Your message dated Wed, 12 May 2004 00:17:03 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#247929: fixed in logcheck 1.2.20
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 8 May 2004 01:12:15 +0000
>From [EMAIL PROTECTED] Fri May 07 18:12:15 2004
Return-path: <[EMAIL PROTECTED]>
Received: from kitenet.net [64.62.161.42] (postfix)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1BMGNz-0006mr-00; Fri, 07 May 2004 18:12:15 -0700
Received: from dragon.kitenet.net (216-98-95-211.access.naxs.com [216.98.95.211])
        (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
        (Client CN "Joey Hess", Issuer "Joey Hess" (verified OK))
        by kitenet.net (Postfix) with ESMTP id 82590184DE
        for <[EMAIL PROTECTED]>; Sat,  8 May 2004 01:12:13 +0000 (GMT)
Received: by dragon.kitenet.net (Postfix, from userid 1000)
        id BDD256E0A0; Fri,  7 May 2004 21:11:02 -0400 (EDT)
Date: Fri, 7 May 2004 21:11:02 -0400
From: Joey Hess <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: skips over menu items even if only 1 of several of their virtual packages are 
provided by an already configured package
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="xXmbgvnjoT4axfJE"
Content-Disposition: inline
User-Agent: Mutt/1.5.5.1+cvs20040105i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-7.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 
X-CrossAssassin-Score: 1


--xXmbgvnjoT4axfJE
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: main-menu
Severity: normal
Tags: d-i

Autopartkit provides several virtual packages, and if even only one of
them is also provided by another, configured pacage, then main-menu will
skip the menu item. See bug #247927 for an example of the kind of
non-obvios behavoor that results. It might be better to only skip menu
items if *all* of their provides are otherwise satisfied.

--=20
see shy jo

--xXmbgvnjoT4axfJE
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAnDOmd8HHehbQuO8RAgkUAKDk3xJHJCROhjRYA1IbcOhYsyOR4QCgi9tl
Hm1H7J+skYNR7u9/nkR7UQA=
=G7LJ
-----END PGP SIGNATURE-----

--xXmbgvnjoT4axfJE--

---------------------------------------
Received: (at 247929-close) by bugs.debian.org; 12 May 2004 04:23:05 +0000
>From [EMAIL PROTECTED] Tue May 11 21:23:05 2004
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1BNlGr-0003Pz-00; Tue, 11 May 2004 21:23:05 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1BNlB1-0002TG-00; Wed, 12 May 2004 00:17:03 -0400
From: Todd Troxell <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.49 $
Subject: Bug#247929: fixed in logcheck 1.2.20
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Wed, 12 May 2004 00:17:03 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 
X-CrossAssassin-Score: 12

Source: logcheck
Source-Version: 1.2.20

We believe that the bug you reported is fixed in the latest version of
logcheck, which is due to be installed in the Debian FTP archive:

logcheck-database_1.2.20_all.deb
  to pool/main/l/logcheck/logcheck-database_1.2.20_all.deb
logcheck_1.2.20.dsc
  to pool/main/l/logcheck/logcheck_1.2.20.dsc
logcheck_1.2.20.tar.gz
  to pool/main/l/logcheck/logcheck_1.2.20.tar.gz
logcheck_1.2.20_all.deb
  to pool/main/l/logcheck/logcheck_1.2.20_all.deb
logtail_1.2.20_all.deb
  to pool/main/l/logcheck/logtail_1.2.20_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Todd Troxell <[EMAIL PROTECTED]> (supplier of updated logcheck package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wednesday, 12 May 2004 04:49:00 +0000
Source: logcheck
Binary: logcheck logtail logcheck-database
Architecture: source all
Version: 1.2.20
Distribution: unstable
Urgency: low
Maintainer: Debian logcheck Team <[EMAIL PROTECTED]>
Changed-By: Todd Troxell <[EMAIL PROTECTED]>
Description: 
 logcheck   - Mails anomalies in the system logfiles to the administrator
 logcheck-database - A database of system log rules for the use of log checkers
 logtail    - Returns parts of logfiles that have not already been returned
Closes: 190696 196258 209048 215640 242284 243019 246695 246750 247047 247360 247614 
247929 248046 248244
Changes: 
 logcheck (1.2.20) unstable; urgency=low
 .
   maks:
   * Updated gconfd rules. (Closes: #246695)
   * Added and Updated ntpd rules. (Closes: #246750)
   * Added first cyrus rules. (Closes: #247047)
   * Updated pop3d-ssl rules.
   * Updated postfix rules. (Closes: #196258, #190696)
   * Try secure TMPDIR in /tmp if /var/tmp fails. (Closes: #242284)
   * Initial german translation.
   * Set a sane DEFAULTLEVEL="server" in logcheck itself.
   * Better hantling of crontab.  (Closes: #243019)
   * Enhanced manpage logcheck(8). (Closes: #215640)
   * Add syslog-ng option for sysklogd dependency. (Closes: #248244)
   alfie:
   * Full german translation.
   * Updated pt_BR translation from André Luís Lopes.
   * Run debconf-updatepo.
   * debian/logcheck.8 is generated, so get rid of it in clean target, too.
   todd:
   * Change logcheck home to /var/lib/logcheck. (Closes: #247614)
   * Change modes on /etc/logcheck. (Closes: #247929, #248046)
   * Allow adm group to read logcheck rules. (Closes: #209048)
   * Remove noroot template. (Closes: #247360)
   * Remove useless chown to /var/tmp/logcheck* thanks to maks.
   * Remove bash depends.  Bash is marked essential.
   * Change Maintainer field to Debian logcheck Team,
     set [EMAIL PROTECTED] as uploader.
   * Bumped standards to 3.6.1.
   * Removed Python from Build-Depends-Indep.  Thanks, Alfie.
   * Changed chmod to /etc/logcheck in postinst to use X flag instead of x.
     Thanks, Martin Waitz
Files: 
 b7d47aa49cce53d61b86fa1ba7dac3f6 670 admin optional logcheck_1.2.20.dsc
 3c7d470ecf385d76e0b0eef7de1cf6e2 65545 admin optional logcheck_1.2.20.tar.gz
 24916e708546d0c05f5f60c6e3a40164 33968 admin optional logcheck_1.2.20_all.deb
 cc0afb5a4969833d0e05d0d4897b10bb 35092 admin optional logcheck-database_1.2.20_all.deb
 ea67a119a197f67b2598dde44aa18ed7 20212 admin optional logtail_1.2.20_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAoaBa4u3oQ3FHP2YRAiX2AJ9nw0jxN6yZsnw6KkHpqJo8R8opxwCgu6qU
pXFYitr0m2zgnjkBwO8BPMQ=
=8RVh
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to