[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1040732: marked as done (qca2: autopkgtest failure due to new CMake deprecation warning)



Your message dated Thu, 13 Jul 2023 07:19:49 +0000
with message-id <E1qJqc9-009gxg-LH@fasolo.debian.org>
and subject line Bug#1040732: fixed in qca2 2.3.6-2
has caused the Debian Bug report #1040732,
regarding qca2: autopkgtest failure due to new CMake deprecation warning
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1040732: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1040732
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: qca2
Version: 2.3.6-1
Severity: important
User: roehling@debian.org
Usertags: cmake3.27

Dear maintainer,

your package qca2 will soon experience autopkgtest failures because
the new CMake release 3.27 will issue a deprecation warning on stderr
if cmake_minimum_required() asks for compatibility with CMake 3.4 or
older.

You can check for the exact failure on the cmake pseudo-excuses page
from experimental:
https://qa.debian.org/excuses.php?experimental=1&package=cmake

For a more in-depth discussion, kindly refer to the debian-devel
thread: https://lists.debian.org/debian-devel/2023/06/msg00150.html

Cheers

Timo

--- End Message ---
--- Begin Message ---
Source: qca2
Source-Version: 2.3.6-2
Done: Pino Toscano <pino@debian.org>

We believe that the bug you reported is fixed in the latest version of
qca2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1040732@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Pino Toscano <pino@debian.org> (supplier of updated qca2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 13 Jul 2023 09:03:09 +0200
Source: qca2
Architecture: source
Version: 2.3.6-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Qt/KDE Maintainers <debian-qt-kde@lists.debian.org>
Changed-By: Pino Toscano <pino@debian.org>
Closes: 1040732
Changes:
 qca2 (2.3.6-2) unstable; urgency=medium
 .
   * ciphertest-qt5 autopkgtest: call bump the cmake_minimum_required() to 3.13.
     (Closes: #1040732)
Checksums-Sha1:
 dfab5c90febb8180353ec8686e4c9ae2e123b47a 2698 qca2_2.3.6-2.dsc
 df47d2097e696a137cf7495cf1dab81fda9f8e62 27976 qca2_2.3.6-2.debian.tar.xz
 cde79e15235edd80ccb8e5660d6cc2ce48a86830 11623 qca2_2.3.6-2_source.buildinfo
Checksums-Sha256:
 34e25c822fea09e2c64162389b79d74ed63ad4605bbdd64470aff774012e8e3a 2698 qca2_2.3.6-2.dsc
 c8fde281af6601102f36e5a5d096c46b98459cc36cb21977c21ca0e8bff0509e 27976 qca2_2.3.6-2.debian.tar.xz
 bb0e7fa12622c01fc196e882d3cb0b49d5886367b9b8029bec27f34cfd3a2edb 11623 qca2_2.3.6-2_source.buildinfo
Files:
 bc1d0b9c3878127dc9eb58dfcff45c9e 2698 libs optional qca2_2.3.6-2.dsc
 8210ff453c08f83067666c065e4d6726 27976 libs optional qca2_2.3.6-2.debian.tar.xz
 d7f0d42b81c70ce42bc4862f4c9920e8 11623 libs optional qca2_2.3.6-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=7Kyv
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: