[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#924182: marked as done ([pre-approval] unblock: julia/1.0.3+dfsg-5)



Your message dated Fri, 29 Mar 2019 12:38:52 +0100
with message-id <20190329113851.uiff5taqmvsnqpjn@debian.org>
and subject line Re: [pre-approval] unblock: julia/1.0.3+dfsg-5
has caused the Debian Bug report #924182,
regarding [pre-approval] unblock: julia/1.0.3+dfsg-5
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
924182: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924182
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock

This is a pre-approval for unblocking julia 1.0.3+dfsg-5,
which follows the unblock request for llvm-toolchain-6.0 (= 1:6.0.1-11).

The difference between julia/testing and julia/1.0.3+dfsg-5 will be:

* Drop the embedded LLVM tarball from debian directory.
* Remove dirty hacks used for building the vendored LLVM.
* Build julia against system LLVM instead of the vendored one.

The vendored LLVM was temporarily added since 1.0.3+dfsg-3,
so it's quite safe to switch back to the system LLVM since
nearly all patches required by julia have been added to
llvm-toolchain-6.0 (= 1:6.0.1-11).

(include/attach the debdiff against the package in testing)
debdiff not available yet.

unblock julia/1.0.3+dfsg-5

-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-3-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

--- End Message ---
--- Begin Message ---
Hi,

On Sun, Mar 10, 2019 at 06:25:18AM +0000, Mo Zhou wrote:
> This is a pre-approval for unblocking julia 1.0.3+dfsg-5,
> which follows the unblock request for llvm-toolchain-6.0 (= 1:6.0.1-11).
> 
> The difference between julia/testing and julia/1.0.3+dfsg-5 will be:
> 
> * Drop the embedded LLVM tarball from debian directory.
> * Remove dirty hacks used for building the vendored LLVM.
> * Build julia against system LLVM instead of the vendored one.
> 
> The vendored LLVM was temporarily added since 1.0.3+dfsg-3,
> so it's quite safe to switch back to the system LLVM since
> nearly all patches required by julia have been added to
> llvm-toolchain-6.0 (= 1:6.0.1-11).
> 
> (include/attach the debdiff against the package in testing)
> debdiff not available yet.

I'm closing this request, because it's unlikely to be approved. Once there is
an acceptable version of llvm-toolchain-6.0, you can open a new request with
targeted fixes for julia (if that would still be relevant).

Thanks,

Ivo

--- End Message ---

Reply to: