Your message dated Wed, 03 Aug 2005 19:02:04 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#229368: fixed in zopectl 0.3.4.4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 24 Jan 2004 14:57:18 +0000
>From [EMAIL PROTECTED] Sat Jan 24 06:57:18 2004
Return-path: <[EMAIL PROTECTED]>
Received: from web40908.mail.yahoo.com [66.218.78.205] 
        by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
        id 1AkPDq-0008CB-00; Sat, 24 Jan 2004 06:57:18 -0800
Message-ID: <[EMAIL PROTECTED]>
Received: from [80.218.21.109] by web40908.mail.yahoo.com via HTTP; Sat, 24 Jan 
2004 06:56:44 PST
Date: Sat, 24 Jan 2004 06:56:44 -0800 (PST)
From: solo turn <[EMAIL PROTECTED]>
Subject: /var/lib/zope/instance/default/access is a directory
To: debianbugs <[EMAIL PROTECTED]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_01_20 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-3.9 required=4.0 tests=FROM_ENDS_IN_NUMS,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_01_20
X-Spam-Level: 

Subject: /var/lib/zope/instance/default/access is a directory
Package: zope
Version: 2.6.2-6
Severity: grave
Justification: renders package unusable
Tags: sid

installing zope creates a directory
/var/lib/zope/instance/default/access
which you have to delete and use /usr/lib/zope/zpasswd.py to recreate it
to log in to zope

-- System Information:
Debian Release: 3.0

Versions of packages zope depends on:
ii  adduser                     3.51         Add and remove users and groups
ii  debconf                     1.4.7        Debian configuration management sy
ii  libc6                       2.3.2.ds1-11 GNU C Library: Shared libraries an
ii  python2.2                   2.2.3-8      An interactive high-level object-o
ii  python2.2-xml               0.8.3-4      XML tools for Python (2.2.x)
ii  zopectl                     0.3.1        Zope instances controlling utility

-- debconf information:
* zope/instance_home/move: true
  zope/upgrade/2.6.1-7:
* shared/zope/restart: end


__________________________________
Do you Yahoo!?
Yahoo! SiteBuilder - Free web site building tool. Try it!
http://webhosting.yahoo.com/ps/sb/

---------------------------------------
Received: (at 229368-close) by bugs.debian.org; 4 Aug 2005 02:16:17 +0000
>From [EMAIL PROTECTED] Wed Aug 03 19:16:17 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1E0V3c-000640-00; Wed, 03 Aug 2005 19:02:04 -0700
From: Andrew Pollock <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#229368: fixed in zopectl 0.3.4.4
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Wed, 03 Aug 2005 19:02:04 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2

Source: zopectl
Source-Version: 0.3.4.4

We believe that the bug you reported is fixed in the latest version of
zopectl, which is due to be installed in the Debian FTP archive:

zopectl_0.3.4.4.dsc
  to pool/main/z/zopectl/zopectl_0.3.4.4.dsc
zopectl_0.3.4.4.tar.gz
  to pool/main/z/zopectl/zopectl_0.3.4.4.tar.gz
zopectl_0.3.4.4_all.deb
  to pool/main/z/zopectl/zopectl_0.3.4.4_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andrew Pollock <[EMAIL PROTECTED]> (supplier of updated zopectl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu,  4 Aug 2005 11:34:09 +1000
Source: zopectl
Binary: zopectl
Architecture: source all
Version: 0.3.4.4
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group <[EMAIL PROTECTED]>
Changed-By: Andrew Pollock <[EMAIL PROTECTED]>
Description: 
 zopectl    - Zope instances controlling utility
Closes: 220558 220648 227073 229368 231341 232648 234155 251038 309001
Changes: 
 zopectl (0.3.4.4) unstable; urgency=low
 .
   * QA Group upload orphaning this package
   * Incorporates previous NMUs (closes: #229368, #232648, #251038, #234155,
     #309001, #220558, #220648, #227073, #231341)
Files: 
 a789c99b5da0a0279e44d7ca19d4151a 535 admin optional zopectl_0.3.4.4.dsc
 4055364440bd6accb38f2351b84e9180 19698 admin optional zopectl_0.3.4.4.tar.gz
 2664387f38ba3a92c296dc3ea3f4b2d1 25784 admin optional zopectl_0.3.4.4_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC8XUVIblXXKfZFgIRArQYAJ9aym0xSv+aU2dSB5Waejsf9aaeegCfYgpY
qUM9L4fe3ku2YUl+x7IkJEQ=
=94pS
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to