Your message dated Wed, 10 Aug 2022 13:23:20 +0000
with message-id <[email protected]>
and subject line Bug#1016585: fixed in webkit2gtk 2.36.6-1
has caused the Debian Bug report #1016585,
regarding Enable the wpe option on Ubuntu
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1016585: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016585
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: webkit2gtk
Version: 2.36.4-1

The package currently build without WPE on Ubuntu but the required depends got their MIR review validated recently so that delta can be removed now

Thanks,
diff -Nru webkit2gtk-2.36.4/debian/changelog webkit2gtk-2.36.4/debian/changelog
--- webkit2gtk-2.36.4/debian/changelog	2022-07-06 13:54:15.000000000 +0200
+++ webkit2gtk-2.36.4/debian/changelog	2022-08-03 17:27:29.000000000 +0200
@@ -1,3 +1,9 @@
+webkit2gtk (2.36.4-2) UNRELEASED; urgency=medium
+
+  * Enable wpe on Ubuntu now that the MIR has been accepted
+
+ -- Sebastien Bacher <[email protected]>  Wed, 03 Aug 2022 17:27:29 +0200
+
 webkit2gtk (2.36.4-1) unstable; urgency=high
 
   * New upstream release.
diff -Nru webkit2gtk-2.36.4/debian/rules webkit2gtk-2.36.4/debian/rules
--- webkit2gtk-2.36.4/debian/rules	2022-07-06 13:54:15.000000000 +0200
+++ webkit2gtk-2.36.4/debian/rules	2022-08-03 17:26:41.000000000 +0200
@@ -109,11 +109,8 @@
 	EXTRA_CMAKE_ARGUMENTS += -DENABLE_BUBBLEWRAP_SANDBOX=OFF
 endif
 
-# Disable WPE on Ubuntu since the required backend is in universe
-ifeq ($(shell dpkg-vendor --derives-from Ubuntu && echo yes),yes)
-	EXTRA_CMAKE_ARGUMENTS += -DUSE_WPE_RENDERER=OFF
 # Disable the WPE renderer if libwpebackend-fdo-1.0-dev is not available
-else ifeq ($(shell pkg-config --exists wpebackend-fdo-1.0 && echo yes),yes)
+ifeq ($(shell pkg-config --exists wpebackend-fdo-1.0 && echo yes),yes)
 	EXTRA_CMAKE_ARGUMENTS += -DUSE_WPE_RENDERER=ON
 else
 	EXTRA_CMAKE_ARGUMENTS += -DUSE_WPE_RENDERER=OFF

--- End Message ---
--- Begin Message ---
Source: webkit2gtk
Source-Version: 2.36.6-1
Done: Alberto Garcia <[email protected]>

We believe that the bug you reported is fixed in the latest version of
webkit2gtk, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alberto Garcia <[email protected]> (supplier of updated webkit2gtk package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 10 Aug 2022 14:56:32 +0200
Source: webkit2gtk
Architecture: source
Version: 2.36.6-1
Distribution: unstable
Urgency: high
Maintainer: Debian WebKit Maintainers 
<[email protected]>
Changed-By: Alberto Garcia <[email protected]>
Closes: 1016585
Changes:
 webkit2gtk (2.36.6-1) unstable; urgency=high
 .
   * New upstream release.
   * The WebKitGTK security advisory WSA-2022-0007 lists the following
     security fixes in the latest versions of WebKitGTK:
     - CVE identifiers: CVE-2022-32792, CVE-2022-32816 and CVE-2022-2294
       (fixed in 2.36.5).
   * debian/rules:
     - Enable wpe on Ubuntu now that the MIR has been accepted (thanks,
       Sebastien Bacher) (Closes: #1016585).
Checksums-Sha1:
 099f72989f37e44e5b8b44d13ef67de3679fceaa 4735 webkit2gtk_2.36.6-1.dsc
 e4237eba5a7c6ca1da8aca9f2cd9576b9d8d1817 26593904 webkit2gtk_2.36.6.orig.tar.xz
 e2ac30efefd669e54f96ad0e2803f6a8b3ea5940 195 webkit2gtk_2.36.6.orig.tar.xz.asc
 324bd0630929ac4b40021155cf608fd5edf89fd1 76296 
webkit2gtk_2.36.6-1.debian.tar.xz
 46b77ef376f048864dd9093d085fa563be57066e 14732 
webkit2gtk_2.36.6-1_source.buildinfo
Checksums-Sha256:
 6ce7950b3436e9e31eb1ef0413ba17dc28d99af23daea563f7ae715e7946ecc7 4735 
webkit2gtk_2.36.6-1.dsc
 1193bc821946336776f0dfa5e0dca5651f1e57157eda12da4721d2441f24a61a 26593904 
webkit2gtk_2.36.6.orig.tar.xz
 0a8144270f17200eab1a2cc605a90c6e0143edc57ac2d676a34f24c741d971fe 195 
webkit2gtk_2.36.6.orig.tar.xz.asc
 d211b3561ea113d3e62e1c8d83144831bce596be598b01429e4ffad5c66caf95 76296 
webkit2gtk_2.36.6-1.debian.tar.xz
 7f438c15d1628d8387b2f30bb276882b01a26c83f4e5032f89d9668483ff7e28 14732 
webkit2gtk_2.36.6-1_source.buildinfo
Files:
 12b95a5f1ccf69fb5d2540d0e865f70a 4735 web optional webkit2gtk_2.36.6-1.dsc
 9d5698ed815239e866239652611e73c2 26593904 web optional 
webkit2gtk_2.36.6.orig.tar.xz
 1f902ffdc56959ffcc0560586591f49a 195 web optional 
webkit2gtk_2.36.6.orig.tar.xz.asc
 1995650296f0cda1ed70991b8bc09b93 76296 web optional 
webkit2gtk_2.36.6-1.debian.tar.xz
 8e517b1c561eb1125df87ca89d2c60d4 14732 web optional 
webkit2gtk_2.36.6-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=LwlC
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to