Your message dated Wed, 28 Dec 2022 01:22:30 +0000
with message-id <e1pal9k-00cvkd...@fasolo.debian.org>
and subject line Bug#1023338: fixed in rakudo 2022.12-1~exp1
has caused the Debian Bug report #1023338,
regarding rakudo: Please add support for "riscv64" arch
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1023338: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023338
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: rakudo
Version: 2022.07-2
Severity: wishlist
Tags: ftbfs patch
User: debian-ri...@lists.debian.org
Usertags: riscv64
X-Debbugs-Cc: m...@debian.org, debian-ri...@lists.debian.org
Hi,
Please enable this architecture, with the patch attached or an equivalent.
I built it locally on hardware, it built fine and passed tests just by enabling
the architecture in debian/control, no other changes needed.
Thanks and cheers.
--
Manuel A. Fernandez Montecelo <m...@debian.org>
diff -Nru rakudo-2022.07/debian/changelog rakudo-2022.07/debian/changelog
--- rakudo-2022.07/debian/changelog 2022-10-02 17:28:35.000000000 +0200
+++ rakudo-2022.07/debian/changelog 2022-11-02 11:44:18.000000000 +0100
@@ -1,3 +1,10 @@
+rakudo (2022.07-2.1) unstable; urgency=medium
+
+ * Non-maintainer upload.
+ * Add support for riscv64
+
+ -- Manuel A. Fernandez Montecelo <m...@debian.org> Wed, 02 Nov 2022 10:44:18
+0000
+
rakudo (2022.07-2) unstable; urgency=medium
* refresh fix-test patch
diff -Nru rakudo-2022.07/debian/control rakudo-2022.07/debian/control
--- rakudo-2022.07/debian/control 2022-10-02 17:28:35.000000000 +0200
+++ rakudo-2022.07/debian/control 2022-11-02 11:44:18.000000000 +0100
@@ -22,7 +22,7 @@
Rules-Requires-Root: no
Package: rakudo
-Architecture: amd64 arm64 armel armhf i386 kfreebsd-amd64 kfreebsd-i386 mips
mips64el mipsel powerpc ppc64 ppc64el s390x x32
+Architecture: amd64 arm64 armel armhf i386 kfreebsd-amd64 kfreebsd-i386 mips
mips64el mipsel powerpc ppc64 ppc64el riscv64 s390x x32
Depends: ${misc:Depends},
${moarvm:Depends},
${nqp:Depends},
--- End Message ---
--- Begin Message ---
Source: rakudo
Source-Version: 2022.12-1~exp1
Done: Mo Zhou <lu...@debian.org>
We believe that the bug you reported is fixed in the latest version of
rakudo, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1023...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Mo Zhou <lu...@debian.org> (supplier of updated rakudo package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 27 Dec 2022 20:08:52 -0500
Source: rakudo
Architecture: source
Version: 2022.12-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Rakudo Maintainers <pkg-rakudo-de...@lists.alioth.debian.org>
Changed-By: Mo Zhou <lu...@debian.org>
Closes: 1023338
Changes:
rakudo (2022.12-1~exp1) experimental; urgency=medium
.
[ Dominique Dumont ]
* watch: use github example from uscan man page
* remove patch which was not applied
* add raku compiler id to api-version
* control: declare compliance with policy 4.6.1
* control: rm obsolete Breaks and Replaces parameters
* lintian-overrides: docs/architecture.html is a source file
.
[ Mo Zhou ]
* Mangle download URL to release page to fix GPG verification.
* New upstream version 2022.12
* Bump moarvm-dev and nqp requirement to >= 2022.12.
* Refresh existing patches. Remove merged patches.
* Append riscv64 to Architecture list (Closes: #1023338)
* Upload to experimental.
Checksums-Sha1:
0993412587e60b3b02ce7c511050f1a5de5ee41a 2407 rakudo_2022.12-1~exp1.dsc
f863f1397c17f16455e1bb776483ab31f9eac9a0 1816692 rakudo_2022.12.orig.tar.xz
44f706d2f632676d94e5bed343be47b942eb31f8 20356
rakudo_2022.12-1~exp1.debian.tar.xz
f29db6eed8daf071dc5104a9fac9f685014305d2 6471
rakudo_2022.12-1~exp1_source.buildinfo
Checksums-Sha256:
5ab1b5055189770e1ce22902a72425060743232171a558387d3a1ed92425761b 2407
rakudo_2022.12-1~exp1.dsc
b96314bfb8be798801d406800e7e7b1fe3d021f7d2c952b1c609d3de19387546 1816692
rakudo_2022.12.orig.tar.xz
20078252a4a584e7b3aafd45a79b221e637ab77f2d94a8e9251bc5c5f9c91d71 20356
rakudo_2022.12-1~exp1.debian.tar.xz
72f7b734fe04590151bd18dd4d7393712bed954f7171e425f8c48d9c948b0f25 6471
rakudo_2022.12-1~exp1_source.buildinfo
Files:
b431177ae90fd35695be3c4351b6d2ba 2407 interpreters optional
rakudo_2022.12-1~exp1.dsc
4eb705520c13456a641a9ef6e31e62d5 1816692 interpreters optional
rakudo_2022.12.orig.tar.xz
3796ee465e0b61397058e4df07776f0f 20356 interpreters optional
rakudo_2022.12-1~exp1.debian.tar.xz
2726d32093a28ec5805c856c53328d14 6471 interpreters optional
rakudo_2022.12-1~exp1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=U1PA
-----END PGP SIGNATURE-----
--- End Message ---