Your message dated Tue, 11 Jan 2022 10:19:05 +0000
with message-id <[email protected]>
and subject line Bug#965437: fixed in bfm 0.6.4-6.1
has caused the Debian Bug report #965437,
regarding bfm: Removal of obsolete debhelper compat 5 and 6 in bookworm
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
965437: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965437
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: bfm
Version: 0.6.4-6
Severity: normal
Usertags: compat-5-6-removal

Hi,

The package bfm uses debhelper with a compat level of 5 or 6,
which is deprecated and scheduled for removal[1].

Please bump the debhelper compat at your earliest convenience
/outside the freeze/!

  * Compat 13 is recommended (supported in stable-backports)

  * Compat 7 is the bare minimum


PLEASE KEEP IN MIND THAT the release team *DOES NOT* accept uploads
with compat bumps during the freeze.

If there is any risk that the fix for this bug might not migrate to
testing before 2021-01-01[3] then please postpone the fix until after
the freeze.


At the time of filing this bug, compat 5 and 6 are expected to be
removed "some time during the development cycle of bookworm".


Thanks,
~Niels


[1] https://lists.debian.org/debian-devel/2020/07/msg00065.html

[2] https://release.debian.org/bullseye/FAQ.html

[3] The choice of 2021-01-01 as a "deadline" is set before the actual
freeze deadline to provide a safe cut off point for most people.

Mind you, it is still your responsibility to ensure that the upload
makes it into testing even if you upload before that date.

--- End Message ---
--- Begin Message ---
Source: bfm
Source-Version: 0.6.4-6.1
Done: Adrian Bunk <[email protected]>

We believe that the bug you reported is fixed in the latest version of
bfm, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adrian Bunk <[email protected]> (supplier of updated bfm package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 04 Jan 2022 17:30:21 +0200
Source: bfm
Architecture: source
Version: 0.6.4-6.1
Distribution: unstable
Urgency: low
Maintainer: Mika Matsuzaki <[email protected]>
Changed-By: Adrian Bunk <[email protected]>
Closes: 965437
Changes:
 bfm (0.6.4-6.1) unstable; urgency=low
 .
   * Non-maintainer upload.
   * debian/compat: 5 -> 7. (Closes: #965437)
Checksums-Sha1:
 c9abb2678049ecb19fd3b2fb31a2dc6092c3c39c 1802 bfm_0.6.4-6.1.dsc
 02a7823f34a1c8a4a3282458278e00031664e05e 5684 bfm_0.6.4-6.1.debian.tar.xz
Checksums-Sha256:
 f3e3854cec8daa0ce4c25374db87566d0b771479580b73e19a0b4f7b4633620c 1802 
bfm_0.6.4-6.1.dsc
 2bde3323f8c19d85d8310465392208244ff819b6458776caaa8d32bf93fb2a29 5684 
bfm_0.6.4-6.1.debian.tar.xz
Files:
 96abeed4dbbd0237aff5c18382d1c9c0 1802 x11 optional bfm_0.6.4-6.1.dsc
 9d76e63cc3bd193fbcea42cb7f0ff85a 5684 x11 optional bfm_0.6.4-6.1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=17vI
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to