Your message dated Wed, 20 Sep 2023 18:04:38 +0000
with message-id <e1qj1z0-00gu63...@fasolo.debian.org>
and subject line Bug#1052331: fixed in libcrypt-openssl-pkcs12-perl 1.9-3
has caused the Debian Bug report #1052331,
regarding libcrypt-openssl-pkcs12-perl: Testsuite failures due to higher 
openssl version.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1052331: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052331
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libcrypt-openssl-pkcs12-perl
Version: 1.9-2
severity: serious

I reported FTBFS against openssl 3.0 in #1006386 and now it kind of
falls apart again. The check in patch is
|   $major eq "3.1" and $minor <= 2) or ($major eq "3.0" and $minor <= 10)

and I have now 3.1.3 in experimental and 3.0.11 in unstable leading to
ci failures and FTBFS for libcrypt-openssl-pkcs12-perl itself.

Could we please extend the version check to all major 3.0 and 3.1
versions?
It looks unlikely that the password thingy will be changed within
3.0/3.1 series based on the linked bug report. And maybe even add 3.2
because from what I see in the current alpha version is, that it is ABI
compatible with the current 3.0/3.1 releases.

But then maybe limit the test to less than 3.0 series of openssl and
enable it again once it is known that it works again. Whatever feels
like less work ;)

Sebastian

--- End Message ---
--- Begin Message ---
Source: libcrypt-openssl-pkcs12-perl
Source-Version: 1.9-3
Done: gregor herrmann <gre...@debian.org>

We believe that the bug you reported is fixed in the latest version of
libcrypt-openssl-pkcs12-perl, which is due to be installed in the Debian FTP 
archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1052...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
gregor herrmann <gre...@debian.org> (supplier of updated 
libcrypt-openssl-pkcs12-perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 20 Sep 2023 19:43:10 +0200
Source: libcrypt-openssl-pkcs12-perl
Architecture: source
Version: 1.9-3
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group <pkg-perl-maintain...@lists.alioth.debian.org>
Changed-By: gregor herrmann <gre...@debian.org>
Closes: 1052331
Changes:
 libcrypt-openssl-pkcs12-perl (1.9-3) unstable; urgency=medium
 .
   * Team upload.
   * Update openssl3.patch to skip pkcs12 password test on all OpenSSL 3.x
     versions.
     Thanks to Sebastian Andrzej Siewior for the bug report.
     (Closes: #1052331)
Checksums-Sha1:
 bdef059ef5e3bd2c99f18331f73e8bfde484b36e 2710 
libcrypt-openssl-pkcs12-perl_1.9-3.dsc
 f3fe927f51a5b5cb1f48353e17110f0599597c05 7124 
libcrypt-openssl-pkcs12-perl_1.9-3.debian.tar.xz
Checksums-Sha256:
 aa37965dfe7a60f0976d50a585ace68b6be928f6e494d2cbf08c91d38610ffb4 2710 
libcrypt-openssl-pkcs12-perl_1.9-3.dsc
 a048399d2d9eb885c7a1e7c40d202306d41282f460ac5e74c5044fb0685301e1 7124 
libcrypt-openssl-pkcs12-perl_1.9-3.debian.tar.xz
Files:
 7cf4179e6ceadbae390fa2336644a451 2710 perl optional 
libcrypt-openssl-pkcs12-perl_1.9-3.dsc
 7ab75f87d77a6af244b7da5b99853869 7124 perl optional 
libcrypt-openssl-pkcs12-perl_1.9-3.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEE0eExbpOnYKgQTYX6uzpoAYZJqgYFAmULL8VfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEQx
RTEzMTZFOTNBNzYwQTgxMDREODVGQUJCM0E2ODAxODY0OUFBMDYACgkQuzpoAYZJ
qgZqnw//Z051ErEEDMVZSO8WfA4MHLLO6fcboaWBFDxZIAzOGI0hMYJ9dt7dAJiM
5pTv3SRP00u4uWE2VMXMjiJ0CeOtV6B1fv33A/YZorfu/RfVwRVMyZfEG5evGOWp
nirE5AwnwncyVZUqbvwRQQrEm4iNXQULliigKkSBLDQHyoJZMocm47ddtiqbKiyj
SQziyNNEcGOdbNOo8Juw7I5zm/QhCoGOCofsVhnAiZi6+De7bMVyGq98ulHGh7bT
5/XPjLmYW623Ms6MevlwT2+YEr1+abOn+pL1ATM0E/PXZe9ab2ZiTpPdwF2Go3vm
VJjzy82mCt0YbPnSdjdLy6t6rxMNDh4R1Iq2BZt2KUI7ryCrQjHOi3cdMEuJmzpa
PwVLEXibL8DqRAb9Ni/2LTiKFZgWY9VdCihPukjtVk+fNBIR8ZBmQSzMnbqYEU9m
uDOgY6iuElvCVP+j6uY+QYz4ARnpq4UX47n0Lx6DqU9yk33GHT2NnWCPEXTkwp1G
r1NC/SXZBwiuaCThLqr/A7hUy3o406ceR3C0cO8CmkwFP1qUL4UJqgnCpE11x7Pq
eyx+/ARqcNZ59mpJyRTYrtWs4qskPYC5yj3q16+kLfSFmn34z1Kb1d6Eqz54QF8O
IIx/iCLcsRgqg1xlQMRvkCbw9qzKwLhHsrW/GrC2Je1gPMTRGvo=
=u9ts
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to