Your message dated Thu, 28 Oct 2021 21:25:29 +0000 with message-id <e1mgctt-000gsm...@fasolo.debian.org> and subject line Bug#996220: fixed in ruby-escape-utils 1.2.1-3 has caused the Debian Bug report #996220, regarding ruby-escape-utils: FTBFS with ruby3.0: ERROR: Test "ruby3.0" failed: NoMethodError: undefined method `escape' for URI:Module to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 996220: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996220 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: ruby-escape-utils Version: 1.2.1-2 Severity: serious Justification: FTBFS Tags: bookworm sid ftbfs User: debian-r...@lists.debian.org Usertags: ruby3.0 Hi, We are about to enable building against ruby3.0 on unstable. During a test rebuild, ruby-escape-utils was found to fail to build in that situation. To reproduce this locally, you need to install ruby-all-dev from experimental on an unstable system or build chroot. Relevant part (hopefully): > NoMethodError: undefined method `escape' for URI:Module > /<<PKGBUILDDIR>>/test/uri/escape_test.rb:8:in `block in > test_uri_stdlib_compatibility' > /<<PKGBUILDDIR>>/test/uri/escape_test.rb:6:in `each' > /<<PKGBUILDDIR>>/test/uri/escape_test.rb:6:in > `test_uri_stdlib_compatibility' > /usr/lib/ruby/vendor_ruby/minitest/test.rb:98:in `block (3 levels) in run' > /usr/lib/ruby/vendor_ruby/minitest/test.rb:195:in `capture_exceptions' > /usr/lib/ruby/vendor_ruby/minitest/test.rb:95:in `block (2 levels) in run' > /usr/lib/ruby/vendor_ruby/minitest.rb:270:in `time_it' > /usr/lib/ruby/vendor_ruby/minitest/test.rb:94:in `block in run' > /usr/lib/ruby/vendor_ruby/minitest.rb:365:in `on_signal' > /usr/lib/ruby/vendor_ruby/minitest/test.rb:211:in `with_info_handler' > /usr/lib/ruby/vendor_ruby/minitest/test.rb:93:in `run' > /usr/lib/ruby/vendor_ruby/minitest.rb:1029:in `run_one_method' > /usr/lib/ruby/vendor_ruby/minitest.rb:339:in `run_one_method' > /usr/lib/ruby/vendor_ruby/minitest.rb:326:in `block (2 levels) in run' > /usr/lib/ruby/vendor_ruby/minitest.rb:325:in `each' > /usr/lib/ruby/vendor_ruby/minitest.rb:325:in `block in run' > /usr/lib/ruby/vendor_ruby/minitest.rb:365:in `on_signal' > /usr/lib/ruby/vendor_ruby/minitest.rb:352:in `with_info_handler' > /usr/lib/ruby/vendor_ruby/minitest.rb:324:in `run' > /usr/lib/ruby/vendor_ruby/minitest.rb:164:in `block in __run' > /usr/lib/ruby/vendor_ruby/minitest.rb:164:in `map' > /usr/lib/ruby/vendor_ruby/minitest.rb:164:in `__run' > /usr/lib/ruby/vendor_ruby/minitest.rb:141:in `run' > /usr/lib/ruby/vendor_ruby/minitest.rb:68:in `block in autorun' > > 91 runs, 765 assertions, 0 failures, 1 errors, 0 skips > ERROR: Test "ruby3.0" failed: The full build log is available at https://people.debian.org/~kanashiro/ruby3.0/round2/builds/3/ruby-escape-utils/ruby-escape-utils_1.2.1-2+rebuild1633379088_amd64.build.txt
signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---Source: ruby-escape-utils Source-Version: 1.2.1-3 Done: Lucas Kanashiro <kanash...@debian.org> We believe that the bug you reported is fixed in the latest version of ruby-escape-utils, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 996...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Lucas Kanashiro <kanash...@debian.org> (supplier of updated ruby-escape-utils package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Thu, 28 Oct 2021 17:44:12 -0300 Source: ruby-escape-utils Architecture: source Version: 1.2.1-3 Distribution: unstable Urgency: medium Maintainer: Debian Ruby Team <pkg-ruby-extras-maintain...@lists.alioth.debian.org> Changed-By: Lucas Kanashiro <kanash...@debian.org> Closes: 996220 Changes: ruby-escape-utils (1.2.1-3) unstable; urgency=medium . * Team upload. . [ Debian Janitor ] * Set upstream metadata fields: Repository, Repository-Browse. * Update watch file format version to 4. * Set upstream metadata fields: Bug-Database, Bug-Submit. * Remove constraints unnecessary since buster: + Build-Depends: Drop versioned constraint on gem2deb and ruby-minitest. * Bump debhelper from old 12 to 13. * Update standards version to 4.5.1, no changes needed. . [ Lucas Kanashiro ] * Add patch to not run test checking URI stdlib compat with ruby3.0 (Closes: #996220) * Declare compliance with Debian Policy 4.6.0 Checksums-Sha1: a7bbf80c564f6f4902092e19e43b3b5e8a7d327f 2165 ruby-escape-utils_1.2.1-3.dsc 22f094a02242c915e38fa09af5e7d7739f170848 4764 ruby-escape-utils_1.2.1-3.debian.tar.xz Checksums-Sha256: 43bd8bf31a4dd2bc49f6cc390aed5ebc8b5e4b2bac7cfee0cddde2550273ccdd 2165 ruby-escape-utils_1.2.1-3.dsc 47128c2bde82f4cdc574ed6a045e0924c4c15c82728a7e1a65fbedb1761e623a 4764 ruby-escape-utils_1.2.1-3.debian.tar.xz Files: e7e3de3c64560b25668303fe01603d0f 2165 ruby optional ruby-escape-utils_1.2.1-3.dsc e2881db643a934a7f349bf71d0ad26b9 4764 ruby optional ruby-escape-utils_1.2.1-3.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQJJBAEBCAAzFiEEjtbD+LrJ23/BMKhw+COicpiDyXwFAmF7DIEVHGthbmFzaGly b0BkZWJpYW4ub3JnAAoJEPgjonKYg8l8pRUP/3ZoSuwGhOvHte/vQCrmIDmyjUfC qpIfOymRbTU1i6FMeWgADWFKMlydEpRdvaqNSE6+ikQlLxRKIipahkyxsEDNUr86 0V4yfVQADnVOEuv5K7sVqEJYbnmA+7yrhISoxeURfUds8913soEioptXKkbGgnTw WHbaJ9SAfjao8H3q9pOxpBdscc75TufsnQprLfsjw7IZG+iC4xLzQEeoPOrYezEG /qs5F8jWR8Ma3IpWeECMKkSUNtE9DIVplwPFn5FgDOmGiMMc2iYcWobg0stZMPa9 uIKvWlytUgXL0uJrEBuEhj/ycaudGLd29PVJ8ip6sXNlaW7fGNeed1EkjOFSWD+J wKJDklM5h93Nn+pB3pgDLmOtXTdtBDQ1PXjH68hf1pa2bzUn1wlljcuOjtrhuPRA +K2wAVOWeUYMe4or0mk4aKK/tnQN/PrKXUDXw5wsV8zdz4prtankAf6YRw7TG0Ya nejGHcTa1eplEFdu5ODZLK4h8DVnuSN8/iXktImlBuKmVlzmP0xZYNJi6ap2NZQy xbvt/VNHd7G/8PTJgWZKV0GllbsLDWNYEy5gzt0jVzTWFOgBAbfIbgZa40M4NOY3 9jW2SMfNVvtWcl3onaSwBdXLNHXJK/rRqbt/dohDznuGCJmJQaKoWNNfbSjzlqYK zcbxr7zw6yzKMe9+ =+ofA -----END PGP SIGNATURE-----
--- End Message ---