Your message dated Tue, 09 Feb 2016 17:37:08 +0000
with message-id <[email protected]>
and subject line Bug#811347: fixed in xca 1.3.2-1
has caused the Debian Bug report #811347,
regarding newer 1.3.2 debian package available for review
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
811347: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=811347
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: xca
Version: 1.0.0-2.1
Severity: wishlist
Greetings Tino.
I've put together a newer 1.3.2 version of xca and uploaded it to
mentors.debian.net for review:
http://mentors.debian.net/package/xca
This package would close #706539 and also adds a patch for adding back
CPPLFAGS dpkg-buildflags to Rules.mak which otherwise resets CPPFLAGS.
It would be great if you could take a look. I'm also willing to further
collaborate on the xca package if you're interested.
Thanks.
-- Chris
--
Chris Knadle (DM)
[email protected]
signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
Source: xca
Source-Version: 1.3.2-1
We believe that the bug you reported is fixed in the latest version of
xca, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Tino Mettler <[email protected]> (supplier of updated xca package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 01 Feb 2016 13:42:22 +0100
Source: xca
Binary: xca
Architecture: source
Version: 1.3.2-1
Distribution: unstable
Urgency: medium
Maintainer: Tino Mettler <[email protected]>
Changed-By: Tino Mettler <[email protected]>
Closes: 706539 811347
Description:
xca - x509 Certification Authority management tool based on QT4
Changes:
xca (1.3.2-1) unstable; urgency=medium
.
* New upstream release (Closes: #706539, #811347)
* Switch to dh build
* Remove menu file, according to #741573
* Bump standards version to 3.9.6, no changes needed
Thanks to Chris Knadle for double checking.
* Add 0001-Use-Debian-specific-CPPFLAGS.patch to use hardening flags
Thanks to Chris Knadle for the suggestion. This also replaces the
change from the previous NMU.
* Add 0002-Fix-spelling-errors-found-by-lintian-packge-checker.patch
provided by Chris Knadle
* Drop 0001-Fix-undefined-reference-to-symbol-__cxa_free_excepti.patch
as upstream now uses g++ for linking
* Drop 0002-RedHat-Bug-1164340-segfault-when-viewing-a-RHEL-enti.patch
which was included upstream
Checksums-Sha1:
e465cc6cd252aa6728d9cddf3138d11ab9fcd486 1929 xca_1.3.2-1.dsc
dda8fb751f61437cd89e32ccce5fe6111e3c847e 897947 xca_1.3.2.orig.tar.gz
f1c597511f3b7caea75b91ecd38b16aebd392c24 6188 xca_1.3.2-1.debian.tar.xz
Checksums-Sha256:
c76eaf39d58fbf593db83116bf74ebd063e9f6fe178a49ca78a1ed0227c3dffb 1929
xca_1.3.2-1.dsc
04f11f2148c8369c1a1b4e109956ed8cc807ec266d0d936410624ba8ee4b5ce4 897947
xca_1.3.2.orig.tar.gz
ab8d4e1c0e8d818eaeebb07e23d76fe96951bf9d92e371355b05e361a65e5fae 6188
xca_1.3.2-1.debian.tar.xz
Files:
1fd8c005e57650cd1207dff47065c417 1929 x11 optional xca_1.3.2-1.dsc
f9528164f46a78c7a2373778bc019c48 897947 x11 optional xca_1.3.2.orig.tar.gz
efae69fad441109f0fd4086af9eb6de6 6188 x11 optional xca_1.3.2-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQJ8BAEBCgBmBQJWuiE4XxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXREMUUxMzE2RTkzQTc2MEE4MTA0RDg1RkFC
QjNBNjgwMTg2NDlBQTA2AAoJELs6aAGGSaoGELAQALDBvGkN1liiYD241zDb2Cx/
IXcpbndPoobhJNM8pNA7rP1iMiw+h0qtSMP4EU85yyVyPahG/LfvOBAAIif148pr
k+WMnJzTyegZFWD9uRQygoyitzntrfMSGXm6GDs5A/hy4fJnDx8xkW5jc9juDiF2
qQa+nJlDRFJH2PjGt20B6Gg5L4pL7Vpx3sIfagXHISojH7Uc4yuD26vvbx4fPnVI
HiowPNsooCv7IXZISalkG+MNR65KCsalDzwbRB4Etr4C9GQ0MhsydunRKBwuoXQE
pOrFjj6T9qgUZg24mU92urBUDq1g4lhNwUCFN8OrHBP0DBjIkVvGs3p2Ah+JYigb
GY864qZvcwLhwzX0SD6BlIIi6KOwrmvwATmCWB9IDVI92sUCo7gzPp52smNd5QW9
wDJ11QEI/4IxACQkpoz65nicIKxmEjSXy2V3dwjOuKO0jSoJ9xHTKBHULw50Xbbk
mHwzjFtulu+oCQ3htYS36mIfgel4h8/QB0k6V/khWw8IfhvR4lRXUq09h8FMVkhE
CbskO7Yi4neC100ARuuycd+xJoo7LigaT7MEN5AdLMRNzWJxrCWtZlT2ktbdXn0Z
HlEubsCR/NP0tcZ1Qhg9lNerji7HPmpVP1i4x0+ryETExlih4tii5UfH4RglPFEs
saVNPpS/CojsP5DwgLp3
=MTeN
-----END PGP SIGNATURE-----
--- End Message ---