Your message dated Sun, 27 Dec 2009 12:02:35 +0000
with message-id <e1norpt-0001cl...@ries.debian.org>
and subject line Bug#560168: fixed in yubikey-server-c 0.4-1
has caused the Debian Bug report #560168,
regarding yubikey-server-c: Fails to install on creation of user
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
560168: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560168
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: yubikey-server-c
Version: 0.3-1
Severity: grave
Tags: patch
Justification: renders package unusable

Command useradd fails on the fact -X and -g <groupname> is used.
Remove -g <groupname> and package installs without problem.

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (1001, 'testing'), (500, 'oldstable'), (60, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.30-2-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.ISO-8859-15, LC_CTYPE=en_US.ISO-8859-15 (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/dash

Versions of packages yubikey-server-c depends on:
ii  libc6                         2.10.2-2   GNU C Library: Shared libraries
ii  libgcrypt11                   1.4.4-6    LGPL Crypto library - runtime libr
ii  libmicrohttpd5                0.4.4-1    library embedding HTTP server func
ii  libpq5                        8.4.1-1    PostgreSQL C client library
ii  libyubikey0                   1.5-1      Yubikey OTP handling library runti

yubikey-server-c recommends no packages.

yubikey-server-c suggests no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: yubikey-server-c
Source-Version: 0.4-1

We believe that the bug you reported is fixed in the latest version of
yubikey-server-c, which is due to be installed in the Debian FTP archive:

yubikey-server-c_0.4-1.diff.gz
  to main/y/yubikey-server-c/yubikey-server-c_0.4-1.diff.gz
yubikey-server-c_0.4-1.dsc
  to main/y/yubikey-server-c/yubikey-server-c_0.4-1.dsc
yubikey-server-c_0.4-1_amd64.deb
  to main/y/yubikey-server-c/yubikey-server-c_0.4-1_amd64.deb
yubikey-server-c_0.4.orig.tar.gz
  to main/y/yubikey-server-c/yubikey-server-c_0.4.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 560...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Tollef Fog Heen <tfh...@debian.org> (supplier of updated yubikey-server-c 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 27 Dec 2009 12:12:59 +0100
Source: yubikey-server-c
Binary: yubikey-server-c
Architecture: source amd64
Version: 0.4-1
Distribution: unstable
Urgency: low
Maintainer: Tollef Fog Heen <tfh...@debian.org>
Changed-By: Tollef Fog Heen <tfh...@debian.org>
Description: 
 yubikey-server-c - Yubikey validation server
Closes: 560168
Changes: 
 yubikey-server-c (0.4-1) unstable; urgency=low
 .
   * New upstream version
     - Fix assert error if OTP is too short to be a valid token.
   * Remove -g from useradd call as it is not needed.  Closes: #560168
Checksums-Sha1: 
 6d48cd5ea78217ef83ca028052fddbf1bd6f7fc7 1729 yubikey-server-c_0.4-1.dsc
 16ac97746ea2bfee483853eeb2385da8a1a0d9e5 89127 yubikey-server-c_0.4.orig.tar.gz
 4439c5b7865a68bc6eb14c3ef6e027d33d404856 3786 yubikey-server-c_0.4-1.diff.gz
 bd4b9fe810250beeb4337c80748b2f17e7c67083 12816 yubikey-server-c_0.4-1_amd64.deb
Checksums-Sha256: 
 d0c5fdca5d0dd6112726df5c05a9f40a09a1167c306139f83117d9e872dc343b 1729 
yubikey-server-c_0.4-1.dsc
 df1fdb68c2fa82194c8bc03efd5b5959e422fad880b1989e23aa4530c6232fa1 89127 
yubikey-server-c_0.4.orig.tar.gz
 75b4735410163ba364cc5efdb69425969a0dc3dbab33c7720c8de9baa3235549 3786 
yubikey-server-c_0.4-1.diff.gz
 a653e2539fbaf688c32b70ea990f9a2c93475e823cf26809a459c4374dcdd27c 12816 
yubikey-server-c_0.4-1_amd64.deb
Files: 
 c4ddfa9aaa47533bef32391a503688aa 1729 admin optional yubikey-server-c_0.4-1.dsc
 880b95787856d026b6a9ec59aea734e3 89127 admin optional 
yubikey-server-c_0.4.orig.tar.gz
 dc1abb961a9da894cb81fb71b663da24 3786 admin optional 
yubikey-server-c_0.4-1.diff.gz
 2c8919c55ccf255793388ccc19752f25 12816 admin optional 
yubikey-server-c_0.4-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQIcBAEBCAAGBQJLN0uBAAoJELZaSHHKGdcXb3gP/j7BSMK3WXUfMdJx45tcdaz9
YCgEfHmorIbXbbqAIMbeDLbUxOzCmepMe5WusPwiHHjL+o6MEgnLfPilqdCXrrL/
9nx4bCH1bF96Bt3ZKZYixqzhjOxEA2W3nAKoxWzLT08KVxyswh5NWNEeXrk208o6
SpmYCPELbkDV03nR2czTTwz29Xacr2B8tGMy4oOMH6k8WlOcACN5iVdY48KaTCsp
cTxhHbi67WdE6tBo56RzkqDFAzYhAONccMf1ZoNCFYuT5RnBE98k0le4PGUas9HX
oShJxaSZTATWCEollkDwXJOAVO++5/SoCuSGBGw1LiGySBwpqLSpHNPMhDb8IvsJ
b/yaS11CHYqn4TdxFTY1R97sjhTZEVpstJwce5E7e/+JgK+kG4E0akOysWjAkK5w
hY5MPkHyNiFKy2fmESuyyN6Ts64yGH1hEHMw+QbktmRNSzmqDKabaIlyu1y+Vffs
ggnVf+BVJ5HqJJw0+KOUuSyzElsHELHxwgLgaYNumDNZ/LWCz1bAngGKgmK18yfu
olFVXr7RkBX/O+hDkb4wO0p6dh8ejHo99YJdinDpXLULsCQSgwp9unU0IVXeNqy3
p5VeVmdIm4cMG4IPXGQb45SrzJoVgGzQ4HtLBxlsZ6uOAg3lZxZdmw6ZouK3yqo6
Jc5rLCZazji1878Xqemh
=Rxs+
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to