Your message dated Wed, 14 Sep 2005 21:55:19 -0500 (CDT)
with message-id <[EMAIL PROTECTED]>
and subject line WNPP bug closed
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 24 Dec 2003 15:18:40 +0000
>From [EMAIL PROTECTED] Wed Dec 24 09:18:39 2003
Return-path: <[EMAIL PROTECTED]>
Received: from pcse05.softeng.tue.nl (arkas) [131.155.99.172]
by master.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1AZAUV-0004ev-00; Wed, 24 Dec 2003 09:00:03 -0600
Received: from micha by arkas with local (Exim 3.36 #1 (Debian))
id 1AZAUI-0006Wx-00; Wed, 24 Dec 2003 15:59:50 +0100
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: [EMAIL PROTECTED]
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: RFP: xdirectfb -- X server with DirectFB backend
X-Mailer: reportbug 2.37
Date: Wed, 24 Dec 2003 15:59:49 +0100
Message-Id: <[EMAIL PROTECTED]>
Sender: <[EMAIL PROTECTED]>
X-BadReturnPath: [EMAIL PROTECTED] rewritten as [EMAIL PROTECTED]
using "From" header
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin
2.60-master.debian.org_2003_11_25-bugs.debian.org_2003_12_15
(1.212-2003-09-23-exp) on master.debian.org
X-Spam-Status: No, hits=-3.8 required=4.0 tests=HAS_PACKAGE,NO_REAL_NAME
autolearn=no
version=2.60-master.debian.org_2003_11_25-bugs.debian.org_2003_12_15
X-Spam-Level:
Package: wnpp
Severity: wishlist
* Package name : xdirectfb
Version : 4.2.1
Upstream Author : Denis Oliver Kropp <[EMAIL PROTECTED]>
* URL : http://directfb.org/
* License : LGPL
Description : X server with DirectFB backend
(Include the long description here.)
XDirectFB is a patch for the XFree86 server. This is the readme:
<readme>
XDirectFB
---------
XDirectFB is a rootless X Server using DirectFB windows for
X11 toplevel windows. This way you can adjust the opacity
of every application with your mouse wheel (while holding
CapsLock or Meta down over a window). More details about
these shortcuts can be found in the DirectFB README.
Window movements are initiated by the applications or
the window manager. The graphical movement is done by
DirectFB using available hardware acceleration.
Overlapping toplevel windows do not cause expose events,
i.e. redrawing of the window contents, as they are DirectFB
windows and therefore have an own surface, a.k.a. backing store.
XDirectFB Options:
-defaultOpacity <opacity> set the default opacity for toplevel windows,
value ranges from 1 (almost invisible) to 255
(fully opaque).
-unfocusedOpacity <opacity> set the opacity used for unfocused toplevel
windows,
value ranges from 1 (almost invisible) to 255
(fully opaque).
-enableUnfocused enable usage of unfocused opacity value.
-enableFadeIn enable fade in of showing windows.
-enableFadeOut enable fade out of hiding windows.
-enableRoot enable root window, still experimental.
-displayLayer <ID> choose display layer (0=primary, for other IDs
try "dfbinfo").
XDirectFB is written by Denis Oliver Kropp <[EMAIL PROTECTED]>.
It's heavily based on XDarwin and some KDrive code.
Short installation instructions:
- Check out module "xc" from XFree CVS (www.xfree.org)
- Apply patch "xc-directfb.diff" with "-p0" within "xc/"
- Copy directory "programs/Xserver/hw/directfb" into "xc/programs/Xserver/hw/"
- Copy files in "config/cf/" into "xc/config/cf/"
- Adjust "xc/config/cf/host.def"
- Run "make World", lean back, run "make" for safetiness, run "make install".
The default installation directory (defined in host.def) is /usr/local/X11R6.
</readme>
Basically, it's a patch for the xfree86 source package generating a XDirectFB
binary. Only this binary is different from the ordinary xserver-xfree86
installation.
-- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux arkas 2.4.23 #1 Mon Dec 8 09:30:58 CET 2003 i686
Locale: LANG=C, LC_CTYPE=C
---------------------------------------
Received: (at 225010-done) by bugs.debian.org; 15 Sep 2005 03:08:01 +0000
>From [EMAIL PROTECTED] Wed Sep 14 20:08:01 2005
Return-path: <[EMAIL PROTECTED]>
Received: from dsl-201-129-37-187.prod-infinitum.com.mx (cerdita.damog.net)
[201.129.37.187]
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1EFjuz-0001Kx-00; Wed, 14 Sep 2005 19:56:10 -0700
Received: by cerdita.damog.net (Postfix, from userid 1000)
id 9E44B107BE9; Wed, 14 Sep 2005 21:55:19 -0500 (CDT)
To: [EMAIL PROTECTED]
Subject: WNPP bug closed
Message-Id: <[EMAIL PROTECTED]>
Date: Wed, 14 Sep 2005 21:55:19 -0500 (CDT)
From: [EMAIL PROTECTED] (David Moreno Garza)
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_00,VALID_BTS_CONTROL
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 573
Hello,
This is an automatic mail sent to close the RFP you have reported or
are involved with.
Your RFP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 600 days.
- It haven't had any activity recently.
- The amount of ITPs on the Debian BTS is huge and we need to
clean up a bit the place.
As this an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not
intended by owners and submitters (like you) to be closed, for
example if the RFP is still of your interest, or there has been
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).
To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:
reopen 123456
thanks bts
Replacing '123456' for the number of your RFP bug. The subject of the
mail is ignored. Or if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <[EMAIL PROTECTED]>.
This is the first mass wnpp closing that will be done. The next close
will be done on inactive RFPs older than 450 days and finally, the
ones older than 365 days (an automatic script will close *inactive*
RFPs when they reach one year old).
A similar process is being applied to the ITP wnpp bugs in these
days.
Thanks for your cooperation,
-- David Moreno Garza <[EMAIL PROTECTED]> Wed, 14 Sep 2005 21:54:42 -0500
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]