Your message dated Mon, 27 Dec 2021 19:49:45 +0000
with message-id <e1n1w09-000fez...@fasolo.debian.org>
and subject line Bug#965718: fixed in memtest86 4.3.7-4
has caused the Debian Bug report #965718,
regarding memtest86: Removal of obsolete debhelper compat 5 and 6 in bookworm
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
965718: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965718
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: memtest86
Version: 4.3.7-3
Severity: normal
Usertags: compat-5-6-removal

Hi,

The package memtest86 uses debhelper with a compat level of 5 or 6,
which is deprecated and scheduled for removal[1].

Please bump the debhelper compat at your earliest convenience
/outside the freeze/!

  * Compat 13 is recommended (supported in stable-backports)

  * Compat 7 is the bare minimum


PLEASE KEEP IN MIND THAT the release team *DOES NOT* accept uploads
with compat bumps during the freeze.

If there is any risk that the fix for this bug might not migrate to
testing before 2021-01-01[3] then please postpone the fix until after
the freeze.


At the time of filing this bug, compat 5 and 6 are expected to be
removed "some time during the development cycle of bookworm".


Thanks,
~Niels


[1] https://lists.debian.org/debian-devel/2020/07/msg00065.html

[2] https://release.debian.org/bullseye/FAQ.html

[3] The choice of 2021-01-01 as a "deadline" is set before the actual
freeze deadline to provide a safe cut off point for most people.

Mind you, it is still your responsibility to ensure that the upload
makes it into testing even if you upload before that date.

--- End Message ---
--- Begin Message ---
Source: memtest86
Source-Version: 4.3.7-4
Done: Adrian Bunk <b...@debian.org>

We believe that the bug you reported is fixed in the latest version of
memtest86, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 965...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adrian Bunk <b...@debian.org> (supplier of updated memtest86 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 27 Dec 2021 21:27:25 +0200
Source: memtest86
Architecture: source
Version: 4.3.7-4
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group <packa...@qa.debian.org>
Changed-By: Adrian Bunk <b...@debian.org>
Closes: 965718 999128
Changes:
 memtest86 (4.3.7-4) unstable; urgency=low
 .
   * QA upload.
   * Set maintainer to Debian QA Group. (see #969192)
   * debian/compat: 5 -> 7. (Closes: #965718)
   * debian/rules: Add build-{arch,indep}. (Closes: #999128)
Checksums-Sha1:
 1dd0efd75b7ed29f72381b6e3ba3870705165014 1844 memtest86_4.3.7-4.dsc
 bd36fd738f95a2d939a6bddc1ec7251a51b89eb4 13640 memtest86_4.3.7-4.debian.tar.xz
Checksums-Sha256:
 19eeb56850c8e575fd43475b9989fff3dc7f58669334890362be14208402c473 1844 
memtest86_4.3.7-4.dsc
 a472976b4af7dd4304e2bea58f30fb924c37a23174b999ed86a661251c8b4e0c 13640 
memtest86_4.3.7-4.debian.tar.xz
Files:
 86e4d0c05ac44193942d8b1f96226155 1844 misc optional memtest86_4.3.7-4.dsc
 34814ca66ebaa669965d1c0737944e55 13640 misc optional 
memtest86_4.3.7-4.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=qUy9
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to