Your message dated Mon, 25 Jun 2007 19:30:58 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#254999: fixed in openldap2.3 2.3.35-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: slapd
Version: 2.1.30-1
Severity: wishlist



Hello,

I've encountered a problem with slapd under daemontools which should
also affect slapd if running under runit. In postinst, there is an
attempt to start slapd unconditionally using the /etc/init.d/slapd
script which fails if slapd is already running (very likely, slapd is
also not stopped during the upgrade, either). The result is that an
upgrade of slapd fails. If I manually stop slapd, then complete the
upgrade, then restart, everything is fine.

It would be nice if the maintenance scripts could handle such a case,
maybe using a variable like START_SLAPD in /etc/default/slapd, to
minimize downtime.

Thank you!


Best,
--Toni++



-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.4.20-1-686-smp
Locale: LANG=en_US, LC_CTYPE=en_US

Versions of packages slapd depends on:
ii  coreutils [fileutils]       5.0.91-2     The GNU core utilities
ii  debconf                     1.4.21       Debian configuration management sy
ii  fileutils                   5.0.91-2     The GNU file management utilities 
ii  libc6                       2.3.2.ds1-11 GNU C Library: Shared libraries an
ii  libdb4.2                    4.2.52-16    Berkeley v4.2 Database Libraries [
ii  libgcrypt7                  1.1.90-1.1   LGPL Crypto library - runtime libr
ii  libgnutls10                 1.0.4-3      GNU TLS library - runtime library
ii  libgpg-error0               0.7-1        library for common error values an
ii  libiodbc2                   3.51.2-2     iODBC Driver Manager
ii  libldap2                    2.1.29-2     OpenLDAP libraries
ii  libltdl3                    1.5.2-2      A system independent dlopen wrappe
ii  libsasl2                    2.1.18-1     Authentication abstraction library
ii  libslp1                     1.0.11-7     OpenSLP libraries
ii  libtasn1-2                  0.2.7-1      Manage ASN.1 structures (runtime)
ii  libwrap0                    7.6-ipv6.1-3 Wietse Venema's TCP wrappers libra
ii  perl [libmime-base64-perl]  5.8.3-3      Larry Wall's Practical Extraction 
ii  psmisc                      21.4-1       Utilities that use the proc filesy
ii  zlib1g                      1:1.2.1-5    compression library - runtime

-- debconf information excluded


--- End Message ---
--- Begin Message ---
Source: openldap2.3
Source-Version: 2.3.35-2

We believe that the bug you reported is fixed in the latest version of
openldap2.3, which is due to be installed in the Debian FTP archive:

