Your message dated Sat, 29 Oct 2022 17:04:36 +0000
with message-id <e1oopg8-00ft3r...@fasolo.debian.org>
and subject line Bug#965576: fixed in gtk-sharp2 2.12.40-3.1
has caused the Debian Bug report #965576,
regarding gtk-sharp2: Removal of obsolete debhelper compat 5 and 6 in bookworm
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
965576: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965576
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gtk-sharp2
Version: 2.12.40-3
Severity: normal
Usertags: compat-5-6-removal
Hi,
The package gtk-sharp2 uses debhelper with a compat level of 5 or 6,
which is deprecated and scheduled for removal[1].
Please bump the debhelper compat at your earliest convenience
/outside the freeze/!
* Compat 13 is recommended (supported in stable-backports)
* Compat 7 is the bare minimum
PLEASE KEEP IN MIND THAT the release team *DOES NOT* accept uploads
with compat bumps during the freeze.
If there is any risk that the fix for this bug might not migrate to
testing before 2021-01-01[3] then please postpone the fix until after
the freeze.
At the time of filing this bug, compat 5 and 6 are expected to be
removed "some time during the development cycle of bookworm".
Thanks,
~Niels
[1] https://lists.debian.org/debian-devel/2020/07/msg00065.html
[2] https://release.debian.org/bullseye/FAQ.html
[3] The choice of 2021-01-01 as a "deadline" is set before the actual
freeze deadline to provide a safe cut off point for most people.
Mind you, it is still your responsibility to ensure that the upload
makes it into testing even if you upload before that date.
--- End Message ---
--- Begin Message ---
Source: gtk-sharp2
Source-Version: 2.12.40-3.1
Done: Adrian Bunk <b...@debian.org>
We believe that the bug you reported is fixed in the latest version of
gtk-sharp2, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 965...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Adrian Bunk <b...@debian.org> (supplier of updated gtk-sharp2 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 15 Oct 2022 19:01:59 +0300
Source: gtk-sharp2
Architecture: source
Version: 2.12.40-3.1
Distribution: unstable
Urgency: low
Maintainer: Debian CLI Libraries Team
<pkg-cli-libs-t...@lists.alioth.debian.org>
Changed-By: Adrian Bunk <b...@debian.org>
Closes: 965576
Changes:
gtk-sharp2 (2.12.40-3.1) unstable; urgency=low
.
* Non-maintainer upload.
* dh compat 5 -> 7. (Closes: #965576)
Checksums-Sha1:
b9bb5ccd0e9e37322902576d1fb80cdbe941e6f2 2819 gtk-sharp2_2.12.40-3.1.dsc
20d914fdbd09aff19b5cf36a32dc552fda1ef53b 16352
gtk-sharp2_2.12.40-3.1.debian.tar.xz
Checksums-Sha256:
23a0d9a622a0cdc08a97e6fb788f00fe188fb6479952b7ff63d93df51f03f3f8 2819
gtk-sharp2_2.12.40-3.1.dsc
10a2003baf1f4e99886e473e848dd5c0d605eb3c1e31e55392dce4a73a3a79fc 16352
gtk-sharp2_2.12.40-3.1.debian.tar.xz
Files:
fb8cdaad17e8a9d59323433289cd3987 2819 libs optional gtk-sharp2_2.12.40-3.1.dsc
91c85e56875e47fe90fa07ed3fb6645c 16352 libs optional
gtk-sharp2_2.12.40-3.1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=3Qm6
-----END PGP SIGNATURE-----
--- End Message ---