Bug#434489: ITP: cadabra -- Field-theory motivated computer algebra system

2007-07-24 Thread Gürkan Sengün

Package: wnpp
Severity: wishlist

* Package name: cadabra
  Version : 0.119
  Upstream Authors: Kasper Peeters
* URL : http://www.aei.mpg.de/~peekas/cadabra/
* License : GNU GPL v2
  Description : Field-theory motivated computer algebra system
 Cadabra is a computer algebra system designed specifically for the
 solution of problems encountered in field theory. It has extensive
 functionality for tensor polynomial simplification including
 multi-term symmetries, fermions and anti-commuting variables,
 Clifford algebras and Fierz transformations, implicit coordinate
 dependence, multiple index types and many more. The input format is
 a subset of TeX.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#419214: marked as done (RFA: screentest -- Utility to test the quality of CRT screens)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 07:32:02 +
with message-id [EMAIL PROTECTED]
and subject line Bug#419214: fixed in screentest 1.0-5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: screentest
Severity: wishlist

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398350
http://packages.qa.debian.org/s/screentest.html
http://packages.debian.org/screentest
http://www.fi.muni.cz/~kas/screentest/
http://www.debian.org/devel/wnpp/

I have currently no plans to do the upstream work to fix bug 398350.  If
you want to do that, then you're welcome to take over this Debian
package.  It's OK to do that without asking me.  Non-DD's are welcome to
ask my help.

In the meantime I intend to continue to do basic package maintenance.



signature.asc
Description: This is a digitally signed message part
---End Message---
---BeginMessage---
Source: screentest
Source-Version: 1.0-5

We believe that the bug you reported is fixed in the latest version of
screentest, which is due to be installed in the Debian FTP archive:

screentest_1.0-5.diff.gz
  to pool/main/s/screentest/screentest_1.0-5.diff.gz
screentest_1.0-5.dsc
  to pool/main/s/screentest/screentest_1.0-5.dsc
screentest_1.0-5_i386.deb
  to pool/main/s/screentest/screentest_1.0-5_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Giacomo Catenazzi [EMAIL PROTECTED] (supplier of updated screentest package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 24 Jul 2007 08:30:06 +0200
Source: screentest
Binary: screentest
Architecture: source i386
Version: 1.0-5
Distribution: unstable
Urgency: low
Maintainer: Giacomo Catenazzi [EMAIL PROTECTED]
Changed-By: Giacomo Catenazzi [EMAIL PROTECTED]
Description: 
 screentest - Utility to test the quality of screens
Closes: 398350 419214
Changes: 
 screentest (1.0-5) unstable; urgency=low
 .
   * New maintainer. Closes: #419214
   * use newer libgtk and libglib libraries. Closes: #398350
   * debian/control, Makefile.am: Updated package dependencies (build and 
runtime)
   * Makefile.am: don't build static version
Files: 
 69fd75d467d60425e5afc43ef7280ef4 764 utils optional screentest_1.0-5.dsc
 e7b9d649b000a49146e9612c22b285d1 4044 utils optional screentest_1.0-5.diff.gz
 989580452004629f664153065c17eef5 18154 utils optional screentest_1.0-5_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGpaci+ZNUJLHfmlcRAiQRAJ0VDEQE4WUaGtIjT232Gc1jOuqDCQCfaLF8
I0jPXspiz9Uf+zq9FzFqOUw=
=kGF+
-END PGP SIGNATURE-

---End Message---


Bug#401575: [pkg-lighttpd] lighttpd RFH

2007-07-24 Thread Pierre Habouzit
On Sat, Jul 21, 2007 at 12:15:55AM +0200, Pierre Habouzit wrote:
   FWIW I'd like to step up as a lighttpd co-maintainer.  I've requested
 membership on alioth already.

  Hello someone ?

-- 
·O·  Pierre Habouzit
··O[EMAIL PROTECTED]
OOOhttp://www.madism.org


pgp5B0b4ASkca.pgp
Description: PGP signature


Bug#434492: RFA: workrave -- RSI prevention tool

2007-07-24 Thread Michael Piefel
Package: wnpp
Severity: normal

I request an adopter for the workrave package. It seems I will not work
on a Debian desktop for some time, so I cannot properly test anything.

The package description is:
 Workrave is a program that assists in the recovery and prevention of
 Repetitive Strain Injury (RSI). The program frequently alerts you to
 take micro-pauses, rest breaks and restricts you to your daily limit.
 .
 It includes a system tray applet that works with Gnome and KDE
 and has network capabilities to monitor your activity even if
 switching back and forth between different computers is part of your
 job.
 .
 Workrave offers many more configuration options than other similar
 tools.
 .
 More information about this program can be obtained from
 http://www.workrave.org/

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.21-1-686 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#428738: ITA: gtkfontsel

2007-07-24 Thread Christoph Berg
Re: Vincent Fourmond 2007-07-23 [EMAIL PROTECTED]
   I use gtkfontsel - rather infrequently, I admit - and that's precisely
 the kind of software you're desperately looking for when doing various
 configurations, and whose need falls down afterwards. I would personally
 miss it if it weren't in Debian.

Cool.

   Do you have any recommendations, or know some traps I should be wary
 of ? Hard work I should be looking forward to ;-) ?

Not really. Most of the maintenance work is probably keeping the
package alive as gtk-1.2 gets more and more deprecated.

Christoph
-- 


signature.asc
Description: Digital signature


Bug#434495: ITP: glaurung2 -- free UCI chess engine, to calculate chess moves.

2007-07-24 Thread oliver

Package: wnpp
Severity: wishlist
Owner: Oliver Korff [EMAIL PROTECTED]


* Package name: glaurung2
  Version : 2.e.5
  Upstream Author : Romstad Tord [EMAIL PROTECTED]
* URL : http://www.glaurungchess.com/
* License : GPL
  Programming Lang: C++
  Description : free UCI chess engine, to calculate chess moves.

This is a very strong chess engine, finished 4th place at internatonal
ChessWar X. It uses the UCI (universal chess interface), for chess
engines as communication protocol. This means to play against it,
you will have to use an UCI capable interface, like knights. Or an
xboard adapter like polyglot. glaurung can be found at:
.
http://www.glaurungchess.com/

#

Why another chess engine? --
Why another editor?

Playing chess means also analyze your own moves with the strongest
computer program currently available. Strength here is a relative
impression of the user. Giving him various possibilitys.

Oliver
-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.21-2-686 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#434496: ITP: libpj-java -- The Parallel Java Library

2007-07-24 Thread Manuel Prinz
Package: wnpp
Severity: wishlist
Owner: Manuel Prinz [EMAIL PROTECTED]


* Package name: libpj-java
  Version : 20070703
  Upstream Author : Alan Kaminsky [EMAIL PROTECTED]
* URL : http://www.cs.rit.edu/~ark/pj.shtml
* License : GPL
  Programming Lang: Java
  Description : The Parallel Java Library

 Parallel Java (PJ) is an API and middleware for parallel programming
 in 100% Java on shared memory multiprocessor (SMP) parallel computers,
 cluster parallel computers, and hybrid SMP cluster parallel computers.
 .
  Homepage: http://www.cs.rit.edu/~ark/pj.shtml

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable'), (200, 'testing')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-amd64
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: tagging bugs that are closed by packages in NEW as pending

2007-07-24 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # the following bugs are closed by packages in NEW
 #
 tags 391103 pending
Bug#391103: ITP: xrdp -- RDP server
There were no tags set.
Tags added: pending

 tags 396220 pending
Bug#396220: linux-modules-extra-2.6_2.6.18-1(m68k/unstable/zeus): FTBFS on m68k
There were no tags set.
Tags added: pending

 tags 434335 pending
Bug#434335: ITP: [PACKAGE] -- soap library for the lua language version 5.1
There were no tags set.
Tags added: pending

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#434517: O: libgringotts -- Development files for the Gringotts data encapsulation library

2007-07-24 Thread Bastian Kleineidam
Package: wnpp
Severity: normal

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I intend to orphan the libgringotts package, because the upstream author
is missing and does not answer email, and the project homepage has
vanished.

If someone wants to adopt this package, he/she should be prepared
to maintain/develop the software itself.

I myself switched to an alternative password manager.

