Your message dated Mon, 01 Aug 2005 01:32:04 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#259671: fixed in vte 1:0.11.13-4
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 16 Jul 2004 00:48:47 +0000
>From [EMAIL PROTECTED] Thu Jul 15 17:48:47 2004
Return-path: <[EMAIL PROTECTED]>
Received: from zoon.lafn.org [206.117.18.9]
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1BlGu7-0003oH-00; Thu, 15 Jul 2004 17:48:47 -0700
Received: from localhost (host-66-81-27-3.rev.o1.com [66.81.27.3])
by zoon.lafn.org (8.12.3p3/8.11.3) with ESMTP id i6G0lWpR071194
for <[EMAIL PROTECTED]>; Thu, 15 Jul 2004 17:48:45 -0700 (PDT)
(envelope-from [EMAIL PROTECTED])
Received: from kraai by localhost with local (Exim 4.32)
id 1Bl9X8-0000FI-E7
for [EMAIL PROTECTED]; Thu, 15 Jul 2004 09:56:34 -0700
Date: Thu, 15 Jul 2004 09:56:34 -0700
From: Matt Kraai <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Missing dependency on libsm-dev
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040523i
Sender: Matt Kraai <[EMAIL PROTECTED]>
X-Virus-Scanned: clamd / ClamAV version 0.70, clamav-milter version 0.70j
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-7.3 required=4.0 tests=BAYES_00,DATE_IN_PAST_06_12,
HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level:
Package: libvte-dev
Version: 1:0.11.11-4
Severity: important
gtkterm fails to build because it links against libSM which isn't
installed. It does so because libvte-dev includes it in its
libtool information file, so libvte-dev should depend on
libsm-dev.
--
Matt Kraai [EMAIL PROTECTED] http://ftbfs.org/
---------------------------------------
Received: (at 259671-close) by bugs.debian.org; 1 Aug 2005 08:38:05 +0000
>From [EMAIL PROTECTED] Mon Aug 01 01:38:05 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1DzViO-00056J-00; Mon, 01 Aug 2005 01:32:04 -0700
From: Loic Minier <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#259671: fixed in vte 1:0.11.13-4
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Mon, 01 Aug 2005 01:32:04 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
Source: vte
Source-Version: 1:0.11.13-4
We believe that the bug you reported is fixed in the latest version of
vte, which is due to be installed in the Debian FTP archive:
libvte-common_0.11.13-4_all.deb
to pool/main/v/vte/libvte-common_0.11.13-4_all.deb
libvte-dev_0.11.13-4_i386.deb
to pool/main/v/vte/libvte-dev_0.11.13-4_i386.deb
libvte-doc_0.11.13-4_all.deb
to pool/main/v/vte/libvte-doc_0.11.13-4_all.deb
libvte4_0.11.13-4_i386.deb
to pool/main/v/vte/libvte4_0.11.13-4_i386.deb
python-vte_0.11.13-4_i386.deb
to pool/main/v/vte/python-vte_0.11.13-4_i386.deb
vte_0.11.13-4.diff.gz
to pool/main/v/vte/vte_0.11.13-4.diff.gz
vte_0.11.13-4.dsc
to pool/main/v/vte/vte_0.11.13-4.dsc
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Loic Minier <[EMAIL PROTECTED]> (supplier of updated vte package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sun, 31 Jul 2005 16:01:15 +0200
Source: vte
Binary: python-vte libvte4 libvte-doc libvte-common libvte-dev
Architecture: source i386 all
Version: 1:0.11.13-4
Distribution: unstable
Urgency: high
Maintainer: Arnaud Patard <[EMAIL PROTECTED]>
Changed-By: Loic Minier <[EMAIL PROTECTED]>
Description:
libvte-common - Terminal emulator widget for GTK+ 2.0 - common files
libvte-dev - Terminal emulator widget for GTK+ 2.0 - development files
libvte-doc - Terminal emulator widget for GTK+ 2.0 - development files
libvte4 - Terminal emulator widget for GTK+ 2.0 - runtime files
python-vte - Python bindings for the VTE widget set
Closes: 259671
Changes:
vte (1:0.11.13-4) unstable; urgency=high
.
* Urgency high for testing targetted RC bugfix.
* Add dependencies to libvte-dev on libxft-dev, libfreetype6-dev,
libatk1.0-dev, libpango1.0-dev, libglib2.0-dev to conform with libvte.la's
dependency_libs. [debian/control, debian/control.in] (Closes: #259671)
Files:
d7cbdf43b75d1a45109859609535be08 1746 libs optional vte_0.11.13-4.dsc
93e9b456ffb9e81590cfe7b2baa9970c 14320 libs optional vte_0.11.13-4.diff.gz
df431231d849309e60a7b5fb461b7aa4 110462 libs optional
libvte-common_0.11.13-4_all.deb
fb5140c7d870b72c944a17b18d3a58d6 83036 doc optional
libvte-doc_0.11.13-4_all.deb
13dd86a10d4aad49e25f4b7fee966b09 676278 libs optional
libvte4_0.11.13-4_i386.deb
610e5ebe43e685853e84fd0f682c876f 436962 libdevel optional
libvte-dev_0.11.13-4_i386.deb
8a3c74aab1145a1a22b68cd9ad2fdbe6 120204 python optional
python-vte_0.11.13-4_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFC7drMQxo87aLX0pIRAufAAJ9wMCyP5hiUjHECxn+qUEIDIzB//ACfXHCj
1RO6VQNRlWqsxXiGjWECqGU=
=j0x4
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]