Your message dated Tue, 22 Jan 2008 11:32:04 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#461425: fixed in nulog 2.0.dfsg.1-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: nulog
Version: 2.0~rc2-1
Severity: important

please add a depency with the python-ipy package.


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.23-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages nulog depends on:
ii  python                        2.4.4-6    An interactive high-level object-o
ii  python-cairo                  1.4.12-1   Python bindings for the Cairo vect
ii  python-matplotlib             0.90.1-2   python based plotting system in a 
ii  python-mysqldb                1.2.2-5    A Python interface to MySQL
ii  python-nevow                  0.9.29-1   Web application templating system 
ii  python-numpy                  1:1.0.4-5  Numerical Python adds a fast array
ii  python-soappy                 0.12.0-2   SOAP Support for Python
ii  python-support                0.7.6      automated rebuilding support for p
ii  python-twisted-web            0.7.0-1    An HTTP protocol implementation to

nulog recommends no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: nulog
Source-Version: 2.0.dfsg.1-1

We believe that the bug you reported is fixed in the latest version of
nulog, which is due to be installed in the Debian FTP archive:

nulog_2.0.dfsg.1-1.diff.gz
  to pool/main/n/nulog/nulog_2.0.dfsg.1-1.diff.gz
nulog_2.0.dfsg.1-1.dsc
  to pool/main/n/nulog/nulog_2.0.dfsg.1-1.dsc
nulog_2.0.dfsg.1-1_all.deb
  to pool/main/n/nulog/nulog_2.0.dfsg.1-1_all.deb
nulog_2.0.dfsg.1.orig.tar.gz
  to pool/main/n/nulog/nulog_2.0.dfsg.1.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Pierre Chifflier <[EMAIL PROTECTED]> (supplier of updated nulog package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 22 Jan 2008 12:02:50 +0100
Source: nulog
Binary: nulog
Architecture: source all
Version: 2.0.dfsg.1-1
Distribution: unstable
Urgency: low
Maintainer: Pierre Chifflier <[EMAIL PROTECTED]>
Changed-By: Pierre Chifflier <[EMAIL PROTECTED]>
Description: 
 nulog      - Graphical firewall log analysis interface
Closes: 461425
Changes: 
 nulog (2.0.dfsg.1-1) unstable; urgency=low
 .
   * New upstream release
   * Re-package original tarball to exclude non-free docs
   * Add dependency on python-ipy (Closes: #461425)
Files: 
 5a880478f839ab13ac120d684f219f12 699 net extra nulog_2.0.dfsg.1-1.dsc
 abc534ac77fa43e03df832f303c91eb0 509834 net extra nulog_2.0.dfsg.1.orig.tar.gz
 bd1e9d2125ce049d2d74f961273d5706 424 net extra nulog_2.0.dfsg.1-1.diff.gz
 723d8042519993eae1a41cf8548abc14 812292 net extra nulog_2.0.dfsg.1-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHlc13twVrWo1fQMsRAibLAJ90VEIjR8WWmWIwQbsq4TA4oIJn1QCdHF+X
IDg5fNgpYNUlCYveEk6EQq4=
=CcPE
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to