The package description is:
 a small, easy-to-use, thread-safe C library originally developed
 for Gringotts; its purpose is to encapsulate data (generic: ASCII
 but also binary data) in an encrypted and compressed file. It
 uses strong encryption algorithms, to ensure the data is as safe as
 possible, and allows the user to have the complete control over all
 the algorithms used in the process.
 .
 For encryptions, libGringotts makes use of the MCrypt and MHash
 C libraries by Nikos Mavroyanopoulos.
 .
 Homepage: http://devel.pluto.linux.it/projects/libGringotts/index.php

- -- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.21treasure1 (PREEMPT)
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGpg9QeBwlBDLsbz4RAhLKAJ4uUKL94sCU+zPonvcFvzDsh7CS1QCfU/o4
S9ovIQNRr08DaWdYUeUiyCQ=
=EhFh
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#434518: ITP: libsnmp-info-perl -- OO interface to network devices and MIBs through SNMP

2007-07-24 Thread Oliver Gorwits
Package: wnpp
Severity: wishlist
Owner: Oliver Gorwits [EMAIL PROTECTED]


* Package name: libsnmp-info-perl
  Version : 1.04
  Upstream Author : Eric A. Miller [EMAIL PROTECTED]
* URL : http://snmp-info.sourceforge.net/
* License : Perl/Artistic
  Programming Lang: Perl
  Description : OO interface to network devices and MIBs through SNMP

SNMP::Info gives an object oriented interface to information obtained through
SNMP. This module is geared towards network devices; subclasses exist for a
number of network devices and common MIBs.

The idea is to give a common interface to data from network devices, leaving
the device-specific hacks behind the scenes in subclasses. The information may
be coming from any number of MIB files and is often vendor specific. SNMP::Info
provides a common API for all supported devices. Adding support for your own
device is easy, and takes little SNMP knowledge. The module is not limited to
network devices. Any MIB or device can be given an objected oriented front-end
by making a module that consists of a couple hashes.

This module was originally written in support of the NetDisco project.

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#215367: ITP: pylibpcap - status?

2007-07-24 Thread Thomas Bläsing
owner 215367 !
thanks

On Mon, Jul 23, 2007 at 11:52:19AM +1000, Paul Wise wrote:
 On Sun, 2007-07-22 at 12:04 +0200, Thomas Bläsing wrote:
 
  I'm very interested in maintain this package.
  So, is there any further working on it or can
  I take it?
 
 Before a package can be uploaded, this bug needs to be fixed:
 
 http://sf.net/support/tracker.php?aid=1320469
 
 Looks like it has been fixed in CVS, but not in the latest release.
 
 I don't really have much time to maintain more packages,or sponsor any,
 so feel free to take over this ITP.
ok, thanks ;)

 So I guess you will have to package a CVS snapshot for this to be
 uploaded to Debian.
I try to make a package till end of the week ;)
The developers contacted me by mail and we will find a solution, I think.

 
 You might want to join the Debian Python Modules Team:
 
 http://wiki.debian.org/Teams/PythonModulesTeam
I'll read it tonight and then try to get involved, because I have
to maintain 2 other python packages.

Paul: Could you sponsor me for this package when it is completed?

Thanks,
Thomas.



signature.asc
Description: Digital signature


Processed: Re: Bug#215367: ITP: pylibpcap - status?

2007-07-24 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 owner 215367 !
Bug#215367: ITP: pylibpcap -- A Python binding for the packet capture library 
libpcap
Owner changed from Paul Wise [EMAIL PROTECTED] to Thomas Bläsing [EMAIL 
PROTECTED].

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#434519: O: gringotts -- store passwords in an encrypted file

2007-07-24 Thread Bastian Kleineidam
Package: wnpp
Severity: normal

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I intend to orphan the gringotts package. The reason is that the
upstream author does not reply to mails anymore and the project
homepage has vanished.

If nobody adopts this package (and is prepared to also do some
upstream bug fixing/development work) I will file a removal request.

I myself have switched to an alternative password manager (keepassx).

The package description is:
 Gringotts is a small utility for Linux that allows you to store and
 organize sensitive data (passwords, credit card numbers, PINs etc.)
 in an easy-to-read, easy-to-access, and protected form.
 .
 Homepage: http://devel.pluto.linux.it/projects/Gringotts/

- -- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.21treasure1 (PREEMPT)
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGphPPeBwlBDLsbz4RAgDJAJ9BuP0LWe8JYL/qrYbijp+67g4sewCfUwdG
bfxyk+lXX//jPKw0qvTVEtA=
=/W59
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: fixed 253733 in 0.9.0-1

2007-07-24 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.6
 fixed 253733 0.9.0-1
Bug#253733: ITP: libbtctl -- GObject Bluetooth library
Bug marked as fixed in version 0.9.0-1.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#428813: marked as done (ITA: xscreensaver -- Automatic screensaver for X)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 15:47:06 +
with message-id [EMAIL PROTECTED]
and subject line Bug#428813: fixed in xscreensaver 5.03-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: normal


I'd like to orphan the package since I cannot find the time to
maintain it anymore.

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.21.4 (SMP w/4 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash

---End Message---
---BeginMessage---
Source: xscreensaver
Source-Version: 5.03-1

We believe that the bug you reported is fixed in the latest version of
xscreensaver, which is due to be installed in the Debian FTP archive:

xscreensaver-gl_5.03-1_powerpc.deb
  to pool/main/x/xscreensaver/xscreensaver-gl_5.03-1_powerpc.deb
xscreensaver_5.03-1.diff.gz
  to pool/main/x/xscreensaver/xscreensaver_5.03-1.diff.gz
xscreensaver_5.03-1.dsc
  to pool/main/x/xscreensaver/xscreensaver_5.03-1.dsc
xscreensaver_5.03-1_powerpc.deb
  to pool/main/x/xscreensaver/xscreensaver_5.03-1_powerpc.deb
xscreensaver_5.03.orig.tar.gz
  to pool/main/x/xscreensaver/xscreensaver_5.03.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jose Luis Rivas [EMAIL PROTECTED] (supplier of updated xscreensaver package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 13 Jul 2007 17:15:43 -0400
Source: xscreensaver
Binary: xscreensaver xscreensaver-gl
Architecture: source powerpc
Version: 5.03-1
Distribution: unstable
Urgency: low
Maintainer: Jose Luis Rivas [EMAIL PROTECTED]
Changed-By: Jose Luis Rivas [EMAIL PROTECTED]
Description: 
 xscreensaver - Automatic screensaver for X
 xscreensaver-gl - GL(Mesa) screen hacks for xscreensaver
Closes: 180063 257092 273180 296552 303368 316931 317383 326733 330971 337100 
368600 375488 376982 390672 393140 407886 419022 423560 428798 428813
Changes: 
 xscreensaver (5.03-1) unstable; urgency=low
 .
   * New maintainer and uploader (Closes: #428813, #428798)
   * New upstream version packaged (Closes: #407886)
   * No error during authentication (Closes: #180063)
   * No more waiting until mouse moves for starting. (Closes: #257092)
   * Flurry now runs OK. (Closes: #296552)
   * No more crashes during exit of `xscreensaver' (Closes: #273180)
   * Xscreensaver has changed a lot how works with the pam_module and it seems
   as does not ask for password anymore if is not required. (Closes: #303368)
   * XScreensaver turns off both screens if is used with Dual-head on laptops
   tested on a HP and a Siragon notebook. (Closes: #337100)
   * Currently XScreensaver request password everytime, even if Power management
   is enabled. (Closes: #330971)
   * XScreensaver does not longer ignores settings on ~/.xscreensaver anymore
   and modifying settings with `xscreensaver-demo' will save your settings as
   should and will not be restarted. (Closes: #316931)
   * xscreensaver does properly requests passwords and proccess them as should
   if that's the case. (Closes: #368600)
   * Now images are rotated as should when using carousel with the EXIF data of
   each JPEG archive. (Closes: #375488)
   * Fontglide is running OK without fonts issues. (Closes: #393140)
   * The apple2 hack was tested and there's no problem. (Closes: #423560)
   * Webcollage renders properly and add images to the collage without emptying
   the screen (tested with nv, nvidia and vesa drivers). (Closes: #317383)
   * Added the `unlock' button to login box. (Closes: #326733)
   * debian/control:
 + Deleted `Uploaders' field.
 + Changed `Maintainer' name and email.
 + Replaced build-depend on `xlibs-data' with `xbitmaps'. (Closes: #419022)
 + Updated `Standard-Versions' to 3.7.2, no changes needed.
 + Added Build-Depend on `dpatch'.
 + Updated `xscreensaver-gl' description with `X.Org' instead of `XFree'.
 + Moved `netpbm' to Depends from Suggests of xscreensaver since it's 

Bug#434525: ITP: swing-layout -- Extensions to Swing layout

2007-07-24 Thread Michael Koch
Package: wnpp
Severity: wishlist
Owner: Michael Koch [EMAIL PROTECTED]


* Package name: swing-layout
  Version : 1.0.2
  Upstream Author : SUN Microsystems, Inc.
* URL : http://swing-layout.dev.java.net
* License : LGPL
  Programming Lang: Java
  Description : swing-layout - Extensions to Swing layout

Swing Layout Extensions goal is to make it easy to create professional
cross platform layouts with Swing. This project has an eye towards the
needs of GUI builders, such as NetBeans. This project consists of the
following pieces:

 * Ability to get the baseline for components.

