Bug#434489: ITP: cadabra -- Field-theory motivated computer algebra system
Package: wnpp Severity: wishlist * Package name: cadabra Version : 0.119 Upstream Authors: Kasper Peeters * URL : http://www.aei.mpg.de/~peekas/cadabra/ * License : GNU GPL v2 Description : Field-theory motivated computer algebra system Cadabra is a computer algebra system designed specifically for the solution of problems encountered in field theory. It has extensive functionality for tensor polynomial simplification including multi-term symmetries, fermions and anti-commuting variables, Clifford algebras and Fierz transformations, implicit coordinate dependence, multiple index types and many more. The input format is a subset of TeX. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#419214: marked as done (RFA: screentest -- Utility to test the quality of CRT screens)
Your message dated Tue, 24 Jul 2007 07:32:02 + with message-id [EMAIL PROTECTED] and subject line Bug#419214: fixed in screentest 1.0-5 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: screentest Severity: wishlist http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398350 http://packages.qa.debian.org/s/screentest.html http://packages.debian.org/screentest http://www.fi.muni.cz/~kas/screentest/ http://www.debian.org/devel/wnpp/ I have currently no plans to do the upstream work to fix bug 398350. If you want to do that, then you're welcome to take over this Debian package. It's OK to do that without asking me. Non-DD's are welcome to ask my help. In the meantime I intend to continue to do basic package maintenance. signature.asc Description: This is a digitally signed message part ---End Message--- ---BeginMessage--- Source: screentest Source-Version: 1.0-5 We believe that the bug you reported is fixed in the latest version of screentest, which is due to be installed in the Debian FTP archive: screentest_1.0-5.diff.gz to pool/main/s/screentest/screentest_1.0-5.diff.gz screentest_1.0-5.dsc to pool/main/s/screentest/screentest_1.0-5.dsc screentest_1.0-5_i386.deb to pool/main/s/screentest/screentest_1.0-5_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Giacomo Catenazzi [EMAIL PROTECTED] (supplier of updated screentest package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Tue, 24 Jul 2007 08:30:06 +0200 Source: screentest Binary: screentest Architecture: source i386 Version: 1.0-5 Distribution: unstable Urgency: low Maintainer: Giacomo Catenazzi [EMAIL PROTECTED] Changed-By: Giacomo Catenazzi [EMAIL PROTECTED] Description: screentest - Utility to test the quality of screens Closes: 398350 419214 Changes: screentest (1.0-5) unstable; urgency=low . * New maintainer. Closes: #419214 * use newer libgtk and libglib libraries. Closes: #398350 * debian/control, Makefile.am: Updated package dependencies (build and runtime) * Makefile.am: don't build static version Files: 69fd75d467d60425e5afc43ef7280ef4 764 utils optional screentest_1.0-5.dsc e7b9d649b000a49146e9612c22b285d1 4044 utils optional screentest_1.0-5.diff.gz 989580452004629f664153065c17eef5 18154 utils optional screentest_1.0-5_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGpaci+ZNUJLHfmlcRAiQRAJ0VDEQE4WUaGtIjT232Gc1jOuqDCQCfaLF8 I0jPXspiz9Uf+zq9FzFqOUw= =kGF+ -END PGP SIGNATURE- ---End Message---
Bug#401575: [pkg-lighttpd] lighttpd RFH
On Sat, Jul 21, 2007 at 12:15:55AM +0200, Pierre Habouzit wrote: FWIW I'd like to step up as a lighttpd co-maintainer. I've requested membership on alioth already. Hello someone ? -- ·O· Pierre Habouzit ··O[EMAIL PROTECTED] OOOhttp://www.madism.org pgp5B0b4ASkca.pgp Description: PGP signature
Bug#434492: RFA: workrave -- RSI prevention tool
Package: wnpp Severity: normal I request an adopter for the workrave package. It seems I will not work on a Debian desktop for some time, so I cannot properly test anything. The package description is: Workrave is a program that assists in the recovery and prevention of Repetitive Strain Injury (RSI). The program frequently alerts you to take micro-pauses, rest breaks and restricts you to your daily limit. . It includes a system tray applet that works with Gnome and KDE and has network capabilities to monitor your activity even if switching back and forth between different computers is part of your job. . Workrave offers many more configuration options than other similar tools. . More information about this program can be obtained from http://www.workrave.org/ -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.21-1-686 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#428738: ITA: gtkfontsel
Re: Vincent Fourmond 2007-07-23 [EMAIL PROTECTED] I use gtkfontsel - rather infrequently, I admit - and that's precisely the kind of software you're desperately looking for when doing various configurations, and whose need falls down afterwards. I would personally miss it if it weren't in Debian. Cool. Do you have any recommendations, or know some traps I should be wary of ? Hard work I should be looking forward to ;-) ? Not really. Most of the maintenance work is probably keeping the package alive as gtk-1.2 gets more and more deprecated. Christoph -- signature.asc Description: Digital signature
Bug#434495: ITP: glaurung2 -- free UCI chess engine, to calculate chess moves.
Package: wnpp Severity: wishlist Owner: Oliver Korff [EMAIL PROTECTED] * Package name: glaurung2 Version : 2.e.5 Upstream Author : Romstad Tord [EMAIL PROTECTED] * URL : http://www.glaurungchess.com/ * License : GPL Programming Lang: C++ Description : free UCI chess engine, to calculate chess moves. This is a very strong chess engine, finished 4th place at internatonal ChessWar X. It uses the UCI (universal chess interface), for chess engines as communication protocol. This means to play against it, you will have to use an UCI capable interface, like knights. Or an xboard adapter like polyglot. glaurung can be found at: . http://www.glaurungchess.com/ # Why another chess engine? -- Why another editor? Playing chess means also analyze your own moves with the strongest computer program currently available. Strength here is a relative impression of the user. Giving him various possibilitys. Oliver -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.21-2-686 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#434496: ITP: libpj-java -- The Parallel Java Library
Package: wnpp Severity: wishlist Owner: Manuel Prinz [EMAIL PROTECTED] * Package name: libpj-java Version : 20070703 Upstream Author : Alan Kaminsky [EMAIL PROTECTED] * URL : http://www.cs.rit.edu/~ark/pj.shtml * License : GPL Programming Lang: Java Description : The Parallel Java Library Parallel Java (PJ) is an API and middleware for parallel programming in 100% Java on shared memory multiprocessor (SMP) parallel computers, cluster parallel computers, and hybrid SMP cluster parallel computers. . Homepage: http://www.cs.rit.edu/~ark/pj.shtml -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable'), (200, 'testing') Architecture: amd64 (x86_64) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-amd64 Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: tagging bugs that are closed by packages in NEW as pending
Processing commands for [EMAIL PROTECTED]: # the following bugs are closed by packages in NEW # tags 391103 pending Bug#391103: ITP: xrdp -- RDP server There were no tags set. Tags added: pending tags 396220 pending Bug#396220: linux-modules-extra-2.6_2.6.18-1(m68k/unstable/zeus): FTBFS on m68k There were no tags set. Tags added: pending tags 434335 pending Bug#434335: ITP: [PACKAGE] -- soap library for the lua language version 5.1 There were no tags set. Tags added: pending thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#434517: O: libgringotts -- Development files for the Gringotts data encapsulation library
Package: wnpp Severity: normal -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I intend to orphan the libgringotts package, because the upstream author is missing and does not answer email, and the project homepage has vanished. If someone wants to adopt this package, he/she should be prepared to maintain/develop the software itself. I myself switched to an alternative password manager. The package description is: a small, easy-to-use, thread-safe C library originally developed for Gringotts; its purpose is to encapsulate data (generic: ASCII but also binary data) in an encrypted and compressed file. It uses strong encryption algorithms, to ensure the data is as safe as possible, and allows the user to have the complete control over all the algorithms used in the process. . For encryptions, libGringotts makes use of the MCrypt and MHash C libraries by Nikos Mavroyanopoulos. . Homepage: http://devel.pluto.linux.it/projects/libGringotts/index.php - -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.21treasure1 (PREEMPT) Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/bash -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGpg9QeBwlBDLsbz4RAhLKAJ4uUKL94sCU+zPonvcFvzDsh7CS1QCfU/o4 S9ovIQNRr08DaWdYUeUiyCQ= =EhFh -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#434518: ITP: libsnmp-info-perl -- OO interface to network devices and MIBs through SNMP
Package: wnpp Severity: wishlist Owner: Oliver Gorwits [EMAIL PROTECTED] * Package name: libsnmp-info-perl Version : 1.04 Upstream Author : Eric A. Miller [EMAIL PROTECTED] * URL : http://snmp-info.sourceforge.net/ * License : Perl/Artistic Programming Lang: Perl Description : OO interface to network devices and MIBs through SNMP SNMP::Info gives an object oriented interface to information obtained through SNMP. This module is geared towards network devices; subclasses exist for a number of network devices and common MIBs. The idea is to give a common interface to data from network devices, leaving the device-specific hacks behind the scenes in subclasses. The information may be coming from any number of MIB files and is often vendor specific. SNMP::Info provides a common API for all supported devices. Adding support for your own device is easy, and takes little SNMP knowledge. The module is not limited to network devices. Any MIB or device can be given an objected oriented front-end by making a module that consists of a couple hashes. This module was originally written in support of the NetDisco project. -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-686 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#215367: ITP: pylibpcap - status?
