Your message dated Wed, 06 Dec 2017 19:33:49 +0000
with message-id <e1emfs1-000abz...@fasolo.debian.org>
and subject line Bug#867642: fixed in capistrano 3.10.0-1
has caused the Debian Bug report #867642,
regarding capistrano: FTBFS: ERROR: Test "ruby2.3" failed:      Failure/Error: 
expect(out).to match(/\bCapistrano Version\b/)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
867642: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867642
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: capistrano
Version: 3.4.0-1
Severity: serious
Tags: stretch sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20170707 qa-ftbfs
Justification: FTBFS on amd64

Hi,

During a rebuild of all packages in sid, your package failed to build on
amd64.

Relevant part (hopefully):
>      Failure/Error: expect(out).to match(/\bCapistrano Version\b/)
> 
>        expected "" to match /\bCapistrano Version\b/
>        Diff:
>        @@ -1,2 +1,2 @@
>        -/\bCapistrano Version\b/
>        +""
>      # ./spec/lib/capistrano/application_spec.rb:30:in `block (2 levels) in 
> <top (required)>'
> 
> Finished in 0.16156 seconds (files took 0.38392 seconds to load)
> 270 examples, 1 failure, 2 pending
> 
> Failed examples:
> 
> rspec ./spec/lib/capistrano/application_spec.rb:26 # Capistrano::Application 
> overrides the rake method, but still prints the rake version
> 
> Randomized with seed 11779
> 
> /usr/bin/ruby2.3 /usr/bin/rspec --pattern spec/\*\*\{,/\*/\*\*\}/\*_spec.rb 
> failed
> ERROR: Test "ruby2.3" failed: 

The full build log is available from:
   http://aws-logs.debian.net/2017/07/07/capistrano_3.4.0-1_unstable.log

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.

--- End Message ---
--- Begin Message ---
Source: capistrano
Source-Version: 3.10.0-1

We believe that the bug you reported is fixed in the latest version of
capistrano, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 867...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Samuel Henrique <samuel...@gmail.com> (supplier of updated capistrano package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 28 Nov 2017 23:06:30 -0200
Source: capistrano
Binary: capistrano
Architecture: source
Version: 3.10.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers 
<pkg-ruby-extras-maintain...@lists.alioth.debian.org>
Changed-By: Samuel Henrique <samuel...@gmail.com>
Description:
 capistrano - tool to execute commands in parallel on multiple servers
Closes: 867642
Changes:
 capistrano (3.10.0-1) unstable; urgency=medium
 .
   [ Antonio Terceiro ]
   * Remove myself from Uploaders:
   * Add Testsuite: header
 .
   [ Samuel Henrique ]
   * Add myself to uploaders
   * New upstream version 3.10.0
   * Bump DH level to 10
   * Bump Standards-Version to 4.1.1
   * Use https on d/watch
   * d/cap.1: fill Name field
   * d/copyright: update entries
   * d/patches/skip_tests: new patch to address FTBFS (closes: #867642)
Checksums-Sha1:
 e0f35e6fcca773bf94b44bff87f1525610c1af10 2128 capistrano_3.10.0-1.dsc
 03173305ed58ec666b17f5a95a4f4a3fa5da4514 75743 capistrano_3.10.0.orig.tar.gz
 fd38f8b5ad42038e238f90f72119cd7e0d220259 6068 capistrano_3.10.0-1.debian.tar.xz
 3495eb8563d1bcd917fdadb44348eea287ad008f 6724 
capistrano_3.10.0-1_source.buildinfo
Checksums-Sha256:
 64c80d0e58e6103271093539f12594edc5a6a1262c544421d2636880fe191d8d 2128 
capistrano_3.10.0-1.dsc
 36a525f7fa9635ecb0d915c33194f8a89e9d9cbfd7cfd42975746a32137e1852 75743 
capistrano_3.10.0.orig.tar.gz
 0fdef834666c8dde9ebfa0a2fbf815e7c065e98c31a0b8c92f607e8691fad3a9 6068 
capistrano_3.10.0-1.debian.tar.xz
 f94182629d62b503282d5f04befa2420e72099b46fe8e681acf834c004c92ffc 6724 
capistrano_3.10.0-1_source.buildinfo
Files:
 7ffd04e50b09603890b1bd244012b505 2128 ruby optional capistrano_3.10.0-1.dsc
 54a16e1eb0b01128c8bde9249819e0c3 75743 ruby optional 
capistrano_3.10.0.orig.tar.gz
 2b15a5ba634402c8781c5ca074d23e4b 6068 ruby optional 
capistrano_3.10.0-1.debian.tar.xz
 7d73530f31cc1e277105d76b076ba8ce 6724 ruby optional 
capistrano_3.10.0-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=ZcCo
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to