 * Ability to get the preferred gap between components.

 * A new LayoutManager that utilizes both of these concepts and is tuned
   toward a free-form drag and drop layout model as can be provided by GUI 
builders.


Cheers,
Michael

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.21-2-686 (SMP w/1 CPU core)
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#434532: ITP: netdisco -- Web-based network management tool

2007-07-24 Thread Oliver Gorwits
Package: wnpp
Severity: wishlist
Owner: Oliver Gorwits [EMAIL PROTECTED]


* Package name: netdisco
  Version : 0.95
  Upstream Author : Eric Miller, Bill Fenner and Max Baker [EMAIL PROTECTED]
* URL : http://www.netdisco.org/
* License : Perl/Artistic
  Programming Lang: Perl
  Description : Web-based network management tool

NetDisco is designed for moderate to large networks, configuration information
and connection data for network devices are retrieved and set by SNMP. With
Netdisco you can locate the switch port of an end-user system by IP or MAC
address. Data is stored using a SQL database for scalability and speed.

Cisco Discovery Protocol (CDP), Foundry Discovery Protocol (FDP), Link Layer
Discovery Protocol (LLDP), and SynOptics Network Management Protocol (SONMP)
optionally provide automatic discovery of the network topology.

The network is inventoried by both device model and operating system (such as
IOS). Netdisco uses router ARP tables and L2 switch MAC forwarding tables to
locate nodes on physical ports and track them by their IP addresses.

For each node, a time stamped history of the ports it has visited and the IP
addresses it has used is maintained. Netdisco gets all its data, including
topology information, with SNMP polls and DNS queries. It does not use CLI
access and has no need for privilege passwords. Security features include a
wire-side Wireless Access Point (AP) locator.

Netdisco was created at the University of California, Santa Cruz (UCSC),
Networking and Technology Services (NTS) department. UCSC continues to support
the development of Netdisco by providing development servers and financial
support. The Netdisco project is hosted by Source Forge.

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#173879: INPUT DEVICE

2007-07-24 Thread Lolita

Have you ever hoped to have a high dollar Watch?

We have the problem solved for you!

We provide all the big names 
for a low fraction of the expense.


www.wehequis.com




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#434532: ITP: netdisco -- Web-based network management tool

2007-07-24 Thread Bernd Zeimetz
forcemerge 434532 403113
thanks

there was an RFP for that since  200 days.

-- 
Bernd Zeimetz
[EMAIL PROTECTED] http://bzed.de/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#138873: SANS SERIF FONT

2007-07-24 Thread Lyman

Have you ever wished for a pricey Watch?

We have the problem solved for you!

We carry all the big names 
for a low precentage of the price.


www.wehequis.com




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#280566: marked as done (ITP: clit -- Decompiler for Microsoft's .lit ebook format)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 11:59:30 -0600
with message-id [EMAIL PROTECTED]
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: wishlist

* Package name: clit
  Version : 1.8
  Upstream Author : [EMAIL PROTECTED]
* URL : http://www.lubemobile.com.au/ras/debian/sarge/clit/
* License : GPL
  Description : Decompiler for Microsoft's .lit ebook format

Convert Microsoft's .lit ebook format back into the raw HTML it
was created from.

Note: this needs libtommath, which is also ITP'ed.

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-7-lube-686-smp
Locale: LANG=en_AU, LC_CTYPE=en_AU

---End Message---
---BeginMessage---
Hello,

This is an automatic mail sent to close the ITP you have reported or 
are involved with.

Your ITP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the ITP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:

 reopen 280566
 stop

Further comments on the work done in the bug sent to
[EMAIL PROTECTED] would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: [EMAIL PROTECTED].

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza [EMAIL PROTECTED].
 
---End Message---


Bug#379644: marked as done (ITP: libewf -- Expert Witness File Format Tools)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 11:59:32 -0600
with message-id [EMAIL PROTECTED]
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: wishlist
Owner: Kenny Duffus [EMAIL PROTECTED]

* Package name: libewf
  Version : 20060708-1
  Upstream Author : Joachim Metz [EMAIL PROTECTED]
* URL : https://www.uitwisselplatform.nl/projects/libewf/
* License : BSD
  Description : Expert Witness File Format Tools

 A library for support of the Expert Witness Compression Format (EWF).
 Libewf allows you to read media information of EWF files created by
 EnCase 1 - 5 and FTK Imager

-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.16-2-k7
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

---End Message---
---BeginMessage---
Hello,

This is an automatic mail sent to close the ITP you have reported or 
are involved with.

Your ITP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the ITP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:

 reopen 379644
 stop

Further comments on the work done in the bug sent to
[EMAIL PROTECTED] would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: [EMAIL PROTECTED].

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza [EMAIL PROTECTED].
 
---End Message---


Bug#332858: marked as done (ITP: cvsup -- The CVS-Optimized General-Purpose Network File Distribution System)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 11:59:30 -0600
with message-id [EMAIL PROTECTED]
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: wishlist
Owner: Piotr Roszatycki [EMAIL PROTECTED]

* Package name: cvsup
  Version : 16.1h
* URL : http://www.cvsup.org/
* License : BSD
  Description : The CVS-Optimized General-Purpose Network File Distribution 
System

The CVSup package was orphaned some time ago. See 
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=129583

The CVSup requires Modula-3 compilator to build, so also I'm planning to
package Ezm3 - An Easier Modula-3 Distribution, which is designated to compile
CVSup only. CVSup binary compiled with Ezm3 depends on standard GLIBC
library only and does not require Modula-3 runtime.

---End Message---
---BeginMessage---
Hello,

This is an automatic mail sent to close the ITP you have reported or 
are involved with.

Your ITP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the ITP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:

 reopen 332858
 stop

Further comments on the work done in the bug sent to
[EMAIL PROTECTED] would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: [EMAIL PROTECTED].

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza [EMAIL PROTECTED].
 
---End Message---


Bug#343493: marked as done (ITP: teckit -- a Text Encoding Conversion toolkit)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 11:59:30 -0600
with message-id [EMAIL PROTECTED]
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: wishlist

From its website
http://scripts.sil.org/cms/scripts/page.php?site_id=nrsicat_id=TECkit

TECkit is a low-level toolkit intended to be used by other applications
that need to perform encoding conversions (e.g., when importing legacy
data into a Unicode-based application). The primary component of the
TECkit package is therefore a library that performs conversions; this is
the TECkit engine. The engine relies on mapping tables in a specific
binary format (for which documentation is available); there is a
compiler that creates such tables from a human-readable mapping
description (a simple text file).

It is dual licensed under the LGPL or CPL.

A 2.1.3 version that builds and runs on linux will be released soon and
will be what I will package.

Regards,
Daniel

---End Message---
---BeginMessage---
Hello,

This is an automatic mail sent to close the ITP you have reported or 
are involved with.

Your ITP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the ITP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:

 reopen 343493
 stop

Further comments on the work done in the bug sent to
[EMAIL PROTECTED] would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: [EMAIL PROTECTED].

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza [EMAIL PROTECTED].
 
---End Message---


Bug#350878: marked as done (ITP: kernel-patch-realtime-preempt -- Realtime preemption patch)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 11:59:30 -0600
with message-id [EMAIL PROTECTED]
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: wishlist

* Package name: kernel-patch-realtime-preempt
  Version : 2.6.15+rt12
  Upstream Author : Ingo Molnar
* URL or Web page : http://people.redhat.com/mingo/realtime-preempt/
* License : GPL
  Description : realtime preemption patch

This package provides a kernel patch for the realtime kernel
scheduler.The patch was written an is maintained by Ingo Molnar
and Arjan van de Ven and aims to fix all latency sources that
generate higher than ~1 msec latencies.


---End Message---
---BeginMessage---
Hello,

This is an automatic mail sent to close the ITP you have reported or 
are involved with.

Your ITP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the ITP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:

 reopen 350878
 stop

Further comments on the work done in the bug sent to
[EMAIL PROTECTED] would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: [EMAIL PROTECTED].

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza [EMAIL PROTECTED].
 
---End Message---


Bug#378861: marked as done (RFP: icmptx -- IP tunnel over ICMP)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 11:59:42 -0600
with message-id [EMAIL PROTECTED]
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---

Subject: RFP: icmptx -- IP tunnel over ICMP
Package: wnpp
Severity: wishlist

*** Please type your report below this line ***

* Package name: icmptx
 Version : 0.01
 Upstream Author : Maxim Krasnyansky [EMAIL PROTECTED], edi / teso,
   and others.
* URL : http://thomer.com/icmptx/icmptx-0.01.tar.gz
* License : GPL and unknown
 Programming Lang: C
 Description : IP tunnel over ICMP

You're sitting in an airport or in a cafe, and people want your money for
Internet access. They do allow ICMP traffic, though (i.e., you can ping
machines on the Internet). Enters ICMPTX. (If you can't use ping, but you can
issue name queries, use NSTX: IP-over-DNS.)



The icmptx.c and it.c are a little bit shaky on the copyright, the rest
seem they all have copyright belonging to Maxim Krasnyansky.

icmptx.c contains this text:
/* Code is ruthlessly ripped from vtun and itunnel with appropriate changes.
* Guys, thanks for the great stuff!
*
* itunnel - an ICMP tunnel by edi / teso
* VTun - Virtual Tunnel over TCP/IP network.
*
* Original author unknown, but modified by Thomer M. Gil who found the original
* code through
*   http://www.linuxexposed.com/Articles/Hacking/Case-of-a-wireless-hack.html
* (a page written by Siim Põder).
*
* The icmptx website is at http://thomer.com/icmptx/
*/

it.c contains:

/*
* itunnel - an ICMP tunnel by edi / teso
* usage: it [-i id] [-s packetsize] host
* establishes   a   bidirectional   ICMP
* 'connection' with 'host'  by listening
* to  ICMP  packets with  a  specific id
* (default: 7530). uses stdin and stdout
* and needs to run as root.
c *
*/



--
Regards,
EddyP
=
Imagination is more important than knowledge A.Einstein
---End Message---
---BeginMessage---
Hello,

This is an automatic mail sent to close the RFP you have reported or 
are involved with.

Your RFP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the RFP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:

 reopen 378861
 stop

Further comments on the work done in the bug sent to
[EMAIL PROTECTED] would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: [EMAIL PROTECTED].

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza [EMAIL PROTECTED].
 
---End Message---


Processed: [Fwd: Re: Bug#434532: ITP: netdisco -- Web-based network management tool]

2007-07-24 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 forcemerge 434532 403113
Bug#434532: ITP: netdisco -- Web-based network management tool
Bug#403113: RFP: netdisco -- an Open Source web-based network management tool
Forcibly Merged 403113 434532.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#378618: marked as done (ITP: libepp-nicbr -- EP Protocol NIC.br C++ library)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 11:59:31 -0600
with message-id [EMAIL PROTECTED]
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: wishlist
Owner: Gustavo Franco [EMAIL PROTECTED]

Package name: libepp-nicbr
Version : 1.0-1
Upstream author : Registro.br -  [EMAIL PROTECTED]
URL : http://registro.br/epp/index-EN.html
License :

Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
1. Redistribution of source code must retain the above copyright
   notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
   notice, this list of conditions and the following disclaimer in the
   documentation and/or other materials provided with the distribution.
[...]

Description : EP Protocol NIC.br library

This is the libepp-nicbr C++ library that partially implements
the Extensible Provisioning Protocol (EPP), as described in the
Internet drafts RFC3730bis to RFC3734bis and RFC3735.
.
In order to conform to the .BR model, extensions to the EPP Domain
Name and Contact Mapping were made (draft-neves-epp-brdomain and
draft-neves-epp-brorg).

-- 
Gustavo Franco - [EMAIL PROTECTED]

---End Message---
---BeginMessage---
Hello,

This is an automatic mail sent to close the ITP you have reported or 
are involved with.

Your ITP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the ITP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:

 reopen 378618
 stop

Further comments on the work done in the bug sent to
[EMAIL PROTECTED] would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: [EMAIL PROTECTED].

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza [EMAIL PROTECTED].
 
---End Message---


Bug#379506: marked as done (ITP: sladinstaller -- Graphical Installer for the Security Local Auditing Daemon)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 11:59:32 -0600
with message-id [EMAIL PROTECTED]
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: wishlist
Owner: Meike Reichle [EMAIL PROTECTED]


* Package name: sladinstaller
  Version : 1.1
  Upstream Author : DN-Systems Enterprise Internet Solutions GmbH [EMAIL 
PROTECTED]
* URL : http://www.dn-systems.org/slad.shtml
* License : GPL
  Programming Lang: C++
  Description : Graphical Installer for the Security Local Auditing Daemon

This graphical (GTK) installer installs the Security Local Auditing
Daemon V2 (SLAD2) on any local or remote machine. 

SLAD is a tool for performing local security checks against GNU/Linux
systems. SLAD has been primarily developed for the BOSS project to work
together with Nessus to enhance its local scanning capabilities.


-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-1-686
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)


---End Message---
---BeginMessage---
Hello,

This is an automatic mail sent to close the ITP you have reported or 
are involved with.

Your ITP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the ITP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:

 reopen 379506
 stop

Further comments on the work done in the bug sent to
[EMAIL PROTECTED] would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: [EMAIL PROTECTED].

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza [EMAIL PROTECTED].
 
---End Message---


Bug#378734: marked as done (ITP: axtls -- TLSv1 SSL library designed for embedded platforms)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 11:59:31 -0600
with message-id [EMAIL PROTECTED]
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: wishlist
Owner: Roberto Lumbreras [EMAIL PROTECTED]

* Package name: axtls
  Version : 1.01
  Upstream Author : Cameron Rich [EMAIL PROTECTED]
* URL : http://www.axtls.co.nr/
* License : LGPL
  Description : TLSv1 SSL library designed for embedded platforms

 axTLS is a highly configurable client/server TLSv1 SSL library designed
 for embedded platforms.


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-2-k7
Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8)

---End Message---
---BeginMessage---
Hello,

This is an automatic mail sent to close the ITP you have reported or 
are involved with.

Your ITP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the ITP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:

 reopen 378734
 stop

Further comments on the work done in the bug sent to
[EMAIL PROTECTED] would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: [EMAIL PROTECTED].

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza [EMAIL PROTECTED].
 
---End Message---


Bug#379343: marked as done (ITP: jrpg -- kanji learning game)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 11:59:31 -0600
with message-id [EMAIL PROTECTED]
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: wishlist
Owner: Eric Dorland [EMAIL PROTECTED]

* Package name: jrpg
  Version : 20060524-2151
  Upstream Author : Tomasz Wegrzanowski [EMAIL PROTECTED]
* URL : http://www.example.org/
* License : mostly GPL, but will go in non-free because of
non-free graphics
  Programming Lang: Python
  Description : kanji learning game

JRPG is a kanji learning game styled after the classic SNES RPG games
(like Final Fantasy 6, or Legend of Zelda: Link to the Past). The game
tries to help you learn how to read and understand kanji in context, and
in doing that it also helps you improve your Japanese vocabulary. You
can also use it to refresh your kana.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

---End Message---
---BeginMessage---
Hello,

This is an automatic mail sent to close the ITP you have reported or 
are involved with.

Your ITP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the ITP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:

 reopen 379343
 stop

Further comments on the work done in the bug sent to
[EMAIL PROTECTED] would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: [EMAIL PROTECTED].

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza [EMAIL PROTECTED].
 
---End Message---


Bug#378907: marked as done (ITP: tet -- Test Environment Toolkit from the Open Group)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 11:59:31 -0600
with message-id [EMAIL PROTECTED]
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: wishlist
Owner: Stuart Anderson [EMAIL PROTECTED]

* Package name: tet, tet-dev
  Version : 3.7a
  Upstream Author : The Open Group
* URL : http://tetware.opengroup.org/
* License : Artistic
  Programming Lang: C
  Description : Test Environment Toolkit from the Open Group

The TET frame work is needed to build certain tests suites such as the X
Test Suite (xts5), and the LSB test suites (which are derived from the
POSIX test suites).

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (910, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-1-k7
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

---End Message---
---BeginMessage---
Hello,

This is an automatic mail sent to close the ITP you have reported or 
are involved with.

Your ITP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the ITP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:

 reopen 378907
 stop

Further comments on the work done in the bug sent to
[EMAIL PROTECTED] would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: [EMAIL PROTECTED].

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza [EMAIL PROTECTED].
 
