[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#766229: marked as done (ITP: libex-monkeypatched-perl -- experimental API for safe monkey-patching)



Your message dated Wed, 22 Oct 2014 13:00:06 +0000
with message-id <E1XgvWI-0001VB-Uc@franck.debian.org>
and subject line Bug#766229: fixed in libex-monkeypatched-perl 0.03-1
has caused the Debian Bug report #766229,
regarding ITP: libex-monkeypatched-perl -- experimental API for safe monkey-patching
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
766229: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766229
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Jonas Smedegaard <dr@jones.dk>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

* Package name    : libex-monkeypatched-perl
  Version         : 0.03
  Upstream Author : Aaron Crane <arc@cpan.org>
* URL             : https://metacpan.org/release/ex-monkeypatched
* License         : Artistic or GPL-2
  Programming Lang: Perl
  Description     : experimental API for safe monkey-patching

 The term "monkey patching" describes injecting additional methods into
 a class whose implementation you don't control.  If done without care,
 this is dangerous; the problematic case arises when:
  * You add a method to a class;
  * A newer version of the monkey-patched class adds another method of
    the same name
  * And uses that new method in some other part of its own
    implementation.

 ex::monkeypatched lets you do this sort of monkey-patching safely:
 before it injects a method into the target class, it checks whether the
 class already has a method of the same name.  If it finds such a
 method, it throws an exception (at compile-time with respect to the
 code that does the injection).
 .
 See <http://aaroncrane.co.uk/talks/monkey_patching_subclassing/> for
 more details.

Needed by libcatmandu-marc-perl.

Will be maintained in the Perl team.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=
=m5ov
-----END PGP SIGNATURE-----

--- End Message ---
--- Begin Message ---
Source: libex-monkeypatched-perl
Source-Version: 0.03-1

We believe that the bug you reported is fixed in the latest version of
libex-monkeypatched-perl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 766229@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jonas Smedegaard <dr@jones.dk> (supplier of updated libex-monkeypatched-perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 21 Oct 2014 19:00:03 +0200
Source: libex-monkeypatched-perl
Binary: libex-monkeypatched-perl
Architecture: source all
Version: 0.03-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group <pkg-perl-maintainers@lists.alioth.debian.org>
Changed-By: Jonas Smedegaard <dr@jones.dk>
Description:
 libex-monkeypatched-perl - experimental API for safe monkey-patching
Closes: 766229
Changes:
 libex-monkeypatched-perl (0.03-1) unstable; urgency=low
 .
   * Initial Release.
     Closes: bug#766229.
Checksums-Sha1:
 ce690c478c1b776bddce37dd744ca63bcdc45b8f 2279 libex-monkeypatched-perl_0.03-1.dsc
 b6f9f680cd63929cda1edd014814416973f3bab9 5638 libex-monkeypatched-perl_0.03.orig.tar.gz
 62162f17ee8cc6f7a3aa0bc3c7da2e7d914d6beb 2904 libex-monkeypatched-perl_0.03-1.debian.tar.xz
 3f7c176de823fa2aa5aaf522dee48552a744e3bf 11370 libex-monkeypatched-perl_0.03-1_all.deb
Checksums-Sha256:
 4435a4f76ee1cdda1dc3f27286195732d449995460c7f00ac4059fd945a43f14 2279 libex-monkeypatched-perl_0.03-1.dsc
 0fde5c455c23e850f85a218b1395fb2fab8ca4cf112e32d057c354b352003487 5638 libex-monkeypatched-perl_0.03.orig.tar.gz
 a83185084f738877ced54e395af5315bdddb61eb2cc1c6ff25315e4278059926 2904 libex-monkeypatched-perl_0.03-1.debian.tar.xz
 db3f98b61c84d539e3e075278831faec638d443eab942ab2d930af3e395a8f8e 11370 libex-monkeypatched-perl_0.03-1_all.deb
Files:
 6848e14bdefa23641c5f1fce9dd1e8b6 2279 perl optional libex-monkeypatched-perl_0.03-1.dsc
 ace33fd3954f24d3d9b8512626c0ede8 5638 perl optional libex-monkeypatched-perl_0.03.orig.tar.gz
 ce606463638ca4bd712f13f736e28ee4 2904 perl optional libex-monkeypatched-perl_0.03-1.debian.tar.xz
 f209fab8768def4644bb3e388eb3b952 11370 perl optional libex-monkeypatched-perl_0.03-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=U6ev
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: