Your message dated Sun, 05 Dec 2021 01:19:40 +0000
with message-id <e1mtgbo-0001jj...@fasolo.debian.org>
and subject line Bug#1001129: fixed in puppet 5.5.22-2.1
has caused the Debian Bug report #1001129,
regarding Ruby 3.0: puppet/util.rb:469:in `uri_encode': undefined method 
`escape' for URI:Module (NoMethodError)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1001129: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001129
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: puppet
Version: 5.5.22-2
Severity: serious

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

The version is not ruby 3.0 compatible:

ruby3.0 -e "require 'puppet'"
/usr/lib/ruby/vendor_ruby/puppet/util.rb:469:in `uri_encode': undefined method 
`escape' for URI:Module (NoMethodError)
        from /usr/lib/ruby/vendor_ruby/puppet/util.rb:337:in `path_to_uri'
        from /usr/lib/ruby/vendor_ruby/puppet/pops/model/ast.rb:4863:in 
`register_pcore_types'
        from /usr/lib/ruby/vendor_ruby/puppet/pops.rb:119:in `<module:Puppet>'
        from /usr/lib/ruby/vendor_ruby/puppet/pops.rb:1:in `<top (required)>'
        from 
<internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:85:in 
`require'
        from 
<internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:85:in 
`require'
        from /usr/lib/ruby/vendor_ruby/puppet/parser/compiler.rb:8:in `<top 
(required)>'
        from 
<internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:85:in 
`require'
        from 
<internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:85:in 
`require'
        from /usr/lib/ruby/vendor_ruby/puppet/parser.rb:6:in `<top (required)>'
        from 
<internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:85:in 
`require'
        from 
<internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:85:in 
`require'
        from /usr/lib/ruby/vendor_ruby/puppet.rb:302:in `<top (required)>'
        from 
<internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:85:in 
`require'
        from 
<internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:85:in 
`require'
        from -e:1:in `<main>'

I'm intending to do a quick NMU to fix this.

Regards, Daniel



- -- System Information:
Debian Release: bookworm/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'testing-debug'), (500, 
'stable-security'), (500, 'stable-debug'), (500, 'unstable'), (500, 'testing'), 
(500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.15.0-2-amd64 (SMP w/8 CPU threads)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages puppet depends on:
ii  adduser              3.118
ii  facter               3.14.12-1.1
ii  hiera                3.2.0-2.1
ii  init-system-helpers  1.60
ii  lsb-base             11.1.0
ii  ruby                 1:2.7.6
ii  ruby-augeas          1:0.5.0-3+b9
ii  ruby-deep-merge      1.1.1-1
ii  ruby-shadow          2.5.0+gh-1+b1

Versions of packages puppet recommends:
ii  debconf-utils  1.5.79
ii  lsb-release    11.1.0
pn  ruby-selinux   <none>

Versions of packages puppet suggests:
pn  ruby-hocon  <none>
pn  ruby-rrd    <none>

- -- no debconf information

-----BEGIN PGP SIGNATURE-----
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=CMGz
-----END PGP SIGNATURE-----

--- End Message ---
--- Begin Message ---
Source: puppet
Source-Version: 5.5.22-2.1
Done: Daniel Leidert <dleid...@debian.org>

We believe that the bug you reported is fixed in the latest version of
puppet, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1001...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Daniel Leidert <dleid...@debian.org> (supplier of updated puppet package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 05 Dec 2021 00:53:02 +0100
Source: puppet
Architecture: source
Version: 5.5.22-2.1
Distribution: unstable
Urgency: medium
Maintainer: Puppet Package Maintainers 
<pkg-puppet-de...@alioth-lists.debian.net>
Changed-By: Daniel Leidert <dleid...@debian.org>
Closes: 1001129
Changes:
 puppet (5.5.22-2.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * d/patches/0014-Fix-Ruby-3.0-error.patch: Add patch.
     - Replace URI.escape by URI::DEFAULT_PARSER.escape (closes: #1001129).
   * d/patches/series: Enable new patch.
   * d/tests/control: Add a basic smoke test for these kind of issues.
Checksums-Sha1:
 09ef0d375af7ae8685b797ba8c649f1c21614874 2309 puppet_5.5.22-2.1.dsc
 8080507b980c14be74ac3e4ed310b49e0512bd2c 43708 puppet_5.5.22-2.1.debian.tar.xz
 2d08c827ccc83681b69c2d197cbe545b658cb246 8380 puppet_5.5.22-2.1_amd64.buildinfo
Checksums-Sha256:
 533a6fbfcf4387e2619bc64eac1f3fb609142376f309e2a561ef7cf8a45e1c69 2309 
puppet_5.5.22-2.1.dsc
 3891acf290ffbe99b0ebe97f4cba7cd6122e6a8da9408cc0b71503558d8517c4 43708 
puppet_5.5.22-2.1.debian.tar.xz
 ea6263c6eebe3c06fb9881b049405055654d0a47a337ab5fdde13979b1246934 8380 
puppet_5.5.22-2.1_amd64.buildinfo
Files:
 731a65b303b15b7fcaa286b84b580add 2309 admin optional puppet_5.5.22-2.1.dsc
 714a8fc3840465d51ea8e5e00bd98abb 43708 admin optional 
puppet_5.5.22-2.1.debian.tar.xz
 b9dc6d115b8f39a83d1b12b582dc073e 8380 admin optional 
puppet_5.5.22-2.1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=IfeI
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to