[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#914849: marked as done (ITP: junixsocket -- Unix Domain Sockets in Java)



Your message dated Mon, 03 Dec 2018 13:01:44 +0000
with message-id <E1gTnr6-000ATj-5m@fasolo.debian.org>
and subject line Bug#914849: fixed in junixsocket 2.0.4-1
has caused the Debian Bug report #914849,
regarding ITP: junixsocket -- Unix Domain Sockets in Java
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
914849: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914849
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Emmanuel Bourg <ebourg@apache.org>

* Package name    : junixsocket
  Version         : 2.0.4
  Upstream Author : Christian Kohlschütter
* URL             : https://github.com/kohlschutter/junixsocket
* License         : Apache-2.0
  Programming Lang: Java, C++
  Description     : Unix Domain Sockets in Java

junixsocket is a Java/JNI library that allows the use of Unix Domain Sockets
(AF_UNIX sockets) from Java. In contrast to other implementations, junixsocket
extends the Java Sockets API (java.net.Socket, java.net.SocketAddress etc.)
and even supports RMI over AF_UNIX. It is also possible to use it in
conjunction with Connector/J to connect to a local MySQL server via Unix domain
sockets.

This package is required to build the byte-buddy-agent module in src:byte-buddy,
and then upgrade Mockito to the version 2.x.

--- End Message ---
--- Begin Message ---
Source: junixsocket
Source-Version: 2.0.4-1

We believe that the bug you reported is fixed in the latest version of
junixsocket, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 914849@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Emmanuel Bourg <ebourg@apache.org> (supplier of updated junixsocket package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 27 Nov 2018 23:30:33 +0100
Source: junixsocket
Binary: libjunixsocket-java libjunixsocket-jni
Architecture: source all amd64
Version: 2.0.4-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>
Changed-By: Emmanuel Bourg <ebourg@apache.org>
Description:
 libjunixsocket-java - Unix Domain Sockets in Java
 libjunixsocket-jni - Unix Domain Sockets in Java (JNI library)
Closes: 914849
Changes:
 junixsocket (2.0.4-1) unstable; urgency=medium
 .
   * Initial release (Closes: #914849)
Checksums-Sha1:
 afb2ca63ea91cff7b57a77cbf3567e83de31bc9a 2101 junixsocket_2.0.4-1.dsc
 8229002b98a6e5f49f566ee9308a85a3a9325cd5 23252 junixsocket_2.0.4.orig.tar.xz
 b4f6a49258e5139cc5e4e53be6c7e332278091f5 3416 junixsocket_2.0.4-1.debian.tar.xz
 0673a95943d8aa48014da2327dcfece3d85412da 15289 junixsocket_2.0.4-1_amd64.buildinfo
 bdfcd9adb5b915b7f2d3b4b01c237a4fa66d35b9 32164 libjunixsocket-java_2.0.4-1_all.deb
 aef8af873246dc6b1bad269852d45ad452a21bcd 20620 libjunixsocket-jni-dbgsym_2.0.4-1_amd64.deb
 66f362765b2d3814a966b5929f898bebab977251 6828 libjunixsocket-jni_2.0.4-1_amd64.deb
Checksums-Sha256:
 d83fe08451fb20df8c9b9ac38a168790e5e6acde7d417a4c600cf7fd02f49c35 2101 junixsocket_2.0.4-1.dsc
 cb40d855d6143d7ff1a879183f11403ae3042613f9da009585968e6ab24ec4c5 23252 junixsocket_2.0.4.orig.tar.xz
 db52ced48435553a4b627adb8d2a949983a44316a64f38a8db83293770a14f27 3416 junixsocket_2.0.4-1.debian.tar.xz
 1d2abbcac88fa3c7af5af1b5512d0796bc310af06129af4bc9fd17f0b56c8a90 15289 junixsocket_2.0.4-1_amd64.buildinfo
 34d68980ddb275d0615ed7b4617ab4f6b508a39be920736f1cabc2a57832b7e8 32164 libjunixsocket-java_2.0.4-1_all.deb
 66d13229e761f1b79d3640f51d99d953e753d5ce2822abb61886ebbfbedb5326 20620 libjunixsocket-jni-dbgsym_2.0.4-1_amd64.deb
 0cc9610e6cb0dfa3ad3866f8dd8eda5b234eb0671fabbb3d48cb9fed894e7e75 6828 libjunixsocket-jni_2.0.4-1_amd64.deb
Files:
 d90cbdc0a3755db4c45a6bec5fbb4383 2101 java optional junixsocket_2.0.4-1.dsc
 f7f71c95998a6a31960847030e6b9116 23252 java optional junixsocket_2.0.4.orig.tar.xz
 26ab38213738aa28d19bfd2c24fcf02a 3416 java optional junixsocket_2.0.4-1.debian.tar.xz
 653181581ddf6540cc057e959873e8d5 15289 java optional junixsocket_2.0.4-1_amd64.buildinfo
 cb6005643387b4722ef4cafe372fb54e 32164 java optional libjunixsocket-java_2.0.4-1_all.deb
 96072638d7b5f2d975ae90b4f88e64ac 20620 debug optional libjunixsocket-jni-dbgsym_2.0.4-1_amd64.deb
 67df947f7e9ea95edcc3f054e6a302ab 6828 java optional libjunixsocket-jni_2.0.4-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
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=skF1
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: