Your message dated Tue, 11 Jan 2022 10:21:34 +0000
with message-id <[email protected]>
and subject line Bug#965886: fixed in xbubble 0.5.11.2-3.5
has caused the Debian Bug report #965886,
regarding xbubble: Removal of obsolete debhelper compat 5 and 6 in bookworm
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
965886: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965886
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: xbubble
Version: 0.5.11.2-3.4
Severity: normal
Usertags: compat-5-6-removal
Hi,
The package xbubble uses debhelper with a compat level of 5 or 6,
which is deprecated and scheduled for removal[1].
Please bump the debhelper compat at your earliest convenience
/outside the freeze/!
* Compat 13 is recommended (supported in stable-backports)
* Compat 7 is the bare minimum
PLEASE KEEP IN MIND THAT the release team *DOES NOT* accept uploads
with compat bumps during the freeze.
If there is any risk that the fix for this bug might not migrate to
testing before 2021-01-01[3] then please postpone the fix until after
the freeze.
At the time of filing this bug, compat 5 and 6 are expected to be
removed "some time during the development cycle of bookworm".
Thanks,
~Niels
[1] https://lists.debian.org/debian-devel/2020/07/msg00065.html
[2] https://release.debian.org/bullseye/FAQ.html
[3] The choice of 2021-01-01 as a "deadline" is set before the actual
freeze deadline to provide a safe cut off point for most people.
Mind you, it is still your responsibility to ensure that the upload
makes it into testing even if you upload before that date.
--- End Message ---
--- Begin Message ---
Source: xbubble
Source-Version: 0.5.11.2-3.5
Done: Adrian Bunk <[email protected]>
We believe that the bug you reported is fixed in the latest version of
xbubble, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Adrian Bunk <[email protected]> (supplier of updated xbubble package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 04 Jan 2022 18:24:24 +0200
Source: xbubble
Architecture: source
Version: 0.5.11.2-3.5
Distribution: unstable
Urgency: low
Maintainer: Uwe Hermann <[email protected]>
Changed-By: Adrian Bunk <[email protected]>
Closes: 965886
Changes:
xbubble (0.5.11.2-3.5) unstable; urgency=low
.
* Non-maintainer upload.
* debian/compat: 5 -> 7. (Closes: #965886)
Checksums-Sha1:
236a3a305009ccd51e2489ec579d42b73f6dfd5d 1849 xbubble_0.5.11.2-3.5.dsc
8cef7a055cdd2d5471e568832c7735f566f367f7 6356
xbubble_0.5.11.2-3.5.debian.tar.xz
Checksums-Sha256:
e74266d4bc5c94a7c73ed157889867760a17978f94045605d7e718297530f9fe 1849
xbubble_0.5.11.2-3.5.dsc
9909c69aac7a8dd28dc2f50349698156a702a5696dc4de625539b4e2a854abf6 6356
xbubble_0.5.11.2-3.5.debian.tar.xz
Files:
cbdedc97f5cdd3408684803b5a5f619a 1849 games optional xbubble_0.5.11.2-3.5.dsc
7d2e367e6cce8bd275c70f5811bcd851 6356 games optional
xbubble_0.5.11.2-3.5.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmHUdSEACgkQiNJCh6LY
mLHUWRAArcv7Gimk5mzu6aiV6iXy3Vlc6VAwn1ip8LLiqgxyysfXv/ZTQnqLx1Ub
UZ82CqeKgI23UrD+M7ULX1u0BqAexjZHUsZrlTBlsIbji3Ydk30Jx4u6Ojn+fOUn
d7cntrn4r4ItrtxSju3oyu5+Im2KP1kHCfMiCTa4kNLaHO+oM6JaYpOu3A6mr0m+
B1mT1ncbC8KwevLeJb5QA7YEpjalygte4n+EqCJA1JcOZ0DcM0mpA6qQ4xxmDd5p
PbK8WLYwgZNlS3w2XAKSVnuWbDJ96s0rj4NOcrPvQ0AX8z3N3k/KDieOAKykLTQL
1f2WQG3eu4HVbuqUCJ95Vw82DNuYBYXh2INEclAGYDAd8kuMSHU+EOepagbqnq+X
jPHF9c0WWLNcsQ77WIp+1Tg1Q8evGkj/hAcsG6i969MmASJvvzZMGMS6LBuM6g9M
9Bf/M68+Ro8azbrFB/wHWADAM/UKRhAuPC1hvVEqxwvIY5kjbG8zKFrn3h+QHKtx
JaKXfOkK7Bds4Me1Q1NSXrLLlJKWmk42WIdSlbi4H0AgwsrY08Wl3GNGrvNCrJU0
ghA5oDfHuo+bdgKIflSWeC4AyzeYHMoALue8V7p+GpZG8WKDN7IjDCbr6mjmXQL8
+w5F5Jk5+hrvlMyskjLaOdqX1z4gI6txjC2xsM7aqPKRTtKbhV4=
=M2dH
-----END PGP SIGNATURE-----
--- End Message ---