Your message dated Sun, 22 Mar 2020 00:06:57 +0000 with message-id <e1jfo8n-0000q6...@fasolo.debian.org> and subject line Bug#953709: fixed in openafs 1.8.6~pre1-1 has caused the Debian Bug report #953709, regarding src:openafs: fails to migrate to testing for too long to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 953709: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953709 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: openafs Version: 1.8.4~pre1-1 Severity: serious Control: fixed -1 1.8.5-1 Tags: sid bullseye User: release.debian....@packages.debian.org Usertags: out-of-sync Dear maintainer(s), As recently announced [1], the Release Team now considers packages that are out-of-sync between testing and unstable for more than 60 days as having a Release Critical bug in testing. Your package src:openafs in its current version in unstable has been trying to migrate for 136 days [2]. Hence, I am filing this bug. If a package is out of sync between unstable and testing for a longer period, this usually means that bugs in the package in testing cannot be fixed via unstable. Additionally, blocked packages can have impact on other packages, which makes preparing for the release more difficult. Finally, it often exposes issues with the package and/or its (reverse-)dependencies. We expect maintainers to fix issues that hamper the migration of their package in a timely manner. This bug will trigger auto-removal when appropriate. As with all new bugs, there will be at least 30 days before the package is auto-removed. I have marked the version in unstable as fixing this bug, so if that version or a later version migrates, this bug will no longer affect testing. I have also tagged this bug to only affect sid and bullseye, so it doesn't affect (old-)stable. If you believe your package is unable to migrate to testing due to issues beyond your control, don't hesitate to contact the Release Team. Paul [1] https://lists.debian.org/debian-devel-announce/2020/02/msg00005.html [2] https://qa.debian.org/excuses.php?package=openafs
signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---Source: openafs Source-Version: 1.8.6~pre1-1 Done: Benjamin Kaduk <ka...@mit.edu> We believe that the bug you reported is fixed in the latest version of openafs, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 953...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Benjamin Kaduk <ka...@mit.edu> (supplier of updated openafs package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 21 Mar 2020 14:10:06 -0700 Source: openafs Architecture: source Version: 1.8.6~pre1-1 Distribution: unstable Urgency: medium Maintainer: Benjamin Kaduk <ka...@mit.edu> Changed-By: Benjamin Kaduk <ka...@mit.edu> Closes: 946520 952799 953709 953729 Changes: openafs (1.8.6~pre1-1) unstable; urgency=medium . * New upstream prerelease (Closes: #953709): - Code cleanup prompted by gcc9 errors - Update "vos zap -force" to clean up empty directories - Relax implementation-specific XDR array length limits for prdb types, which were being hit in practice at some large sites - Tighten up fileservers' -readonly mode, and add an option to allow members of system:administrators to be able to write to readonly servers - Support linux kernels up to version 5.6rc2 - Additional sundry changes; see upstream NEWS * Pull in additional patches from upstream: - Support linux kernel 5.6 release - Recognize ppc64le in configure's OS-detection logic - Skip vos tests if vlserver port is already bound (Closes: 953729) * Fix typo preventing ppc64el support from working (Closes: #946520) * Update Italian debconf translation; thanks Beatrice Torracca (Closes: #952799) * Update to debhelper-compat 12 Checksums-Sha1: b42b96ae38405b0f4135090e9a7f79958add2a11 3606 openafs_1.8.6~pre1-1.dsc 64227ce93bfea4f09cbf1e4249438f5788189534 6734520 openafs_1.8.6~pre1.orig.tar.xz 20d1e4481540431997b6a9a3cc85251914edf77f 143744 openafs_1.8.6~pre1-1.debian.tar.xz fb34e85c9db63587d504c2e75044d11681832c25 16449 openafs_1.8.6~pre1-1_amd64.buildinfo Checksums-Sha256: 43c135b5d8b6cc14a44bd00cc4c4f6226f00aae84ba8ae759a9638e9c37ce701 3606 openafs_1.8.6~pre1-1.dsc 96b97637f21be222b5a68a544d12abedb2b37a58bbd800c092190beb28c76f99 6734520 openafs_1.8.6~pre1.orig.tar.xz c6deea965443982afc9deb4bcf5086e668b360643be31e061686bd111b4b91a4 143744 openafs_1.8.6~pre1-1.debian.tar.xz 6f598a18c0a6979205862ed6f5fbdb78472425c00ddcf991500d62e2408760e2 16449 openafs_1.8.6~pre1-1_amd64.buildinfo Files: 135961b869cd37b648d945ae94f2ea5a 3606 net optional openafs_1.8.6~pre1-1.dsc dc00d46af7e06e513f0de7f1a152d987 6734520 net optional openafs_1.8.6~pre1.orig.tar.xz e5c1070000ca7d5fb2a31b9eec000295 143744 net optional openafs_1.8.6~pre1-1.debian.tar.xz 0da9bc4b8c53c1e712138c8bb93929ee 16449 net optional openafs_1.8.6~pre1-1_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQHGBAEBCgAsFiEE2WGV4E2ARf9BYP0XKNmm82TrdRIFAl52pMMOHGthZHVrQG1p dC5lZHUACgkQKNmm82TrdRJi8Qwg65RcNhT4gnRANIQL1W3IXtoDWKWCPreWRQun ghPPMpPMKK5raAa4rkGUtRbmjRvpO01sFIj5+OxMlS+fK15qPnLSwNBLMRMiCqpB yW+SfTJlYa8ERmX9XS3A7TzaUki8y51epN/OOs3Ujp6nKiJ94fkT9QV74euneHsH M4T7RYCejdpk6H8rwWVB4fxmZE5zMiUOLMPT87kWXKxJfK/x9GzALfW+Ab8W/nPI j5rLmkIL0rSXSLm1xgXf6kr5WHoOvFiqasZQqu8ZdNTfgJJuIL7nLZdK54QaPQQY FdUkQeRQ9YVMQ1qOPNsOxyO6v5E76mjMgSSZUC34eB2XTpmaDujS+aQN1iF/yRda ZdRqrn1YPrWUKwxHdgDH64muqHnHkEVDUoVOFinLgXK7iPE5rqR70FUzFeUGyy1g +R2ezFxcOi1dLj4Oj1ouBipexkPJ+nR4pNHDO9eSOA2u/IgB8gBFgx/fy2r2i7yM A5qsdqofnRSYYBw3lbgv+YKq97WoxZ3TeA== =CjZY -----END PGP SIGNATURE-----
--- End Message ---