owner 215367 ! thanks On Mon, Jul 23, 2007 at 11:52:19AM +1000, Paul Wise wrote: On Sun, 2007-07-22 at 12:04 +0200, Thomas Bläsing wrote: I'm very interested in maintain this package. So, is there any further working on it or can I take it? Before a package can be uploaded, this bug needs to be fixed: http://sf.net/support/tracker.php?aid=1320469 Looks like it has been fixed in CVS, but not in the latest release. I don't really have much time to maintain more packages,or sponsor any, so feel free to take over this ITP. ok, thanks ;) So I guess you will have to package a CVS snapshot for this to be uploaded to Debian. I try to make a package till end of the week ;) The developers contacted me by mail and we will find a solution, I think. You might want to join the Debian Python Modules Team: http://wiki.debian.org/Teams/PythonModulesTeam I'll read it tonight and then try to get involved, because I have to maintain 2 other python packages. Paul: Could you sponsor me for this package when it is completed? Thanks, Thomas. signature.asc Description: Digital signature
Processed: Re: Bug#215367: ITP: pylibpcap - status?
Processing commands for [EMAIL PROTECTED]: owner 215367 ! Bug#215367: ITP: pylibpcap -- A Python binding for the packet capture library libpcap Owner changed from Paul Wise [EMAIL PROTECTED] to Thomas Bläsing [EMAIL PROTECTED]. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#434519: O: gringotts -- store passwords in an encrypted file
Package: wnpp Severity: normal -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I intend to orphan the gringotts package. The reason is that the upstream author does not reply to mails anymore and the project homepage has vanished. If nobody adopts this package (and is prepared to also do some upstream bug fixing/development work) I will file a removal request. I myself have switched to an alternative password manager (keepassx). The package description is: Gringotts is a small utility for Linux that allows you to store and organize sensitive data (passwords, credit card numbers, PINs etc.) in an easy-to-read, easy-to-access, and protected form. . Homepage: http://devel.pluto.linux.it/projects/Gringotts/ - -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.21treasure1 (PREEMPT) Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/bash -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGphPPeBwlBDLsbz4RAgDJAJ9BuP0LWe8JYL/qrYbijp+67g4sewCfUwdG bfxyk+lXX//jPKw0qvTVEtA= =/W59 -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: fixed 253733 in 0.9.0-1
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.6 fixed 253733 0.9.0-1 Bug#253733: ITP: libbtctl -- GObject Bluetooth library Bug marked as fixed in version 0.9.0-1. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#428813: marked as done (ITA: xscreensaver -- Automatic screensaver for X)
Your message dated Tue, 24 Jul 2007 15:47:06 + with message-id [EMAIL PROTECTED] and subject line Bug#428813: fixed in xscreensaver 5.03-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: normal I'd like to orphan the package since I cannot find the time to maintain it anymore. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.21.4 (SMP w/4 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/bash ---End Message--- ---BeginMessage--- Source: xscreensaver Source-Version: 5.03-1 We believe that the bug you reported is fixed in the latest version of xscreensaver, which is due to be installed in the Debian FTP archive: xscreensaver-gl_5.03-1_powerpc.deb to pool/main/x/xscreensaver/xscreensaver-gl_5.03-1_powerpc.deb xscreensaver_5.03-1.diff.gz to pool/main/x/xscreensaver/xscreensaver_5.03-1.diff.gz xscreensaver_5.03-1.dsc to pool/main/x/xscreensaver/xscreensaver_5.03-1.dsc xscreensaver_5.03-1_powerpc.deb to pool/main/x/xscreensaver/xscreensaver_5.03-1_powerpc.deb xscreensaver_5.03.orig.tar.gz to pool/main/x/xscreensaver/xscreensaver_5.03.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Jose Luis Rivas [EMAIL PROTECTED] (supplier of updated xscreensaver package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 13 Jul 2007 17:15:43 -0400 Source: xscreensaver Binary: xscreensaver xscreensaver-gl Architecture: source powerpc Version: 5.03-1 Distribution: unstable Urgency: low Maintainer: Jose Luis Rivas [EMAIL PROTECTED] Changed-By: Jose Luis Rivas [EMAIL PROTECTED] Description: xscreensaver - Automatic screensaver for X xscreensaver-gl - GL(Mesa) screen hacks for xscreensaver Closes: 180063 257092 273180 296552 303368 316931 317383 326733 330971 337100 368600 375488 376982 390672 393140 407886 419022 423560 428798 428813 Changes: xscreensaver (5.03-1) unstable; urgency=low . * New maintainer and uploader (Closes: #428813, #428798) * New upstream version packaged (Closes: #407886) * No error during authentication (Closes: #180063) * No more waiting until mouse moves for starting. (Closes: #257092) * Flurry now runs OK. (Closes: #296552) * No more crashes during exit of `xscreensaver' (Closes: #273180) * Xscreensaver has changed a lot how works with the pam_module and it seems as does not ask for password anymore if is not required. (Closes: #303368) * XScreensaver turns off both screens if is used with Dual-head on laptops tested on a HP and a Siragon notebook. (Closes: #337100) * Currently XScreensaver request password everytime, even if Power management is enabled. (Closes: #330971) * XScreensaver does not longer ignores settings on ~/.xscreensaver anymore and modifying settings with `xscreensaver-demo' will save your settings as should and will not be restarted. (Closes: #316931) * xscreensaver does properly requests passwords and proccess them as should if that's the case. (Closes: #368600) * Now images are rotated as should when using carousel with the EXIF data of each JPEG archive. (Closes: #375488) * Fontglide is running OK without fonts issues. (Closes: #393140) * The apple2 hack was tested and there's no problem. (Closes: #423560) * Webcollage renders properly and add images to the collage without emptying the screen (tested with nv, nvidia and vesa drivers). (Closes: #317383) * Added the `unlock' button to login box. (Closes: #326733) * debian/control: + Deleted `Uploaders' field. + Changed `Maintainer' name and email. + Replaced build-depend on `xlibs-data' with `xbitmaps'. (Closes: #419022) + Updated `Standard-Versions' to 3.7.2, no changes needed. + Added Build-Depend on `dpatch'. + Updated `xscreensaver-gl' description with `X.Org' instead of `XFree'. + Moved `netpbm' to Depends from Suggests of xscreensaver since it's
Bug#434525: ITP: swing-layout -- Extensions to Swing layout
Package: wnpp Severity: wishlist Owner: Michael Koch [EMAIL PROTECTED] * Package name: swing-layout Version : 1.0.2 Upstream Author : SUN Microsystems, Inc. * URL : http://swing-layout.dev.java.net * License : LGPL Programming Lang: Java Description : swing-layout - Extensions to Swing layout Swing Layout Extensions goal is to make it easy to create professional cross platform layouts with Swing. This project has an eye towards the needs of GUI builders, such as NetBeans. This project consists of the following pieces: * Ability to get the baseline for components. * Ability to get the preferred gap between components. * A new LayoutManager that utilizes both of these concepts and is tuned toward a free-form drag and drop layout model as can be provided by GUI builders. Cheers, Michael -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.21-2-686 (SMP w/1 CPU core) Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/bash -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#434532: ITP: netdisco -- Web-based network management tool
Package: wnpp Severity: wishlist Owner: Oliver Gorwits [EMAIL PROTECTED] * Package name: netdisco Version : 0.95 Upstream Author : Eric Miller, Bill Fenner and Max Baker [EMAIL PROTECTED] * URL : http://www.netdisco.org/ * License : Perl/Artistic Programming Lang: Perl Description : Web-based network management tool NetDisco is designed for moderate to large networks, configuration information and connection data for network devices are retrieved and set by SNMP. With Netdisco you can locate the switch port of an end-user system by IP or MAC address. Data is stored using a SQL database for scalability and speed. Cisco Discovery Protocol (CDP), Foundry Discovery Protocol (FDP), Link Layer Discovery Protocol (LLDP), and SynOptics Network Management Protocol (SONMP) optionally provide automatic discovery of the network topology. The network is inventoried by both device model and operating system (such as IOS). Netdisco uses router ARP tables and L2 switch MAC forwarding tables to locate nodes on physical ports and track them by their IP addresses. For each node, a time stamped history of the ports it has visited and the IP addresses it has used is maintained. Netdisco gets all its data, including topology information, with SNMP polls and DNS queries. It does not use CLI access and has no need for privilege passwords. Security features include a wire-side Wireless Access Point (AP) locator. Netdisco was created at the University of California, Santa Cruz (UCSC), Networking and Technology Services (NTS) department. UCSC continues to support the development of Netdisco by providing development servers and financial support. The Netdisco project is hosted by Source Forge. -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-686 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#173879: INPUT DEVICE
Have you ever hoped to have a high dollar Watch? We have the problem solved for you! We provide all the big names for a low fraction of the expense. www.wehequis.com -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#434532: ITP: netdisco -- Web-based network management tool
forcemerge 434532 403113 thanks there was an RFP for that since 200 days. -- Bernd Zeimetz [EMAIL PROTECTED] http://bzed.de/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#138873: SANS SERIF FONT
Have you ever wished for a pricey Watch? We have the problem solved for you! We carry all the big names for a low precentage of the price. www.wehequis.com -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#280566: marked as done (ITP: clit -- Decompiler for Microsoft's .lit ebook format)
Your message dated Tue, 24 Jul 2007 11:59:30 -0600 with message-id [EMAIL PROTECTED] and subject line WNPP bug closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist * Package name: clit Version : 1.8 Upstream Author : [EMAIL PROTECTED] * URL : http://www.lubemobile.com.au/ras/debian/sarge/clit/ * License : GPL Description : Decompiler for Microsoft's .lit ebook format Convert Microsoft's .lit ebook format back into the raw HTML it was created from. Note: this needs libtommath, which is also ITP'ed. -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.8-7-lube-686-smp Locale: LANG=en_AU, LC_CTYPE=en_AU ---End Message--- ---BeginMessage--- Hello, This is an automatic mail sent to close the ITP you have reported or are involved with. Your ITP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the ITP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail [EMAIL PROTECTED] with a body text like this: reopen 280566 stop Further comments on the work done in the bug sent to [EMAIL PROTECTED] would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: [EMAIL PROTECTED]. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza [EMAIL PROTECTED]. ---End Message---
Bug#379644: marked as done (ITP: libewf -- Expert Witness File Format Tools)
Your message dated Tue, 24 Jul 2007 11:59:32 -0600 with message-id [EMAIL PROTECTED] and subject line WNPP bug closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist Owner: Kenny Duffus [EMAIL PROTECTED] * Package name: libewf Version : 20060708-1 Upstream Author : Joachim Metz [EMAIL PROTECTED] * URL : https://www.uitwisselplatform.nl/projects/libewf/ * License : BSD Description : Expert Witness File Format Tools A library for support of the Expert Witness Compression Format (EWF). Libewf allows you to read media information of EWF files created by EnCase 1 - 5 and FTK Imager -- System Information: Debian Release: 3.1 Architecture: i386 (i686) Kernel: Linux 2.6.16-2-k7 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) ---End Message--- ---BeginMessage--- Hello, This is an automatic mail sent to close the ITP you have reported or are involved with. Your ITP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the ITP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail [EMAIL PROTECTED] with a body text like this: reopen 379644 stop Further comments on the work done in the bug sent to [EMAIL PROTECTED] would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: [EMAIL PROTECTED]. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza [EMAIL PROTECTED]. ---End Message---
Bug#332858: marked as done (ITP: cvsup -- The CVS-Optimized General-Purpose Network File Distribution System)
Your message dated Tue, 24 Jul 2007 11:59:30 -0600 with message-id [EMAIL PROTECTED] and subject line WNPP bug closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist Owner: Piotr Roszatycki [EMAIL PROTECTED] * Package name: cvsup Version : 16.1h * URL : http://www.cvsup.org/ * License : BSD Description : The CVS-Optimized General-Purpose Network File Distribution System The CVSup package was orphaned some time ago. See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=129583 The CVSup requires Modula-3 compilator to build, so also I'm planning to package Ezm3 - An Easier Modula-3 Distribution, which is designated to compile CVSup only. CVSup binary compiled with Ezm3 depends on standard GLIBC library only and does not require Modula-3 runtime. ---End Message--- ---BeginMessage--- Hello, This is an automatic mail sent to close the ITP you have reported or are involved with. Your ITP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the ITP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail [EMAIL PROTECTED] with a body text like this: reopen 332858 stop Further comments on the work done in the bug sent to [EMAIL PROTECTED] would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: [EMAIL PROTECTED]. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza [EMAIL PROTECTED]. ---End Message---
Bug#343493: marked as done (ITP: teckit -- a Text Encoding Conversion toolkit)
Your message dated Tue, 24 Jul 2007 11:59:30 -0600 with message-id [EMAIL PROTECTED] and subject line WNPP bug closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist From its website http://scripts.sil.org/cms/scripts/page.php?site_id=nrsicat_id=TECkit TECkit is a low-level toolkit intended to be used by other applications that need to perform encoding conversions (e.g., when importing legacy data into a Unicode-based application). The primary component of the TECkit package is therefore a library that performs conversions; this is the TECkit engine. The engine relies on mapping tables in a specific binary format (for which documentation is available); there is a compiler that creates such tables from a human-readable mapping description (a simple text file). It is dual licensed under the LGPL or CPL. A 2.1.3 version that builds and runs on linux will be released soon and will be what I will package. Regards, Daniel ---End Message--- ---BeginMessage--- Hello, This is an automatic mail sent to close the ITP you have reported or are involved with. Your ITP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the ITP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail [EMAIL PROTECTED] with a body text like this: reopen 343493 stop Further comments on the work done in the bug sent to [EMAIL PROTECTED] would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: [EMAIL PROTECTED]. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza [EMAIL PROTECTED]. ---End Message---
Bug#350878: marked as done (ITP: kernel-patch-realtime-preempt -- Realtime preemption patch)
Your message dated Tue, 24 Jul 2007 11:59:30 -0600 with message-id [EMAIL PROTECTED] and subject line WNPP bug closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist * Package name: kernel-patch-realtime-preempt Version : 2.6.15+rt12 Upstream Author : Ingo Molnar * URL or Web page : http://people.redhat.com/mingo/realtime-preempt/ * License : GPL Description : realtime preemption patch This package provides a kernel patch for the realtime kernel scheduler.The patch was written an is maintained by Ingo Molnar and Arjan van de Ven and aims to fix all latency sources that generate higher than ~1 msec latencies. ---End Message--- ---BeginMessage--- Hello, This is an automatic mail sent to close the ITP you have reported or are involved with. Your ITP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the ITP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail [EMAIL PROTECTED] with a body text like this: reopen 350878 stop Further comments on the work done in the bug sent to [EMAIL PROTECTED] would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: [EMAIL PROTECTED]. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza [EMAIL PROTECTED]. ---End Message---
Bug#378861: marked as done (RFP: icmptx -- IP tunnel over ICMP)
Your message dated Tue, 24 Jul 2007 11:59:42 -0600 with message-id [EMAIL PROTECTED] and subject line WNPP bug closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Subject: RFP: icmptx -- IP tunnel over ICMP Package: wnpp Severity: wishlist *** Please type your report below this line *** * Package name: icmptx Version : 0.01 Upstream Author : Maxim Krasnyansky [EMAIL PROTECTED], edi / teso, and others. * URL : http://thomer.com/icmptx/icmptx-0.01.tar.gz * License : GPL and unknown Programming Lang: C Description : IP tunnel over ICMP You're sitting in an airport or in a cafe, and people want your money for Internet access. They do allow ICMP traffic, though (i.e., you can ping machines on the Internet). Enters ICMPTX. (If you can't use ping, but you can issue name queries, use NSTX: IP-over-DNS.) The icmptx.c and it.c are a little bit shaky on the copyright, the rest seem they all have copyright belonging to Maxim Krasnyansky. icmptx.c contains this text: /* Code is ruthlessly ripped from vtun and itunnel with appropriate changes. * Guys, thanks for the great stuff! * * itunnel - an ICMP tunnel by edi / teso * VTun - Virtual Tunnel over TCP/IP network. * * Original author unknown, but modified by Thomer M. Gil who found the original * code through * http://www.linuxexposed.com/Articles/Hacking/Case-of-a-wireless-hack.html * (a page written by Siim Põder). * * The icmptx website is at http://thomer.com/icmptx/ */ it.c contains: /* * itunnel - an ICMP tunnel by edi / teso * usage: it [-i id] [-s packetsize] host * establishes a bidirectional ICMP * 'connection' with 'host' by listening * to ICMP packets with a specific id * (default: 7530). uses stdin and stdout * and needs to run as root. c * */ -- Regards, EddyP = Imagination is more important than knowledge A.Einstein ---End Message--- ---BeginMessage--- Hello, This is an automatic mail sent to close the RFP you have reported or are involved with. Your RFP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the RFP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail [EMAIL PROTECTED] with a body text like this: reopen 378861 stop Further comments on the work done in the bug sent to [EMAIL PROTECTED] would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: [EMAIL PROTECTED]. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza [EMAIL PROTECTED]. ---End Message---
Processed: [Fwd: Re: Bug#434532: ITP: netdisco -- Web-based network management tool]
Processing commands for [EMAIL PROTECTED]: forcemerge 434532 403113 Bug#434532: ITP: netdisco -- Web-based network management tool Bug#403113: RFP: netdisco -- an Open Source web-based network management tool Forcibly Merged 403113 434532. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#378618: marked as done (ITP: libepp-nicbr -- EP Protocol NIC.br C++ library)
Your message dated Tue, 24 Jul 2007 11:59:31 -0600 with message-id [EMAIL PROTECTED] and subject line WNPP bug closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist Owner: Gustavo Franco [EMAIL PROTECTED] Package name: libepp-nicbr Version : 1.0-1 Upstream author : Registro.br - [EMAIL PROTECTED] URL : http://registro.br/epp/index-EN.html License : Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistribution of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. [...] Description : EP Protocol NIC.br library This is the libepp-nicbr C++ library that partially implements the Extensible Provisioning Protocol (EPP), as described in the Internet drafts RFC3730bis to RFC3734bis and RFC3735. . In order to conform to the .BR model, extensions to the EPP Domain Name and Contact Mapping were made (draft-neves-epp-brdomain and draft-neves-epp-brorg). -- Gustavo Franco - [EMAIL PROTECTED] ---End Message--- ---BeginMessage--- Hello, This is an automatic mail sent to close the ITP you have reported or are involved with. Your ITP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the ITP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail [EMAIL PROTECTED] with a body text like this: reopen 378618 stop Further comments on the work done in the bug sent to [EMAIL PROTECTED] would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: [EMAIL PROTECTED]. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza [EMAIL PROTECTED]. ---End Message---
Bug#379506: marked as done (ITP: sladinstaller -- Graphical Installer for the Security Local Auditing Daemon)
Your message dated Tue, 24 Jul 2007 11:59:32 -0600 with message-id [EMAIL PROTECTED] and subject line WNPP bug closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist Owner: Meike Reichle [EMAIL PROTECTED] * Package name: sladinstaller Version : 1.1 Upstream Author : DN-Systems Enterprise Internet Solutions GmbH [EMAIL PROTECTED] * URL : http://www.dn-systems.org/slad.shtml * License : GPL Programming Lang: C++ Description : Graphical Installer for the Security Local Auditing Daemon This graphical (GTK) installer installs the Security Local Auditing Daemon V2 (SLAD2) on any local or remote machine. SLAD is a tool for performing local security checks against GNU/Linux systems. SLAD has been primarily developed for the BOSS project to work together with Nessus to enhance its local scanning capabilities. -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15-1-686 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) ---End Message--- ---BeginMessage--- Hello, This is an automatic mail sent to close the ITP you have reported or are involved with. Your ITP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the ITP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail [EMAIL PROTECTED] with a body text like this: reopen 379506 stop Further comments on the work done in the bug sent to [EMAIL PROTECTED] would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: [EMAIL PROTECTED]. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza [EMAIL PROTECTED]. ---End Message---
Bug#378734: marked as done (ITP: axtls -- TLSv1 SSL library designed for embedded platforms)
Your message dated Tue, 24 Jul 2007 11:59:31 -0600 with message-id [EMAIL PROTECTED] and subject line WNPP bug closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist Owner: Roberto Lumbreras [EMAIL PROTECTED] * Package name: axtls Version : 1.01 Upstream Author : Cameron Rich [EMAIL PROTECTED] * URL : http://www.axtls.co.nr/ * License : LGPL Description : TLSv1 SSL library designed for embedded platforms axTLS is a highly configurable client/server TLSv1 SSL library designed for embedded platforms. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.16-2-k7 Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8) ---End Message--- ---BeginMessage--- Hello, This is an automatic mail sent to close the ITP you have reported or are involved with. Your ITP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the ITP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail [EMAIL PROTECTED] with a body text like this: reopen 378734 stop Further comments on the work done in the bug sent to [EMAIL PROTECTED] would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: [EMAIL PROTECTED]. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza [EMAIL PROTECTED]. ---End Message---
Bug#379343: marked as done (ITP: jrpg -- kanji learning game)
