• Bug#1081888: marked as done ([RFD] Update partman-auto/cap-ram default

    From Debian Bug Tracking System@21:1/5 to All on Fri Nov 22 14:50:01 2024
    This is a multi-part message in MIME format...

    Your message dated Fri, 22 Nov 2024 14:45:03 +0100
    with message-id <20241122144503.13ebb8792a755569a5c716f0@mailbox.org>
    and subject line Re: #1081888 [RFD] Update partman-auto/cap-ram default value to re-allow hibernation
    has caused the Debian Bug report #1081888,
    regarding [RFD] Update partman-auto/cap-ram default value to re-allow hibernation
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    1081888: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081888
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    Received: (at submit) by bugs.debian.org; 15 Sep 2024 19:20:31 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
    (2021-04-09) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-11.6 required=4.0 tests=BAYES_00,
    BODY_INCLUDES_PACKAGE,HAS_PACKAGE,KHOP_HELO_FCRDNS,SPF_HELO_NONE,
    T_SPF_PERMERROR autolearn=ham autolearn_force=no
    version=3.4.6-bugs.debian.org_2005_01_02
    X-Spam-Bayes: score:0.0000 Tokens: new, 14; hammy, 120; neutral, 49; spammy,
    0. spammytokens: hammytokens:0.000-+--d-i, 0.000-+--debconf,
    0.000-+--H*rp:D*fr.eu.org, 0.000-+--H*F:D*fr.eu.org,
    0.000-+--H*rp:U*pascal
    Return-path: <pascal@plouf.fr.eu.org>
    Received: from zenith.ipv6.plouf.fr.eu.org ([2001:7a8:6d23:1::1]:34339 helo=zenith.plouf.fr.eu.org)
    by buxtehude.debian.org with esmtps (TLS1.2:ECDHE_SECP256R1__RSA_SHA256__AES_256_GCM:256)
    (Exi