Your message dated Sat, 26 May 2007 18:17:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#425966: fixed in dpatch 2.0.25
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: dpatch
Version: 2.0.23
Severity: serious

Since you use set -o pipefail in /usr/bin/dpatch, which is
a bashism, you must execute the script with /bin/bash, rather than
/bin/sh.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 
'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.20-1-amd64 (SMP w/1 CPU core)
Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

dpatch depends on no packages.

Versions of packages dpatch recommends:
ii  dpkg-dev                      1.14.4     package building tools for Debian
ii  fakeroot                      1.7.1      Gives a fake root environment
ii  patchutils                    0.2.31-4   Utilities to work with patches

-- no debconf information

-- 
 .''`.   martin f. krafft <[EMAIL PROTECTED]>
: :'  :  proud Debian developer, author, administrator, and user
`. `'`   http://people.debian.org/~madduck - http://debiansystem.info
  `-  Debian - when you have better things to do than fixing systems

Attachment: signature.asc
Description: Digital signature (GPG/PGP)


--- End Message ---
--- Begin Message ---
Source: dpatch
Source-Version: 2.0.25

We believe that the bug you reported is fixed in the latest version of
dpatch, which is due to be installed in the Debian FTP archive:

dpatch_2.0.25.dsc
  to pool/main/d/dpatch/dpatch_2.0.25.dsc
dpatch_2.0.25.tar.gz
  to pool/main/d/dpatch/dpatch_2.0.25.tar.gz
dpatch_2.0.25_all.deb
  to pool/main/d/dpatch/dpatch_2.0.25_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Junichi Uekawa <[EMAIL PROTECTED]> (supplier of updated dpatch package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 27 May 2007 02:59:06 +0900
Source: dpatch
Binary: dpatch
Architecture: source all
Version: 2.0.25
Distribution: unstable
Urgency: low
Maintainer: Dpatch Maintainers <[EMAIL PROTECTED]>
Changed-By: Junichi Uekawa <[EMAIL PROTECTED]>
Description: 
 dpatch     - patch maintenance system for Debian source packages
Closes: 425966
Changes: 
 dpatch (2.0.25) unstable; urgency=low
 .
   * specify dpatch command to use bash, to use 'set -o pipefail', for
     users who are using dash as their /bin/sh.
      (Closes: #425966).
Files: 
 a8eeea04d20a1ba1a6db01f6785e12a3 656 devel optional dpatch_2.0.25.dsc
 91791d28c23d48fd0ae0f6bfbdb8ca78 520486 devel optional dpatch_2.0.25.tar.gz
 e0082190696faafad90fe251903fba03 84604 devel optional dpatch_2.0.25_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGWHWJ2Dd9TugeVcERAsmQAJ483VeaLCi/V+gmd0z3kA3l3Fw5wwCeM+OB
t4qKjds+iCAlJvemn1PNVsc=
=pSKa
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to