Your message dated Tue, 24 Jul 2007 11:59:31 -0600 with message-id [EMAIL PROTECTED] and subject line WNPP bug closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist Owner: Eric Dorland [EMAIL PROTECTED] * Package name: jrpg Version : 20060524-2151 Upstream Author : Tomasz Wegrzanowski [EMAIL PROTECTED] * URL : http://www.example.org/ * License : mostly GPL, but will go in non-free because of non-free graphics Programming Lang: Python Description : kanji learning game JRPG is a kanji learning game styled after the classic SNES RPG games (like Final Fantasy 6, or Legend of Zelda: Link to the Past). The game tries to help you learn how to read and understand kanji in context, and in doing that it also helps you improve your Japanese vocabulary. You can also use it to refresh your kana. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.16 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) ---End Message--- ---BeginMessage--- Hello, This is an automatic mail sent to close the ITP you have reported or are involved with. Your ITP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the ITP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail [EMAIL PROTECTED] with a body text like this: reopen 379343 stop Further comments on the work done in the bug sent to [EMAIL PROTECTED] would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: [EMAIL PROTECTED]. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza [EMAIL PROTECTED]. ---End Message---
Bug#378907: marked as done (ITP: tet -- Test Environment Toolkit from the Open Group)
Your message dated Tue, 24 Jul 2007 11:59:31 -0600 with message-id [EMAIL PROTECTED] and subject line WNPP bug closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist Owner: Stuart Anderson [EMAIL PROTECTED] * Package name: tet, tet-dev Version : 3.7a Upstream Author : The Open Group * URL : http://tetware.opengroup.org/ * License : Artistic Programming Lang: C Description : Test Environment Toolkit from the Open Group The TET frame work is needed to build certain tests suites such as the X Test Suite (xts5), and the LSB test suites (which are derived from the POSIX test suites). -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (910, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.16-1-k7 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) ---End Message--- ---BeginMessage--- Hello, This is an automatic mail sent to close the ITP you have reported or are involved with. Your ITP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the ITP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail [EMAIL PROTECTED] with a body text like this: reopen 378907 stop Further comments on the work done in the bug sent to [EMAIL PROTECTED] would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: [EMAIL PROTECTED]. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza [EMAIL PROTECTED]. ---End Message---
Bug#378906: marked as done (ITP: xts5 -- X Test Suite)
Your message dated Tue, 24 Jul 2007 11:59:31 -0600 with message-id [EMAIL PROTECTED] and subject line WNPP bug closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist Owner: Stuart Anderson [EMAIL PROTECTED] * Package name: xts5 Version : 5.0.2.cvs20070717 Upstream Author : X.Org Foundation * URL : http://www.x.org/ * License : MIT/X Programming Lang: C Description : X Test Suite This package will contain the X Test Suite (formerly known as VSW5). -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (910, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.16-1-k7 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) ---End Message--- ---BeginMessage--- Hello, This is an automatic mail sent to close the ITP you have reported or are involved with. Your ITP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the ITP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail [EMAIL PROTECTED] with a body text like this: reopen 378906 stop Further comments on the work done in the bug sent to [EMAIL PROTECTED] would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: [EMAIL PROTECTED]. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza [EMAIL PROTECTED]. ---End Message---
Bug#429387: marked as done (ITP: libsvg-perl -- perl module to generate SVG images)
Your message dated Tue, 24 Jul 2007 18:39:23 + with message-id [EMAIL PROTECTED] and subject line Bug#429387: fixed in libsvg-perl 2.33-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist Owner: David Paleino [EMAIL PROTECTED] * Package name: libsvg-perl Version : 2.33 Upstream Author : Ronan Oger [EMAIL PROTECTED] * URL : http://search.cpan.org/~ronan/SVG-2.33/ * License : Under the same terms as Perl (GPL - Artistic) Programming Lang: Perl Description : perl module to generate SVG images This package provides a perl extension to generate stand-alone or inline SVG (scalable vector graphics) images using the W3C SVG xml recommendation. . Homepage: http://search.cpan.org/~ronan/SVG-2.33/ This package would also close this bug: http://bugs.debian.org/429163 Kind Regards, David -- . ''`. Debian maintainer | http://snipurl.com/gofoxygo/ : :' : Linuxer #334216 | http://www.hanskalabs.net/ `. `'`GPG: 1392B174 | http://www.debianizzati.org/ `- 2BAB C625 4E66 E7B8 450A C3E1 E6AA 9017 1392 B174 ---End Message--- ---BeginMessage--- Source: libsvg-perl Source-Version: 2.33-1 We believe that the bug you reported is fixed in the latest version of libsvg-perl, which is due to be installed in the Debian FTP archive: libsvg-perl_2.33-1.diff.gz to pool/main/libs/libsvg-perl/libsvg-perl_2.33-1.diff.gz libsvg-perl_2.33-1.dsc to pool/main/libs/libsvg-perl/libsvg-perl_2.33-1.dsc libsvg-perl_2.33-1_all.deb to pool/main/libs/libsvg-perl/libsvg-perl_2.33-1_all.deb libsvg-perl_2.33.orig.tar.gz to pool/main/libs/libsvg-perl/libsvg-perl_2.33.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. David Paleino [EMAIL PROTECTED] (supplier of updated libsvg-perl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 16 Jun 2007 08:43:06 +0200 Source: libsvg-perl Binary: libsvg-perl Architecture: source all Version: 2.33-1 Distribution: unstable Urgency: low Maintainer: Debian Perl Group [EMAIL PROTECTED] Changed-By: David Paleino [EMAIL PROTECTED] Description: libsvg-perl - perl module to generate SVG images Closes: 429387 Changes: libsvg-perl (2.33-1) unstable; urgency=low . * Initial release (Closes: #429387) Files: ff949247b23bea7ad6a2f2f0516433aa 681 perl optional libsvg-perl_2.33-1.dsc 80aff1f4d107bf56696653895e5eed81 47100 perl optional libsvg-perl_2.33.orig.tar.gz 80b38e3c070c1d88e5a1d6e1113270e4 2790 perl optional libsvg-perl_2.33-1.diff.gz e708c141c795f006b944a462ce16c03e 73660 perl optional libsvg-perl_2.33-1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGmINxHqjlqpcl9jsRAichAJoDM2h4Wg4sDrU9Au7WM3UEEIRNsgCghiCT dMzMF5nEAHnJFYrjCR481rc= =sH7M -END PGP SIGNATURE- ---End Message---
Bug#429293: marked as done (ITP: libset-scalar-perl -- set for scalar operations)
Your message dated Tue, 24 Jul 2007 18:45:36 + with message-id [EMAIL PROTECTED] and subject line Bug#429293: fixed in libset-scalar-perl 1.20-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Package: wnpp Severity: wishlist Owner: Jose Luis Rivas [EMAIL PROTECTED] * Package name: libset-scalar-perl Version : 1.20 Upstream Author : Jarkko Hietaniemi [EMAIL PROTECTED] * URL : http://search.cpan.org/dist/Set-Scalar/ * License : GPL/Artistic Programming Lang: Perl Description : set for scalar operations This perl module set scalar operations as creating, modying, displaying, deriving, comparing, etc. . This module provides: Set::Scalar::Base, Set::Scalar::Null, Set::Scalar::Real, Set::Scalar::Universe, Set::Scalar::Valued, Set::Scalar::ValuedUniverse, Set::Scalar::Virtual. . Homepage: http://search.cpan.org/dist/Set-Scalar/ - -- ghostbar on Linux/Debian 'sid' i686 - #382503 Weblog: http://ghostbar.ath.cx/ - http://linuxtachira.org http://debian.org.ve - irc.debian.org #debian-ve #debian-devel-es San Cristóbal, Venezuela. http://chaslug.org.ve Fingerprint = 3E7D 4267 AFD5 2407 2A37 20AC 38A0 AD5B CACA B118 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFGdETnOKCtW8rKsRgRAjjxAJ9QfjoiXduRtUq7qTE/dO9GldYjpwCfay09 L+ZxKGfXDfbFmtV9hxAa4B0= =ZbQR -END PGP SIGNATURE- ---End Message--- ---BeginMessage--- Source: libset-scalar-perl Source-Version: 1.20-1 We believe that the bug you reported is fixed in the latest version of libset-scalar-perl, which is due to be installed in the Debian FTP archive: libset-scalar-perl_1.20-1.diff.gz to pool/main/libs/libset-scalar-perl/libset-scalar-perl_1.20-1.diff.gz libset-scalar-perl_1.20-1.dsc to pool/main/libs/libset-scalar-perl/libset-scalar-perl_1.20-1.dsc libset-scalar-perl_1.20-1_all.deb to pool/main/libs/libset-scalar-perl/libset-scalar-perl_1.20-1_all.deb libset-scalar-perl_1.20.orig.tar.gz to pool/main/libs/libset-scalar-perl/libset-scalar-perl_1.20.