[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#971911: RFS: nemo-emblems/4.6.0-2 [ITP] -- Nemo extension to change a folder or file emblem in Nemo



Package: sponsorship-requests
Severity: wishlist

Dear mentors,

I am looking for a sponsor for my package "nemo-emblems":

 * Package name    : nemo-emblems
   Version         : 4.6.0-2
   Upstream Author : Clement Lefebvre <root@linuxmint.com>
 * URL             : https://community.linuxmint.com/software/view/nemo-emblems
 * License         : GPL-3+
 * Vcs             : https://salsa.debian.org/ItzSwirlz-guest/nemo-emblems
   Section         : utils

It builds those binary packages:

  nemo-emblems - Nemo extension to change a folder or file emblem in Nemo

To access further information about this package, please visit the following
URL:

  https://mentors.debian.net/package/nemo-emblems/

Alternatively, one can download the package with dget using this command:

  dget -x https://mentors.debian.net/debian/pool/main/n/nemo-emblems/nemo-
emblems_4.6.0-2.dsc

Changes for the initial release:

 nemo-emblems (4.6.0-2) experimental; urgency=medium
 .
   * d/control: Replace priority extra w/ optional
   * d/control: Add python3 as a dependency

 nemo-emblems (4.6.0-1) experimental; urgency=medium
 .
   * Initial release. (Closes: #826464)

Lintian:
4.6.0-2 was lintian fixes.
Other needed changes are listed in mentors.debian.net but probably are not a
problem for sponsorship but can be fixed before uploading to testing/unstable.

Regards,
--
  Joshua Peisach



-- System Information:
Debian Release: bullseye/sid
  APT prefers focal-updates
  APT policy: (500, 'focal-updates'), (500, 'focal-security'), (500, 'focal'), (100, 'focal-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.4.0-48-generic (SMP w/4 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled


Reply to: