https://bugzilla.redhat.com/show_bug.cgi?id=2021942

            Bug ID: 2021942
           Summary: perl-Crypt-SSLeay: FTBFS with OpenSSL 3.0.0
           Product: Fedora
           Version: rawhide
            Status: NEW
         Component: perl-Crypt-SSLeay
          Assignee: [email protected]
          Reporter: [email protected]
        QA Contact: [email protected]
                CC: [email protected], [email protected],
                    [email protected], [email protected], [email protected],
                    [email protected],
                    [email protected], [email protected],
                    [email protected]
  Target Milestone: ---
    Classification: Fedora



This bug is used to track the readiness of perl-Crypt-SSLeay  with OpenSSL
3.0.0.

Currently the build fails to build with OpenSSL 3.0.0 with the following logs
Task info: https://koji.fedoraproject.org/koji/taskinfo?taskID=78020231

Kindly fix them to ensure this package builds with OpenSSL 3.0.0

You can treat the deprecated warnings not as errors if you want to continue to
use deprecated functions, but it is encouraged to use the new APIs, and this
migration could be done sooner than later.

To not treat deprecated warnings as errors, you may use
-Wno-error=deprecated-declarations

To port to new APIs, kindly refer to the OpenSSL upstream migration guide:
https://www.openssl.org/docs/manmaster/man7/migration_guide.html

Thank you


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2021942
_______________________________________________
perl-devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to