Your message dated Fri, 07 Jan 2022 15:48:59 +0000
with message-id <e1n5rub-0001y9...@fasolo.debian.org>
and subject line Bug#965544: fixed in gdb-avr 7.7-5
has caused the Debian Bug report #965544,
regarding gdb-avr: Removal of obsolete debhelper compat 5 and 6 in bookworm
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
965544: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965544
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gdb-avr
Version: 7.7-4
Severity: normal
Usertags: compat-5-6-removal
Hi,
The package gdb-avr uses debhelper with a compat level of 5 or 6,
which is deprecated and scheduled for removal[1].
Please bump the debhelper compat at your earliest convenience
/outside the freeze/!
* Compat 13 is recommended (supported in stable-backports)
* Compat 7 is the bare minimum
PLEASE KEEP IN MIND THAT the release team *DOES NOT* accept uploads
with compat bumps during the freeze.
If there is any risk that the fix for this bug might not migrate to
testing before 2021-01-01[3] then please postpone the fix until after
the freeze.
At the time of filing this bug, compat 5 and 6 are expected to be
removed "some time during the development cycle of bookworm".
Thanks,
~Niels
[1] https://lists.debian.org/debian-devel/2020/07/msg00065.html
[2] https://release.debian.org/bullseye/FAQ.html
[3] The choice of 2021-01-01 as a "deadline" is set before the actual
freeze deadline to provide a safe cut off point for most people.
Mind you, it is still your responsibility to ensure that the upload
makes it into testing even if you upload before that date.
--- End Message ---
--- Begin Message ---
Source: gdb-avr
Source-Version: 7.7-5
Done: Hakan Ardo <ha...@debian.org>
We believe that the bug you reported is fixed in the latest version of
gdb-avr, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 965...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Hakan Ardo <ha...@debian.org> (supplier of updated gdb-avr package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 07 Jan 2022 12:58:28 +0100
Source: gdb-avr
Architecture: source
Version: 7.7-5
Distribution: unstable
Urgency: medium
Maintainer: Hakan Ardo <ha...@debian.org>
Changed-By: Hakan Ardo <ha...@debian.org>
Closes: 965544
Changes:
gdb-avr (7.7-5) unstable; urgency=medium
.
* Bump debhelper to version 7 (closes: #965544)
Checksums-Sha1:
638f9485ebadb7e0a2dbf99fac4f05abdc75c06d 1618 gdb-avr_7.7-5.dsc
9efe2738ccaac7ee1701d53af76569db6ec47775 2446311 gdb-avr_7.7-5.tar.gz
5b88ae876f4169a97d48a8c16ad921a39e0926bf 8913 gdb-avr_7.7-5_amd64.buildinfo
Checksums-Sha256:
3dfb892d7a7cb34802424abef1d8bf4f282e8b9da7100868214afd678aa772ad 1618
gdb-avr_7.7-5.dsc
287aef2618704bf6d00a97bb1c7274b0ea30c9d7650bf03cc884242592c26e52 2446311
gdb-avr_7.7-5.tar.gz
b48242f095fc44ed609dc9ee556d57679d1dfc91332aef558f0f7ac43bc46ddb 8913
gdb-avr_7.7-5_amd64.buildinfo
Files:
b610d30529f364cf489231f662d82df2 1618 devel extra gdb-avr_7.7-5.dsc
8227e80c755dc8629a781f916bee9ad6 2446311 devel extra gdb-avr_7.7-5.tar.gz
86fa2c51bdb5aa55c39ea5fad514420b 8913 devel extra gdb-avr_7.7-5_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEiBxmoJbhJJA77soc6iX5+wapp9EFAmHYOhQACgkQ6iX5+wap
p9H9OhAAsXU94NRIzccKV2qb5WlNI8g0iOWH0hwzZ2k2hE6zBJ/Hw7E4DVF7oNy3
rqTnVejfJ9pMXVJjryDRwCYVu78gBFpcpHOy+nrtYT9kt2mnjoBuDXcwiMPXQXIt
Ykm12Lxki8bxceF05wPtrIoV2ufGQs9Xb8M3PwwXuY1oO4i69TH0ZPIZVfvqASI1
2R2rMIUM3u2afDuOv2mUu0PZWO9/js3mUDFz8THDKovUc4AFXxsXpFYb5kgO/l5Y
OdtA22wB6u1073qJWMAtk7xSF+bqiu9PCavrbWCcDDY1k7RCIAlqVrxQ5nRHhWaT
xKaXa4Pj6HQMc58CqNqNcekjwX40mWzHWgrBzKAdWxjEiiZyVlJ1Cs1eGlbMsxcT
4vsFcjyaFl4la2rE4YK5dv00xWuERjQ2mA+MtfADdy7xV8+VHjhVyPo8f1k7Ufst
lvi+zavyWsH4SsjdjUCvCiIfq0+7Er9isCkxf5jMfhGLh5K2tDzMTLYzlFgvYb5h
XfTzglA8EdYl7E1A9JulQ8/SyPN8n5R+VmzcCk77HNibVhTCatQKreIXqmGoPTHa
WjUOy2d9SToU6ffUjOVmN2fVnqDFiXX6A3nZvNpvvnfGQwapA89h5gPVsa6/XYWf
jMRws6bNCbn9ZAXNuddRKgI1HSnwcq8VqGJjSitaKeXjBfy3W4w=
=XRyf
-----END PGP SIGNATURE-----
--- End Message ---