Your message dated Thu, 28 Oct 2021 21:25:29 +0000
with message-id <e1mgctt-000gsm...@fasolo.debian.org>
and subject line Bug#996220: fixed in ruby-escape-utils 1.2.1-3
has caused the Debian Bug report #996220,
regarding ruby-escape-utils: FTBFS with ruby3.0: ERROR: Test "ruby3.0" failed: 
NoMethodError: undefined method `escape' for URI:Module
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
996220: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996220
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ruby-escape-utils
Version: 1.2.1-2
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: debian-r...@lists.debian.org
Usertags: ruby3.0

Hi,

We are about to enable building against ruby3.0 on unstable. During a test
rebuild, ruby-escape-utils was found to fail to build in that situation.

To reproduce this locally, you need to install ruby-all-dev from experimental
on an unstable system or build chroot.

Relevant part (hopefully):
> NoMethodError: undefined method `escape' for URI:Module
>     /<<PKGBUILDDIR>>/test/uri/escape_test.rb:8:in `block in 
> test_uri_stdlib_compatibility'
>     /<<PKGBUILDDIR>>/test/uri/escape_test.rb:6:in `each'
>     /<<PKGBUILDDIR>>/test/uri/escape_test.rb:6:in 
> `test_uri_stdlib_compatibility'
>     /usr/lib/ruby/vendor_ruby/minitest/test.rb:98:in `block (3 levels) in run'
>     /usr/lib/ruby/vendor_ruby/minitest/test.rb:195:in `capture_exceptions'
>     /usr/lib/ruby/vendor_ruby/minitest/test.rb:95:in `block (2 levels) in run'
>     /usr/lib/ruby/vendor_ruby/minitest.rb:270:in `time_it'
>     /usr/lib/ruby/vendor_ruby/minitest/test.rb:94:in `block in run'
>     /usr/lib/ruby/vendor_ruby/minitest.rb:365:in `on_signal'
>     /usr/lib/ruby/vendor_ruby/minitest/test.rb:211:in `with_info_handler'
>     /usr/lib/ruby/vendor_ruby/minitest/test.rb:93:in `run'
>     /usr/lib/ruby/vendor_ruby/minitest.rb:1029:in `run_one_method'
>     /usr/lib/ruby/vendor_ruby/minitest.rb:339:in `run_one_method'
>     /usr/lib/ruby/vendor_ruby/minitest.rb:326:in `block (2 levels) in run'
>     /usr/lib/ruby/vendor_ruby/minitest.rb:325:in `each'
>     /usr/lib/ruby/vendor_ruby/minitest.rb:325:in `block in run'
>     /usr/lib/ruby/vendor_ruby/minitest.rb:365:in `on_signal'
>     /usr/lib/ruby/vendor_ruby/minitest.rb:352:in `with_info_handler'
>     /usr/lib/ruby/vendor_ruby/minitest.rb:324:in `run'
>     /usr/lib/ruby/vendor_ruby/minitest.rb:164:in `block in __run'
>     /usr/lib/ruby/vendor_ruby/minitest.rb:164:in `map'
>     /usr/lib/ruby/vendor_ruby/minitest.rb:164:in `__run'
>     /usr/lib/ruby/vendor_ruby/minitest.rb:141:in `run'
>     /usr/lib/ruby/vendor_ruby/minitest.rb:68:in `block in autorun'
> 
> 91 runs, 765 assertions, 0 failures, 1 errors, 0 skips
> ERROR: Test "ruby3.0" failed: 


The full build log is available at
https://people.debian.org/~kanashiro/ruby3.0/round2/builds/3/ruby-escape-utils/ruby-escape-utils_1.2.1-2+rebuild1633379088_amd64.build.txt

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: ruby-escape-utils
Source-Version: 1.2.1-3
Done: Lucas Kanashiro <kanash...@debian.org>

We believe that the bug you reported is fixed in the latest version of
ruby-escape-utils, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 996...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Lucas Kanashiro <kanash...@debian.org> (supplier of updated ruby-escape-utils 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 28 Oct 2021 17:44:12 -0300
Source: ruby-escape-utils
Architecture: source
Version: 1.2.1-3
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Team 
<pkg-ruby-extras-maintain...@lists.alioth.debian.org>
Changed-By: Lucas Kanashiro <kanash...@debian.org>
Closes: 996220
Changes:
 ruby-escape-utils (1.2.1-3) unstable; urgency=medium
 .
   * Team upload.
 .
   [ Debian Janitor ]
   * Set upstream metadata fields: Repository, Repository-Browse.
   * Update watch file format version to 4.
   * Set upstream metadata fields: Bug-Database, Bug-Submit.
   * Remove constraints unnecessary since buster:
     + Build-Depends: Drop versioned constraint on gem2deb and ruby-minitest.
   * Bump debhelper from old 12 to 13.
   * Update standards version to 4.5.1, no changes needed.
 .
   [ Lucas Kanashiro ]
   * Add patch to not run test checking URI stdlib compat with ruby3.0
     (Closes: #996220)
   * Declare compliance with Debian Policy 4.6.0
Checksums-Sha1:
 a7bbf80c564f6f4902092e19e43b3b5e8a7d327f 2165 ruby-escape-utils_1.2.1-3.dsc
 22f094a02242c915e38fa09af5e7d7739f170848 4764 
ruby-escape-utils_1.2.1-3.debian.tar.xz
Checksums-Sha256:
 43bd8bf31a4dd2bc49f6cc390aed5ebc8b5e4b2bac7cfee0cddde2550273ccdd 2165 
ruby-escape-utils_1.2.1-3.dsc
 47128c2bde82f4cdc574ed6a045e0924c4c15c82728a7e1a65fbedb1761e623a 4764 
ruby-escape-utils_1.2.1-3.debian.tar.xz
Files:
 e7e3de3c64560b25668303fe01603d0f 2165 ruby optional 
ruby-escape-utils_1.2.1-3.dsc
 e2881db643a934a7f349bf71d0ad26b9 4764 ruby optional 
ruby-escape-utils_1.2.1-3.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=+ofA
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to