Your message dated Sun, 27 Oct 2002 19:57:15 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#166562: xfree86: please modify debian/README to allow IPv6 specific patches has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at maintonly) by bugs.debian.org; 27 Oct 2002 07:32:16 +0000 >From [EMAIL PROTECTED] Sun Oct 27 01:32:15 2002 Return-path: <[EMAIL PROTECTED]> Received: from (penny.tippete.net) [62.211.255.247] (mail) by master.debian.org with esmtp (Exim 3.12 1 (Debian)) id 185huB-00009i-00; Sun, 27 Oct 2002 01:32:15 -0600 Received: from ik5pvx by penny.tippete.net with local (Exim 3.36 #1 (Debian)) id 185hu8-0003KX-00 for <[EMAIL PROTECTED]>; Sun, 27 Oct 2002 08:32:12 +0100 To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: xfree86: please modify debian/README to allow IPv6 specific patches X-Debbugs-CC: [EMAIL PROTECTED] Reply-To: Pierfrancesco Caci <[EMAIL PROTECTED]> From: Pierfrancesco Caci <[EMAIL PROTECTED]> Date: 27 Oct 2002 08:32:12 +0100 Message-ID: <[EMAIL PROTECTED]> Lines: 37 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: Pierfrancesco Caci <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Status: No, hits=-2.0 required=5.0 tests=SIGNATURE_SHORT_DENSE,SPAM_PHRASE_00_01 version=2.41 X-Spam-Level: Package: xfree86 Version: 4.2.1-3; reported 2002-10-27 Severity: wishlist Tags: sid Hello, can you please modify the debian/README file so as to read: 900-999 patches that should not be sent upstream 900-988 Debian-specific behavior and enhancements 989 experimental or debugging patches (should not generally be present in a production release) 990-999 Debian-IPv6-specific patches This way the IPv6 effort can have 10 patch slots that are guaranteed not to clash with other teams' patches. Thank you Pf -- System Information: Debian Release: testing/unstable Architecture: i386 Kernel: Linux penny 2.4.20-pre10 #1 Sun Oct 13 10:33:45 CEST 2002 i686 Locale: LANG=C, LC_CTYPE=C -- ------------------------------------------------------------------------------- Pierfrancesco Caci | ik5pvx | mailto:[EMAIL PROTECTED] - http://gusp.dyndns.org Firenze - Italia | Office for the Complication of Otherwise Simple Affairs Linux penny 2.4.20-pre10 #1 Sun Oct 13 10:33:45 CEST 2002 i686 Pentium II (Deschutes) GenuineIntel GNU/Linux --------------------------------------- Received: (at 166562-done) by bugs.debian.org; 28 Oct 2002 00:57:18 +0000 >From [EMAIL PROTECTED] Sun Oct 27 18:57:16 2002 Return-path: <[EMAIL PROTECTED]> Received: from pcp942041pcs.cstltn01.in.comcast.net (apocalypse.deadbeast.net) [68.57.244.226] by master.debian.org with esmtp (Exim 3.12 1 (Debian)) id 185yDU-00062b-00; Sun, 27 Oct 2002 18:57:16 -0600 Received: by apocalypse.deadbeast.net (Postfix, from userid 1000) id E549543C1; Sun, 27 Oct 2002 19:57:15 -0500 (EST) Date: Sun, 27 Oct 2002 19:57:15 -0500 From: Branden Robinson <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Re: Bug#166562: xfree86: please modify debian/README to allow IPv6 specific patches Message-ID: <[EMAIL PROTECTED]> References: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="OzigliFs3e0dNr73" Content-Disposition: inline In-Reply-To: <[EMAIL PROTECTED]> User-Agent: Mutt/1.4i Mail-Copies-To: nobody X-No-CC: I subscribe to this list; do not CC me on replies. Delivered-To: [EMAIL PROTECTED] X-Spam-Status: No, hits=-16.5 required=5.0 tests=IN_REP_TO,PGP_SIGNATURE_2,QUOTED_EMAIL_TEXT,REFERENCES, SPAM_PHRASE_02_03,USER_AGENT,USER_AGENT_MUTT version=2.41 X-Spam-Level: --OzigliFs3e0dNr73 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sun, Oct 27, 2002 at 08:32:12AM +0100, Pierfrancesco Caci wrote: > Package: xfree86 > Version: 4.2.1-3; reported 2002-10-27 > Severity: wishlist > Tags: sid >=20 > Hello, can you please modify the debian/README file so as to read: >=20 > 900-999 patches that should not be sent upstream > 900-988 Debian-specific behavior and enhancements > 989 experimental or debugging patches (should not > generally be present in a production release) > 990-999 Debian-IPv6-specific patches >=20 >=20 > This way the IPv6 effort can have 10 patch slots that are guaranteed not = to > clash with other teams' patches. It's unnecessary to report this as a bug. Use whatever patch numbers you need to; it'll be my (well, the X Strike Force's) task when you send them along to integrate them. I'm not very worried about the IPv6 patches because: 1) presumably you'll want to be sending them upstream as well, eventually 2) they probably won't touch code that is being patched elsewhere in the tree Closing this unnecessary bug report. --=20 G. Branden Robinson | Debian GNU/Linux | Ab abusu ad usum non valet [EMAIL PROTECTED] | consequentia. http://people.debian.org/~branden/ | --OzigliFs3e0dNr73 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iEYEARECAAYFAj28i2sACgkQ6kxmHytGonyqJQCgiHlx8FAbmOCzSWVnyrt0SI3T EbkAnAvdJgAUdPfJsMx5Zr2vXGH4u++n =VcKv -----END PGP SIGNATURE----- --OzigliFs3e0dNr73--