Your message dated Thu, 15 Aug 2024 11:55:12 +0000
with message-id <e1sez4s-000pau...@fasolo.debian.org>
and subject line Bug#1078446: fixed in ceph 18.2.4+ds-6
has caused the Debian Bug report #1078446,
regarding ceph: FTBFS on mips64el:
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1078446: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078446
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ceph
Version: 18.2.4+ds-4
Tags: ftbfs
Severity: serious

ceph currently FTBFS on mips64el but has built there before.

buildd log:
https://buildd.debian.org/status/fetch.php?pkg=ceph&arch=mips64el&ver=18.2.4%2Bds-4&stamp=1723159346&raw=0

Relevant lines, hopefully:

-- Found Java: /usr/lib/jvm/default-java/bin/java (found version "21.0.4") 
found components: Development
CMake Error at 
/usr/share/cmake-3.30/Modules/FindPackageHandleStandardArgs.cmake:233 (message):
  Could NOT find JNI (missing: JVM)
Call Stack (most recent call first):
  /usr/share/cmake-3.30/Modules/FindPackageHandleStandardArgs.cmake:603 
(_FPHSA_FAILURE_MESSAGE)
  /usr/share/cmake-3.30/Modules/FindJNI.cmake:589 
(find_package_handle_standard_args)
  src/java/CMakeLists.txt:2 (find_package)

--- End Message ---
--- Begin Message ---
Source: ceph
Source-Version: 18.2.4+ds-6
Done: Daniel Baumann <dan...@debian.org>

We believe that the bug you reported is fixed in the latest version of
ceph, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1078...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Daniel Baumann <dan...@debian.org> (supplier of updated ceph package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 15 Aug 2024 12:53:10 +0200
Source: ceph
Architecture: source
Version: 18.2.4+ds-6
Distribution: unstable
Urgency: medium
Maintainer: Ceph Packaging Team <team+c...@tracker.debian.org>
Changed-By: Daniel Baumann <dan...@debian.org>
Closes: 1078446
Changes:
 ceph (18.2.4+ds-6) unstable; urgency=medium
 .
   * Removing manually specifing zero jvm on mips64el as it doesn't work
     and we better wait for the proper fix in cmake itself (#1078712).
   * Building with fixed cmake (Closes: #1078446).
   * Trimming unused entry in last changelog.
Checksums-Sha1:
 1501e45b7d141f7470c4ee2296b5ccca048322f4 8685 ceph_18.2.4+ds-6.dsc
 8dab8dfaa1eeac7d79375fb1d10d34caa79b2180 133936 ceph_18.2.4+ds-6.debian.tar.xz
 431412a63c5178107f828561b18247c208db6456 45367 ceph_18.2.4+ds-6_amd64.buildinfo
Checksums-Sha256:
 82aa522fd0597c4a78cb8eef0f0062420d8dcbf49e41e937d531ad107afdb3f1 8685 
ceph_18.2.4+ds-6.dsc
 8de31e1e0d43a23b00e3d52b23bda0bd556afa8231974bb8543600e4e64cecac 133936 
ceph_18.2.4+ds-6.debian.tar.xz
 21599e88b4ba557130c0a444ac4b27cb83290f64c8ca8a801e2dfbb2a5d66b14 45367 
ceph_18.2.4+ds-6_amd64.buildinfo
Files:
 7ea7730eb383fa8310f7424500482794 8685 admin optional ceph_18.2.4+ds-6.dsc
 82b055d2005545f404e4aca9af54bdaa 133936 admin optional 
ceph_18.2.4+ds-6.debian.tar.xz
 3b7b4cbdfbb05df8f78fcebd337559c7 45367 admin optional 
ceph_18.2.4+ds-6_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=qEhV
-----END PGP SIGNATURE-----

Attachment: pgp5GgXJiI2Pq.pgp
Description: PGP signature


--- End Message ---

Reply via email to