Your message dated Sat, 23 Apr 2016 15:50:59 +0000
with message-id <e1atzpj-00017q...@franck.debian.org>
and subject line Bug#816104: fixed in libcrypt-gcrypt-perl 1.26-5
has caused the Debian Bug report #816104,
regarding libcrypt-gcrypt-perl: FTBFS against libgcrypt 1.7.0 beta
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
816104: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816104
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libcrypt-gcrypt-perl
Version: 1.26-3
Severity: important

Hello,

the package FTBFS against libgcrypt 1.7.0 beta with the folowing error:


Test Summary Report
-------------------
t/01-cipher.t       (Wstat: 11 Tests: 19 Failed: 0)
  Non-zero wait status: 11
  Parse errors: Bad plan.  You planned 20 tests but ran 19.
Files=11, Tests=234,  0 wallclock secs ( 0.03 usr  0.00 sys +  0.20 cusr  0.01 
csys =  0.24 CPU)
Result: FAIL
Failed 1/11 test programs. 0/234 subtests failed.
Makefile:1003: recipe for target 'test_dynamic' failed
make[1]: *** [test_dynamic] Error 255


libgcrypt 1.7.0 beta is available in Debian/experimental under a faked
version number (1.6.5+gitXXX). Upstream intends to publish this as new
stable release soonish.

cu Andreas
-- 
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'

--- End Message ---
--- Begin Message ---
Source: libcrypt-gcrypt-perl
Source-Version: 1.26-5

We believe that the bug you reported is fixed in the latest version of
libcrypt-gcrypt-perl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 816...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Niko Tyni <nt...@debian.org> (supplier of updated libcrypt-gcrypt-perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 23 Apr 2016 17:10:47 +0300
Source: libcrypt-gcrypt-perl
Binary: libcrypt-gcrypt-perl
Architecture: source
Version: 1.26-5
Distribution: unstable
Urgency: high
Maintainer: Debian Perl Group <pkg-perl-maintain...@lists.alioth.debian.org>
Changed-By: Niko Tyni <nt...@debian.org>
Description:
 libcrypt-gcrypt-perl - Perl interface to the GNU Cryptographic library
Closes: 816104
Changes:
 libcrypt-gcrypt-perl (1.26-5) unstable; urgency=high
 .
   * Team upload.
   * Patch the test suite to work with libgcrypt >= 1.7.0. (Closes: #816104)
Checksums-Sha1:
 cd6153d0cbdcb521e0678d25314daab718a450be 2166 libcrypt-gcrypt-perl_1.26-5.dsc
 74ce9c1f08574926696a386f5e4f1aaebed26f5c 5052 
libcrypt-gcrypt-perl_1.26-5.debian.tar.xz
Checksums-Sha256:
 92b5652b864e6a4c4afd40ad11d838cf81d79f25ff6ab98f73eb994465ee1235 2166 
libcrypt-gcrypt-perl_1.26-5.dsc
 a343be36ef70f36a462379b5de141d8f8a9f4d0edba98b056078d62b0075e735 5052 
libcrypt-gcrypt-perl_1.26-5.debian.tar.xz
Files:
 ce961fe3901b638451a330c7db1075f7 2166 perl optional 
libcrypt-gcrypt-perl_1.26-5.dsc
 feadad19cee085c510e0d4e3030c5a90 5052 perl optional 
libcrypt-gcrypt-perl_1.26-5.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=pwO+
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to