[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1007504: marked as done (dds2tar: please consider upgrading to 3.0 source format)



Your message dated Wed, 23 Nov 2022 22:34:56 +0000
with message-id <E1oxyKW-00ALah-Tf@fasolo.debian.org>
and subject line Bug#1007504: fixed in dds2tar 2.5.2-8
has caused the Debian Bug report #1007504,
regarding dds2tar: please consider upgrading to 3.0 source format
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1007504: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007504
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: dds2tar
Version: 2.5.2-7
Severity: wishlist
Tags: bookworm sid
Usertags: format1.0 format1.0-nkp-nv

Dear maintainer,

This package is among the few (1.9%) that still use source format 1.0 in
bookworm.  Please upgrade it to source format 3.0, as (1) this format has many
advantages, as documented in https://wiki.debian.org/Projects/DebSrc3.0 ; (2)
this contributes to standardization of packaging practices.

Please note that this is also a sign that the packaging of this software
could maybe benefit from a refresh. It might be a good opportunity to
look at other aspects as well.


This mass bug filing was discussed on debian-devel@:
https://lists.debian.org/debian-devel/2022/03/msg00074.html

Thanks

Lucas

--- End Message ---
--- Begin Message ---
Source: dds2tar
Source-Version: 2.5.2-8
Done: Bastian Germann <bage@debian.org>

We believe that the bug you reported is fixed in the latest version of
dds2tar, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1007504@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Germann <bage@debian.org> (supplier of updated dds2tar package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 23 Nov 2022 23:17:55 +0100
Source: dds2tar
Architecture: source
Version: 2.5.2-8
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group <packages@qa.debian.org>
Changed-By: Bastian Germann <bage@debian.org>
Closes: 1007504
Changes:
 dds2tar (2.5.2-8) unstable; urgency=medium
 .
   * QA upload.
   * Convert to 3.0 source format (Closes: #1007504).
   * d/copyright: Convert to machine-readable format.
   * Drop gbp.conf as there is no Vcs anymore.
Checksums-Sha1:
 e1ea373631c34ded3d5f1884b3382518a93689b1 1507 dds2tar_2.5.2-8.dsc
 319d32b234b371d1d018ceb2f72e63479f5b6550 6136 dds2tar_2.5.2-8.debian.tar.xz
 fb7955e8593a45c59971790d7123170b98299d3e 5570 dds2tar_2.5.2-8_source.buildinfo
Checksums-Sha256:
 f60a6cd3cc7fbc9c9cd2a50a11aeb3b82999f246d91540a117be7afeb4bd6ccb 1507 dds2tar_2.5.2-8.dsc
 de6a54d8fea68a0b8832d87639feaf5a364550d098da68633e0f0a69721acd05 6136 dds2tar_2.5.2-8.debian.tar.xz
 75605620fb212fc1abc2589a77b92a305940013adbdb476876c5825e4e2492a2 5570 dds2tar_2.5.2-8_source.buildinfo
Files:
 82eda1cab2f8410a0c3832c99a16d47d 1507 utils optional dds2tar_2.5.2-8.dsc
 2d5548f6faf05454b1d1877e3c42b9f7 6136 utils optional dds2tar_2.5.2-8.debian.tar.xz
 2808d8ee8effabf7a5d23ef69057b8a8 5570 utils optional dds2tar_2.5.2-8_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=JsvI
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: