Bug#234206: marked as done (RFP: python-readyexec -- system to pre-load Python programs)
Your message dated Wed, 21 Sep 2005 16:00:48 -0600
with message-id <E1EICe0-0004Qe-00@merkel.debian.org>
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 22 Feb 2004 15:49:09 +0000
>From grantbow@svpal.org Sun Feb 22 07:49:09 2004
Return-path: <grantbow@svpal.org>
Received: from ns.svpal.org [209.68.147.67]
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Auvqv-0005VD-00; Sun, 22 Feb 2004 07:49:09 -0800
Received: from ns.svpal.org (localhost.svpal.org [127.0.0.1])
by ns.svpal.org (8.12.10/8.12.9) with ESMTP id i1MFkvca060367;
Sun, 22 Feb 2004 07:46:58 -0800 (PST)
(envelope-from grantbow@svpal.org)
Received: from localhost (grantbow@localhost)
by ns.svpal.org (8.12.10/8.12.9/Submit) with ESMTP id i1MFkrKA060364;
Sun, 22 Feb 2004 07:46:53 -0800 (PST)
X-Authentication-Warning: ns.svpal.org: grantbow owned process doing -bs
Date: Sun, 22 Feb 2004 07:46:53 -0800 (PST)
From: Grant Bowman <grantbow@svpal.org>
To: submit@bugs.debian.org
cc: Frank Tobin <ftobin@users.sourceforge.net>,
Bastian Kleineidam <calvin@debian.org>, grantbow@grantbow.com
Subject: RFP: python-readyexec -- system to pre-load Python programs
Message-ID: <20040222073850.U58218@ns.svpal.org>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
X-Filter-Version: 1.9 (borg.svpal.org)
X-MailFilter: Yes
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_02_22
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-5.0 required=4.0 tests=HAS_PACKAGE autolearn=no
version=2.60-bugs.debian.org_2004_02_22
X-Spam-Level:
Package: wnpp
Severity: wishlist
* Package name : python-readyexec
Version : 0.4.0
Upstream Author : Frank J. Tobin <ftobin@users.sf.net>
* URL : http://readyexec.sf.net/
* License : LGPL
Description : system to pre-load Python programs
ReadyExec is a client-server system designed to alleviate the
problem of high-startup-costing applications which are run
repeatedly (e.g., in procmail) and use their args, environment,
stdio files and exit code to interact can be used within ReadyExec
with very little work.
Keywords: client server preload
Platform: POSIX
There are only 19 files in here total, a very simple system. The setup
as client and server components (including security concerns, etc) might
take a bit of configuration for a new packager.
The reason I'm interested in this is because pyzor will function much
more efficiently (loading only once) as described above. SpamAssassin's
execution time is supposed to decrease with a similar type system
(spamc) from x (called directly from procmail) to 1/2 x - 1/5 x for each
email processed.
Pyzor is a collaborative, networked system to detect and block spam
using identifying digests of messages. I'm taking the liberty of
copying the upstream author and the Pyzor package maintainer on this.
Follow-up information should be submitted to the bug number (similar to
234xxx, whatever gets assigned) in the form 234xxx@bugs.debian.org. It
can also be viewed or referenced in an upstream readme via
http://bugs.debian.org/234xxx
Regards,
--
-- Grant Bowman <grantbow@svpal.org>
-- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux sarge 2.4.24-1-k6 #1 Wed Feb 4 22:36:52 EST 2004 i586
Locale: LANG=en, LC_CTYPE=en (ignored: LC_ALL set to en_US)
---------------------------------------
Received: (at 234206-done) by bugs.debian.org; 21 Sep 2005 22:00:48 +0000
>From damog@merkel.debian.org Wed Sep 21 15:00:48 2005
Return-path: <damog@merkel.debian.org>
Received: from merkel.debian.org [192.25.206.16] (mail)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1EICe0-00057V-00; Wed, 21 Sep 2005 15:00:48 -0700
Received: from damog by merkel.debian.org with local (Exim 3.36 1 (Debian))
id 1EICe0-0004Qe-00; Wed, 21 Sep 2005 16:00:48 -0600
To: 234206-done@bugs.debian.org
Subject: WNPP bug closing
Message-Id: <E1EICe0-0004Qe-00@merkel.debian.org>
From: David Moreno Garza <damog@merkel.debian.org>
Date: Wed, 21 Sep 2005 16:00:48 -0600
Delivered-To: 234206-done@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_00,VALID_BTS_CONTROL
autolearn=no version=2.60-bugs.debian.org_2005_01_02
Hello,
This is an automatic mail sent to close the RFP you have reported or
are involved with.
Your RFP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 450 days.
- It hasn't had any activity recently.
As this an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not
intended by owners and submitters (like you) to be closed, for
example if the RFP is still of your interest, or there has been
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).
To re-open it, you simply have to mail control@bugs.debian.org
with a body text like this:
reopen 234206
thanks bts
Further comments on the work done in the bug sent to
234206@bugs.debian.org would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <damog@debian.org>.
This is the second massive wnpp closing that is being done. The next close
will be done on inactive RFPs older than 365 days and finally, an automatic
script will close, by default, *inactive* RFPs when they reach one year of
inactivity.
A similar process is being applied to other kind of wnpp bugs.
Thanks for your cooperation,
-- David Moreno Garza <damog@debian.org> Wed, 20 Sep 2005 17:06:42 -0500
Reply to: