Your message dated Fri, 24 Aug 2018 15:16:49 +0000
with message-id <[email protected]>
and subject line Bug#895398: fixed in gnupg2 2.2.9-2
has caused the Debian Bug report #895398,
regarding dirmngr: Spelling in control file for dirmngr
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
895398: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895398
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: dirmngr
Version: 2.2.5-1
Severity: minor

Dear Maintainer,

I gave up figuring out what piece/how dirmngr was obstructing my
workflow, but I still made a patch. Happy spelling.

Patch attached,


-- System Information:
Debian Release: buster/sid
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.15.0-13-generic (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8),
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

-- no debconf information

--- ../control  2018-02-22 23:06:42.000000000 +0100
+++ control     2018-04-11 08:37:12.100482940 +0200
@@ -367,7 +367,7 @@
  certificates.  For OpenPGP, this means pulling from the public
  HKP/HKPS keyservers, or from LDAP servers.  For X.509 this includes
  Certificate Revocation Lists (CRLs) and Online Certificate Status
- Protocol updates (OCSP).  It is capable of using tor for network
+ Protocol updates (OCSP).  It is capable of using Tor for network
  access.
  .
  dirmngr is used for network access by gpg, gpgsm, and dirmngr-client,


--- End Message ---
--- Begin Message ---
Source: gnupg2
Source-Version: 2.2.9-2

We believe that the bug you reported is fixed in the latest version of
gnupg2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Daniel Kahn Gillmor <[email protected]> (supplier of updated gnupg2 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 24 Aug 2018 09:48:15 -0400
Source: gnupg2
Binary: gpgconf gnupg-agent gpg-agent gpg-wks-server gpg-wks-client scdaemon 
gpgsm gpg gnupg gnupg2 gpgv gpgv2 dirmngr gpgv-udeb gpgv-static gpgv-win32 
gnupg-l10n gnupg-utils
Architecture: source
Version: 2.2.9-2
Distribution: unstable
Urgency: medium
Maintainer: Debian GnuPG Maintainers <[email protected]>
Changed-By: Daniel Kahn Gillmor <[email protected]>
Description:
 dirmngr    - GNU privacy guard - network certificate management service
 gnupg      - GNU privacy guard - a free PGP replacement
 gnupg-agent - GNU privacy guard - cryptographic agent (dummy transitional packa
 gnupg-l10n - GNU privacy guard - localization files
 gnupg-utils - GNU privacy guard - utility programs
 gnupg2     - GNU privacy guard - a free PGP replacement (dummy transitional pa
 gpg        - GNU Privacy Guard -- minimalist public key operations
 gpg-agent  - GNU privacy guard - cryptographic agent
 gpg-wks-client - GNU privacy guard - Web Key Service client
 gpg-wks-server - GNU privacy guard - Web Key Service server
 gpgconf    - GNU privacy guard - core configuration utilities
 gpgsm      - GNU privacy guard - S/MIME version
 gpgv       - GNU privacy guard - signature verification tool
 gpgv-static - minimal signature verification tool (static build)
 gpgv-udeb  - minimal signature verification tool (udeb)
 gpgv-win32 - GNU privacy guard - signature verification tool (win32 build)
 gpgv2      - GNU privacy guard - signature verification tool (dummy transition
 scdaemon   - GNU privacy guard - smart card support
Closes: 895398
Changes:
 gnupg2 (2.2.9-2) unstable; urgency=medium
 .
   [ Daniel Kahn Gillmor ]
   * spell Tor correctly (Closes: #895398)
   * Standards-Version: bump to 4.2.0 (no changes needed)
   * corrected license in AppStream file
   * standardize udev rules for Yubikey USB devices and claim them in AppStream
   * from upstream: s2k bugfix, support for Trustica Cryptoucan
   * Claim Trustica Cryptoucan via AppStream
 .
   [ Jiří Keresteš ]
   * udev rule for Trustica Cryptoucan
Checksums-Sha1:
 17d4d21fa24370053c77da1d7dc3499ec020c8db 3132 gnupg2_2.2.9-2.dsc
 b8bf0f2843131057cb7bc2bbadc4b75f347ff78b 68272 gnupg2_2.2.9-2.debian.tar.bz2
 b3d05daf3357f0fc33cd188250363492a61fc0bc 19257 gnupg2_2.2.9-2_amd64.buildinfo
Checksums-Sha256:
 a3fd5460abcb8849779840375889cb2dea8b7ee5bc245b66ecfb1e9716feb8c0 3132 
gnupg2_2.2.9-2.dsc
 bebaedbe7e3f8b48fc3cc454d353b53e8fb5534b486b24da04c5c3ae38de2d44 68272 
gnupg2_2.2.9-2.debian.tar.bz2
 37f9379aa0bb01a004117b6f862cb46953f03c89bc7cb1a93245d646665aa678 19257 
gnupg2_2.2.9-2_amd64.buildinfo
Files:
 f35c941848e7879c3731b19021dd5c0a 3132 utils optional gnupg2_2.2.9-2.dsc
 015be39c192c3b39e6a388767a0ec22c 68272 utils optional 
gnupg2_2.2.9-2.debian.tar.bz2
 4b1809747d11203e4969fb047d0c1aa6 19257 utils optional 
gnupg2_2.2.9-2_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iHUEARYKAB0WIQTTaP514aqS9uSbmdJsHx7ezFD6UwUCW4AOqAAKCRBsHx7ezFD6
U6MGAQCdhUy1tGIGJQgnvy5OPXdprUXdW8tI3zCSpigWgHlGyAD/ew7Lz22wgv7y
o7wW+Rw1+YFq8j6pO0PAGrpFedi0wQA=
=kI8G
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to