--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: RFP: perle-serial -- Perle multiport serial device driver
- From: Adam Cécile (Le_Vert) <gandalf@le-vert.net>
- Date: Tue, 21 Nov 2006 16:36:54 +0100
- Message-id: <20061121153654.24965.98543.reportbug@hellscream.local>
Package: wnpp
Severity: wishlist
* Package name : perle-serial
Version : 3.3.0
Upstream Author : Perle Sytems Limited
* URL : http://www.perle.com/downloads/multi_port.shtml
* License : GPL
Programming Lang: C
Description : Perle multiport serial device driver
Perl multiport serial device are PCI cards that provides several serial
ports.
It works like a charm on kernel 2.6.16 and the whole driver is GPL'ed.
It builds fine and won't need much work to get it into debian.
Here is the sources :
http://www.perle.com/downloads/drivers/ultraport/linux/perle-serial-3.3.0-19.tgz
I suggest creating two package:
perle-serial-source -- Perle multiport serial device kernel module
sources
perle-serial-utils -- Utilities for Perl multiport serial device
I'd be happy to do it by myself, however I don't have enough C knowledge
to maintain a kernel module.
Thanks in advance,
Regards, Adam Cécile.
-- System Information:
Debian Release: 4.0
APT prefers testing
APT policy: (900, 'testing'), (400, 'unstable')
Architecture: amd64 (x86_64)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-1-amd64
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
--- End Message ---
--- Begin Message ---
Hello,
This is an automatic mail sent to close the RFP you have reported or
are involved with.
Your RFP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.
As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not
intended by owners and submitters (like you) to be closed, for
example if the RFP is still of your interest, or there has been
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).
To re-open it, you simply have to mail control@bugs.debian.org
with a body text like this:
reopen 399719
stop
Further comments on the work done in the bug sent to
399719@bugs.debian.org would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <damog@debian.org>.
A similar process is being applied to other kind of wnpp bugs.
Thanks for your cooperation,
-- David Moreno Garza <damog@debian.org>.
--- End Message ---