Your message dated Wed, 14 Sep 2005 21:55:09 -0500 (CDT)
with message-id <[EMAIL PROTECTED]>
and subject line WNPP bug closed
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 20 Feb 2003 02:56:27 +0000
>From [EMAIL PROTECTED] Wed Feb 19 20:56:26 2003
Return-path: <[EMAIL PROTECTED]>
Received: from dhcp64-134-66-167.four.sjc.wayport.net (roo) [64.134.66.167] 
(mail)
        by master.debian.org with esmtp (Exim 3.12 1 (Debian))
        id 18lgss-0006cx-00; Wed, 19 Feb 2003 20:56:26 -0600
Received: from srz by roo with local (Exim 3.36 #1 (Debian))
        id 18lgsW-0000aL-00
        for <[EMAIL PROTECTED]>; Wed, 19 Feb 2003 18:56:04 -0800
From: Stephen Zander <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]> 
Subject: ITP: kernel-patch-acpi -- Advanced Configuration and Power Interface 
(kernel patches)
X-Debbugs-CC: Stephen Zander <[EMAIL PROTECTED]>, debian-devel@lists.debian.org
Message-Id: <[EMAIL PROTECTED]>
Sender: Stephen Zander <[EMAIL PROTECTED]>
Date: Wed, 19 Feb 2003 18:56:04 -0800
Delivered-To: [EMAIL PROTECTED]
X-Spam-Status: No, hits=-2.2 required=4.0
        tests=HAS_PACKAGE,SPAM_PHRASE_02_03,X_DEBBUGS_CC
        version=2.44
X-Spam-Level: 

Package: wnpp
Severity: wishlist

* Package name    : kernel-patch-acpi
  Version         : 1
  Upstream Author : Paul Diefenbaugh <[EMAIL PROTECTED]>
* URL             : http://acpi.sourceforge.net/
* License         : GPL
  Description     : Advanced Configuration and Power Interface (kernel patches)
    ACPI4Linux aims at integrating ACPI into the Linux kernel. ACPI
    (short for "Advanced Configuration and Power Interface") is a
    standard that defines power and configuration management
    interfaces between an operating system and the BIOS. It is meant
    to supersede the older APM standard (for power management) and
    provide a generic interface for recognition and configuration of
    hardware devices.

    This package includes the most current acpi kernel patches for the
    following release: 2.4.16, 2.4.17, 2.4.18, 2.4.19 & 2.4.20.  You
    want this package if you're looking for more up-to-date acpi than
    exists in the standard kernel tree.

---------------------------------------
Received: (at 172800-done) by bugs.debian.org; 15 Sep 2005 02:55:34 +0000
>From [EMAIL PROTECTED] Wed Sep 14 19:55:34 2005
Return-path: <[EMAIL PROTECTED]>
Received: from dsl-201-129-37-187.prod-infinitum.com.mx (cerdita.damog.net) 
[201.129.37.187] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1EFjuP-0000Zu-00; Wed, 14 Sep 2005 19:55:34 -0700
Received: by cerdita.damog.net (Postfix, from userid 1000)
        id D7965107AFF; Wed, 14 Sep 2005 21:55:09 -0500 (CDT)
To: [EMAIL PROTECTED]
Subject: WNPP bug closed
Message-Id: <[EMAIL PROTECTED]>
Date: Wed, 14 Sep 2005 21:55:09 -0500 (CDT)
From: [EMAIL PROTECTED] (David Moreno Garza)
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_00,VALID_BTS_CONTROL 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 204

Hello,

This is an automatic mail sent to close the RFP you have reported or 
are involved with.

Your RFP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 600 days.
- It haven't had any activity recently.
- The amount of ITPs on the Debian BTS is huge and we need to
  clean up a bit the place.

As this an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the RFP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail [EMAIL PROTECTED]
with a body text like this:

reopen 123456
thanks bts

Replacing '123456' for the number of your RFP bug. The subject of the
mail is ignored. Or if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <[EMAIL PROTECTED]>.

This is the first mass wnpp closing that will be done. The next close
will be done on inactive RFPs older than 450 days and finally, the
ones older than 365 days (an automatic script will close *inactive*
RFPs when they reach one year old).

A similar process is being applied to the ITP wnpp bugs in these
days.

Thanks for your cooperation,

 -- David Moreno Garza <[EMAIL PROTECTED]>  Wed, 14 Sep 2005 21:54:42 -0500


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to