Your message dated Tue, 18 Apr 2006 10:17:12 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#362206: fixed in xtrlock 2.0-12
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: x11-common
Version: 1:7.0.14
Severity: normal

aptitude install xtrlock
The following packages are BROKEN:
  x11-common 
The following NEW packages will be installed:
  xtrlock
0 packages upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
Need to get 0B/9468B of archives. After unpacking 90.1kB will be used.
The following packages have unmet dependencies:
  x11-common: Conflicts: xtrlock (<= 2.0-11) but 2.0-11 is to be installed.
Resolving dependencies...
Unable to resolve dependencies!  Giving up...
Abort.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16.5
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages x11-common depends on:
ii  debconf [debconf-2.0]         1.4.72     Debian configuration management sy
ii  debianutils                   2.15.6     Miscellaneous utilities specific t
ii  lsb-base                      3.1-3      Linux Standard Base 3.1 init scrip

x11-common recommends no packages.

-- debconf information:
  x11-common/xwrapper/nice_value: 0
  x11-common/xwrapper/allowed_users: Console Users Only
  x11-common/experimental_packages:
  x11-common/xwrapper/actual_allowed_users: console
  x11-common/xwrapper/nice_value/error:



--- End Message ---
--- Begin Message ---
Source: xtrlock
Source-Version: 2.0-12

We believe that the bug you reported is fixed in the latest version of
xtrlock, which is due to be installed in the Debian FTP archive:

xtrlock_2.0-12.dsc
  to pool/main/x/xtrlock/xtrlock_2.0-12.dsc
xtrlock_2.0-12.tar.gz
  to pool/main/x/xtrlock/xtrlock_2.0-12.tar.gz
xtrlock_2.0-12_i386.deb
  to pool/main/x/xtrlock/xtrlock_2.0-12_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Matthew Vernon <[EMAIL PROTECTED]> (supplier of updated xtrlock package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----

Format: 1.7
Date: Tue, 18 Apr 2006 17:19:10 +0100
Source: xtrlock
Binary: xtrlock
Architecture: source i386
Version: 2.0-12
Distribution: unstable
Urgency: low
Maintainer: Matthew Vernon <[EMAIL PROTECTED]>
Changed-By: Matthew Vernon <[EMAIL PROTECTED]>
Description: 
 xtrlock    - Minimal X display lock program
Closes: 362206 363293
Changes: 
 xtrlock (2.0-12) unstable; urgency=low
 .
   * Install into /usr not /usr/X11R6 (closes: #362206, #363293)
Files: 
 1be5f9017a05706928539a8b28f9afa7 604 x11 optional xtrlock_2.0-12.dsc
 be75a389f84fa9548ee04f367480f23e 7642 x11 optional xtrlock_2.0-12.tar.gz
 86e84f0ddbccb0c24f970bbe88bdf823 9400 x11 optional xtrlock_2.0-12_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQCVAwUBREUbTLDSad4X89TRAQEZ7gP+NfN+J8eeHtPMqg1W5Htg5OuzBPThuTV4
wE9+pgsQvwuOt7OcXx8zyd8PiE+zU2a6tDXm6y+6eZ/MWCAuZkHfY3ffYJeI0rvJ
15o3iOc2BBZwtXLG9HuJeaHYgzMCfBf8u3S2E6XL36mTempYCFC8Ez5Uw8IGFAFv
98CiWJk/Uns=
=zOPf
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to