Your message dated Thu, 22 Dec 2022 18:34:09 +0000
with message-id <e1p8qop-0023lt...@fasolo.debian.org>
and subject line Bug#1023917: fixed in cpm 0.32-1.5
has caused the Debian Bug report #1023917,
regarding cpm: FTBFS against libgpgme-dev >= 1.18.0-2 [checking for
gpgme-config... no]
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1023917: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023917
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: cpm
Version: 0.32-1.4
Severity: serious
Tags: patch ftbfs
Justification: fails to build from source (but built successfully in the past)
cpm FTBFS against libgpgme-dev without gpgme-config. Find attached a
minimal patch using gnupg standard autoconf macros. You could also
simply use pkgconf.
cu Andreas
--
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'
Description: Use standard macro to detect gpgme
Author: Andreas Metzler <ametz...@debian.org>
Origin: vendor
Forwarded: no
Last-Update: 2022-11-12
--- a/configure.in
+++ b/configure.in
@@ -351,10 +351,16 @@
PKG_CHECK_MODULES([LIBXML], [libxml-2.0])
LIBXML_XMLLINT="$exec_prefix/bin/xmllint"
AC_SUBST(LIBXML_XMLLINT)
+dnl AM_PATH_GPGME requires AM_PATH_GPG_ERROR for fallback to gpgrt-config
+AM_PATH_GPG_ERROR()
+AM_PATH_GPGME([1.0.0],
+ AC_MSG_RESULT([found GPGME]),
+ AC_MSG_ERROR([GPGME must be version 1.0 or higher.]))
+
AC_PATH_PROG([GPGME_CONFIG], [gpgme-config])
if test -z "$ac_cv_path_GPGME_CONFIG"; then
AC_MSG_ERROR([Could not find gpgme anywhere.])
fi
--- End Message ---
--- Begin Message ---
Source: cpm
Source-Version: 0.32-1.5
Done: Adrian Bunk <b...@debian.org>
We believe that the bug you reported is fixed in the latest version of
cpm, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1023...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Adrian Bunk <b...@debian.org> (supplier of updated cpm package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 10 Dec 2022 19:42:45 +0200
Source: cpm
Architecture: source
Version: 0.32-1.5
Distribution: unstable
Urgency: low
Maintainer: Kacper Wysocki (Redpill-Linpro) <k...@redpill-linpro.com>
Changed-By: Adrian Bunk <b...@debian.org>
Closes: 1023917
Changes:
cpm (0.32-1.5) unstable; urgency=low
.
* Non-maintainer upload.
* Add patch from Andreas Metzler to find gpgme using pkgconf.
(Closes: #1023917)
Checksums-Sha1:
73e43ee10132eeda0899dc5a3db684eb37899ac5 1951 cpm_0.32-1.5.dsc
9882152da60466ff441c61282f23115f7240c2a9 5768 cpm_0.32-1.5.debian.tar.xz
Checksums-Sha256:
6bbf48b9d83c6b8f7006a3d41d3c89918fefe3eb69d679ee16618d9cc6d03b39 1951
cpm_0.32-1.5.dsc
8469a55e46cd373af0fa0f5d0fb5fe5956e9f20366712242e241ba3194d31db3 5768
cpm_0.32-1.5.debian.tar.xz
Files:
78e7105b16a9fe8f2252f3ed7319723f 1951 utils optional cpm_0.32-1.5.dsc
c59e9eca59266f6aa455ba87b7281563 5768 utils optional cpm_0.32-1.5.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=+c0V
-----END PGP SIGNATURE-----
--- End Message ---