Hi, On 07-12-2023 12:20, Adrian Bunk wrote:
On Thu, Dec 07, 2023 at 11:18:42AM +0100, Paul Gevers wrote:I hope that in several hours, https://release.debian.org/britney/excuses_s-p-u.html will have the answer.it should find packages like jtreg6 that are scheduled for the next point release, but it won't find packages like gmp that went into bullseye 2 years ago.
Ack. Indeed it spots:cacti, fastdds, freetype, grub-efi-amd64-signed, grub-efi-arm64-signed, grub-efi-ia32-signed, jtreg6, llvm-toolchain-16, node-babel7, node-browserify-sign and slurm-wlm. A bunch of them have arch:all binaries.
Stopping further regression on this is good, but for the ~ February point releases we have to discuss whether binNMUs+NMUs for packages that slipped through in the past should be done for bookworm (and bullseye).
I would agree with this, but I'm not an SRM. A bunch of these are security uploads. We need to discuss this with the security team too (in CC now).
Paul
OpenPGP_signature.asc
Description: OpenPGP digital signature
_______________________________________________ Reproducible-builds mailing list Reproducible-builds@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/reproducible-builds