Your message dated Wed, 03 Aug 2005 19:02:04 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#232648: fixed in zopectl 0.3.4.4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 14 Feb 2004 13:13:16 +0000
>From [EMAIL PROTECTED] Sat Feb 14 05:13:16 2004
Return-path: <[EMAIL PROTECTED]>
Received: from home.wiggy.net (typhoon) [194.109.254.66] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1Arzbg-0007Mg-00; Sat, 14 Feb 2004 05:13:16 -0800
Received: from wichert by typhoon with local (Exim 3.36 #1 (Debian))
        id 1Arza5-0000qM-00; Sat, 14 Feb 2004 14:11:37 +0100
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Wichert Akkerman <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: initial install does not work
X-Mailer: reportbug 2.45
Date: Sat, 14 Feb 2004 14:11:37 +0100
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_02_12 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-5.0 required=4.0 tests=HAS_PACKAGE autolearn=no 
        version=2.60-bugs.debian.org_2004_02_12
X-Spam-Level: 

Package: zope
Version: 2.6.2-6
Severity: grave
Tags: sid

On my very first zope install I get this:

Setting up zope (2.6.2-6) ...
Initializing Zope instance home for default... done.
Creating PCGI resource file for default... done.
Starting Zope instance default...
 failed: missing required path(/var/lib/zope/instance/default/access)
 Waiting instances in late: done.
default: start: missing required path(/var/lib/zope/instance/default/access)

/var/lib/zope/instance/default/access indeed does not exist. Since this
means that a zope install does not work I'm marking this severity grave.

Wichert.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.2
Locale: LANG=C, LC_CTYPE=C

Versions of packages zope depends on:
ii  adduser                     3.51         Add and remove users and groups
ii  debconf                     1.4.10       Debian configuration management sy
ii  libc6                       2.3.2.ds1-11 GNU C Library: Shared libraries an
ii  python2.2                   2.2.3-8      An interactive high-level object-o
ii  python2.2-xml               0.8.3-4      XML tools for Python (2.2.x)
ii  zopectl                     0.3.1        Zope instances controlling utility

-- debconf information:
* zope/instance_home/move: true
  zope/upgrade/2.6.1-7: 
* shared/zope/restart: configuring


---------------------------------------
Received: (at 232648-close) by bugs.debian.org; 4 Aug 2005 02:16:15 +0000
>From [EMAIL PROTECTED] Wed Aug 03 19:16:15 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1E0V3c-000649-00; Wed, 03 Aug 2005 19:02:04 -0700
From: Andrew Pollock <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#232648: fixed in zopectl 0.3.4.4
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Wed, 03 Aug 2005 19:02:04 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 4

Source: zopectl
Source-Version: 0.3.4.4

We believe that the bug you reported is fixed in the latest version of
zopectl, which is due to be installed in the Debian FTP archive:

zopectl_0.3.4.4.dsc
  to pool/main/z/zopectl/zopectl_0.3.4.4.dsc
zopectl_0.3.4.4.tar.gz
  to pool/main/z/zopectl/zopectl_0.3.4.4.tar.gz
zopectl_0.3.4.4_all.deb
  to pool/main/z/zopectl/zopectl_0.3.4.4_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andrew Pollock <[EMAIL PROTECTED]> (supplier of updated zopectl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu,  4 Aug 2005 11:34:09 +1000
Source: zopectl
Binary: zopectl
Architecture: source all
Version: 0.3.4.4
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group <[EMAIL PROTECTED]>
Changed-By: Andrew Pollock <[EMAIL PROTECTED]>
Description: 
 zopectl    - Zope instances controlling utility
Closes: 220558 220648 227073 229368 231341 232648 234155 251038 309001
Changes: 
 zopectl (0.3.4.4) unstable; urgency=low
 .
   * QA Group upload orphaning this package
   * Incorporates previous NMUs (closes: #229368, #232648, #251038, #234155,
     #309001, #220558, #220648, #227073, #231341)
Files: 
 a789c99b5da0a0279e44d7ca19d4151a 535 admin optional zopectl_0.3.4.4.dsc
 4055364440bd6accb38f2351b84e9180 19698 admin optional zopectl_0.3.4.4.tar.gz
 2664387f38ba3a92c296dc3ea3f4b2d1 25784 admin optional zopectl_0.3.4.4_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC8XUVIblXXKfZFgIRArQYAJ9aym0xSv+aU2dSB5Waejsf9aaeegCfYgpY
qUM9L4fe3ku2YUl+x7IkJEQ=
=94pS
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to