Your message dated Wed, 28 Jan 2004 02:05:19 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#209124: fixed in nagios-nrpe 2.0-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 7 Sep 2003 21:03:26 +0000 >From [EMAIL PROTECTED] Sun Sep 07 16:03:23 2003 Return-path: <[EMAIL PROTECTED]> Received: from out1.prserv.net (prserv.net) [32.97.166.31] by master.debian.org with esmtp (Exim 3.35 1 (Debian)) id 19w6gt-00049j-00; Sun, 07 Sep 2003 16:03:23 -0500 Received: from catbert (cable-212.76.251.80.coditel.net[212.76.251.80]) by prserv.net (out1) with ESMTP id <2003090721032020105q9690e>; Sun, 7 Sep 2003 21:03:20 +0000 From: Benoit Mortier <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: ITP: nrpe -- Program to execute Nagios plugins in a remote host X-Mailer: reportbug 1.50 Date: Sun, 07 Sep 2003 23:10:07 +0200 X-Debbugs-CC: debian-devel@lists.debian.org Bcc: Benoit Mortier <[EMAIL PROTECTED]> Message-Id: <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Status: No, hits=-10.1 required=4.0 tests=HAS_PACKAGE,OUR_MTA_MSGID,PGP_SIGNATURE,UPPERCASE_25_50, X_DEBBUGS_CC autolearn=ham version=2.53-bugs.debian.org_2003_8_27 X-Spam-Level: X-Spam-Checker-Version: SpamAssassin 2.53-bugs.debian.org_2003_8_27 (1.174.2.15-2003-03-30-exp) Package: wnpp Version: N/A; reported 2003-09-07 Severity: wishlist -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 * Package name : nrpe Version : 1.9 Upstream Author : Ethan Galstad <[EMAIL PROTECTED]> * URL : http://www.nagios.org/ * License : (GPL) Description : The purpose of this addon is to allow you to execute Nagios plugins on a remote host in as transparent a manner as possible - -- System Information Debian Release: 3.0 Architecture: i386 Kernel: Linux catbert 2.4.18-1-586tsc #2 Sun Aug 10 09:12:21 EST 2003 i586 Locale: LANG=C, LC_CTYPE=C -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE/W56vvlpWtH2dFGwRAj4dAJ9xbKVGCtIr1xd0EQ4xCphgiVPs2wCfS1Z+ 7BZ77lPQ+uX0oxsLPy61vY0= =NB4F -----END PGP SIGNATURE----- --------------------------------------- Received: (at 209124-close) by bugs.debian.org; 28 Jan 2004 07:09:26 +0000 >From [EMAIL PROTECTED] Tue Jan 27 23:09:26 2004 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1AljpG-0003ik-00; Tue, 27 Jan 2004 23:09:26 -0800 Received: from rdonald by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1AljlH-0001yR-00; Wed, 28 Jan 2004 02:05:19 -0500 From: Jason Thomas <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: lisa $Revision: 1.26 $ Subject: Bug#209124: fixed in nagios-nrpe 2.0-1 Message-Id: <[EMAIL PROTECTED]> Sender: Randall Donald <[EMAIL PROTECTED]> Date: Wed, 28 Jan 2004 02:05:19 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_01_27 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-3.0 required=4.0 tests=HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2004_01_27 X-Spam-Level: Source: nagios-nrpe Source-Version: 2.0-1 We believe that the bug you reported is fixed in the latest version of nagios-nrpe, which is due to be installed in the Debian FTP archive: nagios-nrpe-doc_2.0-1_all.deb to pool/main/n/nagios-nrpe/nagios-nrpe-doc_2.0-1_all.deb nagios-nrpe-plugin_2.0-1_i386.deb to pool/main/n/nagios-nrpe/nagios-nrpe-plugin_2.0-1_i386.deb nagios-nrpe-server_2.0-1_i386.deb to pool/main/n/nagios-nrpe/nagios-nrpe-server_2.0-1_i386.deb nagios-nrpe_2.0-1.diff.gz to pool/main/n/nagios-nrpe/nagios-nrpe_2.0-1.diff.gz nagios-nrpe_2.0-1.dsc to pool/main/n/nagios-nrpe/nagios-nrpe_2.0-1.dsc nagios-nrpe_2.0.orig.tar.gz to pool/main/n/nagios-nrpe/nagios-nrpe_2.0.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Jason Thomas <[EMAIL PROTECTED]> (supplier of updated nagios-nrpe package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Wed, 14 Jan 2004 16:13:36 +1100 Source: nagios-nrpe Binary: nagios-nrpe-doc nagios-nrpe-server nagios-nrpe-plugin Architecture: source i386 all Version: 2.0-1 Distribution: unstable Urgency: low Maintainer: Jason Thomas <[EMAIL PROTECTED]> Changed-By: Jason Thomas <[EMAIL PROTECTED]> Description: nagios-nrpe-doc - Documentation for nagios-nrpe nagios-nrpe-plugin - Nagios Remote Plugin Exectutor Plugin nagios-nrpe-server - Nagios Remote Plugin Exectutor Server Closes: 209124 Changes: nagios-nrpe (2.0-1) unstable; urgency=low . * Initial Release. (closes: #209124) Files: 02e909161a619e97fe3951528cb5b06f 635 net optional nagios-nrpe_2.0-1.dsc 70ef9502a3b7e49fa520dbceabfa04d0 52157 net optional nagios-nrpe_2.0.orig.tar.gz bae382acb66d248ecaf028b564fd7b4b 4352 net optional nagios-nrpe_2.0-1.diff.gz 6f4cc285a9a1579a93d2264ee9d9e401 8620 net optional nagios-nrpe-doc_2.0-1_all.deb c64de5abbce6ebf51b50b3bdd2ef7311 25356 net optional nagios-nrpe-server_2.0-1_i386.deb 5a54bd1ad773d937e3fa93a8787f2e02 14982 net optional nagios-nrpe-plugin_2.0-1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFADdeT7cYwRJJSiL4RAgBLAKCwR56egs/hrt+LuneaWmtO3Ty88ACeJBhk 9EadWmCeyA4xDPjInJMnnFk= =wddc -----END PGP SIGNATURE-----