Your message dated Thu, 14 Jul 2016 16:41:04 +0000 (UTC) with message-id <1225764226.5016162.1468514464219.JavaMail.yahoo@mail.yahoo.com> and subject line Re: Bug#830907: RFS: pam-u2f/1.0.4-0.1 [NMU] has caused the Debian Bug report #830908, regarding RFS: libu2f-server/1.0.1-1.3 [NMU] to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 830908: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830908 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: RFS: libu2f-server/1.0.1-1.3 [NMU]
- From: Nicolas Braud-Santoni <nicolas@braud-santoni.eu>
- Date: Tue, 12 Jul 2016 22:48:57 +0200
- Message-id: <[🔎] 146835653783.12474.16143831993485013673.reportbug@harbard.iaik.tugraz.at>
Package: sponsorship-requests Severity: normal Dear mentors, I am looking for a sponsor for my package "libu2f-server" * Package name : libu2f-server Version : 1.0.1-1.3 Upstream Author : [fill in name and email of upstream] * URL : [fill in URL of upstreams web site] * License : [fill in] Section : utils It builds those binary packages: libu2f-server-dev - Development files for the U2F server C library libu2f-server libu2f-server0 - Universal 2nd Factor (U2F) server communication C Library u2f-server - Command line tool to do Universal 2nd Factor (U2F) operations My prepared upload is available on mentors.debian.net: https://mentors.debian.net/package/libu2f-server Alternatively, one can download the package with dget: dget -x https://mentors.debian.net/debian/pool/main/libu/libu2f-server/libu2f-server_1.0.1-1.3.dsc This upload enables build-time hardening features, and fixes some minor issues: - use HTTPS for the Vcs-Git link; - bump Standards-Version to 3.9.8 (no change required). I am aware that sponsored NMUs are not a sane way to maintain this package in the long term. As such, I reached out to the pkg-auth team, applied for membership there, and suggested several changes to make the collaborative maintainance of those packages easier. Best, nicoo
--- End Message ---
--- Begin Message ---
- To: Nicolas Braud-Santoni <nicolas@braud-santoni.eu>, <830907-done@bugs.debian.org>, "830908-done@bugs.debian.org" <830908-done@bugs.debian.org>
- Subject: Re: Bug#830907: RFS: pam-u2f/1.0.4-0.1 [NMU]
- From: Gianfranco Costamagna <locutusofborg@debian.org>
- Date: Thu, 14 Jul 2016 16:41:04 +0000 (UTC)
- Message-id: <1225764226.5016162.1468514464219.JavaMail.yahoo@mail.yahoo.com>
- Reply-to: Gianfranco Costamagna <locutusofborg@debian.org>
- In-reply-to: <[🔎] 1340212123.4964254.1468511095690.JavaMail.yahoo@mail.yahoo.com>
- References: <[🔎] 146835625786.11903.7963630392113144501.reportbug@harbard.iaik.tugraz.at> <[🔎] 1340212123.4964254.1468511095690.JavaMail.yahoo@mail.yahoo.com>
Upstream ack'd, both sponsored. G.
--- End Message ---