---End Message---


Bug#378906: marked as done (ITP: xts5 -- X Test Suite)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 11:59:31 -0600
with message-id [EMAIL PROTECTED]
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: wishlist
Owner: Stuart Anderson [EMAIL PROTECTED]

* Package name: xts5
  Version : 5.0.2.cvs20070717
  Upstream Author : X.Org Foundation
* URL : http://www.x.org/
* License : MIT/X
  Programming Lang: C
  Description : X Test Suite

This package will contain the X Test Suite (formerly known as VSW5).

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (910, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-1-k7
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

---End Message---
---BeginMessage---
Hello,

This is an automatic mail sent to close the ITP you have reported or 
are involved with.

Your ITP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the ITP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:

 reopen 378906
 stop

Further comments on the work done in the bug sent to
[EMAIL PROTECTED] would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: [EMAIL PROTECTED].

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza [EMAIL PROTECTED].
 
---End Message---


Bug#429387: marked as done (ITP: libsvg-perl -- perl module to generate SVG images)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 18:39:23 +
with message-id [EMAIL PROTECTED]
and subject line Bug#429387: fixed in libsvg-perl 2.33-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: wishlist
Owner: David Paleino [EMAIL PROTECTED]


* Package name: libsvg-perl
  Version : 2.33
  Upstream Author : Ronan Oger [EMAIL PROTECTED]
* URL : http://search.cpan.org/~ronan/SVG-2.33/
* License : Under the same terms as Perl (GPL - Artistic)
  Programming Lang: Perl
  Description : perl module to generate SVG images

 This package provides a perl extension to generate stand-alone
 or inline SVG (scalable vector graphics) images using the W3C
 SVG xml recommendation.
 .
  Homepage: http://search.cpan.org/~ronan/SVG-2.33/

This package would also close this bug:

http://bugs.debian.org/429163

Kind Regards,
David

-- 
 . ''`.  Debian maintainer | http://snipurl.com/gofoxygo/
 : :'  :  Linuxer #334216  |  http://www.hanskalabs.net/
 `. `'`GPG: 1392B174   | http://www.debianizzati.org/
   `-   2BAB C625 4E66 E7B8 450A C3E1 E6AA 9017 1392 B174

---End Message---
---BeginMessage---
Source: libsvg-perl
Source-Version: 2.33-1

We believe that the bug you reported is fixed in the latest version of
libsvg-perl, which is due to be installed in the Debian FTP archive:

libsvg-perl_2.33-1.diff.gz
  to pool/main/libs/libsvg-perl/libsvg-perl_2.33-1.diff.gz
libsvg-perl_2.33-1.dsc
  to pool/main/libs/libsvg-perl/libsvg-perl_2.33-1.dsc
libsvg-perl_2.33-1_all.deb
  to pool/main/libs/libsvg-perl/libsvg-perl_2.33-1_all.deb
libsvg-perl_2.33.orig.tar.gz
  to pool/main/libs/libsvg-perl/libsvg-perl_2.33.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
David Paleino [EMAIL PROTECTED] (supplier of updated libsvg-perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 16 Jun 2007 08:43:06 +0200
Source: libsvg-perl
Binary: libsvg-perl
Architecture: source all
Version: 2.33-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group [EMAIL PROTECTED]
Changed-By: David Paleino [EMAIL PROTECTED]
Description: 
 libsvg-perl - perl module to generate SVG images
Closes: 429387
Changes: 
 libsvg-perl (2.33-1) unstable; urgency=low
 .
   * Initial release (Closes: #429387)
Files: 
 ff949247b23bea7ad6a2f2f0516433aa 681 perl optional libsvg-perl_2.33-1.dsc
 80aff1f4d107bf56696653895e5eed81 47100 perl optional 
libsvg-perl_2.33.orig.tar.gz
 80b38e3c070c1d88e5a1d6e1113270e4 2790 perl optional libsvg-perl_2.33-1.diff.gz
 e708c141c795f006b944a462ce16c03e 73660 perl optional libsvg-perl_2.33-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGmINxHqjlqpcl9jsRAichAJoDM2h4Wg4sDrU9Au7WM3UEEIRNsgCghiCT
dMzMF5nEAHnJFYrjCR481rc=
=sH7M
-END PGP SIGNATURE-

---End Message---


Bug#429293: marked as done (ITP: libset-scalar-perl -- set for scalar operations)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 18:45:36 +
with message-id [EMAIL PROTECTED]
and subject line Bug#429293: fixed in libset-scalar-perl 1.20-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Package: wnpp
Severity: wishlist
Owner: Jose Luis Rivas [EMAIL PROTECTED]


* Package name: libset-scalar-perl
  Version : 1.20
  Upstream Author : Jarkko Hietaniemi [EMAIL PROTECTED]
* URL : http://search.cpan.org/dist/Set-Scalar/
* License : GPL/Artistic
  Programming Lang: Perl
  Description : set for scalar operations

 This perl module set scalar operations as creating, modying,
 displaying, deriving, comparing, etc.
 .
 This module provides: Set::Scalar::Base, Set::Scalar::Null,
 Set::Scalar::Real, Set::Scalar::Universe, Set::Scalar::Valued,
 Set::Scalar::ValuedUniverse, Set::Scalar::Virtual.
 .
  Homepage: http://search.cpan.org/dist/Set-Scalar/
- --

ghostbar on Linux/Debian 'sid' i686 - #382503
Weblog: http://ghostbar.ath.cx/ - http://linuxtachira.org
http://debian.org.ve - irc.debian.org #debian-ve #debian-devel-es
San Cristóbal, Venezuela. http://chaslug.org.ve
Fingerprint = 3E7D 4267 AFD5 2407 2A37  20AC 38A0 AD5B CACA B118
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGdETnOKCtW8rKsRgRAjjxAJ9QfjoiXduRtUq7qTE/dO9GldYjpwCfay09
L+ZxKGfXDfbFmtV9hxAa4B0=
=ZbQR
-END PGP SIGNATURE-

---End Message---
---BeginMessage---
Source: libset-scalar-perl
Source-Version: 1.20-1

We believe that the bug you reported is fixed in the latest version of
libset-scalar-perl, which is due to be installed in the Debian FTP archive:

libset-scalar-perl_1.20-1.diff.gz
  to pool/main/libs/libset-scalar-perl/libset-scalar-perl_1.20-1.diff.gz
libset-scalar-perl_1.20-1.dsc
  to pool/main/libs/libset-scalar-perl/libset-scalar-perl_1.20-1.dsc
libset-scalar-perl_1.20-1_all.deb
  to pool/main/libs/libset-scalar-perl/libset-scalar-perl_1.20-1_all.deb
libset-scalar-perl_1.20.orig.tar.gz
  to pool/main/libs/libset-scalar-perl/libset-scalar-perl_1.20.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jose Luis Rivas [EMAIL PROTECTED] (supplier of updated libset-scalar-perl 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 16 Jun 2007 15:41:39 -0400
Source: libset-scalar-perl
Binary: libset-scalar-perl
Architecture: source all
Version: 1.20-1
Distribution: unstable
Urgency: low
Maintainer: Jose Luis Rivas [EMAIL PROTECTED]
Changed-By: Jose Luis Rivas [EMAIL PROTECTED]
Description: 
 libset-scalar-perl - set for scalar operations
Closes: 429293
Changes: 
 libset-scalar-perl (1.20-1) unstable; urgency=low
 .
   * Initial release (Closes: #429293)
Files: 
 08ce605384770a10cdc45b7e6904f3b1 634 perl extra libset-scalar-perl_1.20-1.dsc
 ebef2b178117a07541bacfdbf7c86112 16814 perl extra 
libset-scalar-perl_1.20.orig.tar.gz
 35c40439b321eadf2b784720c5638fb4 1114 perl extra 
libset-scalar-perl_1.20-1.diff.gz
 45f86fe117575623234765eb76e560c6 33804 perl extra 
libset-scalar-perl_1.20-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGnKcsgY5NIXPNpFURAgVMAJ42mX0mOrOji9g2rgMg4elRBAjdQQCeKsQK
m4pHttX1kGvr5Go7areRGcE=
=KGQO
-END PGP SIGNATURE-

---End Message---


Bug#434538: ITP: tinymce-compressor-php -- compress TinyMCE to reduce overall download size

2007-07-24 Thread Joao Eriberto Mota Filho
Package: wnpp
Severity: wishlist
Owner: Joao Eriberto Mota Filho [EMAIL PROTECTED]

* Package name: tinymce-compressor-php
  Version : 1.1.0
  Upstream Author : Moxiecode Systems AB [EMAIL PROTECTED]
* URL : http://tinymce.moxiecode.com
* License : LGPL
  Description : compress TinyMCE to reduce overall download size

TinyMCE Compressor gzips all javascript files in TinyMCE to a single
streamable file. This makes the overall download sice 75% smaller and
the number of requests will also be reduced. The overall initialization
time for TinyMCE will be reduced dramaticly if used this script.

