Your message dated Mon, 03 Oct 2022 10:04:03 +0000
with message-id <e1ofiit-002kxa...@fasolo.debian.org>
and subject line Bug#965502: fixed in dvi2ps 5.1j-1.5
has caused the Debian Bug report #965502,
regarding dvi2ps: Removal of obsolete debhelper compat 5 and 6 in bookworm
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
965502: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965502
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: dvi2ps
Version: 5.1j-1.3
Severity: normal
Usertags: compat-5-6-removal
Hi,
The package dvi2ps uses debhelper with a compat level of 5 or 6,
which is deprecated and scheduled for removal[1].
Please bump the debhelper compat at your earliest convenience
/outside the freeze/!
* Compat 13 is recommended (supported in stable-backports)
* Compat 7 is the bare minimum
PLEASE KEEP IN MIND THAT the release team *DOES NOT* accept uploads
with compat bumps during the freeze.
If there is any risk that the fix for this bug might not migrate to
testing before 2021-01-01[3] then please postpone the fix until after
the freeze.
At the time of filing this bug, compat 5 and 6 are expected to be
removed "some time during the development cycle of bookworm".
Thanks,
~Niels
[1] https://lists.debian.org/debian-devel/2020/07/msg00065.html
[2] https://release.debian.org/bullseye/FAQ.html
[3] The choice of 2021-01-01 as a "deadline" is set before the actual
freeze deadline to provide a safe cut off point for most people.
Mind you, it is still your responsibility to ensure that the upload
makes it into testing even if you upload before that date.
--- End Message ---
--- Begin Message ---
Source: dvi2ps
Source-Version: 5.1j-1.5
Done: Bastian Germann <b...@debian.org>
We believe that the bug you reported is fixed in the latest version of
dvi2ps, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 965...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Bastian Germann <b...@debian.org> (supplier of updated dvi2ps package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 03 Oct 2022 09:32:23 +0000
Source: dvi2ps
Architecture: source
Version: 5.1j-1.5
Distribution: unstable
Urgency: medium
Maintainer: OHURA Makoto <oh...@debian.org>
Changed-By: Bastian Germann <b...@debian.org>
Closes: 965502
Changes:
dvi2ps (5.1j-1.5) unstable; urgency=medium
.
* Non-maintainer upload.
* Update to debhelper-compat 10 (Closes: #965502).
Checksums-Sha1:
36c8115b470190185e1c565bf4425631fab7e252 1576 dvi2ps_5.1j-1.5.dsc
3b757a7c9e029830ce41736a25ddee46becfa476 22068 dvi2ps_5.1j-1.5.debian.tar.xz
5438159c262fa202f6e393e7a1fcd5ec10bd0ff2 5833 dvi2ps_5.1j-1.5_source.buildinfo
Checksums-Sha256:
c5adb1155d69688ebb1cfede53b1ab0c592061a77d4762b19deaf6c0aa4eccec 1576
dvi2ps_5.1j-1.5.dsc
d918cad51f94c5c800ed47f29671ae4343333b49c6342d83006a5d36dcd4e2ec 22068
dvi2ps_5.1j-1.5.debian.tar.xz
0d3da9a4ca7ef1e5524e56297aa52f8370f64a01d941f5f9b8bea6e37168eb60 5833
dvi2ps_5.1j-1.5_source.buildinfo
Files:
40be3f00122d3c4cf455b2f48175b5fa 1576 tex optional dvi2ps_5.1j-1.5.dsc
3f9b27a7b64b842e32ddf32ed34be456 22068 tex optional
dvi2ps_5.1j-1.5.debian.tar.xz
df5b19bec5d77215ce203a4438a428ad 5833 tex optional
dvi2ps_5.1j-1.5_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=IYPa
-----END PGP SIGNATURE-----
--- End Message ---