Your message dated Tue, 03 Jan 2017 21:04:30 +0000
with message-id <[email protected]>
and subject line Bug#848360: fixed in jdupes 1.7-1
has caused the Debian Bug report #848360,
regarding jdupes: unify jdupes/jdupes-btrfs
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
848360: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848360
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: jdupes
Severity: wishlist


Hey.

Wouldn't it be possible to unify jdupes/jdupes-btrfs into one
package jdupes?
I mean can't you simply change the build options for the !linux
platforms so that de-dupe support isn't enabled in the binary
packages for these?

Cheers,
Chris.


-- System Information:
Debian Release: stretch/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.8.0-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_DE.UTF-8, LC_CTYPE=en_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: jdupes
Source-Version: 1.7-1

We believe that the bug you reported is fixed in the latest version of
jdupes, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joao Eriberto Mota Filho <[email protected]> (supplier of updated jdupes 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 03 Jan 2017 17:30:04 -0200
Source: jdupes
Binary: jdupes
Architecture: source
Version: 1.7-1
Distribution: unstable
Urgency: medium
Maintainer: Joao Eriberto Mota Filho <[email protected]>
Changed-By: Joao Eriberto Mota Filho <[email protected]>
Description:
 jdupes     - identify and delete or link duplicate files
Closes: 848360
Changes:
 jdupes (1.7-1) unstable; urgency=medium
 .
   * New upstream release.
   * Upload to unstable. See the previous changelog for details.
     (Closes: #848360)
   * debian/patches/10_use-program-name-variable.patch: dropped. The upstream
     fixed the source code. Thanks!
   * debian/README.Debian: added a new information.
Checksums-Sha1:
 1a09d665c4574da3d788161d4d22ccea01211ca4 1818 jdupes_1.7-1.dsc
 4e729a87a676b7bb3b4489eee22defe82d474416 56443 jdupes_1.7.orig.tar.gz
 113f75834be93dda5bad188f01f2862c046f0658 3876 jdupes_1.7-1.debian.tar.xz
Checksums-Sha256:
 85cffc67f3f9b5a8c03d107a03d8378aa45333354e16fbedc62bbdb8672f8f23 1818 
jdupes_1.7-1.dsc
 c9fb654d11148be497afe2291ab3e33e057a2497fba10048e365658a9d36ee41 56443 
jdupes_1.7.orig.tar.gz
 77fc5c5df1ed1cb7b53789ea8c6f4de6f4d55512345211f9b65c7aa5c042634b 3876 
jdupes_1.7-1.debian.tar.xz
Files:
 35ffdaebf814992df8933e976feff8a7 1818 utils optional jdupes_1.7-1.dsc
 aca2b888fb67cd2c88f0915afd8420dc 56443 utils optional jdupes_1.7.orig.tar.gz
 40c660de0bf42e5d0110c7e98102516e 3876 utils optional jdupes_1.7-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=tblb
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to