Your message dated Mon, 24 Apr 2023 13:18:55 +0000
with message-id <[email protected]>
and subject line Bug#1006729: fixed in nullmailer 1:2.2+10~g7ed88a0-1
has caused the Debian Bug report #1006729,
regarding nullmailer: Add "AUTH EXTERNAL" option for certificate authentication
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1006729: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006729
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: nullmailer
Version: 1:2.2-3
Severity: wishlist
Tags: upstream patch
Forwarded: https://github.com/bruceg/nullmailer/pull/80

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Please implement AUTH EXTERNAL so that nullmailer can be used against smarthosts
using client certificate authentication.

- -- System Information:
Debian Release: 11.2
  APT prefers stable-security
  APT policy: (700, 'stable-security'), (700, 'stable'), (600, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, arm64

Kernel: Linux 5.10.0-11-amd64 (SMP w/4 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages nullmailer depends on:
ii  debconf [debconf-2.0]  1.5.77
ii  libc6                  2.33-7
ii  libgnutls30            3.7.1-5
ii  libstdc++6             12-20220302-1
ii  lsb-base               11.1.0

nullmailer recommends no packages.

nullmailer suggests no packages.

- -- debconf information excluded

-----BEGIN PGP SIGNATURE-----

iIQEARYKACwWIQRoe+CASfFh7aZ6shIiBE7Lv6RhXQUCYiEKFA4cYmpvcm5AbW9y
ay5ubwAKCRAiBE7Lv6RhXcLDAP9Z0NUpxoKfy36rRhvDIjm8F2+aJTNNaafT0WJv
/7igrAD9GHVq8kfxD5jw+E2yf5luSxqEilDsBZv4SZlf45VfvAg=
=KDfF
-----END PGP SIGNATURE-----

--- End Message ---
--- Begin Message ---
Source: nullmailer
Source-Version: 1:2.2+10~g7ed88a0-1
Done: David Bremner <[email protected]>

We believe that the bug you reported is fixed in the latest version of
nullmailer, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
David Bremner <[email protected]> (supplier of updated nullmailer package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 24 Apr 2023 09:48:25 -0300
Source: nullmailer
Architecture: source
Version: 1:2.2+10~g7ed88a0-1
Distribution: unstable
Urgency: medium
Maintainer: David Bremner <[email protected]>
Changed-By: David Bremner <[email protected]>
Closes: 1006729 1033086
Changes:
 nullmailer (1:2.2+10~g7ed88a0-1) unstable; urgency=medium
 .
   * Update to new upstream version 2.2+10~g7ed88a0.
   * Bug fix: "Add 'AUTH EXTERNAL'; option for certificate
     authentication", thanks to Bjørn Mork (Closes: #1006729).
   * Bug fix: "[INTL:ro] Romanian debconf templates translation of
     nullmailer", thanks to Remus-Gabriel Chelu (Closes: #1033086).
Checksums-Sha1:
 3dfe587e750650af9f20ae5bfc1f6239419f2944 2055 nullmailer_2.2+10~g7ed88a0-1.dsc
 d1b17819bb51e9c230f631a87cd927131a0f4ac3 76092 
nullmailer_2.2+10~g7ed88a0.orig.tar.xz
 f761fbccd7647ab31a715b00c3306206dfc6aba9 29156 
nullmailer_2.2+10~g7ed88a0-1.debian.tar.xz
Checksums-Sha256:
 aeecd8999383e73548c8192bf58224f27a788edb703001a195213e08380f7b78 2055 
nullmailer_2.2+10~g7ed88a0-1.dsc
 9fbbd536be098530aaa7b2ffc34d7d4d2937a555b538ed4fd783a30db3195708 76092 
nullmailer_2.2+10~g7ed88a0.orig.tar.xz
 0917ab4a03d0c30423f7e6c16ef2bc3d1162674aa67a9d252eb2f503d5477805 29156 
nullmailer_2.2+10~g7ed88a0-1.debian.tar.xz
Files:
 805defa1111f47e892d353d927732359 2055 mail optional 
nullmailer_2.2+10~g7ed88a0-1.dsc
 c68c51978b38aaf4f6995f81e06f9525 76092 mail optional 
nullmailer_2.2+10~g7ed88a0.orig.tar.xz
 12c6e70ceb7edb034a2d1fc59855d225 29156 mail optional 
nullmailer_2.2+10~g7ed88a0-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=x0lQ
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to