Your message dated Sat, 30 Aug 2025 16:39:00 +0000
with message-id <[email protected]>
and subject line Bug#1007600: fixed in xfaces 3.3-30.3
has caused the Debian Bug report #1007600,
regarding xfaces: please consider upgrading to 3.0 source format
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1007600: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007600
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: xfaces
Version: 3.3-29
Severity: wishlist
Tags: bookworm sid
Usertags: format1.0 format1.0-nkp-nv

Dear maintainer,

This package is among the few (1.9%) that still use source format 1.0 in
bookworm.  Please upgrade it to source format 3.0, as (1) this format has many
advantages, as documented in https://wiki.debian.org/Projects/DebSrc3.0 ; (2)
this contributes to standardization of packaging practices.

Please note that this is also a sign that the packaging of this software
could maybe benefit from a refresh. It might be a good opportunity to
look at other aspects as well.

It was noticed in https://lists.debian.org/debian-devel/2022/03/msg00096.html
that the conversion for this package is likely trivial, and builds bit-by-bit
identical binary packages.


This mass bug filing was discussed on debian-devel@:
https://lists.debian.org/debian-devel/2022/03/msg00074.html

Thanks

Lucas

--- End Message ---
--- Begin Message ---
Source: xfaces
Source-Version: 3.3-30.3
Done: Bastian Germann <[email protected]>

We believe that the bug you reported is fixed in the latest version of
xfaces, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Germann <[email protected]> (supplier of updated xfaces package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 20 Aug 2025 17:41:50 +0200
Source: xfaces
Architecture: source
Version: 3.3-30.3
Distribution: unstable
Urgency: medium
Maintainer: Hakan Ardo <[email protected]>
Changed-By: Bastian Germann <[email protected]>
Closes: 1007600
Changes:
 xfaces (3.3-30.3) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Convert to source format 3.0 (closes: #1007600)
Checksums-Sha1:
 086d78ec3b1beb540d4c25a55d86c840cfc618a9 1610 xfaces_3.3-30.3.dsc
 c2fddafd23819cd1dcd84b8949978106e15f2ffb 11212 xfaces_3.3-30.3.debian.tar.xz
 719497ad169ce1d8862a7520bd384d6427c24d57 6151 xfaces_3.3-30.3_source.buildinfo
Checksums-Sha256:
 e8edd332c7f8cce3baf266a37b98257a537accae657b0d0cce14654971e7153c 1610 
xfaces_3.3-30.3.dsc
 d7c0f3012a8fb7447999805cc1fc0c52e28949124746161561a130855dfe4af9 11212 
xfaces_3.3-30.3.debian.tar.xz
 b3437bdc070f16cbc3651c439a3739786b0edc69ad64046e6b2e2a99b44b5273 6151 
xfaces_3.3-30.3_source.buildinfo
Files:
 c9ad46fd1931fa0d5cc9e48e8eb35b46 1610 mail optional xfaces_3.3-30.3.dsc
 be02abe244f9d7461674e2256cc6c229 11212 mail optional 
xfaces_3.3-30.3.debian.tar.xz
 a610ac22672c8271b28be0a585fff323 6151 mail optional 
xfaces_3.3-30.3_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=9LTv
-----END PGP SIGNATURE-----

Attachment: pgpwUuV9qgUEg.pgp
Description: PGP signature


--- End Message ---

Reply via email to