Your message dated Thu, 12 Jan 2006 08:32:28 -0800 with message-id <[EMAIL PROTECTED]> and subject line Bug#346648: fixed in crack-attack 1.1.14-4 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at maintonly) by bugs.debian.org; 9 Jan 2006 01:38:34 +0000 >From [EMAIL PROTECTED] Sun Jan 08 17:38:34 2006 Return-path: <[EMAIL PROTECTED]> Received: from 84-120-75-62.onocable.ono.com ([84.120.75.62] helo=chistera.yi.org) by spohr.debian.org with esmtp (Exim 4.50) id 1EvlzU-0000n4-Vc for [EMAIL PROTECTED]; Sun, 08 Jan 2006 17:38:34 -0800 Received: from userid 1000 by chistera.yi.org with local (Exim 4.60) id 1Evlyz-0006kE-Ps for [EMAIL PROTECTED]; Mon, 09 Jan 2006 02:38:01 +0100 From: Adeodato =?utf-8?B?U2ltw7M=?= <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: crack-attack: FTBFS: build-depends on removed xlibs-dev Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit Message-Id: <[EMAIL PROTECTED]> Date: Mon, 09 Jan 2006 02:38:01 +0100 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 Package: crack-attack Version: 1.1.14-3 Severity: serious Hello, This is a serious bug filed against your package because it build-depends on xlibs-dev, which as announced in [1] a while ago, is no longer available in sid. This makes your package fail to build from source. [1] http://lists.debian.org/debian-devel-announce/2005/11/msg00022.html To fix this bug, you need to update your build-dependencies and substitute xlibs-dev for the list of individual X development libraries that your package needs to be built. You can find detailed information about how to do that in the DependsXlibsDev wiki page [2]. [2] http://wiki.debian.org/DependsXlibsDev As indicated by the Release Team [3], the full transition from XFree86 to Xorg is a release blocker for Etch, which means that Etch will not be released until this bug is fixed (or your package removed from testing). So, please, try to fix in a timely manner. [3] http://lists.debian.org/debian-devel-announce/2005/10/msg00004.html The number of affected packages by the xlibs-dev transition is huge, so if you feel like helping with patches or uploads, feel free to follow the instructions contained in the wiki page above. A list of affected packages can be found here [4]. [4] http://people.debian.org/~adeodato/release-usertag/transition-xlibs-dev Finally, if there's a strong reason for which your package should not be NMUed, please note so in this bug report. Prospective NMUers will read your reasoning, and will decide if it's strong enough to delay their upload. Thanks for your collaboration! -- Adeodato Simó dato at net.com.org.es Debian Developer adeodato at debian.org --------------------------------------- Received: (at 346648-close) by bugs.debian.org; 12 Jan 2006 16:40:49 +0000 >From [EMAIL PROTECTED] Thu Jan 12 08:40:49 2006 Return-path: <[EMAIL PROTECTED]> Received: from katie by spohr.debian.org with local (Exim 4.50) id 1Ex5NE-0001Ad-Bi; Thu, 12 Jan 2006 08:32:28 -0800 From: Chris Boyle <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.65 $ Subject: Bug#346648: fixed in crack-attack 1.1.14-4 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Thu, 12 Jan 2006 08:32:28 -0800 X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 Source: crack-attack Source-Version: 1.1.14-4 We believe that the bug you reported is fixed in the latest version of crack-attack, which is due to be installed in the Debian FTP archive: crack-attack_1.1.14-4.diff.gz to pool/main/c/crack-attack/crack-attack_1.1.14-4.diff.gz crack-attack_1.1.14-4.dsc to pool/main/c/crack-attack/crack-attack_1.1.14-4.dsc crack-attack_1.1.14-4_i386.deb to pool/main/c/crack-attack/crack-attack_1.1.14-4_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Chris Boyle <[EMAIL PROTECTED]> (supplier of updated crack-attack package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Thu, 12 Jan 2006 13:00:16 +0000 Source: crack-attack Binary: crack-attack Architecture: source i386 Version: 1.1.14-4 Distribution: unstable Urgency: medium Maintainer: Chris Boyle <[EMAIL PROTECTED]> Changed-By: Chris Boyle <[EMAIL PROTECTED]> Description: crack-attack - multiplayer OpenGL puzzle game like "Tetris Attack" Closes: 341464 346648 Changes: crack-attack (1.1.14-4) unstable; urgency=medium . * Build-Depends: x-dev not xlibs-dev. (closes: #346648) * crack-attack.menu: go to menu, not a single player game. (closes: #341464) Files: 0026a665eb96efe34139b7004bb69193 707 games optional crack-attack_1.1.14-4.dsc 0144d3717672a66ae41e2dd41f2a66ae 15376 games optional crack-attack_1.1.14-4.diff.gz 86760e8b7be23ed785646e3988334dfd 768696 games optional crack-attack_1.1.14-4_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFDxoGqRi6ArLfYbg8RAqtBAKCKSW1+adatAbbWFeKcsyEGRKQYvwCfY4Jq Ob8xM//Dwf6ZxKKQYkzvtl8= =ltnd -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]