Your message dated Mon, 14 Nov 2016 00:32:03 +0100
with message-id <20161113233203.ga1...@fliwatuet.svr02.mucip.net>
and subject line Re: Bug#816042: Don't include in stretch
has caused the Debian Bug report #816042,
regarding Don't include in stretch
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
816042: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816042
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: asterisk
Severity: serious

asterisk hasn't seen a maintainer upload to unstable in 2015. It's
already excluded from testing due to an unrelated FTBFS bug. This
bug is used to ensure that it doesn't enter stretch unless maintenance
(especially for the lifetime of stable) is properly ensured again.

Cheers,
        Moritz

--- End Message ---
--- Begin Message ---
On Sun, Nov 13, 2016 at 10:43:29PM +0100, Moritz Mühlenhoff wrote:
> > > Source: asterisk
> > > Severity: serious
> > > 
> > > asterisk hasn't seen a maintainer upload to unstable in 2015. It's
> > > already excluded from testing due to an unrelated FTBFS bug. This
> > > bug is used to ensure that it doesn't enter stretch unless maintenance
> > > (especially for the lifetime of stable) is properly ensured again.
> > 
> > Looking at the history now, does the security team feel that asterisk is
> > sufficiently maintained to be included in Stretch now?
> 
> Yeah, if you're continuing what you've been doing in the past months, feel
> free to close the bug.

I intent to do so, thanks for the trust.

Best Regards,
Bernhard

Attachment: signature.asc
Description: Digital signature


--- End Message ---

Reply via email to