This package provides tiny_mce_gzip.js and tiny_mce_gzip.php files.


-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-686
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#428727: marked as done (ITP: libnet-cups-perl -- Provides an interface for)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 18:55:00 +
with message-id [EMAIL PROTECTED]
and subject line Bug#428727: fixed in libnet-cups-perl 0.51-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: wishlist

* Package name: libnet-cups-perl
  Version : 0.51
  Upstream Author : Name [EMAIL PROTECTED]
* URL : http://search.cpan.org/~dhageman/Net-CUPS-0.51/
* License : (GPL)
  Programming Lang: Perl, C
  Description : Perl module for printing with CUPS

(Include the long description here.)

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-686
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

---End Message---
---BeginMessage---
Source: libnet-cups-perl
Source-Version: 0.51-1

We believe that the bug you reported is fixed in the latest version of
libnet-cups-perl, which is due to be installed in the Debian FTP archive:

libnet-cups-perl_0.51-1.diff.gz
  to pool/main/libn/libnet-cups-perl/libnet-cups-perl_0.51-1.diff.gz
libnet-cups-perl_0.51-1.dsc
  to pool/main/libn/libnet-cups-perl/libnet-cups-perl_0.51-1.dsc
libnet-cups-perl_0.51-1_i386.deb
  to pool/main/libn/libnet-cups-perl/libnet-cups-perl_0.51-1_i386.deb
libnet-cups-perl_0.51.orig.tar.gz
  to pool/main/libn/libnet-cups-perl/libnet-cups-perl_0.51.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Rene Mayorga [EMAIL PROTECTED] (supplier of updated libnet-cups-perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 13 Jun 2007 15:02:18 -0600
Source: libnet-cups-perl
Binary: libnet-cups-perl
Architecture: source i386
Version: 0.51-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group [EMAIL PROTECTED]
Changed-By: Rene Mayorga [EMAIL PROTECTED]
Description: 
 libnet-cups-perl - Provides an interface for printing with CUPS
Closes: 428727
Changes: 
 libnet-cups-perl (0.51-1) unstable; urgency=low
 .
   * Initial release (Closes: #428727)
Files: 
 2539763ff02545b66a2a1a76e5d0ac0d 796 perl optional libnet-cups-perl_0.51-1.dsc
 75658ef478ecffdf2376689993ca397d 66149 perl optional 
libnet-cups-perl_0.51.orig.tar.gz
 f7e267b0cedcc248e841e819f32c44c1 1852 perl optional 
libnet-cups-perl_0.51-1.diff.gz
 cc42af54445cddd88a4cac51eb144bc2 54496 perl optional 
libnet-cups-perl_0.51-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGn55QQbn06FtxPfARAilxAKC8miXZCi6FKe1Rn2h4TCtC5fin+gCdHVjT
qV4pMwpxwHDUDCpG5SSIik4=
=vxfE
-END PGP SIGNATURE-

---End Message---


Bug#433955: marked as done (ITP: libperl6-junction-perl -- Perl6 style Junction operators in Perl5.)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 18:55:24 +
with message-id [EMAIL PROTECTED]
and subject line Bug#433955: fixed in libperl6-junction-perl 1.3-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: wishlist
Owner: Krzysztof Krzyzaniak (eloy) [EMAIL PROTECTED]


* Package name: libperl6-junction-perl
  Version : 1.3
  Upstream Author : Carl Franks
* URL : http://www.cpan.org/
* License : Perl (GPL/Artistic)
  Programming Lang: Perl
  Description : Perl6 style Junction operators in Perl5.

 Perl6::Junction is a lightweight module which provides 'Junction' operators,
 the most commonly used being any and all.
 .
 Inspired by the Perl6 design docs, 
 http://dev.perl.org/perl6/doc/design/exe/E06.html.
 .
 Provides a limited subset of the functionality of Quantum::Superpositions.

 This package is needed for uploading new version of libdata-formvalidator-perl

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.18-4-686 (SMP w/1 CPU core)
Locale: LANG=pl_PL, LC_CTYPE=pl_PL (charmap=ISO-8859-2)
Shell: /bin/sh linked to /bin/bash

---End Message---
---BeginMessage---
Source: libperl6-junction-perl
Source-Version: 1.3-1

We believe that the bug you reported is fixed in the latest version of
libperl6-junction-perl, which is due to be installed in the Debian FTP archive:

libperl6-junction-perl_1.3-1.diff.gz
  to 
pool/main/libp/libperl6-junction-perl/libperl6-junction-perl_1.3-1.diff.gz
libperl6-junction-perl_1.3-1.dsc
  to pool/main/libp/libperl6-junction-perl/libperl6-junction-perl_1.3-1.dsc
libperl6-junction-perl_1.3-1_all.deb
  to 
pool/main/libp/libperl6-junction-perl/libperl6-junction-perl_1.3-1_all.deb
libperl6-junction-perl_1.3.orig.tar.gz
  to 
pool/main/libp/libperl6-junction-perl/libperl6-junction-perl_1.3.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Krzysztof Krzyzaniak (eloy) [EMAIL PROTECTED] (supplier of updated 
libperl6-junction-perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 20 Jul 2007 16:52:31 +0200
Source: libperl6-junction-perl
Binary: libperl6-junction-perl
Architecture: source all
Version: 1.3-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group [EMAIL PROTECTED]
Changed-By: Krzysztof Krzyzaniak (eloy) [EMAIL PROTECTED]
Description: 
 libperl6-junction-perl - Perl6 style Junction operators in Perl5.
Closes: 433955
Changes: 
 libperl6-junction-perl (1.3-1) unstable; urgency=low
 .
   * Initial Release (closes: #433955).
Files: 
 78f9bdc80a255aab623f0acd841add1a 752 perl optional 
libperl6-junction-perl_1.3-1.dsc
 93f29bf4d0527264106b1d149ec11c3d 6397 perl optional 
libperl6-junction-perl_1.3.orig.tar.gz
 b5fb6a215531e9acbb7567ad695e07ae 1802 perl optional 
libperl6-junction-perl_1.3-1.diff.gz
 1e55c85f0a831a104d0efb1e795dc154 8560 perl optional 
libperl6-junction-perl_1.3-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGoNW2y+HP4f7iC8sRAnpVAJ9LgXJ5XhVYUZfM6MQ5qpNAAJWyRgCgmyOX
ZoXa35LnqEWl17d9MuCW3n0=
=CVmI
-END PGP SIGNATURE-

---End Message---


Bug#428738: marked as done (ITA: gtkfontsel - gtk+ font selection utility)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 19:17:02 +
with message-id [EMAIL PROTECTED]
and subject line Bug#428738: fixed in gtkfontsel 1.1-9
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: normal

I'm offering some packages up for adoption so I have more time for the
others.

gtkfontsel is quite old (gtk1) and I've never heard from upstream.
(Though admittedly I didn't try.) It has a few open bug that could be
tackled, but it is still useful enough. I won't work on the code bugs,
so if anyone wants to give it more care, I'd be happy to hand over.

Maintaining a package requires time and skills. Please only adopt this
package if you are *sure* you will have enough time and attention to
work on it.

If you want to be the new maintainer, please see
http://www.debian.org/devel/wnpp/index.html#howto-rfa for detailed
instructions how to adopt a package properly.

