Your message dated Wed, 27 Oct 2021 19:50:05 +0000 with message-id <e1mfow1-000fof...@fasolo.debian.org> and subject line Bug#996384: fixed in ruby-serialport 1.3.2-1 has caused the Debian Bug report #996384, regarding ruby-serialport: FTBFS with ruby3.0: ERROR: Test "ruby3.0" failed: <internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:85:in `require': /<<PKGBUILDDIR>>/debian/ruby-serialport/usr/lib/x86_64-linux-gnu/ruby/vendor_ruby/3.0.0/serialport.so: undefined symbol: rb_secure - /<<PKGBUILDDIR>>/debian/ruby-serialport/usr/lib/x86_64-linux-gnu/ruby/vendor_ruby/3.0.0/serialport.so (LoadError) to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 996384: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996384 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: ruby-serialport Version: 1.3.1-1 Severity: serious Justification: FTBFS Tags: bookworm sid ftbfs User: debian-r...@lists.debian.org Usertags: ruby3.0 Hi, We are about to enable building against ruby3.0 on unstable. During a test rebuild, ruby-serialport was found to fail to build in that situation. To reproduce this locally, you need to install ruby-all-dev from experimental on an unstable system or build chroot. Relevant part (hopefully): > <internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:85:in > `require': > /<<PKGBUILDDIR>>/debian/ruby-serialport/usr/lib/x86_64-linux-gnu/ruby/vendor_ruby/3.0.0/serialport.so: > undefined symbol: rb_secure - > /<<PKGBUILDDIR>>/debian/ruby-serialport/usr/lib/x86_64-linux-gnu/ruby/vendor_ruby/3.0.0/serialport.so > (LoadError) > from > <internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:85:in > `require' > from > /<<PKGBUILDDIR>>/debian/ruby-serialport/usr/lib/ruby/vendor_ruby/serialport.rb:1:in > `<top (required)>' > from > <internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:85:in > `require' > from > <internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:85:in > `require' > from debian/ruby-tests.rb:2:in `<main>' > ERROR: Test "ruby3.0" failed: The full build log is available at https://people.debian.org/~kanashiro/ruby3.0/round2/builds/3/ruby-serialport/ruby-serialport_1.3.1-1+rebuild1633395250_amd64.build.txt
signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---Source: ruby-serialport Source-Version: 1.3.2-1 Done: Lucas Kanashiro <kanash...@debian.org> We believe that the bug you reported is fixed in the latest version of ruby-serialport, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 996...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Lucas Kanashiro <kanash...@debian.org> (supplier of updated ruby-serialport package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Wed, 27 Oct 2021 16:19:44 -0300 Source: ruby-serialport Architecture: source Version: 1.3.2-1 Distribution: unstable Urgency: medium Maintainer: Debian Ruby Team <pkg-ruby-extras-maintain...@lists.alioth.debian.org> Changed-By: Lucas Kanashiro <kanash...@debian.org> Closes: 996384 Changes: ruby-serialport (1.3.2-1) unstable; urgency=medium . * Team upload. . [ Cédric Boutillier ] * Bump debhelper compatibility level to 9 * Remove version in the gem2deb build-dependency * Use https:// in Vcs-* fields * Bump Standards-Version to 3.9.7 (no changes needed) * Run wrap-and-sort on packaging files . [ Utkarsh Gupta ] * Add salsa-ci.yml . [ Debian Janitor ] * Trim trailing whitespace. * Use secure copyright file specification URI. * Use secure URI in Homepage field. * Bump debhelper from old 9 to 12. * Set debhelper-compat version in Build-Depends. * Set upstream metadata fields: Bug-Database, Bug-Submit. * Update Vcs-* headers from URL redirect. * Use canonical URL in Vcs-Git. * Update watch file format version to 4. * Bump debhelper from old 12 to 13. . [ Lucas Kanashiro ] * d/watch: use gemwatch.debian.net to track new upstream versions * New upstream version 1.3.2 (Closes: #996384) * Declare compliance with Debian Policy 4.6.0 Checksums-Sha1: 0d6bc926d21a9ef7ae5f31d584ca7165cc403795 2051 ruby-serialport_1.3.2-1.dsc 851853afbaef67a8a3ff292fab7706af29f15be3 20904 ruby-serialport_1.3.2.orig.tar.gz 3fac4036793afe531e68c4226e11a6d45481361b 3580 ruby-serialport_1.3.2-1.debian.tar.xz Checksums-Sha256: 9ae52d17b3f22ad5ab1d2c2a2147d4eeb1694e2a6f3dce2648a81389273318e7 2051 ruby-serialport_1.3.2-1.dsc d240dfb2e8595bd3dba5907f93c00a8d0eda7737c0cd94155882dfbc5cd3a789 20904 ruby-serialport_1.3.2.orig.tar.gz e007ceb5879bc7aa1ffddc9d5abcc35b93981c04bdcc06f202f4c6b567bc82e7 3580 ruby-serialport_1.3.2-1.debian.tar.xz Files: 8b6f633578a07618333b3ece80a39ddb 2051 ruby optional ruby-serialport_1.3.2-1.dsc dc1171cd0fa64942bd755f26e58d9048 20904 ruby optional ruby-serialport_1.3.2.orig.tar.gz 1016e92f2854571728505095ff791511 3580 ruby optional ruby-serialport_1.3.2-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQJJBAEBCAAzFiEEjtbD+LrJ23/BMKhw+COicpiDyXwFAmF5qIAVHGthbmFzaGly b0BkZWJpYW4ub3JnAAoJEPgjonKYg8l81m8P/R9Qbd4fk9EVPjfJKW3inZuDlU6q nsWU7uJ1KWjXTZSCqme7/RcJjcjeYinj2xWaI+eog6FyoN0DVwTBPsMxvSxrx4JB I3HReGPkx4uQ04tzn0ra6d74I4zuY23143isVH7FQPuXmH5WlqyVTmIpfjOdrwMb Fpdbwb4yMvCzDWZnmV1uhvwCo20yPoq/E1NNVq58R2duSfU1qqJpAEnQvqC2cBPe +/FCbhvZp5As3Kj3Okp3atNJkANT5uNngzQ50fwQZl5t8pHoMZx+YnqTU51bxuHT 3bGBEc/WTO+gqVnP2W40n+ILSoLNnaTQzLkHFUU0ufAAcj6LG5Jp+Kd4lGr6fj9j Pywbiqfd5waszdkBohWTm6vFM8y93iSr3IGdBzBgVsc34EHvLTyXCGub2nc9meru ThiX9soDt78KfJSg9j5QUbQmHfmt2usKp8/fq+m21aZy0Ukc/rqjmeMH3WmSa7Lw /V44mKvKjDgIdnPIxiW8ol/pWQyiFQcb0zJgq+5K/R7dzUEKv5Kyu3mt79UlW1lV CWY7sIanQ9pke3hlOIk3v3X7saC5XF9mIB45SrklPSEhC+0F/Z/31loOtBSVmKkB 0vEIFYs5DxSIsQB9+6Q/0BQlVm8DODmshbr/eaVI+nIqLHFIfQeD5iXcWzmvwkuv tWVpWrIb+gurCvBz =qWk0 -----END PGP SIGNATURE-----
--- End Message ---