Your message dated Fri, 11 May 2018 09:02:36 +0200 with message-id <20180511070236.jy4zkj3pjoccepar@sk2.org> and subject line Re: Bug#898296: RFS: passwordsafe/1.05+dfsg-2~bpo9+1 -- simple and secure password management has caused the Debian Bug report #898296, regarding RFS: passwordsafe/1.05+dfsg-2~bpo9+1 -- simple and secure password management to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 898296: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898296 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: RFS: passwordsafe/1.05+dfsg-2~bpo9+1 -- simple and secure password management
- From: Bill Blough <devel@blough.us>
- Date: Wed, 9 May 2018 16:35:38 -0400
- Message-id: <[🔎] 20180509203538.3rliiyxsyfzt3oks@blough.us>
Package: sponsorship-requests Severity: normal Dear mentors, I am looking for a sponsor for my package "passwordsafe". Since it hasn't yet been backported for strech, it must go through NEW. However, I am a DM with upload rights and I'm in the backports ACL. So after the initial upload, I will be able to upload future backported versions myself. * Package name : passwordsafe Version : 1.05+dfsg-2~bpo9+1 Upstream Author : Rony Shapiro <ronys@users.sf.net> * URL : https://pwsafe.org * License : Artistic 2.0 Section : utils It builds those binary packages: passwordsafe - Simple & Secure Password Management passwordsafe-common - architecture independent files for Password Safe To access further information about this package, please visit the following URL: https://mentors.debian.net/package/passwordsafe Alternatively, one can download the package with dget using this command: dget -x https://mentors.debian.net/debian/pool/main/p/passwordsafe/passwordsafe_1.05+dfsg-2~bpo9+1.dsc More information about passwordsafe can be obtained from https://www.pwsafe.org Changes since the last upload: passwordsafe (1.05+dfsg-2~bpo9+1) stretch-backports; urgency=medium . * Rebuild for stretch-backports. . passwordsafe (1.05+dfsg-2) unstable; urgency=medium . * Fix build issue that causes help files to not be found by the program due to a mixed release/debug build (patch forwarded) . passwordsafe (1.05+dfsg-1) unstable; urgency=medium . * New upstream release * Remove patches applied upstream * Update standards to version 4.1.4 (no changes) . passwordsafe (1.04+dfsg-2) unstable; urgency=medium . * Fixes for big-endian architectures (forwarded). . passwordsafe (1.04+dfsg-1) unstable; urgency=medium . * New upstream release * Remove patch applied upstream * Update standards version to 4.1.3 - Adjust perl shebangs * Update dh compat to 11 . passwordsafe (1.03+dfsg-2) unstable; urgency=medium . * Add patch to fix test failure on 32-bit systems (forwarded) . passwordsafe (1.03+dfsg-1) unstable; urgency=medium . * Update upstream signing key * New upstream version * Refresh quilt patches * Update standards version to 4.1.1 - change copyright format URL to HTTPS * Lintian fixes - Override false positive spelling error - Enable hardening flags * Update dh compat to 10 Regards, Bill Blough
--- End Message ---
--- Begin Message ---
- To: Bill Blough <devel@blough.us>, 898296-done@bugs.debian.org
- Subject: Re: Bug#898296: RFS: passwordsafe/1.05+dfsg-2~bpo9+1 -- simple and secure password management
- From: Stephen Kitt <skitt@debian.org>
- Date: Fri, 11 May 2018 09:02:36 +0200
- Message-id: <20180511070236.jy4zkj3pjoccepar@sk2.org>
- In-reply-to: <[🔎] 20180509203538.3rliiyxsyfzt3oks@blough.us>
- References: <[🔎] 20180509203538.3rliiyxsyfzt3oks@blough.us>
Hi Bill, On Wed, May 09, 2018 at 04:35:38PM -0400, Bill Blough wrote: > I am looking for a sponsor for my package "passwordsafe". Since it hasn't > yet been backported for strech, it must go through NEW. However, I am a > DM with upload rights and I'm in the backports ACL. So after the initial > upload, I will be able to upload future backported versions myself. Uploaded, thanks! I forgot the -v option but since there are no closed bugs it will only result in a truncated changelog in the message to -changes. I noticed you downgraded the debhelper dependency to 10; backported packages can build-depend on other backported packages, so 11~ would have worked too. Regards, StephenAttachment: signature.asc
Description: PGP signature
--- End Message ---