Your message dated Fri, 08 Dec 2023 02:35:48 +0000
with message-id <[email protected]>
and subject line Bug#1057732: fixed in utfcpp 4.0.3-1~exp1
has caused the Debian Bug report #1057732,
regarding utfcpp: please update to 4.0.1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1057732: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057732
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: utfcpp
Version: 3.2.5-1
Severity: important
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Apologies for the inflated severity, but it looks like utfcpp 3.2.5 is what is
breaking
the ledger build [1]
[1]: https://github.com/ledger/ledger/issues/2302
- -- System Information:
Debian Release: trixie/sid
APT prefers testing-debug
APT policy: (500, 'testing-debug'), (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 6.5.0-4-amd64 (SMP w/20 CPU threads; PREEMPT)
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8),
LANGUAGE=en_CA:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
-----BEGIN PGP SIGNATURE-----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=p2HZ
-----END PGP SIGNATURE-----
--- End Message ---
--- Begin Message ---
Source: utfcpp
Source-Version: 4.0.3-1~exp1
Done: Boyuan Yang <[email protected]>
We believe that the bug you reported is fixed in the latest version of
utfcpp, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Boyuan Yang <[email protected]> (supplier of updated utfcpp package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 07 Dec 2023 21:12:10 -0500
Source: utfcpp
Architecture: source
Version: 4.0.3-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Boyuan Yang <[email protected]>
Changed-By: Boyuan Yang <[email protected]>
Closes: 1057732
Changes:
utfcpp (4.0.3-1~exp1) experimental; urgency=medium
.
* New upstream 4.0.x series release. (Closes: #1057732)
* debian/libutfcpp-doc.examples: Dropped, no longer exist.
* debian/rules: Rewrite to use upstream testsuite.
* debian/clean: Also clean our generated test directory.
* debian/patches:
+ 0002-Recover-CMake-ARCH_INDEPENDENT-usage-from-dbb2423248.patch:
Add proposed patch to fix architecture-independent support.
The old 0002 patch is dropped.
+ 0003-CMakeLists.txt-Prefer-usr-share-cmake-for-cmake-file.patch:
Prefer using /usr/share/cmake/utf8cpp/ instead of
/usr/share/utf8cpp/cmake/.
Checksums-Sha1:
9a7196081397d88b601155e72184441032ec99f8 1903 utfcpp_4.0.3-1~exp1.dsc
dbfe560dbd87ca5ddccd1bd172764c9e6053548e 33968 utfcpp_4.0.3.orig.tar.gz
d98baea533197d53087904c77e2f2a9a3bfbc140 6756 utfcpp_4.0.3-1~exp1.debian.tar.xz
63b7980c3d9e542b8489e05d7de18a1ec0389d4c 6999
utfcpp_4.0.3-1~exp1_amd64.buildinfo
Checksums-Sha256:
ceffda5887a0eabceec1874214e066e6d3d345dac1b417dac4d67a9eff32307a 1903
utfcpp_4.0.3-1~exp1.dsc
05e7d023b2bf606777442efc49038e0efce317596582db15adf5c776e237a326 33968
utfcpp_4.0.3.orig.tar.gz
a3a13fb2352668ff296599259478ad6810146308c2081d6b283b151adc81ea11 6756
utfcpp_4.0.3-1~exp1.debian.tar.xz
c7ab86951725dafcbef96294eedee12bae0bf0b90d0d74b379376ea1808ecee2 6999
utfcpp_4.0.3-1~exp1_amd64.buildinfo
Files:
67c1376b50e938f2985fe05014b04edd 1903 libdevel optional utfcpp_4.0.3-1~exp1.dsc
612b38bccc0d85b23960c06f896285d4 33968 libdevel optional
utfcpp_4.0.3.orig.tar.gz
14149e17b75c28b9c7c3a2b644e7ae2d 6756 libdevel optional
utfcpp_4.0.3-1~exp1.debian.tar.xz
9c5eff8f9a21ed1db0303ef47edfdee6 6999 libdevel optional
utfcpp_4.0.3-1~exp1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=zVXK
-----END PGP SIGNATURE-----
--- End Message ---