Your message dated Tue, 16 May 2023 18:49:10 +0000
with message-id <[email protected]>
and subject line Bug#965866: fixed in v86d 0.1.10-2
has caused the Debian Bug report #965866,
regarding v86d: Removal of obsolete debhelper compat 5 and 6 in bookworm
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
965866: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965866
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: v86d
Version: 0.1.10-1
Severity: normal
Usertags: compat-5-6-removal
Hi,
The package v86d uses debhelper with a compat level of 5 or 6,
which is deprecated and scheduled for removal[1].
Please bump the debhelper compat at your earliest convenience
/outside the freeze/!
* Compat 13 is recommended (supported in stable-backports)
* Compat 7 is the bare minimum
PLEASE KEEP IN MIND THAT the release team *DOES NOT* accept uploads
with compat bumps during the freeze.
If there is any risk that the fix for this bug might not migrate to
testing before 2021-01-01[3] then please postpone the fix until after
the freeze.
At the time of filing this bug, compat 5 and 6 are expected to be
removed "some time during the development cycle of bookworm".
Thanks,
~Niels
[1] https://lists.debian.org/debian-devel/2020/07/msg00065.html
[2] https://release.debian.org/bullseye/FAQ.html
[3] The choice of 2021-01-01 as a "deadline" is set before the actual
freeze deadline to provide a safe cut off point for most people.
Mind you, it is still your responsibility to ensure that the upload
makes it into testing even if you upload before that date.
--- End Message ---
--- Begin Message ---
Source: v86d
Source-Version: 0.1.10-2
Done: Bastian Germann <[email protected]>
We believe that the bug you reported is fixed in the latest version of
v86d, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Bastian Germann <[email protected]> (supplier of updated v86d package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 16 May 2023 20:29:25 +0200
Source: v86d
Architecture: source
Version: 0.1.10-2
Distribution: unstable
Urgency: medium
Maintainer: Evgeni Golov <[email protected]>
Changed-By: Bastian Germann <[email protected]>
Closes: 965866 998975
Changes:
v86d (0.1.10-2) unstable; urgency=medium
.
* QA upload.
* Source Format 3.0 (quilt).
* Update debhelper to compat 7. (Closes: #965866)
* Add missing rules targets. (Closes: #998975)
Checksums-Sha1:
578a4e89107d75d25afbda949dfc25fe8c2f9c05 1505 v86d_0.1.10-2.dsc
2a8e0bceab79211002b5316acb7207c8f8315ccb 6500 v86d_0.1.10-2.debian.tar.xz
d5e5d6637bf769c1be612cab845a1fda1afa75ca 5482 v86d_0.1.10-2_source.buildinfo
Checksums-Sha256:
9ef0a888ab5b69be8baa619ca3e719e84f82bae1af7239732eada442900b5486 1505
v86d_0.1.10-2.dsc
d9d7dce50f6ade1d3b58768ac052cba751d9deeb5c822c7b424f480c1e7404e5 6500
v86d_0.1.10-2.debian.tar.xz
18eb8f71a7e1a0ca48d82a85ac7f8b6e22a665c17f66bd4766d0d49c36b8f017 5482
v86d_0.1.10-2_source.buildinfo
Files:
dd86ea72d9159fdad7a1b0c22a491c36 1505 utils optional v86d_0.1.10-2.dsc
0c17ce8dc10c603026f64a5d082bdc88 6500 utils optional
v86d_0.1.10-2.debian.tar.xz
23223d1fcffa257795d52818b9d03823 5482 utils optional
v86d_0.1.10-2_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=iOUO
-----END PGP SIGNATURE-----
--- End Message ---