Your message dated Mon, 28 Apr 2014 15:19:57 +0000
with message-id <e1wenlz-0001vw...@franck.debian.org>
and subject line Bug#745677: fixed in igtf-policy-bundle 1.56-3
has caused the Debian Bug report #745677,
regarding igtf-policy-classic: fails during installation
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
745677: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=745677
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: igtf-policy-classic
Version: 1.56-2
Severity: grave
Justification: renders package unusable
Hi.
The package fails during installation:
Setting up igtf-policy-classic (1.56-2) ...
basename: extra operand
‘/etc/grid-security/certificates/036b3363.signing_policy’
Try 'basename --help' for more information.
dpkg: error processing package igtf-policy-classic (--configure):
subprocess installed post-installation script returned error exit status 1
Errors were encountered while processing:
igtf-policy-classic
Cheers,
Chris.
-- System Information:
Debian Release: jessie/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 3.13-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_DE.utf8, LC_CTYPE=en_DE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages igtf-policy-classic depends on:
ii debconf [debconf-2.0] 1.5.53
Versions of packages igtf-policy-classic recommends:
pn fetch-crl <none>
ii openssl 1.0.1g-3
Versions of packages igtf-policy-classic suggests:
ii ca-certificates 20140325
-- debconf information:
* igtf-policy-classic/install_profile: true
* igtf-policy-classic/exclude_ca:
igtf-policy-classic/include_ca:
--- End Message ---
--- Begin Message ---
Source: igtf-policy-bundle
Source-Version: 1.56-3
We believe that the bug you reported is fixed in the latest version of
igtf-policy-bundle, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 745...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Dennis van Dok <denni...@nikhef.nl> (supplier of updated igtf-policy-bundle
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Thu, 24 Apr 2014 14:31:24 +0200
Source: igtf-policy-bundle
Binary: igtf-policy-classic igtf-policy-mics igtf-policy-slcs
igtf-policy-unaccredited igtf-policy-experimental
Architecture: source all
Version: 1.56-3
Distribution: unstable
Urgency: low
Maintainer: Dennis van Dok <denni...@nikhef.nl>
Changed-By: Dennis van Dok <denni...@nikhef.nl>
Description:
igtf-policy-classic - IGTF classic profile for Authority Root Certificates
igtf-policy-experimental - IGTF experimental Authority Root Certificates
igtf-policy-mics - IGTF MICS profile for Authority Root Certificates
igtf-policy-slcs - IGTF SLCS profile for Authority Root Certificates
igtf-policy-unaccredited - IGTF unaccredited Authority Root Certificates
Closes: 745677
Changes:
igtf-policy-bundle (1.56-3) unstable; urgency=low
.
* Bug fixes in the maintainer scripts.
- Wrong shell parameter expansion could cause CRL files to be
left behind.
- Shell globbing for CRLs with no matches caused postinst to fail.
Closes: #745677.
.
* Expand README.Debian to explain the use of fetch-crl.
Checksums-Sha1:
a51e21f987028c0de7f3cb77f55ff64b14e30827 2175 igtf-policy-bundle_1.56-3.dsc
3bb61909a071f214505419a30e53cf0f75784d6a 28792
igtf-policy-bundle_1.56-3.debian.tar.xz
a4bb8053ee510e80cc30691f82a9bb0f3cb7d88e 148466
igtf-policy-classic_1.56-3_all.deb
16cd88a3d5dc2ca6c2c42163bf7ad0be7adfa5fa 39770 igtf-policy-mics_1.56-3_all.deb
5e8cc5f0d20cb7ff3664c3503345f82c4481c5d1 44684 igtf-policy-slcs_1.56-3_all.deb
37ea741da7f14ed5a54878e0f0c7b076a2aad60e 38900
igtf-policy-unaccredited_1.56-3_all.deb
abf8dd2f99ba383126bab812768554f1d098a9eb 32538
igtf-policy-experimental_1.56-3_all.deb
Checksums-Sha256:
275e70e226b9ed9dc5a5640cc23847f4dce13ff324877091682330b4fc7f844c 2175
igtf-policy-bundle_1.56-3.dsc
f74097a6bc8447fea74270612f5e23098764d2c83f2435fb01a3bcd687463e97 28792
igtf-policy-bundle_1.56-3.debian.tar.xz
4b333b08db666c64b55485a8906e7b9b49a45bc16bdb4a6cdf0df0daabc27a5b 148466
igtf-policy-classic_1.56-3_all.deb
20ed9737fde9a62be59cc882adeccc2cffede82059f61ca89b0ac8b26281e886 39770
igtf-policy-mics_1.56-3_all.deb
1cc70b39628249c89cd3cdf0990afdadee024e0dc20af921495c4c17ce329a84 44684
igtf-policy-slcs_1.56-3_all.deb
e0e4ebc93bfac913cf0bc207aad1db2976b610263f004122ba38f4f4cd215adb 38900
igtf-policy-unaccredited_1.56-3_all.deb
ee02a8cfb7fda553ec0cb9f819d063270b3c70bf5892722abe4d14d7fc656fe3 32538
igtf-policy-experimental_1.56-3_all.deb
Files:
699797c8136db12da746fc071c3cf1a1 148466 misc extra
igtf-policy-classic_1.56-3_all.deb
7f2d6875b2d42cee2721449b65ea6c28 39770 misc extra
igtf-policy-mics_1.56-3_all.deb
28bf2dcf27d13fe9ae5c337d9c788964 44684 misc extra
igtf-policy-slcs_1.56-3_all.deb
7dfa279a072ea379869c2941e6b45194 38900 misc extra
igtf-policy-unaccredited_1.56-3_all.deb
0aa4283f27e1bcd3fe09172564b2f8ba 32538 misc extra
igtf-policy-experimental_1.56-3_all.deb
a2eea59497297cd3f926f668ce4e467d 2175 misc extra igtf-policy-bundle_1.56-3.dsc
52323a95bdfa576ec9e973d31089fb2e 28792 misc extra
igtf-policy-bundle_1.56-3.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=vC7W
-----END PGP SIGNATURE-----
--- End Message ---