Source: apache2-mod-xforward Version: 0.6-1 Severity: important X-Debbugs-Cc: Andrew Lee (李健秋) <ajq...@debian.org>, Package Salvaging Team <team+salv...@tracker.debian.org>, 1081...@bugs.debian.org
Hi Andrew, I'm interested in salvaging your package apache2-mod-xforward, in accordance with the Package Salvaging procedure outlined in the Developers Reference[1]. Strictly speaking your package does not really qualify for the ITS criteria since the only open bug is a spelling issue. However, I think it deserves to be maintained in debian/ team where many other apache2-* packages reside. For your comfort I created a repository there[2]. Thus bug is just to document the migration to the debian/ team. Feel free to upload yourself or give me permission to do so (in case you might be to busy I will follow the ITS procedure and wait 21 days before uploading to delayed=10). I also realised that the upstream Git repository moved on and has some changes (without version tag) which might be interesiting. Thus I have pointed the watch file to the latest Git commit. Your package was highlighted in the Bug of the Day[3] initiative, which aims to introduce newcomers to manageable tasks and guide them through the workflow to solve them. The focus of this initiative is on migrating packages to Salsa, as it's a great way to familiarize newcomers with a consistent Git-based workflow. Kind regards Andreas. [1] https://www.debian.org/doc/manuals/developers-reference/pkgs.en.html#package-salvaging [2] https://salsa.debian.org/debian/apache2-mod-xforward [3] https://salsa.debian.org/tille/tiny_qa_tools/-/wikis/Tiny-QA-tasks -- System Information: Debian Release: trixie/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (50, 'buildd-unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 6.3.0-2-amd64 (SMP w/8 CPU threads; PREEMPT) Kernel taint flags: TAINT_WARN Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled