Your message dated Sat, 16 Aug 2014 17:48:28 +0000
with message-id <e1xii5c-0007ot...@franck.debian.org>
and subject line Bug#758306: fixed in adequate 0.12.1
has caused the Debian Bug report #758306,
regarding adequate: Warning "{push,keys} on reference is experimental" since
Perl 5.20
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
758306: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=758306
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: adequate
Version: 0.12
User: debian-p...@lists.debian.org
Usertags: perl-5.20-transition
Hi,
since Perl 5.20, adequate throws the following Perl warnings
upon invocation:
$ adequate adequate
push on reference is experimental at /usr/bin/adequate line 247.
keys on reference is experimental at /usr/bin/adequate line 941.
$
According to
http://perldoc.perl.org/perldiag.html#keys-on-reference-is-experimental
this feature "may change or be removed in a future Perl version", hence
the severity of this bug report may be raised to RC in the future.
See http://perldoc.perl.org/perldelta.html#New-Warnings for reasoning
and background.
-- System Information:
Debian Release: jessie/sid
APT prefers unstable
APT policy: (990, 'unstable'), (600, 'testing'), (110, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 3.15-trunk-amd64 (SMP w/4 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages adequate depends on:
ii debconf 1.5.53
ii perl 5.20.0-4
adequate recommends no packages.
adequate suggests no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: adequate
Source-Version: 0.12.1
We believe that the bug you reported is fixed in the latest version of
adequate, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 758...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Jakub Wilk <jw...@debian.org> (supplier of updated adequate package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Sat, 16 Aug 2014 19:07:55 +0200
Source: adequate
Binary: adequate
Architecture: source all
Version: 0.12.1
Distribution: unstable
Urgency: medium
Maintainer: Jakub Wilk <jw...@debian.org>
Changed-By: Jakub Wilk <jw...@debian.org>
Description:
adequate - Debian package quality testing tool
Closes: 758306
Changes:
adequate (0.12.1) unstable; urgency=medium
.
* Fix “keys/push on reference is experimental” warnings (closes: #758306).
Thanks to Axel Beckert for the bug report.
Checksums-Sha1:
f98976145241be378cebac9c00a4f6afc79d9447 1603 adequate_0.12.1.dsc
5dc69aa3f85070d975d315695bb5f77c96ae1c48 30902 adequate_0.12.1.tar.gz
4f7cf206f5ba2ebd48987f5f036530b3a2bedd3f 23880 adequate_0.12.1_all.deb
Checksums-Sha256:
4fd03876f961a2a0d0a1dc80f4ef9efca511e9e7cbbefb753f8022a81d8c0c87 1603
adequate_0.12.1.dsc
209a4e8eb448b0b36258b81e4bd1bced97cb030938aea50b132f0d58247cea3c 30902
adequate_0.12.1.tar.gz
bdd16755c7a6dc8d1778fcb9860ced6038baf3dfe0332ab5762b56063f0401d4 23880
adequate_0.12.1_all.deb
Files:
5d4d67789d9e2d96972a62bb3f9a5037 23880 utils optional adequate_0.12.1_all.deb
3f75a98e9106954d95c8608b206a1235 1603 utils optional adequate_0.12.1.dsc
c94408eca1d83f4d79862f77dd262a45 30902 utils optional adequate_0.12.1.tar.gz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=goC/
-----END PGP SIGNATURE-----
--- End Message ---