[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1007584: marked as done (catdvi: please consider upgrading to 3.0 source format)



Your message dated Fri, 26 Aug 2022 16:03:48 +0000
with message-id <E1oRboC-003cDH-7F@fasolo.debian.org>
and subject line Bug#1007584: fixed in catdvi 0.14-14
has caused the Debian Bug report #1007584,
regarding catdvi: please consider upgrading to 3.0 source format
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1007584: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007584
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: catdvi
Version: 0.14-13
Severity: wishlist
Tags: bookworm sid
Usertags: format1.0 format1.0-nkp-nv

Dear maintainer,

This package is among the few (1.9%) that still use source format 1.0 in
bookworm.  Please upgrade it to source format 3.0, as (1) this format has many
advantages, as documented in https://wiki.debian.org/Projects/DebSrc3.0 ; (2)
this contributes to standardization of packaging practices.

Please note that this is also a sign that the packaging of this software
could maybe benefit from a refresh. It might be a good opportunity to
look at other aspects as well.

It was noticed in https://lists.debian.org/debian-devel/2022/03/msg00096.html
that the conversion for this package is likely trivial, and builds bit-by-bit
identical binary packages.


This mass bug filing was discussed on debian-devel@:
https://lists.debian.org/debian-devel/2022/03/msg00074.html

Thanks

Lucas

--- End Message ---
--- Begin Message ---
Source: catdvi
Source-Version: 0.14-14
Done: Bastian Germann <bage@debian.org>

We believe that the bug you reported is fixed in the latest version of
catdvi, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1007584@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Germann <bage@debian.org> (supplier of updated catdvi package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 26 Aug 2022 17:32:33 +0200
Source: catdvi
Architecture: source
Version: 0.14-14
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group <packages@qa.debian.org>
Changed-By: Bastian Germann <bage@debian.org>
Closes: 1007584
Changes:
 catdvi (0.14-14) unstable; urgency=medium
 .
   * QA upload.
   * Convert to 3.0 (quilt) format (Closes: #1007584).
   * d/copyright: Convert to machine-readable format.
Checksums-Sha1:
 1320dc42b911b8648b5eecda11b704f4e61a1e0e 1572 catdvi_0.14-14.dsc
 db586cb637f2f5bafaf54663d8a8b618d56796b4 6252 catdvi_0.14-14.debian.tar.xz
 1c16a2d9f050275f5b030b80c48478f9ea572605 5613 catdvi_0.14-14_source.buildinfo
Checksums-Sha256:
 24a485d1b1dcde92acc17d0d7c10969c53dba3657a99a5fd51aa1441edbfdbaf 1572 catdvi_0.14-14.dsc
 d8e9d20b51869fe614a934620fbfb88f429b783371696b9cda34b9c27b015d72 6252 catdvi_0.14-14.debian.tar.xz
 24668c467db915fe27f882e59b26a8095cb850374a9f934f674debc58c4076b5 5613 catdvi_0.14-14_source.buildinfo
Files:
 53fad36848ca1d1e28ddb2879415def7 1572 tex extra catdvi_0.14-14.dsc
 ef1fe64183814c079bf06e283cdf9499 6252 tex extra catdvi_0.14-14.debian.tar.xz
 ef78ff397dd2d90194a624d5b95ae2b9 5613 tex extra catdvi_0.14-14_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=vad4
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: