Your message dated Fri, 24 Dec 2021 07:03:35 +0000
with message-id <e1n0ec3-0007cj...@fasolo.debian.org>
and subject line Bug#965902: fixed in xom 1.2.10-3
has caused the Debian Bug report #965902,
regarding xom: Removal of obsolete debhelper compat 5 and 6 in bookworm
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
965902: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965902
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: xom
Version: 1.2.10-1
Severity: normal
Usertags: compat-5-6-removal
Hi,
The package xom uses debhelper with a compat level of 5 or 6,
which is deprecated and scheduled for removal[1].
Please bump the debhelper compat at your earliest convenience
/outside the freeze/!
* Compat 13 is recommended (supported in stable-backports)
* Compat 7 is the bare minimum
PLEASE KEEP IN MIND THAT the release team *DOES NOT* accept uploads
with compat bumps during the freeze.
If there is any risk that the fix for this bug might not migrate to
testing before 2021-01-01[3] then please postpone the fix until after
the freeze.
At the time of filing this bug, compat 5 and 6 are expected to be
removed "some time during the development cycle of bookworm".
Thanks,
~Niels
[1] https://lists.debian.org/debian-devel/2020/07/msg00065.html
[2] https://release.debian.org/bullseye/FAQ.html
[3] The choice of 2021-01-01 as a "deadline" is set before the actual
freeze deadline to provide a safe cut off point for most people.
Mind you, it is still your responsibility to ensure that the upload
makes it into testing even if you upload before that date.
--- End Message ---
--- Begin Message ---
Source: xom
Source-Version: 1.2.10-3
Done: Andrius Merkys <mer...@debian.org>
We believe that the bug you reported is fixed in the latest version of
xom, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 965...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Andrius Merkys <mer...@debian.org> (supplier of updated xom package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 24 Dec 2021 01:53:25 -0500
Source: xom
Architecture: source
Version: 1.2.10-3
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers
<pkg-java-maintain...@lists.alioth.debian.org>
Changed-By: Andrius Merkys <mer...@debian.org>
Closes: 965902
Changes:
xom (1.2.10-3) unstable; urgency=medium
.
* Team upload.
* Bumping debhelper compat level to 7 (Closes: #965902)
Checksums-Sha1:
d14f23cd566db5beba1447cf922e01d8f4759e6c 2155 xom_1.2.10-3.dsc
04d4bfe00f837b9b6572be9be1159ef1e20fa3d1 7468 xom_1.2.10-3.debian.tar.xz
816a711a4e1e2bfbf48d9c5cba9ad9594988a528 7577 xom_1.2.10-3_source.buildinfo
Checksums-Sha256:
4badd39242ede3bcce084e87076fd82e64317af6e53e2783688777ba2db9b436 2155
xom_1.2.10-3.dsc
aa8c2138abdb5b7a52209b687d0e9e07855e4141404b935dc77e3ca9cef7a904 7468
xom_1.2.10-3.debian.tar.xz
cd897b450d388c696f1ca94986b025eaa2882645fead14d1238c8230c70efb89 7577
xom_1.2.10-3_source.buildinfo
Files:
940e12f7dfd0920178c3007c38e1da2b 2155 java optional xom_1.2.10-3.dsc
5fa0e6317422acc8080e50ed33a0f68f 7468 java optional xom_1.2.10-3.debian.tar.xz
86582e05730a371336a57611d11d01d6 7577 java optional
xom_1.2.10-3_source.buildinfo
-----BEGIN PGP SIGNATURE-----
iQJGBAEBCgAwFiEEdyKS9veshfrgQdQe5fQ/nCc08ocFAmHFbrsSHG1lcmt5c0Bk
ZWJpYW4ub3JnAAoJEOX0P5wnNPKH/C4QAJg25pIogtrQgPO048nXLcsvnNLEwfLz
qgaOxBRd7VrMiSFYvOILDZUxYX7Oj3zmXuSi/wNYrnmk9OYKyeF+WAkHVzYZR2ra
GqdMRbpWTPiy1YMLDVIDNX8t1xBt/ch4Qx/4OSkBKV+A2l4pEYUsYSvgi7kwamc5
LYmzspVGI0q1pQ1bIrBo0EhxPBJCXWosdzWvj6K0+8mhudB8QdVU8Lq0JJ5LJqwv
3aRA/R7Qq1WShjkJcBrrYWNQGevfxguJNHVhkh2jlZ3Y0xqrjhxKeMDfqQDagfVI
w3VA6OfB0pAFmhss+YfE7VvhKyElrpaP6vZuSe//5mbTaNXtWDk6Nzx+4EPLx4fH
30rx1LF5bhT/kmFY/i1nDgkC4v3rNqYvQBK6rD0X83lsR9FGbIldDrklA6z7Yr1j
FZCvpJP+QKOyXumYYQQMnF0aW+JtK6cMmeLll05r9k2DwG2C80ipfPI/bGWf9Bt0
Ts9K2rZBQS5hHpvhPqlYcTn6ebICbXPWBZcJJUkrNhtfPNuD0HBYakwiy1NhmjKL
N4BFftkc73bDa8jUdk6fdp67YHL/8UYg7ptdfONb5eE8npSP7on/rxvYjvL10GjW
63Do5XPxZUHz7q2MaRIqR5e4z9lXBBr7kYqSgCe25bu43zBdd990ZdEuQ/RXr3Dg
WccT5ZSyadC6
=o/Bx
-----END PGP SIGNATURE-----
--- End Message ---