Your message dated Tue, 04 Jan 2022 16:48:30 +0000
with message-id <e1n4mz8-0004zn...@fasolo.debian.org>
and subject line Bug#965447: fixed in catdvi 0.14-13
has caused the Debian Bug report #965447,
regarding catdvi: Removal of obsolete debhelper compat 5 and 6 in bookworm
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
965447: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965447
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: catdvi
Version: 0.14-12.1
Severity: normal
Usertags: compat-5-6-removal
Hi,
The package catdvi uses debhelper with a compat level of 5 or 6,
which is deprecated and scheduled for removal[1].
Please bump the debhelper compat at your earliest convenience
/outside the freeze/!
* Compat 13 is recommended (supported in stable-backports)
* Compat 7 is the bare minimum
PLEASE KEEP IN MIND THAT the release team *DOES NOT* accept uploads
with compat bumps during the freeze.
If there is any risk that the fix for this bug might not migrate to
testing before 2021-01-01[3] then please postpone the fix until after
the freeze.
At the time of filing this bug, compat 5 and 6 are expected to be
removed "some time during the development cycle of bookworm".
Thanks,
~Niels
[1] https://lists.debian.org/debian-devel/2020/07/msg00065.html
[2] https://release.debian.org/bullseye/FAQ.html
[3] The choice of 2021-01-01 as a "deadline" is set before the actual
freeze deadline to provide a safe cut off point for most people.
Mind you, it is still your responsibility to ensure that the upload
makes it into testing even if you upload before that date.
--- End Message ---
--- Begin Message ---
Source: catdvi
Source-Version: 0.14-13
Done: Adrian Bunk <b...@debian.org>
We believe that the bug you reported is fixed in the latest version of
catdvi, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 965...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Adrian Bunk <b...@debian.org> (supplier of updated catdvi package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 04 Jan 2022 18:11:19 +0200
Source: catdvi
Architecture: source
Version: 0.14-13
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group <packa...@qa.debian.org>
Changed-By: Adrian Bunk <b...@debian.org>
Closes: 965447
Changes:
catdvi (0.14-13) unstable; urgency=low
.
* QA upload.
* Set Maintainer to Debian QA Group. (see #826917)
* debian/compat: 5 -> 7. (Closes: #965447)
Checksums-Sha1:
e2dac2ba36367d95b1023a058b396ab6f4144e5f 1696 catdvi_0.14-13.dsc
134e87238bba77ecd477f185bc1856ac1a6c9635 6058 catdvi_0.14-13.diff.gz
Checksums-Sha256:
802391835f956c2e5cac9eb54e164f2b4d79c037b8d868a2e571ee95b185d1af 1696
catdvi_0.14-13.dsc
70c71939a83b14da920f38e5793e91c9460a80f7f58344804c99872264979042 6058
catdvi_0.14-13.diff.gz
Files:
3dbeef3283b361b10e6600742b82b230 1696 tex extra catdvi_0.14-13.dsc
7429148cd586098b954e36d15941944d 6058 tex extra catdvi_0.14-13.diff.gz
-----BEGIN PGP SIGNATURE-----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=lC/O
-----END PGP SIGNATURE-----
--- End Message ---