Devuan bug report logs - #654
gccintro: Broken link in Tracker

Package: gccintro; Reported by: Alexandros Prekates <[email protected]>; Keywords: debian; merged with #655; Done: Mark Hindley <[email protected]>; Maintainer for gccintro is (unknown).
Notification sent to Alexandros Prekates <[email protected]>:
bug acknowledged by developer. Full text available.
Reply sent to Mark Hindley <[email protected]>:
You have taken responsibility. Full text available.

Message received at [email protected]:


Received: (at 654-done) by bugs.devuan.org; 11 Dec 2023 18:18:02 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from email.devuan.org [2a01:4f9:fff1:15::74ca:8ad2]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Mon, 11 Dec 2023 18:18:02 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id ObjTGEVSd2WOOAAAmSBk0A
	(envelope-from <[email protected]>)
	for <[email protected]>; Mon, 11 Dec 2023 18:17:41 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id 5BB138BE; Mon, 11 Dec 2023 18:17:41 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS,
	T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> 
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	by email.devuan.org (Postfix) with ESMTPS id 16733613
	for <[email protected]>; Mon, 11 Dec 2023 18:17:39 +0000 (UTC)
Received: from hindley.org.uk (apollo.hindleynet [192.168.1.3])
	by mx.hindley.org.uk (Postfix) with SMTP id 32314DCC
	for <[email protected]>; Mon, 11 Dec 2023 18:17:38 +0000 (GMT)
Received: (nullmailer pid 12557 invoked by uid 1000);
	Mon, 11 Dec 2023 18:17:37 -0000
Date: Mon, 11 Dec 2023 18:17:37 +0000
From: Mark Hindley <[email protected]>
To: [email protected]
Subject: Fixed in Debian #1003831
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Debbugs-No-Ack: No Thanks

Version: 1.0-5

Notification sent to Alexandros Prekates <[email protected]>:
bug acknowledged by developer. Full text available.
Reply sent to Mark Hindley <[email protected]>:
You have taken responsibility. Full text available.
Set bug forwarded-to-address to 'https://bugs.debian.org/1003831'. Request was from Mark Hindley <[email protected]> to [email protected]. Full text available.
Added tag(s) debian. Request was from Mark Hindley <[email protected]> to [email protected]. Full text available.
Merged 654 655 Request was from Mark Hindley <[email protected]> to [email protected]. Full text available.

Message received at [email protected]:


Received: (at 654) by bugs.devuan.org; 16 Jan 2022 15:12:04 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Sun, 16 Jan 2022 15:12:03 +0000 (UTC)
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by mail.dyne.org (Postfix) with ESMTPS id 510566617B6
	for <[email protected]>; Sun, 16 Jan 2022 16:10:50 +0100 (CET)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1n97BA-0007PM-Fr; Sun, 16 Jan 2022 15:10:48 +0000
Received: (nullmailer pid 14425 invoked by uid 1000);
	Sun, 16 Jan 2022 15:10:47 -0000
Date: Sun, 16 Jan 2022 15:10:47 +0000
From: Mark Hindley <[email protected]>
To: Alexandros Prekates <[email protected]>, [email protected]
Subject: Re: bug#654: gccintro: Broken link in Tracker
Message-ID: <YeQ1d/[email protected]>
References: <164233284172.6382.6738994517207277089.reportbug@enous>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <164233284172.6382.6738994517207277089.reportbug@enous>
X-Debbugs-No-Ack: No Thanks
X-Spam-Status: No, score=0.4 required=5.0 tests=RCVD_IN_DNSWL_BLOCKED,
	RDNS_DYNAMIC,SPF_PASS autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.dyne.org

Control: merge -1 653
Control: tags -1 debian

Alexandros,

On Sun, Jan 16, 2022 at 11:34:01AM +0000, Alexandros Prekates wrote:
> Package: gccintro
> Version: 1.0-4
> Severity: normal
> 
> Dear Maintainer,
> 
> In the Debian Package Tracker there is a broking link in 'homepage'

Please report this to the Debian BTS.

