mod-sts_3.4.0-1.debian.tar.xz
 d7d4b233b6b6280d8b846d8c4c6cca0e52fb6b5a 38580 
libapache2-mod-sts-dbgsym_3.4.0-1_amd64.deb
 09434d73aedc38cb58cfdce68de6f029cd2cc725 8828 
libapache2-mod-sts_3.4.0-1_amd64.buildinfo
 2ee8cc601c403a987789636340c05444f8f2bd74 30728 
libapache2-mod-sts_3.4.0-1_amd64.deb
Checksums-Sha256:
 17ae59b5ad90759444a415acd423e0ea2858c1d7045d3c5d0246be333d0feefe 2062 
libapache2-mod-sts_3.4.0-1.dsc
 878d858a6033cd99f34955a87e2174396eae075d572c05ba5a87299902be02e6 371638 
libapache2-mod-sts_3.4.0.orig.tar.gz
 e262f61efc0e3a6ae708f696d5ab5c9af6413a0afe24a05a4f2263acc67d3ccb 13868 
libapache2-mod-sts_3.4.0-1.debian.tar.xz
 d582bdca10efedd399e2813f9461257bb0e03bf115066cfc2d649e86cca9d99a 38580 
libapache2-mod-sts-dbgsym_3.4.0-1_amd64.deb
 4738ad2900befc0db4922ed3ad4bd6f5aaf1ea210a8eaeca41f25aa14e753259 8828 
libapache2-mod-sts_3.4.0-1_amd64.buildinfo
 e232a33cb6f76f956254dda3c7569aa45a14f922aa1c1a3b10a5678f2ec89f85 30728 
libapache2-mod-sts_3.4.0-1_amd64.deb
Files:
 963c17369a4dba99b8793b6d96c216af 2062 httpd optional 
libapache2-mod-sts_3.4.0-1.dsc
 a1a790e66b974074d8585fec707ed9b7 371638 httpd optional 
libapache2-mod-sts_3.4.0.orig.tar.gz
 e7ec40acff3f99617ffb2633592c8504 13868 httpd optional 
libapache2-mod-sts_3.4.0-1.debian.tar.xz
 696907e318b2f50656c2067088133edf 38580 debug optional 
libapache2-mod-sts-dbgsym_3.4.0-1_amd64.deb
 66c641b7f758c25a4df329a371dc4b4d 8828 httpd optional 
libapache2-mod-sts_3.4.0-1_amd64.buildinfo
 98b4be5810c3c998249ef0cc5b6ee625 30728 httpd optional 
libapache2-mod-sts_3.4.0-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
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=FVCS
-----END PGP SIGNATURE-----

Attachment: pgpsXS5AbhuXP.pgp
Description: PGP signature


--- End Message ---

Reply via email to