Your message dated Tue, 07 Dec 2004 18:02:22 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#275777: fixed in nwall 1.32-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 10 Oct 2004 07:17:25 +0000
>From [EMAIL PROTECTED] Sun Oct 10 00:17:25 2004
Return-path: <[EMAIL PROTECTED]>
Received: from 200-170-97-3.idc.ajato.com.br (qmail-out.ajato.com.br) 
[200.170.97.3] 
        by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
        id 1CGXxN-0006oj-00; Sun, 10 Oct 2004 00:17:25 -0700
Received: (qmail 21777 invoked by uid 0); 10 Oct 2004 07:15:07 -0000
Received: from unknown (HELO localhost) ([EMAIL PROTECTED])
  by dance with SMTP; 10 Oct 2004 07:15:07 -0000
Received: from claviola by localhost with local (Exim 4.34)
        id 1CGXxK-00065t-1N; Sun, 10 Oct 2004 04:17:22 -0300
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Carlos Laviola <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: O: nwall
X-Mailer: reportbug 2.99.5
Date: Sun, 10 Oct 2004 04:17:20 -0300
Message-Id: <[EMAIL PROTECTED]>
Sender: Carlos Laviola <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: wnpp
Severity: normal



-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (999, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-1-k7
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (ignored: LC_ALL set to 
en_US.UTF-8)

---------------------------------------
Received: (at 275777-close) by bugs.debian.org; 7 Dec 2004 23:08:09 +0000
>From [EMAIL PROTECTED] Tue Dec 07 15:08:09 2004
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CboRE-0007hR-00; Tue, 07 Dec 2004 15:08:09 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1CboLe-0005qX-00; Tue, 07 Dec 2004 18:02:22 -0500
From: Daniel Baumann <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.54 $
Subject: Bug#275777: fixed in nwall 1.32-4
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 07 Dec 2004 18:02:22 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Source: nwall
Source-Version: 1.32-4

We believe that the bug you reported is fixed in the latest version of
nwall, which is due to be installed in the Debian FTP archive:

nwall_1.32-4.diff.gz
  to pool/main/n/nwall/nwall_1.32-4.diff.gz
nwall_1.32-4.dsc
  to pool/main/n/nwall/nwall_1.32-4.dsc
nwall_1.32-4_i386.deb
  to pool/main/n/nwall/nwall_1.32-4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Daniel Baumann <[EMAIL PROTECTED]> (supplier of updated nwall package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue,  7 Dec 2004 21:47:00 +0100
Source: nwall
Binary: nwall
Architecture: source i386
Version: 1.32-4
Distribution: unstable
Urgency: low
Maintainer: Daniel Baumann <[EMAIL PROTECTED]>
Changed-By: Daniel Baumann <[EMAIL PROTECTED]>
Description: 
 nwall      - version of wall that uses GNU readline
Closes: 275777
Changes: 
 nwall (1.32-4) unstable; urgency=low
 .
   * New maintainer (Closes: #275777).
   * debian/conffiles removed (was empty).
   * debian/control: formal changes.
   * debian/copyright: formal changes.
   * debian/logrotate.d: renamed to nwall.logratate and added 
dh_installlogrotate in rules.
   * debian/rules: replaced `pwd` with $(CURDIR).
Files: 
 296c5ca1f09f6aad9ae888e6ac8fb8ef 665 misc optional nwall_1.32-4.dsc
 82e92c3538b264e89637f848413394cc 5403 misc optional nwall_1.32-4.diff.gz
 041ba3550b11cee8a647d46b106b4b62 9154 misc optional nwall_1.32-4_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: Joerg Jaspert <[EMAIL PROTECTED]> -- Debian Developer

iD8DBQFBtjSncV7WoH57iskRAvneAJsEP113IebSWUXpk8ciJ5rj9ryD8wCeLh3j
pdadeqO9cYR4uIwwE79ntLk=
=0SDC
-----END PGP SIGNATURE-----

Reply via email to