Your message dated Tue, 29 Jan 2008 15:47:05 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#457752: fixed in snmptrapfmt 1.13
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: snmptrapfmt
Version: 1.11
Tags: patch
User: [EMAIL PROTECTED]
Usertags: missing-dependency
To be able to check boot script order, and also to be able to start
boot scripts in parallel, it is important to know the dependencies of
the various boot scripts. The Linux Software Base specifies a init.d
header file format useful for this purpose, and adding such header to
the init.d script would make it possible for me to use this
information to check the current sequence and to speed up the debian
boot.
<URL:http://refspecs.freestandards.org/LSB_2.1.0/LSB-generic/LSB-generic/initscrcomconv.html>
documents the LSB header format. Some debian notes are available from
<URL:http://wiki.debian.org/LSBInitScripts>.
Here is a patch to document the dependencies. I hope this is correct.
--- snmptrapfmt-1.12/debian/init.d.orig 2007-12-25 12:50:44.000000000 +0100
+++ snmptrapfmt-1.12/debian/init.d 2007-12-25 12:52:13.000000000 +0100
@@ -1,5 +1,14 @@
#! /bin/sh
#
+### BEGIN INIT INFO
+# Provides: snmptrapfmt
+# Required-Start: $remote_fs
+# Required-Stop: $remote_fs
+# Should-Start: $network snmpd
+# Should-Stop: $network snmpd
+# Default-Start: 2 3 4 5
+# Default-Stop: 0 1 6
+### END INIT INFO
#
# Written by Miquel van Smoorenburg <[EMAIL PROTECTED]>.
# Modified for Debian GNU/Linux by Ian Murdock <[EMAIL PROTECTED]>.
--- End Message ---
--- Begin Message ---
Source: snmptrapfmt
Source-Version: 1.13
We believe that the bug you reported is fixed in the latest version of
snmptrapfmt, which is due to be installed in the Debian FTP archive:
snmptrapfmt_1.13.dsc
to pool/main/s/snmptrapfmt/snmptrapfmt_1.13.dsc
snmptrapfmt_1.13.tar.gz
to pool/main/s/snmptrapfmt/snmptrapfmt_1.13.tar.gz
snmptrapfmt_1.13_sparc.deb
to pool/main/s/snmptrapfmt/snmptrapfmt_1.13_sparc.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Jochen Friedrich <[EMAIL PROTECTED]> (supplier of updated snmptrapfmt package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 29 Jan 2008 16:25:28 +0100
Source: snmptrapfmt
Binary: snmptrapfmt
Architecture: source sparc
Version: 1.13
Distribution: unstable
Urgency: low
Maintainer: Jochen Friedrich <[EMAIL PROTECTED]>
Changed-By: Jochen Friedrich <[EMAIL PROTECTED]>
Description:
snmptrapfmt - A configurable snmp trap handler daemon for snmpd
Closes: 442162 457752
Changes:
snmptrapfmt (1.13) unstable; urgency=low
.
* Update Policy to 3.7.3
* Add patch from Len Sorensen <[EMAIL PROTECTED]> to fix
a segfault on traps without enterprise value (Closes: #442162)
* Add LSB header to init script (Closes: #457752)
Files:
42d4fd2368dcb6fcbf0d8b4c6cec98fd 518 net optional snmptrapfmt_1.13.dsc
5d99b7ef0e602715a85869b601c8fdca 17335 net optional snmptrapfmt_1.13.tar.gz
d181ab0ec0dba9d529b5c62ed637fc3e 18192 net optional snmptrapfmt_1.13_sparc.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHn0jb0fhX0Y/ocz0RAl6cAJ48NduyxRHWNdTvcHUPfhEzi3Y4GQCeOyEe
xlBjKO4GEep05Ku5bEgfe4M=
=o8qu
-----END PGP SIGNATURE-----
--- End Message ---