Your message dated Wed, 28 Jul 2010 10:38:15 +0000
with message-id <[email protected]>
and subject line Bug#590118: fixed in siege 2.70-1
has caused the Debian Bug report #590118,
regarding siege: New upstream release 2.70
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
590118: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590118
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: siege
Severity: wishlist


Please package it :)


-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.35-rc5-686 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash



--- End Message ---
--- Begin Message ---
Source: siege
Source-Version: 2.70-1

We believe that the bug you reported is fixed in the latest version of
siege, which is due to be installed in the Debian FTP archive:

siege_2.70-1.debian.tar.gz
  to main/s/siege/siege_2.70-1.debian.tar.gz
siege_2.70-1.dsc
  to main/s/siege/siege_2.70-1.dsc
siege_2.70-1_i386.deb
  to main/s/siege/siege_2.70-1_i386.deb
siege_2.70.orig.tar.gz
  to main/s/siege/siege_2.70.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Josue Abarca <[email protected]> (supplier of updated siege package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 27 Jul 2010 12:00:00 -0600
Source: siege
Binary: siege
Architecture: source i386
Version: 2.70-1
Distribution: unstable
Urgency: low
Maintainer: Josue Abarca <[email protected]>
Changed-By: Josue Abarca <[email protected]>
Description: 
 siege      - HTTP regression testing and benchmarking utility
Closes: 590118
Changes: 
 siege (2.70-1) unstable; urgency=low
 .
   * New upstream version (closes: #590118).
   * Remove debian/patches/bombardment.in-fix-arithmetic.diff (merged
     upstream).
   * debian/rules
     - Unnecessary export removed.
     - Build dependency on automake1.9 added.
   * debian/control Standards-Version increased to 3.9.1, no changes
     required.
   * debian/copyright updated.
   * debian/dirs 'usr/bin' removed because it is unnecessary.
   * debian/docs AUTHORS added.
Checksums-Sha1: 
 1e7cfeec92f55f2dc7873a10d275d03c91bc9adb 1182 siege_2.70-1.dsc
 ee0a0c3a9e6559cf8cbaf717649f6684b0d9643a 484608 siege_2.70.orig.tar.gz
 1a9582f9f8a9b0010c542cdec62ddaf428345c90 7340 siege_2.70-1.debian.tar.gz
 7328a865ae6bcd71dd844eda40fafbc7bb5f1c89 88456 siege_2.70-1_i386.deb
Checksums-Sha256: 
 7b6d0bb2e92eec136a9df3501a135635ab05bbb5a9422282ce7a8bf8b240a090 1182 
siege_2.70-1.dsc
 3cb4bcb52a4bee9b35a6b487492c3a8eb20d911d76131e1283ca73ac5d75dd91 484608 
siege_2.70.orig.tar.gz
 f327be3d23a20c41f0d7392d8e9fe6d0a861f557de42698e962ada7aec7f8012 7340 
siege_2.70-1.debian.tar.gz
 c64ee07ab9bd515fe6bf8b961ccfce429b2da1a5ed65462bfa9e485337e39157 88456 
siege_2.70-1_i386.deb
Files: 
 e1bf08b3bc39b5ad1f1e5fb5e254de40 1182 web optional siege_2.70-1.dsc
 835c7a0606851357ebf03084ff546310 484608 web optional siege_2.70.orig.tar.gz
 86e1b5f206676aab5e09cfbd6b15d785 7340 web optional siege_2.70-1.debian.tar.gz
 81c368d0209ffcddbada80c23996335f 88456 web optional siege_2.70-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkxQAxIACgkQ2XA5inpabMcW5gCfcZhbZchdCUdqQSnRDSmlneuQ
gH8AnjQiKs+zqQPVtn/Xds2VAXyi7wec
=iGB3
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to