This bug was fixed in the package oxide-qt - 1.13.6-0ubuntu0.15.10.1 --------------- oxide-qt (1.13.6-0ubuntu0.15.10.1) wily-security; urgency=medium
* Update to v1.13.6 (see USN-2920-1) - Bump Chromium rev to 49.0.2623.87 - Fix LP: #1536797 - Issues with nested event loop handling - Fix LP: #1432059 - Stop using Q_DECL_EXPORT - Fix LP: #1494900 - Stop building the translation units containing public classes as a separate target with different compiler options - Fix LP: #1533223 - Use consistent naming of QFlags types (doesn't affect the QML API) - Fix LP: #1533710 - Various cleanups in soon-to-be-public headers - Fix LP: #1463410 - Fold SimplePermissionRequest in to PermissionRequest (doesn't affect the QML API) - Add a deprecation warning for WebView.loadingChanged - Install public headers and CMake package config files - Be a bit more intelligent when detecting the availability of the Hybris camera compatibility layer and Android EGL platform * Add liboxideqtcore-dev and liboxideqtquick-dev packages - update debian/control - add debian/liboxideqtcore-dev.install - add debian/liboxideqtquick-dev.install * Refresh gross-hack-for-dual-ffmpeg-build.patch * Add build-depends on libffi-dev - update debian/control * Drop chromedriver build (fixes LP: #1543587) - update debian/control - update debian/rules - remove debian/oxideqt-chromedriver.install -- Chris Coulson <chris.coul...@canonical.com> Mon, 07 Mar 2016 10:55:29 +0000 ** Changed in: oxide-qt (Ubuntu) Status: Fix Committed => Fix Released ** Changed in: oxide-qt (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu WebApps bug tracking, which is subscribed to Oxide. https://bugs.launchpad.net/bugs/1543587 Title: Duplicate targets and random mis-builds due to Chromedriver Status in Oxide: Triaged Status in Oxide 1.13 series: Won't Fix Status in oxide-qt package in Ubuntu: Fix Released Bug description: Fixed once in bug 1522830, the build is still pulling in //chrome locale targets. This is resulting in duplicate target names (which ninja warns us about), and random misbuilds (whether Oxide or Chrome locale targets are executed is random). We really really need to stop depending on anything in //chrome. This is a serious layering violation that is going to keep resulting in us pulling in random bits of the Chrome browser. To manage notifications about this bug go to: https://bugs.launchpad.net/oxide/+bug/1543587/+subscriptions -- Mailing list: https://launchpad.net/~ubuntu-webapps-bugs Post to : ubuntu-webapps-bugs@lists.launchpad.net Unsubscribe : https://launchpad.net/~ubuntu-webapps-bugs More help : https://help.launchpad.net/ListHelp