Some information about this package:

Package: gtkfontsel
Binary: gtkfontsel
Version: 1.1-8
Priority: optional
Section: x11
Maintainer: Christoph Berg [EMAIL PROTECTED]
Build-Depends: debhelper ( 4), libx11-dev, libgtk1.2-dev, libglib1.2-dev
Architecture: any
Standards-Version: 3.6.2
Format: 1.0
Directory: pool/main/g/gtkfontsel
Files:
 43733fa5339e11346f25fe4b99840186 605 gtkfontsel_1.1-8.dsc
 466acdaa543d0f89a65900d13683883e 65549 gtkfontsel_1.1.orig.tar.gz
 fdaf4439472a803245550f3aa1cb5b84 66059 gtkfontsel_1.1-8.diff.gz

Package: gtkfontsel
Priority: optional
Section: x11
Installed-Size: 76
Maintainer: Christoph Berg [EMAIL PROTECTED]
Architecture: amd64
Version: 1.1-8
Depends: libc6 (= 2.3.5-1), libglib1.2 (= 1.2.0), libgtk1.2 (= 1.2.10-4), 
libx11-6, libxext6, libxi6
Filename: pool/main/g/gtkfontsel/gtkfontsel_1.1-8_amd64.deb
Size: 9992
MD5sum: d2f9f27a202650e339db1d29f254e5f2
SHA1: e7f4f097d7456ec7c40d4202a4d19cd5a48e8b65
SHA256: 0ca041cd26ef91a923c98adae3bce11bda3103bbe3da0f279cd1dec54762cb77
Description: gtk+ font selection utility
 This is a nice utility for browsing, previewing and selecting an X11 font
 to insert its correct name via the X clipboard into a configuration file.
Tag: interface::x11, role::program, scope::utility, uitoolkit::gtk, 
use::browsing, use::viewing, works-with::font, x11::application


Christoph
-- 
[EMAIL PROTECTED] | http://www.df7cb.de/


signature.asc
Description: Digital signature
---End Message---
---BeginMessage---
Source: gtkfontsel
Source-Version: 1.1-9

We believe that the bug you reported is fixed in the latest version of
gtkfontsel, which is due to be installed in the Debian FTP archive:

gtkfontsel_1.1-9.diff.gz
  to pool/main/g/gtkfontsel/gtkfontsel_1.1-9.diff.gz
gtkfontsel_1.1-9.dsc
  to pool/main/g/gtkfontsel/gtkfontsel_1.1-9.dsc
gtkfontsel_1.1-9_amd64.deb
  to pool/main/g/gtkfontsel/gtkfontsel_1.1-9_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Vincent Fourmond [EMAIL PROTECTED] (supplier of updated gtkfontsel package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 24 Jul 2007 20:58:03 +0200
Source: gtkfontsel
Binary: gtkfontsel
Architecture: source amd64
Version: 1.1-9
Distribution: unstable
Urgency: low
Maintainer: Vincent Fourmond [EMAIL PROTECTED]
Changed-By: Vincent Fourmond [EMAIL PROTECTED]
Description: 
 gtkfontsel - gtk+ font selection utility
Closes: 428738
Changes: 
 gtkfontsel (1.1-9) unstable; urgency=low
 .
   * New maintainer (closes: #428738)
   * Switching to dpatch and cdbs, my workforce...
   * Bumped standards version, no changes required.
Files: 
 b797f86c0aec6178b2d2242a197fb961 625 x11 optional gtkfontsel_1.1-9.dsc
 f9c3a22c2663307cbfbb94d7a69ecfab 67261 x11 optional gtkfontsel_1.1-9.diff.gz
 819519fb0a82694b98f7c892e0feec93 10394 x11 optional gtkfontsel_1.1-9_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGpk5rx/UhwSKygsoRAhpvAJwJ4+JWWv064F8bkFQOWk6AxKLHNQCgmD65
asfl/alQADiH1I0Zr33j1/o=
=cy4A
-END PGP SIGNATURE-

---End Message---


Bug#434555: ITP: libmocha-ruby -- library for mocking and stubbing in Ruby

2007-07-24 Thread Antonio Terceiro
Package: wnpp
Severity: wishlist
Owner: Antonio Terceiro [EMAIL PROTECTED]

* Package name: libmocha-ruby
  Version : 0.5.2
  Upstream Author : James Mead [EMAIL PROTECTED]
* URL : http://mocha.rubyforge.org/
* License : MIT/X
  Programming Lang: Ruby
  Description : library for mocking and stubbing in Ruby

Mocking and stubbing library with JMock/SchMock syntax, which allows
mocking and stubbing of methods on real (non-mock) classes. Mocking and
stubbing are techiniques used to improve unit testing.

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-686
Locale: LANG=pt_BR.utf8, LC_CTYPE=pt_BR.utf8 (charmap=UTF-8)

-- 
Antonio Terceiro [EMAIL PROTECTED]
http://people.softwarelivre.org/~terceiro/
GnuPG ID: 0F9CB28F




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#428738: ITA: gtkfontsel

2007-07-24 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 retitle 428738 ITA: gtkfontsel -- gtk+ font selection utility
Bug#428738: ITA: gtkfontsel - gtk+ font selection utility
Changed Bug title to `ITA: gtkfontsel -- gtk+ font selection utility' from 
`ITA: gtkfontsel - gtk+ font selection utility'.
(By the way, that Bug is currently marked as done.)

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#406864: status of the ttf-sil-andika ITP

2007-07-24 Thread Nicolas Spalinger
Holger Levsen wrote:
 Hi Nicolas,
 
 it was good to meet you in Edinburgh!

Same here. I enjoyed Debconf a lot. Thanks for all the hard work.
Enjoyed being able to watch the video recordings too :)

 On Saturday 09 June 2007 21:57, you wrote:
 The package is now named ttf-sil-andika-desrev to better reflect the
 design review status, of course it is still very useful at this stage
 but we wanted to make that clearer. (When the more complete Andika is
 released when can do a rename).
 Hmmm. This means, they will need to go through NEW twice :-/ Wouldn't it
 be better (and have the same effect) to note that in the versionnumber
 and package description?
 OK, so I took your advice: it's better at this stage to keep the initial
 ITP name. Makes it easier for you and the ftp-master team.
 
 ok, cool :)
 
 The design review status is made clear in the packaging description and
 the changelog.
 
 Great, was that already in ttf-sil-andika-desrev_0.001-2.dsc ?
 
 Will be putting up the new source package shortly.
 
 :)
 
 Probably not, as my remarks file is from the 28th of may (arrg! sorry for 
 taking so long...!)
 
 Anyway, those were the remarks I had at that time and against 0.001-2:
 
 - linda+lintian clean, nice
 - feedback period is complete (jan 31 2007) but the description or README 
 mentions it still... (minor, I would still sponsor it like this, but you 
 should fix it :)

Yes, the feedback period is over, but it will still take a while for the
final font to be designed and released, so the current design reviews
are still very much worth uploading even thought they reflect are WIP.

I've added a note about this in the debian/control. No need to change
the changelog entries in FONTLOG.txt.

 - licence of the packaging? not mentioned in debian/copyright

Mmm, seems I've missed that. Fairly new it seems, haven't seen it as
such in maint-guide or most other font packages. Will add that. Thanks.

 - version: 0.0.desrev-2007.05.08-2 / ttf-sil-andika - you said above this is 
 resolved/changed

0.001-desrev3

 - control/description mentions authors, debian/copyright doesnt
 - AndikaDevRev(A-G).ttf - are those different fonts or different revisions?

They have glyph variations. The differences are described on
http://scripts.sil.org/Andika_technical

 I guess the only issue which really blocks sponsoring is the copyright and 
 naming stuff, the rest would be nice if you could fix/enhance it.
 
 Can you point me to a new source package? If the blocking stuff is fixed, 
 I'll 
 upload immediatly this time :-)

The updated debian/ is committed the Alioth svn and the new source
package is on: http://yosch.org/packages/debian


 regards,
   Holger (still sorry for taking so long to send this short mail...) 

No problems at all for the delay, and thanks a lot for the sponsoring :)


-- 
Nicolas Spalinger
http://scripts.sil.org
http://pkg-fonts.alioth.debian.org
https://launchpad.net/people/fonts


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#329676: partial progress upstream

2007-07-24 Thread Neil Williams
The full cashutil program has had little work recently but an offshoot
is making progress: gpe-cash.

http://cashutil.sourceforge.net/gpecash.php

Using the cashutil code with a small Gtk frontend for handheld devices,
this utility features a dramatically reduced codebase and should
provide a route to complete the cashutil project itself.

I intend to release and upload gpe-cash and attendant libraries first,
then complete cashutil using that base and release and upload the
cashutil package and the remaining libraries. When gpe-cash is ready,
I'll clone this bug.

-- 


Neil Williams
=
http://www.data-freedom.org/
http://www.nosoftwarepatents.com/
http://www.linux.codehelp.co.uk/



pgphUMWrWMxAN.pgp
Description: PGP signature


Bug#427258: marked as done (ITP: gaphas -- diagramming canvas)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 21:02:03 +
with message-id [EMAIL PROTECTED]
and subject line Bug#427258: fixed in gaphas 0.2.0-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wnpp
Severity: wishlist
Owner: Cedric Delfosse [EMAIL PROTECTED]

* Package name: gaphas
  Version : 0.1.4
  Upstream Author : Arjan Molenaar [EMAIL PROTECTED]
* URL : http://cheeseshop.python.org/pypi/gaphas
* License : LGPL
  Programming Lang: Python
  Description : diagramming widget

 Gaphas is a GTK+ based diagramming widget.