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Jose Luis Rivas [EMAIL PROTECTED] (supplier of updated libset-scalar-perl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 16 Jun 2007 15:41:39 -0400 Source: libset-scalar-perl Binary: libset-scalar-perl Architecture: source all Version: 1.20-1 Distribution: unstable Urgency: low Maintainer: Jose Luis Rivas [EMAIL PROTECTED] Changed-By: Jose Luis Rivas [EMAIL PROTECTED] Description: libset-scalar-perl - set for scalar operations Closes: 429293 Changes: libset-scalar-perl (1.20-1) unstable; urgency=low . * Initial release (Closes: #429293) Files: 08ce605384770a10cdc45b7e6904f3b1 634 perl extra libset-scalar-perl_1.20-1.dsc ebef2b178117a07541bacfdbf7c86112 16814 perl extra libset-scalar-perl_1.20.orig.tar.gz 35c40439b321eadf2b784720c5638fb4 1114 perl extra libset-scalar-perl_1.20-1.diff.gz 45f86fe117575623234765eb76e560c6 33804 perl extra libset-scalar-perl_1.20-1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGnKcsgY5NIXPNpFURAgVMAJ42mX0mOrOji9g2rgMg4elRBAjdQQCeKsQK m4pHttX1kGvr5Go7areRGcE= =KGQO -END PGP SIGNATURE- ---End Message---
Bug#434538: ITP: tinymce-compressor-php -- compress TinyMCE to reduce overall download size
Package: wnpp Severity: wishlist Owner: Joao Eriberto Mota Filho [EMAIL PROTECTED] * Package name: tinymce-compressor-php Version : 1.1.0 Upstream Author : Moxiecode Systems AB [EMAIL PROTECTED] * URL : http://tinymce.moxiecode.com * License : LGPL Description : compress TinyMCE to reduce overall download size TinyMCE Compressor gzips all javascript files in TinyMCE to a single streamable file. This makes the overall download sice 75% smaller and the number of requests will also be reduced. The overall initialization time for TinyMCE will be reduced dramaticly if used this script. This package provides tiny_mce_gzip.js and tiny_mce_gzip.php files. -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-686 Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#428727: marked as done (ITP: libnet-cups-perl -- Provides an interface for)
Your message dated Tue, 24 Jul 2007 18:55:00 + with message-id [EMAIL PROTECTED] and subject line Bug#428727: fixed in libnet-cups-perl 0.51-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist * Package name: libnet-cups-perl Version : 0.51 Upstream Author : Name [EMAIL PROTECTED] * URL : http://search.cpan.org/~dhageman/Net-CUPS-0.51/ * License : (GPL) Programming Lang: Perl, C Description : Perl module for printing with CUPS (Include the long description here.) -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-686 Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) ---End Message--- ---BeginMessage--- Source: libnet-cups-perl Source-Version: 0.51-1 We believe that the bug you reported is fixed in the latest version of libnet-cups-perl, which is due to be installed in the Debian FTP archive: libnet-cups-perl_0.51-1.diff.gz to pool/main/libn/libnet-cups-perl/libnet-cups-perl_0.51-1.diff.gz libnet-cups-perl_0.51-1.dsc to pool/main/libn/libnet-cups-perl/libnet-cups-perl_0.51-1.dsc libnet-cups-perl_0.51-1_i386.deb to pool/main/libn/libnet-cups-perl/libnet-cups-perl_0.51-1_i386.deb libnet-cups-perl_0.51.orig.tar.gz to pool/main/libn/libnet-cups-perl/libnet-cups-perl_0.51.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Rene Mayorga [EMAIL PROTECTED] (supplier of updated libnet-cups-perl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 13 Jun 2007 15:02:18 -0600 Source: libnet-cups-perl Binary: libnet-cups-perl Architecture: source i386 Version: 0.51-1 Distribution: unstable Urgency: low Maintainer: Debian Perl Group [EMAIL PROTECTED] Changed-By: Rene Mayorga [EMAIL PROTECTED] Description: libnet-cups-perl - Provides an interface for printing with CUPS Closes: 428727 Changes: libnet-cups-perl (0.51-1) unstable; urgency=low . * Initial release (Closes: #428727) Files: 2539763ff02545b66a2a1a76e5d0ac0d 796 perl optional libnet-cups-perl_0.51-1.dsc 75658ef478ecffdf2376689993ca397d 66149 perl optional libnet-cups-perl_0.51.orig.tar.gz f7e267b0cedcc248e841e819f32c44c1 1852 perl optional libnet-cups-perl_0.51-1.diff.gz cc42af54445cddd88a4cac51eb144bc2 54496 perl optional libnet-cups-perl_0.51-1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGn55QQbn06FtxPfARAilxAKC8miXZCi6FKe1Rn2h4TCtC5fin+gCdHVjT qV4pMwpxwHDUDCpG5SSIik4= =vxfE -END PGP SIGNATURE- ---End Message---
Bug#433955: marked as done (ITP: libperl6-junction-perl -- Perl6 style Junction operators in Perl5.)
Your message dated Tue, 24 Jul 2007 18:55:24 + with message-id [EMAIL PROTECTED] and subject line Bug#433955: fixed in libperl6-junction-perl 1.3-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist Owner: Krzysztof Krzyzaniak (eloy) [EMAIL PROTECTED] * Package name: libperl6-junction-perl Version : 1.3 Upstream Author : Carl Franks * URL : http://www.cpan.org/ * License : Perl (GPL/Artistic) Programming Lang: Perl Description : Perl6 style Junction operators in Perl5. Perl6::Junction is a lightweight module which provides 'Junction' operators, the most commonly used being any and all. . Inspired by the Perl6 design docs, http://dev.perl.org/perl6/doc/design/exe/E06.html. . Provides a limited subset of the functionality of Quantum::Superpositions. This package is needed for uploading new version of libdata-formvalidator-perl -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.18-4-686 (SMP w/1 CPU core) Locale: LANG=pl_PL, LC_CTYPE=pl_PL (charmap=ISO-8859-2) Shell: /bin/sh linked to /bin/bash ---End Message--- ---BeginMessage--- Source: libperl6-junction-perl Source-Version: 1.3-1 We believe that the bug you reported is fixed in the latest version of libperl6-junction-perl, which is due to be installed in the Debian FTP archive: libperl6-junction-perl_1.3-1.diff.gz to pool/main/libp/libperl6-junction-perl/libperl6-junction-perl_1.3-1.diff.gz libperl6-junction-perl_1.3-1.dsc to pool/main/libp/libperl6-junction-perl/libperl6-junction-perl_1.3-1.dsc libperl6-junction-perl_1.3-1_all.deb to pool/main/libp/libperl6-junction-perl/libperl6-junction-perl_1.3-1_all.deb libperl6-junction-perl_1.3.orig.tar.gz to pool/main/libp/libperl6-junction-perl/libperl6-junction-perl_1.3.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Krzysztof Krzyzaniak (eloy) [EMAIL PROTECTED] (supplier of updated libperl6-junction-perl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 20 Jul 2007 16:52:31 +0200 Source: libperl6-junction-perl Binary: libperl6-junction-perl Architecture: source all Version: 1.3-1 Distribution: unstable Urgency: low Maintainer: Debian Perl Group [EMAIL PROTECTED] Changed-By: Krzysztof Krzyzaniak (eloy) [EMAIL PROTECTED] Description: libperl6-junction-perl - Perl6 style Junction operators in Perl5. Closes: 433955 Changes: libperl6-junction-perl (1.3-1) unstable; urgency=low . * Initial Release (closes: #433955). Files: 78f9bdc80a255aab623f0acd841add1a 752 perl optional libperl6-junction-perl_1.3-1.dsc 93f29bf4d0527264106b1d149ec11c3d 6397 perl optional libperl6-junction-perl_1.3.orig.tar.gz b5fb6a215531e9acbb7567ad695e07ae 1802 perl optional libperl6-junction-perl_1.3-1.diff.gz 1e55c85f0a831a104d0efb1e795dc154 8560 perl optional libperl6-junction-perl_1.3-1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGoNW2y+HP4f7iC8sRAnpVAJ9LgXJ5XhVYUZfM6MQ5qpNAAJWyRgCgmyOX ZoXa35LnqEWl17d9MuCW3n0= =CVmI -END PGP SIGNATURE- ---End Message---
Bug#428738: marked as done (ITA: gtkfontsel - gtk+ font selection utility)
