Your message dated Sun, 02 Jan 2022 01:48:26 +0000
with message-id <e1n3pz0-000hv5...@fasolo.debian.org>
and subject line Bug#965448: fixed in checksecurity 2.0.16+nmu3
has caused the Debian Bug report #965448,
regarding checksecurity: Removal of obsolete debhelper compat 5 and 6 in 
bookworm
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
965448: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965448
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: checksecurity
Version: 2.0.16+nmu1
Severity: normal
Usertags: compat-5-6-removal

Hi,

The package checksecurity uses debhelper with a compat level of 5 or 6,
which is deprecated and scheduled for removal[1].

Please bump the debhelper compat at your earliest convenience
/outside the freeze/!

  * Compat 13 is recommended (supported in stable-backports)

  * Compat 7 is the bare minimum


PLEASE KEEP IN MIND THAT the release team *DOES NOT* accept uploads
with compat bumps during the freeze.

If there is any risk that the fix for this bug might not migrate to
testing before 2021-01-01[3] then please postpone the fix until after
the freeze.


At the time of filing this bug, compat 5 and 6 are expected to be
removed "some time during the development cycle of bookworm".


Thanks,
~Niels


[1] https://lists.debian.org/debian-devel/2020/07/msg00065.html

[2] https://release.debian.org/bullseye/FAQ.html

[3] The choice of 2021-01-01 as a "deadline" is set before the actual
freeze deadline to provide a safe cut off point for most people.

Mind you, it is still your responsibility to ensure that the upload
makes it into testing even if you upload before that date.

--- End Message ---
--- Begin Message ---
Source: checksecurity
Source-Version: 2.0.16+nmu3
Done: gregor herrmann <gre...@debian.org>

We believe that the bug you reported is fixed in the latest version of
checksecurity, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 965...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
gregor herrmann <gre...@debian.org> (supplier of updated checksecurity package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 26 Dec 2021 01:57:15 CET
Source: checksecurity
Binary: 
Architecture: source
Version: 2.0.16+nmu3
Distribution: unstable
Urgency: medium
Maintainer: Javier Fernández-Sanguino Peña <j...@computer.org>
Changed-By: gregor herrmann <gre...@debian.org>
Description: 
Closes: 965448 999082
Changes:
 checksecurity (2.0.16+nmu3) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Fix "missing required debian/rules targets build-arch and/or build-
     indep": Add targets to debian/rules.
     (Closes: #999082)
   * Fix "Removal of obsolete debhelper compat 5 and 6 in bookworm":
     Bump to 7 in debian/{compat,control}.
     (Closes: #965448)
   * Fix some grave packaging errors:
     - move debhelper from Build-Depends-Indep to Build-Depends
     - remove temporary files debian/postrm.debhelper and debian/substvars from
       source package
Checksums-Sha256: 
 4f0bf615caa8d9b7a514bae69509f1e11ad9b0b94378dcdb59af61c8445fe8de 1586 
checksecurity_2.0.16+nmu3.dsc
 12b043dc7b38512cdf0735c7c147a4f9e60d83a397b5b8ec130c65ceddbe1a0c 32648 
checksecurity_2.0.16+nmu3.tar.gz
 4a2c190ca520bf6ee202551febe9fbdcf9d5ddae2d218da33fedd7ac5011cacc 5873 
checksecurity_2.0.16+nmu3_sourceonly.buildinfo
Checksums-Sha1: 
 4d985c342281db386a60d7a607f28601ee4b1ed4 1586 checksecurity_2.0.16+nmu3.dsc
 ebff6936f89040c068602f47b06220e37fca5cf0 32648 checksecurity_2.0.16+nmu3.tar.gz
 b71ab988f3e55341f07052ae5a7f16d98617c8ac 5873 
checksecurity_2.0.16+nmu3_sourceonly.buildinfo
Files: 
 f44f9f6e1f0a7d0e952871e34391d0cc 1586 admin optional 
checksecurity_2.0.16+nmu3.dsc
 99f2ade9c1e4f6f1d1b5973671f16d3b 32648 admin optional 
checksecurity_2.0.16+nmu3.tar.gz
 4461159d5ca3508f3114bff48b3f75d7 5873 - - 
checksecurity_2.0.16+nmu3_sourceonly.buildinfo

-----BEGIN PGP SIGNATURE-----
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=AWrF
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to