Your message dated Wed, 23 Mar 2022 15:22:57 +0000
with message-id <e1nx2p7-000eug...@fasolo.debian.org>
and subject line Bug#965564: fixed in gnu-standards 2022.03.23-0.1
has caused the Debian Bug report #965564,
regarding gnu-standards: Removal of obsolete debhelper compat 5 and 6 in 
bookworm
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
965564: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965564
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gnu-standards
Version: 2010.03.11-1.1
Severity: normal
Usertags: compat-5-6-removal

Hi,

The package gnu-standards uses debhelper with a compat level of 5 or 6,
which is deprecated and scheduled for removal[1].

Please bump the debhelper compat at your earliest convenience
/outside the freeze/!

  * Compat 13 is recommended (supported in stable-backports)

  * Compat 7 is the bare minimum


PLEASE KEEP IN MIND THAT the release team *DOES NOT* accept uploads
with compat bumps during the freeze.

If there is any risk that the fix for this bug might not migrate to
testing before 2021-01-01[3] then please postpone the fix until after
the freeze.


At the time of filing this bug, compat 5 and 6 are expected to be
removed "some time during the development cycle of bookworm".


Thanks,
~Niels


[1] https://lists.debian.org/debian-devel/2020/07/msg00065.html

[2] https://release.debian.org/bullseye/FAQ.html

[3] The choice of 2021-01-01 as a "deadline" is set before the actual
freeze deadline to provide a safe cut off point for most people.

Mind you, it is still your responsibility to ensure that the upload
makes it into testing even if you upload before that date.

--- End Message ---
--- Begin Message ---
Source: gnu-standards
Source-Version: 2022.03.23-0.1
Done: Matthias Klose <d...@debian.org>

We believe that the bug you reported is fixed in the latest version of
gnu-standards, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 965...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Matthias Klose <d...@debian.org> (supplier of updated gnu-standards package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 23 Mar 2022 15:48:33 +0100
Source: gnu-standards
Built-For-Profiles: noudeb
Architecture: source
Version: 2022.03.23-0.1
Distribution: unstable
Urgency: medium
Maintainer: Tim Retout <dioc...@debian.org>
Changed-By: Matthias Klose <d...@debian.org>
Closes: 741151 965564 978484 995652 998980
Changes:
 gnu-standards (2022.03.23-0.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Update from the upstream VCS. Closes: #741151.
   * Bump debhelper and standards version. Closes: #965564.
   * Add build targets. Closes: #998980.
   * Mark as M-A: foreign. Closes: #978484.
   * Make the build reproduible. Closes: #995652.
Checksums-Sha1:
 797017bc0742a3fd40b7a3ab5d5d6d7f330cf153 2041 gnu-standards_2022.03.23-0.1.dsc
 b809eb34f2773595956e73a3d0831e34edc516c9 132762 
gnu-standards_2022.03.23.orig.tar.gz
 b670ed1b767bfc2b74b33b87150c6e87fa01ba9d 4688 
gnu-standards_2022.03.23-0.1.debian.tar.xz
 3ac638bd67077ce6645ab24452aa3d68580e90dc 6552 
gnu-standards_2022.03.23-0.1_source.buildinfo
Checksums-Sha256:
 1e04df695c01f61316bf71874eb86008b33732f0db33cd31b68b91a76613f7bf 2041 
gnu-standards_2022.03.23-0.1.dsc
 f7cd65d222f15195afd6cee6411fd0a598fe2059d83b9a83ff2c1efb94910119 132762 
gnu-standards_2022.03.23.orig.tar.gz
 6ddb17f2c5797999a7b5b6c65bb2dd567cf92b090530374afb24e49db42f8564 4688 
gnu-standards_2022.03.23-0.1.debian.tar.xz
 ceb920a093b30206be514cedc7607ec9532cabe3dd0a73087426dc8447837e27 6552 
gnu-standards_2022.03.23-0.1_source.buildinfo
Files:
 47e6158d60470b71e7a8c8f285390350 2041 doc optional 
gnu-standards_2022.03.23-0.1.dsc
 daa5d9ea7d496a4fe4902615e84b4afc 132762 doc optional 
gnu-standards_2022.03.23.orig.tar.gz
 a8938455ebe5d907fc40760265966d40 4688 doc optional 
gnu-standards_2022.03.23-0.1.debian.tar.xz
 6f65e89f4fb89b58960e2c1bd1c2cbc3 6552 doc optional 
gnu-standards_2022.03.23-0.1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=qEXv
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to