[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1007496: marked as done (ucspi-proxy: please consider upgrading to 3.0 source format)



Your message dated Sat, 03 Dec 2022 13:21:12 +0000
with message-id <E1p1SS8-00EO0J-ML@fasolo.debian.org>
and subject line Bug#1007496: fixed in ucspi-proxy 0.99-3
has caused the Debian Bug report #1007496,
regarding ucspi-proxy: please consider upgrading to 3.0 source format
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1007496: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007496
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: ucspi-proxy
Version: 0.99-1.1
Severity: wishlist
Tags: bookworm sid
Usertags: format1.0 format1.0-nkp-nv

Dear maintainer,

This package is among the few (1.9%) that still use source format 1.0 in
bookworm.  Please upgrade it to source format 3.0, as (1) this format has many
advantages, as documented in https://wiki.debian.org/Projects/DebSrc3.0 ; (2)
this contributes to standardization of packaging practices.

Please note that this is also a sign that the packaging of this software
could maybe benefit from a refresh. It might be a good opportunity to
look at other aspects as well.


This mass bug filing was discussed on debian-devel@:
https://lists.debian.org/debian-devel/2022/03/msg00074.html

Thanks

Lucas

--- End Message ---
--- Begin Message ---
Source: ucspi-proxy
Source-Version: 0.99-3
Done: Bastian Germann <bage@debian.org>

We believe that the bug you reported is fixed in the latest version of
ucspi-proxy, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1007496@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Germann <bage@debian.org> (supplier of updated ucspi-proxy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 03 Dec 2022 13:59:03 +0100
Source: ucspi-proxy
Architecture: source
Version: 0.99-3
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group <packages@qa.debian.org>
Changed-By: Bastian Germann <bage@debian.org>
Closes: 1007496
Changes:
 ucspi-proxy (0.99-3) unstable; urgency=medium
 .
   * QA upload
   * Convert to 3.0 source format (Closes: #1007496)
   * d/watch: Scan upstream archive
Checksums-Sha1:
 fd32cb41984c145dbc71d158ee206f5610a0dcb4 1529 ucspi-proxy_0.99-3.dsc
 83f08313ff0d8c7edb5ad285b1bd7c3254fa9c7a 4504 ucspi-proxy_0.99-3.debian.tar.xz
 ccf7a5f39857f7d4dd8f814d1f72916caf36e275 4668 ucspi-proxy_0.99-3_source.buildinfo
Checksums-Sha256:
 7b7f9beba521125654361c0843522b76cccb5d8a8f1bb92c467c5a87edcf8164 1529 ucspi-proxy_0.99-3.dsc
 25a11532caeb41146cda1057d0e2e500e8ce5c37496f12ea8d57c1aedcb5060c 4504 ucspi-proxy_0.99-3.debian.tar.xz
 e122ca8e2a7359d6c528881306b191179531a0522aa9a74dbcfc37e2f15da193 4668 ucspi-proxy_0.99-3_source.buildinfo
Files:
 694f3226dd2a0324c00c8b87a72c965c 1529 net optional ucspi-proxy_0.99-3.dsc
 1380f16a4a6a1a4dae44ccac3c3e383c 4504 net optional ucspi-proxy_0.99-3.debian.tar.xz
 fed0708dda01c7db895391c66605c8d1 4668 net optional ucspi-proxy_0.99-3_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=y3Q4
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: