Your message dated Sun, 24 Apr 2022 23:52:04 +0000
with message-id <e1nim1m-000aof...@fasolo.debian.org>
and subject line Bug#965910: fixed in xtron 1.1a-14.2
has caused the Debian Bug report #965910,
regarding xtron: Removal of obsolete debhelper compat 5 and 6 in bookworm
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
965910: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965910
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: xtron
Version: 1.1a-14
Severity: normal
Usertags: compat-5-6-removal
Hi,
The package xtron uses debhelper with a compat level of 5 or 6,
which is deprecated and scheduled for removal[1].
Please bump the debhelper compat at your earliest convenience
/outside the freeze/!
* Compat 13 is recommended (supported in stable-backports)
* Compat 7 is the bare minimum
PLEASE KEEP IN MIND THAT the release team *DOES NOT* accept uploads
with compat bumps during the freeze.
If there is any risk that the fix for this bug might not migrate to
testing before 2021-01-01[3] then please postpone the fix until after
the freeze.
At the time of filing this bug, compat 5 and 6 are expected to be
removed "some time during the development cycle of bookworm".
Thanks,
~Niels
[1] https://lists.debian.org/debian-devel/2020/07/msg00065.html
[2] https://release.debian.org/bullseye/FAQ.html
[3] The choice of 2021-01-01 as a "deadline" is set before the actual
freeze deadline to provide a safe cut off point for most people.
Mind you, it is still your responsibility to ensure that the upload
makes it into testing even if you upload before that date.
--- End Message ---
--- Begin Message ---
Source: xtron
Source-Version: 1.1a-14.2
Done: Joao Eriberto Mota Filho <eribe...@debian.org>
We believe that the bug you reported is fixed in the latest version of
xtron, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 965...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Joao Eriberto Mota Filho <eribe...@debian.org> (supplier of updated xtron
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 22 Apr 2022 20:18:27 -0300
Source: xtron
Architecture: source
Version: 1.1a-14.2
Distribution: unstable
Urgency: medium
Maintainer: Uwe Hermann <u...@debian.org>
Changed-By: Joao Eriberto Mota Filho <eribe...@debian.org>
Closes: 965910
Changes:
xtron (1.1a-14.2) unstable; urgency=medium
.
* Non-maintainer upload.
* debian/compat: bumped compat level to 7. (Closes: #965910)
Checksums-Sha1:
8619d8bdc997f863e9f872383f6d044d6ff1a95a 1688 xtron_1.1a-14.2.dsc
90c26d77a43602ce51e374386c69ef56e4341c20 6967 xtron_1.1a-14.2.diff.gz
6f82d601185ad02504354ffb4e04440951d675cd 6128 xtron_1.1a-14.2_source.buildinfo
Checksums-Sha256:
296baf96550e12c9a16c9278b90902275b618d6212ab94e2ae880f9aa5ed3a3e 1688
xtron_1.1a-14.2.dsc
91d05ff682665fe7c3e5c82c8d350e32d9c92efa6d4a81aea47b6e48e79d3200 6967
xtron_1.1a-14.2.diff.gz
214312bb8cde69c2031efbcb44ef22d4be25d0ca0a54983edcbfd26fe3498527 6128
xtron_1.1a-14.2_source.buildinfo
Files:
e489cddbf6d8f541d0f8de7055c979da 1688 games optional xtron_1.1a-14.2.dsc
afb1e1d00ae33ceae9f5b4410109ac1e 6967 games optional xtron_1.1a-14.2.diff.gz
e4763c85aec55eea63372858c7ba9a28 6128 games optional
xtron_1.1a-14.2_source.buildinfo
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEENX3LDuyVoBrrofDS3mO5xwTr6e8FAmJjONsACgkQ3mO5xwTr
6e/MAA/5AeKuFyzBO5qUUO4G3ET0aHLvqRNWOu+HwKQXTBy/T0VShsA6wmEZ4TPJ
HsTPCbb8AO1Uvv6iqtBVZVXkTgMpukalDHqcqTAk2DDv38ZtVzkTdFNgQ6geS31W
5L6jhZt28IkAkIhDPv+OpX9cK/2zn8E5FX43xMhuzr3ZZTCdOVQKUnjgk/N+vVJr
BUSTgRDQ6QevYJnUF8SB2c+h+nJ08TJExmT8h2WKtUK3dJXTbvDrllmfqac0cj12
hqJHRt0fPPY5AM+JsQzwMX7gtUK6z5FRoRd/uvnGdfMctszrTEuwrPicXo8WrILt
8RlAo87HhFka9GIT36JMe8PGFj45GezfB0VW/BMLodP7Cu0yVqzyGr/8ibAXybCP
4ea8C2vqBttD42U1f8GAGAFKLJYKK0FaZUkvm+ZqYHwftnmbNak/TZ8kDPx7OZun
EZnrDixXS6NshhVRzoLAbB5rYrUTGSr6lONC63BblbCSIZI68ij8B5S/mcyYEEYn
fmo5WBdY/Eq0jWGff9fu3kwU2npoqh1aDHsC5Mdy15XPe+Ijj6XpXgLHujsj/sFP
/185q4ruisWQp1t9+BBWHlhL71vL+TRI9Vj4wTGsfO5J9ZK9feP843MCL3e9EFgI
A7iCHpDiZDHsbiwKlXCitBuzbzqC8Zl3rrkWiv53Um9uGYrQRNY=
=XGU+
-----END PGP SIGNATURE-----
--- End Message ---