Your message dated Fri, 07 Jan 2005 11:34:13 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#288050: fixed in ssl-cert 1.0-11 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 31 Dec 2004 23:19:32 +0000 >From [EMAIL PROTECTED] Fri Dec 31 15:19:31 2004 Return-path: <[EMAIL PROTECTED]> Received: from d997531.tnib-dsl.net (torres.int.l21.ma.zugschlus.de) [217.151.83.1] (Debian-exim) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CkW3P-0003M6-00; Fri, 31 Dec 2004 15:19:31 -0800 Received: from vash.int.l21.ma.zugschlus.de ([192.168.130.41]:33400 helo=vash.zugschlus.de) by torres.int.l21.ma.zugschlus.de with esmtps (TLS-1.0:RSA_AES_128_CBC_SHA:16) (Exim 4.43) id 1CkW3N-0007LD-3W; Sat, 01 Jan 2005 00:19:29 +0100 Received: from mh by vash.zugschlus.de with local (Exim 4.43) id 1CkW3B-0007Im-QU; Sat, 01 Jan 2005 00:19:17 +0100 Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Marc Haber <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: needs to binary depend on openssl X-Mailer: reportbug 3.5 Date: Sat, 01 Jan 2005 00:19:17 +0100 Message-Id: <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: ssl-cert Version: 1.0-10 Severity: serious the package is missing a binary dependency on openssl, which makes calls to make-ssl-cert fail on system that do not have openssl installed. Greetings Marc -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.10-vash Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1) Versions of packages ssl-cert depends on: ii debconf [debconf-2.0] 1.4.41 Debian configuration management sy -- debconf information excluded --------------------------------------- Received: (at 288050-close) by bugs.debian.org; 7 Jan 2005 16:38:04 +0000 >From [EMAIL PROTECTED] Fri Jan 07 08:38:04 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1Cmx7k-0002U5-00; Fri, 07 Jan 2005 08:38:04 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1Cmx41-0002F9-00; Fri, 07 Jan 2005 11:34:13 -0500 From: Thom May <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.54 $ Subject: Bug#288050: fixed in ssl-cert 1.0-11 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Fri, 07 Jan 2005 11:34:13 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 5 Source: ssl-cert Source-Version: 1.0-11 We believe that the bug you reported is fixed in the latest version of ssl-cert, which is due to be installed in the Debian FTP archive: ssl-cert_1.0-11.dsc to pool/main/s/ssl-cert/ssl-cert_1.0-11.dsc ssl-cert_1.0-11.tar.gz to pool/main/s/ssl-cert/ssl-cert_1.0-11.tar.gz ssl-cert_1.0-11_all.deb to pool/main/s/ssl-cert/ssl-cert_1.0-11_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thom May <[EMAIL PROTECTED]> (supplier of updated ssl-cert package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Fri, 7 Jan 2005 16:03:23 +0000 Source: ssl-cert Binary: ssl-cert Architecture: source all Version: 1.0-11 Distribution: unstable Urgency: low Maintainer: Debian Apache Maintainers <debian-apache@lists.debian.org> Changed-By: Thom May <[EMAIL PROTECTED]> Description: ssl-cert - Simple debconf wrapper for openssl Closes: 253810 264655 267188 287307 288050 Changes: ssl-cert (1.0-11) unstable; urgency=low . * Depend on openssl (Closes: #288050) * Update english string to correct grammar (Closes: #253810) * Translation updates: - German (Closes: #264655) - Brazilian (Closes: #267188) - Czech (Closes: #287307) Files: b26079ef9856db79cb9af9ce9e5cf2d6 1283 utils optional ssl-cert_1.0-11.dsc 089510db7a675577d633ed71f9dff7f2 19762 utils optional ssl-cert_1.0-11.tar.gz 4b7fdbce90186242d8b02710e7d8b4a5 6904 utils optional ssl-cert_1.0-11_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (GNU/Linux) iQIVAwUBQd62SLVnlGdHP376AQLJEw//WNGQax0t/ld9/fWixgV7AyZztgZfWwDJ Hogeyk+/FfQQEcFuLdllDmpHva4auwewYzTeb9hYXUCgKpk3IdWjZNhnqeSJ/zOT Rf7qhvra9LnvRBA9W6yIskosTpfMLDZvhRH70xK6f9K9Ap542HCXFsRNz3bN4sIZ ox19FrFVjtoHDKMQP+t/FO8US4IKek+iFIyjiW8qkfWCHFXGQDRgtOEf8QlN/uhR GNKSHgmTnr/G9Ly/aYO4E8htIcxpv7hFriJSrHcKaaJRqgsqrmKGrA0deuB1Xx5C pwqZAg9LmXs3KkT9Hugw1rwn0YVnVhTB1nzJ5eiME9fFjAu0cylKNWnI0Rgxdkwg K571H5GgKuodVnC6xgEWbIzGopkSCTXoyXJCEQ2wOAhQWMNG9KNg1HXMwbZuKqDw KSrKpssWBqDQGvVYJKuq0Ly5fLrKU40Ap3uNHdc3q8AypaSDCf3DagVMuJmz6TdY 7EJy3Jo0jUPgwzXTJmWGkrsSMsA+uk43BxoW1c7Vq+eNZod6iNgnhiTOT/ldQgHj upNNQLhuD/olhx7wtuBzpnCJlQjMiD3KujQ6zpqNaD2Q2WWxtUuUvaEjlHObDNC4 aMntJFSZmhrGQtvGab4HDr5GKcKCYlpHgf+AYNGWCJe01bVOqphYp7gwAX/FQdx1 ZNzrM1qsfQo= =kWxM -----END PGP SIGNATURE-----