Your message dated Fri, 15 Apr 2022 15:35:45 +0000 with message-id <[email protected]> and subject line Bug#958973: fixed in ruby-curses 1.4.4-1 has caused the Debian Bug report #958973, regarding ruby-curses: Emits warning: "rb_safe_level will be removed in Ruby 3.0", fixed upstream in 1.3.2 to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 958973: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=958973 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: ruby-curses Version: 1.2.4-1+b3 Severity: important Tags: fixed-upstream Control: affects -1 irqtop Hi, running ruby-written irqtop on Debian Unstable contantly emits this warning: /usr/bin/irqtop:545: warning: rb_safe_level will be removed in Ruby 3.0 which makes it quite unusable as the curses screen looks like this after a few seconds: 9 /usr/bin/irqtop:598: warning: rb_safe_level will be removed in Ruby 3.0 2.4 11.6 12.2 15 /usr/bin/irqtop:613: warning: rb_safe_level will be removed in Ruby 3.0 /usr/bin1.2 1.0 1.2ing: r6_safe_level will be removed in Ruby 3.0 325 410 295 440 /usr/bin/irqtop:613: warning: rb_safe_level will b44removed in Ruby 3.0 34 /usr/bin/irqtop:598: warning: rb_safe_level will be removed in Ruby 3.0 83 /usr/bin/irqtop:613:18arning: rb_safe_level will be removed in Ruby 3.0 /usr/bin/irqtop:598: warning: rb_safe_l232 246 198ved in5Ruby 3.0 6 1 14 9 /usr/bin/irqtop:613: warning: rb_safe_level will be removed in Ruby 3.0 19 27 30 12 /us22 32 33 29ng: rb_safe_level will be removed in Ruby 3.0 18 3 6 4 /usr/bin/irqtop:613: warning: rb_safe_level will be removed in Ruby 3.0 0 3 0 184 /usr/bin/irqtop:598: warning: rb_safe_level will be removed in Ruby 3.0 6 2 /usr/bin/irqtop:620: warning: rb_safe_level will be removed in Ruby 3.0 This has been fixed upstream in the 1.3.2 release, released in December 2019: https://github.com/ruby/curses/commit/a9b9db9b5d5a4b52e3d0e0eaf0fbb2be839a3c29 https://github.com/ruby/curses/releases/tag/v1.3.2 So please upgrade ruby-curses in Debian Unstable to 1.3.2. The current version in unstable, 1.2.4 is from September 2017 and there were 6 new upstream releases since then. -- System Information: Debian Release: bullseye/sid APT prefers unstable APT policy: (990, 'unstable'), (600, 'testing'), (500, 'unstable-debug'), (500, 'buildd-unstable'), (110, 'experimental'), (1, 'experimental-debug'), (1, 'buildd-experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.5.0-1-amd64 (SMP w/4 CPU cores) Kernel taint flags: TAINT_FIRMWARE_WORKAROUND, TAINT_UNSIGNED_MODULE Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) LSM: AppArmor: enabled Versions of packages ruby-curses depends on: ii libc6 2.30-4 ii libncursesw6 6.2-1 ii libruby2.7 2.7.0-6 ii libtinfo6 6.2-1 ii ruby 1:2.7+1 ruby-curses recommends no packages. ruby-curses suggests no packages. -- no debconf information
--- End Message ---
--- Begin Message ---Source: ruby-curses Source-Version: 1.4.4-1 Done: Andrej Shadura <[email protected]> We believe that the bug you reported is fixed in the latest version of ruby-curses, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Andrej Shadura <[email protected]> (supplier of updated ruby-curses package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Fri, 15 Apr 2022 16:54:53 +0200 Source: ruby-curses Architecture: source Version: 1.4.4-1 Distribution: unstable Urgency: medium Maintainer: Debian Ruby Extras Maintainers <[email protected]> Changed-By: Andrej Shadura <[email protected]> Closes: 958973 959115 Changes: ruby-curses (1.4.4-1) unstable; urgency=medium . * New upstream release (Closes: #958973). * d/copyright: Use https protocol in Format field. * Use debhelper-compat instead of debian/compat, bump compat to 13. * d/control: Set Vcs-* to salsa.debian.org (Closes: #959115). * Update watch file format version to 4. * Use secure URI in debian/watch. * Use secure URI in Homepage field. * Set upstream metadata fields: Bug-Database, Bug-Submit, Repository, Repository-Browse. * Set Standards-Version: 4.6.0. * Set Rules-Requires-Root: no. * Wrap and sort debian/control. * Use dh-sequence-ruby instead of --with ruby. Checksums-Sha1: a12b18a348b6591b74f61c8f58c6df919c0f93fe 1555 ruby-curses_1.4.4-1.dsc 71697626a766f2139238885f28982fe1ea426369 530006 ruby-curses_1.4.4.orig.tar.gz 4e49c758940c5ea0a2e590524c4ea0f9d1237e41 3180 ruby-curses_1.4.4-1.debian.tar.xz Checksums-Sha256: ab7f367aa7e10eccb908f23c90b46bd98c464d1b23449d7a7bcf3262342750b4 1555 ruby-curses_1.4.4-1.dsc c44d39780ab84fde189ae3094226ed1489e0027343ade9a9fd8f31ff0ccbeedc 530006 ruby-curses_1.4.4.orig.tar.gz 9af7d76781355fdfce8fb8e44ddcaa6782c729fc604e7dbc4d9983dfa37b936b 3180 ruby-curses_1.4.4-1.debian.tar.xz Files: d3e47c552b2787fe402215aa7ee5021f 1555 ruby optional ruby-curses_1.4.4-1.dsc ace1e3c5afbbb4ea77a89669c7675049 530006 ruby optional ruby-curses_1.4.4.orig.tar.gz 5e6e56144b0f12519d5b448580f3d875 3180 ruby optional ruby-curses_1.4.4-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iHUEARYIAB0WIQSD3NF/RLIsyDZW7aHoRGtKyMdyYQUCYlmHuAAKCRDoRGtKyMdy YTItAPwN0vdOThhJqvEVbXHdHHbYNdaxS2CJ3FgK+/WKpAuejgD/QrKvC0mBD1Zo zItd2LGRLevSrPHH1tOZkHgjbv3u3w0= =KtDe -----END PGP SIGNATURE-----
--- End Message ---

