Your message dated Sun, 28 Sep 2025 08:40:32 +0000
with message-id <[email protected]>
and subject line Bug#1007529: fixed in watchdog 5.16-1.2
has caused the Debian Bug report #1007529,
regarding watchdog: please consider upgrading to 3.0 source format
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1007529: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007529
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: watchdog
Version: 5.16-1
Severity: wishlist
Tags: bookworm sid
Usertags: format1.0 format1.0-nkp-nv

Dear maintainer,

This package is among the few (1.9%) that still use source format 1.0 in
bookworm.  Please upgrade it to source format 3.0, as (1) this format has many
advantages, as documented in https://wiki.debian.org/Projects/DebSrc3.0 ; (2)
this contributes to standardization of packaging practices.

Please note that this is also a sign that the packaging of this software
could maybe benefit from a refresh. It might be a good opportunity to
look at other aspects as well.

It was noticed in https://lists.debian.org/debian-devel/2022/03/msg00096.html
that the conversion for this package is likely trivial, and builds bit-by-bit
identical binary packages.


This mass bug filing was discussed on debian-devel@:
https://lists.debian.org/debian-devel/2022/03/msg00074.html

Thanks

Lucas

--- End Message ---
--- Begin Message ---
Source: watchdog
Source-Version: 5.16-1.2
Done: Bastian Germann <[email protected]>

We believe that the bug you reported is fixed in the latest version of
watchdog, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Germann <[email protected]> (supplier of updated watchdog package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 18 Sep 2025 08:25:37 +0200
Source: watchdog
Architecture: source
Version: 5.16-1.2
Distribution: unstable
Urgency: medium
Maintainer: Michael Meskes <[email protected]>
Changed-By: Bastian Germann <[email protected]>
Closes: 1007529
Changes:
 watchdog (5.16-1.2) unstable; urgency=medium
 .
   * Non-maintainer upload
   * Convert to source format 3.0 (Closes: #1007529)
Checksums-Sha1:
 7da44c010f6f5bee398b07d81e0f94f11abc268a 1589 watchdog_5.16-1.2.dsc
 0705ec00bf9dca09e8194f754bc64b2b90e69944 21980 watchdog_5.16-1.2.debian.tar.xz
 889c206420de9e7c73c7ddd9e4e294dfcbe373a7 5579 
watchdog_5.16-1.2_source.buildinfo
Checksums-Sha256:
 2d33a21fc6af5795d9884f18942910b3012364d6ebf56503974c2eae89087f10 1589 
watchdog_5.16-1.2.dsc
 7172fd6dcf665dc0278d9c9ae268351366b90bb82b41de53a1c093fada9398e5 21980 
watchdog_5.16-1.2.debian.tar.xz
 ae3095847e0bb5bcec4bc8236bf0e2bea5d30e59e97cbdf94a4d125fcbf5fead 5579 
watchdog_5.16-1.2_source.buildinfo
Files:
 57537aaeaa5d1094a5d8061dcdfc575e 1589 admin optional watchdog_5.16-1.2.dsc
 4116c6c47b40dbec9a021af02167d9b1 21980 admin optional 
watchdog_5.16-1.2.debian.tar.xz
 222993e5621f6db2936db2a5e8c86846 5579 admin optional 
watchdog_5.16-1.2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=h2Ae
-----END PGP SIGNATURE-----

Attachment: pgpgtRm2m6fXp.pgp
Description: PGP signature


--- End Message ---

Reply via email to