Your message dated Sat, 21 Jun 2014 16:19:08 +0000
with message-id <e1wyo0s-0001oq...@franck.debian.org>
and subject line Bug#746110: fixed in twidge 1.1.1
has caused the Debian Bug report #746110,
regarding twidge: FTBFS: at least the following depedencies are missing: aeson
>=0.6.1.0 && <0.7
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
746110: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746110
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: twidge
Version: 1.1.0
Severity: serious
Tags: jessie sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20140426 qa-ftbfs
Justification: FTBFS on amd64
Hi,
During a rebuild of all packages in sid, your package failed to build on
amd64.
Relevant part (hopefully):
> make[1]: Entering directory `/«PKGBUILDDIR»'
> ghc -package Cabal Setup.lhs -o setup
> [1 of 1] Compiling Main ( Setup.lhs, Setup.o )
> Linking setup ...
> ./setup configure
> setuConfiguring twidge-1.1.0...
> p: At least the following dependencies are missing:
> aeson >=0.6.1.0 && <0.7
> make[1]: *** [all] Error 1
The full build log is available from:
http://aws-logs.debian.net/ftbfs-logs/2014/04/26/twidge_1.1.0_unstable.log
A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!
About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.
--- End Message ---
--- Begin Message ---
Source: twidge
Source-Version: 1.1.1
We believe that the bug you reported is fixed in the latest version of
twidge, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 746...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
John Goerzen <jgoer...@complete.org> (supplier of updated twidge package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Sat, 21 Jun 2014 10:54:29 -0500
Source: twidge
Binary: twidge
Architecture: source amd64
Version: 1.1.1
Distribution: unstable
Urgency: medium
Maintainer: John Goerzen <jgoer...@complete.org>
Changed-By: John Goerzen <jgoer...@complete.org>
Description:
twidge - Unix Command-Line Twitter and Identica Client
Closes: 746110
Changes:
twidge (1.1.1) unstable; urgency=medium
.
* Relax aeson upper bound. Closes: #746110.
Checksums-Sha1:
1c91e53c0bd48421bcf154a78459adc91a3e1a36 1935 twidge_1.1.1.dsc
4cefb58a7e8b001675045d0569e9b323f996c239 54887 twidge_1.1.1.tar.gz
301ed3344dda5f5a7822c8db9d3f0e1d90f1a4fe 1345020 twidge_1.1.1_amd64.deb
Checksums-Sha256:
f46fbae850bb75d714f58e46d75eaa639a8bcf07840521a810bb55d1c2ed6ef9 1935
twidge_1.1.1.dsc
62f82f3b14c1e4bce51af85bca5480da9573d59376999977ff6656c6f210680f 54887
twidge_1.1.1.tar.gz
9c60c0166f323a355ffdd82423ead7514505610c1ba67f511600f85e46066c61 1345020
twidge_1.1.1_amd64.deb
Files:
1a12ef27ec380eabd15d950887c85dcf 1345020 utils optional twidge_1.1.1_amd64.deb
13f50abd2a29f49e82a89eb21459b194 1935 utils optional twidge_1.1.1.dsc
4328da1ca6ccd8e6bf5675ab6492e5a7 54887 utils optional twidge_1.1.1.tar.gz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=cbP2
-----END PGP SIGNATURE-----
--- End Message ---