Your message dated Sun, 28 Apr 2024 18:50:04 +0000 with message-id <e1s19ba-000ppe...@fasolo.debian.org> and subject line Bug#1007511: fixed in gwaterfall 0.1-5.2 has caused the Debian Bug report #1007511, regarding gwaterfall: please consider upgrading to 3.0 source format to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1007511: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007511 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: gwaterfall Version: 0.1-5.1 Severity: wishlist Tags: bookworm sid Usertags: format1.0 format1.0-nkp-nv Dear maintainer, This package is among the few (1.9%) that still use source format 1.0 in bookworm. Please upgrade it to source format 3.0, as (1) this format has many advantages, as documented in https://wiki.debian.org/Projects/DebSrc3.0 ; (2) this contributes to standardization of packaging practices. Please note that this is also a sign that the packaging of this software could maybe benefit from a refresh. It might be a good opportunity to look at other aspects as well. It was noticed in https://lists.debian.org/debian-devel/2022/03/msg00096.html that the conversion for this package is likely trivial, and builds bit-by-bit identical binary packages. This mass bug filing was discussed on debian-devel@: https://lists.debian.org/debian-devel/2022/03/msg00074.html Thanks Lucas
--- End Message ---
--- Begin Message ---Source: gwaterfall Source-Version: 0.1-5.2 Done: Bastian Germann <b...@debian.org> We believe that the bug you reported is fixed in the latest version of gwaterfall, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1007...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Bastian Germann <b...@debian.org> (supplier of updated gwaterfall package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 18 Apr 2024 08:12:17 +0200 Source: gwaterfall Architecture: source Version: 0.1-5.2 Distribution: unstable Urgency: medium Maintainer: Ognyan Kulev <o...@debian.org> Changed-By: Bastian Germann <b...@debian.org> Closes: 1007511 Changes: gwaterfall (0.1-5.2) unstable; urgency=medium . * Non-maintainer upload. * Convert to source format 3.0 (Closes: #1007511). * d/copyright: Convert to machine-readable format. * Replace deprecated Priority: extra with optional. Checksums-Sha1: fd8886cc07e84175c1a0e7a34d11780c802d528f 1573 gwaterfall_0.1-5.2.dsc 7d885c43f2e426f808060b7510aebd096e57e32f 2908 gwaterfall_0.1-5.2.debian.tar.xz 330c03decd1b709085a3e981c732ba6a622384a8 11413 gwaterfall_0.1-5.2_source.buildinfo Checksums-Sha256: 71615b3f4d7a5251607b3b7a0c66e0e4d4742fb6e1913b7ebe75f607e63226e0 1573 gwaterfall_0.1-5.2.dsc 6b970fd96d3f837c4629df831b2b1912081df9f401cdc0a1ccf53bbd0c9a575a 2908 gwaterfall_0.1-5.2.debian.tar.xz 99980f6698b417dafc77763377b410143b16866cfce577ddf1cb9f7f206ac5e4 11413 gwaterfall_0.1-5.2_source.buildinfo Files: da35a50291c7c4b4d0a361a9357b49f5 1573 x11 optional gwaterfall_0.1-5.2.dsc bed264cbd5c977b94572565c80c28e27 2908 x11 optional gwaterfall_0.1-5.2.debian.tar.xz 952bb10a99837eb99e3bc1b8be076f16 11413 x11 optional gwaterfall_0.1-5.2_source.buildinfo -----BEGIN PGP SIGNATURE----- iQHEBAEBCgAuFiEEQGIgyLhVKAI3jM5BH1x6i0VWQxQFAmYhIqEQHGJhZ2VAZGVi aWFuLm9yZwAKCRAfXHqLRVZDFEkDC/93vvcnlXu6T8mGGGTiqaQQLCooWFKWCvGC uXGq9qmNCIjyEEmCGuNLDWpXqabChaHhruXG1kaDUppvKPkJQndWTpcm8Ar1VvQQ xMT9deVCk6LkIictTLw6kxW+xeZeJtLuCSuaq75H/ADE8L5ZzC3AUvKDTRS49SO0 PxcwFa88HOiTKsbHrXGKQHoHn1NpjmEo5BfUBnR68NBFRODOaiKRtkUFZfb+GbIE vnGzcLjiflTXsOuHUPArN/AwEAhbvH/vSL+eAfGyvnQ5c5if5RCwshmWRf16zuEx J/PmNWxUM0yhELCkOPH/rsw+Q+mMdAX6kUridnFgsrDvaxIBGX7XJXH+5Fj+9Rmc E6ir+8iFa+gX/98SYXRpnsgYhRDmZA5t2bZccrO5rTy7PQiUzUv2T6PDVom4k6OD qWv0rSC3TnQXkAgCgFCkJKfGI2uxo0gr3ve+B8kxRrk4NKzLLxKqd6EG4hIQjyJ9 VOpfXwM8UQmSoCe4Y5uXateQR7tsXqA= =pe+p -----END PGP SIGNATURE-----pgpAPpceBIXTn.pgp
Description: PGP signature
--- End Message ---