Your message dated Tue, 11 Jun 2024 14:34:49 +0000
with message-id <e1sh2ah-005awy...@fasolo.debian.org>
and subject line Bug#1007488: fixed in randtype 1.13-11.1
has caused the Debian Bug report #1007488,
regarding randtype: please consider upgrading to 3.0 source format
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1007488: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007488
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: randtype
Version: 1.13-11
Severity: wishlist
Tags: bookworm sid
Usertags: format1.0 format1.0-nkp-nv

Dear maintainer,

This package is among the few (1.9%) that still use source format 1.0 in
bookworm.  Please upgrade it to source format 3.0, as (1) this format has many
advantages, as documented in https://wiki.debian.org/Projects/DebSrc3.0 ; (2)
this contributes to standardization of packaging practices.

Please note that this is also a sign that the packaging of this software
could maybe benefit from a refresh. It might be a good opportunity to
look at other aspects as well.

It was noticed in https://lists.debian.org/debian-devel/2022/03/msg00096.html
that the conversion for this package is likely trivial, and builds bit-by-bit
identical binary packages.


This mass bug filing was discussed on debian-devel@:
https://lists.debian.org/debian-devel/2022/03/msg00074.html

Thanks

Lucas

--- End Message ---
--- Begin Message ---
Source: randtype
Source-Version: 1.13-11.1
Done: Bastian Germann <b...@debian.org>

We believe that the bug you reported is fixed in the latest version of
randtype, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1007...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Germann <b...@debian.org> (supplier of updated randtype package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 01 Jun 2024 13:36:14 +0000
Source: randtype
Architecture: source
Version: 1.13-11.1
Distribution: unstable
Urgency: medium
Maintainer: Eugene V. Lyubimkin <jac...@debian.org>
Changed-By: Bastian Germann <b...@debian.org>
Closes: 929162 1007488
Changes:
 randtype (1.13-11.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Convert to source format 3.0. (Closes: #1007488)
 .
   [ Helmut Grohne ]
   * Fix FTCBFS: Let dh_auto_build pass cross tools to make. (Closes: #929162)
Checksums-Sha1:
 b0370f3d14e7e5714059eaa27b4f0f4d3b7da125 1579 randtype_1.13-11.1.dsc
 2aedeea4cb2847a9488f4d4f96f521250b9da489 2764 randtype_1.13-11.1.debian.tar.xz
 d4ba401c130f6aca81d36a7aa83a299756e198a3 5361 
randtype_1.13-11.1_source.buildinfo
Checksums-Sha256:
 5ce943ba316fd686c6cbc196a77ae5fbbfd2f30a5929a557f9b362302d88aa0a 1579 
randtype_1.13-11.1.dsc
 6e48560a8c89136ed395b81dc4c2bca312e218cf7302178cbe85014f6fd33e54 2764 
randtype_1.13-11.1.debian.tar.xz
 4cc6f766b0530ca67e718974bf4571afbee4f8e93619a8a741992e5b2d05c20d 5361 
randtype_1.13-11.1_source.buildinfo
Files:
 c7006194f2a37b9d0b9e0021e62eb0d9 1579 games optional randtype_1.13-11.1.dsc
 85cf866186df58c88479be895fa61001 2764 games optional 
randtype_1.13-11.1.debian.tar.xz
 7a576496238db32c481f815ea8c58d2c 5361 games optional 
randtype_1.13-11.1_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQHEBAEBCgAuFiEEQGIgyLhVKAI3jM5BH1x6i0VWQxQFAmZbJOAQHGJhZ2VAZGVi
aWFuLm9yZwAKCRAfXHqLRVZDFHldDACifK/Ipty5iCEch+Utc+PywK5aCtB1hTul
g/lRxGG74JYwqzENibG/SrZjI6Uq1HfSOzD2pfyJeVMSCVVjRCueaosvWPzy1I7T
lcxlNXEWORq7lW8hSSzxRb+1ZRJKy5SWHUCCRRFA/mrPU/YnqBeCGsqcHUtSyvPZ
A8X+AitcCb7M9/+qfNXAFnp05mnlXuSniSVspJ9PyjPWKEYfmuv1uPR0L0jhH4N2
AP4jR19l6r302TPFfdoYRd9szIaQxmUEvuzXcfEzwM0PbeVFm1Y3f8/NFmDjWN21
hicEdjtpil0AiMGB5Fwk8vZnwtujj0xu2YDuVXHrGaugsVfXLQbbQ+a1TafMMZQK
daic1Na3H+vjs2oz4a6D0J65pGiZ82WnRvepVgRzAQWXTNCb4HhL8qd2YJcaqmA9
39wr8iy3fB2MvgIJH0ZUOKyRDfr7yNGbndrSfaUTqJYxE60RwGbaIGax7UcLsjWE
FrQ925Zgub8yv67tmOKc7z7sFYw2bzE=
=6MW7
-----END PGP SIGNATURE-----

Attachment: pgpnlTt1Gtdgy.pgp
Description: PGP signature


--- End Message ---

Reply via email to