Your message dated Mon, 29 Nov 2021 23:50:19 +0000
with message-id <[email protected]>
and subject line Bug#1000835: fixed in ruby-rspec-memory 1.0.2-3
has caused the Debian Bug report #1000835,
regarding ruby-rspec-memory: autopkgtest failures on armhf and i386 due to
wrong SLOT_SIZE value
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1000835: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1000835
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: ruby-async-rspec
Version: 1.16.1-2
Severity: serious
ruby-async-rspec is unable to migrate to testing due to autopkgtest
failures on armhf and i386:
Failures:
| 1) RSpec::Memory on supported platform should not exceed specified size limit
| Failure/Error:
| expect do
| "a" * 100_000
| end.to limit_allocations.of(String, size: 100_001)
|
| exceeded allocation limit: allocated 2 String instances, 99961 bytes,
expected exactly 100001 bytes
See
https://ci.debian.net/data/autopkgtest/testing/i386/r/ruby-async-rspec/16143499/log.gz
Cheers
--
Sebastian Ramacher
--- End Message ---
--- Begin Message ---
Source: ruby-rspec-memory
Source-Version: 1.0.2-3
Done: Daniel Leidert <[email protected]>
We believe that the bug you reported is fixed in the latest version of
ruby-rspec-memory, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Daniel Leidert <[email protected]> (supplier of updated ruby-rspec-memory
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 30 Nov 2021 00:25:20 +0100
Source: ruby-rspec-memory
Architecture: source
Version: 1.0.2-3
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Team
<[email protected]>
Changed-By: Daniel Leidert <[email protected]>
Closes: 1000835
Changes:
ruby-rspec-memory (1.0.2-3) unstable; urgency=medium
.
* Team upload.
* d/control (Standards-Version): Bump to 4.6.0.
(Description): Add some more content.
* d/copyright (License): Fix short name.
(Copyright): Add team.
* d/patches/0003-Fix-slot-size-for-non-64bit-architectures.patch: Add patch.
- Fix the slot size and the failing autopkgtests (closes: #1000835).
* d/patches/series: Enable new patch.
* d/upstream/metadata: Fix template.
Checksums-Sha1:
7d78db35ef29666b8b766bed61ec61b1104c2088 2118 ruby-rspec-memory_1.0.2-3.dsc
7a5ccbf2af953dc1ddba281856689806e6899995 3744
ruby-rspec-memory_1.0.2-3.debian.tar.xz
c11d1c659d57e2055510ec11bbb7b3c2980eb81c 9348
ruby-rspec-memory_1.0.2-3_amd64.buildinfo
Checksums-Sha256:
66e0a25201a00dc8b138d9f30a17bb1b9a10b10f7937d281dc11f2287b88ea17 2118
ruby-rspec-memory_1.0.2-3.dsc
5ae4aab54bd1bc5c1e6b066485a2c2b9956eefbd4f487b697e64d4f0d6b8ce2f 3744
ruby-rspec-memory_1.0.2-3.debian.tar.xz
3a4199ba5f83bf21d4590803e166192d0f1b17164cbc73847b6fef336d1d3928 9348
ruby-rspec-memory_1.0.2-3_amd64.buildinfo
Files:
2ecd3c1edccebe28148a3161726d85a3 2118 ruby optional
ruby-rspec-memory_1.0.2-3.dsc
d8c3257651c4bf91c5d198300ca700f6 3744 ruby optional
ruby-rspec-memory_1.0.2-3.debian.tar.xz
8c4af3664daa8ac1f11401b2eb34ad7f 9348 ruby optional
ruby-rspec-memory_1.0.2-3_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=bnbL
-----END PGP SIGNATURE-----
--- End Message ---