Your message dated Wed, 13 Jan 2021 14:26:48 +0000
with message-id <[email protected]>
and subject line Bug#965750: fixed in nwall 1.32+debian-5
has caused the Debian Bug report #965750,
regarding nwall: Removal of obsolete debhelper compat 5 and 6 in bookworm
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
965750: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965750
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: nwall
Version: 1.32+debian-4.2
Severity: normal
Usertags: compat-5-6-removal
Hi,
The package nwall uses debhelper with a compat level of 5 or 6,
which is deprecated and scheduled for removal[1].
Please bump the debhelper compat at your earliest convenience
/outside the freeze/!
* Compat 13 is recommended (supported in stable-backports)
* Compat 7 is the bare minimum
PLEASE KEEP IN MIND THAT the release team *DOES NOT* accept uploads
with compat bumps during the freeze.
If there is any risk that the fix for this bug might not migrate to
testing before 2021-01-01[3] then please postpone the fix until after
the freeze.
At the time of filing this bug, compat 5 and 6 are expected to be
removed "some time during the development cycle of bookworm".
Thanks,
~Niels
[1] https://lists.debian.org/debian-devel/2020/07/msg00065.html
[2] https://release.debian.org/bullseye/FAQ.html
[3] The choice of 2021-01-01 as a "deadline" is set before the actual
freeze deadline to provide a safe cut off point for most people.
Mind you, it is still your responsibility to ensure that the upload
makes it into testing even if you upload before that date.
--- End Message ---
--- Begin Message ---
Source: nwall
Source-Version: 1.32+debian-5
Done: Andreas Beckmann <[email protected]>
We believe that the bug you reported is fixed in the latest version of
nwall, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Andreas Beckmann <[email protected]> (supplier of updated nwall package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 13 Jan 2021 14:45:13 +0100
Source: nwall
Architecture: source
Version: 1.32+debian-5
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group <[email protected]>
Changed-By: Andreas Beckmann <[email protected]>
Closes: 667639 965750
Changes:
nwall (1.32+debian-5) unstable; urgency=medium
.
[ Andreas Beckmann ]
* QA upload.
* Set Maintainer to Debian QA Group. (See: #784187)
.
[ Jari Aalto ]
* Remove deprecated dpatch and upgrade to packaging format "3.0 quilt"
(Closes: #667639).
* Update to Standards-Version to 3.9.3.1 and debhelper to 9.
(Closes: #965750)
* Add homepage field to control file.
* Add build-arch and build-indep targets; use dh_prep in rules file.
* Fix copyright-refers-to-symlink-license (Lintian).
Checksums-Sha1:
8efdddfb1d2071b7d34f9cf063a0c4e1c0f35be9 1820 nwall_1.32+debian-5.dsc
ad023fc3e6d6d21e382402e78bbda57e08869ec1 4624 nwall_1.32+debian-5.debian.tar.xz
a574f017f495f37152557021d5617eca19554525 5721
nwall_1.32+debian-5_source.buildinfo
Checksums-Sha256:
51a278e13aeba671250b8d5c08d5dd1bcd1474a6a9a1e7fb949b81242d7e22aa 1820
nwall_1.32+debian-5.dsc
74ee70ca744c8220803a0a42d51b25aaac925beba2444bcbd772767edb64f303 4624
nwall_1.32+debian-5.debian.tar.xz
27c1d126efa564a1ec4d1926526f47c5455ea06ffceb21c9fc930d06ed398597 5721
nwall_1.32+debian-5_source.buildinfo
Files:
6ecfc2e821ea5b4dce9bb60672b60442 1820 misc optional nwall_1.32+debian-5.dsc
d866c51fe475a925825ba6ba85645ea6 4624 misc optional
nwall_1.32+debian-5.debian.tar.xz
e1d4ab509e96e2170e20f1cbd420b154 5721 misc optional
nwall_1.32+debian-5_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=SL9X
-----END PGP SIGNATURE-----
--- End Message ---