Thanks.

Mark

Information forwarded to [email protected], [email protected]:
bug#654; Package gccintro. Full text available.

Message received at [email protected]:


Received: (at submit) by bugs.devuan.org; 16 Jan 2022 11:42:12 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Sun, 16 Jan 2022 11:42:12 +0000 (UTC)
Received: from mout02.posteo.de (mout02.posteo.de [185.67.36.66])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by mail.dyne.org (Postfix) with ESMTPS id 75D42661352
	for <[email protected]>; Sun, 16 Jan 2022 12:41:56 +0100 (CET)
Authentication-Results: mail.dyne.org;
	dkim=pass (2048-bit key; secure) header.d=posteo.net [email protected] header.b="g4dpZnO/";
	dkim-atps=neutral
Received: from submission (posteo.de [89.146.220.130]) 
	by mout02.posteo.de (Postfix) with ESMTPS id 84AA7240105
	for <[email protected]>; Sun, 16 Jan 2022 12:41:55 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=posteo.net; s=2017;
	t=1642333315; bh=FPuBCMiWA6+LiwOkJCxjcoOgqwkW3+n+1BghUB4vrds=;
	h=From:To:Subject:Date:From;
	b=g4dpZnO/MfFJ6ZxbIwCtYFLguyYKNHNhk2eeWn1YHzS2KC0ndOgdYyl0EEbaV6Ohq
	 Gnytzup5azwkR1WyERv+22xh83kuIwyiPC8MTMZZSzWbP/cfTWGtHB0QWRCImWhy2+
	 BHFyLzXNscHn3psYuNkEukQ7LWq8my4ZwiGwkXH9/B+UFx5EdYuXZG9KY2BjKzyxZy
	 hvtcjV6CEXEBNCSjkGpEkJXwTkxhtnMWwPkQkcS+/US0QduBENX8rrrGQcwcuQ9dGY
	 zRGJLvCpc0yUo9ZnEgkflrsSHpovvqgKPaD1SqEgbO23JMrGebGN77BSKaFdRwpMxz
	 XM7HOeOpy6uKQ==
Received: from customer (localhost [127.0.0.1])
	by submission (posteo.de) with ESMTPSA id 4JcCmy44vbz6tpM;
	Sun, 16 Jan 2022 12:41:54 +0100 (CET)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Alexandros Prekates <[email protected]>
To: Devuan Bug Tracking System <[email protected]>
Subject: gccintro: Broken link in Tracker
Message-ID: <164233284172.6382.6738994517207277089.reportbug@enous>
Date: Sun, 16 Jan 2022 11:34:01 +0000
X-Spam-Status: No, score=-2.5 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
	DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,RCVD_IN_MSPIKE_H3,
	RCVD_IN_MSPIKE_WL,SPF_PASS,URIBL_BLOCKED autolearn=disabled
	version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.dyne.org

Package: gccintro
Version: 1.0-4
Severity: normal

Dear Maintainer,

In the Debian Package Tracker there is a broking link in 'homepage'




-- System Information:
Distributor ID: Devuan
Description:    Devuan GNU/Linux 4 (chimaera)
Release:        4
Codename:       n/a
Architecture: x86_64

Kernel: Linux 5.10.0-7-amd64 (SMP w/8 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not
set
Shell: /bin/sh linked to /bin/dash
Init: runit (via /run/runit.stopit)
LSM: AppArmor: enabled

Acknowledgement sent to Alexandros Prekates <[email protected]>:
New bug report received and forwarded. Copy sent to [email protected]. Full text available.
Report forwarded to [email protected], [email protected]:
bug#654; Package gccintro. Full text available.

Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.

Devuan Bugs Owner <[email protected]>.
Last modified: Thu, 28 Nov 2024 06:39:01 UTC