Your message dated Mon, 16 Jul 2007 16:32:05 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#433119: fixed in nfs-utils 1:1.1.0-10
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: nfs-common
Version: 1:1.1.0-6
Severity: important


nfs-utils (1:1.1.0-6) unstable; urgency=low

  * Enable {mount,umount}.{nfs,nfs4}, in line with util-linux 2.13 no longer
    supporting NFS mounts.

Hey, util-linux 2.13~rc1 resides in experimental! Unstable version of
nfs-common isn't able to mount nfs-shares at boottime:

Wed Jul 11 20:13:04 2007: mount.nfs: rpc.statd is not running but is required 
for remote locking
Wed Jul 11 20:13:04 2007:    Either use "-o nolocks" to keep locks local, or 
start statd.


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-frodo (PREEMPT)
Locale: LANG=de_DE.utf8, [EMAIL PROTECTED] (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages nfs-common depends on:
ii  adduser                     3.104        add and remove users and groups
ii  libc6                       2.6-2        GNU C Library: Shared libraries
ii  libcomerr2                  1.40.1-1     common error description library
ii  libevent1                   1.3b-0       An asynchronous event notification
ii  libgssapi2                  0.11-1       A mechanism-switch gssapi library
ii  libkrb53                    1.6.dfsg.1-5 MIT Kerberos runtime libraries
ii  libnfsidmap2                0.19-0+b1    An nfs idmapping library
ii  librpcsecgss3               0.14-2       allows secure rpc communication us
ii  libwrap0                    7.6.dbs-13   Wietse Venema's TCP wrappers libra
ii  lsb-base                    3.1-23.1     Linux Standard Base 3.1 init scrip
ii  netbase                     4.29         Basic TCP/IP networking system
ii  portmap                     6.0-2        The RPC portmapper
ii  ucf                         3.001        Update Configuration File: preserv

nfs-common recommends no packages.

-- no debconf information

-- 
  On the keyboard of life you have always
  to keep a finger at the escape key;-)


--- End Message ---
--- Begin Message ---
Source: nfs-utils
Source-Version: 1:1.1.0-10

We believe that the bug you reported is fixed in the latest version of
nfs-utils, which is due to be installed in the Debian FTP archive:

nfs-common_1.1.0-10_i386.deb
  to pool/main/n/nfs-utils/nfs-common_1.1.0-10_i386.deb
nfs-kernel-server_1.1.0-10_i386.deb
  to pool/main/n/nfs-utils/nfs-kernel-server_1.1.0-10_i386.deb
nfs-utils_1.1.0-10.diff.gz
  to pool/main/n/nfs-utils/nfs-utils_1.1.0-10.diff.gz
nfs-utils_1.1.0-10.dsc
  to pool/main/n/nfs-utils/nfs-utils_1.1.0-10.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steinar H. Gunderson <[EMAIL PROTECTED]> (supplier of updated nfs-utils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 16 Jul 2007 18:04:52 +0200
Source: nfs-utils
Binary: nfs-kernel-server nfs-common
Architecture: source i386
Version: 1:1.1.0-10
Distribution: unstable
Urgency: high
Maintainer: Anibal Monsalve Salazar <[EMAIL PROTECTED]>
Changed-By: Steinar H. Gunderson <[EMAIL PROTECTED]>
Description: 
 nfs-common - NFS support files common to client and server
 nfs-kernel-server - support for NFS kernel server
Closes: 432511 432750 433119 433133
Changes: 
 nfs-utils (1:1.1.0-10) unstable; urgency=high
 .
   * Start nfs-common in the /etc/rcS start-up sequence, making sure statd is
     run before mountnfs runs, and finally obsoleting the hacks in mountnfs to
     start nfs-common directly in some cases. S44 is used, which is right
     between portmap (S43) and mountnfs (S45). As per discussion with Petter
     Reinholdtsen on IRC. (Closes: #432511, #432750, #433119, #433133)
     * Change the update-rc.d line in nfs-common.postinst to include the S
       runlevel.
     * Change the version check for the "update-rc.d -f nfs-common remove" line
       to this version (1:1.1.0-10), so all older installations are properly
       updated.
   * In the LSB header for nfs-common.init, add $portmap to Required-Start.
     Also add the S run level to Default-Start, to match the above change.
   * Include {mount,umount}.nfs man pages in the nfs-common package -- thanks
     to Neil Brown for spotting this.
Files: 
 f1707b6be89d76b3709c7e8a5df026cc 893 net standard nfs-utils_1.1.0-10.dsc
 ebb6bf2acdbe56dc7a916172685d95ec 28529 net standard nfs-utils_1.1.0-10.diff.gz
 8969edf8faf4fc050672d25a4250aea8 142256 net optional 
nfs-kernel-server_1.1.0-10_i386.deb
 b3cc961f0cb19691625f9c8264a97f07 159844 net standard 
nfs-common_1.1.0-10_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGm5rFXKRQ3lK3SH4RAmYMAKDiR9BgR5p053MX9k5P07kI5G4KNACeNV0P
/rlmcNSje95QHzdprWLKyeo=
=uscG
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to