Your message dated Wed, 26 Apr 2023 08:50:50 +0200
with message-id <[email protected]>
and subject line gcc-6 has been removed from Debian
has caused the Debian Bug report #863820,
regarding gcc-6-base: adding Breaks: tzdata-java to smoothen the openjdk 7 -> 8
upgrade path from jessie to stretch
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
863820: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863820
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: gcc-6-base
Version: 6.3.0-18
Severity: important
Hi Doko,
would it be possible to use gcc-6-base as the bigger hammer to smoothen
the openjdk 7 -> 8 upgrade from jessie to stretch?
The Breaks: tzdata-java added in openjdk-8-jre-headless (#857992)
improved the situation a lot, but I still see some corner cases where
switching to openjdk-8 is not considered by apt, and instead some jessie
packages are kept installed (the openjdk-7 stack, and especially tzdata
is kept at the jessie version (that still has tzdata-java)).
A versioned Breaks against some openjdk-7 package would not work due to
new upstream releases being uploaded to (old)stable frequently.
An unversioned Breaks against some openjdk-7 package would render the
packages from experimental uninstallable in sid.
gcc-6-base should have a high enough score in apt to stop any attempts
to keep tzdata-java or openjdk-7 (from jessie) installed.
I'll now build a gcc-6 with that Breaks added ...
Andreas
--- End Message ---
--- Begin Message ---
Version: 6.5.0-2+rm
src:gcc-6 was last released with Debian 9 (stretch)
in June 2017 and was removed from the Debian archive afterwards.
It has been superseded by newer versions.
See https://bugs.debian.org/920171 for details on the removal.
After regular security support for stretch ended in July 2020 and LTS
support ended in July 2022, I'm closing the remaining bug reports now.
In case the bug is still present in recent releases, please reopen and
reassign it.
Andreas
--- End Message ---