Your message dated Mon, 14 Sep 2020 20:49:08 +0200
with message-id <[email protected]>
and subject line Opencpn updated
has caused the Debian Bug report #960258,
regarding opencpn: build current sources into unstable/testing
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
960258: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960258
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: opencpn
Severity: normal
Tags: upstream

Dear Maintainer,


please update opencpn to current upstream sources and build a new
package into Debian unstable/testing.
This would support current upstream beta testing and should result
in a better package than the current one included in Debian unstable/testing.

Thanks a lot,

Florian La Roche


-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.6.0-1-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND, TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

--- End Message ---
--- Begin Message ---
opencpn is updated to 5.2.0+dfsg1-1, including the new plugin
downloader. This is the last available upstream version. Closing

--- End Message ---

Reply via email to