Your message dated Mon, 31 Oct 2016 09:05:43 +0000
with message-id <[email protected]>
and subject line Bug#835785: fixed in lua-cqueues 20161018-1
has caused the Debian Bug report #835785,
regarding lua-cqueues: FTBFS with openssl 1.1.0
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
835785: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=835785
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: lua-cqueues
Version: 20160812-1
Severity: important
Hi,
OpenSSL 1.1.0 is about to released. During a rebuild of all
packages using OpenSSL this package fail to build. A log of that
build can be found at:
https://breakpoint.cc/openssl-1.1-rebuild-2016-08-26/failed/lua-cqueues_20160812-1_amd64-2016-08-26T19%3A13%3A17Z
On https://wiki.openssl.org/index.php/1.1_API_Changes you can see
various of the reasons why it might fail. There are also updated
man pages at https://www.openssl.org/docs/manmaster/ that should
contain useful information.
Experimental has the libssl-dev 1.1.0 packages in it. I suggest
you try building against that to see if everything works.
If you have problems making things work, feel free to contact us.
Kurt
--- End Message ---
--- Begin Message ---
Source: lua-cqueues
Source-Version: 20161018-1
We believe that the bug you reported is fixed in the latest version of
lua-cqueues, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Ondřej Surý <[email protected]> (supplier of updated lua-cqueues package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 27 Oct 2016 17:23:20 +0200
Source: lua-cqueues
Binary: lua-cqueues lua-cqueues-dev
Architecture: source
Version: 20161018-1
Distribution: unstable
Urgency: medium
Maintainer: Ondřej Surý <[email protected]>
Changed-By: Ondřej Surý <[email protected]>
Description:
lua-cqueues - event loop for Lua
lua-cqueues-dev - event loop for Lua (development package)
Closes: 835785
Changes:
lua-cqueues (20161018-1) unstable; urgency=medium
.
* Imported Upstream version 20161018
+ Includes openssl 1.1.0 support (Closes: #835785)
* Remove __typeof__ patch merged upstream
Checksums-Sha1:
1c44c1b8327427e5ab3215266ca5b6e26f34e01d 2123 lua-cqueues_20161018-1.dsc
1177df96ebb92ebc7fd7e20207568238f3c823e4 590553
lua-cqueues_20161018.orig.tar.gz
c01244aae5586e48a0ad6ba0253dfe17d022bdc6 3032
lua-cqueues_20161018-1.debian.tar.xz
Checksums-Sha256:
9ffa0175cfa13b35cc1477df171a9d1b5a5c9a9752c83794e7761e99293a2aae 2123
lua-cqueues_20161018-1.dsc
16f6608b9d89327008aa960a8cbb0b48ab4f434f4bcf6647f50765d061d899a9 590553
lua-cqueues_20161018.orig.tar.gz
22959000266e8132c5e56241c9d989d11b115e651ee454c549b0d54c79c51fb8 3032
lua-cqueues_20161018-1.debian.tar.xz
Files:
4eae03745ccb49bbe620a17166e6583d 2123 interpreters optional
lua-cqueues_20161018-1.dsc
e8c08dd692cfc214fd37951f6b3c778a 590553 interpreters optional
lua-cqueues_20161018.orig.tar.gz
3b3708b489512c8b2ae8ced0516bfac8 3032 interpreters optional
lua-cqueues_20161018-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=SHAv
-----END PGP SIGNATURE-----
--- End Message ---