On 2016-11-28 16:49:35 [+0200], Adrian Bunk wrote:
> Package: polygraph
> Version: 4.3.2-4
> Severity: serious
> Tags: patch
> Control: block 827061 by -1
> 
> ...
> checking for CRYPTO_lock in -lcrypto... no
> checking for CRYPTO_add_lock in -lcrypto... no
> ...
> 
> Not a perfect solution but an option for stretch is the patch below to 
> use OpenSSL 1.0.2
> 
> The "| libssl-dev (<< 1.1.0~)" is added for backports.

could we please keep the bug reporting the way we had it? That means to
note that fails to properly build against openssl 1.1 which will remain
open with severity important if the package stays with openssl 1.0.

> --- debian/control.old        2016-11-28 11:13:51.000000000 +0000
> +++ debian/control    2016-11-28 11:13:57.000000000 +0000
> @@ -6,7 +6,7 @@
>   debhelper (>= 9),
>   dh-autoreconf,
>   libncurses5-dev,
> - libssl-dev,
> + libssl1.0-dev | libssl-dev (<< 1.1.0~),
>   zlib1g-dev,
>  Standards-Version: 3.9.8
>  Homepage: http://www.web-polygraph.org

I though we agreed not to tag this as a patch but as a hint what can be
done if the maintainer chooses to stay with 1.0. Do you expect this bug
to be closed once it switches to libsl1.0-dev?

Sebastian

Reply via email to