ldap-utils_2.3.35-2_i386.deb
  to pool/main/o/openldap2.3/ldap-utils_2.3.35-2_i386.deb
libldap-2.3-0-dbg_2.3.35-2_i386.deb
  to pool/main/o/openldap2.3/libldap-2.3-0-dbg_2.3.35-2_i386.deb
libldap-2.3-0_2.3.35-2_i386.deb
  to pool/main/o/openldap2.3/libldap-2.3-0_2.3.35-2_i386.deb
openldap2.3_2.3.35-2.diff.gz
  to pool/main/o/openldap2.3/openldap2.3_2.3.35-2.diff.gz
openldap2.3_2.3.35-2.dsc
  to pool/main/o/openldap2.3/openldap2.3_2.3.35-2.dsc
slapd-dbg_2.3.35-2_i386.deb
  to pool/main/o/openldap2.3/slapd-dbg_2.3.35-2_i386.deb
slapd_2.3.35-2_i386.deb
  to pool/main/o/openldap2.3/slapd_2.3.35-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Russ Allbery <[EMAIL PROTECTED]> (supplier of updated openldap2.3 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 11 Jun 2007 20:26:26 -0700
Source: openldap2.3
Binary: slapd ldap-utils libldap-2.3-0-dbg libldap-2.3-0 slapd-dbg
Architecture: source i386
Version: 2.3.35-2
Distribution: unstable
Urgency: low
Maintainer: Debian OpenLDAP Maintainers <[EMAIL PROTECTED]>
Changed-By: Russ Allbery <[EMAIL PROTECTED]>
Description: 
 ldap-utils - OpenLDAP utilities
 libldap-2.3-0 - OpenLDAP libraries
 libldap-2.3-0-dbg - Debugging information for OpenLDAP libraries
 slapd      - OpenLDAP server (slapd)
 slapd-dbg  - Debugging information for the OpenLDAP server (slapd)
Closes: 205010 225896 227482 245341 254999 403948 408987 412017 412575 427245
Changes: 
 openldap2.3 (2.3.35-2) unstable; urgency=low
 .
   * Enable LAN Manager password support in slapd.  (Closes: #245341)
   * If automatic configuration is selected and slapd.conf doesn't exist
     during an upgrade, treat this as a fresh installation rather than
     aborting with an error.  Also try to provide a better error message if
     the user has deleted /etc/ldap/schema but we just generated a new
     configuration that references it.  These cases can occur if someone
     removes (rather than purges) the package, manually deletes /etc/ldap,
     and then reinstalls.  (Closes: #205010)
   * Don't fail in slapd's postrm if /etc/ldap/schema has already been
     deleted.
   * Remove slapd conflicts with libbind-dev and bind-dev.  There no longer
     appears to be anything in those packages that would break slapd's
     resolver.  (Closes: #225896)
   * Add libldap-2.3-0-dbg and slapd-dbg packages with detached debugging
     information.
   * db_recover is no longer required after changing DB_CONFIG; slapd now
     detects changes itself and does the right thing.  Also note in
     README.DB_CONFIG the existence of the dbconfig slapd.conf parameter
     and slapd's DB_CONFIG writing support.  (Closes: #412575)
   * Add options to /etc/default/slapd to let the system administrator tell
     the init script to not start slapd on boot.  (Closes: #254999)
   * Redirect fd 3 to /dev/null in the slapd init script for additional
     robustness when debconf is running.  (Closes: #227482)
   * Add to /etc/default/slapd a commented-out example of how to change the
     keytab file used for GSSAPI authentication.  (Closes: #412017)
   * Use variables in /etc/init.d/slapd for the paths to slapd and slurpd
     so that someone who really wants to can override them in
     /etc/default/slapd.  (Closes: #403948)
   * Allow people building packages for outside Debian to skip the checks
     for non-DFSG-free material by setting a variable. Thanks, Peter
     Marschall.  (Closes: #427245)
   * Remove duplicate libldap-2.3-0 dependencies.  (Closes: #408987)
   * Use binary:Version instead of Source-Version for the tight
     dependencies between slapd and ldap-utils and libldap-2.3-0.
Files: 
 330138af63b52443162a7bc9c919d208 1233 net optional openldap2.3_2.3.35-2.dsc
 f8db8f6d708ffe7a337d0e96398bd276 152804 net optional 
openldap2.3_2.3.35-2.diff.gz
 32322a30de06b70d1dcedf2fa2ffdada 1205176 net optional slapd_2.3.35-2_i386.deb
 13f104d17636ef91bbe92c0cf78715ed 152916 net optional 
ldap-utils_2.3.35-2_i386.deb
 f46537a78bc46a1c105df26e3bad1dae 313008 libs optional 
libldap-2.3-0_2.3.35-2_i386.deb
 20fd393d0edd0742ae79166b0750907b 565356 libdevel extra 
libldap-2.3-0-dbg_2.3.35-2_i386.deb
 1896430bcb3aa4d8771d2a98f45f2f95 3009458 net extra slapd-dbg_2.3.35-2_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGbhme+YXjQAr8dHYRAnOaAKDGLeaAUAOZZspUZ1kY5+wxq9qGpQCdFUSw
QHwy1lFMBF+a+ku00QB6zD0=
=j7wK
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to