Gaphas must be packaged to package newest version of gaphor.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.18-3-686 (SMP w/1 CPU core)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

---End Message---
---BeginMessage---
Source: gaphas
Source-Version: 0.2.0-1

We believe that the bug you reported is fixed in the latest version of
gaphas, which is due to be installed in the Debian FTP archive:

gaphas_0.2.0-1.diff.gz
  to pool/main/g/gaphas/gaphas_0.2.0-1.diff.gz
gaphas_0.2.0-1.dsc
  to pool/main/g/gaphas/gaphas_0.2.0-1.dsc
gaphas_0.2.0.orig.tar.gz
  to pool/main/g/gaphas/gaphas_0.2.0.orig.tar.gz
python-gaphas_0.2.0-1_all.deb
  to pool/main/g/gaphas/python-gaphas_0.2.0-1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Cédric Delfosse [EMAIL PROTECTED] (supplier of updated gaphas package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 24 Jul 2007 21:39:37 +0200
Source: gaphas
Binary: python-gaphas
Architecture: source all
Version: 0.2.0-1
Distribution: unstable
Urgency: low
Maintainer: Cédric Delfosse [EMAIL PROTECTED]
Changed-By: Cédric Delfosse [EMAIL PROTECTED]
Description: 
 python-gaphas - diagramming widget
Closes: 427258
Changes: 
 gaphas (0.2.0-1) unstable; urgency=low
 .
   * New upstream release, upload to unstable (Closes: #427258)
Files: 
 cd11de0869061466a54209d01857aaa6 627 devel extra gaphas_0.2.0-1.dsc
 9511dc62b270392bf0e53891e08105e3 79650 devel extra gaphas_0.2.0.orig.tar.gz
 8f08b62e90507e3cfc9a8ad521014713 1842 devel extra gaphas_0.2.0-1.diff.gz
 182e20c27494f4dceb78642595941a39 57410 devel extra 
python-gaphas_0.2.0-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGpmQ6bmmXPPfovGMRAm0VAKCIrXAxjuv+djGipjwvcUKDa+VamwCfal3F
PkkJKIWKPoi1o7PrqpJR6aw=
=kcKn
-END PGP SIGNATURE-

---End Message---


Bug#395277: marked as done (ITP: uebimiau -- Uebimiau is an universal webmail developed in PHP)

2007-07-24 Thread Debian Bug Tracking System
Your message dated Tue, 24 Jul 2007 17:33:33 -0400
with message-id [EMAIL PROTECTED]
and subject line Closing Uebimiau ITP.
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---

Package: wnpp
Severity: wishlist
Owner: Muammar El Khatib [EMAIL PROTECTED]

* Package name: uebimiau
 Version   : 2.7.10-1
 Upstream Author : Aldoir Ventura
* URL   : http://www.uebimiau.org/
* License  : GPL
 Description  : Uebimiau is an universal webmail developed in PHP.

Citing the homepage:
snip
It is free and can be installed in any email server.

-It runs under any System;
-It doesn´t require any extra PHP modules;
-Doesn´t need a database (as MySQL, PostreSQL,etc)
-Doesn´t need IMAP, but compatible with POP3 and IMAP
-Compatible with the MIME Standard (send/receive text/html emails);
-Doesn´t need cookies;
-Easy installation. You only modify one file;
-Compatible with Apache, PHP, Sendmail or QMAIL;
-Can be easily translated into any language (already translated in 17
languages);
-Can use a variety of skins
/snip

--
Muammar El Khatib.
Linux user: 403107.
Key fingerprint = 90B8 BFC4 4A75 B881 39A3  1440 30EB 403B 1270 29F1
http://muammarelkhatib.net | http://www.teorex.org
 ,''`.
: :' :
`. `'
  `-

---End Message---
---BeginMessage---

Hi,

Uebimiau project seems dead. So I am closing this ITP.

Regards,

--
Muammar El Khatib.
Linux user: 403107.
Key fingerprint = 90B8 BFC4 4A75 B881 39A3  1440 30EB 403B 1270 29F1
http://muammarelkhatib.net | http://www.teorex.org
 ,''`.
: :' :
`. `'
  `-
---End Message---


Bug#431465: ITP: libsvg -- library for parsing SVG files

2007-07-24 Thread Dave Beckett
Rene Engelhard wrote:
 Package: wnpp
 Severity: wishlist
 Owner: Rene Engelhard [EMAIL PROTECTED]
 
 * Package name: libsvg
   Version : 0.1.4
   Upstream Author : Carl Worth [EMAIL PROTECTED]
 * URL : http://cairographics.org/snapshots/
 * License : LGPL
   Programming Lang: C
   Description : library for parsing SVG files
 
  libsvg provides a parser for SVG content in files or buffers.
 
 The last upstream release was in 2005, though and it's still only
 under snapshots/, so it seems quite dead upstream. OOo will in the
 future most probably use it for svg import, though...
 (http://svn.gnome.org/viewcvs/ooo-build/trunk/patches/src680/svg-import.diff?revision=9660view=markup)
 
 If anyone else than me wants to maintain this (Dave?), be welcome to
 take this ITP :-)

libsvg is dead upstream and not supported, not under development.
I talked to Carl today and he was surprised OOo was using it.

librsvg is something that is supported, maybe you can get them to use that..
Otherwise, you become the maintainer of libsvg :)

Dave



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#434492: Adopting this package

2007-07-24 Thread Francois Marier

Hi Michael,

I use this package every day and my wrists depend on it :)  So I'm
keen on taking over the maintenance of it while you're not able to.

If anybody else wants to get involved and co-maintain it, that'd be fine too.

Francois


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#434583: ITP: tbb -- Thread Building Blocks is a parallelism library for C++

2007-07-24 Thread Adam Majer
Package: wnpp
Severity: wishlist
Owner: Adam Majer [EMAIL PROTECTED]

* Package name: tbb
  Version : 2.0~20070719
  Upstream Author : Intel Corporation
* URL : http://www.threadingbuildingblocks.org/
* License : GPL with runtime exception
  Programming Lang: C++
  Description : Thread Building Blocks is a parallelism library for C++
 
TBB is a library that helps you leverage multi-core processor
performance without having to be a threading expert. It represents a
higher-level, task-based parallelism that abstracts platform details
and threading mechanism for performance and scalability.
.
For more information see http://www.threadingbuildingblocks.org/




The runtime exception is to the GPL license is,,
   As a special exception, you may use this file as part of a free
   software
   library without restriction.  Specifically, if other files
   instantiate
   templates or use macros or inline functions from this file, or you
   compile
   this file and link it with other files to produce an executable,
   this
   file does not by itself cause the resulting executable to be
   covered by
   the GNU General Public License.  This exception does not however
   invalidate any other reasons why the executable file might be
   covered by
   the GNU General Public License.

http://gcc.gnu.org/onlinedocs/libstdc++/17_intro/license.html


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (900, 'unstable'), (5, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-rc1 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#215367: ITP: pylibpcap - status?

2007-07-24 Thread Paul Wise
On Tue, 2007-07-24 at 16:55 +0200, Thomas Bläsing wrote:

 The developers contacted me by mail and we will find a solution, I think.

Cool

  You might want to join the Debian Python Modules Team:
  
  http://wiki.debian.org/Teams/PythonModulesTeam
 I'll read it tonight and then try to get involved, because I have
 to maintain 2 other python packages.
 
 Paul: Could you sponsor me for this package when it is completed?

Unfortunately I don't really have time for sponsoring, the
python-modules team is fairly active and you will likely find a sponsor
there quite easily, especially if you join the irc channel.

-- 
bye,
pabs

http://wiki.debian.org/PaulWise


signature.asc
Description: This is a digitally signed message part


Processed: tagging bugs that are closed by packages in NEW as pending

2007-07-24 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # the following bugs are closed by packages in NEW
 #
 tags 253735 pending
Bug#253735: ITP: gnome-bluetooth -- GNOME Bluetooth tools
There were no tags set.
Tags added: pending

 tags 279989 pending
Bug#279989: ITP: tclodbc -- ODBC extension to Tcl
There were no tags set.
Tags added: pending

 tags 433168 pending
Bug#433168: ITP: hfsprogs -- mkfs and fsck for HFS and HFS+ file systems
There were no tags set.
Tags added: pending

 tags 433647 pending
Bug#433647: libchipcard2: New version available
There were no tags set.
Tags added: pending

 tags 434091 pending
Bug#434091: ITP: libgettext-commons-java -- Java classes for 
internationalization (i18n)
There were no tags set.
Tags added: pending

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]