Your message dated Tue, 24 Jul 2007 19:17:02 + with message-id [EMAIL PROTECTED] and subject line Bug#428738: fixed in gtkfontsel 1.1-9 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: normal I'm offering some packages up for adoption so I have more time for the others. gtkfontsel is quite old (gtk1) and I've never heard from upstream. (Though admittedly I didn't try.) It has a few open bug that could be tackled, but it is still useful enough. I won't work on the code bugs, so if anyone wants to give it more care, I'd be happy to hand over. Maintaining a package requires time and skills. Please only adopt this package if you are *sure* you will have enough time and attention to work on it. If you want to be the new maintainer, please see http://www.debian.org/devel/wnpp/index.html#howto-rfa for detailed instructions how to adopt a package properly. Some information about this package: Package: gtkfontsel Binary: gtkfontsel Version: 1.1-8 Priority: optional Section: x11 Maintainer: Christoph Berg [EMAIL PROTECTED] Build-Depends: debhelper ( 4), libx11-dev, libgtk1.2-dev, libglib1.2-dev Architecture: any Standards-Version: 3.6.2 Format: 1.0 Directory: pool/main/g/gtkfontsel Files: 43733fa5339e11346f25fe4b99840186 605 gtkfontsel_1.1-8.dsc 466acdaa543d0f89a65900d13683883e 65549 gtkfontsel_1.1.orig.tar.gz fdaf4439472a803245550f3aa1cb5b84 66059 gtkfontsel_1.1-8.diff.gz Package: gtkfontsel Priority: optional Section: x11 Installed-Size: 76 Maintainer: Christoph Berg [EMAIL PROTECTED] Architecture: amd64 Version: 1.1-8 Depends: libc6 (= 2.3.5-1), libglib1.2 (= 1.2.0), libgtk1.2 (= 1.2.10-4), libx11-6, libxext6, libxi6 Filename: pool/main/g/gtkfontsel/gtkfontsel_1.1-8_amd64.deb Size: 9992 MD5sum: d2f9f27a202650e339db1d29f254e5f2 SHA1: e7f4f097d7456ec7c40d4202a4d19cd5a48e8b65 SHA256: 0ca041cd26ef91a923c98adae3bce11bda3103bbe3da0f279cd1dec54762cb77 Description: gtk+ font selection utility This is a nice utility for browsing, previewing and selecting an X11 font to insert its correct name via the X clipboard into a configuration file. Tag: interface::x11, role::program, scope::utility, uitoolkit::gtk, use::browsing, use::viewing, works-with::font, x11::application Christoph -- [EMAIL PROTECTED] | http://www.df7cb.de/ signature.asc Description: Digital signature ---End Message--- ---BeginMessage--- Source: gtkfontsel Source-Version: 1.1-9 We believe that the bug you reported is fixed in the latest version of gtkfontsel, which is due to be installed in the Debian FTP archive: gtkfontsel_1.1-9.diff.gz to pool/main/g/gtkfontsel/gtkfontsel_1.1-9.diff.gz gtkfontsel_1.1-9.dsc to pool/main/g/gtkfontsel/gtkfontsel_1.1-9.dsc gtkfontsel_1.1-9_amd64.deb to pool/main/g/gtkfontsel/gtkfontsel_1.1-9_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Vincent Fourmond [EMAIL PROTECTED] (supplier of updated gtkfontsel package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Tue, 24 Jul 2007 20:58:03 +0200 Source: gtkfontsel Binary: gtkfontsel Architecture: source amd64 Version: 1.1-9 Distribution: unstable Urgency: low Maintainer: Vincent Fourmond [EMAIL PROTECTED] Changed-By: Vincent Fourmond [EMAIL PROTECTED] Description: gtkfontsel - gtk+ font selection utility Closes: 428738 Changes: gtkfontsel (1.1-9) unstable; urgency=low . * New maintainer (closes: #428738) * Switching to dpatch and cdbs, my workforce... * Bumped standards version, no changes required. Files: b797f86c0aec6178b2d2242a197fb961 625 x11 optional gtkfontsel_1.1-9.dsc f9c3a22c2663307cbfbb94d7a69ecfab 67261 x11 optional gtkfontsel_1.1-9.diff.gz 819519fb0a82694b98f7c892e0feec93 10394 x11 optional gtkfontsel_1.1-9_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGpk5rx/UhwSKygsoRAhpvAJwJ4+JWWv064F8bkFQOWk6AxKLHNQCgmD65 asfl/alQADiH1I0Zr33j1/o= =cy4A -END PGP SIGNATURE- ---End Message---
Bug#434555: ITP: libmocha-ruby -- library for mocking and stubbing in Ruby
Package: wnpp Severity: wishlist Owner: Antonio Terceiro [EMAIL PROTECTED] * Package name: libmocha-ruby Version : 0.5.2 Upstream Author : James Mead [EMAIL PROTECTED] * URL : http://mocha.rubyforge.org/ * License : MIT/X Programming Lang: Ruby Description : library for mocking and stubbing in Ruby Mocking and stubbing library with JMock/SchMock syntax, which allows mocking and stubbing of methods on real (non-mock) classes. Mocking and stubbing are techiniques used to improve unit testing. -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-686 Locale: LANG=pt_BR.utf8, LC_CTYPE=pt_BR.utf8 (charmap=UTF-8) -- Antonio Terceiro [EMAIL PROTECTED] http://people.softwarelivre.org/~terceiro/ GnuPG ID: 0F9CB28F -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#428738: ITA: gtkfontsel
Processing commands for [EMAIL PROTECTED]: retitle 428738 ITA: gtkfontsel -- gtk+ font selection utility Bug#428738: ITA: gtkfontsel - gtk+ font selection utility Changed Bug title to `ITA: gtkfontsel -- gtk+ font selection utility' from `ITA: gtkfontsel - gtk+ font selection utility'. (By the way, that Bug is currently marked as done.) thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#406864: status of the ttf-sil-andika ITP
Holger Levsen wrote: Hi Nicolas, it was good to meet you in Edinburgh! Same here. I enjoyed Debconf a lot. Thanks for all the hard work. Enjoyed being able to watch the video recordings too :) On Saturday 09 June 2007 21:57, you wrote: The package is now named ttf-sil-andika-desrev to better reflect the design review status, of course it is still very useful at this stage but we wanted to make that clearer. (When the more complete Andika is released when can do a rename). Hmmm. This means, they will need to go through NEW twice :-/ Wouldn't it be better (and have the same effect) to note that in the versionnumber and package description? OK, so I took your advice: it's better at this stage to keep the initial ITP name. Makes it easier for you and the ftp-master team. ok, cool :) The design review status is made clear in the packaging description and the changelog. Great, was that already in ttf-sil-andika-desrev_0.001-2.dsc ? Will be putting up the new source package shortly. :) Probably not, as my remarks file is from the 28th of may (arrg! sorry for taking so long...!) Anyway, those were the remarks I had at that time and against 0.001-2: - linda+lintian clean, nice - feedback period is complete (jan 31 2007) but the description or README mentions it still... (minor, I would still sponsor it like this, but you should fix it :) Yes, the feedback period is over, but it will still take a while for the final font to be designed and released, so the current design reviews are still very much worth uploading even thought they reflect are WIP. I've added a note about this in the debian/control. No need to change the changelog entries in FONTLOG.txt. - licence of the packaging? not mentioned in debian/copyright Mmm, seems I've missed that. Fairly new it seems, haven't seen it as such in maint-guide or most other font packages. Will add that. Thanks. - version: 0.0.desrev-2007.05.08-2 / ttf-sil-andika - you said above this is resolved/changed 0.001-desrev3 - control/description mentions authors, debian/copyright doesnt - AndikaDevRev(A-G).ttf - are those different fonts or different revisions? They have glyph variations. The differences are described on http://scripts.sil.org/Andika_technical I guess the only issue which really blocks sponsoring is the copyright and naming stuff, the rest would be nice if you could fix/enhance it. Can you point me to a new source package? If the blocking stuff is fixed, I'll upload immediatly this time :-) The updated debian/ is committed the Alioth svn and the new source package is on: http://yosch.org/packages/debian regards, Holger (still sorry for taking so long to send this short mail...) No problems at all for the delay, and thanks a lot for the sponsoring :) -- Nicolas Spalinger http://scripts.sil.org http://pkg-fonts.alioth.debian.org https://launchpad.net/people/fonts -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#329676: partial progress upstream
The full cashutil program has had little work recently but an offshoot is making progress: gpe-cash. http://cashutil.sourceforge.net/gpecash.php Using the cashutil code with a small Gtk frontend for handheld devices, this utility features a dramatically reduced codebase and should provide a route to complete the cashutil project itself. I intend to release and upload gpe-cash and attendant libraries first, then complete cashutil using that base and release and upload the cashutil package and the remaining libraries. When gpe-cash is ready, I'll clone this bug. -- Neil Williams = http://www.data-freedom.org/ http://www.nosoftwarepatents.com/ http://www.linux.codehelp.co.uk/ pgphUMWrWMxAN.pgp Description: PGP signature
Bug#427258: marked as done (ITP: gaphas -- diagramming canvas)
