[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#775203: marked as done (xserver-xorg-input-vmmouse: please enable building on x32)



Your message dated Wed, 28 Oct 2015 16:37:23 +0000
with message-id <E1ZrTj1-0002O6-TC@franck.debian.org>
and subject line Bug#775203: fixed in xserver-xorg-input-vmmouse 1:13.1.0-1
has caused the Debian Bug report #775203,
regarding xserver-xorg-input-vmmouse: please enable building on x32
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
775203: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775203
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: xserver-xorg-input-vmmouse
Version: 1:13.0.0-1
Severity: wishlist
Tags: patch
User: debian-x32@lists.debian.org
Usertags: port-x32

Hi!
Please enable this package on the x32 architecture.  The only change needed 
is adding x32 to debian/control.

Debdiff attached.
diff -u xserver-xorg-input-vmmouse-13.0.0/debian/changelog xserver-xorg-input-vmmouse-13.0.0/debian/changelog
--- xserver-xorg-input-vmmouse-13.0.0/debian/changelog
+++ xserver-xorg-input-vmmouse-13.0.0/debian/changelog
@@ -1,3 +1,9 @@
+xserver-xorg-input-vmmouse (1:13.0.0-1+x32) jessie-x32; urgency=medium
+
+  * Enable on x32.
+
+ -- Adam Borowski <kilobyte@angband.pl>  Mon, 12 Jan 2015 14:22:41 +0100
+
 xserver-xorg-input-vmmouse (1:13.0.0-1) unstable; urgency=low
 
   [ Michele Cane ]
diff -u xserver-xorg-input-vmmouse-13.0.0/debian/control xserver-xorg-input-vmmouse-13.0.0/debian/control
--- xserver-xorg-input-vmmouse-13.0.0/debian/control
+++ xserver-xorg-input-vmmouse-13.0.0/debian/control
@@ -19,7 +19,7 @@
 Vcs-Browser: http://git.debian.org/?p=pkg-xorg/driver/xserver-xorg-input-vmmouse.git
 
 Package: xserver-xorg-input-vmmouse
-Architecture: i386 amd64
+Architecture: i386 amd64 x32
 Depends:
  ${shlibs:Depends},
  ${misc:Depends},

--- End Message ---
--- Begin Message ---
Source: xserver-xorg-input-vmmouse
Source-Version: 1:13.1.0-1

We believe that the bug you reported is fixed in the latest version of
xserver-xorg-input-vmmouse, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 775203@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julien Cristau <jcristau@debian.org> (supplier of updated xserver-xorg-input-vmmouse package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 28 Oct 2015 16:20:04 +0000
Source: xserver-xorg-input-vmmouse
Binary: xserver-xorg-input-vmmouse
Architecture: source
Version: 1:13.1.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian X Strike Force <debian-x@lists.debian.org>
Changed-By: Julien Cristau <jcristau@debian.org>
Description:
 xserver-xorg-input-vmmouse - X.Org X server -- VMMouse input driver to use with VMWare
Closes: 775203
Changes:
 xserver-xorg-input-vmmouse (1:13.1.0-1) unstable; urgency=medium
 .
   * Team upload
 .
   [ Andreas Boll ]
   * Enable on x32 (Closes: #775203).
   * Fix Vcs-* fields.
 .
   [ Julien Cristau ]
   * New upstream release.
Checksums-Sha1:
 69febc61a1b123c5063260950b7decca644875d2 2170 xserver-xorg-input-vmmouse_13.1.0-1.dsc
 b3b49bc66f0f21e909fc9fe07aa69065ee2c670b 394453 xserver-xorg-input-vmmouse_13.1.0.orig.tar.gz
 91e8bdf6cb5addc0b72ca9b5cc1a5f626dd391c8 8717 xserver-xorg-input-vmmouse_13.1.0-1.diff.gz
Checksums-Sha256:
 279c03eb8c00cf9ebce3cdf5e5b720f81824a52f595364ec403367f5e6994cf6 2170 xserver-xorg-input-vmmouse_13.1.0-1.dsc
 1a6c4a44b705f2c46d38c6ce17a4ffb4e37f4b6968bb827c59a2df3b65742831 394453 xserver-xorg-input-vmmouse_13.1.0.orig.tar.gz
 62be423616a9eef6dd86abcef879681ca6ea3c2e14e3f612a1398cd4f31908fd 8717 xserver-xorg-input-vmmouse_13.1.0-1.diff.gz
Files:
 df468384a6c0b08596d9dfeb6d2abe1b 2170 x11 optional xserver-xorg-input-vmmouse_13.1.0-1.dsc
 9cfd8c7443596afd73dfaf13d669d964 394453 x11 optional xserver-xorg-input-vmmouse_13.1.0.orig.tar.gz
 d622cf0741c42871a7bc6eb1cb7e0220 8717 x11 optional xserver-xorg-input-vmmouse_13.1.0-1.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=mwCa
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: