Your message dated Fri, 18 Nov 2022 21:49:23 +0000
with message-id <[email protected]>
and subject line Bug#1023516: fixed in evilwm 1.4.2-1
has caused the Debian Bug report #1023516,
regarding evilwm: ignores input when Num Lock is enabled
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1023516: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023516
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: evilwm
Version: 1.4.0-1
Severity: normal

Dear Maintainer,
After the upgrade to 1.4.0-1, evilwm started to ignore all the input
when Num Lock is enabled (focus follows mouse, but nothing else works).
Turning the Num Lock off makes it work again.

Apparently now that bindings became configurable, it could be fixed by
doubling all the bindings to write them both with and without the mod2,
but the default configuration is borderline unusable and having to
reconfigure it this way is quite annoying to say the least.

-k


-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (900, 'testing'), (700, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.19.0-1-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=pl_PL.UTF-8, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages evilwm depends on:
ii  libc6       2.35-4
ii  libx11-6    2:1.8.1-2
ii  libxext6    2:1.3.4-1+b1
ii  libxrandr2  2:1.5.2-2+b1

evilwm recommends no packages.

Versions of packages evilwm suggests:
ii  xfonts-100dpi    1:1.0.5
ii  xfonts-75dpi     1:1.0.5
ii  xfonts-terminus  4.48-3.1
ii  xterm            375-1

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: evilwm
Source-Version: 1.4.2-1
Done: Mateusz Łukasik <[email protected]>

We believe that the bug you reported is fixed in the latest version of
evilwm, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mateusz Łukasik <[email protected]> (supplier of updated evilwm package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 18 Nov 2022 21:13:27 +0100
Source: evilwm
Architecture: source
Version: 1.4.2-1
Distribution: unstable
Urgency: medium
Maintainer: Mateusz Łukasik <[email protected]>
Changed-By: Mateusz Łukasik <[email protected]>
Closes: 1023516
Changes:
 evilwm (1.4.2-1) unstable; urgency=medium
 .
   [ Debian Janitor ]
   * Trim trailing whitespace.
   * Update renamed lintian tag names in lintian overrides.
   * Set field Upstream-Contact in debian/copyright.
   * Remove obsolete fields Contact, Name from debian/upstream/metadata (already
     present in machine-readable debian/copyright).
 .
   [ Mateusz Łukasik ]
   * New upstream release. (Closes: #1023516)
   * Update debian/source/lintian-overrides.
Checksums-Sha1:
 f27c8006150e60b01b833a75830226e67fc0a3c9 1864 evilwm_1.4.2-1.dsc
 33191ce8acbfce850ce3dedb2b9eb516990591d6 73716 evilwm_1.4.2.orig.tar.gz
 6dd7797d63afc1538b73a27a495ec199239bccf3 6320 evilwm_1.4.2-1.debian.tar.xz
 1e6e526534b9e9e3b333e2a7f255b6a69e9ff1cc 6190 evilwm_1.4.2-1_source.buildinfo
Checksums-Sha256:
 041bba076cffe6558cd42c0b5c6cdb5f441ef0867e49cf1e01f3586731d7ca95 1864 
evilwm_1.4.2-1.dsc
 4212d6d90cb005b2cc88814bc8537736b4950ab58264bbb65b8807ac63bdc4b9 73716 
evilwm_1.4.2.orig.tar.gz
 d2500e78e738679e1c3f4f30298f9a37aee189ac4fbcbda46708f3a57a4f4f62 6320 
evilwm_1.4.2-1.debian.tar.xz
 90f4b5ebdc434678fd4be76d5cdcdb70936cdb1d2f2c3bad292e05c79c48a39c 6190 
evilwm_1.4.2-1_source.buildinfo
Files:
 ab33761b2f3bff6fb8548af0ef92828f 1864 x11 optional evilwm_1.4.2-1.dsc
 7e4d9f4677151249a96b2f51c168a294 73716 x11 optional evilwm_1.4.2.orig.tar.gz
 aa52f80b4e6eaa17c4fae0e220a253cd 6320 x11 optional evilwm_1.4.2-1.debian.tar.xz
 3b2cf68f5831acf75bf11432347b367c 6190 x11 optional 
evilwm_1.4.2-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=goH6
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to