Your message dated Tue, 27 Dec 2005 16:03:25 -0800 with message-id <[EMAIL PROTECTED]> and subject line Bug#343334: fixed in libparams-check-perl 0.23-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 14 Dec 2005 13:58:33 +0000 >From [EMAIL PROTECTED] Wed Dec 14 05:58:33 2005 Return-path: <[EMAIL PROTECTED]> Received: from ws143.allegro.pl ([217.153.200.143] helo=ws143) by spohr.debian.org with esmtp (Exim 4.50) id 1EmX9N-0000q7-6t for [EMAIL PROTECTED]; Wed, 14 Dec 2005 05:58:33 -0800 Received: by ws143 (Postfix, from userid 1000) id 69548122444A3; Wed, 14 Dec 2005 14:58:30 +0100 (CET) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: "Krzysztof Krzyzaniak \(eloy\)" <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: ITP: libparams-check-perl -- A generic input parsing/checking mechanism Message-ID: <[EMAIL PROTECTED]> X-Mailer: reportbug 3.18 Date: Wed, 14 Dec 2005 14:58:30 +0100 X-Debbugs-Cc: debian-devel@lists.debian.org, [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02 Package: wnpp Severity: wishlist Owner: "Krzysztof Krzyzaniak (eloy)" <[EMAIL PROTECTED]> * Package name : libparams-check-perl Version : 0.23 Upstream Author : Jos Boumans <[EMAIL PROTECTED]> * URL : http://search.cpan.org/~kane/Params-Check-0.23/ * License : Perl: Artistic/GPL Description : A generic input parsing/checking mechanism Params::Check is a generic input parsing/checking mechanism. . It allows you to validate input via a template. The only requirement is that the arguments must be named. . Params::Check can do the following things for you: * Convert all keys to lowercase * Check if all required arguments have been provided * Set arguments that have not been provided to the default * Weed out arguments that are not supported and warn about them to the user * Validate the arguments given by the user based on strings, regexes, lists or even subroutines * Enforce type integrity if required -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.14-1-686 Locale: LANG=pl_PL, LC_CTYPE=pl_PL (charmap=ISO-8859-2) --------------------------------------- Received: (at 343334-close) by bugs.debian.org; 28 Dec 2005 00:11:03 +0000 >From [EMAIL PROTECTED] Tue Dec 27 16:11:03 2005 Return-path: <[EMAIL PROTECTED]> Received: from joerg by spohr.debian.org with local (Exim 4.50) id 1ErOmr-00084J-4U; Tue, 27 Dec 2005 16:03:25 -0800 From: Krzysztof Krzyzaniak (eloy) <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: lisa $Revision: 1.31 $ Subject: Bug#343334: fixed in libparams-check-perl 0.23-1 Message-Id: <[EMAIL PROTECTED]> Sender: Joerg Jaspert <[EMAIL PROTECTED]> Date: Tue, 27 Dec 2005 16:03:25 -0800 X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 Source: libparams-check-perl Source-Version: 0.23-1 We believe that the bug you reported is fixed in the latest version of libparams-check-perl, which is due to be installed in the Debian FTP archive: libparams-check-perl_0.23-1.diff.gz to pool/main/libp/libparams-check-perl/libparams-check-perl_0.23-1.diff.gz libparams-check-perl_0.23-1.dsc to pool/main/libp/libparams-check-perl/libparams-check-perl_0.23-1.dsc libparams-check-perl_0.23-1_all.deb to pool/main/libp/libparams-check-perl/libparams-check-perl_0.23-1_all.deb libparams-check-perl_0.23.orig.tar.gz to pool/main/libp/libparams-check-perl/libparams-check-perl_0.23.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Krzysztof Krzyzaniak (eloy) <[EMAIL PROTECTED]> (supplier of updated libparams-check-perl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Mon, 12 Dec 2005 17:14:56 +0100 Source: libparams-check-perl Binary: libparams-check-perl Architecture: source all Version: 0.23-1 Distribution: unstable Urgency: low Maintainer: Debian Perl Group <[EMAIL PROTECTED]> Changed-By: Krzysztof Krzyzaniak (eloy) <[EMAIL PROTECTED]> Description: libparams-check-perl - A generic input parsing/checking mechanism. Closes: 343334 Changes: libparams-check-perl (0.23-1) unstable; urgency=low . * Initial Release (closes: #343334). Files: a89679f9be93cc1b3c53379e49e9a7c6 753 perl optional libparams-check-perl_0.23-1.dsc ebc031653b8ab690030d647890f7318f 9969 perl optional libparams-check-perl_0.23.orig.tar.gz 67d35f1e46f966c11ba9f1baf6741bcb 2146 perl optional libparams-check-perl_0.23-1.diff.gz 648c7394173ccc67fbac1f70162e532d 15730 perl optional libparams-check-perl_0.23-1_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFDoW6i+NMfSd6w7DERAm3WAJ0WUHG6T3QCJyFg/R7EG24iKtyi7QCeOD/o 9SiJAki/Nb2fE3OHBQOCCtg= =oqY5 -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]