Your message dated Tue, 24 Jul 2007 21:02:03 + with message-id [EMAIL PROTECTED] and subject line Bug#427258: fixed in gaphas 0.2.0-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist Owner: Cedric Delfosse [EMAIL PROTECTED] * Package name: gaphas Version : 0.1.4 Upstream Author : Arjan Molenaar [EMAIL PROTECTED] * URL : http://cheeseshop.python.org/pypi/gaphas * License : LGPL Programming Lang: Python Description : diagramming widget Gaphas is a GTK+ based diagramming widget. Gaphas must be packaged to package newest version of gaphor. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.18-3-686 (SMP w/1 CPU core) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash ---End Message--- ---BeginMessage--- Source: gaphas Source-Version: 0.2.0-1 We believe that the bug you reported is fixed in the latest version of gaphas, which is due to be installed in the Debian FTP archive: gaphas_0.2.0-1.diff.gz to pool/main/g/gaphas/gaphas_0.2.0-1.diff.gz gaphas_0.2.0-1.dsc to pool/main/g/gaphas/gaphas_0.2.0-1.dsc gaphas_0.2.0.orig.tar.gz to pool/main/g/gaphas/gaphas_0.2.0.orig.tar.gz python-gaphas_0.2.0-1_all.deb to pool/main/g/gaphas/python-gaphas_0.2.0-1_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Cédric Delfosse [EMAIL PROTECTED] (supplier of updated gaphas package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Tue, 24 Jul 2007 21:39:37 +0200 Source: gaphas Binary: python-gaphas Architecture: source all Version: 0.2.0-1 Distribution: unstable Urgency: low Maintainer: Cédric Delfosse [EMAIL PROTECTED] Changed-By: Cédric Delfosse [EMAIL PROTECTED] Description: python-gaphas - diagramming widget Closes: 427258 Changes: gaphas (0.2.0-1) unstable; urgency=low . * New upstream release, upload to unstable (Closes: #427258) Files: cd11de0869061466a54209d01857aaa6 627 devel extra gaphas_0.2.0-1.dsc 9511dc62b270392bf0e53891e08105e3 79650 devel extra gaphas_0.2.0.orig.tar.gz 8f08b62e90507e3cfc9a8ad521014713 1842 devel extra gaphas_0.2.0-1.diff.gz 182e20c27494f4dceb78642595941a39 57410 devel extra python-gaphas_0.2.0-1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGpmQ6bmmXPPfovGMRAm0VAKCIrXAxjuv+djGipjwvcUKDa+VamwCfal3F PkkJKIWKPoi1o7PrqpJR6aw= =kcKn -END PGP SIGNATURE- ---End Message---
Bug#395277: marked as done (ITP: uebimiau -- Uebimiau is an universal webmail developed in PHP)
Your message dated Tue, 24 Jul 2007 17:33:33 -0400 with message-id [EMAIL PROTECTED] and subject line Closing Uebimiau ITP. has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wnpp Severity: wishlist Owner: Muammar El Khatib [EMAIL PROTECTED] * Package name: uebimiau Version : 2.7.10-1 Upstream Author : Aldoir Ventura * URL : http://www.uebimiau.org/ * License : GPL Description : Uebimiau is an universal webmail developed in PHP. Citing the homepage: snip It is free and can be installed in any email server. -It runs under any System; -It doesn´t require any extra PHP modules; -Doesn´t need a database (as MySQL, PostreSQL,etc) -Doesn´t need IMAP, but compatible with POP3 and IMAP -Compatible with the MIME Standard (send/receive text/html emails); -Doesn´t need cookies; -Easy installation. You only modify one file; -Compatible with Apache, PHP, Sendmail or QMAIL; -Can be easily translated into any language (already translated in 17 languages); -Can use a variety of skins /snip -- Muammar El Khatib. Linux user: 403107. Key fingerprint = 90B8 BFC4 4A75 B881 39A3 1440 30EB 403B 1270 29F1 http://muammarelkhatib.net | http://www.teorex.org ,''`. : :' : `. `' `- ---End Message--- ---BeginMessage--- Hi, Uebimiau project seems dead. So I am closing this ITP. Regards, -- Muammar El Khatib. Linux user: 403107. Key fingerprint = 90B8 BFC4 4A75 B881 39A3 1440 30EB 403B 1270 29F1 http://muammarelkhatib.net | http://www.teorex.org ,''`. : :' : `. `' `- ---End Message---
Bug#431465: ITP: libsvg -- library for parsing SVG files
Rene Engelhard wrote: Package: wnpp Severity: wishlist Owner: Rene Engelhard [EMAIL PROTECTED] * Package name: libsvg Version : 0.1.4 Upstream Author : Carl Worth [EMAIL PROTECTED] * URL : http://cairographics.org/snapshots/ * License : LGPL Programming Lang: C Description : library for parsing SVG files libsvg provides a parser for SVG content in files or buffers. The last upstream release was in 2005, though and it's still only under snapshots/, so it seems quite dead upstream. OOo will in the future most probably use it for svg import, though... (http://svn.gnome.org/viewcvs/ooo-build/trunk/patches/src680/svg-import.diff?revision=9660view=markup) If anyone else than me wants to maintain this (Dave?), be welcome to take this ITP :-) libsvg is dead upstream and not supported, not under development. I talked to Carl today and he was surprised OOo was using it. librsvg is something that is supported, maybe you can get them to use that.. Otherwise, you become the maintainer of libsvg :) Dave -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#434492: Adopting this package
Hi Michael, I use this package every day and my wrists depend on it :) So I'm keen on taking over the maintenance of it while you're not able to. If anybody else wants to get involved and co-maintain it, that'd be fine too. Francois -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#434583: ITP: tbb -- Thread Building Blocks is a parallelism library for C++
Package: wnpp Severity: wishlist Owner: Adam Majer [EMAIL PROTECTED] * Package name: tbb Version : 2.0~20070719 Upstream Author : Intel Corporation * URL : http://www.threadingbuildingblocks.org/ * License : GPL with runtime exception Programming Lang: C++ Description : Thread Building Blocks is a parallelism library for C++ TBB is a library that helps you leverage multi-core processor performance without having to be a threading expert. It represents a higher-level, task-based parallelism that abstracts platform details and threading mechanism for performance and scalability. . For more information see http://www.threadingbuildingblocks.org/ The runtime exception is to the GPL license is,, As a special exception, you may use this file as part of a free software library without restriction. Specifically, if other files instantiate templates or use macros or inline functions from this file, or you compile this file and link it with other files to produce an executable, this file does not by itself cause the resulting executable to be covered by the GNU General Public License. This exception does not however invalidate any other reasons why the executable file might be covered by the GNU General Public License. http://gcc.gnu.org/onlinedocs/libstdc++/17_intro/license.html -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (900, 'unstable'), (5, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.22-rc1 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#215367: ITP: pylibpcap - status?
On Tue, 2007-07-24 at 16:55 +0200, Thomas Bläsing wrote: The developers contacted me by mail and we will find a solution, I think. Cool You might want to join the Debian Python Modules Team: http://wiki.debian.org/Teams/PythonModulesTeam I'll read it tonight and then try to get involved, because I have to maintain 2 other python packages. Paul: Could you sponsor me for this package when it is completed? Unfortunately I don't really have time for sponsoring, the python-modules team is fairly active and you will likely find a sponsor there quite easily, especially if you join the irc channel. -- bye, pabs http://wiki.debian.org/PaulWise signature.asc Description: This is a digitally signed message part
Processed: tagging bugs that are closed by packages in NEW as pending
Processing commands for [EMAIL PROTECTED]: # the following bugs are closed by packages in NEW # tags 253735 pending Bug#253735: ITP: gnome-bluetooth -- GNOME Bluetooth tools There were no tags set. Tags added: pending tags 279989 pending Bug#279989: ITP: tclodbc -- ODBC extension to Tcl There were no tags set. Tags added: pending tags 433168 pending Bug#433168: ITP: hfsprogs -- mkfs and fsck for HFS and HFS+ file systems There were no tags set. Tags added: pending tags 433647 pending Bug#433647: libchipcard2: New version available There were no tags set. Tags added: pending tags 434091 pending Bug#434091: ITP: libgettext-commons-java -- Java classes for internationalization (i18n) There were no tags set. Tags added: pending thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]